Tech explainers
Read in-depth guides to the most important technologies affecting organizations and individuals.
-
An explanation of romance scams (pig butchering)
Pig butchering is a scam that exploits virtual relationships to deceive and steal money.
-
An explanation of collaborative robots
Cobots are robotic arms equipped with sensors for manufacturing and assembly tasks. They also detect human presence for productivity enhancement.
-
An explanation of the CrowdStrike outage
A botched CrowdStrike update triggered a massive outage, affecting airlines, healthcare, banking and transit.
-
An explanation of Flipper Zero
Flipper Zero is both a tool for pen testers and a learning device for new hackers.
-
What is the blue screen of death (BSOD)?
The blue screen of death (BSOD) -- also known as a stop error screen, blue screen error, fatal error or bugcheck -- is a critical error screen that can be displayed by Microsoft Windows operating systems (OSes).
-
AT&T data breach: What's next for affected customers?
Another breach has affected millions of people -- this time it is AT&T customers. Learn more about this AT&T breach and what to do if you were part of this attack.
-
How to control Instagram's political content limits
Using echo chambers, Instagram political content is limited to accounts users engage with and follow.
-
An explanation of inception scores
Inception scores are a mathematical algorithm that measures the quality of AI-generated images.
-
WPA2 vs. WPA3
Wireless security has evolved from WEP to WPA protocols and play a pivotal role in safeguarding against cyberattacks.
-
An explanation of super apps
Super apps consolidate banking, shopping, transportation, email and food delivery into a single, versatile application.
-
5 examples of AI in the Olympics
The 2024 Olympics in Paris will use AI for judging accuracy, personalized recaps, security, logistics and enhancing athlete performance, aiming for a fairer and safer event.
-
What is NumPy? Explaining how it works in Python
NumPy is an open source mathematical and scientific computing library for Python programming tasks.
-
An explanation of bots
Bots are automated programs with varied roles. They can be both helpful and malicious.
-
An explanation of advanced vs. predictive analytics
Predictive analytics is a type of advanced analytics. Learn more in this video.
-
An explanation of the different types of AI
There are four main categories of AI -- reactive, limited memory, theory of mind and self-aware.
-
The CDK Global outage: Explaining how it happened
CDK Global was hit with a ransomware attack affecting thousands of U.S. auto dealerships. Keep reading to learn more about this attack and how it affected the industry.
-
tensor processing unit (TPU)
A tensor processing unit (TPU) is an application-specific integrated circuit (ASIC) specifically designed to accelerate high-volume mathematical and logical processing tasks typically involved with machine learning (ML) workloads.
-
An explanation of GPT-4o
GPT-4o is a multimodal large language model developed by OpenAI.
-
An explanation of CIA triad
In information security CIA stands for confidentiality, integrity and availability.
-
Data protection vs. data privacy vs. data security explained
Data protection, privacy and security all play critical roles in effective data management.
-
An explanation of Trojan horse
Trojan horses are a type of malware that can take control of your computer and even access your camera.
-
An explanation of AI buzzwords
Here are some simple explanations of common AI buzzwords.
-
An explanation of AI model collapse
Generative AI creates content quickly and accurately but faces the risk of model collapse.
-
An explanation of foundation models
The core of every generative AI chatbot -- such as ChatGPT, Bard and YouChat -- is the foundation model.
-
An explanation of Hugging Face
Hugging Face is a machine learning platform that provides the means to run and deploy AI in live applications.
-
Pros and cons of AI-generated content
Artificial intelligence is growing rapidly in the tech sector and assisting with various tasks such as creating images and generating content. However, it cannot do everything.
-
How do cybercriminals steal credit card information?
Cybercriminals have various methods at their disposal to hack and exploit credit card information. Learn what they are, how to prevent them and what to do when hacked.
-
The importance of compliance officers
Compliance officers ensure a company follows both its internal rules as well as external laws from the government.
-
Differences between conversational AI and generative AI
While both AI types often work together, conversational AI enables natural interaction with machines, while generative AI creates new content such as text and images.
-
OpenAI and Apple's partnership, explained
Apple and OpenAI have partnered to bring ChatGPT to Apple devices via Apple's generative AI program, Apple Intelligence, uniting two major forces in the tech industry.
-
An explanation of CLI, GUI and NUI
A natural user interface uses human gestures, spoken words or biometrics for interaction, reducing reliance on typing and programming. This video will compare NUIs to CLI and GUI.
-
Conversational AI vs. generative AI: What's the difference?
As AI continues to evolve, understanding the differences and collaborative potential of conversational AI and generative AI is vital to their role in shaping the digital landscape.
-
Machine customers explained: Everything you need to know
In this fast-paced digital age, the concept of a machine customer has emerged, changing how businesses interact with their online platforms and services.
-
An explanation of gamification
Gamification integrates video game elements into nongame contexts such as business operations. It uses points, badges, levels and rewards to enhance engagement and motivation.
-
An explanation of Worldcoin
The Worldcoin cryptocurrency uses iris scans to create unique digital identities.
-
An explanation of rich communication services
In this video, TechTarget editor Tommy Everson talks about rich communication services.
-
AI lawsuits explained: Who's getting sued?
Authors, artists and others are filing lawsuits against generative AI companies for using their data in bulk to train AI systems without permission.
-
An explanation of vector search
Vector search is a multidimensional tool that represents words, sentences, images and audio as numbers across multiple dimensions.
-
An explanation of ICT
ICT is an umbrella term for all digital interaction technologies that, when combined, help people and organizations interact in the digital world.
-
History and evolution of machine learning: A timeline
Machine learning's legacy dates from the early beginnings of neural networks to recent advancements in generative AI that democratize new and controversial ways to create content.
-
Broadband infrastructure program explained: The details
With the $42.45 billion BEAD Program, each state will use allocated funds to connect all households to high-speed internet.
-
Hacking vs. spoofing: What's the difference?
While email, text and phone enable instant communication in a technology-driven world, they also expose individuals and companies to cyberattacks such as hacking and spoofing.
-
scope creep
Scope creep in project management is the gradual expansion of functions or adding features, functions or other deliverables beyond a project's original parameters.
-
The history of telephones explained
The telephone, once a marvel for the rich, became a household necessity. Now, mobile phones and web calls have relegated landlines to near-forgotten relics.
-
Anonymous browsing explained: What you need to know
Anonymous browsing, also known as private browsing or incognito mode, enables users to browse the internet without leaving a trail of online activities. Is it really anonymous?
-
data de-identification
Data de-identification is decoupling or masking data, to prevent certain data elements from being associated with the individual.
-
Why healthcare data is often the target of ransomware attacks
The healthcare industry relies heavily on IT systems. Sensitive patient data is valuable to hackers, leading to ransomware attacks that disrupt operations and endanger lives.
-
Gemma
Gemma is a collection of lightweight open source generative AI models designed mainly for developers and researchers.
-
overfitting in machine learning
Overfitting in machine learning occurs when a model excessively fits the training data, capturing both relevant patterns and inconsequential noise, resulting in inaccurate predictions of new data.
-
An 11-step patch management process to ensure success
Following these steps will make patch management more reliable and less stressful and keep your software updated, largely bug-free and secure from cyberthreats.
-
SD-WAN security
SD-WAN security refers to the practices, protocols and technologies protecting data and resources transmitted across software-defined wide area network infrastructure.
-
TikTok bans explained: Everything you need to know
The United States government takes aim at the viral video sharing application TikTok.
-
Tracking pixel vs. cookie: What's the difference?
While tracking pixels and cookies accomplish similar tasks, they work in different ways. Here's how.
-
data protection authorities
Data protection authorities (DPAs) are public authorities responsible for enforcing data protection laws and regulations within a specific jurisdiction.
-
data anonymization
Data anonymization describes various techniques to remove or block data containing personally identifiable information (PII).
-
What are large language models (LLMs)?
A large language model (LLM) is a type of artificial intelligence (AI) algorithm that uses deep learning techniques and massively large data sets to understand, summarize, generate and predict new content.
-
Binance money laundering scandal explained: What to know
CEO Changpeng Zhao wanted Binance to be the world's largest cryptocurrency exchange; however, the U.S. filed criminal charges due to lax compliance and money laundering schemes.
-
FCC broadband labels explained: Everything you need to know
Similar to how a nutrition label details food content, the FCC now mandates labels for internet providers to clarify service details for consumers to improve transparency.
-
Bitcoin halving explained: Everything you need to know
Since its 2009 inception, bitcoin surged from $0 to a peak of $69,000 in Nov. 2021. To control supply, a halving event happens to limit mining rewards and slow bitcoin creation.
-
6 common social media privacy issues
Social media usage continues to grow as people share posts, videos and photos. However, there are data privacy issues and risks with sharing on social media.
-
Apple lawsuit history explained
In March 2024, the DOJ filed a lawsuit against Apple, alleging its smartphone market monopoly. However, this isn't the first time Apple has seen legal action.
-
The evolution of television technology explained
Television's impact on global entertainment is profound and evolving with key milestones and advancements that shape its pivotal role in daily life.
-
Mixture-of-experts models explained: What you need to know
By combining specialized models to handle complex tasks, mixture-of-experts architectures can improve efficiency and accuracy for large language models and other AI systems.
-
Digital nomad visas: 28 destinations offering them
Digital nomad visas are becoming increasingly popular, as more and more people choose to work remotely.
-
35 cybersecurity statistics to lose sleep over in 2024
Here are 35 eye-opening cybersecurity stats from dozens of security experts -- on crime, jobs and trends -- to consider while developing your 2024 security plan.
-
Breaking down the cost of cloud computing in 2024
Cloud computing offers several financial pros and cons. Each major provider also has a unique payment structure determined by several different factors.
-
The Great Retirement Boom explained: What you need to know
Baby boomers are retiring en masse, leaving a labor shortage in the workforce and creating economic shifts. Here's what it means for businesses.
-
Cryptocurrency exchange-traded funds explained
Cryptocurrency evolved from a fiat alternative to speculative investment after the SEC's approval of spot Bitcoin ETFs. Discover ETF types, pros, cons and investor alternatives.
-
Silicon Valley Bank collapse explained: What you need to know
Not all banks cater to startup companies. Silicon Valley Bank specialized in the tech startup industry but was not prepared for a bank run as companies started burning more cash.
-
Starlab space station
Starlab is a commercial space station set to be deployed in low Earth orbit (LEO) by 2030.
-
model-based systems engineering (MBSE)
Model-based systems engineering (MBSE) uses models to share information across collaborators in the design, development, test and operation of complex systems.
-
AI washing explained: Everything you need to know
With hype comes the hucksters. Learn how companies exaggerate the involvement of AI in their products and services, and how to avoid falling for AI washing.
-
A who's who of cybercrime investigators
Cybercrime investigations are more than just first response. Learn about the patchwork of organizations that work together to combat international cybercrime.
-
20 free cybersecurity tools you should know about
Cybersecurity products can get pricy but there are many excellent open source tools to help secure your systems and data. Here's a list of some of the most popular with cyber pros.
-
Video guide to generative AI
Generative AI has the potential to revolutionize technology. Learn about popular interfaces such as ChatGPT, the future of generative AI and its effects on businesses.
-
Gaussian splatting
Gaussian splatting renders extremely high-quality images -- using numerous scans of an object -- that can then be viewed from any angle and explored in real time.
-
Types of bytes: Units of memory explained
Memory is built with basic units called bits and bytes. Understanding them unlocks efficient storage and helps master the digital landscape.
-
Vodcasting: Everything you need to know
Vodcasting, the rising star of video content, offers immersive content by blending audio and video for deeper engagement, community building and growth.
-
The history of USB: What you need to know
USB, developed in 1995, evolved from USB 1.0 to USB4 by 2019, introducing faster speeds, smaller connectors and USB-C standardization. Learn the history of this industry standard.
-
Meta Threads explained: Everything you need to know
Meta Threads had record user sign-ups in its first week but needs to sustain engagement to challenge Twitter.
-
2023 year in review: Top tech business topics
2023 brought major tech innovations and controversies, proving that balancing innovation, ethics and regulation is crucial for a positive tech future.
-
What does the 'G' in ESG mean?
ESG is a framework for evaluating a company's commitment to sustainability. Learn how the 'G' -- governance -- helps companies operationalize the other two components.
-
Embedded finance explained: Everything you need to know
When someone uses an app to request a ride, purchase from TikTok or order food, they are engaging in embedded finance. These options are growing and reshaping financial services.
-
Explaining labor shortages and how to overcome them
A labor shortage occurs when demand for workers exceeds supply, often leading to unfilled jobs, delayed services and potentially higher wages.
-
SolarWinds hack explained: Everything you need to know
Hackers targeted SolarWinds by deploying malicious code into its Orion IT monitoring and management software used by thousands of enterprises and government agencies worldwide.
-
prompt engineering
Prompt engineering is an AI engineering technique encompassing the process of refining LLMs with specific prompts and recommended outputs, as well as the process of refining input to various generative AI services to generate text or images.
-
10 cybersecurity experts to follow on social media
Cybersecurity experts provide valuable insights into the security landscape. Follow this curated list of recognized authorities to stay informed and safeguard your digital assets.
-
10 STEM TikTokers to follow in 2023
Short-form video content is a great way to discover new science and technical topics. Check out these STEM influencers on TikTok.
-
Bossware explained: Everything employees should know
There isn't a productivity-related metric that bossware doesn't track, so companies need clear goals for employee monitoring to cut through the noise.
-
Elon Musk businesses at a glance
Elon Musk is an entrepreneur with his hands and investments in several businesses. He has helped shape several industries including AI and space travel with his leadership.
-
How to invest in ESG: Ethical investing explained
ESG and ethical investing are not new terms but have become more popular as climate change and new emissions data disclosure laws loom for American companies.
-
The history of emoji
Emoji have a colorful history. Learn how they evolved from simple emoticons in the 1980s to becoming Oxford Dictionaries' Word of the Year in 2015.
-
How to scrape data from a website
Web scraping is about combing through data at scale. AI developers do it, search engines do it and you can too with a few lines of Python.
-
Jetsons technology that became mainstream
'The Jetsons' -- among other TV shows -- predicted video calls, smartwatches and chatbots would become part of everyday life.
-
Link rot explained: Everything you need to know
Link rot, the deterioration of hyperlinks over time, leads to broken links on the internet, data loss and other issues. Prevent and fix link rot with proper mitigation techniques.
-
support vector machine (SVM)
A support vector machine (SVM) is a type of supervised learning algorithm used in machine learning to solve classification and regression tasks.
-
Digital dexterity explained: Everything you need to know
Help employees face their fear of change in the digital world. Digital dexterity can improve employee engagement and efficiency -- all while creating a better business outcome.
-
Urban doom loop explained: What it means for businesses
Offices are exceedingly vacant across major cities, and some experts worry it's indicative of an urban doom loop.
-
Explaining risk maturity models and how they work
Explore risk maturity models and assessment tools for enhancing enterprise risk management. Improve ERM programs to mitigate risk and gain a competitive edge.
-
IoT basics and fundamentals: A guide for beginners
Explore the benefits and challenges of IoT, as well as its consumer, business and industrial applications. Learn how it works, related concepts, history and more in this primer.