Videos
-
An explanation of SAP ERP
SAP is an ERP software provider, unifying business areas, such as finance, accounting and HR, into one system.
-
Hardware vs. software explained
If you can touch it, it's hardware. If it's an application you can't touch, it's software.
-
An explanation of cybercrime
Cybercrime is a real and illegal threat, just like traditional crime. Learn about cybercriminals and effective prevention strategies to safeguard yourself online.
-
Data engineers, data scientists and data analysts explained
Understanding the differences in the roles of data scientists, analysts and engineers can boost productivity and efficiency in a business.
-
An explanation of neural networks
Neural networks are a type of deep learning in AI. They power applications such as chatbots, speech-to-text, weather forecasting and stock predictions.
-
An explanation of ethical hackers
Ethical hackers protect businesses by identifying vulnerabilities. They use the same techniques as malicious hackers, but for the greater good.
-
An explanation of ransomware
Ransomware encrypts data and demands payment for release. Protect yourself by backing up data, updating software and avoiding suspicious links.
-
An explanation of software as a service (SaaS)
Software as a service can be a cost savings to organizations, as it eliminates licensing fees, expensive hardware and maintenance.
-
An explanation of RFID
RFID -- often an alternative to barcode systems -- uses electromagnetic frequencies to uniquely identify a person, object or animal.
-
An explanation of customer relationship management (CRM)
CRM software enhances customer relationships and drives sales growth by consolidating customer data into a single database, enabling effective marketing and improved service.
-
An explanation of Apple Intelligence
Core features of Apple's generative AI tool include natural language understanding, custom image generation and automatic transcription.
-
An explanation of configuration management
Configuration management has four key benefits -- compliance, consistency, service delivery and security.
-
Fibonacci sequence use cases in technology
The Fibonacci sequence has key applications in code testing, cryptography and quantum computing.
-
An explanation of cybersecurity
Cybersecurity protects internet-connected systems from attacks, covering hardware, software and data.
-
An explanation of subnets
Subnets make networking manageable and ensure efficient communication. Without subnetting, sending emails, texts and documents would be significantly slower.
-
MAC address vs. IP address explained
MAC and IP addresses serve different roles in data transmission, differing in location, format and use.
-
An explanation of fishbone diagrams
Fishbone diagrams assist in root cause analysis to identify the core issue of a problem.
-
An explanation of Industry 4.0 use cases
Industry 4.0 can be used across a number of industries, including retail, food service and cybersecurity.
-
An introduction to Industry 4.0
Here are the basics of Industry 4.0 -- the fourth industrial revolution -- featuring AI, IoT and cloud technologies.
-
Explaining third-party cookies vs. tracking pixels
Websites personalize content using third-party cookies and tracking pixels but do so in different ways.
-
An explanation of centralized vs. decentralized finance
DeFi and CeFi manage cryptocurrency transactions in different ways. Here's how.
-
An explanation of private 5G vs. Wi-Fi
Private 5G improves upon traditional cellular networks by catering to private networks, expanding accessibility beyond major carriers.
-
An explanation of serverless computing
Serverless computing simplifies app development by eliminating server management, streamlining coding for cloud platforms.
-
Causes of IT outages explained
IT outages can be caused by utility disruptions, hardware faults, configuration errors and software faults.
-
An explanation of private cloud
Private clouds cater to a single organization, offering enhanced security and compliance, unlike multi-tenant public clouds.
-
Benefits and methods of load balancing
Load balancing ensures smooth network performance by distributing traffic equitably, enhancing scalability and adapting to dynamic IT landscapes.
-
An explanation of generative design
Generative design transforms the creation process across many fields and excels in generating unbiased, efficient designs.
-
An explanation of large language models
Large language models can be traced back to 1966 but are significantly more sophisticated today.
-
An explanation of prompt engineering
Prompt engineering is responsible for training AI language models to ensure accurate outputs in AI chatbots.
-
An explanation of green-collar jobs
Green-collar jobs merge environmental sustainability with diverse skills from white- and blue-collar sectors.
-
An explanation of romance scams (pig butchering)
Pig butchering is a scam that exploits virtual relationships to deceive and steal money.
-
An explanation of collaborative robots
Cobots are robotic arms equipped with sensors for manufacturing and assembly tasks. They also detect human presence for productivity enhancement.
-
An explanation of the CrowdStrike outage
A botched CrowdStrike update triggered a massive outage, affecting airlines, healthcare, banking and transit.
-
An explanation of Flipper Zero
Flipper Zero is both a tool for pen testers and a learning device for new hackers.
-
An explanation of inception scores
Inception scores are a mathematical algorithm that measures the quality of AI-generated images.
-
WPA2 vs. WPA3
Wireless security has evolved from WEP to WPA protocols and play a pivotal role in safeguarding against cyberattacks.
-
An explanation of super apps
Super apps consolidate banking, shopping, transportation, email and food delivery into a single, versatile application.
-
An explanation of bots
Bots are automated programs with varied roles. They can be both helpful and malicious.
-
An explanation of data architects vs. data engineers
Data architects and data engineers are both necessary for effective data management teams.
-
An explanation of advanced vs. predictive analytics
Predictive analytics is a type of advanced analytics. Learn more in this video.
-
An explanation of the different types of AI
There are four main categories of AI -- reactive, limited memory, theory of mind and self-aware.
-
An explanation of GPT-4o
GPT-4o is a multimodal large language model developed by OpenAI.
-
An explanation of CIA triad
In information security CIA stands for confidentiality, integrity and availability.
-
Data protection vs. data privacy vs. data security explained
Data protection, privacy and security all play critical roles in effective data management.
-
An explanation of Trojan horse
Trojan horses are a type of malware that can take control of your computer and even access your camera.
-
An explanation of AI buzzwords
Here are some simple explanations of common AI buzzwords.
-
An explanation of AI model collapse
Generative AI creates content quickly and accurately but faces the risk of model collapse.
-
An explanation of foundation models
The core of every generative AI chatbot -- such as ChatGPT, Bard and YouChat -- is the foundation model.
-
An explanation of Hugging Face
Hugging Face is a machine learning platform that provides the means to run and deploy AI in live applications.
-
The importance of compliance officers
Compliance officers ensure a company follows both its internal rules as well as external laws from the government.
-
Differences between conversational AI and generative AI
While both AI types often work together, conversational AI enables natural interaction with machines, while generative AI creates new content such as text and images.
-
An explanation of CLI, GUI and NUI
A natural user interface uses human gestures, spoken words or biometrics for interaction, reducing reliance on typing and programming. This video will compare NUIs to CLI and GUI.
-
An explanation of gamification
Gamification integrates video game elements into nongame contexts such as business operations. It uses points, badges, levels and rewards to enhance engagement and motivation.
-
An explanation of Worldcoin
The Worldcoin cryptocurrency uses iris scans to create unique digital identities.
-
An explanation of masked language models
In this video, TechTarget editor Jen English talks about masked language models.
-
An explanation of rich communication services
In this video, TechTarget editor Tommy Everson talks about rich communication services.
-
An explanation of vector search
Vector search is a multidimensional tool that represents words, sentences, images and audio as numbers across multiple dimensions.
-
An explanation of ICT
ICT is an umbrella term for all digital interaction technologies that, when combined, help people and organizations interact in the digital world.
-
An introduction to AI
AI uses human intelligence to learn, reason, self-correlate and practice creativity.
-
Benefits of dark web monitoring
Dark web monitoring helps organizations stay ahead of cybersecurity threats by detecting proprietary data breaches, securing accounts and ensuring compliance.
-
An explanation of IoT
Every device connected to the internet has set systems to collect, send and act on data.
-
An explanation of TCP/IP
These fundamental protocols make transferring data easier by focusing on both communication and transportation through different mediums.
-
The importance of Scrum masters
Learn about guiding questions and leadership skills to strive for success in a project management company in this video.
-
An explanation of business intelligence
Business intelligence is a technology-driven process that helps both managers and analysts track information and make effective decisions.
-
An explanation of causal AI
The advancement of modern AI has transformed computer system intelligence to correctly identify the cause and effect in data.
-
A quick explanation of the splinternet
A fragmented internet can create disinformation -- and a misinformed population -- as content is filtered and censored.
Podcasts
-
8 steps to build a successful AI strategy for your business
-
Reshaping UX with behavioral data and AI
-
Overcoming employee burnout: Leadership in the digital age
-
Transforming healthcare with artificial intelligence
-
Impact data powers sustainability strategies for digital age
-
Tackling business problems with data science