Tech explainers
Read in-depth guides to the most important technologies affecting organizations and individuals.
-
The history of USB: What you need to know
USB, developed in 1995, evolved from USB 1.0 to USB4 by 2019, introducing faster speeds, smaller connectors and USB-C standardization. Learn the history of this industry standard.
-
Meta Threads explained: Everything you need to know
Meta Threads had record user sign-ups in its first week but needs to sustain engagement to challenge Twitter.
-
2023 year in review: Top tech business topics
2023 brought major tech innovations and controversies, proving that balancing innovation, ethics and regulation is crucial for a positive tech future.
-
Binance money laundering scandal explained: What to know
CEO Changpeng Zhao wanted Binance to be the world's largest cryptocurrency exchange; however, the U.S. filed criminal charges due to lax compliance and money laundering schemes.
-
What does the 'G' in ESG mean?
ESG is a framework for evaluating a company's commitment to sustainability. Learn how the 'G' -- governance -- helps companies operationalize the other two components.
-
TikTok bans explained: Everything you need to know
The United States wants to ban the viral video sharing application TikTok.
-
How do cybercriminals steal credit card information?
Cybercriminals have various methods at their disposal to hack and exploit credit card information. Learn what they are, how to prevent them and what to do when hacked.
-
Embedded finance explained: Everything you need to know
When someone uses an app to request a ride, purchase from TikTok or order food, they are engaging in embedded finance. These options are growing and reshaping financial services.
-
Explaining labor shortages and how to overcome them
A labor shortage occurs when demand for workers exceeds supply, often leading to unfilled jobs, delayed services and potentially higher wages.
-
FTX scam explained: Everything you need to know
Cryptocurrency values rose in 2021 but started to decline in 2022, causing some exchange platforms to fold. FTX appeared to stay strong -- until news broke of an elaborate scam.
-
SolarWinds hack explained: Everything you need to know
Hackers targeted SolarWinds by deploying malicious code into its Orion IT monitoring and management software used by thousands of enterprises and government agencies worldwide.
-
10 ways to spot disinformation on social media
Social media disinformation is meant to be deceptive and can spread quickly. Here are some ways to spot it.
-
prompt engineering
Prompt engineering is an AI engineering technique encompassing the process of refining LLMs with specific prompts and recommended outputs, as well as the process of refining input to various generative AI services to generate text or images.
-
10 cybersecurity experts to follow on social media
Cybersecurity experts provide valuable insights into the security landscape. Follow this curated list of recognized authorities to stay informed and safeguard your digital assets.
-
10 STEM TikTokers to follow in 2023
Short-form video content is a great way to discover new science and technical topics. Check out these STEM influencers on TikTok.
-
Digital nomad visas: 28 destinations offering them
Digital nomad visas are becoming increasingly popular, as more and more people choose to work remotely.
-
Bossware explained: Everything employees should know
There isn't a productivity-related metric that bossware doesn't track, so companies need clear goals for employee monitoring to cut through the noise.
-
History and evolution of machine learning: A timeline
Machine learning's legacy dates from the early beginnings of neural networks to recent advancements in generative AI that democratize new and controversial ways to create content.
-
Pros and cons of AI-generated content
Artificial intelligence is growing rapidly in the tech sector and assisting with various tasks such as creating images and generating content. However, it cannot do everything.
-
Elon Musk businesses at a glance
Elon Musk is an entrepreneur with his hands and investments in several businesses. He has helped shape several industries including AI and space travel with his leadership.
-
How to invest in ESG: Ethical investing explained
ESG and ethical investing are not new terms but have become more popular as climate change and new emissions data disclosure laws loom for American companies.
-
Conversational AI vs. generative AI: What's the difference?
As AI continues to evolve, understanding the differences and collaborative potential of conversational AI and generative AI is vital to their role in shaping the digital landscape.
-
large language models (LLMs)
A large language model (LLM) is a type of artificial intelligence (AI) algorithm that uses deep learning techniques and massively large data sets to understand, summarize, generate and predict new content.
-
The history of emoji
Emoji have a colorful history. Learn how they evolved from simple emoticons in the 1980s to becoming Oxford Dictionaries' Word of the Year in 2015.
-
How to scrape data from a website
Web scraping is about combing through data at scale. AI developers do it, search engines do it and you can too with a few lines of Python.
-
Jetsons technology that became mainstream
'The Jetsons' -- among other TV shows -- predicted video calls, smartwatches and chatbots would become part of everyday life.
-
Link rot explained: Everything you need to know
Link rot, the deterioration of hyperlinks over time, leads to broken links on the internet, data loss and other issues. Prevent and fix link rot with proper mitigation techniques.
-
AI lawsuits explained: Who's getting sued?
Authors, artists and others are filing lawsuits against generative AI companies for using their data in bulk to train AI systems without permission.
-
support vector machine (SVM)
A support vector machine (SVM) is a type of supervised learning algorithm used in machine learning to solve classification and regression tasks.
-
Digital dexterity explained: Everything you need to know
Help employees face their fear of change in the digital world. Digital dexterity can improve employee engagement and efficiency -- all while creating a better business outcome.
-
Urban doom loop explained: What it means for businesses
Offices are exceedingly vacant across major cities, and some experts worry it's indicative of an urban doom loop.
-
Explaining risk maturity models and how they work
Explore risk maturity models and assessment tools for enhancing enterprise risk management. Improve ERM programs to mitigate risk and gain a competitive edge.
-
IoT basics and fundamentals: A guide for beginners
Explore the benefits and challenges of IoT, as well as its consumer, business and industrial applications. Learn how it works, related concepts, history and more in this primer.
-
Broadband infrastructure program explained: The details
With the $42.45 billion BEAD Program, each state will use allocated funds to connect all households to high-speed internet.
-
Reddit pricing: API charge explained
Providing a free API was becoming costly for Reddit. Enterprise-scale developers now have to pay for access to Reddit's data.
-
The history and evolution of social media explained
From the early days of AOL and MySpace to today's giants YouTube, Facebook and TikTok, social media has evolved into a critical part of modern culture worldwide.
-
Model collapse explained: How synthetic training data breaks AI
Without human-generated training data, AI systems malfunction. This could be a problem if the internet becomes flooded with AI-generated content.
-
Paid verification explained: Everything you need to know
Meta and Twitter offer users the option to pay for a verified badge. This has sparked debates about fairness and the potential for increased fake accounts.
-
Protestware explained: Everything you need to know
Developers use protestware technology to drive points home; some arrives as messages of defiance, others with malicious intent.
-
Bleisure travel explained: Everything you need to know
Popular bleisure travel destinations include San Francisco, Tokyo and Melbourne.
-
Proximity bias explained: Everything you need to know
Proximity bias is an emerging type of cognitive bias that threatens remote workers. Learn how to mitigate this mindset based on outmoded standards.
-
Silicon Valley Bank collapse explained: What you need to know
Not all banks cater to startup companies. Silicon Valley Bank specialized in the tech startup industry but was not prepared for a bank run as companies started burning more cash.
-
11 TikTok alternatives to check out in 2023
TikTok wasn't the first of its kind, and it won't be the last. Check out these alternatives.
-
20 social media terms to know
Social media marketing can be an easy way to reach consumers and build brand awareness. Check out this glossary to understand popular social media terms.
-
Techno-nationalism explained: What you need to know
Techno-nationalism changes the way providers do business and the way users interact with tech.
-
Pig butchering scam explained: Everything you need to know
People wanting to make money on the cryptocurrency market are becoming targets for scammers. Scammers are even looking for their next victim through dating and social media apps.
-
Rolling recession explained: Everything you need to know
Talks of a looming recession and tech layoffs dominated the news in 2022 and 2023, but job and spending reports have outpaced predictions. Enter the term 'rolling recession.'
-
Cryptocurrency and taxes explained: What you need to know
Cryptocurrency is not treated the same as other currency when it comes to taxes. Since the government classifies cryptocurrency as an asset, there are some important guidelines.
-
6 common social media privacy issues
Social media usage continues to grow as people share posts, videos and photos. However, there are data privacy issues and risks with sharing on social media.
-
34 cybersecurity statistics to lose sleep over in 2023
Here are 34 eye-opening cybersecurity stats from dozens of security experts -- on crime, jobs and trends -- to chew on while developing your 2023 security plan.
-
How AI and marketing will influence our future
AI changes marketing strategies by using predictive analytics and automating some time-consuming tasks to increase efficiency; however, there are considerations as you adopt AI.
-
How is cryptocurrency valued?
Because cryptocurrency is not regulated, several factors affect its value, including demand, utility, competition and mining.
-
Digilantism explained: Everything you need to know
With the rise of digital communications, some people turn to digilantism for justice and support. Here is how digilantism is used to gain advocacy for various causes.
-
2022 year in review: Top business topics
The business world saw changes in 2022. Themes -- such as the rise and fall of cryptocurrency, changes to social media and navigating employment -- are all included in this review.
-
5 workplace ergonomic tools to improve employee experience
Ergonomic technology offers employees a better and more comfortable working environment. These workplace ergonomics can improve employee experience and increase productivity.
-
7 reasons why websites crash
There are several reasons a website can crash, including broken code, malicious attacks and hosting errors. Another big reason websites can go down is massive traffic.
-
The history of cloud computing explained
Cloud computing has evolved significantly from its origins to become an essential service that many modern organizations rely on today.
-
The history and evolution of zero-trust security
Before zero-trust security, enterprise insiders were trusted and outsiders weren't. Learn about the history of zero trust and the public and private sector efforts to adopt it.
-
9 dos and don'ts for training a chatbot
Chatbots can improve the user experience by helping customers with simple requests. But, without proper training, chatbots can frustrate the user and leave a bad impression.
-
A quick explanation of the splinternet
A fragmented internet can create disinformation -- and a misinformed population -- as content is filtered and censored.
-
20 free cybersecurity tools you should know about
Cybersecurity products can get pricy but there are many excellent open source tools to help secure your systems and data. Here's a list of some of the most popular with cyber pros.
-
FinOps vs. DevOps: What's the difference?
While they might seem inherently different, both FinOps and DevOps encourage practices to improve business efficiency and success. Review the concepts and how they compare.
-
Passkey vs. password: What is the difference?
Companies are turning to passkeys as a secure login for consumers. Passkeys make it more difficult for thieves to steal information, and they are also more convenient for users.
-
The future of the food industry: Food tech explained
Food tech shows how technology can improve the way the world grows, produces, distributes and supplies food by using technology such as AI and automation.
-
NFT wash trading explained
NFT popularity grew with the rise of cryptocurrency. But scams -- such as wash trading -- also increased, presenting new problems for businesses and consumers.
-
8 top digital wallet companies
Digital wallets offer more security and convenience to consumers, with the flexibility to pay from mobile devices.
-
What is the difference between marketing and advertising?
Advertising is a subset of marketing. Learn more about this and the function of each.
-
The splinternet explained: Everything you need to know
As more countries start filtering content, the splinternet continues to grow. The splinternet can lead to disinformation, global separation and government control.
-
8 ways to avoid NFT scams
People and businesses are turning to NFTs to make money, trade collectibles and use as promotions. But scams are also trying to trick people and businesses out of money.
-
5 reasons software updates are important
When it's time to update your software programs, don't delay. Updates can prevent security issues and improve compatibility and program features.
-
Top 10 spyware threats
The top 10 spyware list describes the 10 common spyware threats behind famous spyware attacks and is frequently identified by Webroot's Spy Audit, a free spyware scanner tool.
-
Colonial Pipeline hack explained: Everything you need to know
A ransomware attack brought a major gas pipeline to a standstill in May. Here's what happened and who was behind the hack.
-
5 cybersecurity myths and how to address them
These myths persist due to misinformation and a lack of cybersecurity awareness.
-
6 potential enterprise security risks with NFC technology
Some NFC risks include payment processing fraud, eavesdropping and replay attacks.
-
Log4j explained: Everything you need to know
Log4j, which is embedded in popular services and frameworks, became a headache for many businesses by the end of 2021. Businesses affected include Apple, Microsoft and VMware.
-
Everything you need to know about ProxyShell vulnerabilities
Organizations need to patch their Exchange Servers to protect against the ProxyShell exploit. Learn how to do that and more here.
-
SaaS vs. IaaS vs. PaaS: Differences, Pros, Cons and Examples
Learn about how each of the three major cloud service models differ from one another, their pros and cons, and how to pick the best option for your organization.
-
Data governance vs. information governance: What's the difference?
Data governance and information governance provide specific benefits for organizations looking to improve how they handle data.
-
ProxyShell vs. ProxyLogon: What's the difference?
ProxyShell and ProxyLogon both affect Microsoft Exchange Servers, but they work in different ways.
-
How to back up your data and keep your files safe
It's important to know what data you should back up, how often you should do it, where you should store the backed-up data and how to get it there. Here are the three basic backup methods to consider.
-
Windows 11 explained: Everything you need to know
Windows 11 becomes available Oct. 5, but Windows 10 will be supported through October 2025. Here's what you need to know about the newest OS.
-
How to analyze data in 7 steps for better business decisions
There's no such thing as too much data. Learn how to analyze that data for insights that can give your business a boost.
-
The history and evolution of video conferencing
Video conferencing has a history dating back to the 1800s, but two-way video didn't emerge until the 1930s.
-
SQL vs. NoSQL vs. NewSQL: How do they compare?
Choosing which database management system depends on an organization's needs. Review the differences among SQL, NoSQL and NewSQL and how to select the right database system.
-
Recent surge in ransomware attacks threatens national security
Some recent ransomware attacks that have disrupted service include Colonial Pipeline, JBS Foods and Quanta.
-
A brief history of the evolution and growth of IT
The history of information technology began long before the modern-day computer was ever invented.
-
A history and timeline of big data
Milestones that led to today's big data revolution -- from 1600s' statistical analysis to the first programmable computer in the 40s to the internet, Hadoop, IoT, AI and more.
-
How to build a honeypot to increase network security
Create a honeypot that will trap attackers and monitor their activities to enhance your organization's network security. This step-by-step guide takes you through the process.
-
Microsoft Teams 101: A how-to guide for beginners
Are you just beginning to learn how to use Microsoft Teams? Here is a quick-start guide to help you navigate some common trouble spots with this collaboration tool.
-
Top 25 big data glossary terms you should know
Big data knowledge and awareness can help businesses and individuals get ahead. Understanding the most important terms in big data is an excellent place to start that journey.
-
How to successfully build an app without code
No-code methodologies, development tools and tips to expedite the delivery of mobile, web and cloud apps for a wide range of businesses in the time of the citizen developer.
-
CLI commands every IT pro should know
This excerpt from 'CompTIA A+ Certification All-in-One Exam Guide, Tenth Edition,' published by McGraw-Hill Education, provides an introduction into common command-line prompts for Windows, Linux and macOS.
-
CompTIA troubleshooting steps and solving common computer problems
This excerpt from 'ITF+ CompTIA IT Fundamentals All-in-One Exam Guide, Second Edition,' published by McGraw-Hill Education, provides a practical framework to follow when troubleshooting is necessary.
-
7 Reasons Identity and Access Management Is Important
Identity and access management tools and processes can provide organizations with numerous benefits: such as better data security, regulatory compliance and resource access.
-
Data Storage Options for Your Business
Deciding what type of data storage is right for your business can be a daunting task. Get a breakdown of options based on your organization's needs.
-
10 Tips to Keep Personal Data Safe and Secure
It's impossible to ignore the importance of security when dealing with personal information. Follow these tips to help keep your data safe and secure.
-
8 Business Intelligence Trends to Prepare for 2021
New BI trends are helping businesses analyze and use their data in innovative ways with technologies such as data visualization, augmented analytics and robotic process automation.
-
2 Free Server and Hardware Inventory Templates
It's important to keep an up-to-date inventory of your servers, the devices they serve and the software apps they use. In many organizations, this inventory is automated by server inventory tools. Even so, inventories updated manually force administrators to audit their servers in more detail.
-
How to assess and prioritize insider threat risk
Dealing with the human element in security is tough, but critical. This primer describes the types of insider threats and how to use a risk matrix to assess and rank them by importance.
-
7 Supply Chain Management Trends to Watch In 2020
The role of technology in supply chain management (SCM) is changing. The internet of things (IoT), artificial intelligence (AI), and machine learning, cloud technology and blockchain technologies are all affecting the ways organizations manage their supply chains.