Tech explainers - Resource from WhatIs.com (original) (raw)
The Trump Administration's tariffs levy a minimum 10% tax on global imports, heavily affecting tech industry supply chains.
TikTok wasn't the first of its kind, and it won't be the last. Check out these alternatives if you're looking for a new platform with similar features.
AI orchestration manages how models, data, and tools work together, using integration, automation and oversight to support complex systems.
Amazon is expanding its horizons as Project Kuiper launched low earth satellites in April 2025. The goal is to bring connectivity to all areas, which is also Starlink's mission.
Tech companies are pledging to increase U.S. manufacturing by building new or expanding existing facilities as well as investing in research and development.
Today's mobile workforce puts company data at risk. Endpoint data loss prevention secures sensitive info at the source, reducing breaches, costs, and compliance risks.
Intel's dramatic decline highlights its struggle to compete in a rapidly evolving tech landscape, as its market value lags giants such as Nvidia and AMD.
Quantum key distribution uses physics to create secure encryption keys that detect eavesdropping instantly, offering a quantum-safe solution for future cybersecurity challenges.
Nvidia's market value surpassed $4 trillion in 2025, fueled by surging AI demand, GPU dominance and rapid data center growth.
Quantum computers threaten to break today's encryption protocols. Post-quantum cryptography aims to develop new algorithms resistant to quantum attacks before it's too late.
Released on Aug. 7, 2025, OpenAI's GPT-5 builds upon predecessor models by integrating advanced reasoning capabilities, enhanced safety and multimodal processing.
Google Gemini 2.5 Deep Think uses parallel reasoning to solve complex problems, processing 1 million input tokens with 192K output capacity.
Google AI Edge Gallery lets users run GenAI models locally on Android devices. It supports Gemma models and integrates with Hugging Face.
Created by Twitter founder Jack Dorsey, Bitchat Mesh is a Bluetooth-based messaging app that works without internet, allowing nearby users to communicate when other networks fail.
As AI transforms search, brands must master both GEO and SEO to maintain visibility across evolving digital landscapes.
Quantum cryptography uses photons to transmit keys securely through quantum properties, creating an unhackable system that outperforms traditional math-based encryption methods.
Mobile device encryption transforms business data into unreadable code, protecting sensitive information from unauthorized access —a critical security practice for modern enterprises.
Co-led by OpenAI and Softbank, Stargate AI aims to invest $500 billion in new AI data centers and infrastructure to help U.S.-based AI innovation, but it has raised concerns.
Generative AI creates content from training data, while regenerative AI focuses on self-repair and autonomous optimization.
Encryption converts data into code that is only decipherable with the right key. This can be used to protect sensitive information in messages, payments and records.
Purple teaming unites offensive red teams and defensive blue teams to share knowledge, find vulnerabilities and strengthen security through structured frameworks and playbooks.
Telecommunications is the electronic exchange of information across distances -- encompassing voice, data and video transmission -- to form global communication networks.
The GENIUS Act creates a regulatory framework for stablecoins in the U.S., requiring issuers to meet strict standards while balancing innovation with oversight.
Risk management transforms uncertainty into opportunity by identifying threats, evaluating impacts and implementing strategic controls to protect and enhance business value.
Quantum particles have unique behaviors that enable engineers to perform more complex calculations, which could have a significant effect across industries and operations.
OpenAI's ChatGPT agent combines browsing, code execution and API access to autonomously complete complex tasks.
Firewalls protect networks by stopping malware at the perimeter. The various types can be deployed with other security measures but can also be used unethically to prohibit access.
Mesh Wi-Fi networks connect multiple nodes to transmit data without a central router, offering broader coverage and self-healing capabilities, despite higher costs.
Data breaches can be intentional or accidental and come in various forms, but all types have the potential to cause considerable harm to individuals and organizations.
The internet of things, or IoT, is a network of interrelated devices that connect and exchange data with other IoT devices and the cloud.
Local area networks are interconnected systems that share resources within a limited geographic area. They can be wired, wireless or virtual, depending on workplace needs.
Latency measures data transmission delays between points. Causes include physical distance and hardware issues, while solutions might involve hardware upgrades or edge computing.
Cryptocurrency evolved from a fiat alternative to speculative investment after the SEC's approval of spot Bitcoin ETFs. Discover ETF types, pros, cons and investor alternatives.
Identity and access management systems safeguard businesses by controlling digital identities, managing access rights and implementing security protocols.
A U.S. judge ruled Google violated antitrust laws with an illegal monopoly over online searches -- a landmark decision with major implications for Big Tech and consumer choices.
IoT devices collect real-world data, while digital twins create virtual models using that data—together, they provide detailed insights to improve operations and predict issues.
Authors, artists and others are filing lawsuits against generative AI companies for using their data in bulk to train AI systems without permission.
Help desks deliver tactical, immediate technical support for specific issues, while service desks offer strategic, comprehensive management of business services.
IoT data collection enables organizations to constantly gather and analyze physical measurements, location data and operational metrics with internet-connected sensors and devices.
The blue screen of death (BSOD) -- also known as a stop error screen, blue screen error, fatal error or bugcheck -- is a critical error screen that can be displayed by Microsoft Windows operating systems (OSes).
AI cannibalism – training on AI-generated content – creates a feedback loop that worsens bias, degrades quality and risks model collapse, making systems unreliable or unusable.
With CISO burnout comes increasing cyber incidents and costly leadership turnover. Organizations must invest in support to prevent this growing security risk.
Cybersecurity products can get pricy, but there are many excellent open source tools to help secure your systems and data. Here's a list of some of the most popular.
Nation-state threat actors like Russia, China, Iran and North Korea are targeting critical infrastructure and sensitive data, so executives must prepare to defend against them.
The United States government takes aim at the viral video sharing application TikTok.
Shadow AI threatens enterprises as employees increasingly use unauthorized AI tools. Discover the risks, governance strategies, and outlook for managing AI in today's workplace.
AI-powered threat detection transforms cybersecurity by using machine learning to analyze network traffic, user behaviors and data access patterns.
Cyber risk quantification translates security threats into financial terms, so executives can prioritize risks, justify investments and allocate resources to protect the business.
OpenAI o3 and o4-mini are successors to the o1 model and are releases from the OpenAI reasoning model branch. These models became widely available on April 16, 2025.
This proactive approach protects business operations, ensures compliance and preserves reputation through comprehensive security practices.
Digital transformation offers companies some tantalizing possibilities. But new technologies usher in new vulnerabilities. Cybersecurity needs to play a key role.
Identity has replaced network boundaries as today's security perimeter. Organizations must focus on protecting digital identities to safeguard their assets.
Explore risk maturity models and assessment tools for enhancing enterprise risk management. Improve ERM programs to mitigate risk and gain a competitive edge.
Ransomware locks an organization out of its data or digital services until it pays up. To minimize attacks, businesses can enhance security, train employees and back up data.
In the modern era, no individual tech vendor is an island; most prosper best through partnerships. That's certainly the case for GPU and AI innovator Nvidia.
Radio frequency identification uses radio waves to digitally tag items, so businesses can wirelessly identify and track goods. Near field communication is a subset of RFID.
Risk transfer shifts potential financial liability from one party to another through insurance contracts, legal agreements or financial tools to protect organizations from losses.
Automation bias is an overreliance by human operators on automated systems, such as computer hardware, software and algorithms, to make decisions, even when the machine-generated output is incorrect or contradicts human judgment.
Explore the benefits and challenges of IoT, as well as its consumer, business and industrial applications. Learn how it works, related concepts, history and more in this primer.
Data risk management identifies, assesses and mitigates threats to organizational data, safeguarding sensitive information from unauthorized access.
AI in networking involves the application of artificial intelligence technologies, including machine learning, deep learning and advanced data analytics, to automate, optimize and secure network operations.
Semiconductors are the building blocks of modern technology and are essential for innovation in the modern age.
Semiconductor chips are predominantly made from silicon, germanium and gallium arsenide. Production is limited and mostly based in China, which could create future supply issues.
Infrastructure automation uses software tools to automate processes related to IT infrastructure provisioning, management and monitoring.
Cyberattacks are malicious attempts to breach computer systems. Types include phishing, ransomware and SQL injection. Prevention requires training, monitoring and encryption.
Semiconductors bridge conductors and insulators, enabling precise control of electrical flow. This complex process creates the foundation of modern electronics.
Finfluencers create personal finance content on social media, often appealing to Gen Z and retail investors, but the lack of regulation means there are risks involved.
CRM systems combine data, strategies and technology to manage customer interactions. Features include automation, lead tracking, and analytics to improve service and drive sales.
Meta released Llama 4 -- a multimodal LLM that analyzes and understands text, images, and video data. There are three primary versions of Llama 4 -- Scout, Maverick and Behemoth.
Pen testing uses six steps to test systems for vulnerabilities so organizations can remediate any problems and strengthen their cybersecurity against potential attacks.
Quantum error mitigation is a process used to reduce the impact of errors in quantum computing.
Google's latest multimodal model – Gemini 2.5 Pro – entered the AI race with enhanced reasoning and improved performance across coding, math and science benchmarks.
Neural networks are a type of machine learning model that mimic the human brain. With three different layers of processors, these networks are used in various industries.
SAP's enterprise resource management products under SAP ERP include ECC and S/4HANA. They are designed for enterprises across all business aspects, but are costly to implement.
Data science uses advanced analytics techniques to gain insights, especially for business use cases.
OpenAI released a new family of general-purpose models on April 14, 2025. The GPT-4.1 series includes three models with a developer focus – GPT-4.1, GPT-4.1 mini and GPT-4.1 nano.
Cybercriminals have various methods at their disposal to hack and exploit credit card information. Learn what they are, how to prevent them and what to do when hacked.
Quantum error correction detects and fixes fragile qubit errors caused by interference and decoherence, enabling fault-tolerant, reliable and scalable quantum computing systems.
Secure messaging uses end-to-end encryption, decentralized servers and open source code. The most secure messaging apps, such as Signal and Sessions, combine these features.
Digital detox apps are gaining popularity as they help users reduce screen time, fight digital addiction and improve mental well-being.
Cybercrime refers to criminal activity that uses a computer, networked device or network. Its many forms, from extortion to identity theft, can cause real damage to organizations.
After years of remote work, some companies are making employees return to the office. Experts predict good and bad results with mentorship opportunities or employee turnover.
XAI introduced and expanded its large language model to the newest version -- Grok 3, which offers features such as advanced reasoning, knowledge retrieval and text summarization.
Cybercrime-as-a-service is quickly evolving, offering easy access to hacking tools for criminals. Learn how it works and steps to protect your organization from attacks.
Technology providers offer several paths to the promised land of quantum advantage, but customers must navigate the engineering tradeoffs among the varied types of qubits.
Everyone has personally identifiable information -- some of it sensitive and some of it not. Keeping PII safe is important, since bad actors can use it for malicious ends.
Software-as-a-service is a way for organizations to rent cloud computing services rather than buy and own applications. It has both advantages and disadvantages.
Teams responsible for APM must develop a clear strategy to identify performance risks, reduce APM costs and secure sensitive data collected as part of their initiatives.
Gemma is a collection of lightweight open source generative AI models designed mainly for developers and researchers.
Explore the nuances between application performance monitoring and application performance management, especially in enhancing application efficiency and the user experience.
Selecting an IT process automation platform requires organizations to evaluate processes, skill level and integration issues. These popular products are good options.
Before downloading an app, users should verify the publisher, look at reviews and consult the privacy policy to determine whether it is safe to install.
The Trump administration is already enacting new tech policies, seeking to establish the U.S. as a global leader in AI development and innovation while reducing red tape on Big Tech.
Another major cyberattack hit the U.S. Treasury, allegedly by Chinese state-sponsored hackers. Exploiting BeyondTrust software, they accessed sensitive unclassified documents.
GPT-4.5, OpenAI's latest model, enhances natural conversation and emotional intelligence. It supports content generation, multilingual proficiency and more.
With the rapid development of AI and the onset of generative AI, AI fatigue is becoming more common across businesses and negatively affecting the employee experience.
Tech giants will head to court to address antitrust cases, data privacy, content moderation and copyright. These cases may set key legal precedents for the future of tech.
Google Gemini 2.0, announced in December 2024, will enhance generative AI with multimodal capabilities and agentic AI features, integrating across Google services.
2024's top healthcare cyberattacks each affected millions of patients, revealing vulnerabilities and showing how critical a strong cybersecurity system is to secure patient data.
ChatGPT brings a fresh take on internet search with conversational AI, but Google retains key advantages. Discover how these two platforms stack up and differ.