<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-ransomware</loc>
        <video:video>
            <video:title>An explanation of ransomware</video:title>
            <video:publication_date>2025-05-30T13:15:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/rMVeLDk4r-I/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=rMVeLDk4r-I</video:player_loc>
            <video:duration>184</video:duration>
            <video:description>Ransomware locks an organization out of its data or digital services until it pays up. To minimize attacks, businesses can enhance security, train employees and back up data.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-RFID</loc>
        <video:video>
            <video:title>An explanation of RFID</video:title>
            <video:publication_date>2025-05-30T11:00:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/ziDlycAZb9I/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=ziDlycAZb9I</video:player_loc>
            <video:duration>185</video:duration>
            <video:description>Radio frequency identification uses radio waves to digitally tag items, so businesses can wirelessly identify and track goods. Near field communication is a subset of RFID.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-cyberattacks-and-their-different-forms</loc>
        <video:video>
            <video:title>An explanation of cyberattacks and their different forms</video:title>
            <video:publication_date>2025-05-09T11:19:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/NR4zzn5VUfI/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=NR4zzn5VUfI</video:player_loc>
            <video:duration>174</video:duration>
            <video:description>Cyberattacks are malicious attempts to breach computer systems. Types include phishing, ransomware and SQL injection. Prevention requires training, monitoring and encryption.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-customer-relationship-management-CRM</loc>
        <video:video>
            <video:title>An explanation of customer relationship management (CRM)</video:title>
            <video:publication_date>2025-05-06T11:00:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/hBotLYIPibc/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=hBotLYIPibc</video:player_loc>
            <video:duration>146</video:duration>
            <video:description>CRM systems combine data, strategies and technology to manage customer interactions. Features include automation, lead tracking, and analytics to improve service and drive sales.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-pen-testing</loc>
        <video:video>
            <video:title>An explanation of pen testing</video:title>
            <video:publication_date>2025-05-02T10:15:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/TA0TbzyU8GY/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=TA0TbzyU8GY</video:player_loc>
            <video:duration>172</video:duration>
            <video:description>Pen testing uses six steps to test systems for vulnerabilities so organizations can remediate any problems and strengthen their cybersecurity against potential attacks.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-neural-networks</loc>
        <video:video>
            <video:title>An explanation of neural networks</video:title>
            <video:publication_date>2025-04-29T14:49:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/yOf2ssqJFFk/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=yOf2ssqJFFk</video:player_loc>
            <video:duration>164</video:duration>
            <video:description>Neural networks are a type of machine learning model that mimic the human brain. With three different layers of processors, these networks are used in various industries.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-SAP-ERP</loc>
        <video:video>
            <video:title>An explanation of SAP ERP, ECC and S/4HANA</video:title>
            <video:publication_date>2025-04-25T08:09:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/3fhHnRPrdIw/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=3fhHnRPrdIw</video:player_loc>
            <video:duration>228</video:duration>
            <video:description>SAP's enterprise resource management products under SAP ERP include ECC and S/4HANA. They are designed for enterprises across all business aspects, but are costly to implement.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-data-science-and-data-scientist-jobs</loc>
        <video:video>
            <video:title>An explanation of data science and data scientist jobs</video:title>
            <video:publication_date>2025-04-22T13:50:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/F1ZpufU-DMY/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=F1ZpufU-DMY</video:player_loc>
            <video:duration>219</video:duration>
            <video:description>Data science uses advanced analytics techniques to gain insights, especially for business use cases.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-DEI</loc>
        <video:video>
            <video:title>An explanation of DEI</video:title>
            <video:publication_date>2025-04-09T16:23:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/EXCjAQXSdFM/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=EXCjAQXSdFM</video:player_loc>
            <video:duration>175</video:duration>
            <video:description>Diversity, equity and inclusion aims to address specific disparities in the workplace. By implementing DEI policies, organizations can improve performance and well-being.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-cybercrime</loc>
        <video:video>
            <video:title>An explanation of cybercrime</video:title>
            <video:publication_date>2025-04-07T15:53:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/X7kFAy1E8Jw/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=X7kFAy1E8Jw</video:player_loc>
            <video:duration>143</video:duration>
            <video:description>Cybercrime refers to criminal activity that uses a computer, networked device or network. Its many forms, from extortion to identity theft, can cause real damage to organizations.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-personally-identifiable-information</loc>
        <video:video>
            <video:title>An explanation of personally identifiable information</video:title>
            <video:publication_date>2025-03-27T12:00:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/N1qdvQVke0s/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=N1qdvQVke0s</video:player_loc>
            <video:duration>216</video:duration>
            <video:description>Everyone has personally identifiable information -- some of it sensitive and some of it not. Keeping PII safe is important, since bad actors can use it for malicious ends.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-software-as-a-service-SaaS</loc>
        <video:video>
            <video:title>An explanation of software-as-a-service (SaaS)</video:title>
            <video:publication_date>2025-03-27T09:00:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/pLsdKM57CP8/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=pLsdKM57CP8</video:player_loc>
            <video:duration>209</video:duration>
            <video:description>Software-as-a-service is a way for organizations to rent cloud computing services rather than buy and own applications. It has both advantages and disadvantages.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/Hardware-vs-software-explained</loc>
        <video:video>
            <video:title>Hardware vs. software explained</video:title>
            <video:publication_date>2024-11-18T16:08:00-05:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/_2MB8F9JSa8/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=_2MB8F9JSa8</video:player_loc>
            <video:duration>89</video:duration>
            <video:description>If you can touch it, it's hardware. If it's an application you can't touch, it's software.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/Data-engineers-data-scientists-and-data-analysts-explained</loc>
        <video:video>
            <video:title>Data engineers, data scientists and data analysts explained</video:title>
            <video:publication_date>2024-11-18T15:49:00-05:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/EEu5eZaIHig/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=EEu5eZaIHig</video:player_loc>
            <video:duration>181</video:duration>
            <video:description>Understanding the differences in the roles of data scientists, analysts and engineers can boost productivity and efficiency in a business.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-ethical-hackers</loc>
        <video:video>
            <video:title>An explanation of ethical hackers</video:title>
            <video:publication_date>2024-11-13T09:15:00-05:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/KZ93C-CroAA/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=KZ93C-CroAA</video:player_loc>
            <video:duration>162</video:duration>
            <video:description>Ethical hackers protect businesses by identifying vulnerabilities. They use the same techniques as malicious hackers, but for the greater good.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-Apple-Intelligence</loc>
        <video:video>
            <video:title>An explanation of Apple Intelligence</video:title>
            <video:publication_date>2024-08-26T14:08:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Core features of Apple's generative AI tool include natural language understanding, custom image generation and automatic transcription.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-configuration-management</loc>
        <video:video>
            <video:title>An explanation of configuration management</video:title>
            <video:publication_date>2024-08-23T16:29:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/66gpOMI2m4Y/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=66gpOMI2m4Y</video:player_loc>
            <video:duration>263</video:duration>
            <video:description>Configuration management has four key benefits -- compliance, consistency, service delivery and security.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/Fibonacci-sequence-use-cases-in-technology</loc>
        <video:video>
            <video:title>Fibonacci sequence use cases in technology</video:title>
            <video:publication_date>2024-08-21T14:26:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>The Fibonacci sequence has key applications in code testing, cryptography and quantum computing.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-cybersecurity</loc>
        <video:video>
            <video:title>An explanation of cybersecurity</video:title>
            <video:publication_date>2024-08-21T11:06:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/xAtrKkzTV_U/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=xAtrKkzTV_U</video:player_loc>
            <video:duration>197</video:duration>
            <video:description>Cybersecurity protects internet-connected systems from attacks, covering hardware, software and data.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-subnets</loc>
        <video:video>
            <video:title>An explanation of subnets</video:title>
            <video:publication_date>2024-08-19T14:37:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Subnets make networking manageable and ensure efficient communication. Without subnetting, sending emails, texts and documents would be significantly slower.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/MAC-address-vs-IP-address-explained</loc>
        <video:video>
            <video:title>MAC address vs. IP address explained</video:title>
            <video:publication_date>2024-08-19T10:42:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/UjOXLg7HauQ/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=UjOXLg7HauQ</video:player_loc>
            <video:duration>215</video:duration>
            <video:description>MAC and IP addresses serve different roles in data transmission, differing in location, format and use.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-fishbone-diagrams</loc>
        <video:video>
            <video:title>An explanation of fishbone diagrams</video:title>
            <video:publication_date>2024-08-16T12:27:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Fishbone diagrams assist in root cause analysis to identify the core issue of a problem.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-Industry-40-use-cases</loc>
        <video:video>
            <video:title>An explanation of Industry 4.0 use cases</video:title>
            <video:publication_date>2024-08-14T12:30:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Industry 4.0 can be used across a number of industries, including retail, food service and cybersecurity.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-introduction-to-Industry-40</loc>
        <video:video>
            <video:title>An introduction to Industry 4.0</video:title>
            <video:publication_date>2024-08-14T11:51:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/DeyJM8lmi1E/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=DeyJM8lmi1E</video:player_loc>
            <video:duration>189</video:duration>
            <video:description>Here are the basics of Industry 4.0 -- the fourth industrial revolution -- featuring AI, IoT and cloud technologies.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/Explaining-third-party-cookies-vs-tracking-pixels</loc>
        <video:video>
            <video:title>Explaining third-party cookies vs. tracking pixels</video:title>
            <video:publication_date>2024-08-13T16:22:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/WY6R2j46lKc/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=WY6R2j46lKc</video:player_loc>
            <video:duration>182</video:duration>
            <video:description>Websites personalize content using third-party cookies and tracking pixels but do so in different ways.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-centralized-vs-decentralized-finance</loc>
        <video:video>
            <video:title>An explanation of centralized vs. decentralized finance</video:title>
            <video:publication_date>2024-08-13T16:02:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/MoHXxxeiItU/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=MoHXxxeiItU</video:player_loc>
            <video:duration>148</video:duration>
            <video:description>DeFi and CeFi manage cryptocurrency transactions in different ways. Here's how.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-private-5G-vs-Wi-Fi</loc>
        <video:video>
            <video:title>An explanation of private 5G vs. Wi-Fi</video:title>
            <video:publication_date>2024-08-09T13:30:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/UCLtahIJfYY/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=UCLtahIJfYY</video:player_loc>
            <video:duration>154</video:duration>
            <video:description>Private 5G improves upon traditional cellular networks by catering to private networks, expanding accessibility beyond major carriers.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-serverless-computing</loc>
        <video:video>
            <video:title>An explanation of serverless computing</video:title>
            <video:publication_date>2024-08-08T18:01:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/YoBfFwsoWIU/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=YoBfFwsoWIU</video:player_loc>
            <video:duration>136</video:duration>
            <video:description>Serverless computing simplifies app development by eliminating server management, streamlining coding for cloud platforms.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/Causes-of-IT-outages-explained</loc>
        <video:video>
            <video:title>Causes of IT outages explained</video:title>
            <video:publication_date>2024-08-07T12:18:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>IT outages can be caused by utility disruptions, hardware faults, configuration errors and software faults.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-private-cloud</loc>
        <video:video>
            <video:title>An explanation of private cloud</video:title>
            <video:publication_date>2024-08-06T13:36:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Private clouds cater to a single organization, offering enhanced security and compliance, unlike multi-tenant public clouds.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/Benefits-and-methods-of-load-balancing</loc>
        <video:video>
            <video:title>Benefits and methods of load balancing</video:title>
            <video:publication_date>2024-08-06T12:18:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Load balancing ensures smooth network performance by distributing traffic equitably, enhancing scalability and adapting to dynamic IT landscapes.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-generative-design</loc>
        <video:video>
            <video:title>An explanation of generative design</video:title>
            <video:publication_date>2024-08-05T13:44:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Generative design transforms the creation process across many fields and excels in generating unbiased, efficient designs.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-large-language-models</loc>
        <video:video>
            <video:title>An explanation of large language models</video:title>
            <video:publication_date>2024-08-05T13:27:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Large language models can be traced back to 1966 but are significantly more sophisticated today.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-prompt-engineering</loc>
        <video:video>
            <video:title>An explanation of prompt engineering</video:title>
            <video:publication_date>2024-08-01T11:54:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Prompt engineering is responsible for training AI language models to ensure accurate outputs in AI chatbots.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-green-collar-jobs</loc>
        <video:video>
            <video:title>An explanation of green-collar jobs</video:title>
            <video:publication_date>2024-07-30T10:43:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Green-collar jobs merge environmental sustainability with diverse skills from white- and blue-collar sectors.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-romance-scams-pig-butchering</loc>
        <video:video>
            <video:title>An explanation of romance scams (pig butchering)</video:title>
            <video:publication_date>2024-07-29T15:09:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Pig butchering is a scam that exploits virtual relationships to deceive and steal money.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-collaborative-robots</loc>
        <video:video>
            <video:title>An explanation of collaborative robots</video:title>
            <video:publication_date>2024-07-29T13:52:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Cobots are robotic arms equipped with sensors for manufacturing and assembly tasks. They also detect human presence for productivity enhancement.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-the-CrowdStrike-outage</loc>
        <video:video>
            <video:title>An explanation of the CrowdStrike outage</video:title>
            <video:publication_date>2024-07-29T12:08:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>A botched CrowdStrike update triggered a massive outage, affecting airlines, healthcare, banking and transit.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-Flipper-Zero</loc>
        <video:video>
            <video:title>An explanation of Flipper Zero</video:title>
            <video:publication_date>2024-07-25T14:28:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Flipper Zero is both a tool for pen testers and a learning device for new hackers.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-inception-scores</loc>
        <video:video>
            <video:title>An explanation of inception scores</video:title>
            <video:publication_date>2024-07-24T09:15:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Inception scores are a mathematical algorithm that measures the quality of AI-generated images.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/WPA2-vs-WPA3</loc>
        <video:video>
            <video:title>WPA2 vs. WPA3</video:title>
            <video:publication_date>2024-07-23T13:52:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Wireless security has evolved from WEP to WPA protocols and play a pivotal role in safeguarding against cyberattacks.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-super-apps</loc>
        <video:video>
            <video:title>An explanation of super apps</video:title>
            <video:publication_date>2024-07-23T10:14:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/YcYKFDb5Ubc/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=YcYKFDb5Ubc</video:player_loc>
            <video:duration>80</video:duration>
            <video:description>Super apps consolidate banking, shopping, transportation, email and food delivery into a single, versatile application.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-bots</loc>
        <video:video>
            <video:title>An explanation of bots</video:title>
            <video:publication_date>2024-07-19T11:13:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/fUL7f-LcgtU/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=fUL7f-LcgtU</video:player_loc>
            <video:duration>174</video:duration>
            <video:description>Bots are automated programs with varied roles. They can be both helpful and malicious.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-data-architects-vs-data-engineers</loc>
        <video:video>
            <video:title>An explanation of data architects vs. data engineers</video:title>
            <video:publication_date>2024-07-19T10:37:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Data architects and data engineers are both necessary for effective data management teams.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-advanced-vs-predictive-analytics</loc>
        <video:video>
            <video:title>An explanation of advanced vs. predictive analytics</video:title>
            <video:publication_date>2024-07-18T12:31:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Predictive analytics is a type of advanced analytics. Learn more in this video.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-the-different-types-of-AI</loc>
        <video:video>
            <video:title>An explanation of the different types of AI</video:title>
            <video:publication_date>2024-07-17T13:29:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>There are four main categories of AI -- reactive, limited memory, theory of mind and self-aware.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-GPT-4o</loc>
        <video:video>
            <video:title>An explanation of GPT-4o</video:title>
            <video:publication_date>2024-07-15T13:51:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>GPT-4o is a multimodal large language model developed by OpenAI.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-CIA-triad</loc>
        <video:video>
            <video:title>An explanation of CIA triad</video:title>
            <video:publication_date>2024-07-15T13:44:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>In information security CIA stands for confidentiality, integrity and availability.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/Data-protection-vs-data-privacy-vs-data-security-explained</loc>
        <video:video>
            <video:title>Data protection vs. data privacy vs. data security explained</video:title>
            <video:publication_date>2024-07-15T12:33:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Data protection, privacy and security all play critical roles in effective data management.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-Trojan-horse</loc>
        <video:video>
            <video:title>An explanation of Trojan horse</video:title>
            <video:publication_date>2024-07-12T16:46:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/Vjkq5TknEqk/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=Vjkq5TknEqk</video:player_loc>
            <video:duration>154</video:duration>
            <video:description>Trojan horses are a type of malware that can take control of your computer and even access your camera.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-AI-buzzwords</loc>
        <video:video>
            <video:title>An explanation of AI buzzwords</video:title>
            <video:publication_date>2024-07-10T19:04:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Here are some simple explanations of common AI buzzwords.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-AI-model-collapse</loc>
        <video:video>
            <video:title>An explanation of AI model collapse</video:title>
            <video:publication_date>2024-07-10T12:07:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Generative AI creates content quickly and accurately but faces the risk of model collapse.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-foundation-models</loc>
        <video:video>
            <video:title>An explanation of foundation models</video:title>
            <video:publication_date>2024-07-09T17:57:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>The core of every generative AI chatbot -- such as ChatGPT, Bard and YouChat -- is the foundation model.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-Hugging-Face</loc>
        <video:video>
            <video:title>An explanation of Hugging Face</video:title>
            <video:publication_date>2024-07-08T17:07:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Hugging Face is a machine learning platform that provides the means to run and deploy AI in live applications.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/The-importance-of-compliance-officers</loc>
        <video:video>
            <video:title>The importance of compliance officers</video:title>
            <video:publication_date>2024-07-03T13:21:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/JkcYwaaN1PQ/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=JkcYwaaN1PQ</video:player_loc>
            <video:duration>84</video:duration>
            <video:description>Compliance officers ensure a company follows both its internal rules as well as external laws from the government.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/Differences-between-conversational-AI-and-generative-AI</loc>
        <video:video>
            <video:title>Differences between conversational AI and generative AI</video:title>
            <video:publication_date>2024-07-03T12:46:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/lcofFrQKHPE/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=lcofFrQKHPE</video:player_loc>
            <video:duration>167</video:duration>
            <video:description>While both AI types often work together, conversational AI enables natural interaction with machines, while generative AI creates new content such as text and images.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-CLI-GUI-and-NUI</loc>
        <video:video>
            <video:title>An explanation of CLI, GUI and NUI</video:title>
            <video:publication_date>2024-07-02T16:21:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>A natural user interface uses human gestures, spoken words or biometrics for interaction, reducing reliance on typing and programming. This video will compare NUIs to CLI and GUI.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-gamification</loc>
        <video:video>
            <video:title>An explanation of gamification</video:title>
            <video:publication_date>2024-07-02T10:31:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/yXrnCb57sZU/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=yXrnCb57sZU</video:player_loc>
            <video:duration>111</video:duration>
            <video:description>Gamification integrates video game elements into nongame contexts such as business operations. It uses points, badges, levels and rewards to enhance engagement and motivation.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-Worldcoin</loc>
        <video:video>
            <video:title>An explanation of Worldcoin</video:title>
            <video:publication_date>2024-07-01T14:16:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>The Worldcoin cryptocurrency uses iris scans to create unique digital identities.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-masked-language-models</loc>
        <video:video>
            <video:title>An explanation of masked language models</video:title>
            <video:publication_date>2024-06-26T16:40:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>In this video, TechTarget editor Jen English talks about masked language models.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-rich-communication-services</loc>
        <video:video>
            <video:title>An explanation of rich communication services</video:title>
            <video:publication_date>2024-06-26T10:44:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>In this video, TechTarget editor Tommy Everson talks about rich communication services.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-vector-search</loc>
        <video:video>
            <video:title>An explanation of vector search</video:title>
            <video:publication_date>2024-06-24T17:24:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/pEU5RtIzZf8/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=pEU5RtIzZf8</video:player_loc>
            <video:duration>156</video:duration>
            <video:description>Vector search is a multidimensional tool that represents words, sentences, images and audio as numbers across multiple dimensions.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-ICT</loc>
        <video:video>
            <video:title>An explanation of ICT</video:title>
            <video:publication_date>2024-06-24T12:26:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>ICT is an umbrella term for all digital interaction technologies that, when combined, help people and organizations interact in the digital world.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-introduction-to-AI</loc>
        <video:video>
            <video:title>An introduction to AI</video:title>
            <video:publication_date>2024-06-24T08:10:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>AI uses human intelligence to learn, reason, self-correlate and practice creativity.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/Benefits-of-dark-web-monitoring</loc>
        <video:video>
            <video:title>Benefits of dark web monitoring</video:title>
            <video:publication_date>2024-06-21T13:53:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Dark web monitoring helps organizations stay ahead of cybersecurity threats by detecting proprietary data breaches, securing accounts and ensuring compliance.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-IoT</loc>
        <video:video>
            <video:title>An explanation of IoT</video:title>
            <video:publication_date>2024-06-20T09:31:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/4FxU-xpuCww/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=4FxU-xpuCww</video:player_loc>
            <video:duration>216</video:duration>
            <video:description>Every device connected to the internet has set systems to collect, send and act on data.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-TCP-IP</loc>
        <video:video>
            <video:title>An explanation of TCP/IP</video:title>
            <video:publication_date>2024-06-17T14:26:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/5VIadA71eGA/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=5VIadA71eGA</video:player_loc>
            <video:duration>261</video:duration>
            <video:description>These fundamental protocols make transferring data easier by focusing on both communication and transportation through different mediums.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/The-importance-of-Scrum-masters</loc>
        <video:video>
            <video:title>The importance of Scrum masters</video:title>
            <video:publication_date>2024-06-17T12:38:00-04:00</video:publication_date>
            <video:duration>0</video:duration>
            <video:description>Learn about guiding questions and leadership skills to strive for success in a project management company in this video.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-business-intelligence</loc>
        <video:video>
            <video:title>An explanation of business intelligence</video:title>
            <video:publication_date>2024-06-12T12:51:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/uUTMiUuFJdA/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=uUTMiUuFJdA</video:player_loc>
            <video:duration>189</video:duration>
            <video:description>Business intelligence is a technology-driven process that helps both managers and analysts track information and make effective decisions.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/An-explanation-of-causal-AI</loc>
        <video:video>
            <video:title>An explanation of causal AI</video:title>
            <video:publication_date>2024-06-11T18:00:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/7QlQKTGsPt8/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=7QlQKTGsPt8</video:player_loc>
            <video:duration>168</video:duration>
            <video:description>The advancement of modern AI has transformed computer system intelligence to correctly identify the cause and effect in data.</video:description>
        </video:video>
    </url>
    <url>
        <loc>https://www.techtarget.com/whatis/video/A-quick-explanation-of-the-splinternet</loc>
        <video:video>
            <video:title>A quick explanation of the splinternet</video:title>
            <video:publication_date>2022-10-03T13:09:00-04:00</video:publication_date>
            <video:thumbnail_loc>https://i.ytimg.com/vi/E3WWBS0yTF0/default.jpg</video:thumbnail_loc>
            <video:player_loc>https://www.youtube.com/watch?v=E3WWBS0yTF0</video:player_loc>
            <video:duration>76</video:duration>
            <video:description>A fragmented internet can create disinformation -- and a misinformed population -- as content is filtered and censored.</video:description>
        </video:video>
    </url>
</urlset>
