Google's quantum computer did something that would take our fastest supercomputers 10 SEPTILLION years... in just five minutes! Let me break down how that's even possible. Our normal computers, work with bits - basically tiny switches that are either ON or OFF. That's it. Just 1s and 0s. Let's say you wanted to crack a password with 10 characters. A regular computer would have to try each combination one at a time - that could take years! But a quantum computer? It could try all possible combinations simultaneously. It's like having millions of computers working in parallel! This is possible because quantum computers use qubits, which can be ON and OFF at the same time. I know, I know. How is that possible? Well, this is where things get REALLY interesting. Researchers use individual atoms, super-cooled to near absolute zero - that's colder than space itself! At these temperatures, atoms start behaving according to quantum mechanics, where the normal rules of physics just... don't apply. But here's the catch - it's INCREDIBLY difficult to maintain this quantum state. Think about trying to balance a pencil on its tip... while riding a bicycle... during an earthquake. That's STILL easier than keeping qubits stable! Scientists call this problem "decoherence. " Right now, the best quantum computers have about 100 working qubits. But here's something wild - a quantum computer with just 300 qubits would be able to perform more simultaneous calculations than there are atoms in the observable universe! And the coolest part? We're just scratching the surface. #tech #technology #stem #techexplained #quantumphysics #quantumcomputing
The most inefficient design in modern technology is sitting right in front of you. It's your keyboard and there is a really interesting reason why we can't get rid of it. In the 1870s, early typewriters had a serious problem. When people typed too quickly, the mechanical arms would crash into each other and jam. The solution? Keyboard designer Christopher Sholes rearranged the letters to put commonly used pairs far apart. Some people say the QWERTY layout already existed and was invented by telegram operators. But you can decide that. Regardless, this design helped slow typing down. Think about it: 'E' and 'R' are typed with different fingers. 'T' and 'H' are on opposite sides. This isn't random - it's intentionally inefficient to prevent those mechanical jams. When computers came along, we no longer needed this slow-down design. We could arrange letters any way we wanted. In fact, in 1936, August Dvorak created a scientifically optimized keyboard layout that was 74% more efficient. But by then, millions of people had already learned QWERTY. The inefficient design had won. #tech #technology #coding #stem #techexplained
In 1985, there was a massive problem threatening to break the entire internet. But most people don't know about the woman who solved it - Radia Perlman. See, early computer networks had a critical flaw. T o make sure messages got through, networks would create multiple paths between computers. But this caused an explosive problem called a broadcast storm - messages would loop endlessly until the entire network collapsed. Enter Radia Perlman. In just one weekend, she wrote the Spanning Tree Protocol - an algorithm that automatically prevents these loops. And here's the wild part - it's still running in almost every network today. Perlman says her more important work was making networks "self-healing" What Perlman considers her more significant contribution was developing "Network Fault T olerance" protocols. These algorithms automatically detect network failures and reroute traffic in milliseconds - without any human intervention. Her work on the IS-IS (Intermediate System to Intermediate System) protocol became fundamental to how large networks maintain reliability. #tech #technology #coding #stem #futuretech
There's a hidden system that runs the entire internet, and almost nobody knows about it. It's called BGP, and I promise this is going to blow your mind. Okay, picture this: You're trying to send a letter, but instead of one post office, there are 70,000 different post offices, all run by different companies. How do they know where to send your letter? That's basically the problem BGP solves for the internet. #tech #technology #coding #stem #developer #techexplained
99% of the internet runs through cables under water. But why wouldn't we just use satellites? It comes down to three main things: First - it comes down to latency. That's the time it takes for your data to make the trip. Through satellites? Your signal has to travel all the way to space and back While cables take a shortcut across the ocean. That's why when I send this message to someone in Europe, it only takes about 100 milliseconds through a cable. Through a satellite? More like 700 milliseconds. Second - these cables are data powerhouses. A single modern cable can carry up to 200 terabits per second. That's like downloading 25,000 HD movies... every second. And third - they're actually more reliable than satellites. They're protected from weather, solar storms, and space debris. Though occasionally they do get attacked by sharks. Yes, really. But that's a story for another video! #stem #tech #techexplained #technology #coding
What do you think of the end result? I wonder if anyone will be wanting to use this invisible cloak tomorrow at Thanksgiving when their relatives start quizzing them 😆 #tech #coding #stem
Learning about this blew my mind. There is a lot more information on ICANN on their blog! Also, although we are referencing “7 people” in the video, that is a reference often used but it is much more complicated.. here is a snippet from their website.. There are around fifty different experts who are directly involved in key ceremonies. Twenty-one of these are selected from the global Internet community. They are divided into three groups of seven people. Each group has a different purpose. Because we need people from these groups to participate in key ceremonies as part of the security protection for the key signing key, it is often simplified to the idea that there are seven keys to the Internet, or there are seven people that control the Internet. This, however, masks the true complexity that involves many levels of overlapping controls. The complete design requires far more than seven individuals or seven keys to access or use the root zone key signing key. #tech #technology #stem #techexplained
Imagine this: When the internet first began, there was ONE person responsible for keeping track of EVERY computer address that existed. Her name was Elizabeth Feinler, and at Stanford, she maintained a single text file called HOSTS.TXT - literally the master list of the entire internet. But as the internet exploded from hundreds to thousands to millions of addresses, having one master list became impossible. What replaced it was technology helps you billions of times a day without most people knowing it. #tech #technology #coding #techexplained #stem
Is HTML considered a programming language? While for most people who work in tech its obvious it is not, it still seems to spark some debate! #tech #technology #coding #stem
Meta might be about to make one of the most important infrastructure moves in internet history, for $10 billion, and most people have no idea it's happening. They're potentially planning a massive underwater internet cable that'll wrap around the world like this, connecting the US, South Africa, India, and Australia. But here's why this is such a big deal: Remember how your parents taught you not to put all your eggs in one basket? Well, right now, the internet's eggs are mostly in some pretty risky baskets. See, crucial internet cables keep getting cut in conflict zones like the Red Sea. When that happens, millions lose reliable internet access. Meta's new route? It completely avoids these hotspots. Think about it - Meta handles 22% of all mobile internet traffic. That's billions of WhatsApp messages, Instagram reels, and Facebook posts. And with AI coming into play, they need even more bandwidth. This isn't just about Meta building a fancy new cable. It's about rewiring the internet's backbone to be more secure, more reliable, and ready for whatever comes next. The future of our connection to each other is being built right under our oceans. And now you know why it matters. #tech #technology #techexplained #stem
There is something that powers almost 40% of the internet - but you've probably never heard of it. It's called Nginx, and it's basically... well, imagine you're at the world's busiest restaurant. You know how there's that super-organized host at the front? The one who knows exactly which tables are free and sends you to the right spot? That's Nginx. #tech #technology #coding #stem #techexplained
What if I told you that most of the encryption protecting our internet is about to become... breakable? Right now, our online security uses mathematical puzzles that are basically impossible for regular computers to solve. Like, it would take them thousands of years. But quantum computers? They could crack these puzzles in weeks. Maybe even days. That's why this is fascinating - a team of cryptographers, led by Joppe Bos, created something called CRYSTALS-Kyber. Instead of using traditional math problems, it uses something called lattice-based cryptography. Imagine a grid in multiple dimensions, with thousands of points. Your secret message is hidden using math that involves finding specific paths between these points. Even quantum computers get lost trying to solve it! The coolest part? This isn't just theoretical. Google's Chrome browser is already using it. Your future credit cards will use it. Even your car might use it. This is how we quantum-proof the internet - not with bigger locks, but with better math. #tech #technology #quantumcomputing #coding #stem #techexplained
This might be one of the most brilliant security features ever invented. And you're using it every single day without even knowing it. When you type your password into a website, you probably think it's stored somewhere, right? Wrong. What's actually stored is complete gibberish - and that's exactly how it should be. Let's say your password is "DogLover123" . When you create an account, the website runs it through something called SHA-256 - a cryptographic hash function that's basically a superhero of the internet. It puts your password through 64 rounds of mathematical operations. So "DogLover123" becomes this: "8d969eef6ecad3c29a3a629280e686cf0c3f5d5a86aff3ca12020c923adc6c92" This 256-bit output looks random, but it's actually the result of precise mathematical chaos. But wait - if websites don't know your actual password, how do they check if you typed it correctly? Here's where it gets interesting: SHA-256 will always create the exact same output for the same input. So when you log in, they run your password through those same 64 rounds of mathematical operations and check if the gibberish matches. And here's what makes SHA-256 incredible - it's mathematically impossible to find two passwords that create the same output. Even changing one letter creates a completely different hash. #tech #technology #stem #techexplained
Did you know your private browser mode isn't really keeping you private at all? Let's break down what actually happens when you open a private browsing window. Your browser creates a temporary session - no previous cookies, no browsing history, no saved passwords. When you close the window, all of that session data disappears from your device. That's it. But here's the crucial part: Your internet service provider still sees all your traffic. Your school or workplace network still logs every site you visit. And the websites themselves? They know exactly when you arrive and what you do there. It's similar to using a store but asking them not to save your receipt. The security cameras are still recording, the payment processor still sees your transaction, and the store still knows a customer came in - they just won't have it in their local records. What makes this even more significant is how companies can still track you in private mode using your IP address and something called browser fingerprinting - the unique way your browser and device identify themselves to websites. Even without cookies, these technical signatures can reveal who you are. Send this to someone who might need this reminder! #tech #technology #stem #techexplained
Top 3 tech trends that are worth spending your time learning for 2025. What else would you add?! And what WONT you be learning? #tech #techtok #coding #stem
If NATO can pull this off it’ll revolutionize internet usage 🤯 Right now, 95% of our internet data travels through these underwater cables. But what if we could instantly switch to satellites when cables get damaged? It's like having a backup generator for the entire internet! The challenge? Satellites can only handle a tiny fraction of what these cables can. But NATO is testing ways to make this work, using things like laser communication between satellites - yes, actual lasers in space! This is happening now, and it could reshape how the entire internet works. Pretty cool, right? #tech #technology #stem #futuretech