This media is not supported in your browser
VIEW IN TELEGRAM
#gif #programming
#AI translates English requests into #python code for processing and presenting data:
https://github.com/deepklarity/jupyter-text2code
#AI translates English requests into #python code for processing and presenting data:
https://github.com/deepklarity/jupyter-text2code
#web
Really? 🙃
“The #Google #Chrome engineering team is going to disable the alert() function in a future version because it’s often used by scammers to trick users. This is going to be a breaking change to the web platform so go update your apps & debugging tools before the change rolls out.”
https://twitter.com/carnage4life/status/1423121207059120137?s=28
Really? 🙃
“The #Google #Chrome engineering team is going to disable the alert() function in a future version because it’s often used by scammers to trick users. This is going to be a breaking change to the web platform so go update your apps & debugging tools before the change rolls out.”
https://twitter.com/carnage4life/status/1423121207059120137?s=28
Twitter
Dare Obasanjo
The Google Chrome engineering team is going to disable the alert() function in a future version because it’s often used by scammers to trick users. This is going to be a breaking change to the web platform so go update your apps & debugging tools before the…
#security
The most astonishing fact revealed by the survey was that 87 percent of manufacturing companies have a disaster recovery plan in place for all data security concerns. But only 37% of them have it in documented and tested state.
https://www.cybersecurity-insiders.com/study-confirms-manufacturing-companies-are-more-vulnerable-to-cyber-attacks/
The most astonishing fact revealed by the survey was that 87 percent of manufacturing companies have a disaster recovery plan in place for all data security concerns. But only 37% of them have it in documented and tested state.
https://www.cybersecurity-insiders.com/study-confirms-manufacturing-companies-are-more-vulnerable-to-cyber-attacks/
Cybersecurity Insiders
Study confirms Manufacturing companies are more vulnerable to Cyber Attacks - Cybersecurity Insiders
Companies involved in manufacturing business are said to be more exposed to cyber attacks. This was revealed in a Deloitte study, titled Manufacturers Alliance for Productivity and Innovation (MAPI). According to MAPI, 40 percent of manufacturing firms experienced…
Forwarded from Fullstack разработчица живет в nestjs
"Horizontal Scalability Options in PostgreSQL - Highgo Software Inc." https://www.highgo.ca/2021/08/09/horizontal-scalability-options-in-postgresql/
Highgo Software Inc. - Enterprise PostgreSQL Solutions
Horizontal Scalability Options in PostgreSQL
So for one reason or another you have decided that you need horizontal scalability and you need to achieve it with PostgreSQL as your database. So what options do you have?
#security #tools
https://appsecmap.com/ - A good list of different AppSec tools, grouped by categories with short descriptions and links. It will be useful to quickly research/solution selection.
https://appsecmap.com/ - A good list of different AppSec tools, grouped by categories with short descriptions and links. It will be useful to quickly research/solution selection.
Appsecmap
AppSec Map
A map of AppSec service providers and solutions
#security #password
Attackers are using many types of attacks to compromise business-critical data. These can include zero-day attacks, supply chain attacks, and others. However, one of the most common ways that hackers get into your environment is by compromising passwords.
The password spraying attack is a special kind of password attack that can prove effective in compromising your environment. Let's look closer at the password spraying attack and how organizations can prevent it:
https://thehackernews.com/2021/08/how-companies-can-protect-themselves.html
Attackers are using many types of attacks to compromise business-critical data. These can include zero-day attacks, supply chain attacks, and others. However, one of the most common ways that hackers get into your environment is by compromising passwords.
The password spraying attack is a special kind of password attack that can prove effective in compromising your environment. Let's look closer at the password spraying attack and how organizations can prevent it:
https://thehackernews.com/2021/08/how-companies-can-protect-themselves.html
#video #5G #security in #Ukrainian
What makes 5G mobile network different from the previous generations? Why 5G security becomes crucial topic of nowadays? Which standards, frameworks and best practices support market players to provide security assurance in this area?
https://youtu.be/kUuCF-POB6Q
What makes 5G mobile network different from the previous generations? Why 5G security becomes crucial topic of nowadays? Which standards, frameworks and best practices support market players to provide security assurance in this area?
https://youtu.be/kUuCF-POB6Q
YouTube
5G Security - Challenges and Responses (Sergiy Rekun)
What makes 5G mobile network different from the previous generations? Why 5G security becomes crucial topic of nowadays? Which standards, frameworks and best practices support market players to provide security assurance in this area?
#docker #WSL #Windows
https://www.bleepingcomputer.com/news/microsoft/easywsl-turns-linux-docker-images-into-a-windows-10-wsl-distro/
https://www.bleepingcomputer.com/news/microsoft/easywsl-turns-linux-docker-images-into-a-windows-10-wsl-distro/
BleepingComputer
EasyWSL turns Linux docker images into a Windows 10 WSL distro
If you can't find your favorite Windows Subsystem for Linux distribution available in the Microsoft Store, a new program called EasyWSL can convert almost any Linux Docker image into a WSL distro.