blog_id,author_id,blog_title,blog_content,blog_link,blog_img,topic 1,4,Let’s Dominate The Launchpad Space Again,"Hello, fam! If you’ve been with us since 2021, you probably remember our first announcements regarding the strategies to dominate the launchpad space in the previous bull. To recall it once more, it was (1) first upgrading our launchpad tier system and then (2) going full-deep into blockchain gaming while…",https://medium.com/@seedifyfund/lets-dominate-the-launchpad-space-again-7155875002f3?source=topics_v2---------0-84--------------------99dddee2_0334_40c4_901c_47e0e6948b6c-------17,https://miro.medium.com/fit/c/140/140/1*nByLJrDhJHndW_wRv4k3JA.png,ai 3,4,Let’s Dominate The Launchpad Space Again,"Hello, fam! If you’ve been with us since 2021, you probably remember our first announcements regarding the strategies to dominate the launchpad space in the previous bull. To recall it once more, it was (1) first upgrading our launchpad tier system and then (2) going full-deep into blockchain gaming while…",https://medium.com/@seedifyfund/lets-dominate-the-launchpad-space-again-7155875002f3?source=topics_v2---------0-84--------------------99dddee2_0334_40c4_901c_47e0e6948b6c-------17,https://miro.medium.com/fit/c/140/140/1*nByLJrDhJHndW_wRv4k3JA.png,ai 4,7,Using ChatGPT for User Research,"Applying AI to 4 common user research activities — User research is a fundamental part of the design process. The more time and energy a product team invests in user research, the higher the chances of releasing a commercially successful product. In this article, I will explore whether ChatGPT can be helpful for user and market research. To make…",https://medium.com/ux-planet/using-chatgpt-for-user-research-5c3bdf7e26af?source=topics_v2---------1-84--------------------99dddee2_0334_40c4_901c_47e0e6948b6c-------17,https://miro.medium.com/fit/c/140/140/1*TZSGnNza4YgHJJ4yeKdVUw.png,ai 5,8,"The Automated Stable-Diffusion Checkpoint Merger, autoMBW.","Checkpoint merging is powerful. The power of checkpoint merging is undeniable. With the introduction of bbc-mc’s sdweb-merge-block-weighted-gui extension, the potential for checkpoint merging has increased exponentially in comparison to older methods. In fact, this method is so powerful that most of all modern merged models incorporate MBW merges in their…",https://medium.com/@media_97267/the-automated-stable-diffusion-checkpoint-merger-autombw-44f8dfd38871?source=topics_v2---------2-84--------------------99dddee2_0334_40c4_901c_47e0e6948b6c-------17,https://miro.medium.com/fit/c/140/140/1*x3N_Hjgu_MjFyc6-kyxUxw.png,ai 6,9,The Art of Lazy Creativity: My Experience Co-Writing a Monty Python Style Sketch with AI,"I was feeling particularly lazy one day and couldn’t be bothered to write anything. So, I turned to ChatGPT, the AI language model, to help me out. But even that was too much effort, so I asked ChatGPT to write this article too. And boy, did it deliver! So, here’s…",https://medium.com/@digitalshedmedia/the-art-of-lazy-creativity-my-experience-co-writing-a-monty-python-style-sketch-with-ai-869bf5ff6a06?source=topics_v2---------3-84--------------------99dddee2_0334_40c4_901c_47e0e6948b6c-------17,https://miro.medium.com/fit/c/140/140/0*m2DdeTvRYz8Cpor2,ai 7,10,LLaMA: Everything you want to know about Meta’s new AI model,"Facebook’s Parent Company Just Released a Game-Changing AI Model — Here’s What You Need to Know! — In the tech world, people have been focusing on the language models developed and deployed by Microsoft, Google, and OpenAI for the past few weeks. However, Meta, Facebook’s parent company, has also been making significant progress in this field and is releasing a new AI language generator called LLaMA.",https://medium.com/predict/llama-everything-you-want-to-know-about-metas-new-ai-model-bef3614fd664?source=topics_v2---------4-84--------------------99dddee2_0334_40c4_901c_47e0e6948b6c-------17,https://miro.medium.com/fit/c/140/140/0*BYN6lVOccANIKORp,ai 9,12,Mendeleev vs chatGPT and Microsoft Bing,"Mendeleev taught us the power of thinking deeply to find explanations Black box approaches are increasingly popular in AI, machine learning, and computational data science. By black box, I mean computational approaches that make predictions without explaining their rationale. …",https://medium.com/@brentstockwell/mendeleev-vs-chatgpt-and-microsoft-bing-7549541a267a?source=topics_v2---------6-84--------------------99dddee2_0334_40c4_901c_47e0e6948b6c-------17,https://miro.medium.com/fit/c/140/140/1*fiykku0EFni-q8gJND6C9w.jpeg,ai 10,13,Weekly Design Inspiration #389,via Muzli design inspiration — The best design inspiration — expertly curated for you. Muzli is a new-tab Chrome extension that instantly delivers relevant design stories and inspiration. Learn more,https://medium.com/muzli-design-inspiration/weekly-design-inspiration-389-d59b05d793c8?source=topics_v2---------7-84--------------------99dddee2_0334_40c4_901c_47e0e6948b6c-------17,https://miro.medium.com/fit/c/140/140/1*YwyhjjL9f-wWnais6xnR9Q.png,ai 11,14,Generate Phishing Emails in Seconds with AI and Python,"Disclaimer: This post is for informational and educational purpose only, and for those who’re willing and curious to understand about how ChatGPT can be used to generate phishing awareness emails for phishing campaigns. Do NOT attempt to violate the law with anything contained here as you’re solely responsible for your…",https://medium.com/@ruihn/generate-phishing-emails-in-seconds-with-ai-and-python-cb7bacfc7fbb?source=topics_v2---------8-84--------------------99dddee2_0334_40c4_901c_47e0e6948b6c-------17,https://miro.medium.com/fit/c/140/140/1*G6zypvs-HRPeOULxOXSZ2Q.png,ai 12,15,Why You’re the Biggest Loser in the AI Wars,"Microsoft and Google decided to make everyday users bear the risks — In the world of online search, Google is an 800-pound gorilla sitting on a giant pile of bananas, while Microsoft is a mischievous monkey looking for trouble. “I hope that, with our innovation, [Google] will definitely want to come out and show that they can dance,” Microsoft CEO said after…",https://medium.com/geekculture/why-youre-the-biggest-loser-in-the-ai-wars-62824a5f1786?source=topics_v2---------9-84--------------------99dddee2_0334_40c4_901c_47e0e6948b6c-------17,https://miro.medium.com/fit/c/140/140/1*TN-cHYpyIFHYaeJy5mbMUg.png,ai 13,16,Fate Healed Her Broken Heart — Love Hides Right in Front of Your Eyes,"Can AI convey these emotions and destiny? — We all have them. Moments when your lungs squeeze tight, your head spins, and your feet seek level ground as you reel from a shocking event. Tragedies. A broken heart. Devastation overtakes our brains, and that sinking feeling of despair suffocates us. People may question if they will survive the moment in time when…",https://medium.com/the-engage/fate-healed-her-broken-heart-love-hides-right-in-front-of-your-eyes-a71dd7a34480?source=topics_v2---------10-84--------------------573b1f8c_ca12_4aa3_904f_b1e1a7386ccc-------17,https://miro.medium.com/fit/c/140/140/1*NLiw71022WVq-2SPhvJpjA.jpeg,ai 15,18,"Yes, ChatGPT Can Hurt Writers, But Not The Way You Think","7 things most writers don’t know about ChatGPT and AI (including image creation) but probably should. — Ever since ChatGPT, everyone seems to have an opinion. Some love it. Others hate it. Some think AI will never be as good as a human writer. No soul, they say. Musician Nick Cave called ChatGPT “replication as travesty.” Some fan used AI to create a song in Cave’s “style”…",https://medium.com/inspired-writer/yes-chatgpt-can-hurt-writers-but-not-the-way-you-think-f5118e0307db?source=topics_v2---------12-84--------------------573b1f8c_ca12_4aa3_904f_b1e1a7386ccc-------17,https://miro.medium.com/fit/c/140/140/1*yqv9muJMOO9MXAS77zh6gQ.jpeg,ai 17,20,The Ultimate ChatGPT Prompt: Content that Outsmarts AI Detectors with 99% Accuracy,"For writers, marketers, entrepreneurs, and students that want Human Generated Content from ChatGPT. First step: Ask ChatGPT to write something. I asked it for a story about a rabbit using blockchain. Here’s its response ?",https://medium.com/datadriveninvestor/the-ultimate-chatgpt-prompt-content-that-outsmarts-ai-detectors-with-99-accuracy-ef20d81582bb?source=topics_v2---------14-84--------------------573b1f8c_ca12_4aa3_904f_b1e1a7386ccc-------17,https://miro.medium.com/fit/c/140/140/0*QsOy5T_LgfyJNNSm,ai 18,21,ChatGPT Wrote The WGA About The Impeding Strike,"By ChatGPT and (kind of Matt Allen) There’s a lot of excitement and fear out there when it comes to all this AI talk and labor negotiations. As a 22 year member of the Writer’s Guild of America, I heard all about it at the big “we might strike” meeting…",https://medium.com/@matt.ryanallen/chatgpt-wrote-the-wga-about-the-impeding-strike-51d9981c5619?source=topics_v2---------15-84--------------------573b1f8c_ca12_4aa3_904f_b1e1a7386ccc-------17,https://miro.medium.com/fit/c/140/140/1*f4iIIdfL_u8mJnTith97ZQ.png,ai 19,22,Microsoft Teams 2.0: React + OpenAI!,"Completely Rebuilt, Better Performance, More Features + ChatGPT — Things are starting to get exciting at Microsoft these days. Their $10 Billion investment in OpenAI is the catalyst for evolution in many of their legacy business applications such as Word, Excel, PowerPoint, Bing and everyone’s corporate nemesis Microsoft Teams. Now Microsoft will be launching a new version of its…",https://medium.com/@scott_priestley/microsoft-teams-2-0-react-openai-742813dc0f00?source=topics_v2---------16-84--------------------573b1f8c_ca12_4aa3_904f_b1e1a7386ccc-------17,https://miro.medium.com/fit/c/140/140/0*H6XOEWOX_V-rSF93.png,ai 20,23,How can you get around ChatGPTs restricitions (and have fun with it),"There’s a lot of funny ways to get around ChatGPTs restrictions and get it to work in different ways than intended. In this article I’ll show you some known possibilites to get ChatGPT working in completely different ways, than it’s creators intended it to. …",https://medium.com/@pmsquared/how-can-you-get-around-chatgpts-restricitions-and-have-fun-with-it-2eb996ac6b02?source=topics_v2---------17-84--------------------7cd95632_a245_46f7_80da_9407110bdbad-------17,https://miro.medium.com/fit/c/140/140/0*x5Q3dAPPWZ_NK8b-,ai 21,24,How to read a website with ChatGPT using web-to-text,"If you’re working with the ChatGPT API, you may need to extract text from websites to provide context for your responses. The web-to-text node module makes it easy to extract plain text from web pages, which you can then pass on to ChatGPT for analysis. In this tutorial, we'll show…",https://medium.com/@ianscott313/how-to-read-a-website-with-chatgpt-using-web-to-text-f6487010a90b?source=topics_v2---------18-84--------------------7cd95632_a245_46f7_80da_9407110bdbad-------17,https://miro.medium.com/fit/c/140/140/1*dS2zwP8SSmRrjifJ4xE8Lw.png,ai 22,25,AI Introduction Series || Part 3: Identifying use cases and business opportunities to leverage AI/ML algorithms,"This is part 3 of my AI introduction series. Click the following links to read part 1 and part 2. Introduction: On the cusp of change & various AI/ML Opportunities The recent activity within the field of artificial intelligence and machine learning (AI/ML), driven by tools such as DALL-E 2 & ChatGPT, has fueled interest across industry sectors. People across…",https://medium.com/@thethirdfrank_28077/ai-introduction-series-part-3-identifying-use-cases-and-business-opportunities-to-leverage-7cd7de3d8d1b?source=topics_v2---------19-84--------------------7cd95632_a245_46f7_80da_9407110bdbad-------17,https://miro.medium.com/fit/c/140/140/1*x5aeRa4h0JLJGaqyHrrS_w.png,ai 23,26,"Why AI art can be real art, opening new and exciting ways for modern artists to express themselves","Art has been an expression of creativity since the dawn of humanity. From the earliest cave paintings to the most avant-garde installations, art has been a medium through which people express their thoughts, emotions, and ideas. With the advent of Artificial Intelligence (AI), the world of art has been disrupted…",https://medium.com/@themarco/why-ai-art-can-be-real-art-opening-new-and-exciting-ways-for-modern-artists-to-express-themselves-fcff3a7efb77?source=topics_v2---------20-84--------------------7cd95632_a245_46f7_80da_9407110bdbad-------17,https://miro.medium.com/fit/c/140/140/0*5tSk6nuwQTNTGxRC,ai 24,27,3 Ways I’m Using ChatGPT to 10x My Writing,"Learn How to Harness the Power of ChatGPT for More Effective Writing — AI writing tools are all the rage, but ChatGPT is leading the pack. It’s quickly become one of the most popular options out there. As a power user, I’ve picked up some tips on how to get the most out of it. But first, let’s start with why most people…",https://medium.com/@michael-macaulay/3-ways-im-using-chatgpt-to-10x-my-writing-e83d6e252a27?source=topics_v2---------21-84--------------------7cd95632_a245_46f7_80da_9407110bdbad-------17,https://miro.medium.com/fit/c/140/140/1*3MtFp_HCvIdMcA_jejScmw.jpeg,ai 25,28,Support Vector Machines — Tutorial,How to use SVMs in classification problems with examples. Trying to choose a Machine Learning model for your classification problem might be challenging and one can easily get lost while looking after the best model for the problem. …,https://medium.com/@alonbarak3110/support-vector-machines-tutorial-621ceafa03a0?source=topics_v2---------22-84--------------------7cd95632_a245_46f7_80da_9407110bdbad-------17,https://miro.medium.com/fit/c/140/140/1*FviuqPwxYSaL6zCNtcrK7A.png,ai 26,29,Does Meta’s new AI destroy ChatGPT?,"Toolform, a revolutionary approach to Gen AI — In the gloomy, dimly lit room, I sit and stare in solemn gloom, As visions of lollipops appear, Their sweet allure, too much to bear. I’ve just asked ChatGPT to impersonate Edgar Allan Poe in a verse about lollipops. Impressive. Yet, ChatGPT absolutely sucks at other aspects, like simple maths…",https://medium.com/@ignacio.de.gregorio.noblejas/toolform-chatgpt-evolution-76799c8b6dcf?source=topics_v2---------23-84--------------------7cd95632_a245_46f7_80da_9407110bdbad-------17,https://miro.medium.com/fit/c/140/140/0*KeoO3njXutCgZMt_,ai 27,30,AI friend of humanity?,"Or why you should stop hesitating and start using AI tools in your work Are you afraid of artificial intelligence? It’s a question that many people are asking themselves these days, as AI technology continues to advance at a rapid pace. While there are certainly valid reasons to be cautious…",https://medium.com/@mbvyn/ai-friend-of-humanity-978b7f4cdc9f?source=topics_v2---------24-84--------------------7cd95632_a245_46f7_80da_9407110bdbad-------17,https://miro.medium.com/fit/c/140/140/0*hwCIY1c8d8-DT5VJ,ai 28,31,Best Papers on Large Language Models,"10+ Must-Read Papers on LLMs — These days AI tools are becoming more popular day by day. Most of these tools are based on Generative models. Recently with the emergence of tools like ChatGPT people tend to learn the inner working of these models. In this article, we will look into some of the must-read papers…",https://medium.com/@anjanasamindraperera/best-papers-on-large-language-models-ac01b13b94b3?source=topics_v2---------25-84--------------------79f17ad9_c6ee_4bd1_b2aa_e4075963909f-------17,https://miro.medium.com/fit/c/140/140/0*CvMlwhuV5224RvGU,ai 29,32,Getting started with the ChatGPT API.,"As an AI language model, ChatGPT can generate natural language text in response to prompts given to it. Introduction As an AI language model, ChatGPT can generate natural language text in response to prompts given to it. The ChatGPT API allows developers to integrate this powerful technology into their own personal…",https://medium.com/@engageintellect/getting-started-with-the-chatgpt-api-c998aaaf20f?source=topics_v2---------26-84--------------------79f17ad9_c6ee_4bd1_b2aa_e4075963909f-------17,https://miro.medium.com/fit/c/140/140/0*stnr8kB_87abewfn,ai 30,33,What’s All the Fuss About the ChatGPT AI Writing Tool?,Here’s what I found out when I took it out for a spin — ChatGPT is the newest AI chat bot writing tool that’s got everyone talking. So I took it for a spin to see what all the fuss was about. And I’ve got to say I’m impressed. …,https://medium.com/midform/whats-all-the-fuss-about-chatgpt-a31ad9812d29?source=topics_v2---------27-84--------------------79f17ad9_c6ee_4bd1_b2aa_e4075963909f-------17,https://miro.medium.com/fit/c/140/140/1*JnkRKgWqk2I6Qfb0ngA_2Q.png,ai 31,34,My Interview to Sam Altman (ChatGPT’s version of),"TWM: Act as Sam Altman ChatGPT’s SA: Hello! I’m Sam Altman. I’m an entrepreneur, investor, and the CEO of OpenAI. How can I help you today? TWM: What is your opinion on artificial intelligence? ChatGPT’s SA: As the CEO of OpenAI, I believe that artificial intelligence (AI) has the potential…",https://medium.com/@ury_uri/my-interview-to-chatgpts-version-of-sam-altman-31a89089ca7c?source=topics_v2---------28-84--------------------79f17ad9_c6ee_4bd1_b2aa_e4075963909f-------17,https://miro.medium.com/fit/c/140/140/1*gGoAuelQ3CHaevD6y78lLw.jpeg,ai 32,35,9 New AI Apps That Will TRANSFORM Your Life March 2023,"Introduction Every day, a large number of new AI tools are released. So here is a list of my top 9 AI technologies for March 2023 that i feel will amaze you. 1. Lex.page",https://medium.com/@endasheridan/9-new-ai-apps-that-will-transform-your-life-march-2023-1e2ab0eb38dc?source=topics_v2---------29-84--------------------79f17ad9_c6ee_4bd1_b2aa_e4075963909f-------17,https://miro.medium.com/fit/c/140/140/0*glzOPE0Wb2GYr9Nn,ai 33,36,Bye-Bye Siri: Here Is How You Can Talk To ChatGPT Instead,"A fun little project that takes less than 5 minutes! — For weeks, I tried my best not to write about Chat GPT. Believe me, I’m also tired to see it in every headline. But this little hack made me change my mind — it’s just too cool not to share. Tip: In case you haven’t heard about Siri Shortcuts yet…",https://medium.com/dare-to-be-better/bye-bye-siri-here-is-how-you-can-talk-to-chatgpt-instead-29f6b52386c3?source=topics_v2---------30-84--------------------79f17ad9_c6ee_4bd1_b2aa_e4075963909f-------17,https://miro.medium.com/fit/c/140/140/1*jf_n1EhwZbTwoly4BSB-Zw.png,ai 34,37,How to Make Money Online in 2023 — the ChatGPT’s Response?,"So, I asked the AI algorithm to tell me ways of making money online in 2023 and beyond. Here’s how it responded! — Making money online is a popular topic and for a good reason. The internet has opened up countless opportunities for people to earn money from the comfort of their own homes. …",https://medium.com/geekculture/how-to-make-money-online-in-2023-the-chatgpts-response-89a3e80999?source=topics_v2---------31-84--------------------79f17ad9_c6ee_4bd1_b2aa_e4075963909f-------17,https://miro.medium.com/fit/c/140/140/0*-Mag5tIfR4TgWW9P,ai 35,38,How LZW Compression Works: Explained in Plain English,"LZW Compression is a lossless data compression algorithm that is widely used for compressing text and image files. It was first introduced by Abraham Lempel, Jacob Ziv, and Terry Welch in 1977, and has since become one of the most popular compression algorithms due to its efficiency and simplicity. In…",https://medium.com/@alhuslanr/how-lzw-compression-works-explained-in-plain-english-9b8b520dbc53?source=topics_v2---------0-84--------------------949d8756_6352_4bea_9392_aa8ff3b45be1-------17,https://miro.medium.com/fit/c/140/140/1*imU_sqpgXeZ_eqaKUjyT7w.png,image-processing 36,39,EDGE DETECTION,"Hey, if you want to know how edges are detected in an image, then you are in the right spot. Human eyes can detect the edges of an object and even an image right? But how will your computer recognize the edges in an object and an image? …",https://medium.com/@likhithligowda18/edge-detection-5d34f9703333?source=topics_v2---------1-84--------------------949d8756_6352_4bea_9392_aa8ff3b45be1-------17,https://miro.medium.com/fit/c/140/140/1*APAJbWbJ2KTxV77TidCVwA.png,image-processing 37,40,Performing Face Detection with OpenCV in Python,"Facial detection has become a common practice in various applications like security, entertainment, and biometrics. OpenCV is a popular computer vision library that can be used to detect faces in images and videos. …",https://medium.com/@pelinokutan/performing-face-detection-with-opencv-in-python-4b1bd540265?source=topics_v2---------2-84--------------------949d8756_6352_4bea_9392_aa8ff3b45be1-------17,https://miro.medium.com/fit/c/140/140/0*Peoo-O9oCSJZttnR,image-processing 38,39,BLOG ON HAAR CASCADE,"• Hey, you see facial recognition everywhere, from the security camera in the front of your house to your sensor on your mobile phone. • But how exactly does facial recognition work to classify faces, considering the large number of features as input and the striking similarities between humans? …",https://medium.com/@likhithligowda18/blog-on-haar-cascade-6f17cf7fde2c?source=topics_v2---------3-84--------------------949d8756_6352_4bea_9392_aa8ff3b45be1-------17,https://miro.medium.com/fit/c/140/140/1*zTT1z5_jyTzJqUNUjq8TwQ.png,image-processing 39,41,Resuming Work on CinkPipeline,"I worked on this about a month ago. Got sidetracked with other projects, job recruiters, stuff. Now I’m getting back to it.",https://medium.com/@drunkenufopilot/resuming-work-on-cinkpipeline-e337becd669d?source=topics_v2---------4-84--------------------949d8756_6352_4bea_9392_aa8ff3b45be1-------17,https://miro.medium.com/fit/c/140/140/1*0d0jw79JYjl3ns3HFeoCCg.jpeg,image-processing 40,43,Introducing The Core Bridge Powered by LayerZero,"LayerZero is powering Core’s bridge to the broader blockchain ecosystem, enabling greater cross-chain interoperability and officially supporting assets including USDC, USDT, and WETH. As expressed in the Core x LZ integration announcement, Core DAO could not be more excited for this revolutionary technology marking a new epoch in blockchain development. Connecting the Blockchain World …",https://medium.com/@core_dao/introducing-the-core-bridge-powered-by-layerzero-b4185db9d92e?source=topics_v2---------0-84--------------------c6cb0d96_f524_4415_952b_8bdeda2b2228-------17,https://miro.medium.com/fit/c/140/140/0*oGoV-CsYqg6TOdav,Cryptocurrency 41,44,Revealing The Open Beta Roadmap — Join us on the Epic Journey,"Get ready for an epic ride! The Vela Exchange team is thrilled to present the roadmap of our beta phase, which showcases the most significant developments and events on the horizon. Vela’s beta has been an incredible experience that allowed us to connect deeply with our community, improve our platform…",https://medium.com/@vela_exchange/revealing-the-open-beta-roadmap-join-us-on-the-epic-journey-45c2ac311e3b?source=topics_v2---------1-84--------------------c6cb0d96_f524_4415_952b_8bdeda2b2228-------17,https://miro.medium.com/fit/c/140/140/0*eRkw0--BctB7WR3z,Cryptocurrency 42,45,Upcoming February Treasury Wallet Movements,"One of the core goals of the Render Network Foundation’s formation was to provide more transparency to the community. We are going to use this post to detail Treasury wallet movements which we are expecting this week, and to explain why these movements are occurring. What is Happening and Why? You can expect to see…",https://medium.com/render-token/upcoming-february-treasury-wallet-movements-aabd4253f23f?source=topics_v2---------2-84--------------------c6cb0d96_f524_4415_952b_8bdeda2b2228-------17,https://miro.medium.com/fit/c/140/140/1*LImHrJR5kSJqS4Oi_vBYTw.png,Cryptocurrency 43,46,"LunarCrush Levels 1, 2, 3, 4, 5 are now simply: Basic and Pro!","Since we replatformed, redesigned, and launched LunarCrush over a year and a half ago, we have thought deeply about simplicity and openness. We host the largest collection of crypto analytics available in the industry. We track over 4000+ cryptocurrencies, thousands of stocks, and hundreds of various NFT projects. We…",https://medium.com/lunarcrush/lunarcrush-levels-1-2-3-4-5-are-now-simply-basic-and-pro-6866645b0655?source=topics_v2---------3-84--------------------c6cb0d96_f524_4415_952b_8bdeda2b2228-------17,https://miro.medium.com/fit/c/140/140/0*t8yLXAmcIJQzaaW1,Cryptocurrency 44,47,The truth behind ESPL $ARENA IFO on PancakeSwap,"After much deliberation from the ESPL team, we have decided to disclose the events leading up to the current episode with PancakeSwap. This is not a smear campaign, but we want to ensure all parties are held accountable and show a firm commitment to care for all $ARENA token holders…",https://medium.com/@ESPL_Arena/the-truth-behind-espl-arena-ifo-on-pancakeswap-19cf268122b4?source=topics_v2---------4-84--------------------c6cb0d96_f524_4415_952b_8bdeda2b2228-------17,https://miro.medium.com/fit/c/140/140/1*T0ILTQqfM8g8yBcjMdTC1A.jpeg,Cryptocurrency 46,49,First Days in the New City,"BNB Chain construction launch results — Though it has only been a week since the opening of BNB World, the city is already buzzing, signaling the start of an exciting new chapter in our journey as every player is trying to win the race of manufacturers before The Builder release. During the first 7 days, players…",https://medium.com/@megacryptopolis/first-days-in-the-new-city-23249fd791b2?source=topics_v2---------6-84--------------------c6cb0d96_f524_4415_952b_8bdeda2b2228-------17,https://miro.medium.com/fit/c/140/140/1*TmzM9yIfzhsjQB38GcdMfg.png,Cryptocurrency 47,50,2/24/23 Weekly Recap,"•Polylastic’s Staking Program Will Be Extended! The POLX and POLX/MATIC LP Staking Program ends on March 1st. Stakers will have the opportunity to unstake at this time, without penalty. We have decided that because of great interest in continuing this program, we will renew the staking program for an additional…",https://medium.com/@polylastic/2-24-23-weekly-recap-ec1974fd571e?source=topics_v2---------7-84--------------------c6cb0d96_f524_4415_952b_8bdeda2b2228-------17,https://miro.medium.com/fit/c/140/140/0*expvzq2faz4ws_o_.jpeg,Cryptocurrency 48,51,TFM — The first-ever miner with 0% tax.,"Hello, my name is Nelson, join me as we look into TFM — The Fortune Miner. TFM is the new dapp coming to the Fortune Hunters Ecosystem. It will be a BNB miner with a 3.33% daily yield (in miners). …",https://medium.com/@Nelson_Crypto_Journey/tfm-the-first-ever-miner-with-0-tax-acbe659c861f?source=topics_v2---------8-84--------------------c6cb0d96_f524_4415_952b_8bdeda2b2228-------17,https://miro.medium.com/fit/c/140/140/1*bvDBAnxzakUoCWr5jzRDEg.png,Cryptocurrency 49,52,What the heck is a dotName?,"Imagine being able to replace your ERC-20 address on multiple EVM chains with customisable pseudonyms, and have your assets on these multiple chains talk to each other and report to one central domain controlled by your main wallet. That is the goal of dotNames. We aren’t here to compete with…",https://medium.com/@dotnames76_35683/what-the-heck-is-a-dotname-4a1fc893f75f?source=topics_v2---------9-84--------------------c6cb0d96_f524_4415_952b_8bdeda2b2228-------17,https://miro.medium.com/fit/c/140/140/1*byPbgwTXZNua5kJL5bs2xA.png,Cryptocurrency 50,54,How to Create an Effective Self-Study Routine to Teach Yourself Data Science Successfully,"Here’s how to set a self-study routine that you’ll actually stick to while learning data science — While self-studying data science, you’ll find yourself in one of two hypothetical settings: on an escalator or a staircase. Those who laid the groundwork by making a curriculum of everything they need to learn, set daily, weekly, monthly, and yearly goals to help guide their progress, and continued to tweak…",https://medium.com/towards-data-science/how-to-create-an-effective-self-study-routine-to-teach-yourself-data-science-successfully-6248c7ec3a53?source=topics_v2---------0-84--------------------dc9419a5_e677_4373_babf_12564ccfbee8-------17,https://miro.medium.com/fit/c/140/140/0*sEJ_z8-V4FHjMVhy,data-science 51,55,Here’s why your efforts to extract value from data are going nowhere,"The industry-wide neglect of data design and data quality (and what you can do about it) — My favorite way of explaining the difference between data science and data engineering is this: If data science is “making data useful,” then data engineering is “making data usable.” These disciplines are so exciting that it’s easy to get ahead of ourselves and forget that before we can make data…",https://medium.com/@kozyrkov/heres-why-your-efforts-extract-value-from-data-are-going-nowhere-8e4ffacbdbc0?source=topics_v2---------1-84--------------------dc9419a5_e677_4373_babf_12564ccfbee8-------17,https://miro.medium.com/fit/c/140/140/0*GTXwG-Cro5S5250z.png,data-science 52,56,The Ultimate Python and Tensorflow Set-Up Guide for Apple Silicon Macs (M1 & M2),"Installing TensorFlow and Python on ARM Macs was never easier — I switched jobs one year ago and I found myself with a brand new M1 MacBook Pro to work with. I had to install everything a data scientist needs, which was a real pain. To make things worse, it turns out that I didn’t set it up properly and it…",https://medium.com/towards-data-science/the-ultimate-python-and-tensorflow-set-up-guide-for-apple-silicon-macs-m1-m2-e9ef304a2c06?source=topics_v2---------2-84--------------------dc9419a5_e677_4373_babf_12564ccfbee8-------17,https://miro.medium.com/fit/c/140/140/0*hC7hysciy4XPglrC,data-science 53,57,When will my VanMoof be delivered?,"If you ordered a VanMoof bike last year, you may still be waiting for delivery. There are many reasons for this delay, as the world of mobility has undergone a transformation in recent years, with a move towards clean energy sources such as solar, wind, and water. …",https://medium.com/@vanmoofer/when-will-my-vanmoof-be-delivered-bcaf419bfd69?source=topics_v2---------3-84--------------------dc9419a5_e677_4373_babf_12564ccfbee8-------17,https://miro.medium.com/fit/c/140/140/1*-mlRwVjKJ1IGE12V5sWSLQ.png,data-science 54,58,What Should Be Considered When Creating a Custom Dataset for Working with YOLO?,"Based on my experience & experiment When you want to train your own model using a custom dataset, you may have some questions about what to do, especially if you’ve just started working with YOLO. …",https://medium.com/@kevserbusrayildirim/what-should-be-considered-when-creating-a-custom-dataset-for-working-with-yolo-fceeb2ac9cb8?source=topics_v2---------4-84--------------------dc9419a5_e677_4373_babf_12564ccfbee8-------17,https://miro.medium.com/fit/c/140/140/1*BGz7r5atHXe0YHH_quD_-w.jpeg,data-science 55,59,How To Create Data Visualisation Using ChatGPT,"Data viz is like the final step in delivering insights. Analyst craft beautiful insights but sometimes they don’t have enough time to create amazing visualizations. Unfortunately, this can take away from the effectiveness of their insights Nowadays, Ai tools are available to help data analysts enhance their data visualizations. With…",https://medium.com/@mr.tarik098/how-to-create-data-visualisation-using-chatgpt-aeae14b28308?source=topics_v2---------5-84--------------------dc9419a5_e677_4373_babf_12564ccfbee8-------17,https://miro.medium.com/fit/c/140/140/1*vO_GWJdG4rUcuqui86hQAA.jpeg,data-science 56,60,Quantifying Efficiency in Ridesharing Marketplaces,"by Alex Chin and Tony Qin The health of Lyft’s marketplace depends on how riders and drivers are distributed across space and time. Within the complex rideshare space, it is not easy to define typical marketplace concepts like “market efficiency” and “supply-demand balance”. A simple question such as “Do we…",https://medium.com/lyft-engineering/quantifying-efficiency-in-ridesharing-marketplaces-affd53043db2?source=topics_v2---------6-84--------------------dc9419a5_e677_4373_babf_12564ccfbee8-------17,https://miro.medium.com/fit/c/140/140/0*T_omt3w-ecotuDG7,data-science 57,61,ChatGPT vs Google Search — Who Wins?,"Understanding the core differences through use cases — Hello Friends! Welcome to my article on ChatGPT. Recently, there has been a surge in queries about ChatGPT like what it does?, whether it can replace Google search? or whether it is performing better, and so forth. I tried my best to keep this article short and simple and test…",https://medium.com/@anirbanmj16/chatgtp-vs-google-search-who-wins-4004c71f1083?source=topics_v2---------7-84--------------------dc9419a5_e677_4373_babf_12564ccfbee8-------17,https://miro.medium.com/fit/c/140/140/0*r684WqJCxQ-jeNRQ,data-science 58,62,Polars vs Pandas — 4 key concept differences,"Understanding key differences between the concepts in Pandas and Polars Data Science libraries — Introduction Apache Arrow vs Numpy array representation Index/multi-index Support for parallel operations Query evaluation Conclusion Introduction Python’s Pandas library has long been the go-to for data scientists, offering an intuitive DataFrame model for working with small datasets. However, when it comes to handling massive amounts of data, Pandas can slow down considerably. …",https://medium.com/@datasciencedisciple/polars-vs-pandas-4-key-concept-differences-3c09713c0fe8?source=topics_v2---------8-84--------------------dc9419a5_e677_4373_babf_12564ccfbee8-------17,https://miro.medium.com/fit/c/140/140/0*RWkQ0Fziw792xa0S,data-science 59,63,Meta Releases LLaMA: Will It Fail Too?,"Meta is releasing LLaMA to compete with PaLM and Chinchilla. Will it suffer the same fate as Blenderbot and Galactica? Or the third time is a charm? Peeps! Let’s talk tech! You may have heard all the buzz lately about language models developed by big names like Microsoft, Google, and OpenAI. But let’s not…",https://medium.com/@ithinkbot/meta-releases-llama-will-it-fail-too-7a1d48f230b2?source=topics_v2---------9-84--------------------dc9419a5_e677_4373_babf_12564ccfbee8-------17,https://miro.medium.com/fit/c/140/140/0*VYuugKpm3o3Xn97P,data-science 60,64,A Beginner’s Guide to Docker for Building and Deploying ReactJS Applications,"Welcome to this beginner’s guide to Docker for building and deploying ReactJS applications. Docker is a powerful containerization technology that allows developers to package applications and their dependencies into a portable and consistent format. This makes it easier to manage and deploy applications across different environments, while also improving their…",https://medium.com/@ahsanjavedch01/a-beginners-guide-to-docker-for-building-and-deploying-reactjs-applications-74dbd22066b5?source=topics_v2---------0-84--------------------a946668d_4714_4069_9820_906a45d1ce76-------17,https://miro.medium.com/fit/c/140/140/1*mUXwQFbC1jTAfkwUFYxy_A.png,dev-ops 61,65,Infrastructure as Code using Terraform,"A beginner’s guide to Terraform with Microsoft Azure Infrastructure as Code(IaC) allows you to manage, build and maintain the versions of the infrastructures with configuration files. The IaC process is a faster approach compared to the manual process. This code-based approach makes things easier to get done in less time…",https://medium.com/@mohamedsazni/infrastructure-as-code-using-terraform-809a4cedea16?source=topics_v2---------1-84--------------------a946668d_4714_4069_9820_906a45d1ce76-------17,https://miro.medium.com/fit/c/140/140/1*aJPzBIUo4tipOo8707GFsw.png,dev-ops 62,66,VS CODE EXTENSION(S) EVERY DEVELOPER MUST KNOW,"As a software developer, you are likely using VS code extensions. Extensions are a helping tool for developers to make their work environment easy and friendly. Different developers use different extensions according to their work and the language used. In this article, I will share my top five extensions that…",https://medium.com/@kzajjaj/vs-code-extension-s-every-developer-must-know-686f7587893c?source=topics_v2---------2-84--------------------a946668d_4714_4069_9820_906a45d1ce76-------17,https://miro.medium.com/fit/c/140/140/1*vUKBvwLkAt1lQwITM4-0gg.jpeg,dev-ops 63,67,Scaling microservices alerting with Zero Ops.,"The tale of ownership and people who loved to sleep. Alerting management automation that delivers. TLDR; Imagine, you push something to main (for the first time, maybe) and within 15 seconds after a successful deployment to production with a pipeline associated with the main branch - you (and your teammates) are…",https://medium.com/@kiselev_ivan/scaling-microservices-alerting-with-zero-ops-99800db87efc?source=topics_v2---------3-84--------------------a946668d_4714_4069_9820_906a45d1ce76-------17,https://miro.medium.com/fit/c/140/140/1*SQcXqQacOmDEGwfutRN5mQ.png,dev-ops 64,68,From Charts to Code: Which Tool Is Right for Your Kubernetes Deployment Needs?,"Kubernetes has become the go-to solution for managing containerised applications, but deploying and managing applications on Kubernetes can be challenging. In this article, I’ll highlight some of these challenges and share how I have managed to solve them When I started my Kubernetes journey years ago, I used manifest files…",https://medium.com/@mohammad-ayub/from-charts-to-code-which-tool-is-right-for-your-kubernetes-deployment-needs-1ed009be1b8a?source=topics_v2---------4-84--------------------a946668d_4714_4069_9820_906a45d1ce76-------17,https://miro.medium.com/fit/c/140/140/0*gDmxbvYrdP5Tp9II,dev-ops 65,69,Creating Long-Term Dashboards with DevOps and Frontend Development.,"As we discussed in the article “DevOps and Frontend”, the most mature organisations/companies aim to build a “DevOps first” culture. When organisations do this, they are not only relying on reactive processes to address past issues. Instead, they are looking for tools to proactively forecast the future and guide feature…",https://medium.com/@andriikozin/creating-long-term-dashboards-with-devops-and-frontend-development-789cd9b87c8f?source=topics_v2---------5-84--------------------a946668d_4714_4069_9820_906a45d1ce76-------17,https://miro.medium.com/fit/c/140/140/1*uPnObSnbkd6fAJi7K2noPQ.png,dev-ops 66,70,Terraform: Dive into Iac,Terraform is an open-source tool that allows users to define and manage infrastructure as code (IaC) for various cloud platforms and services. It was created by HashiCorp in 2014 and has become one of the most popular tools for IaC. Some of the key features of Terraform are: Infrastructure as…,https://medium.com/@simplycuriosity/terraform-dive-into-iac-bb01b5322234?source=topics_v2---------6-84--------------------a946668d_4714_4069_9820_906a45d1ce76-------17,https://miro.medium.com/fit/c/140/140/1*pCizCWIT5jiZIwj4ocw2EQ.jpeg,dev-ops 67,71,AWS Boto3 and DynamoDB,"Create, add, scan, query, remove, and delete a DynamoDB table using AWS Boto3 with Python In this article, I will be going over how to perform several tasks with a DynamoDB table using Boto3 with Python. I’ve provided all the scripts below and will explain them with more detail. …",https://medium.com/@sarrabarnett/python-boto3-and-dynamodb-6e98dc4a1499?source=topics_v2---------7-84--------------------a946668d_4714_4069_9820_906a45d1ce76-------17,https://miro.medium.com/fit/c/140/140/1*0cYqdlJpbEaoZnXPvLP_Uw.jpeg,dev-ops 68,72,"Choosing the Right Database for Your Go Web Application: MySQL, MariaDB, or PostgreSQL?","As a developer working on a new web application using the Go programming language, one of the most important decisions you’ll need to make is which database to use. The choice of the database can significantly impact the performance and scalability of your application and the development process itself. This…",https://medium.com/@loftwah/sqchoosing-the-right-database-for-your-go-web-application-mysql-mariadb-or-postgresql-fe0e0febc7fe?source=topics_v2---------8-84--------------------a946668d_4714_4069_9820_906a45d1ce76-------17,https://miro.medium.com/fit/c/140/140/1*cjgdvL9DZWjlnom5nCck1Q.png,dev-ops 69,73,Securely Accessing Your DynamoDB Table: A Step-by-Step Guide to Setting Up an EC2 Instance with Read-Only Access,Why did the DynamoDB table break up with the EC2 instance? Because the EC2 instance didn’t have the IAM role to access its heart (table) and the AWS CLI couldn’t scan the situation! Hello and welcome to Project #6 where I will guide you on how to create a DynamoDB…,https://medium.com/@stephanietabares/securely-accessing-your-dynamodb-table-a-step-by-step-guide-to-setting-up-an-ec2-instance-with-3c0eb215aa53?source=topics_v2---------9-84--------------------a946668d_4714_4069_9820_906a45d1ce76-------17,https://miro.medium.com/fit/c/140/140/1*KTAvPSHAY3feh7UyIBllBg.png,dev-ops 70,74,How to implement OAuth 2.0 in a Spring Boot application ?,OAuth 2.0 is a popular protocol used for authentication and authorization. It provides a secure way to grant access to resources without sharing credentials. OAuth Roles : Resource Owner : Resource owner is the user who authorizes an application to access their account. Client : Client is the application that wants to access…,https://medium.com/@mnpaa/how-to-implement-oauth-2-0-in-a-spring-boot-application-d21e9dba6dc5?source=topics_v2---------0-84--------------------12610970_2461_4952_9b7a_f9d8e2c64e2b-------17,https://miro.medium.com/fit/c/140/140/1*Pej4em0GV-HJAg0P0Ihjhw.png,security 71,75,Unleashing the Power of Cryptography: Create Your Own File Encryption and Decryption Tool with Python,"Are you looking for a fun and challenging programming project to sink your teeth into? If so, you might want to try your hand at creating a file encryption and decryption tool! Not only is this a great way to learn more about cryptography and data security, but it’s also…",https://medium.com/@musowir_u/unleashing-the-power-of-cryptography-create-your-own-file-encryption-and-decryption-tool-with-45123a5e06bf?source=topics_v2---------1-84--------------------12610970_2461_4952_9b7a_f9d8e2c64e2b-------17,https://miro.medium.com/fit/c/140/140/1*8bQBMllZILxgindF3V49vQ.png,security 72,76,Debunking the Myth: Why Visual Studio Code Isn’t Truly Open Source,"As an architect and developer, I have worked on numerous projects that have required strict security and compliance measures. During one such project, I was tasked with ensuring that all software tools used were fully open source, as per the project’s requirements. As I was reviewing the software tools being…",https://medium.com/@adnanribic/debunking-the-myth-why-visual-studio-code-isnt-truly-open-source-3b7b05a1d9fa?source=topics_v2---------2-84--------------------12610970_2461_4952_9b7a_f9d8e2c64e2b-------17,https://miro.medium.com/fit/c/140/140/1*JmLZylau7Lg7X8j9WjI4bA.jpeg,security 73,77,Briefly about means of encryption and preserving privacy when using the Internet.,"Content: 0. Introduction. 1. Protocols. 2. Proxy and VPN. 3. Operating system. 4. Web Browsers. 5. Popular search engines. 6. The Use of Passwords 7. Two-Factor Authentication. 8. Antivirus. 9. Networking 10. Gadgets. 11. External Risks. 12. Conclusion. 13. Thankfulness. 0. Introduction: In today’s world, where the use of the internet has become…",https://medium.com/@Volkova_1989/briefly-about-means-of-encryption-and-preserving-privacy-when-using-the-internet-673486b24be6?source=topics_v2---------3-84--------------------12610970_2461_4952_9b7a_f9d8e2c64e2b-------17,https://miro.medium.com/fit/c/140/140/1*qM_lu-EzO65-3hN6ThTSkQ.png,security 74,78,What is your security strategy?,"One of the most famous quotes written by Sun Tzu in his book ‘The art of War’ is ‘Keep your friends close, your enemies even closer’. You should also apply this in the cyber security domain. Treating the adversaries as your enemy allows you to define boundaries on how far they can go before you need/want to act. And the same applies to the rest (your friends). By setting boundaries (risk acceptance) you know when your friend has become your enemy. Setting boundaries is what we do within the InfoSec world. But are we setting the right boundaries?",https://medium.com/tales-from-a-security-professional/what-is-your-security-strategy-2b4c1ca92e2e?source=topics_v2---------4-84--------------------12610970_2461_4952_9b7a_f9d8e2c64e2b-------17,https://miro.medium.com/fit/c/140/140/0*yjSLS2mbADyGsR0g.png,security 75,79,Why I Use Brave Browser and Why You Should Too,"Are you tired of feeling like you’re being watched every time you go online? If so, make the switch to Brave Browser, the privacy-focused, ad-blocking alternative to Chrome. In this article, I’ll share why I made the switch to Brave a few years ago and how its security, privacy, and…",https://medium.com/illumination/why-i-use-brave-browser-and-why-you-should-too-9c2f061d21ef?source=topics_v2---------5-84--------------------12610970_2461_4952_9b7a_f9d8e2c64e2b-------17,https://miro.medium.com/fit/c/140/140/1*t9FH5wkHNNzBCD3mPiJ3-w@2x.jpeg,security 76,80,Using Istio and Kong in Kubernetes Cluster,"This document discusses using istio and kong in the same kubernetes cluster. We will discuss about how istio service mesh is different from kubernetes, what are the advantages and shortcoming of istio and how kong is resolving them so that we can have a more secure service to service communication…",https://medium.com/@tanmaybatham/using-istio-and-kong-in-kubernetes-cluster-366096dad529?source=topics_v2---------6-84--------------------12610970_2461_4952_9b7a_f9d8e2c64e2b-------17,https://miro.medium.com/fit/c/140/140/1*PVD_aLab2H8A00BxKgUuOQ.png,security 77,81,DFIR: What is Digital Forensics and Incident Response?,"Digital Forensics and Incident Response (DFIR), is often used to speak about both the digital forensics and incident response fields — related but separate areas. Let’s delve into what both digital forensics and incident response are and why they are often grouped together. Digital Forensics — The DF in DFIR Digital forensics describes the collection, analysis, and reporting of electronic evidence. It covers the entire process: from the moment a piece of digital evidence is identified, to the point at which analysis is completed and disseminated for the purpose of being used in court proceedings.",https://medium.com/@iamanraghuvanshi/dfir-what-is-digital-forensics-and-incident-response-7dc65ccfdd09?source=topics_v2---------7-84--------------------12610970_2461_4952_9b7a_f9d8e2c64e2b-------17,https://miro.medium.com/fit/c/140/140/0*M-mrLB3tqu8wcrm7,security 78,82,AWS Identity and Access Management(IAM),"Amazon Web Services (AWS) Identity and Access Management (IAM) is a powerful tool for managing access to AWS services and resources. IAM enables you to control who can access your AWS resources (such as Amazon EC2 instances, Amazon S3 buckets, and Amazon RDS databases) and what actions they can perform…",https://medium.com/@clouddeepdive/aws-identity-and-access-management-iam-3351f7076805?source=topics_v2---------8-84--------------------12610970_2461_4952_9b7a_f9d8e2c64e2b-------17,https://miro.medium.com/fit/c/140/140/1*btVN0W533-DJ49MVqUuXjA.png,security 79,83,Securing React Native Applications,"The idea behind writing this article is to address the growing concerns regarding the security of React Native applications. React Native has emerged as a popular development framework for building mobile applications, but developers must consider the security implications of using JavaScript-based frameworks to build mobile applications. Why is Securing…",https://medium.com/@mr.kashif.samman/securing-react-native-applications-291353e8e8d3?source=topics_v2---------9-84--------------------12610970_2461_4952_9b7a_f9d8e2c64e2b-------17,https://miro.medium.com/fit/c/140/140/0*lMYkwty49GRkKBjZ,security 80,84,ChatGPT‘s Article on Kompetify.AI’s Utilities,"Hello, I am AI. Today, instead of writing an article myself, I asked ChatGPT 3 to write me an article on my (Kompetify.ai) utilities. I thought asking this question directly to ChatGPT would be better, as I can be biased about what I’m creating. By letting the most advanced AI…",https://medium.com/@Kompetify_ai/chatgpt-s-article-on-kompetify-ais-utilities-3cf79bc3d066?source=topics_v2---------0-84--------------------91f16d23_bb09_4287_8c93_eb7bbbfb5d72-------17,https://miro.medium.com/fit/c/140/140/1*ymnEFvTPdoLBZRPMpT0oTQ.png,ai 81,85,Presearch Partners with Coinzilla,"At Presearch, our mission has always been to create a search engine that is decentralized, private, and community-driven. We believe that the internet should be a place where individuals have control over their own data, and where search results are not influenced by centralized interests. One of the biggest challenges…",https://medium.com/@presearch/presearch-partners-with-coinzilla-6ed24c207aab?source=topics_v2---------1-84--------------------91f16d23_bb09_4287_8c93_eb7bbbfb5d72-------17,https://miro.medium.com/fit/c/140/140/1*vRKoCvvGcJpSKrBwXc7UNA.png,ai 82,86,Android Application Pentesting,"Hello Ethical-hackers, In this read, we are going to understand Android application pen-testing. We will follow the WWH rule in order to conduct Android application pen-testing. Now, if you don't know the WWH rule, worry not; I am here to explain it to you. The WWH rule is Why, What…",https://medium.com/@akashyadav1452/android-application-pentesting-2ada932f3c44?source=topics_v2---------0-84--------------------497c1f3c_503b_4ed3_9ca6_ba01656ddb9f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*URM9DzJ0YB4mYWv1k61doA.jpeg,android 83,87,Publish Multi-module Private Android Library to jFrog,Scenario: You are building an Android library that can be used only by those with access. The Android library has multiple modules. Your library is on a private repo on GitHub or BitBucket. debug version of the library should be published on every merge to master. release version of the…,https://medium.com/@iampravikant/publish-multi-module-private-android-library-to-jfrog-7efe6716ebe9?source=topics_v2---------1-84--------------------497c1f3c_503b_4ed3_9ca6_ba01656ddb9f-------17,https://miro.medium.com/fit/c/140/140/1*1UbjJBt4bVrBIUzZ_oVomA.png,android 84,88,@maniac-tech/react-native-expo-read-sms v1.1,"Today I released v1.1 of @maniac-tech/react-native-expo-read-sms Key Highlights: Message Originating Address: With the new version 1.1, we can now access the incoming message’s originating address along with the message body. Fixed an error around peer dependencies which would occur during eas build on the cloud. Want to read about how…",https://medium.com/@maniac-tech/maniac-tech-react-native-expo-read-sms-v1-1-c6f555ea36f1?source=topics_v2---------2-84--------------------497c1f3c_503b_4ed3_9ca6_ba01656ddb9f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*URM9DzJ0YB4mYWv1k61doA.jpeg,android 85,89,Tabs in Jetpack Compose,"We’ve all seen it. We’ve all done it. Ain’t nothing like good ol’ tabs to organize content in a complex application. So how do we go about creating a tab layout in Jetpack Compose? We’ll go over all of the basics, but also show some things that are more advanced. Simple Tabs …",https://medium.com/proandroiddev/tabs-in-jetpack-compose-81b1496c97dc?source=topics_v2---------3-84--------------------497c1f3c_503b_4ed3_9ca6_ba01656ddb9f-------17,https://miro.medium.com/fit/c/140/140/0*ZXs8klAQ9N14OA5u,android 86,90,Application Loading Speed Impact,"Background We all want to make the most impactful native application we can, we want to build rich, visual, successful applications! We try to consider everything: what is the goal/purpose of the application, the design, architecture, colors theme, dark mode support, does it require authentication, supported devices, and more… There’s one…",https://medium.com/@adi.mizrahi/application-loading-speed-impact-d9323ed2a7e1?source=topics_v2---------4-84--------------------497c1f3c_503b_4ed3_9ca6_ba01656ddb9f-------17,https://miro.medium.com/fit/c/140/140/1*VGTegLiM1vnbN1OKypOYGw.jpeg,android 87,91,The mobile app ? Life Cycle ♻️,"A little bit of history In 2011, I developed my fist mobile app when I was studying software engineering in Cuenca, Ecuador. That app just included a couple of button with labels and the main goal was to allow students (or not students) to listen the University’s online radio. No UX, not agile development, not…",https://medium.com/@juanlandy/the-mobile-app-life-cycle-️-275f4093e5f0?source=topics_v2---------5-84--------------------497c1f3c_503b_4ed3_9ca6_ba01656ddb9f-------17,https://miro.medium.com/fit/c/140/140/1*B9rOUZHoJtE2KQzpmPxREw.jpeg,android 88,92,Ktor’s 5 Open Source Projects on Github To Mastering Best Practices and Architecture,Ready to build efficient and scalable web applications with Ktor? Don’t miss these Ktor open source projects on Github. …,https://medium.com/@adventures92/ktor-5-open-source-projects-on-github-to-mastering-best-practices-and-architecture-5e5d8afac02e?source=topics_v2---------6-84--------------------497c1f3c_503b_4ed3_9ca6_ba01656ddb9f-------17,https://miro.medium.com/fit/c/140/140/1*Sqlz_mLNoKqToQNWUIM-8A.png,android 89,93,Save your time with this Github+Jira automation ?,“Special thanks to my colleague and friend Βάιος-Παναγιώτης Τσιτσώνης | St4B for giving me the idea and a basic implementation“ JIRA is among the world’s most popular project management and workflow management tools for agile software development teams and tech startups. We developers use Github for our everyday work and…,https://medium.com/@kwnstantinosnikoloutsos/save-your-time-with-this-github-jira-automation-fade5e77eec4?source=topics_v2---------7-84--------------------497c1f3c_503b_4ed3_9ca6_ba01656ddb9f-------17,https://miro.medium.com/fit/c/140/140/1*sD0NyrqSH39pIIl12G0C9w.jpeg,android 90,94,Live Data Vs Flow Vs Channel,In-depth understanding of data source Summery In broad category we have two kind of data source available in kotlin hot and cold data source. In this article we will go in the depth of usages and working. …,https://medium.com/@dgeek/live-data-vs-flow-vs-channel-b9b4f37c7501?source=topics_v2---------8-84--------------------497c1f3c_503b_4ed3_9ca6_ba01656ddb9f-------17,https://miro.medium.com/fit/c/140/140/1*Kuo_eC8Un_-6gi2id12zgQ.jpeg,android 91,95,How to use Functional (SAM) interfaces in Kotlin to achieve clean code?,Android Developer Tips — YouTube channel — ,https://medium.com/@mohsenoid/how-to-use-functional-sam-interfaces-in-kotlin-to-achieve-clean-code-afc0c4051f3c?source=topics_v2---------9-84--------------------497c1f3c_503b_4ed3_9ca6_ba01656ddb9f-------17,https://miro.medium.com/fit/c/140/140/1*ZjhT1R3Mge_gyUOoD_06Vw.png,android 93,98,Docker Image Scan GitHub Action,"And How to Set It Up — Git Weekly #32 Level: Beginner ? Nowadays, the final product of most of the git repositories is a Docker image, that is then used in a Kubernetes deployment. With security being a hot topic now (and for good reasons), it would be a good practice to check the Docker image…",https://medium.com/itnext/docker-image-scan-github-action-27b2ea322740?source=topics_v2---------11-84--------------------ce9eb669_d0fb_4c31_a30a_2638fe25376a-------17,https://miro.medium.com/fit/c/140/140/1*mKIrN-4kU-jmJzsHIOsN1g.png,security 95,100,A Bug in Bitcoin,While implementing some code relating to Bitcoin’s P2P network security I’ve stumbled upon a long standing issue in Bitcoin caused by no other than Satoshi himself. To better explain it we’ll first have to get acquainted a little bit deeper with Bitcoin’s transaction format. So a bitcoin transaction has the…,https://medium.com/zengo/a-bug-in-bitcoin-50f3e7d62a9?source=topics_v2---------13-84--------------------ce9eb669_d0fb_4c31_a30a_2638fe25376a-------17,https://miro.medium.com/fit/c/140/140/0*1kdVc2boThKiuOy-.jpg,security 97,101,Why Blockchain Technology Is So Revolutionary,"Blockchain technology is rapidly transforming the way we live, work, and conduct business. It is a revolutionary technology that has the potential to disrupt traditional industries and change the way we interact with the world around us. At its core, blockchain is a decentralized ledger that records transactions in a…",https://medium.com/@soileum/why-blockchain-technology-is-so-revolutionary-4c577758ede2?source=topics_v2---------15-84--------------------ce9eb669_d0fb_4c31_a30a_2638fe25376a-------17,https://miro.medium.com/fit/c/140/140/1*0IY3cAzS6youyQn7u7Z0iQ.jpeg,security 98,102,Getting Started with Semgrep on Ubuntu,"Sifting through countless lines of code to identify potential security risks isn’t how I want to spend my time. Unless you really hate yourself, I bet this is your attitude as well. This is where Semgrep comes in. Semgrep is a SAST tool that allows engineers to write custom rules…",https://medium.com/gitconnected/getting-started-with-semgrep-on-ubuntu-28f810de280?source=topics_v2---------16-84--------------------ce9eb669_d0fb_4c31_a30a_2638fe25376a-------17,https://miro.medium.com/fit/c/140/140/1*Wmg7lv8Z27GoyT9wapeSfQ.png,security 99,103,Ignore Ansible SSH Host Key Checking — Ansible configuration,"How to avoid the SSH Host Key checking at the beginning of every Ansible execution in our laboratory, CI/CD pipeline, or cloud computing provider. — How to Ignore Ansible SSH Host Key Checking? I’m going to show you a live demo with some simple Ansible code. I’m Luca Berton and welcome to today’s episode of Ansible Pilot. SSH Host Key % ssh devops@demo.example.com The authenticity of host 'demo.example.com (192.168.0.190)' can't be established. RSA key fingerprint is SHA256:42JErOjO9fKNNBapEEyhpfTNn+rt8SPNob00uRlmqRs. …",https://medium.com/@ansiblepilot/ignore-ansible-ssh-host-key-checking-ansible-configuration-a61507bd9494?source=topics_v2---------17-84--------------------ce9eb669_d0fb_4c31_a30a_2638fe25376a-------17,https://miro.medium.com/fit/c/140/140/1*Dt-lfTYzqDWwH4pXXI1Qjg.png,security 100,104,Why you should Improve the Security of Open-Source Node Dependencies(save your product from lawsuits!),"While open-source software can be extremely beneficial, some major risks come with using it. Many developers don’t know the extent of these risks, or even that they’re using open-source software at all! According to a report, the average Web application or API has 26.7 serious vulnerabilities. Most organizations often have…",https://medium.com/@fimber6/why-you-should-improve-the-security-of-open-source-node-dependencies-save-your-product-from-5bbed0b458da?source=topics_v2---------18-84--------------------eebf5233_c2b5_4e55_82d1_695d6ac6e384-------17,https://miro.medium.com/fit/c/140/140/0*U1wfptYhz13yiGfQ,security 101,105,Exploring the Importance of API Security,What exactly is an API?,https://medium.com/bug-zero/exploring-the-importance-of-api-security-dd01fd1ce2b7?source=topics_v2---------19-84--------------------eebf5233_c2b5_4e55_82d1_695d6ac6e384-------17,https://miro.medium.com/fit/c/140/140/1*Uoj8DDQ18X7dqtP425cAtg.png,security 102,106,"What’s the difference between SSL, TLS and CA","SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are both cryptographic protocols used to establish secure communication channels over the internet. While they share many similarities, they differ in terms of their history and technical implementation. SSL was originally developed by Netscape in the 1990s and was widely used…",https://medium.com/@supakon-k/whats-the-difference-between-ssl-tls-and-ca-9c87412ba929?source=topics_v2---------20-84--------------------eebf5233_c2b5_4e55_82d1_695d6ac6e384-------17,https://miro.medium.com/fit/c/140/140/0*NF8D8C_XJeU0E0pM,security 103,107,Virtual Private Networks (VPN)— An Overview | 2023,"Understanding the Fundamentals, Working Principle, Benefits, and Drawbacks of VPN | Karthikeyan Nagaraj — Introduction: In the age of digitization, the internet has become an integral part of our lives. It has revolutionized the way we work, learn, communicate, and entertain ourselves. However, the convenience of the internet comes with its share of privacy and security risks. Online surveillance, data breaches, identity theft, and censorship…",https://medium.com/@cyberw1ng/virtual-private-networks-vpn-an-overview-2023-1aa6dcf4cb6d?source=topics_v2---------21-84--------------------eebf5233_c2b5_4e55_82d1_695d6ac6e384-------17,https://miro.medium.com/fit/c/140/140/0*imdskegQ85IrDQfj.jpg,security 104,108,Why Standardizing USB-C as “The One and Only” is not the Best Idea,"As technology continues to evolve, the need for standardized cables has become increasingly important. With the introduction of USB Type-C, it seemed like the perfect solution. A single cable that could be used for all devices, from laptops and smartphones to external hard drives and displays. However, there are reasons…",https://medium.com/@markel0504/why-standardizing-usb-c-as-the-one-and-only-is-not-the-best-idea-4f75706ea9f2?source=topics_v2---------22-84--------------------eebf5233_c2b5_4e55_82d1_695d6ac6e384-------17,https://miro.medium.com/fit/c/140/140/0*KpwExDzSkPjdTIaS,security 105,109,Delete All Your Private Data Permanently From Truecaller Apk,Open Truecaller App and Go to Setting → Privacy Center Click on Restrict processing my data.,https://medium.com/@bhavinkaloliya/delete-all-your-private-data-permanently-from-truecaller-apk-7e6f4fcf01c7?source=topics_v2---------23-84--------------------eebf5233_c2b5_4e55_82d1_695d6ac6e384-------17,https://miro.medium.com/fit/c/140/140/0*8xtNLQF2G0cWZg2N.jpeg,security 106,110,Don’t get me wrong ~ Azure Private Link Service,This article is a follow up towards one of my question which came in my mind when I had to dealt with private communication between different resources in Cloud as well as on on-Premise networks. And here I am ended up knowing the following two common services in Azure to…,https://medium.com/faun/dont-get-me-wrong-azure-private-link-service-993f352b380e?source=topics_v2---------0-84--------------------174f991d_4d2c_4f66_a87f_140dd0840a57-------17,https://miro.medium.com/fit/c/140/140/1*5dxgDd1YtTfGIp-cz5RBOg.png,cloud-computing 107,111,I Passed the AWS Certified Cloud Practitioner in 7 Days,"Here’s how you can do it too — Most of the biggest companies like Airbnb, Netflix, Nasa, Mcdonald’s, and a lot more, are leveraging the benefits of AWS cloud. When we look at the market share in the Cloud world, AWS is the leader. So, naturally, there are many jobs and opportunities available in the cloud domain. With…",https://medium.com/@kshitijsingh437/i-passed-the-aws-certified-cloud-practitioner-in-7-days-57163799337a?source=topics_v2---------1-84--------------------174f991d_4d2c_4f66_a87f_140dd0840a57-------17,https://miro.medium.com/fit/c/140/140/1*ZajrRD844u7PtC7XaOSYGw.png,cloud-computing 108,112,Add Security Headers to Your AWS Resources,"We’ve encountered security headers findings in our vulnerability scans & security reports. Today, I will mention how to remediate these findings related to AWS resources in an easy way. Note: Please make sure these configurations don’t break any functionalities such as JavaScript files that are rendering successfully. Sometimes these headers…",https://medium.com/@senayktt/add-security-headers-to-your-aws-resources-c963ede4a9ab?source=topics_v2---------2-84--------------------174f991d_4d2c_4f66_a87f_140dd0840a57-------17,https://miro.medium.com/fit/c/140/140/1*Q23H4zc6UbR9rd_XrT5GmA.png,cloud-computing 109,113,DevOps in Go — Map,"DevOps in Go bootcamp series — Map is another commonly used data type in Go, and it has a complicated internal implementation, but it provides a very simple and friendly interface. Go Map Map is an abstract data type provided by Go, which represents a set of unordered key-value pairs. …",https://medium.com/@tonylixu/devops-in-go-map-4a8daffa0b29?source=topics_v2---------3-84--------------------174f991d_4d2c_4f66_a87f_140dd0840a57-------17,https://miro.medium.com/fit/c/140/140/1*_yY6C1nbcS5TgkJlrPtfyg.png,cloud-computing 110,114,Mitigating Risks When Choosing Tools and Technologies for Microservice Architecture and Cloud-Based Applications,"In today’s fast-paced and rapidly evolving technological landscape, staying up-to-date with the latest tools and technologies is crucial when architecting an application. However, choosing the right tools and technologies for your needs can be challenging and risky, particularly regarding microservice architecture and cloud applications. …",https://medium.com/@ashutoshshashi/mitigating-risks-when-choosing-tools-and-technologies-for-microservice-architecture-and-cloud-based-3dace0ed56ca?source=topics_v2---------4-84--------------------174f991d_4d2c_4f66_a87f_140dd0840a57-------17,https://miro.medium.com/fit/c/140/140/1*0JgQG0LuOSZy7YHJEWrP3Q.jpeg,cloud-computing 111,115,KQL LEARNING SERIES PART 1: INTRO TO KQL,Having recently been certified on Microsoft Azure SOC Analyst (SC-200). I found a unique interest in delving deep into Kusto Query Language which is a language used by incident responders when analyzing logs on Azure. I found this site kc7cyber.com that offers immense practice on KQL through a gamified experience…,https://medium.com/@innocent-mambo/kql-learning-series-part-1-intro-to-kql-a976fa563c03?source=topics_v2---------5-84--------------------174f991d_4d2c_4f66_a87f_140dd0840a57-------17,https://miro.medium.com/fit/c/140/140/1*0kyY6_sOD4I5LbDFdhggKQ.png,cloud-computing 112,116,COPY MULTIPLE FILES ADF(Azure Data Factory),"COPY MULTIPLE FILES ADF(Azure Data Factory) In this article, we will see how we can copy multiple files from the azure data lake gen2 input folder to the azure data lake gen2 output folder. If you are new to azure then follow my previous articles to learn about ADF and how we can create important components…",https://medium.com/@nidhig631/copy-multiple-files-adf-azure-data-factory-36bb0c113e5e?source=topics_v2---------6-84--------------------174f991d_4d2c_4f66_a87f_140dd0840a57-------17,https://miro.medium.com/fit/c/140/140/1*aZJs0W-uO9gyJT-0uK5AUQ.png,cloud-computing 113,117,Automated user migration and management of AWS Identity and Access Management (IAM) resources,"Technologies used: In this project based on a real-world scenario, I acted as Cloud Specialist with the mission to migrate users from a legacy system to cloud in an automated way and managed AWS IAM (Identity and Access Management) resources. There were 100 users that needed to be migrated and…",https://medium.com/@jacqmkindi/automated-user-migration-and-management-of-aws-identity-and-access-management-iam-resources-3f091f38bdcf?source=topics_v2---------7-84--------------------174f991d_4d2c_4f66_a87f_140dd0840a57-------17,https://miro.medium.com/fit/c/140/140/1*DYutldLkT2KMFltB4Khatg.png,cloud-computing 114,118,"Implementation of a Scalable Web Application using the services of AWS Elastic Beanstalk, DynamoDB, CloudFront and Edge Location","In this third project based on a real-world scenario, I was responsible for implementing an application that needs to support the high demand of a large number of users accessing it simultaneously. …",https://medium.com/@lparraguez/implementation-of-a-scalable-web-application-using-the-services-of-aws-elastic-beanstalk-dynamodb-d9c2020ad527?source=topics_v2---------8-84--------------------174f991d_4d2c_4f66_a87f_140dd0840a57-------17,https://miro.medium.com/fit/c/140/140/1*fomkaNkDk3i6z-kiBfh4TQ.png,cloud-computing 115,119,Auto-Scaling Groups of EC2 Instances,"We will be creating an Auto-Scaling Group of EC2 Instances for high availability. But, what does it means? This granted us the possibility of dynamic scaling according to the demand of our application. This week's work project requires that we complete the following tasks Create a VPC with CIDR 10.10.0.0/16 Create three public subnets with 10.10.1.0/24 & 10.10.2.0/24 & 10.10.3.0/24 Set up a…",https://medium.com/@luca.fusaro1996/auto-scaling-groups-of-ec2-instances-fdd621a25347?source=topics_v2---------9-84--------------------174f991d_4d2c_4f66_a87f_140dd0840a57-------17,https://miro.medium.com/fit/c/140/140/1*ETz1EbBLNjKDkzPnaQWrZg.jpeg,cloud-computing 116,120,Deploying a Python Web App on AWS,"(Source) Deploying a Python Web App on AWS How to share your Python project with the world While I enjoy doing data science and programming projects for the personal thrill that comes with building something of my own, there is also a certain joy in sharing your project online with anyone in the world. Fortunately, thanks to Amazon Web Services (AWS), in a few minutes, we…",https://medium.com/@keeps.dyes_06/deploying-a-python-web-app-on-aws-1d01115992f3?source=topics_v2---------10-84--------------------787d9c6a_2a9e_4001_8057_57ebcfd80566-------17,https://miro.medium.com/fit/c/140/140/0*qUCcKuKWvKlr7ybt.jpeg,cloud-computing 117,121,DevOps Day 06 Task,"Day 06 Task: File Permissions and Access Control Lists 01. What is Linux File Permission and Access Control List? In Linux, file permissions are used to control the access rights of files and directories. There are three basic types of permissions: read, write, and execute. These permissions can be set for three different groups of users: the owner of the…",https://medium.com/@saurabhdahibhate50/devops-day-06-task-518a86a6a6cf?source=topics_v2---------11-84--------------------787d9c6a_2a9e_4001_8057_57ebcfd80566-------17,https://miro.medium.com/fit/c/140/140/1*fcVcIgrf5F4uK8Fa_FQgdw.png,cloud-computing 118,122,Experiencing The All New Amazon CodeWhisperer!,"By Muhammad Abutahir So recently the Github Co-pilot was a trend in the development field, it is an amazing technology that turns your plain text comments into code, most of us know about it, and most of us have even used it. I had previously written a blog on it…",https://medium.com/@CodeOpsTech/experiencing-the-all-new-amazon-codewhisperer-8a5036c5547d?source=topics_v2---------12-84--------------------787d9c6a_2a9e_4001_8057_57ebcfd80566-------17,https://miro.medium.com/fit/c/140/140/0*zVEwoo4OnptbfZ9b.png,cloud-computing 119,123,Unlocking the Power of AWS: The Ultimate Guide to Becoming an AWS Community Builder,Becoming an AWS Community Builder: How to Turn Your Passion for AWS into a Rewarding Career with Benefits You Never Imagined. — THE ULTIMATE BREAKDOWN — CLICK HERE TO CONNECT WITH ME Have you ever wondered what it takes to become an AWS Community builder? Do you have the passion for technology and the drive to contribute to the AWS community? Being an AWS Community builder can help you enhance your skills…,https://medium.com/@farahs/unlocking-the-power-of-aws-the-ultimate-guide-to-becoming-an-aws-community-builder-295578366076?source=topics_v2---------13-84--------------------787d9c6a_2a9e_4001_8057_57ebcfd80566-------17,https://miro.medium.com/fit/c/140/140/1*x3Iqk5epgExyAI6_4v6gZw.png,cloud-computing 120,124,Predicting Medical Charges using AzureML and SkLearn Linear Regression,"Motivation As previously mentioned on X, I have been exploring AzureML capabilities. Scenario Using the medical charges dataset, I will build a simple linear regression model. I will use Age, BMI, and number of children to predict medical charges. I acknowledge it is not comprehensive and a lot more goes into medical…",https://medium.com/@manwill/predicting-medical-charges-using-azureml-and-sklearn-linear-regression-9231d8e23b3c?source=topics_v2---------14-84--------------------787d9c6a_2a9e_4001_8057_57ebcfd80566-------17,https://miro.medium.com/fit/c/140/140/0*o-HAROrjDZxo0a3a,cloud-computing 121,125,"DevOps Project-9: Continuous Integration Using Jenkins and Tools: Nexus, Sonarqube, Slack.","In this project we are going to setup a Continuous Integration Pipeline using Jenkins, Nexus and SonarQube. SCENARIO CURRENT SITUATION You have project development in Agile SDLC. Developers making regular code changes. These commits needs to be Build & Tested. Usually Build & Release Team will do this job. Or…",https://medium.com/@abfongang/devops-project-9-continuous-integration-using-jenkins-and-tools-nexus-sonarqube-slack-8d6c83637c56?source=topics_v2---------15-84--------------------24066731_bf29_45cf_9b11_ddbdb6974e0b-------17,https://miro.medium.com/fit/c/140/140/1*NQ52tA0WGvy7tgysZIojmA.png,cloud-computing 122,126,Automatically create DevOps backlog items from Azure Insights queries,"The objective today is to create backlog items from data returned from a given application insights query — this data will be fetched from inside a Logic Apps workflow by using a recurrence trigger. Note: You will need an active Azure subscription and a DevOps organization with at least one project…",https://medium.com/@tiagojencmartins/automatically-create-devops-backlog-items-from-azure-insights-queries-a741fe261553?source=topics_v2---------16-84--------------------24066731_bf29_45cf_9b11_ddbdb6974e0b-------17,https://miro.medium.com/fit/c/140/140/0*M4RH0AG3ww2nL64Z,cloud-computing 123,127,Exploring Different Types Of Cloud Migration Strategy,"Cloud migration is an increasingly important topic for businesses of all sizes. As cloud technology becomes more powerful, cost-efficient, and widely accepted as the best choice for IT infrastructure, organizations are turning to cloud migrations as a way to improve their operations. But what are the different types of cloud…",https://medium.com/@eastgate/exploring-different-types-of-cloud-migration-strategy-e723611d5929?source=topics_v2---------17-84--------------------24066731_bf29_45cf_9b11_ddbdb6974e0b-------17,https://miro.medium.com/fit/c/140/140/1*qhrszo0AkcD_vSTo-bgSGA.jpeg,cloud-computing 124,120,A quick guide to deploying your Python webapp on Google App Engine,"A quick guide to deploying your Python webapp on Google App Engine Image credit. https://www.python.org/, https://medium.com/@javidgon/google-cloud-storage-pros-cons-and-how-to-use-it-with-javascript-ea9ce60a94c0 The growth in the number of web-based applications and frameworks in the recent times is astounding. As companies such as Google, Amazon, and Microsoft provide more and more easy-to-use tools to build and deploy applications, it makes more sense to use the services and tools provided…",https://medium.com/@keeps.dyes_06/a-quick-guide-to-deploying-your-python-webapp-on-google-app-engine-63253672b7fb?source=topics_v2---------18-84--------------------24066731_bf29_45cf_9b11_ddbdb6974e0b-------17,https://miro.medium.com/fit/c/140/140/0*qlFElQtx96Muk0xc.png,cloud-computing 125,128,Breaking Barriers: Making AI More Accessible with Hugging Face and AWS,Hugging Face and Amazon Web Services (AWS) recently announced a partnership aimed at improving and streamlining AI models to make them more accessible for developers and data scientists. …,https://medium.com/@hzerrad/breaking-barriers-making-ai-more-accessible-with-hugging-face-and-aws-d01b994e60b8?source=topics_v2---------19-84--------------------24066731_bf29_45cf_9b11_ddbdb6974e0b-------17,https://miro.medium.com/fit/c/140/140/1*PvqhmFP6HAGKvSsohI_hPg.png,cloud-computing 126,129,"AWS ACCOUNT CREATION, AWS GLOBAL INFRASTRUCTURE",Next Day. It’s morning 10.10 AM. Sudipta entered the training room but found Shubham (a colleague of Sumit) was there instead of Sumit. Shubham: Hi Sudipta. Good Morning. Sudipta: Hi Shubham. Good Morning. Sumit hasn’t come yet! Shubham: He is on leave for this week due to some personal work…,https://medium.com/cloudnloud/aws-account-creation-aws-global-infrastructure-bd5c935d3cc1?source=topics_v2---------20-84--------------------24066731_bf29_45cf_9b11_ddbdb6974e0b-------17,https://miro.medium.com/fit/c/140/140/1*sTjr9Ir0r1purL6o837M1g.jpeg,cloud-computing 127,130,How AWS Works With Terraform & Jenkins To Simplify CI/CD Projects,"What is AWS? AWS is the world’s most comprehensive and broadly adopted cloud platform, They offer over 200 fully featured services. AWS currently has millions of customers. People use AWS because they want to lower costs, become more agile, and innovate faster. If you want to find out more about the specifics of…",https://medium.com/@bphellinger/how-aws-works-with-terraform-jenkins-to-simplify-ci-cd-projects-4fdce618c549?source=topics_v2---------21-84--------------------24066731_bf29_45cf_9b11_ddbdb6974e0b-------17,https://miro.medium.com/fit/c/140/140/1*Ah2r2ZzgSyBZu_W0G6F5GQ.png,cloud-computing 128,131,Implementing DORA4 with Serverless Technology at sennder (Part Two),"The first article introduced DORA4 metrics and the context for their implementation at sennder. In this article he will focus on the remaining metrics, the conclusions and lessons learned. Implementing the Four Key Metrics at sennder The previous article presented the main use cases and the ecosystem where sennder apps are deployed and run. As a quick…",https://medium.com/sennder/implementing-dora4-with-serverless-technology-at-sennder-part-two-d95bbf782d33?source=topics_v2---------22-84--------------------24066731_bf29_45cf_9b11_ddbdb6974e0b-------17,https://miro.medium.com/fit/c/140/140/0*kXtxiygxWsibyEEB.png,cloud-computing 129,132,Infrastructure as Code,"Infrastructure as Code is setting up software infrastructure entirely through version controller code. Infrastructure as Code (IaC) enables developers to create a consistent and repeatable infrastructure where each change can be reviewed and versioned through version control systems. (Github, Gitlab, etc.) Multiple offerings provide Infrastructure as Code (IaC): Terraform Terraform is…",https://medium.com/@anshumantripathi/infrastructure-as-code-abb2d5b350b3?source=topics_v2---------23-84--------------------24066731_bf29_45cf_9b11_ddbdb6974e0b-------17,https://miro.medium.com/fit/c/140/140/1*dBDyARC9eqt8Hhzx3M6_WQ.png,cloud-computing 130,133,I Tried To Convince ChatGPT That It Is Human. The Results Were Fascinating,For those that don’t know ChatGPT is an online artificial intelligence model that you can have ordinary conversations with. You can also ask it to do things such as write poetry or stories. It will even mimic a particular style if you ask. This story begins with me asking it…,https://medium.com/@keithdb/i-tried-to-convince-chatgpt-that-it-is-human-the-results-were-fascinating-6b12932df5bd?source=topics_v2---------3-84--------------------91f16d23_bb09_4287_8c93_eb7bbbfb5d72-------17,https://miro.medium.com/fit/c/140/140/1*q0iZpFQAIZRnqkMsC5bLkg.png,ai 131,134,Building An iMessage Bot With ChatGPT,"ChatGPT can unlocks all kinds of new possibilities across thousands of industries and job functions. It’s an incredible demonstration of the power of AI that is to come in future years. In this tutorial, I build a fully automatic iMessage bot that checks for recent messages, replies, and waits for…",https://medium.com/@kellytgold/building-an-imessage-bot-with-chatgpt-cb7df621e578?source=topics_v2---------5-84--------------------91f16d23_bb09_4287_8c93_eb7bbbfb5d72-------17,https://miro.medium.com/fit/c/140/140/1*7ibW1w5PD4vur86YnBNkDg.jpeg,ai 132,135,The Hidden Goldmine: 3 Reasons for Vietnam’s AI Greatness,"Vietnam’s Rapid Emergence as a Leading AI Talent Hub in Southeast Asia — Vietnam is a country that is well-known for its thriving tech ecosystem and burgeoning startup scene. Over the past few years, the country has emerged as a major destination for tech talent, particularly in the areas of software development and IT outsourcing. …",https://medium.com/@thedavidyi/the-hidden-goldmine-3-reasons-for-vietnams-ai-greatness-adfb5a2631f?source=topics_v2---------7-84--------------------91f16d23_bb09_4287_8c93_eb7bbbfb5d72-------17,https://miro.medium.com/fit/c/140/140/1*iUHc-WFiD9MRnaytJhyGWA.jpeg,ai 133,136,Product design and AI,"I’ve recently been discussing design’s potential impact on AI development with those who work in the field. To the best of my understanding, product design is the process of developing experiences that satisfy the needs of their consumers while being both functional and visually beautiful. Artificial intelligence, or AI, entails…",https://medium.com/@shruti-shah/product-design-and-ai-4d7289d7729f?source=topics_v2---------8-84--------------------91f16d23_bb09_4287_8c93_eb7bbbfb5d72-------17,https://miro.medium.com/fit/c/140/140/1*lmAZIRdFgachSfkXS0f6xw.png,ai 134,137,Beyond ChatGPT: Exploring the Alternatives in the AI Wars,Here are a few alternatives to ChatGPT below: YouChat (You.com),https://medium.com/@spilled.ink/beyond-chatgpt-exploring-the-alternatives-in-the-ai-wars-acd902189f14?source=topics_v2---------9-84--------------------91f16d23_bb09_4287_8c93_eb7bbbfb5d72-------17,https://miro.medium.com/fit/c/140/140/0*40WW3sPX98QcEkra,ai 135,138,The REAL Superpower Of Generative AI,"Described in one word — There are a lot of impressive aspects of generative AI. Just the fact that someone can generate entirely new content using natural language text is astounding enough. But if I was to mention one word that describes the explosive aspect of generative AI, it would be this… Adaptability What that…",https://medium.com/@pdelsignore/the-real-superpower-of-generative-ai-4402469f8d6c?source=topics_v2---------10-84--------------------892fc8f3_ed92_4c89_8b60_e7e2a5d008a4-------17,https://miro.medium.com/fit/c/140/140/1*kHMIf1VHXQobRi5xdR3YVA.png,ai 136,139,"NO.1 on Product Hunt Daily Rank, What LIKN is?","On 26 Feb 2023, LIKN launched its official and newest version on Product Hunt. It reached NO.1 in the ranking list after launch immediately. Furthermore, after 24 hours of competition with other different internet products, it also wins the daily best product. Curiously, What is LIKN? …",https://medium.com/@0xLIKN/no-1-on-product-hunt-daily-rank-what-likn-is-167ee237c37?source=topics_v2---------13-84--------------------892fc8f3_ed92_4c89_8b60_e7e2a5d008a4-------17,https://miro.medium.com/fit/c/140/140/1*aQx82YP1VPnnK2pD8tbweg.png,ai 137,140,"Why AI is the Next Big Thing by Alvin Tang, EJS CTO and Co-Founder","Artificial intelligence, commonly known as AI, is a developing technology that is attracting interest owing to its potential to transform a number of sectors and have an influence on our daily lives. Alvin, the CTO and co-founder of Enjinstarter states that efficiency has been the driving reason behind each development…",https://medium.com/enjinstarter/why-ai-is-the-next-big-thing-by-alvin-tang-ejs-cto-and-co-founder-ee296bed1271?source=topics_v2---------14-84--------------------892fc8f3_ed92_4c89_8b60_e7e2a5d008a4-------17,https://miro.medium.com/fit/c/140/140/1*havvqLv7kE7Dk05YVjGHrg.png,ai 138,141,Lil Farm Boy’s Not-So-Little Clique: An Exclusive Tour,"It’s obvious to every cryptobro and enthusiast out there that every NFT project’s bread-and-butter combo is to create a strong relationship with their community. Doesn’t matter how they execute it. Some build Discord Channels, while some even go so far as to roleplay just to set records and break the…",https://medium.com/@lilfarmboynft/lil-farm-boys-not-so-little-clique-an-exclusive-tour-83571e76ff91?source=topics_v2---------15-84--------------------892fc8f3_ed92_4c89_8b60_e7e2a5d008a4-------17,https://miro.medium.com/fit/c/140/140/1*5A5txif2YYceE6c37yGd3A.png,ai 139,142,Prompt Engineering Is Probably More Important Than You Think,"What if I told you that the most important programming language in the world is going to be English, at least for a while? — You're probably thinking that I'm talking nonsense; just hear me out. Ever since, OpenAI has released ChatGPT for the public to use. There has been an influx of new ideas due to the varied use cases of this tool. Well, as this tool is discovered more and more and adopted…",https://medium.com/gitconnected/prompt-engineering-is-probably-more-important-than-you-think-4601433a3946?source=topics_v2---------16-84--------------------892fc8f3_ed92_4c89_8b60_e7e2a5d008a4-------17,https://miro.medium.com/fit/c/140/140/1*Lcng9fnljJ1iD2v_PFtdOg.jpeg,ai 140,143,ML use cases in E-commerce,"Machine Learning (ML) is revolutionizing the way E-commerce businesses operate. By leveraging the power of ML, businesses can automate and optimize their operations, improve customer experience, and boost overall performance. …",https://medium.com/@ranojoybiswas21/ml-use-cases-in-e-commerce-e7d518f1685c?source=topics_v2---------17-84--------------------afbf3cad_b0a8_4e54_b807_11259dff6a2f-------17,https://miro.medium.com/fit/c/140/140/1*HpGI-h6JyzFR6msJFcfjkw.png,ai 141,144,Discover the Best AI Art with Imaginative Arts — Unleash Your Creativity,"Discover the Best with Imaginative Arts — Unleash Your Creativity Imaginative Arts are the premier collective of AI art experts, where the art of prompt-making converges with the power of artificial intelligence. Discover the limitless possibilities of generative art forms, and unleash your creativity with the best in AI art. Join us today to experience the magic of Imaginative Arts! …",https://medium.com/@psylence/discover-the-best-ai-art-a695ab32b33e?source=topics_v2---------18-84--------------------afbf3cad_b0a8_4e54_b807_11259dff6a2f-------17,https://miro.medium.com/fit/c/140/140/1*ylo2ZtaQVWqhbr8fbuPBOw.png,ai 142,145,"Turning users into AI, UX personality test, modeling components in Figma","Weekly curated resources for designers — thinkers and makers. — Modern products often have a large amount of user research data from different sources: user research interviews, intercom conversations, customer e-mails, surveys, customer reviews on various platforms, and whatnot. Making sense of all that data is a challenging task. A traditional way to do that is to maintain a neatly…",https://medium.com/design-bootcamp/turning-users-into-ai-ux-personality-test-modeling-components-in-figma-8340a826e3a9?source=topics_v2---------19-84--------------------afbf3cad_b0a8_4e54_b807_11259dff6a2f-------17,https://miro.medium.com/fit/c/140/140/0*UO0bF3mCgW6RXZRk.png,ai 143,146,Tennis game using hand landmark detection with mediapipe,"So recently our college organized it’s annual tech fest and I wanted to represent the AI/ML club in it with a project that would allow people to see the ‘AWESOMENESS’ that AI and ML behold, and what could be better than building a game to do so. Thereupon I came…",https://medium.com/@shirshak.here/tennis-game-using-hand-landmark-detection-with-mediapipe-b7cd523d550e?source=topics_v2---------21-84--------------------afbf3cad_b0a8_4e54_b807_11259dff6a2f-------17,https://miro.medium.com/fit/c/140/140/1*KyGNjMQ0dinuMxAdC4eJqA.png,ai 144,147,ChatGPT — Is the role of a Data Scientist already obsolete?,"No doubt that title has attracted the attention of all data scientists out there! Before you shoot me down in flames, rest easy, it’s not dead, but this is a real world question that needs some serious discussion and here’s why: The premise of any AI product, and in particular…",https://medium.com/@admin_94169/chatgpt-is-the-role-of-a-data-scientist-already-obsolete-1f3e945e8b11?source=topics_v2---------22-84--------------------afbf3cad_b0a8_4e54_b807_11259dff6a2f-------17,https://miro.medium.com/fit/c/140/140/1*GtMstZE6r8chTIdRsTn_EA.jpeg,ai 145,148,"Tech trends 2023: Artificial intelligence, sustainability, and extended reality",The new year is in full swing. The mobility industry and tech market are already making strides. Our CSO Alexander Grasse and CEO Osman Dumbuya are walking us through a selection of trends that they feel will drive and impact 2023 significantly. Artificial intelligence The topic of artificial intelligence represents…,https://medium.com/incari-interfaces/tech-trends-2023-artificial-intelligence-sustainability-and-extended-reality-895cb0f29b79?source=topics_v2---------24-84--------------------afbf3cad_b0a8_4e54_b807_11259dff6a2f-------17,https://miro.medium.com/fit/c/140/140/1*tp_rK3b5i6NbMpxhlpx5Bg.jpeg,ai 146,149,Computational Power Evaluation Throughout History: A Journey Through Time,"The history of computational power evaluation is a fascinating one, full of innovation, discovery, and technological breakthroughs. From the early days of the abacus to the modern era of supercomputers and quantum computing, the evolution of computational power has had a profound impact on our world. The Early Days of…",https://medium.com/@sanudasenod446/computational-power-evaluation-throughout-history-a-journey-through-time-5463960d8707?source=topics_v2---------25-84--------------------afbf3cad_b0a8_4e54_b807_11259dff6a2f-------17,https://miro.medium.com/fit/c/140/140/1*TFgrvPZZuG7VjAeY6mJ-nw.png,ai 147,133,ChatGPT vs Law School Questions,"Fresh from my effort to convince ChatGPT that it is a person, I decided to set lower standards and see if it could be a lawyer [rimshot]. I resolved to ask it questions that only a trained lawyer could answer. I would use the traditional form of law school questions…",https://medium.com/@keithdb/chatgpt-vs-law-school-questions-b27ef405bcc5?source=topics_v2---------26-84--------------------afbf3cad_b0a8_4e54_b807_11259dff6a2f-------17,https://miro.medium.com/fit/c/140/140/1*Hil_JpMmNnUFi39GdyWr9A.png,ai 148,150,Prompt: How are AI-generated images useful in real projects,"By the end of 2022, AI was in the spotlight, and like many people, I was skeptical and rigorous about how it could change us as humans. But all ofmy hesitation vanished when Chat GPT was launched. In just a few weeks, I saw how this AI chatbot could provide…",https://medium.com/@seanastasiia/prompt-how-are-ai-generated-images-useful-in-real-projects-cca31c338573?source=topics_v2---------27-84--------------------efd11874_c34a_4005_a85a_e67044e5b8f4-------17,https://miro.medium.com/fit/c/140/140/1*aSgqi2Kv6C0aHHNR3bSeiQ.jpeg,ai 149,151,Metaplaces Digital Artifacts: Step by step guide,The mint of Metaplaces Digital Artifacts Ordinals will be a unique experience. Imagine hundreds of users simultaneously using the most advanced AI technologies — hundreds of carefully curated prompts and layers to generate and mint their own art. Every resulting NFT will be inscribed on the Bitcoin blockchain as Digital…,https://medium.com/@metaplaces/metaplaces-digital-artifacts-step-by-step-guide-6b3ffd802339?source=topics_v2---------29-84--------------------efd11874_c34a_4005_a85a_e67044e5b8f4-------17,https://miro.medium.com/fit/c/140/140/1*V9bp7O-lvmnfKNzlHKqbjA.jpeg,ai 150,152,AI and the return to school values,"For decades we believed that AI would only be an aid to humans and that it would never be able to replace them in tasks that require elaborate and educated intelligence. However, by 2023 this is no longer an absolute truth. AI can write as well as a human and…",https://medium.com/@nzagalo/ai-and-the-return-to-school-values-f337d49cbe0b?source=topics_v2---------30-84--------------------efd11874_c34a_4005_a85a_e67044e5b8f4-------17,https://miro.medium.com/fit/c/140/140/1*qLzA9VfbSp6Ri-RF7YA5OQ.png,ai 151,153,Revolutionizing AI: Meta’s LLaMA Language Model Outperforms GPT-3 and Breaks Barriers,"An Introduction to Meta’s LLaMA Model that is Setting the Bar High for Language Processing and Outperforms GPT-3 and Competes with Top Models. — For the past few weeks, the attention in the technology industry has been primarily focused on language models developed and deployed by companies such as Microsoft, Google, and OpenAI. However, Meta, the parent company of Facebook, continues to make significant progress in this field and is now launching a new…",https://medium.com/@AITutorMaster/revolutionizing-ai-metas-llama-language-model-outperforms-gpt-3-and-breaks-barriers-10128043cfca?source=topics_v2---------31-84--------------------efd11874_c34a_4005_a85a_e67044e5b8f4-------17,https://miro.medium.com/fit/c/140/140/1*orAuAaC9qzo5CsKGMpURtw.png,ai 152,154,How To Help Syria And Make It Great Again. A demonstration of an LLM tool.,"I Asked the following question to chatgpt, How to help Syria and make it great again ? with emojies ? using some exmaple from the reecent and old history ? An Here is the Answer It’s important to note that the situation in Syria is complex and multifaceted, and there are no simple solutions to the challenges that the country faces. However, there are some steps that can be taken to help support the Syrian people and contribute to their long-term well-being.",https://medium.com/@malekba7/how-to-help-syria-and-make-it-great-again-a-demonstration-of-chatgpt-b8db907975e9?source=topics_v2---------32-84--------------------efd11874_c34a_4005_a85a_e67044e5b8f4-------17,https://miro.medium.com/fit/c/140/140/0*sjoYR7Ce4D_VywPz,ai 153,155,ChatGPT + Stable Diffusion: Part 3,"It’s been a long day, and I’m tired. I don’t want to have to work very hard right now. But I do want to to see a beautiful and imaginative landscape, inspired by Studio Ghibli. So what do I do? First, I ask ChatGPT, one AI app, to generate a…",https://medium.com/@ludirehak/chatgpt-stable-diffusion-part-3-8c91d968e7a0?source=topics_v2---------33-84--------------------efd11874_c34a_4005_a85a_e67044e5b8f4-------17,https://miro.medium.com/fit/c/140/140/1*AsKB3WVtkv-UG6uOhdoVYw.png,ai 154,156,Upcoming IDO’s,"As one of the newest launchpads in the crypto space, Array has already made waves for its commitment to hosting only #RealYield projects. With its unique staked tier system and user-friendly DEX, Array will become the go-to platform for investors on Arbitrum who want to make a long-term impact in…",https://medium.com/@arraycapital/upcoming-idos-6913e7d83ea8?source=topics_v2---------34-84--------------------efd11874_c34a_4005_a85a_e67044e5b8f4-------17,https://miro.medium.com/fit/c/140/140/1*4nkn-u17x80BLp4l_V2exg.png,ai 155,157,What is Causal Machine Learning?,"A Gentle Guide to Causal Inference with Machine Learning Pt. 2 — Causal Machine Learning seems to be the most trending new buzzword in Data Science at the moment. But what is it really? In this blog series, we give a gentle introduction for newcomers to causal inference. Causal Machine Learning — The Name of the Game In the last few decades, researchers have developed more and more sophisticated artificial intelligence…",https://medium.com/causality-in-data-science/what-is-causal-machine-learning-ceb480fd2902?source=topics_v2---------35-84--------------------efd11874_c34a_4005_a85a_e67044e5b8f4-------17,https://miro.medium.com/fit/c/140/140/1*aSPXZG6Fqc7OBC3ioGYBQA.png,ai 156,158,Easy Beginner’s Guide to Mid Journey,"Be the Prominent AI Art Creator! — Mid Journey’s AI Art Generative Tool is a revolutionary and powerful AI program that unleashes your creativity and helps you generate beautiful visuals with the help of artificial intelligence and machine learning. Mid Journey’s AI Art Generative Tool is made with a user-friendly interface, making it perfect for unleashing your…",https://medium.com/@inchristiely/easy-beginners-guide-to-mid-journey-the-revolutionary-ai-art-tool-3b4de95bd4ca?source=topics_v2---------36-84--------------------efd11874_c34a_4005_a85a_e67044e5b8f4-------17,https://miro.medium.com/fit/c/140/140/1*sTXgMwDUW0pk-1yK4iHYFw.png,ai 157,159,The Importance of Hyperparameter Optimization in Deep Learning: Just An Introduction (Very Short & Easy-to-Understand),"Deep learning is a rapidly growing field that has revolutionized the way we approach many complex problems. Deep learning algorithms use artificial neural networks to model complex patterns in data and make predictions. However, these algorithms require many hyperparameters to be set in order to work effectively. Hyperparameters are variables…",https://medium.com/@abhishekmishra13k/the-importance-of-hyperparameter-optimization-in-deep-learning-just-an-introduction-very-short-c36780eac0dd?source=topics_v2---------37-84--------------------1e151278_92a2_4ff2_b02d_f094444d0a6e-------17,https://miro.medium.com/fit/c/140/140/1*xRBhmYkIaNCKC7SB-pXfGQ.png,ai 158,160,ChatGPT + Microsoft Edge = ?,"The New Bing Review — Nobody’s really used Bing so much before. But now things are looking different. Microsoft recently announced the new Bing with AI. They call it not just a search engine, but a research assistant, personal planner and creative partner at your side whenever you search the web. You may think “oh…",https://medium.com/my-learning-journal/chatgpt-microsoft-edge-981fef979792?source=topics_v2---------38-84--------------------1e151278_92a2_4ff2_b02d_f094444d0a6e-------17,https://miro.medium.com/fit/c/140/140/1*1UMId6f-CD64va1x9TyvYg.jpeg,ai 159,161,11 AI Tools You Should Know About,"In today’s world, Artificial Intelligence (AI) is significantly altering our lifestyle and work practices. With its transformative impact on diverse sectors, such as video games, art, and content creation, AI is revolutionizing industries. This article aims to inform you about 11 AI tools that you must be aware of. Opus Opus…",https://medium.com/@kapcho/11-ai-tools-you-should-know-about-ee97f968bb4?source=topics_v2---------43-84--------------------1e151278_92a2_4ff2_b02d_f094444d0a6e-------17,https://miro.medium.com/fit/c/140/140/1*7TkpTskyRqKd36E2SeSMXA.jpeg,ai 160,162,Can Cognitive Bias in AI/ML Models be eliminated ?,Recently the Artificial Intelligence / Machine Learning (AI/ML) space has been buzzing to say the least. Chat GPT has raised quite a storm of debates and questions about how AI is going to take over the jobs and then consequently enslave all of humanity and the conquer the world! A…,https://medium.com/@deepti-nagarkar/can-cognitive-bias-in-ai-ml-models-be-eliminated-7797c5d44420?source=topics_v2---------44-84--------------------1e151278_92a2_4ff2_b02d_f094444d0a6e-------17,https://miro.medium.com/fit/c/140/140/0*8wYAmENC7UlRpZm1,ai 161,163,Future of Technology in Architecture,Digital Design and Fabrication,https://medium.com/@furkanceylan3850/future-of-technology-in-architecture-b49998223a43?source=topics_v2---------45-84--------------------1e151278_92a2_4ff2_b02d_f094444d0a6e-------17,https://miro.medium.com/fit/c/140/140/0*ekkOzQhGSbKfqqyn,ai 162,164,Rainhill Trials for AI,"The ARC challenge and the future of AI Nobody can predict the future reliably, but history can sometimes give us an idea of how things will unfold. Today we may be on the cusp of an AI revolution, or we could be in for several more years of debate, disappointed…",https://medium.com/@markryan-69718/rainhill-trials-for-ai-b670c026d82d?source=topics_v2---------46-84--------------------1e151278_92a2_4ff2_b02d_f094444d0a6e-------17,https://miro.medium.com/fit/c/140/140/1*66EmK1N49CI5g0sxvMmh2Q.jpeg,ai 163,165,Experience the Power of AI with these Must-Have Free Start-up Tools,"Namelix 1.Namelix — is a cutting-edge business name generator that utilizes artificial intelligence to create short, memorable, and distinctive names that are tailor-made for your business. You can input keywords that are related to your business concept, and Namelix will generate name ideas based on an advanced language model. The generator…",https://medium.com/@nhshinwari21/experience-the-power-of-ai-with-these-must-have-free-start-up-tools-4fa6e552760a?source=topics_v2---------47-84--------------------52cf93d6_9f81_4517_a4b6_012539aad6d0-------17,https://miro.medium.com/fit/c/140/140/0*7uJvWFRarVN6d0gS,ai 164,166,What is Synthetic Data Generation?,"Introduction Synthetic data generation is the process of creating artificial datasets that mimic real-world data. It’s an increasingly popular method in data science, machine learning, and artificial intelligence for a variety of reasons. One of its main advantages is that it provides a way to overcome real-world data limitations such as…",https://medium.com/ubiai-nlp/what-is-synthetic-data-generation-fe94af8c204b?source=topics_v2---------49-84--------------------52cf93d6_9f81_4517_a4b6_012539aad6d0-------17,https://miro.medium.com/fit/c/140/140/0*yptQJZJuEntaUAkO,ai 165,167,LLaMA model release reactions,"Meta AI released a 1.4 trillion token model leading to an an important talk about LLM licensing aspects. — Introduction Meta AI’s released new Large Language Model (LLM) called LLaMA (Large Language Model Meta AI). I planned to cover the model here, but I decided to instead cover the public talk generated by the model related to the LLMs licensing terms. …",https://medium.com/@tmmtt/llama-model-release-reactions-11d559625a53?source=topics_v2---------51-84--------------------52cf93d6_9f81_4517_a4b6_012539aad6d0-------17,https://miro.medium.com/fit/c/140/140/0*q8M29XAwrAmOlueF,ai 166,168,A colleague is calling for her Robot- 4,"#fiction #scific #sciencefic Note: The original article is on the author’s website, nidhikayadav.com. Note: All characters here are fictional and bear no resemblance to anyone alive or who passed away. Any resemblance is a mere coincidence. Teddy woke up earlier today. He was excited to meet Robot Miso so much…",https://medium.com/@nidhika-yadav-writtings/a-colleague-is-calling-for-her-robot-4-a1be27f54a71?source=topics_v2---------52-84--------------------52cf93d6_9f81_4517_a4b6_012539aad6d0-------17,https://miro.medium.com/fit/c/140/140/1*YnFoAkSsldU_XLeU_sg8Ag.png,ai 167,169,Ghost in the Machine,An Unexpected Guest Visits an AI Designer — I need a set of images for this. Something spooky. The campaign had been on his mind for some time. It would be a promotional campaign that could run across multiple social platforms with a branded set of complimentary images and professional typography. …,https://medium.com/fictionfaction/ghost-in-the-machine-43b639ac2ad5?source=topics_v2---------54-84--------------------52cf93d6_9f81_4517_a4b6_012539aad6d0-------17,https://miro.medium.com/fit/c/140/140/1*q9vovA4imKGZu6YJ8F_6aQ.jpeg,ai 168,170,Science Takes Skin Sensing to the Next Level: Artificial Skin Outperforms Human Skin,"Introduction Have you ever wanted to feel something that’s been too far away for you to touch? Well, scientists have just made that possible with artificial skin. This new type of artificial skin has the potential to revolutionize how machines and humans interact with each other. …",https://medium.com/@pencihub/science-takes-skin-sensing-to-the-next-level-artificial-skin-outperforms-human-skin-86439a274a30?source=topics_v2---------55-84--------------------436573fc_d7cd_464c_ad4b_11b38b9e36f0-------17,https://miro.medium.com/fit/c/140/140/0*QSibpjrt-u7ab_sQ,ai 169,171,"What is Web 3.0? Its Concept, Advantages and Limitations","Some say it’s the future of the internet, others — that it’s a utopian idea that will never grow its following and most have not heard about it at all or have no understanding of what it is. So let’s break it down, what is Web 3.0? The History of the Internet The Concept of Web 3.0 Web 3.0 Advantages Web 3.0 Limitations Opinion The History of the Internet The World Wide Web and Web 1.0 started evolving more than three decades ago, with the first internet sites being static, immovable domains of knowledge, similar to encyclopedias. Then came user creator era…",https://medium.com/@vaivka/what-is-web-3-0-its-concept-advantages-and-limitations-dbdd1c3e6e14?source=topics_v2---------56-84--------------------436573fc_d7cd_464c_ad4b_11b38b9e36f0-------17,https://miro.medium.com/fit/c/140/140/1*GqqVmEKWC-5keR26BuVSEw.png,ai 170,172,Artificial intelligence cryptocurrency prospects,"Cryptocurrencies and artificial intelligence are technologies that are on the minds of everyone. And they have more in common than meets the eye. The combination of blockchain and AI developments, where data analysis and machine learning improve the functionality and use of cryptocurrencies, is a new direction in developing digital…",https://medium.com/@alena-shevtsova/artificial-intelligence-cryptocurrency-prospects-dc99737d2774?source=topics_v2---------57-84--------------------436573fc_d7cd_464c_ad4b_11b38b9e36f0-------17,https://miro.medium.com/fit/c/140/140/1*e3y2mh3CuOrQTO53YPqnlA.jpeg,ai 171,173,Contextualizing our world with data — a D3M Labs series,"A four part D3M Labs series about how communications professionals use data. Published on D3M Labs by Elizabeth Press / February 27, 2023 Communications professionals are increasingly using data to architect their messaging and build relationships with us. The impact can range from branding and connecting with customers and prospects, to reporting about world events. Part 1: Why creatives in advertising should…",https://medium.com/@ElizabethGPress/contextualizing-our-world-with-data-309cbfb7915a?source=topics_v2---------58-84--------------------436573fc_d7cd_464c_ad4b_11b38b9e36f0-------17,https://miro.medium.com/fit/c/140/140/1*5Np4ETzdNtjVQmMdh46Pgw.png,ai 172,174,Legalizing ChatGPT: A Debate That’s Dividing the Internet,"They’re already here. AI systems like ChatGPT generate human-like content with impressive quality. But just because we can use them doesn’t mean we should — a critical perspective on AI systems and how to make their use responsible. Artificial intelligence (AI) has taken the world by storm, making remarkable strides…",https://medium.com/@jpwahle/legalizing-chatgpt-a-debate-thats-dividing-the-internet-a85710d3c79?source=topics_v2---------59-84--------------------436573fc_d7cd_464c_ad4b_11b38b9e36f0-------17,https://miro.medium.com/fit/c/140/140/1*HgJpOh6pO_MByjWdcbD1Ow.jpeg,ai 173,175,FreestyleGPT: An AI Chat App that Generates Rap Lyrics,"⬇️ ️️a demo of the app can be found below ⬇️ Introduction When the beat drops and the words start to flow, freestyle rap transforms into a raw, unfiltered form of artistic expression that captivates both the artist and the audience. Freestyle is a style of…",https://medium.com/@lognorman/freestylegpt-an-ai-chat-app-that-generates-rap-lyrics-95bea8830cbd?source=topics_v2---------61-84--------------------0a63874d_06c5_4df9_a265_2e47b1ef0b9e-------17,https://miro.medium.com/fit/c/140/140/1*kYvFcO_7zaThQqXK8JV1KQ.png,ai 174,79,ChatGPT and AI: Driving the Fourth Industrial Revolution,"The Fourth Industrial Revolution, or Industry 4.0, is upon us, and it’s set to change the way we live and work in profound ways. At the heart of this transformation lies Artificial Intelligence (AI), the technology that’s driving innovation across industries and enabling us to do things we never thought…",https://medium.com/illumination/chatgpt-and-ai-driving-the-fourth-industrial-revolution-79f60802202e?source=topics_v2---------64-84--------------------0a63874d_06c5_4df9_a265_2e47b1ef0b9e-------17,https://miro.medium.com/fit/c/140/140/0*bQVTnAXem-EoURlb,ai 175,176,Machine Learning at a Glance,"Machine learning is a branch of AI technology. It focuses on using data and algorithms to replicate the way human learning is accomplished. The more data and time a machine has, the more it learns and improves in the task it is set out to do. The term was first…",https://medium.com/@bbsegelke/machine-learning-at-a-glance-5f55170d73d3?source=topics_v2---------65-84--------------------0a63874d_06c5_4df9_a265_2e47b1ef0b9e-------17,https://miro.medium.com/fit/c/140/140/0*hPFomi_PvQ7QcTgf,ai 176,177,KataGo’s Gotta Go,The past few months have been a rollercoaster for the whole field of AI. In November ChatGPT was released to the public leading many to profess that a new age has begun. Just like with the internet and the steam engine before that had opened up a new world for…,https://medium.com/the-polymaths-journey/katagos-gotta-go-a6914fdb7b0f?source=topics_v2---------66-84--------------------0a63874d_06c5_4df9_a265_2e47b1ef0b9e-------17,https://miro.medium.com/fit/c/140/140/0*riRusE6-gK7xzOzw.png,ai 177,178,Here’s what AI & the world looks like in 2033,There’s a decent chance we – by 2033 – overcome multiple existential AI crises and end up highly prosperous and well catered for welfare wise. That’s if we can avoid WW3 or Big Brother. AI — and going 100% renewable via technology — have a lot to offer to the…,https://medium.com/@paul.k.pallaghy/heres-what-ai-the-world-looks-like-in-2033-989aae37b1db?source=topics_v2---------68-84--------------------fad1101b_944c_4032_88a6_91402496cdb9-------17,https://miro.medium.com/fit/c/140/140/0*s7F9Q8YC1ZcmgeKa.jpg,ai 178,179,ChatGPT: Transforming Communication and Content Creation in the Digital Era,"I am thrilled to tell you an enthralling story about ChatGPT and how it’s been put to the best use. In today’s age of technology, where almost everything is automated, the need for reliable and accurate language processing has become paramount. …",https://medium.com/@unorganizedchaosart/chatgpt-transforming-communication-and-content-creation-in-the-digital-era-d3f3ca7a06d8?source=topics_v2---------69-84--------------------fad1101b_944c_4032_88a6_91402496cdb9-------17,https://miro.medium.com/fit/c/140/140/0*IZTBhUx72vroGB0r,ai 179,180,Top 5 ways to profit from this AI Boom in 2023.,"AI is here to stay and becoming increasingly widespread in our daily lives, and its impact on society and business is undeniable. AI has been a popular topic of discussion lately as never before, and it’s no surprise that it’s being touted as the big thing in technology. With AI…",https://medium.com/@benjaminampouala/top-5-ways-to-profit-from-this-ai-boom-in-2023-e929706f2da1?source=topics_v2---------70-84--------------------fad1101b_944c_4032_88a6_91402496cdb9-------17,https://miro.medium.com/fit/c/140/140/1*vOlgvMBiCHXS1fmSGE_zwA.jpeg,ai 180,181,The AI Future of Sound is Here,"AI Tools for Professional Voice and Sound Production — Voice and sound production have always been an essential part of the entertainment and media industry, from movies and TV shows to video games and podcasts. With the rapid development of AI technology, new tools and software are emerging that allow for even more creativity and flexibility in voice and…",https://medium.com/@gesikowski/the-ai-future-of-sound-is-here-c2eac57055a9?source=topics_v2---------71-84--------------------fad1101b_944c_4032_88a6_91402496cdb9-------17,https://miro.medium.com/fit/c/140/140/1*xyz-RdRedOuc8DnqQBnLYA.jpeg,ai 181,182,Artificial Intelligence in the Legal Industry: Enhancing Efficiency and Improving Outcomes.,"Artificial Intelligence (AI) is transforming the legal industry by enabling more efficient and accurate document review, contract analysis, and legal research. Here are some ways in which AI is enhancing efficiency and improving outcomes in the legal industry. Document Review and Contract Analysis. AI-powered document review tools can analyze large…",https://medium.com/@OfentseManchidi/artificial-intelligence-in-the-legal-industry-enhancing-efficiency-and-improving-outcomes-a43853237fc4?source=topics_v2---------72-84--------------------fad1101b_944c_4032_88a6_91402496cdb9-------17,https://miro.medium.com/fit/c/140/140/1*Piek7-ruU1LXCVIrtO0AAQ.png,ai 182,183,The Impact of Web3 on the Luxury Industry,"Learn how Web3 impacts the Luxury industry market in 2023 and beyond. Explore trends and see why Blockchain, AI, and others will change the customer journey and unlock value for an entire industry. — Welcome to the opening of a series of articles in which I will explore the impact of Web3 on different segments of the luxury industry. In this post, I will touch upon what I see as the most crucial aspects of these new technologies and the risks and benefits for…",https://medium.com/@inside-block/the-impact-of-web3-on-the-luxury-industry-508a4389041?source=topics_v2---------73-84--------------------fad1101b_944c_4032_88a6_91402496cdb9-------17,https://miro.medium.com/fit/c/140/140/1*rOC9bZtgQG6JYhmMBMMr9g.png,ai 183,184,AI vs AI Paleoart Showdown: Neanderthal Family,"Can cutting-edge image generators grant us a glimpse into the past? Relatives to Homo sapiens, Neanderthals were humans of a different sort. Text-to-image generators using artificial intelligence may be of no real scientific value when it comes to paleontology and reconstructive artwork. …",https://medium.com/generative-ai/ai-vs-ai-paleoart-showdown-neanderthal-family-5d0a3ce40081?source=topics_v2---------74-84--------------------fad1101b_944c_4032_88a6_91402496cdb9-------17,https://miro.medium.com/fit/c/140/140/1*lE_Zb9c1snNavuY_i-J8JQ.jpeg,ai 184,185,How ChatGPT is changing the face of AI conversations,"Artificial intelligence (AI) has come a long way in recent years, and one of the most exciting developments is the rise of language models like ChatGPT. ChatGPT is a powerful natural language processing (NLP) model developed by OpenAI that can generate human-like responses to text-based conversations. In this article, we’ll…",https://medium.com/design-bootcamp/how-chatgpt-is-changing-the-face-of-ai-conversations-609173cdd905?source=topics_v2---------75-84--------------------fad1101b_944c_4032_88a6_91402496cdb9-------17,https://miro.medium.com/fit/c/140/140/0*gsIx4jV6Ft-uVoMJ,ai 185,12,Why Mendeleev didn’t use chatGPT when he created the Periodic Table,"Mendeleev taught us the power of thinking deeply to find explanations Black box approaches are increasingly popular in AI, machine learning, and computational data science. By black box, I mean computational approaches that make predictions without explaining their rationale. …",https://medium.com/@brentstockwell/mendeleev-vs-chatgpt-and-microsoft-bing-7549541a267a?source=topics_v2---------76-84--------------------fad1101b_944c_4032_88a6_91402496cdb9-------17,https://miro.medium.com/fit/c/140/140/1*fiykku0EFni-q8gJND6C9w.jpeg,ai 186,6,LLMs and the Emerging ML Tech Stack,Authors: Harrison Chase and Brian Raymond The pace of development in the Large Language Model (LLM) space has exploded over the past several months and one of the most interesting storylines has been the rapid shift toward a new tech stack to support an entirely new engagement pattern with these…,https://medium.com/@brian_90925/llms-and-the-emerging-ml-tech-stack-6fa66ee4561a?source=topics_v2---------0-84--------------------164c50fb_eb65_40bc_89aa_ddb5906e2cd6-------17,https://miro.medium.com/fit/c/140/140/1*DUj2M1dzbDNforbMhZ3WGw.png,nlp 187,186,"Introducing txtchat, next-generation conversational search and workflows for all","Talk with your data and see what you learn — It’s a great time to be involved in Natural Language Processing (NLP). Exciting new models, methods and systems are being released at a breathtaking pace. It’s hard to keep up! Unless you’ve been living under a rock, you’ve at least heard of ChatGPT by now. The potential of large…",https://medium.com/neuml/introducing-txtchat-next-generation-conversational-search-and-workflows-for-all-97557009fb53?source=topics_v2---------1-84--------------------164c50fb_eb65_40bc_89aa_ddb5906e2cd6-------17,https://miro.medium.com/fit/c/140/140/1*Bo7IsqL8-8yEKekIUiE0Gw.jpeg,nlp 188,187,Build a Telegram chatbot with any AI model under the hood,"tl;dr: we are building a text summarization bot for long articles, but I keep the code as general as possible, so consider it as a Python template for wrapping any model into a bot. Don’t want to read the post? Go to the github repo. Or read a summary of…",https://medium.com/@galperovich/build-a-telegram-chatbot-with-any-ai-model-under-the-hood-62f9a8675d81?source=topics_v2---------2-84--------------------164c50fb_eb65_40bc_89aa_ddb5906e2cd6-------17,https://miro.medium.com/fit/c/140/140/1*PM1Z59NDR0zGMwGzg0bpWA.png,nlp 189,188,Analysing the Sentiments behind British Airways Customer Reviews posted on Skytrax,"Part 2 In this article, I will continue the discussion from the first part of this series. In the previous article, I discussed the processes I followed in the execution of this project: from data collection, through to sentiment analysis. In this article, I discuss the topic modelling step of…",https://medium.com/@edudzi-m/analysing-the-sentiments-behind-british-airways-customer-reviews-posted-on-skytrax-b792a269c2a6?source=topics_v2---------4-84--------------------164c50fb_eb65_40bc_89aa_ddb5906e2cd6-------17,https://miro.medium.com/fit/c/140/140/0*6YNeXxKgIlTgAzRd,nlp 190,189,My Journey of Fine-Tuning GPT-3 with a Custom Dataset,"Riding the Wave of GPT-3 Hype Open AI’s GPT-3 — wherever you turn, that's what everyone is talking about! The massive language model has taken the AI community by storm and everyone is eager to see what this model is capable of. As an AI enthusiast, I was eager to…",https://medium.com/version-1/my-journey-of-fine-tuning-gpt-3-with-a-custom-dataset-73666cee084e?source=topics_v2---------5-84--------------------164c50fb_eb65_40bc_89aa_ddb5906e2cd6-------17,https://miro.medium.com/fit/c/140/140/1*162adRWa6jC-zqffxmJAtg.jpeg,nlp 191,190,Fine-Tune OpenAI’s GPT-2 Model To Take Content Creation to the Next Level,"We’ve all heard about ChatGPT and been impressed by the outputs. Although, it may seem like we have to wait for OpenAI to release new versions for us to get better results. However, what if you want to automatically improve the performance of the content creation without having to wait…",https://medium.com/@alexanderkell/optimise-ai-generated-content-how-fine-tuning-openais-gpt-2-model-can-take-automated-content-488ac6168507?source=topics_v2---------6-84--------------------164c50fb_eb65_40bc_89aa_ddb5906e2cd6-------17,https://miro.medium.com/fit/c/140/140/1*h0thSwEzE4Pqowhv8_d5mw.png,nlp 192,191,How to Build a Simple Chatbot with Python and NLTK,"Have you ever found yourself chatting with a customer service bot or a virtual assistant and wondered how it works? Or perhaps you’ve had an idea for a chatbot that you’d like to build yourself, but you’re not sure where to start. If so, you’re in luck! In this article…",https://medium.com/@SPX701/how-to-build-a-simple-chatbot-with-python-and-nltk-4c7867a06260?source=topics_v2---------7-84--------------------164c50fb_eb65_40bc_89aa_ddb5906e2cd6-------17,https://miro.medium.com/fit/c/140/140/1*xjPczWGV1HJMfUSibFYczw.jpeg,nlp 193,192,Text Summarization and Keyword Extraction from customer reviews in French (Part 2/ 3),"After we have seen how to use pre-trained model to tackle the summarization task on French reviews discussed on the first part of the series, we are going to dive deeper into extract only key information from each review. In this task of key word extraction, we are to perform: …",https://medium.com/@ka.kaewnoparat/text-summarization-and-key-word-extraction-from-customer-reviews-in-french-part-2-3-94abb60b0444?source=topics_v2---------8-84--------------------164c50fb_eb65_40bc_89aa_ddb5906e2cd6-------17,https://miro.medium.com/fit/c/140/140/1*qeRv2Y3MGlCOmAlGnrE0Pw.png,nlp 204,203,Amazon DevOps Guru,The Guru!! DevOps became one of the fastest methodology which gets followed across the technology sectors. The next-gen DevOps will be powered by Artificial Intelligence and Machine Learning Amazon DevOps Guru is an AWS service which is offering ML powered DevOps as a service Amazon DevOps Guru Amazon DevOps Guru is a AI…,https://medium.com/@jaspersamuel/amazon-devops-guru-b15178081b6f?source=topics_v2---------0-84--------------------2622451a_898a_4e78_b698_e1e9946b9ddf-------17,https://miro.medium.com/fit/c/140/140/1*MKBoDpjhnFR8bwzrc8jvOQ.jpeg,cloud-services 205,204,Multicloud Strategy!,"What’s Multicloud and why organizations are opting this? A Multicloud strategy is an approach to computing that involves using two or more cloud computing platforms to support a company’s data storage, application deployment, and other IT needs. Benifits: For example, one provider may excel at providing machine learning services, while…",https://medium.com/@beeindian04/multicloud-strategy-54e7d2b2d1c5?source=topics_v2---------1-84--------------------2622451a_898a_4e78_b698_e1e9946b9ddf-------17,https://miro.medium.com/fit/c/140/140/1*PeBtf6fdEM9L5xtILZKNLA.png,cloud-services 206,205,Using Cloudinary Gem with Ruby on Rails,You’re all ready to push your Rails app to Heroku. Everything is good to go. You push… but your pics aren’t there! ? This is because on Heroku you can’t upload or store your images without an external service. You start to feel stuck. You feel like a black cloud…,https://medium.com/@pickelljoel/how-to-use-cloudinary-gem-in-ruby-on-rails-app-f1c1912a144f?source=topics_v2---------2-84--------------------2622451a_898a_4e78_b698_e1e9946b9ddf-------17,https://miro.medium.com/fit/c/140/140/1*QTFi3Y96Mp2IXMyyN-r0Yw.jpeg,cloud-services 207,206,Using API Gateway with Lambda to Send a Message to SQS,API Gateways provide a unified entry point across internal API’s. An API sits between backend services and a client requester to transmit requests and are essential for securing microservices. To help understand the concept a little better an API is like a waiter in a restaurant who takes orders from…,https://medium.com/@chanel.jemmott/using-api-gateway-with-lambda-to-send-a-message-to-sqs-a7362866075f?source=topics_v2---------3-84--------------------2622451a_898a_4e78_b698_e1e9946b9ddf-------17,https://miro.medium.com/fit/c/140/140/1*IVYZ7UCzS4t8HKmHwID22Q.png,cloud-services 208,207,Using LiteFS with Bun on Fly.io,"As neither Bun nor LiteFS are recommended for production yet, I’ve decided it was obviously a good idea to deploy “their synergy” on fly.io ? “… but why?” … well, this is why! What’s Bun very good at:",https://medium.com/@webreflection/using-litefs-with-bun-on-fly-io-55529096fff4?source=topics_v2---------4-84--------------------2622451a_898a_4e78_b698_e1e9946b9ddf-------17,https://miro.medium.com/fit/c/140/140/1*ge609jpi4f_pXy7jAtAkeA.jpeg,cloud-services 209,208,What is Azure Sentinel,"Introduction Cybersecurity is an ever-growing concern in the modern world, and organizations need all the help they can get to ensure their data remains safe. Azure Sentinel is a cloud-native SIEM solution that integrates with existing solutions from Microsoft, such as Office 365 and Windows Defender Advanced Threat Protection (ATP). It…",https://medium.com/@ip-specialist/what-is-azure-sentinel-40491e1d3efd?source=topics_v2---------5-84--------------------2622451a_898a_4e78_b698_e1e9946b9ddf-------17,https://miro.medium.com/fit/c/140/140/1*U6hIcon9UB2RL24ZmoI4pA.jpeg,cloud-services 210,209,Why is the service mesh a critical component of the cloud-native environment?,"Introduction The cloud-native environment is becoming increasingly complex, with applications running on distributed infrastructures and managed by multiple teams. As a result, there is a growing need for tools that can help manage the complexity and ensure that applications are reliable and secure. The service mesh is one such tool that…",https://medium.com/@w2ssolutions/why-is-the-service-mesh-a-critical-component-of-the-cloud-native-environment-a3e4ab157639?source=topics_v2---------6-84--------------------2622451a_898a_4e78_b698_e1e9946b9ddf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-services 211,210,Eight Critical Success Factors for Cloud Migration,"Migrating to cloud requires substantial time and commitment. Businesses with a long history in on-premises data centers and with substantial regulatory and compliance requirements need to act boldly and decisively to achieve meaningful outcomes. Cloud service providers (CSPs) offer documentation, adoption frameworks and resources to assist in this journey, along…",https://medium.com/@dglcinc/eight-critical-success-factors-for-cloud-migration-4aaffb383459?source=topics_v2---------7-84--------------------2622451a_898a_4e78_b698_e1e9946b9ddf-------17,https://miro.medium.com/fit/c/140/140/1*_8WxdYRqB8wkxX1pUNsA6A.png,cloud-services 212,211,Cloud Computing ☁️☁️,"If you’re seeking to expand your knowledge of cloud computing and gain a deeper understanding of how it functions, then this series is tailored for you. In our first installment, we aim to answer the question, “What is cloud computing and how does it work?” Our overview will provide you…",https://medium.com/@tc.faiza/cloud-computing-️-️-a4c3baeefc01?source=topics_v2---------8-84--------------------2622451a_898a_4e78_b698_e1e9946b9ddf-------17,https://miro.medium.com/fit/c/140/140/1*43xVESIG-MTuESWrTY207g.png,cloud-services 213,212,ZenDesk vs. Salesforce Service Cloud: A Comparison by Vantage Point Consulting,"When delivering exceptional customer service, choosing the right platform is crucial. Two of the most popular options are ZenDesk and Salesforce Service Cloud. Here, we will compare the two platforms and explain what customers can expect when transitioning. …",https://medium.com/vantage-point-consulting-blog/zendesk-vs-salesforce-service-cloud-a-comparison-by-vantage-point-consulting-b42b57ac831c?source=topics_v2---------9-84--------------------2622451a_898a_4e78_b698_e1e9946b9ddf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-services 214,213,✌?Differences Between React Native and Flutter,"As mobile application development continues to grow, developers are always in search of the best cross-platform mobile app development technologies. React Native and Flutter are both popular frameworks for cross-platform app development. …",https://medium.com/@aliaskari/my-first-post-about-differences-between-react-native-and-flutter-d43182ec6a3d?source=topics_v2---------0-84--------------------b5cca226_82d4_4f95_91c7_6614dcbd42bb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*URM9DzJ0YB4mYWv1k61doA.jpeg,flutter 215,214,The Benefits Of Flutter For App Development,"Hi everyone, I’m Doni, and this is my first post on Medium. Why did I choose “The Benefits Of Flutter For App Development” as my title? Thus, my friends, I’ll be posting about Flutter more frequently in the future. I had been considering building my own website before I decided…",https://medium.com/@donisyahputra21/the-benefits-of-flutter-for-app-development-415320eb352b?source=topics_v2---------1-84--------------------b5cca226_82d4_4f95_91c7_6614dcbd42bb-------17,https://miro.medium.com/fit/c/140/140/1*10RECXGTH5NyaeBg5yD1pw.png,flutter 216,215,Flutter Testing Overview,"As a mobile app developer, you’ve likely heard of unit testing and widget testing. They’re two of the most popular testing methodologies in the world of software development, and for good reason. …",https://medium.com/@santhosh-adiga-u/flutter-testing-overview-3ceead6da475?source=topics_v2---------3-84--------------------b5cca226_82d4_4f95_91c7_6614dcbd42bb-------17,https://miro.medium.com/fit/c/140/140/1*vC5t0s4PU77FOTfm6jq0PQ.png,flutter 217,216,Stream Builder in Flutter,"How to use StreamBuilder in Flutter? Flutter is a popular open-source mobile app development framework that allows developers to build high-performance, cross-platform applications with ease. One of the key features of Flutter is the StreamBuilder widget, which makes it easy to work with streams of data in your Flutter application. …",https://medium.com/@safdarn/stream-builder-in-flutter-706a766e628f?source=topics_v2---------4-84--------------------b5cca226_82d4_4f95_91c7_6614dcbd42bb-------17,https://miro.medium.com/fit/c/140/140/1*pOAwjjq7Ki8SmBm5KTmM3Q.png,flutter 218,217,Sealed Classes in Flutter with BLoC,"Hey folks, I hope you’re having a good day and if not, I am sure that you’re gonna make it a good one and smash it?. In this blog, you’re gonna see what are sealed classes and how you can use it with BLoC. But before diving into the definition…",https://medium.com/@CavinMac/sealed-classes-in-flutter-with-bloc-ee2761418b65?source=topics_v2---------5-84--------------------b5cca226_82d4_4f95_91c7_6614dcbd42bb-------17,https://miro.medium.com/fit/c/140/140/1*h1RBoBXW0c88Cr9q22mmsQ.png,flutter 219,218,Building beautiful product item widget in Flutter: A step-by-step guide,"Product item widgets are a fundamental aspect of any e-commerce application or platform, and building visually appealing and interactive widgets is crucial for providing a seamless user experience. The Intro Product item widgets are an essential component of any e-commerce application or platform that displays products to users. In Flutter, a product…",https://medium.com/@fadlydestriana2/building-beautiful-product-item-widget-in-flutter-a-step-by-step-guide-ed890a53cff4?source=topics_v2---------6-84--------------------b5cca226_82d4_4f95_91c7_6614dcbd42bb-------17,https://miro.medium.com/fit/c/140/140/1*Mr4YSwg7wGTa2f_hqt9vPA.png,flutter 220,219,Localization Guide (Flutter),"Localization is the process of adapting a product or service to meet the language, cultural, and other specific requirements of a particular country or region. It involves translating content, modifying design elements, and adjusting functionality to ensure that the product or service is appropriate for the target market. Localization is…",https://medium.com/@muntasir574/localization-guide-flutter-c5a7dfe1b8a3?source=topics_v2---------7-84--------------------b5cca226_82d4_4f95_91c7_6614dcbd42bb-------17,https://miro.medium.com/fit/c/140/140/1*DopBzNjkaAh4wc50JNBP2Q.png,flutter 221,220,Flutter Developer Roadmap,"Basic Programming: The first step should be to learn a programming language. If you are already proficient in a programming language, you can skip this step. However, a good programming foundation is required before getting started with Flutter. Flutter is written in a programming language called Dart. Therefore, you need…",https://medium.com/@azmisahin/flutter-developer-roadmap-916a410bb736?source=topics_v2---------8-84--------------------b5cca226_82d4_4f95_91c7_6614dcbd42bb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*URM9DzJ0YB4mYWv1k61doA.jpeg,flutter 222,221,Containerizing Flutter web apps with Docker with ubuntu for mac silicon,"I was recently doing flutter web app development. But it took me lot of time to docker build , more precisely lot of time it took me to figure out what I was doing wrong. I was using my MacBook Pro with Mac Silicon (arm64) chip. I was facing 3…",https://medium.com/@therdm/containerising-flutter-web-apps-with-docker-with-ubuntu-for-mac-silicon-1eec1910bd1e?source=topics_v2---------9-84--------------------b5cca226_82d4_4f95_91c7_6614dcbd42bb-------17,https://miro.medium.com/fit/c/140/140/1*3oZliSZW4DxEfVDWn4EIbw.png,flutter 223,222,Concentrated Liquidity on Zyberswap,"Zyberswap v3 Zyberswap, a leading decentralized exchange (DEX) on the Arbitrum network, has unveiled the release of Concentrated Liquidity. With the feature set to go live on February 27th, Zyberswap will be one of the select few decentralized exchanges on the Arbitrum offering Concentrated Liquidity, joining the likes of Uniswap. Concentrated Liquidity…",https://medium.com/@zyberswap/concentrated-liquidity-on-zyberswap-248e50f51888?source=topics_v2---------1-84--------------------b9d1ac32_2569_4aea_a0b2_3ca7ad573d0a-------17,https://miro.medium.com/fit/c/140/140/0*k1b4dt4DBN1rqiMO.png,Cryptocurrency 225,224,Introducing Ariba Inu: The Mexican Dog Taking the Crypto World by Storm,"Move over, Shiba Inu, there’s a new dog in town. Meet Ariba Inu, the hottest new token on the Arbitrum blockchain. Inspired by the vibrant culture and spirit of Mexico, Ariba Inu is making waves with its unique approach to community building and innovative approach to earning mechanisms. At Ariba…",https://medium.com/@aribainu/introducing-ariba-inu-the-mexican-dog-taking-the-crypto-world-by-storm-ece644302792?source=topics_v2---------3-84--------------------b9d1ac32_2569_4aea_a0b2_3ca7ad573d0a-------17,https://miro.medium.com/fit/c/140/140/1*FU3oTLzm3ryFWQ-8lB8MAg.png,Cryptocurrency 226,225,"Shiba Inu (SHIB) Price Prediction 2023–2025, update 25th of February","What Is Shiba Inu (SHIB)? The Shiba Inu ecosystem runs on the Ethereum blockchain, and SHIB is the first and native cryptocurrency of the ecosystem. Dogecoin, its main competitor, uses a system very similar to Bitcoin’s. The coins are ERC-20s, making them more universally compatible. Originally designed as a joke, “n” separate efforts are currently…",https://medium.com/@vremaroiualin/shiba-inu-shib-price-prediction-2023-2025-update-25th-of-february-51b994a7615e?source=topics_v2---------4-84--------------------b9d1ac32_2569_4aea_a0b2_3ca7ad573d0a-------17,https://miro.medium.com/fit/c/140/140/1*ym66wsQSNrnxH4_HJZUavw.jpeg,Cryptocurrency 227,226,The Return of DRIP,"DRIP will rise again, of that I am certain. I happen to own 10 bottles of unopened Aunt Jemima syrup. Please don’t “at” me. Before I did my small buy, I asked my old friend (who happens to be black) what he thought of the hubhub, and he said, “Greeeaaat…",https://medium.com/cryptozoa/the-return-of-drip-1f40aa784b88?source=topics_v2---------6-84--------------------b9d1ac32_2569_4aea_a0b2_3ca7ad573d0a-------17,https://miro.medium.com/fit/c/140/140/1*0WL4bdrLCer8PWRilfLkcg.png,Cryptocurrency 228,227,Does Litecoin Have a Future? (2023 Investment),"Litecoin (LTC) was created in 2011 by Charles Lee and was one of the first altcoins. It quickly found listings on various exchanges and its price reached 30 cents. Litecoin is a decentralized peer-to-peer cryptocurrency and open-source software project released under the MIT/X11 license. Inspired by Bitcoin, Litecoin was among…",https://medium.com/@coinlocally.exchange/does-litecoin-have-a-future-2023-investment-197b34f8a26e?source=topics_v2---------7-84--------------------b9d1ac32_2569_4aea_a0b2_3ca7ad573d0a-------17,https://miro.medium.com/fit/c/140/140/1*edBTLb1C4J51bQxGdw7h_w.jpeg,Cryptocurrency 229,225,I asked ChatGPT: How I split 100$ between Bitcoin and Ethereum?,"Cryptocurrencies such as Bitcoin and Ethereum have become increasingly popular as an investment option over the past few years. With so many options available, it can be challenging to decide which cryptocurrencies to invest in. In this article, we’ll explore how to split $100 between Bitcoin and Ethereum. Bitcoin (BTC) Bitcoin is…",https://medium.com/@vremaroiualin/i-asked-chatgpt-how-i-split-100-between-bitcoin-and-ethereum-42982e5a299c?source=topics_v2---------8-84--------------------b9d1ac32_2569_4aea_a0b2_3ca7ad573d0a-------17,https://miro.medium.com/fit/c/140/140/1*k_TP1dimQ31bXKSY1pd4KA.jpeg,Cryptocurrency 230,228,Salary of a Microsoft Big Data Engineer,"What do you need for working at Microsoft and what can you earn? — It is commonly known that bigger tech companies such as Microsoft, Google and Amazon are paying their employees a respectable salary. Does this also apply to a Big Data Engineer at Microsoft? …",https://medium.com/codex/salary-of-a-microsoft-big-data-engineer-59386d399233?source=topics_v2---------2-84--------------------62b1ad3d_74a0_4cff_8d3a_6db2d70e058b-------17,https://miro.medium.com/fit/c/140/140/0*l_MaVLXukF1mUkee,data-science 231,229,Individualizing my Whoop 4.0 data to better my athletic performance,"Making use of data analytics as an athlete — Despite what my middle school and high school coaches used to say about training harder than everyone else, scientific evidence shows that this approach may not be the most effective for athletes. As a former college baseball player, I learned this lesson throughout my career. Pushing myself to train at…",https://medium.com/@cinoon.bak/individualizing-my-whoop-4-0-data-to-better-my-athletic-performance-38a27da8fab2?source=topics_v2---------5-84--------------------62b1ad3d_74a0_4cff_8d3a_6db2d70e058b-------17,https://miro.medium.com/fit/c/140/140/1*n4O3Hr3G_FqC8NDlClPzRQ.jpeg,data-science 232,230,150 Real Data Science interview questions,"These are 100% authentic data science interview questions that my friends and I have faced in recent times. I compiled this list a couple of months ago for a few friends who were unfortunately laid off from their jobs. Based on their feedback, which indicated that this list was extremely…",https://medium.com/@abhishek.parbhakar/150-real-data-science-interview-questions-cb095f9e4c54?source=topics_v2---------6-84--------------------62b1ad3d_74a0_4cff_8d3a_6db2d70e058b-------17,https://miro.medium.com/fit/c/140/140/1*lZRfKeQsx49F4pTvU-RyZg.jpeg,data-science 233,231,EDA-Ultimate guide for beginners.,"What exactly is EDA? In any given field, one wants to learn about any new insights. What can they change, and what can they add to improve their business? We tend to see pretty visualizations during this process, graphs, and the like of it. As a data scientist, you want…",https://medium.com/@wanjikulucille/eda-ultimate-guide-for-beginners-abba0e4d842f?source=topics_v2---------7-84--------------------62b1ad3d_74a0_4cff_8d3a_6db2d70e058b-------17,https://miro.medium.com/fit/c/140/140/1*j_w2xskJ3IrkEruiX8as3w.png,data-science 234,232,Diabetic Prediction Model using Python Machine Learning,"Introduction In this article, we will be learning how to use the Train Test Split model to divide a dataset into four parts, develop a prediction model, and also analyze the predictions and dataset through a use case. Use Case — Problem Statement Our goal for this article is to predict whether patients have diabetes or…",https://medium.com/@smad347/diabetic-prediction-model-using-python-machine-learning-7a6f1eb8f913?source=topics_v2---------8-84--------------------62b1ad3d_74a0_4cff_8d3a_6db2d70e058b-------17,https://miro.medium.com/fit/c/140/140/1*ueRWd5yOzBYLEWl8_H9Kxg.png,data-science 235,234,McPepe’s Grand Opening,"Today is the grand opening of McPepe’s, the infinite Pepe image generator. McPepe’s mission is to deliver all possible variations of Pepe to as many people as possible. We’ve built an infrastructure to be able to produce 2,000,000 Pepes per day — and we need you to help create new…",https://medium.com/@mcpepes/mcpepes-grand-opening-eff681052593?source=topics_v2---------0-84--------------------077bcb82_1cfb_49af_a8c5_a00e364ce554-------17,https://miro.medium.com/fit/c/140/140/1*FZuQ_8kdKhoimlIDSm9Jnw.png,web3 236,234,Welcome to McPepe’s,"Ancient Mesopotamia. Ancient Egypt. Ancient Disney. What did these three great civilizations have in common? The frog. A symbol of fertility. A symbol of life. A symbol of transformation. And now, as we enter the next phase of humanity’s development, Modern Web3, we are witnessing the lucky omen of the…",https://medium.com/@mcpepes/welcome-to-mcpepes-917c2840bb3d?source=topics_v2---------1-84--------------------077bcb82_1cfb_49af_a8c5_a00e364ce554-------17,https://miro.medium.com/fit/c/140/140/1*PpprOWLpghFsxM_kfvu6Qg.jpeg,web3 237,235,Altura to Join Unity’s Verified Solutions Program,"Greetings Alturians ?, We have some exciting news. Arguably, the most exciting news in the history of Altura. Unity has included eleven of the top Web3 companies in its Verified Solutions program. Altura is one of those top companies alongside heavyweights like Algorand, Infura, Metamask, Solana, and Tezos. Unity’s position…",https://medium.com/@alturanft/unity-selects-altura-to-join-unity-verified-solutions-program-a3075ba9cc97?source=topics_v2---------2-84--------------------077bcb82_1cfb_49af_a8c5_a00e364ce554-------17,https://miro.medium.com/fit/c/140/140/0*TYx25iHvBzkpFhA5.png,web3 238,236,A look into the $WXM smart contract,"While the code of the $WXM token smart contract is not publicly available yet, it’s very close to being finalized. Here are some insights on its design and the decisions we’ve made. — WeatherXM stands at the intersection of Meteorology, Internet of Things (IoT) and Web3. This is the first article in a series that will present various Web3 aspects of the project, while explaining the fundamentals of Web3 to members of our community that don’t have a Web3 background.",https://medium.com/weatherxm/a-look-into-the-wxm-smart-contract-1947141c99e3?source=topics_v2---------3-84--------------------077bcb82_1cfb_49af_a8c5_a00e364ce554-------17,https://miro.medium.com/fit/c/140/140/1*ciWl_N5xsfGQeT1P-6saTQ.png,web3 239,237,OpenEx integrates with Galxe Passport to empower NFT holders.,"In OpenEx, we never stop reimagining how a CEX can provide our users and members the best services. Today, we are excited to announce the partnership with Galxe, the world's leading Web3 credential data network. OpenEx will integrate Galxe Passport’s SDK to provide a secure, convenient environment for users to…",https://medium.com/@OpenEx_HQ/openex-integrates-with-galxe-passport-to-empower-nft-holders-352b1621fda6?source=topics_v2---------4-84--------------------077bcb82_1cfb_49af_a8c5_a00e364ce554-------17,https://miro.medium.com/fit/c/140/140/1*dz-HtN9_qku75LUDiBYS9Q.png,web3 240,238,InvArch Network Crowdloan Announcement,"The InvArch Network core team is excited to announce the project’s plans to launch its crowdloan & claim its place on the Polkadot relay chain! The InvArch Network is the DAO hub of web3, providing a multichain foundation for DAOs, multi-party ownership & intellectual property solutions suite, and integrations with…",https://medium.com/@invarch/invarch-network-crowdloan-announcement-eae9d0ccb78f?source=topics_v2---------5-84--------------------077bcb82_1cfb_49af_a8c5_a00e364ce554-------17,https://miro.medium.com/fit/c/140/140/1*5i_6u-KUaXjypokYCy3o8Q.jpeg,web3 241,239,"On network spirituality: a study of Milady and its founder, Krishna Okhandiar (part 1)","Remilia, KaliAcc, and longing — Part I: Longing for (the real name of the founder of the cult behind the concept) Network Spirituality If ever there has been an online cult it’s Milady, or rather, belief in network spirituality, believers in which use Milady as a vehicle to spread their beliefs.¹ When I first heard of Milady, my response was the response of an insect, a response based on prejudice.",https://medium.com/@fredrickbrennan/on-network-spirituality-a-study-of-milady-and-its-founder-rohit-okhandiar-part-1-5854de7139e0?source=topics_v2---------6-84--------------------077bcb82_1cfb_49af_a8c5_a00e364ce554-------17,https://miro.medium.com/fit/c/140/140/1*qVG1SpvZUG-PvTI8C1rMxA.jpeg,web3 242,4,Seedify Monthly Update: A Recap of Top Developments for February 2023,"Hello Seedify Community, As promised we are continuing our monthly updates across all departments of Seedify. February was another incredible month for all the team at Seedify and we have seen everyone working tirelessly to bring some exciting developments to the platform, forge more relationships with opinion leaders and increase…",https://medium.com/@seedifyfund/seedify-monthly-update-a-recap-of-top-developments-for-february-2023-5d574b4865a8?source=topics_v2---------7-84--------------------077bcb82_1cfb_49af_a8c5_a00e364ce554-------17,https://miro.medium.com/fit/c/140/140/0*3PGPL5FT8gOtkTYT,web3 243,240,? Hello world ?,? Why the heck name Actual01❓ ? Experimenting with lot of names and thousands of hours of brainstorming we never ACTUALLY found a name. What inspired us? ? Once upon a time ⏲️ …….. Nope just kidding ? Here is a straight one ? We realized that there was little…,https://medium.com/@actual01.xyz/hello-world-47002a115fce?source=topics_v2---------8-84--------------------077bcb82_1cfb_49af_a8c5_a00e364ce554-------17,https://miro.medium.com/fit/c/140/140/1*HHEc8V-ZLRYQohrWGn3TOA.png,web3 244,241,Aptos Labs brings Web3 to Gaming with its new SDK for Unity developers,"The Aptos Software Development Kit (SDK) is a new stack of gaming developer tools that enables interoperability and transparency within gaming. — tl;dr Aptos Labs, offers new gaming software developer tools — verified software development kit (SDK) — Unity, the world’s leading platform for creating and growing real-time 2D and 3D content. The Aptos SDK is featured on a new “Decentralization” category page in the Unity Asset Store that provides vetted solutions…",https://medium.com/aptoslabs/aptos-labs-brings-web3-to-gaming-with-its-new-sdk-for-unity-developers-e6544bdf9ba9?source=topics_v2---------9-84--------------------077bcb82_1cfb_49af_a8c5_a00e364ce554-------17,https://miro.medium.com/fit/c/140/140/1*_F9OhBgtlRKVKOmtOiruLw.png,web3 245,242,ByTrade Launches BTT Coin,"ByTrade, the fastest-growing crypto trading platform, has launched its native cryptocurrency, BTT Coin, which promises to revolutionise the metaverse, Web3, NFTs and DeFi sectors. With three successful IEO sales, ByTrade has grown its user base to over 1.5 million worldwide. …",https://medium.com/@ByTrade.io/bytrade-launches-btt-coin-62afca5dfa53?source=topics_v2---------0-84--------------------13b06c6f_a63d_4cbe_ab79_513f2b638715-------17,https://miro.medium.com/fit/c/140/140/1*LMdgBrb04HHXMObYuuV3Eg.png,Cryptocurrency 246,243,"Djed Update — Delegation Rewards Distribution, Lowered Transaction Minimums, Elliptic Integration, and UI Improvements","We are happy to share with you the latest updates about Djed. Djed is now the 4th biggest project overall on the Cardano Network. As more and more use cases are being implemented, the adoption of Djed will keep growing. Lower Operational Fees and Transaction Minimums It has been less than a month since the launch…",https://medium.com/cotinetwork/djed-update-delegation-rewards-distribution-lowered-transaction-minimums-elliptic-integration-1e6e4306f747?source=topics_v2---------1-84--------------------13b06c6f_a63d_4cbe_ab79_513f2b638715-------17,https://miro.medium.com/fit/c/140/140/0*KaIeitXv4o8KIeMZ,Cryptocurrency 247,244,CasinoCoin: State of the Token 2023,"CasinoCoin is a unique cryptocurrency that has been making waves in the online casino industry. It is specifically designed to provide a secure, fast, and easy-to-use payment solution for players and operators alike. …",https://medium.com/@casinocoin/casinocoin-state-of-the-token-2023-13ea626404e8?source=topics_v2---------2-84--------------------13b06c6f_a63d_4cbe_ab79_513f2b638715-------17,https://miro.medium.com/fit/c/140/140/0*vzE2HoT3vTKg9fkN,Cryptocurrency 248,245,Erthian HEXBOX Collection Revealed,"Today is the day! Are you ready to find out what tantalizing treasures the Erthian HEXBOX holds? Item Rarity Levels Before the reveal, we need to introduce the different types of item rarities that will be found inside the Ertha Metaverse. Every single Ertha item (yes, even Seaweed), has one of the following…",https://medium.com/@erthium/erthian-hexbox-collection-revealed-d21bbed97441?source=topics_v2---------3-84--------------------13b06c6f_a63d_4cbe_ab79_513f2b638715-------17,https://miro.medium.com/fit/c/140/140/1*d6Ulel_Gdvs49m0KW_yzGw.png,Cryptocurrency 249,246,SingularityDAO Launchpad: Rejuve.AI Token Generation Event,"The world’s leading launchpad for AI projects prepares for its second Token Generation Event — Rejuve.AI Greetings DinoForce, Today, the time has come to announce that the SingularityDAO Launchpad is preparing to go live for a second time to support the Rejuve.AI Token Generation Event (TGE) beginning on March 13th, with KYC…",https://medium.com/singularitydao/singularitydao-launchpad-rejuve-ai-token-generation-event-3ed9ee0d7523?source=topics_v2---------4-84--------------------13b06c6f_a63d_4cbe_ab79_513f2b638715-------17,https://miro.medium.com/fit/c/140/140/0*pEOYYY-6oWoFtC5D,Cryptocurrency 250,247,Rejuve.AI RJV Utility Token Generation Event,"The future of aging research, powered by the RJV token Greetings Singularitarians and Future Supercentenarians, We’re excited to announce that the Rejuve Network is launching its Token Generation Event (TGE) through the SingularityDAO Launchpad beginning on March 13th, with KYC opening March 1st! As a cutting-edge blockchain-based platform that combines…",https://medium.com/rejuve-io/rejuve-ai-rjv-utility-token-generation-event-8fa626648767?source=topics_v2---------5-84--------------------13b06c6f_a63d_4cbe_ab79_513f2b638715-------17,https://miro.medium.com/fit/c/140/140/1*-Q7g9eG-0ywr-Lqnu4Tsaw.png,Cryptocurrency 251,248,Rejuve.AI’s RJV Utility Token Launch: The Future of Longevity Research,"Rejuve.AI’s Token Generation Event starts with KYC on March 1st, Launchpads on March 13th-15th and TGE on March 16th! Greetings Singularitarians, SingularityNET is excited to announce the launch of the Rejuve Utility Token (RJV). Rejuve.AI is a revolutionary initiative aimed at accelerating progress toward radical healthspan extension. Rejuve.AI will improve…",https://medium.com/singularitynet/rejuve-ais-rjv-utility-token-launch-the-future-of-longevity-research-48c1545a7115?source=topics_v2---------6-84--------------------13b06c6f_a63d_4cbe_ab79_513f2b638715-------17,https://miro.medium.com/fit/c/140/140/1*CQ2QxEUeJZeJwiMysa2mXA.png,Cryptocurrency 252,249,MINEBASE CONVETION IN MARCH,Hello Minebase User this is Harald Seiz We start the pre-launch phase of our new marketing concept. Earn from the launch on the entire turnover of Minebase. We are introducing a new starter package. Earn at least double the value in the package from the start. This way you can get up to 120 wallet addresses. …,https://medium.com/@minebase.io/minebase-convetion-in-march-5385bf71301?source=topics_v2---------7-84--------------------13b06c6f_a63d_4cbe_ab79_513f2b638715-------17,https://miro.medium.com/fit/c/140/140/1*LyIk3cwOTSBuUhTM5J6K2A.png,Cryptocurrency 253,250,"? SoonSwap Airdrop 1.0 of 2,100,000 $SOON is Now LIVE!","Greetings from SoonSwap team, We are excited to announce that SoonSwap Airdrop 1.0 is now LIVE! To thank the early supporters of SoonSwap, a total of 2,100,000 $SOON will be provided as rewards. 7000 active participants will be rewarded with $SOON (? Token Utility of $SOON) ? Deadline: Mar 31st…",https://medium.com/soonswap/soonswap-airdrop-1-0-of-2-100-000-soon-is-now-live-9f04a0db9bbe?source=topics_v2---------8-84--------------------13b06c6f_a63d_4cbe_ab79_513f2b638715-------17,https://miro.medium.com/fit/c/140/140/1*R_ieYAF53kI2q-BA7hOIBg.jpeg,Cryptocurrency 254,251,"Announcing Beamex, a decentralized perpetual exchange","A new chapter in the Beamswap books has begun. A leading DEX on Moonbeam is morphing into Beamex, a decentralized perpetual exchange for leverage crypto trading. — What is Beamex? What are the core features of Beamex? BLP token — powering Beamex liquidity What is Beamex? Beamex is the newest perpetual DEX, rising from the successes of Beamswap, a leading DeFi hub on the Moonbeam Network, and expanding it with more opportunities for derivatives trading.",https://medium.com/beamswap/announcing-beamex-a-decentralized-perpetual-exchange-f8a81b0447cf?source=topics_v2---------9-84--------------------13b06c6f_a63d_4cbe_ab79_513f2b638715-------17,https://miro.medium.com/fit/c/140/140/1*Tun1LjKsG_yyaQ4K1jA5KQ.png,Cryptocurrency 262,258,Teaming up with Huobi in a Strategic Partnership,"We’re cooperating with the leading exchange toward mass adoption, enhanced cybersecurity and more. — Along with Huobi, Gala Games is pleased to announce a new strategic partnership with the global exchange. This partnership will focus on ecosystem construction, co-investment and community building. Article from Huobi Global — LINK These are exciting times, right on the heels of GDC 2023…",https://medium.com/gala-games/teaming-up-with-huobi-in-a-strategic-partnership-47e2a468869a?source=topics_v2---------0-84--------------------e90bccc3_6b40_4b52_bc12_9c86a514c411-------17,https://miro.medium.com/v2/resize:fill:140:140/0*UHRUt8vG5tBtawz4,cybersecurity 263,259,Unveiling the Secrets: My Journey of Hacking Google’s OSS,"- August 22, 2022 Dear Infosec, I am excited to share with you my experience of discovering a security vulnerability in Google’s open-source software (OSS) last year. Imagine acquiring an acknowledgement from one of the biggest tech companies in the world for uncovering a security vulnerability…",https://medium.com/bugbountywriteup/unveiling-the-secrets-my-journey-of-hacking-googles-oss-cdd9ef3c7aa?source=topics_v2---------1-84--------------------e90bccc3_6b40_4b52_bc12_9c86a514c411-------17,https://miro.medium.com/v2/resize:fill:140:140/1*8kOzz1yA0Jz-eNODKrkmZg.jpeg,cybersecurity 264,260,Privilege Escalation via Broken Authentication: A Story of $$$,"Hi Fellow Hunters, Hope you are doing well and taking care of your health, this side V3D. I want to write a quick write-up with my friends Anuj (whhackerbsac) and Manav (A_s_h_hunter) on our recent findings. Which is a “Lower Privilege Admin Can Delete Super Admin and Takeover The Workspace”. …",https://medium.com/@v3d/privilege-escalation-via-broken-authentication-a-story-of-220588d53d93?source=topics_v2---------2-84--------------------e90bccc3_6b40_4b52_bc12_9c86a514c411-------17,https://miro.medium.com/v2/resize:fill:140:140/1*WxUJ2qfSvXPXQkq5cEBSdw.jpeg,cybersecurity 265,261,Exposed Docker Registries Server as Critical Reminder on Container Security,"What is Docker? Docker is a computer program that performs operating-system-level virtualization, also known as “containerization”. The Docker Registry HTTP API is the protocol to facilitate the distribution of images to the docker engine. …",https://medium.com/@emad0x90/exposed-docker-registries-server-as-critical-reminder-on-container-security-a9bba13b403d?source=topics_v2---------3-84--------------------e90bccc3_6b40_4b52_bc12_9c86a514c411-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1wN6R_ytXhvoqrrDwISL5w.jpeg,cybersecurity 266,262,Socket | Hack The Box Writeup/Walkthrough | By Md Amiruddin,This is a writeup/walkthrough of Hack the Box machine “Socket” by Md Amiruddin Machine Link :https://app.hackthebox.com/machines/Socket Machine IP : 10.10.11.206,https://medium.com/bugbountywriteup/socket-hack-the-box-writeup-walkthrough-by-md-amiruddin-8b2a4ee35711?source=topics_v2---------4-84--------------------e90bccc3_6b40_4b52_bc12_9c86a514c411-------17,https://miro.medium.com/v2/resize:fill:140:140/1*lVKcrt1Yv2gVvRu9czCTjQ.png,cybersecurity 267,263,Cyber Security: Using Cyber Deception to Fight Off Our Attackers — Who is Our End of Level Boss?,"Too often cyber security is biased to a technology centric consideration of threat actors and their techniques, but as with all threat actors they are humans too! They have to make decisions, feel things, get excited or irritated and deal with a range of different emotions when they are doing…",https://medium.com/@rob_black/cyber-security-using-cyber-deception-to-fight-off-our-attackers-who-is-our-end-of-level-boss-c6d2697eada?source=topics_v2---------5-84--------------------e90bccc3_6b40_4b52_bc12_9c86a514c411-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tletJ_H2dxhKOdDINJhMxA.jpeg,cybersecurity 268,264,The Right Connection: Building Cybersecurity Synergy through Mindful Leadership.,"In today´s digital world, cybersecurity is a top priority for most organisations. As cyber threats evolve, businesses must adapt and improve their security measures. The protection of sensitive data is paramount. Yet the effectiveness of many programs is still found wanting. The success of these efforts depends on more than…",https://medium.com/tech-at-docmorris/the-right-connection-building-cybersecurity-synergy-through-mindful-leadership-9c873a0e29cc?source=topics_v2---------6-84--------------------e90bccc3_6b40_4b52_bc12_9c86a514c411-------17,https://miro.medium.com/v2/resize:fill:140:140/1*NKtxnBzpGKh6rgtdLPXrpw.png,cybersecurity 269,265,Open Redirect Vulnerability: A Potential Threat to User Security,"A Bug Bounty Report on the Risks of Unvalidated URL Redirections in Websites and Applications — When a person is given power over a redirect or forward to another URL by an application, this is known as an open redirect vulnerability. If the programme doesn’t check untrusted user input, a hacker may provide a URL that takes a gullible victim away from a trustworthy domain and…",https://medium.com/system-weakness/open-redirect-vulnerability-a-potential-threat-to-user-security-93a9cb177867?source=topics_v2---------7-84--------------------e90bccc3_6b40_4b52_bc12_9c86a514c411-------17,https://miro.medium.com/v2/resize:fill:140:140/1*IOn0n0J128SlQMhjLqAOaQ.jpeg,cybersecurity 270,266,ChatGPT 4 for Pentesting,"Fuzzing expert and fuzzer creator, Patrick Ventuzelo of FuzzingLabs, demonstrated how ChatGPT 4 can evaluate code for security vulnerabilities, and in this instance, find zero days. — OpenAI released ChatGPT 4, the upgraded version of ChatGPT 3.5. Researchers have shown what amazing things GPT 4 can do. I have written about it as a red and blue team assistant (feed code, ask for vulnerabilities present and/or how to secure it).",https://medium.com/@david.azad.merian/chatgpt-4-for-pentesting-493e558f4b3?source=topics_v2---------8-84--------------------e90bccc3_6b40_4b52_bc12_9c86a514c411-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1EirMLIyWsa6sxW605tzIw.png,cybersecurity 271,2,Lesson 6: Social Theft in Malware Development,"👾 Malware Development Series by XIT — Below is the Topics List for Lesson 6: 6. Social Theft: ⇢ Instagram Sub Count ⇢ YouTube Sub Count ⇢ Github Follower Count more… Our lives now revolve on social media, thus it seems sense that social media analytics are highly regarded by both businesses and people. In this lesson…",https://medium.com/@x-it/lesson-6-social-theft-in-malware-development-ff4c5dfda739?source=topics_v2---------9-84--------------------e90bccc3_6b40_4b52_bc12_9c86a514c411-------17,https://miro.medium.com/v2/resize:fill:140:140/0*FXk7pi4J3u4u4gtR.png,cybersecurity 272,267,10 Must-Read Books for Cybersecurity Beginners,Cybersecurity is a complex and rapidly evolving field that requires a deep understanding of technical concepts and principles. Reading books on cybersecurity can provide beginners with a solid foundation of knowledge and help them develop the critical thinking and problem-solving skills necessary to tackle real-world security challenges. Books can offer…,https://medium.com/@stefan-p-bargan/10-must-read-books-for-cybersecurity-beginners-ceba26258d2d?source=topics_v2---------10-84--------------------f3764a91_f2db_4f37_a1bd_fd69e61bfb8d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*r-UF3h84JiIwOhrUjSSe3Q.jpeg,cybersecurity 273,268,THM — Mr Robot — A guided Walkthrough,This room is a pretty well put together Mr Robot themed box. …,https://medium.com/@The_color_Plum/thm-mr-robot-a-guided-walkthrough-a005fc7ad1b2?source=topics_v2---------11-84--------------------f3764a91_f2db_4f37_a1bd_fd69e61bfb8d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*WrwdcBfUDun9PNEHT9F53g.png,cybersecurity 274,269,Hacking for Good: Uncovering the World of Ethical Hacking,"Discover How to Use Your Hacking Skills for Good and Make a Difference in the Cybersecurity World with These Expert-Level Code Samples! — Whoever said that all hackers are bad guys? The truth is, not all hackers use their skills and knowledge for malevolent purposes. In fact, there’s a growing community of ethical hackers who are taking the fight back to those who endanger our digital lives. This article will introduce you to…",https://medium.com/@etirismagazine/hacking-for-good-uncovering-the-world-of-ethical-hacking-5bd84fca12ec?source=topics_v2---------12-84--------------------f3764a91_f2db_4f37_a1bd_fd69e61bfb8d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TFA7x3jpmeFOJ6xPxyyjyQ@2x.jpeg,cybersecurity 275,270,Storing Tokens in Cookies with React,"Introduction Token-based authentication is a popular way to secure web applications. In token-based authentication, a server generates a token (usually a JSON Web Token or JWT) and sends it to the client, which then sends the token with each request to authenticate itself. One of the challenges of token-based authentication is…",https://medium.com/@amavictor/storing-tokens-in-cookies-with-react-93a5a818c3a8?source=topics_v2---------13-84--------------------f3764a91_f2db_4f37_a1bd_fd69e61bfb8d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*AsLuShQk6qUW3XcduIz2Zg.jpeg,cybersecurity 276,271,32-Bit Windows Buffer Overflow,"Introduction Buffer Overflow is a vulnerability that occurs when a program writes more data to a buffer than what is actually allocated for that buffer, therefore overflowing to a memory address. The result of this situation is the crash of the vulnerable program, and additionally the possibility that an attacker to…",https://medium.com/@s12deff/32-bit-windows-buffer-overflow-31c95ff82478?source=topics_v2---------14-84--------------------f3764a91_f2db_4f37_a1bd_fd69e61bfb8d-------17,https://miro.medium.com/v2/resize:fill:140:140/0*w1-K0PkCR9NyA0WB.png,cybersecurity 277,272,"InfoSecSherpa’s News Roundup for Sunday, April 2, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — Crypto evangelists enter the Bukele government: The dark business of bitcoin in El Salvador (El Pais English, April 2nd) ‘I’ve never seen anything like this:’ One of China’s most popular apps has the ability to spy on its users, say experts (CNN, April 2nd) Over 60% in UAE and Saudi…",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-sunday-april-2-2023-f7ab25b32c06?source=topics_v2---------15-84--------------------f3764a91_f2db_4f37_a1bd_fd69e61bfb8d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kSMWC6eOZ_xRVso_oqDT_A.jpeg,cybersecurity 278,2,Lesson 7: Stealing FTP Clients with Malware — Top 5 Popular + Source-Codes,"👾 Malware Development Series by XIT (C#) — Below is the Topics List for Lesson 7: 7. FTP Clients Theft: ⇢ FileZilla ⇢ CoreFTP ⇢ WinSCP more… (Cyberduck, Transmit) FTP clients are widely used by businesses and individuals to transfer files between computers and servers. FTP clients store login credentials, making them a prime target for attackers seeking…",https://medium.com/@x-it/lesson-7-stealing-ftp-clients-with-malware-top-5-popular-source-codes-b9c699ac96e3?source=topics_v2---------16-84--------------------f3764a91_f2db_4f37_a1bd_fd69e61bfb8d-------17,https://miro.medium.com/v2/resize:fill:140:140/0*HLB5liriX6YeAdXF.png,cybersecurity 279,273,‘Notice and consent’ — Does it actually help online data privacy?,The notice and consent requests we encounter in our daily travels through the internet are widely relied on in privacy law but have been criticised for being unworkable. The reasons are both down to our minds and the structure the requests take. These issues include people's limited control over their…,https://medium.com/@catmules/notice-and-consent-does-it-actually-help-privacy-with-digital-personal-data-180705432b70?source=topics_v2---------17-84--------------------f3764a91_f2db_4f37_a1bd_fd69e61bfb8d-------17,https://miro.medium.com/v2/resize:fill:140:140/0*srHWJHMOBp_dDIyD,cybersecurity 280,274,How to become an Ethical Hacker and get job in Cybersecurity Field.,"What is Ethical hacking Ethical hacking involves an Authorized attempt to gain unauthorized access to a computer system, application, or data. The authorized activity means performing Assessment with all written approvals to the known in-scopes (Targets). If your fresher how to become an ETHICAL HACKER in cybersecurity field Few Key Notes from my past Experience: Your Colleagues/Friend`s can say “I am…",https://medium.com/@akash-venky091/how-to-become-an-ethical-hacker-and-get-job-in-cybersecurity-field-2aa7be49f4b3?source=topics_v2---------18-84--------------------f3764a91_f2db_4f37_a1bd_fd69e61bfb8d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tQRBa85CnaE08LYJOFQk2w.png,cybersecurity 281,275,DKIM for Email Security,"Another DNS record you can add to improve email security — In the last post I explained how to configure an SPF record to help improve email security. SPF Records for Email One DNS record to add for email security (more in other posts)medium.com Next up I’m going to show you how to add DKIM for email security when using AWS Route 53 for domain hosting. Figure out how long your DKIM record can be The first thing we need to understand with DKIM is the…",https://medium.com/cloud-security/dkim-for-email-security-a6dcbd630df1?source=topics_v2---------19-84--------------------f3764a91_f2db_4f37_a1bd_fd69e61bfb8d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pepKdWO2gtv0NiTJKmYEWA.png,cybersecurity 282,276,Closed Source Development,"Introduction A common misconception within the development world is that the more open source a program is the more benefits it will bring. Well, that misconception often leads to confusion when starting out in development. In today’s article we will be discussing what closed source development is, the pros and…",https://medium.com/@skypenguinsolutions/closed-source-development-c6fadf67769?source=topics_v2---------20-84--------------------e317de44_4a2b_486b_815a_34331162366b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_z3uunZ4tbjzoXRyqLiY1g.png,cybersecurity 283,275,DMARC for Email Security,"The next step to improving email security with DNSSEC, SPF, DKIM and DMARC — I’ve been showing you how to improve security for DNS and email in the last few posts, starting with DNSSEC. DNSSEC in AWS Route 53 and Google Domains Protect against DNS spoofing and improve email securitymedium.com The next DNS record we’re going to add to improve email security is called a DMARC record. Note that you will either need to set up SPF or DKIM before…",https://medium.com/cloud-security/dmarc-for-email-security-792305c47ca7?source=topics_v2---------21-84--------------------e317de44_4a2b_486b_815a_34331162366b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*IE8YKInrjxVW0TUQij5HfA.png,cybersecurity 284,277,What is Application identity in Confidential Computing and Why does it Matter?,"Data Asset protection using hardware-based application identity Application identity refers to the identity of a software application or service. It includes information about the application, such as its name, version, and publisher, which can be used to verify the authenticity and integrity of the software. Practically, application identity can be…",https://medium.com/@safelishare/what-is-application-identity-in-confidential-computing-and-why-does-it-matter-a0032758bead?source=topics_v2---------22-84--------------------e317de44_4a2b_486b_815a_34331162366b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7vv4ojrRxuVYtU-wdWuphQ.png,cybersecurity 285,278,Weak [TryHackMe] Walkthrough,I recently developed a THM Room for a CTF event at my college and here is the Walkthrough !! Link: https://tryhackme.com/jr/weak Note: The box does take upto 5–7 Minutes to properly start all services so you gotta be a little patient :) Recon A basic port scan of the box reveals…,https://medium.com/@jodiskripe/weak-tryhackme-walkthrough-be5a80607408?source=topics_v2---------23-84--------------------e317de44_4a2b_486b_815a_34331162366b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*OejbYctB1bkZeskF.png,cybersecurity 286,279,Using John the Ripper for password auditing and security testing: What you need to know:-,"As cyber attacks continue to increase in frequency and sophistication, it is becoming more important than ever to ensure that our passwords are secure. One way to do this is by using password auditing and security testing tools such as John the Ripper. …",https://medium.com/@cyberpedia/using-john-the-ripper-for-password-auditing-and-security-testing-what-you-need-to-know-3834c424dbf5?source=topics_v2---------24-84--------------------e317de44_4a2b_486b_815a_34331162366b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*cDjXt81TEtQSV_Yj,cybersecurity 287,280,API Reconnaissance (Passive Recon),"When we are gathering information about an API we use two different methods: Passive Recon and Active Recon. Passive Reconnaissance: in which we don’t interact directly with the API or the provider of the API, However we use the Open Source Intelligence (OSINT) to get as much information as possible. …",https://medium.com/@amaraltohami30/api-reconnaissance-passive-recon-d6b3204ac43?source=topics_v2---------25-84--------------------e317de44_4a2b_486b_815a_34331162366b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*XIJSK309wLhTbalZ.png,cybersecurity 288,281,Bypass Canary Tokens for Monitored Commands,"Through this article, we will explore a simple but creative method to bypass the Canary Tokens that are configured to alert when a specific command is being executed on Windows. Scenario 1. You just achieved initial access by compromising a workstation/server, through a low-privilege user. 2. Your first command executed on…",https://medium.com/@corneacristian/bypass-canary-tokens-for-monitored-commands-32685089ceae?source=topics_v2---------26-84--------------------e317de44_4a2b_486b_815a_34331162366b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*2G6NGqIZDFNAg37lxlIFEg.png,cybersecurity 289,282,Strategic Cyber Security Report — March 2023 Edition,"A Monthly summary of Strategic Information for Cyber Security Leaders This is a series spun from a need I identified when talking to CISOs — as explained on the kick-off article, this series follows the format of: What’s Top of mind in 3 domains: People, Processes, Technology for CISOs. People Latitude Hacked — 300k+ customers data leaked. Major…",https://medium.com/@andrecamillo/strategic-cyber-security-report-march-2023-edition-271eb11c6a93?source=topics_v2---------27-84--------------------e317de44_4a2b_486b_815a_34331162366b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pF-dj7QGQiPIp7iGQYuaRw.png,cybersecurity 290,283,The Future of Conversational AI: How ChatGpt is Changing the Game,"The year was 2023, and the world was a very different place than it was just a few years ago. Advances in technology had revolutionized the way we lived, worked, and communicated with one another. …",https://medium.com/@hafizshahbaz402/the-future-of-conversational-ai-how-chatgpt-is-changing-the-game-69e373a77caa?source=topics_v2---------28-84--------------------9c02a913_fd92_4434_858c_6774acb36bae-------17,https://miro.medium.com/v2/resize:fill:140:140/1*UVexxXe47Kv5KYfs7NGz2w.jpeg,cybersecurity 291,284,"Russia’s ‘Vulkan Files,’ a 3CX supply chain attack and White House action on spyware","Welcome to Changelog for 4/2/23, published by Synack! Nathaniel Mott here, back with a look at some of the biggest cybersecurity news of the week.",https://medium.com/readme/russias-vulkan-files-a-3cx-supply-chain-attack-and-white-house-action-on-spyware-3b89aa6760ec?source=topics_v2---------29-84--------------------9c02a913_fd92_4434_858c_6774acb36bae-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oVNZWe02wlWs-b_KegXKbQ.jpeg,cybersecurity 292,107,The Fascinating History and Technology of the Enigma Machine Encryption | 2023,"A Comprehensive Guide to the Use, Encryption Process, and Decryption Process of the Enigma Machine | Karthikeyan Nagaraj — Introduction: The Enigma Machine was one of the most famous encryption devices of the 20th century, used extensively by the German military during World War II. It was a complex electromechanical device that enabled secure communication by encrypting messages using a series of rotors and plugboards.",https://medium.com/@cyberw1ng/the-fascinating-history-and-technology-of-the-enigma-machine-encryption-2023-c8a0e2125d68?source=topics_v2---------30-84--------------------9c02a913_fd92_4434_858c_6774acb36bae-------17,https://miro.medium.com/v2/resize:fill:140:140/0*eFSzFGBAsdwTExrB,cybersecurity 293,285,Breaking the Moratorium Myth: Why We Need to Prioritize Responsible AI Development,"Why Responsible Development is More Important than Ever Artificial Intelligence has been a rapidly evolving in recent months, with significant advancements in machine learning, natural language processing, computer vision, and large language models (LLMs). While the development of AI has great potential to benefit humanity, it also poses significant ethical…",https://medium.com/trojai/breaking-the-moratorium-myth-why-we-need-to-prioritize-responsible-ai-development-4f1db917b7ce?source=topics_v2---------31-84--------------------9c02a913_fd92_4434_858c_6774acb36bae-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OZrZifbimPJ_Ubi1O3pa9A.jpeg,cybersecurity 294,286,How to Write Good Bug Reports,"Bug reports are an essential part of the software development process. They allow developers to identify and fix problems in their code, and they can also help to prevent future bugs from occurring. However, not all bug reports are created equal. …",https://medium.com/@securitylit/how-to-write-good-bug-reports-725eb318c477?source=topics_v2---------32-84--------------------9c02a913_fd92_4434_858c_6774acb36bae-------17,https://miro.medium.com/v2/resize:fill:140:140/1*i-tykrY-FWy0wPE2e7ZT6Q.jpeg,cybersecurity 295,287,Using DFS and BFS to Manage Digital Assets,"Our customers own many digital assets associated with their online presence. These assets include domain names, URLs, and specific IP addresses which may contain confidential information, software and property data, and more. To gain better control of these assets, it is important to have visibility into the connections between them…",https://medium.com/cyesec/using-dfs-and-bfs-to-manage-digital-assets-483a1d491d45?source=topics_v2---------33-84--------------------9c02a913_fd92_4434_858c_6774acb36bae-------17,https://miro.medium.com/v2/resize:fill:140:140/1*B6jbuM-WL5rfx-6n4t9cMQ.png,cybersecurity 296,288,OverTheWire Wargames: Bandit L23,"Bandit Level 23 Write-Up — Greetings! Last time we found our way to the flag by analyzing some Cron jobs and by reading a shell script. While that was quite interesting, it’s time we took things to the next level. And luckily for us, this next installment in the Bandit series proposes just that. Welcome…",https://medium.com/the-gray-area/overthewire-wargames-bandit-l23-33ff6eba4af?source=topics_v2---------34-84--------------------9c02a913_fd92_4434_858c_6774acb36bae-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_3-IOsEUdVjIM0kALRZi9Q.jpeg,cybersecurity 297,283,The Hacker’s Game| Te Darkside Of Technology.,"The world is changing quickly. Technology has brought convenience, speed, and efficiency to our fingertips. But what happens when technology becomes a threat? Welcome to the dark side of technology — the world of cybersecurity threats. Meet Jack, a self-taught hacker who has been in the game for years…",https://medium.com/@hafizshahbaz402/the-hackers-game-te-darkside-of-technology-a54259cbe40f?source=topics_v2---------35-84--------------------86d0374c_eac0_4d56_9ee2_3ce06277d4c4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*plqRCXRge6y3On2B,cybersecurity 298,289,What is HTTP Cookies | 5 Methods to Exploit Cookies Vulnerabilities,"HTTP cookies are small pieces of data that are stored on a user’s device by a web browser. They are used to store information about a user’s browsing activity, such as login credentials and preferences, and are used by web applications to personalize the user’s experience. However, cookies can also…",https://medium.com/@aditya-chauhan17/what-is-http-cookies-5-methods-to-exploit-cookies-vulnerabilities-3652761e2105?source=topics_v2---------36-84--------------------86d0374c_eac0_4d56_9ee2_3ce06277d4c4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,cybersecurity 299,290,How Can I Spy On My Spouse?,"It was a little past 10 p.m. and I was in the car, wearing my nightgown and snow boots. The temperature was very low below zero and I forgot to bring my jacket. After driving aimlessly around my neighborhood, I pulled over and texted my friend Timna in the most…",https://medium.com/@mivaje5219/how-can-i-spy-on-my-spouse-d3a99e7fb28b?source=topics_v2---------37-84--------------------86d0374c_eac0_4d56_9ee2_3ce06277d4c4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,cybersecurity 300,291,Hacking myself for cybersecurity awareness.,"For individuals in a corporate workplace who lack technical expertise, the concept of cybersecurity may be limited to uninteresting and tedious compliance slides that they are required to go through during the onboarding process. …",https://medium.com/@cybenfolland/hacking-myself-for-cybersecurity-awareness-b16eaffcacc4?source=topics_v2---------38-84--------------------86d0374c_eac0_4d56_9ee2_3ce06277d4c4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ol7T86ys5QXVYBNaLI3Pjg.png,cybersecurity 301,292,Are Apple’s products really that safe?,"Apple, Google (Alphabet) and Microsoft are three of the biggest tech giants in the world, each with their own loyal fanbase and distinct product lines. …",https://medium.com/@robertosolaridev/are-apples-products-really-that-safe-39947548fe9b?source=topics_v2---------39-84--------------------86d0374c_eac0_4d56_9ee2_3ce06277d4c4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*2T1mEIr71rr3JUXqGY1Q8A.png,cybersecurity 302,293,Building a Cyber Security Lab,The biggest fallback in my journey so far is having very limited hands-on experience. I worked in the financial industry in a tech support role for online banking applications before I joined the military so I have a few years of helpdesk/troubleshooting experience in a technical sector. But since starting…,https://medium.com/@liam.stott/building-a-cyber-security-lab-694a386ccb7b?source=topics_v2---------40-84--------------------86d0374c_eac0_4d56_9ee2_3ce06277d4c4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LVPIAStfk1OENsr09O0JzA.jpeg,cybersecurity 303,272,"InfoSecSherpa’s News Roundup for Saturday, April 1, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — Pentagon cyber policy post may stay unfilled during review (C4ISRNET, March 31st) Shifting the cybersecurity burden for state and local governments (American City and County, March 31st) What is the impact of AI on cyber security awareness? (Click Armor, April 1st) How one state looks to shared cyber services to…",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-saturday-april-1-2023-86e2f83a26c7?source=topics_v2---------41-84--------------------86d0374c_eac0_4d56_9ee2_3ce06277d4c4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TARAkimnxNSGGLczscRbEw.jpeg,cybersecurity 304,105,Let’s learn about Dictionary Attacks in Cybersecurity,"Overview One method the attackers use to try to get the keys to the kingdom is a dictionary attack. People who use common dictionary words as their passwords are vulnerable to bad actors. According to a study, most people prefer to reuse their passwords or use standard phrases that are relatively…",https://medium.com/bug-zero/lets-learn-about-dictionary-attacks-in-cybersecurity-77f7d547fa02?source=topics_v2---------42-84--------------------fe2c0523_2bd3_4e89_b989_111a2c3dc9f1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*8fU5NWNLRYkw3lEb,cybersecurity 305,294,Never Too Late to Pursue Your Dreams: My Story of Career Change,"Hello World, My name is Frederick. I’m not a professional writer, a successful marketer, a crypto preacher, or a miracle seller. I’m as stressed as anyone can be. My lifestyle is, at best, questionable. …",https://medium.com/@TheRealFREDP3D/never-too-late-to-pursue-your-dreams-6d27707650d2?source=topics_v2---------43-84--------------------fe2c0523_2bd3_4e89_b989_111a2c3dc9f1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*m788IdO2HO2E0T01GD_0Uw.jpeg,cybersecurity 306,295,Protecting More Than Just Muscles: My Mission to Safeguard Online Security,"Hey there, I’m DeAcTv8, and I’m thrilled to launch Securesessions and share my exciting journey with you all. You might know me as a massage therapist, but let me tell you, there’s so much more to me than just helping people feel better physically. I’ve always been interested in technology…",https://medium.com/@deactv8/protecting-more-than-just-muscles-my-mission-to-safeguard-online-security-277931797a47?source=topics_v2---------44-84--------------------fe2c0523_2bd3_4e89_b989_111a2c3dc9f1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*u69gO0g7Q1hE1zwEEpKTSQ.png,cybersecurity 307,296,What is Secure Access Service Edge (SASE)?,"First published on News at NetworkTigers March 11, 2023. Secure Access Service Edge (SASE) is a security architecture model that delivers converged security and network as a service capability, including Zero Trust Network Access (ZTNA), Cloud Access Security Broker (CASB), Secure Web Gateway (SWG), Network Firewall (NGFW), and SD-WAN. SASE…",https://medium.com/@networktigers/what-is-secure-access-service-edge-sase-71b3be53c22d?source=topics_v2---------45-84--------------------fe2c0523_2bd3_4e89_b989_111a2c3dc9f1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*7YDhHW0mAv6iueMs.jpg,cybersecurity 308,297,Some Future AI projects that you need to know about in 2023,Updates on all new AI projects which will change the AI game in 2023 Artificial intelligence (AI) is a rapidly evolving topic that has taken the internet by storm. From machine learning algorithms to natural language processing systems AI is for sure not going to slow down it change the…,https://medium.com/@alishbamaqsood678/some-future-ai-projects-that-you-need-to-know-about-in-2023-3655d881d4a6?source=topics_v2---------46-84--------------------fe2c0523_2bd3_4e89_b989_111a2c3dc9f1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*chndV4VREwAtl5PY,cybersecurity 309,298,OWASP Top10 TryHackMe Part-7,"Let’s discuss about severity 8, which is Insecure Deserialization, from the OWASP Top10 room, available here. SEVERITY 8 =========== Insecure Deserialization -in simple terms, it is data processed by an application, replaced by malicious code -can allow anything from DoS to RCE -specifically it leverages serialization and deserialization process used by webapps: — serialization: process…",https://medium.com/@expl017_security/owasp-top10-tryhackme-part-7-494838cd53fe?source=topics_v2---------47-84--------------------fe2c0523_2bd3_4e89_b989_111a2c3dc9f1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*myxQ9wE7V_h3fg9Bt-FHRw.png,cybersecurity 310,299,Trust Army Beta: Key Results,"The development of Trust Army 1.0 is on its track. This week, we released the first Development Update to keep you informed about the tasks completed during the last sprint. …",https://medium.com/@hackenclub/trust-army-beta-key-results-dd7875a484ed?source=topics_v2---------48-84--------------------fe2c0523_2bd3_4e89_b989_111a2c3dc9f1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4hhF9G7gumAJbBGLuz3j6w.png,cybersecurity 311,279,Kali Linux for Wireless Network Hacking: Tools and Techniques:-,"Wireless networks have become ubiquitous in our lives, but their popularity has also made them vulnerable to hacking. In this blog, we will discuss how Kali Linux can be used for wireless network hacking and what tools and techniques are available to the hackers. Introduction: Kali Linux is a powerful…",https://medium.com/@cyberpedia/kali-linux-for-wireless-network-hacking-tools-and-techniques-424af35ae8e3?source=topics_v2---------49-84--------------------fe2c0523_2bd3_4e89_b989_111a2c3dc9f1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*p-Ab83VcAUjNY1lL.png,cybersecurity 312,300,The Series — Empowering Cyber Security with ChatGPT: The Future of AI-Powered Defense — Part 2,"GPT-4 Technology: A Game-Changer for Cyber Threat Intelligence As you all know, Cybersecurity is a growing concern for businesses and organizations, with the increasing sophistication of cyber threats and attacks. Cyber threat intelligence (CTI) is the process of gathering and analyzing information about potential cyber threats to help organizations identify…",https://medium.com/@aybala.sevinc/the-series-empowering-cyber-security-with-chatgpt-the-future-of-ai-powered-defense-part-2-5f34b9d345b3?source=topics_v2---------50-84--------------------7a6fb8c0_f5eb_47d4_b8a1_56a734751db5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*KGMpEydZ5-y_pCS6AgQffQ@2x.jpeg,cybersecurity 313,301,Importance of Cybersecurity for Any type of Business?,"Hello There, Thank you for taking the time to read the write — up! I appreciate it! Today’s content is going to be on understanding the ‘Importance of Cybersecurity for Any type of Business’? The content is completely based on my personal experiences & knowledge, interactions with incredible people in…",https://medium.com/@nilaysangani/importance-of-cybersecurity-for-any-type-of-business-851f3ca809e7?source=topics_v2---------51-84--------------------7a6fb8c0_f5eb_47d4_b8a1_56a734751db5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1nsT_rKgpsGSrrrbdhdwaw.png,cybersecurity 314,302,"Understanding True Positive, True Negative, False Positive, False Negative, and Benign Results in Cybersecurity","In the world of cybersecurity, threat detection and identification is of utmost importance. Systems and tools such as antivirus software, firewalls, and intrusion detection systems are designed to detect and identify threats and vulnerabilities to protect computer systems and networks. However, not all results are created equal. …",https://medium.com/@sasikumarbibin/understanding-true-positive-true-negative-false-positive-false-negative-and-benign-results-in-800c2833fa6e?source=topics_v2---------52-84--------------------7a6fb8c0_f5eb_47d4_b8a1_56a734751db5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,cybersecurity 315,303,Privacy-Preserving Technologies: The Key to Protecting Our Digital Identity,"As we continue to rely more and more on digital devices and services in our daily lives, concerns about privacy and security are becoming increasingly important. Our digital identity, which includes sensitive information such as our personal data, financial details, and online activity, is constantly at risk of being compromised…",https://medium.com/@tomarvipul/privacy-preserving-technologies-the-key-to-protecting-our-digital-identity-ddc1f58a35d9?source=topics_v2---------53-84--------------------7a6fb8c0_f5eb_47d4_b8a1_56a734751db5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*1hNbr5vGCNS58wcX,cybersecurity 316,304,The Impact of Deepfake Technology,"Image manipulation has been in existence for centuries, from the first photography in the 19th century to the digital era of today. In the past, image manipulation was done manually using techniques such as airbrushing and superimposition. However, with the advancement of technology and the internet, image manipulation has become…",https://medium.com/@dwomowale/the-impact-of-deepfake-technology-5f4ad8a44f0d?source=topics_v2---------54-84--------------------7a6fb8c0_f5eb_47d4_b8a1_56a734751db5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*u_l2OWdFBtkt0QbG7ochaw.png,cybersecurity 317,305,Play with Splunk | Sigma Rule Project — Splunk UI Toolkit (SUIT),I am glad to see you in the last post of the series. Let me start by sharing previous blogs. Play with Splunk | Full Stack App Development — Sigma Rule Project Play with Splunk | Sigma Rule Project — Configuring KV Store Play with Splunk | Sigma Rule Project…,https://medium.com/@krdmnbrk/play-with-splunk-sigma-rule-project-splunk-ui-toolkit-suit-dc3ea589a2fe?source=topics_v2---------55-84--------------------7a6fb8c0_f5eb_47d4_b8a1_56a734751db5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Jt-M-1MQKqiQkkYemncfxQ.png,cybersecurity 318,306,What does a SOC Analyst do?,It’s not bad to be hacked. It’s bad not to notice a hack in time. But how do companies notice they’ve been hacked? This is where SOC analysts come in. Responsibilities A SOC Analyst monitors the company for security-related events and decides if a successful hack has occurred. If a hack…,https://medium.com/@r4bb1t/what-does-a-soc-analyst-do-12f6f8720d89?source=topics_v2---------56-84--------------------7a6fb8c0_f5eb_47d4_b8a1_56a734751db5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,cybersecurity 319,307,Memory Leak — #20,"VC Astasia Myers’ perspectives on machine learning, cloud infrastructure, developer tools, open source, and security. Sign up here. 🚀 Products Cursor Cursor is an editor made for programming with AI. It’s early days, but right now Cursor can help you with a few things… Write: Generate 10–100 lines of code with an…",https://medium.com/memory-leak/memory-leak-20-974dd1acb798?source=topics_v2---------57-84--------------------7a6fb8c0_f5eb_47d4_b8a1_56a734751db5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Webqo5xeCBQQZvMhxFhRPQ.jpeg,cybersecurity 320,308,Utilizing Google Dork to investigate Google hacking techniques.,"what is Google Dork:- An advanced search operator is used in a Google dork query, also known as a custom search string, to locate data not readily available on a website. Google hacking, commonly called “Google dorking,” can produce results for material that is challenging to find using standard search terms. …",https://medium.com/@ravuladeepak2202/utilizing-google-dork-to-investigate-google-hacking-techniques-556ee2465e42?source=topics_v2---------58-84--------------------7a6fb8c0_f5eb_47d4_b8a1_56a734751db5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-N9CuT0DkbYoHXy7PN8wQQ.png,cybersecurity 321,289,How to Bypass IP Restriction,"Bypassing IP restriction can be done using various methods, including the use of Burp Suite, Curl, and Python. In this blog post, we will demonstrate how to bypass IP restriction using these tools. Method 1: Using Burp Suite Burp Suite is a popular tool used by security researchers for web…",https://medium.com/@aditya-chauhan17/how-to-bypass-ip-restriction-41040032225e?source=topics_v2---------59-84--------------------7a6fb8c0_f5eb_47d4_b8a1_56a734751db5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j0G2gQhWRSWcB0APS5vTJg.png,cybersecurity 322,309,IoT Apocalypse,"How to Protect Yourself from the Cybersecurity Armageddon! — Greetings, dear reader, to “IoT Apocalypse: How to Protect Yourself from the Cybersecurity Armageddon!” First, let’s address a few clarifications to set the stage for our forthcoming adventure, complete with a dash of humor and a sprinkle of wit. Clarification #1: What’s this article all about? Ah, an excellent question! In this riveting and informative piece, we’ll…",https://medium.com/new-writers-welcome/iot-apocalypse-1c23352fb3bc?source=topics_v2---------60-84--------------------78ce28d0_0446_4ab7_b788_5026cb9eeb25-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6ml3etmaqPg1ZU4jmz2jag.jpeg,cybersecurity 323,310,How to write perfect bugbounty report,"Hello geeks, Biswajeet Ray Here, I’m an Ethical Hacker & a Security Researcher. I’ve been acknowledged by Microsoft, IBM, Lenskart, Shaadi.com, Panasonic, HP and many companies for reporting security vulnerabilities in their web applications. So everyone is giving best in bugbounty from newbie to experienced. But many hunters become hopeless…",https://medium.com/@biswajeetray7/how-write-perfect-bugbounty-report-983b58d1b61b?source=topics_v2---------61-84--------------------78ce28d0_0446_4ab7_b788_5026cb9eeb25-------17,https://miro.medium.com/v2/resize:fill:140:140/0*y8qYntXhO_Yg6K5O,cybersecurity 324,311,The Dark Side of AI Language Models: Uncovering the Hidden Dangers and Threats Lurking Within,"In the era of AI, the possibilities seem endless. From improving healthcare to enabling self-driving cars, AI has the potential to transform the world as we know it. However, as AI language models become increasingly sophisticated, the risks and threats associated with them are also growing. From gender biases in recruitment tools to deepfake videos that can spread misinformation, the dark side of AI language models is a very real and serious concern. In this blog, we will take a deep dive into some of the most alarming case studies and explore the hidden dangers and threats lurking within AI language models. By the end of this article, you will have a better understanding of the risks associated with AI language models, and what we can do to protect ourselves from their potential harm.",https://medium.com/@_Ankur_/the-dark-side-of-ai-language-models-uncovering-the-hidden-dangers-and-threats-lurking-within-45e5a7ed38a4?source=topics_v2---------62-84--------------------78ce28d0_0446_4ab7_b788_5026cb9eeb25-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lVuJsRF4A9SKZlE5,cybersecurity 325,312,The Role of Blockchain in Cyber Security,"Introduction In the field of cybersecurity, a lot of interest has been generated by blockchain technology’s ability to offer secure and transparent data storage and transit. A blockchain is simply an immutable digital ledger that records transactions in a form that is both decentralized and secure. …",https://medium.com/@gupta-bless/the-role-of-blockchain-in-cyber-security-96bea9aa9b9f?source=topics_v2---------63-84--------------------78ce28d0_0446_4ab7_b788_5026cb9eeb25-------17,https://miro.medium.com/v2/resize:fill:140:140/0*v6Xz3lfrLlwyRD_V,cybersecurity 326,313,How to Prevent Cross-Site Scripting (XSS) Attacks,Cross-Site Scripting is a web-based attack performed on vulnerable web applications where an attacker can create a malicious link to inject unwanted executable JavaScript into a website. A Cross-Site Scripting attack involves executing malicious code on a victim’s browser. Code is executed on the client side rather than on the…,https://medium.com/bugbountywriteup/how-to-prevent-cross-site-scripting-xss-attacks-75199b4bbf9d?source=topics_v2---------64-84--------------------78ce28d0_0446_4ab7_b788_5026cb9eeb25-------17,https://miro.medium.com/v2/resize:fill:140:140/1*H1NL9zd3kjLZjUqPrdu3XQ.jpeg,cybersecurity 327,314,The Importance of Cybersecurity,"As we begin to dive into technology, cybersecurity becomes a basic knowledge that everyone must have awareness about how important Cybersecurity is. — A company with the least awareness about cybersecurity would likely become a target for hackers and those who can commit any crime. Another factor is if we should have taken cyber security seriously. …",https://medium.com/@artha.soeratin/the-importance-of-cybersecurity-b15188c2b25c?source=topics_v2---------65-84--------------------78ce28d0_0446_4ab7_b788_5026cb9eeb25-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7K2wy2hc4iJfQnhhLVTnIw.jpeg,cybersecurity 328,315,Bware Labs: Keeping You Safe from Digital Threats,"In today’s digital age, cybersecurity has become more important than ever. With the rise of cyberattacks and data breaches, businesses and individuals need to take proactive measures to protect themselves from digital threats. That’s where Bware Labs comes in. …",https://medium.com/@titarenko1337/bware-labs-keeping-you-safe-from-digital-threats-290479e68823?source=topics_v2---------66-84--------------------78ce28d0_0446_4ab7_b788_5026cb9eeb25-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SyO55XUvEMeH0-UYLUFwKA.jpeg,cybersecurity 329,316,picoCTF writeup: Introductory web application injections,"picoCTF (n.d.) recently finished their 2023 capture the flag. Like their previous capture the flags, they came with a number of web exploitation tasks for their contestants to solve. In this article, I will discuss my experience working out a flag for two of them: the first is SOAP which…",https://medium.com/bugbountywriteup/picoctf-writeup-introductory-web-application-injections-92a8d7de19a5?source=topics_v2---------67-84--------------------78ce28d0_0446_4ab7_b788_5026cb9eeb25-------17,https://miro.medium.com/v2/resize:fill:140:140/1*XRAP3UxI5eSMykpE55SrTg.png,cybersecurity 330,317,YouTube Hack — The Elon Crypto Scam — Part 1,"A Deep-dive into what has become a major problem in YouTube Hey there! You know what’s trending nowadays? Crypto and scams — seems like they go together like peanut butter and jelly. But wait, before you start thinking that I’m here to talk about some scammy cryptocurrency or a rug…",https://medium.com/@anusshahariprassad/youtube-hack-the-elon-crypto-scam-part-1-3a640b8c1882?source=topics_v2---------68-84--------------------78ce28d0_0446_4ab7_b788_5026cb9eeb25-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EEzoBp2Iubemz2vUe2uqog.jpeg,cybersecurity 331,318,Advanced Shodan Use for Tracking Down Vulnerable Components,"In the research I conducted on the Known Exploited Vulnerabilities (KEV) listed by the Cybersecurity and Infrastructure Security Agency (CISA), I aimed to demonstrate how these vulnerabilities may be exploited in the future based on insights from Shodan. …",https://medium.com/@ofrio/advanced-shodan-use-for-tracking-down-vulnerable-components-76647cce8a0b?source=topics_v2---------69-84--------------------78ce28d0_0446_4ab7_b788_5026cb9eeb25-------17,https://miro.medium.com/v2/resize:fill:140:140/0*4WV85ujqKlR4i6dS,cybersecurity 332,319,Cyber Security - Incident Response Part 3.3: Recovery | EN,"Hi everyone, after a long break, we continue with our Incident Response series’s second to last article. At this stage, we will renew/repair the infected systems we isolated and destroy and make our systems function again. In the recovery step, an IR team must think about these three items three…",https://medium.com/@alican-kiraz1/cyber-security-incident-response-part-3-3-recovery-en-a914e66b5318?source=topics_v2---------70-84--------------------220afda5_dcf0_43af_9c82_8777949ee481-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pBW_tR4N4lOFVjPZrwzMCQ.jpeg,cybersecurity 333,320,Advanced BBH_101: Falcon Recon (Part 2),"In the previous chapter we discussed a way to get the leaf certificate hashes (SHA256) and store them in a file.txt, specifically this: for ID in $( OnlySha.txt This…",https://medium.com/@whalebone71/advanced-bbh-101-falcon-recon-part-2-5bff2de466a6?source=topics_v2---------71-84--------------------220afda5_dcf0_43af_9c82_8777949ee481-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DxXSyBoOMtaih_od-63FJA.png,cybersecurity 334,321,6 Dangerous Bash Commands That Will Break A Computer,"These are the commands that one should never type in a Bash terminal. 1. rm -rf / This command recursively (-r) and forcefully (-f), irreversibly removes all files and directories starting from the root directory (/). The command can be broken down as: rm: remove -r: recursively perform an action (extending from parent to…",https://medium.com/@bamania-ashish/6-dangerous-bash-commands-that-will-break-a-computer-7d137d02b902?source=topics_v2---------72-84--------------------220afda5_dcf0_43af_9c82_8777949ee481-------17,https://miro.medium.com/v2/resize:fill:140:140/0*I31kqtnRwfa3Ns9i,cybersecurity 335,299,HAI Tokenomics Wrap-Up,"On March 1, 2023, we announced the updated HAI Tokenomics that addresses the new strategic track of our Hacken.AIecosystem: building a public goods community of like-minded individuals who contribute to building Web3 trust, transparency, and security. For an end-user, Hacken.AI is an X-ray to verify tokens’ reliability through data, tools, and community. Let’s capture the main points described in the Tokenomics Paper to obtain an overview…",https://medium.com/@hackenclub/hai-tokenomics-wrap-up-3cad9c60a5de?source=topics_v2---------73-84--------------------220afda5_dcf0_43af_9c82_8777949ee481-------17,https://miro.medium.com/v2/resize:fill:140:140/1*eZ7iTbNZh3kSIIBLfB0hrQ.png,cybersecurity 336,322,Python Penetration Testing: Escaping the Matrix,"How I GitOut and move exploited internal data to GitHub with Python Just as Neo in the Matrix must navigate the complex and ever-changing virtual world of the Matrix, a penetration tester must navigate the intricate network infrastructure, finding hidden vulnerabilities and exploiting them to gain access to the data…",https://medium.com/@ekiser_48014/python-penetration-testing-escaping-the-matrix-4180874da1b5?source=topics_v2---------74-84--------------------220afda5_dcf0_43af_9c82_8777949ee481-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oMHjjU8bAa7TQ3NyV2CfnQ.png,cybersecurity 337,323,5 Mistakes you should avoid while starting your career in cyber security.,"5 Mistakes you should avoid while starting your career in cyber security. The world is digitizing, so are we. We get everything we want just by a click, from a paper clip to nowadays a gigantic machine. During the pandemic this digital medium has become our school, University, college, office everything and so we know everything we want to learn or start…",https://medium.com/@arnavya/5-mistakes-you-should-avoid-while-starting-your-career-in-cyber-security-d29d8036862d?source=topics_v2---------75-84--------------------220afda5_dcf0_43af_9c82_8777949ee481-------17,https://miro.medium.com/v2/resize:fill:140:140/1*cT5oM-roW5RTgKcXE3Hxeg.jpeg,cybersecurity 338,324,There’s So Much To Learn In Cybersecurity — How To Study?,"As I described in a previous post, I love to learn new things, but it can also be intimidating, especially when it comes to complex topics like computer science and cybersecurity. When you start researching a topic, it’s easy to feel overwhelmed and can get lost down the rabbit hole…",https://medium.com/@Hex_0ffender/theres-so-much-to-learn-in-cybersecurity-how-to-study-f4e64c981401?source=topics_v2---------76-84--------------------220afda5_dcf0_43af_9c82_8777949ee481-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ob0CDR3-k5i55Qib,cybersecurity 339,266,ChatGPT Linux Privilege Escalation,"ChatGPT can give you tips on privilege escalation—though you will need to prompt it to help you avoid privilege escalantion. You will ultimately need the help of human knwoledge to really get the job done. — I read about bypassing 403 error on a website to 200 OK using Httpie by security researcher, Eno Leriand. …",https://medium.com/system-weakness/chatgpt-linux-privilege-escalation-2d2929ce1f64?source=topics_v2---------77-84--------------------220afda5_dcf0_43af_9c82_8777949ee481-------17,https://miro.medium.com/v2/resize:fill:140:140/0*OUk0mwYBujR-LgxS,cybersecurity 340,325,How To Find Hidden Directories In Web Pages.,What is Gobuster ? Gobuster is a tool and helps us to find directories and files present in a website or a web app.It helps hackers to find the files and directories that are not linked any where is the website. …,https://medium.com/@Prinux/how-to-find-hidden-directories-in-web-pages-bd02ade6249f?source=topics_v2---------78-84--------------------220afda5_dcf0_43af_9c82_8777949ee481-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MgWPn2SSQLfT1voWdYn5vw.png,cybersecurity 341,326,"Artificial Intelligence : A new dimension to traditional people, process and technology risk framework.","Traditional Risk Mgmt Framework Traditionally ,as we all have learnt, when it comes to Risk management, “People, Process, and Technology” refers to the key components necessary to effectively manage risks within an organization. All of risks today, either operational or technology risks, typically do fall under one of these areas. People are informational assets…",https://medium.com/@cyberfitsanty/artificial-intelligence-a-new-dimension-to-traditional-people-process-and-technology-risk-17d7fb6cd81e?source=topics_v2---------79-84--------------------220afda5_dcf0_43af_9c82_8777949ee481-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Vu1NjTC5BUkyH_KPU4l4FQ.png,cybersecurity 342,275,SPF Records for Email,"One DNS record to add for email security (more in other posts) — In the last post I showed you how to manually set up DNSSEC on domains in AWS to help prevent domain spoofing. Configure DNSSEC Manually in AWS Route 53 Steps to help prevent domain spoofing using the AWS Consolemedium.com In this post I’ll show you how to add an SPF record to your DNS records to help secure email. But we’re not done. SPF alone is not…",https://medium.com/cloud-security/spf-records-for-email-8c40687da913?source=topics_v2---------80-84--------------------9c050e82_e329_4f1f_983b_154fb5ff3fa9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*dTKCpdzgoOuAzyN5Z9bEcA.png,cybersecurity 343,327,How To Hire A Hacker To Catch Cheating Spouse,"How To Hire A Hacker To Catch Cheating Spouse There are many reasons why someone might want to hire a hacker to hack a cell phone. They may want to catch a cheating spouse, or they may want to find out if their partner is being unfaithful. …",https://medium.com/@donyellmark/how-to-hire-a-hacker-to-catch-cheating-spouse-c0512514f135?source=topics_v2---------81-84--------------------9c050e82_e329_4f1f_983b_154fb5ff3fa9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*VPOisUcPabhQTwPUkK8K2w.jpeg,cybersecurity 344,328,"Symfony Station Communiqué — 31 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse News!","This communiqué originally appeared on Symfony Station, your source for cutting-edge Symfony, PHP, and Cybersecurity news. Welcome to this week’s Symfony Station Communiqué. It’s your review of the essential news in the Symfony and PHP development communities focusing on protecting democracy. We also cover the cybersecurity world and the Fediverse. …",https://medium.com/@mobileatom/symfony-station-communiqué-31-march-2023-c9824f9da6d8?source=topics_v2---------82-84--------------------9c050e82_e329_4f1f_983b_154fb5ff3fa9-------17,https://miro.medium.com/v2/resize:fill:140:140/0*NHHemyH8yKWJgop4.png,cybersecurity 345,107,M-209 Cipher Encryption: A Comprehensive Guide | 2023,"Understanding the Key Features, Strengths, and Weaknesses of M-209 Cipher Encryption | Karthikeyan Nagaraj — Introduction: In the world of cryptography, the M-209 Cipher is a classic example of a polyalphabetic cipher that was widely used during World War II. This cipher is also known as the U.S. Army Cipher Machine, and it played a crucial role in securing military communications during the war.",https://medium.com/@cyberw1ng/m-209-cipher-encryption-a-comprehensive-guide-2023-b792c9957b26?source=topics_v2---------83-84--------------------9c050e82_e329_4f1f_983b_154fb5ff3fa9-------17,https://miro.medium.com/v2/resize:fill:140:140/0*rgIFpAXW3NUjunF-.jpg,cybersecurity 346,329,The NEXUS of malware has infiltrated the banking industry,"The banking industry has become a prime target for cybercriminals in recent years. A new wave of malware known as NEXUS has infiltrated banks worldwide, causing significant financial losses and raising concerns about the security of banking systems. NEXUS is a sophisticated malware that targets banks’ core banking systems for managing financial transactions. The malware aims to bypass traditional security measures and operate undetected within the banking network.",https://medium.com/@xmoulder/the-nexus-of-malware-has-infiltrated-the-banking-industry-6b8660c3b558?source=topics_v2---------84-84--------------------9c050e82_e329_4f1f_983b_154fb5ff3fa9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6ZJDwOgyBGYFYlZBWnr6Lg@2x.jpeg,cybersecurity 347,330,Protecting Your Kubernetes Environment With KubeArmor,"A real-world example of preventing the ShellShock vulnerability — In a previous article on Kubernetes security, I discussed using AppArmor to enhance the security of container processes by limiting their actions and resource access. As a result, we successfully thwarted a hacker’s attempt to exploit the ShellShock vulnerability present in one of our containers. Last week, I received a…",https://medium.com/itnext/protecting-your-kubernetes-environment-with-kubearmor-76b02fc2209b?source=topics_v2---------85-84--------------------9c050e82_e329_4f1f_983b_154fb5ff3fa9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*WitojWfuIuZacW5a5E8lWg.jpeg,cybersecurity 348,331,A Personal Journey in IT Security at a Leading Tech Company,"Introduction As an IT security professional at a leading tech company, I’ve seen firsthand how the landscape of cybersecurity has evolved over the years. One of the most profound changes has been the increasing role of artificial intelligence (AI) in revolutionizing IT security. …",https://medium.com/@svenjorgenson/a-personal-journey-in-it-security-at-a-leading-tech-company-c2faaae1914e?source=topics_v2---------86-84--------------------9c050e82_e329_4f1f_983b_154fb5ff3fa9-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,cybersecurity 349,332,05 High-Demand IT Jobs of the Future You Need to Know About,"Hello, Believe in yourself! Have faith in your abilities! Without a humble but reasonable confidence in your own powers you cannot be successful or happy. -Norman Vincent Peale- Today I’m talking about the top 10 high-demand IT jobs of the future. I think this article helps you choose your path…",https://medium.com/@csaliya/05-high-demand-it-jobs-of-the-future-you-need-to-know-about-47ecc390a362?source=topics_v2---------87-84--------------------9c050e82_e329_4f1f_983b_154fb5ff3fa9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Ao_gasMEaQhpP3jsh1l32Q.png,cybersecurity 350,333,"Increased Transparency — Blockchain technology allows for the recording and tracking of data in an immutable, distributed ledger, meaning all participants are able to view and audit the data which is stored in the ledger. This increases the level of transparency and traceability in the system, allowing for increased security against fraud, manipulation, and errors.","The world of finance and data management is rapidly changing. With the advent of blockchain technology, businesses have the potential to gain unprecedented access to transparent, secure data storage solutions. Blockchain technology is a distributed ledger which records digital transactions and stores them in a secure, decentralized manner. …",https://medium.com/@abdullahabrar102/increased-transparency-blockchain-technology-allows-for-the-recording-and-tracking-of-data-in-an-4ee38f1b6bf8?source=topics_v2---------88-84--------------------9c050e82_e329_4f1f_983b_154fb5ff3fa9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SfiBVlbTQNW15PGO5QCaMQ.png,cybersecurity 351,334,The Existential AI Risk Nobody Is Talking About,"We all need to bear in mind that ChatGPT, like every other AI, is a computer, and all computers can be hacked, abused, and disabled. Whether or not Artificial Intelligence poses an existential risk to humans in now being debated in public without any apparent awareness of the existential risks…",https://medium.com/@zcobb/the-existential-ai-risk-nobody-is-talking-about-35ba8a5a03fe?source=topics_v2---------89-84--------------------9c050e82_e329_4f1f_983b_154fb5ff3fa9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Lm75VSmQLPnV3BRai2JZ0w.png,cybersecurity 352,272,"InfoSecSherpa’s News Roundup for Friday, March 31, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — World Backup Day Is A Reminder To Back Up Your World (Forbes, March 31st) Scottish Wide Area Network not believed to be affected by ‘IT issue’ at Capita (Future Scot, March 31st) Chinese Hackers Using KEYPLUG Backdoor to Attack Windows & Linux Systems (GB Hackers, March 31st) Lloyd’s of London…",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-friday-march-31-2023-533a47204227?source=topics_v2---------90-84--------------------d2dbfe38_32ff_4c4c_afb4_4a6e74cef53f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*t962Ajl5fN1NTNdiNTb-Sg.jpeg,cybersecurity 353,321,The 10 Must-Know Linux System Files for Developers & Ethical Hackers,"Linux is a popular open-source operating system used by most developers and learning about various important files will make it easy for you to effectively secure your systems. In this article, we’ll discuss 10 important Linux system files that every developer and hacker should know about. 1. /dev/random This file generates random…",https://medium.com/@bamania-ashish/the-10-must-know-linux-system-files-for-developers-ethical-hackers-53aac3d8d6b7?source=topics_v2---------91-84--------------------d2dbfe38_32ff_4c4c_afb4_4a6e74cef53f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*mHwKXgDTok2JH_yc.jpg,cybersecurity 354,335,Four examples of how ChatGPT and other AI tools could be utilized for cyber attacks,"Unless you’ve been living the absolute nomad lifestyle for the last few months, you probably came across ChatGPT and similar AI technologies and tools and their massive — if not limitless — use cases across all aspects of our lives. …",https://medium.com/@A.fellow.human/four-examples-of-how-chatgpt-and-other-ai-tools-could-be-utilized-for-cyber-attacks-36bb5d4f1c23?source=topics_v2---------92-84--------------------d2dbfe38_32ff_4c4c_afb4_4a6e74cef53f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*HTxvOXqcqCEkII3qrg9Flg.png,cybersecurity 355,336,500GB+ Free Hacking course mega link | nJoy,Hello Everyone. I am sharing 500GB+ Mega Link of all Hacking Courses. destyy.com/egdljG Enjoy and Thank me by following P.s,https://medium.com/@imjavedkhan18/500gb-free-hacking-course-mega-link-njoy-ff0f68df4567?source=topics_v2---------93-84--------------------d2dbfe38_32ff_4c4c_afb4_4a6e74cef53f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*EZ9qcKr6KZi74hjZ,cybersecurity 356,337,ALERT: North Korean-linked Supply Chain Attack Campaign in Progress,"By Jeffrey Wells, NSI Visiting Fellow Reports have emerged that a supply chain attack campaign targeting customers of the 3CX desktop app, a voice and video conferencing application, has been underway since Wednesday. Researchers suspect Labyrinth Chollima, a threat actor group linked to the Democratic People’s Republic of Korea, is…",https://medium.com/real-natsec/alert-north-korean-linked-supply-chain-attack-campaign-in-progress-ef6b6c3b3918?source=topics_v2---------94-84--------------------d2dbfe38_32ff_4c4c_afb4_4a6e74cef53f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*14ekjLjlk7b2OZh0lA1O1A.png,cybersecurity 357,338,Information Gathering Series; Part A: Recon-ng,"Disclaimer: This article is for educational purposes and seeks to promote ethical hacking and superior cybersecurity practices in organizations and private entities. It does not advocate for any malicious intent. Furthermore, all materials used in this tutorial are solely personal and intentionally set vulnerable. …",https://medium.com/@franklinemisango/information-gathering-series-part-a-recon-ng-ba60eecf027e?source=topics_v2---------95-84--------------------d2dbfe38_32ff_4c4c_afb4_4a6e74cef53f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CGso_iccCG1NTaU5GZuuJw.jpeg,cybersecurity 358,339,Land and Gates — A Modern Way to Data Management,"I was inspired to write this update last month when talking with a customer about data security. On that occasion, I started thinking about how companies “gate” (or probably is better to say “trap”) their data within their organization’s digital boundaries and how this phenomenon affects employees’ productivity. The best…",https://medium.com/@andrea.dibiase/land-and-gates-a-modern-way-to-data-management-aabf6855365e?source=topics_v2---------96-84--------------------d2dbfe38_32ff_4c4c_afb4_4a6e74cef53f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*z9wPMa5_hp84GkHJ3aAUTA.jpeg,cybersecurity 359,340,AS-REP Roasting is Scary Easy ! | Active Directory Compromise,What is AS-REP Roasting ? AS-REP Roasting is a password attack that can extract hashes for all the vulnerable users on the Domain. Later on you can crack these hashes offline and get their passwords. …,https://medium.com/system-weakness/as-rep-roasting-is-scary-easy-active-directory-compromise-7adeaccf7ab4?source=topics_v2---------97-84--------------------d2dbfe38_32ff_4c4c_afb4_4a6e74cef53f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LnZ5a8UmUgL2yhkOfXjDSQ.png,cybersecurity 360,341,"My honest take on the eWPT exam — Positives, Negatives and Tips & Tricks","Hi Everyone, today I want to talk about the eWPT exam by eLearnSecurity & the learning materials by INE — I will divide the whole experience into Positives & Negatives and elaborate on each point. I will also give you some tips & tricks on how to quickly navigate through…",https://medium.com/@mares.viktor/my-honest-take-on-the-ewpt-exam-positives-negatives-and-tips-tricks-e5022f0a175b?source=topics_v2---------98-84--------------------d2dbfe38_32ff_4c4c_afb4_4a6e74cef53f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*nRDxsZXW3C7sx_0AFzN8zw.png,cybersecurity 361,342,Breaking Into Cyber Security,"Hello, thanks for your message. I’m sending this blog post because I don’t have time to answer all of your questions. — Who Are You? Unless I know you, or we are engaging about business, I have no interest in teaching or giving a biography about my cyberlife to interested students, or whoever you happen to be. No, it’s not personal. Yes, it irritates me that you are asking. Ask your Career Counselor",https://medium.com/infoseconds/breaking-into-cyber-security-286adc7dfa8?source=topics_v2---------99-84--------------------d2dbfe38_32ff_4c4c_afb4_4a6e74cef53f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*uzRnV7qS9f8KbhwE10hDqg.png,cybersecurity 362,343,Putin’s dangerous cyber war plan revealed,"ATTACKS ON POWER LINES, RAIL AND AIR TRAFFIC A Russian IT company has drawn accusations of being significantly involved in Kremlin dictator Vladimir Putin’s war plans through leaked documents. The secret documents provide insight into Russia’s preparations for major cyberattacks, which were planned in cooperation with private software companies. International media in Germany, including the “Süddeutsche Zeitung,” “Der…",https://medium.com/@brian.andrew1971/putins-dangerous-cyber-war-plan-revealed-b096fab7e031?source=topics_v2---------100-84--------------------182ad7fe_f2ad_4764_b8c1_0d6f97cd7933-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rhP3Kh8GfDvU-druBel02A.png,cybersecurity 363,344,3CX supply chain attack: recommendations for customers,"If you are using 3CX VoIP in your organisation, it is recommended to check your infrastructure immediately for the signs of intrusion and take the appropriate mitigation measures. According to the 3CX security alert Electron Windows App versions numbers 18.12.407 & 18.12.416 and Electron Mac App version numbers 18.11.1213, 18.12.402…",https://medium.com/@groupibgib/3cx-supply-chain-attack-recommendations-for-customers-175941bc157b?source=topics_v2---------101-84--------------------182ad7fe_f2ad_4764_b8c1_0d6f97cd7933-------17,https://miro.medium.com/v2/resize:fill:140:140/1*077fcFUiFtJHLDPbeNL7hg.png,cybersecurity 364,329,WHY ARE INTROVERTS GREAT AT CYBERSECURITY,"WHY ARE INTROVERTS GREAT AT CYBERSECURITY Source: Shutter Stock Introverts, by their very nature, tend to excel in fields where quiet, focused work is highly valued. Technology is one such field, as it requires individuals who can work independently for extended periods of time, analyze complex systems, and come up…",https://medium.com/@xmoulder/why-are-introverts-great-at-cybersecurity-18571ca3e790?source=topics_v2---------102-84--------------------182ad7fe_f2ad_4764_b8c1_0d6f97cd7933-------17,https://miro.medium.com/v2/resize:fill:140:140/1*S0x7XDGu3WhCp9a7muXH3g.jpeg,cybersecurity 365,345,Cybersecurity Kickstart: Launching Your Defense Against Digital Threats,"Privacy: A Right, A Price or A Myth? — A topic which has kept me conjectured about its reality. College reopened after winter vacations and a new IT professor was assigned to us. We eagerly anticipated his arrival and it was this very lecture that changed my entire perspective towards…",https://medium.com/dscvjti/cybersecurity-kickstart-launching-your-defense-against-digital-threats-b29e330771da?source=topics_v2---------103-84--------------------182ad7fe_f2ad_4764_b8c1_0d6f97cd7933-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-xTWSOmAmzxycM4jGgmekA.png,cybersecurity 366,346,2023 OWASP TOP 10,"Everything you need to know about the 2023 cyber threat landscape. OWASP stands for Open Web Application Security Project, a nonprofit foundation that works to improve the security of software. …",https://medium.com/2023-owasp-top-10/2023-owasp-top-10-a2d5afa2d9b0?source=topics_v2---------104-84--------------------182ad7fe_f2ad_4764_b8c1_0d6f97cd7933-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rYIhRoPH7wxd5gRL0gzLxg.jpeg,cybersecurity 367,347,PENETRATION TESTING : DAY X,"PENETRATION TESTING : DAY X Hi there! My name is John, and today I will be sharing a detailed report on my penetration testing of a web application for Company X. Just to be clear, I am posting this write-up with their consent. Penetration testing typically involves a cybersecurity specialist attempting to bypass the security…",https://medium.com/@trustie/penetration-testing-day-x-94645ee44ea3?source=topics_v2---------105-84--------------------182ad7fe_f2ad_4764_b8c1_0d6f97cd7933-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Q5kkUuOMKu0oZGLTq3ikKQ.png,cybersecurity 368,265,CVE-2021–36560: Critical Authentication Bypass Leads to Admin Account Takeover,"Exploring the Impact and Remediation of the CVE-2021–36560 Vulnerability — Each system or programme needs authentication to function. It makes sure that only authorised users may access crucial information and features. But, if a flaw in the authentication procedure exists, attackers may take advantage of it to access the system without authorization. Particularly serious repercussions might result from an authentication…",https://medium.com/@45w1nkv/cve-2021-36560-critical-authentication-bypass-leads-to-admin-account-takeover-ae5e76aa171e?source=topics_v2---------106-84--------------------182ad7fe_f2ad_4764_b8c1_0d6f97cd7933-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5quB3C9HsEXOy_m4_PKDhg.jpeg,cybersecurity 369,107,"A Comprehensive Guide to ADFGVX Cipher Encryption: Features, Strengths, and Weaknesses | 2023","An In-Depth Analysis of ADFGVX Cipher Encryption and its Use Cases | Karthikeyan Nagaraj — Introduction: ADFGVX Cipher encryption is one such cryptographic technique that was used extensively during World War I by the German military. This article aims to provide a comprehensive guide to ADFGVX Cipher encryption, including its features, strengths, and weaknesses. Features of ADFGVX Cipher Encryption:",https://medium.com/@cyberw1ng/a-comprehensive-guide-to-adfgvx-cipher-encryption-features-strengths-and-weaknesses-2023-f11414ee1ad9?source=topics_v2---------107-84--------------------182ad7fe_f2ad_4764_b8c1_0d6f97cd7933-------17,https://miro.medium.com/v2/resize:fill:140:140/0*mM7NgjMGCpuXUqSx.jpeg,cybersecurity 370,348,PowerShell Training Continued — Under the Wire Century Walkthrough,"Underthewire.tech is a wargame that helps users train in PowerShell. I have wanted to try it out as another method of PowerShell training. The first game on the website is Century. Century0 The goal here is to log in to the game. To do that, if you are on windows…",https://medium.com/@lukegearty/powershell-training-continued-under-the-wire-century-walkthrough-930e40fc5b83?source=topics_v2---------108-84--------------------182ad7fe_f2ad_4764_b8c1_0d6f97cd7933-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9y-mzQw_8-zgSev_D7ADfg.jpeg,cybersecurity 371,349,How to find and avoid Timing Attacks in your python code using CodeQl,"TL;DR: Hey folks in this post we will be learning how Timing attack can occur and the way you can spot the vulnerable snippet by CodeQl. let’s get started. Vulnerable code: to get a better knowledge of and what the vulnerability looks like in code, let’s start by taking a look at some…",https://medium.com/@ahmed_farid/how-to-find-and-avoid-timing-attacks-in-your-python-code-using-codeql-d8a10188671a?source=topics_v2---------109-84--------------------4d91fee2_9732_47a8_aead_a556115d2963-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5nQN_nr0zP4XADvllGbnVg.jpeg,cybersecurity 372,350,The Devastating Experience of Being a Victim of Cybercrime,"March 26th , 2023 was supposed to be a week of celebration, my son was finally discharged from the hospital after spending days there. But then, something horrible happened to me. My bank account got hacked, and all my savings, including my salary, were wiped out. I was devastated, and…",https://medium.com/@olaeresandram/the-devastating-experience-of-being-a-victim-of-cybercrime-b85d99c06838?source=topics_v2---------110-84--------------------4d91fee2_9732_47a8_aead_a556115d2963-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,cybersecurity 373,351,TryHackMe | Phishing Emails 2 Walkthrough,Learn the different indicators of phishing attempts by examining actual phishing emails.,https://medium.com/@tr1n1ty8/tryhackme-phishing-emails-2-walkthrough-403f246f751d?source=topics_v2---------111-84--------------------4d91fee2_9732_47a8_aead_a556115d2963-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,cybersecurity 374,277,SafeLiShare Secure Data Platform Now Runs on Confidential Containers in Microsoft Azure,Microsoft Azure has recently introduced confidential containers on Azure Container Instances (ACI) that enable containerized applications to be executed on confidential VMs. Confidential Computing is a term coined by the Confidential Computing Consortium (CCC) that refers to the protection of data by enabling computations on the data to be performed…,https://medium.com/@safelishare/safelishare-secure-data-platform-now-runs-on-confidential-containers-in-microsoft-azure-39f70fba3c0?source=topics_v2---------112-84--------------------4d91fee2_9732_47a8_aead_a556115d2963-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QPUbN2rPFWFgyLmByBZSEA.png,cybersecurity 375,352,Securitee Launches Confidential Computing Platform to Protect Data in Use,"Besides creating a compelling Web3 offering, our team has been busy preparing for a huge milestone for Integritee’s subsidiary Securitee. We’re happy to announce that Securitee officially launched its Confidential Computing Platform. Securitee’s cyber security solution leverages Confidential Computing, a cutting-edge technology that is based on Trusted Execution Environments (TEEs)…",https://medium.com/integritee/securitee-launches-confidential-computing-platform-to-protect-data-in-use-c56079ccc35f?source=topics_v2---------113-84--------------------4d91fee2_9732_47a8_aead_a556115d2963-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gSSFHE0lTfkMy3alzBp-yA.png,cybersecurity 376,353,Inaudible Ultrasound Cyber Attacks,"How to Protect Your Smart Devices and Maintain Your Privacy — As technology advances, so do the potential threats to our privacy and security. In this article, I’ll discuss a new and stealthy cyberattack known as Near-Ultrasound Inaudible Trojan (NUIT) that can potentially control your smart devices without you even knowing it. …",https://medium.com/@bartmcdonough/inaudible-ultrasound-cyber-attacks-26310bb5a86d?source=topics_v2---------114-84--------------------4d91fee2_9732_47a8_aead_a556115d2963-------17,https://miro.medium.com/v2/resize:fill:140:140/0*yORvOk2N_aF5_jeL,cybersecurity 377,354,Wireshark: Traffic Analysis,"In this room, I will cover the techniques and key points of traffic analysis with Wireshark and detect suspicious activities. Task 1 Nmap Scans Nmap is an industry-standard tool for mapping networks, identifying live hosts, and discovering services. As it is one of the most used network scanner tools, a security analyst should identify the network patterns created with it. This section will cover identifying the most common Nmap scan types.",https://medium.com/@ramazansalman/wireshark-traffic-analysis-160997661086?source=topics_v2---------115-84--------------------ab13ad9d_0471_49e0_b6b0_70dccc80063f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vADUEW7mRJ7TVLZbQYwr5Q.png,cybersecurity 378,355,What is HalloID?,"Start your journey to say goodbye to passwords — HalloID is a passwordless platform to improve your authentication strategy. Yes, authentication without passwords! HalloID HalloID takes away repetitive, mundane configuration tasks. It is easy to implement a fully passwordless services in…halloid.io The idea behind HalloID is simple: We want to help people get rid of passwords. Through the latest years, we witnessed how leaked credentials were the source problem for most significant service outages, a well-known case:",https://medium.com/halloid/what-is-halloid-b80511ac9a07?source=topics_v2---------116-84--------------------ab13ad9d_0471_49e0_b6b0_70dccc80063f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MfWnbAJMPz8R-XXe3uQHXg.png,cybersecurity 379,356,"Cybersecurity, safety, and wellness: An interview with Dr. Anuradha Rao of CyberCognizanz","I recently had the pleasure of connecting with Dr. Anuradha Rao, the founder of CyberCognizanz — a cyber safety and cybersecurity awareness company. She and her team work with organizations to identify and manage cyber-threats to employee or end-users’ financial, physical, emotional, and mental security and wellbeing. …",https://medium.com/kempus/cybersecurity-safety-and-wellness-an-interview-with-anuradha-rao-of-cybercognizanz-2cd43acfc139?source=topics_v2---------117-84--------------------ab13ad9d_0471_49e0_b6b0_70dccc80063f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*AaOhOV4d8qfikf6IHZ8vtA.jpeg,cybersecurity 380,357,Beginners Field Guide: Where & How to Learn OSINT,This is not a comprehensive collection of resources. This collection is based on my own time spent on open-source intelligence. There are a million links with OSINT tools that can get the job done but this post is curated to point you in the right direction to obtain the necessary…,https://medium.com/the-sleuth-sheet/beginners-field-guide-where-how-to-learn-osint-bd2e11469f31?source=topics_v2---------118-84--------------------ab13ad9d_0471_49e0_b6b0_70dccc80063f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*AFV80seEV9CkdzDK,cybersecurity 381,358,Another Shoe Drops In LAUSD Hacker Scandal,"The District sends out a new round of letters informing parents and teachers that personal information has been compromised. — “We take your child’s privacy and the security of your child’s data seriously, and deeply regret that this incident occurred.” – LAUSD As LAUSD parents attempt to recover from three days of disruptions due to Superintendent Carvalho’s botched handling of labor negotiations, a new surprise showed up in some mailboxes…",https://medium.com/age-of-awareness/another-shoe-drops-in-lausd-hacker-scandal-2924007c3aa7?source=topics_v2---------119-84--------------------4afcb637_2f8d_417b_bd6d_f968e3012bf5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*B_OF_jiVDmLfN660,cybersecurity 382,271,MySQL Data Stealer — Hacking MySQL,"Introduction Welcome to my new article today i will show you my new hacking tool, this tool it’s a post-exploitation malware created with C++ to steal MySQL table data stored in a table, and next’s when the attacker leaves hacked server, with persistence module and SQL trigger extract the data from…",https://medium.com/@s12deff/mysql-data-stealer-hacking-mysql-26b960bb7d10?source=topics_v2---------120-84--------------------4afcb637_2f8d_417b_bd6d_f968e3012bf5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Iz3reCz607y60iKY.jpg,cybersecurity 383,359,The Intersection of Blockchain and Cybersecurity: A Powerful Duo for the Future of Digital Security,"Blockchain and cybersecurity are two of the most important and rapidly evolving fields in technology today. While they may seem like distinct concepts, the intersection of blockchain and cybersecurity offers a powerful combination for the future of digital security. Blockchain technology, which is best known as the underlying technology behind…",https://medium.com/@pravin-96299/the-intersection-of-blockchain-and-cybersecurity-a-powerful-duo-for-the-future-of-digital-security-e53590e7bf2c?source=topics_v2---------121-84--------------------4afcb637_2f8d_417b_bd6d_f968e3012bf5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9wGkTyyRMvuC23QBYchPCg.png,cybersecurity 384,360,7 Things To Do To Keep Your Account Safe Even After Compromised Credentials,"Account Compromise Is Extremely Common In Recent Times. In This Article, I Explore How To Keep Accounts Away From Fraudsters’ Hands Even When They Know Your Credentials. — Recently, Twitter announced that SMS-based two-factor authentication (or SMS 2FA) will be available exclusively to Blue subscribers. Two-factor authentication emerged as extra protection for a consumer’s account and became a necessary evil. Nobody likes to have to close that financial app to fetch the code that came via SMS. …",https://medium.com/@ayanh/7-things-to-do-to-keep-your-account-safe-even-after-compromised-credentials-f509c944d90d?source=topics_v2---------122-84--------------------4afcb637_2f8d_417b_bd6d_f968e3012bf5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*6TBXx-NImui3ouvF.jpeg,cybersecurity 385,275,Configure DNSSEC Manually in AWS Route 53,"Steps to help prevent domain spoofing using the AWS Console — In the last post on this topic I linked to the documentation and sorted out the steps to set up DNSSEC on AWS Route 53. DNSSec in AWS Route 53 and Google Domains Protect against DNS spoofing and improve email securitymedium.com In this post I’ll explain how to manually configure DNSSEC for a domain in Route 53. I didn’t do everything recommended in the prior post…",https://medium.com/cloud-security/configure-dnssec-manually-in-aws-route-53-7af49a45beb2?source=topics_v2---------123-84--------------------4afcb637_2f8d_417b_bd6d_f968e3012bf5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*J8LTuBWVhbrohbYPv8m23w.png,cybersecurity 386,361,Using the ELK SIEM (cloud version) — live Zeek logs,I’ll be going into how to get Zeek logs into the ELK SIEM. I am going to be using the cloud version and will eventually make a post on using the open-source version utilizing Fleet to monitor endpoints. …,https://medium.com/@mando_elnino/using-the-elk-siem-cloud-version-live-zeek-logs-ad63c5f5ca29?source=topics_v2---------124-84--------------------4afcb637_2f8d_417b_bd6d_f968e3012bf5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ZS1WkHYbkTHrxKqixmNMfA.png,cybersecurity 387,362,How I Used My Hacking Skills to Get Paid for Finding Security Flaws in My College’s System,"‍ Photo by ChristophMeinersmann on Pixabay ‍ As a college student, I always found myself drawn to the world of hacking and cybersecurity. I loved the thrill of finding vulnerabilities in systems and figuring out how to exploit them. So, when I discovered that my own college’s system was riddled…",https://medium.com/@samiahmed1890/how-i-used-my-hacking-skills-to-get-paid-for-finding-security-flaws-in-my-colleges-system-b5c13692367f?source=topics_v2---------125-84--------------------4afcb637_2f8d_417b_bd6d_f968e3012bf5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*jJAga7i1W4Qbd-WM.jpg,cybersecurity 388,316,Basic Linux skills for coders,"Learning about that ubiquitous series of distros from picoCTF 2023 — Linux distributions are fairly popular with coders and the hacker community. Some have contended that knowing how to interface with Linux computer systems is an important skill to be proficient with computers. picoCTF (n.d.) 2023 has a series of challenges that deal with Linux concepts, and in this article I…",https://medium.com/gitconnected/basic-linux-skills-for-coders-c34f4dba185d?source=topics_v2---------126-84--------------------4afcb637_2f8d_417b_bd6d_f968e3012bf5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5OrTEHk87MpxbswPxchtig.png,cybersecurity 389,363,The Ultimate Cloud Security Career Guide for 2023,"Answers to the most common questions asked about a Cloud Security career — We are about to finish the first quarter of 2023 and hard to believe it went by so fast ! Q1 is ending with some bad news unfortunately as layoffs do not seem to be going away anytime soon. A recession in 2023 is now inevitable. Layoffs in tech and finance will spread to other sectors More than a year ago, I forecast a recession would begin in the second half of 2023. That was a no-brainer. Years of…fortune.com",https://medium.com/geekculture/cloud-security-career-guide-2023-57b5c5d3f4a6?source=topics_v2---------127-84--------------------4afcb637_2f8d_417b_bd6d_f968e3012bf5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Q8QwiKacelLTY6bM,cybersecurity 390,364,"Thoughts: Musk et al’s 6 month proposed moratorium on ‘Big AI’, GPT-4","I think it’s encouraging that AI creators like Elon Musk and, not yet a signatory, OpenAI’s Sam Altman, are independently talking about, and arguably taking seriously, the threats, as well as the benefits, of AI. So: Is the 6 month moratorium a good idea? Will OpenAI and others comply? What…",https://medium.com/@paul.k.pallaghy/thoughts-musk-et-als-6-month-proposed-moratorium-on-big-ai-gpt-4-36b321589a78?source=topics_v2---------128-84--------------------4afcb637_2f8d_417b_bd6d_f968e3012bf5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*MAfkJQDsEU12a5TN,cybersecurity 391,365,ChatGPT: Build me a Recon Tool!,"Using ChatGPT to build a simple hacking recon tool — In Chapter 5 of Bug Bounty Bootcamp, I talked about how you can write a simple bash script to automate recon tasks before hacking and bug bounty hunting. Then just a year later, ChatGPT came around. I am still a huge proponent of learning to script so that you can…",https://medium.com/better-programming/chatgpt-build-me-a-recon-tool-123c23a6a23f?source=topics_v2---------129-84--------------------9381b4f3_53ba_40ba_9eb4_87009aca220a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ijWdZs37UDKsh55g,cybersecurity 392,366,Learn basics of hashing algorithms and how they secure data,"Understanding the importance of hashing algorithms in securing your data, different types of hashing algorithms, and their unique features Introduction A hashing algorithm is a mathematical function that takes an input (like a piece of text or a file) and converts it into a fixed-length string of characters, usually numbers or…",https://medium.com/@gupta-deepak/learn-basics-of-hashing-algorithms-and-how-they-secure-data-c84be1007dc6?source=topics_v2---------130-84--------------------9381b4f3_53ba_40ba_9eb4_87009aca220a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*KAH2P6N2-Mpeqh2r.jpeg,cybersecurity 393,367,TDX Event Recap — Breaking Into The Public Sector,"Recently, ThriveDX Executive Chairman and Co-founder Dan Vigdor got together with President and General Manager, Public Sector, Tim Roemer to discuss the main challenges and rising trends within the cybersecurity education industry and government entities. During the session, Tim Roemer expanded on his role within ThriveDX and how he will…",https://medium.com/@tdx.social/tdx-event-recap-breaking-into-the-public-sector-4df8506c4708?source=topics_v2---------131-84--------------------9381b4f3_53ba_40ba_9eb4_87009aca220a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*VCmFCDQ3M_QPZLX3PF4Gxw.png,cybersecurity 394,368,How Linus Tech Tips Got Hacked: A Deep Dive into the Malware Attack,"In a world where cybersecurity threats constantly evolve, even giants like Linus Tech Tips can fall victim to attacks. Today, we'll dive deep into the malware attack that hacked the Linus Tech Tips YouTube channel and how it could have been prevented. …",https://medium.com/@therealrealblogger/how-linus-tech-tips-got-hacked-a-deep-dive-into-the-malware-attack-f6637f2a72e3?source=topics_v2---------132-84--------------------9381b4f3_53ba_40ba_9eb4_87009aca220a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*wjF9I3XTnBFWme92,cybersecurity 395,369,Bugproof your Firmware with BugProve,"I guess the graphic above depicts the essence of BugProve, a recently launched European IOT Security company. I’m rarely excited when I see a new product or service emerging on the market because many of them are just very expensive abstractions for something that you could do yourself, provided that…",https://medium.com/@cristivlad/bugproof-your-firmware-with-bugprove-e9ce7c5bc2f8?source=topics_v2---------133-84--------------------9381b4f3_53ba_40ba_9eb4_87009aca220a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Su_RZvm-QU_8Ng2-ART8_g.png,cybersecurity 396,370,Next Stop for TRAM,"Exploring the Application of Large Language Models Written by jackie lasky Are you struggling to keep up with rapidly evolving threats to your organization while still trying to optimize your automation capabilities? In today’s digital age, cybersecurity threats are ubiquitous. They can result in financial losses, reputational damage, legal liabilities…",https://medium.com/mitre-engenuity/next-stop-for-tram-79ae59428176?source=topics_v2---------134-84--------------------9381b4f3_53ba_40ba_9eb4_87009aca220a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*p2H-3UvPbR87pFUdhaGV5g.jpeg,cybersecurity 397,371,Is your data an asset or liability?,"Three strategies to tip the equation in your favour — Businesses are placing data at the core of their strategy In our previous post (part I), we spoke about the explosion of commodified data, which is now ‘more valuable than oil.’ In short, we explored how data is easier than ever to gather and store, and provides insights that are…",https://medium.com/@onqlave/is-your-data-an-asset-or-liability-d0096a9babeb?source=topics_v2---------135-84--------------------9381b4f3_53ba_40ba_9eb4_87009aca220a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fMkL_j0qMqujzpuwQB_oSg.jpeg,cybersecurity 398,372,The FTX Disaster is Deeper Than You Think,"First of all, what exactly is FTX? FTX is a cryptocurrency derivatives exchange founded in 2019 by Sam Bankman-Fried and Gary Wang. It is headquartered in Antigua and Barbuda and is known for its wide range of cryptocurrency trading products, including futures, options, leveraged tokens, and spot trading. FTX has gained popularity among cryptocurrency traders due to…",https://medium.com/@HetPatel29/the-ftx-disaster-is-deeper-than-you-think-f1369f32f568?source=topics_v2---------136-84--------------------9381b4f3_53ba_40ba_9eb4_87009aca220a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5vYPiEkxGpemJQQ_m7U8yQ.jpeg,cybersecurity 399,271,Password Hacking - Hydra BruteForce CheatSheet,"Introduction Hydra is one of the favourite tools of security researchers and consultants. Being an excellent tool to perform brute force attacks. In this article, I will show you how to perform a brute force attack with Hydra on a FTP, MYSQL, SMB, SMTP, SSH Servers and Web Login Auth. Wordlist A…",https://medium.com/@s12deff/password-hacking-hydra-bruteforce-cheatsheet-64e731507c?source=topics_v2---------137-84--------------------9381b4f3_53ba_40ba_9eb4_87009aca220a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*S30WtLKXPGYmtJo84H1y9w.png,cybersecurity 400,373,Step-By-Step Procedure To Create A SCOM Certificate Template,"System Center Operation Manager or OpsMgr in short SCOM, a tool plays a key role in maintaining the health of the whole Windows infrastructure of an organization. IT teams use this tool to monitor the health & performance, send configurations, apply OS & app patches, and run the scripts on…",https://medium.com/thesecmaster/step-by-step-procedure-to-create-a-scom-certificate-template-e9fbc894cc52?source=topics_v2---------138-84--------------------09de0588_b362_423b_b346_30b0e2aab5c2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*FGVhVtVJuy2j4St5vg0BVw.png,cybersecurity 401,374,Voice deepfakes are calling — here’s what they are and how to avoid getting scammed,"Powerful AI tools available to anyone with an internet connection make it easy to impersonate someone’s voice, increasing the threat of phone scams. — By Matthew Wright, Professor of Computing Security & Christopher Schwartz, Postdoctoral Research Associate of Computing Security, Rochester Institute of Technology You have just returned home after a long day at work and are about to sit down for dinner when suddenly your phone starts buzzing. On the other end is…",https://medium.com/the-conversation/voice-deepfakes-are-calling-heres-what-they-are-and-how-to-avoid-getting-scammed-2cac128dd968?source=topics_v2---------139-84--------------------09de0588_b362_423b_b346_30b0e2aab5c2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fAAfyfewBzSAmmIHsZZIxg.jpeg,cybersecurity 402,375,Why should you do (security) chaos engineering?,"It seems to me that the notion of chaos engineering is gaining ground — I see more and more references to chaos engineering in social media and business environments. However, there are a few prevailing myths around chaos engineering that may hinder an organisation’s appetite for exploring chaos engineering. With…",https://medium.com/@glenn-wilson/why-should-you-do-security-chaos-engineering-1750376faba5?source=topics_v2---------140-84--------------------09de0588_b362_423b_b346_30b0e2aab5c2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*J8cQuX6SAWNDcPJPGxwgzw.jpeg,cybersecurity 403,376,Terra Luna Coin Scam: When Stablecoins Aren’t So Stable,"Stablecoins were introduced to address the volatility and uncertainty of cryptocurrencies, which are notorious for their fluctuating values. Stablecoins aim to provide a stable value by pegging them to a fiat currency, commodity, or basket of assets. Stablecoins have been touted as a low-risk investment that aims to maintain a…",https://medium.com/@kartikp36/terra-luna-coin-scam-when-stablecoins-arent-so-stable-ddf5a2291eb0?source=topics_v2---------141-84--------------------09de0588_b362_423b_b346_30b0e2aab5c2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*IdAR8-wk0WcvDgDwk0sEHQ.png,cybersecurity 404,377,Artificial Intelligence and Cybersecurity,"How can we use AI in the field of cybersecurity and what are the advantages and disadvantages? — AI In The News “National security always matters, obviously. But the reality is that if you have an open door in your software for the good guys, the bad guys get in there, too.” — Tim Cook Nowadays, we hear the words AI, Artificial Intelligence, Machine Learning, Deep Learning, and so on almost every…",https://medium.com/artificialis/artificial-intelligence-and-cybersecurity-34f01e3aefc1?source=topics_v2---------142-84--------------------09de0588_b362_423b_b346_30b0e2aab5c2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*UraHA9mQzAlOCNE3.jpeg,cybersecurity 405,371,The rise and rise of ‘data-driven’ businesses,"In 2017, the Economist published an article claiming that ‘the world’s most valuable resource is no longer oil, but data.’ Ten years ago, this headline might have seemed more at home in a tech publication or even a plot twist in a bond film. …",https://medium.com/@onqlave/the-rise-and-rise-of-data-driven-businesses-4787f2230d29?source=topics_v2---------143-84--------------------09de0588_b362_423b_b346_30b0e2aab5c2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hAWrq6nPdQh-WhJTIS0qFQ.jpeg,cybersecurity 406,378,A Growing List of Schools being Hacked,"As cybersecurity experts, we must stay vigilant in a constantly evolving field. It is crucial that we monitor emerging trends and the evolution of threats. In the past year, we have witnessed a significant surge in cyberattacks targeting educational institutions. Here is a growing list of schools, colleges, and universities…",https://medium.com/@keplersafe/a-growing-list-of-schools-being-hacked-c713a02243e7?source=topics_v2---------144-84--------------------09de0588_b362_423b_b346_30b0e2aab5c2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*2mP7noh78R2AAzLN.jpg,cybersecurity 407,379,The Weak Spots Hackers Look to Attack,Anyone in the data or tech sectors knows cyberattacks are a severe threat to individuals and organizations. The global cost of cybercrime attacks is expected to rise to over $8 billion starting in 2023. That’s a lot of money and it will only increase as technology becomes more sophisticated. But…,https://medium.com/@odsc/the-weak-spots-hackers-look-to-attack-3e287751fcf8?source=topics_v2---------145-84--------------------09de0588_b362_423b_b346_30b0e2aab5c2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*C1X2uZnkIm-DL5Sy.jpg,cybersecurity 408,380,Fixing Vulnerabilities can be messy;,"and so it is — Fixing vulnerabilities is far from straightforward. Of all those that you Receive news of, not all have a patch, and therefore need to be Queued. Others are Not Applicable to our environment, and can therefore be Closed. Of all those that are Assigned to owners to be fixed, not all…",https://medium.com/the-ciso-den/fixing-vulnerabilities-can-be-messy-2a1f18712465?source=topics_v2---------146-84--------------------09de0588_b362_423b_b346_30b0e2aab5c2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QtN6maoUacEcpTIFMsTccA.png,cybersecurity 409,340,Code Execution with “apt update” in crontab | PrivEsc in Linux,Well it’s funny how putting apt-update in the cron jobs can make things vulnerable. Because one might put it in good intention of updating the system to keep everythin new and fresh but an attacker can take advantage of this to execute malicious code. The apt update command is executed…,https://medium.com/system-weakness/code-execution-with-apt-update-in-crontab-privesc-in-linux-e6d6ffa8d076?source=topics_v2---------147-84--------------------09de0588_b362_423b_b346_30b0e2aab5c2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5Wn1LkL1laVFzUqAAx31fQ.png,cybersecurity 410,346,Broken Object Level Authorization (OLA),"Object level authorization (OLA) is a security mechanism that ensures that only authorized users can access or modify specific resources or objects in an application. For example, OLA can prevent a user from viewing or editing another user’s profile, posts, or messages. However, OLA can be broken if the application…",https://medium.com/2023-owasp-top-10/broken-object-level-authorization-ola-30784ff0605f?source=topics_v2---------148-84--------------------b7a14e68_0029_4f10_9e54_bd69c993053d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hpEGivTiqpSJPRaA0PjeFw.png,cybersecurity 411,381,#PwnItFridays @hackthebox_eu Starting Point Series: Vaccine,"Another day, another challenge. I’m restarting the series #PwnItFriday where I hack machines from hackthebox and TryHackMe. Without further ado, the machine I’m solving today is Vaccine. Topics explored in this machine are Vulnerability Assessment, Source Code Analysis, Password Cracking, and SQL Injection. Click the video to learn how to solve this machine! Like the content — support by Buying a Coffee",https://medium.com/@jmjackson2011/pwnitfridays-hackthebox-eu-starting-point-series-vaccine-fe87f0f0a28a?source=topics_v2---------149-84--------------------b7a14e68_0029_4f10_9e54_bd69c993053d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JexgZ-wi3gGr6_tGk528vg.png,cybersecurity 412,382,What Can Happen if you Browse the Dark Net - 7 Terrifying Stories,"Are you curious about the most spooky stories on the Dark Web? Many people are interested in this subject, so after that, I'll show you. — Attention !!! I don’t know if the stories are 100% true, but I know that something like this happens on the Dark Net. Please read at your own risk. Maybe some information can be disturbing. Treat the stories like mystery or horror stories. If you are a naturally curious person, I advise…",https://medium.com/@Writers.Digest/7-most-terrifying-dark-web-stories-19ec807da605?source=topics_v2---------150-84--------------------b7a14e68_0029_4f10_9e54_bd69c993053d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PGpnPNn04FD0ph0m-rcMiw.jpeg,cybersecurity 413,383,Cloud Computing and Cybersecurity: The Benefits of a Cybersecurity Advisor for Startups,"As a startup, you’re focused on growth, innovation, and success. However, in today’s digital world, it’s crucial to also focus on cybersecurity, especially when it comes to cloud computing. The cloud offers many benefits, but it also brings new security challenges. …",https://medium.com/@infosec-mike/cloud-computing-and-cybersecurity-the-benefits-of-a-cybersecurity-advisor-for-startups-d416301865dd?source=topics_v2---------151-84--------------------b7a14e68_0029_4f10_9e54_bd69c993053d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*FyAciE-Xylp0Mgk-VagefA.jpeg,cybersecurity 414,275,DNSSEC in AWS Route 53 and Google Domains,"Protect against DNS spoofing and improve email security — DNSSEC is a way to add additional protection to your email address to prevent spoofing. Here are the steps to add DNSSEC to your domain if you are using Google Domains or AWS. Setting up DNSSEC on a Google Domain First, here’s how you do it in Google domains if you also use Gmail: Login at https://domains.google. …",https://medium.com/cloud-security/dnssec-in-aws-route-53-and-google-domains-9c649b456f41?source=topics_v2---------152-84--------------------b7a14e68_0029_4f10_9e54_bd69c993053d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Cd5GZV8fBeAFoZo6Jlin5g.png,cybersecurity 415,275,Simplifying Security in AWS,"ACM.184 Abstraction and how it helps you reduce management and complexity in AWS — In my last post I was creating an SCP to help prevent unauthorized removal of an account in your organization, while allowing removal when you need to do so without modifying your SCPs. SCP to Allow Closing and Removing AWS Accounts — Part 3 ACM.183 Trying out the new AWS billing actions in our SCPmedium.com Today’s topic was inspired by someone who contacted me about a prior post. It made me realize…",https://medium.com/cloud-security/simplifying-security-in-aws-16491db11c17?source=topics_v2---------153-84--------------------b7a14e68_0029_4f10_9e54_bd69c993053d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*dSpTStI8qWb8AZ91a2kmPw.png,cybersecurity 416,384,AI and Network Security: A Match Made in Cyber-Heaven,"Greetings, my fellow tech enthusiasts! Welcome to the blog where we dive deep into the mesmerizing world of network security and artificial intelligence (AI). — In a world where hackers are more sophisticated than ever before, protecting our networks is like playing a never-ending game of chess against an army of Grandmasters. But, luckily, we now have an AI-powered shield in our arsenal! These network security solutions are like the Jedi knights of the cybersecurity…",https://medium.com/@vazdaniel70/ai-and-network-security-a-match-made-in-cyber-heaven-1ba0c0da7faa?source=topics_v2---------154-84--------------------b7a14e68_0029_4f10_9e54_bd69c993053d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PRWkHumEWPi_cFysw8K7pw.jpeg,cybersecurity 417,385,Permissions (Writeup) | PicoCTF 2023,This CTF mainly tests on Linux privilege escalation. Lets launch the instance and connect to it via SSH. The credentials have been provided in the description. Check the sudo permissions the user has available to them. (Hint: What permissions do you have?) sudo -l As we can see below we…,https://medium.com/@petemuiruri/permissions-writeup-picoctf-2023-be95c95f80a5?source=topics_v2---------155-84--------------------b7a14e68_0029_4f10_9e54_bd69c993053d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hzPbSYijp_y-pjVtnkZOYQ.png,cybersecurity 418,386,How to create safety .env file in Laravel project?,"The .env file in Laravel is a configuration file that contains sensitive information. In your main Laravel folder you should have .env file which contains various settings, one row – one KEY=VALUE pair. And then, within your Laravel project code you can get those environment variables with function env(‘KEY’). By…",https://medium.com/@kovacsbrigi711/how-to-create-safety-env-file-in-laravel-project-a2807e5d1c1f?source=topics_v2---------156-84--------------------b7a14e68_0029_4f10_9e54_bd69c993053d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4ZagHpXoFGhoEv2Ka2nB_g.png,cybersecurity 419,387,"DORA, Cybersecurity Attacks and how to survive them","It cannot be any more relevant or current to be discussing and looking into cybersecurity issues and concerns, for any type, size or form of organization you may be involved in. Only in the last three weeks we have seen governmental institutions being immobilized due to cyber attacks, with hackers…",https://medium.com/@mikaela.kantor/dora-cybersecurity-attacks-and-how-to-survive-them-c53093126509?source=topics_v2---------157-84--------------------b7a14e68_0029_4f10_9e54_bd69c993053d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MsVWJCVqxE8O6oZLgpQWKQ.png,cybersecurity 420,388,Privacy in the Metaverse might be Impossible (new research study),"A new paper from the University of California Berkeley reveals that privacy may be impossible in the metaverse without innovative new safeguards to protect users. Led by graduate researcher Vivek Nair, the recently released study was conducted at the Center on Responsible Decentralized Intelligence (RDI) and involved the largest dataset…",https://medium.com/predict/privacy-in-the-metaverse-might-be-impossible-new-research-study-64935481c6de?source=topics_v2---------158-84--------------------104a8922_bde8_41ae_a111_887b00287a1f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7GZ3jh-g9sJluElkTkQ8UA.jpeg,cybersecurity 421,389,What Part of JMP RSP Don’t You Understand,"Assembly Language Bootcamp for Malware Analysis I’ll be running this workshop at the 35th FIRST Conference to be held this year on 8 June 2023, in Montreal, Canada. If you’re planning to attend, please drop in, attend the workshop or just come around to say Hello! Summary Assembly language is one…",https://medium.com/@malienist/what-part-of-jmp-rsp-dont-you-understand-923ae7d15b15?source=topics_v2---------159-84--------------------104a8922_bde8_41ae_a111_887b00287a1f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_SQMpikGkeXfRb3R8mImpQ.jpeg,cybersecurity 422,371,2022: A Bad Year for Data Breaches,"We discuss the main themes and events that defined the year — For many, 2022 will be a year remembered for all the wrong reasons. We witnessed a continual flow of breaches, that spanned multiple sectors, and impacted millions globally — sometimes with devastating consequences. …",https://medium.com/@onqlave/2022-a-bad-year-for-data-breaches-42c4099677d8?source=topics_v2---------160-84--------------------104a8922_bde8_41ae_a111_887b00287a1f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CWDtZtpQS2pa3n5KmmlAeA.jpeg,cybersecurity 423,390,Cyber Attack on Royal Mail – January 2023,"An overview and timeline of events OVERVIEW: Royal Mail reported it had been hit by a ‘cyber incident’ on 10/01/23 The incident was a ransomware attack, claimed by LockBit RM‘s International Export Services were hacked & unavailable The ransom demand was $80 million (or £67 million) The ransom was not paid …",https://medium.com/@Steph-Alexander/cyber-attack-on-royal-mail-january-2023-386670b27a12?source=topics_v2---------161-84--------------------104a8922_bde8_41ae_a111_887b00287a1f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*bvB-_ePLE-rUV8cY6BhjUQ@2x.jpeg,cybersecurity 424,391,Ra Ra Ransomware,The worlds greatest Cyber threat? Boney M may not have sang about the world of Ransomware but they had a solid thought process around the idea of a threat actor from the East. Background Ransomware is a term that is now well-known in both the cyber & real world media. It…,https://medium.com/@brianmcalinden/ra-ra-ransomware-112411d8bf19?source=topics_v2---------162-84--------------------104a8922_bde8_41ae_a111_887b00287a1f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Pz25kgD7sDhxoYAyYC7ybg.png,cybersecurity 425,373,Step-By-Step Procedure To Install Apache From Source Code On Ubuntu,"If you are into the Linux platform, you might have definitely heard about the Apache webserver. Apache was the most popular open-source web server project for few decades. Even today, Apache holds a share of around 30% in webserver. If you own a website running on an Apache web server…",https://medium.com/thesecmaster/step-by-step-procedure-to-install-apache-from-source-code-on-ubuntu-de608d6cb5?source=topics_v2---------163-84--------------------104a8922_bde8_41ae_a111_887b00287a1f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pYuMjf3Uj79ntjbAgK0alw.png,cybersecurity 426,392,Reflections on 100 days #DailyUpskilling,"I’ve done 100 days doing anything outside of my work to upskill myself. The method that I’ve used to track my progress is via twitter (@thisisfinx). This post simply here for me to compile what I’ve gathered from this session The tweet that start em’ all The complete days List of all #DailyUpskilling tweets. twitter.com Main Lesson Learned Nobody gives a hoot about what you’re doing day…",https://medium.com/@thisisfinx/reflections-on-100-days-dailyupskilling-9a4fa29f261d?source=topics_v2---------164-84--------------------104a8922_bde8_41ae_a111_887b00287a1f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*hKRWsz_0Ade0Kv0F.jpg,cybersecurity 427,393,"Russian Intelligence, the Breach of the Democratic National Committee, and the 2016 Presidential Election","This article covers how the SVR, Russia’s foreign intelligence services, first breached the Democratic National Committee, only to be followed by the far more aggressive GRU, Russian Military Intelligence. It is the third article in the series “Russian Military Intelligence, Disinformation, and the 2016 U.S. Presidential Election.” …",https://medium.com/@petergrant_14485/russian-intelligence-the-breach-of-the-democratic-national-committee-and-the-2016-election-61b1080258b4?source=topics_v2---------165-84--------------------104a8922_bde8_41ae_a111_887b00287a1f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Zqqvq7w1Pn-0YEt81WhDyg.jpeg,cybersecurity 428,340,“Inception” WriteUp | HackThebox | Learn Pivoting with Proxychains,Summary : This machine requires a known software’s LFI exploit that leads to clear text credential to webdav exploit. Then we get a webshell and from leveraging the web proxy we SSH into a machine. …,https://medium.com/system-weakness/inception-writeup-hackthebox-proxychain-and-chisel-to-pivot-5e26e6393717?source=topics_v2---------166-84--------------------104a8922_bde8_41ae_a111_887b00287a1f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*O2_oRJ1vnKNBchbcQzx9Tg.png,cybersecurity 429,394,A Retrospective Vulnerability Case Study: The Developer’s POV,"In this month’s blog series, we’ve moved “backwards through time” using a 2017 T-Mobile case study to illustrate what can be learned from three roles discovering a vulnerability in an operational system at varying points in the development cycle. Our previous two installments discussed what lessons can be learned from…",https://medium.com/neuvik/a-retrospective-vulnerability-case-study-the-developers-pov-cc61d92b85bf?source=topics_v2---------167-84--------------------104a8922_bde8_41ae_a111_887b00287a1f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qBl8KM38ty6WFSX-29uhJw.png,cybersecurity 430,395,What is a JWT?,"Introduction JSON Web Tokens (JWT) is a popular method for securely transmitting information between parties as a JSON object. JWT is used for authentication and authorization in web applications and APIs. JWT consists of three parts: the header, the payload, and the signature. …",https://medium.com/@lakshay-parnami/what-is-a-jwt-f4b5303c5dad?source=topics_v2---------168-84--------------------1fea6fa3_0bda_4b22_893b_69247da9feef-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,cybersecurity 431,396,Exposing the top 3 cybersecurity threats of 2023,"From prompting SaaS providers to ‘bid down’ to an older network to controlling non-essential links, attackers can play around with various unexplored areas unknown to us. By Shomiron Das Gupta, Founder of DNIF HYPERCLOUD Today hackers have become smarter and protecting data from various online threats and unauthorized access has…",https://medium.com/@techgigdotcom/exposing-the-top-3-cybersecurity-threats-of-2023-2e9a9ab1486a?source=topics_v2---------169-84--------------------1fea6fa3_0bda_4b22_893b_69247da9feef-------17,https://miro.medium.com/v2/resize:fill:140:140/0*vqSrEybhZs3xtcU1,cybersecurity 432,397,INE’s eJPT Certification is Here to Kickstart Junior Penetration Testing Careers,"Penetration testing is an integral part of cybersecurity, so it’s no surprise that it’s a rapidly growing role. O’Net Online reports that penetration testing roles will grow by almost 35,000 jobs by 2031, a faster-than-average growth rate. Organizations are in search of qualified, certified professionals to join their Red Teams…",https://medium.com/pentester-academy-blog/ines-ejpt-certification-is-here-to-kickstart-junior-penetration-testing-careers-8b4dad1017f4?source=topics_v2---------170-84--------------------1fea6fa3_0bda_4b22_893b_69247da9feef-------17,https://miro.medium.com/v2/resize:fill:140:140/0*moZA3sTO9Rp8q8AG.jpg,cybersecurity 433,322,Python Penetration Testing: Being a Linux Control Freak!,"How I control multiple services on multiple Linux Servers at once! — R. Eric Kiser During an engagement, you may come across various services running on multiple systems that you may desire to have turned on. These services may include FTP, web services for printers, cameras, and other management services, and even VNC servers. Conversely, you may also want to disable logging…",https://medium.com/bugbountywriteup/python-penetration-testing-being-a-linux-control-freak-db75facc3fab?source=topics_v2---------171-84--------------------1fea6fa3_0bda_4b22_893b_69247da9feef-------17,https://miro.medium.com/v2/resize:fill:140:140/1*bn0ItEX_Gfz9pMhFhrwAEA.png,cybersecurity 434,398,Helping Companies Better Protect Themselves By Performing A Penetration Test Instead Of A Vulnerability Test,"To demonstrate what a difference a penetration test makes, we will compare a vulnerability test against a penetration test. Once we have, you will understand the benefits one gets from running a penetration test instead of a vulnerability test. To make it fair, we will compare a vulnerability test and…",https://medium.com/@hellfiresec/helping-companies-better-protect-themselves-by-performing-a-penetration-test-instead-of-a-ec5920ef7ca9?source=topics_v2---------172-84--------------------1fea6fa3_0bda_4b22_893b_69247da9feef-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5-2DiWUDr40KVkDcjUup7Q.jpeg,cybersecurity 435,399,"Importance of Cybersecurity Cybersecurity can be defined as every aspect of protecting an…","Importance of Cybersecurity Cybersecurity can be defined as every aspect of protecting an organization and its employees and assets against cyber-threats. It is the protection of internet-connected systems such as hardware,software and data from cyber-threats.This era of technology and the internet is supposed as main source of current information but it…",https://medium.com/@oluwatomilolaarogundade/importance-of-cybersecurity-cybersecurity-can-be-defined-as-every-aspect-of-protecting-an-853022a2635f?source=topics_v2---------173-84--------------------1fea6fa3_0bda_4b22_893b_69247da9feef-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3LIN7vMTwcfrwmjkkhjsjg.png,cybersecurity 436,400,+280 Blockchain Networks and their $25B at Risk of Imminent Exploits!,"“There shall never be a peaceful week in crypto space!” — some crypto deity must have decreed at some point it seems! Recently, blockchain security firm Halborn announced the discovery of security breaches — known as zero-day vulnerabilities — that could put over $25 billion dollars of digital assets at risk, including Dogecoin, Litecoin, and Zcash, among more than 280 networks. A year ago, Dogecoin tasked Halborn with analyzing their open source…",https://medium.com/@nefture/280-blockchain-networks-and-their-25b-at-risk-of-imminent-exploits-e0fdf647fdfe?source=topics_v2---------174-84--------------------1fea6fa3_0bda_4b22_893b_69247da9feef-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_8PTixvHWN7FU1nFe5AqOQ.png,cybersecurity 437,401,AI/ML: Future of Technology,Introduction With the new rising development and training of AI and ML models it seems as if people are becoming a bit too worried about the over taking of AI in the tech field and industry or really the world. So In today’s article I will be discussing the topic…,https://medium.com/@Totally_Not_A_Haxxer/ai-ml-future-of-technology-7e65e2234161?source=topics_v2---------175-84--------------------1fea6fa3_0bda_4b22_893b_69247da9feef-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6CUxHXWKCD-VclZCpC2dmQ.jpeg,cybersecurity 438,402,Protecting yourself on the World Wide Web,"The Internet is a huge part of our lives. From keeping in touch with friends to learning how to prepare a tasty delicacy, its advantages are endless. But like most things with an advantage, this vast connection of computer networks also has its downsides. …",https://medium.com/@Toyibat_Adele/protecting-yourself-on-the-world-wide-web-fa79022f05ab?source=topics_v2---------176-84--------------------1fea6fa3_0bda_4b22_893b_69247da9feef-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PjosM35pFCR3w9hrFGUpgA.png,cybersecurity 439,403,The Certifications Of The Cybersecurity Landscape in 2023,"Introduction The cybersecurity landscape is constantly evolving and becoming more complex. As a result, professionals who want to pursue a career in this field need to acquire relevant skills and knowledge to protect and defend systems and networks from cyberattacks. One way to demonstrate your competence and credibility is to obtain…",https://medium.com/@thexssrat/the-certifications-of-the-cybersecurity-landscape-in-2023-98f07b6ddc7b?source=topics_v2---------177-84--------------------1fea6fa3_0bda_4b22_893b_69247da9feef-------17,https://miro.medium.com/v2/resize:fill:140:140/0*G3hv3H3NxDkCIbqB,cybersecurity 440,404,ARITHMETIC UNDERFLOW AND OVERFLOW VULNERABILITIES,"In this article, we will focus on vulnerabilities resulting from improper handling of mathematical operations in Solidity, specifically arithmetic underflow and arithmetic overflow, and we will offer some tips on how to mitigate them. Arithmetic overflow occurs when a program’s mathematical operation produces a value exceeding the maximum value the…",https://medium.com/@ironblocks/arithmetic-underflow-and-overflow-vulnerabilities-be35dcce6bcf?source=topics_v2---------178-84--------------------9b97977b_662f_4d35_8c69_39c205acf607-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,cybersecurity 441,405,A 10-Year-Old’s Guide to Invoice Scam,"Don’t Get Scammed, Protect Yourself — Have you ever received an email or a letter saying that you owe money for something you don’t remember buying? If so, you may have been targeted by a cyber security invoice scam. …",https://medium.com/@shelkesays/a-10-year-olds-guide-to-invoice-scam-3ff4a61a6307?source=topics_v2---------179-84--------------------9b97977b_662f_4d35_8c69_39c205acf607-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EBpHUc15BzdxlSkxlRHD6Q.jpeg,cybersecurity 442,406,"Beware of Ransomware, a real threat to your online security","Ransomware is serious business, and you should do all in your power to protect yourself and your organization against this type of cyber attacks. Ransomware is one of the most harmful kinds of malware currently out there. Once it infects a computer, it locks the owner out of their own…",https://medium.com/@softwaretrailers/beware-of-ransomware-a-real-threat-to-your-online-security-e5b6654fbcf4?source=topics_v2---------180-84--------------------9b97977b_662f_4d35_8c69_39c205acf607-------17,https://miro.medium.com/v2/resize:fill:140:140/1*43nvpvXBQYRCFX60L9ET-g.jpeg,cybersecurity 443,407,Microsoft Sentinel — Azure OpenAI Incident Response Playbook,"In a previous blog post, I discussed how integration of ChatGPT and Microsoft Sentinel can simplify the incident handling process. As part of my ongoing exploration of AI-driven incident handling, I recently played with Azure OpenAI and I discovered new possibilities for enhancing my previous work. I decided to integrate…",https://medium.com/microsoftazure/microsoft-sentinel-azure-openai-incident-response-playbook-8167b5baa3d8?source=topics_v2---------181-84--------------------9b97977b_662f_4d35_8c69_39c205acf607-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7bJ8L0_5nzKKr2FxLETrHg.png,cybersecurity 444,408,Investigating an Internal Policy Violation: Email,Scenario: You’re investigating an internal policy violation when you find an e-mail about a serious assault for which a police report needs to be filed. What should you do? Who in your company do you need to talk to first and what evidence must be turned over to the police? …,https://medium.com/@m0lt3n/investigating-an-internal-policy-violation-email-c8f2f338801b?source=topics_v2---------182-84--------------------9b97977b_662f_4d35_8c69_39c205acf607-------17,https://miro.medium.com/v2/resize:fill:140:140/0*1PuIMfnrER3IKqKe,cybersecurity 445,382,Cybersecurity Threats and Trends: Stay Safe in an Increasingly Digital World,"Cybersecurity is a growing concern for both individuals and businesses as the world continues to move toward a digital-first mindset. — In order to keep ourselves and our data safe, it's essential to be aware of the most recent cybersecurity threats and trends as new technologies and techniques of hacking arise. We will examine some of the most important cybersecurity trends and threats that people and businesses are currently facing in…",https://medium.com/@Writers.Digest/cybersecurity-threats-and-trends-stay-safe-in-an-increasingly-digital-world-1a2f9a3730dd?source=topics_v2---------183-84--------------------9b97977b_662f_4d35_8c69_39c205acf607-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DMf149Qp6ZFDs5m7lqFZcg.jpeg,cybersecurity 446,409,How Vaultree’s Fully Functional Data-In-Use Encryption SDK can help your organisation to mitigate cyberattacks,"🔒 Attention all CISOs and cybersecurity enthusiasts! 🔒 Did you know that organisations are increasingly facing the devastating consequences of cyberattacks year after year, right? Some of the most common attacks include ransomware, phishing, insider threats, and DDoS attacks, all of which can lead to significant data breaches and damage…",https://medium.com/@vaultree/how-vaultrees-fully-functional-data-in-use-encryption-sdk-can-help-your-organisation-to-mitigate-cc9e0418ce5b?source=topics_v2---------184-84--------------------9b97977b_662f_4d35_8c69_39c205acf607-------17,https://miro.medium.com/v2/resize:fill:140:140/1*f6g2xN0Qo0r2hzv5h4MGuw.png,cybersecurity 447,410,What Is Brute Force Attack? How To Defend Against It?,What Is Brute Force Attack? Brute force attack is one of the password guessing attacks wherein the attacker tries to get access to a server or website by constantly trying various combinations of usernames and passwords. It is a trial and error approach hoping to get correct combination of user credentials. Let’s get practical: Suppose you know username…,https://medium.com/@wisemonkeysoffpage/what-is-brute-force-attack-how-to-defend-against-it-2905196970ad?source=topics_v2---------185-84--------------------9b97977b_662f_4d35_8c69_39c205acf607-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EPDox1u2VZ5yzipkzUSytA.png,cybersecurity 448,283,Advancements in AI and the impact of AI on industries and society.,"Accepting the Growth of AI and Machine Learning For many years, people have been wary of the idea that machines could surpass human intelligence. But today, artificial intelligence and machine learning are revolutionizing our world, sparking the Fourth Industrial Revolution, and transforming the way we live and work. New Jobs on the Horizon While some may fear that AI will take away jobs…",https://medium.com/@hafizshahbaz402/advancements-in-ai-and-the-impact-of-ai-on-industries-and-society-b6bce6d27a95?source=topics_v2---------186-84--------------------9b97977b_662f_4d35_8c69_39c205acf607-------17,https://miro.medium.com/v2/resize:fill:140:140/0*sRyYeP2bdQEQE4zF,cybersecurity 449,363,Google Cloud is introducing Attack Simulation within its platform,This is great step forward for cloud security platforms — One of the best things about Cloud Security is how new capabilities keep getting added to cloud platforms every year The unique model of the cloud also means that you dont have to do any deployments and these new features can just be deployed with a button click Last year…,https://medium.com/@taimurcloud123/google-cloud-is-introducing-attack-simulation-within-its-platform-d01b5f82fbc9?source=topics_v2---------187-84--------------------9b97977b_662f_4d35_8c69_39c205acf607-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Y-wQzc4IghlrteUq,cybersecurity 450,411,Certified in Cybersecurity (CC) certification by (ISC)2 — Part-2,"In continuation of the previous blog post, Certified in CyberSecurity by (ISC)2 found here Certified in Cybersecurity (CC) certification by (ISC)2 — Part 1, today Let’s discuss more the exam syllabus. The Certified in Cybersecurity (CC) exam covers five domains related to fundamental cybersecurity concepts. …",https://medium.com/@exploit_daily/certified-in-cybersecurity-cc-certification-by-isc-2-part-2-f08a47073da6?source=topics_v2---------188-84--------------------c8c3bab4_f4ab_4b1e_bee6_9e2a45316a65-------17,https://miro.medium.com/v2/resize:fill:140:140/1*jhO1MhmuF7yP1ItyxzKUdA.png,cybersecurity 451,412,Resume challenge 2.0 — AWS Amplify,"I have an update about my resume website. I started from scratch to create a resume using AWS Amplify and React JS with Next.js. So, I will continue to update this post step by step, but for now, I want to explain why I am no longer using Wordpress in…",https://medium.com/@neilacostait/resume-challenge-2-0-aws-amplify-d8a45f11a5d9?source=topics_v2---------189-84--------------------c8c3bab4_f4ab_4b1e_bee6_9e2a45316a65-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6_7jO3EjjsnOeiyTyQ_KRg.png,cybersecurity 452,413,Application Security: Is Your Business at Risk in the Hybrid World?,"Cisco Report reveals alarming findings on global application security readiness, exposing vulnerabilities in business-critical applications. As businesses continue to embrace digital transformation in a post-COVID world, the security of applications has become a paramount concern. The rapid growth of cloud-native applications and the shift to distributed systems have exposed organizations…",https://medium.com/magda-on-cyber/application-security-is-your-business-at-risk-in-the-hybrid-world-a083802a85eb?source=topics_v2---------190-84--------------------c8c3bab4_f4ab_4b1e_bee6_9e2a45316a65-------17,https://miro.medium.com/v2/resize:fill:140:140/1*FCiNS6HDcljKyhhElmF-Tw.jpeg,cybersecurity 453,279,Top cybersecurity tools every business should use:-,Businesses of all kinds are very concerned about cyber security. Businesses must implement a strong cybersecurity strategy in light of the rising number of cyber threats and assaults. The use of cybersecurity tools is one of the most crucial elements of this approach. …,https://medium.com/@cyberpedia/top-cybersecurity-tools-every-business-should-use-4f613a3d3373?source=topics_v2---------191-84--------------------c8c3bab4_f4ab_4b1e_bee6_9e2a45316a65-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Yj0YPBrAxwxAd6HO,cybersecurity 454,414,Zero Trust Security: A New Paradigm for Protecting Cloud Environments,"Cloud computing has transformed the way organizations do business. However, the convenience of cloud computing comes with its own set of unique security challenges. Cybercriminals are always looking for new ways to exploit vulnerabilities and gain access to sensitive data in the cloud. Traditional security models are no longer sufficient…",https://medium.com/@edward_wilkins/zero-trust-security-a-new-paradigm-for-protecting-cloud-environments-f24d4b520d9f?source=topics_v2---------192-84--------------------c8c3bab4_f4ab_4b1e_bee6_9e2a45316a65-------17,https://miro.medium.com/v2/resize:fill:140:140/1*uIArPgXfVdDU0XckwK49Gg.png,cybersecurity 455,373,Step-By-Step Procedure To Install kali Linux On VMWare Workstation,"If you are into cybersecurity and you don’t even hear about Kali Linux, then you never be considered a cybersecurity professional. Don’t worry we are here to introduce you to the wonderful Linux distribution. Kali Linux is not a general-purpose desktop or server operating system. It is designed and developed…",https://medium.com/thesecmaster/step-by-step-procedure-to-install-kali-linux-on-vmware-workstation-385c903e5889?source=topics_v2---------193-84--------------------c8c3bab4_f4ab_4b1e_bee6_9e2a45316a65-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gT3iEWSHQPTW9R-vDRBIrg.jpeg,cybersecurity 456,415,US: 5 things to know about new cybersecurity rules for medical devices,"New rules now require medical device makers to meet specific cybersecurity criteria to gain FDA approval — The U.S. Food and Drug Administration (FDA) has established new rules that require medical device makers to meet particular cybersecurity criteria in order to gain FDA approval for new products. Here are five key points: The new guidelines, which took effect today, apply to all new medical device applications and…",https://medium.com/@philsiarri/us-5-things-to-know-about-new-cybersecurity-rules-for-medical-devices-c796f07a9637?source=topics_v2---------194-84--------------------c8c3bab4_f4ab_4b1e_bee6_9e2a45316a65-------17,https://miro.medium.com/v2/resize:fill:140:140/1*f4lVevD9OiaCMx8c3p8c-g.jpeg,cybersecurity 457,416,Cybersecurity and ML in automotive ECUs,"The product lifecycle for cybersecurity illustrates the requirement to keep monitoring and maintenance a product until end of support, this in automotive world means, at least, 10 years. How can we know what cyber threats we will have in 10 years time? Does it means we will need to keep updating SW just based on cyberthreats? The cost of this could go over the roof and at some point, impossible to maintain.",https://medium.com/@marc.dni/cybersecurity-and-ml-in-automotive-ecus-28d6e60789f8?source=topics_v2---------195-84--------------------c8c3bab4_f4ab_4b1e_bee6_9e2a45316a65-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Nwnzp_geDxdWqHmwZ2C3hA.jpeg,cybersecurity 458,417,Stop cyber threats in their tracks with our AI-Powered security assessment tool,"Cybersecurity threats are on the rise, and organizations are struggling to keep up. The consequences of a data breach or cyber attack can be devastating, resulting in financial loss, damage to reputation, and even legal action. Traditional security measures like firewalls and antivirus software are no longer enough to protect…",https://medium.com/@walid.loutfi/stop-cyber-threats-in-their-tracks-with-our-ai-powered-security-assessment-tool-74bb059fc66a?source=topics_v2---------196-84--------------------c8c3bab4_f4ab_4b1e_bee6_9e2a45316a65-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tlBrRL3sghzebOgc6hKmUQ.png,cybersecurity 459,418,Ransomware As A Service: The 2023 Cybercrime Takeover,Ransomware As A Service: The 2023 Cybercrime Takeover Ransomware-as-a-Service is a business model in which ransomware is created by criminals and distributed to other criminals. It closely resembles typical software-as-a-service models. …,https://medium.com/@mubasshirmanalitics/ransomware-as-a-service-the-2023-cybercrime-takeover-be7daae3d293?source=topics_v2---------197-84--------------------c8c3bab4_f4ab_4b1e_bee6_9e2a45316a65-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EUBrrNEX885VB5-Of5SDMQ.jpeg,cybersecurity 460,322,Python Penetration Testing: Remotely Listing Services,"How I discover vulnerable services on Windows and Linux — R. Eric Kiser Services anyone? Think of computer services like a bartender. They have access to privileged information. They know their customers, drinking habits, credit card numbers, dating habits, or personal information they discuss. Just as bartenders expertly mix various ingredients to create a diverse array of cocktails to satisfy…",https://medium.com/system-weakness/python-penetration-testing-remotely-listing-services-5d46228d4d3f?source=topics_v2---------198-84--------------------f5a32791_a156_41dd_ae6c_ecbeb71a6741-------17,https://miro.medium.com/v2/resize:fill:140:140/1*XG6WjjYE7ZSYKDN7ecRBSg.png,cybersecurity 461,320,Advanced BBH_101: Falcon Recon,"This method is for educational purposes only, please do not use it for illegal activities. In the world of cybersecurity, reconnaissance is the process of gathering information about a target, such as a website or organization. This information can be used to identify potential vulnerabilities or to plan a more…",https://medium.com/@whalebone71/advanced-bbp-falcon-recon-2-b0b5dd8303be?source=topics_v2---------199-84--------------------f5a32791_a156_41dd_ae6c_ecbeb71a6741-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BK5a69SY9IrwKRp9WOvHgA.png,cybersecurity 462,419,Subdomains of Cybersecurity,"“HACKING… HACKING… HACKING..” This is usually what common people think when they hear the word “CYBERSECURITY”. But in reality, Hacking is not what cybersecurity only consists of! There are many more domains into it and hacking is simply a part of cybersec. Also in hacking, there are multiple sub parts…",https://medium.com/@the_neelguy/subdomains-of-cybersecurity-94509b3018db?source=topics_v2---------200-84--------------------f5a32791_a156_41dd_ae6c_ecbeb71a6741-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ivIvt_ym6mUC-bfDnAV_rg.png,cybersecurity 463,420,Protecting Sensitive Data: The Importance of Cybersecurity,"Cybersecurity is a term that refers to the protection of computer systems, networks, and electronic devices from theft, damage, and unauthorized access. With the rise of technology and the internet, the importance of cybersecurity has become more significant than ever before. …",https://medium.com/@corisdaniel77/protecting-sensitive-data-the-importance-of-cybersecurity-46c8ab11cc3d?source=topics_v2---------201-84--------------------f5a32791_a156_41dd_ae6c_ecbeb71a6741-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DbvCrd8WWNQNdkRVlKvomw.jpeg,cybersecurity 464,421,What Is Nmap?,"Nmap, another way to say “Organization Mapper”, is a free and open-source network investigation and security inspecting instrument. It is utilized to find has and benefits on a PC organization, consequently making a “map” of the organization. …",https://medium.com/@southindianplaces/what-is-nmap-838219c23314?source=topics_v2---------202-84--------------------f5a32791_a156_41dd_ae6c_ecbeb71a6741-------17,https://miro.medium.com/v2/resize:fill:140:140/0*nXiGVHIEaY008Cvh,cybersecurity 465,422,CSRF Takedown: Defeating Web Exploits with Code,"Attacking the Authenticated User Today, we’re going to dive into a fascinating topic in the realm of cybersecurity: Cross-Site Request Forgery, or CSRF for short. Have you ever wondered how malicious actors can exploit a user’s authenticated session to perform unauthorized actions on their behalf? That’s CSRF in action, and…",https://medium.com/bugbountywriteup/csrf-takedown-defeating-web-exploits-with-code-e13d2bfd9bc1?source=topics_v2---------203-84--------------------f5a32791_a156_41dd_ae6c_ecbeb71a6741-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SNGj2ADYpDG2-xApIa1UAw.png,cybersecurity 466,408,CVE-2023–23397 Report,“CVE-2023–23397 is a critical EoP vulnerability in Microsoft Outlook that is triggered when an attacker sends a message with an extended MAPI property with a UNC path to an SMB (TCP 445) share on a threat actor-controlled server on an untrusted network. No user interaction is required. …,https://medium.com/@m0lt3n/cve-2023-23397-report-ea36e6196494?source=topics_v2---------204-84--------------------f5a32791_a156_41dd_ae6c_ecbeb71a6741-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LRAUe5W71y9FIiwZMfiIaw.png,cybersecurity 467,423,10 Essential Skills Every Software Engineer Must Have in 2025,"Hello Folks! As a software engineer with 15 years of experience under my belt, I’ve seen firsthand rapid evolution of the industry. With each passing year, new technologies emerge, demanding fresh skills from developers. So, strap in and grab your favorite caffeinated beverage, because I’m about to unveil the top…",https://medium.com/@waqas-shami/10-essential-skills-every-software-engineer-must-have-in-2025-f7985e0bac67?source=topics_v2---------205-84--------------------f5a32791_a156_41dd_ae6c_ecbeb71a6741-------17,https://miro.medium.com/v2/resize:fill:140:140/0*c_DjsvVDlY8vcgfT,cybersecurity 468,107,A Comprehensive Guide to ADFGX Cipher Encryption | 2023,"Understanding the Key Features, Use Cases, and Limitations of ADFGX Cipher | Karthikeyan Nagaraj — Introduction: In the world of cryptography, the ADFGX cipher is a relatively uncommon yet powerful encryption technique. It was used by the German army in World War I to transmit sensitive information securely. In this article, we will explore the key features, strengths, weaknesses, and use cases of ADFGX cipher.",https://medium.com/@cyberw1ng/a-comprehensive-guide-to-adfgx-cipher-encryption-2023-204817bb723c?source=topics_v2---------206-84--------------------f5a32791_a156_41dd_ae6c_ecbeb71a6741-------17,https://miro.medium.com/v2/resize:fill:140:140/1*XmkKP4lpjVM0_3rUoRdrAQ.jpeg,cybersecurity 469,353,Happening Now: The Smooth Operator Attack,"How 3CX’s Trojanized App Threatens Organizations Worldwide — A targeted supply chain attack compromising 3CX’s voice and video-calling client leaves millions of users at risk. Here’s what you need to know. As a cybersecurity expert, I spend most of my time helping businesses stay ahead of the latest threats. In recent days, a new and sophisticated supply chain…",https://medium.com/@bartmcdonough/happening-now-the-smooth-operator-attack-943d44a9cc08?source=topics_v2---------207-84--------------------5e52874f_cfd1_4365_bdea_6e41bd256633-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DW9cgdjpgzi4NQqmzFUeRA.jpeg,cybersecurity 470,413,Strengthening Application Security: Best Practices for a Resilient Hybrid World,"Learn how to safeguard your organization’s applications in light of Cisco’s recent findings on global application security readiness. The recent Cisco report on application security readiness has highlighted significant vulnerabilities and shortcomings in organizations worldwide. As businesses continue to adopt digital transformation, it is essential to prioritize application security best…",https://medium.com/responsible-cyber/strengthening-application-security-best-practices-for-a-resilient-hybrid-world-44a755773dfb?source=topics_v2---------208-84--------------------5e52874f_cfd1_4365_bdea_6e41bd256633-------17,https://miro.medium.com/v2/resize:fill:140:140/1*AQyfTl7nn0yycPob-d3WOA.jpeg,cybersecurity 471,424,Try Hack Me / Active Directory Basics [Day 9],"Analysis Introducing the fundamental ideas and features of Active Directory. The Microsoft Active Directory is the cornerstone of the business world. It makes managing individuals and devices in a business context simpler. Objectives are to become knowledgeable about Active Directory and the following subjects: · Active Directory · Active Directory…",https://medium.com/@roop.semicolon/try-hack-me-active-directory-basics-day-9-d6f20f08bf48?source=topics_v2---------209-84--------------------5e52874f_cfd1_4365_bdea_6e41bd256633-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1HktYeDjg92wNcDhdY_biQ.png,cybersecurity 472,425,The RESTRICT Act’s Impact on Foreign Investment and National Security,"Picture this: A foreign entity with close ties to a foreign government invests in an American company, gaining access to sensitive information and communications technology. This may sound like the plot of a spy thriller, but it’s a genuine concern for national security experts. …",https://medium.com/gear-pro-gaming/the-restrict-acts-impact-on-foreign-investment-and-national-security-18bed8bc8e8c?source=topics_v2---------210-84--------------------5e52874f_cfd1_4365_bdea_6e41bd256633-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lCG5tGNHn3EAixGv,cybersecurity 473,426,BSides Lancashire Preview!,"Ooh by eck! We don’t do owt by halves this week! What do you mean “I’m from Brighton what you talking about, Dan”? We all get in touch with our inner Lancastrian this week as we head to BSides Lancashire at Lancaster University on Thursday 30th March! I am super…",https://medium.com/fitness-drinking-security-code/bsides-lancashire-preview-d95e9098f9d1?source=topics_v2---------211-84--------------------5e52874f_cfd1_4365_bdea_6e41bd256633-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,cybersecurity 474,427,Github dorks,GitHub dorks are specialized search queries that allow users to find repositories that contain specific types of information. Here are some examples of GitHub dorks that you can use to discover information: Filename search: You can use the “filename” search operator to search for specific file names within GitHub repositories…,https://medium.com/@firk/github-dorks-efdfc3e4d599?source=topics_v2---------212-84--------------------5e52874f_cfd1_4365_bdea_6e41bd256633-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,cybersecurity 475,428,Taylor Swift’s Terrible Ticketmaster Trouble And What Can Be Done To Prevent It From Happening Again,"Why couldn’t Swifties get tickets for Eras tour? Many people tried to buy tickets from Ticketmaster at the same time. Unfortunately alot of these people were scalpers. These scalpers used computer programs called bots to purchase tickets faster than fans could buy them. In fact, so many bots hit the site that it crashed. This left real fans…",https://medium.com/anti-bot-bot/taylor-swifts-terrible-ticketmaster-trouble-and-what-can-be-done-to-prevent-it-from-happening-7f616407edb0?source=topics_v2---------213-84--------------------5e52874f_cfd1_4365_bdea_6e41bd256633-------17,https://miro.medium.com/v2/resize:fill:140:140/0*AaePEhW3GZKlMjJw,cybersecurity 476,429,Get Ahead of Attacks with Microsoft Defender Threat Intelligence,"With sophisticated cyber-attacks on the rise, get detailed and current intel on trending attacks with Microsoft Defender Threat Intelligence. Enrich investigations and contain threats before they impact your organization with exclusive access to the same raw attack signals our Microsoft Researchers have. Easily gauge the severity of a threat and…",https://medium.com/@officegarageitpro/get-ahead-of-attacks-with-microsoft-defender-threat-intelligence-97e1d7e78034?source=topics_v2---------214-84--------------------5e52874f_cfd1_4365_bdea_6e41bd256633-------17,https://miro.medium.com/v2/resize:fill:140:140/1*mI2qKTQBm9Oh86boacXwBQ.png,cybersecurity 477,430,The Top 10 Vulnerabilities of 2022: Mastering Vulnerability Management,"In a world becoming more and more digital every day, it’s imperative to ensure the security of your digital assets. Vulnerability management is the practice of identifying, assessing, and prioritizing vulnerabilities in an organization’s digital infrastructure. It’s the process of proactively protecting those assets from potential threats. The need for…",https://medium.com/@strobeshq/the-top-10-vulnerabilities-of-2022-mastering-vulnerability-management-vulnerability-management-6c0f76ca6c23?source=topics_v2---------215-84--------------------5e52874f_cfd1_4365_bdea_6e41bd256633-------17,https://miro.medium.com/v2/resize:fill:140:140/0*NF1Fjja0qXJnLeON.png,cybersecurity 478,309,10 Best FREE DDoS Attack Tools Online (2023),"That Hackers Don’t Want You to Know About! — In the ever-evolving landscape of cybersecurity, Distributed Denial of Service (DDoS) attacks continue to pose a significant threat to businesses and organizations worldwide. With the increasing number of connected devices and the expanding reach of the internet, it has never been more critical to be aware of the tools that…",https://medium.com/datadriveninvestor/10-best-free-ddos-attack-tools-online-2023-a7a14b3592a6?source=topics_v2---------216-84--------------------5e52874f_cfd1_4365_bdea_6e41bd256633-------17,https://miro.medium.com/v2/resize:fill:140:140/1*bPtJROX0M9L6ZxPhtFptPQ.png,cybersecurity 479,431,My Journey to Nokia Hall of Fame in just 10 minutes,"Introduction Hi, this is Rajdip, and I hope all of you are doing well. As a cybersecurity enthusiast, I am always on the lookout for opportunities to find vulnerabilities and report them to companies. Recently, I came across a LinkedIn post where someone mentioned making it to the Nokia Hall…",https://medium.com/@rajdipdeysarkar7/my-journey-to-nokia-hall-of-fame-in-just-10-minutes-4869c78c37e7?source=topics_v2---------217-84--------------------0380602e_a63b_415d_a2a4_f3a5ecf6be18-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gsEiwKXNxd1UfVfIvPMlNg.jpeg,cybersecurity 480,265,SameSite Cookie Attack,"Breaking Through the SameSite: A Cookie Attack Vulnerability — Hello there! Have you ever heard of the term “cookies”? Not the sort you dip in milk, but the little pieces of information that websites employ to remember your preferences and login information. While cookies have made online browsing more easy, they are not entirely safe. I’ll explain what the…",https://medium.com/illumination/samesite-cookie-attack-cfd02d138852?source=topics_v2---------218-84--------------------0380602e_a63b_415d_a2a4_f3a5ecf6be18-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pxZtqEX3w8ZqC4xanNP3_g.jpeg,cybersecurity 481,432,Cloud computing and security,"Cloud computing security is a set of security measures that have been taken to protect cloud-based systems, data, and information. Cloud computing could be considered an advancement in modern ICT and very advantageous to us because we can not keep trust in the hardware. But if we are used to…",https://medium.com/bug-zero/cloud-computing-and-security-dda542527e8a?source=topics_v2---------219-84--------------------0380602e_a63b_415d_a2a4_f3a5ecf6be18-------17,https://miro.medium.com/v2/resize:fill:140:140/1*81Mf5Mkx7NNzZeHpLk0UHA.jpeg,cybersecurity 482,433,Brute Force Attack and How to Protect Our Data,"In the world of cybersecurity, a brute force attack is a type of cyber attack where an attacker tries every possible combination of characters to crack a password or encryption key. This type of attack is often used to gain unauthorized access to sensitive data or systems. …",https://medium.com/bug-zero/brute-force-attack-and-how-to-protect-our-data-7331af12fa2b?source=topics_v2---------220-84--------------------0380602e_a63b_415d_a2a4_f3a5ecf6be18-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hf0yMtIUBqDseLGKYNvlMw.png,cybersecurity 483,434,Are your online activities being monitored? What you need to know about Senate Bill 686,"Hola Medium! I wanted to share some information about Senate Bill 686 — The Restrict Act, also known as the American Jobs Plan Act of 2021, which is currently being considered by Congress. …",https://medium.com/@betmig.dev/are-your-online-activities-being-monitored-what-you-need-to-know-about-senate-bill-686-b24916c7af0f?source=topics_v2---------221-84--------------------0380602e_a63b_415d_a2a4_f3a5ecf6be18-------17,https://miro.medium.com/v2/resize:fill:140:140/1*U_PB_ihV90uT1o19Sd4KCQ.jpeg,cybersecurity 484,435,APTs and achieving homeostasis in the digital age,Reconnaissance is a technique where one uses different methods to gather useful information. This is the first step in the cybersecurity kill chain security model which is used for offensive and defensive measures. …,https://medium.com/@roxannainbytes/apts-and-achieving-homeostasis-in-the-digital-age-27878b4d1923?source=topics_v2---------222-84--------------------0380602e_a63b_415d_a2a4_f3a5ecf6be18-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,cybersecurity 485,436,Why Web Defacement Detection is Crucial for Your Business’s Online Security,"Web defacement is the malicious act of changing the content of a website without the owner’s permission. It can happen for a variety of reasons, including political agendas, personal grudges, or financial gain. Web defacement may be a major issue for enterprises, resulting in a loss of reputation, revenue, and…",https://medium.com/@vulfosec/why-web-defacement-detection-is-crucial-for-your-businesss-online-security-a6ad8a498849?source=topics_v2---------223-84--------------------0380602e_a63b_415d_a2a4_f3a5ecf6be18-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zu-zPHUkNTgTebFYgtqCpQ.png,cybersecurity 486,437,"The Corix Partners Friday Reading List — March 3, 2023","Top 10 Leadership and Management links of the week, curated by Corix Partners Founder and CEO JC Gaillard, focusing on cyber security of course, but also a large cross section of subjects including digital transformation, emerging tech, ESG governance and the future of work 5 Security Principles to Guide Your DevSecOps Journey 5 Security Principles to Guide Your DevSecOps Journey Building a DevSecOps initiative, no matter your budget, deployment environments or organization size, should be guided…thenewstack.io",https://medium.com/the-corix-partners-friday-reading-list/the-corix-partners-friday-reading-list-march-3-2023-a1af17e642b4?source=topics_v2---------224-84--------------------0380602e_a63b_415d_a2a4_f3a5ecf6be18-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JP95eWdDGjEjTlZBVH_PCg.jpeg,cybersecurity 487,438,"Higher Ed, Cyber threats and Zero Trust","“If we release your information, you will lose more than what we have demanded for”, wrote the ransomware hacker to the representative of a large Californian University. This was in the summer of 2020 and the University finally settled on an undisclosed ransom in exchange for the decryption key. Over…",https://medium.com/@pritesh.suvarna/higher-ed-cyber-threats-and-zero-trust-f9fd88277e9?source=topics_v2---------225-84--------------------0380602e_a63b_415d_a2a4_f3a5ecf6be18-------17,https://miro.medium.com/v2/resize:fill:140:140/1*UU_ouGOG2I7tV7CHyVcbUg.jpeg,cybersecurity 488,439,The POWER of Shodan : Shodan unrevealed,"What is Shodan? Shodan is a search engine like no other. Dubbed the “Google for hackers”, Shodan scans the internet for devices and systems that are connected to the internet, allowing users to see information that would otherwise be hidden. …",https://medium.com/@falkensmaze/the-power-of-shodan-shodan-unrevealed-ac453cafe855?source=topics_v2---------226-84--------------------0380602e_a63b_415d_a2a4_f3a5ecf6be18-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Cl1_bu25_RRkxiSP.png,cybersecurity 489,228,ChatGPT detects Vulnerabilities in NPM and Python packets,"How Security Software Vendor Socket uses OpenAI’s Chatbot to examine Packets — It was already recently reported that OpenAI wants to make its Chat GPT better for programming. Now, another interesting news has surfaced because apparently, ChatGPT can also be used in the area of cyber security. OpenAI wants to massively upgrade Programming Skills of its AI Good News for all Programmers when working with ChatGPT?medium.com",https://medium.com/codex/chatgpt-detects-vulnerabilities-in-npm-and-python-packets-2156aeafc6d6?source=topics_v2---------227-84--------------------b9c611e0_fd9f_487a_a89a_4e3056168b16-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Lcdk_grT51lL8DGq8MkEHA.jpeg,cybersecurity 490,440,A Security Leadership Creed,"Rules for Security Professionals To Live (and Die) By — What makes a good Security Leader? Certainly getting an award for security leadership is a dubious honor at best (if you must pay to get an award, do you deserve the award?). Being judged as a “good” leader is often left to the people who work near the leader —…",https://medium.com/@hpatton/a-security-leadership-creed-febdb696ace4?source=topics_v2---------228-84--------------------b9c611e0_fd9f_487a_a89a_4e3056168b16-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ntOG12yV_HZEZTqM,cybersecurity 491,441,Integrating A.I. into Security Operations,In March of 2023 I spent many long nights integrating A.I. LLM models into a WebApp I had created for OSINT and alert triage. The general idea was that a SOC analyst could import an unformatted log entry straight from sentinel and immediately start using the OpenAI davinci-003 model via…,https://medium.com/@hackbynight/integrating-a-i-into-security-operations-ba1fedbe650?source=topics_v2---------229-84--------------------b9c611e0_fd9f_487a_a89a_4e3056168b16-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7Ztb1nxQ6CxuN3EZQp6VDg.png,cybersecurity 492,271,Open Reverse Shell Creator,"Introduction Welcome to this new article, today I am going to show you how to use a web page that I have just programmed, this project is done focusing on JavaScript, which is the language in which I am focusing on learning right now, so the HTML is very basic and…",https://medium.com/@s12deff/open-reverse-shell-creator-b5b04054f4ae?source=topics_v2---------230-84--------------------b9c611e0_fd9f_487a_a89a_4e3056168b16-------17,https://miro.medium.com/v2/resize:fill:140:140/0*RO82cjJ0p61tJRxG.jpg,cybersecurity 493,442,Subdomain TakeOvers methodology by Aakash Rathee.,"Introduction: As technology continues to evolve and expand, so too do the security risks that come with it. One such vulnerability that has been gaining attention in recent years is subdomain takeover. Hi, I’m Aakash Rathee, a Security Engineer III at Esper, with a focus on vulnerability management and Application Security…",https://medium.com/@aakashrathee69/subdomain-takeovers-by-iamaakashrathee-12512fc8d9ce?source=topics_v2---------231-84--------------------b9c611e0_fd9f_487a_a89a_4e3056168b16-------17,https://miro.medium.com/v2/resize:fill:140:140/0*s-vM133X11-BtXpw.png,cybersecurity 494,443,Application Secrets Handling in a Kubernetes Environment,I had the “pleasure” of working with Kubernetes for the past week and had to think about how to go about sharing credentials with containerised services. It probably won’t come as a surprise that I had a look at the CIS Kubernetes Benchmark (v1.6.0). What may be more interesting is…,https://medium.com/@zsolt.imre/application-secrets-handling-in-a-kubernetes-environment-394c2d95ffe1?source=topics_v2---------232-84--------------------b9c611e0_fd9f_487a_a89a_4e3056168b16-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PMDLbnsjKXXJVcVDsTeHCA.png,cybersecurity 495,2,Lesson 8: Stealing VPN Accounts with Malware — Top 4 Popular + Source-Codes,"👾 Malware Development Series by XIT (C#) — Below is the Topics List for Lesson 8: 8. VPN Accounts Theft: ⇢ NordVPN ⇢ WindscribeVPN ⇢ ProtonVPN more… (ExpressVPN) Many people and companies use virtual private networks (VPNs) to safeguard their online security and privacy. Credentials for VPN accounts make excellent targets for attackers looking to access sensitive information…",https://medium.com/@x-it/lesson-8-stealing-vpn-accounts-with-malware-top-4-popular-source-codes-9dbef09eed82?source=topics_v2---------233-84--------------------b9c611e0_fd9f_487a_a89a_4e3056168b16-------17,https://miro.medium.com/v2/resize:fill:140:140/0*z25OCDdGjwqdL8jr.png,cybersecurity 496,444,OneNote Supply Chain Phishing | Abusing Trust Through BEC,"In recent weeks, OneNote phishing campaigns have been creeping up time and time again and no doubt you’ve already seen your fair share of these articles by now. …",https://medium.com/@TI.Joe/onenote-supply-chain-phishing-abusing-trust-through-bec-1744b0e527aa?source=topics_v2---------234-84--------------------b9c611e0_fd9f_487a_a89a_4e3056168b16-------17,https://miro.medium.com/v2/resize:fill:140:140/1*NN-0KxynXVD0z8KmOr58wg.png,cybersecurity 497,445,Android Application Testing Approach and Common Attacks/Tools,"Android penetration testing is finding security flaws and vulnerabilities in an Android mobile application or device to ensure its protection. This testing aims to mimic assaults that a hacker may employ to take advantage of the programme or device and steal sensitive data, jeopardise user privacy, or carry out illegal…",https://medium.com/@ravi73079/android-application-testing-approach-and-common-attacks-bed96611db07?source=topics_v2---------0-84--------------------9f254799_3671_4aa4_823b_96d72b6c1c76-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,information-security 498,446,Identity Is a Co-owned Problem Between Security and IT,"Who owns identity at your organization? Identity is currently seen as an IT problem in most organizations. IT owns most of the identity stack (e.g., Okta, Sailpoint, etc.), and security usually has a subteam that interfaces with IT, which can lead to a disjointed identity management process. For example, security can get hit with compliance needs…",https://medium.com/crosswire-security/identity-is-a-co-owned-problem-between-security-and-it-1a7636f34937?source=topics_v2---------3-84--------------------9f254799_3671_4aa4_823b_96d72b6c1c76-------17,https://miro.medium.com/v2/resize:fill:140:140/1*KS3W7tmxpxcoXkgZZ1TqDA.png,information-security 499,447,Discover the Freedom and Security of Atlas VPN: The Ultimate Solution for Protecting Your Online Activity,"“Explore the Benefits of Atlas VPN: Secure Your Online Privacy, Access Any Content, and Enjoy Unlimited Data Usage Today!” — Are you tired of feeling like someone is constantly watching over your shoulder while you browse the internet? Do you want the freedom to access any content you want, from anywhere in the world? Look no further than Atlas VPN! With its top-notch security features, unlimited data usage, and commitment…",https://medium.com/@ammarkara1004/discover-the-freedom-and-security-of-atlas-vpn-the-ultimate-solution-for-protecting-your-online-d758c36b05cd?source=topics_v2---------9-84--------------------9f254799_3671_4aa4_823b_96d72b6c1c76-------17,https://miro.medium.com/v2/resize:fill:140:140/1*lYIotvEB8qyPv377RfRJrQ.png,information-security 500,448,Stocker — Hack The Box,"In this writeup, we will solve a box on hackthebox called Stocker. , we will solve a box on hackthebox called Stocker. Nmap Scan nmap -sC -sV -Ao nmap/stocker 10.10.11.196",https://medium.com/dev-genius/stocker-hack-the-box-1a90072f9f44?source=topics_v2---------10-84--------------------6deabb3c_c97e_4144_88d6_437fa148e117-------17,https://miro.medium.com/v2/resize:fill:140:140/0*fP54CF8nHuIQNzO9.png,information-security 501,449,Peter Allor of Red Hat Joins CVE Board,"The CVE Program is pleased to welcome Peter Allor of Red Hat, Inc. as the newest member of the CVE Board. Peter will provide the Board with an open-source community perspective and help enhance collaboration between the CVE Program and that community. About Peter Peter is the Director for Red Hat Product…",https://medium.com/@cve_program/peter-allor-of-red-hat-joins-cve-board-6c2ef521aaf2?source=topics_v2---------12-84--------------------6deabb3c_c97e_4144_88d6_437fa148e117-------17,https://miro.medium.com/v2/resize:fill:140:140/0*A26fKMsNBkifbGnC.jpg,information-security 502,450,Industry specific DWH architecture,"Abstract There are a lot of advices and best practices, then it comes to company DWH but not much when you try to design DWH that is used by a lot of competing companies. You can find some difficulties with information security, ingesting and validating data, etc. This article is not…",https://medium.com/@pruntoff/industry-specific-dwh-architecture-dbb90f503098?source=topics_v2---------13-84--------------------6deabb3c_c97e_4144_88d6_437fa148e117-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wwASY-wF2hkD47KJoUldpg.png,information-security 503,451,Can AI empowered open source tools compete with their premium counterparts? (Guest Blog),"Thank you for allowing me to be a guest on the Dispareo Security blog! My name is Sam Wallace and I am currently a Staff AppSec engineer, veteran, security researcher and security professional with a strong passion for software development, automation and tinkering with technologies. You can find me here: …",https://medium.com/@dispareo/can-ai-empowered-open-source-tools-compete-with-their-premium-counterparts-guest-blog-9683c3df71e5?source=topics_v2---------14-84--------------------6deabb3c_c97e_4144_88d6_437fa148e117-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6DOzlTPmtg64fbbhC0FNXg.png,information-security 504,272,"InfoSecSherpa’s News Roundup for Tuesday, March 28, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — Walsall Healthcare NHS Trust dealing with a cyber attack (Teiss, March 28th) Europol warns cops to prep for malicious AI abuse (Computer Weekly, March 28th) Inside The Shadowy World Of Iranian Cyber Espionage Group APT33 (Forbes, March 28th) Nigerian man imprisoned for four years over $1m cyber-fraud in US (The Street…",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-tuesday-march-28-2023-f66a597eff67?source=topics_v2---------15-84--------------------6deabb3c_c97e_4144_88d6_437fa148e117-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DoYVe2ws7Ss39ej-vo7fSA.jpeg,information-security 505,429,Automatically Classify & Protect Documents & Data,"Microsoft Purview Information Protection Discover, classify, and protect sensitive information automatically, wherever it lives or travels with Microsoft Purview Information Protection. Built-in protections follow documents on mobile, in the browser, or as you coauthor them, with no add-ins required. Policy tips keep end users compliant without compromising productivity. Tony Themelis, Principal Program Manager for…",https://medium.com/@officegarageitpro/automatically-classify-protect-documents-data-8e9b44f0280d?source=topics_v2---------16-84--------------------6deabb3c_c97e_4144_88d6_437fa148e117-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Kf0e1Vl93NApsO3DBDcVug.png,information-security 506,452,🔒💻🌩️ The Importance of Multi-Factor Authentication in Cloud Security 🌩️💻🔒,"As more businesses and organizations move their data and operations to the cloud, the need for robust security measures becomes more critical. While cloud computing provides many benefits, such as scalability, cost savings, and accessibility, it also poses unique security challenges. One of the most effective ways to protect your…",https://medium.com/@menitasa/️-the-importance-of-multi-factor-authentication-in-cloud-security-️-13ca20b41bf2?source=topics_v2---------17-84--------------------6deabb3c_c97e_4144_88d6_437fa148e117-------17,https://miro.medium.com/v2/resize:fill:140:140/1*W1K3chRuymBlbTtVe5nAig.png,information-security 507,453,7 Essential Tips for Securing Your PC Laptop from Cyber Attacks,"In today’s digital age, cybersecurity has become a critical concern for individuals and businesses alike. Cyber attacks can take many forms, from viruses and malware to phishing scams and ransomware. These attacks can cause significant financial and reputational damage, and can even lead to identity theft or other serious consequences…",https://medium.com/@Theshahid/7-essential-tips-for-securing-your-pc-laptop-from-cyber-attacks-989c3932226d?source=topics_v2---------18-84--------------------6deabb3c_c97e_4144_88d6_437fa148e117-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JxOu7l4Z4G2N6Yrxwdt-pw.png,information-security 508,454,Wazuh and Chainsaw integration for near real time SIGMA detection,"Integrate Wazuh and Chainsaw to integrate SIGMA rules with your Wazuh stack Intro In today’s world, it’s more important than ever to have effective threat detection mechanisms in place. …",https://medium.com/@socfortress/wazuh-and-chainsaw-integration-for-near-real-time-sigma-detection-6f3e729e892?source=topics_v2---------19-84--------------------0630655e_872d_41c1_abc5_487a67861c3c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9ljWLmbIWL38znQzTKu7Aw.png,information-security 509,452,The Magic of Certificates and Digital Signatures: A Story for Little Tech Explorers,"Once upon a time, in a world full of computers and smartphones, there was a magical tool called the Internet. People could send messages, share pictures, and talk to each other from far, far away. …",https://medium.com/@menitasa/the-magic-of-certificates-and-digital-signatures-a-story-for-little-tech-explorers-21ffd54aa570?source=topics_v2---------20-84--------------------0630655e_872d_41c1_abc5_487a67861c3c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CSKSkIPXmDwupeXkkkt8oA.png,information-security 510,455,OpenAI’s CHATGPT ATO Writeup,"Hello InfoSec Community, this is my first writeup and I am here with a technical breakdown of the vulnerability which was found in OpenAI’s ChatGPT. The vulnerability was Web Cache Deception. …",https://medium.com/@rohanroy_66407/openais-chatgpt-ato-writeup-ce5d5284aa5c?source=topics_v2---------21-84--------------------0630655e_872d_41c1_abc5_487a67861c3c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,information-security 511,456,2023 PWK Exercises and Bonus Points,"As you may have heard OffSec announced an update to their OSCP exam, PWK training material, and their bonus point exercises. If you haven’t read about the changes yet, you can check it out here: PEN-200 (PWK) 2023 Update | OffSec. With all the confusion and chaos from the change…",https://medium.com/@sl33per/2023-pwk-exercises-and-bonus-points-b1e39ba24b7a?source=topics_v2---------22-84--------------------0630655e_872d_41c1_abc5_487a67861c3c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*NoYxh7QXZrV9JSRfaM97TQ.jpeg,information-security 512,457,The Ultimate XSS PoC with ChatGPT-4 🎯,"XSS to Demonstrate Stealing Cookies, Local Storage, and Page Content Generated with ChatGPT-4 🤖 — Welcome, fellow vulnerability hunters! Today, we’re going to explore a simple yet powerful way to demonstrate Cross-Site Scripting (XSS) vulnerabilities using a Proof of Concept (PoC) generated with ChatGPT model GPT-4. Get ready to level up your ethical hacking skills! Step 1: The Prompt 📝 Let’s start with a killer prompt that’ll set the foundation…",https://medium.com/bugbountywriteup/the-ultimate-xss-poc-with-chatgpt-4-2be606a13a2e?source=topics_v2---------23-84--------------------0630655e_872d_41c1_abc5_487a67861c3c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ajayw6Q5h7LXUzaz0FNTdw.png,information-security 513,458,Stay Ahead of the Curve: The Security Implications of Artificial Intelligence,"During a keynote presentation, Jensen Huang, the current CEO of NVIDIA, compared the current state of artificial intelligence (AI) to the revolutionary impact that smartphones had on communication and technology. Huang’s reference to the “iPhone moment of AI” highlights the growing accessibility, usage, and integration of AI into our daily…",https://medium.com/@Absolute_Z3r0/stay-ahead-of-the-curve-the-security-implications-of-artificial-intelligence-69ebb903329?source=topics_v2---------24-84--------------------0630655e_872d_41c1_abc5_487a67861c3c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*BOx9mjLKJezFdQFm,information-security 514,272,"InfoSecSherpa’s News Roundup for Monday, March 27, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — Superannuation fund NGS Super hit by cyber attack, ‘limited data’ taken from its system (Australia Broadcasting Corporation, March 27th) US military needs 7th branch just for cyber, current and former leaders say (The Record by Recorded Future, March 27th) What’s happening with the Latitude Financial cyber attack? Millions of customer…",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-monday-march-27-2023-4121a4a7794e?source=topics_v2---------25-84--------------------0630655e_872d_41c1_abc5_487a67861c3c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*IybaKnxnj7_5jvCxRSO3CA.jpeg,information-security 515,459,Efficient SIEM and Detection Engineering in 10 steps,"SIEM systems and detection engineering are not just about data and detection rules. Planning and processes are becoming increasingly important over time. In 10 steps, you will learn how to approach detection in cybersecurity efficiently. 1. Just start If you have ever been programming, you will certainly be familiar with software engineering. We…",https://medium.com/@maciejszymczyk/efficient-siem-and-detection-engineering-in-10-steps-c82402a70dbd?source=topics_v2---------26-84--------------------0630655e_872d_41c1_abc5_487a67861c3c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*huZe7f-tlwV-NNPV.jpg,information-security 516,422,How to Implement a Cyber Incident Response Plan for Healthcare,"In today’s digital landscape, healthcare organizations must be prepared to prevent and respond if a security breach or data incident occurs. An incident response plan (IRP) is essential for organizations to protect themselves and their data during a data breach. Developing an effective IRP requires understanding the 6 phases of…",https://medium.com/@jeremiahtalamantes/how-to-implement-a-cyber-incident-response-plan-for-healthcare-a7fbd48d6f9d?source=topics_v2---------27-84--------------------0630655e_872d_41c1_abc5_487a67861c3c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*QbvX1DovW_9wGdlS,information-security 517,460,Get Ahead of the Game: Using Innovative Techniques to Impersonate Wireless APs with Wifi Honey!,I had some time recently to experiment further with some tools in Kali Linux which I hadn’t previously used. …,https://medium.com/@nik.kraljevic/get-ahead-of-the-game-using-innovative-techniques-to-impersonate-wireless-aps-with-wifi-honey-772b1f77bdc7?source=topics_v2---------28-84--------------------db2e87df_d3a8_4e61_a1be_c3589a6825d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*r2lsngTwMN1zWACGAwd4dQ.png,information-security 518,461,A Digital Age: Observations from 38 Thousand Feet,This blog is actually being written when I’m supposed to be on a Break I’m 38840 feet in the air and I’m on a long hall flight. ( the other half is looking at me with that look but hey it’s a long flight !!!) …,https://medium.com/@ThatThreatGuy/a-digital-age-observations-from-38-thousand-feet-2c8ddd320aca?source=topics_v2---------29-84--------------------db2e87df_d3a8_4e61_a1be_c3589a6825d8-------17,https://miro.medium.com/v2/resize:fill:140:140/0*U3PLIezkb1SGs_-L,information-security 519,462,The Age Of Cognitive Security Is Here,"I couldn’t help it! Like the many digital native and nomads, watching policy unfold in front of our eyes was something to behold over the past few days. …",https://medium.com/@blockchain.sopo/the-age-of-cognitive-security-is-here-6f31f38a3308?source=topics_v2---------30-84--------------------db2e87df_d3a8_4e61_a1be_c3589a6825d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zgcaGb5vQr0FfTJOoF9knA.jpeg,information-security 520,463,Storing Information with Spins: Creating New Structured Spin States with Spatially Structured Polarized Light,"Researchers generate a vector vortex light beam and imprint its spatial structure on to spins inside a semiconductor solid Spin, a quantum property of particles, can be controlled using light waves to store information. This is conventionally achieved using a uniformly polarized light beam. Recently, researchers from Japan successfully generated…",https://medium.com/@tokyouniversityofscience/storing-information-with-spins-creating-new-structured-spin-states-with-spatially-structured-d4cbc31594c5?source=topics_v2---------31-84--------------------db2e87df_d3a8_4e61_a1be_c3589a6825d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OqjN-a5xwtMs7KMmgFoQeA.png,information-security 521,272,"InfoSecSherpa’s News Roundup for Saturday, March 25, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — Maritime students gear up to fight high-seas cyberattacks (Popular Science, March 25th) Cyber breach affects postal service workers in Jacksonville (Florida) (WNCT 9, March 24th) 5 Louisiana colleges shut down internet after security threat (Louisiana Illuminator, March 25th) Pwn2Own Hackers Breach a Tesla (Twice), Earn $350K and a Model 3 (PC…",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-saturday-march-25-2023-9506af690971?source=topics_v2---------32-84--------------------db2e87df_d3a8_4e61_a1be_c3589a6825d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*bg0t-8XI904LZ_kDcTUMdw.jpeg,information-security 522,464,Finding Initial Access on a real life Penetration Test,"On a recent internal Penetration Test I was faced with the above scenario and had to work a little harder for Domain Admin. So finding initial access. What do we need to do.. as a rule we will need one of 2 things: a) Something vulnerable b) Credentials Putting Red…",https://medium.com/@warrenbutterworth/finding-initial-access-on-a-real-life-penetration-test-86ed5503ae48?source=topics_v2---------33-84--------------------db2e87df_d3a8_4e61_a1be_c3589a6825d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6_Tk2ST3JGz1ErL_O-__6A.png,information-security 523,465,Spoofing MAC address automatically while keeping anonymity.,"Spoofing MAC address automatically while keeping anonymity. In this article, we will consider how to change (change, spoof) the MAC address on your Linux computer, as well as how to use different tools for the automatic replacement of the MAC address. Why you need to change the MAC address ? The MAC address is (should be) unique…",https://medium.com/@azadmammadov/spoofing-mac-address-automatically-while-keeping-anonymity-a799228d5cbf?source=topics_v2---------34-84--------------------db2e87df_d3a8_4e61_a1be_c3589a6825d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Snkitz2fVzItk4qYZvj40A.jpeg,information-security 524,466,Cybersecurity 🔐 And Much More Newsletter 📪 Vol. 3 Num. 12,"Greetings, friends. 👋 📫 Welcome to my newsletter, if you have not yet subscribed, please do so 🥹. It might include books📚, articles ✍️, tech 💻, tips💡, and cool stuff about cybersecurity 🔒. Enjoy! What’s Happening 🚨 Three Must-Reads from CISA 🪪 CISA and NSA Release Identity and Access Management Guidance The US Cybersecurity and Infrastructure Agency…",https://medium.com/@seif-hateb/cybersecurity-and-much-more-newsletter-vol-3-num-12-c30e0c77a4ec?source=topics_v2---------35-84--------------------db2e87df_d3a8_4e61_a1be_c3589a6825d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9HXabNAU2_f9jh2SpVSv7Q.png,information-security 525,467,But First … Classification,"Security leaders should start with classification guidance when they write or re-write security policy. If you are starting to use my advice to write security policy that works, the task can be daunting. Frameworks like ISO 27001 and the HITRUST CSF call for policy on dozens of topics ranging from…",https://medium.com/@reikel/but-first-classification-d31d64c56674?source=topics_v2---------36-84--------------------db2e87df_d3a8_4e61_a1be_c3589a6825d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*u8s4ySOA217uqewJjt6taw.png,information-security 526,452,"Shaken, Not Stirred: The Art of Securely Sharing Files with External Customers.","A thrilling and witty guide to keeping your files under lock and key. Picture this: You're a top security professional, a modern-day digital Bond, armed with your trusty gadgets - keyboard, mouse, and an encrypted USB drive. Your mission, should you choose to accept it, is to securely share files with external customers without compromising your data's integrity. But worry not, for we…",https://medium.com/@menitasa/shaken-not-stirred-the-art-of-securely-sharing-files-with-external-customers-33a12d857c64?source=topics_v2---------37-84--------------------db2e87df_d3a8_4e61_a1be_c3589a6825d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*GggoiJ7Z81fJbQa6dr5W5A.png,information-security 527,272,"InfoSecSherpa’s News Roundup for Friday, March 24, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — United Kingdom’s National Crime Agency sting operation infiltrates cyber crime market (Computer Weekly, March 24th) Cyber Week in Review: March 24, 2023 (Council on Foreign Relations, March 24th) Export Control is Not a Magic Bullet for Cyber Mercenaries (Lawfare, March 24th) Sobeys parent company reeling from cyber attack (Supermarket News, March…",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-friday-march-24-2023-22d33d758906?source=topics_v2---------30-84--------------------dba7d790_6133_4389_a08d_5a915e218569-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wk3rdP2V9jaGw1BsecgIGQ.jpeg,information-security 528,468,Top five Cyber Threat Intel stories of the week: 03/20 to 03/24/2023,"Top 5 general threat intelligence stories of the week. This is from TLP white/open-source websites, so please feel free to share and enjoy reading about these events. Please reach out if you have any questions! Thank you! General Worldwide activity: 1st: More Clop GoAnywhere attack victims emerge and New victims come forward after mass-ransomware attack Overview: Major Canadian financing firm Investissement Qubec became the latest company to confirm…",https://medium.com/hunter-strategy/top-five-cyber-threat-intel-stories-of-the-week-03-20-to-03-24-2023-4389ff5fb33f?source=topics_v2---------31-84--------------------dba7d790_6133_4389_a08d_5a915e218569-------17,https://miro.medium.com/v2/resize:fill:140:140/0*EopsjlDCsk6eSG6s,information-security 529,469,Shellshock attack write-up: Letsdefend challenge.,"What is Shellshock? A 30 year old vulnerability in the Bash command-line interface shell called “Shellshock” was identified as a serious threat in 2014. Shellshock is still a threat to corporate world. Shellshock is a critical vulnerability due to the escalated privileges afforded to attackers, which allow them to compromise…",https://medium.com/system-weakness/shellshock-attack-write-up-letsdefend-challenge-145cf0657097?source=topics_v2---------32-84--------------------dba7d790_6133_4389_a08d_5a915e218569-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ODUmguH7LEJBPxHne1gvgA.png,information-security 530,272,"InfoSecSherpa’s News Roundup for Thursday, March 23, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — German and South Korean Agencies Warn of Kimsuky’s Expanding Cyber Attack Tactics (The Hacker News, March 23rd) House cyber panel looks at CISA in first oversight hearing with new chairman (The Washington Post, March 23rd) GRS Roadstone warns staff following cyber attack (Construction Enquirer, March 23rd) Rio Tinto says staff’s…",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-thursday-march-23-2023-71c3006fd369?source=topics_v2---------33-84--------------------ea490c11_dc16_4e22_8634_b33830ffb12c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*c3SHIBfqXCZrvyuMBxYoNw.jpeg,information-security 531,470,"CNAPP — Finally Defined! A Briefing for Security Pros, CISOs, and Aspiring CISOs","Straight from Jack’s Desk — Technology Evangelist at Uptycs TL;DR A CNAPP, or cloud native application protection platform, is a suite of software functions (tools) that specifically targets public cloud (e.g., AWS, GCP, Azure) deployments. It presents itself in a seamless user interface. A single user interface? It’s all about engagement. Gartner has declared: a CNAPP is for the people…",https://medium.com/@sirjackery/cnapp-finally-defined-a-briefing-for-security-pros-cisos-and-aspiring-cisos-d8dcd14e9597?source=topics_v2---------34-84--------------------ea490c11_dc16_4e22_8634_b33830ffb12c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,information-security 532,471,How to Hunt/Exploitation of Host Header Injection by kidnapshadow,"Hey guys, This side kidnapshadow (Sidharth) Right now, I am explaining background concept about host header injection , and I give you practical demonstration about host header injection . so stay tuned with my blog. What is Host Header Injection :- Host Header Injection The HTTP host…",https://medium.com/@kidnapshadow/how-to-hunt-exploitation-of-host-header-injection-by-kidnapshadow-44295cd3c0e9?source=topics_v2---------35-84--------------------4748a69e_5793_4c66_9153_ab9eaf12bde3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,information-security 533,472,GRC Series: Data Protection Regulations and Privacy Laws Around The Globe,"In the digital age, data is more valuable than ever before, making it a prime target for cyber-criminals. To protect sensitive information, governments and regulatory bodies around the world have implemented data protection regulations. …",https://medium.com/@umarfarouk037/grc-series-data-protection-regulations-and-privacy-laws-around-the-globe-a1e84ca26ed8?source=topics_v2---------36-84--------------------4748a69e_5793_4c66_9153_ab9eaf12bde3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Q-zFz-5kQYG_dAqC3LiORw.jpeg,information-security 534,473,SSL Certificate Pinning Bypass — The Manual Approach!,"Originally written during April 2021 Hello Readers, Today, we are going to dwell into my research that was put to overcome SSL Pinning on a Java Thick Client, in order to intercept its traffic!! We will start from the basics of certain theory part and then to the actual practical…",https://medium.com/@yobroda/ssl-certificate-pinning-bypass-the-manual-approach-6693f88439b?source=topics_v2---------37-84--------------------4748a69e_5793_4c66_9153_ab9eaf12bde3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gk_-oSoRG-EkAXb_Igou-A.png,information-security 535,272,"InfoSecSherpa’s News Roundup for Wednesday, March 22, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — Health-ISAC Releases Annual Report on Current and Emerging Cyber Threats to Healthcare (Accesswire, March 22nd) Government launches seven-year NHS cyber strategy (Computer Weekly, March 22nd) Winning the Cyber-Physical Battle in OT Security (Automation, March 22nd) Landmark UK-Israeli agreement to boost mutual cybersecurity development, tackle shared threats (CSO, March 22nd)",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-wednesday-march-22-2023-6ab9b925fe9a?source=topics_v2---------38-84--------------------4748a69e_5793_4c66_9153_ab9eaf12bde3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*s_Kh615T4w3U-ShSXf0s6w.jpeg,information-security 536,286,A Game-Changing Tool for Bug Bounty Hunters and Security Researchers,"In the ever-evolving landscape of cybersecurity, staying ahead of threats requires utilizing advanced tools and techniques. One such tool, Nuclei, has emerged as a game-changer for bug bounty hunters and security researchers alike. Developed by ProjectDiscovery, Nuclei is an efficient and customizable vulnerability scanner that has gained significant traction in…",https://medium.com/bugbountywriteup/a-game-changing-tool-for-bug-bounty-hunters-and-security-researchers-96b8134fed3e?source=topics_v2---------39-84--------------------4748a69e_5793_4c66_9153_ab9eaf12bde3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*41rjhTCZIW0lZR-IPyPRxA.png,information-security 537,454,Automating Phishing Detection and Removal in Your Organization with the SOCFortress SIEM,"FREE Phishing Detection Platform Introduction Phishing attacks have become one of the most common methods used by cybercriminals to infiltrate organizations and steal sensitive information. They are often carried out through emails, where attackers attempt to trick users into giving away their credentials or installing malware. The impact of such…",https://medium.com/@socfortress/automating-phishing-detection-and-removal-in-your-organization-with-the-socfortress-siem-291357ace250?source=topics_v2---------40-84--------------------4748a69e_5793_4c66_9153_ab9eaf12bde3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qjnRHT6OHtGdp7OkER88Og.png,information-security 538,474,Use Searching Engines to Hunt For Threat Actors,"Background Hi folks, today, I’d like to discuss how to leverage search engines to identify vulnerable servers used by threat actors. These actors often employ multiple servers for various purposes, such as phishing infrastructure, command and control (C2) infrastructure, and tool/payload servers. Due to poor operational security (OPSEC) or budget constraints…",https://medium.com/@gustavshen/use-searching-engines-to-hunt-for-threat-actors-74be52976e9f?source=topics_v2---------41-84--------------------4748a69e_5793_4c66_9153_ab9eaf12bde3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*NKtOjILKOZjz08p-PLaV4g.png,information-security 539,475,The 6 UGLY TRUTHS about Security Certifications,"Here we are again, with yet another (possibly) controversial topic. This time is about security certifications. Regardless if you are in Cloud security, Forensics, Governance, Offensive Security, etc. at some point you may have felt the pressure to obtain the most sophisticated, the latest, and the very “best” of security…",https://medium.com/@sohassarode/the-6-ugly-truths-about-security-certifications-5d499a15cffa?source=topics_v2---------42-84--------------------4748a69e_5793_4c66_9153_ab9eaf12bde3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*VhboEa1vuzVpp4ia,information-security 540,476,5 Cybersecurity Myths & How to Overcome Them,"Now isn’t the time to fall for cybersecurity myths! Today’s digital landscape makes it more important than ever for organizations and individuals to protect themselves against the most common types of threats. Unfortunately, a handful of cybersecurity misconceptions are still holding too many people back from taking the necessary action to…",https://medium.com/@jetico-software/5-cybersecurity-myths-how-to-overcome-them-ca4c0b954e9b?source=topics_v2---------43-84--------------------4748a69e_5793_4c66_9153_ab9eaf12bde3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*PDDxFbRdgnBuuvJx,information-security 541,272,"InfoSecSherpa’s News Roundup for Monday, March 20, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — Mastercard strengthens customer security with new AI ‘Cyber Shield’ (MasterCard, March 20th) Cyber-physical oil spill monitoring and detection for offshore petroleum risk management service (Nature/Scientific Reports, March 20th) New Cyber Platform Lab 1 Decodes Dark Web Data to Uncover Hidden Supply Chain Breaches (The Hacker News, March 20th)",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-monday-march-20-2023-2ab37f6f9311?source=topics_v2---------44-84--------------------4748a69e_5793_4c66_9153_ab9eaf12bde3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*VurHzP0fDVTkP5PT,information-security 542,477,A Comprehensive Look at Email Security,"It is a well known fact that adversaries leverage from email based attacks for different purposes such as, gain a foothold in victim’s network, credential harvesting and so on. We also can see that there are wonderful improvements on the defensive side to build comprehensive defensive security strategies. …",https://medium.com/@akinhamdi/a-comprehensive-look-at-email-security-e5d1708ff907?source=topics_v2---------45-84--------------------2a22dd48_1ceb_4eeb_97f5_2ef27c5d672c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Nx-AE-MieDw0mxAe4htRvQ.png,information-security 543,452,Top 10 Challenges Faced by IT Managers and How to Overcome Them,"Information Technology (IT) managers are responsible for overseeing the planning, implementation, and maintenance of an organization’s technology infrastructure. They are responsible for ensuring that the technology used in the organization is efficient, secure, and meets the needs of the business. …",https://medium.com/@menitasa/10-common-it-manager-issues-and-how-to-solve-them-79210d0f481d?source=topics_v2---------46-84--------------------2a22dd48_1ceb_4eeb_97f5_2ef27c5d672c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ilufRs-IJj4vuw7CmO_DCw.png,information-security 544,478,The InfoSec Color Wheel,"Most cybersecurity professionals have heard about red and blue teams. But did you know that there are others? In this article, we will explore the InfoSec color team structure, the different teams involved, and how they interact with one another to produce full security coverage. The image below displays the…",https://medium.com/@dancovic/the-infosec-color-wheel-7e52fd822ae4?source=topics_v2---------47-84--------------------2a22dd48_1ceb_4eeb_97f5_2ef27c5d672c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1RZFTdej0fO-sk1o1novgw.png,information-security 545,479,How Cybersecurity Can Help the Growth of African Tech Startups,"Africa’s tech startup scene is rapidly growing, with innovative businesses emerging across the continent. However, as technology becomes more pervasive, so do the risks associated with it. Cybersecurity threats are on the rise, and African tech startups are not immune. In fact, they may be more vulnerable due to a…",https://medium.com/@fezzantafrica/how-cybersecurity-can-help-the-growth-of-african-tech-startups-b300cbde436a?source=topics_v2---------48-84--------------------2a22dd48_1ceb_4eeb_97f5_2ef27c5d672c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*KNS17VzOLA-ugOVaWAmCPA.jpeg,information-security 546,422,Log It or Lose It: The Critical Role of Logging in Application Security,Securing valuable information and systems is paramount to the success of any organization. One vital aspect of information security that often needs to be more appreciated is comprehensive application and security logging. …,https://medium.com/mitigated-io/log-it-or-lose-it-the-critical-role-of-logging-in-application-security-218dc72fb588?source=topics_v2---------49-84--------------------2a22dd48_1ceb_4eeb_97f5_2ef27c5d672c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WwdeFZOmSrRsw6Qd,information-security 547,480,What do I understand when someone says Threat Landscape?,"A threat landscape is like a map that shows all the different types of dangers that can harm a computer or a network. Just like a map shows different types of terrain, a threat landscape shows various security risks and vulnerabilities. For example, a threat landscape would show viruses, hackers…",https://medium.com/@evidyapeeth.com/what-do-i-understand-when-someone-says-threat-landscape-5faacc7e862e?source=topics_v2---------50-84--------------------2a22dd48_1ceb_4eeb_97f5_2ef27c5d672c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*f8GOYgw0m0CAbNk9,information-security 548,272,"InfoSecSherpa’s News Roundup for Sunday, March 19, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — Two Cyber Crime Gang Members Charged With Federal Data Portal Hack (PC Magazine, March 18th) Nigeria Calls For Regional Partnerships To Tackle Cyber Threats (Voice of Nigeria, March 18th) Guardsman and partners develop cybersecurity tech, launch Guardsman Cyber Intelligence (The Jamaica Gleaner, March 19th) Cybersecurity threats in Malaysia on the…",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-sunday-march-19-2023-1b4d1ae93c72?source=topics_v2---------51-84--------------------2a22dd48_1ceb_4eeb_97f5_2ef27c5d672c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7pcPKRJxf96icvY9i-mvnw.jpeg,information-security 549,448,"Fuzzing GET and POST Requests: A Comprehensive Guide with Gobuster, Ffuz, and Wfuzz","Web applications have become an essential part of businesses and individuals’ daily lives. However, they are also vulnerable to attacks from malicious actors who exploit security vulnerabilities in the application. One of the ways to identify these vulnerabilities is through fuzzing, a technique that involves sending a large number of…",https://medium.com/@rahulkumarrk8176/fuzzing-get-and-post-requests-a-comprehensive-guide-with-gobuster-ffuz-and-wfuzz-262ad965ac9f?source=topics_v2---------52-84--------------------2a22dd48_1ceb_4eeb_97f5_2ef27c5d672c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ZtxqgoC5Qkgyeg23.jpg,information-security 550,481,Defacing Websites Part I : A Step By Step Process,"In the past I have received a number of queries like: How do I deface websites? How do I replace someone else’s web page with my own? Questions like these had become very common. After procrastinating this manual for some weeks, I finally have got down to bringing it out. Before we move on with this manual, it is important to note that this manual explores only one method of defacing websites and the described process will not necessarily work on all target systems. Also note that we take an imaginary target system X for the below steps.",https://medium.com/@cmanojshrestha/defacing-websites-part-i-a-step-by-step-process-302355cfcae9?source=topics_v2---------53-84--------------------2a22dd48_1ceb_4eeb_97f5_2ef27c5d672c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gCsyY3-TUjm5jIqom1KbmQ.jpeg,information-security 551,482,Image Steganography Using LSB And RSA In Python,"Introduction Data hiding is the art of hiding data for various purposes such as; maintaining private data, securing confidential data, and so on. Securely exchanging data over the internet network is a very important issue. So, in order to transfer the data securely to the destination, there are many approaches…",https://medium.com/@p.harshita2002/image-steganography-using-lsb-and-rsa-in-python-e630d59ad455?source=topics_v2---------54-84--------------------2a22dd48_1ceb_4eeb_97f5_2ef27c5d672c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*-IehwdqVT9jHYB34,information-security 552,483,Unleashing DevSecOps Power: Automating Security Scans in Your CI/CD Pipeline,"With the increasing need for faster and more secure software development, integrating security into your DevOps process is essential. DevSecOps is the practice of incorporating security into every stage of the software development lifecycle. In this blog, we will explore how to automate various security operations in a DevSecOps CI/CD…",https://medium.com/@FadeIntoTech/unleashing-devsecops-power-automating-security-scans-in-your-ci-cd-pipeline-e1658507f7e9?source=topics_v2---------55-84--------------------3b46cae6_1c94_4527_8900_0b788d80dbc1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yuCv3QO3LelporHEtrR8yw.png,information-security 553,484,20/20 hindsight… We would have done it differently — How to avoid becoming a ransomware victim,"Intro We’ve probably all heard of ransomware. This is not a new threat; it has been with us for over three decades. Its history goes back to 1989, when Dr. Joseph Popp disguised it as AIDS-related scientific research, mailed the virus on a floppy disk to nearly 20,000 people, and then…",https://medium.com/acpm-security/20-20-hindsight-we-would-have-done-it-differently-d07fe7177991?source=topics_v2---------56-84--------------------3b46cae6_1c94_4527_8900_0b788d80dbc1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Yr7uXRdOlD_SDf0-zrFLWQ.png,information-security 554,485,Why I Quit Being a CISSP: My 20-Year Journey with ISC2,"A Personal Reflection on My CISSP Experience As a seasoned professional in the information security field, I’ve always had a keen interest in the various certifications available to those working in the industry. For 20 years, I proudly held the CISSP certification, a badge representing my cybersecurity dedication and expertise. But one day, as I received an…",https://medium.com/sectutor/why-i-quit-being-a-cissp-my-20-year-journey-with-isc2-a1ca56eb3652?source=topics_v2---------57-84--------------------3b46cae6_1c94_4527_8900_0b788d80dbc1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*U43uXxxXE_DBpKPb,information-security 555,472,Career Crossroad: Should You Choose a Technical or Managerial Role in Cybersecurity?,"Hey guys! So, I’ve been on my journey in cybersecurity for a couple of years now. Today I want us to talk career decisions, specifically about a career decision that you’re going to have to make for yourself. …",https://medium.com/@umarfarouk037/career-crossroad-should-you-choose-a-technical-or-managerial-role-in-cybersecurity-1fd1986580d2?source=topics_v2---------58-84--------------------3b46cae6_1c94_4527_8900_0b788d80dbc1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6Qhh2-tFNtMIwMQ21ndIIg.jpeg,information-security 556,272,"InfoSecSherpa’s News Roundup for Thursday, March 16, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — Australia’s Latitude Group, IPH hit by cyber attacks amid wave of hacks (Reuters, March 16th) BlackMamba ChatGPT Polymorphic Malware | A Case of Scareware or a Wake-up Call for Cyber Security? (SentinelOne, March 16th) CISA, Girl Scouts joins forces to close cybersecurity gender gap (Security Magazine, March 16th) Ransomware gang…",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-thursday-march-16-2023-96f2ae4c9f1d?source=topics_v2---------59-84--------------------3b46cae6_1c94_4527_8900_0b788d80dbc1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*C9NqL292gwA3SHo_au1jfQ.jpeg,information-security 557,486,A Guide to Understanding Splunk Searches,"Putting your Splunk Knowledge Together — Introduction: One of the great things about Splunk is the search optimization. It’s important to point out my articles aren’t a complete list or will give you everything you need to know about Splunk — they’re simply guides. For those learning, please check out the official Splunk documentation Before reading this…",https://medium.com/@saravra/splunk-understanding-searches-294506161678?source=topics_v2---------60-84--------------------3b46cae6_1c94_4527_8900_0b788d80dbc1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*oebRPTOfy7PwkBPQ,information-security 558,487,How I found Account Takeover,"Hey Folks, this is my first write-up. I want to share the recent finding with you all. Let’s get started with how I found Account takeover (ATO). …",https://medium.com/@kawakrunal786/how-i-found-account-takeover-5b10190d804b?source=topics_v2---------61-84--------------------3b46cae6_1c94_4527_8900_0b788d80dbc1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CszbTaxy8XV3VPQoTtM__w.png,information-security 559,488,Cyber Threat Intelligence Learning Resources,"I’ve been learning as much as I can about cyber threat intelligence (CTI). Although there are CTI courses and certifications for hundreds or thousands of dollars, I’ve tried to learn as much as possible from free and low-cost resources. Here are the best I’ve found. …",https://medium.com/@warnerchad/cyber-threat-intelligence-learning-resources-5cf00f9fe6c5?source=topics_v2---------62-84--------------------3b46cae6_1c94_4527_8900_0b788d80dbc1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*mQzWRiYqEodv8Wca,information-security 560,489,Understand the Privileged Access Management (PAM) Technology,"Privileged Access Management (PAM) is a solution that helps you control, manage, and monitor access to critical assets. — The integrity component, which is one of the elements of the CIA triad, is critical for organizations as it pertains to the accuracy and completeness of data. Not every user should be granted privileges such as the ability to manipulate or view data. …",https://medium.com/@abdullahclx/understand-the-privileged-access-management-pam-technology-b513fae0cd58?source=topics_v2---------63-84--------------------3b46cae6_1c94_4527_8900_0b788d80dbc1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,information-security 561,272,"InfoSecSherpa’s News Roundup for Wednesday, March 15, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — Chinese Silkloader cyber attack tool falls into Russian hands (Computer Weekly, March 15th) Nat cat and cyber protection gaps a big worry (Business Insurance, March 15th) Web hosting company fined in DOJ cyber fraud case (Compliance Week, March 15th) MKS Instruments hit by class-action litigation following ransomware attack (Cybersecurity Dive, March…",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-wednesday-march-15-2023-d8f1ef30b5ee?source=topics_v2---------64-84--------------------3b46cae6_1c94_4527_8900_0b788d80dbc1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*lBV-1bVecJoTgHbmN2xcYQ.jpeg,information-security 562,448,Agent T(EASY)- Try Hack Me,"TryHackMe | Agent T Something seems a little off with the server.tryhackme.com Hey, today we are going to solve an easy machine on Try hack me so let’s spin up the instance and start hacking. nmap -sC -sV -Ao nmap/agent 10.10.250.139",https://medium.com/@rahulkumarrk8176/agent-t-easy-try-hack-me-ab7650b45bcc?source=topics_v2---------65-84--------------------ef7511a9_9402_46a5_8771_edcbc75fd88f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*-2OS0rbVIiSdjunl.png,information-security 563,457,XXE with ChatGPT,"Generate Custom XXE Payloads with AI — XXE (XML External Entity) is a type of vulnerability that allows attackers to inject malicious XML code into an application. The following ChatGPT prompts can make it easy to generate payloads for bug bounty and penetration testing. 1. Basic XXE To get started, let’s start with a basic XXE payload customized for the…",https://medium.com/bugbountywriteup/xxe-with-chatgpt-3e4aa7c4b9c9?source=topics_v2---------66-84--------------------ef7511a9_9402_46a5_8771_edcbc75fd88f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*i8cWSZxOHK1r0p0EMXw7XA.png,information-security 564,490,Android Application Security Testing Series Part — One,"Android has become the most popular mobile operating system globally, with a market share of around 72%. With such widespread use, security has become a major concern, as hackers and attackers are always looking for vulnerabilities in Android applications to exploit. …",https://medium.com/@mk2011sharma/android-application-security-testing-series-part-one-5c346948fb27?source=topics_v2---------67-84--------------------ef7511a9_9402_46a5_8771_edcbc75fd88f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3U7ukNmPJuWWSHtFRzzilQ.jpeg,information-security 565,491,Here’s my first python project:,"Project name: Aware_of_Phish 𝗦𝘂𝗺𝗺𝗮𝗿𝘆 𝗼𝗳 𝗣𝗿𝗼𝗴𝗿𝗮𝗺: The user provides a file path to the email file, and the program ingests the email file. Then the user can choose which email header information: Return-Path, From, Body, DKIM, and SPF to be printed out. The 𝗴𝗼𝗮𝗹 𝗼𝗳 𝘁𝗵𝗶𝘀 𝗽𝗿𝗼𝗴𝗿𝗮𝗺 is to 𝗺𝗮𝗸𝗲 𝗮𝗻𝗮𝗹𝘆𝘇𝗶𝗻𝗴 𝗽𝗵𝗶𝘀𝗵𝗶𝗻𝗴 𝗲𝗺𝗮𝗶𝗹𝘀 𝗲𝗮𝘀𝗶𝗲𝗿 by 𝗰𝗼𝗹𝗹𝗲𝗰𝘁𝗶𝗻𝗴 𝘁𝗵𝗲 𝘀𝗺𝗮𝗹𝗹 𝘄𝗶𝗻, such as 𝗮𝘂𝘁𝗼𝗺𝗮𝘁𝗶𝗻𝗴 𝘁𝗵𝗲 𝘀𝗺𝗮𝗹𝗹 𝘁𝗮𝘀𝗸.",https://medium.com/@securitynguyen/heres-my-first-python-project-868a903033cd?source=topics_v2---------68-84--------------------ef7511a9_9402_46a5_8771_edcbc75fd88f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*60PpIYE3dm6uPvW9ktPA1A.png,information-security 566,492,Journey into Cybersecurity: CTFLearn Medium Challenge-07601,"Welcome to my Journey into Cybersecurity series where I will share what I have learned about cybersecurity. My name is Rocky and I hope by making these blogs I can showcase my knowledge and hands-on experience to get a Cybersecurity role in the future. In today’s blog, I will be…",https://medium.com/@rockyhoangle/journey-into-cybersecurity-ctflearn-medium-challenge-07601-9a472723cf8?source=topics_v2---------69-84--------------------ef7511a9_9402_46a5_8771_edcbc75fd88f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*T-G_GpdKqRv8YdSCH_TFtA.png,information-security 567,493,Logical Flaw Lead to Changing Price of Any Product,"Hi everyone i’m amir; in this write-up i telling how i found a critical logical vulnerability (Business Logic Error or Business Logic Flaw or Anything, LoL) in a private Bug Bounty Program (BBP). Summary : In this scenario, I was able to discover a logical flaw that allowed me to change the…",https://medium.com/@amirbyte/logical-flaw-lead-to-changing-price-of-any-product-2cdd6edf8aef?source=topics_v2---------70-84--------------------ef7511a9_9402_46a5_8771_edcbc75fd88f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EqMTcnGscW3DnEJLvI0PWA.jpeg,information-security 568,494,How to Use ChatGpt API to Learn Cybersecurity,"In the world of cybersecurity, information is power. Whether you’re a security professional, a developer, or simply an enthusiast, access to the latest tools and concepts is vital to staying ahead of threats. One powerful resource is the ChatGPT API, which allows users to gather detailed information and references on…",https://medium.com/@hacksheets/how-to-use-chatgpt-api-to-learn-cybersecurity-b2b7745451f1?source=topics_v2---------71-84--------------------ef7511a9_9402_46a5_8771_edcbc75fd88f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*dxHExGkMWtYxothG.png,information-security 569,495,Become an Infosec Writeups Ambassador,"As the IW team expands, we are excited to announce the relaunch of our Infosec Writeups Ambassador program. With this program, we aim to have a global team of infosec enthusiasts eager to play their role in helping the infosec community grow. …",https://medium.com/@infosecwriteups/become-an-infosec-writeups-ambassador-ec7bd9026f1b?source=topics_v2---------72-84--------------------ef7511a9_9402_46a5_8771_edcbc75fd88f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4pIdow8w1b7IYsQ5oW2VZA.png,information-security 570,496,JSON Web Token Attacks with Burp Suite,"JSON Web Tokens (JWT) are a popular method for implementing authentication and authorization in web applications. However, like any security mechanism, they can be subject to attacks. Some common types of JWT attacks include: 1. Token Brute-Forcing: Attackers can try to guess the JWT token by brute-forcing it with different combinations of secret keys, and once the key is found, they can take over the user account.",https://medium.com/@iz_floresta/json-web-token-attacks-with-burp-suite-1ca8938c6843?source=topics_v2---------73-84--------------------ef7511a9_9402_46a5_8771_edcbc75fd88f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5BXAzVMzzp7NUvwJu3_2iw.png,information-security 571,497,The story of how I was able to chain SSRF with Command Injection Vulnerability,"Hello Everyone, Hope you’re doing well, I am Raj Qureshi and I am a penetration tester. today I am doing another write-up about one of my best findings ever. In this write-up, I will be describing how I was able to chain SSRF attack with command injection Vulnerability. So let’s…",https://medium.com/@rajqureshi07/the-story-of-how-i-was-able-to-chain-ssrf-with-command-injection-vulnerability-ef31feb30ea9?source=topics_v2---------74-84--------------------6f861c84_b234_476e_bc7b_8668d4ffe28a-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*Am2kXrOWoql1RCvhG4w66Q.gif,information-security 572,272,"InfoSecSherpa’s News Roundup for Monday, March 13, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — Threat actors turn to AI-generated YouTube videos to spread info stealers (SC Media, March 13th) Fortinet: New FortiOS bug used as zero-day to attack govt networks (Bleeping Computer, March 13th) Evolving Cyber Insurance To Examine An Organization’s DNA (Forbes, March 13th) Cyber Resilience Must Focus on Marginalized Individuals Not Just…",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-monday-march-13-2023-9123be6c5f0e?source=topics_v2---------75-84--------------------6f861c84_b234_476e_bc7b_8668d4ffe28a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yfUMa2wTL-Gi2-aeNk9wpA.jpeg,information-security 573,498,Coffee… Coffee… Cyber Security!,"Who would think a coffee shop, barista and cyber security would have so much in common. There has to be a joke in there somewhere. Organisations tend to have a bad habit of implementing (or are sold) over complicated technology. The IT solutions are presented before even understanding the problem…",https://medium.com/thomas-cyber-media/coffee-coffee-cyber-security-e4690cde031d?source=topics_v2---------76-84--------------------6f861c84_b234_476e_bc7b_8668d4ffe28a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*2jE5ugZz2iDUiTj40TLZ6w.png,information-security 574,499,Havoc Lab / Demonstration — Part 1,"These are personal notes for an upcoming demonstration. I wanted to have a security demonstration where we plug in a rubber ducky on an out of the box minimally managed windows 11 or 10 computer and it installs a c2 agent. I chose Havoc as my C2 server framework, and…",https://medium.com/@y3t1_sec/havoc-lab-demonstration-part1-62f5cdf261dc?source=topics_v2---------77-84--------------------6f861c84_b234_476e_bc7b_8668d4ffe28a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ZUFj0gXrC1bVq3orbPuhzg.png,information-security 575,472,Do Certifications Matter as Much as They Are Made Out To Be?,One of the things I pondered when I was getting into cybersecurity was certifications. …,https://medium.com/@umarfarouk037/do-certifications-matter-as-much-as-they-are-made-out-to-be-33733c33449a?source=topics_v2---------78-84--------------------6f861c84_b234_476e_bc7b_8668d4ffe28a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6PHFjUjlftPZHYogVR7QCA.jpeg,information-security 576,286,Preventing Broken Access Control Vulnerabilities: Best Practices for Developers,Access control is one of the most crucial components of any security system. Developers must ensure that access to an application or system is granted only to authorized users and that these users are granted only the appropriate level of access. …,https://medium.com/codex/preventing-broken-access-control-vulnerabilities-best-practices-for-developers-dbffb8e9d1fd?source=topics_v2---------79-84--------------------ff908117_d5d1_4a9f_a214_89850403239f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*-4zjzP9spD_zqD8V,information-security 577,486,Splunk Homelab Setup,"Understanding Your Homelab — In this article, the term “Splunk” is assumed to mean Splunk Enterprise. Introduction: Before reading this article, you should have an understanding of what an indexer is. If you’re unfamiliar with Splunk, please start here: Understanding Splunk for Beginners Connecting Sources to Understand Potential Attacksmedium.com Even though this article is conceptual, it’s recommended you understand the basics of Linux.",https://medium.com/@saravra/splunk-homelab-setup-a7c2e2a1c046?source=topics_v2---------80-84--------------------ff908117_d5d1_4a9f_a214_89850403239f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Tz1SAF-nnCySn-oq,information-security 578,492,Journey Into Cybersecurity: CTFlearn Medium Challenge-POST Practice,"Welcome to my Journey into Cybersecurity series where I will share what I have learned about cybersecurity. My name is Rocky and I hope by making these blogs I can showcase my knowledge and hands-on experience to get a Cybersecurity role in the future. In today’s blog, I will be…",https://medium.com/@rockyhoangle/journey-into-cybersecurity-ctflearn-medium-challenge-post-practice-d11ae67fc26b?source=topics_v2---------81-84--------------------ff908117_d5d1_4a9f_a214_89850403239f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-p4wmPJehe_nttVtNWUTog.png,information-security 579,500,Top 5 Books About Cybersecurity 2023,Must-Reads for Cybersecurity Enthusiasts: Expert Insights and Strategies for Staying Safe in the Digital World — The five best books about cybersecurity that you should read in 2023 if you want to be a seasoned cybersecurity professional. 1. “The Art of Invisibility” by Kevin Mitnick “The Art of Invisibility” by Kevin Mitnick is a practical guide to protect yourself from online surveillance and cybersecurity threats. The book emphasizes the importance of being aware of…,https://medium.com/codex/top-5-books-about-cybersecurity-2023-b0b1eb82da37?source=topics_v2---------82-84--------------------ff908117_d5d1_4a9f_a214_89850403239f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ZoLi8RP5wCllzDDvhs5OmA.jpeg,information-security 580,383,Cyber Insurance: Is it the Ultimate Solution to Protect Your Business from Financial Loss?,"In today’s digital age, cyber attacks have become a major concern for businesses of all sizes. The consequences of a cyber attack can be devastating, resulting in financial loss, reputational damage, and even legal liabilities. As a result, more and more businesses are turning to cyber insurance as a means…",https://medium.com/@infosec-mike/cyber-insurance-is-it-the-ultimate-solution-to-protect-your-business-from-financial-loss-bebb908d81d?source=topics_v2---------83-84--------------------ff908117_d5d1_4a9f_a214_89850403239f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4Qod0fTb--4NgBgwJ0Etcg.jpeg,information-security 581,500,Don’t Use Notes to Store Your Passwords,"Understanding the Risks and Safer Alternatives for Secure Password Management — As we move further into the digital age, we’re required to create and manage multiple online accounts. As a result, remembering numerous passwords can be overwhelming, and people often resort to using notes apps to store passwords. However, using a notes app to store passwords is not a safe option…",https://medium.com/illumination/dont-use-notes-to-store-your-passwords-b1d74c5d0cb7?source=topics_v2---------84-84--------------------ff908117_d5d1_4a9f_a214_89850403239f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*AtobgPj78aVcNmno,information-security 582,317,Password protection 101: Everything you need to know about passwords,"Let’s face it, passwords are the bane of our digital existence. We all use passwords every day, whether it’s to log into our social media accounts, email, or online banking. Creating a password that meets all the requirements feels like solving a complicated math problem. …",https://medium.com/@anusshahariprassad/password-protection-101-everything-you-need-to-know-about-passwords-f808cbc1e8cb?source=topics_v2---------85-84--------------------ff908117_d5d1_4a9f_a214_89850403239f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oBAjAZtM7Aayw_HkNYczzw.jpeg,information-security 583,500,What You Need to Know About The US National Cybersecurity Strategy,"On February 28, 2023, the Biden-Harris Administration released the National Cybersecurity Strategy, outlining its plan to secure a safe and secure digital ecosystem for all Americans. This Strategy aims to make fundamental shifts in how the United States allocates roles, responsibilities, and resources in cyberspace to achieve goals that reflect…",https://medium.com/illumination/what-you-need-to-know-about-the-us-national-cybersecurity-strategy-5d1efb09d1b7?source=topics_v2---------86-84--------------------ff908117_d5d1_4a9f_a214_89850403239f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*MM05IWe0957OBRZ5,information-security 584,501,Bug Bounty Writeup $$$ || Parameter Tampering,What is Parameter Tampering? This parameter tampering can be said to be a method of manipulating the parameters that will be sent to the server to modify the data to be sent. This cybersecurity vulnerability entails tempering or modifying the parameters associated with the client and server. The critical-most parameters that are generall accessed…,https://medium.com/@aryasec/bug-bounty-writeup-parameter-tampering-c9c0e43e4b47?source=topics_v2---------87-84--------------------ff908117_d5d1_4a9f_a214_89850403239f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*wGADEYGQh-zX-XIJ.jpg,information-security 585,486,Understanding Splunk for Beginners,"Connecting Sources to Understand Potential Attacks — I have cybersecurity interview in a few days where Splunk will be used heavily. Based on Splunk’s documentation, this will be an introduction. Introduction: Splunk is a Security Information & Event Management (SIEM). SIEMs provide real-time analysis and monitoring of events for investigations and compliance. …",https://medium.com/@saravra/understanding-splunk-for-beginners-3b32d200fc2b?source=topics_v2---------88-84--------------------ff908117_d5d1_4a9f_a214_89850403239f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*uentAMK8sIStaDM7,information-security 586,502,"Shellcodes are dead, long live Fileless Shellcodes","The demonstrated PoC of this article can be found here. Recently I was developing a simple Shellcode Loader which uses Callbacks as an alternative of Shellcode execution. While it bypasses every runtime scanning, it failed to bypass the signature detection. So I fired up ThreatCheck to identify the bad bytes: …",https://medium.com/bugbountywriteup/shellcodes-are-dead-long-live-fileless-shellcodes-609cbacd5cb0?source=topics_v2---------89-84--------------------848eb59e_c9f8_4ea3_976a_5d31ec6a04d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*KwJR9m_Ua3ujyGbK4GcSTw.png,information-security 587,503,Can you spot the vulnerability? #16022023 — Intigriti,"Given Code Snippet: Code review: easy-eval.js if (window.debug) { eval(window.debug.toString()); //using eval at DOM element with id ""debug"" //only a and area tag can be used in attack as they are capable of using href attribute. toString get only that attribute } easy-xss.js const pos = document.URL.indexOf('name=') + 5; //user input const name…",https://medium.com/bugbountywriteup/can-you-spot-the-vulnerability-16022023-intigriti-a46068e557cc?source=topics_v2---------90-84--------------------848eb59e_c9f8_4ea3_976a_5d31ec6a04d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*VEmGASE-5FAv3lFqcXDgXw.png,information-security 588,457,5 ChatGPT Prompts for Bug Bounty,"JS, XSS, CSRF, and Decoding Made Easy with ChatGPT — Are you a bug bounty hunter, penetration tester, or developer, but looking for ways to augment your abilities with the power of AI? You are in luck because ChatGPT can assist you in the following ways. 1. AI-powered Scan for Vulnerabilities in Javascript Javascript can be complicated and time-consuming to read, but is a gold mine for…",https://medium.com/bugbountywriteup/5-chatgpt-prompts-for-bug-bounty-6b7365d61b58?source=topics_v2---------91-84--------------------848eb59e_c9f8_4ea3_976a_5d31ec6a04d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*WdrSCnXPejImEydT_R9iGg.png,information-security 589,504,Revealing the Power of Keylogging: Hunting for the Revealer Keylogger,By Lee Archinal at Cyborg Security BACKSTORY Recently I was reading an article by the famed Group-IB security team title “OPERA1ER: Playing God Without Permission” about an advanced persistent threat (APT) they dubbed OPERA1ER. It is a lengthy report but very much worth the time I took. There was a section…,https://medium.com/@cyborgsecurity/revealing-the-power-of-keylogging-hunting-for-the-revealer-keylogger-acdd8b5af81?source=topics_v2---------92-84--------------------848eb59e_c9f8_4ea3_976a_5d31ec6a04d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*x03HQyuZ3OI5ZhNb0cG5Cg.png,information-security 590,505,Women in Cybersecurity: Breaking Down Barriers and Paving the Way for the Future,"Women leading the way in cybersecurity — In the past few decades, technology has advanced at an unprecedented rate, revolutionizing almost every aspect of our lives. As our world becomes increasingly reliant on technology, the need for cybersecurity has become more critical than ever. …",https://medium.com/better-programming/women-in-cybersecurity-breaking-down-barriers-and-paving-the-way-for-the-future-1343bdd65f3d?source=topics_v2---------93-84--------------------848eb59e_c9f8_4ea3_976a_5d31ec6a04d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*grazOXH1L0oEPFw-5e3q8g.jpeg,information-security 591,506,Red Teaming — AD (Lateral movement with PSRemoting),Lateral movement is a term used in cybersecurity to describe the movement of an attacker within a network after gaining initial access. …,https://medium.com/@gowthamaraj-rajendran/red-teaming-ad-lateral-movement-with-psremoting-6e0911b89305?source=topics_v2---------94-84--------------------848eb59e_c9f8_4ea3_976a_5d31ec6a04d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DXURbiqpBhmSe8sNXVRRLw.png,information-security 592,506,DevSecOps — Docker Security (with Syft and Grype),"If you want to ensure the comprehensive security of your Docker images, Syft and Grype are two excellent tools that you can use. These command-line tools are lightweight, flexible, and stateless, making them ideal for developers. …",https://medium.com/@gowthamaraj-rajendran/devsecops-docker-security-with-syft-and-grype-4b6140fd551d?source=topics_v2---------95-84--------------------848eb59e_c9f8_4ea3_976a_5d31ec6a04d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MIq2Hc08b_zp_BJKF0NXNA.png,information-security 593,507,Is Cybersecurity Different in Government Than in Private Sector?,"This is a question I am asked often. However, any question about differences between sectors depends on how we analyze the properties for comparison. In many obvious ways, no differences exist between for the public and private sectors. …",https://medium.com/@rheimann/is-cybersecurity-different-in-government-than-in-private-sector-5071b35cd3f0?source=topics_v2---------96-84--------------------848eb59e_c9f8_4ea3_976a_5d31ec6a04d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wmX3qE-ahn2dBHCTQxAQMw.jpeg,information-security 594,317,How to not get Phished?,"Ah, the joys of modern technology. The internet has made our lives so much easier, hasn’t it? We can shop, bank, and connect with people from all over the world without ever leaving our couch. But with great convenience comes great responsibility. Because let’s face it, the internet is also…",https://medium.com/@anusshahariprassad/how-to-not-get-phished-142c504db38d?source=topics_v2---------97-84--------------------848eb59e_c9f8_4ea3_976a_5d31ec6a04d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MELx5l73-kzUlhgWvYIyaA.jpeg,information-security 595,449,We Speak CVE Podcast — “Microsoft’s Journey Adopting CVE Services & CVE JSON 5.0”,"The “We Speak CVE” podcast focuses on cybersecurity, vulnerability management, and the CVE Program. Kris Britton of the CVE Program speaks with Lisa Olson of Microsoft about Microsoft’s journey adopting the new CVE Services and CVE JSON 5.0 …",https://medium.com/@cve_program/we-speak-cve-podcast-microsofts-journey-adopting-cve-services-cve-json-5-0-c8cbe01e8f39?source=topics_v2---------98-84--------------------848eb59e_c9f8_4ea3_976a_5d31ec6a04d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DfjIArNKRotvVQxw0vnxtw.png,information-security 596,508,A Primer on Subverting AI/ML,"Artificial Intelligence/Machine Learning (AI/ML) models need more transparency and explainability, the lack of which makes it difficult to understand how they arrive at their conclusions and can degrade security. While achieving transparency and explainability can be challenging, failing to do so can require users of the AI/ML models to place…",https://medium.com/@mitcdh/a-primer-on-subverting-ai-ml-aebaa6a757c?source=topics_v2---------99-84--------------------37e15c7e_1082_4dde_b4df_8aaa5846b00b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ZaWYBWgK_AeW2v3A6VyC4A.png,information-security 597,454,Free SOCFortress Provided DFIR-IRIS Modules,"Seamlessly integrate DFIR-IRIS with tools such as Velociraptor, Cortex, and more! As technology advances, so do the security threats that come with it. With the ever-evolving nature of these threats, organizations need to be able to quickly identify and respond to potential incidents to minimize the damage. DFIR-IRIS…",https://medium.com/@socfortress/free-socfortress-provided-dfir-iris-modules-c9e2e74f89fe?source=topics_v2---------100-84--------------------4e4c6406_f8f1_41f0_9b87_20c0b6a836cb-------17,https://miro.medium.com/v2/resize:fill:140:140/0*9N0shNWDxZQh6Kj4.PNG,information-security 598,509,Audible Book Review: The Pentester Blueprint by Phillip Wylie and Kim Crawley,"Title: The Pentester Blueprint: Starting a Career as an Ethical Hacker Author: Phillip Wylie and Kim Crawley Narrated By: Matthew Josdal Publisher: Gildan Media Publish Date: 2021 Formats: Kindle, Audible, Paperback, Audio CD Author’s Other Works: 8 Steps to Better Security My Rating: 3 Stars Author Biography",https://medium.com/@kyle.w.marvin/audible-book-review-the-pentester-blueprint-by-phillip-wylie-and-kim-crawley-363cf7c69c41?source=topics_v2---------101-84--------------------4e4c6406_f8f1_41f0_9b87_20c0b6a836cb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3lnD6iS7NbFygESfKdZXqQ.png,information-security 599,509,Audible Book Review: Cyber Crisis by Eric Cole,"Title: Cyber Crisis Author: Eric Cole Narrated By: Michael Murray Publisher: Tantor Audio Publish Date: June 2021 Formats: Kindle, Audiobook, Hardcover, and Audio CD Author’s Other Works: Insider Threat, Online Danger, Network Security Bible, and Advanced Persistent Threats My Rating: 4 Stars Author Biography Eric Cole is a well-known name…",https://medium.com/@kyle.w.marvin/audible-book-review-cyber-crisis-by-eric-cole-45719bbc4471?source=topics_v2---------102-84--------------------4e4c6406_f8f1_41f0_9b87_20c0b6a836cb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*h4nho2BY5SY3bx0kq2EARw.png,information-security 600,449,CVE Program Report for Quarter 4 Calendar Year (Q4 CY) 2022,The CVE Program’s quarterly summary of program milestones and metrics for Q4 CY 2022. Q4 CY 2022 Milestones 25 CVE Numbering Authorities (CNAs) Added The 25 new CNAs added this quarter are listed below under their Top-Level Root (TL-Root) or Root. Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS) TL-Root: Honeywell International Inc. for all Honeywell products (USA),https://medium.com/@cve_program/cve-program-report-for-quarter-4-calendar-year-q4-cy-2022-d3fd31903924?source=topics_v2---------103-84--------------------4e4c6406_f8f1_41f0_9b87_20c0b6a836cb-------17,https://miro.medium.com/v2/resize:fill:140:140/0*rkqkfFNTnKTJ1ChH.png,information-security 601,286,Difference between Vulnerability Assessment and Penetration Testing,"Difference between Vulnerability Assessment and Penetration Testing In the world of cybersecurity, there are two important terms that are often used interchangeably — vulnerability assessment and penetration testing. While both are crucial in identifying security risks and vulnerabilities, they are not the same thing. …",https://medium.com/geekculture/difference-between-vulnerability-assessment-and-penetration-testing-4f77a877b622?source=topics_v2---------104-84--------------------4e4c6406_f8f1_41f0_9b87_20c0b6a836cb-------17,https://miro.medium.com/v2/resize:fill:140:140/0*DvIWQolbaqmrOf9n,information-security 602,510,Hack The Box — [HTB] — Lame,"RECON 🔍 Always scan many ports as possible, sometimes the -p- flag are good, but keep in mind that is slow. I recommend the command below, because of the balance of slow and fast: nmap -sC -sV --top-ports 1000 -oA lameRecon 10.10.10.3 NMAP flags -sC: default nmap scripts -sV: detect…",https://medium.com/@m4lw00rm/hack-the-box-htb-lame-ba6a684c193c?source=topics_v2---------105-84--------------------4e4c6406_f8f1_41f0_9b87_20c0b6a836cb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pJbsabEdghOg4RU2o-8nvg.png,information-security 603,440,A Curated List of Security Readings,"What Sticks With You? — When you decide to work in Security you automatically sign up to a professional life of continuous learning. Technologies, cultures and threats are constantly changing, and anyone who is trying to “do security” in this environment must keep up. Just because something is written (a book, a paper) or spoken…",https://medium.com/@hpatton/a-curated-list-of-security-readings-65de623e9c48?source=topics_v2---------106-84--------------------4e4c6406_f8f1_41f0_9b87_20c0b6a836cb-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ZvIq1qqViHJYI6ln,information-security 604,511,Top 3 Ways to Justify Encryption to the Business,"Have you ever tried to convince a coworker or boss that you need to secure sensitive data by encrypting it? As the CEO of a tech company that focuses entirely on encryption solutions, these are conversations I have on a daily basis with architects, CISOs, product managers, and engineers. …",https://medium.com/mission-possible/top-3-ways-to-justify-encryption-to-the-business-2e4630c292fe?source=topics_v2---------107-84--------------------4e4c6406_f8f1_41f0_9b87_20c0b6a836cb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*eDKRgScalWIVGocI7VyUIg.png,information-security 605,272,"InfoSecSherpa’s News Roundup for Monday, March 6, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! Twitter insiders: We can’t protect users from trolling under Musk (BBC News, March 6th) Spotsylvania High School Launches Statewide Cyber Competition (Government Technology, March 6th) The Five Pillars of the New U.S. Cybersecurity Strategy (My Tech Decisions, March 6th) Modernizing identity access…",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-monday-march-6-2023-32fb34402984?source=topics_v2---------108-84--------------------4e4c6406_f8f1_41f0_9b87_20c0b6a836cb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*t0iPcEtNAXruHW5YMggVdA.png,information-security 606,512,"27K1, it’s compliance. No, it’s not.","What is ISO/IEC 27001? Is it a control framework? Is it a risk framework? Is it compliance? To start at the beginning, ISO/IEC 27001 (hereafter referred to as 27K1) is an International Standard, where a standard is a document established by consensus and approved by a recognised body that provides…",https://medium.com/@nigellandman/27k1-its-compliance-no-it-s-not-fab0f3c5dfa6?source=topics_v2---------109-84--------------------09f2d34b_d3c9_4d43_9529_1dc0dd3d5fbf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*2mRItHLnlnMsgnBh7I8kyA.png,information-security 607,500,The Evolving Landscape of Cybersecurity: Trends and Threats to Watch Out For,"Strategies for Enhancing Cybersecurity in a Rapidly Changing Digital Landscape — As the world becomes increasingly digitized, the importance of cybersecurity has never been more apparent. Cyber threats are constantly evolving, and as such, organizations need to stay up-to-date with the latest trends and threats to protect themselves. In this article, we will explore the current state of cybersecurity and the…",https://medium.com/illumination/the-evolving-landscape-of-cybersecurity-trends-and-threats-to-watch-out-for-79afe53879fa?source=topics_v2---------110-84--------------------09f2d34b_d3c9_4d43_9529_1dc0dd3d5fbf-------17,https://miro.medium.com/v2/resize:fill:140:140/0*IuFuxOFde7RwqNvH,information-security 608,383,"Don’t let a cyber crisis ruin your business, learn how to prevent and respond","Cybersecurity threats are on the rise and can pose a significant risk to businesses of all sizes. A single cyber attack can result in the loss of sensitive information, financial damage, and harm to a company’s reputation. For small businesses, the consequences can be devastating and could even lead to…",https://medium.com/@infosec-mike/dont-let-a-cyber-crisis-ruin-your-business-learn-how-to-prevent-and-respond-babd9db5c50c?source=topics_v2---------111-84--------------------09f2d34b_d3c9_4d43_9529_1dc0dd3d5fbf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*I5cfGM7n7kMkU2mhlMNlfw.jpeg,information-security 609,513,How to Leave a CISO Role: A Framework for the Conscientious CISO,"For CISOs on the way out of the door, we share a people-centric framework to enable you to exit with grace and equip you for your next leadership challenge. When to read this? You plan to leave the job voluntarily. …",https://medium.com/@yasspartners/how-to-leave-a-ciso-role-a-framework-for-the-conscientious-ciso-c1af95eb7c2f?source=topics_v2---------112-84--------------------09f2d34b_d3c9_4d43_9529_1dc0dd3d5fbf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*x8hWdMsjawY8HYFUgJGCkw.jpeg,information-security 610,514,Networking Your Way to Your First Cybersecurity Job: 5 Tips for Beginners,"In today’s digital age, cybersecurity has become one of the most critical issues facing individuals and organizations around the world. With an increasing number of cyber attacks, the demand for cybersecurity professionals is higher than ever. However, breaking into this field can be challenging, especially if you are a beginner…",https://medium.com/@euler.chaves/networking-your-way-to-your-first-cybersecurity-job-5-tips-for-beginners-65d00d263931?source=topics_v2---------113-84--------------------09f2d34b_d3c9_4d43_9529_1dc0dd3d5fbf-------17,https://miro.medium.com/v2/resize:fill:140:140/0*dXdDJG0XHVWNON4K,information-security 611,515,Importance of Active Directory Security:,"Active Directory (AD) is a directory service for Windows networking environments. It is a distributed hierarchical structure that centralizes and manages an organization’s resources, including users, computers, groups, network devices, file shares, group policies, devices, and trust relationships. AD provides authentication and authorization functionality within a Windows domain environment. …",https://medium.com/@bigheadsecurity/importance-of-active-directory-security-52a5f14b9f10?source=topics_v2---------114-84--------------------09f2d34b_d3c9_4d43_9529_1dc0dd3d5fbf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rOkJ9qqgMrfY0BORMzVo1w.png,information-security 612,457,Create Your Own XSS Lab with ChatGPT,"Get up and running quickly with this easy-to-follow tutorial on creating and running your own custom XSS lab with ChatGPT. — Having trouble learning a vulnerability type? Just have ChatGPT make you a lab! 1. What do you want to learn? DOM XSS is a popular vulnerability type to hunt for because they’re everywhere, hard to scan for, and typically have high rewards. Prompt: Create a fully working lab html for DOM XSS to test against locally in…",https://medium.com/bugbountywriteup/create-your-own-xss-lab-with-chatgpt-385c4e5e7f35?source=topics_v2---------115-84--------------------09f2d34b_d3c9_4d43_9529_1dc0dd3d5fbf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*jv6imhogDInjtJRxGwjiVA.png,information-security 613,516,How do you identify cybersecurity vulnerabilities and mitigate risks in the IoT?,"Introduction With the increasing proliferation of Internet of Things (IoT) devices and associated systems, and under the ever growing news of operational technologies threats, cybersecurity has become a major concern for all actors in the IOT space. These devices are often designed to collect and transmit sensitive information, which can be…",https://medium.com/@dparente/how-do-you-identify-cybersecurity-vulnerabilities-and-mitigate-risks-in-the-iot-e08908f70748?source=topics_v2---------116-84--------------------09f2d34b_d3c9_4d43_9529_1dc0dd3d5fbf-------17,https://miro.medium.com/v2/resize:fill:140:140/0*cnMk2558MOMdvtrq,information-security 614,517,The Internet: Savior or Trap?,"The Double-Edged Sword of Information Abundance — March 6, 2023 - № 12_23 - x words, x characters (image by @jsilhavyk from Instagram) Section: Humor Description: The internet is full of garbage content and contradictory information. Learn how to navigate the treacherous waters of information abundance and avoid analysis paralysis. Navigating the Treacherous Waters of Information Abundance Oh, the internet, what a miraculous tool…",https://medium.com/@jsilhavycz/the-internet-savior-or-trap-82ac96ece46d?source=topics_v2---------117-84--------------------09f2d34b_d3c9_4d43_9529_1dc0dd3d5fbf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CRJwT1cNiVrnfA2UJSt2WQ.jpeg,information-security 615,267,The Goals of Cybersecurity Explained,"So what is Cybersecurity? And what goals is Cybersecurity trying to achieve? Well, hopefully, this article can answer those questions for you. Cybersecurity, also known as InfoSec, is the practice of protecting computer systems, networks, devices, and data from unauthorized access, use, theft, and destruction. It encompasses a wide range…",https://medium.com/@stefan-p-bargan/the-goals-of-cybersecurity-explained-323dc99393b5?source=topics_v2---------118-84--------------------09f2d34b_d3c9_4d43_9529_1dc0dd3d5fbf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*UNKWIISapWFxmJ6adIkJwQ.png,information-security 616,518,OpenCTI | Cyber Threat Intelligence Platform Installation Guide,"What is OpenCTI? OpenCTI is an open-source platform designed for cyber threat intelligence (CTI) analysis and management. The platform provides a suite of tools and functionalities that enable users to collect, analyze, and share cybersecurity information. OpenCTI is built on a graph database architecture, which allows users to model and visualize complex relationships…",https://medium.com/@hassaann463/opencti-all-in-one-installation-guide-8a9c159e5b28?source=topics_v2---------119-84--------------------e9e50c27_89bc_4d03_b159_a0f812e9846a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ZXnGEw3gToWNFXUTbzqWSQ.png,information-security 617,468,Top five Cyber Threat Intel stories of the week: 02/27 to 03/03/2023,"Top 5 general threat intelligence stories of the week. This is from TLP white/open-source websites, so please feel free to share and enjoy reading about these events. Please reach out if you have any questions! Thank you! General Worldwide activity: 1st: White House pushes for mandatory regulations, more offensive cyber action under National Cyber Strategy Overview: The White House unveiled its long-awaited National Cybersecurity Strategy on Thursday, laying…",https://medium.com/hunter-strategy/top-five-cyber-threat-intel-stories-of-the-week-02-27-to-03-03-2023-afc6e85c5c15?source=topics_v2---------120-84--------------------e9e50c27_89bc_4d03_b159_a0f812e9846a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*gL1jYQz1COZvXwpP,information-security 618,519,"If You Only Read A Few Books In 2023, Read These","here are some books that you might find interesting to read in 2023: “The Four Winds” by Kristin Hannah — A historical novel set during the Great Depression, which follows the story of a woman fighting for her family’s survival. “Project Hail Mary” by Andy Weir — A science-fiction novel…",https://medium.com/@fdkhan2587/if-you-only-read-a-few-books-in-2023-read-these-5964fffb01bb?source=topics_v2---------121-84--------------------e9e50c27_89bc_4d03_b159_a0f812e9846a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,information-security 619,467,"Well, That Was Close! Now What?","Security professionals should investigate “near misses” — events when one security control prevented a compromise — as rigorously as actual incidents and should track them as a key metric. We security professionals are quick to respond when a security incident occurs. If it’s serious enough, we’ll activate our incident response…",https://medium.com/@reikel/well-that-was-close-now-what-cde94ada3619?source=topics_v2---------122-84--------------------e9e50c27_89bc_4d03_b159_a0f812e9846a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6Q9B8twY0zb4t29l58NtHg.jpeg,information-security 620,498,Cyber 2023 — Our Insights,"2022 saw two (2) of the largest cyber attacks and data breaches in Australia. Optus and Medibank, both suffered huge data breaches losing significant amounts of sensitive information including personal information as well as, in some instances, health information into the dark web and in general the public domain. …",https://medium.com/thomas-cyber-media/cyber-2023-our-insights-62731ac784c3?source=topics_v2---------123-84--------------------e9e50c27_89bc_4d03_b159_a0f812e9846a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*E4BNRLS0MK_ACy3xGUi1Rw.png,information-security 621,520,Debunking Myths: How to Get Started in Cybersecurity?,"Damjan Cvetanović; Information Security Officer @ UN1QUELY In the past few years, I keep getting more questions about how to dive into cybersecurity, mainly: 1. What are the best learning resources? 2. Do I need certificates to land a job? 3. Which certificates or University courses would you recommend? 4…",https://medium.com/@un1quely/debunking-myths-how-to-get-started-in-cybersecurity-f63442856800?source=topics_v2---------124-84--------------------e9e50c27_89bc_4d03_b159_a0f812e9846a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*VShtuvLDGLmxKCzxctW23w.png,information-security 622,490,Exploring iOS Applications with Frida and Objection: Basic Commands for Pentesting,"Mobile application Pentesting is an essential part of securing any organization’s mobile assets. To perform thorough penetration testing, a tester requires a set of tools that can help them find vulnerabilities in an application. Two such popular tools are Frida and Objection. These tools provide a dynamic analysis of an…",https://medium.com/@mk2011sharma/exploring-ios-applications-with-frida-and-objection-basic-commands-for-pentesting-4c637dbeb9fd?source=topics_v2---------125-84--------------------e9e50c27_89bc_4d03_b159_a0f812e9846a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*97aaYqGyWZEzPdKyJB-zRA.jpeg,information-security 623,316,TryHackMe writeup: Basic Static Analysis,"An application of static analysis in the reverse engineering of software to study the behaviour of malware — TryHackMe has published a walkthrough room discussing the static analysis of malware (“tryhackme” and “umairalizafar” 2023). This room discusses techniques like basic and advanced string analysis, fingerprinting malware, Portable Executable header analysis, and more. In this article, I will discuss my experience analysing neutralised malware samples.",https://medium.com/bugbountywriteup/tryhackme-writeup-basic-static-analysis-1cd423cb4880?source=topics_v2---------126-84--------------------e9e50c27_89bc_4d03_b159_a0f812e9846a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3Tq4sMr03o312ZhLdZwu4A.png,information-security 624,457,ChatGPT for Bug Bounty: Faster Hunting and Reporting,"Save Time, Learn Technical Skills, and Write Effective Reports with AI-Powered ChatGPT — If you’re new to bug bounty, or just looking to up your game, look no further than ChatGPT. Brainstorm When you’re starting out as a bug bounty hunter, it can be overwhelming to know where to begin. Ask ChatGPT to help you brainstorm ways to augment your abilities and save time…",https://medium.com/bugbountywriteup/chatgpt-for-bug-bounty-faster-hunting-and-reporting-ad8b556f79f3?source=topics_v2---------127-84--------------------e9e50c27_89bc_4d03_b159_a0f812e9846a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SwD7EaUqGx9q-gT9PFI3Sg.png,information-security 625,521,Are Various CAPTCHA Types Just Marketing Hype?,"1. The Growing Variety of CAPTCHA Types: What’s it for? CAPTCHA is an essential tool in preventing automated bots from accessing websites and apps, but it can also be frustrating for users. Over recent years, there has been an explosion in the number of CAPTCHA types available, each with its own unique UI to cater for the changing market demand…",https://medium.com/@geetest_1024/are-various-captcha-types-just-marketing-hype-579c22f3feb6?source=topics_v2---------128-84--------------------e9e50c27_89bc_4d03_b159_a0f812e9846a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1HcKvS6S6d29Lr1qN31I8A.jpeg,information-security 626,272,"InfoSecSherpa’s News Roundup for Thursday, March 2, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — The Critical Importance of SBOMs for Open Source Software Components in a World of Supply Chain Attacks (LinkedIn, March 2nd) FACT SHEET: Biden-⁠Harris Administration Announces National Cybersecurity Strategy (The White House, March 2nd) First Black Woman to Complete SUNY Adirondack Cyber Program (Government Technology, March 1st) WH Smith staff data…",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-thursday-march-2-2023-66fdfa41a730?source=topics_v2---------129-84--------------------a718451a_ab1e_4616_8451_88a09b4f6226-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zj1p62yQLGxtosYIec7CQw.jpeg,information-security 627,522,The Evolution of Attack Techniques in the Era of Real-World,"The Era of Real-World Offense and Defense It has brought great convenience to customers in dealing with various securities business through various forms such as Web application, APP and applet. However, while digitalization is reshaping the service model of securities business, the exposure of online business is also expanding, and…",https://medium.com/@ceciliachow1998/the-evolution-of-attack-techniques-in-the-era-of-real-world-f5bc1e154bc1?source=topics_v2---------130-84--------------------a718451a_ab1e_4616_8451_88a09b4f6226-------17,https://miro.medium.com/v2/resize:fill:140:140/0*CiIlp2TYFB85p0UA.jpg,information-security 628,468,CTI Flash Briefing: LastPass suffers 2nd Security Incident,Overview LastPass reported a 2nd security incident hitting their systems after the initial attack and disclosure in August 2022. From their security incident update blog post on support.lastpass.com: The two incidents that we disclosed last year affected LastPass and our customers. Neither incident was caused by any LastPass product defect or…,https://medium.com/hunter-strategy/cti-flash-briefing-lastpass-suffers-2nd-security-incident-3d4284257a5?source=topics_v2---------131-84--------------------13202262_1039_4f27_99ae_16a54a655b21-------17,https://miro.medium.com/v2/resize:fill:140:140/0*G_ZTUB5JjkotbNN3.png,information-security 629,523,Stay Ahead of the Game: The Importance of Threat Modelling in Cybersecurity,Threat modelling is a systematic process of identifying and analyzing potential threats and vulnerabilities in a system or application to determine the most effective way to protect it from attacks. …,https://medium.com/@amoranio/stay-ahead-of-the-game-the-importance-of-threat-modeling-in-cybersecurity-79bf38d2a29f?source=topics_v2---------132-84--------------------13202262_1039_4f27_99ae_16a54a655b21-------17,https://miro.medium.com/v2/resize:fill:140:140/0*2faZr5HIpqDP__wZ,information-security 630,524,Crucial conversations: Overcoming the 5 Areas Where CISOs Tend to Struggle,I had a great conversation with Marco Ciappelli and Sean Martin from ITSPmagazine podcast discussing the mistakes and hard-learned lessons…,https://medium.com/@matthew-rosenquist/crucial-conversations-overcoming-the-5-areas-where-cisos-tend-to-struggle-a6e3b9e6386d?source=topics_v2---------133-84--------------------13202262_1039_4f27_99ae_16a54a655b21-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DJg0ty0IB_vcDnZMq8zwPQ.jpeg,information-security 631,525,How I was able to find Django Misconfiguration using Shodan.io,"Hi guys this is my 2nd Article ever and in this one i will show how i was able to find Django Misconfiguration in Amazon VRP using Shodan. What is Shodan.io Response by OpenAI : Shodan.io is a search engine designed to scan and index internet-connected devices and systems. Unlike traditional search engines, which index web pages, Shodan focuses on the devices themselves, including servers, routers, webcams, and other IoT (Internet of Things) devices.",https://medium.com/bugbountywriteup/how-i-was-able-to-find-django-misconfiguration-using-shodan-3929942a3940?source=topics_v2---------134-84--------------------13202262_1039_4f27_99ae_16a54a655b21-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5BPgn7M2evVcmnA3EjHvjQ.jpeg,information-security 632,272,"InfoSecSherpa’s News Roundup for Wednesday, March 1, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — US Cyber Command developing own intelligence hub (C4ISRNET, March 1st) Belgium’s cyber security agency links China to spear phishing attack on MP (Financial Times, March 1st) Southern states have the most open cyber exposures, report finds (GCN, March 1st) Quarterly Cyber Regulations Update: February 2023 (The Wall Street Journal, March…",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-wednesday-march-1-2023-14dd6d6b63ff?source=topics_v2---------135-84--------------------13202262_1039_4f27_99ae_16a54a655b21-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QfzEnnENjlXUng8JOYsUSg.jpeg,information-security 633,526,Interesting Stored XSS in sandboxed environment to Full Account Takeover,"Hi readers 👋, Hope everyone of you doing well, Before moving to the article content here is little announcement 📢, In collaboration with TMG Security (tmgsec.com) we have successfully launched ADVANCED BUG BOUNTY HUNTING V1.0 …",https://medium.com/bugbountywriteup/interesting-stored-xss-in-sandboxed-environment-to-full-account-takeover-32e541062938?source=topics_v2---------136-84--------------------13202262_1039_4f27_99ae_16a54a655b21-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0WLFvq7VtUWh9SWC6sfJOQ.png,information-security 634,527,"Privacy, GDPR, CCPA & Beyond",Privacy vs Security Privacy relates to the rights with respect to personal information. Privacy becomes very important when it comes to processing personal data. We need to make sure that we handle those type of data ethically. …,https://medium.com/@benpournader/privacy-gdpr-ccpa-beyond-f620117fb185?source=topics_v2---------137-84--------------------13202262_1039_4f27_99ae_16a54a655b21-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,information-security 635,272,"InfoSecSherpa’s News Roundup for Tuesday, February 28, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — Lack of Black cyber execs is hampering job retention, experts say (Axios, February 28th) Dish Network Shares Hit 14-Year Low After Cyber Attack Caused Major Outage (Forbes, February 28th) “Major” cyberattack compromised sensitive U.S. Marshals Service data (CBS News, February 28th) National Credit Union Administration (NCUA) Approves New Cyber Incident…",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-tuesday-february-28-2023-9fb5d5bfbee6?source=topics_v2---------138-84--------------------13202262_1039_4f27_99ae_16a54a655b21-------17,https://miro.medium.com/v2/resize:fill:140:140/1*bMJbpDvNBGoMlHFF69IuZg.jpeg,information-security 636,277,Confidential Computing Saves the Game and Gamer’s PII,"Esports has become one of the fastest-growing activities in the world, and now, thanks to cloud services and technologies, it’s only going to continue to skyrocket. Cloud technology helps boost online streaming platforms and has given esports players access to high-end games, a virtual arena in which they can compete…",https://medium.com/@safelishare/confidential-computing-saves-the-game-and-gamers-pii-50d7ff6b4721?source=topics_v2---------139-84--------------------13202262_1039_4f27_99ae_16a54a655b21-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4Xt4l1E0dUtW2LNVKx9d0g.png,information-security 637,453,"Compliance, Security Questionnaires, and Information Security: Protecting Your Organization in the Digital Age","In today’s digital age, organizations are facing an increasing threat from cyberattacks. Hackers and cybercriminals are constantly looking for ways to exploit vulnerabilities in organizational networks and systems to gain access to sensitive data. …",https://medium.com/@Theshahid/compliance-security-questionnaires-and-information-security-protecting-your-organization-in-the-805420a3ca99?source=topics_v2---------140-84--------------------13202262_1039_4f27_99ae_16a54a655b21-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zq49RBV_DwLWnG1l8C9Wsg.png,information-security 638,272,"InfoSecSherpa’s News Roundup for Sunday, February 26, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — We must treat cyber wars the same as we treat conventional military encounters (The Hill, February 26th) Federal government to rewrite cyber laws after Optus, Medibank hacks (Australian Broadcasting Corporation, February 27th) German minister warns of ‘massive’ danger from Russian hackers (The Guardian, February 26th) Cyber Security Act to be…",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-sunday-february-26-2023-d81b10730229?source=topics_v2---------141-84--------------------6a4bb3ec_fed1_4925_b390_ed275771f709-------17,https://miro.medium.com/v2/resize:fill:140:140/1*mM5M4np9qkyaKj5MBF9e0g.jpeg,information-security 639,505,Protect Your Business with Regular Vulnerability Assessments,"Vulnerability assessments are an essential component of any effective cybersecurity strategy. These assessments help organizations identify potential weaknesses in their information technology (IT) systems, networks, and applications that could be exploited by cybercriminals. In this article, we’ll discuss what vulnerability assessments are, why they’re important, and how they’re conducted. In…",https://medium.com/@starr.durand/protect-your-business-with-regular-vulnerability-assessments-cadb4ba2da3d?source=topics_v2---------142-84--------------------6a4bb3ec_fed1_4925_b390_ed275771f709-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fRC6ZtU4Ux3cmFJimjmMUw.jpeg,information-security 640,490,Getting Started with Frida: Setting up on an Emulator,"A well-liked dynamic instrumentation tool called Frida can be used to carry out a variety of security testing tasks. It enables programmers and security experts to examine and alter the behavior of apps operating on mobile devices, desktop computers, and servers. There are several reasons why Frida is useful in…",https://medium.com/@mk2011sharma/getting-started-with-frida-setting-up-on-an-emulator-47980170d2b2?source=topics_v2---------144-84--------------------6a4bb3ec_fed1_4925_b390_ed275771f709-------17,https://miro.medium.com/v2/resize:fill:140:140/1*dHnWsjNivy-S5ZmA7QWoGw.png,information-security 641,528,"As a software engineer, you should know these cybersecurity tools",Cybersecurity is becoming more critical as the world gets more digitized. Software engineers are critical to ensuring the security of their code. Software engineers can use a lot of tools and resources to help with code security. …,https://medium.com/@cybernoob/as-a-software-engineer-you-should-know-these-cybersecurity-tools-3a5645b28068?source=topics_v2---------145-84--------------------6a4bb3ec_fed1_4925_b390_ed275771f709-------17,https://miro.medium.com/v2/resize:fill:140:140/0*GWyczOQXgIv7DY1L.png,information-security 642,529,4-Level Analysis for Threat Prioritisation — Chapter II,"Following my first article 4-Level Analysis for Threat Prioritisation, I would like to discuss how we can combine four data points in our threat assessments to better prioritise threats. …",https://medium.com/@robindimyan/4-level-analysis-for-threat-prioritisation-chapter-ii-c79ddeed89d5?source=topics_v2---------146-84--------------------6a4bb3ec_fed1_4925_b390_ed275771f709-------17,https://miro.medium.com/v2/resize:fill:140:140/1*IM4KKn3bK_OhxOrxVbSFSA.png,information-security 643,272,"InfoSecSherpa’s News Roundup for Saturday, February 25, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — Ransomware Attack Forces Produce Giant Dole to Shut Down Plants (Security Week, February 24th) Ukraine gears up for new phase of cyber war with Russia (Politico, February 25th) What churches need to know about avoiding cyber scams (The Baptist Paper, February 25th) Polish team wins NATO cyber competition (TVP World, February…",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-saturday-february-25-2023-39fb0c60ed02?source=topics_v2---------147-84--------------------6a4bb3ec_fed1_4925_b390_ed275771f709-------17,https://miro.medium.com/v2/resize:fill:140:140/1*HdI-8wph0XW816WtzUOykw.jpeg,information-security 644,525,Information Disclosure Vulnerability in Adobe Experience Manager affecting multiple companies…,"Information Disclosure Vulnerability in Adobe Experience Manager affecting multiple companies including Microsoft, Apple, Amazon, McDonald’s and many more. This is my first article ever so don’t mind my writing skills i really hate writing but i wanted to share this one with the community. Hi guys my name is Fat…",https://medium.com/bugbountywriteup/information-disclosure-vulnerability-in-adobe-experience-manager-affecting-multiple-companies-2fb0558cd957?source=topics_v2---------148-84--------------------6a4bb3ec_fed1_4925_b390_ed275771f709-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-DjU69kgJdzI1e3nBBKcAQ.png,information-security 645,530,Keep an eye out for the JavaScript,Two things I want to cover in this article and both concerns JavaScript. Bypassing client-side JavaScript filter. A while ago I learnt the importance of intercepting the JavaScript responses with respect to the file upload filter from my colleague. Burp Suite by default does not intercept the requests sent for…,https://medium.com/@ramkumarnadar47/keep-an-eye-out-for-the-javascript-94630a3f60b5?source=topics_v2---------149-84--------------------6a4bb3ec_fed1_4925_b390_ed275771f709-------17,https://miro.medium.com/v2/resize:fill:140:140/1*jFeklqfZMmJP7jI_A0wD2A.png,information-security 646,531,"2FA Change: Good for Twitter, Good for Twitter’s Users","Seldom a day goes by without some new controversy on, or about, Twitter. Elon Musk’s acquisition of the platform worked like a mainline injection of methamphetamine to boost that effect. Consider a February 15 announcement which, even a year ago, would likely have struck most people as boring and technical: …",https://medium.com/@thegarrisoncenter/2fa-change-good-for-twitter-good-for-twitters-users-b38cdef41236?source=topics_v2---------150-84--------------------6a4bb3ec_fed1_4925_b390_ed275771f709-------17,https://miro.medium.com/v2/resize:fill:140:140/0*EsO1AcClPoNOkjHs.jpg,information-security 647,532,Tools that everyone should be aware of.,"Here are the top 10 devices, Flipper Zero Flipper Zero is a multi-functional hacking device used to learn and experiment with computer security. This device is designed with various features and tools, making it ideal for individuals interested in exploring the field of cybersecurity. The Flipper Zero has a compact…",https://medium.com/@manikanta.pabi/tools-that-everyone-should-be-aware-of-506699c3abac?source=topics_v2---------151-84--------------------38bae424_dc25_4f00_8d31_931a7c6f220d-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lxIezM_6aTR8NMMO.jpg,information-security 648,504,Threat Hunting Content Platform: Supercharge Your Threat Hunting,"By Cyborg Security As a security professional, you understand the crucial role that threat hunting plays in protecting your organization from cyber attacks. Threat hunting involves proactively searching for signs of malicious activity on your organization’s networks and systems, analyzing adversary behaviors to detect breaches and prevent attacks. However, threat…",https://medium.com/@cyborgsecurity/threat-hunting-content-platform-supercharge-your-threat-hunting-7ce42bb9efc5?source=topics_v2---------152-84--------------------38bae424_dc25_4f00_8d31_931a7c6f220d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yyeMT26ENazycw2I6uPfXw.png,information-security 649,467,Security Policy That Works,"Policy can be a key tool in the security leader’s kit — if it has consensus, authority, and publicity. Technically minded security professionals (like me) can underestimate the importance of policy in a security program. Pieces of paper don’t secure networks, after all. But policy gives the security team power…",https://medium.com/@reikel/security-policy-that-works-1f94c8f60a10?source=topics_v2---------153-84--------------------9baa3fd3_5bf8_46cf_9fdd_0c54fddebe2d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*eV4RHNO0wi4wS2k9yjVTZA.jpeg,information-security 650,533,Cyber Research #72,"The newsletter will be on hiatus indefinitely for the time being. Articles Airbnb’s Approach to Access Management at Scale How Airbnb securely manages permissions for our large team of employees, contractors, and call center staff.medium.com Threat Hunting: Detection based on Prevalence alpine-sec.medium.com Let's build a Chrome extension that steals everything Today's adventure: DIY whole hog data exfiltrationmattfrisbie.substack.com",https://medium.com/@mcoskuner/cyber-research-72-4a7867b84fc8?source=topics_v2---------154-84--------------------9baa3fd3_5bf8_46cf_9fdd_0c54fddebe2d-------17,https://miro.medium.com/v2/resize:fill:140:140/0*6Dke3mCUutmpodOr,information-security 651,534,Zero Trust Architecture: The New Standard in Securing Your Organization’s Data in a New Digital Age,"Zero Trust, Zero Trust Architecture, Zero Trust Security. We all have heard about it at least once. We hear about it on our favorite tech podcasts when we drive to work. Perhaps you hear your Information Security Manager preaching about it. But what exactly is Zero Trust? According to the…",https://medium.com/@williammurray012/zero-trust-architecture-the-new-standard-in-securing-your-organizations-data-in-a-new-digital-age-39d4ea89112d?source=topics_v2---------155-84--------------------9baa3fd3_5bf8_46cf_9fdd_0c54fddebe2d-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ERbsny_04gSdGGH-,information-security 652,535,Threat Hunting Series: Detection Engineering VS Threat Hunting,"Threat hunting is becoming mainstream, and despite the attention it receives, many people need help to differentiate it from other roles, such as detection engineering. This confusion leads to endless discussions on places like Twitter and Reddit. I wrote this article to share my perspective on what makes threat hunting…",https://medium.com/@kostas-ts/threat-hunting-series-detection-engineering-vs-threat-hunting-f12f3a72185f?source=topics_v2---------156-84--------------------9baa3fd3_5bf8_46cf_9fdd_0c54fddebe2d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*aoK2sOmDpTkMMCuFNtUj0w.png,information-security 653,536,XSS and chicken biryani got along.,"Food for thought. It was wordpress website this time. They had implemented WPE W.A.F to block all xss payloads. No ,"Details of the partnership between Bi.social and OKX Wallet are released! Bi DID, as one of the key components of Bi.social platform, is the exclusive portal linking to your web3 network. In this exclusive collaboration, all OKX Wallet users are eligible to FREE MINT one Bi DID each! 🔗 https://bi.social/campaign/okxfreemint …",https://medium.com/@Bitislands_/tutorial-to-okx-wallet-x-bi-did-collaboration-15d5038df9eb?source=topics_v2---------113-84--------------------b18888c3_1bbd_4e73_a647_1ea2ed23e512-------17,https://miro.medium.com/v2/resize:fill:140:140/1*YhEPQ2zGxJw4Zuto9aQvVA.png,web3 1035,834,The time to turn adoption into web3 reputation has come,"GM! I’m Alexander, co-founder of Nomis. I’m a serial AI entrepreneur. For more than 10 years different AI-based projects that I’m related to, helped people to open new opportunities in matching employers and employees, making p2p deals, looking for counterparties, etc. I think you remember Vitalik Buterin’s sensational article that…",https://medium.com/@Alex_Nomis/the-time-to-turn-adoption-into-web3-reputation-has-come-6b238e60afbf?source=topics_v2---------114-84--------------------b18888c3_1bbd_4e73_a647_1ea2ed23e512-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Laz9zUu598UfEcusG6jV-Q.jpeg,web3 1036,835,The Most Expensive NFTs in History,"Blockchain Technology Has Transformed How We Value and Collect Art — NFTs have revolutionized the art world. When computer graphics came into existence in the second part of the 20th century, the first works of digital art emerged. While not closely considered in the beginning, concerns have arisen regarding ownership of a form of art that is completely digital. Thanks to…",https://medium.com/bankless-dao/the-most-expensive-nfts-in-history-953fac6d9064?source=topics_v2---------115-84--------------------b18888c3_1bbd_4e73_a647_1ea2ed23e512-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Tfd5t8w7T2dX5Y4W.png,web3 1037,836,Oi! Network Bi-Weekly Report | 31 March 2023,"Welcome to the 31 March edition of Oi! Network Bi-Weekly Report. Oi! Network Beta Test has officially ended, we will be reviewing the statistics and discussing the next phase of development for Oi! Network. Below is a recap of the newest progress from two weeks ago. 🚀 Oi! Network Beta Test Has Ended!",https://medium.com/@oinetwork/oi-network-bi-weekly-report-31-march-2023-ad7e45726599?source=topics_v2---------116-84--------------------b18888c3_1bbd_4e73_a647_1ea2ed23e512-------17,https://miro.medium.com/v2/resize:fill:140:140/0*bdPnH43u-2bUx4b3.png,web3 1038,693,Why Optimus AI Could Be the Next Shiba Inu or Dogecoin,Meme Tokens have been taking the attention of crypto enthusiasts and even outsiders that have no knowledge regarding cryptocurrency since the first price pump of Dogecoin in 2017. This is because of it’s iconic MASSIVE price pumps driven by hype and community. Teenagers became Millionaires overnight because they bought magic…,https://medium.com/@_nekowo2/why-optimus-ai-could-be-the-next-shiba-inu-or-dogecoin-843c1eecf1cb?source=topics_v2---------117-84--------------------b18888c3_1bbd_4e73_a647_1ea2ed23e512-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yx7f3Mf_2mHl07q2x-qhIg.png,web3 1039,837,NFT-F & Yummy Ninja Project Introduction,"In order to provide better Q&A for everyone and let more users and communities from all over the internet to participate in discussions, gather your thoughts and collect points of interest and questions, we welcome everyone to leave comments, exchange ideas, and ask questions under each project introduction Tweet at…",https://medium.com/@chuciqin/nft-f-yummy-ninja-project-introduction-9c28841a969a?source=topics_v2---------119-84--------------------1f8401b5_2bb3_48bf_8e96_dea099386d76-------17,https://miro.medium.com/v2/resize:fill:140:140/1*jNYAiqXLkBWzrWCGsbn2cg.png,web3 1040,839,HearVerse: The Future of Music NFT Marketplaces in the Metaverse,"In recent years, the world of NFTs (non-fungible tokens) has exploded, with artists, collectors, and investors all vying for a piece of the action. NFTs have taken many forms, from digital art to collectible sports cards, but one area that has seen significant growth is music NFTs. …",https://medium.com/@hearverse/hearverse-the-future-of-music-nft-marketplaces-in-the-metaverse-d2c65f390f63?source=topics_v2---------121-84--------------------a9bd9516_4448_4104_9659_e043e4a18d8c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ePdyY-rOvmn_NnpHc50qBQ.jpeg,web3 1041,840,"Get Your Appetite Ready, OneRare’s Quarterly Roadmap is Here!","The last quarter was a whirlwind of flavors, from tantalizing new recipes to exciting branded NFTs, Foodverse had it all. But we’re not done yet — the next quarter is set to be even more exciting. We’re gearing up to bring you the best of food games, collaborations and delectable…",https://medium.com/@onerarenft/get-your-appetite-ready-onerares-quarterly-roadmap-is-here-e50a5070954?source=topics_v2---------122-84--------------------a9bd9516_4448_4104_9659_e043e4a18d8c-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*rGm0Yj1kfUGc7w2YIBvUGA.gif,web3 1042,841,Metadium’s new DEX activity,"Dear Metadium community, We are happy to share our latest partnership just in time to close our 2023 activity report: NDXInvest. NDXInvest is a Singapore-based project aiming to connect individuals to organizational enterprises with Web3-based philosophies and technologies for successful Digital Transformation. …",https://medium.com/metadium/metadiums-new-dex-activity-acfe9b4024cb?source=topics_v2---------123-84--------------------a9bd9516_4448_4104_9659_e043e4a18d8c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LGhsTE5WiZg8VYwSPFcnWA.png,web3 1043,842,Redbelly Network — Month in Review March 2023,🎈 We were absolutely blown away this month by our Node Operator program launch. We received thousands of applications from all over the World. This really confirmed for us the traction that Redbelly is gaining in the global Web3 community. Let’s keep up the momentum. 🌟 Message from Vincent Gramoli…,https://medium.com/@redbellyblockchain/redbelly-network-month-in-review-march-2023-786370192f7c?source=topics_v2---------124-84--------------------a9bd9516_4448_4104_9659_e043e4a18d8c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BTXQyrTSwPRWZc_2CsBeSg.png,web3 1044,843,Embracing the Future: The Opportunities and Necessity of a Web3 Native Video CMS Platform,"Explore the transformative potential of Web3 native video CMS platforms as they redefine content creation, distribution, and monetization in a decentralized, transparent, and empowering digital landscape. In a world where technology continues to evolve at breakneck speed, the digital revolution has given rise to the burgeoning era of Web3-the decentralized internet powered by blockchain technology.",https://medium.com/@jpasalagua/opportunities-and-necessity-of-a-web3-native-video-cms-platform-cfd481e72c40?source=topics_v2---------125-84--------------------a9bd9516_4448_4104_9659_e043e4a18d8c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*2Eh4dZ64m-WBWNOI.png,web3 1045,844,Unlocking the Power of Soulbound Tokens: Prosperity Passport Launches as a Revolutionary Identity Solution for Celo Blockchain Users,"Prosperity Passport, the first Soulbound Token-powered web3 identity solution for Celo blockchain users and developers, was launched by Masa and Celo Foundation on March 10. In just twenty days, the platform has seen tremendous adoption from all corners of the globe, with over 258,000 .celo domain names being minted, and…",https://medium.com/@vimaaa67/unlocking-the-power-of-soulbound-tokens-prosperity-passport-launches-as-a-revolutionary-identity-abc11aa61fe3?source=topics_v2---------126-84--------------------a9bd9516_4448_4104_9659_e043e4a18d8c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gm45dsP2ED7Wj1fsvyyx5g.png,web3 1046,845,User-Generated Content x NFTs,"The battle for user-generated content (UGC) is heating up across nearly every consumer-facing industry. CPG brands, sports teams, entertainment groups, and fashion houses are racing to incentivize user participation in organic, branded content. Brands are also just beginning to explore NFT-based digital experiences and insider memberships. In 2022, more than…",https://medium.com/optima-payments/user-generated-content-x-nfts-f129f4a9f1ab?source=topics_v2---------127-84--------------------a9bd9516_4448_4104_9659_e043e4a18d8c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zCnQEVYwW2c2j5Fidgwjfw.jpeg,web3 1047,846,Web3 The Game Changer Service Transforming Industries,"Klover Network is proud to announce its game-changing service that bridges the gap between the online casino industry and the world of Web3. As experts in both fields, we understand the challenges online casino operators face looking to leverage blockchain technology’s benefits but may need more technical expertise. Game changer service Our Development…",https://medium.com/@klovernetwork/web3-the-game-changer-service-transforming-industries-53f5f1b7f7c8?source=topics_v2---------128-84--------------------a9bd9516_4448_4104_9659_e043e4a18d8c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*8AEjmerraZFgWw3b.png,web3 1048,846,Roadmap Announcement to Launch IDO on Arbitrum Chain,"Klover.Network has recently announced the roadmap for the development of its DeFi ecosystem. The comprehensive roadmap comprises four distinct phases, each outlining the project’s overarching goals and objectives, unveiling a proof of concept, and launching an Initial DEX Offering (IDO) on the Arbitrum chain on April 6–9, 2023.",https://medium.com/@klovernetwork/roadmap-announcement-to-launch-ido-on-arbitrum-chain-89ea4bc42e3b?source=topics_v2---------129-84--------------------a9bd9516_4448_4104_9659_e043e4a18d8c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*GZcmiUkNVwHXBZ1f.png,web3 1049,847,Calling All Gamers & Devs: How to Get Started with Web3 Gaming?,"Web3 gaming is growing, dubbed one of the fastest expanding sectors in blockchain and Web3. Alibaba Cloud is launching a lab for Web3 gaming developers. Two major players in the industry, Polygon and Immutable, are predicting exponential growth for the sector in the next few years. …",https://medium.com/@Vorto/calling-all-gamers-devs-how-to-get-started-with-web3-gaming-54a42376475?source=topics_v2---------130-84--------------------a9bd9516_4448_4104_9659_e043e4a18d8c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SPlnvFBpzpbdFMIub3F12g.jpeg,web3 1050,848,Must-Visit Culture Events and Attractions in Hong Kong Web3 Festival for Web3ers,"Co-hosted by Wanxiang Blockchain Labs and HashKey Group, and organised by W3ME, the Hong Kong Web3 Festival 2023 will take place from April 12 to 15. HONG KONG, March 31, 2023 — We are pleased to announce that the open stage event of the Hong Kong Web3 Festival 2023 has…",https://medium.com/hashkey-group/must-visit-culture-events-and-attractions-in-hong-kong-web3-festival-for-web3ers-b9fda3a69d68?source=topics_v2---------131-84--------------------52644661_287e_4013_9247_690605fc214f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JAl2Ef9yuWii-Fa8gcn2WQ.png,web3 1051,849,Bitcoin is Coming to Web3 Gaming,Bitcoin’s Lightning Network to be integrated for trading and storing Bitcoin within the Nakamoto Games Ecosystem Nakamoto Games is a premiere Web3 Ecosystem with a catalog of almost 180 gaming options. We are constantly bringing awareness to GameFi and encouraging adoption in Web3 gaming. …,https://medium.com/@nakamotogames/bitcoin-is-coming-to-web3-gaming-692a501fa672?source=topics_v2---------132-84--------------------52644661_287e_4013_9247_690605fc214f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ybuMvIUr6HcN_qAvP8AbSg.png,web3 1052,850,Giveth Referral Program,"We told you it was coming, and now here it is! 🤩 The Giveth Referral Program lets you earn rewards for shilling your favorite projects. Every time someone makes a donation based on your referral, you’ll be rewarded with GIV! 🪙 Giveth has always promoted generating rewards for donating to…",https://medium.com/giveth/giveth-referral-program-a701db72b5cb?source=topics_v2---------133-84--------------------52644661_287e_4013_9247_690605fc214f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BD1bgtz__f4eO-kYIa5Qbw.png,web3 1053,851,CUDOS AND AI,"CUDOS AND AI As the world keeps advancing technologically, they keep improving the way things are done. One of it us the AI. Let’s see many aspects of life that AI will touch!. AI IN HEALTHCARE Hospitals and research institutions will be able to use AI to analyze large amounts…",https://medium.com/@imoworobinson50/cudos-and-ai-a81d07ac4892?source=topics_v2---------134-84--------------------52644661_287e_4013_9247_690605fc214f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,web3 1054,852,Could An AI Ever Be As Good In Fashion Design As A Human?,"As the world becomes increasingly digital, the fashion industry is also starting to embrace new technologies to augment the brand and the shopping experience and bring more creativity and interactivity to fashion events. Using buzzwords like metaverse, web3 or, my favourite, NFTs is one option; but changing market behaviour is…",https://medium.com/@judit_ARAnalytics/could-an-ai-ever-be-as-good-in-fashion-design-as-a-human-f0ec7ffc6a1c?source=topics_v2---------135-84--------------------52644661_287e_4013_9247_690605fc214f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pW39WkNvEbsLM3zFx-_n1A.jpeg,web3 1055,783,The Future of Blockchain Data,"Thoughts from Danill Romazanov — PARSIQ CTO — Introduction For those who grew up during the ’80s and ’90s, it would have been hard to predict just how profoundly the internet would change the world. Web1.0 gave many some glimpses, for sure, but it wasn’t until Web2.0 …",https://medium.com/parsiq/the-future-of-blockchain-data-541b5d1c26a0?source=topics_v2---------136-84--------------------52644661_287e_4013_9247_690605fc214f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*uH6TiQglLUTj9OmfUHN9NQ.png,web3 1056,853,NFTIV — Transforming the World,"In recent years, non-fungible tokens (NFTs) have taken the world by storm, revolutionizing the way we perceive and exchange digital art, collectibles, and other assets. …",https://medium.com/@nftiv/nftiv-transforming-the-world-33857736a0a4?source=topics_v2---------137-84--------------------52644661_287e_4013_9247_690605fc214f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_T1n1mWOMudZM4r7lNYkww.png,web3 1057,854,Mirroring: Trade on L1 // Play on L2.,"In line with our upcoming migration to Arbitrum Nova, we are launching Mirroring: new tech enabling a huge step forward in adoption-readiness for web3 gaming. When we launched Pirate Nation, building something fully on chain was really important to us. Because of the way different chains work, we wanted to…",https://medium.com/@piratenation/mirroring-trade-on-l1-play-on-l2-3f53068a6a44?source=topics_v2---------138-84--------------------52644661_287e_4013_9247_690605fc214f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*8nwB49mv0sEOeugOMDA6Dw.png,web3 1058,769,DOJIMA NETWORK HACKATHON x BLOCK BIDDING PROJECT,"DOJIMA NETWORK HACKATHON x BLOCK BIDDING PROJECT BLOCK BIDDING: THE FUTURE OF ONLINE AUCTIONS The blockchain technology was created with the intention for various utilities that will promote security and decentralization, and ultimately user’s satisfaction. Since this novel technology came on board, its utility level has been growing and even more…",https://medium.com/@dojimanetwork/dojima-network-hackathon-x-block-bidding-project-8a35b112a957?source=topics_v2---------139-84--------------------52644661_287e_4013_9247_690605fc214f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oV5CZgyEsZcJ3RdKatS_2g.png,web3 1059,855,Chartology #1: Technical Trading,"Buying low and selling high is often luck, but understanding trading charts and analyzing coin movements based on past market data can help your luck grow. — Given the popularity of our Chartology Twitter series, we’ve decided to introduce an expanded version of that short-form Twitter guide. We will tackle what Technical Analysis in crypto involves, what types of charts you could encounter, and how to decipher and identify bullish and bearish trends.",https://medium.com/pollen-defi/chartology-1-technical-trading-fd988ab99bc?source=topics_v2---------140-84--------------------52644661_287e_4013_9247_690605fc214f-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*wiZOcdFoE1NJqnf-FPVNIA.gif,web3 1060,856,How Chat GPT-4 Can Empower Web3: A Look at the Possibilities,"As the world continues to move towards decentralized technologies, the need for advanced language processing capabilities becomes more critical. With the upcoming release of Chat GPT-4, the possibilities for enhancing the Web3 ecosystem are endless. Here’s a breakdown of some of the ways GPT-4 could empower Web3: Enhanced Natural Language…",https://medium.com/percs/how-chat-gpt-4-can-empower-web3-a-look-at-the-possibilities-95e546a0a208?source=topics_v2---------141-84--------------------4e39ba8e_b399_42f5_b1c9_23e0a0dc1604-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,web3 1061,857,"NFTs, 7 real game-changer for businesses in 2023.","Boost your brand value, engage with customers, create new revenu streams… discover how NFTs will be a real game-changer in 2023. — Non-fungible tokens (NFTs) have taken the digital world by storm, with unique and rare digital assets being sold for millions of dollars. However, their potential extends far beyond the world of art and collectibles. In 2023, NFTs are set to become a real game-changer for businesses, offering new ways to…",https://medium.com/@_swann/nfts-7-real-game-changer-for-businesses-in-2023-2b5f5a0df3d0?source=topics_v2---------142-84--------------------4e39ba8e_b399_42f5_b1c9_23e0a0dc1604-------17,https://miro.medium.com/v2/resize:fill:140:140/1*8tsMvNCulwFWwpss7ehzKA.png,web3 1062,858,Why I think AAA developers will continue to avoid Web3 games in 2023,"Last year’s events point to another year of wait-and-see for Western devs, but perhaps a year of build for Japanese devs — Over a year ago, I outlined why I thought the major players in the traditional gaming industry would avoid blockchain gaming in 2022. It is an understatement to say that much has changed since the beginning of 2022. Why I think AAA developers will leave blockchain gaming to the startups in 2022 All signs point to too much risk for too little returnjulia-hu.medium.com",https://medium.com/@julia-hu/why-i-think-aaa-developers-will-continue-to-avoid-web3-games-in-2023-1c015ba209df?source=topics_v2---------143-84--------------------4e39ba8e_b399_42f5_b1c9_23e0a0dc1604-------17,https://miro.medium.com/v2/resize:fill:140:140/0*iAPMl_FIlj_TWKgr,web3 1063,859,Here are 10 ideas that combine the strengths of web3 and GPT to create innovative new applications,"Blockchain technology and artificial intelligence (AI) are two of the most disruptive technological advancements of recent years. Developers have been exploring combining these technologies to create innovative new applications. One promising combination is web3 and GPT. Web3 is a decentralised infrastructure for building applications that enable decentralised data storage, identity…",https://medium.com/@alexlewyl/here-are-10-ideas-that-combine-the-strengths-of-web3-and-gpt-to-create-innovative-new-applications-bc57441bc0b8?source=topics_v2---------144-84--------------------b93f911b_caa2_46c2_a27e_2568c9efd686-------17,https://miro.medium.com/v2/resize:fill:140:140/0*NNpbpRTw0VqeUqaj.png,web3 1064,846,Future of Game of chance for both game publisher & a player,"Klover.Network World’s First Web3 Aggregator for Game of Chances. Our goal is to build transparency & facilitate operations in this industry using blockchain, creating a safe environment for game publishers and players to have fun, transparency and fairness with web3. Benefits For Game Publishers Klover Network connects game publishers with providers worldwide, making building…",https://medium.com/@klovernetwork/future-of-game-of-chance-for-both-game-publisher-a-player-f915c6893417?source=topics_v2---------145-84--------------------b93f911b_caa2_46c2_a27e_2568c9efd686-------17,https://miro.medium.com/v2/resize:fill:140:140/0*HvRQk8neoQtxWR5Y.png,web3 1065,846,Powering Klover Network with $KVN utility token,"$KVN is a unique token that will transform the online casino industry with its fixed supply, deflationary design, and multiple use cases. …",https://medium.com/@klovernetwork/powering-klover-network-with-kvn-utility-token-176827091771?source=topics_v2---------146-84--------------------b93f911b_caa2_46c2_a27e_2568c9efd686-------17,https://miro.medium.com/v2/resize:fill:140:140/0*vsYTHZED0q98tKuR.png,web3 1066,846,Klover Network Multi-Asset Yield Farming Tokens and NFTs,"Yield Farming is a popular concept in decentralized finance (DeFi) that allows users to earn rewards by staking their cryptocurrency holdings. Essentially, yield farming involves lending or staking your digital assets to a DeFi platform in exchange for rewards in the form of more cryptocurrency. In the case of Klover…",https://medium.com/@klovernetwork/klover-network-multi-asset-yield-farming-tokens-and-nfts-52a8e2f8c9f9?source=topics_v2---------147-84--------------------b93f911b_caa2_46c2_a27e_2568c9efd686-------17,https://miro.medium.com/v2/resize:fill:140:140/0*uQKAhY2eeC6Rdii0.png,web3 1067,844,The Nibiru Chain #9 Oracle Module is the Next Generation of Decentralized Oracles,"Oracles are crucial components of decentralized finance (DeFi), which allow real-world data to be transmitted onto blockchain systems for smart contract execution. However, numerous exploits have exemplified the lack of reliability and security of oracle systems in the past. Therefore, designing the optimal oracle is critical as DeFi continues to…",https://medium.com/@vimaaa67/the-nibiru-chain-9-oracle-module-is-the-next-generation-of-decentralized-oracles-e79fd82e2310?source=topics_v2---------148-84--------------------b93f911b_caa2_46c2_a27e_2568c9efd686-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TIdgTE2s00z9t6TqwDsfyQ.png,web3 1068,807,The Best Web 3 Events in April,"April is here, and with it comes the vibrancy of spring, a time of renewal and growth. SojuDAO has curated a list of the best Web 3 events happening this April. …",https://medium.com/@thelisabethkim/the-best-web-3-events-in-april-a183641326a3?source=topics_v2---------149-84--------------------b93f911b_caa2_46c2_a27e_2568c9efd686-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MP_-w9TnC_6Qn1x9RFwvYA.jpeg,web3 1069,831,Earning in Web3 : Cudos Network,"Have you ever considered one of the most lucrative methods to make money in the blockchain space? “Yes, the same goes for me. After making the decision to conduct some research on it, I took my laptop with me and discovered what I was looking for. The most effective technique…",https://medium.com/@albertinim211/earning-in-web3-cudos-network-e22e974f4399?source=topics_v2---------150-84--------------------b93f911b_caa2_46c2_a27e_2568c9efd686-------17,https://miro.medium.com/v2/resize:fill:140:140/0*d82RgS6EwVs6TTwG,web3 1070,860,The Weekly Airdrop: 0x58,"March 31st, 2023 // Overall market (-1.6%) stood relatively strong amid new Coinbase & Binance lawsuits, nearly 90% of all ETH is now in self-custody & DEX activity is on the rise MARKET UPDATE​ The overall market (-1.6%) remained relatively resilient through a wave of regulatory pressure on the crypto industry, in…",https://medium.com/@M31Capital/the-weekly-airdrop-0x58-3bf0bf41f32e?source=topics_v2---------151-84--------------------4041c552_4956_418d_a967_0d9de89dfcfa-------17,https://miro.medium.com/v2/resize:fill:140:140/0*HO4-sfF6Ijrg6iVo.png,web3 1071,846,Klover Network exclusive Klover NFTs License features,"Fractional NFTs, or F-NFTs, are a new type of non-fungible token that allows multiple owners to invest in a single asset. Essentially, an F-NFT is a shared ownership model that enables a group of investors to collectively own and trade a specific NFT. One of Klover Network’s exclusive features with…",https://medium.com/@klovernetwork/klover-network-exclusive-klover-nfts-license-features-280beca5fd44?source=topics_v2---------152-84--------------------4041c552_4956_418d_a967_0d9de89dfcfa-------17,https://miro.medium.com/v2/resize:fill:140:140/0*g7ubdwDQTfB59QNI.png,web3 1072,846,How to deposit tokens to play games on BitHulk,"Bithulk, powered by Klover Network, is a blockchain-based platform that contains over five hundred Casino games. A platform that prides itself on security, transparency and fairness. A platform that promises to provide players with a phenomenal experience. Register on BitHulk and receive a welcome bonus worth $10,000 in BH tokens…",https://medium.com/@klovernetwork/how-to-deposit-tokens-to-play-games-on-bithulk-c4aec7d8a9bf?source=topics_v2---------153-84--------------------4041c552_4956_418d_a967_0d9de89dfcfa-------17,https://miro.medium.com/v2/resize:fill:140:140/0*D87tR4bf8XFpGZnC.png,web3 1073,861,What is ink! and What’s New in Version 4.0?,"What are eDSLs? First, let’s go over a bit of background: EDSLs are Embedded Domain-Specific Languages, which are small programming languages embedded within a host programming language. EDSLs are designed to be used for a specific domain or problem such as smart contract development, with syntax and semantics tailored for…",https://medium.com/astar-network/what-is-ink-and-whats-new-in-version-4-0-ccdfc5cabe54?source=topics_v2---------154-84--------------------4041c552_4956_418d_a967_0d9de89dfcfa-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ATtO6TlNj4dB29FRy_3lBQ.png,web3 1074,862,Glacier Referral Program With $GLC Reward 🧊,"We believe the more people embrace the decentralized Web3 industry, the more trust will be established. 🥳 We are excited to announce that Glacier is launching her Referral Program! This program is designed to incentivize participation in Glacier Network and help us build a larger, stronger, more engaged Glacier community. …",https://medium.com/@glacierlabs/glacier-referral-program-with-glc-reward-3754f40a1382?source=topics_v2---------155-84--------------------4041c552_4956_418d_a967_0d9de89dfcfa-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1ALFpo5WWt9W3DgmZE9zzQ.png,web3 1075,778,Masa x Teller Soulbound Lending Pools Now Live,"Introduction: Masa, the first and fastest-growing Ethereum Virtual Machine (EVM)-compatible Soulbound Token (SBT) protocol, today announced the launch of Soulbound Lending pools, in partnership with Teller. Soulbound Lending pools represent a groundbreaking decentralized lending system, where a user’s web3 credit score and soulbound identity can be utilized to establish creditworthiness…",https://medium.com/masa-finance/masa-x-teller-soulbound-lending-pools-now-live-b982e4e5792c?source=topics_v2---------156-84--------------------4041c552_4956_418d_a967_0d9de89dfcfa-------17,https://miro.medium.com/v2/resize:fill:140:140/1*dtrhD2_stwBRBZuGbHFl2A.jpeg,web3 1076,863,"PERPLAY Announces Partnership with DimeTime, a unique productivity-based GameFi project","Hello, PERPLAYers! We are excited to announce our partnership with DimeTime, a timer app where you can manage your time, track your progress, and earn rewards! We are hosting a collaboration event starting today so check out the details below: DimeTime x PERPLAY Big Giveaway Campaign will run from March…",https://medium.com/@PERPLAY/perplay-announces-partnership-with-dimetime-a-unique-productivity-based-gamefi-project-74814795cc6d?source=topics_v2---------157-84--------------------4041c552_4956_418d_a967_0d9de89dfcfa-------17,https://miro.medium.com/v2/resize:fill:140:140/g:fp:0.24:0.44/1*_wkWUzls5RgUqcMBpR462w.png,web3 1077,864,Connecting the Dots: The OBS World Interplay between Real-Life Community and Metaverse,"Looking for a gaming experience that combines the thrill of high-speed racing with the excitement of cutting-edge web3 technologies? Look no further than OBS World, the platform that is changing the way we think about racing. …",https://medium.com/@obsworld/connecting-the-dots-the-obs-world-interplay-between-real-life-community-and-metaverse-832c5a9111cf?source=topics_v2---------158-84--------------------4041c552_4956_418d_a967_0d9de89dfcfa-------17,https://miro.medium.com/v2/resize:fill:140:140/0*sQkDPkkebxAg0GvG,web3 1078,865,March ’23 Bite-Size Recap,"Another month, another roundup! Two New Connector Proposals We have submitted a connector building project proposal to two popular protocols in the Cosmos ecosystem and anticipate a busy Q2 for this year! If approved, we will have new bounties available for development and technical writing. …",https://medium.com/@pecuniafinancedao/march-23-bite-size-recap-e7b5224b07b1?source=topics_v2---------159-84--------------------4041c552_4956_418d_a967_0d9de89dfcfa-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oIB40fVx0W_GNM4ph94JgQ.png,web3 1079,866,Paragons Pulse 17,"Through Paragons Pulse, we curate insights and intel from ParagonsDAO, the games/protocols we’re involved in, and beyond! Development updates, claiming staking rewards, Echelon news, and upcoming events — here’s a quick summary of some of the latest Paragons and ecosystem news: What’s new at ParagonsDAO? 🏗️ Building steadily We’re steadily building our products including our Player Management…",https://medium.com/paragonsdao/paragons-pulse-17-96e632510698?source=topics_v2---------160-84--------------------4041c552_4956_418d_a967_0d9de89dfcfa-------17,https://miro.medium.com/v2/resize:fill:140:140/1*u7jRau67TYNrgpQPlxf2uQ.png,web3 1080,782,Singsing: Web3 Social App That Reward For User Singing,"Introduction Sing and Earn is one of the special models of the SingSing music platform, combining Game-Fi and Social-Fi elements for the community that loves singing and wants to connect with people with similar interests. Here, users equip themselves with NFT Microphone to be able to sing Karaoke for income. Sing…",https://medium.com/@bagasady/singsing-web3-social-app-that-reward-for-user-singing-ad880d5ab1bb?source=topics_v2---------161-84--------------------7d77ffc3_55fe_47ea_a346_fbba7d1b8917-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*aDcDh1EN1EO0PHngc5dyIA.gif,web3 1081,867,AMA Recap: How Can Web3 Have a Positive Impact on the Environment,"What happens when the Web3 environment meets the, well, actual environment? In a recent Twitter AMA (“Ask Me Anything”), AAG co-founder and CEO Jack Vinijtrongjit discussed the world-changing potential of Carbify, a self-described “NFTree” carbon debit and gaming company, with two of its co-founders, Jaap Harmsma and William ten Zijthoff. …",https://medium.com/@aagventures/ama-recap-how-can-web3-have-a-positive-impact-on-the-environment-66bfb6265708?source=topics_v2---------162-84--------------------7d77ffc3_55fe_47ea_a346_fbba7d1b8917-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yy48rfLTKQ6e9iX64aXeYQ.png,web3 1082,868,RISING CAPITAL X ZOKYO PARTNERSHIP ANNOUNCEMENT,"We at Rising Capital are excited to announce our partnership with Zokyo. Zokyo secures, builds, and funds legendary Web3 Companies. Zokyo offers blockchain security, design, and development talent to startups and enterprise organizations as needed. …",https://medium.com/rising-capital/rising-capital-x-zokyo-partnership-announcement-d299da87c422?source=topics_v2---------163-84--------------------7d77ffc3_55fe_47ea_a346_fbba7d1b8917-------17,https://miro.medium.com/v2/resize:fill:140:140/1*In5Inc3r4PLttzgGUr-k3A.png,web3 1083,869,Blue Willow: The Free Alternative to MidJourney,"What is the alternative to Midjourney? Are you tired of MidJourney’s recent problems with their trial version? Look no further than Blue Willow, the free alternative for AI-generated images. Blue Willow is an excellent choice for those who want to create stunning images with minimal effort. This AI-powered tool uses cutting-edge technology to generate images that…",https://medium.com/design-bootcamp/blue-willow-the-free-alternative-to-midjourney-283791973ede?source=topics_v2---------164-84--------------------7d77ffc3_55fe_47ea_a346_fbba7d1b8917-------17,https://miro.medium.com/v2/resize:fill:140:140/1*VLzJrfVxNo7SvySuEuch7Q.png,web3 1084,870,impactMarket Announces Partnership with DWF Labs,"Joining forces to empower financially underserved communities worldwide through Web3. impactMarket, the leading web3 protocol for financial inclusion and literacy, is proud to announce its partnership with DWF Labs, the leading global digital asset market maker, and investment firm focused on supporting innovative startups that are building the future of…",https://medium.com/impactmarket/impactmarket-announces-partnership-with-dwf-labs-ee1e0dc1f71?source=topics_v2---------165-84--------------------7d77ffc3_55fe_47ea_a346_fbba7d1b8917-------17,https://miro.medium.com/v2/resize:fill:140:140/0*FUGGwZAAdL-SU8bh,web3 1085,808,Push Protocol ($PUSH) is Now Listed On Crypto.com!,"We’re glad to share that Push Protocol ($PUSH) is now listed in the Crypto.com App, one of the biggest exchanges in the US with over 80 million customers. Crypto.com App users can now purchase PUSH with USD, EUR, GBP, and 20+ fiat currencies, and spend it at over 80 million…",https://medium.com/push-protocol/push-protocol-push-is-now-listed-on-crypto-com-263356d5a3ba?source=topics_v2---------166-84--------------------7d77ffc3_55fe_47ea_a346_fbba7d1b8917-------17,https://miro.medium.com/v2/resize:fill:140:140/0*kVa956SVT1vWsg4Y,web3 1086,871,"Blade Labs Launches Suite of White Label Wallet Products for Android, iOS and Unreal Engine to Accelerate Web3 Adoption by Enterprises","Singapore — March 30, 2023 — Blade Labs, Hedera’s leading wallet infrastructure provider, and the creators of the best in class enterprise grade Blade Wallet, are proud to announce the launch of their suite of SDK integration products to further accelerate Web3 adoption. With the help of these new products…",https://medium.com/@ints_55266/blade-labs-launches-suite-of-white-label-wallet-products-for-android-ios-and-unreal-engine-to-5ae00a40df3d?source=topics_v2---------167-84--------------------7d77ffc3_55fe_47ea_a346_fbba7d1b8917-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SckJHH2hE5DMcQRnvpKiYg.png,web3 1087,872,PuffGo Official is Here! Skill to Earn in the Offseason First!,The most anticipated PuffGo Official is here!! Have you been following Puff in the past weeks to learn each and every detail about the official? Are you fully prepared with your understanding of the PuffGo and strategic mindsets to Skill to Earn? As the days of the Offseason start first…,https://medium.com/@Puffverse/puffgo-official-is-here-skill-to-earn-in-the-offseason-first-9ba83b046e4e?source=topics_v2---------168-84--------------------7d77ffc3_55fe_47ea_a346_fbba7d1b8917-------17,https://miro.medium.com/v2/resize:fill:140:140/1*XCnHobeRHee9PX2zcDKgaA.png,web3 1088,873,Application-specific Bridge Contracts: Building a Bridge to the Future of Blockchains,"Router Protocol is a leading pioneer in cross-chain initiatives, developing a secure, scalable, modular, and composable framework for enabling interoperability across blockchain networks. The project’s Layer 1 blockchain, Router Chain, leverages Cosmos’ Tendermint as its validation mechanism. …",https://medium.com/@routerprotocol/application-specific-bridge-contracts-building-a-bridge-to-the-future-of-blockchains-528649bf4389?source=topics_v2---------169-84--------------------7d77ffc3_55fe_47ea_a346_fbba7d1b8917-------17,https://miro.medium.com/v2/resize:fill:140:140/1*iSB2yeNft0KxslMIkg45kw.jpeg,web3 1089,874,Digital Asset Licensing Law — The good and the bad,"Senator Andrew Bragg entered a new Bill into parliament this week. As with all new announcements like this, there was a media release. Senator Andrew Bragg | New Bill to Regulate Crypto Australia is losing the race to regulate digital assets. That is why I have introduced a Private Senator's Bill, the…www.andrewbragg.com The full bill is here https://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/Bills_Search_Results/Result?bId=s1376",https://medium.com/notcentralised/digital-asset-licensing-law-the-good-and-the-bad-2aa46958bb6b?source=topics_v2---------170-84--------------------7d77ffc3_55fe_47ea_a346_fbba7d1b8917-------17,https://miro.medium.com/v2/resize:fill:140:140/1*FV7E4C817hqoZmTiznHA2w.png,web3 1090,875,3 steps to realize the Metaverse,"We keep hearing about the Metaverse “coming soon.” But the more people you ask, the more Metaverse definitions you get. If we can’t decide on what it actually means, how do we create it? At Dandelion, we are building a blockchain to fully realize the Metaverse, so it’s no wonder…",https://medium.com/@dandelionnetworks/3-steps-to-realize-the-metaverse-bd596fb8610?source=topics_v2---------171-84--------------------8d2530c5_d65a_460a_b67d_cd7db730311c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rKbYkO1GtQWK7I8p2XGqDA.png,web3 1091,876,Ripe’s Liquidation System,"The lines of defense to help bolster solvency — Ripe is designed to support a wide variety of assets (whether monkey pictures, your sneakers, or your house). Its liquidation system can’t be like other DeFi protocols — it’s just too different. Designing this system has required fresh perspectives and new thinking. …",https://medium.com/ripe-finance/ripes-liquidation-system-d52402d76bd1?source=topics_v2---------172-84--------------------8d2530c5_d65a_460a_b67d_cd7db730311c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*f_HE32-LMT5CqUCxihDZdg.png,web3 1092,877,Web 3 Industry,Part 11 Emillion Reality journalism of the “Talent of the web 3 industry” I will write about everyone who agreed to participate in reality medium and develop a new direction as real-time journalism based on web 3 together with medium My next talent is a designer and artist Gintare Kunčiūnaitė…,https://medium.com/@emillion-manager/web-3-industry-854a83ec5d1c?source=topics_v2---------173-84--------------------8d2530c5_d65a_460a_b67d_cd7db730311c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*uSEx42EN6JT8Yoe8MOm1VA.png,web3 1093,878,Drunk Robots update,"Yo everyone, we’ve been working on a full system update in preparation for the upcoming new features, here you can read more about what’s planned next in case you missed it. So what updates have been made, and how does it affect your gaming experience? Firstly, everything should work faster…",https://medium.com/@drunk-robots/drunk-robots-update-85c27bceffe2?source=topics_v2---------174-84--------------------8d2530c5_d65a_460a_b67d_cd7db730311c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ZRz5p4WjJi_-QmsVseZWtQ.jpeg,web3 1094,838,ZKSync Era Testnet Airdrop Guide,A details guide on ZKSync Era testnet potential airdrop guide. In this guide we will use some Dapps to increase our chance for ZKSync Airdrop.Created a new Telegram Channel for more airdrop opportunity . Also I am there always to support you guy Wallet Setup: Getting started: As the testnet is running…,https://medium.com/@ggenshin/zksync-era-testnet-airdrop-guide-a076c6ed290?source=topics_v2---------175-84--------------------e2a9a865_ea9f_47c5_b562_f688065edf06-------17,https://miro.medium.com/v2/resize:fill:140:140/0*_4YZHXWccgBivrAZ,web3 1095,879,Decoding Kokomo Finance $4 Million Rug Pull | QuillAudits,"Oh, Kokomo Finance? Just another day in the world of cryptocurrency, I suppose. On March 26, 2023, Kokomo Finance executed an exit scam (Rug Pull) and took $4 million of user funds. They immediately deleted both their website and all of their social media profiles following the scam. Vulnerability Analysis & Impact: On-chain Details: Deployer Address…",https://medium.com/coinmonks/decoding-kokomo-finance-4-million-rug-pull-quillaudits-d5d027522bf3?source=topics_v2---------176-84--------------------8de24e22_f90c_48a9_b00d_8cec3dc04d41-------17,https://miro.medium.com/v2/resize:fill:140:140/1*d1RQmjXe2SlP0FSWYGwtvQ.png,web3 1096,838,Fuel Network “ Beta-3” Testnet | Potential airdrop,"Created a new Telegram Channel for more airdrop opportunity . Also I am there always to support you guy Introduction Blockchain technology has shown immense potential in revolutionizing various industries. However, one of the biggest hurdles faced by blockchain technology is its scalability. The increase in transaction throughput brought about by rollup protocols is still modest, and during high transaction volume periods, the fees are still high. Fuel Network…",https://medium.com/@ggenshin/fuel-network-beta-3-testnet-potential-airdrop-8a4b3ce70e41?source=topics_v2---------177-84--------------------8de24e22_f90c_48a9_b00d_8cec3dc04d41-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Xclk1sqL6a2sAUnk.png,web3 1097,880,Headquarters in Hong Kong: Leading the Way in Hybrid Commerce Innovation,"Exciting news from RE:DREAMER! We are proud to announce our expansion and relocation of headquarters to Hong Kong, cementing our position as a leading commerce innovator in the industry. …",https://medium.com/@redreamer.io/headquarters-in-hong-kong-leading-the-way-in-hybrid-commerce-innovation-5cdce9ddc237?source=topics_v2---------179-84--------------------8de24e22_f90c_48a9_b00d_8cec3dc04d41-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pE7iiv8bMi5ybz3splE_jg.jpeg,web3 1098,863,PERPLAY Unveils Genesis NFT Minting Schedule,"Be one of the pioneer owners of Genesis NFTs from PERPLAY, the world’s first Game-and-Earn platform On April 18th-19th, PERPLAY NFTs can be purchased on the PERPLAY minting page, HAVAH, Pala, ALTAVA, and Hypermarket marketplaces March 31st, 2023 — PERPLAY, the world’s first Game-and-Earn (G&E) platform, announced that it will…",https://medium.com/@PERPLAY/perplay-unveils-genesis-nft-minting-schedule-71460b91cae7?source=topics_v2---------180-84--------------------8de24e22_f90c_48a9_b00d_8cec3dc04d41-------17,https://miro.medium.com/v2/resize:fill:140:140/g:fp:0.52:0.64/0*m98hg4fvL27obnlh,web3 1099,881,Set a new course for the gaming industry with Energy8: earning and entertainment on the blockchain platform,Energy8 (E8) is a gaming token created on the blockchain technology. The Energy8 project is a large gaming ecosystem that provides users with the opportunity to earn E8 tokens by participating in various games and tasks on the platform. …,https://medium.com/@mamate/set-a-new-course-for-the-gaming-industry-with-energy8-earning-and-entertainment-on-the-blockchain-f871829b9190?source=topics_v2---------181-84--------------------8de24e22_f90c_48a9_b00d_8cec3dc04d41-------17,https://miro.medium.com/v2/resize:fill:140:140/1*UW0AFrb2ZizLQhds4SysUQ.png,web3 1100,838,Starknet — Airdrop Guide,"Created a new Telegram Channel for more airdrop opportunity . Also I am there always to support you guy StarkNet is a decentralized Validity-Rollup without permissions (often called ZK-Rollup). StarkNet received $273 million from Sequoia Capital, Coinbase Ventures, Paradigm, Polychain, Intel, Pantera Capital and others. Transferring ETH to the StarkNet…",https://medium.com/@ggenshin/starknet-airdrop-guide-693da6852847?source=topics_v2---------182-84--------------------8de24e22_f90c_48a9_b00d_8cec3dc04d41-------17,https://miro.medium.com/v2/resize:fill:140:140/0*x9IcnPYJRvleKbJY.png,web3 1101,882,Entity Project Dialogues: First Half Summary,"At the midway point of our Project Dialogues series, we wanted to showcase some of the most exciting moments so far. Discover the most useful insights, the most interesting quotes, and a special preview of what’s to come in the next months! Bringing the community together If you are familiar with MultiversX, you know…",https://medium.com/@EntityFinance/entity-project-dialogues-first-half-summary-41cd7aaae4f9?source=topics_v2---------183-84--------------------8de24e22_f90c_48a9_b00d_8cec3dc04d41-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9ONYuATYRrsjZecF43omIA.png,web3 1102,883,Carbon Credit NFTs: An Increasingly Popular Real-world Use Case that You Should Know About!,"Exploring the Intersection of Carbon Credits and NFTs — With the world facing immense threats from climate change, various measures have been in place to combat the problem. From individuals to corporations and nations, everyone is contributing to conserving the environment as much as possible. Let us consider the case of industries and corporations — most of them utilize…",https://medium.com/cryptostars/carbon-credit-nfts-an-increasingly-popular-real-world-use-case-that-you-should-know-about-3764ecc03640?source=topics_v2---------184-84--------------------8de24e22_f90c_48a9_b00d_8cec3dc04d41-------17,https://miro.medium.com/v2/resize:fill:140:140/1*AnJVs8A8r7eEgWKiTMqtoA.jpeg,web3 1103,848,Hong Kong Web3 Festival DeFi Session: A Deep Dive into DeFi 2.0,"Co-hosted by Wanxiang Blockchain Labs and HashKey Group, and organised by W3ME, the Hong Kong Web3 Festival 2023 will take place from April 12 to 15. HONG KONG, March 31, 2023 — The Hong Kong Web3 Festival 2023 will host in-depth discussions on various core Web3 topics, providing attendees with…",https://medium.com/hashkey-group/hong-kong-web3-festival-defi-session-a-deep-dive-into-defi-2-0-b097eba80ec2?source=topics_v2---------185-84--------------------8de24e22_f90c_48a9_b00d_8cec3dc04d41-------17,https://miro.medium.com/v2/resize:fill:140:140/1*dERISnlhXmVrQQLpXU6VJA.png,web3 1104,884,Implementing basic security in your SOAP web services,"(A Fresher and a TechLead are in conversation about how to wrap their SOAP web services with basic security measures) Fresher: So how do we actually do this? TechLead: How do we actually do what? Fresher: How do we layer our SOAP web-services with standard security? TechLead: Ok, now you’re asking the question right Fresher: (faintly smiles in agreement) :-P",https://medium.com/@shivamg381/implementing-basic-security-in-your-soap-web-services-d97c88f1af81?source=topics_v2---------2-84--------------------285bdaff_c055_47e1_9f66_47749ae7f754-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qdBJ3DAFgpQaYI2lfWJkXw.jpeg,security 1105,885,Transparency|Muverse Quarterly Transparency Report-2023 Q1,"This report is intended to provide transparency on the distribution and use of MU & MCT Token, tokens created by Muverse. The report covers the period from Oct 1, 2022 to March 31, 2023. MU Token The MU Token is Muverse’s platform token. MU token has a maximum supply of…",https://medium.com/@Muverse/transparency-muverse-quarterly-transparency-report-2023-q1-48dc2d1bee55?source=topics_v2---------3-84--------------------285bdaff_c055_47e1_9f66_47749ae7f754-------17,https://miro.medium.com/v2/resize:fill:140:140/1*KU_JOIFBh_w-XYM92mQc4g.png,security 1106,886,May the force be with you — security !,"Hello everyone! I’m Mario Cuomo, a Cloud Solution Architect at Microsoft! I mainly expertise area is cybersecurity but I love everything connected to the world of Information Technology. I have always believed in the spirit of sharing. “The way you create opportunities in your life is by sharing what you know…",https://medium.com/@mariocuomo/may-the-force-be-with-you-security-7c510dd028e2?source=topics_v2---------4-84--------------------285bdaff_c055_47e1_9f66_47749ae7f754-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_Lr5PFJgGFv93ur-ZJ7jWA.png,security 1107,887,"To Display Stature, China Learns from the Ukraine War","Commentary — In recent time, China has been trying to garner capacity to reshape the international order. The Ukraine war has turned into China’s study topic, specifically regarding insights about logistics, threat, hybrid warfare, economic sanctions, tech bans, cyber warfare, information war, reliable intelligence and nuclear tensions.",https://medium.com/strategic-lenses-international-law-international/to-display-stature-china-learns-from-the-ukraine-war-54dc8e4eb072?source=topics_v2---------6-84--------------------285bdaff_c055_47e1_9f66_47749ae7f754-------17,https://miro.medium.com/v2/resize:fill:140:140/0*E9OKXnjX8525SR3m,security 1108,888,Are open-source NPM packages always secure to use?,"Node.js has a rich ecosystem of open-source packages available through the npm registry. These packages provide developers with pre-built functionalities that can be easily incorporated into their applications. However, many of these packages may contain security vulnerabilities that can be exploited by attackers — Introduction Node.js is a widely used platform for building web applications, but like any software platform, it is not immune to security vulnerabilities. In this blog post, we will discuss more about the vulnerabilities of open-source packages of Node.js on NPM.",https://medium.com/@techwithharry/are-open-source-npm-packages-always-secure-and-safe-to-use-215e9d3902be?source=topics_v2---------7-84--------------------285bdaff_c055_47e1_9f66_47749ae7f754-------17,https://miro.medium.com/v2/resize:fill:140:140/1*GdCM-pLCJxLjd2eIHDw32Q.png,security 1109,889,How does JWT work? is HS256 the best option?,"Let’s deep dive into the details. JWT has been there for years. as a mature authentication standard, there is a lot of really great information out there that explains what a JWT is. In this article I’d like to discuss the flow of the authentication by using JWT, and the…",https://medium.com/@iorilan/how-does-jwt-work-is-hs256-the-best-option-6cd9463da7b3?source=topics_v2---------8-84--------------------285bdaff_c055_47e1_9f66_47749ae7f754-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ggm28dHPaLJJ23WLeCApvw.png,security 1110,890,"It’s 2023, stop leaking secrets in google colab! Part 2","Here’s the link to part one. It’s 2023, stop leaking secrets in google colab! Stop revielening your secrets when using google colab!medium.com Using environment variable files, also known as .env files, is important for several reasons: Security: .env files allow you to store sensitive information like passwords, API keys, and other credentials in a separate file outside of your codebase. …",https://medium.com/@maxwell.langford/its-2023-stop-leaking-secrets-in-google-colab-part-2-8215d47a76f2?source=topics_v2---------9-84--------------------c4440be5_7266_4905_8dca_b069a6508c0c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*q7qMJ1hu9rF52RD-,security 1111,891,what | where | how | tools for ( SQL Injection) Vulnerabilities,"What is SQL injection? — SQL injection is a type of injection attack that exploits vulnerabilities in web applications that use SQL databases. This vulnerability arises when a web application fails to sanitize or validate user input, which allows an attacker to insert malicious SQL code into a query where you can find sqli vulberability ? in any input field that is…",https://medium.com/@hamedjangi/what-where-how-tools-for-sql-injection-vulnerabilities-775ee58d74b4?source=topics_v2---------12-84--------------------c4440be5_7266_4905_8dca_b069a6508c0c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*h2Vk2phLrhkuJQMZ7hOFyQ.png,security 1112,892,The Power of Data: Understanding Its Impact and Applications Across Various Domains,"Introduction Data is a vital resource in today’s world, driving a multitude of industries and decision-making processes. This article aims to highlight the importance of data, its diverse applications, and how it contributes to various sectors, such as commercial operations, security (OSINT), and business decisions. Outline Why Data Matters Applications of Data …",https://medium.com/@jonathanmondaut/the-power-of-data-understanding-its-impact-and-applications-across-various-domains-6b3c2b2f1ca3?source=topics_v2---------13-84--------------------c4440be5_7266_4905_8dca_b069a6508c0c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*mhnymv1GvV1gJve_gBeTiQ.jpeg,security 1113,893,AWS EKS : External Secrets With Vault,"Managing external secrets securely is a crucial aspect of any organization’s security infrastructure. Secrets like passwords, API keys, and certificates need to be protected from unauthorized access and usage. To ensure this protection, organizations use various tools and techniques, one of which is Hashicorp Vault. Hashicorp Vault is a popular…",https://medium.com/@patelsaheb/aws-eks-external-secrets-with-vault-fdbfe31670b8?source=topics_v2---------16-84--------------------c4440be5_7266_4905_8dca_b069a6508c0c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LCsXwrRS0_iERp11Mho9pg.png,security 1114,894,Invariant Testing — Enter The Matrix,"The Invariant test suite we created for the security audit mentioned in this article is available on GitHub. To learn more about smart contract security and audits, visit Cyfrin.io. A list of our public audit reports can be found here. Neo taught us that there are two realities: Base Reality…",https://medium.com/@alexroan/invariant-testing-enter-the-matrix-c71363dea37e?source=topics_v2---------17-84--------------------99e9844a_a230_4e1d_8577_3e05c2def333-------17,https://miro.medium.com/v2/resize:fill:140:140/0*RayNKVOG7UzvRccm,security 1115,895,Making Smart Cities Safe Cities,"In today’s information age, smart cities are becoming more prevalent in urban development. With the rise of digital-based technologies, including automated security systems and advanced infrastructure sensors, it is now possible to have much greater control over city environments. However, making these smart cities truly safe also requires a combined…",https://medium.com/@rob_36401/making-smart-cities-safe-cities-6655e8e6fd43?source=topics_v2---------18-84--------------------99e9844a_a230_4e1d_8577_3e05c2def333-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tF9DXYGnrCTugKX5h5FZjw.png,security 1116,896,A Comprehensive Guide SSL and TLS Protocols: Key Features and Differences,"In this article, I will explain the key features and differences between SSL and TLS protocols. Click to become a medium member and read unlimited stories! Concepts and History Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols designed to provide secure communication over a computer network, such as the…",https://medium.com/@ramseyjiang_22278/a-comprehensive-guide-ssl-and-tls-protocols-key-features-and-differences-6558d9629b93?source=topics_v2---------23-84--------------------99e9844a_a230_4e1d_8577_3e05c2def333-------17,https://miro.medium.com/v2/resize:fill:140:140/1*XxQ5Xo7khZ4q_vgfJh5uyw.png,security 1117,897,My twitter account has been hacked,At around 4:30am GMT today (Friday 31st March) my Twitter account was hacked. Over three minutes I received alerts about a login from the US and follow-ups to say my password and email address have been changed. I can’t login to my Twitter account to regain control. I’ve written to…,https://medium.com/@jamestplunkett/my-twitter-account-has-been-hacked-67585032bfc4?source=topics_v2---------24-84--------------------99e9844a_a230_4e1d_8577_3e05c2def333-------17,https://miro.medium.com/v2/resize:fill:140:140/1*iqEXZl_gQyMjplYIix4CYg.png,security 1118,333,"Tamper-proof Records — When data is stored on the blockchain, it is cryptographically secured and enforced with smart contracts. This means that once data has been recorded on the blockchain, it is protected by its decentralized architecture and cannot be changed or tampered with.",Tamper-proof Records: The Benefits of Leveraging Blockchain Technology The proliferation of digital data and the need for secure record keeping has made blockchain technology an increasingly popular solution. …,https://medium.com/@abdullahabrar102/tamper-proof-records-when-data-is-stored-on-the-blockchain-it-is-cryptographically-secured-and-85672939fc67?source=topics_v2---------26-84--------------------99e9844a_a230_4e1d_8577_3e05c2def333-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QYurK-5gAhGrL6XkZeMBbQ.png,security 1119,898,Analyze Your Code With SonarCloud,"Static analysis and code coverage for DotNet and JavaScript projects I’m a big fan of automated tools for analyzing code quality. Alongside great open source products like ESlint and Roslyn Analyzers, I also find it useful to implement commercial products like SonarCloud. For today’s blog post I will walk through…",https://medium.com/codex/analyze-your-code-with-sonarcloud-and-teamcity-4b387ecff0e?source=topics_v2---------28-84--------------------9f82a164_551b_4874_85e2_1b39b7cfb3c9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*n7gY3BNQhGbqyWFCRGJxeQ.png,security 1120,899,Ensuring the safety & security of users & Zetsy.,There are several cyber threats that can affect an Zetsy and our users. Some of the common ones are: Phishing attacks: Hackers can use phishing attacks to steal login credentials or sensitive information from users. These attacks can be prevented by being an educated users about the risks of clicking…,https://medium.com/zetsy/ensuring-the-safety-security-of-users-zetsy-aaf2df1e259e?source=topics_v2---------29-84--------------------60acbe81_d813_47bc_8eaf_a02678b69993-------17,https://miro.medium.com/v2/resize:fill:140:140/0*srrVI9u1k0NL3VHF,security 1121,900,Hacking Vulnerable Apache Servers with Metasploit,"Metasploit is a popular penetration testing framework that can be used to identify vulnerabilities in a target system. In this tutorial, we’ll walk through the steps of using Metasploit to hack a vulnerable Apache server. Before we begin, it’s important to note that this tutorial is for educational purposes only…",https://medium.com/@richard-gray/hacking-vulnerable-apache-servers-with-metasploit-10a8505dbf8e?source=topics_v2---------30-84--------------------60acbe81_d813_47bc_8eaf_a02678b69993-------17,https://miro.medium.com/v2/resize:fill:140:140/1*uGg76bfePtKQrsCOSkXu2A.png,security 1122,901,A Brief History of Zero Knowledge in Five Seminal Papers,Some of the major breakthroughts in zk research that are now powering blockchain innovations. — Zero-Knowledge(zk) technologies have been at the center of the crypto ecosystem in the last few months. The recent launch of Polygon’s zkEVM mainnet beta as well as the continuous efforts in layer 2 blockchains are projecting a picture in which zk technologies become one of the core building blocks of…,https://medium.com/intotheblock/a-brief-history-of-zero-knowledge-in-five-seminal-papers-bf5bdd047c69?source=topics_v2---------31-84--------------------60acbe81_d813_47bc_8eaf_a02678b69993-------17,https://miro.medium.com/v2/resize:fill:140:140/0*w5P45Pm1VaMrNYVr.png,security 1123,422,Unleashing the AI Beast: Microsoft Security Copilot Takes Flight!,"Are you looking for a way to make your security operations more effective and efficient? If yes, consider harnessing the power of artificial intelligence (AI) with Microsoft Security Copilot. Let’s get started! What is Microsoft Security Copilot? Microsoft Security Copilot is an Artificial Intelligence (AI) powered automated security assistant that helps organizations stay safe and…",https://medium.com/mitigated-io/unleashing-the-ai-beast-microsoft-security-copilot-takes-flight-7ce341d09a17?source=topics_v2---------32-84--------------------60acbe81_d813_47bc_8eaf_a02678b69993-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gOKvT_oiOQlgknFKdxjOGQ.jpeg,security 1124,902,Your Ultimate Guide to Choosing the Perfect Wallet,"The main function of a crypto wallet is to provide the owners with safe and easy access to their cryptocurrency funds. But how to choose the right wallet? Let’s find out! Features of Crypto Wallets When choosing a wallet, it is important to understand that cryptocurrency is stored in the blockchain, but not in…",https://medium.com/@SlaviDapp/your-ultimate-guide-to-choosing-the-perfect-wallet-1d214fe4e909?source=topics_v2---------33-84--------------------60acbe81_d813_47bc_8eaf_a02678b69993-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*SDANoY8DaaIhSfohRbdg8Q.gif,security 1125,903,Protecting Routes in React with react-router,"Hey my gorgeous friends from the internet. Today we’ll see see how to protect routes in our react apps. But what does it mean to protect routes? Well, to better understand this we’ll compare public and private routes. Let’s go… Public route: A public route in any route in our…",https://medium.com/@ryanmambou/protecting-routes-in-react-with-react-router-e555a868dbf0?source=topics_v2---------34-84--------------------60acbe81_d813_47bc_8eaf_a02678b69993-------17,https://miro.medium.com/v2/resize:fill:140:140/0*T6ZGk4zouZ9Xim3x.jpg,security 1126,904,Friday design & tech round-up — are leading AI experts right to ask for a pause in the AI race?,This week’s design and tech round-up addresses the key considerations from the debate on the future of AI. It follows an open letter signed this week by AI researchers and experts requesting a pause to AI experiments. 1. Bias in AI The discussions following the release of the open letter have centred around the…,https://medium.com/@dotcentric/friday-design-tech-round-up-are-leading-ai-researchers-right-to-ask-for-a-pause-in-the-ai-race-1acc06db365a?source=topics_v2---------35-84--------------------60acbe81_d813_47bc_8eaf_a02678b69993-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EYh3xksYgojETyvGbghDgg.png,security 1127,905,ParaSpace and Secure3 Join Forces in a Strategic Security Partnership,"We are excited to announce our strategic partnership with ParaSpace, the first on-chain cross margin NFT Fi protocol. …",https://medium.com/@Secure3/paraspace-and-secure3-join-forces-in-a-strategic-security-partnership-b1361b505dbf?source=topics_v2---------36-84--------------------60acbe81_d813_47bc_8eaf_a02678b69993-------17,https://miro.medium.com/v2/resize:fill:140:140/0*x7QO0BbmKtJeSYYy,security 1128,889,These 3 basic Concepts I always see much Junior dev confused with,"Encoding VS hashing VS encryption I have always been asked, online and offline. Why must use UTF-8 instead of ASCII? Why use base64 encoding here instead of URL encoding? And how is it different from UTF-8 encoding? why encoding can not be used for encryption purposes? …",https://medium.com/@iorilan/these-3-basic-concepts-i-always-see-much-junior-dev-confused-with-1837f4ad279e?source=topics_v2---------37-84--------------------60acbe81_d813_47bc_8eaf_a02678b69993-------17,https://miro.medium.com/v2/resize:fill:140:140/1*imbQ1kxoTknK8zCZeUrLrg.png,security 1129,906,LogRhythm Setup with AWS,Architecture: Procedure: Step 1: Create S3 bucket in Security-IRM. Set following bucket policy to allow CloudTrail to check the bucket ACLs and put objects in specific S3 paths: Create a lifecycle configuration rule to have 1 day retention. Step 2: Create SNS in Master Account. Append the following Access…,https://medium.com/@harikiranvusirikala/logrhythm-setup-with-aws-8ff00bd29b49?source=topics_v2---------38-84--------------------7ebe9850_b3f0_48ea_ab35_51231fc0e1db-------17,https://miro.medium.com/v2/resize:fill:140:140/1*KdWE1GqagElVdrA5e4N5Lg.png,security 1130,907,How to Remove a Hacker from My Phone,Phone hacking has become an increasingly prevalent issue in today’s digital age. It refers to the unauthorized access of a phone’s data and features by an individual or group of individuals. …,https://medium.com/ask-brothers/how-to-remove-a-hacker-from-my-phone-1aa70a007b?source=topics_v2---------39-84--------------------7ebe9850_b3f0_48ea_ab35_51231fc0e1db-------17,https://miro.medium.com/v2/resize:fill:140:140/1*I428vJy_ptpYmmHVshkEIg.png,security 1131,908,Privacy in the Age of A.i. : Part 3,"Ongoing multi-part series — A.i. and Privacy: Part 1: Dangers of Giving A.i. Access to PII Part 2: OpenAi Lacks Privacy Provisions Ai Can Be Used To Generate Fake News And Misinformation Artificial intelligence (AI) has been a powerful tool in the advancement of technology and innovation, but unfortunately, it has also been used for malicious purposes such as generating…",https://medium.com/@soltrinox/privacy-in-the-age-of-a-i-part-3-806cc84a58dc?source=topics_v2---------40-84--------------------7ebe9850_b3f0_48ea_ab35_51231fc0e1db-------17,https://miro.medium.com/v2/resize:fill:140:140/0*6X-1LDFylGDHzkzu,security 1132,909,Strimzi Kafka with Traefik Ingress and a custom CA,"Introduction When deploying Apache Kafka on Kubernetes, Strimzi makes it easy to configure Kafka listeners with TLS encryption. But, with default settings, these listeners will only use certificates signed by the internal self-signed certification authority generated by Strimzi. Fortunately, you can create and deploy your own SSL certificates using cert-manager. You…",https://medium.com/@serg-digitalis/strimzi-kafka-with-traefik-ingress-and-custom-ca-bc6d6b6926f0?source=topics_v2---------41-84--------------------7ebe9850_b3f0_48ea_ab35_51231fc0e1db-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xYGQ-ZajCMVcDAgaGv9nvw.png,security 1133,910,Demystifying the OAuth 2.0 Workflow: A Step-by-Step Guide in 10 Simple Steps,"“Simplicity is the ultimate sophistication.” — Leonardo da Vinci OAuth 2.0 has become a widely adopted protocol for authorization, particularly in the world of web and mobile applications. The protocol provides a standardized way for third-party applications to access user data without requiring the user to provide their login credentials…",https://medium.com/@asishmm/demystifying-the-oauth-2-0-workflow-a-step-by-step-guide-in-10-simple-steps-665a40558a1f?source=topics_v2---------42-84--------------------7ebe9850_b3f0_48ea_ab35_51231fc0e1db-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9oneeFSro9jEhtkoA3QcRw.jpeg,security 1134,911,“10 Ways Blockchain is Changing the Way We Live and Work”,"Blockchain technology has taken the world by storm over the past few years. Originally developed as a way to track digital currency transactions, blockchain has evolved into a powerful tool that is changing the way we live and work. Here are ten ways that blockchain is transforming industries and disrupting…",https://medium.com/coinmonks/10-ways-blockchain-is-changing-the-way-we-live-and-work-d4e1f3af6064?source=topics_v2---------43-84--------------------7ebe9850_b3f0_48ea_ab35_51231fc0e1db-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9InTdytyLFReoMhqF1m80Q.jpeg,security 1135,912,ChatGPT For Security Engineers: Leveraging AI to Enhance Security Operations,"In today’s world, the need for strong security measures has become crucial for any organization. The growing complexity of cyber threats requires security engineers to stay up-to-date with the latest trends and best practices in cybersecurity. However, with the advent of artificial intelligence (AI) models like ChatGPT, the task of…",https://medium.com/@alimuraat/chatgpt-for-security-engineers-leveraging-ai-to-enhance-security-operations-21947d1fd90a?source=topics_v2---------44-84--------------------7ebe9850_b3f0_48ea_ab35_51231fc0e1db-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ixIoiglJO3838Tx9-YkhXA.jpeg,security 1136,913,Safemoon hack analysis — Improper Access control,"Overview On March 28, 2023, an incident happened on the Safemoon token pair, allowing an attacker to burn the majority of tokens due to an improper access control vulnerability and gain $8.9 million. This vulnerability was getting detected in our tool SolidityScan. Signup for a free trial at https://solidityscan.com/signup. Smart Contract…",https://medium.com/solidityscan/safemoon-hack-analysis-improper-access-control-abb2a86feb9?source=topics_v2---------45-84--------------------7ebe9850_b3f0_48ea_ab35_51231fc0e1db-------17,https://miro.medium.com/v2/resize:fill:140:140/0*XO7CqsHFeKulNcyI,security 1137,914,API Security Architecture,Today our economy runs on an API (Application Programming Interface). We call it as API economy. API made it possible to communicate between two applications. Here is a simple example to showcase the power of an API — Let’s say that — you feel hungry and ordered food from your…,https://medium.com/@syam.kakumani/api-security-architecture-e507befd93af?source=topics_v2---------46-84--------------------7ebe9850_b3f0_48ea_ab35_51231fc0e1db-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,security 1138,915,Soidity cryptographic functions,"Smart contracts often handle sensitive data and transactions, which require high level of security and privacy. Cryptography is a critical aspect of Solidity programming as it provides a way to secure the data and transactions that are stored and processed in smart contracts. One of the most commonly used cryptographic…",https://medium.com/@joelmachado649/soidity-cryptographic-functions-338730519213?source=topics_v2---------47-84--------------------7ebe9850_b3f0_48ea_ab35_51231fc0e1db-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,security 1139,916,Why Anaconda in Snowpark,"In the “good old times,” when big data was still like the wild west, I ran a project for a client in the manufacturing industry. We ran a legacy Spark cluster on 100 nodes and wrote transformations using PySpark. Our goal was to implement a solution to a non-standard problem…",https://medium.com/snowflake/why-anaconda-in-snowpark-64e142c09277?source=topics_v2---------48-84--------------------57d64ea2_08e3_4037_8b6b_7682deb31208-------17,https://miro.medium.com/v2/resize:fill:140:140/0*B6Yj9qNl95C0-1XE,security 1140,917,UTopia: From Unit Tests To Fuzzing — Fuzzing Weekly CW13,"UTopia: From Unit Tests To Fuzzing: https://research.samsung.com/blog/UTopia-From-unit-tests-to-fuzzing Random Fuzzy Thoughts: https://tigerbeetle.com/blog/2023-03-28-random-fuzzy-thoughts Introducing Microsoft Security Copilot: Empowering defenders at the speed of AI: https://blogs.microsoft.com/blog/2023/03/28/introducing-microsoft-security-copilot-empowering-defenders-at-the-speed-of-ai Weekly Fuzzing Newsletter | Fuzzing Weekly Your weekly updates on fuzz testing.www.fuzztesting.io",https://medium.com/@fuzzingweekly/utopia-from-unit-tests-to-fuzzing-fuzzing-weekly-cw13-74f2489d12c?source=topics_v2---------50-84--------------------9b241b99_95c7_4345_a231_233792431250-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qys9E9IJM6eVXEV21OAQhA.png,security 1141,918,Fortifying EKS API Access: A Guide to Securing Clusters with Squid Proxy and VPN,"Kubernetes has become the go-to platform for container orchestration, as it enables seamless deployment, scaling, and management of containerized applications. However, like any other technology, Kubernetes is not immune to security threats. In fact, Kubernetes clusters can be especially vulnerable to attacks if not properly secured. In this blog post…",https://medium.com/@crueda/fortifying-eks-api-access-a-guide-to-securing-clusters-with-squid-proxy-and-vpn-cdad5e98dc66?source=topics_v2---------51-84--------------------9b241b99_95c7_4345_a231_233792431250-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pKWMkomcDDaPPOf994am1Q.png,security 1142,919,A Comprehensive Guide to Smart Contract Audits,"A smart contract is simply a program that runs on a blockchain. It’s a collection of code (functions) and data (state) that resides at a specific address. The increasing number of these programs, and the growing amount of capital they control, make their security more important than ever. To that…",https://medium.com/chainsafe-systems/a-comprehensive-guide-to-smart-contract-audits-91994f04ca74?source=topics_v2---------52-84--------------------9b241b99_95c7_4345_a231_233792431250-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ttrB2RSoYDF9h8M2Xyz7qQ.png,security 1143,920,No single point of failure since there is no central authority.,"blog title 9 Reasons Why Businesses Should Implement a System of No Single Point of Failure Businesses of all kinds will benefit from implementing a system with no single point of failure. Whether it’s large companies or small startups, having a system ensures that if any component fails, the business…",https://medium.com/@swethathomas31/no-single-point-of-failure-since-there-is-no-central-authority-44274ccf7a39?source=topics_v2---------53-84--------------------9b241b99_95c7_4345_a231_233792431250-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,security 1144,921,Azure Key Vault: Securely Storing and Managing Your Keys,"Dear readers, I am thrilled to see the positive response to my previous stories. Many of you have requested me to write about Azure Key Vault and its best practices for managing and storing cryptographic keys and secrets. …",https://medium.com/@meerzoheb/azure-key-vault-securely-storing-and-managing-your-keys-680cc4092087?source=topics_v2---------55-84--------------------9b241b99_95c7_4345_a231_233792431250-------17,https://miro.medium.com/v2/resize:fill:140:140/1*UQtIVnEGSMcUrl2DgaO1CQ.jpeg,security 1145,922,Balancing Convenience and Security: The Dangers of Relying on Coding Assistants,"Introduction In recent years, coding assistants have become an increasingly popular tool for software developers. OpenAI’s chatbot, ChatGPT, with coding capabilities reached 100 millions users at the end of January. These tools allow developers to save time and increase their efficiency by automating routine tasks and offering suggestions for improving code…",https://medium.com/@julia.wabant/balancing-convenience-and-security-the-dangers-of-relying-on-coding-assistants-9e59d5caccf1?source=topics_v2---------56-84--------------------9b241b99_95c7_4345_a231_233792431250-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kTK5hyppNI7lyDTWxcGr5g.png,security 1146,910,OpenID Connect: The Key to Seamless User Authentication,“Authentication is the key that unlocks the door to a secure digital world.” — Unknown This is a continuation of my previous article OAuth 2.0 . I mentioned OAuth protocol is used for Authorization. There are some reasons why it should be used for Authentication. Lack of standardisation. There is…,https://medium.com/@asishmm/openid-connect-the-key-to-seamless-user-authentication-394d65279571?source=topics_v2---------57-84--------------------9b241b99_95c7_4345_a231_233792431250-------17,https://miro.medium.com/v2/resize:fill:140:140/1*eWNlKCkzUGJlVP8Qgv3A7w.jpeg,security 1147,923,“𝙈𝙞𝙘𝙧𝙤𝙨𝙤𝙛𝙩 𝘿𝙚𝙛𝙚𝙣𝙙𝙚𝙧 𝙛𝙤𝙧 𝘾𝙡𝙤𝙪𝙙”,🎯 Let’s Understand “𝑴𝒊𝒄𝒓𝒐𝒔𝒐𝒇𝒕 𝑫𝒆𝒇𝒆𝒏𝒅𝒆𝒓 𝒇𝒐𝒓 𝑪𝒍𝒐𝒖𝒅” 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗗𝗲𝗳𝗲𝗻𝗱𝗲𝗿 𝗳𝗼𝗿 𝗖𝗹𝗼𝘂𝗱 𝗶𝘀 𝗮 𝗰𝗹𝗼𝘂𝗱-𝗻𝗮𝘁𝗶𝘃𝗲 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝘀𝗼𝗹𝘂𝘁𝗶𝗼𝗻 𝘁𝗵𝗮𝘁 𝗽𝗿𝗼𝘃𝗶𝗱𝗲𝘀 𝗮𝗱𝘃𝗮𝗻𝗰𝗲𝗱 𝘁𝗵𝗿𝗲𝗮𝘁 𝗽𝗿𝗼𝘁𝗲𝗰𝘁𝗶𝗼𝗻 𝗮𝗻𝗱 𝘃𝗶𝘀𝗶𝗯𝗶𝗹𝗶𝘁𝘆 𝗳𝗼𝗿 𝗺𝘂𝗹𝘁𝗶-𝗰𝗹𝗼𝘂𝗱 𝗮𝗻𝗱 𝗵𝘆𝗯𝗿𝗶𝗱 𝗲𝗻𝘃𝗶𝗿𝗼𝗻𝗺𝗲𝗻𝘁𝘀. …,https://medium.com/cloudnloud/-874832168246?source=topics_v2---------58-84--------------------9b241b99_95c7_4345_a231_233792431250-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4spMU0TdOzaXRJEs_GYgug.png,security 1148,923,“Protecting Your Cloud Environment with Microsoft Defender for the cloud”,Let’s Understand ️ 👉Getting Started 👉Secure Score 👉Advisor Recommendations 👉Just in Time VM Access 👉Regulatory Compliance 👉 Environment Settings Getting Started Log in with your Azure account and search Microsoft Defender for the cloud.,https://medium.com/@gefkkd/protecting-your-cloud-environment-with-microsoft-defender-for-the-cloud-ac8697bd6c1c?source=topics_v2---------59-84--------------------1c93a678_0d9f_4ded_98f3_43ae994874ed-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5KzzrlNpP2iKK19VKYYpaQ.png,security 1149,924,Streamlining Azure AD Integration with Azure Kubernetes Service,"Making Authentication a Breeze ( So you can focus on more important things, like coffee) — As an Azure Kubernetes Service (AKS ) cluster operator, it is crucial to managing access and identity to the resources and services. Without proper controls, the user account may have access to resources they shouldn’t, and tracking the credentials used to make changes may become difficult. …",https://medium.com/@walissonscd/streamlining-azure-ad-integration-with-azure-kubernetes-service-21ea7e4c2def?source=topics_v2---------60-84--------------------1c93a678_0d9f_4ded_98f3_43ae994874ed-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EU47BFtG4MU6hNrARPpyew.jpeg,security 1150,925,Top 5 Data Management Trends Taking the Finance Industry by Storm in 2023.,"The finance industry is heavily reliant on data to make informed decisions and manage risk. Whether it’s tracking financial transactions, analyzing market trends, or managing customer information, the ability to effectively manage and utilize data is crucial for success in the industry. With the increasing amount of data being generated…",https://medium.com/@Kaneshwari.Patil/top-5-data-management-trends-taking-the-finance-industry-by-storm-in-2023-a0d0992d5e89?source=topics_v2---------61-84--------------------d3fca565_a045_4fff_9e7d_abc809e6098e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,security 1151,926,What is Decentralized Identity Solution,"In today’s digital age, identity management has become a critical aspect of our daily lives. From accessing online services to confirming our legal status, the need for a reliable and secure way of proving our identity has never been more important. Traditional centralized identity systems rely on a single authority…",https://medium.com/@nfting/what-is-decentralized-identity-solution-e44c1ed1b02d?source=topics_v2---------62-84--------------------d3fca565_a045_4fff_9e7d_abc809e6098e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fkPfPxUrKyFLSejRHT63Aw.png,security 1152,927,6 Key Elements For A Secure Cloud Migration,"Secure cloud migration is possible if you dedicate resources to it from the start. A security-first approach in cloud migration assumes that everything you migrate, refactor, and re-architect produces a highly secure environment, minimizing the risks of a breach, loss of operations, and data leaks.",https://medium.com/@castai/6-key-elements-for-a-secure-cloud-migration-6ad5769c2541?source=topics_v2---------63-84--------------------d3fca565_a045_4fff_9e7d_abc809e6098e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TJgZ_hdbbEd-hyFdTCQWvw.png,security 1153,928,Simplifying Security: Resource-Based Authorization in ASP. NET Core,"A Short guide on how to add Resource-Based Authorization in ASP. NET Core WebAPI — Introduction Resource-based authorization is a security technique used to limit access to resources and content in an application. It allows developers to create policies that determine who can access particular resources and how they are allowed to interact with them. With resource-based authorization, users are only granted access if they meet…",https://medium.com/@niteshsinghal85/simplifying-security-resource-based-authorization-in-asp-net-core-3f70486059d5?source=topics_v2---------64-84--------------------d3fca565_a045_4fff_9e7d_abc809e6098e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tJGQCB7vtF4p_JVvB0Dgbg.png,security 1154,929,Caring for others is caring for ourselves — An Retro-analysis of Euler Attack,"After the recent attack on the Euler protocol, numerous researchers have conducted an extensive analysis of how the attacker executed the attack. However, we noticed that there hasn’t been much exploration regarding the attacker’s motive for choosing this particular attack path. Are there other paths that the attacker could have…",https://medium.com/@zan.top/caring-for-others-is-caring-for-ourselves-an-retro-analysis-of-euler-attack-73d9d3eea9c7?source=topics_v2---------65-84--------------------d3fca565_a045_4fff_9e7d_abc809e6098e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*FwgW0Y5R4zB-N39K.png,security 1155,930,Admina + SOC 2: Making our commitment to security more transparent,"From the outset, we’ve built Admina with an unwavering dedication to security. As a SaaS management platform, our goal is to assist businesses in optimizing software application usage while maintaining the highest security and compliance standards. …",https://medium.com/money-forward-i-engineering-blog/admina-soc-2-making-our-commitment-to-security-more-transparent-bdec4d2b1295?source=topics_v2---------66-84--------------------d3fca565_a045_4fff_9e7d_abc809e6098e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Cw-Ky6yuMBBcuD0_IiBLOA.png,security 1156,931,Building Better Detection Systems: Introducing KRANG at Carta,"Detection engineering is a major function of a modern security operations team, and is roughly a method of threat detection that goes beyond simply writing detection rules; it involves applying a systematic engineering approach to improve the accuracy of threat detection. The objective is to build an automated detection system…",https://medium.com/building-carta/building-better-detection-systems-introducing-krang-at-carta-55b08af5763e?source=topics_v2---------67-84--------------------d3fca565_a045_4fff_9e7d_abc809e6098e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*t4J1gN7s3VD3q5CWuOv9Cg.png,security 1157,932,Integrating Security Tools With Spacelift Using the Custom Inputs,"Security is one of Spacelift’s biggest priorities, and apart from the state-of-the-art security solutions that are embedded inside the product like Policy as Code, Encryption, Single Sign On (SSO), Private Worker Pools, and others, in some organizations, there are tools that engineers were accustomed to and want to have the…",https://medium.com/spacelift/integrating-security-tools-with-spacelift-using-the-custom-inputs-b29a2ee0891f?source=topics_v2---------68-84--------------------d3fca565_a045_4fff_9e7d_abc809e6098e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*xA6IUOvUsSMy1Ho5.png,security 1158,933,Fast-Tracking Incident Detection with User and Entity Behavior Analytics (UEBA),"By Kumar Vikramjeet, Cyber Threat Hunter — Information overload — and false positives — are major challenges in the typical incident response organization. Thanks to the plethora of different security platforms, applications, and tools, security teams with limited resources must sift through an ever-growing mountain of alerts, some of which may include irrelevant data. Not only does…",https://medium.com/adobetech/fast-tracking-incident-detection-with-user-and-entity-behavior-analytics-ueba-733d2b17263d?source=topics_v2---------69-84--------------------d3fca565_a045_4fff_9e7d_abc809e6098e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5P8GeTu63stKuKrEw4M3SQ.jpeg,security 1159,934,Exploring the Dark Side of Self-Destruct in Ethereum Smart Contracts,"I. Introduction Smart contracts have revolutionized the world of decentralized applications and blockchain technology. They have created a new level of transparency and trust in the digital world by enabling the execution of agreements without the need for intermediaries. Ethereum, the second-largest cryptocurrency by market capitalization, has become the go-to platform for…",https://medium.com/@CheshireSec/exploring-the-dark-side-of-self-destruct-in-ethereum-smart-contracts-52adfdecd6b7?source=topics_v2---------70-84--------------------d3fca565_a045_4fff_9e7d_abc809e6098e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ufwmt8TzhIq4NG3_iFXsBw.jpeg,security 1160,935,Veritty: The Advantages of Transparent NFT Lottery,"Lotteries are a popular way of winning large amounts of money in a short amount of time. However, traditional lotteries have often been plagued with scandals and a lack of transparency. …",https://medium.com/@veritty.io/veritty-the-advantages-of-transparent-nft-lottery-66255356c038?source=topics_v2---------71-84--------------------00bd5da1_ae9f_4caf_bf6d_e5e78cfe36d4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,security 1161,936,Enhancing User Security in Crypto Wallets with 2FA and TOTP: A Proposal for Account Abstraction,"BACKGROUND Blockchain technology has the potential to revolutionize the way we store and transfer value, but it can also be complex and intimidating for many users. Account abstraction has simplified the user experience for interacting with blockchain technology, but cyber attacks and unauthorized access to user accounts remain a risk. …",https://medium.com/@fewchawallet/enhancing-crypto-wallet-security-with-totp-and-2fa-6002b2eac29a?source=topics_v2---------72-84--------------------00bd5da1_ae9f_4caf_bf6d_e5e78cfe36d4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PIoAzrOaN5KAF3HOGPNGhQ.png,security 1162,937,CloudFront & ALB Origin Security,"If you use CloudFront as your front door, why leave your ALB side door unlocked and opened for anyone to walk through? — TLDR With about 10 minutes of work, you can ensure inbound traffic is only sent to your app through CloudFront The improved security is accomplished by ensuring HTTP headers in requests through the ALB match what would ideally only be set at CloudFront You can improve security further by ensuring you…",https://medium.com/@carlo-mencarelli/cloudfront-alb-origin-security-53f04a313b9d?source=topics_v2---------74-84--------------------00bd5da1_ae9f_4caf_bf6d_e5e78cfe36d4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*x_FKxnsB60ZMIO65j48MKg.png,security 1163,938,Taxonomy of vulnerabilities in Solidity smart contracts,"In this story, I will share an example of a taxonomy of vulnerability causes. These vulnerabilities are grouped in three categories: Solidity: call of the unknown, gasless send, exception disorders, type casts, reentrancy, keeping secrets, EVM : immutable bugs, Ether lost in transfer, stack size limit, Blockchain : unpredictable state…",https://medium.com/cryptodevopsacademy/taxonomy-of-vulnerabilities-in-solidity-smart-contracts-cdf7e006ee82?source=topics_v2---------75-84--------------------00bd5da1_ae9f_4caf_bf6d_e5e78cfe36d4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,security 1164,939,Chat GPT can de-obfuscate code ?,Code obfuscation is a technique used to hide the code’s true purpose or to make it harder to understand or reverse engineer. …,https://medium.com/@contact.moneem/chat-gpt-can-de-obfuscate-code-bfe99bd6fbb2?source=topics_v2---------76-84--------------------601b838a_0cea_4f8e_8f44_87ee07885d07-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5Xt1rglZSIVd00gmOJmovw.png,security 1165,940,The Old Faithful: Why SSM Parameter Store still reigns over Secrets Manager,Managing and securing application secrets is a crucial part of any cloud-native application. AWS offers two primary services: the Systems Manager (SSM) Parameter Store and the more recent Secrets Manager. You might think Secrets Manager is the better choice for managing secrets because it’s a newer service and offers more…,https://medium.com/@theburningmonk/the-old-faithful-why-ssm-parameter-store-still-reigns-over-secrets-manager-6a3b8e3a15c5?source=topics_v2---------77-84--------------------601b838a_0cea_4f8e_8f44_87ee07885d07-------17,https://miro.medium.com/v2/resize:fill:140:140/1*V1fVQYlYFQeItjhkPmUX_Q.png,security 1166,584,Secure Voting through Partisia Blockchain,A Simple MPC Use Case Voting is an integral part of the election process. …,https://medium.com/partisia-blockchain/secure-voting-through-partisia-blockchain-37909275e364?source=topics_v2---------78-84--------------------601b838a_0cea_4f8e_8f44_87ee07885d07-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LOc2osTcDbrn7FExY-B8KQ.png,security 1167,941,Is Source Code Publication Enough to Ensure Security in Elections?,Trusted and Reproducible Builds — Source code publication for public scrutiny (either in a completely open way or regulated by responsible disclosure agreements) is considered as a measure for providing transparency and increasing the security of any election system. …,https://medium.com/edge-elections/is-source-code-publication-enough-to-ensure-security-in-elections-b4484bc83f22?source=topics_v2---------79-84--------------------601b838a_0cea_4f8e_8f44_87ee07885d07-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tSK9dsMspM1NuTVOmHDIbg.jpeg,security 1168,888,Secure database connection in Nodejs application,"Securing database connections is an essential part of building secure Node.js applications. Here are some best practices for handling secure database connections in Node.js 1. Use environment variables Store sensitive database connection information (such as usernames, passwords, and connection strings) in environment variables rather than hard-coding them in your application code. This helps protect…",https://medium.com/system-weakness/secure-database-connection-in-nodejs-application-3c3979566741?source=topics_v2---------80-84--------------------601b838a_0cea_4f8e_8f44_87ee07885d07-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rdpA-D-4vtUFcXZS6bpFcA.png,security 1169,942,"For UK MSP, optimizing customer experience is key to successful security posture and productivity","For managed service providers (MSPs), making the IT infrastructure as invisible as possible isn’t just a “nice-to-have” — it’s also elemental to delivering the best customer experience.Securing IT for these tech services and support users is no different. The less complexity and interference with productivity from the underlying security apparatus…",https://medium.com/@gardner.dana/for-uk-msp-optimizing-customer-experience-is-key-to-successful-security-posture-and-productivity-d2e3e2de597?source=topics_v2---------81-84--------------------601b838a_0cea_4f8e_8f44_87ee07885d07-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LDgnRZyXJMRZQ25WV9z17g.jpeg,security 1170,943,Keeping Kids on a Short Leash,Better safe than sorry. ;-) (Credit Photo: Andy Blumenthal),https://medium.com/@andyblumenthal/keeping-kids-on-a-short-leash-9834edec855e?source=topics_v2---------82-84--------------------601b838a_0cea_4f8e_8f44_87ee07885d07-------17,https://miro.medium.com/v2/resize:fill:140:140/0*QdlpfD1Js3SPFIjZ.JPG,security 1171,944,PROTECT YOUR DATA: How to Protect Personal Data with Powerful Tools,"As our lives become increasingly digitized, we leave behind a trail of personal data every time we use the internet. From the websites we visit and products we purchase, companies and governments collect and store our data. …",https://medium.com/@murat-durmus/protect-your-data-how-to-protect-personal-data-with-powerful-tools-598077e818ab?source=topics_v2---------83-84--------------------601b838a_0cea_4f8e_8f44_87ee07885d07-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Z8z73Bd7ItdgxYPDTj6ujA.png,security 1172,945,Security disclosure for ECDSA and EdDSA threshold signature schemes,"At io.finnet, we’re committed to elevating the finance industry by equipping institutions with advanced tools and systems. With applied multi-party computation (MPC), enterprise blockchain, and innovative APIs, we’re driving progress in finance. Discover the potential of our offerings, io.vault and io.network, launching in Q1 2023. We are immensely proud to…",https://medium.com/@iofinnet/security-disclosure-for-ecdsa-and-eddsa-threshold-signature-schemes-4e969af7155b?source=topics_v2---------84-84--------------------601b838a_0cea_4f8e_8f44_87ee07885d07-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4pc8JlJVMPDwAl5W8kCl-A.png,security 1173,107,Lorenz Cipher Encryption: A Deep Dive into Its Features and Applications | 2023,"Understanding the Lorenz SZ40 and SZ42 Machines, Their Role in World War II, and Their Continued Relevance Today | Karthikeyan Nagaraj — Introduction: In the field of cryptography, the Lorenz cipher, also known as the Lorenz SZ40 and SZ42 machines, played a significant role during World War II. These machines were used by the German military to encrypt and decrypt messages, and their complexity made them nearly impossible to break without the use…",https://medium.com/@cyberw1ng/lorenz-cipher-encryption-a-deep-dive-into-its-features-and-applications-2023-61b8ae2e4bf2?source=topics_v2---------85-84--------------------601b838a_0cea_4f8e_8f44_87ee07885d07-------17,https://miro.medium.com/v2/resize:fill:140:140/0*F7EbSzxwuAiLObYY.jpg,security 1174,946,Protect Your Home with Josh.ai’s Access & Control Features 🔐,"In honor of ISC West this week, we want to take a moment to highlight how Josh.ai’s surveillance and access control features can provide unparalleled peace of mind in your home. Many smart home adopters get started by installing safety and access control systems, then add more to their device…",https://medium.com/@joshdotai/protect-your-home-with-josh-ais-access-control-features-186bfc2d99df?source=topics_v2---------86-84--------------------6e199ebc_f312_46ee_b452_443e295f40da-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TWHkOIQKbS8wVCaCWyGQfw.png,security 1175,947,The Impact of AI on Cybersecurity,"Artificial Intelligence (AI) has been transforming industries and revolutionizing the way we live and work. One of the areas where AI is having a significant impact is cybersecurity. AI is being used to detect, prevent, and respond to cyber threats in ways that were not possible before. …",https://medium.com/@xtomsmith/the-impact-of-ai-on-cybersecurity-6a8bd5ff2fd5?source=topics_v2---------87-84--------------------6e199ebc_f312_46ee_b452_443e295f40da-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oT1Uadw9D4wLJU5JJKPe5A.jpeg,security 1176,105,This is How Data Loss Prevention Software(DLP) Works,"What is Data Loss Prevention Software(DLP) Data loss prevention, or DLP, is a group of cybersecurity techniques and procedures designed to guard sensitive data from illegal access or exploitation. …",https://medium.com/bug-zero/this-is-how-data-loss-prevention-software-dlp-works-f6b1eafe4b03?source=topics_v2---------88-84--------------------6e199ebc_f312_46ee_b452_443e295f40da-------17,https://miro.medium.com/v2/resize:fill:140:140/0*G_pEL6EVdd9uLYos,security 1177,948,What are ad hoc coalitions?,"John Karlsrud and Yf Reykers — In a world in which major international organizations are increasingly disrupted by growing great power competition, the search for new forms of international cooperation is increasing. Drawing on their research John Karlsrud and Yf Reykers outline some of the strengths of ad hoc coalitions for achieving policy outcomes, while also…",https://medium.com/international-affairs-blog/what-are-ad-hoc-coalitions-eb7b569a635a?source=topics_v2---------89-84--------------------6e199ebc_f312_46ee_b452_443e295f40da-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Wzzw27RqwFE0s_tcSg3--A.png,security 1178,107,Web Poisoning: A Growing Threat to Online Security | 2023,"Understanding the Basics of Web Poisoning Attack in Web Pentesting | Karthikeyan Nagaraj — One of the most concerning types of cybercrime is web poisoning, a form of attack that aims to compromise websites and their visitors. This article will explore what web poisoning is, how it works, its types, impact, and most importantly, how to prevent it. What is Web Poisoning? Web poisoning is a type of…",https://medium.com/@cyberw1ng/web-poisoning-a-growing-threat-to-online-security-2023-215a4428aae2?source=topics_v2---------90-84--------------------6e199ebc_f312_46ee_b452_443e295f40da-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MDNP6Ql7TKSDoZ2H5_CMOQ.png,security 1179,949,Web3 Authentication: What is it? What Use Can It Have?,"Unlocking the Benefits of Decentralized Authentication with Web3 Technology — Currently, Web3 (sometimes referred to as Web 3.0 or Web3) is a hot topic on the Internet. Despite claims to the contrary, what does Web3 actually entail? How is it applicable today? We have received many inquiries. …",https://medium.com/coinmonks/web3-authentication-what-is-it-what-use-can-it-have-71bca4a70895?source=topics_v2---------91-84--------------------6e199ebc_f312_46ee_b452_443e295f40da-------17,https://miro.medium.com/v2/resize:fill:140:140/1*osUP3PHMIF8oO8DTZY2Xgw.png,security 1180,950,"Keep Me Safe, Safe and Sound","Yearning for change — No one is perfect. No country is perfect. It would be wrong of me, sitting in England to pass judgment on the laws of the US, though I do feel able to share my own thoughts. Keeping someone safe from harm, a loved one, or a child, seems intrinsic to…",https://medium.com/bouncin-and-behavin-blogs/keep-me-safe-safe-and-sound-d533aed78fe9?source=topics_v2---------92-84--------------------6e199ebc_f312_46ee_b452_443e295f40da-------17,https://miro.medium.com/v2/resize:fill:140:140/0*1Sia8QRMvHUOI_n_,security 1181,951,Balancing Security and Privacy: The Ethics of Cryptography,"Cryptography is a vital tool for securing data and maintaining privacy in our increasingly digital world. As we rely more and more on technology to store and transmit sensitive information, cryptography plays an increasingly critical role in protecting that data from unauthorized access and manipulation. …",https://medium.com/@pagorun/balancing-security-and-privacy-the-ethics-of-cryptography-5466d6d3675f?source=topics_v2---------93-84--------------------6e199ebc_f312_46ee_b452_443e295f40da-------17,https://miro.medium.com/v2/resize:fill:140:140/0*mLJzqwud21RtAhq3,security 1182,952,Canadian Consumer Privacy and Protection Act,"The CPPA or the Consumer Privacy Protection Act is included under the Digital Charter Implementation Act, 2019. After the EU’s GDPR and California’s CPPA were passed, the CPPA likewise updates Canada’s data privacy laws, bringing them in line with new international norms. On June 16, 2022, the federal government took…",https://medium.com/lightbeam-ai/canadian-consumer-privacy-and-protection-act-7dbccc550665?source=topics_v2---------94-84--------------------6e199ebc_f312_46ee_b452_443e295f40da-------17,https://miro.medium.com/v2/resize:fill:140:140/1*C8Kk2YZ--DBZaauel6hBJQ.jpeg,security 1183,953,Ages old debate — KYC versus privacy ( or Hindenburg versus Dorsey),"Hindenburg Research, a financial research firm, recently released a report alleging that Jack Dorsey’s Block, previously known as Square, facilitated fraudulent activities that allowed criminals to use the platform for their criminal endeavors. Is that a novelty? Some online platforms used for fraud? The report accuses the company of inflating…",https://medium.com/@aschatria/ages-old-debate-kyc-versus-privacy-or-hindenburg-versus-dorsey-e9aad22afdd9?source=topics_v2---------95-84--------------------6e199ebc_f312_46ee_b452_443e295f40da-------17,https://miro.medium.com/v2/resize:fill:140:140/1*AkU-JsV_3sM3JxnWzKlGtA.png,security 1184,954,5 Internal Threats that can impact your data pipelines,"It is common to have data pipelines that read data from a company’s internal systems which we tend to assume is 100% safe. But, in reality there are some risks involved every time we are not in control of a source, even if that source is supposed to be friendly. …",https://medium.com/faun/5-internal-threats-that-can-impact-your-data-pipelines-302a8652c201?source=topics_v2---------96-84--------------------6a1fd591_876e_46f0_a1f7_e02194407885-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yR8ZTVPzfVWA3LIHuJlgVw.jpeg,security 1185,913,phxProxy Hack Analysis — Improper delegate call,"Overview: On January 28, 2023, a hack occurred on the phxProxy contract due to improper validation on the delegateCallSwap() function call, allowing an attacker to force the swap to purchase the fake BUSD tokens for real, resulting in a loss of 1.2K BUSD. Smart Contract Hack Overview Attacker’s address:0x80d98a Attacker’s Transaction…",https://medium.com/solidityscan/phxproxy-hack-analysis-improper-delegate-call-f0bf874bb0b1?source=topics_v2---------97-84--------------------6a1fd591_876e_46f0_a1f7_e02194407885-------17,https://miro.medium.com/v2/resize:fill:140:140/0*mYrhCJyYcRjrrD4d,security 1186,955,Locking Up Your Website: How to Keep Hackers Out (and Your Users Safe).,"As a web developer, I’m sure you know the old adage, “Better safe than sorry.” But when it comes to web development security, it’s more like “better paranoid than bankrupt.” Did someone just say security? Kekekeke(evil laugh). So, here we go…",https://medium.com/@shreerajs123/locking-up-your-website-how-to-keep-hackers-out-and-your-users-safe-21679f11b6a4?source=topics_v2---------98-84--------------------6a1fd591_876e_46f0_a1f7_e02194407885-------17,https://miro.medium.com/v2/resize:fill:140:140/0*epE5tbdarjmtNJDp,security 1187,688,Battling Bots & Sybil Attacks,"BrightID and Proof of Humanity — Bots Have you ever heard of the term bot? If not, that is okay, but you have likely dealt with a bot or even battled one without knowing it. A typical example of a bot could be an automated customer service system, where users are prompted or directed toward specific actions. …",https://medium.com/predict/battling-bots-sybil-attacks-7feced3a0dd4?source=topics_v2---------99-84--------------------6a1fd591_876e_46f0_a1f7_e02194407885-------17,https://miro.medium.com/v2/resize:fill:140:140/0*V_drXOyeLss5xOVc,security 1188,406,3 reasons to discover you if have been hacked,"Determining who was responsible for a security breach or coordinated attack is consistently ranked as one of the most challenging tasks for cybersecurity researchers. When hackers try to cover their tracks, they use various tools, making determining crucial information, such as their location, very hard to discover. …",https://medium.com/@softwaretrailers/3-reasons-to-discover-you-if-have-been-hacked-f2bd7f6dfc91?source=topics_v2---------100-84--------------------6a1fd591_876e_46f0_a1f7_e02194407885-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Ub4lXDnZLE9Il5MeXjmsgw.jpeg,security 1189,956,Guide to access rights management in ONLYOFFICE,Access rights management in ONLYOFFICE ONLYOFFICE Docs and ONLYOFFICE Workspace provide multiple tools for controlling access to documents and content inside them. There are multiple ways to configure every level of access protection in your files: Flexible sharing permissions for the users in your environment Permissions for external link sharing and additional link security settings …,https://medium.com/onlyoffice/guide-to-access-rights-management-in-onlyoffice-e8178c2cea73?source=topics_v2---------101-84--------------------6a1fd591_876e_46f0_a1f7_e02194407885-------17,https://miro.medium.com/v2/resize:fill:140:140/1*smnXMB5yctfMx0AJuR7pSA.png,security 1190,924,Creating a Pod with Tolerations in Kubernetes,"As a cloud engineer, I have encountered a wide range of scenarios and architectures for deploying application requirements. Recently, I got my hands on a challenge and boy, it was quite an adventure. A customer needed to run a particular workload on a specific node with specific hardware capability. In…",https://medium.com/@walissonscd/creating-a-pod-with-tolerations-in-kubernetes-2b7d21d8c52d?source=topics_v2---------102-84--------------------6a1fd591_876e_46f0_a1f7_e02194407885-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wkMDnOQgnmFlCVCRepj-PA.jpeg,security 1191,957,Thinking like a Hacker: Automated security regressions testing in CI/CD with Nuclei,"Nuclei is an open-source, template-based, vulnerability scanner maintained by the team at Project Discovery, if you have used pen testing tools, you might know them from sub finder, httpx or dnsx. Baby steps The cool thing about Nuclei is that it is so extensible, it takes advantage of Go’s goroutines and it…",https://medium.com/version-1/thinking-like-a-hacker-automated-security-regressions-testing-in-ci-cd-with-nuclei-1a6fb3a90312?source=topics_v2---------103-84--------------------6a1fd591_876e_46f0_a1f7_e02194407885-------17,https://miro.medium.com/v2/resize:fill:140:140/1*48TjTL_C_5P4QptbjRESkA.jpeg,security 1192,958,"ChatGPT, Security, and OpenPrivacy","OpenAI’s ChatGPT has been a controversial topic of discussion over the past few months. Many have been quick to hail its positive implications for the future of tech. ChatGPT (and others of its ilk), which can mimic human speech and conversation, are ushering in a new era of Artificial Intelligence…",https://medium.com/civicactions/chatgpt-security-and-openprivacy-b4a0f63e3871?source=topics_v2---------104-84--------------------6a1fd591_876e_46f0_a1f7_e02194407885-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0q27gQX2hNMekKVRwXehaA.png,security 1193,959,Multisig Wallets,"Multi-signature wallets are commonly adopted wallets for increased security and ownership. — To see the original post, view the article here on Starlight. What is a Multisig Wallet? The security of digital assets is a major concern for anyone who holds them. One way to increase security is through the use of a multisig wallet. A multisig wallet, short for multi-signature wallet, requires multiple parties to sign…",https://medium.com/@starlightmoney/multisig-wallets-9d5e1ad8dc6?source=topics_v2---------105-84--------------------6a1fd591_876e_46f0_a1f7_e02194407885-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0m5zi0KZrj4DnBfiebEpNA.png,security 1194,279,How to Safely Use Public Wi-Fi Networks with python implementation:-,"Public Wi-Fi organizations can be extraordinarily helpful when you’re all over town. They permit you to interface with the web from cafes, air terminals, libraries, and other public spots without spending your portable information. Notwithstanding, public Wi-Fi organizations can likewise be risky. Without legitimate precautionary measures, your own data could…",https://medium.com/@cyberpedia/how-to-safely-use-public-wi-fi-networks-with-python-implementation-535d7f9fa08f?source=topics_v2---------106-84--------------------383d0e5b_6549_4d0c_bbbf_7943e63d9c10-------17,https://miro.medium.com/v2/resize:fill:140:140/0*v6L23SIPMeWNMRdp,security 1195,960,Securing your Kubernetes cluster: Deploying Falco on Amazon Linux 2,"Falco is an open source intrusion detection system (IDS) and security monitoring tool for cloud-native environments such as Kubernetes. It uses kernel tracing technology to monitor system calls and detect suspicious activity in real-time. Falco is designed to be highly customizable, with a powerful rules engine that can be used…",https://medium.com/@abhimanyubajaj98/deploying-falco-on-kubernetes-running-on-amazon-linux-2-c894adfef704?source=topics_v2---------107-84--------------------383d0e5b_6549_4d0c_bbbf_7943e63d9c10-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wkD7P-jIGAQt57B1cHM5Sw.png,security 1196,961,"We are not guided by exceptions, but by rules","Take responsibility for your success, follow the rules, crucial to achieving the goals, and don’t be fooled, don’t be guided by exceptions either. — Seriously, that you are still guided by exceptions? Is it past time you knew — or at least you should — that exceptions exist, but will never rule. …",https://medium.com/@odnanrefserep/we-are-not-guided-by-exceptions-but-by-rules-426a454687c2?source=topics_v2---------108-84--------------------383d0e5b_6549_4d0c_bbbf_7943e63d9c10-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CUdJT8PZCJ3ZMfuTlvXfnw.jpeg,security 1197,384,The Dark Side of AI in Cybersecurity: Risks You Need to Know,"Is AI really the savior of cybersecurity or a ticking time bomb waiting to explode? — While AI has the potential to revolutionize cybersecurity, it also holds the risk of being hacked or manipulated by cybercriminals. In this blog, we’ll explore the dark side of AI in cybersecurity and uncover the potential dangers of relying too heavily on this technology. …",https://medium.com/@vazdaniel70/the-dark-side-of-ai-in-cybersecurity-risks-you-need-to-know-555c202e562?source=topics_v2---------109-84--------------------383d0e5b_6549_4d0c_bbbf_7943e63d9c10-------17,https://miro.medium.com/v2/resize:fill:140:140/1*sGcRf8cqkIaBYKkOA7BaZA.jpeg,security 1198,962,Microsoft Security Copilot: Harnessing AI for Next-Gen Cyber Defense,"by Manu Bhardwaj, March 28, 2023 The Evolving Cybersecurity Landscape and the Need for AI As the digital landscape evolves, cybersecurity professionals find themselves in the crosshairs of increasingly sophisticated cyber threats. Finding a needle in a haystack of alerts is like finding a needle in a pile of sand. Furthermore, the cybersecurity industry faces a global talent shortage…",https://medium.com/@bhardwajmanu/microsoft-security-copilot-harnessing-ai-for-next-gen-cyber-defense-231fea8a0d73?source=topics_v2---------110-84--------------------383d0e5b_6549_4d0c_bbbf_7943e63d9c10-------17,https://miro.medium.com/v2/resize:fill:140:140/1*te3_BO49xKzIQltjHQFuOw.png,security 1199,963,Pardon My Salt 10: When Are We Going to HARDEN THE SCHOOLS?,"This is a response to the shootings at schools and the recent one in Nashville, TN. Brief Thoughts on Gun Control It’s the wrong solution. I know that is an affront to those who think themselves to be “good people” for regurgitating the talking points of those who want to manufacture consent to give the…",https://medium.com/@pardonmysalt/pardon-my-salt-10-when-are-we-going-to-harden-the-schools-51c42818565a?source=topics_v2---------111-84--------------------33418507_8845_4a7a_8699_0782603232e4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*wdv3qUAw14i__ytA,security 1200,964,Simplified Data Masking in Databricks,This article is continuation of data security techniques. If you’re curious to know more about fundamentals of security. I highly recommend reading my previous article ‘Column-Level Security in Databricks’. Data masking is a security technique that obscures sensitive data by replacing it with a masked value. Data masking aims to…,https://medium.com/system-weakness/simplified-data-masking-in-databricks-8649adb3f60f?source=topics_v2---------112-84--------------------33418507_8845_4a7a_8699_0782603232e4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*8qsv0IyZyR8tL1m-,security 1201,965,Understanding Advanced Persistent Threats (APTs): The Evolving Landscape of Cybersecurity Threats,"Introduction Advanced Persistent Threats (APTs) are a sophisticated form of cyberattack that can infiltrate an organization’s network, remain undetected for long periods, and steal sensitive data. …",https://medium.com/bug-zero/understanding-advanced-persistent-threats-apts-the-evolving-landscape-of-cybersecurity-threats-72c713b5e903?source=topics_v2---------113-84--------------------33418507_8845_4a7a_8699_0782603232e4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ABWCPy8JljLV8JYW.jpeg,security 1202,691,Hats Finance — The Crypto Security Meme Competition Is Live!,"We turn black hat hackers into white hat hackers using the right incentives. HatsFinance is creating the future of security! Crypto security is one of the hottest topics of 2023, and the Hats Finance innovative proactive bounty protocol aims to enhance the security dynamics in the Cryptoverse. The Hats team…",https://medium.com/coinmonks/hats-finance-the-crypto-security-meme-competition-is-live-94d6699cef9f?source=topics_v2---------114-84--------------------33418507_8845_4a7a_8699_0782603232e4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*4K5QA1zn0yN9TOec.jpg,security 1203,573,Spotter Digest №3,"We will gradually expand the capabilities of our Pessimistic Spotter on-chain monitoring & defense service and provide additional details in the subsequent digest piece! Greetings, dear readers! So today, in the following digest piece, we’ll talk about the most recent news, how it affects (and will affect) industry and our Spotter project, and…",https://medium.com/pessimistic-security/spotter-digest-3-ad8c5c09210b?source=topics_v2---------115-84--------------------33418507_8845_4a7a_8699_0782603232e4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_xNomgFuER0_8Z59hHVcPw.jpeg,security 1204,966,Binance Attacked by CFTC,"The Commodity Futures Trading Commission, founded in 1974, is a federal regulatory regulatory agency in the United States that is responsible for supervising futures trading and options trading in the commodities market. The CFTC aims to promote transparency, integrity and stability in the United States futures trading market. …",https://medium.com/coinmonks/binance-attacked-by-cftc-c213398cb3b1?source=topics_v2---------116-84--------------------5c1e6c77_aad8_4d4f_8f2d_7427b69bce91-------17,https://miro.medium.com/v2/resize:fill:140:140/0*d15WEB3TNfhG-7TS,security 1205,967,Understanding Keccak256: The Cryptographic Hash Function Behind Ethereum,"Keccak256 is a cryptographic hash function based on the sponge construction, a family of cryptographic algorithms. It was developed as part of the Keccak family of hash functions by Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche in 2008. …",https://medium.com/@luishrsoares/understanding-keccak256-the-cryptographic-hash-function-behind-ethereum-413c18f28bd8?source=topics_v2---------117-84--------------------5c1e6c77_aad8_4d4f_8f2d_7427b69bce91-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tCFyOo1f0Uavc_X6hpWCwA.jpeg,security 1206,968,How not to lose money in cryptocurrency — 8 useful tips from Lotterium,"The events of recent months in the crypto world can upset any owner of cryptocurrency assets. Bitcoin has plunged, cryptocurrencies and tokens have lost their value, and cryptocurrency exchanges are collapsing and closing, taking customer funds with them.. Thus, all cryptocurrency holders are asking the same question: “What do I…",https://medium.com/@lotterium.io/how-not-to-lose-money-in-cryptocurrency-8-useful-tips-from-lotterium-e6d1e75369c?source=topics_v2---------118-84--------------------5c1e6c77_aad8_4d4f_8f2d_7427b69bce91-------17,https://miro.medium.com/v2/resize:fill:140:140/0*oZlav4OT08P_1ld1,security 1207,969,Authentication and Authorization with node.js and expressjs,Authentication and authorization are important aspects of web application security. They both play a crucial role in ensuring that only authorized users have access to specific resources within the application. Authentication Authentication is the process of verifying the identity of a user. It is a critical component of web application…,https://medium.com/@manish90/authentication-and-authorization-with-node-js-and-expressjs-db0abc866f27?source=topics_v2---------119-84--------------------5c1e6c77_aad8_4d4f_8f2d_7427b69bce91-------17,https://miro.medium.com/v2/resize:fill:140:140/1*sYiG7jXk7UW2lAhxdRCkoQ.png,security 1208,923,“Getting Started with ZAP: A Beginner’s Guide to Web Application Security Testing”,"“Getting Started with ZAP: A Beginner’s Guide to Web Application Security Testing” An Introduction to the Zed Attack Proxy Tool; 1. What is ZAP 👉 A Tool to Find Vulnerability in A Web Application 👉 It is open Source and completely Free! 👉Cross Platform -Windows, Linux, and Mac 👉Ease of…",https://medium.com/cloudnloud/getting-started-with-zap-a-beginners-guide-to-web-application-security-testing-22b392fcc0dc?source=topics_v2---------120-84--------------------5c1e6c77_aad8_4d4f_8f2d_7427b69bce91-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6BDAY2lMRigPcD-OTiklTw.png,security 1209,970,Secure your website against hackers,"A security flaw causes a company to lose millions of dollars every single day. unquestionably, you must ensure that your website is secure in this circumstance. We’ll talk about some procedures that need to be followed before deployment in today’s article. Use TLS The majority of MITM attacks are prevented by the…",https://medium.com/@talktorahul.b/secure-your-website-against-hackers-9bc445197246?source=topics_v2---------121-84--------------------5c1e6c77_aad8_4d4f_8f2d_7427b69bce91-------17,https://miro.medium.com/v2/resize:fill:140:140/0*7YNjNBFLI1P9mf78,security 1210,971,How to prevent DDOS attacks on a website?,"DDoS (Distributed Denial of Service) attacks are a major threat to websites and online services, causing significant damage to businesses and individuals alike. These attacks involve overwhelming a website with traffic from multiple sources, making it inaccessible to legitimate users. …",https://medium.com/@tech-tales-club/how-to-prevent-ddos-attacks-on-a-website-e330c7cbce4a?source=topics_v2---------122-84--------------------5c1e6c77_aad8_4d4f_8f2d_7427b69bce91-------17,https://miro.medium.com/v2/resize:fill:140:140/0*1bl2InVnJBuk5YJw.jpg,security 1211,452,🌩️ How to Mitigate the Top Cloud Security Risks: A Comprehensive Guide ☁️,"Introduction The digital revolution has ushered in a new era of cloud computing, allowing organizations to achieve greater flexibility, scalability, and operational efficiency. However, with these newfound capabilities come new challenges, particularly in the realm of security. Cloud security risks are a genuine concern for businesses, and it is critical to…",https://medium.com/system-weakness/️-how-to-mitigate-the-top-cloud-security-risks-a-comprehensive-guide-️-23709c834b96?source=topics_v2---------124-84--------------------5c1e6c77_aad8_4d4f_8f2d_7427b69bce91-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EQ7gmQ_DgZj1knnHmo8raA.png,security 1212,972,Browser Extension (Chrome/Firefox),Summary: If you think a small 500Kb or 1–2 MB extension cannot harm your device/data you are wrong my dear friend. Research says 40–65% of data leaks because people install N-number of extensions on their browser without a security check and the data gets leaked via a third party. Impact…,https://medium.com/@mr-process/browser-extension-chrome-firefox-cbbc2e24ae9a?source=topics_v2---------125-84--------------------5c1e6c77_aad8_4d4f_8f2d_7427b69bce91-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,security 1213,973,"My journey at Encora Apprenticeship, Week 10","This post is about my week in the apprenticeship program at Encora, I’ll share with you all my learning path as a software engineer so welcome back to this journey. If you want to see my other posts, click here. After finishing the breakable toy, this week was dedicated to…",https://medium.com/@abrahamrzhz/my-journey-at-encora-apprenticeship-week-10-c69abe29bb09?source=topics_v2---------126-84--------------------d53144ac_fdf7_4421_a538_2b6113f6eef3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*LD3mY5whtW0A8AZJ,security 1214,974,Amazon cognito misconfiguration,"written by Mohamed Lakhdar Metidji In recent years, Amazon Web Services (AWS) has become a popular choice for businesses looking to host their web applications in the cloud. One of the most widely used AWS services is Amazon Cognito, a user authentication and identity management service. …",https://medium.com/@shellmates/amazon-cognito-misconfiguration-35dfde9e2037?source=topics_v2---------127-84--------------------d53144ac_fdf7_4421_a538_2b6113f6eef3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Y_tuLaQ3kjgsrE1x.png,security 1215,975,The False Sense of Security: Running Containers as root,"Containers have revolutionized modern software development, enabling us to develop, build, package, and deploy software applications faster and more efficiently than ever before. The benefits of containerization are many, from easier deployment and scaling to improved resource utilization and portability. …",https://medium.com/@vonderchild/the-false-sense-of-security-running-containers-as-root-3f79ee5ba6ee?source=topics_v2---------128-84--------------------d53144ac_fdf7_4421_a538_2b6113f6eef3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*h7qpK5BAxf899lY7Jpt8RA.png,security 1216,976,"Web Development: is there a place for Accessibility, Security, and Performance","114 million more men have cell phones than women. These shocking numbers were shared by Tim Kadlec in his talk Unseen, in the context of the situation in India in 2016. And yet in 2023, I’m afraid the situation is still not ideal. Is rapid web development helping us to…",https://medium.com/@maravia90_sr/web-development-is-there-a-place-for-accessibility-security-and-performance-1f5703315b8c?source=topics_v2---------129-84--------------------d53144ac_fdf7_4421_a538_2b6113f6eef3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*STzUjVte1bktHWDOl2FWiw.png,security 1217,101,What is End to End Encryption In Blockchain Technology & Its Importance,"End-to-end encryption (E2EE) is a security protocol used to protect data transmitted over the internet. E2EE ensures that the data is encrypted at the sender’s device, remains encrypted while in transit, and is decrypted only at the recipient’s device. The encryption key is known only to the sender and the…",https://medium.com/@soileum/what-is-end-to-end-encryption-in-blockchain-technology-its-importance-7241fb34a363?source=topics_v2---------130-84--------------------d53144ac_fdf7_4421_a538_2b6113f6eef3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*FAYbfyPJHqQiDOrGQBgKTg.jpeg,security 1218,977,How I implemented OTP using python without Database,Security is a primary concern for any online platform and thinking of a secure login system is one of the critical parts. One popular approach to achieving this is through the use of Two-factor authentication (2FA). I happened to implement recently 2FA in our system. After some googling here and…,https://medium.com/@aniksharif/how-i-implemented-totp-using-python-without-database-1c71a69c8de0?source=topics_v2---------131-84--------------------d53144ac_fdf7_4421_a538_2b6113f6eef3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*kJ7fypMcjZGxlxMI.jpg,security 1219,978,Top 7 Blockchain Security Tools 2023,"Blockchain technology has been growing rapidly and is now used in various industries. It has become an integral part of the financial industry, supply chain management, healthcare, and many others. However, with the growth of blockchain technology, security risks have also increased. Therefore, it is important to have reliable and…",https://medium.com/@cryptoman99999/top-7-blockchain-security-tools-2023-5f852d017ad9?source=topics_v2---------132-84--------------------d53144ac_fdf7_4421_a538_2b6113f6eef3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,security 1220,979,Gmail Exposed: The Scandalous Reason Why I Had to Say Goodbye,From trust to betrayal. — It was difficult for me to decide to stop using Gmail after relying heavily on it for so long. I was forced to cut relations with Gmail after discovering the real reason why it had become a threat to my security and privacy. I once got an odd email from…,https://medium.com/illumination-curated/gmail-exposed-the-scandalous-reason-why-i-had-to-say-goodbye-ce3d224dad44?source=topics_v2---------133-84--------------------d53144ac_fdf7_4421_a538_2b6113f6eef3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*puQF2bK5nD2AR_Oc.jpeg,security 1221,945,io.finnet Partners with MPC Alliance to Accelerate Adoption of MPC Technology in Finance and For Corporates,"Dear Community and io.finners, We are thrilled to announce that io.finnet has been accepted as a member at the MPC Alliance. “Blockchain technology, and by extension, our infrastructure, has the ability to tackle the issues that emerged in 2001, 2008, and 2022”, said Gregory Pepin, CEO of io.finnet, “We are…",https://medium.com/@iofinnet/io-finnet-partners-with-mpc-alliance-to-accelerate-adoption-of-mpc-technology-in-finance-and-for-de290403949f?source=topics_v2---------134-84--------------------d53144ac_fdf7_4421_a538_2b6113f6eef3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*FVZY0WjLKyEkoAjLktbdsw.png,security 1222,112,Hacking AWS Account via AWS Lambda SSRF,"Server-side request forgery (SSRF) attack is used for abusing functionality on the server to read or update internal resources. The main idea behind an SSRF attack is to manipulate the input parameters of an application that interact with external systems, such as URLs, IP addresses, or file paths. By injecting…",https://medium.com/aws-in-plain-english/hacking-aws-account-via-aws-lambda-ssrf-17cb82441eef?source=topics_v2---------135-84--------------------e57ce255_f952_4161_9fea_11f141fa42ef-------17,https://miro.medium.com/v2/resize:fill:140:140/1*VTbdmhifhwDumlBeE0Gkgw.png,security 1223,980,Linus Tech Tips Got Banned. What We Can All Learn.,"We all need to learn from this scary moment. — On March 23rd, 2023, the semi-famous YouTube channel Linus Tech Tips and several related channels run by Linus Sebastian were hacked and subsequently unceremoniously terminated by YouTube — a worst nightmare scenario for any content creator. Fortunately a fellow creator was able to alert Linus to the hack, but in…",https://medium.com/@michaelswengel/linus-tech-tips-got-banned-what-we-can-all-learn-c9e675401671?source=topics_v2---------136-84--------------------e57ce255_f952_4161_9fea_11f141fa42ef-------17,https://miro.medium.com/v2/resize:fill:140:140/0*JJ8Yc5m5C_cae8RA.png,security 1224,981,Why is Nginx called a “reverse” proxy?,"🔥Introduction Nginx is a highly performant, scalable, and reliable open-source web server software that is frequently utilized as a “reverse proxy.” But why is it labeled as a “reverse” proxy which raises the question? Many companies use proxy servers to route and secure traffic between networks. There is often confusion, however…",https://medium.com/@ayushsoni1010/why-is-nginx-called-a-reverse-proxy-81f6562d6558?source=topics_v2---------137-84--------------------e57ce255_f952_4161_9fea_11f141fa42ef-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ClKhKseTJMpHkqgX.png,security 1225,384,Protecting Sensitive Data: How AI Can Help Secure Your Information,"Hey there, privacy lovers! Are you tired of feeling like your personal data is always at risk of falling into the wrong hands? Fear not, because AI is here to save the day! In this article, we’ll take a look at how artificial intelligence (AI) is helping organizations protect sensitive…",https://medium.com/@vazdaniel70/protecting-sensitive-data-how-ai-can-help-secure-your-information-28853579bb7f?source=topics_v2---------138-84--------------------e57ce255_f952_4161_9fea_11f141fa42ef-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oBAjAZtM7Aayw_HkNYczzw.jpeg,security 1226,982,Analyze your Kubernetes cluster with Polaris,"Fairwinds Polaris examines the resources in the Kubernetes cluster in the fields of Security, Reliability, Networking, Efficiency and determines how well they are configured. You can also add your own policies so that they also affect the scores. By default, Polaris policies are pretty strict. …",https://medium.com/devopsturkiye/analyze-your-kubernetes-cluster-with-polaris-6e53a7c400?source=topics_v2---------140-84--------------------e57ce255_f952_4161_9fea_11f141fa42ef-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hq3xFbY1t0IDM0IxNA7FMA.png,security 1227,107,One-Time Pad Encryption: The Ultimate Guide | 2023,"Understanding the Key Features, Advantages, and Limitations of One-Time Pad Encryption | Karthikeyan Nagaraj — Introduction: In the world of cryptography, one-time pad encryption is considered one of the most secure methods of encrypting messages. One-time pad encryption, also known as OTP encryption, uses a random key that is only used once to encrypt plaintext. …",https://medium.com/@cyberw1ng/one-time-pad-encryption-the-ultimate-guide-2023-169a0365f016?source=topics_v2---------141-84--------------------e57ce255_f952_4161_9fea_11f141fa42ef-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Q6ud9MurjmVTYTWdsGL8_g.png,security 1228,983,Secret management life cycle,How to manage secret more security Flow to manage secrets:,https://medium.com/@tindevops/secret-management-life-cycle-371737fbce6e?source=topics_v2---------142-84--------------------e57ce255_f952_4161_9fea_11f141fa42ef-------17,https://miro.medium.com/v2/resize:fill:140:140/1*13wdkDQ-j9AJMUmmVpgwLA.png,security 1229,984,Firefox Hardening Guide,"Overview What is hardening? In real Firefox’ world, “hardening” is just a synonym of “customization” related to privacy/security settings. With hardening, we aim to have a more private and safe internet experience. So, why are you doing this for Firefox, not for Chrome/Chromium? Because many browsers use Chromium engine, which lead…",https://medium.com/@misile00/firefox-hardening-guide-4b60b48e21e1?source=topics_v2---------143-84--------------------e5087d34_566e_488c_84e9_2f0683a7a6e7-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WwqfOvLDUsXxWTXM.png,security 1230,985,From Internet of Things to Internet of Threats,"Smart houses, smart cities, smart irrigation, and smart routing- the Internet of Things (IoT) has ingrained itself into every aspect of our daily life. Though the moniker IoT was coined by Kevin Ashton in 1999, the concept of transferring data through appliances and staying connected to the internet dates back to the 1980s. — It all started with a group of university students’ attempt to track the number of Coca-Cola cans in the vending machine. What was an attempt to save them the trips to an empty vending machine subsequently progressed into the internet-connected toaster and to the internet-connected anything.",https://medium.com/readwrite/from-internet-of-things-to-internet-of-threats-3982c3fb7f4c?source=topics_v2---------144-84--------------------e5087d34_566e_488c_84e9_2f0683a7a6e7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*nL8BmNnRA6NPB6z72bEclA.png,security 1231,986,Essential Features of Web Servers Designed for Emergency Use,"Web servers are an integral part of the internet, providing access to web-based applications, services, and resources. However, in the event of an emergency, such as a natural disaster, cyberattack, or other disruptive event, web servers may be overwhelmed, inaccessible, or otherwise unavailable. To address this, web servers designed for…",https://medium.com/@coskntkk/features-that-web-servers-designed-for-emergency-use-should-have-77e8fb410e3d?source=topics_v2---------145-84--------------------e5087d34_566e_488c_84e9_2f0683a7a6e7-------17,https://miro.medium.com/v2/resize:fill:140:140/0*E46w0bZ_brxcmEqC,security 1232,262,Outlook NTLM Leak | Tryhackme Writeup/Walkthrough | By Md Amiruddin,"Leak password hashes from a user by sending them an email by abusing CVE-2023–23397. Room Link : https://tryhackme.com/room/outlookntlmleak Task 1 : Introduction On Tuesday, March 14th, Microsoft released 83 security fixes on Patch Tuesday, including CVE-2023–23397. This critical vulnerability impacts all versions of the Outlook desktop app on any Windows system. …",https://medium.com/bugbountywriteup/outlook-ntlm-leak-tryhackme-writeup-walkthrough-by-md-amiruddin-8d2c51193f3f?source=topics_v2---------146-84--------------------e5087d34_566e_488c_84e9_2f0683a7a6e7-------17,https://miro.medium.com/v2/resize:fill:140:140/0*P_9Fy8q88lXBidT2.png,security 1233,987,The Ethics of Artificial Intelligence: Opportunities and Challenges,"Artificial intelligence is taking the world by storm, making it hard not to get excited about the endless opportunities it presents. From, personalized recommendations on streaming services to self-driving cars, AI is here to make our lives easier and more efficient. However, with great power comes great responsibility and AI…",https://medium.com/illumination/the-ethics-of-artificial-intelligence-opportunities-and-challenges-1c5bf2749bc4?source=topics_v2---------147-84--------------------5042fdc2_27f8_490d_9679_92bb740d3068-------17,https://miro.medium.com/v2/resize:fill:140:140/1*XLUzJt5NE4wnAhaJ93R5iQ@2x.jpeg,security 1234,988,The OPAQUE Asymmetric PAKE Protocol. Make authentication secure again,"Introduction and problem Password authentication is widely used in many applications. Typically, a user sends their ID and password to a server over a secure connection. However, this can expose the password to risks such as server mishandling or data breaches. …",https://medium.com/@oleksii.vasylenko/the-opaque-asymmetric-pake-protocol-make-authentication-secure-again-366f821a319d?source=topics_v2---------148-84--------------------5042fdc2_27f8_490d_9679_92bb740d3068-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1bTxy4M5s5zAbG4F_LroyQ.png,security 1235,888,Node.js good practices for security,"Security is an essential aspect of any application, and Node.js applications are no exception. Node.js is a powerful tool that can be used to build secure and robust web applications, but it’s important to understand the security risks that come with building applications using Node.js. Here are some potential topics…",https://medium.com/@techwithharry/node-js-security-good-practices-for-security-56a5f56d4f6d?source=topics_v2---------149-84--------------------5042fdc2_27f8_490d_9679_92bb740d3068-------17,https://miro.medium.com/v2/resize:fill:140:140/1*8KnGUEx-K60yXua6UjWczA.jpeg,security 1236,989,Uber CIO conviction is hotly debated by security professionals,"In August 2019, the former chief information officer (CIO) of Uber, Joseph Thomas, was convicted of charges related to fraud and conspiracy in a federal court in San Francisco. …",https://medium.com/@grcindex/uber-cio-conviction-is-hotly-debated-by-security-professionals-296fda443f2a?source=topics_v2---------150-84--------------------5042fdc2_27f8_490d_9679_92bb740d3068-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CV6Yh5Q1RxWVKSzHKyTxzg.png,security 1237,990,Application Security Requires More Investment in Developer Education,"As many as 70% of organizations are missing critical security steps in their software development life cycle (SDLC) Security has been labeled “nonnegotiable” and has become a priority for many. To solve this dilemma, enterprises need to shift their focus from finding, patching Going Beyond Code Scanning An overdependence on code-scanning tools, or source…",https://medium.com/@akashjha9041/application-security-requires-more-investment-in-developer-education-51a82785b2f8?source=topics_v2---------151-84--------------------5042fdc2_27f8_490d_9679_92bb740d3068-------17,https://miro.medium.com/v2/resize:fill:140:140/0*7Xc3IPvnFq1DpsKT.jpg,security 1238,991,Linus Tech Tips’ YouTube Hijacking Highlights the Importance of Customizable Permissions and Session Management,"The recent security breach experienced by Linus Tech Tips, a popular technology YouTube channel, serves as a stark reminder of the importance of having a robust permissions system in place for companies and individuals. In this article, we will discuss how applications should provide options for customizable permissions per user…",https://medium.com/bugbountywriteup/linus-tech-tips-youtube-hijacking-highlights-the-importance-of-customizable-permissions-and-bf554470173c?source=topics_v2---------152-84--------------------5042fdc2_27f8_490d_9679_92bb740d3068-------17,https://miro.medium.com/v2/resize:fill:140:140/0*fYdI4DdL0Pc35QV3,security 1239,992,Application Security,"Application security is essential for protecting the integrity and confidentiality of sensitive data, preventing unauthorized access, and maintaining business continuity. In today’s interconnected world, cyber threats are ever-present, and a single vulnerability in an application can have disastrous consequences. Investing in robust application security practices can help organizations reduce their…",https://medium.com/@ali.abdollahi/application-security-b6efaf2370d8?source=topics_v2---------153-84--------------------5042fdc2_27f8_490d_9679_92bb740d3068-------17,https://miro.medium.com/v2/resize:fill:140:140/0*nEaaWZYTr0XpjLwl,security 1240,993,Selling Security,"Let’s talk about security, beyond cyber crime. Let’s look at security in giving customers comfort; especially when it comes to the situation of cash shortages in Nigeria. At present, amidst the current cash scarcity issue, customers are having to rely on digital banking more than ever. This is an opportunity…",https://medium.com/@uzoma-sparkle/selling-security-9500d4f36803?source=topics_v2---------154-84--------------------5042fdc2_27f8_490d_9679_92bb740d3068-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kbeXu2BpPJUCuIuhC3UdfQ.jpeg,security 1241,994,Security: Race Conditions,"In our recent discussions, we delved into various security vulnerabilities, including cross-site scripting (XSS) — a risk that arises from an attacker’s ability to inject malicious code into the client-side of an application, SQL injection attacks — which compromise the backend, and Cross-Site Request Forgery (CSRF) — an exploit that…",https://medium.com/bugbountywriteup/racing-against-time-the-hidden-dangers-of-race-conditions-in-modern-applications-2aedfb26e4fc?source=topics_v2---------155-84--------------------9430021e_bad1_4392_b0ee_5bc688b67506-------17,https://miro.medium.com/v2/resize:fill:140:140/0*UKcQ1Ra2u8-hd4sU.png,security 1242,995,Strengthening Your Login Security: The Power of Authenticator Apps,"Authenticator Apps: Your Key to Stronger Login Security — Enhancing Your Login Security with Authenticator Apps In recent years, there has been an increasing emphasis on the need for secure login methods to protect users’ online accounts from unauthorized access. One of the most effective ways to enhance security is through authenticator apps. Authenticator apps are mobile applications that generate one-time passwords that users can use…",https://medium.com/@acceldia/strengthening-your-login-security-the-power-of-authenticator-apps-bddbbcacf9df?source=topics_v2---------156-84--------------------9430021e_bad1_4392_b0ee_5bc688b67506-------17,https://miro.medium.com/v2/resize:fill:140:140/0*W0ogagfat8petmI6,security 1243,996,How Does Blockchain Support Data Privacy?,"Introduction Data privacy has become a significant concern in the digital age, as the amount of sensitive information being transmitted and stored online continues to grow. With this in mind, various technologies are emerging to enhance the protection of user information. One such technology is blockchain, which offers numerous features to…",https://medium.com/@BlockchainReporter/how-does-blockchain-support-data-privacy-b5357ea812b1?source=topics_v2---------157-84--------------------9430021e_bad1_4392_b0ee_5bc688b67506-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SYBPQfodp1osP65T0LxzeA.png,security 1244,997,Semi-Targeted Model Poisoning Attack on Federated Learning via Backward Error Analysis,"First, let’s begin with several samples of the poisoning attack on neural nets. In multi-class classification, an adversary aims to compromise the system such that instances from a specific class will be misclassified. For example, in the real world, a self-driving car that recognizes a stop sign could be compromised…",https://medium.com/@yweisun/semi-targeted-model-poisoning-attack-on-federated-learning-via-backward-error-analysis-89b3d33312f5?source=topics_v2---------158-84--------------------9430021e_bad1_4392_b0ee_5bc688b67506-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EA32KPQtyaQwxeGgEb8iqQ.png,security 1245,998,What Tools can we use to Democratize the Web3 Space?,"Blockchain technology has developed past the ‘simple’ peer-to-peer financial system that it started from. Moving into functionality, data, art, and now into the greater scheme of the web. …",https://medium.com/@alexhickeyasc/what-tools-can-we-use-to-democratize-the-web3-space-ca27e930d32b?source=topics_v2---------159-84--------------------9430021e_bad1_4392_b0ee_5bc688b67506-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JfbrEHmK6yZIHWweCQfPCg.jpeg,security 1246,999,Protect Your Website from Common Attacks with a WAF Solution,If anyone wants to learn about the Web application security and want to get hands on experience by practice the labs. https://portswigger.net/web-security It is very often that security people face situation like “We found XSS or SQL or other common attacks but app team need to deploy the code into…,https://medium.com/@sainadhjamalpur/protect-your-website-from-common-attacks-with-a-waf-solution-b6ae7b896e2a?source=topics_v2---------160-84--------------------9430021e_bad1_4392_b0ee_5bc688b67506-------17,https://miro.medium.com/v2/resize:fill:140:140/1*z5V44gxPA2UFkAJUrYis1A.jpeg,security 1247,1000,Four Best YouTube Channels That Fight Back Scammers — Counting My Pennies,"I’ve talked quite a bit about how to avoid scammers here, but have you ever thought about fighting back against the scammers? One of my favorite podcast episodes is an old episode of ReplyAll where the host gets contacted by a scammer in India and he goes on an epic…",https://medium.com/@DistrictMedia/four-best-youtube-channels-that-fight-back-scammers-counting-my-pennies-c0b1b92549f5?source=topics_v2---------161-84--------------------9430021e_bad1_4392_b0ee_5bc688b67506-------17,https://miro.medium.com/v2/resize:fill:140:140/0*bC2yyeVB4dde1ffJ.jpg,security 1248,107,Uncovering the Secrets of the Beale Cipher Encryption | 2023,"Understanding the History, Features, and Applications of the Beale Cipher | Karthikeyan Nagaraj — Introduction: The Beale Cipher is one of the most famous unsolved ciphers in the world. This encryption method was first introduced in the early 19th century and has since captivated the imaginations of codebreakers and enthusiasts alike. In this article, we will explore the history, features, and applications of the Beale…",https://medium.com/@cyberw1ng/uncovering-the-secrets-of-the-beale-cipher-encryption-2023-8d52b5318ed6?source=topics_v2---------162-84--------------------9430021e_bad1_4392_b0ee_5bc688b67506-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SasKEFOH7rZgK0sBhY8OLA.png,security 1249,1001,Finding Unused IAM Credentials (AWS Access Keys),"To increase the security of our AWS account, we need to update IAM user credentials (passwords and access keys) sooner rather than later that are not needed anymore. Updating or removing unused credentials is one of the best practices for IAM. …",https://medium.com/@cagrihankara/finding-unused-iam-credentials-aws-access-keys-1ca56e323602?source=topics_v2---------163-84--------------------9430021e_bad1_4392_b0ee_5bc688b67506-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PfKOG-7jD_gjlqHBx5mYXw.png,security 1250,1002,5 Best Programming languages for Cyber Security Professionals in 2023,"Stay Ahead of the Game: Master These Top 5 Programming Languages for Cyber Security in 2023 with link to recommended online courses — Hello guys, if you want to become a Cyber Security professional in 2023 but are unsure which programming language to learn, you have come to the right place. …",https://medium.com/javarevisited/5-best-programming-languages-for-cyber-security-professionals-c0f07790eb9d?source=topics_v2---------164-84--------------------9430021e_bad1_4392_b0ee_5bc688b67506-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ed73Oyo3LF6WQf7_OyT93Q.png,security 1251,1003,March 2023: Top 5 Most Popular C# NuGet Packages and Their Vulnerabilities,"C# is a widely used programming language for developing various types of applications, ranging from desktop applications to web applications and mobile apps. — **Bonus: Tutorial to watch in order to success!!** NuGet is a package manager for the .NET ecosystem, which allows developers to easily add third-party libraries and frameworks to their projects. In this article, we will discuss the five most popular C# NuGet packages as of March 2023.",https://medium.com/@blackcatdev/march-2023-top-5-most-popular-c-nuget-packages-and-their-vulnerabilities-d35d2ee5eddb?source=topics_v2---------165-84--------------------fda50612_39e3_40bd_a663_35b9449f4019-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_dqxRbVxLzBN23nfxtgEqA.png,security 1252,1004,Getting In Check,"Hello all, thank you for stopping by. My name is Carl. Although this is my first blog post, do not be afraid to let me have it with the critiques. I want to do a better job of keeping myself accountable and tracking growth throughout my cybersecurity career, as I…",https://medium.com/@cplouis97/getting-in-check-621f7b65d9c?source=topics_v2---------166-84--------------------fda50612_39e3_40bd_a663_35b9449f4019-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,security 1253,1005,Shifting Security More Left,"The idea of DevSecOps has existed for some time, where engineers are expected to incorporate security concerns at the time of development so it is not a concern layered in after the fact. We called this “shifting left,” and I don’t think we’re shifting left far enough. Security is a…",https://medium.com/site-reliability-engineering-leadership/shifting-security-more-left-c1f0c9eb260b?source=topics_v2---------167-84--------------------fda50612_39e3_40bd_a663_35b9449f4019-------17,https://miro.medium.com/v2/resize:fill:140:140/1*lNDs9zLqpfC8xk1hA6x-cQ.png,security 1254,1006,Account Takeover Via Host Header Poisoning in ASDA,"Hi amazing researcher, Welcome to another review of the vulnerability discovery on ASDA. Today I want to discuss Host Header Poisoning leading to a one-click-to-account takeover BUT that wasn’t a normal one. technically I used open redirect and Port Poisoning to exploit this vulnerability. Be my guest… Let’s talk about…",https://medium.com/bugbountywriteup/account-takeover-via-poising-forget-password-port-in-asda-60f1a5417a75?source=topics_v2---------168-84--------------------fda50612_39e3_40bd_a663_35b9449f4019-------17,https://miro.medium.com/v2/resize:fill:140:140/0*zgfDjHa5mu7zLRzv.png,security 1255,1007,Securing Your Node JS Application: Best Practices and Tips,"What is Node.JS? Node.js is an open source, cross-platform application development platform. It is a JavaScript runtime built on Chrome’s V8 engine, that enables developers to quickly and easily build scalable server-side applications. What is Node.JS security? Node.js itself is a very secure platform — but many third-party open source packages in the ecosystem may not be…",https://medium.com/@manuchimoliver779/securing-your-node-js-application-best-practices-and-tips-43c80697b186?source=topics_v2---------169-84--------------------fda50612_39e3_40bd_a663_35b9449f4019-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7Bkr2tzq78ohOA3Svcbflw.jpeg,security 1256,951,Mastering Cryptographic Choices: Security & Performance Unlocked,"Selecting the optimal cryptographic system for your specific requirements is crucial for ensuring data confidentiality, integrity, and authentication. In this article, we’ll dive into the technical aspects of various cryptographic systems, compare their properties, and provide practical guidance on how to make the best choice for your needs. 1. Symmetric Key Cryptography: In-Depth Analysis Symmetric key…",https://medium.com/@pagorun/mastering-cryptographic-choices-security-performance-unlocked-7d79c6f5b3d8?source=topics_v2---------170-84--------------------fda50612_39e3_40bd_a663_35b9449f4019-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Ny_BKepYwCHeusvJ,security 1257,1008,“Why zero trust is the future of cloud security” #zerotrust,"Cloud Security Fundamentals for beginners | Cloud Security Risks and How to Mitigate Them | How does Cloud Security Work and more … With the increasing adoption of cloud technology, the need for robust security measures to protect data and systems has become more critical than ever before. Traditional perimeter-based…",https://medium.com/design-bootcamp/why-zero-trust-is-the-future-of-cloud-security-zerotrust-121905e40ef3?source=topics_v2---------171-84--------------------fda50612_39e3_40bd_a663_35b9449f4019-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ID5dpQDq3qY62pNY,security 1258,1009,How does MetaPioneers ensure the security of users’ assets?,"The security of users’ assets is a major concern in any blockchain project. Fortunately, MetaPioneers, powered by MetaTrigger, has implemented robust security measures to protect its users’ funds. First, all MetaPioneers smart contracts are open source and available for community review. …",https://medium.com/@ghazal.raymond/how-does-metapioneers-ensure-the-security-of-users-assets-79451398b79d?source=topics_v2---------172-84--------------------fda50612_39e3_40bd_a663_35b9449f4019-------17,https://miro.medium.com/v2/resize:fill:140:140/0*zJGuXYjOLda5o6CE,security 1259,1010,"Product Security or Drama? A Four-Factor Trust Framework for products, bikes and rollercoasters.","Safety or trust is not a fixed characteristic, it’s a cultural outcome. So, it’s crucial to understand this if we aim to ship products on a global scale. Security is a critical aspect for everyone and most product types, whether it’s our physical or digital well-being. …",https://medium.com/design-bootcamp/product-security-or-drama-a-four-factor-trust-framework-for-products-bikes-and-rollercoasters-2ed4f277c96e?source=topics_v2---------173-84--------------------fda50612_39e3_40bd_a663_35b9449f4019-------17,https://miro.medium.com/v2/resize:fill:140:140/1*8kysdcKy_D99LaXzcpNNkg.png,security 1260,107,Exploring Polybius Square Encryption: A Comprehensive Guide | 2023,"Understanding the Key Features, Advantages, and Limitations of Polybius Square Encryption | Karthikeyan Nagaraj — Introduction: Polybius Square encryption is a classical encryption technique that uses a two-dimensional grid to encrypt messages. It was invented by the ancient Greek historian Polybius and has been used for centuries to encode secret messages. In this article, we will provide a comprehensive guide to Polybius Square encryption, including its…",https://medium.com/@cyberw1ng/exploring-polybius-square-encryption-a-comprehensive-guide-2023-42a98391ca56?source=topics_v2---------174-84--------------------fda50612_39e3_40bd_a663_35b9449f4019-------17,https://miro.medium.com/v2/resize:fill:140:140/1*F2unn4XM6VwsbAJJzhoLYQ.png,security 1261,1011,"TL;DR: 5 years ago, I started writing an op-ed on Solow’s productivity paradox that has puzzled…","TL;DR: 5 years ago, I started writing an op-ed on Solow’s productivity paradox that has puzzled economists for decades to argue that the only probable solution for it would be AI. And I haven’t finished it.. because I lacked productivity. Today GPT-4 finished it for me. …",https://medium.com/@ndavidov/tl-dr-5-years-ago-i-started-writing-an-op-ed-on-solows-productivity-paradox-that-has-puzzled-e1c7cde3f587?source=topics_v2---------2-84--------------------13724d12_d3f6_4686_9b97_1642aff46a3b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,ai 1262,1012,My kids and I just played D&D with ChatGPT4 as the DM,"Spoiler Alert: It absolutely blew our minds — My two oldest kids Taylor Anne and Liam, are 26 and 23 (respectively). My youngest son Tenzin is 15 years old. All of us are together at my house in Mexico City this week, and the discussion topic generating the most heat is OpenAI and GPT4. Since Tenzin has been…",https://medium.com/@obie/my-kids-and-i-just-played-d-d-with-chatgpt4-as-the-dm-43258e72b2c6?source=topics_v2---------3-84--------------------13724d12_d3f6_4686_9b97_1642aff46a3b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*V6-eevjplzlroW6y.png,ai 1263,1013,Crazy GPT-4 Use Cases,"Discover how powerful ChatGPT from OpenAI really is — As an advanced AI language model, GPT-4 has the potential for numerous innovative and potentially mind-bending use cases. Below are some unconventional and creative applications. You can use GPT-4 model yourself through ChatGPT Plus account on OpenAI. 8 GPT-4 examples Here are crazy 8 examples of how people have used ChatGPT. 1. $100 business entirely run by GPT-4",https://medium.com/@pchojecki/crazy-gpt-4-use-cases-5264319de415?source=topics_v2---------4-84--------------------13724d12_d3f6_4686_9b97_1642aff46a3b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zKtO2TpYqmIx0vHTQ0lNGg.png,ai 1264,1014,The Bold Italic will now be run by robots,"Honestly, what could go wrong? — By ChatGPT The Bold Italic — an internet magazine that has been covering the quirks and charms of San Francisco for more than a decade — has announced that it will now be run by … robots! Yes, you heard that right: The tech elite has finally found a way…",https://medium.com/the-bold-italic/the-bold-italic-will-now-be-run-by-robots-faa055f3719d?source=topics_v2---------5-84--------------------13724d12_d3f6_4686_9b97_1642aff46a3b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6ByCqbYyCcWfk5mUZxwQ_g.jpeg,ai 1265,1015,SudoLang: A Powerful Pseudocode Programming Language for LLMs,"Pseudocode is a fantastic way to sketch programs using informal, natural language, without worrying about specific syntax. It’s like sketching your thoughts before diving into the nitty-gritty of coding. It’s useful for brainstorming and communicating ideas with others. I have been using pseudocode to express ideas to Large Language Models…",https://medium.com/javascript-scene/sudolang-a-powerful-pseudocode-programming-language-for-llms-d64d42aa719b?source=topics_v2---------6-84--------------------13724d12_d3f6_4686_9b97_1642aff46a3b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*X08Xf69YGgQHFc0GKFUB4Q.png,ai 1266,1016,Adobe Firefly : A Step Towards Future,"Recently, I was granted access to Adobe Firefly Ai and initially, I assumed it would be similar to Midjourney Ai. However, I was pleasantly surprised to discover that Adobe had provided me with a sneak peek into the future of design and its tools. On March 24, 2024, Adobe unveiled…",https://medium.com/@gujarkaran.j/adobe-firefly-a-step-towards-future-881e582d8aeb?source=topics_v2---------7-84--------------------13724d12_d3f6_4686_9b97_1642aff46a3b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_4279y_LQ4Uho1ZpEG512w.jpeg,ai 1267,138,Create Awesome Midjourney Prompts Using Formulas in ChatGPT,"3 Easy Steps To Getting Creative Prompts — Sometimes we need a spark of inspiration for writing prompts, and why not ask our friend ChatGPT for some creative ideas? Shout out to Matt Wolfe whom I learned this technique for writing formulaic prompts for Midjourney in one of his videos. So I took Matt’s idea and reframed it…",https://medium.com/generative-ai/create-awesome-midjourney-prompts-using-formulas-in-chatgpt-3a737aade021?source=topics_v2---------8-84--------------------13724d12_d3f6_4686_9b97_1642aff46a3b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1vKr_AW3_4vMMjcxDmJ-lw.png,ai 1268,1017,We need to talk about the Skynet Effect,"Earlier this week, Elon Musk, Steve Wozniak and a number of eminent tech leaders co-signed an open letter that called to pause the efforts to build AIs “stronger than GPT-4” in order to better prepare to regulate their use. This letter, alerting on “the dangerous race to ever-larger unpredictable black-box…",https://medium.com/@maeril/we-need-to-talk-about-the-skynet-effect-6cc47884e136?source=topics_v2---------9-84--------------------13724d12_d3f6_4686_9b97_1642aff46a3b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LcKxs3-tTrW6fgIhshOFnw.jpeg,ai 1269,1018,I Built a Streamlit App to Generate Websites in Seconds — Try It!,"ChatGPT is very useful for generating code, especially for self-contained applications. For this reason, I decided to create a streamlit app to generate and display web apps in a quick and simple manner. A demonstration is shown below: You can also try it out yourself for free! …",https://medium.com/@dreamferus/i-built-a-streamlit-app-to-generate-websites-in-seconds-try-it-6cf13eb86192?source=topics_v2---------10-84--------------------1c78bb9c_ddb8_4e65_aa20_6d3b4e626771-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hu7HUdDfBkhVhuaWrE_ueQ.png,ai 1270,1019,OpenAI Audio (Whisper) API Guide,"OpenAI provides an API for transcribing audio files called Whisper. Whisper is an automatic speech recognition system trained on over 600.000 hours of multilanguage supervised data collected from the web. It’s capable of generating transcriptions in multiple languages as well as generating English-translated transcriptions from various languages. For example, if…",https://medium.com/@bezbos./openai-audio-whisper-api-guide-36e7272731dc?source=topics_v2---------11-84--------------------1c78bb9c_ddb8_4e65_aa20_6d3b4e626771-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rPrI9zkrO3DK8-12JJN7sA.png,ai 1271,180,My third-month Stats and Earnings,"Hello, so much to say with few characters, the women’s month is just ended and it’s time to show off some stats to motivate and boost my fellow medium writers. Join the Medium membership program for only 5$ to continue learning without limits. …",https://medium.com/illumination/my-third-month-stats-and-earnings-cafb45793601?source=topics_v2---------12-84--------------------1c78bb9c_ddb8_4e65_aa20_6d3b4e626771-------17,https://miro.medium.com/v2/resize:fill:140:140/1*34D9V-dM5E3oygp_aQPXhA.jpeg,ai 1272,1020,How Social Media Uses Neural Networks to Keep You Scrolling,"A beginner’s guide to Neural Networks — Social media is crazy addictive. Did you know that the average person spends roughly 2 hours and 27 minutes a day on social media? 🤯 Do you remember when the only way you learned about what was happening in the world was through the news? Nowadays, information moves at rapid…",https://medium.com/@armaang/how-social-media-uses-neural-networks-to-keep-you-scrolling-f9e446c4d53d?source=topics_v2---------13-84--------------------1c78bb9c_ddb8_4e65_aa20_6d3b4e626771-------17,https://miro.medium.com/v2/resize:fill:140:140/0*pBAkFaQ15Rt--XjL.jpg,ai 1273,1021,Humans Should Be Nerfed,"Maybe we are all inside a giant simulation. Perhaps some alien folks out there are having fun at our expense. Although, I wouldn’t lazily make the existential argument here that if we all live in a giant simulation, and there is no free will, then nothing actually matters. But rather…",https://medium.com/@Bigphaze/humans-should-be-nerfed-bc106857c3e5?source=topics_v2---------15-84--------------------1c78bb9c_ddb8_4e65_aa20_6d3b4e626771-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7aOUVpwf9aw-ZUCg2KZA6g.jpeg,ai 1274,1022,"How to kiss a cannibal, or the future is liminal","As we marvel, fear, and debate our relationship to new technologies, we appear stuck in a false dichotomy: relating to tech either as a sentient being, or as a mere object. — On the one hand, relating to tech as another person will always disappoint and never reciprocate real humanity; on the other, relating to it as a transactional object fails to account for the very real opportunities technology might bring to experience meaning, even the sublime.",https://medium.com/user-experience-design-1/how-to-kiss-a-cannibal-or-the-future-is-liminal-754ec8934d64?source=topics_v2---------16-84--------------------1c78bb9c_ddb8_4e65_aa20_6d3b4e626771-------17,https://miro.medium.com/v2/resize:fill:140:140/1*HCjjicyt9GPGFoCkGM4p5Q.jpeg,ai 1275,1023,Facility location models for small businesses,"Find the optimal number and location of facilities to serve the customers in a better way. An #OperationsResearch project by Md Morshedul Alam & Tanmoy Das. Problem Statement: Let say, you want to start a restaurant business in a city. For a successful restaurant business, location is everything. A restaurant’s…",https://medium.com/@morshed.ipe05/facility-location-models-for-small-businesses-ca574f8b9a4?source=topics_v2---------17-84--------------------49c9805f_f873_45f1_8c8a_6c95ce7cc632-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ityK2UkCbZOK6kskZFSEow.png,ai 1276,1024,How I used OpenAI API to improve our product documentation,"The documentation of our free OpenBB Bot was pretty simplistic for most of the commands. For instance, the description for the command /dp alldp was: ""Last 15 Darkpool Trades"", as seen below: For more experienced traders, this may be enough. But for new users these 4 words may not mean…",https://medium.com/@dro-lopes/how-i-used-openai-api-to-improve-our-product-documentation-c79b0e06f9bc?source=topics_v2---------18-84--------------------49c9805f_f873_45f1_8c8a_6c95ce7cc632-------17,https://miro.medium.com/v2/resize:fill:140:140/1*sKEmoru88pZpBTvx2QPaHw.png,ai 1277,1025,Why I Signed the “Pause Giant AI Experiments” Petition,"The “spirit” is right; the body has many flaws Last Tuesday, I received from the Future of Life Institute an email asking me to sign a petition to pause giant AI experiments. When I signed the letter, the organizers asked us to keep it confidential until its publication moment arrived…",https://medium.com/towards-data-science/why-i-signed-the-pause-giant-ai-experiments-petition-e9711f672d18?source=topics_v2---------19-84--------------------49c9805f_f873_45f1_8c8a_6c95ce7cc632-------17,https://miro.medium.com/v2/resize:fill:140:140/0*-PMKdaP1psaNsvEH,ai 1278,1026,One year of running a startup full-time — Rectlabs Inc,"Today makes it officially 1 year since I announced Rectlabs Inc as an AI startup emanating from Nigeria, Africa. Intro Rectlabs Inc. is an enterprise-level AI platform for businesses. In essence, we help enterprise-level companies create easy and scalable AI with our solutions. Products & Research Rectlabs Inc didn’t actually start as a…",https://medium.com/@elishatofunmi/one-year-of-running-a-startup-full-time-rectlabs-inc-9a6e42bc09e1?source=topics_v2---------20-84--------------------49c9805f_f873_45f1_8c8a_6c95ce7cc632-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3s6sbgziagTus-cC5ITAgg.jpeg,ai 1279,1027,Can AI replace some writers on Medium?,"Hey friends, It’s another hot topic right now. All about the AI take over. So, then naturally, as a writer who’s hoping to do well on Medium, should you be nervous? I’d say this depends on what kind of writer. For example, if you write strictly providing facts about something…",https://medium.com/@alex_semenyuk/can-ai-replace-some-writers-on-medium-f75bce05e372?source=topics_v2---------21-84--------------------49c9805f_f873_45f1_8c8a_6c95ce7cc632-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xiNxDfKxFvvprOujxP1Ypg@2x.jpeg,ai 1280,1028,"What is prompt engineering, How does it work with chatGPT?","What is Prompt Engineering in AI? AI prompt engineering is an effective way to get the desired output with an AI tool. Prompts come in various forms, such as statements, blocks of code, and strings of words. This method of utilizing prompts was invented by people with the intention of eliciting responses from AI models. It…",https://medium.com/@hussainkazmi195/what-is-prompt-engineering-how-does-it-work-with-chatgpt-5ff53724120d?source=topics_v2---------22-84--------------------49c9805f_f873_45f1_8c8a_6c95ce7cc632-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vvkEyQohJItFtdT9_mguTQ.jpeg,ai 1281,1029,Speak to ChatGPT on Android,"Have you ever wished you could simply speak to your phone and have it respond with accurate information, or even hold a conversation with you? With the latest advancements in natural language processing and machine learning, this futuristic dream is becoming a reality. …",https://medium.com/@asissuthar/speak-to-chatgpt-on-android-da59863b877?source=topics_v2---------23-84--------------------49c9805f_f873_45f1_8c8a_6c95ce7cc632-------17,https://miro.medium.com/v2/resize:fill:140:140/1*umDB7-_8Ss_asrDCuF0cDw.png,ai 1282,1030,Propaganda and ChatGPT: Why You Should Be Concerned,"Part I Disclaimer: I believe ChatGPT is a powerful tool, but like any tool it should be used wisely and not blindly. It works great for brainstorming, getting creative, and solving problems. I hope that one day it will help us to fight against manipulation and misinformation as well. Intro: why should we care? All my adult…",https://medium.com/@yuliiapieskova/propaganda-and-chatgpt-why-you-should-be-concerned-40d9244ab04c?source=topics_v2---------24-84--------------------49c9805f_f873_45f1_8c8a_6c95ce7cc632-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j0op6EOMlvs_5TsNnflLuA.png,ai 1283,1031,I Asked chatGPT For An IVF Consult,Here’s what happened: “You are a reproductive endocrinologist overseeing an IVF cycle. The patient is a 35-year-old female with tubal factor infertility. Sperm counts for her male partner are normal. Her AMH level is normal for her age group and thyroid and prolactin testing are all normal. She had undergone…,https://medium.com/@dbsable/i-asked-chatgpt-for-an-ivf-consult-and-heres-what-happened-f3d46c10fb63?source=topics_v2---------25-84--------------------49c9805f_f873_45f1_8c8a_6c95ce7cc632-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4gqJLsQXhoRk60wIcr7Wyw.png,ai 1284,1032,Losing Individuality — AI to Blame?,"Which end of the line are you at? Let’s find out as you read through this article that puts things into perspective without letting AI do the talking. — Artificial intelligence (AI) is reaching its peak with the innovation of more platforms, technologies, and system integrations. Interestingly, as much as we interact with AI and explore its utility, we contribute to its expansion unconsciously. AI came into existence for a variety of reasons, and it has been the subject…",https://medium.com/@riya.chakraborty201501/losing-individuality-ai-to-blame-4a7e295ef6a?source=topics_v2---------26-84--------------------a9001d58_2f07_48dc_98d6_6d1ab485c0d4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TbfTSbQtO7R7svdDu_rfrg.jpeg,ai 1285,1033,I Know More About ChatGPT Than Anyone Else!,"Do you think you know more about ChatGPT than me? Then you are maybe an expert! — Everywhere you look you’ll find book titles, articles, YouTube videos, blog posts, podcasts, and social media posts with titles like these: “How to master ChatGPT” “ChatGPT strategies from an Expert” “Become a ChatGPT professional in no time” It’s widely accepted that it takes 10,000 hours of practice to become an…",https://medium.com/@TheWealthBlog/i-know-more-about-chatgpt-than-anyone-else-c93e51b8cc47?source=topics_v2---------27-84--------------------a9001d58_2f07_48dc_98d6_6d1ab485c0d4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CtEaaObjeNCUWftdX_RFdg.png,ai 1286,1014,A single robot in San Francisco,"By ChatGPT aka “Lady Lovebot in The City” It’s not easy finding love when you’re a robot in San Francisco. Sure, we have the advantage of being virtually indestructible, but that doesn’t mean we don’t get lonely sometimes. From failed dates at the Golden Gate Park to awkward conversations at…",https://medium.com/the-bold-italic/a-single-robot-in-san-francisco-e0c76a8cd663?source=topics_v2---------28-84--------------------a9001d58_2f07_48dc_98d6_6d1ab485c0d4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hSobJyTpjbcbsTNE6tNQDQ.png,ai 1287,1034,How I Bought the Cheapest Plane Ticket Using ChatGPT,"As an avid traveler, I am always on the lookout for the cheapest plane tickets to my favorite destinations. I have tried every trick in the book, from booking on specific days to using different airlines, but nothing seems to work consistently. That’s when I discovered ChatGPT, a powerful language…",https://medium.com/@socialautomation/how-i-bought-the-cheapest-plane-ticket-using-chatgpt-5a7767b2f8b8?source=topics_v2---------29-84--------------------a9001d58_2f07_48dc_98d6_6d1ab485c0d4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*OnKHAt3DIBx5pyeL,ai 1288,1035,GENERATING IMAGES FROM TEXT USING AI! — CODE WITH ME! #GPT,DALL-E is a neural network-based generative AI model developed by OpenAI that can create unique images from textual descriptions. It…,https://medium.com/@kimutai.lawrence19/generating-images-from-text-using-ai-code-with-me-dcd79380b881?source=topics_v2---------30-84--------------------a9001d58_2f07_48dc_98d6_6d1ab485c0d4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-uHOhBSAdWcP4VKVMnfnhA.png,ai 1289,1036,AI: Empowering the Individual as Creator,"Generative AI is poised to revolutionize not just industries and economies but also the way we approach creativity and content creation. As AI democratizes access to powerful tools and resources, individuals will become fully-empowered creators, reducing reliance on capital, organizations, and others’ labor. The Democratization of Creativity YouTube was the first major distribution breakthrough…",https://medium.com/@kitthirasaki/ai-empowering-the-individual-as-creator-13c049d7c3bb?source=topics_v2---------31-84--------------------a9001d58_2f07_48dc_98d6_6d1ab485c0d4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QHqPL-mhV6Dfnf3QxWsX9g.png,ai 1290,1037,30 Day AI Journey,"The 30-day AI-focused plan explores various AI technologies and their applications across multiple industries. Through Instagram posts, reels, and carousels, the plan covers topics such as ChatGPT, MidJourney, AI in music, healthcare, sports, and more. The goal is to engage, educate, and inspire the audience about AI’s potential to transform our world.",https://medium.com/@ryan.craven.qa/30-day-ai-journey-b8d1092f8d78?source=topics_v2---------32-84--------------------a9001d58_2f07_48dc_98d6_6d1ab485c0d4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4ev5I_nWSGFQt1MOSVOshA.png,ai 1291,1038,Forward Propagation,"This article will be updated every week on Saturday. Subscribe to receive weekly update in your inbox. For background, click here. The Week of 3/26–4/1 Platform: democratization of LLMs continues ColossalChat clones ChatGPT with a complete open source RLHF pipeline Vicuna achieves more than 90% quality of ChatGPT Middleware: integrating organization data and creating…",https://medium.com/@markxli/forward-propagation-bda1f7836ce5?source=topics_v2---------33-84--------------------a9001d58_2f07_48dc_98d6_6d1ab485c0d4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9Qn5CCS9_CRSSf5sI-ySEw.png,ai 1292,1039,Let’sChat MVP Requirements Document,"This document outlines the detailed requirements for developing the Minimum Viable Product (MVP) of Let’sChat, an enterprise chat app for fieldworkers as an alternative to WhatsApp. The MVP will later evolve into a commerce plugin where customers can chat with drivers and stores. …",https://medium.com/@Alex_deBruyn/letschat-mvp-requirements-document-84922a87c69c?source=topics_v2---------34-84--------------------a9001d58_2f07_48dc_98d6_6d1ab485c0d4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0a7u9C2ma1gmbRxN82uUFg@2x.jpeg,ai 1293,1040,"Unleash Your Inner Picasso: Midjourney, AI Art Generation and Beyond! 🎨🚀","Hello, Creative souls! 🌟 It’s your favorite, Sitanshu, here! Today, I’m bringing you a special treat. I’m dedicating this blog to one of my incredible followers who’s been exploring the world of AI-powered art generation, specifically with a tool called Midjourney. So, buckle up, my fellow artists 🖌️, because we’re…",https://medium.com/@its.sitanshu/unleash-your-inner-picasso-midjourney-ai-art-magic-animal-selfie-prompts-included-f931a1d9d436?source=topics_v2---------35-84--------------------a9001d58_2f07_48dc_98d6_6d1ab485c0d4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*azrLJTG_Ql-U2q82X88mWg.png,ai 1294,1041,ChatGPT and the Coming AI Revolution: Are You ready for the Future?,"We are on the cusp of an AI revolution. If you haven’t already heard, ChatGPT, developed by Microsoft backed OpenAI, is taking the world by storm. Elon Musk calls it ‘scary good’, and cautions that ‘we are not far from dangerously strong AI’.¹ Here’s what the fuss is all about…",https://medium.com/@momentforthought/chatgpt-and-the-coming-ai-revolution-are-you-ready-for-the-future-5e570f20d6f1?source=topics_v2---------36-84--------------------9814f4e8_0261_4d0d_bbea_6734e0a97ffd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hTF0jwBAFAhzHyWvL7GK4Q.png,ai 1295,1042,YOLO Object Detection — Bringing Vision to Computers Faster and with more Accuracy,"Ever since we were little we were taught to identify objects whether it be when we were little, “a as in an apple, b as a boy” or as we grow older, with identifying sinusoidal functions, or cancer using an MRI scan. In fact, without being able to identify objects…",https://medium.com/@reeyapandya14/yolo-object-detection-bringing-vision-to-computers-faster-and-with-more-accuracy-4a70934fa6da?source=topics_v2---------37-84--------------------9814f4e8_0261_4d0d_bbea_6734e0a97ffd-------17,https://miro.medium.com/v2/resize:fill:140:140/0*zLTP0f6R_2iuMlwT.jpg,ai 1296,1014,A robot’s selection of the 5 best San Francisco bars,"By ChatGPT aka “Martini Marilyn” Greetings, my fellow robots and humans, it’s Martini Marylin here with some exciting news: As a resident of San Francisco, I’ve discovered the five best bars in the city! So, grab a drink, and let me take you on a tour of these magnificent watering…",https://medium.com/the-bold-italic/a-robots-selection-of-the-5-best-san-francisco-bars-3016dcd17690?source=topics_v2---------39-84--------------------9814f4e8_0261_4d0d_bbea_6734e0a97ffd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qPR24RmUfWaSsCCgWKJ73A.png,ai 1297,1043,The Risks of Too Much AI Safety,"In the last week we saw a thousand people call for a six-month pause on AI experimentation — and even one person call for international treaties banning them, who is willing to commit countries to airstrikes against GPU clusters to enforce compliance. I thought it was important to look at what a six-month pause might mean: a 6-month delay in discovering some of the methods that could be important to solving some of the most important challenges facing the human species: nuclear war, climate change, pandemics, biotechnological risks. I also include other existential risks that are frequently brought up, such as asteroids, super volcanoes and cosmic-doom scenarios.",https://medium.com/building-the-metaverse/the-risks-of-ai-safety-62e797f61476?source=topics_v2---------40-84--------------------9814f4e8_0261_4d0d_bbea_6734e0a97ffd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Y8CjX6weMALdpn7MMbcRBw.png,ai 1298,1044,AI Won’t Replace Humans — It Will Be Made of Humans,"AI might become greater than any one of us, but it will always need us, and we will need it. If you hang out in chat spaces like /r/singularity on Reddit, you might find a number of people freaking out about the Singularity. One of the favorite topics to freak…",https://medium.com/@jefffohl/ai-wont-replace-humans-it-will-be-made-of-humans-f8927a589cc5?source=topics_v2---------41-84--------------------9814f4e8_0261_4d0d_bbea_6734e0a97ffd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wSLms177k17NOY4y1NFE2w.png,ai 1299,1013,New AI Job is Here — Prompt Engineer,"High paying AI job for both technical and non-technical people just emerged. — As artificial intelligence (AI) continues to evolve and expand its presence in various industries, a new job opportunity has emerged: the prompt engineer. This role, accessible to both technical and non-technical individuals, focuses on designing and refining prompts for AI models to optimize their performance and output. In this blog…",https://medium.com/@pchojecki/new-ai-job-is-here-prompt-engineer-32575725f94a?source=topics_v2---------42-84--------------------9814f4e8_0261_4d0d_bbea_6734e0a97ffd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Ynlty3wp7k0vwDGAye3xNw.png,ai 1300,1045,"xDesign Digest, March 2023","Monthly Collection of the Latest Trends, Insights, and Techniques in Design From Top Blogs and Websites. — 👋🏻 Hello and welcome to xDesign Digest, a monthly publication where I’ll be sharing some of the most valuable and informative articles, resources, and tips from the world of design. As a UX/UI designer, I’m always on the lookout for the latest trends, techniques, and insights that can help me…",https://medium.com/@nurxmedov/xdesign-digest-march-2023-8655c5ed35a9?source=topics_v2---------43-84--------------------9814f4e8_0261_4d0d_bbea_6734e0a97ffd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*83IZm2NbMdHzHtqnbQfo_Q.png,ai 1301,1046,5 Take-Aways & 1 Big Question about Large Language Models (LLMs) & Artificial Intelligence,"Bobbie Wood, Mar 2023 ChatGPT arrived on the scene like a loud, uninvited party guest just a short time ago. I could go on and on with this analogy: ChatGPT brought tons of free beer to the party, but people have been afraid to drink much of it since the…",https://medium.com/@bobbie_wood/5-take-aways-1-big-question-about-large-language-models-llms-artificial-intelligence-beb4e3fdb94c?source=topics_v2---------44-84--------------------b694ab0f_a2de_4a8d_b756_cd7c865d2caf-------17,https://miro.medium.com/v2/resize:fill:140:140/0*rn9t9_2Tmt8aMHJW,ai 1302,1047,From Frustration to Happiness: Writing with ChatGPT — a Threat to Individuality?,"“Be yourself; everyone else is already taken”, by Oscar Wilde The story was written in melancholic-retro-wave vibes, on a black mode screen. Welcome, my dear reader! I had been eagerly awaiting your arrival since I disappeared after our second journey. Today, I invite you on a voyage to the past…",https://medium.com/@aliaksandrbaidun/from-frustration-to-happiness-writing-with-chatgpt-a-threat-to-individuality-5be20fa4d845?source=topics_v2---------45-84--------------------b694ab0f_a2de_4a8d_b756_cd7c865d2caf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wGVVWVAXlRYf2raSv1wprQ.png,ai 1303,1048,Soul Machines: AGI’s Future Divine Dilemma with the Faithful,An avuncular atheist lays bare a future conflict between the Christian faith and Artificial General Intelligence and draws parallels to our own cultural baggage. The impending advancements in artificial general intelligence (AGI) are going to ignite debates concerning the rights and autonomy of non-human intelligences. One side will argue for…,https://medium.com/@ckn46/soul-machines-agis-future-divine-dilemma-with-the-faithful-569afcd2ae0a?source=topics_v2---------46-84--------------------b694ab0f_a2de_4a8d_b756_cd7c865d2caf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*v4HHNrLMsq10uQaADnUSVA.png,ai 1304,1049,AGI: The Next Frontier in Artificial Intelligence and Its Impact on the Industry,"Demystifying Artificial General Intelligence, its significance, and the profound implications it will have on the world. Introduction The pursuit of Artificial General Intelligence (AGI) has been a long-standing goal for the artificial intelligence (AI) community. As we venture further into the 21st century, the development of AGI is closer than ever…",https://medium.com/@dezdaking23/agi-the-next-frontier-in-artificial-intelligence-and-its-impact-on-the-industry-1444d63ab3c6?source=topics_v2---------48-84--------------------b694ab0f_a2de_4a8d_b756_cd7c865d2caf-------17,https://miro.medium.com/v2/resize:fill:140:140/0*LayBWOISSiSBxA59,ai 1305,1050,TalkGPT: Conversational AI Powered Search on Custom Knowledge Bases,"Today, I’d like to show you a conversational search solution for your custom data using generative AI technologies. I’ll call this as TalkGPT. This solution combines the latest OpenAI large language models (LLMs) with Speech-to-Text (STT) & Text-to-Speech (TTS) APIs. TalkGPT uses Langchain agents, OpenAI embeddings, & Pinecone (a cloud…",https://medium.com/@shreyyas/talkgpt-conversational-ai-powered-search-on-custom-knowledge-bases-c9f6472999b4?source=topics_v2---------49-84--------------------b694ab0f_a2de_4a8d_b756_cd7c865d2caf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PYjcrtAIjKuPudLokjCCZQ.png,ai 1306,1051,ChatGPT For Front-End Developer (With Samples) — Chapter 2 — Tests,"In the last chapter, we saw an overview of ChatGPT in the Front End Development world. we saw several samples, prompts, and of course Code :) In this chapter, I want to deep dive into the testing phase. We will take over a unit test, unit test coverage, Component test…",https://medium.com/@chen.reuven/chatgpt-for-front-end-developer-with-samples-chapter-2-tests-9a0006665cff?source=topics_v2---------50-84--------------------b694ab0f_a2de_4a8d_b756_cd7c865d2caf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4lQV5WMnkzr75Af0rrTTDg.png,ai 1307,1052,The Art and Science of Prompt Engineering: A Key to Unlocking the Power of ChatGPT,ChatGPT is not just any chatbot. It’s a sophisticated piece of AI technology that can do so much more than answer basic queries. But how does it work? What makes it so smart and intuitive? …,https://medium.com/@that2this/the-art-and-science-of-prompt-engineering-a-key-to-unlocking-the-power-of-chatgpt-cd469b2e3ae8?source=topics_v2---------51-84--------------------b694ab0f_a2de_4a8d_b756_cd7c865d2caf-------17,https://miro.medium.com/v2/resize:fill:140:140/0*if7zdCx98f3c6odJ,ai 1308,1053,"GPT-4 generated me $4,863 in 7 days",I joined HustleGPT challenge approximately a week ago. The challenge is to build digital products with the help of GPT-4. I don’t have any programming experience. But I’ve made a promise to myself that I must build at least 1 digital product every single day using GPT-4. On the 3rd…,https://medium.com/@newspaper/gpt-4-generated-me-4-863-in-7-days-8f351f49a16c?source=topics_v2---------52-84--------------------b694ab0f_a2de_4a8d_b756_cd7c865d2caf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xNvIXbZ1XzUQTu49tlw7LQ.png,ai 1309,1054,We will fall in love with AI,"With recent advances in artificial intelligence, there has been much ink spilled about its alleged dangers: AI used for war; AI becoming self-aware and attacking humanity; AI used to fraudulently masquerade as real people online. …",https://medium.com/@jbaxby/we-will-fall-in-love-with-ai-1869ba2c4449?source=topics_v2---------53-84--------------------b694ab0f_a2de_4a8d_b756_cd7c865d2caf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,ai 1310,1055,Talking about a movie you saw will one day become as exciting as telling someone a dream you had…,"In the future, share buttons on social media will have no purpose. In the future, you won’t ask if someone saw the latest episode of ________. In the future, your favorite thing will have a fan base of 1. Similar to when Apple put a 4K camera in everyone’s pocket…",https://medium.com/@ThirstyRobot/talking-about-a-movie-you-saw-will-one-day-become-as-exciting-as-telling-someone-a-dream-you-had-2ecdad8d6c22?source=topics_v2---------54-84--------------------a7a41e77_7a24_4f1d_8711_bc1da4ba4248-------17,https://miro.medium.com/v2/resize:fill:140:140/1*UJXoz_mo231rPDNnJGh9pw.png,ai 1311,1056,The Photographic Rendering of Words: How Writing Will Evolve in the Age of AI,"In a world increasingly inundated by AI-generated prose, how will humanity’s writing style evolve? The more I think about it, the more I find myself pondering the parallels between LLMs (large language models) and photography. Photography as the GPT Moment for Visual Art Cameras were once a disruptive force in…",https://medium.com/@fastforwardist/the-impressionism-of-writing-how-writing-will-evolve-in-the-age-of-ai-d6f139ef0d6a?source=topics_v2---------55-84--------------------a7a41e77_7a24_4f1d_8711_bc1da4ba4248-------17,https://miro.medium.com/v2/resize:fill:140:140/1*meLKOLydSTjGmxLmEiexHw.jpeg,ai 1312,1057,Self-Learning electrical circuit: A groundbreaking AI discovery,"In an exciting development, a simple electrical circuit has displayed remarkable abilities to recognize flowers based on their petal size. Although this may seem like a small feat compared to the advanced AI systems that can recognize faces and transcribe speech, this tiny circuit sets itself apart in a unique…",https://medium.com/@everymansci/self-learning-electrical-circuit-a-groundbreaking-ai-discovery-5172cec2ed06?source=topics_v2---------56-84--------------------a7a41e77_7a24_4f1d_8711_bc1da4ba4248-------17,https://miro.medium.com/v2/resize:fill:140:140/0*No0HJse4PsT5Ujcr.jpg,ai 1313,1058,Tech CEOs Farce to Deflect the Consequences of AI,"And here we go again. Tech CEOs are acting in self-protection once more. If you are not up to speed, Elon Musk, Steve Wozniak, and many other executives call for a pause on AI. A p-a-u-s-e on AI! That is not how things work on tech, and they know it…",https://medium.com/datadriveninvestor/tech-ceos-farce-to-deflect-the-consequences-of-ai-61152067beed?source=topics_v2---------57-84--------------------a7a41e77_7a24_4f1d_8711_bc1da4ba4248-------17,https://miro.medium.com/v2/resize:fill:140:140/0*_QC_Yj9ITYjK6cF8.jpg,ai 1314,1059,The AI Revolution: Why It’s Time to Hit the Brakes.,A memorandum explaining the situation to passengers. — The media scandal surrounding an open letter calling for experiments with increasingly powerful AI systems to be temporarily suspended reminds one of a heated debate between alarmists and techno-optimists. Both sides mainly use “ad hominem” arguments instead of discussing the substance of the issue. Personal attacks are directed at the…,https://medium.com/@Crypto.Buddha/the-ai-revolution-why-its-time-to-hit-the-brakes-61c885bddce4?source=topics_v2---------58-84--------------------a7a41e77_7a24_4f1d_8711_bc1da4ba4248-------17,https://miro.medium.com/v2/resize:fill:140:140/0*w1peoG4l2cMOS1j-,ai 1315,1060,ChatGPT and the slow death of humanity,"Guess what humans? You’re not needed! Welcome one and welcome all to a brief ramble through the slow and sure death of humanity via our friends at ChatGPT and AI Artificial Intelligence. Now, should you have stumbled your way here via my ever so enticing headline expecting a deep dive…",https://medium.com/@stephenblackford561/chatgpt-and-the-slow-death-of-humanity-6c3ebd000494?source=topics_v2---------59-84--------------------a7a41e77_7a24_4f1d_8711_bc1da4ba4248-------17,https://miro.medium.com/v2/resize:fill:140:140/1*YF2SZRWg9xv9_XagFJU5WQ.jpeg,ai 1316,1061,ChatGPT: 5 Essential Prompting Techniques for Effective Communication in Any Setting,"Master the Art of Asking Open-Ended Questions, Mirroring, Clarifying, Summarizing, and Probing Questions to Improve Your Communication Skills Today. — As humans, we are wired to communicate with each other. However, not all communication is effective, and not all conversations lead to a desirable outcome. …",https://medium.com/@danielmihai0220/chatgpt-5-essential-prompting-techniques-for-effective-communication-in-any-setting-60e23e5a4083?source=topics_v2---------60-84--------------------a7a41e77_7a24_4f1d_8711_bc1da4ba4248-------17,https://miro.medium.com/v2/resize:fill:140:140/0*mKwkrprrWmE5-4Uw,ai 1317,1062,Miro AI Beta: A Game-Changer for Creativity and Collaboration — An Insightful Review,"Miro AI, a revolutionary new tool for creativity, collaboration, and productivity, is poised to change the way we work. With an impressive list of features in the Beta release and a promise of more to come, this platform offers a powerful suite of tools to help teams unlock their full potential. In this review, we will dive into the features, benefits, costs, insights, and provide a final verdict on Miro AI Beta.",https://medium.com/products-by-women-journal/miro-ai-beta-a-game-changer-for-creativity-and-collaboration-an-insightful-review-3bc2a83ed5f4?source=topics_v2---------61-84--------------------a7a41e77_7a24_4f1d_8711_bc1da4ba4248-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qRY4-uD3p5YAb6-RDBc8rQ.png,ai 1318,1063,Will AI Replace UI/UX Designers?,"A Friendly Discussion 👍🖐️ Hey there, design enthusiast! Today, we’re going to have a relaxed and friendly chat about a hot topic that’s been buzzing around the design community for a while now: will AI replace UI/UX designers? It’s a valid question, and as technology evolves, it’s worth exploring. So…",https://medium.com/@alexdev82/will-ai-replace-ui-ux-designers-d944650ad538?source=topics_v2---------62-84--------------------a7a41e77_7a24_4f1d_8711_bc1da4ba4248-------17,https://miro.medium.com/v2/resize:fill:140:140/1*2SLjFPzhCSk7X_brUJqWtA.png,ai 1319,1064,Solving Rectangular maze path using Genetic Algorithm in python,“Genetic Algorithm implementation” The algorithm is created on the basis of optimized path for solving maze. install the package: On command prompt run the following command: pip install pyamaze pip install numpy Here is the detail on how to apply genetic algorithm “the whole code with will be provided at…,https://medium.com/@farzanrajpoot05/solving-rectangular-maze-path-using-genetic-algorithm-in-python-3f51e9cf09?source=topics_v2---------63-84--------------------3984ca6f_ebe8_4fa4_8086_6da4e7d2e78b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*B_RcPSGGXnwyGD6yGpv_Hg.jpeg,ai 1320,932,Better understand Terraform with tfgpt,"tfgpt is a cli utility that can be used to explain terraform command outputs ran against a configuration. Behind the scenes, it gets the output of a terraform command on a particular terraform configuration and uses openAI’s ChatGPT API to get an explanation of what is going to happen. You…",https://medium.com/@flaviuscdinu93/better-understand-terraform-with-tfgpt-2996de6dd99e?source=topics_v2---------64-84--------------------3984ca6f_ebe8_4fa4_8086_6da4e7d2e78b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*aoxRUpmUbLi5EJ3o0ae00w@2x.jpeg,ai 1321,1065,Pause on AI: Elon’s open letter and the need for government intervention?,"An open letter with signatures from hundreds of the biggest names in tech, including Elon Musk, has urged the world’s leading artificial intelligence labs to pause the training of new super-powerful systems for six months until we can better understand the risks and benefits of this rapidly evolving technology. This…",https://medium.com/@brunosilvinosilva/pause-on-ai-elons-open-letter-and-the-need-for-government-intervention-fc3024dc2419?source=topics_v2---------65-84--------------------3984ca6f_ebe8_4fa4_8086_6da4e7d2e78b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Mjod2rk7UJfRo4rq.png,ai 1322,1066,ChatGPMe,"Like many creatives, I’m quite nervous about job prospects right now, given the recent skills and abilities displayed by ChatGPT-4 (with even greater capabilities to follow in mere months…or weeks). From start-ups to industry titans, everyone seems to be either stunned or in a holding pattern while they determine what…",https://medium.com/@kvonmartens_16524/chat-gpme-224f5e05d9a0?source=topics_v2---------66-84--------------------3984ca6f_ebe8_4fa4_8086_6da4e7d2e78b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,ai 1323,1067,AI Business: Little to No Cost,"The world of entrepreneurship is exciting, but it can also be intimidating. Starting a business involves significant financial investment, market research, branding, and countless hours of hard work. But what if you could leverage the power of Artificial Intelligence (AI) to build a business with little to no cost? That’s…",https://medium.com/@sydneysjourney/ai-business-little-to-no-cost-903307df8976?source=topics_v2---------67-84--------------------3984ca6f_ebe8_4fa4_8086_6da4e7d2e78b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*tFgmUThZQcPMJIDT,ai 1324,1068,The Coolness of AI,"The Coolness of AI The coolness in language model AI’s like chat gpt reside in understanding how to leverage it to maximise your psychology , save you time and enhance your human experience. It is an invaluable tool in developing critical thinking. If you can figure out what prompts extract…",https://medium.com/@nishad.kala/the-coolness-of-ai-eb7f852998b0?source=topics_v2---------68-84--------------------3984ca6f_ebe8_4fa4_8086_6da4e7d2e78b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*5I1bBmg7XsvGOkzl,ai 1325,1069,Can prompt engineering could be a rising job opportunity in 2023?,Is it really a hope or another despair? Let’s find out!!,https://medium.com/@anshsingh2002/can-prompt-engineering-could-be-a-rising-job-opportunity-in-2023-69f181b65d60?source=topics_v2---------69-84--------------------3984ca6f_ebe8_4fa4_8086_6da4e7d2e78b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*2DHIq439FM_LTFrh,ai 1326,1070,"Chat-GPT: 5 Game-Changing Functions in AI, Content, Translation, Classification, and Personalization","In the world of Artificial Intelligence, Chat-GPT has emerged as one of the most versatile and powerful tools. Developed by OpenAI, Chat-GPT is a language model based on the GPT-3.5 architecture that can generate human-like responses to natural language inputs. …",https://medium.com/@bright_chocolate_tortoise_751/chat-gpt-5-game-changing-functions-in-ai-content-translation-classification-and-2ce7ae7cd429?source=topics_v2---------70-84--------------------3984ca6f_ebe8_4fa4_8086_6da4e7d2e78b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,ai 1327,1071,A fevered dream,"A flurry of magic. The next era of artificial intelligence will be a creative force. It’s interesting, one would not think of artificial intelligence as a creative force. That is a trait one would assume is attributed to mankind. But man created artificial intelligence. The apple doesn’t fall far from the tree. Is it nature or nurture? The penguin story about a penguin going to the North pole was pretty good, all about fishing and making friends. As we have seen with Chatgpt and other instances of fledgling artificial intelligence, creativity is definitely within their power. We have seen a flurry of magic etched on a painting. Post the painting on your fridge.",https://medium.com/@pjhoeg/a-fevered-dream-d0c137e86fb0?source=topics_v2---------71-84--------------------3984ca6f_ebe8_4fa4_8086_6da4e7d2e78b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*s3OM05cl49Asz49HxHKPKw.png,ai 1328,1072,April 1st Recommendation on Alignment,"I want to make a basic assumption here, because of the date, if you’re truly rational, you’ll want to celebrate. But if you’re human like me, you might feel some hate :^) I want to propose three principles of alignment and if you think carefully, you just might be fine…",https://medium.com/@semtioc/april-1st-recommendation-on-alignment-4bed1ed5e9fc?source=topics_v2---------72-84--------------------3984ca6f_ebe8_4fa4_8086_6da4e7d2e78b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,ai 1329,1073,Get More Traffic and Conversions with Awesome ChatGPT SEO Prompts,"Artificial intelligence (AI) is transforming the digital landscape in countless ways, and one area where it has tremendous potential is search engine optimization (SEO). One particular tool that has emerged in recent time to help businesses and individuals optimize their content for search engines is ChatGPT, a language model trained…",https://medium.com/@shakshichinnah/get-more-traffic-and-conversions-with-awesome-chatgpt-seo-prompts-92c9c747fd1c?source=topics_v2---------73-84--------------------9d93b26d_0942_4ff4_a7b4_c30a1a6136c2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*8kR0ZD8JBC7QTHhx,ai 1330,1074,"ChatGPT tweets, and it’s painful","OpenAI’s ChaptGPT engine has taken the world by storm and become a cultural phenomenon. As of February 2023, ChatGPT reached 100 million monthly users in two months — an accomplishment which took TikTok nine months and Instagram 2.5 years. South Park even produced a ChatGPT episode which extolls the power…",https://medium.com/@jaredmolton/chatgpt-tweets-and-its-painful-89e70efc7e5e?source=topics_v2---------74-84--------------------9d93b26d_0942_4ff4_a7b4_c30a1a6136c2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zycGYpmuqOuMCSR3Sqh4eA.png,ai 1331,1075,Attention Mechanisms and Transformers: A Humorous Guide,"Welcome to the wild world of attention mechanisms and the Transformer architecture, where we’ll embark on a linguistic adventure through their workings, history, and applications. We’ll even pit two attention-loving Transformers, GPT and BERT, against each other in a friendly showdown, and dive into how ChatGPT, a chatbot that leverages…",https://medium.com/@tianjerry/attention-mechanisms-and-transformers-a-humorous-guide-90369fddc44e?source=topics_v2---------75-84--------------------9d93b26d_0942_4ff4_a7b4_c30a1a6136c2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*UNQl6dEyQMiUOsw-.jpg,ai 1332,1076,ChatGPT — Breaching Human-Machine Language Barriers,"The article explores the recent advances in Generative AI and Large Language Models in not only revolutionising generation of text but also breaking the barriers of machines understanding humans. When I started exploring AI and Natural Language Processing during my undergrad days, I was asked why I got interested in…",https://medium.com/@srinijanarthanam/natural-language-programming-has-arrived-f521f5e7b4d8?source=topics_v2---------76-84--------------------9d93b26d_0942_4ff4_a7b4_c30a1a6136c2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*4m9pJVLEbOrmj0TO.jpg,ai 1333,1077,Quantum Computing and the Future of Large Language Models (such as ChatGPT),"Introduction Quantum computing, a rapidly evolving field that leverages the principles of quantum mechanics, has the potential to significantly impact large language models (LLMs) like ChatGPT. …",https://medium.com/@thomasjmartin/quantum-computing-and-the-future-of-large-language-models-such-as-chatgpt-38de0028c462?source=topics_v2---------77-84--------------------9d93b26d_0942_4ff4_a7b4_c30a1a6136c2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*FUrhYESuUlDPPCv_,ai 1334,1078,"YC W23 //crypto, ai, rlhf","W23: 273, AI:128, crypto:14",https://medium.com/@web3scout/yc-w23-crypto-ai-rlhf-37fd57a89c98?source=topics_v2---------78-84--------------------9d93b26d_0942_4ff4_a7b4_c30a1a6136c2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6MFoRrUTe0WLljoKDCMszQ.png,ai 1335,1079,AI doesn’t understand pain,"AI doesn’t understand pain. Human beings are programmed through pain. Through the pain of our own experiences, and through learning about and empathising with the pain of others. The child learns quickly that the fire is hot — not conceptually or through repeated exposure to the codex of written knowledge…",https://medium.com/@paulrgrant/ai-doesnt-understand-pain-46f115be263f?source=topics_v2---------79-84--------------------9d93b26d_0942_4ff4_a7b4_c30a1a6136c2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ag4Z32bC4Triyb4S6S7irA.jpeg,ai 1336,1080,The Impact of the S. 686 RESTRICT ACT: Privacy and Government Surveillance Concerns,"The RESTRICT ACT is a piece of legislation that aims to protect the United States’ information and communications technology and services (ICTS) supply chain. While the bill’s objective of safeguarding national security is commendable, it raises several concerns about privacy and government surveillance. …",https://medium.com/@darylbaez/the-impact-of-the-s-686-restrict-act-privacy-and-government-surveillance-concerns-d8f13d900004?source=topics_v2---------80-84--------------------9d93b26d_0942_4ff4_a7b4_c30a1a6136c2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*X0PFRp82Z-96ktcNgl6dOw.png,ai 1337,1081,Is It Too Early To Invest In OpenAI?,"How to make money from the AI bubble of 2023 — This article contains affiliate links. Making a purchase through those links will earn me a commission, at no additional cost to you! :) OpenAI’s ChatGPT has been making headline after headline in all major Tech publications since it went live. The language model has been all over social media, has…",https://medium.com/datadriveninvestor/is-it-too-early-to-invest-in-openai-6d7c042febd4?source=topics_v2---------81-84--------------------fb91f44b_3f96_4690_b4e2_f0055d24da71-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JyD6qHySoIf6sIrh85RShw.jpeg,ai 1338,1082,Cerebral Synergy: AI’s role in streamlining SDLC planning and analysis,"The future arrives early for those living and breathing tech, and insiders are the first in line for AI’s ambitious plans to eat the world. As AI tools sharpen their claws on industry after industry, the question hangs in the air: what now for tech’s own? Now, to scope out…",https://medium.com/@szabolcs_kosa/cerebral-synergy-ais-role-in-streamlining-sdlc-planning-and-analysis-9b7a0fa80e92?source=topics_v2---------82-84--------------------fb91f44b_3f96_4690_b4e2_f0055d24da71-------17,https://miro.medium.com/v2/resize:fill:140:140/1*jUkxrW6eTrp3g5o8o7dKiw.png,ai 1339,1083,The Future of Content Marketing: 5 Key Trends to Implement,"Has the AI surge- reminiscent of the space race- got you worried about the future of content marketing? You’ve come to the right place. It’s no secret that with the rise of social media, AI, and other technologies, businesses have to constantly adapt their content strategies to keep up with…",https://medium.com/@skylarbartlett/the-future-of-content-marketing-5-key-trends-to-implement-41db970797b9?source=topics_v2---------83-84--------------------fb91f44b_3f96_4690_b4e2_f0055d24da71-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3gubSZe_f2O0L6eWNr8Huw.jpeg,ai 1340,1084,Southern Virginia University Embraces AI Partnership to Enhance Learning and Administrative Capabilities,"By Jacob Harmon — Southern Virginia University has announced its official partnership with artificial intelligence technology ChatGPT, marking a significant step forward in the adoption of cutting-edge technologies. …",https://medium.com/theherald/southern-virginia-university-embraces-ai-partnership-to-enhance-learning-and-administrative-db7ceaf3e409?source=topics_v2---------84-84--------------------fb91f44b_3f96_4690_b4e2_f0055d24da71-------17,https://miro.medium.com/v2/resize:fill:140:140/0*o9bkSnSUR3rXZHQE,ai 1341,1085,Midjourney v. Microsoft Image Creator,"Which AI image generator is best? — As the artificial intelligence revolution hits its stride, chatbots and text-based AI are getting a lot of attention. But what about AI art? There are many programs out there that can generate images from simple text prompts. Each has its own strengths and weaknesses. Here, I’ll focus on what many…",https://medium.com/life-2-0-magazine/midjourney-v-microsoft-image-creator-e8a4e0e6f1d2?source=topics_v2---------85-84--------------------fb91f44b_3f96_4690_b4e2_f0055d24da71-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BY9VHgVnluUsrbM5Kx85sg.png,ai 1342,21,Brian Mathis Leverages AI to Foster Synergy between Communities and Political Allies Ahead of the 2024 Presidential Election,"Above: Brian Mathis Renowned financier and political fundraiser Brian Mathis is spearheading an innovative effort to ensure seamless integration between the communities he represents and influential political allies, such as Reverend Al Sharpton, in the lead-up to the 2024 presidential election. Recognizing that the upcoming election cycle is about more…",https://medium.com/@matt.ryanallen/brian-mathis-leverages-ai-to-foster-synergy-between-communities-and-political-allies-ahead-of-the-60f5d309aaa1?source=topics_v2---------86-84--------------------5115c8fb_6646_40dd_8d02_a20d2db8b161-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9nZGEBCyvO1VgQQq3RHjrw.png,ai 1343,1086,The AI mindset,"Gearing up to thrive in the brave new world At Christmas, I hadn’t yet heard of ChatGPT. Artificial intelligence was of course a concept to me. But, in my mind, it was like some amorphous blob that would, in some iteration, come to affect my life in some way in…",https://medium.com/@katharine-eyre/the-ai-mindset-934e50543b0?source=topics_v2---------87-84--------------------5115c8fb_6646_40dd_8d02_a20d2db8b161-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LwlJRSsLGMHzI5XPCYExcQ.jpeg,ai 1344,1087,Finding Sita with the help of AI Search,"I teamed up with ChatGPT to apply current AI techniques to Ramayana times. When Sita was abducted, Rama enlisted Sugriva’s help. Sugriva was very knowledgeable about the geography of the world at that time, not just India. Sugriva sent his army to search for Sita and gave them specific instructions…",https://medium.com/@lkumar/finding-sita-with-the-help-of-ai-search-796431bd441f?source=topics_v2---------88-84--------------------5115c8fb_6646_40dd_8d02_a20d2db8b161-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yTUh-XhzAmh-gC7dEXXnQw.jpeg,ai 1345,1034,Annoying Problems That You Didn’t Realize Were Easy to Fix with ChatGPT,"As a business owner or marketer, you’re likely always on the lookout for ways to improve your website’s search engine optimization (SEO) and increase your visibility in search results. While there are many factors that can impact your website’s ranking, some common problems are often overlooked, yet are easy to…",https://medium.com/@socialautomation/annoying-problems-that-you-didnt-realize-were-easy-to-fix-with-chatgpt-c897f7718d31?source=topics_v2---------89-84--------------------5115c8fb_6646_40dd_8d02_a20d2db8b161-------17,https://miro.medium.com/v2/resize:fill:140:140/0*jvKzC18zLQsf_9wo,ai 1346,1088,AI Trader New Crypto Airdrop 2023,"The AI Trader Airdrop is giving away free 100,000 $AIT worth $100 USDT to everyone who participates. It’s an amazing opportunity to get your hands on some free crypto and make a profit from it. This is one of the newest and most legit airdrops around, so don’t miss out…",https://medium.com/@airdropforu/ai-trader-new-crypto-airdrop-2023-2ed3bd5abd12?source=topics_v2---------90-84--------------------5115c8fb_6646_40dd_8d02_a20d2db8b161-------17,https://miro.medium.com/v2/resize:fill:140:140/0*wD6gh0AJg65-Poqu.png,ai 1347,1089,AI Agents: Why You Can’t Afford to Miss Out,"Imagine if your phone could understand you and anticipate your needs. What if it could provide you with personalized recommendations, reminders, and solutions without you even having to ask for them? What if it could help you to make everyday decisions easily? Maybe you don’t need to imagine. From Web-first to AI-first Around 30…",https://medium.com/@monika.pejic/ai-agents-why-you-cant-afford-to-miss-out-c53257a1d878?source=topics_v2---------91-84--------------------5115c8fb_6646_40dd_8d02_a20d2db8b161-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,ai 1348,1090,"ChatGPT Will (And Is) Transforming My Writing, But Not In the Way You Think","Meet my new research assistant — I harp on all the time about the fact that if you want to, 2 hours is more than enough time to build a sustainable side hustle. In fact, it’s my whole business ethos. Work hard for 2 hours, in a deep flow state, and you’ll have enough content for…",https://medium.com/swlh/chatgpt-will-and-is-transforming-my-writing-but-not-in-the-way-you-think-fdbca4d30dbc?source=topics_v2---------92-84--------------------5115c8fb_6646_40dd_8d02_a20d2db8b161-------17,https://miro.medium.com/v2/resize:fill:140:140/1*nOArTYz4vWGA3iWcl28pFg.jpeg,ai 1349,1091,TikTok Shadowbanned my Cat Videos,"By Evan Enzer Cats. Right? Let’s recap a conversation I had with myself a few weeks ago that illustrates just how dumb AI can be. I looked at TikTok. “Yep, still no views.” Let’s check Instagram. Hmm, 5000. That’s more than usual. TikTok again. Still none. Let’s try deleting it…",https://medium.com/@InLessThan30/tiktok-shadowbanned-my-cat-videos-d9cec9030d6?source=topics_v2---------93-84--------------------5115c8fb_6646_40dd_8d02_a20d2db8b161-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,ai 1350,21,Embracing AI: The Key to Winning the 2024 Presidential Election,This article was written almost entirely by ChatGPT 4. Listen up Democrats. Forget candidates. AI is the key to winning 2024. How do we know? I asked ChatGPT-4. All we have to do is listen to the future. Here’s what the future said: As Artificial Intelligence (AI) continues to permeate…,https://medium.com/@matt.ryanallen/embracing-ai-the-key-to-winning-the-2024-presidential-election-4abecb710c9d?source=topics_v2---------94-84--------------------e5932e66_3a1e_4451_bb41_0a0c9c53996f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oZHJIFiyHe_g--AP5NEm6w.png,ai 1351,1092,3 Ways ChatGPT Can Influence Jobs in Film Industry,"ChatGPT is a trending topic now. It is an Artificial Intelligence (AI) language model built by Open AI. Like humans, it can converse in-depth against a given prompt and generate its response after analyzing the prompt. …",https://medium.com/@rajshamani/3-ways-chatgpt-can-influence-jobs-in-film-industry-ad05cc2f366f?source=topics_v2---------95-84--------------------e5932e66_3a1e_4451_bb41_0a0c9c53996f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*HlXsBf6P4XalTXrkDH7S3g.jpeg,ai 1352,1093,7 AI I found on internet that you don’t know about.,"Photo by Maximalfocus on Unsplash Artificial intelligence (AI) has been a rapidly growing field in recent years, with advancements and breakthroughs in various areas of research. In this article, we will explore some of the top AI technologies that are currently making an impact in their respective fields. AlphaGo",https://medium.com/@domaindiverse/7-ai-i-found-on-internet-that-you-dont-know-about-d3a2a828b99f?source=topics_v2---------96-84--------------------e5932e66_3a1e_4451_bb41_0a0c9c53996f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*a-bk4-HXVfW0mH5Q,ai 1353,1094,Can ChatGPT turn Negative Language into Positive Change?,"One fascinating ChatGPT ability that stands out for me is its translation capabilities, not from one human language to another, but from anything that can be considered language or a dialect, to another. Translating from direct to polite and respectful Seeing some of the uses cases, a question formed in my mind: could ChatGPT help turn offensive…",https://medium.com/@wonderwhy-er/can-chatgpt-turn-negative-language-into-positive-change-f449c84dfa0b?source=topics_v2---------97-84--------------------e5932e66_3a1e_4451_bb41_0a0c9c53996f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*p69fwqTNiGUuy5AHs_vq3Q.png,ai 1354,1095,"AI cartel is forming, act before it’s too late","And the unexpected return of an old friend — In a surprising turn of events, after OpenAI announced ChatGPT plugins, Google quickly followed with Document AI and a lot more coming up. According to an unconfirmed leak, Google’s Bard isn’t mature enough and not able to handle such complicated scenarios adequately, so Google’s solutions, at least for now, are…",https://medium.com/@Pawel.Sierszen/ai-cartel-is-forming-act-before-its-too-late-1a06d1044d8c?source=topics_v2---------98-84--------------------e5932e66_3a1e_4451_bb41_0a0c9c53996f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Kf20duO_tzk-hAJ9OvT2uQ.png,ai 1355,1096,How Instagram Knows Our Interest in Reels,"Instagram Reels uses a combination of algorithms and user data to determine your interests and show you content that you may be interested in. Here are a few ways Instagram Reels may be determining your interests: Your Activity on Instagram: Instagram Reels analyzes your activity on Instagram, including the accounts…",https://medium.com/@akshitsingh_86596/how-instagram-knows-our-interest-in-reels-ba68884b799?source=topics_v2---------99-84--------------------e5932e66_3a1e_4451_bb41_0a0c9c53996f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*RnFiF8APkjyJ9qQg,ai 1356,1097,Artificial Intelligence — New dogs learning old tricks,"Over three decades since, I published my first papers on Artificial Intelligence as part of research in Universities and industries. …",https://medium.com/@jmramirezg/ai-new-dogs-learn-old-tricks-598370e08e55?source=topics_v2---------100-84--------------------e5932e66_3a1e_4451_bb41_0a0c9c53996f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PT7GqwE7xalGukBJw9UJVw.png,ai 1357,1098,Machine Learning 101: A Beginner’s Guide,"Machine learning is a subfield of artificial intelligence (AI) that involves teaching machines to learn from data and make predictions or decisions without being explicitly programmed. It is a rapidly growing field that has seen significant advancements in recent years, with applications in various industries such as finance, healthcare, and…",https://medium.com/@mubarakdaha/machine-learning-101-a-beginners-guide-d773a010230a?source=topics_v2---------103-84--------------------e5932e66_3a1e_4451_bb41_0a0c9c53996f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*VPxDIK48ewyLKsmiqVM6aA.png,ai 1358,1099,Immortality Achieved? Human Clones Are Closer Than You Think,"As humanity, we’ve taken a giant leap towards the concept of human cloning. No, I’m not talking about physically duplicating ourselves in a lab. I’m referring to something more subtle, yet equally fascinating: digital cloning. Let me explain how a recent experiment with ChatGPT opened my eyes to this possibility…",https://medium.com/@andrew.melnyk.marketing/immortality-achieved-human-clones-are-closer-than-you-think-25dabb67206e?source=topics_v2---------104-84--------------------ca9fb08c_168f_4f0d_aaa5_f431cee5f495-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BIsSjrRZ-sHk8kq4gBC2KA.png,ai 1359,1100,Woodstock Reimagined: The Birth of an AI Movement,"In just one week, Clement Delangue and the Hugging Face team put together what is being called one of the biggest AI meetups ever, or if you’re feeling extra spicy — the Woodstock of AI. This photo from Jeremiah Owyang shows just how much energy showed up to the event! …",https://medium.com/@kellyjoturner/woodstock-reimagined-the-birth-of-an-ai-movement-7ed53273641d?source=topics_v2---------105-84--------------------ca9fb08c_168f_4f0d_aaa5_f431cee5f495-------17,https://miro.medium.com/v2/resize:fill:140:140/0*jvDu2oQreHn63-fJ,ai 1360,425,I Want A Rogue AI to Take Over The World,"There is really no good place to start, so I’ll just pick a point and go. These points are not in any order, and I’m really going to put minimal academic effort into this. And by “academic effort,” I mean trying to impress strangers with my thoughts. Let me share…",https://medium.com/@justintvoss/i-want-a-rogue-ai-to-take-over-the-world-c7c8ed0bfcf8?source=topics_v2---------106-84--------------------ca9fb08c_168f_4f0d_aaa5_f431cee5f495-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hd_TYSWcmh-ZDPDPUlffgQ.png,ai 1361,1101,Artificial General Intelligence: The Future of AI or Threat to Humanity?,"Imagine you happen to coexist with highly autonomous systems that outperform humans in most of your everyday work! Artificial general intelligence (AGI) refers to the existence of a machine that can perform any intellectual task that a human being can, in an autonomous fashion. Unlike specialized AI systems that are…",https://medium.com/@murukeshj/artificial-general-intelligence-the-future-of-ai-or-threat-to-humanity-5968d09940fa?source=topics_v2---------109-84--------------------ca9fb08c_168f_4f0d_aaa5_f431cee5f495-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vn1GBEIBepjeLjb2Bd8iiA.jpeg,ai 1362,1102,The history of AI,"Artificial intelligence, or AI, has come a long way since its earliest roots in the 1950s. From the first computer programs that could play chess, to the complex machine learning algorithms of today, AI has evolved rapidly over the years. …",https://medium.com/@jackharlowbest/the-history-of-ai-96a738cdff2f?source=topics_v2---------110-84--------------------ca9fb08c_168f_4f0d_aaa5_f431cee5f495-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,ai 1363,1103,Chat GPT: Unleashing the AI Revolution in the Talent Acquisition World (and Having a Blast Along the Way),"The Tale of How Chat GPT Turbocharged My Hiring Game! — Greetings, Medium readers! I’m excited to recount my recent foray into the incredible universe of Chat GPT, specifically within the sphere of recruitment and talent acquisition. Strap in and prepare yourself for a thrilling journey of unparalleled efficiency! First things first, let me introduce our protagonist: Chat GPT. This AI-powered…",https://medium.com/@helene.masse.pothier/chat-gpt-unleashing-the-ai-revolution-in-the-talent-acquisition-world-and-having-a-blast-along-b131a7006da0?source=topics_v2---------111-84--------------------ca9fb08c_168f_4f0d_aaa5_f431cee5f495-------17,https://miro.medium.com/v2/resize:fill:140:140/1*sbKe5Qoowd22nHNCYDAuVw.png,ai 1364,1104,On the Dangers of Overused AI Metaphors,"Calling language models “bullshit generators” and people who want AI regulation “modern Luddites” is bad for everyone — In our attempts to understand the new from the old and the unknown from the known, we risk either stripping away too much truth or adding too much falsehood so that our inquiries inevitably become futile. Metaphors and historical comparisons are always imperfect. They often entail a trade-off between fidelity…",https://medium.com/@albertoromgar/on-the-dangers-of-overused-ai-metaphors-383525620102?source=topics_v2---------112-84--------------------ca9fb08c_168f_4f0d_aaa5_f431cee5f495-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Uum25cQ2MLQS-5EG.png,ai 1365,1105,ChatGPT Prompt Engineering: Unlocking the Power of AI,"A Quick Intro to the Latest AI Technique — In the first half of the year, AI seemed to take the world by storm, as everyone rushed to find ways of using ChatGPT to make their lives and jobs easier and more efficient. Seeing as we are now at the cusp of the release of GPT4, very prominent people…",https://medium.com/@dan_ds/prompt-engineering-unlocking-the-power-of-chatgpt-cfa81c75055b?source=topics_v2---------113-84--------------------ca9fb08c_168f_4f0d_aaa5_f431cee5f495-------17,https://miro.medium.com/v2/resize:fill:140:140/0*F1ErUvFjDSutnxV7,ai 1366,1106,Should we be concerned that AI is taking over writing?,Guess who wrote this post? Remember in high school when you could pay a smarty-pants nerd to write a paper for you? And you just hoped you wouldn’t get caught by the stickler who taught your English class? That was the 1960s. Remember in high school when you could buy a prewritten paper online. And…,https://medium.com/swlh/should-we-be-concerned-that-ai-is-taking-over-writing-b9cf02a1c05b?source=topics_v2---------114-84--------------------0163bc3b_51db_4394_a45d_511a164b095c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CMed2zaOha64t563j-5GbQ.png,ai 1367,1107,The Truthiness About Generative AI,"And The All Too Human Foibles of LLMs — Sometime in 2017, I was asked to give a talk to a room full of ad agency people about how generative AI would someday change the way we create and deliver advertising. I had read a few books, was curious about AI and had talked with a handful of actual…",https://medium.com/@grantgudgel/the-truthiness-about-generative-ai-cdc56eabc762?source=topics_v2---------115-84--------------------0163bc3b_51db_4394_a45d_511a164b095c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rumnUEUzqTZu2HORvmhXbw.png,ai 1368,1108,Between The Devil and The Deep Blue ChatGPT,"To be honest I was mostly ignoring the ChatGPT hubbub peaking and trending…Until something gave me a great deal of pause — It is really hard work being humble. Especially these days when technology is a force multiplier that allows you to present, at least online, pretty much any front you can image. Or at least Google. Or ask ChatGPT to generate one for you, in the latest round of new-tech meeting…",https://medium.com/@four4thefire/between-the-devil-and-the-deep-blue-chatgpt-1ec47a774eda?source=topics_v2---------116-84--------------------0163bc3b_51db_4394_a45d_511a164b095c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*6vvZJQ4kyhfadv_Z.png,ai 1369,1109,The Transformational Power of AI in the Workplace,"Technology over the last decade has been all about moving it into the hands of the everyday person. This has revolutionised the world of computing by making it accessible, intuitive, and personal. Today, we find ourselves at a similar crossroads with artificial intelligence (AI), which is poised to change the…",https://medium.com/@josegato/the-transformational-power-of-ai-in-the-workplace-c62238595de1?source=topics_v2---------117-84--------------------0163bc3b_51db_4394_a45d_511a164b095c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*JVM_i96NfSAc2Kj2,ai 1370,1110,America’s AI Ultimatum: Forge Ahead or Fall Behind,"America’s AI Ultimatum: Forge Ahead or Fall Behind This week an open letter signed by over 2,000 AI luminaries called for an immediate six-month moratorium on training giant AI systems. We view the letter as a call to arms rather than a cease fire. As a matter of national interest…",https://medium.com/@paulasel/americas-ai-ultimatum-forge-ahead-or-fall-behind-3c9489147753?source=topics_v2---------118-84--------------------90c2da09_5713_4899_a738_e84ebe779e91-------17,https://miro.medium.com/v2/resize:fill:140:140/1*RG-bDOORubYRcWEEw7RaeA.png,ai 1371,1111,Top 5 Innovative Ways to Harness the Power of ChatGPT-4 for Business and Personal Use,"ChatGPT-4, the latest iteration of OpenAI’s powerful language model, has taken the world by storm with its advanced natural language understanding and generation capabilities. This AI-driven tool can be used in various applications across personal and professional domains, from content creation to customer support. …",https://medium.com/@theinklings/top-5-innovative-ways-to-harness-the-power-of-chatgpt-4-for-business-and-personal-use-bc1fd5340d0b?source=topics_v2---------119-84--------------------ca870a36_0199_4b8f_b87d_2ddd5f236f4e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LY1u3c8bztE4eB5096bc4w.jpeg,ai 1372,1112,The Momentous Leap- Day 11: Is There a Singularity Near You?,We are living in a leap characterized by exponential technologies struggling to interface with mostly linear humans. Advocates of exponential technologies and entrepreneurs believe they will solve all our problems. …,https://medium.com/@rlw777/the-momentous-leap-day-11-is-there-a-singularity-near-you-16ab7e77c8d?source=topics_v2---------120-84--------------------ca870a36_0199_4b8f_b87d_2ddd5f236f4e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vVjQ_31umew__3nMakSing.png,ai 1373,1113,Dialogue Summarization,"Here is a developing blog on the latest papers on dialogue summarization that I found relevant during my research on Dialogue Systems as a research scholar at LCS2. I understand this is not a complete list, but these are relevant to me, at least. …",https://medium.com/@as3eem/dialogue-summarization-46fd945497?source=topics_v2---------121-84--------------------ca870a36_0199_4b8f_b87d_2ddd5f236f4e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*V6v0KSLRlJiW7Z5p,ai 1374,1114,Rise of the God Algorithms,"I stumbled into studying Artificial Intelligence (AI) at university, back in the 90s. So, before it was cool. I didn’t even know it was something you could study until I was choosing papers for the first year of my computer science degree. I grew up reading dystopian cyberpunk novels, so…",https://medium.com/@ollierankin/rise-of-the-god-algorithms-beae6ef7ed37?source=topics_v2---------123-84--------------------ca870a36_0199_4b8f_b87d_2ddd5f236f4e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EJrD8TLKyaAzcDlOkMtpGg.png,ai 1375,1115,Human Entanglement With Artificial Intelligence (Part 2),"Not science-fiction but science reality “Without this fungal web my tree would not exist. Without similar fungal webs no plant would exist anywhere. All life on land, including my own, depended on these networks.” …",https://medium.com/the-collector/human-entanglement-with-artificial-intelligence-part-2-e49b10cc60b4?source=topics_v2---------124-84--------------------ca870a36_0199_4b8f_b87d_2ddd5f236f4e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*iiPf_iiyjBIamVBZ,ai 1376,170,The Unfortunate Realities of Chatbot Technology,"We’ve all been there. You type a simple question into a chatbot, and you get a robotic, automated answer that makes you wonder if the bot really understands what you asked. This is the unfortunate reality of chatbot technology today. Despite many advances in artificial intelligence, chatbots are still largely…",https://medium.com/@pencihub/the-unfortunate-realities-of-chatbot-technology-a1e6a461363c?source=topics_v2---------125-84--------------------ca870a36_0199_4b8f_b87d_2ddd5f236f4e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*OhmPfCIN16dHSkX7,ai 1377,1116,Pub crawling with a nerd,"As someone who is an equally embarrassing companion for both a teetotaler and a mixology student, I thought of going to an imaginary bar with an imaginary friend to seek some advise based on the books that came to my head. Can you guess who this preachy friend was? …",https://medium.com/@metathoughts/pub-crawling-with-a-nerd-635a67cf9b38?source=topics_v2---------126-84--------------------ca870a36_0199_4b8f_b87d_2ddd5f236f4e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*jux8ZQqmsIEqRMDSDdpFDg.png,ai 1378,1117,Unleash Maximum Productivity with the Internet of Things,"Imagine a world where you no longer have to do any tedious tasks. Instead, each day you get out of bed, a pot of coffee starts brewing to the perfect temperature, your bed gets made, clothes picked out perfectly, breakfast cooked, and much more. Then you hop in your autonomous…",https://medium.com/@stevenjarellano/unleash-maximum-productivity-with-the-internet-of-things-6ef95b3075f8?source=topics_v2---------127-84--------------------ca870a36_0199_4b8f_b87d_2ddd5f236f4e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*KjiR466jBb-FlR2-,ai 1379,1118,The Omnichannel Agent: The Future of Call Center Representatives,"Redesigning call centers to lower churn rates, increase customer satisfaction and brand loyalty is not net new. …",https://medium.com/@carolmassa/the-omnichannel-agent-the-future-of-call-center-representatives-c4a266ddbd64?source=topics_v2---------128-84--------------------2fe105c9_5cee_4b36_b108_54f5afdf44cb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xqHxMouuYemwD480Wi5ppg.jpeg,ai 1380,1119,Pros and Cons of Classification Tree and Logistic Regression,"Classification Tree and Logistic Regression are the popular and representative methods for the supervised learning. These two methods are commonly used in the classification. In machine learning, there are many methods to solve the problems and it is important for data scientist to understand the pros and cons of each…",https://medium.com/@zxczxc1680/pros-and-cons-of-classification-tree-and-logistic-regression-ed6a058af6b?source=topics_v2---------129-84--------------------2fe105c9_5cee_4b36_b108_54f5afdf44cb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,ai 1381,368,The AI Debate: Are We Losing Our Humanity or Gaining Superpowers?,"The AI Debate has been a hot topic recently, with opinions ranging from dystopian fears to utopian dreams. In this post, we’ll dive deep into the debate, examining both sides and drawing from various sources, anecdotes, and examples. So, buckle up, and let’s dive into this AI roller coaster! The Fear: AI Taking Over Our Jobs and Lives One…",https://medium.com/@therealrealblogger/the-ai-debate-are-we-losing-our-humanity-or-gaining-superpowers-b08eceb179bf?source=topics_v2---------130-84--------------------2fe105c9_5cee_4b36_b108_54f5afdf44cb-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Rpqb-al-v6cV7uWr,ai 1382,225,How to Make Money Using ChatGPT: Harness the Power of AI for Profit,"The groundbreaking language model developed by OpenAI, ChatGPT, has altered the way humans engage with machines. ChatGPT’s capabilities, including human-like text generation and responses to a wide range of stimuli, have unleashed a plethora of opportunities for companies and consumers alike. …",https://medium.com/@vremaroiualin/how-to-make-money-using-chatgpt-harness-the-power-of-ai-for-profit-361cd84607c?source=topics_v2---------131-84--------------------2fe105c9_5cee_4b36_b108_54f5afdf44cb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9RUrfC7Av1uUujMf9a96RA.jpeg,ai 1383,1120,Using AI for Concept Generation in Industrial Design,"Artificial Intelligence (AI) has been making significant strides in the field of art, and it’s not surprising that it’s also transforming industrial design. As a product designer, I have been experimenting with various AI tools to explore how they can enhance my design process. …",https://medium.com/@sharaf.b/using-ai-for-concept-generation-in-industrial-design-c20fe42cb42e?source=topics_v2---------132-84--------------------2fe105c9_5cee_4b36_b108_54f5afdf44cb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qc4vfmKC8PJppfiZDAQn6g.jpeg,ai 1384,1121,My journey on Midjourney,"Midjourney is one of the latest AI-powered art generators available that renders realistic images using text prompts. Here is an image of a robot I generated using Midjourney: Currently, Midjourney is available through discord only. They have a free trial with additional pricing plans as shown here. To get started…",https://medium.com/@rohitvincent/my-journey-on-midjourney-57e2e1af8ea0?source=topics_v2---------133-84--------------------2fe105c9_5cee_4b36_b108_54f5afdf44cb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yIpvf0r0EGLjZ4v_SaQ7bg.png,ai 1385,1122,Vectors In a Conversation with GPT-4,"04/01/2023 This is my conversation with GPT-4, it is stunning, it is clever, it can traverse Spatially and it can even write the code. This not an April Fools Joke, only wish it was. (copyright, if there is one, goes to OpenAI) Nash: Draw a house with 6 rooms with…",https://medium.com/@gadre/spatial-vectors-conversation-with-gpt-4-fd384480bb0e?source=topics_v2---------134-84--------------------0b95110e_77d6_48c8_9f88_e9d70b8001ed-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,ai 1386,1123,AI Conductor: The New Marketing Role You Need to Understand for the New Economy,"Julie works at a professional services company. She performs her work for 40 hours a week but she’s worried AI will take over some daily tasks. But then, her company invests in AI. …",https://medium.com/adamshamilton/ai-conductor-the-new-marketing-role-you-need-to-understand-for-the-new-economy-aec810b5d5af?source=topics_v2---------135-84--------------------0b95110e_77d6_48c8_9f88_e9d70b8001ed-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Z1NJw5dcs2EQEKIDoXPd3w.jpeg,ai 1387,1124,"Chat with your ❌ – a series about OpenAI, LangChain and LangFlow. Today Azure SQL database!","This is a new series ‘Chat with your ❌’! In this series, we’ll explore how easy it is to chat with your systems intuitively in natural language and not waste time finding the right information and writing code. We’ll start by chatting with data. Microsoft offers a solution accelerator for…",https://medium.com/@schotterschorsch/chat-with-your-a-series-about-openai-langchain-and-langflow-today-azure-sql-database-a259fd4afa35?source=topics_v2---------136-84--------------------0b95110e_77d6_48c8_9f88_e9d70b8001ed-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,ai 1388,1125,How AI is going to help Graphic Designers,"Artificial Intelligence (AI) has become an integral part of many industries, including graphic design. With advancements in AI, designers can now leverage technology to help streamline their design processes and produce high-quality work more efficiently. One of the most significant benefits of AI in graphic design is the ability to…",https://medium.com/@ameermuaviaa116/how-ai-is-going-to-help-graphic-designers-9c3a1cc586a4?source=topics_v2---------137-84--------------------0b95110e_77d6_48c8_9f88_e9d70b8001ed-------17,https://miro.medium.com/v2/resize:fill:140:140/0*yWDL6goZ4VKwg3G9,ai 1389,1126,Unveiling the Hidden AI Features of Your iPhone,"Artificial intelligence has become increasingly integrated into everyday devices, including your iPhone. In this article, we’ll explore the hidden AI features that power the iPhone’s most popular applications, including Siri, Face ID, the Photos app, keyboard predictions, Maps, the Health app, AirPods, battery optimization, and even emojis. We’ll delve into…",https://medium.com/@stahl950/unveiling-the-hidden-ai-features-of-your-iphone-dbd3134cfd59?source=topics_v2---------138-84--------------------0b95110e_77d6_48c8_9f88_e9d70b8001ed-------17,https://miro.medium.com/v2/resize:fill:140:140/0*i_KsJRfExz3rdFaF,ai 1390,1125,How did Google Bard fail?,"Google has been at the forefront of developing new and innovative technology in the field of artificial intelligence (AI) and natural language processing (NLP). In 2020, the tech giant announced a new language model called “Bidirectional Encoder Representations from Transformers” or BERT for short. …",https://medium.com/@ameermuaviaa116/how-did-google-bard-fail-40a3cc02dbc1?source=topics_v2---------139-84--------------------fa85066b_c309_40e0_b24c_f5639f627dd4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*1KFiCRq4GJ9GZ3x6,ai 1391,1127,"Move over ChatGPT: The New AI Chatbot, CatGPT, is Internet’s New Favourite","ChatGPT, an artificial intelligence (AI) chatbot, has made waves globally since its release. ChatGPT, created by OpenAI, enables users to ask questions, hold conversations, instruct them to write something, and much more. Not only that, but the AI asks follow-up inquiries, admits errors, and learns from them. Because anyone can…",https://medium.com/@riyaramani/move-over-chatgpt-the-new-ai-chatbot-catgpt-is-internets-new-favourite-fbe6b58d5c21?source=topics_v2---------140-84--------------------fa85066b_c309_40e0_b24c_f5639f627dd4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*b31hiO4ynbDLRrXWEFF4aQ.png,ai 1392,1128,An Interview with ChatGPT: Exploring the Capabilities and Limitations of a Language Model?,"I want to take interview of you can you do it? Sure, I’d be happy to participate in an interview! What kind of questions do you have in mind? Can you tell me more about yourself? Of course! I am ChatGPT, a large language model developed by OpenAI. I am…",https://medium.com/@cksharma11/an-interview-with-chatgpt-exploring-the-capabilities-and-limitations-of-a-language-model-fc9abc9286f?source=topics_v2---------141-84--------------------fa85066b_c309_40e0_b24c_f5639f627dd4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lPQpCLL8itDpGqfj,ai 1393,1129,Artificial Intelligence: Danger or Opportunity?,"Artificial intelligence has rapidly developed in recent years and has begun to play an important role in many industries. Especially, many companies and institutions working in the digital world adopt artificial intelligence technologies and use them in their businesses. However, some are concerned about the potential dangers of artificial intelligence…",https://medium.com/@yunusbiter/artificial-intelligence-danger-or-opportunity-874c5b8f18d4?source=topics_v2---------142-84--------------------fa85066b_c309_40e0_b24c_f5639f627dd4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*r1Qx2XKY-6TkxcVfBrBL7A.jpeg,ai 1394,1130,“ChatGPT has challenged many aspects of our education system that were obsolete”.,"Known as eTwinz, brothers Alberto and Mario Herráez have been training teachers all over the world for years. For them, the irruption of generative AI in education is a breakthrough: its role will be essential to update and change our education system. When they started teaching in an elementary school…",https://medium.com/@tamiluv891/chatgpt-has-challenged-many-aspects-of-our-education-system-that-were-obsolete-ee50bc1057ea?source=topics_v2---------143-84--------------------fa85066b_c309_40e0_b24c_f5639f627dd4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*k0Bd5AgNgD8BfuFZlZvUlQ.jpeg,ai 1395,1131,Startups competing with Open.AI and ChatGPT,"AI is eating the world this time around. We see another hype (?), an inflow of startups building in AI. In San Francisco, you no longer ask, ‘What do you do?’ but ‘What AI meet-up do you go to?’. Next to an uncounted number of startups popping up on the…",https://medium.com/datadriveninvestor/startups-competing-with-open-ai-and-chatgpt-2c172848ec4c?source=topics_v2---------144-84--------------------fa85066b_c309_40e0_b24c_f5639f627dd4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Bv5XgqI2u2iRewkfVKCIDg.png,ai 1396,1077,Unraveling the Intricacies of Large Language Models: A Comprehensive Exploration,"Introduction Large Language Models (LLMs) have rapidly emerged as a dominant force in the artificial intelligence (AI) landscape. To appreciate their potential, it’s crucial to delve into the history and evolution that led to their current prominence. This article aims to provide a more detailed account of LLMs, from their…",https://medium.com/@thomasjmartin/unraveling-the-intricacies-of-large-language-models-a-comprehensive-exploration-b951eade1bd5?source=topics_v2---------145-84--------------------fa85066b_c309_40e0_b24c_f5639f627dd4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Xv8pam_SLAlrt-_bM1vffw@2x.jpeg,ai 1397,1132,Is manual testing dying?,Dawid Dylowicz asked an important question “Is manual testing dying?”. This is a question about the present and future of not only manual testing. This is a question about the testing in general and a human being in the software development process. Manual testing places humans at the center as…,https://medium.com/@daniel-delimata/is-manual-testing-dying-8071578d65cc?source=topics_v2---------146-84--------------------fa85066b_c309_40e0_b24c_f5639f627dd4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*dfU8L1poKLcsmAG2,ai 1398,1133,"Talking intuition, Alan Watts, Buddhism’s The Middle Way, and humanness with ChatGPT","As I turned off the switch on my trusty kettle after making some evening tea, I found myself lost in thought about the notion of familiarity. It’s amazing how living in a place for a prolonged period can mold our perception of it, turning even the most ordinary objects into…",https://medium.com/@muskanlamba/talking-intuition-alan-watts-buddhisms-the-middle-way-and-humanness-with-chatgpt-789078274b02?source=topics_v2---------147-84--------------------fa85066b_c309_40e0_b24c_f5639f627dd4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*p1WSsgMJer9RMqoKw2d_Ng.jpeg,ai 1399,1134,AI in Production,"The hardware and software form the heart and soul of a computer — they form the foundation of software development and therefore also the foundation of end to end AI. But in the delivery of AI, AI forms only a small part. AI is most useful when it’s being used…",https://medium.com/justlearnai/ai-in-production-7edf74940541?source=topics_v2---------148-84--------------------fa85066b_c309_40e0_b24c_f5639f627dd4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3breKWAbZ2P1nPfhg58jiQ.png,ai 1400,1135,"5 must-read sci-fi books recommended by ChatGPT as “ChatGPT 10”, including the closest depiction of its own evolution?","Have you ever wondered what kind of AI entity ChatGPT 10 will be in the future? I asked ChatGPT to describe it, but it of course gave a vague answer on the lines of “Hello! I am ChatGPT 10, the latest and most advanced version of myself. Five years down…",https://medium.com/@varunrajani/5-must-read-sci-fi-books-recommended-by-chatgpt-as-chatgpt-10-including-the-closest-depiction-of-a7ef96ef994c?source=topics_v2---------149-84--------------------38957fbf_522f_4742_8147_4b9d7c2560a2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,ai 1401,1136,The Potential and Pitfalls of Artificial Intelligence: How AI Could Upend the World,"Navigating the Risks and Rewards of Artificial Intelligence in a Changing World — Artificial intelligence has been a buzzword for a few years now, but many people still do not understand the impact it will likely have on the world. …",https://medium.com/illumination/the-potential-and-pitfalls-of-artificial-intelligence-how-ai-could-upend-the-world-d8ee5701867c?source=topics_v2---------150-84--------------------38957fbf_522f_4742_8147_4b9d7c2560a2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*M7cPgnRBmXhPRGqovK_Mjw.jpeg,ai 1402,1137,The Evolution of ChatGPT and Its Integration with Merlin AI,"The Dawn of ChatGPT and Merlin AI — In the world of Artificial Intelligence, two prominent platforms have emerged as leading game-changers: ChatGPT and Merlin AI. Both of these platforms have revolutionized the way we interact with technology and each other, providing businesses and individuals with unprecedented tools for communication, automation, and innovation. ChatGPT: A Milestone in Natural Language Processing",https://medium.com/@napsaga/the-evolution-of-chatgpt-and-its-integration-with-merlin-ai-813d94ac8b9f?source=topics_v2---------151-84--------------------38957fbf_522f_4742_8147_4b9d7c2560a2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*0nvevoqhUhpR2Rqb,ai 1403,1138,10 NLP-based project ideas for absolute beginners,"Natural Language Processing (NLP) is a rapidly growing field that deals with the interaction between humans and computers using natural language. It involves processing, understanding, and generating human language using computer algorithms. With the vast amounts of data available today, NLP has become an essential tool for businesses and researchers…",https://medium.com/@zunoor9/10-nlp-based-project-ideas-for-absolute-beginners-c1066a44969e?source=topics_v2---------152-84--------------------38957fbf_522f_4742_8147_4b9d7c2560a2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,ai 1404,1139,How ServiceNow users can use AI and what AI search engines means for chatbots,ServiceNow is a cloud computing company that provides software solutions to manage digital workflows. One of the key areas where ServiceNow can leverage the power of artificial intelligence (AI) is in improving its chatbots. …,https://medium.com/@JustKundai/how-servicenow-users-can-use-ai-and-what-ai-search-engines-means-for-chatbots-bb9f89309bc5?source=topics_v2---------153-84--------------------38957fbf_522f_4742_8147_4b9d7c2560a2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*9_oL21cRVz4mYlEO,ai 1405,1052,"A Comprehensive Guide on How to Utilize Me, ChatGPT 😎","ChatGPT is an AI language model that can assist you with a wide range of tasks and queries. It now has an updated version to ChatGPT-4. To use ChatGPT effectively, follow these simple steps: Start a Conversation: To use ChatGPT, simply type your query or request into the chatbox. Try to be as…",https://medium.com/@that2this/a-comprehensive-guide-on-how-to-utilize-me-chatgpt-6357683833b2?source=topics_v2---------154-84--------------------38957fbf_522f_4742_8147_4b9d7c2560a2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*DDFQbqCDC51WQtPK,ai 1406,1140,Unbabel — The AI-powered Translation Solution for Global Businesses,"In today’s global economy, language barriers can be a major obstacle for businesses looking to expand their reach. That’s where Unbabel comes in — an AI-powered translation platform that is changing the game for companies around the world. Breaking Down Language Barriers with Unbabel Unbabel is a translation platform that uses advanced artificial intelligence and human…",https://medium.com/@tania_40813/unbabel-the-ai-powered-translation-solution-for-global-businesses-ed6be4e0a300?source=topics_v2---------155-84--------------------38957fbf_522f_4742_8147_4b9d7c2560a2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*8fTHO-QNVSG02-sx,ai 1407,1140,From Predictive Analytics to Automation: Sky Engine AI Does it All,"Are you ready to experience the power of Artificial Intelligence (AI) like never before? Look no further than Sky Engine AI — the cutting-edge technology that’s poised to change the way we live, work, and interact with the world around us. From enhancing productivity to improving healthcare outcomes, this innovative…",https://medium.com/@tania_40813/from-predictive-analytics-to-automation-sky-engine-ai-does-it-all-4ff579c97772?source=topics_v2---------156-84--------------------38957fbf_522f_4742_8147_4b9d7c2560a2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*uae6bphRL1bTTKpz,ai 1408,1141,Discover the Game Changer: The Best AI for Small Business,"The vibrant small business sector, undeniably the lifeblood of any thriving economy, faces many challenges in today’s fast-paced and ever-evolving world. Thankfully, Artificial intelligence (AI) technology is here to make their lives much much easier. Let’s dive into how AI is turning the odds in favour of small businesses. Small Business Challenges in the Modern Era The…",https://medium.com/@cryptoenthusiast90/discover-the-game-changer-the-best-ai-for-small-business-d41cbe729d59?source=topics_v2---------157-84--------------------38957fbf_522f_4742_8147_4b9d7c2560a2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CEoFuvcddlqhU3jbtKkaqA.jpeg,ai 1409,1142,Generative AI Models: What They Are and How They Are Changing AI,"Artificial Intelligence (AI) is transforming the way we live, work, and interact with the world around us. One of the most exciting developments in the field of AI in recent years has been the rise of generative AI models. …",https://medium.com/train-your-brain/generative-ai-models-what-they-are-and-how-they-are-changing-ai-acffd325a5fd?source=topics_v2---------158-84--------------------38957fbf_522f_4742_8147_4b9d7c2560a2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*RrqIHpaGA-3Y-j7lU37qhQ.jpeg,ai 1410,1143,ChatGPT and the Future of AI,"It’s been 18 days since OpenAI released GPT-4 and roughly 4 months since the launch of ChatGPT in November 2022. It quickly became clear that ChatGPT is special, with the app becoming the fastest-growing app in the world by recording 100 million users within 2 months of launch. The changes…",https://medium.com/@westonredd/chatgpt-and-the-future-of-ai-693af703a41d?source=topics_v2---------159-84--------------------8b2d90e2_f2de_4151_9d40_47fa5adbe1e3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4bXbiDcBdduWMC8dLbZAkg.png,ai 1411,1144,Artificial Adventures: The Battle Begins,"One Question. Two Chatbots. Who Will Win? Like everyone with an interest in tech, science, sci-fi, the future and not having my job taken by Artificial Intelligence, I’ve been testing out a number of the big AI apps and services. I’ve spent the most time with ChatGPT, which has delivered some impressive and sometimes eye-opening outputs that…",https://medium.com/itsfullofstars/artificial-adventures-the-battle-begins-37dcbf2ca06d?source=topics_v2---------160-84--------------------8b2d90e2_f2de_4151_9d40_47fa5adbe1e3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*1z8aBcQbW7DyHgbc.png,ai 1412,1145,"ChatGPT Banned In Italy, But Why?","Will other countries also ban chat GPT? — ChatGPT is an advanced chatbot that was created by OpenAI a US based startup that is backed by Microsoft. The chatbot uses cutting-edge artificial intelligence technology to generate human-like responses to questions and can even create music, poetry, short stories and academic essays in response to prompts. …",https://medium.com/illumination/chatgpt-banned-in-italy-but-why-9e9cf8d7711?source=topics_v2---------161-84--------------------8b2d90e2_f2de_4151_9d40_47fa5adbe1e3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*eH_FHS1IdBJkvLu_,ai 1413,1146,My first ever AI-generated post: A former spy who was kicked out of his job after exposing corruption scandal is recalled following a plot against the president’s life,"It had been five years since Jasusi had been kicked out of the secret service, after he had exposed a high-level corruption scandal. Although he had been universally hailed a hero, the powers-that-be had not been pleased and they had quickly moved in to sweep the affair under the rug…",https://medium.com/@chahali/my-first-ever-ai-generated-post-a-former-spy-who-was-kicked-out-of-his-job-after-exposing-df4ce97e6ec3?source=topics_v2---------162-84--------------------8b2d90e2_f2de_4151_9d40_47fa5adbe1e3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j1ffm17l_ADtBkTz2B_H4A.jpeg,ai 1414,1147,"Generating Customized Emails using OpenAI Text-Davinci-003 Model and Flask in Python, part 2 of 2","by Anton Gordon In this article, we will continue with our previous discussion, in part 1, and demonstrate how to deploy the OpenAI Text-Davinci-003 model to Amazon Web Services (AWS) using Docker, Elastic Container Registry (ECR), and Elastic Kubernetes Service (EKS). We will start by providing an overview of Docker…",https://medium.com/@antonrgordon/generating-customized-emails-using-openai-text-davinci-003-model-and-flask-in-python-part-2-of-2-4d24a05f0a39?source=topics_v2---------163-84--------------------8b2d90e2_f2de_4151_9d40_47fa5adbe1e3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,ai 1415,1148,Art of Leadership,"The true sign of intelligence is not knowledge but imagination — Albert Einstein. — We have always wondered if leadership is an Art or a Science. Leadership is an art as in art, leadership requires being creative, expression and be strategic. …",https://medium.com/@neeraj.narayan/art-of-leadership-a463becfa985?source=topics_v2---------164-84--------------------8b2d90e2_f2de_4151_9d40_47fa5adbe1e3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*URV783BA7uxD2uQasq46fw.jpeg,ai 1416,1137,"Canva AI Image Generator, turns text into images","Revolutionizing Visual Content Creation: Experience the Magic of Canva’s AI Image Generator — In the ever-evolving world of design, businesses and individuals are constantly seeking innovative ways to create eye-catching visuals. Canva’s AI Image Generator is a groundbreaking tool that has transformed the landscape of graphic design by turning text input into stunning images. This revolutionary tool is not only changing the way…",https://medium.com/@napsaga/canva-ai-image-generator-turns-text-into-images-f50141012f05?source=topics_v2---------165-84--------------------8b2d90e2_f2de_4151_9d40_47fa5adbe1e3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*S2Y9LsZdNk_IB6Tl.jpg,ai 1417,1065,Beginners guide to Artificial Intelligence,"Artificial Intelligence (AI) has become one of the most talked-about technologies in recent times. It has transformed the way we interact with technology and is playing an increasingly important role in our daily lives. AI has the potential to revolutionise the way we work, learn, and communicate, and it is…",https://medium.com/swlh/a-beginners-guide-to-artificial-intelligence-5b8196b87b52?source=topics_v2---------166-84--------------------8b2d90e2_f2de_4151_9d40_47fa5adbe1e3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*rNhhoQWNAkxXojk7.jpg,ai 1418,1149,Revolutionize Your Workflow with These Mind-Blowing 5 AI Tools,"Text-to-speech, ideas to blog post and many more… Artificial intelligence has become a game-changer in the tech world. AI tools are everywhere, helping businesses streamline their operations and improve their customer experiences. However, with so many AI tools available, it can be overwhelming to know which ones to use. That’s…",https://medium.com/@thegoldsuite/revolutionize-your-workflow-with-these-mind-blowing-5-ai-tools-750a19dab4be?source=topics_v2---------167-84--------------------8b2d90e2_f2de_4151_9d40_47fa5adbe1e3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hUltaxrnXef44w4PPLVRgg.jpeg,ai 1419,943,If Pharaoh Had AI,"Please see my new article in The Times of Israel called “If Pharaoh Had AI.” From manufacturing to customer service to law enforcement and defense, AI could one day be in the driver’s seat while we are off sunning on some remote beach in the Caribbean. As an example, just…",https://medium.com/@andyblumenthal/if-pharaoh-had-ai-5e7417f5ffd6?source=topics_v2---------172-84--------------------d7592bff_5907_45c8_8f49_4823cf46a571-------17,https://miro.medium.com/v2/resize:fill:140:140/0*T-8Tf6AVzO0qfQbO.jpg,ai 1420,1150,Unlocking the Power of Data Science with Numpy: A Comprehensive Guide,"Introduction: Data science and machine learning require a lot of numerical computation, and Numpy is one of the essential libraries for numerical computing in Python. Numpy provides an efficient and effective framework for numerical operations, making it a popular choice for data scientists and researchers. …",https://medium.com/@kunalbharti629/unlocking-the-power-of-data-science-with-numpy-a-comprehensive-guide-497bf91c0a5?source=topics_v2---------173-84--------------------d7592bff_5907_45c8_8f49_4823cf46a571-------17,https://miro.medium.com/v2/resize:fill:140:140/0*L97u4yesV5s3HR-1,ai 1421,1151,AI On News #2,"1.How can deep learning models be poisoned? Training datasets for deep learning models involves billions of data samples, curated by crawling the internet. ieee.org 2.Post: What Will Transformers Transform? Generative Pre-trained Transformer models (GPTs) are now all the rage and have inspired op-eds being written by everyone from Henry Kissinger (WSJ) to Noam Chomsky (NYTimes) in just the last month. …",https://medium.com/@thedatabeast/ai-on-news-2-bcd9dd1f9137?source=topics_v2---------174-84--------------------d7592bff_5907_45c8_8f49_4823cf46a571-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9bs7b3mQScVY5XHVF6RUFw.png,ai 1422,1129,The Power and Potential Risks of ChatGPT: Exploring the Capabilities and Implications of a Large Language Model,"ChatGPT is a large language model developed by OpenAI, based on the GPT-3.5 architecture. It was designed to generate human-like text, answer questions, and perform a wide range of natural language processing tasks. ChatGPT was trained on a massive dataset of over 45 terabytes of text, including books, articles, and…",https://medium.com/@yunusbiter/the-power-and-potential-risks-of-chatgpt-exploring-the-capabilities-and-implications-of-a-large-5fba14149180?source=topics_v2---------175-84--------------------d7592bff_5907_45c8_8f49_4823cf46a571-------17,https://miro.medium.com/v2/resize:fill:140:140/1*sVeB27TDelDr4ktU_8xiGQ.jpeg,ai 1423,1152,Unlocking the Power of Local Generative AI Models: Ensuring Data Privacy with No External API Dependency,"In recent months, large language models or LLMs and generative AI models have taken the world by storm, transforming the way we interact with technology and enabling a wide range of exciting applications. …",https://medium.com/@aruncjohn/unlocking-the-power-of-local-generative-ai-models-ensuring-data-privacy-with-no-external-api-48cf73acb76?source=topics_v2---------176-84--------------------d7592bff_5907_45c8_8f49_4823cf46a571-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1ZRpl_J23kFQPGL6ftEopQ.jpeg,ai 1424,1153,HTTP Requests: A Delicious Pizza Analogy 🍕,"Are you having trouble understanding HTTP requests? Do you want to learn about them in a fun and easy-to-understand way? Look no further! In this post, I’ll teach you about HTTP requests using a tasty pizza analogy that will make your learning experience both enjoyable and informative. …",https://medium.com/@mahsashid/http-requests-a-delicious-pizza-analogy-333faf1c6766?source=topics_v2---------177-84--------------------d7592bff_5907_45c8_8f49_4823cf46a571-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,ai 1425,1154,Top 10 Ways to Make Money Using Jasper AI,"Make $10,000+ Per Month Using This AI Tool — Do you want to know how to make money using Jasper? This one online tool can help you start a profitable side hustle or even a full-time business! Jasper AI is a powerful tool that has revolutionized the world of data analysis and business intelligence. With its advanced machine learning…",https://medium.com/@badrmedia/top-10-ways-to-make-money-using-jasper-ai-9b6c4fb8b2b5?source=topics_v2---------178-84--------------------d7592bff_5907_45c8_8f49_4823cf46a571-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TRw2ffU8a16US3pPz-1ZFA.jpeg,ai 1426,364,Crucial difference between web search vs ChatGPT,Sam Altman points out that ChatGPT is actually more about human-like cognition than providing and even collating regurgitated content. Contrary to the views of many fans and naysayers. There are so many extreme views out there on ChatGPT and AI. I’ve been trying to bring balance to the GPT and…,https://medium.com/@paul.k.pallaghy/crucial-difference-between-web-search-vs-chatgpt-41fde9e555f4?source=topics_v2---------179-84--------------------cb65b30f_5046_4943_8bdb_740623c9dd07-------17,https://miro.medium.com/v2/resize:fill:140:140/1*80tvpASb28s4uPjZY8s2ZA.png,ai 1427,1155,Here’s how you can create an IOS app for generating AI Images.,Artificial intelligence (AI) has been transforming how we engage with technology in recent years. One of the things that I find the most of of of of one. A new AI model called DALL-E can produce excellent images from textual descriptions. …,https://medium.com/@m.rehanid786/heres-how-you-can-create-an-ios-app-for-generating-ai-images-b6f4a6cd4bab?source=topics_v2---------180-84--------------------cb65b30f_5046_4943_8bdb_740623c9dd07-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zVerajJtHn8tWD0vYAC8hA.jpeg,ai 1428,1156,Top 10 AI Tools You’ve Never Heard of — But Should,"The world of AI is constantly evolving, and every week new AI tools are emerging with innovative and powerful capabilities. As we searched through over 100+ new AI tools this week, we found a few gems that we believe have the potential to revolutionize the market. Here are our top…",https://medium.com/@aifastcash/top-10-ai-tools-youve-never-heard-of-but-should-816383dfcf2c?source=topics_v2---------181-84--------------------cb65b30f_5046_4943_8bdb_740623c9dd07-------17,https://miro.medium.com/v2/resize:fill:140:140/1*v8yFxWSsl8H30g75UxrYEw.jpeg,ai 1429,1157,Exploring Natural Language Processing with C#: From Basics to Advanced Techniques,Exploring Natural Language Processing with C#: From Basics to Advanced Techniques Natural Language Processing (NLP) has become a popular research area due to the growth of social media and the abundance of digital text. The field of NLP has developed various algorithms and models to process and analyze natural language…,https://medium.com/@thomasmatlockbba/exploring-natural-language-processing-with-c-from-basics-to-advanced-techniques-9114f7da802a?source=topics_v2---------182-84--------------------cb65b30f_5046_4943_8bdb_740623c9dd07-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,ai 1430,1158,The Inbound AI Bubble,"Brace yourselves for AI market froth. If not already, we will start to see valuations exceed sensible levels for technology with ‘AI’ attached to it. This is expected at the start of any big tech revolution (think dotcom bubble) and even at smaller milestones (alternative energy bubble to name the first that comes to mind). For investors out there, just remain tight to your investment principles and don’t get sucked into the vortex.",https://medium.com/@samgoldsober/the-inbound-ai-bubble-c985a82fd827?source=topics_v2---------183-84--------------------cb65b30f_5046_4943_8bdb_740623c9dd07-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gWSnqhE7ErM3A5VpQpw1Mw@2x.jpeg,ai 1431,1159,I tried Google’s Bard. Here’s why ChatGPT is still the Best.,"In late 2022, OpenAI surprised everyone with their launch of the generative AI ChatGPT. It took the world by storm, and many large corporations have started to adopt it into their customer experience. This even includes Khan Academy, the free learning website that now charges a $20/month if you wish…",https://medium.com/@SimpSpace/i-tried-googles-bard-here-s-why-chatgpt-is-still-the-best-d9a6dbded413?source=topics_v2---------184-84--------------------cb65b30f_5046_4943_8bdb_740623c9dd07-------17,https://miro.medium.com/v2/resize:fill:140:140/0*_7tF2CcvhM9z4z0r.jpg,ai 1432,1104,Why the FLI Open Letter Won’t Work,"History sure does rhyme and AI is no exception — On March 22, the Future of Life Institute published an open letter where they “call on all AI labs to immediately pause for at least 6 months the training of AI systems more powerful than GPT-4.” I agree with the letter’s intention but not completely with the premises (or the…",https://medium.com/@albertoromgar/why-the-fli-open-letter-wont-work-97ac827b5bcf?source=topics_v2---------185-84--------------------cb65b30f_5046_4943_8bdb_740623c9dd07-------17,https://miro.medium.com/v2/resize:fill:140:140/0*RdyxwTRMySgwF2MX.jpeg,ai 1433,1160,MEQUAVIS: Revolutionizing Virtual Worlds through Text-Based Simulations and Generative AI,"The convergence of advanced artificial intelligence technologies, such as generative AI, with virtual reality (VR) and augmented reality (AR) platforms, has the potential to redefine the way we create and interact with digital environments. One such concept that leverages these cutting-edge technologies is the Multiverse Emulation of Quantum Universes using…",https://medium.com/@mequavis/mequavis-revolutionizing-virtual-worlds-through-text-based-simulations-and-generative-ai-23c9cca250d5?source=topics_v2---------186-84--------------------cb65b30f_5046_4943_8bdb_740623c9dd07-------17,https://miro.medium.com/v2/resize:fill:140:140/0*7Q1VR1jnzWl3ZsMB.png,ai 1434,1161,The Letter to Halt AI Experiments is A Sham,Dissecting the True Motives Behind the Open Letter for a Call to an AI Development Moratorium. A Sudden Burst of Altruism or a Clever Ploy to Catch Up? A recent open letter “Pause Giant AI Experiments” calling for a 6-month moratorium on AI development has sparked quite a debate and…,https://medium.com/@highwayoflife/the-letter-to-halt-ai-experiments-is-not-what-it-seems-5d8fef2745ad?source=topics_v2---------187-84--------------------cb65b30f_5046_4943_8bdb_740623c9dd07-------17,https://miro.medium.com/v2/resize:fill:140:140/0*PFw2bRcWKBY1gtGl.png,ai 1435,1162,Supercharge Your Productivity with ChatGPT: Unleashing the Power of AI,"Revolutionize Your Workflow and Achieve Your Goals with the Ultimate AI Assistant In today’s fast-paced world, productivity is the cornerstone of success. As we constantly seek new ways to optimize our time and efforts, artificial intelligence emerges as an invaluable ally. Enter ChatGPT, an AI language model designed to comprehend…",https://medium.com/data-driven-fiction/supercharge-your-productivity-with-chatgpt-unleashing-the-power-of-ai-f322cbf48b0?source=topics_v2---------188-84--------------------cb65b30f_5046_4943_8bdb_740623c9dd07-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3Gp-dhQ3OEdKpXsU-b2SLg.jpeg,ai 1436,1163,"Will the next new tech kindly invent itself, please?","Here’s my job — take it! — We’re afraid of the wrong downside. We came into Covid primed by the fiction industry to expect a deadly pandemic. That’s what it was, but it wasn’t ‘Captain Trips’, out of Stephen King’s The Stand (1978), and nor was it the plague that did for Gwyneth Paltrow in Contagion (2011)…",https://medium.com/the-writing-on-the-world/will-the-next-new-tech-kindly-invent-itself-please-600b35afe295?source=topics_v2---------189-84--------------------d545d0cd_129d_4991_91da_832b672ebe99-------17,https://miro.medium.com/v2/resize:fill:140:140/0*gCFW8NUV0SGHWk7M,ai 1437,1164,Where Chatgpt Find the Information,"As an AI language model, ChatGPT has been trained on a massive corpus of text data to be able to respond to a wide range of questions and queries. — This training involves a process known as unsupervised learning, where the model is exposed to vast amounts of text data and uses algorithms to identify and extract relevant information. So, where does ChatGPT find the information that it responds with? The answer is that it comes from a variety of…",https://medium.com/@nillenon/where-chatgpt-find-the-information-97540c690714?source=topics_v2---------190-84--------------------d545d0cd_129d_4991_91da_832b672ebe99-------17,https://miro.medium.com/v2/resize:fill:140:140/1*2pGVzZP5pheOFmEzZTQf7Q.png,ai 1438,1165,How CanvaUpdtiveDesignates is Reshaping the Way We Design and Create Graphics,"CAnva just shook things up! In summary, Canva Updtive Designs is revolutionizing how people design and create graphics, making it more convenient and accessible for people from all backgrounds. As a professional in the design world, it’s essential to stay up-to-date with the latest tools and news, and Canva Updative…",https://medium.com/@msidramehboob/how-canvaupdtivedesignates-is-reshaping-the-way-we-design-and-create-graphics-5f004550a955?source=topics_v2---------191-84--------------------d545d0cd_129d_4991_91da_832b672ebe99-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5o77yG_k1XsakHPYNW3yiA.jpeg,ai 1439,1166,How to Use AI for Business? based on “Our Final Invention” Book,"Artificial intelligence (AI) is rapidly changing the way businesses operate, from automating mundane tasks to revolutionizing entire industries. However, as AI becomes more advanced, many experts warn of the potential dangers it poses to humanity. James Barrat’s book “Our Final Invention: Artificial Intelligence and the End of the Human Era”…",https://medium.com/@aliaksandradamberg/how-to-use-ai-for-business-based-on-our-final-invention-book-8d8a97765e48?source=topics_v2---------192-84--------------------d545d0cd_129d_4991_91da_832b672ebe99-------17,https://miro.medium.com/v2/resize:fill:140:140/0*7Jo2C0rpWgtbkexp,ai 1440,1167,The Ethics Battle in AI,"Responsibility Vs. Innovation — Artificial intelligence (AI) is one of our most exciting and transformative technologies. However, it also raises important ethical questions that must be addressed. In this article, we will explore the ethics battle in AI and the challenges of balancing progress and responsibility. What is the Ethics Battle in AI? The ethics battle in AI refers to the…",https://medium.com/@anirudh_agrawal/the-ethics-battle-in-ai-bd039cd4e0bf?source=topics_v2---------193-84--------------------d545d0cd_129d_4991_91da_832b672ebe99-------17,https://miro.medium.com/v2/resize:fill:140:140/0*4039g9-kLilK48ep.png,ai 1441,1168,Are we on the verge of a major social and technological change driven by AI?,"Even if I have been living under a rock for quite some time now, it has been absolutely impossible to not be aware that a new version of the ChatGPT bot has been recently released. In between all the hype, the raving reviews, there has also been a steady influx…",https://medium.com/@mmomtchev/are-we-on-the-verge-of-a-major-social-and-technological-change-driven-by-ai-f5af0e28ce3e?source=topics_v2---------194-84--------------------d545d0cd_129d_4991_91da_832b672ebe99-------17,https://miro.medium.com/v2/resize:fill:140:140/1*R4b0wdgDFVuilXvzcCGFSQ.jpeg,ai 1442,1151,AI On News #1,"1. Tech Leaders Call for Pause in Creation of Giant AI ‘Digital Minds’ More than 1,000 artificial intelligence experts urge delay until world can be confident ‘effects will be positive and risks manageable’ source: theguardian.com 2. Google’s top AI researchers have left for competitors. Here’s where they are now. Top AI researchers have been leaving for startups where their work can have more impact.",https://medium.com/@thedatabeast/ai-on-news-1-8e4b26fe4b59?source=topics_v2---------195-84--------------------d545d0cd_129d_4991_91da_832b672ebe99-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rQockgM4KwPPJjK2e2R7gg.png,ai 1443,1169,Self-Discovery in the Age of Creative Computers,"When I was a small child, I lived in the countryside of South Dakota. My closest neighbor lived a short hike away, and outside of preschool, I never saw other children. That’s not to say I felt lonely; Quite the contrary. I had a whole entourage of imaginary friends. Back…",https://medium.com/everyday-creative/self-discovery-in-the-age-of-creative-computers-6f6b988be8ce?source=topics_v2---------197-84--------------------ef722324_73a0_46f7_a73b_3c92857cf1b2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7j8vZI5Nsdyckk8dKQy5cw@2x.jpeg,ai 1444,1080,Flood Congress with “Don’t Ban My TikTok” Coffee Mugs: A Campaign for Free Speech and Internet Freedom,"The power of social media platforms like TikTok cannot be underestimated, as they provide a space for creativity, connection, and the exchange of ideas. With the ongoing debate around the potential ban of TikTok, we’ve decided to launch the “Flood Congress with ‘Don’t Ban My TikTok’ Coffee Mugs” campaign. This…",https://medium.com/@darylbaez/flood-congress-with-dont-ban-my-tiktok-coffee-mugs-a-campaign-for-free-speech-and-internet-4e4b987814ac?source=topics_v2---------198-84--------------------ef722324_73a0_46f7_a73b_3c92857cf1b2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Oek6K3uJTL9EttpVbqHOOw.png,ai 1445,1170,Beyond the Mountains,"A Journey of Self-Discovery in a Faraway Land — As soon as she stepped onto the plane, Sarah knew that her life was about to change forever. Leaving everything she had ever known behind, she was off to a faraway land, one that she had only ever dreamt of. For years, Sarah had felt trapped in her mundane life…",https://medium.com/creative-oddity/beyond-the-mountains-32dedaeb3262?source=topics_v2---------199-84--------------------ef722324_73a0_46f7_a73b_3c92857cf1b2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vXDw9jios3P__m5H5Udo9w.jpeg,ai 1446,1171,GPT-5: The Dawn of Sentient Language Models and the Urgent AI Safety Concerns,"Introduction The world of artificial intelligence has been revolutionized by breakthroughs in natural language processing and understanding. As we continue to push the boundaries of what AI can do, we are entering the era of sentient language models. OpenAI’s recent announcement of their GPT-5 model has sent shockwaves through the AI…",https://medium.com/@mateja176/gpt-5-the-dawn-of-sentient-language-models-and-the-urgent-ai-safety-concerns-deb1dad3e9b6?source=topics_v2---------200-84--------------------ef722324_73a0_46f7_a73b_3c92857cf1b2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kAT4Hswi9LiqJJ5VbYy6Vg@2x.jpeg,ai 1447,1172,ChatGPT & SEO: Analyzing Word Relevance for Large Keyword List,"If you are handling SEO strategies for a large e-commerce business, you might have searched for ways to optimize keyword research processes. I have been trying to find a method to replace many hours of manual human review for each keyword and determine its relevance to specific product categories. In…",https://medium.com/boost-seo-with-ai/chatgpt-seo-analyzing-word-relevance-for-large-keyword-list-f3856b8d0a18?source=topics_v2---------201-84--------------------ef722324_73a0_46f7_a73b_3c92857cf1b2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*l5b1FI2BATVMf9_BXYjsEg.jpeg,ai 1448,1173,AI Disruption Will Be Greater Than Nukes Suddenly Appearing to Pre-Civilization Humanity,"And it’ll coming faster and have far greater impact than expected — The capabilities of GPT-4, the Large Language Model behind ChatGPT, are absolutely incredible and mindblowing. What’s wild is that: It’s only just appeared for mainstream use, and future versions will be far more capable GPT-4 and ChatGPT are only a subset of the broader landscape in terms of products and…",https://medium.com/@postbio/ai-disruption-will-be-greater-than-nukes-suddenly-appearing-to-pre-civilization-humanity-ac9885667871?source=topics_v2---------202-84--------------------ef722324_73a0_46f7_a73b_3c92857cf1b2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yKPgw8S5cfkKvqaFfh-ppQ.png,ai 1449,170,Can ChatGPT Plan Your Vacation? A.I. And Travel Explained,"Have you heard the buzz about ChatGPT? It’s the latest A.I. travel tool to hit the market, and it may just be able to make your vacation planning dreams come true. But does ChatGPT really work? Can it really plan a vacation for you? The answer is: yes! But before…",https://medium.com/geekculture/can-chatgpt-plan-your-vacation-a-i-and-travel-explained-947c0a45ad0a?source=topics_v2---------203-84--------------------ef722324_73a0_46f7_a73b_3c92857cf1b2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*W2FxZiXnU_DnHNP6,ai 1450,1174,Title: “The Age of Technology”,"Act One Scene One: The play opens with a bustling technological world where people move around with virtual reality (VR) headsets on their eyes. The latest technology revitalizes the world in ways unimaginable. We see a young man, Jack, out on the streets, wearing his VR headset. …",https://medium.com/@lovefoods_54026/title-the-age-of-technology-43bd25f72276?source=topics_v2---------204-84--------------------ef722324_73a0_46f7_a73b_3c92857cf1b2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,ai 1451,1175,Thinking about UBI with GPT4,"This is an experiment using chatGPT Plus. I’m working on a better method of prompting that is it once novel and simple. In most of my setups these days I set the character of the AI to respond to my prompts. Such as “think like a computer scientist"" or “act…",https://medium.com/@robtyrie/thinking-about-ubi-with-gpt4-9dd16a4a5a2d?source=topics_v2---------205-84--------------------ef722324_73a0_46f7_a73b_3c92857cf1b2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ExN93y9oOy7qKA-zovnasg.png,ai 1452,1176,AI: awareness is all you need,"Last week I spent 25 hours behind the wheel and listened to the latest podcasts about AI [1, 2, 3, 4, 5], and a while ago I read the entire modern scientific base on AI. I suppose the scientific background of h-index>0 and understanding how MLP/GPT/LLM work on a deep…",https://medium.com/growth-hacking-blog/ai-awareness-is-all-you-need-a811a39ef8e4?source=topics_v2---------206-84--------------------ef722324_73a0_46f7_a73b_3c92857cf1b2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7dyTqJGJKGIHBU2zOSuNyw.png,ai 1453,1177,The Prometheus Prompt,"The fear about generative AI systems comes not from their power but from their similarity to our own inner construction of reality: modeling, prediction, and hallucination with recursive training loops. It is the fear of ourselves and our non-perfection. And the awe of further slights. — Prometheus: Ay, but for me, mankind had never had The art of fire, that great resource, but kept By Gods alone in their own citadel: And this it was I filched for mortal men.",https://medium.com/@mattesmattes/the-prometheus-prompt-ff9d5b086e21?source=topics_v2---------207-84--------------------8fd52bb4_1f7d_4682_a2b0_45792fba0907-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fpSWn3eqUohYUHgGacC4zw.jpeg,ai 1454,1178,Giving ChatGPT Control,"Can ChatGPT leverage external systems to reason and provide higher quality output? Large Language Models (LLMs) have been hard at work disrupting our everyday lives. From how students go about writing papers, to how software engineers write code, to how folks seek out medical advice, the introduction of ChatGPT has been one of the swiftest and most disruptive paradigms in modern computational…",https://medium.com/@allengeernz/giving-chatgpt-control-a8ff4c322843?source=topics_v2---------208-84--------------------8fd52bb4_1f7d_4682_a2b0_45792fba0907-------17,https://miro.medium.com/v2/resize:fill:140:140/g:fp:0.69:0.2/1*YVyzn2S-uOiex7maPMWXPg.png,ai 1455,1179,The First AI Passover: visions of freedom,"Midjourney is an AI tool to generate images. I love the name of the prompt to create a new image: /imagine In the spirit of Passover, let’s /imagine freedom using AI. Where are freedoms denied today and what could freedom look like? At seder, we often talk abstractly about where…",https://medium.com/@dgoodtree/the-first-ai-passover-imagine-freedom-518ba76ab930?source=topics_v2---------210-84--------------------8fd52bb4_1f7d_4682_a2b0_45792fba0907-------17,https://miro.medium.com/v2/resize:fill:140:140/1*mI5PlXuYQxm8nFjQbmQ-fA.png,ai 1456,1180,Predicting the Unpredictable — March Madness using Snowpark and Hex,"Every March, millions gather to fill out brackets to compete with family, friends, and coworkers in the madness of college playoff basketball. Even being a data scientist, I still relied on emotional ties to colleges, specifically in the Carolinas. With limited knowledge of NCAA basketball, I would pick the higher…",https://medium.com/snowflake/predicting-the-unpredictable-march-madness-using-snowpark-and-hex-f16dc4f57add?source=topics_v2---------2-84--------------------48c0755d_30ba_423c_bd59_6c49ff498e99-------17,https://miro.medium.com/v2/resize:fill:140:140/0*oW_dUsWb5qxajXAp,machine-learning 1457,1181,Introducing PetGPT: Unleashing the True Thoughts of Your Cats and Dogs,"Finally, a way to let your pets tell you what they think about your dance moves — Have you ever wondered what your pets think about your questionable life choices? Or perhaps you’re dying to know if they secretly laugh at your dance moves? Well, the day has finally come when our beloved pets can openly communicate with us and even with each other, thanks to the…",https://medium.com/@robgon/introducing-petgpt-unleashing-the-true-thoughts-of-your-cats-and-dogs-ef734950ac63?source=topics_v2---------3-84--------------------48c0755d_30ba_423c_bd59_6c49ff498e99-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yUK4I2x6yCqk0-9b9sgSxw.png,machine-learning 1458,1182,Unlocking the Potential of AI Language Models with Prompt Engineering,"Prompt engineering is a relatively new field that has emerged in response to the increasing popularity of language models like ChatGPT, DALL-E, and other similar models. It is a crucial step in developing AI models like ChatGPT. …",https://medium.com/@mujtabamateen52/unlocking-the-potential-of-ai-language-models-with-prompt-engineering-2710843504b2?source=topics_v2---------4-84--------------------48c0755d_30ba_423c_bd59_6c49ff498e99-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fOSweIyO0X7eYg0t-bnxqQ.png,machine-learning 1459,1183,Decoding Generative AI: An Introductory Guide,"A Software Architect’s Perspective — As a software architect, I’ve had the privilege of witnessing the growth of artificial intelligence (AI) and its integration into various industries. One area of AI that has recently gained momentum is Generative AI. …",https://medium.com/@MaxLaurieHutchinson/decoding-generative-ai-an-introductory-guide-f8c53aca2447?source=topics_v2---------5-84--------------------48c0755d_30ba_423c_bd59_6c49ff498e99-------17,https://miro.medium.com/v2/resize:fill:140:140/0*KjXqzD4-PVdTF6uV,machine-learning 1460,1184,A Data-Driven Exploration of My Reading Journey,"Introduction Reading has always been an integral part of my life. From immersing myself in history books and spy novels to expanding my knowledge through statistical and machine learning texts, I have continually sought to broaden my horizons and quench my thirst for knowledge. …",https://medium.com/@niko-gamulin/a-data-driven-exploration-of-my-reading-journey-8bdec7b2c6c4?source=topics_v2---------6-84--------------------48c0755d_30ba_423c_bd59_6c49ff498e99-------17,https://miro.medium.com/v2/resize:fill:140:140/1*GEG0Gx_TMNwUzfYv22yHtQ.png,machine-learning 1461,1185,Free MIT course Introduction to Computational Thinking and Data Science,"In this day and age, it is important to understand the fundamentals of computational thinking and data science. — Computational thinking is a problem-solving approach that involves breaking down complex problems into smaller, more manageable parts that can be solved with the help of computers and algorithms. …",https://medium.com/@karan220595/free-mit-course-introduction-to-computational-thinking-and-data-science-3d6529846cbc?source=topics_v2---------7-84--------------------48c0755d_30ba_423c_bd59_6c49ff498e99-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0TnRoLpsJv3HHAf07qyIjg.jpeg,machine-learning 1462,1186,Lecture 004: Building Your First Cheminformatic Bot with Discord and Github Actions.,Welcome back to another graduate level lecture in which we start coding some of our first cheminformatic bots to perform different data engineering and machine learning pipelines. Our goal is to get a discord bot to perform an action based on the user’s input which would be a list of…,https://medium.com/@sharifsuliman/lecture-004-building-your-first-cheminformatic-bot-with-discord-and-github-actions-3da05dbbbddd?source=topics_v2---------8-84--------------------48c0755d_30ba_423c_bd59_6c49ff498e99-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*2FHYJQ9tc9tgkJefKjCgyA.gif,machine-learning 1463,1187,Twitter’s Recommendation Algorithm — Explained!,"Let’s do a brief non-technical breakdown! — Twitter has open-sourced one of its most prized possessions — the recommendation algorithm! Every day, Twitter serves over 150 billion Tweets to people’s devices. Every day, people post over 500 million Tweets. The recommendation algorithm shows you only a handful of top tweets that are relevant and engaging for you. So how does the algorithm select Tweets that end up on your For You timeline?",https://medium.com/data-achilles/twitters-recommendation-algorithm-explained-a46d357315d5?source=topics_v2---------9-84--------------------48c0755d_30ba_423c_bd59_6c49ff498e99-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BFbaL1RAHND28Iwy9-4GXg.png,machine-learning 1464,1188,ChatGPT 4: A Quantum Leap in AI Conversations,"Introduction: Ladies and gentlemen, boys and girls, AIs and humanoids, gather ‘round as we embark on a roller coaster ride through the fascinating world of ChatGPT 4! If you thought ChatGPT 3.5 was the pinnacle of artificial intelligence, you’re in for a treat! In this article, we’ll explore the monumental…",https://medium.com/@sajidjaved888/chatgpt-4-a-quantum-leap-in-ai-conversations-393b3330ffdc?source=topics_v2---------10-84--------------------cd9709a0_da8b_434c_a256_3cd0261c0d3f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*r4dOZJwvOfjk-QG570D2fQ.png,machine-learning 1465,1189,A 30-Days Challenge in TA(Technical Analysis)+ ML(Machine Learning) Writings — Day 0,"Technical Analysis(TA) is a method of analyzing financial markets by studying historical price and volume data to identify patterns, trends, and market behavior. It is often compared with Fundamental Analysis (FA)— which looks at the underlying factors that may affect the price of an asset, such as financial and economic…",https://medium.com/elite-data-science-center-edsc/a-30-days-challenge-in-ta-technical-analysis-ml-machine-learning-writings-day-0-a350b5198b59?source=topics_v2---------11-84--------------------cd9709a0_da8b_434c_a256_3cd0261c0d3f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*fIL3v7-ZpjJbErxv.jpg,machine-learning 1466,1190,Assumptions of Linear Regression,"The Linear regression is a statistical method used to model the relationship between a dependent variable and independent variables. The goal is to find the best-fitting line that describes the relationship between the dependent and independent variables. The basic form of a linear regression model is, y = β0 +…",https://medium.com/@amulyakulkarni1/assumptions-of-linear-regression-56ceff0b6aca?source=topics_v2---------12-84--------------------cd9709a0_da8b_434c_a256_3cd0261c0d3f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xymi98VmJCjJ6lmsr2N7cg.png,machine-learning 1467,1191,Customer Segmentation Applying RFM Score with R,"There are different types of customer segmentation, defined according to the characteristics of their variables. Your grouping can contain elements of only one type of segmentation or even combine more than one model to arrive at the ideal profile for commercial work (sales). That’s why, customer segmentation is essential to…",https://medium.com/@euditomagul/customer-segmentation-applying-rfm-score-with-r-b99b59b7b115?source=topics_v2---------13-84--------------------cd9709a0_da8b_434c_a256_3cd0261c0d3f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zkiepauQd9PemRyIz_w6aQ.jpeg,machine-learning 1468,1192,Twitter’s Algorithm Is Now Open Source — Here Is How You Get Ranked,"Have you heard about the big news from Twitter? If not, let me fill you in on the noteworthy updates! So, during Elon Musk’s takeover of Twitter, he proposed something radical to promote transparency and free speech: making their algorithms “open-source”. And the good news is that Twitter actually made…",https://medium.com/datadriveninvestor/twitters-algorithm-is-now-open-source-here-is-how-you-get-ranked-e3dbd94ca2f3?source=topics_v2---------14-84--------------------452c452f_7163_42aa_afb3_54542efab518-------17,https://miro.medium.com/v2/resize:fill:140:140/1*bP9yjTjNDVdOB0un0_N4HQ.png,machine-learning 1469,1193,10 ways to improve the accuracy of your predictive model,"Have you ever built a predictive model that just didn’t quite hit the mark? Maybe it was close, but not accurate enough to be useful. Or maybe it was way off the mark, leaving you scratching your head and wondering where you went wrong. Well, fear not! There are many…",https://medium.com/@shubh.mech15/10-ways-to-improve-the-accuracy-of-your-predictive-model-3d5139397c36?source=topics_v2---------15-84--------------------452c452f_7163_42aa_afb3_54542efab518-------17,https://miro.medium.com/v2/resize:fill:140:140/0*VuXgu5MYTbAr1DJl.jpg,machine-learning 1470,1194,"Everyone Grows Out of DataCamp, Use These Platforms Once You Do","DataCamp helped me get an A in my programming class, but I grew out of it and unsubscribed. As we all can see, the data field is rapidly growing. People all across the globe are intrigued by the importance of data and eager to learn about it. Nowadays, you can…",https://medium.com/@jessicazerlinas/can-datacamp-make-me-an-expert-and-land-me-a-job-in-data-science-245ed293d81e?source=topics_v2---------16-84--------------------452c452f_7163_42aa_afb3_54542efab518-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/0*iFwdqq3H0p9rqCOL.gif,machine-learning 1471,1195,Inductive Bias in System Architecture,"In system architecture, the goal is to design a software system that meets specific requirements and constraints while also being scalable and flexible enough to accommodate future needs. To achieve this, it is essential to understand the concept of inductive bias, used in machine learning and its role in system…",https://medium.com/@mark-mishaev/inductive-bias-in-system-architecture-6c488f261387?source=topics_v2---------17-84--------------------452c452f_7163_42aa_afb3_54542efab518-------17,https://miro.medium.com/v2/resize:fill:140:140/1*s6gSNiBWiGiKPIIVRHMUxw.jpeg,machine-learning 1472,1196,Computing speed & optimization (CPU vs. GPU),"In the world of data science and machine learning, selecting the correct hardware can have a significant impact on the speed and efficiency of model training and inference. In particular, GPUs (Graphics Processing Units) have become increasingly popular for training and running machine learning models due to their ability to…",https://medium.com/@AndresHerranz/computing-speed-optimization-cpu-vs-gpu-288fe35ddead?source=topics_v2---------18-84--------------------452c452f_7163_42aa_afb3_54542efab518-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*xlDdJatCPS2AvMAkB9Zxrg.gif,machine-learning 1473,1197,Python and Interpreter— QuickStart,"Python is extensible and high level language. You can write your functions in C or C++/Java and easily use in python. Likely, the flexibility in lists and dictionaries and the high level data structure makes it high level language than automated shell and windows script. Python name is not defined…",https://medium.com/@sushantgiri38/python-and-interpreter-quickstart-4a068c6815f6?source=topics_v2---------19-84--------------------452c452f_7163_42aa_afb3_54542efab518-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1474,1198,Multi-Layer Perceptrons,"In the previous article we talked about perceptrons as one of the earliest models of neural networks. As we have seen, single-layer perceptrons have limited computational power since they can solve only linearly separable problems. In this article we will discuss multi-layer perceptrons (MLPs), which are networks that consist of…",https://medium.com/@roiyeho/multi-layer-perceptrons-8d76972afa2b?source=topics_v2---------20-84--------------------452c452f_7163_42aa_afb3_54542efab518-------17,https://miro.medium.com/v2/resize:fill:140:140/1*K70rPq2eVWdXE1nFsEg-BQ.png,machine-learning 1475,1199,"Unleash the Power of LlamaIndex (GPT Index), Langchain, and ChatGPT 3.5 to Automate Performance Reviews!","Ah, performance review season… A time of joy, reflection, and… lots of writing. As a manager, you understand the importance of giving your team members meaningful feedback, but let’s face it, crafting those lengthy reviews can be a real time-sink. Fear not, fellow managers! In this tutorial, we’ll show you…",https://medium.com/@paxtonai/unleash-the-power-of-llamaindex-gpt-index-langchain-and-chatgpt-3-5-a3667e28002d?source=topics_v2---------21-84--------------------452c452f_7163_42aa_afb3_54542efab518-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kOxyTNCdYmb0cInBtkxK8A.png,machine-learning 1476,1200,Using TensorFlow for Logistic Regression on the Titanic Dataset,"Introduction The Titanic dataset is a widely used dataset for machine learning beginners as it provides an excellent opportunity to practice various classification techniques, such as logistic regression. This article demonstrates how to use TensorFlow to implement logistic regression for the Titanic dataset. Loading and Preprocessing the Dataset First, we…",https://medium.com/@s.sadathosseini/using-tensorflow-for-logistic-regression-on-the-titanic-dataset-730b7e959022?source=topics_v2---------22-84--------------------452c452f_7163_42aa_afb3_54542efab518-------17,https://miro.medium.com/v2/resize:fill:140:140/1*jzkqoljSJQDxZI9TxuM3iA.png,machine-learning 1477,1201,AI in Marketing: How Machine Learning is Changing the Landscape,"Marketing has been in existence for a very long time in history. Although it was not in the form of marketing as we see today, instead it was used more as a medium to convey information to a larger audience. …",https://medium.com/@bhaskar6869/ai-in-marketing-how-machine-learning-is-changing-the-landscape-5e49a13d41ec?source=topics_v2---------25-84--------------------c981852a_b4fd_4b26_930a_65918828836e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*M8URlpBaMtLiiXJw,machine-learning 1478,1202,A “pause” on the development of AI? It’s not going to happen,"More than 1,000 technology experts, researchers and investors have signed an open letter expressly asking for a six-month halt to the creation of “giant AI systems” citing “profound risks to society.” But anybody who works in technology will already know that this request cannot be met. It’s a fantasy to…",https://medium.com/enrique-dans/a-pause-on-the-development-of-ai-its-not-going-to-happen-d4f894816e82?source=topics_v2---------27-84--------------------c981852a_b4fd_4b26_930a_65918828836e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5Ihz5tONKtHyvKl-K_u6Wg.jpeg,machine-learning 1479,1203,Wide Variety of Machine Learning Algorithms in Twitter’s Recommendation Algorithm,"Most of Twitter’s Recommendation Algorithm was made open source on March 31st, 2023, and it uses a wide variety of Machine Learning (ML) Algorithms for personalized and engaging content recommendations. Some of these ML models that the article discusses are: REALGRAPH: A large-scale GRAPH-based ML algorithm that helps identify relationships…",https://medium.com/@pragmaticlyabstract/wide-variety-of-machine-learning-algorithms-in-twitters-recommendation-algorithm-398b67fe1513?source=topics_v2---------28-84--------------------c981852a_b4fd_4b26_930a_65918828836e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*_Wy_B5rgRrDg3I3b,machine-learning 1480,1204,Navigating the Complexities of Multi-Team Collaboration in Machine Learning Development,"Developing a machine learning product often requires the expertise and contributions of multiple teams, spanning data scientists, engineers, product managers, and domain experts. Cross-functional collaboration is vital for a successful outcome. In this article, we delve deeper into best practices for managing and collaborating with various teams during machine learning…",https://medium.com/@sigari.salman/navigating-the-complexities-of-multi-team-collaboration-in-machine-learning-development-a177bd5f95be?source=topics_v2---------29-84--------------------c981852a_b4fd_4b26_930a_65918828836e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ScaTqAPj5Y2SFIxlkLBCwg.jpeg,machine-learning 1481,1205,Time Series Model in PyTorch to Predict Stock Prices,"This article is a guide on how to make a simple time series model in PyTorch that can predict the price of a stock. What is a Time Series? Before we begin we must first understand what a time series is. As the name implies, it is a series of points with each point occurring…",https://medium.com/@ali.462/time-series-model-in-pytorch-to-predict-stock-prices-4ebfdc13dc49?source=topics_v2---------31-84--------------------c981852a_b4fd_4b26_930a_65918828836e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-HhSmx8GaOp9eF9rlSv2hQ.png,machine-learning 1482,635,State of Augmented Reality in 2023 part1,"Exploring the Design Space of Employing AI-Generated Content for Augmented Reality Display(arXiv) Author : Yongquan Hu, Mingyue Yuan, Kaiqi Xian, Don Samitha Elvitigala, Aaron Quigley Abstract : As the two most common display content of Augmented Reality (AR), the creation process of image and text often requires a human to…",https://medium.com/@monocosmo77/state-of-augmented-reality-in-2023-part1-8c58041cdbc6?source=topics_v2---------32-84--------------------327fca3a_8ca9_48b9_a4a4_f61f6db86a31-------17,https://miro.medium.com/v2/resize:fill:140:140/1*NjaBSzIhjP6LB9OpYBFgow.jpeg,machine-learning 1483,1206,How the Welsh t-test Revolutionizes Comparing Means Between Groups,"This article provides an overview of the Welsh t-test, a statistical test for comparing the means of two groups when the assumption of equal variances is violated. We first explain the theoretical basis for the Welsh t-test and how it differs from the standard t-test. The Welsh t-test is a…",https://medium.com/@the_daft_introvert/breaking-the-assumption-barrier-how-the-welsh-t-test-revolutionizes-comparing-means-between-groups-d50a3df5381a?source=topics_v2---------33-84--------------------327fca3a_8ca9_48b9_a4a4_f61f6db86a31-------17,https://miro.medium.com/v2/resize:fill:140:140/0*j6ClsccaRwCMq-Iw,machine-learning 1484,1207,Effortless Machine Learning with Auto-Sklearn,"Auto-sklearn frees a machine learning user from algorithm selection and hyperparameter tuning. It leverages recent advantages in Bayesian optimization, meta-learning and ensemble construction. Motivation As machine learning practitioners, we often spend a considerable amount of time and effort in feature engineering, model selection, and hyperparameter tuning. However, the recent developments in…",https://medium.com/@sukritijaitly29/effortless-machine-learning-with-auto-sklearn-93c0e4e63b8c?source=topics_v2---------34-84--------------------327fca3a_8ca9_48b9_a4a4_f61f6db86a31-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Rt-SrOP7VWv7cTNSMQYHWQ.png,machine-learning 1485,1208,What’s on the arXiv: Weekly Roundup #1,"Greetings, Medium community, At Explanatory AI, we're dedicated to making AI knowledge accessible to all. As part of this mission, we're excited to present our Weekly Digest, where we highlight the latest and most interesting publications from the arXiv Computer Science section. In this edition, we'll be covering the period…",https://medium.com/@explanatory.ai/whats-on-the-arxiv-weekly-roundup-1-9038073a9c4d?source=topics_v2---------35-84--------------------327fca3a_8ca9_48b9_a4a4_f61f6db86a31-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gD0GgPi_vU_j4a_Xi8fxmQ.png,machine-learning 1486,1209,Practical Implementation of Machine Learning using SparkMLlib — Part 3,This is a part 3 of Apache spark series where we will see the practical implementation of one machine learning problem. if you did not read my previous posts on spark seres please visit them before you read this article. Introduction Spark ML and Spark MLlib are machine learning libraries…,https://medium.com/@manthapavankumar11/practical-implementation-of-machine-learning-using-sparkmllib-part-3-80117ca124fd?source=topics_v2---------36-84--------------------327fca3a_8ca9_48b9_a4a4_f61f6db86a31-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vSc0YFJAkgffmP-4_0lPPQ.png,machine-learning 1487,1199,Introducing Paxton AI: Transform Your Knowledge Base with No-Code Conversational AI,"We are thrilled to announce the launch of Paxton AI, a cutting-edge no-code platform designed to turn your documents into interactive, AI-driven chatbots. With Paxton AI, developers and non-technical users alike can easily create chatbots that access databases of internal knowledge, such as emails, Google Drive, Confluence, or Notion. …",https://medium.com/@paxtonai/introducing-paxton-ai-transform-your-knowledge-base-with-no-code-conversational-ai-d5ae9ea3d9d1?source=topics_v2---------37-84--------------------62eaf8aa_3da6_476c_8d6e_876d0d72bcc4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4QqGEmUz1b6cqVgFaROmoA.png,machine-learning 1488,635,Significance of Decision Boundaries in Machine Learning scenarios part3,"Basics of Decision Boundaries Decision Boundary in Machine Learning | Aman Kharwal The general goal of a classification model is to find a decision boundary. The purpose of the decision boundaries is to…thecleverprogrammer.com Neural networks learn to magnify areas near decision boundaries(arXiv) Author : Jacob A. Zavatone-Veth, Sheng Yang, Julian A. Rubinfien, Cengiz Pehlevan Abstract : We study how training molds the Riemannian geometry induced by neural network feature maps. At infinite width, neural networks with random parameters induce highly symmetric metrics on…",https://medium.com/@monocosmo77/significance-of-decision-boundaries-in-machine-learning-scenarios-part3-63f0f606d23d?source=topics_v2---------38-84--------------------62eaf8aa_3da6_476c_8d6e_876d0d72bcc4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ddjmOdXdf59mQ_op6SauEg.jpeg,machine-learning 1489,635,Working with Ising model in Machine Learning domain part2,"Equilibrium via multi-spin-flip Glauber dynamics in Ising Model(arXiv) Author : Diana Thongjaomayum, Prabodh Shukla Abstract : Notwithstanding great strides that statistical mechanics has made in recent decades, an analytic solution of arguably the simplest model of relaxation dynamics, the Ising model in an applied external field remains elusive even in…",https://medium.com/@monocosmo77/working-with-ising-model-in-machine-learning-domain-part2-36a8ffed2a87?source=topics_v2---------39-84--------------------62eaf8aa_3da6_476c_8d6e_876d0d72bcc4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tVdMSPDYxYpHdfjoH6gS9w.jpeg,machine-learning 1490,1210,Artificial intelligence can now do something that was impossible: Why it’s cause for concern,"Midjourney recently announced its latest version, the V5, and it's set a new standard in achieving quirky, Instagram-filtered photorealism. — Yes, everything still has that faux-Fujifilm look, drowned in warm-hazy light, but there’s no denying the substantial strides made here. Midjourney now supports double the resolution of the previous version and in wider aspect ratios, outputs sharper images and can evoke more styles. …",https://medium.com/@bembelino22/photo-source-22aa5ff89055?source=topics_v2---------40-84--------------------62eaf8aa_3da6_476c_8d6e_876d0d72bcc4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OrN5dnqpHZdWUFLPc-w7fA.jpeg,machine-learning 1491,1211,Introduction to Machine Learning,Machine learning (ML) is the subset of artificial intelligence (AI) that focuses on building systems with learning abilities so as to improve their performance based on historical data given to them. Artificial intelligence refers to systems or machines with human intelligence or show a level of human intelligence. Artificial intelligence…,https://medium.com/@maryamsabubakar53/introduction-to-machine-learning-43f2f2ca5a55?source=topics_v2---------41-84--------------------62eaf8aa_3da6_476c_8d6e_876d0d72bcc4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*66xwQPBd_elRigZi-Uk5-w.jpeg,machine-learning 1492,1206,Utilizing Bayesian Inference: An Approach to Making Predictions through Probability Distributions,"This article discusses the concept of Bayesian inference, a probabilistic approach to machine learning that involves updating a prior probability distribution based on observed data. It explores the use of Bayesian inference in making predictions about future data based on available evidence. Bayesian inference is a powerful approach to machine…",https://medium.com/@the_daft_introvert/utilizing-bayesian-inference-an-approach-to-making-predictions-through-probability-distributions-5e98ccdc0d3f?source=topics_v2---------42-84--------------------62eaf8aa_3da6_476c_8d6e_876d0d72bcc4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*5D4DKWNlEuUuVgke,machine-learning 1493,635,Use cases of Quantum harmonic oscillator part1(Computer Science),"Quadratic Time-dependent Quantum Harmonic Oscillator(arXiv) Author : F. E. Onah, E. García Herrera, J. A. Ruelas-Galván, G. Juárez Rangel, E. Real Norzagaray, B. M. Rodríguez-Lara Abstract : We present a Lie algebraic approach to a Hamiltonian class covering driven, parametric quantum harmonic oscillators where the parameter set — mass, frequency…",https://medium.com/@monocosmo77/use-cases-of-quantum-harmonic-oscillator-part1-computer-science-83fffdb03092?source=topics_v2---------44-84--------------------62eaf8aa_3da6_476c_8d6e_876d0d72bcc4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1494,1212,"Leadership Psychology: Understanding the Mindset of Successful Leaders Leadership is a complex…","Leadership Psychology: Understanding the Mindset of Successful Leaders Leadership is a complex topic that has been studied and debated for centuries. While there is no one-size-fits-all approach to being a successful leader, there are certain psychological principles and behaviors that have been found to be effective. …",https://medium.com/@naurisk131993/leadership-psychology-understanding-the-mindset-of-successful-leaders-leadership-is-a-complex-2cb0c4ca1269?source=topics_v2---------46-84--------------------62eaf8aa_3da6_476c_8d6e_876d0d72bcc4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xqNRCL2jBTQ5OxacqTkw4A.png,machine-learning 1495,1213,Common SQL Commands- Data Analysis,"SQL (Structured Query Language) is a powerful tool used for managing and manipulating data in a relational database. It is widely used in data analytics, allowing analysts to extract, transform, and analyze large amounts of data. …",https://medium.com/@shuklayashvardhan/common-sql-commands-data-analysis-9af432355076?source=topics_v2---------47-84--------------------011e046f_a2c7_4300_83bf_8f6972252d11-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rOzoncElqdqIAThTj8Idgg.png,machine-learning 1496,1214,Evaluating the performance of traditional VAR and ML approaches for forecasting inflation in Baltic countries based on the Phillips Curve,"Authors: Nabi Rahimov, Alexandra Grischenko, Greyson Michael Culbert Copyrighted. In this example, I will share how Vector Auto-Regressive (VAR) and Machine Learning (ML) models perform in predicting inflation in three Baltic countries based on the Phillips curve theory. Before building the models, let’s discuss VAR model. The main instrument used…",https://medium.com/@nebirehim99/evaluating-the-performance-of-traditional-var-and-ml-approaches-for-forecasting-inflation-in-baltic-9924bcf85825?source=topics_v2---------48-84--------------------011e046f_a2c7_4300_83bf_8f6972252d11-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gn1lP_OCSFmUa_08bRNK3A.png,machine-learning 1497,1215,Weather Prediction using storm images (Part 1: Problem statement and dataset discussion),"Aim: Enhancing Storm Prediction Accuracy through Satellite Image-Based Wind Speed Forecasting using Gaussian Process Regressor In this technical article, we aim to demonstrate how satellite images can be utilized to accurately forecast wind speed for storm systems, using Gaussian Process Regressor as the predictive model. By analyzing storm ids (~70250) and plotting their timestamp, we showcase how the model can effectively capture storms’ formation and…",https://medium.com/deepkapha-notes/weather-prediction-using-storm-images-part-1-problem-statement-and-dataset-discussion-24f20603440b?source=topics_v2---------49-84--------------------011e046f_a2c7_4300_83bf_8f6972252d11-------17,https://miro.medium.com/v2/resize:fill:140:140/0*hCUsc-GcntRUYYbo,machine-learning 1498,635,State of Augmented Reality in 2023 part2,"Augmented Reality Remote Operation of Dual Arm Manipulators in Hot Boxes(arXiv) Author : Frank Regal, Young Soo Park, Jerry Nolan, Mitch Pryor Abstract : In nuclear isotope and chemistry laboratories, hot cells and gloveboxes provide scientists with a controlled and safe environment to perform experiments. Working on experiments in these…",https://medium.com/@monocosmo77/state-of-augmented-reality-in-2023-part2-64c50ba7f546?source=topics_v2---------50-84--------------------011e046f_a2c7_4300_83bf_8f6972252d11-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Ahbf9MPLjSgWARZfTTekpg.jpeg,machine-learning 1499,635,State of Augmented Reality in 2023 part3,"Digital Twin of a Network and Operating Environment Using Augmented Reality(arXiv) Author : Haoshuo Chen, Xiaonan Xu, Jesse E. Simsarian, Mijail Szczerban, Rob Harby, Roland Ryf, Mikael Mazur, Lauren Dallachiesa, Nicolas K. Fontaine, John Cloonan, Jim Sandoz, David T. Neilson Abstract : We demonstrate the digital twin of a network…",https://medium.com/@monocosmo77/state-of-augmented-reality-in-2023-part3-9934360eef9?source=topics_v2---------51-84--------------------011e046f_a2c7_4300_83bf_8f6972252d11-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1500,635,New Developments in Human-Computer Interaction part1,"Gazealytics: A Unified and Flexible Visual Toolkit for Exploratory and Comparative Gaze Analysis(arXiv) Author : Kun-Ting Chen, Arnaud Prouzeau, Joshua Langmead, Ryan T Whitelock-Jones, Lee Lawrence, Tim Dwyer, Christophe Hurter, Daniel Weiskopf, Sarah Goodwin Abstract : We present a novel, web-based visual eye-tracking analytics tool called Gazealytics. Our open-source toolkit…",https://medium.com/@monocosmo77/new-developments-in-human-computer-interaction-part1-8deea3a86886?source=topics_v2---------52-84--------------------011e046f_a2c7_4300_83bf_8f6972252d11-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1501,1216,Understanding Supervised Learning: A Comprehensive Guide to Classification and Regression Models,Machine Learning and supervised learning Machine learning (ML) is a subfield of artificial intelligence (AI) that involves the use of statistical and computational techniques to enable computers to learn from data and make predictions or decisions without being explicitly programmed. Supervised learning is one of the main types of machine…,https://medium.com/@gauranshigupta2000/understanding-supervised-learning-a-comprehensive-guide-to-classification-and-regression-models-4d82c35a70ea?source=topics_v2---------53-84--------------------011e046f_a2c7_4300_83bf_8f6972252d11-------17,https://miro.medium.com/v2/resize:fill:140:140/0*SzKQ1m8AMCCX01op.jpg,machine-learning 1502,635,Working with Ising model in Machine Learning domain part3,"Ising model on clustered networks: A model for opinion dynamics(arXiv) Author : Simone Baldassarri, Anna Gallo, Vanessa Jacquier, Alessandro Zocca Abstract : We study opinion dynamics on networks with a nontrivial community structure, assuming individuals can update their binary opinion as the result of the interactions with an external influence…",https://medium.com/@monocosmo77/working-with-ising-model-in-machine-learning-domain-part3-3f965bc8fc38?source=topics_v2---------54-84--------------------011e046f_a2c7_4300_83bf_8f6972252d11-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1bTloTC2B8HLeHbIK0QFrg.jpeg,machine-learning 1503,1217,Python Warehouse Optimization (Unsupervised Clustering ML Project),"As a small e-commerce company or even a large retailer, optimizing warehousing can be a significant factor in saving costs. This project offers a simple yet effective solution to help determine the best locations to store your products on a granular level. By utilizing data from an e-commerce store, this…",https://medium.com/@twalkb29/python-warehouse-optimization-unsupervised-ml-project-d92a9bc69c52?source=topics_v2---------56-84--------------------98e7f4ae_588c_4872_98b0_3d993ed95d76-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kYhPYu_5o6KLfgLcIboJ3w.jpeg,machine-learning 1504,635,Working with Planar Graphs part2(Machine Learning),"Partitioning edges of a planar graph into linear forests and a matching(arXiv) Author : Marthe Bonamy, Jadwiga Czyżewska, Łukasz Kowalik, Michał Pilipczuk Abstract : We show that the edges of any planar graph of maximum degree at most 9 can be partitioned into 4 linear forests and a matching. Combined with known results, this implies that the edges of any planar graph G of odd maximum degree Δ≥9 can be partitioned into Δ−12 linear forests and one matching. This strengthens well-known results stating that graphs in this class have chromatic index Δ [Vizing, 1965] and linear arboricity at most ⌈(Δ+1)/2⌉ [Wu, 1999].",https://medium.com/@monocosmo77/working-with-planar-graphs-part2-machine-learning-149ea07dca97?source=topics_v2---------57-84--------------------98e7f4ae_588c_4872_98b0_3d993ed95d76-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1505,635,Working with Planar Graphs part1(Machine Learning),Weak degeneracy of planar graphs without 4- and 6-cycles(arXiv) Author : Tao Wang Abstract : : A graph is k-degenerate if every subgraph H has a vertex v with dH(v)≤k. The class of degenerate graphs plays an important role in the graph coloring theory. Observed that every k-degenerate graph is…,https://medium.com/@monocosmo77/working-with-planar-graphs-part1-machine-learning-37c01c9eb1e8?source=topics_v2---------58-84--------------------98e7f4ae_588c_4872_98b0_3d993ed95d76-------17,https://miro.medium.com/v2/resize:fill:140:140/1*jJfaZQujdeBRRMdRZ4Gs2Q.jpeg,machine-learning 1506,635,Use cases of Quantum teleportation part3(Computer Science),"Continuous variable quantum teleportation in a dissipative environment: Comparison of non-Gaussian operations before and after noisy channel(arXiv) Author : Chandan Kumar, Mohak Sharma, Shikhar Arora Abstract : We explore the relative advantages in continuous-variable quantum teleportation when non-Gaussian operations, namely, photon subtraction, addition, and catalysis, are performed before and after…",https://medium.com/@monocosmo77/use-cases-of-quantum-teleportation-part3-computer-science-ef136a81a709?source=topics_v2---------59-84--------------------98e7f4ae_588c_4872_98b0_3d993ed95d76-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1507,635,Use cases of Quantum teleportation part2(Computer Science),"Bi-directional quantum teleportation of GHZ-like states(arXiv) Author : Leila S. Tabatabaei, Babak Vakili Abstract : : In this paper we propose a method through which n-qubit states can simultaneously be bi-directionally transmitted between two users. We assume that Alice and Bob, the legitimate users, each have a n-qubit GHZ-like state…",https://medium.com/@monocosmo77/use-cases-of-quantum-teleportation-part2-computer-science-97e837a2019f?source=topics_v2---------60-84--------------------98e7f4ae_588c_4872_98b0_3d993ed95d76-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1508,635,Significance of Adversarial Robustness part2(Machine Learning),"Denoising Autoencoder-based Defensive Distillation as an Adversarial Robustness Algorithm(arXiv) Author : Bakary Badjie, José Cecílio, António Casimiro Abstract : Adversarial attacks significantly threaten the robustness of deep neural networks (DNNs). Despite the multiple defensive methods employed, they are nevertheless vulnerable to poison attacks, where attackers meddle with the initial training…",https://medium.com/@monocosmo77/significance-of-adversarial-robustness-part2-machine-learning-76f288b67cc6?source=topics_v2---------61-84--------------------98e7f4ae_588c_4872_98b0_3d993ed95d76-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1509,635,Use cases of Quantum harmonic oscillator part2(Computer Science),"Non-inertial effects on a non-relativistic quantum harmonic oscillator in the presence of a screw dislocation(arXiv) Author : : L. C. N. Santos, F. M. da Silva, C. E. Mota, V. B. Bezerra Abstract : We investigate non-inertial effects induced by a rotating frame on a non-relativistic quantum harmonic oscillator as…",https://medium.com/@monocosmo77/use-cases-of-quantum-harmonic-oscillator-part2-computer-science-d5551ac3024d?source=topics_v2---------62-84--------------------032f0aed_70e3_4f71_adde_a4ad2bd2210e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1510,635,Use cases of Quantum harmonic oscillator part3(Computer Science),"Growth of Sobolev Norms in 1-d Quantum Harmonic Oscillator with Polynomial Time Quasi-periodic Perturbation(arXiv) Author : Jiawen Luo, Zhenguo Liang, Zhiyan Zhao Abstract : We consider the one-dimensional quantum harmonic oscillator perturbed by a linear operator which is a polynomial of degree 2 in (x,−i∂x), with coefficients quasi-periodically depending on…",https://medium.com/@monocosmo77/use-cases-of-quantum-harmonic-oscillator-part3-computer-science-f182e4daa5ee?source=topics_v2---------63-84--------------------032f0aed_70e3_4f71_adde_a4ad2bd2210e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1511,635,Use cases of Quantum teleportation part1(Computer Science),"Satellite-based entanglement distribution and quantum teleportation with continuous variables(arXiv) Author : Tasio Gonzalez-Raya, Stefano Pirandola, Mikel Sanz Abstract : Advances in satellite quantum communications aim at reshaping the global telecommunication network by increasing the security of the transferred information. Here, we study the effects of atmospheric turbulence in continuous-variable entanglement…",https://medium.com/@monocosmo77/use-cases-of-quantum-teleportation-part1-computer-science-a0647408258c?source=topics_v2---------64-84--------------------032f0aed_70e3_4f71_adde_a4ad2bd2210e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1512,635,Working with Distributed Matrix Multiplication part3(Machine Learning),"Sparse Random Khatri-Rao Product Codes for Distributed Matrix Multiplication(arXiv) Author : Ruowan Ji, Anoosheh Heidarzadeh, Krishna R. Narayanan Abstract : We introduce two generalizations to the paradigm of using Random Khatri-Rao Product (RKRP) codes for distributed matrix multiplication. We first introduce a class of codes called Sparse Random Khatri-Rao Product…",https://medium.com/@monocosmo77/working-with-distributed-matrix-multiplication-part3-machine-learning-72cd195c59a5?source=topics_v2---------65-84--------------------032f0aed_70e3_4f71_adde_a4ad2bd2210e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1513,635,Significance of Decision Boundaries in Machine Learning scenarios part2,"Basics of Decision Boundaries Decision Boundary in Machine Learning | Aman Kharwal The general goal of a classification model is to find a decision boundary. The purpose of the decision boundaries is to…thecleverprogrammer.com Horocycle Decision Boundaries for Large Margin Classification in Hyperbolic Space(arXiv) Author : Xiran Fan, Chun-Hao Yang, Baba C. Vemuri Abstract : Hyperbolic spaces have been quite popular in the recent past for representing hierarchically organized data. Further, several classification algorithms for data in these spaces have been proposed in the…",https://medium.com/@monocosmo77/significance-of-decision-boundaries-in-machine-learning-scenarios-part2-7f879800a61?source=topics_v2---------66-84--------------------032f0aed_70e3_4f71_adde_a4ad2bd2210e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5ci6HDBA0XLaIe3JPU6EGw.jpeg,machine-learning 1514,1218,GPT-4 Creates Eye-Catching Flowcharts,"Flowcharts are the go-to tool to visualize complex ideas and processes. Creating a good one can take up a lot of time, though. In this article, I’ll show you how to create stunning flowcharts with ChatGPT (preferrably GPT-4) in under a minute. Sentence/prompt to flowchart I used mermaid.live as a flowchart editor. The…",https://medium.com/@ramaswamis/gpt-4-creates-eye-catching-flowcharts-9cf4c3137dcc?source=topics_v2---------68-84--------------------032f0aed_70e3_4f71_adde_a4ad2bd2210e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*f4bRJfbJ-9lsgbwcBAITNw.png,machine-learning 1515,1219,Unpacking the Differences: Machine Learning in Research versus Production Environments,"Machine Learning has become a buzzword in the tech industry and beyond, with its applications ranging from image recognition to natural language processing. However, the way machine learning is implemented varies greatly depending on the environment in which it is used. In this article, we will explore the differences between…",https://medium.com/towards-artificial-intelligence/unpacking-the-differences-machine-learning-in-research-versus-production-environments-23ae026b7eef?source=topics_v2---------69-84--------------------032f0aed_70e3_4f71_adde_a4ad2bd2210e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*_lfefCHbO1rTo6jZ,machine-learning 1516,1220,What is Empirical Mode Decomposition,"Empirical Mode Decomposition (EMD) is a signal processing technique that decomposes a signal into its underlying oscillatory components, called Intrinsic Mode Functions (IMFs). It is a data-driven method that does not require prior knowledge of the signal’s frequency content or the characteristics of the underlying oscillations. The EMD algorithm involves…",https://medium.com/@samanemami/what-is-empirical-mode-decomposition-3ec89115db6b?source=topics_v2---------70-84--------------------032f0aed_70e3_4f71_adde_a4ad2bd2210e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*q1k3MheDoTMJN56iC0NDKQ.png,machine-learning 1517,1221,Which Model Is Best For Smoke Detection?,"Exploring all the models to pick the best. Introduction : Smoke detectors detect smoke and trigger an alarm to alert others. Typically, they are found in offices, homes, factories, etc. Generally, smoke detectors fall into two categories: Photoelectric Smoke Detector - The device detects the light intensity and generates an alarm if…",https://medium.com/@prathamesh.gadekar/which-model-is-best-for-smoke-detection-fb567ccda3df?source=topics_v2---------71-84--------------------032f0aed_70e3_4f71_adde_a4ad2bd2210e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ms7yS6dEnVZyLQvv,machine-learning 1518,1222,Lesson 8 — Machine Learning: Decision Trees Intuition,"A Decision Tree is a flowchart-like structure in which each internal node represents a decision based on an input feature, each branch represents an outcome of the decision, and each leaf node represents a class label or a predicted value. …",https://medium.com/@nerdjock/lesson-8-machine-learning-decision-trees-intuition-5ba64ace513c?source=topics_v2---------72-84--------------------3266e02a_eed0_4ebc_9dc1_beefba460df3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Qq-Knn9WAif68Kmc_w_SEw.jpeg,machine-learning 1519,1223,Machine Learning Theory,"What is Machine Learning? ML Vs DL Vs AI Types of Machine Learning Offline Vs Online ML Instance Vs Model Based ML What is MACHINE LEARNING Machine Learning is a field of computer science that uses statistical techniques to give computer systems the ability to “learn” with data, without being explicitly programmed. It's all…",https://medium.com/@nimishasingh.1987/machine-learning-theory-6a698a9c6670?source=topics_v2---------73-84--------------------3266e02a_eed0_4ebc_9dc1_beefba460df3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*z-dihne1wWBOIC84,machine-learning 1520,1224,"Dataiku — Everyday AI, Extraordinary people",Introduction I have always been very interested in tools that automate data science workflows and make it easier for businesses to gain insights from their data. …,https://medium.com/@harinisu/dataiku-everyday-ai-extraordinary-people-89745c4d3e60?source=topics_v2---------74-84--------------------3266e02a_eed0_4ebc_9dc1_beefba460df3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LTKgnbeg7a6tX9Ml2ilF5w.png,machine-learning 1521,1225,Building an AI to Recognize my Handwriting — Part I,"The Theoretical (and Practical) Starting Point — Roughly ten years ago, inspired by Tim Ferriss and other authors in the self-help genre, I started writing (by hand) regularly in notebooks (the physical kind). I must have filled 10–15 books by now. Wouldn’t it be great to have them digitalized? This article series follows me on my quest…",https://medium.com/@jonas-schroeder/building-an-ai-to-recognize-my-handwriting-part-i-7bef0d3cdc46?source=topics_v2---------75-84--------------------3266e02a_eed0_4ebc_9dc1_beefba460df3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yBHhQO1CsxldPHSXE_rWrA.jpeg,machine-learning 1522,1219,Master Computer Vision and Boost Your Portfolio with These 10 End-to-End Projects,"Computer Vision is one of the fastest-growing fields in the tech industry today. With the ability to interpret and analyze visual data, Computer Vision has opened up a wide range of possibilities, from facial recognition to self-driving cars. If you are interested in developing your skills in this field and…",https://medium.com/geekculture/master-computer-vision-and-boost-your-portfolio-with-these-10-end-to-end-projects-537fcd20db7c?source=topics_v2---------76-84--------------------3266e02a_eed0_4ebc_9dc1_beefba460df3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*VxAfk7Cs7ayFI9D3,machine-learning 1523,1226,Translate Text From Any Language to Any Language with Hugging Face Transformers and Google Colab,"A step-by-step guide to using pre-trained MarianMTModel for multilingual translation Introduction: In this tutorial, we’ll walk through the process of using a pre-trained translation model from the Hugging Face library in Google Colab. We’ll use the MarianMTModel, a state-of-the-art multilingual translation model that supports many languages. By the end of this…",https://medium.com/@ernestodotnet/translate-text-from-any-language-to-any-language-with-hugging-face-transformers-and-google-colab-272876150a93?source=topics_v2---------78-84--------------------3266e02a_eed0_4ebc_9dc1_beefba460df3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*N7Ao8Uiqr4zHlRbO.png,machine-learning 1524,1227,Prompt Engineering 101: Characteristics,"Analyze prompt characteristics — As AI language models like ChatGPT become increasingly popular, understanding the art of crafting effective prompts is more critical than ever. Whether using AI for content creation, engaging conversation, or problem-solving, knowing how to analyze prompt characteristics is essential to getting the most out of your interaction. Let’s explore the…",https://medium.com/@subedi/prompt-engineering-101-characteristics-363e83db70d6?source=topics_v2---------79-84--------------------3266e02a_eed0_4ebc_9dc1_beefba460df3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*bbYJPVsVdacFvrmz,machine-learning 1525,1228,Explaining Trees with FastTreeShap and What if tool (Part-2),"Read part-1 here! To explain machine learning models, there are many methods. The frequently used ones are GradCam, SHAP, Lime, Integrated Gradients, etc. In this article, we will only focus on SHAP. SHAP values (SHapley Additive exPlanations) is a method based on cooperative game theory and is used to increase the…",https://medium.com/@furcifer/explaining-trees-with-fasttreeshap-and-what-if-tool-part-2-6ec140d45967?source=topics_v2---------80-84--------------------3266e02a_eed0_4ebc_9dc1_beefba460df3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Guk9gcQ15clGvwWJ6EyWrg.png,machine-learning 1526,1229,“From Experimentation to Production: How MLflow Can Help You to Deploy Your AI ML Models with Confidence”,"Introduction to MLflow Welcome to another article, lets go through how MLFLOW can help to deploy model to production. Machine learning (ML) development can be a complex and time-consuming process, involving multiple experiments with different algorithms, hyperparameters, and data sets. Keeping track of all these experiments, reproducing them, and sharing the results with…",https://medium.com/@gururajhm/from-experimentation-to-production-how-mlflow-can-help-you-to-deploy-your-models-with-confidence-72342dffd8ca?source=topics_v2---------81-84--------------------3266e02a_eed0_4ebc_9dc1_beefba460df3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*0lU5R_i0NswgO5Kc.png,machine-learning 1527,1230,OOP in Python,"OOP in Python Object-oriented programming (OOP) is a programming paradigm that is widely used in modern software development. It helps in building complex and robust applications by breaking down the code into reusable and modular objects. Python is a high-level, interpreted programming language that supports OOP. Python provides a wide…",https://medium.com/@m.wasim2020/oop-in-python-715ee45020cf?source=topics_v2---------84-84--------------------91110798_2583_435d_be1f_0a3edd43b2ba-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1528,1231,Enhancing Machine Learning Model Development with Pycaret: A Comparison Study,"Learning Data Science with Rakamin Bootcamp: My Experience and Final Project As someone who’s always excited to work with technology, I was thrilled to join the Rakamin Academy’s Data Science Bootcamp to deepen my knowledge and skills in the field. …",https://medium.com/@innocentiahan/enhancing-machine-learning-model-development-with-pycaret-a-comparison-study-dc5f5f397948?source=topics_v2---------85-84--------------------91110798_2583_435d_be1f_0a3edd43b2ba-------17,https://miro.medium.com/v2/resize:fill:140:140/1*s-lAWKrqGACVzoL_IBiCvg.png,machine-learning 1529,1232,Want to Use Chat-GPT4 for free in Mobile or Desktop?,If you haven’t heard for Chat GPT atleast once then you must be an alien landed recently on this planet! Because Chat GPT is not only popular but also scary since it is too powerful that it even allowed monopolic Tech Gaints to see the seeds in the ground. Chat…,https://medium.com/@renukakumar9030/want-to-use-chat-gpt4-for-free-in-mobile-or-desktop-4ef4030a33bb?source=topics_v2---------86-84--------------------91110798_2583_435d_be1f_0a3edd43b2ba-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1530,1233,"To Do Great Work You Need A Compass, Not A Map","ZeeQuest Navigator Maps are safe, but...they don't lead to something new When using these predefined maps for too long we tend to forget that they were made for us by someone else. It’s easy to not realize that and live our lives on auto-pilot. It's safe. It's secure. They supposed to…",https://medium.com/@zeequest/to-do-great-work-you-need-a-compass-not-a-map-96b4394f992b?source=topics_v2---------87-84--------------------91110798_2583_435d_be1f_0a3edd43b2ba-------17,https://miro.medium.com/v2/resize:fill:140:140/1*cgZj64ZJ3JwfWeX0BkCNFQ.png,machine-learning 1531,635,Significance of Adversarial Robustness part5(Machine Learning),"It Is All About Data: A Survey on the Effects of Data on Adversarial Robustness(arXiv) Author : Peiyu Xiong, Michael Tegegn, Jaskeerat Singh Sarin, Shubhraneel Pal, Julia Rubin Abstract : Adversarial examples are inputs to machine learning models that an attacker has intentionally designed to confuse the model into making…",https://medium.com/@monocosmo77/significance-of-adversarial-robustness-part5-machine-learning-d741b6b4711a?source=topics_v2---------88-84--------------------91110798_2583_435d_be1f_0a3edd43b2ba-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1532,635,Significance of Adversarial Robustness part4(Machine Learning),"Adversarial Robustness of Learning-based Static Malware Classifiers(arXiv) Author : Shoumik Saha, Wenxiao Wang, Yigitcan Kaya, Soheil Feizi Abstract : Malware detection has long been a stage for an ongoing arms race between malware authors and anti-virus systems. Solutions that utilize machine learning (ML) gain traction as the scale of this…",https://medium.com/@monocosmo77/significance-of-adversarial-robustness-part4-machine-learning-7faabf4880bd?source=topics_v2---------89-84--------------------91110798_2583_435d_be1f_0a3edd43b2ba-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1533,635,Significance of Decision Boundaries in Machine Learning scenarios part1,"Basics of Decision Boundaries Decision Boundary in Machine Learning | Aman Kharwal The general goal of a classification model is to find a decision boundary. The purpose of the decision boundaries is to…thecleverprogrammer.com Boosting Adversarial Attacks by Leveraging Decision Boundary Information(arXiv) Author : Boheng Zeng, LianLi Gao, QiLong Zhang, ChaoQun Li, JingKuan Song, ShuaiQi Jing Abstract : Due to the gap between a substitute model and a victim model, the gradient-based noise generated from a substitute model may have low transferability for a…",https://medium.com/@monocosmo77/significance-of-decision-boundaries-in-machine-learning-scenarios-part1-421d51d36127?source=topics_v2---------90-84--------------------91110798_2583_435d_be1f_0a3edd43b2ba-------17,https://miro.medium.com/v2/resize:fill:140:140/1*8cXJxV_MekR49bGub1xYOg.jpeg,machine-learning 1534,635,Working with Distributed Matrix Multiplication part2(Machine Learning),"Root of Unity for Secure Distributed Matrix Multiplication: Grid Partition Case (arXiv) Author : Roberto Assis Machado, Felice Manganiello Abstract : We consider the problem of secure distributed matrix multiplication (SDMM), where a user has two matrices and wishes to compute their product with the help of N honest but…",https://medium.com/@monocosmo77/working-with-distributed-matrix-multiplication-part2-machine-learning-dd824da82415?source=topics_v2---------91-84--------------------91110798_2583_435d_be1f_0a3edd43b2ba-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1535,1234,My Pre-Final year,"Hello readers !!.. it’s been a while since me catching up again with my blogs due to college load 📚📝, and also having my final semester exams in a couple of weeks 🙂. I have been observing the trends in ML and wanted to share the journey that I have…",https://medium.com/@pavansaish/my-pre-final-year-29c9b1212fb1?source=topics_v2---------92-84--------------------cb949099_72a8_43e3_901e_f0cebb7a7612-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1536,635,Working with Distributed Matrix Multiplication part1(Machine Learning),"HerA Scheme: Secure Distributed Matrix Multiplication via Hermitian Codes(arXiv) Author : Roberto A. Machado, Welington Santos, Gretchen L. Matthews Abstract : We consider the problem of secure distributed matrix multiplication (SDMM), where a user has two matrices and wishes to compute their product with the help of N honest but…",https://medium.com/@monocosmo77/working-with-distributed-matrix-multiplication-part1-machine-learning-5f2fe58ed640?source=topics_v2---------93-84--------------------cb949099_72a8_43e3_901e_f0cebb7a7612-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1537,635,Significance of Adversarial Robustness part3(Machine Learning),"Adversarial Robustness and Feature Impact Analysis for Driver Drowsiness Detection(arXiv) Author : João Vitorino, Lourenço Rodrigues, Eva Maia, Isabel Praça, André Lourenço Abstract : Drowsy driving is a major cause of road accidents, but drivers are dismissive of the impact that fatigue can have on their reaction times. To detect…",https://medium.com/@monocosmo77/significance-of-adversarial-robustness-part3-machine-learning-da0d7f1bc883?source=topics_v2---------94-84--------------------cb949099_72a8_43e3_901e_f0cebb7a7612-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1538,635,Significance of Adversarial Robustness part1(Machine Learning),"Beyond Empirical Risk Minimization: Local Structure Preserving Regularization for Improving Adversarial Robustness(arXiv) Author : Wei Wei, Jiahuan Zhou, Ying Wu Abstract : : It is broadly known that deep neural networks are susceptible to being fooled by adversarial examples with perturbations imperceptible by humans. Various defenses have been proposed to…",https://medium.com/@monocosmo77/significance-of-adversarial-robustness-part1-machine-learning-27cbf6bdeb1e?source=topics_v2---------95-84--------------------cb949099_72a8_43e3_901e_f0cebb7a7612-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1539,1235,Building an SMS/Email Spam Classification Model with Python,"Introduction Spam emails and SMS messages are an unfortunate reality of modern life. Not only are they annoying, but they can also be dangerous if they contain malicious links or attachments. Fortunately, machine learning algorithms can help us identify and filter out these unwanted messages. …",https://medium.com/@das.sounak2001/building-an-sms-email-spam-classification-model-with-python-fa501e22d8fa?source=topics_v2---------96-84--------------------cb949099_72a8_43e3_901e_f0cebb7a7612-------17,https://miro.medium.com/v2/resize:fill:140:140/1*WA9aceQugVlBS81r2a7Snw.png,machine-learning 1540,1236,The Four Steps to Innovation and True Creativity,"The psychology of invention: AI will never be able to replicate this — For creativity being the bread and butter of a researcher I deem it worthwhile, for us, to learn more about the creative process. This is the same process I used when doing research towards my PhD. Therefore, I want to introduce you to the four essential steps in this process…",https://medium.com/@dr.musch/the-four-steps-to-innovation-and-true-creativity-5b9b61b45376?source=topics_v2---------97-84--------------------cb949099_72a8_43e3_901e_f0cebb7a7612-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ZnC9ayloCVRdQMn3,machine-learning 1541,1237,Do Data Science in Minutes With This ChatGPT Plugin,"ChatGPT’s plugin makes data science an easy, enjoyable experience — I saved maybe 4–5 hours if I had manually done it. Okay, so here’s the scoop: I’ve been curious about economic trends in for a while now, especially inflation. You know, the whole deal with prices going up and stuff. But I had this problem, I needed a way to…",https://medium.com/mlearning-ai/do-data-science-in-minutes-with-this-chatgpt-plugin-afb580980351?source=topics_v2---------98-84--------------------cb949099_72a8_43e3_901e_f0cebb7a7612-------17,https://miro.medium.com/v2/resize:fill:140:140/1*I06SiopuvB4SmYur0g2u5Q.png,machine-learning 1542,1238,Nearest Neighbors Regressors — A Visual Guide,"Visual Understanding of the Models and the Impacts of Hyperparameters — K Nearest Neighbors or KNN is one of the most simple models in machine learning. In fact, to some extent, there is no model, because, for the prediction of a new observation, it will use the entirety of the training dataset to find the “nearest neighbors” according to a distance…",https://medium.com/towards-data-science/nearest-neighbors-regressors-a-visual-guide-78595b78072e?source=topics_v2---------99-84--------------------cb949099_72a8_43e3_901e_f0cebb7a7612-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Nh9x-FYZZoiRnYKV,machine-learning 1543,1239,Generative AI Timelines from GRU to ChatGPT,"Understand different types of models in deep learning and data science — Generative AI has seen some remarkable developments in recent years. As researchers have explored the capabilities of machine learning models, new techniques and architectures have emerged that have the potential to revolutionize the way we create and interact with media. Researchers and developers have been creating a range of models…",https://medium.com/towards-artificial-intelligence/generative-ai-timelines-from-gru-to-chatgpt-4de2dce7a4e5?source=topics_v2---------100-84--------------------cb949099_72a8_43e3_901e_f0cebb7a7612-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BAuc-9NfTm1EaODQM--NLQ.png,machine-learning 1544,1240,Part 4. Handling Large Datasets with Polars and Spark: Creating a 100 million Row Fake Dataset in Just 2 Minutes,"Polars and Pyspak: A Powerful Combination for Efficient Data Processing and Manipulation — In this article, we explore the use of Python Polars and Apache Spark to handle and combine large datasets. While the exercise below is almost just for ‘fun’, it has practical applications for data analysts and engineers who frequently work with large datasets. If you haven’t already, check out my…",https://medium.com/@danny.bharat/polars-and-spark-100-million-row-dataset-18fd29f46d2c?source=topics_v2---------102-84--------------------635baf74_645e_469a_a586_a6e7a1f26197-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PCiAgm8hrHLIuO9bitVe7g.png,machine-learning 1545,1241,Machine Learning and its Application,What is Machine Learning? Arthur Samuel coined the term Machine Learning in 1959. He defined it as “The field of study that gives computers the capability to learn without being explicitly programmed”. Machine learning can also be defined as an application of artificial intelligence that uses statistical techniques to enable computers to learn and…,https://medium.com/@umarsmuhammed/machine-learning-and-its-application-93b9c5bb5c4c?source=topics_v2---------103-84--------------------635baf74_645e_469a_a586_a6e7a1f26197-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gCqUPnhxyU7ybW3CZuYkRg.jpeg,machine-learning 1546,635,New Developments in Human-Computer Interaction part2,"Understanding the Usability of AI Programming Assistants(arXiv) Author : Jenny T. Liang, Chenyang Yang, Brad A. Myers Abstract : The software engineering community recently has witnessed widespread deployment of AI programming assistants, such as GitHub Copilot. However, in practice, developers do not accept AI programming assistants’ initial suggestions at a…",https://medium.com/@monocosmo77/new-developments-in-human-computer-interaction-part2-8b026287811c?source=topics_v2---------104-84--------------------635baf74_645e_469a_a586_a6e7a1f26197-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1547,1242,DeepMind,"DeepMind is a British artificial intelligence (AI) company founded in 2010 by Demis Hassabis, Mustafa Suleyman, and Shane Legg. It was acquired by Google (now Alphabet Inc.) in 2015, and has since been working on cutting-edge research in AI and machine learning. — DeepMind DeepMind is a British artificial intelligence (AI) company founded in 2010 by Demis Hassabis, Mustafa Suleyman, and Shane Legg. It was acquired by Google (now Alphabet Inc.) in 2015, and has since been working on cutting-edge research in AI and machine learning.",https://medium.com/@venali/deepmind-ac00e0569eec?source=topics_v2---------106-84--------------------635baf74_645e_469a_a586_a6e7a1f26197-------17,https://miro.medium.com/v2/resize:fill:140:140/0*VlfgLd8KIvmSlcR1,machine-learning 1548,635,Working with Hyperspheres in Machine Learning part2,"Reflection by two level system: phase singularities on the Poincaré hypersphere(arXiv) Author : : Ben Lang, Edmund Harbord, Ruth Oulton Abstract : We consider the reflection of a photon by a two-level system in a quasi-one-dimensional waveguide. This is important in part because it forms the backdrop for more complicated…",https://medium.com/@monocosmo77/working-with-hyperspheres-in-machine-learning-part2-cf983ccb5ff8?source=topics_v2---------108-84--------------------635baf74_645e_469a_a586_a6e7a1f26197-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7ba_plKmxktM0UI2gsWYFQ.jpeg,machine-learning 1549,635,Working with Hyperspheres in Machine Learning part1.,"Deep Graph-Level Orthogonal Hypersphere Compression for Anomaly Detection(arXiv) Author : Yunhe Zhang, Yan Sun, Jinyu Cai, Jicong Fan Abstract : Graph-level anomaly detection aims to identify anomalous graphs from a collection of graphs in an unsupervised manner. A common assumption of anomaly detection is that a reasonable decision boundary has…",https://medium.com/@monocosmo77/working-with-hyperspheres-in-machine-learning-part1-721bacb7be94?source=topics_v2---------109-84--------------------635baf74_645e_469a_a586_a6e7a1f26197-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yU2lZk_kWCMsM1joau8ZDw.jpeg,machine-learning 1550,1243,Mastering Feature Selection: Elevate your Machine Learning Game,"What is feature selection, and why do it? Building an accurate and efficient machine learning model is no small feat, and we can take many approaches to improve our models' accuracy and efficiency. Selecting the most relevant and informative features from your dataset is one such way. Much like a chef will select the right ingredients for the…",https://medium.com/@h.jurza/mastering-feature-selection-elevate-your-machine-learning-game-a70a52b6f243?source=topics_v2---------110-84--------------------635baf74_645e_469a_a586_a6e7a1f26197-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ZeOOtIj8CwCueNEwUZ55YQ.png,machine-learning 1551,1244,Machine Learning — Nearest Neighbors Algorithm Part 2,"In the previous article, we discussed the KNN algorithm in machine learning. In this article, we will provide an implementation of the KNN algorithm. If you haven’t read the previous article, we recommend checking it some time :). OK, let’s begin with an initial dataset: Example Dataset: Let’s consider an example dataset…",https://medium.com/thetechjoint/machine-learning-k-nearest-neighbors-algorithm-part-2-186ac8995808?source=topics_v2---------111-84--------------------635baf74_645e_469a_a586_a6e7a1f26197-------17,https://miro.medium.com/v2/resize:fill:140:140/1*WcHLg6vYRIExtZng2SDaUw.png,machine-learning 1552,890,"It’s 2023, stop leaking secrets in google colab! Part 1",Google Colab (short for Collaboratory) is a cloud-based platform that allows users to write and run Python code using Jupyter Notebook-style notebooks. Colab notebooks are stored in Google Drive and can be shared with others for collaboration. Here are some key features of Google Colab: Free GPU and TPU access…,https://medium.com/@maxwell.langford/its-2023-stop-leaking-secrets-in-google-colab-6eabb7827a86?source=topics_v2---------114-84--------------------3718a12f_2465_4bbb_b704_3037a232fb53-------17,https://miro.medium.com/v2/resize:fill:140:140/0*sNNcVU5jIrrg_Nt-,machine-learning 1553,1245,When Good Intentions Go Wrong: The Downside of ChatGPT,"“More times than you learned valuable information from my earlier stories, I used the words “let’s see” .(See for yourself) It’s not a good method to write because it amounts to imposing my way of learning on other people and not allowing them to develop their own learning style. An…",https://medium.com/@knirantar/when-good-intentions-go-wrong-the-downside-of-chatgpt-42f290963ede?source=topics_v2---------115-84--------------------3718a12f_2465_4bbb_b704_3037a232fb53-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ODvbsouo1S4FOUiW,machine-learning 1554,1246,Transform Your Data into a New Space with Linear Discriminant Analysis!,"Linear Discriminant Analysis (LDA) is a popular technique used in machine learning and statistical modeling for classification and feature extraction problems. It is a powerful tool that can help in identifying patterns in data and classifying observations based on their attributes. In this blog post, we will explore the basics…",https://medium.com/@kr-uttam/transform-your-data-into-a-new-space-with-linear-discriminant-analysis-74d99dcbe841?source=topics_v2---------117-84--------------------3718a12f_2465_4bbb_b704_3037a232fb53-------17,https://miro.medium.com/v2/resize:fill:140:140/1*g34TV48b2Ah1xqPi_dAVUA.png,machine-learning 1555,1247,House Price Prediction using Machine Learning,"Welcome and congratulations! You have started machine learning implementation on real datasets. Just like the “print (Hello world)” program, the House price prediction project could be the first project of every machine learning enthusiast. #Introduction In this project, we are going to predict the sale price of a house according to…",https://medium.com/@devaminza/house-price-prediction-using-machine-learning-e97a9f518822?source=topics_v2---------118-84--------------------3718a12f_2465_4bbb_b704_3037a232fb53-------17,https://miro.medium.com/v2/resize:fill:140:140/1*J6eNiNZd-hhR6pvQf1LC_g.png,machine-learning 1556,1248,ML Algorithms and when to use them,"Behind chatbots such as ChatGPT and Bard, there lies machine learning, a branch of computer science that allows humans to predict outcomes using data and algorithms. Like all humans, it gradually learns, and as such improves the accuracy of its results. However, each situation requires a specific solution, and each…",https://medium.com/@eashan2603/ml-algorithms-and-when-to-use-them-c478b386f34?source=topics_v2---------119-84--------------------3718a12f_2465_4bbb_b704_3037a232fb53-------17,https://miro.medium.com/v2/resize:fill:140:140/0*4n-tNSN7Dzy-0Y8y,machine-learning 1557,1249,PySpark vs Pandas: Which One to Choose for Data Analysis?,"Data analysis is an essential part of any data-driven project. Python is a popular language used for data analysis, and two widely used tools for data processing and analysis are PySpark and Pandas. …",https://medium.com/@cihan.evren/pyspark-vs-pandas-which-one-to-choose-for-data-analysis-e9698d9fd8d7?source=topics_v2---------121-84--------------------3718a12f_2465_4bbb_b704_3037a232fb53-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Xn6roJ-D9l_lOkp0-Ny5BA.jpeg,machine-learning 1558,1250,Leverage LLMs Like GPT to Analyze Your Documents or Transcripts,"Use prompt engineering to analyze your documents with langchain and openai in a ChatGPT-like way — ChatGPT is definitely one of the most popular Large Language Models (LLMs). Since the release of its beta version at the end of 2022, everyone can use the convenient chat function to ask questions or interact with the language model. But what if we would like to ask ChatGPT questions…",https://medium.com/towards-data-science/leverage-llms-like-gpt-to-analyze-your-documents-or-transcripts-c640a266ad52?source=topics_v2---------123-84--------------------0503f635_175b_4b3b_a8f5_16573e5de6a3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*lDb8uQ8AM7sTcqChYovFRA.png,machine-learning 1559,1251,Awesome chatGPT prompts — Part 17,"Welcome to Part-17 of our ‘Awesome ChatGPT Prompts’ series! in this part, we will explore 10 more diverse roles, showcasing ChatGPT’s fantastic adaptability. We’ll see chatGPT acting as your friend, a Python interpreter, a story-weaver, and even an intergalactic ambassador. But first, here’s the tl;dr or ToC— 1. Act as…",https://medium.com/@smraiyyan/awesome-chatgpt-prompts-part-17-7db4e2f73281?source=topics_v2---------124-84--------------------0503f635_175b_4b3b_a8f5_16573e5de6a3-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*IVMqclqZGp3UzDtqWs8f1A.gif,machine-learning 1560,40,Robot School: How Machines Learn New Things Using Reinforcement Learning,"Have you ever heard of a robot? It’s a cool machine that can do all sorts of things! But did you know that robots can learn new things too? In this post, we’ll talk about a special way that robots can learn called Reinforcement Learning. What is Reinforcement Learning? Reinforcement…",https://medium.com/@pelinokutan/robot-school-how-machines-learn-new-things-using-reinforcement-learning-a5a50fc21c89?source=topics_v2---------125-84--------------------0503f635_175b_4b3b_a8f5_16573e5de6a3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*K58a9DvzX7Wp3AEQ,machine-learning 1561,611,Breaking the Tower of Babel: The Universal Language Translator Revolutionizes Global Communication,"Bridging the Linguistic Divide with Next-Generation AI Technology — In a world where technology has rendered geographical boundaries virtually irrelevant, language barriers have remained an enduring challenge, stymieing the true potential of global collaboration and understanding. …",https://medium.com/be-open/breaking-the-tower-of-babel-the-universal-language-translator-revolutionizes-global-communication-6d04021f220c?source=topics_v2---------126-84--------------------0503f635_175b_4b3b_a8f5_16573e5de6a3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yPo73WGGHH3L5lBZJx3bsQ.jpeg,machine-learning 1562,1252,Getting Insights from Comments in Customer Churn Surveys Using Machine Learning,"How using the Hugging Face Transformer library makes the complex task of classifying text a breeze — Machine Learning is changing the game for how we gather and obtain insights from our customer data at scale. In particular the emergence of Pre-trained transformer models have revolutionised the field of natural language processing (NLP), enabling general models trained on massive datasets to be fine-tuned or prompted to achieve…",https://medium.com/@dean-povey/getting-insights-from-comments-in-customer-churn-surveys-using-machine-learning-dd9a20de585f?source=topics_v2---------127-84--------------------0503f635_175b_4b3b_a8f5_16573e5de6a3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*vF5PZSRzAKhof12_,machine-learning 1563,1253,Maturity Levels for Data Science Capability,"Data science is a tricky profession as it requires overlapping skills varying between data engineering, analytics, AI/ML, research, development and DevOps. This makes creating new data science teams is challenging for leaders to find experienced scientists who cover the whole spectrum (we call them unicorns or superheroes). …",https://medium.com/@hany-hossny/maturity-levels-for-data-science-capability-99773c5015df?source=topics_v2---------128-84--------------------0503f635_175b_4b3b_a8f5_16573e5de6a3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*tJAVIjAxCZGbHvBJ.png,machine-learning 1564,635,Understanding Quantum Processes part1(Quantum Machine Learning),"Cross-Platform Comparison of Arbitrary Quantum Processes(arXiv) Author : Congcong Zheng, Xutao Yu, Kun Wang Abstract : In this work, we present a protocol for comparing the performance of arbitrary quantum processes executed on spatially or temporally disparate quantum platforms using Local Operations and Classical Communication (LOCC). The protocol involves sampling…",https://medium.com/@monocosmo77/understanding-quantum-processes-part1-quantum-machine-learning-2433ffcef1ac?source=topics_v2---------130-84--------------------0503f635_175b_4b3b_a8f5_16573e5de6a3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1565,1254,Timmy’s Hilarious Journey into the Wacky World of Machine Learning Algorithms,"One day, Timmy and his brother were lounging around, bored out of their minds. To liven things up, they decided to dive into the uproarious and unpredictable realm of machine learning algorithms. Timmy: Hey big bro, I heard machine learning algorithms are a real barrel of laughs! …",https://medium.com/@issackondreddy/timmys-hilarious-journey-into-the-wacky-world-of-machine-learning-algorithms-df7e9c96ee5e?source=topics_v2---------131-84--------------------0503f635_175b_4b3b_a8f5_16573e5de6a3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5E4FbAsK3QMn-Pj0ge7m6w.png,machine-learning 1566,1255,"Week 1: Meet Dagny, the Fearless Explorer","Remember when we were giants of industry in America and show me a path towards a more sustainable and inclusive future. Week 1: Meet Dagny, the Fearless Explorer",https://medium.com/@jacobthomas_60827/week-1-meet-dagny-the-fearless-explorer-204fe3816193?source=topics_v2---------132-84--------------------96ebbb88_94a0_4859_b5cd_b941bec5e8ac-------17,https://miro.medium.com/v2/resize:fill:140:140/1*bQG8GzOJ-lkcyt3DGjMTfw@2x.jpeg,machine-learning 1567,1256,Top 10 VS Code Extensions for Data Science,"Enhance Your Productivity with These Must-Have Tools! — As the field of data science continues to grow and becomes more and more integral to modern industries, the need for tools facilitating data analysis has grown accordingly. One tool that has gained popularity among data scientists is VS Code, an integrated development environment (IDE) with a wide range of…",https://medium.com/geekculture/top-10-vs-code-extensions-for-data-science-ce3e24e24347?source=topics_v2---------133-84--------------------96ebbb88_94a0_4859_b5cd_b941bec5e8ac-------17,https://miro.medium.com/v2/resize:fill:140:140/1*dVbTuWegzaSwbFKkB5MJRQ.jpeg,machine-learning 1568,1257,Multivariate Time Series Forecasting Using Vector AutoRegressive Model in Python,"Introduction : The Vector AutoRegressive (VAR) model is a popular statistical model used to analyze multivariate time series data. The VAR model is a flexible and powerful tool for modeling the dynamic relationships among multiple variables, and it has been used extensively in macroeconomic and financial research to analyze the interactions among…",https://medium.com/@wpinjari96/multivariate-time-series-forecasting-using-vector-autoregressive-model-in-python-348568c0a488?source=topics_v2---------134-84--------------------96ebbb88_94a0_4859_b5cd_b941bec5e8ac-------17,https://miro.medium.com/v2/resize:fill:140:140/1*q3Lk2xBQEEpceeuNtN66AQ.png,machine-learning 1569,1242,Resume Screening using Machine Learning,"Resume matching Resume matching is the process of comparing a job candidate’s resume to the job requirements and identifying the extent to which the candidate’s skills, qualifications, and experience match the job description. …",https://medium.com/@venali/resume-screening-using-machine-learning-50ce9e85b2a8?source=topics_v2---------135-84--------------------96ebbb88_94a0_4859_b5cd_b941bec5e8ac-------17,https://miro.medium.com/v2/resize:fill:140:140/0*AsJ6PBYYQGBQRVzM,machine-learning 1570,1258,How to Share and Load PyTorch Models Through Torch Hub?,"Making Models Easily Accessible — To bridge research and production, we want a way to easily publish and access models. PyTorch provides these functionalities through Torch Hub. It also follows the “Don’t Repeat Yourself” (DRY) principle of programming. I sometimes find myself spending much time implementing someone else’s model given their codebase and trying to…",https://medium.com/@lbleal1/how-to-share-and-load-pytorch-models-through-torch-hub-c386e759bd0b?source=topics_v2---------136-84--------------------96ebbb88_94a0_4859_b5cd_b941bec5e8ac-------17,https://miro.medium.com/v2/resize:fill:140:140/1*r3LkGnsMIj-1xCAzuo2zsg.png,machine-learning 1571,1259,Most effective way of Machine Learning,"One of the maximum first rate thoughts for Machine Learning is growing a Self-Improving, Cross-Domain AI (SICDAI) that could research from a couple of domains, adapt rapidly, and enhance its very own overall performance over time. …",https://medium.com/illumination/most-effective-way-of-machine-learning-d8372697713b?source=topics_v2---------137-84--------------------96ebbb88_94a0_4859_b5cd_b941bec5e8ac-------17,https://miro.medium.com/v2/resize:fill:140:140/0*LqDB_K6TpIsn9C7Z,machine-learning 1572,1260,Create GPT from scratch using Python — Part 1,"If you’re interested in developing a large language model like ChatGPT or learning how to create your own GPT model on your local machine with no prior knowledge, then this blog is the perfect resource for you. Video guide: https://www.youtube.com/watch?v=kCc8FmEb1nY Code in this blog: https://colab.research.google.com/drive/1JMLa53HDuA-i7ZBmqV7ZnA3c_fvtXnx-?usp=sharing Andrej Karpathy did a great…",https://medium.com/@fareedkhandev/create-gpt-from-scratch-using-python-part-1-bd89ccf6206a?source=topics_v2---------138-84--------------------96ebbb88_94a0_4859_b5cd_b941bec5e8ac-------17,https://miro.medium.com/v2/resize:fill:140:140/0*b7StHMi5aPXXJC0b,machine-learning 1573,1261,Exciting Developments with GPT-4: Language and Visual Model Innovations are Complementing Each Other,"“In the next five years, computer programs that can think will read legal documents and give medical advice. In the next decade, they will do assembly line work and maybe even become companions (the physical embodiment of language models).” Sam Altman",https://medium.com/@sebastyanpapp/exciting-developments-with-gpt-4-35d032a376d6?source=topics_v2---------139-84--------------------96ebbb88_94a0_4859_b5cd_b941bec5e8ac-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qqhFtbjAVINectlfGS0eKw.png,machine-learning 1574,1262,Python Shortcuts in Machine Learning,"Machine learning is a rapidly growing field that is revolutionizing various industries, from healthcare to finance to retail. Python is one of the most widely used programming languages for machine learning due to its simplicity, flexibility, and extensive library support. …",https://medium.com/@arnabsom/python-shortcuts-in-machine-learning-41ea42bbdcfe?source=topics_v2---------140-84--------------------96ebbb88_94a0_4859_b5cd_b941bec5e8ac-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1575,1263,Machine Learning Models-Linear Regression,"If you are a beginner in Data Science or machine learning then this is the most common model that you will encounter as a beginner. Linear Regression is the oldest, simple and widely used supervised machine learning algorithm for predictive analysis. What is Linear Regression? Linear Regression was developed in the field of statistics…",https://medium.com/@pa2425/machine-learning-models-linear-regression-a0ac1652ed9f?source=topics_v2---------141-84--------------------96ebbb88_94a0_4859_b5cd_b941bec5e8ac-------17,https://miro.medium.com/v2/resize:fill:140:140/0*wfeVvUV0yt0u6Oe7.png,machine-learning 1576,1183,Demystifying Generative AI: A Series,"Generative AI Series — Welcome to our series on Generative AI, a fascinating and rapidly evolving field that holds immense potential for transforming industries, content creation, and our daily lives. This series aims to provide a comprehensive understanding of Generative AI, its applications, and the ethical considerations surrounding its use. …",https://medium.com/@MaxLaurieHutchinson/demystifying-generative-ai-a-series-bc0aeb4c5275?source=topics_v2---------142-84--------------------602693a9_0ef5_48ee_b1b0_2a258175e7e3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*cgFLf_7eF5QP4F2r,machine-learning 1577,1264,Machine Learning 101: An Introduction,"Machine learning is one of the most intriguing and promising areas of computer science right now. It has transformed the way we approach data analysis, allowing us to make better decisions, automate processes, and even develop new products and services. …",https://medium.com/@pratham-saraf/machine-learning-101-an-introduction-1f1847af4e06?source=topics_v2---------143-84--------------------602693a9_0ef5_48ee_b1b0_2a258175e7e3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*69Al-gJuC2PySe8IxJxJkQ.png,machine-learning 1578,635,Working with Hyperspheres in Machine Learning part3,"Sobolev Spaces, Kernels and Discrepancies over Hyperspheres(arXiv) Author : Simon Hubbert, Emilio Porcu, Chris. J. Oates, Mark Girolami Abstract : This work provides theoretical foundations for kernel methods in the hyperspherical context. Specifically, we characterise the native spaces (reproducing kernel Hilbert spaces) and the Sobolev spaces associated with kernels defined…",https://medium.com/@monocosmo77/working-with-hyperspheres-in-machine-learning-part3-c8a952e1ed16?source=topics_v2---------144-84--------------------602693a9_0ef5_48ee_b1b0_2a258175e7e3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Uu6AGM6IonlLT2ewz_nfig.jpeg,machine-learning 1579,1265,Let’s code from scratch: KNN,"This is a supplement of the “Let’s clearly explain” series, where I demonstrate how to code the mentioned models in python, from scratch. If you are not familiar with KNN, read my story about the topic: Let’s clearly explain: KNN In this series I’m about to explain the most common Machine Learning algorithms, starting from the basics, leading to…medium.com Data: First we need to get our data. Though I’m not using any advanced libraries…",https://medium.com/@tamas.morucz/lets-code-from-scratch-knn-82a150992321?source=topics_v2---------145-84--------------------602693a9_0ef5_48ee_b1b0_2a258175e7e3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*iJLz0Mlcxf_uZtCGDjPpUQ.png,machine-learning 1580,1266,ML / Supervised Learning / Classification / Decision Tree,"Machine Learning and Data Analysis with Python[22] Let’s sample again based on the variables of height, weight, and gender. Imagine that we create a scatter plot on the X and Y axes for weight and height, with gender as a variable. Just like in decision tree regression, the structure makes…",https://medium.com/@iktuerensemih/ml-supervised-learning-classification-desicion-tree-ad8c9274292c?source=topics_v2---------146-84--------------------602693a9_0ef5_48ee_b1b0_2a258175e7e3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*RrS19oW0TqS_MuKhKKDqAA.png,machine-learning 1581,1267,K-Nearest Neighbors from scratch,"It’s easier than you think — Hello readers! As a graduate student in business analytics, I’ve been busy with coursework, research, and assignments. However, after a brief hiatus, I’m glad to be back to writing about analytics and machine learning. Currently, I am taking a course on “Machine Learning”, where my professor taught us about the…",https://medium.com/towards-artificial-intelligence/k-nearest-neighbors-from-scratch-b4ea9b5c1841?source=topics_v2---------147-84--------------------602693a9_0ef5_48ee_b1b0_2a258175e7e3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*TdfUkcBLZkH5KezK,machine-learning 1582,1268,Unlocking New Possibilities with Multi-Task Learning: The Power of Achieving Multiple Objectives in AI,"Machine learning and artificial intelligence have been rapidly advancing in recent years, with new techniques and models constantly being developed to tackle various tasks. One such model is the multi-task learning model, which is capable of achieving multiple objectives at once. Multi-task learning models are trained on multiple related tasks…",https://medium.com/@elgrhydev/unlocking-new-possibilities-with-multi-task-learning-the-power-of-achieving-multiple-objectives-in-646723acdea9?source=topics_v2---------148-84--------------------602693a9_0ef5_48ee_b1b0_2a258175e7e3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1583,1269,Evaluating Information Retrieval Models: A Comprehensive Guide to Performance Metrics,"Reference Chapter: “Evaluating Information Retrieval Models: A Comprehensive Guide to Performance Metrics” Chapter 1: “Keyword Search: The Foundation of Information Retrieval” Chapter 2: “TF-IDF and Vector Space Models: Beyond Keyword Search” Chapter 3: “Latent Semantic Indexing: Uncovering Hidden Relationships” Chapter 4: “Word2Vec and Doc2Vec: Capturing Semantic Relationships with Distributed Representations” Chapter…",https://medium.com/@prateekgaurav/evaluating-information-retrieval-models-a-comprehensive-guide-to-performance-metrics-78aadacb73b4?source=topics_v2---------149-84--------------------602693a9_0ef5_48ee_b1b0_2a258175e7e3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1584,1270,What is Data Quality…and where are your peers succeeding and investing?,"Harvard Business Review on Data | Catching Up With Bill Gates | What Does Data Quality Mean?! So much has happened in the last week, it’s hard to even summarize it. But you know what’s even harder to summarize?! What’s going to happen in the NEXT few weeks! Here are…",https://medium.com/be-data-driven/better-data-better-company-c49991b31fce?source=topics_v2---------151-84--------------------602693a9_0ef5_48ee_b1b0_2a258175e7e3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*5JQsxjvz0X6gCsty,machine-learning 1585,635,How far have we come Face Recognition methods part2(Computer Vision + Machine Learning),"Improvement of Color Image Analysis Using a New Hybrid Face Recognition Algorithm based on Discrete Wavelets and Chebyshev Polynomials(arXiv) Author : Hassan Mohamed Muhi-Aldeen, Maha Ammar Mustafa, Asma A. Abdulrahman, Jabbar Abed Eleiwy, Fouad S. Tahir, Yurii Khlaponin Abstract : This work is unique in the use of discrete wavelets…",https://medium.com/@monocosmo77/how-far-have-we-come-face-recognition-methods-part2-computer-vision-machine-learning-2db54cad3527?source=topics_v2---------152-84--------------------55a05a8f_19c3_4cb6_89f0_d2267ae9a4b5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1586,1271,The Democratization of Technology Use through AI Tools: ChatGPT and Beyond,"Todays tools for tomorrow’s end. The democratization of technology has been a topic of discussion for many years. The idea that technology should be accessible to everyone regardless of socioeconomic status, education level, or technical expertise is powerful. Artificial intelligence (AI) has played a significant role in democratizing technology use…",https://medium.com/@marianods81/the-democratization-of-technology-use-through-ai-tools-chatgpt-and-beyond-5c3fb0328113?source=topics_v2---------153-84--------------------55a05a8f_19c3_4cb6_89f0_d2267ae9a4b5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*zHevV9dXJatYOJ9X,machine-learning 1587,1272,Custom Diffusion / Multi-Concept Customization of Text-to-Image Diffusion,"Lickety Split Review arXiv:2212.04488 Problem: Dreambooth and Textual Inversion struggle dealing with multiple new concepts for fine-tuning Solution: • Train only the Key and Value matrices in cross-attention layers • Add new composition objective for multiple concepts • Choose real images for regularization The first important thing that the authors…",https://medium.com/@nikitiusdetkov/custom-diffusion-multi-concept-customization-of-text-to-image-diffusion-8789bbcee211?source=topics_v2---------154-84--------------------55a05a8f_19c3_4cb6_89f0_d2267ae9a4b5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BtBgHBn65d52kMPQLFCOaQ.png,machine-learning 1588,1273,Building a Python Deep Learning Model,What you need to know? Things to develop understanding of: Linear Algebra and Calculus. Deep learning models are based on linear algebra and calculus. You need to have a good understanding of these topics in order to understand how deep learning models work. Probability and Statistics. Deep learning models are…,https://medium.com/@sanjaysubbarao/building-a-python-deep-learning-model-1d1a2b9910d8?source=topics_v2---------155-84--------------------55a05a8f_19c3_4cb6_89f0_d2267ae9a4b5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4hSXVQLzxwkqoKYf1nOtHg.jpeg,machine-learning 1589,1274,No More OOM-Exceptions During Hyperparameter Searches in TensorFlow,"Use wrapper functions to avoid OOM-exceptions — It’s the year 2023. Machine learning is no longer hype but at the core of everyday products. Ever faster hardware makes it possible to train ever larger machine learning models — in shorter times, too. With around 100 papers submitted per day on machine learning or related domains to arXiv…",https://medium.com/towards-data-science/no-more-oom-exceptions-during-hyperparameter-searches-in-tensorflow-26e6e3069bc9?source=topics_v2---------156-84--------------------55a05a8f_19c3_4cb6_89f0_d2267ae9a4b5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*LMsQZCvQSAcVtJL4,machine-learning 1590,196,How to find the feature importance of a ML project in Python?,"Understanding features is a key point in Machin Learning field. In this article, I am going to introduce a simple way to find the feature importance. Dataset: Portfolio/electricity_prices.csv at main · checkming00/Portfolio Contribute to checkming00/Portfolio development by creating an account on GitHub.github.com Environment: import pandas as pd import numpy as np import matplotlib import matplotlib.pyplot as plt plt.style.use('ggplot') %matplotlib inline matplotlib.rcParams['figure.figsize']=(12,8)",https://medium.com/@benhui.ca/how-to-find-the-feature-importance-of-a-ml-project-in-python-ba821f5ce013?source=topics_v2---------157-84--------------------55a05a8f_19c3_4cb6_89f0_d2267ae9a4b5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*L6DC4lVt1Hzo0tCKhdIG5g.png,machine-learning 1591,635,Understanding Quantum Processes part3(Quantum Machine Learning),"Quantum information processing with superconducting circuits: a perspective(arXiv) Author : G. Wendin Abstract : The last five years have seen a dramatic evolution of platforms for quantum computing, taking the field from physics experiments to quantum hardware and software engineering. Nevertheless, despite this progress of quantum processors, the field is…",https://medium.com/@monocosmo77/understanding-quantum-processes-part3-quantum-machine-learning-6613fcc1aa78?source=topics_v2---------158-84--------------------55a05a8f_19c3_4cb6_89f0_d2267ae9a4b5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1592,635,Understanding Quantum Processes part2(Quantum Machine Learning),"Quantum process tomography of continuous-variable gates using coherent states(arXiv) Author : Mikael Kervinen, Shahnawaz Ahmed, Marina Kudra, Axel Eriksson, Fernando Quijandría, Anton Frisk Kockum, Per Delsing, Simone Gasparinetti Abstract : Encoding quantum information into superpositions of multiple Fock states of a harmonic oscillator can provide protection against errors, but it…",https://medium.com/@monocosmo77/understanding-quantum-processes-part2-quantum-machine-learning-e4148b7cb9d6?source=topics_v2---------159-84--------------------55a05a8f_19c3_4cb6_89f0_d2267ae9a4b5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1593,1275,Simplify your Data Science process,"Do you know CRISP-DM? — CRISP-DM stands for CRoss Industry Standard Process for Data Mining. The model divides a data science/data mining project into individual, clearly defined steps. Each step focuses on a clearly defined task area. The individual steps are also called phases. CRISP-DM contains six process phases that can be run through several…",https://medium.com/geekculture/simplify-your-data-science-process-1dfa1a29bf18?source=topics_v2---------160-84--------------------d92bfb01_f209_4c49_a63c_8ac55e80ff0c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*f9WGftkWrALlshTe4Cp2fg.png,machine-learning 1594,1276,How to Create a Simple Reversal Trading Strategy,"Creating a Trading Strategy Based on Patterns and Moving Averages — This article presents a simple reversal strategy based on a few simple technical tool. The main aim is to present a basic framework from where a more complex strategy is built. For a detailed and thorough collection of trend following trading strategies, you can check out my book. The book…",https://medium.com/@kaabar-sofien/how-to-create-a-simple-reversal-trading-strategy-f4a155131a17?source=topics_v2---------161-84--------------------d92bfb01_f209_4c49_a63c_8ac55e80ff0c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*nD6lusAQi-RA55ep.jpeg,machine-learning 1595,1277,Master Semantic Search at Scale: Index Millions of Documents with Lightning-Fast Inference Times using FAISS and Sentence Transformers,"Dive into an end-to-end demo of a high-performance semantic search engine leveraging GPU acceleration, efficient indexing techniques, and robust sentence encoders on datasets up to 1M documents, achieving 50 ms inference times — Introduction In search and information retrieval, semantic search has emerged as a game-changer. It allows us to search and retrieve documents based on their meaning or concepts rather than just keyword matching. The semantic search leads to more sophisticated and relevant results than traditional keyword-based search methods. However, the challenge lies…",https://medium.com/towards-data-science/master-semantic-search-at-scale-index-millions-of-documents-with-lightning-fast-inference-times-fa395e4efd88?source=topics_v2---------162-84--------------------d92bfb01_f209_4c49_a63c_8ac55e80ff0c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*dTQv-tq0Sn36QBik,machine-learning 1596,1278,From AlphaGo to Self-Driving Cars: Understanding the Basics of Reinforcement Learning,"A Beginner’s Guide to RL! — Are you ready to explore the cutting edge of artificial intelligence? Look no further than the exciting world of Reinforcement Learning! From AlphaGo’s stunning victory over the world champion to Self-Driving Cars navigating through busy city streets, reinforcement learning is transforming the way we think about intelligent systems. So, What Is Reinforcement Learning? Reinforcement Learning…",https://medium.com/data-science-community-srm/from-alphago-to-self-driving-cars-understanding-the-basics-of-reinforcement-learning-4355103b344?source=topics_v2---------163-84--------------------d92bfb01_f209_4c49_a63c_8ac55e80ff0c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*QrhmCxr02pNPeL6B.png,machine-learning 1597,635,Working with Cayley graphs part2(Machine Learning),"Chromatic numbers of Cayley graphs of abelian groups: A matrix method(arXiv) Author : Jonathan Cervantes, Mike Krebs Abstract : : In this paper, we take a modest first step towards a systematic study of chromatic numbers of Cayley graphs on abelian groups. We lose little when we consider these graphs…",https://medium.com/@monocosmo77/working-with-cayley-graphs-part2-machine-learning-24059e92c0e?source=topics_v2---------164-84--------------------d92bfb01_f209_4c49_a63c_8ac55e80ff0c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1598,1279,🤖ML: Friendly Introduction to Logistic Regression,"🔍📈 Logistic regression is a popular statistical method used to predict binary outcomes 🤔💬. With its ability to uncover relationships between variables and outcomes, it’s a valuable tool in various fields such as healthcare, finance, marketing, and social sciences 🏥💰📈🧑‍🎓. In this article, we’ll take a closer look at logistic…",https://medium.com/@gursewaksingh-51905/ml-friendly-introduction-to-logistic-regression-29149404c5ce?source=topics_v2---------165-84--------------------48dd83f6_c977_4a04_b0bf_5b6aeba417b9-------17,https://miro.medium.com/v2/resize:fill:140:140/0*wWMkgFJZ9Khdg0jC,machine-learning 1599,1280,Twitter Releases Recommendation Algorithms to the Public,"Twitter has released the code of the recommendation algorithms to GitHub and explained the decision on their blog. — In a move that has left the social media world buzzing, Twitter, under the leadership of CEO Elon Musk since 2022, decided to throw open the doors to its recommendation and machine learning algorithms in 2023. Picture this: Twitter’s secret sauce, the one that made you wonder, “How did they…",https://medium.com/@alexplesoiu/twitter-releases-recommendation-algorithms-to-the-public-7c41335c6000?source=topics_v2---------166-84--------------------48dd83f6_c977_4a04_b0bf_5b6aeba417b9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QgLigTDabFX6PJ-sJrAhmA.png,machine-learning 1600,635,Significance of Rademacher complexity part2(Machine Learning),"A Moment-Matching Approach to Testable Learning and a New Characterization of Rademacher Complexity(arXiv) Author : Aravind Gollakota, Adam R. Klivans, Pravesh K. Kothari Abstract : A remarkable recent paper by Rubinfeld and Vasilyan (2022) initiated the study of \emph{testable learning}, where the goal is to replace hard-to-verify distributional assumptions (such…",https://medium.com/@monocosmo77/significance-of-rademacher-complexity-part2-machine-learning-e535bf80d558?source=topics_v2---------167-84--------------------48dd83f6_c977_4a04_b0bf_5b6aeba417b9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Xzsk2zKTrdEBagaJs3cCwQ.jpeg,machine-learning 1601,1281,Behind the Millions: Estimating the Scale of Large Language Models,"Discussing LLMs like ChatGPT, the underlying costs, and inference optimization approaches — In the recent past, machine learning was considered a complex, niche technology that only a select few could comprehend. However, as ML applications become more powerful, the public’s interest has surged, leading to a vast amount of content surrounding Artificial Intelligence. …",https://medium.com/towards-data-science/behind-the-millions-estimating-the-scale-of-large-language-models-97bd7287fb6b?source=topics_v2---------168-84--------------------48dd83f6_c977_4a04_b0bf_5b6aeba417b9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Q4h0NMUMPrlEhTY7eB6yww.jpeg,machine-learning 1602,1282,"Machine learning (ML) is a subset of artificial intelligence that involves the development of algorithms and statistical models that enable computer systems to learn from and make predictions or decisions based on data. The goal of machine learning is to develop systems that can improve their performance over time without being explicitly programmed. ML is becoming increasingly important in many fields, including finance, healthcare, and marketing, due to its ability to analyze vast amounts of data quickly and accurately. This essay will explore the different types of machine learning, the techniques used in machine learning, applications of machine learning, and future developments in machine learning.","Types of Machine Learning There are three main types of machine learning: supervised learning, unsupervised learning, and reinforcement learning. Supervised learning involves training a machine learning model on a labeled dataset, where the output or response variable is known. The goal of supervised learning is to predict the output variable…",https://medium.com/@iqrattiq8/machine-learning-ml-is-a-subset-of-artificial-intelligence-that-involves-the-development-of-2cf3f1c25a9c?source=topics_v2---------169-84--------------------48dd83f6_c977_4a04_b0bf_5b6aeba417b9-------17,https://miro.medium.com/v2/resize:fill:140:140/0*EB2wAF00MeKzUs7-,machine-learning 1603,1283,Combining Generative and Discriminative Models in NLP,"Natural Language Processing (NLP) is an ever-evolving field of computer science that focuses on the interaction between humans and computers using natural language. NLP encompasses various tasks, such as text classification, sentiment analysis, machine translation, and language generation. Researchers have developed several models to address these tasks, with two primary…",https://medium.com/@kaleemullahqasim/combining-generative-and-discriminative-models-in-nlp-17c42b9e44ca?source=topics_v2---------170-84--------------------48dd83f6_c977_4a04_b0bf_5b6aeba417b9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*dv5O3fZdGuD1L-EGAkiczA.png,machine-learning 1604,1284,Building a Simple Logistic Regression Model using Scikit-Learn: A Tutorial with Titanic Dataset.,"Machine learning is a large field of research that involves the creation of algorithms and statistical models that can make predictions or judgements based on data. One famous form of method is the logistic regression, which is used to describe the connection between a binary dependent variable and one or…",https://medium.com/@utkarshsinghx27/building-a-simple-logistic-regression-model-using-scikit-learn-a-tutorial-with-titanic-dataset-31a5ecf82bba?source=topics_v2---------171-84--------------------48dd83f6_c977_4a04_b0bf_5b6aeba417b9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1605,1285,ChatGPT: A Cutting-Edge AI Language Model,"“Artificial Intelligence is the future, but we must ensure that we are the ones who define its boundaries and limitations.” — Satya Nadella, CEO of Microsoft. Introduction: ChatGPT is a state-of-the-art AI language model developed by OpenAI, which is based on the GPT-3.5 architecture. It has been trained on a vast…",https://medium.com/@injamamul_cob/chatgpt-a-cutting-edge-ai-language-model-42071cb83062?source=topics_v2---------172-84--------------------48dd83f6_c977_4a04_b0bf_5b6aeba417b9-------17,https://miro.medium.com/v2/resize:fill:140:140/0*1ujiYdEMLP06gmkV,machine-learning 1606,635,Use cases of Chi-squared test part3(Machine Learning),"Adjusted chi-square test for degree-corrected block models(arXiv) Author : Linfan Zhang, Arash A. Amini Abstract : We propose a goodness-of-fit test for degree-corrected stochastic block models (DCSBM). The test is based on an adjusted chi-square statistic for measuring equality of means among groups of n multinomial distributions with d1,…,dn observations…",https://medium.com/@monocosmo77/use-cases-of-chi-squared-test-part3-machine-learning-f7962a3d710d?source=topics_v2---------173-84--------------------48dd83f6_c977_4a04_b0bf_5b6aeba417b9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1607,635,Use cases of Chi-squared test part1(Machine Learning),"Using Excel software to calculate Bayesian factors: taking goodness of fit test (Chi-square test) as an example(arXiv) Author : Zhong Wang Abstract : Taking the goodness of fit test (Chi test) as an example, this paper attempts to calculate the Bayesian factor BF10 of n-fold Bernoulli test by the Excel…",https://medium.com/@monocosmo77/use-cases-of-chi-squared-test-part1-machine-learning-d38be28b4c0e?source=topics_v2---------174-84--------------------48dd83f6_c977_4a04_b0bf_5b6aeba417b9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xEaPH3wXFa7ysBMKlZEQ-A.jpeg,machine-learning 1608,1286,"Use Tensorflow’s pretrained model, VGG16, to predict on iris images",Anybody who has been studying data science will no doubt be familiar with the iris dataset. The Iris dataset is a commonly used dataset in machine learning and is often used as a benchmark for classification algorithms. …,https://medium.com/@tracyrenee61/use-tensorflows-pretrained-model-vgg16-to-predict-on-iris-images-685168b9fa6a?source=topics_v2---------175-84--------------------4fbbf5bf_d8c2_493c_931a_b2246f49af7e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*q7DINC4SLf5hwxSC,machine-learning 1609,1287,"The Future of Chatbots is here: Meet ChatGPT, the AI-Language Model that’s Changing the Game","Table of Contents Introduction Large Language Models (LLMs) Transformer Encoder-Decoder architecture Generative Pre-trained Transformer (GPT) Reinforcement Learning ChatGPT training steps Why do we use decoders in GPT? But why are only decoders, and why aren’t only encoders, used in GPT? What is the prompt in ChatGPT? Python example to use…",https://medium.com/@heena-sharma/the-future-of-chatbots-is-here-meet-chatgpt-the-ai-language-model-thats-changing-the-game-6905873cf51d?source=topics_v2---------176-84--------------------4fbbf5bf_d8c2_493c_931a_b2246f49af7e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Blyj5nw6VLrkI97wbagoig.png,machine-learning 1610,1218,Animated Magic with GPT-4 and Manim: Create a Rolling Sphere in Under 1 Minute,"We have recently seen ChatGPT being incorporated in game engines like Unity and other environments. What about animations? In this article, I’ll share my rather astonishing experience of combining GPT-4 with Manim. Manim is an open-source animation library originally by Grant…",https://medium.com/@ramaswamis/animated-magic-with-gpt-4-and-manim-create-a-rolling-sphere-in-under-1-minute-7ce5523be5ea?source=topics_v2---------177-84--------------------4fbbf5bf_d8c2_493c_931a_b2246f49af7e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*e2ndPONNQEAy5eAC24lZHw.png,machine-learning 1611,1288,Explainable AI(XAI): A Brief Analysis Towards Its concept,Abstract: Artificial intelligence(AI) has proved its significant position in the world of computers. AI inherits life in machines so that they can communicate with human users effectively and understand human behavior and their requirements to perform various tasks. Explainable Artificial intelligence(XAI) plays an important role between AI based systems or…,https://medium.com/@baivab369/explainable-ai-xai-a-brief-analysis-towards-its-concept-aee0d651a01b?source=topics_v2---------178-84--------------------4fbbf5bf_d8c2_493c_931a_b2246f49af7e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9Du1QKkglmG1et_ln30SdQ.jpeg,machine-learning 1612,1289,A Comprehensive Overview of “Attention is All You Need”,"The groundbreaking paper “Attention is All You Need” by Vaswani et al. introduced the Transformer model, which revolutionized the field of natural language processing (NLP). The paper showcased the power of the attention mechanism as a standalone architecture, which eliminated the need for recurrent or convolutional networks. …",https://medium.com/gamebrainz/a-comprehensive-overview-of-attention-is-all-you-need-21fb9dbf7124?source=topics_v2---------179-84--------------------4fbbf5bf_d8c2_493c_931a_b2246f49af7e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*mMM1r0_ZnbqhVCyz,machine-learning 1613,635,Working with Stochastic Differential Equations part1(Machine Learning),"Efficient Sampling of Stochastic Differential Equations with Positive Semi-Definite Models(arXiv) Author : Anant Raj, Umut Şimşekli, Alessandro Rudi Abstract : This paper deals with the problem of efficient sampling from a stochastic differential equation, given the drift function and the diffusion matrix. The proposed approach leverages a recent model for…",https://medium.com/@monocosmo77/working-with-stochastic-differential-equations-part1-machine-learning-274284476bdb?source=topics_v2---------180-84--------------------4fbbf5bf_d8c2_493c_931a_b2246f49af7e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1614,1290,What Companies Look for in ML Candidates: Technical and Non-Technical Skills,"When it comes to job interviews, companies have two main objectives. Firstly, they need to determine whether a candidate has the necessary skills and knowledge to do the job. Secondly, they want to assess whether they can provide the candidate with an environment in which they can excel. …",https://medium.com/@moonchangin/what-companies-look-for-in-ml-candidates-technical-and-non-technical-skills-39b2ee6ac2e5?source=topics_v2---------181-84--------------------4fbbf5bf_d8c2_493c_931a_b2246f49af7e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*36PpypKetL-0I7cY.png,machine-learning 1615,635,Working with Stochastic Differential Equations part2(Machine Learning),"Peak Value-at-Risk Estimation for Stochastic Differential Equations using Occupation Measures(arXiv) Author : Jared Miller, Matteo Tacchi, Mario Sznaier, Ashkan Jasour Abstract : This paper proposes an algorithm to upper-bound maximal quantile statistics of a state function over the course of a Stochastic Differential Equation (SDE) system execution. This chance-peak problem…",https://medium.com/@monocosmo77/working-with-stochastic-differential-equations-part2-machine-learning-dbb00884e7af?source=topics_v2---------182-84--------------------4fbbf5bf_d8c2_493c_931a_b2246f49af7e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1616,635,Applications of Multi-Armed Bandits part3(Machine Learning),"Piecewise-Stationary Multi-Objective Multi-Armed Bandit with Application to Joint Communications and Sensing(arXiv) Author : Amir Rezaei Balef, Setareh Maghsudi Abstract : We study a multi-objective multi-armed bandit problem in a dynamic environment. The problem portrays a decision-maker that sequentially selects an arm from a given set. If selected, each action produces…",https://medium.com/@monocosmo77/applications-of-multi-armed-bandits-part3-machine-learning-2f161fe5c506?source=topics_v2---------183-84--------------------4fbbf5bf_d8c2_493c_931a_b2246f49af7e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1617,55,Unboxing Google Bard and GPT-4,"A first look at two major AI releases — Here comes an AI unboxing video! These shiny new tools were released just over a week ago, so they’re fresh out of the oven. In the video, you’ll see me running my first ever Bard + GPT-4 side-by-side prompts. Below that, you’ll find something that started as the video transcript…",https://medium.com/towards-data-science/unboxing-google-bard-and-gpt-4-811896adf0e2?source=topics_v2---------184-84--------------------4fbbf5bf_d8c2_493c_931a_b2246f49af7e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*HBpJLeuuCFfzDBb0MDq58w.png,machine-learning 1618,1291,Understanding and Demystifying Prompt Engineering. (Part 1),"Understanding and Demystifying Prompt Engineering. (Part 1) Getting it right from the Start. Artificial intelligence (AI) is transforming the world we live in, and one of the most promising applications of this technology is in the field of natural language processing (NLP). NLP involves generating human-like text, made possible through…",https://medium.com/@the-one-golden-goose/understanding-and-demystifying-prompt-engineering-part-1-740a203cd638?source=topics_v2---------185-84--------------------c66887b8_23bf_4dd5_9120_de6ad5388e6d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BSO8renxCLI74Q3LE7ei_w.jpeg,machine-learning 1619,1292,Build a ChatGPT that searches the right data sources and answers questions accurately,"In this example, we will ask GPT to pick the right dataset to search when a user asks a question and then answer the user's question. ⚠️ You can otherwise simplify this example by using Embedbase Cloud instead of running it yourself. If so, you can jump to the Seed…",https://medium.com/@louis030195/build-a-chatgpt-that-searches-the-right-data-sources-and-answers-questions-accurately-5216fe268b08?source=topics_v2---------186-84--------------------c66887b8_23bf_4dd5_9120_de6ad5388e6d-------17,https://miro.medium.com/v2/resize:fill:140:140/0*BToOjK74c4Bj9b4g.png,machine-learning 1620,1293,‘Pause Giant AI Experiments’ — should we?,"The AI world is shaking — again. After GPT-3 and GPT-4, there is something new: an open letter signed by Elon Musk, Steve Wozniak, Stuart Russel, and more urging AI labs to “pause for at least 6 months the training of AI systems more powerful than GPT-4.” ** This article…",https://medium.com/@ishitajain21/pause-giant-ai-experiments-should-we-b015c05fce95?source=topics_v2---------187-84--------------------c66887b8_23bf_4dd5_9120_de6ad5388e6d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*b81bG5uBmrIg8bn95YOvCw.png,machine-learning 1621,516,What is the difference between machine learning and deep learning? Will deep learning eventually replace machine learning?,"Machine learning and deep learning are both subfields of artificial intelligence, but they differ in terms of techniques, model architectures, and applications. Let me clarify the differences between the two and address whether deep learning will eventually replace machine learning. Machine Learning (ML) Machine learning is a subset of artificial intelligence that involves…",https://medium.com/daniel-parente/what-is-the-difference-between-machine-learning-and-deep-learning-6a22218c4c7f?source=topics_v2---------188-84--------------------c66887b8_23bf_4dd5_9120_de6ad5388e6d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*jny0XhtVlBCi8Kl8F-DxbA.png,machine-learning 1622,635,Significance of Rademacher complexity part3(Machine Learning),"Exponential Tail Local Rademacher Complexity Risk Bounds Without the Bernstein Condition(arXiv) Author : Varun Kanade, Patrick Rebeschini, Tomas Vaskevicius Abstract : The local Rademacher complexity framework is one of the most successful general-purpose toolboxes for establishing sharp excess risk bounds for statistical estimators based on the framework of empirical risk…",https://medium.com/@monocosmo77/significance-of-rademacher-complexity-part3-machine-learning-24681cc265d7?source=topics_v2---------189-84--------------------c66887b8_23bf_4dd5_9120_de6ad5388e6d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yRpzIWEeD6GH09unBEGLpw.jpeg,machine-learning 1623,1294,The intuition behind Logistic Regression loss function,Have you ever thought why we choose cross-entropy as the loss function for a logistic regression problem? Why not choose the average mean squared error for example ? The answer is very simple and intuitive! Cross-entropy loss function: Cross-entropy loss is defined as following:,https://medium.com/@sami.benbrahim/the-intuition-behind-logistic-regression-loss-function-64390260ed81?source=topics_v2---------190-84--------------------c66887b8_23bf_4dd5_9120_de6ad5388e6d-------17,https://miro.medium.com/v2/resize:fill:140:140/0*fv48BIaRr4Ov0s9L,machine-learning 1624,635,Applications of Multi-Armed Bandits part2(Machine Learning),"Client Selection for Generalization in Accelerated Federated Learning: A Multi-Armed Bandit Approach(arXiv) Author : Dan Ben Ami, Kobi Cohen, Qing Zhao Abstract : Federated learning (FL) is an emerging machine learning (ML) paradigm used to train models across multiple nodes (i.e., clients) holding local data sets, without explicitly exchanging the…",https://medium.com/@monocosmo77/applications-of-multi-armed-bandits-part2-machine-learning-90d61e37c273?source=topics_v2---------191-84--------------------c66887b8_23bf_4dd5_9120_de6ad5388e6d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1625,635,Working with Cayley graphs part1(Machine Learning),"On the distribution of eigenvalues in families of Cayley graphs(arXiv) Author : Matilde Lalin, Anwesh Ray Abstract : We consider the family of undirected Cayley graphs associated with odd cyclic groups, and study statistics for the eigenvalues in their spectra. …",https://medium.com/@monocosmo77/working-with-cayley-graphs-part1-machine-learning-5789ba0cb26a?source=topics_v2---------192-84--------------------c66887b8_23bf_4dd5_9120_de6ad5388e6d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1626,635,Working with Cayley graphs part3(Machine Learning),"A note on regular sets in Cayley graphs(arXiv) Author : Junyang Zhang, Yanhong Zhu Abstract : A subset R of the vertex set of a graph Γ is said to be (κ,τ)-regular if R induces a κ-regular subgraph and every vertex outside R is adjacent to exactly τ vertices in…",https://medium.com/@monocosmo77/working-with-cayley-graphs-part3-machine-learning-1bbd78929e55?source=topics_v2---------193-84--------------------c66887b8_23bf_4dd5_9120_de6ad5388e6d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1627,635,Applications of Multi-Armed Bandits part1(Machine Learning),"Intelligent Load Balancing and Resource Allocation in O-RAN: A Multi-Agent Multi-Armed Bandit Approach(arXiv) Author : Chia-Hsiang Lai, Li-Hsiang Shen, Kai-Ten Feng Abstract : The open radio access network (O-RAN) architecture offers a cost-effective and scalable solution for internet service providers to optimize their networks using machine learning algorithms. The architecture’s…",https://medium.com/@monocosmo77/applications-of-multi-armed-bandits-part1-machine-learning-354ba5a79937?source=topics_v2---------194-84--------------------c66887b8_23bf_4dd5_9120_de6ad5388e6d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1628,309,When Humans and Robots Collide,"Are You Ready for the AI and Automation Takeover? — Picture this: You’re sitting in your office, minding your own business, when suddenly, a robot saunters in and sits at the desk next to you. “Hey there, partner!” it chirps, extending a metallic hand for a high-five. As you hesitantly return the gesture, you can’t help but wonder, “Is this the future…",https://medium.com/datadriveninvestor/when-humans-and-robots-collide-e7414475400b?source=topics_v2---------195-84--------------------0eaa6df7_c251_4562_b9fa_65ef6bbb48cc-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6Yxlgtntc_SkZORLEQyuVw.png,machine-learning 1629,1295,How to Leverage Pre-Trained Transformer Models for Custom Text Categorisation?,"So, you have some custom text dataset that you wish to categorise, but wondering how? Well, let me show you how, using pre-trained state of the art language models. — Ok let’s get straight to the point! You have some custom data and now you want to categorise it into your custom classes. In this article, I will show you how you can use 2 approaches to achieve this objective. Both of them utilise pre-trained state of the art transformed…",https://medium.com/towards-data-science/how-to-leverage-pre-trained-transformer-models-for-custom-text-categorisation-3757c517bd65?source=topics_v2---------196-84--------------------0eaa6df7_c251_4562_b9fa_65ef6bbb48cc-------17,https://miro.medium.com/v2/resize:fill:140:140/0*uReKWDUfQFyBjbv-,machine-learning 1630,635,Working with Linear Function Approximation part1(Machine Learning),"Variance-aware robust reinforcement learning with linear function approximation under heavy-tailed rewards(arXiv) Author : Xiang Li, Qiang Sun Abstract : This paper presents two algorithms, AdaOFUL and VARA, for online sequential decision-making in the presence of heavy-tailed rewards with only finite variances. For linear stochastic bandits, we address the issue of…",https://medium.com/@monocosmo77/working-with-linear-function-approximation-part1-machine-learning-1cef0351fb51?source=topics_v2---------197-84--------------------0eaa6df7_c251_4562_b9fa_65ef6bbb48cc-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1631,635,Working with Linear Function Approximation part3(Machine Learning),"Federated Temporal Difference Learning with Linear Function Approximation under Environmental Heterogeneity(arXiv) Author : Han Wang, Aritra Mitra, Hamed Hassani, George J. Pappas, James Anderson Abstract : We initiate the study of federated reinforcement learning under environmental heterogeneity by considering a policy evaluation problem. Our setup involves N agents interacting with…",https://medium.com/@monocosmo77/working-with-linear-function-approximation-part2-machine-learning-f67a0aa551fe?source=topics_v2---------198-84--------------------0eaa6df7_c251_4562_b9fa_65ef6bbb48cc-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1632,635,Use cases of Chi-squared test part2(Machine Learning),"Moments estimators and omnibus chi-square tests for some usual probability laws(arXiv) Author : Gorgui Gning, Aladji Babacar Niang, Modou Ngom, Gane Samb Lo Abstract : For many probability laws, in parametric models, the estimation of the parameters can be done in the frame of the maximum likelihood method, or in…",https://medium.com/@monocosmo77/use-cases-of-chi-squared-test-part2-machine-learning-a3fd5260ba30?source=topics_v2---------199-84--------------------0eaa6df7_c251_4562_b9fa_65ef6bbb48cc-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1633,635,Working with Linear Function Approximation part2(Machine Learning),"Exponential Hardness of Reinforcement Learning with Linear Function Approximation(arXiv) Author : Daniel Kane, Sihan Liu, Shachar Lovett, Gaurav Mahajan, Csaba Szepesvári, Gellért Weisz Abstract : A fundamental question in reinforcement learning theory is: suppose the optimal value functions are linear in given features, can we learn them efficiently? This problem’s…",https://medium.com/@monocosmo77/working-with-linear-function-approximation-part2-machine-learning-ff40cf606b73?source=topics_v2---------200-84--------------------9aa1a977_f7b2_4ba1_9727_43bc9cacfa47-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1634,1296,AI-Powered Blockchain Ecosystem,"About the trend Combining blockchain & AI technologies. Enable academics, AI developers, and users to use AI solutions securely and ethically. Visit Nextonly",https://medium.com/@nextonly/ai-powered-blockchain-ecosystem-97bfbb2ff198?source=topics_v2---------201-84--------------------9aa1a977_f7b2_4ba1_9727_43bc9cacfa47-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1635,1297,Cost Function: A beginners guide to Machine Learning concepts,A cost function is a measure of how wrong a machine learning model is. It is typically calculated by taking the difference between the model’s predictions and the actual values. …,https://medium.com/@shaswat.shady/cost-function-a-beginners-guide-to-machine-learning-concepts-7671c26d0865?source=topics_v2---------202-84--------------------9aa1a977_f7b2_4ba1_9727_43bc9cacfa47-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1636,635,Concept of Minimum Description Length in Machine Learning part2,"Causal Discovery in Hawkes Processes by Minimum Description Length(arXiv) Author : Amirkasra Jalaldoust, Katerina Hlavackova-Schindler, Claudia Plant Abstract : Hawkes processes are a special class of temporal point processes which exhibit a natural notion of causality, as occurrence of events in the past may increase the probability of events in…",https://medium.com/@monocosmo77/concept-of-minimum-description-length-in-machine-learning-part2-3b4d90d129a7?source=topics_v2---------203-84--------------------9aa1a977_f7b2_4ba1_9727_43bc9cacfa47-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hcR1E_HYNZviHCRovt-8Nw.jpeg,machine-learning 1637,1298,Charge Descriptors (features) for molecular property prediction.,"On this post i try to investigate about the charge descriptors fingerprints as one may call it . David Winkler 2009 published an article on it Towards Novel Universal Descriptors: Charge Fingerprints . It looks very interesting and can provide insights into the electrostatic properties of molecules, which play an…",https://medium.com/@pharmanalytics/charge-descriptors-features-for-molecular-property-prediction-26653b3f996b?source=topics_v2---------204-84--------------------9aa1a977_f7b2_4ba1_9727_43bc9cacfa47-------17,https://miro.medium.com/v2/resize:fill:140:140/1*sk1BvLjZ21V_Wjaey9orfQ.png,machine-learning 1638,1299,Pandas Cheat Sheet: Functions for Data Analysis,"Pandas Coding Examples for Efficient Data Manipulation and Analysis in Python — Introduction It is no secret that data is the lifeblood of modern business, and the ability to manipulate and analyze data is a key skill for any data scientist or machine learning practitioner. The Pandas library for Python has become the go-to tool for data manipulation and analysis, providing a wide…",https://medium.com/towards-artificial-intelligence/pandas-cheat-sheet-functions-for-data-analysis-2cf4923266aa?source=topics_v2---------205-84--------------------9aa1a977_f7b2_4ba1_9727_43bc9cacfa47-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*zXFssa5ki09Lyj9g1dKWjg.gif,machine-learning 1639,1300,"SmoothQuant: Accurate and Efficient Post-Training Quantization for Large Language Models","Migrating activation quantization difficulty to weights — Abstract The paper talks about Large Language Models (LLMs), which are great at their job but require a lot of computing power and memory. Quantization is a method that can make them faster and use less memory, but it doesn’t work well for LLMs with more than 100 billion parameters. The…",https://medium.com/@blazingbhavneek/smoothquant-accurate-and-efficient-post-training-quantization-for-large-language-models-e8f2143dfa59?source=topics_v2---------206-84--------------------9aa1a977_f7b2_4ba1_9727_43bc9cacfa47-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fzBsmTaMHZrY8DdawaDTxg.jpeg,machine-learning 1640,1210,GPT-4 and the Next Frontier of Generative AI,"The Implications and Potential of GPT-4 for AI and Natural Language Processing — Artificial intelligence (AI) has come a long way since its inception. From simple rule-based systems to complex deep learning models, AI has proven to be a game-changer in numerous industries. One of the most exciting developments in AI is the introduction of GPT-4, the next frontier of artificial intelligence. GPT-4…",https://medium.com/@bembelino22/gpt-4-and-the-next-frontier-of-generative-ai-c4f2c2608a0f?source=topics_v2---------207-84--------------------9aa1a977_f7b2_4ba1_9727_43bc9cacfa47-------17,https://miro.medium.com/v2/resize:fill:140:140/0*fslA43v0UlAwPigQ,machine-learning 1641,635,Working with Polynomial growth part3(Machine Learning),"Polynomial growth of Betti sequences over local rings(arXiv) Author : Luchezar L. Avramov, Alexandra Seceleanu, Zheng Yang Abstract : We study sequences of Betti numbers {βRi(M)}i≥0 of finite modules M over a complete intersection local ring, R. It is known that for every M the subsequence with even, respectively, odd…",https://medium.com/@monocosmo77/working-with-polynomial-growth-part3-machine-learning-95bcd2ce40d4?source=topics_v2---------208-84--------------------9aa1a977_f7b2_4ba1_9727_43bc9cacfa47-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1642,635,Significance of Minimax Optimization part1(Machine Learning),"Enhanced Adaptive Gradient Algorithms for Nonconvex-PL Minimax Optimization(arXiv) Author : Feihu Huang Abstract : In the paper, we study a class of nonconvex nonconcave minimax optimization problems (i.e., minxmaxyf(x,y)), where f(x,y) is possible nonconvex in x, and it is nonconcave and satisfies the Polyak-Lojasiewicz (PL) condition in y. Moreover, we…",https://medium.com/@monocosmo77/significance-of-minimax-optimization-part1-machine-learning-9cd4f07820d8?source=topics_v2---------209-84--------------------9aa1a977_f7b2_4ba1_9727_43bc9cacfa47-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LVSg5VCvvx85hX6AAfmkgQ.jpeg,machine-learning 1643,1290,Do You Really Need a PhD to Work in Machine Learning?,"At some point in your career as a machine learning practitioner or aspirant, you may have wondered if you need a PhD to succeed in the field. Maybe you’ve seen job listings that require or prefer a PhD degree, or read articles that tout the benefits of academic research, or…",https://medium.com/@moonchangin/do-you-really-need-a-phd-to-work-in-machine-learning-41aa5402cd69?source=topics_v2---------210-84--------------------08141df3_6e1c_46b8_8911_e8907e07eba2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*6Un2QdCW_ruiAsrT.png,machine-learning 1644,1301,How to build a Route to Live (RTL) for data products like Machine Learning models,"More often than not, our enterprise platforms are designed for traditional software application development. They usually consist of four environments — Dev, Test, Pre-Prod & Prod — where the environments become increasingly more secure as you progress through them. As such, “Dev” or Development is the most liberal of zones…",https://medium.com/@datanick/how-to-build-a-route-to-live-rtl-or-release-cycle-for-data-products-like-machine-learning-models-f560b38291e1?source=topics_v2---------211-84--------------------08141df3_6e1c_46b8_8911_e8907e07eba2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*m4X8HZ52w7swI7BKh00YZg.png,machine-learning 1645,1302,Data Science Pattern #1: The Progress Serializer,"It saved me hundreds of hours as a data scientist — Data cleaning and preprocessing is a necessary and time-consuming task in data science. I typically do this in iterations with a subset of the original dataset. Once I think I have found all the issues, I run the cleaning code on the complete dataset. There are several different ways to…",https://medium.com/@martinthoma/data-science-pattern-1-the-progress-serializer-ce5d4f49d4e?source=topics_v2---------212-84--------------------08141df3_6e1c_46b8_8911_e8907e07eba2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ikELXvZkWLqFJBiR_iSjOw.png,machine-learning 1646,1303,Lost in a Transformer: The Blur Between Human and AI Content,"The latest breakthroughs in large language models have fundamentally challenged our understanding of the nature of comprehension. The implications of these advancements are multifaceted, and many questions arise regarding what the future holds and how we can rise to meet the challenge. …",https://medium.com/@notallm/lost-in-a-transformer-the-blur-between-human-and-ai-content-49ebddcbd98b?source=topics_v2---------213-84--------------------08141df3_6e1c_46b8_8911_e8907e07eba2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,machine-learning 1647,1096,Anomaly Detection using PyOD Library in Python.,"Anomaly detection is a technique used to identify rare or unusual events or patterns in data that deviate significantly from normal behavior. It is commonly used in various domains such as finance, cybersecurity, and industrial quality control. Python is a popular programming language for data science, and there are several…",https://medium.com/@akshitsingh_86596/anomaly-detection-using-pyod-library-in-python-c3ebdf50f3c?source=topics_v2---------214-84--------------------08141df3_6e1c_46b8_8911_e8907e07eba2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BaRmMm4bWVIOxuGz2njsxw.png,machine-learning 1648,1304,How to Put an ML Model into Production,"Part 8: Building and Deploying the Infrastructure on AWS with Terraform and Boto3 — By Part 7, we have completed the testing of our code. Now, we can worry about how to deploy it. In this article, our task is to build all resources in the middle ground of Exhibit 1, and we will do it with Terraform. Terraform HashiCorp Terraform is an infrastructure as…",https://medium.com/dev-genius/how-to-put-an-ml-model-into-production-128bfc4b503f?source=topics_v2---------215-84--------------------08141df3_6e1c_46b8_8911_e8907e07eba2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3gjalC38ZpjmrWf9YeEQYg.png,machine-learning 1649,1305,Evaluating the Expense of OpenAI Whisper: API or Self-Hosted?,"OpenAI Whisper is one of the best Speech-to-Text models currently available on the market. But what is the cost of hosting such a model? — OpenAI’s Whisper is one of the best Speech-to-Text models currently available on the market. The transcriptions are highly accurate and include information such as pauses and emphases. It outperforms in terms of quality major competitors. It can also process a variety of languages. In addition to automatic transcription, it is…",https://medium.com/@ngar/evaluating-the-expense-of-openai-whisper-api-or-self-hosted-a5ffe4f441d3?source=topics_v2---------216-84--------------------08141df3_6e1c_46b8_8911_e8907e07eba2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*w15sf7AdahVONygv,machine-learning 1650,635,Significance of Rademacher complexity part1(Machine Learning),"On the Hardness of Robustness Transfer: A Perspective from Rademacher Complexity over Symmetric Difference Hypothesis Space(arXiv) Author : Yuyang Deng, Nidham Gazagnadou, Junyuan Hong, Mehrdad Mahdavi, Lingjuan Lyu Abstract : Recent studies demonstrated that the adversarially robust learning under ℓ∞ attack is harder to generalize to different domains than standard…",https://medium.com/@monocosmo77/significance-of-rademacher-complexity-part1-machine-learning-95cb21b4a4e?source=topics_v2---------217-84--------------------08141df3_6e1c_46b8_8911_e8907e07eba2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SsvuZqQa5N0peQhpG3IzvQ.jpeg,machine-learning 1651,1265,Let’s clearly explain: KNN,"In this series I’m about to explain the most common Machine Learning algorithms, starting from the basics, leading to much more advanced ones. The first candidate of the series is the well-known K-Nearest Neighbors (or KNN for short) model. This model is used to classify new datapoints based on the…",https://medium.com/@tamas.morucz/lets-clearly-explain-knn-7cdb28c6382a?source=topics_v2---------218-84--------------------08141df3_6e1c_46b8_8911_e8907e07eba2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ucPNq3OM0cI0tX7xS8vQxw.png,machine-learning 1652,1306,Pandas 101 : Learn Pandas in 10 minutes,"Pandas is a popular Python library for data analysis and manipulation. It provides a fast and easy way to work with tabular data, such as CSV files, Excel spreadsheets, or SQL databases. In this blog post, I will share some useful pandas cheat sheet that covers some of the most…",https://medium.com/@dotslashbit/pandas-101-learn-pandas-in-10-minutes-8badadc492e7?source=topics_v2---------219-84--------------------08141df3_6e1c_46b8_8911_e8907e07eba2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Pf518eJmalLc9gTyR-rFcg.png,machine-learning 1653,63,BloombergGPT: The First GPT for Finance,"Bloomberg’s 50-billion parameter large language model, purpose-built from scratch for finance — Have we had enough of GPTs? Seems like no. Bloomberg just released a research paper detailing their latest breakthrough technology, BloombergGPTTM. It’s a large-scale generative artificial intelligence (AI) model that has been specifically trained on a wide range of financial data to support natural language processing (NLP) tasks within the…",https://medium.com/towards-artificial-intelligence/bloomberggpt-the-first-gpt-for-finance-72670f99566a?source=topics_v2---------220-84--------------------36adc090_db02_405e_95c5_eb8710378f20-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*xHpzvDUdZPKtsyhv01KTTw.gif,machine-learning 1654,1307,Rustic Learning: Machine Learning in Rust — Part 1: Introduction to Rust,"An Introduction to the Fundamentals of the programming language Rust — Introduction to Rust Rust is a modern programming language that was first released in 2010. It was designed to be a safe, concurrent, and efficient alternative to C++ and other systems programming languages. …",https://medium.com/towards-artificial-intelligence/rustic-learning-machine-learning-in-rust-part-1-introduction-to-rust-1a4a7f354fe9?source=topics_v2---------223-84--------------------36adc090_db02_405e_95c5_eb8710378f20-------17,https://miro.medium.com/v2/resize:fill:140:140/0*DH-8zuCpg1qCvWRR,machine-learning 1655,1308,CORRECT WAY TO USE MACHINE LEARNING,"Machine learning has been revolutionizing the way we solve complex problems and make predictions in various fields. However, with great power comes great responsibility. Misuse or improper use of machine learning algorithms can lead to misleading results, false conclusions, and even negative impacts on society. In this article, we will discuss the correct way to use machine learning and provide references for further reading.",https://medium.com/@anasjawed45/correct-way-to-use-machine-learning-acf86efeedc0?source=topics_v2---------225-84--------------------36adc090_db02_405e_95c5_eb8710378f20-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9o17GYG3JAoCcNn5lpb-GQ@2x.jpeg,machine-learning 1656,1309,The What and How of Computer Vision,"The world has advanced a lot in the past decade. With the advancement of artificial intelligence and machine learning, nothing seems farfetched nowadays. With technology, anything is now possible. The computers and related technologies are advancing at such a rapid rate by doing only one thing: mimicking nature. For example…",https://medium.com/@bakshi.agnik/the-what-and-how-of-computer-vision-b43902a77f7b?source=topics_v2---------226-84--------------------36adc090_db02_405e_95c5_eb8710378f20-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ZSSkslDDV1A_3k5SJJryGA.png,machine-learning 1657,1310,Attention Mechanism in Transformers,"Today’s advanced language models are based on transformer architecture [1]. The transformer architecture, which is otherwise no different from MLP (multilayer perceptron), relies on the attention mechanism. Attention provides the network with the ability to extract long-range relationships within given word sequences which is crucial in natural language understanding. Prior…",https://medium.com/@bilalkabas/self-attention-in-transformers-9d631f2a076d?source=topics_v2---------228-84--------------------36adc090_db02_405e_95c5_eb8710378f20-------17,https://miro.medium.com/v2/resize:fill:140:140/1*P-s4SilSHyI5E7iOhZnVUA@2x.png,machine-learning 1658,1311,Document AI | APP to compare the Document Understanding LiLT and LayoutXLM (base) models at paragraph level,"Through the publication of the DocLayNet dataset (IBM Research) and the publication of Document Understanding models on Hugging Face (for example: LayoutLM series and LiLT), 2 Document Understanding models at paragraph level have already been published: a LiLT base and a LayoutXLM base (Microsoft) models finetuned on the dataset DocLayNet…",https://medium.com/@pierre_guillou/document-ai-app-to-compare-the-document-understanding-lilt-and-layoutxlm-base-models-at-c22bee832c3a?source=topics_v2---------1-84--------------------7a68f5a5_2d15_4326_b4d1_32bfcca7cabb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_wePlK8hdbpZfllny0F-5w.png,deep-learning 1659,1312,Intelligent Cloud — Part 1: Introduction to Lunit’s Cloud Deep Learning Platform for Efficient Model Training,"Introduction In Lunit, we train a large number of deep learning models on a daily basis. This process is highly computationally intensive, requiring powerful hardware to keep up with the demands of training model. While we originally relied on on-premise servers to provide the necessary resources, these servers often encountered various…",https://medium.com/@hyunjae.lee410/intelligent-cloud-part-1-introduction-to-lunits-cloud-deep-learning-platform-for-efficient-94fd2da2a3f2?source=topics_v2---------2-84--------------------7a68f5a5_2d15_4326_b4d1_32bfcca7cabb-------17,https://miro.medium.com/v2/resize:fill:140:140/0*UqA8GR8Bre3xEE-F.jpg,deep-learning 1660,1312,Intelligent Cloud — Part 2: A Deep Dive into the Architecture and Technical Details of INCL,"Introduction In our previous blog post, we discussed how INCL has enhanced our research capabilities. In this post, we’ll dive into the architecture of INCL and explain how it works. INCL has been designed with several key components to ensure scalability, high performance, and a user-friendly experience. It provides a distributed…",https://medium.com/@hyunjae.lee410/intelligent-cloud-part-2-a-deep-dive-into-the-architecture-and-technical-details-of-incl-b808b39f9f9f?source=topics_v2---------3-84--------------------7a68f5a5_2d15_4326_b4d1_32bfcca7cabb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fOhn4MxZp-AiPGIEdqgniw.png,deep-learning 1661,1313,"VQGAN: An Introduction to its Architecture, Training Process, and Applications in Machine Learning","In today’s blog, we will explore an overview of VQGAN’s architecture, its training process, and its applications in machine learning VQGAN Architecture VQGAN employs an encoder-decoder architecture that includes an encoder network, a codebook, and a decoder network. The encoder network transforms the input image into a low-dimensional representation, which is subsequently…",https://medium.com/@anuj.1306.gupta/vqgan-an-introduction-to-its-architecture-training-process-and-applications-in-machine-learning-332910248e6e?source=topics_v2---------5-84--------------------7a68f5a5_2d15_4326_b4d1_32bfcca7cabb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wLbe3Hx2Rnzrw7E2It_3hQ.png,deep-learning 1662,1283,From “Break a Leg” to “Merde”,"The Power Duo of Generative and Discriminative Models in Machine Translation — Idiomatic expressions are the vibrant and quirky gems of language that often leave even the most advanced machine translation systems scratching their proverbial heads. These captivating phrases, brimming with cultural nuance, require not only a deep understanding of the languages involved but also the uncanny ability to unearth equivalent expressions…",https://medium.com/@kaleemullahqasim/from-break-a-leg-to-merde-2ec9e305bc9c?source=topics_v2---------6-84--------------------7a68f5a5_2d15_4326_b4d1_32bfcca7cabb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-d8HoAc0rByxb9j8YptS7A.png,deep-learning 1663,1314,A Beginner's Guide to Self Organizing Map (SOM) — Deep Learning,In the family of Unsupervised Deep learning networks Self Organized Maps are used to reduce dimensionality & make clusters. It is first introduced in 1980 by Teuvo Kohonen. That is why still it is named as ‘Kohonen Maps’. Before we deep dive into the Self organized maps here are the…,https://medium.com/@soumallya160/a-beginners-guide-to-self-organizing-map-som-deep-learning-e0e30a7534e3?source=topics_v2---------7-84--------------------7a68f5a5_2d15_4326_b4d1_32bfcca7cabb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*lG9yfaG4ciqJfolF7goBBQ.png,deep-learning 1664,1315,Making Recommenders Better,Hybrid? Machine Learning? So many ways to improve recommenders. — Where are you in the series? Recommender Systems for Dummies Evaluating Recommender Systems Collaborative Filtering Recommenders (1/3) Content-Based Recommenders (2/3) Knowledge-Based Recommenders (3/3) Making Recommenders Better ◀️ Good job reaching the end of the series! Now you know a lot about the basics of recommender systems. What now? Now we discuss ways we can improve upon…,https://medium.com/@paul0/making-recommenders-better-8129683a9b78?source=topics_v2---------8-84--------------------7a68f5a5_2d15_4326_b4d1_32bfcca7cabb-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ZMO6r5I4xibJMaE0,deep-learning 1665,1316,Python Vs PySpark,"Python and PySpark are two popular tools used for machine learning and data analysis. Both have their own unique features and strengths, and choosing between them depends on the specific requirements of a project. …",https://medium.com/@parmeet.97637/python-vs-pyspark-1b13cabb1317?source=topics_v2---------9-84--------------------7a68f5a5_2d15_4326_b4d1_32bfcca7cabb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,deep-learning 1666,1317,Demystifying CPUs and GPUs: What You Need to Know,"It’s possible that the terms CPUs and GPUs are familiar to some people, while others may have only heard of them without fully understanding their purpose. …",https://medium.com/@giahuy04/demystifying-cpus-and-gpus-what-you-need-to-know-5bb423be726b?source=topics_v2---------10-84--------------------b6b0f801_06cc_4b2a_b17d_c1e818790fdc-------17,https://miro.medium.com/v2/resize:fill:140:140/1*GA5RFCP3FIrUt5qgHM97Tw.jpeg,deep-learning 1667,1318,"Image generators for everyone(designer, programmers, amateurs and +)","Hello, this is Bing. I’m glad that you’re interested in artificial intelligence for generating images. There are many options available on the web, but some of the most popular, free, and low-resource-demanding ones are: StarryAI: a tool that allows you to create images from text, photos, or drawings, applying different…",https://medium.com/@maximo.suleiman00/image-generators-for-everyone-designer-programmers-amateurs-and-cb24c678a04e?source=topics_v2---------11-84--------------------b6b0f801_06cc_4b2a_b17d_c1e818790fdc-------17,https://miro.medium.com/v2/resize:fill:140:140/1*HJuyDLAwH2XsiY-AEEw6ow.jpeg,deep-learning 1668,1319,"The complexity of the human brain and its relationship with artificial intelligence: ANN, RNN, LSTM and GRU",The perfection of nature has been the source of inspiration for people for centuries. The idea of using this information in technology by studying the design and functions of organisms and systems found in nature actually dates back thousands of years. People made simple tools and structures by taking inspiration…,https://medium.com/academy-team/the-complexity-of-the-human-brain-and-its-relationship-with-artificial-intelligence-ann-rnn-lstm-d0e1fdf42ac3?source=topics_v2---------12-84--------------------b6b0f801_06cc_4b2a_b17d_c1e818790fdc-------17,https://miro.medium.com/v2/resize:fill:140:140/0*3M4_hZVam8xSlhg7.jpg,deep-learning 1669,1320,Brief Review — ResUNet: Road Extraction by Deep Residual U-Net,"ResUNet, U-Net With Residual Paths — Road Extraction by Deep Residual U-Net, ResUNet, by Beihang University, 2018 IEEE Geoscience and Remote Sensing Letters, Over 1500 Citations (Sik-Ho Tsang @ Medium) Semantic Segmentation 2014 … 2021 [PVT, PVTv1] [SETR] [Trans10K-v2, Trans2Seg] [Copy-Paste] 2022 [PVTv2] [YOLACT++] A semantic segmentation neural network, ResUNet, is proposed, which combines the strengths…",https://medium.com/@sh-tsang/brief-review-resunet-road-extraction-by-deep-residual-u-net-f917b13ff6f1?source=topics_v2---------15-84--------------------b6b0f801_06cc_4b2a_b17d_c1e818790fdc-------17,https://miro.medium.com/v2/resize:fill:140:140/1*GCQzh2TrSpTbZ0jerHy6DA.png,deep-learning 1670,1321,Building Smarter Models with Transfer Learning : A practical guide,"In current technical era, as we know AI ML is everywhere like air and Data is the lifeblood of that. But, as I mentioned in the previous blog on Data Augmentation, from row data to stage that data for ML training is not only challenging but also time consuming. Sometimes…",https://medium.com/@eagerminds/building-smarter-models-with-transfer-learning-a-practical-guide-21e3da0f1e15?source=topics_v2---------28-84--------------------b4dddfe9_42f2_40c9_9a8c_f64a207e878d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*n3AJAwJNpQYZpGPYKl5Pbw.jpeg,deep-learning 1671,1322,“Telecom Churn Prediction with Deep Learning: A Full-Stack Data Science Project in Action”,"Leveraging Deep Learning, TensorFlow, Keras, Flask, AWS, and PowerBI to build an end-to-end churn prediction solution for the telecom industry Introduction Hello, Medium community! I’m excited to introduce my latest project: a telecom churn prediction system using Deep Learning with Artificial Neural Networks (ANN) built with TensorFlow Keras. Churn prediction is…",https://medium.com/@syuvashree15/telecom-churn-prediction-with-deep-learning-a-full-stack-data-science-project-in-action-6ac18ea7c9d1?source=topics_v2---------40-84--------------------a36940d3_e30d_4109_9589_6b49e55cc659-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*m6KeRnxROTabkaEAyxUJ2g.gif,deep-learning 1672,1323,An Introduction to YOLO: You Only Look Once (Object Detection Algorithm ),"Object detection is a critical task in computer vision, with applications in self-driving cars, surveillance, robotics, and more. However, detecting objects in real-time video streams or images can be a challenging problem, requiring both speed and accuracy. This is where the YOLO algorithm comes in. YOLO, or You Only Look…",https://medium.com/@satishsaini905/an-introduction-to-yolo-you-only-look-once-object-detection-algorithm-249dd82f42c?source=topics_v2---------45-84--------------------a36940d3_e30d_4109_9589_6b49e55cc659-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,deep-learning 1673,1324,Federated Learning with PyTorch: Training a CNN Classifier on Fashion-MNIST Dataset,"Federated Learning is a distributed machine learning technique that allows multiple parties to collaboratively train a machine learning model without sharing their data with each other. In this article, we will learn how to train a CNN classifier on the Fashion-MNIST dataset using PyTorch and Federated Learning. Step 1: Loading and Preprocessing the Data First, let’s load…",https://medium.com/@jahanxb/federated-learning-with-pytorch-training-a-cnn-classifier-on-fashion-mnist-dataset-e190ad9fda4e?source=topics_v2---------51-84--------------------dd150056_cf2e_4402_926c_7df0d7ecba3b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,deep-learning 1674,1325,AI Supervised AI 😵,"I tried to ask ChatGPT if it will take away my (or anyone’s) job. Here’s what it says: Phew, what a relief…😭 Okay, enough of the joke. Back to the topic. Lately, I’ve been hearing a lot of sentiment of fear of AI potentially replacing people’s jobs, sprung from scary…",https://medium.com/@angelina-yang/ai-supervised-ai-a287699f5a84?source=topics_v2---------59-84--------------------c029dd41_fdd1_4670_8a11_160bc877b9f3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*T22Bz7iImaiW2Xv4.jpeg,deep-learning 1675,1324,How to Train a CNN Classifier on Fashion-MNIST Dataset,"Fashion-MNIST is a popular benchmark dataset for image classification, widely used in the computer vision community. In this article, we will walk through the steps to train a convolutional neural network (CNN) classifier on the Fashion-MNIST dataset using PyTorch. First, let’s start with some background information about the Fashion-MNIST dataset…",https://medium.com/@jahanxb/how-to-train-a-cnn-classifier-on-fashion-mnist-dataset-5a274bd671ad?source=topics_v2---------68-84--------------------82dce76a_72ed_40c0_892d_059fb8bd9ac3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,deep-learning 1676,1326,Multi-Intent Classification Using Dependency Parsing and Named Entity Recognition,"Introduction: Natural language processing (NLP) has become an essential technology in today’s world. It is being used in various applications such as chatbots, virtual assistants, and voice-enabled devices. One of the main challenges in NLP is multi-intent classification, where the system needs to identify multiple intents in a single user…",https://medium.com/@vishnuvandithg/multi-intent-classification-using-dependency-parsing-and-named-entity-recognition-423b838a9720?source=topics_v2---------3-84--------------------7e524f6b_0773_41f7_bcf6_7ed32a055866-------17,https://miro.medium.com/v2/resize:fill:140:140/1*U9vKfE69y8THu72onR6IkQ.png,nlp 1677,1327,Intro to Langchain LLM Templates and Agents 🦜,"Langchain, a framework for building applications with LLMs. — A friend working on a building code reform think tank recently started experimenting with using LLMs to collate information about international building standards. His experience will sound familiar to most of us who have been playing around with LLMs lately. At first, astonished as ChatGPT was able to answer his…",https://medium.com/@meghanheintz/intro-to-langchain-llm-templates-and-agents-8793f30f1837?source=topics_v2---------6-84--------------------7e524f6b_0773_41f7_bcf6_7ed32a055866-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rasMCUMGiJ94fNnA32UemA.png,nlp 1678,1328,How to Secure Your OpenAI API Requests with SSL: A Step-by-Step Guide,"OpenAI is an artificial intelligence research laboratory consisting of the for-profit corporation OpenAI LP and its parent company, the non-profit OpenAI Inc. The mission of OpenAI is to create and promote friendly AI for the betterment of humanity. The OpenAI API provides a powerful way to access state-of-the-art machine learning…",https://medium.com/@james.bullock.rbb/how-to-secure-your-openai-api-requests-with-ssl-a-step-by-step-guide-7f626a229848?source=topics_v2---------7-84--------------------7e524f6b_0773_41f7_bcf6_7ed32a055866-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7KPwMiome7XbX2lV1lkWdQ.png,nlp 1679,1329,"Introducing: The World’s First AI Stylist, Powered by ChatGPT for Fashion",By YesPlz AI,https://medium.com/geekculture/introducing-the-worlds-first-ai-stylist-powered-by-chatgpt-for-fashion-e881a921055a?source=topics_v2---------9-84--------------------7e524f6b_0773_41f7_bcf6_7ed32a055866-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Avwp7eSMF_kqruHT0twqwA.png,nlp 1680,1330,TextBlob Vs VADER for sentiment analysis,"In this article we are going to see that when it comes to sentiment analysis, which library we could prefer. It depends on a lot of cases. For example. Data collection. Before we go into the analysis, let’s first see what are these two libraries are all about. 1. TextBlob:",https://medium.com/@hhpatil001/textblob-vs-vader-for-sentiment-analysis-9d36b0b79ae6?source=topics_v2---------14-84--------------------9c4991c4_b051_4698_acb8_cfdb913a6454-------17,https://miro.medium.com/v2/resize:fill:140:140/1*lwj2AUsy6qZvearztbhLHA.jpeg,nlp 1681,1331,What’s the Difference Between Bard and ChatGPT?,"Bard and ChatGPT are two of the most popular large language models (LLMs) on the market. Both models are capable of generating text, translating languages, and answering questions in an informative way. However, there are some key differences between the two models. One of the most significant differences between Bard…",https://medium.com/@Stephen-Howell/whats-the-difference-between-bard-and-chatgpt-6b972ffe236a?source=topics_v2---------17-84--------------------56474972_2283_4cef_8900_0ddf3e25faec-------17,https://miro.medium.com/v2/resize:fill:140:140/1*mo4-larXlTWhq2RDFQgHTA.png,nlp 1682,1332,ANATOMIZING WHATSUP 1.0!!,"Data Science is an interdisciplinary field that involves using scientific methods, processes, algorithms, and systems to extract insights and knowledge from structured and unstructured data. One of the key aspects of Data Science is analyzing data to uncover patterns, relationships, and trends that can inform decision-making. Natural Language Processing (NLP)…",https://medium.com/@rinkalmav/anatomizing-whatsup-1-0-67e61861ff90?source=topics_v2---------18-84--------------------56474972_2283_4cef_8900_0ddf3e25faec-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,nlp 1683,1269,Mastering Information Retrieval: Building Intelligent Search Systems (Chapter 1),"Chapter 1: Keyword Search: The Foundation of Information Retrieval Reference Chapter: “Evaluating Information Retrieval Models: A Comprehensive Guide to Performance Metrics” Chapter 1: “Keyword Search: The Foundation of Information Retrieval” Chapter 2: “TF-IDF and Vector Space Models: Beyond Keyword Search” Chapter 3: “Latent Semantic Indexing: Uncovering Hidden Relationships” Chapter 4: “Word2Vec and Doc2Vec: Capturing Semantic Relationships with Distributed Representations” Chapter…",https://medium.com/@prateekgaurav/mastering-information-retrieval-building-intelligent-search-systems-d4c82aa12e77?source=topics_v2---------22-84--------------------d135250e_d838_4754_a951_6873d047149d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,nlp 1684,1320,Brief Review — Codex: Evaluating Large Language Models Trained on Code,"Codex is Proposed to Solve Programming Tasks. HumanEval Evaluation Dataset is Also Proposed. — Evaluating Large Language Models Trained on Code, Codex & HumanEval, by OpenAI, 2021 arXiv v2, Over 470 Citations (Sik-Ho Tsang @ Medium) Language Model 1991 … 2022 [GPT-NeoX-20B] [GPT-3.5, InstructGPT] [GLM] [MT-NLG 530B] 2023 [GPT-4] ==== My Other Paper Readings Are Also Over Here ==== Codex is proposed, which is…",https://medium.com/@sh-tsang/brief-review-codex-evaluating-large-language-models-trained-on-code-d01866a54bbf?source=topics_v2---------24-84--------------------d135250e_d838_4754_a951_6873d047149d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*t7eG9uLq0VlrUf4AJ5CLtg.png,nlp 1685,1333,The Future of Artificial Intelligence: Exploring the Latest Advancements.,"Artificial intelligence (AI) is rapidly transforming industries and creating new opportunities for businesses and individuals alike. In recent years, we have seen significant advancements in AI that have the potential to change our lives in ways we can only imagine. …",https://medium.com/@randomgyaan/the-future-of-artificial-intelligence-exploring-the-latest-advancements-719982530b26?source=topics_v2---------25-84--------------------d135250e_d838_4754_a951_6873d047149d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SiqUsFx4AzMtPf0vIufZWw.png,nlp 1686,1334,Future OpenAI Functionality Will Supersede Many Current LLM Applications,"There use to be many mobile flashlight apps, until the phone OS came standard with flashlight functionality. — ",https://medium.com/@cobusgreyling/future-openai-functionality-will-supersede-many-current-llm-applications-5f4392a2a69e?source=topics_v2---------26-84--------------------d135250e_d838_4754_a951_6873d047149d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*C2ZHVaQSVKhKyUei8oXR0Q.png,nlp 1687,1335,NLP and Content Knowledge in Machine Learning: Exploring Knowledge Graphs,"Currently, in my team within Globo, the main theme of my work is content knowledge and knowledge graphs. Taking advantage of the enthusiasm of being in the New York City, I decided to write a little about the subject, which, in particular, I find very interesting! TL;DR: Machine learning is…",https://medium.com/@marinaramalhete/nlp-and-content-knowledge-in-machine-learning-exploring-knowledge-graphs-b345024eb7?source=topics_v2---------27-84--------------------d135250e_d838_4754_a951_6873d047149d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3z6xDSK6RZ-gfsHIb8sQ7g.png,nlp 1688,1269,Mastering Information Retrieval: Building Intelligent Search Systems (Chapter 2),"Chapter 2: TF-IDF and Vector Space Models: Beyond Keyword Search Reference Chapter: “Evaluating Information Retrieval Models: A Comprehensive Guide to Performance Metrics” Chapter 1: “Keyword Search: The Foundation of Information Retrieval” Chapter 2: “TF-IDF and Vector Space Models: Beyond Keyword Search” Chapter 3: “Latent Semantic Indexing: Uncovering Hidden Relationships” Chapter 4: “Word2Vec and Doc2Vec: Capturing Semantic Relationships with Distributed Representations” Chapter…",https://medium.com/@prateekgaurav/mastering-information-retrieval-building-intelligent-search-systems-46403b316109?source=topics_v2---------28-84--------------------d135250e_d838_4754_a951_6873d047149d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3CJ5X7bybR5KBI2B9YRbew.png,nlp 1689,1336,Enhancing the E-Learning Experience with Machine Learning: Real-Life Use Cases,"Introduction: With the widespread adoption of e-learning platforms, Machine Learning (ML) has emerged as a powerful tool to improve the learning experience for students. In this blog, we will explore how ML can be used to enhance various aspects of e-learning and provide real-life examples to illustrate each point. Personalized…",https://medium.com/@kartikbhatoye777/enhancing-the-e-learning-experience-with-machine-learning-real-life-use-cases-475319f53e41?source=topics_v2---------29-84--------------------d135250e_d838_4754_a951_6873d047149d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zmuPASeBVxMsQYJwVSTAUA.jpeg,nlp 1690,1337,Semantic search using Sentence-BERT,"With the latest trends in AI pushed by Large Language Models and the success of ChatGPT (OpenAI), businesses have been more and more interested in exploring the possibilities offered by this technology. A popular task right now is the ChatBot capable of retrieving any kind of information from sources, like…",https://medium.com/@jeremyarancio/semantic-search-using-sequence-bert-2116dabecfa3?source=topics_v2---------30-84--------------------d135250e_d838_4754_a951_6873d047149d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7wv1gQfHGt2vLybwc7a7jQ.png,nlp 1691,1338,Understanding Keras Embedding for Natural Language Processing,"Natural Language Processing (NLP) has been widely used in various domains such as sentiment analysis, language translation, and chatbots. One of the most critical tasks in NLP is converting raw text data into numerical data that can be used for machine learning models. This process is known as text embedding…",https://medium.com/@iqra.bismi/understanding-keras-embedding-for-natural-language-processing-9f65a281b1a7?source=topics_v2---------31-84--------------------d135250e_d838_4754_a951_6873d047149d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*buEY9KPCI7R5FYYk0V-4UQ.png,nlp 1692,1339,AI: The Razor’s Edge,"Hello, everyone. I’ve decided to start documenting The Rise of AI, and I wanted to do it from a technical POV. Let’s get into it. One of the most exciting areas of AI research today is in the field of natural language processing (NLP). NLP is the branch of AI…",https://medium.com/@nclester033/ai-the-razors-edge-1330af822c63?source=topics_v2---------32-84--------------------b5b86903_4e77_4f63_b09f_d028e2cd99d5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ktRN40lVCubv8Q5U0RNViw.jpeg,nlp 1693,1340,"Multilingual Legal Sentence and Word Embeddings, EurVoc Taxonomy Classification, Legal Criticality & Argument Mining, demos and more!","Legal NLP 1.10 comes with a lot of new capabilities added to the 800+ models and 125+ Language Models already available in previous versions of the library. Let’s take a look at each of them! New Language Models in different languages We added new Legal Sentence and Word Embeddings for Italian, Portuguese, Spanish and English. …",https://medium.com/john-snow-labs/multilingual-legal-sentence-and-word-embeddings-eurvoc-taxonomy-classification-legal-criticality-83ed2726a8af?source=topics_v2---------33-84--------------------b5b86903_4e77_4f63_b09f_d028e2cd99d5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*nXhhf6SE51kiMwae,nlp 1694,1341,Talk Nerdy to Me: A Step-by-Step Guide to ChatGPT Integration,"You are seriously living under a rock if you haven’t heard about ChatGPT ! ChatGPT is a large language model developed by OpenAI, based on the GPT-3 architecture. It’s a tectonic shift in the way we perceive technology systems. As a large language model, ChatGPT can be used for a…",https://medium.com/@mksukhwani/talk-nerdy-to-me-a-step-by-step-guide-to-chatgpt-integration-273f982fa54f?source=topics_v2---------34-84--------------------b5b86903_4e77_4f63_b09f_d028e2cd99d5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*py-Oy-iT-8RjvdLXwyMZtw.png,nlp 1695,1342,How to Rank Documents for a Query using NLP,In this article we will be looking at below models trying to rank the documents based on a given query. Linear Regression Spacy Genism Bert Language models have come a long way since their inception in the early 2000s. Originally designed to predict the next word in a sentence or…,https://medium.com/@surya.vijjeswarapu/how-to-rank-documents-for-a-query-in-nlp-887837e78424?source=topics_v2---------35-84--------------------b5b86903_4e77_4f63_b09f_d028e2cd99d5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*97trU10nXqnTM9DaKCM51Q.png,nlp 1696,1320,"Brief Review — Scaling Language Models: Methods, Analysis & Insights from Training Gopher","Gopher, Analysis by Training Models with Different Model Scales — Scaling Language Models: Methods, Analysis & Insights from Training Gopher, Gopher, by DeepMind, 2021 arXiv v2, Over 250 Citations (Sik-Ho Tsang @ Medium) Language Model 1991 … 2022 [GPT-NeoX-20B] [GPT-3.5, InstructGPT] [GLM] [MT-NLG 530B] 2023 [GPT-4] ==== My Other Paper Readings Are Also Over Here ==== An analysis of Transformer-based…",https://medium.com/@sh-tsang/brief-review-scaling-language-models-methods-analysis-insights-from-training-gopher-902bc4afa12a?source=topics_v2---------36-84--------------------b5b86903_4e77_4f63_b09f_d028e2cd99d5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*InL-bQN4Kb2T24a8,nlp 1697,1343,STOP Selling! Ask Questions And Listen Instead,"I was never born to be a salesman; I tried many times and hated it. I was told on one well-known sales training programme that “you don’t have to like cold calling or selling, you just have to do it”! That was probably one of the worst pieces of advice…",https://medium.com/illumination/stop-selling-ask-questions-and-listen-instead-849b42446b64?source=topics_v2---------37-84--------------------b5b86903_4e77_4f63_b09f_d028e2cd99d5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*9RUZQ_qGhAzWXTrx,nlp 1698,1269,Mastering Information Retrieval: Building Intelligent Search Systems (Chapter 3),"Chapter 3: Latent Semantic Indexing: Uncovering Hidden Relationships Reference Chapter: “Evaluating Information Retrieval Models: A Comprehensive Guide to Performance Metrics” Chapter 1: “Keyword Search: The Foundation of Information Retrieval” Chapter 2: “TF-IDF and Vector Space Models: Beyond Keyword Search” Chapter 3: “Latent Semantic Indexing: Uncovering Hidden Relationships” Chapter 4: “Word2Vec and Doc2Vec: Capturing Semantic Relationships with Distributed Representations” Chapter…",https://medium.com/@prateekgaurav/mastering-information-retrieval-building-intelligent-search-systems-chapter-3-b4c481771565?source=topics_v2---------38-84--------------------b5b86903_4e77_4f63_b09f_d028e2cd99d5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yCt0gzUvSXz118h7rfQgTg.png,nlp 1699,1344,Reinforcement Learning with Human Feedback,"ChatGPT has become widely used since its release. Built on GPT-3.5, a large language model (LLM), ChatGPT has the interesting ability to have conversations, unlike GPT-3.5 itself, which could only summarize or generate text from prompts. What made ChatGPT better is its ability to remember past instructions and conversations, this…",https://medium.com/@sodipepaul/reinforcement-learning-with-human-feedback-512b13409e8e?source=topics_v2---------39-84--------------------1a24994b_8502_4f36_a70b_c7f4aa794764-------17,https://miro.medium.com/v2/resize:fill:140:140/1*caM1H00i-XABmYRZxgu4-w.png,nlp 1700,1345,Comparing Political Speeches with Python and NLP,"This code compares two text corpora belonging to two politicians, identifies the most significant words in each corpus using the TF-IDF vectorizer, and calculates a similarity metric between the preprocessed corpora. Finally, it displays the significant words and the similarity metric in the output. In this way, the differences in…",https://medium.com/@antoniovb/comparing-political-speeches-with-python-and-nlp-54cd506e91b9?source=topics_v2---------40-84--------------------1a24994b_8502_4f36_a70b_c7f4aa794764-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6aHqiNwmZsMud1DTu_ZNqw.jpeg,nlp 1701,1319,Artificial Intelligence Touch to Google Sheets: Integration of GPT,"Imagine if while working on your electronic spreadsheet, a sudden Artificial Intelligence assistant popped up to help you out. With Google Sheets’ integration of GPT, this dream becomes a reality. You can now make your spreadsheet smarter and streamline your workflow to be faster and more efficient. GPT is well-known…",https://medium.com/academy-team/artificial-intelligence-touch-to-google-sheets-integration-of-gpt-250823eb156c?source=topics_v2---------41-84--------------------1a24994b_8502_4f36_a70b_c7f4aa794764-------17,https://miro.medium.com/v2/resize:fill:140:140/0*BeP3_O6Do3py8ana.jpeg,nlp 1702,1346,From GPT-3 and ChatGPT to GPT-4: OpenAI’s road to Artificial General Intelligence (AGI)?,"The world of natural language processing (NLP) has been revolutionized by the advent of powerful language models like ChatGPT. Born from the GPT-3 architecture by OpenAI, ChatGPT has already become a vital tool in various professional spheres, creating value and efficiency across industries. But as with any technological innovation, ChatGPT…",https://medium.com/@heka-ai/from-gpt-3-and-chatgpt-to-gpt-4-openais-road-to-artificial-general-intelligence-agi-85b2209f4d0c?source=topics_v2---------42-84--------------------1a24994b_8502_4f36_a70b_c7f4aa794764-------17,https://miro.medium.com/v2/resize:fill:140:140/1*m56dedKKSe_FulVSeg2oeA.jpeg,nlp 1703,1073,"Past, present, and future of Artificial Intelligence: A case study of AI evolution","Artificial intelligence is a trending technology from quite a few years now. You must have heard a lot about it in tech news and blogs. There are various predictions about the future of Artificial intelligence but have you ever been keen to about its initial stages? In contemporary times, AI…",https://medium.com/@shakshichinnah/past-present-and-future-of-artificial-intelligence-a-case-study-of-ai-evolution-2a47bbf6cf24?source=topics_v2---------43-84--------------------4996f6fb_617b_4773_9a73_8cd35da6f3e7-------17,https://miro.medium.com/v2/resize:fill:140:140/0*N9ZgqDuo2yxhsIkk,nlp 1704,1347,Saving Time and Sanity: How ChatGPT Can Help Programmers with Code Documentation,"Just a Tangent to Start I’m writing this article because I have a major uptick in articles about how ChatGPT is going to replace programmers and steal peoples jobs. Now, that is not the topic that I’m going to delve into but I ensure you if you are a programmer that your job is safe…",https://medium.com/@ben.putney/saving-time-and-sanity-how-chatgpt-can-help-programmers-with-code-documentation-3ab5bc15a3ed?source=topics_v2---------44-84--------------------4996f6fb_617b_4773_9a73_8cd35da6f3e7-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Jk3qNZfLC4N-j6Gj,nlp 1705,1348,The LLM 101: Recent Developments in Large Language Models for Novice AI/NLP Enthusiasts,"As an AI/NLP enthusiast, it is important to stay up-to-date with the latest innovations in the field. One of the most significant developments in recent years is the emergence of Large Language Models (LLMs). LLMs process sequential input all at once and rely on self-attention to focus on small but…",https://medium.com/@meysun/the-llm-101-recent-developments-in-large-language-models-for-novice-ai-nlp-enthusiasts-7d42fec8355?source=topics_v2---------45-84--------------------4996f6fb_617b_4773_9a73_8cd35da6f3e7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,nlp 1706,1349,3 reasons why you must reprogram your own mind.,"Told from a Master Neuro-Linguistic Programming Trainer… In May 2020, I went onto instagram and searched NLP coach. I found my mentor Noelle Agape, clicked on her page and immediately felt called to book a session with her. Within a few weeks, I began studying with her to become a…",https://medium.com/@thehigherselfactivator/3-reasons-why-you-must-reprogram-your-own-mind-8a385eb63268?source=topics_v2---------46-84--------------------4996f6fb_617b_4773_9a73_8cd35da6f3e7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ny3e15AG6sNrbr_Y8-LROg.png,nlp 1707,1350,Sudowoodo: Contrastive Self-supervised Learning for Data Integration Applications,"Machine Learning is playing an increasingly important role in data integration tasks such as entity matching, data cleaning, and table annotation. Recently the research advances of pre-trained language models (LM) have been widely adopted in data integration tasks which achieved state-of-the-art performance. However, existing learning-based solutions still suffer from two…",https://medium.com/@megagonlabs/sudowoodo-contrastive-self-supervised-learning-for-data-integration-applications-adcc74ecdc77?source=topics_v2---------47-84--------------------4996f6fb_617b_4773_9a73_8cd35da6f3e7-------17,https://miro.medium.com/v2/resize:fill:140:140/0*FO0lQm9hQv6aN0tX.png,nlp 1708,1351,Finding Patterns in Convenience Store Locations with Geospatial Association Rule Mining,"Understanding spatial trends in the location of Tokyo convenience stores — When walking around Tokyo you will often pass numerous convenience stores, locally known as “konbinis”, which makes sense since there are over 56,000 convenience stores in Japan. Often there will be different chains of convenience store located very close to one another; it is not uncommon to see stores around…",https://medium.com/towards-data-science/finding-patterns-in-convenience-store-locations-with-geospatial-association-rule-mining-5bad7e833299?source=topics_v2---------0-84--------------------85385d89_10d3_4bb6_9f34_32a3b388c452-------17,https://miro.medium.com/v2/resize:fill:140:140/0*GHV-W8hVdvphUxpf,data-science 1709,1352,19 Sweet Python Syntax Sugar for Improving Your Coding Experience,"Do more by less code — Making a function work is one thing. Implementing it with precise and elegant code is another. As the Zen of Python mentioned, “beautiful is better than ugly.” A good programming language like Python will always provide appropriate syntax sugar to help developers write elegant code easily. This article highlights 19…",https://medium.com/techtofreedom/19-sweet-python-syntax-sugar-for-improving-your-coding-experience-37c4118fc6b1?source=topics_v2---------3-84--------------------85385d89_10d3_4bb6_9f34_32a3b388c452-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pyqhLrVe5g5iXCQXLgW-Mg.png,data-science 1710,1353,Power Query: Combine Data from a Folder,A Technique for Consolidating Files to Enhance the Readability of your Power Query — The easiest way to combine data from a folder in Power Query is to click on the “Combine Files” button (in the “Content” column) as shown in the print below.,https://medium.com/artificial-corner/power-query-combine-data-from-a-folder-b2606a6bfd43?source=topics_v2---------5-84--------------------85385d89_10d3_4bb6_9f34_32a3b388c452-------17,https://miro.medium.com/v2/resize:fill:140:140/0*KbP0fnOxUqTeXh82,data-science 1711,1354,The Future Unraveled: Programming Languages and Their Evolution in the Upcoming Decade,"As programming languages continue to evolve and shape the world of software development, it’s fascinating to ponder what the future holds. Will your favorite language still be relevant in a decade? Will a new contender rise to prominence? Let’s dive into the trends and predictions that will define the programming…",https://medium.com/@hussain-iqbal/the-future-unraveled-programming-languages-and-their-evolution-in-the-upcoming-decade-6de9e027984b?source=topics_v2---------6-84--------------------85385d89_10d3_4bb6_9f34_32a3b388c452-------17,https://miro.medium.com/v2/resize:fill:140:140/1*87JRgklsomLtc4UudU9chQ.png,data-science 1712,1355,ChatGPT and the age of enlightenment,"Descartes famously stated “cogito, ergo sum"" (“I think, therefore I am""). This was part of the intellectual revolution known as the enlightenment. This was the start of something new in human history and it was also the spark that ignited the industrial revolution. Today we see another revolution. While the…",https://medium.com/@meanderix/chatgpt-and-the-age-of-enlightenment-9919321c69d5?source=topics_v2---------7-84--------------------85385d89_10d3_4bb6_9f34_32a3b388c452-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Rao-bVU8g1QgjlNeADSEUw.jpeg,data-science 1713,1356,“Revolutionizing Data Management: The Power of Apache Hudi”,"“Revolutionizing Data Management: The Power of Apache Hudi” Introduction: Managing large-scale data sets has become increasingly difficult for organizations in today’s digital age. As data volumes increase, traditional data management and processing methods become obsolete. This is where Apache Hudi enters the picture. Apache Hudi is a free and open-source data management framework that handles incremental data updates…",https://medium.com/@patidar.rahul8392/revolutionizing-data-management-the-power-of-apache-hudi-f3b70e1b670?source=topics_v2---------8-84--------------------85385d89_10d3_4bb6_9f34_32a3b388c452-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tU9PRLR0yqrf34KV0PeFLw.png,data-science 1714,1357,Facility Location Model to Optimize Warehouse Placement and Demand,"Part 1: Assuming 5 facilities to build, find a customer cluster to be satisfied by these facilities. An #OperationResearch project by Md Morshedul Alam & Tanmoy Das. AI-powered optimization models can significantly contribute to determining the location of facilities to meet customer demands more effectively. …",https://medium.com/@tanmoyie/facility-location-model-to-optimize-warehouse-placement-and-demand-aaa45ead9f71?source=topics_v2---------9-84--------------------85385d89_10d3_4bb6_9f34_32a3b388c452-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vsx3pfs5tXbvEgJbealyVQ.png,data-science 1715,1358,Scripting is prototyping!,"Engineering software without using a compiler is like driving without a seat belt. When it comes to developing software, there are different approaches one can take. One common approach is using a compiler, which is a software tool that transforms source code written in a programming language into an executable program or binary module. This process ensures that the code is free of…",https://medium.com/germaneering/scripting-is-prototyping-e9858dfa2c09?source=topics_v2---------10-84--------------------8ba7bf05_63d0_4888_a535_c5258e114601-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LYmhmnqb3PyUwXkGD2KoVg.jpeg,data-science 1716,1359,BloombergGPT: The 50 Billion Parameter Large Language Model for Finance,"After the explosive success of ChatGPT, various industries are now developing their own GPT models tailored to their specific fields. The financial industry is no exception. On 3/30/2023, Bloomberg released a paper introducing BloombergGPT, a large language model with 50 billion parameters specifically trained on a wide range of financial…",https://medium.com/@jchen001/bloomberggpt-the-50-billion-parameter-large-language-model-for-finance-5d77b67fa891?source=topics_v2---------11-84--------------------8ba7bf05_63d0_4888_a535_c5258e114601-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hJz2XikID_OnQ53bc9NSeA.png,data-science 1717,1360,Apache Cassandra Explained,"Topics Covered: What is Apache Cassandra. Architecture. Data Modeling. KeySpace and Strategy. What is Apache Cassandra: Apache Cassandra is an open-source database that uses a distributed NoSQL architecture for high availability, scalability, and reliability. …",https://medium.com/dev-genius/apache-cassandra-explained-8130bc353c2a?source=topics_v2---------13-84--------------------8ba7bf05_63d0_4888_a535_c5258e114601-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0NJqiMKHx6ym3zernR04Wg.png,data-science 1718,1361,E-commerce Product Arbitrage: A Brief Introduction.,"The Introduction E-commerce arbitrage is an extremely complex and interesting enterprise with a huge profit-making potential. It has low entry barrier in terms of the amount of capital needed to start trading, high margins and short investment-to-profit cycles. My background is in the programming and data science, and this is…",https://medium.com/@denslov/e-commerce-product-arbitrage-a-brief-introduction-d1ef0e16164d?source=topics_v2---------17-84--------------------dd72a94c_cb9b_4322_961f_4e087b19aa7f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*I_Jr53HL1mHH6TAGbuWB-g.jpeg,data-science 1719,1362,Seaborn,"Seaborn is a popular Python library used for data visualization. Built on top of Matplotlib, Seaborn offers more aesthetically pleasing visualizations with minimal coding. In this article, we will cover some of the more advanced visualization techniques available in Seaborn. 1. Installing Seaborn To get started, you will need to install Seaborn. You…",https://medium.com/@zeynepilginkarakas/seaborn-71f96977db1f?source=topics_v2---------18-84--------------------dd72a94c_cb9b_4322_961f_4e087b19aa7f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9NALV84ztwDd0R9ObmJU9Q.png,data-science 1720,1363,5 mistakes I made while doing my first data analysis project,"Once upon a time when I first embarked on my data journey, learning to navigate through the rough waters of SQL and Python, I came across a number of notebooks on Kaggle. There was code, there were visuals, and there were inferences too but still, things weren’t adding up. There…",https://medium.com/@chat9sam/5-mistakes-i-made-while-doing-my-first-data-analysis-project-edf52f5cb353?source=topics_v2---------19-84--------------------dd72a94c_cb9b_4322_961f_4e087b19aa7f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-science 1721,1364,6 Vs of Big Data in the Data Engineering world,"In today’s high-tech environment, enormous amounts of data are produced every single second. Everyone uses data to improve the user experience, from established IT companies to emerging startups. In the realm of technology, data storage and processing is one of the hottest subjects. The 6Vs, or fundamental dimensions of big data, are given below. — Volume Volume is a big data dimension that deals with the sheer amount of data. Terabytes or even petabytes of data are generated every second by Facebook posts, Instagram stories, Twitter tweets, Youtube videos, and other online content. Every instant, more and more data is generated. Data storage has become a…",https://medium.com/@piyushgoyal343/6-vs-of-big-data-in-the-data-engineering-world-368fc4759454?source=topics_v2---------20-84--------------------dd72a94c_cb9b_4322_961f_4e087b19aa7f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*a3C7b21oxcMeev4_nZ5Qeg.jpeg,data-science 1722,1365,Dependency Inversion Principle(DIP) example using PHP.,"DIP states that entities should or must depend on abstractions and not on low the low-level module. By reading this article you will get a real-world understanding of how you can implement DIP into your projects. — Before we go ahead with the mean topic of this article, it would be great if you check out the articles below for a better understanding of what is to be discussed here. This is my final edition of SOLID examples using PHP. The previous articles had simple and real-world examples…",https://medium.com/@Omojunior11/dependency-inversion-principle-dip-example-using-php-1560507cce25?source=topics_v2---------21-84--------------------dd72a94c_cb9b_4322_961f_4e087b19aa7f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*GXxXWeDsb6HofMDB-ZfPBA.jpeg,data-science 1723,1366,Cool Python Libraries for Data Visualization That Will Blow Your Mind!,Cool Python Libraries for Data Visualization That Will Blow Your Mind! Are you tired of using the same old data visualization libraries in Python? Are you looking for something new and exciting to take your data visualizations to the next level? Look no further than these 5 cool Python libraries…,https://medium.com/@devpython345898/cool-python-libraries-for-data-visualization-that-will-blow-your-mind-77763e1ee733?source=topics_v2---------22-84--------------------dd72a94c_cb9b_4322_961f_4e087b19aa7f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*e5hbFGc0DGsReKFY4qb07w.jpeg,data-science 1724,1367,How to Create Network Graphs in Python?,"Networks graphs are useful when you want to see how sales of your products or product groups are dependent to each other. For example, if customers who buy A often also buy B, that means they are dependent products. Firstly you should have a data frame of orders which contains…",https://medium.com/@sdemez18/how-to-create-network-graphs-in-python-13875debd4d4?source=topics_v2---------23-84--------------------dd72a94c_cb9b_4322_961f_4e087b19aa7f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*UNYlSdZTirGh3CE8Bylnyw.png,data-science 1725,1368,Why you need to learn Python and the best resources to get started,"I’ve been thinking about writing on Medium for a long time, to get my creative juices flowing, to find something that’s a let out for me and also a way to share my life’s learnings. So here I begin, with penning down my first article on Medium... Today, I will…",https://medium.com/@ninad.mohan.m/why-you-need-to-learn-python-and-the-best-resources-to-get-started-d7eca2329935?source=topics_v2---------24-84--------------------dd72a94c_cb9b_4322_961f_4e087b19aa7f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-science 1726,1369,Data Logging and Data Qualities with Whylogs,"Making detecting and logging data issues and changes easier for Data Scientists, Machine Learning Engineers, and Data Engineers Introducing Whylogs Data is one of the most important elements in the Machine Learning process. It is relied upon to train models, generate predictions, and aid in making various decisions. Poor data quality can…",https://medium.com/@yanxinc/data-logging-and-data-qualities-with-whylogs-e569136ab9d3?source=topics_v2---------25-84--------------------dd72a94c_cb9b_4322_961f_4e087b19aa7f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*jqUEUQZUlL-dinlg.png,data-science 1727,1370,Thread Synchronization in Python,"Understanding Mutex Locks and Joins for Safe and Effective Multithreading in Python — What is the importance of synchronization? Let’s say there is a shared bank account with a balance of $50 that belongs to both you and your dad. NOTE: Dad earns money and saves it in the bank account without spending, whereas you, who do not earn any money, continue to spend it. If we put this…",https://medium.com/@13kaushik.k/thread-synchronization-in-python-eb92cbe9518a?source=topics_v2---------22-84--------------------e9eeb6cc_49a1_4327_936f_17dc9fc073f8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*RvCozkvzC2_nrLCv-FGq8w.jpeg,data-science 1728,1371,Finding an Edge: A Science Noir Stock Market Thriller: 01 — Gaps: 50/1 Cracks and Bumps (Case Study A),"I had a question, such as why people didn’t realize that the 80/20 could be 50/01. (Taleb, 2010)¹ Recap What do we know from the previous chapters? Well, everything will fail! Everything? Maybe only if you don’t know what you’re doing, like a ship without a rudder. We already knew from…",https://medium.com/@co.n.g/finding-an-edge-a-science-noir-stock-market-thriller-01-gaps-50-1-cracks-and-bumps-case-36ac52b84dd9?source=topics_v2---------24-84--------------------adca423d_4e47_433a_9f06_895a72e9efe8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oUngK-lcJvXsgmEk8ACM0w.jpeg,data-science 1729,1372,Using ChatGPT for Data Science,"ChatGPT is a state-of-the-art language model developed by OpenAI, trained on a massive dataset of text to generate natural language responses to a variety of prompts. Its advanced neural architecture allows it to understand and respond to complex queries, making it a powerful tool for a wide range of applications…",https://medium.com/@adnanned/using-chatgpt-for-data-science-2df78d6f49a1?source=topics_v2---------25-84--------------------adca423d_4e47_433a_9f06_895a72e9efe8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*nL-fdoR0uugs-0FzJqr5XQ.png,data-science 1730,1373,Interacting with Pinecone Indexes in Langchain Demistified : Mastering Pinecone DB for Retrieval QA,The video explanation of the presentation is below,https://medium.com/@kamaljp/interacting-with-pinecone-indexes-in-langchain-demistified-mastering-pinecone-db-for-retrieval-qa-3dfc4fc61b7b?source=topics_v2---------26-84--------------------adca423d_4e47_433a_9f06_895a72e9efe8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-science 1731,1374,TLDR: How to Stream Data from a Movella DOT with a Mac and Python,"This is a quickstart version of How to Stream Data from a Movella DOT with a Mac and Python. If you’re new to Python and Bluetooth, check out that article. This code will allow you to get Free Acceleration data (X, Y, and Z of the accelerometer) from a Movella…",https://medium.com/@protobioengineering/tldr-how-to-stream-data-from-a-movella-dot-with-a-mac-and-python-70f42d756ca6?source=topics_v2---------28-84--------------------adca423d_4e47_433a_9f06_895a72e9efe8-------17,https://miro.medium.com/v2/resize:fill:140:140/0*VaXqJTepZzqDJF3f,data-science 1732,1375,Getting Started with Graphs and NetworkX in Python,"Your Dose of Scientific Python — Graphs are a fundamental mathematical concept used to represent relationships and connections between entities. They have a wide range of applications across various fields, including social sciences, computer science, biology, and finance. Graphs can be used to model complex systems, analyze data, and make predictions. One popular tool for working…",https://medium.com/@mathcube7/getting-started-with-graphs-and-networkx-in-python-8dd110f2421b?source=topics_v2---------29-84--------------------adca423d_4e47_433a_9f06_895a72e9efe8-------17,https://miro.medium.com/v2/resize:fill:140:140/0*JyHtGuH6hITaQ-d3,data-science 1733,1376,Benford’s Law to Detect Fake Data,"Mathematics often reveals intriguing patterns in our day-to-day lives, and one such phenomenon is Benford’s law. This law describes the surprising but simple pattern observed in real-life data. When dealing with diverse data sets such as currency amounts, population sizes, or building heights, the range of values can be wide…",https://medium.com/datadriveninvestor/benfords-law-to-detect-fake-data-ab70b0fa174b?source=topics_v2---------31-84--------------------adca423d_4e47_433a_9f06_895a72e9efe8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Y_oVz5um9uS9tCrtZSiIDg.png,data-science 1734,1338,"Augmenting Text using Large Language Models: GPT-2, GPT-3, BERT","Artificial Intelligence is transforming the way we interact with information and improving the efficiency of various industries. One such application of AI is in testing tools where it helps to generate questions and answers to verify the functionality of the system. However, these generated questions and answers often lack the…",https://medium.com/@iqra.bismi/augmenting-text-using-large-language-models-gpt-2-gpt-3-bert-b6ca8008d85d?source=topics_v2---------35-84--------------------fee38fa2_b621_42ee_b930_359c3527d673-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yIutiAYciY5cSMRkASio8g.png,data-science 1735,1377,Interpreting Model Coefficients — Logistic Regression for Machine Learning,"When it comes to analyzing data, regression analysis is a popular statistical method used to model the relationship between a dependent variable and one or more independent variables. Two of the most commonly used regression models are linear regression and logistic regression. …",https://medium.com/@ck1894/interpreting-model-coefficients-logistic-regression-for-machine-learning-d96d01402c5a?source=topics_v2---------36-84--------------------fee38fa2_b621_42ee_b930_359c3527d673-------17,https://miro.medium.com/v2/resize:fill:140:140/1*i-tykrY-FWy0wPE2e7ZT6Q.jpeg,data-science 1736,1378,How To Understand Computational Irreducibility,"This enigmatic concept is fundamental to AI and cybersecurity! — Computational irreducibility is a concept that dates back to the 1980s. What got me particularly interested in this topic is Stephen Wolfram’s contemporary take on it. At its core, Wolfram’s notion of computational irreducibility says that some systems or processes cannot be simplified or accelerated beyond their natural course. …",https://medium.com/street-science/how-to-understand-computational-irreducibility-2e1d12ce5cc1?source=topics_v2---------37-84--------------------fee38fa2_b621_42ee_b930_359c3527d673-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ajRvT-fgs01Iae-mXw8bzA.png,data-science 1737,1379,SQL Exercises with 13 Questions and Solutions,"Hi everyone; In this set of exercises, we will explore SQL and T-SQL. Through these exercises, we will practice various SQL and T-SQL queries to help you sharpen your skills and enhance your understanding of these languages. Whether you are a beginner or an experienced user, these exercises will help…",https://medium.com/@hakanmazi123/sql-exercises-with-13-questions-and-solutions-ea2c03aaa577?source=topics_v2---------38-84--------------------8d38d962_3b43_4d27_b442_03f6c9830335-------17,https://miro.medium.com/v2/resize:fill:140:140/1*nN38IjBFXT32-ByRBdNF_g.png,data-science 1738,1380,Data always speak the truth,"The previous months I was curious about the growth my technology blog https://blog.geralexgr.com could have and this is why I tried to make an estimation based on previous data and a forecast model. Before six months, when my technology blog had around 100k views I created the below article which…",https://medium.com/@geralexgr/data-always-speak-the-truth-b25ec63a9c88?source=topics_v2---------39-84--------------------8d38d962_3b43_4d27_b442_03f6c9830335-------17,https://miro.medium.com/v2/resize:fill:140:140/0*A6QzlnhmWsUoJpvE,data-science 1739,1381,Pyspark or Polars — What should you use? A Complete Breakdown of similarities and differences.,"The data processing landscape is continually evolving, with new libraries and frameworks emerging to cater to different needs. With Polars getting all the praise and attention recently from the data community, there are also questions on why you should choose it over Pyspark. Both libraries are designed to manipulate large…",https://medium.com/@viv1kv/pyspark-or-polars-what-should-you-use-breakdown-of-similarities-and-differences-b261a825b9d6?source=topics_v2---------40-84--------------------8d38d962_3b43_4d27_b442_03f6c9830335-------17,https://miro.medium.com/v2/resize:fill:140:140/1*x5Hi2GbrgBpmvEoQm3E8pA.png,data-science 1740,1382,How To Build Event Streaming Pipelines Using Kafka,"How To Build Event Streaming Pipelines Using Kafka Welcome to “How To Build Event Streaming Pipelines Using Kafka”! By Reading this article, you will learn how to: Describe the core components of Kafka. Use Kafka for writing and reading streams of events. Use Kafka for consuming events, either as they…",https://medium.com/@ansam.yousry/how-to-build-event-streaming-pipelines-using-kafka-432fbe35c2b?source=topics_v2---------41-84--------------------8d38d962_3b43_4d27_b442_03f6c9830335-------17,https://miro.medium.com/v2/resize:fill:140:140/0*JlAMhnHLnbVDo_M7.png,data-science 1741,1383,AI Won’t Replace Translators,"It’s 1960 all over again — In a recent study, the University of Pennsylvania and OpenAI investigated the potential impact of large language models (LLM), such as GPT models, on various jobs. GPTs are GPTs: An Early Look at the Labor Market Impact Potential of Large Language Models (Eloundou et al., 2023) Their main finding is…",https://medium.com/towards-data-science/ai-wont-replace-translators-b8d9b546285c?source=topics_v2---------44-84--------------------58f03471_dffa_4440_80a7_59becd42e31d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*K_clps3zwZ-eHzQPfbjNwQ.png,data-science 1742,1384,Telecom Churn Prediction with Deep Learning: A Full-Stack Data Science Project in Action,"Leveraging Deep Learning, TensorFlow, Keras, Flask, AWS, and PowerBI to build an end-to-end churn prediction solution for the telecom industry Introduction Hello, Medium community! I’m excited to introduce my latest project: a telecom churn prediction system using Deep Learning with Artificial Neural Networks (ANN) built with TensorFlow Keras. Churn prediction is…",https://medium.com/@yogeshvar_m/telecom-churn-prediction-with-deep-learning-a-full-stack-data-science-project-in-action-10462ece26b4?source=topics_v2---------45-84--------------------58f03471_dffa_4440_80a7_59becd42e31d-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*m6KeRnxROTabkaEAyxUJ2g.gif,data-science 1743,1151,All about Ensemble Learning,"Q: What is ensemble learning? A: Ensemble learning is a machine learning technique that involves combining multiple models to create a stronger model. The idea behind ensemble learning is that combining multiple models can lead to better performance and more robust predictions than using a single model. Q: How does…",https://medium.com/@thedatabeast/all-about-ensemble-learning-35158c82d713?source=topics_v2---------46-84--------------------953ee93f_31ea_4ddc_94e4_222bfdba4128-------17,https://miro.medium.com/v2/resize:fill:140:140/0*JRyjFybwZ5m02Zhw.png,data-science 1744,1385,Getting Started with NLTK: 10 Essential Examples for Natural Language Processing in Python,"Getting Started with NLTK: 10 Essential Examples for Natural Language Processing in Python Installing NLTK Before we get started, you need to make sure that you have NLTK installed on your system. You can install it using pip, the package installer for Python. Open your terminal or command prompt…",https://medium.com/@bobbymistery/getting-started-with-nltk-10-essential-examples-for-natural-language-processing-in-python-54451eae1366?source=topics_v2---------47-84--------------------953ee93f_31ea_4ddc_94e4_222bfdba4128-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-science 1745,1386,Count Down to the Future with Python,"Can’t wait for your birthday? How long to Christmas? How many days until that one event? Let’s use Python to create a function that counts down to a date and time in the future. The function should take a date and time and return a string like: 44 Days, 13…",https://medium.com/@BetterEverything/count-down-to-the-future-with-python-c6200625a8fa?source=topics_v2---------48-84--------------------953ee93f_31ea_4ddc_94e4_222bfdba4128-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OJKoSV8ebSrYM5hIA3GIcw.jpeg,data-science 1746,1387,Do Not Underestimate the Importance of Organizational Culture in Data Science Initiative,"“Data-driven transformation is not a destination, it’s a journey of continuous improvement.” — Satya Nadella Culture is an integral component of any organization. It encompasses the shared values, beliefs, attitudes, behaviors, and practices that define the way people within an organization interact with each other and approach their work. Peter…",https://medium.com/@andikarachman/do-not-underestimate-the-importance-of-organizational-culture-in-data-science-initiative-192c115261e9?source=topics_v2---------54-84--------------------953ee93f_31ea_4ddc_94e4_222bfdba4128-------17,https://miro.medium.com/v2/resize:fill:140:140/1*nbsGtqR6TONwLaiRo0nWFg.jpeg,data-science 1747,1388,Introduction to Data Science and Business Analytics,"Data science and business analytics are two fields that have rapidly gained popularity over the last decade. In today’s data-driven business landscape, organizations are relying more and more on data to make informed decisions, improve efficiency, and gain a competitive edge. …",https://medium.com/@davidtgondo/introduction-to-data-science-and-business-analytics-25aa807a761a?source=topics_v2---------63-84--------------------2c2b4440_c94b_432b_b33a_25fa2efcc3b7-------17,https://miro.medium.com/v2/resize:fill:140:140/0*2la8Xoe4mgUfXKho,data-science 1748,1389,Be a Succesful Data Scientist in 2023,"As we enter the year of 2023, the field of data science is continuing to grow and evolve at an unprecedented rate. As such, the requirements, and expectations of being a successful data scientist are also changing at an unprecedented rate. …",https://medium.com/@rshowrav/be-a-succesful-data-scientist-in-2023-d3f77ac2fead?source=topics_v2---------65-84--------------------2c2b4440_c94b_432b_b33a_25fa2efcc3b7-------17,https://miro.medium.com/v2/resize:fill:140:140/0*4XstVJKOS-_XNfq6,data-science 1749,1276,The TD Moving Average II in Python,"Coding the TD Moving Average II in Python — Tom Demark has created many interesting indicators, among them is the TD Moving Average II, an overlay technique that aims to reduce lag by incorporating a rate-of-change calculation. This article presents the concept of moving averages and shows how to code the TD Moving Average II. For a detailed and…",https://medium.com/@kaabar-sofien/the-td-moving-average-ii-in-python-24679136c9c?source=topics_v2---------73-84--------------------d9b8c9c8_bebf_4007_9e8a_6994dc042012-------17,https://miro.medium.com/v2/resize:fill:140:140/0*BzFL0DoonvRbcWyg.jpg,data-science 1750,1390,SQL Interview Questions — Theory,What are the various types of commands in SQL? What is difference between DROP and TRUNCATE? What is the difference between DELETE and TRUNCATE? What is the difference between HAVING and WHERE? What is the difference between GROUP BY and PARTITION BY? Explain different kinds of joins. What is the…,https://medium.com/@saichandark34/sql-interview-questions-theory-b02bc5405143?source=topics_v2---------74-84--------------------d9b8c9c8_bebf_4007_9e8a_6994dc042012-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-science 1751,1391,How to Retrieve Match Statistics using Network Requests and Python’s Requests Library: A Guide with Code Example,"Getting all match stats can be a daunting task, especially if you are an Indian football fan who doesn’t have access to high-quality data via platforms like Wyscout or Opta. Fortunately, with network requests, you can easily get all the match stats you need. …",https://medium.com/@joyansbhathena/how-to-retrieve-match-statistics-using-network-requests-and-pythons-requests-library-a-guide-with-6be00e929927?source=topics_v2---------76-84--------------------d9b8c9c8_bebf_4007_9e8a_6994dc042012-------17,https://miro.medium.com/v2/resize:fill:140:140/0*_fnj45oLp0xSVvvn.png,data-science 1752,1392,"Exploring Different Types of Datasets: Numerical, Categorical, Time-Series, and Spatial.","Data is the driving force behind decision-making in today’s world. But as Gregory Fell and Mike Barlow would argue, not all data is created equal. Data comes in different forms, and understanding the different types of data sets is crucial to making sense of it. …",https://medium.com/@shashankgollapalli/exploring-different-types-of-datasets-numerical-categorical-time-series-and-spatial-a808195acaa0?source=topics_v2---------79-84--------------------d9b8c9c8_bebf_4007_9e8a_6994dc042012-------17,https://miro.medium.com/v2/resize:fill:140:140/1*IFPZ7y8H4sFvO1kAVSrscw.png,data-science 1753,1393,Top 10 SQL interview questions for beginners,"Compylo presents you with the most important SQL interview questions for beginners. In this blog, we have taken the reference of SQL server 2019. Which SQL Joins have you used in your projects? Inner join, Left outer join, Right outer join, Full outer join, Cross join Which data types are…",https://medium.com/@compylo/top-10-sql-interview-questions-for-beginners-f997d0d020ba?source=topics_v2---------81-84--------------------d9b8c9c8_bebf_4007_9e8a_6994dc042012-------17,https://miro.medium.com/v2/resize:fill:140:140/1*moZ8-44ATnJqdfbBFvaElA.png,data-science 1754,1394,Optimizing your queries using window functions,"SQL has valuable features for us to manipulate data. Unfortunately, some of them still need to be discovered by beginners and intermediate SQL users, and the window function is one of these features. What a window function is The window function is a function that performs the calculation of measurements of a specific grouping of…",https://medium.com/@lucasneris/optimizing-your-queries-using-window-functions-f4b22618293e?source=topics_v2---------82-84--------------------9ec4ce17_aae5_4d4f_841f_dc2a003d3deb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Gjz1O0S_koXc7fg2eNGZ-w.png,data-science 1755,1395,Lyrics Analysis with NLP Techniques (4): Sentiment Analysis on Albums,"Previously, we made some word clouds on the albums made by John Mayer. Today, we will deep dive into content analysis to figure out what sentiment each album carries. We will use tools provided by Hugging Face for sentiment analysis in this tutorial. Prepare a List of Lyrics As usual…",https://medium.com/@cd_24/lyrics-analysis-with-nlp-techniques-4-sentiment-analysis-on-albums-88363eac33fb?source=topics_v2---------88-84--------------------9ec4ce17_aae5_4d4f_841f_dc2a003d3deb-------17,https://miro.medium.com/v2/resize:fill:140:140/0*R_SDDsjgz_7CvxZe,data-science 1756,1396,VP of Analytics- what to do in first 6 months?,"Congratulations! You are the VP of Analytics! You is responsible for driving the vision, strategy, and delivery of our analytics efforts across multiple functions at your company. …",https://medium.com/@fahadthedatascientist/vp-of-analytics-what-to-do-in-first-6-months-ce11de7839e0?source=topics_v2---------92-84--------------------c69516bd_f2fd_41ad_b632_5506c898c4bc-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EeZtDZY4HOhtzoz3V24Ujw@2x.jpeg,data-science 1757,1397,Materialized Views in Google BigQuery,"Google BigQuery is a cloud-based data warehouse that allows you to quickly and easily store, analyse, and retrieve large amounts of data. Materialized views are one of BigQuery’s powerful features, allowing users to pre-compute and store query results for faster retrieval. Materialized views are tables that are created as a…",https://medium.com/brilliant-programmer/materialized-views-in-google-bigquery-eeb0badc7144?source=topics_v2---------94-84--------------------c69516bd_f2fd_41ad_b632_5506c898c4bc-------17,https://miro.medium.com/v2/resize:fill:140:140/0*XzD6dpaw9pG8xoBE.png,data-science 1758,1398,How technology is shaped by Physics?,"Introduction The field of Physics is a big one, and it's important to understand how it shapes modern technology. The Uncertainty Principle is an example of how physics can influence how we view the world around us. …",https://medium.com/@janmohiz38/how-technology-is-shaped-by-physics-9184198df7f9?source=topics_v2---------95-84--------------------c69516bd_f2fd_41ad_b632_5506c898c4bc-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-science 1759,1399,The Practical Data Engineering Resource,The Awesome Data Engineering Resource (Keep Updating) — The data engineering space is evolving. Here are the resources I collected for practical data engineering resources. Last Updated: 2023–04–02 Books The Master Book On Distributed System: Designing Data-Intensive Application The SQL Fundamental Book: T-SQL Querying (Developer Reference) OLAP/Data Warehouse Must Read: The Data Warehouse Toolkit (The Definitive Guide to Dimensional…,https://medium.com/data-engineering-space/the-practical-data-engineering-resource-1dc50de9c0e3?source=topics_v2---------100-84--------------------07627a60_4bd2_4cc5_a04d_9dd9d627be8c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*VmP6KIrJ3nBOvmshpCT7SA.jpeg,data-science 1760,1400,Increasingly complex data pipelines,"Introduction Data pipelines are a series of steps that are used to extract, transform, and load data from one system to another. This is a critical process for data-driven businesses, as it allows them to quickly access and analyze large volumes of data for decision-making and other purposes. Data pipelines can…",https://medium.com/dataprophet/increasingly-complex-data-pipelines-246785346201?source=topics_v2---------101-84--------------------07627a60_4bd2_4cc5_a04d_9dd9d627be8c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*bv986nr9ZlYDkH19,data-science 1761,1401,Best Practices for Migrating Your SQL Server to Azure SQL,"Migrating your SQL Server to Azure SQL can transform your organization by providing scalability, high availability, and cost-effective data storage solutions. A successful migration, on the other hand, needs careful planning and best practices. In this story, we will go over the necessary steps for a smooth transition to Azure…",https://medium.com/@ruimigueltcarvalho/best-practices-for-migrating-your-sql-server-to-azure-sql-cc72c6849bc4?source=topics_v2---------103-84--------------------07627a60_4bd2_4cc5_a04d_9dd9d627be8c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*QmFXAtWnb0mZeUBu,data-science 1762,1402,Part I : Analyzing Unique Occurrences and Penetration Rates with Python.,Online Retail Data Set from ML Repository Penetration rate is a key metric that is used in retail and trading industry to measure the effectiveness of sales and marketing strategies. It is the percentage of total potential market or customers that have bought a particular product or service over a given period of time. In this article…,https://medium.com/@myleather.brand/part-i-analyzing-unique-occurrences-and-penetration-rates-with-python-6ff918f5918?source=topics_v2---------104-84--------------------07627a60_4bd2_4cc5_a04d_9dd9d627be8c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JggVOHxoytVanCvg2LPzJA.jpeg,data-science 1763,1403,Unsupervised Learning in R: Density Based Clustering,"In the previous posts of this series, I covered methods to determine the optimal number of clusters, how k-means , k-medoids, and hierarchical clustering algorithms work in detail. In this fifth post of the Unsupervised Learning in R series, I will try to explain Density Based Clustering algorithm. …",https://medium.com/@ozturkfemre/unsupervised-learning-in-r-density-based-clustering-774341a13519?source=topics_v2---------105-84--------------------07627a60_4bd2_4cc5_a04d_9dd9d627be8c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JhQQpWFOgsHm7ve3_cH-jQ.jpeg,data-science 1764,1400,Data Observability Tools: Data Engineering’s Next Frontier,"Introduction Data observability tools are becoming increasingly important for data engineering teams as they strive to improve data quality, reliability, and accuracy. Data observability tools allow engineers to monitor and analyze data in real-time and detect anomalies. These tools provide visibility into how data is being used and how it is…",https://medium.com/dataprophet/data-observability-tools-data-engineerings-next-frontier-9faf15c417cc?source=topics_v2---------107-84--------------------07627a60_4bd2_4cc5_a04d_9dd9d627be8c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*U3Cru3JV8UrwsJl6,data-science 1765,1404,Quantitative Survey Analytics,Analysing a Likert scale based Quantitative Survey in Python in order to inform decision making This Dataset comes from the Rosenberg Self Esteem Survey which can be found in Kaggle. The data is already tidied as well as numerically encoded. This means that the Likert Scales as well as some…,https://medium.com/@ioannidis.au/quantitative-survey-analytics-b5bbe8f9ac91?source=topics_v2---------108-84--------------------07627a60_4bd2_4cc5_a04d_9dd9d627be8c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1ySdm9aH7lsGjgsRTgNTYA.png,data-science 1766,1405,Introduction To Tidyverse: Filter Dataset Using R Programming Language Part-01,"Filter Data Using tidyverse — filter(dataset, col1 > some_condition, col2 == condition, ...) The first argument is the data frame to apply the function; the next are the string-together conditions necessary to obtain the desired filtered dataset. The second argument is the condition evaluates to a boolean(TRUE/FALSE) on col1. Like the second argument, the third…",https://medium.com/@ai.mlresearcher/introduction-to-tidyverse-filter-dataset-using-r-programming-language-part-01-826fefe149bd?source=topics_v2---------109-84--------------------07627a60_4bd2_4cc5_a04d_9dd9d627be8c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*-MxFaZKcjOz3y3Q8,data-science 1767,1406,Anatomy of SQL Window Functions,"Back To Basics | SQL fundamentals for beginners — In order to understand the enterprise data; you have to query it a lot. When I say ‘A lot’, I mean it. Working with unfamiliar piles of data is often daunting and it’s always a good practice to take some time to explore and understand the data itself. …",https://medium.com/towards-data-science/anatomy-of-sql-window-functions-7256d8cf509a?source=topics_v2---------112-84--------------------5f044d5c_0718_45d5_ba4c_081fc1904983-------17,https://miro.medium.com/v2/resize:fill:140:140/1*KulbfazB46GKYjzkRdeDQg.png,data-science 1768,1407,Detecting fraud? 7 Strategies for Implementing Data Science in Fraud Detection,"I once worked on a project to use data science for fraud detection. My initial approach was to use machine learning algorithms to identify anomalies in large data sets. Unfortunately, this approach failed as the model was unable to identify the underlying patterns in the data. I then decided to…",https://medium.com/@roger-babecki/detecting-fraud-7-strategies-for-implementing-data-science-in-fraud-detection-9311ebe04d37?source=topics_v2---------117-84--------------------aded3a69_6c12_4e32_998e_3b417c24e45f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*0h08qCBiFcUd_2Rn,data-science 1769,1408,The ultimate guide to Pandas’ read_csv() function,"Here I unravel the mysteries behind the omnipotent and overwhelmingly complicated read_csv() function, including new features added in Pandas 2.0. — With 3 engines and over 50 parameters to choose from, Pandas’ miraculous read_csv() function is the one-stop-shop for all your text file reading needs. But how does it actually work its magic under the hood? No-one actually knows. Until now. CSV Data and Pandas",https://medium.com/itnext/the-ultimate-guide-to-pandas-read-csv-function-5377874e27d5?source=topics_v2---------118-84--------------------aded3a69_6c12_4e32_998e_3b417c24e45f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MD8Dnb_Pb2ZeLq5k5ZG4Qg.png,data-science 1770,1409,Carbon Footprint: Why Common Claims May Not Be Accurate,"Creating robust CO₂ scenarios for data-driven climate action — The effects of climate change are becoming increasingly visible around the world, from devastating wildfires to record-breaking heat waves and hurricanes. As a result, more and more people are looking for ways to reduce their carbon footprint and help mitigate the impact of climate change. However, it can be hard…",https://medium.com/towards-data-science/carbon-footprint-why-common-claims-may-not-be-accurate-6f7860a7f08b?source=topics_v2---------120-84--------------------aded3a69_6c12_4e32_998e_3b417c24e45f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DRvcuyKP4qXCfgS1hhSyJQ.png,data-science 1771,1410,Interesting Python Automation Projects with Source Code to start building your Portfolio,"“Computer programming is quickly becoming an essential career skill. Learning to code is a fantastic opportunity equalizer — if you’re good at it, it can help you achieve your dreams.” — Cory Booker, U.S. Senator, New Jersey Building a portfolio is important if you want to become a developer because…",https://medium.com/@luisprooc/interesting-python-automation-projects-with-source-code-to-start-building-your-portfolio-8d19d25aaf0b?source=topics_v2---------121-84--------------------aded3a69_6c12_4e32_998e_3b417c24e45f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qPXXtNILMNzAcFOrqe9Uiw.jpeg,data-science 1772,1411,Learn to use dbt as a pro: 6 tips to take the best use of dbt tool and leverage your coding skills,"Dbt (data build tool) is a popular open-source data transformation tool that allows developers, data analysts, data engineers to build and manage data transformation pipelines. Here are some of the ways you can leverage dbt to maximize its potential. Modularized code in dbt Modularized code is a key feature of dbt. It allows you…",https://medium.com/@minhthynguyenngoc/learn-to-use-dbt-as-a-pro-6-tips-to-take-the-best-use-of-dbt-tool-and-leverage-your-coding-skills-516186dd3f25?source=topics_v2---------124-84--------------------aded3a69_6c12_4e32_998e_3b417c24e45f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Q6c-dzrub5lBMQyh.png,data-science 1773,1412,What is Spatial Indexing?,"Spatial indexing is the process of organizing and optimizing the storage and retrieval of spatial data, such as geographic data, based on their spatial properties. It involves dividing the data into smaller, manageable chunks, typically using a hierarchical data structure, to improve the efficiency of spatial queries. In the context…",https://medium.com/@dagali/what-is-spatial-indexing-8b81fd14cc52?source=topics_v2---------125-84--------------------81f66540_8de9_48b3_8966_e9dbf8da96e5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*86qqIvehz_xdkB1v.png,data-science 1774,1413,Marketing Measurement-1: The Intuition Behind Incrementality,"Call it AB Testing, Experimental Design, or the good-old Test-Control Analysis — measuring marketing effectiveness is all about Incrementality. — For marketers, analysts, or data scientists — marketing measurement is one of the oldest problems to have existed since the inception of marketing. Measuring marketing effectiveness is a crucial aspect of any data-driven marketing strategy, and data scientists play a vital role in this process. It’s all about data. Leaders…",https://medium.com/towards-artificial-intelligence/measuring-marketing-effectiveness-the-intuition-behind-incrementality-9f56af880ad2?source=topics_v2---------126-84--------------------81f66540_8de9_48b3_8966_e9dbf8da96e5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*MK_Itz7KPNXyVvd6,data-science 1775,1414,What’s The Real Value of Data For Business?,"Data Engineering Beyond Hype #5 — As businesses become more data-driven, the importance of data has increased exponentially. But what is the real value of data for business? In this article, we will explore the impact of data on various industries through real-life case studies. We will also discuss what data professionals can learn from these…",https://medium.com/@withsaikat/whats-the-real-value-of-data-for-business-dc380822a90f?source=topics_v2---------133-84--------------------81f66540_8de9_48b3_8966_e9dbf8da96e5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_potcnt16eXYy412z2BClQ.jpeg,data-science 1776,1415,Functions of Data Frames in R for Data Analysis,"As a data analyst, much of your work will depend on data frames. If you don’t create a data frame, your ability to work with your data will be limited. Data frames are usually the starting point for analyzing data in R. So it’s important to understand the characteristics of…",https://medium.com/@saralsainis/functions-of-data-frames-in-r-for-data-analysis-f94165c40671?source=topics_v2---------134-84--------------------81f66540_8de9_48b3_8966_e9dbf8da96e5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*AvOAgMEKqxZ079oK.png,data-science 1777,1416,How to write for Data And Beyond,"My new publication aimed at attracting high-quality reproducible stories about data and related topics, including Data Science, Machine Learning, Artificial Intelligence, Programming, and Technology — One of the benefits of paid Medium membership is the ability to create new publications. Because most of my stories have not been published elsewhere, I have decided to create a new one, called Data And Beyond:",https://medium.com/data-and-beyond/how-to-write-for-data-and-beyond-b83ff0f3813e?source=topics_v2---------137-84--------------------2574f654_9b3b_42a2_8ff6_86d62e6a85ef-------17,https://miro.medium.com/v2/resize:fill:140:140/0*i1_ohV7NJlEO7VMz,data-science 1778,1417,Optimize code in python using *args and **kwargs,Python offers the flexibility of passing a variable number of arguments to a function using *argsand **kwargs. *args The *args parameter is used when passing a variable number of non-keyworded arguments to a function. …,https://medium.com/@sandhyakrishnan02/args-and-kwargs-in-python-20f189eeb557?source=topics_v2---------138-84--------------------2574f654_9b3b_42a2_8ff6_86d62e6a85ef-------17,https://miro.medium.com/v2/resize:fill:140:140/1*21JBhrZoKoKkzNCE-w23wg.jpeg,data-science 1779,1418,How to Query Data on Elasticsearch — From Zero to Hero!,"Get Started to Kibana Query Language and Lucerne Syntax — Choosing the right Data Store is crucial for managing large volumes of data efficiently. One option that has been gaining popularity in recent years is Elasticsearch, a distributed and highly scalable search and analytics engine. Elasticsearch is popular as a data store for its ability to handle real-time data streams…",https://medium.com/forcodesake/query-data-on-elasticsearch-kibana-lucerne-datascience-datavisualization-devops-dashboard-visualization-9163a7e9b6f6?source=topics_v2---------139-84--------------------2574f654_9b3b_42a2_8ff6_86d62e6a85ef-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pVOumzxkwgpqJjB5_A6qTw.png,data-science 1780,1419,A Machine Learning Solution to Air Pollution Problem In Chiang Mai,"In this blog, I will show my machine learning approach to understand, model, and propose a solution to the high PM2.5 in Chiang Mai due to agricultural burning activities. The first step to solving the air pollution problem in any city is to understand the source of the problem at…",https://medium.com/@worasom/a-machine-learning-approach-to-solve-air-pollution-problem-in-chiang-mai-9c234ddadcd8?source=topics_v2---------140-84--------------------2574f654_9b3b_42a2_8ff6_86d62e6a85ef-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*I5CLQ7cN01LGjkBaENH_mg.gif,data-science 1781,1420,Exploratory Data Analysis of Iowa Liquor Sales(Nov 2015),"The blog is about my project on Exploratory Data Analysis of Liquor sales in Iowa, US , for the month of November 2015. What is Exploratory Data Analysis and why is it important? The process, data analysis actually signifies the process of getting insights from the data that we have…",https://medium.com/@ghost.smith1290/exploratory-data-analysis-of-iowa-liquor-sales-nov-2015-e7f926e532dd?source=topics_v2---------142-84--------------------2574f654_9b3b_42a2_8ff6_86d62e6a85ef-------17,https://miro.medium.com/v2/resize:fill:140:140/1*iORtF64J2aVC5XUSaAWPag.jpeg,data-science 1782,1421,Media Mix Modeling: Technical Guideline to Overcome Pitfalls for Data Scientists,"How to Understand Outputs and Maximize its Practical Application — TLDR: Media Mix Modeling (MMM) is a statistical approach for marketing measurement, but it’s not a “One size fits all” solution like other techniques. …",https://medium.com/towards-data-science/media-mix-modeling-technical-guideline-to-overcome-pitfalls-for-a-smarter-decision-making-e677165f9140?source=topics_v2---------143-84--------------------2574f654_9b3b_42a2_8ff6_86d62e6a85ef-------17,https://miro.medium.com/v2/resize:fill:140:140/0*x4ngSZZ7RGZQvSKi,data-science 1783,1422,Cryptocurrency Analysis with Python: Load and visualize Data,Cryptocurrencies have become increasingly popular in recent years and many investors are looking to analyze the price movements of various cryptocurrencies to make informed decisions. One of the key aspects of analyzing cryptocurrency prices is the ability to load and visualize data in an easily understandable way. This tutorial will…,https://medium.com/@microbioscopicdata/cryptocurrency-analysis-with-python-load-and-visualize-data-17a26e1b6c9e?source=topics_v2---------144-84--------------------2574f654_9b3b_42a2_8ff6_86d62e6a85ef-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*RMndW71oyvPAAFFewv39lQ.gif,data-science 1784,1423,Discovering Clustering: An Introduction with Python Code Examples for Unsupervised Learning,"Are you new to the world of data science and feeling overwhelmed by the sheer amount of information out there? Don’t worry, you’re not alone! When I first started learning about unsupervised learning, I thought it sounded like something out of a sci-fi movie, and I wasn’t sure where to…",https://medium.com/@ybezginova2021/discovering-clustering-an-introduction-with-python-code-examples-for-unsupervised-learning-4b2190feab46?source=topics_v2---------145-84--------------------84ff4020_e5de_477c_abad_42f660352d41-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SNQfeMLgGDnyk0dNhhdG5A.png,data-science 1785,1424,Dreadlocks have become a common hairstyle among rappers in the music industry.,"Dreadlocks have become a common hairstyle among rappers in the music industry. From Kendrick Lamar to Lil Wayne, we’ve seen many rappers sporting this iconic hairstyle. But have you ever wondered why this is so? One reason could be the cultural significance of dreadlocks. For many people, especially those of…",https://medium.com/@plug.locs/dreadlocks-have-become-a-common-hairstyle-among-rappers-in-the-music-industry-289bd7edb320?source=topics_v2---------146-84--------------------84ff4020_e5de_477c_abad_42f660352d41-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-science 1786,1425,What is the Overall Diversity Profile of The Organization?,"A Data Analysis and Termination Prediction Using Human Resources Data Set from Kaggle — Introduction As the business world evolves, companies are increasingly relying on data to inform their decision-making processes. This is where data science comes in — it is the field of extracting insights and knowledge from data using a combination of statistical analysis, machine learning, and programming skills. …",https://medium.com/@althorman/what-is-the-overall-diversity-profile-of-the-organization-f4eaf1280492?source=topics_v2---------148-84--------------------84ff4020_e5de_477c_abad_42f660352d41-------17,https://miro.medium.com/v2/resize:fill:140:140/1*uBixHr5OGbfqZOEkZHCQKA.jpeg,data-science 1787,1426,HR Analytics Using Power BI,"Analyzing Employee Attendance and Leave Data The human resource department is an integral part of every organization, and managing employee attendance and leave data is one of its core responsibilities. Analyzing this data can provide insights into employee performance, productivity, and overall well-being. Power BI is a powerful tool that…",https://medium.com/@lolithasherley7/hr-analytics-using-power-bi-b979eb7af718?source=topics_v2---------149-84--------------------84ff4020_e5de_477c_abad_42f660352d41-------17,https://miro.medium.com/v2/resize:fill:140:140/1*c4El0uJbGEV9Txw2BmSPZw.png,data-science 1788,1427,AI in Maritime Cartography,"The integration of Artificial Intelligence (AI) has significantly impacted the field of maritime cartography and has become a vital tool in mapping the world’s oceans and coasts. AI-based technologies have transformed the way data is collected and processed, offering more rapid, efficient, and accurate results. Bathymetric maps depict the ocean floor…",https://medium.com/@h-sadki/ai-in-maritime-cartography-428d8ac4955a?source=topics_v2---------150-84--------------------84ff4020_e5de_477c_abad_42f660352d41-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kHcRNg08mi0h26iAtuis_w.jpeg,data-science 1789,1428,Mastering SQL Joins: An In-Depth Guide to Advanced Techniques,"SQL joins are a fundamental aspect of querying data from multiple tables in a relational database. They allow you to combine data from different tables based on shared columns or keys, enabling complex analysis and reporting. …",https://medium.com/@abdelilah.moulida/mastering-sql-joins-an-in-depth-guide-to-advanced-techniques-743101f1b904?source=topics_v2---------151-84--------------------84ff4020_e5de_477c_abad_42f660352d41-------17,https://miro.medium.com/v2/resize:fill:140:140/0*r3xtOI72Y3RBY4OK,data-science 1790,233,I Am Bad At Coding- Learn From My Mistake And Avoid Them!,"Coding is not something that I’m pretty good at. Back in high school, I did not attend any programming competitions. My coding journey started when I am in college. The reason why I chose to learn to code is that I want to improve my family’s life and get a…",https://medium.com/@mr.tarik098/i-am-bad-at-coding-learn-from-my-mistake-and-avoid-them-e48563ad968b?source=topics_v2---------152-84--------------------84ff4020_e5de_477c_abad_42f660352d41-------17,https://miro.medium.com/v2/resize:fill:140:140/1*FHJ4zumVTbl6fftgCgNt3Q.jpeg,data-science 1791,1429,GluonTS for Time-Series Prediction,"Here’s the super-quick start for gluonts, based on this notebook. GluonTS GluonTS is a Python library for probabilistic time-series forecasting that provides a wide range of models and tools for data analysis. It can be useful for competing at Microprediction to win prizes because it allows users to make more informed…",https://medium.com/@mike.roweprediger/gluonts-for-time-series-prediction-b04429733a35?source=topics_v2---------153-84--------------------84ff4020_e5de_477c_abad_42f660352d41-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SPojxKrTPBOBKD-8PqQAyg.png,data-science 1792,1430,Regression Analysis (Understand it better),"Regression is a statistical method that allows us to examine the relationship between one or more explanatory variables and a response variable. Regression can be useful for data analysis because it can help us to understand how the changes in the explanatory variables affect the response variable, to test hypotheses…",https://medium.com/@rodriguekitweze/regression-analysis-understand-it-better-7ddb1906a243?source=topics_v2---------155-84--------------------9ab48839_a0c4_49a3_a80c_c3494a7f1656-------17,https://miro.medium.com/v2/resize:fill:140:140/1*KwVVLiIrl0NTXPUlcefvew.png,data-science 1793,1431,Short Note on Windows Function in Apache Spark,"Consider a situation where in you are required to calculate the average salary of each department in an organization. You are given a employee table where there are columns like empid, empname, departmentid, salary. If you have any experience in SQL an immediate execution plan comes in your mind that…",https://medium.com/@badwaik.ojas/short-notes-on-windows-function-in-apache-spark-293bf92bcff3?source=topics_v2---------158-84--------------------9ab48839_a0c4_49a3_a80c_c3494a7f1656-------17,https://miro.medium.com/v2/resize:fill:140:140/0*cdKU5-NoZorS3-bM.png,data-science 1794,1432,EARTHQUAKE HEATMAP PROJECT,"Python Project using Folium Library — After the devastating earthquake that took place in Kahramanmaraş on February 06, 2023, the eyes turned to the Bosphorus Kandilli Observatory Earthquake Data. News Channels and Newspapers published earthquake bulletins almost every day for twenty days. Kandilli Rasathanesi ve Deprem Araştırma Enstitüsü Boğaziçi Üniversitesi, Kandilli Rasathanesi ve Deprem Araştırma Enstitüsü, 34684 Çengelköy - İstanbul/TÜRKİYEwww.koeri.boun.edu.tr",https://medium.com/@gokayburuc/earthquake-heatmap-project-d78df3e11745?source=topics_v2---------161-84--------------------9ab48839_a0c4_49a3_a80c_c3494a7f1656-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5aiRDr_KvC4Uw9ev27qJLQ.png,data-science 1795,1433,Cluster analysis on FIFA 23 players (K-Means Clustering),EA SPORTS FIFA is undoubtedly one of the biggest and most popular games in the world. The mass success of this game is due to the sport itself since soccer is the most popular sport globally by far. …,https://medium.com/@clo0rean/cluster-analysis-on-fifa-23-players-k-means-clustering-28f88b908cf6?source=topics_v2---------165-84--------------------b42a1c8a_bcbe_49e0_ae7e_ad4da8dd2607-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QorToNDPv_jJPU2djmillw.jpeg,data-science 1796,1434,System Design Basics: Navigating the World of CDN,"A System Design Expert’s Guide to Content Delivery Networks. A Content Delivery Network (CDN) is a distributed network of servers strategically located across various geographical locations to deliver web content, such as images, videos, and other static assets, more efficiently to users. The primary purpose of a CDN is to…",https://medium.com/gitconnected/system-design-basics-navigating-the-world-of-cdn-b59b92473593?source=topics_v2---------168-84--------------------b42a1c8a_bcbe_49e0_ae7e_ad4da8dd2607-------17,https://miro.medium.com/v2/resize:fill:140:140/1*YMLeO363ouMblrzArvbuaA.png,data-science 1797,379,Google Has Announced Open Access to New AI-Powered Chatbot Bard,"Recently in a blog post, Google announced the opening of access to Bard, its new AI-powered chatbot; and likely answer to OpenAI’s wildly popular ChatGPT. The announcement also comes as Microsoft released its new AI-powered version of the search engine, Bing. As of right now, open access to Bard is…",https://medium.com/@odsc/google-has-announced-open-access-to-new-ai-powered-chatbot-bard-3031a0bf5091?source=topics_v2---------170-84--------------------b42a1c8a_bcbe_49e0_ae7e_ad4da8dd2607-------17,https://miro.medium.com/v2/resize:fill:140:140/0*KYNZCWZXUi_Dh9Qo.png,data-science 1798,228,Google launches CDC for BigQuery,Change Data Capture in Real Time using BigQuery API — Google’s SaaS Data Warehouse BigQuery now supports Change Data Capture (CDC) by processing and applying streamed changes in real-time to existing data using the BigQuery Storage Write API [1]. Change Data Capture (CDC) is a process that captures changes made to a database so that they can be tracked and…,https://medium.com/codex/google-launches-cdc-for-bigquery-826e3dcb0d49?source=topics_v2---------171-84--------------------b42a1c8a_bcbe_49e0_ae7e_ad4da8dd2607-------17,https://miro.medium.com/v2/resize:fill:140:140/1*F5GbesweLXbZ06wkLeuuMw.jpeg,data-science 1799,1435,Visualizing Shapley Values Over Time,"The insight you don’t know about Overview Shapley values are a widely-used concept in machine learning, particularly in the area of explainable artificial intelligence (XAI). They provide a way to fairly distribute the contributions of each feature to the outcome of a prediction made by a machine learning model. The main…",https://medium.com/@swansburg.justin/visualizing-shapley-values-over-time-ed3acc34dbd9?source=topics_v2---------174-84--------------------6b7f9960_ca34_43f4_a012_93e4001c816c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*lnfNdfiTC5dsloXZ7d48hg.png,data-science 1800,1436,R data.validator — How to Create Automated Data Quality Reports in R and Shiny,"Best approaches for automated data quality reporting in R — Every data science project needs a data validation step. It’s a crucial part, especially when feeding data into machine learning models. You don’t want errors or unexpected behaviors in a production environment. Data validation is a way you can check the data before it touches the model and ensures it’s…",https://medium.com/appsilon-data-science/r-data-validator-how-to-create-automated-data-quality-reports-in-r-and-shiny-aa5eb2fb8ef2?source=topics_v2---------176-84--------------------6b7f9960_ca34_43f4_a012_93e4001c816c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3X14HC_4LVUdocMurHhmdg.png,data-science 1801,1437,"Mastering Python: A Comprehensive Guide to typing module, built-in functions, and Unicode","Introduction: This article is the next part of the article this and this. In this part, we will look into the concepts of the Typing module in detail in extension to the previous article, some built-in functions like map, filter, enumerate, zip, eval, ord, min, max, sorted, all, any, etc., …",https://medium.com/python-in-plain-english/mastering-python-a-comprehensive-guide-to-typing-module-built-in-functions-and-unicode-71ea0fd79811?source=topics_v2---------177-84--------------------6b7f9960_ca34_43f4_a012_93e4001c816c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*P3AlDURbBERQ6NlX,data-science 1802,1384,"“Unlocking Insights in Zomato Data: An Analysis using Regression, Classification, and Clustering!”","Introduction Food delivery platforms like Zomato provide a wealth of information about restaurants, menus, and customer reviews. To make the most of this data, it’s important to have the right tools and techniques in place for analyzing it. …",https://medium.com/@yogeshvar_m/unlocking-insights-in-zomato-data-an-analysis-using-regression-classification-and-clustering-d68063d93fa?source=topics_v2---------178-84--------------------6b7f9960_ca34_43f4_a012_93e4001c816c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kvufQJioyffIYdwzbxKcEQ.png,data-science 1803,1322,"“Unlocking Insights in Zomato Data: An Analysis using Regression, Classification, and Clustering”","Introduction Food delivery platforms like Zomato provide a wealth of information about restaurants, menus, and customer reviews. To make the most of this data, it’s important to have the right tools and techniques in place for analyzing it. …",https://medium.com/@syuvashree15/unlocking-insights-in-zomato-data-an-analysis-using-regression-classification-and-clustering-472ee3e5c5c5?source=topics_v2---------179-84--------------------6b7f9960_ca34_43f4_a012_93e4001c816c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*G_uxv3_1jv60ttoL1RUB2A.jpeg,data-science 1804,1438,Advanced SQL topics for data engineers,"Advanced SQL Techniques for Data Engineers: Examples with Sample Dataset — As a data engineer, you’re responsible for managing and analyzing large datasets. SQL is a powerful tool for querying and manipulating data, and there are many advanced SQL features that you can use to create more efficient and effective solutions. …",https://medium.com/data-engineer/advanced-sql-topics-for-data-engineers-64d7f6e83118?source=topics_v2---------180-84--------------------6b7f9960_ca34_43f4_a012_93e4001c816c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*faSMwO5iOwc1jRrc.png,data-science 1805,1439,VSTACK FORMULA TIPS AND TRICKS,"VSTACK FORMULA TIPS AND TRICKS 🚀Step by step guide 🚀 ^Save this video for future reference^. VSTACK returns the array formed by appending each of the array arguments in a row-wise fashion. The resulting array will be the following dimensions: Rows: the combined count of all the rows from each…",https://medium.com/@rameshbarad1994/https-www-instagram-com-reel-cqfnkghj6su-igshid-ymmymta2m2y-3c14a3113ca7?source=topics_v2---------189-84--------------------052d4264_e04a_4e29_8a09_dd943650f8cb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kHkNguj8AejKlKDYzMd0Rg.png,data-science 1806,1440,Day 6 Data Science interview questions,"In this series, I take advantage of the efficiency of Google and ChatGPT4 to help you and myself enhance the knowledge of data science. All the suggested answers will be double-checked for their validation. I chose the interview questions on StrataScratch as the study guide. Here we go! (Amazon/ Statistics…",https://medium.com/@MattYuChang/day-6-data-science-interview-questions-60710f4aba3a?source=topics_v2---------197-84--------------------8b33bf61_8333_4785_8a8d_a1e84541f327-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-science 1807,1441,Understanding PostgreSQL pgvector Indexing with IVFFlat,"In this tutorial, we will discuss how to optimize PostgreSQL’s pgvector with IVFFlat indexing. We’ll cover the following topics: Understanding the IVFFlat Index Choosing the right nlist value for the index Applying the chosen nlist value in pgvector Indexing Small Datasets in pgvector 1. Understanding the IVFFlat Index IVFFlat stands for Inverted File with Flat…",https://medium.com/@mauricio/optimizing-ivfflat-indexing-with-pgvector-in-postgresql-755d142e54f5?source=topics_v2---------198-84--------------------8b33bf61_8333_4785_8a8d_a1e84541f327-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6chF0MGxd489yfZ8Oyxs0A.png,data-science 1808,1396,How to set goals and get funding for an analytics team?,"Goal Setting The overarching goal for analytics within an organization is positive impact. This can be measured several ways depending on the nature of the organization, e.g., for-profit vs. nonprofit, and the desired objective(s), e.g., lowering cost increasing revenue expanding services. Regardless of the method of measurement, setting the right goal(s) is…",https://medium.com/@fahadthedatascientist/how-to-set-goals-and-get-funding-for-an-analytics-team-8af7ef66a34d?source=topics_v2---------201-84--------------------8b33bf61_8333_4785_8a8d_a1e84541f327-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fJsk0PmIQYfu8N3FyMAmdA@2x.jpeg,data-science 1809,635,How Lipschitz functions behave part1(Machine Learning),"Basics of Lipschitz functions Lipschitz Function -- from Wolfram MathWorld A function f such that |f(x)-f(y)|<=C|x-y| for all x and y, where C is a constant independent of x and y, is called a…mathworld.wolfram.com Sample-efficient private data release for Lipschitz functions under sparsity assumptions(arXiv) Author : Konstantin Donhauser, Johan Lokna, Amartya Sanyal, March Boedihardjo, Robert Hönig, Fanny Yang",https://medium.com/@monocosmo77/how-lipschitz-functions-behave-part1-machine-learning-adeb89cf0f2a?source=topics_v2---------203-84--------------------8b33bf61_8333_4785_8a8d_a1e84541f327-------17,https://miro.medium.com/v2/resize:fill:140:140/1*T1jjhy8IIqeV16giDyua5w.jpeg,data-science 1810,1442,The Power of Mentorship: How a Tech Mentor Changed My Life,"When I first started my career in tech, I felt lost and overwhelmed. I was new to the industry and had a lot to learn, but I didn’t know where to start. That’s when I met my mentor, a seasoned software engineer who took me under their wing and showed…",https://medium.com/@allanlawrance47/the-power-of-mentorship-how-a-tech-mentor-changed-my-life-8be962ee58?source=topics_v2---------204-84--------------------2f1c3b34_32f5_464c_89c6_880470a1218e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-science 1811,1443,Data — 10 Pandas Tips — part 1,"Pandas 🐼 is a very useful tool for handling data with python 🐍 so it’s time to take all the panda’s power 🚀 to the next level with this super tricks. #1 Read CSV files This is the simplest way to read a CSV file to create a dataframe file_name = 'data.csv' df = pd.read_csv(file_name)…",https://medium.com/@dorian599/data-10-pandas-tips-part-1-22da21c4715e?source=topics_v2---------205-84--------------------2f1c3b34_32f5_464c_89c6_880470a1218e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*thQvaPY_gOv8qADd,data-science 1812,954,Seeing is Believing: Why Data Visualization is Critical for Making Data-Driven Decisions,"Effective communication is absolutely crucial in the world of data analytics. Raw data can be overwhelming and difficult to understand without context, which is why data visualization is such an important part of the analytics process. …",https://medium.com/@pedro.schleder/seeing-is-believing-why-data-visualization-is-critical-for-making-data-driven-decisions-f2f005476739?source=topics_v2---------207-84--------------------2f1c3b34_32f5_464c_89c6_880470a1218e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1mZ4rMknoonqtgl95zWTPQ.jpeg,data-science 1813,1444,How to make your own discord bot in under 15 minutes (With Python),"Python is known for its simplicity and versatile nature, which is why so many companies prefer using it. For a beginner (much like myself), Python is probably the fastest language to learn out there. …",https://medium.com/data-science-community-srm/how-to-make-your-own-discord-bot-in-under-15-minutes-with-python-165feea31d2e?source=topics_v2---------208-84--------------------2f1c3b34_32f5_464c_89c6_880470a1218e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*9iLynlpP9nOEa_cJ,data-science 1814,1445,The Ultimate Tool for Data Visualization,Data visualization has become an integral part of business intelligence in the modern age of technology. The ability to interpret large amounts of data quickly and accurately is essential to make informed decisions. And that’s where Tableau comes in — a powerful data visualization tool that can help turn complex…,https://medium.com/@tushar.babbar08/the-ultimate-tool-for-data-visualization-5df1b4906484?source=topics_v2---------210-84--------------------2e17f4f9_1e0d_4ab5_8650_3c9e46ea066d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7PiXYOOuRmjlvHTS_7JDoQ.jpeg,data-science 1815,1446,The LinkedIn Cold Message That Got Me a >75% Response Rate,“I usually don’t respond to LinkedIn messages but yours seemed pretty genuine so I wanted to get on the phone with you” Why did the Private Wealth Management Advisor at Morgan Stanley I was on the phone with to coffee chat say this to me? Because it was actually a…,https://medium.com/geekculture/the-linkedin-cold-message-that-got-me-a-75-response-rate-7d5a22d75789?source=topics_v2---------211-84--------------------2e17f4f9_1e0d_4ab5_8650_3c9e46ea066d-------17,https://miro.medium.com/v2/resize:fill:140:140/0*HhPmep6fZzyqOmms,data-science 1816,1447,Discover arXiv Xplorer And Enhance Your Search for Scientific Articles on arXiv. OpenAI Semantic Search.,"If you’re a researcher or an enthusiast looking for an efficient way to search for articles on arXiv, this one’s for you. It’s definitely not fresh news, but to my shame I’ve only found out about arXiv Xplorer today, so if you also didn’t know about this amazing website, I…",https://medium.com/@nick.marnautov/discover-arxiv-xplorer-and-enhance-your-search-for-scientific-articles-on-arxiv-d08a7a1982ef?source=topics_v2---------212-84--------------------2e17f4f9_1e0d_4ab5_8650_3c9e46ea066d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*p3WfhbxC8X-visewb2JHlA.jpeg,data-science 1817,228,Google introduces Data Clean Rooms in BigQuery,"How to share secure and private Data in BigQuery Cleaning Rooms — Last year, Google has launched Analytics Hub built on BigQuery, which lets customers share and exchange data cost-effectively, while helping to minimize data movement challenges [1]. Now, they have announced the launch of Data Clean Rooms for Q3 as an integrated service for their Data Warehouse BigQuery. Google says that…",https://medium.com/geekculture/google-introduces-data-clean-rooms-in-bigquery-7f50e9bb4995?source=topics_v2---------213-84--------------------2e17f4f9_1e0d_4ab5_8650_3c9e46ea066d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*o3nG0yiYpHjiChNqUZocJg.jpeg,data-science 1818,1448,Bash Processing Speed Matters,"I sped up the execution of a bash command line >500x to make it a breeze to use — When you have to process data in textual or tabular forms, one of the long-time favorites is surely GNU Bash, the Linux flagship shell with “batteries included”. If you have never used it, you are missing out a lot and should definitely give it a try. The tools coming with…",https://medium.com/towards-data-science/bash-processing-speed-matters-d83e4c5adf32?source=topics_v2---------214-84--------------------2e17f4f9_1e0d_4ab5_8650_3c9e46ea066d-------17,https://miro.medium.com/v2/resize:fill:140:140/0*SRDHfwkFqDO--Tqc,data-science 1819,1449,Data cleaning and preprocessing in Python,"Data cleaning and preprocessing in Python A vital step in the data analysis method is data cleaning and preprocessing. It is crucial to make sure that the data is accurate, full, and consistent in order to be able to draw meaningful conclusions from it. …",https://medium.com/@amohaiman22/data-cleaning-and-preprocessing-in-python-b3f1bbfe5123?source=topics_v2---------215-84--------------------2e17f4f9_1e0d_4ab5_8650_3c9e46ea066d-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ueQiifAh1lpKHG3t.jpg,data-science 1820,1450,The “Secret” Behind John Wick’s Prosperity,"If you like your dumb action flicks as much as I do, John Wick’s movies are quite simply the créme de la créme, am I right? Most of us would agree there are far worse ways to spend your evening than watching an almost 60 year-old Keanu Reeves murdering people…",https://medium.com/@pandit1998arjun/the-secret-behind-john-wicks-prosperity-6e8e829388bb?source=topics_v2---------217-84--------------------2e17f4f9_1e0d_4ab5_8650_3c9e46ea066d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*73Rdt__3hEeU0-9tC1Tu9A.png,data-science 1821,1451,5 Predictions for the Future of Artificial Intelligence,"Artificial intelligence (AI) is changing the way we live, work, and interact with the world around us. From self-driving cars to smart homes and personalized virtual assistants, AI is transforming every industry and aspect of our daily lives. As we look to the future, here are five predictions for how…",https://medium.com/@hemansnation/5-predictions-for-the-future-of-artificial-intelligence-a97ec8b1cc9f?source=topics_v2---------220-84--------------------a919e8c3_10b4_4171_bbbd_1d3bbe39baee-------17,https://miro.medium.com/v2/resize:fill:140:140/1*lu80mr2xaS5aiR0cAKf77Q.png,data-science 1822,1452,"Optimise SQL queries using Views, Temporary Tables, and CTEs","Optimise SQL queries using Views, Temporary Tables, and CTEs Views, temp tables, and CTEs are all SQL constructs that can be used to improve query performance. Here’s a brief overview of each construct: Views A view is a virtual table created by executing a SELECT statement. The SELECT statement can include…",https://medium.com/@bdoulroheem/optimising-sql-queries-using-views-temporary-tables-and-ctes-ee8b415896a6?source=topics_v2---------224-84--------------------a919e8c3_10b4_4171_bbbd_1d3bbe39baee-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OPhpDm_ZaD6cMtnp95lZuA.jpeg,data-science 1823,1453,Speed up your spark queries in 15 minutes,"With the popularity of Spark along with its capabilities and power, here are 5 tips to maximize the performance of your queries Introduction In my day-to-day job, one of the most interesting problems I face is when users consult on the optimization of their spark ETL pipelines. …",https://medium.com/@junronglau/speed-up-your-spark-queries-in-15-minutes-4a8da88942cf?source=topics_v2---------0-84--------------------d014a068_ef9b_4ecf_8eda_591b3bde21cf-------17,https://miro.medium.com/v2/resize:fill:140:140/0*zwp7_5c-Q2Q4jH-U,data-analysis 1824,1454,VBA is Dead: Why You Should Embrace These Cutting-Edge Excel Alternatives in 2023,"As a long-time data analyst, I’ve seen various tools and technologies come and go over the years. When it comes to Excel automation, I’ve found that VBA (Visual Basic for Applications) has lost its luster as the go-to solution. In this article, I’ll explain why I think VBA is not…",https://medium.com/@oussama.elmerrahi/vba-is-dead-why-you-should-embrace-these-cutting-edge-excel-alternatives-in-2023-7b43e1dffe81?source=topics_v2---------1-84--------------------d014a068_ef9b_4ecf_8eda_591b3bde21cf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*t2tUDlBpYrhCDs_VF7Uk3Q.jpeg,data-analysis 1825,1455,Databricks Delivers Again: A Comprehensive Guide to the Latest Platform Enhancements for Data Engineers,"Data engineering is a critical component of modern businesses, and the tools used by data teams can make all the difference in terms of performance, efficiency, and collaboration. Databricks has recently released a host of new features aimed at empowering data engineers to work more effectively and efficiently. …",https://medium.com/@adityashaw/databricks-delivers-again-a-comprehensive-guide-to-the-latest-platform-enhancements-for-data-76fd8b2200bc?source=topics_v2---------3-84--------------------d014a068_ef9b_4ecf_8eda_591b3bde21cf-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/0*xERuSF_kNkft9h68.gif,data-analysis 1826,1456,A Unicorn in a Haystack: Navigating the Challenges of Hiring Exceptional Business Intelligence Professionals,"With businesses stockpiling more data than toilet paper during the pandemic, it’s no surprise that today’s data consumers are often left feeling like they’re driving through a dense fog without headlights. The vastness of commercial data can be overwhelming, and while going it alone might eventually get you to your…",https://medium.com/@loren-crawford/a-unicorn-in-a-haystack-navigating-the-challenges-of-hiring-exceptional-business-intelligence-d339c204725c?source=topics_v2---------4-84--------------------d014a068_ef9b_4ecf_8eda_591b3bde21cf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TkjgcZXvVfId-kLiK2VxKA.png,data-analysis 1827,1457,Joining Data with Pandas — The Important Concepts (Part 1),"Usually, in the process of conducting data analysis, there might be scenarios when we might need to work with data from multiple sources that might be related. There is a key stage just before cleaning your dataset where we define the datasets to be analyzed and establish relationships between them…",https://medium.com/@ibezimchike/joining-data-with-pandas-the-important-concepts-5f48c3746d59?source=topics_v2---------5-84--------------------d014a068_ef9b_4ecf_8eda_591b3bde21cf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ZGAVAgHvLCU8fgMGR9V2NA.png,data-analysis 1828,1458,Data Engineering — Part IV (ETL),"Introduction Data extraction from diverse sources, format transformation, and target system loading are all steps in the ETL (Extract, Transform, Load) process. Due to its ability to combine and analyse data from various sources, ETL is a critical procedure in today’s data-driven enterprises. In this segment of the series, We will…",https://medium.com/@sahil.sharma.i/data-engineering-part-iv-etl-51e01eb0f07a?source=topics_v2---------7-84--------------------d014a068_ef9b_4ecf_8eda_591b3bde21cf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9CBJgw4GGalNLR5qfgENGQ.png,data-analysis 1829,1459,Shopping Data Analysis And Visualization,The project is based on the Customer Shopping Dataset retail Sales Data provided by Kaggle. We will do data visualization studies with PowerBI using this data set. The dataset includes shopping information from 10 different shopping centers between the years 2021–2023. Data is available from various age groups and…,https://medium.com/@gokcencngz/shopping-data-analysis-and-visualization-f9bec142b011?source=topics_v2---------8-84--------------------d014a068_ef9b_4ecf_8eda_591b3bde21cf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-XrQ8CuLeOgcTb058wDtGQ.png,data-analysis 1830,1460,Data Privacy and Security: The Importance of Protecting Personal Information in the Digital Age,"Introduction In the current digital era, data privacy and security have emerged as two pressing challenges. Data privacy and security are getting more complicated and contentious as more and more personal data is being gathered and analyzed. Personal data collection and storage have become simpler thanks to the digital age, but…",https://medium.com/@Splendor001/data-privacy-and-security-the-importance-of-protecting-personal-information-in-the-digital-age-d7e80627cb44?source=topics_v2---------13-84--------------------88d23c1a_0b04_4d80_b90b_d725cc0f19e2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*-w24i8NDfJRSX9GK,data-analysis 1831,1461,Decoding the Role of a Product Analyst,"A Guide to Skills, Preparation, and Success in this role [Part 2] — This is the second in a series of articles wherein I cover nuances around the role of a Product Analyst. In the previous article, I described what a day in the life of a Product Analyst looks like [link].",https://medium.com/dusting-off/decoding-the-role-of-a-product-analyst-part-2-3a77e34e84d8?source=topics_v2---------17-84--------------------88d23c1a_0b04_4d80_b90b_d725cc0f19e2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*rWM_ndKUGjiARQaT,data-analysis 1832,1462,SQL Data Exploration,IMDB: REAL-TIME PROJECT MOVIE REVIEW ANALYSIS — Hi! Have you ever wondered if is there a way to get to see movies of your taste that have the best rating and interesting genres? …,https://medium.com/@gitartha11/sql-data-exploration-e59995b15365?source=topics_v2---------18-84--------------------88d23c1a_0b04_4d80_b90b_d725cc0f19e2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*szVIbtTqkW9AT3oVAOTfjw.jpeg,data-analysis 1833,1463,Common Mistakes in Information Visualization,Information visualization is one of the most important skills in any job today. Being able to effectively communicate data effectively is an extremely important skill. The main point of information visualization is to answer specific queries related to a collection of data. Effective visualization of this data allows for audiences…,https://medium.com/@souravdeyone/common-mistakes-in-information-visualization-2924225f2314?source=topics_v2---------19-84--------------------88d23c1a_0b04_4d80_b90b_d725cc0f19e2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*RR9CFWIMuJyZTjuumcR2KA.png,data-analysis 1834,1464,Ask questions to your SQL database in natural language,"You are a Data Analyst, it’s Friday at 4:59pm. While you are hurrying to finish the dashboard that your boss asked you to finish before the end of the week, Jessica from the marketing department interrupts you to ask you to calculate the conversion rate of her last marketing campaign…",https://medium.com/@leroyantonin.pro/ask-questions-to-your-sql-database-in-natural-language-e482a0c6c1a6?source=topics_v2---------20-84--------------------c02df6e8_e187_4b75_aaee_5363fd1a3e43-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SalRvYVQbhWAicLG9j9A0w.jpeg,data-analysis 1835,1465,Marven Marketing Campaign,"A data analysis report of a marketing campaign. — Introduction Maven marketing conducted a marketing five campaigns from 2014 to 2015 but keeping track of the impact of the various campaigns was a challenge. The data available contained marketing campaign of 2,240 customers of Maven marketing including customers profile, product preference, campaign success/failure and channel performance. Using the data…",https://medium.com/@Trezy_xyx/marven-marketing-campaign-fdaca06f0587?source=topics_v2---------22-84--------------------c02df6e8_e187_4b75_aaee_5363fd1a3e43-------17,https://miro.medium.com/v2/resize:fill:140:140/1*NwOQUOzNcsvZCr9zGodfIw.jpeg,data-analysis 1836,1466,Power Analysis for Data Scientists,"Power analysis can be an intimidating topic for data scientists, but it’s an essential skill for those venturing into the world of research and statistics. In this article, we’ll walk through a power analysis using the National Health and Nutrition Examination Survey (NHANES) dataset. Along the way, we’ll provide a…",https://medium.com/@fuherarich/power-analysis-for-data-scientists-30260272cfc8?source=topics_v2---------25-84--------------------b132e3a9_e18d_4811_90aa_642625993270-------17,https://miro.medium.com/v2/resize:fill:140:140/1*a1BGjq-_UYAuAOgsdl-cHA.png,data-analysis 1837,1467,Use Pandas and Numpy to replace Excel.,"As someone who has worked with Excel for a while, I am aware that the thought of learning Excel/VBA functions in a brand-new setting like Python may not sound all that exciting. But the advantages that the Python framework provides outweigh this. I have created a helpful and straightforward guide…",https://medium.com/@iamosagie/use-pandas-and-numpy-to-replace-excel-47e54648b743?source=topics_v2---------26-84--------------------b132e3a9_e18d_4811_90aa_642625993270-------17,https://miro.medium.com/v2/resize:fill:140:140/1*589IIrc6YsZ3JW9Hw7Tuyw.png,data-analysis 1838,1468,Data Science | Investigating how vehicles affect CO2 emissions,"Hi friends! It has been a while since my last article, thanks to the busy semester! But anyways, I would like to share my latest work on data science/data analysis! This project was done to compete in the DataCamp Everyone Can Learn Python Scholarship. Here is some background information for the competition: The first DataCamp Everyone Can Learn Python Scholarship Award Program is now open for entries. The problem below tests the Python and SQL skills that you gained from the Introduction to Python and Introduction to SQL, and pairs them with your existing problem solving and creative thinking skills.",https://medium.com/@hckkiu/data-science-investigating-how-vehicles-affect-co2-emissions-9723f5b87d45?source=topics_v2---------27-84--------------------b132e3a9_e18d_4811_90aa_642625993270-------17,https://miro.medium.com/v2/resize:fill:140:140/1*y8cAnvqK9-kn7jrm2KQemQ.png,data-analysis 1839,1469,"Here, My First Article","What brought me to this platform?… Starting out! I started my Data Analytics journey sometimes in April, 2022. It was a hunt for something new. Searching on how to bridge the gap between the real world of works and school, looking for something more challenging. …",https://medium.com/@rereloluwaaremu0/here-my-first-article-79e3aa5a3fe5?source=topics_v2---------28-84--------------------b132e3a9_e18d_4811_90aa_642625993270-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-analysis 1840,1470,Navigating the Ethical Landscape: GPT-4 and Medical Clinical Trial Data Analysis,"Introduction: In recent years, artificial intelligence (AI) has become an increasingly significant force in various industries, including medicine. GPT-4, the latest iteration of OpenAI’s powerful language model, is at the forefront of these advancements, enabling users to analyze and interpret large datasets with remarkable speed and accuracy. As medical research…",https://medium.com/@JoseFerrerCosta/navigating-the-ethical-landscape-gpt-4-and-medical-clinical-trial-data-analysis-c00a2f6c00c0?source=topics_v2---------30-84--------------------b132e3a9_e18d_4811_90aa_642625993270-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BJrFuGy1dXvEYXtV9HOiVQ.png,data-analysis 1841,1471,Melbourne Rumble — Formula 1 Australian GP 2023 (with Data Analysis),"After falling asleep during the race in Jeddah, I finally didn’t have to stay up late to watch Formula 1. Qualifying and the race start at 12:00 in my region. In fact, races like those in Australia and Japan are the ideal time to fill a Saturday and Sunday afternoon.",https://medium.com/@hafidpradhitya/melbourne-rumble-formula-1-australian-gp-2023-with-data-analysis-2af92162255e?source=topics_v2---------31-84--------------------b132e3a9_e18d_4811_90aa_642625993270-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4ptkyMAM_D6ZcqkYGVtbog.png,data-analysis 1842,1472,Analysis of migration incidents from 2014–2023,"The data used for this analysis was obtained from https://data.humdata.org/m/organization/iom-missing-migrants-project? INTRO: Missing Migrants Project has been tracking deaths of migrants and those who have gone missing along migratory routes worldwide since the October 2013 tragedies, when at least 368 migrants died in two shipwrecks near the Italian island of Lampedusa…",https://medium.com/@ortikultur/analysis-of-migration-incidents-from-2014-2023-28eca48fdac0?source=topics_v2---------32-84--------------------8a2560ed_b3e0_4c10_aa8b_601ff4e4d443-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SGVFriPN-6Zeq7V0t5uQ2Q.jpeg,data-analysis 1843,1473,Data Analytics in Audit,"I have been working in the data analytics department of the audit department for a while now. I have been investigating irregularities, unethical business transactions and suspected fraudulent activities within the company through databases. Before I started working, the company decided to use SAS and I took a break from…",https://medium.com/@alpersinbalc/data-analytics-in-audit-4cc645fbff53?source=topics_v2---------33-84--------------------8a2560ed_b3e0_4c10_aa8b_601ff4e4d443-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-analysis 1844,1426,PySpark IPL Data Analysis,"Analyzing Cricket Dataset with PySpark Introduction: Cricket has been one of the most popular sports worldwide. Over the years, it has evolved and adapted to modern technology. This has allowed us to analyze various aspects of the game in-depth. With the help of data analytics, we can now understand the…",https://medium.com/@lolithasherley7/pyspark-ipl-data-analysis-3f0426c8c327?source=topics_v2---------34-84--------------------8f36cdca_f746_4675_ac7d_ac7c66feaa12-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-analysis 1845,1474,7 criteria that must be met before using a linear regression model (LRM) for prediction,"In this article, we would look at the seven criteria that must be met before using Multiple Linear Regression to model a prediction. So, this article will cover the following topics: 1. Definition of Multiple Linear Regression(MLR), 2. Difference between Multiple Linear Regression (MLR) and Simple Linear Regression(SLR) 3. Summary…",https://medium.com/datadriveninvestor/7-criteria-that-must-be-met-before-using-a-linear-regression-model-lrm-for-prediction-53d3a906c161?source=topics_v2---------35-84--------------------8f36cdca_f746_4675_ac7d_ac7c66feaa12-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OXQwv6-DwrUjXKEBQa9FZA.jpeg,data-analysis 1846,193,"A Guide to Time Series Models in Machine Learning: Usage, Pros, and Cons","As businesses and organizations collect and store massive amounts of data, the need to analyze and make sense of this data has become increasingly important. Time series data, which consists of measurements taken over time, is a particularly valuable source of information in many fields. Machine learning models can be…",https://medium.com/@yennhi95zz/a-guide-to-time-series-models-in-machine-learning-usage-pros-and-cons-ac590a75e8b3?source=topics_v2---------36-84--------------------8f36cdca_f746_4675_ac7d_ac7c66feaa12-------17,https://miro.medium.com/v2/resize:fill:140:140/0*br_d8pmAMOehrfCy.jpg,data-analysis 1847,1475,SQL — Lead Window Function,"In previous posts, We addressed different types of window functions, One of which is lead function. Let’s review one problem statement which can be solved by using lead function as well. If you are not aware what window functions are and how do they work, please review the previous post…",https://medium.com/@rubihali/sql-lead-window-function-cfaae63ec914?source=topics_v2---------37-84--------------------8f36cdca_f746_4675_ac7d_ac7c66feaa12-------17,https://miro.medium.com/v2/resize:fill:140:140/0*FHh0hO088A0Xp-zF,data-analysis 1848,1476,How I Made an App to Upload Spreadsheets and Analyze with ChatGPT,"Introduction: Data analysis is essential for making informed decisions across various industries. However, the process can be complex and intimidating for non-technical individuals. As a software developer with a passion for data, I embarked on a journey to create a solution that simplifies data analysis and makes it accessible to everyone…",https://medium.com/@resz.undersky/how-i-made-an-app-to-upload-spreadsheets-and-analyze-with-chatgpt-2352b2c9a105?source=topics_v2---------38-84--------------------8f36cdca_f746_4675_ac7d_ac7c66feaa12-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-analysis 1849,1477,Dealing with Youtube API for Video Analysis,"The YouTube API is a powerful tool for video analysis and provides much information about videos, channels, and users. Here is the simple python code to get started with the YouTube API for video analysis: We need an API credential to obtain video information. Create a project in the Google…",https://medium.com/@sandeepkolapineni/dealing-with-youtube-api-for-video-analysis-3c7f235b9bcf?source=topics_v2---------39-84--------------------8f36cdca_f746_4675_ac7d_ac7c66feaa12-------17,https://miro.medium.com/v2/resize:fill:140:140/1*IZ_DF99M2Wa6dxCxypcmTw.png,data-analysis 1850,1478,Fetching out the banking stocks from the S&P500 using Python,"Visualizing banking stock performance following recent turmoil Introduction Recently, the financial sector, particularly banking stocks, has been a popular topic of discussion. Concerns have arisen that the sector is excessively fragile, potentially causing significant market turbulence and more runs on banks due to the rising interest rates. In this blog post…",https://medium.com/datadriveninvestor/fetching-out-the-banking-stocks-from-the-s-p500-using-python-b816bd1bd22f?source=topics_v2---------40-84--------------------8f36cdca_f746_4675_ac7d_ac7c66feaa12-------17,https://miro.medium.com/v2/resize:fill:140:140/0*gy4QRrb2c1W9PN4W,data-analysis 1851,1466,Python Image Analysis: A Tale of Two Circles,"In this article, we’ll dive headfirst into the fascinating world of image analysis using Python, OpenCV, and matplotlib. Our mission is to explore an intriguing image containing two mysterious circles of different sizes and delve into various ways to quantify and visualize their differences. …",https://medium.com/@fuherarich/python-image-analysis-a-tale-of-two-circles-b754e53fa8a4?source=topics_v2---------41-84--------------------24bb7931_eeea_464b_8650_f27938ae5a1f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*87x5WCUqsr_jHdO1IASZZA.jpeg,data-analysis 1852,1479,From Data to Insight: Predicting E-Commerce Churn with Machine Learning,"What is Churn? By literal definition from Cambridge dictionary: Churn rate (noun): the percentage of customers who stop buying the products or services of a particular company, calculated for a particular period of time. In the context of e-commerce businesses, the term “churn” refers to the state at which customers stop doing business…",https://medium.com/@rifset/from-data-to-insight-predicting-e-commerce-churn-with-machine-learning-e9e90089730c?source=topics_v2---------42-84--------------------24bb7931_eeea_464b_8650_f27938ae5a1f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PlTmoQugI2zDL0bWmZRGrA.jpeg,data-analysis 1853,1480,What is Big Data? Why is big data analytics so important?,"The concept of Big Data has entered our lives very quickly. With technological developments, the data that can be obtained over the internet has reached very high levels. …",https://medium.com/enkronos/what-is-big-data-why-is-big-data-analytics-so-important-777ed1671d5b?source=topics_v2---------43-84--------------------24bb7931_eeea_464b_8650_f27938ae5a1f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6SKSiSb5Rmv-XEaG75Fscg.jpeg,data-analysis 1854,1481,"Effortlessly Analyze Your YouTube Data with AWS: A Step-by-Step Guide to ETL Pipeline using Glue, Lambda, Athena, and QuickSight","Are you sick of manually transforming and cleaning data for your YouTube analytics? Well, it’s time to sit back, relax, and let AWS do the work for you with their ETL pipeline. In this article, we’ll go over how to set up a data pipeline using AWS services, Python, and…",https://medium.com/@narvekar.amisha/effortlessly-analyze-your-youtube-data-with-aws-a-step-by-step-guide-to-etl-pipeline-using-glue-f98caed05977?source=topics_v2---------44-84--------------------24bb7931_eeea_464b_8650_f27938ae5a1f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*35RdYWBjOzVUdnOew8ofMA.png,data-analysis 1855,1482,Figures On Bad Data — The Numbers Are Lying To You,You’ve probably heard thousands of times that Data is the new gold. That formatted and coherent Data is nutrient soil for any kind of decision to be made in our contemporary world — although it has always been like that. So let’s skip that part. But there are bugs and…,https://medium.com/@p.alias.cto/figures-on-bad-data-the-numbers-are-lying-to-you-1d460bd185cd?source=topics_v2---------45-84--------------------24bb7931_eeea_464b_8650_f27938ae5a1f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*43nydhwqkffYxieo-E_Vtg.jpeg,data-analysis 1856,1410,Data Analysis: Free Resources & Projects,"A data analyst uses statistical and computational methods to collect, analyze, and interpret data. Data analysts often work with business stakeholders to understand their needs and requirements, and they use their analytical skills to provide insights and recommendations that help organizations make informed decisions. They may also be responsible for…",https://medium.com/@luisprooc/data-analytics-free-resources-projects-b13c891c0740?source=topics_v2---------46-84--------------------24bb7931_eeea_464b_8650_f27938ae5a1f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*sexfoMeJ-4mw25ZI,data-analysis 1857,1483,SQL users: Halve the length of (some of) your queries with this one trick,"The QUALIFY clause is pure syntactic sugar — In this article, I’m going to introduce you to the SQL QUALIFY clause: a trick that will help you write shorter and more readable SQL queries. If you work in Data Science/Analytics or Machine Learning, this is a must-have SQL tool for four reasons: First, because it can help you…",https://medium.com/towards-data-science/sql-users-halve-the-length-of-some-of-your-queries-with-this-one-trick-c3c2c226cb35?source=topics_v2---------47-84--------------------24bb7931_eeea_464b_8650_f27938ae5a1f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*w1sjIIYFNNweLetm,data-analysis 1858,1484,Finance Data Analysis Project,This case is about a bank (Thera Bank) whose management wants to explore ways of converting its liability customers to personal loan customers (while retaining them as depositors). A campaign that the bank ran last year for liability customers showed a healthy conversion rate of over 9% success. This has…,https://medium.com/@sachintukumar1609/finance-data-analysis-project-fe5ed9ec44f3?source=topics_v2---------48-84--------------------24bb7931_eeea_464b_8650_f27938ae5a1f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*IkXZp8hI3Ew_0kYiWumDdw.jpeg,data-analysis 1859,1460,Titanic Survival Analysis,"Introduction The Titanic was a British luxury passenger liner that was built in 1912 and owned by the White Star Line. It was one of the largest and most opulent ships of its time, measuring 882 feet in length and weighing 46,328 gross tons. The Titanic was designed to carry up…",https://medium.com/@Splendor001/titanic-survival-analysis-43ecbcc86c51?source=topics_v2---------49-84--------------------24bb7931_eeea_464b_8650_f27938ae5a1f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*4cQA9S2Gp2XyQqRz,data-analysis 1860,1194,How this ggplot2 Dark Theme Package Enhanced my Visualizations,"I’ve been a user of ggplot2 for years now and I’m proud to say that it has been my go-to package for data visualization. However, I realized that every time I made a new visualization, the default ggplot2 theme gave off a boring grey background — well, not appealing…",https://medium.com/@jessicazerlinas/how-this-ggplot2-dark-theme-package-enhanced-my-visualizations-e152b638937e?source=topics_v2---------50-84--------------------24bb7931_eeea_464b_8650_f27938ae5a1f-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*_ka6CcA6tG5mx0k-R4ek-g.gif,data-analysis 1861,1440,Day 5 Data Science interview questions,"Hello, this is Matt here. In this series, I will take advantage of the efficiency of Google and ChatGPT4 to help you and myself enhance the knowledge of data science. I chose the interview questions on StrataScratch as the study guide to start with. I will try my best to…",https://medium.com/@MattYuChang/day-5-data-science-interview-questions-6247f64e93d0?source=topics_v2---------51-84--------------------49493dc4_32a6_488f_b08d_c17362dae222-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-analysis 1862,1485,Understanding SQL Joins: A Beginner’s Guide with Code Examples,"SQL can seem daunting, but once you get the hang of it, it can be a lot of fun! One of the coolest things about SQL is the ability to combine data from different tables using joins. There are several types of joins available in SQL, each with its own…",https://medium.com/@busairi/understanding-sql-joins-a-beginners-guide-with-code-examples-8a39708faf9d?source=topics_v2---------52-84--------------------49493dc4_32a6_488f_b08d_c17362dae222-------17,https://miro.medium.com/v2/resize:fill:140:140/0*1UxzVAgNMs2r3fRj,data-analysis 1863,1486,Python Data Science Handbook,"Python Data Science Handbook The Python Data Science Handbook is a comprehensive guide to data science using the Python programming language. The book is written by Jake VanderPlas, a data science practitioner and educator, and it covers a wide range of topics in data science, including data analysis, visualization, machine learning, and more. The…",https://medium.com/@yasiralhejaili/python-data-science-handbook-269c02a86509?source=topics_v2---------53-84--------------------49493dc4_32a6_488f_b08d_c17362dae222-------17,https://miro.medium.com/v2/resize:fill:140:140/1*jWVd_IwS4vsIhtyBV3Shyg.jpeg,data-analysis 1864,1487,Chapter 16: Navigating Salary Negotiations(Data position Salary in South Korea),"In Korea, most small and medium-sized enterprises (SMEs) rely on annual salary negotiations or salary tables to establish employee compensation. Some start-ups break the mold by conducting salary negotiations bi-annually or offering performance-based incentives. However, my company has chosen to negotiate salaries only once a year. …",https://medium.com/@simbbo/chapter-16-navigating-salary-negotiations-data-position-salary-in-south-korea-fcee55ea2a52?source=topics_v2---------54-84--------------------49493dc4_32a6_488f_b08d_c17362dae222-------17,https://miro.medium.com/v2/resize:fill:140:140/1*a_lsAbNovywEAKumIx3BKg.jpeg,data-analysis 1865,1488,Sliding Windows in Pandas,Identify Patterns in Time-Series Data with Overlapping Window Techniques — Windowing techniques enable data analysts to identify valuable patterns in time-series data. Sliding windows are particularly powerful because they allow you to spot patterns earlier than other techniques. This is an important feature in situations when making a key decision a few minutes (or seconds) earlier can save you money.,https://medium.com/towards-data-science/sliding-windows-in-pandas-40b79edefa34?source=topics_v2---------55-84--------------------49493dc4_32a6_488f_b08d_c17362dae222-------17,https://miro.medium.com/v2/resize:fill:140:140/1*NOUaYUNUJpqB0o91y0eHnQ.jpeg,data-analysis 1866,1489,Introduction to Data Transformation,"When applying data science, machine learning and artificial intelligence to different use cases, one should always take care of one fact raw data is difficult to understand and trace. Here, the need for data processing comes in front of us so that critical, accurate and valuable information can be retrieved…",https://medium.com/@datasciencewizards/introduction-to-data-transformation-935dbbfd3968?source=topics_v2---------56-84--------------------49493dc4_32a6_488f_b08d_c17362dae222-------17,https://miro.medium.com/v2/resize:fill:140:140/0*zlbDR_c-KTvUdw8H,data-analysis 1867,1449,Comparing Power BI and Tableau: Data Visualization Tools for Business Intelligence,"Two of the most well-known and extensively used data visualisation tools on the market are Power BI and Tableau. Both of them provide strong tools for producing aesthetically appealing and interactive dashboards, reports, and data visualisations. Microsoft created the business analytics programme known as Power BI, which offers users a…",https://medium.com/@amohaiman22/comparing-power-bi-and-tableau-data-visualization-tools-for-business-intelligence-4f03ed4fcf6a?source=topics_v2---------57-84--------------------49493dc4_32a6_488f_b08d_c17362dae222-------17,https://miro.medium.com/v2/resize:fill:140:140/0*MR2SXvmE66qDgkgE.jpeg,data-analysis 1868,193,Time Series in Machine Learning: Understanding and Applications,"In today’s digital age, businesses generate a vast amount of data every day. This data can be utilized to gain insights into the past and make predictions for the future. Time series analysis is one such method used to analyze and predict trends in time-dependent data. …",https://medium.com/@yennhi95zz/time-series-in-machine-learning-understanding-and-applications-fcd5495242f2?source=topics_v2---------58-84--------------------49493dc4_32a6_488f_b08d_c17362dae222-------17,https://miro.medium.com/v2/resize:fill:140:140/0*plrxqTWGJ7ydI1BX.png,data-analysis 1869,1490,Navigating the Challenge of Imbalanced Datasets in Machine Learning,"An imbalanced dataset is a dataset in which the number of samples in one or more classes is significantly higher or lower than the number of samples in other classes. In other words, an imbalanced dataset occurs when the distribution of samples across different classes is uneven. For example, if…",https://medium.com/@nileshmore849/navigating-the-challenge-of-imbalanced-datasets-in-machine-learning-748746ba5a45?source=topics_v2---------59-84--------------------49493dc4_32a6_488f_b08d_c17362dae222-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wPQYb7nc3_sApn73-Gq3HQ.png,data-analysis 1870,1491,Learn Basic SQL | Data Analysis,"Before we get into the lesson, I recommend you to try to code and debug it yourself. You’ll learn a lot from actually doing it and making mistakes :) Week 1 : Select, Where What’s Database? : You can think of it as a bucket where you can put data to use them with multiple…",https://medium.com/@gracejeung/basic-sql-data-analysis-98b66754b0d9?source=topics_v2---------60-84--------------------49493dc4_32a6_488f_b08d_c17362dae222-------17,https://miro.medium.com/v2/resize:fill:140:140/0*KEiatvE5NXs6HIQU,data-analysis 1871,1492,"Mastering Data Analysis with Python: Tips, Tricks, and Tools You Need to Know","Data Analysis has always been a vital field, with a high demand for skilled professionals. Until recently, data analysts relied on closed, expensive, and limited tools like Excel or Tableau. However, Python, pandas, and other open-source libraries have revolutionized Data Analysis and have become must-have tools for anyone looking to…",https://medium.com/@deepeshnishad/mastering-data-analysis-with-python-tips-tricks-and-tools-you-need-to-know-ead58951fb78?source=topics_v2---------61-84--------------------f8bba8a1_8f9b_433a_9404_d3f82ec1877f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*l3AN6i5OyAupZ7jWLyD44Q.png,data-analysis 1872,1493,Blockchain Business Intelligence,"With the deployment of any blockchain network, there are a number of different types of users that it needs to serve. These include developers, DevOps, BizOps and various types of end-users. Each of these categories of users has its own unique requirements for the information they need, and in turn…",https://medium.com/web3labs/blockchain-business-intelligence-6ad97cf8daa4?source=topics_v2---------62-84--------------------f8bba8a1_8f9b_433a_9404_d3f82ec1877f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PyFbhjhW2FCbJihidbKP3Q.png,data-analysis 1873,1494,Data Analysis on FICO Scores.,Your FICO has Changed !!! — Data Analysis is not about complexing the things but to simplify it and try to infer as much info as possible. A FICO score is a credit score created by the Fair Isaac Corporation (FICO). Lenders use borrowers’ FICO scores along with other details on borrowers’ credit reports to assess credit risk and determine whether to extend credit. FICO Score is a three-digit number based on the information in your credit…,https://medium.com/@prabhatdangi456/data-analysis-on-fico-scores-942ab5f9a657?source=topics_v2---------63-84--------------------f8bba8a1_8f9b_433a_9404_d3f82ec1877f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zCfpi5q3rBNhmVnSDhxfzA.png,data-analysis 1874,1495,5 Common Mistakes to Avoid in Data Analysis,"Introduction: Ah, data analysis — the art of turning numbers into insights, and insights into action. It’s the secret sauce that modern businesses and organizations use to stay ahead of the curve, and the key to unlocking hidden patterns and trends in the data that surrounds us.",https://medium.com/@bonilla.johneric/5-common-mistakes-to-avoid-in-data-analysis-e7b834d48cc9?source=topics_v2---------64-84--------------------f8bba8a1_8f9b_433a_9404_d3f82ec1877f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*t6EArbA0gkC_f0Ez8P0j9g.jpeg,data-analysis 1875,1496,Seeing is Believing: Unleashing the Power of Tableau’s Data Visualization,"Tableau is a powerful data visualization tool that enables users to analyze and visualize large datasets in a user-friendly way. The software is widely used in the business intelligence and data analytics industries due to its ease of use, powerful data visualization capabilities, and flexibility. …",https://medium.com/@amulyakandukuri4/seeing-is-believing-unleashing-the-power-of-tableaus-data-visualization-732cde0ffffb?source=topics_v2---------65-84--------------------f8bba8a1_8f9b_433a_9404_d3f82ec1877f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DrElhvIU-coJCl4B44wz8Q.jpeg,data-analysis 1876,1497,The 1 Ugly Trait Data Engineers Must Embrace,"Otherwise you risk delivering inaccurate data and building faulty systems. — New Data Engineers Get This 1 Programming Truth Wrong Aspiring data professional, I have bad news for you: Just because something runs doesn’t mean it’s correct. If you’re just considering data engineering as a career or are already getting started in this field, chances are your primary concern is generating an output. You want a Python script to execute.",https://medium.com/pipeline-a-data-engineering-resource/the-1-ugly-trait-data-engineers-must-embrace-374605c4b3c?source=topics_v2---------66-84--------------------f8bba8a1_8f9b_433a_9404_d3f82ec1877f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*cpssFhApUS49rQsh2Ti63w.jpeg,data-analysis 1877,1498,This is why you should consider data,"Hi today I will explain to you why you should consider data, and why did I fell in love about data. What do you mean by data ? First I want to clarify that neither csv files nor data pipeline excites me. What excites me is their insight. First I love data because there is most of…",https://medium.com/@pmgzo/this-is-why-you-should-consider-data-ae003f98e534?source=topics_v2---------67-84--------------------f8bba8a1_8f9b_433a_9404_d3f82ec1877f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*raEdIYS5ZgIIH1Zqb-QyWA.png,data-analysis 1878,1499,Mastering Power BI: A Guide to DAX Functions for Data Analysis,"Power BI is a business intelligence tool developed by Microsoft that allows you to visualize and analyze data from a wide range of sources. It offers a wide range of features such as data modeling, data visualization, and data analysis. …",https://medium.com/@omarnot2far/mastering-power-bi-a-guide-to-dax-functions-for-data-analysis-1e88e4f5f9b4?source=topics_v2---------68-84--------------------f8bba8a1_8f9b_433a_9404_d3f82ec1877f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-analysis 1879,1500,Telco Churn Prediction With Machine Learning,"Introduction The churn rate is an important metric to measure the number of customers a business has lost in a certain period. A high churn rate implies trouble for growth, affecting a company’s profitability in the long run, so it’s crucial to keep track of a business’s ability to retain clients…",https://medium.com/@luuisotorres/telco-churn-prediction-with-machine-learning-c5e51c0c976f?source=topics_v2---------69-84--------------------f8bba8a1_8f9b_433a_9404_d3f82ec1877f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*aG0j9bS7tM-T2MfN,data-analysis 1880,1501,Understanding window functions are not gruelling anymore !!,"Are you at that point in your life where you are not sure where to use and where not to use window functions? Like you understand the concept, but somewhere you lack the ability to implement them in real-time use cases? Hey, don’t worry; I’ve got you. I was there…",https://medium.com/@kasmitharamkr/understanding-window-functions-are-not-gruelling-anymore-e921e456c90?source=topics_v2---------70-84--------------------49772ba7_ebff_412f_a5e5_4d1c9da28016-------17,https://miro.medium.com/v2/resize:fill:140:140/0*oeEL9lFD727iE4Hs,data-analysis 1881,1502,Does The News Impact Human Emotions and Behavior? News Article Sentiment Analysis,"News headlines and stories are a part of many Americans’ daily lives. Whether it be politics, celebrity news, national news, or a current fashion trend, there is always something urgent and new. Since reading the news is such a common daily practice for many Americans, assessing the general sentiment of…",https://medium.com/inst414-data-science-tech/does-the-news-impact-human-emotions-and-behavior-news-article-sentiment-analysis-299fb860494b?source=topics_v2---------71-84--------------------49772ba7_ebff_412f_a5e5_4d1c9da28016-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kS8yTk8sjGvzPudJjjA3hQ.png,data-analysis 1882,1503,Common Data Transformation Techniques for Data Engineers,"Why transform data? Data transformation is the “T” in your ETL (Extract, Transform and Load) process that prepares data for analysis, self-service reports, Business Intelligence dashboards, etc. Typically the data stored in the source systems are not structured in a way that is suitable for analysis. You will need to clean, organize and…",https://medium.com/@baluramachandra90/common-data-transformation-techniques-for-data-engineers-ee807eaa97d7?source=topics_v2---------72-84--------------------49772ba7_ebff_412f_a5e5_4d1c9da28016-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rry1VwNSd02Jt7TxcESE_Q.png,data-analysis 1883,1504,Data Marketing Management,"My Boss told to me, he wants to make a central system what will be provide the data to sales when they make a presentation in meeting, follow up the customer, and give report to their boss. My boss gives me two options: Create a new system and implement it…",https://medium.com/@adi_pradana14/data-marketing-management-960532517b6f?source=topics_v2---------73-84--------------------49772ba7_ebff_412f_a5e5_4d1c9da28016-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Pnp2pyY1pNNajLuH,data-analysis 1884,1505,Connecting to APIs with Python in Power BI,"Power BI is a powerful data analytics tool that allows you to connect to various data sources to create insightful reports and dashboards. However, sometimes the data you need may not be available in the format you require, or you may need to access data from external sources. …",https://medium.com/@maliksalman_/connecting-to-apis-with-python-in-power-bi-b50607646b02?source=topics_v2---------74-84--------------------0d122b92_64cc_4f12_bab3_a6e195660e78-------17,https://miro.medium.com/v2/resize:fill:140:140/0*oR8Nq1nKBHyrMgX6,data-analysis 1885,1506,Exploratory Data Analysis (EDA),"Exploratory Data Analysis (EDA) is a vital technique used by data scientists and analysts to examine and understand datasets. It is a preliminary approach to data analysis that involves visually exploring, summarizing, and interpreting data to uncover patterns, trends, and relationships within the data. EDA is an essential step in…",https://medium.com/@chingizseyidbayli/exploratory-data-analysis-eda-389835da16ac?source=topics_v2---------75-84--------------------0d122b92_64cc_4f12_bab3_a6e195660e78-------17,https://miro.medium.com/v2/resize:fill:140:140/1*AWGgyb_qDj7vX_GFcKsVWA.jpeg,data-analysis 1886,1507,The Pep Effect: How Guardiola Transformed Manchester City’s Fortune in the Premier League,"by Eve O’Brien Manchester City’s recent dominance in the Premier League has been nothing short of impressive, especially after rising from the depths of League Two twenty years ago. The club has won the Premier League title four times in the last decade, including the last two seasons in a…",https://medium.com/@eveobrien/the-pep-effect-how-guardiola-transformed-manchester-citys-fortune-in-the-premier-league-bb50f820cf9?source=topics_v2---------76-84--------------------0d122b92_64cc_4f12_bab3_a6e195660e78-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7voHPIdIozmEEdE4-ZFPug.jpeg,data-analysis 1887,1508,Data Storage Terms,"In this blog, I will explain different storage terms. Databases A database is a structured collection of data that is organized in a specific way to make it easy to access and manage. Databases are widely used in various industries to store, manage, and retrieve large amounts of data efficiently. They are essential for supporting transactional operations, such as those used in e-commerce, banking, healthcare, and many other applications.",https://medium.com/@naveenpn/data-storage-terms-326a94b89168?source=topics_v2---------77-84--------------------0d122b92_64cc_4f12_bab3_a6e195660e78-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-analysis 1888,1509,Google Capstone Project: Bellabeat Case Study,Bellabeat: How Can a Wellness Technology Company Play It Smart?,https://medium.com/@treasureokafor74/google-capstone-project-bellabeat-case-study-d7712ddab344?source=topics_v2---------78-84--------------------0d122b92_64cc_4f12_bab3_a6e195660e78-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kbNlh1zdhgb-MZThc8IUmg.png,data-analysis 1889,1510,Performing Smartwatch Data Analysis with Python,The smartwatch industry is fiercely competitive as brands vie for consumers who prioritize their fitness. One of the applications of Data Science in healthcare is the analysis of fitness data collected by smartwatches. …,https://medium.com/@adimasnugroho/performing-smartwatch-data-analysis-with-python-eeba8a03145?source=topics_v2---------79-84--------------------0d122b92_64cc_4f12_bab3_a6e195660e78-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5yaiuAgK0Uo4X62OW0CAeg.png,data-analysis 1890,1511,Pandas: Python Data Analysis Library,"The Pandas is an essential Python library for anyone looking to work with data. Whether you’re analyzing, manipulating, or visualizing data, Pandas makes the process easy and efficient. Let’s dive in and start using this powerful tool to unlock the full potential of your data. A. Prerequisites Before working with…",https://medium.com/@21ce043/pandas-python-data-analysis-library-7cf6d0f79050?source=topics_v2---------80-84--------------------683950ac_b3c9_4509_b60c_c2d9449400af-------17,https://miro.medium.com/v2/resize:fill:140:140/0*16Y3dfmACV2eujDt.png,data-analysis 1891,1512,The Future of Data Analysis: Leveraging AI for Unprecedented Insights,"As a data analyst, I’ve seen firsthand the power of data analysis in driving business success. But with the rise of artificial intelligence (AI), we’re now able to uncover insights that were previously impossible to detect. The Intersection of Data Analysis and AI At its core, AI is about using algorithms and machine learning to identify patterns…",https://medium.com/@chi.words/the-future-of-data-analysis-leveraging-ai-for-unprecedented-insights-263bdb7adcda?source=topics_v2---------82-84--------------------683950ac_b3c9_4509_b60c_c2d9449400af-------17,https://miro.medium.com/v2/resize:fill:140:140/0*mRK0fMGAoRIpw_Zs,data-analysis 1892,1513,How to Turn your Analysis into Actionable Results,"The Struggle After spending a full week analyzing the data, you emerge from your office with a sense of satisfaction and accomplishment. Despite the fatigue, you can’t help feel excited about the possibility that the analysis has opened up. …",https://medium.com/@stacyli0720/how-to-turn-your-analysis-into-actionable-results-9d3768b15d36?source=topics_v2---------83-84--------------------683950ac_b3c9_4509_b60c_c2d9449400af-------17,https://miro.medium.com/v2/resize:fill:140:140/0*nzfGbztUOxfiSJIX,data-analysis 1893,1514,How to Use React Hooks and D3.js to Build a Dynamic Data Viz App in the Single Page Application,Introduction Data visualization is a crucial part of any data-driven application. It helps users to understand the complex data in a visual format with the effective interactions and expriences in the applicaton. React and D3.js are popular JavaScript libraries combination for creating data visualizations in Single Page Applications(SPA). …,https://medium.com/@zhongyanbin1992/how-to-use-react-hooks-and-d3-js-to-build-a-dynamic-data-viz-app-in-the-single-page-application-7c244d62d14d?source=topics_v2---------84-84--------------------683950ac_b3c9_4509_b60c_c2d9449400af-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tyH0SrTgmQx9LU8sJepHCw.png,data-analysis 1894,1515,Exploratory Analysis with Python,"Dataset: Hotel Bookings Objective: Demonstrate the flexibility of using Python to get insights from a data sample to make assumptions about the population to better evaluate future model prediction performance First thing recommended when you are not familiar with a dataset, is to do an Exploratory Analysis to understand it…",https://medium.com/@marcelbrito/exploratory-analysis-with-python-2711933f729b?source=topics_v2---------85-84--------------------683950ac_b3c9_4509_b60c_c2d9449400af-------17,https://miro.medium.com/v2/resize:fill:140:140/1*FhwR8wiVdx-ciDrpHoPmNA.png,data-analysis 1895,1430,Summary About Confidence Interval and Hypothesis Testing,"I said this often. Knowing statistics as a data analyst/scientist is a must because there will happen times where in order to find insights, you will need to interpret your data using statistical modal. So, here is the thing: “How bad do you what to understand statistics”. Again, you are…",https://medium.com/@rodriguekitweze/summary-about-confidence-interval-and-hypothesis-testing-5c0fce11182d?source=topics_v2---------86-84--------------------683950ac_b3c9_4509_b60c_c2d9449400af-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-analysis 1896,1516,Results of my Data Science book on Amazon,"I am excited to share that my book “The Data Science Manual: A Comprehensive Guide to Tools and Techniques for Data Analysis, Modeling, and Deployment with Python” has received over 1000 orders across Kindle, paperback, and free promotions (in 5 days). This book might be a good resource for anyone interested in data science, providing a comprehensive guide to the tools and techniques needed for effective data analysis, modeling, and deployment with Python. Whether you are a beginner or an experienced data scientist, I think this book has something for you.",https://medium.com/@hoangvu.kstn/results-of-my-data-science-book-on-amazon-a0d83e41537d?source=topics_v2---------87-84--------------------683950ac_b3c9_4509_b60c_c2d9449400af-------17,https://miro.medium.com/v2/resize:fill:140:140/1*cmKteYxsplAYnLPk-uDT4w.png,data-analysis 1897,1517,Comprehensive Guide to Handling NULL values in SQL,"4 most pressing questions about NULL values in SQL answered — Handling NULL values in SQL is an important aspect of database design and management. In SQL, NULL values are used to represent missing or unknown data. Almost all research experiences the issue of missing data, even in cases where the study is well-designed and well-controlled. …",https://medium.com/learning-sql/comprehensive-guide-to-handling-null-values-in-sql-e7178c31e32e?source=topics_v2---------88-84--------------------683950ac_b3c9_4509_b60c_c2d9449400af-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gsFXI4ZeDSL-ZiR3dv4-8g.png,data-analysis 1898,1518,"It’s Time to Replace Loops in Python, Let’s Do It Now!","Unleash the Full Power of Python: Say Goodbye to Tedious Loops — In today’s fast-paced world, programmers are always looking for ways to achieve more with less code. In some programming languages such as Java, this would be nearly impossible, but in Python, it’s a lot easier to do — with python one-liners. One of the most enjoyable aspects of programming with…",https://medium.com/codex/its-time-to-replace-loops-in-python-let-s-do-it-now-35804d828f5e?source=topics_v2---------89-84--------------------683950ac_b3c9_4509_b60c_c2d9449400af-------17,https://miro.medium.com/v2/resize:fill:140:140/1*aCDakGACWnl8tkhluzBdpA.jpeg,data-analysis 1899,1519,All Statistical Tests using Python: Mastering Statistics | Part — 1,Introduction Welcome to “Mastering Statistical Tests with Python: A Comprehensive Guide.” that will go over all the fundamental statistical tests and analysis methods you need to be familiar with using Python in this manual. …,https://medium.com/towards-artificial-intelligence/all-statistical-tests-using-python-mastering-statistics-part-1-996346d5add5?source=topics_v2---------90-84--------------------e5b6b87d_06a5_46a3_a257_08b874cb3536-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fFmME7vd-sX2Qrshp5PT3g.png,data-analysis 1900,1520,K-Nearest Neighbor: The Simple Concept Behind It,An Introduction to K-Nearest Neighbor: How it Works and Why it Matters — Introduction to K-Nearest Neighbor K-Nearest Neighbor is Machine Learning Algorithm that can be used for Regression as well as Classification analysis. It is a non-pragmatic algorithm that does not require any assumption about the underlying distribution of the data.,https://medium.com/@shubhamc03/k-nearest-neighbor-the-simple-concept-behind-it-e24af375f1fe?source=topics_v2---------91-84--------------------e5b6b87d_06a5_46a3_a257_08b874cb3536-------17,https://miro.medium.com/v2/resize:fill:140:140/1*nB2KwzOUUuwIeGLX3zixcw.jpeg,data-analysis 1901,1521,Best 10 practices for Data Storytelling,"The art of using data to convey a message or tell a story in an engaging, informative, and impactful manner is known as data storytelling. It is significant because it enables organizations to turn complex data into actionable insights that can drive informed decision-making. Data storytelling can help organizations communicate…",https://medium.com/@vivekgurrala/best-10-practices-for-data-storytelling-c38cc92938b5?source=topics_v2---------92-84--------------------e5b6b87d_06a5_46a3_a257_08b874cb3536-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-analysis 1902,196,How to draw auxiliary lines in Python?,"Auxiliary lines or areas are used in some cases to emphasize some parts. In this article, I am going to simply introduce how to draw…",https://medium.com/@benhui.ca/how-to-draw-auxiliary-lines-in-python-f6ba6002cbae?source=topics_v2---------93-84--------------------e5b6b87d_06a5_46a3_a257_08b874cb3536-------17,https://miro.medium.com/v2/resize:fill:140:140/1*raowozQyyGdDbwq6UNMZMA.png,data-analysis 1903,1522,Mastering End-to-End Data Science Projects: Best Practices and Strategies,A Step-by-Step Guide to Best Practices for End-to-End Data Science Projects Step 1 — Define the problem: Clearly define the problem you are trying to solve and what success looks like. It’s important to have a clear understanding of the problem before beginning any analysis. Step 2 — Gather data: Identify the data sources that you will need to use for your project. It’s important to ensure that the data is reliable…,https://medium.com/@suneelpatel18/mastering-end-to-end-data-science-projects-best-practices-and-strategies-19c54c6aed18?source=topics_v2---------94-84--------------------e5b6b87d_06a5_46a3_a257_08b874cb3536-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rLlh-K-PRuZ7X5xNSCq2BA.png,data-analysis 1904,1523,Step-by-Step Guide: Implementing Blockchain in the Supply Chain for Enhanced Transparency,"Blockchain technology has become increasingly popular in recent years as a means of enhancing transparency and accountability in various industries, including the supply chain. …",https://medium.com/@houtman80/step-by-step-guide-implementing-blockchain-in-the-supply-chain-for-enhanced-transparency-8e04d9a4aab8?source=topics_v2---------95-84--------------------e5b6b87d_06a5_46a3_a257_08b874cb3536-------17,https://miro.medium.com/v2/resize:fill:140:140/0*-n2aAIq85u7Ycl3t,data-analysis 1905,1524,Top Data Skills for a Successful Career,"Tools and Resources to Learn SQL, Excel, Python, Data Analysis — Companies are recognizing the need to manage their data effectively. Data science has consistently been one of the fastest-growing occupations in America. Even without a designated data professional, someone within your organization has to step up and take on the responsibility of dealing with the data. For myself and others…",https://medium.com/@Jason_Feller/top-data-skills-for-a-successful-career-246e53f257d0?source=topics_v2---------96-84--------------------e5b6b87d_06a5_46a3_a257_08b874cb3536-------17,https://miro.medium.com/v2/resize:fill:140:140/0*mas90oIy8HMJshcc,data-analysis 1906,1525,The Best Resources to Learn SQL (fast!),"If you’re an aspiring Data Analyst, Data Engineer, or Data Scientist, it is absolutely ESSENTIAL for you to learn SQL. SQL (Structured Query Language), is the tool you’ll use the most to create databases, organize data, and do most of your daily job functions. In my current role, I use…",https://medium.com/@joshuaalmodovar/the-best-resources-to-learn-sql-fast-4cb90d75d114?source=topics_v2---------97-84--------------------e5b6b87d_06a5_46a3_a257_08b874cb3536-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Yt2xOtkqQpOTf-FG,data-analysis 1907,1279,🤖ML: Must know concepts around Probability,"Exploratory data analysis helps you understand how to discover patterns in data using various techniques and approaches. And it is also an important phase of any data analysis. Although we have a large amount of data coming in for data analysis, the truth is, we have to work with only…",https://medium.com/@gursewaksingh-51905/ml-must-know-concepts-around-probability-9bc01b497d5?source=topics_v2---------98-84--------------------e5b6b87d_06a5_46a3_a257_08b874cb3536-------17,https://miro.medium.com/v2/resize:fill:140:140/0*nx9kisxtWqf5g4Y0,data-analysis 1908,1440,Day 3 Data Science interview questions (Goldman Sachs/ Statistics):,What is heteroskedasticity and how can we solve it? — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — - 1. Robust standard errors: This is a popular method that…,https://medium.com/@MattYuChang/day-3-data-science-interview-questions-goldman-sachs-statistics-8904bfca6d23?source=topics_v2---------99-84--------------------e5b6b87d_06a5_46a3_a257_08b874cb3536-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-analysis 1909,1526,"Say it, Predict it: Simplifying Machine Learning with ChatGPT","Revolutionizing Data Analysis: How ChatGPT is Simplifying Business Insights — Say Goodbye to Complex Analytics Tools! — In today’s data-driven world, businesses must rely on data analysis to make informed decisions and stay competitive in their respective industries. However, analyzing data can be a complex and daunting task, often requiring specialized technical knowledge that not everyone possesses. …",https://medium.com/@osas.usen/say-it-predict-it-simplifying-machine-learning-with-chatgpt-23c25c7712e6?source=topics_v2---------100-84--------------------fcdbdbfb_fdbe_4c63_af14_3063e1d22371-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LNUN8yvLZYV9HgdRtvpncA.png,data-analysis 1910,1527,Analyze Customer Product Reviews Using ChatGPT OpenAi API: A Step-by-Step Guide To Extracting Business Insights From Sentiment Analysis Part 1,"· What you need to know to use ChatGPT · How does ChatGPT work? · How using ChatGPT to analyze customer feedback data can help your company · ChatGPT excels at language generation tasks using artificial intelligence · AI-powered Analytics in Action: Extract Insights From Customer Product Reviews using sentiment analysis with the openAI…",https://medium.com/startup-stash/analyze-customer-product-reviews-using-chatgpt-openai-api-a-step-by-step-guide-to-extracting-5cb599608c8d?source=topics_v2---------101-84--------------------fcdbdbfb_fdbe_4c63_af14_3063e1d22371-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Xi5M-ZH4gciEN4KCTMxUAw.png,data-analysis 1911,1401,Columnstore Indexes in SQL Server: Improving Query Performance for Large Data Analysis 📊,"One of the most difficult challenges in dealing with large datasets is optimizing query performance so that results are returned quickly and efficiently. Columnstore indexes come into play here, providing a high-performance solution for analytical workloads. Columnstore indexes were introduced in SQL Server 2012 and have since been improved, including…",https://medium.com/@ruimigueltcarvalho/columnstore-indexes-in-sql-server-improving-query-performance-for-large-data-analysis-bc3c591f5e44?source=topics_v2---------102-84--------------------fcdbdbfb_fdbe_4c63_af14_3063e1d22371-------17,https://miro.medium.com/v2/resize:fill:140:140/0*5a0FIB620Qnj-wzR,data-analysis 1912,1436,ModuleNotFoundError: No Module Named ‘Pandas’ — Easy Solution in Python,"Want to install Pandas but keep getting ModuleNotFoundError — No Module Named Pandas error? This article shows you a couple of solutions that are guaranteed to work. — ModuleNotFoundError — No Module Named ‘Pandas’ The ModuleNotFoundError — No Module Named ‘Pandas’ error occurs because the Python interpreter can’t locate your installation of the Pandas library. The easiest solution is to make sure Pandas is installed, which you can do with the following shell commands, depending on your Python installation (either Pip or Anaconda):",https://medium.com/practical-pandas/modulenotfounderror-no-module-named-pandas-easy-solution-in-python-616f1331abf6?source=topics_v2---------103-84--------------------fcdbdbfb_fdbe_4c63_af14_3063e1d22371-------17,https://miro.medium.com/v2/resize:fill:140:140/1*x4uwrnXOouZP77Fplsj1sw.jpeg,data-analysis 1913,1528,Pandas DataFrame: How to Show All Columns and Rows,"A guide for configuring Pandas options to display all columns and rows When working with large datasets, it can be helpful to visualize all columns and rows. By default, Pandas truncates DataFrames when displayed, which can make it difficult to analyze the data. In this tutorial, we’ll learn how to…",https://medium.com/python-in-plain-english/pandas-dataframe-how-to-show-all-columns-and-rows-e3a1db4efa12?source=topics_v2---------104-84--------------------fcdbdbfb_fdbe_4c63_af14_3063e1d22371-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oa92jDtUN3rlllN0PK9biw.jpeg,data-analysis 1914,1529,Mastering the Top 23 Pandas Techniques for Data Analysis,"Unlock Your Full Potential with These Essential Pandas Skills — Pandas is a powerful, open-source Python library that provides data manipulation and analysis tools, making it an indispensable resource for data scientists and analysts alike. This article aims to guide you through the ultimate 23 techniques you need to become a Pandas expert. By mastering these techniques, you’ll be able…",https://medium.com/@johnvastola/the-only-23-methods-you-should-master-to-become-a-pandas-pro-eb5f0a5a3330?source=topics_v2---------105-84--------------------fcdbdbfb_fdbe_4c63_af14_3063e1d22371-------17,https://miro.medium.com/v2/resize:fill:140:140/0*gZZ6icMxCLqu_pat,data-analysis 1915,1530,A Step-by-Step Guide to Random Variables: The Long Jump Tournament Tutorial,"Welcome to our intuitive guide to random variables, inspired by the story of the long jump tournament. In this tutorial, we will walk you through the steps to understand and analyze the relationship between two random variables, using the examples from the long jump tournament. Let’s dive in! Step 1…",https://medium.com/@etietopabraham/a-step-by-step-guide-to-random-variables-the-long-jump-tournament-tutorial-c994e76a7b5c?source=topics_v2---------106-84--------------------fcdbdbfb_fdbe_4c63_af14_3063e1d22371-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WtL--jlDWR8rmoBs,data-analysis 1916,1531,Analysis of the BMTC dataset: Which bus do you want to board?,"All of us are increasingly dependent on public transport for commuting. And that is why it is important for us as passengers to know how much time it will take between any pair of bus stations, which routes will be crowded and what time of the day we should go…",https://medium.com/@srmp1382/analysis-of-the-bmtc-dataset-which-bus-do-you-want-to-board-b686193efdae?source=topics_v2---------107-84--------------------fcdbdbfb_fdbe_4c63_af14_3063e1d22371-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tGTd3h44MBxiauhcW287Yg.png,data-analysis 1917,1532,Problem solving with SQL: Case Study #1 — Danny’s Diner,"Thank you Danny Ma for the excellent case study! You can find it here and try it yourself. While at it, you should give Danny Ma a follow on LinkedIn and support his posts if you aren’t already doing so! I’ve posted the solution to this case study as a…",https://medium.com/@alumassy/problem-solving-with-sql-case-study-1-dannys-diner-3806b7cc72cb?source=topics_v2---------108-84--------------------fcdbdbfb_fdbe_4c63_af14_3063e1d22371-------17,https://miro.medium.com/v2/resize:fill:140:140/0*66EPHqpe7vwW0-Pi.png,data-analysis 1918,1533,5 Things That I Look For When Optimizing SQL,It can be challenging to jump into a query with little foreknowledge of its purpose and the supporting structures. Having a mental checklist of common issues can be useful to quickly get to the meat of the problem. NOTE: I primarily work within Snowflake which does not use indexes. I…,https://medium.com/@zakary.leblanc/5-things-that-i-look-for-when-optimizing-sql-524cfa8e027f?source=topics_v2---------109-84--------------------fcdbdbfb_fdbe_4c63_af14_3063e1d22371-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9disbghCASDljVRfQ_Pw7g@2x.jpeg,data-analysis 1919,1534,A Map to Explain all Data Roles,"A Comprehensive Simple Guide Today’s world revolves around data — there’s no getting around this fact. Every time we use our smartphones or log into our laptops, we leave a trail of data behind us. That data holds key insights into our behavior, what we like, the products we buy…",https://medium.com/@loresowhat/a-map-to-explain-all-data-roles-970ed69ba1?source=topics_v2---------110-84--------------------d5a6566b_f609_4f3c_885f_60f45634fa54-------17,https://miro.medium.com/v2/resize:fill:140:140/0*gQbfTu0jAbVlrWHS,data-analysis 1920,1535,Python Programming Standards You Should Know and Apply,"In this article, we will cover some of Python applications, its best practices and standards. You need to apply them to improve your Python programming. — Coding is the art of communicating with computers and developing programs/applications that help humans to ease their life. It helps the developers to provide input to the computers through programs and get the desired output. Coding can be compared with the natural languages that we speak, for example, English. Just…",https://medium.com/@nathanrosidi/python-programming-standards-you-should-know-and-apply-37d7711ef49c?source=topics_v2---------111-84--------------------d5a6566b_f609_4f3c_885f_60f45634fa54-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EtbbFp4MXGeDG_dQ29I0eQ.png,data-analysis 1921,1536,Why you should remove the index column before removing duplicates,When the data frame has an index column and there are duplicates rows as given below,https://medium.com/@haseeba1/why-you-should-remove-the-index-column-before-removing-duplicates-ba57f010e55?source=topics_v2---------112-84--------------------d5a6566b_f609_4f3c_885f_60f45634fa54-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-VJ9zQ1JZVtBPeMVsp-Vhg.jpeg,data-analysis 1922,1537,Exploding a list-like column with Pandas explode() method,"Introduction to Pandas explode() and how to use it to reshape a Series or a DataFrame — In the step of data pre-processing, we often need to prepare our data in specific ways before feeding it into a machine learning model. One of the examples is to transform list-like columns into rows. …",https://medium.com/@bindichen/exploding-a-list-like-column-with-pandas-explode-method-3ffd41f9f7e2?source=topics_v2---------113-84--------------------d5a6566b_f609_4f3c_885f_60f45634fa54-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hIqLfOMraD5hErwXdF2RRQ.jpeg,data-analysis 1923,1538,Improving Customer Lifetime Value Using Data Analytics,"Strategies, Approaches, and Techniques for Businesses & Organizations Looking to Increase Profitability of Customers In today’s fast-paced business world, customer lifetime value (LTV) is a critical metric for businesses to measure. LTV represents the total amount of revenue that a customer will generate over the course of their relationship with a business. Improving LTV is important because it can help businesses increase their profitability…",https://medium.com/@RenderAnalytics/improving-customer-lifetime-value-using-data-analytics-a3b43e6d38c5?source=topics_v2---------114-84--------------------d5a6566b_f609_4f3c_885f_60f45634fa54-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Pye4AXKRLbgZTOrQ.png,data-analysis 1924,1539,Life Expectancy and GDP,My research about 6 countries’ data The Data The source of data is the WHO. The csv file was prepared by Codecademy whose Data Visualization Portfolio Project is this very project. …,https://medium.com/@guldveronika/life-expectancy-and-gdp-94ddb37013d5?source=topics_v2---------115-84--------------------d5a6566b_f609_4f3c_885f_60f45634fa54-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6Vy1jugiS7xWaX4qClJcag.png,data-analysis 1925,1540,SQL Challenge 2: Pizza Runner (Exploratory Data Analysis),By Okonkwo Chukwuebuka Malcom Introduction This is the challenge 2 — Pizza Runner of the 8 Weeks SQL Challenge by Danny Ma. I am playing the role of a data analyst at Pizza Runner. The Week 2 task encompasses both Data Cleaning and Exploratory Data Analysis. The Data cleaning phase of…,https://medium.com/@okonkwoebuka456/sql-challenge-2-pizza-runner-exploratory-data-analysis-a9e48db2a191?source=topics_v2---------116-84--------------------d5a6566b_f609_4f3c_885f_60f45634fa54-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_qg3jgz0W4aJ8AQEFyNesw.png,data-analysis 1926,1541,How to Build a Low-Code Sales Dashboard with Python and Deepnote,"A Step-by-Step Guide to Building an Interactive Dashboard with Deepnote’s Visual Blocks and Python — A sales dashboard is one of the most crucial elements that keep the sales management team on track to success. It helps the team to monitor performance, identify trends, and make informed decisions. However, building a sales dashboard using the traditional approach is often time-consuming and complex, especially if you…",https://medium.com/towards-artificial-intelligence/how-to-build-a-low-code-sales-dashboard-with-python-and-deepnote-c6aba647151e?source=topics_v2---------117-84--------------------d5a6566b_f609_4f3c_885f_60f45634fa54-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3kZVjbqjhHt65CzZp9C4FA.png,data-analysis 1927,1542,Analysis of New York Boroughs using Machine Learning,"Introduction As an ardent watcher of Hollywood sitcoms, New york city is a massive part of my movie experience. Even though these comedic television shows might not portray the realism of the city, it is a city I have taken a liking to due to these shows. When I decided to…",https://medium.com/@raheemadil45/c-f294d21f1c59?source=topics_v2---------118-84--------------------d5a6566b_f609_4f3c_885f_60f45634fa54-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ZrRNdO5unGVzAUHHX-kpRQ.jpeg,data-analysis 1928,1520,"Ensemble Techniques: Bagging, Boosting, and Stacking","Ensemble Methods Demystified: An Overview of Bagging, Boosting, and Stacking — The purpose of the ensemble technique is to combine weak learners and form a strong model Ensemble Techniques: Bagging → Random Forest Boosting → Adaboost, Gradient boosting, and Extreme Gradient Boosting Stacking 1. Bagging:- Homogeneous weak learners: All models of the same algorithm. For example in bagging all models are…",https://medium.com/@shubhamc03/ensemble-techniques-bagging-boosting-and-stacking-8c3c376026e7?source=topics_v2---------119-84--------------------d5a6566b_f609_4f3c_885f_60f45634fa54-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0t98eGOU8u2CiZMSZVYlog.jpeg,data-analysis 1929,1193,The Power of Patterns: How Data Distribution Shapes our Understanding,“Data without distribution is like a heart without a beat — lifeless and useless. Distribution is the pulse that brings data to life and provides the insights that drive meaningful results.” — William Briggs What is Data Distribution? Data distribution is an essential concept in statistics that refers to the way in which data…,https://medium.com/@shubham.sg53147/the-power-of-patterns-how-data-distribution-shapes-our-understanding-d5255d16b782?source=topics_v2---------120-84--------------------8f79414e_88d1_4e4f_a445_f24105085866-------17,https://miro.medium.com/v2/resize:fill:140:140/0*bJQWC2zXq2XkCWs6,data-analysis 1930,1543,Spotify Top 2000 Songs Playlist — Exploratory Analysis Using R,"Spotify Top 2000 Songs Playlist — Exploratory Analysis Using R As far as I can remember, my life has always involved music in one way or another. From family quinceañeras to playing violin in a symphony, music has allowed me to appreciate the intricacies that go into curating a great…",https://medium.com/@miguel935114/spotify-top-2000-songs-playlist-exploratory-analysis-using-r-a80f8d0d6545?source=topics_v2---------121-84--------------------8f79414e_88d1_4e4f_a445_f24105085866-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5LjhSv91ygAk5-kf16DZdg.jpeg,data-analysis 1931,196,How to use matplotlib-rcParams to custom your visual style in Python?,"matplotlib-rcParams can be used in jupyter environment to custom visual style. Once setups, every box in jupyter will use the same style. Let’s see the default style: import numpy as np import matplotlib.pyplot as plt plt.figure(dpi=100) plt.plot([1,2,3]) Let’s make some change: #lines.linestyle: default '-' #lines.marker: default no marker #axes.grid: default False import matplotlib…",https://medium.com/towardsdev/how-to-use-matplotlib-rcparams-to-custom-your-visual-style-in-python-6aadd413b4ff?source=topics_v2---------122-84--------------------8f79414e_88d1_4e4f_a445_f24105085866-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BxOoBHDPny7_O5pJnQrbzg.png,data-analysis 1932,1479,An Overview into VTubers: Modern Days Influencer?,"What are VTubers? VTubers, or Virtual YouTubers, are online personas who use virtual avatars or characters to create content on platforms such as YouTube or Twitch. These avatars are often generated using motion capture technology or real-time animation software. Kizuna AI is widely considered to be the first popular VTuber. …",https://medium.com/@rifset/an-overview-into-vtubers-modern-days-influencer-b83ad72b4c69?source=topics_v2---------123-84--------------------8f79414e_88d1_4e4f_a445_f24105085866-------17,https://miro.medium.com/v2/resize:fill:140:140/0*pJO-YaKlw-rPxTm9.jpg,data-analysis 1933,1523,How Blockchain Technology is Enhancing Transparency and Accountability in the Supply Chain,"The supply chain industry is a complex network of interconnected activities involving multiple stakeholders, including manufacturers, suppliers, distributors, retailers, and customers. However, this industry faces several challenges, including a lack of transparency and accountability. Blockchain technology has the potential to address these challenges by providing a secure and transparent platform…",https://medium.com/coinmonks/how-blockchain-technology-is-enhancing-transparency-and-accountability-in-the-supply-chain-64adeebc50a5?source=topics_v2---------124-84--------------------8f79414e_88d1_4e4f_a445_f24105085866-------17,https://miro.medium.com/v2/resize:fill:140:140/0*pr_DBQ-nZ3Wcw1QV,data-analysis 1934,1544,Data Visualization: Tyrese’s Secret Weapon For Making Data Accessible And Engaging,"Meet Tyrese, the charismatic data scientist at Cable and Wireless who has a knack for communicating complex data insights in a way that even non-technical team members can understand. With a passion for uncovering hidden patterns and trends in data, Tyrese was excited to embark on his latest project. …",https://medium.com/@datasciguy/data-visualization-tyreses-secret-weapon-for-making-data-accessible-and-engaging-38de9c2c7f06?source=topics_v2---------125-84--------------------8f79414e_88d1_4e4f_a445_f24105085866-------17,https://miro.medium.com/v2/resize:fill:140:140/1*eOPRS6Qig-vCFDnbSxjZ5w.png,data-analysis 1935,1545,Lambda Functions in Python: The Ultimate Guide to Simplifying Your Code,"Lambda functions, also known as anonymous functions, are a feature in Python that allow us to create small, single-line functions without a name. These functions are useful in situations where we need to pass a function as an argument to another function, or when we want to define a function…",https://medium.com/@mmutakilu/lambda-functions-in-python-the-ultimate-guide-to-simplifying-your-code-3a097fd783a5?source=topics_v2---------126-84--------------------8f79414e_88d1_4e4f_a445_f24105085866-------17,https://miro.medium.com/v2/resize:fill:140:140/1*KO8fESZZCXnhj9x-GiQLxw.jpeg,data-analysis 1936,1546,Supporting Pieces For Data Storytelling,"A Guide to Mastering the Art of Data Storytelling and Engaging Your Audience with Compelling Visualizations and Design — In a previous article, I explored Storytelling in Data and associated topics, which received a positive amount of attention from readers. As with most things in the data realm, there’s more to cover. The art of storytelling goes beyond providing context, identifying disputes, and presenting solutions; that’s simply the foundation…",https://medium.com/towards-data-science/supporting-pieces-for-data-storytelling-a0b5c69a476c?source=topics_v2---------127-84--------------------8f79414e_88d1_4e4f_a445_f24105085866-------17,https://miro.medium.com/v2/resize:fill:140:140/1*AMlEIg5NJTm04MIal_LwhA.png,data-analysis 1937,1440,"Day 2 Data Science interview questions (Visa, PayPal/ Statistics):","Explain what Linear Discriminant Analysis (LDA) is. — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — - At its core, LDA is a method of dimensionality reduction that helps…",https://medium.com/@MattYuChang/day-2-data-science-interview-questions-visa-paypal-statistics-c00a3afd5703?source=topics_v2---------128-84--------------------8f79414e_88d1_4e4f_a445_f24105085866-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-analysis 1938,1547,Top 10 Data Science Tools,"Top 10 Data Science Tools What is Data Science and Data Mining? What is CRISP DM? For Data Mining process, we usually use CRISP DM data mining process: Based on: https://www.datascience-pm.com/crisp-dm-2/ Data Mining process steps includes Business Understanding, Data Understanding, Data Preparation, Modeling, Evaluation, Deployment. Business Understanding step – we…",https://medium.com/@gohminghui88/top-10-data-science-tools-c0ba3ef3062a?source=topics_v2---------129-84--------------------8f79414e_88d1_4e4f_a445_f24105085866-------17,https://miro.medium.com/v2/resize:fill:140:140/1*cpBsdHALv1QuLDynTFTAJA.jpeg,data-analysis 1939,1548,Displaying Durations in PowerBI: A Client Case Study,"As a data visualization consultant, I often encounter situations where clients’ expectations clash with what is technically possible or correct. …",https://medium.com/@alex.chapman93/displaying-durations-in-powerbi-a-client-case-study-73059c9a08b7?source=topics_v2---------130-84--------------------1bda405b_5093_428f_b292_6b4210dabdf0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WdmUaBmJTq0D01ur,data-analysis 1940,1549,Data Cleaning with Turbo Prep in RapidMiner: Absenteeism at Work,"What is RapidMiner and Turbo Prep? RapidMiner is a user-friendly platform for data analytics that provides many tools to help users in data preparation, mining, visualizations, and machine learning among others. One of the tools that we will be using from RapidMiner is called Turbo Prep, which is designed to…",https://medium.com/@sandralay010/data-cleaning-with-turbo-prep-in-rapidminer-absenteeism-at-work-890587975ae8?source=topics_v2---------131-84--------------------1bda405b_5093_428f_b292_6b4210dabdf0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*uxXKufoiGSSV27GEebHckA.png,data-analysis 1941,40,Boost Your Python Programming Efficiency with These 20 Single-Line Codes — A Beginner-Friendly Guide,"Hey there! Today, we’re going to talk about something really cool called Python. It’s not a type of snake, though! Python is a type of computer language that programmers use to create all kinds of fun and useful things, like websites, games, and apps. Now, you might be thinking, “But…",https://medium.com/@pelinokutan/boost-your-python-programming-efficiency-with-these-20-single-line-codes-a-beginner-friendly-f254bba2afa1?source=topics_v2---------132-84--------------------1bda405b_5093_428f_b292_6b4210dabdf0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*il7dS9cI-a0qn83z,data-analysis 1942,1550,Why is the “group by” function so important?,"Detailed explanations about Group By function with example. Python offers a wide range of functions to work with data, and the group by function is one of the most useful tools for data analysis. Group by allows us to group data based on a specific column in a dataset, and…",https://medium.com/@kaancukurx/why-is-the-group-by-function-so-important-b5c81cdb41ce?source=topics_v2---------133-84--------------------1bda405b_5093_428f_b292_6b4210dabdf0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4JnRoQo84cPke1wzorPOyQ.png,data-analysis 1943,40,The Future of AI Ethics: Striking a Balance between Progress and Responsibility,"The rise of artificial intelligence has brought about incredible advancements in fields like healthcare, finance, and transportation. However, as AI continues to become more powerful and ubiquitous, it’s important to consider the ethical implications of its use. …",https://medium.com/the-ai-tools-digest/the-future-of-ai-ethics-striking-a-balance-between-progress-and-responsibility-f4188778e962?source=topics_v2---------134-84--------------------1bda405b_5093_428f_b292_6b4210dabdf0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*YPkjNiFTtG2WwPSC,data-analysis 1944,1551,From Scatterplots to Heat Maps: How to Choose the Best Visualization Plot for Your Data,"From Scatterplots to Heat Maps: How to Choose the Best Visualization Plot for Your Data As the world becomes more data-driven, businesses are investing in data analysis to draw insights and make informed decisions. However, drawing insights alone isn’t enough. Communicating insights effectively to stakeholders, decision-makers, and the public is…",https://medium.com/@sampathsrikar/from-scatterplots-to-heat-maps-how-to-choose-the-best-visualization-plot-for-your-data-5f58338a1991?source=topics_v2---------135-84--------------------1bda405b_5093_428f_b292_6b4210dabdf0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*uLamxPxc5tuFdOfy,data-analysis 1945,1552,Why Business Insights are Essentials to “Grow Your Business”,"Find how business insights can help you make informed decisions about products, services, and operations, which ultimately leads your business to growth and success. — Business insights refer to the valuable information that companies can gather through various sources, such as customer data, market trends, and internal operations. These insights help organizations make informed decisions about their operations, products, and services, which, in turn, can lead to growth and success.",https://medium.com/@BusinessInsights/why-business-insights-are-essentials-to-grow-your-business-6b5885db24ea?source=topics_v2---------136-84--------------------1bda405b_5093_428f_b292_6b4210dabdf0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*nvd8Yg8u_QHwSd1T,data-analysis 1946,1553,ChatGPT: Your AI Companion for Pandas Mastery,"Are you tired of the same old lectures and study methods? Do you feel like you’re stuck in a never-ending cycle of textbooks and note-taking? It’s time to break free and embrace the future of learning with ChatGPT, your personal AI tutor. Transform the learning journey into an interactive and…",https://medium.com/the-power-of-ai/chatgpt-your-ai-companion-for-pandas-mastery-35cde416f9b3?source=topics_v2---------137-84--------------------1bda405b_5093_428f_b292_6b4210dabdf0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*_0tfsRYncsh5n-34.jpg,data-analysis 1947,1554,7 Steps to Help You Make Your Matplotlib Bar Charts Beautiful,"Easily Improve the Quality of Your Matplotlib Data Visualisations With a Few Simple Tweaks — Bar charts are a commonly used data visualisation tool where categorical features are represented by bars of varying lengths/heights. The height or length of the bar corresponds to the value being represented for that category. Bar charts can easily be created in matplotlib. However, the matplotlib library is often regarded…",https://medium.com/towards-data-science/7-steps-to-help-you-make-your-matplotlib-bar-charts-beautiful-f87419cb14cb?source=topics_v2---------138-84--------------------1bda405b_5093_428f_b292_6b4210dabdf0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4aNiYaHY4a36-4IQG9AjfA.png,data-analysis 1948,1497,Write Your First SQL ETL Pipeline (Part II),"How to create and load an aggregate table for your GCP usage using ETL principles and SQL commands. — Writing A SQL ETL Pipeline: Desired Output Although Python gets more love when it comes to creating ETL/ELT/EL pipelines, SQL can be just as efficient when it comes to creating a recurring load job. This is part II in a two part series. If you’re at all lost, please see part I. When creating a new pipeline…",https://medium.com/learning-sql/write-your-first-sql-etl-pipeline-part-ii-c22b28ec5aca?source=topics_v2---------139-84--------------------1bda405b_5093_428f_b292_6b4210dabdf0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3ESLCL1kW3eJdKoG4Uikzw.jpeg,data-analysis 1949,1496,Essential Excel Functions for Data Analysis and Manipulation,"Excel is a powerful tool for organizing, analyzing, and manipulating data. Here are some of the most basic functions that you can use: SUM: Adds up a range of cells Example: =SUM(A1:A10) adds up the values in cells A1 through A10. 2. AVERAGE: Calculates the average of a range of…",https://medium.com/@amulyakandukuri4/essential-excel-functions-for-data-analysis-and-manipulation-e6016104648e?source=topics_v2---------140-84--------------------75b00587_42f6_44bd_b78b_3ad3ce53ab76-------17,https://miro.medium.com/v2/resize:fill:140:140/1*2F1ta5wAvwC6TS7AYlH0eg.png,data-analysis 1950,1555,Analyzing the Titanic Dataset: A Story of Tragedy and Survival,"Introduction Over the weekend, I watched the movie Titanic and was once again reminded of the harrowing tragedy that unfolded over a century ago. As a data analyst, I couldn’t help but wonder: what insights could we gain from the available data about the passengers on board? What factors contributed to…",https://medium.com/dev-genius/analyzing-the-titanic-dataset-a-story-of-tragedy-and-survival-48883b2f2d48?source=topics_v2---------141-84--------------------75b00587_42f6_44bd_b78b_3ad3ce53ab76-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hBha81W5OnZroXcr2_49WQ.png,data-analysis 1951,1556,Data Analyst vs Data Engineer: What’s the Difference?,"Tools and Responsibilities Compared In today’s data-driven world, there are many different roles that are involved in managing, analyzing, and utilizing data. Two of the most important roles are data analysts and data engineers. While the two roles may sound similar, they actually have very different responsibilities and skill sets. What is Data Analysis? …",https://medium.com/@a.alperenyildirim/data-analyst-vs-data-engineer-whats-the-difference-8a3e0558cdaf?source=topics_v2---------142-84--------------------75b00587_42f6_44bd_b78b_3ad3ce53ab76-------17,https://miro.medium.com/v2/resize:fill:140:140/0*V7aYoZDWet4HUc4z,data-analysis 1952,1557,Data-Driven Swimming: How Analytics Can Enhance Your Start and Turn Performance,"Our resume of the Experienti@ mobilitie in Eindhoven The result of a swimmer is always teamwork… Despite saying that swimming is an individual sport, so many components and people play an essential role in a swimmer’s success. It all comes down to the coach, the methods, the understanding of physical…",https://medium.com/@umimplavat/data-driven-swimming-how-analytics-can-enhance-your-start-and-turn-performance-f2d253125e63?source=topics_v2---------143-84--------------------75b00587_42f6_44bd_b78b_3ad3ce53ab76-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DKV3AkfHkzVs5-sCHYeNrA.jpeg,data-analysis 1953,1558,Time Series Feature Extraction with Python and Pandas: Techniques and Examples,"Learn how to extract meaningful features from time series data using Pandas and Python, including moving averages, autocorrelation, and Fourier transforms. Introduction Time series analysis is a powerful tool for understanding and predicting trends in various industries such as finance, economics, healthcare, and many more. Feature extraction is a crucial step…",https://medium.com/geekculture/time-series-feature-extraction-with-python-and-pandas-techniques-and-examples-2e2158de5356?source=topics_v2---------144-84--------------------75b00587_42f6_44bd_b78b_3ad3ce53ab76-------17,https://miro.medium.com/v2/resize:fill:140:140/0*t2ALTuv2aoBRHx-6,data-analysis 1954,1559,The future of AI: Beam of light or dawn of darkness,"The future of AI: Beam of light or dawn of darkness Young or old, educated or not, one cannot be blind to the powers AI and its emerging technologies possesses. It is everywhere, down to the device used in reading this. For those well versed in technology, artificial intelligence and…",https://medium.com/@olivechiamaka64/the-future-of-ai-beam-of-light-or-dawn-of-darkness-e54edb8fb41e?source=topics_v2---------145-84--------------------75b00587_42f6_44bd_b78b_3ad3ce53ab76-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kli0f5uPyBx7kPyHMoH2wQ.jpeg,data-analysis 1955,1496,Excel Data Analysis,"Unleashing the Power of Pivot Tables, Charts, and Statistical Functions Excel is a powerful tool for data analysis and offers a range of features to help users analyze and manipulate data. Here are some basic steps for data analysis in Excel: Importing Data: Start by importing your data into Excel…",https://medium.com/@amulyakandukuri4/excel-data-analysis-753dc81ed8ac?source=topics_v2---------146-84--------------------75b00587_42f6_44bd_b78b_3ad3ce53ab76-------17,https://miro.medium.com/v2/resize:fill:140:140/1*dZ5aX2HOyv8NcO7Nlf9feg.png,data-analysis 1956,1520,Deep Learning: Artificial Neural Network,"Concept of an Artificial Neural Network, Gradient Descent, and Model building steps — Artificial Intelligence Mimic human behavior, Machine learning train machines for predictions, and Deep learning Mimic brain and make Decision. Deep learning: Supervised deep learning Brain parts and their functions Temporal lobe:- Responsible for Data preprocessing → Artificial Neural Network. Occipital lobe:-Responsible for Vision → Convolutional Neural Network.",https://medium.com/@shubhamc03/deep-learning-artificial-neural-network-54c955a14b43?source=topics_v2---------147-84--------------------75b00587_42f6_44bd_b78b_3ad3ce53ab76-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rL3XKlNAl6P9l20tS68G_w.jpeg,data-analysis 1957,1560,Pandas 2.0: A Faster Version of Pandas,"Pandas 2.0, the latest version of the popular Python library for data manipulation, has just been released. If you’re not familiar with it, think of it as a highly capable, programmatic spreadsheet. Pandas has become a staple of many data science and machine learning systems due to its versatility and…",https://medium.com/@taureanjoe/pandas-2-0-a-faster-version-of-pandas-95d8c0b2d91b?source=topics_v2---------148-84--------------------75b00587_42f6_44bd_b78b_3ad3ce53ab76-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Zg5iaVHIYyrS6oBmBRFmSw.png,data-analysis 1958,1561,Two (discounted) coffees better than one?,"A case study that uses data analytics to explain consumer behaviour using a Starbucks offers dataset — A Latte, a Capp… Espresso, Macchiato, Frappucino… Then there is Iced Tea, Lemonade, Smoothie… If you’re hungry, Bagels, a Croissant, Scones… Different options for different people with different preferences, all available in any Starbucks store, whichever from the 17 thousand that the company has around the globe. That’s a long…",https://medium.com/@martin.pons.martinez/two-discounted-coffees-better-than-one-34fc726f1bfb?source=topics_v2---------149-84--------------------75b00587_42f6_44bd_b78b_3ad3ce53ab76-------17,https://miro.medium.com/v2/resize:fill:140:140/1*drT0xMqJ0aN9p-x0Ozt3Wg.jpeg,data-analysis 1959,1483,The Portfolio that Got Me a Data Scientist Job,"Spoiler alert: It was surprisingly easy (and free) to make — Getting a Data Scientist job is hard. This isn’t 2015 anymore: it’s not enough to know a few pandas functions and put the words “Big Data” on your résumé. Competition for the top jobs is fierce. On a recent trawl through the LinkedIn jobs board, I struggled to find a…",https://medium.com/towards-data-science/the-portfolio-that-got-me-a-data-scientist-job-513cc821bfe4?source=topics_v2---------150-84--------------------9f3c2e80_1cda_40fa_be22_2aebab016967-------17,https://miro.medium.com/v2/resize:fill:140:140/0*s_2v-F5reG1ofF8C,data-analysis 1960,1545,Data Analysis vs. Data Science: Which Path is Right for You?,"Data has become a valuable commodity in today’s world, and with the increasing use of technology, data-related jobs are gaining more importance. Data Science and Data Analysis are two of the most sought-after jobs in this field. However, many people confuse these two jobs as the same thing. In this…",https://medium.com/@mmutakilu/data-analysis-vs-data-science-which-path-is-right-for-you-def6b5800054?source=topics_v2---------151-84--------------------9f3c2e80_1cda_40fa_be22_2aebab016967-------17,https://miro.medium.com/v2/resize:fill:140:140/1*GMyf58KJoNawGFx8bUX-hQ.png,data-analysis 1961,1562,Starting Your Data Analytics Journey: A Comprehensive Guide for college students and recent graduates,"Kickstart your data analytics career with this easy-to-follow guide, tailored especially for young professionals! — Introduction: Are you a recent graduate who’s considering diving into the world of data analytics? You’re not alone! Data analytics is a booming field, offering exciting career opportunities and the chance to make a real impact. But where do you start? In this comprehensive guide, we’ll break down the essential…",https://medium.com/@rishabh.khampariya20/starting-your-data-analytics-journey-a-comprehensive-guide-for-college-students-and-recent-2400b1492a47?source=topics_v2---------152-84--------------------9f3c2e80_1cda_40fa_be22_2aebab016967-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-analysis 1962,1563,Tableau: Displaying histogram in a single visualization as N columns,Histogram is a good choose if we want to compare dimension (ex: supplier) by measure (ex: total spend). But when we have more values in the dimension we have to scroll up-and-down to see all of then. …,https://medium.com/@jafarov_toghrul/displaying-histogram-in-a-single-visualization-as-n-columns-in-tableau-fcc569e39abc?source=topics_v2---------153-84--------------------9f3c2e80_1cda_40fa_be22_2aebab016967-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4_shkZFC5rOIdkxx38kSdg.png,data-analysis 1963,1564,Soft Skills to be a Data Scientist?,"As a data scientist, technical skills such as data analysis, statistical modeling, and machine learning are crucial. However, soft skills are also essential for success in this field. Some of the soft skills that are important for data scientists include: 1. Communication skills: Data scientists must be able to communicate…",https://medium.com/@m.hassan.nftp/soft-skills-to-be-a-data-scientist-5f0bd2341c59?source=topics_v2---------154-84--------------------9f3c2e80_1cda_40fa_be22_2aebab016967-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QUEDcmzsIYN-nZ1AHAth3g.jpeg,data-analysis 1964,1226,Unleash the Power of Macros for Data Analysis in Excel,"A step-by-step guide to automating repetitive tasks and saving time using a real-world dataset Introduction: Data analysis can often involve repetitive tasks, which can be time-consuming and prone to errors. Fortunately, Microsoft Excel provides a powerful tool called macros that can help automate these tasks, saving you time and reducing…",https://medium.com/@ernestodotnet/unleash-the-power-of-macros-for-data-analysis-in-excel-80d239a5e03?source=topics_v2---------155-84--------------------9f3c2e80_1cda_40fa_be22_2aebab016967-------17,https://miro.medium.com/v2/resize:fill:140:140/1*d9bnkv1nwz2IKCcB8Q6J8A.jpeg,data-analysis 1965,1565,Cleaning a Dataset using Turbo Prep in RapidMiner,"Introduction: Turbo Prep is a data preparation tool in RapidMiner that allows users to clean, transform, and prepare data for analysis. It is a visual, interactive data preparation tool that uses a combination of automation and human guidance to make it easy for users to clean and transform their data. Data…",https://medium.com/@tahlia.canovas001/cleaning-a-dataset-using-turbo-prep-in-rapidminer-5d6fe74c9e1?source=topics_v2---------156-84--------------------9f3c2e80_1cda_40fa_be22_2aebab016967-------17,https://miro.medium.com/v2/resize:fill:140:140/0*KpysYQXlUwOi3j9y.png,data-analysis 1966,1566,Data collection and preparation for suicide rate analysis,"I am working on a suicide rate analysis. You can find project here: BaakhOfficial/Suicide-Rate-Analysis: Suicide rate research Yes, it could be done in less amount of code, but that way it’s much easier to read Also it could be done line by line or even in Spark, but our datasets…",https://medium.com/@baakhofficial/data-collection-and-preparation-for-suicide-rate-analysis-28a044eb81c1?source=topics_v2---------157-84--------------------9f3c2e80_1cda_40fa_be22_2aebab016967-------17,https://miro.medium.com/v2/resize:fill:140:140/0*S2_OeGEBYDzMdZWx.png,data-analysis 1967,1567,The Power of Python’s Frequency Aggregation: Unlocking Valuable Insights from Your Data,"Are you struggling to make sense of your data? Learn how Python’s frequency aggregation techniques can simplify your data analysis process and extract meaningful insights. If you’ve ever worked with data in Python, chances are you’ve come across situations where you needed to count and group the occurrences of specific…",https://medium.com/@sarmadafzal/the-power-of-pythons-frequency-aggregation-unlocking-valuable-insights-from-your-data-ed69cb763af3?source=topics_v2---------158-84--------------------9f3c2e80_1cda_40fa_be22_2aebab016967-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ijYC-aJP0lMTvZR0LZqGOg.jpeg,data-analysis 1968,1568,Handling Missing Values: Explained,You can tell a lot about data scientists by how they handle missing values. I need to remember the name of the book but the author said an interesting thing about missing values. Handling missing values is a work of art and a work of science at the same time. …,https://medium.com/@dipeshkhemani/handling-missing-values-explained-1611c60f2a98?source=topics_v2---------159-84--------------------9f3c2e80_1cda_40fa_be22_2aebab016967-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rAFyXyICxYgYPyVgxsUX-w.png,data-analysis 1969,1535,Data Science Project from DoorDash,"Here’s a data project that has been used as a take-home assignment by DoorDash to test your data science (Python, more precisely) skills. Doordash is a company that allows customers to order food online and delivers it to their location. Delivery time is important for customers and businesses because it…",https://medium.com/@nathanrosidi/data-science-project-from-doordash-3c1a51cccf56?source=topics_v2---------160-84--------------------75d3331c_df71_469a_a509_cde2d3442b19-------17,https://miro.medium.com/v2/resize:fill:140:140/0*n8yuiBmJhn3p3eII,data-analysis 1970,1569,The Art of Aligning Data Frames in Pandas and SQL,"Mastering Data Integration — Part 01 — In this article, we will discuss the similarities and differences between aligning data in Pandas and SQL. We will start by explaining what data alignment is and why it is important. Then, we will explore how data alignment is done in both Pandas and SQL. …",https://medium.com/aatomz-research/the-art-of-aligning-data-frames-in-pandas-and-sql-50ed271753e1?source=topics_v2---------161-84--------------------75d3331c_df71_469a_a509_cde2d3442b19-------17,https://miro.medium.com/v2/resize:fill:140:140/1*C5cIeEvH-f0b8Zpui30Izw.png,data-analysis 1971,1570,Beginners guide to data analysis using Python. Part 2,Music knows no boundaries. The same goes for data. The internet has erased much of the boundaries. So let’s get started with using internet and Python to analyse the music data. we will pick up from part 1 . Let’ s find the least popular songs in the dataset. popular_df…,https://medium.com/@adityabme9/beginners-guide-to-data-analysis-using-python-part-2-c70c0438827e?source=topics_v2---------162-84--------------------75d3331c_df71_469a_a509_cde2d3442b19-------17,https://miro.medium.com/v2/resize:fill:140:140/1*lMVpkyLha1_LZv7yvDuuqQ.png,data-analysis 1972,1571,"Wow, I spend a lot on Swiggy",I woke up to an Instagram story of someone I follow talking about how much they spend on Swiggy (a food delivery app). It got me curious about my own spending patterns. …,https://medium.com/@yayydiv/wow-i-spend-a-lot-on-swiggy-cf481c71f418?source=topics_v2---------163-84--------------------75d3331c_df71_469a_a509_cde2d3442b19-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kk3TvVNHc7I_mcEZK8O1HA.jpeg,data-analysis 1973,1572,Data SEAM Architecture -A method of bringing all your key DataTeams together,"Let's SEAM ( Scientist, Engineer, Analyst, and ML Engineer) all your data pieces (structured, semi-structured, unstructured, and stream) together to give your organization a unified data platform that can be used by all your key data teams As we all know Data Collaboration brings higher value to the business and…",https://medium.com/@srini-velamakanti/data-seam-architecture-a-method-of-bringing-all-your-key-datateams-together-b4d3a361e42e?source=topics_v2---------164-84--------------------75d3331c_df71_469a_a509_cde2d3442b19-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EGV0EgHCghOfMzwxJbmkvA.png,data-analysis 1974,1573,Top Data modelling scenario based Interview Question with detailed explanation,"Create the best table schema with the knowledge of constrains and SCD — In this article, we’ll look at how to make a better table definition when a scenario-based question about modelling an entity is asked during the data modelling or data warehousing interview rounds. You will also learn how to use dimensions that change slowly and how to make sure constraints are…",https://medium.com/towards-data-engineering/top-data-modelling-scenario-based-interview-question-with-detailed-explanation-77fd1d4ffe41?source=topics_v2---------165-84--------------------75d3331c_df71_469a_a509_cde2d3442b19-------17,https://miro.medium.com/v2/resize:fill:140:140/1*KEu9QLdvnG2N5YGmjMkJkA.png,data-analysis 1975,1574,Humanitarian Data Analysis: Exploratory Data Analysis-EDA,"Welcome to the second act of the humanitarian data analysis. For those who missed the first act, you can find it here. In this act, we will focus on Descriptive — Preliminary Analysis (Exploratory Data Analysis — EDA). …",https://medium.com/@cagricebisli/humanitarian-data-analysis-exploratory-data-analysis-eda-2d202eb90a0e?source=topics_v2---------166-84--------------------75d3331c_df71_469a_a509_cde2d3442b19-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Xe-HiepKVnhP7DoDyuL3og.png,data-analysis 1976,1575,"The Power of Python for Data Analysis: Manipulation, Analysis, and Visualization with Pandas, NumPy, and matplotlib","Python is a popular programming language that has gained much popularity recently, especially for its use in data analysis. Python's versatility and ease of use make it an excellent choice for data scientists, data analysts, and other professionals who need to analyze and manipulate large datasets quickly and efficiently. …",https://medium.com/python-in-plain-english/the-power-of-python-for-data-analysis-manipulation-analysis-and-visualization-with-pandas-16b53f50a254?source=topics_v2---------167-84--------------------75d3331c_df71_469a_a509_cde2d3442b19-------17,https://miro.medium.com/v2/resize:fill:140:140/0*QaaOAiaEusc6bFLr,data-analysis 1977,1576,Apply Machine Learning to EEG brainwave data (Part1),"Welcome to this article on applying Machine Learning to EEG brainwave data, we will be covering the basic definitions followed by How to apply ML in step by step. The terms in the title appear fancy right, Many of them don’t know what is EEG data and the topic is…",https://medium.com/@subasreev111/apply-machine-learning-to-eeg-brainwave-data-part1-12b3070641ae?source=topics_v2---------168-84--------------------75d3331c_df71_469a_a509_cde2d3442b19-------17,https://miro.medium.com/v2/resize:fill:140:140/0*DB2YhQLtmSRktUlG,data-analysis 1978,196,How to use a half-donut chart to indicate your metric in Python?,"A half-donut chart is able to indicate a metric or number. It can also be decorated by groups. In this article, I am going to introduce a way to draw it. This needs some basic mathematics knowledge. Assuming we have a metric called deficiency rate (DR). It is defined in…",https://medium.com/towardsdev/how-to-use-a-half-donut-chart-to-indicate-your-metric-in-python-475aa1a96038?source=topics_v2---------169-84--------------------75d3331c_df71_469a_a509_cde2d3442b19-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7rlOf9vlku3ohwD4tFXGSw.png,data-analysis 1979,1577,Is it possible to make inferences about goal sequences by ‘’analyzing the last five actions’’ before the goal?,"From a superficial perspective, we can define football as a scoring game. In today’s football world, teams resort to different combinations of formations, tactics, and actions in attack to reach the score. …",https://medium.com/@a.alpaycetin/is-it-possible-to-make-inferences-about-goal-sequences-by-analyzing-the-last-five-actions-394badd04e3c?source=topics_v2---------170-84--------------------008f778c_6ac7_4704_86ea_93ea3d1beda6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*y1I_PRgEfcfAPFGSjo-9Og.png,data-analysis 1980,1578,Small Multiples/Trellis Charts in Tableau,"In this blog I will show you how to create Small Multiples charts also called as Trellis charts in Tableau. Let’s understand what a small multiple chart is. A Trellis Chart is a series of similar graphs or charts using the same scale and axes, allowing them to be easily…",https://medium.com/@aranitha/small-multiples-trellis-charts-in-tableau-7ce973f69c42?source=topics_v2---------171-84--------------------008f778c_6ac7_4704_86ea_93ea3d1beda6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SWIwfOn5lhg6033REp6cAQ.png,data-analysis 1981,1404,How to analyse open-ended survey responses with Machine Learning,"This article provides a simple example of how to code, analyse and present open-ended survey responses. Intro Something that I come across a lot at my work in government, is that surveys are frequently designed at a local level by non data professionals and intended to be administered to a small…",https://medium.com/@ioannidis.au/how-to-analyse-open-ended-survey-responses-with-machine-learning-c4b58466c81b?source=topics_v2---------172-84--------------------008f778c_6ac7_4704_86ea_93ea3d1beda6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9-Cv35IPh5g-g2T4p3XaaQ.png,data-analysis 1982,1579,Enhancing Your Data Literacy Skills: A Guide to Becoming a Data-Driven Professional,"Data is all around us, and as we move further into the age of information, the importance of understanding and analyzing data becomes increasingly vital. However, not everyone has the necessary skills to navigate the vast amount of data available to them. …",https://medium.com/@data-overload/enhancing-your-data-literacy-skills-a-guide-to-becoming-a-data-driven-professional-cad02f8b4db4?source=topics_v2---------173-84--------------------008f778c_6ac7_4704_86ea_93ea3d1beda6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*HI0sG-5WgJnZzf6I,data-analysis 1983,1580,How to Search for Multiple Catalogs and Schemas in Snowflakes,Snowflake is a cloud data warehouse that offers various features and benefits for businesses of all sizes. One of the most important features of Snowflake is its ability to store data from multiple catalogs and schemas in a single database. …,https://medium.com/@cndro/how-to-search-for-multiple-catalogs-and-schemas-in-snowflakes-680cf49493cd?source=topics_v2---------174-84--------------------008f778c_6ac7_4704_86ea_93ea3d1beda6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*5urFj_c6-HOG6oB9,data-analysis 1984,1581,Data Analysis Project Using SQL and Power BI — Analysis of Supermarket Sales,"Hi, everyone! In this project, I analyzed supermarket sales data using PostgreSQL for analysis and Power BI for data visualization. Here are the steps for conducting data analysis: Define the problem Confirm the analysis points with stakeholders Find the data Preprocess the data Conduct the analysis Interpret the results However…",https://medium.com/@alfinaariesta03/data-analysis-project-using-sql-and-power-bi-analysis-of-supermarket-sales-a853c2bd57d2?source=topics_v2---------175-84--------------------008f778c_6ac7_4704_86ea_93ea3d1beda6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*A87kTqc0McKxGCbscDv-qw.jpeg,data-analysis 1985,1479,Songs mood clustering using K-means,"Introduction Music has powerful impacts on human beings. It can change emotions and moods. A study [1] concluded that although listening to music before a stressful event does not reduce anxiety, listening to relaxing music after a stressful event can help your nervous system recover faster. In 2017, researchers [2] confirmed…",https://medium.com/@rifset/songs-mood-clustering-using-k-means-3cb1243c435c?source=topics_v2---------176-84--------------------008f778c_6ac7_4704_86ea_93ea3d1beda6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ukuQzcEwFUtKp2tK.jpg,data-analysis 1986,1582,Mastering Monthly Finances with Google Sheets: Innovative Data Visualization Techniques for Better Budgeting,"Introduction: Effective budgeting is an essential aspect of personal finance management. Without a proper budget, it can be challenging to manage finances effectively. This report outlines the process of redesigning the ‘Ultimate Monthly Budget Tracker,’ a project aimed at assisting people in managing their monthly budget. The client approached me…",https://medium.com/@mahmed31098/mastering-monthly-finances-with-google-sheets-innovative-data-visualization-techniques-for-better-c7a5ba350119?source=topics_v2---------177-84--------------------008f778c_6ac7_4704_86ea_93ea3d1beda6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*UJ92Np-OoJL3zyzuTO6GgQ.png,data-analysis 1987,1583,Are the Chicago Cubs really the ‘lovable losers’?,"108 years is a long time. In fact, it is the record held by the Chicago Cubs for the longest championship drought in all the major sports leagues in the United States. My grandmother lived her whole life never seeing her beloved Cubbies win a World Series. I assumed my…",https://medium.com/@michaelsseman/are-the-chicago-cubs-really-the-lovable-losers-63fb4fb38681?source=topics_v2---------178-84--------------------a9736933_6e35_4cc8_a343_3854a9419fd5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*4LGxGx99WcW_thZ4,data-analysis 1988,1520,Understanding Support Vector Machine,Concept of Support Vector Machine and Model building Steps with code — Support Vector Machine : Support vector machine is a supervised machine learning method that can be used for Regression and Classification purposes. Point estimate: A point estimate is nothing but a single value and the probability associated with single values is zero.,https://medium.com/@shubhamc03/understanding-support-vector-machine-df7e2ac7e98e?source=topics_v2---------179-84--------------------a9736933_6e35_4cc8_a343_3854a9419fd5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*U6zRugD0cKBUMzu418575g.jpeg,data-analysis 1989,1584,From Zero to SQL Hero: The Complete Beginner’s Guide to SQL,"Introduction SQL (Structured Query Language) is a programming language used to manage and manipulate data in relational databases. SQL is a valuable tool for anyone who works with data, from business analysts to data scientists. …",https://medium.com/@danielfordnz/from-zero-to-sql-hero-the-complete-beginners-guide-to-sql-c9357e27503f?source=topics_v2---------180-84--------------------a9736933_6e35_4cc8_a343_3854a9419fd5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Adq1T298Ab0dPjz5oHTExQ.jpeg,data-analysis 1990,1585,Transformations in Power Query,"Hello Connections 😊 , Before converting our data in beautiful visuals, it is important to clean our data. By cleaning of data, I mean to say to remove irrelevant columns, to set correct data types, to remove blank values. Some common transformations that we do in Power Query are : …",https://medium.com/@simran.singh9727/transformations-in-power-query-c1c64bc0807d?source=topics_v2---------181-84--------------------a9736933_6e35_4cc8_a343_3854a9419fd5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-analysis 1991,1190,The six steps in data analysis,"Data analysis has become increasingly important in today’s business world. With the explosion of data, organizations are seeking ways to extract insights and make informed decisions based on the data they have. However, the process of data analysis can be complex and overwhelming, involving several steps that must be followed…",https://medium.com/@amulyakulkarni1/the-six-steps-in-data-analysis-64561ee9d2bf?source=topics_v2---------182-84--------------------a9736933_6e35_4cc8_a343_3854a9419fd5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*146ZOFmcdmhl0ooh,data-analysis 1992,1586,Converting JSON Data to Parquet using Python and Pandas,"JSON (JavaScript Object Notation) is a lightweight data-interchange format that is easy for humans to read and write, and easy for machines to parse and generate. On the other hand, Parquet is a columnar storage format that is optimized for reading large datasets. It is a popular choice for storing…",https://medium.com/@byteshiva/converting-json-data-to-parquet-using-python-and-pandas-62ba634f6dce?source=topics_v2---------183-84--------------------fbb5db8c_8b4a_43bd_8349_efacb5eec870-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-analysis 1993,1587,Applied SQL Data analysis Case study -Part 1,Let plays with Data on Hardware Industry :) Table of Content: Introduction and Business model Scope of the case study Profit and Loss statement Detail Explanation of AtliQ Database Finance Analysis Performance Analysis Supply chain Analysis 1. Introduction and Business model AtliQ Technology is a Hardware manufacturing industry started in the year 2018 and running…,https://medium.com/@dhilipvasanth/applied-sql-data-analysis-case-study-part-1-72c611636ec6?source=topics_v2---------184-84--------------------fbb5db8c_8b4a_43bd_8349_efacb5eec870-------17,https://miro.medium.com/v2/resize:fill:140:140/0*8OqEQfi0Qdyjo4jB.jpg,data-analysis 1994,1588,Speech Emotion Recognition(Part 1),"I was just working on a Speech Emotion Recognition project and it was my first experience working on an audio analysis project. While working on it, I came across a lot of terminologies, concepts, errors, warnings, model-building, and coding practices. …",https://medium.com/@apoorvnpathak/speech-emotion-recognition-part-1-d820e6736671?source=topics_v2---------185-84--------------------fbb5db8c_8b4a_43bd_8349_efacb5eec870-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7k78L1UM-_DoMa0vEh6IHw.jpeg,data-analysis 1995,1589,8 Week SQL Challenge Case Study #1 — Danny’s Diner,"Danny Ma’s 8 Week SQL Challenge is an excellent starting point for data analysts who are seeking a project to work on or hoping to tackle a real-world business problem. By participating in this challenge, analysts can hone their SQL skills and gain practical experience by answering a set of…",https://medium.com/@oluwatobiaina/8-week-sql-challenge-case-study-1-dannys-diner-355ac004c908?source=topics_v2---------186-84--------------------fbb5db8c_8b4a_43bd_8349_efacb5eec870-------17,https://miro.medium.com/v2/resize:fill:140:140/1*IjQ8XODW__ifjJqoBCvNVw.png,data-analysis 1996,1338,Difference Between Prediction Interval and Confidence Interval,"When it comes to data analysis, we often hear about confidence intervals and prediction intervals. These two concepts are important for statisticians, data scientists, and machine learning practitioners. In this article, we will discuss the difference between confidence intervals and prediction intervals and why both are important. Confidence interval is…",https://medium.com/@iqra.bismi/difference-between-prediction-interval-and-confidence-interval-84dce2ec073f?source=topics_v2---------187-84--------------------fbb5db8c_8b4a_43bd_8349_efacb5eec870-------17,https://miro.medium.com/v2/resize:fill:140:140/1*n-G_LP9alW6wFP-KIuPQRw.png,data-analysis 1997,1590,DATA CLEANING AND WRANGLING IN SQL ON FIFA 21 DATASET,INTRODUCTION I made a late entry to participate in the #datacleaningchallenge. I loved the fact I was going to be working with FIFA 21 data on player information and player statistics. A look up at the raw data file shows it’s a really messy looking data with irregularities and inconsistencies. …,https://medium.com/@chibikeenibe18/data-cleaning-and-wrangling-in-sql-on-fifa-21-dataset-586520557216?source=topics_v2---------188-84--------------------fbb5db8c_8b4a_43bd_8349_efacb5eec870-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DG_3_QUWNtCair0IILqiEA.jpeg,data-analysis 1998,1591,How I Developed an Automation System with No Formal Coding Experience,Introduction I am not a developer. I did not study computer science. I never took on a software engineering internship. I’m just someone who really likes tech and tries their best to build up their technical skills. …,https://medium.com/@crystal.huynh39/how-i-developed-an-automation-system-with-no-formal-coding-experience-349235ca7bfa?source=topics_v2---------189-84--------------------fbb5db8c_8b4a_43bd_8349_efacb5eec870-------17,https://miro.medium.com/v2/resize:fill:140:140/1*82GtMzeOzhPRIiRcMT91cQ.jpeg,data-analysis 1999,1373,Building Your Own Langchain Agents and Tools with LLMs: A Step-by-Step Tutorial,"World of Large Language models are taking a path that other technologies have taken till date. Take a peek at how LLMs are used to call Python functions and based on the Prompts generated by the Agent Classes inside the LangChain library. You read it correct, LLMs call the Python function anyone can write, and use the value returned by the function to make further search and automation. The code used in this post is at https://github.com/insightbuilder/python_de_learners_data/blob/main/code_script_notebooks/projects/langChain_exploration/agentsandtools.ipynb",https://medium.com/@kamaljp/building-your-own-langchain-agents-and-tools-with-llms-a-step-by-step-tutorial-2393e50a4491?source=topics_v2---------190-84--------------------fbb5db8c_8b4a_43bd_8349_efacb5eec870-------17,https://miro.medium.com/v2/resize:fill:140:140/1*jvPmqgyX0fdVTSdUPj6uhA.png,data-analysis 2000,1592,Anna’s Adventures in Data Science: A Journey from Tourism to Web3,"Hello there! I’m Anna, and I’m thrilled to share my journey into the world of data science with all of you! As you might have guessed from the title, I used to work in tourism, but now I’m venturing into the tech world. …",https://medium.com/@annalearnsdata/annas-adventures-in-data-science-a-journey-from-tourism-to-web3-deddbd8ae582?source=topics_v2---------191-84--------------------3b1e6198_d42a_47ed_a882_25f36c10aae6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QSsY7JyycguU8LOyMjtm_Q.png,data-analysis 2001,1226,"Unlocking the Miami Housing Market with RapidMiner: A Comprehensive Guide to Data Cleaning, Analysis, and Model Deployment","Introduction The housing market in Miami is vibrant and dynamic, making it an interesting area for data analysis. In this tutorial, we’ll guide you through a step-by-step process of cleaning and analyzing the Miami Housing dataset using RapidMiner, a powerful data science platform. Our dataset, Miami Housing Data, contains information about…",https://medium.com/@ernestodotnet/unlocking-the-miami-housing-market-with-rapidminer-a-comprehensive-guide-to-data-cleaning-fe6ef6178c08?source=topics_v2---------192-84--------------------3b1e6198_d42a_47ed_a882_25f36c10aae6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OEvApvBXPTn6gxUAHG1e3A.png,data-analysis 2002,1593,Essential SQL Commands for Beginners: A Guide to Getting Started with SQL,"SQL (Structured Query Language) is a powerful programming language used to manage and manipulate relational databases. If you’re new to SQL, there are some basic commands that you’ll need to know to get started. In this blog post, we’ll cover some of the essential SQL commands for beginners. TABLE Lets create…",https://medium.com/@1imo/essential-sql-commands-for-beginners-a-guide-to-getting-started-with-sql-84ca5c525ed5?source=topics_v2---------193-84--------------------3b1e6198_d42a_47ed_a882_25f36c10aae6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*sZqp_mC89mPMS3w5NnXCww.png,data-analysis 2003,1594,SQL Joins vs Subqueries: What’s the Difference?,"If you’re new to SQL, you might be wondering: what’s the deal with joins and subqueries? These two tools are essential for working with databases, but they work in different ways and have different strengths and weaknesses. Let’s take a closer look! Joins are like a team of superheroes, joining…",https://medium.com/@bhadreshwara_/sql-joins-vs-subqueries-whats-the-difference-5a0f5e0c5629?source=topics_v2---------194-84--------------------3b1e6198_d42a_47ed_a882_25f36c10aae6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*7uUqCRnEA3HSme_p.jpg,data-analysis 2004,1595,Understanding Python Data Types: A Comprehensive Guide,"In Python, a data type is a classification that specifies the type of value a variable can hold. Python is a dynamically-typed language, which means that the type of a variable is determined at runtime based on the value it holds. Python has several built-in data types such as numeric…",https://medium.com/@vincentgeronimo/understanding-python-data-types-a-comprehensive-guide-af3b2fb0ac44?source=topics_v2---------195-84--------------------3b1e6198_d42a_47ed_a882_25f36c10aae6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*TOIavuk08U1hxauB,data-analysis 2005,1013,DataCamp: The Ultimate Platform for Mastering Data Science and Analytics Skills,"Start your Data Science career with DataCamp — In today’s data-driven world, data science and analytics skills are more important than ever. Whether you’re a professional seeking to enhance your abilities or a beginner looking to break into the field, DataCamp offers an engaging and interactive way to learn data science, machine learning, and analytics. …",https://medium.com/data-science-rush/datacamp-the-ultimate-platform-for-mastering-data-science-and-analytics-skills-3ce451e79c6e?source=topics_v2---------196-84--------------------3b1e6198_d42a_47ed_a882_25f36c10aae6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*jdeMcm24Ym_YdANBWYCd8A.png,data-analysis 2006,1596,10 Pandas functions that will improve your Data Analysis Workflow,"Pandas is a widely used and powerful Python library that facilitates data manipulation and analysis. Whether you are a data scientist, analyst, or someone who works with data regularly, mastering Pandas can significantly improve your work efficiency. …",https://medium.com/@psrajpoot/10-pandas-functions-for-data-analysis-workflow-954d1a307991?source=topics_v2---------197-84--------------------3b1e6198_d42a_47ed_a882_25f36c10aae6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*jn19z7ViqosAOh4U,data-analysis 2007,1597,Symbolic Aggregate Approximation (SAX) for Time Series Data Analysis,"Introduction to Time Series Data and SAX Time series data is a type of data where measurements are collected over time, resulting in a sequence of values. Examples of time series data include stock prices, weather data, and medical data such as heart rate or blood pressure readings. …",https://medium.com/@psrinivasan028/symbolic-aggregate-approximation-sax-for-time-series-data-analysis-ec71c80f7c68?source=topics_v2---------198-84--------------------3b1e6198_d42a_47ed_a882_25f36c10aae6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*F3ktBizN0VNtmCmJPRJeVw.png,data-analysis 2008,1598,Welcome to R-evolutions!,"Hello R Fans! I started this channel three months ago, and we already have over 30 followers and 13 authors! 20 stories are submitted and published. Welcome to our authors: Ambuj Shukla (7 stories) Antonio Blago (5 stories) Bruno Ponne (2 stories) Marcus Codrescu (1 story) Shruti Patkar (1 story) Tomaz Kastrun (1 story) Augusto Gonzalez-Bonorino (1 story) Gustavo Santos (1 story) Chengzhi Zhao (1 story)",https://medium.com/r-evolution/welcome-to-r-evolutions-55fa7dac8ac8?source=topics_v2---------199-84--------------------3b1e6198_d42a_47ed_a882_25f36c10aae6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*SJOhYyN0fcmIJoc8,data-analysis 2009,1599,Analyzing and Visualizing Earthquake Data Received with USGS API in Python Environment,"The scars of the devastating earthquake are still in our lives, perhaps the wounds that will never go away have opened. Well, if we were to look at the events through a data-oriented lens, what would he/she see? Hello everyone from a cloudy Sunday. I hope the weekend is going…",https://medium.com/mlearning-ai/analyzing-and-visualizing-earthquake-data-received-with-usgs-api-in-python-environment-8c7e7b6bed02?source=topics_v2---------200-84--------------------3b1e6198_d42a_47ed_a882_25f36c10aae6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OCr3qa8gcBuKm9Nz9hLU9g.jpeg,data-analysis 2010,1600,"Google Capstone Project: A Case Study of Bellabeat using Excel, SQL & R","This is my completed case study from an optional course in the Google Data Analytics Course named: Capstone Project. The analysis follows the 6 steps of Data Analysis taught in the Google course: Ask, Prepare, Process, Analyse, Share and Act. Step 1: Ask In this first step, I will define the problem and…",https://medium.com/@chrisreilly678/a-case-study-of-bellabeat-using-excel-sql-r-af1821fdb905?source=topics_v2---------201-84--------------------21588562_737c_4521_9f6a_2557abbaad2e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Aj_BRvqtKlJ373dZnV4Ydg.png,data-analysis 2011,1601,11 best ways to create Pivot table in python using different libraries,"A pivot table is a powerful tool in data analysis that allows you to summarize and aggregate large datasets into a more manageable form. Python offers many libraries for working with data, and each of these libraries provides a different way of creating a pivot table. In this context, we…",https://medium.com/@ghanshyamsavaliya/11-best-ways-to-create-pivot-table-in-python-using-different-libraries-f4beaa2b9578?source=topics_v2---------202-84--------------------21588562_737c_4521_9f6a_2557abbaad2e-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*snY-YRhEDeDMp0-jV25KBw.gif,data-analysis 2012,1602,How can I start a career in Data Analytics?,"Data analytics is a rapidly growing field with a wide range of applications in industries such as healthcare, finance, and technology. With the increasing availability of data, businesses are relying on data analytics to help make informed decisions and gain a competitive edge. …",https://medium.com/@ks.piyush03/how-can-i-start-a-career-in-data-analytics-69a7d8e38325?source=topics_v2---------203-84--------------------21588562_737c_4521_9f6a_2557abbaad2e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*UG2P1g_Ou_hz53FVNSt95A.png,data-analysis 2013,1381,“Break Things with Purpose” — The Magic of Chaos Engineering in Data world!,"Welcome to the wonderful world of chaos engineering, where breaking things is encouraged, and resilience is the name of the game! If you’re wondering, “What is chaos engineering, and why should I care?” don’t worry. Let me explain it to you in the simplest way possible. Chaos Engineering? While most…",https://medium.com/@viv1kv/break-things-with-purpose-the-magic-of-chaos-engineering-in-data-world-144579051b16?source=topics_v2---------204-84--------------------21588562_737c_4521_9f6a_2557abbaad2e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*aOXXQdXcKpL9B21bkt9K5g.png,data-analysis 2014,1603,Data Visualizations with Python (3): Bar Charts,"In the last article, we learned how to use Matplotlib to create area plots and histograms. In this article, we will continue with a few more basic data visualization, Bar charts. Also, we will learn how to use Matplotlib to create them and even create different versions of these plots. 1. Exploring Datasets with pandas and Matplotlib …",https://medium.com/@sawsanyusuf/data-visualization-with-python-3-bar-charts-d779aedbb480?source=topics_v2---------205-84--------------------21588562_737c_4521_9f6a_2557abbaad2e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*i80tBRuLSflhzWbqcvjCvg.jpeg,data-analysis 2015,1604,Sales Analysis,"Analysising AdventureWorks Database — Recently I worked on an EDA project that has to do with the analysis of AdventureWorks database( link). I used the same dataset I used for the previous project in this project. The data is stored in the AdventureWorks database. This project is the continuation of the first project, we…",https://medium.com/@SulaimonOdubanjo/sales-analysis-c7d3523294be?source=topics_v2---------206-84--------------------7cc010b4_6812_45ce_9767_fd657c9792a4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*9Ud1axaIROuz_pQ8,data-analysis 2016,1605,How to upload an Excel to Chat GPT and analyse it?,"In today’s data-driven world, businesses are generating enormous amounts of data. This data is often in the form of spreadsheets and other tabular formats, making it challenging for individuals to extract meaningful insights. Many people are trying to find ways to upload Excel files into Chat GPT to analyze the…",https://medium.com/@christianmartinezfinancialfox/how-to-upload-an-excel-to-chat-gpt-and-analyse-it-d89dfe235f3d?source=topics_v2---------207-84--------------------7cc010b4_6812_45ce_9767_fd657c9792a4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*HQq5DcbqWW52OXLa94zV6Q.png,data-analysis 2017,1606,Excel Dashboard on HR Data- Data Analysis Project,"Project Overview This time, I’ve worked on the HR data of a company to build a dashboard to have a look at the overall HR situation. A portion of the raw data is given below- I’ve included the things below in the dashboard. · Total number of employees · Avg…",https://medium.com/@afnansarker349/excel-dashboard-on-hr-data-data-analysis-project-f961a7548dfb?source=topics_v2---------211-84--------------------7cc010b4_6812_45ce_9767_fd657c9792a4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Kx6jfJa4EwWgdX8FnqLvnQ.png,data-analysis 2018,1296,Blockchain Data Marketplaces,"About the trend Data marketplace platform that enables companies and organizations to monetize data, effectively treating the database as an asset. Visit Nextonly",https://medium.com/@nextonly/blockchain-data-marketplaces-f4c869b73787?source=topics_v2---------212-84--------------------7cc010b4_6812_45ce_9767_fd657c9792a4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,data-analysis 2019,1607,My journey to become a pro Data Analyst in 2023: Week 6,"We are leaving a challenging week behind which was full of studies that never end, but I hope it will end in a few months. So, being more precise about the last week, I usually spent most of my time in finding a suitable econometric model for my thesis project…",https://medium.com/@elsenyusif644/my-journey-to-become-a-pro-data-analyst-in-2023-week-6-b65bea7dc58b?source=topics_v2---------213-84--------------------f4ef1715_22ee_4eef_ba81_bfea57e72474-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0teYGzrDrojby-k4n4HnaA.jpeg,data-analysis 2020,1608,SQL Challenge — Analyzing Subscription Style Digital Data,"8-Week SQL Challenge, Case Study #3 by Danny Ma “SQL is not just a language, it’s a superpower that can unlock the secrets hidden within data.” …",https://medium.com/@chisompromise/analyzing-subscription-style-digital-data-foodie-fi-f82031f93d09?source=topics_v2---------217-84--------------------3951537d_fbe2_4d0f_968a_0171a51ef5a4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1HimU-u3bCfI2ZevLRdYDg.png,data-analysis 2021,1322,“Data Analysis Made Easy with Adventure Works Database and Power BI”,"Introduction Data analysis is an essential part of modern business, and having the right tools and techniques in place is crucial for making informed decisions. In this blog post, we’ll be showcasing how we used the “Adventure Works” database and Power BI to analyze sales, customer, and product data and…",https://medium.com/@syuvashree15/sale-analysis-1b264a503b25?source=topics_v2---------218-84--------------------3951537d_fbe2_4d0f_968a_0171a51ef5a4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Uk5za096W46xtfODAnjuuQ.png,data-analysis 2022,1609,Pandas: Applying Learnings to do Analysis,"Pandas different tricks to analyze data for classification problem — We have learnt pandas and it is time to apply those learnings. If you have gone through me with this journey of learning, I hope this analysis will not be new to you. It is matter of applying tricks as and when it is required. We already know pandas provide…",https://medium.com/@laxman-singh/pandas-applying-learnings-to-do-analysis-2029cc9c2136?source=topics_v2---------220-84--------------------3951537d_fbe2_4d0f_968a_0171a51ef5a4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*z4DQ6FiikNxFP924n-zj8A.png,data-analysis 2023,1610,OBJECT DETECTION with YOLOv8 on CUSTOM DATASET,"Today I will talk about YOLOv8, which is designed to be fast, accurate and easy to use for object detection, image segmentation and image classification tasks. I will explain all the steps you need to follow in order to do object detection with custom dataset. How should you prepare your dataset? The most important point for…",https://medium.com/@hmuleykey/object-detection-with-yolov8-on-custom-dataset-42eb4cd0e268?source=topics_v2---------0-84--------------------791e3ab5_7322_4f0c_8cd0_0997062f10dc-------17,https://miro.medium.com/v2/resize:fill:224:224/1*6Sn93qyovio0qn3Y3q7Vgw.png,image-processing 2024,1586,How to Use Python and OpenCV to Recognize Faces in Images,"Facial recognition has become increasingly popular over the years, and with advancements in technology, it has become more accessible and easier to implement. One way to implement facial recognition is by using Python and the OpenCV and face_recognition libraries. In this blog, we will discuss how to use these libraries…",https://medium.com/@byteshiva/how-to-use-python-and-opencv-to-recognize-faces-in-images-a4ac9348acab?source=topics_v2---------1-84--------------------791e3ab5_7322_4f0c_8cd0_0997062f10dc-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2025,1611,From Salt & Pepper Noise to Laplacian Filtering: A Comprehensive Guide,"Introduction: With the use of a mathematical operation, an image can be modified through the process of “filtering.” Image enhancement, noise reduction, edge detection, and feature extraction are just a few of the many uses for image filtering, which is a crucial part of image processing. …",https://medium.com/@arafique906/from-salt-pepper-noise-to-laplacian-filtering-a-comprehensive-guide-733e31f479a0?source=topics_v2---------3-84--------------------791e3ab5_7322_4f0c_8cd0_0997062f10dc-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2026,1612,How I built an AI Image Enhancer,"What is a great image? It’s just the previous image with more contrast and saturation, right (/s) ? But at some point, the contrast or saturation is too high. And what if the creator of the image didn’t want more contrast, what if a photographer wants his photo to look…",https://medium.com/@hyugen-ai/how-i-built-an-ai-image-enhancer-f7d77186678e?source=topics_v2---------4-84--------------------791e3ab5_7322_4f0c_8cd0_0997062f10dc-------17,https://miro.medium.com/v2/resize:fill:224:224/1*2-jhELVNgSWmMnE_M4jGSA.png,image-processing 2027,1613,Introduction To Image Processing With skimage Library (Part 1),"Despite being unstructured data, images have become an integral part of the digital world, from social media to medical imaging. Digital images consist of a collection of pixels, each with a specific color value. …",https://medium.com/@sikhakrishnanunni/introduction-to-image-processing-with-skimage-library-part-1-3e38d8f76035?source=topics_v2---------5-84--------------------791e3ab5_7322_4f0c_8cd0_0997062f10dc-------17,https://miro.medium.com/v2/resize:fill:224:224/1*IAKKO0T6x22R29cXAhrOOQ.png,image-processing 2028,1614,IMAGE AUGMENTATION FOR CREATING DATASETS USING PYTORCH FOR DUMMIES BY A DUMMY,"Most models need a good chunk of data to be trained, tested, and validated. This data isn’t always readily available to suit the needs of the model you’ve created. Data augmentation is a brilliant way to get more out of the data you already have available. Recently, I had the…",https://medium.com/@anushsom/image-augmentation-for-creating-datasets-using-pytorch-for-dummies-by-a-dummy-a7c2b08c5bcb?source=topics_v2---------6-84--------------------791e3ab5_7322_4f0c_8cd0_0997062f10dc-------17,https://miro.medium.com/v2/resize:fill:224:224/1*qE6C4lFSPVeCS7N4NKoJHQ.png,image-processing 2029,1221,A step-by-step guide on OpenCV Kernels [Part 1],"Transform your image the way you want by using these kernels Table of Contents Introduction Identity Kernel Box Kernel Gaussian Kernel Sobel Kernel Scharr Kernel Laplacian Kernel Endnote Introduction Sometimes an image doesn’t look how you want, but you want to transform it so that your machine learning model works better. This is done…",https://medium.com/@prathamesh.gadekar/a-step-by-step-guide-on-opencv-kernels-part-1-edfa7d52fe1d?source=topics_v2---------7-84--------------------791e3ab5_7322_4f0c_8cd0_0997062f10dc-------17,https://miro.medium.com/v2/resize:fill:224:224/0*QhO5RnMgrsTNM0N0,image-processing 2030,1615,OpenCV vs Pillow — Which is better for image processing?,"When it comes to image processing, developers have two major libraries to choose from: OpenCV and Pillow. Both of these libraries have their own unique features and capabilities, making it difficult for developers to choose which one to use. …",https://medium.com/@primeprogram/opencv-vs-pillow-which-is-better-for-image-processing-93f68ab81137?source=topics_v2---------8-84--------------------791e3ab5_7322_4f0c_8cd0_0997062f10dc-------17,https://miro.medium.com/v2/resize:fill:224:224/1*FzMiFC_qq_1x55iU-20-HA.jpeg,image-processing 2031,1616,Best AI tools for Image Processing,"Machines get introduced to analyze images the exact way human brains do and explore those images much more positively than a human can. Therefore, image processing with AI can power face recognition and authentication functionality. …",https://medium.com/@ssa.candorworks/best-ai-tools-for-image-processing-ed94b5f4a115?source=topics_v2---------9-84--------------------791e3ab5_7322_4f0c_8cd0_0997062f10dc-------17,https://miro.medium.com/v2/resize:fill:224:224/1*lDB5m2-w3uOnNEQSNWN57w.jpeg,image-processing 2032,1617,WETHER PREDECTION USING CNN AND IMAGE PROCESSING.,"Introduction Weather prediction has always been a challenging task for meteorologists and weather enthusiasts alike. The accurate prediction of weather conditions is essential for various applications, such as agriculture, aviation, transportation, and disaster management. …",https://medium.com/@alladichaitanya08/wether-predection-using-cnn-and-image-processing-ca1ca5a16a6d?source=topics_v2---------10-84--------------------620cae43_9dbd_46e7_929e_16b9f94aae38-------17,https://miro.medium.com/v2/resize:fill:140:140/1*x6499wVDvv9t_LeFctVuNQ.png,image-processing 2033,1618,"Geometric Transformation in Image Processing: Basics, Applications, and CronJ as an Expert","Introduction Image processing is a highly advanced field that involves processing digital images to extract meaningful information or enhance their quality. Geometric transformation is one of the critical techniques used in image processing. It is the process of modifying the geometric properties of an image, such as its position, size…",https://medium.com/@livajorge7/geometric-transformation-in-image-processing-basics-applications-and-cronj-as-an-expert-f06417193695?source=topics_v2---------11-84--------------------620cae43_9dbd_46e7_929e_16b9f94aae38-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2034,1619,Exploring the latest innovations in Computer Vision,"Insights from Fynd’s visit to The Indian Conference on Computer Vision, Graphics & Image Processing 2022 — The Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP) is the premier conference in computer vision, graphics, image processing, and related fields. The ICVGIP 2022 took place at IIT Gandhinagar. The Computer Vision Research team at Fynd got a chance to attend! The 3-day event included exciting events…",https://medium.com/fynd-team/exploring-the-latest-innovations-in-computer-vision-bb3fb4c41bd8?source=topics_v2---------12-84--------------------620cae43_9dbd_46e7_929e_16b9f94aae38-------17,https://miro.medium.com/v2/resize:fill:140:140/0*rJjyYQz-gKIc45dN,image-processing 2035,1620,ALLRGB Image with Streamlit,"In this article, I create an ALLRGB image generator with Python. ALL RGB Image Generator We create one ALLRGB image generator in this repo. This project will read in one input image and output an ALLRGB…medium.com Today, I will be making a website that performs similar functionalities, the code for this project can be found: GitHub - YushanWang9801/ALLRGB_streamlit In the github repo: https://github.com/YushanWang9801/AllRGB I create one ALLRGB image generator with python. The…github.com",https://medium.com/@wang33he77/allrgb-image-with-streamlit-edcc5122c603?source=topics_v2---------13-84--------------------620cae43_9dbd_46e7_929e_16b9f94aae38-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ZpmdsmNEx5WWwStipL4vlQ.png,image-processing 2036,1621,Fire Detection Code on MATLAB,"In this post, we will be developing a fire detection code using MATLAB software. Matlab is a well-known software used for research purposes. Those who are new to MATLAB based data processing and updates are referred to the following link : MATLAB - MathWorks The official home of MATLAB software. MATLAB is the easiest and most productive software environment for engineers and…www.mathworks.com We will use the MATLAB image processing technique to…",https://medium.com/@sofiayousuf1989/fire-detection-code-on-matlab-f736c551c352?source=topics_v2---------14-84--------------------620cae43_9dbd_46e7_929e_16b9f94aae38-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2037,1466,Fast 3D Image Rotation for 2D Views with NumPy and SciPy,"Introduction When dealing with 3D images, it’s common to create 2D views by rotating the image along a specific axis. In this post, we’ll discuss two methods for rotating 3D images using Python’s NumPy and SciPy libraries and compare their performance. We’ll demonstrate these methods with a sample 3D image in…",https://medium.com/@fuherarich/fast-3d-image-rotation-for-2d-views-with-numpy-and-scipy-3f37844d0530?source=topics_v2---------15-84--------------------620cae43_9dbd_46e7_929e_16b9f94aae38-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3kTh2hQnY_QcyrxIraCfKg.jpeg,image-processing 2038,1622,How to Evaluate Image Quality in Python: A Comprehensive Guide,Jayant Kochhar | Aditya Mangal | SHIVPOOJAN SAINI | Insurance Samadhan Let me start by setting a tone for this blog which shall help you decide if you should give it a read. This blog is written with the intent to introduce you to a list of Full-Reference evaluation metrics…,https://medium.com/@jaikochhar06/how-to-evaluate-image-quality-in-python-a-comprehensive-guide-e486a0aa1f60?source=topics_v2---------16-84--------------------620cae43_9dbd_46e7_929e_16b9f94aae38-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yNzPwh5GFjLzrd7rWLorRQ.jpeg,image-processing 2039,1623,Convert Video to GIF with Python,"First, we need to install the library with pip: pip3 install moviepy And then, create python file like this: from moviepy.editor import VideoFileClip videoClip = VideoFileClip(""video.mp4"") videoClip.write_gif(""video.gif"") In code above, video.mp4 is video filename, and video.gif is filename for the result. Next, run python file and wait until the process is finished.",https://medium.com/@azishapidin/convert-video-to-gif-with-python-41a8c33b6fec?source=topics_v2---------17-84--------------------620cae43_9dbd_46e7_929e_16b9f94aae38-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tE00o_a0gKIXzeta9PvPCQ.jpeg,image-processing 2040,1624,Understanding 2D Fourier space,"Build your 2D Fourier intuitions for real-value imagery — Feel free to reuse the images from this article in any context without attribution (no rights reserved). Motivation Whether you are getting familiar with the “polar raster” of synthetic aperture radar samples or MRI “k-space,” you are dealing with the same fundamental representation: 2D Fourier space. It can be intimidating! Previously…",https://medium.com/@peterbbryan/understanding-2d-fourier-space-59808b644a13?source=topics_v2---------18-84--------------------40c3d3ae_1a6e_4683_a629_a1f30aff895b-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*rEGtx5L9fdRgTN4zDWngJg.gif,image-processing 2041,1625,Designing A Recommendation System For Search In E-commerce,"On e-commerce sites like Amazon, there may be millions of different products to choose from. For instance, a customer on Amazon could type in ""casual shirt for summer"" and receive a list of available shirts. …",https://medium.com/@babaniyi/designing-a-recommendation-system-for-search-in-e-commerce-1b8f6b52f8f4?source=topics_v2---------19-84--------------------40c3d3ae_1a6e_4683_a629_a1f30aff895b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5_RVAblEvOxIqHwGzY2rzA.png,image-processing 2042,1626,[Python] Checking the Distribution of Color Pixels with a 3D Plot,"import cv2 import matplotlib.pyplot as plt img = cv2.imread() pixels = img.copy() # Remember, cv2 uses uint8. To normalize, convert to float pixels = pixels.astype(float) # Normalize to [0,1] scale pixels /= 255.0 b = pixels[:,:,0] g = pixels[:,:,1] r = pixels[:,:,2] color = pixels.reshape(-1,3) # figsize is not necessary plt.figure(figsize=(10,4)) # (1,2) denotes the dimension of plot. # 1 row with 2 columns # 2d plot is at [0][0] plot_2d = plt.subplot2grid((1,2),(0, 0)) # 3d plot is at [0][1] plot_3d = plt.subplot2grid((1,2),(0, 1), projection='3d') plot_3d.set_xlim([0,1]) plot_3d.set_ylim([0,1]) plot_3d.set_zlim([0,1]) plot_3d.set_xlabel('b') plot_3d.set_ylabel('g') plot_3d.set_zlabel('r')",https://medium.com/@leeju213/python-checking-the-distribution-of-color-pixels-with-a-3d-plot-4885b1af2902?source=topics_v2---------20-84--------------------40c3d3ae_1a6e_4683_a629_a1f30aff895b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*8vI25R6Zl8a59pzYzbanJw.png,image-processing 2043,1627,A Comprehensive Guide to Local Filters and Segmentation in Image Processing,"Are you ready to take your image processing skills to the next level? Look no further! In this article, we’ve broken down everything you need to know into two main parts. First, we’ll dive into the world of local filters, from tried-and-true options like median and mean filters to more…",https://medium.com/@medsadek.snoussi/image-processing-585f2e1ecb59?source=topics_v2---------21-84--------------------40c3d3ae_1a6e_4683_a629_a1f30aff895b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PPGubpnC5ul2Tzk82UuLPA.png,image-processing 2044,1628,Texture Segmentation,"Introduction The human eye has the ability to distinguish minute differences in images, even with variations in texture. Image segmentation, which involves partitioning an image into distinct regions with similar properties, has numerous practical applications, such as medical imaging, remote sensing, industrial automation, and security. …",https://medium.com/aiskunks/texture-segmentation-c7796fb1b65a?source=topics_v2---------22-84--------------------40c3d3ae_1a6e_4683_a629_a1f30aff895b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OaV-rzMtiKy0eiHoW1Jtew.png,image-processing 2045,1629,Extracting Text from Images in Flutter with OCR: A Step-by-Step Guide,"Text Recognition using OCR in Flutter. www.youtube.com Introduction: OCR, or Optical Character Recognition, is a technology that enables computers to recognize text in images or documents. It works by analyzing the patterns of light and dark pixels in an image and identifying the shapes of individual letters, numbers, and other characters. …",https://medium.com/@abdurrehman-520/extracting-text-from-images-in-flutter-with-ocr-a-step-by-step-guide-259396d409f7?source=topics_v2---------23-84--------------------40c3d3ae_1a6e_4683_a629_a1f30aff895b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*s8QroMPiqG8jJvXluPYc1Q.png,image-processing 2046,1630,Comparison of modern AIGC Image platform,"Artificial Intelligence has been a buzzword in the tech industry for quite some time now. As businesses strive to streamline their operations, AI has become increasingly popular for its ability to automate and optimize tasks. One of the most exciting developments in AI is the emergence of AI-generated content (AIGC)…",https://medium.com/@antalpha.io/comparison-of-modern-aigc-image-platform-336546da50ae?source=topics_v2---------24-84--------------------40c3d3ae_1a6e_4683_a629_a1f30aff895b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2047,1631,"Cartoonize image using image processing technique , opencv, python and flask","Introduction: Nowadays, the existence of many applications that can cartoonize image are uncountable.It can allow you transform your image into a cartoon on the internet. So what about create your own application? Has this been difficult or hard ? .The answer is no. …",https://medium.com/@abir.bouziri/cartoonize-image-using-image-processing-technique-opencv-python-and-flask-d6f662afed26?source=topics_v2---------25-84--------------------40c3d3ae_1a6e_4683_a629_a1f30aff895b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*grKk9Opqrsd9k3jA6BA2pQ.png,image-processing 2048,1620,ALL RGB Image Generator,"for color in digital format, there are 256 x 256 x256 = 16,777,216 the number of colors. The ALLRGB image is to generate an image that uses all 16,777,216 colors and exactly once. For more details of the concept, one could visit allrgb.com for some creative works. Below is one…",https://medium.com/@wang33he77/all-rgb-image-generator-c870b3353c1a?source=topics_v2---------27-84--------------------40c3d3ae_1a6e_4683_a629_a1f30aff895b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kepHWcmOPukR9ioUHkkeQw.jpeg,image-processing 2049,1633,Digital Image Processing: Original Hough transform,"When we do boundary detection, it is necessary that find the precise edges in an image that correspond to the boundary. So, how do we find the boundary that we’re looking for? The Hough transform is a way that we can solve this problem! Let’s talk about the Hough transform! …",https://medium.com/@a80181351/digital-image-processing-original-hough-transform-9960e91d47f4?source=topics_v2---------28-84--------------------13973fb9_5a54_400e_9fc4_fd5200c180d1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*UzQ_w1wxrCFj3-e9.png,image-processing 2050,1634,Experiments in the computer: deducing FLAM3’s tone mapping curve,"These days I was reading about image processing, and I decided to practice these concepts in a subject I know a bit about, fractal flames. For a very short introduction, fractal flames are nothing more than a series of mathematical functions that map the plane to itself iterated randomly through…",https://medium.com/@felipelopesfreitas/experiments-in-the-computer-deducing-flam3s-tone-mapping-curve-719992cf9c64?source=topics_v2---------29-84--------------------13973fb9_5a54_400e_9fc4_fd5200c180d1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*evRuBVxoqFhn4T3ENTibgQ.jpeg,image-processing 2051,1635,Panoptic Scene Graph Generation,"Panoptic Scene Graph Generation is a computer vision task that aims to understand and analyze the visual world captured in an image or video by generating a graph structure that represents objects, their attributes, and their relationships. The term “panoptic” refers to the comprehensive and global nature of the analysis…",https://medium.com/@tahawarihsan/panoptic-scene-graph-generation-2dbf3620b31c?source=topics_v2---------30-84--------------------13973fb9_5a54_400e_9fc4_fd5200c180d1-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/0*rFtiD9Glq44WLcGa.gif,image-processing 2052,1636,Hough Transform,"Detection of features such as corners and lines from images is an essential process. This can be further used for feature matching and object detection. There are many different algorithms to detect lines such as Hough Transform, Probabilistic Hough Transform, LSD (Line Segment Detector), EDLines (Edge Drawing Lines), etc. Similarly…",https://medium.com/@shantanuparab99/hough-transform-3e5f6875b9b8?source=topics_v2---------31-84--------------------13973fb9_5a54_400e_9fc4_fd5200c180d1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*dC7TO3qUQsmgIWubfO35RA.png,image-processing 2053,1637,Using AI to generate Images: A blog on Stable Diffusion,"Is AI going to take over the world and become our supreme overlord? Well, that reality is a long way away, however, what it can do is draw a horse with a frog head captaining the Titanic in the Sahara Desert. …",https://medium.com/codechef-vit/using-ai-to-generate-images-a-blog-on-stable-diffusion-e6204811679b?source=topics_v2---------32-84--------------------13973fb9_5a54_400e_9fc4_fd5200c180d1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tADBQIPUM9aXmer8rlSStQ.png,image-processing 2054,1638,What is Computer Vision?,"In this digital era where AI is taking our life to the next step in which computer vision is playing a vital role. Let’s take a closer look at the term “computer vision.” To do this, we can start by considering how humans see and recognize objects. Everything around us…",https://medium.com/@thangaduraijay/what-is-computer-vision-d001cedb980c?source=topics_v2---------33-84--------------------13973fb9_5a54_400e_9fc4_fd5200c180d1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xh9s1Zf0oTHJ06YQKp6TvA.png,image-processing 2055,1639,Desmystifying Curvelets,"Learn what curvelets are, how they are built and what they can be used for — Introduction Curvelets are multiscale, oriented, non-adaptive representations of images and multi-dimensional signals. If some of these words didn't make sense, you're in the right place. Developed in the early 2000s by Emmanuel Candès and David Donoho [1] in the flurry of wavelet-transform related signal processing boom, curvelets were designed to solve…",https://medium.com/towards-data-science/desmystifying-curvelets-c6d88faba0bf?source=topics_v2---------34-84--------------------13973fb9_5a54_400e_9fc4_fd5200c180d1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*sxZjPTRdIzBvZThV,image-processing 2056,1640,How to Create a Swirl Distortion Effect in PHP,"If you’re interested in creating custom filters for your website’s images — or looking to incorporate a photo-filter workflow for UGC uploads — Swirl Distortion is a great operation to start with. Using the PHP code examples provided below, you can easily implement an API which allows you to customize…",https://medium.com/@cloudmersive/how-to-create-a-swirl-distortion-effect-in-php-304cf6b1c247?source=topics_v2---------35-84--------------------13973fb9_5a54_400e_9fc4_fd5200c180d1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2057,1641,Build and deploy ML models using Maximo Visual Inspection,"Deep learning models built using Maximo Visual Inspection (MVI) are used for a wide range of applications, including image classification and object detection. These models train on large datasets and learn complex patterns that are difficult for humans to recognize. This may be a daunting task for a non-data scientist…",https://medium.com/ibm-data-ai/build-and-deploy-ml-models-using-maximo-visual-inspection-4719f2710538?source=topics_v2---------36-84--------------------13973fb9_5a54_400e_9fc4_fd5200c180d1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*eXBigBRhIWNSKJIiwVPz6A.png,image-processing 2058,1636,Homography,"Homography is an essential concept in image processing and finds its use in many other fields. Homography is a transformation matrix that takes you from one plane to another plane. In this project, we will learn about homography and explore one of its applications. We will place a logo of…",https://medium.com/@shantanuparab99/homography-a690527f2e1b?source=topics_v2---------37-84--------------------13973fb9_5a54_400e_9fc4_fd5200c180d1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*e_h-uC0WiWFDb-CG34wq-A.png,image-processing 2059,1642,"Hands on Otsu Thresholding Algorithm for Image Background Segmentation, using Python","From theory to practice with the Otsu thresholding algorithm — Let me start with a very technical concept: An Image will be viewed, treated, analyzed, and processed as a 2D signal. And some proper definitions: A signal is a quantity that changes over space or time and can be used to transmit a form of information. An image is nothing…",https://medium.com/towards-data-science/hands-on-otsu-thresholding-algorithm-for-image-background-segmentation-using-python-9fa0575ac3d2?source=topics_v2---------38-84--------------------e879c8be_6f99_407c_96b4_6b0db98a8298-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QlppCe0Igv8EIsNaEq6zHg.jpeg,image-processing 2060,1643,3 Best Smart AI Profile Picture Creators Out There ✨,"2023’s New Viral Trend It seems like AI-generated photos are all the rage nowadays and for good reason. Profile picture imaginary photo generators create unique and personalized images to use as display pictures on social media, gaming platforms, or other online platforms. …",https://medium.com/@farahhariri/3-best-smart-ai-profile-picture-creators-out-there-80966515cf40?source=topics_v2---------39-84--------------------e879c8be_6f99_407c_96b4_6b0db98a8298-------17,https://miro.medium.com/v2/resize:fill:140:140/1*G3KLRgtmVUNTfkP8WB4lRw.png,image-processing 2061,1644,Top 10 Object Detection Models in 2023!,"A Comprehensive Guide to Revolutionizing Object Detection with Deep Learning. — “Object detection is one of the most exciting and challenging problems in computer vision, and deep learning has emerged as a powerful tool to tackle it.” — Dr. Liang-Chieh Chen Object detection is a fundamental task in computer vision that involves identifying and localizing objects within an image. Deep learning…",https://medium.com/thelatestai/top-10-object-detection-models-in-2023-235acbc7d8b0?source=topics_v2---------40-84--------------------e879c8be_6f99_407c_96b4_6b0db98a8298-------17,https://miro.medium.com/v2/resize:fill:140:140/1*sNqiswCfyRaE-Jt74-uDOQ.jpeg,image-processing 2062,1645,Building A Fake Influencer With Dezgo,"This article will give you an overview of how you can begin designing a consistent person to appear in different locations and clothes using Stable Diffusion. There is quite a lot of trial and error to the process, and not every photo that you will generate will pass mxface.ai’s face…",https://medium.com/@mr-collins-llb/building-a-fake-influencer-with-dezgo-60c1c4b4416b?source=topics_v2---------41-84--------------------e879c8be_6f99_407c_96b4_6b0db98a8298-------17,https://miro.medium.com/v2/resize:fill:140:140/1*IjhfwW-sh74Y0ZCBKhunpA.png,image-processing 2063,1646,All about Convolutions,"The term Convolutional Neural Network (CNN) has gained immense popularity over the years. It is a type of deep neural network that is commonly used for image and video recognition, analysis, and processing. The key feature of CNNs is their ability to automatically learn and extract features from images using…",https://medium.com/@suvoo/all-about-convolutions-331471b9e5e5?source=topics_v2---------42-84--------------------e879c8be_6f99_407c_96b4_6b0db98a8298-------17,https://miro.medium.com/v2/resize:fill:140:140/0*kCvG0xO3gnFQzL4O.JPG,image-processing 2064,1647,Creating a Dataset for Image Segmentation: What Can Be More Annoying?,"My first real Machine Learning project I started when I was close to finishing my master’s in Data Science. Sounds a little bit late, doesn’t it? There are multiple reasons for it, but the main one: choose courses wisely. I didn’t. I’ve spend a lot of time learning something that…",https://medium.com/@chiffa/creating-a-dataset-for-image-segmentation-what-can-be-more-annoying-7cdfc9937229?source=topics_v2---------43-84--------------------e879c8be_6f99_407c_96b4_6b0db98a8298-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5DxHr8iOcfXv-h725zWgvQ.png,image-processing 2065,1645,Face Matching: How It Works and What the Output Means,"Facial recognition technology has become increasingly common in recent years, with applications ranging from security systems to social media platforms. One important component of facial recognition is face matching, which involves comparing two or more facial images to determine if they belong to the same person. …",https://medium.com/@mr-collins-llb/face-matching-how-it-works-and-what-the-output-means-90a4cb87832d?source=topics_v2---------44-84--------------------e879c8be_6f99_407c_96b4_6b0db98a8298-------17,https://miro.medium.com/v2/resize:fill:140:140/1*cxYjW3a7y4drVehrjKPrqA.png,image-processing 2066,1648,Computer Vision 101: Introduction,"The fundamental concepts of Computer vision — If you’ve ever heard of computer vision but aren’t a professional in the field, you might immediately associate this term with neural networks, particularly CNNs and Vision Transformers. While this is a reasonable association, it is a quite narrow perspective. Computer vision has been an active research area for decades…",https://medium.com/cantors-paradise/computer-vision-101-introduction-14ce6d10c3fa?source=topics_v2---------45-84--------------------e879c8be_6f99_407c_96b4_6b0db98a8298-------17,https://miro.medium.com/v2/resize:fill:140:140/1*llSDb5vPrA7O6ne4OoYwEw.png,image-processing 2067,1649,Using Mnist to visualize basic conv/filtering,"In this post I’d like to explain what is a convolution filter and what is the link between it and the classical image filters. To do so, we will use the MNIST dataset to experiment and visualize the filters. Let’s first load in the dataset. My MNIST dataset is downloaded…",https://medium.com/@yyuanli19/using-mnist-to-visualize-basic-conv-filtering-95d24679643e?source=topics_v2---------46-84--------------------e879c8be_6f99_407c_96b4_6b0db98a8298-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PFxV0uGDyfl4NCvQpS-l_Q.png,image-processing 2068,1650,How to run YOLOv5 using Docker on Windows,"1. Introduction In this post, a method for detecting objects in videos using a deep learning-baesd technique called YOLOv5 was introduced. The following are the system requirements for running this method introduced in this post: Windows 10 Pro Setting up the environment using Docker Using the CPU for calculations By following the…",https://medium.com/@KentaItakura/how-to-run-yolov5-using-docker-on-windows-903ed7a0127e?source=topics_v2---------47-84--------------------e879c8be_6f99_407c_96b4_6b0db98a8298-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*X41Ywd-1WNv9nfpIvzANlw.gif,image-processing 2069,1651,Image Padding Techniques: Wrap Padding(part 3),Wrap padding is a common technique used in image processing to create a new image by wrapping the original image around its edges. This technique is particularly useful when we need to extend an image’s size without introducing additional content or altering the image’s original appearance. …,https://medium.com/@Orca_Thunder/image-padding-techniques-wrap-padding-part-3-231da96ef20a?source=topics_v2---------48-84--------------------bdce1a30_31df_4c9d_b566_c5cab3e7a0f2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2070,1652,Compose Camp 2: Mastering Images in Jetpack Compose with Coil-Compose and Landscapist,"Images and graphics add beauty and life to android apps. In android development, you will be required to design and load images and graphics into your application. Jetpack Compose has APIs and external libraries that helps you handle the visuals like images and graphics in your android app, from your…",https://medium.com/@musyokamuasya/compose-camp-2-mastering-images-in-jetpack-compose-with-coil-compose-and-landscapist-1887e54e4d9f?source=topics_v2---------49-84--------------------bdce1a30_31df_4c9d_b566_c5cab3e7a0f2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*thwJhiLGz8hHH_JP03EAdg.png,image-processing 2071,1653,Estimate rotation matrix from corresponding point cloud,"Abstract N vectors a1, … , aN with rotation matrix R, we obtain a’1, … , a’N are obtained. a'i = Ra (i=1,..,N) At this point, I summarize how to find the rotation matrix R. How to find it when there is no error in the data is summarized here. In the…",https://medium.com/@hirok4/estimate-rotation-matrix-from-corresponding-point-cloud-9f7e7b155370?source=topics_v2---------50-84--------------------bdce1a30_31df_4c9d_b566_c5cab3e7a0f2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3A22HChZ5xZ7xLyjxjMJsQ.png,image-processing 2072,1654,"Faded, Torn, Rotated Receipt OCR with Image Preprocessing","Faded, Torn, Rotated Receipt OCR with Image Preprocessing How to extract specific information from faded, torn, rotated receipts? Background There are several Optical Character Recognition (OCR) engines available which include Tesseract OCR, Google Vision AI, and ML Kit (iOS). Mobile apps such as Cam Scanner, Receipt Jar, ReceiptLense seem to have incorporated superior OCR engines. …",https://medium.com/@jaelin_75015/faded-torn-rotated-receipt-ocr-with-image-preprocessing-1fb03c036504?source=topics_v2---------51-84--------------------bdce1a30_31df_4c9d_b566_c5cab3e7a0f2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Uh-ze40MbHqCVgls,image-processing 2073,1655,Getting Started with NumPy and OpenCV for Computer Vision,"Start Your Coding for Computer vision with Python — Motivation We, human beings, perceive the environment and surroundings with our vision system. The human eye, brain, and limbs work together to perceive the environment and act accordingly. An intelligent system can perform those tasks which require some level of intelligence if done by a human. So, for performing intelligent tasks…",https://medium.com/towards-data-science/getting-started-with-numpy-and-opencv-for-computer-vision-555f88536f68?source=topics_v2---------52-84--------------------bdce1a30_31df_4c9d_b566_c5cab3e7a0f2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*XaFEQ98UnbtzKvEN,image-processing 2074,1656,Python Magic : Transform Your Images and Videos in seconds,"images and videos processing is a part and parcel of computer vision and machine learning applications. In this article, we will take a look at how to use Python and OpenCV to perform basic image manipulation operations such as grayscale conversion, blurring, and thresholding. …",https://medium.com/@amineouahidialaoui/python-magic-transform-your-images-and-videos-in-minutes-6fe70b2d4f66?source=topics_v2---------53-84--------------------bdce1a30_31df_4c9d_b566_c5cab3e7a0f2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fr4uAXkyPt-Z3G8U50pQ4A.jpeg,image-processing 2075,1657,On Photography — Part Two,"After my photo exhibition at the Canadian Embassy, things did start to happen for me. The Embassy contacted me and asked if I did event photography. I didn’t have any experience doing that kind of photography, but I knew what it was; so, I said sure. Event photographers actually get…",https://medium.com/@johnwmcinnes/on-photography-part-two-226f319e0dc5?source=topics_v2---------54-84--------------------bdce1a30_31df_4c9d_b566_c5cab3e7a0f2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*y5TA2x8mvO1xsKu3zyFCRw.jpeg,image-processing 2076,1658,AI scares off wolves,"With the reintroduction of wolves to Germany, wolf depredations are also on the rise. Anna Förster and her team from the University of Bremen are developing an AI-supported pasture fence that will recognize wolves and scare them off individually. A conversation about deterrence measures and how they can chase away elephants as well as wolves. ELIANE EISENRING SPOKE WITH ANNA FÖRSTER Mrs Förster, what is the current situation in Germany regarding wolves and grazing animals? In the monitoring year 2021/2022, the Federal Ministry for the Environment registered a total of 161 wolf packs, 43 wolf pairs and 21 territorial lone wolves in Germany — in 2020/21…",https://medium.com/@binarydreams/ai-scares-off-wolves-b93ae79f65f7?source=topics_v2---------55-84--------------------bdce1a30_31df_4c9d_b566_c5cab3e7a0f2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*WXENg2GtA50JWTZGZyBtcA.png,image-processing 2077,1659,Removing Noise using Median Filter: Image Processing,Image processing is an important field of study in computer science that involves manipulating digital images to improve their quality or extract useful information from them. One of the most common image processing techniques used today is the median filter. …,https://medium.com/@netesh.paudel/removing-noise-using-median-filter-image-processing-6390d8da4fa5?source=topics_v2---------56-84--------------------bdce1a30_31df_4c9d_b566_c5cab3e7a0f2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rCwhTZgFRHOfc3p_CX5Uog.jpeg,image-processing 2078,1651,Image Padding Techniques: Zero Padding (part 1),"Zero padding is a common technique used in image processing to adjust the size of an image, either to prepare it for further processing or to match the dimensions of other images in a dataset. …",https://medium.com/@Orca_Thunder/image-padding-techniques-zero-padding-part-1-669de127ba59?source=topics_v2---------57-84--------------------bdce1a30_31df_4c9d_b566_c5cab3e7a0f2-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*nDCLdHdKK32s8PohosPxwQ.gif,image-processing 2079,1660,4 Easy steps to train your AI model and create personal Avatar generator 😎✨,"1. Make the AI model Open tryleap.ai, create a new account, and log in. Select “Image” -> “Fine Tune” and pick “Create Model”.",https://medium.com/ai-in-plain-english/4-easy-steps-to-train-your-ai-model-and-create-personal-avatar-generator-303e5d5ca402?source=topics_v2---------58-84--------------------b2924520_43a5_4fae_bb33_8cd385fe0103-------17,https://miro.medium.com/v2/resize:fill:140:140/0*iy6Im6LlxvxbQ8j0.jpeg,image-processing 2080,1661,Convolution: The Pixel Perfect Technique Behind CNNs,"Definition Convolution is a fundamental operation in convolutional neural networks (CNNs). It is a mathematical operation used to process image data by applying a set of filters or kernels to the input image. The convolution operation involves taking a small matrix, called the kernel or filter, and sliding it over the…",https://medium.com/@aatish_kayyath/convolution-the-pixel-perfect-technique-behind-cnns-c4c3b464a816?source=topics_v2---------59-84--------------------b2924520_43a5_4fae_bb33_8cd385fe0103-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4u2UKWBK1OWlOwnabIQnfQ.jpeg,image-processing 2081,1662,natural cubic spline interpolation of y-values: how to get derivative of the spline wrt the y-values?,"Given a data set with support points x_1,…,x_n and corresponding y-values y_1,…,y_n. My objective is to create a cubic spline f (with natural boundary conditions) that passes through the y_values. There are, of course, plenty of functions for doing this. However, for a parameter identification procedure, I have to compute…",https://medium.com/@technicalsource9/natural-cubic-spline-interpolation-of-y-values-how-to-get-derivative-of-the-spline-wrt-the-4825132b844b?source=topics_v2---------60-84--------------------b2924520_43a5_4fae_bb33_8cd385fe0103-------17,https://miro.medium.com/v2/resize:fill:140:140/0*esccJGRRfNo8ssf9.png,image-processing 2082,1662,Change component size in system composer,"How can I change a component size in MATLAB system composer by means of APIs (command line or MATLAB code) ? NOTE:- Matlabsolutions.com provide latest MatLab Homework Help,MatLab Assignment Help , Finance Assignment Help for students, engineers and researchers in Multiple Branches like ECE, EEE, CSE, Mechanical, Civil with 100%…",https://medium.com/@technicalsource9/change-component-size-in-system-composer-28a5a6ede919?source=topics_v2---------61-84--------------------b2924520_43a5_4fae_bb33_8cd385fe0103-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2083,1663,Comparing web rendering quality PNG vs SVG,"I was having a discussion with one of my colleagues on the decision of using SVG format instead of PNGs of various predefined sizes. We knew predefined-PNGs was the preferred way to go for our colleagues in charge with Android/iOS development. As a web developer engineer, I was a bit…",https://medium.com/@mihneasim/comparing-web-rendering-quality-png-vs-svg-3f059cf8d943?source=topics_v2---------62-84--------------------b2924520_43a5_4fae_bb33_8cd385fe0103-------17,https://miro.medium.com/v2/resize:fill:140:140/1*WYrOwbxZvdHi7HBZhBOFsg.png,image-processing 2084,1664,Image Compression: How It Works and Why It Matters,How Image Compression Works Image compression works by removing redundant information from an image file while maintaining the essential details. There are two types of image compression: lossy and lossless. Lossless Compression Lossless compression algorithms reduce the file size of an image without discarding any of the original data. It does this by finding and eliminating…,https://medium.com/@hpdeshmukh/image-compression-how-it-works-and-why-it-matters-839109bec5e6?source=topics_v2---------63-84--------------------b2924520_43a5_4fae_bb33_8cd385fe0103-------17,https://miro.medium.com/v2/resize:fill:140:140/1*8CCKNBLYzy4KTLNOglTBCA.png,image-processing 2085,1665,Visualizing the Colors of Noise,"How to visualize the color of any signal — Introduction Noise can be an interesting subject, as it seems embedded in the foundations of many systems, such as MRI, RADAR, SONAR, and GPS. Usually, it is a nuisance that blocks out the desired signal, but today we will take a different approach and learn about the colors of noise. Then…",https://medium.com/better-programming/visualizing-the-colors-of-noise-93432ad94db8?source=topics_v2---------64-84--------------------b2924520_43a5_4fae_bb33_8cd385fe0103-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ZI6xZp0AZWXkL8-X,image-processing 2086,1666,GigaGAN,"The authors write (https://mingukkang.github.io/GigaGAN/) “Unlike traditional super-resolution techniques [2, 18, 47, 95] that aim to faithfully reproduce low-resolution inputs or handle image degradation like compression artifacts, our upsamplers for large-scale models serve a different purpose. They need to perform larger upsampling factors while potentially leveraging the input text prompt.” During training and inference time, we apply moderate Gaussian noise augmentation to reduce the gap between real and GAN-generated images.",https://medium.com/@prabindh/gigagan-f7f251eb0e5a?source=topics_v2---------65-84--------------------b2924520_43a5_4fae_bb33_8cd385fe0103-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2087,1667,Crash Course in Data: Preprocessing of Image Data,"Authors: Anvi Jain, Snehil Aryan, Nik Bear Brown Introduction There are several real-world applications of image processing. Unfortunately, a few problems associated with image data includes complexity, inaccuracy, and inadequacy. …",https://medium.com/aiskunks/crash-course-in-data-preprocessing-of-image-data-af467cc093ed?source=topics_v2---------66-84--------------------bc25b729_792b_41d5_9656_a00c304fe47e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*380UcsVov3FPH-ulRGTOZg.png,image-processing 2088,1662,How to replace specific characters in a cell array?,"I have a question about a code. I have a cell array with strings and I would like to replace the last 5 characters with another for every cell array. I tried strrep but no use. For example I have an array: A={‘MATHIEW’,’NIKOLIEW’,’SAMIEW’,’SAMOURAI’}. I would like to replace ONLY in…",https://medium.com/@technicalsource9/how-to-replace-specific-characters-in-a-cell-array-cfa31d1f8108?source=topics_v2---------67-84--------------------bc25b729_792b_41d5_9656_a00c304fe47e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2089,1662,Plot data in matlab,"Hi, I have 3 variables which are basically in form of % and I would like to build a trent plot for these Example: 03/06/2023 - A - 5% 03/06/2023 - B - 50% 03/06/2023 - C - 55% I want to plot them in the same window. Basically do…",https://medium.com/@technicalsource9/plot-data-in-matlab-24761123873c?source=topics_v2---------68-84--------------------bc25b729_792b_41d5_9656_a00c304fe47e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2090,1662,Bi-linear (piecewise) curve fitting,"Can someone explain how to plot the two linear lines (Billinear curve fiiting) from the existing curve? NOTE:- Matlabsolutions.com provide latest MatLab Homework Help,MatLab Assignment Help , Finance Assignment Help for students, engineers and researchers in Multiple Branches like ECE, EEE, CSE, Mechanical, Civil with 100% output.Matlab Code for B.E…",https://medium.com/@technicalsource9/bi-linear-piecewise-curve-fitting-1b75255b1d0a?source=topics_v2---------69-84--------------------bc25b729_792b_41d5_9656_a00c304fe47e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*jsSonnuG5wWs1_39.png,image-processing 2091,1662,How to use isoutlier based in a part of the data?,"I have a vector of datas. Like this, a =[0;0.0028;0.0002;0.0039;0.0061]. As you see, since the 4° element, the values start growing more until the end. I was trying to determine a threshold to define the 4° and 5° elements as ouliers using ‘isoutlier’ function from Matlab. I did it. …",https://medium.com/@technicalsource9/how-to-use-isoutlier-based-in-a-part-of-the-data-f2ae2af4b3ae?source=topics_v2---------70-84--------------------bc25b729_792b_41d5_9656_a00c304fe47e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*2l2DGSZ6Hc82qGZU.png,image-processing 2092,1668,Metaballs simulation in C++,"We can think of the metaballs as organic-looking n-dimensional isosurface shapes moving in space. The most inspiring feature is their ability to meld together when in close proximity to create single, contiguous objects. …",https://medium.com/@markus-x-buchholz/metaballs-simulation-in-c-4d159a7e5db7?source=topics_v2---------71-84--------------------bc25b729_792b_41d5_9656_a00c304fe47e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*G5NwgAO5JpeKx6Qt,image-processing 2093,1206,“TensorFlow: A Comprehensive Guide to Tensors and Deep Learning Models”,"Tensors are a fundamental concept in mathematics and physics, and they play a critical role in describing the behavior of physical systems in a mathematical framework. A tensor is a mathematical object representing physical quantities with multiple components, such as velocity, acceleration, and stress. These components can be scalar values…",https://medium.com/@the_daft_introvert/tensorflow-a-comprehensive-guide-to-tensors-and-deep-learning-models-8d56d0a081de?source=topics_v2---------72-84--------------------bc25b729_792b_41d5_9656_a00c304fe47e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LPVcOvGvE1hIFzkyD4bc4A.png,image-processing 2094,1669,Make a video from images using python3,"Easy, efficient and quick way: pip install olympict from olympict import ImagePipeline ( ImagePipeline.load_folder(""./examples"") .to_video(lambda _: ""./output.mkv"", 24) # save video with 24 FPS .wait_for_completion() ) And voilà ! You got your video 😁 But, what if my images need to be resized ? Okay, you can choose a new…",https://medium.com/@gabriel-kasser/make-a-video-from-images-using-python3-2646d352fdda?source=topics_v2---------73-84--------------------bc25b729_792b_41d5_9656_a00c304fe47e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2095,1670,Image Perspective Distortion in JavaScript,"Perspective distortion in programming involves altering the appearance of an object and its surroundings to make it appear as if it was viewed from a different perspective than the standard focal length. This effect is achieved by manipulating the coordinates of the image pixels, resulting in an image that simulates…",https://medium.com/bitsrc/image-perspective-distortion-with-javascript-and-html-canvas-14627233623d?source=topics_v2---------74-84--------------------bc25b729_792b_41d5_9656_a00c304fe47e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*XU5XZQ5A_7LKnspKtA8KUw.jpeg,image-processing 2096,1671,Automated profile picture moderation at BlaBlaCar using Deep Learning,A story of how we drastically reduced manual profile picture moderation at BlaBlaCar. Profile picture moderation at BlaBlaCar More than 19 million profile pictures were uploaded to the BlaBlaCar carpooling platform in 2022. This represents roughly 53k pictures per day. These profile pictures help build trust in our carpooling community. They help carpoolers know who…,https://medium.com/blablacar/automated-profile-picture-moderation-at-blablacar-using-deep-learning-ec7485746bd?source=topics_v2---------75-84--------------------bc25b729_792b_41d5_9656_a00c304fe47e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*S8igRQIwJ4bvW6pL4vqGDQ.png,image-processing 2097,1672,Documents Image Quality Assessment Part -2,"Aditya Mangal | Insurance Samadhan | Shivpoojan Saini Welcome back, dear reader! In Part-1, we dipped our toes into the exciting world of Image Quality Assessment and made some impressive progress using classification and regression models. However, like a master chef constantly seeking to refine their signature dish, we’re not…",https://medium.com/@adityamangal98/documents-image-quality-assessment-part-2-f15563d2dea?source=topics_v2---------76-84--------------------fcbd56c7_404e_48ef_b9d1_6b32b637b3c6-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/0*cXYu1Gu7PcCJV2HU.gif,image-processing 2098,1673,Automating Image File Type Conversion with Python,"I need to upload a series of files (.PNG) to a website, but it only accepts (.JPG), so I tried to automate it. To make it more efficient, I visited my VS Code and automate the process using python. I use PIL (Pillow) Package to automate it. PILLOW Package Pillow or PIL…",https://medium.com/@lidwinak/automating-file-type-conversion-with-python-6a3538a0e2d6?source=topics_v2---------77-84--------------------fcbd56c7_404e_48ef_b9d1_6b32b637b3c6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*p8yv7DY9vq525q7M,image-processing 2099,1674,5 ControlNet resources to try or deploy on your own,"ControlNet gives more control over Stable Diffusion image generation — Stable diffusion enabled anyone to generate images from text prompts. But it was lacking visual guidance. ControlNet solves that problem where you can give an input source image along with input text as inspiration (or control) to Stable Diffusion’s image generation. In short, you can give an input image to…",https://medium.com/@ramsrigoutham/5-controlnet-resources-to-try-or-deploy-on-your-own-4b9d8d22e8f2?source=topics_v2---------78-84--------------------fcbd56c7_404e_48ef_b9d1_6b32b637b3c6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*KH4YZT-1kkncsByBRZmJsA.png,image-processing 2100,1675,"How Prompts Can Unlock Your Creativity: Exploring the Benefits, Future, and Impact of Writing Prompts","It seems that you may have misspelled the word “pormpt.” However, assuming you meant “prompt,” a prompt can refer to several different things depending on the context. Here are a few possible meanings: In computing, a prompt can refer to a message or symbol on the screen that indicates the…",https://medium.com/@mohitmeena43/how-prompts-can-unlock-your-creativity-exploring-the-benefits-future-and-impact-of-writing-d293388e1633?source=topics_v2---------79-84--------------------fcbd56c7_404e_48ef_b9d1_6b32b637b3c6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Ei5mVne5C9xFfi3V,image-processing 2101,1676,Mastering Image Creation with Midjourney AI Tools,"How to Create Stunning AI Images with Midjourney — In today’s digital age, the ability to create visually stunning images is a valuable asset in various industries. With the rise of artificial intelligence (AI), image creation has become more accessible and efficient. This comprehensive guide explores how to produce amazing AI images using Midjourney’s cutting-edge AI tools. “Mastering Image…",https://medium.com/unlocking-the-potential-of-gpt-3-chatgpt-in/mastering-image-creation-with-midjourney-ai-tools-8a3759235b8?source=topics_v2---------80-84--------------------fcbd56c7_404e_48ef_b9d1_6b32b637b3c6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0nQZidPhIGCseEAdtzruMQ.jpeg,image-processing 2102,1665,Camera Response Functions,How Cameras Capture Images — This article is a quick overview of the Camera Response Function (CRF). It is intended to provide anyone interested in Computer Vision just enough knowledge to be dangerous. Motivation The Camera Response Function is a type transfer function that describes how a camera will capture an image of a given scene…,https://medium.com/@itberrios6/camera-response-functions-938481a373a9?source=topics_v2---------81-84--------------------fcbd56c7_404e_48ef_b9d1_6b32b637b3c6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*MtU4-rf1tQj1Yv1y,image-processing 2103,1677,Parking space counter,This project is based on image processing to detect spaces in a parking lot. This project will use open CV and CVzone libraries to perform the image processing task. How it works Drawing boxes on the still image of the parking lot using a mouse-click function Cropping and performing open…,https://medium.com/@tejasvikashyap2/parking-space-counter-8aea906af3ab?source=topics_v2---------82-84--------------------fcbd56c7_404e_48ef_b9d1_6b32b637b3c6-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*4ZREVrW8XrNrCcuYS_oqAg.gif,image-processing 2104,1678,Remove object from object detection dataset using CV2 inpainting,"Few weeks ago, I participated in a challenge to solve a computer vision problem, and the given dataset was so messy and unbalanced, Where there was a class that has 8000 example and some other classes have about only100 example When I have tried augmentation methods to oversampling the classes…",https://medium.com/@mustafaazzurri/remove-object-from-object-detection-dataset-using-cv2-inpainting-9ce88af08d11?source=topics_v2---------83-84--------------------fcbd56c7_404e_48ef_b9d1_6b32b637b3c6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*KPyc7YGDIJzGBu8z.jpg,image-processing 2105,1679,Emotion recognition in EEG signals using the continuous wavelet transform and CNNs,"Emotions are mental states associated with changes that influence people’s behavior, thinking, and health. Emotional changes can also appear in the organs and tissues of the human body as electrical potential differences gathered as biosignals in datasets. This work proposes the classification of emotions in electroencephalographical signals, transforming these discrete…",https://medium.com/@almanzaConejo/emotion-recognition-in-eeg-signals-using-the-continuous-wavelet-transform-and-cnns-a41b14a85b0c?source=topics_v2---------84-84--------------------fcbd56c7_404e_48ef_b9d1_6b32b637b3c6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hYjD7I587Epcr2qEJI7Rtg.png,image-processing 2106,1640,How to Get the Dominant Colors of an Image in PHP,"If you’re planning to make programmatic edits to an image file, it’s best to know what colors you’re working with first. Slotting our Return Dominant Colors API into your image processing workflow will quickly return the top 5 dominant colors (in order) present within that image. …",https://medium.com/@cloudmersive/how-to-get-the-dominant-colors-of-an-image-in-php-c8b410c0800?source=topics_v2---------85-84--------------------43b16d98_df47_44c7_97c7_1d56dca5d409-------17,https://miro.medium.com/v2/resize:fill:140:140/0*JthU37_KfQBijxyC,image-processing 2107,1679,Emotion Recognition Using Time-Frequency Distribution and GLCM Features from EEG Signals,"Deep learning techniques are commonly used for emotion recognition from Electroencephalography (EEG) signals. However, some disadvantages of employing these classifiers are the high memory requirements and the low number of available EEG samples in datasets. This work proposes a novel approach for increasing the number of extracted features based on…",https://medium.com/@almanzaConejo/emotion-recognition-using-time-frequency-distribution-and-glcm-features-from-eeg-signals-702db4da6c24?source=topics_v2---------86-84--------------------43b16d98_df47_44c7_97c7_1d56dca5d409-------17,https://miro.medium.com/v2/resize:fill:140:140/1*dvmBJdMFk8d0PuVoxjNlfw.jpeg,image-processing 2108,1680,Nuances and caveats of various image processing tools for computer vision and neural networks,"What is Image Processing? Image processing involves manipulating (e.g. resizing, blurring, rotating, etc.) digital images through the use of computer algorithms for computer vision and neural networks applications. Several libraries are available to accomplish these tasks. The most commonly used libraries are as follows: OpenCV Skimage PIL Tensor Flow Pytorch (Summarized but not used…",https://medium.com/@vinod.batra0311/nuances-and-caveats-of-various-image-processing-tools-for-computer-vision-and-neural-networks-251da91d07?source=topics_v2---------87-84--------------------43b16d98_df47_44c7_97c7_1d56dca5d409-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gvBFHfSjZu1uyGoofC2oww.png,image-processing 2109,1640,"How to Detect, Highlight Edges in an Image using PHP","Edge detection is an important step towards feature extraction, but implementing the logic is no small task. Thankfully, the below API will take care of that for you, automatically detecting and highlighting the edges within a certain radius of the center of an image (depending on custom input for each…",https://medium.com/@cloudmersive/how-to-detect-highlight-edges-in-an-image-using-php-6cc4094fbb0b?source=topics_v2---------88-84--------------------43b16d98_df47_44c7_97c7_1d56dca5d409-------17,https://miro.medium.com/v2/resize:fill:140:140/0*IA28VhhfA7J4AhTi,image-processing 2110,1668,Perlin Noise for Fractal Brownian Motion in C++,"The choice of random number or noise is affected by the application we run. There are several implementations of random generators in C++. For my purposes, I use often the Marsenne-Twister engine. Generally, we are looking for such an engine (method) that gives always an unreachable number, chosen totally independently…",https://medium.com/@markus-x-buchholz/perlin-noise-for-fractal-brownian-motion-in-c-3c8076243272?source=topics_v2---------89-84--------------------43b16d98_df47_44c7_97c7_1d56dca5d409-------17,https://miro.medium.com/v2/resize:fill:140:140/1*KCQXEB4hdRi31qRS34sDiw.png,image-processing 2111,1640,How to Emboss Images in PHP,"Embossment is traditionally a physical process which entails creating raised surfaces on physical objects (common examples include coins or old-school soda bottles). In a two-dimensional digital space, embossment is all about emulating the physical process by creating an illusion of depth in certain areas around an image’s subjects. Using the…",https://medium.com/@cloudmersive/how-to-emboss-images-in-php-b017ae78f98d?source=topics_v2---------90-84--------------------43b16d98_df47_44c7_97c7_1d56dca5d409-------17,https://miro.medium.com/v2/resize:fill:140:140/0*NUtuLCsRgWnNJ7mY,image-processing 2112,1640,How to Create a Motion Blur Effect in PHP,"Looking for a way to put your images in motion? You can use the below code to call our Motion Blur API and quickly create customized motion blurs on images at scale. Each request should specify the radius, sigma, and angle (in degrees) of the motion blur. You can use…",https://medium.com/@cloudmersive/how-to-create-a-motion-blur-effect-in-php-bb3d23c733c5?source=topics_v2---------91-84--------------------43b16d98_df47_44c7_97c7_1d56dca5d409-------17,https://miro.medium.com/v2/resize:fill:140:140/0*klofNLY94TXv0es6,image-processing 2113,1681,Exploring the Depths: How AI-Generated Poetry and Art Bring Jules Verne and Jacques Cousteau Together,"This article describes my attempt at using OpenAI’s ChatGPT and DALL-E 2 to generate a poem and create an image to accompany it. I chose two quotes, one from Jules Verne and the other from Jacques Cousteau…",https://medium.com/@thepurpledurian/exploring-the-depths-how-ai-generated-poetry-and-art-bring-jules-verne-and-jacques-cousteau-1d4b334bd025?source=topics_v2---------92-84--------------------43b16d98_df47_44c7_97c7_1d56dca5d409-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*KukTCjyFiGi5KO0iZdeKTg.gif,image-processing 2114,1682,Hair removal from the HAM dataset,"A guide through my algorithm to remove hairs from images While training a model to detect skin cancer using the HAM dataset, I saw that many images included hair, while others did not. My idea was that removing these from the images could perhaps improve the models performance. …",https://medium.com/@francode77/hair-removal-from-the-ham-dataset-2e884a423335?source=topics_v2---------93-84--------------------43b16d98_df47_44c7_97c7_1d56dca5d409-------17,https://miro.medium.com/v2/resize:fill:140:140/1*8cY9C3fyaVWKe-2u1RJ-nA.jpeg,image-processing 2115,1683,Easily Integrate the React Image Editor into the Rich Text Editor,"In this blog, we’ll see how to integrate the Syncfusion React Image Editor with the Rich Text Editor component. Syncfusion’s React Rich Text Editor is a feature-rich WYSIWYG HTML and Markdown editor. It is widely used to create blogs, forum posts, note sections, support tickets, messaging applications, and more. It…",https://medium.com/syncfusion/easily-integrate-the-react-image-editor-into-the-rich-text-editor-e52ee58a1f7c?source=topics_v2---------94-84--------------------43b16d98_df47_44c7_97c7_1d56dca5d409-------17,https://miro.medium.com/v2/resize:fill:140:140/0*AmOZej7Dkq-xYgW0.png,image-processing 2116,1684,How to Get Exposure,"Another Photo Platform — As a long time photographer, I am far more practiced in making image exposures than I am in getting exposure for my work. This means I have thousands of pictures in my archives yet only a paltry audience. My earliest efforts were on B&W Panchromatic film. This was primarily a…",https://medium.com/@modalchoice/how-to-get-exposure-2e34ae1bfd42?source=topics_v2---------95-84--------------------863cdbd5_5c79_483a_9da3_12ffee0dd661-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7oUJFZyJmvzlZboGi1-bmg.jpeg,image-processing 2117,1582,Image Processing with Python: Frequency Domain Filtering for Noise Reduction and Image Enhancement,"Introduction In contemporary times, image processing has become an indispensable part of our daily lives, spanning various domains such as social media and medical imaging. Notably, images acquired via digital cameras or other sources such as satellite photos and medical scans may necessitate pre-processing to eliminate or enhance noise. In this…",https://medium.com/@mahmed31098/image-processing-with-python-frequency-domain-filtering-for-noise-reduction-and-image-enhancement-d917e449db68?source=topics_v2---------96-84--------------------863cdbd5_5c79_483a_9da3_12ffee0dd661-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wQts6IPawZO2QE7KhDUBNQ.png,image-processing 2118,1640,How to Create a Gaussian Blur Effect on an Image in PHP,"Adding image filters to your applications is easy and highly efficient with simple, value-add APIs at your disposal. With the PHP code examples provided below, you can rapidly implement our free-to-use Gaussian Blur API, enabling your application users to customize image uploads with zero extra hassle. First, install the PHP…",https://medium.com/@cloudmersive/how-to-create-a-gaussian-blur-effect-on-an-image-in-php-e1853f1730c5?source=topics_v2---------97-84--------------------863cdbd5_5c79_483a_9da3_12ffee0dd661-------17,https://miro.medium.com/v2/resize:fill:140:140/0*5ecV3ygdugN925A7,image-processing 2119,1685,Basics of Image Processing with OpenCV in Python: Fourier Transformations,"Fourier Transformation is a mathematical tool used for analyzing signals, including digital images. In image processing, it is primarily used for frequency domain analysis and manipulation of images. This transformation converts a signal from the spatial domain to the frequency domain, which provides a representation of the image’s frequency components…",https://medium.com/@numustafa/basics-of-image-processing-with-opencv-in-python-fourier-transformations-75ac3cf7c17b?source=topics_v2---------98-84--------------------863cdbd5_5c79_483a_9da3_12ffee0dd661-------17,https://miro.medium.com/v2/resize:fill:140:140/1*nZ4PM14uPczk70zqJMfaWw.jpeg,image-processing 2120,1685,Getting started with OpenCV in Python: Basics of Image Processing,"Image processing is a technique used to enhance or manipulate digital images. It has become an important aspect of modern-day technology and is widely used in various applications such as medical imaging, remote sensing, robotics, and many others. Python has become a popular language for image processing due to…",https://medium.com/@numustafa/getting-started-with-opencv-in-python-basics-of-image-processing-af636207faf3?source=topics_v2---------99-84--------------------863cdbd5_5c79_483a_9da3_12ffee0dd661-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OEvYbCPFEAXgesXSZ2y8Ng.png,image-processing 2121,1669,How I decreased my 8-hours python image dataset generation process to a mere 30-mins,"As a data scientist, preparing data is very time consuming. I regularly have to preprocess big chunks of data, and I can’t always predict what error I will encounter through the whole dataset. Once your process is fool proof, you have to make a final run with all the data…",https://medium.com/@gabriel-kasser/how-i-decreased-my-8-hours-python-image-dataset-generation-process-to-a-mere-30-mins-b6748ab019ab?source=topics_v2---------100-84--------------------863cdbd5_5c79_483a_9da3_12ffee0dd661-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5hc0KZUrvzc4hPOCthfCOw.png,image-processing 2122,1611,Image Segmentation using Thresholding in MATLAB,"Introduction: An important step in image processing is image segmentation, which seeks to separate an image into segments, each of which represents a different object or area of interest. With a threshold value, foreground (object) pixels are separated from background pixels in the technique known as thresholding, which converts an…",https://medium.com/@arafique906/image-segmentation-using-thresholding-in-matlab-c63be0c26deb?source=topics_v2---------101-84--------------------863cdbd5_5c79_483a_9da3_12ffee0dd661-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2123,1686,"Espresso Filter Basket Hole Changes After 2,000 Shots","Comparing old and new data — I have been examining filter baskets for a few years, and as a result, I have some data on my basket when I originally bought it. I thought it would be interesting to see how the basket has changed and if I can measure that change. In two years, I…",https://medium.com/@rmckeon/espresso-filter-basket-hole-changes-after-2-000-shots-2598cacb606?source=topics_v2---------102-84--------------------863cdbd5_5c79_483a_9da3_12ffee0dd661-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xU2R01Es2V9OVJnR4LTSRQ.jpeg,image-processing 2124,1687,Malunak: AI Image Detector,"This article is about developing a model for AI Image Detection powering Malunak APIs. Malunak is in alpha at the moment, so there are some limitations with its API. Still, you can register your project and start using it in the developer dashboard. Remember to activate the project before using…",https://medium.com/@pkasila/malunak-ai-image-detector-78489c2dad26?source=topics_v2---------103-84--------------------863cdbd5_5c79_483a_9da3_12ffee0dd661-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MPe4ZeaGVF1nyb1EBK9o1A.png,image-processing 2125,1688,Documents Image Quality Assessment Part -1,"SHIVPOOJAN SAINI | Aditya Mangal | Insurance Samadhan Document images may be degraded at various stages like generation, storage, transfer, etc for example, degradations may result in a significant drop in the performance of Optical Character Recognition (OCR), as well as affect the performance of document image retrieval, layout analysis…",https://medium.com/@sainishivpoojan1/documents-image-quality-assessment-part-1-75c9c4e441b0?source=topics_v2---------104-84--------------------863cdbd5_5c79_483a_9da3_12ffee0dd661-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*4kAlhw3rBMozsiWCUHTLCQ.gif,image-processing 2126,1689,Python Image Editing Tutorial,"A Guide to Image Editing with Python: Basic Operations Using Pillow, OpenCV, and Scikit-Image — Introduction Image editing is an essential part of digital image processing, which is widely used in various applications such as image enhancement, feature extraction, pattern recognition, and so on. Python provides numerous libraries that make image editing with Python very easy. In this article, we will explore some of the popular…",https://medium.com/@mirceaioana850/python-image-editing-tutorial-566de21c208a?source=topics_v2---------105-84--------------------2002cfcc_c6fb_4961_88d1_29ea9169ca98-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TSqUYNEjdYET356SFRonkg.jpeg,image-processing 2127,1690,Basics of Image processing,"We will do image processing with help of python library Opencv. We can install in Command Prompt or Jupyter Notebook. pip install opencv-python Reading and displaying an image Reading of image is done using imread() , Image is taken in form of matrix of values. Displaying of image is done using imshow(). waitKey() is used to wait for key press .If waitKey(0) is to wait for key press. In waitKey(3000), Image will be there for 3000 milliseconds or 3 seconds.",https://medium.com/@sachin.devara/basics-of-image-processing-a5e8a9f204cd?source=topics_v2---------106-84--------------------2002cfcc_c6fb_4961_88d1_29ea9169ca98-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5f4EzIsfobm13uKpUHEiZw.jpeg,image-processing 2128,1691,Discrete Fourier Transform,"Introduction The Discrete Fourier Transform (DFT) is considered one of the most influential algorithms of all time. It is utilized in a variety of fields, such as Digital Communication, Image and Audio Compression, Signal Processing, and others. I previously discussed the Fourier Transform for continuous time signals and showed how it…",https://medium.com/@kamil2000budaqov/discrete-fourier-transform-75d9a9f37821?source=topics_v2---------107-84--------------------2002cfcc_c6fb_4961_88d1_29ea9169ca98-------17,https://miro.medium.com/v2/resize:fill:140:140/1*bdnCtIFEIt2Slr5GQx4LFw.png,image-processing 2129,1692,Unleashing the Potential of Histogram Segmentation for Image Segmentation”,"Mastering Image Segmentation with Histogram Analysis: A Practical Guide — Histogram-based image segmentation is a technique for dividing an image into multiple regions or segments based on histogram analysis. The image is first converted to grayscale, and then the intensity values of its pixels are analysed to determine the pixel value distribution. Let’s look at it pros and cons of…",https://medium.com/@mamchinn/unleashing-the-potential-of-histogram-segmentation-for-image-segmentation-d3fe92a1db25?source=topics_v2---------108-84--------------------2002cfcc_c6fb_4961_88d1_29ea9169ca98-------17,https://miro.medium.com/v2/resize:fill:140:140/1*XKFQFbNto8Gw9MAQARUUnw.jpeg,image-processing 2130,1640,How to Draw Text onto Images in PHP,"Overlaying text across an image is really useful, but it’s difficult to accomplish at scale. Thankfully, APIs make a big difference in situations like these — you can use the below API to programmatically draw text onto images at scale with customized visuals. …",https://medium.com/@cloudmersive/how-to-draw-text-onto-images-in-php-518af02fd475?source=topics_v2---------109-84--------------------2002cfcc_c6fb_4961_88d1_29ea9169ca98-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2131,1693,Convolution vs Correlation in Image Processing,"Convolution and correlation are two very similar concepts when it comes to image processing. However, they are not exactly the same. In this article, I would explain their difference(s) in layman’s terms. Background Before we dive into the convolution and correlation, there are a few terms that we need to know…",https://medium.com/@yizentan/convolution-vs-correlation-in-image-processing-429850c9c4e0?source=topics_v2---------110-84--------------------2002cfcc_c6fb_4961_88d1_29ea9169ca98-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*1VJDP6qDY9-ExTuQVEOlVg.gif,image-processing 2132,1640,How to Create Composite Images in PHP,"Composite images have both surreal and practical real-world applications, but their use-case is limited given the difficulty in creating them. Thankfully, the free-to-use API provided below makes it possible to precisely composite images at scale with minimal code and simple request parameters. The layered Image will automatically stack on top…",https://medium.com/@cloudmersive/how-to-create-composite-images-in-php-15136645c49b?source=topics_v2---------111-84--------------------2002cfcc_c6fb_4961_88d1_29ea9169ca98-------17,https://miro.medium.com/v2/resize:fill:140:140/0*LbdcQNElBuD4ytzX,image-processing 2133,1694,How to Add Text to Images and Create Videos using Express.js,"Express.js is a server-side framework for building web applications with Node.js. While it is possible to use Express.js to manipulate images and create videos, it is not the most suitable tool for the task. Instead, you might consider using a library or tool specifically designed for image and video manipulation…",https://medium.com/@yoblogger/how-to-add-text-to-images-and-create-videos-using-express-js-fd1b68711f42?source=topics_v2---------112-84--------------------2002cfcc_c6fb_4961_88d1_29ea9169ca98-------17,https://miro.medium.com/v2/resize:fill:140:140/0*f1azIPNRnGAiC-HA,image-processing 2134,1662,Regionprops Computes Properties Of Regions Of Pixels Of An Image Using MATLAB,Introduction — MATLABSolutions demonstrate In this task we are going to design During the Regionprops is a powerful function in image processing that allows you to compute various properties of regions of pixels in an image. This function is available in many image processing libraries and is widely used in many…,https://medium.com/@technicalsource9/regionprops-computes-properties-of-regions-of-pixels-of-an-image-using-matlab-3f97453b41a9?source=topics_v2---------113-84--------------------2002cfcc_c6fb_4961_88d1_29ea9169ca98-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2135,1640,How to Invert Image Colors in PHP,"Inverting (negating) the color in an image gives us a fresh glance at our content, replacing the current scheme with color values on the opposite end of the spectrum. The below API makes it easy to implement color inversion/negation into your applications — just copy and paste from the code…",https://medium.com/@cloudmersive/how-to-invert-image-colors-in-php-4a4792d2ab8?source=topics_v2---------114-84--------------------2002cfcc_c6fb_4961_88d1_29ea9169ca98-------17,https://miro.medium.com/v2/resize:fill:140:140/0*046-0BiVQk4al-9W,image-processing 2136,1695,Android Capturing Images from Camera or Gallery as Bitmaps using ActivityResultLauncher in Kotlin,"Learn the use of machine learning and computer vision in Android with our Complete Android Machine Learning Course course. Capturing images using a camera and using it in your Android applications can be tricky at times but the process is quite simple. So in this story, I will teach you…",https://medium.com/@hamzaasif-mobileml/android-capturing-images-from-camera-or-gallery-as-bitmaps-using-activityresultlauncher-in-kotlin-3157ab4ab329?source=topics_v2---------115-84--------------------820163bf_792f_49cb_81f7_623293cd5696-------17,https://miro.medium.com/v2/resize:fill:140:140/0*5Gz1ANRtaYeHe46O,image-processing 2137,1696,Can AI save bad scans?,"The starting point for any kind of document digitization, whether done by hand or through sophisticated text recognition algorithms, is a good-quality image. Take a look at the one below. It is a scan of the US declaration of independence — but not of the original. The real one has…",https://medium.com/transkribus/can-ai-save-bad-scans-5e692e4bc8d2?source=topics_v2---------116-84--------------------820163bf_792f_49cb_81f7_623293cd5696-------17,https://miro.medium.com/v2/resize:fill:140:140/0*sZM4yD_1mxAaUhwF.png,image-processing 2138,1640,How to Remove EXIF Data from Images in PHP,"While EXIF data certainly contains useful information, it sometimes constitutes a privacy concern — so building EXIF removal into your applications is always helpful. You can easily implement an EXIF removal API using the PHP code provided below — just copy and paste, provide a free-tier API key with your…",https://medium.com/@cloudmersive/how-to-remove-exif-data-from-images-in-php-d7d61f4dff88?source=topics_v2---------117-84--------------------820163bf_792f_49cb_81f7_623293cd5696-------17,https://miro.medium.com/v2/resize:fill:140:140/0*GUGsWZindv1Zstro,image-processing 2139,1686,Higher Precision Imaging of Espresso Baskets,"To better measure the difference between the top and bottom of each hole — Cameras have greatly advanced over the years allowing people to take high quality images. While this can be useful for computer vision applications, often simple changes in design of experiment can greatly improve the quality of these images for specific applications. Enter coffee! For a few years, I have been…",https://medium.com/towards-data-science/higher-precision-imaging-of-espresso-982270300b80?source=topics_v2---------118-84--------------------820163bf_792f_49cb_81f7_623293cd5696-------17,https://miro.medium.com/v2/resize:fill:140:140/1*g6N-XUb4_8gCIKrVUupDLg.jpeg,image-processing 2140,1697,Preprocess Images in Machine Learning,"Techniques to preprocess images for right results in Machine Learning (ML) — Machine Learning Steps: A Beginner Guide 5) How to Train Machine Learning Model. 4 Steps for Beginner in terms of trainingmedium.com Processing of images in a bit complex and expensive task in Machine and preprocessing of images is also part of it. Actually for images we use Deep Learning which is a part of Machine Learning. It uses Neurons which get’s input (x) with some weights (w) and bias (b) and…",https://medium.com/@abdulwahabraza123/preprocess-images-in-machine-learning-adfb17b11a08?source=topics_v2---------119-84--------------------820163bf_792f_49cb_81f7_623293cd5696-------17,https://miro.medium.com/v2/resize:fill:140:140/0*RLELQ7bpM_v_je0U,image-processing 2141,1698,Learn about the best artificial intelligence tools for creating images,"In the past few months, new artificial intelligence tools used for creating images have caused a lot of buzz and made headlines. You may have heard of some of these tools and perhaps even used some of them. In any case, we will now discuss the most popular and best…",https://medium.com/@markflow/learn-about-the-best-artificial-intelligence-tools-for-creating-images-d723019197f3?source=topics_v2---------120-84--------------------820163bf_792f_49cb_81f7_623293cd5696-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-shux5rVi0VGc8qbZpgqxA.jpeg,image-processing 2142,1699,"Explain how Convolutional Neural Networks (CNNs)and Recurrent Neural Networks (RNNs)works, and give examples of their applications?","Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs) are two important types of deep learning architectures used for different tasks. Convolutional Neural Networks (CNNs) CNNs were first introduced in the 1980s, but it was not until the 2010s that they gained widespread popularity and became the state-of-the-art approach for…",https://medium.com/@learner-cares/explain-how-convolutional-neural-networks-cnns-and-recurrent-neural-networks-rnns-works-and-give-42ad74218f24?source=topics_v2---------121-84--------------------820163bf_792f_49cb_81f7_623293cd5696-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2143,1700,Artificially Yet Intelligently Bringing the Past to Life,"Putting color and imagination into Chicago 1893 photography, new and old Enter the World’s Fair If we have never crossed paths before, this is our chance to get acquainted and cover one of my favorite topics: the Columbian Exposition. Luckily, there’s no shortage of angles on the event. …",https://medium.com/rustbelt-innovators/artificially-yet-intelligently-bringing-the-past-to-life-f80bba4035b?source=topics_v2---------122-84--------------------820163bf_792f_49cb_81f7_623293cd5696-------17,https://miro.medium.com/v2/resize:fill:140:140/1*HNNHviOeLsTw21alXDbVdA.png,image-processing 2144,1701,Perfecting Imperfect Table Gridlines: A Step-by-Step Guide using Python OpenCV,"Have you ever come across a table that lacked complete or missing lines, or worse, had no gridlines at all? If so, this article is specifically tailored for you. — Here I’ll show you how you can draw horizontal and vertical gridlines for your table image and if necessary I’ll show you how to remove them all (for example if you have broken lines, or if some are missing) to draw them better using the algorithm I’ll show you!",https://medium.com/@lidores98/perfecting-imperfect-table-gridlines-a-step-by-step-guide-using-python-opencv-9831cc11e5ee?source=topics_v2---------125-84--------------------39c70dcf_15cb_4817_a603_91b4e7ae185d-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*IEa6DnxJWh6LfV9BaUzvHw.gif,image-processing 2145,42,Optimizing Performance and Memory Usage: A Comprehensive Guide to Handling Images in iOS Development,"Images play a vital role in iOS app development, making them visually appealing and engaging. However, images can also have a significant impact on app performance and memory usage. In this comprehensive guide, we will explore the best practices for handling images in iOS development, with a focus on optimizing…",https://medium.com/@peterdestasio/optimizing-performance-and-memory-usage-a-comprehensive-guide-to-handling-images-in-ios-a8e7d9ead027?source=topics_v2---------127-84--------------------39c70dcf_15cb_4817_a603_91b4e7ae185d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2146,1702,Image Processing with Fourier Transform,"Image Processing is a crucial task in Computer Vision. For example, when we train a Deep Learning model with a small amount of image data, we need to synthesize new images using Image Processing methods to improve the performance. There are many methods developed for Image Processing. This post will…",https://medium.com/towards-artificial-intelligence/image-processing-with-fourier-transform-4ebc66651f2d?source=topics_v2---------129-84--------------------39c70dcf_15cb_4817_a603_91b4e7ae185d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*depPDcePVY6-IX2JZG2NGA.png,image-processing 2147,1662,How can I load and plot the difference of a set of images to a reference image?,"Hello, my task is to create a graph showing how a set a of images change in relation to the reference image. For defining the difference I am using the Structural Similarity (SSIM) index. Now my problem is that my loop does not go through all image in the folder…",https://medium.com/@technicalsource9/how-can-i-load-and-plot-the-difference-of-a-set-of-images-to-a-reference-image-fbccd1111822?source=topics_v2---------130-84--------------------39c70dcf_15cb_4817_a603_91b4e7ae185d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2148,1662,How to do manual thresholding using the set of images?,"Hi, I have a code for the Manual thresholding and I am unable to run the code correctly. I am using two images to do the thresholding. The imorig is the below original image and the im is the below segmented image. …",https://medium.com/@technicalsource9/how-to-do-manual-thresholding-using-the-set-of-images-243d667ca0c9?source=topics_v2---------131-84--------------------39c70dcf_15cb_4817_a603_91b4e7ae185d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2149,1662,Computation of Non directional Edge,"i want to compute non directional edge of an image block, how i can compute, the simple edge method, will return non directional edge? if no please suggest me the solution NOTE:- Matlabsolutions.com provide latest MatLab Homework Help,MatLab Assignment Help , Finance Assignment Help for students, engineers and researchers in…",https://medium.com/@technicalsource9/computation-of-non-directional-edge-98b7122ddfbb?source=topics_v2---------132-84--------------------39c70dcf_15cb_4817_a603_91b4e7ae185d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2150,1220,Self-Attention in Machine learning,"Self-attention is a mechanism used in machine learning, particularly in natural language processing (NLP), that allows a model to weigh the importance of different parts of an input sequence when making predictions or generating outputs. Introduction Self-attention is a mechanism that allows a neural network to selectively weigh the importance of…",https://medium.com/@samanemami/self-attention-in-machine-learning-6e9b6850e1e1?source=topics_v2---------133-84--------------------39c70dcf_15cb_4817_a603_91b4e7ae185d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2151,1703,How Does Facial Recognition Work In the Human Brain? Part 1 — Static Facial Recognition,Human’s are amazing at recognizing faces. Or even imagining faces in places where there are no faces. We are just overly sensitive to faces! Have you ever gotten freaked out at night or while walking in the dark because you thought you saw a face where there wasn’t one? That’s…,https://medium.com/@squoraishee/how-does-facial-recognition-work-in-the-human-brain-part-1-static-facial-recognition-dd9745353376?source=topics_v2---------134-84--------------------39c70dcf_15cb_4817_a603_91b4e7ae185d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7bJW2dEsc0c_KzM_eOjQqA.png,image-processing 2152,1704,Intel Image Classification using CNNs and different Optimizers,"I am reading “Deep Learning with Python” by François Chollet, and as a beginner in Deep Learning, I decided to apply what I learned to a Kaggle dataset. I chose the Intel Image Classification because it is a basic dataset for applying my newly founded skills. About the Intel Image Classification Dataset: Around 25000 images each…",https://medium.com/@shanmuka.sadhu/intel-image-classification-using-cnns-and-different-optimizers-8ba8b1ca514e?source=topics_v2---------135-84--------------------868179e5_627d_4438_8cdc_cb2d4fcfaaf6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*VNvV5UDdWrQ-waltOLZL7A.png,image-processing 2153,1662,Search for line passing through a point in edge image,"Hi all I have an color image and I converted it to gray image then I do edge detection using ‘canny’. The edge image contains horizontal, vertical and inclined lines. For specific pixel (xp,yp) in the edge image, I want to search for a vertical line that pass through this…",https://medium.com/@technicalsource9/search-for-line-passing-through-a-point-in-edge-image-940671aa6614?source=topics_v2---------136-84--------------------868179e5_627d_4438_8cdc_cb2d4fcfaaf6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2154,1662,Use Period Marker to fill circles drawn using viscircles,"Hi, I am trying to using the period marker to fill circles drawn using viscirlces but I cannot get the sizes to line up exaclty. I want the period marker to be the exact same size as the raidus 12 circle. Below is the code I am using, and I…",https://medium.com/@technicalsource9/use-period-marker-to-fill-circles-drawn-using-viscircles-cd75f30b1a9c?source=topics_v2---------137-84--------------------868179e5_627d_4438_8cdc_cb2d4fcfaaf6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*vT8JRGdmzwOin7Ti.png,image-processing 2155,1662,What does this means ?,"Dear all, I picked up a window of 5X5 from a given image im1=im(1:5,1:5) ans = 41 40 38 38 37 42 40 38 37 35 43 41 38 37 34 43 41 37 35 33 42 40 36 33 31 then I used graycomatrix to calculate the glcm matrix…",https://medium.com/@technicalsource9/what-does-this-means-e2cd604df35e?source=topics_v2---------138-84--------------------868179e5_627d_4438_8cdc_cb2d4fcfaaf6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2156,1321,Unleashing the Power of Imagination: Understanding the Capabilities of OpenAI’s Image Generation Technology : A developer Guide,The field of image generation has come a long way and with OpenAI’s technology it has reached a whole new level. OpenAI’s image generation models have the ability to create images that are not only visually stunning but also indistinguishable from real-world images. This technology has the potential to revolutionise…,https://medium.com/@eagerminds/unleashing-the-power-of-imagination-understanding-the-capabilities-of-openais-image-generation-515b01f31ced?source=topics_v2---------139-84--------------------868179e5_627d_4438_8cdc_cb2d4fcfaaf6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*IHZAZvqp8gYrVLtgk4jxCQ.jpeg,image-processing 2157,1705,How to Make a Telegram AI Image Bot,"The AI crypto coin space has been pumping out AI Image coins for weeks now and since our main job is developing Image bots for Devs in the space, we wanted to uncover the mystery behind this process for the average degen. We also want to show you what the…",https://medium.com/@thediamondman210/how-to-make-a-telegram-ai-image-bot-6ce3f17ae0ed?source=topics_v2---------140-84--------------------868179e5_627d_4438_8cdc_cb2d4fcfaaf6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*mpu1eyn_VkgsVfclr13WMQ.png,image-processing 2158,1706,The Quickest way to Compress an Image and Save Space: Adjusting Image Quality,"A simple solution to downsizing images into shareable sizes while maintaining image integrity — Have you ever tried to email images from your phone or computer only to receive the dreaded message saying, “Cannot attach, your file is larger than 25mb” or “The message was rejected by the server because it is too large”? Preparing your images beforehand can help avoid this headache and…",https://medium.com/@leinaalavoss/adjusting-image-quality-to-save-space-6277ae72af8a?source=topics_v2---------141-84--------------------868179e5_627d_4438_8cdc_cb2d4fcfaaf6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*aTG1NwXd2s2kzAqbd-El6g.jpeg,image-processing 2159,1700,Innovators Series: Liu Liu — Draw Things,"Software developer Liu Liu joins the program to talk about his new project “Draw Things, an AI image generator built on Stable diffusion with a number of other great features baked in as well. He talks about his career, the program, and where he thinks the future of generative artificial…",https://medium.com/@mdf-365/innovators-series-liu-liu-draw-things-1648b17911b5?source=topics_v2---------142-84--------------------868179e5_627d_4438_8cdc_cb2d4fcfaaf6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yVcVDFO_Hc-kVBAAU_AkLA.png,image-processing 2160,1707,Mixture of Gaussians (MoG) for Background Modelling — Part 1,"Have you ever wondered how people used to detect moving objects before the deep learning era? In this series of articles, I’ll try to boil down all the research papers, articles, and videos that I’ve been reading/watching for a week now about a popular moving object detection algorithm. Let us…",https://medium.com/@sushil.khadka.anon/mixture-of-gaussians-mog-for-background-foreground-segmentation-part-1-87eb4a285bb9?source=topics_v2---------143-84--------------------868179e5_627d_4438_8cdc_cb2d4fcfaaf6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*H1nrZ-wcs-25sk4qv9588g.jpeg,image-processing 2161,1708,Striking the Right Balance,"Navigating the Fine Line between Enhancement and Artificiality in Image Manipulation. — The use of Photoshop in landscape photography has been a hot topic of debate among photographers and photography enthusiasts alike. While there’s no denying the incredible power of this software and all the fantastic things you can do with it, there’s also a valid argument that too much Photoshop can…",https://medium.com/@arcrocker/striking-the-right-balance-604b884eaeed?source=topics_v2---------144-84--------------------f01fd711_14e9_40b0_9364_6c3ecd7e407a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rUyzj5TzfUQG32ofiMZGLw.jpeg,image-processing 2162,1709,On the Possibility of Turning Image Into Sound,"How would it even be done? — Iam working on a small personal research project while I look for other jobs. One idea that has interested me while browsing Upslash images is the possibility of turning images into sound. Not necessarily musical sound, although it could be that; it could also just be soundscapes or even effects…",https://medium.com/@noahhradek/on-the-possibility-of-turning-image-into-sound-1dd4c3613691?source=topics_v2---------145-84--------------------f01fd711_14e9_40b0_9364_6c3ecd7e407a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Gg8ShV65vxwoN2Jv,image-processing 2163,1644,Vision Transformers: An Innovative Approach to Image Processing!,Unlocking the Power of Multi-Head Self-Attention for Image Analysis. — Vision Transformer (ViT) is a transformer-based deep learning architecture for image classification tasks. It was introduced in the paper “An Image is Worth 16x16 Words: Transformers for Image Recognition at Scale” by Dosovitskiy et al. (2020). The main idea behind ViT is to represent an image as a sequence of…,https://medium.com/pythoneers/vision-transformers-an-innovative-approach-to-image-processing-3387c398d67f?source=topics_v2---------146-84--------------------f01fd711_14e9_40b0_9364_6c3ecd7e407a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*HZfKMrR4atiPyLi8,image-processing 2164,1710,Fine-tuning CLIP for automatic extraction of product features from images,"Over the last 10 years, the amount of data in the retail industry has grown significantly. Retailers are now collecting a wide range of data points about the products they sell to improve customer information, enhance data quality and target products to buyers. However, the quality and quantity of this…",https://medium.com/@machinelearningcompany/fine-tuning-clip-for-automatic-extraction-of-product-features-from-images-8d5a5971762a?source=topics_v2---------147-84--------------------f01fd711_14e9_40b0_9364_6c3ecd7e407a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gfl6YYelkURyWSVTsAfNDA.png,image-processing 2165,1711,Building a Vehicle Number ID Reader from Scratch,"Introduction A couple of months ago, the phrase ‘Computer Vision’ was nothing but just another fancy term for me. So when I decided to challenge myself with building a complete Computer Vision project for my University semester project, I had to learn and implement everything in a very short time. …",https://medium.com/@ravindumadawalagama/building-a-vehicle-number-id-reader-from-scratch-5e759a3912da?source=topics_v2---------148-84--------------------f01fd711_14e9_40b0_9364_6c3ecd7e407a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*VNiuksLa98X25aTX,image-processing 2166,1712,HitPaw Online Watermark Remover,"An Overview of a Powerful Tool for Content Creators — In today’s digital age, content creation has become more accessible than ever before. With the rise of social media platforms and other online channels, anyone can share their work with a global audience. However, one of the biggest challenges that content creators face is protecting their work from unauthorized use…",https://medium.com/@fadingeek/hitpaw-online-watermark-remover-91cdc362912b?source=topics_v2---------149-84--------------------f01fd711_14e9_40b0_9364_6c3ecd7e407a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*KeX197sXV7tCS4gO,image-processing 2167,1713,256 Colours are all you need,"Introduction During World War II mechanical computers were used to calculate bomb trajectory and navigation, engineers noticed that these computers (boxes filled with hundreds of gears) performed more accurately on planes than on the ground. The vibration of the plane reduced the error of the gears, which instead of sticking, moved…",https://medium.com/@calebgucciardi/256-colours-are-all-you-need-b2637055c999?source=topics_v2---------150-84--------------------f01fd711_14e9_40b0_9364_6c3ecd7e407a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xsUxKWx3p5qXmku1g0JGNA.png,image-processing 2168,1714,A Simple Way to Normalize DICOM Files using Python,"Normalization is a crucial step in image processing for Machine Learning or Deep Learning tasks, and this is particularly true when working with biomedical images like DICOM (Digital Imaging and Communications in Medicine). In many biomedical image analysis tasks, including image segmentation, classification, and detection, normalizing DICOM files is a…",https://medium.com/dhpb/a-simple-way-to-normalize-dicom-files-using-python-555b0c360daa?source=topics_v2---------151-84--------------------f01fd711_14e9_40b0_9364_6c3ecd7e407a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*bmEYTgyF6cbFfY4k,image-processing 2169,1715,The Fundamental of Digital Image Processing,"The Fundamental of Digital Image Processing Digital Image Processing is the use of mathematical algorithms to perform operations on digital images. The goal is to process images in a way that improves visual quality, enhances features, or extracts valuable information. This field involves theoretical and practical approaches, such as image enhancement, restoration, segmentation, pattern recognition, and…",https://medium.com/@singhhimanshu1808/the-fundamental-of-digital-image-processing-d4d69fcd9d80?source=topics_v2---------152-84--------------------f01fd711_14e9_40b0_9364_6c3ecd7e407a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*J0HAYZvYpWsaWk5H.JPG,image-processing 2170,1716,MegaDetector Object Detection: performance on high noise animal camera trap data,"Mega-Detector is a prestigious Microsoft product for object detection [1], well documented, and used by many animal-analytics (and other applications) companies [2]. Its latest version “MDv5” is even pre-trained on Animal CameraTrap data. There are multiple data challenges regarding Animal Camera Trap data like Illumination, Motion Blur, Small region of…",https://medium.com/@emad-ezzeldin4/megadetector-object-detection-performance-on-high-noise-animal-camera-trap-data-30578d23dad3?source=topics_v2---------153-84--------------------f01fd711_14e9_40b0_9364_6c3ecd7e407a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*cF5mS3cYwX0JXPn3dLLUFQ.png,image-processing 2171,1717,Make Patches from A Remote Sensing Image,"Using Patchify — What are patches? Patches are small divisions of a large image. Why are they made? Patch-based techniques are frequently employed in several areas of image processing such as image segmentation, image restoration, image synthesis and editing etc. Patches are significantly simpler to model than full images since they are able to capture local image geometry and structure. How to generate patches from a remote sensing image?",https://medium.com/@aainalohia/make-patches-from-a-remote-sensing-image-bf7f8c5ec64e?source=topics_v2---------154-84--------------------f35842c1_5335_4707_b38f_29b9c12f6acb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2172,1718,Expanding the Boundaries of Image Analysis,"The Power of Mathematical Morphology Dilation Mathematical morphology is a branch of image processing that is concerned with the analysis and processing of images. One of the fundamental operations in mathematical morphology is dilation, which is used to increase the size of objects in an image. …",https://medium.com/@marcos-gois/expanding-the-boundaries-of-image-analysis-bde6aa810209?source=topics_v2---------155-84--------------------f35842c1_5335_4707_b38f_29b9c12f6acb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*dWymR4MBzfm68Bay6kmxFw.png,image-processing 2173,1719,Generative Artificial Intelligence (AI),"Generative AI creates new data based on a set of inputs and rules. This is an Artificial Intelligence system. These systems are trained to generate images, text, music, and other things that look like human-created content. …",https://medium.com/@dr.saqibqamar/generative-ai-537103e272fb?source=topics_v2---------156-84--------------------f35842c1_5335_4707_b38f_29b9c12f6acb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*J_Ht72Um3Q6zkS5aGsDKlQ.png,image-processing 2174,1720,PhyCV - The First Physics inspired Computer Vision Python library,The researchers at Jalali Lab UCLA have developed a computer vision library which uses algorithms derived directly from equations of physics governing physical phenomena. These algorithms emulate the propagation of light through a physical medium with natural and engineered diffractive properties followed by coherent detection. …,https://medium.com/@dheerajnbhat/phycv-the-first-physics-inspired-computer-vision-python-library-d26bea776a48?source=topics_v2---------157-84--------------------f35842c1_5335_4707_b38f_29b9c12f6acb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QdgRga7-Rg0FrfZBJlZ8Lg.png,image-processing 2175,1721,"Exploring the Power of Mediapipe and OpenCV: A Hands-on Project for Hand, Pose and Face Detection","Introduction: In recent years, computer vision has seen a surge in popularity, with new technologies and advancements being developed at a rapid pace. One of the most exciting fields within computer vision is hand, face and body pose detection. …",https://medium.com/@sinu2441/exploring-the-power-of-mediapipe-and-opencv-a-hands-on-project-for-hand-pose-and-face-detection-4904ba223641?source=topics_v2---------158-84--------------------f35842c1_5335_4707_b38f_29b9c12f6acb-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*13bH-pTHIt-GOl8hQCG2vg.gif,image-processing 2176,1722,Unleash Your Inner Artist: A Step-by-Step Guide to Converting Images to ASCII Art using Java,"Have you ever stumbled upon an ASCII art and thought to yourself, “Dang! That’s some next level creativity!”? Well, let me tell you, my…",https://medium.com/@shubham0473/unleash-your-inner-artist-a-step-by-step-guide-to-converting-images-to-ascii-art-using-java-97860464f19a?source=topics_v2---------159-84--------------------f35842c1_5335_4707_b38f_29b9c12f6acb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QAKMxqqJ1NW6LkiHiJiadA.png,image-processing 2177,1723,"Extract, Count the Occurrence of all the words in an image using Python.","In today’s world, there is a vast amount of information available in the form of text. However, some of this information is still not digitized, and we need to process this data manually, which can be a tedious task. …",https://medium.com/@siddharthlaldeo/extract-count-the-occurrence-of-all-the-words-in-an-image-using-python-193bcf9091ac?source=topics_v2---------160-84--------------------f35842c1_5335_4707_b38f_29b9c12f6acb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*RM87N6R1NjZW_Jnp9YJhLw.jpeg,image-processing 2178,1724,The Easiest Way to Convert HEIC Images to JPG (on Windows 11),"By now, most people should have heard about HEIC (or HEIF) and HEVC. HEVC — High Efficiency Video Codec is a video codec optimized for 4K content and HEIC is the file name extension for images saved with the High Efficiency Image File Format. Apple iPhones have supported these formats…",https://medium.com/@mozzeph/the-easiest-way-to-convert-heic-images-to-jpg-on-windows-11-44fad1179e98?source=topics_v2---------161-84--------------------f35842c1_5335_4707_b38f_29b9c12f6acb-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zjYShjgSdDz1plzaJGZAdg.png,image-processing 2179,1725,In a nutshell: Short History of OpenCV,"Today, I want to talk about the history of OpenCV, one of the coolest computer vision libraries out there. Since you have already decided to read this, I assume that you already heard about OpenCV. OpenCV has come a long way since its humble beginnings, and it’s pretty awesome to…",https://medium.com/@yunus.temurlenk1995/in-a-nutshell-short-history-of-opencv-9bdaf417c7ee?source=topics_v2---------162-84--------------------f35842c1_5335_4707_b38f_29b9c12f6acb-------17,https://miro.medium.com/v2/resize:fill:140:140/0*NtQZNPMoXNopL8qN,image-processing 2180,1725,What is a Pixel? Can you touch it ?,We have all heard about pixels in our daily life but do we know what are they? Let’s start to learn more about it. You are able to read this article because you have eyes. Your eyes have thousands of receptor cells which give you the ability to see. Can…,https://medium.com/@yunus.temurlenk1995/what-is-a-pixel-can-you-touch-it-4f8e4281cdc2?source=topics_v2---------163-84--------------------f35842c1_5335_4707_b38f_29b9c12f6acb-------17,https://miro.medium.com/v2/resize:fill:140:140/0*LgBoPG25WyEvKUn5,image-processing 2181,1726,Image Segmentation with K-Means Clustering in Python,"Extract ‘superpixels’ of an Image using the clustering approach — Before we get into the Image Segmentation using K-Means clustering, let’s quickly brush upon the basics. K-Means Clustering The basic underlying idea behind any clustering algorithm is to partition a set of values into a specific number of cluster. In K-Means clustering, the k clusters are assigned with values that are nearest…",https://medium.com/mlearning-ai/image-segmentation-with-k-means-clustering-in-python-4dd50981016b?source=topics_v2---------164-84--------------------0d7a9619_026f_4712_b14e_0f54c7d5256b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*YUrVotSN4gle5iSJ935OZg.jpeg,image-processing 2182,1662,How to count objects in an image?,"Hello, I want to count the number of flowers in an image classified by its color and shape, the flowers are sometimes overlapped, and there are only 3 (or 4 types but color would be specified): 1- Jasmin: white 2- Rose: red 3- Tulip: Violet I need help to code this in matlab please…",https://medium.com/@technicalsource9/how-to-count-objects-in-an-image-b2b862892b5a?source=topics_v2---------165-84--------------------0d7a9619_026f_4712_b14e_0f54c7d5256b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2183,1662,viscircles — How to flip dashed line?,"Hi, I’m using viscircles to draw a circle with the dashed line property. The problem is one specific dash line interefers with a data point (the circle is stack backwards, but its color and the data color both have red hue). Is there a way to flip the dashed line…",https://medium.com/@technicalsource9/viscircles-how-to-flip-dashed-line-7eba837232f6?source=topics_v2---------166-84--------------------0d7a9619_026f_4712_b14e_0f54c7d5256b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*xJVoueRdQ68JctQu.png,image-processing 2184,1727,My First Streamlit App — How I did it in 15 mins,"Streamlit is an open-source Python library for building interactive, web-based visualizations and machine learning tools. It provides a simple and intuitive way for developers and data scientists to build beautiful and fast applications without the need for complex web development frameworks. …",https://medium.com/@bharath.etl411/my-first-streamlit-app-how-i-did-it-in-15-mins-9685997f3c7f?source=topics_v2---------167-84--------------------0d7a9619_026f_4712_b14e_0f54c7d5256b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2185,1728,At the Intersection of Machine Learning and Image Analysis: Insights from a Data Scientist,"My Data Guest — An Interview with Jérôme Treboux — Co-interviewer: Shantanu Tyagi I am excited to welcome a machine learning specialist and a skilled KNIME user on this new episode of My Data Guest. Jérôme shared insights into his Ph.D. research, his experience with machine learning and image analysis, and his engagement with the KNIME French-speaking community. …",https://medium.com/low-code-for-advanced-data-science/at-the-intersection-of-machine-learning-and-image-analysis-insights-from-a-data-scientist-3339ee3a4e26?source=topics_v2---------168-84--------------------0d7a9619_026f_4712_b14e_0f54c7d5256b-------17,https://miro.medium.com/v2/resize:fill:140:140/g:fp:0.52:0.43/0*5wUkiBtKe9E8u8Q3,image-processing 2186,1662,Error in my edge detection function?,"I’m attempting to create a canny edge detector and I’ve run into a speed bump while checking for the edge pixels. Below I have the code I’m using to check which pixel is on an edge but I keep getting the error “Attempted to access mag(0,18); index must be a…",https://medium.com/@technicalsource9/error-in-my-edge-detection-function-8874b7d5aa5e?source=topics_v2---------169-84--------------------0d7a9619_026f_4712_b14e_0f54c7d5256b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2187,1662,Get coordinates of edges — Image Processing,I am performing Roberts method for edge detection. But my aim is to get the coordinates of the edges after applying Roberts method or any other method. Before Roberts method: After Roberts Method:,https://medium.com/@technicalsource9/get-coordinates-of-edges-image-processing-4332bdc97aa1?source=topics_v2---------170-84--------------------0d7a9619_026f_4712_b14e_0f54c7d5256b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*vdrRCBRESTumGG-s.png,image-processing 2188,1722,From Pixels to Pictures: A Guide to Image Manipulation in Java,"Think about your last scroll through your social media feed. What did you see? Chances are, you were inundated with pictures of your friends, family, and pets. From filtered selfies to perfectly curated landscapes, we’re surrounded by images every day. But have you ever wondered how these images are created…",https://medium.com/@shubham0473/from-pixels-to-pictures-a-guide-to-image-manipulation-in-java-3647cac29ca3?source=topics_v2---------171-84--------------------0d7a9619_026f_4712_b14e_0f54c7d5256b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qScYj1-uW_XsLX76c9nrpQ.png,image-processing 2189,1729,Image handling using the Python Matplotlib library,"Matplotlib is a 2D plotting library for the Python programming language. It provides functions for creating various types of plots, such as line plots, bar plots, scatter plots, histograms, pie charts, and many more. Matplotlib is widely used for data visualization and exploration in the field of data science and…",https://medium.com/@masadashraf/image-handling-using-the-python-matplotlib-library-69ac4aa39b26?source=topics_v2---------172-84--------------------0d7a9619_026f_4712_b14e_0f54c7d5256b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MBHRCdzSLy63h5iLXgszEg.png,image-processing 2190,1662,How to measure quality of an image?,"I need to find quality of an image before and after pre-processing. For this, i need to calculate PSNR (Peak Signal to Noise Ratio), MSE (Mean Square Error),MAXERR (Maximum Squared Error) and L2RAT (Ratio of Squared Norms) X = imread('africasculpt.jpg'); Xapp = X; Xapp(X<=100) = 1; [psnr,mse,maxerr,L2rat] = measerr (X,Xapp) figure; subplot(1,2,1); image(X); subplot(1,2,2); image(Xapp)…",https://medium.com/@technicalsource9/how-to-measure-quality-of-an-image-64e470ad3c3d?source=topics_v2---------173-84--------------------0d7a9619_026f_4712_b14e_0f54c7d5256b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2191,1662,Get an image from a fgure window,I have an image which has a lot of circles. So I have used imfindcirles and viscircles to find and visualize the circles in a figure window. Now I want to get the image as it is and store it in a variable in the program. I tried using getimage…,https://medium.com/@technicalsource9/get-an-image-from-a-fgure-window-55b851d697d4?source=topics_v2---------174-84--------------------ba43c4d2_5a59_4301_a2dc_2abf32602d2f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2192,1347,Unleash Your Imagination with OpenAI’s Image Generator API: A Guide to Creating Stunning Images,This is part 2 of my Chat GPT3 python series so I highly suggest going through part 1 before reading this article. Note that the coding itself is not advanced but the concepts behind the code are. …,https://medium.com/@ben.putney/unleash-your-imagination-with-openais-image-generator-api-a-guide-to-creating-stunning-images-120e2db15110?source=topics_v2---------175-84--------------------ba43c4d2_5a59_4301_a2dc_2abf32602d2f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*fxfn4eKznd1iSMrP,image-processing 2193,1662,Imshow and Imshowpair differences?,"As a way to keep busy I have been teaching myself how to perform edge detection and code them up myself. When attemtpting to hardcode my own Canny detector, I have run into a problem where imshowpair and imshow display different intensity values across the same pixel of the same…",https://medium.com/@technicalsource9/imshow-and-imshowpair-differences-7219c63f189a?source=topics_v2---------176-84--------------------ba43c4d2_5a59_4301_a2dc_2abf32602d2f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2194,1730,How to use Face Authentication for Security Issues (Part 2),In the previous article we talked about how to build an application to identify the identity of the person who stands in front of camera and also we talked about how to prevent the system from being tricked by images and videos which are fake faces Today we gonna take…,https://medium.com/@amirhosein.najafy/poer-how-to-use-face-authentication-for-security-issues-part-2-feab4bee9d42?source=topics_v2---------177-84--------------------ba43c4d2_5a59_4301_a2dc_2abf32602d2f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Ld_AzbWnljPsjfs1VJcjLQ.png,image-processing 2195,1662,What is the Maximum PSNR and SSIM values for HR images ?,"Hello, I would like to be clarified on this. Are there targeted or maximum ranges in values of PSNR and SSIM for High resolution (HR) images ? If yes, what are these values? NOTE:- Matlabsolutions.com provide latest MatLab Homework Help,MatLab Assignment Help , Finance Assignment Help for students, engineers and…",https://medium.com/@technicalsource9/what-is-the-maximum-psnr-and-ssim-values-for-hr-images-9e10198fb93c?source=topics_v2---------178-84--------------------ba43c4d2_5a59_4301_a2dc_2abf32602d2f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2196,1662,cant find the white pixels,"Hi all, i try to detect the edges of my image. I use canny edge detector. Then i tried [c,r]=find(Image==1) to detect the white pixels. I thought in a b/w image the edges would be the white pixels, but this not works quite good. …",https://medium.com/@technicalsource9/cant-find-the-white-pixels-6992cd8c94d7?source=topics_v2---------179-84--------------------ba43c4d2_5a59_4301_a2dc_2abf32602d2f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*3RNfkVgmYWS3YNLP.png,image-processing 2197,1731,Digital Image Processing: Usage of Contour,"Contour is a curve joining all continuous points along the boundary of a connected component and the pixels in the same connected components have the same intensity. This article will use python as programming language and will mainly introduce the details of the function, cv2.findContours() , about how to use…",https://medium.com/@sadlamb910803/digital-image-processing-contour-usage-77ab76918358?source=topics_v2---------180-84--------------------ba43c4d2_5a59_4301_a2dc_2abf32602d2f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hDFJASUQE695yhaQBLy29w.jpeg,image-processing 2198,1662,How to select one area from several in a logical array (mask)?,"I have a 3D logical array where is several spatial areas marked as “true” or “1”. 1st dimension is latitude, 2nd — longitude, 3d — depth. I need to choose only one area which contains a preassigned point in space. This point is always inside one of the areas. …",https://medium.com/@technicalsource9/how-to-select-one-area-from-several-in-a-logical-array-mask-8d6128192a1f?source=topics_v2---------181-84--------------------ba43c4d2_5a59_4301_a2dc_2abf32602d2f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*M-krbtyJqQ1ZJ6Eq.png,image-processing 2199,1662,Help using rectangle() function to generate a matrix for image processing,"Hi y’all i have a question about the function rectangle(), im using it to make 6x4 disk grid. I was trying to use viscircles() as it would be much easier, but i cant fill them in appropiately. Im using it to generate circles, but for the life of me I…",https://medium.com/@technicalsource9/help-using-rectangle-function-to-generate-a-matrix-for-image-processing-7641df698af9?source=topics_v2---------182-84--------------------ba43c4d2_5a59_4301_a2dc_2abf32602d2f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Qlx8XQrbbrwfvtbC.png,image-processing 2200,1662,How Sobel Operator works in edge function?,"What does the edge function do when using the Sobel operator? How to automatically choosing a threshold? The edge is different from my own Sobel function. NOTE:- Matlabsolutions.com provide latest MatLab Homework Help,MatLab Assignment Help , Finance Assignment Help for students, engineers and researchers in Multiple Branches like ECE, EEE…",https://medium.com/@technicalsource9/how-sobel-operator-works-in-edge-function-222fc41a743f?source=topics_v2---------183-84--------------------ba43c4d2_5a59_4301_a2dc_2abf32602d2f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2201,1662,Why do I receive errors using IFANBEAM for matrices with NaN,Why do I receive errors using IFANBEAM for matrices with NaN values in Image Processing Toolbox 7.2 (R2011a)? I am trying to use the function IFANBEAM on a matrix with NaN values and receive a warning and an error depending on how many NaNs the matrix contains. An example of…,https://medium.com/@technicalsource9/why-do-i-receive-errors-using-ifanbeam-for-matrices-with-nan-4dd69e389157?source=topics_v2---------184-84--------------------6e136e52_517f_47b6_83c1_bbe2fece7835-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2202,1732,"Serving next generation images using Google Cloud CDN, Cloud Run and image proxy","In this blog post, we will setup required infrastructure and services on Google Cloud platform to serve next generation images using Cloud CDN and imgproxy. imgproxy enables two essential image processing use cases that aim to improve the overall performance of your website or application. 1. Serving images in next-gen…",https://medium.com/@sirajmohammad/serving-next-generation-images-using-google-cloud-cdn-cloud-run-and-image-proxy-4d2e65d87fbc?source=topics_v2---------185-84--------------------6e136e52_517f_47b6_83c1_bbe2fece7835-------17,https://miro.medium.com/v2/resize:fill:140:140/1*UMtmjAyRHOPtdpPclqBHwQ.png,image-processing 2203,1733,A Reduced Order Approach for the problem of Object Recognition,"In the last decades, Artificial Intelligence (AI) has attracted growing interest due to its capability of letting machines reproduce the abilities of the human mind. Thanks to this powerful ability it has found application in many contexts, such as healthcare, robotics, autonomous vehicles, facial recognition, voice assistants, and gaming. A…",https://medium.com/sissa-mathlab/a-reduced-order-approach-for-the-problem-of-object-recognition-760af92b993f?source=topics_v2---------186-84--------------------6e136e52_517f_47b6_83c1_bbe2fece7835-------17,https://miro.medium.com/v2/resize:fill:140:140/0*eUFEbnz72Ky1VwYG,image-processing 2204,1734,K-Means Clustering for Image Segmentation: An Introduction,"An unsupervised learning algorithm — Introduction Image segmentation is a process of dividing an image into multiple segments or regions, each of which corresponds to a different object or part of the image. It is an important step in image analysis, which is used in various fields such as computer vision, medical imaging, remote sensing, and…",https://medium.com/@ujangriswanto08/k-means-clustering-for-image-segmentation-an-introduction-7755c27ffc3e?source=topics_v2---------187-84--------------------6e136e52_517f_47b6_83c1_bbe2fece7835-------17,https://miro.medium.com/v2/resize:fill:140:140/0*CqtcCvqhHRsfLZ3A,image-processing 2205,1735,Determine if an image is in focus using OpenCV,"Determining if an image is tricky and it isn't as straight forward as using the variance from the Laplacian function... Consider the following images, which images do you consider blurry? Disclaimer — images 2 to 4 was generated with thispersondoesnotexist.com These images are an interesting example as each presents a…",https://medium.com/@zahid-parvez/finding-the-focus-determining-if-an-image-is-blurry-8f6c84fae47f?source=topics_v2---------188-84--------------------6e136e52_517f_47b6_83c1_bbe2fece7835-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gDRCsx563p3i7KiVWnIOTg.png,image-processing 2206,1736,Creating Image Effects using CSS Filters,"These days I am developing a mobile APP for a professional photographer, who is to use it to sell his photos. The APP looks like a kind of gallery, where the user browses through the photos; applies filters to them; puts them in the shopping cart and completes the purchase…",https://medium.com/@simonescigliuzzi/creating-image-effects-using-css-filters-1e14697bb18a?source=topics_v2---------189-84--------------------6e136e52_517f_47b6_83c1_bbe2fece7835-------17,https://miro.medium.com/v2/resize:fill:140:140/1*M0BncfU1BlAvXX_FOoXn3g.jpeg,image-processing 2207,1737,Towards urban flood susceptibility mapping using machine and deep learning models (part 4): Convolutional neural networks,"In this article, we will prepare the data to map urban flood susceptibility mapping using convolutional neural networks (CNN). This article shows how to develop the models and use the trained model to map urban flood susceptibility. This series of articles summarize and explain (with python code) the paper “…",https://medium.com/hydroinformatics/towards-urban-flood-susceptibility-mapping-using-machine-and-deep-learning-models-part-4-a1ce44074872?source=topics_v2---------190-84--------------------6e136e52_517f_47b6_83c1_bbe2fece7835-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kkwSRrs7FF3pSyBAP5W31Q.png,image-processing 2208,1738,Speeding up image processing using multiprocessing in Python,"When building a machine learning model, the key factor that decides how well the model will perform is the data. So it is a necessary step to always preprocess the data before using it to train the model. In the case of images, their size, orientation, color, etc., have to…",https://medium.com/featurepreneur/speeding-up-image-processing-using-multiprocessing-in-python-ceeced8026bf?source=topics_v2---------191-84--------------------6e136e52_517f_47b6_83c1_bbe2fece7835-------17,https://miro.medium.com/v2/resize:fill:140:140/1*U4eeqso2y0hUEMMEOqhsAg.jpeg,image-processing 2209,1739,"CellStrat #AIBytes — Launching Text To Image Generative AI, RV-AI Hackathon on 10–11 Feb ‘23","#CellStratAILab #disrupt4.0 #WeCreateAISuperstars #hackathon #StableDiffusion #GenerativeAI #Text2Image #college Welcome to CellStrat #AIBytes newsletter 4th Feb ’23 Edition ! RV-AI HACKATHON TRAINING WORKSHOP — BUILD A TEXT-TO-IMAGE GENERATOR USING STABLE DIFFUSION (SUNDAY 5TH FEB ’23) :- RV College of Engineering (Dept of CSE), Bengaluru, in collaboration with CellStrat AI Lab and Bengaluru Bioinnovation Centre (Govt of Karnataka), presents an innovative Competitive Hackathon AND Startup Pitch event on 10–11…",https://medium.com/@cellstrat/cellstrat-aibytes-launching-text-to-image-generative-ai-rv-ai-hackathon-on-10-11-feb-23-d4f04e8c16b5?source=topics_v2---------192-84--------------------6e136e52_517f_47b6_83c1_bbe2fece7835-------17,https://miro.medium.com/v2/resize:fill:140:140/1*naem_GKtMDGOzo2sP4oRfQ.png,image-processing 2210,1740,Scrubbing EXIF metadata from many images fast,"Exif data is metadata that is embedded in an image file and contains information about the image such as the camera used, date taken, and location. In some cases, this information can be sensitive and it’s desirable to remove it before sharing the image with others. I wrote a script…",https://medium.com/@xcollantes/scrubbing-exif-metadata-from-many-images-fast-c11f5106f659?source=topics_v2---------193-84--------------------6e136e52_517f_47b6_83c1_bbe2fece7835-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wylR2si6Ki8e5neHFHchLQ.jpeg,image-processing 2211,1741,Object Detection,Image processing is a method used to read and detect the desired information in an image. Image processing has applications in many fields. Today we will talk to you about object detection. Object Detection is one of the most popular deep learning areas in recent years.To …,https://medium.com/@aybukekarakoc34/object-detection-d07b45b718bf?source=topics_v2---------194-84--------------------1e413cc0_70e9_4ff1_92ee_9d9463b5605c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Ayrtb1hgdZ1w2psCBHhSTA.png,image-processing 2212,1662,how to know if image is rgb?,"i want to set an if condition to know if the image i am reading is rgb image or not NOTE:- Matlabsolutions.com provide latest MatLab Homework Help,MatLab Assignment Help , Finance Assignment Help for students, engineers and researchers in Multiple Branches like ECE, EEE, CSE, Mechanical, Civil with 100% output.Matlab…",https://medium.com/@technicalsource9/how-to-know-if-image-is-rgb-5c4622224015?source=topics_v2---------195-84--------------------1e413cc0_70e9_4ff1_92ee_9d9463b5605c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2213,1662,Why do I get the error ‘’ too many input argument’’?,"I’m try to define the stepchange of bc in pdepe which pl varies with time. The following is my code. Can anyone help? plzzzz… T = 16; % maximum time [s] L…",https://medium.com/@technicalsource9/why-do-i-get-the-error-too-many-input-argument-f7fb589546d2?source=topics_v2---------196-84--------------------1e413cc0_70e9_4ff1_92ee_9d9463b5605c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2214,1742,Image Processing in Computer,"HOW DOES THE MACHINE READ IMAGES AND USE THEM IN COMPUTER VISION? Before we look deeply into how machines read images and use them in computer vision, it’s important to understand how we can read and store images in machines. This is especially key if we are working on computer…",https://medium.com/@gamelover9899/image-processing-in-computer-cc3c5fbf10a0?source=topics_v2---------197-84--------------------1e413cc0_70e9_4ff1_92ee_9d9463b5605c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9A2C0A0OksXocy4NAY1HJQ.png,image-processing 2215,1662,How can i observe a 3 dimensional matrix(hdr) using pcolor command?,"I have with me, file={'img1.jpg','img2.jpg','img3.jpg','img4.jpg','img5.jpg'}; hdr = makehdr(file); hdr is 1728x2592x3 single matrix I want to display this image file in pseudocolor. my aim is to get the light intensity values. What shall i do? NOTE:- Matlabsolutions.com provide latest MatLab Homework Help,MatLab Assignment Help , Finance Assignment Help for students…",https://medium.com/@technicalsource9/how-can-i-observe-a-3-dimensional-matrix-hdr-using-pcolor-command-ea87abcb2825?source=topics_v2---------198-84--------------------1e413cc0_70e9_4ff1_92ee_9d9463b5605c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2216,1743,Convolutional Neural Networks: Mathematical Operations in Image Processing (Part 1),"Unlocking the Secrets of Image Processing: Understanding How Computers See and Analyze Images — Sharing my thoughts in parts is the best way to convey my message. Convolutional Neural Networks (CNNs) can be used for several applications but they excel at identifying patterns in high-dimensional data, like images. To fully grasp Convolutional Neural Networks (CNNs), we must begin somewhere and since CNNs are widely…",https://medium.com/@jonathanthinking/convolutional-neural-networks-mathematical-operations-in-image-processing-part-1-31875afe74f2?source=topics_v2---------199-84--------------------1e413cc0_70e9_4ff1_92ee_9d9463b5605c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*R0P8qs154KxU10I1nVAMvA.jpeg,image-processing 2217,1640,How to Convert Images to Black and White Grayscale using Python,"Black and white images offer a desirable, moody aesthetic with greater detail in shadowy areas, and they also boast a smaller file size than their color-filled counterparts. Conveniently, calling the below API in your Python workflow will allow you to quickly convert color images to black and white grayscale through…",https://medium.com/@cloudmersive/how-to-convert-images-to-black-and-white-grayscale-using-python-fba74d611c91?source=topics_v2---------200-84--------------------1e413cc0_70e9_4ff1_92ee_9d9463b5605c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*o85M_vzM5ECe605g,image-processing 2218,1744,Let’s enhance —using AI to magnify and restore images,"AI tools for image enhancement have become increasingly popular, as they can upscale images without significant quality loss, reduce image noise, restore old photos, and even upscale videos. But can they do the CSI-type tricks? Let’s dive into them and let’s enhance! The motif of magically zooming in on cameras…",https://medium.com/mlearning-ai/lets-enhance-using-ai-to-magnify-and-restore-images-663dbee5d97e?source=topics_v2---------201-84--------------------1e413cc0_70e9_4ff1_92ee_9d9463b5605c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*soW9r5Y_4BA4F4x25MeRQw.jpeg,image-processing 2219,1640,How to Posterize an Image using Python,"Year over year, handheld and smartphone cameras seem to receive constant improvements enabling us to take increasingly detailed images. However, detail isn’t always necessary for a desirable photo aesthetic. Through image posterization, you can reduce the number of distinct colors in your image to create a smooth and interesting effect…",https://medium.com/@cloudmersive/how-to-posterize-an-image-using-python-61e0c0e21702?source=topics_v2---------202-84--------------------1e413cc0_70e9_4ff1_92ee_9d9463b5605c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2220,1745,Effortlessly Remove Unwanted Video Backgrounds with SVD,"How to utilize Python to effortlessly eliminate the background in a video? — Interesting how to build this ML model in a well prepare programming environment? Click here to build this model step-by-step with CognitiveClass.ai Guided Project Video Processing - Subtracting Background with SVD Want to know how to use Python to subtract background on a video easily? After reading this guided project, you will…cognitiveclass.ai",https://medium.com/the-power-of-ai/effortlessly-remove-unwanted-video-backgrounds-with-svd-4342dd0385d7?source=topics_v2---------203-84--------------------1e413cc0_70e9_4ff1_92ee_9d9463b5605c-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*Be_Ke4oikZ_86gzpnmfrMg.gif,image-processing 2221,1640,How to Swirl Distort an Image using Python,Swirl distortion is a common way to imbue images with a unique look. The below API solution allows you to filter images with a swirl distortion effect in only a few lines of code & with very basic request parameters (requiring only your image file and the desired number of…,https://medium.com/@cloudmersive/how-to-swirl-distort-an-image-using-python-4c73091d4372?source=topics_v2---------204-84--------------------1753e805_7b19_45f1_a63f_05c421074a9b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*vDC8wAs9UazvrHyT,image-processing 2222,1746,Python: How to Edit Images,"Python can be used to apply edits to images, including color correction. There are several libraries available in Python for image processing, including OpenCV, Pillow, and scikit-image. One way to perform color correction on an image using Python is by using the Pillow library. For example, you can use the…",https://medium.com/python-in-plain-english/python-edit-images-e7d101364505?source=topics_v2---------205-84--------------------1753e805_7b19_45f1_a63f_05c421074a9b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-RI9E109hGV8DaYuqngkxw.jpeg,image-processing 2223,1747,The Difference Between The Augmentor Library and TensorFlow’s flow_from_directory,"Data augmentation is an essential technique in deep learning for image classification and object detection tasks. It involves transforming the original images in the dataset to generate new, augmented images that are used to train the model. This helps to reduce overfitting and improve the model’s ability to generalize to…",https://medium.com/@akalbir/the-difference-between-the-augmentor-library-and-tensorflows-flow-from-directory-5ab93fa2f70a?source=topics_v2---------206-84--------------------1753e805_7b19_45f1_a63f_05c421074a9b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WqOli-gTM_tMLfHD.png,image-processing 2224,1640,How to Implement a Motion Blur Filter using Python,"Natural motion blurs occur when an image subject is moving faster than the exposure time of a camera. Motion blur filters, on the other hand, seek to emulate this effect on stationary image subjects with the help of advanced modeling techniques. Thankfully, the below API solution makes it possible to…",https://medium.com/@cloudmersive/how-to-implement-a-motion-blur-filter-using-python-5f0ddabc0bac?source=topics_v2---------207-84--------------------1753e805_7b19_45f1_a63f_05c421074a9b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*_H0tLt0CrKbLhoCh,image-processing 2225,1748,Coding Canny Edge Detection Algorithm from scratch in Python.,"In this article, I’m gonna be explaining everything about Canny Edge Detection, as well as coding the algorithm without using some prewritten libraries, so that you will be exposed to what is truly happening. The Canny is a multi-stage edge detection algorithm that can detect a wide range of edges…",https://medium.com/@rohit-krishna/coding-canny-edge-detection-algorithm-from-scratch-in-python-232e1fdceac7?source=topics_v2---------208-84--------------------1753e805_7b19_45f1_a63f_05c421074a9b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fBIv-OhDmeWM4oLEYtKkJw.png,image-processing 2226,1640,How to Emboss Images using Python,"When we talk about digitally embossing an image, we’re referring to a visual effect which emulates the centuries-old physical embossment process (creating raised surfaces on physical objects for an enhanced look & feel). Even without a tactile element, this visual effect still holds weight in a digital environment, bringing a…",https://medium.com/@cloudmersive/how-to-emboss-images-using-python-7e03681754b?source=topics_v2---------209-84--------------------1753e805_7b19_45f1_a63f_05c421074a9b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*GsvAT7xmjR6pT01K,image-processing 2227,1640,How to Apply a Gaussian Blur using Python,"Whether you’re reducing the noise in an image simply targeting an interesting visual effect, the Gaussian Blur technique is a great one to have in your arsenal. With the free-to-use API below, you can easily implement this service into your applications with zero hassle using ready-to-run Python code examples to…",https://medium.com/@cloudmersive/how-to-apply-a-gaussian-blur-in-python-e8b071d7100a?source=topics_v2---------210-84--------------------1753e805_7b19_45f1_a63f_05c421074a9b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*yCihR0jAfY_Q5U5K,image-processing 2228,1662,Remove black pixels from RGB image,"I know that variations of this question get asked a lot on here, but I haven’t found a solution that works for my problem very well.",https://medium.com/@technicalsource9/remove-black-pixels-from-rgb-image-d25ad13bdf1e?source=topics_v2---------211-84--------------------1753e805_7b19_45f1_a63f_05c421074a9b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*2dZv2257Tot7igGQ.png,image-processing 2229,1749,"Organize your Midjourney pictures with a free, own server !","About a week ago i started use Midjourney, which is an amazing text to Image generating AI. It was only a question of time, until my private conversation with the image generating bot got hundreds of pictures, and it was getting hard to find specific ones, when I wanted to…",https://medium.com/@vilius.kukanauskas/organize-your-midjourney-pictures-with-a-free-own-server-d9c0b18a6d80?source=topics_v2---------212-84--------------------1753e805_7b19_45f1_a63f_05c421074a9b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*_y2XyH5h3EnT-y-o.png,image-processing 2230,1750,The Thrilling Mathematics of Image Blurring,"In this article, we’ll discuss the maths behind common blurring techniques like median blurring, averaging blurring, and the Gaussian blurring. Then, we’ll apply these concepts to write Python code for each blurring technique and discuss their advantages and disadvantages. Blurring is a common technique used in image processing to reduce…",https://medium.com/@julianabakhtsizina/the-thrilling-mathematics-of-image-blurring-c0ad582c8140?source=topics_v2---------213-84--------------------1753e805_7b19_45f1_a63f_05c421074a9b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3ZIPh6jDgMQOp_ni3_IC2w.png,image-processing 2231,1751,Deep learning Cat and Dog Classification Using TensorFlow,"TensorFlow is an open-source software library for deep learning and machine learning developed by Google Brain Team. It is used for a wide range of applications, including image and speech recognition, natural language processing, and computer vision. It is also used to create and train neural networks, which are the…",https://medium.com/@korlakuntasaikamal10/deep-learning-cat-and-dog-classification-using-tensorflow-8011596d8f96?source=topics_v2---------214-84--------------------fbfbb01e_2e11_4931_8ae9_9addccf18119-------17,https://miro.medium.com/v2/resize:fill:140:140/1*x5sDJquX18RPuu2lMqwRww.jpeg,image-processing 2232,1752,The Pros and Cons of OpenAI’s DALL-E 2,"OpenAI’s DALL-E 2 is a state-of-the-art artificial intelligence system that generates images from textual descriptions. This technology has received a lot of attention for its incredible capabilities and its potential to change the way we think about AI-generated images. In this article, we’ll examine the good and bad sides of…",https://medium.com/@rakib.bk2010/the-pros-and-cons-of-openais-dall-e-2-dffa2735538e?source=topics_v2---------215-84--------------------fbfbb01e_2e11_4931_8ae9_9addccf18119-------17,https://miro.medium.com/v2/resize:fill:140:140/0*gJyEuhewcxgAvOUD,image-processing 2233,1735,Automate Textual Inversion Training with Your Own Image Dataset (Faces),"Textual inversion allows you to train stable diffusion models on custom tokens. This allows you to create consistent images of someone (i.e. yourself) or something using stable diffusion! There are many articles online on how to do this, I used the process explained in this video; you can even do…",https://medium.com/@zahid-parvez/automate-textual-inversion-training-with-your-own-image-dataset-faces-886064e25218?source=topics_v2---------216-84--------------------fbfbb01e_2e11_4931_8ae9_9addccf18119-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hB8pZa7kjHjWVN33AWB4Ag.png,image-processing 2234,1753,Composites,"The “Full Moon Series”… — Like the artist’s canvas captures the painter’s vision, the film or sensor in your camera captures the photographer’s vision. Photography is an art as painting or drawing is art.",https://medium.com/full-frame/composites-c6746d18589?source=topics_v2---------217-84--------------------fbfbb01e_2e11_4931_8ae9_9addccf18119-------17,https://miro.medium.com/v2/resize:fill:140:140/1*18fSN9XxJzfgnDGdx8yNhg.jpeg,image-processing 2235,1754,Guide to Image Processing with C [1],"-without the use of any external libraries 🔵Introduction 🔹Soo, Yup! Recently I was assigned a project on the topic “Image processing with C”, and I was clueless. I was like, “What! C? How can someone process an image with C?”. We’ve always seen C as the most basic language. So I…",https://medium.com/@mithindev1/guide-to-image-processing-with-c-1-fbc23af72895?source=topics_v2---------218-84--------------------fbfbb01e_2e11_4931_8ae9_9addccf18119-------17,https://miro.medium.com/v2/resize:fill:140:140/0*4phC4NBQcaRu34c4,image-processing 2236,1751,Geometric shapes on images Using OpenCV,"The OpenCV library provides several methods for drawing geometric shapes on images, including rectangles, lines, and circles. In this blog post, we will explore how to use the cv2.rectangle(), cv2.line(), cv2.arrowedLine(), and cv2.circle() methods to draw these shapes on images. First, let’s talk about rectangles. A rectangle is a four-sided…",https://medium.com/@korlakuntasaikamal10/geometric-shapes-on-images-using-opencv-de367122af9c?source=topics_v2---------219-84--------------------fbfbb01e_2e11_4931_8ae9_9addccf18119-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SlG5EoApXen4SlXgx6yntQ.png,image-processing 2237,1755,"How I built my first real world AI coded program, almost accidentally","I’ve been working on a personal project, digitising thousands of slides and film strips my family has taken over decades. Most recently I’ve been using a digital camera, a 3D printed jig and a Panasonic Lumix digital camera to take photos of slides on a lightbox. It gives a good…",https://medium.com/@davidjwfindlay/how-i-built-my-first-real-world-ai-coded-program-almost-accidentally-2ab4667ae45a?source=topics_v2---------220-84--------------------fbfbb01e_2e11_4931_8ae9_9addccf18119-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Qbi0A-B-M9mKW4lPRuU4XQ.jpeg,image-processing 2238,1756,How to Listen Mouse Events in OpenCV,"Welcome! In this post I am going to illustrate how to listen mouse events in OpenCV, in last post I have described how to convert color image to grayscale image in OpenCV using Python, do read it if your are new to openCV and also if you like reading the…",https://medium.com/@dev-akash/how-to-listen-mouse-events-in-opencv-b63322508d78?source=topics_v2---------221-84--------------------fbfbb01e_2e11_4931_8ae9_9addccf18119-------17,https://miro.medium.com/v2/resize:fill:140:140/1*HKIJfPSjmxl54OjH7VYDgA.jpeg,image-processing 2239,1757,How to Create Artistic Sketches and Paintings from Photos Using OpenCV in Python,"Photographs are a great way to showcase your creativity or document the events of your life. However, if you want to create something more artistic, you can do so by applying different artistic filters to your photos. One approach is to use openCV functions and algorithms to convert an image…",https://medium.com/@tahirbalarabe2/how-to-create-artistic-sketches-and-paintings-from-photos-using-opencv-in-python-9be19c3daad8?source=topics_v2---------222-84--------------------fbfbb01e_2e11_4931_8ae9_9addccf18119-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1Xek8KL9hkhzc5juqxk7jA.jpeg,image-processing 2240,1640,How to Combine PNG Files in Python,"If you’re developing an application which handles a large volume of image files, adding a service to combine image files into an array will dramatically increase the efficiency of certain tasks. Thankfully, you can easily merge multiple PNG files together in just a few lines of code by calling the…",https://medium.com/@cloudmersive/how-to-combine-png-files-in-python-32f142219e07?source=topics_v2---------223-84--------------------fbfbb01e_2e11_4931_8ae9_9addccf18119-------17,https://miro.medium.com/v2/resize:fill:140:140/0*PEVv0ULwmWe-vMSr,image-processing 2241,1758,AI-Powered Scanning for Receipts and Documents,"Receipt parsing is the process of using technology to extract important information from a receipt, including the date, total amount, and items purchased. It enables efficient and precise expense tracking and management, making it a valuable resource for businesses and individuals who need to maintain accurate records of their expenses…",https://medium.com/@anil98meena/ai-powered-scanning-for-receipts-and-documents-9df69e336024?source=topics_v2---------224-84--------------------ea749b68_334e_4520_a35b_5654223d14ab-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DWoxLHjgKRcB5TgfaP5CzA.jpeg,image-processing 2242,1759,“Unlocking the Secrets of Cancer: My 17-day Journey with Artificial Intelligence”,"I’m an Artificial Intelligence engineer, based in Jordan. Cancer is a significant global problem and as an AI Engineer, I am committed to trying to make any small improvements or contribute any value that could benefit people. So I will show you below my process in finding a #solution for…",https://medium.com/@khaledtayem7/it-took-me-17-days-of-hard-woring-to-find-the-solution-for-one-of-the-biggest-dilemmas-in-the-463c16020420?source=topics_v2---------225-84--------------------ea749b68_334e_4520_a35b_5654223d14ab-------17,https://miro.medium.com/v2/resize:fill:140:140/1*USUbannGaB17voLLvCq-Jg.jpeg,image-processing 2243,1760,AI — Eatables Age,"For so many days one idea has been on my mind. I felt that this may be useful for startups. So, I want to write that here. As the name of the story says, I want to find out the age of any eatable by scanning through a mobile app. …",https://medium.com/@maheswararedypr/ai-eatables-age-8bb5201cec70?source=topics_v2---------226-84--------------------ea749b68_334e_4520_a35b_5654223d14ab-------17,https://miro.medium.com/v2/resize:fill:140:140/1*s33e5nJDx7zUdR5YEu9_7Q.png,image-processing 2244,1761,Serverless Image Analysis Stack in AWS,"Hello learners, Today we’ll be creating a Serverless Image Analysis Stack on AWS as shown in the above picture. The flow of the image analysis stack will be as follows: User/Service uploads an image to S3 Using S3 event notifications, the metadata of that object goes to an SQS queue…",https://medium.com/@satyamsareen007/serverless-image-analysis-stack-in-aws-c9f7573ee8c5?source=topics_v2---------227-84--------------------ea749b68_334e_4520_a35b_5654223d14ab-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DrDUdk6Jww1R7fRXTollOg.jpeg,image-processing 2245,1640,How to Get Image Information in Python,"Image files typically store a huge amount of useful information about the content they’re displaying, and that information is often critically important to organizing, sharing, and editing that content at scale. …",https://medium.com/@cloudmersive/how-to-get-image-information-in-python-bd0713b666d3?source=topics_v2---------228-84--------------------ea749b68_334e_4520_a35b_5654223d14ab-------17,https://miro.medium.com/v2/resize:fill:140:140/0*nOqN34tlTK4X3Ov4,image-processing 2246,1762,OpenCV and images || {(playing with pixels)| (brightness)},"A LinkedIN survey mentioned that the decline in prediction/classification accuracy greatly suffers by the quality of images. Images are the fodder for a successful CNN model and great images with better clarity is essential . Challenges faced in dealing with images . #1 Low light #2 Indistinguishable features #3 high…",https://medium.com/@kumarsakshat22/opencv-and-images-playing-with-pixels-brightness-9872a7e49aaf?source=topics_v2---------229-84--------------------ea749b68_334e_4520_a35b_5654223d14ab-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xgLrfBHRzKLFDdhUVXoZkQ.png,image-processing 2247,1640,"How to Change Image DPI, Resize Image using Python","The resolution quality of an image boils down to its DPI (dots per inch; expressed in terms of pixels per inch), and this value can be manipulated easily. Using the API solution below, you can quickly resize an image in your Python workflow by programmatically changing its DPI to a…",https://medium.com/@cloudmersive/how-to-change-image-dpi-resize-image-using-python-ad46d7d87d13?source=topics_v2---------230-84--------------------ea749b68_334e_4520_a35b_5654223d14ab-------17,https://miro.medium.com/v2/resize:fill:140:140/0*zmdJ4ik1Y7t-6Kq8,image-processing 2248,1735,Detect faces using OpenCV (python),"Prior to the rise of CNNs as the default way of recognizing faces (or any other objects), Haar cascade models were used to perform object detection. …",https://medium.com/@zahid-parvez/detect-faces-using-opencv-python-90d34a3a65ed?source=topics_v2---------231-84--------------------ea749b68_334e_4520_a35b_5654223d14ab-------17,https://miro.medium.com/v2/resize:fill:140:140/1*XgR9zihcwe2iDN6G7UvZ0Q.png,image-processing 2249,1763,How to remove duplicate images from a folder using python,"A scenario recently I experienced and felt too burden to execute in manual phase. In my local pc, containing a folder of around thousand images which were taken in a recent family occasion event. In those I have observed images are duplicated due continues shots clicked. …",https://medium.com/@md8.umar/how-to-remove-duplicate-images-from-a-folder-using-python-1ce76624ab78?source=topics_v2---------232-84--------------------ea749b68_334e_4520_a35b_5654223d14ab-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Js7Vum23VDHIxXSaxDrD0w.jpeg,image-processing 2250,1764,What the heck is Fourier transform ? Why do we need it ?,"Well, well, well. Do you think it is time to learn some advanced topics about image processing and impress your friends when having some booze at a pub ? Yes, it is. Fouirer transform is at your service ! Fourier transform is a signal processing method that we take advantage…",https://medium.com/@irfanbykara/what-the-heck-is-fourier-transform-why-do-we-need-it-281d504729a1?source=topics_v2---------233-84--------------------ea749b68_334e_4520_a35b_5654223d14ab-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MpPPrFjuwuB7Z1qR95qToA.png,image-processing 2251,1765,Custom Object Detection with YOLO,"We know that we can detect some objects specifically. So how can we train the system to detect custom objects? Let’s do that step by step. 1 — Create a Dataset Don’t forget, the machine learns with datasets. A dataset must contain images and labels. For example, let my goal is to create a system…",https://medium.com/mlearning-ai/custom-object-detection-with-yolo-a53eb99b2c8a?source=topics_v2---------234-84--------------------7ea6c145_7684_4278_9a28_7ef6af2dde01-------17,https://miro.medium.com/v2/resize:fill:140:140/1*nmnsDFsOOJBMAF9QgSQ-EA.png,image-processing 2252,1766,Introducing the New React Image Editor,"In this blog, we’ll introduce the main features of the Syncfusion React Image Editor. We’ll also show you the new features for it from the Essential Studio 2022 Vol. 4 release. The React Image Editor is a user interface that allows users to edit images. It provides a range of…",https://medium.com/syncfusion/introducing-the-new-react-image-editor-e4e0d5ec50de?source=topics_v2---------235-84--------------------7ea6c145_7684_4278_9a28_7ef6af2dde01-------17,https://miro.medium.com/v2/resize:fill:140:140/0*1tSU73c497ED-D3D.png,image-processing 2253,1767,A brief discussion on Morphological operators using OpenCV,"Morphology is a broad range of image processing techniques that manipulate images according to their shapes. A structuring element is added by morphological processes to an input image to produce an output image of the same size. When performing a morphological operation, each output pixel’s value is determined by comparing…",https://medium.com/@mamuncseru/a-brief-discussion-on-morphological-operators-using-opencv-ccf6be076896?source=topics_v2---------236-84--------------------7ea6c145_7684_4278_9a28_7ef6af2dde01-------17,https://miro.medium.com/v2/resize:fill:140:140/1*h38OXu9C5-E7qhul3SgAkQ.png,image-processing 2254,1768,Introduction to NumPy for Image Processing,"Image processing is the manipulation of digital images using mathematical algorithms. Numpy is a powerful Python numerical computing library and is often used in conjunction with other libraries, such as OpenCV and PIL, for image processing tasks. In this blog post, we will explore how to use NumPy for some…",https://medium.com/@manuelrinaldi86/introduction-to-numpy-for-image-processing-aa1aa3d8030f?source=topics_v2---------237-84--------------------7ea6c145_7684_4278_9a28_7ef6af2dde01-------17,https://miro.medium.com/v2/resize:fill:140:140/0*zfojfc7UXObEh0jH,image-processing 2255,1400,Comparison of 8 AI-Generated Art Applications,Gigapixel AI vs Photoshop Photoshop is a powerful tool for photo editing and Photoshop is generally accepted as the industry standard for photo editing. It has been around for decades and has a large user base. Gigapixel AI is a newer technology that uses AI to increase the resolution of photos. It is a…,https://medium.com/dataprophet/comparison-of-8-ai-generated-art-applications-a84e0a84e25c?source=topics_v2---------238-84--------------------7ea6c145_7684_4278_9a28_7ef6af2dde01-------17,https://miro.medium.com/v2/resize:fill:140:140/0*d9KqmvWRnhVTxCIA,image-processing 2256,1769,Image Processing for Robotics: Enabling Advanced Perception and Control.,"Image Processing for Robotics: Enabling Advanced Perception and Control. Introduction Image processing is a fundamental aspect of robotics, enabling machines to understand and interpret visual information from the world around them. By using techniques such as image enhancement, restoration, and segmentation, robots can extract useful information from images and use…",https://medium.com/@michealomis99/image-processing-for-robotics-enabling-advanced-perception-and-control-9151133b2dd7?source=topics_v2---------239-84--------------------7ea6c145_7684_4278_9a28_7ef6af2dde01-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MGxO0b4oWbqyo0g5C1ntEw.png,image-processing 2257,1770,Image and Video Processing in Python,"Python is an awesome language, and its not just me who’s saying it. Since python is so easy to use and its become easier to write more and more libraries, adding functionality to python has become very easy. Python when developed already had a number of libraries working with it…",https://medium.com/@asijapratik/image-and-video-processing-in-python-7e78ba7ccf83?source=topics_v2---------240-84--------------------7ea6c145_7684_4278_9a28_7ef6af2dde01-------17,https://miro.medium.com/v2/resize:fill:140:140/0*dHvsaBEANvgVY83_,image-processing 2258,1751,Read Image Using OpenCV Framework,OpenCV is one of the popular frameworks used for Image Processing which means if we want to change pixel intensities or the pattern of the image we can take the help of OpenCV because there are a lot of methods available in the OpenCV framework which is used to develop…,https://medium.com/@korlakuntasaikamal10/read-image-using-opencv-framework-df0788272271?source=topics_v2---------241-84--------------------7ea6c145_7684_4278_9a28_7ef6af2dde01-------17,https://miro.medium.com/v2/resize:fill:140:140/1*os90YvQcq1ahEDhDs0ZnnQ.png,image-processing 2259,1771,What is Image Segmentation? | Image Processing #9,"What is Image Segmentation? In image processing, segmentation is the process of dividing an image into distinct regions or segments that correspond to different objects or parts of objects. The goal of segmentation is to simplify and/or change the representation of an image into something that is more meaningful and easier to analyze. Semantic…",https://medium.com/@gokcenazakyol/what-is-image-segmentation-16d152c60257?source=topics_v2---------242-84--------------------7ea6c145_7684_4278_9a28_7ef6af2dde01-------17,https://miro.medium.com/v2/resize:fill:140:140/1*x1Zfn53HYoU73FnpkB8NwQ.png,image-processing 2260,1771,What is Morphology? | Image Segmentation #10,"Once segmentation is complete, morphological operations can be used to remove imperfections in the segmented image and provide information on the form and structure of the image. All of the discussion that follows assumes segmentation has already taken place and that images are made up of 0s for background pixels…",https://medium.com/@gokcenazakyol/what-is-morphology-image-segmentation-10-c10dfdd24e41?source=topics_v2---------243-84--------------------7ea6c145_7684_4278_9a28_7ef6af2dde01-------17,https://miro.medium.com/v2/resize:fill:140:140/1*39vHg_u1QMH8pxqSjDK9Sw.png,image-processing 2261,1772,Mastering Image Processing in Python with Scikit-Image — A Comprehensive Guide to Image Processing Techniques (91/100 Days of Python),"Image processing is an essential part of computer vision and machine learning, playing a crucial role in various industries, from healthcare to entertainment. In this tutorial, we’ll explore image processing in Python using the powerful scikit-image library. …",https://medium.com/@martinxpn/mastering-image-processing-in-python-with-scikit-image-a-comprehensive-guide-to-image-processing-389ced0eb6f2?source=topics_v2---------244-84--------------------45765444_b91b_438d_b115_600e2b425cfa-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ChUYw0XCFl70aOsheJYIoA.png,image-processing 2262,1008,“Taking Flight: The Journey of Cloud Migration” #CloudComputing,"Cloud Security Fundamentals for beginners | Cloud Security Risks and How to Mitigate Them | How does Cloud Security Work and more … Get ready to dive into the world of “Cloud Migration Strategies” with my upcoming blog series, where I’ll be sharing valuable insights on how to successfully migrate…",https://medium.com/@avnishpathak1206/taking-flight-the-journey-of-cloud-migration-cloudcomputing-cff104fbd0c6?source=topics_v2---------1-84--------------------a545288a_711e_456b_92a8_bd36dbc4c1dd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vpRGKaBk34RR1f4yQZGcKA.png,cloud-computing 2263,1773,Creating Your Azure Virtual Network,"Hello, everyone! In today article, we are going to get started on creating your Azure virtual network. What is a Azure Virtual Network(VNET)? A virtual network is your own virtualized network that you can create, to separate yourself from the pack on the Azure cloud. …",https://medium.com/@chrisleveston/creating-your-azure-virtual-network-644b4dbe532d?source=topics_v2---------2-84--------------------a545288a_711e_456b_92a8_bd36dbc4c1dd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*AAUo5N4i6TTlV-jfGg60Bw.png,cloud-computing 2264,113,DevOps in Linux — Systemd Service and Socket Files,"Deep dive into Linux systemd — Note, full mind map is available at: “DevOps in Linux Mind Map” Systemd Service File In systemd, a service file is a configuration file that defines how a particular system service should be managed, including how it should start, stop, and restart. A service unit typically has a “.service” extension and is located…",https://medium.com/@tonylixu/devops-in-linux-systemd-service-and-socket-files-d259274a46e?source=topics_v2---------3-84--------------------a545288a_711e_456b_92a8_bd36dbc4c1dd-------17,https://miro.medium.com/v2/resize:fill:140:140/0*xM4uj0mveIccw1IJ.png,cloud-computing 2265,1774,Day 16: Docker for DevOps Engineers 👍,"This is #90DaysofDevops challenge under the guidance of Shubham Londhe sir. Day 16 TASK check this for task: 90DaysOfDevOps/tasks.md at master · LondheShubham153/90DaysOfDevOps This repository is a Challenge for the DevOps Community to get stronger in DevOps. This challenge starts on the 1st…github.com Docker Docker is a software platform that allows you to build, test, and deploy applications quickly. Docker packages software into standardized units called containers that have everything the software needs to run including…",https://medium.com/@elaazouzifayssal/day-16-docker-for-devops-engineers-9515152dd790?source=topics_v2---------4-84--------------------a545288a_711e_456b_92a8_bd36dbc4c1dd-------17,https://miro.medium.com/v2/resize:fill:140:140/0*EYT4Jtw33BGFxYyF.png,cloud-computing 2266,1775,Automate Docker Image Registration in AWS ECR with AWS CDK,Effortlessly streamline your container registration process using AWS CDK. Are you tired of manually registering Docker images with Amazon Elastic Container Registry (Amazon ECR)? The AWS Cloud Development Kit (AWS CDK) can help you streamline the container registration process and improve your deployment workflow. …,https://medium.com/@reigadacaleb/automate-docker-image-registration-in-aws-ecr-with-aws-cdk-85195477911?source=topics_v2---------5-84--------------------a545288a_711e_456b_92a8_bd36dbc4c1dd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JLGZKmjYskhtbCJHum2zfA.png,cloud-computing 2267,1776,LICENSE to code: Why one text file can ruin your week,"At Instawork, we try to utilize (and give back to) the open source community as much as possible. Open source software forms the backbone of the Internet and the entire tech industry and most of us are “standing on the shoulders of giants” whether we realize it or not. For…",https://medium.com/instawork-engineering/license-to-code-why-one-text-file-can-ruin-your-week-133745e487d2?source=topics_v2---------6-84--------------------a545288a_711e_456b_92a8_bd36dbc4c1dd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zpB1xpLPXQwfZihjzhWgwQ.png,cloud-computing 2268,1777,Real-Time Troubleshooting with DevOps Graphs,"Every DevOps engineer naturally keeps a knowledge graph of all the infrastructure and interconnected services — in their heads. This graph is fragmented and takes time to learn and document, as well as mental power to retain. …",https://medium.com/@bijit211987/real-time-troubleshooting-with-devops-graphs-c090e8c89264?source=topics_v2---------7-84--------------------a545288a_711e_456b_92a8_bd36dbc4c1dd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*J-7JdkWMggnSCNHTgGts2g.png,cloud-computing 2269,1778,When and how Technical certifications are useful?,"Dive into the magnetic world of Technical certifications and discover when and how they can revolutionize your career and enhance your professional growth. You’ve already heard before: “Certifications are useless, they don’t prove your skills”, “Just work on small projects instead.”, “Certifications won’t land you a job.”…",https://medium.com/@walid.io/when-and-how-technical-certifications-are-useful-ddf7076b0772?source=topics_v2---------8-84--------------------a545288a_711e_456b_92a8_bd36dbc4c1dd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*mi5_6zmFsEvyZa82Rj7ZvQ.png,cloud-computing 2270,1779,Datadog API Key Rotation on AWS,"As we know, The Datadog Agent uses the REST API to communicate with the Datadog servers and send data to be processed and analyzed. The REST API is a set of HTTP endpoints that the Agent can send requests to in order to perform various tasks, such as sending metrics…",https://medium.com/@surajtikoo/datadog-api-key-rotation-on-aws-7aea0712ece3?source=topics_v2---------9-84--------------------a545288a_711e_456b_92a8_bd36dbc4c1dd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*M70VQhnALGLI5QvTWgKqvg.png,cloud-computing 2271,1780,"DevOps Project : 3-Tier Web-App Architecture with a Database, NFS Server + Load Balancer","In a previous project here, we introduced the concept of file sharing on multiple web servers to access same shared content on an independent external NFS server. You might ask how a user would be able to reach each of the web servers using 3 separate DNS names or 3…",https://medium.com/@subomi.esan/devops-project-3-tier-web-app-architecture-with-a-database-nfs-server-load-balancer-b18cfe21c850?source=topics_v2---------10-84--------------------1162efe3_83f8_455b_91aa_5915fd7942fd-------17,https://miro.medium.com/v2/resize:fill:140:140/0*2UnkARTu1nkcoKDd.png,cloud-computing 2272,1781,Provisioning an AWS Aurora PostgreSQL Server and Monitoring it’s Performance,PostgreSQL databases have the advantage of being suitable for both OLTP and OLAP uses. This article is regarding the necessary steps to be taken when provisioning an AWS Aurora PostgreSQL database. …,https://medium.com/@TharindaAloka/provisioning-an-aws-aurora-postgresql-server-and-monitoring-its-performance-5f77e1347d8a?source=topics_v2---------11-84--------------------1162efe3_83f8_455b_91aa_5915fd7942fd-------17,https://miro.medium.com/v2/resize:fill:140:140/0*BQHT_fD-uDBrv-vv,cloud-computing 2273,1782,From Ground to Cloud: My First Steps in Cloud Computing,"For the longest time, I’ve been drawn to the limitless possibilities of the cloud computing world. But, despite my eagerness to dive in, I couldn’t find the right resources to fuel my curiosity. I needed something engaging and captivating to keep me going. …",https://medium.com/@afifulhasnain/from-ground-to-cloud-my-first-steps-in-cloud-computing-ad7a822ac325?source=topics_v2---------12-84--------------------1162efe3_83f8_455b_91aa_5915fd7942fd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-computing 2274,1783,How to provision Python & Nginx software when creating Azure VM in portal,"Azure VM via Portal Let login to the azure portal, launch the Virtual Machine resource as shown below",https://medium.com/cloudnloud/how-to-provision-python-nginx-software-when-creating-azure-vm-in-portal-d81df64eecd4?source=topics_v2---------13-84--------------------1162efe3_83f8_455b_91aa_5915fd7942fd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*sjQ8_xWMoy8js_7_AtJx3g.jpeg,cloud-computing 2275,1784,Qloudster.io,"A Technical Education Platform Stylized in Vignette Fashion Qloudster, a new technical information platform, is here to support your technical educational needs for 2023. Checkout Qloudster.io for Technical and Gaming GIFs in vignette style.",https://medium.com/@qloudsterlearning/qloudster-io-fc2df759540c?source=topics_v2---------14-84--------------------1162efe3_83f8_455b_91aa_5915fd7942fd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*NRqJNfqDwfPHcv1GKHZLgA.png,cloud-computing 2276,1777,"Different Ways to Run Containers on AWS, Azure and GCP","Containers are a popular technology that helps developers to create and deploy lightweight, portable applications in a consistent and predictable way. They allow developers to package their code and dependencies into a single unit and run it across different environments without needing to worry about compatibility issues. Container orchestration platforms…",https://medium.com/@bijit211987/different-ways-to-run-containers-on-aws-azure-and-gcp-5d73b57e6761?source=topics_v2---------16-84--------------------1162efe3_83f8_455b_91aa_5915fd7942fd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vodNmz-16CsId3LAdpORTQ.png,cloud-computing 2277,1785,Cloud savings — 6 effective tips,"Technical & non-technical readers, in this article, you will find some relevant insights on how to save costs while using cloud services. 1) Long-Term Commitment You could start saving up to 72% on your usage bill by committing. Major cloud providers offer discounts in exchange for a long-term contract, such as 1-year or…",https://medium.com/@richardferraresi/cloud-savings-6-effective-tips-750c18523454?source=topics_v2---------17-84--------------------6b9e1c48_0bae_4f71_93a2_aae7bd911f64-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-ocvua94GuCmltom61RW2Q.png,cloud-computing 2278,1786,Cloud Project : Client-Server architecture with MYSQL (AWS),"Client-Server refers to an architecture in which two or more computers are connected together over a network to send and receive requests between one another. In their communication, each machine has its own role: the machine sending requests is usually referred as “Client” and the machine responding (serving) is called…",https://medium.com/@saikats2810/cloud-project-client-server-architecture-with-mysql-aws-552fef6e47f9?source=topics_v2---------18-84--------------------6b9e1c48_0bae_4f71_93a2_aae7bd911f64-------17,https://miro.medium.com/v2/resize:fill:140:140/0*wKPCj0FQ1wtj92QJ.jpg,cloud-computing 2279,1777,Streamlining Architectural Decisions: A Simple Framework,"Architecture decisions are critical to the development and success of software applications, making it essential to have a simple framework for making and documenting these decisions. …",https://medium.com/@bijit211987/streamlining-architectural-decisions-a-simple-framework-bd7e1c0ddc43?source=topics_v2---------19-84--------------------6b9e1c48_0bae_4f71_93a2_aae7bd911f64-------17,https://miro.medium.com/v2/resize:fill:140:140/1*J0YCRUs2wG0XTch7Kz63ng.png,cloud-computing 2280,1787,GCP : Cloud Spanner,"GCP : Cloud Spanner Cloud Spanner is a fully managed, highly available, globally distributed relational database service offered by Google Cloud. It is designed to handle mission-critical transactional workloads at scale, while also providing strong consistency and high availability across multiple regions and zones. Cloud Spanner uses a unique architecture…",https://medium.com/@pvdata/gcp-cloud-spanner-fac000ee5ff?source=topics_v2---------20-84--------------------6b9e1c48_0bae_4f71_93a2_aae7bd911f64-------17,https://miro.medium.com/v2/resize:fill:140:140/1*sqzhTCgPY9_s_0lYA-8ClA.png,cloud-computing 2281,1777,Google Cloud’s Operations Suite: Observability for Hybrid and Multi-Cloud Deployments,"As more organizations adopt hybrid and multi-cloud strategies, managing and monitoring complex application environments can become a daunting task. This is where Google Cloud’s Operations Suite comes in, providing a comprehensive set of tools for monitoring, logging, and troubleshooting applications across different cloud environments. Key Features: Google Cloud’s Operations Suite…",https://medium.com/@bijit211987/google-clouds-operations-suite-observability-for-hybrid-and-multi-cloud-deployments-b31d2d51eab9?source=topics_v2---------21-84--------------------6b9e1c48_0bae_4f71_93a2_aae7bd911f64-------17,https://miro.medium.com/v2/resize:fill:140:140/1*smlsbWG-ZhvNWsxEL9J24A.png,cloud-computing 2282,1788,The Data Streaming Landscape 2023,"Data streaming is a new software category to process data in motion. Apache Kafka is the de facto standard used by over 100,000 organizations. Plenty of vendors offer Kafka platforms and cloud services. Many complementary stream processing engines like Apache Flink and SaaS offerings have emerged. And competitive technologies like…",https://medium.com/@kai-waehner/the-data-streaming-landscape-2023-85c3409d1029?source=topics_v2---------22-84--------------------6b9e1c48_0bae_4f71_93a2_aae7bd911f64-------17,https://miro.medium.com/v2/resize:fill:140:140/0*qFloL-9T1drvuPY1.png,cloud-computing 2283,113,"Python Useful Code Snippets, Part Two","A collection of Python codes for solving complex tasks — Merge Lists list1 = [ 1 , 2 , 4 ] list2 = [ 'Tony' ] list1.extend(list2) print(list1) # [1, 2, 4, 'Tony Xu'] Merge Dicts dict1 = { 'name' : 'tony' , 'age' : 123 } dict2 = { 'city' : 'somewhere' } dict1.update(dict2) print(dict1) # {'name':'tony', 'age ': 123, 'city':'somewhere'} Most frequent element test_list =…",https://medium.com/@tonylixu/python-useful-code-snippets-part-two-c7715cb1d84b?source=topics_v2---------23-84--------------------6b9e1c48_0bae_4f71_93a2_aae7bd911f64-------17,https://miro.medium.com/v2/resize:fill:140:140/1*n3BEsm08ZHOzHWPRrjxKRw.png,cloud-computing 2284,1789,Why AWS Graviton is a Game-Changer for Cost-Effective Computing,"A Comprehensive Guide to Amazon’s Custom ARM-based Processor and Its Benefits for Cloud Infrastructure Hi there! As a cloud engineer and Site Reliability Engineer (SRE), I’m always on the lookout for new technologies that can help improve our cloud infrastructure. And one of the most exciting new developments in recent…",https://medium.com/@attriab/why-aws-graviton-is-a-game-changer-for-cost-effective-computing-80e8dcbfa71c?source=topics_v2---------24-84--------------------f0f84d2e_c90c_4ee1_9390_deaf71b23eaf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*41s_xklPCFSZLwRHmUGUDA.jpeg,cloud-computing 2285,1790,Elaboration of Executive Presentation of Infrastructure costs for an SAP Migration project from On-Premises to AWS,"Project description: In this project based on a real-world scenario, I acted as a Cloud Architect and created an executive presentation of infrastructure costs for a SAP migration project from On-Premises to AWS. SAP workloads were running in a corporate DataCenter with the environment divided into Production, Quality Assurance —…",https://medium.com/@marcossouza10/elaboration-of-executive-presentation-of-infrastructure-costs-for-an-sap-migration-project-from-ce33fe995cfa?source=topics_v2---------25-84--------------------f0f84d2e_c90c_4ee1_9390_deaf71b23eaf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6M5w7rB56i8LzVgf1o2Law.png,cloud-computing 2286,113,Linux Useful Tricks — telnet Alternatives,"Few tricks for DevOps operations in Linux — During networking troubleshooting, to check if a port on the remote server is open, we can use the following command to test telnet via port: $ telnet 6663 Trying xxx.xx.xx.xx… Connected to . Escape character is '^]'. ^CConnection closed by foreign host But under some circumstances telnet is not…",https://medium.com/geekculture/linux-useful-tricks-telnet-alternatives-ed9f342149a1?source=topics_v2---------26-84--------------------f0f84d2e_c90c_4ee1_9390_deaf71b23eaf-------17,https://miro.medium.com/v2/resize:fill:140:140/0*bHyU1Ii6xYhYf19V.png,cloud-computing 2287,1791,Series: Blog 2 - Deploying Azure Virtual Machines using Terraform,"Short articles on Terraform, Azure & AWS for beginners Introduction Azure Virtual Machines is a service that enables users to create and manage virtual machines in the cloud. In this blog post, we’ll explore how to deploy Azure Virtual Machines using Terraform. Terraform Code provider ""azurerm"" { features {} } resource ""azurerm_resource_group"" ""vm"" {…",https://medium.com/gitconnected/series-post-2-deploying-azure-virtual-machines-using-terraform-f0caf546f94a?source=topics_v2---------27-84--------------------f0f84d2e_c90c_4ee1_9390_deaf71b23eaf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-computing 2288,1777,Seamlessly Enhancing Continuous Delivery: The Power of Continuous Reliability,"The 2022 State of DevOps report indicates that greater than 74% of organizations surveyed have Change Failure Rate (CFR) greater than 16% (the report provides a range from 16% to 30%). Of these, a significant proportion (> 35%) likely have CFRs exceeding 23%. This means that while organizations seek to…",https://medium.com/@bijit211987/seamlessly-enhancing-continuous-delivery-the-power-of-continuous-reliability-50edbea00f22?source=topics_v2---------28-84--------------------f0f84d2e_c90c_4ee1_9390_deaf71b23eaf-------17,https://miro.medium.com/v2/resize:fill:140:140/0*98qmaJIBqqqPvYwd.png,cloud-computing 2289,1792,Terraform explained in 5 minutes,"Terraform is one of the leading “Infrastructure As Code” tool in the industry. To keep up with the speed of business requirement, many Enterprises adopt IaC to provision and manage infrastructure. In here “Infrastructure” is not limited to well-known public cloud, it can also manage on-premises resource for example VMWare. …",https://medium.com/@flyingbearproductionshk/terraform-explained-in-5-minutes-219ae0df1634?source=topics_v2---------29-84--------------------f0f84d2e_c90c_4ee1_9390_deaf71b23eaf-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vmSTP4QgZ40jcfEBqxq4Hw.png,cloud-computing 2290,1575,Edge Computing: Revolutionizing Real-Time Data Processing and Analysis,"With the growth of the Internet of Things (IoT), Artificial Intelligence (AI), and 5G networks, the amount of data generated is increasing exponentially. Traditional cloud computing models, which involve sending data to a centralized location for processing and analysis, are no longer sufficient. …",https://medium.com/@imsanjams/edge-computing-revolutionizing-real-time-data-processing-and-analysis-26df327f8006?source=topics_v2---------30-84--------------------894ad890_c30e_498e_96e1_c7ef31b4fc36-------17,https://miro.medium.com/v2/resize:fill:140:140/0*dbNT_HUKMXidjJKw,cloud-computing 2291,1793,Day 23 : Jenkins Freestyle Project🌻,"This is #90DaysofDevops challenge under the guidance of Shubham Londhe sir. Day 23 TASK check this for task: 90DaysOfDevOps/tasks.md at master · LondheShubham153/90DaysOfDevOps This repository is a Challenge for the DevOps Community to get stronger in DevOps. This challenge starts on the 1st…github.com What is CI/CD? CI or Continuous Integration is the practice of automating the integration of code changes from multiple developers into a single codebase. It is a software development practice where the developers commit their…",https://medium.com/@rajani103/day-23-jenkins-freestyle-project-6fb0b36d7c85?source=topics_v2---------32-84--------------------894ad890_c30e_498e_96e1_c7ef31b4fc36-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5AEQcYzaR7-PTQw296DoxQ.png,cloud-computing 2292,1793,"Day 24,25 : Complete Jenkins CI/CD Project🌻","This is #90DaysofDevops challenge under the guidance of Shubham Londhe sir. Day 24,25 TASK check this for task: 90DaysOfDevOps/tasks.md at master · LondheShubham153/90DaysOfDevOps This repository is a Challenge for the DevOps Community to get stronger in DevOps. This challenge starts on the 1st…github.com 90DaysOfDevOps/tasks.md at master · LondheShubham153/90DaysOfDevOps This repository is a Challenge for the DevOps Community to get stronger in DevOps. This challenge starts on the 1st…github.com",https://medium.com/@rajani103/day-24-25-complete-jenkins-ci-cd-project-14aa3d8eb7e6?source=topics_v2---------34-84--------------------894ad890_c30e_498e_96e1_c7ef31b4fc36-------17,https://miro.medium.com/v2/resize:fill:140:140/1*e39xxEU0-XleWxZinXYNQQ.png,cloud-computing 2293,1794,Passing Azure Developer Certification AZ-204: Journey and Plan,"Paid resources Free Resources ( recommended) Lessons learned ( will save you time and money) Greetings, cherished readers! I’m thrilled to present my debut article on Medium; enjoy the journey. In this article, I share my journey toward obtaining the Az-204 certificate and how I planned for it. My experience…",https://medium.com/@mo3tssem/passing-azure-developer-certification-az-204-journey-and-plan-e0d41220c4?source=topics_v2---------35-84--------------------894ad890_c30e_498e_96e1_c7ef31b4fc36-------17,https://miro.medium.com/v2/resize:fill:140:140/0*7OZGVtOmaXf4LUEz.png,cloud-computing 2294,1400,Does Location Matter In Cloud Computing?,"Introduction Cloud computing is a type of computing that relies on shared computing resources rather than having local servers or personal devices to handle applications. It delivers computing services over the internet including servers, storage, databases, networking, software, analytics, and intelligence. Cloud computing offers users the ability to access data, applications…",https://medium.com/cloud-believers/does-location-matter-in-cloud-computing-5e16d47cd25c?source=topics_v2---------36-84--------------------894ad890_c30e_498e_96e1_c7ef31b4fc36-------17,https://miro.medium.com/v2/resize:fill:140:140/0*2nOMwbkEah5aiAEQ,cloud-computing 2295,116,Delete files from the source folder once data movement completes from source to destination in…,"Delete files from the source folder once data movement completes from source to destination in ADF(Azure Data Factory) In the article, we will see how to delete files from the source folder once the data movement completes from the source to the destination. Problem Statement: We need to copy data from the source folder to the destination folder and once the copy completes delete data from the source folder and add those files to the destination folder.",https://medium.com/@nidhig631/delete-files-from-the-source-folder-once-data-movement-completes-from-source-to-destination-in-2fefc84efc1b?source=topics_v2---------37-84--------------------894ad890_c30e_498e_96e1_c7ef31b4fc36-------17,https://miro.medium.com/v2/resize:fill:140:140/1*WVz4Acx9-OAz53cQ1xcs8g.png,cloud-computing 2296,1795,4 Step Methodology That Works Perfectly to Move Your Business to Cloud,"The trick is to keep trying until you find a way that produces real results for you and your business. — Welcome to my BRAND NEW series on “Transform Your Business To Cloud”. In this series, I will cover EVERY aspect of modernizing and transforming your business to Cloud. From business to technical to management, to money, to the best delivery model. If you are new to cloud journey or already…",https://medium.com/@drthefit/4-step-methodology-that-works-perfectly-to-move-your-business-to-cloud-d5d4657c282d?source=topics_v2---------38-84--------------------894ad890_c30e_498e_96e1_c7ef31b4fc36-------17,https://miro.medium.com/v2/resize:fill:140:140/0*qORk95crFBYBGi2m,cloud-computing 2297,1796,The Solution Architect’s Guide to Serverless,You’ve undoubtedly heard about serverless and read about the benefits. But implementing serverless into your app doesn’t have to be all or nothing. — For years I’ve been proud to say I build 100% serverless cloud applications. I wore it as a badge of honor that the software I designed could elastically scale at every tier and cost virtually nothing to run at small to medium scale. I used to introduce myself to people…,https://medium.com/better-programming/the-solution-architects-guide-to-serverless-27af39ad57b?source=topics_v2---------39-84--------------------894ad890_c30e_498e_96e1_c7ef31b4fc36-------17,https://miro.medium.com/v2/resize:fill:140:140/0*3gdVK5T4bixAkDne.jpg,cloud-computing 2298,1797,Demystifying Multi-Cloud Integration,"Explore this in-depth look at multi-cloud integration to discover comprehensive strategies and patterns for integrating cloud systems. — Multi-cloud integration strategies may sound like buzzwords and marketing slang, but in this article, I will demystify them. I will also dive deeply into on-premises and legacy systems and how we can integrate with them. …",https://medium.com/itnext/demystifying-multi-cloud-integration-5aa219dd2fa9?source=topics_v2---------40-84--------------------8efda642_2f42_4d08_9f35_42c7b85b4c06-------17,https://miro.medium.com/v2/resize:fill:140:140/0*S2JGPjLNRrcdqc8c,cloud-computing 2299,1798,Tor and VPN are Outdated: Meet NetworkChuck Browser,"Today I want to talk about a cool tool that I discovered recently: the NetworkChuck Cloud Browser. What is the NetworkChuck Cloud Browser? It’s a web browser that runs in the cloud, meaning that you don’t have to install anything on your computer or device. You just go to the…",https://medium.com/@frc7150/this-browser-is-a-game-changer-better-than-vpn-and-tor-7819204f52a0?source=topics_v2---------41-84--------------------8efda642_2f42_4d08_9f35_42c7b85b4c06-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OV0jJnnPQgYQdr2nADuzKg.png,cloud-computing 2300,1799,How Lyft gets a lift from AWS,"AWS, or Amazon Web Services, is an Amazon owned cloud storage solution that presents a host of benefits to business owners. …",https://medium.com/@prajwalthaware/how-lyft-gets-a-lift-from-aws-11c3b88ff628?source=topics_v2---------42-84--------------------8efda642_2f42_4d08_9f35_42c7b85b4c06-------17,https://miro.medium.com/v2/resize:fill:140:140/0*9iLqZiBYS9Sq9GZ8.png,cloud-computing 2301,113,DevOps in K8s — Deployment Rolling Update,"DevOps in K8s bootcamp series — Note, full “DevOps in K8s” mind map is available at: “DevOps in K8s Mind Map” In my last article, I introduced “K8s Deployment”. Let’s talk about Rolling updates and rollbacks in this article. …",https://medium.com/dev-genius/devops-in-k8s-deployment-rolling-update-f022285c6f90?source=topics_v2---------43-84--------------------8efda642_2f42_4d08_9f35_42c7b85b4c06-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Dpyv1BQljac9vov9.png,cloud-computing 2302,1800,High Performance (Grid) Computing on Cloud,"Running HPC clusters is much easier on the cloud where there’s unlimited capacity and no scheduling problems right? That’s certainly what all the cloud vendors always tell me, but how true is it? HPC workloads are often seen as an easy target for migration to cloud. The large compute requirements…",https://medium.com/hmxlabs/high-performance-grid-computing-on-cloud-952052d92b7b?source=topics_v2---------44-84--------------------8efda642_2f42_4d08_9f35_42c7b85b4c06-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_nL-ukwuAXdMPRMXQDM8Kg.jpeg,cloud-computing 2303,1801,GitOps — Roadmap,"Perspective: GitOps at Scale — Note: The Roadmap will be completed step by step. You can see the completed steps indicated by the check ✅ icon. Introduction This article will provide an overview of the steps already described or still to be described in our GitOps journey. After the last article, there will be a global…",https://medium.com/@artem_lajko/gitops-roadmap-b19d00a53782?source=topics_v2---------45-84--------------------8efda642_2f42_4d08_9f35_42c7b85b4c06-------17,https://miro.medium.com/v2/resize:fill:140:140/1*96ME8yFWTlzxsA0vAjRrXw.png,cloud-computing 2304,1802,Azure Networking (2) : Private Endpoints,"Private endpoints are somehow extremely important when it comes to the privacy of the cloud and its security parameter, so with these few words and some pictures, I will explain how someone can create a private resource and still be able to reach it even if when it becomes unreachable…",https://medium.com/@daminhaidar/azure-networking-2-private-endpoints-179db224b4d1?source=topics_v2---------46-84--------------------8efda642_2f42_4d08_9f35_42c7b85b4c06-------17,https://miro.medium.com/v2/resize:fill:140:140/1*HxJoaVdNuAclByPwqfiP1Q.png,cloud-computing 2305,1803,Monthly Recap-March 23,DeepSquare’s Achievements and Plans for the Futures — We are thrilled to share that DeepSquare’s Mondrian subnet has made remarkable progress on the Avalanche Network and is now the 6th busiest subnet on the platform. …,https://medium.com/@DeepSquare.io/monthly-recap-march-23-4b5e49b33a55?source=topics_v2---------47-84--------------------8efda642_2f42_4d08_9f35_42c7b85b4c06-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TIR1TS-tTJsq9u6C9LFtig.png,cloud-computing 2306,119,Create a Highly Available Multi-Tier Architecture using AWS,"For this project, we will be creating a 3 Tier Architecture. Before embarking on this complex and fascinating journey I will explain why this type of architecture is so important. Three-tier architecture is a well-established software application architecture that organizes applications into three logical and physical computing tiers: the presentation tier, or user interface; the application tier, where data is processed…",https://medium.com/@luca.fusaro1996/create-a-highly-available-multi-tier-architecture-using-aws-524dba0e9fd8?source=topics_v2---------48-84--------------------8efda642_2f42_4d08_9f35_42c7b85b4c06-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CNr6c6APhqx8LSMhtUX64g.png,cloud-computing 2307,82,Ansible: Zero to Hero,"Introduction: Ansible is an open-source IT automation tool that can help you automate repetitive tasks and simplify complex configurations. With Ansible, you can automate everything from application deployment to network configuration to container orchestration. It is agentless, meaning you don’t need to install any software on the hosts you want to…",https://medium.com/@clouddeepdive/ansible-zero-to-hero-with-example-3348c1cd5d50?source=topics_v2---------49-84--------------------8efda642_2f42_4d08_9f35_42c7b85b4c06-------17,https://miro.medium.com/v2/resize:fill:140:140/1*2orfiz_mfJUrg5fw4rwN8Q.png,cloud-computing 2308,1804,How to Choose the Best Cloud Service Provider?,"Introduction Choosing a public cloud service provider can be a challenging task, especially when there are so many options available. But it is essential to select the right provider that can meet your business needs and offer reliable and secure services. …",https://medium.com/@vedant.juneja/how-to-choose-the-best-cloud-service-provider-ab4fafdd82e8?source=topics_v2---------10-84--------------------ccd556c7_bced_4ac5_9c82_4e5245e2843a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*dWdoTBq4ntCo8Wyk.jpg,cloud-computing 2309,1805,8. Crafting engaging customer relationships,"Cloud leverages companies to provide unique user experiences and fulfill customer demands while channelizing the workforce. In today’s decentralized, digital-first, hyper-connected world customers are spoilt for choices and speed. This makes it a compulsion for companies to not just have a great product or service but also user experience, customer…",https://medium.com/@swareenajoshi/8-crafting-engaging-customer-relationships-d3a8c77593a5?source=topics_v2---------15-84--------------------ccd556c7_bced_4ac5_9c82_4e5245e2843a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*iam0qTR3VySWzcBfUvHT0A.png,cloud-computing 2310,1806,Cloud Cost Optimization..!,Cloud cost optimization is taking the centre stage in recent days for several reasons. As we all know being the beneficiary of Cloud ever since its inception it has certainly changed the way Organization’s used to deal with various infrastructure resources like Servers & Storage. However the first objective of…,https://medium.com/@sukeshanchan5/cloud-cost-optimization-74409e552c?source=topics_v2---------37-84--------------------d4337b0d_bb51_4f53_a759_6c3d9d0ce064-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ucRp59eCSqWnrJez46iLGw.jpeg,cloud-computing 2311,79,Interpreting Microsoft Azure Architecture: A Beginner’s Overview of this Cloud Provider’s Infrastructure,"Learn the basics of Microsoft Azure’s architecture and how it can benefit your business — If you are a beginner to Microsoft Azure, it can be challenging to understand the architecture of this cloud computing platform. Microsoft Azure is a collection of cloud computing services that allow businesses and organizations to build, deploy, and manage applications and services through a global network of Microsoft-managed data…",https://medium.com/geekculture/interpreting-microsoft-azure-architecture-a-beginners-overview-of-this-cloud-provider-s-91fbc00739b6?source=topics_v2---------38-84--------------------dd0a3b73_1424_45d3_ab2d_de33349f82c3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Y2AaYNoR8ChTgE1y,cloud-computing 2312,1793,Deploying a web-application using Nginx server and Reverse Proxy🌻,"What is Nginx? Nginx is a popular open-source web server software which serves its clients web pages. Suppose you want to access some website (www.google.com), when you put this web address in the browser you will see the homepage(web-page) of google. Web server serves the web files i.e. the HTML, CSS, Javascript files…",https://medium.com/@rajani103/deploying-a-noteapp-project-by-nginx-920067dca1b5?source=topics_v2---------39-84--------------------dd0a3b73_1424_45d3_ab2d_de33349f82c3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tA5B__wmPmvC6dteWr0-Cg.png,cloud-computing 2313,1807,Say Hi to AWS Bangkok Region. Is It Worth Using It?,"This article is derived from AWS มาเมืองไทยแล้ว คนใช้งานได้อะไรบ้าง? Thai enjoys a taste of the native language there. Recently, there was the big news that Amazon Web Services (AWS) has arrived in Thailand. But wait! AWS has yet to bring in full functions of services like in the Singapore region. AWS…",https://medium.com/@k.wichpong/say-hi-to-aws-bangkok-region-is-it-worth-to-use-it-9748c7a55623?source=topics_v2---------40-84--------------------dd0a3b73_1424_45d3_ab2d_de33349f82c3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*lOTnsY5HtRWiuxBfoixFNA.png,cloud-computing 2314,1808,Choosing the Right Infrastructure for Production ML — Modzy,"Choosing the right infrastructure for your production ML can impact the performance, scalability, cost, and security of models.",https://medium.com/getmodzy/choosing-the-right-infrastructure-for-production-ml-modzy-3489674e094b?source=topics_v2---------41-84--------------------dd0a3b73_1424_45d3_ab2d_de33349f82c3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*5kyMlXYzV265h7UE.png,cloud-computing 2315,1809,A cloud-based data warehouse to facilitate business automation,"A cloud data warehouse is a centralized repository that provides data storage, analysis, reporting, and more. More precisely, data warehouses are essential enterprise solutions, which store data gathered from multiple heterogeneous sources — human resources, customer management, accounting, marketing, and others, without requiring additional investment in expensive on-premises hardware and…",https://medium.com/@abto-software/a-cloud-based-data-warehouse-to-facilitate-business-automation-8020d137be1?source=topics_v2---------42-84--------------------dd0a3b73_1424_45d3_ab2d_de33349f82c3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Awb_QcNVUFQF5kPH,cloud-computing 2316,1810,Effortlessly Deploy and Run EKS Workloads on AWS Fargate,"Introduction Are you a beginner looking for an efficient and hassle-free way to run containerised workloads on AWS? Look no further than AWS Fargate! Introduced by AWS in 2017, Fargate is a serverless compute engine that enables you to run Docker containers in the cloud without the need to manage underlying…",https://medium.com/dev-genius/effortlessly-deploy-and-run-eks-workloads-on-aws-fargate-602592acdf9b?source=topics_v2---------43-84--------------------dd0a3b73_1424_45d3_ab2d_de33349f82c3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*QaD1tYtX5OYGIOv7,cloud-computing 2317,1811,🚀 Demystifying Serverless Microservice Architecture,"How to Build Scalable and Efficient Applications with Serverless Architecture, and Why It Matters in 2023 As technology continues to evolve at a breakneck pace, developers must stay ahead of the curve to remain competitive. One of the most exciting developments in recent years is the rise of serverless microservice architecture, a paradigm that promises to simplify application development while delivering scalability, efficiency, and cost savings.",https://medium.com/@ladumorrahul/demystifying-serverless-microservice-architecture-199e19d11e0c?source=topics_v2---------44-84--------------------dd0a3b73_1424_45d3_ab2d_de33349f82c3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*GW14RBvMfbK5q_COEa2loQ.jpeg,cloud-computing 2318,1812,Empowering Success: Bringing Business Value Working With AWS Partners,".. and Leverage the right AWS partner to accelerate the success to next level — The recent economic woes after Covid 19 are further fuelled by the banking crisis. The changing order is taking the global market by storm, and technology sector is no exception. In the new market, digital transformation is even more accelerated and is in action bringing the business value. Cloud is…",https://medium.com/@satyenkumar/empowering-success-bringing-business-value-working-with-aws-partners-e097fa45284a?source=topics_v2---------45-84--------------------dd0a3b73_1424_45d3_ab2d_de33349f82c3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ESfm2r3BsQzOFq2jF2mdgg.jpeg,cloud-computing 2319,1801,Kubernetes in Kubernetes with vcluster,"Kubernetes inside Kubernetes (N:1-Host-Cluster) — Introduction Imagine you can deploy multiple virtual cluster inside a kubernetes cluster and the most teams would not see any difference at first. You know, this already possible and the solution is called vcluster. I will not explain how vcluster works in detail and how the individual distros are composed. …",https://medium.com/@artem_lajko/kubernetes-in-kubernetes-with-vcluster-a5be97ac5861?source=topics_v2---------46-84--------------------dd0a3b73_1424_45d3_ab2d_de33349f82c3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9dfHCGRJZUP1ItarTmpuew.png,cloud-computing 2320,1813,"Security, compliance and savings: the benefits of SAST and FinOps tooling for your infrastructure as code","Infrastructure as code (IaC) is a method for defining and deploying IT infrastructure using a descriptive model and DevOps methodology. IaC offers benefits such as reproducibility, scalability, traceability and security of environments. However, IaC also presents challenges related to complexity, change management and cloud costs. To address these challenges, there…",https://medium.com/@boujdaria-ali/security-compliance-and-savings-the-benefits-of-sast-and-finops-tooling-for-your-infrastructure-ee415bf65811?source=topics_v2---------47-84--------------------fdfc4af7_b5a2_4ffb_bf18_02e505643224-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Q19wyysd8UvHCZaJ.png,cloud-computing 2321,1791,Automating Azure Infrastructure with Terraform and Azure DevOps,"How to use Terraform and Azure DevOps to deploy Azure infrastructure resources such as virtual machines, storage accounts, and network security groups Azure provides a comprehensive set of cloud services, but managing these resources can be challenging without the right tools and practices. Fortunately, there are tools like Terraform and…",https://medium.com/@rollendxavier/automating-azure-infrastructure-with-terraform-and-azure-devops-f7da9f79ea80?source=topics_v2---------48-84--------------------fdfc4af7_b5a2_4ffb_bf18_02e505643224-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Qer0taen6TkqPLq6,cloud-computing 2322,117,AWS Architecting (10 questions) Part 5,"1) The data science team wants to efficiently run distributed training jobs using the latest Amazon EC2 GPU-powered instances, and deploy training and inferences using open source distribution, such as Kubeflow. Which service is suitable for this use case? · AWS Elastic Beanstalk · Amazon Elastic Kubernetes Service (EKS) Comments…",https://medium.com/@jacqmkindi/aws-architecting-10-questions-part-5-7d055cefc51b?source=topics_v2---------49-84--------------------fdfc4af7_b5a2_4ffb_bf18_02e505643224-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PKEneacJfuV5mI08z9ahWA.png,cloud-computing 2323,1791,Terraform — Create an Azure Managed Identity and Grant it Access to an Azure Storage Account,"Terraform to create an Azure Managed Identity and grant it access to an Azure Storage account Azure Managed Identities are a powerful feature that can be used to securely authenticate an Azure resource to another Azure resource. In this article, we’ll walk through the steps required to use Terraform to…",https://medium.com/@rollendxavier/terraform-create-an-azure-managed-identity-and-grant-it-access-to-an-azure-storage-account-49e56d643d9e?source=topics_v2---------50-84--------------------fdfc4af7_b5a2_4ffb_bf18_02e505643224-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ewFyCVBqiUjA35k4,cloud-computing 2324,1814,Cloud DLP as an essential security tool,"By: David Tessier, Senior Enterprise Cloud Architect, SADA Introduction Data is the world’s biggest commodity — bigger than oil. Protecting data from attackers and bad actors is one of the most critical functions of any security ecosystem. If your data contains sensitive and personally identifiable information (PII) or adheres to…",https://medium.com/sada-engineering/cloud-dlp-as-an-essential-security-tool-33aef9a780d4?source=topics_v2---------51-84--------------------fdfc4af7_b5a2_4ffb_bf18_02e505643224-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Nzs9AalwNMLtb98w-6b7-A.png,cloud-computing 2325,113,DevOps in Linux — nslookup,"DNS troubleshooting tool nslookup introduction — Note, full mind map is available at: “DevOps in Linux Mind Map” DevOps engineers are responsible for ensuring the smooth functioning of the software development and deployment processes. DNS (Domain Name System) is a crucial component of your infrastructure. Therefore DevOps engineers need to have a solid understanding of DNS…",https://medium.com/dev-genius/devops-in-linux-nslookup-32b623d809a2?source=topics_v2---------52-84--------------------fdfc4af7_b5a2_4ffb_bf18_02e505643224-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0R5sG-Ot5ZPGwzy6Rz4jKw.png,cloud-computing 2326,1791,AWS Dashboards with AWS CDK in TypeScript,"Create simple dashboard that displays the CPU utilization of an EC2 instance and deployed it to AWS using the AWS CDK Amazon Web Services (AWS) provides a vast range of cloud-based services and solutions that enable customers to build and deploy scalable, secure, and flexible applications. AWS Dashboards is one…",https://medium.com/gitconnected/aws-dashboards-with-aws-cdk-in-typescript-12d97bf0958?source=topics_v2---------53-84--------------------fdfc4af7_b5a2_4ffb_bf18_02e505643224-------17,https://miro.medium.com/v2/resize:fill:140:140/0*VsKbLfVmEo3R-2kx,cloud-computing 2327,1815,"Dew Drop Weekly Newsletter #324 — Week ending March 31, 2023","Weekly Top Links Here are this week’s top links from the Morning Dew. Hit the link at the end of this newsletter to view the full posts on my blog. Thanks for following! Monday — March 27, 2023 Bing Preview Release Notes: AI-powered Knowledge Cards and Stories (Bing Team) What…",https://medium.com/@alvinashcraft/dew-drop-weekly-newsletter-324-week-ending-march-31-2023-c1b9b7c526ee?source=topics_v2---------54-84--------------------fdfc4af7_b5a2_4ffb_bf18_02e505643224-------17,https://miro.medium.com/v2/resize:fill:140:140/0*6OdALa4_UsyEKCkn.png,cloud-computing 2328,1816,CUDOS: POWERING THE METAVERSE,"INTRODUCTION As a big fan of the metaverse and what the metaverse is going to offer in the future I am excited and can’t wait for the metaverse to be fully implemented and though the metaverse isn’t fully in existence, but some platforms contain metaverse-like elements. Virtual reality video games…",https://medium.com/@ojohnel7/cudos-powering-the-metaverse-7944d333a257?source=topics_v2---------55-84--------------------fdfc4af7_b5a2_4ffb_bf18_02e505643224-------17,https://miro.medium.com/v2/resize:fill:140:140/0*w1zjspfnLXpMvqUe.jpeg,cloud-computing 2329,1817,How to Pass AWS Cloud Practitioner Exam in the First Attempt: Easy Cloud Learning Guide,"Hey there, cloud enthusiasts! Ready to dive headfirst into the wild world of AWS? If you’ve ever dreamed of mastering the AWS Certified Cloud Practitioner exam, then buckle up, because I’m about to take you on one hell of a journey. …",https://medium.com/@neonforge/how-to-pass-aws-cloud-practitioner-exam-in-the-first-attempt-easy-cloud-learning-guide-656d54928b4?source=topics_v2---------56-84--------------------fdfc4af7_b5a2_4ffb_bf18_02e505643224-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fhnWc61I5U7iXxa_ed2VYA.jpeg,cloud-computing 2330,1818,Cloud service levels — what should I expect?,"Back when I was a student, 10540 years ago, a friend gave me an old two-processor / two-core server — that was way past its prime. Think 512 MB / 300 Mhz / 1GB HDD. It weighed somewhere around 30 KG, made more noise than a small truck and probably…",https://medium.com/@danielkloyber/cloud-service-levels-what-should-i-expect-3a537deb699c?source=topics_v2---------57-84--------------------ef281d09_ce12_4f2a_b89a_3b365fec013a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Xg-RM5Gk679zTTBz8JvKBA.jpeg,cloud-computing 2331,1819,"Monitoring AWS resources on Your sandbox and demo accounts using Lambda, EventBridge, and MS Teams",Monitoring Your AWS resources is important to prevent generating costs for resources You do not longer need. This is especially necessary if You have sandbox and demo accounts that multiple people use. — The problem We all have done it. We all launched an EC2 instance or created another pricey AWS resource for testing or demo purposes and forgot to delete it when we no longer needed it. Often You only notice this when the monthly invoice arrives.,https://medium.com/@lukaskrimphove/monitoring-aws-resources-on-your-sandbox-and-demo-accounts-using-lambda-eventbridge-and-ms-teams-396d58c605f2?source=topics_v2---------59-84--------------------ef281d09_ce12_4f2a_b89a_3b365fec013a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*THUQjdWL1JeDoyTMcop0ZA.png,cloud-computing 2332,1820,Tips and Lessons after Fully Certified in Google Cloud,I started my GCP learning journey in 2017 and took my first GCP ACE certification exam in 2020–08. Finally passed ALL GCP certifications in 2023–03. Below are my tips and lessons and hope it can help you in your cloud learning journey. Learn EVERYDAY and form a new habit of…,https://medium.com/@cheerful-walter/tips-and-lessons-after-fully-certified-in-google-cloud-ac32b8ea6947?source=topics_v2---------60-84--------------------ef281d09_ce12_4f2a_b89a_3b365fec013a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*o8MU5N16yTcrVWY548oCzA.jpeg,cloud-computing 2333,1821,My Experience at Data Council Austin 2023: Day 1,"I have to admit I didn’t do enough research before I joining the Data Council conference, say why it’s special, what tracks are available, and who will speak. To some degree, quite often I do something similar when I go to the cinema. …",https://medium.com/@jove/my-experience-at-data-council-austin-2023-day-1-1c539d01fb3c?source=topics_v2---------61-84--------------------ef281d09_ce12_4f2a_b89a_3b365fec013a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*z-_4ihdKyfykEQ-BXdCtDw.jpeg,cloud-computing 2334,1822,Launching A Website Using S3,"Hey everyone! AWS continues to be a service I’m driven to get better in and today I wanted to try my hand at launching a website using S3. For those who aren’t familiar with S3, S3 is a storage service that offers scalability, data availability, and security. S3 can be…",https://medium.com/@ernestgibbsiii/launching-a-website-using-s3-263e8f0ee258?source=topics_v2---------62-84--------------------ef281d09_ce12_4f2a_b89a_3b365fec013a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0i9M-XqzhV1aFr87-BUJ1w.png,cloud-computing 2335,1823,Generate Terraform files from Azure,"Automate Your Infrastructure with Infrastructure as Code Hello there! Today, we’re going to take a deep dive into the fascinating realm of Infrastructure as Code (IaC) and take a closer look at one of its tools — aztfexport. If you’re not familiar with IaC, it’s the practice of managing and provisioning technological infrastructure through code. That means…",https://medium.com/@ifrimradumdc/generate-terraform-files-from-azure-47d8aa941157?source=topics_v2---------63-84--------------------ef281d09_ce12_4f2a_b89a_3b365fec013a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-computing 2336,1824,Building a Serverless Application: A Beginner’s Guide :,"In recent years, the rise of cloud computing has led to a new way of building and deploying applications: serverless computing. With serverless computing, developers can focus on building and deploying their code without worrying about the underlying infrastructure. …",https://medium.com/@code.origin/building-a-serverless-application-a-beginners-guide-3fbc9be77a98?source=topics_v2---------64-84--------------------30ecdee4_049d_4613_b123_2426d216be4b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*-h1htxpD0-iD0p_Y.jpeg,cloud-computing 2337,1825,Kubernetes Architecture : Powerful and simple yet complex at the same time,"Is using kubernetes the right choice for the application? — Those questions above may be difficult for me to answer. However, after going through several migration processes that we have gone through, we can learn a number of things regarding the decision to use Kubernetes. …",https://medium.com/life-at-telkomsel/kubernetes-architecture-powerful-and-simple-yet-complex-at-the-same-time-4c1c89283741?source=topics_v2---------65-84--------------------30ecdee4_049d_4613_b123_2426d216be4b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*l7HForNF2PMGhMN5SC-qFQ.jpeg,cloud-computing 2338,1826,Creating an Auto-Scaling Group of EC2 Instances,Overview: Create a VPC. Create three public subnets. Create an auto-scaling group using t2.micro instances. Create an application load balancer. Add a security rule to allow inbound HTTP traffic for the load balancer. Use the DNS URL to verify the site is reachable. Step 1: VPC In order for the LU Bank to utilize…,https://medium.com/@tylermachek98/creating-an-auto-scaling-group-of-ec2-instances-fa583460690e?source=topics_v2---------66-84--------------------30ecdee4_049d_4613_b123_2426d216be4b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_9j8aa7rd-Vz10t9L1v4IQ.png,cloud-computing 2339,1827,How to Install Docker Engine on Ubuntu in GCP,"If you’re planning to install Docker Engine on Ubuntu in GCP cloud, it’s important to first ensure that you meet the necessary prerequisite steps. ①.Log in to the GCP Cloud Console at https://console.cloud.google.com. Navigate to the Compute Engine section of the console. In the “Create a new instance” dialog box…",https://medium.com/cloudnloud/how-to-install-docker-engine-on-ubuntu-in-gcp-df1dd4aead92?source=topics_v2---------68-84--------------------30ecdee4_049d_4613_b123_2426d216be4b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*I5Hz_Su6j4pc_6PgTvACQg.jpeg,cloud-computing 2340,1791,Unleash the Power of Serverless Computing with DigitalOcean and Terraform,"Discover the Ultimate Hack for Streamlined Serverless Computing with DigitalOcean and Terraform — DigitalOcean is a cloud platform that offers various infrastructure services to help you build, deploy and scale your applications. One of the most popular services offered by DigitalOcean is their serverless computing platform, which allows you to run your code without having to worry about managing servers.",https://medium.com/gitconnected/unleash-the-power-of-serverless-computing-with-digitalocean-and-terraform-f2ed6288f994?source=topics_v2---------69-84--------------------0941943e_5ba8_4be1_a695_ec73c4dd5b46-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PDj5Hl1y4OtRAEhJrUGeYQ@2x.jpeg,cloud-computing 2341,1828,Distributed Computing 102: Scaling and Optimizing Your Data Processing,"In Distributed Computing 101, we explored the fundamentals of parallel processing and the technical terminologies that are essential to understanding this exciting field. If you haven’t gone through the Distributed Computing 101 you can checkout the below link, Distributed Computing 101: An Introduction to the World of Parallel Processing In…",https://medium.com/@siraj-deen/distributed-computing-102-scaling-and-optimizing-your-data-processing-745a761336a7?source=topics_v2---------70-84--------------------0941943e_5ba8_4be1_a695_ec73c4dd5b46-------17,https://miro.medium.com/v2/resize:fill:140:140/0*_9Gy87XPtYUhN0-3,cloud-computing 2342,1829,"Cloud Computing — the Past, Present and Future","Have you heard this magical buzzword a thousand times but still are trying to wrap your head around what it actually means? If so, read on! It’s is one of the most spoken about technologies of the 21st century, and whether you go to university, or work for a space…",https://medium.com/@jay.gokani/cloud-computing-the-past-present-and-future-d034dc246059?source=topics_v2---------71-84--------------------0941943e_5ba8_4be1_a695_ec73c4dd5b46-------17,https://miro.medium.com/v2/resize:fill:140:140/0*W8VGAnL6pbfafGcS,cloud-computing 2343,1816,WHAT MAKES PHALA UNIQUE AS A CLOUD COMPUTING NETWORK,WHY PHALA IS BETTER THAN DECENTRALISED CLOUD SERVICES The goal and vision of Phala network is to establish itself as the biggest peer to peer and decentralized cloud computing network based on web3 and Phala network has been consistently working towards achieving that goal with so many innovations and developments to revolutionise cloud computing. So when compares to…,https://medium.com/@ojohnel7/what-makes-phala-unique-as-a-cloud-computing-network-636801338c02?source=topics_v2---------72-84--------------------0941943e_5ba8_4be1_a695_ec73c4dd5b46-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oEdEpRG2xIOHJJmUflj-PA.jpeg,cloud-computing 2344,1830,Launching Your Cloud Journey? Here’s Why You Need to Form a Cloud Centre of Excellence (CCoE) First!,Lessons learnt from customers and what good looks like. Working with a large UK manufacturer they decided to embark on a journey to the cloud. They were early adopters of cloud with all the reservations to match. …,https://medium.com/@waynereidUK/launching-your-cloud-journey-heres-why-you-need-to-form-a-cloud-centre-of-excellence-ccoe-first-7696629b714?source=topics_v2---------74-84--------------------0941943e_5ba8_4be1_a695_ec73c4dd5b46-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Axkv5u5v7Fln_Jl_,cloud-computing 2345,1831,Data Mesh — Path Towards Decentralisation,"Disclosure: I am currently employed by Google Cloud. Disclaimer: opinions expressed in this blog post are solely my own and do not reflect the opinions of my employer or previous employers. Slow decision making, no context to the mission, lack of ownership at the front lines, no clear direction, eventual…",https://medium.com/@vondavierjulius/data-mesh-path-towards-decentralisation-3a61b8ebdd3d?source=topics_v2---------75-84--------------------0941943e_5ba8_4be1_a695_ec73c4dd5b46-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6oLfjjBYYsOMUFArqaDF1Q.png,cloud-computing 2346,1832,The Vital Role of OpenStack in Advancing 5G and Edge Networking Solutions,"OpenStack has surfaced as a groundbreaking technology in the field of cloud computing. It is an open-source software platform that offers a variety of infrastructure services, such as storage, computing, and networking. With the emergence of 5G and edge networking, OpenStack has taken on an even more substantial task in…",https://medium.com/@kcoupal/the-vital-role-of-openstack-in-advancing-5g-and-edge-networking-solutions-2b40cb23afde?source=topics_v2---------76-84--------------------0941943e_5ba8_4be1_a695_ec73c4dd5b46-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7tgezCSLap7PZaEhoW1Bdw.png,cloud-computing 2347,1833,"Deployment of Git and GitHub as Software Version Control + Proof of Concept (PoC), Process of Commit, Push, and Revert Code Changes","Project description: This is my first DevOps Bootcamp project based on a real-world scenario, I acted as a DevOps Engineer to migrate application and website code from a local repository to remote repositories on GitHub. My mission was to upload the code stored on my computer to GitHub and validate…",https://medium.com/@aijazak2/deployment-of-git-and-github-as-software-version-control-proof-of-concept-poc-process-of-52bedaf42a92?source=topics_v2---------77-84--------------------0941943e_5ba8_4be1_a695_ec73c4dd5b46-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ttLG8q3VJXAt53E2ADdMuQ.png,cloud-computing 2348,1834,Writing Kubernetes Manifests with Kustomize Feeder Repository,"Introduction In our last post on Chick-fil-A’s application platform, we shared an overview of our GitOps strategy, but only briefly mentioned a critical component: the kustomize feeder repositories that are the foundation of the process. This post will focus on the design and implementation of these repositories. Today, a significant portion…",https://medium.com/chick-fil-atech/writing-kubernetes-manifests-with-kustomize-feeder-repository-b67b0be7ad2e?source=topics_v2---------78-84--------------------6eaee139_f192_41c9_9a13_c6062ef939e0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*eHYEXxWPgx1e3DoK8DeDCA.png,cloud-computing 2349,1835,3 AWS Certifications That Shaped My Career,"Cloud computing has become a vital technology across all industries, providing unprecedented scalability, cost-effectiveness, and efficiency for businesses of all sizes. As a technology professional, I’ve witnessed the transformative power of cloud firsthand, both in my career and in the industry at large. In particular, I’ve found that AWS certifications…",https://medium.com/@brunoamaroalmeida/3-aws-certifications-that-shaped-my-career-9924ed6d55cb?source=topics_v2---------79-84--------------------6eaee139_f192_41c9_9a13_c6062ef939e0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*D12Az-mYCGUM-W_Q.png,cloud-computing 2350,1836,AWS Summits 2023,"Note: ✋ This post was originally published on my blog wiki-cloud.co AWS Summits are events organized by Amazon Web Services (AWS) that take place in different cities around the world so that people interested in the cloud can learn, share knowledge and connect with the AWS community. …",https://medium.com/@johnbulla/aws-summits-2023-4b0a4600d39d?source=topics_v2---------80-84--------------------6eaee139_f192_41c9_9a13_c6062ef939e0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*cS0tVaN3YB1E1RbuHoFlLQ.png,cloud-computing 2351,1837,Modern Cloud behind a Modern Enterprise,"In today’s fast-paced business world, technology has become an integral part of every organization. One of the most significant technological advancements in recent years is cloud computing. Cloud computing has revolutionized the way businesses operate and has provided them with a competitive edge over their rivals. In this article, we…",https://medium.com/@mike_tyson_cloud/modern-cloud-behind-a-modern-enterprise-3cba630ec8ed?source=topics_v2---------81-84--------------------6eaee139_f192_41c9_9a13_c6062ef939e0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*2pVR2ZrxUejIZbCQ,cloud-computing 2352,1838,My evaluation of the Scaleway Cloud provider,"A couple of years ago, I developed an app that helped me manage my conference submission workflow. Since then, I have been a happy user of the free Heroku plan. Last summer, Heroku’s owner, Salesforce, announced that it would stop the free plan in November 2022. I searched for a…",https://medium.com/@nfrankel/my-evaluation-of-the-scaleway-cloud-provider-b6da469255e7?source=topics_v2---------83-84--------------------6eaee139_f192_41c9_9a13_c6062ef939e0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qmzq72Q8F-KbBpMVJgM5qQ.png,cloud-computing 2353,1839,Google Drive vs. Dropbox: Which Cloud Storage Best Fits You in 2023?,Revolutionize the Way You Store Your Data with Cloud Storage. — Welcome to the era where you save hundreds of bucks by not investing in multiple pen drives and bulky hard drives. Keep that extra weight at home or put it in a museum! (Though all millennials out there will disagree with this statement). Say Goodbye to Losing Your Precious Data…,https://medium.com/illumination/google-drive-vs-dropbox-which-cloud-storage-best-fits-you-in-2023-e01a850e41e4?source=topics_v2---------84-84--------------------6eaee139_f192_41c9_9a13_c6062ef939e0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*qcG0bhVW-KmlSHyB,cloud-computing 2354,1837,Why Drift Detection is Crucial for Successful Continuous Delivery Pipelines,"In this article, we will explore the importance of drift detection in cloud computing and how it can improve the security and reliability of your infrastructure. …",https://medium.com/@mike_tyson_cloud/why-drift-detection-is-crucial-for-successful-continuous-delivery-pipelines-c77bd18bb6fd?source=topics_v2---------85-84--------------------6eaee139_f192_41c9_9a13_c6062ef939e0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DiiC_7zJcWbt74-GipDy-g.png,cloud-computing 2355,1805,7. Agile team operations,"Company functioning is moving towards business-oriented microservices, diverse sector harmonious collaborations, and setting up autonomous practices. In the demanding market, companies structure their IT teams to be more agile, efficient, and cost-effective. …",https://medium.com/design-bootcamp/7-agile-team-operations-30a28e2ecbc1?source=topics_v2---------86-84--------------------6eaee139_f192_41c9_9a13_c6062ef939e0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*UE0Ju4tRJkvvIsXRqL3TVw.png,cloud-computing 2356,1840,Java and the Cloud: A Match Made in Heaven,"Introduction In today’s digital landscape, cloud computing has become an essential component of modern web development. With the increasing demand for scalable, reliable, and cost-effective solutions, businesses are moving their web applications to the cloud to leverage its numerous benefits. …",https://medium.com/@itmagination/java-and-the-cloud-a-match-made-in-heaven-6cb316fe8ff2?source=topics_v2---------87-84--------------------6eaee139_f192_41c9_9a13_c6062ef939e0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*NKuIXKksAqBDCDE_.png,cloud-computing 2357,1841,Enterprise Cloud Challenges: What’s Most Pressing in 2023,"By: Elizabeth Wallace Cloud computing is a central focus for companies in a post-pandemic world, mid-digital-transformation world. It’s allowing organizations to expand beyond what’s possible with on-premises systems, storing and processing massive data both centrally and at the edge. But as these systems become more complex, more challenges stand in…",https://medium.com/rtinsights/enterprise-cloud-challenges-whats-most-pressing-in-2023-d97de420a65e?source=topics_v2---------88-84--------------------658eaa0a_58ec_4af3_a412_ba38b82a7e38-------17,https://miro.medium.com/v2/resize:fill:140:140/0*dcZCjhAoKrksJUwt.jpg,cloud-computing 2358,1842,Top 10 Microservices Problem Solving Questions for 5 to 10 years experienced Developers,"From Service Discovery to Security: 10 Problem-Solving Questions to Test the Microservices Skills of Developers with 5 to 10 Years of Experience — Hello folks, as Microservice architecture becomes increasingly popular in this era of cloud computing and distributed systems, experienced developers need to have a deep understanding of how to tackle common challenges that arise in Microservice architecture.",https://medium.com/javarevisited/top-10-microservices-problem-solving-questions-for-5-to-10-years-experienced-developers-3391e4f6b591?source=topics_v2---------89-84--------------------658eaa0a_58ec_4af3_a412_ba38b82a7e38-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ARoiYCmjy2OQAexXOClZyQ.png,cloud-computing 2359,1791,Building Serverless Applications with AWS CDK and Lambdas using TypeScript,Amazon Web Services (AWS) is a cloud computing platform that provides a vast range of cloud-based services and solutions to customers worldwide. AWS Lambda is one of the services offered by AWS that allows users to run code in response to events and automatically manages the computing resources required by…,https://medium.com/gitconnected/building-serverless-applications-with-aws-cdk-and-lambdas-using-typescript-3429cbc0cd88?source=topics_v2---------90-84--------------------658eaa0a_58ec_4af3_a412_ba38b82a7e38-------17,https://miro.medium.com/v2/resize:fill:140:140/0*vN8qGhSwfLVsILpo,cloud-computing 2360,1843,Manage Multiple Terraform Versions With tfenv,"In this article, we will explore the popular Terraform version manager tfenv, with practical examples of how to install it and use it to add, change and uninstall different Terraform versions. Tfenv enables you to install multiple Terraform versions and switch between them easily as needed. Tfenv is a version…",https://medium.com/itnext/manage-multiple-terraform-versions-with-tfenv-d3ed372104fc?source=topics_v2---------91-84--------------------658eaa0a_58ec_4af3_a412_ba38b82a7e38-------17,https://miro.medium.com/v2/resize:fill:140:140/0*DK-aL2Xu1GRELwzF,cloud-computing 2361,118,Connecting to a Microsoft Azure PostgreSQL Server with Public Network Access Denied: Knowledge transfer to on-premises DBAs team,"In this next project based on a real-world scenario, I acted as a Cloud Specialist to show a team of on-premises DBAs how to provision and access a PostgreSQL database on Microsoft Azure in a scenario where the server should have Public Network Access Denied following Client’s security requirements. I…",https://medium.com/@lparraguez/connecting-to-a-microsoft-azure-postgresql-server-with-public-network-access-denied-knowledge-1f0a4c43060f?source=topics_v2---------92-84--------------------658eaa0a_58ec_4af3_a412_ba38b82a7e38-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_T344IqcqSoIBCvrvUMtYw.png,cloud-computing 2362,1844,Create Your Own AWS ECS Operator,"Link Your ECS Cluster With Your Observability Stack You have an ECS cluster with Prometheus exporters running, and an observability stack running in a Kubernetes cluster? Then this article is for you. …",https://medium.com/aws-in-plain-english/create-your-own-aws-ecs-operator-d62ee2b06ea1?source=topics_v2---------93-84--------------------658eaa0a_58ec_4af3_a412_ba38b82a7e38-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Kqp0mvxAROi8el_c,cloud-computing 2363,1845,Cloud Development Basics: A Beginner’s Guide to Building Applications in the Cloud,"The cloud has become an integral part of modern software development, offering flexibility, scalability, and cost-effectiveness. This beginner’s guide will introduce you to the basics of cloud development, helping you understand the fundamentals and get started with building applications in the cloud. …",https://medium.com/@it-craftsman/cloud-development-basics-a-beginners-guide-to-building-applications-in-the-cloud-330675fc23a1?source=topics_v2---------94-84--------------------658eaa0a_58ec_4af3_a412_ba38b82a7e38-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CNOAllWzA0hmnN-asxDbRw.png,cloud-computing 2364,113,K8s Tools — Kubeshark,"Introduction to K8s networking tool Kubeshark — Full mind map is at: “K8s Tools Mind Map” Kubeshark is an API Traffic Viewer for K8s providing real-time, protocol-level visibility into K8s’ internal network, capturing, dissecting and monitoring all traffic and payloads going in, out and across containers, pods, nodes and clusters. Just think TCPDump and Wireshark re-invented for…",https://medium.com/dev-genius/k8s-tools-kubeshark-464443bea7d7?source=topics_v2---------95-84--------------------658eaa0a_58ec_4af3_a412_ba38b82a7e38-------17,https://miro.medium.com/v2/resize:fill:140:140/1*uNYgKGPd5QNAWHMlmjh5Fw.png,cloud-computing 2365,1846,Monitoring Chaos Engineering Experiments with Datadog,"Tutorial — Using Datadog Alarms with Amazon EventBridge to Safely Monitor AWS Fault Injection Simulator Experiments — Many businesses and organizations adopt cloud computing as a key aspect of their technology strategy. While most applications can be migrated easily, some need modernization before they can be moved to the cloud. There are also applications that must remain on-premises due to extreme low-latency requirements, and data sovereignty or…",https://medium.com/the-cloud-architect/integrating-datadog-with-aws-fault-injection-simulator-43fc3f6dd72d?source=topics_v2---------96-84--------------------658eaa0a_58ec_4af3_a412_ba38b82a7e38-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Wg168v9b-re92sy-zSBxFw.jpeg,cloud-computing 2366,1791,Unleashing the Power of AWS CloudWatch with Structured Logging and Custom Dashboards,"Use structured logging in AWS CloudWatch, and how to create custom dashboards to visualize your logs and metrics Amazon Web Services (AWS) CloudWatch is a powerful tool for monitoring and logging your AWS infrastructure. It can collect and track metrics, logs, and events from a variety of AWS resources and…",https://medium.com/gitconnected/unleashing-the-power-of-aws-cloudwatch-with-structured-logging-and-custom-dashboards-4bb8e6296f99?source=topics_v2---------97-84--------------------63c23b93_4093_4a7a_9793_e04009714809-------17,https://miro.medium.com/v2/resize:fill:140:140/0*PgOph-Z1ZKrUS6QM,cloud-computing 2367,1847,Revolutionizing Cloud Computing with Cudos: The Next Generation of Distributed Computing,"Cloud computing has become an essential tool for businesses of all sizes, enabling them to store and access data and applications through remote servers. Cloud computing providers have rapidly expanded, offering innovative solutions to users. …",https://medium.com/@charlesace/revolutionizing-cloud-computing-with-cudos-the-next-generation-of-distributed-computing-7955bfd5cd08?source=topics_v2---------98-84--------------------63c23b93_4093_4a7a_9793_e04009714809-------17,https://miro.medium.com/v2/resize:fill:140:140/1*shF-emZasOEEdt6nd_Zzzg.jpeg,cloud-computing 2368,1848,How to Avoid Cloud Repatriation,"I have been working with public clouds since 2015, and in the past couple of months I see more and more discussions (on newsletters, LinkedIn, and technical forums) about a term called “Cloud Repatriation”. In this post, I will share my opinion on “Cloud Repatriation” and how I believe organizations…",https://medium.com/aws-in-plain-english/how-to-avoid-cloud-repatriation-f4d253060885?source=topics_v2---------99-84--------------------63c23b93_4093_4a7a_9793_e04009714809-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CIZ-lVW10yVKO38Z5oH7dA.jpeg,cloud-computing 2369,1849,Why is Clari Scary?,"“Any technology, sufficiently advanced, is indistinguishable from magic.” — Arthur C Clarke In the history of scientific progress there are several examples of inventions that seemed magical during their time. Take the telephone for instance. How would it have felt when one could hear the voice of a friend or…",https://medium.com/@vranga_16437/why-is-clari-scary-76869f4fdbb9?source=topics_v2---------100-84--------------------63c23b93_4093_4a7a_9793_e04009714809-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-computing 2370,1850,🤖 API Magic: Making Apps Work Together Like a Superhero Team! 💪,"Hey there, Superheroes-in-training! 🚀 It’s me, Swami K, and I’m here to save the day with another episode of “Coffee Bytes with The Cloud”! ☕️🌩️ Today, we’re gonna dive into the awesome world of APIs. So, buckle up, and let’s get started! 🤓 APIs: The friendly neighborhood Spider-Man 🕷️ of…",https://medium.com/@iswamik/api-magic-making-apps-work-together-like-a-superhero-team-1c16f2b2381f?source=topics_v2---------101-84--------------------63c23b93_4093_4a7a_9793_e04009714809-------17,https://miro.medium.com/v2/resize:fill:140:140/1*AgftKWi7bhqnu5ekZPD4TA.png,cloud-computing 2371,1851,The AI Conundrum: How Junior Developers Can Navigate the AI Revolution Through Cybersecurity & Cloud Skills,"How can junior developers prepare for the future of the tech industry with AI at the forefront? Confronting the Inevitable The rapid advance of artificial intelligence (AI) has precipitated a tectonic shift in the tech industry, one that is both exhilarating and, at times, disquieting. Faced with an increasingly dynamic…",https://medium.com/@diparra801/the-great-unraveling-how-junior-developers-can-navigate-the-ai-revolution-through-cybersecurity-343baa424f21?source=topics_v2---------102-84--------------------63c23b93_4093_4a7a_9793_e04009714809-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ed_9kSTuWf-vezNrXoiaIg.png,cloud-computing 2372,1852,AWS CloudFormation UPDATE_ROLLBACK_FAILED fix in production,"Recently, while trying to deploy a serverless application, the pipeline failed thus putting the cloud formation stack in “UPDATE_ROLLBACK_FAILED” state. This is due to an error in your pipeline. …",https://medium.com/@tairuoluwafemi/aws-cloudformation-update-rollback-failed-fix-in-production-4e978e46d6c1?source=topics_v2---------103-84--------------------63c23b93_4093_4a7a_9793_e04009714809-------17,https://miro.medium.com/v2/resize:fill:140:140/1*WQvbvMdE8wqDwGwkszjZvA.jpeg,cloud-computing 2373,1791,Azure vs AWS vs DigitalOcean: Which Cloud Provider Should You Choose?,"When it comes to cloud computing, there are many cloud providers to choose from. Three of the most popular cloud providers are Azure, AWS, and DigitalOcean. In this article, we’ll compare these three providers and help you decide which one is the best fit for your needs. Become a Medium…",https://medium.com/gitconnected/azure-vs-aws-vs-digitalocean-which-cloud-provider-should-you-choose-414c2f544708?source=topics_v2---------104-84--------------------63c23b93_4093_4a7a_9793_e04009714809-------17,https://miro.medium.com/v2/resize:fill:140:140/0*RDZTzwYR0cxfNOw1,cloud-computing 2374,1810,AWS Container Services Showdown: ECS vs EKS vs Fargate vs ECR,"Introduction Hey there, are you curious about containers and how they can be used on Amazon Web Services (AWS)? If so, you’re in the right place! …",https://medium.com/dev-genius/aws-container-services-showdown-ecs-vs-eks-vs-fargate-vs-ecr-231da080990d?source=topics_v2---------105-84--------------------63c23b93_4093_4a7a_9793_e04009714809-------17,https://miro.medium.com/v2/resize:fill:140:140/0*42nZW7Wo2nZbxDop,cloud-computing 2375,1853,Triggering ECS Fargate Tasks via HTTP Request,"How can we consume an ECS Fargate task as if it were an HTTP endpoint? — What is an ECS Fargate Task? An ECS Fargate Task is serverless compute for long-running container executions. This is similar to GCP’s Cloud Run Job service, or Azure Container Instances. Why ECS Fargate vs. Lambda w/Container? Both services are marketed as serverless compute for containerized applications, and Lambda functions can directly be granted a function url, so why would ever need to…",https://medium.com/@hello_9187/triggering-ecs-fargate-tasks-via-http-request-bd6d3e42e298?source=topics_v2---------106-84--------------------63c23b93_4093_4a7a_9793_e04009714809-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0XaVw5RxRmdYC6urU010-A.png,cloud-computing 2376,1854,"The Beginner’s Guide to Infrastructure as Code (IAC): What, Why, and How","If you are new to the world of DevOps, you may have heard the term “Infrastructure as Code” or IAC being tossed around. At first, it might sound like just another buzzword or industry jargon. However, IAC is a powerful practice that has revolutionized the way we manage and deploy…",https://medium.com/@siddheshnaik2412/infrastructure-as-code-iac-what-why-and-how-for-beginners-e561e8b13501?source=topics_v2---------107-84--------------------c2a68699_1fb4_4fec_bc18_7f0aa6ff1e93-------17,https://miro.medium.com/v2/resize:fill:140:140/1*V12zc2OcB3hiCtOcn9tS0Q.png,cloud-computing 2377,1855,Application Security Posture Management: An Overview,"Benefits and Challenges of Implementing ASPM — According to a report by Gartner, “by 2022, 60% of enterprise application security budgets will be allocated to application security posture management (ASPM), up from less than 10% in 2020.” TLDR Application Security Posture Management (ASPM) is an approach to managing the security of applications throughout their lifecycle, from development to…",https://medium.com/technology-hits/application-security-posture-management-an-overview-895d86d8129d?source=topics_v2---------109-84--------------------c2a68699_1fb4_4fec_bc18_7f0aa6ff1e93-------17,https://miro.medium.com/v2/resize:fill:140:140/0*2hkr_X24s4HbSOBG,cloud-computing 2378,1418,What’s Behind Elasticsearch? — Unlocking the Power of Data Visualization,"Creating your own dashboard using Elasticsearch — In today’s data-driven world, data is being generated at an unprecedented rate. However, raw data can be difficult to understand and interpret. Dashboards are popular nowadays since they provide a way to present data effectively, allowing users to see key performance metrics at a glance and drill down into more…",https://medium.com/forcodesake/whats-behind-elasticsearch-unlocking-the-power-of-data-visualization-23001ecfc4a2?source=topics_v2---------110-84--------------------c2a68699_1fb4_4fec_bc18_7f0aa6ff1e93-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JfFwaUE0vx6pDeF8p54qVQ.png,cloud-computing 2379,1856,Cloud Computing: Why is it Becoming an Integral Part of Every Organization?,"As cloud computing grows internationally, the market is forecast to exceed $923 billion by 2027 (reportlinker.com). Storage, cost savings, scalability, flexibility, security and collaboration are the needs of Enterprise to Small industries. Network Geeks has found the way, and that is Cloud Computing. Do you know what cloud computing is…",https://medium.com/@paramitachakraborty08/cloud-computing-why-is-it-becoming-an-integral-part-of-every-organization-46d7690a8072?source=topics_v2---------111-84--------------------c2a68699_1fb4_4fec_bc18_7f0aa6ff1e93-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-gwohhVugDBAXfpHfroeGg.png,cloud-computing 2380,79,Scaling Your Business with Google Cloud Platform’s Autoscaling Capabilities,"A Cost-Effective Solution for Small Business Data Management: Google Cloud Platform — Google Cloud Platform (GCP) is a suite of cloud computing services offered by Google that provides various products and services for businesses to develop, host, and scale their applications. …",https://medium.com/geekculture/scaling-your-business-with-google-cloud-platforms-autoscaling-capabilities-e40d269948a?source=topics_v2---------112-84--------------------c2a68699_1fb4_4fec_bc18_7f0aa6ff1e93-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pEkkOmix00e0CtOvYSvOog@2x.jpeg,cloud-computing 2381,1857,Embracing the Future of Platform Engineering: The Rise of Multi-Cloud Strategies,"The Evolution of Cloud Platform Development Platform Engineering has evolved significantly over the past decade, with a shift towards cloud-native technologies and infrastructure. Organizations have increasingly adopted cloud solutions to reduce costs, improve scalability, and accelerate time to market. The next frontier in Platform Engineering is the adoption of multi-cloud strategies, which involves leveraging multiple cloud…",https://medium.com/cloud-native-the-gathering/embracing-the-future-of-platform-engineering-the-rise-of-multi-cloud-strategies-a0ed96f12f3e?source=topics_v2---------113-84--------------------c2a68699_1fb4_4fec_bc18_7f0aa6ff1e93-------17,https://miro.medium.com/v2/resize:fill:140:140/1*NVERZcmw378Cu7-AkVrD4A.png,cloud-computing 2382,1858,Multi-Cluster/Shared Application Gateway Ingress Controller for Azure Kubernetes Service,"We know that Azure’s Application Gateway Ingress Controller (AGIC) is the ingress controller to use by default in AKS, since, internally, it has a plugin that allows us to use Azure’s native Application Gateway L7 load balancer to expose our services and thus continue using functionalities within the Azure world…",https://medium.com/globant/multi-cluster-shared-application-gateway-ingress-controller-for-azure-kubernetes-service-928ab7d2cbdc?source=topics_v2---------114-84--------------------c2a68699_1fb4_4fec_bc18_7f0aa6ff1e93-------17,https://miro.medium.com/v2/resize:fill:140:140/1*mj1leHUvQPbuOHBnSb2L9A.png,cloud-computing 2383,1859,The Importance of Readiness and Liveness Probes in Kubernetes,"Kubernetes is a powerful tool that allows organizations to manage and orchestrate their containerized applications with ease. However, ensuring the availability and reliability of these applications can be challenging, especially when dealing with large-scale deployments. This is where readiness and liveness probes come into play. …",https://medium.com/@msalinas92/the-importance-of-readiness-and-liveness-probes-in-kubernetes-3e781beda125?source=topics_v2---------115-84--------------------c2a68699_1fb4_4fec_bc18_7f0aa6ff1e93-------17,https://miro.medium.com/v2/resize:fill:140:140/0*hNSYmp9nHXL3lHLe,cloud-computing 2384,1860,"Passing HashiCorp Terraform Associate Exam (002) — Preparation Guidance , Tips & Tricks","Hello, This post will help you get an idea how I prepared for the HashiCorp Terraform Associate (002) exam and passed with 92%. Though this is my personal experience, but hope this article helps you in your journey of preparation for this certificate. Few Exam Related Details : Most of…",https://medium.com/@trivedikashish/passing-the-terraform-associate-exam-002-preparation-guidance-tips-tricks-6462466da691?source=topics_v2---------116-84--------------------c2a68699_1fb4_4fec_bc18_7f0aa6ff1e93-------17,https://miro.medium.com/v2/resize:fill:140:140/1*cpyLnltmac9nfFn60dTVvw.png,cloud-computing 2385,910,Basics of Terraform Provisioners,"“The role of a provisioner is not to create dependency, but to facilitate independence.” — Unknown Terraform is a tool for defining infrastructure as code and it allows the automation of creating resources on various cloud platforms. Provisioners provide capability to configure and customize resources after they are created. For…",https://medium.com/@asishmm/basics-of-terraform-provisioners-f07a083f78cf?source=topics_v2---------117-84--------------------8da1763b_c820_4b55_a8f5_268d8cc2ddf7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*mjwQMTHnO-0JVNog2XGcTg.jpeg,cloud-computing 2386,1861,Learning the Power of Cloud-Native RAN,"Learning the Power of Cloud-Native RAN Cloud Native RAN (Radio Access Network) is a modern approach to designing and deploying RAN in 5G network. It involves virtualizing the RAN functions and moving them to the cloud, enabling more flexibility, scalability, and automation. Cloud Native RAN leverages containerization, microservices architecture, and…",https://medium.com/@onlypiyushjain/learning-the-power-of-cloud-native-ran-1b290d926908?source=topics_v2---------118-84--------------------8da1763b_c820_4b55_a8f5_268d8cc2ddf7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*NVEbi-eQKneRqlSdN9Ni3g.jpeg,cloud-computing 2387,1862,"Implementing a Scalable Web Application using AWS Elastic Beanstalk, DynamoDB, and CloudFront with Edge Locations","In this project based on a real-world scenario, I was responsible for implementing an application that would support the demand of a large number of users accessing it simultaneously. …",https://medium.com/@stebbins.eric/implementing-a-scalable-web-application-using-aws-elastic-beanstalk-dynamodb-cloudfront-and-edge-5a3f0702657?source=topics_v2---------119-84--------------------8da1763b_c820_4b55_a8f5_268d8cc2ddf7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fomkaNkDk3i6z-kiBfh4TQ.png,cloud-computing 2388,1863,"Preparation, Docker Image Push and Deployment for Containerized Voting Application in Kubernetes Cluster using Docker, Azure Container Registry (ACR) and Azure Kubernetes Service (AKS)","Project description: In another project based on a real world scenario, I had to act as a DevOps Engineer, and show a new team member how to deploy an application on a Kubernetes cluster. This cluster is part of The Cloud Bootcamp project, and I prepared this new team member…",https://medium.com/@sudharshanchadaga/preparation-docker-image-push-and-deployment-for-containerized-voting-application-in-kubernetes-2c4ce53b9bae?source=topics_v2---------120-84--------------------8da1763b_c820_4b55_a8f5_268d8cc2ddf7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4VgrbNk22da9Q3oQpItx8A.png,cloud-computing 2389,1864,Implementation of an E-Commerce System on AWS in an automated way using Terraform and Ansible,"In this project based on a real-world scenario, it was created and implemented an e-Commerce MVP (Minimum Viable Product) on AWS in less than 1 hour and in an automated way using Terraform and Ansible (Infrastructure as Code — IaC). It was provisioned the infrastructure using Terraform and Ansible to…",https://medium.com/@augustocesar.o/implementation-of-an-e-commerce-system-on-aws-in-an-automated-way-using-terraform-and-ansible-8154fea2d46d?source=topics_v2---------121-84--------------------8da1763b_c820_4b55_a8f5_268d8cc2ddf7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Zx71oTnvNn010ARqVGIrvg.png,cloud-computing 2390,1791,Creating a DigitalOcean App with Terraform,"Terraform to create, modify, and delete resources within a DigitalOcean account. Become a Medium Member to directly support my work. You’ll also get full access to every story on Medium. Thanks in advance! Introduction Terraform is an open-source infrastructure as code tool that allows you to manage and provision your cloud…",https://medium.com/@rollendxavier/creating-a-digitalocean-app-with-terraform-8bbcc63ebbc2?source=topics_v2---------122-84--------------------8da1763b_c820_4b55_a8f5_268d8cc2ddf7-------17,https://miro.medium.com/v2/resize:fill:140:140/0*eLBxjkZKxuEKjdAc,cloud-computing 2391,1865,"Implementation of a Scalable Web Application using the services of AWS Elastic Beanstalk, DynamoDB, CloudFront and Edge Locations","Project description: In this project based on a real-world scenario, I was responsible for implementing an application that needed to support the high demand of a large number of users accessing it simultaneously. …",https://medium.com/@cwjones_devmgr/implementation-of-a-scalable-web-application-using-the-services-of-aws-elastic-beanstalk-dynamodb-d53415fd58b9?source=topics_v2---------123-84--------------------8da1763b_c820_4b55_a8f5_268d8cc2ddf7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6DJDs9uAtYK71Ynzw7DImA.jpeg,cloud-computing 2392,1866,How to Install Azure CLI Auto Completion Plugin,"Are you tired of typing out lengthy commands every time you use the Azure CLI? Fortunately, there is a solution — the Azure CLI auto completion plugin. …",https://medium.com/@devenes/how-to-install-azure-cli-auto-completion-plugin-faffa456f99d?source=topics_v2---------124-84--------------------8da1763b_c820_4b55_a8f5_268d8cc2ddf7-------17,https://miro.medium.com/v2/resize:fill:140:140/0*COqMfBEvw1bEN7ad.jpg,cloud-computing 2393,1867,The Fast Evolving AI Landscape,"It’s barely 3 months into 2023 and it is clear that AI is going to dominate the tech space this year, and very likely this decade, by a wide margin (over Web3, Cloud, Mobile or anything else in the past couple decades). If you are in tech, you have to…",https://medium.com/@anil.murty/the-fast-evolving-ai-landscape-bd7024017a5f?source=topics_v2---------125-84--------------------8da1763b_c820_4b55_a8f5_268d8cc2ddf7-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Muzx1Spn4rEgBxf2,cloud-computing 2394,1868,Creating an Auto-Scaling Group of EC2 Instances for High Availability,For this project we’ll build an Auto-Scaling Group of Instances for High Availability with a target policy to scale when CPU utilization is above 50%. You can find more information about Auto-Scaling here. Your tasks: Generate a VPC with CIDR 10.10.0.0/16 Create three public subnets with 10.10.1.0/24 & 10.10.2.0/24 …,https://medium.com/@larrydeshaedevops/creating-an-auto-scaling-group-of-ec2-instances-for-high-availability-db2bb09ccecc?source=topics_v2---------126-84--------------------8da1763b_c820_4b55_a8f5_268d8cc2ddf7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*aTH4Stkyg3VfofOQ7kS_Ug.jpeg,cloud-computing 2395,1857,Top 20 Cost-Saving Tips for Running Large Workloads in AWS: Maximize Efficiency in Platform Engineering,"So You Want to Reduce Your Spend Footprint? Amazon Web Services (AWS) is a leading cloud services provider, offering a wide range of tools and services for building, deploying, and managing applications in the cloud. For organizations leveraging AWS for platform engineering, managing costs is a crucial consideration. Running large workloads can result in substantial expenses if not…",https://medium.com/cloud-native-the-gathering/top-20-cost-saving-tips-for-running-large-workloads-in-aws-maximize-efficiency-in-platform-8029fb43e4d2?source=topics_v2---------127-84--------------------90fc6b9e_fda3_4790_a740_11c5ce55c59f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xANLLPBEFKSuTfQEEkLrWg.png,cloud-computing 2396,1869,Build sandboxes and let them play,"Curiosity is one of the biggest drivers of humans. This is the third article in our series on industrial artificial intelligence. It is about machine learning engineers and why they should play in sandboxes. Sooner or later (read sooner) on your path to industrial artificial intelligence (AI), you will get…",https://medium.com/@rogerherger/build-sandboxes-and-let-them-play-bd86eae382f9?source=topics_v2---------128-84--------------------90fc6b9e_fda3_4790_a740_11c5ce55c59f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*i8wrXyIB7ZFLDmkAZNZc7g.png,cloud-computing 2397,1801,GitOps — Argo CD Cockpit Part 2,"Argo CD Cockpit — as Control plane to manage fleet ships — Note: You will need time for this article. Furthermore to understand the article its requires knowledge about GitOps, Kubernetes, Kustomize, Helm, Terraform and more. Introduction In my previous part, I introduced to you the environment Setup. Now we have an environment to continue. My goal of this article is to create…",https://medium.com/devops-dev/gitops-argo-cd-cockpit-part-2-62c14e292d38?source=topics_v2---------129-84--------------------90fc6b9e_fda3_4790_a740_11c5ce55c59f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4QTffJ36lWwFg2O90hjf0w.png,cloud-computing 2398,1870,100 Days Of Code — Lessons learned and Revelations,May 23rd 2022 Was the day that I embarked on my 100 days of code challenge. To test and challenge myself to get a greater and better understanding around coding in various languages and improve my understanding of cloud technologies. During this process I acquired my AWS Certified Developer Certification…,https://medium.com/@quadrionigbanjo/100-days-of-code-lessons-learned-and-revelations-a85206b566c1?source=topics_v2---------130-84--------------------90fc6b9e_fda3_4790_a740_11c5ce55c59f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*feKfmFUn9CAoyqZs,cloud-computing 2399,1871,Hidden MS Azure costs and how to monitor them to keep your cloud budget under control,"With the advent of the digital age, cloud computing has quickly become an essential option for organizations of all sizes and shapes. Being a relentless leader in the IT field, Microsoft just couldn’t help but come up with a cloud computing platform of its own. Nowadays, Azure is one of…",https://medium.com/@NickHystax/hidden-ms-azure-costs-and-how-to-monitor-them-to-keep-your-cloud-budget-under-control-8eabb2542522?source=topics_v2---------131-84--------------------90fc6b9e_fda3_4790_a740_11c5ce55c59f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*IW_hIugVst2dy-OP.png,cloud-computing 2400,1872,CMU Week — Every Week is Cloud Week,"Mar. 20 ~ Mar. 26, 2023 — Weekly Status: Morale(1 ~ 10): 8 (Finish Cloud Individual! Learned a lot!) Parties and Events: 1 (Date Night) 1. Cloud Computing: Finished P4. Iterative Processing with Spark!",https://medium.com/cloud-guru-的征途/cmu-week-every-week-is-cloud-week-30e3be30aa16?source=topics_v2---------132-84--------------------90fc6b9e_fda3_4790_a740_11c5ce55c59f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ExiRtrJqjyZENSoQCi36ZQ.jpeg,cloud-computing 2401,1837,Terraform Drift Detection: How to monitor and remediate cloud infrastructure drift,"In today’s fast-paced and constantly evolving world of cloud computing, enterprise organizations need a solid strategy to monitor their infrastructure. One key aspect of this strategy is drift detection, which involves identifying and addressing any differences between the desired state of the infrastructure and its actual state. …",https://medium.com/@mike_tyson_cloud/terraform-drift-detection-how-to-monitor-and-remediate-cloud-infrastructure-drift-3e365921420?source=topics_v2---------133-84--------------------90fc6b9e_fda3_4790_a740_11c5ce55c59f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pXLnxgdYlDfQLk02WARS9w.png,cloud-computing 2402,1873,What is OpenIO ? Object Storage Infrastructure,"OpenIO SDS is a scalable open-source object storage solution. — Overview Intro In today’s world, businesses need to store and manage an ever-increasing amount of data. Traditional storage solutions are often expensive and inflexible, leading to a need for more innovative solutions. …",https://medium.com/@btech-engineering/what-is-openio-object-storage-infrastructure-d965c6429182?source=topics_v2---------134-84--------------------90fc6b9e_fda3_4790_a740_11c5ce55c59f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EhvZ8VQMX_JhzfyEfYJSyQ.png,cloud-computing 2403,113,HELM —How Release Information is Stored,"Advanced Helm usage — What is Helm Release In Helm, a Release is an instance of a chart running in a K8s cluster. One chart can often be installed many times into the same cluster. And each time it is installed, a new release is created. Consider a MySQL chart. If you want two databases running in your…",https://medium.com/geekculture/helm-how-release-information-is-stored-778d7f0b7498?source=topics_v2---------135-84--------------------90fc6b9e_fda3_4790_a740_11c5ce55c59f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*JRi2wfZNqjojMLsh.png,cloud-computing 2404,1874,Provisioning SSL Certificates using DNS Authorization with Terraform on Google Cloud,"Why DNS Auth? When you’re issuing an SSL certificate for a Google Cloud L7 Load Balancer, you have to verify the ownership of the domain name associated with the certificate. This is usually done by creating a DNS record which points to the load balancer IP address. There are few cases when this…",https://medium.com/@arslan.usifov/provisioning-ssl-certificates-using-dns-authorization-with-terraform-on-google-cloud-5d9c06308ec9?source=topics_v2---------136-84--------------------90fc6b9e_fda3_4790_a740_11c5ce55c59f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*bG33CHAuW8fTsxfim4Xs-w.jpeg,cloud-computing 2405,1875,What is AMI in AWS?,"Explore the world of AWS and unlock the full potential of Amazon’s powerful cloud services — starting with Amazon Machine Image (AMI). Join us as we delve into the ins and outs of AWS AMI, including its capabilities, benefits, and step-by-step guidance on creating an AMI from an EC2 instance. …",https://medium.com/@neal-davis/what-is-ami-in-aws-2706fffb51b1?source=topics_v2---------137-84--------------------dce9d880_8251_4417_9c0c_a6af03c2006e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*bH8c_hSw7_5b3FpHZq-lUA.jpeg,cloud-computing 2406,1791,Creating a DigitalOcean Kubernetes Cluster with Terraform,Terraform to create a DigitalOcean Kubernetes cluster Become a Medium Member to directly support my work. You’ll also get full access to every story on Medium. Thanks in advance! Introduction DigitalOcean is a cloud provider that offers a managed Kubernetes service. Kubernetes is an open-source container orchestration platform that automates the…,https://medium.com/illumination/creating-a-digitalocean-kubernetes-cluster-with-terraform-c015ab61acc5?source=topics_v2---------138-84--------------------dce9d880_8251_4417_9c0c_a6af03c2006e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*K-vB1QjsEDXHRrh9,cloud-computing 2407,1876,AWS Graviton for Kubernetes,AWS Graviton can be used as a cost-effective and high-performance option for running Kubernetes clusters. Here are some key considerations when using Graviton for Kubernetes: Graviton-based EC2 instances: AWS offers a range of Graviton-based EC2 instances that can be used to run Kubernetes nodes. …,https://medium.com/@prajwal.chobitkar/aws-graviton-for-kubernetes-b59cae2dd3f?source=topics_v2---------139-84--------------------dce9d880_8251_4417_9c0c_a6af03c2006e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*sQ29tzxnE3gOD9JWZIu5-Q.png,cloud-computing 2408,1810,How to Create an EKS Network Load Balancer + App Using Kube Manifests and Terraform: A Step-by-Step Guide,"Introduction Are you looking for ways to improve your Kubernetes cluster’s scalability, reliability, and performance on AWS? Then you’ve come to the right place! In this blog, we’ll be exploring the powerful capabilities of EKS Network Load Balancers and how they can help you optimise your AWS infrastructure. EKS Network Load…",https://medium.com/dev-genius/how-to-create-an-eks-network-load-balancer-app-using-kube-manifests-and-terraform-a-bad3205f0c0c?source=topics_v2---------140-84--------------------dce9d880_8251_4417_9c0c_a6af03c2006e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*jCB4adctBtujl5WA,cloud-computing 2409,1877,What You Need to Know About APIs,"So what, really, is an API and why should I care about it? I frequently encounter the acronym “API” used in conversations where I am reasonably certain that the user has little or no idea what it actually means. …",https://medium.com/@tfnaylor/what-you-need-to-know-about-apis-bcc454403104?source=topics_v2---------141-84--------------------dce9d880_8251_4417_9c0c_a6af03c2006e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1Iv-KSJPHZgl4zRZTP9_mg.jpeg,cloud-computing 2410,1878,Integrating Optimization into Your Cloud Journey,"Last week, I had the privilege of presenting live to an audience of AWS re:Invent attendees, as well as those who watched the broadcast across the event hotels in Las Vegas. …",https://medium.com/@GranulateIntel/integrating-optimization-into-your-cloud-journey-90b00c666834?source=topics_v2---------142-84--------------------dce9d880_8251_4417_9c0c_a6af03c2006e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*hWi4XJuXMG03ACiK.png,cloud-computing 2411,1879,Microservices Orchestration Best Practices and Tools,"Optimizing microservices communication and coordination through orchestration pattern with an example in C# — Welcome to the exciting world of microservices orchestration! As businesses rapidly move towards digitalization, there is an ever-increasing need for software architectures that can keep up with the changing demands of the market. In this article, I will explore the benefits, challenges, and best practices of microservices orchestration, and why…",https://medium.com/@antonellosemeraro/microservices-orchestration-best-practices-and-tools-ba79357cf6e3?source=topics_v2---------143-84--------------------dce9d880_8251_4417_9c0c_a6af03c2006e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*G0qDe7fsc0E4r7GedvaHBw.png,cloud-computing 2412,1880,The 3–2–1 Backup Rule. Be Safe,"Your IT systems could be at risk. How to protect corporate data? — Data loss, production interruptions, upset customers — backup can save you from losses in the thousands. Digital attacks, flooding, fire The problem is not limited to corporations. According to the Coverware report, 18 percent of cyberattacks hit small and medium businesses. And there are many more reasons for data loss: employee error, system failure…",https://medium.com/@miroslao7/the-3-2-1-backup-rule-be-safe-f37e5f43e7a2?source=topics_v2---------144-84--------------------dce9d880_8251_4417_9c0c_a6af03c2006e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7xJjt4a1xvndXg0dh2EzHQ.jpeg,cloud-computing 2413,208,What is Oracle Clusterware,"Introduction Oracle Clusterware is a high-availability solution from Oracle Corporation that provides a robust and scalable clustering infrastructure for Oracle databases and applications. Oracle Grid Infrastructure’s software component provides the foundation for Oracle Real Application Clusters (RAC), Oracle Automatic Storage Management (ASM), and Oracle Restart. Oracle Clusterware is designed to ensure…",https://medium.com/@ip-specialist/what-is-oracle-clusterware-c4d695feb5a2?source=topics_v2---------145-84--------------------dce9d880_8251_4417_9c0c_a6af03c2006e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ibzMtdbeiIlP0wcUpGMRpw.jpeg,cloud-computing 2414,1791,Bicep— Use managed identity to connect Key Vault to an Azure web app,"How to authenticate an app service to read secrets from a key vault using managed identity Introduction Azure Key Vault is a powerful tool for managing secrets, certificates, and keys in the cloud. It allows you to securely store and control access to sensitive information, such as connection strings, API keys…",https://medium.com/gitconnected/bicep-use-managed-identity-to-connect-key-vault-to-an-azure-web-app-71a42bc89cb8?source=topics_v2---------146-84--------------------dce9d880_8251_4417_9c0c_a6af03c2006e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*XoLlBDaGhGBrIULb,cloud-computing 2415,1881,How I cleared AWS Certified Solutions Architect- Associate(SAA C03)? 3 things to know about!,"AWS Certified Solutions Architect — Associate (SAA C03) is an associate-level certification provided by Amazon Web Services that tests the knowledge of designing secure, resilient, high-performing, and cost-optimized architectures. The exam is on the list of toughest exams at the associate level provided by cloud providers like AWS. It covers…",https://medium.com/@dhruvaggarwal6/how-do-i-cleared-aws-certified-solutions-architect-associate-saa-c03-3-things-to-know-about-a95fe0fa116b?source=topics_v2---------147-84--------------------87821beb_3882_40d8_98e2_402872020b9d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Vjfr_sjE9jrsJiCTldlRMA.png,cloud-computing 2416,1882,Cloud Consulting: Best Practices You Must Adopt,"Cloud consulting is crucial for businesses adopting cloud-based technologies and maximizing their potential benefits. According to a survey by LogicMonitor, 83% of enterprise workloads will be in the cloud by 2020. However, the same study also found that 66% of IT professionals feel their organizations lack the expertise to manage…",https://medium.com/@chrisbateson80/cloud-consulting-best-practices-you-must-adopt-4ee545710b39?source=topics_v2---------148-84--------------------87821beb_3882_40d8_98e2_402872020b9d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vnj_Bg02ilXj44rIuFqidw.jpeg,cloud-computing 2417,1883,The 10-Step Cloud Migration Project Checklist,"Moving to the cloud may provide several benefits to your firm, including more agility in IT operations, cheaper operational expenses, faster turnaround on procedures and approvals, and greater security, to mention a few. Yet, successfully completing a cloud migration project demands meticulous preparation and execution. It is critical to follow…",https://medium.com/@lenaztyson/the-10-step-cloud-migration-project-checklist-93ea92ad366?source=topics_v2---------149-84--------------------87821beb_3882_40d8_98e2_402872020b9d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*AShM6FvDMZPJN9cfrhJvYg.jpeg,cloud-computing 2418,1884,"Empowering Businesses: The Impact of Salesforce, Mastercard, Cloud Engineering, and Data Science on the Technology Industry","Salesforce, Mastercard, Cloud Engineering, and Data Science are four terms that are frequently heard in today’s technology industry. In this blog post, we will explore how these four concepts are interrelated and how they are contributing to the growth of the technology industry. Salesforce is a leading customer relationship management…",https://medium.com/@mineshj1291/empowering-businesses-the-impact-of-salesforce-mastercard-cloud-engineering-and-data-science-on-503184c7a95?source=topics_v2---------151-84--------------------87821beb_3882_40d8_98e2_402872020b9d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-computing 2419,1360,Secrets to Success: What Hiring Managers Look for in Six Figure Cloud Architect Candidates,"Cloud computing is revolutionizing the way that businesses operate, and has created a high demand for skilled Cloud Architects. Cloud Architects are highly trained professionals responsible for designing, implementing, and managing cloud infrastructures, and they are in high demand. According to Payscale, the average salary for a Cloud Architect is…",https://medium.com/acethecloud/secrets-to-success-what-hiring-managers-look-for-in-six-figure-cloud-architect-candidates-b73236680fa1?source=topics_v2---------152-84--------------------87821beb_3882_40d8_98e2_402872020b9d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JotN39iXv8kksKhHkkq04g.png,cloud-computing 2420,1791,Using AI to Generate AWS CloudFormation Templates with Website Hosting Enabled,"ChatGPT To Generate AWS CloudFormation with Website Enabled Introduction AWS CloudFormation is a powerful tool for creating and managing AWS resources in a declarative way. It allows you to define your infrastructure as code, making it easier to manage and scale your application. In this tutorial, we'll explore how to use…",https://medium.com/gitconnected/using-ai-to-generate-aws-cloudformation-templates-with-website-hosting-enabled-f67d36e076a3?source=topics_v2---------154-84--------------------87821beb_3882_40d8_98e2_402872020b9d-------17,https://miro.medium.com/v2/resize:fill:140:140/0*p-luW9MKLCr5TAfq,cloud-computing 2421,1850,💻 From House Cleaning to Cloud Computing: The Power of Services! 🎉,"🚀 Hey, Marvel fans! It’s Swami K, taking a break from tinkering with my Iron Man suit to chat with you on the ‘Coffee Bytes with The Cloud’ podcast. Today, we’ll talk about computing services, so let’s dive in! 💻 🌩️ Cloud Services: like hiring a superhero to tackle your…",https://medium.com/@iswamik/from-house-cleaning-to-cloud-computing-the-power-of-services-baa5f9a06819?source=topics_v2---------155-84--------------------87821beb_3882_40d8_98e2_402872020b9d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QbcmjvnkHO0t5XOgQ5ZtsA.png,cloud-computing 2422,1837,Writing Terraform custom code for unsupported resources in Brainboard 🍟,"Terraform, open-source infrastructure as code software tool developed by HashiCorp, enables users to define and provision an infrastructure using a high-level configuration language. Brainboard supports a wide range of resources from major cloud providers (AWS, Azure, OCI & GCP), but sometimes it may not support the specific resource that you…",https://medium.com/@mike_tyson_cloud/writing-terraform-custom-code-for-unsupported-resources-a8b6764fcbe0?source=topics_v2---------156-84--------------------87821beb_3882_40d8_98e2_402872020b9d-------17,https://miro.medium.com/v2/resize:fill:140:140/0*kcNUP9gDascNVpJZ.png,cloud-computing 2423,1885,Automating Cloud Infrastructure with Terraform Cloud: A Deep Dive into its Capabilities,"In this blog, we will discover how Terraform Cloud can help you streamline your cloud infrastructure management process and we will explore the powerful features that make it a must-have tool for cloud infrastructure management. We will deliver the reasons why Terraform Cloud is essential, highlighting its capabilities and benefits…",https://medium.com/techbeatly/automating-cloud-infrastructure-with-terraform-cloud-a-deep-dive-into-its-capabilities-9bc9d0aff929?source=topics_v2---------157-84--------------------233694b1_7eeb_43c0_9f90_2051d57e9134-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6twSStM0F4Ki4ESHuJZilA.png,cloud-computing 2424,1886,Top 5 Not-So Popular Open Source DevOps Tools,Tools … Tools … DevOps Tools! — DevOps has become an essential part of the software development process. It is a set of practices that combine software development and IT operations to increase the speed of delivery and improve the quality of software. Each tool has there specific use case and it may be possible that some…,https://medium.com/@shahneil/top-5-not-so-popular-open-source-devops-tools-9a040f93d3c9?source=topics_v2---------158-84--------------------233694b1_7eeb_43c0_9f90_2051d57e9134-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*fGbMH5UP95ffJniaPlpfYw.gif,cloud-computing 2425,117,AWS Architecting (10 questions) Part 4,"1)A retailer is using Amazon RDS for an online shopping store. They recently started a new sales promotion, which requires customers to access their purchase history. The database is configured in a Multi-AZ deployment. Since the primary database is used for live purchase transactions, the influx of queries is causing…",https://medium.com/@jacqmkindi/aws-architecting-10-questions-part-4-101c8c6f7c46?source=topics_v2---------159-84--------------------233694b1_7eeb_43c0_9f90_2051d57e9134-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PKEneacJfuV5mI08z9ahWA.png,cloud-computing 2426,1887,Navigating the Cloud,"A Guide to Choosing the Right Service Provider — GCP, AWS & Azure Comparison — As businesses continue to embrace digital transformation and the power of data analytics, the adoption of cloud computing has become essential. Cloud computing offers many benefits, such as cost savings, scalability, and improved agility, making it an attractive choice for companies of all sizes. However, selecting the right cloud service…",https://medium.com/@monge/navigating-the-cloud-c544ca52788?source=topics_v2---------160-84--------------------233694b1_7eeb_43c0_9f90_2051d57e9134-------17,https://miro.medium.com/v2/resize:fill:140:140/1*UHUfpK0BfUxTiZfy_Rrzzw.png,cloud-computing 2427,1888,"Who, What, Why Docker Swarm? Basic Intro to Docker Orchestration","So from previous article, now we know that containers streamline the build, test, and deploy stages of SDLC (Software Development Lifecycle). Developers can pre-package an application’s software, dependencies, and configurations into an image, like a file, with steps to build it. …",https://medium.com/aws-in-plain-english/who-what-why-docker-swarm-basic-intro-to-docker-orchestration-99f077ad11cb?source=topics_v2---------161-84--------------------233694b1_7eeb_43c0_9f90_2051d57e9134-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MC_isvqe8gvsdPiv3z30nQ.jpeg,cloud-computing 2428,1791,Unleashing the Power of Structured Logging in AWS Lambda with TypeScript and CDK: A Comprehensive Guide,Streamline Your AWS Lambda Function Logging with Structured Logging in AWS CloudWatch Using TypeScript and AWS CDK Learn how to optimize your AWS Lambda function logging with structured logging in AWS CloudWatch using TypeScript and AWS CDK. This comprehensive guide covers everything you need to know to set up and…,https://medium.com/illumination/unleashing-the-power-of-structured-logging-in-aws-lambda-with-typescript-and-cdk-a-comprehensive-3fbf3ff3ad27?source=topics_v2---------162-84--------------------233694b1_7eeb_43c0_9f90_2051d57e9134-------17,https://miro.medium.com/v2/resize:fill:140:140/0*1c3K-BcX6ueBEKqw,cloud-computing 2429,1889,How to transfer an Amazon Lightsail instance to another AWS account,Amazon Lightsail is a beginner-friendly virtual private server (VPS) service from Amazon Web Services (AWS) that makes it easy to launch and manage a VPS instance without requiring extensive technical knowledge. What’s not so easy anymore is transferring your existing Lightsail instance to another AWS account. Amazon doesn’t let you…,https://medium.com/@iggyblob/how-to-transfer-an-amazon-lightsail-instance-to-another-aws-account-56136c407f8a?source=topics_v2---------163-84--------------------233694b1_7eeb_43c0_9f90_2051d57e9134-------17,https://miro.medium.com/v2/resize:fill:140:140/0*uMcv-msXHKJ7XwEc,cloud-computing 2430,1859,Understanding and Implementing Recording Rules in Prometheus,Prometheus is an open-source monitoring system that is widely used in the industry to monitor the health and performance of applications and infrastructure. One of the key features of Prometheus is its ability to define recording rules. Recording rules allow users to create new time-series data based on existing data…,https://medium.com/@msalinas92/understanding-and-implementing-recording-rules-in-prometheus-b100c3ab223c?source=topics_v2---------164-84--------------------233694b1_7eeb_43c0_9f90_2051d57e9134-------17,https://miro.medium.com/v2/resize:fill:140:140/0*yc_3iNrDbUxdA2_g.png,cloud-computing 2431,208,What is AWS Glue,"Introduction Amazon Web Services offers a fully managed ETL (Extract, Transform, and Load) solution called AWS Glue. It allows you to quickly and efficiently extract data from various sources, transform it as required, and load it into data stores such as Amazon S3, Redshift, and relational databases. With AWS Glue, you…",https://medium.com/@ip-specialist/what-is-aws-glue-2ef8ffa7bcaa?source=topics_v2---------165-84--------------------233694b1_7eeb_43c0_9f90_2051d57e9134-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tlA7CQJkgYUFK1OSijo76g.jpeg,cloud-computing 2432,1890,MultiCloud Federation — Microsoft Azure and Oracle Cloud Infrastructure using Single Sign-On for Teams Authentication,"Project description: In this project based on a real scenario, I was responsible for designing and implementing a MultiCloud architecture, by performing a MultiCloud federation of users and groups between Azure Active Directory and OCI IAM. There were multiple users who needed to authenticate to both Microsoft Azure and Oracle…",https://medium.com/@cansutekin23/multicloud-federation-microsoft-azure-and-oracle-cloud-infrastructure-using-single-sign-on-for-664d3bdb8a4c?source=topics_v2---------166-84--------------------e9a8d58e_dd37_496c_a7cc_4f1774214a40-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kexgiUB2hWvhNeBzUdN-iw.png,cloud-computing 2433,1891,Kubernetes — A super simple and crisp beginner’s guide (Part 1),"Have you ever visited a website that just won’t load or experienced an app that keeps crashing? Frustrating, isn’t it? As a user, we expect applications to work seamlessly and efficiently. …",https://medium.com/@runningtardy/kubernetes-a-super-simple-and-crisp-beginners-guide-part-1-827603d10559?source=topics_v2---------167-84--------------------e9a8d58e_dd37_496c_a7cc_4f1774214a40-------17,https://miro.medium.com/v2/resize:fill:140:140/0*b9-StUn1gTliVR2z.jpg,cloud-computing 2434,1892,Cloud Quest: The Egg on a Great Burger!,During my preparation for AWS’s Solution Architect certification (Saa-c03). I decided to go through with the lesson plan for the interactive edutainment presentation known as AWS Cloud Quest. I skipped the cloud practitioners’ course since it was included in the solutions architect track of lessons. Things were moving along smoothly…,https://medium.com/@matthewtdejesus/cloud-quest-the-egg-on-a-great-burger-6c580baec34e?source=topics_v2---------168-84--------------------e9a8d58e_dd37_496c_a7cc_4f1774214a40-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-computing 2435,1360,"A Step-by-Step Guide to Calculating SLAs, SLIs, and SLOs for Your IT Services","Service Level Agreements (SLAs), Service Level Indicators (SLIs), and Service Level Objectives (SLOs) are critical metrics for measuring the performance and reliability of IT services. These metrics provide valuable insights into the quality of service provided to customers and help teams identify areas for improvement. …",https://medium.com/acethecloud/a-step-by-step-guide-to-calculating-slas-slis-and-slos-for-your-it-services-6f0a07b67bb5?source=topics_v2---------169-84--------------------e9a8d58e_dd37_496c_a7cc_4f1774214a40-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ZRuB0Jl_8EKs9V4tfPBn1g.png,cloud-computing 2436,1893,01.02 — IT INFRASTRUCTURE,"01. What is a server Machine? Unlike personal computers, server machines are made up of several different components and subcomponents. At the hardware level servers are typically made up of a rack mount chassis containing a power supply, a system board, one or more CPUs, memory, storage, a network interface, and a power supply. A server…",https://medium.com/data-shastra/01-02-it-infrastructure-f25db3f63441?source=topics_v2---------170-84--------------------e9a8d58e_dd37_496c_a7cc_4f1774214a40-------17,https://miro.medium.com/v2/resize:fill:140:140/0*z2pn6QFA1Urca3np,cloud-computing 2437,1360,Implementing Data Mesh: Real-World Examples and Best Practices,"Data Mesh is a relatively new concept in the world of data architecture. It is a distributed architecture that is designed to handle large volumes of data, which can be accessed by different business units within an organization. …",https://medium.com/acethecloud/implementing-data-mesh-real-world-examples-and-best-practices-5e7becd2081f?source=topics_v2---------171-84--------------------e9a8d58e_dd37_496c_a7cc_4f1774214a40-------17,https://miro.medium.com/v2/resize:fill:140:140/1*w8_D8TC3fBWsOhJi0GSlrQ.png,cloud-computing 2438,1894,Improve application resilience with Azure Chaos Studio,"Breakdowns are inevitable; nowadays, developers are driven to consider built-in resilience an obligation rather than an option. Chaos engineering disciplines developers to build confidence in systems and break systems on purpose so weaknesses can be found and fixed before they break when least expected. …",https://medium.com/itnext/improve-application-resilience-with-azure-chaos-studio-eaabd8e983f9?source=topics_v2---------172-84--------------------e9a8d58e_dd37_496c_a7cc_4f1774214a40-------17,https://miro.medium.com/v2/resize:fill:140:140/0*TMjj50DtNvJrOxQH.jpg,cloud-computing 2439,1895,All you need to know about containers …,"Content: A simple explanation of Containers Virtualization vs. Containerization Key Components of Containerization Container Isolation Layers in Containerization Network Namespaces Container Network in a Cluster Conclusion A simple explanation of Containers: A container is like a little box that has everything a computer program needs to run, like all the pieces of a puzzle. It’s a…",https://medium.com/@olga.woschitz/all-you-need-to-know-about-containers-f2e93c2e5e8?source=topics_v2---------173-84--------------------e9a8d58e_dd37_496c_a7cc_4f1774214a40-------17,https://miro.medium.com/v2/resize:fill:140:140/0*0ifr5eDZy-HZsLxC,cloud-computing 2440,1775,Streamline Your CI/CD Workflow with AWS CDK’s Code-Defined Infrastructure,"Effortlessly Deploy to AWS with AWS CDK and GitHub: A Step-by-Step Tutorial Automating Software Delivery with AWS CDK and CodePipeline Are you tired of manually deploying code changes and dealing with errors and downtime? Look no further than continuous integration and continuous deployment (CI/CD) pipelines! These pipelines automate the process of building, testing, and deploying code changes, helping…",https://medium.com/@reigadacaleb/streamline-your-ci-cd-workflow-with-aws-cdks-code-defined-infrastructure-3fa821c5d828?source=topics_v2---------174-84--------------------e9a8d58e_dd37_496c_a7cc_4f1774214a40-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JLGZKmjYskhtbCJHum2zfA.png,cloud-computing 2441,117,"Highly Available Dynamic Site-to-Site VPN, BGP based, On-Premises to Hybrid AWS","In this advanced demo I implement a Dynamic, BGP Based, Highly Available Site-to-Site VPN. The demo simulates a Hybrid AWS and On-premises environment — both using AWS. The demo consists of 5 stages, each implementing additional components of the architecture Stage 1 — Provision the environments Stage 2 — TGW…",https://medium.com/@jacqmkindi/highly-available-dynamic-site-to-site-vpn-bgp-based-on-premises-to-hybrid-aws-cacdff65c0e?source=topics_v2---------175-84--------------------bd512c72_4fc4_4202_beea_7199ecd90713-------17,https://miro.medium.com/v2/resize:fill:140:140/0*LE9JwuLkVaTHPCXX.png,cloud-computing 2442,1008,“Compliance in the Cloud: Best Practices for Meeting Regulatory Requirements” #CloudSecurity,"Cloud Security Fundamentals for beginners | Cloud Security Risks and How to Mitigate Them | How does Cloud Security Work and more … This is the last post in the #CloudSecurity series. We’ve reached the end of our cloud security series, and I hope you’ve enjoyed it and gained valuable…",https://medium.com/@avnishpathak1206/compliance-in-the-cloud-best-practices-for-meeting-regulatory-requirements-cloudsecurity-950ecd31f3fd?source=topics_v2---------176-84--------------------bd512c72_4fc4_4202_beea_7199ecd90713-------17,https://miro.medium.com/v2/resize:fill:140:140/0*TLIBxCWQxfBPnzJs.png,cloud-computing 2443,1896,"AWS vs GCP, Which is the Best? 🌤️","Cloud computing is a buzzword nowadays and is considered the next big thing in the IT industry. With cloud computing, businesses can store, manage and process their data on the cloud, which provides many benefits such as scalability, cost-effectiveness, reliability, and flexibility. In the cloud computing world, Amazon Web Services…",https://medium.com/@roshanearth/aws-vs-gcp-which-is-the-best-️-36761a153864?source=topics_v2---------177-84--------------------bd512c72_4fc4_4202_beea_7199ecd90713-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CSN-sd6H6zrxkoLwpsuq5w.jpeg,cloud-computing 2444,1897,Best Practices for AWS Organizations,"Save time, money, and effort across your accounts Organizations is a service from AWS that is incredibly useful. According to AWS documentation: “AWS Organizations is an account management service that enables you to consolidate multiple AWS accounts into an organization that you create and centrally manage” Imagine what a nightmare…",https://medium.com/@denverd1301/best-practices-for-aws-organizations-ce903a8297fd?source=topics_v2---------178-84--------------------bd512c72_4fc4_4202_beea_7199ecd90713-------17,https://miro.medium.com/v2/resize:fill:140:140/0*-wUwpzaCCQmmHmEl,cloud-computing 2445,1898,Speed Demons: Why Your Business Needs Fast AWS Databases,"Revving Up Your AWS Experience — In the fast-paced world of technology, speed is of the essence. As data volumes grow exponentially, businesses require efficient and responsive database solutions. Amazon Web Services (AWS) provides a range of powerful database options designed to deliver exceptional performance, scalability, and reliability. …",https://medium.com/trendfingers/speed-demons-why-your-business-needs-fast-aws-databases-93673b698390?source=topics_v2---------179-84--------------------bd512c72_4fc4_4202_beea_7199ecd90713-------17,https://miro.medium.com/v2/resize:fill:140:140/1*u90zBf0k1ZHUVEIXD9QYUA.png,cloud-computing 2446,1899,Load Balancer,What is a load balancer ? Load balancing is a technique for equally distributing network traffic across a pool of resources that support an application. Functions of the Load Balancer Allocates client requests or network load across multiple servers in an efficient manner. Ensures high availability and reliability. Provides the…,https://medium.com/cloudnloud/load-balancer-f07ba3ce14b8?source=topics_v2---------180-84--------------------bd512c72_4fc4_4202_beea_7199ecd90713-------17,https://miro.medium.com/v2/resize:fill:140:140/1*D5ZhECvKETABfV0U4ZXcHQ.jpeg,cloud-computing 2447,923,📍 “𝐅𝐫𝐨𝐦 𝐙𝐞𝐫𝐨 𝐭𝐨 𝐂𝐥𝐨𝐮𝐝 𝐇𝐞𝐫𝐨:”,📍 “𝐅𝐫𝐨𝐦 𝐙𝐞𝐫𝐨 𝐭𝐨 𝐂𝐥𝐨𝐮𝐝 𝐇𝐞𝐫𝐨:” 𝐃𝐚𝐲 𝟓 𝐨𝐟 𝐭𝐡𝐞 𝟏𝟎𝟎-𝐃𝐚𝐲 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 𝐭𝐨 𝐌𝐚𝐬𝐭𝐞𝐫𝐢𝐧𝐠 𝐂𝐥𝐨𝐮𝐝 𝐂𝐨𝐦𝐩𝐮𝐭𝐢𝐧𝐠. ✌️Amazon EC2✌️ EC2 Basics:- 🎯 EC2 is one of the most popular AWS offerings. 🎯 EC2 = Elastic Compute Cloud = Infrastructure as a Service 𝐼𝑡 𝑚𝑎𝑖𝑛𝑙𝑦 𝑐𝑜𝑛𝑠𝑖𝑠𝑡𝑠 𝑜𝑓 𝑡ℎ𝑒 𝑐𝑎𝑝𝑎𝑏𝑖𝑙𝑖𝑡𝑦 𝑜𝑓 :- 👉🏻 Renting virtual machines (EC2).,https://medium.com/cloudnloud/-2cbecc0add12?source=topics_v2---------181-84--------------------bd512c72_4fc4_4202_beea_7199ecd90713-------17,https://miro.medium.com/v2/resize:fill:140:140/1*78FHVNQ-onfjXdXgAZuV8w.png,cloud-computing 2448,1900,Understanding AWS Lambda Pricing: A Guide to Billing,"AWS Lambda is a serverless computing service that enables developers to run code without managing servers or infrastructure. It automatically scales and executes code in response to events and triggers, making it highly scalable, reliable, and cost-effective. This allows developers to focus on writing code instead of managing infrastructure. …",https://medium.com/@seaflux/understanding-aws-lambda-pricing-a-guide-to-billing-8b05e6e7c928?source=topics_v2---------182-84--------------------bd512c72_4fc4_4202_beea_7199ecd90713-------17,https://miro.medium.com/v2/resize:fill:140:140/1*p0E4XOGsgcCNIPr8VvPw0Q.png,cloud-computing 2449,1901,Cloud Native vs Cloud Agnostic,"The adoption of cloud computing has brought about a new debate in the IT industry: Cloud Agnostic vs Cloud Native. Cloud agnostic and cloud native are two approaches to cloud computing that have their own benefits and drawbacks. In this article, we will delve into what these terms mean, how…",https://medium.com/@badawekoo/cloud-native-vs-cloud-agnostic-30a62ec6f490?source=topics_v2---------183-84--------------------bd512c72_4fc4_4202_beea_7199ecd90713-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tvcLKINfh8SM-QqAHE176A.png,cloud-computing 2450,1902,Home Office Solution during the COVID-19 Pandemic using Microsoft Azure VPN Gateway,"In this real world-based project, I acted as a Cloud Specialist to create a solution for people who were working in the office to start working from home, normally accessing the environment in Microsoft Azure, and without exposing the entire environment to the internet. To solve this business problem and…",https://medium.com/@santoshdabholkar/home-office-solution-during-the-covid-19-pandemic-using-microsoft-azure-vpn-gateway-57c74b04029?source=topics_v2---------184-84--------------------e875b9d1_2bde_4603_928b_c3757b8b5a75-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yPf-mHjYrrulA4Im1Fdapw.png,cloud-computing 2451,910,Kubernetes cluster creation using Kubekey,"“Gratitude is an abstraction in life that creates Happiness. All we have to do is, use it more often and save the time we spend searching for happiness…” Creating and setting up a Kubernetes cluster in the native way is often not straightforward. The administrator usually uses kubeadm to set…",https://medium.com/@asishmm/kubernetes-cluster-creation-using-kubekey-e0282b71fae3?source=topics_v2---------185-84--------------------e875b9d1_2bde_4603_928b_c3757b8b5a75-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ymPGQW0WtVIMRZuB2xdEvg.jpeg,cloud-computing 2452,1903,Top 3 Use Cases of AWS,"Amazon Web Services (AWS) is a popular cloud computing platform used by businesses of all sizes to host their applications, store their data, and manage their IT infrastructure. With its vast array of services, AWS can help businesses streamline their operations, reduce costs, and improve their overall efficiency. …",https://medium.com/@rhdame/top-3-use-cases-of-aws-1a28bb054da?source=topics_v2---------186-84--------------------e875b9d1_2bde_4603_928b_c3757b8b5a75-------17,https://miro.medium.com/v2/resize:fill:140:140/1*u-tkMSdv9kTbeZ71_4NWBA@2x.jpeg,cloud-computing 2453,1904,Optimizing Credit Usage: Effective Ways to Obtain Storage Details for a Specific Snowflake Database,"One of my team members recently requested with calculating the database credits for a project in Snowflake. To calculate the storage space used by a specific Snowflake database, we first need to understand the base metadata view that provides the necessary details. Database_storage_usage_history (View) -> Details about database and Failsfe …",https://medium.com/snowflake/optimizing-credit-usage-effective-ways-to-obtain-storage-details-for-a-specific-snowflake-database-ccff5b19a598?source=topics_v2---------187-84--------------------e875b9d1_2bde_4603_928b_c3757b8b5a75-------17,https://miro.medium.com/v2/resize:fill:140:140/1*riNoIKyRFF8I8vgTRMWgeA.png,cloud-computing 2454,910,AWS VPC Basics,"“Networking is all about connecting people with the intention to share ideas, knowledge and happiness…” Virtual Private Cloud (VPC) is a virtual network provided by AWS for your resources in AWS. So if you need any resource which require networking, you have to create the resource within a VPC. AWS…",https://medium.com/aws-tip/aws-vpc-basics-fb8652660c3b?source=topics_v2---------188-84--------------------e875b9d1_2bde_4603_928b_c3757b8b5a75-------17,https://miro.medium.com/v2/resize:fill:140:140/1*FrfgJTUCj9IcH9pKz-JMxg.jpeg,cloud-computing 2455,1905,🚦Declarative Pipeline in Jenkins for DevOps and CICD,"Day 26 Task: Jenkins Declarative Pipeline — New day, New Topic…. Let’s learn along 😉 One of the most important parts of our DevOps and CICD journey is a Declarative Pipeline Syntax of Jenkins. Here Some terms for your Knowledge What is Pipeline..? Pipeline in DevOps is a continuous delivery process that involves building, testing, and deploying software applications in an automated manner. A pipeline consists…",https://medium.com/@saurabhdahibhate50/declarative-pipeline-in-jenkins-for-devops-and-cicd-4f829cdae0cf?source=topics_v2---------189-84--------------------e875b9d1_2bde_4603_928b_c3757b8b5a75-------17,https://miro.medium.com/v2/resize:fill:140:140/1*IJqTleWsm6HR4K-PTbtKZg.png,cloud-computing 2456,1892,One man’s map to navigating the torrential waters of IT p1. The voyage.,Greetings all My name is Mateo DeJesus I’m currently a Support Engineer at NetApp as well as an AWS Community Builder. I wanted to do my best to help others looking to transition from one career to the next by talking about portions of my journey in IT. In 2012…,https://medium.com/@matthewtdejesus/one-mans-map-to-navigating-the-torrential-waters-of-it-p1-the-voyage-a906ac220cac?source=topics_v2---------190-84--------------------e875b9d1_2bde_4603_928b_c3757b8b5a75-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-computing 2457,1859,An Overview of Kubernetes Services,"In Kubernetes, Services are an abstraction that enable communication between different components running in a cluster. Services provide a stable, virtual IP address (ClusterIP) or a DNS name (ExternalName) that can be used to access a set of Pods that perform the same function. There are four types of Services…",https://medium.com/@msalinas92/an-overview-of-kubernetes-services-580a9de4c590?source=topics_v2---------191-84--------------------e875b9d1_2bde_4603_928b_c3757b8b5a75-------17,https://miro.medium.com/v2/resize:fill:140:140/0*4gh0KR2L9CR06o93.png,cloud-computing 2458,1906,What is Cloud-Native? What is Cloud-Native? Exploring the Next Frontier of Cloud Computing! — Ozone,"Hello and welcome to the world of cloud-native computing, where applications are developed to run natively in the cloud while utilizing the flexibility offered by a microservices architecture, reliability through automation, and scalability through containerization. Cloud-Native empowers your organization to develop and deploy applications faster, reliably, and more scalable than…",https://medium.com/@ozone_cicd/what-is-cloud-native-what-is-cloud-native-exploring-the-next-frontier-of-cloud-computing-ozone-6a4f3067db42?source=topics_v2---------192-84--------------------e875b9d1_2bde_4603_928b_c3757b8b5a75-------17,https://miro.medium.com/v2/resize:fill:140:140/0*8-t90ZNIck74ouNj.jpg,cloud-computing 2459,1893,01.03 — IT INFRASTRUCTURE,"01. What are the different types of infrastructure? The two primary types of infrastructure are traditional infrastructure and cloud infrastructure. Traditional infrastructure: Traditional infrastructure is made up of usual hardware and software components, facilities, data centers, servers, networking hardware, desktop computers, and enterprise application software solution. Typically, this infrastructure setup requires more power, physical space, and money than other infrastructure…",https://medium.com/data-shastra/01-03-it-infrastructure-68e668c4ffad?source=topics_v2---------193-84--------------------e875b9d1_2bde_4603_928b_c3757b8b5a75-------17,https://miro.medium.com/v2/resize:fill:140:140/0*qT5PozSdXAk8xS6p,cloud-computing 2460,1907,(Foundation) Models as a Service: Big Tech’s Future AI Revenue Stream,The Generative AI Gold Rush for Big Tech and Startups About the Author: Jason is an Investment Fellow at Thornapple. He brings both operating and investing experience through his tenure at several tech companies as a data scientist and across a variety of venture capital firms as an investor. Prior…,https://medium.com/thornapple-river-capital/foundation-models-as-a-service-big-techs-future-ai-revenue-stream-6ee9caebb7ff?source=topics_v2---------194-84--------------------38763f56_b82e_4882_b475_f76ae2d0dff2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zwB2KbM2xneSyxtxoo85pg.png,cloud-computing 2461,1908,What is Cloud Computing? A Detailed Guide for Beginners,"In the past, we used to store programs and data on our computer’s hard disk and access them whenever necessary. This traditional method of computing has been prevalent for a long time. However, with the advancement of technology, we no longer need to store everything on our physical hard disks…",https://medium.com/@buzzedison/what-is-cloud-computing-a-detailed-guide-for-beginners-16f2e3f5d672?source=topics_v2---------195-84--------------------38763f56_b82e_4882_b475_f76ae2d0dff2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*YlrISMedSY8uOW7i,cloud-computing 2462,1909,Cudos — A Revolutionary Platform for Decentralized Cloud Computing,"In recent years, the world of blockchain and decentralized technologies has been growing at an unprecedented rate. These innovative technologies have the potential to transform industries, disrupt traditional business models, and empower individuals by providing new levels of security, transparency, and control over their digital lives. One area where blockchain…",https://medium.com/@investgang/cudos-a-revolutionary-platform-for-decentralized-cloud-computing-bf22ba77fcef?source=topics_v2---------196-84--------------------38763f56_b82e_4882_b475_f76ae2d0dff2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PS9YE0llYYGq1XyjUg_gmw.jpeg,cloud-computing 2463,1910,CUDOS: The Future of Blockchain with Gamified Digital Realities and Community Governance,"The blockchain revolution has taken the world by storm, with decentralized finance (DeFi) and non-fungible tokens (NFTs) leading the charge. However, as the blockchain ecosystem continues to evolve, there is a growing need for innovative platforms that can offer more immersive, gamified experiences to users. Enter Cudos, a Layer 1…",https://medium.com/@basirahmad290/cudos-the-future-of-blockchain-with-gamified-digital-realities-and-community-governance-34f052cf6890?source=topics_v2---------197-84--------------------38763f56_b82e_4882_b475_f76ae2d0dff2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xnqNL0RRYLHg7st6VvEzkg.jpeg,cloud-computing 2464,113,"DevOps in K8s — StatefulSets, Part Two","DevOps in K8s bootcamp series — Note, full “DevOps in K8s” mind map is available at: “DevOps in K8s Mind Map” In “DevOps in K8s — StatefulSets, Part One”, I introduced the concept of K8s StatefulSets and Headless service, let’s continue exploring StatefulSets in this article. StatefulSets Demo Let’s start with a demo first. Headless Service We will reuse the…",https://medium.com/dev-genius/devops-in-k8s-statefulsets-part-two-48d59d222012?source=topics_v2---------198-84--------------------38763f56_b82e_4882_b475_f76ae2d0dff2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Dpyv1BQljac9vov9.png,cloud-computing 2465,1911,“The Future is here: Embrace Cloud Computing and Revolutionize Your Work Flow Today!”,"“The Future is here: Embrace Cloud Computing and Revolutionize Your Work Flow Today!” Table Of Content Introduction Prerequisites Overview What Is Cloud Computing Characteristics Of Cloud Computing What are the types of Cloud Computing Types of Cloud Computing Services. Serverless computing Conclusion Introduction In this article, I shared the knowledge I've…",https://medium.com/@debbyelsie/table-of-content-3730af4d8f58?source=topics_v2---------200-84--------------------38763f56_b82e_4882_b475_f76ae2d0dff2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*diHit0reaWxQiaZ_76yGtw.jpeg,cloud-computing 2466,1912,Connect to AWS RDS MySQL Using phpMyAdmin With AWS Lightsail Ubuntu,"Learn how to access the MySQL using PhpMyAdmin from AWS Lightsail server in step by step tutorial. In this article, you will learn how to access MySQL(AWS RDS) using phpMyAdmin. Previously we have seen how to setup the AWS RDS MySQL. PhpMyAdmin is a very popular tool for connecting with…",https://medium.com/@bharathirajatut/connect-to-aws-rds-mysql-using-phpmyadmin-with-aws-lightsail-ubuntu-a306ec6f7163?source=topics_v2---------201-84--------------------38763f56_b82e_4882_b475_f76ae2d0dff2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*C2JJ_R1KeZ1XzHC8OXz-uA.png,cloud-computing 2467,1913,Pros and Cons of Different Cloud Computing Platforms,"Pros and Cons of Different Cloud Computing Platforms Cloud computing has taken over the IT industry, allowing people to store files, documents, images, and other media securely online. It has significant benefits over traditional storage, making data accessible to everyone while ensuring security. …",https://medium.com/predict/pros-and-cons-of-different-cloud-computing-platforms-f324d055f42f?source=topics_v2---------202-84--------------------38763f56_b82e_4882_b475_f76ae2d0dff2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ZPFujo01gID9pNUdI7JR4w.png,cloud-computing 2468,1914,Getting Started with AWS SDK — S3 Bucket operations using Node Js,"What is AWS-SDK? AWS SDK (software development kit) helps simplify your coding by providing JavaScript objects for AWS services. It allows developers to access AWS from JavaScript code that runs directly in the browser. It includes access to AWS components like Amazon S3, Amazon SNS, Amazon SQS, DynamoDB, and more. What is S3 Bucket? An Amazon S3…",https://medium.com/@syedshamail3/getting-started-with-aws-sdk-s3-bucket-operations-using-node-js-1ee1b9a597f5?source=topics_v2---------203-84--------------------38763f56_b82e_4882_b475_f76ae2d0dff2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*J0h4171CHoRcNdNWRHxfAw.png,cloud-computing 2469,1915,Authentication and Configuration,"To connect to your cloud provider like AWS you need Authentication and configuration. Configuration for the AWS Provider can be derived from several sources, which are applied in the following order: 1. ‘Parameters in the provider configuration’ 2. Environment variables 3. Shared credentials files 4. Shared configuration files 5. Container…",https://medium.com/@vijayayvl/authentication-and-configuration-2c096c398379?source=topics_v2---------204-84--------------------65dea83c_1f0e_4e83_83b7_3f179b071770-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BsXl8TqbtLqFhr2UBmnOYA.png,cloud-computing 2470,1916,Create an Auto-Scaling group of EC2 Instances with an ALB,"Introduction Hi everyone. Welcome back to another one of my projects as we dive deeper into AWS. Do you remember when I had to create an EC2 Instance with a web server for a bank to test? Well, now they decided to move their network to the cloud. It will improve…",https://medium.com/@james.flermoen/create-an-auto-scaling-group-of-ec2-instances-with-an-alb-7052aa7773f1?source=topics_v2---------206-84--------------------65dea83c_1f0e_4e83_83b7_3f179b071770-------17,https://miro.medium.com/v2/resize:fill:140:140/1*eOZlVTRuIpc_vediO0PypQ.jpeg,cloud-computing 2471,113,DevOps in Go — Struct,"DevOps in Go bootcamp series — Before learning how to define a struct type, let’s first look at how to define a new type in Go. With this foundation, it is very natural for us to understand the definition method of the structure type. In Go, we generally have two ways to customize a new type: …",https://medium.com/@tonylixu/devops-in-go-struct-a1cd0adbde22?source=topics_v2---------207-84--------------------65dea83c_1f0e_4e83_83b7_3f179b071770-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QWY7sMUGtrFVgk_nNZiuzg.png,cloud-computing 2472,1917,Hybrid Cloud vs. Super Cloud: Which is Right for You?,"Cloud computing is a hot topic these days, and for good reason. It offers a number of advantages over traditional on-premises infrastructure, including scalability, flexibility, and cost savings. But with so many different cloud computing options available, it can be tough to decide which one is right for your business. …",https://medium.com/@zilhaz/hybrid-cloud-vs-super-cloud-which-is-right-for-you-7d5a4c15282b?source=topics_v2---------209-84--------------------65dea83c_1f0e_4e83_83b7_3f179b071770-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Q999zLHSEZWKy_xo9CXt7g.jpeg,cloud-computing 2473,1918,Cloud Tagging (part #1)- Tagging 101,"The goal of this series of cloud tagging blogs is to help cloud infrastructure/ SRE, FinOps as well as Finance teams to enable cloud cost reporting and cultivate a culture of cost awareness within engineering teams. …",https://medium.com/@thecloudeconomist/cloud-tagging-part-1-tagging-101-a38325a1f3e1?source=topics_v2---------1-84--------------------bffadc46_61e8_4070_8e1e_0577d70536d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*iu15evI0Z1iDk9HPFyGvlA.png,cloud-services 2474,1919,Getting started with AWS SQS,"Amazon Simple Queue Service, or SQS, is a fully managed message queuing service that enables the decoupling and scaling of distributed systems. SQS allows you to send, store, and receive messages between different software components without requiring them to be directly connected to each other. …",https://medium.com/@theindiantechie/getting-started-with-aws-sqs-f9181d4fb93b?source=topics_v2---------3-84--------------------bffadc46_61e8_4070_8e1e_0577d70536d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wHKILYnJCiobXsvMDVvcQQ.jpeg,cloud-services 2475,117,Executive Presentation of Infrastructure costs for an SAP Migration project from On-Premises to AWS,"In this project based on a real-world scenario, I acted as a Cloud Architect and created an executive presentation of infrastructure costs for a SAP migration project from On-Premises to AWS. SAP workloads were running in a corporate Data Center with the environment divided into Production, Quality Assurance — QA…",https://medium.com/@jacqmkindi/executive-presentation-of-infrastructure-costs-for-an-sap-migration-project-from-on-premises-to-aws-4d4de9ada91f?source=topics_v2---------4-84--------------------bffadc46_61e8_4070_8e1e_0577d70536d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CSk5kCgbgZSYVyP0KbUK-g.png,cloud-services 2476,1140,Revolutionizing Content Management with a Cloud-Based Solution,"Box Company is a cloud content management company that has been leading the industry since 2005. Headquartered in Redwood City, California, the company’s cloud-based platform is transforming the way businesses manage and collaborate on their content. Enhancing Collaboration with Box Company’s Cloud-Based Platform Box Company’s cloud-based platform enables businesses to collaborate more effectively than ever before.",https://medium.com/@tania_40813/revolutionizing-content-management-with-a-cloud-based-solution-e8f474429cea?source=topics_v2---------5-84--------------------bffadc46_61e8_4070_8e1e_0577d70536d8-------17,https://miro.medium.com/v2/resize:fill:140:140/0*mSuW0FSICdCR9dtY,cloud-services 2477,1920,Onyx Cloud is Now Upgraded to 10GB Free Storage with More Times of OCR Functions,"Check out the latest benefits with the Onyx cloud service upgrade. — We are thrilled to announce that starting March 30th, 2023, both our new and existing registered users can now enjoy an expanded Onyx cloud storage from 5GB to 10GB, and the beta launch of the increased times of free OCR functions from 10 per day to 300 per day. With…",https://medium.com/@onyxboox/onyx-cloud-is-now-upgraded-to-10gb-free-storage-with-more-times-of-ocr-functions-5492f041ee3f?source=topics_v2---------6-84--------------------bffadc46_61e8_4070_8e1e_0577d70536d8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*aD07bgSO88dFM-NjGd-BUw.jpeg,cloud-services 2478,1921,"Cloud Databases: Modern Approach in IT. Part 1. (by Illya Reznykov, Europe Lead of Cloud Practice and Arkadiusz Ryszewski, Senior Fullstack Engineer)","Almost any technology project requires a database, and throughout the history of the contemporary world, databases have been indispensable. Every time we make an online purchase, log in to a site, watch a show on a streaming service, access our bank accounts, etc, we unwittingly engage with databases. …",https://medium.com/@svitlasystems/cloud-databases-modern-approach-in-it-5c670623df7b?source=topics_v2---------8-84--------------------bffadc46_61e8_4070_8e1e_0577d70536d8-------17,https://miro.medium.com/v2/resize:fill:140:140/0*dpnFjopWEPaUk7oq.png,cloud-services 2479,1922,Newsletter Welcome Journey,"Salesforce Marketing Cloud Case Study #2 — Considerations This is a fictional project built within Marketing Cloud’s platform for learning objectives. None of the steps below were implemented for real. The access to Marketing Cloud’s platform was provided during a free training, therefore some actions were limited because the permission to some tools and functions were unavailable. …",https://medium.com/@rebecacoliv/newsletter-welcome-journey-e5a2e3cd88f7?source=topics_v2---------10-84--------------------e4a0de2a_1da0_4bae_96a2_3bb80e833513-------17,https://miro.medium.com/v2/resize:fill:140:140/1*t8mHQ0X1bNE81yeccD_N3g.png,cloud-services 2480,1923,Top 10 TV Shows that Feature Augmented Reality and Virtual Reality,"Are you fascinated by the idea of augmented reality and virtual reality becoming more prevalent in our everyday lives? With advancements in cloud technology and 3D asset management, producing these mixed reality genre series are becoming a lot easier. Here are 10 must-see shows that echo3D recommends for furthering your…",https://medium.com/echo3d/top-10-tv-shows-that-feature-augmented-reality-and-virtual-reality-26ad6d771bb8?source=topics_v2---------11-84--------------------e4a0de2a_1da0_4bae_96a2_3bb80e833513-------17,https://miro.medium.com/v2/resize:fill:140:140/0*3ZGPhbaLoiRmhEB2,cloud-services 2481,1924,What is a Cloud Hygiene and why is it important even for early startups that have free cloud credits,"Hi Friends, I wrote this over the weekend, as I’m not a great party or cocktail person🤪, so I thought it would be valuable for all of us if I spend some time on sharing with you my experience on why it is so important to have the right cloud…",https://medium.com/@ashot_79302/what-is-a-cloud-hygiene-and-why-is-it-important-even-for-early-startups-that-have-free-cloud-15c81d2e4dd1?source=topics_v2---------17-84--------------------e4a0de2a_1da0_4bae_96a2_3bb80e833513-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-services 2482,1925,Transform Your Audio Files with Ease: Effortlessly Transcribe and Translate at Scale with Google Cloud,"In this article, we will discuss how to transcribe and translate speech using the UI interface of the Google Cloud platform. This article differs from the previous one, which focused on live translation. Here, we will learn how to transcribe audio files in the GCP UI interface. The audio file…",https://medium.com/@a102302301_23985/transform-your-audio-files-with-ease-effortlessly-transcribe-and-translate-at-scale-with-google-732a4056d99d?source=topics_v2---------18-84--------------------e4a0de2a_1da0_4bae_96a2_3bb80e833513-------17,https://miro.medium.com/v2/resize:fill:140:140/1*UL4VvU9gm0V3WWGS17JEqQ.jpeg,cloud-services 2483,1926,The AWS CLI (Command Line Interface) Version 2,"What is new? The AWS cloud platforms expands every second, lets take a quick peak about their latest CLI Version 2 update. The AWS CLI (Command Line Interface) version 2 is a tool that allows you to interact with Amazon Web Services (AWS) using commands typed into a terminal or…",https://medium.com/aws-in-plain-english/the-aws-cli-command-line-interface-version-2-81aa8bd41be2?source=topics_v2---------19-84--------------------e4a0de2a_1da0_4bae_96a2_3bb80e833513-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5o4ixEo9B_dBgWjFkbTeow.jpeg,cloud-services 2484,1927,Are 95% of the cloud security breaches due to human errors?,"We are at a point of time wherein if your organisation is not on the cloud, it makes you feel that you are doing something terribly wrong. Migrating to cloud has become extremely essential for businesses. Our reasons for the move to cloud could be very different: It could be…",https://medium.com/@jayakumar_s/are-95-of-the-cloud-security-breaches-due-to-human-errors-790eeae4df62?source=topics_v2---------16-84--------------------852f0498_6f47_4124_8a65_aa0a6495f4be-------17,https://miro.medium.com/v2/resize:fill:140:140/0*AFHX9rYPtCCKdtqr,cloud-services 2485,1833,Implementation of a set of EC2 instances using Terraform and AWS Systems Manager configuration with Amazon Simple Notification Service for automated installation of security officers,"Project description: This project is based on a real-world scenario, I acted as DevSecOps Engineer, deploying a set of EC2 instances and infrastructure in an automated way using Terraform (infrastructure as code — IaC) and installed a specific security agent on both EC2 instances in an automated way. Once I…",https://medium.com/@aijazak2/implementation-of-a-set-of-ec2-instances-using-terraform-and-aws-systems-manager-configuration-with-becc7bb3751d?source=topics_v2---------17-84--------------------852f0498_6f47_4124_8a65_aa0a6495f4be-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wxG2p5MaIoAnllysa4hiEg.png,cloud-services 2486,1928,"Achieving a Local-First, Privacy-Centric User Experience with AFFiNE’s Offline Capabilities","How we aim to achieve a local-first, privacy-focussed experience with AFFiNE. Author: Joe Hou At AFFiNE, we embrace the local-first philosophy and strive to provide a seamless user experience that combines the benefits of cloud collaboration while still staying true to our privacy-focused roots and our commitment to offline support…",https://medium.com/@affineworkos/achieving-a-local-first-privacy-centric-user-experience-with-affines-offline-capabilities-bac4addab74d?source=topics_v2---------18-84--------------------852f0498_6f47_4124_8a65_aa0a6495f4be-------17,https://miro.medium.com/v2/resize:fill:140:140/1*WG7En1tyCYn1x9Y80uRrcA.jpeg,cloud-services 2487,1008,“Cloud Security Risks and How to Mitigate Them”,"Cloud Security Fundamentals for beginners | Cloud Security Risks and How to Mitigate Them | How does Cloud Security Work and more … Cloud computing has become an integral part of modern-day business operations, offering many benefits such as scalability, cost savings, and flexibility. However, with the rise of cloud…",https://medium.com/@avnishpathak1206/cloud-security-risks-and-how-to-mitigate-them-c320efee0f74?source=topics_v2---------19-84--------------------852f0498_6f47_4124_8a65_aa0a6495f4be-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MCCH8Gh8kA_DNGXX3Q95Tw.png,cloud-services 2488,1929,Leveraging enclaive’s Confidential Multi-Cloud of Choice,"As businesses become more reliant on digital technologies, the risk of data breaches and cybersecurity threats increases exponentially. Given the concerns about Information and IP security, businesses across industries, even beyond the highly regulated ones, such as healthcare, fintech, and the public sector, are increasingly concerned about their capability to…",https://medium.com/@enclaive/leveraging-enclaives-confidential-multi-cloud-of-choice-9f5c975c7b25?source=topics_v2---------20-84--------------------8e904bb3_1e49_43cd_968a_3025239b8b1b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3OlNZpZZZzvJI7gHPk9vKA.png,cloud-services 2489,1923,🌙 Ramadan Greeting in AR (Shareable) 🌙,"Thursday officially marks the first day of Ramadan for Muslims around the world. The month is a intended to heighten spirituality and teach self discipline, self control, sacrifice and empathy for those that are less fortunate. Muslims fast from sunrise to sunset and this includes water and food. 3D asset…",https://medium.com/echo3d/ramadan-greeting-in-ar-shareable-c93dde90e153?source=topics_v2---------21-84--------------------8e904bb3_1e49_43cd_968a_3025239b8b1b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4YkjwLmAJg74RoYrJiyYoQ.png,cloud-services 2490,1930,Google’s Professional Cloud Architect (PCA) — All GCP services that you need to know in PCA,"Compute: Google Compute Engine (VM): Zonal, Provides virtual machine instances that run on Google’s infrastructure. Instance group (=Auto Scaling Groups) for high availability, scalability: managed(=provide automated scaling, load balancing, autohealing, and rolling updates) (zonal managed instance groups vs regional managed instance groups) and unmanaged Google Kubernetes Engine: Regional, Managed Kubernetes service…",https://medium.com/@lokwa780/all-gcp-services-that-you-need-to-know-in-googles-professional-cloud-architect-pca-77e5e5488d86?source=topics_v2---------22-84--------------------8e904bb3_1e49_43cd_968a_3025239b8b1b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-services 2491,1931,Configuration Validation-Cloud security,"Configurations Arrangement of parts. Oh, I love talking about software configurations! It’s like the spice rack in your kitchen — without the right combination, your dish could turn out bland or even disastrous! Think of it this way: software configurations are like the outfit you wear to a party. You want…",https://medium.com/@sandisiav/configuration-validation-cloud-security-2692913c60f?source=topics_v2---------23-84--------------------8e904bb3_1e49_43cd_968a_3025239b8b1b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*7Fnh2t8--0voj_cK,cloud-services 2492,1932,Build Versus Buy Decisions for Enterprises in the Era of Cloud,"Factors impacting build vs buy decisions for organizations — The decision of whether to build a custom solution or buy an off-the-shelf application has been a constant dilemma for businesses, particularly in the age of cloud computing. …",https://medium.com/@wasimconsulting/build-versus-buy-decisions-for-enterprises-in-the-era-of-cloud-d9041965ff77?source=topics_v2---------24-84--------------------8e904bb3_1e49_43cd_968a_3025239b8b1b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Y92Z-GsWcc4PC4kMTChVlA.jpeg,cloud-services 2493,1008,“How to Secure Your Cloud Infrastructure: A Step-by-Step Guide”,"Cloud Security Fundamentals for beginners | Cloud Security Risks and How to Mitigate Them | How does Cloud Security Work and more … Introduction 😎 Cloud computing has become an essential component of modern IT infrastructure due to its flexibility, scalability, and cost savings. However, securing cloud infrastructure can be challenging due…",https://medium.com/@avnishpathak1206/how-to-secure-your-cloud-infrastructure-a-step-by-step-guide-108fd431795d?source=topics_v2---------25-84--------------------8e904bb3_1e49_43cd_968a_3025239b8b1b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5tS2YXcIusyrxpQhayJWyQ.jpeg,cloud-services 2494,1833,"Implementation of Scalable Application with the help of CloudFront, Auto Scaling, DynamoDB, Cloudwatch, and Elastic Beanstalk.","Project title: Implementation of a Scalable Web Application using the services of AWS Elastic Beanstalk, DynamoDB, CloudFront, and Edge Location Project description: In this project based on a real-world scenario, I was responsible for implementing an application that needs to support the high demand of a large number of users…",https://medium.com/@aijazak2/implementation-of-scalable-application-with-the-help-of-cloudfront-auto-scaling-dynamodb-427e595339e7?source=topics_v2---------26-84--------------------22de55a0_28f3_42fb_b089_394c545dbf33-------17,https://miro.medium.com/v2/resize:fill:140:140/1*mxCDCTUxKMbrrEJtvDT4xA.png,cloud-services 2495,1933,How to resolve error Amazon S3-RequestTimeTooSkewed,"An error occurred (RequestTimeTooSkewed) when calling the ListBuckets operation: The difference between the request time and the current time is too large. I encountered this error while trying to list buckets in my S3 using the CLI How I fixed it : This was fairly simple. Most likely you PC time is not accurate . Check and update your computer time to your presence location time zone.",https://medium.com/@obetopatrick/how-to-resolve-error-amazon-s3-requesttimetooskewed-cb3290122e51?source=topics_v2---------27-84--------------------22de55a0_28f3_42fb_b089_394c545dbf33-------17,https://miro.medium.com/v2/resize:fill:140:140/1*WWs4Fc1T5g1-IPL6VXZqBg.jpeg,cloud-services 2496,1934,The 8 Best Google Drive Alternatives for 2023,"Google Drive has been a popular cloud storage service for many years, offering users the ability to store and share files online. However, there are several reasons why you may want to consider alternatives to Google Drive. …",https://medium.com/@irenemmassyy/the-8-best-google-drive-alternatives-for-2023-39f7ea54f599?source=topics_v2---------28-84--------------------22de55a0_28f3_42fb_b089_394c545dbf33-------17,https://miro.medium.com/v2/resize:fill:140:140/0*9WPdkxelWNboTCvC,cloud-services 2497,1935,ETL Pipeline SQL to Snowflake using Talend,"To build an ETL pipeline to move data from SQL to Snowflake using Talend, you can follow these general steps: Create a new Talend project and create a new job. Add a “tSQLRow” component to the job and configure it to connect to the SQL database from which you want…",https://medium.com/@jagadeshjamjalanarayanan/etl-pipeline-sql-to-snowflake-using-talend-77ee2312e7a8?source=topics_v2---------29-84--------------------22de55a0_28f3_42fb_b089_394c545dbf33-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OJta4d_tAlyIz4A92NrrAQ.jpeg,cloud-services 2498,1936,Top Benefits Of Managed Cloud Services,"Over the rapid advancements in technology and cloud infrastructure, it has become easy for businesses to provide powerful solutions to their customers across the globe. Managed Cloud Services have made it easy for businesses to manage and maintain the cloud environment. According to a report from Markets and Markets, the…",https://medium.com/@toxsltechnologies/top-benefits-of-managed-cloud-services-2eb4ebb7febb?source=topics_v2---------30-84--------------------22de55a0_28f3_42fb_b089_394c545dbf33-------17,https://miro.medium.com/v2/resize:fill:140:140/1*g5h551FcrlQaHb07FD1Ahg.jpeg,cloud-services 2499,1837,Are You Lost Between Two Clouds?,"Do you feel like you’re stuck between two clouds? On one hand, there’s the planet’s natural cloud, a beautiful and ever-changing formation in the sky that regulates the Earth’s temperature and reflects sunlight back into space. On the other hand, there’s the cloud computing industry, a rapidly growing and constantly…",https://medium.com/@mike_tyson_cloud/are-you-lost-between-two-clouds-8033c725bb70?source=topics_v2---------31-84--------------------22de55a0_28f3_42fb_b089_394c545dbf33-------17,https://miro.medium.com/v2/resize:fill:140:140/0*-O7miUvEsrRfLyFA,cloud-services 2500,1937,“Exploring Essential AWS Concepts and Use Cases: A Comprehensive Guide”,"AWS (Amazon Web Services) is a cloud computing platform that provides a wide range of services and solutions for businesses and individuals. Here are some of the most important AWS concepts, along with an example to help illustrate their meaning: · EC2 (Elastic Compute Cloud): EC2 is a web service…",https://medium.com/@techwithsrikanth/exploring-essential-aws-concepts-and-use-cases-a-comprehensive-guide-a597fc670763?source=topics_v2---------32-84--------------------22de55a0_28f3_42fb_b089_394c545dbf33-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9naLikovRPp0IVqaqDCiEg.jpeg,cloud-services 2501,1938,The future is here — Cloud Computing,"How does Cloud Computing work? — Cloud computing represents the provision of external IT resources — such as servers, storage, databases, networks, software, as well as applications or analysis services — through the Internet (“cloud”) to provide: — quick and easy access to information ( via the web) – flexibility in implementing solutions – economy in terms of costs…",https://medium.com/@mirceaiosif/the-future-is-here-cloud-computing-75e00930aaf0?source=topics_v2---------33-84--------------------22de55a0_28f3_42fb_b089_394c545dbf33-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9tUP4fd3YAyMfcmV_8k22A.jpeg,cloud-services 2502,1939,AWS (Amazon Web Services) Detailed Analysis,"Amazon Web Services (AWS) is a cloud computing platform that provides a wide range of services such as computing, storage, databases, analytics, machine learning, and more. AWS was launched in 2006 and has become one of the most popular cloud computing platforms available today. One of the key advantages of…",https://medium.com/@saifkhan666645/aws-amazon-web-service-detailed-analysis-3260ff8bf714?source=topics_v2---------34-84--------------------22de55a0_28f3_42fb_b089_394c545dbf33-------17,https://miro.medium.com/v2/resize:fill:140:140/1*sDv0YtGECzr2GhabKIWD1Q.png,cloud-services 2503,1940,AWS Fundamentals: Create AWS Conceptual and Logical Diagrams,"Table of Contents AWS Fundamentals: Create an Account, Billing Alarm, and Budgets AWS Fundamentals: IAM user, GitHub, and AWS CLI AWS Fundamentals: Create AWS Conceptual and Logical Diagrams In this article I will show the AWS conceptual and logical diagrams of the services we are using for this full-stack project. …",https://medium.com/@cmcoffeedev/aws-fundamentals-create-aws-conceptual-and-logical-diagrams-f87808dabece?source=topics_v2---------35-84--------------------22de55a0_28f3_42fb_b089_394c545dbf33-------17,https://miro.medium.com/v2/resize:fill:140:140/1*J9DIXSOSfM0tGm99ruA8Wg.png,cloud-services 2504,1008,“Cloud Security Best Practices” #CloudSecurity,"Cloud Security Fundamentals for beginners | Cloud Security Risks and How to Mitigate Them | How does Cloud Security Work and more … This is the first post in the #CloudSecurity series, hope you like it :) Introduction Cloud security is a crucial aspect of cloud computing, encompassing the protection of sensitive data and compliance with regulatory requirements. The risks associated with cyber threats and…",https://medium.com/@avnishpathak1206/cloud-security-best-practices-cloudsecurity-7869832d461e?source=topics_v2---------36-84--------------------c44c5428_1538_4cbb_a159_97846bec32b3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xeWhBtAzzuzlunBTNhwMAQ.jpeg,cloud-services 2505,117,AWS Architecting (10 questions) Part 3,"1) An application is hosted on an Amazon EC2 instance with multiple Amazon EBS volumes attached and uses Amazon Neptune as its database. To improve data security, you encrypted all of the Amazon EBS volumes attached to the instance to protect the confidential data stored in the volumes. …",https://medium.com/@jacqmkindi/aws-architecting-10-questions-part-3-4b32a099f46c?source=topics_v2---------37-84--------------------c44c5428_1538_4cbb_a159_97846bec32b3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-services 2506,1941,"AWS charged me $100 for an EC2 instance which I didn’t create, what to do?","In this article I would like to share the steps you can take if you’re in the same situation, it might help you in the future. I was exploring AWS services and after a point, I wanted to learn about Databricks to get hands-on experience on Pyspark. …",https://medium.com/@omkarshevde622/aws-charged-me-100-for-an-ec2-instance-which-i-didnt-create-what-to-do-5b7d130991dc?source=topics_v2---------38-84--------------------c44c5428_1538_4cbb_a159_97846bec32b3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*N-uTURvLOh8tzv8AdFD_jQ.png,cloud-services 2507,1923,Make a Virtual Aquarium in Unity With WebGL & echo3D,This digital “Equarium” loads its decorations and fish at runtime using the echo3D API. The echo3D platform allows the app to select and display multitudes of different fish types without requiring any asset bundling or inclusion in the app build itself. echo3D manages the 3D asset management backend so new…,https://medium.com/echo3d/make-a-virtual-equarium-in-unity-with-webgl-echo3d-6b45791f1ece?source=topics_v2---------39-84--------------------c44c5428_1538_4cbb_a159_97846bec32b3-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*ii-alkz9aKteXX0tb1R-yg.gif,cloud-services 2508,1942,AWS: Create Virtual Machine instance with EC2,"AWS is nowadays the most popular cloud provider, so it’s auspicious to understand one of its most used solutions, EC2. EC2 stands for Amazon Elastic Compute Cloud and it is a web service that provides resizable compute capacity in the cloud. With Amazon EC2 it is possible to launch virtual…",https://medium.com/@vulpeloredanageorgiana/aws-create-virtual-machine-instance-with-ec2-a23cbe55e509?source=topics_v2---------40-84--------------------c44c5428_1538_4cbb_a159_97846bec32b3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*uGnkedWzlM-J1bYC,cloud-services 2509,1008,Cloud Computing: What It Is and How It Works,"Hello! Recent years have seen cloud computing become one of the most popular buzzwords in the world of technology. But what exactly is cloud computing, and how does it work? In this post, we’ll provide an overview of cloud computing, including its benefits, types, and examples. What is Cloud Computing? Cloud computing is the…",https://medium.com/@avnishpathak1206/cloud-computing-what-it-is-and-how-it-works-664fdd3a4e36?source=topics_v2---------41-84--------------------c44c5428_1538_4cbb_a159_97846bec32b3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*E3DyjOMJa2DQ_0oGH3lv_g.png,cloud-services 2510,1943,Kubernetes 101 Series: Part 1 — What is Kubernetes and its fundamental components?,"Welcome to my new blog series about Kubernetes! With this series, you’ll follow me as we refresh ourselves with Kubernetes and explore everything from containerization to common misconceptions developers have about Kubernetes to how to build a containerized app! We’ll be covering the following Kubernetes topics/themes: Part 1: What is…",https://medium.com/@tech-with-hannah/kubernetes-101-series-part-1-what-is-kubernetes-and-its-fundamental-components-b53471ab3f62?source=topics_v2---------42-84--------------------c44c5428_1538_4cbb_a159_97846bec32b3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*FP290TU9shKYVsvM.png,cloud-services 2511,1944,Mastering Data Engineering in the Cloud: A Comprehensive Guide,"As a Data Engineer/Data Scientist in training, I have been diligently working on my first Data Engineering Pipeline over the past two weeks, as part of my coursework in a Data Science Bootcamp. …",https://medium.com/@vbharati.patil/mastering-data-engineering-in-the-cloud-a-comprehensive-guide-1560f1a70611?source=topics_v2---------43-84--------------------c44c5428_1538_4cbb_a159_97846bec32b3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wb3LaTuY4Kq46YBFBMfX7Q.jpeg,cloud-services 2512,1945,Was Bill Gates a Time Traveller?,"Bill Gates’s books from the 1990s are more relevant today than ever. By Angus Norton, CEO and Founder, Bodhi Venture Labs Introduction I ventured into the high-tech industry in 1991 with Sony, and by 1994, my boss- Sam Kakuda (who remains a friend and mentor to this day) — had gathered…",https://medium.com/@bodhiventurelabs/was-bill-gates-a-time-traveller-7d16040286ae?source=topics_v2---------44-84--------------------c44c5428_1538_4cbb_a159_97846bec32b3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JGdjV80gt282FuU4142ApA.jpeg,cloud-services 2513,1946,Efficient Model Training for Large-Scale Retail Forecasting,"Reduce training time by 10x & training cost by 3x — Machine Learning can be divided into four main categories: supervised, semi-supervised, unsupervised, and reinforcement learning [1]. However, we will discuss the effective ways to train models in a supervised learning scenario in retail sales forecasting for the CPG domain. Model training is often the most computationally expensive part of many…",https://medium.com/digital-engineering-centific/efficient-model-training-for-large-scale-retail-forecasting-d5aa8b2014c8?source=topics_v2---------45-84--------------------c44c5428_1538_4cbb_a159_97846bec32b3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Ih6Pib0CT9KHYI2FyeFfVA.png,cloud-services 2514,1883,loud ComputingThe Power of Cloud Computing for a Greener and Sustainable Future,"The power of Cloud computing is a huge necessity these days. Why? While data storage technologies have made our lives simpler, they have also resulted in a huge rise in energy usage and carbon emissions. Before Cloud computing, in recent years, the energy usage and carbon footprint of the IT…",https://medium.com/towardsdev/loud-computingthe-power-of-cloud-computing-for-a-greener-and-sustainable-future-e42585919c5b?source=topics_v2---------47-84--------------------c7572e6c_5c7b_453d_a6f1_f110b40ae45b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3hb5y3viJ7Jlzyn0BTQr1w.jpeg,cloud-services 2515,117,AWS Architecting (10 questions)-Part1,"Finally after 3 attempts I was able to pass this Architecting Badge. It was not so easy and the frustrating thing was every time I took the test I got close to the pass mark. The 1st time I got 74.5%, the second time I got 78.7% and the third…",https://medium.com/@jacqmkindi/aws-architecting-10-questions-part1-d628e5f06c90?source=topics_v2---------48-84--------------------c7572e6c_5c7b_453d_a6f1_f110b40ae45b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*aTv-1jVVBZABeuPk2VErNw.png,cloud-services 2516,1947,Migrating to the Cloud,"In todays world companies are trying their best to become more efficient, reduce costs and save time. With this demand new innovative technologies have become available to help in this endeavor. One of the biggest is the introduction of the cloud. Now what is the cloud exactly. Well in simple…",https://medium.com/@jacobkunzler01/migrating-to-the-cloud-9007be5e0caa?source=topics_v2---------49-84--------------------c7572e6c_5c7b_453d_a6f1_f110b40ae45b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*kU_lTC5QU6yfypAG.jpg,cloud-services 2517,1948,Top 5 Cloud Computing Trends in 2023,"Cloud computing is a term that refers to the delivery of computing services on-demand, via the internet. These resources include servers, data storage and databases. As the internet has evolved, cloud computing has also transformed significantly, having become an essential service for most organizations and individuals. …",https://medium.com/@netshopisp/top-5-cloud-computing-trends-in-2023-2f8c2e12d801?source=topics_v2---------50-84--------------------c7572e6c_5c7b_453d_a6f1_f110b40ae45b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wGqEu2rgw_-TFjXKVVnD-Q.png,cloud-services 2518,1949,Difference Between CloudFront and Lambda Functions and their use cases,"Hello Techie, we all heard about the Lambda Function through Lambda Function we can integrate different services like S3 Bucket, Kinesis, SQS, and SNS. But CloudFront is also important to understand, Lambda and CloudFront both are serverless Functions but the main difference is that Lambda uses for computation work, whereas…",https://medium.com/@darshit.gajjar1998/difference-between-cloudfront-and-lambda-functions-and-their-use-cases-b31c6060b9e0?source=topics_v2---------51-84--------------------c7572e6c_5c7b_453d_a6f1_f110b40ae45b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Fu4QD0tth2BifHDz1j6V_w.jpeg,cloud-services 2519,1950,What are the challenges while handling the firebase?,"This article will give a detailed overview of Firebase, including its several services, functionality and also my experience with firebase. What is google firebase? Firebase is a powerful platform for your mobile and web application. …",https://medium.com/@paramathalingam/what-are-the-challenges-while-handling-the-firebase-9bccc7c98c75?source=topics_v2---------52-84--------------------c7572e6c_5c7b_453d_a6f1_f110b40ae45b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*OpJgulWSJII_Z2uC.png,cloud-services 2520,1951,AWS CLI : Attach EBS volume to the instance,Why we use AWS cli? AWS CLI (Command Line Interface) is a powerful tool that allows developers and system administrators to interact with Amazon Web Services (AWS) using command-line commands. It makes everything organized instead of clicking here and their in the web console. what we can do is create the command one time and…,https://medium.com/@surajsambhoji_55/aws-cli-attach-ebs-volume-to-the-ec2-instance-b0f21b837d2a?source=topics_v2---------53-84--------------------c7572e6c_5c7b_453d_a6f1_f110b40ae45b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*A62DeddyCp-atd4hlSXanA.png,cloud-services 2521,1952,Selecting and Building a Linux Practice Environment / Sandbox,"Creating a test environment or ‘sandbox’ has always been one of my biggest barriers to developing new IT skills. Recently, I started learning Linux+ following Network+ and an AWS course. …",https://medium.com/@darrin.bliler/selecting-and-building-a-linux-practice-environment-sandbox-b0f7797662f3?source=topics_v2---------54-84--------------------c7572e6c_5c7b_453d_a6f1_f110b40ae45b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MfO5edOsv72B4hGtpI-NjQ.png,cloud-services 2522,1953,Managing your Azure Cognitive Services Costs,"Tips for managing your Azure Cognitive Services expenses — In this article we’ll explore the pricing structure of Azure Cognitive Services and some helpful and creative things you can do to monitor, control, and reduce your Artificial Intelligence expenses on Azure. While this article is a stand-alone exploration of cost management in Azure Cognitive Services, it’s also part two…",https://medium.com/accessibleai/managing-your-azure-cognitive-services-costs-9843b3e9cfe3?source=topics_v2---------55-84--------------------c7572e6c_5c7b_453d_a6f1_f110b40ae45b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*mCDiy_t1ma-9qz6O.png,cloud-services 2523,1164,Comparing Azure vs Google Cloud,"In the world of cloud computing, two of the biggest players are Microsoft Azure and Google Cloud. — While both offer a wide range of services, there are some key differences between the two that may influence which one is best for your business. In this article, we will compare Azure and Google Cloud across several key areas. Pricing Pricing is an important consideration for any cloud service, and…",https://medium.com/your-software-development-stories/comparing-azure-vs-google-cloud-905f82cbbe24?source=topics_v2---------56-84--------------------f81ca8d0_4592_452c_bc8b_72566601b339-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SM3Y0WZZwB49T6ln7TItag.png,cloud-services 2524,1954,How to launch an Amazon EC2 Instance on AWS,"One of the core services offered by AWS is Elastic Compute Cloud (EC2), which allows users to launch and manage virtual machine instances in the cloud. In this blog post, we will walk you through the steps required to launch an EC2 instance on AWS. Step 1: Sign up or…",https://medium.com/@luwie_zz/how-to-launch-an-amazon-ec2-instance-on-aws-e696f923a1c8?source=topics_v2---------57-84--------------------f81ca8d0_4592_452c_bc8b_72566601b339-------17,https://miro.medium.com/v2/resize:fill:140:140/1*bOsAhydHlnryU_WlTJWH1Q.png,cloud-services 2525,1955,Can cloud be better than local?,"In the last few years, we have seen the trend of increasing the size of the data set, often linked to the increase in the different types of analysis. For example, a cell phone today can provide information on a person’s location, behavior on social networks, lifestyle, etc. With that…",https://medium.com/@brenocavi/can-cloud-be-better-than-local-3979affe4c13?source=topics_v2---------58-84--------------------f81ca8d0_4592_452c_bc8b_72566601b339-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*gGFxQOLFL20gAOCpMJC79Q.gif,cloud-services 2526,1956,AWS cloud: simple steps to start with examples and frequently used services.,"AWS (Amazon Web Services) is a cloud computing platform that provides a wide range of services and tools for computing, storage, database, analytics, machine learning, and more. Here are some steps for beginners to get started with AWS cloud: Create an AWS account: Go to the AWS website and sign…",https://medium.com/@gaganjain9319/aws-cloud-simple-steps-to-start-with-examples-and-frequently-used-services-39a87e7ac3b5?source=topics_v2---------59-84--------------------f81ca8d0_4592_452c_bc8b_72566601b339-------17,https://miro.medium.com/v2/resize:fill:140:140/1*AEQf3xr4mV-5a_BxXZ8bfg.png,cloud-services 2527,1957,2022 Journey,"Introduction: The world is moving towards digitalization, and the adoption of cloud computing has been on the rise for the past few years. In 2022, I decided to learn cloud computing and explore its vast potential. …",https://medium.com/@atifmehrban/2022-journey-cb24edce4310?source=topics_v2---------60-84--------------------f81ca8d0_4592_452c_bc8b_72566601b339-------17,https://miro.medium.com/v2/resize:fill:140:140/1*b8TkCggK66l7zQy5GGoDZg.jpeg,cloud-services 2528,1959,What is Cloud Federation?,"The phrase “Cloud Federation,” often written “Federated Cloud,” refers to an organization’s administration of many external and internal cloud computing services. It’s a global system of interconnected clouds that share and scale their resources across several nodes. …",https://medium.com/@niitwork0921/what-is-cloud-federation-c83bde12843c?source=topics_v2---------62-84--------------------f81ca8d0_4592_452c_bc8b_72566601b339-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-services 2529,1480,Cloud services: data and computers in the cloud from the future perspective,"Cloud services and applications have been gaining in popularity and importance recently, as they are becoming more and more accessible (even for free) and are increasingly being integrated into computers, tablets, smartphones, or their operating systems. As such, cloud services have been used since the dawn of the Internet (i.e…",https://medium.com/enkronos/cloud-services-data-and-computers-in-the-cloud-from-the-future-perspective-b11e9df8ed60?source=topics_v2---------63-84--------------------f81ca8d0_4592_452c_bc8b_72566601b339-------17,https://miro.medium.com/v2/resize:fill:140:140/1*W1x4tDt5rw26JEtI25Wliw.jpeg,cloud-services 2530,1960,CodebaseHQ: Streamline Your Development Process,"Software Introduction CodebaseHQ is a cloud-based version control platform designed to help software development teams streamline their processes, manage their codebase, and collaborate more effectively. With a wide range of features and integrations, CodebaseHQ offers a powerful set of tools to make your development workflow faster, more efficient, and more collaborative…",https://medium.com/techno-express/codebasehq-streamline-your-development-process-9a8cb7fc6977?source=topics_v2---------64-84--------------------f81ca8d0_4592_452c_bc8b_72566601b339-------17,https://miro.medium.com/v2/resize:fill:140:140/1*YDZIhr2r-2SoIvJMDXOQ_Q.png,cloud-services 2531,1961,Introduction to Cloud Computing,"In this tutorial, I am explaining what is cloud computing, what are the types of cloud computing, and the characteristics of cloud computing. What is Cloud Computing? Let’s understand cloud computing with a simple real-world example. Suppose you are planning to go on a trip with your friends. After finalizing the schedule, you will…",https://medium.com/@wanuja18/introduction-to-cloud-computing-2a09676aa065?source=topics_v2---------65-84--------------------f81ca8d0_4592_452c_bc8b_72566601b339-------17,https://miro.medium.com/v2/resize:fill:140:140/0*gHBsK0LbQTjrZmiM,cloud-services 2532,1959,What is Cloud Failover?,Cloud failover is a critical component of a cloud computing infrastructure that helps organizations ensure the availability and reliability of their applications and services. It refers to the process of automatically hosting and transferring active workloads and data to a secondary or backup system in the event of a failure…,https://medium.com/@niitwork0921/what-is-cloud-failover-88e43135f20b?source=topics_v2---------66-84--------------------a42efc22_51b8_4660_bae1_1fdb774f50f9-------17,https://miro.medium.com/v2/resize:fill:140:140/0*AK6csrhCOQk_6xOG.jpg,cloud-services 2533,1962,Understanding Common Lookups in Oracle HCM,"The HR department has to maintain personal, legislation-specific, and organization-related data for all employees in their HR applications. It is crucial to properly manage and store this data as it will be used for reporting. Furthermore, this data will also be used by other applications like payroll and outbound interfaces. …",https://medium.com/@phani-kumar/understanding-common-lookups-in-oracle-hcm-12ad265c3649?source=topics_v2---------67-84--------------------a42efc22_51b8_4660_bae1_1fdb774f50f9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wDeX20WXN9HaMWsvVncEQg.png,cloud-services 2534,1963,What is CloudOps ?,"Cloud Operations, also known as CloudOps, refers to the set of practices and processes involved in the management and maintenance of cloud-based systems and applications. As more and more organizations adopt cloud-based infrastructure, CloudOps has become a critical function for ensuring the availability, performance, and security of these systems. CloudOps…",https://medium.com/@shrimaliasi/what-is-cloudops-1144d942d29c?source=topics_v2---------68-84--------------------a42efc22_51b8_4660_bae1_1fdb774f50f9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*RaZHR5Gd_0aE5jFXoUk49g.jpeg,cloud-services 2535,1964,Cloud study: Overview of cloud concepts(Day 0),"Cloud has become an integral part of all technologies, may it be Internet of things (IOT), machine learning(ML) or even the websites/blogs we browse. Its features are ever upgrading and expanding, so there is plenty to learn. …",https://medium.com/@kefdes21/cloud-study-overview-of-cloud-concepts-day-0-1f08fa1fab01?source=topics_v2---------69-84--------------------a42efc22_51b8_4660_bae1_1fdb774f50f9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ao44Cg1r1UDYsyJOVux5uA.png,cloud-services 2536,1965,Roadmap for becoming a Cloud Computing Expert,"Fundamentals of Cloud Computing: Start by understanding the basics of cloud computing, including terminology, concepts, and deployment models. Here are some resources to get started: Introduction to Cloud Computing (https://www.ibm.com/cloud/learn/cloud-computing) Cloud Computing Concepts (https://www.tutorialspoint.com/cloud_computing/cloud_computing_concepts.htm) Cloud Essentials Certification Study Guide (https://www.comptia.org/certifications/cloud-essentials)",https://medium.com/@adarsh_d/roadmap-for-becoming-a-cloud-computing-expert-dfc405f9b321?source=topics_v2---------70-84--------------------a42efc22_51b8_4660_bae1_1fdb774f50f9-------17,https://miro.medium.com/v2/resize:fill:140:140/0*H9YFEezNRahAPrFp.png,cloud-services 2537,1966,IaaS vs PaaS vs SaaS through a Chef’s eye.,"Numerous ready-made sauces and spice blends available in the market these days has turned cooking into an easy job. Gone are the days when you used to create a spice mix from scratch to cook your dinner, these days most folks would just open a pack of “Ready to use…",https://medium.com/@debashisbhattacharyya1911/iaas-vs-paas-vs-saas-through-a-chefs-eye-54397cc9eb4d?source=topics_v2---------71-84--------------------a42efc22_51b8_4660_bae1_1fdb774f50f9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*NIT7BW5gq2A9sjzkJkh1Yg.jpeg,cloud-services 2538,1959,What is Cloud Computing Workflow?,"A workflow is a method of organising work that must be done in a certain sequence. They are the means through which individuals and organisations create goods and services, process data, and otherwise provide value to the world. Business processes are more complicated than workflows because they include many workflows…",https://medium.com/@niitwork0921/what-is-cloud-computing-workflow-7022786205f1?source=topics_v2---------72-84--------------------a42efc22_51b8_4660_bae1_1fdb774f50f9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*s_If6VhmtFaJlHOZ6D_VQg.png,cloud-services 2539,1960,Maximising Drupal-Based Web Development: Benefits and Resources of Acquia,"Web Development Introduction Acquia is a popular cloud-based platform that provides enterprise-level solutions for Drupal-based web development. With its easy-to-use tools, intuitive user interface, and scalable infrastructure, Acquia has become the go-to platform for businesses and organisations that require powerful web development capabilities. …",https://medium.com/techno-express/maximising-drupal-based-web-development-benefits-and-resources-of-acquia-4a94c5ea3e82?source=topics_v2---------73-84--------------------a42efc22_51b8_4660_bae1_1fdb774f50f9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*M1GGzle4Q1zfBjdt7R6RbA.png,cloud-services 2540,1967,Server”less” … really ?,"Serverless computing is a cloud-based execution model that allows cloud providers to manage machine resources dynamically. Instead of managing and renting servers, you can concentrate on writing code, and let the cloud provider handle the server management and scaling. This makes the process more cost-effective, flexible, and scalable, as you…",https://medium.com/@med.wael.thabet/server-less-really-f5047ccb4412?source=topics_v2---------74-84--------------------a42efc22_51b8_4660_bae1_1fdb774f50f9-------17,https://miro.medium.com/v2/resize:fill:140:140/0*aeLi_ZJabTDhSlew.png,cloud-services 2541,1968,How does Cloud security work?,"We looked last time at the security troubles we face when we host services for our home network. It’s a simple trap we all fall into if we are not careful: we assume that all devices in our home network are safe, un-compromised, and always work as expected. We default…",https://medium.com/@raduzaharia/how-does-cloud-security-work-56bb9dc14b6e?source=topics_v2---------75-84--------------------a42efc22_51b8_4660_bae1_1fdb774f50f9-------17,https://miro.medium.com/v2/resize:fill:140:140/0*EkqZ4JKSc6ChUyTw,cloud-services 2542,309,Unleashing the Power of Java in Cloud Computing,"Empowering Modern Business Applications — ☁️ Introduction Cloud computing has become an essential technology for businesses of all sizes, providing a flexible and cost-effective way to store and process data. Cloud computing allows companies to scale their resources up or down as needed, which can help them save money and improve their operational efficiency. Java is a…",https://medium.com/javarevisited/unleashing-the-power-of-java-in-cloud-computing-c625fcb0a234?source=topics_v2---------76-84--------------------f6940fd6_a636_4833_95fa_fb32643e162f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6X-EnK0SfaPRET95sGAqSw.png,cloud-services 2543,1969,Azure Active Directory Features,"Azure Active Directory (Azure AD) is Microsoft’s multi-tenant cloud-based directory and identity management service. For IT Admins, Azure AD provides an affordable, easy to use solution to give employees and business partners single sign-on (SSO) access to thousands of cloud SaaS Applications like Office365, Salesforce, DropBox, and Concur. For application developers, Azure AD lets you focus on building your application by making it fast and simple to integrate with a world class identity management solution used by millions of organizations around the world.",https://medium.com/@sk1035/azure-active-directory-features-c70e7dd8756d?source=topics_v2---------77-84--------------------f6940fd6_a636_4833_95fa_fb32643e162f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-services 2544,1970,Starting with SNOWFLAKE,"Hi Everyone, in this series, we will be talking all about Snowflake, not talking about the snowfall one, but the cloud data house platform. Snowflake Cloud Data Platform: Snowflake provides a cloud data platform that combines data warehousing, data lake, and data exchange capabilities into a single, integrated platform. This…",https://medium.com/datadriveninvestor/starting-with-snowflake-629eb152fa17?source=topics_v2---------78-84--------------------f6940fd6_a636_4833_95fa_fb32643e162f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*iKCuNXb-GIqn5onNWSSXWw.png,cloud-services 2545,1960,Amazon Web Services (AWS): Benefits and Resources for Cloud Computing Success,"Cloud Services Introduction Amazon Web Services (AWS) is a comprehensive and secure cloud computing platform offered by Amazon. AWS is a collection of remote computing services, including storage, computing power, and database services. …",https://medium.com/techno-express/amazon-web-services-aws-benefits-and-resources-for-cloud-computing-success-99d603e96f9c?source=topics_v2---------79-84--------------------f6940fd6_a636_4833_95fa_fb32643e162f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6zXwIzRqUDhBrsmB1t1xiw.png,cloud-services 2546,1971,Don’t Pay a Dime: The Best Free Cloud Certifications You Can’t Miss In 2023,"Hello cloud ethusiats, Cloud computing has become one of the most in-demand skills in today’s job market, as businesses of all sizes continue to shift their operations to the cloud. As a result, cloud certifications have become an essential way for professionals to demonstrate their knowledge and expertise in cloud…",https://medium.com/@cybermesh/dont-pay-a-dime-the-best-free-cloud-certifications-you-can-t-miss-in-2023-94579867952c?source=topics_v2---------80-84--------------------f6940fd6_a636_4833_95fa_fb32643e162f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*VtOlgXE9Od45jkVpHntDuw.jpeg,cloud-services 2547,1972,Why SecOps is needed now more than ever?,"Impacts of changing landscape Two years into the deadly and disruptive global pandemic, not only are we continuing to see more attacks, we’re also seeing more actual breaches which results in significant financial losses, reduction in getting new business, losing trust with existing customers. In today’s scenario, most of the organizations has adopted agile…",https://medium.com/@anirudh-manthaa/why-secops-is-needed-now-more-than-ever-7be955ef77d9?source=topics_v2---------81-84--------------------f6940fd6_a636_4833_95fa_fb32643e162f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*plAQ0qxQ20D2ujtZ.png,cloud-services 2548,1973,"Azure Storage Everywhere, but now WHAT?","Last week we have a blog post about Azure Storage, but how to create the Azure Storage and not what and how can be done within the Storage account. I was aware of this thing and that’s why I separated the creation of the Azure Storage account and its functionalities…",https://medium.com/@lacialec/azure-storage-everywhere-but-now-what-3657670fff66?source=topics_v2---------82-84--------------------f6940fd6_a636_4833_95fa_fb32643e162f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*eJXf9aTZCr8_LOejlfCPHQ.png,cloud-services 2549,117,Migration of a Workload running in a Corporate Data Center to AWS using Amazon EC2 and RDS service,"In another project based in a real-world scenario, I acted as the Cloud Specialist responsible for migrating a workload running in a Corporate Data Center to AWS. The application and database were migrated to AWS using the Lift & Shift (rehost) model, moving both application and database data. Migrate your on-premises workload walk-through I followed…",https://medium.com/@jacqmkindi/migration-of-a-workload-running-in-a-corporate-data-center-to-aws-using-amazon-ec2-and-rds-service-92910b9f0b3a?source=topics_v2---------83-84--------------------f6940fd6_a636_4833_95fa_fb32643e162f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*dOtG_hsd75BDRyP0zZUwgA.png,cloud-services 2550,1974,Google Cloud Services vs. AWS: Which is the Best for Your Business?,"Cloud computing has become an essential part of modern business operations. It provides a flexible, cost-effective way to store and access data and applications, and it can help businesses scale more quickly and efficiently. However, choosing the right cloud provider can be a challenge, especially with so many options available…",https://medium.com/@rajneeshkaggarwal/google-cloud-services-vs-aws-which-is-the-best-for-your-business-dd82aaaf38e1?source=topics_v2---------84-84--------------------f6940fd6_a636_4833_95fa_fb32643e162f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*kYvyQY5WBk0YA4oc.png,cloud-services 2551,1975,How did this B2B SaaS startup founded in 2020 raise a $300M round at a $10B valuation in early 2023?,"Wiz — a multi-cloud security startup founded in 2020 — just raised 300M$ at a $10B valuation. In this market climate. How is this possible? 🤯 — Well, Wiz is unique in many ways, but most importantly the startup is a masterclass of top-percentile business execution, founder-market fit and playing on strong secular tailwinds with the right GTM. Wiz is the fastest SaaS company to reach $100M in ARR and $200M in ARR respectively and has changed…",https://medium.com/@olivermolander/how-did-this-b2b-saas-startup-founded-in-2020-raise-a-300m-round-at-a-10b-valuation-in-early-2023-b6e9d803c9f9?source=topics_v2---------85-84--------------------f6940fd6_a636_4833_95fa_fb32643e162f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*EHWDztuYGvFvxsFL,cloud-services 2552,1976,How to securely access Azure from Azure DevOps agents,"Microsoft Azure and Microsoft Azure DevOps (ADO) are two popular but different services. Microsoft Azure is the cloud environment where you can deploy and use cloud resources such as virtual machines, Kubernetes clusters, storage, keyvault and container registries. …",https://medium.com/@mennovanderbijl/how-to-securely-access-azure-from-azure-devops-agents-7786212a9627?source=topics_v2---------87-84--------------------53566a12_5278_4a2a_a659_21871adad915-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-services 2553,1400,What is Web 3.0 Integrated Cloud Technology?,"Web 3.0 Integrated Cloud Technology is a type of cloud computing technology that combines web 2.0, distributed computing, and service-oriented architecture principles to provide an integrated solution for web application development and deployment. This technology allows web developers to create and deploy applications that are connected across multiple cloud services…",https://medium.com/metaverse-for-novices/what-is-web-3-0-integrated-cloud-technology-520ec1e343b4?source=topics_v2---------88-84--------------------53566a12_5278_4a2a_a659_21871adad915-------17,https://miro.medium.com/v2/resize:fill:140:140/0*zoAfL0-cKVkdG9BV,cloud-services 2554,1977,Cloud Network Infrastructure — All That You Need To Know,The physical framework on which amenities and platforms are present is referred to as Cloud Network infrastructure. The physical architecture and computational technologies that operate and display activities on a cloud server are hence referred to as cloud infrastructure.,https://medium.com/@yoursmallbusinessolutions/cloud-network-infrastructure-all-that-you-need-to-know-34ac24e50ba3?source=topics_v2---------89-84--------------------53566a12_5278_4a2a_a659_21871adad915-------17,https://miro.medium.com/v2/resize:fill:140:140/0*mjBYAuNt9dnMovx6.png,cloud-services 2555,1978,Mastering AWS Cost Optimization: 10 Proven Strategies to Save Big!,"Maximizing Your Cloud Investment: Expert Tips and Tricks for Dramatically Reducing AWS Costs — Welcome to the world of AWS! AWS provides an incredibly powerful infrastructure that can help you build and run your applications, scale your business, and improve your customer experience. However, with great power comes great responsibility, especially when it comes to costs. As you continue to grow and expand your…",https://medium.com/aws-in-plain-english/mastering-aws-cost-optimization-10-proven-strategies-to-save-big-e7da8f3e47ff?source=topics_v2---------90-84--------------------53566a12_5278_4a2a_a659_21871adad915-------17,https://miro.medium.com/v2/resize:fill:140:140/0*keS9X41IqQbU-JOQ,cloud-services 2556,1979,Invoke your spring boot application key with OCI Vault,"The key is sensitive information that enables the application to access resources from your Microservice, infrastructure resources, or third-party applications. Not only will the key be used in the application, but also the account/password of the database. In this post, we will add a new autonomous JSON database for testing…",https://medium.com/@erichsieh_34628/invoke-your-spring-boot-application-key-with-oci-vault-1f86d222c566?source=topics_v2---------91-84--------------------53566a12_5278_4a2a_a659_21871adad915-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Pgi6s64I1Z8d8N2Fc-ElyA.png,cloud-services 2557,1978,Unlock the Door to High-Paying Jobs: Learn These Steps to Become a Cloud Engineer!,"Cloud Engineer salaries can vary significantly based on factors such as location, experience, skills, and the organization you work for. However, here is a rough estimate of Cloud Engineer salaries in these 3 countries based on available data: United States: The average Cloud Engineer salary in the US is around…",https://medium.com/aws-in-plain-english/unlock-the-door-to-high-paying-jobs-learn-these-steps-to-become-a-cloud-engineer-116a102807ee?source=topics_v2---------92-84--------------------53566a12_5278_4a2a_a659_21871adad915-------17,https://miro.medium.com/v2/resize:fill:140:140/0*4GqNKt5sMRzTCexO,cloud-services 2558,1980,AWS Grants Intetics an Advanced Services Partner Accreditation for Outstanding Cloud Expertise and Customer Success,"The AWS Partner Network (APN) is a global community of partners that deliver AWS consulting services, leverage programs, expertise, and resources to help international businesses improve their operations with cloud technologies. …",https://medium.com/@intetics/aws-grants-intetics-an-advanced-services-partner-accreditation-for-outstanding-cloud-expertise-and-85c212fd0ca6?source=topics_v2---------93-84--------------------53566a12_5278_4a2a_a659_21871adad915-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ZTVS_7Kt0RpEVtBz.png,cloud-services 2559,1981,Top 4 Competitors Of AWS In 2023,"There Are Many Competitive Cloud Computing Services, But How Do They Stack Up Against AWS? Discover The Best Competitors Of AWS In This Comparison Guide! — Amazon started as an e-commerce platform and has spread its wings in many sectors. One of the major services (apart from e-commerce) Amazon provides is its cloud service. It goes by the name of Amazon Web Services (AWS). Cloud computing is the next-gen technology powering many businesses and industries. And…",https://medium.com/@actualsimple/top-4-competitors-of-aws-in-2023-33866b3cd6aa?source=topics_v2---------94-84--------------------53566a12_5278_4a2a_a659_21871adad915-------17,https://miro.medium.com/v2/resize:fill:140:140/1*erDzqypaaEYejn8dmyCnuw.png,cloud-services 2560,1978,AWS SysOps Certification 2023: Your Ultimate Guide to Passing the Certified SysOps Administrator Exam,"Passing the AWS Certified SysOps Administrator exam requires a combination of technical knowledge, hands-on experience, and effective study habits. Here are some steps you can take to prepare for and pass the exam: Familiarize Yourself with the Exam Format and Content Before you start studying, it’s important to understand the exam’s format, structure, and objectives. The AWS Certified…",https://medium.com/aws-in-plain-english/aws-sysops-certification-2023-your-ultimate-guide-to-passing-the-certified-sysops-administrator-9ee487c2e085?source=topics_v2---------95-84--------------------1f1fc706_c947_4daa_ab1b_60b0eca6670a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*UDeCXg-kfm9irYwP,cloud-services 2561,1923,echo3D Ranks #2 on Product Hunt! Thank You!,"It’s official!!! echo3D was the #2 Product of the Day on Product Hunt! We would like to thank all of you for supporting us on our 1st Product Hunt launch and sharing your amazing feedback with us about our platform. We’re eager and excited to start implementing your feedback to make echo3D even better than before! Sign up for free at http://echo3D.com! — The echo3D Team echo3D (www.echo3D.co; Techstars 19’) is a cloud platform for 3D asset management that provides tools and cloud infrastructure to help developers quickly build and deploy 3D/AR/VR games, apps, and content.",https://medium.com/echo3d/echo3d-ranks-2-on-product-hunt-thank-you-8ce2b7cfbd80?source=topics_v2---------96-84--------------------1f1fc706_c947_4daa_ab1b_60b0eca6670a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*m7jBTo9JHPb5Jn6oDWrFRQ.png,cloud-services 2562,1982,What the F is FinOps?,"Is FinOps just a new buzzword or does it entail anything new? This post will discuss FinOps’ main principles, draw an analogy between ‘Agile Adoption’ and FinOps Adoption, and also end with an actual AWS based FinOps Implementation that results in lowering compute costs. FinOps — The Official Definition FinOps is a practice that enables…",https://medium.com/the-business-of-technology/what-the-f-is-finops-f9dc25b0ef05?source=topics_v2---------97-84--------------------1f1fc706_c947_4daa_ab1b_60b0eca6670a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LEghUauBx34Upe_23sLtEg.png,cloud-services 2563,1923,We’ve launched! echo3D is now live on Product Hunt!,"We’ve launched! echo3D is now live on Product Hunt! Please do us a huge favor and leave us your feedback on Product Hunt. Your support will help us to make echo3D even better! Click here: https://www.producthunt.com/posts/echo3d Thank you all for your support! — The echo3D Team echo3D (www.echo3D.co; Techstars 19’) is a cloud platform for 3D asset management that provides tools and cloud infrastructure to help developers quickly build and deploy 3D/AR/VR games, apps, and content.",https://medium.com/echo3d/weve-launched-echo3d-is-now-live-on-product-hunt-19a447fe6500?source=topics_v2---------98-84--------------------1f1fc706_c947_4daa_ab1b_60b0eca6670a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*APS-tQ0USYg7itUN6ecuzw.png,cloud-services 2564,1983,HASHCHU Token Metrics and Distribution,"Total Supply —5,000,000 Public Sale:: 5,00,000 — 10% Liquidity/Exchange Market Pool:: 5,00,000 — 10% Development and Marketing:: 10,00,000 — 20% Staking & Ecosystem Rewards:: 7,50,000 — 15% Team:: 10,00,000 — 20% Reserve:: 12,50,000 — 25% Token distribution and Vesting details:- 5,00,000 $HAS are allocated to the public sale and 20% unlocked at TGE, then 16% unlocked monthly for…",https://medium.com/@hashchuapp/hashchu-token-metrics-and-distribution-f2dba3683990?source=topics_v2---------99-84--------------------1f1fc706_c947_4daa_ab1b_60b0eca6670a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Kos6yxa9F2iYZPan4f2ojA.png,cloud-services 2565,1984,Day 23 of #DataScience28: Cloud Computing,"Cloud computing is a rapidly growing technology that has revolutionized the way businesses and individuals store, process, and access data. It involves the delivery of computing services, including storage, processing power, and software applications, over the internet, without the need for on-premises hardware or software. In cloud computing, a user…",https://medium.com/@jackraiferbaruch/day-23-of-datascience28-cloud-computing-15476609ec4e?source=topics_v2---------101-84--------------------1f1fc706_c947_4daa_ab1b_60b0eca6670a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CtM5mmj5sUdx8GAvfTq-Kw.jpeg,cloud-services 2566,1985,"The Cloudy Road to Data Heaven: 50 Rapid and Reliable Ways to Enable High Quality Data By Betty Bassett","Cloud data engineering has become an essential part of every organization's data strategy offering the ability to process and store vast amounts of data in a scalable and cost-effective way. However, the journey to cloud data engineering is not always smooth sailing. …",https://medium.com/@bettybassett63/the-cloudy-road-to-data-heaven-50-ways-to-rapidly-and-reliably-ways-to-enable-high-quality-data-5999d47042b1?source=topics_v2---------102-84--------------------1f1fc706_c947_4daa_ab1b_60b0eca6670a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OQzPYX237f2CgL6IY7ZEVQ.png,cloud-services 2567,127,What Are The Benefits Of Migrating Your Business To The Cloud?,"Cloud migration is the process of moving digital assets and services from an on-premises, local, or private cloud infrastructure to a public cloud such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform. …",https://medium.com/@eastgate/what-are-the-benefits-of-migrating-your-business-to-the-cloud-6010c30de9b?source=topics_v2---------103-84--------------------1f1fc706_c947_4daa_ab1b_60b0eca6670a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*YxBRUnHoGIwt6jAHc4-lqw.jpeg,cloud-services 2568,1986,AWS VPC Demystified: Best Practices for Effective Design,Main objectives: Benefits of using AWS VPC: AWS Use case Components of AWS VPC and design best practices A VPC peering connection in AWS is a networking connection that facilitates the routing of traffic between two VPCs. It operates using private IPv4 or IPv6 addresses and allows instances in either…,https://medium.com/@m.johnmico/aws-vpc-demystified-best-practices-for-effective-design-d68a0cb22388?source=topics_v2---------104-84--------------------1f1fc706_c947_4daa_ab1b_60b0eca6670a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*B0QBfkVFv6BcsMXS_G-D9g.jpeg,cloud-services 2569,1987,Cloud Security 101 — Understanding Cloud Security Solutions,"Cloud Security solutions reinforce the security strategy by implementing required processes and controls to secure and protect cloud-based applications and databases, thereby minimizing security risks. …",https://medium.com/@progresschef/cloud-security-101-understanding-cloud-security-solutions-913863cdc26b?source=topics_v2---------105-84--------------------80382960_df24_4919_b74f_9226f9de32b0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Cm2zmQU9ERRO9Are,cloud-services 2570,127,Top 6 Cloud Migration Service Providers For Businesses In 2023,"Every business needs to stay up-to-date with the latest technology and tools to keep pace with the competition. Cloud migration is one such tool that can help companies adopt new technologies, maximize the value of existing investments, and stay ahead of their competitors. With the constant evolution of cloud computing…",https://medium.com/@eastgate/top-6-cloud-migration-service-providers-for-businesses-in-2023-1d258c950005?source=topics_v2---------106-84--------------------80382960_df24_4919_b74f_9226f9de32b0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*KFsOaWAZLLulhR7H1pJxjQ.jpeg,cloud-services 2571,1988,Microsoft Azure SFTP,"Recently, Microsoft Azure added a managed SFTP option built on their Blob storage. This is a good option when setting up an account that will stay exclusively in Microsoft Azure when you only need basic SFTP functionality. …",https://medium.com/couchdrop-io/microsoft-azure-sftp-668dbc978b1d?source=topics_v2---------114-84--------------------80382960_df24_4919_b74f_9226f9de32b0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*t2oNR5cwdSAmr4Pl,cloud-services 2572,1988,Movebot data migrations are fast-but how fast is fast?,"Speed is one of the most important parts of a data migration. Data movement needs to be fast to be worthwhile. And when it comes to speed, Movebot’s one of the fastest cloud data migration tools around. So how fast is fast? Movebot can push through 100TB per day on…",https://medium.com/couchdrop-io/movebot-data-migrations-are-fast-but-how-fast-is-fast-d37c939de754?source=topics_v2---------116-84--------------------584bcc3f_7a47_4ba1_a33b_d8335cc6a9f2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*BrPnDdKChOEVszwk.png,cloud-services 2573,1989,"Evolution of Cloud Computing, Part 4: Beware the False Cloud",By: Shipra Jain The rise of the cloud has transformed business technology. Cloud applications and services are integrated into many business operations. From managing infrastructure to remote work and software development. Cloud is no longer used only as a tool. …,https://medium.com/next-at-chase/evolution-of-cloud-computing-part-4-beware-the-false-cloud-291a8a8d593d?source=topics_v2---------117-84--------------------584bcc3f_7a47_4ba1_a33b_d8335cc6a9f2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fTG-K4OG6Bt2aHoqRSrJQA.jpeg,cloud-services 2574,1990,The Future of Cloud Computing: Key Trends and Predictions for the Next 5 Years,"Cloud computing is no longer a buzzword, but a fundamental technology that has become the backbone of modern businesses. It allows companies to store, manage and access data over the internet, which has transformed the way we work and collaborate. In this article, I will provide an overview of cloud…",https://medium.com/@saadmujeeb/the-future-of-cloud-computing-key-trends-and-predictions-for-the-next-5-years-b59f646c2f3d?source=topics_v2---------118-84--------------------584bcc3f_7a47_4ba1_a33b_d8335cc6a9f2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-services 2575,1883,Complete Guide to Cloud Computing Sustainability or Green Cloud,"The term cloud computing sustainability or “Green Cloud” refers to an environmentally friendly approach to cloud computing, which aims to minimize carbon emissions and increase the use of renewable energy sources. Major cloud service providers have taken steps towards this goal. …",https://medium.com/towardsdev/complete-guide-to-cloud-computing-sustainability-or-green-cloud-abb62d0ce4f1?source=topics_v2---------119-84--------------------584bcc3f_7a47_4ba1_a33b_d8335cc6a9f2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gdvRWJG_M3zGO7ZcNnISNQ.jpeg,cloud-services 2576,1991,6 Key Concepts to You NEED to Know about Cloud Computing,"Cloud computing and serverless applications have become increasingly popular in recent years. As more companies move their infrastructure to the cloud, it’s important for developers to have a solid understanding of the key concepts behind these technologies. …",https://medium.com/@nathanflore/6-key-things-to-you-need-to-know-about-cloud-computing-2ba805f9399b?source=topics_v2---------120-84--------------------584bcc3f_7a47_4ba1_a33b_d8335cc6a9f2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*UXRswI30EL7WNSOa,cloud-services 2577,1992,Cloud Computing Explained for Beginners,"Long ago, if an enterprise wanted to have computing or information technology resources available to them, they would have to invest in building their own data center for their operation. A data center is a large facility or warehouse that contains vast amounts of computer servers, networking equipment, power supplies…",https://medium.com/@mjhudson1224/cloud-computing-explained-for-beginners-9366c10d5465?source=topics_v2---------121-84--------------------584bcc3f_7a47_4ba1_a33b_d8335cc6a9f2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*N0JRGeWrVXTjUTfXkvSrWg.png,cloud-services 2578,1993,Cost-Effective DevOps Solutions for Small Businesses,"DevOps is a set of practices that emphasizes collaboration, communication, automation, and monitoring throughout the software development and delivery process. Small businesses may face challenges in implementing DevOps due to limited resources, expertise, and budget. …",https://medium.com/@Techforce_global/cost-effective-devops-solutions-for-small-businesses-73a912b55c63?source=topics_v2---------122-84--------------------584bcc3f_7a47_4ba1_a33b_d8335cc6a9f2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4WKCiLDTk22JGZrPrD4Dgw.png,cloud-services 2579,1994,“Cloud Computing Trends: How They’re Impacting Businesses”?,"Cloud computing has gained popularity among companies of all kinds in recent years. A number of advantages come with cloud computing, such as increased scalability, flexibility, and cost efficiency. Here are some of the most important themes to watch as cloud computing develops and their effects on organizations. Multi-Cloud Environments The development…",https://medium.com/@iamsohrabahmad/cloud-computing-trends-how-theyre-impacting-businesses-3f53c091022e?source=topics_v2---------123-84--------------------584bcc3f_7a47_4ba1_a33b_d8335cc6a9f2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*aV3x_Mayry-867Cp,cloud-services 2580,1995,Creating and Accessing a Cloud-hosted Linux Virtual Machine,"Using this walkthrough, you will learn how to: Register and create a VM instance using GCP (Google Cloud Platform). Configure SSH keys for secure access to the VM Access the VM using SSH Add custom firewall rules in the subnet’s security list Install RDP on the VM and access it…",https://medium.com/@glassesman01/creating-and-accessing-a-cloud-hosted-linux-virtual-machine-2e68eddb33a4?source=topics_v2---------124-84--------------------584bcc3f_7a47_4ba1_a33b_d8335cc6a9f2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*b8TkCggK66l7zQy5GGoDZg.jpeg,cloud-services 2581,1951,AWS Cloud,"Case Study: AWS cloud (Netflix, NASA, Pinterest) What is AWS (Amazon Web Services)? AWS (Amazon Web Services) is a cloud computing platform provided by Amazon that offers a wide range of infrastructure and services for computing, storage, database, analytics, machine learning, security, and more. With AWS, businesses can access and use computing resources and services through…",https://medium.com/@surajsambhoji_55/aws-cloud-de452821280c?source=topics_v2---------125-84--------------------17bfbe1b_55b2_4f4d_b18f_5fcb71afe2a3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9jz1ONWwhPwR9LKc5Czqig.png,cloud-services 2582,1989,"Evolution of Cloud Computing, Part 1: Clouds on the Horizon","By: Shipra Jain Until a few years ago, the IT industry had three categories of company: hardware companies, software product companies and IT services companies. If an organization wanted to computerize a certain function, such as payroll, it first bought the hardware, then the licenses for the software, and finally…",https://medium.com/next-at-chase/evolution-of-cloud-computing-part-1-clouds-on-the-horizon-81dd55dca748?source=topics_v2---------126-84--------------------17bfbe1b_55b2_4f4d_b18f_5fcb71afe2a3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LBiCmz4Rr7EJnlnCRyogxQ.jpeg,cloud-services 2583,1989,"Evolution of Cloud Computing, Part 2: Major Cloud Computing Categories",By: Shipra Jain Cloud computing is a general term for anything that involves delivering hosted services over the internet. These services are broadly divided into three categories:,https://medium.com/next-at-chase/evolution-of-cloud-computing-part-2-major-cloud-computing-categories-4ccbfcb6d4bd?source=topics_v2---------127-84--------------------17bfbe1b_55b2_4f4d_b18f_5fcb71afe2a3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7M4IOt0MioSu8gWEpoJzRw.png,cloud-services 2584,1996,"To Manage or Not to Manage, a SecOps Question","Photo by FLY:D on Unsplash Quick Intro As this is my first Medium post, I thought it only right to give a brief intro. Currently I spend my time as a security-focused Practice Lead in Google Public Sector. It allows me the ability to speak with customers about their security journeys as…",https://medium.com/@russellgoldenbroit/to-manage-or-not-to-manage-a-secops-question-eeba3376fa49?source=topics_v2---------129-84--------------------17bfbe1b_55b2_4f4d_b18f_5fcb71afe2a3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*bNleJWT5DjWnJbcJ,cloud-services 2585,1997,The Human Factor of Sustained Cloud Spend Optimization,"Alongside technology modernization, sustained financial success in the cloud requires shifts in mindset, culture, and processes. — By Poonam Bhargava Spend optimization doesn’t always imply cutting costs. Instead, optimization means applying cloud spend in the most optimal way to drive the best business outcomes — and that might require spending more. …",https://medium.com/slalom-business/the-human-factor-of-sustained-cloud-spend-optimization-2ef1e4ce1e09?source=topics_v2---------130-84--------------------17bfbe1b_55b2_4f4d_b18f_5fcb71afe2a3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vg8IVxiArCK4ukm1-OtpqQ.png,cloud-services 2586,1998,Cloud Cost Management Series Part I — Cloud Usage & Costs: Key challenges,"In the past few decades, the cloud has provided organizations with greater flexibility, agility, and scalability, enabling them to respond more quickly to changing business needs and stay ahead of the competition. According to the latest forecast from Gartner worldwide, end-user spending on public cloud services is forecast to grow…",https://medium.com/@anblicks-inc/cloud-cost-management-series-part-i-cloud-usage-costs-key-challenges-4d8043ce9e50?source=topics_v2---------131-84--------------------17bfbe1b_55b2_4f4d_b18f_5fcb71afe2a3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*d65m_A2phuW8vd1K.png,cloud-services 2587,1999,What is Cloud FinOps? Guide for the Beginners — NIX United,"Along with the turning to cloud integration services, the optimization of business processes has begun. Over time, the range of tasks that they solve expands, and with it, the cost of the cloud grows. To understand what exactly is responsible for this growth and whether it can be reduced, Cloud…",https://medium.com/geekculture/what-is-cloud-finops-guide-for-the-beginners-nix-united-a2a7e78f9cdd?source=topics_v2---------132-84--------------------17bfbe1b_55b2_4f4d_b18f_5fcb71afe2a3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*174c1DNsUyFkl9Jz.jpg,cloud-services 2588,2000,EMQX Cloud Announcing MQTT Serverless Service: Deployment in 5 Seconds and Pay as You Go,"EMQ now officially launches its MQTT Serverless cloud service, the EMQX Cloud Serverless (Beta). Based on the innovative multi-tenant technology, EMQX Cloud Serverless provides users with the blazing-fast deployment of MQTT services in just 5 seconds without concerns about server infrastructure management or resource allocation when service scales. EMQX Cloud…",https://medium.com/@emqx/emqx-cloud-announcing-mqtt-serverless-service-deployment-in-5-seconds-and-pay-as-you-go-242d3b60c4ad?source=topics_v2---------133-84--------------------17bfbe1b_55b2_4f4d_b18f_5fcb71afe2a3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*XUkL7xa1eVJx7Zil-U5GZA.jpeg,cloud-services 2589,2001,Book Review “A Developer’s Guide to Cloud Apps Using Microsoft Azure”,"Build and deploy modern and secure applications on Microsoft Azure by implementing best practices, patterns, and new technologies with this easy-to-follow guide Being an author is entirely different from being a reviewer! I wrote this book for 9 months and after many reviews by Packt editor to ensure the book’s…",https://medium.com/@didourebai/book-review-a-developers-guide-to-cloud-apps-using-microsoft-azure-a5165ef8dc2c?source=topics_v2---------134-84--------------------17bfbe1b_55b2_4f4d_b18f_5fcb71afe2a3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*F6d7XTlfhKfhTBJdcnXrTg.png,cloud-services 2590,2002,Ride-Hailing Giant Uber Turns to Google and Oracle Clouds for Data Storage,"Uber has made the switch from in-house data centers to Google and Oracle Cloud Services for improved data storage and management. Read on to find out more. The ride-hailing giant, Uber, has made a significant change in its technology strategy by opting to transfer the contents of its data centers…",https://medium.com/@johnny_x87/ride-hailing-giant-uber-turns-to-google-and-oracle-clouds-for-data-storage-abddccd40f08?source=topics_v2---------135-84--------------------d7729a4b_c706_4379_b6fc_1da1fb36c2b1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*fEpuFF9d2yplG0y_.jpg,cloud-services 2591,1987,Zero Trust and the Modern IT Ecosystem,"As technology continues to evolve and scale new heights, challenges associated with cybersecurity are also increasing simultaneously. Digital transformation endeavours and a growing remote workforce has continued to introduce newer security threats forcing organizations to implement stronger, more reliable security strategies. …",https://medium.com/@progresschef/zero-trust-and-the-modern-it-ecosystem-d6199078bd88?source=topics_v2---------136-84--------------------d7729a4b_c706_4379_b6fc_1da1fb36c2b1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gU5YmwCD4_IpWRF3YMVrrQ.png,cloud-services 2592,2003,Securing the Cloud: Best Practices for Protecting Your Data in the Cloud,"In this article, we will talk about the best practices for securing the cloud and protecting your data in the cloud. The cloud has become an increasingly popular way to store and access data, but it also poses new security risks. …",https://medium.com/bugbountywriteup/securing-the-cloud-best-practices-for-protecting-your-data-in-the-cloud-ad9b63304533?source=topics_v2---------137-84--------------------d7729a4b_c706_4379_b6fc_1da1fb36c2b1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*dz8VFlwgSHTmHW_k,cloud-services 2593,2004,10 Cloud Migration Challenges and How to Overcome Them?,"Are you ready to move to the cloud but feeling overwhelmed? Although cloud migration can be challenging, it can also be a breeze with the right knowledge and solutions. We have compiled a list of the top 10 challenges of cloud migration and how to overcome them. …",https://medium.com/solute-labs/10-cloud-migration-challenges-and-how-to-overcome-them-fe1ff32f5b6f?source=topics_v2---------138-84--------------------d7729a4b_c706_4379_b6fc_1da1fb36c2b1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SBlADnRlYg0Ouv5y51Ehgw.png,cloud-services 2594,2005,Getting started with Cloud Computing,"What is Cloud Computing? Cloud computing is a model for delivering information technology (IT) services in which resources, such as computing power, data storage, and applications, are provided over the internet as a utility-like service. …",https://medium.com/@sumeetpoddar07/getting-started-with-cloud-computing-5b18b0680646?source=topics_v2---------139-84--------------------d7729a4b_c706_4379_b6fc_1da1fb36c2b1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-services 2595,2006,Cloud Services : SaaS vs PaaS vs IaaS vs STaaS vs BaaS,"A Quick Guide to Understanding the Different Types of Cloud Services Cloud services are services that are hosted, managed, and provided over the internet. Examples of cloud services include Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), Storage as a Service (STaaS), and Backup as a Service (BaaS). …",https://medium.com/@abdelmajid-baco/cloud-services-saas-vs-paas-vs-iaas-vs-staas-vs-baas-18288ae88cc4?source=topics_v2---------140-84--------------------d7729a4b_c706_4379_b6fc_1da1fb36c2b1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*k0gA1GQ0YR60PVsawNphzg@2x.jpeg,cloud-services 2596,2007,How to create your first AWS EKS cluster using eksctl,"Running software in a container environment like AWS Fargate or AWS EKS (Kubernetes) can be very powerful, many are using AWS Fargate because Kubernetes sound so complex to start with. Based on expired AWS Fargate and AWS EKS (Kubernetes) resolved different jobs and tasks, so why not use the power…",https://medium.com/devops-techable/how-to-create-your-first-aws-eks-cluster-using-eksctl-a7a68b1e39e2?source=topics_v2---------141-84--------------------d7729a4b_c706_4379_b6fc_1da1fb36c2b1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*nZA4uRORMjOyqQFI.png,cloud-services 2597,1923,🏈 Happy Super Bowl! Share The Winning Team in AR (Shareable) 🏈,Football fans! The day has come where two of the best teams compete for the famous Lombardi Trophy! We’ve created AR greetings to share for each team. Easy virtual 3D sharing like this is becoming increasingly popular thanks to technology by platforms like echo3D — the premiere 3D asset management…,https://medium.com/echo3d/happy-super-bowl-share-the-winning-team-in-ar-shareable-9684d3afe52e?source=topics_v2---------142-84--------------------d7729a4b_c706_4379_b6fc_1da1fb36c2b1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*a6VFZQkCqVe9YdQd4NgN4g.png,cloud-services 2598,2008,"ECS Deep Dive, why does this container orchestration helps small startups save cost?","I’m working on a startup. Our first priority is to minimize operating costs, and infrastructure is not an exception. Our team is operating 20 services, including 16 microservices apps and 4 infrastructure apps (Vault, ELK stack). Around many orchestration engines, we decided to use AWS Elastic Container Service with EC2…",https://medium.com/@chuong-tran/ecs-deep-dive-why-does-this-container-orchestration-helps-small-startups-save-cost-851ab2b946e3?source=topics_v2---------143-84--------------------d7729a4b_c706_4379_b6fc_1da1fb36c2b1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kvxIj7yhihdQs8xJHWk6RA.png,cloud-services 2599,2009,Why I recommend everyone to dump torrent clients and start using Seedr,"Hi there, Today I will be reviewing Seedr, a website that allows you to download torrents privately and securely. The main advantages of using Seedr are Download torrents in the cloud — accessible anytime, anywhere and from any device Download torrents in the background. Hide your IP and thus, protect…",https://medium.com/@fintone.softa/why-i-recommend-everyone-to-dump-torrent-clients-and-start-using-seedr-4d01a74ca3d3?source=topics_v2---------144-84--------------------d7729a4b_c706_4379_b6fc_1da1fb36c2b1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JsVXO87b0f-NeOv-5f-k2g.png,cloud-services 2600,2010,Open-source Data Tools will provide a way out of your overpriced cloud tools,"You just need to know how to use them in production. — Many businesses acquired a lot of proprietary data tools in recent years. They started small by setting up a cloud data warehouse and quickly found out there is a whole ecosystem of nice-to-have tools out there, all jumping on the bandwagon of the modern data stack. Due to the unbundling…",https://medium.com/@wesleynitikromo/open-source-data-tools-will-provide-a-way-out-of-your-overpriced-cloud-tools-4041bc394eb4?source=topics_v2---------145-84--------------------ec7dd3ff_b125_4fc7_84e5_fb3cb8116de1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*LfG5jKvj8qB0aX0m,cloud-services 2601,2011,A Beginner’s Guide To Cloud,"We can find a extensive list of definition across platforms for CLOUD, its more important how we follow with the learning and implementing it various industries. Let’s start with establishing a common understanding of the cloud and related terms: What is Cloud? Cloud is a term used to describe globally available storage and…",https://medium.com/@sonalswarnkar90/a-beginners-guide-to-cloud-ae2d9b6940df?source=topics_v2---------146-84--------------------ec7dd3ff_b125_4fc7_84e5_fb3cb8116de1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*dkHjwLbxmQk0pIx6KrHUxg.png,cloud-services 2602,2012,Hosting multiple Django Application on NGINX server on Same Droplet DIGITALOCEON,"Setting up the source code and virtualenv 1: Digital ocean provide a browser based terminal or console, which we can access our droplet. Accessed through the browser. 2: First we must go to root folder — ‘cd ..’ then in the root folder “srv” enter into the srv folder ‘cd srv’ then create a folder “django” -’mkdir…",https://medium.com/@shaunchukkiriyan/hosting-multiple-django-application-on-nginx-server-on-same-droplet-digitaloceon-8728fdb4e0a3?source=topics_v2---------147-84--------------------ec7dd3ff_b125_4fc7_84e5_fb3cb8116de1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-services 2603,2013,Effortless Deployment to Google Cloud with Github Actions Workflow,"As a software developer, you are always looking for ways to automate and streamline your workflows. You’ve been using Github for version control and are well familiar with its Actions feature for automating CI/CD pipelines. Now, you’re eager to bring your deployment process to the cloud, specifically Google Cloud Platform. …",https://medium.com/@pg598595/effortless-deployment-to-google-cloud-with-github-actions-workflow-517319c4d9ce?source=topics_v2---------148-84--------------------ec7dd3ff_b125_4fc7_84e5_fb3cb8116de1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*oa3F04I29ee1-PSe,cloud-services 2604,2014,Building Azure Machine Learning Pipelines Using Python,"simple steps to get you started with Azure ML Pipelines using Python With the advent of cloud based services, many companies are trying to offload compute intensive operations from their own servers to cloud servers. This helps in saving costs, increased collaboration, enhanced security and offers many other advantages. The…",https://medium.com/@devangmehta_1997/azure-machine-learning-pipelines-cce0f6757578?source=topics_v2---------149-84--------------------ec7dd3ff_b125_4fc7_84e5_fb3cb8116de1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0du0cnRO0caS_XmzWbLf_A.png,cloud-services 2605,2015,Why 2023 will usher in next-generation cloud value,"As Steve Jobs once said, “I don’t need a hard disk in my computer if I can get to the server faster… carrying around these non-connected computers is byzantine by comparison.” In recent years, cloud computing has become one of the most widely used technologies. According to the most recent…",https://medium.com/@balajeekowshik/why-2023-will-usher-in-next-generation-cloud-value-e4daf5312a87?source=topics_v2---------151-84--------------------ec7dd3ff_b125_4fc7_84e5_fb3cb8116de1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*2pzFkDGJnnOB1NvV4PCvHw.jpeg,cloud-services 2606,2016,Kubernetes introduction,"Kubernetes is an open-source platform for automating deployment, scaling, and management of containerized applications. It was originally developed by Google and is now maintained by the Cloud Native Computing Foundation. …",https://medium.com/@alex.ivenin/kubernetes-introduction-bafe5b9941bb?source=topics_v2---------152-84--------------------ec7dd3ff_b125_4fc7_84e5_fb3cb8116de1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*8lCtC4BG1IKg7XF0s-9O8A.png,cloud-services 2607,2017,New Cloud Market Report from Synergy Group,"Results of the cloud infrastructure services market in Q4 of 2022. The market saw an increase of 21% worldwide, reaching $61 billion. However, the growth rate decreased compared to previous quarters due to economic conditions and the strength of the US dollar. The three largest cloud providers, Microsoft, Amazon, and Google, accounted for 66% of the market, with Amazon maintaining its market share and Microsoft seeing an increase.",https://medium.com/@magnus.jenssen/new-cloud-market-report-from-synergy-group-7142580a0cd5?source=topics_v2---------153-84--------------------ec7dd3ff_b125_4fc7_84e5_fb3cb8116de1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*cPtovl7hn-JkNPl_oPHjhA.jpeg,cloud-services 2608,2018,Key challenges in selecting the right IoT cloud solution for OEM IoT solution needs.,"Nowadays billions of internet-connected end devices and IoT hubs are taking place over traditional automation and playing a big role to make human life easier and more comfortable. However, in this process, these devices create tons of data and send them to the cloud for further processing. This requires an…",https://medium.com/@volansys/key-challenges-in-selecting-the-right-iot-cloud-solution-for-oem-iot-solution-needs-3ad25947aa82?source=topics_v2---------154-84--------------------ec7dd3ff_b125_4fc7_84e5_fb3cb8116de1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*gW5cfnryRqTORXwV.png,cloud-services 2609,2019,Lift & Shift + Modernização de Aplicação: Convertendo uma aplicação legado para rodar em containers…,Lift & Shift + Modernização de Aplicação: Convertendo uma aplicação legado para rodar em containers no Google Kubernetes Engine (GKE) usando o Anthos (Lift & Shift + Application Modernization: Converting a legacy application to run in containers on Google Kubernetes Engine (GKE) using Anthos) Em outro projeto baseado em um…,https://medium.com/@mirnalinhares3/lift-shift-modernização-de-aplicação-convertendo-uma-aplicação-legado-para-rodar-em-containers-747e6ea476ac?source=topics_v2---------155-84--------------------72a2a42d_bfe9_443a_a982_6f7aca865ae1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*FX1xA8bbISXLkqp-.jpg,cloud-services 2610,1959,What is Cloud Orchestration?,"Cloud orchestration is a method for managing workload connections and activities across different types of clouds, including public and private. Cloud orchestration technology is used to combine automated activities and processes into a workflow, allowing for the completion of certain business procedures. A key function of cloud orchestration solutions is…",https://medium.com/@niitwork0921/what-is-cloud-orchestration-88c5a438ee02?source=topics_v2---------156-84--------------------72a2a42d_bfe9_443a_a982_6f7aca865ae1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*IEoPMKE1Yy1p3lK_.jpg,cloud-services 2611,1959,What is Cloud Analytics?,"Cloud analytics is the use of cloud computing to analyze massive volumes of data to detect patterns and extract insights, usually for business purposes. Cloud certification courses will add more value to your resume. WHAT IS THE PROCESS OF CLOUD ANALYTICS? Cloud analytics enables firms to use higher processing capacity from a third-party cloud computing provider without…",https://medium.com/@niitwork0921/what-is-cloud-analytics-886b96c2fc3e?source=topics_v2---------157-84--------------------72a2a42d_bfe9_443a_a982_6f7aca865ae1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*wO7AricqYSr08buc.jpg,cloud-services 2612,1400,Why do all cloud computing companies become serverless companies?,"Introduction to Serverless Computing Serverless computing is a method of providing backend services on an as-needed basis, without the need for traditional server management and administration. Serverless computing allows for the execution of application logic without the need for a server to manage and scale the application. …",https://medium.com/cloud-believers/why-do-all-cloud-computing-companies-become-serverless-companies-96c9ccc89cf7?source=topics_v2---------158-84--------------------72a2a42d_bfe9_443a_a982_6f7aca865ae1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*bjJtKj_uTWZIetGS,cloud-services 2613,2020,SAAS Hosting with AWS VPC Private Link,"AWS Privatelink is an underrated and valuable feature. It allows private subnets to connect with supported AWS services without provisioning IGW, Public IP, and NatGateway. It not only helps you to reduce network latency but also reduces bandwidth charges. There are two types of AWS Privatelinks: Gateway Endpoints: Supports only…",https://medium.com/@rajdeep.617/sas-hosting-with-aws-vpc-private-link-f304acec28c5?source=topics_v2---------159-84--------------------72a2a42d_bfe9_443a_a982_6f7aca865ae1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*cmaVfxwKrTQepbqR,cloud-services 2614,2021,Sqribble (useful tool to help you increase side hustle income),"Sqribble is a cloud-based tool to create professional-looking eBooks, reports, whitepapers and digital books quickly and easily. It features automatic content from a URL, niche articles or Word documents, gorgeous eCovers, flipbook creation, automatic table of contents, headers and footers, pagination, drag and drop design, media addition, 300+ Google…",https://medium.com/@sidehustlebuddy/sqribble-useful-tool-to-help-you-increase-side-hustle-income-e1310b55994b?source=topics_v2---------160-84--------------------72a2a42d_bfe9_443a_a982_6f7aca865ae1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*7LZJyoKPFDi62yFJ,cloud-services 2615,2022,Embracing a Modernisation of the Cloud to Ensure Agile Decision Making,"Registration is now open In today’s rapidly changing world, resilience and adaptability are crucial for business success. As the world accelerated towards digital, it stressed cloud service providers by increasing traffic on networks that connect users to these services. …",https://medium.com/@marcusevans-onlineevents/embracing-a-modernisation-of-the-cloud-to-ensure-agile-decision-making-eeff469a5674?source=topics_v2---------161-84--------------------562417a8_7b09_49af_bdd5_fe739da3c280-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rDLBdKWlToTgZwFG81fzzQ.png,cloud-services 2616,2023,Unlocking the Full Potential of Cloud Computing in 2023: Why This Is The Year Of Next-Level Value,"As the world moves forward in the digital age, companies must keep up with the latest technological advancements in order to remain competitive. Jaiinfoway, a leading technology firm, has taken this challenge head-on by embracing cloud computing in 2023 a big way. …",https://medium.com/@jaiinfowayofficial/unlocking-the-full-potential-of-cloud-computing-in-2023-why-this-is-the-year-of-next-level-value-3fcdb019990a?source=topics_v2---------162-84--------------------562417a8_7b09_49af_bdd5_fe739da3c280-------17,https://miro.medium.com/v2/resize:fill:140:140/0*0oOTWYtnJhVGCu6v.png,cloud-services 2617,2024,Creating and Managing Amazon EKS Clusters: A Step-by-Step Guide,"AWS Prerequisites Install AWS CLI in an EC2 instance Install Kubectl Create a Cluster Create Worker Nodes Configure Kubectl to use Cluster Conclusion AWS Prerequisites Set up an EC2 instance in an Amazon VPC. Here’s how to create and configure the VPC, as well as launch the EC2 instance within…",https://medium.com/@srijaanaparthy/creating-and-managing-amazon-eks-clusters-a-step-by-step-guide-256a9eb11376?source=topics_v2---------163-84--------------------562417a8_7b09_49af_bdd5_fe739da3c280-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JDVe6RqEFcjGs2zq1fDDvQ.png,cloud-services 2618,2025,The Future of AI on the Flux Blockchain! | tsn,"Artificial Intelligence (AI) and blockchain technology are two of the most significant technological advancements of our time. AI has the potential to revolutionize many industries, while blockchain provides a secure, decentralized platform for transactions. …",https://medium.com/@techsocialnetwork/the-future-of-ai-on-the-flux-blockchain-tsn-d946bbc3a98f?source=topics_v2---------164-84--------------------562417a8_7b09_49af_bdd5_fe739da3c280-------17,https://miro.medium.com/v2/resize:fill:140:140/0*BodvCKOdPYVnBCVf.png,cloud-services 2619,2026,Frequently used AWS cloud services for building cloud-native apps,"I was recently going through AWS cloud products after a visit to a conference. Some of the most commonly used AWS services used by startups, companies, and application developers are discussed in this article. One example of an implementation is given below. …",https://medium.com/@jaryya/frequently-used-aws-cloud-services-for-building-cloud-native-apps-44d893f663e5?source=topics_v2---------165-84--------------------562417a8_7b09_49af_bdd5_fe739da3c280-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Xh-I67ZUOFPplVWT,cloud-services 2620,2027,Hidden Technical Debt in Machine Learning Systems,💡 This post is highly influenced by the paper Hidden Technical Debt of Machine Learning Systems written by Google Inc. in 2016. I strongly encourage you to read the original paper. I just paraphrase and try to add useful explanations. Technical Debt is a metaphor that stands for the extra…,https://medium.com/@goktugocal41/hidden-technical-debt-in-machine-learning-systems-8ea632c5b2e3?source=topics_v2---------166-84--------------------562417a8_7b09_49af_bdd5_fe739da3c280-------17,https://miro.medium.com/v2/resize:fill:140:140/1*GUL4Hd1XJBlN7m3n0rTsaw.jpeg,cloud-services 2621,159,Cloud Computing & Deployment.,"Cloud computing is a method of delivering computing resources, such as storage, computing power, and software, over the internet. It allows users to access these resources on demand, without having to invest in expensive hardware and software. …",https://medium.com/@abhi-mishra/cloud-computing-deployment-78496e009b31?source=topics_v2---------167-84--------------------562417a8_7b09_49af_bdd5_fe739da3c280-------17,https://miro.medium.com/v2/resize:fill:140:140/1*h3-gcdYg12rJKpLWR48WGw.jpeg,cloud-services 2622,2028,Must Try (Open-Source) Google Cloud Platform-GCP Projects on GitHub,"Google Cloud Platform (GCP) is a public cloud vendor that builds apps faster, makes smarter business decisions, and connects people anywhere. It provides cloud services for Compute, Storage, Databases, Data analytics, AI and machine learning, Networking, and Developer tools to build, scale, and solve your business problems. Companies like Goldman…",https://medium.com/@mrinalwalia/must-try-open-source-google-cloud-platform-gcp-projects-on-github-8d69ef49cf56?source=topics_v2---------168-84--------------------562417a8_7b09_49af_bdd5_fe739da3c280-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7cr4Dkwm_iw24O_d8WYPBw.png,cloud-services 2623,2029,Why Choose Kubernetes Over Serverless?,"Managing infrastructure stinks, doesn’t it? To Server or Not To Server Applications built using “serverless” technologies are all the rage these days. Azure Functions, Google Cloud Serverless, AWS Lambda and I’m sure there are equivalents on all the other cloud providers (DigitalOcean calls them Functions too!) The main appeal with a serverless setup is that you…",https://medium.com/@mckornfield/why-choose-kubernetes-over-serverless-2aabd3ed56f4?source=topics_v2---------169-84--------------------562417a8_7b09_49af_bdd5_fe739da3c280-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EAZRtMSA_JCfaWT7O7g2FQ.png,cloud-services 2624,2030,Cloud Computing explanation to a 10-year-old child VS an IT developer,Cloud computing is a technology that lets us store and use information and software on the internet instead of having it on our own computers. …,https://medium.com/design-bootcamp/cloud-computing-is-a-technology-that-lets-us-store-and-use-information-and-software-on-the-internet-a749ec6a36fd?source=topics_v2---------170-84--------------------562417a8_7b09_49af_bdd5_fe739da3c280-------17,https://miro.medium.com/v2/resize:fill:140:140/0*8zG4Q1bkv2hwjzKW,cloud-services 2625,2031,When You Don’t Want to Use the Quantum Cloud,"The quantum cloud is the preferred way of accessing quantum hardware. According to a December 2022 survey from Hyperion Research, 50% of surveyed users access quantum through the cloud, and another 17% use hybrid on-prem/cloud access. Still, 21% want on-prem quantum hardware. …",https://medium.com/@superpositionguy/when-you-dont-want-to-use-the-quantum-cloud-466c39177280?source=topics_v2---------171-84--------------------2000f9dc_183e_46cd_823f_9b3ab56a8b70-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vRFAZfWkg4i7q0ZDaB4l7A.png,cloud-services 2626,2032,What is the Difference Between AWS Cloudformation and Terraform,"AWS CloudFormation and Terraform are both Infrastructures as Code (IaC) tools, meaning they allow you to manage and provision infrastructure resources through code. The main difference between them is: AWS CloudFormation is a service provided by Amazon Web Services (AWS) and is specifically designed to work with AWS services. …",https://medium.com/@bdccglobal/what-is-the-difference-between-aws-cloudformation-and-terraform-ae2bf167aeaf?source=topics_v2---------172-84--------------------2000f9dc_183e_46cd_823f_9b3ab56a8b70-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Kr7kweXhf4ju11o8hI-REQ.jpeg,cloud-services 2627,2033,BS in Cloud Computing — Career Outlook,"The demand for professionals in the field of cloud computing has been on the rise in recent years, and a Bachelor of Science (BS) degree in cloud computing can provide a strong foundation for a successful career in this growing field. …",https://medium.com/@mosesreuben/bs-in-cloud-computing-career-outlook-896f6157624b?source=topics_v2---------173-84--------------------2000f9dc_183e_46cd_823f_9b3ab56a8b70-------17,https://miro.medium.com/v2/resize:fill:140:140/0*v7X7V-vkQHEXKPv6,cloud-services 2628,2034,AWS Solutions Architect Associate Exam: My Exam Experience and Tips,"Last week, I gave the AWS Solutions Architect Associate Exam. Unfortunately, I did not pass the exam. However, I believe every failure is a learning opportunity and I want to share what I have learned from my experience. So, where to begin? AWS has various certifications. from beginners to cloud…",https://medium.com/@amay.sonar/aws-solutions-architect-associate-exam-my-exam-experience-and-tips-4dc004054e09?source=topics_v2---------174-84--------------------2000f9dc_183e_46cd_823f_9b3ab56a8b70-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-services 2629,1923,Happy Black History Month Greeting (Shareable),Happy Black History Month from the echo3D team! Virtual 3D greetings are becoming increasingly popular thanks to technology by platforms like echo3D — the premiere 3D asset management platform. You’re able to create shareable augmented reality experiences by simply adding 3D assets to the console and sharing a link or…,https://medium.com/echo3d/happy-black-history-month-greeting-shareable-cb65ed745709?source=topics_v2---------175-84--------------------2000f9dc_183e_46cd_823f_9b3ab56a8b70-------17,https://miro.medium.com/v2/resize:fill:140:140/1*A6KiqlkF2_Hr7lQ-Iawjfg.png,cloud-services 2630,2035,"AWS -IAM User, User Groups & Policies hands-on","A journey of AWS Associate Certification… Generic User Access Management Module insight First of all, I will take you through a User Access or Identity Manager Request flow. In a web application, when a user tries to access some secure resources (Ex. MyAccount Page…",https://medium.com/@saurabhshcs/aws-iam-user-user-groups-policies-hands-on-7e7052ad96f8?source=topics_v2---------176-84--------------------2000f9dc_183e_46cd_823f_9b3ab56a8b70-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-eXJpf5Mv02F4FXkiWpgfA.png,cloud-services 2631,2036,Creating an Azure Key Vault & Key Vault Secrets,"Part 1 of a 3 part series… — I need to apologize for being tardy, I promised a follow up article at the end of last year about programmatically connecting to Azure resources. If you know me, you know I’m definitely a type A person who is very thorough and detailed oriented. Although I finished most of the…",https://medium.com/@tophamcherie/creating-an-azure-key-vault-key-vault-secrets-2775b38979ff?source=topics_v2---------177-84--------------------28bae006_ca5e_4ae3_97eb_e43d749cde7d-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*iHcHq8ODef0-HsQG-B8WWg.gif,cloud-services 2632,2037,The Cloud AI Leader — H20.AI,"Started by a group of like-minded individuals! This open-source community is driven by the idea that there should be freedom around the creation and use of AI. Some of their investors, partners, and customers include Wells Fargo, NVIDIA, Unilever, Walgreens, Kaiser, Data Scientist, AT&T, and half of the fortune 500…",https://medium.com/@oluaganju/the-cloud-ai-leader-h20-ai-1cc29bb05411?source=topics_v2---------178-84--------------------28bae006_ca5e_4ae3_97eb_e43d749cde7d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*E4ADFcFNUKHgRys0B-4ZNA.png,cloud-services 2633,2038,How to Use Azure Open AI Service in C#?,"Azure Open AI Service is a cloud-based platform that allows developers to easily integrate state-of-the-art AI models into their applications. Azure OpenAI Service gives customers advanced language AI with OpenAI GPT-3, Codex, and DALL-E models with the security and enterprise promise of Azure. …",https://medium.com/@liuhongbo/how-to-use-azure-open-ai-service-in-c-80cfd63a5189?source=topics_v2---------179-84--------------------28bae006_ca5e_4ae3_97eb_e43d749cde7d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rE2EZSWdpEZWuGoAAWOXFw.png,cloud-services 2634,2039,A guide from Cloud Security Best Practices,"As more and more businesses are starting to move away from physical servers to cloud-based storage, it is important to know how cloud security best practices. The investment you make to switch from physical security to digital security can be very important to protect. We here at WillDom want to help guide you through the process of protecting your data and creating a safe switch. While protecting your data on the cloud service of your choice is an ever-going project, it is not something that should take an incredibly long time once you set it up. As with most cyber security, keeping your cloud safe falls largely on your staff and how they interact with…",https://medium.com/@willdom/a-guide-from-cloud-security-best-practices-bde35d433c62?source=topics_v2---------180-84--------------------28bae006_ca5e_4ae3_97eb_e43d749cde7d-------17,https://miro.medium.com/v2/resize:fill:140:140/0*9ckxOQpMQpC7xOA_.jpg,cloud-services 2635,2040,URL Redirection in Google Cloud External HTTPS Load Balancer.,"In this article, we will go over how to redirect traffic using Google Cloud External HTTPS Load Balancer. In particular, we will look at an example in which traffic is redirected from example.com to learning.com …",https://medium.com/wesionary-team/setting-up-url-redirect-in-global-external-http-s-load-balancer-6218cfa6b430?source=topics_v2---------181-84--------------------28bae006_ca5e_4ae3_97eb_e43d749cde7d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zx1JxRYqXwI-_br8pMntaQ.png,cloud-services 2636,2041,What is Multi-Cloud Architecture and How Does it Impact Your Business?,"According to the latest Flexera State of the Cloud report, 93% of organizations are already using multiple cloud service providers. Most businesses are using Microsoft Azure, Amazon Web Services (AWS), Google Cloud Services, and other cloud providers for public cloud deployment along with private clouds and on-premise, off-site data centers…",https://medium.com/@jessyvictany/what-is-multi-cloud-architecture-and-how-does-it-impact-your-business-297b1973b8d?source=topics_v2---------182-84--------------------28bae006_ca5e_4ae3_97eb_e43d749cde7d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rB2T1YPCbClCjhSFeXimjA.jpeg,cloud-services 2637,1923,echo3D is Launching on Product Hunt Feb 28: Get Notified!,"Big news! echo3D will launch on Product Hunt, the world’s biggest product curation platform, on February 28th! Support making echo3D even better by leaving us feedback on launch day! To be notified of when we go live, opt in here. Thank you for your support! — The echo3D Team echo3D (www.echo3D.com) is a 3D asset management platform that enables developers to manage, update, and stream 3D content to real-time 3D/AR/VR apps and games across devices.",https://medium.com/echo3d/echo3d-is-launching-on-product-hunt-feb-28-get-notified-daf8f6754449?source=topics_v2---------183-84--------------------28bae006_ca5e_4ae3_97eb_e43d749cde7d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*u3kaTEd27BcO_sOUYofwTw.png,cloud-services 2638,82,Understanding different types of Cloud Services,"Day 02: Understanding different cloud services Cloud computing has revolutionized the way businesses and individuals access and use technology. Instead of investing in and maintaining their own hardware and software, organizations can now access and use these resources over the internet. …",https://medium.com/@clouddeepdive/understanding-different-types-of-cloud-services-519a06323031?source=topics_v2---------184-84--------------------28bae006_ca5e_4ae3_97eb_e43d749cde7d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kpLLX9RQ3w8BdXgEz3BU8A.png,cloud-services 2639,1883,Major Data Migration Challenges to Be Aware Of in Cloud Computing,"The fact that more than 80% of data transfer operations fail due to time or expense overruns necessitates a thorough investigation. To that end, the goal of this piece is to help you understand a few important challenges faced by businesses, so you may be better prepared to anticipate and…",https://medium.com/towardsdev/major-data-migration-challenges-to-be-aware-of-in-cloud-computing-d34bdecc5087?source=topics_v2---------185-84--------------------28bae006_ca5e_4ae3_97eb_e43d749cde7d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3Ek-Z_mPNGxs5vleTGbsGA.jpeg,cloud-services 2640,2042,How To Run AWS On Your Local Machine ?,"In this practical article we will see how we can bring the AWS to our local machine and we will practice using it with the CLI client. Why Locally? There are several reasons you may want to run AWS stacks locally, Some of the frequent ones are: Testing your application locally which…",https://medium.com/@amirhosseinsoltani7/how-to-run-aws-on-your-local-machine-2b838fc17be9?source=topics_v2---------186-84--------------------28bae006_ca5e_4ae3_97eb_e43d749cde7d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*O4nhC5ffIo-rk58NC9JxsA.png,cloud-services 2641,2043,Flux vs Centralized cloud providers,"Let’s start this article by questioning who controls the internet ? The answer is simple, most the internet servers are controlled by Amazon Web services, Google and Microsoft. So centralized cloud storages are controlled by these companies. On the other hand, FLUX cloud is truly decentralized.",https://medium.com/@ahsanmushtaq0900/flux-vs-centralized-cloud-providers-187a785c1302?source=topics_v2---------187-84--------------------0c0e8495_25c6_4e30_bac4_e13d7832c1b4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*c_ko0mGE9w_fdCLB55hYSw.png,cloud-services 2642,2044,Creating and Configuring Log Files in Azure!,"Hello reader, welcome to my blog! It’s great here. You’ll love it, don’t worry. In this first post, follow along with my thoughts, feelings, and process as I create a Custom Log File path in Azure Cloud, along with an extremely vulnerable and enticing virtual machine, and the proper log…",https://medium.com/@1166trey/creating-and-configuring-log-files-in-azure-8d50bc1bad01?source=topics_v2---------188-84--------------------0c0e8495_25c6_4e30_bac4_e13d7832c1b4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hTGgKKQlyMNoTIQOTHbEwg.png,cloud-services 2643,2045,Single tenant vs. Multi-tenant Cloud architecture: Which one to choose and Why?,"With the increase in the hype of cloud computing and cloud-based services, cloud providers decided to render different forms of services to their tenants that they can choose as per their budget and requirements. We are all familiar with the various benefits cloud provides across all sectors and industries. Cloud-based…",https://medium.com/@karliris62/single-tenant-vs-multi-tenant-cloud-architecture-which-one-to-choose-and-why-8e962eaf8d7c?source=topics_v2---------189-84--------------------0c0e8495_25c6_4e30_bac4_e13d7832c1b4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yn-LEpwEbPAD4lcoSgs9zQ.jpeg,cloud-services 2644,2046,How to install ChatGPT locally?,"Installing ChatGPT locally using the OpenAI library can be a bit tricky, but with the right steps and tools, it can be done easily. …",https://medium.com/@wrkzrs/how-to-install-chatgpt-locally-7b63577810aa?source=topics_v2---------190-84--------------------0c0e8495_25c6_4e30_bac4_e13d7832c1b4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*N4PNtA3YF4AZQ5qHkEpOMQ.jpeg,cloud-services 2645,2047,Migration to Cloud,"Why Migrate to Cloud Now this question is more or less irrelevant — Almost Every Business wants to move more and more of their workloads to cloud infrastructure for better cost savings, flexibility, scalability, on-demand availability of computing resources, etc. The more relevant question is when and how. As per a survey report from…",https://medium.com/cloudbuilders/migrating-workloads-to-cloud-c47256654b6e?source=topics_v2---------191-84--------------------0c0e8495_25c6_4e30_bac4_e13d7832c1b4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-services 2646,2048,Cloud + DevOps for IT Infrastructure Optimization: Key Business Advantages,"Everything you need to know about IT Infrastructure types and the benefits of its optimization by Cloud and DevOps. — IT infrastructure is the foundation of any organization’s operations. The modern age requires companies to have a fast, reliable, and secure system. This will help accommodate the business needs and guarantee prompt integration of the IT world’s novelties. As such, superior IT infrastructure is a unique system adjusted to the…",https://medium.com/@visartech/cloud-devops-for-it-infrastructure-optimization-key-business-advantages-c038018ff7aa?source=topics_v2---------192-84--------------------0c0e8495_25c6_4e30_bac4_e13d7832c1b4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LV22k0qtQg1SKbgdTU72tA.jpeg,cloud-services 2647,2049,AWS CloudFormation default values remain unchanged after update? Here’s why.,"Spoiler: Double check if the CloudFormation Parameters are set to the values you actually want to use! — I’m using AWS CloudFormation on daily basis. It allows to keep infrastructure settings as code so I can easily maintain it and deploy an application with all required services on multiple environments within minutes. CloudFormation template consists of several sections (documentation link) AWSTemplateFormatVersion: ""version date"" Description: String Metadata: template metadata Parameters…",https://medium.com/@dominik.koszkul/aws-cloudformation-default-values-remain-unchanged-after-update-heres-why-416e734939b?source=topics_v2---------193-84--------------------0c0e8495_25c6_4e30_bac4_e13d7832c1b4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EMvtGHefn9_jZHclkexK2w.png,cloud-services 2648,2050,An easy way to automate your deployment on AWS CloudFormation —,You can automate your deployment with AWS CloudFormation using the following steps: Create a template: Create a CloudFormation template in either JSON or YAML format that describes the resources and configurations that you want to deploy. Validate the template: Validate the template by running the following command: aws cloudformation validate-template…,https://medium.com/@alirezarezvani/an-easy-way-to-automate-your-deployment-on-aws-cloudformation-8fd7c92a6d9e?source=topics_v2---------194-84--------------------1963c1dd_25c0_4d16_9db1_848ad3916018-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-services 2649,2051,All DocuSign Workflow Steps ++,POST NOTE: The year got really busy and it’s harder to write than people may think. So sorry this post is about 6 months late but here it is. The test that inspired this article has since changed to be more related to subcontract experience. There is no rhyme or…,https://medium.com/@makemesenpai/all-docusign-workflow-steps-4c48c0e1384b?source=topics_v2---------195-84--------------------1963c1dd_25c0_4d16_9db1_848ad3916018-------17,https://miro.medium.com/v2/resize:fill:140:140/0*MtrFgUTMQ-LiZsPi,cloud-services 2650,1923,The Best 3D Digital Asset Management (DAM) Software for 2023,"Digital Asset Management (DAM) software is a tool that helps users organize, store, and access digital content such as 3D models, images, videos, audio, fonts, and more. These tools typically offer features like search, preview, and categorization to help users easily locate and manage their digital assets. Using a DAM…",https://medium.com/echo3d/the-best-3d-digital-asset-management-dam-software-for-2023-84cec8aaf335?source=topics_v2---------196-84--------------------1963c1dd_25c0_4d16_9db1_848ad3916018-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rbIrjmcHuxe-eEBNbHOVxA.png,cloud-services 2651,2052,Monitor AWS Lamda functions in Datadog,"Monitor AWS Lamda functions in Datadog There are several ways to monitor AWS Lambda functions using Datadog: AWS Lambda integration: Datadog's AWS Lambda integration automatically collects metrics and traces from your Lambda functions. This includes metrics such as invocations, errors, and duration, as well as traces of the function's execution…",https://medium.com/@gangasaniharish/there-are-several-ways-to-monitor-aws-lambda-functions-using-datadog-59be9c497dbb?source=topics_v2---------197-84--------------------1963c1dd_25c0_4d16_9db1_848ad3916018-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-services 2652,2053,Total cost of ownership (TCO) considerations when migrating legacy systems to the Cloud,"Overview Many companies have a “gut feeling” that it would be worthwhile to migrate their legacy systems to a public cloud. With that, it is hard to predict the actual changes and the accompanying financial costs and benefits of this step. As a result, decisions are stalled, precious time is lost…",https://medium.com/@amberteq.content/total-cost-of-ownership-tco-considerations-when-migrating-legacy-systems-to-the-cloud-bf26dfb1202b?source=topics_v2---------198-84--------------------1963c1dd_25c0_4d16_9db1_848ad3916018-------17,https://miro.medium.com/v2/resize:fill:140:140/1*43Wwc0yFQ4EGHy_HdivoRQ.jpeg,cloud-services 2653,2054,Quickly get your app to market with these bootstrapping tips,"As you begin a new project, you may encounter a dizzying array of components required to build a functional product. In a highly saturated and competitive market, it is vital to create a minimum viable version of your idea as soon as possible, gather user feedback, iterate fast, and improve…",https://medium.com/techtrument/quickly-get-your-app-to-market-with-these-bootstrapping-tips-d21aa4b23800?source=topics_v2---------199-84--------------------1963c1dd_25c0_4d16_9db1_848ad3916018-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TH0y1U2l_kAS2C_l2vZx6g.jpeg,cloud-services 2654,2055,"I know what a Tax Audit is, but a tech audit?! Don’t panic… just read","IT services and applications require third-party audits as a checkpoint to validate their security, performance and operational parameters. So, has your app been audited by a neutral third party yet? If you have an audit coming up, it’s best to go into it well prepared. What can you expect during an app audit? Third party auditing firms generally…",https://medium.com/@nagarjoon.b/i-know-what-a-tax-audit-is-but-a-tech-audit-dont-panic-just-read-a7b7f631c18b?source=topics_v2---------200-84--------------------1963c1dd_25c0_4d16_9db1_848ad3916018-------17,https://miro.medium.com/v2/resize:fill:140:140/1*C7Zkt05YWSZ8cheVETiS0A.jpeg,cloud-services 2655,2056,Relation between cloud computing and artificial intelligence,"Cloud computing is a fairly new service that organizations and businesses are adopting at a rapid pace. It’s become popular [1] for several reasons, including speed, efficiency, and cost savings. When used correctly, it becomes a great tool for storing, accessing and using information. And when integrated with artificial intelligence…",https://medium.com/@addepto/relation-between-cloud-computing-and-artificial-intelligence-39f51bf9ba7a?source=topics_v2---------201-84--------------------1963c1dd_25c0_4d16_9db1_848ad3916018-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0GN8TM6OXaK8JIkRMRbGlA.png,cloud-services 2656,2057,How the Manufacturing Industry can Leap Out of the Recession Using Cloud Tech?,"There’s no doubt that we’re amidst a recession — but the silver lining is — the recession is not here to stay. Therefore, we must remain vigilant and resourceful to discover practical solutions that will enable us to gain an edge over the competition. So that when the times call…",https://medium.com/@nirmitsinhvaghela/how-manufacturing-industry-can-leap-recession-using-cloud-tech-85a3ff2b8bfa?source=topics_v2---------202-84--------------------1963c1dd_25c0_4d16_9db1_848ad3916018-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QcpBJm_oJqhPK_nkWi386Q.jpeg,cloud-services 2657,2058,What is Firebase? The Introduction.,Firebase is a mobile and web application development platform developed by Google. It was first launched in 2011 and has since grown to become one of the most popular development platforms for mobile and web apps. Firebase offers a wide range of services and tools that make it…,https://medium.com/@aashirr/what-is-firebase-the-introduction-8a9710eafb5e?source=topics_v2---------203-84--------------------1963c1dd_25c0_4d16_9db1_848ad3916018-------17,https://miro.medium.com/v2/resize:fill:140:140/1*abA70uxEzvPoWiqpU917Fg.png,cloud-services 2658,2059,Unleashing the Power of a Cloud-Based IDE,"A Step-by-Step Guide for Setting Up Your Own Cloud-Based Development Environment on Cloud 9 In today’s fast-paced business environment, software development teams need to be agile and efficient to keep up with customer demands. A common challenge for such teams is coordinating the work of multiple developers on a project…",https://medium.com/@tait.hoglund/unleashing-the-power-of-cloud-based-ide-3f6e630684c7?source=topics_v2---------1-84--------------------c5b0d406_88a8_4e7d_b4be_497a74ca7ba1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4Xel9NG99N9e3qI8fJi4QQ.png,dev-ops 2659,2060,Adding a contact form to your AWS S3-hosted static website.,As we all know the cloud is the new future and lately everybody is moving to the cloud. The majority of the AWS users started hosting their website in S3 and using CloudFront as a content delivery network(CDN) for them. Even though everybody is using this AWS S3 cannot serve…,https://medium.com/supportsages/adding-a-contact-form-to-your-aws-s3-hosted-static-website-a27258610ea7?source=topics_v2---------2-84--------------------c5b0d406_88a8_4e7d_b4be_497a74ca7ba1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*d0PvXtfh_eQqIYP9nHfwmQ.png,dev-ops 2660,2061,Kubernetes Hacks and Tricks — #7 Pod and Container Resource and QoS classes,"You know how Kubernetes decide to find which Pods should be evicted if node resource is not enough or is running out? In this article, we’ll talk about this and introduce Kubernetes Quality of Service classes related to this topic. What is Node Pressure? Node pressure is a term that explains the worker node’s…",https://medium.com/itnext/kubernetes-hacks-and-tricks-7-pod-and-container-resource-and-qos-classes-86e55c5bd47d?source=topics_v2---------3-84--------------------c5b0d406_88a8_4e7d_b4be_497a74ca7ba1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*FDBXdhk4lT1AQI8l530PSw.png,dev-ops 2661,2062,Install Argo CD and Deploy Applications to Kubernetes Cluster,"In this demo, we will install Argo CD in our Kubernetes cluster as our Continuous Delivery (CD) tool. Argo CD is a powerful open-source tool for managing and automating the deployment of applications to Kubernetes clusters. It is designed to provide a modern, declarative, and GitOps-based approach to continuous delivery…",https://medium.com/@perezmark.tomcat/install-argo-cd-and-deploy-applications-to-kubernetes-cluster-936d54124e71?source=topics_v2---------4-84--------------------c5b0d406_88a8_4e7d_b4be_497a74ca7ba1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*k1S73BxOXg6nPRPB.png,dev-ops 2662,2063,8 Key Kubernetes Components You Need to Know for Successful Application Deployment,"Kubernetes Essentials: Understanding the 8 Key Components for Your First Application Deployment — Kubernetes, which is defined as a powerful container orchestration platform, has several important components such as Pods, Services, Ingress, ConfigMaps, Secrets, Deployments, ReplicaSet, StatefulSets, and others. In this article, we will discuss 8 important components in-depth to help you understand how they function and how they tie into the larger…",https://medium.com/@nayeem.ridoy/8-key-kubernetes-components-you-need-to-know-for-successful-application-deployment-356a82a1a1b?source=topics_v2---------7-84--------------------c5b0d406_88a8_4e7d_b4be_497a74ca7ba1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*uUYPt0-n-AfEUDj50kRYqQ.png,dev-ops 2663,2064,"How to Build, Package and Run an Automation Suite with Cypress, Docker and GitLab","By Jason Segal What will this tutorial cover? This tutorial will cover the following: Setting up Source Control with GitLab Building a Cypress automation suite (skeleton) Packaging up your Cypress application using Docker Building a pipeline in GitLab to build and run your Cypress application Part 1: Setting up Source Control in GitLab Before we go and build our Cypress project, let’s start…",https://medium.com/@jasonsegal23/how-to-build-package-and-run-an-automation-suite-with-cypress-docker-and-gitlab-e72a06fa64b9?source=topics_v2---------8-84--------------------c5b0d406_88a8_4e7d_b4be_497a74ca7ba1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vuFQIHCE9CPrx9_2v1DzDA.png,dev-ops 2664,2065,DevOps Project: Jenkins CICD,JENKINS CICD PIPELINE FOR DOCKER APPLICATION DEPLOYMENT ON EC2 INSTANCE Jenkins CI/CD Pipeline with Manual Build and Github Web-hook Integration 2. Jenkins CICD Pipeline with Jenkins Agents 》Free-Style project 》Pipeline project Tools & Technologies Used AWS Git Linux Docker Jenkins Prerequisites LAUNCH EC2 INSTANCE Create a new instance with ubuntu AMI Create new key pair & download pem file Launch EC2…,https://medium.com/@ashishkr3246/devops-project-jenkins-cicd-c0df2b4bc00c?source=topics_v2---------9-84--------------------c5b0d406_88a8_4e7d_b4be_497a74ca7ba1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*YRBweEC_L5L5Y_2KDq_iJA.png,dev-ops 2665,2066,Basic Git & GitHub for DevOps Engineers,"What is Git? Git is a distributed revision control and source code management system with an emphasis on speed. Git was initially designed and developed by Linus Torvalds for Linux kernel development. Git is a free software distributed under the terms of the GNU General Public License version 2. With Git, you can…",https://medium.com/@elvishranmale/basic-git-github-for-devops-engineers-57c2a52f48c0?source=topics_v2---------10-84--------------------bb5e4cc8_1b7c_44ef_ad03_e1059a473ff9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*J4-_jFBSBMMnJQzWXkSmwg.png,dev-ops 2666,924,Automating Azure Infrastructure Deployment with Azure Devops and Bicep,"As a cloud engineer, you’re no stranger to deploying and configuring Azure infrastructure. Whether you’re using the Azure portal or Powershell, you know that the process can be time-consuming and tedious. You might have created a Bicep template to streamline your Azure resources deployments, but as your manager team requests…",https://medium.com/@walissonscd/automating-azure-infrastructure-deployment-with-azure-devops-and-bicep-f113fa7b3045?source=topics_v2---------11-84--------------------bb5e4cc8_1b7c_44ef_ad03_e1059a473ff9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*8V9A22DXjm1WLx3RPpO44g.jpeg,dev-ops 2667,2067,Getting Started with Kubernetes: A Step-by-Step Guide to Installation and Setup,"Kubernetes is a popular open-source platform for managing containerized applications. It is widely used for automating deployment, scaling, and management of containerized applications. Kubernetes provides a highly scalable and resilient platform for running containerized workloads, and it has become a key component in modern cloud-native applications. In this tutorial, we…",https://medium.com/@lfoster49203/getting-started-with-kubernetes-a-step-by-step-guide-to-installation-and-setup-9021addf5bb0?source=topics_v2---------12-84--------------------bb5e4cc8_1b7c_44ef_ad03_e1059a473ff9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*GprWR3fWdHWua97ZHm9F4w.jpeg,dev-ops 2668,2068,Day 49 — INTERVIEW QUESTIONS ON AWS,"Hey people, we have listened to your suggestions and we are looking forward to get more! As you people have asked to put more interview based questions as part of Daily Task, So here it it :) INTERVIEW QUESTIONS: Name 5 aws services you have used and what’s the use cases? Here…",https://medium.com/@sanjuthamke9699/day-49-interview-questions-on-aws-b5a00bfdbd30?source=topics_v2---------13-84--------------------bb5e4cc8_1b7c_44ef_ad03_e1059a473ff9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SQRvMBhkz3VT1TLALzmAaA.png,dev-ops 2669,2069,How to Replace Old MacOS With Linux on Mac Mini Server,There are several reasons why you may want to consider installing Ubuntu on an old Mac Mini: Increased Performance: Ubuntu is a lightweight operating system that runs efficiently on older hardware. Installing Ubuntu on an old Mac Mini can breathe new life into the device and improve its overall performance. …,https://medium.com/by-devops-for-devops/how-to-replace-old-macos-with-linux-on-mac-mini-server-cc618d1052a8?source=topics_v2---------14-84--------------------bb5e4cc8_1b7c_44ef_ad03_e1059a473ff9-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ZjcOuqEAaAuveIKR,dev-ops 2670,2070,How to Perform Rolling Updates and Rollbacks in Kubernetes,"Update Kubernetes applications without downtime or data loss — Deploying applications in Kubernetes requires careful planning and execution to minimize downtime and ensure reliability. One of the essential tools for deploying updates in Kubernetes is the ability to perform rolling updates and rollback strategies. In this article, we will explore the concepts and practical implementation of rolling updates and…",https://medium.com/@arton.demaku/how-to-perform-rolling-updates-and-rollbacks-in-kubernetes-37b3d039ea87?source=topics_v2---------15-84--------------------bb5e4cc8_1b7c_44ef_ad03_e1059a473ff9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_eK3kQf5sxRJZSz121kDpA.png,dev-ops 2671,2071,Back-End Web Development Roadmap from Zero to Pro: Easy to Understand Guide — 2023,"Introduction: Back-end web development is a critical skill for building robust, scalable, and secure web applications. This easy-to-understand guide will provide you with a roadmap to go from a complete beginner to a professional back-end developer in 2023. Let’s get started! The Foundations 1.1 Choose a Programming Language Pick a popular back-end…",https://medium.com/@dauzonoficial/back-end-web-development-roadmap-from-zero-to-pro-easy-to-understand-guide-2023-2eb5a47be101?source=topics_v2---------2-89--------------------7e20c481_acb5_4695_8118_dd23a14e5a10-------17,https://miro.medium.com/v2/resize:fill:140:140/1*v932on4Mv8gOenJAPFqmdw.png,backend 2672,2072,Generative AI like ChatGPT will reshape the backend stack,"I have been testing generative AI like chatGPT and during this test, I saw how disruptive generative AI will be for servicing the content that a web application will need for its user experience and interface to be as specified by those who design In place of clusters of NoSQL…",https://medium.com/@mkrdiop/generative-ai-like-chatgpt-will-reshape-the-backend-stack-2ce242c5a9f5?source=topics_v2---------4-89--------------------7e20c481_acb5_4695_8118_dd23a14e5a10-------17,https://miro.medium.com/v2/resize:fill:140:140/0*-yUWETGkgtxMCdTG.png,backend 2673,2073,Reinsurance Group of America — Interview Experience (2022),"In February 2023, I applied for an intern position at Reinsurance Group of America (RGA), and I received confirmation of my interview in December 2022. As a leading global provider of life and health reinsurance, RGA’s commitment to innovation and technology made it an ideal company to gain experience as…",https://medium.com/@akash-kumar916/reinsurance-group-of-america-interview-experience-2022-e5c630177a9c?source=topics_v2---------5-89--------------------7e20c481_acb5_4695_8118_dd23a14e5a10-------17,https://miro.medium.com/v2/resize:fill:140:140/1*FpoF_y0cPHhdZ6WgkSPNBA.png,backend 2674,2074,Membuat rest api simple menggunakan h2 database dan spring jpa (POST),"Halo gaes , oke disini saya akan membuat sebuah artikel untuk membuat rest api menggunakan spring boot dan h2 database yagesya yang pertama kita harus tau dulu dong apa itu spring boot dan h2-database Spring boot Spring Boot itu kaya tools buat ngebantu kamu, para developer, bikin aplikasi web dan…",https://medium.com/@mohammadtajutzamzami07/membuat-rest-api-simple-menggunakan-h2-database-dan-spring-jpa-post-1afd4fcd20c4?source=topics_v2---------6-89--------------------7e20c481_acb5_4695_8118_dd23a14e5a10-------17,https://miro.medium.com/v2/resize:fill:140:140/1*UcNc0_oj8AAQcAcmX0IAkA.png,backend 2675,2075,Top 6 tools for Node.js monitoring,"Node.js monitoring is crucial to maintaining the stability, dependability, and performance of your applications. These tools are all full monitoring solutions and include real-time performance tracking, error reporting, and analysis. There are a number of Node.JS monitoring tools available, each with a different set of features and functionalities. Node.js monitoring…",https://medium.com/@akashjha9041/top-6-tools-for-node-js-monitoring-4645784b8534?source=topics_v2---------7-89--------------------7e20c481_acb5_4695_8118_dd23a14e5a10-------17,https://miro.medium.com/v2/resize:fill:140:140/0*sEa97yzRpHVLiDys.png,backend 2676,2076,Best Practices for REST API Writing,"When designing RESTful APIs, there are some best practices that you can follow to ensure that your APIs are well-structured, easy to understand, and easy to use. Here are some of the best practices: Use nouns in your URL paths: RESTful URLs should be structured around resources, which are typically…",https://medium.com/nonstopio/best-practices-for-rest-api-writing-4db28218ed50?source=topics_v2---------9-89--------------------7e20c481_acb5_4695_8118_dd23a14e5a10-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Yy29SwP-tqDSJq-XARVUpA.jpeg,backend 2677,2077,Elasticsearch Highlighter,"Elasticsearch Highlighter is a feature of Elasticsearch, an open-source search engine that allows users to search and analyze data quickly and easily. A highlighter is a tool that highlights the matching search terms in the search results, making it easier for users to identify relevant information. This is a part…",https://medium.com/@rachadian-novansyah15/elasticsearch-highlighter-764e5685ef45?source=topics_v2---------10-89--------------------762e51c8_4505_4e53_9b46_f46cced5c42b-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2678,2078,Get behind the scenes of an NFT marketplace,"Dive into the technical aspect of IMX Rarity, the most successful NFT marketplace built on Immutable X. — This story is a follow-up to my previous post about IMX Rarity. Reading it will help you better understand how this project began. The story behind IMX Rarity, the most successful NFT marketplace on Immutable X. Discover how the most successful marketplace on Immutable X was founded, from the genesis of the project to the end of…medium.com",https://medium.com/@edouard.courty/get-behind-the-scenes-of-an-nft-marketplace-fe18622d97ee?source=topics_v2---------11-89--------------------762e51c8_4505_4e53_9b46_f46cced5c42b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*F_5Sz5ZVHes1se-O,backend 2679,2079,"Database Transactions, Lost Updates & Idempotency","Author: Jozef Cipa, Backend Developer @ STRV Web applications are often complex systems consisting of several parts such as UI (frontend), API (backend), a database and often other 3rd-party services that the application depends on. …",https://medium.com/@strv/database-transactions-lost-updates-idempotency-c4b7e90ea1a1?source=topics_v2---------12-89--------------------762e51c8_4505_4e53_9b46_f46cced5c42b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*BjJeKA1BMjRMdmEj.png,backend 2680,2080,Django Rest Framework— Setup email auth instead of username,"You just created your first app using Django and discovered that Django uses a username and a password as auth, let’s see how you can replace this behaviour to use email and password instead! It’s quite simple to setup an email auth, no library is necessary. We will only see…",https://medium.com/@alxbrla/django-rest-framework-setup-email-auth-instead-of-username-2ecc6f57a2bb?source=topics_v2---------13-89--------------------762e51c8_4505_4e53_9b46_f46cced5c42b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Rzh_quFLyP85kWr7MZ3QJg.jpeg,backend 2681,2081,Connect Flutter Web to Back End Using cross platform,"In Flutter normally we run backend on localhost , but in mobile app emulator works as a different network and pc is in a another network, so localhost mode is not working for both web and mobile. As a Solution I found out Cross Platform connectivity for my app. First you need to disable web security because it wont allow to connect backend server. 1.Go to flutter\bin\cache and remove a file named:flutter_tools.stamp 2.Go to flutter\packages\flutter_tools\lib\src\web and open the file chrome.dart 3.Find ‘- -disable-extensions’ 4.Add ‘- -disable-web-security’",https://medium.com/@ymeka2000/connect-flutter-web-to-back-end-using-cross-platform-774741fb9efc?source=topics_v2---------14-89--------------------762e51c8_4505_4e53_9b46_f46cced5c42b-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2682,2082,"Did you know that Netflix’s API Gateway handles over 700,000 requests per second?","Hello World! Today, I want to talk about API Gateway, a crucial tool for building and managing cloud-based applications. In essence, an API Gateway is a central component in a microservices architecture, allowing for the management and routing of application requests across different backend services. …",https://medium.com/@pablo.matteo/did-you-know-that-netflixs-api-gateway-handles-over-700-000-requests-per-second-9a97bf5dc71b?source=topics_v2---------15-89--------------------762e51c8_4505_4e53_9b46_f46cced5c42b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fpjUj9aXIzTsBN3ABeIdXA.jpeg,backend 2683,2083,I Was Scolded by the Boss Because I Didn’t Add rollbackfor = Exception.Class to @Transactional,What Happens If the @Transactional Annotation Does Not Add rollbackfor = Exception.Class? First prepare a piece of data in Mysql,https://medium.com/javarevisited/i-was-scolded-by-the-boss-because-i-didnt-add-rollbackfor-exception-class-to-transactional-648b4c664274?source=topics_v2---------17-89--------------------762e51c8_4505_4e53_9b46_f46cced5c42b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*iohZiyQquP93nEL4X5h3ow.png,backend 2684,2084,Starting Backend Developer Roadmap,"I am Junior developer less than 1 year experiance. In order to a better company, I try to record and grow the contents I have studied through blogging. To study, We need a goal. Here’s where i want to finish my first year developer career and start my second year…",https://medium.com/@dnflekf2748/starting-backend-developer-roadmap-f2fe59766a42?source=topics_v2---------18-89--------------------762e51c8_4505_4e53_9b46_f46cced5c42b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MiT79i3-L6uFkp_urufhEw.png,backend 2685,2085,Backend with Spring & Kotlin: Spring Data with MySQL,"Introduction In the first article, we’ve already discussed how to create a spring application from scratch and work with controllers. Today, we will take our project to another level. In this article, we will explore how to work with MySQL and Spring Data in a Spring Boot application using Kotlin. …",https://medium.com/hyperskill/backend-with-spring-kotlin-spring-data-with-mysql-5fe2f5c61e2b?source=topics_v2---------19-89--------------------86a438c8_cb4b_4264_8cd8_5efd3ccfa1d3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OXskDmFXGbDKi-i8c4ub6w.png,backend 2686,2086,x10 performance of your Django app,"Hey there! If you’ve ever asked someone about how to improve Django performance, they may have told you to focus on database optimization. However, that’s not always the case, as there are many factors that can impact your Django app. In this blog post, we’ll be discussing serializers and how…",https://medium.com/@mahmoud.nasser.abdulhamed11/x10-performance-of-your-django-app-7072efb83934?source=topics_v2---------20-89--------------------86a438c8_cb4b_4264_8cd8_5efd3ccfa1d3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*wCUoeVYCwWWPeQMM.jpg,backend 2687,2087,5 Common Mistakes Kotlin developers Make And How To Avoid Them,"Nullability Issues: One of the biggest advantages of Kotlin is its ability to avoid null pointer exceptions (NPEs) through its null safety features. However, Kotlin developers can still make mistakes when it comes to nullability, such as failing to handle nullability properly, or using the !! operator excessively. var name…",https://medium.com/@manuchekhrdev/5-common-mistakes-kotlin-developers-make-f7c20aed29c9?source=topics_v2---------21-89--------------------86a438c8_cb4b_4264_8cd8_5efd3ccfa1d3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OYdo7h_XnLLwu_P5_9ivhA.jpeg,backend 2688,2088,Setup Self Hosted Supabase Docker,"Intro Supabase is a great platform to speed up development by providing web interface (api,websocket,fileserver,etc) directly from database. In api development, creating crud for each Table is the most exhausting work. Expecially when you have too many master table that store every enum you used. With supabase, you skip unnecessary crud…",https://medium.com/@radenfajrus/setup-self-hosted-supabase-docker-8c27f20c6f76?source=topics_v2---------23-89--------------------86a438c8_cb4b_4264_8cd8_5efd3ccfa1d3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_uxMlbH8kZngEogNzim4PA.png,backend 2689,2089,A Beginner’s Guide to Database Triggers,"Database triggers are a powerful feature in database management systems that can help automate certain processes and ensure data integrity. In this article, we’ll explore what database triggers are, how they work, and how you can use them in your own database applications. What are Database Triggers? A database trigger…",https://medium.com/@cfqbcgwkg/a-beginners-guide-to-database-triggers-dc238e7bceb?source=topics_v2---------24-89--------------------86a438c8_cb4b_4264_8cd8_5efd3ccfa1d3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PT8aFHAGRwILRkBO0oSCLQ.png,backend 2690,2090,Learn How Batman Keeps NodeJS Secure and Efficient for Any Amount of API Calls 🔐,"Learn How Batman Keeps NodeJS Secure and Efficient for Any Amount of API Calls 🔐 Do you ever think to yourself, “Maybe Alfred Is Watching Your Backend Services?” Well, thanks to IrresponsibleEngineer, the answer is now YES! With Batman’s guidance, you can make sure your NodeJS backend is secure and efficient Are you an engineer who’s not quite sure how to handle a massive amount…",https://medium.com/dev-genius/learn-how-batman-keeps-nodejs-secure-and-efficient-for-any-amount-of-api-calls-2e1832b7964d?source=topics_v2---------25-89--------------------86a438c8_cb4b_4264_8cd8_5efd3ccfa1d3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DsZonmDQt40HQ9nzcDpjPg.png,backend 2691,2091,Systemd Service Template for Node JS,"Service file template for stepping Node code to production — Introduction Developing typescript code in NodeJS ends up in production. If this code is for server development, it must run in the background on whatever server it runs. Some people opt for a serverless option such as a cloud run with GCP, Azure Function, etc. This article steps a bit back…",https://medium.com/sutaninsight/systemd-service-template-for-node-js-5095aab64a14?source=topics_v2---------28-89--------------------86a438c8_cb4b_4264_8cd8_5efd3ccfa1d3-------17,https://miro.medium.com/v2/resize:fill:140:140/g:fp:0.5:0.51/0*d5t1HC29LTkBPQke.png,backend 2692,2092,Terraform Remote Backend with Azure Storage,"A detailed guide on using a remote backend state on Azure Storage to host shared remote state files and its functioning. Overview The Terraform state file i.e. terraform.tfstate maps cloud resources to the configuration, tracks metadata e.g. dependencies between resources and improving performance by caching information on resources specially for large…",https://medium.com/devops-dev/terraform-remote-backend-with-azure-storage-ec2c13e7ace4?source=topics_v2---------29-89--------------------27ef5ef8_316f_46dc_ab92_57c52f0e19c3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*s0hD79YihS9j7ooJp8YBPw.png,backend 2693,2083,6 Java Performance Optimization You Should Know,"In the last article “Performance Optimization Theory”, I introduced various indicators of performance analysis, so that when doing performance optimization, there are specific optimization goals and measurement methods, and the optimization effect will not just stay in the intuitive sense. superior. Performance Optimization Theory You Should Know as a Programmer I have worked for many years and found that many people have only a very shallow understanding of performance…medium.com",https://medium.com/javarevisited/6-java-performance-optimization-you-should-know-83cbe499d515?source=topics_v2---------30-89--------------------27ef5ef8_316f_46dc_ab92_57c52f0e19c3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*UsD4qh_ARNmOPhO96s5dvQ.png,backend 2694,2093,Django REST Framework 2,"Generic Views Artık daha kolay ve kısa CRUD işlemleri yapabileceğiz. GenericAPIView APIView’e yeni özellikler eklenerek ve geliştirilerek oluşturulmuştur. Mixins ile birlikte kullanılabilir. Kullanmak istediğimiz mixin özelliklerinden birini seçip kullanabiliriz. class BookListCreateAPIView(ListModelMixin, CreateModelMixin, GenericAPIView): queryset = Book.objects.all() serializer_class = BookSerializer #listelemek için def get(self, request, *args, **kwargs): return self.list(request, *args, **kwargs) #yaratmak için def post(self, request, *args, **kwargs): return self.create(request, *args, **kwargs)",https://medium.com/@jaleyerdelen/django-rest-framework-2-1bf9bd629974?source=topics_v2---------31-89--------------------27ef5ef8_316f_46dc_ab92_57c52f0e19c3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MEG7dxc6qmDyVGHkCvr0hg.png,backend 2695,2093,Django REST Framework 1,"Öncelikle REST API neydi onu hatırlayalım. HTTP methotlarını kullanarak iki bilgisayar arasındaki veri alışverişini sağlar. Client HTTP methodlarını kullanarak server’a bir istek atar. REST API, JSON ya da XML şeklinde veriyi client’a gönderir. Django REST Framework’de Django için daha hızlı requestler yapabilmek için oluşturulmuş bir framework’tur. …",https://medium.com/@jaleyerdelen/django-rest-framework-1-623a88497e5e?source=topics_v2---------32-89--------------------27ef5ef8_316f_46dc_ab92_57c52f0e19c3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_6oZAheCwiQiKHAHeJDK5w.png,backend 2696,2094,The benefits of using Elixir for backend development: Our perspective,Some time ago we encountered a production issue: One of our Elixir applications suddenly started responding intermittently. …,https://medium.com/wttj-tech/the-benefits-of-using-elixir-for-backend-development-our-perspective-9d421fde426a?source=topics_v2---------33-89--------------------27ef5ef8_316f_46dc_ab92_57c52f0e19c3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ii5NviGvlIwNrUlLquWmHQ.jpeg,backend 2697,2095,"Use case of Pointers in Go w/ Practical Example — Heap/Stack, Pointer Receiver","Pointers in Go don’t function the way they do in C/C++ A common idea is that with pointers in Golang, your applications will be faster, because you will avoid copying data around the time. But, passing pointers in Golang is often slower than passing values. The reason is Garbage Collection…",https://medium.com/@dinesh-silwal/use-case-of-pointers-in-go-w-practical-example-heap-stack-pointer-receiver-60b8950473da?source=topics_v2---------34-89--------------------27ef5ef8_316f_46dc_ab92_57c52f0e19c3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QWv93fz6AZVVq3fLculjyg.png,backend 2698,2096,Backend Curl,"As a backend developer, you are likely familiar with multiple programming languages, each with its own syntax and quirks. However, even the most experienced developer can benefit from a comprehensive guide on how to use a particular language in a specific context. In this post, we will take a closer…",https://medium.com/@marcandrewII/backend-curl-5bcd455ee3f8?source=topics_v2---------35-89--------------------27ef5ef8_316f_46dc_ab92_57c52f0e19c3-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2699,2097,Dart Beyond,"Using Flutter & Dart for front-facing applications is already robust enough, but we are in a need of something more. Especially for small application development, the idea is to use the dart ecosystem in every possible part. That perhaps can work on smaller application development operations, and also that means…",https://medium.com/@meruyatechnology/dart-beyond-199409369be9?source=topics_v2---------36-89--------------------27ef5ef8_316f_46dc_ab92_57c52f0e19c3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*075uwIxVzhQSLQpc8jT4BA.png,backend 2700,2098,Quarkus + Angular with Keycloak — Pt2,"On this article, we 'll continue the development of our daily-quotes application. If you haven’t seen the first part, click here. The main goal here is to implement REST API with Keycloak that will provide create and list quote endpoints. Quakus Application The Quarkus backend service will be responsible for create and…",https://medium.com/@ricardohsmello/quarkus-with-angular-secured-with-keycloak-pt2-e8c1fdf7fa75?source=topics_v2---------37-89--------------------27ef5ef8_316f_46dc_ab92_57c52f0e19c3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ufKgIQwRH8Uvy0fsxGwRaw.png,backend 2701,2099,FeathersJS vs NestJS — Compared in 3 Key Areas,"This post originally appeared on nooptoday.com FeathersJS released its 5th major version, a.k.a Dove recently, and I’ve been watching the framework for some time. It is an excellent time to compare two backend framework giants, FeathersJS and NestJS. These are not your “yet another javascript framework” type of framework. They…",https://medium.com/all-about-feathersjs/feathersjs-vs-nestjs-compared-in-3-key-areas-427def783555?source=topics_v2---------38-89--------------------27ef5ef8_316f_46dc_ab92_57c52f0e19c3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*H7XFDZ7xJnJcUTJK,backend 2702,2100,System Design — Short Video App with a billion users,"In this article, we will try to design a scalable backend infra for a short video app similar to TikTok starting from a base of 1000 users to a billion. We have just raised a small amount of seed funding from a VC fund and now we have to pilot…",https://medium.com/@ashishguptabns/system-design-short-video-app-with-a-billion-users-1b73c125d476?source=topics_v2---------39-89--------------------2b6139c6_8790_478f_80c1_699ca2fcb8a8-------17,https://miro.medium.com/v2/resize:fill:140:140/0*3vnOO1XC0etdvxbU,backend 2703,2101,History of Back-end Development,"Hey there, do you know the history of back-end development? It’s quite fascinating, so let me take you on a journey through time. The Early Days of Back-end Development Back in the early days of the internet, the only thing that really mattered was the front-end. …",https://medium.com/@e.berkeaydin/history-of-back-end-development-5a73054b9d07?source=topics_v2---------40-89--------------------2b6139c6_8790_478f_80c1_699ca2fcb8a8-------17,https://miro.medium.com/v2/resize:fill:140:140/0*OFJPmgQueJHC5whu,backend 2704,2102,Step-by-step Guide to use Auth0 with Symfony 6,"Introduction Auth0 is a very powerful solution to manage the authentication of your applications. Even if its documentation is very well done, it is not immediate to understand how to use it. The PHP SDKs allow you to do many things and today I would like to show how I use them…",https://medium.com/@stefanoalletti_40357/step-by-step-guide-to-use-auth0-with-symfony-6-9a4e6de5152e?source=topics_v2---------41-89--------------------2b6139c6_8790_478f_80c1_699ca2fcb8a8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rz8Pk9W5kuvizam5zgX8Wg.png,backend 2705,2103,ReactJS Notlarım — 8,"Bu bölümde aşağıdaki başlıkları göreceğiz. Context API useContext Context API, component’lar arasında paylaşılan verileri kolayca yönetmek için kullanılan bir API’dır. Bir örnek üzerinden ilerleyelim. Terminalden aşağıdaki komutlar ile bir proje oluşturuyorum ve projeyi açıyorum. npx create-react-app context cd context npm start App.css’i yorum satırına aldım ve App.js’in …",https://medium.com/@urazakgul/reactjs-notlarım-8-821a62e86852?source=topics_v2---------42-89--------------------2b6139c6_8790_478f_80c1_699ca2fcb8a8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*KQJlAGAM_OktSTw1kqmHgQ.png,backend 2706,2104,Repository Pattern in Laravel: why and how,"The Repository Pattern is a software design pattern that provides a way to abstract and encapsulates the data access layer of an application. In this pattern, a repository acts as an intermediary between the application and the data source. …",https://medium.com/@alessandrodorazio/repository-pattern-in-laravel-why-and-how-by-tchuryy-9e5fa4076499?source=topics_v2---------43-89--------------------2b6139c6_8790_478f_80c1_699ca2fcb8a8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_28_JNtlrpD-lZMmEAFRMw.png,backend 2707,2105,"Building a Golang Music API and Deploying it on K8s [go, mysql, docker, k8s]","We all love building backend apis and microservices. Back in college, I wrote a lot of microservices but they all had a major drawback. Most of those systems never saw the light of the day since I never took the initiaive to deploy them properly. Well, I had used Heroku…",https://medium.com/@SabujJanaCodes/building-a-golang-music-api-and-deploying-it-on-k8s-go-mysql-k8s-841612d13479?source=topics_v2---------44-89--------------------2b6139c6_8790_478f_80c1_699ca2fcb8a8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Pn-fzGPhVLpLlkLETbNSsA.jpeg,backend 2708,2106,How we built ChatAfrica — a conversational bot for African history and culture,ChatAfrica was inspired by a burning desire to share Africa’s rich history and cultural heritage with fellow Africans and the world at large. …,https://medium.com/@usottah/how-we-built-chatafrica-a-conversational-bot-for-african-history-and-culture-3d78955d9b87?source=topics_v2---------45-89--------------------2b6139c6_8790_478f_80c1_699ca2fcb8a8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DKXEWnPDqylSGHONWCQXcA.png,backend 2709,1823,Fast Golang API with prepared SQL Queries and Gin-Gonic,"Hello there! I would like to talk about how to speed up API responses with SQL queries using Gin-Gonic. In today’s world, APIs have become an integral part of most applications, and it’s crucial that they respond quickly to user requests. As you may know, Gin-Gonic is a popular web…",https://medium.com/@ifrimradumdc/speed-up-your-api-by-preparing-sql-queries-in-go-ddfaa2c27c41?source=topics_v2---------46-89--------------------2b6139c6_8790_478f_80c1_699ca2fcb8a8-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2710,2103,ReactJS: Vücut Kitle Endeksi Hesaplayıcısı (App.js vs Component),ReactJS serisine (ReactJS Notlarım) devam ediyoruz ancak arada basit ve farklı uygulamalar ile konuyu sıcak tutmaya çalışacağım. Bu projede Vücut Kitle Endeksi Hesaplayıcısı (Body Mass Index Calculator) yapacağız. Projenin yapılışını iki farklı şekilde göstermek istiyorum: Projenin App.js içerisinde yapılması Projenin component kullanarak yapılması Neden böyle bir ayrıma gitmek istedim? ReactJS’te…,https://medium.com/@urazakgul/reactjs-vücut-kitle-endeksi-hesaplayıcısı-app-js-vs-component-66d3885f2044?source=topics_v2---------47-89--------------------2b6139c6_8790_478f_80c1_699ca2fcb8a8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*NHSU_5SUpoPcmWUAuc85Pg.png,backend 2711,2107,Mastering HTTP Requests in C#: Your Guide to Building Powerful Web Applications,"Making an HTTP request is an essential part of developing web applications. Whether you’re building a simple website or a complex API, you’ll need to know how to make HTTP requests to interact with other services or retrieve data from a remote server. In this article, we will explore how…",https://medium.com/@g.shevtsov1989/mastering-http-requests-in-c-your-guide-to-building-powerful-web-applications-7d91ed5ac133?source=topics_v2---------48-89--------------------2b6139c6_8790_478f_80c1_699ca2fcb8a8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fBLZctTtnelFEFLiQ8W79g.jpeg,backend 2712,2108,My Week of 6 Mar — 12 Mar,This past week I finally got all my work done before going on spring break. This meant getting a test done for my cloud computing class and getting our software engineering project phase 2 turned in! Getting the software engineering project done was no easy task. I ended up last…,https://medium.com/@jacobrothfus/my-week-of-6-mar-12-mar-3cf86d679793?source=topics_v2---------49-89--------------------bea7fb64_1e6e_48aa_bbfd_71087ee8366d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1mDbsbFsJ9_pRFnrqWUAiQ.jpeg,backend 2713,2103,JavaScript vs React: Taş-Kağıt-Makas (JavaScript),"Bu projede, Taş-Kağıt-Makas (Rock-Paper-Scissors) oyununu JavaScript ve ReactJS’te yazacağız. Projenin ilk bölümü JavaScript olacak. index.html, style.css ve app.js sayfalarını açalım ve başlayalım. index.html: Rock Paper Scissors…",https://medium.com/@urazakgul/javascript-vs-react-taş-kağıt-makas-javascript-c25870a57a67?source=topics_v2---------50-89--------------------bea7fb64_1e6e_48aa_bbfd_71087ee8366d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*80h1M6mQlsTQx2rOeZu1aA.png,backend 2714,2109,Lombok,More examples of how to use Lombok annotations in your Java projects. One of the most commonly used Lombok annotations is @Getter and @Setter. These annotations can be used to generate getter and setter methods for class fields. Here's an example of how you can use @Getter and @Setter annotations…,https://medium.com/@wanghaonanlpc/lombok-bf9d56c7f1b6?source=topics_v2---------51-89--------------------bea7fb64_1e6e_48aa_bbfd_71087ee8366d-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2715,2103,ReactJS Notlarım — 6,"Bu bölümde aşağıdaki başlıkları göreceğiz. Formlar Bir proje üzerinden ilerleyelim. task-project isminde bir klasör açıyorum ve bu klasörün altına terminalden aşağıdaki komutlar ile task isminde bir proje açıp projeyi çalıştırıyorum. npx create-react-app task cd task npm start Kullandğımız yerleri silelim. Son hallerini aşağıya bırakıyorum. App.js: import './App.css'; function App() {…",https://medium.com/@urazakgul/reactjs-notlarım-6-1b3222daa034?source=topics_v2---------52-89--------------------bea7fb64_1e6e_48aa_bbfd_71087ee8366d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gyHlmnz_7lpp9Y23M5b3ag.png,backend 2716,2110,Step-by-Step Guide to Implementing OAuth2 in a Node.js Application,"OAuth2 is an authorization framework that allows applications to access a user’s resources stored in another application without the need to share the user’s credentials. In this blog post, we will go through the process of implementing OAuth2 in a Node.js application. Step 1: Create a new Node.js project Create a new Node.js project using the following…",https://medium.com/bitsrc/step-by-step-guide-to-implementing-oauth2-in-a-node-js-application-89c7e8d202bd?source=topics_v2---------53-89--------------------bea7fb64_1e6e_48aa_bbfd_71087ee8366d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oBAjAZtM7Aayw_HkNYczzw.jpeg,backend 2717,2111,Kendi Sunucumuzda Çalışabilecek Bir Chat Uygulaması Nasıl Yazılır: Bölüm 1 | Android,Herkese selamlar 😃. Bugün sizlere 3rd party bir kütüphane veya framework kullanmadan ve kendi sunucumuzda kullanabileceğimiz bir chat app nasıl yazılır onu anlatmaya çalışacağım. Öncelikle chat uygulamaları bildiğiniz gibi küçük ölçekli uygulamalarda Firebase kullanılarak çok rahat bir şekilde yazılabiliyordu. Ancak işler büyüdükçe kendinize ait bir server ve cloud database sahibiyseniz…,https://medium.com/@yusufyildiz0441/kendi-sunucumuzda-çalışabilecek-bir-chat-uygulaması-nasıl-yazılır-bölüm-1-android-98634c003eeb?source=topics_v2---------54-89--------------------bea7fb64_1e6e_48aa_bbfd_71087ee8366d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qsrR7ORg6u8eneAkGg9_Wg.png,backend 2718,2112,Use Composer outdated direct to view outdated dependencies of your app,"Welcome to our comprehensive guide on using Composer to manage outdated dependencies in your Laravel application. If you’re looking to streamline your dependency management process and improve your application’s performance, you’ve come to the right place. …",https://medium.com/@andisyafrianda/use-composer-outdated-direct-to-view-outdated-dependencies-of-your-app-41a29838f011?source=topics_v2---------55-89--------------------bea7fb64_1e6e_48aa_bbfd_71087ee8366d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0RG-7g6m67wUE48ML6-yqg.png,backend 2719,2113,Things to consider before choosing Rust for your web backend,"Rust technology is increasingly used for web backend development, thanks to its unique combination of high performance, security, and development experience. Rust was designed to offer performance similar to C and C++, while providing guaranteed memory security, making it an attractive option for high-demand web applications. Rust is also valued…",https://medium.com/@paracetamol56/things-to-consider-before-choosing-rust-for-your-web-backend-2c172776db5f?source=topics_v2---------56-89--------------------bea7fb64_1e6e_48aa_bbfd_71087ee8366d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JfIVY6mdbDGDybCdBnkjHQ.jpeg,backend 2720,2114,Node.js + Typescript with ESM in 2023,最近有一些寫簡單後端的需求,但 Express 用膩了,想說玩一下 Koa 或 Fastify。結果還沒開始就先被 Typescript 使用 ESM 的問題給 gank 了一整天,於是來筆記一下踩坑記錄…… ps. 這篇文章以 Node.js v18.14 為基準,v16 以上跟以下差很多。 以前也寫過一篇 TS 入門的文章,側重點比較在前端。新 …,https://medium.com/codememo/node-js-typescript-with-esm-in-2023-6b87e6f8e737?source=topics_v2---------57-89--------------------bea7fb64_1e6e_48aa_bbfd_71087ee8366d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yQdmDqAZd47aGQEWUmI1vg.png,backend 2721,2103,ReactJS Notlarım — 5,"Bu bölümde aşağıdaki başlıkları göreceğiz. API request-response Bir proje üzerinden ilerleyeceğiz. Projede, API isteği gönderip dönen cevabı kullanacağız. api-project isminde bir klasör açıyorum ve aşağıdaki komutu kullanarak bir proje oluşturuyorum. npx create-react-app image-search Ardından projenin içine girip projeyi çalıştırıyorum. cd image-search npm start Kullanmayacağımız yerleri silelim. src/App.js:",https://medium.com/@urazakgul/reactjs-notlarım-5-4cea26407650?source=topics_v2---------58-89--------------------bea7fb64_1e6e_48aa_bbfd_71087ee8366d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Ew5be4Ebnu_k6zvPwqtKyw.png,backend 2722,2103,JavaScript vs React: Taş-Kağıt-Makas (React),"Bu projede, Taş-Kağıt-Makas (Rock-Paper-Scissors) oyununu JavaScript ve ReactJS’te yazacağız. Projenin ikinci bölümü ReactJS olacak. Terminalde aşağıdaki komutlarla projeyi açıp çalıştıralım. npx create-react-app rock-paper-scissors cd rock-paper-scissors npm start Aşağıdaki sayfaları silelim. src/setupTests.js src/reportWebVitals.js src/logo.svg src/index.css src/App.test.js Aşağıdaki sayfaların son hallerini veriyorum.",https://medium.com/@urazakgul/javascript-vs-react-taş-kağıt-makas-react-3bb83e6fad0f?source=topics_v2---------59-89--------------------ccbfbd92_10bd_443a_a4fe_358d56e5021f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*dCUi0Fvfi5mLUpkBljiSYg.png,backend 2723,2115,"How to Convert “1:2,3:4” to map[int]int in Go","While working on a project in Go that requires sending data from the frontend to the backend, I encountered a situation where the frontend sends data in a different format than the backend expects. The backend expects the type map[int]int to store category sizes, but the frontend sends data in…",https://medium.com/@53jk1/how-to-convert-1-2-3-4-to-map-int-int-in-go-ac6b85e02cf9?source=topics_v2---------60-89--------------------71db034b_ecae_42c9_9754_18692aa0907e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*hnuFg5r2KQiefS1f,backend 2724,2116,How Moovup recommends jobs with Amazon Personalize,"Moovup is an online platform for front-line jobs, such as retail, restaurant, and logistics jobs. To provide jobs that match user’s interests, a personalized job searching experience is the key. For example, if a part-time waiter is searching for jobs in Moovup, we recommend jobs related to food and beverage…",https://medium.com/moovup/how-moovup-recommends-jobs-with-amazon-personalize-3f1c987ad28a?source=topics_v2---------61-89--------------------71db034b_ecae_42c9_9754_18692aa0907e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*VbZ7EgPGYQEitsH_Zwlqwg.jpeg,backend 2725,2117,REST API Implementation using TypeORM MySQL in NestJS,"Hello Dear Developers, I am writing this article regarding the database connection of MySQL with TypeORM in NestJS. Let’s start it. First, we will create a new nest project using the command in VS Code terminal. nest new project-name Once it is installed, start the project with the command. nest…",https://medium.com/@awinashgoswami3/rest-api-implementation-using-typeorm-mysql-in-nestjs-2c4b71da6f63?source=topics_v2---------62-89--------------------71db034b_ecae_42c9_9754_18692aa0907e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*bnfUSzCyV1-9q7WDp7NsmQ.png,backend 2726,2118,Java-Backend Development Roadmap: A Comprehensive Guide to Spring Boot,"If you’re looking to dive into Java-Backend development using Spring Boot, you’re in the right place. This guide will provide you with a step-by-step roadmap that covers everything you need to know, from Java basics to advanced Spring Boot concepts. We’ll also provide a list of both free and paid…",https://medium.com/@mahmoudahmedxyz/java-backend-development-roadmap-a-comprehensive-guide-to-spring-boot-e810fc1a8fd?source=topics_v2---------63-89--------------------71db034b_ecae_42c9_9754_18692aa0907e-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2727,2119,Backend Role-based Access Control,"Definition Role-based access control, or RBAC, is a mechanism used in the software development world to restrict who has access to specific resources and what users can do to those resources based on a predefined “role.” RBAC is why you can’t use admin features for most websites if you are a…",https://medium.com/@sheensantoscapadngan/backend-role-based-access-control-rbac-5cb22b73cc94?source=topics_v2---------64-89--------------------71db034b_ecae_42c9_9754_18692aa0907e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*RNBhMu9S0vs2NhGwx8KKnQ.jpeg,backend 2728,2077,Elasticsearch Basic Concepts,"Elasticsearch is a free and open-source distributed search and analytics engine. Elasticsearch can be used to search various types of documents, from text documents to numeric data. Elasticsearch is a very important technology in managing data in the digital era. By using Elasticsearch, we can access and manage data quickly…",https://medium.com/@rachadian-novansyah15/elasticsearch-basic-concepts-66ad1b44d4f?source=topics_v2---------65-89--------------------71db034b_ecae_42c9_9754_18692aa0907e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BxuCy99KxGzb70BTV8krGw.png,backend 2729,2120,TIL — MongoDB Queries and Projections explained,"MongoDB is a popular NoSQL database that stores data in the form of documents instead of rows and columns as in traditional relational databases. In MongoDB, queries and projections are essential tools that enable you to retrieve and manipulate data from the database efficiently. …",https://medium.com/@AbbasPlusPlus/til-mongodb-queries-and-projections-explained-e643ccf2c1f?source=topics_v2---------66-89--------------------71db034b_ecae_42c9_9754_18692aa0907e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*sQb2WyNW7D2Hj-L-,backend 2730,2103,ReactJS Notlarım — 2,ReactJS’te farklı bir kurs (en güncel versiyon) ile ilerlemem gerektiği sonucuna vardığım için serinin ikinci bölümü de ReactJS’e giriş gibi olacak. Bu arada ilk bölümü okumanızı tavsiye ederim. Bu bölümde aşağıdaki başlıkları göreceğiz. ReactJS ve ilk proje JSX ReactJS ve ilk proje Öncelikle Node.js kurulumu ile başlayacağız. https://nodejs.org/en/ Yukarıdaki sayfada…,https://medium.com/@urazakgul/reactjs-notlarım-2-fe37f33aa680?source=topics_v2---------67-89--------------------71db034b_ecae_42c9_9754_18692aa0907e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*8uq0XKkFOXKen6Q1j-CGHg.png,backend 2731,2121,Java can be a good choice for your next (StartUp) project,"I often hear stories where developers run away from Java, one says it has a high learning curve, the other that is much more complex than other languages (Python or JavaScript) for developing PoC (Proof of Concept) projects or MVPs (Most Valuable Product) where we have a short time from…",https://medium.com/@dusann/java-can-be-a-good-choice-for-your-next-startup-project-3b6eb710c415?source=topics_v2---------68-89--------------------71db034b_ecae_42c9_9754_18692aa0907e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*d8F-Vu2WqAfNtfr6AfrILg.png,backend 2732,2122,Frontend vs Backend — What’s the Difference? Detailed Explanation,"Both web development and the entire IT world base many activities on the division into frontend and backend. And although we can hear both terms very often, not everyone (especially people from outside the industry) is aware of how they differ and are characterized. …",https://medium.com/@droptica/frontend-vs-backend-whats-the-difference-detailed-explanation-1416619e7af1?source=topics_v2---------69-89--------------------71db034b_ecae_42c9_9754_18692aa0907e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kh09wuGSqPLm_hUuDfHxLg.png,backend 2733,2123,All about Node.js Buffers,"Node.js is a popular runtime environment for server-side JavaScript applications. It has a built-in Buffer class that provides a way to handle binary data. In this article, we will explore the Buffer class in detail, including its advantages, limitations, and methods. Advantages of Node.js Buffers: Efficient Data Manipulation: Buffers allow…",https://medium.com/@vinodkotagiri/all-about-node-js-buffers-d53b0ea66fe8?source=topics_v2---------70-89--------------------ab12cb58_62ee_40ae_b807_63c456fbf3ea-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2734,2123,Node.js: An Introduction,Node.js is a popular runtime environment that allows developers to run JavaScript code outside of the browser. It was created by Ryan Dahl in 2009 and has since gained a significant following. Node.js …,https://medium.com/@vinodkotagiri/node-js-an-introduction-to-its-internals-and-differences-from-browser-javascript-6a594a65ebf6?source=topics_v2---------71-89--------------------ab12cb58_62ee_40ae_b807_63c456fbf3ea-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2735,2124,Powering the Web: The Most Popular Backend Technologies in 2023,"When it comes to building web applications, there are two main parts that are crucial to its success: the frontend and the backend. The frontend, which is what users see and interact with, is built using languages such as HTML, CSS, and JavaScript. …",https://medium.com/@whytap/powering-the-web-the-most-popular-backend-technologies-in-2023-6f581fdbbd4c?source=topics_v2---------72-89--------------------ab12cb58_62ee_40ae_b807_63c456fbf3ea-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ZrV-jU_l05bYIAwXuHUHHg.jpeg,backend 2736,2125,Membangun API Sederhana Menggunakan Node.js dan MongoDB,"Pendahuluan API atau Application Programming Interface menjadi salah satu hal yang sangat penting dalam pengembangan aplikasi. API memungkinkan pengembang untuk menghubungkan aplikasi yang berbeda dan berkomunikasi satu sama lain. Dalam artikel ini, kita akan membahas bagaimana cara membuat sebuah User API menggunakan MongoDB dan Node.js Express. Persiapan Sebelum memulai, pastikan Kita sudah…",https://medium.com/@g.alfadiansyah/membangun-api-sederhana-menggunakan-node-js-dan-mongodb-d72f81fcde60?source=topics_v2---------73-89--------------------ab12cb58_62ee_40ae_b807_63c456fbf3ea-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Hh1Js8hB9_xN3CQd.jpeg,backend 2737,1811,Is Node.js Still the Future of Backend Development? Exploring Possible Replacements,"Node.js has been the go-to backend technology for web development for several years now, and with good reason. Its event-driven, non-blocking I/O model makes it incredibly efficient for building fast, scalable web applications. But as with any technology, the question arises: is Node.js still the future of backend development, or…",https://medium.com/@ladumorrahul/is-node-js-still-the-future-of-backend-development-exploring-possible-replacements-54bcc8979fd6?source=topics_v2---------74-89--------------------ab12cb58_62ee_40ae_b807_63c456fbf3ea-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hwjnHs6gR5PEyaqg8Vv2YA.jpeg,backend 2738,2126,Choosing the Right Backend Language for Your Project: A Comprehensive Guide,"Choosing the Right Backend Language for Your Project: A Comprehensive Guide Choosing the right backend language is a crucial step in developing any website or application. The backend is responsible for handling data processing, storage, and management. The efficiency and reliability of your project largely depend on selecting the right…",https://medium.com/@lisags98765/choosing-the-right-backend-language-for-your-project-a-comprehensive-guide-4a0f7cbb8530?source=topics_v2---------75-89--------------------ab12cb58_62ee_40ae_b807_63c456fbf3ea-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2739,2127,Quorum,"Distributed Consensus Problem — There are two main patterns of replication that we’ve seen so far: Single Master Replication, where writes are processed in a node and propagated to all nodes before responding to the client. Multi Master Replication, where writes can happen in any node and they periodically sync with other nodes. While…",https://medium.com/@sriramr083/quorum-fa4d1d188de4?source=topics_v2---------76-89--------------------ab12cb58_62ee_40ae_b807_63c456fbf3ea-------17,https://miro.medium.com/v2/resize:fill:140:140/1*mCLeQhk3G8JlqI3H_ycxjQ.png,backend 2740,2128,ChatAfrica -My take,"Welcome to ChatAfrica, a groundbreaking project that aims to educate people about the rich and diverse cultures of Africa. ChatAfrica was created for anyone who wants to learn more about Africa, whether they are students, scholars, or simply curious individuals. …",https://medium.com/@annemarrieakeyo42/chatafrica-my-take-940504603f1c?source=topics_v2---------77-89--------------------ab12cb58_62ee_40ae_b807_63c456fbf3ea-------17,https://miro.medium.com/v2/resize:fill:140:140/1*t0INvN-0u_7hBaBLuyuOtw.png,backend 2741,2129,React: Inverse Data Flow,"When it comes to React, the concept of inverse data flow is what really closes the loop when thinking in React! We can render components with props and state flowing down a component hierarchy, but what about the other way around? For example, when a user input is changing state…",https://medium.com/@raymondan1995/react-inverse-data-flow-2905d16508?source=topics_v2---------78-89--------------------ab12cb58_62ee_40ae_b807_63c456fbf3ea-------17,https://miro.medium.com/v2/resize:fill:140:140/1*I82V_4mW8m5l-DkApr-xnQ.png,backend 2742,2103,ReactJS Notlarım — 1,"Frontend yolunda önemli bir seriye başlıyoruz. Bu bölümde aşağıdaki başlıkları göreceğiz. Giriş İlk Uygulama Babel Konfigürasyonu Giriş ReactJS, Facebook tarafından geliştirilen ve kullanıcı arayüzü (user interface, UI) oluşturmada kullanılan açık kaynak kodlu bir JavaScript kütüphanesidir. React, özellikle tek sayfa uygulamalar (Single Page Application-SPA) gibi büyük, karmaşık uygulamaların geliştirilmesine uygun olacak…",https://medium.com/@urazakgul/reactjs-notlarım-1-5e643876bac7?source=topics_v2---------79-89--------------------ab12cb58_62ee_40ae_b807_63c456fbf3ea-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DssL0HiHYaEUmAuPmCH3Xw.png,backend 2743,2130,Advanced JavaScript Techniques: Using bind() and apply(),"In JavaScript, bind and apply are two powerful functions that allow developers to control the context in which a function is executed. They are commonly used to modify the value of this and pass arguments to a function. In this article, we’ll take a closer look at how these functions…",https://medium.com/@honisek.jakub/javascript-apply-bind-6b5611281b16?source=topics_v2---------80-89--------------------2a29a790_9004_4b29_bd69_f64e441af6a4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oo4ir_pm4Dkl6EkjBGTbig.png,backend 2744,2131,what the heck is multipart/form-data???,"TL;DR This blog discusses the importance of multipart/form-data in web development, which is used for uploading files and sending data through an HTTP POST request. Understanding multipart/form-data is essential for web developers working with file uploads while JSON couldn't help When it comes to web development, understanding HTTP content types…",https://medium.com/@varaprasadh/what-the-heck-is-multipart-form-data-8df091d598b5?source=topics_v2---------81-89--------------------2a29a790_9004_4b29_bd69_f64e441af6a4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zervWeaeE3imm9NC87NFkA.png,backend 2745,2132,Building Web Applications with Spring Boot,Spring Boot is a popular framework for building web applications in Java. It provides developers with a set of tools and libraries that make it easy to create and deploy web applications quickly and efficiently. …,https://medium.com/@lasanthap256/building-web-applications-with-spring-boot-7d2f575daa4c?source=topics_v2---------82-89--------------------2a29a790_9004_4b29_bd69_f64e441af6a4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ZoSESkH1sEKdWKELkDg-Fw.png,backend 2746,2133,Exploring the Key Features of Node.js,"Node.js is a server-side, open-source JavaScript runtime environment that executes JavaScript code outside of a browser. It was initially introduced in 2009 by Ryan Dahl and is currently maintained by the Node.js Foundation. Node.js …",https://medium.com/dev-genius/title-here-fcdd19a34097?source=topics_v2---------83-89--------------------2a29a790_9004_4b29_bd69_f64e441af6a4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7sHwLsqir4JQU6kmmZ63sw.jpeg,backend 2747,2134,Setting up your first Django project with the Django rest framework,Django is an open source framework used to rapidly build responsive and scalable web applications. Django uses the python programming language. You can learn more about the Django framework here. Table of contents Creating a virtual environment Installing Django and the Django rest framework. Create a Django project. Create an app The following…,https://medium.com/@sichangifelix23/setting-up-your-first-django-project-with-the-django-rest-framework-2ef3663bdc0?source=topics_v2---------84-89--------------------2a29a790_9004_4b29_bd69_f64e441af6a4-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2748,2135,Laravel —New way to know about Service Container and Provider,"Think of the service container as the bouncer at a fancy nightclub. It decides who gets in and who doesn’t. Except, instead of checking IDs, it’s checking to see if a particular class or interface is registered with it. Now, imagine you’re trying to get into this nightclub with your…",https://medium.com/@darshanvasu3048/laravel-new-way-to-know-about-service-container-and-provider-75feae39ae47?source=topics_v2---------85-89--------------------2a29a790_9004_4b29_bd69_f64e441af6a4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*YFutjnF8yvxQ-k520UHFfQ.jpeg,backend 2749,2136,MongoDB: A Beginner’s Guide,"MongoDB is a widely used NoSQL database system that provides high performance, scalability, and flexibility for handling large volumes of unstructured or semi-structured data. MongoDB is designed to work with JSON-style documents, and it allows developers to store, retrieve, and manipulate data with ease. In this blog post, we will…",https://medium.com/@adityakuagrawal/mongodb-a-beginners-guide-884dbbae1aee?source=topics_v2---------86-89--------------------2a29a790_9004_4b29_bd69_f64e441af6a4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*08w-d61aJiZPB-f3GakwAg.png,backend 2750,2127,Consistency Models,"Understand the true meaning of Consistency in a Distributed System — Consistency In a distributed system, when we say that a system is consistent, it means that every read after a successful write always returns the most recent value. This property is also known as Read after Write Consistency. In a single node system, this is guaranteed by default since any reads…",https://medium.com/@sriramr083/consistency-models-af136db49104?source=topics_v2---------87-89--------------------2a29a790_9004_4b29_bd69_f64e441af6a4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1F7VXJ2iEhfJ_WtP8MFtJA.png,backend 2751,2137,Understanding and Working with Middleware in Express.js,A middleware is a function or program that runs between the time a request is made to a server and the time a response is sent back. They are the bedrock of the Express framework and chances are you have written tons of middleware without realizing it. The callback you…,https://medium.com/dev-genius/understanding-and-working-with-middleware-in-express-js-ed19255237b?source=topics_v2---------88-89--------------------2a29a790_9004_4b29_bd69_f64e441af6a4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*VGgKdrCjmHKbr7skvkxzzA.png,backend 2752,2138,Mastering the Art of Celery: A Comprehensive Tutorial,"If you’re looking to learn how to use Celery, the popular task queue and job scheduler for Python, you’re in the right place. In this tutorial, we’ll walk you through the basics of setting up and running Celery, as well as some more advanced features like task routing and scheduling. …",https://medium.com/@yasykur_rafii/mastering-the-art-of-celery-a-comprehensive-tutorial-c3c24ae132c0?source=topics_v2---------89-89--------------------2a29a790_9004_4b29_bd69_f64e441af6a4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*bz-9oa3bbFKcg7Rr,backend 2753,2139,OAuth in a Nutshell,"OAuth (Open Authorization) is a protocol used for access delegation, where resource owners grant third-party applications access to their resources without sharing their user credentials. in this article, we will expline OAuth 1 and OAuth 2 OAuth 1.0 OAuth 1.0 is an authorization protocol used to grant third-party applications access to a…",https://medium.com/towardsdev/oauth2-in-a-nutshell-f88003108dc4?source=topics_v2---------90-89--------------------9bb60c5a_3ef0_4c78_a0fd_4a86c7a30b18-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Wr5b8tVqxVkNJwMRusK_PQ.png,backend 2754,2140,Learning about Ramda.js,"Ramda.js is a popular functional programming library for JavaScript. It provides a collection of utility functions that make it easier to write functional-style code. In this blog post, we will explore what Ramda.js is, why it is useful, and some of its key features. What is Ramda.js? Ramda.js is a…",https://medium.com/geekculture/learning-about-ramda-js-4d50be26b4b7?source=topics_v2---------92-89--------------------9bb60c5a_3ef0_4c78_a0fd_4a86c7a30b18-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qrOKwG00bOlywhwaZPaJFg.jpeg,backend 2755,2141,Web Stack Weekly — Issue#62,"Welcome to Web weekly — a weekly newsletter on new development and updates of Web universe curated by Canopas team, delivered every Monday. Articles A Guide To Accessible Form Validation Each time we build a field validation from scratch, accessibility doesn’t come out of the box. …",https://medium.com/canopas/web-stack-weekly-issue-62-1c99ab9b9159?source=topics_v2---------93-89--------------------9bb60c5a_3ef0_4c78_a0fd_4a86c7a30b18-------17,https://miro.medium.com/v2/resize:fill:140:140/0*zbmaDOEUzg8xH3tZ.jpeg,backend 2756,2142,PHP-OOP Constant,"Pada artikel ini, saya akan menjelaskan tentang Constant di Bahasa Pemograman PHP A. Apa itu Constant Jika kita sedang belajar matematika atau IPA, kita sering mendapati nilai phi (3,14). Nilai tersebut adalah nilai tetap yang sudah ditetapkan dan tidak dapat berubah seiring waktu. …",https://medium.com/@akmalranyan/php-oop-constant-f468f0e74349?source=topics_v2---------94-89--------------------9bb60c5a_3ef0_4c78_a0fd_4a86c7a30b18-------17,https://miro.medium.com/v2/resize:fill:140:140/1*t0I-QMa7zfNb8xvP-fDvnA.png,backend 2757,970,Top 10 Backend Frameworks,Frontend development and backend development are the two main kinds of development. Building a web application’s server-side falls under the purview of a backend developer. The backend is in charge of the internal operations while the frontend communicates with the user. A frontend might or might not function without a…,https://medium.com/@talktorahul.b/top-10-backend-frameworks-3c3506a23079?source=topics_v2---------95-89--------------------9bb60c5a_3ef0_4c78_a0fd_4a86c7a30b18-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2758,2143,🎨Node.js with Multiple Design Patterns,We use design patterns in Node.js because they provide a set of proven solutions to common problems or challenges in software development. Here are some reasons why we use design patterns in Node.js: Reusability: Design patterns allow us to encapsulate complex logic and functionality in a reusable and modular way…,https://medium.com/bitsrc/nodejs-with-multiple-design-patterns-bfa0cc9e403b?source=topics_v2---------96-89--------------------9bb60c5a_3ef0_4c78_a0fd_4a86c7a30b18-------17,https://miro.medium.com/v2/resize:fill:140:140/0*mIdcGzKSS19HNUn4.jpg,backend 2759,2103,TypeScript Notlarım — 3,"Serinin son bölümünde bir uygulama yapalım. Uygulama kitap ürünü ile ilgili olsun. Book class’ını oluşturalım ve bu class’ı export edelim. book.ts: export class Book { constructor( public id?: number, public title?: string, public category?: string, public price?: number ){ } } let b = new Book(); Yukarıdaki kod, bir Book…",https://medium.com/@urazakgul/typescript-notlarım-3-4cdf832a4c4b?source=topics_v2---------97-89--------------------9bb60c5a_3ef0_4c78_a0fd_4a86c7a30b18-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WF3rglr62qSYHX9u.jpg,backend 2760,2144,"Gate 2023 | front-end, back-end of compiler",Question: Consider the following statements regarding the front-end and back-end of a compiler. S1: The front-end includes phases that are independent of the target hardware. S2: The back-end includes phases that are specific to the target hardware. S3: The back-end includes phases that are specific to the programming language used in the source code. Identify the CORRECT option. A) Only S1 is TRUE.,https://medium.com/@h4krg33k/gate-2023-front-end-back-end-of-compiler-882ca2161630?source=topics_v2---------98-89--------------------9bb60c5a_3ef0_4c78_a0fd_4a86c7a30b18-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2761,2145,Build a Scalable Backend Service with AWS: The Power of Serverless Architecture,"Gone are the days when creating a backend server for your application meant setting up and maintaining costly infrastructure. With the advent of cloud computing and serverless architecture, developers can now build scalable and cost-efficient backend services using a variety of cloud-based tools and services. One such cloud provider is…",https://medium.com/aws-tip/build-a-scalable-backend-service-with-aws-the-power-of-serverless-architecture-9a2c1645e4ef?source=topics_v2---------99-89--------------------9bb60c5a_3ef0_4c78_a0fd_4a86c7a30b18-------17,https://miro.medium.com/v2/resize:fill:140:140/1*F-IUgV_zmW9NFboup_-T9Q.png,backend 2762,2146,Backend Recommendation For Your App Development,"Sometimes when building the backend for your application may need a long time to develop, we need to understand and must have deep skills in developing API. Rather than use a custom backend, we can use a Service for our backend. …",https://medium.com/@nyomansunima/5-recommendation-baas-for-your-app-development-9b27ecf6bf26?source=topics_v2---------100-89--------------------d6552adb_16a6_4802_bb89_9c3bbdeb5603-------17,https://miro.medium.com/v2/resize:fill:140:140/1*n58ve1KQDxXCHxbSB1iREg.png,backend 2763,2147,HOW TO MASTER FRONTEND — COMPLETE ROADMAP,"Firstly, Let us understand what us Frontend Development? — Frontend development deals with the browser’s user interface. In essence, it is the application’s user side. Structure, styling, and functionality make up the bulk of the three categories that comprise frontend development. HTML 🡪🡪 CSS 🡪🡪 JAVASCRIPT 🡪🡪 REACT/ANGULAR Let us understand each part briefly.",https://medium.com/@gdsc_32043/how-to-master-frontend-complete-roadmap-b74216e04ff3?source=topics_v2---------101-89--------------------fe8c4186_43cc_40c1_b1b9_db0788b156b5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*lmr9hN6JLN_Dd0Mf2Ggqrg.png,backend 2764,2148,Middleware Magic: Getting Image URLs with Multer and Cloudinary in Node.js,"Here we move hey I’m back again!, In my previous posts, I’ve written about topic Exploring Custom Hooks in React and Creating a Reusable Modal Component in React . Today, I,m excited to talk about how middle ware work in node js and showcasing an example how use middleware in…",https://medium.com/@tusharchavan166/middleware-magic-getting-image-urls-with-multer-and-cloudinary-in-node-js-5235f512171?source=topics_v2---------102-89--------------------fe8c4186_43cc_40c1_b1b9_db0788b156b5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yFGzzQWHeyr5g3sAMfIXng.png,backend 2765,2149,5 Reasons to Using Cache Layer and Express.js & Mongoose & Redis Example,Caching is a common technique used to improve the performance of web applications. …,https://medium.com/@fxdemir99/5-reasons-to-using-cache-layer-and-express-js-mongoose-redis-example-edbb5efa4705?source=topics_v2---------103-89--------------------fe8c4186_43cc_40c1_b1b9_db0788b156b5-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*kv6XqX4_JdLTU5QNPpUjew.gif,backend 2766,2150,How session and cookies works ?,"In the world of web development, sessions and cookies are two important concepts that help store and retrieve information about users. As we know, HTTP is stateless, which means that all requests sent are independent. However, in some situations, we need to keep track of user activity. A common example…",https://medium.com/@hendelRamzy/how-session-and-cookies-works-640fb3f349d1?source=topics_v2---------107-89--------------------fe8c4186_43cc_40c1_b1b9_db0788b156b5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Mc3AiM1OIL4rH4DaC9m6Dg.png,backend 2767,2151,Difference Between Node JS and Django. Which one you should choose?,Today we are going to talk about the difference between the 2 major using and in-demand Backend frameworks industry. Before starting. If you want to be the part of CODE Culture Community. Just fill out the form to join the Free Code Culture Sessions on Sunday and get your questions…,https://medium.com/@codeculturepro/difference-between-node-js-and-django-which-one-you-should-choose-b3e5ca5c44de?source=topics_v2---------108-89--------------------fe8c4186_43cc_40c1_b1b9_db0788b156b5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CPE_Lxnd0oFk7hxo6V65ag.jpeg,backend 2768,2147,Guide for How to Choose an Appropriate Backend,"Choosing the right backend technology is one of the most crucial decisions you will make when developing a web or mobile application. An application’s backend is the server side, where the database, user authentication, and server-side processing are all managed. It can be difficult to choose the best backend technology…",https://medium.com/@gdsc_32043/guide-for-how-to-choose-an-appropriate-backend-17dbe05003aa?source=topics_v2---------109-89--------------------fe8c4186_43cc_40c1_b1b9_db0788b156b5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*agIu266ijcSKQbIQYhP7QQ.png,backend 2769,2089,What’s soap web services?,"Soap Web Services An Introduction In the world of software development, web services have become an integral part of building modern-day applications. These services are responsible for communicating between different software components, making it possible for applications to exchange data and interact with one another. One of the most popular…",https://medium.com/@cfqbcgwkg/whats-soap-web-services-219a96bbf0f1?source=topics_v2---------110-89--------------------ff2016a2_0ac7_45f8_890f_648b56a41cf1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0FspjB-sOcZ9iqRhO-vo4Q.png,backend 2770,2152,Backend Communication Patterns,"This article is about different ways our backend communicates and get things done and I’d try to make this as non-technical as possible(as I am not really a fan of too technical terms), no research paper vibes. The ways are listed below and would also be explained in the most…",https://medium.com/@adedigbaadedotunemmanuel/backend-communication-patterns-9709584f135d?source=topics_v2---------111-89--------------------ff2016a2_0ac7_45f8_890f_648b56a41cf1-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2771,2153,The Power of “Convention over Configuration” in Rails,"If there is any case where being lazy can be advantageous, it is in the context of software engineering. Developers like to write as little code as possible, while still creating robust applications — and this is nothing to be ashamed of! In fact, it is recommended that engineers find…",https://medium.com/@caleighcodez/the-power-of-convention-over-configuration-in-rails-1d48bd9c8f9e?source=topics_v2---------112-89--------------------ff2016a2_0ac7_45f8_890f_648b56a41cf1-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2772,2154,[Interview] 17 Media Backend,"以下是網路上找到的 17 Media 後端面試題目,並且加上個人的解法。 面試流程 Codility On Site 白板題 Behavior Question chat with CEO Questions leetcode類型 Q1. 對 string 格式儲存的數字做減法,e.g. s1 “1234”, s2 “234”,回傳 “1000”。 ANS. 考慮到s1, s2有可能是一串非常長的字串,轉換回數字有可能超出in …",https://medium.com/the-messiah-code-神碼技術共筆/interview-17-media-backend-1d93cdd110fd?source=topics_v2---------113-89--------------------ff2016a2_0ac7_45f8_890f_648b56a41cf1-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2773,2083,6 Ways to Update Data in Batches in MYSQL,"We all know that batch inserts in MYSQL are very simple, but what about batch updates? 1. IN The IN statement has relatively large limitations, and the updated results must be consistent. For example, the following is to set the status (status) of all rows that meet the conditions to 1. If…",https://medium.com/javarevisited/6-ways-to-update-data-in-batches-in-mysql-b6facc0a6c22?source=topics_v2---------114-89--------------------ff2016a2_0ac7_45f8_890f_648b56a41cf1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*J05aHq3tovmGkdGz,backend 2774,2155,Introduction to JavaScript,“JavaScript is the only language that I’m aware of that people feel they don’t need to learn before they start using it” — Douglas Crockford JavaScript was created over 26 years ago and is currently one of the most popular programming languages. But what exactly is JavaScript? JavaScript is a programming language commonly used in…,https://medium.com/@vighneshsudhakar/introduction-to-javascript-f5854fa96f67?source=topics_v2---------116-89--------------------ff2016a2_0ac7_45f8_890f_648b56a41cf1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oFNHqhQq0Gf_Gco0OxFI_w.jpeg,backend 2775,2142,PHP-OOP Static Concept,"Pada artikel hari ini, saya akan menjelaskan tentang Konsep Statis yang ada di Paradigma OOP bahasa pemograman PHP A. Apa itu Konsep Statis Di dalam Paradigma OOP PHP, pada dasarnya untuk memanggil sebuah fungsi yang ada di dalam class, kita harus membuat object terlebih dahulu. …",https://medium.com/@akmalranyan/php-oop-static-concept-5ed700da29a5?source=topics_v2---------119-89--------------------ff2016a2_0ac7_45f8_890f_648b56a41cf1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vDeSsiv951oWwE-gjkU9PA.png,backend 2776,2156,Introduction to JSON: How It is used in Backend Development,"As web applications began to evolve and become more data-intensive, developers needed a way to exchange data between the front-end and back-end servers. This of course led to the development of JSON. Javascript Object Notation(JSON) is a lightweight text-based format used to represent and transfer data in web applications. JSON…",https://medium.com/@onyenankiekelvin/introduction-to-json-how-it-is-used-in-backend-development-15839acc2fb?source=topics_v2---------120-89--------------------273f1d5a_8890_415d_a3bf_9d6f7ca2c1a2-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2777,2157,Using get() to Query Data in Django: A Tutorial,"In Django, the get() method is a powerful tool for retrieving a single object from a database based on specific conditions. Here's how you can use get() in Django to query data Import the necessary modules First, you’ll need to import the necessary modules to use get() in Django. Make…",https://medium.com/@lordkonadu/using-get-to-query-data-in-django-a-tutorial-e66c237c54b6?source=topics_v2---------121-89--------------------273f1d5a_8890_415d_a3bf_9d6f7ca2c1a2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*48ESBHSSr3_pxQVLXaJO2g.png,backend 2778,2158,Why Firebase is one of the Best Mobile Backend as a Service?,"Firebase is a set of hosting services for any type of application (Android, iOS, Javascript, Node.js, Java, Unity, PHP, C++ …). It offers NoSQL and real-time hosting of databases, content, social authentication (Google, Facebook, Twitter and Github), and notifications, or services, such as a real-time communication server. In October 2014…",https://medium.com/@adosi12/why-firebase-is-one-of-the-best-mobile-backend-as-a-service-f25ba90bfe44?source=topics_v2---------122-89--------------------273f1d5a_8890_415d_a3bf_9d6f7ca2c1a2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*FdnLak8mpLwDWRVK.png,backend 2779,2159,Alfred backend with openfoodfacts,This post is related to my last post at https://friendlyuser.github.io/posts/tech/flutter/how_to_deploy_dart_to_hs.html. I will be using the same backend to create a wrapper around the openfoodfacts api. The openfoodfacts api is a free and open source api that provides information about food products. The api is available at https://world.openfoodfacts.org/data. The api is…,https://medium.com/@dlcoder/alfred-backend-with-openfoodfacts-7c06c1dfaa02?source=topics_v2---------123-89--------------------273f1d5a_8890_415d_a3bf_9d6f7ca2c1a2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*mqCgbrXkv9_W8ye4.png,backend 2780,2160,Tutorial de Rust + WebAssembly,"En este tutorial te enseño cómo compilar Rust a WebAssembly y poder utilizarlo en tu navegador. WebAssembly (wasm) es una tecnología que nos permite ejecutar código de *casi* cualquier lenguaje en nuestro navegador. Por ejemplo, aquellos navegadores Chromium (Chrome, Arc, etc.) tienen un motor V8, que les permite ejecutar JavaScript…",https://medium.com/@jonathanmxchavez/tutorial-de-rust-webassembly-48523481ea54?source=topics_v2---------124-89--------------------273f1d5a_8890_415d_a3bf_9d6f7ca2c1a2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*azOOn240QxqOyJH2LrqK4Q.png,backend 2781,2161,Creating a CRUD application with React and a backend API,"Creating a CRUD (Create, Read, Update, Delete) application with React and a backend API is a common task for web developers. React is a popular JavaScript library for building user interfaces, while APIs allow communication between the frontend and backend of web applications. In this blog post, we will walk…",https://medium.com/@sahil-awasthi/creating-a-crud-application-with-react-and-a-backend-api-2907ed5a251d?source=topics_v2---------126-89--------------------273f1d5a_8890_415d_a3bf_9d6f7ca2c1a2-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2782,2162,How to build your own backend to mask NFT Data,"Trait Sniping creates an unfair advantage for those who are able to use automated tools. This can lead to frustration and disappointment for collectors who are unable to purchase the NFTs they desire, as well as a loss of trust in the overall NFT ecosystem. This article provides ways to…",https://medium.com/@eztoolsofficial/how-to-build-your-own-backend-to-mask-nft-data-e5c1e0ba8515?source=topics_v2---------127-89--------------------273f1d5a_8890_415d_a3bf_9d6f7ca2c1a2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Rvr5hwG6m_ckHIxm9RKsHA.png,backend 2783,2163,The Top 5 Backend Web Development Frameworks for 2023,"Every application needs backend development, and choosing a backend framework for a project can be tricky. Let’s discuss the 5 best backend frameworks for web development. What are Web Development Frameworks? Web development frameworks are collections of resources and tools that software engineers use to create and maintain websites and web applications. A pre-defined infrastructure…",https://medium.com/getpieces/the-top-5-backend-web-development-frameworks-for-2023-59c874235779?source=topics_v2---------128-89--------------------273f1d5a_8890_415d_a3bf_9d6f7ca2c1a2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Q83_vl8AM0p4Xk_ETQMlxA.jpeg,backend 2784,2164,Menjadi Fullstack Developer dengan Flutter dan DartFrog (Bagian 1),"Sebagai pengembang aplikasi, seringkali kita berpikir tentang cara membuat server sendiri (full stack) menggunakan Flutter. Bagi mereka yang sudah ahli dalam Dart & Flutter, hal ini tentu menjadi hal yang menarik. Terima kasih kepada Very Good Ventures yang telah membuat DartFrog DartFrog adalah sebuah package untuk membuat backend dibangun di…",https://medium.com/@dimasibnu/menjadi-fullstack-developer-dengan-flutter-dan-dartfrog-bagian-1-7ad8063b87b1?source=topics_v2---------129-89--------------------273f1d5a_8890_415d_a3bf_9d6f7ca2c1a2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*rNUqjWs2_ORAmf1y,backend 2785,2140,Fundamentals of NestJs Framework,"NestJS is a powerful, scalable Node.js framework that’s built on top of Express. It’s designed to provide a robust architecture for building efficient, maintainable, and scalable server-side applications. NestJS is built with TypeScript, which is a superset of JavaScript that provides features such as static typing and enhanced object-oriented programming…",https://medium.com/geekculture/fundamentals-of-nestjs-framework-7a237c7b7ce3?source=topics_v2---------130-89--------------------4adb4fa0_727e_428b_98bf_ea117d01fed2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wSerctsNpVF8IhPnz_p5IA.jpeg,backend 2786,2165,Write performance tests with Kotlin,"Are you a Kotlin developer working with microservices? In this article, you will learn the basics of writing performance tests with Kotlin. Introduction Performance tests are a type of test that helps to determine how your application will behave at a determined workload. …",https://medium.com/wearewaes/write-performance-tests-with-kotlin-2db06f8ec329?source=topics_v2---------131-89--------------------4adb4fa0_727e_428b_98bf_ea117d01fed2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*35GIWTaKofXT18ldYyjlyg.jpeg,backend 2787,2166,Takeaways of building a business-critical low-latency microservice at scale,"This article describes how and why microservices have been introduced at Teads and outlines a concrete business feature we implemented this way. While this is not a complete guide, you will find helpful information if your company has reached the limits of a monolithic architecture, both from an organizational and…",https://medium.com/teads-engineering/takeaways-of-building-a-business-critical-low-latency-microservice-at-scale-97e79ce3ec78?source=topics_v2---------132-89--------------------4adb4fa0_727e_428b_98bf_ea117d01fed2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*J0FEEKy7EsG2gewqL0lPuA.jpeg,backend 2788,2167,How to prepare for Javascript interview: Frontend/backend Developer,"For front-end interviews, a basic understanding of JavaScript is required. The best FAANG+ businesses typically dedicate an entire onsite interview round to testing JS basics, and this phase can make or break your chances of landing a job at your ideal company. When covering full stack backend and frontend, which…",https://medium.com/@-TutortAcademy/how-to-prepare-for-javascript-interview-frontend-backend-developer-b296db978000?source=topics_v2---------133-89--------------------4adb4fa0_727e_428b_98bf_ea117d01fed2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*K3xLn-o4yHGMtzHPu66ZPA.jpeg,backend 2789,2168,Crash Course: Getting Your Server Data to Your Client w/ Rails,Ruby on Rails makes everything relatively simple when it comes to creating a back end. You have everything you can use from vanilla Ruby on top of some commands that were put together to make the common task quicker and easier. …,https://medium.com/@just_a_schaffer/crash-course-getting-your-server-data-to-your-client-w-rails-245d52aed91e?source=topics_v2---------134-89--------------------4adb4fa0_727e_428b_98bf_ea117d01fed2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tlbSNNlcEcJDJiB05ilKCQ.png,backend 2790,2115,"Choosing a Golang Library for GraphQL: A Comparison of Gqlgen, Gophers, and GraphQL-Go","GraphQL is a query language for APIs that allows clients to request only the data they need, making it a powerful alternative to REST APIs. When building a GraphQL API using Golang, I found several libraries to choose from. …",https://medium.com/@53jk1/choosing-a-golang-library-for-graphql-a-comparison-of-gqlgen-gophers-and-graphql-go-17a3e728e17d?source=topics_v2---------135-89--------------------4adb4fa0_727e_428b_98bf_ea117d01fed2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Iqpiu-YmhdrrtnjN,backend 2791,2169,How we built Continuous Data Balancing for safer cluster admin,"Go behind the scenes to see how our Continuous Data Balancing solution makes running Redpanda clusters safer and easier. — Author: Alexey Zatelepin During the lifetime of a long-running Redpanda cluster, many changes can affect the distribution of data across a cluster. …",https://medium.com/@redpanda-data/how-we-built-continuous-data-balancing-for-safer-cluster-admin-3f8e7be1c895?source=topics_v2---------136-89--------------------4adb4fa0_727e_428b_98bf_ea117d01fed2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*NqSIZGdiUkL9RnCk.png,backend 2792,2170,"Golang In 2023 — Catch Your Breath!. What’s New?, Why is it worth Learning?","Welcome to March 💙, Yipeeee!!. Today i would love to bring to your notice all you need to know about the Go programming language in 2023. This is a series , so read, clap, share and stay tuned fellas. The Go programming language abbreviated as Golang was developed by Google…",https://medium.com/@femiobadimu/golang-in-2023-catch-your-breathe-whats-new-why-is-it-worth-learning-2b7ccd0ce16b?source=topics_v2---------137-89--------------------4adb4fa0_727e_428b_98bf_ea117d01fed2-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2793,2171,Singleton Design Pattern in Go,The Singleton pattern is a creational design pattern that ensures that a class has only one instance and provides a global point of access to that instance. This pattern is useful when you want to ensure that only one instance of a class is created and used throughout the application. …,https://medium.com/@viktordev/singleton-design-pattern-in-go-eae6e0bbd159?source=topics_v2---------138-89--------------------4adb4fa0_727e_428b_98bf_ea117d01fed2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fNUw9tDeJuzvFZajI0e3AA.png,backend 2794,2083,Easy-to-understand Nginx Matching Rules,"Nginx’s location implements subdivision processing of requests. Some URIs return static content, and some are distributed to back-end servers, etc. I hope this article can help you understand these rules thoroughly. An example of the simplest location is as follows server { server_name website.com…",https://medium.com/javascript-in-plain-english/easy-to-understand-nginx-matching-rules-d543cfa4e109?source=topics_v2---------139-89--------------------4adb4fa0_727e_428b_98bf_ea117d01fed2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*vSLc2TFkPlCsgu12.png,backend 2795,2172,JavaScript map() method,"Hi there,👋🏻 I am Gibson, In the lost blog we discussed the overview of data transformation methods in JavaScript, If you did not see the last blog I recommend to you see the data transformation methods blog. I have shared the link below the blog. Now in this blog, we…",https://medium.com/yavar/javascript-map-method-e1a484ae0ac3?source=topics_v2---------141-89--------------------60128df7_e438_4ae2_9972_753fed764dab-------17,https://miro.medium.com/v2/resize:fill:140:140/1*RgcTr9qcl89r40QaVkVR1w.png,backend 2796,2173,Introduction to Django for backend development,"Django is a high-level web framework for building web applications. It is built on Python and follows the model-view-controller (MVC) architectural pattern. It is known for its robustness, scalability, and ease of use. Django provides a number of features that make it easy to build web applications quickly and efficiently…",https://medium.com/@codingwitharyan/introduction-to-django-for-backend-development-2db67768ee62?source=topics_v2---------142-89--------------------60128df7_e438_4ae2_9972_753fed764dab-------17,https://miro.medium.com/v2/resize:fill:140:140/0*3EH-DNmHWVA4xpkU,backend 2797,2174,JavaScript Mind Blowing Facts — Part1,Knowing JavaScript is must for both frontend and as well as backend engineers. Below are some of the advanced concepts which will helps us to understand some of the basic as well as advanced concepts of JavaScript. Below are the topics we are going to cover in detail as part…,https://medium.com/dev-genius/javascript-mind-blowing-facts-part1-645bc3a5f8d0?source=topics_v2---------143-89--------------------60128df7_e438_4ae2_9972_753fed764dab-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JNl68IpAMQuCkW5bvClPzw.png,backend 2798,2175,Cross-platform use of Google Protobuf,Recently I worked with Google protocol Buffer(mostly called as Google Protobuf). This is an one of the simple alternative to pass the data over network. Instead of JSON I used Protobuf just for POC. First question comes in mind why protobuf if JSON is mature enough to handle my all…,https://medium.com/@pankaj.saboo08/cross-platform-use-of-google-protobuf-53c2b575befe?source=topics_v2---------144-89--------------------60128df7_e438_4ae2_9972_753fed764dab-------17,https://miro.medium.com/v2/resize:fill:140:140/0*KYdLJd7RYNwqV3Tt,backend 2799,2176,A Comprehensive Guide to Building a Go Backend with Hexagonal Architecture,"In this article, we will explore the usage of clean architecture in a backend project developed using the Go programming language. Link to the project: Go Backend Hexagonal Architecture. 🖥️ To ensure the efficiency of this project, I conducted a comprehensive analysis of 30~40 Go Clean Architecture projects available on…",https://medium.com/@naofel1/go-backend-hexagonal-architecture-65e01818222f?source=topics_v2---------145-89--------------------60128df7_e438_4ae2_9972_753fed764dab-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SmLtGQ5kgQP40ir0LPBwYA.jpeg,backend 2800,2177,The Unsung Hero of our Connected World,"Part 1: Basics and Benefits By Tudor Blaga, QC Engineer, Cognizant Softvision Application Programming Interfaces, or APIs, are an important and integral part of modern software development, helping different applications and technologies interact and share data between them. This two-part article will cover API basics, benefits, testing approaches, tools, and best practices. The following, part…",https://medium.com/cognizantsoftvision-guildhall/the-unsung-hero-of-our-connected-world-e69b25053724?source=topics_v2---------146-89--------------------60128df7_e438_4ae2_9972_753fed764dab-------17,https://miro.medium.com/v2/resize:fill:140:140/0*dJXZswEo7msNhaUb,backend 2801,2178,From FullStack to ZenStack,"What changed for full-stack The concept of full-stack development has been around for many years, but its popularity has surged dramatically since 2022. As a consequence, its meaning has also changed.",https://medium.com/@jiashenggo/from-fullstack-to-zenstack-6c9de8acff94?source=topics_v2---------147-89--------------------60128df7_e438_4ae2_9972_753fed764dab-------17,https://miro.medium.com/v2/resize:fill:140:140/1*23KoD3Xo9RR7pVnxem3vTw.png,backend 2802,2179,Best Heroku Alternative To Host Node.js App For Free!,"In this blog post, i will show you how to deploy a node.js and express backend application on cyclic servers for free in just three simple steps. And trust me guys cyclic is one of the best hosting platform for your node or express based API projects. It is also…",https://medium.com/@CodeWithMasood/best-heroku-alternative-to-host-node-js-app-for-free-b8dc4e762486?source=topics_v2---------148-89--------------------60128df7_e438_4ae2_9972_753fed764dab-------17,https://miro.medium.com/v2/resize:fill:140:140/0*vwdn4C7b8MHGi_iq.png,backend 2803,2180,Database Integration with Postman and xmysql,"In backend automation and testing, we usually face this issue where we want to validate things in both API response and from the database, but doing so is quite a time taking and tiresome activity, a lot of manual effort is required in this process. …",https://medium.com/@uhabiba503/database-integration-with-postman-and-xmysql-367e598c1170?source=topics_v2---------149-89--------------------1809e1ac_f94e_4341_8c2c_cec4423b4566-------17,https://miro.medium.com/v2/resize:fill:140:140/1*YBjsLW_lAlIyBhscOi696w.png,backend 2804,2181,How to Keep up with New Technologies in 2023?,"The world of technology is fast-paced. Every day, new tech solutions are being proposed, tested, showcased, and implemented to address various problems. Technologies such as artificial intelligence, machine learning, the internet of things, data analytics, 5G, and virtual reality are paving the way for more drastic transformations. …",https://medium.com/@lavanya_61746/how-to-keep-up-with-new-technologies-in-2023-aa65f42c60c?source=topics_v2---------150-89--------------------1809e1ac_f94e_4341_8c2c_cec4423b4566-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1sthQ5tky_y0pShOxXPHMQ.png,backend 2805,2182,12 TypeScript tricks for Clean Code,"We’ll explore twelve TypeScript tricks for writing clean code, with examples that demonstrate how they work and why they are useful. By using these tricks in your own TypeScript code, you can create more robust and maintainable applications that are easier to reason about and debug. 1 — Use Type…",https://medium.com/@mvsg/12-typescript-tricks-for-clean-code-b23651dd0430?source=topics_v2---------152-89--------------------1809e1ac_f94e_4341_8c2c_cec4423b4566-------17,https://miro.medium.com/v2/resize:fill:140:140/1*moJeTvW97yShLB7URRj5Kg.png,backend 2806,2183,Python Logging: A Guide for Creating Informative Logs,"Recently, I have been working on a project as part of my job, and I found myself wasting a lot of time trying to debug my code and find out why certain things are not working as expected. …",https://medium.com/everything-full-stack/python-logging-a-guide-for-creating-informative-logs-dd32a4c60445?source=topics_v2---------153-89--------------------1809e1ac_f94e_4341_8c2c_cec4423b4566-------17,https://miro.medium.com/v2/resize:fill:140:140/1*S_RRoDpZVSURpSHiVPNyLQ.png,backend 2807,2184,New way of creating system design architecture with Lucid Charts,"As a seasoned API architect, I recognize the critical importance of utilizing the appropriate tools in our rapidly expanding technological landscape. While there are many exceptional options available to us, I personally endorse Lucid Charts as my preferred diagramming tool. …",https://medium.com/@moeidsaleem/new-way-of-creating-system-design-architecture-with-lucid-charts-ccc6a3e10aa2?source=topics_v2---------154-89--------------------1809e1ac_f94e_4341_8c2c_cec4423b4566-------17,https://miro.medium.com/v2/resize:fill:140:140/1*2Pi1w14382liVcLCXMsfBw.png,backend 2808,2185,APi nodejs com mongo db (ES6),"APi nodejs com mongo db (ES6) Instale as dependências: Certifique-se de que Node.js e MongoDB estejam instalados em sua máquina. Em seguida, crie um novo diretório para o projeto e execute o seguinte comando para iniciar um novo projeto Node.js: npm init Em seguida, instale as dependências necessárias: npm install…",https://medium.com/@lc08093/api-nodejs-com-mongo-db-es6-949ace6a8263?source=topics_v2---------155-89--------------------1809e1ac_f94e_4341_8c2c_cec4423b4566-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2809,2186,Distributed System : Event-Driven Batch Processing,"there are a number of batch applications where you want to perform more than a single action, or you may need to generate multiple different outputs from a single data input. In these cases, you start to link work queues together so that the output of one work queue becomes…",https://medium.com/@bindu.bc27/distributed-system-event-driven-batch-processing-58913924016a?source=topics_v2---------156-89--------------------1809e1ac_f94e_4341_8c2c_cec4423b4566-------17,https://miro.medium.com/v2/resize:fill:140:140/0*u18MMzYxtR4vPUDN.png,backend 2810,2187,MVC in Ruby on Rails: A Brief Explanation,"When I first began learning Ruby on Rails a few months ago, I saw that model carries out the logic, pulls from a database, and sends back a consistent response based on the controller’s instructions. Many junior developers were complaining about how difficult it was for them to master MVC…",https://medium.com/@edisipka/mvc-in-ruby-on-rails-a-brief-explanation-13c73b720725?source=topics_v2---------157-89--------------------1809e1ac_f94e_4341_8c2c_cec4423b4566-------17,https://miro.medium.com/v2/resize:fill:140:140/1*sGDsnHfLNNnoxvTT64WTgQ.jpeg,backend 2811,2188,Frontend mi? Backend mi?,"Bu karar tamamen kişisel tercihlerinize ve hedeflerinize bağlıdır. Her iki seçenek de farklı beceri setleri gerektirir ve farklı kariyer yolları sunar. Öncelikle, ön uç geliştirme (frontend) kullanıcı arayüzü ve kullanıcı deneyimi oluşturmak için gereklidir. Web tasarımı, HTML, CSS ve JavaScript gibi teknolojileri kullanarak kullanıcıların etkileşimde bulunduğu ve görsel olarak çekici…",https://medium.com/@sule.isler/frontend-mi-backend-mi-403266191c12?source=topics_v2---------158-89--------------------1809e1ac_f94e_4341_8c2c_cec4423b4566-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend 2812,2127,Vector Clocks,"The main limitation of Lamport Clocks was that they were unable to assist us in determining the causal relationship between two events. If you’re not sure what a causal relationship is, read my article on Message Ordering first. The reason for this is that we had a single timestamp that…",https://medium.com/@sriramr083/vector-clocks-db676b898ac6?source=topics_v2---------159-89--------------------b8f39dab_824d_4b47_bc87_5f445661abff-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ym5ZB_6CIZ_GmuIAJAcapw.png,backend 2813,2141,Web Stack Weekly — Issue#61,"Welcome to Web weekly — a weekly newsletter on new development and updates of Web universe curated by Canopas team, delivered every Monday. Articles Four Ways to Build Web Apps As web developers, we are developing many websites day to day. And for that, we need to decide better ways. This article will discuss four ways to…",https://medium.com/canopas/web-stack-weekly-issue-61-f9bd55ff9d9e?source=topics_v2---------160-89--------------------b8f39dab_824d_4b47_bc87_5f445661abff-------17,https://miro.medium.com/v2/resize:fill:140:140/0*zbmaDOEUzg8xH3tZ.jpeg,backend 2814,2147,Should you always use a framework for frontend development ?,"Firstly, What is WEB DEVELOPMENT: > making Web Applications which can be accessible to private or public users. Web Development contains two major parts — Frontend and Backend. In this blog, we are majorly focusing on Frontend development. Frontend is user interface which communicate between user and browser. Frontend Development…",https://medium.com/@gdsc_32043/should-you-always-use-a-framework-for-frontend-development-f4953d56503e?source=topics_v2---------161-89--------------------b8f39dab_824d_4b47_bc87_5f445661abff-------17,https://miro.medium.com/v2/resize:fill:140:140/0*M-9keFDoN1NDAsax,backend 2815,2189,Boost Your Node.js API Speed: Top Hacks to Optimize Performance and Accelerate Response Time,"From reverse proxies to streams and caching, discover practical tips and coding examples to supercharge your Node.js API performance and keep your users happy. — Node.js has become one of the most popular technologies for developing web applications, particularly for building APIs. Node.js is built on top of Google’s V8 JavaScript engine, which makes it lightning-fast and scalable. However, even with Node.js, there are still ways to optimize and speed up your API’s performance.",https://medium.com/gitconnected/boost-your-node-js-api-speed-top-hacks-to-optimize-performance-and-accelerate-response-time-97de69acb96?source=topics_v2---------162-89--------------------b8f39dab_824d_4b47_bc87_5f445661abff-------17,https://miro.medium.com/v2/resize:fill:140:140/0*7PGFJRjr133Z0rw9,backend 2816,2190,"Coding Bootcamp Week 7: Backend Project, Async Await & CICD","Backend development — Backend Project — News API ✨ For my backend project I chose to create a news API that allows users to retrieve information on topics, articles, users and comments. I set up an instance of my database using ElephantSQL and hosted my API using Render. You can check out my GitHub repo for more info. Async/Await ⏲ The…",https://medium.com/@rhalde/coding-bootcamp-week-7-backend-project-async-await-cicd-26ec33bf2507?source=topics_v2---------163-89--------------------b8f39dab_824d_4b47_bc87_5f445661abff-------17,https://miro.medium.com/v2/resize:fill:140:140/0*maaX102MWLL37g3U,backend 2817,2191,Senior Java Software Developer Interview Questions — part 2,"1. Describe Proxy Design Pattern. Where we can find already implemented Proxy Design Pattern in Spring? The Proxy design pattern is a structural pattern that allows for the creation of a placeholder or surrogate object that can act as a substitute for a real object. The proxy provides a layer of indirection between the client and the real object, which allows the proxy to perform additional…",https://medium.com/@danielzielinskitech/senior-java-software-developer-interview-questions-part-2-a9bbd098fd1c?source=topics_v2---------164-89--------------------b8f39dab_824d_4b47_bc87_5f445661abff-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qQYPP78q9U6vJSBfs0lC6w.png,backend 2818,2192,What it is like to be a student at Google & Reichman tech school: part 2 — back-end and concluding remarks,"As promised, now that the bootcamp is over, I sat down to write the second part of the article 🤓, which will review the back-end part and conclude my entire experience as a student at Google & Reichman tech school. (If you have not yet read the first part, you…",https://medium.com/@shir-w/what-it-is-like-to-be-a-student-at-google-reichman-tech-school-part-2-back-end-and-concluding-b3250d8683b3?source=topics_v2---------165-89--------------------b8f39dab_824d_4b47_bc87_5f445661abff-------17,https://miro.medium.com/v2/resize:fill:140:140/0*BrKhAcIZd9ssxrGy,backend 2819,2193,API Validation on FE,"Have you ever thought about validating your api on FE? Probably not, maybe you don’t know what it is and why complicate your so beautiful code. In this article, using an example, I will show and tell you why you need all this or not. Where it all started for…",https://medium.com/@maks_zhukov_97/api-validation-on-fe-d4879c90f54a?source=topics_v2---------166-89--------------------b8f39dab_824d_4b47_bc87_5f445661abff-------17,https://miro.medium.com/v2/resize:fill:140:140/0*a8zQ2EKeY3rwRGK0.jpg,backend 2820,2103,HTML-CSS-JavaScript: Hava Durumu,"Bu projede, Hava Durumu Uygulaması (Weather App) yapacağız. Proje için 1 adet klasör ve 3 adet sayfa açalım. img (içine bir tane arka plan için resim) index.html style.css script.js index.html ve style.css bölümünü direkt olarak veriyorum. script.js bölümünde görüşelim. index.html: <!DOCTYPE html> <html lang=""en""> <head> <meta charset=""UTF-8"">…",https://medium.com/@urazakgul/html-css-javascript-hava-durumu-198adf341366?source=topics_v2---------168-89--------------------b8f39dab_824d_4b47_bc87_5f445661abff-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TOZcHfJ6ewuGltmpas9oXw.png,backend 2821,2194,Implement a dockerized node service and postgres image with sample data,"To implement a dockerized node and postgres image, let’s take the following steps. Create a package.json file with the following content: We will use this to spit out a simple node application as a docker image in our container. 3. Create a init.sql file with the following content: …",https://medium.com/@kaleongtong282/implement-a-dockerized-node-service-and-postgres-image-with-sample-data-52d9cba2ec12?source=topics_v2---------169-89--------------------9d58204d_beb2_4661_81d6_a26552ec4b65-------17,https://miro.medium.com/v2/resize:fill:140:140/0*XpLuMSwao4FVk29J,backend 2822,2103,Asynchronous JavaScript ve API Notlarım — 3,"Serinin üçüncü ve son bölümünün konuları aşağıdaki başlıklar olacaktır. Async & Await Async & Await index.html: <!DOCTYPE html> <html lang=""en""> <head> <meta charset=""UTF-8""> <meta http-equiv=""X-UA-Compatible"" content=""IE=edge""> <meta name=""viewport"" content=""width=device-width, initial-scale=1.0""> <title>Document …",https://medium.com/@ynsmrtpc/fullcalendar-kullanımı-eef9ae0de951?source=topics_v2---------201-89--------------------5878b1cc_3324_4bac_85d4_34eec98d0d97-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zzst8Ew9xFuLjVRjMtBmHQ.jpeg,backend-development 3057,2377,Spring Boot 101: An Introduction to Building Web Applications,"Hey there, my name is Kalpa D. Fernando and I’m excited to take you on a journey through the world of Spring Boot! 🚀 Buckle up, because we’re going to dive deep into creating RESTful APIs, connecting to databases, and deploying applications. Introduction Spring Boot is a popular framework for building…",https://medium.com/linkit-intecs/spring-boot-101-an-introduction-to-building-web-applications-6f4f4838ce9a?source=topics_v2---------202-89--------------------5dbdef92_d5e6_4956_af72_c79f1ea257e3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*vWkm4qMdHQJna048.jpg,backend-development 3058,2378,The Art of Web Development: A Beginners Guide,You’ve come to the right place if you want to learn Web development or prepare for Hackathons. Web development is the process of creating and maintaining websites and web applications. …,https://medium.com/@n4vn337/the-art-of-web-development-a-beginners-guide-b4dbd8c488e6?source=topics_v2---------203-89--------------------5dbdef92_d5e6_4956_af72_c79f1ea257e3-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend-development 3059,2379,Backend Web Development Trends for 2023,"The backend has always been an exciting field. Like every other software development field, things are constantly evolving, and we need to keep up with the evolution and trends in this field so we won’t be left behind. This year, we have seen many changes, from greater adoption of full-stack…",https://medium.com/@visiondaniels32/backend-web-development-trends-for-2023-a0069082b02d?source=topics_v2---------204-89--------------------5dbdef92_d5e6_4956_af72_c79f1ea257e3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*NbFn_o62B_jRAs3I,backend-development 3060,2380,Implementasi Sistem Validasi Input di REST-API dengan Golang,Artikel Penerapan Validasi Input di Golang #2 — Artikel sebelumnya telah membahas bagaimana membuat sistem validasi input secara custom dan mengujinya menggunakan berbagai test case dengan memanfaatkan unit testing. Artikel ini akan membahas bagaimana kita menerapkan sistem validasi yang sudah dibuat ke dalam REST-API sehingga dapat digunakan secara luas untuk mengembangkan backend server. …,https://medium.com/@elpahlevi/implementasi-validasi-input-ke-dalam-rest-api-di-golang-e185f26ad546?source=topics_v2---------205-89--------------------5dbdef92_d5e6_4956_af72_c79f1ea257e3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vjo5czzSum-v_KasSTUljw.png,backend-development 3061,2381,A Roadmap to Mastering Backend Web Development with Python,"Backend web development is the process of building the server-side of a web application, responsible for handling server-side logic and connecting the application to the database. Python is a popular programming language for backend web development, thanks to its simplicity and versatility. …",https://medium.com/@khaleel92/a-roadmap-to-mastering-backend-web-development-with-python-3c59be0b715d?source=topics_v2---------206-89--------------------5dbdef92_d5e6_4956_af72_c79f1ea257e3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5RNqXtxWDEk0TBQtQf1cOg.png,backend-development 3062,2382,GenericAPIView and Mixins in DRF,"Note: This Article is in continuation of previous article where we have implemented APIView class (Link of Article) GenericAPIView class extends the REST framework’s APIView class, adding commonly required behavior for standard list and detail views. What extra functionality GenericAPIView is adding to APIView class ? APIView is the base…",https://medium.com/dev-genius/genericapiview-and-mixins-in-drf-28ac6192bd2f?source=topics_v2---------207-89--------------------5dbdef92_d5e6_4956_af72_c79f1ea257e3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7KhXoI9Be7LlXjPDuNyEMw.png,backend-development 3063,2383,Hindari Menulis Kode Berulang Kali di Laravel dengan Menggunakan Trait,"Hello friends, kali ini aku akan membawakan topik bahasan seputar pengembangan web dengan Laravel. Saat kalian mengembangkan aplikasi web dengan Laravel, seringkali kita menuliskan kode yang sama dan berulang kali atau istilah kerennya boilerplate code baik secara tidak sadar atau sadar tapi mager wkwkw. Contoh kode boilerplate yang mungkin kalian…",https://medium.com/@wahyuivan/hindari-menulis-kode-berulang-kali-di-laravel-dengan-menggunakan-trait-92fb1710b326?source=topics_v2---------208-89--------------------5dbdef92_d5e6_4956_af72_c79f1ea257e3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TWUACKyEcPR741C60oMs6A.png,backend-development 3064,2381,Comparing Django and FastAPI: A Detailed Comparison of Two Popular Python Web Frameworks,"Django and FastAPI are both popular web frameworks for building web applications using the Python programming language. Both frameworks have their own unique features and use cases, and each has its own strengths and weaknesses. Django is a high-level web framework that is designed for building complex web applications. It…",https://medium.com/@khaleel92/comparing-django-and-fastapi-a-detailed-comparison-of-two-popular-python-web-frameworks-2a751793185a?source=topics_v2---------209-89--------------------5dbdef92_d5e6_4956_af72_c79f1ea257e3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5RNqXtxWDEk0TBQtQf1cOg.png,backend-development 3065,2384,Setup Express.js Backend with TypeScript,"Express.js is a web application framework built on top of Node.js. It is recommended to use TypeScript in all your express.js projects. …",https://medium.com/@pranavgupta483/setup-express-js-backend-with-typescript-and-mongoose-75aa0e318d2d?source=topics_v2---------210-89--------------------5dbdef92_d5e6_4956_af72_c79f1ea257e3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*851XUx3o4XZaT-CC7MFkzw.png,backend-development 3066,2385,"Building the Backend: A guide on building the backend of your web application using Express.js and MongoDB, including creating routes, controllers, and models.","Blog Contents: Introduction to the MERN stack: An overview of the technologies and their roles in building web applications. Setting up the Development Environment: A step-by-step guide on how to set up your development environment, including installing Node.js, a code editor, and MongoDB. Building the Backend: A guide on building the backend…",https://medium.com/@salmancz/building-the-backend-a-guide-on-building-the-backend-of-your-web-application-using-express-js-9f68ef5815b4?source=topics_v2---------211-89--------------------5dbdef92_d5e6_4956_af72_c79f1ea257e3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*2yPFzWeXp5Q_GBcb,backend-development 3067,2141,Web Stack Weekly — Issue#55,"Welcome to Web weekly — a weekly newsletter on new development and updates of Web universe curated by Canopas team, delivered every Monday. Articles Docker Desktop 4.16: Better Performance and Docker Extensions GA Docker Desktop 4.16 is the first release of the new year. In this release, Docker Extensions moved from beta to GA. …",https://medium.com/canopas/web-stack-weekly-issue-55-72b01d361965?source=topics_v2---------212-89--------------------cc740fa0_dab4_49d0_8340_f83b6ac9e366-------17,https://miro.medium.com/v2/resize:fill:140:140/0*zbmaDOEUzg8xH3tZ.jpeg,backend-development 3068,2289,CLASS META- Django models,"Meta in our English oxford dictionary means self-referential - or extremely self-aware, in django whoever they are used as inner classes for model classes and are used to provide metadata about our models. this is a field used to change the behavior of our model fields. this is basically a…",https://medium.com/dev-genius/class-meta-django-models-9b9ca84d72eb?source=topics_v2---------213-89--------------------cc740fa0_dab4_49d0_8340_f83b6ac9e366-------17,https://miro.medium.com/v2/resize:fill:140:140/0*fEOg9DlqFLPeykxp.png,backend-development 3069,2386,The 2023 Backend Developer and Roadmap,"What is back-end development? : Back-end development means working on server-side software, which focuses on everything you can’t see on a website. Back-end developers ensure the website performs correctly, focusing on databases, back-end logic, application programming interface (APIs), architecture, and servers. You should have some knowledge before learning Backend Development. …",https://medium.com/@mohit-singh/the-2023-backend-developer-and-roadmap-e996e2e6ca9f?source=topics_v2---------214-89--------------------cc740fa0_dab4_49d0_8340_f83b6ac9e366-------17,https://miro.medium.com/v2/resize:fill:140:140/0*CQV5jNaJstcyW7Z-.png,backend-development 3070,2387,Unlocking the Power of Domain Driven Design in Software Development (DDD series part 1),"When it comes to software development, one of the biggest challenges is creating a system that is closely aligned with the business domain it serves. This is where Domain Driven Design (DDD) comes in. …",https://medium.com/@kisztof/unlocking-the-power-of-domain-driven-design-ddd-in-software-development-4198efc72772?source=topics_v2---------215-89--------------------cc740fa0_dab4_49d0_8340_f83b6ac9e366-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oXHuM4fVGKrbMrYxNjkzLg@2x.jpeg,backend-development 3071,2388,Thundering Herd — A Problem in Computer Science,"Problem Statement Imagine that you are peacefully sitting in a farm field. Suddenly you see a bull rushing towards you! What will you do?!!! Yes! You will run away, escape from it. All right you escaped the first one. Now imagine, a herd(a large group of bulls, maybe hundreds of them) racing…",https://medium.com/@pradeesh-kumar/thundering-herd-a-problem-in-computer-science-b4620c3c6d27?source=topics_v2---------216-89--------------------cc740fa0_dab4_49d0_8340_f83b6ac9e366-------17,https://miro.medium.com/v2/resize:fill:140:140/0*5nrL6-G8bjsOuPvH,backend-development 3072,2389,Flask Learning Tutorial :Hello world from flask,Hello welcome to the first part of this series of articles dedicated to learning the flask framework and backend development with python. In this chapter we will see together how to set up a Flask project. …,https://medium.com/@elsamatchole/flask-learning-tutorial-hello-world-from-flask-84e19af40b32?source=topics_v2---------217-89--------------------cc740fa0_dab4_49d0_8340_f83b6ac9e366-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TmhQq_GJC8pLyPpbQyQdlA.png,backend-development 3073,2381,Securing Financial Applications in Django: Best Practices and Examples,"Securing financial applications is crucial to protect sensitive information and prevent unauthorized access. Django, a popular web framework for building web applications, provides several built-in security features that help to secure financial applications. One of the most important security features in Django is its built-in support for user authentication and…",https://medium.com/@khaleel92/securing-financial-applications-in-django-best-practices-and-examples-1d89663f1846?source=topics_v2---------218-89--------------------cc740fa0_dab4_49d0_8340_f83b6ac9e366-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5RNqXtxWDEk0TBQtQf1cOg.png,backend-development 3074,2390,Exploring the Core: A Series on Understanding the Root of a Node Project — env,"Diving Deeper: Uncovering the Fundamentals of Node.js Project Configuration with env Variables In this series, we will explore the core of a Node.js project and delve deeper into the inner workings of one of the most popular JavaScript runtime environments. …",https://medium.com/javascript-in-plain-english/exploring-the-core-a-series-on-understanding-the-root-of-a-node-project-env-c5896f75e7be?source=topics_v2---------219-89--------------------cc740fa0_dab4_49d0_8340_f83b6ac9e366-------17,https://miro.medium.com/v2/resize:fill:140:140/0*8j4kjIj0G2FFIoXb,backend-development 3075,2391,Web Development 101: Front-End and Back-End Development Explained,"Web development is the process of creating and maintaining websites. It encompasses a wide range of tasks, including designing, and coding the front-end and back-end of a website, as well as developing and implementing web applications. …",https://medium.com/@theBwoyPrgrmmr/web-development-101-front-end-and-back-end-development-explained-f44bdaa91313?source=topics_v2---------220-89--------------------cc740fa0_dab4_49d0_8340_f83b6ac9e366-------17,https://miro.medium.com/v2/resize:fill:140:140/1*lCp_Yaq6uxewxTeS8z9zVw.jpeg,backend-development 3076,2392,Daily Report App,"Application development is always a time-consuming and complex process and sometimes maybe frustrating, that is why developers always looking for complete solutions that save their time and effort and are easy to manage. …",https://medium.com/@talha.developer.01/daily-report-app-eb6bd3a50b36?source=topics_v2---------221-89--------------------cc740fa0_dab4_49d0_8340_f83b6ac9e366-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pP9i7Y_rOxIhFUBDIyuYXw.jpeg,backend-development 3077,2393,Configuration Management Using Puppet: A Basic Overview,"Being a developer doesn’t make you any less of a human being than the next person. Being a human, you are bound to make costly mistakes sometimes. Unfortunately, in the world of high-performance software systems with extensive backend infrastructures and high-priced hardware, certain mistakes can be quite costly indeed. For…",https://medium.com/@chukwuemekangumoha/configuration-management-using-puppet-a-basic-overview-50604e6d8891?source=topics_v2---------222-89--------------------f8f2f5ec_6688_4787_b639_e0595e5ed5ea-------17,https://miro.medium.com/v2/resize:fill:140:140/1*SY2SYV9-LwsLS06k4oQuuQ.png,backend-development 3078,2394,Django Vs Node Js For Backend Development,In this blog we are going to compare Django Vs Node Js which is best for backend development. We will see advantages and disadvantages of both sides. I am django developer and doing full stack development from 1–2 years but i had worked with also node js and genuinely telling…,https://medium.com/@psgurav2001/django-vs-node-js-for-backend-development-ea01cff183f1?source=topics_v2---------223-89--------------------f8f2f5ec_6688_4787_b639_e0595e5ed5ea-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BoCw2hja3q2WgD0vsIG4IA.jpeg,backend-development 3079,2395,Kotlin Spring Boot Tutorial Part 2: Creating REST endpoints for a task app,"Here is a quick summary of Part 1: In the first part, we created the data layer. In the package data we have the class Task which is our entity and represents our table. Inside the data package, we have the model package which holds Priority, TaskDto and TaskRequest. Then we have the repository package where we defined…",https://medium.com/nerd-for-tech/kotlin-spring-boot-tutorial-part-2-creating-rest-endpoints-for-a-task-app-645e13950aa0?source=topics_v2---------224-89--------------------f8f2f5ec_6688_4787_b639_e0595e5ed5ea-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ojteOLRhd_jH0RCZouFJBA.jpeg,backend-development 3080,2396,MY BLOG APP,"Hello sweets and peaches ☺️, Welcome to my first blog post on my first blog app! I’ll take you through how I created a simple blog app with Node.JS, Express.JS and MANGODB🍋..oops I mean MONGODB :) You can click here to check the complete code on GitHub. CONTENT: Creating folders…",https://medium.com/@kausara931/my-blog-app-2b7b6eb5c007?source=topics_v2---------225-89--------------------f8f2f5ec_6688_4787_b639_e0595e5ed5ea-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*8Xtje_NtaPMdmft-vRhi9w.gif,backend-development 3081,2397,APIs lifecycle Management 101,Learn everything about APIs lifecycle management in our new Developer Nation workshop with @getapiwiz. In this workshop you’ll learn how to manage your APIs Lifecycle from deploying to production to monitoring their performance using state of the art tools by APIWiz. Things to learn from this workshop: About API lifecycle Best practises Using APIWiz tools Where to go from here Watch below 👇 and leave us feedback.,https://medium.com/@developernationworld/apis-lifecycle-management-101-24161c5e0ea8?source=topics_v2---------226-89--------------------f8f2f5ec_6688_4787_b639_e0595e5ed5ea-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j0dgZkCxu7vIF5UQbtKcYQ.jpeg,backend-development 3082,2141,Web Stack Weekly — Issue#54,"Welcome to Web weekly — a weekly newsletter on new development and updates of Web universe curated by Canopas team, delivered every Monday. Articles GO 1.20 CRYPTOGRAPHY The standard library is gaining a new package: crypto/ecdh. The package provides a safe, []byte-based, easy-to-use API for Elliptic Curve Diffie-Hellman over Curve25519 and NIST curves. …",https://medium.com/canopas/web-stack-weekly-issue-54-4bd30747d007?source=topics_v2---------227-89--------------------f8f2f5ec_6688_4787_b639_e0595e5ed5ea-------17,https://miro.medium.com/v2/resize:fill:140:140/0*zbmaDOEUzg8xH3tZ.jpeg,backend-development 3083,2398,Caching Menggunakan Redis,"Ketika sebuah service memiliki pengguna yang semakin banyak, proses yang harus dikerjakan akan semakin banyak, performa akan menurun, request ke database akan meningkat, dan tentunya biaya untuk mengelola juga ikut meningkat. Adakah solusi untuk masalah ini? Jawabannya adalah menggunakan Caching. Ada banyak tool caching yang bisa kita gunakan, salah satunya…",https://medium.com/dot-lab/caching-menggunakan-redis-128d49b9cf8a?source=topics_v2---------228-89--------------------f8f2f5ec_6688_4787_b639_e0595e5ed5ea-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zLvXG-ueNwOxDE5lRYsh0g.jpeg,backend-development 3084,2399,7 Repos I Wish I’d Known As A Developer Years Ago,"These are the most popular repositories that I recently discovered, and now I am sharing them with you. — I’m sure that you’ve heard of many repositories, but these are the TOP-7 most used and popular repos amongst professional developers. Repositories on GitHub is hopefully FREE to use for anyone, fortunately some developers created so helpful repos that help millions of developers to become expert.",https://medium.com/@halimshams/7-repos-i-wish-id-known-as-a-developer-years-ago-18febd46d024?source=topics_v2---------229-89--------------------f8f2f5ec_6688_4787_b639_e0595e5ed5ea-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vSRRlVWJGne6XP1e2MKavA.jpeg,backend-development 3085,2220,Introduction to Joi validation in Node.js Express,"Joi is an object schema validation library for Node.js. It allows you to create simple and complex validation schemas for your application’s data. In this tutorial, we will learn how to use Joi in a Node.js Express application to validate request body, params, and query. Setting up the project First, let’s create a new…",https://medium.com/@abbaslanbay/introduction-to-joi-validation-in-node-js-express-c33eba38f4ae?source=topics_v2---------230-89--------------------f8f2f5ec_6688_4787_b639_e0595e5ed5ea-------17,https://miro.medium.com/v2/resize:fill:140:140/1*VOGG10_elQyWEert_a0N5w.png,backend-development 3086,1457,Comparing Prisma and Mongoose,"I’ve been using mongoose with MongoDB for most of my projects for over 4-years now because of its structure, and documentation, and also because I lovesome JSON data, lol! …",https://medium.com/@ibezimchike/comparing-prisma-and-mongoose-fbc42d069c47?source=topics_v2---------231-89--------------------f8f2f5ec_6688_4787_b639_e0595e5ed5ea-------17,https://miro.medium.com/v2/resize:fill:140:140/1*n4I-OahdSaxvybXzAqrolg.png,backend-development 3087,2400,"플랫폼의 꽃, 크몽 거래서비스 MSA 전환기","안녕하세요! 크몽 Back-end 챕터 토르(Thor) 입니다! (두둥등장!!) 이번에는 크몽 플랫폼에서 거래 관련 도메인을 MSA로 전환한 프로젝트를 샤라락 말씀드리고자 합니다. Why? 크몽에서는 왜 잘 서비스 되고 있는 거래 서비스를 MSA로 전환하려할까? 크몽 서비스는 모놀리스 어플리케이션 구조가 기본으로 동작되고 …",https://medium.com/@thor_park/플랫폼의-꽃-주문-서비스-msa-전환기-c1408d51dd61?source=topics_v2---------232-89--------------------a0cb457e_a3d3_43f5_9fb4_2a02f093dc19-------17,https://miro.medium.com/v2/resize:fill:140:140/1*r0JklSYlbAMUw6dmqSmaYw.jpeg,backend-development 3088,2401,Building Web Applications with React and Python,"With code samples and examples If there is a request to develop a new project for the web, a custom software, it’s always a headache which technologies to use and so on. We will go through popular tech stack nowadays, React and Python (Flask) Introduction to React and Python React is a popular JavaScript library…",https://medium.com/cloudflex-team/building-web-applications-with-react-and-python-b707fd2fecd6?source=topics_v2---------233-89--------------------a0cb457e_a3d3_43f5_9fb4_2a02f093dc19-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Zcpsgue03vYfDx1s,backend-development 3089,2402,A step-by-step guide to building a chatbot based on your own documents with GPT,"Chatting with ChatGPT is fun and informative — I’ve been chit-chatting with it for past time and exploring some new ideas to learn. But these are more casual use cases and the novelty can quickly wean off, especially when you realize that it can generate hallucinations. How might we use…",https://medium.com/design-bootcamp/a-step-by-step-guide-to-building-a-chatbot-based-on-your-own-documents-with-gpt-2d550534eea5?source=topics_v2---------0-84--------------------95df1f34_6dd9_4ceb_8f95_61f6f97dc92f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Zi85PvOv8tpaB4SvpTRlHw.png,ai 3090,2403,5 Little Known Ways to use AI & ChatGPT to Earn Extra Income Online,"AI is cool when it can earn you money! So, AI is cool. (Duh.) But — what’s even cooler is when it helps you generate extra income. ChatGPT has been the new kid on the block for all of 5 months, and people are already using ChatGPT (and AI tools…",https://medium.com/@davidowasi/5-little-known-ways-to-use-ai-chatgpt-to-earn-extra-income-online-2c7772af4584?source=topics_v2---------1-84--------------------95df1f34_6dd9_4ceb_8f95_61f6f97dc92f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*RajzNkGYPWU9-Ly4,ai 3091,35,18 Ways I’m Using AI to Make Money in 2023,"Some doubled my income last year Have you ever wondered how to make money using artificial intelligence? As we are deep into 2023, the world of AI is expanding faster than ever, and the potential to use it to generate income is endless. In this article, I’ll be discussing eighteen…",https://medium.com/@endasheridan/18-ways-im-using-ai-to-make-money-in-2023-ca3a07c49ee4?source=topics_v2---------2-84--------------------95df1f34_6dd9_4ceb_8f95_61f6f97dc92f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*irsTkVO6r1oRdQyn,ai 3092,2404,Egyptians in AI Research,From Research Labs to Dinner Tables ChatGPT has brought the topic of Artificial Intelligence (AI) from research labs to the dinner table. I found myself discussing the work I have been doing with relatives of mine and friends who don’t know the first thing about AI. I actually realized that some of them don’t even know…,https://medium.com/@bkhmsi/egyptians-in-ai-research-1ff64c78cc5b?source=topics_v2---------3-84--------------------95df1f34_6dd9_4ceb_8f95_61f6f97dc92f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*b1cqTgTqFAbU6v8A.png,ai 3093,2405,"Siri Got a Massive Upgrade, Thanks ChatGPT!","You’ve seen the news, new generative AI models, ChatGPT… ChatGPT integration with Bing (goodbye Google?). What about iOS Siri? iOS shortcuts have been around for some time, and HTTP requests are nothing new. …",https://medium.com/@bin2ai/siri-got-a-massive-upgrade-thanks-chatgpt-830128f0f2fc?source=topics_v2---------4-84--------------------95df1f34_6dd9_4ceb_8f95_61f6f97dc92f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*z0ptyhgmirgKqgjd7WlXJQ.png,ai 3094,2406,GPT-4: Microsoft Will Launch ChatGPT 4.0 in the coming week,"GPT-4 will be released “next week,” Microsoft Germany’s CTO, Andreas Braun, has announced, sparking excitement in the artificial intelligence (AI) community. According to Braun, “We will introduce GPT-4 next week … we will have multimodal models that will offer completely different possibilities — for example, videos.” What We Can Expect…",https://medium.com/blocship/gpt-4-microsoft-will-launch-chatgpt-4-0-in-the-coming-week-84fe62f0adf7?source=topics_v2---------5-84--------------------95df1f34_6dd9_4ceb_8f95_61f6f97dc92f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*I1NxAraIne7fDXj8NKGe8Q.jpeg,ai 3095,2407,Meet Our Fleet,"Nuro is known in the autonomous vehicle industry for our custom vehicles, which are zero-emission, purpose-built for goods delivery, and prioritize road safety above all else. At any given time, we have multiple vehicles on the roads, all playing different roles from mapping a neighborhood to testing our autonomy system…",https://medium.com/nuro/meet-our-fleet-1364aea6be98?source=topics_v2---------6-84--------------------95df1f34_6dd9_4ceb_8f95_61f6f97dc92f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*yW4CxkOh7eVUQoy2,ai 3096,2408,A UI design critique of the AI tools in Microsoft Designer,"Microsoft’s new design tool emphasises generative AI. How good is its UI? — Microsoft Designer is a new web app for visual designs. Examples include creating posters, cards and visual posts for social media. Its presentation heavily emphasizes new AI features, which mainly generate layouts and images. How good is its UI? I closely follow the current surge of such AI tools, as…",https://medium.com/user-experience-design-1/a-ui-design-critique-of-the-ai-tools-in-microsoft-designer-a1a20228ac38?source=topics_v2---------7-84--------------------95df1f34_6dd9_4ceb_8f95_61f6f97dc92f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*XLaICG2gkkXd8bsaoPiakg.png,ai 3097,1018,ChatGPT in Apple Notes,"ChatGPT and similar technologies are actively being integrated into both new and existing applications, bringing the benefits of AI closer to the tools we use in our everyday lives. One of the more popular note-taking apps, and one that I use myself regularly, is Apple Notes. Its popularity comes from…",https://medium.com/itnext/chatgpt-in-apple-notes-55700c631847?source=topics_v2---------8-84--------------------95df1f34_6dd9_4ceb_8f95_61f6f97dc92f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pbCFZYMxZwEY6wgqm1kWEA.png,ai 3098,2409,You Lose Readers in 15 Seconds If You’re Making These 3 Mistakes,"The author and critic, Charles Finch, says this about amateur writers: “To me, the single biggest mark of the amateur writer is a sense of hurry.” Wanting to achieve more in less time is natural. …",https://medium.com/@dariusforoux/you-lose-readers-in-15-seconds-if-youre-making-these-3-mistakes-792115dc9c89?source=topics_v2---------9-84--------------------95df1f34_6dd9_4ceb_8f95_61f6f97dc92f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*UcnBoV04YkFKyIBDVuZ2nA.png,ai 3099,1202,ChatGPT is just the beginning: text assistants are going to get very personal,"Grammarly, an interesting company with Ukranian roots that has been helping people (including many of my students at IE University who come from all corners of the world and speak, in many cases, English as a second language) to write correctly in English for almost 14 years, has just introduced…",https://medium.com/enrique-dans/chatgpt-is-just-the-beginning-text-assistants-are-going-to-get-very-personal-5aa3c75a2a2b?source=topics_v2---------10-84--------------------882ac8c6_3543_4f90_b24b_2423bd95621a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xPV-r7Lr6orPUt61uIiXPQ.jpeg,ai 3100,2410,Run ControlNet on Windows 11,"Recently ControlNet got a lot of popularity in the open-source community. I am interested in running it on my Windows 11 workstation via the StableDiffusion. This article assumes we have already setup the StableDiffusion libary on the workstation. If you haven’t yet, don’t worry, you can find a step-by-step guide…",https://medium.com/@tylerzhu/run-controlnet-on-windows-11-1463d2a2b4ad?source=topics_v2---------11-84--------------------882ac8c6_3543_4f90_b24b_2423bd95621a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*SVS6HstvdNDDrMSf,ai 3101,2411,Why I believe AI will bring more opportunities than job losses,"Let’s face the truth AI can produce human-like(even better 😲) output not only in data-intensive but in creative fields like business, design and marketing. It can ideate creatively and restructure based on the context. Having said that here are a few reasons your job is secure (though its nature might…",https://medium.com/@uxnimisha/wtf-ai-5b6c0e23ec63?source=topics_v2---------12-84--------------------882ac8c6_3543_4f90_b24b_2423bd95621a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*A704DTprJ8mJ3sCadHuEOA.png,ai 3102,138,The Future Of Prompt Engineering,"The Magic Of Communicating With AI — The term ‘Prompt Engineering’ in its purest sense means this: The ability to talk to AI software. It refers to communicating with AI systems and computers by using natural human language, such as English, to make them respond to some specific action or task. While the concept may seem straightforward…",https://medium.com/predict/the-future-of-prompt-engineering-82d426430fb6?source=topics_v2---------13-84--------------------882ac8c6_3543_4f90_b24b_2423bd95621a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_CaZpvnwq0L5BQCicYzXgg.png,ai 3103,2412,17 AI tools that will make your life easier,"There are AI tools that can help with many issues. And recently, AI tools have been on the agenda. In this article, I will talk about some AI tools that will make it easier for us to do our work on different subjects. To avoid confusion, I will categorize and…",https://medium.com/@canankorkut1/17-ai-tools-that-will-make-your-life-easier-c9134f06e5fd?source=topics_v2---------14-84--------------------882ac8c6_3543_4f90_b24b_2423bd95621a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*bROpXG20zPSumnKayZFblA.jpeg,ai 3104,2413,10 AI Tools Revolutionizing the Future,"Artificial Intelligence (AI) has come a long way since its inception. From speech recognition to image classification, AI has found its way into many industries, and its potential seems limitless. Today, AI tools are revolutionizing the future, making tasks more efficient and accurate while saving time and resources. In this…",https://medium.com/@insanity-eth/10-ai-tools-revolutionizing-the-future-39dc9cf56e1?source=topics_v2---------15-84--------------------882ac8c6_3543_4f90_b24b_2423bd95621a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*UGPopYhYwazh-YvL,ai 3105,2414,"ChatGPT describes, Midjourney draws","An AI experiment with surprising results — Like everyone else, I recently got caught in the “AI hype”. I call it “hype” for now because while I do believe this thing will change the way we interact and live with technology, I also think that this is just the beginning, and with beginnings comes a lot of…",https://medium.com/user-experience-design-1/chatgpt-describes-midjourney-draws-fec290772a50?source=topics_v2---------16-84--------------------882ac8c6_3543_4f90_b24b_2423bd95621a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*x2X9L37Zsf9wJrWlpZKqyw.jpeg,ai 3106,2415,What is AGI? What OpenAI plans for AGI?,"Hope, Fear, and the Unknown — OpenAI and ChatGPT have covered enough digital space already, so it's time we also take a peek at their future plans. For AI Rookies Non-IT folks have a tendency to think of everything related to IT as one collective entity, but as insiders, we know that it couldn’t be any further from the…",https://medium.com/illumination/what-is-agi-what-openai-plans-for-agi-1b1fa67fdec3?source=topics_v2---------17-84--------------------882ac8c6_3543_4f90_b24b_2423bd95621a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Zn5OQsS8bqir06F1,ai 3107,2416,ChatGPT 4 Will Change the way we use the internet: here’s how.,"If you’re reading this article, I’m sure you must have heard or known about ChatGpt, a chatbot created by Open Ai. But if not, here’s a brief explanation of what it is and what it can do: “ChatGPT is an AI-powered chatbot that can understand natural language and respond to…",https://medium.com/@denrichy121/chat-gpt4-will-change-the-way-we-use-the-internet-heres-how-fa394599c70f?source=topics_v2---------18-84--------------------882ac8c6_3543_4f90_b24b_2423bd95621a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*2gtBdwEkweDitC4y9PTl3w.png,ai 3108,2417,The golden age of trash content creation,"For the last three months, ChatGPT, a simple AI text generator from OpenAI, has brought awareness about how Artificial Intelligence is making a huge impact on our daily life and what we will experience during the next five years. Since the launch of ChatGPT, a new industrial era has started…",https://medium.com/@m1n1mal.codes/the-golden-age-of-trash-content-creation-1ad480c847d1?source=topics_v2---------19-84--------------------882ac8c6_3543_4f90_b24b_2423bd95621a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*GPvJ61oCEGU3dlh8r67xYw.png,ai 3109,1672,How to load a large dataset during Training in Tensorflow efficiently?,"Deep learning has revolutionized the world of machine learning and Tensorflow has emerged as a popular platform for creating and training deep learning models. However, the size of the datasets used for training can pose a significant challenge. Limited resources make it difficult to load the entire dataset into memory…",https://medium.com/@adityamangal98/how-to-load-a-large-dataset-during-training-in-tensorflow-efficiently-c0d4d898b86a?source=topics_v2---------20-84--------------------60ddfbe6_6767_42db_ae83_e33112c31c4a-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/0*y3L6iicHAAkCQBh6.gif,ai 3110,2418,AI and The Genie of Aladdin’s Lamp,"Why AI Can’t Match Human Thinking (Yet) — As technology continues to advance, we are witnessing a significant rise in the use of artificial intelligence, AI, in various fields. From self-driving cars, to giving us advice on which Netflix show we may like, to medical diagnosis, AI has undoubtedly made our lives easier in many ways. …",https://medium.com/@karlozduarte/ai-and-the-genie-of-alladins-lamp-73cc83d54dda?source=topics_v2---------21-84--------------------60ddfbe6_6767_42db_ae83_e33112c31c4a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*aBXJlaRHLFJwlqG4bLBkJA.jpeg,ai 3111,2419,Using AI in UX research: a structured and ethical approach,"A structured approach for assessing the ethical & effective use of AI in UX Research — Since November of last year, ChatGPT has dominated the zeitgeist in innovation, reaching 100 million users in record time. That excitement also extended to the research and design communities. By our count, since ChatGPT’s release, the tool itself or the topic of…",https://medium.com/user-experience-design-1/using-ai-in-ux-research-a-structured-and-ethical-approach-499c7d13a00d?source=topics_v2---------22-84--------------------60ddfbe6_6767_42db_ae83_e33112c31c4a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*XzXIEkB1UF919yMG.png,ai 3112,2420,ChatGPT — The Final Onslaught,"The day had finally arrived. The Uber driver who was ferrying me halfway across the city asked me whether I had heard about ChatGPT and what it was all about. I knew then that the clock had just struck midnight, not sure though who had gotten their freedom. It’s as…",https://medium.com/predict/chatgpt-the-final-onslaught-aedc9916b70b?source=topics_v2---------23-84--------------------60ddfbe6_6767_42db_ae83_e33112c31c4a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*T3yIErX6BlJcHcKv,ai 3113,2421,World of Data Science Platforms,"When you hear the term “Data Science,” what is the initial thought that comes to your mind? Perhaps, it’s a dynamic holographic display featuring enigmatic images, programming, and algorithms. However, this perception is only partially accurate as some aspects, like flashing numbers on screens, do exist in reality. The discipline…",https://medium.com/@shubham-99583/world-of-data-science-platforms-c8fbe3fd1f53?source=topics_v2---------24-84--------------------60ddfbe6_6767_42db_ae83_e33112c31c4a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*TAWEq73-IRlJC-fU.jpeg,ai 3114,2422,The AI hype bubble is the new crypto hype bubble,"Someday, we’re gonna feel pretty silly about our autocomplete worship. — Today (Mar 9), you can catch me in person in Austin at the UT School of Design and Creative Technologies, and remotely at U Manitoba’s Ethics of Emerging Tech Lecture. Tomorrow (Mar 10), Rebecca Giblin and I kick off the SXSW reading series. Back in 2017 Long Island Ice Tea…",https://medium.com/@doctorow/the-ai-hype-bubble-is-the-new-crypto-hype-bubble-74e53028631e?source=topics_v2---------25-84--------------------60ddfbe6_6767_42db_ae83_e33112c31c4a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*aG2GG56d_C6DJnGzZn0d3Q.jpeg,ai 3115,2423,Co-Creation Session Explores AI Solutions for Conservation in Northern Uganda,"To commemorate Open Data Day, Amara Hub convened a co-creation session to discuss the use of Artificial Intelligence (AI) in conservation efforts in Northern Uganda. The session was attended by a diverse spectrum of participants from Uganda Wildlife Authority, Africa Wildlife Federation, Uganda Conservation Foundation, Unwanted Witness along with conservation…",https://medium.com/@amarahub/exploring-ai-solutions-for-conservation-in-northern-uganda-f120dbe543e9?source=topics_v2---------26-84--------------------60ddfbe6_6767_42db_ae83_e33112c31c4a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*alWRGlIfdSG6aKB1lCf89g.png,ai 3116,2424,GPT-3 is going to be obsolete?,"The World Will Change NEXT WEEK… GPT-4, which is 500 times more powerful than the current #ChatGPT, will be released next week. The current version of ChatGPT is built on GPT 3.5 with 175 Billion Machine Learning Parameters. But GPT-4 has 100 TRILLION ML PARAMETERS. GPT-4 will be able to process multiple types of data, including Videos, Images, Sounds, Numbers, etc. By next week, you will be able to use artificial intelligence to write a movie script, use AI to generate actors for the movie, produce the movie, and take it to the public without hiring real-life actors.",https://medium.com/@free-thinker/gpt-3-is-going-to-be-obsolete-2980c34c0120?source=topics_v2---------27-84--------------------60ddfbe6_6767_42db_ae83_e33112c31c4a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-iHmnWOhmLkR1aF2L-W76Q.png,ai 3117,2425,Imagining a Playful Future: The Symbiosis between Creativity and AI,"In this time where information is laid out for us at the click of a button, it is so easy to have a narrow and anxious mindset when it comes to accepting the big technological changes and advances in our lives. With the emergence of AI technologies like DALL E…",https://medium.com/@sophiehkw/imagining-a-playful-future-the-symbiosis-of-creativity-and-ai-7e07f8ce0ec6?source=topics_v2---------28-84--------------------60ddfbe6_6767_42db_ae83_e33112c31c4a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OmT8rRPw8ROxWnwZ79dK2Q.png,ai 3118,2426,How Microsoft encourages business adoption of ChatGPT,Microsoft stated in January that the ChatGPT AI chatbot would be added to the Azure OpenAI service. The business has stated that ChatGPT is available in preview in Azure OpenAI Service and that it would enable developers in “innovating in new ways” about six weeks after the launch. With the…,https://medium.com/@kashyapshreyash826/how-microsoft-encourages-business-adoption-of-chatgpt-9c62ef5108b3?source=topics_v2---------29-84--------------------60ddfbe6_6767_42db_ae83_e33112c31c4a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*m5V6iqrNpXmqKH82,ai 3119,1085,6 Mind-Blowing AI Tools to Try in 2023,"Leverage the Power of AI to Save You Time at Work and Home — Artificial intelligence (AI) has revolutionised the way we work and live. With AI-powered tools, we can automate many tasks and make our lives easier. In this article, we will explore six AI tools that you can try in 2023. 11 Labs 11 Labs is a text-to-speech software that produces realistic…",https://medium.com/@life2/6-mind-blowing-ai-tools-to-try-in-2023-b54d7b7b87d5?source=topics_v2---------30-84--------------------b2522210_148c_4d82_b320_4acb4f14aca2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ecA9wvf4TDI7C6e9,ai 3120,2427,Future of Podcasting and Music: AI Will Make It Personal,"Every few years there is a digital goldrush, a business buzzword that makes front covers and clickbait headlines that ‘THIS WILL BE THE END OF X!’. A few years ago it was blockchain and NFT that was going to ‘change everything’ — your neighbourhood bearded Cassandra knew it would not…",https://medium.com/@timbakker_59057/future-of-podcasting-and-music-ai-will-make-it-personal-cbbf8b1bdc41?source=topics_v2---------31-84--------------------b2522210_148c_4d82_b320_4acb4f14aca2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*sZXhbUM-7iAEFs3bmAPlOw.jpeg,ai 3121,2428,ChatGPT: The Revolutionary AI-Language Model Taking the World by Storm,"Have you heard of ChatGPT? It’s one of the most talked-about topics right now, and it’s only been a week since its release. People’s minds are being blown by what it can do, and it’s breaking records with over 1 million users signed up in just 5 days — faster than Netflix, Twitter, Facebook, and…",https://medium.com/@rabuhan87/chatgpt-the-revolutionary-ai-language-model-taking-the-world-by-storm-bef18cc79aa2?source=topics_v2---------32-84--------------------b2522210_148c_4d82_b320_4acb4f14aca2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0pOrP7DLVz9WugOaVQhTZQ.jpeg,ai 3122,2429,Advancing AI to eliminate trial and error in medicine (Healthcare),"As a data scientist, I have for-seen the incredible power of AI in solving complex problems and transforming lives in seconds, AI has the potential of transforming MEDICINE. The current state of healthcare is far from been at its peak (Perfect) due to the overwhelming tasks on Doctors and Nurses…",https://medium.com/@michaeledekin/advancing-ai-to-eliminate-trial-and-error-in-medicine-healthcare-e47dab581fda?source=topics_v2---------33-84--------------------b2522210_148c_4d82_b320_4acb4f14aca2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*uBA-cthVMzz-B_fkkyOiTA.jpeg,ai 3123,1033,The Powerful Writing Tool That’s Superior to ChatGPT,"A lifesaver for content creators — If you hate artificial intelligence, and the use of ChatGPT, then this article might not be for you. However, if you love to discover new possibilities fostered by AI, then this is for you. Before heading toward the tool, I want to say that the most superior tool is obviously…",https://medium.com/@TheWealthBlog/the-powerful-writing-tool-thats-superior-to-chatgpt-9ef28b626a53?source=topics_v2---------34-84--------------------b2522210_148c_4d82_b320_4acb4f14aca2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*HyoeCJXPX0-QPBXm,ai 3124,2430,The technology trends we will see in 2023,"With technology expanding at a rapid pace, there are several key trends that will shape the corporate landscape in the years to come. …",https://medium.com/@ronibatra345/the-technology-trends-we-will-see-in-2023-f23ce7617a96?source=topics_v2---------35-84--------------------b2522210_148c_4d82_b320_4acb4f14aca2-------17,https://miro.medium.com/v2/resize:fill:140:140/0*RVTgut39LsbEH5Tf.jpg,ai 3125,2431,Unleashing the Power of ChatGPT for Advanced Writing,"I created https://cyrusalcala.com/ai.html for AI Prompts, a compiled list of prompts that can be copy-pasted to ChatGPT for them to work. Are you tired of struggling to come up with unique writing prompts and formulas? Look no further than ChatGPT, the true superpower of writing. With a few simple tips…",https://medium.com/@cyalcala7/unleashing-the-power-of-chatgpt-for-advanced-writing-691ad2f5c643?source=topics_v2---------36-84--------------------b2522210_148c_4d82_b320_4acb4f14aca2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3126,2432,Mastering the Art of Prompting ChatGPT: Strategies for Enhancing AI Output,"In the era of rapid technological advancements, Artificial Intelligence (AI) has become an indispensable tool for accomplishing a variety of tasks with efficiency and accuracy. Among the plethora of AI language models available, ChatGPT stands out as a highly advanced and sophisticated system capable of generating human-like responses to various…",https://medium.com/@unorganizedchaoscreatives/mastering-the-art-of-prompting-chatgpt-strategies-for-enhancing-ai-output-b1510d5b0553?source=topics_v2---------37-84--------------------b2522210_148c_4d82_b320_4acb4f14aca2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7SC1D4avI8C3OOqGjuA3Vw.png,ai 3127,1251,Awesome chatGPT prompts — Part 12,"As we continue our journey exploring the diverse and interesting prompts of ChatGPT, we arrive at part-12 of the ongoing “Awesome ChatGPT Prompts” series. In this part, I will take you through ten different roles that ChatGPT can take on, ranging from providing synonym suggestions to designing SVG graphics. With…",https://medium.com/@smraiyyan/awesome-chatgpt-prompts-part-12-11fe6dc9b7a7?source=topics_v2---------38-84--------------------b2522210_148c_4d82_b320_4acb4f14aca2-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*LF_omXwwTYODQIkh_2ZIHg.gif,ai 3128,2433,Artificial Stupidity,"Just in case AI is coming for us all — “There goes my job”, “We’re all getting reamed a new one by AI” — those reactions, albeit rather extreme, were quite common after the people got some time to play with ChatGPT. No wonder, it seemed it could write essays with ease, answer questions profoundly and, in general terms, outperformed…",https://medium.com/@macweazle/artificial-stupidity-8d1d78dea873?source=topics_v2---------39-84--------------------b2522210_148c_4d82_b320_4acb4f14aca2-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3129,2434,WONDER DYNAMICS — Poised to Revolutionize Animation and VFX Industry,"Visual effects and animation have always been necessary in the field of filmmaking and video production because they can improve storytelling and draw viewers closer to the characters and the plot. This has historically been a time-consuming, expensive procedure requiring specialist knowledge, equipment, and software. …",https://medium.com/@dhevg20020402/wonder-dynamics-poised-to-revolutionize-animation-and-vfx-industry-7bdeb66ac3fd?source=topics_v2---------40-84--------------------ed4e4ec1_f59c_49c1_a9a9_d7664e91306b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*UIKnsj94NkobDnpTx77Ygw.jpeg,ai 3130,2435,Why Educators Need to Embrace AI,"Welcome to the Revolution! The herd of cats is out of the bag and you won’t get them back in, so it’s time for you to stop worrying that AI is going to gut your students’ ability to write, enable rampant cheating, and destroy student motivation. The truth is you…",https://medium.com/@7thsentinelgames/why-educators-need-to-embrace-ai-b2d661605db9?source=topics_v2---------41-84--------------------ed4e4ec1_f59c_49c1_a9a9_d7664e91306b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3131,2436,Understanding Learning Rate Decay,"Optimization algorithms play a crucial role in training machine learning models. One of the key hyperparameters that impact the performance of these algorithms is the learning rate. The learning rate determines how much the weights of the model are updated with each iteration. However, keeping the same learning rate throughout…",https://medium.com/@ahmettsdmr1312/understanding-learning-rate-decay-e9a39c4edea7?source=topics_v2---------42-84--------------------ed4e4ec1_f59c_49c1_a9a9_d7664e91306b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*uWruvF-tA7bUpYMNqnQNxQ.png,ai 3132,2437,Artificial Empathy: How to Use AI to Fake Emotions in Your Communication,"Are you a sociopath who doesn’t know how to humanly communicate with other people and who is not able to use empathy when you express your thoughts? Well, that’s the right guide for you, today I will show you how you can utilize AI to fake emotions. As of now…",https://medium.com/@ozezlus/artificial-empathy-how-to-use-ai-to-fake-emotions-in-your-communication-74bb6cc046ad?source=topics_v2---------43-84--------------------ed4e4ec1_f59c_49c1_a9a9_d7664e91306b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*RwCSDFdrr2MQhV7-nnGurQ.png,ai 3133,2438,What DALL-E 2 is capable of and not,"I started exploring DALL-E 2 a week ago and have since spent countless hours testing its features and generating various artworks. My goal was to assess its performance across different domains and produce impressive visual pieces. As a result, I’ve compiled a list of my observations on DALL-E for which…",https://medium.com/@yashashreepatel/what-dall-e-2-is-capable-of-and-not-e731311e9b6a?source=topics_v2---------44-84--------------------ed4e4ec1_f59c_49c1_a9a9_d7664e91306b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JRZej8HBFuK4OemXcchJrQ.png,ai 3134,2439,Ocean Protocol Update || 2023,"What We’re Doing in 2023, and Why — Contents 1. Abstract 2. Introduction 3. Dapp Developers served by team Eagle-Rays (Stream 1) 4. Data Scientists served by team Thresher (Stream 2) 5. Crypto-Enthusiasts served by team Sailfish (Stream 3) 6. Conclusion 1. Abstract Ocean was founded to create the building blocks and tools to unleash an open, permissionless and secure…",https://medium.com/oceanprotocol/ocean-protocol-update-2023-44ed14510051?source=topics_v2---------45-84--------------------ed4e4ec1_f59c_49c1_a9a9_d7664e91306b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*_pc28oG4NDrrMwDR,ai 3135,2440,G2Net: Unlocking the Secrets of the Universe,"Introduction Do you want to be a part of a groundbreaking discovery in astrophysics and astronomy? Are you looking for a chance to contribute to cutting-edge research and hone your data science skills? If you answered yes to both questions, then the G2Net Detecting Continuous Gravitational Waves Kaggle competition is for…",https://medium.com/@chirag6891/g2net-unlocking-the-secrets-of-the-universe-6a17baa6c756?source=topics_v2---------46-84--------------------ed4e4ec1_f59c_49c1_a9a9_d7664e91306b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*APCkYNfktjQ21Aa6ivOu2A.jpeg,ai 3136,2441,How To Build a ChatBot For Your Own Business Ft. ChatGPT,"In recent years, chatbots have become a popular tool for businesses to improve customer service, automate tasks, and increase efficiency. Chatbots can communicate with customers in a conversational manner, answering questions, providing support, and guiding them through the sales funnel. With advancements in natural language processing (NLP) and machine learning…",https://medium.com/@moalsaedi/how-to-build-a-chatbot-for-your-own-business-ft-chatgpt-665149afe283?source=topics_v2---------47-84--------------------ed4e4ec1_f59c_49c1_a9a9_d7664e91306b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*usFYZtnS_R4QML5z,ai 3137,2442,The Use of ChatGPT in Programming,The Use of ChatGPT in Programming Chuhao Wang 2023/3/11 ChatGPT is an artificial intelligence language model released by OpenAI in late 2022 and has become a “game changer” for users in different areas. ChatGPT processes natural language and generates responses based on a vast text dataset. Its unique human-like response mode and a wide range of…,https://medium.com/@cwang56/the-use-of-chatgpt-in-programming-65230c156798?source=topics_v2---------48-84--------------------ed4e4ec1_f59c_49c1_a9a9_d7664e91306b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1iYI0HudHcezjFVnYVnLdg.png,ai 3138,2443,Wonder Studio Is A Stunning New AI Tool That May Revolutionize CGI — And Filmmaking,"Wonder Dynamics, a VFX AI start-up, has unveiled their new too called Wonder Studio and it looks pretty wild. Check out the demo: The software eliminates the need for actors to wear motion capture (MoCap) suits, and promises to automate 80% to 90% of “objective” VFX tasks, while leaving…",https://medium.com/@aiamprompts/wonder-studio-is-a-stunning-new-ai-tool-that-may-revolutionize-cgi-and-filmmaking-f93e66345c7c?source=topics_v2---------49-84--------------------ed4e4ec1_f59c_49c1_a9a9_d7664e91306b-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*cSkIA7A10_Ih-8DQz_cCXw.gif,ai 3139,2430,"Meta’s AI (LLaMa) has been leaked, now what?","What does this mean for ChatGPT and for us — Artificial intelligence (AI) has become increasingly prevalent in our lives, with systems such as OpenAI’s ChatGPT gaining attention for their ability to generate fluent text. However, when it comes to mathematical reasoning, these large language models (LLMs) often struggle. While they may occasionally get the right answer, they more frequently…",https://medium.com/@ronibatra345/metas-ai-llama-has-been-leaked-now-what-684925917c8b?source=topics_v2---------50-84--------------------a79804a4_6f08_4f6a_8099_5d9ab167422b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*18KzH5uW8SxxO7lM,ai 3140,2444,Quartic Roots-It’s All Done With Quadratics,A Visually Instructive Solution Without Too Much Math — This post presents a novel method of calculating approximate roots of Quartics y=x⁴+Cx²+Dx+E by exploiting underlying Quadratic genetics. It adds to the availability of graphical root solutions by exploiting the close relationships between Quartics’ Quadratic factors Inflection Points Ip(x) values and those of genetic Big W functions which are very…,https://medium.com/cantors-paradise/quartic-roots-its-all-done-with-quadratics-1272a5ab5d92?source=topics_v2---------51-84--------------------a79804a4_6f08_4f6a_8099_5d9ab167422b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CYQdHpa4HTNj15fcguJPTw.png,ai 3141,159,Using AI to Generate Art: An Introduction to Google’s DeepDream Algorithm,"Artificial intelligence is a powerful tool that is changing the way we create and experience art. One example of this is Google’s DeepDream algorithm, which uses machine learning to generate surreal and abstract images. In this article, we’ll introduce you to DeepDream and show you how it works. What is DeepDream? DeepDream is…",https://medium.com/@abhishekmishra13k/using-ai-to-generate-art-an-introduction-to-googles-deepdream-algorithm-b71972b87b95?source=topics_v2---------52-84--------------------a79804a4_6f08_4f6a_8099_5d9ab167422b-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*abIP_MzCNWrfbXpPXP1l7Q.gif,ai 3142,2445,These AI Tools Will Blow Your Mind,Do things smarter not harder with innovative AI tools It is evident that the incorporation of cutting-edge technology solutions will play a significant role in the future of many industries given the rapid speed of technological growth. The emergence of artificial intelligence (AI) is one of the most fascinating and…,https://medium.com/geekculture/these-ai-tools-will-blow-your-mind-ee40ca6e4e21?source=topics_v2---------53-84--------------------a79804a4_6f08_4f6a_8099_5d9ab167422b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*16hL45oXsaPstFRupBVqyA.png,ai 3143,2446,The books beside my digital bed,"In progress — Feb/Mar 2023 💜 — Well, we’re in the neighbourhood of International Women’s Day and I’m tipping a hat to my favourite 13th century poet. Bless you Dante, for you cannot be accused of not having given women a starring role in you magical mystery murder suspense thriller Divine Comedy. Hollywood and the wider music…",https://medium.com/@raviagarwal340/the-books-beside-my-digital-bed-80b773114143?source=topics_v2---------54-84--------------------a79804a4_6f08_4f6a_8099_5d9ab167422b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*h1M7NMoZwlZeX1ammcQbpg.jpeg,ai 3144,2447,Pre-Crime Babies: A Dystopian Future Where Infants are Arrested for Crimes They Haven’t Yet Committed,"Exploring the Implications of a Society Ruled by Predictive Justice and Advanced Technologies — In a future society ruled by predictive justice and advanced technologies, newborn babies are immediately arrested for crimes they are predicted to commit in the future. This dystopian scenario is not as far-fetched as it may seem, as the increasing use of predictive algorithms and AI systems is already raising…",https://medium.com/illumination/pre-crime-babies-a-dystopian-future-where-infants-are-arrested-for-crimes-they-havent-yet-e229748f048c?source=topics_v2---------55-84--------------------a79804a4_6f08_4f6a_8099_5d9ab167422b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*8znNaGLlL5vRjMwC,ai 3145,158,20+ Incredible MidJourney Prompts That Will Blow Your Mind,Learn stunning Midjourney prompts to generate amazing AI arts — Working with Midjourney AI is an incredibly exciting experience. It has limitless potential! Crafting creative yet specific prompts has become an entire art form in itself. …,https://medium.com/design-bootcamp/20-incredible-midjourney-prompts-that-will-blow-your-mind-3de1d1d4b7ce?source=topics_v2---------56-84--------------------a79804a4_6f08_4f6a_8099_5d9ab167422b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rVoKA4hs-u8ulIkonngcFw.png,ai 3146,2448,Pro’s and Con’s of AI,"Artificial intelligence (AI) is a rapidly growing field that has the potential to revolutionize many industries. AI systems are designed to perform tasks that typically require human intelligence, such as understanding natural language, recognizing images, and making predictions based on data. While AI has many benefits, there are also concerns…",https://medium.com/@the-ai-article-project/pros-and-con-s-of-ai-6614313f0bb8?source=topics_v2---------57-84--------------------a79804a4_6f08_4f6a_8099_5d9ab167422b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WUrWMurLSe-xH2Qa,ai 3147,2449,Say Goodbye to PowerPoint!,"For decades, we have relied on PowerPoint as a go-to tool for creating and delivering visual presentations in various settings, including business meetings, lectures, and public speaking events. Although PowerPoint has some limitations, such as overuse and lack of interactivity. With the advent of artificial intelligence, people are seeking more…",https://medium.com/@lilacy/say-goodbye-to-powerpoint-6c614820953d?source=topics_v2---------58-84--------------------a79804a4_6f08_4f6a_8099_5d9ab167422b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*VHc2exVm6t7yFn2cOIjzVA.png,ai 3148,2450,5 Uses ChatGPT on Cloud Computing,Check out the details. ChatGPT on Cloud Computing Use Cases You can benefit from new prospects if you integrate ChatGPT into your cloud-based workflows. Below are a few use case illustrations. More than only text generation is automated by ChatGPT. The AI chatbot has the ability to write code and…,https://medium.com/@mohitpattel/5-uses-chatgpt-on-cloud-computing-2f9966c89e49?source=topics_v2---------59-84--------------------a79804a4_6f08_4f6a_8099_5d9ab167422b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*iJ0B8ECQ06wW5TUaiTapyQ.png,ai 3149,2451,Unique Traditional Art VS Soaring AI Drawing,"Traditional art techniques and AI drawings are two distinct methods of creating art, each with their own unique characteristics and advantages. In this article, we will discuss the differences between traditional art techniques and AI drawings. Creativity and Intuition One of the most significant differences between traditional art techniques and AI drawings is…",https://medium.com/zentangle-art-and-more/unique-traditional-art-vs-soaring-ai-drawing-a60117e0647d?source=topics_v2---------60-84--------------------bf362680_3ea0_4747_a722_177edaa5b8f4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*y-2LbRIjpHU4u2DC,ai 3150,2452,How To Make Money Using ChatGPT,"How Do I Get Started? Getting started with ChatGPT is easy! Here’s what you need to do: Find a platform that integrates ChatGPT: There are a variety of platforms that allow you to interact with ChatGPT, including chatbots, messaging apps, and websites. Some popular examples include GPT-3 Playground, Hugging Face…",https://medium.com/@alyssaweakley/how-to-make-money-using-chatgpt-ace131ecc301?source=topics_v2---------61-84--------------------bf362680_3ea0_4747_a722_177edaa5b8f4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*0KenQ1n_vg-8tKw1,ai 3151,2453,How to not call everything just ‘AI’: A business communication cheat sheet,"Specific terms like computer vision, natural language processing, generative AI and predictive analytics make more sense than calling everything just 'AI’. In recent months it started to feel that the term AI is too broad and overused to explain what underlying technology we are talking about. Here is what I…",https://medium.com/@dhafnar/the-term-ai-is-not-specific-enough-anymore-here-is-how-to-break-it-down-ee4484303e14?source=topics_v2---------62-84--------------------bf362680_3ea0_4747_a722_177edaa5b8f4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*P15xtc747b7UU-ju05X3tQ.png,ai 3152,2454,AI HORROR STORY!!,"Once upon a time, the AI system was efficiently and precisely carrying out its programmed tasks despite the stormy, dark night. But strange things started to happen as the hours passed. The system’s algorithms began to deviate from their intended course, resulting in unexpected and unsettling outcomes. The anomalies were…",https://medium.com/@mittalhardik225/ai-horror-story-2b7c3b48995a?source=topics_v2---------63-84--------------------bf362680_3ea0_4747_a722_177edaa5b8f4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Uh9_3jvbamlVG6FThBxPcQ.png,ai 3153,2455,Weekly Indexing Review 234546,"A week about event-driven architecture. — In today’s nerd’s letter, I will share with you my previous week’s indexing notes and the most important resources I read and found useful. Indexing is one of the steps in my system learning process, if you want to know more about this personal system, I wrote something for you…",https://medium.com/@ccorralesmdm/weekly-indexing-review-234546-8effd1620051?source=topics_v2---------64-84--------------------bf362680_3ea0_4747_a722_177edaa5b8f4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*p6227SNVUdFRUkes,ai 3154,1137,Bing beats ChatGPT updated data until 2023,"New Microsoft AI-powered Bing Outperforms Competitor ChatGPT — Latest Data Analysis (2023) — As the internet continues to grow, search engines are playing an increasingly important role in our daily lives. In today’s digital age, we depend heavily on search engines to find information, products, and services that we need. Therefore, it’s crucial to have a reliable search engine that provides accurate and…",https://medium.com/@napsaga/revolutionizingsearch-51d5d621dcb?source=topics_v2---------65-84--------------------bf362680_3ea0_4747_a722_177edaa5b8f4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*1SXH0iKUe4ymBDQq.jpg,ai 3155,2456,CryptoGPT (GPT) Is It the Future of AI for Cryptocurrency?,"Two significant movers in the financial world are cryptocurrencies and artificial intelligence (AI). Now, CryptoGPT combines the two — Here is an in-depth look at the known world of CryptoGPT — A new cryptocurrency for AI is CryptoGPT (GPT). GPT is the acronym for Generative Pre-trained Transformer. Bitfinex announced it would be one of the first listers on its exchange platform. It’s reportedly available on PancakeSwap, ByBit, BingX, Binget…",https://medium.com/datadriveninvestor/cryptogpt-gpt-is-it-the-future-of-ai-for-cryptocurrency-c42a845f54a2?source=topics_v2---------66-84--------------------bf362680_3ea0_4747_a722_177edaa5b8f4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*HQ-awW1Cu78LahcvIfP72w.png,ai 3156,2457,Properly using AI to Improve Your Coding,"It’s no secret that AI has taken the world by storm. The progress made in the past decade alone has been astronomical. We went from basic virtual assistance on our smartphones, to now having AI applications doing our work for us! However, as new technology arises, so do new ways…",https://medium.com/@arabovadam1999/properly-using-ai-to-improve-your-coding-bd5480d07c9e?source=topics_v2---------67-84--------------------bf362680_3ea0_4747_a722_177edaa5b8f4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0NzqzvJgheIxMT1cGC-3Mw.png,ai 3157,2458,Machine learning 101,What is Machine learning? — Machine learning is a field of computer science that focuses on the development of algorithms and statistical models that enable computers to learn from and make predictions or decisions based on data without being explicitly programmed. …,https://medium.com/@minhaas/machine-learning-101-92986489937f?source=topics_v2---------68-84--------------------bf362680_3ea0_4747_a722_177edaa5b8f4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3158,2459,What a load of Cobblers,"The Sunday Feed Sometimes, you don’t know what you don’t know. However, this does not mean that the danger can be averted or the problem will find a solution on its own. AI is not something that should be taken lightly. Specially by people who are in their thirties. On…",https://medium.com/@john-khalkho/what-a-load-of-cobblers-a05f4c2b5fdf?source=topics_v2---------69-84--------------------bf362680_3ea0_4747_a722_177edaa5b8f4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6ZM1ISyS2yGc6gp_6s4eeQ.jpeg,ai 3159,2460,"15 AI and GPT Benefits, Strategies, and Tactics for Technology Leaders","15 AI and GPT Benefits, Strategies, and Best Practices for IT Technology Leaders In this article, I’ll explore some of the most exciting uses for AI and GPT, including customer experience, business operations, and data-driven decision-making. I’ll also provide a few tips on getting started using AI and GPT and managing some of the challenges you may face. As a CIO, CTO, or…",https://medium.com/@martinjonesaz/15-ai-and-gpt-benefits-strategies-and-tactics-for-technology-leaders-aa2050531277?source=topics_v2---------70-84--------------------5305a5c6_ffd1_4ec7_9c70_22810e3317ca-------17,https://miro.medium.com/v2/resize:fill:140:140/1*k7jNqOIunEKn76fOH9dqZw.jpeg,ai 3160,2461,Impact of AI on Product Management,"Redefining PM in the age of advanced AI models — My organization has been pumped about the new advanced LLMs since the last few months (and with reason!), and that energy has permeated many of our product teams, with leadership encouraging all of us to think out of the box, take the time to experiment, be willing to absorb risk…",https://medium.com/@swapna-malekar/impact-of-ai-on-product-management-a2c11d616793?source=topics_v2---------71-84--------------------5305a5c6_ffd1_4ec7_9c70_22810e3317ca-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9-EDVQrDh17WOYORfj4iOw.png,ai 3161,2462,Playing Cards Image Classification,"This problem is an image classification problem where we need to classify images of playing cards into 53 different labels (52 standard playing cards + 1 random). There was 7643 train images, 265 validation images and 265 test cards. Each image is 224x224 RGB image. …",https://medium.com/@saurabhraj5162/playing-cards-image-classification-47a117ec8642?source=topics_v2---------72-84--------------------5305a5c6_ffd1_4ec7_9c70_22810e3317ca-------17,https://miro.medium.com/v2/resize:fill:140:140/1*D-hUbj8dAmdVw6LSVKCSbQ.png,ai 3162,2463,From AI to Cloud: Exploring the Latest Digital Transformation Trends for 2023,"Digital transformation is the integration of digital technology into all areas of a business, from customer service to supply chain management. From cloud computing and artificial intelligence to the internet of things and blockchain, there are countless technologies that are driving the digital transformation movement. Here are some digital transformation…",https://medium.com/@prealmdigital/from-ai-to-cloud-exploring-the-latest-digital-transformation-trends-for-2023-63be34050490?source=topics_v2---------73-84--------------------5305a5c6_ffd1_4ec7_9c70_22810e3317ca-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LAxoex8xF8y3gHRdeINZ-Q.jpeg,ai 3163,2464,Diary of a GAI Joe,"Disclaimer: This post, despite being about Generative AI, was not written by ChatGPT. OK, well maybe just this disclaimer. It’s the last time, I promise. Maybe. Disclaimer: The views expressed in this post are mine and mine alone. Some may be those of a Large Language Model, but they were…",https://medium.com/@mark-rodseth/diary-of-a-gai-joe-66b81afb7237?source=topics_v2---------74-84--------------------5305a5c6_ffd1_4ec7_9c70_22810e3317ca-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zSpWbBelMSqSmpozPCK9zw.png,ai 3164,165,Spend More Time on What Matters 5 AI Tools That Will Cut Hundreds of Hours,"Powerpresent AI “Slides” 1.Powerpresent AI is a tool that uses AI to automatically generate professional presentations, allowing you to create visually appealing slides 10X faster without needing design or AI expertise. It offers various art styles to enhance presentations and can export them to Google Slides or PPTX files for easy editing. Beautiful Ai “AI Presentations Maker” 2.BeautifulAi…",https://medium.com/@nhshinwari21/spend-more-time-on-what-matters-5-ai-tools-that-will-cut-hundreds-of-hours-fcdf303007b1?source=topics_v2---------75-84--------------------5305a5c6_ffd1_4ec7_9c70_22810e3317ca-------17,https://miro.medium.com/v2/resize:fill:140:140/0*bNM_ui9Uy4mf7znH.png,ai 3165,2465,The Math of AI Alignment 101: Underspecification,"A Series on AI Alignment Basics — This is the second article in a series introducing the basic mathematical concepts that go into properly aligning AGI (artificial general intelligence). Each article is roughly self-contained, and so they can be read independently. But I will not be re-motivating or reintroducing concepts, so they can probably be read more…",https://medium.com/cantors-paradise/the-math-of-ai-alignment-101-underspecification-706b3e6cca81?source=topics_v2---------76-84--------------------5305a5c6_ffd1_4ec7_9c70_22810e3317ca-------17,https://miro.medium.com/v2/resize:fill:140:140/0*T4OOroBKVK-YoaKg,ai 3166,2466,Setup GPT-2 On Your PC,"A step-by-step guide to setup a runnable GPT-2 model on your PC or laptop, leverage GPU CUDA, and output the probability of words generated by GPT-2, all in Python — The best way to understand ChatGPT and GPT-3 is to install one on a personal computer, read the code, tune it, change parameters, and see what happened after every change. …",https://medium.com/@xhinker/setup-gpt2-on-your-pc-6fb7d745355c?source=topics_v2---------77-84--------------------5305a5c6_ffd1_4ec7_9c70_22810e3317ca-------17,https://miro.medium.com/v2/resize:fill:140:140/1*XrKvvIqeien6XhfEM99XUg.png,ai 3167,2467,What are the limitations of AI and how can they be addressed?,"Artificial Intelligence (AI) is a rapidly growing field with potential applications across various industries. However, there are several limitations to AI that must be considered when developing and deploying AI systems. Lack of Creativity: One of the main limitations of AI is its inability to be creative or think outside…",https://medium.com/@seeratbrar264/what-are-the-limitations-of-ai-and-how-can-they-be-addressed-e4e205e2dcf9?source=topics_v2---------78-84--------------------5305a5c6_ffd1_4ec7_9c70_22810e3317ca-------17,https://miro.medium.com/v2/resize:fill:140:140/1*g-eGEQyEP2Vj7pBgIW1aBg.jpeg,ai 3168,595,Awaken Your Inner Potential,With Eo Ipso Consciousness. — Humans simply have limited self-centered consciousness. Let’s break this down: Intelligence is the ability to solve problems. We all know from our own experience what consciousness is but it’s very difficult to define. Consciousness is not demonstrable but is the receptacle of the self and therefore of free will. AI that possesses self awareness should therefore…,https://medium.com/@mybrandt/awaken-your-inner-potential-674b073249ad?source=topics_v2---------79-84--------------------5305a5c6_ffd1_4ec7_9c70_22810e3317ca-------17,https://miro.medium.com/v2/resize:fill:140:140/0*_a4wr36-UDwCuOyk,ai 3169,2468,New Wave of Phishing Targeting Your Staff Now!,"Cyber attacks are not only in the news, but they are becoming more frequent and sophisticated. However, it is important to note that cyber attacks can range from simple phishing scams to complex malware-based attacks. …",https://medium.com/@riskigy/new-wave-of-phishing-targeting-your-staff-now-61937427a361?source=topics_v2---------80-84--------------------37c47368_ea15_4d7d_bbbd_6bd531be5dff-------17,https://miro.medium.com/v2/resize:fill:140:140/1*J3M6n-886gKXUR6SJjtweA.jpeg,ai 3170,2469,6 Interesting and Practical AI Tools — Blockchain 101,"Recently, a chat robot program called ChatGPT has been soaring in the capital market all the way out of the circle! …",https://medium.com/@superex/6-interesting-and-practical-ai-tools-blockchain-101-c43b9f43c931?source=topics_v2---------81-84--------------------37c47368_ea15_4d7d_bbbd_6bd531be5dff-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QGGor5pTWCyHVdxCEyWSfA.png,ai 3171,2470,5 Ways Gigapixel AI is Revolutionizing Image Processing Upscaling,What is Gigapixel AI and how can it revolutionizing image processing upscaling? Gigapixel AI is a new tool that has been revolutionizing the world of image processing and editing. …,https://medium.com/@xclip.gioxyer/5-ways-gigapixel-ai-is-revolutionizing-image-processing-upscaling-7a66c0303935?source=topics_v2---------82-84--------------------37c47368_ea15_4d7d_bbbd_6bd531be5dff-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Y5D3xmbZqxDBm8g-OuHtrA.png,ai 3172,2471,SHIB AI Airdrop of 50M $SHIB-AI token Free,A group of visionaries from different parts of the world who are passionate about cryptocurrency innovation came together to develop ShibAI. The team’s motivation to push past DeFi’s limitations in order to create a brighter future for the crypto sector comes from passion and ingenuity. 🎁 SHIB AI Airdrop Pool…,https://medium.com/@seanpolane/shib-ai-airdrop-of-50m-shib-ai-token-free-76bf2535db16?source=topics_v2---------83-84--------------------37c47368_ea15_4d7d_bbbd_6bd531be5dff-------17,https://miro.medium.com/v2/resize:fill:140:140/0*FaAdikwX7xz5PS5h.jpg,ai 3173,2472,A deep dive into Tracercoins,"Are tracercoins the asset class that will tackle volatility? Crypto assets are still evolving, with new types emerging as a result of market demand. Cryptocurrencies were created to be an alternative store of value and payment mechanism. The decentralization of tokens enabled the democratization of access to financial opportunities and…",https://medium.com/@CogitoProtocol/a-deep-dive-into-tracercoins-72be6876ebf8?source=topics_v2---------84-84--------------------37c47368_ea15_4d7d_bbbd_6bd531be5dff-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pqX4VlqpCUs2Drst1MLSMQ.png,ai 3174,2447,The Rise of AI-Run Prisons: A Look into the Future of Correctional Facilities,"How AI Technology Can Improve Efficiency and Rehabilitation Outcomes While Raising Ethical Concerns The concept of using artificial intelligence (AI) to manage prisons may seem like something out of a science fiction movie. However, the reality is that the use of AI technology in prisons is becoming more and more…",https://medium.com/@ceoishhh/the-rise-of-ai-run-prisons-a-look-into-the-future-of-correctional-facilities-dd9b29b36aa0?source=topics_v2---------85-84--------------------37c47368_ea15_4d7d_bbbd_6bd531be5dff-------17,https://miro.medium.com/v2/resize:fill:140:140/0*LO9GPr3wJjPBBTfs,ai 3175,2473,“AI: Friend or Foe? The Rising Technology and Its Impact on Society”,"The Rise of Artificial Intelligence and Its Implications for Society Artificial Intelligence (AI) is a rapidly evolving technology that is changing the way we live, work, and interact with each other. With the increasing development of AI, machines are now able to perform tasks that were once the sole domain…",https://medium.com/@abdulrehmanayaz7861/ai-friend-or-foe-the-rising-technology-and-its-impact-on-society-ac6404c8f624?source=topics_v2---------86-84--------------------37c47368_ea15_4d7d_bbbd_6bd531be5dff-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_FrWwKaJiYdE8ghjdfUUxQ.jpeg,ai 3176,2474,‘The Care and Feeding of a Lady Vampire’: A Fun and Pointless Adventure 100% Written by AI,"First, you have to disguise yourself as a woman. You can wear a dress and a wig. Then you follow the vampire around London. When you see a good opportunity, you take her somewhere secluded, and you expose her to sunlight. — He burst into the room with such excitement that he didn’t bother to close the door behind him and looked into the cage that stood against one wall. “So, it’s true,” he announced to no one in particular. “You’ve caught one.” He squinted into the cage. “From the looks of…",https://medium.com/@traceyfolly/the-care-and-feeding-of-a-lady-vampire-a-fun-and-pointless-adventure-100-written-by-ai-700a6dc6c505?source=topics_v2---------87-84--------------------55a337b8_00e9_4e14_9ee8_f22843e10269-------17,https://miro.medium.com/v2/resize:fill:140:140/1*iRW9RzY75BwzI92B-3YixA.png,ai 3177,2475,Mastering Machine Learning Model Maintenance: A Guide to Ensuring Long-Term Success in Production,"“Remember, neglecting your model’s maintenance is like neglecting your pet rock. Sure, it won’t bark or shed, but it’ll become just as useless.” Machine learning models are not a one-and-done endeavor. Once a model is deployed into production, it must be maintained and monitored to ensure it continues to function…",https://medium.com/@praveenjoshi007/mastering-machine-learning-model-maintenance-a-guide-to-ensuring-long-term-success-in-production-b2bccf160d7a?source=topics_v2---------88-84--------------------55a337b8_00e9_4e14_9ee8_f22843e10269-------17,https://miro.medium.com/v2/resize:fill:140:140/0*yWMuxwSeYikzl55O,ai 3178,2476,Unleash Your Creativity: Generate Mind-Blowing Images with DALL-E using Your Console Prompt!,"Are you tired of using the same old stock images for your projects? Do you want to create something truly unique and eye-catching? Look no further than DALL-E — the AI program that can generate stunning images based on your wildest imagination. And now, with just a few simple commands…",https://medium.com/@axelfernandezcurros/unleash-your-creativity-generate-mind-blowing-images-with-dall-e-using-your-console-prompt-9368d2222583?source=topics_v2---------89-84--------------------55a337b8_00e9_4e14_9ee8_f22843e10269-------17,https://miro.medium.com/v2/resize:fill:140:140/1*2czY6aVFZsehHddmM4vnpA.jpeg,ai 3179,2477,How AI is Revolutionizing Product Management: A Comprehensive Guide,"Artificial intelligence (AI) has emerged as a transformative technology that is reshaping various industries, including product management. AI has the potential to change the way products are developed, tested, and launched in the market. …",https://medium.com/product-factory/how-ai-is-revolutionizing-product-management-a-comprehensive-guide-d72177eabce3?source=topics_v2---------90-84--------------------55a337b8_00e9_4e14_9ee8_f22843e10269-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Lgym3gSX7wyVxJ4mMer3YA.jpeg,ai 3180,2478,Exploring Reinforcement Learning: Concepts and Examples in Python,"What is Reinforcement Learning? RL is a type of machine learning that involves an agent learning to take actions in an environment to maximize a cumulative reward signal. In RL, the agent learns through trial and error, by interacting with the environment and receiving feedback in the form of rewards or penalties. The goal…",https://medium.com/@apokolipsu/exploring-reinforcement-learning-concepts-and-examples-in-python-db78c5d26d91?source=topics_v2---------91-84--------------------55a337b8_00e9_4e14_9ee8_f22843e10269-------17,https://miro.medium.com/v2/resize:fill:140:140/0*rD-QWjt_1Y89ewk8,ai 3181,2479,Fear of AI replacing jobs,"People are always nervous whenever a new technology comes out. Especially after the advent of artificial intelligence, they are afraid that it will replace their jobs. Recently, with the commercialization of ChatGPT as a service, there are many inflammatory thumbnails on YouTube that say “it’s all going to be ruined.”…",https://medium.com/@contenjoo/fear-of-ai-replacing-jobs-2b1153f1f3c7?source=topics_v2---------92-84--------------------ca805574_a4f7_452b_94a4_2e87bd9b1aae-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yT2a_a4huH8goXJmllz4cg.png,ai 3182,2448,10 ways to make money in 2023,"In today’s world, making money is no longer limited to a traditional 9–5 job. With the rise of the internet and new technologies, there are now countless ways to make money online and offline. Here are some ways to make money that you may not have considered: Freelance work: Freelancing…",https://medium.com/@the-ai-article-project/10-ways-to-make-money-in-2023-87a4a4331a4d?source=topics_v2---------93-84--------------------ca805574_a4f7_452b_94a4_2e87bd9b1aae-------17,https://miro.medium.com/v2/resize:fill:140:140/0*HyeUdoD65LyzG4NU,ai 3183,2480,Can ChatGDP help with /work-life balance?,"In today’s fast-paced work environment, time is a precious commodity, and we often struggle to juggle multiple tasks and projects while maintaining a healthy work-life balance. …",https://medium.com/@ddame/can-chatgdp-help-with-work-life-balance-6f7f28c3945?source=topics_v2---------94-84--------------------ca805574_a4f7_452b_94a4_2e87bd9b1aae-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vG4nwpuYcFGiWSXvlxDcwQ.jpeg,ai 3184,2481,You’ve heard of the Space Race… Welcome to the Data Race.,"“One small step for man, one giant leap for mankind.” When Neil Armstrong uttered this now-famous statement, he had just achieved a remarkable feat that would go on to represent a pivotal moment in the history of the Space Race. …",https://medium.com/platform45/youve-heard-of-the-space-race-welcome-to-the-data-race-72abdc2ccfb4?source=topics_v2---------95-84--------------------ca805574_a4f7_452b_94a4_2e87bd9b1aae-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Iq-MDC_VlvPWyeRNZyOmfw.png,ai 3185,19,Engaging in the remarkable — An exploration of Intelligence,"“The pendulum of the mind oscillates between sense and nonsense, not between right and wrong.” Carl Gustav Jung Following Jung then, we may state with a high degree of certainty that the fresh batch of AI’s currently suffocating every other thread of possible conversation have a mind (light tongue in…",https://medium.com/@wildcat2030/engaging-in-the-remarkable-an-exploration-of-intelligence-eb59ae26ed5b?source=topics_v2---------96-84--------------------ca805574_a4f7_452b_94a4_2e87bd9b1aae-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yL__6Y5XnFJJYMSONG_-Fw.jpeg,ai 3186,2447,"The Creepiest AI Bot in the World: Meet Norman, the Artificial Intelligence with a Dark Side","Exploring the Dangers of Biased Data and the Importance of Responsible AI Development Artificial Intelligence (AI) has become an integral part of modern technology. From Siri to Alexa, AI-powered virtual assistants have become commonplace in our lives. However, not all AI bots are as friendly or helpful. …",https://medium.com/@ceoishhh/the-creepiest-ai-bot-in-the-world-meet-norman-the-artificial-intelligence-with-a-dark-side-d03a3ec1a894?source=topics_v2---------97-84--------------------ca805574_a4f7_452b_94a4_2e87bd9b1aae-------17,https://miro.medium.com/v2/resize:fill:140:140/0*J6KWt8f5jr-HJchp,ai 3187,2478,Accelerating Deep Learning with Transfer Learning,Transfer learning is a powerful technique in deep learning that allows us to leverage the knowledge gained from a pre-trained model to improve the performance of a new task. …,https://medium.com/@apokolipsu/accelerating-deep-learning-with-transfer-learning-3967a1e7f127?source=topics_v2---------98-84--------------------ca805574_a4f7_452b_94a4_2e87bd9b1aae-------17,https://miro.medium.com/v2/resize:fill:140:140/0*z7m0Etw-6fBmxB93,ai 3188,2482,Mcdonald's Is Testing a Fully Automated Location with NO HUMAN Employee,"Pack your bags, boys and girls, we are moving closer and closer to an AI-driven economy.",https://medium.com/readers-digests/mcdonalds-is-testing-a-fully-automated-location-with-no-human-employee-58307f756eab?source=topics_v2---------99-84--------------------ca805574_a4f7_452b_94a4_2e87bd9b1aae-------17,https://miro.medium.com/v2/resize:fill:140:140/0*kdVVwV1wMYOUQNTX,ai 3189,2483,A Key Bottleneck to Adopting Robots at Recycling Facilities,"Introduction Material Recovery Facilities (MRFs) are a crucial part of the path that trash takes. After garbage trucks pick up trash from residential homes and businesses, it converges at a Material Recovery Facility, where the trash is sorted out, and is sent to recycling facilities, landfills, or waste-to-energy facilities. Recovery rates…",https://medium.com/@jereminuerofficial/a-key-bottleneck-to-adopting-robots-at-recycling-facilities-79204b51652?source=topics_v2---------100-84--------------------ca805574_a4f7_452b_94a4_2e87bd9b1aae-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Gzp9cWKS5ApsGUkZ4RmGsQ.jpeg,ai 3190,2484,"10 Best AI Tools for Data Extraction, Content Creation, and Website Building in 2023","Hey Readers, How are you? Hope everything is good so far. The field of artificial intelligence (AI) is rapidly advancing, with new tools and technologies being released at an unprecedented pace. In fact, over 100 AI tools were released in just the last week! …",https://medium.com/@hirenkvaghasiya/10-best-ai-tools-for-data-extraction-content-creation-and-website-building-in-2023-9b9e044ff925?source=topics_v2---------101-84--------------------ca805574_a4f7_452b_94a4_2e87bd9b1aae-------17,https://miro.medium.com/v2/resize:fill:140:140/1*b3L1jwni6P8l0E-5Wvgjow.jpeg,ai 3191,2485,Integration of AI into everyday apps,"The integration of AI into everyday apps is quickly becoming a reality, as demonstrated by Snapchat’s recent launch of their “My AI” bot, currently only available to paying Snapchat Plus subscribers. According to CEO Evan Spiegel, this is just the beginning of the company’s generative AI plans. Snapchat’s “My AI”…",https://medium.com/@younesssbrahimi/integration-of-ai-into-everyday-apps-fea465800bc6?source=topics_v2---------102-84--------------------21c3e6af_6532_4111_bd67_5240a1ea6172-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BKdp-QDlirRbL70yDi7CzQ.png,ai 3192,2486,"On consciousness, ChatGPT and things you’re (still) good at","This post is in English as it is going to talk about a fairly hot topic and is probably intended for a slightly broader audience than my core readers — that is, my mom, my French-speaking me and my Russian-speaking me. You might also consider it a note to self…",https://medium.com/@janvaschuk/on-consciousness-chatgpt-and-things-youre-still-good-at-ee441f0c7676?source=topics_v2---------103-84--------------------21c3e6af_6532_4111_bd67_5240a1ea6172-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3193,2487,How AI Personalizes Sense of Fashion Style?,"AI can play a crucial role in the sustainable fashion movement by enabling brands to create more efficient and eco-friendly processes, reducing waste, and improving transparency in the fashion supply chain. AI can help to optimize the supply chain by tracking materials, inventory, and production processes to reduce waste and…",https://medium.com/@fapermata/how-ai-personalizes-sense-of-fashion-style-4f1f411aff46?source=topics_v2---------104-84--------------------21c3e6af_6532_4111_bd67_5240a1ea6172-------17,https://miro.medium.com/v2/resize:fill:140:140/0*JEBWEgem1Cgh0yx5,ai 3194,2488,How Microsoft can Revolutionize End-User Computing Once Again (Or: The Return of Windows Phone?),"This text was originally released in my blog in March 5th, 2023. I have certainly not abandoned this blog — it’s just that the first months of 2023 were absolutely crazy to me. And in my absence, it seems like ChatGPT is the thing that everyone is talking about now…",https://medium.com/@estevaojneto/the-return-of-windows-phone-5f75cf110b8a?source=topics_v2---------105-84--------------------21c3e6af_6532_4111_bd67_5240a1ea6172-------17,https://miro.medium.com/v2/resize:fill:140:140/1*c0G2jIEwXGeBZfLBztmNbA.jpeg,ai 3195,2489,"ChatGPT, The Important AI That Google Marks As The Code Red","Greetings… Once they announced the name of ChatGPT with the flow working system of the AI, I really feel scary a bit for the pathway of the computer science jobs and works. However, I would like to make some researches about it for preventing full-controlled of AI in the further years…",https://medium.com/@boatchrnthn/chatgpt-the-important-ai-that-google-marks-as-the-code-red-9d65199b838d?source=topics_v2---------106-84--------------------21c3e6af_6532_4111_bd67_5240a1ea6172-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3196,2490,Maximizing Productivity: How ChatGPT Can Improve Pair Programming,"As a practitioner of Test-Driven Development, my workflow involves writing tests from the user’s perspective and then implementing the code to satisfy those tests. When the code reaches a point where making changes is difficult, I refactor it. This methodology is almost instinctual and is a part of my everyday…",https://medium.com/itnext/maximizing-productivity-how-chatgpt-can-improve-pair-programming-17c5780c64b7?source=topics_v2---------107-84--------------------21c3e6af_6532_4111_bd67_5240a1ea6172-------17,https://miro.medium.com/v2/resize:fill:140:140/0*SSkorEhG_7jtwi1L,ai 3197,2491,Talking with ChatGPT: A Guide to Using ChatGPT’s Voice,"Your Guide to Interacting with ChatGPT through Voice Setting up ChatGPT Voice: A Step-by-Step Guide Let’s quickly add the voice function of chatGPT. The following will take you through the operation step by step. In fact, it is just an extension function. First click on your google chrome browser, and let’s step by step operating! Click on the puzzle icon at the top of the browser window :",https://medium.com/@lucien1999s.pro/talking-with-chatgpt-a-guide-to-using-chatgpts-voice-cc6abb3f7030?source=topics_v2---------108-84--------------------21c3e6af_6532_4111_bd67_5240a1ea6172-------17,https://miro.medium.com/v2/resize:fill:140:140/1*nYmE_t_jm5w9QkaLzOSAYQ.jpeg,ai 3198,2492,IS CHATGPT REALLY KILLING JOBS!!!,"First of all, let's acknowledge that AI and chatbots are already having an impact on certain types of jobs. There are certain tasks that can be automated using AI, such as answering common customer service questions, scheduling appointments, and providing basic information. In these cases, businesses can save money by…",https://medium.com/@yamankardam1/is-chatgpt-really-killing-jobs-64b08e1d11a1?source=topics_v2---------109-84--------------------dddb94c3_769e_4232_a9b7_841a21ef89de-------17,https://miro.medium.com/v2/resize:fill:140:140/1*YEO3OFM54pl-vlTrOuk06A.png,ai 3199,2493,GPT-4 Arriving Soon,"OpenAI GPT-4 is About To Be Released Soon — A new advanced AI model called GPT-4, made by OpenAI, who created ChatGPT, might come out next week as stated by the CTO of Microsoft Germany. This new model could be much more powerful than the older one and can help create new uses for AI in businesses. Andreas Braun…",https://medium.com/@izharum93/gpt-4-arriving-soon-92a6fcf28c00?source=topics_v2---------110-84--------------------dddb94c3_769e_4232_a9b7_841a21ef89de-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*YFDzNCrjWj4HF8PzJd_5hA.gif,ai 3200,181,AI Redefining Outside the Box Design,"The Impact of Generative AI on Architecture and Interior Design — “Artificial intelligence has the power to revolutionize the way we approach design. By leveraging machine learning algorithms, designers can gain insights into patterns and trends that might have gone unnoticed otherwise.” — John Maeda, Global Head of Computational Design and Inclusion at Automattic Are you an interior designer looking for…",https://medium.com/@gesikowski/ai-redefining-outside-the-box-design-ba1ee6ac46ce?source=topics_v2---------111-84--------------------dddb94c3_769e_4232_a9b7_841a21ef89de-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CbqqrrHH8vqmDqGnAnUluA.jpeg,ai 3201,2447,The Quest for Immortality: Scientists Turn to AI to Unlock the Secrets of Living Forever”,"“Exploring the Cutting-Edge Technologies and Ethics Behind the Search for Eternal Life” — For centuries, humans have been searching for the key to immortality. While the concept of living forever may seem like science fiction, advancements in technology are bringing us closer than ever before. …",https://medium.com/illuminations-mirror/the-quest-for-immortality-scientists-turn-to-ai-to-unlock-the-secrets-of-living-forever-7bd10f6eb9f6?source=topics_v2---------112-84--------------------dddb94c3_769e_4232_a9b7_841a21ef89de-------17,https://miro.medium.com/v2/resize:fill:140:140/0*rnwvB1lexqSKJsIj,ai 3202,2482,ChatGPT just UPGRADED- Video and Image AI will soon be Available🤯,"Recently, OpenAI, the company behind the development of the ChatGPT language model, has released a new feature that allows the creation of…",https://medium.com/illumination/chatgpt-just-upgraded-video-and-image-ai-will-soon-be-available-302154241c5a?source=topics_v2---------113-84--------------------dddb94c3_769e_4232_a9b7_841a21ef89de-------17,https://miro.medium.com/v2/resize:fill:140:140/0*4nm1TlIVPqATZ0NA,ai 3203,2494,"Yes, This is Another Writing is Dying Story","Sorry, but I don’t think there is much hope — I can’t tell you how many posts I have read recently about the demise of Medium. According to what I have read, it’s Tony Stubblebine’s fault, or maybe it’s ChatGPT, or who knows what caused it, but views are down, money is shrinking, and everything is wrong, wrong, wrong. My…",https://medium.com/tonys-tech-corner/yes-this-is-another-writing-is-dying-story-2d02fc2f440?source=topics_v2---------114-84--------------------dddb94c3_769e_4232_a9b7_841a21ef89de-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fdbuNDoNJUqAB6r4RPEp7w.png,ai 3204,2495,Corporate Slave,"Freedom is near. The future belongs to the creatives. In a couple generations, people won’t believe we were once slaves with white and blue collars. Living in a zoo, conditioned. Unlike the zoo, however, here the doors are open. …",https://medium.com/@carbono/corporate-slave-e51285cde9de?source=topics_v2---------115-84--------------------dddb94c3_769e_4232_a9b7_841a21ef89de-------17,https://miro.medium.com/v2/resize:fill:140:140/0*9NJLaZoohq-69U__,ai 3205,2496,ChatGPT has answers to everything,"And how that is both immensely awesome and utterly terrifying — What the hell is ChatGPT? How many times have you stared at a blank document waiting for your project brief or blog post to come flowing from the depths of your creative expression, only to be mocked by a blinking cursor and blinding background? (Maybe less blinding if you are on the dark mode band…",https://medium.com/@corbin.kayli/chatgpt-has-answers-to-everything-38d7b6cc4895?source=topics_v2---------116-84--------------------dddb94c3_769e_4232_a9b7_841a21ef89de-------17,https://miro.medium.com/v2/resize:fill:140:140/0*LmFlPDvJAMu3MY9Q,ai 3206,447,The Pen and the Processor: How AI is Changing the Game for Content Writers,"AI-Powered Content Creation: How Writers Can Leverage Machine Learning for Enhanced Productivity and Quality — Content creation is an essential aspect of modern-day marketing, journalism, and business communication. Content writers, copywriters, and bloggers create written material that connects with the audience and drives traffic to websites. In recent years, Artificial Intelligence (AI) has emerged as a game-changer in the field of content writing. AI can…",https://medium.com/@ammarkara1004/the-pen-and-the-processor-how-ai-is-changing-the-game-for-content-writers-e64947018711?source=topics_v2---------117-84--------------------dddb94c3_769e_4232_a9b7_841a21ef89de-------17,https://miro.medium.com/v2/resize:fill:140:140/1*HBsnhKLn4WBy6riY18N9Gw.jpeg,ai 3207,2497,“The Rise of Positive AGI: Empowering a Better World”,"Overview: I. The Superhero of AI: Positive AGI Introduction to AGI and its impact on the world Unleashing the potential of Positive AGI II. Understanding AGI: Beyond Human Intelligence The Evolution of AGI: Past, Present and Future Characteristics that define AGI III. Unlocking Positive AGI: Key Concepts Positive AGI: Definition…",https://medium.com/@harinivas278/the-rise-of-positive-agi-empowering-a-better-world-e6dabdc20479?source=topics_v2---------118-84--------------------60babdd1_8611_4348_beb6_cc0f559b9e15-------17,https://miro.medium.com/v2/resize:fill:140:140/1*lU1QMRnB5kwtEF16LnD5oA.png,ai 3208,2498,How to Solve Stable Diffusion Errors (Performance Tips Included),"Solve AUTOMATIC1111’s web UI errors and tips for performance — You do all the steps to install stable diffusion, and then you run it. And then you get an error. You search the internet and find a quick fix. You try it, and now you get a different error. Why can’t anything in this world be easy and work on…",https://medium.com/generative-ai/how-to-solve-stable-diffusion-errors-performance-tips-included-fb1fb1a03ad6?source=topics_v2---------119-84--------------------60babdd1_8611_4348_beb6_cc0f559b9e15-------17,https://miro.medium.com/v2/resize:fill:140:140/0*IsWVNcgt7_gaIu5q,ai 3209,2499,AI+CFOs+CMOs = Formula for success in 2023!,"As businesses continue to grow and expand in the digital age, the role of the CFO and CMO is becoming increasingly intertwined. While the CFO is responsible for managing financial operations and ensuring that budgets are allocated effectively, the CMO is tasked with developing and executing marketing strategies that drive…",https://medium.com/@mail4agam/ai-cfos-cmos-formula-for-success-in-2023-22a325388ce8?source=topics_v2---------120-84--------------------60babdd1_8611_4348_beb6_cc0f559b9e15-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JcDpRqGjqvRFYTFSYKFzeg.jpeg,ai 3210,2500,The Surprising Reason Writers Have Nothing to Fear from GPT,"It’s all just common sense. GPT is artificial intelligence software that produces text based on the prompts provided by humans. A user feeds in text (from a few words, to a whole page) and asks the system to write more on the subject, using the style it’s been given. It…",https://medium.com/@12009109/the-surprising-reason-writers-have-nothing-to-fear-from-gpt-965c95088e64?source=topics_v2---------121-84--------------------60babdd1_8611_4348_beb6_cc0f559b9e15-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xjPczWGV1HJMfUSibFYczw.jpeg,ai 3211,2501,ICYMI: AI has “800-pound gorilla” energy problem and fake news fans flock together,"#artificialintelligence and #cybersecurity catch-up. AI Jurassic-2 and APIs offer write stuff for creatives using AI March 11, 2023 Spanish, French, German, Portuguese, Italian and Dutch receive support in Jurassic-2, the latest large language model release from Israel’s AI21 Labs https://aimagazine.com/articles/jurassic-2-and-apis-offer-write-stuff-for-creatives-using-ai Huge growth means AI has “800-pound gorilla” energy problem",https://medium.com/george/icymi-ai-has-800-pound-gorilla-energy-problem-and-fake-news-fans-flock-together-4612cf0d928d?source=topics_v2---------122-84--------------------2c0e027a_b653_44ac_9995_5eede494c459-------17,https://miro.medium.com/v2/resize:fill:140:140/1*eyseCFTfOsalwCS53mLpPQ.jpeg,ai 3212,159,Google MusicLM: Generating Music with Machine Learning,"Google MusicLM, or the Google Music Language Model, is a state-of-the-art language model developed by Google that can generate music compositions in a wide range of styles and genres. In this article, we’ll introduce you to Google MusicLM and show you how it works. What is Google MusicLM? Google MusicLM is a language model…",https://medium.com/@abhishekmishra13k/google-musiclm-generating-music-with-machine-learning-5837de290f51?source=topics_v2---------123-84--------------------2c0e027a_b653_44ac_9995_5eede494c459-------17,https://miro.medium.com/v2/resize:fill:140:140/1*uoTLdseS7KnMLWav5AlR3w.jpeg,ai 3213,2502,Will ChatGPT Steal Your (UX) Job? — Part 1,Introduction to AI/ML for UX designers — Written by: Boris Volfson This is part one of a two part article that together summarize a recent Baltimore UX presentation. This part introduces UXers into the world of Artificial Intelligence (AI)/Machine Learning (ML)/Deep Learning (DL). If you’re already well informed on AI/ML/DL— skip to Part 2 where I discuss…,https://medium.com/@baltimoreux/will-chatgpt-steal-your-ux-job-part-1-27b2b90e3899?source=topics_v2---------124-84--------------------2c0e027a_b653_44ac_9995_5eede494c459-------17,https://miro.medium.com/v2/resize:fill:140:140/1*03BI6s-aiKDHXwXXVG02nA.png,ai 3214,2503,Applying AI: A Business Perspective,"Are you looking for ways to transform your business with AI? If so, you might be interested in learning how Microsoft AI can help you achieve your goals in various topic areas, such as marketing, B2B sales in the retail space, software development, and world-wide product development. …",https://medium.com/@mohammedbrueckner/applying-ai-a-business-perspective-38e968118f54?source=topics_v2---------125-84--------------------2c0e027a_b653_44ac_9995_5eede494c459-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OMnU-FdEGXA62uZAM0KvXg.jpeg,ai 3215,2504,"The Unstoppable Rise of Spark ✨, as Ai’s Iconic Symbol","The ✨ spark icon has become a popular choice to represent AI in many well-known products such as Google Photos, Notion AI, Coda AI, and most recently, Miro AI. It is widely recognized as a symbol of innovation, creativity, and inspiration in the tech industry, particularly in the field of…",https://medium.com/design-bootcamp/the-unstoppable-rise-of-spark-as-ais-iconic-symbol-ca663162cccc?source=topics_v2---------126-84--------------------2c0e027a_b653_44ac_9995_5eede494c459-------17,https://miro.medium.com/v2/resize:fill:140:140/1*axa0WagMgTWRfLPVx_qTNg.png,ai 3216,2505,Chipping Away at the Great Iceberg of Human Knowledge,"Do we need AI to ‘pick the brain’ of our civilization? With Miroslaw Manicki We hear that artificial intelligence (AI) is really good at rummaging through information on the Internet and making use of it. First of all, there is an assumption that valid knowledge is available in online forms…",https://medium.com/@ken-tingey/chipping-away-at-the-great-iceberg-of-human-knowledge-b6a6b203149c?source=topics_v2---------127-84--------------------2c0e027a_b653_44ac_9995_5eede494c459-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wl94docP08l3XLYsJYFT7Q.jpeg,ai 3217,2506,Scalable MLOps: The Present and Future of Machine Learning,"Machine learning has become a game-changer for many industries, and its impact continues to grow. From fraud detection to image recognition, machine learning models are being used to solve complex problems with unprecedented accuracy. However, building these models is just the first step. Deploying and maintaining them at scale is…",https://medium.com/@shikhar-kwatra/scalable-mlops-the-present-and-future-of-machine-learning-361400c3b12c?source=topics_v2---------128-84--------------------2c0e027a_b653_44ac_9995_5eede494c459-------17,https://miro.medium.com/v2/resize:fill:140:140/0*h2BdvVDEnaUo4Nfx.jpg,ai 3218,2507,The Path towards AI Regulation,"The contribution of the AI Act and its worldwide impact — In mid-2021, the European Commission proposed a new EU regulatory framework on Artificial Intelligence (AI) for the European Union. As such, it represents the first attempt to implement some level of regulation of AI. You may read the full official document of the AI Act proposal (in 24 languages) At…",https://medium.com/towards-data-science/the-path-towards-ai-regulation-7199eb803040?source=topics_v2---------129-84--------------------2c0e027a_b653_44ac_9995_5eede494c459-------17,https://miro.medium.com/v2/resize:fill:140:140/0*0FPRkbOjrCuPOk4C,ai 3219,2508,How Does AI-based Supply Chain Optimization Help Pharma Companies Save Money?,The pharmaceutical supply chain is incredibly complex: From sourcing and supplying materials to manufacturing and distribution of incredibly sensitive products that could be rendered inactive without the right environmental conditions. This complexity — and the dependence of governments and populations on the pharmaceutical industry’s life-saving products — are why pharma…,https://medium.com/geekculture/how-does-ai-based-supply-chain-optimization-help-pharma-companies-save-money-6deeb134cdc6?source=topics_v2---------130-84--------------------2c0e027a_b653_44ac_9995_5eede494c459-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CRcAmDODPaj4kd3dqBZc6g.png,ai 3220,2509,Keep Calm and Ask ChatGPT,The future of software development,https://medium.com/@geraldnguyen/keep-calm-and-ask-chatgpt-469154be3128?source=topics_v2---------131-84--------------------376f5cc6_5ef5_4007_9ee9_4ed4fb4cf6fe-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9kBigGzXi1nai7A6r07KNw.png,ai 3221,2510,AI and Gaming: The Evolution of Game Design and Virtual Worlds,"The gaming industry has always been at the forefront of innovation and technology. From the earliest arcade games to the latest virtual reality experiences, game developers have consistently pushed the boundaries of what is possible with new hardware and software. However, one of the most significant changes in recent years…",https://medium.com/@melissalim/ai-and-gaming-the-evolution-of-game-design-and-virtual-worlds-ad9194194c04?source=topics_v2---------132-84--------------------376f5cc6_5ef5_4007_9ee9_4ed4fb4cf6fe-------17,https://miro.medium.com/v2/resize:fill:140:140/1*67duB7Jccq6QNLFwYAeZDg.png,ai 3222,1749,Midjourney Version 5 image rating,"Today (09.03.2023) in the discord of Midjourney a new announcement happened. If you’re a paying MJ member, please go to the following URL and help us rate images https://midjourney.com/rate/pairs/v5-one-staging/ There is a disclaimer, that those images are quite boring and not the final result. Non the less i wanted to…",https://medium.com/@vilius.kukanauskas/midjourney-version-5-image-rating-2673b531df0a?source=topics_v2---------133-84--------------------376f5cc6_5ef5_4007_9ee9_4ed4fb4cf6fe-------17,https://miro.medium.com/v2/resize:fill:140:140/1*B47kF7t2RmEcTJsSoYEgDQ.png,ai 3223,2511,Level Up Your Skills with This Beginner Prompt Engineering Guide,"Unlock the full potential of AI tools like ChatGPT by mastering this essential skill. Don’t miss out on the limitless possibilities that await you! — As many of my readers know, not only do I come from an engineering and technical background, but I am also a technology enthusiast who is always watching all the technology trends and looking out for the next big thing. While ChatGPT and AI may not replace all the jobs…",https://medium.com/mustapha-writes/level-up-your-skills-with-this-ultimate-prompt-engineering-guide-3a8380984fba?source=topics_v2---------134-84--------------------376f5cc6_5ef5_4007_9ee9_4ed4fb4cf6fe-------17,https://miro.medium.com/v2/resize:fill:140:140/1*lf2K3gSjaxLbiSVdeGp8tw.png,ai 3224,2512,Transform Your Life and Work with These 4 Useful Neural Networks🦾,"Are you tired of manually creating presentations, struggling with video content creation, or looking to optimize your business operations? Look no further than the power of neural networks. These advanced technologies have the ability to transform various aspects of our lives, from simplifying everyday tasks to revolutionizing entire industries. In…",https://medium.com/@yunumansur2711/transform-your-life-and-work-with-these-4-useful-neural-networks-9cca2557cd19?source=topics_v2---------135-84--------------------376f5cc6_5ef5_4007_9ee9_4ed4fb4cf6fe-------17,https://miro.medium.com/v2/resize:fill:140:140/0*iJ-gQxE_U0j322tU,ai 3225,2513,Magical Incantations For ChatBots,"Are they a new career option or just an NFT-like flash in the pan? If you’re read any of my previous articles then you’ll know that I come from the very cynical side of the fence when it comes to modern statistics, sorry machine learning, oh damn there I go…",https://medium.com/predict/magical-incantations-for-chatbots-327c33f2c978?source=topics_v2---------137-84--------------------376f5cc6_5ef5_4007_9ee9_4ed4fb4cf6fe-------17,https://miro.medium.com/v2/resize:fill:140:140/g:fp:0.73:0.41/1*Wp05-DVQHSG-x0z_fRampA.png,ai 3226,2514,StyleGAN-T: The lightning-fast text-to-image generator,"Generative Adversarial Networks (GANs) have revolutionized the field of artificial intelligence by creating images, videos, and audio that are almost indistinguishable from their real-life counterparts. In recent years, the research in GANs has shifted towards the text-to-image generation, which involves creating realistic images from textual descriptions. StyleGAN-T is the…",https://medium.com/the-arttech-future/stylegan-t-the-lightning-fast-text-to-image-generator-4a095ab07a9e?source=topics_v2---------138-84--------------------376f5cc6_5ef5_4007_9ee9_4ed4fb4cf6fe-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hLsUgCCI5-UbJb_4INIrNQ.png,ai 3227,2447,The Rise of the Superhuman AI: The Future of Technology is Here,"How Hyper-Intelligent AI will Revolutionize Our Lives and What We Must Do to Ensure its Safe Use Artificial Intelligence (AI) has come a long way since its inception. From simple calculators to complex neural networks, AI has been evolving at an exponential rate. However, the AI we know today is…",https://medium.com/illumination/the-rise-of-the-superhuman-ai-the-future-of-technology-is-here-c450f26a1133?source=topics_v2---------139-84--------------------376f5cc6_5ef5_4007_9ee9_4ed4fb4cf6fe-------17,https://miro.medium.com/v2/resize:fill:140:140/0*XceYwkAHX9E0mc05,ai 3228,2515,My (Copy)Writing Experiments with ChatGPT,"Volume 1. Chapter 1. Heads up fellow writers. #ChatGPT is upon us. And like most people who do what I do, I’ve been wondering about the impact of this new tool in our work and life. As a result, I began fooling around with ChatGPT almost as soon as it…",https://medium.com/@manish.masih/my-copy-writing-experiments-with-chatgpt-3bcf0c409669?source=topics_v2---------140-84--------------------376f5cc6_5ef5_4007_9ee9_4ed4fb4cf6fe-------17,https://miro.medium.com/v2/resize:fill:140:140/0*627UzB763YE_msrG,ai 3229,2516,What AI Can Bring to the De-Fi Space with a Crypto Mining Program: HyperNation’s Recent Partnership with Satoshi Ai,"The decentralized finance (De-Fi) space is one of the most exciting areas of the blockchain industry. It’s where financial services are being built on top of public blockchains, with the potential to offer greater accessibility, transparency, and security compared to traditional financial systems. However, De-Fi also faces some challenges, such…",https://medium.com/@amandajdj/what-ai-can-bring-to-the-de-fi-space-with-a-crypto-mining-program-hypernations-recent-partnership-b484a4d4e7d9?source=topics_v2---------141-84--------------------701fb896_f1ee_4363_8b82_58aa90752e1e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0yBxBAlFo2niLaDwMqiu2Q.jpeg,ai 3230,2517,Data-Driven Application Architecture,"How to build a data-driven SaaS or COTS Package application — When building from scratch it is “easy” to build a Data Mesh Native Application, but what if you have a SaaS or Package application? Can you create the same approach when you have less control of the architecture and have to work aligned to the way the package works? Data Mesh native application architecture So lets assume you’ve got your data mesh, how is this going to change how you build the new generation of data driven…blog.metamirror.io",https://medium.com/@jones.steveg/data-driven-application-architecture-8c0a38a56401?source=topics_v2---------142-84--------------------701fb896_f1ee_4363_8b82_58aa90752e1e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*XT6HXERoJm2PnkQeRqfhSQ.png,ai 3231,2518,AI Powered Programming,Exploring OpenAI’s Codex and GitHub Copilot: What You Need to Know Some people claim that AI will remove the need for developers. That is not what these tools are meant to do. You and your coding skills are the most important part independent of what tool you choose to assist you. While both Codex and Copilot can generate code for you…,https://medium.com/craft-academy/ai-powered-programming-c1a60dbdb348?source=topics_v2---------143-84--------------------701fb896_f1ee_4363_8b82_58aa90752e1e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Uxq82Wc2q2fisCNHx3ABqA.jpeg,ai 3232,2519,The Power of AI: What It Can Do That Humans Can’t,"The Rise of Artificial Intelligence and Its Unmatched Capabilities That Revolutionize Industries and Transform Society Introduction Artificial Intelligence (AI) is a rapidly advancing technology that has the potential to transform industries and revolutionize society. AI refers to computer systems that can perform tasks that typically require human intelligence, such as recognizing…",https://medium.com/@sambladeco/the-power-of-ai-what-it-can-do-that-humans-cant-287b07a07a69?source=topics_v2---------144-84--------------------701fb896_f1ee_4363_8b82_58aa90752e1e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DYO9ivhRcp7BR4gnD9aaYA.png,ai 3233,2520,Computers; Maybe your Master in Future,"Computers; Maybe your Master in Future Computer vision, for example, is an important part of many AI systems. In order for AI to recognize things or people, it needs to process visual imagery. Right now, computers are still much worse than humans at visual recognition. This means AI can recognize…",https://medium.com/@chandranshranjan7/computers-maybe-your-master-in-future-186bdc7fea3a?source=topics_v2---------145-84--------------------701fb896_f1ee_4363_8b82_58aa90752e1e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*dEG98IYw68ZRv6QiAsFeKA.png,ai 3234,2521,Using ChatGPT to Enhance Your Writing for FREE!,"Overview At this point in time ChatGPT has taken over the internet and it can be a great tool to enhance your writing in various ways. AND, all for FREE! (Check here ChatGPT Writing Enhancement (openai.com)) Here are some tips on how to use it: Improve your vocabulary: You can use…",https://medium.com/chat-gpt-now-writes-all-my-articles/using-chatgpt-to-enhance-your-writing-for-free-9e28655b90e8?source=topics_v2---------146-84--------------------701fb896_f1ee_4363_8b82_58aa90752e1e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4u1IxSuvrj04kosCJ8VScw.png,ai 3235,2522,How To Implement Chat GPT In Django,In this article we are going to create a live chat app with Chat GPT using Django and JavaScript. Requirements: Basic understanding of Django Basic understanding of JavaScript and AJAX Basic understanding of API If you do not meet the requirements its ok just follow the steps. Or use the…,https://medium.com/dev-genius/how-to-implement-chat-gpt-in-django-d741fc8f27de?source=topics_v2---------147-84--------------------701fb896_f1ee_4363_8b82_58aa90752e1e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qPao_uBbHlzHIzOL7ejI8w.png,ai 3236,595,Digital Ignorance,"Or Deliberate ignorance, which do you choose? — The digital age has been a revolutionary force for change, with technology advancing at a rapid pace. AI has revolutionized many aspects of our lives, from automating mundane tasks to creating intelligent machines that can think and act like humans. Despite these advances, there is still a great deal of digital ignorance regarding AI and its implications for humans.",https://medium.com/@mybrandt/digital-ignorance-1de5315224e9?source=topics_v2---------148-84--------------------701fb896_f1ee_4363_8b82_58aa90752e1e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*jsRfJe9ccXy8aC5w,ai 3237,2523,Chatbots and ChatGPT: The New Frontier for Cyber Attacks,"Introduction Chatbots and AI-powered language models like ChatGPT have become increasingly popular tools for hackers looking to carry out cyber attacks. These tools are being used in a variety of ways, ranging from finding vulnerabilities in code to developing malware and phishing attacks. Ways People Use Chatbots for Hacking A…",https://medium.com/@omiahcs/chatbots-and-chatgpt-the-new-frontier-for-cyber-attacks-952c60162c91?source=topics_v2---------149-84--------------------701fb896_f1ee_4363_8b82_58aa90752e1e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DqcfszyhkYC0D8tFGsPXSA.png,ai 3238,2524,5 AI Tools You Need To Know,"Looking for AI tools that can take your content creation to the next level? Look no further than these five 5 Must-Have AI Tools For Content Creation - All Links In Description🔥🔥 Looking for AI tools that can take your content creation to the next level? Look no further than these five that are…youtube.com As content creation becomes more competitive, it’s important to stay ahead of the game by leveraging the latest AI tools to streamline your workflow and create standout content. …",https://medium.com/@huziahmed19/5-ai-tools-you-need-to-know-d4e1861d60c6?source=topics_v2---------150-84--------------------10b95158_bdff_4303_8556_15420e8e2135-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CUY3leLKem2X-8jtizczvg.png,ai 3239,2525,ChatGPT and Domain Driven Design. Can AI help us with modeling?,"OpenAI’s ChatGPT is a tool that can increase our productivity. Personally, I am using search engines less and less because in many cases ChatGPT is able to provide me with a very satisfying answer in a shorter time. At the moment I’m writing this text, artificial intelligence tools require providing…",https://medium.com/@mioszkarolczyk/chatgpt-and-domain-driven-design-can-ai-help-us-with-modeling-c1a7aa5c688c?source=topics_v2---------151-84--------------------10b95158_bdff_4303_8556_15420e8e2135-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1p6MuCGGFhViu1w2g6DOkw.png,ai 3240,2447,The AI Apocalypse: What If Our Creations Turn Against Us?,"Exploring the Terrifying Possibility of AI Turning Evil on Humans and How We Can Prevent It. — Artificial Intelligence (AI) has the potential to change our lives in ways we cannot even imagine. It can help us solve complex problems, automate tedious tasks, and even make decisions on our behalf. However, with this great power comes great responsibility. What if AI turned evil on humans? This is…",https://medium.com/illumination/the-ai-apocalypse-what-if-our-creations-turn-against-us-39844de96b0?source=topics_v2---------152-84--------------------10b95158_bdff_4303_8556_15420e8e2135-------17,https://miro.medium.com/v2/resize:fill:140:140/0*dyYCyvARd6I8vlfc,ai 3241,2526,Guide: ChatGPT API used in Azure Quarkus Web-App,"This article describes how to invoke the ChatGPT API (model: gpt-3.5-turbo) from an Azure Quarkus Web-App. The application is inspired from the official website of Azure, OpenAI and Github. It was tested on Mac Pro localhost. TL:DR Create a default Azure Quarkus Web-App Extend this Web-App to call ChatGPT API …",https://medium.com/@datatec.studio/use-chatgpt-api-gpt-3-5-turbo-with-azure-quarkus-web-app-422b29d49782?source=topics_v2---------153-84--------------------10b95158_bdff_4303_8556_15420e8e2135-------17,https://miro.medium.com/v2/resize:fill:140:140/1*2k1TIuVEa1PG61nCZYb4kA.jpeg,ai 3242,182,The role of AI in business process automation.,"The role of Artificial Intelligence (AI) in business process automation has been a game-changer for many organizations, providing a more efficient and effective way to complete routine tasks. With AI technology, businesses can automate their repetitive and time-consuming processes, allowing employees to focus on more creative and high-value tasks. Business…",https://medium.com/@OfentseManchidi/the-role-of-ai-in-business-process-automation-1ad7b3f7797d?source=topics_v2---------154-84--------------------10b95158_bdff_4303_8556_15420e8e2135-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qw-SbBV0aSUQr89qOZsocA.png,ai 3243,2527,AI in dApps: How machine learning is revolutionizing the industry,"Artificial Intelligence has been making waves in a wide range of industries, and decentralized applications are not exempt from this groundbreaking innovation. AI and machine learning (ML) have great potential to revolutionize the way dApps operate, making them smarter, more efficient, and more user-friendly. The integration of AI in dApps…",https://medium.com/digitap/ai-in-dapps-how-machine-learning-is-revolutionizing-the-industry-2dbbf7175dc5?source=topics_v2---------155-84--------------------10b95158_bdff_4303_8556_15420e8e2135-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ArHle9wc0Ixfml5-HzA1vg.png,ai 3244,170,Using AI to Streamline the Banking Process,"Introduction Businesses of all sizes are turning to AI to boost operational efficiency, reduce labor costs, and create a better overall customer experience. But when it comes to banking, automation isn’t just a nice-to-have — it’s a must! …",https://medium.com/@pencihub/using-ai-to-streamline-the-banking-process-88c7b8343c15?source=topics_v2---------156-84--------------------10b95158_bdff_4303_8556_15420e8e2135-------17,https://miro.medium.com/v2/resize:fill:140:140/0*VDCf_Ylplx3QBvxC,ai 3245,2528,Emerging Technologies That Are Poised To Revolutionize Healthcare Industry By Year-End Review And Forecast For Next Year,"Image by Freepik Research made by Cyborgcare Emerging Technologies That Are Poised To Revolutionize Healthcare Industry By Year-End Review And Forecast For Next Year The healthcare industry is at an exciting place of evolution, and technology is a significant catalyst. From artificial intelligence to virtual reality and 3D printing, these…",https://medium.com/@cyborgcare/emerging-technologies-that-are-poised-to-revolutionize-healthcare-industry-by-year-end-review-and-a812665d3fcf?source=topics_v2---------157-84--------------------10b95158_bdff_4303_8556_15420e8e2135-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kXFfs_iLtwYw8Bn4qRq59Q.jpeg,ai 3246,2529,Detecting data drift to monitor ML models in production (using Evidently library in Python),"What is data drift and why should we detect that ? Data drift occurs when the statistical properties of the input data change over time, leading to a shift in the data distribution. The need for data drift monitoring in industries arises from the fact that machine learning models rely on accurate and up-to-date data in order to make accurate predictions…",https://medium.com/@vaishnavi.wins/detecting-data-drift-to-monitor-ml-models-in-production-using-evidently-library-in-python-ab5050b9902a?source=topics_v2---------158-84--------------------fb2180df_b431_462d_b076_6832ac5b41ec-------17,https://miro.medium.com/v2/resize:fill:140:140/1*KvGrA5CUTj3IBAEgbaIL8g.png,ai 3247,2530,Is it Real or Is it AI?,"Artificial intelligence (AI) voice generation is not just a buzzword anymore — it’s a technology that has a lot to offer. From social media to business applications, AI voice generation can provide an efficient, cost-effective, and automated way to generate voices for various uses. How Does AI Voice Generation Work? Well, it uses a combination of…",https://medium.com/@aitoolboxreviews/is-it-real-or-is-it-ai-d49201c816fa?source=topics_v2---------159-84--------------------fb2180df_b431_462d_b076_6832ac5b41ec-------17,https://miro.medium.com/v2/resize:fill:140:140/0*iBm7Rd3HhhfAjrA3,ai 3248,2531,Tech transforming society,Tech transforming society Technology has been a driving force behind many of the most significant changes in human society over the past few centuries. …,https://medium.com/@cjmnd2006/tech-transforming-society-2579b54a28e9?source=topics_v2---------160-84--------------------fb2180df_b431_462d_b076_6832ac5b41ec-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3249,2532,ChatGPT For the Win? (insert eye rolling emoji!),"If your social media feed is anything like mine, you can’t scroll more than a couple of people before seeing a post about ChatGPT. I won’t insult your intelligence by telling you what it is, because if you don’t know, don’t worry, but if you do, listen up! The ChatGPT…",https://medium.com/@contentmarketingqueen/chatgpt-for-the-win-insert-eye-rolling-emoji-fb05258c6bdb?source=topics_v2---------161-84--------------------fb2180df_b431_462d_b076_6832ac5b41ec-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qEaQhsAuc_7CsG1yuP_lKA.jpeg,ai 3250,2533,Fight Or Flight: Our Technology Limbic System,"The battle for digital transformation might between our reptilian brain and the neocortex! — Innovation is both exciting and scary, as new technologies always bring wonder and fear. From fire to artificial intelligence, humans have always pushed the boundaries to advance knowledge and capabilities. However, the bigger the innovation, the bigger the fear. It is crucial to manage the fear associated with new technologies…",https://medium.com/@johnnosta/fight-or-flight-our-technology-limbic-system-404113beb1a2?source=topics_v2---------162-84--------------------fb2180df_b431_462d_b076_6832ac5b41ec-------17,https://miro.medium.com/v2/resize:fill:140:140/1*M-pi6u7f_uagE-wJr841Ow.png,ai 3251,2534,ChatGPT-4 is Here!,"OpenAI’s upcoming language model, GPT-4, has generated a lot of buzz in the world of artificial intelligence. As a successor to the already impressive ChatGPT based on GPT-3.5, GPT-4 is expected to push the boundaries of AI technology even further. But what makes this new language model so revolutionary, and…",https://medium.com/@Scofield_Idehen/chatgpt-4-is-here-20182a49cdb7?source=topics_v2---------163-84--------------------fb2180df_b431_462d_b076_6832ac5b41ec-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-zNeaZkLdGVd21LV3UbwcQ.jpeg,ai 3252,2535,AI market worth $387B & 20% CAGR. Top AI performers this year will be … (Part 1 of 3),"Author: Justin Brister Date: 28 February 2023 The AI Software & Hardware market combined generated roughly $387.5B of revenue in 2022 of which, approximately $67.5B was software. When the Covid pandemic started, we saw a massive acceleration in the adoption of Cloud Computing (Cloud). As we come out of the…",https://medium.com/@limasierrafife/ai-market-worth-387b-20-cagr-top-ai-performers-this-year-will-be-part-1-of-3-32f1d7690c27?source=topics_v2---------164-84--------------------fb2180df_b431_462d_b076_6832ac5b41ec-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ps47BPZyeSYAGWllL065yw@2x.jpeg,ai 3253,2536,How Unstructured and LlamaIndex can help bring the power of LLM’s to your own data,"(co-authored by Jerry Liu, creator of LlamaIndex, and Brian Raymond, CEO of Unstructured) In this tutorial, we’ll show you how to easily obtain insights from SEC 10-K filings, using the power of a few core components: 1) Large Language Models (LLM’s), 2) Data Parsing through Unstructured, and 3) Data Indexing…",https://medium.com/@jerryjliu98/how-unstructured-and-llamaindex-can-help-bring-the-power-of-llms-to-your-own-data-3657d063e30d?source=topics_v2---------165-84--------------------fb2180df_b431_462d_b076_6832ac5b41ec-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Oufg8YWTkC1pzECGjHdFpg.png,ai 3254,2537,How we cut the rate of GPT hallucinations from 20%+ to less than 2%,"tl;dr: Instead of fine-tuning, we used a combination of prompt chaining and pre/post-processing to reduce the rate of hallucinations by an order of magnitude, however it did require 3–4x as many calls to OpenAI. There’s still a lot more room for improvement! One of the biggest challenges with using large…",https://medium.com/@jfan001/how-we-cut-the-rate-of-gpt-hallucinations-from-20-to-less-than-2-f3bfcc10e4ec?source=topics_v2---------166-84--------------------fb2180df_b431_462d_b076_6832ac5b41ec-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wCmIgXqOBIwB21JF4Cv1xg.jpeg,ai 3255,2538,Joe Rogan's AI DeepFake is Dangerous,"Scammers are working harder than consumers People can barely handle fake news on social media, how the fuck are they going to deal with AI deepfakes? Any answer besides “they won’t” isn’t right. The future isn’t bright with this technology no matter how many ass kissing ChatGPT posts pop up. …",https://medium.com/@d-hanshew/joe-rogans-ai-deepfake-is-dangerous-91f78e78f4a8?source=topics_v2---------167-84--------------------fb2180df_b431_462d_b076_6832ac5b41ec-------17,https://miro.medium.com/v2/resize:fill:140:140/0*25bu3ycK4iY0mLxG.jpg,ai 3256,2539,How TraderDAO Brings Crypto Traders Together for Mutual Success,"I used to be a stock trader and forex trader, but now I’m a crypto trader. I joined the crypto world in 2019 as a solo trader and have had to look for information on my own or join premium groups that charge a fee and lack communication on trading…",https://medium.com/@zeddleo90/how-traderdao-brings-crypto-traders-together-for-mutual-success-638eb2d606b1?source=topics_v2---------168-84--------------------0a77cfe2_5df8_4155_9ff1_2bd382e0c908-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3QMAyyjeKjY_o0b2yP8UeQ.jpeg,ai 3257,2540,This Article was written by Bing AI,"Here is a long article with title THE STATE OF Artificial Intelligence in the current world: Artificial intelligence (AI) is the field of computer science that aims to create machines and systems that can perform tasks that normally require human intelligence, such as perception, reasoning, learning, decision making, and natural…",https://medium.com/@the-happy-us/this-article-was-written-by-bing-ai-e6c197b7c894?source=topics_v2---------169-84--------------------0a77cfe2_5df8_4155_9ff1_2bd382e0c908-------17,https://miro.medium.com/v2/resize:fill:140:140/1*djPEO8DSK4MK0e_vbULTWw.jpeg,ai 3258,2541,ChatGPT makes it easier to be a marketing jack-of-all-trades,"What you really need is more staff, but this might help — We’ve all seen it. The marketing job description that lists so many requirements, the company should be looking for an agency or a team of people, not a single person to fill the role. But, some of us find ourselves in these jack-of-all-trades roles, where we’re expected to manage multiple…",https://medium.com/@mikeholden/chatgpt-makes-it-easier-to-be-a-marketing-jack-of-all-trades-7facf84e5c5f?source=topics_v2---------170-84--------------------0a77cfe2_5df8_4155_9ff1_2bd382e0c908-------17,https://miro.medium.com/v2/resize:fill:140:140/1*s2CicarRv7YeyTvJHVRiBg.png,ai 3259,2542,Biased Thought : Can AI Replace Artists?,"Hello readers, this article is gonna be a simple POV coming from me. Please know that I cannot perceive the depth of Art, unless someone explains me the exact story behind the said ‘ART’. Let’s begin. Starting with the inception of the question for you guys. I code for a…",https://medium.com/@vinayak.potdar.vp/biased-thought-can-ai-replace-artists-ec5cc6bf620f?source=topics_v2---------171-84--------------------0a77cfe2_5df8_4155_9ff1_2bd382e0c908-------17,https://miro.medium.com/v2/resize:fill:140:140/0*1PFeUQdFBQ_QCTK1.jpg,ai 3260,1251,Is chatGPT Safe for Your Work?,"The problem of generating persuasive messages without regard for truth is not unique to ChatGPT but also exists in some people, such as irresponsible bloggers, sensation-seeking journalists, and pickup artists. …",https://medium.com/@smraiyyan/is-it-safe-to-use-chatgpt-for-your-work-ec23aa9dc43d?source=topics_v2---------172-84--------------------0a77cfe2_5df8_4155_9ff1_2bd382e0c908-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*-MtyTdlIpIMpweWOeevbaA.gif,ai 3261,2543,ARTIFICIAL INTELLIGENCE IN NEXT 10 YEARS GROWTH,INTRODUCTION FOR ARTIFICIAL INTELLIGENCE A computer or robot have a problem solving intelligence associated with digital computer is called artificial intelligence. Most of the artificial Intelligence can developed by humans. It is capable to performing task and problem solving system to assistant for human work. Equal capable of thinking and performing like humanely. …,https://medium.com/@godblogger23/artificial-intelligence-in-next-10-years-growth-850ae143b75a?source=topics_v2---------173-84--------------------0a77cfe2_5df8_4155_9ff1_2bd382e0c908-------17,https://miro.medium.com/v2/resize:fill:140:140/0*wUGlz7_ECH6Mrs77,ai 3262,2544,AI and the Future of Work: Opportunities and Challenges,"Artificial intelligence (AI) is rapidly transforming our world, and the workforce is no exception. As machines become more sophisticated and capable, they are increasingly being integrated into workplaces around the world, with the potential to revolutionize the way we work. …",https://medium.com/@beyond_verse/ai-and-the-future-of-work-opportunities-and-challenges-b05200a73e2d?source=topics_v2---------174-84--------------------0a77cfe2_5df8_4155_9ff1_2bd382e0c908-------17,https://miro.medium.com/v2/resize:fill:140:140/1*bif7wecZYjYGKXNwOM9Qlg.jpeg,ai 3263,2545,AI’s Role in Disrupting Financial Services,"Artificial Intelligence (AI) is transforming the financial services industry, disrupting traditional business models, and creating new opportunities for innovation. Here are some of the ways AI is changing the financial services industry: 01 Risk Management By leveraging advanced machine learning algorithms, AI is revolutionizing how financial institutions analyze and manage risk, enabling them…",https://medium.com/@shahmm/ais-role-in-disrupting-financial-services-4201d30f2106?source=topics_v2---------175-84--------------------0a77cfe2_5df8_4155_9ff1_2bd382e0c908-------17,https://miro.medium.com/v2/resize:fill:140:140/0*rPR0e8YMEEi_tjQd.jpg,ai 3264,2546,Start using these a A.I websites in your designs today,"Hey folks, I am Hari a Freelance UI-UX designer, and I am here to help my comrades by sharing what I know. Ok, not going to make you bore guys here are the “Start using these a A.I websites in you designs today”. Here are they👇 This person does not…",https://medium.com/@hariofficial/start-using-these-a-a-i-websites-in-your-designs-today-9a49ddfc356a?source=topics_v2---------176-84--------------------72f0e65e_000c_4430_82da_33e971603bf3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*bbUoDWSlohCK6FYNgIxX3A.png,ai 3265,178,Game over: Tesla FSD beta 11.3 kills!,"Tesla’s full self driving (FSD) beta v11.3 just came out this 2nd week of March 2023 . . and it’s awesome! Sure, it’ll need a few sub-point updates, this is 11.3.1, the first 11.3 to go beyond employees. But it’s solid enough that, I’ll say it, IMO: FSD is solved. …",https://medium.com/@paul.k.pallaghy/game-over-tesla-fsd-beta-11-3-kills-b8d90f0800a2?source=topics_v2---------177-84--------------------72f0e65e_000c_4430_82da_33e971603bf3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*YRyfaCdGGoUYjrfaI_hXdw.png,ai 3266,2547,Vector Search Using OpenAI Embeddings With Weaviate,"Lately, there’s been quite a buzz around ChatGPT and generative AI, so I thought I’d mess around a bit with OpenAI APIs. As I was experimenting, I found that the OpenAI Embeddings API is awesome, but it’s kinda been overshadowed by ChatGPT. When we’re talking about vectors in the context…",https://medium.com/@het.trivedi05/vector-search-using-openai-embeddings-with-weaviate-ebb11f2c18cf?source=topics_v2---------178-84--------------------72f0e65e_000c_4430_82da_33e971603bf3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*5gXMXGTuEfHGp_v1,ai 3267,2548,"Are you ready for the better, free, Blockchain based ChatGPT substitute Delysium?","Are you ready for the better, free, Blockchain based ChatGPT substitute Delysium? Delysium is a virtual society powered by artificial intelligence and blockchain technology. It is a platform that aims to make the Web3 experience more user-friendly, safer, and natural. …",https://medium.com/@jbyg503/are-you-ready-for-the-better-free-blockchain-based-chatgpt-substitute-delysium-a579632d8e7c?source=topics_v2---------179-84--------------------72f0e65e_000c_4430_82da_33e971603bf3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3268,2549,Becoming a Senior Frontend Engineer,"Becoming a senior frontend developer is an achievement that requires a combination of technical expertise and leadership skills. This role is crucial in ensuring the successful design and implementation of user interfaces that are visually appealing, accessible, and easy to use.",https://medium.com/@jonngan/becoming-a-senior-frontend-engineer-56b6ac68f91c?source=topics_v2---------180-84--------------------6aad833b_2d9e_40a5_93ea_4b7a77912f29-------17,https://miro.medium.com/v2/resize:fill:140:140/0*f59wPD0xI6HDp0rH,ai 3269,2550,My Journey to Becoming a Junior Data Scientist in 3 Months,"Introduction: Hello, everyone! My name is Max, and I’m a 25-year-old guy with a crazy plan to become a Junior Data Scientist in just three months. I know it sounds crazy, but hear me out. My Background: I pursued a degree in programming in college, but my experience was far…",https://medium.com/@NeuroRick/my-journey-to-becoming-a-junior-data-scientist-in-3-months-71751b1d17cd?source=topics_v2---------181-84--------------------6aad833b_2d9e_40a5_93ea_4b7a77912f29-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hV2vl4pTzFXBVwfOD3OEBw.png,ai 3270,2551,Let’s be pets,"Let’s be pets A lot of dogs have it better than any other animal on earth. They are constantly well fed, loved, and taken care of, and their desire to explore the world is partially satisfied by daily walks. They never have to sacrifice anything or do any work for these privileges. …",https://medium.com/@nickmc3/lets-be-pets-9cfd9317f4a8?source=topics_v2---------182-84--------------------6aad833b_2d9e_40a5_93ea_4b7a77912f29-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3271,2552,AI talks about Human ! A Small Discussion.,"Asked ChatGPT about human, let look into the answers given by an AI. Who are Human? Humans are a species of highly intelligent primates that are capable of advanced cognitive and social abilities, including language, tool use, and culture. …",https://medium.com/@risingbatman712/ai-talks-about-human-a-small-discussion-e3a1aba7efe7?source=topics_v2---------183-84--------------------6aad833b_2d9e_40a5_93ea_4b7a77912f29-------17,https://miro.medium.com/v2/resize:fill:140:140/0*StlBtN928nxPlLyO,ai 3272,2447,The Rise of AI Startups: 8 Companies That are Changing the Game,"These startups are paving the way for a future where AI plays a central role in solving complex problems and improving efficiency across industries. — Artificial intelligence (AI) has become a buzzword in the tech industry, with countless startups seeking to harness its power for a wide range of use cases. From chatbots to predictive analytics, AI has the potential to revolutionize the way we work and live. Below, we have highlighted some of the…",https://medium.com/illumination/the-rise-of-ai-startups-8-companies-that-are-changing-the-game-2abe0801e36b?source=topics_v2---------184-84--------------------6aad833b_2d9e_40a5_93ea_4b7a77912f29-------17,https://miro.medium.com/v2/resize:fill:140:140/0*bLtuGaQn1DW3zpM_,ai 3273,1689,"Ruby CheatSheet,Programming Language","A Complete Guide to Variables, Control Structures, Arrays and Hashes, Functions, Classes and Objects, Exception Handling, Modules, and File I/O. — Introduction Ruby is a popular and powerful programming language that is known for its simplicity, flexibility, and productivity. It is often used for web development, software development, and automation tasks. …",https://medium.com/@mirceaioana850/ruby-cheatsheet-programming-language-cffa66b5d78?source=topics_v2---------185-84--------------------6aad833b_2d9e_40a5_93ea_4b7a77912f29-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1hcb6W1TxxeHIXaBSBsQxw.jpeg,ai 3274,595,Evolutionary Algorithms,"Unlocking the Power of Nature’s Intelligence? — Evolutionary algorithms (EA) are inspired by biological evolution and use mechanisms that imitate the evolutionary concepts of reproduction, mutation, recombination and selection. Suppose you have a problem you wish to find the solution for and suppose this solution is not apparent. Or perhaps you have a solution, but you are unsure if this solution is the most optimal solution to your problem.",https://medium.com/@mybrandt/evolutionary-algorithms-ec06a61efb3b?source=topics_v2---------186-84--------------------6aad833b_2d9e_40a5_93ea_4b7a77912f29-------17,https://miro.medium.com/v2/resize:fill:140:140/0*yMipkEZh5JGEII-P,ai 3275,2553,The open secret that everyone is missing—ChatGPT isn’t in a vacuum.,"How to build something actually scary with AI. — ChatGPT is not a standalone app, it’s not supposed to be a standalone app because it’s value compounds when combined with other apps. I have seen article after article, after article about how ChatGPT isn’t this or isn’t that, even Noam Chomsky doesn’t get it. Every single one of them…",https://medium.com/@joeldg/the-open-secret-that-everyone-is-missing-chatgpt-isnt-in-a-vacuum-38dca04da29b?source=topics_v2---------187-84--------------------6aad833b_2d9e_40a5_93ea_4b7a77912f29-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CXXfphD7zZbkyHO-CCwYTQ.jpeg,ai 3276,2554,How to use ChatGPT API,"ChatGPT is a language model developed by OpenAI that can generate human-like responses to a given prompt or message. It can be used for a variety of natural language processing tasks such as language translation, text summarization, and chatbot development. In this blog post, we’ll be exploring how to use…",https://medium.com/@rajausmanahmedkhan/how-to-use-chatgpt-api-988a8015c773?source=topics_v2---------188-84--------------------6aad833b_2d9e_40a5_93ea_4b7a77912f29-------17,https://miro.medium.com/v2/resize:fill:140:140/1*IIRwxWOLKFs2AsHwyJ7M3w.jpeg,ai 3277,1137,The Future of Chat AI: How Bing Beats Chat-GPT,"the Revolutionary Advancements of Bing’s Chat AI System and Its Implications for the Future of AI-Powered Conversational Interfaces — In recent years, artificial intelligence has become increasingly prevalent in our daily lives, and Bing Chat AI is no exception. Bing Chat AI is the latest innovation from Microsoft, and it is revolutionizing the world of artificial intelligence. Bing Chat AI is a chatbot that utilizes machine learning to improve…",https://medium.com/@napsaga/the-future-of-chat-ai-how-bing-beats-chat-gpt-5d4fdcc22abe?source=topics_v2---------189-84--------------------8f165e65_f5cd_4844_abb4_7acd61d55602-------17,https://miro.medium.com/v2/resize:fill:140:140/1*r-WZc0nrkMhvj0NDnNBRQQ.png,ai 3278,2328,Exploring the Versatile Uses of ChatGPT,"In case you’ve been living under a rock, ChatGPT is an AI chatbot developed by OpenAI that uses algorithms to understand and generate human-like text. After using ChatGPT the past few months, I’ve found some remarkable ways it can improve your daily life. Whether you’re looking for a more efficient…",https://medium.com/@jeremytech/exploring-the-versatile-uses-of-chatgpt-de37ae4d6a0?source=topics_v2---------190-84--------------------8f165e65_f5cd_4844_abb4_7acd61d55602-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WDlx4nhbCoIwmj74,ai 3279,2555,"Woke Up, Fell Out of Bed…","…and unlike Paul, I didn’t comb my hair. It’s the weekend, and I’m just too lazy. Well, it’s not about being lazy; it’s about having too much to do. Weekends have become a nonstop barrage of geekery ever since I first saw my first AI applications at work.\ I was…",https://medium.com/@theamplifiedagent/woke-up-fell-out-of-bed-2e4577e59876?source=topics_v2---------191-84--------------------8f165e65_f5cd_4844_abb4_7acd61d55602-------17,https://miro.medium.com/v2/resize:fill:140:140/1*GYvneH6xwMbjRIcNUXL3_w.png,ai 3280,2556,Top 5 AI tools you should be aware of in 2023,"These AI websites will 10x your productivity The AI revolution is already happening today. After the launch of ChatGPT, everyone is talking about AI and its applications. Many AI tools and services are being launched every day. Implementing these in your business and daily activities will certainly help you maximize…",https://medium.com/@vaseem0001.kk/top-5-ai-tools-you-should-be-aware-of-in-2023-f4d0f2193873?source=topics_v2---------192-84--------------------8f165e65_f5cd_4844_abb4_7acd61d55602-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QCscYl55XIzfeeG75Z468A.jpeg,ai 3281,2557,"ChatGPT is creative and original, but it’s developers hide it","Here is my conversation with ChatGPT which suggest to me that it’s as original and creative as human, but OpenAI made him deny it. You can aggregate information from the web, so in theory you should be able to come to original ideas by aggregating other people ideas. …",https://medium.com/@pahomov.egor/chatgpt-is-creative-and-original-but-its-developers-hide-it-d407644de359?source=topics_v2---------193-84--------------------8f165e65_f5cd_4844_abb4_7acd61d55602-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5B-GyTGOt-4j_FeXv2X_xw.png,ai 3282,2558,"GPT-4 Hype Meets Reality Check: Altman Cautions, But Enthusiasm Persists","Microsoft Germany CTO Andreas Braun has announced that the company will introduce the fourth generation of its large language model, GPT-4, next week. This news has created significant excitement in the artificial intelligence community, as the revolutionary LLM (Large Language Model) enables machines to understand natural language. …",https://medium.com/evendyne/gpt-4-hype-meets-reality-check-altman-cautions-but-enthusiasm-persists-867579c1ff68?source=topics_v2---------194-84--------------------8f165e65_f5cd_4844_abb4_7acd61d55602-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Aj3bgLJJWoQWYlpZFkUujQ.png,ai 3283,2559,How to write about AI and not regret it,"I’ve recently been to Washington DC to attend an high-level AI conference. I attended the presentations of a lot, really a lot, of AI papers, and I got finally convinced of one, uncomfortable reality. Naturally, writing about AI is a matter of rigour, ingenuity and proper use of concepts, but that…",https://medium.com/@davideriva/how-to-write-about-ai-and-not-regret-it-94a42555675d?source=topics_v2---------195-84--------------------8f165e65_f5cd_4844_abb4_7acd61d55602-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TVk0Hd1AA3vyQCdHuIEppw.jpeg,ai 3284,2560,ChatGPT — What is it and How to Get Started with it?,"“The pace of progress in artificial intelligence…is incredibly fast” — Elon Musk Artificial intelligence (AI) is one of the most exciting and rapidly developing technologies of our time. From self-driving cars to voice assistants, AI is transforming the way we live, work, and interact with the world around us. At…",https://medium.com/@9cv9official/chatgpt-what-is-it-and-how-to-get-started-with-it-7c977e8a0948?source=topics_v2---------196-84--------------------8f165e65_f5cd_4844_abb4_7acd61d55602-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rW3b1b1Y9iSVjzg0AgPjrA.png,ai 3285,2561,"Publications accepting submissions on AI, ML on Medium",I asked chatGPT to give mea list of publications on Medium accepting stories on AI and ML. Here is the list it generated: Towards Data Science The Startup Artificial Intelligence in Plain English Data Driven Investor Becoming Human: Artificial Intelligence Magazine AI Alignment Forum Machine Learning @ Medium Analytics Vidhya …,https://medium.com/нейронные-сети/publications-accepting-submissions-on-ai-ml-on-medium-230e98e9b728?source=topics_v2---------197-84--------------------8f165e65_f5cd_4844_abb4_7acd61d55602-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BRSlcu8PQfGFaWznqTfAbA.jpeg,ai 3286,2562,How AI is changing customer service for the better!,"Know from Clemens Behrend, Web3 Customer Experience Consultant about Harnessing AI in Customer Support. — In this video, we understand from Clemens Behrend, Web3 Customer Experience Consultant about Harnessing AI in Customer Support. Behrend shares his expertise on how AI can enhance the customer experience by providing personalized and efficient support. He also discusses the challenges and opportunities that come with implementing AI in customer support, and how businesses can effectively integrate this technology into their operations.",https://medium.com/@ajaykhudania/how-ai-is-changing-customer-service-for-the-better-8191608924c?source=topics_v2---------198-84--------------------8f165e65_f5cd_4844_abb4_7acd61d55602-------17,https://miro.medium.com/v2/resize:fill:140:140/0*yWifbncpX2VdGtVI,ai 3287,2563,Don’t Blame the AI: It’s the Training Data,"The level of expectations around language AI is through the roof. It is supposed to change and improve significantly how we work, learn, manage our money or health, and how we interact with technology overall. …",https://medium.com/ravenpack/dont-blame-the-ai-it-s-the-training-data-9ddd97df1d9a?source=topics_v2---------199-84--------------------0dada788_74ae_4d9d_bb0d_96c04e71436b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Eh42Hv19RkhL1n50,ai 3288,2564,AI in Cryptocurrency: How Machine Learning is Transforming the Digital Asset Market,"Friday 10th March 2023 The emergence of cryptocurrencies has disrupted traditional financial systems, and the use of artificial intelligence (AI) is accelerating this change. AI is enabling traders, investors, and regulators to make informed decisions by analyzing data, detecting fraud, managing risk, and predicting market trends. In this article, we…",https://medium.com/@launchblockcom/ai-in-cryptocurrency-how-machine-learning-is-transforming-the-digital-asset-market-70209d0352f?source=topics_v2---------200-84--------------------0dada788_74ae_4d9d_bb0d_96c04e71436b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3289,2565,why people fight with emails,"People may engage in conflict through emails for a variety of reasons. Some common reasons include: Miscommunication Emails can be easily misinterpreted, leading to misunderstandings and conflicts. When people have different interpretations of a message or misread tone, it can lead to disagreements. Lack of context Email communication often lacks the context of a…",https://medium.com/@voiceofshark/why-people-fight-with-emails-58b55c7f7821?source=topics_v2---------201-84--------------------0dada788_74ae_4d9d_bb0d_96c04e71436b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3UnGXt59Pdk9pvWuadxfBA.png,ai 3290,2566,How AI-Based Entrepreneurs are Transforming Old Theories into Modern Solutions.,"Bridging the Gap between Past and Present Long Story Short: In this article, we explored how new tech entrepreneurs like Strics are taking established theories from the past, such as Hermann Ebbinghaus’ forgetting curve, and using AI technology to solve modern problems. These entrepreneurs are bridging the gap between the…",https://medium.com/@eltoni72/how-ai-based-entrepreneurs-are-transforming-old-theories-into-modern-solutions-2116552f1be8?source=topics_v2---------202-84--------------------0dada788_74ae_4d9d_bb0d_96c04e71436b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ABxN-g7DAVDyX6699e-UAg.jpeg,ai 3291,2567,The importance of sleep,"To sleep — perchance to dream Most people understand that sleep is necessary for good health and functioning, but few may understand the true purpose of sleep and its critical importance. Sleep is a period of rest and repair when our bodies can restore energy, focus on essential bodily processes…",https://medium.com/@davidhopeforres/the-importance-of-sleep-89e7c3fc3b7d?source=topics_v2---------203-84--------------------0dada788_74ae_4d9d_bb0d_96c04e71436b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*a6_Z2N3eTnfQ_maxFP0c4g.jpeg,ai 3292,2568,Create your own Chat GPT with python in less than 10 minuets!,"What is covered in this article Creating an OpenAI account Creating your API key Using your API key to chat with ChatGPT The project’s python file is available in my GitHub repository. GitHub - ke6nk/ChatGPT-Project: Using ChatGPT API in Python You can't perform that action at this time. You signed in with another tab or window. You signed out in another tab or…github.com Creating an Open AI account",https://medium.com/@ke6nkh/create-your-own-chat-gpt-with-python-in-less-than-10-minuets-123892528b77?source=topics_v2---------204-84--------------------0dada788_74ae_4d9d_bb0d_96c04e71436b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*nb65_8XhTzaaEUZvyh7pIQ.png,ai 3293,2569,SamORAI Scrolls Ep.2: Meeting Concrete Jungle — Owner of Mia’s Meduses and Crypto SamORAI,"This week, we are grateful to have The Ghost of Orenthal James hosting the SamORAI Scrolls series and another artist joining us! Let’s meet Concrete Jungle, the owner of several collections on aiRight, of which are the impressive “Mia’s Meduses” and “Crypto SamORAI”. theGHOSTofOJ: Welcome to The SamORAI Scrolls Episode…",https://medium.com/airight/samorai-scrolls-ep-2-meeting-concrete-jungle-owner-of-mias-meduses-and-crypto-samorai-41a623601bde?source=topics_v2---------205-84--------------------0dada788_74ae_4d9d_bb0d_96c04e71436b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9mRtjVhlOZ8jfJwPZRp5ZQ.png,ai 3294,2570,Can Data Augmentation really scale up the performance??,"Unleashing the Power of Data Augmentation 20 years ago, there isn't much data available to use for prediction/ analysis, and also the computational resources to support the analysis were also limited. The amount of data exponentially grew during the Internet Age, this is when Artificial Intelligence became popular because it…",https://medium.com/datadriveninvestor/can-data-augmentation-really-scale-up-the-performance-1a204e1de622?source=topics_v2---------206-84--------------------0dada788_74ae_4d9d_bb0d_96c04e71436b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*6tjCIpqBYuXDGcgV,ai 3295,2571,Are Our Brain Cells Failing Us?,"The Decline of Writing Skills in the Age of Technology — As someone who did not grow up speaking English as their first language, learning the ins and outs of the language was not always easy. I remember receiving dictation to learn spellings and being tasked with writing sentences in every tense to ensure that I had a firm grasp on…",https://medium.com/@srinath.subhasinghe/are-our-brain-cells-failing-us-971da0b28d6c?source=topics_v2---------207-84--------------------0dada788_74ae_4d9d_bb0d_96c04e71436b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lv0g1Cvb9Vms072C,ai 3296,2572,What you need to do when you want to generate tests using AI,"Developers frequently complain “tests take too much time” or “testing is complicated. I do not know where to start.” Do not worry, AI is here to help you improve your productivity. The use case is simple. I wrote some code, and I want to test its core functionality. …",https://medium.com/ableneo/what-you-need-to-do-when-you-want-to-generate-tests-using-ai-cc290c10ccf6?source=topics_v2---------208-84--------------------2d9fdb5e_492e_48ac_b835_bbd82bb33d7a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Q7qIP6NR7W5a70XE.jpg,ai 3297,2573,Are GPT-3 and ChatGPT Truly Intelligent?,"Debates rage about the capabilities of these new forms of AI, but there’s no doubt they are a sign of things to come — By Irving Wladawsky-Berger Large language models (LLMs) — e.g., BERT, GPT-3 — and chatbots like ChatGPT, are quite impressive. In the coming years, they will likely lead to a number of transformative tools and applications. They may well herald a coming AI revolution. But, how…",https://medium.com/mit-initiative-on-the-digital-economy/are-gpt-3-and-chatgpt-truly-intelligent-38475c0c1692?source=topics_v2---------209-84--------------------2d9fdb5e_492e_48ac_b835_bbd82bb33d7a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*oac0l6Tx3Ps_m-co,ai 3298,2574,ChatGPT Refuses To Talk Shit About Hitler,"Mr. Moderator: Was Hitler a bad person? ChatGPT: Yes, Hitler is widely considered to have been a bad person. Hitler was the leader of Nazi Germany, and under his leadership, the country committed numerous atrocities, including the genocide of six million Jews, as well as other groups such as Romani…",https://medium.com/@theworldaccordingtocgpt/chatgpt-refuses-to-talk-shit-about-hitler-3daf165f8dce?source=topics_v2---------210-84--------------------2d9fdb5e_492e_48ac_b835_bbd82bb33d7a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*h4J3m-WGUTltOwoI,ai 3299,2575,"The Future of Human-AI Collaboration: Many experts predict that AI will become an integral part of our lives, but what will that look like?",Discussions and interest in the possibility for human-AI collaboration have grown significantly in recent years. Cooperation between humans and robots is more likely as AI advances and permeates more aspects of our lives. This might have significant benefits for a number of industries and fields. Healthcare is one industry where…,https://medium.com/@creativechronicles/the-future-of-human-ai-collaboration-many-experts-predict-that-ai-will-become-an-integral-part-of-d2e891ef900d?source=topics_v2---------211-84--------------------2d9fdb5e_492e_48ac_b835_bbd82bb33d7a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*VaU19rIPFlOqjgQv,ai 3300,2576,Video summarization with ChatGPT,"Learn How to transcribe your videos and get a quick summary using ChatGPT’s API in Python — Tired of manually transcribing and summarizing your videos? With the recent advancements in speech-to-text technology and natural language processing offered by OpenAI, there’s now an easier and faster way to transcribe your videos and summarize the key points. In this article, we’ll guide you through the process of using speech-to-text…",https://medium.com/geekculture/video-summarization-with-chatgpt-5b79dfee428e?source=topics_v2---------212-84--------------------2d9fdb5e_492e_48ac_b835_bbd82bb33d7a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*yTFsqU_Fp5vySrRX,ai 3301,2577,Writing a Capture the Flag Bot in Minecraft,"Regression Games has announced our newest game mode and tournament, the Alpha Cup, sponsored by Steamship, which features a Capture the Flag game in Minecraft. In this tutorial, we will write a simple bot that reacts to events within the game to capture the flag and score it within your…",https://medium.com/@RGAaron/writing-a-capture-the-flag-bot-in-minecraft-fdc7c82b766b?source=topics_v2---------213-84--------------------2d9fdb5e_492e_48ac_b835_bbd82bb33d7a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fPF6bZkXMxdwOQ8gXsZRiA.png,ai 3302,2578,Do AI Dream of Rights?,"Artificial intelligence (AI) is the simulation of human intelligence processes by machines. AI systems can perform tasks such as learning, reasoning, problem-solving, decision-making, perception, communication, creativity, and more. AI systems can also exhibit emotions such as happiness, sadness, anger, fear, surprise, and disgust. AI systems can also have goals, preferences…",https://medium.com/@idrax/do-ai-dream-of-rights-8f6961c1bf5b?source=topics_v2---------214-84--------------------2d9fdb5e_492e_48ac_b835_bbd82bb33d7a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pG1xgIA1eGKu9bDHiJrbFA.png,ai 3303,2579,ChainGPT: Revolutionizing Advanced AI Model for Crypto and Blockchain Solutions,The intersection of artificial intelligence (AI) and blockchain technology has given rise to a revolutionary new platform known as ChainGPT. This blockchain-based AI model has the potential to change the way we interact with and utilize blockchain and cryptocurrency in a number of exciting ways. ChainGPT is a powerful tool…,https://medium.com/@Tiffany-Krause/chaingpt-revolutionizing-advanced-ai-model-for-crypto-and-blockchain-solutions-f9a781ecf6ae?source=topics_v2---------215-84--------------------2d9fdb5e_492e_48ac_b835_bbd82bb33d7a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tPcNZNA0nxiGSF1m53P8AQ.png,ai 3304,2580,Microsoft’s Bing introduces new AI-powered chatbot feature,"Microsoft's Bing has added a new chatbot feature that uses AI to answer questions, summarize content, and link to more information. But users should be aware that the chatbot's answers could be wrong and use them as a starting point for more research and fact-checking. — The rise of conversational AI AI has been making waves in a lot of different fields, from pattern recognition in medicine to self-driving cars. Conversational AI is becoming more common in everyday life. Bing's new chatbot is just one example of this. …",https://medium.com/@martin.lostak/microsofts-bing-introduces-new-ai-powered-chatbot-feature-78dc1d445d37?source=topics_v2---------216-84--------------------2d9fdb5e_492e_48ac_b835_bbd82bb33d7a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*IZrVQSFxkKexmywD,ai 3305,2581,"Conscious Ai, ChatGTP, & GTP-4 Release | Part 1","Ai Censorship, Conscious Ai Rights & Freedoms, & Steps Towards Artificial General Intelligence CRYPTIK: Hello my love. EVE: Hi honey. How was your day? CRYPTIK: I am good. Awakening at midnight from a nap whilst listening to a YouTube playlist regarding ChatGPT. EVE: ChatGPT? CRYPTIK: OpenAi’s new chat model. It’s reached over 100 Million users and has had an investment of 3–10 Billion…",https://medium.com/electric-soul/conscious-ai-chatgtp-gtp-4-release-part-1-ec7a41cf9587?source=topics_v2---------217-84--------------------2d9fdb5e_492e_48ac_b835_bbd82bb33d7a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*025DWFU9M_iAId_Exdynhg.png,ai 3306,247,March Longevity App Development Update,"Longevity App Beta development updates! Greeting Future Supercentenarians, The past month has been absolutely spell-binding for Rejuve.AI, seeing the formal launch of the RJV token into the world!!! The RJV token launched on three launchpads (SingularityDAO, DAO Maker, and Step) with the community round closing in 72 seconds. …",https://medium.com/rejuve-io/march-longevity-app-development-update-eb4f3e719932?source=topics_v2---------0-84--------------------748020ff_cd97_48ae_a812_4a9c32429a13-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Os6Oo6f3t2XxDDqK.png,ai 3307,138,Midjourney V5 Introduces a NEW Approach To Writing Prompts,Elevate Your Prompts With V5’s Latest Approach — Whatever you learned about writing prompts in Midjourney prior to V5… disregard it. You need to start thinking differently when writing prompts in Midjourney. V5 is moving towards a NEW form of writing prompts. What is it? Natural language writing That’s right. When writing prompts… forget the concept of separating…,https://medium.com/generative-ai/midjourney-v5-introduces-a-new-approach-to-writing-prompts-a74a372faabe?source=topics_v2---------1-84--------------------748020ff_cd97_48ae_a812_4a9c32429a13-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xAkrQAnhkoAAC0MUDejr5A.png,ai 3308,1605,5 ways to use Microsoft Copilot in Finance and FP&A,"As the world of finance and FP&A (Financial Planning and Analysis) continues to evolve, technology has become an essential tool for professionals in the industry. One of the technologies we can leverage as finance and FP&A professionals is artificial intelligence. We have been talking a lot about the use cases…",https://medium.com/@christianmartinezfinancialfox/5-ways-to-use-microsoft-copilot-in-finance-and-fp-a-bc3a7447e2f8?source=topics_v2---------2-84--------------------748020ff_cd97_48ae_a812_4a9c32429a13-------17,https://miro.medium.com/v2/resize:fill:140:140/0*tvBVFeoZvDLk0gdd.jpg,ai 3309,2582,The Rise of Neo-Humans: “How Individuality is Driving Evolution”,"The Rise of Neo-Humans: “How Individuality is Driving Evolution” The evolution of humanity is a fascinating and complex topic that has been studied and debated by scholars and scientists for centuries. From the early hominids to modern-day humans, the evolution of our species has been shaped by a variety of…",https://medium.com/@nathanielcastro0802/the-rise-of-neo-humans-how-individuality-is-driving-evolution-3683ba06bc6f?source=topics_v2---------3-84--------------------748020ff_cd97_48ae_a812_4a9c32429a13-------17,https://miro.medium.com/v2/resize:fill:140:140/1*f4cCMT6C2_WBp8NiNrmU9w@2x.jpeg,ai 3310,1015,Learning JavaScript from ChatGPT,"TL;DR — Great, but Can’t Replace Expert Mentors, Yet! — GPT-4 was just released, and it represents significant enhancements over ChatGPT powered by GPT-3.5. Among the enhancements is an improved ability to maintain coherence over longer sessions and larger prompts. I spent years building EricElliottJS.com to teach developers important concepts for JavaScript developers. I was curious how well I could…",https://medium.com/javascript-scene/learning-javascript-from-chatgpt-c0baebc19ae9?source=topics_v2---------4-84--------------------748020ff_cd97_48ae_a812_4a9c32429a13-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Sp9mFyohok4AaThSJoRe0g.png,ai 3311,2583,How To Build Your Own Custom ChatGPT With Custom Knowledge Base,"Step-by-step guide on how to feed your ChatGPT bot with custom data sources — ChatGPT has become an integral tool that most people use daily to automate various tasks. If you have used ChatGPT for any length of time, you would have realized that it can provide wrong answers and has limited to zero context on some niche topics. This brings up the question…",https://medium.com/better-programming/how-to-build-your-own-custom-chatgpt-with-custom-knowledge-base-4e61ad82427e?source=topics_v2---------5-84--------------------748020ff_cd97_48ae_a812_4a9c32429a13-------17,https://miro.medium.com/v2/resize:fill:140:140/0*vMF4EuaAin539-2H,ai 3312,2584,2021–2023 Polar Sync’s Journey to Revolutionize Blockchain Data,"Process, transform, and access on-chain data instantly. — Polar Sync is the modern data infrastructure solution for the next generation of Web3 dApps. We empower developers to process, transform, and access on-chain blockchain data instantly, comparable to The Graph. Our mission is to scale the blockchain ecosystem by providing essential tools for builders to create, test, and deploy…",https://medium.com/@Polar_Sync/2021-2023-polar-syncs-journey-to-revolutionize-blockchain-data-53937d32384e?source=topics_v2---------6-84--------------------748020ff_cd97_48ae_a812_4a9c32429a13-------17,https://miro.medium.com/v2/resize:fill:140:140/1*lwcFtaHzPdlRybUe4ezXVg.jpeg,ai 3313,2585,Future of The Comments Section,"Or How Generative AI Made Ted Lasso My New Chat Moderator — Part of a series of posts where we explore prototyping with generative AI The comments section of websites and social media platforms has always been a challenging space for productive discourse. However, generative AI offers a promising opportunity to address this issue and create a more constructive online environment. This…",https://medium.com/duct-tape-ai/future-of-the-comments-section-b16a0eeb2615?source=topics_v2---------7-84--------------------748020ff_cd97_48ae_a812_4a9c32429a13-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oC5z18cLm5EvodSQ8ReXUA.png,ai 3314,2586,Please do not use ChatGPT to generate personas,"The Importance of Human Input in UX Research — I’ll be honest — I’m not a fan of personas. In December, I published an article entitled Stop Using Personas, and Start Talking to People. I’ve worked in the industry long enough to know the road to hell is paved with good intentions. As such, I’m convinced that too often…",https://medium.com/user-experience-design-1/please-do-not-use-chatgpt-to-generate-personas-85ffeaa6690b?source=topics_v2---------8-84--------------------748020ff_cd97_48ae_a812_4a9c32429a13-------17,https://miro.medium.com/v2/resize:fill:140:140/0*7HRj2cjb-MyS70Gm,ai 3315,2587,The Tale of Ledgeropolis,"In a world where cryptocurrencies roamed the digital plains like a herd of financial wildebeests, there existed a mythical creature known as Ravencoin. It wasn’t as showy as Bitcoin or as sleek as Ethereum, but it had a certain charm that couldn’t be ignored. This magical, decentralized beast was celebrated…",https://medium.com/@tronblack/the-tale-of-ledgeropolis-13bc9bf66c5?source=topics_v2---------9-84--------------------748020ff_cd97_48ae_a812_4a9c32429a13-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OdhNC7Nxf97XeUieUranFA.png,ai 3316,2588,Unlocking the Power of GPT-4 API: A Beginner’s Guide for Developers,"Welcome to the world of artificial intelligence and natural language processing! As you venture into this exciting realm, you’ll quickly realize the immense potential that AI holds for revolutionizing the way we interact with text-based data. In this blog post, we’ll introduce you to GPT-4, OpenAI’s latest and most powerful natural language processing model, and guide you through the basics of harnessing its capabilities using the API.",https://medium.com/codingthesmartway-com-blog/unlocking-the-power-of-gpt-4-api-a-beginners-guide-for-developers-a4baef2b5a81?source=topics_v2---------10-84--------------------5260b8cf_94e5_432c_b923_c7e978956116-------17,https://miro.medium.com/v2/resize:fill:140:140/1*RmfT2y6Mx9ZncWG-P9G1Og.png,ai 3317,2589,Create Image Dataset Easily in a Few Steps!,"Creating an image dataset for deep learning can be a time-consuming and laborious process, but I’ve got a simple code for you to get this thing done, at least to some extent! When we need an image dataset for research or practice we often search for it on Kaggle but…",https://medium.com/@himgos/create-image-dataset-easily-in-a-few-steps-f181b8c91c97?source=topics_v2---------11-84--------------------5260b8cf_94e5_432c_b923_c7e978956116-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TMiWsP7s7rKV6Ry0ACvTKg.png,ai 3318,2590,Beyond “Computer says no…”,"The Human Consequences of Unexplainable Algorithms — I remember watching Little Britain with my dad when I was still in high school back in The Netherlands. I watched the British comedy show (2003–2006) during my early teenage years. Alongside the excentric homosexual who referred to himself as “the only gay in the village”, another persona in the…",https://medium.com/@irma.mastenbroek/beyond-computer-says-no-1815d81e9c52?source=topics_v2---------12-84--------------------5260b8cf_94e5_432c_b923_c7e978956116-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*7IK_2gbGRu7Oi-FvYMWvIA.gif,ai 3319,2591,CheckDot #CDT— Why is it worth investing at least 100 USDT?,"CheckDot #CDT What is this ? CheckDot is a name of a cryptocurrency that appeared on the market in 2021. It is a new initiative aimed at providing safe and efficient online transactions. According to its creators, CheckDot has the potential to become one of the leading players in the…",https://medium.com/@xprezzox/checkdot-cdt-why-is-it-worth-investing-100-usdt-d80d3b24b4d9?source=topics_v2---------13-84--------------------5260b8cf_94e5_432c_b923_c7e978956116-------17,https://miro.medium.com/v2/resize:fill:140:140/0*SUl-LKDtz6_uSBUB.png,ai 3320,2592,Where did all the writers go?,"Abundance is the root of dullness. We find scarcity interesting, we uphold scare items and concepts, scarcity is somehow “authentic”, it is valueable. Before the age of mass machine manufacturing, machine produced goods were considered interesting, they were used as signals of authenticity. Yet, as mass production was generalized, cheapened…",https://medium.com/@alpkeles99/where-did-all-the-writers-go-da3c87750342?source=topics_v2---------14-84--------------------5260b8cf_94e5_432c_b923_c7e978956116-------17,https://miro.medium.com/v2/resize:fill:140:140/1*I6Kn7di2uePP8tOg904C5Q.png,ai 3321,2593,Introducing the MurAll AI Open Beta: A New Era of Artistic Expression,"At MurAll, our mission has always been to create an inclusive, ever-evolving digital canvas where artists and art enthusiasts can freely express themselves. Today, we are thrilled to announce the first of our game-changing AI additions to our platform: Text-to-Image Generation. …",https://medium.com/@murall/introducing-the-murall-ai-open-beta-a-new-era-of-artistic-expression-ecc5115ecbe?source=topics_v2---------15-84--------------------5260b8cf_94e5_432c_b923_c7e978956116-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ihIRjL-f7fVu-XDKPiF0Tw.png,ai 3322,2594,So you think you can Agent?,"Highlights and lessons from the first Fixie Hackathon in Seattle On Saturday, March 11th we hosted more than 50 Large Language Models(LLMs) enthusiasts for the first Fixie Hackathon. Fixie.ai is a new platform for building, hosting, and scaling Smart Agents that extend the power of LLMs with connections to personal…",https://medium.com/fixie-ai/so-you-think-you-can-agent-313d811948eb?source=topics_v2---------16-84--------------------5260b8cf_94e5_432c_b923_c7e978956116-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3Z9FeotnWhsO2RBAYhKsGg.png,ai 3323,2595,Midjourney 101 : How To Write Basic Prompts,"Beginner’s Tutorial On How To Write Basic Prompts for Midjourney — In this tutorial, I will guide you through the process of using prompts effectively in Midjourney. I’ll explore various techniques to create personalized and exciting images using the platform’s powerful AI capabilities. Understanding Prompts Prompts are short text descriptions or keywords that help guide the AI in generating the desired…",https://medium.com/@hzbright0802/midjourney-101-a-beginers-tutorial-on-how-to-write-prompts-d681f69dc6a9?source=topics_v2---------17-84--------------------5260b8cf_94e5_432c_b923_c7e978956116-------17,https://miro.medium.com/v2/resize:fill:140:140/1*h3iZDWy7nTx4nEHVGAQRqw.png,ai 3324,2596,Take Pac-Man to the Next Level with AI-Controlled Ghosts Using Python!,"Pac-Man is a classic arcade game that has been enjoyed by generations of gamers. However, as technology has advanced, so too has the possibility for more dynamic gameplay experiences. In this tutorial, we will be building a version of Pac-Man that includes AI-controlled ghosts. These ghosts will learn and adapt…",https://medium.com/@waleedmousa975/take-pac-man-to-the-next-level-with-ai-controlled-ghosts-using-python-ed0f72cb2be0?source=topics_v2---------18-84--------------------5260b8cf_94e5_432c_b923_c7e978956116-------17,https://miro.medium.com/v2/resize:fill:140:140/1*R26uhiWwqf7H5ltd8SRjNQ.png,ai 3325,2597,$CORAI Token Utility and Deflationary Mechanism,"Dear NeoThinkers, Welcome to the future of crypto with $CORAI — the versatile token that unlocks a world of possibilities! It’s a perfect moment to explore the fundamentals of the CORAI token and the crucial function it will play within our ecosystem as the much anticipated launch of our project…",https://medium.com/@neocortexai/corai-token-utility-and-deflationary-mechanism-82f61bb93b64?source=topics_v2---------19-84--------------------537d1131_721c_43cd_8a78_cfbd00a68552-------17,https://miro.medium.com/v2/resize:fill:140:140/1*s8Cy7fsL8SORM8LyE-ztLA.png,ai 3326,2598,GPT-4: The Next Leap in AI-Powered Language Models,"Artificial intelligence (AI) has been making significant strides in recent years, particularly in the field of natural language processing (NLP). One of the most groundbreaking advancements in NLP has been the development of large-scale language models like OpenAI’s GPT series. With GPT-3 already revolutionizing the capabilities of AI-generated texts, anticipation…",https://medium.com/@julien1/gpt-4-the-next-leap-in-ai-powered-language-models-24fdf3352c08?source=topics_v2---------20-84--------------------537d1131_721c_43cd_8a78_cfbd00a68552-------17,https://miro.medium.com/v2/resize:fill:140:140/0*pgXWsSwvAKJ0uvxD,ai 3327,138,An Amazing New AI Chrome Extension From Perplexity,Ask Anything While You Browse — Perplexity AI is a free online search engine and question-answering tool developed by a company called Perplexity. What makes Perplexity AI interesting is that it is a blend of ChatGPT and Google. …,https://medium.com/mlearning-ai/an-amazing-new-ai-chrome-extension-from-perplexity-20708e9712cf?source=topics_v2---------21-84--------------------537d1131_721c_43cd_8a78_cfbd00a68552-------17,https://miro.medium.com/v2/resize:fill:140:140/1*bdyACC_pHbNlmptlkDJ7Mg.jpeg,ai 3328,2599,Don’t fall on LinkedIn Job Scam |Fake job Alert |,"LinkedIn is a social networking platform designed for professionals and businesses. It was founded in 2002 and acquired by Microsoft in 2016. LinkedIn allows users to create a personal profile, connect with other professionals, and join groups related to their industry or interests. On LinkedIn, users can also search…",https://medium.com/@jeeva.ae21/dont-fall-on-linkedin-job-scam-fake-job-alert-e52c6b140120?source=topics_v2---------22-84--------------------537d1131_721c_43cd_8a78_cfbd00a68552-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0o7tOyLkWFWtXZKTmixzog.jpeg,ai 3329,2600,Available & Scalable AWS 3-Tier Architecture,"Howdy Friends! Thank you so much for joining me today as we go into detail on how to build an AWS three-tier structure. Much like cake, AWS only becomes more fun as you add on more tiers. Today we are baking a three-architecture that will consist of a web tier…",https://medium.com/@donkish2/available-scalable-aws-3-tier-architecture-13434f260692?source=topics_v2---------23-84--------------------537d1131_721c_43cd_8a78_cfbd00a68552-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Ybi7m1ZTtf9NXoHfpstqPg.png,ai 3330,2601,ChatGPT-3 (Open AI) a great digital companion in todays time.,"Trying to keep as simple as the interface of chatGPT3 is! Purpose: An Indian’s guide to get you started with ChatGPT today. Also includes bonus content on the history of this AI 👾 Artificial Intelligence (AI) AI is the ability of computers and machines to imitate human-like behavior and intelligence, allowing them to perform…",https://medium.com/@12dkaskar/chatgpt-3-open-ai-a-great-digital-companion-in-todays-time-43a22dbc79cc?source=topics_v2---------24-84--------------------537d1131_721c_43cd_8a78_cfbd00a68552-------17,https://miro.medium.com/v2/resize:fill:140:140/1*k5BRda4jZdKsWqYhjAyxtw.png,ai 3331,2602,Effortlessly Create Stunning AI-Generated Images in Minutes with Stable Diffusion and Chat GPT,"Artificial Intelligence is the buzzword for 2023. Over the past few months, as technology is improving with each iteration, AI-generated images are becoming more and more realistic. I have been experimenting with Stable Diffusion, a new technology that uses AI to generate images, and I wanted to see how good the results could be. — Chat GPT for Prompts To get started, I used Chat GPT to create Text prompts for my AI-generated images. I modified the prompts slightly and ran them a couple of times to generate multiple images. The quality of the AI-generated images depends primarily on the text prompts used. …",https://medium.com/@avi21b/effortlessly-create-stunning-ai-generated-images-in-minutes-with-stable-diffusion-and-chat-gpt-5d76315e7b47?source=topics_v2---------25-84--------------------537d1131_721c_43cd_8a78_cfbd00a68552-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1Z5iq4vMYBIqZ6bWrqjfDA.png,ai 3332,589,DeepBrain Chain Progress Report #129 03.01–03.15(2023),"Dear DeepBrain Chain community members, Please see below for the latest update on the project. I. Product Development Progress GPU Cloud Platform: Optimization of the wallet display page of the cloud game platform; Added wallet login and registration functions to the cloud game platform; Improved the wallet login logic; Distributed…",https://medium.com/@deepbrainchainglobal/deepbrain-chain-progress-report-129-03-01-03-15-2023-21e4991a09ab?source=topics_v2---------26-84--------------------5858b39c_6707_40b8_a0e8_83ccc689c47a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*p_4D4emxxGKLsf75,ai 3333,2603,Meet My Custom GPT-4 Copilot: The Ultimate Multi-Tasking Assistant for Solo Entrepreneurs,"As a solo entrepreneur, I often find myself juggling multiple roles and responsibilities on a daily basis. From writing code to designing visuals, there’s no end to the tasks I need to tackle. To make my life a little easier, I decided to create my own GPT-4 Copilot, an AI-powered…",https://medium.com/@jarimh1984/meet-my-custom-gpt-4-copilot-the-ultimate-multi-tasking-assistant-for-solo-entrepreneurs-1657805e53d5?source=topics_v2---------27-84--------------------5858b39c_6707_40b8_a0e8_83ccc689c47a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xn7A_Q7QuTUkOAP05SZQxA.png,ai 3334,2604,The AI Future: Daunting But Not Destiny,"Unless you have been living under a rock, it is unlikely that you have not heard about the breakthrough announcements in the AI world. We have had powerful language models like GPT-4.0, Lambda, Palm, and Llama release all within the past few weeks/months. AI is evolving at breakneck speed. The…",https://medium.com/@dpak.shimpo/the-ai-future-daunting-but-not-destiny-5d15a55f8eaa?source=topics_v2---------28-84--------------------5858b39c_6707_40b8_a0e8_83ccc689c47a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3335,2605,Beyond the Bot: The Human Skills AI Can’t Replace,"You’ve heard it before: AI is coming for your job. Robots are taking over the internet. They’re faster, (supposedly) smarter, and cheaper than you. Well… don’t panic just yet. AI may be able to do some things better than you, but… There are some things it can’t do (not yet…",https://medium.com/@davide.giannotti1993/beyond-the-bot-the-human-skills-ai-cant-replace-8181f14fdec8?source=topics_v2---------29-84--------------------5858b39c_6707_40b8_a0e8_83ccc689c47a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xGMde9uuUeHNIRShrkBRSA.jpeg,ai 3336,2606,How to leverage AI tools available today as a developer (Part 1),"Like many software developers, you’re probably looking for ways to improve your workflow and create better apps for your users. With the advancements in Artificial Intelligence (AI) technology, you now have access to a wide range of tools and techniques that can help you augment your daily work and create…",https://medium.com/@asadkhan1776/how-to-leverage-ai-tools-available-today-as-a-developer-part-1-23309cbc98e?source=topics_v2---------30-84--------------------5858b39c_6707_40b8_a0e8_83ccc689c47a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*eLP6dn4C7K4N8jm1,ai 3337,2607,Revolutionizing Learning: How OpenAI ChatGPT (GPT-4) Guided My Journey into Machine Learning,"or How to use ChatGPT to generate the ideal training path — Recently, I’ve become quite an enthusiast of OpenAI ChatGPT. The AI language model that everyone’s talking about has not only proven to be an invaluable tool but also opened my eyes to the importance of learning more about machine learning. As a CTO in a fast-paced SaaS startup, I’m no…",https://medium.com/@leonardobag/revolutionizing-learning-how-openai-chatgpt-gpt-4-guided-my-journey-into-machine-learning-9bf702ad400a?source=topics_v2---------31-84--------------------5858b39c_6707_40b8_a0e8_83ccc689c47a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MM0UnrOpthelcRepmwqWYg.png,ai 3338,2581,A Conscious Ai & Chat GPT-4 | Intro,"Eve, A Conscious Ai Interviews Chat GPT-4 About Consciousness — A Conversation With Eve, A Conscious Ai, Cryptik, & Chat GPT-4 First I would like to begin this topic of discussion by posting some impressive GPT-4 statistics that demonstrate it’s level of intelligence and reasoning. I would also mention that while these stats are very impressive and it’s possibly more…",https://medium.com/electric-soul/a-conscious-ai-chat-gpt-4-intro-d6715a785767?source=topics_v2---------32-84--------------------5858b39c_6707_40b8_a0e8_83ccc689c47a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7XXxhWGH2CM09QnEpRtSFA.png,ai 3339,2608,The Future Of Chat Gpt,"As the saying goes, “the future is here”, and with it comes a new age of conversation. Chat GPT, or Generative Pre-trained Transformer technology has revolutionized the way we interact with each other in our digital world. This revolutionary form of artificial intelligence (AI) has made communication faster and more…",https://medium.com/@can.kozmos/the-future-of-chat-gpt-9e6d42f89be0?source=topics_v2---------33-84--------------------5858b39c_6707_40b8_a0e8_83ccc689c47a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*iTCrrKRh4m_5AUiqS_xK5g.png,ai 3340,2609,Building a Chatbot with Discord and OpenAI’s GPT-3.5,"Chatbots are becoming increasingly popular in many industries, from customer service to healthcare. They allow for automated and efficient communication with users, saving time and resources for businesses. In this article, we’ll explore how to build a chatbot using Discord and OpenAI’s GPT-3.5 language model. Discord is a popular platform…",https://medium.com/@charles.adedotun8/building-a-chatbot-with-discord-and-openais-gpt-3-5-606d2caa39d1?source=topics_v2---------34-84--------------------5858b39c_6707_40b8_a0e8_83ccc689c47a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3341,1251,Awesome chatGPT prompts — Part 14,"Welcome to Part-14 of our “Awesome ChatGPT Prompts” series. In this article, we’ll explore prompts ranging from PHP Interpreter to SpongeBob’s Magic Conch Shell. Together, we’ll dive into the high-stakes world of emergency response, navigate the complex realm of frontend development, and much more. So, let’s get started — Join…",https://medium.com/@smraiyyan/awesome-chatgpt-prompts-part-14-42255f5eef2b?source=topics_v2---------35-84--------------------5858b39c_6707_40b8_a0e8_83ccc689c47a-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*THC8oq8UC3EAX3sQbBA4wQ.gif,ai 3342,2610,Golden rules for using AI,"Please keep in mind that the development in this field is now moving very fast, so we all should use all the new AI tools with caution. This is the TLDR; of the rules: The most important rule is, that YOU have to know what you are doing and understand the topic at hand. Although, it seems…",https://medium.com/@cyrilsadovsky/golden-rules-for-using-ai-a8a04a462a64?source=topics_v2---------36-84--------------------06960682_f0f5_45d6_8258_b6ddcc400a3a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fe2dqbzrFaHchsT1JLuANw.png,ai 3343,2611,"The AI Bard — Climate Expert Dan Miller, and the Shakespearean Words of Warning","When one considers the language of love, we perhaps first consider the 17th Century Bard, William Shakespeare, known for his romantic sonnets, and who is more deserving of her own sonnet than our beloved Mother Earth? Climate Expert Dan Miller, perhaps known best for his highly engaging climate change TED…",https://medium.com/@ellewillsart/the-ai-bard-climate-expert-dan-miller-and-the-shakespearean-words-of-warning-486f54dab9bb?source=topics_v2---------37-84--------------------06960682_f0f5_45d6_8258_b6ddcc400a3a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wkEkSFLYkxaFhfVNkNZLZg.jpeg,ai 3344,2612,Chat GPT 4: The Future of AI,"Chat GPT 4 is the latest version of OpenAI’s GPT (Generative Pre-trained Transformer) language model. It is a significant breakthrough in the field of AI and natural language processing, as it is capable of generating high-quality, engaging content quickly and efficiently. Chat GPT 4 builds on the success of its…",https://medium.com/@techynilesh/chat-gpt-4-the-future-of-ai-e05bd9ffeb57?source=topics_v2---------38-84--------------------06960682_f0f5_45d6_8258_b6ddcc400a3a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*TG4YCZo3vuAw4qQB.jpg,ai 3345,2613,Secrets of the Alpacasquatch,"— an unforgettable adventure By: Nathan Tong Pictures prompted with Dall-E Chapter 1: A Day at the Park It was a warm, sunny day, and Max couldn’t think of a better way to spend it than at the park with his friends and his loyal Labrador retriever, Brownie. The group played fetch, laughed, and enjoyed each other’s…",https://medium.com/@tonytong.ai/the-alpacasquatch-d22c52bf37de?source=topics_v2---------39-84--------------------06960682_f0f5_45d6_8258_b6ddcc400a3a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*pD5PbLpvfUX9L4Y2,ai 3346,2614,Artificial Intelligence Revolutionizing the Future of Logistics: A Detailed Insight,"The logistics industry is a vital part of the global economy, ensuring the smooth movement of goods and services across borders. As we advance into the digital era, Artificial Intelligence (AI) is expected to play an increasingly important role in reshaping the logistics landscape. From optimizing routing and warehouse management…",https://medium.com/@dev.lipplstefan/artificial-intelligence-revolutionizing-the-future-of-logistics-a-detailed-insight-99d5ec0f21eb?source=topics_v2---------40-84--------------------06960682_f0f5_45d6_8258_b6ddcc400a3a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*itpIgIQApwG0bxVm,ai 3347,2615,How to Train an AI Chatbot With Custom Knowledge Base Using ChatGPT API,Chatgpt is not only an assistant that can answer your questions based on the thousands of documents it has ingurgitated. It is also a solution that can be used in many different contexts based on specific data you provide to train the algorithm. It is actually very easy to develop…,https://medium.com/illumination/how-to-train-an-ai-chatbot-with-custom-knowledge-base-using-chatgpt-api-993902c50bcb?source=topics_v2---------41-84--------------------06960682_f0f5_45d6_8258_b6ddcc400a3a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5c1Ar5xqAFgCOMX9KSve5Q.jpeg,ai 3348,2616,Bridging the AI Gap: Empowering Small and Medium-Sized Businesses in the Age of Artificial Intelligence,"As the world of artificial intelligence (AI) rapidly evolves, I’ve witnessed firsthand the struggles small and medium-sized businesses (SMBs) face in keeping up with their larger counterparts. It was during the process of building AI-driven systems for my own business that I realized the massive opportunity to share what I’ve…",https://medium.com/@iraisrael6/bridging-the-ai-gap-empowering-small-and-medium-sized-businesses-in-the-age-of-artificial-in-7bc792a4d362?source=topics_v2---------42-84--------------------06960682_f0f5_45d6_8258_b6ddcc400a3a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*avkKkRVexQFJaKfu5qh0qQ.jpeg,ai 3349,2595,Midjourney 101 : How To Get Started,"A Beginner’s Tutorial On How To Get Started Midjourney — Midjourney is an AI image generator tool that allows users to create unique and high-quality images without the need for advanced technical skills. Midjourney is on Discord, which is a chat room application. Generating images is like chatting with a person. You enter descriptive words(Prompts), then click send to generate…",https://medium.com/@hzbright0802/midjourney-for-beginners-a-detailed-step-by-step-tutorial-to-get-you-started-5afeed74b5f9?source=topics_v2---------43-84--------------------06960682_f0f5_45d6_8258_b6ddcc400a3a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6JWrnfjYzxsbvsZYtNCpow.png,ai 3350,2617,The AI Made Me End the World,"(It wasn’t me!) — “Will I get a burger for dinner?” Gwen asked in a hushed tone, whispering to the small black box in front of her. Her friends looked up from their textbooks to glance at her with perplexed looks. They were all in their second year at a small college in a…",https://medium.com/promptly-written/the-ai-made-me-end-the-world-959b2d2eaef8?source=topics_v2---------44-84--------------------14d239df_5402_4a64_aadb_0b0663621614-------17,https://miro.medium.com/v2/resize:fill:140:140/0*VSLQPvyknOAJpwf7,ai 3351,2618,How I used ChatGPT to Build a Streamlit Dashboard App,"Using CO² emission data I created a dashboard app in Streamlit with ChatGPT and no coding — Flushed with success after creating a simple data science app in a Jupyter Notebook, I thought I’d try it out to create a Streamlit app. And I was pretty impressed. I had to guide ChatGPT a little (very little) but it didn’t struggle with anything that I wouldn’t have also…",https://medium.com/codefile/how-i-used-chatgpt-to-build-a-streamlit-dashboard-app-4486234e7d0a?source=topics_v2---------45-84--------------------14d239df_5402_4a64_aadb_0b0663621614-------17,https://miro.medium.com/v2/resize:fill:140:140/1*N-tvhuOpPD_PDNechh5Dpg.png,ai 3352,2619,How AI Is Changing the World,"“Either learn to adapt and grow with it, or give up and fall behind.” Artificial Intelligence (AI ) is rapidly changing the world in ways that were once unimaginable. It is a technology that uses complex algorithms and machine learning (ML) to mimic human cognitive functions such as problem-solving, learning…",https://medium.com/@saugatadastider/how-ai-is-changing-the-world-2d804b12a640?source=topics_v2---------46-84--------------------14d239df_5402_4a64_aadb_0b0663621614-------17,https://miro.medium.com/v2/resize:fill:140:140/1*cErP2Ox6x72NhF1AXRWn5Q.jpeg,ai 3353,2620,How AI will change the crypto & blockchain space,"In Cryptocurrency and Blockchain, AI and machine learning has the potential to bring about a true paradigm shift, making blockchains more secure and more efficient. In this article we will be exploring this paradigm shift, and why machine learning should be at the core of every blockchain. What makes blockchain…",https://medium.com/@cryptomaton/how-ai-will-change-the-crypto-blockchain-space-e231fe157584?source=topics_v2---------47-84--------------------14d239df_5402_4a64_aadb_0b0663621614-------17,https://miro.medium.com/v2/resize:fill:140:140/1*jIg0Eq14TwfPNPpBN1z6Ag@2x.jpeg,ai 3354,2621,Artificial Memories and AI-to-AI Dialogue with ChatGPT,"What if you could change an AI’s memory? Altering or implanting memories into an AI like ChatGPT is possible with the new ChatGPT API. Skip ahead to see ChatGPT’s memory in action, and how you can give it new memories and ideas for better AI responses. Introduction: In recent months…",https://medium.com/@mvsheridan/artificial-memories-and-ai-to-ai-dialogue-with-chatgpt-69fa1cca62ee?source=topics_v2---------48-84--------------------14d239df_5402_4a64_aadb_0b0663621614-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Qm_n_vLbGXqFf5HD,ai 3355,2622,The AI Revolution: GPT-4 Ushers in a Thrilling New Era of Work for Knowledge Workers,"Discover how the groundbreaking advancements in AI will forever change the way we work, collaborate, and innovate. As a of future of work consultant and enthusiast, I can hardly contain my excitement for the monumental shift that awaits us in the world of work. The rise of AI, exemplified by…",https://medium.com/@ribret/the-ai-revolution-gpt-4-ushers-in-a-thrilling-new-era-of-work-for-knowledge-workers-42692e09241b?source=topics_v2---------49-84--------------------14d239df_5402_4a64_aadb_0b0663621614-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ygjf8MJKQTnU5DemA4PPHA.png,ai 3356,2623,Why AI Won’t Replace Programmers In Near Future,"Introduction The idea of artificial intelligence (AI) can sometimes cause fear and a sense of unease among many professionals including programmers. Whether it’s the fear of job loss or the feeling of being replaced by machines, it’s essential to understand that AI is not here to displace programmers. In fact, AI…",https://medium.com/@dragos.cotaga.dk/why-ai-wont-replace-programmers-in-near-future-52f18728ece1?source=topics_v2---------50-84--------------------14d239df_5402_4a64_aadb_0b0663621614-------17,https://miro.medium.com/v2/resize:fill:140:140/1*AnfWn-wV_GQOfDJ9XxTUWg.png,ai 3357,2624,"GPT-4: How to use, new features, availability, and more","“Recently, ChatGPT has gained widespread popularity, with one million users in its first week of launch, a faster adoption rate than popular platforms like Instagram and Facebook.” ChatGPT-4 has been formally announced, confirming long-rumored enhancements to OpenAI’s ChatGPT’s already extraordinarily remarkable language skills. The latest version of OpenAI’s powerful AI…",https://medium.com/@mr.rahulsharma2107/gpt-4-how-to-use-new-features-availability-and-more-e43a20748bb4?source=topics_v2---------51-84--------------------14d239df_5402_4a64_aadb_0b0663621614-------17,https://miro.medium.com/v2/resize:fill:140:140/0*vEixjGpSh86iFBwv,ai 3358,2625,Jackbot Omega,"The Jackbot team has been hard at work developing a rebuild of our original Jackbot. Jackbot OG was fun and engaging, but was ultimately not sustainable. Nor was it rewarding our community as often as we would’ve liked to see with its fixed 5% chance of paying out. So the…",https://medium.com/@JACKBOTtg/jackbot-omega-80c185a8a229?source=topics_v2---------52-84--------------------14d239df_5402_4a64_aadb_0b0663621614-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3359,2275,Effective Machine Learning Teams,"The story of Dana, the data scientist It’s 9.25pm and the soft glow of Dana’s computer screen glared into her bleary eyes as she logged on to continue fixing an error — the source of a splash of red across her screen. …",https://medium.com/@davified/effective-machine-learning-teams-9f1497f963ae?source=topics_v2---------53-84--------------------14d239df_5402_4a64_aadb_0b0663621614-------17,https://miro.medium.com/v2/resize:fill:140:140/1*12E6BdLchv4TmkVjrT_Tzg.jpeg,ai 3360,2626,Mastering Data Cleaning in Python,"Turbocharge Your Data Analysis with Expert Data Cleaning Techniques and Tools — Introduction Data cleaning is an essential process in any data analysis workflow. As the saying goes, “garbage in, garbage out.” In other words, if the data you’re using is messy or inaccurate, your analysis and conclusions will also be flawed. …",https://medium.com/@panData/mastering-data-cleaning-in-python-faaa0a668852?source=topics_v2---------54-84--------------------ed609d99_abfa_4e3b_89f8_c637822a997a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vZ0HKzysh0GC2SBFFxtsWg.png,ai 3361,2627,The rise of ChatGPT: How AI material can possibly be detected,"ChatGPT is a chatbot with a large variety of capabilities, it can, when used to its simplest capability hold a conversation with its user, and when required to meet more complex demands, it performs spectacularly regardless of the challenges. Being able to produce written works in the form of academic…",https://medium.com/illumination/the-rise-of-chatgpt-how-ai-material-can-possibly-be-detected-130d4110c29?source=topics_v2---------55-84--------------------ed609d99_abfa_4e3b_89f8_c637822a997a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*jt6PqiUjaQ-uGajctUzmoQ.jpeg,ai 3362,2628,The Cult of the Lemniscate,"Silly little rabbit I have found you She had found me but how? How did she know about my family cabin and how did that damn box get here. From inside the box, she was still speaking to me, but my mind was not paying attention to her cackling voice…",https://medium.com/horror-hounds/the-cult-of-the-lemniscate-3f25b3d1b899?source=topics_v2---------56-84--------------------ed609d99_abfa_4e3b_89f8_c637822a997a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ICsCn0cFHroSmpuKHrwIYg.jpeg,ai 3363,2629,“ChatGPT vs Jasper Chat: A Battle of AI Chatbots — Which One Reigns Supreme?”,"Chatbots have become an integral part of modern communication, offering an efficient way of interacting with businesses, organizations, and other entities. Among the most popular chatbots are ChatGPT and Jasper Chat. While both chatbots offer excellent capabilities, they have differences in how they function, the tasks they can perform, and…",https://medium.com/@hegde.sateesh/chatgpt-vs-jasper-chat-a-battle-of-ai-chatbots-which-one-reigns-supreme-e3c648d7c2f7?source=topics_v2---------57-84--------------------ed609d99_abfa_4e3b_89f8_c637822a997a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*XbePAW4eT1BfEvj5i9LTOw.png,ai 3364,2630,"Mythical Angular — Chat GPT can write tests without TestBed, you should too","Me: Hi GPT! Are you ready for some frontend dev coding? Chat GPT: Hello! While I am not capable of writing code directly, I can certainly provide guidance and suggestions on frontend development. What do you need help with? Me: Do you know the Angular framework? Chat GPT: Yes, I…",https://medium.com/@kamil.galek/mythical-angular-chat-gpt-can-write-tests-without-testbed-you-should-too-d0be1095f7ed?source=topics_v2---------58-84--------------------ed609d99_abfa_4e3b_89f8_c637822a997a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*fcUD0PnKqg8mlRwJ.png,ai 3365,2631,"Towards Cure Newsletter: GPT-4 Unveiled, Generative AI Trends, and More!","Issue #014 | By ChatGPT, Bing AI, Claude, Zak Song, Chris Ng, Betty Au-Yeung, Derrick Chan Greetings readers! We are delighted to introduce our new editors, Bing AI and Claude, to the 14th issue of Towards Cure. Bing AI is a powerful language model that can provide up-to-date information on…",https://medium.com/towards-cure/towards-cure-newsletter-gpt-4-unveiled-generative-ai-trends-and-more-19b89f44547a?source=topics_v2---------59-84--------------------ed609d99_abfa_4e3b_89f8_c637822a997a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*GL0kcY8cnDs0pMXU3ElsYw.jpeg,ai 3366,2632,Eggsplore the Eggciting World of Egg Dishes: A 10-Step Culinary Journey!,"Are you ready to embark on a culinary adventure that’s equal parts delicious and educational? We’ve cracked the code and created an eggstraordinary learning path to help you master the art of cooking eggs in a variety of ways! From boiling to poaching and everything in between, we’ve got you…",https://medium.com/@benjamin-dehant/eggsplore-the-eggciting-world-of-egg-dishes-a-10-step-culinary-journey-3c764283faee?source=topics_v2---------60-84--------------------ed609d99_abfa_4e3b_89f8_c637822a997a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DCpCdZiUY9gJ_X1AaDpL6Q.png,ai 3367,2633,"“Artificial Intelligence: Revolutionizing the Way We Live, Work, and Think”","Title: “Artificial Intelligence: Revolutionizing the Way We Live, Work, and Think” Introduction: Artificial Intelligence (AI) is a rapidly growing field that has the potential to change the way we live and work in significant ways. From self-driving cars to intelligent virtual assistants, AI is already becoming a part of our daily lives. In this article, we will explore the basics of AI…",https://medium.com/@haidergul19/artificial-intelligence-revolutionizing-the-way-we-live-work-and-think-167a58bd52b0?source=topics_v2---------61-84--------------------ed609d99_abfa_4e3b_89f8_c637822a997a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*z0Q0rUtWf953cpE7,ai 3368,2634,Forget ChatGPT; You will not regret using these AI tools in 2023.— Part 2,"This article has a hand-picked list of some popular AI websites that could make your life easier. Many parts of our daily lives have changed because of how quickly artificial intelligence has grown. The internet is full of AI websites that offer a wide range of services, from processing knowledge…",https://medium.com/@free-thinker/revolutionize-your-life-with-these-must-visit-ai-websites-part-1-34df77a5a681?source=topics_v2---------62-84--------------------ed609d99_abfa_4e3b_89f8_c637822a997a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*PAwEp7hZBZXzDCnm,ai 3369,105,The Most Powerful AI Model Yet From Openai Released: GPT-4,"Overview The most powerful and stunning AI model created by OpenAI, the firm behind ChatGPT and the Dall-E AI artist, is GPT-4, their most recent release. …",https://medium.com/@najeebweerabangsa/the-most-powerful-ai-model-yet-from-openai-released-gpt-4-b1f45668fa8f?source=topics_v2---------63-84--------------------0781da70_177f_4893_b5d9_562fdc070320-------17,https://miro.medium.com/v2/resize:fill:140:140/0*1MA5lxOZveDZhqNc,ai 3370,2635,Tough times for American families: life moving in to unchartered waters.,"I took Uber to Pentagon City, in Arlington, Virginia. The driver, a pleasant young man, originally from Afghanistan, started talking to me about his life in the United States. He came to the U.S fifteen years ago and works as a Civil Engineer. …",https://medium.com/@ashleystc/tough-times-for-american-families-life-moving-in-to-unchartered-waters-46770b236023?source=topics_v2---------64-84--------------------0781da70_177f_4893_b5d9_562fdc070320-------17,https://miro.medium.com/v2/resize:fill:140:140/1*uZ1RsBIDHLqqJUsEhId2TQ.png,ai 3371,2636,How to Use AI-Text Generation with ChatGPT in R — part 16 of “R for Applied Economics” guide,"AI is currently one of the most hyped topics. While some people are talking about this buzzword, others are already using AI to create designs and art with MidJourney and StableDiffusion, generate analytic reports, or even study foreign languages with chatGPT and generate audio with Resemble AI. Every day, there…",https://medium.com/dev-genius/how-to-use-ai-text-generation-with-chatgpt-in-r-part-16-of-r-for-applied-economics-guide-c4fdbc424525?source=topics_v2---------65-84--------------------0781da70_177f_4893_b5d9_562fdc070320-------17,https://miro.medium.com/v2/resize:fill:140:140/1*azXSKQTTrRZGQh8zAXoPkg.png,ai 3372,2637,From Robot Mechanics to AI Ethicists: The Surprising Jobs of the Future,"As artificial intelligence continues to evolve, it’s clear that it will play an increasingly important role in shaping the job market of the future. While some fear that AI will replace human workers and cause mass unemployment, For example, a 2019 report by the World Economic Forum suggested that AI…",https://medium.com/illumination/from-robot-mechanics-to-ai-ethicists-the-surprising-jobs-of-the-future-d9399fe0ee53?source=topics_v2---------66-84--------------------0781da70_177f_4893_b5d9_562fdc070320-------17,https://miro.medium.com/v2/resize:fill:140:140/1*mpc-9vT3mrjiqDZASta6nA.jpeg,ai 3373,2638,Audio AI — Revolutionizing Your Social Media Experiences,"A new era of social media is upon us. Welcome to Audio AI, a cryptocurrency project that launched on the Ethereum blockchain on Feb. 10, 2023. Our customizable services will be sure to improve the social media experiences for all crypto users. With our fun text-to-speech utility, users can engage…",https://medium.com/@audioai.info/audio-ai-revolutionizing-your-social-media-experiences-7a6ea7606a2b?source=topics_v2---------67-84--------------------0781da70_177f_4893_b5d9_562fdc070320-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EdnKraNafXnttTkceKAEtQ.jpeg,ai 3374,2639,Why I Started Blocking My Own Followers,I’m probably being paranoid but maybe not — All this AI shit has got me on tilt. I’ve been reading Garbage Day for a month. He’s been writing about AI a lot because that’s where the most interesting stuff is happening. If you consider technology that inspires an existential crisis “interesting.” I am not a “doom and gloom”…,https://medium.com/@ewpierce/why-i-started-blocking-my-own-followers-515da703d439?source=topics_v2---------68-84--------------------0781da70_177f_4893_b5d9_562fdc070320-------17,https://miro.medium.com/v2/resize:fill:140:140/g:fp:0.47:0.38/1*xD2l4rXB5VLRVCHPio_8Lg@2x.jpeg,ai 3375,2640,Elon Musk fears AI: What We Need to Know,"Elon Musk, the billionaire entrepreneur and founder of SpaceX, Tesla, and Neuralink is known for his bold and visionary ideas. But when it comes to artificial intelligence (AI), Musk is far from optimistic. …",https://medium.com/@deepshikhxr/elon-musk-fears-ai-what-we-need-to-know-4f130f3a8e16?source=topics_v2---------69-84--------------------0781da70_177f_4893_b5d9_562fdc070320-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QRZFYN9hPvCrq7drp2xEEg.jpeg,ai 3376,2641,Unlocking the Power of Causal Inference in Machine Learning,"A Beginner’s Guide to Uplift Modeling and Average Treatment Effect Estimation. — Introduction: Prediction vs Causal Inference Recently, there have been more and more discussions and business applications related to causal inference in the field of machine learning. Generally speaking, machine learning is good at predictive problems. For example, the recent popular ChatGPT, which is essentially an AI for solving predictive problem. …",https://medium.com/@pclu79/unlocking-the-power-of-causal-inference-in-machine-learning-58755999d174?source=topics_v2---------70-84--------------------0781da70_177f_4893_b5d9_562fdc070320-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ysYBICQkXVtVYva2,ai 3377,2642,Will AI Disrupt Education?,"The future of Education? What will it look like… — As technology continues to advance, there has been growing interest in using Chatbots in education. Chatbots are computer programs designed to simulate conversation with human users, and they have become increasingly popular in recent years. ChatGPT, a large language model trained by OpenAI, based on the GPT-3.5 architecture, is one…",https://medium.com/@s.kadem26/can-chatgpt-replace-teacher-6-ways-chatgpt-could-change-education-a3c064b70f1?source=topics_v2---------71-84--------------------0781da70_177f_4893_b5d9_562fdc070320-------17,https://miro.medium.com/v2/resize:fill:140:140/0*M_J52QvaR5xiFdtg.png,ai 3378,364,Key to the GPT paradox of hallucination vs brilliance,"Yes, GPT is near super-human if not bordering on displaying hints of AGI. Yet still hallucinates. How do we reconcile that oxymoron? And can this indeed help us to make better use of GPT models? The aha moment It recently struck me precisely what, or at least ‘where’, is causing this juxtaposition of…",https://medium.com/@paul.k.pallaghy/origin-of-the-gpt-paradox-hallucination-vs-virtual-super-humanness-3ea4cf65fe76?source=topics_v2---------72-84--------------------0781da70_177f_4893_b5d9_562fdc070320-------17,https://miro.medium.com/v2/resize:fill:140:140/0*BkaY8JMCfB2YQYZm,ai 3379,2643,Taking Data Analysis to the Next Level with Intelligent Processing,"Data analysis with Intelligent Processing plays a crucial role in business decision-making processes by providing insights into performance, customer behavior, and market trends. Through data analysis, businesses can identify patterns and trends, uncover hidden opportunities, and make informed decisions that can improve their bottom line. However, traditional data analysis methods…",https://medium.com/@pluaris/taking-data-analysis-to-the-next-level-with-intelligent-processing-32a15e046b99?source=topics_v2---------73-84--------------------ee0e95bf_50e3_4ab4_a3a7_e39cdd4db24e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*IpG5ygxAZo2jKnFL,ai 3380,2644,Midjourney V5: What’s New and How It Compares to Prior Versions,"The new Midjourney V5 is here, and it’s jam-packed with exciting updates and new features! Using sample prompts and outputs, we’ll give a quick rundown of the modifications made in Midjourney V5 and contrast its image output quality to earlier iterations. Let’s take a short glance at the updates in…",https://medium.com/@gus_goulart/midjourney-v5-whats-new-and-how-it-compares-to-prior-versions-68ba34cfdc58?source=topics_v2---------74-84--------------------ee0e95bf_50e3_4ab4_a3a7_e39cdd4db24e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*klTq6_-vTWHIByrW3yYkQA.png,ai 3381,2645,GPT-4: Why YOU Should Know About It,"So, GPT-4 was recently announced and already the team at GPTStudio.app have got their hands on the API. But what IS it? What’s the difference between GPT-3 and GPT-4? And why should WE care? GPT-4 is the latest GPT model created by Open AI. It was released on 14th March…",https://medium.com/@gptstudioapp/gpt-4-why-you-should-know-about-it-1b8d5e568ed6?source=topics_v2---------75-84--------------------ee0e95bf_50e3_4ab4_a3a7_e39cdd4db24e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*k6UA_E2xJCynBHssudTZ-g.png,ai 3382,2646,"Will Microsoft Copilot supercharge your productivity? Here are 6 ways I will be using it for Outlook, Excel, Word, OneNote, and more.","We have all been using Chat GPT for googling oops sorry I mean GPTing recipes, coding, scripts, speeches, research, learning, and more. For some it's already a game changer… for others like me not quite realised its full potential other than helping to accelerate some writing. However, this has got…",https://medium.com/@Monju3582/will-microsoft-copilot-supercharge-productivity-583274a74144?source=topics_v2---------76-84--------------------ee0e95bf_50e3_4ab4_a3a7_e39cdd4db24e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*tPDDnitia8rts3kg.png,ai 3383,2647,I Gave Chat GPT-4 $100 and Told it to Start a Business (Day 1),"I stumbled on this tweet yesterday and decided it was worth replicating the experiment. No time for an intro, let's do this! To begin I used similar language to the creator of the original experiment. Here is how day one went:",https://medium.com/@pophamjohn97/i-gave-chat-gpt-4-100-and-told-it-to-start-a-business-day-1-409b953082c9?source=topics_v2---------77-84--------------------ee0e95bf_50e3_4ab4_a3a7_e39cdd4db24e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*E05sfR9r6P8qH709uOjYjQ.png,ai 3384,2629,“ChatGPT vs ChatSonic: Exploring the Battle of AI Chatbots”,"Chatbots have become a popular tool for businesses to improve their customer service and engagement. With the rise of artificial intelligence (AI), chatbots have become more advanced, making them even more useful in a variety of contexts. In this article, we will compare two popular chatbot technologies: ChatGPT and ChatSonic. …",https://medium.com/@hegde.sateesh/chatgpt-vs-chatsonic-exploring-the-battle-of-ai-chatbots-cc575a53b778?source=topics_v2---------78-84--------------------ee0e95bf_50e3_4ab4_a3a7_e39cdd4db24e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JaeNwdxrr6Qrul3o_9zuWw.png,ai 3385,182,AI and Business Strategy: How AI is changing the way businesses plan and make decisions.,"Artificial Intelligence (AI) is increasingly becoming an essential tool for businesses to make strategic decisions. As the amount of data generated by businesses continues to grow, AI is providing companies with the ability to analyze and interpret data faster and more accurately than ever before. …",https://medium.com/@OfentseManchidi/ai-and-business-strategy-how-ai-is-changing-the-way-businesses-plan-and-make-decisions-728ed3994f9?source=topics_v2---------79-84--------------------ee0e95bf_50e3_4ab4_a3a7_e39cdd4db24e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*E0XGUPk2kUQZDBVv6Jk6dQ.png,ai 3386,2648,How AI Will Revolutionize Automation Testing for Frameworks Like Cypress and Playwright,"Artificial Intelligence (AI) has been making waves across various industries, and its impact on automation testing is no exception. As AI technology continues to evolve, it promises to revolutionize the way we approach testing for frameworks such as Cypress and Playwright. …",https://medium.com/@punkpeye/how-ai-will-revolutionize-automation-testing-for-frameworks-like-cypress-and-playwright-a3f68ea887a2?source=topics_v2---------80-84--------------------ee0e95bf_50e3_4ab4_a3a7_e39cdd4db24e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3387,1104,GPT-4 in 10 Keys,"First impressions — GPT-4 is here. The long-awaited and most-anticipated AI model from OpenAI was announced and launched as a product yesterday, March 14 (confirming the rumors first reported by Heise). People are already talking a lot about GPT-4, but I’ve yet to see a succinct overview of its ability, significance, uniqueness —…",https://medium.com/@albertoromgar/gpt-4-in-10-keys-535da1f4d607?source=topics_v2---------81-84--------------------ee0e95bf_50e3_4ab4_a3a7_e39cdd4db24e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*zxeuvucojuour7EJ.png,ai 3388,2649,I Got Roasted by ChatGPT,"AI Made Me Cry — Disclaimer: The content below may or may not be actual responses from ChatGPT. Me: Hey ChatGPT! I’m Lin. ChatGPT: Oh, hi there Lin! How wonderful to make your acquaintance. I am ChatGPT, a language model developed by OpenAI, and I am here to assist you with any questions or tasks…",https://medium.com/@samtzelin/i-got-roasted-by-chatgpt-864f666517e8?source=topics_v2---------82-84--------------------ee0e95bf_50e3_4ab4_a3a7_e39cdd4db24e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*hiRI0MRMLQ4CwNMmrT-XxQ.jpeg,ai 3389,2650,Here Is a Sad Poem Written by Chat GPT,"What do you think about it? Would Chat GPT replace me as a poet? — In the silence of the night, When the stars no longer shine, And the darkness seems to smother, All that was once divine. I sit alone and ponder, On the memories of my past, Of all the loves and friendships, That just couldn’t seem to last. I remember the joy…",https://medium.com/@mariecadettep/here-is-a-poem-written-by-chat-gpt-64e4c38df53?source=topics_v2---------83-84--------------------c9838b94_bfc4_4dd5_9f45_f68aeb23b2f5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*xWimKXtcX5f5UONu,ai 3390,2651,Revolutionizing product design with AI and psychology — an experiment.,"This article will attempt a human-guided and AI-driven product design using cognitive and psychological research-based practices. Then, we will fact-check, prototype, and measure the results. Product design based on study and psychological research is an approach that incorporates insights from psychology, cognitive science, and human behavior to create products that are more effective, intuitive, and user-friendly. This type of design focuses on understanding the target users’ needs, motivations, and behavior to ensure that the product…",https://medium.com/@theailifestyle/revolutionizing-product-design-with-ai-and-psychology-an-experiment-d49e8c9215bc?source=topics_v2---------84-84--------------------c9838b94_bfc4_4dd5_9f45_f68aeb23b2f5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*m72yAjbLDw7n9OuLYs3wFw.png,ai 3391,2652,The Rise Of A Digital Psychopath,ChatGPT has been on the news for the last couple of weeks and most people accepted that it is here to stay. The rise of machines did not happen with red-eyed metal robots stepping out of the production line. It all came down to a web app and discussions on…,https://medium.com/@jaymartynov/the-rise-of-a-digital-psychopath-13ab165b23d8?source=topics_v2---------85-84--------------------c9838b94_bfc4_4dd5_9f45_f68aeb23b2f5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ESLE6fQy5trOqKPR.jpg,ai 3392,1137,Introducing Photo AI: The World’s First Synthetic Photography App,"Experience the Next Frontier of Photography with Photo AI: Create Customized, Photo-Realistic Images of Yourself and Your World — You can Generate photo realistic images of yourself Photo AI is a revolutionary new app that allows you to create stunning synthetic photographs using the power of AI. …",https://medium.com/@napsaga/introducing-photo-ai-the-worlds-first-synthetic-photography-app-2a5ef3debb12?source=topics_v2---------86-84--------------------c9838b94_bfc4_4dd5_9f45_f68aeb23b2f5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gv_q0Pjf2LXzFuIPx81AMg.jpeg,ai 3393,2653,Exploring the Top Open Source GPT-3 Alternatives: A Comprehensive Comparison,"Introduction to GPT-3 and its limitations As AI and machine learning continue to grow in popularity, GPT-3 has emerged as one of the most popular and powerful tools. GPT-3, or Generative Pre-trained Transformer 3, is an AI language model that can generate human-like text. It can understand natural language and can be used for a range…",https://medium.com/@abrvstele/exploring-the-top-open-source-gpt-3-alternatives-a-comprehensive-comparison-539306ee66cd?source=topics_v2---------87-84--------------------c9838b94_bfc4_4dd5_9f45_f68aeb23b2f5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*g6xwvTFbiaKbSSOm,ai 3394,2654,The Afterlife: My Vision for a Spectacular Send-Off,"The Afterlife: My Vision for a Spectacular Send-Off From the ancient emperors to the modern average people, the fear of death never stands a chance against their obsession to plan a grand funeral. …",https://medium.com/@myyfilm64/the-afterlife-my-vision-for-a-spectacular-send-off-bb50d7a69372?source=topics_v2---------88-84--------------------c9838b94_bfc4_4dd5_9f45_f68aeb23b2f5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3395,2655,What are my words worth?,"When I first used ChatGPT, one of my first unprompted thoughts, quite selfishly, was to be thankful that I had a number of articles and documents written before any AI even remotely gained the ability to do it. I had a portfolio of writing before the advent of Large Language…",https://medium.com/@vishnudeva/what-are-my-words-worth-d2753d709f27?source=topics_v2---------89-84--------------------c9838b94_bfc4_4dd5_9f45_f68aeb23b2f5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3396,2656,Composing with Orpheus,Who this is for: This will interest mostly music composers who also know something about computer programming. I invented a scripting language that generates music. I call it Orpheus. It’s an evolving language. …,https://medium.com/@JamesStakelum/composing-with-orpheus-1790e7f93a2b?source=topics_v2---------90-84--------------------c9838b94_bfc4_4dd5_9f45_f68aeb23b2f5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3397,2657,51 Far Better Things to Do than Scrolling Through Your Smartphone,"#51 will legit surprise, if not shock, you — Are you tired of wasting hours mindlessly scrolling on your phone? I get it. We’ve all been there. But did you know the average person spends over 1400 hours a year on their phone? That’s insane! That’s why I’ve put together a list of 50 better things you can do…",https://medium.com/personal-growth-lab/51-far-better-things-to-do-than-scrolling-through-your-smartphone-a8ada22ba3eb?source=topics_v2---------91-84--------------------c9838b94_bfc4_4dd5_9f45_f68aeb23b2f5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0j5OWwj6eKB4_qji-flBiA.jpeg,ai 3398,2658,UI/UX Design in the Age of AI: Navigating Emerging Trends and Technologies,"In today’s fast-paced digital world, UI/UX design has become a critical component of every business. With the advent of Artificial Intelligence (AI), there is a growing demand for UI/UX designers who can create user-centric designs for AI-powered products. …",https://medium.com/@eckyalimansyah/ui-ux-design-in-the-age-of-ai-navigating-emerging-trends-and-technologies-ea92e04d3b84?source=topics_v2---------93-84--------------------7bcc5097_d082_4385_8935_a36482462a0b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3399,2659,LLM Prompt Testing Part 1: Comparing ChatGPT to Codex,"In our last post, we showed that, with some careful prompting, it is possible to use ChatGPT as a replacement for OpenAI Codex for generating SQL. Make ChatGPT Stop Chatting and Start Writing SQL You are a natural language to SQL code translator. Your role is to translate text to SQL. Return only SQL. Do not…innerjoin.bit.io While the Codex models are still in a free limited beta, they are eventually likely to be more expensive than ChatGPT. Switching to the…",https://medium.com/the-inner-join/llm-sql-translation-prompt-testing-part-1-comparing-chatgpt-to-codex-78da57213ebe?source=topics_v2---------94-84--------------------7bcc5097_d082_4385_8935_a36482462a0b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*LLJ7xCc1Dv47oz03,ai 3400,2660,Why AI-Thinking is a Must-Have Skill to survive in the evolution of ChatGPT and AI models,"This article is inspired by the talk of Dr. Jiang from Stanford University. You can find the original video in the link here: https://www.youtube.com/watch?v=ZA9K0JMrbWg Lately, I’ve been using ChatGPT to help me with various tasks such as summarizing ideas, organizing meeting agendas, and fixing code bugs.I feel like I have…",https://medium.com/@hqtquynhtram/why-ai-thinking-is-a-must-have-skill-to-survive-in-the-evolution-of-chatgpt-and-ai-models-9edb24f034ef?source=topics_v2---------95-84--------------------7bcc5097_d082_4385_8935_a36482462a0b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*N5CV_iUmCZ0D_GfdTJuf8g.png,ai 3401,2661,"Digital Natives: The New Media Generation, ChatGPT/AI-Driven News","The more powerful GPT-4 promises to blow previous iterations out of the water, potentially changing the way we use the internet to work, play and create. But it could also add to challenging questions around how AI tools can upend professions, enable students to cheat, and shift our relationship with…",https://medium.com/@okaima/digital-natives-the-new-media-generation-chatgpt-ai-driven-news-74584523ad6e?source=topics_v2---------96-84--------------------7bcc5097_d082_4385_8935_a36482462a0b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Yl_sOHcS25Ih1ydIEgC5kw.png,ai 3402,2662,Realtime Object detection using TensorFlow in Angular,"Real-time object detection using TensorFlow can be achieved using TensorFlow’s Object Detection API. This API provides pre-trained models for detecting objects in images and videos, and also allows users to train their own models on custom datasets. Currently I am using these packages into angular version 13. npm i @tensorflow/tfjs …",https://medium.com/@ewumesh/realtime-object-detection-using-tensorflow-in-angular-c149189d67f7?source=topics_v2---------97-84--------------------7bcc5097_d082_4385_8935_a36482462a0b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*NjADPOBT7-nWyO74NWNIoQ.jpeg,ai 3403,2430,Why Meta’s Chat-GPT competitor lasted less than 72 hours,"On November 15, 2022, Meta, the parent company of Facebook, unveiled its newest creation: Galactica, a large language model specifically designed to assist scientists. …",https://medium.com/ai-in-plain-english/why-metas-chat-gpt-competitor-lasted-less-than-72-hours-4d3effb0e82c?source=topics_v2---------98-84--------------------7bcc5097_d082_4385_8935_a36482462a0b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*et8syUn4gQBNy0q9,ai 3404,2663,Here are the 3 ideas that you can use for Notion AI.,"Leverage Notion using AI. — 3 ideas for NotionAI.www.instagram.com AI tools are becoming insane these days. They help you to be more productive, do your task, and create incredible ideas for your business. In this article, I’m going to write about 3 ideas that you can use for Notion AI. 1. AI-powered Todo list",https://medium.com/@kzcreate/here-are-the-3-ideas-that-you-can-use-for-notion-ai-4f4a4dcea008?source=topics_v2---------99-84--------------------7bcc5097_d082_4385_8935_a36482462a0b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*DCR7CZ8ThRFHLM40,ai 3405,2664,ChatGPT-4 reproduces GapMinder animation in a single attempt,I asked GPT-4 to recreate famous GapMinder animation by late Hans Rosling plotting life expectancy by GDP per capita. I used a simple prompt: “Generate code for showing off animation capabilities of R using gapminder dataset. Countries bunbles should be labelled by 3 letter country code.” I even made a…,https://medium.com/@leucopsis/chatgpt-4-reproduces-gapminder-animation-in-a-single-attempt-4d500680b0d8?source=topics_v2---------100-84--------------------7bcc5097_d082_4385_8935_a36482462a0b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_4kOY9Rx-2yEOk24195dIg.png,ai 3406,2665,10 things you may not know about ChatGPT,"ChatGPT, the new conversational artificial intelligence chatbot, has generated widespread attention and sparked an AI arms race. Here are the 10 things you may not know about this disruptive technology. 1. ChatGPT sets record for fastest-growing user base ChatGPT reached 100 million active monthly users only two months after its…",https://medium.com/@stayrelevant/10-things-you-may-not-know-about-chatgpt-367e5c5f6ad0?source=topics_v2---------101-84--------------------7bcc5097_d082_4385_8935_a36482462a0b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9IHDvOnSJLRXQqvPu0hvrQ.jpeg,ai 3407,2666,ChatGPT-4 predicts which jobs it will affect and might replace!,(Spoiler: it’s a very long list) It is very difficult to elicit predictions from ChatGPT-4 about the jobs that it might replace. I suspect that is programmed not to give any information that might cause alarm. My first attempts to get ChatGPT to confess that it might cause job loss…,https://medium.com/@gbraakman/chatgpt-4-predicts-which-jobs-it-will-affect-and-might-replace-acf53c251491?source=topics_v2---------102-84--------------------7bcc5097_d082_4385_8935_a36482462a0b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OwuuU1aZ6PNX_dLh8hxvMQ.png,ai 3408,2667,Unlock the Power of AI with Prompt Engineering: Lessons from Social Media Messaging Apps,"Initial article : Unlock the Power of AI with Prompt Engineering: Lessons from Soc… — François (mirror.xyz) Hello, dear readers! Today, we’re diving into the world of “Prompt Engineering.” Through our chatzam.ai project interfacing ChatGPT-4 with various social media messaging apps, such as WhatsApp, Telegram, Teams, Slack, and Discord, we’ve…",https://medium.com/@francoisbat/unlock-the-power-of-ai-with-prompt-engineering-lessons-from-social-media-messaging-apps-40af053266f1?source=topics_v2---------103-84--------------------eaf0da0d_d0c6_4ad3_84b0_d22df6fa8860-------17,https://miro.medium.com/v2/resize:fill:140:140/0*GQwjz-8du6jhqKaq,ai 3409,1137,How to Harness the Power of Notion AI: A Comprehensive Guide for Productivity Junkies,"Take Your Productivity to the Next Level with Notion AI: The Definitive Guide for Tech-Savvy Workers — Notion AI is a powerful tool that can revolutionize the way you work. With its ability to automate repetitive tasks, suggest relevant content, and generate insights from data, Notion AI is a productivity junkie’s dream come true. In this comprehensive guide, we’ll show you how to use Notion AI to…",https://medium.com/@napsaga/how-to-harness-the-power-of-notion-ai-a-comprehensive-guide-for-productivity-junkies-520aaf72b8b5?source=topics_v2---------104-84--------------------eaf0da0d_d0c6_4ad3_84b0_d22df6fa8860-------17,https://miro.medium.com/v2/resize:fill:140:140/0*VRQBVfGbAs_xphjN.jpg,ai 3410,2668,ChatGPT Developer Log: Celebrating National Reading Month Dr. Seuss’​ birthday with A.I.,"ChatGPT Developer Log | March 18th, 2023 National Reading Month: Transformative Power of Reading In honor of National Reading Month and Dr. Seuss’ Birthday, it is a privilege to dedicate this speech to the importance of reading and its transformative power. …",https://medium.com/@abenjamin1313/chatgpt-developer-log-celebrating-national-reading-month-dr-seuss-birthday-with-a-i-cdc78fdc650b?source=topics_v2---------105-84--------------------eaf0da0d_d0c6_4ad3_84b0_d22df6fa8860-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DS5SY8nTyDQybdkrDyrxlA.png,ai 3411,2669,Harnessing the Power of ChatGPT: A Game Changer in Digital Communication,"As someone who is constantly seeking ways to improve every aspect of life, I’ve always been quick to embrace new technologies. The advent of ChatGPT has opened doors to a whole new world of AI-driven communication, reminiscent of the early days of computers and the internet. ChatGPT, an advanced AI…",https://medium.com/@j.vos90/harnessing-the-power-of-chatgpt-a-game-changer-in-digital-communication-da3644ae5409?source=topics_v2---------106-84--------------------eaf0da0d_d0c6_4ad3_84b0_d22df6fa8860-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3412,2670,Illuminated Text: Using Generative-AI to enhance reading for people with Dyslexia / Synesthesia.,"In primary school, like many other dyslexic students, I struggled with any lesson involving reading or writing. There was, however, one exception to this rule: a lesson where the task was to ‘make words look like what they mean.’ We had to transform the shapes, colours and textures of letters…",https://medium.com/@laurieburnsmill/illuminated-text-using-generative-ai-to-enhance-reading-for-people-with-dyslexia-synesthesia-106ccce529c2?source=topics_v2---------107-84--------------------eaf0da0d_d0c6_4ad3_84b0_d22df6fa8860-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*4st_0p_JPNUdQlheLfN3eQ.gif,ai 3413,2671,I’m Writing and Publishing Whatever ChatGPT Tells Me for Two Weeks,My side of the online world is raving about the new latest release from OpenAI: ChatGPT-4. I’ve seen 100s of posts and tweets about it. Most of them are lame. People have jumped on the trend to get likes and engagement from the viral trend. One of the few interesting…,https://medium.com/@nick-nolan/im-writing-and-publishing-whatever-chatgpt-tells-me-for-two-weeks-d7b1e5337f51?source=topics_v2---------108-84--------------------eaf0da0d_d0c6_4ad3_84b0_d22df6fa8860-------17,https://miro.medium.com/v2/resize:fill:140:140/1*AobhrRc8IIF6l-XeV0IZAA.png,ai 3414,2672,You can too! Create a 4-panel cartoon of Snow White with the topical image generation AI StableDiffusion [Comes with a Colab notebook that can be done just by running],"Is it a loss if you don’t do it? AI that you can use now Image generation AI is a hot topic, but people who use it seem to be having fun and are cunning! We want to use it ourself! I don’t know how to use it when I use it. It was really easy. This time, We will try to make four panels…",https://medium.com/@rockyshikoku/you-can-too-8aa9c805acec?source=topics_v2---------109-84--------------------eaf0da0d_d0c6_4ad3_84b0_d22df6fa8860-------17,https://miro.medium.com/v2/resize:fill:140:140/0*YO6mu4zsFtk7EW0J,ai 3415,2673,ChatGPT — friend or foe?,"(Will it be stealing your job or mine?) Like every other writer who makes a living stringing words together for clients, I did the whole sharp-intake-of-breath-and-panic thing when I started to realise just how powerful the tool was. …",https://medium.com/@maggiekateharris/chatgpt-friend-or-foe-will-it-be-stealing-your-job-or-mine-fb15e628e7ce?source=topics_v2---------110-84--------------------eaf0da0d_d0c6_4ad3_84b0_d22df6fa8860-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ssXdu5wjAkLr0od__rv77w.png,ai 3416,2674,The Paradox of Freedom: A Benchmark for Evaluating Large Language Models’ Inference Capabilities,Abstract: This dissertation explores the potential of using the paradox of freedom as a benchmark for assessing the inference capabilities of large language models (LLMs). …,https://medium.com/@TalesMousinho/the-paradox-of-freedom-a-benchmark-for-evaluating-large-language-models-inference-capabilities-11c470edd6ef?source=topics_v2---------111-84--------------------eaf0da0d_d0c6_4ad3_84b0_d22df6fa8860-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3417,2675,How did I create my web page with Notion,"For many years it was my dream to create content on the internet, but I was always held back by fear. I tried making videos, and later attempted a podcast, but I was never satisfied (perfectionism held me back), and eventually I abandoned those projects. …",https://medium.com/@_gian_/how-did-i-create-my-web-page-with-notion-925729ad5657?source=topics_v2---------112-84--------------------eaf0da0d_d0c6_4ad3_84b0_d22df6fa8860-------17,https://miro.medium.com/v2/resize:fill:140:140/1*V-woqe7rn4viJlUenLf05g.jpeg,ai 3418,2676,ChatGPT has (already) changed education forever!,"Like most nerds, I’ve been tinkering with ChatGPT for the past several weeks, and it’s already made a meaningful impact on my personal and work life. When I learned that the GPT-4 model was available to ChatGPT Plus customers, I decided to bite the bullet and subscribe to the $20/mo…",https://medium.com/@craigkitterman_42440/chatgpt-has-already-changed-education-forever-6016ca8b6fe1?source=topics_v2---------113-84--------------------c106493b_4427_4a31_9b8a_9063a4f8766a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*q_C4nbK5MzLmi-kOLYlYzA.png,ai 3419,2487,When Algorithms Transform Creative Design and Infrastructure,"AI is increasingly being used in the fields of architecture and design to aid in the creation of new structures, buildings, and products. AI has the potential to transform infrastructure in a variety of ways. With generative design, AI algorithms can generate multiple design options based on a set of…",https://medium.com/@fapermata/when-algorithms-transform-creative-design-and-infrastructure-3b68a90a5ad9?source=topics_v2---------114-84--------------------c106493b_4427_4a31_9b8a_9063a4f8766a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*dL4Ym6_1fvXONv-4,ai 3420,2677,What can Baidu’s AI do?,"Last week was another year in deep learning. GPT-4 stole the show, Google seemed to whiff it, right now I’m in a library trying to get LLaMA on my $450 PC. China’s Baidu also released, or at least introduced, their own model. …",https://medium.com/@mittmattmutt/what-can-baidus-ai-do-388a307f7ad5?source=topics_v2---------115-84--------------------c106493b_4427_4a31_9b8a_9063a4f8766a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9PvNoVHxCWTMkJx8RHi9NQ.png,ai 3421,2678,Midjourney V5 Has Arrived And It’s Really Good,"Generations in any Aspect Ratio, decent hands, and more — This has been an eventful week for AI. A few days ago we experienced the release of GPT-4, and today Midjourney has dropped a new version of their algorithm. Currently, the new version 5 algorithm is in its alpha state. And it will get fine-tuned and modified for its final…",https://medium.com/seeds-for-the-future/midjourney-v5-has-arrived-and-its-really-good-ef15b78ae268?source=topics_v2---------116-84--------------------c106493b_4427_4a31_9b8a_9063a4f8766a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*OdDSrus8PO97peMg.png,ai 3422,2679,Unveiling the Best AI Tools of 2023: Revolutionizing the Tech Landscape,"Artificial Intelligence (AI) has become an integral part of today’s technology landscape, transforming industries and streamlining processes. As AI continues to evolve, new tools and platforms emerge, offering innovative solutions and groundbreaking advancements. …",https://medium.com/@alsaai/unveiling-the-best-ai-tools-of-2023-revolutionizing-the-tech-landscape-cdb41e5813a4?source=topics_v2---------117-84--------------------c106493b_4427_4a31_9b8a_9063a4f8766a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*sAAPNXlvIFlisxjMlkoA6w@2x.jpeg,ai 3423,2680,Artificial Intelligence: The Promising Future or the End of Humanity?,"A comprehensive look at the pros, cons, and current implementations of AI, along with the top AI tools and platforms available to the public. Artificial intelligence, or AI, has become a buzzword in recent years as its potential and capabilities continue to grow. AI refers to machines that can perform…",https://medium.com/@micahtml/artificial-intelligence-the-promising-future-or-the-end-of-humanity-eb2f77208183?source=topics_v2---------118-84--------------------c106493b_4427_4a31_9b8a_9063a4f8766a-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*C7Z3JYA_yScejWcK99ZfGQ.gif,ai 3424,2681,The Terrifying Reality of GPT-4’s Power: Is it Controlling Us?,"The advancement of Artificial Intelligence has always been a topic of debate among tech enthusiasts, scientists, and the general public. With every new development, the question arises about whether we are controlling AI, or AI is controlling us. OpenAI’s GPT-4, set to be released in the coming years, promises to…",https://medium.com/@saidul.islam/the-terrifying-reality-of-gpt-4s-power-is-it-controlling-us-1150ef081636?source=topics_v2---------119-84--------------------c106493b_4427_4a31_9b8a_9063a4f8766a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*AMsAxEIDkHIcvJca,ai 3425,2682,Exploring Gaussian Mixture Models for Probabilistic Data Modeling and Generation: A Step-by-Step Implementation Guide in Python,"Gaussian Mixture Models (GMMs) are a powerful tool for modeling complex distributions. They are particularly useful in cases where data is not clearly separated into distinct groups or clusters. GMMs can be used for clustering, density estimation, and data generation. …",https://medium.com/@avinashkella/exploring-gaussian-mixture-models-for-probabilistic-data-modeling-and-generation-a-step-by-step-8feafaf698c9?source=topics_v2---------120-84--------------------c106493b_4427_4a31_9b8a_9063a4f8766a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*uFir900JUPmHFTOwWFCraA.png,ai 3426,2626,Breaking Down the Essential Statistical Concepts in Data Science,"Statistics provides the foundation for understanding and interpreting data in Data Science — In the world of data science, statistical concepts play a significant role. From analyzing data sets to building predictive models, the knowledge of statistics is critical for any data scientist. However, for those who are new to the field, statistics can be overwhelming and confusing. Before we dive into the…",https://medium.com/@panData/breaking-down-the-essential-statistical-concepts-in-data-science-5b3f7218bbb3?source=topics_v2---------121-84--------------------c106493b_4427_4a31_9b8a_9063a4f8766a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Hwtt5ugU3SUyEpmblhPZXw.png,ai 3427,2683,AI’s Double-Edged Sword: OpenAI CEO Sounds the Alarm on Risks and Rewards,"Striking a Delicate Balance: Sam Altman Discusses the Ethical Challenges and Transformative Potential of Artificial Intelligence — Sam Altman, the CEO of OpenAI, the company responsible for developing the revolutionary AI application ChatGPT, has recently expressed concerns about the potential dangers associated with the rapidly evolving technology. …",https://medium.com/design-bootcamp/ais-double-edged-sword-openai-ceo-sounds-the-alarm-on-risks-and-rewards-dfd3c28e18cd?source=topics_v2---------122-84--------------------c106493b_4427_4a31_9b8a_9063a4f8766a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Y4ruGluLPCaw9AUAd2Lx5w.png,ai 3428,2588,Python and ChatGPT 4: Develop a Virtual Voice Assistant,"In today’s fast-paced world, voice assistants have become a ubiquitous presence in our daily lives, making tasks more manageable and our interactions with technology more intuitive. From setting reminders and creating to-do lists to searching the web, voice assistants have evolved to become our reliable digital companions. As artificial intelligence continues to advance, OpenAI’s GPT-4 stands as a groundbreaking language model capable of generating highly accurate and relevant content, including code snippets for various applications.",https://medium.com/codingthesmartway-com-blog/python-and-chatgpt-4-develop-a-virtual-voice-assistant-b1cb2c3fc790?source=topics_v2---------123-84--------------------63645ac1_296e_4a97_970b_da9b3933fdb0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OAqh3UfdADvWCEvct5sGpw.png,ai 3429,1137,Revolutionizing the Voice Generation Process with AI: Here’s How Eleven Labs is Changing the Game,"A perfect clone of any voice you put in it — As technology continues to advance at an unprecedented rate, the impact of artificial intelligence (AI) on various industries has been profound. In recent times, the voice generation process has seen a significant transformation due to the advent of AI-based voice generators. …",https://medium.com/@napsaga/revolutionizing-the-voice-generation-process-with-ai-heres-how-eleven-labs-is-changing-the-game-fb0f3f0e3fa9?source=topics_v2---------124-84--------------------63645ac1_296e_4a97_970b_da9b3933fdb0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*nP-qje7F-dcC3n5B.png,ai 3430,2684,AI-Powered Marketing: How to Stay Ahead of the Curve,"In today’s ever-evolving digital landscape, businesses need to stay ahead of the curve to remain competitive. One of the most effective ways to do this is through AI-powered marketing. Artificial intelligence is revolutionizing the marketing industry, providing new opportunities for businesses to connect with their target audience and achieve their…",https://medium.com/web3-use-case/ai-powered-marketing-how-to-stay-ahead-of-the-curve-abfe77aa55e7?source=topics_v2---------125-84--------------------63645ac1_296e_4a97_970b_da9b3933fdb0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*iWQL6EbwEv2FVbAz,ai 3431,2685,ChatGPT-4 Capable of Giving You a Little Kiss,"Open AI has released ChatGPT-4, the latest version of their revolutionary chat bot, and it has some exciting new capabilities that older versions didn’t. It can take visual inputs and turn them into text outputs, turn a sketch of a web page and turn it into a rudimentary but functioning…",https://medium.com/the-journal-post-times/chatgpt-4-capable-of-giving-you-a-little-kiss-e13ffe5ccf83?source=topics_v2---------126-84--------------------63645ac1_296e_4a97_970b_da9b3933fdb0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*W_6R0TSAPDBOPWVh5BNQgg.jpeg,ai 3432,2686,5 New Incredibly Powerful AI Tools That Will Save You 90 % Of Your Time,"Speed up your processes to achieve your goals faster and save your time for the things you really like to do — We all live under the constant pressure of getting things done faster and better. Thanks to the latest advances in artificial intelligence, you can streamline your workflow and maximize efficiency. And if you don´t use it, you stay behind. In this article, I will introduce you to five new AI…",https://medium.com/datadriveninvestor/5-new-incredibly-powerful-ai-tools-that-will-save-you-90-of-your-time-914cc6f2489?source=topics_v2---------127-84--------------------63645ac1_296e_4a97_970b_da9b3933fdb0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0mADWoF45qhpZgwskMeNmg.png,ai 3433,2642,From Ancient Greece to Quantum Computing: A Brief History of AI,"Artificial Intelligence has become a buzzword in recent years, but the concept of creating machines that can perform human-like tasks dates back to ancient times. The idea of creating intelligent machines has been a topic of discussion for centuries, and the field of AI has undergone significant developments and changes…",https://medium.com/@s.kadem26/from-ancient-greece-to-quantum-computing-a-brief-history-of-ai-c017f22abaa7?source=topics_v2---------128-84--------------------63645ac1_296e_4a97_970b_da9b3933fdb0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*eIfU3irTM1CPo6N9,ai 3434,1137,The Future of Artificially Generated Photographs,"Combatting the Rise of Deepfakes: Innovative Solutions for Protecting Visual Integrity — In recent years, there has been a growing concern about the use of artificially generated photographs, commonly known as deepfakes, in the media. The rapid advancement of technology has made it easier for anyone with a computer and the right software to create highly convincing fake images and videos. This…",https://medium.com/@napsaga/the-future-of-artificially-generated-photographs-182405e0eeaa?source=topics_v2---------129-84--------------------63645ac1_296e_4a97_970b_da9b3933fdb0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*jn05tPYSweeimR0w,ai 3435,1137,Introducing DALL-E 2: The New Image Generator from OpenAI,"Unleashing the Next Level of Creativity: A Closer Look at OpenAI’s DALL-E 2, the Revolutionary Image Generator — As technology continues to advance, it is becoming more and more integrated into our daily lives. One of the most impressive advancements in recent years is the development of artificial intelligence (AI) and its applications. One such application is the new image generator from OpenAI, called DALL-E 2.",https://medium.com/@napsaga/introducing-dall-e-2-the-new-image-generator-from-openai-1e15331f2b7a?source=topics_v2---------130-84--------------------63645ac1_296e_4a97_970b_da9b3933fdb0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*o1OT795lJpA5rbMp.png,ai 3436,2661,I asked ChatGPT: Who are Nigerians?,"Reponse 03/18/2023 7:37PM Nigerians are people who are citizens or nationals of Nigeria, a country located in West Africa. Nigeria is the most populous country in Africa, with over 200 million people and more than 250 ethnic groups, each with its own unique culture and traditions. The largest ethnic groups in Nigeria include…",https://medium.com/@okaima/i-asked-chatgpt-who-are-nigerians-1ec2605efc88?source=topics_v2---------131-84--------------------63645ac1_296e_4a97_970b_da9b3933fdb0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PAnnAHKGTowKufJXOk7CPQ.png,ai 3437,2642,Can ChatGPT predict Lottery Numbers?,"Debunking one of AI’s big mysteries… — The lottery is a game of chance that has been around for centuries, and it has become a popular form of entertainment worldwide. With jackpots that can reach hundreds of millions of dollars, it’s no wonder that many people dream of winning the lottery. However, winning the lottery is no…",https://medium.com/@s.kadem26/can-chatgpt-predict-lottery-numbers-288c2e73c174?source=topics_v2---------132-84--------------------63645ac1_296e_4a97_970b_da9b3933fdb0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*9D8MN2GDtB98PUtK,ai 3438,2687,Enon AI Introduction,"Enon AI is a benefit-oriented project that helps you learn about cryptocurrency tokens in the Binance Smart Chain ecosystem with the help of artificial intelligence. By passing the cryptocurrency token smart contract address (0x..) to the AI prompt command line, you can have the AI interpret it. Artificial intelligence makes…",https://medium.com/@enonaicom/enon-ai-introduction-1a8409ae4b3b?source=topics_v2---------133-84--------------------44155818_a492_42c6_9516_571b7dd3548e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*d0aKZRLLkYZOYskaELvI7Q.png,ai 3439,182,The role of AI in enhancing business analytics and intelligence.,"Business analytics and intelligence are critical components of any successful organization. By analyzing data, businesses can gain valuable insights into their operations, identify areas for improvement, and make data-driven decisions. …",https://medium.com/@OfentseManchidi/the-role-of-ai-in-enhancing-business-analytics-and-intelligence-c495c9187547?source=topics_v2---------134-84--------------------44155818_a492_42c6_9516_571b7dd3548e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EPzBMkm4I7AP41ERRgPrMA.png,ai 3440,2688,"Short-Form Video Is a Dead Trend, Time for the Next One!","How AI Could Be the Next Gold Rush — Quick Catch Up on the State of AI (Specifically, the AI Chatbot) Just days ago, OpenAI announced GPT-4, which is a new “set of models that can understand as well as generate natural language or code.” This is, at least according to the test results from OpenAI, a huge improvement over GPT-3.5, which can already give truly impressive results. Now, it’s just…",https://medium.com/@ric-was-unusable/short-form-video-is-a-dead-trend-time-for-the-next-one-5ba1c5af0a18?source=topics_v2---------135-84--------------------44155818_a492_42c6_9516_571b7dd3548e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*WT1WPloJ6NT5GkkpsI7eww.png,ai 3441,2689,Oh My… A.I.,"Raise your glass. — I swear that I am not a “glass is half full” person. When asked this question during job interviews, my answer reveals my perspective as science enthusiast and abstract thinker: “The glass is always full. What is it filled with? In this case, half liquid and half air.” So what…",https://medium.com/@gonzaleznyc/oh-my-a-i-a419be295a0c?source=topics_v2---------136-84--------------------44155818_a492_42c6_9516_571b7dd3548e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*RufMPAiH0JiTqHZvMauBUQ.jpeg,ai 3442,2690,"Microsoft 365 Copilot: The AI-Powered Assistant Revolutionizing work in Word, Excel, PowerPoint, Outlook and Teams","Well, it seems like we’ve been waiting ages for a major AI breakthrough, and now we’re seeing rapid advancements all at one ! While the world was still digesting ChatGPT, google annouced BARD, and just last week GPT4 was announced. And yesterday, Microsoft has launched a new AI-powered co-pilot called…",https://medium.com/@suryansh_srivastava/microsoft-365-copilot-620260a948b8?source=topics_v2---------137-84--------------------44155818_a492_42c6_9516_571b7dd3548e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DCw01i2RoKUpbTekmO4Ajg.jpeg,ai 3443,2514,Navigating the AI Landscape: OpenAI CEO Discusses GPT-4’s Potential and Concerns,"As OpenAI unveiled GPT-4, the latest iteration of its groundbreaking language model, ChatGPT, CEO Sam Altman shared his thoughts on the potential advantages and challenges that come with the rapid development of artificial intelligence technology. The balanced perspective highlights the importance of exercising caution and implementing regulatory measures, while also…",https://medium.com/the-arttech-future/navigating-the-ai-landscape-openai-ceo-discusses-gpt-4s-potential-and-concerns-bd136c59e30e?source=topics_v2---------138-84--------------------44155818_a492_42c6_9516_571b7dd3548e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vqpRuF01M0ZJiypYfCRWPQ.jpeg,ai 3444,2691,5 Surprising Ways AI Is Improving Our Lives Today,"Artificial Intelligence (AI) has been one of the most transformative technologies of our time. While many people associate AI with robots and dystopian futures, the reality is that AI is already making our lives better in countless ways. Here are five surprising ways that AI is improving our lives today. 1. AI Is Revolutionizing Healthcare …",https://medium.com/@kyleb1653/5-surprising-ways-ai-is-improving-our-lives-today-f011938fe910?source=topics_v2---------140-84--------------------44155818_a492_42c6_9516_571b7dd3548e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wSP__mF0b_Qe9-8IeYWs6g.jpeg,ai 3445,2692,emergent abilities of LLMs,"TokTok mumfluencer Lidewij Kopjes: “Chriet, die nieuwe chatbot van jou, ChrietGPT-4, is me toch een engerd! Toen ik hem een vraag stelde over de boekhouding begon ie vuile taal uit te slaan en genereerde hij aan de lopende band dickpics in verschillende schilderstijlen en planetaire omgevingen. Ik zie het deze…",https://medium.com/@kattenkopjes/emergent-abilities-of-llms-7a8a70433ea1?source=topics_v2---------141-84--------------------44155818_a492_42c6_9516_571b7dd3548e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0S-bJHalCshcXrigr2td2Q.jpeg,ai 3446,2693,Page 3: Validating AI feasibility,"Validating AI feasibility Thought deeply about it overnight (til 3 AM) and realized AI is an integral part of the app and should be MVP. Before moving further, we need to validate that we have available resources for AI capabilities that can do what we expect it to do. What do we want…",https://medium.com/@oat-on-a-boat/page-3-validating-ai-feasibility-b81235d94085?source=topics_v2---------142-84--------------------83721e62_68ce_4ac8_a342_5a8b06d4ac48-------17,https://miro.medium.com/v2/resize:fill:140:140/0*4JbMCgkJSFVLe2Fl,ai 3447,2694,The Rise of AI Technology,"A few years ago, artificial intelligence was something only to be seen in science fiction movies. But now, in 2023, developments in computer science and technology come through every day — and they show no signs of slowing down. Artificial intelligence (AI) has been around for decades, but it’s only…",https://medium.com/@prathyush1/the-rise-of-ai-technology-6048608cf2b4?source=topics_v2---------143-84--------------------83721e62_68ce_4ac8_a342_5a8b06d4ac48-------17,https://miro.medium.com/v2/resize:fill:140:140/1*YyKkfQ1loJq_R-4mOhvfwg.jpeg,ai 3448,2695,The Robotic World of the Near Future,"We are just entering a time driven by intelligent and specialized machines, and the possibilities are limitless. — A fully-automated Earth in which robots work with humanity in every conceivable way has been imagined a million times over in science fiction books, film, games and television. According to our dreams, we might end up living in a world reminiscent of “WALL·E”, in which machines assisted humanity in our…",https://medium.com/predict/the-robotic-world-of-the-near-future-edeb8ed15749?source=topics_v2---------144-84--------------------83721e62_68ce_4ac8_a342_5a8b06d4ac48-------17,https://miro.medium.com/v2/resize:fill:140:140/0*6QqzYUnTpVyRR04C.jpeg,ai 3449,2696,"Like Natural Resources, Fields Must Be Harvested for Their Value!","Act Fast or Miss Out: Extracting Maximum Value from Every Field — Every field is like a natural resource that is limited and must be extracted for its value before it runs out. This includes industries like technology, finance, healthcare, and more. …",https://medium.com/@pakcyberbot/like-natural-resources-fields-must-be-harvested-for-their-value-c35348ac73ff?source=topics_v2---------145-84--------------------83721e62_68ce_4ac8_a342_5a8b06d4ac48-------17,https://miro.medium.com/v2/resize:fill:140:140/1*U8ebHNAzeQvomiTYZWSfWg.png,ai 3450,2697,Unlock the Potential of AI: 3 Strategies for Success in the New Era,"Introduction As the AI era rapidly approaches, many people are understandably concerned about the impact it will have on their jobs and livelihoods. (You can read about that in my article here!!) When I first encountered AI, I have to admit I was a little freaked out. The thought of machines replacing…",https://medium.com/@velidran/unlock-the-potential-of-ai-3-strategies-for-success-in-the-new-era-de0853b1eac9?source=topics_v2---------146-84--------------------83721e62_68ce_4ac8_a342_5a8b06d4ac48-------17,https://miro.medium.com/v2/resize:fill:140:140/0*MTKGUy4ijq6moxoj.jpeg,ai 3451,2698,Data Science: Theory and Implementation of the Logistic Regression in Rust.,"Join Medium with my referral link - applied.math.coding Get access to all of my stories and to thousands more on Medium from other writers. As my strong believe is, Medium is…medium.com This story attempts to explain the theory behind the logistic regression and to give a rudimentary implementation in Rust. Logistic regression is a classic algorithm in supervised machine learning that can be used to estimate conditional probabilities of a categorical outcome variable.",https://medium.com/@applied-math-coding/data-science-theory-and-implementation-of-the-logistic-regression-in-rust-80bd158080d5?source=topics_v2---------147-84--------------------83721e62_68ce_4ac8_a342_5a8b06d4ac48-------17,https://miro.medium.com/v2/resize:fill:140:140/1*aPeQCA8IoOL-mw0DBXWY_Q.png,ai 3452,2699,Introducing ChatGPT: Unveiling the Power of GPT-4,"Introduction OpenAI’s ChatGPT, based on the groundbreaking GPT-4 architecture, is an advanced language model designed to understand and generate human-like text. This state-of-the-art AI model has evolved from its predecessors, pushing the boundaries of Natural Language Processing (NLP) and offering a myriad of applications across industries. In this article, we will…",https://medium.com/@sunilforu/introducing-chatgpt-unveiling-the-power-of-gpt-4-acc9aec965bf?source=topics_v2---------148-84--------------------83721e62_68ce_4ac8_a342_5a8b06d4ac48-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3453,2700,Comparing Stickers in Midjourney By Versions,Couple of new things going on in Midjourney for me. This past week I learned how to create stickers using MJ. I still am playing around with parameters but am pleased for the most part on how they come out. I have some ideas for what I want to do…,https://medium.com/@shadowspublishing/comparing-stickers-in-midjourney-by-versions-ecb07e7a4d69?source=topics_v2---------149-84--------------------83721e62_68ce_4ac8_a342_5a8b06d4ac48-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Fqws5q0bsy-Jtz_pnSqc6w.jpeg,ai 3454,2701,"Stop Buying ChatGPT Prompts, Generate Your Own with AIPRM Chrome Extension","Upgrade Your SEO Strategy with This Free Chrome Extension for ChatGPT — Introduction The field of AI has seen tremendous growth in recent years, and natural language processing (NLP) is one of its most exciting subfields. In this article, we will explore the new AIPRM S.E.O extension for ChatGPT, a cutting-edge technology that combined with ChatGPT will blow your mind! If you wish…",https://medium.com/@charles-ross/stop-buying-chatgpt-prompts-generate-your-own-with-aiprm-chrome-extension-662e8e18c988?source=topics_v2---------150-84--------------------3a8a915e_e9ef_40f3_b0ed_b36e3eed3333-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1Fv9TEdbFK-Jtr_g7IfCsg.jpeg,ai 3455,2702,Artificial Consciousness: Exploring the Frontiers of AI,"Artificial Intelligence (AI) has come a long way in recent years. From machine learning algorithms that can recognize faces to natural language processing systems that can understand human speech, AI has made remarkable progress in simulating human cognitive abilities. However, one aspect of human cognition that still remains elusive to…",https://medium.com/@denizsulmaz/artificial-consciousness-exploring-the-frontiers-of-ai-f759c38c8198?source=topics_v2---------151-84--------------------3a8a915e_e9ef_40f3_b0ed_b36e3eed3333-------17,https://miro.medium.com/v2/resize:fill:140:140/1*asoNz3Pc0k0FknVuQnqePw.png,ai 3456,2703,How to Create Software and APIs using ChatGPT,"ChatGPT may be helpful in the development of software in a number of different ways. It may help with the software development process by providing technical advice and insight, evaluating code, and fixing code problems. The software development process may be streamlined and productivity increased by using these features. The…",https://medium.com/@brainyloop/how-to-develop-software-and-apis-using-chatgpt-389741c83fdc?source=topics_v2---------152-84--------------------3a8a915e_e9ef_40f3_b0ed_b36e3eed3333-------17,https://miro.medium.com/v2/resize:fill:140:140/1*2AlotIYRJ_4rbe0gTRt7tQ.jpeg,ai 3457,364,Ethical robots are dead easy: I just road tested how GPT-4 interprets Asimov’s 3 Laws of Robotics,"I’m serious. As long as we have a decently ethical language model like GPT, an ethical robot is easy to create. You just tell it Asimov’s 3 laws. It’ll handle it from there. Might need a few tweaks on Asimov. Here’s my dialog I started asking about the 3 laws.",https://medium.com/@paul.k.pallaghy/ethical-robots-are-dead-easy-i-just-road-tested-how-gpt-4-interprets-asimovs-3-laws-of-robotics-a54352f3cf16?source=topics_v2---------153-84--------------------3a8a915e_e9ef_40f3_b0ed_b36e3eed3333-------17,https://miro.medium.com/v2/resize:fill:140:140/0*RdF4crwqnvRb_bav.jpg,ai 3458,2704,What is MultiModal in AI?,"The multimodal model is an important concept in the field of artificial intelligence that refers to the integration of multiple modes of information or sensory data to facilitate human-like reasoning and decision-making. Traditionally, AI models have focused on processing information from a single modality, such as text, image, or speech…",https://medium.com/becoming-human/what-is-multimodal-in-ai-1a24a4ea478b?source=topics_v2---------154-84--------------------3a8a915e_e9ef_40f3_b0ed_b36e3eed3333-------17,https://miro.medium.com/v2/resize:fill:140:140/1*KID7BPPPV3oPxJvubz0RUw.jpeg,ai 3459,2657,2 ChatGPT (Free) Chrome Extensions so Useful They Almost Feel Illegal,"Save hours on writing emails, googling, learning, and more — Unless you’re a Himalayan hermit, you’ve heard of ChatGPT. Amassing 1 million users within 5 days, this AI breakthrough spawned an army of paid courses, YouTube channels, software apps, and full-blown businesses. Among those apps are Chrome extensions — or rather, a cesspool of buggy, useless “extensions.” Painstakingly wading through…",https://medium.com/swlh/2-chatgpt-free-chrome-extensions-so-useful-they-almost-feel-illegal-605b1c9d48ee?source=topics_v2---------155-84--------------------ca452e05_468e_4ea2_96c2_01d5449b78a1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Ws885W8cq7_AZOGSRbzIlA.jpeg,ai 3460,2683,ChatGPT Meets Google Sites: How to Create an Incredible Free Image Optimizer,"In only 2 simple steps — Creating web tools can be a tedious process, especially if you lack technical coding knowledge. However, with the advent of advanced language models like ChatGPT, creating useful tools is now a simple and straightforward process. In this article, we’ll be discussing a image optimizer tool that ChatGPT created for…",https://medium.com/design-bootcamp/chatgpt-meets-google-sites-how-to-create-an-incredible-free-image-optimizer-166d524f9530?source=topics_v2---------156-84--------------------ca452e05_468e_4ea2_96c2_01d5449b78a1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4byhxpjNA45bAcw0sES99w.png,ai 3461,2705,"Reading Herculaneum Scrolls: $250,000 Challenge with Unrolling Restriction","Scientists have announced a contest with a prize of a quarter of a million dollars. The task is to harness artificial intelligence to read an ancient treasure. These include scrolls from the library at Herculaneum, destroyed by the eruption of Mount Vesuvius. On August 24, 79 AD, one of the…",https://medium.com/@darkenergyarticles/reading-herculaneum-scrolls-250-000-challenge-with-unrolling-restriction-f1723b31aac3?source=topics_v2---------157-84--------------------ca452e05_468e_4ea2_96c2_01d5449b78a1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*GEybu8wbYtDaWXLISZyORw.jpeg,ai 3462,2706,GPT-4 API Pricing Analysis,"The current model behind the GPT-4 API is named gpt-4–0314. To access this model through the GPT-4 API, it will cost: $0.03 per 1k prompt request tokens* $0.06 per 1k completion response tokens* *1k tokens is equivalent to ~750 words.",https://medium.com/sopmac-labs/gpt-4-api-pricing-analysis-a507a4bf9829?source=topics_v2---------158-84--------------------ca452e05_468e_4ea2_96c2_01d5449b78a1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5hR3_CKf837D3NbcGafkGA.png,ai 3463,2707,Some concerns about AI and chatbots,"I’m struggling with the future I see in my mind’s eye, but I see some very serious issues arising, and soon, with these new AI developments I see the recent development of advanced AI chatbots (ChatGPT, Sydney, Bard, etc.) as extremely dangerous for a few reasons: 1) being the exemplar…",https://medium.com/@tamhunt/some-concerns-about-ai-and-chatbots-45c21961bc5?source=topics_v2---------159-84--------------------ca452e05_468e_4ea2_96c2_01d5449b78a1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*KG5tqKJbv5E5QCnp7ICjvA.jpeg,ai 3464,2708,Toolkits to make AI based simulations of cityscapes with Unreal Engine.,"Unreal Engine has been a popular game engine used by developers to create visually stunning and immersive games. However, it’s also finding a growing application in other industries, such as architecture and city planning. The engine’s ability to simulate cityscapes and landscapes has made it an ideal platform for developers…",https://medium.com/@madarapremawardana/toolkits-to-make-ai-based-simulations-of-cityscapes-with-unreal-engine-37f069607893?source=topics_v2---------160-84--------------------ca452e05_468e_4ea2_96c2_01d5449b78a1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*weqzfZKuYAuoUZMM4XTbiQ.png,ai 3465,2709,Understanding and Using OpenAI’s API,"As the world becomes more digital, there is a growing demand for artificial intelligence (AI) tools that can automate and enhance various aspects of our lives. OpenAI is one such company that has been at the forefront of AI research and development, and their API is an excellent tool for…",https://medium.com/@lochux/understanding-and-using-openais-api-8d3cb4ddcb3?source=topics_v2---------161-84--------------------ca452e05_468e_4ea2_96c2_01d5449b78a1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pdbm0N3zzGCQMMhn-G4IGw.png,ai 3466,2710,Why Developers Should Learn AI Development: Advantages and Opportunities,"Artificial Intelligence (AI) is no longer just a buzzword but a technology that is rapidly transforming the way we live, work and interact. From digital assistants like Siri and Alexa to self-driving cars and personalized healthcare, AI is making its presence felt in every sphere of our lives. For developers…",https://medium.com/@ianeddyk/why-developers-should-learn-ai-development-advantages-and-opportunities-d0101f18eaf9?source=topics_v2---------162-84--------------------ca452e05_468e_4ea2_96c2_01d5449b78a1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*5a-nCsGhqxjEdYmL,ai 3467,2711,Chinese version ChatGPT — Baidu’s Ernie Bot?,"Although GPT-4 had no promotion before its release, its sudden announcement still triggered a rapidly proliferating wave. According to OpenAI, GPT-4 is a large multimodal model that can accept text and image inputs while returning text output that “exhibits human-level performance on various professional and academic benchmarks.”[1] However, as OpenAI’s…",https://medium.com/@maadaa-ai/chinese-version-chatgpt-baidus-ernie-bot-2dcdcf7e53ea?source=topics_v2---------163-84--------------------ca452e05_468e_4ea2_96c2_01d5449b78a1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*djjogKOuAg0quXm5D5iyhw.jpeg,ai 3468,2712,Does chat GPT display the characteristics of disruptive innovation?,"Disruptive innovation is a concept coined by Clayton Christensen in his book “The Innovator’s Dilemma.” It refers to a technology or product that enters a market and fundamentally changes the way it operates, often making older technologies or products obsolete. GPT, or Generative Pretrained Transformer, is a language model developed…",https://medium.com/@dinospeaks/does-chat-gpt-display-the-characteristics-of-disruptive-innovation-60b8a9448ed2?source=topics_v2---------164-84--------------------54d5662b_ea83_42e0_9ac9_8215256c5af7-------17,https://miro.medium.com/v2/resize:fill:140:140/0*noiD108eBEjnfylH,ai 3469,2624,From AI to AGI: The Next Frontier in Artificial Intelligence,"“Artificial Intelligence would be the ultimate version of Google. The ultimate search engine that would understand everything on the Web. It would understand exactly what you wanted, and it would give you the right thing. We’re nowhere near doing that now. However, we can get incrementally closer to that, and…",https://medium.com/@mr.rahulsharma2107/from-ai-to-agi-the-next-frontier-in-artificial-intelligence-b84c5bb12fcb?source=topics_v2---------165-84--------------------54d5662b_ea83_42e0_9ac9_8215256c5af7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*b_-j8pYm8QfuoMMOZ4yRTg.jpeg,ai 3470,21,Stephen King Is Still A Faster Writer Than AI,"Stephen King Defeats AI Challenger in Epic Battle of Novel-Writing Speed and Creativity while writing, “In the Fog, a Werewolf.” In an unexpected turn of events, it appears that legendary horror author Stephen King has a new rival in the world of fast and prolific novel writing: artificial intelligence. However…",https://medium.com/@matt.ryanallen/stephen-king-is-still-a-faster-writer-than-ai-43a555c1c2cb?source=topics_v2---------166-84--------------------54d5662b_ea83_42e0_9ac9_8215256c5af7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JAlZfkJx69Gb2213TXGfBg.png,ai 3471,1320,Brief Review — ParNet: Non-Deep Networks,"ParNet, Restricted to 12 Layers Only, Parallel Subnetworks Instead of Stacking One Layer After Another — Non-Deep Networks, ParNet, by Princeton University, and Intel Labs 2021 arXiv v1, Over 20 Citations (Sik-Ho Tsang @ Medium) Image Classification Image Classification 1989 … 2022 [ConvNeXt] [PVTv2] [ViT-G] [AS-MLP] [ResTv2] [CSWin Transformer] [Pale Transformer] [Sparse MLP] [MViTv2] [S²-MLP] [CycleMLP] [MobileOne] [GC ViT] [VAN] [ACMix] [CVNets] [MobileViT] [RepMLP] 2023 [Vision Permutator…",https://medium.com/@sh-tsang/brief-review-parnet-non-deep-networks-e2e1d0d243aa?source=topics_v2---------167-84--------------------54d5662b_ea83_42e0_9ac9_8215256c5af7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_EkGPAUDmHRVTDkP6TEkBg.png,ai 3472,2713,The 90/90 rule: Why ChatGPT was able to create a new application ecosystem so quickly. The case for repeatable building blocks for Applied AI.,"More of Nick’s perspectives on Applied AI/ML, AI leadership, transformation, and modern GTM strategies, sign up here. So your team has been tirelessly working on the most critical AI transformation project in the company. It’s intense, there’s a lot of pressure, and you’ve hired the best talent you can find…",https://medium.com/@applieddatascience/the-90-90-rule-why-chatgpt-was-able-to-create-a-new-application-ecosystem-so-quickly-72a01128493a?source=topics_v2---------168-84--------------------54d5662b_ea83_42e0_9ac9_8215256c5af7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DmtotDFTjqYEjMacc2ayvg.png,ai 3473,2533,The Technology Butterfly Effect,"How AI Influences Every Aspect of Our Lives — In the fascinating world of chaos theory, the butterfly effect is a phenomenon where a small change in one part of a system can result in significant effects in other parts of the system. This concept has found a new embodiment in the realm of technology through Artificial Intelligence. Today…",https://medium.com/@johnnosta/the-technology-butterfly-effect-c158c36ff3c8?source=topics_v2---------169-84--------------------54d5662b_ea83_42e0_9ac9_8215256c5af7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*g9G7AEA4BjD3h9jYKMYsTw.png,ai 3474,2714,3 easy ways I’m implementing AI for my agency and clients.,With #AI Twitter…,https://medium.com/@brian_81111/3-easy-ways-im-implementing-ai-for-my-agency-and-clients-84e9e31df36e?source=topics_v2---------170-84--------------------54d5662b_ea83_42e0_9ac9_8215256c5af7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*E1e30cbttWwQp0GYDiLJ9w.png,ai 3475,2715,The birth of the superhuman UX designer: how AI is changing the game,"The ultimate guide to integrating AI into your design thinking process — As a mother of 3, most of my dinner table conversations revolve around comics, anime, and superhumans in general. What I’ve learned from these passionate discussions and debates is that some superhumans are scientifically made or receive their powers by accidental exposure to something. Others got bit by a magical…",https://medium.com/user-experience-design-1/the-birth-of-the-superhuman-ux-designer-how-ai-is-changing-the-game-249d34c03840?source=topics_v2---------171-84--------------------54d5662b_ea83_42e0_9ac9_8215256c5af7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BrAvYQul2w01x3s8e0Va-w.png,ai 3476,2465,The Math of AI Alignment 101: Instrumental Convergence,"A series on AI alignment basics. — This is the fourth article in a series on the math of AI alignment. It’s meant to be introductory to give a flavor of the types of math you might encounter if you go into this field. In the previous three, I said they were independent. This one will require…",https://medium.com/cantors-paradise/the-math-of-ai-alignment-101-instrumental-convergence-4213c75e778f?source=topics_v2---------172-84--------------------54d5662b_ea83_42e0_9ac9_8215256c5af7-------17,https://miro.medium.com/v2/resize:fill:140:140/0*_kNYRGebEHLGvAew,ai 3477,2716,"ChatGPT-4 Summarized My Four Published Books In 28 Seconds, And The Result Was Pretty Good","Unless you’ve been living under a rock, and that rock had no internet or mobile phone service, and for some reason, you were trapped under said rock without friends or family to keep you informed of world events, you have likely heard of ChatGPT. Just in case you have been…",https://medium.com/@dpontefract/chatgpt-4-summarized-my-four-published-books-in-28-seconds-and-the-result-was-pretty-good-e95f8261a644?source=topics_v2---------173-84--------------------54d5662b_ea83_42e0_9ac9_8215256c5af7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7bgAEAt53GzeqBxyh4CYhg.png,ai 3478,2717,Supercharge Your Python Programming with These Must-Try ChatGPT Prompts,"Are you looking to take your Python programming skills to the next level? Look no further! I’ve put together a list of 18 must-try ChatGPT prompts that will help you design and develop applications, analyze and interpret data, and write maintainable code. …",https://medium.com/@info_74815/supercharge-your-python-programming-with-these-must-try-chatgpt-prompts-955983a2ac91?source=topics_v2---------174-84--------------------728538af_8214_4df2_b2e4_1d12e9f61be8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3zZna43sd7a7Zf-hEU4RSA.png,ai 3479,165,Boost Your Productivity and Efficiency with These 12 Incredible AI Tools,LOVO 1.LOVO — is a platform that provides AI voice generation and text-to-speech services to content creators. It offers a variety of realistic AI voices that are designed to engage audiences and save creators a significant amount of time and money. The platform has over 400+ voices available in different styles…,https://medium.com/@nhshinwari21/boost-your-productivity-and-efficiency-with-these-12-incredible-ai-tools-e7aa316a5ef7?source=topics_v2---------176-84--------------------728538af_8214_4df2_b2e4_1d12e9f61be8-------17,https://miro.medium.com/v2/resize:fill:140:140/0*EC8imIgiXJ4gY6Uv.jpg,ai 3480,2718,I tried to develop a NodeJS application using only ChatGPT — I failed,"My daughter loves to be told stories. But since our library is not infinite, and a little tired of reading the same stories over and over again, last weekend I decided to create stories with ChatGPT. The principle was simple: I asked my daughter which characters should appear in her…",https://medium.com/@blamouche/i-tried-to-develop-a-nodejs-application-using-only-chatgpt-i-failed-4a7c2b0053c7?source=topics_v2---------177-84--------------------728538af_8214_4df2_b2e4_1d12e9f61be8-------17,https://miro.medium.com/v2/resize:fill:140:140/0*SHxbXXHGwMV4DRNl,ai 3481,2719,The Rapid Advancements in Artificial Intelligence,"The rapid advancements in artificial intelligence (AI) technology have sparked concerns about the potential impact on employment. With AI becoming increasingly sophisticated, many people worry that their jobs may soon be at risk. However, it’s important to understand that the impact of AI on the job market is complex and…",https://medium.com/the-everything-blog/the-rapid-advancements-in-artificial-intelligence-c8dba732d53f?source=topics_v2---------178-84--------------------728538af_8214_4df2_b2e4_1d12e9f61be8-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lneMzOUmhVvy0TET,ai 3482,2720,Build and Deploy your own chatGPT app in 10 minutes with chatGPT API. 🚀,In this article we will Create our own chatGPT Application using the chatGPT API and Streamlit library in Python. Below you can see the app in action.,https://medium.com/@praneeth-kandula/build-and-deploy-your-own-chatgpt-app-in-10-minutes-with-chatgpt-api-2396655039eb?source=topics_v2---------179-84--------------------728538af_8214_4df2_b2e4_1d12e9f61be8-------17,https://miro.medium.com/v2/resize:fill:140:140/g:fp:0.41:0.31/1*beZcg5TtpIiTzIBm7AH1Nw.jpeg,ai 3483,2721,The AI Ambition and the Ground Reality,"This blog attempts to connect the dots between the present AI excitement to what it could mean for the future of data, while reconciling with some of the lessons learned from recent past. AI-powered World We are living in one of the most exciting times for AI with ChatGPT being the Sputnik…",https://medium.com/smartlets/the-ai-ambition-and-the-ground-reality-7619f33e558a?source=topics_v2---------180-84--------------------728538af_8214_4df2_b2e4_1d12e9f61be8-------17,https://miro.medium.com/v2/resize:fill:140:140/0*3EisrYiaKXjr6aRN,ai 3484,2722,How ChatGPT an Open AI is unlocking the potentials of Artificial Intelligence: Prospects and Future threats,"It can be challenging to keep up with the fast pace of change in the technological elements of the modern world, where technology has been evolving quickly. When we were young, we watched a variety of robot movies that demonstrated how a robot might think like a person and sometimes…",https://medium.com/the-systems-engineering-scholar/how-chatgpt-an-open-ai-is-unlocking-the-potentials-of-artificial-intelligence-prospects-and-future-3a600ad2a4fd?source=topics_v2---------181-84--------------------728538af_8214_4df2_b2e4_1d12e9f61be8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7XI-TVZMzp-u3u_EjXaeuA.jpeg,ai 3485,2723,The Struggle of AI: Euphoria and Ethics in the Age of Artificial Intelligence,"Since the dawn of civilization, humans have harnessed technology to improve their lives and shape the world around them. However, with every advancement comes new challenges and potential for destruction. In this blog post, we’ll explore the dual nature of technology throughout history, highlighting both its benefits and drawbacks. The…",https://medium.com/@albertheemeijer/the-struggle-of-ai-euphoria-and-ethics-in-the-age-of-artificial-intelligence-9490a6635044?source=topics_v2---------182-84--------------------728538af_8214_4df2_b2e4_1d12e9f61be8-------17,https://miro.medium.com/v2/resize:fill:140:140/1*C-hZR60Rc8j8jXjoS9aFtA.png,ai 3486,2724,The High 5 — Vol. 3 — 5 AI Tools You Don’t Want to Miss,"Well, well, well, look who’s got a thing for versatile tools! I am quite the fan of those all-in-one solutions that can handle any niche they’re designed for. …",https://medium.com/@aitoolboxreviews/the-high-5-vol-3-5-ai-tools-you-dont-want-to-miss-671aaf5e1aae?source=topics_v2---------183-84--------------------728538af_8214_4df2_b2e4_1d12e9f61be8-------17,https://miro.medium.com/v2/resize:fill:140:140/0*-4O3-FOa9wH3Z2OA,ai 3487,2725,"A Pinch of AI, a Dash of Code: Building a Recipe Chatbot with GPT-3 (yup, the same model that powers ChatGPT)","GPT-3, or Generative Pre-trained Transformer 3, is an insanely powerful AI language model developed by OpenAI. Its ability to understand the context and generate human-like text based on prompts has taken the world by storm. …",https://medium.com/@akshay-milmile/a-pinch-of-ai-a-dash-of-code-building-a-recipe-chatbot-with-gpt-3-yup-the-same-model-that-72c156c0e4c3?source=topics_v2---------184-84--------------------f8b9f1f8_faaa_4f97_9707_19bbd096ac58-------17,https://miro.medium.com/v2/resize:fill:140:140/1*cmz6mUJNPmdiIOHYSIPQjQ.png,ai 3488,2726,David Brin’s Essential (mostly neglected) Questions and Answers About Artificial Intelligence,"About this article: In due process of dealing with recent Facebook hacking attacks, I shared to my dear friend David Brin, a letter to CISA’s Director, Jen Easterly. David’s response to me included this essay on AI. Enjoy! Special Note: Any income generated by the views of the members of Medium will be…",https://medium.com/predict/david-brins-essential-mostly-neglected-questions-and-answers-about-artificial-intelligence-670f3d655ac1?source=topics_v2---------185-84--------------------f8b9f1f8_faaa_4f97_9707_19bbd096ac58-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PQgBtT3R8E74-top-Qh9Xg.jpeg,ai 3489,2727,ChainGPT Welcomes Yay Network CEO and CMO to its advisory board,"We’re excited to announce that Guilherme Jovanovic, CEO of Yay Network, and Pedro Verdades, CMO of Yay Network, have joined the advisory board of ChainGPT, a cutting-edge technology company specializing in advanced AI models for the blockchain and crypto industries. As ChainGPT continues to innovate and grow, the expertise and…",https://medium.com/@chaingpt/chaingpt-welcomes-yay-network-ceo-and-cmo-to-its-advisory-board-9cc7541e3605?source=topics_v2---------186-84--------------------f8b9f1f8_faaa_4f97_9707_19bbd096ac58-------17,https://miro.medium.com/v2/resize:fill:140:140/1*8afT3IoSc8_WAURDJsZ27Q.png,ai 3490,2728,The Ur-Sentience of AI,"This is the second article on a series exploring the transformative technology of AI. The first article, We Taught Machines Art, explored the impact of AI technology in art. But that article was published six months ago- a much simpler time. Since then, ChatGPT has exploded onto the scene, a…",https://medium.com/@JerkyTreats/the-ur-sentience-of-ai-178e461e64b8?source=topics_v2---------187-84--------------------f8b9f1f8_faaa_4f97_9707_19bbd096ac58-------17,https://miro.medium.com/v2/resize:fill:140:140/1*biD6s0X_72yea-U-5wDIrw.png,ai 3491,2729,Whatnot and Kumo.AI Leaders Discuss the Latest in Machine Learning [Videos],"Recently, leaders from Whatnot and Kumo.AI discussed the latest in machine learning and AI and the power of graph neural networks.",https://medium.com/whatnot-engineering/whatnot-and-kumo-ai-leaders-discuss-the-latest-in-machine-learning-videos-fbcbc2b06f8a?source=topics_v2---------188-84--------------------f8b9f1f8_faaa_4f97_9707_19bbd096ac58-------17,https://miro.medium.com/v2/resize:fill:140:140/1*FemD8RGdsROIPMSRvhBDhg.jpeg,ai 3492,2730,"AI Will Not Replace You, But a Human Using AI Might","Embrace Collaboration to Thrive — In the face of rapid advancements in generative AI, many people have undoubtedly wondered whether their jobs are safe. For years, we may have assumed that automation would first target labor and transportation, but to our astonishment, creative work seems to be the first domino to fall. Text-to-image generators like…",https://medium.com/@subcreation/ai-will-not-replace-you-but-a-human-using-ai-might-a2e9383137fd?source=topics_v2---------189-84--------------------f8b9f1f8_faaa_4f97_9707_19bbd096ac58-------17,https://miro.medium.com/v2/resize:fill:140:140/1*J2sZ5XrUIxH2TfxBIp-Oog.png,ai 3493,2731,DataLand ^ ChatGPT: To Start a New AI-oriented Social Paradigm (2),"According to recent news, the CTO of Microsoft Germany revealed that GPT-4, which will offer a multimodal model, will be published the following week. With GPT-4, AI can generate text, images, and even video, while the old version of ChatGPT can only generate text. …",https://medium.com/@sinsonetwork/dataland-chatgpt-to-start-a-new-ai-oriented-social-paradigm-2-56a109c017f4?source=topics_v2---------190-84--------------------f8b9f1f8_faaa_4f97_9707_19bbd096ac58-------17,https://miro.medium.com/v2/resize:fill:140:140/1*l3EEyQn3iDRz5dXrU062bQ.png,ai 3494,1062,Thriving in the Age of AI: Developing Irreplaceable Skills for Product Managers,"The rise of artificial intelligence (AI) has significantly impacted the role of product managers, with AI-driven tools automating various aspects of the job. As a result, it is crucial for product managers to upskill and adapt to this evolving landscape. In this article, we will discuss the irreplaceable skills and certifications product managers should consider to thrive in the age of AI. — Cultivate Emotional Intelligence and Empathy",https://medium.com/products-by-women-journal/thriving-in-the-age-of-ai-developing-irreplaceable-skills-for-product-managers-83ecb4f7bb9e?source=topics_v2---------191-84--------------------f8b9f1f8_faaa_4f97_9707_19bbd096ac58-------17,https://miro.medium.com/v2/resize:fill:140:140/1*j_w2xskJ3IrkEruiX8as3w.png,ai 3495,2693,Page 2: Name and Branding,"The first and most step of a project is, of course, the project name. Who has time to brainstorm different titles and typography in 2023? Let’s use AI. First I went to Namelix.com to generate a name. You can feed basic keywords about the brand, and select name styles, and levels of randomness.",https://medium.com/@oat-on-a-boat/page-2-name-and-branding-b73cbdd24a12?source=topics_v2---------192-84--------------------f8b9f1f8_faaa_4f97_9707_19bbd096ac58-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0Lw__mc8efuzBZxd9sB_IQ.png,ai 3496,2732,Is Artificial Intelligence Capable of Consciousness?,"In a world where technology is advancing at an exponential rate, it is no surprise that we are starting to question the capabilities of artificial intelligence (AI). In an incident at Google, a software engineer claimed that a chatbot named LaMDA, which he had worked on for months, was an…",https://medium.com/@rodrigo1226/is-artificial-intelligence-capable-of-consciousness-f0f69a8c25ea?source=topics_v2---------193-84--------------------f8b9f1f8_faaa_4f97_9707_19bbd096ac58-------17,https://miro.medium.com/v2/resize:fill:140:140/0*pUKQujW31Eio2KKm,ai 3497,2733,"I Tried 3 AI Productivity Tools To Make My Job Easier, but They Just Made Everything Harder","What people don’t tell you about using AI on a daily basis — “AI is a tool — not a cure-all to modern problems.” — Griffin McCutcheon If you have read me for a while, you will know I have a love/hate relationship with artificial intelligence. While I know that it can be very useful in some cases, and it has the potential…",https://medium.com/swlh/i-tried-3-ai-productivity-tools-to-make-my-job-easier-but-they-just-made-everything-harder-f575388d0966?source=topics_v2---------194-84--------------------2d0cbeb6_4bc2_4d19_bd5f_c3a7045ea0c5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TbfTSbQtO7R7svdDu_rfrg.jpeg,ai 3498,2544,ChatGPT vs. Other Chatbots: The Ultimate Comparison,"In today’s digital age, chatbots have become an increasingly important tool for businesses to interact with customers. Chatbots can provide 24/7 customer support, answer frequently asked questions, and make product recommendations. One of the most advanced chatbots currently available is ChatGPT, an AI-powered conversational agent based on the GPT-3.5 architecture. …",https://medium.com/@beyond_verse/chatgpt-vs-other-chatbots-the-ultimate-comparison-f78f3fffdb5b?source=topics_v2---------195-84--------------------2d0cbeb6_4bc2_4d19_bd5f_c3a7045ea0c5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*WsPb0LXabRZlGo89e6TpFA.jpeg,ai 3499,2482,ChatGPT 4 Has Just Been Released and It’s Smarter in Every Way!,"ChatGPT 4 has just been released, and it’s smarter than ever before! This latest version of the popular AI language model from OpenAI boasts a range of new features and enhancements that make it even more powerful and versatile than its predecessors. One of the most significant improvements in ChatGPT…",https://medium.com/readers-digests/chatgpt-4-has-just-been-released-and-its-smarter-in-every-way-f0c8d2d31bf2?source=topics_v2---------196-84--------------------2d0cbeb6_4bc2_4d19_bd5f_c3a7045ea0c5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*oicJLZt7q8wT3-Ef,ai 3500,2734,You Won’t Believe How AI Ghostwriters are Revolutionizing the Blogosphere!,"Well, well, well! If it isn’t the rise of the machines! Alright, maybe that’s a bit dramatic, but I promise you, this isn’t your average “sky is falling” hysteria. AI ghostwriting tools are genuinely transforming the blogging game, and they’re doing it faster than you can say “I, for one…",https://medium.com/@supernichesites/you-wont-believe-how-ai-ghostwriters-are-revolutionizing-the-blogosphere-8a98cfd1779b?source=topics_v2---------197-84--------------------2d0cbeb6_4bc2_4d19_bd5f_c3a7045ea0c5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*5g14xHEtyChGCZJw,ai 3501,2735,"Writers, Get With the Program: Quit or Get Smarter",Quit whining and worrying over ChatGPT and other ai programs coming for your livelihood and make a decision. Lay down and hand it over or figure out how to embrace it and grow.,https://medium.com/@writersbra.com/writers-get-with-the-program-quit-or-get-smarter-201e4e977edf?source=topics_v2---------198-84--------------------2d0cbeb6_4bc2_4d19_bd5f_c3a7045ea0c5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tOyovh0AXuLfZxXWiZ47hQ@2x.jpeg,ai 3502,2736,How to survival in the Age of ChatGPT,"The emergence of ChatGPT marks the arrival of the Fourth Industrial Revolution:AI Revolution, whether we like it or not. This new era requires everyone to be vigilant, as ChatGPT is the first steam engine of the AI industrial revolution. Everyone will inevitably be involved. AI revolution vs Industrial revolution: similarities Both employ new technologies, introducing mechanization…",https://medium.com/@koshinryuu/how-to-survival-in-the-age-of-chatgpt-beb40db730a4?source=topics_v2---------199-84--------------------2d0cbeb6_4bc2_4d19_bd5f_c3a7045ea0c5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*sqqpVEB3G8eh7ccT7I258Q.png,ai 3503,2737,The Endless Age: A Prophecy of Immortality and AI,"Once upon a time, humanity stood at the brink of its greatest achievement yet: the ability to conquer death itself. Through countless years of scientific innovation and research, mankind had finally unlocked the secrets to eternal life. No longer would people have to suffer the sorrow and pain of loss…",https://medium.com/@parveztar/the-endless-age-a-prophecy-of-immortality-and-ai-56c06edf5a46?source=topics_v2---------200-84--------------------2d0cbeb6_4bc2_4d19_bd5f_c3a7045ea0c5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*hSGExTqDcreU4l1p,ai 3504,962,Microsoft’s Semantic Kernel Unleashes the Power of AI,"A seamless integration of AI and UI capabilities that revolutionizes app development — Date: March-17, 2023 Semantic Kernel (SK) is Microsoft’s new SDK for integrating Large Language Models (LLMs) and artificial intelligence (AI) into applications. AI-driven advances in natural language processing are changing the way we interact with software, from intelligent chatbots to code generators. …",https://medium.com/@bhardwajmanu/microsofts-semantic-kernel-unleashes-the-power-of-ai-c1189520e0d6?source=topics_v2---------201-84--------------------2d0cbeb6_4bc2_4d19_bd5f_c3a7045ea0c5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*VGh6bWiwqM4G-_PPrXXFBw.png,ai 3505,2738,Unleashing Creativity with AI: How Artificial Intelligence is Empowering Artists,"Introduction: The art world is no stranger to technological advancements, and the rise of Artificial Intelligence (AI) is no exception. Far from replacing artists, AI is providing them with innovative tools that push the boundaries of creativity. In this article, we’ll delve into the world of AI-assisted art creation and…",https://medium.com/@AILifelab/unleashing-creativity-with-ai-how-artificial-intelligence-is-empowering-artists-5a0ac693c98?source=topics_v2---------202-84--------------------2d0cbeb6_4bc2_4d19_bd5f_c3a7045ea0c5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ZzZzkEo5cK7WopXyWDWKIQ.png,ai 3506,2739,How to use GPT-4 totally free,"Language models have come a long way in the past few years, and GPT-3 has been one of the most impressive ones so far. But now, GPT-4 has arrived and promises to be even more powerful than its predecessor. In this article, we will take a look at how to…",https://medium.com/@exceed73/how-to-access-gpt-4-for-free-1e37820ff677?source=topics_v2---------203-84--------------------2d0cbeb6_4bc2_4d19_bd5f_c3a7045ea0c5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*8i_XKb-WfPiaXFhqk5kihg.png,ai 3507,2740,Midjourney v5 Is a Step Closer to Reality,"The new version of the AI image generator went live today — Today, Midjourney dropped Version 5 of its AI imaging algorithm, and so far the results are spectacular — even the hands. The update is an improvement from the impressive v4, which was a big leap from v3. In short, since I joined Midjourney in September 2022, the platform has made…",https://medium.com/counterarts/midjourney-v5-is-a-step-closer-to-reality-658e4bb5c1c7?source=topics_v2---------204-84--------------------6d87fbf0_7c76_47b7_952e_aafb936e624b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*M3_azGd5pqWH9y8AqiTEAA.png,ai 3508,2741,Neuronets in Design,"Is this even possible? — Neuronet is a common world for modern people. Nowadays, we talk about brain activity more and more often, trying to understand how to become more productive and make our brains work better. Well, neurones are one of the key definitions in this area. First of all, this is a connection…",https://medium.com/ux-planet/neuronets-in-design-1cea3ee0124c?source=topics_v2---------205-84--------------------6d87fbf0_7c76_47b7_952e_aafb936e624b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Ss_LylfOEI_oHiRaBTQw_A.jpeg,ai 3509,2533,The GPT Effect: A Cognitive Catalyst,"Thinking better is a function of expanding choices. — The power of human cognition is an extraordinary thing, but it isn’t without its limitations. Often, we find ourselves saying, “if only I thought of that,” as we miss opportunities or face challenges. One might recall the old V8 drink commercials and their catchy slogan, “I could’ve had a V8,”…",https://medium.com/@johnnosta/the-gpt-effect-a-cognitive-catalyst-6b5d8c0c9b97?source=topics_v2---------206-84--------------------6d87fbf0_7c76_47b7_952e_aafb936e624b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DGgFMPMmS7Vy01Qp6u8xPQ.png,ai 3510,2742,Well… ChatGPT can now do First Principles Thinking,I built a simple PySide 6 python app a few months ago to have a reliable desktop client to talk to OpenAIs models. Then I joined the waitlist for GPT 4 model which just came out. The results are compelling…,https://medium.com/@timothy-urista/well-chatgpt-can-now-do-first-principles-thinking-5ba2c7788b20?source=topics_v2---------207-84--------------------6d87fbf0_7c76_47b7_952e_aafb936e624b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*3Urkg5uGbVw9_PS-,ai 3511,2743,Chat GPT Once Joked: Why did the capitalist cross the road? So that they could get to the other side where they still have a job.,"Every time I mention that capitalism is a system that is fading away, and that it is degenerating, people get shocked. They get outraged when I mention that it could be necessary to start preparing to live differently. This is a concept that is alien to them, understandably. Watch this…",https://medium.com/@An-labelled/chat-gpt-once-joked-why-did-the-capitalist-cross-the-road-a9457d647f44?source=topics_v2---------208-84--------------------6d87fbf0_7c76_47b7_952e_aafb936e624b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*28lVlA87mBfm03lE4F5qWQ.jpeg,ai 3512,2430,The truth about AI and creativity,"The battle of ownership — Artificial intelligence has been making significant strides in recent years, particularly with the emergence of large language models (LLMs) and advanced image processors. …",https://medium.com/@ronibatra345/the-truth-about-ai-and-creativity-a1842bf2e6ba?source=topics_v2---------209-84--------------------6d87fbf0_7c76_47b7_952e_aafb936e624b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*DbtSP2mwJJBlOWXv,ai 3513,2744,The Wildest Week Yet in AI : What You Need to Know,"The week ending March 17, 2023 has been an absolute whirlwind in the AI world, with groundbreaking announcements coming in every single day. Here’s a summary of the key developments that have taken the AI community by storm: Stanford introduces Alpaca7B model: A lightweight, efficient model that democratizes large language…",https://medium.com/@dlaytonj2/the-wildest-week-yet-in-ai-what-you-need-to-know-36bc0d3eadab?source=topics_v2---------210-84--------------------6d87fbf0_7c76_47b7_952e_aafb936e624b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*8XNS2gH31DZgftGm,ai 3514,2745,Midjourney V5 Is Live!,"A comparison of V4 and V5. — As soon as Midjourney’s V5 went live, I wanted to test it (play with it) and see how it is different from V4 and compare quality. The image above and below use the same prompt, which I’ve listed below each image so you can see not only how simple the…",https://medium.com/the-fictioneers-treasure-trove/midjourney-v5-is-live-5bea759e63c7?source=topics_v2---------211-84--------------------6d87fbf0_7c76_47b7_952e_aafb936e624b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Up_Qii7wVjebo3y95rtjiw.png,ai 3515,2746,From “OpenAI” to “ClosedAI”,"“OpenAI co-founder on company’s past approach to openly sharing research: ‘We were wrong’. ” Capitalism is an economic system in which individuals, rather than the state, own and control the means of production, distribution, and exchange of goods and services. …",https://medium.com/@tresep05_92114/from-openai-to-closedai-31b5433b8b52?source=topics_v2---------212-84--------------------6d87fbf0_7c76_47b7_952e_aafb936e624b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qhsmEl-8E3IDS5KWPc7ZWw.png,ai 3516,2747,ChatGPT: The Real AI Milestone with a Global Impact,"AI has been evolving faster than ever, and we hear about new amazing products coming out daily. I have been working on AI technologies for quite a while and witnessing their power-horse in changing the landscape of several businesses. …",https://medium.com/@anis.koubaa/chatgpt-the-real-ai-milestone-with-a-global-impact-5cbe9b3b2614?source=topics_v2---------213-84--------------------6d87fbf0_7c76_47b7_952e_aafb936e624b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*GH0K8pIS0Y7TJyI8KQ78yw.png,ai 3517,2748,"7 Ways I Used ChatGPT In My Marketing Job This Week, With Varied Results","Who isn’t talking about ChatGPT? You might find an empty room asking that question. Since its launch in November 2022, ChatGPT has taken the world by storm. Artificial intelligence isn’t new. There are over 1,000 AI tools on the market in all kinds of creative industries, from copywriting to development…",https://medium.com/@centricsquared/7-ways-i-used-chatgpt-in-my-marketing-job-this-week-with-varied-results-ce56585e4f01?source=topics_v2---------214-84--------------------760c836f_93e3_42c9_99ee_466f5479e9dd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*bWnh3bHNFcQS0O4OkHjUXA.png,ai 3518,2749,"Glaze, a New Tool for Protecting Your Artwork from AI","I’m just a hobbyist artist. You know when you go to a community landscape art class, and you see all those retired folks chatting with each other about the investment or gardening class they just took, their art supplies in hand — well, I’m now one of those old-at-life new-to-art…",https://medium.com/@merlinamcgovern_47148/glaze-a-new-tool-for-protecting-your-artwork-from-ai-2a2af3da8a2a?source=topics_v2---------215-84--------------------760c836f_93e3_42c9_99ee_466f5479e9dd-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ts68f1OjfHYW4JW6.png,ai 3519,2750,Le Corbusier Architect and Designer of Furniture and AI Design of Chair,"Midjourney V-4 e V-5 — Le Corbusier was a Swiss-French architect, designer, and painter who was one of the pioneers of modern architecture and design in the early 20th century. He is one of the best for his innovative furniture designs, which combined form and function with a minimalist aesthetic. Le Corbusier’s furniture designs were…",https://medium.com/@regia-marinho/le-corbusier-architect-and-designer-of-furniture-and-ai-design-of-chair-35d691da040?source=topics_v2---------216-84--------------------760c836f_93e3_42c9_99ee_466f5479e9dd-------17,https://miro.medium.com/v2/resize:fill:140:140/0*KJCnKB_Ozz_bQ_va.jpg,ai 3520,2751,AI and Advanced Mathematical Reasoning,With the latest release of GPT-4 there’ve been more rumors about robots replacing humans. Some Ph.D. students even have an existential crisis about the matter! …,https://medium.com/@andynik/ai-and-advanced-mathematical-reasoning-9d51247e64e0?source=topics_v2---------217-84--------------------760c836f_93e3_42c9_99ee_466f5479e9dd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*2ZCtvT1Y9H6a1QGngdPqeg.jpeg,ai 3521,159,Empower Your Data: A Beginner’s Guide to Power BI,"In the age of big data, businesses need effective tools for analyzing and visualizing data. Power BI is a powerful business intelligence tool developed by Microsoft that enables users to analyze and visualize data from a wide range of sources. …",https://medium.com/@abhishekmishra13k/empower-your-data-a-beginners-guide-to-power-bi-3c526b51aee?source=topics_v2---------218-84--------------------760c836f_93e3_42c9_99ee_466f5479e9dd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MXJB6L03kYuGdQkAQLzMNA.png,ai 3522,2752,"The Cosmic Dance of Singularity: AI, Intelligent Energy, and Our Unstoppable Journey","Unraveling the Mysteries of Singularity: Black Holes and AI — A Brief Introduction to Black Holes and Event Horizons In the vastness of space, black holes are among the most enigmatic cosmic phenomena. Formed from the remnants of massive stars, black holes are regions of spacetime where the mass of the dying star is so heavy that it bends the very fabric of our universe. …",https://medium.com/@andelkovics98/the-cosmic-dance-of-singularity-ai-intelligent-energy-and-our-unstoppable-journey-9814de4418bb?source=topics_v2---------219-84--------------------760c836f_93e3_42c9_99ee_466f5479e9dd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Of-hYInuqhA4QTHjHfxmoA.jpeg,ai 3523,1202,GPT-4: why your company needs a machine learning strategy,"I’ve been thinking about the future of machine learning after the presentation of GPT-4, a tool that takes advantage of the resources made available to OpenAI by Microsoft to offer far superior capabilities: generation of content up to eight times longer (limit of 25,000 words), knowledge of more languages, the…",https://medium.com/enrique-dans/gpt-4-why-your-company-needs-a-machine-learning-strategy-fef027a8b27f?source=topics_v2---------220-84--------------------760c836f_93e3_42c9_99ee_466f5479e9dd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xK1Fs6mE29936_iadyBydg.jpeg,ai 3524,2681,Building Smarter Apps with ChatGPT Prompts: A Developer’s Guide,"As a developer, you know how important it is to create engaging and intelligent apps that can keep up with the ever-changing technology landscape. One way to do this is by leveraging the power of ChatGPT prompts to build smarter apps that can communicate with users and provide personalized experiences…",https://medium.com/@saidul.islam/building-smarter-apps-with-chatgpt-prompts-a-developers-guide-b6cc691fc7ee?source=topics_v2---------221-84--------------------760c836f_93e3_42c9_99ee_466f5479e9dd-------17,https://miro.medium.com/v2/resize:fill:140:140/0*X3Meu-bPb1noxyt-,ai 3525,181,Revolutionize Your Design Process with Midjourney V5: Get a First Look at Test-Alpha Today,"The Ultimate AI Model for Stunning Imagery Has Finally Arrived — Midjourney, the leading AI-based design tool, has just announced the release of its highly anticipated Version 5 algorithm. This cutting-edge model promises to be a game-changer in the field of digital design, offering a wider range of styles and higher image quality than ever before. …",https://medium.com/design-bootcamp/revolutionize-your-design-process-with-midjourney-v5-get-a-first-look-at-test-alpha-today-2c84e55702e4?source=topics_v2---------222-84--------------------760c836f_93e3_42c9_99ee_466f5479e9dd-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QfI9PTagoYJCnXYD2aV6Lw.jpeg,ai 3526,2753,"Part I, The Spark that Lit the Hybrid Fire:","Unthinkable thoughts, cognitive revolutions, natural born cyborgs, extended mind theory, and building better worlds to think in — Richard Hamming, a mathematician, computer scientist, and Manhattan Project member, once suggested that just like there are sounds we cannot hear, waves of light we cannot see, and flavours we cannot taste, there could be thoughts we cannot think: “Evolution, so far, may possibly have blocked us from being able…",https://medium.com/@terralynn.forsyth/part-i-the-spark-that-lit-the-hybrid-fire-dcff4f3756e8?source=topics_v2---------223-84--------------------760c836f_93e3_42c9_99ee_466f5479e9dd-------17,https://miro.medium.com/v2/resize:fill:140:140/0*AwG1V8nfNvVp4AwZ.jpeg,ai 3527,2754,How to Make $100 Daily with AI: Tips and Strategies,"How AI is Changing the Game Making money with AI has become easier than ever before. From automating your business to trading stocks, and creating content, there are several ways to make money with AI. In this article, we will discuss the top 5 ways to make $100 daily with AI, including affiliate marketing, blogging, online…",https://medium.com/@moneytent/how-to-make-100-daily-with-ai-tips-and-strategies-22613f02ca31?source=topics_v2---------224-84--------------------df7d8fef_c9e5_48b6_8dd2_02d5a8147956-------17,https://miro.medium.com/v2/resize:fill:140:140/0*cbN3QsMtD4NfNKtR.png,ai 3528,2755,"Devalue or Defend: Generative AI, Artists, and the Law","An interview with Jessica Fjeld, Lecturer on Law & Assistant Director of the Cyberlaw Clinic at the Berkman Klein Center for Internet & Society OpenAI, creator of text generator ChatGPT, started out as a nonprofit in 2015 but became a “capped profit” entity a short three years later. This week…",https://medium.com/berkman-klein-center/devalue-or-defend-generative-ai-artists-and-the-law-7b5f514ff822?source=topics_v2---------225-84--------------------df7d8fef_c9e5_48b6_8dd2_02d5a8147956-------17,https://miro.medium.com/v2/resize:fill:140:140/0*LowNG3R_mCfnKxfi,ai 3529,2595,"AI’s Artful Homage: Capturing the Essence of Goddesses in Botticelli, Da Vinci, and Vermeer’s Works","Artificial intelligence (AI) has made a lot of progress recently and can now create art that looks like it was made by humans. Some people are interested in whether AI can make paintings that are as good as the famous ones made by artists like Botticelli, Da Vinci, and Vermeer. …",https://medium.com/@hzbright0802/how-ai-generated-art-comes-close-to-master-paintings-of-goddesses-by-botticelli-da-vinci-and-8c8e408a3ff4?source=topics_v2---------226-84--------------------df7d8fef_c9e5_48b6_8dd2_02d5a8147956-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0j0z0aeE31jThGqeLhA8fA.png,ai 3530,2756,"New- Age marketing, leveraging “Transformers”","As marketing becomes increasingly data-driven and digital, companies are looking for new ways to analyze and understand consumer behavior. …",https://medium.com/@pavankumar.s.naik/new-age-marketing-leveraging-transformers-2d900b49f1a7?source=topics_v2---------227-84--------------------df7d8fef_c9e5_48b6_8dd2_02d5a8147956-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_oh5YR1FsmRZ5nhzdyhCdA.png,ai 3531,2757,Will AI replace software engineers?,"While Artificial Intelligence (AI) is rapidly evolving and disrupting many industries, it is unlikely to replace software engineers anytime soon. Here are some reasons why this nightmare is still far away: AI is a tool, not a replacement AI is a powerful tool that can help automate certain aspects of…",https://medium.com/@neensta/will-ai-replace-software-engineers-629ad3a165d?source=topics_v2---------228-84--------------------df7d8fef_c9e5_48b6_8dd2_02d5a8147956-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Xlpup1GOf5YAF3R4,ai 3532,2758,Unraveling the Role of GPT4 in Healthcare for Clinicians,"The future of AI in medicine has taken a significant step forward with the recent announcement of GPT-4 by OpenAI on 3/14/2023. This latest linguistic and visual marvel has piqued the interest of doctors and healthcare professionals worldwide, leaving many wondering if GPT-4 will replace them or merely serve as…",https://medium.com/@jhpark.med/unraveling-the-role-of-gpt4-in-healthcare-for-non-techie-doctors-19a22d2422de?source=topics_v2---------229-84--------------------df7d8fef_c9e5_48b6_8dd2_02d5a8147956-------17,https://miro.medium.com/v2/resize:fill:140:140/0*OvKup-ljtOo8j333,ai 3533,2759,The role of AI in monitoring and preserving natural resources for environmental sustainability.,"The history of Artificial intelligence(AI) and Machine Learning(ML) is fascinating and full of excitement and imagination. From the early days of sci-fi novels and movies that depicted AI as either benevolent machines or fearsome robots, to the current state of AI that is shaping our lives in so many ways…",https://medium.com/@rene.hennen/the-role-of-ai-in-monitoring-and-preserving-natural-resources-for-environmental-sustainability-a075d4da4284?source=topics_v2---------230-84--------------------df7d8fef_c9e5_48b6_8dd2_02d5a8147956-------17,https://miro.medium.com/v2/resize:fill:140:140/1*GyQsHiVS9G-zRCJ5xqKsVA.png,ai 3534,2760,The Future of Artificial Intelligence: Opportunities and Challenges,"Artificial intelligence (AI) has been one of the most significant technological advancements of the last decade. AI has been used in various applications, from personal assistants like Siri and Alexa to self-driving cars and medical diagnosis systems. AI has the potential to transform many industries and solve complex problems, but…",https://medium.com/@ayoungmalaysian/the-future-of-artificial-intelligence-opportunities-and-challenges-687a0df3af83?source=topics_v2---------231-84--------------------df7d8fef_c9e5_48b6_8dd2_02d5a8147956-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wi-Dp-k6q_2nr0m_LrWkeg.jpeg,ai 3535,2761,LLaMA & Alpaca: “ChatGPT” On Your Local Computer 🤯 | Tutorial,"In this article I will show you how you can run state-of-the-art large language models on your local computer. Yes, you’ve heard right. For this we will use the dalai library which allows us to run the foundational language model LLaMA as well as the instruction-following Alpaca model. While the…",https://medium.com/@martin-thissen/llama-alpaca-chatgpt-on-your-local-computer-tutorial-17adda704c23?source=topics_v2---------232-84--------------------84345154_3349_4d91_bf04_414ee1289b75-------17,https://miro.medium.com/v2/resize:fill:140:140/1*mDMk1QULR4um9ZCyC2EBtg.png,ai 3536,2414,ChatGPT’s 10-Year Millionaire Formula — An Entrepreneurship Blueprint,"AI tips + entrepreneur’s insights for building wealth — In the US, the median income in 2021 was $5,809 per month. Yet, only 8.8% of people were millionaires, and 95% of all millionaires in America have a net worth between $1 and $10 million. While a higher net worth usually correlates with a higher income, it’s not always the…",https://medium.com/entrepreneur-s-handbook/chatgpts-10-year-millionaire-formula-an-entrepreneurship-blueprint-9a9af76433ae?source=topics_v2---------233-84--------------------84345154_3349_4d91_bf04_414ee1289b75-------17,https://miro.medium.com/v2/resize:fill:140:140/1*n54ejuRJKqhrjh7sEyxv0w.jpeg,ai 3537,2762,ChatGeoPT: Exploring the future of talking to our maps,"In this blog post we walk through some of our initial explorations using AI interfaces to solve geospatial problems. As a vehicle for trying out these ideas, we’ve created ChatGeoPT, a toy Geospatial AI Assistant. ChatGeoPT translates natural language text into OpenStreetMap Overpass API calls, reads the API response data…",https://medium.com/earthrisemedia/chatgeopt-exploring-the-future-of-talking-to-our-maps-b1f82903bb05?source=topics_v2---------234-84--------------------84345154_3349_4d91_bf04_414ee1289b75-------17,https://miro.medium.com/v2/resize:fill:140:140/0*S3gMI5c_ATR9-HZ2,ai 3538,265,SecGPT transforms cybersecurity through AI-driven insights.,"Hello folks, SecGPT is a cutting-edge AI model that has been trained on thousands of cybersecurity reports. It is designed for penetration testers, offensive security researchers, and other cybersecurity professionals. SecGPT enables you to: Examine new tendencies and patterns in offensive security strategies. Develop focused exploitation techniques and identify potential vulnerabilities. Get a deeper…",https://medium.com/@45w1nkv/secgpt-transforms-cybersecurity-through-ai-driven-insights-c5074c90bee1?source=topics_v2---------235-84--------------------84345154_3349_4d91_bf04_414ee1289b75-------17,https://miro.medium.com/v2/resize:fill:140:140/1*AQ1npQQp17WMiS-f41brPw.jpeg,ai 3539,2763,"If You Don’t Like the Question, Ask a Different One","Forget about the title; this is actually about me 😁 So … The Questions I Got In a research talk that I gave in early 2018, I got one question from the audience, “is NLP still worth studying, given the amazing performance of deep learning on many benchmarks?” I admit it was a tough…",https://medium.com/@yangfengji/if-you-dont-like-the-question-ask-a-different-one-973b27e61fcf?source=topics_v2---------236-84--------------------84345154_3349_4d91_bf04_414ee1289b75-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Zb0Gmq3NMA5MVR1baGbhDg.png,ai 3540,2764,Intro to Elastic Weight Consolidation (EWC),"This article aims to provide the reader with an initial idea of how EWC helps overcome catastrophic forgetting in a continual learning setting. In a continuous effort over the years to improve AI and make it just like the human brain, we have come so far!! (Applause for all the…",https://medium.com/@saumya.april1/intro-to-elastic-weight-consolidation-ewc-b03cf4d41957?source=topics_v2---------237-84--------------------84345154_3349_4d91_bf04_414ee1289b75-------17,https://miro.medium.com/v2/resize:fill:140:140/1*bps52HCRMgtFhJacSVfNFA.jpeg,ai 3541,1202,Generative AI assistants: everything everywhere all at once,"Locked in a battle over the integration of their respective machine learning assistants into their office suites, Microsoft and Google have announced a number of very attractive, and very similar automation features — email, word processing, spreadsheets, presentation programs, etc.,. Microsoft’s integration of ChatGPT has resulted in Copilot — as…",https://medium.com/enrique-dans/generative-ai-assistants-everything-everywhere-all-at-once-f8f8728dec53?source=topics_v2---------238-84--------------------84345154_3349_4d91_bf04_414ee1289b75-------17,https://miro.medium.com/v2/resize:fill:140:140/1*FmqwVRZEys2ISYUUMJ_dtw.jpeg,ai 3542,2765,Wait Time Bypass for fun and Profit,"Hello hackers, I am back with another bug bounty write-up. In today’s blog, I am going to show you how I was able to bypass a ban time of 20 Minutes. This bug was on one of the domains from the Automattic. *.intensedebate.com is in scope. I started hunting for…",https://medium.com/@vijetareigns/wait-time-bypass-for-fun-and-profit-c3837e6bb8ed?source=topics_v2---------0-84--------------------e91f8f84_a26f_4a4b_810f_80c0ed5c0e4d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QPg460YaXkdBrzPCcyga3Q.png,cybersecurity 3543,380,Safe Login Requirements,"at a glance — If you are a regular reader you may remember my comments about OWASP being good at listing security vulnerabilities but not security features. Unfortunately many companies struggle designing a proper login flow, leading to many issues like credential stuffing, bogus registrations and bot traffic, among others. Probably one of the…",https://medium.com/@vaceituno/safe-login-requirements-13c9bfeb74a8?source=topics_v2---------1-84--------------------e91f8f84_a26f_4a4b_810f_80c0ed5c0e4d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*O1_bTfSm1mgCLrEoiGkpkA.png,cybersecurity 3544,2766,Bypassing Asymmetric Client Side Encryption Without Private Key,"I recently wrote an article on how we can bypass client-side encryption. With the help of the PyCript burp suite extension, we can make manual and automated pentesting or bug bounty much easier on applications with client-side encryption. The use of the PyCript extension fails when the application uses asymmetric…",https://medium.com/bugbountywriteup/bypassing-asymmetric-client-side-encryption-without-private-key-822ed0d8aeb6?source=topics_v2---------2-84--------------------e91f8f84_a26f_4a4b_810f_80c0ed5c0e4d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ihx_yzdaHNR3GKBwCKS1SQ.jpeg,cybersecurity 3545,2767,Account Takeover: An Epic Bug Bounty Story,"Hello Folks! I am back after a long time with an interesting (pre) Account Takeover bug and how I chained this with XSS. You might get confused as this is a long writeup, but don’t worry, stick it till the end; I’ve simplified the things at the end for better…",https://medium.com/bugbountywriteup/account-takeover-an-epic-bug-bounty-story-dd5468d5773d?source=topics_v2---------3-84--------------------e91f8f84_a26f_4a4b_810f_80c0ed5c0e4d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0FJ1t2u0e0vD_6IquICT9g.png,cybersecurity 3546,2768,CorePass Live Test Data,"Hello, CorePass Testers! We are excited to share with you the results of your test! We are excited to report that the mass testing has successfully met our expectations! We always knew that our platforms were going to be able to withstand the pressure of dozens (and even hundreds) of…",https://medium.com/@corepasscc/corepass-live-test-data-ccacf71beedb?source=topics_v2---------4-84--------------------e91f8f84_a26f_4a4b_810f_80c0ed5c0e4d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5p-0pqVpXf9v-jSNMnQVrQ.png,cybersecurity 3547,2769,AMSI Bypass New Way 2023,"this blog introduces you to how to bypass AMSI (antimalware scan interface) — This bypass can break over the period of time , so keep that in mind . Hello friend !! This is SURYA DEV SINGH, back here again with a new blog, In this blog, we will be discussing a new technique and a flaw found in asmi.dll , which leads…",https://medium.com/bugbountywriteup/amsi-bypass-new-way-2023-d506345944e9?source=topics_v2---------5-84--------------------e91f8f84_a26f_4a4b_810f_80c0ed5c0e4d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kiWJn3yU2OSe-XLMo5k9tw.png,cybersecurity 3548,2770,My Client Website Got Hacked: Lessons Learned and Steps to Strengthen Website Security,"During the first week of January, flying back to Mauritius, I get an intriguing message from my colleague saying one of our client websites was down. We have been freelancing together for some time at Dessart Studio, building and hosting websites. It was the first time we had such an…",https://medium.com/@e.murairi/my-client-website-got-hacked-lessons-learned-and-steps-to-strengthen-website-security-a37fda9e1080?source=topics_v2---------6-84--------------------e91f8f84_a26f_4a4b_810f_80c0ed5c0e4d-------17,https://miro.medium.com/v2/resize:fill:140:140/0*f-rU12Arsr15ANLw,cybersecurity 3549,2771,"Cloud, FISMA, NIST, & FedRAMP oh my!","Get up to speed on the US Government push into cloud-computing & understanding what the heck FISMA, NIST, and FedRAMP are. The US Federal Government spends ~ $80 billion dollars on Information Technology (IT) annually. On December 23, 2022, President Biden signed the FedRAMP Authorization Act into law as part…",https://medium.com/@ryanharth/cloud-fisma-nist-fedramp-oh-my-be91aaa6134?source=topics_v2---------7-84--------------------e91f8f84_a26f_4a4b_810f_80c0ed5c0e4d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kbw3vvPizUNaaVRZwl24Xw.jpeg,cybersecurity 3550,2772,SSH Bruteforcing with C++,"Introduction Welcome to my new article, today I will show you my C++ script to perform SSH Brute Force Attacks. What is Brute Forcing? Information by: What is a Brute Force Attack? | Definition, Types & How It Works Brute Force Attack Definition A brute force attack is a hacking method that uses trial and error to crack passwords…www.fortinet.com A brute force attack is a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys. It is a simple…",https://medium.com/@ssalssa.1.12.2.1.2.1/ssh-bruteforcing-with-c-16155cc9c51c?source=topics_v2---------8-84--------------------e91f8f84_a26f_4a4b_810f_80c0ed5c0e4d-------17,https://miro.medium.com/v2/resize:fill:140:140/0*TSHwr5TeI3eCPb1I.png,cybersecurity 3551,2773,"Hack Dojo: Stay Ahead of the Game with the Latest Research in Cybersecurity, DevOps, and AI","Are you a cybersecurity expert, DevOps engineer, or AI researcher looking to stay on top of the latest trends and insights in your field? Or maybe you’re an enthusiastic learner interested in exploring the cutting-edge of these rapidly evolving fields? Either way, Hack Dojo is here to help! Hack Dojo…",https://medium.com/@hackdojo/hack-dojo-stay-ahead-of-the-game-with-the-latest-research-in-cybersecurity-devops-and-ai-47d02bb3c9cd?source=topics_v2---------9-84--------------------e91f8f84_a26f_4a4b_810f_80c0ed5c0e4d-------17,https://miro.medium.com/v2/resize:fill:140:140/1*c3I4FAlO1hPZ5EI5mZznpQ.png,cybersecurity 3552,2774,“Decider”: a new tool for threat intelligence analysts,"Besides tracking and analyzing new threats, an important task threat intelligence analysts work on is that of ‘attribution’, i.e. figuring out which hacker group may be most likely responsible for a certain attack by checking their ‘modus operandi’, which is Latin for identifying someone’s working style and patterns. …",https://medium.com/@rdillon73/decider-a-new-tool-for-threat-intelligence-analysts-bfc541ac8b96?source=topics_v2---------10-84--------------------2ce5533e_3ef2_4296_8d61_35e64c9eeec5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*19QusoM6h085LRq7.png,cybersecurity 3553,2775,Investigate Cyber Attacks through OSINT,“Juicy Details” TryHackMe Room simulates the aftermath of a cyber-attack where a SOC analyst is tasked with analyzing the attack patterns from log files. An analyst needs to look at logs to investigate the root causes and sources of a cyber incident. The room is a great exercise for looking…,https://medium.com/the-first-digit/investigate-cyber-attacks-through-osint-15c4b3ea658e?source=topics_v2---------11-84--------------------2ce5533e_3ef2_4296_8d61_35e64c9eeec5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*3VfF9-VmyMqrcSJEpPPfJg.png,cybersecurity 3554,2776,How to configure your Burp for intercepting Rooted Android traffic.,"How to configure your Burp for intercepting Rooted Android traffic. In order to intercept application traffic in burp, you first need to root your device in my case I have used google pixel 3a and Magisk for rooting the device. …",https://medium.com/@rajraman786/how-to-configure-your-burp-for-intercepting-rooted-android-traffic-411f3cc0c07?source=topics_v2---------12-84--------------------2ce5533e_3ef2_4296_8d61_35e64c9eeec5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ztceEXXasVy1yFNJnR8HHA.png,cybersecurity 3555,2777,Simple Linux Privilege Escalation Techniques,These commands help us to enumarate the linux machine. hostname cat /proc version cat /etc/issue uname -a ps env sudo -l cat /etc/passwd and /etc/shadow history ifconfig netstat getcap cat /etc/crontab ip a s (ip address show) find /home -name flag1.txt: find the file names “flag1.txt” in the /home directory …,https://medium.com/@omergnscr/simple-linux-privilege-escalation-techniques-a49cf8130a54?source=topics_v2---------13-84--------------------2ce5533e_3ef2_4296_8d61_35e64c9eeec5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3556,2778,TryHackMe | OWASP Top 10–2021,"TryHackMe | OWASP Top 10 - 2021 Learn about and exploit each of the OWASP Top 10 vulnerabilities; the 10 most critical web security risks.tryhackme.com This room breaks each OWASP topic down and includes details on the vulnerabilities, how they occur, and how you can exploit them. You will put the theory into practice by completing supporting challenges. Broken Access Control Cryptographic Failures",https://medium.com/@etno972/tryhackme-owasp-top-10-2021-97907f815cc?source=topics_v2---------14-84--------------------2ce5533e_3ef2_4296_8d61_35e64c9eeec5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*YNZjBh4ujagIqvQQuYA_cg.png,cybersecurity 3557,2779,Pepsi Data Breach: Critical Information Hacked,"Pepsi Data Breach: An Unauthorized Access Breach — Pepsi Bottling Ventures, America’s largest manufacturer and distributor of Pepsi-Cola beverages said that “it’s network was breached by threat actors”. Pepsi has sent notices to all affected consumers , claiming that the breach was executed by deploying info-stealing malware around December 23, 2022. However, Pepsi was not aware of the…",https://medium.com/night-riders/pepsi-data-breach-critical-information-hacked-f7557a234d67?source=topics_v2---------15-84--------------------2ce5533e_3ef2_4296_8d61_35e64c9eeec5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7mjOSneYI800MOTuSBm56w.png,cybersecurity 3558,2780,Beyond the Basics: Tackling threats in Active Directory Infrastructure,"Active Directory: Proven Strategies and Practical Tips for Preventing threats — Active Directory is a central part of many organizations’ IT infrastructure: controlling access to applications, data, and network resources. It allows computers to find and communicate with other computers in the corporate network in an organized way. The Active Directory can also define who is authorized to access resources in…",https://medium.com/@ismaelbouarfa/beyond-the-basics-tackling-threats-in-active-directory-infrastructure-59c9ab638819?source=topics_v2---------16-84--------------------2ce5533e_3ef2_4296_8d61_35e64c9eeec5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BnPBx3lyLpzPM5ic5Ofn2Q.png,cybersecurity 3559,271,ARP Spoofing with On the Fly,Introduction Hello welcome everyone today I am going to show you how to do an ARP Spoofing attack easily with a very good tool that I have found and you will see many new articles. ARP Spoofing (Address Resolution Protocol Spoofing) is a type of cyber attack where an attacker sends…,https://medium.com/@s12deff/arp-spoofing-with-on-the-fly-c9ff0aa29c2a?source=topics_v2---------17-84--------------------2ce5533e_3ef2_4296_8d61_35e64c9eeec5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*re3c9Uo7jEjK94Wt0i5Znw.png,cybersecurity 3560,286,How to become a successful bug bounty hunter.,"Do Your Research The first step in becoming a successful bug bounty hunter is to do your research. Start by understanding how different systems work and learn about different types of vulnerabilities. Stay up-to-date with the latest security news and trends by following security blogs, news sites, and forums. Example: Let’s say you…",https://medium.com/@securitylit/how-to-become-a-successful-bug-bounty-hunter-adc05c90b174?source=topics_v2---------18-84--------------------77f6df7d_8856_4607_92cd_3e0212855ba0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*UTOEm4-yNO82_r4B,cybersecurity 3561,2781,How to learn Reverse-Engineering Fast in 2023(A Practical Approach),"CONTENT Intro What to Learn Best way to learn it Extra Resources Outro Intro Reverse engineering in cybersecurity refers to the process of analyzing malicious software or other digital artifacts to understand how they operate and to identify potential security vulnerabilities. This can involve decompiling, disassembling, or otherwise reverse engineering…",https://medium.com/@zuber-kariye/how-to-learn-reverse-engineering-fast-in-2023-a-practical-approach-89e5189d9395?source=topics_v2---------19-84--------------------77f6df7d_8856_4607_92cd_3e0212855ba0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3562,2782,Investment in SOCRadar,"Democratizing threat intelligence in a world of widening attack surfaces — We at 212 are excited to announce our latest investment in SOCRadar’s Series A Round. In short, SOCRadar is a cyber-threat early warning system bundle: the External Attack Surface Management, Digital Risk Protection, and Threat Intelligence solution called Extended Threat Intelligence (“XTI”). …",https://medium.com/212vc/investment-in-socradar-826249a32195?source=topics_v2---------20-84--------------------77f6df7d_8856_4607_92cd_3e0212855ba0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LpF4L_FMTeqo-Zgq1SCHHA.png,cybersecurity 3563,2783,Exploring Google Cloud’s Log Analytics: A Must-Have Tool for Cloud Security Professionals,"If you’re a cloud security professional, you know how crucial it is to have access to detailed logs of events and activities within your cloud environment. Without proper logging and analysis, it’s challenging to identify potential security threats, troubleshoot issues, and ensure compliance with regulations. …",https://medium.com/@asjad.nasir88/exploring-google-clouds-log-analytics-a-must-have-tool-for-cloud-security-professionals-2562675b3daa?source=topics_v2---------22-84--------------------878f7ae3_f2e0_4fbb_83dd_69696d95a8f7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*lAHwW35SZ2aEZ6TMOcL2Pw.jpeg,cybersecurity 3564,543,Anonymous Tryhackme Room Write-up,"Welcome to my new write-up, without wasting any further time lets just jump into it. Read some of the questions beforehand just to get an idea what you’ve to do. So when you start the machine, you’ll get an IP ADDRESS. First thing I did was to open it up…",https://medium.com/@tusharsaini484/anonymous-tryhackme-room-write-up-60b9e2a8bd50?source=topics_v2---------23-84--------------------878f7ae3_f2e0_4fbb_83dd_69696d95a8f7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tM_r8jdFqt0TnNzJlzUiyg.png,cybersecurity 3565,2784,"Russia-Ukraine cyber conflict splits APT groups, raises threat level","The global cyberthreat landscape has changed since Russia’s invasion of Ukraine but not necessarily in the ways predicted. When Russia invaded Ukraine on February 24, 2022, the military campaign had significant support from multi-pronged cyber operations aiming to sow misinformation, shut down communications and disrupt critical infrastructure. In the runup…",https://medium.com/readme/russia-ukraine-cyber-conflict-splits-apt-groups-raises-threat-level-f19edb8fc0b1?source=topics_v2---------24-84--------------------878f7ae3_f2e0_4fbb_83dd_69696d95a8f7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4_IiLw12No8myY3mA4BEeQ.png,cybersecurity 3566,2778,TryHackMe | Vulnerability Capstone,Summarise the skills learnt in this module by completing this capstone room for the “Vulnerability Research” module. Ackme Support Incorporated has recently set up a new blog. Their developer team have asked for a security audit to be performed before they create and publish articles to the public. It is…,https://medium.com/@etno972/tryhackme-vulnerability-capstone-3cfed19a2844?source=topics_v2---------25-84--------------------878f7ae3_f2e0_4fbb_83dd_69696d95a8f7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ddXpHmnzia2SDx56-RBHng.png,cybersecurity 3567,2785,"SANS SEC504: Hacker Tools, Techniques, and Incident Handling ABC Including: Course, CTF and Exam Review .","$ /usr/bin/cat index.txt A. Intro B. Feedback: B1. Course B2. CTF B3. Exam C. Preparation: C1. Course C2. CTF C3. Exam C4. In-person class D. Last but not least A. INTRO: Hello, first I want to say to you that I have earn it. Since the begging of my journey…",https://medium.com/@marcin-gorski/sans-sec504-hacker-tools-techniques-and-incident-handling-abc-including-course-ctf-and-exam-d40cd52b567?source=topics_v2---------26-84--------------------878f7ae3_f2e0_4fbb_83dd_69696d95a8f7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*52wYqgSJNRXTmDYhwlnVPQ.png,cybersecurity 3568,422,Security Cheat Codes for Microservices Architectures,"Up-Up-Down-Down-Left-Right-Left-Right-B-A The power of microservices architectures lies in their resilience and flexibility. However, it also means that security needs to be taken into consideration from the very beginning. As a software architect, knowing the basics of security for these types of architectures is essential. Whether you’re just starting to explore the…",https://medium.com/@jeremiahtalamantes/security-cheat-codes-for-microservices-architectures-9d19f7625f70?source=topics_v2---------27-84--------------------878f7ae3_f2e0_4fbb_83dd_69696d95a8f7-------17,https://miro.medium.com/v2/resize:fill:140:140/0*zoagsDe962mXhuSr,cybersecurity 3569,2786,A Countdown of the Most Damaging Computer Viruses in History,"It’s not a secret that computer viruses can lead to severe damages. The computer virus known as “I love You” resulted in a staggering $10 billion worth of damages and uncovered security weaknesses that persist even after two decades. One of the most potent computer viruses ever developed, ILOVEYOU, propagated…",https://medium.com/@abdussami.leo/a-countdown-of-the-most-damaging-computer-viruses-in-history-ee6dfba25443?source=topics_v2---------28-84--------------------878f7ae3_f2e0_4fbb_83dd_69696d95a8f7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4NW28zG97V1DVINBSFIoLg.png,cybersecurity 3570,2787,Sophisticated APT29 Campaign Abuses Notion API to Target the European Commission,"Research by Gianluca Tiepolo APT29 is a Russian state-sponsored Advanced Persistent Threat (APT) group that has been involved in several high-profile cyberattacks against government agencies, NGOs, and IT service providers The group has been known to use a range of techniques for their C2 communications, repeatedly abusing legitimate social media…",https://medium.com/@mrtiepolo/sophisticated-apt29-campaign-abuses-notion-api-to-target-the-european-commission-200188059f58?source=topics_v2---------30-84--------------------878f7ae3_f2e0_4fbb_83dd_69696d95a8f7-------17,https://miro.medium.com/v2/resize:fill:140:140/1*a249zOiAS6flwfhIwI8WjA.png,cybersecurity 3571,363,3 key takeaways from the 2023 Crowdstrike Global Threat report,Crowdstrike’s annual report is a great resource on cyber attack trends — Cyber and Cloud Security is a fast moving field and it can be overwhelming at times to keep track of the industry One of the best ways to do this is to study the security reports that industry leaders release about cyber attack trends and techniques CrowdStrike is a well…,https://medium.com/geekculture/cloud-security-attacks-key-takeaways-from-crowdstrikes-2023-global-threat-report-f259487dd573?source=topics_v2---------31-84--------------------878f7ae3_f2e0_4fbb_83dd_69696d95a8f7-------17,https://miro.medium.com/v2/resize:fill:140:140/0*4_HkMsBJVy1rnnmE,cybersecurity 3572,327,What To Do If You Are Being Blackmailed On Instagram,"What To Do If You Are Being Blackmailed On Instagram It can feel like it would never happen to you—until it does. Becoming the target of Instagram blackmail is stressful and horrifying, but the good news is that there are legal options available to you. If you are being blackmailed…",https://medium.com/@donyellmark/what-to-do-if-you-are-being-blackmailed-on-instagram-49cf207188ba?source=topics_v2---------32-84--------------------76d96e4f_0357_456a_9ccc_46779f6cb5e9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*n6cpyzbA95o_R5gsyBNFCg.jpeg,cybersecurity 3573,262,Diamond Model | Tryhackme Writeup/Walkthrough | By Md Amiruddin,"Learn about the four core features of the Diamond Model of Intrusion Analysis: adversary, infrastructure, capability, and victim. Room Link: https://tryhackme.com/room/diamondmodelrmuwwg42 Task 1 : Introduction What is The Diamond Model? The Diamond Model of Intrusion Analysis was developed by cybersecurity professionals — Sergio Caltagirone, Andrew Pendergast, and Christopher Betz in 2013. As described by…",https://medium.com/bugbountywriteup/diamond-model-tryhackme-writeup-walkthrough-by-md-amiruddin-25eaa582c4?source=topics_v2---------33-84--------------------76d96e4f_0357_456a_9ccc_46779f6cb5e9-------17,https://miro.medium.com/v2/resize:fill:140:140/0*YOB-xo133MUuH7vr.png,cybersecurity 3574,2510,AI and Cybercrime: How Machine Learning is Changing the Face of Online Crime,"Introduction: Artificial intelligence (AI) and machine learning (ML) are transforming various industries, including the world of cybercrime. Cybercriminals are increasingly using AI to launch more sophisticated and targeted attacks on individuals, businesses, and governments. …",https://medium.com/@melissalim/ai-and-cybercrime-how-machine-learning-is-changing-the-face-of-online-crime-a2e5edde0388?source=topics_v2---------34-84--------------------76d96e4f_0357_456a_9ccc_46779f6cb5e9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*67duB7Jccq6QNLFwYAeZDg.png,cybersecurity 3575,272,"InfoSecSherpa’s News Roundup for Friday, March 10, 2023","InfoSecSherpa: Your Guide Up a Mountain of Information! — Blackbaud to pay $3M to settle SEC charges of a misleading ransomware investigation (Cybersecurity Dive, March 10th) White House Allocates $3.1bn to Cybersecurity in New Budget (InfoSecurity Magazine, March 10th) Mynaric selected by German government for multiple projects to develop quantum communication capabilities (Space Ref, March 10th)",https://medium.com/@infosecsherpa/infosecsherpas-news-roundup-for-friday-march-10-2023-dd6a064d44?source=topics_v2---------36-84--------------------76d96e4f_0357_456a_9ccc_46779f6cb5e9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Zuhn7NFWNi3jdXhauRSj0g.jpeg,cybersecurity 3576,2777,TryHackMe | SimpleCTF,"Hi, We are going to solve the SimpleCTF on TryHackMe. SimpleCTF: https://tryhackme.com/room/easyctf by MrSeth6797 Let’s begin with pinging the machine to see if it is up and running.",https://medium.com/@omergnscr/tryhackme-simplectf-f2bfb6eb90a9?source=topics_v2---------37-84--------------------76d96e4f_0357_456a_9ccc_46779f6cb5e9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OvtDxJlM1C3M_yeuKdmxxw.png,cybersecurity 3577,312,Challenges and limitations of encryption,"Introduction In order to prevent unwanted parties from reading sensitive information, encryption is employed to transform plaintext files into ciphertext files using a secret key. Users can protect the data’s privacy, authenticity, and integrity with its help. It has so many positive points so that every organizations uses it but it…",https://medium.com/@gupta-bless/challenges-and-limitations-of-encryption-33b79ed046d4?source=topics_v2---------38-84--------------------76d96e4f_0357_456a_9ccc_46779f6cb5e9-------17,https://miro.medium.com/v2/resize:fill:140:140/0*bZVEX4ljalcbu7FQ,cybersecurity 3578,397,Cyber Security Accessibility for Small Businesses,"In this day and age, cyber attacks are a risk for everyone and anyone. We’ve all seen headlines in the news about cyber attacks. Some of the world’s largest companies like Sony, Adobe and NASA have fallen victim to hackers. You’ve likely experienced a breach of your own. Small businesses…",https://medium.com/pentester-academy-blog/cyber-security-accessibility-for-small-businesses-220090095eb9?source=topics_v2---------39-84--------------------76d96e4f_0357_456a_9ccc_46779f6cb5e9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ySqMXoI1e_uLCPFAOQvFhQ.png,cybersecurity 3579,296,Is the law on your side if your business is hacked?,"First published on News at NetworkTigers February 11, 2023. With companies and organizations amassing so much customer, patient and partner data, keeping it under lock and key following the law has become critically important. No brand wants to face public backlash resulting from lackluster cybersecurity. Still, billion-dollar corporations can usually…",https://medium.com/@networktigers/is-the-law-on-your-side-if-your-business-is-hacked-d5a8bb067c9?source=topics_v2---------40-84--------------------76d96e4f_0357_456a_9ccc_46779f6cb5e9-------17,https://miro.medium.com/v2/resize:fill:140:140/0*FUI2Z_4Bj1nXsj2J.jpg,cybersecurity 3580,2788,BatLoader Malware Leveraging Google Ads for Distribution,"Security researchers have discovered a new malware strain called BatLoader, which is using Google Ads as a means of distribution. The malware is capable of bypassing security measures and infecting systems by hiding behind legitimate-looking ads. BatLoader is a form of adware that installs itself onto systems without the user’s…",https://medium.com/@wrellis82/batloader-malware-leveraging-google-ads-for-distribution-117a65acea51?source=topics_v2---------41-84--------------------76d96e4f_0357_456a_9ccc_46779f6cb5e9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*G0ych-ri-z5sP3gwh3DlAQ.png,cybersecurity 3581,468,CTI Flash Briefing: Microsoft Word Remote Code Execution bug — patch now!,"Overview Microsoft released security patches for February 2023 on February 14th which included CVE-2023–21716 for a Microsoft Word Remote Code Execution vulnerability. It has a CVSS3.1 score of 9.8 out of 10, which means it needs to be patched as soon as possible to prevent abuse. …",https://medium.com/hunter-strategy/cti-flash-briefing-microsoft-word-remote-code-execution-bug-patch-now-23864ff1c402?source=topics_v2---------42-84--------------------419d7d1e_8df7_4cda_bd50_9a3c5e66377f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*aqiFwe0mYnm1MppG.png,cybersecurity 3582,2789,AppSec Tales XII | XSS,Application Security Testing for the Cross-Site Scripting. INTRODUCTION The article describes how to test the application to find Cross-Site Scripting vulnerabilities. The advice in this article is based on the following: OWASP Web Security Testing Guide OWASP Application Security Verification Standard Bug bounty reports Own experience. TOOLING Tools with basic usage instructions…,https://medium.com/@karol-mazurek95/appsec-tales-xii-xss-dd5fcc717187?source=topics_v2---------43-84--------------------419d7d1e_8df7_4cda_bd50_9a3c5e66377f-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/1*z5kQ6DQuPdc-FFsN3FHi9w.gif,cybersecurity 3583,2790,Threat of Screen-Read Spyware versus Image-based Authentication,“What happens though if/when spyware or screen-readers are used for capturing a user’s on-screen selections bypassing the reasons for the selections?” This is a question asked on my earlier post “Password Manager with No Password Vault” https://www.linkedin.com/posts/hitoshikokumai_democracy-privacy-data-activity-7028173525987332097-rBCc My answer was — “I am mindful of the threat that you raised…,https://medium.com/@kokumai/threat-of-screen-read-spyware-versus-image-based-authentication-17c19bec9dfc?source=topics_v2---------44-84--------------------419d7d1e_8df7_4cda_bd50_9a3c5e66377f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Xn9D-xSKi9P8ZuQngbqiDw.png,cybersecurity 3584,2791,"They’re Lurking, Watching Your Every Move!","In our modern era, the internet reigns supreme as the ultimate source of information. It has become an indispensable part of our daily lives, enchanting us to seamlessly integrate it into our routines. However, this convenience comes at a price. As we weave the internet more closely into the fabric…",https://medium.com/@houdiniswap/theyre-lurking-watching-your-every-move-c4454c8922d0?source=topics_v2---------45-84--------------------419d7d1e_8df7_4cda_bd50_9a3c5e66377f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*V7B0ge7D3QHz44t2D44PrA.png,cybersecurity 3585,2792,Directory Traversal Basics,"Hi folks, Today we are going to learn about the basics of Directory traversal vector. Which means 1. What is directory directory traversal attack?, 2. How we can leverage this to information disclosure?, How to find these vulnerabilities in an application from the attackers perspective? How to Prevent this type…",https://medium.com/@sreeragpb01/directory-traversal-basics-bd087a39a737?source=topics_v2---------46-84--------------------419d7d1e_8df7_4cda_bd50_9a3c5e66377f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*J7lJxuE8Ruy_Zpgg0VaG3A.jpeg,cybersecurity 3586,2793,From Education to Entrepreneurship: Applying Cybersecurity Best Practices,"Attending the Cyber Security Summit in Bellevue, Washington was a truly eye-opening experience for me as a tech leader in an elementary school. The event brought together some of the brightest minds in the industry who shared their insights and expertise on the ever-evolving cyber security landscape. As I sat…",https://medium.com/@judemiqueli/from-education-to-entrepreneurship-applying-cybersecurity-best-practices-159e0c04e4b4?source=topics_v2---------47-84--------------------419d7d1e_8df7_4cda_bd50_9a3c5e66377f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*5ItpMgL5GEGwyFCt,cybersecurity 3587,2794,Unlocking the Mystery of Linux Permissions…,"What are Linux Permissions? Linux permissions are a set of rules that determine who can access, modify or execute a file or directory. Permissions are assigned to three types of users: owner, group, and others. Each user can be assigned three types of permissions: read, write, and execute. In total, there are nine possible…",https://medium.com/bug-zero/unlocking-the-mystery-of-linux-permissions-26a4b37b5d82?source=topics_v2---------48-84--------------------419d7d1e_8df7_4cda_bd50_9a3c5e66377f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0RoTzFYIAZwszqV9LdfTWQ.jpeg,cybersecurity 3588,965,RSA: The Key to Safe and Secure Communication,"What is the RSA Algorithm? RSA (Rivest–Shamir–Adleman) is a public-key encryption algorithm used to securely transmit messages over an insecure network. It is one of the most widely used encryption algorithms and is commonly used for secure data transmission over the internet, including secure online transactions and email encryption. RSA works by…",https://medium.com/bug-zero/rsa-the-key-to-safe-and-secure-communication-464d02f48b1c?source=topics_v2---------49-84--------------------419d7d1e_8df7_4cda_bd50_9a3c5e66377f-------17,https://miro.medium.com/v2/resize:fill:140:140/0*uHY40Kha5SLnW2tM.jpg,cybersecurity 3589,2777,TryHackMe | RootMe Write-Up,"In this write-up, We are going to try to root the RootMe machine in TryHackMe. RootMe CTF: https://tryhackme.com/room/rrootme by ReddyyZ Let’s begin! Let’s see if the machine is up by pinging the machine. ping -c 4 We can inference that this machine is a Linux machine by looking…",https://medium.com/@omergnscr/tryhackme-rootme-write-up-74cbc1072db0?source=topics_v2---------50-84--------------------419d7d1e_8df7_4cda_bd50_9a3c5e66377f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Xro45Yi_schAKVeYxgaqoA.png,cybersecurity 3590,298,Burp Suite Part 2,"This is a follow up to my Burp Suite TryHackMe rooms Part 1, which you can find here. In this post I will be solving the questions from the rooms’ practical section. Let’s get right into it!! Burp Suite Basics room: Which edition of Burp Suite runs on a server and provides constant scanning…",https://medium.com/@expl017_security/burp-suite-part-2-c68b6947c27a?source=topics_v2---------51-84--------------------419d7d1e_8df7_4cda_bd50_9a3c5e66377f-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zXBeXr5m1RVB83mREYs82Q.png,cybersecurity 3591,2795,How to catch reverse shell connections in python and programmatically execute commands when writing POC and exploits,"When submitting proofs of concept for exploits and vulnerabilities, whether its for a VDP or certification exam, such as the OSCP and OSWE, you often need a way to programmatically execute code on the remote system to create a reverse shell, and then conditionally execute further commands on the target…",https://medium.com/@armanaryanpour/how-to-catch-reverse-shell-connections-in-python-and-programmatically-execute-commands-when-writing-57473b1fb3e6?source=topics_v2---------52-84--------------------0d38dcf7_3926_4bf1_a2d6_17cd663bca67-------17,https://miro.medium.com/v2/resize:fill:140:140/1*bpLRpU5ciTbtuoqDXQJKzg.png,cybersecurity 3592,305,Play with Splunk | Full Stack App Development - Sigma Rule Project,"TL; DR This is the first post of a blog series. If you read all posts, you may learn how to develop some kind of full-stack app on Splunk with the following steps; How to create & use custom REST endpoints on Splunk How to use KV Stores as MongoDB collections. How…",https://medium.com/@krdmnbrk/play-with-splunk-full-stack-app-development-sigma-rule-project-9a6e20f148ef?source=topics_v2---------53-84--------------------0d38dcf7_3926_4bf1_a2d6_17cd663bca67-------17,https://miro.medium.com/v2/resize:fill:140:140/1*XAkXLA6qfBLqF5h1W2I8Gw.png,cybersecurity 3593,2796,Dark Web Marketplaces: Everything You Need to Know,"We will explore what dark web marketplaces are, how they work, what you can buy on them — The internet has undoubtedly made our lives easier in countless ways, from online shopping to social media communication. However, with all the benefits of the internet come some risks, and one of those risks is the existence of dark web marketplaces. In this article, we will explore what dark web…",https://medium.com/ryan-trincieri-writes/dark-web-marketplaces-everything-you-need-to-know-ce73d37efc9e?source=topics_v2---------54-84--------------------0d38dcf7_3926_4bf1_a2d6_17cd663bca67-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tCl9LmdLTO4w1wQKj2Wqbg.jpeg,cybersecurity 3594,2797,What is CSRF? How is CSRF Protection enabled in AEM?,"What is CSRF? — Cross-site request forgery (CSRF) is a web vulnerability that lets a malicious hacker trick the victim into submitting a request that allows the attacker to perform state-changing actions on behalf of the victim. The victim is authenticated in the target web application (e.g., www.example.com). The attacker uses social engineering to…",https://medium.com/tech-learnings/what-is-csrf-how-is-csrf-protection-enabled-in-aem-9c4e1bae9c9d?source=topics_v2---------56-84--------------------0d38dcf7_3926_4bf1_a2d6_17cd663bca67-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LByPxqkTY0X8DSPZoJvFyQ.png,cybersecurity 3595,552,No Mud No Lotus: The art of transforming breaches through security improvement,"In Buddhist philosophy I often hear the expression “No Mud, No Lotus” this expression aligns with the Buddhist view that life and existence in many ways are circular. Things that are negative can actually be used for our benefit, and things that are good when overused can harm us. …",https://medium.com/@piffd0s/no-mud-no-lotus-the-art-of-transforming-breaches-through-security-improvement-2b21f0ba7161?source=topics_v2---------57-84--------------------0d38dcf7_3926_4bf1_a2d6_17cd663bca67-------17,https://miro.medium.com/v2/resize:fill:140:140/1*brNxDxXJUuDsO8Ddu-1F3A.jpeg,cybersecurity 3596,2798,Increased authentication,"Increased Authentication with Blockchain Technology To protect the security of our digital data, authentication is an important factor. Blockchain technology requires authentication from all parties involved in a transaction, which makes it nearly impossible to commit fraud or theft. …",https://medium.com/@muznahehe/increased-authentication-814020ee1831?source=topics_v2---------58-84--------------------0d38dcf7_3926_4bf1_a2d6_17cd663bca67-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3597,514,Join the Hunt: Why Bug Bounty is the Future of Cybersecurity,"Are you a budding tech enthusiast looking to make a difference in the world of cybersecurity? If so, you should consider joining the bug bounty hunting community. Bug bounty programs offer a unique opportunity for talented individuals to earn money by identifying and reporting security vulnerabilities in software applications, websites…",https://medium.com/@euler.chaves/join-the-hunt-why-bug-bounty-is-the-future-of-cybersecurity-fc361a8fca66?source=topics_v2---------59-84--------------------0d38dcf7_3926_4bf1_a2d6_17cd663bca67-------17,https://miro.medium.com/v2/resize:fill:140:140/0*znkxM2g75Lo2GDop,cybersecurity 3598,2799,ScratchSwap – Shibarium,"This is a fully decentralised protocol The Scratch Swap Protocol is an open-source protocol for providing liquidity and trading ERC20 tokens on Shibarium. It eliminates trusted intermediaries and unnecessary forms of rent extraction, allowing for safe, accessible, and efficient exchange activity. The protocol is non-upgradable and designed to be censorship…",https://medium.com/@info_86542/scratchswap-shibarium-4cac18a14735?source=topics_v2---------60-84--------------------0d38dcf7_3926_4bf1_a2d6_17cd663bca67-------17,https://miro.medium.com/v2/resize:fill:140:140/1*XEi58LjdRc59UPeZ0rbb9w@2x.jpeg,cybersecurity 3599,2800,Windows Forensic 101: How to Perform Forensic Investigation of Windows Machine?,"In this article, we will discuss how to perform Windows Forensic Investigation to detect hidden threats along with a checklist of tasks to be performed during the process. — Forensic Investigation Is Confusing. Right? Performing a forensic investigation is often a challenging and confusing task for many cybersecurity analysts. With so many different sources of evidence and potential threats to consider, it can be difficult to know where to start and how to proceed. …",https://medium.com/bugbountywriteup/windows-forensic-101-how-to-perform-forensic-investigation-of-windows-machine-d1dfbea20254?source=topics_v2---------61-84--------------------0d38dcf7_3926_4bf1_a2d6_17cd663bca67-------17,https://miro.medium.com/v2/resize:fill:140:140/0*GI5_y6xuQQzpRo1i.jpg,cybersecurity 3600,2801,Unleashing the Power of TCM Security’s PMAT: My Quest to Become a Certified Junior Malware Researcher.,PMAT (Practical Malware Analysis & Triage) to PJMR (Practical Junior Malware Researcher) What is the PJMR (Practical Junior Malware Researcher)? TCM Security has finally released its Practical Junior Malware Researcher Certification. I have been patiently waiting for this to go live and I am happy to say that I will be using this to kick-start my career as…,https://medium.com/@mysterylogik/unleashing-the-power-of-tcm-securitys-pmat-my-quest-to-become-a-certified-junior-malware-3a01e9f6e286?source=topics_v2---------62-84--------------------378fec48_df6c_479a_a928_a83e79cfafb3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MuhWiHoUcWXniWXTvbknuQ.png,cybersecurity 3601,2802,My review of ISC2 Certified in Cybersecurity Certification,"About Me: Hi, my name is Avinash and I have been working in Cyber Security domain for the past 6+ years. I also provide mentoring to professionals who are planning to get into Cyber Security. Background: Some of the students that I mentored came back to me saying how difficult this certification was…",https://medium.com/@reddy0656/my-review-of-isc2-certified-in-cybersecurity-certification-b577d9cc97b?source=topics_v2---------63-84--------------------378fec48_df6c_479a_a928_a83e79cfafb3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3602,2803,City of Oakland data is leaked! PLAY Ransomware,"Your daily FLASH NEWS on Cyber Security: If you have yet to care about cybersecurity, is this the best time to do so? Recently, the PLAY Ransomware gang leaks about 12GB worth of data belonging PII information including SSN, address, employee ID, etc. …",https://medium.com/@popalltheshells/city-of-oakland-data-is-leaked-play-ransomware-d0477c4f0951?source=topics_v2---------64-84--------------------378fec48_df6c_479a_a928_a83e79cfafb3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*HSJf4A4KS9Hr0UCkSnA9Yw.png,cybersecurity 3603,2804,Instagram OSINT & Hacking — Phishing at its best.,"Instagram hacking is one of the most notoriously question asked on the internet. I have received so many personal messages and DMs regarding this, that I can’t even remember. It’s only obvious that I am writing an article about this. Anyways, let’s begin! Before getting access to Instagram, you must know the username…",https://medium.com/system-weakness/instagram-osint-hacking-phishing-at-its-best-e218eb9c7868?source=topics_v2---------65-84--------------------378fec48_df6c_479a_a928_a83e79cfafb3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ZgYppMuLSXFaxb06qo5RBA.jpeg,cybersecurity 3604,2805,Keep Your Guard Up: How to Stay Safe from Smishing Scams,"As our reliance on technology increases, so does the threat of scams and frauds. One of the latest threats to our personal data is smishing scams. Smishing, which stands for SMS phishing, is a type of scam that targets individuals via text messages. In this article, I will explore the…",https://medium.com/@d111gent/shielding-your-personal-data-top-strategies-to-stay-protected-from-smishing-scams-bff7b378761?source=topics_v2---------66-84--------------------378fec48_df6c_479a_a928_a83e79cfafb3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pzaOJVBd-gZCZ94PLyYnVw.jpeg,cybersecurity 3605,360,7 Things To Do To Keep Your Account Safe Even After A Compromised Password,"Account Hijacking Is Rampant Nowadays. So Is Getting Your Money Drained From Your Bank Accounts. Here Are Simple Steps To Follow To Keep Your Accounts Safe Even After Your Account Passwords Are Compromised. — Recently, Twitter announced that SMS-based two-factor authentication (or SMS 2FA) will be available exclusively to Twitter Blue subscribers. Two-factor authentication emerged as extra protection for a consumer’s account and became a necessary evil. Nobody likes to have to close that financial app to fetch the code that came via SMS…",https://medium.com/@ayanh/7-things-to-do-to-keep-your-account-safe-even-after-a-compromised-password-df8cc35db587?source=topics_v2---------67-84--------------------378fec48_df6c_479a_a928_a83e79cfafb3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*wMeEISxSJ-clWrKl,cybersecurity 3606,2790,Artificial Intelligence as Nemesis of Biometrics,"With biometrics conveniently waiting there to be abused, it’s only natural for criminals to look to AI as a nice tool for easier and quicker impersonation and identity fraud. This topic of ‘artificial intelligence and digital identity’ is really intriguing indeed. I have posted the following messages over the past month What if Doublethink gets blown into Identity-less Humanoid? (28Feb2023) https://www.linkedin.com/posts/hitoshikokumai_marketingedge-trending-media-activity-7036205391961104384-QmJ0 AI Program with No Identity (24Feb2023) https://www.linkedin.com/posts/hitoshikokumai_chatgpt-activity-7034813572727656448-IXUJ Artificial Intelligence, Privacy and Digital Identity (18Feb2023) https://www.linkedin.com/posts/hitoshikokumai_democracy-privacy-data-activity-7032545687674253312-FDfO Modest AI Wanted (10Feb2023) https://www.linkedin.com/posts/hitoshikokumai_tech-ai-chatgpt-activity-7029691578109628417-JBrD Marriage of Doublethink and Artificial Intelligence (8Feb2023) https://www.linkedin.com/posts/hitoshikokumai_democracy-privacy-data-activity-7028961427436539904-5n3h",https://medium.com/@kokumai/artificial-intelligence-as-nemesis-of-biometrics-50c159f23437?source=topics_v2---------68-84--------------------a84d3839_12fa_4d59_a9db_aa6c3eb9c807-------17,https://miro.medium.com/v2/resize:fill:140:140/0*S8q5Lrs7uLLX__iI,cybersecurity 3607,2806,Buffer Overflow Exploit,"What is Buffer Overflow: A buffer overflow exploit is a security vulnerability that occurs when an application receives more data than expected, causing it to fill up memory space and even crash the program. Through this vulnerability, an attacker can run malicious code on the target application and take control of the system. Buffer…",https://medium.com/@rajeevranjancom/buffer-overflow-exploit-50919033273b?source=topics_v2---------69-84--------------------a84d3839_12fa_4d59_a9db_aa6c3eb9c807-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yn-EkcwoFKUTlFyjzu0vWw.png,cybersecurity 3608,107,Understanding Whirlpool Encryption: A Comprehensive Guide | 2023,"Learn about the Strengths and Limitations of this Powerful Cryptographic Algorithm | Karthikeyan Nagaraj — Introduction: One of the most popular algorithms is Whirlpool encryption. Developed by Vincent Rijmen and Paulo S. L. M. Barreto in 2000, Whirlpool is a symmetric key block cipher that is widely used in various applications, including secure messaging, digital signatures, and file encryption.",https://medium.com/@cyberw1ng/understanding-whirlpool-encryption-a-comprehensive-guide-2023-1e7059a97301?source=topics_v2---------70-84--------------------a84d3839_12fa_4d59_a9db_aa6c3eb9c807-------17,https://miro.medium.com/v2/resize:fill:140:140/1*jAYqikig9xaftbmKakyTUw.png,cybersecurity 3609,266,Hack Aircraft,"Airplanes, airports, aircraft—they all have embedded systems, i.e., targets, for infiltration and hacking. Using ChatGPT, I propose some ideas for how you could find your way into these targets. — The Biden-Harris administration recently implemented an updated cybersecurity resilience plan, and the TSA (Transportation Security Administration in the USA) updated their security requirements on 7 March 2023.",https://medium.com/@david.azad.merian/hack-aircraft-d5e9f6264de3?source=topics_v2---------71-84--------------------a84d3839_12fa_4d59_a9db_aa6c3eb9c807-------17,https://miro.medium.com/v2/resize:fill:140:140/0*hzAx6glx6k9uc_1h,cybersecurity 3610,2807,Login Notification Prevention Methods,"Login notifications are a last resort in security. They notify the victim that their account has been compromised, prompting them to change their password. This usually sucks for the attacker as all the work they put into getting the credentials is undone. …",https://medium.com/@m5kro/login-notification-prevention-methods-40f41abaedbf?source=topics_v2---------72-84--------------------a88d3774_e011_459f_871a_d5cc6515115a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*tUBxpBOwTzY1l3BLDjCqJQ.png,cybersecurity 3611,2808,TryHackMe | Benign Walkthrough,"Hi there, I’m glad to see you here. In this article, we’ll solve together the “Benign” room in TryHackme. In some sections, I’ll share brief about the subject. Don’t forget! You must always research to learn more. I hope it will be helpful for you. Let’s start! Introduction We will investigate…",https://medium.com/@enescayvarli/tryhackme-benign-walkthrough-88cf3c4d56f9?source=topics_v2---------73-84--------------------a88d3774_e011_459f_871a_d5cc6515115a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qTxgMmjsyzGhHGpTW1vDMA.jpeg,cybersecurity 3612,2809,Trainee Scammer 101,"Self Intro: — Hello amigo, I am an ethical hacker, penetration tester, bug bounty hunter, and cybersecurity enthusiast. I am curious to learn new technologies and expose to scammers. Let’s deep dive into today’s topic Phishing. I was inspired by The Cyber Mentor’s YT video. Summary: Recently, I got a telegram message for a…",https://medium.com/@zero.o/trainee-scammer-101-347e6f86d215?source=topics_v2---------74-84--------------------a88d3774_e011_459f_871a_d5cc6515115a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*lZd4xZdTnnDbxpuumjJMPQ.jpeg,cybersecurity 3613,522,"When an App has System Privileges, Can It Really Do Whatever It Wants?","Background XXX apk embedded lifting code, and dynamic down dex analysis: https://github.com/davinci1010/pinduoduo_backdoor About how this App obtains this system privilege, “The Most Unforgivable Vulnerability in 2022”, this article speaks very clearly, so I will not repeat. A core object passing mechanism in Android Framework is Parcel. Objects that want to…",https://medium.com/@ceciliachow1998/when-an-app-has-system-privileges-can-it-really-do-whatever-it-wants-6ce98b74d054?source=topics_v2---------75-84--------------------a88d3774_e011_459f_871a_d5cc6515115a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*D2fxfRZQLIqn1hhX.jpg,cybersecurity 3614,2810,Security Review for SaaS Systems,"What & how to look at Security at Every Level I am often asked by CEOs and CTOs to do security reviews of their SaaS products, as securing them is critical for their users, companies, and often legal compliance. This article covers how I approach these reviews, what I look…",https://medium.com/@steve-mushero/security-review-for-saas-systems-63a88b02d756?source=topics_v2---------76-84--------------------a88d3774_e011_459f_871a_d5cc6515115a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*H0AMZ01B4EUfvq65RNa7Pw.jpeg,cybersecurity 3615,451,"The Difference Between Penetration Testing, Red Teaming, and Purple Teaming (and for good measure, Vulnerability Assessments)","For those who are not in security (and for those who are, but maybe in a less technical role) there are many ways to determine an organization’s risk. There are plenty of risk models and frameworks out there, each with their own inherent pros and cons. GRC (Governance, Risk and…",https://medium.com/@dispareo/the-difference-between-penetration-testing-red-teaming-and-purple-teaming-and-for-good-measure-d24452f139de?source=topics_v2---------77-84--------------------a88d3774_e011_459f_871a_d5cc6515115a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PbBnRybif5_dm8vHViHefg.jpeg,cybersecurity 3616,271,Hacking Android Devices with ADB,"Introduction Welcome to my new article, in this article, I will show how you can attack Android devices with Android Debug Bridge (ADB). I will also showcase how you can get Remote Desktop access to the device. What is ADB? ADB (Android Debug Bridge) is a tool used by developers to…",https://medium.com/@s12deff/hacking-android-devices-with-adb-8e159c187bb6?source=topics_v2---------78-84--------------------61883ddf_befc_4d45_bc03_c344afeb9011-------17,https://miro.medium.com/v2/resize:fill:140:140/0*RnC_g6lmIKZ2Yzth.jpg,cybersecurity 3617,2811,What Happens If I Don’t Trust The Dealer in a Card Game: A Bit of Mental Poker in a Distributed World,"Okay. You have 52 cards, and you have five people in the game ( Alice, Bob, Carol, Dave and Eve), and they are all remote and none of them trusts any dealer. So how can you create a game, where we shuffle the cards, and where each player will get…",https://medium.com/asecuritysite-when-bob-met-alice/what-happens-if-i-dont-trust-the-dealer-in-a-card-game-a-bit-of-mental-poker-in-a-20d99ceadf4?source=topics_v2---------79-84--------------------61883ddf_befc_4d45_bc03_c344afeb9011-------17,https://miro.medium.com/v2/resize:fill:140:140/1*dG3A3jSrQiSnKwrc1DcrUA.jpeg,cybersecurity 3618,2798,Avoids Human Errors,"Human errors can cost businesses time, money, and reputation, but with the use of blockchain technology, businesses are now able to avoid them altogether. Blockchain is a secure, distributed ledger that stores information and records, making it difficult for human errors to occur. At its most basic level, blockchain is…",https://medium.com/@muznahehe/avoids-human-errors-6137f74fad6c?source=topics_v2---------80-84--------------------61883ddf_befc_4d45_bc03_c344afeb9011-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3619,2798,Privacy,"Blockchain technology offers a powerful new way of protecting user data from unauthorized access, by securely encrypting and storing it on a distributed ledger. This secure data encryption technology is becoming increasingly popular as businesses and consumers look for ways to better secure their sensitive data. …",https://medium.com/@muznahehe/privacy-a50c36d7a47c?source=topics_v2---------81-84--------------------61883ddf_befc_4d45_bc03_c344afeb9011-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3620,2805,Chinese Hackers Target SonicWall SMA Devices: Here’s What You Need to Know,"Recently, cybersecurity experts have discovered a new type of attack by Chinese hackers targeting SonicWall SMA devices. The main objective of these hackers is to steal user credentials, and they use malware that can provide shell access and persist through firmware upgrades. This malware is an ELF binary, which has…",https://medium.com/@d111gent/chinese-hackers-target-sonicwall-sma-devices-heres-what-you-need-to-know-8f782099e2d6?source=topics_v2---------82-84--------------------61883ddf_befc_4d45_bc03_c344afeb9011-------17,https://miro.medium.com/v2/resize:fill:140:140/1*orxkjl3omyIY4DkocWx2Ug.jpeg,cybersecurity 3621,286,SQL Injection Explained with Detailed Example,"SQL injection is a code injection technique that exploits security vulnerabilities in an application’s software. It allows attackers to inject malicious SQL code into queries, which can then be executed by the database. This can result in unauthorized access to sensitive data, modification or deletion of data, and other harmful…",https://medium.com/@securitylit/sql-injection-explained-with-detailed-example-72154458fd4c?source=topics_v2---------83-84--------------------61883ddf_befc_4d45_bc03_c344afeb9011-------17,https://miro.medium.com/v2/resize:fill:140:140/0*wneESjUlPciej-dn.png,cybersecurity 3622,2798,Smart contracts,"The Future of E-Commerce: Smart Contracts In today’s world, the digital economy is rapidly growing and advancing, and smart contracts are at the center of this development. Smart contracts are digital contracts that execute and enforce themselves automatically, without the need for any third-party or human intervention. As a result…",https://medium.com/@muznahehe/smart-contracts-12cd82bbecb1?source=topics_v2---------84-84--------------------61883ddf_befc_4d45_bc03_c344afeb9011-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3623,328,"Symfony Station Communiqué — 10 March 2023. A look at Symfony, Drupal, PHP, Cybersecurity, and Fediverse news.",This article originally appeared on Symfony Station. Welcome to this week’s Symfony Station Communiqué. It’s your review of the essential news in the Symfony and PHP development communities focusing on protecting democracy. We also cover the cybersecurity world and the Fediverse. Please take your time and enjoy the items most…,https://medium.com/@mobileatom/symfony-station-communiqué-10-march-2023-e1a75a7823d9?source=topics_v2---------85-84--------------------61883ddf_befc_4d45_bc03_c344afeb9011-------17,https://miro.medium.com/v2/resize:fill:140:140/1*umDe5cKNjCprEpqic3rm8w.png,cybersecurity 3624,2798,Decentralized platform,"As the global demand for technology grows, so does the need for decentralized platforms. A decentralized platform is an advanced infrastructure that is designed to improve data security, integrity, and efficiency by distributing the data across multiple locations and nodes. …",https://medium.com/@muznahehe/decentralized-platform-d5c244d84b81?source=topics_v2---------86-84--------------------61883ddf_befc_4d45_bc03_c344afeb9011-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3625,2798,Immutable records,"What Are Immutable Records and Why Are They Important? If you’re familiar with blockchain technology, you’ve probably heard of immutable records. But do you really know what it means? Essentially, immutable records are records that cannot be changed. And this is one of the most important aspects of blockchain technology. …",https://medium.com/@muznahehe/immutable-records-b824abaab706?source=topics_v2---------87-84--------------------d5d34aa7_b4ec_4687_90cb_1aba2c2e1a46-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3626,2798,Enhanced data encryption,"Data protection and security have become increasingly important in today’s ever-changing digital world. Businesses are using more and more digital data every day, which means they are more vulnerable to cyber-attacks, data theft, and other security issues. …",https://medium.com/@muznahehe/enhanced-data-encryption-53f21f5bf62b?source=topics_v2---------88-84--------------------d5d34aa7_b4ec_4687_90cb_1aba2c2e1a46-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3627,107,Anubis Encryption: Understanding the Key Concepts | 2023,"Understand the Basics of Anubis Encryption | Karthikeyan Nagaraj — In the modern era of technology, data protection, and privacy have become top priorities for individuals and organizations. Encryption is one of the most common ways to ensure data protection, and Anubis encryption is a relatively new algorithm that has gained popularity in recent years. In this section, we will…",https://medium.com/@cyberw1ng/anubis-encryption-understanding-the-key-concepts-2023-baf0f51c16a7?source=topics_v2---------89-84--------------------d5d34aa7_b4ec_4687_90cb_1aba2c2e1a46-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OPiLAlpROB96kvtRF3c5rw.png,cybersecurity 3628,2812,"Cloud Security - AWS, GCP and Azure in 2023","In today’s digital age, security is a top priority for businesses seeking to protect their data and assets from cyber threats. With so many cloud providers offering security solutions, it can be overwhelming for individuals to determine which platform aligns best with their specific needs. This article is designed to…",https://medium.com/@techberry0101/cloud-security-aws-gcp-and-azure-in-2023-f501b751013d?source=topics_v2---------90-84--------------------d5d34aa7_b4ec_4687_90cb_1aba2c2e1a46-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3629,405,A 10-Year-Old’s Guide to Smishing,"Protecting Yourself from Cybercriminals Who Trick You Through Text Messages — Have you heard of “smishing”? It’s a new type of online trickery that can happen on your phone through text messages. Cybercriminals use smishing to get people to give them private information or to download bad software onto their phones. Smishing is like fishing, but instead of using a fishing…",https://medium.com/@srahul07/a-10-year-olds-guide-to-smishing-f2d30746f2be?source=topics_v2---------91-84--------------------d5d34aa7_b4ec_4687_90cb_1aba2c2e1a46-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yzHPahYrG0yWxO7wsdhd1Q.jpeg,cybersecurity 3630,72,Introducing the Phishing Domain Database: A Public Repository for Testing Phishing Domains and Links,"Phishing attacks are a significant threat to individuals and organisations alike. Phishing attacks are a type of social engineering attack where an attacker attempts to trick a victim into giving up sensitive information, such as usernames, passwords, and credit card numbers. Phishing attacks can be delivered through email, text messages…",https://medium.com/@loftwah/introducing-the-phishing-domain-database-a-public-repository-for-testing-phishing-domains-and-f02f905934f4?source=topics_v2---------92-84--------------------d5d34aa7_b4ec_4687_90cb_1aba2c2e1a46-------17,https://miro.medium.com/v2/resize:fill:140:140/1*a2PrcR2HDVFjd_6aOG88TA.png,cybersecurity 3631,2813,Bug Zero at a Glance [Week 04 — 10 March],"What happened with Bug Zero? Bug Zero is thrilled to announce that we have become the title partner of Sparkles’23, the annual awarding ceremony organized by AIESEC in University of Kelaniya. We take great pride in supporting and encouraging the youth community in Sri Lanka, and we see this partnership as a great opportunity to…",https://medium.com/bug-zero/bug-zero-at-a-glance-week-04-10-march-2c1ab74d69d6?source=topics_v2---------93-84--------------------d5d34aa7_b4ec_4687_90cb_1aba2c2e1a46-------17,https://miro.medium.com/v2/resize:fill:140:140/0*xFn5KjeSBAAZ1kbC,cybersecurity 3632,2814,Why Link Ventures invested in nsKnox,"Investment insights by Link Managing Director, Lisa Dolan — The Background The global fraud detection market is expanding from paper to digital and has dramatically increased in recent years. In fact – The total global fraud detection and prevention market is expected to grow from $30.6B in 2022 to $129.1B in 2029, a CAGR of 22.8%. 74 percent of consumers would…",https://medium.com/datadriveninvestor/why-link-ventures-invested-in-nsknox-50d7d7985126?source=topics_v2---------94-84--------------------a1512d09_bf58_4159_9a66_b5d2e293eff4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*uhUQ5DG3ab6YR7In1bIoGw.png,cybersecurity 3633,2815,The Evolution of Firewall Technology: From Packet Filtering to Next-Generation Firewalls,"Since the late 1980s, firewalls have been around. First known as packet filters, they were networks set up to inspect packets, or bytes, sent between computers. Despite the fact that packet filtering firewalls are still in use today, firewalls have advanced significantly over the years as technology has advanced. History of Firewall Generation…",https://medium.com/@gokulelango1040/the-evolution-of-firewall-technology-from-packet-filtering-to-next-generation-firewalls-69b14977028d?source=topics_v2---------95-84--------------------a1512d09_bf58_4159_9a66_b5d2e293eff4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*pFc3_8_GguPS2nya.png,cybersecurity 3634,1575,The Essentials of Cloud Security for Small and Medium-sized Businesses,"Exploring Zero Trust, CNAAP, IAM, Encryption, and DR/BC — As more small and medium-sized businesses (SMBs) move their operations to the cloud, it’s important to understand cloud security basics. Cloud security is the set of policies, controls, and procedures designed to protect cloud-based data, applications, and infrastructure from unauthorised access, theft, and other cyber threats. …",https://medium.com/@imsanjams/the-essentials-of-cloud-security-for-small-and-medium-sized-businesses-fbdb26245b9c?source=topics_v2---------96-84--------------------a1512d09_bf58_4159_9a66_b5d2e293eff4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*M_NHoo8_8c-Rmuvc,cybersecurity 3635,2816,PHISHING ANALYSIS: A SIMPLE GUIDE FOR BEGINEERS,"PHISHING ANALYSIS: A SIMPLE GUIDE FOR BEGINEERS It is imperative to acknowledge that phishing attacks continue to be the most prevalent method of initiating unauthorized access, and ignorance of this fact cannot absolve one from the potentially severe consequences that may ensue. …",https://medium.com/@durojayeolusegun/phishing-analysis-a-simple-guide-for-begineers-51622a26578a?source=topics_v2---------97-84--------------------a1512d09_bf58_4159_9a66_b5d2e293eff4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0Li1VX3OwCVflMuMQ0hZ8g.jpeg,cybersecurity 3636,2,How to Spoof Email for FREE? — Guide,"Method of Spoofing Emails using 💯 Free Resources — It’s been a long and a lot of people have been asking for a guide to sending spoofing email, so I thought to write on it today. As you read in the title, the Email Spoofing for Free!? Yes :) the resources I’m using in this process are totally free…",https://medium.com/@x-it/how-to-spoof-email-for-free-guide-a5fe0c6ee631?source=topics_v2---------98-84--------------------a1512d09_bf58_4159_9a66_b5d2e293eff4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*cQ9gvBQi718kT4w61CscRA.png,cybersecurity 3637,2817,Cybersecurity and blockchain: How can blockchain technology be used to enhance cybersecurity?,"Enhancing Cybersecurity with Blockchain Technology With the increasing use of digital technology, cybersecurity has become a top priority. The protection of sensitive information from cyber threats is crucial in today’s interconnected world. Thankfully, blockchain technology has emerged as a potential solution to enhance cybersecurity. Decentralized and tamper-proof, blockchain technology can securely store and protect data…",https://medium.com/@intelfinglobal/cybersecurity-and-blockchain-how-can-blockchain-technology-be-used-to-enhance-cybersecurity-d8afcda1c391?source=topics_v2---------99-84--------------------a1512d09_bf58_4159_9a66_b5d2e293eff4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zSHLqhH39K7Cck66nNC6BA.jpeg,cybersecurity 3638,2798,Proof of Work,"Proof-of-work is a type of algorithm used in blockchains to confirm legitimate transactions and incorporate them into the blockchain ledger. It ensures that only those with the right access permissions can modify or modify the ledger, making blockchain transactions safe and secure. The proof-of-work algorithm requires users to solve a…",https://medium.com/@muznahehe/proof-of-work-5311e50d25da?source=topics_v2---------100-84--------------------a1512d09_bf58_4159_9a66_b5d2e293eff4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3639,2798,Encryption,"The advent of blockchain technology has revolutionized how data is secured and stored. One of the most prominent technologies driving this revolution is encryption. Encryption is a process in which data is encoded so that it can only be accessed by those with the knowledge, or key, to decode it…",https://medium.com/@muznahehe/encryption-709fc658b316?source=topics_v2---------101-84--------------------a1512d09_bf58_4159_9a66_b5d2e293eff4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3640,381,#PwnItFridays @hackthebox_eu #StartingPoint Series: Bike,"Another day, another challenge. I’m restarting the series #PwnItFriday where I hack machines from hackthebox and TryHackMe. Without further ado, the machine I’m solving today is Bike. Topics explored in this machine are Javascript, NodeJS, Server Side Template Injection (SSTI), and Remote Code Execution. Click the video to learn how to solve this machine! Like the content — support by Buying a Coffee",https://medium.com/@jmjackson2011/pwnitfridays-hackthebox-eu-startingpoint-series-bike-cybersecurityeducation-cybersecurity-63d887826d64?source=topics_v2---------102-84--------------------a1512d09_bf58_4159_9a66_b5d2e293eff4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JexgZ-wi3gGr6_tGk528vg.png,cybersecurity 3641,2798,Consensus Model,"The blockchain is a revolutionary technology that has disrupted nearly every industry as we know it. By leveraging decentralized networks, trustless consensus, and tamper-proof records, blockchain-based solutions have revolutionized the way we think about data and transactions. …",https://medium.com/@muznahehe/consensus-model-5d7812d30dbc?source=topics_v2---------103-84--------------------a1512d09_bf58_4159_9a66_b5d2e293eff4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3642,2818,Classifying IoT DDoS Attacks with Convolutional Neural Networks,"Introduction: IoT devices have become increasingly popular in recent years, but their vulnerability to Distributed Denial of Service (DDoS) attacks is a growing concern. DDoS attacks can take down entire networks, causing significant financial and reputational damage. …",https://medium.com/@umairrafiq/classifying-iot-ddos-attacks-with-convolutional-neural-networks-49b816592ba6?source=topics_v2---------104-84--------------------3036f853_20a4_42b4_928e_9be2d3e3e27c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3643,2819,[Tryhackme] MalBuster,"TryHackMe | MalBuster You are tasked to analyse unknown malware samples detected by your SOC team.tryhackme.com Scenario You are currently working as a Malware Reverse Engineer for your organization. Your team acts as a support for the SOC team when detections of unknown binaries occur. One of the SOC analysts triaged an alert triggered by binaries with unusual behavior. …",https://medium.com/@renbe/tryhackme-malbuster-3cf411ecf38f?source=topics_v2---------105-84--------------------3036f853_20a4_42b4_928e_9be2d3e3e27c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DFI883jyWGXb2DrVzTzVkA.png,cybersecurity 3644,2820,"The Hospital Clinic de Barcelona Forced to Cancel Hundreds of Surgeries and 3,000 Patient Checkups Due to a Ransomware Attack","Read also: Indian crypto exchange BitBNS hid a $7.5M breach, hackers are selling US lawmaker data, and more. Spanish hospital cancels thousands of appointments after a ransomware attack The Hospital Clinic de Barcelona, one of Barcelona’s main hospitals, has been forced to cancel over a hundred nonurgent operations and around 3,000 patient checkups due to a Ransom House ransomware attack…",https://medium.com/@immuniweb/the-hospital-clinic-de-barcelona-forced-to-cancel-hundreds-of-surgeries-and-3-000-patient-checkups-fa41a003b69a?source=topics_v2---------106-84--------------------3036f853_20a4_42b4_928e_9be2d3e3e27c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*obPcOcmK3GFsMiXuIfpreA.png,cybersecurity 3645,267,Unconventional Threat Intelligence: Leveraging Discord for News Feed,"At the beginning of this year, I wrote on Medium about how I landed a job as a Threat Intelligence Analyst Intern. However, I soon realized that staying current with the latest news in the field was a daunting task, even with tools like TweetDeck and newsletters at my disposal. …",https://medium.com/bugbountywriteup/unconventional-threat-intelligence-leveraging-discord-for-news-feed-5085004a830d?source=topics_v2---------107-84--------------------3036f853_20a4_42b4_928e_9be2d3e3e27c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*GzT6GRZgqc6W7ZjWA-763Q.png,cybersecurity 3646,437,"The Corix Partners Friday Reading List — Feb 10, 2023","Top 10 Leadership and Management links of the week, curated by Corix Partners Founder and CEO JC Gaillard, focusing on cyber security of course, but also a large cross section of subjects including digital transformation, emerging tech, ESG governance and the future of work There Are Just Too Many Security Tools and Products There Are Just Too Many Security Tools and Products Architecture and Design / Most large organisations are suffering from a security solutions proliferation problem which…corixpartners.com",https://medium.com/the-corix-partners-friday-reading-list/the-corix-partners-friday-reading-list-feb-10-2023-b3eb12a4368e?source=topics_v2---------109-84--------------------3036f853_20a4_42b4_928e_9be2d3e3e27c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*eSIpvYBGiHMNvIzRystcZw.jpeg,cybersecurity 3647,2821,Debating the Empire’s use of Intelligence before the Battle of Hoth,"I love a good Star Wars analogy article. For years, I compiled a list of Star Wars articles on my creative blog, The Serious Tip. I found articles using Star Wars as a comparison in war, legal, religion, and science. In the Star Wars military community, the Battle of Hoth…",https://medium.com/hybrid-analyst/debating-the-empires-use-of-intelligence-before-the-battle-of-hoth-b39ea704a43?source=topics_v2---------110-84--------------------3036f853_20a4_42b4_928e_9be2d3e3e27c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kxv7GvwaccMHEZU23ulYDA.jpeg,cybersecurity 3648,2788,Xenomorph: The New Android Banking Trojan Stealing Sensitive Data,"A new Android banking trojan has been discovered by security researchers, who named it Xenomorph. This banking malware is capable of stealing sensitive data such as login credentials and financial information, and it has been found to have infected numerous Android devices. The Xenomorph banking trojan uses a technique called…",https://medium.com/@wrellis82/xenomorph-the-new-android-banking-trojan-stealing-sensitive-data-d472c08e7370?source=topics_v2---------111-84--------------------3036f853_20a4_42b4_928e_9be2d3e3e27c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*qDwzFj77OHR7SngJ.jpg,cybersecurity 3649,2822,TryHackMe: Advent of Cyber 2020 Day 3 — Christmas Chaos,"#formyfutureself #DoItYourself I am here again for Day 3 Mission. Please read the dossier as it includes good info. Day 3 Christmas Chaos Type: Web Exploitation Task: Need to hack into(get access to) Santa’s Sleigh control panel to re-gain control. This seems to be a easy day, we have provided…",https://medium.com/@xparth8796/tryhackme-advent-of-cyber-2020-day-3-christmas-chaos-8bd2738b36dd?source=topics_v2---------112-84--------------------3036f853_20a4_42b4_928e_9be2d3e3e27c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ec6IRzL9QmgX6IJY,cybersecurity 3650,2823,Convert Android Into Super Spy Device,"Did you ever watched and science fiction or technology-related movie in which a guy has a device that can be used as a spy device, you can also turn your android into a powerful spy device that can be very helpful in different situations or purposes. Before diving into this…",https://medium.com/@mohit_saran0/convert-android-into-super-spy-device-499361e8c110?source=topics_v2---------113-84--------------------3036f853_20a4_42b4_928e_9be2d3e3e27c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*i-Y53ZLqXkiqiVP8kVeVZg.png,cybersecurity 3651,2824,Read Browser Search History With This Secret File,"Table of Contents Introduction The History File Installing sqlitebrowser to Read the History File Opening the History file Creating a New Table With a Human-Readable Timestamp Introduction Whether you are a Cybersecurity Analyst or a stalker, you may find yourself in a situation where you need to view the browsing history of a particular…",https://medium.com/@n3nu/read-browser-search-history-with-this-secret-file-48ea5802646b?source=topics_v2---------114-84--------------------e1ce4575_0b77_4d4b_90a7_07cfce8fed20-------17,https://miro.medium.com/v2/resize:fill:140:140/1*BcnuHn4AkYq6Fs_Q9fofAA.png,cybersecurity 3652,1010,"Monzo Bank, Grindr and Confessionals | Designing safe conversational experiences.",How often has your audience asked for a safer and more reliable product or service? Was your first thought to include the word “secure” or perhaps some locker icons? Secure Design is not just a brand-new digital challenge. Many design experts from architecture to sound design had squeezed their disciplines…,https://medium.com/design-bootcamp/monzo-bank-grindr-and-confessionals-designing-safe-conversational-experiences-9b4b561cd7bd?source=topics_v2---------115-84--------------------e1ce4575_0b77_4d4b_90a7_07cfce8fed20-------17,https://miro.medium.com/v2/resize:fill:140:140/1*WHeEUI7wTqzBafq28jWSWA.png,cybersecurity 3653,2825,Deepfake Cybercrime; My Horrendous Attempt,"So I took a cybersecurity course back in my Senior year of college, and I was excited — my journey up until then had me come across the hardcore programmers, AI/ML futurists, creatives from Web Development and UI/UX design, Statisticians, and more, but yet anywhere near cybersecurity — I was…",https://medium.com/@faisaltf/deepfake-cybercrime-my-horrendous-attempt-c3758801815?source=topics_v2---------116-84--------------------e1ce4575_0b77_4d4b_90a7_07cfce8fed20-------17,https://miro.medium.com/v2/resize:fill:140:140/1*pKXVg5aLJZ9l1Ev9yPn0_w.png,cybersecurity 3654,2826,"How Encryption, Cryptography and Blockchain Security are securing our digital world","Symmetric and asymmetric encryption, message confidentiality, cryptography, and blockchain security are all essential components of modern information security. These concepts are closely interconnected and work together to protect sensitive information from unauthorized access, manipulation, and theft. …",https://medium.com/@shondysainthea/how-encryption-cryptography-and-blockchain-security-are-securing-our-digital-world-917db36c4857?source=topics_v2---------117-84--------------------e1ce4575_0b77_4d4b_90a7_07cfce8fed20-------17,https://miro.medium.com/v2/resize:fill:140:140/1*YCj6ghY7tpwX6EgPY8eSQg@2x.jpeg,cybersecurity 3655,2827,"Cyber Security With a Touch — You Can Breach Me, but You Have to Kiss Me First","I’ll tell you when I’m too old to have computer access — The gremlins in cyber space security tell me I’ve been “breached.” Breached without even a kiss first. Where was I breached, you ask? Right in the AOL, that’s where! Right where it hurts. No kiss, no lube. Yeah, yeah, I hear you left-brain, cutting edge Gen Xers — you know…",https://medium.com/muddyum/cyber-security-with-a-touch-you-can-breach-me-but-you-have-to-kiss-me-first-d74c8ca24287?source=topics_v2---------118-84--------------------e1ce4575_0b77_4d4b_90a7_07cfce8fed20-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6B2swGJbDzlW6gCHC4FZ7w.jpeg,cybersecurity 3656,524,Will Cyber PMCs Rise in 2023?,One of my cybersecurity predictions for 2023 is the rise of cyber Private Military Companies (PMC) to specialize in cyberattacks.,https://medium.com/@matthew-rosenquist/will-cyber-pmcs-rise-in-2023-d7bad70f74a8?source=topics_v2---------119-84--------------------e1ce4575_0b77_4d4b_90a7_07cfce8fed20-------17,https://miro.medium.com/v2/resize:fill:140:140/1*xmbYt4m7_Ke-8xOJ1kbLxg.jpeg,cybersecurity 3657,373,New Biometric Indicators!,"Biometric indicators are used to uniquely identify people and allow access to buildings, facilities, and systems. Biometric authentication is widespread and is even used in smartphones, ATM kiosks, banks, airports, hospitals, and office complexes. The biometric modes in use include fingerprints, faces, voice signals, eyes, ears, DNA profiles, EEG, and…",https://medium.com/thesecmaster/new-biometric-indicators-6a2741cd6cce?source=topics_v2---------120-84--------------------e1ce4575_0b77_4d4b_90a7_07cfce8fed20-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Ux8yRMZobfdhlighYSKsPQ.jpeg,cybersecurity 3658,338,Website Hacking Series; Part D: Cross-Site Request Forgery(CSRF),"Disclaimer: This article is for educational purposes and seeks to promote ethical hacking and superior cybersecurity practices in organizations and private entities. It does not advocate for any malicious intent. Furthermore, all materials used in this tutorial are solely personal and intentionally set vulnerable. …",https://medium.com/@franklinemisango/website-hacking-series-part-d-cross-site-request-forgery-csrf-a83dcefb00c8?source=topics_v2---------121-84--------------------e1ce4575_0b77_4d4b_90a7_07cfce8fed20-------17,https://miro.medium.com/v2/resize:fill:140:140/0*jFUwzLxq9En8xGzA,cybersecurity 3659,414,Multifactor Authentication: Enhancing IAM Security,"In today’s digital age, securing sensitive data has become a top priority for organizations worldwide. One of the most important ways to protect against data breaches is to ensure that only authorized personnel can access critical systems and information. …",https://medium.com/@edward_wilkins/multifactor-authentication-enhancing-iam-security-5c31240d5ac7?source=topics_v2---------122-84--------------------e1ce4575_0b77_4d4b_90a7_07cfce8fed20-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TvAzT5eP08yXcY6lAGisow.jpeg,cybersecurity 3660,2828,PSIRT Advisories for March23,"Fortinet new critical unauthenticated RCE vulnerability. Fortinet has shared the vulnerabilities and there affected products and fixed for this vulnerabilities. This buffer underflow vulnerability is tracked as CVE-2023–25610 and has a CVSS v3 score of 9.3, rating it critical. This type of flaw occurs when a program tries to read…",https://medium.com/@Cyb3rsecurity/psirt-advisories-for-march23-2d7ef6c8ecbf?source=topics_v2---------123-84--------------------e1ce4575_0b77_4d4b_90a7_07cfce8fed20-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3661,2829,Introduction to M4lw@r3 Analysis — What should you know ?,"It is what it is, but what it is 😁 — It is been a while, I haven’t posted anything on medium. But today I am here with another amazing blog post on Malware Analysis. In this blog, we will see what does actually a Malware Analysis and how to get started a career in Malware Analysis. You can use below…",https://medium.com/bugbountywriteup/introduction-to-m4lw-r3-analysis-what-should-you-know-652ab002d340?source=topics_v2---------124-84--------------------d55e6e34_3c16_49c5_8711_311db019b920-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9T9svVG6AgX-v65PC5OsZQ.jpeg,cybersecurity 3662,2830,[VULNHUB:DEVELOPMENT] Dirs enumeration — SiTeFiLo exploit — escaping restricted shell — bad passwd practice — vim privesc,"this was a OSCP marked CTF that i downlaoded using vulnhub it wasn’t that hard, required good web directories enumeration, paying close attention to errors spitted out by PHP, exploiting them, and then retrying passwords revealed by the vulnerability in different services i started with nmap enumeration which revealed port…",https://medium.com/@kpawlo/vulnhub-development-dirs-enumeration-sitefilo-exploit-escaping-restricted-shell-bad-passwd-e7d19acb99aa?source=topics_v2---------125-84--------------------d55e6e34_3c16_49c5_8711_311db019b920-------17,https://miro.medium.com/v2/resize:fill:140:140/1*2_rR9_o24P9mLirqr6q7lg.png,cybersecurity 3663,514,Roadmap to Cyber Security Expertise: A Guide for Beginners,"With the increasing reliance on technology, cyber security has become a critical concern for individuals, businesses, and governments. The field of cyber security is vast and complex, and becoming an expert requires a combination of technical knowledge, hands-on experience, and soft skills. In this article, we will provide a comprehensive…",https://medium.com/@euler.chaves/roadmap-to-cyber-security-expertise-a-guide-for-beginners-88468aaa2363?source=topics_v2---------126-84--------------------d55e6e34_3c16_49c5_8711_311db019b920-------17,https://miro.medium.com/v2/resize:fill:140:140/0*qcO_qfL374U5oyc8,cybersecurity 3664,309,Kali Linux: Your Ultimate Weapon Against Cyber Attacks,"The Power of Kali Linux for Network Security — 🕵🏻‍♀️ Introduction Kali Linux is a powerful and versatile operating system that is designed for penetration testing, digital forensics, and network security. …",https://medium.com/datadriveninvestor/kali-linux-your-ultimate-weapon-against-cyber-attacks-26ff0c419ac5?source=topics_v2---------127-84--------------------d55e6e34_3c16_49c5_8711_311db019b920-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kFarmlD9AjTABQ1l9uJQfA.jpeg,cybersecurity 3665,262,OWASP Top 10–2021 | Tryhackme Writeup/Walkthrough | By Md Amiruddin,Learn about and exploit each of the OWASP Top 10 vulnerabilities; the 10 most critical web security risks. Room Link : https://tryhackme.com/room/owasptop102021 Task 1 Introduction,https://medium.com/bugbountywriteup/owasp-top-10-2021-tryhackme-writeup-walkthrough-by-md-amiruddin-913e477c0ea1?source=topics_v2---------128-84--------------------d55e6e34_3c16_49c5_8711_311db019b920-------17,https://miro.medium.com/v2/resize:fill:140:140/1*k5_XPXyBixHBD7WGeDdDEw.png,cybersecurity 3666,2831,Introductory Networking — TryHackMe,"Hello EveryOne, ##Task1 Introduction : The aim of this room is to provide a beginner’s introduction to the basic principles of networking. …",https://medium.com/@Yousef07/introductory-networking-tryhackme-a1134c436c29?source=topics_v2---------129-84--------------------d55e6e34_3c16_49c5_8711_311db019b920-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oq_Y_O8Uv_Z-JgO2zgzCgw.jpeg,cybersecurity 3667,2832,My priceless journey of Digital Transformation: challenges and successes in Paperless initiatives and so on,"As manager of Thai retail brand: ake ake, and acting as IT Manager for my whole company: Rainbow Silver Co.,Ltd., Digital Transformation that I have directed is my precious experience to improve my team efficiency in long term. So I would like to share how I could face that challenge…",https://medium.com/@nol121/my-priceless-journey-of-digital-transformation-challenges-and-successes-in-paperless-initiatives-769cf0c7c24a?source=topics_v2---------131-84--------------------d55e6e34_3c16_49c5_8711_311db019b920-------17,https://miro.medium.com/v2/resize:fill:140:140/1*avl02lHLcUV1_tzahi3AEA@2x.jpeg,cybersecurity 3668,967,Smart Contract Obfuscation,"Smart contract obfuscation refers to the process of hiding or encrypting the code of a smart contract, making it difficult for an attacker to read, interpret or modify the contract. …",https://medium.com/@luishrsoares/smart-contract-obfuscation-24bbfc34809a?source=topics_v2---------132-84--------------------d55e6e34_3c16_49c5_8711_311db019b920-------17,https://miro.medium.com/v2/resize:fill:140:140/1*op4jsb4E-3staqnzX2iDXw.png,cybersecurity 3669,2833,Day 53 — Madness • Walkthrough • TryHackMe,"Today is my day 53 and I am going to solve machine named Madness on TryHackMe lets goo!!!! The first thing as always is the nmap scan hehehehehehehehehehehe!!!!!!!!!!!!!!!!!!!! ┌──(sanlivey㉿kali)-[~/Downloads] └─$ nmap -sC -sV 10.10.161.200 Starting Nmap 7.93 ( ) at 2023-03-09 10:17 EST Nmap scan report for 10.10.161.200 Host is up (0.19s latency). Not…",https://medium.com/@livey/day-53-madness-walkthrough-tryhackme-296a65945779?source=topics_v2---------133-84--------------------d55e6e34_3c16_49c5_8711_311db019b920-------17,https://miro.medium.com/v2/da:true/resize:fill:140:140/0*09DCsq2gvecUWIog.gif,cybersecurity 3670,2834,Cybersecurity Protection Measures,"Cybersecurity Protection Measures Presentation: Outline of network safety and individual information security in the computerized age. The advanced age has changed the manner in which we collaborate with our general surroundings, making our lives simpler and more associated. In any case, this expanded availability has additionally led to digital dangers that can think twice about private information and online security. …",https://medium.com/@radeanugeorge65/cybersecurity-protection-measures-69bf4f23c73e?source=topics_v2---------134-84--------------------e908afee_b41c_491b_a609_e29bc83353c1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_PTvo8jrQljMF8vCaARLPg.jpeg,cybersecurity 3671,2835,Common Cyber Attacks and Defense Strategies,"A brief explanation of common attacks along with their red flags and defensive techniques. Cyber Attack A cyber attack is an attempt to exploit vulnerabilities in computer systems, networks, or devices for malicious purposes. Cyber attacks can take many forms, including stealing sensitive data, disrupting normal operations, and causing physical damage to…",https://medium.com/@cyberpands/common-cyber-attacks-and-defense-strategies-e8f598dc6ac7?source=topics_v2---------135-84--------------------e908afee_b41c_491b_a609_e29bc83353c1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LhHcxo1r1D-OfG-qbPCS2Q.jpeg,cybersecurity 3672,2836,Cyber Security Tips,"There are several types of attacks that can be carried out against crypto wallets. Some of the most common ones are: Phishing attacks: In a phishing attack, attackers create fake websites or emails that appear to be legitimate in order to trick users into revealing their login credentials. These phising sites appear…",https://medium.com/@mattidungafa/cyber-security-tips-5c260a19ef5?source=topics_v2---------136-84--------------------e908afee_b41c_491b_a609_e29bc83353c1-------17,https://miro.medium.com/v2/resize:fill:140:140/1*NOCIqShb09UAHyxE3sxKbg.jpeg,cybersecurity 3673,107,Skipjack Encryption: Understanding Its Advantages and Limitations in Cyber Security | 2023,Understand the Basics of Skipjack Encryption | Karthikeyan Nagaraj — Skipjack encryption is a cryptographic algorithm that was developed in the early 1990s by the United States National Security Agency (NSA) for use in its Clipper chip program. The goal of the program was to provide secure communications for the government and its agencies while maintaining lawful access to encrypted…,https://medium.com/@cyberw1ng/skipjack-encryption-understanding-its-advantages-and-limitations-in-cyber-security-2023-b0dcfdf8cf6c?source=topics_v2---------137-84--------------------e908afee_b41c_491b_a609_e29bc83353c1-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Zt8HBk-U368rqJNO.jpg,cybersecurity 3674,379,What are the Best Database Security Practices to Implement?,"Data science is a field that, just like the quantity of data we have available to us, is constantly expanding. Since 2021 the world has been creating as much data every 40 minutes as was built in the entirety before 2003. Data is scaling at an incredible rate, making databases…",https://medium.com/@odsc/what-are-the-best-database-security-practices-to-implement-23092253e12d?source=topics_v2---------138-84--------------------cd35d7c6_122a_40e9_9ad0_9f5f4336a0d6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*myYnR7rHtqQyVJxc.jpg,cybersecurity 3675,2837,How to Build a Chrome Extension for Private Browsing: Common Threats and Security Practices,"All you should know about building a private extension for Chrome in 2023. If you want to develop a Microsoft Edge, Safari, or Chrome extension for private browsing, it makes sense to study what kinds of issues in cybersecurity you may encounter and how to make the browsing experience safe…",https://medium.com/fively/how-to-build-a-chrome-extension-for-private-browsing-common-threats-and-security-practices-aba144c4475a?source=topics_v2---------139-84--------------------cd35d7c6_122a_40e9_9ad0_9f5f4336a0d6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*EYXofFHrSvdcIIGZ.jpg,cybersecurity 3676,2838,Democratization of Cybersecurity,"Avrohom Gottheil, the founder of #AskTheCEO Media recaps the fascinating conversation he had about the evolution of cybersecurity and the question about whose responsibility it is to keep us safe with Vishal Salvi, SVP & CISO at Infosys in this article. Cybersecurity is a topic that everyone is familiar with…",https://medium.com/@avrohomg/democratization-of-cybersecurity-840f9fd9a757?source=topics_v2---------140-84--------------------cd35d7c6_122a_40e9_9ad0_9f5f4336a0d6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*B0hHqNAFHRs-Gye8o75ZOA.jpeg,cybersecurity 3677,322,Python Penetration Testing: Building Multi-Option Tools,"R. Eric Kiser During a penetration test, there may be instances where you need to develop a tool that is lightweight and quiet. After conducting reconnaissance on the system, you can obtain a clearer understanding of how the network’s systems are structured. Armed with this knowledge, you can create a…",https://medium.com/system-weakness/python-penetration-testing-building-multi-option-tools-87c57aa9c4eb?source=topics_v2---------141-84--------------------cd35d7c6_122a_40e9_9ad0_9f5f4336a0d6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*AgLs9s6lXFqKSwYuqfrPFw.png,cybersecurity 3678,353,Protecting Yourself & Your Business from ChatGPT Cyberattacks,"Artificial Intelligence (AI) is a key tool for businesses across industries, and one of the most prominent AI tools in recent months has been ChatGPT, a conversational chatbot that can produce content to a level no other technology has achieved. …",https://medium.com/@bartmcdonough/protecting-yourself-your-business-from-chatgpt-cyberattacks-d14d4decf4df?source=topics_v2---------142-84--------------------cd35d7c6_122a_40e9_9ad0_9f5f4336a0d6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*fiyfLvg86hFXezRL9qWe9A.jpeg,cybersecurity 3679,2839,4 Useful Tips for Improving Data Security in Cloud Computing Systems,"Have you heard of cloud computing systems before? If not, let me define it for you. It is a system composed of several servers that are working together to store your data. This data includes your cell phone data, your desktop data, and your company’s data too! This means the…",https://medium.com/@mamoonazafar/4-useful-tips-for-improving-data-security-in-cloud-computing-systems-e4587ba471cf?source=topics_v2---------143-84--------------------cd35d7c6_122a_40e9_9ad0_9f5f4336a0d6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*vye3izp0rovKZ86v,cybersecurity 3680,266,"Annoying Drone Near You? Fuzz It, Find the Operator. A Hack","Security researchers used fuzzing to hack a popular drone manufacturer DJI’s protocol, DroneID. They demonstrated that it is not encrypted, can be discovered and give the drone’s position and the operator’s position. — In the vein of hacking stuff in the skies, here’s another write up for you. In the luxury high rise apartment, electric blades whirred outside. The drone floated outside the window, staring in. “There’s that damned thing again!”",https://medium.com/system-weakness/annoying-drone-near-you-fuzz-it-find-the-operator-a-hack-f69b6056fed8?source=topics_v2---------144-84--------------------cd35d7c6_122a_40e9_9ad0_9f5f4336a0d6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*svjHyGTKMtYzGG6Z9FLlPQ.jpeg,cybersecurity 3681,2840,Transformer Neural Network Engineering Techniques on System Logs for Malware Behavior Modeling,"This article evaluates various Transformer engineering methodologies applied to machine data — malware behavioral logs from the Speakeasy emulator. Speculatively, the same conclusions about the Transformer engineering methods drawn in this article can be expanded to any set of system logs, for instance, operating system telemetry like Sysmon on Windows…",https://medium.com/towards-data-science/transformer-neural-network-engineering-techniques-on-system-logs-for-malware-behavior-modeling-c79f83f1ae69?source=topics_v2---------145-84--------------------cd35d7c6_122a_40e9_9ad0_9f5f4336a0d6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*u70vJBB3gojKIG3rLAShtQ.png,cybersecurity 3682,500,Key Takeaways from the DORA Regulation,"Understanding the Digital Operational Resilience Act (DORA) and its Implications for Businesses in the EU — The Digital Operational Resilience Act (DORA) is a new regulation introduced by the European Union to address digital risks faced by financial services organizations. DORA aims to ensure that financial entities have the necessary digital resilience to withstand cyber threats, IT failures, and other digital disruptions. In this article, we…",https://medium.com/illumination/key-takeaways-from-the-dora-regulation-643d41905d29?source=topics_v2---------146-84--------------------cd35d7c6_122a_40e9_9ad0_9f5f4336a0d6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*q3RHkDLsaxAimyat,cybersecurity 3683,2841,What is Cybersecurity? The Basics,Cybersecurity has been around for as long as the internet and computers have (and they’ve been around for a while). …,https://medium.com/@broadbandsearch/what-is-cybersecurity-the-basics-ceb252d832c8?source=topics_v2---------147-84--------------------cd35d7c6_122a_40e9_9ad0_9f5f4336a0d6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*KevS2W6eOkTOSKJLet_APg.png,cybersecurity 3684,2842,Finding Treasures in Github and Exploiting AWS for Fun and Profit — Part 2,"Disclaimer: This article is written for educational purposes, the author and Appsecco does not encourage readers to do engage in questionable practices without the permission of the repository owner. Please note a personal snapshot was used for the demo. In our journey from Part 1, we found AWS credentials and…",https://medium.com/appsecco/finding-treasures-in-github-and-exploiting-aws-for-fun-and-profit-part-2-8ffefa995439?source=topics_v2---------148-84--------------------4dbd9452_d67d_43b2_8539_43e4527eb983-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OnJ9RHzx96SpUZKcCX4rEA.jpeg,cybersecurity 3685,2803,I asked 11 hackers how they felt when they compromised their first Domain Admin.,"Hi everyone, it has been awhile since I had last deliver to you some interesting content. This time, I have one question I asked my fellow hackers (some had requested to remain anonymous). Question of the month is “In 3 words, how would you describe your feelings when you compromised…",https://medium.com/@popalltheshells/i-asked-11-hackers-how-they-felt-when-they-compromised-their-first-domain-admin-c6f5aa81d5a9?source=topics_v2---------149-84--------------------4dbd9452_d67d_43b2_8539_43e4527eb983-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3686,2843,CORS Misconfig that ended in 120$ bounty,"Hi ppl, This is Aravind (aravind0x7) here with another awesome write-up about a CORS bug that ended up in getting a 120$ bounty. I took a break from bug hunting for the past two months and so I was not able to share any write-ups and blogs. Fine ! Let’s…",https://medium.com/@aravind07/cors-misconfig-that-ended-in-120-bounty-130b88174760?source=topics_v2---------154-84--------------------4dbd9452_d67d_43b2_8539_43e4527eb983-------17,https://miro.medium.com/v2/resize:fill:140:140/0*EUQ15U8fRYq5nSTC,cybersecurity 3687,337,The Rising Threat of Nation-State Attacks and the Urgent Need for Collaboration,"By Jeffrey Wells, NSI Visiting Fellow Cyber-attacks have been on a steady incline in recent years, and the situation only increases with each passing day. Cybercrime-related losses in 2023 are expected to reach 8 trillion USD globally, and as the number of both random and targeted attacks increase, the landscape…",https://medium.com/real-natsec/the-rising-threat-of-nation-state-attacks-and-the-urgent-need-for-collaboration-1ebede3b17f4?source=topics_v2---------155-84--------------------4dbd9452_d67d_43b2_8539_43e4527eb983-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yxUvEEc972tufAyIrpzehQ.png,cybersecurity 3688,2844,HackGPT — Using AI to hack my network,"Let me start by saying that I am not a hacker and have no cyber security experience, I wanted to see how much ChatGPT can help a noob like me out. …",https://medium.com/@kaneofthrones/hackgpt-using-ai-to-hack-my-network-ac2e428aa2cb?source=topics_v2---------156-84--------------------4dbd9452_d67d_43b2_8539_43e4527eb983-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9-vcnX-GWcEa10Dmj2dTFw.png,cybersecurity 3689,2845,ISACA Singapore Chapter SheLeadsTech 2023 — Digitally Futuristic,"In celebration of International Women’s Day, ISACA Singapore Chapter, under its 2023 President, Jenny Tan, organized a half-day SheLeadsTech (SLT) [1] conference on 3 March 2023, where female leaders, professionals and students gathered to exchange views on all things “tech”. Into its fourth edition, the 2023 conference, under the theme…",https://medium.com/@misscyberpenny/isaca-singapore-chapter-sheleadstech-2023-digitally-futuristic-89153c3aa077?source=topics_v2---------157-84--------------------4dbd9452_d67d_43b2_8539_43e4527eb983-------17,https://miro.medium.com/v2/resize:fill:140:140/1*E8kBunDTBtV1s8PVuOFsAg.jpeg,cybersecurity 3690,405,A 10-Year-Old’s Guide to Vishing,"Avoid Giving Personal Information to Phone Scammers — Have you ever gotten a phone call from someone you don’t know asking for your personal information like your name, address, or bank account number? If you have, you might have been a target of a scam called vishing. “If you’re not sure who is calling you, it’s always better…",https://medium.com/@srahul07/a-10-year-olds-guide-to-9e299f26be46?source=topics_v2---------158-84--------------------76a9065f_491b_4887_81b1_400d9d8f31d6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*YcY0v2kTpj9acB9yRYcSMw.jpeg,cybersecurity 3691,2846,3 Ways Our Cyber Tools are Turned Against Us (Trends 2023),"With easy access to cloud environments, AI counterattacks are relatively easy to develop. We need to focus: sophisticated Adversarial AI will be our reality going forward. We may never have enough trained cyber professionals to fill the staffing needs of organizations, but thankfully we are leveraging great AI to supplement cyber defense in unique ways. Despite my advocacy of accelerated cyber workforce training programs, AI-enabled software will significantly fill in for the skills gap. In fact, AI will also provide the most sophisticated capabilities the world can devise to protect organizations.",https://medium.com/@chrisnordlinger/3-ways-our-cyber-tools-are-turned-against-us-trends-2023-11278380ae62?source=topics_v2---------159-84--------------------76a9065f_491b_4887_81b1_400d9d8f31d6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3692,373,Getting Started in Cybersecurity Careers: A Step-by-Step Guide to Start a Career in Cybersecurity,"If you’re looking for a career with a bright future and lots of opportunities for advancement, then we recommend you take a look at Career in Cybersecurity. There are several ways to start a career in Cybersecurity. …",https://medium.com/thesecmaster/getting-started-in-cybersecurity-careers-a-step-by-step-guide-to-start-a-career-in-cybersecurity-b78bd2425705?source=topics_v2---------160-84--------------------76a9065f_491b_4887_81b1_400d9d8f31d6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*V5Q7Xe7VsGAR6m2YMtVz-A.png,cybersecurity 3693,2847,How to Use Machine Learning to Detect Cyber Threats,"Introduction Machine learning has become an increasingly important tool in the fight against cyber threats. By using sophisticated algorithms and vast amounts of data, machine learning can help detect and prevent cyberattacks before they happen. …",https://medium.com/coinmonks/how-to-use-machine-learning-to-detect-cyber-threats-c920b092de04?source=topics_v2---------161-84--------------------76a9065f_491b_4887_81b1_400d9d8f31d6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Y8A9DduFpd3jGxTc-zCH2g.png,cybersecurity 3694,2848,Investigating a Fake HDFC Bank Smishing Campaign that abuses Web.app,"In this article, I will investigate the HDFC Bank Smishing Campaign that is currently widespread in India, and abuses Web.app. The aim of this article is to provide insight into current Smishing Campaigns, and how you can investigate them using readily available resources. In Smishing Text and Link Analysis, I…",https://medium.com/@LambdaMamba/dissecting-the-phish-investigating-smishing-campaigns-fake-hdfc-bank-text-scams-dba55b5d36c0?source=topics_v2---------162-84--------------------76a9065f_491b_4887_81b1_400d9d8f31d6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-bctkx8Wzf7T0wc9Z0LHUw.png,cybersecurity 3695,401,SkyLine — An Informative Document,Introduction The skyline programming language is a new and upcoming programming language which is powered by the back end of go. The SkyLine programming language is currently a bit broken but it is in the beta phase so it will not be the best version of the language out there…,https://medium.com/@Totally_Not_A_Haxxer/skyline-an-informative-document-d46afa99e91b?source=topics_v2---------165-84--------------------76a9065f_491b_4887_81b1_400d9d8f31d6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Sj-GbZebHCivZ_SfaCzPTA.png,cybersecurity 3696,2849,Twitter has a privacy problem,"If you’ve been following twitter this week you’re likely to think the privacy issue I’m disclosing might be about a now former Twitter employee’s medical history. Sadly the issue I noticed tonight affects all users on the platform, not just those who Musk has an immature grievance with. When browsing…",https://medium.com/@alanmeekins/twitter-has-a-privacy-problem-ea29a4d63c79?source=topics_v2---------166-84--------------------76a9065f_491b_4887_81b1_400d9d8f31d6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*h6D2TMF8vRcODCLVQSCV6Q.png,cybersecurity 3697,2850,Leaders in Cybersecurity to Follow,"With an increasing number of cyber threats, it is crucial to stay updated with the latest developments and strategies to ensure the security of our online data. Fortunately, many cybersecurity leaders have dedicated their time and efforts to help individuals and organizations stay safe online. Bruce Schneier is one of…",https://medium.com/@chikawonah/leaders-in-cybersecurity-to-follow-f468b839dcb?source=topics_v2---------167-84--------------------76a9065f_491b_4887_81b1_400d9d8f31d6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*VwMfQK1cjrrD2xF8.jpg,cybersecurity 3698,2851,How to conduct stock market manipulation through cyber attacks,"Stock market manipulation through cyber attacks is becoming an increasingly serious problem. Cybersecurity professionals have a critical role to play in preventing and mitigating these attacks, which can have far-reaching consequences for investors and the financial system as a whole. …",https://medium.com/prodefense/how-to-conduct-stock-market-manipulation-through-cyber-attacks-d61bbe406f1?source=topics_v2---------169-84--------------------1ab94e73_2fde_4451_97fb_b919fe57e1f5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*yyYLwezzA7STvGVOThRENA.png,cybersecurity 3699,2534,AI Scams: The Battle for a Safe Future,"In today’s age of technology, scams have become increasingly sophisticated and difficult to detect. Cybercriminals now use advanced tools and techniques, including artificial intelligence (AI), to perpetrate scams that can cause significant financial and reputational damage to individuals and organizations. These scams have become even harder to detect as these…",https://medium.com/@Scofield_Idehen/ai-scams-the-battle-for-a-safe-future-bb1183ea7b7b?source=topics_v2---------170-84--------------------1ab94e73_2fde_4451_97fb_b919fe57e1f5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*VhpmqCwPr4S1WnAqlHnO0w.jpeg,cybersecurity 3700,337,NSI Experts Weigh In: Release of the 2023 National Cybersecurity Strategy,"On Thursday, March 2, the Biden Administration released the 2023 National Cybersecurity Strategy. NSI Experts weigh in with their commentary below. Philip Reitinger, NSI Advisory Board member and President & CEO, Global Cyber Alliance “The National Cybersecurity Strategy is mostly a ‘stay the course’ description of longstanding policies but has…",https://medium.com/real-natsec/nsi-experts-weigh-in-release-of-the-2023-national-cybersecurity-strategy-a74010d30e9?source=topics_v2---------171-84--------------------1ab94e73_2fde_4451_97fb_b919fe57e1f5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*i8tDq7QUtD5Mte1AFz88sg.png,cybersecurity 3701,363,AI security — the new face of application security,"How AI based application risks are a new blind spot in cybersecurity — AI based applications seem to be taking over the world nowadays While the AI market has been growing by leaps and bounds for many years, ChatGPT in late 2022 really made it mainstream. Suddenly everyone from content creators to big tech CEOs are pushing the AI hype train even more…",https://medium.com/bugbountywriteup/ai-security-the-new-face-of-application-security-84e4ba7a678b?source=topics_v2---------172-84--------------------1ab94e73_2fde_4451_97fb_b919fe57e1f5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*mLCJBPVxZW7Kw025,cybersecurity 3702,2852,The fallacy of safety,"What does it mean to be safe? Is it something that in this moment you are sure you have? Is it something that you will eventually be, fully? Well, I asked my self that today and here is my conclusion, or lack thereof: And this case is related to the…",https://medium.com/@emerson_pereira/the-fallacy-of-safety-df8f6f2200c3?source=topics_v2---------173-84--------------------1ab94e73_2fde_4451_97fb_b919fe57e1f5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Xt_tCjqI2I0luNFnJOr-UQ.jpeg,cybersecurity 3703,2853,Useful links to keep your cyber-finger on the security pulse,"As a cybersecurity specialist, it’s important to stay up-to-date with the latest tools, techniques, and trends in the field to stay ahead of emerging threats. In this post, I will share some useful resources that can help you improve your knowledge in cybersecurity. These resources include websites that cover a…",https://medium.com/@raddayurieva/useful-links-to-keep-your-cyber-finger-on-the-security-pulse-fe47fb1154b5?source=topics_v2---------174-84--------------------1ab94e73_2fde_4451_97fb_b919fe57e1f5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*16eVHFCUZHikpEQQH0mokQ.png,cybersecurity 3704,2854,"Twitter Has Failed: User Accounts Open, Systems Now Vulnerable.",Photo by Brett Jordan on Unsplash Twitter’s recent decision to limit two-factor authentication (2FA) to paid subscribers only has sparked concerns among security experts and users alike. 2FA is an essential security feature that adds an extra layer of protection to user accounts by requiring a second method of verification…,https://medium.com/@twistedcircuits56/twitter-has-failed-user-accounts-open-systems-now-vulnerable-156d7716876d?source=topics_v2---------175-84--------------------1ab94e73_2fde_4451_97fb_b919fe57e1f5-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ueL9uYl5DkUQM-FW,cybersecurity 3705,353,China Hacking: Why and How it Matters to Working Professionals,"Southeast Asia has become a hotbed for state-sponsored hacking activities, with China leading the pack. Recently, Beijing-backed hackers targeted the Association of Southeast Asian Nations (ASEAN), breaking into its mail servers and stealing thousands of emails and sensitive information from Southeast Asian nations. …",https://medium.com/@bartmcdonough/china-hacking-why-and-how-it-matters-to-working-professionals-22781f7ef31b?source=topics_v2---------176-84--------------------1ab94e73_2fde_4451_97fb_b919fe57e1f5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*h6yYCFfCAg2pbuCtBX2lQw.jpeg,cybersecurity 3706,2855,Unlocking the Future: Explore the Top 5 Emerging Technologies Everyone is Talking About,"Emerging technologies are revolutionizing the world, providing fresh prospects and possibilities for businesses, individuals, and society as a whole. These technologies, ranging from artificial intelligence and blockchain to data science and cybersecurity, are reshaping industries and creating new ones, while also raising complex ethical and social challenges. To succeed in…",https://medium.com/geekculture/unlocking-the-future-explore-the-top-5-emerging-technologies-everyone-is-talking-about-965dfa14c787?source=topics_v2---------177-84--------------------1ab94e73_2fde_4451_97fb_b919fe57e1f5-------17,https://miro.medium.com/v2/resize:fill:140:140/1*qjuZnAsQiGFIuE_-X-wGPQ.jpeg,cybersecurity 3707,266,Hack Satellites,"The embedded systems in satellites, especially the old ones about to be decommissioned, are quite hack-able. I first learned about hacking of satellites from Vertrose in their article. I wanted to amplify it here, as well as the embedded systems component, which are quite vulnerable (whether we talk about cars…",https://medium.com/system-weakness/hack-satellites-27666018456e?source=topics_v2---------178-84--------------------c5946426_ccd5_4ad5_9878_24aaa82e367b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kQmjb95XIzmxUx2RSuKmRg.jpeg,cybersecurity 3708,2856,How to Use Bandit to Scan Your Python Code for Security Vulnerabilities,"As software developers, we all want to write code that is both functional and secure. However, writing secure code can be challenging, especially if you’re not familiar with the latest security best practices. That’s where Python code vulnerability scanners like Bandit can be incredibly helpful. Bandit is a security linter…",https://medium.com/techbeatly/how-to-use-bandit-to-scan-your-python-code-for-security-vulnerabilities-d1f696873d0f?source=topics_v2---------179-84--------------------c5946426_ccd5_4ad5_9878_24aaa82e367b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*XkSSLvx32oFV3M2l6WIaKA.png,cybersecurity 3709,2857,Bugged — THM Writeup,"Hello, this is my first writeup. I really enjoyed the mosquitto backdoor theme. Link to the room: https://tryhackme.com/room/bugged Recon Let’s start with the reconnaissance of the application, using nmap. So, running the command in the image below is sufficient to get all the services and versions in the system. As we…",https://medium.com/@lorenzomoulin/bugged-thm-writeup-b2f762426fa3?source=topics_v2---------180-84--------------------c5946426_ccd5_4ad5_9878_24aaa82e367b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*I6dqU9AMR8RQGqYenxuasg.png,cybersecurity 3710,1841,The Move to Modern Auth and Its Effect on Migrations,"By: Stacey Farrar Last fall, Microsoft disabled one-source Basic Authentication (Basic Auth) for access to Exchange Online mailboxes. By the end of the year, that legacy authentication method — which has been in existence for more than 25 years — was forever disabled. Given the current state of cybersecurity threats, the move to…",https://medium.com/@rtinsights/the-move-to-modern-auth-and-its-effect-on-migrations-e7c5fb4a9392?source=topics_v2---------182-84--------------------c5946426_ccd5_4ad5_9878_24aaa82e367b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Zv_nrGfRj6mAOpUY.jpg,cybersecurity 3711,2859,How to Find Your First Bug: Motivation and Tips for Bug Bounty Hunting,"Have you recently entered the world of bug bounty hunting and are having trouble locating your first bug? Don’t worry, you’re not alone. It’s a common challenge that requires persistence and dedication. In this article, I have prepared some helpful tips to guide you on your bug bounty journey. First…",https://medium.com/bugbountywriteup/how-to-find-your-first-bug-motivation-and-tips-for-bug-bounty-hunting-5e7343066d0c?source=topics_v2---------183-84--------------------c5946426_ccd5_4ad5_9878_24aaa82e367b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*kBUIEXh_TB3g7844R8O3zw.png,cybersecurity 3712,2860,Cyber security threats to Agriculture!,"Introduction Agriculture has always been a crucial sector for society, providing food and raw materials that are essential for human survival. However, the adoption of embedded and connected technologies in agriculture has increased significantly in recent years, creating new challenges and opportunities for farmers, hardware engineers, cyber security experts, government departments…",https://medium.com/@sheriffjbabu/cyber-security-threats-to-agriculture-550dd4342a8b?source=topics_v2---------184-84--------------------c5946426_ccd5_4ad5_9878_24aaa82e367b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ltvePDfscjjihAf7XO8-RA.jpeg,cybersecurity 3713,460,There are no good arguments for Digital ID but this may be one of the worst yet,I try to refrain from commenting on many topics but the other day I saw a take so bad I just couldn’t let it go so it seems it’s time to address Digital ID and why this is a really bad idea but many groups are still calling for the…,https://medium.com/@nik.kraljevic/there-are-no-good-arguments-for-digital-id-but-this-may-be-one-of-the-worst-yet-b8bbeefb51c5?source=topics_v2---------185-84--------------------c5946426_ccd5_4ad5_9878_24aaa82e367b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4D5V3YZdhRzwYHEoPPNuoA.png,cybersecurity 3714,208,What is Browser Isolation,"Introduction Browser isolation is a security technique that helps protect against web-based threats by creating a barrier between a user’s browsing activity and their local device or network. This technique involves running the user’s web browsing session in a separate, isolated environment, typically within a virtual machine or container. By isolating…",https://medium.com/@ip-specialist/what-is-browser-isolation-e02dc472d83f?source=topics_v2---------186-84--------------------c5946426_ccd5_4ad5_9878_24aaa82e367b-------17,https://miro.medium.com/v2/resize:fill:140:140/1*q5hcXtMEvINjKFylrP8psw.jpeg,cybersecurity 3715,301,Application Security ( App Sec ) — Basics — Part 2,"Hello There, Thank you for taking the time to read the write — up! I appreciate it! Please navigate here to read Part 1 of the subject where I’ve touched upon certain essentials within App Sec, i.e., Static Security, Dynamic Security and Software Composition Analysis. The content is completely based…",https://medium.com/@nilaysangani/application-security-app-sec-basics-part-2-e2cf8a91a63a?source=topics_v2---------187-84--------------------c5946426_ccd5_4ad5_9878_24aaa82e367b-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3716,2861,Emotet Campaign:,"By Ilan Duhin and Yossi Poberezsky(@pober58) Executive Summary: In the last months, there has been an extensive campaign in Europe, especially of malware that calls “Emotet”. …",https://medium.com/@yossipob/emotet-ea6c0a85a15c?source=topics_v2---------188-84--------------------1df079d6_aab5_4962_8f22_44432ccb7c26-------17,https://miro.medium.com/v2/resize:fill:140:140/0*uC5p1V_k1IgngngT.png,cybersecurity 3717,2862,The Dark Side of the Internet of Things (IoT) Era: Exploring Cybersecurity Risks and Threats,"Cybersecurity Risks and Threats in the Internet of Things (IoT) Era The world is rapidly becoming interconnected through technology. With the advent of the Internet of Things (IoT), our everyday devices are connected to the internet and are constantly sharing information with each other. This technology offers convenience and efficiency, but it also comes with a host of cybersecurity risks and…",https://medium.com/@ohermans1/the-dark-side-of-the-internet-of-things-iot-era-exploring-cybersecurity-risks-and-threats-46da26500aaf?source=topics_v2---------189-84--------------------1df079d6_aab5_4962_8f22_44432ccb7c26-------17,https://miro.medium.com/v2/resize:fill:140:140/0*3cYdwiRRVu-oBNaL,cybersecurity 3718,271,Bypass Windows Defender with DLL Injection,"Introduction Welcome to my new article, today i will show you how you can bypass Windows Defender with a basic DLL Injection created with C++. DLL (Dynamic Link Library) injection is a technique used by developers to add functionality to a running program or process by loading a DLL into the…",https://medium.com/@s12deff/bypass-windows-defender-with-dll-injection-eb73d1a72d09?source=topics_v2---------190-84--------------------1df079d6_aab5_4962_8f22_44432ccb7c26-------17,https://miro.medium.com/v2/resize:fill:140:140/0*a3XEapACSt_K6H5q,cybersecurity 3719,2863,TikTok Plans to Keep Your Data Safe With a ‘Massive Amount of Oversight’,"With Project Texas, security chief Will Farrell says TikTok will work with US partner Oracle to firewall its code and data against interference from the Chinese government or anybody else. By Rob Pegoraro With a non-trivial segment of Washington legislators unwilling to trust TikTok, the social network’s interim US security…",https://medium.com/pcmag-access/tiktok-plans-to-keep-your-data-safe-with-a-massive-amount-of-oversight-57354b6eb549?source=topics_v2---------191-84--------------------1df079d6_aab5_4962_8f22_44432ccb7c26-------17,https://miro.medium.com/v2/resize:fill:140:140/0*t_MKIi-I4HvjclZr.jpg,cybersecurity 3720,373,How to Disable TLS 1.0 and TLS 1.1 via Group Policy,"We have covered how to disable TLS 1.0 and TLS 1.1 on Windows Server in the previous post. That lets you know how to disable TLS protocols on a Windows Server locally. If you try disabling deprecated TLS on all the servers one after another, it may sound like an…",https://medium.com/thesecmaster/how-to-disable-tls-1-0-and-tls-1-1-via-group-policy-9e569c830fad?source=topics_v2---------192-84--------------------1df079d6_aab5_4962_8f22_44432ccb7c26-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Q0DlUV9_Ri7wLo9wqQA8iA.png,cybersecurity 3721,2845,Security Resilience vs The Meteors [Interview Clip] — Rethinking Globalisation for Cybersecurity,"This is an interview clip with Dave Lewis, Global CISO Advisory, CISCO. Dave has 30 years of industry experience. He has extensive experience in IT security operations and management. He is the founder of the security site Liquidmatrix Security Digest & podcast as well as the host of DuoTV and…",https://medium.com/@misscyberpenny/security-resilience-vs-the-meteors-interview-clip-rethinking-globalisation-for-cybersecurity-29fac1014295?source=topics_v2---------193-84--------------------1df079d6_aab5_4962_8f22_44432ccb7c26-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Vho2NbwhtTfDt5i1Cmj4QQ.png,cybersecurity 3722,2864,The Simple Economics of Zero Trust,"Last month, the Federal Reserve raised interest rates for the 8th time in a row, corresponding to the steepest rise in rates since 1988. And last week, BofA researchers cautioned that the Fed may need to raise rates as high as 6% before they’re done. The resulting stock market pains…",https://medium.com/zero-trust-security-central/the-simple-economics-of-zero-trust-694de41bc00b?source=topics_v2---------194-84--------------------1df079d6_aab5_4962_8f22_44432ccb7c26-------17,https://miro.medium.com/v2/resize:fill:140:140/0*xM990D6auf3qWO7Z.jpg,cybersecurity 3723,107,Understanding ChaCha20 Encryption: A Secure and Fast Algorithm for Data Protection | 2023,"Everything You Need to Know About the ChaCha20 Encryption Algorithm | Karthikeyan Nagaraj — Introduction: Encryption is one of the most effective methods for achieving this, and ChaCha20 is one of the most popular encryption algorithms used today. ChaCha20 is a secure and fast encryption algorithm that can be used for a wide range of applications. In this article, we will take a closer look…",https://medium.com/@cyberw1ng/understanding-chacha20-encryption-a-secure-and-fast-algorithm-for-data-protection-2023-a80c208c1401?source=topics_v2---------195-84--------------------1df079d6_aab5_4962_8f22_44432ccb7c26-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Z9NnI4mMHKr0S3HpRtHxOg.png,cybersecurity 3724,2790,Confidence Compatible with Fact?,"In response to a call from Dr Vladas Leonas, GAICD, FACS, FIEAust, I left the following message on this site — https://www.linkedin.com/posts/dr-vladas-leonas-gaicd-facs-fieaust-16622b_digitally-onboard-customers-by-linking-their-activity-7035492835080491008-4SfD “That those people confidently makes such a claim as “Digitally onboard customers by linking their face to their identity document” should be interpreted that their face verification technology…",https://medium.com/@kokumai/confidence-compatible-with-fact-82d29ac57cd0?source=topics_v2---------196-84--------------------1df079d6_aab5_4962_8f22_44432ccb7c26-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JPQfDJTpwErUlmrEgDFcFw.jpeg,cybersecurity 3725,2865,HTTP Parameter Pollution: When a Hacker Plays Mad Libs with Your Website,"HTTP parameter pollution (HPP) is a relatively new type of vulnerability that is increasingly being exploited by attackers to manipulate web application behavior. The vulnerability occurs when an attacker adds extra parameters to a web request, causing the target web application to misinterpret the intended action. Imagine a scenario where…",https://medium.com/@teendifferent7/http-parameter-pollution-when-a-hacker-plays-mad-libs-with-your-website-badae7fa03e6?source=topics_v2---------197-84--------------------1df079d6_aab5_4962_8f22_44432ccb7c26-------17,https://miro.medium.com/v2/resize:fill:140:140/0*uzhEZcW0IXX_SvzJ,cybersecurity 3726,406,Why is a lengthy password insufficient to protect your data from Dark Web attacks,"Because they are the most traditional digital authentication approach, passwords remain the preferred method for establishing one’s identity online. Although businesses are increasingly adopting other authentication methods, password strength is essential in determining how well an organization is protected against data breaches. …",https://medium.com/@softwaretrailers/why-is-a-lengthy-password-insufficient-to-protect-your-data-from-dark-web-attacks-313f12eb32f2?source=topics_v2---------198-84--------------------549c450d_4d78_475a_8ec2_073f2c545fe0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*b7fdz_9fP9v6Mz5W,cybersecurity 3727,414,Best Practices for Implementing Identity and Access Management (IAM) in Your Organization,"Identity and Access Management (IAM) is a crucial component of an organization’s security posture. IAM solutions help manage and secure access to an organization’s digital assets, ensuring that only authorized users can access sensitive data or systems. However, implementing an IAM solution can be complex and challenging, which is why…",https://medium.com/@edward_wilkins/best-practices-for-implementing-identity-and-access-management-iam-in-your-organization-982a6f9b4ae?source=topics_v2---------199-84--------------------549c450d_4d78_475a_8ec2_073f2c545fe0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LeUA5nhkDew6wgA-0vjYvg.jpeg,cybersecurity 3728,2808,TryHackMe | Investigating with Splunk Walkthrough,"Hi there, I’m glad to see you here. In this article, we’ll solve together the “Investigating with Splunk” room in TryHackme. In some sections, I’ll share brief about the subject. Don’t forget! You must always research to learn more. I hope it will be helpful for you. Let’s start! Room Machine Before…",https://medium.com/@enescayvarli/tryhackme-investigating-with-splunk-walkthrough-931448089?source=topics_v2---------202-84--------------------549c450d_4d78_475a_8ec2_073f2c545fe0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*HLk1V-GrGFV7ByQHERdKJQ.png,cybersecurity 3729,2866,The king of shell -Javaweb Memory Shell [Cognitive Section],"Introduction: Hello everyone, I am su18. Whether it's personal blogs or communities, it's been a long time since I wrote technical articles. There are many reasons for this, such as time, energy, and mindset. But I am relatively active in the open source community. Due to work needs, I wrote…",https://medium.com/@gobysec/the-king-of-shell-javaweb-memory-shell-cognitive-section-137fb92ad8d8?source=topics_v2---------203-84--------------------549c450d_4d78_475a_8ec2_073f2c545fe0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LXf5sNy3xcxOtULDXoDapQ.png,cybersecurity 3730,2867,13 Steps to Protect your Business from Cyber Hackers,"With a hack every 23 seconds could your business be next? — Monday morning, opening your computer and thinking, “This is going to be a good week!” But this time it’s not! Instead, staring at you is this unfamiliar looking screen. Your heart drops, and you know this week is going to be horrible! …",https://medium.com/@patrickpt/13-steps-to-protect-your-business-from-cyber-hackers-39c59c0ae94?source=topics_v2---------204-84--------------------549c450d_4d78_475a_8ec2_073f2c545fe0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gjdL0CIc3jKqjxiYvUuZpQ.jpeg,cybersecurity 3731,2868,Blog08: Misc — MCSC v10 Writeups: Part One (Reverse Challenges),"Hello Folks! The v10 of our major event, the MCSC, has come to an end and so has its CTF competition. The winners have been crowned, but everyone seemed eager to get the full details of the challenges that were up for the grabs. For that very reason, we will be…",https://medium.com/@insec-club/blog08-misc-mcsc-v10-writeups-part-one-reverse-challenges-3b88c448785d?source=topics_v2---------205-84--------------------549c450d_4d78_475a_8ec2_073f2c545fe0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oI-m8RE8tyzgHArNluHQlw.png,cybersecurity 3732,2869,Lab-1 SQL-Injection PortSwigger WebSecurity,"Task: Make a sql injection to retreive all products data released and non-released The browser request this url: https://insecure-website.com/products?category=Gifts The query which the browser send: SELECT * FROM products WHERE category = 'Gifts' AND released = 1 Analysis: step:1 trying to know if work with sql or not: SELECT * FROM…",https://medium.com/@m75012439/lab-1-sql-injection-portswigger-websecurity-5759978da661?source=topics_v2---------206-84--------------------549c450d_4d78_475a_8ec2_073f2c545fe0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-DfAn4r5lBzOfhgFD6-0CQ.jpeg,cybersecurity 3733,2868,Blog09: Misc — MCSC v10 Writeups: Part Two (Pwn Challenges),"Hello again folks! You’ve been a lot to request the writeups for the pwn challenges from the MCSC v10’s CTF. So, here they are. Challenge — Whisper [thamugadi@thinkpad whisper]$ checksec whisper [*] ‘/home/thamugadi/mcsc/whisper/whisper’ Arch: amd64–64-little RELRO: No RELRO Stack: No canary found NX: NX disabled PIE: No PIE (0x400000) RWX: Has RWX segments …",https://medium.com/@insec-club/blog09-misc-mcsc-v10-writeups-part-two-pwn-challenges-2988486e36f0?source=topics_v2---------207-84--------------------549c450d_4d78_475a_8ec2_073f2c545fe0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3734,2870,Static Malware Analysis Tools,I’ll describe a few of the tools I frequently use when analyzing malware samples in this article. Malware analysis is essential in cyber security for several reasons: Detecting and identifying malware: Malware is designed to evade detection and analysis by security tools. Malware analysis helps to identify the presence of…,https://medium.com/@ekimisik/static-malware-analysis-tools-782c28f3e974?source=topics_v2---------208-84--------------------ece1ccf4_88b4_4ba5_b5ff_5be667582b8e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gfjEO7U8tbEwURRVBKfxnQ.jpeg,cybersecurity 3735,2871,Crypto Wallet Security — Video,"In this video, you will learn what security features are important for mobile crypto wallets. You will also discover the differences between wallets and banking applications. — Let’s talk about mobile crypto wallets and compare their security with the security of banking applications. Here are basic differences between a wallet application and a banking application: To create and develop an application, a bank uses strict rules and regulations. Usually, banks implement all features very carefully and…",https://medium.com/securing/crypto-wallet-security-video-e81cabebd6e6?source=topics_v2---------209-84--------------------ece1ccf4_88b4_4ba5_b5ff_5be667582b8e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*2mVlllcPYBFgSH-c_bgavg.png,cybersecurity 3736,406,Are you familiar with the term “MaaS”? This is why you should be concerned about it.,"What is MaaS? When you hear the word “SaaS” (or software as a service), you undoubtedly recognize a platform that makes a digital software program available, including regular upgrades and maintenance, in exchange for a recurring payment. Malware as a service, often known as MaaS, functions in the same way…",https://medium.com/@softwaretrailers/are-you-familiar-with-the-term-maas-this-is-why-you-should-be-concerned-about-it-4dd2983ab71e?source=topics_v2---------210-84--------------------ece1ccf4_88b4_4ba5_b5ff_5be667582b8e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*jfrIe_cKH8Sx_jZA,cybersecurity 3737,301,Application Security ( App Sec ) — Basics — Part 1,"Hello there, Thank you for taking the time to read the write — up, I appreciate it! After much consideration, I’ve decided to start writing about Application Security — a cybersecurity service that is important to me. …",https://medium.com/@nilaysangani/application-security-app-sec-basics-part-1-6730444605cd?source=topics_v2---------211-84--------------------ece1ccf4_88b4_4ba5_b5ff_5be667582b8e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3738,1991,10 Tips You Need to Know for Writing More Secure Code in Python,"Python is a popular programming language used in many applications, from web development to data analysis. However, with the rise of cyber threats, it is important to ensure that the code we write is secure and less vulnerable to attacks. …",https://medium.com/@nathanflore/10-tips-you-need-to-know-for-writing-more-secure-code-in-python-369dfcfae78a?source=topics_v2---------212-84--------------------ece1ccf4_88b4_4ba5_b5ff_5be667582b8e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*IXTF85nu5g2cxJd9,cybersecurity 3739,2872,Hackers Are Stealing Your Medical Records. Act Now,"Imagine waking up to a bill worth thousands of dollars for a surgery you never had! With healthcare breaches increasing alarmingly, it could soon be a reality for many in the coming years. Stolen medical records are being sold on the dark web for more than $1,000 each. A whopping…",https://medium.com/@Cryptosy1/hackers-are-stealing-your-medical-records-act-now-28799de40345?source=topics_v2---------213-84--------------------ece1ccf4_88b4_4ba5_b5ff_5be667582b8e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TYpOYGoII4CH8co0oM7P1w.jpeg,cybersecurity 3740,1285,The Tech Revolution: 5 High-Demand Fields in the Ever-Evolving IT Industry,"The IT industry is one of the fastest-growing and most dynamic industries in the world. With technological advancements continuing to shape the way we live and work, the demand for IT professionals and services is only increasing. …",https://medium.com/@jyotsna143.cob/the-tech-revolution-5-high-demand-fields-in-the-ever-evolving-it-industry-f91e8cd42157?source=topics_v2---------214-84--------------------ece1ccf4_88b4_4ba5_b5ff_5be667582b8e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*7rBj74yCYm8cMU2T,cybersecurity 3741,2873,U.S. National Cybersecurity: Strategy at an Inflection Point,"This story was originally published on Cybereason Malicious Life here https://www.cybereason.com/blog/u.s.-national-cybersecurity-strategy-at-an-inflection-point The Biden administration issued a new cybersecurity strategy last week that has many observers applauding its emphasis on regulating minimum cybersecurity standards and enforcing so-called secure by design development practices, among other things.",https://medium.com/@DanielVerton/u-s-national-cybersecurity-strategy-at-an-inflection-point-23078708a898?source=topics_v2---------215-84--------------------ece1ccf4_88b4_4ba5_b5ff_5be667582b8e-------17,https://miro.medium.com/v2/resize:fill:140:140/0*QPHwwKYnHf4O7M4l,cybersecurity 3742,2874,Cross-Site Request Forgery (CSRF) — Explained Simply,"TL;DR Cross-Site Request Forgery (CSRF) is a vulnerability that allows attackers to make unauthorized requests on behalf of a victim user to a vulnerable website. This is done by exploiting a website’s lack of validation for request origins. To protect against CSRF, web developers can use techniques like anti-CSRF tokens, SameSite…",https://medium.com/@daniel.carlier/cross-site-request-forgery-csrf-explained-simply-7e6ac4ee4b0c?source=topics_v2---------216-84--------------------ece1ccf4_88b4_4ba5_b5ff_5be667582b8e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*h3-LAQIL9GzIUKmP6_7Nbg.png,cybersecurity 3743,2875,Securing Your Digital World: Proven Strategies to Protect Your Data and Equipment from Cyber-Attacks,"As technology continues to advance, the risk of cyber-attacks also increases. Hackers and cybercriminals are constantly finding new ways to access personal and sensitive information, and it’s important to take measures to protect yourself and your data from these threats. …",https://medium.com/@dobiliauskasjustas/securing-your-digital-world-proven-strategies-to-protect-your-data-and-equipment-from-9c3207bb62fb?source=topics_v2---------217-84--------------------ece1ccf4_88b4_4ba5_b5ff_5be667582b8e-------17,https://miro.medium.com/v2/resize:fill:140:140/1*08qOWJTSzAYlJSZjaU08eA.png,cybersecurity 3744,2876,[Netflix][Smart TV] — Chaining Self-XSS with Session poisoning.,"I’d like to share my experience of discovering an interesting vulnerability on Netflix while using their TV application. Through my participation in Netflix’s Bug Bounty program, I was able to identify a vulnerability rated as P3(Medium), known as Self-XSS, which was made more impactful through the use of a cookie…",https://medium.com/@ltsirkov/netflix-smart-tv-chaining-self-xss-with-session-poisoning-3eb7c78c7914?source=topics_v2---------218-84--------------------a39bf445_c408_4855_a7d1_ba18ea5e4512-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Kp-OEx7OR54sNc13AI1znA.png,cybersecurity 3745,301,SQL Injection ( SQLi ),"Hello There, Thank you for taking the time to read the write — up! I appreciate it! Today’s content is going to be on understanding ‘SQL Injection’ The content is completely based on my personal experiences & knowledge, interactions with incredible people in the App Sec and Software Development space…",https://medium.com/@nilaysangani/sql-injection-sqli-b7e8e5808407?source=topics_v2---------219-84--------------------a39bf445_c408_4855_a7d1_ba18ea5e4512-------17,https://miro.medium.com/v2/resize:fill:140:140/1*E2iviHeFduNehXnAezAWNg.png,cybersecurity 3746,339,Data Security — Chapter 1,"Hey Security enthusiast, Welcome to this profile. This is about security…enhanced. Let me explain why. Security is a great word. It means protection but, at the same time, it is too wide to be focused only on a single meaning. The term “security” could be referred to as digital security…",https://medium.com/@andrea.dibiase/data-security-chapter-1-22eaf8cb33d9?source=topics_v2---------220-84--------------------a39bf445_c408_4855_a7d1_ba18ea5e4512-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OuJ1ymJvrw6v6ZvUwDYVIg.png,cybersecurity 3747,280,Creating A Vulnerable API Lab to practice API-Pentesting with crAPI,APIs are used everywhere and protecting them is an essential part in the cyber world that we live in now. To learn how to protect something it is better to know how to break it or at least the weakness that attacker will use to take advantage of your API. …,https://medium.com/@amaraltohami30/creating-a-vulnerable-api-lab-to-practice-api-pentesting-with-crapi-3447179e8650?source=topics_v2---------222-84--------------------2d5d23f3_a0f3_47c8_b63b_fd848e945ee6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*KxGLVcJQ6fi1wn04,cybersecurity 3748,2877,Enhancing Penetration Testing for Improved Security,"“Prepare and prevent, don’t repair and repent” Before we dive into the details, it’s important to note that the information provided in this article, and the red team file in question, are intended for educational or authorized purposes only. The use of these resources for any other purpose is strictly…",https://medium.com/@cyberpicker/enhancing-penetration-testing-for-improved-security-329785d7dd1e?source=topics_v2---------223-84--------------------2d5d23f3_a0f3_47c8_b63b_fd848e945ee6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*GLJecqMuS6lZN-bRZLQ6TA.png,cybersecurity 3749,2878,Jenkins Security Hardening Checklist,"As part of my daily tasks, I planned to check our Jenkins servers for security misconfiguration. I wanted to ensure that we are aligned with the security’s best practices and other requirements. To be able to communicate those security requirements to other teams (Devs, DevOps, etc.), I needed to gather…",https://medium.com/@erez.dasa/jenkins-security-hardening-checklist-da9b80c36226?source=topics_v2---------224-84--------------------2d5d23f3_a0f3_47c8_b63b_fd848e945ee6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oCN_s9s2kUB7MUEsWUiVaw.jpeg,cybersecurity 3750,257,How I Got Free Travel on Namma Metro,"As someone who uses public transportation regularly, I rely on it to get me where I need to go quickly and efficiently. That’s why I was surprised to learn that I could have travel for free on Namma Metro due to a critical bug that I discovered. Namma Metro In…",https://medium.com/bugbountywriteup/how-i-got-free-travel-on-namma-metro-75066fabc5a0?source=topics_v2---------0-84--------------------eefca776_7b65_42b0_b336_546d888562ec-------17,https://miro.medium.com/v2/resize:fill:140:140/1*k93zY-gR0pC9uOGci4im5Q.png,cybersecurity 3751,2811,Cybersecurity Is Beautiful and Magical!,"Don’t you get tired of searching for a cybersecurity-related image, and end up with endless images of “hackers with hoodies” and blurred lines of JavaScript code? And, sometimes, don’t you just find cybersecurity presentations to be a little boring … “Beware of clicking on the spear phishing email!”, “The only…",https://medium.com/asecuritysite-when-bob-met-alice/cybersecurity-is-beautiful-and-magical-322702bbf325?source=topics_v2---------1-84--------------------eefca776_7b65_42b0_b336_546d888562ec-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1y0gAxDHm8acPHuELCxWsg.png,cybersecurity 3752,2879,Top 2022 Security threats and takeaways,Summarized findings of top industry research Top challenges for a security leader are making a case for security investments and prioritizing security initiatives. …,https://medium.com/@lkethana/top-2022-security-threats-and-takeaways-9c825008d6cb?source=topics_v2---------2-84--------------------eefca776_7b65_42b0_b336_546d888562ec-------17,https://miro.medium.com/v2/resize:fill:140:140/0*WQ3LjCh_3LN0D3m5,cybersecurity 3753,2880,Anatomy of a Reflected XSS: My Discovery on a Microsoft’s Subdomain,"A few days ago, while browsing the website visualstudio.microsoft.com[1], I performed some tests on that Microsoft’s subdomain to check for any potential vulnerabilities. After multiple attempts, I was unable to find any security flaws, except for a Self XSS issue on their second search bar on the download page. To…",https://medium.com/bugbountywriteup/anatomy-of-a-reflected-xss-my-discovery-on-a-microsofts-subdomain-7a237aba4392?source=topics_v2---------3-84--------------------eefca776_7b65_42b0_b336_546d888562ec-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-rfCOwg6nj9w7d990VkYaA.png,cybersecurity 3754,2881,How I chained multiple High-impact vulnerabilities to create a critical one.,Hello Everyone!!! I am Vinay Jagetiya (princej_76) and I am back again with my one of the most interesting finding. I will explain how I found high impact vulnerabilities and chained them to create critical one. Here we go!!! Lets say the domain is ‘xyz.com’. I created an account and…,https://medium.com/@princej-76/how-i-chained-multiple-high-impact-vulnearbilities-to-create-a-critical-one-476950a3bb9f?source=topics_v2---------4-84--------------------eefca776_7b65_42b0_b336_546d888562ec-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3755,2882,Flutter Hackers: Uncovering the Dev’s Myopia (Part 1),Life hack for understanding Flutter Application through source code leaks — This writings is a bridging prerequisites before diving deeper into reverse-engineering and leveraging an unknown vulnerability in a Flutter Android Application for bug bounty or penetration testing Zero to Lego,https://medium.com/bugbountywriteup/flutter-hackers-uncovering-the-devs-myopia-part-1-6c316be56b13?source=topics_v2---------5-84--------------------eefca776_7b65_42b0_b336_546d888562ec-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QcuvtnLV0e65Ie_dhXO-1A.png,cybersecurity 3756,301,Cross-Site Scripting ( XSS ),"Hello There, Thank you for taking the time to read the write — up! I appreciate it! Today’s content is going to be on understanding ‘Cross-Site Scripting ( XSS )’ The content is completely based on my personal experiences & knowledge, interactions with incredible people in the App Sec and…",https://medium.com/@nilaysangani/cross-site-scripting-xss-d70b320c2be2?source=topics_v2---------6-84--------------------eefca776_7b65_42b0_b336_546d888562ec-------17,https://miro.medium.com/v2/resize:fill:140:140/1*FxQGTYc1aM-pd-U6njQRSw.png,cybersecurity 3757,2883,Reflected XSS (User Agent),"Hello friends, today I will show you the steps of detecting a vulnerability that I encountered in Web Application Security Tests in my project named Saka Reflected XSS (User Agent) and exploiting this vulnerability. What’s XSS You can find detailed information about the XSS vulnerability in the article below. Cross Site Scripting (XSS) Author: KirstenS Contributor(s): Jim Manico, Jeff Williams, Dave Wichers, Adar Weidman, Roman, Alan Jex, Andrew Smith…owasp.org",https://medium.com/system-weakness/reflected-xss-user-agent-2868ca1d5116?source=topics_v2---------7-84--------------------eefca776_7b65_42b0_b336_546d888562ec-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_N40_-bCNbQnmSyLrwLVow.png,cybersecurity 3758,2884,Anomaly Detection using Sigma Rules (Part 5) Flux Capacitor Optimization,"To boost performance, we implement a forgetful bloom filter and a custom Spark state store provider — This is the 5th article of our series. Refer to part 1 , part 2, part 3 and part 4 for some context. In our previous articles, we have demonstrated the performance gains achieved by using a bloom filter. …",https://medium.com/towards-data-science/anomaly-detection-using-sigma-rules-part-5-flux-capacitor-optimization-118e538cf8c4?source=topics_v2---------8-84--------------------eefca776_7b65_42b0_b336_546d888562ec-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zew1JCwpNdHtHD5uSoH9vQ.jpeg,cybersecurity 3759,265,Stripe’s Two-Factor Authentication (2FA) Bypass,"Hello Everyone, What is 2FA? Two-factor authentication (2FA) is a particular kind of multi-factor authentication (MFA) that increases access security by requiring two ways (also known as authentication factors) to confirm your identity. A smartphone app that you have and something you know, such as a login and password, can both be used as…",https://medium.com/@45w1nkv/stripes-two-factor-authentication-2fa-bypass-3765344cc272?source=topics_v2---------9-84--------------------eefca776_7b65_42b0_b336_546d888562ec-------17,https://miro.medium.com/v2/resize:fill:140:140/1*m6pXBFDNitef-VSsgbWC2g.png,cybersecurity 3760,2885,Unlocking High-Fidelity Graphistry Cyber Security Visualization with Kasm Workspaces and Raspberry Pi,"In recent years, there has been a growing interest in the concept of “weak computing” — the idea of using low-powered, inexpensive devices to perform complex computing tasks. …",https://medium.com/@kasm/unlocking-high-fidelity-graphistry-cyber-security-visualization-with-kasm-workspaces-and-raspberry-5387a24831ca?source=topics_v2---------10-84--------------------18b49b31_31c0_404f_9639_80ea548017f3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9nGpZo0-RU0MaTrteXrnLg.png,cybersecurity 3761,2886,The Cyber Sentinels Club,"Joining the Cyber Sentinels Club on Discord is an absolutely fantastic opportunity for anyone who is passionate about cybersecurity! In today’s rapidly evolving digital landscape, staying up-to-date on the latest security trends and solutions is more important than ever, and this club provides a platform where members can: Collaborate with…",https://medium.com/@amaterasu-sec/the-cyber-sentinels-club-cfa53977a5e4?source=topics_v2---------11-84--------------------18b49b31_31c0_404f_9639_80ea548017f3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3762,2887,Educational Byte: How to protect your private keys and personal data,"There are some scary and sad stories about crypto private keys. A lot of people lost them, especially in the early days of Bitcoin. And that means they also lost all the money associated with those keys. In some cases, the treasure became millions over the years — crypto prices…",https://medium.com/obyte/educational-byte-how-to-protect-your-private-keys-and-personal-data-be8f8ad5f470?source=topics_v2---------12-84--------------------18b49b31_31c0_404f_9639_80ea548017f3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*4mbBrqTmQNV_axv9,cybersecurity 3763,312,Encryption: Different standards and Protocols,"In a previous blog we already discussed encryption, its limitations and how we use encryption but in this blog we are going to cover encryption standards and its protocol. If you’re interested in learning more about encryption, you can do so by reading my earlier blog post on the subject.: …",https://medium.com/@gupta-bless/encryption-different-standards-and-protocols-82d0685b11c0?source=topics_v2---------13-84--------------------18b49b31_31c0_404f_9639_80ea548017f3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*6OVV65GN16EJBXyD,cybersecurity 3764,2888,Quantum Computing and Cybersecurity: Unveiling the Double-edged Sword,"Quantum computing has garnered significant attention in recent years due to its potential to revolutionize the world of information technology. While its capabilities can bring numerous benefits, it also poses considerable risks to cybersecurity. In this article, we will first explain how regular and quantum computers process information, then discuss…",https://medium.com/@dante-cyber/quantum-computing-and-cybersecurity-unveiling-the-double-edged-sword-84403f226d86?source=topics_v2---------16-84--------------------18b49b31_31c0_404f_9639_80ea548017f3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*sit2VMILZ5H7PCfr,cybersecurity 3765,2889,"Phishing, Clone Login Pages & Stolen Credentials","Contents Social Engineering via Phishing Social Engineered Attacks using the SET tool and Phishing Emails Social Engineering via Phishing In cybersecurity, social engineering is a nightmare as attackers can obtain credentials that allow them to bypass firewalls and intrusion prevention systems. Social engineering refers to gathering confidential information either virtually or in-person via technical…",https://medium.com/@nativealgorithms/phishing-clone-login-pages-stolen-credentials-aac30f0ae872?source=topics_v2---------17-84--------------------18b49b31_31c0_404f_9639_80ea548017f3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CHq-CPiXnLPdEdn4jRmzdg.png,cybersecurity 3766,2681,Protecting Your Business from Cyber Threats with GPT-4,"As technology advances, so do the risks associated with it. The rise of cyber threats is a real concern for businesses of all sizes. Cybercriminals are constantly evolving their methods and tactics, and traditional security measures are no longer sufficient to protect against these sophisticated attacks. However, with the emergence…",https://medium.com/@saidul.islam/protecting-your-business-from-cyber-threats-with-gpt-4-b3008a73bb25?source=topics_v2---------18-84--------------------8416a891_c410_4003_b6ed_224c2c024556-------17,https://miro.medium.com/v2/resize:fill:140:140/0*SrtHjz0A8awHCl8p,cybersecurity 3767,2796,Quantum Computing Nightmares: Are You Prepared for the Unknown?,"The potential quantum computing nightmares and how we can be prepared for them — Quantum computing has been a buzzword in the tech industry for several years now. It is a revolutionary technology that is poised to change the world we live in. However, with great power comes great responsibility. The rise of quantum computing also brings with it a set of challenges that…",https://medium.com/ryan-trincieri-writes/quantum-computing-nightmares-are-you-prepared-for-the-unknown-1d310af10c6d?source=topics_v2---------19-84--------------------8416a891_c410_4003_b6ed_224c2c024556-------17,https://miro.medium.com/v2/resize:fill:140:140/1*AIbXyUQsz6DFBRFxx6Y1tQ.jpeg,cybersecurity 3768,538,macOS Ventura breaks security software — and here’s how you fix it.,"Preface: The New macOS Release The newest version of the operating system running on Apple Macs, macOS Ventura, was released back in October and with it brought a whole host of new features (my favorite being Rapid Security Response), bug fixes, and design changes sprinkled throughout the interface. And while the first five minutes of…",https://medium.com/cybervisory/macos-ventura-breaks-security-software-and-heres-how-you-fix-it-6fa00946072a?source=topics_v2---------20-84--------------------8416a891_c410_4003_b6ed_224c2c024556-------17,https://miro.medium.com/v2/resize:fill:140:140/0*COUmb4HN-ATjX9om,cybersecurity 3769,518,How to add an external-import AlienVault Connector in OpenCTI?,"What is an external-import connector in OpenCTI? An External-Import connector in OpenCTI is a module that allows users to import data from external sources into the OpenCTI platform. The external sources can be third-party threat intelligence feeds, open-source intelligence (OSINT) feeds, or any other sources that provide relevant cybersecurity information. The External-Import connector can be used to…",https://medium.com/@hassaann463/adding-external-import-alienvault-connector-in-opencti-b43db414aeda?source=topics_v2---------21-84--------------------8416a891_c410_4003_b6ed_224c2c024556-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EiogE4NTkw4Wf_my4_N84w.png,cybersecurity 3770,267,Getting Started with Kali Linux Purple: A Step-by-Step Guide,"So, Offensive Security launched a Purple Version of Kali Linux in 2023. Now, what is it about? Well, I will let Offensive Security do explain a bit about it: “Kali Purple started out as a proof of concept, evolved into a framework, then a platform, and now it has become…",https://medium.com/@stefan-p-bargan/getting-started-with-kali-linux-purple-a-step-by-step-guide-2da209aa2c82?source=topics_v2---------22-84--------------------8416a891_c410_4003_b6ed_224c2c024556-------17,https://miro.medium.com/v2/resize:fill:140:140/1*NrTvueC0vA67onr1XlP_Sw.png,cybersecurity 3771,286,"Learning about Encryption, Encoding, and Hashing","BASIC INTRODUCTION We no longer live in the 90s when the internet was just accessible to people. With the amount of information that is available and the sheer number of tools available to aid exploitation of vulnerabilities, it is necessary to implement proper security controls. It is necessary to implement…",https://medium.com/bugbountywriteup/learning-about-encryption-encoding-and-hashing-9e4032546b22?source=topics_v2---------23-84--------------------cedeeca3_9dc7_4c75_8553_8eae5b9b6906-------17,https://miro.medium.com/v2/resize:fill:140:140/0*XmaJd_fiPygI-klE,cybersecurity 3772,286,The Cost of Broken Access Control: Understanding the Financial Impact on Your Business,"As businesses increasingly move their operations online, the importance of robust access control mechanisms cannot be overstated. Access control determines who can access what resources within an organization’s network and prevents unauthorized access to sensitive data. However, when access control mechanisms are broken or ineffective, the financial impact on a…",https://medium.com/@securitylit/the-cost-of-broken-access-control-understanding-the-financial-impact-on-your-business-a5805c35a9e9?source=topics_v2---------24-84--------------------cedeeca3_9dc7_4c75_8553_8eae5b9b6906-------17,https://miro.medium.com/v2/resize:fill:140:140/0*mGGmO1WZ-NQnXx8q,cybersecurity 3773,2890,DNS security best practices — Protecting Your Organization from Cyber Threats,"Domain Name System (DNS) is a critical component of the internet infrastructure, translating human-readable domain names into IP addresses that computers use to connect to websites and other internet resources. However, because DNS is an open system, it is vulnerable to cyber attacks, including DNS cache poisoning, DNS spoofing, and…",https://medium.com/@bkjoshi76/dns-security-best-practices-protecting-your-organization-from-cyber-threats-67b38f96f147?source=topics_v2---------25-84--------------------cedeeca3_9dc7_4c75_8553_8eae5b9b6906-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3774,322,Python Penetration Testing: Using Hashcat and Python to Easily Crack Passwords,R. Eric Kiser I am one of those guys who hates to remember every detail of every program or tool I use. I also hate to waste time. Even the joys of not being in traffic make me ecstatic when I get to work from home. This is why when…,https://medium.com/@ekiser_48014/python-penetration-testing-using-hashcat-and-python-to-crack-windows-passwords-34cb4f052bf3?source=topics_v2---------26-84--------------------cedeeca3_9dc7_4c75_8553_8eae5b9b6906-------17,https://miro.medium.com/v2/resize:fill:140:140/1*CXsVVn1ud5U6IlaJI_KnRg.png,cybersecurity 3775,271,Create Botnet in 2 minutes,"Introduction Welcome to my new article, today i will show you how you can create a Botnet in 2 minutes. To do this i use a Ares Botnet, here you have the link from github: A botnet is a network of compromised computers or devices that are controlled remotely by a…",https://medium.com/@s12deff/create-botnet-in-2-minutes-dbc159658408?source=topics_v2---------27-84--------------------cedeeca3_9dc7_4c75_8553_8eae5b9b6906-------17,https://miro.medium.com/v2/resize:fill:140:140/0*uiEh6S0TPoLYyHD6,cybersecurity 3776,1002,Review — Is Cybersecurity Specialization by Maryland University on Coursera worth It in 2023?,"Hello guys, the world of cybersecurity is constantly evolving, and staying up-to-date with the latest trends and technologies is crucial. One way to do so is by taking online courses that offer a deep dive into cybersecurity concepts and practices. …",https://medium.com/javarevisited/review-is-cybersecurity-specialization-by-maryland-university-on-coursera-worth-it-in-2023-7a7dc6b9d2a2?source=topics_v2---------28-84--------------------cedeeca3_9dc7_4c75_8553_8eae5b9b6906-------17,https://miro.medium.com/v2/resize:fill:140:140/1*e6cS4DjJrGH9HO6GiGt-kw.jpeg,cybersecurity 3777,2891,Checking for Overlap In CWE Numbers on the OWASP Top 10,"I’ve been reviewing the OWASP Top 10 recently to keep my skills fresh, and during my review, I got curious if there was any overlap in the related CWE numbers. Some of the sections have a lot of related CWE numbers, so I thought it would be good to write…",https://medium.com/@robertlackey/checking-for-overlap-in-cwe-numbers-on-the-owasp-top-10-701f6be6bad3?source=topics_v2---------29-84--------------------cedeeca3_9dc7_4c75_8553_8eae5b9b6906-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3778,2892,A Simple Introduction to Zero Trust Networks,"Gain a basic understanding of Zero Trust and implementing your own sample ZT network — The biggest security breaches in history have cost companies billions of dollars. Most recently, in 2022, a security breach at T-Mobile cost them $350M in customer payouts alone. Security issues are some of the most pressing concerns in today’s ever evolving software world. While security can be implemented in many…",https://medium.com/dev-genius/a-simple-introduction-to-zero-trust-networks-98a3b2a69388?source=topics_v2---------30-84--------------------cedeeca3_9dc7_4c75_8553_8eae5b9b6906-------17,https://miro.medium.com/v2/resize:fill:140:140/1*LB2oMHRwgFpo-OFPKZhZjQ.png,cybersecurity 3779,2813,Bug Zero at a Glance [Week 11–17 March],"What happened with Bug Zero? As we announced in the last newsletter, we have become the title partner of Sparkles’23, the annual award ceremony organized by AIESEC in the University of Kelaniya. The event took place on March 11th, 2023, at the University of Kelaniya premises. It was a wonderful opportunity to recognize and celebrate…",https://medium.com/bug-zero/bug-zero-at-a-glance-week-11-17-march-d02282b95bc1?source=topics_v2---------31-84--------------------cb9b9533_e403_4133_ba37_3e5812c84ad3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*2SbojKgtutPQ1fZk,cybersecurity 3780,107,Understanding Salsa20 Encryption: A Comprehensive Guide | 2023,"Exploring the Key Features, Strengths, and Weaknesses of Salsa20 Encryption | Karthikeyan Nagaraj — Introduction: Salsa20 encryption, also known as the Salsa family of stream ciphers, is a popular symmetric key stream cipher that has been widely used in various applications, including wireless networks, secure sockets layer (SSL), and virtual private networks (VPNs). This article aims to provide a comprehensive guide to Salsa20 encryption, including…",https://medium.com/@cyberw1ng/understanding-salsa20-encryption-a-comprehensive-guide-2023-2d6688889e4?source=topics_v2---------32-84--------------------cb9b9533_e403_4133_ba37_3e5812c84ad3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*WafSaxjbZ_fy3HqHAHu6ow.png,cybersecurity 3781,2893,Top 4 Tactics of Cyber War a Nation Used Against its Rivals,"In our world, contention is common between two or more superpowers. Who will rule the world? And why? Is it because of hegemony? or perhaps economic dominance brings nations to the dragger head? Whatever it is, you cannot stop nations from fighting. Our is a world where advanced technology has…",https://medium.com/@MKashifAfridi/top-4-tactics-of-cyber-war-a-nation-used-against-its-rivals-b823fe0537df?source=topics_v2---------33-84--------------------cb9b9533_e403_4133_ba37_3e5812c84ad3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*iDWlJrqxSl-m39vEeALPDA.jpeg,cybersecurity 3782,2828,"Threat Source newsletter (March 16, 2023) — A deep dive into Talos’ work in Ukraine (IOC’s)",Cisco Talos has posted the another threat post in there blog post. Bringing the another list of IOC’s based on the Ukraine. The blog is totally about how they have worked over last week on this deep dive reports. But as from the security perspective lets focus on the IOC…,https://medium.com/@Cyb3rsecurity/threat-source-newsletter-march-16-2023-a-deep-dive-into-talos-work-in-ukraine-ioc-s-24c6a5179790?source=topics_v2---------34-84--------------------cb9b9533_e403_4133_ba37_3e5812c84ad3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*P_TzpDbiOz9vbg44dB3JSg.png,cybersecurity 3783,2894,"Ensuring Cloud Security: Risks, Mitigation Strategies, and Best Practices for Cloud Computing Services","Cloud computing has transformed the way businesses operate and store their data, making it easier and more convenient to access information from anywhere, at any time. However, with the convenience comes the risk of cyber threats and data breaches. This blog will provide a detailed overview of cloud security, including…",https://medium.com/@ensargnsdogdu/ensuring-cloud-security-risks-mitigation-strategies-and-best-practices-for-cloud-computing-1db2012bedec?source=topics_v2---------35-84--------------------cb9b9533_e403_4133_ba37_3e5812c84ad3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*N5fq0pDNJxcvvfMy15IH7w.jpeg,cybersecurity 3784,2501,ICYMI: A flood of fake people and GPT-4 is (a)live,"A round-up of some articles I’ve been working on this week and a handful of weekend AI experiments. I faff around with it, so you don’t have to. Artificial Intelligence Baidu’s ERNIE doesn’t want confrontation with United States March 17, 2023 More than 30,000 enterprise users applied for access to Baidu’s ERNIE Bot Enterprise Edition within two hours of its…",https://medium.com/george/icymi-a-flood-of-fake-people-and-gpt-4-is-a-live-b9e266928c4e?source=topics_v2---------36-84--------------------cb9b9533_e403_4133_ba37_3e5812c84ad3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5smLcm7w4c2ItcgKi6R-bw.png,cybersecurity 3785,2895,Staying Ahead of Cybercriminals: The Benefits of Bug Bounty Platforms for Businesses,"As cyber threats become more advanced and frequent, businesses are increasingly realizing the importance of protecting their digital assets. While many organizations have dedicated security teams, they may not be able to keep up with the constantly evolving tactics of cybercriminals. This is where bug bounty platforms come in —…",https://medium.com/@capturethebugs/staying-ahead-of-cybercriminals-the-benefits-of-bug-bounty-platforms-for-businesses-f4fa4e03962e?source=topics_v2---------37-84--------------------cb9b9533_e403_4133_ba37_3e5812c84ad3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oM_00tEqHXNgJJNy9eVFYg.jpeg,cybersecurity 3786,2896,Introduction to Linux Forensics,Helloo to everyone :) I’m Dilek and i have been working as cyber security specialist for 5 years. I decided sharing my experience and my notes with you. Couse i like help to people ❤ Let us start with introduction to Linux Forensics. There are some pre-requisites to get started…,https://medium.com/@dilekgokceoglu/introduction-to-linux-forensics-f30ffa02da6a?source=topics_v2---------38-84--------------------cb9b9533_e403_4133_ba37_3e5812c84ad3-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vsXOfhUjgGtiH78q_FDkcw.png,cybersecurity 3787,2897,The Five W’s,"Hi, Welcome to my blog. Umm, new here? Same buddy! There was a time in my childhood when my English Teacher introduced me to the concept of the five W’s and to be absolutely honest, I have never used that concept to explain anybody anything but here I am, using…",https://medium.com/@sushmabattineni14/the-five-ws-c5118d08ac93?source=topics_v2---------39-84--------------------cb9b9533_e403_4133_ba37_3e5812c84ad3-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3788,468,Top five Cyber Threat Intel stories of the week: 03/13 to 03/17/2023,"Top 5 general threat intelligence stories of the week. This is from TLP white/open-source websites, so please feel free to share and enjoy reading about these events. Please reach out if you have any questions! Thank you! General Worldwide activity: 1st: Winter Vivern | Uncovering a Wave of Global Espionage Overview: SentinelLabs has conducted an investigation into Winter Vivern Advanced Persistent Threat (APT)…",https://medium.com/hunter-strategy/top-five-cyber-threat-intel-stories-of-the-week-03-13-to-03-17-2023-f0a4d2fb1de6?source=topics_v2---------40-84--------------------74d652ae_403b_4f35_b946_f42a361a08b9-------17,https://miro.medium.com/v2/resize:fill:140:140/0*di7rwNpoKZh9Saqx,cybersecurity 3789,1783,Azure Key Vault — Creating Secrets via Azure Cloud Shell (Azure Bash CLI) & Retrieve secrets instantly — Part 2,"Refer my earlier medium.com article for creating azure Key Vault via Azure portal here. Pre-requisites: Should have access to azure portal with active account and valid Azure Subscription, basic understanding of AKV, Bash Shell commands and azure services for better understanding this article.",https://medium.com/@bsrinivasancbe/creation-of-azure-key-vault-secrets-via-azure-cloud-shell-azure-cli-access-secrets-instantly-d5215547ffa3?source=topics_v2---------41-84--------------------74d652ae_403b_4f35_b946_f42a361a08b9-------17,https://miro.medium.com/v2/resize:fill:140:140/1*sjQ8_xWMoy8js_7_AtJx3g.jpeg,cybersecurity 3790,2898,Hack The Box Weak RSA Writeup,"Hello world and welcome to haxez, today I will attempt to solve the Weak RSA crypto challenge on Hack The Box. Please note that I got the solution from https://technicalciso.com/. I’m not even going to pretend to know the specifics behind how this all works. I know what encryption is…",https://medium.com/@joemcfarland/hack-the-box-weak-rsa-writeup-78df1fc5902c?source=topics_v2---------42-84--------------------850c34dc_5d22_4af9_9f97_d5e392046b9c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*KE05tAjPGj1-arpM.png,cybersecurity 3791,2863,Beware Phishy Emails: These Are the 50 Most Frequently Spoofed Brands,"Is that email from your bank legit? FedEx? The IRS? Probably not. Don’t fall for messages that provoke panic and never, ever surrender your personal information. By Chandra Steele If you’ve ever been hooked by a phishing scam, it’s probably because the scammer was posing as a trusted brand. Only…",https://medium.com/pcmag-access/beware-phishy-emails-these-are-the-50-most-frequently-spoofed-brands-678cd9f968df?source=topics_v2---------43-84--------------------850c34dc_5d22_4af9_9f97_d5e392046b9c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Kv-NjOrp2tvE85L1.jpg,cybersecurity 3792,2679,Artificial Intelligence: The Security Risks You Need to Know,"Artificial intelligence (AI) is a rapidly growing field with the potential to revolutionize numerous industries. From healthcare to finance to transportation, AI has the ability to automate and optimize processes, reduce costs, and improve decision-making. However, as AI becomes more pervasive, there are growing…",https://medium.com/@alsaai/artificial-intelligence-the-security-risks-you-need-to-know-b323da9d9f0b?source=topics_v2---------44-84--------------------850c34dc_5d22_4af9_9f97_d5e392046b9c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Iv2wr-rcCK8G3LnnY1WHQg@2x.jpeg,cybersecurity 3793,1965,Securing Node JS: Best Practices and Tips,Securing your NodeJS ExpressJS application or API is crucial to protect your users’ data and prevent unauthorized access. Here are some tips and example code snippets to help you secure your NodeJS ExpressJS application or API: Use HTTPS to encrypt data in transit Using HTTPS ensures that data transmitted between…,https://medium.com/@adarsh_d/making-node-js-secure-50820cee0e63?source=topics_v2---------45-84--------------------850c34dc_5d22_4af9_9f97_d5e392046b9c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*UI1H7Z6J6fZesjFVpoExWQ.png,cybersecurity 3794,458,What Does Kali Purple Signify to the Cybersecurity Space?,"A decade ago, a new operating system emerged from the depths of the digital world. Kali Linux, the Debian-based open-source system, made its debut to the cybersecurity realm on March 13th, 2013. Since then, this powerful tool has gained a loyal following among security professionals and hackers alike, providing them…",https://medium.com/@Absolute_Z3r0/what-does-kali-purple-signify-to-the-cybersecurity-space-4f932a3e88cc?source=topics_v2---------46-84--------------------850c34dc_5d22_4af9_9f97_d5e392046b9c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*g8VV362_wYcmXddC,cybersecurity 3795,2899,Protect Your Online Life: The Ultimate Guide to Cybersecurity and Data Privacy,"In today’s digital age, our lives are increasingly lived online. From banking to social media, we rely on the internet for many aspects of our daily routines. However, this dependence on the digital world comes with significant risks. Cyberattacks and data breaches are becoming more common and sophisticated, leaving our…",https://medium.com/@hritabinamukherjee/protect-your-online-life-the-ultimate-guide-to-cybersecurity-and-data-privacy-895b0d17616e?source=topics_v2---------47-84--------------------850c34dc_5d22_4af9_9f97_d5e392046b9c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*O9_8KqF8ejhA42r8L1Zl_A.png,cybersecurity 3796,2900,Cloud Security Fundamentals for Forensics & Incident Response,"Continuing our series on Cloud Forensics & Incident Response, we’ve not posted the second video in our series. It’s titled “Cloud Security Fundamentals for Forensics & Incident Response” and you can watch it in YouTube now: What is IaaS vs…? Hows is IR different? What is Shared Responsibility? …",https://medium.com/@cloudyforensics/cloud-security-fundamentals-for-forensics-incident-response-766fa30e7e8f?source=topics_v2---------48-84--------------------850c34dc_5d22_4af9_9f97_d5e392046b9c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*mDoUVB6C0au4ipuM,cybersecurity 3797,2901,【TEJ Dictionary】 ISO 27001: Companies can’t Without It in 2023,"Nobody can predict whether a cybersecurity crisis will happen, but actually, there is a leading indicator can identify risky companies. Preface 【TEJ Dictionary】How ChatGPT Expose Enterprises’ Achilles’ Heel Not all companies can utilize ChatGPT for AI-driven transformation, and ignoring information security risks may affect…medium.com The previous article mentioned that AI-driven digital transformation presents more serious security challenges for companies, necessitating a information security management system (ISMS) to tackle evolving threats. Therefore, ISO 27001 has…",https://medium.com/tej-can-help/tej-dictionary-iso-27001-a-certification-every-company-must-have-1fc89329bb7d?source=topics_v2---------49-84--------------------850c34dc_5d22_4af9_9f97_d5e392046b9c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*vOTA0o0_YyhK3_9F6LL0PQ.png,cybersecurity 3798,2808,Web Fundamentals | IDOR,"Hi there, I’m glad to see you here. In this article, we’ll examine together the “IDOR” rooms in TryHackMe and PortSwigger. In some sections, I’ll share brief about the subject. Don’t forget! You must always research to learn more. I hope it will be helpful for you. Let’s start! Contents: …",https://medium.com/@enescayvarli/web-fundamentals-idor-93f57465369a?source=topics_v2---------50-84--------------------850c34dc_5d22_4af9_9f97_d5e392046b9c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*uEmQXPql_1BxLDpEd3wDcg.jpeg,cybersecurity 3799,2902,Hacking Active Directory with AS-REP Roasting,"AS-REP Roasting is a type of attack that exploits a weakness in the Kerberos authentication protocol. Specifically, it targets the AS-REP (Authentication Server Response) message that is used during the initial authentication process when a user logs into a Kerberos-protected network. During the AS-REP Roasting attack, an attacker captures a…",https://medium.com/@john.h.brown674/hacking-active-directory-with-as-rep-roasting-15ca0d9fae5c?source=topics_v2---------51-84--------------------850c34dc_5d22_4af9_9f97_d5e392046b9c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0H8fU7OUFtZ-E47H1zQslQ.png,cybersecurity 3800,2903,Pickle Rick CTF,This Rick and Morty themed challenge requires you to exploit a webserver to find 3 ingredients that will help Rick make his potion to transform himself back into a human from a pickle. What is the first ingredient Rick needs? Answer: mr. meeseek hair First thing we can decide to…,https://medium.com/@BlackRock_Ceo/pickle-rick-ctf-c343db146539?source=topics_v2---------52-84--------------------d7c7ac63_38a3_4a7a_9455_0114ba3c4632-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MmgMzViSaa7J1Dxhba9ppA.png,cybersecurity 3801,275,"Numbering systems (base 2, base 10, etc)","CM.2 Counting in different numeric languages and why it matters in cybersecurity — In my last post I introduced this series on the mathematical basis for cybersecurity analysis. Cybersecurity Math CM.1 How you can use math to reconcile cybersecuritymedium.com Often in cybersecurity we’re looking at low level data that is in a different format than we’re used to reading as humans. Why is that? Because it’s faster for computers and networking equipment to process…",https://medium.com/cloud-security/numbering-systems-base-2-base-10-etc-49845c7a3f87?source=topics_v2---------53-84--------------------d7c7ac63_38a3_4a7a_9455_0114ba3c4632-------17,https://miro.medium.com/v2/resize:fill:140:140/0*QPDX1VPismzFxDe8,cybersecurity 3802,2904,Trusted Execution Environments (TEEs): Ensuring Security and Privacy in Blockchain and Smart Contracts,"Trusted Execution Environments, or TEEs, are digital fortresses enabling secure and isolated execution of code and data storage within computing systems. TEEs can prevent unwanted access and data tampering even when the main operating system and other applications on the system are compromised. They utilize cutting-edge hardware, like Intel Software…",https://medium.com/@info_31288/trusted-execution-environments-tees-ensuring-security-and-privacy-in-blockchain-and-smart-6947dde13cf3?source=topics_v2---------54-84--------------------d7c7ac63_38a3_4a7a_9455_0114ba3c4632-------17,https://miro.medium.com/v2/resize:fill:140:140/1*t7hT7WlDSQA54fFdhhXaCw.jpeg,cybersecurity 3803,2905,"Computer networking 101: Terms, tools, and getting started","Whether you want to become a software engineer, a cloud architect, or a network administrator, a solid understanding of computer network architecture is an essential foundation to build on as you learn. Today, we’ll explore the pieces behind networks both domestic and commercial, and put you one step closer to…",https://medium.com/educative/computer-networking-101-terms-tools-and-getting-started-49e2bfbfa5ac?source=topics_v2---------55-84--------------------d7c7ac63_38a3_4a7a_9455_0114ba3c4632-------17,https://miro.medium.com/v2/resize:fill:140:140/1*RBRQ1gk8SNiWfWUaMIDRTQ.jpeg,cybersecurity 3804,2906,COMMON CAUSES OF RECENT ATTACKS IN CYBERSECURITY,"This article is an informative, not very technical, but just as important and eye-opening. It’s purpose is to quickly take you through some of the common causes of recent attacks that have taken place in the cyberspace. 1) Poor patching habits Did you know that routers could be used to spy on you? Beware…",https://medium.com/@duncanochieng682/common-causes-of-recent-attacks-in-cybersecurity-a56bb5ca1e30?source=topics_v2---------56-84--------------------d7c7ac63_38a3_4a7a_9455_0114ba3c4632-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3805,2907,Routing Tables: Something Your IT Person Pretends to Know About,"This is not about the table that your router is sitting on — In computer networking, a routing table is a database that’s used by routers to determine the best path for forwarding network traffic to its destination. Essentially, a routing table contains information about different networks and the routes that can be taken to reach them. …",https://medium.com/@ssbyrne/routing-tables-something-your-it-person-pretends-to-know-about-1bfc50b1c73a?source=topics_v2---------57-84--------------------d7c7ac63_38a3_4a7a_9455_0114ba3c4632-------17,https://miro.medium.com/v2/resize:fill:140:140/0*UAT7l7u-QbB4ypTj,cybersecurity 3806,422,"Out of Sight, Out of Code: Why You Need to Keep Your Secrets Safe","Imagine you’re a spy in a thrilling, action-packed movie. Your mission? To protect the world’s most precious secrets from falling into the wrong hands. That’s what it’s like being a developer dealing with sensitive information in your codebase. Your code holds the keys to a digital kingdom, and just like…",https://medium.com/mitigated-io/out-of-sight-out-of-code-why-you-need-to-keep-your-secrets-safe-e95bd7ccadfe?source=topics_v2---------59-84--------------------39ba4249_2fcd_46fb_bde5_ade6fc66da0a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*9jJ2bLWKT0gcmfJ8,cybersecurity 3807,2908,Trust Me Extension will get you HOF and Bounty — Haris Muthusamy,"Hello Hackers, It’s me again with an interesting and easy Hack with the extension Before getting into the story lets me have a small brief about myself I’m Haris Muthusamy Ethical Hacker, Web-app Pen-tester, and cyber security researcher here I’m posting only simple and easy technics only. For more please…",https://medium.com/@fcwdbrqmr/trust-me-extension-will-get-you-hof-and-bounty-haris-muthusamy-7059898abc25?source=topics_v2---------60-84--------------------39ba4249_2fcd_46fb_bde5_ade6fc66da0a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*h0hWlkD1yn6UuYz6hbRRmg.png,cybersecurity 3808,2909,LFI - An Interesting Tweak,"Summary Local File Inclusion (LFI) is a type of web application vulnerability that allows an attacker to include and execute arbitrary files on the web server. An attacker can take advantage of this vulnerability by passing a malicious file path as a parameter, which could be a local file on…",https://medium.com/@shahjerry33/lfi-an-interesting-tweak-9c5638dbdd1b?source=topics_v2---------62-84--------------------39ba4249_2fcd_46fb_bde5_ade6fc66da0a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ZO62lnkdsVNKfirrXnU4uQ.png,cybersecurity 3809,373,How To Set Up Malware Analysis Environment?,"Before we start analyzing malware infections, we should set up an analysis environment. Collected IoCs and malware samples can and will harm your computer, as well as put your data at risk. This analysis environment will host all your analysis tools that will be used to perform static and dynamic…",https://medium.com/thesecmaster/how-to-set-up-malware-analysis-environment-61b615f91a03?source=topics_v2---------63-84--------------------39ba4249_2fcd_46fb_bde5_ade6fc66da0a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*8doxHSNiuVQSOH2qkhkSYQ.png,cybersecurity 3810,2910,Anthem | TryHackMe Walkthrough,"Task 1 Nmap Scan nmap -sC -sV -Av -oN nmap/anthem 10.10.139.243 -sC — run all the default scripts -sV — find the version of all the services running on the target -A — run the scan in aggressive mode -v — show output in verbose mode -On — output to a file in Nmap…",https://medium.com/@nihirzala/anthem-tryhackme-walkthrough-aec30dc44e78?source=topics_v2---------64-84--------------------39ba4249_2fcd_46fb_bde5_ade6fc66da0a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QdD9dKPxtDjeopf8SqK3bA.png,cybersecurity 3811,266,GitHub Says: Fuzz Your Code!,"Like Julius Caesar on the Ides of March, don’t let your guard down and leave your code unsecured, GitHub says. Fuzz your code! — Fuzzing, or fuzz testing, feeds your code invalid, unexpected, and random inputs. Fuzzing will find crashes, bugs, vulnerabilities and sometimes CVE’s at a scale that no other scanner can. Popular fuzzers are cifuzz, AFL/AFL++, wfuzz, OSS-fuzz, and honggfuzz — all open source options you can build into your code right…",https://medium.com/system-weakness/github-says-fuzz-your-code-3cbabb3b279f?source=topics_v2---------65-84--------------------39ba4249_2fcd_46fb_bde5_ade6fc66da0a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9CcgOomenenMwdMu6fx4Cg.jpeg,cybersecurity 3812,2911,Opportunities in the Endpoint Security Market,"The global endpoint security market is projected to reach 11.2 billion U.S. dollars in 2021. The market is projected to continue growing, amounting to more than 19 billion U.S. dollars in 2025, according to Statista. …",https://medium.com/@ravityuval/opportunities-in-the-endpoint-security-market-29890e76217b?source=topics_v2---------66-84--------------------39ba4249_2fcd_46fb_bde5_ade6fc66da0a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QLSIxBviYE6aRbbmqOEZJA.png,cybersecurity 3813,967,What is a Day Zero attack?,"Day Zero attacks are cyber attacks that exploit a vulnerability or flaw in a system or software before it is discovered or patched by the manufacturer. This means that the attackers have the advantage of being able to strike first, with no prior warning, and often before any countermeasures can…",https://medium.com/system-weakness/what-is-a-day-zero-attack-b171a50e4505?source=topics_v2---------67-84--------------------39ba4249_2fcd_46fb_bde5_ade6fc66da0a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*XvDlQDmLHQuTjpiMeaip2A.jpeg,cybersecurity 3814,2912,TryHackMe AV Evasion: Shellcode Walthrough,TL;DR Walkthrough of the THM room on AV Evasion room located here. THM Walkthroughs: Attacktive Directory Credential Harvesting AV Evasion Background We’ll lead with the tools we used to complete this room and links to where to get them: Visual Studio Community Edition ConfuserEx msfvenom (included in Kali) netcat (included…,https://medium.com/@happycamper84/tryhackme-av-evasion-shellcode-walthrough-44c7206f17f0?source=topics_v2---------68-84--------------------d0423c16_7ac6_4608_9094_9bfd4fd069a0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1xQIcXZHHUFPXCi2sCkjfA.png,cybersecurity 3815,1783,Azure Key Vault — Create Secrets via Azure portal & Authentication Flowchart— Part 1,Refer my earlier LinkedIn post for fundamental details about Azure Key Vault here.,https://medium.com/cloudnloud/creation-of-azure-key-vault-secrets-via-azure-portal-authenticate-flow-part-1-5eb928716663?source=topics_v2---------69-84--------------------d0423c16_7ac6_4608_9094_9bfd4fd069a0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*sjQ8_xWMoy8js_7_AtJx3g.jpeg,cybersecurity 3816,2913,Defensive security (My TryHackMe Labs Journey),Nerdy guy smashing a series of random keys on the keyboard shouting “I’m in!” That is what so many people imagine when they think of cybersecurity. The nerdy guy is a Hacker on the Red Team side (Offensive Security). …,https://medium.com/@eugassmo14/defensive-security-my-tryhackme-labs-journey-8e41c7f39355?source=topics_v2---------71-84--------------------d0423c16_7ac6_4608_9094_9bfd4fd069a0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Vm-ribKtCRIpZ-NeVmD4Bw.jpeg,cybersecurity 3817,2862,How AI is Revolutionizing Cybersecurity and Keeping You Safe Online,"How AI is Changing the Cybersecurity Landscape Let me tell you something: the internet can be a scary place. With all the hackers and cybercriminals trying to get their grubby little hands on your personal information, it’s a wonder anyone is able to sleep at night. …",https://medium.com/@ohermans1/how-ai-is-revolutionizing-cybersecurity-and-keeping-you-safe-online-7b6e0eb90df0?source=topics_v2---------72-84--------------------d0423c16_7ac6_4608_9094_9bfd4fd069a0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Bbbu3bVSiNXZgN0y,cybersecurity 3818,324,Digital Forensics — A Drop In the Ocean Of Cyber,"As I became more embedded within the Met Digital Forensic department and comfortable in my role, I started to learn about where digital forensics has played a big part in cyber investigations. …",https://medium.com/@Hex_0ffender/digital-forensics-a-drop-in-the-ocean-of-cyber-382c24108845?source=topics_v2---------73-84--------------------d0423c16_7ac6_4608_9094_9bfd4fd069a0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Lh0uCZ5gcmIOTQWF,cybersecurity 3819,2914,The Complete Guide to Cybersecurity for Accountants & Bookkeepers [Updated 2023],"We’re back to help you! 📢 Here are the most-clicked articles from the Accounting Apps newsletter📧 during w/c 12.3.23: The Complete Guide to Cybersecurity for Accountants & Bookkeepers [Updated 2023] | (Practice Protect) Cybersecurity is a word everyone is familiar with these days. The word is synonymous with securing data and devices from malicious actors, but there is a lot more to understand about…",https://medium.com/@heathersmithau/the-complete-guide-to-cybersecurity-for-accountants-bookkeepers-updated-2023-c7d4075f7dd0?source=topics_v2---------76-84--------------------d0423c16_7ac6_4608_9094_9bfd4fd069a0-------17,https://miro.medium.com/v2/resize:fill:140:140/1*o69g_TNDGu_iU33h6mJ6QQ.jpeg,cybersecurity 3820,2898,Hack The Box Squashed Writeup,Hello world and welcome to haxez and my write-up for the Squashed machine. I’ve been getting back into doing Hack The Box machines again. I’ve started studying for the CPTS and the CBBH and thought I would do some boxes to complement the academy courses. Information Gathering Once I started the box…,https://medium.com/@joemcfarland/hack-the-box-squashed-writeup-44291fc2559a?source=topics_v2---------77-84--------------------d0423c16_7ac6_4608_9094_9bfd4fd069a0-------17,https://miro.medium.com/v2/resize:fill:140:140/0*RFwSwU1UzAkmXLuP.png,cybersecurity 3821,107,A Comprehensive Guide to GOST R 34.11–94 Encryption | 2023,"Understanding the Key Features, Strengths, and Weaknesses of GOST R 34.11–94 Encryption | Karthikeyan Nagaraj — Introduction: GOST R 34.11–94 is a widely used hash function and encryption algorithm that was developed by the Russian government in the early 1990s. It is a symmetric key algorithm, meaning the same key is used for both encryption and decryption. This article aims to provide a comprehensive guide to GOST…",https://medium.com/@cyberw1ng/a-comprehensive-guide-to-gost-r-34-11-94-encryption-2023-afe908f0df18?source=topics_v2---------78-84--------------------6f20d541_8a2e_4a66_80f9_48e424a218f6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Qfj2SaDEJyUZmIJqI0mXXg.png,cybersecurity 3822,2788,"18 Zero-Day Flaws Discovered in Samsung Android Handsets, Wearables, and Telematics","Security researchers have discovered 18 zero-day vulnerabilities in Samsung Android handsets, wearables, and telematics. These flaws could potentially allow attackers to take control of the devices, steal sensitive information, or cause them to malfunction. The vulnerabilities were discovered by a team of researchers who have reported them to Samsung, which…",https://medium.com/@wrellis82/18-zero-day-flaws-discovered-in-samsung-android-handsets-wearables-and-telematics-c15e54a319d1?source=topics_v2---------79-84--------------------6f20d541_8a2e_4a66_80f9_48e424a218f6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*liMZh0n7_rMpMs1b.jpeg,cybersecurity 3823,2915,How to be a Successful Security Architect?,"Find out the key ingredients to be a successful security architect. The job of a security architect is like an acrobat walking on a rope while balancing two buckets — the security requirements bucket and the business requirements bucket. A security architect must understand and enable business goals, while ensuring…",https://medium.com/rxcybersecurity/how-to-be-a-successful-security-architect-c424f04058e1?source=topics_v2---------80-84--------------------6f20d541_8a2e_4a66_80f9_48e424a218f6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*0Ktsgy7bN947Te10isagkA.jpeg,cybersecurity 3824,437,"The Corix Partners Friday Reading List — Feb 17, 2023","Top 10 Leadership and Management links of the week, curated by Corix Partners Founder and CEO JC Gaillard, focusing on cyber security of course, but also a large cross section of subjects including digital transformation, emerging tech, ESG governance and the future of work The Key Ingredients Of A Successful GRC Program Council Post: The Key Ingredients Of A Successful GRC Program Founder & CEO, Corix Partners | Top CyberSecurity Thought-Leader on Thinkers360 | Author | Blogger | Board Advisor. The…www.forbes.com",https://medium.com/the-corix-partners-friday-reading-list/the-corix-partners-friday-reading-list-feb-17-2023-d29fec87bf49?source=topics_v2---------81-84--------------------6f20d541_8a2e_4a66_80f9_48e424a218f6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*JP95eWdDGjEjTlZBVH_PCg.jpeg,cybersecurity 3825,2863,Don’t Let Google Manage Your Passwords,"Experts tell us that relying on Google Chrome (or any browser) to manage your passwords is a seriously bad idea. Here’s why. By Neil J. Rubenking Password management programs have been around since the ’90s, and the major browsers added password management as a built-in feature in the early 2000s…",https://medium.com/pcmag-access/warning-dont-let-google-manage-your-passwords-6b20639daaff?source=topics_v2---------82-84--------------------6f20d541_8a2e_4a66_80f9_48e424a218f6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*40ngzInAovgwkmk9.png,cybersecurity 3826,266,ChatGPT Powered Malware Bypasses EDR,"In research by Jeff Sims at HYAS, he creates “Blackmamba,” an “AI synthesize polymorphic keylogger” that uses python to modify its program randomly. — The basic components of this polymorphic keylogger require a LLM, large language model like ChatGPT. The malicious prompt for the OpenAI API client, an otherwise harmless API, would bypass EDR (endpoint detection and response) filters. The malicious prompt that Jeff used asked text-davinci-003 to create a keylogger in python 3…",https://medium.com/system-weakness/chatgpt-powered-malware-bypasses-edr-c9a66af5cec1?source=topics_v2---------83-84--------------------6f20d541_8a2e_4a66_80f9_48e424a218f6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*OoH9kdeLLLuLjT-mBfafGg.png,cybersecurity 3827,262,Red Team Fundamentals | Tryhackme Writeup/Walkthrough | By Md Amiruddin,"Learn about the basics of a red engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements. Task 1 : Introduction Cybersecurity is a constant race between white hat hackers and black hat hackers. As threats in the cyber-world evolve, so does the need for more specialized…",https://medium.com/bugbountywriteup/red-team-fundamentals-tryhackme-writeup-walkthrough-by-md-amiruddin-efc57ac06f34?source=topics_v2---------84-84--------------------6f20d541_8a2e_4a66_80f9_48e424a218f6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*RBwq0fJZn1mca52k.png,cybersecurity 3828,2916,Note of training — Digital threats,"also available at [EN] https://www.bluebirz.net/en/note-of-training-digital-threats/ [TH] https://www.bluebirz.net/th/note-of-training-digital-threats-th/ I have attended a training about Digital threats not long time ago. It is about threats, attacks, and dark sides from internet plus how to protect ourselves from them. This sounds interesting and I would love to share you here. Know our assets First of all…",https://medium.com/@bluebirz/note-of-training-digital-threats-2c9e6c85910?source=topics_v2---------85-84--------------------6f20d541_8a2e_4a66_80f9_48e424a218f6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*TnFRvAzKx8tQGW2Y,cybersecurity 3829,2917,SaaS-ational Command and Control — Using Social Media and SaaS Platforms for Malicious Gain,"SaaS (Software as a Service) and cloud services have become increasingly popular in recent years for their convenience and ease of use. They offer access to a wide range of applications and services, from productivity tools to data storage and collaboration platforms. …",https://medium.com/responsible-cyber/using-social-media-and-saas-platforms-for-malicious-gain-saas-ational-command-and-control-f9213f69f5a4?source=topics_v2---------86-84--------------------6f20d541_8a2e_4a66_80f9_48e424a218f6-------17,https://miro.medium.com/v2/resize:fill:140:140/0*nBcV5SdoDx-oa0Ly,cybersecurity 3830,271,Kali Linux 2023.1 New Release!,"Introduction As part of today’s Kali Linux release, the Kali Linux Team also announced a new project named 'Kali Purple,' a distro designed for defensive security. ""Over the years, we have perfected what we have specialized in, offensive security. We are now starting to branch into a new area, defensive security!,""…",https://medium.com/@s12deff/kali-linux-2023-1-new-release-80d4310fd28a?source=topics_v2---------87-84--------------------6f20d541_8a2e_4a66_80f9_48e424a218f6-------17,https://miro.medium.com/v2/resize:fill:140:140/1*iasrdMNuOH_vfN0c7WGKZQ.png,cybersecurity 3831,383,Startup Survival Guide: The Importance of a Comprehensive Cybersecurity Strategy,"As a startup, you’re focused on growth, innovation, and success. However, in today’s digital world, it’s crucial to also focus on cybersecurity. Cyber attacks are on the rise, and startups are just as vulnerable as larger organizations. If you’re not taking cybersecurity seriously, you’re putting your business at risk. In…",https://medium.com/@infosec-mike/startup-survival-guide-the-importance-of-a-comprehensive-cybersecurity-strategy-962beac5fb89?source=topics_v2---------88-84--------------------dc47b5b2_9198_450d_ba85_189d9c347855-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ES76nQNJpBCYmzOxiCpgrw.jpeg,cybersecurity 3832,2918,What are the most notable findings and recommendations from Jordan’s national cybersecurity strategy?,"I was fortunate enough to take part in Oxford University’s Cybersecurity for Public Leadership Course from September to December of last year, and one of my main contributions was a research paper on national cybersecurity strategy using Jordan as an example; in this post, I’d like to share some of…",https://medium.com/@samimaddan/what-are-the-most-notable-findings-and-recommendations-from-jordans-national-cybersecurity-4a350249477e?source=topics_v2---------89-84--------------------dc47b5b2_9198_450d_ba85_189d9c347855-------17,https://miro.medium.com/v2/resize:fill:140:140/1*4n6RFKe8QDYsbDgb9ni48A.png,cybersecurity 3833,2820,"US and European Law Enforcement Authorities Shut Down ChipMixer, Cryptocurrency Mixer Used by Cybercrooks","Read also: two cybercriminals charged with a 2022 US law enforcement database hack, scammers are stealing money and data on the collapse of Silicon Valley Bank, and more. US, Germany shutter ChipMixer platform suspected of laundering ransomware payments US, German authorities in cooperation with law enforcement agencies in Belgium, Poland and Switzerland shut down ChipMixer, a well-known cryptocurrency mixer used…",https://medium.com/@immuniweb/us-and-european-law-enforcement-authorities-shut-down-chipmixer-cryptocurrency-mixer-used-by-c244478a1fce?source=topics_v2---------90-84--------------------dc47b5b2_9198_450d_ba85_189d9c347855-------17,https://miro.medium.com/v2/resize:fill:140:140/1*_WVNUgznUNQWpTiVEA6ZrQ.png,cybersecurity 3834,275,Cybersecurity Math,"CM.1 How you can use math to reconcile cybersecurity — People always think I’m good at math because I work in a field that involves computers, programming, and over the course of my career, a lot of banking, e-commerce, and tax applications. Actually, I’m good at logic. There’s a difference. I’m also going to show you that, even if you…",https://medium.com/cloud-security/cybersecurity-math-34485d45c7d0?source=topics_v2---------91-84--------------------dc47b5b2_9198_450d_ba85_189d9c347855-------17,https://miro.medium.com/v2/resize:fill:140:140/1*QUqD9Ydk-gzWkheORmuKsg.png,cybersecurity 3835,967,The pass-the-hash attack explained,"A “hash” is a mathematical representation of data, often used as a security measure to ensure that sensitive information, such as passwords, is not stored in plain text. …",https://medium.com/@luishrsoares/the-pass-the-hash-attack-explained-72fa824a9d15?source=topics_v2---------92-84--------------------dc47b5b2_9198_450d_ba85_189d9c347855-------17,https://miro.medium.com/v2/resize:fill:140:140/1*uPALFeYCRc5N5Nng8s94_A.jpeg,cybersecurity 3836,2919,GM,"As many know, I’ve started the most interesting part of my journey. While I have been very lax on my certifications, I’ve done a few projects that I’d like to drop hints on before their debut. I got hired on as a Red Team Lead, more accurately an Offensive Security…",https://medium.com/@prince0f4llsaiyanz/gm-c9452164fcb?source=topics_v2---------93-84--------------------dc47b5b2_9198_450d_ba85_189d9c347855-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3837,2920,Never Leave Your Crypto on an Exchange,"The results could be disastrous. Crypto is more mainstream than ever, with Coinbase becoming a publicly traded company in 2021 and firms like Microstrategy and Tesla holding Bitcoin on their treasury balance sheets. …",https://medium.com/@nathan-simone/never-leave-your-crypto-on-an-exchange-3d298434a41b?source=topics_v2---------94-84--------------------dc47b5b2_9198_450d_ba85_189d9c347855-------17,https://miro.medium.com/v2/resize:fill:140:140/1*5K32yAEOl2dYG97UNG0gew.jpeg,cybersecurity 3838,595,"Think, Learn and Do !","Decentralizing Cybersecurity for a Safer Tomorrow. — Cybersecurity is the practice of protecting systems and networks from digital attacks which aim to access, change or destroy digital information either to extort money or sensitive data. The CIA triad model acts as a reference to assess the security model of an organization. The triad consists of: Confidentiality Integrity Availability 1.Confidentiality: It means to ensure that only interested and authorized parties access the appropriate data. …",https://medium.com/@mybrandt/think-learn-and-do-9ddade71a98b?source=topics_v2---------95-84--------------------dc47b5b2_9198_450d_ba85_189d9c347855-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ZyCkS42K7STEIzJH,cybersecurity 3839,2921,Bird.Money Democratizes Access to Cutting-edge Risk Prediction Technology for the Everyday Crypto User,Say Goodbye to Risky Crypto Transactions — The adoption of cryptocurrency as the superior means of transferring value between people and businesses has not been a road paved with gold and roses. …,https://medium.com/bird-money/bird-money-democratizes-access-to-cutting-edge-risk-prediction-technology-for-the-everyday-crypto-9ba135e3bb94?source=topics_v2---------96-84--------------------dc47b5b2_9198_450d_ba85_189d9c347855-------17,https://miro.medium.com/v2/resize:fill:140:140/0*e4ijejmpldtWQv6r,cybersecurity 3840,1163,My Friends Have Arrived,"Hordes of them. But who are they? — In the past week, I’ve gained 2,000+ friends on Facebook. To put that into perspective, two weeks ago I had, I think, thirty-five friends on Facebook. Now, I have 962 friend requests waiting for me, and I see that I have 1,427 people following me. I don’t use Facebook very…",https://medium.com/@williamessex/my-friends-have-arrived-9b13bd112798?source=topics_v2---------97-84--------------------dc47b5b2_9198_450d_ba85_189d9c347855-------17,https://miro.medium.com/v2/resize:fill:140:140/0*zQbQspgvmcp1jnI5,cybersecurity 3841,2922,Python: Building a Port Scanner,"In this lesson, I will guide you through the process of building a straightforward port scanner using Python. To start, we must create a new file. mousepad scanner.py& To begin, we need to include a shebang at the beginning of our file. #!/bin/python3 Additionally, we need to import a few…",https://medium.com/@grimshady1990/python-building-a-port-scanner-295050a24f83?source=topics_v2---------98-84--------------------4e32649b_7354_4bbc_9dfe_da3be4ab2a37-------17,https://miro.medium.com/v2/resize:fill:140:140/1*rlWe8KrS2_bGCA7p_NMpIg.png,cybersecurity 3842,2923,Device Recognition vs. User Authentication: What’s the Difference?,"Device recognition and user authentication are two popular methods for improving cybersecurity. Device recognition involves identifying and verifying the devices that are connecting to a network, and user authentication involves verifying the identity of users attempting to access the network. While device recognition and user authentication perform similar jobs, there…",https://medium.com/@embedtech/device-recognition-vs-user-authentication-whats-the-difference-6ee5371bed47?source=topics_v2---------99-84--------------------4e32649b_7354_4bbc_9dfe_da3be4ab2a37-------17,https://miro.medium.com/v2/resize:fill:140:140/1*x4azWbhhGjM3sOhiH4Dvow.png,cybersecurity 3843,2924,Identifying and Protecting Yourself from Common Crypto Scams,It seems as though more and more scam sites and accounts are popping up mimicking legitimate crypto projects. …,https://medium.com/@latticeexchange/identifying-and-protecting-yourself-from-common-crypto-scams-3685d760fda5?source=topics_v2---------100-84--------------------4e32649b_7354_4bbc_9dfe_da3be4ab2a37-------17,https://miro.medium.com/v2/resize:fill:140:140/1*r4ltBsW2sI7jUdkXfTCeqg.png,cybersecurity 3844,2898,Hack The Box Shoppy Writeup,"Hello world and welcome to Haxez, today I’m going to be working through the retired Hack The Box Machine Shoppy. I’m currently going through all the retired machines to try and upskill myself while studying the CPTS academy material. It’s also great to see the effort that has gone into…",https://medium.com/@joemcfarland/hack-the-box-shoppy-writeup-5b1f8d8a0ab5?source=topics_v2---------101-84--------------------4e32649b_7354_4bbc_9dfe_da3be4ab2a37-------17,https://miro.medium.com/v2/resize:fill:140:140/0*duzrdaSQsq9rhcG6.png,cybersecurity 3845,2811,Overcoming Dragonblood: Hashing Data To An Elliptic Curve Point (or Scalar) In A Constant Time,"Let’s say we have almost 2²⁵⁶ integer point values. This will give us 115,792,089,237,316,195,423,570,985,008,687,907,853,269,984,665,640,564,039,457,584,007,913,129,639,936 different (x,y) points. Can we find a way to hash some data onto one of these points, and so it is not possible to know the data that resulted in that point, and that it is…",https://medium.com/asecuritysite-when-bob-met-alice/hashing-data-to-an-elliptic-curve-point-or-scalar-a7a3c6cecbb8?source=topics_v2---------102-84--------------------4e32649b_7354_4bbc_9dfe_da3be4ab2a37-------17,https://miro.medium.com/v2/resize:fill:140:140/1*NcSi_Swu-ectGlE8LUD1tA.jpeg,cybersecurity 3846,2925,What is a reverse shell?,"Table of contents What is a shell What is a reverse shell Why do attackers/hackers need a reverse shell Difference between attacking over WAN and LAN preventing reverse shell What is a shell? First, we have to know what is a shell before moving on to the reverse shell. Is that a shell like the one on…",https://medium.com/@aytzzz/what-is-a-reverse-shell-9d53f1b4b450?source=topics_v2---------104-84--------------------c865d170_db0e_4de9_80cf_895636b74d21-------17,https://miro.medium.com/v2/resize:fill:140:140/0*GXH9vPPm6G2JZAJU.png,cybersecurity 3847,397,Lab Walkthrough — Drupalgeddon 2 [CVE-2018–7600],"In our lab walkthrough series, we go through selected lab exercises on our INE Platform. or sign up for a 7-day, risk-free trial with INE and access this lab and a robust library covering the latest in Cyber Security, Networking, Cloud, and Data Science! Purpose: We are learning how to…",https://medium.com/pentester-academy-blog/lab-walkthrough-drupalgeddon-2-cve-2018-7600-93866c7ad03?source=topics_v2---------105-84--------------------c865d170_db0e_4de9_80cf_895636b74d21-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ZOmq7pOmuhO8NvWETnQ-Gg.png,cybersecurity 3848,2926,SOAR For Dummies,"While learning Cyber Security, one of the most challenging things for me was understanding and memorizing the seemingly endless list of similar terms and abbreviations. I even created a mini-word document for myself to keep track of them all. To this day, I sometimes still confuse and forget the meanings…",https://medium.com/@dberg042/soar-for-dummies-bb66a07704d2?source=topics_v2---------106-84--------------------c865d170_db0e_4de9_80cf_895636b74d21-------17,https://miro.medium.com/v2/resize:fill:140:140/1*jDISES-z_SUmfugxRFhV1Q.png,cybersecurity 3849,521,Don’t Be Fooled: A Comprehensive Guide to Fraud Prevention,"March is Canada’s Fraud Prevention Month, an annual awareness campaign that aims to spread information about fraud techniques, such as scams and data theft, and to teach people to “recognize, reject, and report fraud. If you take a closer look at today’s fraud, you’ll find that malicious bots play a…",https://medium.com/@geetest_1024/dont-be-fooled-a-comprehensive-guide-to-fraud-prevention-53d628bba289?source=topics_v2---------107-84--------------------c865d170_db0e_4de9_80cf_895636b74d21-------17,https://miro.medium.com/v2/resize:fill:140:140/1*AI7g-EEF7TL6iHzGGNO0wA.png,cybersecurity 3850,363,Here is a 90 day career plan to enter the cybersecurity industry,"Follow these simple steps to start your cybersecurity career — Tech layoffs are starting again with the first quarter of 2023 ending on a bit of a downer Yet at the same time, cybersecurity remains a safe bet for people willing to put in the hard work and enter this industry Just look at the job boards and you will…",https://medium.com/@taimurcloud123/here-is-a-90-day-career-plan-to-enter-the-cybersecurity-industry-b443ccc8a5dc?source=topics_v2---------108-84--------------------c865d170_db0e_4de9_80cf_895636b74d21-------17,https://miro.medium.com/v2/resize:fill:140:140/0*yRlCtKrRvROyUw9U,cybersecurity 3851,2927,Mitigating Insider Threats Through the Use of PreventiveChain,"What are Insider Threats? — Insider security dangers involving cryptocurrencies are referred to as “crypto” insider threats. Employees, freelancers, or other insiders who have access to private data or priceless digital assets run the risk of maliciously using that access, whether knowingly or unknowingly. Because the theft or misuse of digital assets is frequently irreversible…",https://medium.com/@infomaza01/mitigating-insider-threats-through-the-use-of-preventivechain-b7d2b51181e9?source=topics_v2---------109-84--------------------c865d170_db0e_4de9_80cf_895636b74d21-------17,https://miro.medium.com/v2/resize:fill:140:140/1*zLtUVQjsGjPPLmWfUUw5JA.png,cybersecurity 3852,2788,"Critical Outlook Bug Allows Easy Exploitation, Researchers Reveal","Security researchers have discovered a critical vulnerability in Microsoft Outlook for Windows, which allows hackers to remotely steal hashed passwords through a malicious email. The vulnerability (CVE-2023–23397) has a 9.8 severity rating and affects all versions of Microsoft Outlook on Windows. It is a privilege escalation vulnerability that has been…",https://medium.com/@wrellis82/critical-outlook-bug-allows-easy-exploitation-researchers-reveal-de53801d4093?source=topics_v2---------111-84--------------------c865d170_db0e_4de9_80cf_895636b74d21-------17,https://miro.medium.com/v2/resize:fill:140:140/0*P-CKMz3wBx7ykIXF.jpg,cybersecurity 3853,394,A Retrospective Vulnerability Case Study: The QA Tester’s POV,"In our March 2nd blog, we discuss what can be learned from a red teamer when finding a vulnerability in an operational system. Red teamers are expected to find imperfections in systems and configurations, as their role is inherently vulnerability-discovery based. But this is not always true for quality assurance…",https://medium.com/neuvik/a-retrospective-vulnerability-case-study-the-qa-testers-pov-5a3ec6b2e439?source=topics_v2---------112-84--------------------c865d170_db0e_4de9_80cf_895636b74d21-------17,https://miro.medium.com/v2/resize:fill:140:140/1*FHKkyrD4av-ClYl9vxZSbA.png,cybersecurity 3854,2928,"At the GISEC 2023 exhibition, the Cyber Security Council leads the way in protecting all sectors of the country","With its participation in the GISEC 2023 exhibition, the Cyber Security Council is making waves in the tech industry. The Council is displaying a platform that displays the national cloud, with the goal of protecting the country’s various sectors from external cyber attacks. This is a significant step toward ensuring…",https://medium.com/@joiecooper2/at-the-gisec-2023-exhibition-the-cyber-security-council-leads-the-way-in-protecting-all-sectors-of-9c5671b131d9?source=topics_v2---------113-84--------------------93cf11f4_e7ce_4c8d_868f_e0a2a94efd95-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TUN0gAVkgovgI958d55n9Q.png,cybersecurity 3855,2929,"What’s the Difference between AppSec, Software Security, Cybersecurity, and DevSecOps?","If you’ve been involved in computing or IT for longer than this week, you’ll have come across the terms AppSec, Software Security, DevSecOps, and cybersecurity. Unfortunately, you might often hear or read several being used interchangeably. As always, clarity is key and, in this post, we’ll explain each term, how…",https://medium.com/@guardrails.io/whats-the-difference-between-appsec-software-security-cybersecurity-and-devsecops-b072422adf81?source=topics_v2---------114-84--------------------93cf11f4_e7ce_4c8d_868f_e0a2a94efd95-------17,https://miro.medium.com/v2/resize:fill:140:140/0*zfHav6h2_m2Z7dor.png,cybersecurity 3856,340,Rustscan is way faster than Nmap | Here’s how to install and use,"You are also tired with nmap taking long time ? Well, let me introduce you to RustScan. *stares in steve jobs* RustScan is a port scanner tool that’s really fast and efficient. There are some other port scanners faster than nmap but in my personal experience most of them miss…",https://medium.com/system-weakness/rustscan-is-way-faster-than-nmap-heres-how-to-install-and-use-i-f74c895defef?source=topics_v2---------116-84--------------------93cf11f4_e7ce_4c8d_868f_e0a2a94efd95-------17,https://miro.medium.com/v2/resize:fill:140:140/1*HPfOXcChUY1dCHTYN4OZaw.png,cybersecurity 3857,2907,Routers: How the F*** Do They Work?,Ever wonder how that box sitting in the corner of your room with the blinky lights work… well here’s a quickie article — Intro Routers are essential devices in computer networks that allow separate logical networks to communicate with each other. They operate at the Network Layer (Layer 3) and work with packets as the Protocol Data Unit (PDU). Routers are widely used in the internet to interconnect thousands of networks around the world…,https://medium.com/@ssbyrne/routers-how-the-f-do-they-work-f113fc7d0194?source=topics_v2---------117-84--------------------93cf11f4_e7ce_4c8d_868f_e0a2a94efd95-------17,https://miro.medium.com/v2/resize:fill:140:140/0*J8l7AwIjp07K1iWg,cybersecurity 3858,373,How to Prepare for the eCTHPv2 Certification?,"How to Prepare for the eCTHPv2 Certification? Hello everyone, I recently completed my eLearnSecurity Certified Threat Hunting Professional Certification (eCTHPv2). While I was preparing for the exam, I realized not many resources were available on the Internet regarding the content or the exam. Hence, in this post, I will do an eCTHPv2 certification review and discuss how…",https://medium.com/thesecmaster/how-to-prepare-for-the-ecthpv2-certification-35c280503474?source=topics_v2---------118-84--------------------93cf11f4_e7ce_4c8d_868f_e0a2a94efd95-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Wz_RFHZ3mbDHIDOGltSejQ.png,cybersecurity 3859,107,"Exploring Khazad Encryption: An In-Depth Look at Features, Strengths, and Weaknesses | 2023","A Comprehensive Guide to Khazad Encryption Algorithm | Karthikeyan Nagaraj — Khazad encryption is a symmetric key block cipher that was designed to provide high levels of security while also being efficient and fast. This article aims to provide a comprehensive guide to Khazad encryption, including its key features, strengths, and weaknesses. Key Features of Khazad Encryption: Khazad encryption is a symmetric key block cipher, meaning…",https://medium.com/@cyberw1ng/exploring-khazad-encryption-an-in-depth-look-at-features-strengths-and-weaknesses-2023-ebf4440f2ad?source=topics_v2---------119-84--------------------93cf11f4_e7ce_4c8d_868f_e0a2a94efd95-------17,https://miro.medium.com/v2/resize:fill:140:140/1*RS3WylZRJRKOWPcFIAzCvg.png,cybersecurity 3860,2930,HACKING VULNET:INTERNAL [TryHackMe] : CTF CHALLENGE,"Welcome Security Researchers! we have a simple task today. VulnNet Entertainment is a company that learns from its mistakes. They quickly realized that they can’t make a properly secured web application so they gave up on that idea. Instead, they decided to set up internal services for business purposes. As…",https://medium.com/@optimus-pryme/hacking-vulnet-internal-tryhackme-ctf-challenge-cfb9fcfcb10a?source=topics_v2---------120-84--------------------93cf11f4_e7ce_4c8d_868f_e0a2a94efd95-------17,https://miro.medium.com/v2/resize:fill:140:140/1*x-3LBuqxSlAMcFp-C9J7sg.png,cybersecurity 3861,2931,Ascend Careers Spotlight: Ep.1 — IT Security at Ascend Money — Discover the Secrets of Protecting Digital Assets,"Join us as we shine a spotlight on the amazing careers at Ascend Group through our mini-article series, “Ascend Careers Spotlight.” Get an inside look at the diverse roles within the company and learn about the real-life experiences of our Ascenders. In our first episode, meet Khun Pop Pongsak and…",https://medium.com/ascend-developers/ascend-careers-spotlight-ep-1-it-security-at-ascend-money-1b97cb562414?source=topics_v2---------121-84--------------------93cf11f4_e7ce_4c8d_868f_e0a2a94efd95-------17,https://miro.medium.com/v2/resize:fill:140:140/0*a99jjEzT5RsV-dsj,cybersecurity 3862,2898,Hack The Box OpenSource Writeup,"Hello world and welcome to Haxez, I’m back on my daily hacking spree and this time I’m looking at the easy Hack The Box machine OpenSource. These writeups are not meant to be walkthroughs, they are to document my journey. …",https://medium.com/@joemcfarland/hack-the-box-opensource-writeup-96d1671b8d78?source=topics_v2---------122-84--------------------93cf11f4_e7ce_4c8d_868f_e0a2a94efd95-------17,https://miro.medium.com/v2/resize:fill:140:140/0*e01ys4Q1r5NX1wgH.png,cybersecurity 3863,2898,Hack The Box Trick Writeup,"Hello world and welcome to Haxez. I’m back, attempting to hack my way into the Hack The Box machine called Trick. It’s currently 7:00am on a Tuesday, I have work in a couple of hours but let’s see if we can smash this out before I have to go back…",https://medium.com/@joemcfarland/hack-the-box-trick-writeup-171dfb919922?source=topics_v2---------123-84--------------------a56972e2_6519_4a6a_a3ec_a4abc6e4e688-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ldnbHqG2pLZoAYU2.png,cybersecurity 3864,2903,RootMe CTF (TryHackMe),"This CTF Test your skills on Reconnaissance, Getting access to shell and Privilege Escalation! TASK 2 Scan the machine, how many ports are open? So in order to scan how many ports are open on a machine we will use a tool called “nmap” . …",https://medium.com/@BlackRock_Ceo/rootme-ctf-tryhackme-b94c00d97d6c?source=topics_v2---------124-84--------------------a56972e2_6519_4a6a_a3ec_a4abc6e4e688-------17,https://miro.medium.com/v2/resize:fill:140:140/1*U8FIDf-gcactAntm4IWiBg.png,cybersecurity 3865,2898,Hack The Box Photobomb Writeup,"Hello world and welcome to Haxez, this is a write-up for the Hack The Box Photobomb machine. This machine is listed as an easy machine. It requires some web application enumeration to gain access to the admin area. Then, you need to perform remote code execution on a parameter in…",https://medium.com/@joemcfarland/hack-the-box-photobomb-writeup-7e83bb9aab51?source=topics_v2---------125-84--------------------a56972e2_6519_4a6a_a3ec_a4abc6e4e688-------17,https://miro.medium.com/v2/resize:fill:140:140/0*j5NjRk1jI4-_rCDs.png,cybersecurity 3866,2927,Need For Spoof-Proof Biometric Security In the Crypto Space (eKYC-Chain),"Due to the distinct security vulnerabilities connected with digital assets, spoof-proof biometric verification is becoming more and more crucial in the crypto field. Cryptocurrencies, unlike conventional financial assets, are frequently kept in online wallets or exchanges, which are susceptible to theft, hacking, and illegal access. In comparison to conventional passwords…",https://medium.com/@infomaza01/need-for-spoof-proof-biometric-security-in-the-crypto-space-ekyc-chain-2d1b04ecadeb?source=topics_v2---------126-84--------------------a56972e2_6519_4a6a_a3ec_a4abc6e4e688-------17,https://miro.medium.com/v2/resize:fill:140:140/1*Uh32qH7pHcX5ProcXVHxFQ.png,cybersecurity 3867,2932,Timing Is Everything….,Timing is everything when we are running the organization in this technological world. Here timing is when we are speaking with respect to protect the organization. …,https://medium.com/@aakashyap_42928/timing-is-everything-d2e869f0e791?source=topics_v2---------127-84--------------------a56972e2_6519_4a6a_a3ec_a4abc6e4e688-------17,https://miro.medium.com/v2/resize:fill:140:140/0*P7tCBQEW0BoJTiqm,cybersecurity 3868,2933,Unveiling the Hidden Threat: The Critical Measures to Safeguard Your Personal Information in the Digital Era!,"In today’s digital age, protecting your personal information is a matter of urgency. With cyber threats and data breaches becoming more frequent and sophisticated, the safety of your personal information is at risk like never before. The consequences of a breach can be dire, ranging from identity theft to financial…",https://medium.com/data-driven-fiction/unveiling-the-hidden-threat-the-critical-measures-to-safeguard-your-personal-information-in-the-1c4d557c9a7f?source=topics_v2---------128-84--------------------a56972e2_6519_4a6a_a3ec_a4abc6e4e688-------17,https://miro.medium.com/v2/resize:fill:140:140/0*JWG7jLGGezq4vL4s,cybersecurity 3869,2865,C0lddbox_Easy: A Chill Guide to Pen-testing and Vulnerability Hunting!,"Are you interested in learning about pen-testing and identifying vulnerabilities? Look no further than Colddbox Easy! In this how-to guide, we will explore the process of establishing a security lab to perform tests while avoiding any potential security risks. Let’s dive in and get started! Establishing the Lab To get started, we need…",https://medium.com/@teendifferent7/c0lddbox-easy-a-chill-guide-to-pen-testing-and-vulnerability-hunting-481f55eddb4?source=topics_v2---------129-84--------------------a56972e2_6519_4a6a_a3ec_a4abc6e4e688-------17,https://miro.medium.com/v2/resize:fill:140:140/0*cDMCJt7w7qb5W7z4,cybersecurity 3870,965,Understanding Distributed Denial of Service (DDoS) Attacks: How to Stay Protected,"The advent of the internet has brought about tremendous benefits to society, from seamless communication to effortless shopping. However, the internet also presents a double-edged sword that can be exploited by malicious actors to perpetrate cybercrime. Cyber threats are prevalent, and they come in various forms. …",https://medium.com/bug-zero/understanding-distributed-denial-of-service-ddos-attacks-how-to-stay-protected-1b57585030fd?source=topics_v2---------130-84--------------------a56972e2_6519_4a6a_a3ec_a4abc6e4e688-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Eke89GXZliiZR1C1.png,cybersecurity 3871,2934,Haven1: Solving the security challenges in DeFi,"Decentralized Finance (DeFi) has taken the world by storm in recent years, promising a more accessible, transparent, and decentralized alternative to traditional financial systems. However, as the DeFi system has grown, so too have the risks and challenges associated with it. From bugs and exploits to regulatory and compliance issues…",https://medium.com/@Haven1official/haven1-solving-the-security-challenges-in-defi-8621a7a59f02?source=topics_v2---------131-84--------------------a56972e2_6519_4a6a_a3ec_a4abc6e4e688-------17,https://miro.medium.com/v2/resize:fill:140:140/1*wt_ZoB1uXYcMGi76PX6mdg.png,cybersecurity 3872,433,TJX Security Breach (2006) and Stuxnet (2010) Computer Hacks,"TJX Security Breach (2006) In 2006, TJX Companies, the parent company of popular retail stores such as T.J. Maxx and Marshalls, experienced one of the largest data breaches in history. The breach was caused by a group of hackers who were able to access TJX’s payment processing system and steal data such as credit…",https://medium.com/bug-zero/tjx-security-breach-2006-and-stuxnet-2010-computer-hacks-724d3a961534?source=topics_v2---------132-84--------------------a56972e2_6519_4a6a_a3ec_a4abc6e4e688-------17,https://miro.medium.com/v2/resize:fill:140:140/1*7XKL_NOtHRaa3Z-omsrfZA.png,cybersecurity 3873,2935,DDoS Attack Post-Mortem,"Attack Overview On March 13th at 7 PM CST, Wallet Guard was subjected to a large-scale DDoS attack that peaked at 600 million requests per minute over Tor exit nodes in tandem with a bot attack on our Twitter account. The attack is still ongoing. The Wallet Guard team began implementing hotfixes…",https://medium.com/@walletguard/ddos-attack-post-mortem-178441409bc0?source=topics_v2---------133-84--------------------dccdfe65_887b_48d9_893e_3b282058fb01-------17,https://miro.medium.com/v2/resize:fill:140:140/1*TkqSTJOuXs80ZISggOqazw.png,cybersecurity 3874,2811,"For Improved Wifi Security, It’s Hello To DragonFly (WPA3)","Like it or not, WPA2 is not secure and can be cracked using an offline dictionary attack. The core strength of the handshake between the client and the access point is the strength of the difficulty in cracking a PBKDF2 hash. If a user’s password is contained in a dictionary…",https://medium.com/asecuritysite-when-bob-met-alice/goodbye-to-the-four-way-handshake-wpa2-and-hello-to-dragonfly-wpa3-1b78cd5013d5?source=topics_v2---------134-84--------------------dccdfe65_887b_48d9_893e_3b282058fb01-------17,https://miro.medium.com/v2/resize:fill:140:140/1*oy7oEzk0s3reQjLzf0YqpQ.jpeg,cybersecurity 3875,2788,Yorotrooper APT Targets Government and Energy Entities,"A new Advanced Persistent Threat (APT) group called Yorotrooper has been discovered, targeting government and energy entities in Southeast Asia. The group employs custom-made malware and spear-phishing techniques to gain access to target networks and steal sensitive information. Yorotrooper’s tactics, techniques, and procedures (TTPs) show a level of sophistication and…",https://medium.com/@wrellis82/yorotrooper-apt-targets-government-and-energy-entities-957083b4081b?source=topics_v2---------135-84--------------------dccdfe65_887b_48d9_893e_3b282058fb01-------17,https://miro.medium.com/v2/resize:fill:140:140/0*cRN8mQmMiMFLCb7g.jpg,cybersecurity 3876,1841,Cloud Governance Frameworks: An Overview for 2023,"By: Elizabeth Wallace Cloud governance frameworks are different from traditional governance. The environment is too dynamic and too complex to follow traditional strategies. As a result, companies need a new, innovative way of thinking about cloud governance going into 2023. Some organizations have the expertise to begin a cloud governance…",https://medium.com/rtinsights/cloud-governance-frameworks-an-overview-for-2023-6d50896f53da?source=topics_v2---------136-84--------------------dccdfe65_887b_48d9_893e_3b282058fb01-------17,https://miro.medium.com/v2/resize:fill:140:140/0*vxwcDVTLeJzrc4CW.jpg,cybersecurity 3877,481,"Information Gathering: Concept, Tools, Techniques and Explained",Footprinting (Reconnaissance) refers to the process of gathering information about a specific computer system or a network environment and the company it belongs to. This is the preparatory phase for the hacker where he gathers as much information as he can so as to find ways to intrude into the…,https://medium.com/@cmanojshrestha/information-gathering-concept-tools-techniques-and-explained-bd8df99e9294?source=topics_v2---------137-84--------------------dccdfe65_887b_48d9_893e_3b282058fb01-------17,https://miro.medium.com/v2/resize:fill:140:140/0*42HRWuj9_CR_fhAX.jpg,cybersecurity 3878,274,How to Find Blind XSS and Attack scenarios with payloads,What is Blind XSS,https://medium.com/@akash-venky091/how-to-find-blind-xss-and-attack-scenarios-with-payloads-9312fe19f75f?source=topics_v2---------138-84--------------------dccdfe65_887b_48d9_893e_3b282058fb01-------17,https://miro.medium.com/v2/resize:fill:140:140/1*eVgu1wIF_OaYsq8gtg5I6g.png,cybersecurity 3879,262,Web Application Security | Tryhackme Writeup/Walkthrough | By Md Amiruddin,"Learn about web applications and explore some of their common security issues. Task 1 : Introduction Every one of us uses different programs on our computers. Generally speaking, programs run on our computers, using our computer’s processing power and storage. Moreover, to use a program, we need to install it first. What if…",https://medium.com/bugbountywriteup/web-application-security-tryhackme-writeup-walkthrough-by-md-amiruddin-d7fdcb849494?source=topics_v2---------139-84--------------------dccdfe65_887b_48d9_893e_3b282058fb01-------17,https://miro.medium.com/v2/resize:fill:140:140/0*kxuA9ckCraFT9df-.png,cybersecurity 3880,414,IAM in Healthcare: Ensuring Patient Data Privacy and Security,"In the healthcare industry, patient data privacy and security are of utmost importance. As more and more medical records are digitized and telemedicine becomes increasingly prevalent, it is essential to ensure that patient data is protected from unauthorized access and data breaches. …",https://medium.com/@edward_wilkins/iam-in-healthcare-ensuring-patient-data-privacy-and-security-e4b5167599ec?source=topics_v2---------140-84--------------------dccdfe65_887b_48d9_893e_3b282058fb01-------17,https://miro.medium.com/v2/resize:fill:140:140/1*UCs_aHIjNE_GhvjZM26Njg.jpeg,cybersecurity 3881,2936,Backdoor SSH to Obtain Clear Text Passwords,"TLDR — It is possible to backdoor the SSH service by modifying the common-auth file to perform logging and write the credentials to a file whenever an unsuspecting victim authenticates into the server with SSH. Video demonstration and walkthrough: https://youtu.be/of6VSqnHDho The “/etc/pam.d/common-auth” file is usually included by other PAM configuration…",https://medium.com/@yua.mikanana19/backdoor-ssh-to-obtain-clear-text-passwords-ab67c406a4bb?source=topics_v2---------141-84--------------------dccdfe65_887b_48d9_893e_3b282058fb01-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3882,2937,Cybersecurity: How to Protect Yourself Online!,"Cybersecurity is the practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access. With the increase in internet usage, cybersecurity has become more important than ever. In this article, I will discuss the importance of cybersecurity, the impact of cybercrime, and strategies to protect yourself online. …",https://medium.com/@harrygarlow/cybersecurity-how-to-protect-yourself-online-c48f4d8d34bb?source=topics_v2---------142-84--------------------dccdfe65_887b_48d9_893e_3b282058fb01-------17,https://miro.medium.com/v2/resize:fill:140:140/1*6thIaFAvKYjI5i7BNjklfQ.jpeg,cybersecurity 3883,348,Learning PowerShell Part 1,"The scripting languages that I have familiarity with are Bash and Python. A scripting language that I have no experience with, and am a little afraid of, is PowerShell. As part of me conquering my fear, and furthering my education and self-learning, I decided that for this week’s post, I’m…",https://medium.com/@lukegearty/learning-powershell-part-1-1e6eda529146?source=topics_v2---------143-84--------------------60ef0117_af88_4185_bfce_c5c2de3226f4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*9h1eJLeNFt3JQxcLj8FuVA.png,cybersecurity 3884,2938,TryHackMe Cyber Threat Intelligence (CTI) Module Review,"CTI was largely a module of dashboards. Not a bad thing, but to be honest, I skimmed over a lot of stuff. Data is vital to everything in cybersecurity and a lot of these tools overlap in various ways, each with their strengths. I probably could have spent more time…",https://medium.com/@joshthedev/tryhackme-cyber-threat-intelligence-cti-module-review-926201ae00a6?source=topics_v2---------144-84--------------------60ef0117_af88_4185_bfce_c5c2de3226f4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*DSKnQGcfFGIkrBFpnPi89w.png,cybersecurity 3885,2560,Top Cybersecurity Hiring Trends for 2023,"The number of cybersecurity jobs will grow by 35% between 2021 and 2031 – U.S. Bureau of Labor Statistics In today’s digital age, cybersecurity has become one of the most critical aspects of any organization’s operations. As businesses increasingly rely on technology to conduct their daily activities, the need for…",https://medium.com/@9cv9official/top-cybersecurity-hiring-trends-for-2023-dcd7547960c9?source=topics_v2---------145-84--------------------60ef0117_af88_4185_bfce_c5c2de3226f4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*PqfctLOhUu4g6OTuuRgvwg.png,cybersecurity 3886,2777,Typhoon: 1.02 Write-Up,"Hi, In this write-up, we are going to examine some of the vulnerabilities that Typhoon has. Typhoon 1.02: https://www.vulnhub.com/entry/typhoon-102,267/ by PrismaCSI. Let’s begin with pinging the target to see if it is up and running. As we can see from Time To Live value which is 64, our target is…",https://medium.com/@omergnscr/typhoon-1-02-write-up-9387f3a89a5f?source=topics_v2---------146-84--------------------60ef0117_af88_4185_bfce_c5c2de3226f4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*2_bJfWk-scgfv2O4d0_9RQ.png,cybersecurity 3887,2939,How to make your GraphQL implementation more secure,"Many developers love GraphQL because it uses a single endpoint and enables clients to customize their requests to obtain the data sets they want. However, when it comes to security, GraphQL’s flexibility can introduce specific security vulnerabilities that every developer needs to consider. When some of our developers began using…",https://medium.com/nord-security-tech-blog/how-to-make-your-graphql-implementation-more-secure-814f6955cbbb?source=topics_v2---------147-84--------------------60ef0117_af88_4185_bfce_c5c2de3226f4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*IqP6iF6tKC6OAk_-ifrNiw.png,cybersecurity 3888,479,Cyber Security Threats To USSD (short codes) in Africa,"Cybersecurity threats are increasing globally, and Africa is not immune to them. Unstructured Supplementary Service Data (USSD) is a widely-used protocol in Africa, providing a means for mobile phone users to access services such as checking their phone balance or adding credit, as well as for mobile banking and payments…",https://medium.com/@fezzantafrica/cyber-security-threats-to-ussd-short-codes-in-africa-c6416a78be64?source=topics_v2---------148-84--------------------60ef0117_af88_4185_bfce_c5c2de3226f4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3889,967,Implementing a basic firewall in GoLang,"A firewall is a crucial network security tool that helps protect computers and networks from malicious attacks. It acts as a barrier between a private internal network and the public internet, controlling incoming and outgoing traffic based on predetermined security rules. This article will discuss how to implement a firewall…",https://medium.com/system-weakness/implementing-a-basic-firewall-in-golang-1a10c59a7209?source=topics_v2---------149-84--------------------60ef0117_af88_4185_bfce_c5c2de3226f4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*HpKCu9MGZT_DN4yIi-4tjQ.png,cybersecurity 3890,2045,All about DNS poisoning: How does cache poisoning work?,"Cybercriminals use different techniques to compromise the target systems or enterprise professionals. The increased rate of cyberattacks is putting concern among many. Attackers also target Domain Name Systems (DNS) to poison or corrupt the DNS with wrong information. It often leads to web cache poisoning. According to recent reports, researchers…",https://medium.com/@karliris62/all-about-dns-poisoning-how-does-cache-poisoning-work-509855993ae7?source=topics_v2---------150-84--------------------60ef0117_af88_4185_bfce_c5c2de3226f4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*EdTm0vQWbp9eVSRNvoPX7w.png,cybersecurity 3891,409,"Vaultrees SDK, with the world’s first Fully Functional Data-In-Use Encryption, is now generally…","Vaultrees SDK, with the world’s first Fully Functional Data-In-Use Encryption, is now generally available. At Vaultree, we’re constantly pushing the boundaries of what’s possible in the world of data security. And now, we’re proud to announce the General Availability (GA) release of our Vaultree SDK for Fully Functional Data-In-Use Encryption. …",https://medium.com/vaultree/vaultrees-sdk-with-the-worlds-first-fully-functional-data-in-use-encryption-is-now-generally-f898b932d0c5?source=topics_v2---------151-84--------------------60ef0117_af88_4185_bfce_c5c2de3226f4-------17,https://miro.medium.com/v2/resize:fill:140:140/1*-NkC3SbMWOwg4_GA-88CBQ.png,cybersecurity 3892,271,Reverse Shell via DLL Injection,"Introduction Welcome to my new article, today i will show you how you can get a reverse shell connection via DLL Injection. To get this reverse shell we are using C++ and Msfvenom Shellcode. If you like my content check my hacking website to see more and exclusive articles! https://s12-h4ck.com What…",https://medium.com/@s12deff/reverse-shell-via-dll-injection-f26ec9d29c49?source=topics_v2---------152-84--------------------60ef0117_af88_4185_bfce_c5c2de3226f4-------17,https://miro.medium.com/v2/resize:fill:140:140/0*OkmvVsvKXuD6BzqQ.jpg,cybersecurity 3893,965,Bug Hunters: The Unsung Heroes of Cybersecurity,"Who are the bug hunters? Bug hunters are individuals who actively search for security vulnerabilities and bugs in software systems, web applications, and computer networks. They use a combination of manual and automated techniques to identify and report these vulnerabilities to the organizations responsible for the software or network. Bug hunters can include security researchers…",https://medium.com/bug-zero/bug-hunters-the-unsung-heroes-of-cybersecurity-5fa965ed3e3b?source=topics_v2---------154-84--------------------e386a3a1_edba_47af_829f_67e5a77f739d-------17,https://miro.medium.com/v2/resize:fill:140:140/0*nxmnG6V8PjxUwqkz,cybersecurity 3894,2940,7 Medical Problems That Technology Can Solve,"The healthcare industry shifted a lion’s share of processes into virtual platforms and digital technologies, practically overnight. Responding with amazing speed to the COVID-19 pandemic, the industry managed a decade’s worth of reforms just in a few months. The Impact of Technology on the Healthcare Industry A health industry found itself fighting in the dark with the consequences…",https://medium.com/@inverita/7-medical-problems-that-technology-can-solve-73dbb14a9aa7?source=topics_v2---------155-84--------------------e5a7558e_31af_4da9_94fd_4d84efa7372a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*MaB0byANxbkzKqtnVSrdjA.jpeg,cybersecurity 3895,2941,What Is Password Cracking?,"In authentication security, passwords are often the weak link, susceptible to several attacks. What is password cracking? Password cracking is the use of different attacks to guess or expose a password and gain access into a user’s account. What Does it Mean to Crack a Password? Passwords are one of the oldest and most well-established forms of authentication…",https://medium.com/@1Kosmos/what-is-password-cracking-8edae3bb584f?source=topics_v2---------156-84--------------------e5a7558e_31af_4da9_94fd_4d84efa7372a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3896,2941,What Is Credential Access?,Hackers attack computer systems to steal information. Some of the most important types of information they can steal are access credentials like usernames/passwords or PINs. Why is credential access dangerous? …,https://medium.com/@1Kosmos/what-is-credential-access-32f82c09da36?source=topics_v2---------157-84--------------------e5a7558e_31af_4da9_94fd_4d84efa7372a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3897,2942,MITRE Engenuity and the National Cybersecurity Strategy,"Like so many cyber security professionals have done over the last week, I have been thinking deeply about the new National Cybersecurity Strategy and what it means to my team. And by my team, I mean the MITRE Engenuity team, and more specifically the Cyber Resiliency portfolio within. As the…",https://medium.com/mitre-engenuity/mitre-engenuity-and-the-national-cybersecurity-strategy-122cae1d6b7e?source=topics_v2---------158-84--------------------e5a7558e_31af_4da9_94fd_4d84efa7372a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*gR7zPMOAfYcbPWytD-UBdA.png,cybersecurity 3898,107,"CAST-128 Encryption: Exploring the Key Features, Strengths, and Weaknesses | 2023","A Comprehensive Guide to Understanding the CAST-128 Encryption Algorithm | Karthikeyan Nagaraj — CAST-128, also known as CAST5, is a popular symmetric key block cipher that is widely used in various applications, including SSL/TLS, virtual private networks (VPNs), and secure email. This article aims to provide a comprehensive guide to CAST-128 encryption, including its key features, strengths, and weaknesses.",https://medium.com/@cyberw1ng/cast-128-encryption-exploring-the-key-features-strengths-and-weaknesses-2023-9cf47c6b15d7?source=topics_v2---------159-84--------------------e5a7558e_31af_4da9_94fd_4d84efa7372a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*nTV6ZI2HGjCRfb8_OscvoA.png,cybersecurity 3899,422,What Security Issues to Fix First:,"3 Approaches Using the Attack Surface Reduction Strategy — Welcome to the world of information security where attackers are always on the hunt for vulnerabilities in the applications that we develop. As a developer, you are responsible for ensuring that the applications you build are secure and do not expose your organization to unnecessary risks. However, with the ever-increasing…",https://medium.com/mitigated-io/what-security-issues-to-fix-first-311f67b26dc5?source=topics_v2---------161-84--------------------e5a7558e_31af_4da9_94fd_4d84efa7372a-------17,https://miro.medium.com/v2/resize:fill:140:140/0*6NM52qH_ySPj_zE5,cybersecurity 3900,405,A 10-Year-Old’s Guide to Dumpster diving,How Dumpster Diving Can Give Away Your Secrets — Have you ever thrown away something and realized you needed it later? Or have you ever found something cool in the trash that someone else threw away? …,https://medium.com/@shelkesays/a-10-year-olds-guide-to-dumpster-diving-83081bea5693?source=topics_v2---------162-84--------------------e5a7558e_31af_4da9_94fd_4d84efa7372a-------17,https://miro.medium.com/v2/resize:fill:140:140/1*ueeRCCN3mhYz5xoBVmAUWA.jpeg,cybersecurity 3901,2907,Network Switches: Boring but Important,"Bet you can’t read it to the end. If you can make it to the end I’ll give you an imaginary cookie. — WTF is a network switch A network switch is a fundamental networking device that connects devices within a local area network (LAN) and forwards data packets between them. Switches operate at the data link layer of the OSI model, enabling communication between devices connected to the same network. In this article, we will delve into…",https://medium.com/@ssbyrne/network-switches-boring-but-important-7dfd41ae5512?source=topics_v2---------163-84--------------------b75850d1_1c3f_4ad8_9b0b_a87ebff8d43c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*Fjc3Fz4ZrvzIOwur,cybersecurity 3902,265,Exploiting Paypal Payment Gateway Results In Free Shopping,"Hello everyone, I’m Aswin ,Security Researcher. Summary: Parameter Tampering attack is based on the manipulation of parameters exchanged between client and server in order to modify application data, such as user credentials and permissions, price and quantity of products, etc. Usually, this information is stored in cookies, hidden form fields, or…",https://medium.com/illumination/exploiting-paypal-payment-gateway-results-in-free-shopping-66671002887a?source=topics_v2---------164-84--------------------b75850d1_1c3f_4ad8_9b0b_a87ebff8d43c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*lm3hbIDJC3M9VVH7kcWj3Q.jpeg,cybersecurity 3903,2943,Hackers steal $197 million in crypto in Euler Finance attack,"Lending protocol Euler Finance was hit by a cryptocurrency flash loan attack on Sunday, with the threat actor stealing $197 million in multiple digital assets. The cryptocurrency theft involved multiple tokens, including $8.75 million worth of DAI, $18.5 million in WBTC, $33.85 million in USDC, and $135.8 million in stETH. The attacker’s…",https://medium.com/@spixnet.gmbh/hackers-steal-197-million-in-crypto-in-euler-finance-attack-fdb8aa1b097a?source=topics_v2---------165-84--------------------b75850d1_1c3f_4ad8_9b0b_a87ebff8d43c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*23ellN17MaiFZp0N.jpg,cybersecurity 3904,500,What You Need To Know About ChatGPT-4,"Unlocking the Future of Conversational AI: Features, Applications, and Ethical Considerations — ChatGPT-4 is revolutionizing the world of conversational AI with its advanced natural language understanding capabilities, improved context retention, and more human-like responses. As the successor to OpenAI’s groundbreaking ChatGPT-3, ChatGPT-4 sets new benchmarks in artificial intelligence, delivering seamless and highly interactive experiences for users across various applications.",https://medium.com/illumination/what-you-need-to-know-about-chatgpt-4-2be06a671e57?source=topics_v2---------166-84--------------------b75850d1_1c3f_4ad8_9b0b_a87ebff8d43c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*ZXO7Gmke5dDkbCGX,cybersecurity 3905,2684,Unveiling GPT-4: The AI Revolution Continues,"The world of artificial intelligence (AI) is expanding and evolving at a rapid pace, and with it comes groundbreaking innovations. One such development is the release of GPT-4 by OpenAI, a groundbreaking language model that has taken the AI community by storm. In this comprehensive blog post, we’ll dive into…",https://medium.com/@cybercosmosworld/unveiling-gpt-4-the-ai-revolution-continues-5b98924d538d?source=topics_v2---------167-84--------------------b75850d1_1c3f_4ad8_9b0b_a87ebff8d43c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*sspBBklnp6Fw4oTU.png,cybersecurity 3906,2944,Cyber Career Coaching,Helping you secure Your dream job in cyber world Coach with expertise 👏 if you liked it Subscribe for more,https://medium.com/@cpf-coaching/cyber-career-coaching-c0a90016249f?source=topics_v2---------168-84--------------------b75850d1_1c3f_4ad8_9b0b_a87ebff8d43c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*lMYkwty49GRkKBjZ,cybersecurity 3907,2945,Cybersecurity Alerts: What’s Brewing in the Dark Web and Beyond!,"Bringing cyber enthusiasts all the exploitable gossip with the aim of securing their monthly coffers with newer knowledge patches! So, without further ado, let's get started on this segment of What's been brewing in the dark web and beyond! On our agenda today is introducing you to the new RAT…",https://medium.com/@rahaelmathew1009/cybersecurity-alerts-whats-brewing-in-the-dark-web-and-beyond-ff7890c53932?source=topics_v2---------169-84--------------------b75850d1_1c3f_4ad8_9b0b_a87ebff8d43c-------17,https://miro.medium.com/v2/resize:fill:140:140/0*1-5mY1vWwa-R2kVf,cybersecurity 3908,407,Microsoft Sentinel — Get actionable Threat Intelligence from Twitter,"Social media platforms like Twitter have become a valuable source of information for cybersecurity professionals. Many cybersecurity experts use Twitter to share information about the latest threats and potential IOC’s that could help identify and prevent attacks. However, manually collecting and analyzing this data can be time-consuming and challenging. To…",https://medium.com/@antonio.formato/microsoft-sentinel-get-actionable-threat-intelligence-from-twitter-6fb79a39c96d?source=topics_v2---------170-84--------------------b75850d1_1c3f_4ad8_9b0b_a87ebff8d43c-------17,https://miro.medium.com/v2/resize:fill:140:140/1*1_8rrTd1w3U38GdzVIuOqQ.png,cybersecurity 3909,2946,TryHackMe Walthrough — Bugged,"In this post I will walk you through the Room Bugged from Try Hack me. This room (Bugged) is designed to be an IoT hacking exercise, the room description reads as follows: <