Generative Data Intelligence

Tag: Blog

Best ITSM Tools

Reading Time: 5 minutesGood ITSM tools support a whole set of ITSM processes. They are offered as a suite of services for...

How to Protect Yourself from Printer/Scanner Malware

Reading Time: 3 minutes In a rather new trend, cybercriminals have begun to spread malware by spoofing printers and scanners. These types of attacks started...

5 tips for multi-GPU training with Keras

January 21, 2018 Vasilis Vryniotis . 1 Comment Deep Learning (the favourite buzzword of late 2010s along with...

7 Website Security Improvement Tips

Reading Time: 4 minutes Creating websites is pretty easy these days. A task which no longer requires coding skills. Thanks to Content Management Systems...

Why did a UK-Based IT Support Company Choose Korumail?

Reading Time: 2 minutes On November 4, UK-based IT support company Strobe IT announced it had replaced its previous antispam engine with Comodo Korumail....

Sharing our insights from designing with clinicians

In our design studio, we have Indi Young’s mantra on the wall as a reminder to “fall in love with the problem, not...

Uber just released the ultimate millennial credit card

The Uber credit card. Image: uber By Emma Hinchliffe2017-10-25 17:30:00 UTC When all the millennials delete Uber, give them a free Spotify...

KRACK Q&A : Protecting Mobile Users Against KRACK Attack

Reading Time: 3 minutes “The October 2017 discovery of KRACK is significant for the security of virtually all smart phone users; the threat is...

Why Fintech is an opportunity we might not see again…

These are not my words, but those of Rob Frohwein, CEO of Kabbage. Read on to understand more about the context of the...

Mash Patel CEO of Kurtosys

Today on FinTech Profile we are delighted to talk to Mash Patel, founder of Kurtosys, who provide digital services for asset managers. Kurtosys...

The Evolution of SSL and TLS | Comodo Blog

Reading Time: 3 minutesSSL and TLS are often used interchangeably as they are closely related. Both are online communication protocols and serve...

The Evolution of SSL and TLS

Reading Time: 3 minutesSSL and TLS are often used interchangeably as they are closely related. Both are online communication protocols and serve the...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?