Generative Data Intelligence

Tag: Software

Comodo Antivirus Conquers “Weapons Grade” Surveillance

Reading Time: 2 minutesWe are happy to report more independent evidence that you can sleep tight at night with Comodo Antivirus, even from...

Homeland Security Warns Backoff POS Malware Speading Fast

Reading Time: 2 minutesIn July, Homeland Security warned of the Backoff POS malware threat, which has the ability to steal cardholder data and...

Microsoft’s August Advisory Includes Critical Security Updates

Reading Time: 2 minutesIf it’s the second Tuesday of the month, it is time for Microsoft’s Security Updates, aka “Patch Tuesday”. The Microsoft August...

Vulnerabilities in Antivirus ID’d – Comodo Has the Solution

Reading Time: 3 minutesA researcher at the Singapore security firm COSEINC, Joxean Koret, is all over the technical news sites. He is being...

10 Back to School Internet Security Tips

Reading Time: 3 minutesSummer may be hard upon us, especially here in the very steamy New York area, but it is not too...

vBulletin Announces Emergency Patch for SQL Injection Vulnerability

Reading Time: 1 minutevBulletin Solutions announced this week that they have a critical emergency patch to their vBulletin forum software to fix an...

Matousec: Comodo’s Security Still Tops After All These Years

Reading Time: 2 minutesWe are now more than half way through 2014 and Comodo finds itself in a familiar place in the ongoing...

Many Servers Vulnerable to Heartbleed. Act Now!

Reading Time: 3 minutes Various news reports have confirmed that many web servers are still vulnerable to the Heartbleed bug, which effects Apache servers...

Windows XP Lives! Comodo Still Has Your Back

Reading Time: 2 minutesIn the latest report by netmarketshare.com, the supposedly dead Windows XP actually increased its market share of desktop operating systems...

Comodo ASG Introduces Control of Incoming Mail by MTA & Archiving

Reading Time: 3 minutesThe latest release of the Comodo Antispam Gateway (CASG) went live today with new features for controlling and archiving email....

Clustering with Dirichlet Process Mixture Model in Java

July 7, 2014 Vasilis Vryniotis . 1 Comment In the previous articles we discussed in detail the Dirichlet...

Clustering documents and gaussian data with Dirichlet Process Mixture Models

June 30, 2014 Vasilis Vryniotis . No comments This article is the fifth part of the tutorial on...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?