Compute عمومي
[search 0]
أكثر
تنزيل التطبيق!
show episodes
 
Die Redaktion von ComputerBase diskutiert im CB-Funk ganz ohne Gebrüll aktuelle Themen und gewährt Einblicke hinter die Kulissen: Warum hat die Redaktion wie berichtet oder getestet, was steht an, oder wo klemmt es? Wer sich schon immer gefragt hat, wie es in den Köpfen hinter ComputerBase tickt, ist hier genau richtig. Feedback, Vorschläge und Wünsche zum Podcast sind jederzeit gerne gesehen.
  continue reading
 
The Computer Game Show is a weekly podcast about computer games, hosted by David Turner, Sean Bell, Mat Murray and James Farley. Listen every Wednesday on Apple Podcasts, Google Podcasts, Spotify and YouTube. Email podcast@tcgs.co or visit tcgs.co to stream every episode, watch our Twitch streams, contact the show and more. Get exclusive content and more by supporting TCGS on Patreon at patreon.com/tcgs
  continue reading
 
Artwork

1
Computer Club

Computer Club - Freddy & Smollie

Unsubscribe
Unsubscribe
أسبوعيا
 
Welkom in Computer Club, een podcast door Frederik 'Freddy' De Bosschere en Thomas 'Smollie' Smolders! Wekelijks bespreken we de actualiteit op vlak van technologie en gaan we op zoek naar interessante feiten en innovaties. Er zijn ook jingles.
  continue reading
 
Artwork
 
Jeden Samstag das Neueste aus Computertechnik und Informationstechnologie. Beiträge, Reportagen und Interviews zu IT-Sicherheit, Informatik, Datenschutz, Smartphones, Cloud-Computing und IT-Politik. Die Trends der IT kompakt und informativ.
  continue reading
 
Computerlaw Group LLP (www.computerlaw.com) provides strategic, knowledgeable, and effective business and intellectual property protection, licensing and litigation services to Internet, e-commerce, computer software, hardware and other high-tech businesses, teams and industry professionals throughout California, nationally and around the world. CLG produces THE VALLEY CURRENT as a way to keep its worldwide clients, co-counsels, colleagues, and friends aware of developments in Silicon Valley ...
  continue reading
 
Artwork

1
Computeren

Samya Hafsaoui, Timo Harmelink, Marieke Kuypers & Spraakmaker Media

Unsubscribe
Unsubscribe
يوميا+
 
In de podcast Computeren nemen chronisch online journalisten Samya Hafsaoui, Marieke Kuypers en Timo Harmelink je wekelijks mee door de diepste krochten van het internet. We praten je bij over de memes, drama’s, en discussies die je móét kennen om online mee te kunnen. Want nu we allemaal steeds meer in de digitale wereld leven: wat doet dat eigenlijk met hoe we de echte wereld zien? We maken Computeren vanaf nu geheel onafhankelijk, met behulp van Spraakmaker Media. Dus deel deze podcast me ...
  continue reading
 
The Computer Corner Radio Show with Gene Mitchell and Joe Myshko is on the air every Saturday morning from 8:00AM to 9:30AM. The Computer Corner show now airs on WCHE 1520. The show formerly aired on WCOJ 1420 in Chester County, PA. The Show is celebrating over 14 years.
  continue reading
 
Artwork

1
Das Computermagazin

Bayerischer Rundfunk

Unsubscribe
Unsubscribe
شهريا
 
Neue Produkte und Trends aus Computertechnik und Telekommunikation: Was bringen uns die neuen Technologien? Was gibt es Spannendes im Netz? Eine Orientierung im Dschungel der Bits und Bytes. "Das Computermagazin" - Ein gemeinsames Magazin der Redaktionen Wissenschaft, Wirtschaft und Zündfunk.
  continue reading
 
Artwork

1
Computer Talk Radio

Benjamin Rockwell

Unsubscribe
Unsubscribe
أسبوعيا
 
Computer Talk Radio is a nationally syndicated broadcast radio program on computers and technology, and how they impact your life. Benjamin Rockwell, the show host and a computer nerd, leads the team as the expert guide through the technical jungle of jargon, and the valleys of viruses, to reach the pinnacle of power over your computer problems. Benjamin is joined by multiple team members who thrive on bringing you to the next level of knowledge. Keith M. Sedor has been a Certified Apple Mac ...
  continue reading
 
Since 1995, Computer Talk with TAB has been on the air live each week providing an in-depth practical view of computers and their place in our everyday lives. A Computer Radio Program for everyone! Erik Semmel from TAB Computer Systems hosts the show and provides real time answers to caller’s questions. To keep the topics fresh and informative, guests are brought in as a result of listener’s questions and suggestions. The show is geared towards the everyday computer user with questions about ...
  continue reading
 
Technology is changing fast. And it's changing our world even faster. Host Alix Dunn interviews visionaries, researchers, and technologists working in the public interest to help you keep up. Step outside the hype and explore the possibilities, problems, and politics of technology. We publish weekly.
  continue reading
 
Artwork

1
Computer and Technology Radio

Marsha Collier and Marc Cohen

Unsubscribe
Unsubscribe
شهريا+
 
Consumer Technology News & Views About The Hosts: Marsha Collier is an award winning tech author who has sold over a million books. Learn about her at www.marshacollier.com. Marc Cohen Has Spent 30 Years Informing Southern Californians About Technology. Show Contact Info: marcandmarsha@Gmail.Com Twitter #techradio @MarshaCollier & @realmarccohen
  continue reading
 
Artwork

1
Okay, Computer.

Risk Reversal Media

Unsubscribe
Unsubscribe
أسبوعيا
 
Each week our tricked-out team of tech investors and former operators breakdown the biggest headlines and themes in both public and private markets, with a specific focus on how AI is changing the tech landscape. We will be joined by some of the most influential voices in tech, media, and crypto leaving listeners with fresh perspectives on increasingly complicated topics impacting their lives and investment portfolios. Okay, Computer. Podcast is hosted by Dan Nathan, with regular contributor ...
  continue reading
 
Computers LIVE is a Drum and Bass Podcast made by AI. The show streams weekly and new episodes are posted monthly. Neurofunk Drum and Bass Music that you won't find anywhere else. Computers LIVE features exclusive releases of Neurofunk, Drum and Bass, Breakcore, Vaporwave, Dubstep, Trap, IDM, DNB, EDM and LO-FI. Shows are streamed here https://www.youtube.com/@computermusiclive/streams & https://www.facebook.com/computerslive and donations can be made here https://www.paypal.me/AKB48
  continue reading
 
We're increasingly dependent on technology. Our business and personal lives rely on it, but as you've probably noticed, it's unreliable.They promise it'll get better, but it usually gets worse. Our computers are slow, so we end up squinting at smartphones. We live in constant fear that something's going to happen to our personal data. So we're scared into paying for fake protection that proves useless when disaster strikes. The jokers we pay to fix our stuff have no clue what they're doing, ...
  continue reading
 
Loading …
show series
 
Fabian und Jan im Interview mit Dirk Ringe Alle Inhalte zu Pioneers of Pagonia auf ComputerBasehttps://www.computerbase.de/news/pioneers-of-pagonia/ Die Webseite zum Spielhttps://www.pioneersofpagonia.com/ Pioneers of Pagiona auf Steam (Early Access)https://store.steampowered.com/app/2155180/Pioneers_of_Pagonia/…
  continue reading
 
Network fingerprinting exists for a while and some methods such as JA3 have achieved wide adoption across the industry. Introducing network fingerprinting into login flows can help you stave off attackers. However, there are various challenges that you need to overcome: technical, organizational and regulatory.In this talk we will take a look at th…
  continue reading
 
Network fingerprinting exists for a while and some methods such as JA3 have achieved wide adoption across the industry. Introducing network fingerprinting into login flows can help you stave off attackers. However, there are various challenges that you need to overcome: technical, organizational and regulatory.In this talk we will take a look at th…
  continue reading
 
Network fingerprinting exists for a while and some methods such as JA3 have achieved wide adoption across the industry. Introducing network fingerprinting into login flows can help you stave off attackers. However, there are various challenges that you need to overcome: technical, organizational and regulatory.In this talk we will take a look at th…
  continue reading
 
In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fe…
  continue reading
 
In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fe…
  continue reading
 
In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fe…
  continue reading
 
In early 2024, hundreds of DKIM setups still used cryptographic keys vulnerable to a bug from 2008 in Debian's OpenSSL package. Vulnerable hosts included prominent names like Cisco, Oracle, Skype, and Github.In 2022, it was discovered that printers generated TLS keys that could be trivially broken with an over 300-year-old algorithm by Pierre de Fe…
  continue reading
 
Viele Teams stehen vor der Herausforderung, beim Threat Modeling relevante Bedrohungen zu identifizieren, insbesondere wenn nur wenig Security-Expertise vorhanden ist. Die Auswahl und Bewertung von potenziellen Risiken kann für Nicht-Experten schwierig sein. Dieser Lightning Talk zeigt, wie Generative AI (GenAI) hier unterstützen kann, indem sie Be…
  continue reading
 
Viele Teams stehen vor der Herausforderung, beim Threat Modeling relevante Bedrohungen zu identifizieren, insbesondere wenn nur wenig Security-Expertise vorhanden ist. Die Auswahl und Bewertung von potenziellen Risiken kann für Nicht-Experten schwierig sein. Dieser Lightning Talk zeigt, wie Generative AI (GenAI) hier unterstützen kann, indem sie Be…
  continue reading
 
Viele Teams stehen vor der Herausforderung, beim Threat Modeling relevante Bedrohungen zu identifizieren, insbesondere wenn nur wenig Security-Expertise vorhanden ist. Die Auswahl und Bewertung von potenziellen Risiken kann für Nicht-Experten schwierig sein. Dieser Lightning Talk zeigt, wie Generative AI (GenAI) hier unterstützen kann, indem sie Be…
  continue reading
 
Viele Teams stehen vor der Herausforderung, beim Threat Modeling relevante Bedrohungen zu identifizieren, insbesondere wenn nur wenig Security-Expertise vorhanden ist. Die Auswahl und Bewertung von potenziellen Risiken kann für Nicht-Experten schwierig sein. Dieser Lightning Talk zeigt, wie Generative AI (GenAI) hier unterstützen kann, indem sie Be…
  continue reading
 
The presentation explores the security challenges and opportunities posed by Generative AI (GenAI). While GenAI offers tremendous potential, it also has a darker side, such as its use in creating deepfakes that can spread misinformation, manipulate political events, or facilitate fraud, as demonstrated in a live deepfake example. Malicious variants…
  continue reading
 
The presentation explores the security challenges and opportunities posed by Generative AI (GenAI). While GenAI offers tremendous potential, it also has a darker side, such as its use in creating deepfakes that can spread misinformation, manipulate political events, or facilitate fraud, as demonstrated in a live deepfake example. Malicious variants…
  continue reading
 
The presentation explores the security challenges and opportunities posed by Generative AI (GenAI). While GenAI offers tremendous potential, it also has a darker side, such as its use in creating deepfakes that can spread misinformation, manipulate political events, or facilitate fraud, as demonstrated in a live deepfake example. Malicious variants…
  continue reading
 
The presentation explores the security challenges and opportunities posed by Generative AI (GenAI). While GenAI offers tremendous potential, it also has a darker side, such as its use in creating deepfakes that can spread misinformation, manipulate political events, or facilitate fraud, as demonstrated in a live deepfake example. Malicious variants…
  continue reading
 
The OWASP AI Exchange provides a comprehensive framework to address the evolving security challenges presented by AI systems. As artificial intelligence continues to transform industries, securing these systems against emerging threats has become a top priority. This presentation will offer an in-depth overview of the OWASP AI Exchange, focusing on…
  continue reading
 
The OWASP AI Exchange provides a comprehensive framework to address the evolving security challenges presented by AI systems. As artificial intelligence continues to transform industries, securing these systems against emerging threats has become a top priority. This presentation will offer an in-depth overview of the OWASP AI Exchange, focusing on…
  continue reading
 
The OWASP AI Exchange provides a comprehensive framework to address the evolving security challenges presented by AI systems. As artificial intelligence continues to transform industries, securing these systems against emerging threats has become a top priority. This presentation will offer an in-depth overview of the OWASP AI Exchange, focusing on…
  continue reading
 
The OWASP AI Exchange provides a comprehensive framework to address the evolving security challenges presented by AI systems. As artificial intelligence continues to transform industries, securing these systems against emerging threats has become a top priority. This presentation will offer an in-depth overview of the OWASP AI Exchange, focusing on…
  continue reading
 
Die NIS2-Richtlinie (Network and Information Security Directive) der Europäischen Union stellt eine Weiterentwicklung der bestehenden Cybersicherheitsanforderungen dar und zielt darauf ab, die Resilienz und Sicherheit kritischer Infrastrukturen in der EU zu stärken. In Deutschland liegt derzeit mit dem NIS2UmsuCG (NIS-2-Umsetzungs- und Cybersicherh…
  continue reading
 
Die NIS2-Richtlinie (Network and Information Security Directive) der Europäischen Union stellt eine Weiterentwicklung der bestehenden Cybersicherheitsanforderungen dar und zielt darauf ab, die Resilienz und Sicherheit kritischer Infrastrukturen in der EU zu stärken. In Deutschland liegt derzeit mit dem NIS2UmsuCG (NIS-2-Umsetzungs- und Cybersicherh…
  continue reading
 
Die NIS2-Richtlinie (Network and Information Security Directive) der Europäischen Union stellt eine Weiterentwicklung der bestehenden Cybersicherheitsanforderungen dar und zielt darauf ab, die Resilienz und Sicherheit kritischer Infrastrukturen in der EU zu stärken. In Deutschland liegt derzeit mit dem NIS2UmsuCG (NIS-2-Umsetzungs- und Cybersicherh…
  continue reading
 
Die NIS2-Richtlinie (Network and Information Security Directive) der Europäischen Union stellt eine Weiterentwicklung der bestehenden Cybersicherheitsanforderungen dar und zielt darauf ab, die Resilienz und Sicherheit kritischer Infrastrukturen in der EU zu stärken. In Deutschland liegt derzeit mit dem NIS2UmsuCG (NIS-2-Umsetzungs- und Cybersicherh…
  continue reading
 
In the coming years, all EU member states will be required to provide their citizens with a digital identity wallet, as mandated by the European Union. The EU Digital Identity Wallet (EUDI Wallet) represents the largest implementation of its kind to date and brings with it significant challenges, particularly in terms of security, privacy, and inte…
  continue reading
 
In the coming years, all EU member states will be required to provide their citizens with a digital identity wallet, as mandated by the European Union. The EU Digital Identity Wallet (EUDI Wallet) represents the largest implementation of its kind to date and brings with it significant challenges, particularly in terms of security, privacy, and inte…
  continue reading
 
In the coming years, all EU member states will be required to provide their citizens with a digital identity wallet, as mandated by the European Union. The EU Digital Identity Wallet (EUDI Wallet) represents the largest implementation of its kind to date and brings with it significant challenges, particularly in terms of security, privacy, and inte…
  continue reading
 
In the coming years, all EU member states will be required to provide their citizens with a digital identity wallet, as mandated by the European Union. The EU Digital Identity Wallet (EUDI Wallet) represents the largest implementation of its kind to date and brings with it significant challenges, particularly in terms of security, privacy, and inte…
  continue reading
 
Dan Nathan and Guy Adami provide an update on the past week in tech as investors digest what the regulatory environment will look like under a second Trump administration. From the rotation into software to Chinese internet names, the duo breaks it all down. Dan then welcomes Imran Khan (12:00), founder and CEO of Proem Asset Management, to discuss…
  continue reading
 
OAuth 2.0 has become the backbone of secure delegated authorization on the web, enabling users to grant third-party applications access to their data without revealing their credentials. It's also foundational for federated authentication via OpenID Connect and plays a critical role in emerging technologies like wallet ecosystems. However, despite …
  continue reading
 
OAuth 2.0 has become the backbone of secure delegated authorization on the web, enabling users to grant third-party applications access to their data without revealing their credentials. It's also foundational for federated authentication via OpenID Connect and plays a critical role in emerging technologies like wallet ecosystems. However, despite …
  continue reading
 
OAuth 2.0 has become the backbone of secure delegated authorization on the web, enabling users to grant third-party applications access to their data without revealing their credentials. It's also foundational for federated authentication via OpenID Connect and plays a critical role in emerging technologies like wallet ecosystems. However, despite …
  continue reading
 
OAuth 2.0 has become the backbone of secure delegated authorization on the web, enabling users to grant third-party applications access to their data without revealing their credentials. It's also foundational for federated authentication via OpenID Connect and plays a critical role in emerging technologies like wallet ecosystems. However, despite …
  continue reading
 
Once upon a time, developers and security experts relied on mostly server-side rendered vulnerable applications to train their web hacking skills. In 2014 the Juice Shop entered the stage as one of the first Rich Internet Application representatives. What started as a personal pet project with two dozen hacking challenges, became an OWASP Flagship …
  continue reading
 
Once upon a time, developers and security experts relied on mostly server-side rendered vulnerable applications to train their web hacking skills. In 2014 the Juice Shop entered the stage as one of the first Rich Internet Application representatives. What started as a personal pet project with two dozen hacking challenges, became an OWASP Flagship …
  continue reading
 
Once upon a time, developers and security experts relied on mostly server-side rendered vulnerable applications to train their web hacking skills. In 2014 the Juice Shop entered the stage as one of the first Rich Internet Application representatives. What started as a personal pet project with two dozen hacking challenges, became an OWASP Flagship …
  continue reading
 
Once upon a time, developers and security experts relied on mostly server-side rendered vulnerable applications to train their web hacking skills. In 2014 the Juice Shop entered the stage as one of the first Rich Internet Application representatives. What started as a personal pet project with two dozen hacking challenges, became an OWASP Flagship …
  continue reading
 
This week: Nintendo confirms backwards compatibility on Switch 2, Nintendo sues streamer who said he could broadcast its pirated games "all day", PS5 Pro price has not had a "negative impact" on sales, Trump tariffs will make video game consoles up to 40% more expensive, and a Mass Effect TV series is in development at Amazon. Also: questions we’ve…
  continue reading
 
Každá výrobní firma disponuje poměrně velkým majetkem. Většina tohoto majetku vyžaduje péči, aby se zhodnocoval, aby byl funkční a aby přinášel potřebnou přidanou hodnotu. Tuto péči má zpravidla na starosti oddělení údržby, které obsahuje specialisty na elektroopravy, mechanické opravy, stavební a zahradnické práce apod.…
  continue reading
 
Referenční architektury, jež mají výrazně urychlit a zjednodušit stavbu datových center orientovaných na využití umělou inteligenci, představila Nvidia, která je nejvýznamnějším dodavatelem vysoce výkonných výpočetních systémů pro AI.بقلم redakce@computerworld.cz (Computerworld: Pavel Louda)
  continue reading
 
Nové, vysoce kapacitní pevné disky v produktových řadách Ultrastar a WD Gold od společnosti Western Digital využívají jako první na světě 11plotnovou platformu u architektury pevného disku.بقلم redakce@computerworld.cz (Computerworld: Partnerský článek)
  continue reading
 
Loading …

دليل مرجعي سريع