101. | Audio-Jacking: Deep Faking Phone Calls | 649 | |
|
102. | Cybersecurity Architecture: Networks | 489 | |
|
103. | Cyber Attack Trends: Global Identity Crisis | 620 | |
|
104. | How Chatbots Could Be 'Hacked' by Corpus Poisoning | 484 | |
|
105. | What is Podman? How is it Different Than Docker? | 483 | |
|
106. | Passwordless Authentication: Weighing the Options | 556 | |
|
107. | What is Computational Storage? | 469 | |
|
108. | Python Loves the Mainframe and Data Science | 447 | |
|
109. | Business Process Analysis | 444 | |
|
110. | Why a Data Lakehouse Architecture | 435 | |
|
111. | Developer Career Advice: Degree vs Bootcamp? | 434 | |
|
112. | What is In-Memory Computing? | 427 | |
|
113. | AI vs Machine Learning: What's the difference? | 426 | |
|
114. | What is Ransomware? | 424 | |
|
115. | NumPy vs SciPy | 413 | |
|
116. | Large Language Models Are Zero Shot Reasoners | 406 | |
|
117. | No-Code Explained in 3 Minutes | 403 | |
|
118. | What is MySQL? | 403 | |
|
119. | What is an RBM (Restricted Boltzmann Machine)? | 398 | |
|
120. | What is Back Propagation | 392 | |
|
121. | What is Phishing | 391 | |
|
122. | The Anatomy of an Attack | 391 | |
|
123. | Why foundation models are a paradigm shift for AI | 531 | |
|
124. | FIDO Promises a Life Without Passwords | 9,697 | |
|
125. | What is XaaS? | 429 | |
|
126. | What is Endpoint Detection and Response (EDR)? | 378 | |
|
127. | What is Synthetic Data? No, It's Not "Fake" Data | 377 | |
|
128. | Breaking legacy programs into microservices without breaking anything | 372 | |
|
129. | 8 Use Cases for Artificial General Intelligence (AGI) | 550 | |
|
130. | What is Malware? Let's Hear the Hacker's Viewpoint | 370 | |
|
131. | IBM Tech Now: IBM Cloud Prep, the IBM Consulting Cloud Accelerator, and the Gartner Magic Quadrant | 365 | |
|
132. | XDR (Extended Detection & Response) Explained | 363 | |
|
133. | What Makes Large Language Models Expensive? | 1,375 | |
|
134. | Data Lakehouses Explained | 361 | |
|
135. | Cybersecurity Architecture: Application Security | 359 | |
|
136. | What is Quantum Safe? | 358 | |
|
137. | Why Secure DNS is Important | 357 | |
|
138. | Why Do Devs Love Python? | 355 | |
|
139. | What is GraphQL? | 354 | |
|
140. | Fluid vs. Crystallized Intelligence | 344 | |
|
141. | Cybersecurity Quiz. How Much Do You Know? | 505 | |
|
142. | Cybersecurity Threat Hunting Explained | 342 | |
|
143. | Artificial Intelligence vs. Augmented Intelligence | 342 | |
|
144. | What is a Vector Database? | 645 | |
|
145. | How to Pick the Right AI Foundation Model | 467 | |
|
146. | What are Jupyter Notebooks? | 329 | |
|
147. | Cybersecurity Modernization | 329 | |
|
148. | Machine Learning vs. Deep Learning vs. Foundation Models | 327 | |
|
149. | Devs Don't Need Admin Access - Lessons Learned | 327 | |
|
150. | Endpoints Are the IT Front Door - Guard Them | 325 | |
|
151. | Data Analytics vs Data Science | 685 | |
|
152. | Top 5 Cloud Misconfigurations | 403 | |
|
153. | Optical Character Recognition (OCR) | 318 | |
|
154. | What is Text Mining? | 317 | |
|
155. | What is Multi-Factor Authentication | 317 | |
|
156. | What is the MERN Stack? | 316 | |
|
157. | Large Language Models: How Large is Large Enough? | 421 | |
|
158. | Become a value creator with generative AI | 558 | |
|
159. | Why you need Privileged Account Management | 311 | |
|
160. | Large Language ModelOperations (LLMOps) Explained | 377 | |
|
161. | Generative vs Rules-Based Chatbots | 304 | |
|
162. | What is the CIA Triad | 303 | |
|
163. | Unboxing Power E1080 server | 301 | |
|
164. | Using Retrieval Augmented Generation with a Large Language Model AI Chatbot | 328 | |
|
165. | LAMP Stack Explained in 3 Minutes | 289 | |
|
166. | Cybersecurity Architecture: Response | 288 | |
|
167. | Explained: The OWASP Top 10 for Large Language Model Applications | 286 | |
|
168. | Cybersecurity Architecture: Data Security | 285 | |
|
169. | What is Master Data Management | 285 | |
|
170. | No-Code vs Low-Code | 283 | |
|
171. | Passwords vs. Passkeys - FIDO Bites Back! | 563 | |
|
172. | Protecting Yourself from Ransomware | 280 | Guide |
|
173. | Data Quality Explained | 278 | |
|
174. | SRE Golden Signals Explained | 275 | |
|
175. | Why Linear regression for Machine Learning? | 382 | |
|
176. | Training AI Models with Federated Learning | 272 | |
|
177. | Humans vs. AI: who makes the best decisions? | 271 | |
|
178. | Cybersecurity Careers FAQ | 269 | |
|
179. | Do Chatbots Need AI? | 267 | |
|
180. | Humans vs. AI. Who's better at Phishing? | 336 | |
|
181. | What is SOAR (Security, Orchestration, Automation & Response) | 265 | |
|
182. | Will AI Help or Hurt Cybersecurity? Definitely! | 265 | |
|
183. | What is Shadow IT? | 263 | |
|
184. | Kubernetes Operators Explained | 263 | |
|
185. | What is TensorFlow? | 377 | |
|
186. | Don't Let Your Phone Get Juice Jacked! | 260 | |
|
187. | Cybersecurity Architecture: Detection | 259 | |
|
188. | Transactional vs. Analytical Workloads | 258 | |
|
189. | The History of Chatbots | 256 | |
|
190. | What is Retrieval-Augmented Generation (RAG)? | 255 | |
|
191. | What tech topics are YOU interested in? | 253 | |
|
192. | What is Conversational AI? | 251 | |
|
193. | Security Role Management Best Practices | 251 | |
|
194. | Securing Your IoT Devices | 250 | |
|
195. | AI Systems vs Traditional Coding | 597 | |
|
196. | Cost of a Data Breach 2024 Trends | 317 | |
|
197. | How to Add AI to Your Apps Faster with Embedded AI | 245 | Guide |
|
198. | Machine Learning Basics: Supervised v Unsupervised | 243 | |
|
199. | Containers vs Pods | 474 | |
|
200. | What is ASM (Attack Surface Management)? | 242 | |
|