A.I. Artificial Intelligence

To understand how A.I. Artificial Intelligence functions are developed, we first need to understand the…
Tunisa

Technology Experiences & Opportunities- TUNISIA

Technology opportunities in Tunisia. It is always really good to meet and experience Tunisians especially…

Adept Development History on Mobile Technology

In January 2003 Adept Technologies went Live with a revolutionary Mobile Inspections software system that…

JBS SA the latest victim of cyberattacks

Hackers increasingly target critical infrastructure. JBS SA, the largest meat producer globally is the latest…

Nmap Decoy Scans – The Hamburger

TLP: Public Nmap Decoy Scans – The Hamburger Hackers are using the nmap -D option…

Common incoming TCP/UDP hacker scans against your firewall

TLP:Public Common TCP and UDP port scans that people see against their firewalls. Since March…

The Hidden China’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking

Hijacking Internet Traffic not covered by the anti-theft 2015 Xi-Obama Agreement Surprisingly, the voluntary 2015…

Is Blockchain Technology Seriously Overvalued?

Is Blockchain Technology Seriously Overvalued? What amazes me these days is how people can take…