Cyberwar Threat In the early ages of the internet, not much was known regarding cybersecurity as much as it was a threat back then. While the previous documentary touched upon the dangers of hacking and the usefulness of...
In the early ages of the internet, not much was known regarding cybersecurity as much as it was a threat back then. In this documentary, Rise of the Hackers, covers the process of cybersecurity specialists Liam O'Murchu...
Viruses and Malware -- a computer security vulnerability wherein one computer could send another instructions to delete everything on it or take it over, or impersonate another's identity by guessing, cracking, or extracting...
1. How is encryption accomplished to safeguard data exchange?
Photo from cdn.pixel.privacy.com
According to us.norton.com, Encryption is the process of converting ordinary text, such as a typed email or message,...
Here's some back-to-back content, as this post is related to my previous big data one. Here's some more thoughts on Big Data:
How is Big Data related to Computer Science?
According to www.educba.com, big data falls...
Hello! I've heard that this 'big data' will be an important term later in the year, but to think that 'later' would come to be now. times flies. Here are three videos showcasing application Big Data to get a better wrap around the concept.
1st Video: What is Big Data and How Does it Work?
The video dives straight...
Hi! Seeing concentrations and clusters of data make me dizzy, especially when they're formatted in spreadsheets. I wish analyzing information could be as easy as reading from a picture book.
But...
Welcome! This is a personal blog for my scribbles and scrawls. I take pride in my effort and prioritize quality and growth. For those visiting, please watch my progress!