Home
Search results “Cryptographically private support vector machines in r”
Blockchain Consensus Algorithms and Artificial Intelligence
 
31:17
Is blockchain + AI a winning combo? Yes! They are complementary technologies, and knowing how both work will make you a much more powerful developer. Artificial Intelligence can use the power of the blockchain to audit data, add incentives to its goals, and even create new types of meritocratic organizations. In this video, i'll talk about how they can both work together, code out the proof of work algorithm in python, then talk about a few other consensus algorithms at a high level. Code for this video: https://github.com/llSourcell/blockchain_consensus Please Subscribe! And like. And comment. That's what keeps me going. Follow me: Twitter: https://twitter.com/sirajraval Facebook: https://www.facebook.com/sirajology More Learning Resources: https://blog.bigchaindb.com/blockchains-for-artificial-intelligence-ec63b0284984 https://www.topbots.com/combination-ai-blockchain-revolutionize-10-industries/ https://blog.oceanprotocol.com/from-ai-to-blockchain-to-data-meet-ocean-f210ff460465 https://www.slideshare.net/bicalabs/artificial-intelligence-blockchain-synergy https://blog.ethereum.org/2014/05/06/daos-dacs-das-and-more-an-incomplete-terminology-guide/ https://bitcoinmagazine.com/articles/bootstrapping-a-decentralized-autonomous-corporation-part-i-1379644274/ https://www.wired.com/2016/06/50-million-hack-just-showed-dao-human/ Join us in the Wizards Slack channel: http://wizards.herokuapp.com/ And please support me on Patreon: https://www.patreon.com/user?u=3191693 Instagram: https://www.instagram.com/sirajraval/ Instagram: https://www.instagram.com/sirajraval/ Signup for my newsletter for exciting updates in the field of AI: https://goo.gl/FZzJ5w
Views: 42991 Siraj Raval
NEO DevCon 2019 DAY 1 Live Streaming 2019/02/16
 
07:40:28
NEO DevCon 2019 DAY 1 Live Streaming 2019/02/16 Timestamps: 6:42 The Promise of the Smart Economy - Da Hongfei, Founder 42:35 Possible Improvements in NEO 3.0 - Erik Zhang, Founder 1:04:25 NEO Global Growth - Zhao Chen, General Manager, NGD --- Break --- 1:44:44 Blockchain for Digital Transformation - Drew Gude, Managing Director, Microsoft Digital Worldwide 2:06:48 Big Trend in Blockchain - Miha Kralj, Managing Director, Accenture 2:23:42 Regulator’s Perspective in Blockchain - Dr. Joseph Williams, ICT Industry Sector Lead 2:37:00 Blockchain Use Cases and Enterprise Needs on the Microsoft Platform - Pablo Junco, Director, Worldwide Apps Solutions Strategy, Microsoft --- Break --- 4:01:43 NEO Protocol Quality Assurance - Peter Lin, R&D Director, NGD 4:23:35 NEO Developer Guide - Longfei Wang - Software Developer, NGD 4:35:25 Seraph ID – Self-sovereign Identity on NEO - Waldemar Scherer, Head of Enterprise Blockchain 4:54:50 Panel: About Decentralization - Waldemar Scherer; Fabio C.Canesin; Peter Lin; Douwe van de Ruit 5:18:00 Many Ways to Double Spend Your Cryptocurrency - Dr. Zhiniang Peng, Security Researcher, Qihoo 360 5:34:40 Building Trustworthy Blockchain Ecosystems - Dr. Ronghui Gu, Certik, CEO 6:09:51 XLang - Harry Pierson, Program Manager for Xlang, Microsoft 6:30:08 Panel: How to Expand Developer Communities - Brett Rhodes ("Edgegasm") et al. 6:55:00 Cryptoeconomics and the Future of the Global Economy - Dr. Chris Berg, Senior Research fellow, RMIT 7:12:40 NEO.GAME - Blockchain Game One Stop Solution - John Wang, Ecosystem Growth Manager, NGD 7:26:52 NEO Friends Initiative - Tamar Salant, Ecosystem Growth Manager, NGD For more info, please visit: https://devcon.neo.org/
Views: 8223 NEO Smart Economy
NEO DevCon 2019 DAY 2 Live Streaming 2019/02/17
 
08:11:13
NEO DevCon 2019 DAY 2 Live Streaming 2019/02/17 Timestamps: 14:29 Cryptoeconomics and Data Metrics for the Next Market Cycle - Nolan Bauerle, Director of Research,Coindesk 39:20 NEL - bring NEO One Step Closer to Users - Liu Yongxin, Founder, NEL and NNS 50:00 Perspectives on Cryptography, Consensus Mechanisms & High-Performance Computing for NEO 3.0 - Sergei Liubich, Anatoly Bogatyrev --- Break --- 1:35:29 Secure Development in Cryptocurrencies - Fernando Díaz Toledano; Diego Jurado Pallarés 1:49:08 Panel: User Experience and Security Enhancements of NEO Wallets - Merten; Lasky; Knight; DiCarlo 2:11:15 Celer Network: Bring Internet-Scale Adoption to Every Blockchain - Dr. Junda Liu, Co-founder, Celer Network 2:31:56 ONI - A Sharing Infrastructure & Platform - Fu Xiang, Senior System Engineer, Onchain --- Break --- 4:06:58 Distributing Finance for Everyone - Fabio C.Canesin, Co-founder, CoZ and Nash 4:22:16 RegTech for the Smart Economy - Stephen Hyduchak; Alex Guba 4:36:28 The Moonlight Project and Its Future - Alan Fong, Co-Founder, Moonlight.io 4:53:33 Build & Publish Blockchain Game with BlaCat - Sean Chen, Founder, Blacat 5:14:22 Panel: About Blockchain Game - Peterson; Deshpande; Rong; Chen; Rayman 5:34:33 Guardian Circle - Mark Jeffrey, Co-Founder and CEO, Guardian Circle 5:47:10 Owning Your Data - Jonathan Meiri -CEO and Founder, Barrel Protocol --- Break --- 6:20:55 Embrace the New Economy - Joe Zhou, Co-founder, Jarvis+ 6:38:00 Designing a Blockchain-based File Storage System for NEO - Eric Wang, Co-founder, Archon 6:49:55 Stable Coin, an Infrastructure of Blockchain - Chris Qi, CTO, Alchemint 7:17:10 Panel:What You Should Know about STO - Beedham; Myint; Salant; Ng; Tong 7:41:17 How Regtech Prevents Cybercrime with Enhanced Visibility - Alek Tan, CEO, InnoDT Inc. 7:52:27 NEO Health Medical Encyclopedia - Dr. Brad Mattson, Founder, NEO Health For more info, please visit: https://devcon.neo.org/
Views: 6097 NEO Smart Economy
Final Year Projects 2015 | Detection Of Thunderstorms Using Data Mining and Image Processing
 
08:38
Including Packages ======================= * Base Paper * Complete Source Code * Complete Documentation * Complete Presentation Slides * Flow Diagram * Database File * Screenshots * Execution Procedure * Readme File * Addons * Video Tutorials * Supporting Softwares Specialization ======================= * 24/7 Support * Ticketing System * Voice Conference * Video On Demand * * Remote Connectivity * * Code Customization ** * Document Customization ** * Live Chat Support * Toll Free Support * Call Us:+91 967-774-8277, +91 967-775-1577, +91 958-553-3547 Shop Now @ http://clickmyproject.com Get Discount @ https://goo.gl/lGybbe Chat Now @ http://goo.gl/snglrO Visit Our Channel: http://www.youtube.com/clickmyproject Mail Us: [email protected]
Views: 339 Clickmyproject
Protecting Patient Privacy in Genomic Analysis
 
24:27
One of the challenges for patients with rare diseases is the lack of local data to use for analysis. As a result, patients are having to rely on 3rd party facilities to carry out the computations based on data collected around the globe. But due to patient privacy concerns, as well as heavy legal and regulatory barriers, these facilities are often prevented from sharing vital data which could help save lives. Join David Wu as he discusses how modern cryptographic tools can be leveraged for genome privacy. Screen reader support enabled. This presentation is brought to you by the Stanford Computer Forum and the Stanford Advanced Computer Security Program. If you would like information on how to join the forum and attend the next meeting, see our website: http://forum.stanford.edu/about/howtojoin.php
Views: 324 stanfordonline
15. Medical Software
 
01:15:31
MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: Kevin Fu In this lecture, Kevin Fu from the University of Michigan delivers a guest lecture on medical software. License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu
Views: 5023 MIT OpenCourseWare
Chrome Event - 12/07/2010
 
01:32:55
Video Footage from the Chrome event on 12/07/10. Sundar Pichai, Product Management Lead for Chrome announces upcoming speed improvements for Chrome, introduces the Chrome Web Store and the Chrome OS pilot program. Learn more at google.com/chrome, chrome.google.com/webstore and google.com/chromeos.
Views: 143728 Google Chrome
Defeat 2FA token because of bad randomness - rhme2 Twistword (Misc 400)
 
10:25
Generating random numbers on computers is not easy. And while the intended solution was really hard, the challenge had a problem with the random number generation, which allowed me to solve it. Clarification from Andres Moreno (riscure) on the challenge: "The "official" challenge solution involved reading the tiny Mersenne twister (tinyMT) paper, writing some equations, and using a solver. The tinyMT is tricky to initialize. Giving a proper seed is not enough. You need to provide initial state matrices with certain properties (there is a generator for this). The challenge used improper initialized matrices (zeros) that reduced the PRNG period. During tests, we found that ~12hr were needed to solve the challenge (solver time only), but we did not test the amount of entropy reduction by improper state initialization. Fortunately, the problem was not in the PRNG." -=[ 🔴 Stuff I use ]=- → Microphone:* https://amzn.to/2LW6ldx → Graphics tablet:* https://amzn.to/2C8djYj → Camera#1 for streaming:* https://amzn.to/2SJ66VM → Lens for streaming:* https://amzn.to/2CdG31I → Connect Camera#1 to PC:* https://amzn.to/2VDRhWj → Camera#2 for electronics:* https://amzn.to/2LWxehv → Lens for macro shots:* https://amzn.to/2C5tXrw → Keyboard:* https://amzn.to/2LZgCFD → Headphones:* https://amzn.to/2M2KhxW -=[ ❤️ Support ]=- → per Video: https://www.patreon.com/join/liveoverflow → per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ 🐕 Social ]=- → Twitter: https://twitter.com/LiveOverflow/ → Website: https://liveoverflow.com/ → Subreddit: https://www.reddit.com/r/LiveOverflow/ → Facebook: https://www.facebook.com/LiveOverflow/ -=[ 📄 P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #CTF #Cryptography
Views: 19182 LiveOverflow
Using z3 to find a password and reverse obfuscated JavaScript - Fsec2017 CTF
 
10:33
Recently I attended fsec 2017 in croatia. And there was a cool CTF challenge I solved during the conference that I wanted to share. script: https://gist.github.com/LiveOverflow/11bde6352f52be33864f1fd657e7cde1 -=[ 🔴 Stuff I use ]=- → Microphone:* https://amzn.to/2LW6ldx → Graphics tablet:* https://amzn.to/2C8djYj → Camera#1 for streaming:* https://amzn.to/2SJ66VM → Lens for streaming:* https://amzn.to/2CdG31I → Connect Camera#1 to PC:* https://amzn.to/2VDRhWj → Camera#2 for electronics:* https://amzn.to/2LWxehv → Lens for macro shots:* https://amzn.to/2C5tXrw → Keyboard:* https://amzn.to/2LZgCFD → Headphones:* https://amzn.to/2M2KhxW -=[ ❤️ Support ]=- → per Video: https://www.patreon.com/join/liveoverflow → per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ 🐕 Social ]=- → Twitter: https://twitter.com/LiveOverflow/ → Website: https://liveoverflow.com/ → Subreddit: https://www.reddit.com/r/LiveOverflow/ → Facebook: https://www.facebook.com/LiveOverflow/ -=[ 📄 P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #CTF
Views: 32803 LiveOverflow
3. Buffer Overflow Exploits and Defenses
 
01:21:38
MIT 6.858 Computer Systems Security, Fall 2014 View the complete course: http://ocw.mit.edu/6-858F14 Instructor: James Mickens In this lecture, Professor Mickens discusses topics related to buffer overflow exploits, including baggy bounds handling, mitigation approaches, and return-oriented programming. License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu
Views: 25054 MIT OpenCourseWare
Blockchain Tutorial | Blockchain Technology | Blockchain Explained | Blockchain Training | Edureka
 
01:16:43
( Blockchain Training : https://www.edureka.co/blockchain-training ) This Edureka Blockchain Tutorial video will give you a complete fundamental understanding regarding Blockchain and Bitcoin. This video helps you to learn following topics: 1. Issues With The Current Banking System. 2. How Bitcoin Can Help Overcome These Issues? 3. Bitcoin Transaction 4. Blockchain To The Rescue 5. Blockchain Concepts 6. Blockchain Features 7. Blockchain Use Case 8. Demo: Banking Use Case Check out our Blockchain Tutorial Playlist: http://bit.ly/2PZb8fd Subscribe to our channel to get video updates. Hit the subscribe button above. Facebook: https://www.facebook.com/edurekaIN/ Twitter: https://twitter.com/edurekain LinkedIn: https://www.linkedin.com/company/edureka #Blockchain #Blockchaintutorial #Blockchainonlinetraining #Blockchainforbeginners How it Works? 1. This is a 4 Week Instructor led Online Course, 20 hours of assignment and 20 hours of project work 2. We have a 24x7 One-on-One LIVE Technical Support to help you with any problems you might face or any clarifications you may require during the course. 3. At the end of the training you will be working on a real time project for which we will provide you a Grade and a Verifiable Certificate! - - - - - - - - - - - - - - - - - About the Course Edureka's Blockchain Course is designed to introduce you to the concept of Blockchain and explain the fundamentals of blockchain and bitcoin. Blockchain course will provide an overview of the structure and mechanism of blockchain. As a beginner, you will be learning the importance of consensus in transactions, how transactions are stored on blockchain, history of bitcoin and how to use bitcoin. Furthermore, you will be taught about the Ethereum platform and its programming language. You will setup your own private blockchain environment using Ethereum. Also, you will develop a smart contract on private Ethereum blockchain and will be deploying the contract from web and console. The course is fed with various use-cases and examples, which makes the learning more interesting. After completing this Course, you should be able to: 1. Comprehend the cryptography and cryptocurrency concepts 2. Encompass the concept of blockchain 3. Understand the importance of blockchain technology 4. Have a deep insight into bitcoin and its network 5. Perceive, how bitcoin transactions are validated by miners 6. Create and use bitcoin account effectively 7. Understand Ethereum blockchain 8. Learn Solidity: Prominent language to develop smart contracts 9. Deploy your private blockchain on web where you can visually see your chains 10. Send transactions between nodes 11. Develop more than one nodes on same blockchain 12. Making your own cryptocurrency 13. Discuss the compelling use-cases of the blockchain 14. Interpret the prospects of blockchain. 15. Assess, how blockchain can improve your business standards. ----------------------------------- Who should go for this course? Anyone having basic programming knowledge and has a zeal to learn new technology can take up the course. Students and professionals aspiring to make a career in the Blockchain technology should opt for the course. ----------------------------------- Why learn Blockchain? Blockchain is a revolutionary technology. It is an ordered back linked-list data structure of blocks of transactions stored in a decentralized peer- to-peer network. It is the underlying infrastructure for bitcoin, a popular cryptocurrency. In near future, many companies will be adopting blockchain technologies for trading publicly. Apart from bitcoin, it can be used for a wide variety of applications such as tracking ownership, digital assets, physical assets, or voting rights. It can also store and run computer code called ‘smart contracts’. However, blockchain is still new and the communities are still exploring the best ways in which it can be used. For more information, Please write back to us at [email protected] or call us at IND: 9606058406 / US: 18338555775 (toll free).
Views: 358596 edureka!
The Ethics and Governance of AI opening event, February 3, 2018
 
03:57:07
Chapter 1: 0:04 - Joi Ito Chapter 2: 1:03:27 - Jonathan Zittrain Chapter 3: 2:32:59 - Panel 1: Joi Ito moderates a panel with Pratik Shah, Karthik Dinakar, and Vikash Mansinghka Chapter 4: 3:19:13 - Panel 2: Joi Ito moderades a panel with Kade Crockford (ACLU), Chris Bavitz (), and Adam Foss() discuss the implications of AI for social and criminal justice. More information at: https://www.media.mit.edu/courses/the-ethics-and-governance-of-artificial-intelligence/ License: CC-BY-4.0 (https://creativecommons.org/licenses/by-nc/4.0/)
Views: 5760 MIT Media Lab
Bitcoin (ft. Rachid Guerraoui & Jad Hamza)
 
13:25
This video introduces Bitcoin. Bitcoin is a decentralized crypto-currency that might be opening the door to new ways of trading. It features Professor Rachid Guerraoui and Doctor Jad Hamza of the IC School at EPFL. http://lpdwww.epfl.ch/rachid/ https://people.epfl.ch/jad.hamza?lang=fr The Blockchain (ft. Rachid Guerraoui & Jad Hamza) https://www.youtube.com/watch?v=OzMPRAZr0-E 2 Challenges in Cryptography Research (ft. Serge Vaudenay) https://www.youtube.com/watch?v=ud1-FQVngJA The Diffie-Hellman Protocol (ft. Serge Vaudenay) https://www.youtube.com/watch?v=kOlCU4not0s How Miners Secure Bitcoin & Blockchains (ft. Hamza, Pavlovic & Wang) https://www.youtube.com/watch?v=pftrbzWM33Q Attacks of the Bitcoin Protocol (ft. Matej Pavlovic) https://www.youtube.com/watch?v=1sdrgDfBZog
Views: 2201 ZettaBytes, EPFL
The Looming Fork (August 2015 - Eli S, Ron G, Jonathan R, Eli B, Nadav I, Ariel H)
 
01:36:15
פאנל הדן בבעיית הפיצול השנוי במחלוקת הצפוי לינואר 2016, בין מימושי הפרוטוקול של Bitcoin Core ו - Bitcoin-XT. בהנחיית אלי סקלאר ובהשתתפות רון גרוס, יונתן רואש, אלי בז'רנו, נדב איבגי ואריאל הורביץ. דף האירוע: http://www.meetup.com/bitcoin-il/events/224746783/
Views: 928 Bitcoin Israel
10 Differences Between DFINITY and Ethereum | INSIDE DFINITY
 
11:57
In this video, we answer one of the most asked questions we get: Robert and I list the 10 key differences between Ethereum and DFINITY. Some of the key differences stem from DFINITY's new consensus protocol and we list those. But we start with differences on other layers. Dive in to hear all ten key differences between Ethereum and DFINITY! 10 Differences Between DFINITY and Ethereum: [0:37] 1. Internet Computer vs. Smart Contract Platform [1:11] 2. On-Chain Governance vs. Off-Chain Governance [1:50] 3. Actor Model vs. Serialized Contract Execution [2:14] 4. WebAssembly (WASM) vs. Domain-Specific Languages [3:18] 5. Proof of Stake vs. Proof of Work [4:29] 6. Fixed-Sized Deposits vs. Variably-Sized Deposits [5:09] 7. Security over Liveness vs. Liveness over Security [6:36] 8. Random Beacon vs. Proof of Work [8:23] 9. Cryptographic Finality vs. Economic Finality [10:10] 10. Finality Time: 2 Blocks vs. 125 Blocks About Cédric: Cédric Waldburger joined DFINITY early on and is now focusing on the Growth. He leads the initiatives on Developer and Mining adoption, alongside with heading some of DFINITY's partnerships. Prior to joining DFINITY, he's been a founder and investor and has been a crypto enthusiast since 2012. He has been passionate about startups. Having founded his first company at the age of 14, he has built various tech companies related to productivity, computer vision, and cryptocurrencies. In this immensely exciting and obliging journey, he instigates the avenues of bringing the maximum impact wherever he can and is skilled to. For accomplishing this journey and his drive, he hasn't owned an apartment in several years. Instead, he has since lived out of a bag with only 64 things. About DFINITY: The DFINITY project was formed to research ways of enabling public decentralized networks to host a virtual computer of unlimited capacity. This rests upon a new blockchain computer that is similar in concept to Ethereum but has vastly improved performance and, ultimately, unlimited capacity. Follow Cédric: Blog: http://www.cedricwaldburger.com YouTube: http://www.youtube.com/cedricwaldburger Instagram: http://www.instagram.com/cedricwaldburger/ Facebook (private): http://www.facebook.com/cediwaldburger Twitter: http://www.twitter.com/cediwaldburger Follow DFINITY: Blog: http://medium.com/dfinity YouTube: https://www.youtube.com/dfinity Facebook: https://www.facebook.com/dfinity.org/ Twitter: http://twitter.com/dfinity Reddit: http://reddit.com/r/dfinity Telegram: https://t.me/dfinity Rocket.Chat: https://dfinity.rocket.chat/
Views: 1498 DFINITY
Why Dash is the Most Sybil Attack-Resistant Cryptocurrency -- By Far
 
08:05
A Sybil Attack in a peer-to-peer network happens when one person uses many, many nodes for a malicious end. How is this achieved, and what does it cost? Amanda B. Johnson explains why Dash in particular is uniquely resistant -- highly resistant -- to such attacks, and what this means. Special thanks to Dash community members Alex-ru, moocowmoo, Raptor73, and UdjinM6 for insight and graphics. CONNECT - Amanda’s Twitter: http://twitter.com/amandab_johnson - Amanda’s Facebook: http://facebook.com/dashingamandabjohnson - Dash-related online discussion: http://dashnation.com/chat - Dash homepage: http://dash.org SUBSCRIBE - Send an email to [email protected] with “subscribe” in the subject line MUSIC - "First Day" by Huma-Huma https://www.youtube.com/watch?v=iSNaDtwMl44
Views: 6000 Dash - Digital Cash
Azure Friday | Azure Location Based Services
 
15:38
Chris Pendleton joins Scott Hanselman to discuss Azure Location Based Services, which is a portfolio of geospatial service APIs natively integrated into Azure that enables developers, enterprises, and ISVs to create location-aware apps and IoT, mobility, logistics, and asset tracking solutions. The portfolio currently comprises of services for Map Rendering, Routing, Search, Time Zones and Traffic. For more information, see: Azure Location Based Services (overview) - https://azure.microsoft.com/en-us/services/location-based-services/ Azure Location Based Services (docs) - https://docs.microsoft.com/en-us/azure/location-based-services/
Views: 1081 Microsoft Azure
Troy McConaghy - BigchainDB - What's New in BigchainDB 2.0?
 
34:35
The latest release of BigchainDB has many changes, including a really major one: it's now Byzantine fault tolerant! Troy will talk about that and other changes. For example, did you know that you can now write an arbitrary MongoDB query to query the stored data? Troy tells all. This was also detailed on our blog: https://blog.bigchaindb.com/bigchaindb-2-0-is-byzantine-fault-tolerant-5ffdac96bc44 Connect with Troy on Twitter @TroyMc
Views: 527 BigchainDB
The  IBM z13s &  z13 hardware and software stack explained
 
47:02
Technical presentation by Eldee Stephens, IBM z Systems Next Bringup Lead at IBM Interconnect 2016. Mr. Stephens describes the objectives for introducing the z13 family and the technical options and choices that went into developing the hardware and software stack of the newest z Systems. For more information, visit us on the web: Hardware options: IBM z13 http://www.ibm.com/systems/z/hardware/z13.html IBM z13s http://www.ibm.com/systems/z/hardware/z13s.html IBM System Software on z Systems http://www.ibm.com/systems/z/software/ Stay in Touch: Subscribe to our YouTube channel: https://www.youtube.com/user/IBMSystemZ IBM Client References: http://ibm.co/206T9SG Follow us on Twitter: https://twitter.com/IBMzSystems
Views: 10746 IBM Z
Google I/O 2016 - Day 1 Track 3
 
06:57:52
For Captions: https://youtu.be/YqXq0wbI9wo
Views: 29884 Google Developers
Livestream Day 3: Stage 2 (Google I/O '18)
 
07:51:52
This livestream covers all of the Google I/O 2018 day 3 sessions that take place on Stage 2. Stay tuned for technical sessions and deep dives into Google's latest developer products and platforms. Event schedule (all times are PDT) → https://goo.gl/x5ENpG 25:57 - Deliver search-friendly JavaScript-powered websites 1:23:19 - The future of computing: a conversation with John Hennessy 2:21:47 - Android Jetpack: sweetening Kotlin development with Android KTX 3:20:46 - TensorFlow and deep reinforcement learning, without a PhD 4:20:53 - Improve app performance with Android Studio Profilers 6:21:02 - Migrate your existing app to target Android Oreo and above 7:20:56 - Build engaging conversations for the Google Assistant with DialogFlow Google I/O 2018 All Sessions playlist → https://goo.gl/q1Tr8x Subscribe to the Google Developers channel → http://goo.gl/mQyv5L Music by Terra Monk → https://goo.gl/wPgbHP
Views: 11681 Google Developers
The Data and Application Security and Privacy (DASPY) Challenge
 
01:05:28
SPEAKER & AFFILIATION: Ravi Sandhu, University of Texas at San Antonio DESCRIPTION & LINK: This lecture has been videocast from the Computer Science Department at NCSU. The abstract of this lecture and a brief speaker biography is available at http://research.csc.ncsu.edu/colloquia/seminar-post.php?id=413. For a complete transcript of this lecture, go to http://www.ncsu.edu/youtube/transcript/sandhu-transcript.doc.
Views: 717 NCState
Google I/O 2014 - HTTPS Everywhere
 
45:45
Speaker(s): Ilya Grigorik, Pierre Far Description: Data delivered over an unencrypted channel is insecure, untrustworthy, and trivially intercepted. We must protect the security, privacy, and integrity of our users data. In this session we will take a hands-on tour of how to make your websites secure by default: the required technology, configuration and performance best practices, how to migrate your sites to HTTPS and make them user and search friendly, and more. Your users will thank you. Watch all Google I/O 2014 videos at: g.co/io14videos
Views: 139682 Google Developers
Portable Document Format
 
01:01:01
Portable Document Format (PDF) is a file format used to present documents in a manner independent of application software, hardware, and operating systems. Each PDF file encapsulates a complete description of a fixed-layout flat document, including the text, fonts, graphics, and other information needed to display it. In 1991, Adobe Systems co-founder John Warnock outlined a system called "Camelot" that evolved into PDF. While Adobe Systems made the PDF specification available free of charge in 1993, PDF was a proprietary format, controlled by Adobe, until it was officially released as an open standard on July 1, 2008, and published by the International Organization for Standardization as ISO 32000-1:2008, at which time control of the specification passed to an ISO Committee of volunteer industry experts. In 2008, Adobe published a Public Patent License to ISO 32000-1 granting royalty-free rights for all patents owned by Adobe that are necessary to make, use, sell and distribute PDF compliant implementations. However, there are still some technologies referenced by ISO 32000-1 that can be incorporated into valid PDF files that remain proprietary (but still publicly documented), such as Adobe XML Forms Architecture, and JavaScript for Acrobat. The ISO committee is actively standardizing many of these as part of ISO 32000-2. This video is targeted to blind users. Attribution: Article text available under CC-BY-SA Creative Commons image source in video
Views: 382 Audiopedia
Mod-01 Lec-03 Naming and Storing
 
55:12
Storage Systems by Dr. K. Gopinath,Department of Computer Science and Engineering,IISc Bangalore.For more details on NPTEL visit http://nptel.ac.in
Views: 1889 nptelhrd
Science and technology in Venezuela | Wikipedia audio article
 
02:17:50
This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/Science_and_technology_in_Venezuela 00:03:04 1 Biology 00:03:13 1.1 Ecology 00:15:45 1.2 Epidemiology 00:25:24 1.3 Microbiology 00:29:30 1.4 Immunology 00:34:59 2 Chemistry 00:35:07 2.1 Electro-chemistry 00:37:52 2.2 Food chemistry 00:41:27 2.3 Inorganic chemistry 00:45:04 2.4 Organic chemistry 00:50:56 3 Engineering 00:51:05 3.1 Civil engineering 00:53:29 3.2 Hydraulic engineering 00:54:48 3.3 Food engineering 00:57:28 3.4 Structural engineering 00:59:38 3.5 Petroleum engineering 01:01:01 4 Inventors 01:14:48 5 Mathematics 01:14:57 5.1 Calculus 01:24:00 6 Medicine 01:24:09 6.1 Experimental medicine 01:31:21 6.2 Internal medicine 01:35:25 6.3 Surgery 01:44:10 7 Physics 01:44:19 7.1 Astrophysics 01:49:01 7.2 Particle physics 01:51:45 7.3 Theoretical physics 01:53:27 8 Social sciences 01:53:36 8.1 Education 01:56:20 8.2 Sociology 02:01:11 8.3 Science journalism 02:03:31 9 Technology 02:03:40 9.1 Computer science 02:11:10 9.2 Materials Technology 02:13:18 10 Scientific institutions 02:17:29 11 See also Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. Listen on Google Assistant through Extra Audio: https://assistant.google.com/services/invoke/uid/0000001a130b3f91 Other Wikipedia audio articles at: https://www.youtube.com/results?search_query=wikipedia+tts Upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts Speaking Rate: 0.7382326410246569 Voice name: en-AU-Wavenet-D "I cannot teach anybody anything, I can only make them think." - Socrates SUMMARY ======= Science and technology in Venezuela includes research based on exploring Venezuela's diverse ecology and the lives of its indigenous peoples. Under the Spanish rule, the monarchy made very little effort to promote education in the American colonies and in particular in those in which they had less commercial interest, as in Venezuela. The country only had its first university some two hundred years later than Mexico, Colombia or Peru. The first studies on the native languages of Venezuela and the indigenous customs were made in the middle of the XVIII century by the Catholic missionaries. The Italian Jesuit Filippo Salvatore Gilii was one of the first to theorize about linguistic relations and propose possible language families for the Orinoco river basin. The Swedish botanist Pehr Löfling, one of the 12 Apostles of Carl Linnaeus, classificated for the first time the exhuberant tropical flora of the Orinoco river basin. In the XIX century several scientists visited Venezuela such as Alexander Humboldt, Aimé Bonpland, Agostino Codazzi, Jean-Baptiste Boussingault, Mariano Rivero, François de Pons, Robert Hermann Schomburgk, Wilhelm Sievers, Carl Ferdinand Appun, Gustav Karsten, Adolf Ernst, Benedikt Roezl, Karl Moritz, Friedrich Gerstäcker, Anton Goering, Johann Gottlieb Benjamin Siegert, Alfred Russel Wallace, Jean Chaffanjon, Émile-Arthur Thouar, Jules Crevaux and many others, some of whom are buried in Venezuela. The Venezuelan Institute for Scientific Research (IVIC) founded on February 9, 1959 by government decree, has its origins in the Venezuelan Institute of Neurology and Brain Research (IVNIC) which Dr. Humberto Fernandez Moran founded in 1955. Other major research institutions include the Central University of Venezuela and the University of the Andes, Venezuela. Notable Venezuelan scientists include nineteenth century physician José María Vargas , the chemist Vicente Marcano and the botanist and geographer Alfredo Jahn (1867–1940). More recently, Baruj Benacerraf shared the 1980 Nobel Prize in Physiology or Medicine, Augusto Pi Sunyer (1955), Aristides Bastidas (1980), Marcel Roche (1987) and Marisela Salvatierra (2002) have been recipients of UNESCO's Kalinga Prize for promotion of the public understanding of science. On July 2, 2012, L. Rafael Reif – a Venezuelan American electrical engineer, inventor and academic administrator – was elected president of the Massachusetts Institute of Technology.
Views: 69 wikipedia tts
Computer insecurity | Wikipedia audio article
 
01:24:31
This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/Computer_security 00:00:48 1 Vulnerabilities and attacks 00:01:42 1.1 Backdoor 00:02:20 1.2 Denial-of-service attacks 00:03:25 1.3 Direct-access attacks 00:04:12 1.4 Eavesdropping 00:04:57 1.5 Multivector, polymorphic attacks 00:05:26 1.6 Phishing 00:06:03 1.7 Privilege escalation 00:06:38 1.8 Social engineering 00:07:30 1.9 Spoofing 00:08:31 1.10 Tampering 00:08:54 2 Information security culture 00:11:08 3 Systems at risk 00:11:30 3.1 Financial systems 00:12:24 3.2 Utilities and industrial equipment 00:13:20 3.3 Aviation 00:14:24 3.4 Consumer devices 00:15:23 3.5 Large corporations 00:17:00 3.6 Automobiles 00:18:30 3.7 Government 00:19:11 3.8 Internet of things and physical vulnerabilities 00:20:30 3.8.1 Medical systems 00:21:22 3.9 Energy sector 00:22:20 4 Impact of security breaches 00:24:02 5 Attacker motivation 00:25:05 6 Computer protection (countermeasures) 00:25:38 6.1 Security by design 00:27:32 6.2 Security architecture 00:28:55 6.3 Security measures 00:32:01 6.4 Vulnerability management 00:32:56 6.5 Reducing vulnerabilities 00:34:53 6.6 Hardware protection mechanisms 00:38:37 6.7 Secure operating systems 00:39:46 6.8 Secure coding 00:40:24 6.9 Capabilities and access control lists 00:41:49 6.10 End user security training 00:43:15 6.11 Response to breaches 00:45:44 6.12 Types of security and privacy 00:46:43 7 Incident response planning 00:48:59 8 Notable attacks and breaches 00:49:16 8.1 Robert Morris and the first computer worm 00:50:03 8.2 Rome Laboratory 00:50:57 8.3 TJX customer credit card details 00:51:27 8.4 Stuxnet attack 00:52:00 8.5 Global surveillance disclosures 00:52:39 8.6 Target and Home Depot breaches 00:53:49 8.7 Office of Personnel Management data breach 00:54:47 8.8 Ashley Madison breach 00:55:43 9 Legal issues and global regulation 00:57:00 10 Role of government 00:58:32 11 International actions 00:59:41 11.1 Europe 01:00:35 12 National actions 01:00:45 12.1 Computer emergency response teams 01:01:03 12.2 Canada 01:02:45 12.3 China 01:03:55 12.4 Germany 01:05:04 12.5 India 01:06:17 12.6 South Korea 01:06:55 12.7 United States 01:07:04 12.7.1 Legislation 01:08:27 12.7.2 Agencies 01:11:47 12.7.3 Computer emergency readiness team 01:12:31 13 Modern warfare 01:13:39 14 Careers 01:14:42 14.1 Security analyst 01:15:29 14.2 Security engineer 01:16:04 14.3 Security architect 01:16:24 14.4 Security administrator 01:16:45 14.5 Chief Information Security Officer (CISO) 01:17:08 14.6 Chief Security Officer (CSO) 01:17:30 14.7 Security Consultant/Specialist/Intelligence 01:18:48 15 Terminology 01:24:17 16 Scholars Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. Listen on Google Assistant through Extra Audio: https://assistant.google.com/services/invoke/uid/0000001a130b3f91 Other Wikipedia audio articles at: https://www.youtube.com/results?search_query=wikipedia+tts Upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts Speaking Rate: 0.954540133231981 Voice name: en-GB-Wavenet-D "I cannot teach anybody anything, I can only make them think." - Socrates SUMMARY ======= Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide. The field is growing in importance due to increasing reliance on computer systems, the Internet and wireless networks such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions and the various tiny devices that constitute the Internet of things. Due to its complexity, both in terms of politics and technology, it is also one of the major challenges of the contemporary world.
Views: 17 wikipedia tts
Computer security | Wikipedia audio article
 
01:27:56
This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/Computer_security 00:00:50 1 Vulnerabilities and attacks 00:01:45 1.1 Backdoor 00:02:25 1.2 Denial-of-service attacks 00:03:31 1.3 Direct-access attacks 00:04:20 1.4 Eavesdropping 00:05:06 1.5 Multivector, polymorphic attacks 00:05:36 1.6 Phishing 00:06:14 1.7 Privilege escalation 00:06:50 1.8 Social engineering 00:07:44 1.9 Spoofing 00:08:48 1.10 Tampering 00:09:11 2 Information security culture 00:11:34 3 Systems at risk 00:11:57 3.1 Financial systems 00:12:52 3.2 Utilities and industrial equipment 00:13:50 3.3 Aviation 00:14:56 3.4 Consumer devices 00:15:56 3.5 Large corporations 00:17:37 3.6 Automobiles 00:19:10 3.7 Government 00:19:52 3.8 Internet of things and physical vulnerabilities 00:21:15 3.8.1 Medical systems 00:22:09 3.9 Energy sector 00:23:09 4 Impact of security breaches 00:24:54 5 Attacker motivation 00:25:59 6 Computer protection (countermeasures) 00:26:33 6.1 Security by design 00:28:32 6.2 Security architecture 00:29:58 6.3 Security measures 00:33:12 6.4 Vulnerability management 00:34:10 6.5 Reducing vulnerabilities 00:36:12 6.6 Hardware protection mechanisms 00:40:05 6.7 Secure operating systems 00:41:18 6.8 Secure coding 00:41:58 6.9 Capabilities and access control lists 00:43:25 6.10 End user security training 00:44:54 6.11 Response to breaches 00:47:31 6.12 Types of security and privacy 00:48:36 7 Incident response planning 00:50:57 8 Notable attacks and breaches 00:51:14 8.1 Robert Morris and the first computer worm 00:52:03 8.2 Rome Laboratory 00:53:00 8.3 TJX customer credit card details 00:53:30 8.4 Stuxnet attack 00:54:04 8.5 Global surveillance disclosures 00:54:44 8.6 Target and Home Depot breaches 00:55:58 8.7 Office of Personnel Management data breach 00:56:58 8.8 Ashley Madison breach 00:57:57 9 Legal issues and global regulation 00:59:16 10 Role of government 01:00:53 11 International actions 01:02:06 11.1 Europe 01:03:03 12 National actions 01:03:13 12.1 Computer emergency response teams 01:03:31 12.2 Canada 01:05:17 12.3 China 01:06:30 12.4 Germany 01:07:42 12.5 India 01:08:59 12.6 South Korea 01:09:39 12.7 United States 01:09:48 12.7.1 Legislation 01:11:16 12.7.2 Agencies 01:14:46 12.7.3 Computer emergency readiness team 01:15:32 13 Modern warfare 01:16:42 14 Careers 01:17:47 14.1 Security analyst 01:18:35 14.2 Security engineer 01:19:11 14.3 Security architect 01:19:31 14.4 Security administrator 01:19:52 14.5 Chief Information Security Officer (CISO) 01:20:16 14.6 Chief Security Officer (CSO) 01:20:39 14.7 Security Consultant/Specialist/Intelligence 01:21:59 15 Terminology 01:27:42 16 Scholars Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. Listen on Google Assistant through Extra Audio: https://assistant.google.com/services/invoke/uid/0000001a130b3f91 Other Wikipedia audio articles at: https://www.youtube.com/results?search_query=wikipedia+tts Upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts Speaking Rate: 0.7252017000131898 Voice name: en-AU-Wavenet-D "I cannot teach anybody anything, I can only make them think." - Socrates SUMMARY ======= Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide. The field is growing in importance due to increasing reliance on computer systems, the Internet and wireless networks such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions and the various tiny devices that constitute the Internet of things. Due to its complexity, both in terms of politics and technology, it is also one of the major challenges of the contemporary world.
Views: 9 wikipedia tts
List of fictional computers | Wikipedia audio article
 
02:15:41
This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/List_of_fictional_computers 00:00:49 1 Literature 00:00:58 1.1 Before 1950 00:02:32 1.2 1950s 00:07:25 1.3 1960s 00:14:52 1.4 1970s 00:22:08 1.5 1980s 00:29:00 1.6 1990s 00:36:23 1.7 2000s 00:40:32 1.8 2010s 00:42:58 1.9 Unsorted 00:43:14 2 Film 00:43:23 2.1 1950s 00:44:40 2.2 1960s 00:45:37 2.3 1970s 00:48:33 2.4 1980s 00:52:53 2.5 1990s 00:56:19 2.6 2000s 00:59:46 2.7 2010s 01:00:40 3 Radio 01:00:49 3.1 1970s 01:02:21 3.2 1980s 01:04:07 3.3 2000s 01:04:45 4 Television 01:04:54 4.1 1960s 01:09:25 4.2 1970s 01:14:04 4.3 1980s 01:21:45 4.4 1990s 01:29:38 4.5 2000s 01:37:42 4.6 2010s 01:41:32 5 Comics/graphic novels 01:41:42 5.1 Before 1980 01:43:37 5.2 1980s 01:45:15 5.3 1990s 01:47:02 5.4 2000s 01:49:17 6 Computer and video games 01:49:27 6.1 1980s 01:50:44 6.2 1990s 01:56:11 6.3 2000s 02:05:29 6.4 2010s 02:10:41 7 Board games and role-playing games 02:12:32 8 Unsorted works 02:14:14 9 Computers as robots 02:14:47 10 See also 02:15:07 11 Further reading Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. Listen on Google Assistant through Extra Audio: https://assistant.google.com/services/invoke/uid/0000001a130b3f91 Other Wikipedia audio articles at: https://www.youtube.com/results?search_query=wikipedia+tts Upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts Speaking Rate: 0.7445305888206474 Voice name: en-US-Wavenet-C "I cannot teach anybody anything, I can only make them think." - Socrates SUMMARY ======= Computers have often been used as fictional objects in literature, movies and in other forms of media. Fictional computers tend to be considerably more sophisticated than anything yet devised in the real world. This is a list of computers that have appeared in notable works of fiction. The work may be about the computer, or the computer may be an important element of the story. Only static computers are included. Robots and other fictional computers that are described as existing in a mobile or humanlike form are discussed in a separate list of fictional robots and androids.
Views: 132 wikipedia tts
Security (computing) | Wikipedia audio article
 
01:15:06
This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/Computer_security 00:00:42 1 Vulnerabilities and attacks 00:01:30 1.1 Backdoor 00:02:04 1.2 Denial-of-service attacks 00:03:01 1.3 Direct-access attacks 00:03:43 1.4 Eavesdropping 00:04:23 1.5 Multivector, polymorphic attacks 00:04:50 1.6 Phishing 00:05:23 1.7 Privilege escalation 00:05:54 1.8 Social engineering 00:06:40 1.9 Spoofing 00:07:34 1.10 Tampering 00:07:55 2 Information security culture 00:09:54 3 Systems at risk 00:10:15 3.1 Financial systems 00:11:03 3.2 Utilities and industrial equipment 00:11:53 3.3 Aviation 00:12:49 3.4 Consumer devices 00:13:43 3.5 Large corporations 00:15:08 3.6 Automobiles 00:16:28 3.7 Government 00:17:04 3.8 Internet of things and physical vulnerabilities 00:18:15 3.8.1 Medical systems 00:19:01 3.9 Energy sector 00:19:52 4 Impact of security breaches 00:21:22 5 Attacker motivation 00:22:17 6 Computer protection (countermeasures) 00:22:47 6.1 Security by design 00:24:28 6.2 Security architecture 00:25:42 6.3 Security measures 00:28:25 6.4 Vulnerability management 00:29:14 6.5 Reducing vulnerabilities 00:30:57 6.6 Hardware protection mechanisms 00:34:14 6.7 Secure operating systems 00:35:16 6.8 Secure coding 00:35:50 6.9 Capabilities and access control lists 00:37:05 6.10 End user security training 00:38:20 6.11 Response to breaches 00:40:32 6.12 Types of security and privacy 00:41:26 7 Incident response planning 00:43:24 8 Notable attacks and breaches 00:43:41 8.1 Robert Morris and the first computer worm 00:44:23 8.2 Rome Laboratory 00:45:11 8.3 TJX customer credit card details 00:45:39 8.4 Stuxnet attack 00:46:09 8.5 Global surveillance disclosures 00:46:44 8.6 Target and Home Depot breaches 00:47:47 8.7 Office of Personnel Management data breach 00:48:38 8.8 Ashley Madison breach 00:49:29 9 Legal issues and global regulation 00:50:37 10 Role of government 00:51:57 11 International actions 00:52:58 11.1 Europe 00:53:46 12 National actions 00:53:56 12.1 Computer emergency response teams 00:54:13 12.2 Canada 00:55:42 12.3 China 00:56:45 12.4 Germany 00:57:46 12.5 India 00:58:51 12.6 South Korea 00:59:26 12.7 United States 00:59:35 12.7.1 Legislation 01:00:50 12.7.2 Agencies 01:03:46 12.7.3 Computer emergency readiness team 01:04:26 13 Modern warfare 01:05:26 14 Careers 01:06:23 14.1 Security analyst 01:07:05 14.2 Security engineer 01:07:36 14.3 Security architect 01:07:55 14.4 Security administrator 01:08:15 14.5 Chief Information Security Officer (CISO) 01:08:36 14.6 Chief Security Officer (CSO) 01:08:56 14.7 Security Consultant/Specialist/Intelligence 01:10:05 15 Terminology 01:14:52 16 Scholars Listening is a more natural way of learning, when compared to reading. Written language only began at around 3200 BC, but spoken language has existed long ago. Learning by listening is a great way to: - increases imagination and understanding - improves your listening skills - improves your own spoken accent - learn while on the move - reduce eye strain Now learn the vast amount of general knowledge available on Wikipedia through audio (audio article). You could even learn subconsciously by playing the audio while you are sleeping! If you are planning to listen a lot, you could try using a bone conduction headphone, or a standard speaker instead of an earphone. Listen on Google Assistant through Extra Audio: https://assistant.google.com/services/invoke/uid/0000001a130b3f91 Other Wikipedia audio articles at: https://www.youtube.com/results?search_query=wikipedia+tts Upload your own Wikipedia articles through: https://github.com/nodef/wikipedia-tts Speaking Rate: 0.9816609836047523 Voice name: en-GB-Wavenet-B "I cannot teach anybody anything, I can only make them think." - Socrates SUMMARY ======= Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide. The field is growing in importance due to increasing reliance on computer systems, the Internet and wireless networks such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions and the various tiny devices that constitute the Internet of things. Due to its complexity, both in terms of politics and technology, it is also one of the major challenges of the contemporary world.
Views: 5 wikipedia tts