News
Google and Facebook working hard to clean image after the media backlash from the...
Last Friday’s uncontrolled spread of horrific videos on the Christchurch mosque attack and a propaganda coup for espousing hateful ideologies raised questions about social...
Defensive Strategies Industrial Organizations Can Use Against Cyber Attacks
Industrial organizations are prime targets for spies, criminals, hacktivists and even enemy countries. Spies from rival organizations seek ways to access industrial control systems...
How social media enabled and amplified the Christchurch terrorist attack
The recent horrifying terrorist attack in New Zealand has cast new blame on how technology platforms police content. There are now questions about whether...
Listen: UX designer Will Grant explains why good design probably can’t save the world...
UX designer has become a popular job role with tech recruiters, anxious to give roles a little extra sparkle and some additional sex appeal....
#GooglePayoutsForAll: A digital protest against Google’s $135 million execs payout for misconduct
The Google Walkout for Real Change group tweeted out their protest against the news of ‘Google confirming that it paid $135 million as exit...
Dr Joshua Eckroth on performing Sentiment Analysis on social media platforms...
Sentiment analysis is achieved by labeling individual words as positive or negative, among other possible sentiments such as happy, worried, and so on. The...



![Listen: UX designer Will Grant explains why good design probably can’t save the world [Podcast] Will Grant on UX in 2019](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190327131121im_/https:/hub.packtpub.com/wp-content/uploads/2019/03/iStock-1056306412-218x150.jpg)


![Adrian Pruteanu shows how to evade Intrusion Detection Systems using Proxy Cannon [Tutorial] dark web spy spy](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190327131121im_/https:/hub.packtpub.com/wp-content/uploads/2019/02/dark-web-spy-cyber-AI-bot-hacker-218x150.jpg)
![How AI is transforming the Smart Cities IoT? [Tutorial] Cognitive IoT: How Artificial Intelligence is remoulding Industrial and Consumer IoT](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190327131121im_/https:/hub.packtpub.com/wp-content/uploads/2018/05/iStock-872710520-218x150.jpg)
![Qt installation on different platforms [Tutorial]](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190327131121im_/https:/hub.packtpub.com/wp-content/uploads/2018/05/iStock-517668754-218x150.jpg)
![Debugging and Profiling Python Scripts [Tutorial] Python code pytorch](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190327131121im_/https:/hub.packtpub.com/wp-content/uploads/2018/03/Python-Code-Image-218x150.jpg)
























![Listen: UX designer Will Grant explains why good design probably can’t save the world [Podcast] Will Grant on UX in 2019](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190327131121im_/https:/hub.packtpub.com/wp-content/uploads/2019/03/iStock-1056306412-150x150.jpg)


![Listen: UX designer Will Grant explains why good design probably can’t save the world [Podcast] Will Grant on UX in 2019](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190327131121im_/https:/hub.packtpub.com/wp-content/uploads/2019/03/iStock-1056306412-324x400.jpg)
![Honeycomb CEO Charity Majors discusses observability and dealing with “the coming armageddon of complexity” [Interview] Charity Majors interview](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190327131121im_/https:/hub.packtpub.com/wp-content/uploads/2019/03/iStock-539648180-324x400.jpg)


![Security experts, Wolf Halton and Bo Weaver, discuss pentesting and cybersecurity [Interview] Packt and Humble Bundle come together for cybersecurity bundle](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190327131121im_/https:/hub.packtpub.com/wp-content/uploads/2018/11/iStock-961628368-324x400.jpg)

![Adrian Pruteanu shows how to evade Intrusion Detection Systems using Proxy Cannon [Tutorial] dark web spy spy](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190327131121im_/https:/hub.packtpub.com/wp-content/uploads/2019/02/dark-web-spy-cyber-AI-bot-hacker-100x70.jpg)
![How AI is transforming the Smart Cities IoT? [Tutorial] Cognitive IoT: How Artificial Intelligence is remoulding Industrial and Consumer IoT](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190327131121im_/https:/hub.packtpub.com/wp-content/uploads/2018/05/iStock-872710520-100x70.jpg)
![Qt installation on different platforms [Tutorial]](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190327131121im_/https:/hub.packtpub.com/wp-content/uploads/2018/05/iStock-517668754-100x70.jpg)
![Debugging and Profiling Python Scripts [Tutorial] Python code pytorch](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190327131121im_/https:/hub.packtpub.com/wp-content/uploads/2018/03/Python-Code-Image-100x70.jpg)
![How to remotely monitor hosts over Telnet and SSH [Tutorial] Server](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190327131121im_/https:/hub.packtpub.com/wp-content/uploads/2018/08/Server-100x70.jpg)
![Application server clustering using various cloud providers [Tutorial]](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190327131121im_/https:/hub.packtpub.com/wp-content/uploads/2018/03/Nodejs_Cover-Image-100x70.png)










