Categorieën: Alle - security - computer - robotics - operating

door Евгения Геренштейн 6 maanden geleden

61

Information

The text explores diverse domains ranging from security and cryptography to robotics and computing. In security, it delves into aspects such as cryptanalysis, incident response, and vulnerability management.

Information

Information

Technologies

Computer
Operating system

Driver

Core

MS-DOS

Windows

PLATO

GM-НАА

BSD

Unix

Linux

Trisquel

KaOS

4M

Arch

Endeavour

Garuda

Atrix

Debian

Netrunner

Nitrux

FreeBSD

Ubuntu

MATE

Budgie

Unity

Cinnamon

Dragora

Nix

Vanilla

Virus

Mechanism

Viruses in basic texts

File worms

Storm Worm

Links

Companions

Parasitic

Overwriters

Michelangelo

Danger

Very dangerous

Dexter

Dangerous

Non-dangerous

Blaster

Harmless

Elk Cloner

Habitat

Nimda

ILoveYou

Bootable

Macroviruses

File systems

Quantum computer

Valve

Fredkin gate

Toffoli

Hadamard

Paulie

Qubit

Supercomputer
BIOS
Network

Architecture (topology)

Cell

Tire

Star

Ring

Domain

Wi-Fi

Address

IP

v6

v4

MAC

Ping

Server

Router

Cell phones

IOS

Android

Boda

Smart phones
Cloud computing
Cloud Gaming
Operating System

Joli OS

AstraNOS

Glide OS

Zero PC

BAYRELL Cloud OS

Google Chrome OS

Fog computing
Cybersecurity
Artificial intelligence
Frank Rosenblatt

Perceptron

Function

Loss

Hinge

Log Kosh

Huber

Cosine Similarity

Mean

Error

Absolute

Percentage

Squared

Logarithmic

Probabilistic

CTC (Connectionist Temporal Classification)

Kullback-Leibler (KL) Divergence

Poisson

Crossentropy

Categorical

Sparse

Binary

Focal

Activation

Mish

Linear

Tanh

Exponential

Softsign

Softplus

Softmax

Log

Sigmoid

Hard

ELU (Exponential Linear Unit)

SiLU (Sigmoid Linear Unit) (Swish)

Hard SiLU (Hard Swish)

GeLU (Gaussian error Linear Unit)

SeLU (Scaled Exponential Linear Unit)

ReLU (Rectified Linear Unit)

Relu6

LeakyReLU

Bias

Weight

Training

Teacher (?)

Walter Pitts
Warren McCulloch
Alan Turing
Expert system
Genetic algorithm
Machine learning

Deep learning

Tasks

Regression

Classification

Clusterization

Forecasting

Algorithm

Neural networks

RNN (Recurrent)

Generation

Open AI

Chat GPT (Generative Pretrained Transformer)

Support vector machine

K-nearest neighbors

Bayesian Classifier

Decision trees

Subtopic

Gradient boosting

Random Forest

K-means

Back propagation

Natural Language Analysis
Computer vision
Internet
IoT (Internet of Things)

IoRT (Internet of Robotic Things)

Robotics
Service

Gladiator

SMSS

Sony

Aibo

Boston Dynamics

Atlas

REDMOND

RV-R560

Promobot

OrionStar

Robotic Coffee Master

Industrial

Universal Robots

e-Series

HASEL

da Vinci SP

SCARA

DuAro

Kawasaki

YF003N

RS007L

CX210L

Unimate 2000

Research

DelFly

Nimble

Opportunity

Spirit

Sojourner

Pathfinder

Cyborg
Isaac Asimov

Search

Source
Secondary
Primary
Engine
Evaluation

Security

Vulnerability management
Infrastructure
Incident response
Disaster recovery
Cryptography
Cryptanalysis

Enigma

Cloud
Application