Plato Data Intelligence.
Vertical Search & Ai.

Tag: architecture

Anti-spam Software | Enterprise Email Security Solution From Comodo

Reading Time: 2 minutesSpamming is the act of sending unsolicited message via electronic messaging systems. Unsolicited or unwanted mails not only consume...

Why Do Enterprises Need Anti-spam Software?

Reading Time: 2 minutesSpamming is the act of sending unsolicited message via electronic messaging systems. Unsolicited or unwanted mails not only consume your...

Scalable agent architecture for distributed training

The tasks are designed to be as varied as possible. They differ in the goals they target, from learning, to memory, to navigation....

Blockchain Disrupting the Healthcare Industry

The modern healthcare system is necessarily a set of dependent and independent institutions. Because of its mission-critical nature, the system’s evolution involves a...

5 tips for multi-GPU training with Keras

January 21, 2018 Vasilis Vryniotis . 1 Comment Deep Learning (the favourite buzzword of late 2010s along with...

Three (non-pointless) permissioned blockchains in production

Solving real problems in infrastructure, finance and e-commerceIt’s exactly two years since we published “Avoiding the pointless blockchain project“, a checklist of questions...

Comodo Detects Malware in Every Country | Threat Report Q3 2017

Reading Time: 3 minutesIn Q3 2017, Comodo Threat Research Labs (CTRL) detected nearly 400 million malware incidents from around the world –...

Comodo Q3 2017 Threat Report: Comodo Detects Malware in Every Country on Earth

Reading Time: 3 minutes In Q3 2017, Comodo Threat Research Labs (CTRL) detected nearly 400 million malware incidents from around the world – and...

Sharing our insights from designing with clinicians

In our design studio, we have Indi Young’s mantra on the wall as a reminder to “fall in love with the problem, not...

Mash Patel CEO of Kurtosys

Today on FinTech Profile we are delighted to talk to Mash Patel, founder of Kurtosys, who provide digital services for asset managers. Kurtosys...

IKARUSdilapidated Locky Part II | Comodo Threat Intelligence Lab

Reading Time: 4 minutesShould you fear your office scanner/printer? How about your post office?A second wave of new but related IKARUSdilapidated Locky...

2nd Wave of IKARUS Ransomware Attacks Uses Your Scanner/Printer, Post Office Billing Inquiry

Reading Time: 4 minutesShould you fear your office scanner/printer? How about your post office? A second wave of new but related IKARUSdilapidated Locky ransomware...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?