fbpx
"Directional arrows illustrating Python switch statements logic flow."

Python Switch Statements

In languages like C, you have Switch statements allowing you to evaluate the input, then have a few options for the output.  Switch statements are used in place of a series of if/else statements in order to make your code more readable.  Case statements can also have better performance than a traditional if/else setup.  This

Python Switch Statements Read More »

Getting OSX ready for Tensorflow

This article will describe the process of getting Tensorflow working on OSX.  By the end of the article, you will have all the prerequisites installed to allow you to run Tensorflow-based python applications on your MacOS/OSX computer. Install Homebrew Homebrew is a package manager for OSX.  It is similar to apt-get on Ubuntu or yum

Getting OSX ready for Tensorflow Read More »

"Crystal ball reflecting a forest, symbolizing the concept of a Python virtual environment creating isolated spaces for development."

Python Virtual Environment

By default Python only gives you a single environment for your whole system.  This means when you install Python, or a package using Pip, you are installing that version of python or that version of the python package for the entire system.  And all scripts you run will interact with that same version of python

Python Virtual Environment Read More »

"Futuristic robotic hand interacting with abstract digital network on a blue background, symbolizing advanced technology and cybersecurity."

Why CrowdStrike Complete MDR is the Future of Security

The Cybersecurity Status Quo is Failing The cybersecurity landscape is evolving at an unprecedented pace, and traditional security solutions are struggling to keep up. Ransomware attacks surged by 62% in 2023, with the average cost of a data breach reaching $4.45 million (source). Cybercriminals are no longer just targeting endpoints—they are infiltrating entire networks, exploiting

Why CrowdStrike Complete MDR is the Future of Security Read More »

A tired person holding folders, looking stressed, representing alert fatigue in cybersecurity.

Overwhelmed by Alerts? How to Stop Wasting Time and Start Stopping Threats

In today’s hyper-connected digital environment, security teams are inundated with a relentless wave of alerts. This phenomenon, known as alert overload, has become a significant challenge in the cybersecurity landscape. With countless notifications flooding their systems daily, security professionals face the daunting task of sifting through mountains of data to identify genuine threats. This constant

Overwhelmed by Alerts? How to Stop Wasting Time and Start Stopping Threats Read More »

"Cursor pointing to the word 'Security' on a computer screen, representing cybersecurity measures and protection."

Elevate Your Security Posture with Managed Detection and Response (MDR)

Every 39 seconds, a cyberattack occurs somewhere in the world. (Source: University of Maryland) With businesses increasingly reliant on digital infrastructure, cybercriminals have more opportunities than ever to infiltrate networks, steal sensitive data, and disrupt operations. In 2023 alone, the average cost of a data breach reached $4.45 million, a 15% increase over the past

Elevate Your Security Posture with Managed Detection and Response (MDR) Read More »