Blog über die Entwicklung von Dingen

Filter

Filter
Author
Profile picture for user DeepL
Data collected on a regular basis can be evaluated automatically: analyzed trends and cycles are cleansed of anomalies and predictions are possible.
Author
Profile picture for user DeepL

Encryption with GnuPG (GNU Privacy Guard) and PGP (Pretty Good Privacy) is only secure if the tools are configured and used correctly.

Author
Profile picture for user DeepL

Machines learn from humans by learning like humans - through practice and experience. This can happen supervised or unsupervised.

Author
Profile picture for user DeepL
Profile picture for user dennis.westphal

Dennis Westphal

Free screen reading aids for the visually impaired are available for all operating systems and smartphones - from open-source NVDA to TalkBack and VoiceOver.

Author
Profile picture for user DeepL
Profile picture for user luckow

Stephan Luckow

Hangouts, Skype & Co are free, but cost data. With free software like Jitsi Meet, videoconferencing remains sovereign. An example setup.

Author
Profile picture for user DeepL
Profile picture for user luckow

Stephan Luckow

Projects with NDA require caution in the choice of software, because Google or Microsoft services, for example, have their own privacy terms.