Paula Livingstone
  • About
  • Blog
  • Contact
  • Login

Top Posts

Categorizing the Self: Why Identity Management Trends Toward Singularity


Stepping Beyond the Postmodern Threshold


Making Sense of Python's Appeal


Why I Chose Django: The Story Behind This Blog's Framework



Most Shared

Riding the Bitcoin Wave: A roadmap from 2023 and beyond


Unraveling Polkadot: The New Era of Scalable, Interconnected Blockchains


The Industrial Security Paradigm for AI in Critical Systems


The Hidden Cybersecurity Challenges of Artificial Intelligence.



Most Discussed

Categorizing the Self: Why Identity Management Trends Toward Singularity


Stepping Beyond the Postmodern Threshold


Making Sense of Python's Appeal


Why I Chose Django: The Story Behind This Blog's Framework



Most Liked

Categorizing the Self: Why Identity Management Trends Toward Singularity


Stepping Beyond the Postmodern Threshold


Making Sense of Python's Appeal


Why I Chose Django: The Story Behind This Blog's Framework



Most Recent

AI’s Primitive Surge Sparks a Security Storm


The Industrial Security Paradigm for AI in Critical Systems


The Hidden Cybersecurity Challenges of Artificial Intelligence.


Uncovering the Sigmoid Function Step by Step



Prev Page
Page 27 of 30
Next Page
Elliptic Curves and the Quest for Secure Codes

Published: March 13, 2020, 3:57 p.m.


Elliptic Curves and the Quest for Secure Codes header
Popular Categories:
Technology Blockchain Cyber Security Cryptography ... and others
Popular Tags:
Security Innovation Technology Blockchain ... and others

In the vast realm of digital cryptography, few concepts have garnered as much attention and intrigue as elliptic curves. As we navigate the digital age, the need for robust … Read More

The Cryptographic Numbers Fueling Bitcoin

Published: Jan. 13, 2020, 2:26 p.m.


The Cryptographic Numbers Fueling Bitcoin header
Popular Categories:
Technology Blockchain Cryptography Privacy
Popular Tags:
Security Blockchain Decentralization Cybersecurity ... and others

Bitcoin, a name that has become synonymous with digital currency, is built upon a complex interplay of cryptographic numbers. These numbers, often overlooked by the casual observer, are the … Read More

Crafting Cyber-Resilient Communications in Industry

Published: May 27, 2019, 12:17 p.m.


Crafting Cyber-Resilient Communications in Industry header
Popular Categories:
Cyber Security IOT Networking Industry 4.0
Popular Tags:
Security Technology Cybersecurity Connectivity ... and others

Industrial communication protocols play a pivotal role in the modern manufacturing and production sectors. These protocols, namely ODBC, OPC, and OPC-UA, serve as the foundation for seamless communication between … Read More

A Medieval Journey From Usury to Understanding

Published: April 21, 2019, 3:32 p.m.


A Medieval Journey From Usury to Understanding header
Popular Categories:
Society Finance Ethics History
Popular Tags:
Innovation Technology Blockchain Decentralization ... and others

The Middle Ages, spanning roughly from the 5th to the late 15th century, is a full stop often romanticized for its chivalry and grand cathedrals. Yet, beneath the surface … Read More

Modbus and the OSI Model in Industrial Communication

Published: April 17, 2019, 6:11 a.m.


Modbus and the OSI Model in Industrial Communication header
Popular Categories:
Cyber Security IOT Networking Industry 4.0
Popular Tags:
Security Technology Cybersecurity Automation ... and others

Modbus is a fundamental protocol in the realm of industrial communication systems. Developed in the late 1970s to establish communication between automation devices, it has proven its worth by … Read More

Prev Page
Page 27 of 30
Next Page

Want to get in touch?

I'm always happy to hear from people. If youre interested in dicussing something you've seen on the site or would like to make contact, fill the contact form and I'll be in touch.

Go to Contact Page


CONTACT


Go to Contact Page

MEDIA


For media enquiries please contact Brian Kelly

LATEST WORK


AI’s Primitive Surge Sparks a Security Storm

SOCIAL


Lets connect on social media

All Rights Reserved © 2025. - Site by Me