Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ HPR3126: Metrics part II

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š HPR3126: Metrics part II


๐Ÿ’ก Newskategorie: Podcasts
๐Ÿ”— Quelle: hackerpublicradio.org

In this show I continue from where I left off in my last show (3101) and talk about the geometry of curved 2D surfaces such as that of a sphere.

Using the Earth's surface as an example we can use familiar the co-ordinates of longitude and latitude, illustrated on this diagram:

Sphere with latitude and longitude

Source: Public domain, Wikimedia commons

On the left we see circles of constant latitude. The largest of these circles is at latitude 0ยฐ and is called the equator. Its circumference is equal to that of the Earth and so it is an example of a great circle.

On the right we see lines of constant longitude. These run from pole to pole and are perpendicular to the equator. Each of these lie on a great circle (in fact they are half a great circle each).

Great circles on the surface of a sphere are analogous to straight lines on a flat 2D surface. They offer a way to connect any two points with the shortest distance. Lines in 2D or great circles on a sphere are examples of what is called a geodesic. In physics, particles that are not subject to any forces will follow geodesics.

In Einstein's General Theory of Relativity, the presence of mass or energy will alter the shape of spacetime and that will determine the metric. From the metric you can derive the geodesics and from that you can predict the motion of objects with no forces acting on them. In this way you can do away with the approximation that is Newton's gravitational force and replace it by a description that only involves the curvature of spacetime. I only touch on this in this show but will likely return to it in future shows.

Here are the equations discussed in this show and the previous one:

Sphere with latitude and longitude ...



๐Ÿ“Œ HPR3126: Metrics part II


๐Ÿ“ˆ 60.43 Punkte

๐Ÿ“Œ Premium Capacity Metrics app โ€“ new health center with KPIs to explore relevant metrics and steps to mitigate issues


๐Ÿ“ˆ 29.04 Punkte

๐Ÿ“Œ Business efficiency metrics are more important than detection metrics


๐Ÿ“ˆ 29.04 Punkte

๐Ÿ“Œ Bad metrics are worse than no metrics


๐Ÿ“ˆ 29.04 Punkte

๐Ÿ“Œ Vulnerability Management Metrics: Itโ€™s Time to Look Past the Metrics Mirage


๐Ÿ“ˆ 29.04 Punkte

๐Ÿ“Œ Hands On: Pull metrics into Kubernetes from anywhere and treat them generically with the Keptn Metrics Server


๐Ÿ“ˆ 29.04 Punkte

๐Ÿ“Œ Metrics, metrics everywhere - from which ones I should be scared?


๐Ÿ“ˆ 29.04 Punkte

๐Ÿ“Œ OCI - Database Cloud Metrics - #1 Basic Management Metrics


๐Ÿ“ˆ 29.04 Punkte

๐Ÿ“Œ Monitoring on Azure HDInsight part 4: Workload metrics and logs


๐Ÿ“ˆ 21.45 Punkte

๐Ÿ“Œ Quantifiable Risk Metrics - Bringing Value to Your Security Program Part 2 - Ian Amit - SCW #12


๐Ÿ“ˆ 21.45 Punkte

๐Ÿ“Œ Quantifiable Risk Metrics - Bringing Value to Your Security Program Part 1 - Ian Amit - SCW #12


๐Ÿ“ˆ 21.45 Punkte

๐Ÿ“Œ Building and Augmenting Part III - Evaluate your LLM flows with built-in metrics


๐Ÿ“ˆ 21.45 Punkte

๐Ÿ“Œ Secure SDLC (Part 1): issues, approach, tech metrics, teamโ€™s KPI


๐Ÿ“ˆ 21.45 Punkte

๐Ÿ“Œ Governance Part 1: The Security Metrics Methodology


๐Ÿ“ˆ 21.45 Punkte

๐Ÿ“Œ 6 Key Performance Metrics to Monitor in Linux Servers โ€“ Part 1


๐Ÿ“ˆ 21.45 Punkte

๐Ÿ“Œ Metrics Part 2: The DORA Keys


๐Ÿ“ˆ 21.45 Punkte

๐Ÿ“Œ 2/22/18 Book Review: Security Metrics: Replacing Fear, Uncertainty, and Doubt by Andrew Jaquith


๐Ÿ“ˆ 14.52 Punkte

๐Ÿ“Œ A first look at Ubuntu desktop metrics


๐Ÿ“ˆ 14.52 Punkte

๐Ÿ“Œ Announcing download.opensuse.org access metrics


๐Ÿ“ˆ 14.52 Punkte

๐Ÿ“Œ Android media.metrics Service Race Condition


๐Ÿ“ˆ 14.52 Punkte

๐Ÿ“Œ Android media.metrics Service Race Condition


๐Ÿ“ˆ 14.52 Punkte

๐Ÿ“Œ Bring These Security Metrics to Your Next Budget Meeting With the Board


๐Ÿ“ˆ 14.52 Punkte

๐Ÿ“Œ F5 BIG-IP Congestion Metrics Cache Handler ICMP Packet Denial of Service


๐Ÿ“ˆ 14.52 Punkte

๐Ÿ“Œ Faulty Metrics in Twitter Android App Result in Refunds for Advertisers


๐Ÿ“ˆ 14.52 Punkte

๐Ÿ“Œ The Need for Better Cybersecurity Prioritization Metrics


๐Ÿ“ˆ 14.52 Punkte

๐Ÿ“Œ F5 BIG-IP Congestion Metrics Cache Handler ICMP Packet Denial of Service


๐Ÿ“ˆ 14.52 Punkte

๐Ÿ“Œ SafeBreach Brings Risk Metrics to Attack Simulation Platform


๐Ÿ“ˆ 14.52 Punkte

๐Ÿ“Œ What Metrics Do You Need to Measure the Success of Your SOC?


๐Ÿ“ˆ 14.52 Punkte

๐Ÿ“Œ Trusting Security Metrics: How Well Do We Know What We Think We Know?


๐Ÿ“ˆ 14.52 Punkte

๐Ÿ“Œ Faulty Metrics in Twitter Android App Result in Refunds for Advertisers


๐Ÿ“ˆ 14.52 Punkte

๐Ÿ“Œ The Need for Better Cybersecurity Prioritization Metrics


๐Ÿ“ˆ 14.52 Punkte

๐Ÿ“Œ P2P Session: Metrics for Managing and Understanding Patch Fatigue


๐Ÿ“ˆ 14.52 Punkte

๐Ÿ“Œ Turning Data into Metrics โ€“ A Vulnerability Story


๐Ÿ“ˆ 14.52 Punkte

๐Ÿ“Œ Vulnerability Metrics: The Final Frontier


๐Ÿ“ˆ 14.52 Punkte

๐Ÿ“Œ SonicWall Launches SD-WAN, Risk Metrics and New UTM Hardware


๐Ÿ“ˆ 14.52 Punkte











matomo