Explore
Curator's Pick
Login
Sign up
neoxian
stem
science
technology
ecency
stemsocial
archon
insect
palnet
hive-130906
hive-196387
proofofbrain
waivio
vyb
cent
waiv
ctp
pimp
hive-111030
hive-engine
photography
inleo
pob
spanish
leo
space
hive
stem-espanol
discovery-it
nature
amazingnature
natureobserver
hive-167922
ai
macrophotography
education
photofeed
hive-142159
monomad
blackandwhite
#engineering
Trending Posts
@goodysam
0
10 months ago
building
Construction: Imitation In Design
Being a makeup artist, I understand that designs can be different and a reflection of the designer's choice. In the field of makeup, one may see a certain makeup pattern and…
@intoy.bugoy
0
over 1 year ago
construction
Don't Underestimate a Concrete Spacer | #Construction Diary 002
"I'm small, and sometimes people don't mind me, I am seemingly insignificant but I have a vital role in building construction." - Concrete Spacer ![20200605_180703.jpg](
@mrosenquist
0
8 months ago
cybersecurity
Simplifying Cyber Safety for Everyone with Sandra Estok
Cybersecurity is not just a technical endeavor. Attackers often pursue people to either gain access to valuable systems or to directly victimize them. This includes companies…
@mrosenquist
0
9 months ago
cybersecurity
Immutable Cybersecurity Law #12
“Never underestimate the simplicity of the attackers, nor the gullibility of the victims.” Cyberattacks don’t always rely on sophisticated exploits or advanced malware. In reality
@mrosenquist
0
4 months ago
cybersecurity
LinkedIn Security Tips to Protect from Fraud, Social Engineering, and Hacking
LinkedIn Security Tips to Protect from Fraud, Social Engineering, and Hacking Stay updated on best #cybersecurity practices, be smart, and stay safe! For more cybersecurity insights, follow me:
@mrosenquist
0
8 months ago
cybersecurity
Massive Increase to Unwanted Cell Calls
Something happened this weekend — starting on Monday my cellphone has been lighting up with unknown callers — a 30x increase! I rarely give out the number so I assume one of the following:
@mrosenquist
0
11 months ago
cybersecurity
The Psychology of Phishing
Attackers are masterful at using Social Engineering techniques to victimize others. Sumona, the founder of the MindShield institute, outlines the challenges of adapting to…
@bradleyykayy
0
about 1 year ago
engineering
The Role of Technical Writing in Engineering: Managing Reports and Assignments
What is Technical Writing in Engineering? Technical writing in engineering involves clearly documenting processes, designs, and systems. It explai
@softwareco
0
about 1 year ago
engineering
Global Engineering. Custom software development services
Hey there, tech enthusiasts and visionaries! Are you ready to dive into the world of cutting-edge software solutions and engineering excellence? Look no further! At GlobalDev…
@internutter
0
9 months ago
fiction
Challenge #04458-L074: Methuselah Engineering
A: this is… a hydro-electric plant? B: yep this brick steel concrete is built to last a century. A: how old is it? B: I say 1
Menu
Explore
Curator's Pick
Trade
Trade STEM
Swap