• Explore
  • Curator's Pick
  • Login
  • Sign up
neoxian stem science technology ecency stemsocial archon insect palnet hive-130906 hive-196387 proofofbrain waivio vyb cent waiv ctp pimp hive-111030 hive-engine photography inleo pob spanish leo space hive stem-espanol discovery-it nature amazingnature natureobserver hive-167922 ai macrophotography education photofeed hive-142159 monomad blackandwhite

#engineering

avatar
@goodysam 0
10 months ago
building
Construction: Imitation In Design Being a makeup artist, I understand that designs can be different and a reflection of the designer's choice. In the field of makeup, one may see a certain makeup pattern and…
20
0
1
8.386 STEM
avatar
@intoy.bugoy 0
over 1 year ago
construction
Don't Underestimate a Concrete Spacer | #Construction Diary 002 "I'm small, and sometimes people don't mind me, I am seemingly insignificant but I have a vital role in building construction." - Concrete Spacer ![20200605_180703.jpg](
332
0
4
19.767 STEM
avatar
@mrosenquist 0
8 months ago
cybersecurity
Simplifying Cyber Safety for Everyone with Sandra Estok Cybersecurity is not just a technical endeavor. Attackers often pursue people to either gain access to valuable systems or to directly victimize them. This includes companies…
14
0
0
18.150 STEM
avatar
@mrosenquist 0
9 months ago
cybersecurity
Immutable Cybersecurity Law #12 “Never underestimate the simplicity of the attackers, nor the gullibility of the victims.” Cyberattacks don’t always rely on sophisticated exploits or advanced malware. In reality
23
0
1
22.264 STEM
avatar
@mrosenquist 0
4 months ago
cybersecurity
LinkedIn Security Tips to Protect from Fraud, Social Engineering, and Hacking LinkedIn Security Tips to Protect from Fraud, Social Engineering, and Hacking Stay updated on best #cybersecurity practices, be smart, and stay safe! For more cybersecurity insights, follow me:
19
0
0
12.337 STEM
avatar
@mrosenquist 0
8 months ago
cybersecurity
Massive Increase to Unwanted Cell Calls Something happened this weekend — starting on Monday my cellphone has been lighting up with unknown callers — a 30x increase! I rarely give out the number so I assume one of the following:
17
0
0
9.878 STEM
avatar
@mrosenquist 0
11 months ago
cybersecurity
The Psychology of Phishing ​ Attackers are masterful at using Social Engineering techniques to victimize others. Sumona, the founder of the MindShield institute, outlines the challenges of adapting to…
20
0
2
13.449 STEM
avatar
@bradleyykayy 0
about 1 year ago
engineering
The Role of Technical Writing in Engineering: Managing Reports and Assignments What is Technical Writing in Engineering? Technical writing in engineering involves clearly documenting processes, designs, and systems. It explai
13
0
0
88.351 STEM
avatar
@softwareco 0
about 1 year ago
engineering
Global Engineering. Custom software development services Hey there, tech enthusiasts and visionaries! Are you ready to dive into the world of cutting-edge software solutions and engineering excellence? Look no further! At GlobalDev…
1
1
1
1.706 STEM
avatar
@internutter 0
9 months ago
fiction
Challenge #04458-L074: Methuselah Engineering A: this is… a hydro-electric plant? B: yep this brick steel concrete is built to last a century. A: how old is it? B: I say 1
180
0
1
11.323 STEM
Menu
Explore Curator's Pick
Trade
Trade STEM Swap