35 Results for:PNG

  • Sort by: 

Cloudinary: The 'dramatic' story of JPEG XL support so far

By Adrian Bridgwater 07 Nov 2023

This is a guest post for the Computer Weekly Developer Network written by Jon Sneyers in his role as senior image researcher at Cloudinary, a company that helps engaging brands around the world ... Read More

SES and Vodafone team to deliver 4G and future 5G services via satellite to Papua New Guinea

By Joe O’Halloran 01 Jun 2022

Latest development in satellite-based connectivity sees new mobile operator in southwestern Pacific island supported by terrestrial and satellite providers to boost further digital opportunities Read More

Nee-naw, nee-naw: Siren 13, unlucky for bad data actors

By Adrian Bridgwater 29 Nov 2022

There’s analytics, then, there’s so-called ‘investigative intelligence analytics’, which is (presumably) analytics one louder. This perhaps extended notion of analytics is what Siren does, a ... Read More

Cozy Bear lures victims with used BMW 5 Series

By Alex Scroxton 12 Jul 2023

A recent Cozy Bear campaign saw the Russian APT group pivot to exploiting an advert for a used car as it targeted diplomatic missions in Kyiv Read More

How to use Amazon SageMaker Canvas for accurate predictions

By Ernesto Marquez 10 Oct 2023

Amazon SageMaker Canvas is a useful machine learning tool for both technical and nontechnical professionals. This tutorial shows how to create data sets and train custom models. Read More

Decades-old bug in the libpng open source graphics library patched

By Peter Loshin 03 Jan 2017

A low-severity vulnerability dating back to 1995 in libpng, the official reference library implementation for PNG, may have enabled remote DoS attacks. Read More

Cloudinary clarity: Google ditches JPEG XL, where do we go from here?

By Adrian Bridgwater 14 Nov 2022

This is a guest post for the Computer Weekly Developer Network written by Jon Sneyers in his role as senior image researcher at Cloudinary, a company that works with brands around the world to ... Read More

Top static malware analysis techniques for beginners

By Kyle Johnson, Packt Publishing 30 Aug 2021

Malware will eventually get onto an endpoint, server or network. Using static analysis can help find known malware variants before they cause damage. Read More

Why image-based phishing emails are difficult to detect

07 Dec 2021

Image-based phishing emails are becoming increasingly popular with attackers. Learn how these hard-to-detect scams bypass email filters to infiltrate victims' systems. Read More

Why version control is necessary in digital asset management

By Laurence Hart 22 Mar 2023

Creative teams often use different versions of their digital assets across marketing channels. Learn how version control in DAM systems helps teams track these versions. Read More