chơi xổ số keno trực tuyến

{"appState":{"pageLoadApiCallsStatus":true},"categoryState":{"relatedCategories":{"headers":{"timestamp":"2025-03-20T08:01:05+00:00"},"categoryId":33512,"data":{"title":"Technology","slug":"technology","image":{"src":"//coursofppt.com/wp-content/uploads/technology-category.jpg","width":643,"height":1286},"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512}],"parentCategory":{"categoryId":0,"title":null,"slug":null,"_links":null},"childCategories":[{"categoryId":35241,"title":"Virtual Reality","slug":"virtual-reality","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/35241"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":5,"bookCount":2},{"categoryId":33513,"title":"Computers","slug":"computers","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33513"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":1393,"bookCount":55},{"categoryId":33537,"title":"Cybersecurity","slug":"cybersecurity","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33537"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":58,"bookCount":14},{"categoryId":33538,"title":"Digital Audio & Radio","slug":"digital-audio-radio","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33538"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":131,"bookCount":5},{"categoryId":33543,"title":"Electronics","slug":"electronics","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33543"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":1756,"bookCount":44},{"categoryId":33572,"title":"Information Technology","slug":"information-technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33572"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":806,"bookCount":65},{"categoryId":33587,"title":"Internet Basics","slug":"internet-basics","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33587"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":86,"bookCount":3},{"categoryId":33588,"title":"Notable Websites","slug":"notable-websites","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33588"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":188,"bookCount":4},{"categoryId":33592,"title":"Programming & Web Design","slug":"programming-web-design","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33592"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":1394,"bookCount":94},{"categoryId":33611,"title":"Social Media","slug":"social-media","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33611"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":385,"bookCount":20},{"categoryId":33618,"title":"Software","slug":"software","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33618"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":3192,"bookCount":185}],"description":"Technology. It makes the world go 'round. And whether you're a self-confessed techie or a total newbie, you'll find something to love among our hundreds of technology articles and books.","relatedArticles":{"self":"//dummies-api.coursofppt.com/v2/articles?category=33512&offset=0&size=5"},"hasArticle":true,"hasBook":true,"articleCount":9395,"bookCount":491},"_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"}},"relatedCategoriesLoadedStatus":"success"},"listState":{"list":{"count":10,"total":9412,"items":[{"headers":{"creationTime":"2025-03-19T17:39:33+00:00","modifiedTime":"2025-03-19T17:39:33+00:00","timestamp":"2025-03-19T18:01:07+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"AI","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33574"},"slug":"ai","categoryId":33574}],"title":"Coding with AI For Dummies Cheat Sheet","strippedTitle":"coding with ai for dummies cheat sheet","slug":"coding-with-ai-for-dummies-cheat-sheet","canonicalUrl":"","浏览登录器整合":{"metaDescription":"Boost your coding productivity with AI tools and get expert tips to avoid common pitfalls. Learn how to harness the power of AI for efficient coding.","noIndex":0,"noFollow":0},"content":"Generative AI coding tools can improve your productivity as a coder, remind you about syntax, and even help you with testing, debugging, refactoring, and documentation, but it's up to you to know how to use them correctly. Get ten prompt engineering tips that can make the difference between AI spitting out garbage spaghetti code and crafting elegant code that works.\r\n\r\nAI coding tools present unique challenges and hazards for software development teams, so check out some simple rules to make sure that generative AI doesn't tank your project. Then see what happened when ChatGPT was asked to list the top things human coders do that AI can never replace.","description":"Generative AI coding tools can improve your productivity as a coder, remind you about syntax, and even help you with testing, debugging, refactoring, and documentation, but it's up to you to know how to use them correctly. Get ten prompt engineering tips that can make the difference between AI spitting out garbage spaghetti code and crafting elegant code that works.\r\n\r\nAI coding tools present unique challenges and hazards for software development teams, so check out some simple rules to make sure that generative AI doesn't tank your project. Then see what happened when ChatGPT was asked to list the top things human coders do that AI can never replace.","blurb":"","authors":[{"authorId":9070,"name":"Chris Minnick","slug":"chris-minnick","description":" <p> <b>Chris Minnick</b> is an accomplished author, teacher, and programmer. Minnick authored or co-authored over 20 books, including titles in the <i>For Dummies </i>series. He has developed video courses for top online training platforms and he teaches programming and machine learning to professional developers at some of the largest global companies. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9070"}}],"primaryCategoryTaxonomy":{"categoryId":33574,"title":"AI","slug":"ai","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33574"}},"secondaryCategoryTaxonomy":{"categoryId":33610,"title":"General Programming & Web Design","slug":"general-programming-web-design","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33610"}},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":301664,"slug":"coding-with-ai-for-dummies","isbn":"9781394249138","categoryList":["technology","information-technology","ai"],"amazon":{"default":"//www.amazon.com/gp/product/1394249136/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1394249136/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1394249136-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1394249136/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1394249136/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/coding-with-ai-for-dummies-cover-9781394249138-203x255.jpg","width":203,"height":255},"title":"Coding with AI For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><p> <b><b data-author-id=\"9070\">Chris Minnick</b></b> is an accomplished author, teacher, and programmer. Minnick authored or co-authored over 20 books, including titles in the <i>For Dummies </i>series. He has developed video courses for top online training platforms and he teaches programming and machine learning to professional developers at some of the largest global companies.</p>","authors":[{"authorId":9070,"name":"Chris Minnick","slug":"chris-minnick","description":" <p> <b>Chris Minnick</b> is an accomplished author, teacher, and programmer. Minnick authored or co-authored over 20 books, including titles in the <i>For Dummies </i>series. He has developed video courses for top online training platforms and he teaches programming and machine learning to professional developers at some of the largest global companies. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9070"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;ai&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394249138&quot;]}]\" id=\"du-slot-65f9d2e3384b6\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;ai&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394249138&quot;]}]\" id=\"du-slot-65f9d2e33a006\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":0,"title":"","slug":null,"categoryList":[],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/"}}],"content":[{"title":"Prompting tips for coding with AI","thumb":null,"image":null,"content":"<p>The process of figuring out the right prompts to give generative AI tools to cause them to generate high-quality content is called <em>prompt engineering. </em>In reality, however, designing prompts is more of a creative art than a formal engineering discipline. Using trial and error, people have discovered techniques and phrases that reliably increase the quality of generated code. Here are my top ten tips for effective prompting of generative AI chatbots.</p>\n<ul>\n<li><strong>Use active voice</strong>. Instead of writing, &#8220;It is desired to&#8230;&#8221; write, &#8220;The code should&#8230;&#8221; or &#8220;I want&#8230;&#8221;.</li>\n<li><strong>Avoid using negations.</strong> Instead of writing, &#8220;Don&#8217;t use loops,&#8221; write, &#8220;Use recursion instead of loops.&#8221;</li>\n<li><strong>Specify a role.</strong> Start your prompt by describing the role the AI should emulate. For example, &#8220;You are an experienced and highly skilled programmer.&#8221;</li>\n<li><strong>Emphasize code quality.</strong> Use phrases such as &#8220;clean code,&#8221; &#8220;readable,&#8221; and &#8220;well-documented&#8221; in your prompts.</li>\n<li><strong>Mention specific libraries, frameworks, and APIs.</strong> If you expect the generated code to use certain tools, mention those (along with versions if appropriate) in your prompt.</li>\n<li><strong>Start with an explanation of the overall problem.</strong> This gives the AI tools a foundational understanding of the outcome you want.</li>\n<li><strong>Describe the input and output data formats</strong>. Even when it may be obvious to you that a function named <code>sumNumbers()</code> should accept numbers as its arguments and return a number, providing that information in your prompt will limit the number of choices the AI has to make and will improve the quality of its response.</li>\n<li><strong>Break down complexity.</strong> Focus on solving one small chunk of a problem at a time.</li>\n<li><strong>Be clear and concise.</strong> Avoid ambiguity and vague words such as &#8220;good&#8221; or &#8220;efficient.&#8221;</li>\n<li><strong>Work iteratively.</strong> Don&#8217;t settle for the first generated result. Iterate and refine your prompt and provide feedback to the AI tool to guide it towards a desired result. Sometimes, even changing one word in your prompt can dramatically affect the output.</li>\n</ul>\n"},{"title":"Potential dangers of AI-generated code","thumb":null,"image":null,"content":"<p>While AI chatbots and pair programmers such as ChatGPT and Copilot can make you a more productive programmer, there are dangers associated with AI-generated code. Here are the worst possible outcomes of using a generative AI tool to write code:</p>\n<ul>\n<li><strong>Using AI as a substitute for becoming a better programmer.</strong> No matter what tool you use, it&#8217;s still your responsibility as a programmer to be constantly improving and learning.</li>\n<li><strong>Deploying AI-generated code without proper code reviews.</strong> While generated code may seem to work correctly and be free from obvious errors, it&#8217;s still essential to have humans review any generated code before it reaches end users.</li>\n<li><strong>Use of deprecated functions, libraries, or APIs.</strong> The code that AI assistants were trained on likely contains references to outdated and possibly insecure dependencies. Manually verify that everything in the generated code is safe and correct to use.</li>\n<li><strong>Confusing or long-winded documentation.</strong> Generative AI is famous for writing documentation that&#8217;s overly verbose and potentially confusing for even the simplest of functions. Having an experienced human writer edit or rewrite generated documentation will save time and frustration in the long run.</li>\n<li><strong>Related functions that have no relationship.</strong> Every human coder has their own style and particular way of doing things. This makes the code written by a person, or even a team of people, coherent and consistent. A generative AI tool doesn&#8217;t have a style, and the choices it makes can be radically different from function to function. Provide proper context to minimize inconsistencies.</li>\n</ul>\n"},{"title":"Things AI Coding Assistants Can't Do","thumb":null,"image":null,"content":"<p><span data-contrast=\"auto\">The current crop of AI-powered assistants are tools that can help you be more productive, but at this point they work well only if you have your hands firmly on the steering wheel. </span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559685&quot;:1022,&quot;335559739&quot;:220,&quot;335559740&quot;:220}\"> </span></p>\n<p><span data-contrast=\"auto\">As AI pair programmers become more sophisticated and are trained on ever larger datasets, chances are good that generative AI tools will master coding in the same way that AI mastered chess and every other board game, card game, and video game. Notably, however, AI chatbots still can&#8217;t compete with even the most inexperienced human basketball player.</span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559685&quot;:1022,&quot;335559739&quot;:220,&quot;335559740&quot;:220}\"> </span></p>\n<p><span data-contrast=\"auto\">Want to find out what will be left for human coders to do once AI leaves us in the dust? ChatGPT was asked to provide a list of things that human coders can do that AI will never be able to do. The following list was generated by ChatGPT and has been edited for style and humorous effect.</span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559685&quot;:1022,&quot;335559739&quot;:220,&quot;335559740&quot;:220}\"> </span></p>\n<p><i><span data-contrast=\"auto\">ChatGPT 4:</span></i><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559685&quot;:1022,&quot;335559739&quot;:220,&quot;335559740&quot;:220}\"> </span></p>\n<p><span data-contrast=\"auto\">Here are some humorous differences between AI coding assistants and human coders:</span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559685&quot;:1022,&quot;335559739&quot;:220,&quot;335559740&quot;:220}\"> </span></p>\n<ul>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"19\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:1742,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Misplacing semicolons and then searching for hours:</span></b><span data-contrast=\"auto\"> AI coding assistants are precise with syntax, but they&#8217;ll never know the &#8220;joy&#8221; of misplacing a semicolon and spending hours debugging, only to find it hiding in plain sight.</span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:220,&quot;335559740&quot;:220}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"19\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:1742,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Drinking copious amounts of coffee:</span></b><span data-contrast=\"auto\"> While AI can churn out code 24/7, it&#8217;ll never experience the quintessential coder ritual of consuming copious amounts of coffee to fuel late-night coding sessions.</span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:220,&quot;335559740&quot;:220}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"19\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:1742,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Naming variables after pets or favorite snacks:</span></b><span data-contrast=\"auto\"> AI might suggest efficient variable names, but it won&#8217;t creatively name a variable after a beloved pet or a favorite snack like &#8220;fluffyKittenCounter&#8221; or &#8220;chocolateChipArray&#8221;.</span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:220,&quot;335559740&quot;:220}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"19\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:1742,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Celebrating small victories with a victory dance:</span></b><span data-contrast=\"auto\"> Only human coders get to do a little victory dance after finally fixing a bug or getting a complex function to work.</span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:220,&quot;335559740&quot;:220}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"19\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:1742,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Accidentally creating an infinite loop and crashing their own computer:</span></b><span data-contrast=\"auto\"> AI is too logical for this. It won&#8217;t know the thrill of accidentally creating an infinite loop, watching everything freeze, and then having to perform the ritual computer reboot.</span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:220,&quot;335559740&quot;:220}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"19\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:1742,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Getting distracted by social media or cat videos:</span></b><span data-contrast=\"auto\"> AI coding assistants stay focused on the task, never falling down the rabbit hole of social media or watching just &#8220;one more&#8221; cat video before getting back to work.</span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:220,&quot;335559740&quot;:220}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"19\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:1742,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Using rubber ducks for debugging:</span></b><span data-contrast=\"auto\"> AI doesn&#8217;t use a rubber duck (or any inanimate object) to explain their code aloud for debugging purposes &#8212; a unique human debugging technique.</span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:220,&quot;335559740&quot;:220}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"19\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:1742,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Experiencing the mystery of code that works but you don&#8217;t know why:</span></b><span data-contrast=\"auto\"> AI understands why its code works, but human coders sometimes encounter the mystical phenomenon of code that works perfectly without any logical explanation.</span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:220,&quot;335559740&quot;:220}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"19\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:1742,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Having strong opinions on code editors:</span></b><span data-contrast=\"auto\"> AI won&#8217;t engage in passionate debates about why Vim is better than Emacs or why spaces are superior to tabs; these are sacred human coder debates.</span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:220,&quot;335559740&quot;:220}\"> </span></li>\n<li data-leveltext=\"\" data-font=\"Symbol\" data-listid=\"19\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:1742,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Writing code comments as if they&#8217;re diary entries:</span></b><span data-contrast=\"auto\"> AI sticks to factual comments, but human coders sometimes turn code comments into personal diaries, complete with jokes, existential questions, and musings about lunch.</span><span data-ccp-props=\"{&quot;201341983&quot;:1,&quot;335559739&quot;:220,&quot;335559740&quot;:220}\"> </span></li>\n</ul>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2025-03-19T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":301679},{"headers":{"creationTime":"2025-03-07T18:28:43+00:00","modifiedTime":"2025-03-12T15:35:39+00:00","timestamp":"2025-03-12T18:01:11+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Cybersecurity","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33537"},"slug":"cybersecurity","categoryId":33537}],"title":"Nine Ways to Protect Against Advanced Email Threats","strippedTitle":"nine ways to protect against advanced email threats","slug":"nine-ways-to-protect-against-advanced-email-threats","canonicalUrl":"","浏览登录器整合":{"metaDescription":"Protect your company from advanced email threats with these 10 strategies and download a free ebook to learn more.","noIndex":0,"noFollow":0},"content":"Advanced email threats use a wide range of methods to attack company security, including sophisticated technology and an in-depth understanding of the weak points in the way that email recipients and senders communicate. To fight them, companies need to use tools including threat detection, threat hunting, and extended detection and response (XDR) technology.\r\n\r\nHere are ten things you can use to protect against advanced email threats.\r\n<h2 id=\"tab1\" >Use secure email threat defense</h2>\r\nUse a comprehensive email security solution to detect quickly and respond effectively. Look for an email defense system that automatically and reliably does many of the things that you might wish users would do consistently, such as:\r\n<ul>\r\n \t<li>Assess the sender’s reputation</li>\r\n \t<li>Asses the reputation of the email’s source URL</li>\r\n \t<li>Scan content for concerning words and phrases</li>\r\n \t<li>Scan file attachments and analyze their reputation and content</li>\r\n \t<li>Spot and block spam</li>\r\n</ul>\r\n<h2 id=\"tab2\" >Optimize your defenses against major email threats</h2>\r\nYou can scan the horizon for current threats and note what threats are being blocked — or causing breaches — at your organization. You can then respond by working with your vendor; working with your email provider; training your security personnel and end users; educating upper management; and many more steps.\r\n<h2 id=\"tab3\" >Use AI to understand and categorize threats</h2>\r\nYou can use AI to identify patterns that serve as indicators of an attack. These patterns are often so subtle that attackers aren’t aware of the breadcrumbs they’re leaving as they put together attempts at exploits. AI can spot these patterns before the bad actors do.\r\n<h2 id=\"tab4\" >Use threat data to inform and expedite your response</h2>\r\nBefore a threat arrives, you can know:\r\n<ul>\r\n \t<li>What the recent patterns of threats look like</li>\r\n \t<li>The signatures left by different kinds of threats</li>\r\n \t<li>What attacks are leading to successful breaches</li>\r\n \t<li>The best response to each different kind of breach</li>\r\n</ul>\r\nBy using threat data, you help yourself at every step of the “funnel” of security breaches: reducing the number of attacks that reach user inboxes, reducing the impact when a malicious email is opened or a toxic file attachment is downloaded, and responding quickly and effectively to the remaining breaches that do occur.\r\n<h2 id=\"tab5\" >Act quickly to ensure maximum protection against threats</h2>\r\nBy acting automatically against many threats, and by providing alerts and information about the threats that do appear, the best email security solutions give you a precious gift in responding to any remaining breaches: time.\r\n\r\nWith a solution in place, your best people are empowered to respond quickly and effectively to the breaches that do occur, while directing their focus to strategic efforts such as studying the breach, understanding how it occurred, and taking the steps needed to prevent a recurrence.\r\n<h2 id=\"tab6\" >Unify visibility across control points</h2>\r\nLook for a security provider that helps you unify visibility across multiple control points so you can, for instance, tie the damage that’s occurring from a successful breach to the original gaps in your defenses that allowed it to occur. You can then “mind the gap” and prevent the problem from recurring in the future.\r\n<h2 id=\"tab7\" >Embrace automated tools to maximize resources</h2>\r\nAutomated tools save your people’s time and focus for the largest potential threats. These tools also allow your team to find a solution and then “set it and forget it,” using the automated tools to prevent the same problem from happening again.\r\n<h2 id=\"tab8\" >Detect sooner, respond faster</h2>\r\nYou can’t solve a problem you don’t know you have — and most cybersecurity breaches get worse the longer it takes you to respond. Effective security solutions buy you time, removing some threats and giving you early notice of others.\r\n<h2 id=\"tab9\" >Getting started</h2>\r\nVisit <a href=\"//www.cisco.com/c/en/us/products/security/xdr/advanced-email-threats-for-dummies.html?utm_medium=media-article&utm_source=wiley&utm_campaign=XDR-FY24-Q3-Content-Ebook-Advanced-Email-Threats-For-Dummies&utm_term=pgm&utm_content=XDR-FY24-Q3-Content-Ebook-Advanced-Email-Threats-For-Dummies\" target=\"_blank\" rel=\"noopener\">Cisco.com</a> and download your free copy of <em><a href=\"//www.cisco.com/c/en/us/products/security/xdr/advanced-email-threats-for-dummies.html?utm_medium=media-article&utm_source=wiley&utm_campaign=XDR-FY24-Q3-Content-Ebook-Advanced-Email-Threats-For-Dummies&utm_term=pgm&utm_content=XDR-FY24-Q3-Content-Ebook-Advanced-Email-Threats-For-Dummies\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">Advanced Email Threats For Dummies</a> </em>to learn more about advanced email threats.","description":"Advanced email threats use a wide range of methods to attack company security, including sophisticated technology and an in-depth understanding of the weak points in the way that email recipients and senders communicate. To fight them, companies need to use tools including threat detection, threat hunting, and extended detection and response (XDR) technology.\r\n\r\nHere are ten things you can use to protect against advanced email threats.\r\n<h2 id=\"tab1\" >Use secure email threat defense</h2>\r\nUse a comprehensive email security solution to detect quickly and respond effectively. Look for an email defense system that automatically and reliably does many of the things that you might wish users would do consistently, such as:\r\n<ul>\r\n \t<li>Assess the sender’s reputation</li>\r\n \t<li>Asses the reputation of the email’s source URL</li>\r\n \t<li>Scan content for concerning words and phrases</li>\r\n \t<li>Scan file attachments and analyze their reputation and content</li>\r\n \t<li>Spot and block spam</li>\r\n</ul>\r\n<h2 id=\"tab2\" >Optimize your defenses against major email threats</h2>\r\nYou can scan the horizon for current threats and note what threats are being blocked — or causing breaches — at your organization. You can then respond by working with your vendor; working with your email provider; training your security personnel and end users; educating upper management; and many more steps.\r\n<h2 id=\"tab3\" >Use AI to understand and categorize threats</h2>\r\nYou can use AI to identify patterns that serve as indicators of an attack. These patterns are often so subtle that attackers aren’t aware of the breadcrumbs they’re leaving as they put together attempts at exploits. AI can spot these patterns before the bad actors do.\r\n<h2 id=\"tab4\" >Use threat data to inform and expedite your response</h2>\r\nBefore a threat arrives, you can know:\r\n<ul>\r\n \t<li>What the recent patterns of threats look like</li>\r\n \t<li>The signatures left by different kinds of threats</li>\r\n \t<li>What attacks are leading to successful breaches</li>\r\n \t<li>The best response to each different kind of breach</li>\r\n</ul>\r\nBy using threat data, you help yourself at every step of the “funnel” of security breaches: reducing the number of attacks that reach user inboxes, reducing the impact when a malicious email is opened or a toxic file attachment is downloaded, and responding quickly and effectively to the remaining breaches that do occur.\r\n<h2 id=\"tab5\" >Act quickly to ensure maximum protection against threats</h2>\r\nBy acting automatically against many threats, and by providing alerts and information about the threats that do appear, the best email security solutions give you a precious gift in responding to any remaining breaches: time.\r\n\r\nWith a solution in place, your best people are empowered to respond quickly and effectively to the breaches that do occur, while directing their focus to strategic efforts such as studying the breach, understanding how it occurred, and taking the steps needed to prevent a recurrence.\r\n<h2 id=\"tab6\" >Unify visibility across control points</h2>\r\nLook for a security provider that helps you unify visibility across multiple control points so you can, for instance, tie the damage that’s occurring from a successful breach to the original gaps in your defenses that allowed it to occur. You can then “mind the gap” and prevent the problem from recurring in the future.\r\n<h2 id=\"tab7\" >Embrace automated tools to maximize resources</h2>\r\nAutomated tools save your people’s time and focus for the largest potential threats. These tools also allow your team to find a solution and then “set it and forget it,” using the automated tools to prevent the same problem from happening again.\r\n<h2 id=\"tab8\" >Detect sooner, respond faster</h2>\r\nYou can’t solve a problem you don’t know you have — and most cybersecurity breaches get worse the longer it takes you to respond. Effective security solutions buy you time, removing some threats and giving you early notice of others.\r\n<h2 id=\"tab9\" >Getting started</h2>\r\nVisit <a href=\"//www.cisco.com/c/en/us/products/security/xdr/advanced-email-threats-for-dummies.html?utm_medium=media-article&utm_source=wiley&utm_campaign=XDR-FY24-Q3-Content-Ebook-Advanced-Email-Threats-For-Dummies&utm_term=pgm&utm_content=XDR-FY24-Q3-Content-Ebook-Advanced-Email-Threats-For-Dummies\" target=\"_blank\" rel=\"noopener\">Cisco.com</a> and download your free copy of <em><a href=\"//www.cisco.com/c/en/us/products/security/xdr/advanced-email-threats-for-dummies.html?utm_medium=media-article&utm_source=wiley&utm_campaign=XDR-FY24-Q3-Content-Ebook-Advanced-Email-Threats-For-Dummies&utm_term=pgm&utm_content=XDR-FY24-Q3-Content-Ebook-Advanced-Email-Threats-For-Dummies\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">Advanced Email Threats For Dummies</a> </em>to learn more about advanced email threats.","blurb":"","authors":[],"primaryCategoryTaxonomy":{"categoryId":33537,"title":"Cybersecurity","slug":"cybersecurity","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33537"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"Use secure email threat defense","target":"#tab1"},{"label":"Optimize your defenses against major email threats","target":"#tab2"},{"label":"Use AI to understand and categorize threats","target":"#tab3"},{"label":"Use threat data to inform and expedite your response","target":"#tab4"},{"label":"Act quickly to ensure maximum protection against threats","target":"#tab5"},{"label":"Unify visibility across control points","target":"#tab6"},{"label":"Embrace automated tools to maximize resources","target":"#tab7"},{"label":"Detect sooner, respond faster","target":"#tab8"},{"label":"Getting started","target":"#tab9"}],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":301649,"title":"Takeaways about Extended Detection and Response (XDR)","slug":"takeaways-about-extended-detection-and-response-xdr","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/301649"}},{"articleId":301585,"title":"Risk-Based Cybersecurity with Managed Detection and Response (MDR)","slug":"risk-based-cybersecurity-with-managed-detection-and-response-mdr","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/301585"}},{"articleId":300402,"title":"Implementing Sustainable Cloud Security to Stop Remediation Nightmares","slug":"implementing-sustainable-cloud-security-to-stop-remediation-nightmares","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/300402"}},{"articleId":300029,"title":"Data Security Posture Management (DSPM) For Dummies","slug":"data-security-posture-management-dspm-for-dummies","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/300029"}},{"articleId":299346,"title":"Why Your Company Needs a Modern Data Loss Prevention System","slug":"why-your-company-needs-a-modern-data-loss-prevention-system","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299346"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;cybersecurity&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-65f09867cac80\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;cybersecurity&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-65f09867cb80a\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":true,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"Brought to you by Cisco","brandingLink":"//www.cisco.com/","brandingLogo":{"src":"//coursofppt.com/wp-content/uploads/cisco-logo-x125.png","width":125,"height":66},"sponsorAd":"","sponsorEbookTitle":" Advanced Email Threats For Dummies, Cisco Special Edition","sponsorEbookLink":"//www.cisco.com/c/en/us/products/security/xdr/advanced-email-threats-for-dummies.html?utm_medium=media-article&utm_source=wiley&utm_campaign=XDR-FY24-Q3-Content-Ebook-Advanced-Email-Threats-For-Dummies&utm_term=pgm&utm_content=XDR-FY24-Q3-Content-Ebook-Advanced-Email-Threats-For-Dummies","sponsorEbookImage":{"src":"//coursofppt.com/wp-content/uploads/advanced-email-threats-for-dummies-cisco-special-edition-163x255.jpg","width":163,"height":255}},"primaryLearningPath":"Solve","lifeExpectancy":"One year","lifeExpectancySetFrom":"2025-03-08T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[{"adPairKey":"sponsored","adPairValue":"customsolutions"}]},"status":"publish","visibility":"public","articleId":301654},{"headers":{"creationTime":"2025-03-07T22:01:07+00:00","modifiedTime":"2025-03-11T13:55:23+00:00","timestamp":"2025-03-11T15:01:32+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Cybersecurity","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33537"},"slug":"cybersecurity","categoryId":33537}],"title":"Takeaways about Extended Detection and Response (XDR)","strippedTitle":"takeaways about extended detection and response (xdr)","slug":"takeaways-about-extended-detection-and-response-xdr","canonicalUrl":"","浏览登录器整合":{"metaDescription":"Uncover the 10 things you need to know about XDR, including key features to look for when shopping for an XDR system, and get a free ebook.","noIndex":0,"noFollow":0},"content":"What is XDR? It’s a recent addition to the swarm of acronyms bouncing around the business technology space. XDR platforms include tools for incident response, threat hunting, automation, threat detection, visualization, threat management, and more. What brings it all together is a centralized viewpoint of your entire security infrastructure.\r\n\r\nHere are ten things you need to know about XDR including some key features to look for when shopping for an XDR solution.\r\n<h2 id=\"tab1\" >Reduce time to detect and respond</h2>\r\nAt the end of the day, XDR platforms aim to reduce detection and response times. More data and more tools don’t mean faster security teams. They often mean overwhelmed security teams. XDR focuses on providing actionable information through machine learning-supported analytics and a centralized dashboard. On the response side, orchestration and automation features streamline the response process by providing easy-to-use and customizable tools for security staff.\r\n<h2 id=\"tab2\" >Visualize integrated security data</h2>\r\nXDR takes in a lot of information and must organize it to reduce alert fatigue, false positives, and general security operations hassle. Central dashboards are customizable information hubs for security teams to organize their data to fit the organization’s needs. Visualization tools such as incident maps should help identify threat sources and trace potentially new attack points.\r\n<h2 id=\"tab3\" >Precise monitoring</h2>\r\nBecause XDR platforms usually come with machine learning-based analytics, and rely on secondary security tools for data collection, security teams should have a clear view of an organization’s ecosystem. Providing good information, rather than lots of information, cleans up what staff actually see, making it easier to focus on legitimate security concerns.\r\n<h2 id=\"tab4\" >Contextualize alerts and reduce false positives</h2>\r\nXDR’s centralized dashboard features provide context to security situations. Alerts coming in are more reliable because the XDR system has the relevant threat intelligence required to make decisions about what is concerning, abnormal behavior and what isn’t.\r\n\r\nFalse positives are a waste of resources, and XDR’s comprehensive view of the IT infrastructure helps reduce their frequency.\r\n<h2 id=\"tab5\" >Automated responses</h2>\r\nAutomation features have been around in the security space for some time, but XDR’s broad reach enables its automation tools to benefit from some fine-tuning. Many XDR products offer machine learning-supported automation that can take care of rote security tasks, so security staff can work on the harder jobs that need human intervention.\r\n<h2 id=\"tab6\" >Keep it open</h2>\r\nXDR isn’t a lone wolf and needs the support of specialized security tools. XDR platforms offer a lot of integration options, both with existing security tools and ones that may be added in the future.\r\n\r\nEndpoint detection and response (EDR) and network detection and response (NDR) in particular are two tools to think about including when building out your security infrastructure.\r\n<h2 id=\"tab7\" >Store and analyze logs at scale</h2>\r\nBecause of the powerful analytics tools XDR brings in, these platforms are able to process large amounts of security data. XDR solutions are easily scalable so your organization can grow over time, without worrying how your security analytics will have to change.\r\n<h2 id=\"tab8\" >Address compliance requirements</h2>\r\nThe large amount of data that can be processed by XDR also means compliance and industry regulation requirements can be confidently met. Organizations involved in healthcare or finance are especially in need of extensive logging and analysis tools.\r\n<h2 id=\"tab9\" >Siloed solutions are partial solutions</h2>\r\nSecurity infrastructure has become so vast that siloing systems has become common. Enterprise-level IT infrastructure can’t rely on this separation of systems, as attackers expand and develop their attack strategies. Incomplete security information can lead to false positives and alert fatigue, because monitoring tools won’t have the full context of suspicious activity.\r\n<h2 id=\"tab10\" >Remember the human factors</h2>\r\nThe security personnel managing these tools are the most important part of any successful IT security environment. Inefficient security solutions overwork security staff by burdening them with false positive threats, unnecessary alerts that lead to alert fatigue, and lackluster identification and response tools that slow them down.\r\n<h2 id=\"tab11\" >Getting started</h2>\r\nVisit <a href=\"//www.cisco.com/c/en/us/products/security/xdr/xdr-for-dummies.html?utm_medium=media-article&utm_source=wiley&utm_campaign=XDR-FY24-Q2-Content-Ebook-XDR-For-Dummies-Refresh&utm_term=pgm&utm_content=XDR-FY24-Q2-Content-Ebook-XDR-For-Dummies-Refresh\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">Cisco.com</a> and download your free copy of <a href=\"//www.cisco.com/c/en/us/products/security/xdr/xdr-for-dummies.html?utm_medium=media-article&utm_source=wiley&utm_campaign=XDR-FY24-Q2-Content-Ebook-XDR-For-Dummies-Refresh&utm_term=pgm&utm_content=XDR-FY24-Q2-Content-Ebook-XDR-For-Dummies-Refresh\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\"><em>Extended Detection and Response (XDR) For Dummies, 2nd Cisco Special Edition</em></a> to learn more about topic.","description":"What is XDR? It’s a recent addition to the swarm of acronyms bouncing around the business technology space. XDR platforms include tools for incident response, threat hunting, automation, threat detection, visualization, threat management, and more. What brings it all together is a centralized viewpoint of your entire security infrastructure.\r\n\r\nHere are ten things you need to know about XDR including some key features to look for when shopping for an XDR solution.\r\n<h2 id=\"tab1\" >Reduce time to detect and respond</h2>\r\nAt the end of the day, XDR platforms aim to reduce detection and response times. More data and more tools don’t mean faster security teams. They often mean overwhelmed security teams. XDR focuses on providing actionable information through machine learning-supported analytics and a centralized dashboard. On the response side, orchestration and automation features streamline the response process by providing easy-to-use and customizable tools for security staff.\r\n<h2 id=\"tab2\" >Visualize integrated security data</h2>\r\nXDR takes in a lot of information and must organize it to reduce alert fatigue, false positives, and general security operations hassle. Central dashboards are customizable information hubs for security teams to organize their data to fit the organization’s needs. Visualization tools such as incident maps should help identify threat sources and trace potentially new attack points.\r\n<h2 id=\"tab3\" >Precise monitoring</h2>\r\nBecause XDR platforms usually come with machine learning-based analytics, and rely on secondary security tools for data collection, security teams should have a clear view of an organization’s ecosystem. Providing good information, rather than lots of information, cleans up what staff actually see, making it easier to focus on legitimate security concerns.\r\n<h2 id=\"tab4\" >Contextualize alerts and reduce false positives</h2>\r\nXDR’s centralized dashboard features provide context to security situations. Alerts coming in are more reliable because the XDR system has the relevant threat intelligence required to make decisions about what is concerning, abnormal behavior and what isn’t.\r\n\r\nFalse positives are a waste of resources, and XDR’s comprehensive view of the IT infrastructure helps reduce their frequency.\r\n<h2 id=\"tab5\" >Automated responses</h2>\r\nAutomation features have been around in the security space for some time, but XDR’s broad reach enables its automation tools to benefit from some fine-tuning. Many XDR products offer machine learning-supported automation that can take care of rote security tasks, so security staff can work on the harder jobs that need human intervention.\r\n<h2 id=\"tab6\" >Keep it open</h2>\r\nXDR isn’t a lone wolf and needs the support of specialized security tools. XDR platforms offer a lot of integration options, both with existing security tools and ones that may be added in the future.\r\n\r\nEndpoint detection and response (EDR) and network detection and response (NDR) in particular are two tools to think about including when building out your security infrastructure.\r\n<h2 id=\"tab7\" >Store and analyze logs at scale</h2>\r\nBecause of the powerful analytics tools XDR brings in, these platforms are able to process large amounts of security data. XDR solutions are easily scalable so your organization can grow over time, without worrying how your security analytics will have to change.\r\n<h2 id=\"tab8\" >Address compliance requirements</h2>\r\nThe large amount of data that can be processed by XDR also means compliance and industry regulation requirements can be confidently met. Organizations involved in healthcare or finance are especially in need of extensive logging and analysis tools.\r\n<h2 id=\"tab9\" >Siloed solutions are partial solutions</h2>\r\nSecurity infrastructure has become so vast that siloing systems has become common. Enterprise-level IT infrastructure can’t rely on this separation of systems, as attackers expand and develop their attack strategies. Incomplete security information can lead to false positives and alert fatigue, because monitoring tools won’t have the full context of suspicious activity.\r\n<h2 id=\"tab10\" >Remember the human factors</h2>\r\nThe security personnel managing these tools are the most important part of any successful IT security environment. Inefficient security solutions overwork security staff by burdening them with false positive threats, unnecessary alerts that lead to alert fatigue, and lackluster identification and response tools that slow them down.\r\n<h2 id=\"tab11\" >Getting started</h2>\r\nVisit <a href=\"//www.cisco.com/c/en/us/products/security/xdr/xdr-for-dummies.html?utm_medium=media-article&utm_source=wiley&utm_campaign=XDR-FY24-Q2-Content-Ebook-XDR-For-Dummies-Refresh&utm_term=pgm&utm_content=XDR-FY24-Q2-Content-Ebook-XDR-For-Dummies-Refresh\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">Cisco.com</a> and download your free copy of <a href=\"//www.cisco.com/c/en/us/products/security/xdr/xdr-for-dummies.html?utm_medium=media-article&utm_source=wiley&utm_campaign=XDR-FY24-Q2-Content-Ebook-XDR-For-Dummies-Refresh&utm_term=pgm&utm_content=XDR-FY24-Q2-Content-Ebook-XDR-For-Dummies-Refresh\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\"><em>Extended Detection and Response (XDR) For Dummies, 2nd Cisco Special Edition</em></a> to learn more about topic.","blurb":"","authors":[],"primaryCategoryTaxonomy":{"categoryId":33537,"title":"Cybersecurity","slug":"cybersecurity","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33537"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"Reduce time to detect and respond","target":"#tab1"},{"label":"Visualize integrated security data","target":"#tab2"},{"label":"Precise monitoring","target":"#tab3"},{"label":"Contextualize alerts and reduce false positives","target":"#tab4"},{"label":"Automated responses","target":"#tab5"},{"label":"Keep it open","target":"#tab6"},{"label":"Store and analyze logs at scale","target":"#tab7"},{"label":"Address compliance requirements","target":"#tab8"},{"label":"Siloed solutions are partial solutions","target":"#tab9"},{"label":"Remember the human factors","target":"#tab10"},{"label":"Getting started","target":"#tab11"}],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":301654,"title":"Nine Ways to Protect Against Advanced Email Threats","slug":"nine-ways-to-protect-against-advanced-email-threats","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/301654"}},{"articleId":301585,"title":"Risk-Based Cybersecurity with Managed Detection and Response (MDR)","slug":"risk-based-cybersecurity-with-managed-detection-and-response-mdr","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/301585"}},{"articleId":300402,"title":"Implementing Sustainable Cloud Security to Stop Remediation Nightmares","slug":"implementing-sustainable-cloud-security-to-stop-remediation-nightmares","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/300402"}},{"articleId":300029,"title":"Data Security Posture Management (DSPM) For Dummies","slug":"data-security-posture-management-dspm-for-dummies","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/300029"}},{"articleId":299346,"title":"Why Your Company Needs a Modern Data Loss Prevention System","slug":"why-your-company-needs-a-modern-data-loss-prevention-system","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299346"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;cybersecurity&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-65ef1ccc25664\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;cybersecurity&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-65ef1ccc262e5\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":true,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"Brought to you by Cisco","brandingLink":"//www.cisco.com/","brandingLogo":{"src":"//coursofppt.com/wp-content/uploads/cisco-logo-x125.png","width":125,"height":66},"sponsorAd":"","sponsorEbookTitle":"Extended Detection and Response (XDR) For Dummies, 2nd Cisco Special Edition","sponsorEbookLink":"//www.cisco.com/c/en/us/products/security/xdr/xdr-for-dummies.html?utm_medium=media-article&utm_source=wiley&utm_campaign=XDR-FY24-Q2-Content-Ebook-XDR-For-Dummies-Refresh&utm_term=pgm&utm_content=XDR-FY24-Q2-Content-Ebook-XDR-For-Dummies-Refresh","sponsorEbookImage":{"src":"//coursofppt.com/wp-content/uploads/xdr-for-dummies-2nd-cisco-special-edition-163x255.jpg","width":163,"height":255}},"primaryLearningPath":"Solve","lifeExpectancy":"One year","lifeExpectancySetFrom":"2025-03-08T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[{"adPairKey":"sponsored","adPairValue":"customsolutions"}]},"status":"publish","visibility":"public","articleId":301649},{"headers":{"creationTime":"2025-02-15T21:24:46+00:00","modifiedTime":"2025-02-15T21:24:46+00:00","timestamp":"2025-02-16T00:01:08+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Cybersecurity","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33537"},"slug":"cybersecurity","categoryId":33537}],"title":"Risk-Based Cybersecurity with Managed Detection and Response (MDR)","strippedTitle":"risk-based cybersecurity with managed detection and response (mdr)","slug":"risk-based-cybersecurity-with-managed-detection-and-response-mdr","canonicalUrl":"","浏览登录器整合":{"metaDescription":"Download your free copy of Managed Detection & Response (MDR) For Dummies to learn more about MDR and a risk-based approach to cybersecurity.","noIndex":0,"noFollow":0},"content":"<h2 id=\"tab1\" >What is MDR?</h2>\r\nManaged detection and response (MDR) is more a security service than it is a security tool. The words “detection and response” sound like the most important part of the acronym, and those are the meat and potatoes of any good security infrastructure, but what sets MDR apart is how the solution is <em>managed.</em>\r\n\r\nMDR service providers offer businesses access to in-house security experts who monitor, alert, investigate, create response plans, and more. MDR providers’ detection and response tools are integrated into an existing IT infrastructure so the security pros can detect and respond to security threats.\r\n\r\nMDR solutions are for small to midsize organizations that can’t support a full staff of security operations employees and larger organizations that wish to supplement their existing security solutions. MDR is a strong option for many organizations, but it’s important to remember that not all MDRs are created equal. At their core, MDR solutions offer integrated security tools monitored and managed by the provider’s security professionals, but there can be key differences among solutions.\r\n\r\nFor instance, it’s wise to select a vendor that uses the latest technologies, partners with you, and provides consulting and technical support, such as digital forensics and incident response (DFIR) services.\r\n<h2 id=\"tab2\" >A risk-based approach to cybersecurity</h2>\r\nA risk-based approach to cybersecurity is a key differentiator in the MDR market. Companies that use risk-based cybersecurity stop three times more attacks, find more than 50 percent of incidents within one day, and see impactful breaches reduced from 76 to 28 percent, according to an Accenture cybersecurity <a href=\"//www.accenture.com/us-en/insights/security/state-cybersecurity\" target=\"_blank\" rel=\"noopener\">report</a>.\r\n\r\nTo make these security options more accessible to small and midsize companies, a true risk-based, consultative approach to cybersecurity is recommended. A partnership between the client and the MDR vendor allows smaller organizations to protect themselves from the onslaught of cyberattacks, vulnerabilities, and risks without hiring an internal security team. A risk-based approach enables clients to tap into end-to-end solutions with a team of skilled, innovative professionals enabled by technology, automation, and advanced analytics to meet individual client organization needs.\r\n<h2 id=\"tab3\" >Humans are the key</h2>\r\nJust as humans are the driving force behind today’s security threats, they’re also behind the best security solutions for combating them. This <em>humans-first</em> approach to MDR integrates human intervention and problem-solving into almost every step of the threat response life cycle.\r\n\r\nA truly successful MDR service must combine the intelligence and creativity of human minds with powerful security technology. An example of this philosophy in action is the thousands of alerts that security information and event management (SIEM) systems can produce. Security experts must sift through them so alert fatigue and false negatives don’t impact security operations. Accessibility to analysts for questions and updates is important because two-way conversations and real relationships build a strong cybersecurity program.\r\n<h2 id=\"tab4\" >Consultative approach</h2>\r\nA consultative approach to security provides access to experienced security practitioners. Look for an MDR that is with you throughout your journey to partner with you and design a program that focuses on your specific cybersecurity and compliance needs today, with the built-in capability to evolve your program as the cybersecurity landscape changes and as your needs and priorities change.\r\n\r\nAccess to security professionals provided by MDR services helps overcome security challenges. A select few MDR service providers offer risk assessments and penetration testing and have teams of people who know how to navigate compliance and regulation issues.\r\n\r\nLook for an MDR partner whose business is built on the risk-based consultative approach for clients, enabling them to provide end-to-end solutions with a team of skilled, innovative professionals enabled by technology, automation, and advanced analytics to meet individual client organization needs.\r\n<h2 id=\"tab5\" >Getting started</h2>\r\nVisit <a href=\"//www.pondurance.com/?utm_source=dummies&utm_medium=article&utm_campaign=mdr&utm_content=dummiesarticle&utm_term=dummiesarticalhp\" target=\"_blank\" rel=\"noopener\">Pondurance.com</a> and download your free copy of <em><a href=\"//cybersecurity.pondurance.com/mdr-security-for-dummies_wr?utm_source=dummies&utm_medium=article&utm_campaign=mdr&utm_content=dummiesarticle&utm_term=dummiesarticleebook\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">Managed Detection & Response (MDR) For Dummies</a></em> to learn more about MDR.","description":"<h2 id=\"tab1\" >What is MDR?</h2>\r\nManaged detection and response (MDR) is more a security service than it is a security tool. The words “detection and response” sound like the most important part of the acronym, and those are the meat and potatoes of any good security infrastructure, but what sets MDR apart is how the solution is <em>managed.</em>\r\n\r\nMDR service providers offer businesses access to in-house security experts who monitor, alert, investigate, create response plans, and more. MDR providers’ detection and response tools are integrated into an existing IT infrastructure so the security pros can detect and respond to security threats.\r\n\r\nMDR solutions are for small to midsize organizations that can’t support a full staff of security operations employees and larger organizations that wish to supplement their existing security solutions. MDR is a strong option for many organizations, but it’s important to remember that not all MDRs are created equal. At their core, MDR solutions offer integrated security tools monitored and managed by the provider’s security professionals, but there can be key differences among solutions.\r\n\r\nFor instance, it’s wise to select a vendor that uses the latest technologies, partners with you, and provides consulting and technical support, such as digital forensics and incident response (DFIR) services.\r\n<h2 id=\"tab2\" >A risk-based approach to cybersecurity</h2>\r\nA risk-based approach to cybersecurity is a key differentiator in the MDR market. Companies that use risk-based cybersecurity stop three times more attacks, find more than 50 percent of incidents within one day, and see impactful breaches reduced from 76 to 28 percent, according to an Accenture cybersecurity <a href=\"//www.accenture.com/us-en/insights/security/state-cybersecurity\" target=\"_blank\" rel=\"noopener\">report</a>.\r\n\r\nTo make these security options more accessible to small and midsize companies, a true risk-based, consultative approach to cybersecurity is recommended. A partnership between the client and the MDR vendor allows smaller organizations to protect themselves from the onslaught of cyberattacks, vulnerabilities, and risks without hiring an internal security team. A risk-based approach enables clients to tap into end-to-end solutions with a team of skilled, innovative professionals enabled by technology, automation, and advanced analytics to meet individual client organization needs.\r\n<h2 id=\"tab3\" >Humans are the key</h2>\r\nJust as humans are the driving force behind today’s security threats, they’re also behind the best security solutions for combating them. This <em>humans-first</em> approach to MDR integrates human intervention and problem-solving into almost every step of the threat response life cycle.\r\n\r\nA truly successful MDR service must combine the intelligence and creativity of human minds with powerful security technology. An example of this philosophy in action is the thousands of alerts that security information and event management (SIEM) systems can produce. Security experts must sift through them so alert fatigue and false negatives don’t impact security operations. Accessibility to analysts for questions and updates is important because two-way conversations and real relationships build a strong cybersecurity program.\r\n<h2 id=\"tab4\" >Consultative approach</h2>\r\nA consultative approach to security provides access to experienced security practitioners. Look for an MDR that is with you throughout your journey to partner with you and design a program that focuses on your specific cybersecurity and compliance needs today, with the built-in capability to evolve your program as the cybersecurity landscape changes and as your needs and priorities change.\r\n\r\nAccess to security professionals provided by MDR services helps overcome security challenges. A select few MDR service providers offer risk assessments and penetration testing and have teams of people who know how to navigate compliance and regulation issues.\r\n\r\nLook for an MDR partner whose business is built on the risk-based consultative approach for clients, enabling them to provide end-to-end solutions with a team of skilled, innovative professionals enabled by technology, automation, and advanced analytics to meet individual client organization needs.\r\n<h2 id=\"tab5\" >Getting started</h2>\r\nVisit <a href=\"//www.pondurance.com/?utm_source=dummies&utm_medium=article&utm_campaign=mdr&utm_content=dummiesarticle&utm_term=dummiesarticalhp\" target=\"_blank\" rel=\"noopener\">Pondurance.com</a> and download your free copy of <em><a href=\"//cybersecurity.pondurance.com/mdr-security-for-dummies_wr?utm_source=dummies&utm_medium=article&utm_campaign=mdr&utm_content=dummiesarticle&utm_term=dummiesarticleebook\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">Managed Detection & Response (MDR) For Dummies</a></em> to learn more about MDR.","blurb":"","authors":[],"primaryCategoryTaxonomy":{"categoryId":33537,"title":"Cybersecurity","slug":"cybersecurity","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33537"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"What is MDR?","target":"#tab1"},{"label":"A risk-based approach to cybersecurity","target":"#tab2"},{"label":"Humans are the key","target":"#tab3"},{"label":"Consultative approach","target":"#tab4"},{"label":"Getting started","target":"#tab5"}],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":300402,"title":"Implementing Sustainable Cloud Security to Stop Remediation Nightmares","slug":"implementing-sustainable-cloud-security-to-stop-remediation-nightmares","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/300402"}},{"articleId":300029,"title":"Data Security Posture Management (DSPM) For Dummies","slug":"data-security-posture-management-dspm-for-dummies","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/300029"}},{"articleId":299346,"title":"Why Your Company Needs a Modern Data Loss Prevention System","slug":"why-your-company-needs-a-modern-data-loss-prevention-system","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299346"}},{"articleId":296631,"title":"Cybersecurity All-in-One For Dummies Cheat Sheet","slug":"cybersecurity-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/296631"}},{"articleId":291466,"title":"Security Awareness For Dummies Cheat Sheet","slug":"security-awareness-for-dummies-cheat-sheet","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/291466"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;cybersecurity&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-65cea5c499493\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;cybersecurity&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-65cea5c49b8a0\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":true,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"Brought to you by Pondurance","brandingLink":"//www.pondurance.com/?utm_source=dummies&amp;utm_medium=article&amp;utm_campaign=mdr&amp;utm_content=dummiesarticle&amp;utm_term=dummiesarticalhp","brandingLogo":{"src":"//coursofppt.com/wp-content/uploads/pondurance-logo-2c-horizontal-185x55-1.png","width":185,"height":55},"sponsorAd":"","sponsorEbookTitle":"Managed Detection & Response (MDR) For Dummies","sponsorEbookLink":"//cybersecurity.pondurance.com/mdr-security-for-dummies_wr?utm_source=dummies&amp;utm_medium=article&amp;utm_campaign=mdr&amp;utm_content=dummiesarticle&amp;utm_term=dummiesarticleebook","sponsorEbookImage":{"src":"//coursofppt.com/wp-content/uploads/managed-detection-and-response-for-dummies-2nd-ponderance-special-edition-165x255.jpg","width":165,"height":255}},"primaryLearningPath":"Solve","lifeExpectancy":"One year","lifeExpectancySetFrom":"2025-02-16T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[{"adPairKey":"sponsored","adPairValue":"customsolutions"}]},"status":"publish","visibility":"public","articleId":301585},{"headers":{"creationTime":"2024-01-04T20:39:35+00:00","modifiedTime":"2025-01-26T15:39:36+00:00","timestamp":"2025-01-26T18:01:12+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"Cloud Computing","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33584"},"slug":"cloud-computing","categoryId":33584}],"title":"Your Business Performance Can Soar with Enterprise Automation","strippedTitle":"your business performance can soar with enterprise automation","slug":"watch-your-business-performance-soar-with-enterprise-automation","canonicalUrl":"","浏览登录器整合":{"metaDescription":"Enterprise Automation For Dummies is your guide to understanding how modern enterprise automation enables companies to empower people at unheard-of scale to create their own app and data integrations.","noIndex":0,"noFollow":0},"content":"In this article you will learn:\r\n<ul>\r\n \t<li><a href=\"#what\">What enterprise automation is</a></li>\r\n \t<li><a href=\"#why\">Why you should implement enterprise automation</a></li>\r\n \t<li><a href=\"#how\">How enterprise automation will impact businesses in the future</a></li>\r\n</ul>\r\n<div id=\"what\"></div>\r\n<h2 id=\"tab1\" >What is enterprise automation?</h2>\r\nEnterprise automation increases efficiency by replacing repetitive, manual, and error-prone business processes with intelligent, automated, and more reliable workflows. Enterprise automation is an ongoing and strategic driver of the digital business landscape that seamlessly connects data, applications, and services with people and their organizations.\r\n\r\nWith enterprise automation, companies remove bottlenecks, improve and accelerate the flow of data, empower IT resources with better productivity, and give non-IT business groups the ability to easily self-serve their data needs – across their enterprise.\r\n<div id=\"why\"></div>\r\n<h2 id=\"tab2\" >Why enterprise automation?</h2>\r\nThink about the IT and organizational challenges you face today.\r\n\r\nYou’re experiencing poor agility in certain areas. Meanwhile, the rapid pace of business requires digitalization, cloud adoption, and quick responsiveness. This situation is exactly what you want to aspire to; however, your business processes are sluggish and suffering where data silos persist. Collaboration between teams is more difficult than it should be.\r\n\r\n[caption id=\"attachment_296577\" align=\"aligncenter\" width=\"535\"]<img class=\"size-full wp-image-296577\" src=\"//coursofppt.com/wp-content/uploads/snaplogic-data-silos-getty-157192883.jpg\" alt=\"\" width=\"535\" height=\"399\" /> © Andrey Prokhorov/Getty Images[/caption]\r\n\r\nNot only is business moving quickly, but the pace of innovation is increasing as well. Your project leaders, your customers, your internal business partners, and your employee expectations are ever increasing. This forces your organization to be more innovative and try new things as you seek to become faster and more efficient.\r\n\r\nCompetitors in your landscape aren’t sitting still. You need to leverage and exploit all the data you can across your enterprise — operational systems, functional applications, and multiple channels of data. All must be harnessed to survive, thrive, and excel in a competitive landscape and to take corporate intelligence to the next level.\r\n\r\n[caption id=\"attachment_296578\" align=\"aligncenter\" width=\"535\"]<img class=\"size-full wp-image-296578\" src=\"//coursofppt.com/wp-content/uploads/snaplogic-illustration-business-agility.png\" alt=\"\" width=\"535\" height=\"159\" /> Embracing the new normal means boosting business agility to respond and execute quickly and empowering large numbers of people to perform their jobs most effectively and efficiently.[/caption]\r\n\r\nYou recognize that to be agile and responsive, and to achieve these aspirations, you need solutions to be agile and responsive and capable of connecting your entire enterprise, end-to-end.\r\n\r\nThat is what enterprise automation is all about and the inspiration behind <a class=\"bookSponsor-btn\" href=\"//www.snaplogic.com/lp/enterprise-automation-for-dummies\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\"><em>Enterprise Automation For Dummies</em></a>, sponsored by SnapLogic.\r\n<div id=\"how\"></div>\r\n<h2 id=\"tab3\" >The future is enterprise automation</h2>\r\nEnterprise automation done well uniquely combines data integration, app-to-app integration, and API development and management for API-led integrations and delivery of data services. And, it doesn’t have to be complicated. Easy-to-use, event-driven platforms, augmented with graphical (low-code and no-code) user interfaces and AI-assistance, enables you to get up and running sooner to remove manual burdens and automate business processes.\r\n\r\n<img class=\"aligncenter size-full wp-image-296863\" src=\"//coursofppt.com/wp-content/uploads/snaplogic-illustration-application-integration-2.png\" alt=\"Application integration is sharing record-level, operational data between two or more applications.\" width=\"535\" height=\"363\" />\r\n\r\nTo learn more, download <a class=\"bookSponsor-btn\" href=\"//www.snaplogic.com/lp/enterprise-automation-for-dummies\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\"><em>Enterprise Automation For Dummies</em></a> to gain knowledge of integration principles and pick up insights on how to automate and orchestrate data across your enterprise and empower people. <em>Enterprise Automation For Dummies</em> includes case studies with summaries and achieved success metrics.\r\n\r\nDownload <a class=\"bookSponsor-btn\" href=\"//www.snaplogic.com/lp/enterprise-automation-for-dummies\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\"><em>Enterprise Automation For Dummies</em></a> today and chart your future.","description":"In this article you will learn:\r\n<ul>\r\n \t<li><a href=\"#what\">What enterprise automation is</a></li>\r\n \t<li><a href=\"#why\">Why you should implement enterprise automation</a></li>\r\n \t<li><a href=\"#how\">How enterprise automation will impact businesses in the future</a></li>\r\n</ul>\r\n<div id=\"what\"></div>\r\n<h2 id=\"tab1\" >What is enterprise automation?</h2>\r\nEnterprise automation increases efficiency by replacing repetitive, manual, and error-prone business processes with intelligent, automated, and more reliable workflows. Enterprise automation is an ongoing and strategic driver of the digital business landscape that seamlessly connects data, applications, and services with people and their organizations.\r\n\r\nWith enterprise automation, companies remove bottlenecks, improve and accelerate the flow of data, empower IT resources with better productivity, and give non-IT business groups the ability to easily self-serve their data needs – across their enterprise.\r\n<div id=\"why\"></div>\r\n<h2 id=\"tab2\" >Why enterprise automation?</h2>\r\nThink about the IT and organizational challenges you face today.\r\n\r\nYou’re experiencing poor agility in certain areas. Meanwhile, the rapid pace of business requires digitalization, cloud adoption, and quick responsiveness. This situation is exactly what you want to aspire to; however, your business processes are sluggish and suffering where data silos persist. Collaboration between teams is more difficult than it should be.\r\n\r\n[caption id=\"attachment_296577\" align=\"aligncenter\" width=\"535\"]<img class=\"size-full wp-image-296577\" src=\"//coursofppt.com/wp-content/uploads/snaplogic-data-silos-getty-157192883.jpg\" alt=\"\" width=\"535\" height=\"399\" /> © Andrey Prokhorov/Getty Images[/caption]\r\n\r\nNot only is business moving quickly, but the pace of innovation is increasing as well. Your project leaders, your customers, your internal business partners, and your employee expectations are ever increasing. This forces your organization to be more innovative and try new things as you seek to become faster and more efficient.\r\n\r\nCompetitors in your landscape aren’t sitting still. You need to leverage and exploit all the data you can across your enterprise — operational systems, functional applications, and multiple channels of data. All must be harnessed to survive, thrive, and excel in a competitive landscape and to take corporate intelligence to the next level.\r\n\r\n[caption id=\"attachment_296578\" align=\"aligncenter\" width=\"535\"]<img class=\"size-full wp-image-296578\" src=\"//coursofppt.com/wp-content/uploads/snaplogic-illustration-business-agility.png\" alt=\"\" width=\"535\" height=\"159\" /> Embracing the new normal means boosting business agility to respond and execute quickly and empowering large numbers of people to perform their jobs most effectively and efficiently.[/caption]\r\n\r\nYou recognize that to be agile and responsive, and to achieve these aspirations, you need solutions to be agile and responsive and capable of connecting your entire enterprise, end-to-end.\r\n\r\nThat is what enterprise automation is all about and the inspiration behind <a class=\"bookSponsor-btn\" href=\"//www.snaplogic.com/lp/enterprise-automation-for-dummies\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\"><em>Enterprise Automation For Dummies</em></a>, sponsored by SnapLogic.\r\n<div id=\"how\"></div>\r\n<h2 id=\"tab3\" >The future is enterprise automation</h2>\r\nEnterprise automation done well uniquely combines data integration, app-to-app integration, and API development and management for API-led integrations and delivery of data services. And, it doesn’t have to be complicated. Easy-to-use, event-driven platforms, augmented with graphical (low-code and no-code) user interfaces and AI-assistance, enables you to get up and running sooner to remove manual burdens and automate business processes.\r\n\r\n<img class=\"aligncenter size-full wp-image-296863\" src=\"//coursofppt.com/wp-content/uploads/snaplogic-illustration-application-integration-2.png\" alt=\"Application integration is sharing record-level, operational data between two or more applications.\" width=\"535\" height=\"363\" />\r\n\r\nTo learn more, download <a class=\"bookSponsor-btn\" href=\"//www.snaplogic.com/lp/enterprise-automation-for-dummies\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\"><em>Enterprise Automation For Dummies</em></a> to gain knowledge of integration principles and pick up insights on how to automate and orchestrate data across your enterprise and empower people. <em>Enterprise Automation For Dummies</em> includes case studies with summaries and achieved success metrics.\r\n\r\nDownload <a class=\"bookSponsor-btn\" href=\"//www.snaplogic.com/lp/enterprise-automation-for-dummies\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\"><em>Enterprise Automation For Dummies</em></a> today and chart your future.","blurb":"","authors":[{"authorId":35233,"name":"Michael Nixon","slug":"michael-nixon","description":"Michael Nixon is vice president of product marketing with SnapLogic and an enlightened professional in the cloud data solutions industry. He has authored or contributed to three For Dummies books.","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/35233"}}],"primaryCategoryTaxonomy":{"categoryId":33584,"title":"Cloud Computing","slug":"cloud-computing","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33584"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"What is enterprise automation?","target":"#tab1"},{"label":"Why enterprise automation?","target":"#tab2"},{"label":"The future is enterprise automation","target":"#tab3"}],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":271400,"title":"Planning Your Cloud Computing Strategy","slug":"planning-your-cloud-computing-strategy","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/271400"}},{"articleId":271395,"title":"10 Cloud Do’s and Don’ts","slug":"10-cloud-dos-and-donts","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/271395"}},{"articleId":271389,"title":"How SaaS Fits into the Multicloud World","slug":"how-saas-fits-into-the-multicloud-world","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/271389"}},{"articleId":271384,"title":"Cloud Computing as the Engine of Adaptive Change","slug":"cloud-computing-as-the-engine-of-adaptive-change","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/271384"}},{"articleId":271379,"title":"Cloud Computing Elements: Resource Pools/Cloud Models and Services","slug":"cloud-computing-elements-resource-pools-cloud-models-and-services","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/271379"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;cloud-computing&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-65b3f368f29be\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;cloud-computing&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-65b3f368f3253\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":true,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"Brought to you by SnapLogic","brandingLink":"//www.snaplogic.com/","brandingLogo":{"src":"//coursofppt.com/wp-content/uploads/snaplogic-logo-280x73-1-270x70.png","width":270,"height":70},"sponsorAd":"","sponsorEbookTitle":"Enterprise Automation For Dummies, SnapLogic Special Edition","sponsorEbookLink":"//www.snaplogic.com/lp/enterprise-automation-for-dummies","sponsorEbookImage":{"src":"//coursofppt.com/wp-content/uploads/enterprise-automation-for-dummies-snaplogic-special-edition-cover-9781119797944.jpg","width":113,"height":175}},"primaryLearningPath":"Solve","lifeExpectancy":"One year","lifeExpectancySetFrom":"2024-01-05T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"yes","adInfo":"","adPairKey":[{"adPairKey":"sponsored","adPairValue":"customsolutions"}]},"status":"publish","visibility":"public","articleId":296572},{"headers":{"creationTime":"2017-03-27T16:49:33+00:00","modifiedTime":"2025-01-18T18:44:02+00:00","timestamp":"2025-01-18T21:01:08+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Programming & Web Design","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33592"},"slug":"programming-web-design","categoryId":33592},{"name":"Blogging & Website Platforms","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/34376"},"slug":"blogging-website-platforms","categoryId":34376},{"name":"WordPress","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33609"},"slug":"wordpress","categoryId":33609}],"title":"WordPress All-in-One For Dummies Cheat Sheet","strippedTitle":"wordpress all-in-one for dummies cheat sheet","slug":"wordpress-all-in-one-for-dummies-cheat-sheet","canonicalUrl":"","浏览登录器整合":{"metaDescription":"Start by familiarizing yourself with the WordPress dashboard, then learn where to find more support for managing WordPress site content with this cheat sheet.","noIndex":0,"noFollow":0},"content":"Tailor your blog with WordPress software, whether you're writing, editing, or publishing WordPress site content. An understanding of WordPress's dashboard controls and of the types of content available to you helps you get the most out of your website. Also, when all else fails, it's good to know where you can turn to for help with WordPress.","description":"Tailor your blog with WordPress software, whether you're writing, editing, or publishing WordPress site content. An understanding of WordPress's dashboard controls and of the types of content available to you helps you get the most out of your website. Also, when all else fails, it's good to know where you can turn to for help with WordPress.","blurb":"","authors":[{"authorId":9028,"name":"Lisa Sabin-Wilson","slug":"lisa-sabin-wilson","description":" <p><b>Lisa Sabin&#45;Wilson</b> is cofounder of WebDevStudios, one of the largest WordPress design and development agencies in the world. She is a regular public speaker at national events on topics such as WordPress, development, design, CSS, and social media. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9028"}}],"primaryCategoryTaxonomy":{"categoryId":33609,"title":"WordPress","slug":"wordpress","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33609"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":167476,"title":"Designing a Website with WordPress Designers","slug":"designing-a-website-with-wordpress-designers","categoryList":["technology","programming-web-design","blogging-website-platforms","wordpress"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/167476"}},{"articleId":163671,"title":"Filter by Internet Protocol (IP) Address to Limit Access to the WordPress Dashboard","slug":"filter-by-internet-protocol-ip-address-to-limit-access-to-the-wordpress-dashboard","categoryList":["technology","programming-web-design","blogging-website-platforms","wordpress"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/163671"}}],"fromCategory":[{"articleId":244958,"title":"Contemplating the Structure of Your WordPress Website","slug":"contemplating-structure-wordpress-website","categoryList":["technology","programming-web-design","blogging-website-platforms","wordpress"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/244958"}},{"articleId":244955,"title":"How to Use Tags with Parameters for Sidebars in WordPress","slug":"use-tags-parameters-sidebars-wordpress","categoryList":["technology","programming-web-design","blogging-website-platforms","wordpress"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/244955"}},{"articleId":244951,"title":"How to Use Sidebar Templates in WordPress","slug":"use-sidebar-templates-wordpress","categoryList":["technology","programming-web-design","blogging-website-platforms","wordpress"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/244951"}},{"articleId":244948,"title":"Getting WordPress to Check for Your Custom Field","slug":"getting-wordpress-check-custom-field","categoryList":["technology","programming-web-design","blogging-website-platforms","wordpress"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/244948"}},{"articleId":244944,"title":"Entering the Custom Field Code in the WordPress Template File","slug":"entering-custom-field-code-wordpress-template-file","categoryList":["technology","programming-web-design","blogging-website-platforms","wordpress"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/244944"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281904,"slug":"wordpress-all-in-one-for-dummies-4th-edition","isbn":"9781394225385","categoryList":["technology","programming-web-design","blogging-website-platforms","wordpress"],"amazon":{"default":"//www.amazon.com/gp/product/1394225385/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1394225385/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1394225385-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1394225385/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1394225385/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/wordpress-all-in-one-for-dummies-5th-edition-cover-9781394225385-203x255.jpg","width":203,"height":255},"title":"WordPress All-in-One For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><p><b>Lisa Sabin&#45;Wilson</b> is cofounder of WebDevStudios, one of the largest WordPress design and development agencies in the world. She is a regular public speaker at national events on topics such as WordPress, development, design, CSS, and social media.</p>","authors":[{"authorId":9028,"name":"Lisa Sabin-Wilson","slug":"lisa-sabin-wilson","description":" <p><b>Lisa Sabin&#45;Wilson</b> is cofounder of WebDevStudios, one of the largest WordPress design and development agencies in the world. She is a regular public speaker at national events on topics such as WordPress, development, design, CSS, and social media. ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9028"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;programming-web-design&quot;,&quot;blogging-website-platforms&quot;,&quot;wordpress&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394225385&quot;]}]\" id=\"du-slot-65a9919491b41\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;programming-web-design&quot;,&quot;blogging-website-platforms&quot;,&quot;wordpress&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394225385&quot;]}]\" id=\"du-slot-65a9919493b66\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":167484,"title":"The WordPress Dashboard","slug":"the-wordpress-dashboard","categoryList":[],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/167484"}},{"articleId":167485,"title":"WordPress Content Types","slug":"wordpress-content-types","categoryList":[],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/167485"}},{"articleId":167479,"title":"WordPress Resources","slug":"wordpress-resources","categoryList":[],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/167479"}},{"articleId":167476,"title":"Designing a Website with WordPress Designers","slug":"designing-a-website-with-wordpress-designers","categoryList":["technology","programming-web-design","blogging-website-platforms","wordpress"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/167476"}}],"content":[{"title":"The WordPress dashboard","thumb":null,"image":null,"content":"<p>The WordPress Dashboard gives you an all-in-one glance at your website’s statistics and activity. This table gives you brief descriptions of the main menu items in the WordPress Dashboard that apply across all versions of WordPress.com and WordPress.org. Each version provides different options, but the basic main menu of the Dashboard is standard across all versions.</p>\n<table>\n<tbody>\n<tr>\n<th>Menu</th>\n<th>Description</th>\n</tr>\n<tr>\n<td>Dashboard</td>\n<td>Find basic information and statistics for your site, as well as information from the WordPress Development Site and other sites run by those involved with WordPress development or resources.</td>\n</tr>\n<tr>\n<td>Posts</td>\n<td>Write new posts and edit previous ones. Create categories to organize your posts by topic; upload images; create post excerpts; send trackbacks; manage custom fields.</td>\n</tr>\n<tr>\n<td>Media</td>\n<td>View all media files you’ve uploaded to your site, including images, audio, and video. Upload and manage new media files with the built-in media uploader.</td>\n</tr>\n<tr>\n<td>Pages</td>\n<td>Write and publish new static pages for your site, edit or delete previously published pages, and assign pages to custom page templates.</td>\n</tr>\n<tr>\n<td>Comments</td>\n<td>Manage comments here by viewing, editing, or deleting them; also manage your comment moderation queue and comment/trackback spam.</td>\n</tr>\n<tr>\n<td>Appearance</td>\n<td>Manage your WordPress themes by viewing them, activating them, and editing them using the site editor. Use and create block patterns.</td>\n</tr>\n<tr>\n<td>Plugins</td>\n<td>View a listing of plugins installed in your WordPress site. Find new plugins, and install, activate, deactivate, upgrade, and edit them.</td>\n</tr>\n<tr>\n<td>Users</td>\n<td>Manage your users and subscribers and edit your own profile.</td>\n</tr>\n<tr>\n<td>Tools</td>\n<td>Import data into your site from another content management platform (such as Blogger, Typepad, or Movable Type) or export your current site data into a backup file. Upgrade your WordPress software to the latest version using the auto-upgrade feature.</td>\n</tr>\n<tr>\n<td>Settings</td>\n<td>Set the general options for your site, and find settings for posts, RSS feed, discussion options, privacy, and permalinks.</td>\n</tr>\n</tbody>\n</table>\n"},{"title":"WordPress content types","thumb":null,"image":null,"content":"<p>Content is the lifeblood of a website, regardless of author or topic. Populate your site with a variety of content types to engage reader interest and to ensure return visits. WordPress offers several types of content that can be published on your website using the different, built-in features.</p>\n<table>\n<tbody>\n<tr>\n<th>Menu</th>\n<th>Description</th>\n</tr>\n<tr>\n<td>Posts</td>\n<td>Articles that get written and published to your site — posts are included as part of your archived site.</td>\n</tr>\n<tr>\n<td>Pages</td>\n<td>Static, individual pages do not get published and archived as part of the site on your site; rather are used as standalone pages to publish items like an &#8220;About Me&#8221; page.</td>\n</tr>\n<tr>\n<td>Categories</td>\n<td>File your blog posts into different topics.</td>\n</tr>\n<tr>\n<td>Tags</td>\n<td>Define micro-categories for your posts by using tags to define extended keywords to help your readers locate posts on your site relevant to the topic they want to read about.</td>\n</tr>\n<tr>\n<td>Images and Galleries</td>\n<td>Upload photos or images and create photo galleries, or a portfolio of images.</td>\n</tr>\n<tr>\n<td>Media files</td>\n<td>Upload audio files for podcasting, or video files for video publishing. Even upload files like PDFs or Microsoft Word documents to provide downloadable content, like e-books or manuals.</td>\n</tr>\n<tr>\n<td>Custom Post Types</td>\n<td>Create different methods of posting niche content types on your site, like a photo gallery, video gallery, or a repository of reviews for things like movies, books, and music (just to name a few of many examples).</td>\n</tr>\n<tr>\n<td>Custom Post Formats</td>\n<td>Create customized display of different post formats like photos, quotes, posts, links, videos, and so on.</td>\n</tr>\n<tr>\n<td>Custom Fields</td>\n<td>Use custom fields to attach different post metadata to individual posts and pages, like your current mood, what you&#8217;re currently listening to or your current local weather.</td>\n</tr>\n</tbody>\n</table>\n"},{"title":"WordPress resources","thumb":null,"image":null,"content":"<p>If you use WordPress as the platform for your blog or website, you can make use of any or all of the many tools WordPress offers. Tap into some solid information from WordPress user forums, get ideas for themes, and boost your WordPress knowledge.</p>\n<table>\n<tbody>\n<tr>\n<td width=\"249\">Name</td>\n<td width=\"480\">Description</td>\n</tr>\n<tr>\n<td width=\"249\"><a href=\"//wordpress.org/plugins/\" target=\"_blank\" rel=\"noopener\">WordPress Plugins</a></td>\n<td width=\"480\">Offers thousands of downloads that let you do almost anything you can imagine — and you can imagine quite a lot, can&#8217;t you?</td>\n</tr>\n<tr>\n<td width=\"249\"><a href=\"//wordpress.org/themes\" target=\"_blank\" rel=\"noopener\">WordPress Themes</a></td>\n<td width=\"480\">Lets you choose from hundreds of themes to manage the look and functionality of your home page.</td>\n</tr>\n<tr>\n<td width=\"249\"><a href=\"//wordpress.org/documentation/\" target=\"_blank\" rel=\"noopener\">WordPress Documentation</a></td>\n<td width=\"480\">Use WordPress Documentation to tap into the encyclopedia of WordPress knowledge.</td>\n</tr>\n<tr>\n<td width=\"249\"><a href=\"//wordpress.org/news/\" target=\"_blank\" rel=\"noopener\">WordPress News &amp; Updates</a></td>\n<td width=\"480\">This section of the official WordPress website gives you the latest news and notes on all things WordPress.</td>\n</tr>\n<tr>\n<td width=\"249\"><a href=\"//wordpress.com/forums/\" target=\"_blank\" rel=\"noopener\">Support Forums for WordPress.com</a></td>\n<td width=\"480\">Lets you post questions, answers, and comments for other WordPress users who are using the hosted/commercial version of WordPress.com.</td>\n</tr>\n<tr>\n<td width=\"249\"><a href=\"//wordpress.org/support/forums/\" target=\"_blank\" rel=\"noopener\">Support Forums for WordPress.org</a></td>\n<td width=\"480\">Post your questions and obtain answers from the vast WordPress community for users of the self-hosted WordPress.org software.</td>\n</tr>\n</tbody>\n</table>\n"},{"title":"Designing a website with WordPress designers","thumb":null,"image":null,"content":"<p>Turn to WordPress designers if you need help designing your website. The look and feel of your website are critical to its success, so take your time when choosing themes, color, and layout. If you&#8217;re looking for a cool theme, or someone to add pizzazz to your site through design, you want that person to know your WordPress platform. These designers fit the bill.</p>\n<table width=\"67%\">\n<tbody>\n<tr>\n<td width=\"47%\"><strong>Name / URL</strong></td>\n<td width=\"52%\"><strong>Description</strong></td>\n</tr>\n<tr>\n<td width=\"47%\"><a href=\"//webdevstudios.com/\" target=\"_blank\" rel=\"noopener\">WebDevStudios</a></td>\n<td width=\"52%\">Cutting edge, custom WordPress design and development</td>\n</tr>\n<tr>\n<td width=\"47%\"><a href=\"//freshysites.com/\" target=\"_blank\" rel=\"noopener\">Freshy Sites</a></td>\n<td width=\"52%\">WordPress web design services</td>\n</tr>\n<tr>\n<td width=\"47%\"><a href=\"//www.kadencewp.com/\" target=\"_blank\" rel=\"noopener\">KadenceWP</a></td>\n<td width=\"52%\">Purchase and download easy-to-use WordPress premium themes.</td>\n</tr>\n<tr>\n<td width=\"47%\"><a href=\"//greenbay.digital/\" target=\"_blank\" rel=\"noopener\">GB Digital</a></td>\n<td width=\"52%\">Custom WordPress design and development for small businesses and organizations</td>\n</tr>\n</tbody>\n</table>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Two years","lifeExpectancySetFrom":"2023-03-02T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":207989},{"headers":{"creationTime":"2024-08-02T19:59:28+00:00","modifiedTime":"2025-01-16T16:21:34+00:00","timestamp":"2025-01-16T18:01:10+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Cybersecurity","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33537"},"slug":"cybersecurity","categoryId":33537}],"title":"Data Security Posture Management (DSPM) For Dummies","strippedTitle":"data security posture management (dspm) for dummies","slug":"data-security-posture-management-dspm-for-dummies","canonicalUrl":"","浏览登录器整合":{"metaDescription":"Enhance your data security with DSPM - understand its importance, benefits, and capabilities. Discover how to effectively manage your sensitive data and improve your overall cybersecurity posture.","noIndex":0,"noFollow":0},"content":"In this article you will learn:\r\n<ul>\r\n \t<li><a href=\"#definition\">what DSPM is</a></li>\r\n \t<li><a href=\"#why\">why you need DSPM</a></li>\r\n \t<li><a href=\"#what\">what you can do with DSPM</a></li>\r\n \t<li><a href=\"#capabilities\">ten must-have capabilities to look for in a DSPM solution</a></li>\r\n \t<li><a href=\"#started\">how to get started with DSPM</a></li>\r\n</ul>\r\nData is the lifeblood of modern business and data security in the cloud is top of mind for organizations everywhere. Data security posture management (DSPM) solutions address the need for an automated, scalable, and agile system across the full data security lifecycle — from discovery, classification, cataloging, and risk prioritization to access control, policy enforcement, remediation, and real-time monitoring. This helps organizations reduce risks and costs associated with cloud data security while improving their overall cybersecurity posture.\r\n\r\n[caption id=\"attachment_300034\" align=\"aligncenter\" width=\"630\"]<img class=\"size-full wp-image-300034\" src=\"//coursofppt.com/wp-content/uploads/IT-technician-adobeStock_298063823.jpg\" alt=\"Security expert working on DSPM solution\" width=\"630\" height=\"420\" /> ©Deagreez / Adobe Stock[/caption]\r\n\r\n<div id=\"definition\"></div>\r\n<h2 id=\"tab1\" >What is DSPM?</h2>\r\nData security posture management empowers organizations to implement a data-centric security strategy by first providing an accurate inventory of their sensitive data and identifying where it violates data security policies, thereby enhancing overall data security posture.\r\n<p class=\"article-tips remember\">A data-centric security strategy emphasizes the importance of protecting your valuable data rather than focusing on systems and infrastructure.</p>\r\nKey capabilities in a DSPM solution include the following:\r\n<ul>\r\n \t<li><strong>Global data visibility</strong> provides organizations with a comprehensive view of their sensitive data. This involves identifying the location and type of sensitive data to ensure proper protection measures are in place. All clouds — including infrastructure-as-a-service (IaaS), platform-as-service (PaaS), and software-as-a-service (SaaS) resources — need to be covered. The appropriate data owners must also be identified, to facilitate efficient communication of any data-related security or privacy issues.</li>\r\n \t<li><strong>Data hygiene</strong> is about keeping your data clean and healthy. It encompasses various actions that help organizations maintain clean and organized data in accordance with their data governance framework. This includes addressing and remediating misplaced, redundant, and obsolete data to streamline maintenance, optimize storage resources, and reduce potential security risks. Purging outdated or irrelevant data is another essential part of good data hygiene, resulting in the retention of only accurate and useful data.</li>\r\n \t<li><strong>Data security risk control </strong>involves immediately detecting and proactively remediating data risk factors to prevent data breaches. This capability detects and addresses three key data postures:\r\n<ul>\r\n \t<li><em>Overexposed data</em>, such as public read access, or permissive access rights, which should be identified and mitigated to reduce the likelihood of unauthorized access or data breaches</li>\r\n \t<li><em>Underprotected data</em>, where there are missing controls like encryption, masking, or proper retention policies</li>\r\n \t<li><em>Misplaced data</em>, such as cardholder data subject to the Payment Card Industry Data Security Standards (PCI DSS) in an unauthorized environment or PII data in a development environment</li>\r\n</ul>\r\n</li>\r\n \t<li><strong>Data access governance </strong>manages and controls access to sensitive data. This involves:\r\n<ul>\r\n \t<li>Identifying all internal and external users, roles, and resources with access to sensitive data</li>\r\n \t<li>Monitoring and controlling access patterns based on their roles and responsibilities</li>\r\n \t<li>Ensuring that only authorized users have access to sensitive assets</li>\r\n \t<li>Regularly reviewing and updating access permissions based on actual usage</li>\r\n</ul>\r\n</li>\r\n \t<li><strong>Privacy and compliance </strong>ensure that organizations adhere to data privacy regulations and industry standards, and make audits more manageable (and perhaps a little less painful and costly). Providing objective evidence for audits can be challenging, but having reporting from DSPM that shows you know where your data is and understand that its security posture can significantly ease compliance.</li>\r\n</ul>\r\n<div id=\"why\"></div>\r\n<h2 id=\"tab2\" >Why do you need DSPM?</h2>\r\nFor modern enterprises, data is fuel for innovation. These companies understand that data is a key asset and a source of competitive differentiation. They democratize data to unleash its full potential and make it accessible for application developers, data scientists, and business users. However, as data proliferates, security doesn’t travel with it — and adding the pace of change to the sprawl of cloud technology means that data security teams just can’t keep up. Malicious actors constantly target this new threat vector — the “innovation attack surface” — which has emerged as a result of several key trends:\r\n<ul>\r\n \t<li><strong>Cloud transformation and data democratization: </strong>The cloud has enabled widespread data democratization, enabling easy access to data for developers, data scientists, and business users to support their innovation efforts. However, this freedom to access and use data without oversight creates unknown, unmanaged, and unprotected cloud data sources.</li>\r\n \t<li><strong>Technology sprawl and complexity: </strong>In the public cloud, each cloud service is configured and used differently, and each introduces new and unique risks. The ever-changing architectures are confusing and complex, and if you’re not careful, this can lead to some costly and even devastating mistakes with sensitive data stored in the cloud.</li>\r\n \t<li><strong>Cloud data proliferation: </strong>Nearly half of all data (48 percent) is stored in the public cloud today, and it’s only increasing, according to the Flexera <em>2022 State of the Cloud Report</em>. Unfortunately, traditional data security controls are unable to keep up with the dynamic movement of data, so they must be configured from scratch every time data is created, copied, shared, or moved.</li>\r\n \t<li><strong>Death of the traditional perimeter: </strong>One of the many benefits of the cloud is that it is accessible from anywhere. Thus, the notion of a network perimeter — an on-premises data center protected by a firewall — has all but disappeared. The lack of a single choke point (a firewall) means sensitive data is exposed by design because anyone can access it from anywhere with the proper credentials (whether authorized or stolen).</li>\r\n \t<li><strong>Faster rate of change: </strong>Release cycles now happen in weeks, days, and hours rather than months and years. Unfortunately, security teams are usually not on that same quick schedule and still rely on slower manual approaches.</li>\r\n \t<li><strong>The changing role of security: </strong>In cloud computing, data security teams must evolve to securely enable the business rather than just slowing everyone down or letting risk grow exponentially. Data security in cloud computing must focus on protecting data from breaches and compromises while also empowering users to be productive.</li>\r\n</ul>\r\n<div id=\"what\"></div>\r\n<h2 id=\"tab3\" >What can you do with DSPM?</h2>\r\nData security, governance, and privacy teams can use DSPM to help keep their organization secure and compliant. Some common use cases for DSPM include the following:\r\n<ul>\r\n \t<li><strong>Automating data discovery and classification: </strong>DSPM helps organizations automatically and continuously discover, classify, and categorize all of their known and unknown data — including sensitive, proprietary, regulated, abandoned, and shadow data — across multicloud environments, such as Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), Snowflake, Microsoft 365, and more.</li>\r\n \t<li><strong>Enforcing data security policies automatically: </strong>DPSM automatically enforces data security policies at scale for all of your data as it travels through the cloud. DSPM converts data policies into specific technical configurations and shows where data security policies are violated. It also prioritizes issues for resolution and helps you fix those issues with clear, specific technical remediation instructions.</li>\r\n \t<li><strong> Controlling data exposure: </strong>As data rapidly proliferates in the cloud, security does not follow that data, often leading to crucial business data being exposed. DSPM pinpoints all of your exposed sensitive data that can lead to data breaches, ransomware attacks, and noncompliance penalties — whether it’s misplaced data (for example, sensitive data mistakenly stored in public buckets), misconfigured controls (for example, third-party access granted to sensitive data), or overly permissive access.</li>\r\n \t<li><strong> Controlling datacentric environment segmentation: </strong>DSPM helps you segment your cloud environments and apply location controls to comply with security and regulatory requirements. You can detect and receive alerts when sensitive or regulated data is placed in untrusted and/or unauthorized environments, review violations, and take action to remove the data or authorize the new environment.</li>\r\n \t<li><strong>Complying with data privacy and compliance frameworks: </strong>DSPM streamlines evidence collection for internal and external privacy and governance stakeholders through autonomous data discovery and classification of your sensitive and regulated data. A DSPM data policy engine continuously enforces regulatory compliance and standards requirements for data, regardless of the underlying technology or location.</li>\r\n</ul>\r\n<div id=\"capabilities\"></div>\r\n<h2 id=\"tab4\" >Ten must-have capabilities to look for in a DSPM solution</h2>\r\nWhen considering a DSPM solution for your organization, be sure to select one with the following important capabilities and features:\r\n<ul>\r\n \t<li><strong>Autonomous: </strong>Automatically discover unknown, new, and modified data stores across all of your clouds — without needing credentials or manual configuration.</li>\r\n \t<li><strong>Continuous: </strong>Change is constant — especially in the public cloud — so your DSPM solution must be able to continuously monitor your environment for changes and automatically scan new cloud accounts, new data stores, and new data added to existing data stores.</li>\r\n \t<li><strong>Secure by design: </strong>Look for a solution that doesn’t extract data from your environment. Your DSPM should use the cloud service provider’s (CSP) application programming interface (API) and ephemeral serverless functions in your cloud account to scan your data.</li>\r\n \t<li><strong>Breadth and depth of coverage: </strong>Whether you’re using Amazon Web Services (AWS), Azure, Google Cloud Platform (GCP), Snowflake, Microsoft 365, or practically any combination of various cloud database, storage services, or software as a service (SaaS) apps, you need a single and consistent view of your data across clouds, geographies, and organizational boundaries to evaluate the risk to your data across all clouds.</li>\r\n \t<li><strong>Intelligent classification: </strong>Look for a solution that utilizes multistep contextual analysis to automatically identify sensitive data with low false positive (FP) and false negative (FN) rates. The solution should also include hundreds of predefined classification rules, data validators, and classification algorithms that extract the data insights you need without having to locate the data owner.</li>\r\n \t<li><strong>Extensive set of built-in datacentric policies: </strong>Look for a solution that provides out-of-the-box datacentric policies for common use cases like data security, proper governance, and privacy.</li>\r\n \t<li><strong>Customization features: </strong>You need a solution with robust customization features that are flexible and powerful enough to match your data taxonomy and address any unique requirements your organization may have such as sensitivity levels/definitions, data types, and custom industry policies.</li>\r\n \t<li><strong> Guided remediation: </strong>Look for a solution that provides a full analysis of why a security or compliance violation exists, evidence of its existence, and technical recommendations on how to fix it based on policy and environment.</li>\r\n \t<li><strong>Simple and quick deployment process: </strong>Your DSPM solution should be agentless and connectorless to simplify and accelerate the deployment process. Look for a solution that can be deployed in minutes and delivers time-to-value in a few days.</li>\r\n \t<li><strong>Easy integration with your ecosystem: </strong>Look for a DSPM solution with extensive integrations that include third-party systems such as IT service management (ITSM), security information and event management (SIEM), cloud security posture management (CSPM), extended detection and response (XDR), and data catalogs.</li>\r\n</ul>\r\n<div id=\"started\"></div>\r\n<h2 id=\"tab5\" >Getting started</h2>\r\nVisit <a href=\"//laminarsecurity.com/\" target=\"_blank\" rel=\"noopener\">laminarsecurity.com</a> to learn more. Download your free copy of <a href=\"//laminarsecurity.com/forms/data-security-posture-management-dspm-for-dummies/\" target=\"_blank\" rel=\"noopener\"><em>Data Security Posture Management For Dummies</em></a> to learn more about how DSPM enables organizations to harness the power of cloud data securely and efficiently.","description":"In this article you will learn:\r\n<ul>\r\n \t<li><a href=\"#definition\">what DSPM is</a></li>\r\n \t<li><a href=\"#why\">why you need DSPM</a></li>\r\n \t<li><a href=\"#what\">what you can do with DSPM</a></li>\r\n \t<li><a href=\"#capabilities\">ten must-have capabilities to look for in a DSPM solution</a></li>\r\n \t<li><a href=\"#started\">how to get started with DSPM</a></li>\r\n</ul>\r\nData is the lifeblood of modern business and data security in the cloud is top of mind for organizations everywhere. Data security posture management (DSPM) solutions address the need for an automated, scalable, and agile system across the full data security lifecycle — from discovery, classification, cataloging, and risk prioritization to access control, policy enforcement, remediation, and real-time monitoring. This helps organizations reduce risks and costs associated with cloud data security while improving their overall cybersecurity posture.\r\n\r\n[caption id=\"attachment_300034\" align=\"aligncenter\" width=\"630\"]<img class=\"size-full wp-image-300034\" src=\"//coursofppt.com/wp-content/uploads/IT-technician-adobeStock_298063823.jpg\" alt=\"Security expert working on DSPM solution\" width=\"630\" height=\"420\" /> ©Deagreez / Adobe Stock[/caption]\r\n\r\n<div id=\"definition\"></div>\r\n<h2 id=\"tab1\" >What is DSPM?</h2>\r\nData security posture management empowers organizations to implement a data-centric security strategy by first providing an accurate inventory of their sensitive data and identifying where it violates data security policies, thereby enhancing overall data security posture.\r\n<p class=\"article-tips remember\">A data-centric security strategy emphasizes the importance of protecting your valuable data rather than focusing on systems and infrastructure.</p>\r\nKey capabilities in a DSPM solution include the following:\r\n<ul>\r\n \t<li><strong>Global data visibility</strong> provides organizations with a comprehensive view of their sensitive data. This involves identifying the location and type of sensitive data to ensure proper protection measures are in place. All clouds — including infrastructure-as-a-service (IaaS), platform-as-service (PaaS), and software-as-a-service (SaaS) resources — need to be covered. The appropriate data owners must also be identified, to facilitate efficient communication of any data-related security or privacy issues.</li>\r\n \t<li><strong>Data hygiene</strong> is about keeping your data clean and healthy. It encompasses various actions that help organizations maintain clean and organized data in accordance with their data governance framework. This includes addressing and remediating misplaced, redundant, and obsolete data to streamline maintenance, optimize storage resources, and reduce potential security risks. Purging outdated or irrelevant data is another essential part of good data hygiene, resulting in the retention of only accurate and useful data.</li>\r\n \t<li><strong>Data security risk control </strong>involves immediately detecting and proactively remediating data risk factors to prevent data breaches. This capability detects and addresses three key data postures:\r\n<ul>\r\n \t<li><em>Overexposed data</em>, such as public read access, or permissive access rights, which should be identified and mitigated to reduce the likelihood of unauthorized access or data breaches</li>\r\n \t<li><em>Underprotected data</em>, where there are missing controls like encryption, masking, or proper retention policies</li>\r\n \t<li><em>Misplaced data</em>, such as cardholder data subject to the Payment Card Industry Data Security Standards (PCI DSS) in an unauthorized environment or PII data in a development environment</li>\r\n</ul>\r\n</li>\r\n \t<li><strong>Data access governance </strong>manages and controls access to sensitive data. This involves:\r\n<ul>\r\n \t<li>Identifying all internal and external users, roles, and resources with access to sensitive data</li>\r\n \t<li>Monitoring and controlling access patterns based on their roles and responsibilities</li>\r\n \t<li>Ensuring that only authorized users have access to sensitive assets</li>\r\n \t<li>Regularly reviewing and updating access permissions based on actual usage</li>\r\n</ul>\r\n</li>\r\n \t<li><strong>Privacy and compliance </strong>ensure that organizations adhere to data privacy regulations and industry standards, and make audits more manageable (and perhaps a little less painful and costly). Providing objective evidence for audits can be challenging, but having reporting from DSPM that shows you know where your data is and understand that its security posture can significantly ease compliance.</li>\r\n</ul>\r\n<div id=\"why\"></div>\r\n<h2 id=\"tab2\" >Why do you need DSPM?</h2>\r\nFor modern enterprises, data is fuel for innovation. These companies understand that data is a key asset and a source of competitive differentiation. They democratize data to unleash its full potential and make it accessible for application developers, data scientists, and business users. However, as data proliferates, security doesn’t travel with it — and adding the pace of change to the sprawl of cloud technology means that data security teams just can’t keep up. Malicious actors constantly target this new threat vector — the “innovation attack surface” — which has emerged as a result of several key trends:\r\n<ul>\r\n \t<li><strong>Cloud transformation and data democratization: </strong>The cloud has enabled widespread data democratization, enabling easy access to data for developers, data scientists, and business users to support their innovation efforts. However, this freedom to access and use data without oversight creates unknown, unmanaged, and unprotected cloud data sources.</li>\r\n \t<li><strong>Technology sprawl and complexity: </strong>In the public cloud, each cloud service is configured and used differently, and each introduces new and unique risks. The ever-changing architectures are confusing and complex, and if you’re not careful, this can lead to some costly and even devastating mistakes with sensitive data stored in the cloud.</li>\r\n \t<li><strong>Cloud data proliferation: </strong>Nearly half of all data (48 percent) is stored in the public cloud today, and it’s only increasing, according to the Flexera <em>2022 State of the Cloud Report</em>. Unfortunately, traditional data security controls are unable to keep up with the dynamic movement of data, so they must be configured from scratch every time data is created, copied, shared, or moved.</li>\r\n \t<li><strong>Death of the traditional perimeter: </strong>One of the many benefits of the cloud is that it is accessible from anywhere. Thus, the notion of a network perimeter — an on-premises data center protected by a firewall — has all but disappeared. The lack of a single choke point (a firewall) means sensitive data is exposed by design because anyone can access it from anywhere with the proper credentials (whether authorized or stolen).</li>\r\n \t<li><strong>Faster rate of change: </strong>Release cycles now happen in weeks, days, and hours rather than months and years. Unfortunately, security teams are usually not on that same quick schedule and still rely on slower manual approaches.</li>\r\n \t<li><strong>The changing role of security: </strong>In cloud computing, data security teams must evolve to securely enable the business rather than just slowing everyone down or letting risk grow exponentially. Data security in cloud computing must focus on protecting data from breaches and compromises while also empowering users to be productive.</li>\r\n</ul>\r\n<div id=\"what\"></div>\r\n<h2 id=\"tab3\" >What can you do with DSPM?</h2>\r\nData security, governance, and privacy teams can use DSPM to help keep their organization secure and compliant. Some common use cases for DSPM include the following:\r\n<ul>\r\n \t<li><strong>Automating data discovery and classification: </strong>DSPM helps organizations automatically and continuously discover, classify, and categorize all of their known and unknown data — including sensitive, proprietary, regulated, abandoned, and shadow data — across multicloud environments, such as Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), Snowflake, Microsoft 365, and more.</li>\r\n \t<li><strong>Enforcing data security policies automatically: </strong>DPSM automatically enforces data security policies at scale for all of your data as it travels through the cloud. DSPM converts data policies into specific technical configurations and shows where data security policies are violated. It also prioritizes issues for resolution and helps you fix those issues with clear, specific technical remediation instructions.</li>\r\n \t<li><strong> Controlling data exposure: </strong>As data rapidly proliferates in the cloud, security does not follow that data, often leading to crucial business data being exposed. DSPM pinpoints all of your exposed sensitive data that can lead to data breaches, ransomware attacks, and noncompliance penalties — whether it’s misplaced data (for example, sensitive data mistakenly stored in public buckets), misconfigured controls (for example, third-party access granted to sensitive data), or overly permissive access.</li>\r\n \t<li><strong> Controlling datacentric environment segmentation: </strong>DSPM helps you segment your cloud environments and apply location controls to comply with security and regulatory requirements. You can detect and receive alerts when sensitive or regulated data is placed in untrusted and/or unauthorized environments, review violations, and take action to remove the data or authorize the new environment.</li>\r\n \t<li><strong>Complying with data privacy and compliance frameworks: </strong>DSPM streamlines evidence collection for internal and external privacy and governance stakeholders through autonomous data discovery and classification of your sensitive and regulated data. A DSPM data policy engine continuously enforces regulatory compliance and standards requirements for data, regardless of the underlying technology or location.</li>\r\n</ul>\r\n<div id=\"capabilities\"></div>\r\n<h2 id=\"tab4\" >Ten must-have capabilities to look for in a DSPM solution</h2>\r\nWhen considering a DSPM solution for your organization, be sure to select one with the following important capabilities and features:\r\n<ul>\r\n \t<li><strong>Autonomous: </strong>Automatically discover unknown, new, and modified data stores across all of your clouds — without needing credentials or manual configuration.</li>\r\n \t<li><strong>Continuous: </strong>Change is constant — especially in the public cloud — so your DSPM solution must be able to continuously monitor your environment for changes and automatically scan new cloud accounts, new data stores, and new data added to existing data stores.</li>\r\n \t<li><strong>Secure by design: </strong>Look for a solution that doesn’t extract data from your environment. Your DSPM should use the cloud service provider’s (CSP) application programming interface (API) and ephemeral serverless functions in your cloud account to scan your data.</li>\r\n \t<li><strong>Breadth and depth of coverage: </strong>Whether you’re using Amazon Web Services (AWS), Azure, Google Cloud Platform (GCP), Snowflake, Microsoft 365, or practically any combination of various cloud database, storage services, or software as a service (SaaS) apps, you need a single and consistent view of your data across clouds, geographies, and organizational boundaries to evaluate the risk to your data across all clouds.</li>\r\n \t<li><strong>Intelligent classification: </strong>Look for a solution that utilizes multistep contextual analysis to automatically identify sensitive data with low false positive (FP) and false negative (FN) rates. The solution should also include hundreds of predefined classification rules, data validators, and classification algorithms that extract the data insights you need without having to locate the data owner.</li>\r\n \t<li><strong>Extensive set of built-in datacentric policies: </strong>Look for a solution that provides out-of-the-box datacentric policies for common use cases like data security, proper governance, and privacy.</li>\r\n \t<li><strong>Customization features: </strong>You need a solution with robust customization features that are flexible and powerful enough to match your data taxonomy and address any unique requirements your organization may have such as sensitivity levels/definitions, data types, and custom industry policies.</li>\r\n \t<li><strong> Guided remediation: </strong>Look for a solution that provides a full analysis of why a security or compliance violation exists, evidence of its existence, and technical recommendations on how to fix it based on policy and environment.</li>\r\n \t<li><strong>Simple and quick deployment process: </strong>Your DSPM solution should be agentless and connectorless to simplify and accelerate the deployment process. Look for a solution that can be deployed in minutes and delivers time-to-value in a few days.</li>\r\n \t<li><strong>Easy integration with your ecosystem: </strong>Look for a DSPM solution with extensive integrations that include third-party systems such as IT service management (ITSM), security information and event management (SIEM), cloud security posture management (CSPM), extended detection and response (XDR), and data catalogs.</li>\r\n</ul>\r\n<div id=\"started\"></div>\r\n<h2 id=\"tab5\" >Getting started</h2>\r\nVisit <a href=\"//laminarsecurity.com/\" target=\"_blank\" rel=\"noopener\">laminarsecurity.com</a> to learn more. Download your free copy of <a href=\"//laminarsecurity.com/forms/data-security-posture-management-dspm-for-dummies/\" target=\"_blank\" rel=\"noopener\"><em>Data Security Posture Management For Dummies</em></a> to learn more about how DSPM enables organizations to harness the power of cloud data securely and efficiently.","blurb":"","authors":[],"primaryCategoryTaxonomy":{"categoryId":33537,"title":"Cybersecurity","slug":"cybersecurity","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33537"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"What is DSPM?","target":"#tab1"},{"label":"Why do you need DSPM?","target":"#tab2"},{"label":"What can you do with DSPM?","target":"#tab3"},{"label":"Ten must-have capabilities to look for in a DSPM solution","target":"#tab4"},{"label":"Getting started","target":"#tab5"}],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":300402,"title":"Implementing Sustainable Cloud Security to Stop Remediation Nightmares","slug":"implementing-sustainable-cloud-security-to-stop-remediation-nightmares","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/300402"}},{"articleId":299346,"title":"Why Your Company Needs a Modern Data Loss Prevention System","slug":"why-your-company-needs-a-modern-data-loss-prevention-system","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299346"}},{"articleId":296631,"title":"Cybersecurity All-in-One For Dummies Cheat Sheet","slug":"cybersecurity-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/296631"}},{"articleId":291466,"title":"Security Awareness For Dummies Cheat Sheet","slug":"security-awareness-for-dummies-cheat-sheet","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/291466"}},{"articleId":290240,"title":"Cloud Security For Dummies Cheat Sheet","slug":"cloud-security-for-dummies-cheat-sheet","categoryList":["technology","cybersecurity"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/290240"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;cybersecurity&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-65a6c466b5466\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;cybersecurity&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-65a6c466b6d75\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":true,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"Brought to you by Laminar","brandingLink":"//laminarsecurity.com/","brandingLogo":{"src":"//coursofppt.com/wp-content/uploads/laminar-logo-lockup-default-270x47.png","width":270,"height":47},"sponsorAd":"","sponsorEbookTitle":"Data Security Posture Management (DSPM) For Dummies","sponsorEbookLink":"//laminarsecurity.com/forms/data-security-posture-management-dspm-for-dummies/","sponsorEbookImage":{"src":"//coursofppt.com/wp-content/uploads/data-security-posture-management-dspm-for-dummies-cover-9781394181063-165x255.jpg","width":165,"height":255}},"primaryLearningPath":"Solve","lifeExpectancy":"One year","lifeExpectancySetFrom":"2024-08-04T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"yes","adInfo":"","adPairKey":[{"adPairKey":"sponsored","adPairValue":"customsolutions"}]},"status":"publish","visibility":"public","articleId":300029},{"headers":{"creationTime":"2019-03-13T01:35:22+00:00","modifiedTime":"2025-01-05T20:44:23+00:00","timestamp":"2025-01-05T21:01:13+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Programming & Web Design","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33592"},"slug":"programming-web-design","categoryId":33592},{"name":"General Programming & Web Design","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33610"},"slug":"general-programming-web-design","categoryId":33610}],"title":"Web Coding and Development All-in-One For Dummies Cheat Sheet","strippedTitle":"web coding and development all-in-one for dummies cheat sheet","slug":"web-coding-development-cheat-sheet","canonicalUrl":"","浏览登录器整合":{"metaDescription":"One of the handiest features of web coding and development is that once you’ve learned a few basics, you can apply those basics to any project. A good example i","noIndex":0,"noFollow":0},"content":"One of the handiest features of web coding and development is that once you’ve learned a few basics, you can apply those basics to any project. A good example is the underlying structure of a page, which uses the same set of standard HTML tags, no matter how large or small the project. It’s also worth your time to learn how selectors work, because you use them to save you time both when you’re writing CSS rules and when you’re writing JavaScript code. Errors, too, are a fact of web coding life, so understanding the most common errors can help you debug your code faster and get back to more creative pursuits.","description":"One of the handiest features of web coding and development is that once you’ve learned a few basics, you can apply those basics to any project. A good example is the underlying structure of a page, which uses the same set of standard HTML tags, no matter how large or small the project. It’s also worth your time to learn how selectors work, because you use them to save you time both when you’re writing CSS rules and when you’re writing JavaScript code. Errors, too, are a fact of web coding life, so understanding the most common errors can help you debug your code faster and get back to more creative pursuits.","blurb":"","authors":[{"authorId":11290,"name":"Paul McFedries","slug":"paul-mcfedries","description":" <p><b>Paul McFedries</b> is a technical writer who has been authoring computer books since 1991 and has over 100 books to his credit. These books include <i>Alexa For Dummies, Amazon Fire TV For Dummies</i>, and <i>Cord Cutting For Dummies</i>. You can visit Paul on the web at www.mcfedries.com.</p> ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/11290"}}],"primaryCategoryTaxonomy":{"categoryId":33610,"title":"General Programming & Web Design","slug":"general-programming-web-design","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33610"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":254314,"title":"Working with Images in a Mobile App","slug":"working-images-mobile-app","categoryList":["technology","programming-web-design","general-programming-web-design"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/254314"}},{"articleId":254311,"title":"Going Mobile Faster with jQuery Mobile","slug":"going-mobile-faster-jquery-mobile","categoryList":["technology","programming-web-design","general-programming-web-design"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/254311"}},{"articleId":254308,"title":"What Is Mobile-First Web Development?","slug":"mobile-first-web-development","categoryList":["technology","programming-web-design","general-programming-web-design"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/254308"}},{"articleId":254305,"title":"Setting Up the Back End to Handle Users","slug":"setting-back-end-handle-users","categoryList":["technology","programming-web-design","general-programming-web-design"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/254305"}},{"articleId":254302,"title":"Creating the App Startup Files for Your Web App","slug":"creating-app-startup-files-web-app","categoryList":["technology","programming-web-design","general-programming-web-design"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/254302"}}],"fromCategory":[{"articleId":299575,"title":"HTML, CSS, & JavaScript All-in-One For Dummies Cheat Sheet","slug":"html-css-javascript-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","programming-web-design","general-programming-web-design"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299575"}},{"articleId":265680,"title":"Using DevOps To Improve Engineering","slug":"tips-for-improving-engineering-performance-with-devops","categoryList":["technology","programming-web-design","general-programming-web-design"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/265680"}},{"articleId":265675,"title":"How To Automate DevOps in the Cloud","slug":"make-more-of-your-cloud-tools-automating-devops-in-the-cloud","categoryList":["technology","programming-web-design","general-programming-web-design"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/265675"}},{"articleId":265672,"title":"How To Choose a Cloud Service Provider for DevOps","slug":"choosing-the-best-cloud-service-provider-features-and-tools-for-devops","categoryList":["technology","programming-web-design","general-programming-web-design"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/265672"}},{"articleId":265664,"title":"How to Form DevOps Teams in Your Organization","slug":"how-to-form-devops-teams-in-your-organization","categoryList":["technology","programming-web-design","general-programming-web-design"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/265664"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281889,"slug":"web-coding-development-all-in-one-for-dummies","isbn":"9781394197026","categoryList":["technology","programming-web-design","general-programming-web-design"],"amazon":{"default":"//www.amazon.com/gp/product/1394197020/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1394197020/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1394197020-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1394197020/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1394197020/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/web-coding-and-development-all-in-one-for-dummies-cover-9781394197026-203x255.jpg","width":203,"height":255},"title":"Web Coding & Development All-in-One For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><b><b data-author-id=\"11290\">Paul McFedries</b></b> is a technical writer who has been authoring computer books since 1991 and has over 100 books to his credit. These books include <i>Alexa For Dummies, Amazon Fire TV For Dummies</i>, and <i>Cord Cutting For Dummies</i>. You can visit Paul on the web at www.mcfedries.com.</p>","authors":[{"authorId":11290,"name":"Paul McFedries","slug":"paul-mcfedries","description":" <p><b>Paul McFedries</b> is a technical writer who has been authoring computer books since 1991 and has over 100 books to his credit. These books include <i>Alexa For Dummies, Amazon Fire TV For Dummies</i>, and <i>Cord Cutting For Dummies</i>. You can visit Paul on the web at www.mcfedries.com.</p> ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/11290"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;programming-web-design&quot;,&quot;general-programming-web-design&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394197026&quot;]}]\" id=\"du-slot-65986e19e535e\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;programming-web-design&quot;,&quot;general-programming-web-design&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781394197026&quot;]}]\" id=\"du-slot-65986e19e5c25\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":250699,"title":"Your Web Development Template","slug":"web-development-template","categoryList":["technology","programming-web-design","general-programming-web-design"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/250699"}},{"articleId":250696,"title":"4 Selectors in CSS and jQuery","slug":"4-selectors-css-jquery","categoryList":["technology","programming-web-design","general-programming-web-design"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/250696"}},{"articleId":250693,"title":"Top 10 JavaScript Errors","slug":"top-10-javascript-errors","categoryList":["technology","programming-web-design","general-programming-web-design"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/250693"}}],"content":[{"title":"Your Web Development Template","thumb":null,"image":null,"content":"<p>All web pages start out with the same basic HTML structure, so you can get any new web development project off on the right foot by first laying down that foundation. You can do this most easily by creating a template file that you can copy for each new web coding project. Here are the HTML tags to add to your template:</p>\n<pre class=\"code\">&lt;!DOCTYPE html&gt;\r\n&lt;html lang=\"en\"&gt;\r\n&lt;head&gt;\r\n &lt;meta charset=\"utf-8\"&gt;\r\n &lt;meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\"&gt;\r\n &lt;title&gt;&lt;/title&gt;\r\n &lt;link href=\"styles.css\" rel=\"stylesheet\"&gt;\r\n &lt;script src=\"code.js\" defer&gt;&lt;/script&gt;\r\n&lt;/head&gt;\r\n&lt;body&gt;\r\n &lt;header&gt;\r\n &lt;/header&gt;\r\n &lt;nav&gt;\r\n &lt;/nav&gt;\r\n &lt;main&gt;\r\n &lt;article&gt;\r\n &lt;/article&gt;\r\n &lt;aside&gt;\r\n &lt;/aside&gt;\r\n &lt;/main&gt;\r\n &lt;footer&gt;\r\n &lt;/footer&gt;\r\n&lt;/body&gt;\r\n&lt;/html&gt;\r\n</pre>\n<p class=\"article-tips remember\">For the <code>&lt;link&gt;</code> and <code>&lt;script&gt;</code> tags, be sure to adjust the filenames as needed, and be sure to add the path to each file if you’ve stored the files in subdirectories.</p>\n"},{"title":"Selectors in CSS and JavaScript","thumb":null,"image":null,"content":"<p>Both CSS and JavaScript save you oodles of time by making it easy to format and program page elements. These two technologies become even more powerful when you use selectors to specify which elements you want to work with:</p>\n<p>* <strong>The class selector:</strong> If you’ve use the <code>class</code> attribute to assign a class name to one or more page elements, you can target those elements by using a <em>class selector</em>:</p>\n<p>HTML:</p>\n<pre class=\"code\">&lt;<em>element</em> class=\"<em>class-name</em>\"&gt;</pre>\n<p>CSS:</p>\n<pre class=\"code\">.<em>class-name</em> {\r\n\r\n <em>property1</em>: <em>value1</em>;\r\n\r\n <em>property2</em>: <em>value2</em>;\r\n\r\n etc.\r\n\r\n}</pre>\n<p>JavaScript:</p>\n<pre class=\"code\">document.querySelector('.<em>class-name</em>')</pre>\n<p>or:</p>\n<pre class=\"code\">document.querySelectorAll('.<em>class-name</em>')</pre>\n<p>* <strong>The id selector:</strong> If you’ve use the <code>id</code> attribute to assign an ID to a page element, you can target that element by using an <em>id selector</em>:</p>\n<p>HTML:</p>\n<pre class=\"code\">&lt;<em>element</em> id=\"<em>id-name</em>\"&gt;</pre>\n<p>CSS:</p>\n<pre class=\"code\">#<em>id-name</em> {\r\n\r\n <em>property1</em>: <em>value1</em>;\r\n\r\n <em>property2</em>: <em>value2</em>;\r\n\r\n etc.\r\n\r\n}</pre>\n<p>JavaScript:</p>\n<pre class=\"code\">document.querySelector('#<em>id-name</em>')</pre>\n<p>* <strong>The descendant combinator:</strong> To target every element that is contained in (that is, is a descendant of) a specified ancestor element, use the <em>descendant combinator</em> (a space):</p>\n<p>CSS:</p>\n<pre class=\"code\"><em>ancestor</em> <em>descendant</em> {\r\n\r\n <em>property1</em>: <em>value1</em>;\r\n\r\n <em>property2</em>: <em>value2</em>;\r\n\r\n etc.\r\n\r\n}</pre>\n<p>JavaScript:</p>\n<pre class=\"code\">document.querySelector('<em>ancestor</em> <em>descendant</em>')</pre>\n<p>or:</p>\n<pre class=\"code\">document.querySelectorAll('<em>ancestor</em> <em>descendant</em>')</pre>\n<p>* <strong>The child combinator:</strong> To target every element that resides one level below (that is, is a child of) a specified parent element, use the <em>child combinator</em>:</p>\n<p>CSS:</p>\n<pre class=\"code\"><em>parent</em> &gt; <em>child</em> {\r\n\r\n <em>property1</em>: <em>value1</em>;\r\n\r\n <em>property2</em>: <em>value2</em>;\r\n\r\netc.\r\n\r\n}</pre>\n<p>JavaScript:</p>\n<pre class=\"code\">document.querySelector('<em>parent &gt; child</em>')</pre>\n<p>or:</p>\n<pre class=\"code\">document.querySelectorAll('<em>parent &gt; child</em>')</pre>\n<p>* <strong>The subsequent-sibling combinator:</strong> To target every element that appears in the HTML after a specified reference element and is a sibling of that element, use the <em>subsequent-sibling combinator</em>:</p>\n<p>CSS:</p>\n<pre class=\"code\"><em>reference </em>~<em> target</em> {\r\n\r\n <em>property1</em>: <em>value1</em>;\r\n\r\n <em>property2</em>: <em>value2</em>;\r\n\r\n etc.\r\n\r\n}</pre>\n<p>JavaScript:</p>\n<pre class=\"code\">document.querySelector('<em>reference ~ target</em>)</pre>\n<p>or:</p>\n<pre class=\"code\">document.querySelectorAll('<em>reference ~ target</em>')</pre>\n<p>* <strong>The next-sibling combinator:</strong> To target the next sibling that comes after a reference element, use the <em>next-sibling combinator</em>:</p>\n<p>CSS:</p>\n<pre class=\"code\"><em>reference </em>+<em> target</em> {\r\n\r\n <em>property1</em>: <em>value1</em>;\r\n\r\n <em>property2</em>: <em>value2</em>;\r\n\r\n etc.\r\n\r\n}</pre>\n<p>JavaScript:</p>\n<pre class=\"code\">document.querySelector('<em>reference </em>+<em> target</em>')</pre>\n<p>or:</p>\n<pre class=\"code\">document.querySelectorAll('<em>reference </em>+<em> target</em>')</pre>\n"},{"title":"Top 10 JavaScript Errors","thumb":null,"image":null,"content":"<p>When you encounter a script problem, the first thing you should do is examine your code for the most common errors. To help you do that, here’s a list of the 10 most common errors made by both beginning and experienced programmers:</p>\n<ul>\n<li><strong>JavaScript keywords as variable names:</strong> JavaScript has many reserved words and keywords built into the language, so it’s common to accidentally use one of these words as a variable or function name. Double-check your names to make sure you’re not using any reserved words or the names of any objects, properties, or methods.</li>\n<li><strong>Misspelled variables and other names:</strong> Check your variable and function names to make sure you spell them consistently throughout the script. Also, check the spelling of the objects, properties, and methods you use.</li>\n<li><strong>Misused uppercase and lowercase letters:</strong> JavaScript is a <em>case-sensitive</em> language, which means that it treats each letter differently depending on whether it’s uppercase or lowercase. For example, consider the following two statements:\n<pre class=\"code\">const firstName = \"Millicent\";\r\nconst message = \"Welcome \" + firstname;\r\n</pre>\n<p>The first statement declares a variable named <code>firstName</code>, but the second statement uses <code>firstname</code>. This code would generate the error <code>firstname is not defined</code> (or something similar, depending on the browser) because to JavaScript, <code>firstname</code> is a different (and uninitialized) variable.</li>\n<li><strong>Mismatched quotation marks:</strong> In any statement where you began a string literal with a quotation mark (<code>\"</code> or <code>'</code>), always check to make sure that you included the corresponding closing quotation mark at the end of the string. Also, check to see if you used one or more instances of the same quotation mark within the string. If so, edit the string to use the proper escape sequence (<code>\\\"</code> or <code>\\'</code>), instead:\n<pre class=\"code\">// Bad\r\nconst myString = \"There are no \"bad\" programs.\";\r\n\t\r\n// Better\r\nconst myString = \"There are no \\\"bad\\\" programs.\";\r\n\r\n// Best\r\nconst myString = `There are no \"bad\" programs.`;</pre>\n</li>\n<li><strong>Mismatched parentheses:</strong> Look for statements that contain a left parenthesis — <code>(</code> — and make sure there’s a corresponding right parentheses — <code>)</code>. This also applies to square brackets — <code>[</code> and <code>]</code>.\n<p class=\"article-tips tip\">For complex expressions that include three or more sets of parentheses, a quick match-up check is to count the number of left parentheses in the expression, and then count the number of right parentheses. If these numbers don’t match, then you know you have a mismatch somewhere in the expression.</p>\n</li>\n<li><strong>Missed parentheses after function names:</strong> Speaking of parentheses, if your script calls a function or method that doesn’t take any arguments, check that you included the parentheses — <code>( )</code> — after the name of the function or method:\n<pre class=\"code\">function tryThis() {\r\n alert(\"Parentheses travel in pairs!\");\r\n}\r\n\r\n// This won't work\r\ntryThis;\r\n\r\n// This will\r\ntryThis();</pre>\n</li>\n<li><strong>Improper use of braces:</strong> JavaScript uses braces to mark the start (<code>{</code>) and end (<code>}</code>) of statement blocks associated with functions, tests involving <code>if()</code> and <code>switch()</code>, and loops, including <code>for()</code>, <code>while()</code>, and <code>do...while()</code>. It’s very easy to miss one or both braces in a block, and it’s even easier to get the braces mixed up when nesting one test or loop inside another. Double-check your braces to make sure each block has both an opening and a closing brace.\n<p class=\"article-tips tip\">One way to ensure that you don’t miss any braces is to position them consistently throughout your script. For example, many people prefer to use the traditional style for brace positions:</p>\n<pre class=\"code\">keyword {\r\n statements\r\n}</pre>\n<p>(Here, <em><code>keyword</code> </em>means the statement — such as function or <code>if()</code> — that defines the block.) If you prefer this style, use it all through your script so that you know exactly where to look for each brace.</p>\n<p>An easy way to ensure that you never forget a closing brace is to enter it immediately after entering the opening brace. That is, you type <code>{</code>, press Enter twice, and then type <code>}</code>.</p>\n<p>Also, use indentation consistently for the statements within the block. This makes it much easier to see the braces, particularly when you have one block nested within another.</li>\n<li><strong>Using <code>=</code> or <code>==</code> instead of <code>===</code>:</strong> The identity operator (<code>===</code>) is one of the least intuitive JavaScript features because the assignment operator (<code>=</code>) feels so much more natural. The equality operator (<code>==</code>) can cause problems because it often converts the data types before making the comparison. Therefore, check all your comparison expressions to make sure you always use <code>===</code> instead of <code>=</code> or <code>==</code>.</li>\n<li><strong>Conflicts between local and global variables</strong><strong>:</strong> A global variable is available throughout the entire page, even within functions. So, within a function, make sure that you don’t declare and use a variable that has the same name as a global variable.</li>\n<li><strong>The use of a page element before it’s loaded</strong><strong>:</strong> JavaScript runs through a page’s HTML one line at a time and checks the syntax of each JavaScript statement as it comes to it. If your code refers to an element (such as a form field) that JavaScript hasn’t come to yet, it generates an error. Therefore, if your code deals with an element, always place the script after the element in the HTML file.</li>\n</ul>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Two years","lifeExpectancySetFrom":"2025-01-05T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":250703},{"headers":{"creationTime":"2024-11-30T19:54:20+00:00","modifiedTime":"2024-12-05T13:33:50+00:00","timestamp":"2024-12-05T15:01:09+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"AI","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33574"},"slug":"ai","categoryId":33574},{"name":"General AI","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33576"},"slug":"general-ai","categoryId":33576}],"title":"Five Ways Machine Health Delivers Real Business Value","strippedTitle":"five ways machine health delivers real business value","slug":"five-ways-machine-health-delivers-real-business-value","canonicalUrl":"","浏览登录器整合":{"metaDescription":"Learn the five ways machine health delivers real value for your business and how much time and money you can save with Augury's Machine Health.","noIndex":0,"noFollow":0},"content":"We depend on machines to produce everyday essentials — such as power, food, and medicine — and to support nearly every aspect of society. Thus, machine health is vital to overall manufacturing and business health. Machine health transforms reliability, maintenance, operations, and asset performance management by using artificial intelligence (AI) and Internet of Things (IoT) technologies to improve performance, reduce downtime, and help manufacturers reach Industry 4.0 standards.\r\n<h2 id=\"tab1\" >Transform the way you work</h2>\r\nIn an era of labor shortages and technology innovation, manufacturing needs to move faster toward digitization. Using AI in manufacturing, companies can eliminate repetitive tasks, reduce inefficiencies, and strengthen data-driven decision making. With insights into the real-time condition of their machines, workers can break away from traditional maintenance schedules and manual tasks. This means more time for proactive work and collaboration with other departments, which leads to stronger cross-functional teams. It also leads to further innovations, such as process optimization. When employees have insights into the health of their machines, they can predict their workdays and own their schedules, opening up new opportunities for innovation and engagement.\r\n\r\nLearn more about transforming the way you work with machine health at <a href=\"//www.augury.com/use-cases/business-goal/transform-the-way-you-work\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/transform-the-way-you-work</a>.\r\n<h2 id=\"tab2\" >Eliminate unnecessary downtime</h2>\r\nUnplanned downtime can be expensive. There’s the cost of the repairs themselves, lost production and sales, and reputational damage. Maintenance and reliability teams often have to scramble to diagnose and fix the problem as quickly as possible — often resulting in overtime pay and expedited shipping costs for emergency spare parts. Sudden and catastrophic machine failures can also harm worker morale and jeopardize worker safety. Thus, reducing unnecessary downtime has a significant impact on both your top and bottom lines.\r\n\r\nLearn more about eliminating unnecessary downtime with machine health at <a href=\"//www.augury.com/use-cases/business-goal/eliminate-unnecessary-downtime\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/eliminate-unnecessary-downtime</a>.\r\n<h2 id=\"tab3\" >Reduce loss, waste, and emissions</h2>\r\nReducing waste to improve sustainability has become a top priority for manufacturers for cost-cutting/efficiency purposes, as well as to promote a healthier planet. Healthy machines can run at capacity and with less downtime, leading to less waste and more efficient energy use. An industry study by the Electric Power Research Institute (EPRI) found that optimizing the performance of rotating assets — which account for approximately 54 percent of U.S. industrial electricity consumption — can reduce energy consumption by 12 to 15 percent.\r\n\r\nLearn more about reducing loss, waste, and emissions with machine health at <a href=\"//www.augury.com/use-cases/business-goal/reduce-loss-waste-and-emissions\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/reduce-loss-waste-and-emissions</a>.\r\n<h2 id=\"tab4\" >Maximize yield and capacity</h2>\r\nReal-time machine health insights allow maintenance teams to adjust shutdown schedules based on the current condition of the machine, its history, and the recommendations of experts. In the longer-term, machine health minimizes unplanned downtime by improving the health of your machines, reduces planned downtime by deferring nonessential maintenance activities, and can increase output on production lines with healthier machines running optimally.\r\n\r\nLearn more about maximizing yield and capacity with machine health at <a href=\"//www.augury.com/use-cases/business-goal/maximize-yield-and-capacity\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/maximize-yield-and-capacity</a>.\r\n<h2 id=\"tab5\" >Optimize asset care</h2>\r\nWhen it comes to asset care — from acquiring and storing parts to managing maintenance resources — manufacturers have traditionally taken a more preventive than predictive approach: Machines are serviced on fixed schedules, regardless of whether or not they need maintenance. Many manufacturers keep spare parts for critical machine assets in inventory because calendar-based maintenance dictates when parts should be replaced — whether or not replacement is needed. The alternative is overspending to get parts on short notice and expensive downtime while you wait for the parts to arrive. Whether hoarding parts or paying more for last-minute parts, both methods are inefficient and costly. Machine health empowers you to control how you spend time and money based on the real-time condition of your machine assets.\r\n\r\nLearn more about optimizing asset care with machine health at <a href=\"//www.augury.com/use-cases/business-goal/optimize-asset-care\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/optimize-asset-care</a>.\r\n<h2 id=\"tab6\" >Start building a winning machine health culture</h2>\r\nMachine health can transform operations for every manufacturer. Get your free copy of <em>Machine Health For Dummies</em> at <a class=\"bookSponsor-btn\" href=\"//www.augury.com/collateral/machine-health-for-dummies/\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">//www.augury.com/machinehealthfordummies/</a>.\r\n\r\nHow much will you save with Augury Machine Health? Use the ROI calculator at <a href=\"//www.augury.com/value-calculator/\" target=\"_blank\" rel=\"noopener\">www.augury.com/value-calculator/</a> to see how much time and money you can save with Augury’s Machine Health.\r\n\r\n<iframe title=\"Machine Health For Dummies, Augury Special Edition\" src=\"//www.youtube.com/embed/6RpYgfj3RE4\" width=\"570\" height=\"321\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"></iframe>","description":"We depend on machines to produce everyday essentials — such as power, food, and medicine — and to support nearly every aspect of society. Thus, machine health is vital to overall manufacturing and business health. Machine health transforms reliability, maintenance, operations, and asset performance management by using artificial intelligence (AI) and Internet of Things (IoT) technologies to improve performance, reduce downtime, and help manufacturers reach Industry 4.0 standards.\r\n<h2 id=\"tab1\" >Transform the way you work</h2>\r\nIn an era of labor shortages and technology innovation, manufacturing needs to move faster toward digitization. Using AI in manufacturing, companies can eliminate repetitive tasks, reduce inefficiencies, and strengthen data-driven decision making. With insights into the real-time condition of their machines, workers can break away from traditional maintenance schedules and manual tasks. This means more time for proactive work and collaboration with other departments, which leads to stronger cross-functional teams. It also leads to further innovations, such as process optimization. When employees have insights into the health of their machines, they can predict their workdays and own their schedules, opening up new opportunities for innovation and engagement.\r\n\r\nLearn more about transforming the way you work with machine health at <a href=\"//www.augury.com/use-cases/business-goal/transform-the-way-you-work\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/transform-the-way-you-work</a>.\r\n<h2 id=\"tab2\" >Eliminate unnecessary downtime</h2>\r\nUnplanned downtime can be expensive. There’s the cost of the repairs themselves, lost production and sales, and reputational damage. Maintenance and reliability teams often have to scramble to diagnose and fix the problem as quickly as possible — often resulting in overtime pay and expedited shipping costs for emergency spare parts. Sudden and catastrophic machine failures can also harm worker morale and jeopardize worker safety. Thus, reducing unnecessary downtime has a significant impact on both your top and bottom lines.\r\n\r\nLearn more about eliminating unnecessary downtime with machine health at <a href=\"//www.augury.com/use-cases/business-goal/eliminate-unnecessary-downtime\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/eliminate-unnecessary-downtime</a>.\r\n<h2 id=\"tab3\" >Reduce loss, waste, and emissions</h2>\r\nReducing waste to improve sustainability has become a top priority for manufacturers for cost-cutting/efficiency purposes, as well as to promote a healthier planet. Healthy machines can run at capacity and with less downtime, leading to less waste and more efficient energy use. An industry study by the Electric Power Research Institute (EPRI) found that optimizing the performance of rotating assets — which account for approximately 54 percent of U.S. industrial electricity consumption — can reduce energy consumption by 12 to 15 percent.\r\n\r\nLearn more about reducing loss, waste, and emissions with machine health at <a href=\"//www.augury.com/use-cases/business-goal/reduce-loss-waste-and-emissions\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/reduce-loss-waste-and-emissions</a>.\r\n<h2 id=\"tab4\" >Maximize yield and capacity</h2>\r\nReal-time machine health insights allow maintenance teams to adjust shutdown schedules based on the current condition of the machine, its history, and the recommendations of experts. In the longer-term, machine health minimizes unplanned downtime by improving the health of your machines, reduces planned downtime by deferring nonessential maintenance activities, and can increase output on production lines with healthier machines running optimally.\r\n\r\nLearn more about maximizing yield and capacity with machine health at <a href=\"//www.augury.com/use-cases/business-goal/maximize-yield-and-capacity\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/maximize-yield-and-capacity</a>.\r\n<h2 id=\"tab5\" >Optimize asset care</h2>\r\nWhen it comes to asset care — from acquiring and storing parts to managing maintenance resources — manufacturers have traditionally taken a more preventive than predictive approach: Machines are serviced on fixed schedules, regardless of whether or not they need maintenance. Many manufacturers keep spare parts for critical machine assets in inventory because calendar-based maintenance dictates when parts should be replaced — whether or not replacement is needed. The alternative is overspending to get parts on short notice and expensive downtime while you wait for the parts to arrive. Whether hoarding parts or paying more for last-minute parts, both methods are inefficient and costly. Machine health empowers you to control how you spend time and money based on the real-time condition of your machine assets.\r\n\r\nLearn more about optimizing asset care with machine health at <a href=\"//www.augury.com/use-cases/business-goal/optimize-asset-care\" target=\"_blank\" rel=\"noopener\">www.augury.com/use-cases/business-goal/optimize-asset-care</a>.\r\n<h2 id=\"tab6\" >Start building a winning machine health culture</h2>\r\nMachine health can transform operations for every manufacturer. Get your free copy of <em>Machine Health For Dummies</em> at <a class=\"bookSponsor-btn\" href=\"//www.augury.com/collateral/machine-health-for-dummies/\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\">//www.augury.com/machinehealthfordummies/</a>.\r\n\r\nHow much will you save with Augury Machine Health? Use the ROI calculator at <a href=\"//www.augury.com/value-calculator/\" target=\"_blank\" rel=\"noopener\">www.augury.com/value-calculator/</a> to see how much time and money you can save with Augury’s Machine Health.\r\n\r\n<iframe title=\"Machine Health For Dummies, Augury Special Edition\" src=\"//www.youtube.com/embed/6RpYgfj3RE4\" width=\"570\" height=\"321\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"></iframe>","blurb":"","authors":[],"primaryCategoryTaxonomy":{"categoryId":33576,"title":"General AI","slug":"general-ai","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33576"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"Transform the way you work","target":"#tab1"},{"label":"Eliminate unnecessary downtime","target":"#tab2"},{"label":"Reduce loss, waste, and emissions","target":"#tab3"},{"label":"Maximize yield and capacity","target":"#tab4"},{"label":"Optimize asset care","target":"#tab5"},{"label":"Start building a winning machine health culture","target":"#tab6"}],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":299369,"title":"How ChatGPT Could Change Our Lives","slug":"how-chatgpt-could-change-our-lives","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299369"}},{"articleId":299281,"title":"How to Write Prompts for ChatGPT","slug":"how-to-write-prompts-for-chatgpt","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299281"}},{"articleId":299133,"title":"ChatGPT For Dummies Cheat Sheet","slug":"chatgpt-for-dummies-cheat-sheet","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/299133"}},{"articleId":298910,"title":"What Is ChatGPT and How Does It Work?","slug":"what-is-chatgpt","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/298910"}},{"articleId":272678,"title":"AI-Enhanced Content Capture","slug":"ai-enhanced-content-capture","categoryList":["technology","information-technology","ai","general-ai"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/272678"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;ai&quot;,&quot;general-ai&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-656f3b356c387\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;ai&quot;,&quot;general-ai&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-656f3b356dfed\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":true,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"Brought to you by Augury","brandingLink":"//www.augury.com/","brandingLogo":{"src":"//coursofppt.com/wp-content/uploads/augury-logo.png","width":89,"height":41},"sponsorAd":"","sponsorEbookTitle":"Machine Health For Dummies, Augury Special Edition","sponsorEbookLink":"//www.augury.com/collateral/machine-health-for-dummies/","sponsorEbookImage":{"src":"//coursofppt.com/wp-content/uploads/machine-health-for-dummies-augury-special-edition-cover-9781394208777-165x255.jpg","width":165,"height":255}},"primaryLearningPath":"Solve","lifeExpectancy":"One year","lifeExpectancySetFrom":"2024-12-01T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[{"adPairKey":"sponsored","adPairValue":"customsolutions"}]},"status":"publish","visibility":"public","articleId":301240},{"headers":{"creationTime":"2020-03-03T20:50:01+00:00","modifiedTime":"2024-12-03T19:14:45+00:00","timestamp":"2024-12-03T21:01:09+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Software","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33618"},"slug":"software","categoryId":33618},{"name":"Adobe Products","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33619"},"slug":"adobe-products","categoryId":33619},{"name":"Analytics","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33621"},"slug":"analytics","categoryId":33621}],"title":"Adobe Analytics For Dummies Cheat Sheet","strippedTitle":"adobe analytics for dummies cheat sheet","slug":"adobe-analytics-for-dummies-cheat-sheet","canonicalUrl":"","浏览登录器整合":{"metaDescription":"The Adobe Analysis Workspace is intuitive, but there are a lot of features you need to know about to optimize your consumer data analysis.","noIndex":0,"noFollow":0},"content":"Adobe Analytics is the most powerful tool available for analyzing digital consumer data, but it’s easier to grasp if you know where to start. Master the most basic and widely applicable features in the easiest way. Get details on two standard calculated metrics in the analytics industry that focus on analyzing engagement on your site, app, or other digital property. Discover several tips to improve your productivity in Analysis Workspace.","description":"Adobe Analytics is the most powerful tool available for analyzing digital consumer data, but it’s easier to grasp if you know where to start. Master the most basic and widely applicable features in the easiest way. Get details on two standard calculated metrics in the analytics industry that focus on analyzing engagement on your site, app, or other digital property. Discover several tips to improve your productivity in Analysis Workspace.","blurb":"","authors":[{"authorId":9574,"name":"David Karlins","slug":"david-karlins","description":" <p>David Karlins is a web design professional and author who's written over 50 books and created video training on top web design tools. Doug Sahlin is the coauthor of <i>Social Media Marketing All-in-One For Dummies</i> and author of <i>Digital Landscape &amp; Nature Photography For Dummies</i>.</p>","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9574"}}],"primaryCategoryTaxonomy":{"categoryId":33621,"title":"Analytics","slug":"analytics","_links":{"self":"//dummies-api.coursofppt.com/v2/categories/33621"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":263444,"title":"Adobe Analytics vs. Google Analytics","slug":"adobe-analytics-vs-google-analytics","categoryList":["technology","software","adobe-products","analytics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/263444"}},{"articleId":263429,"title":"8 Adobe Analytics Custom Segments","slug":"8-adobe-analytics-custom-segments","categoryList":["technology","software","adobe-products","analytics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/263429"}},{"articleId":263415,"title":"How to Use Adobe Analytics to Narrow in on Your Market Segment: Identifying Purchasers","slug":"how-to-use-adobe-analytics-to-narrow-in-on-your-market-segment-identifying-purchasers","categoryList":["technology","software","adobe-products","analytics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/263415"}},{"articleId":263392,"title":"Adobe Analytics and Search Engine Data","slug":"adobe-analytics-and-search-engine-data","categoryList":["technology","software","adobe-products","analytics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/263392"}},{"articleId":263385,"title":"How to Use Adobe Analytics to Analyze the Success of Your Marketing Channels","slug":"how-to-use-adobe-analytics-to-analyze-the-success-of-your-marketing-channels","categoryList":["technology","software","adobe-products","analytics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/263385"}}],"fromCategory":[{"articleId":263444,"title":"Adobe Analytics vs. Google Analytics","slug":"adobe-analytics-vs-google-analytics","categoryList":["technology","software","adobe-products","analytics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/263444"}},{"articleId":263429,"title":"8 Adobe Analytics Custom Segments","slug":"8-adobe-analytics-custom-segments","categoryList":["technology","software","adobe-products","analytics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/263429"}},{"articleId":263415,"title":"How to Use Adobe Analytics to Narrow in on Your Market Segment: Identifying Purchasers","slug":"how-to-use-adobe-analytics-to-narrow-in-on-your-market-segment-identifying-purchasers","categoryList":["technology","software","adobe-products","analytics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/263415"}},{"articleId":263392,"title":"Adobe Analytics and Search Engine Data","slug":"adobe-analytics-and-search-engine-data","categoryList":["technology","software","adobe-products","analytics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/263392"}},{"articleId":263385,"title":"How to Use Adobe Analytics to Analyze the Success of Your Marketing Channels","slug":"how-to-use-adobe-analytics-to-analyze-the-success-of-your-marketing-channels","categoryList":["technology","software","adobe-products","analytics"],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/263385"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281619,"slug":"adobe-analytics-for-dummies","isbn":"9781119446088","categoryList":["technology","software","adobe-products","analytics"],"amazon":{"default":"//www.amazon.com/gp/product/1119446082/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"//www.amazon.ca/gp/product/1119446082/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"//www.tkqlhce.com/click-9208661-13710633?url=//www.chapters.indigo.ca/en-ca/books/product/1119446082-item.html&cjsku=978111945484","gb":"//www.amazon.co.uk/gp/product/1119446082/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"//www.amazon.de/gp/product/1119446082/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"//coursofppt.com/wp-content/uploads/adobe-analytics-for-dummies-cover-9781119446088-203x255.jpg","width":203,"height":255},"title":"Adobe Analytics For Dummies","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"<p><b data-author-id=\"34434\">Eric Matisoff</b> is Adobe's global evangelist for their Analytics solution. He appears regularly at tech and industry events to speak about Adobe products and their potential. <b data-author-id=\"9574\">David Karlins</b> has written 40 books on digital communications and design, including <i>HTML 5 &amp; CSS 3 For Dummies.</i> </p>","authors":[{"authorId":9574,"name":"David Karlins","slug":"david-karlins","description":" <p>David Karlins is a web design professional and author who's written over 50 books and created video training on top web design tools. Doug Sahlin is the coauthor of <i>Social Media Marketing All-in-One For Dummies</i> and author of <i>Digital Landscape &amp; Nature Photography For Dummies</i>.</p>","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/9574"}},{"authorId":34434,"name":"Eric Matisoff","slug":"eric-matisoff","description":" <p><b>Eric Matisoff</b> is Adobe&#39;s global evangelist for their Analytics solution. He appears regularly at tech and industry events to speak about Adobe products and their potential. <b>David Karlins</b> has written 40 books on digital communications and design, including <i>HTML 5 &#38; CSS 3 For Dummies.</i> ","hasArticle":false,"_links":{"self":"//dummies-api.coursofppt.com/v2/authors/34434"}}],"_links":{"self":"//dummies-api.coursofppt.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;software&quot;,&quot;adobe-products&quot;,&quot;analytics&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119446088&quot;]}]\" id=\"du-slot-656cec95543b7\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;software&quot;,&quot;adobe-products&quot;,&quot;analytics&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119446088&quot;]}]\" id=\"du-slot-656cec9555f7c\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":260415,"title":"The Most Used Features in Adobe Analytic's Analysis Workspace","slug":"","categoryList":[],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/260415"}},{"articleId":260418,"title":"Engagement Metrics You Need for Adobe Analytics","slug":"","categoryList":[],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/260418"}},{"articleId":260423,"title":"Adobe Analytics Analysis Workspace Productivity Hacks","slug":"","categoryList":[],"_links":{"self":"//dummies-api.coursofppt.com/v2/articles/260423"}}],"content":[{"title":"The Most Used Features in Adobe Analytic's Analysis Workspace","thumb":null,"image":null,"content":"<p>Adobe’s Analysis Workspace is where you perform the bulk of your data analysis. The interface is intuitive, but there’s a lot to it. The following tips will guide you through the easiest ways to access the most widely used features:</p>\n<ul>\n<li>Log in to the <a href=\"//experiencecloud.adobe.com/\">Adobe Experience Cloud</a>. You need your Adobe ID and password, which your administrator set up. After you’ve logged in, click the Solution Selector icon in the top-right corner (it looks like three rows of three dots each), and choose Analytics from the drop-down menu.</li>\n<li>To make sure you’re in Analysis Workspace, look at the top-left of your screen and confirm that the word <em>Workspace</em> is highlighted. If Reports is highlighted instead, click Workspace to switch to Adobe’s most powerful browser-based analytics tool.</li>\n<li>Create a new project by clicking the blue Create New Project button and then choosing a blank template or one of Adobe’s preconfigured templates.</li>\n<li>Define a timeframe for your project by clicking anywhere in the date that appears in the top-right corner of Analysis Workspace. You can manually enter dates in the two boxes (Start and Finish), or click in the calendar to set start and finish dates for your project’s timeframe. You can also click the drop-down menu above the blue Apply button to find an abundance of prebuilt time ranges, including Last 7 Days and Last Month.</li>\n<li>Create a panel for tables or visualizations by clicking the Add Blank Panel link in the large section of Analysis Workspace to the right of your screen. You can choose from a set of table and visualization options.</li>\n<li>Toggle between displaying and hiding the left rail by hovering your cursor over (or off) the left edge of the Analysis Workspace screen.</li>\n<li>Quickly access panels, visualizations, and components by clicking one of the three icons at the top of the left rail.</li>\n<li>Add a freeform table by clicking the Visualizations icon in the left rail, and then dragging and dropping the top item, Freeform Tables, into your blank panel on the right.</li>\n<li>Add a dimension, metric, segment, or timeframe to a panel by clicking Components in the left rail and then dragging the element to your freeform table.</li>\n<li>Quickly find components by entering a string of numbers, letters, and symbols in the Search box at the top of the left rail.</li>\n<li>When in doubt, right-click. Many of the most widely used features in Analysis Workspace appear in context menus.</li>\n</ul>\n"},{"title":"Engagement Metrics You Need for Adobe Analytics","thumb":null,"image":null,"content":"<p>Take advantage of the advanced features in Adobe Analytics by building and applying <em>calculated metrics,</em> the data points created in Adobe Analytics after data has been processed and is accessible in the Adobe interface. Interestingly, calculated metrics don’t have to contain a calculation, but they usually do. A calculated metric in Adobe Analytics could be a metric with a different attribution method, segment, or calculation applied to it. Following are several simple calculated metrics that you should find useful as you begin your Adobe Analytics journey.</p>\n<h2>Page views per visit metric</h2>\n<p>Companies care about the amount of visitor engagement on their website and mobile app. A common metric that dissects engagement uses this calculation: page views divided by visits. The thinking behind this metric is simple:</p>\n<ul>\n<li><strong>Page views: </strong>Focuses on quantity, showing the amount of content viewed</li>\n<li><strong>Visits: </strong>Focuses on quality and is used as the denominator to ensure that the analysis is focusing on visits in which a lot of content is viewed at once</li>\n</ul>\n<p>The page views per visit metric has been used by digital analysts for decades and provides a useful lens into the quality of the visits that are being driven by your marketing channels, device types, or geographies. The following figure shows how the metric is built in Adobe’s interface.</p>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-260420\" src=\"//coursofppt.com/wp-content/uploads/analytics-metric.jpg\" alt=\"analytics-metric\" width=\"535\" height=\"266\" /></p>\n<p>When you apply the page views per visit metric (or any calculated metric), also include in your analysis a metric that isn’t calculated. This non-calculated metric will help provide context to your analysis. For example, suppose you’re analyzing mobile devices that access your site and notice that a specific device, the Microsoft Kin, has the highest page views per visit by far. Before you call your team to let them know that your site has to be rebuilt with the dimensions of this device from 2010 in mind, it would be smart to add the visits and unique visitors metrics to your analysis. This additional context will help you realize that page views per visit was high for the Kin because only one visitor came to your site with that device. The additional context of your non-calculated metrics provided a valuable lesson: Don’t be fooled by high calculations without context.</p>\n<h2>Content velocity</h2>\n<p>Unfortunately, page views per visit has other faults besides a potential lack of context. When page views per visit is applied to the page dimension, it shows only the number of times each page is revisited, on average, within a visit. A more interesting question is, “What pages help drive additional page views on other pages?” The answer will provide you with the pages that are most likely to encourage your visitors to be engaged on your site. This additional metric is easy to build. The metrics are the same as page views per visit, with page views in the numerator and visits in the denominator. The only change has to do with the attribution model applied to the numerator. Use the Calculated Metric Builder in Adobe to apply a non-default attribution model set to Participation, as shown in the following figure.</p>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-260419\" src=\"//coursofppt.com/wp-content/uploads/analytics-calculated-metric.jpg\" alt=\"analytics-calculated-metric\" width=\"535\" height=\"269\" /></p>\n<p>Thanks to the magic of participation, every subsequent page view is included in the count of page views when you apply participation. After you create the content velocity metric, you can apply it to the page dimension to discover the pages that are not only being viewed often per visit but are also convincing your visitors to continue reading other pages on your site, too.</p>\n"},{"title":"Adobe Analytics Analysis Workspace Productivity Hacks","thumb":null,"image":null,"content":"<p>Face it: You’re busy at work. Whether you’re a marketer, an analyst, or a data scientist, your time is limited and your calendar is full of meetings. To make the most of the time that you spend in Adobe’s Analysis Workspace tool, use the following list of our favorite productivity hacks to make the most of every second that you spend in the Adobe interface:</p>\n<ul>\n<li>When working in a freeform table, you may want to select multiple rows of data at the same time. Shift-click (Mac and PC) to select multiple contiguous rows of data. Or Command-click (Mac) or Control-click (PC) to select multiple noncontiguous rows of data.</li>\n<li>Our most-used keyboard shortcut is Command+S (Mac) or Control+S (PC) to save the current project. We’re compulsive savers because we know there’s always a chance that the browser or computer will crash, and we’d hate to lose our analysis work. Add Shift to this keyboard combination (Command+ Shift +S on a Mac or Control+Shift +S on a PC) to Save As so you can duplicate and rename the project.</li>\n<li>Another useful keyboard shortcut is Command+C (Mac) or Control+C (PC) to copy data from a freeform table to the clipboard. We like to use this to more easily extract data out of Analysis Workspace into other analysis tools such as Excel or even into an email message.</li>\n<li>If we were to analyze the keyboard shortcuts that we use the most, Command+Z (Mac) or Control+Z (PC) would be high on this list. This keyboard shortcut for undo is useful when analyzing because you often begin exploring your data in one path, realize there isn’t much of interest there, and then want to undo your work step by step. If you ever undo too far, you can always press Command+Shift+Z (Mac) or Control+Shift+Z (PC) to redo a step.</li>\n<li>We love creating calculated metrics on-the-fly. This task is necessary when you have two metrics in a freeform table to which you want to apply a simple calculation: divide, subtract, add, or multiply. First, highlight the column headers of two metrics (by clicking to highlight one metric, then Shift-click or Command-click or Control-click a second metric). Second, right-click one of the highlighted column headers. Third, click Create Metric from Selection and choose the math operator to apply. If you want to apply a function to just a single calculated metric, apply Mean, Median, Column Max, Column Min, or Column Sum to any single metric. One final timesaver is to open a single metric in Calculated Metric Builder, as shown at the end of the following figure.</li>\n</ul>\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-260424\" src=\"//coursofppt.com/wp-content/uploads/analytics-single-metric.jpg\" alt=\"analytics-single-metric\" width=\"535\" height=\"362\" /></p>\n<p>Each of these productivity hacks will help speed your analysis and increase your skill. We hope you enjoy all the free time you now have to continue learning about Analysis Workspace!</p>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Six months","lifeExpectancySetFrom":"2024-12-03T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":260427}],"_links":{"self":{"self":"//dummies-api.coursofppt.com/v2/categories/33512/categoryArticles?sortField=time&sortOrder=1&size=10&offset=0"},"next":{"self":"//dummies-api.coursofppt.com/v2/categories/33512/categoryArticles?sortField=time&sortOrder=1&size=10&offset=10"},"last":{"self":"//dummies-api.coursofppt.com/v2/categories/33512/categoryArticles?sortField=time&sortOrder=1&size=10&offset=9402"}}},"objectTitle":"","status":"success","pageType":"article-category","objectId":"33512","page":1,"sortField":"time","sortOrder":1,"categoriesIds":[],"articleTypes":[],"filterData":{"categoriesFilter":[{"itemId":0,"itemName":"All Categories","count":9394},{"itemId":33513,"itemName":"Computers","count":1392},{"itemId":33537,"itemName":"Cybersecurity","count":58},{"itemId":33538,"itemName":"Digital Audio & Radio","count":131},{"itemId":33543,"itemName":"Electronics","count":1756},{"itemId":33572,"itemName":"Information Technology","count":806},{"itemId":33587,"itemName":"Internet Basics","count":86},{"itemId":33588,"itemName":"Notable Websites","count":188},{"itemId":33592,"itemName":"Programming & Web Design","count":1394},{"itemId":33611,"itemName":"Social Media","count":385},{"itemId":33618,"itemName":"Software","count":3192},{"itemId":33512,"itemName":"Technology","count":1},{"itemId":35241,"itemName":"Virtual Reality","count":5}],"articleTypeFilter":[{"articleType":"All Types","count":9394},{"articleType":"Articles","count":8243},{"articleType":"Cheat Sheet","count":302},{"articleType":"Step by Step","count":762},{"articleType":"Videos","count":87}]},"filterDataLoadedStatus":"success","pageSize":10},"adsState":{"pageScripts":{"headers":{"timestamp":"2025-03-20T05:50:01+00:00"},"adsId":0,"data":{"scripts":[{"pages":["all"],"location":"header","script":"<!--Optimizely Script-->\r\n<script src=\"//cdn.optimizely.com/js/10563184655.js\"></script>","enabled":false},{"pages":["all"],"location":"header","script":"<!-- comScore Tag -->\r\n<script>var _comscore = _comscore || [];_comscore.push({ c1: \"2\", c2: \"15097263\" });(function() {var s = document.createElement(\"script\"), el = document.getElementsByTagName(\"script\")[0]; s.async = true;s.src = (document.location.protocol == \"https:\" ? \"//sb\" : \"//b\") + \".scorecardresearch.com/beacon.js\";el.parentNode.insertBefore(s, el);})();</script><noscript><img src=\"//sb.scorecardresearch.com/p?c1=2&c2=15097263&cv=2.0&cj=1\" /></noscript>\r\n<!-- / comScore Tag -->","enabled":true},{"pages":["all"],"location":"footer","script":"<!--BEGIN QUALTRICS WEBSITE FEEDBACK SNIPPET-->\r\n<script type='text/javascript'>\r\n(function(){var g=function(e,h,f,g){\r\nthis.get=function(a){for(var a=a+\"=\",c=document.cookie.split(\";\"),b=0,e=c.length;b<e;b++){for(var d=c[b];\" \"==d.charAt(0);)d=d.substring(1,d.length);if(0==d.indexOf(a))return d.substring(a.length,d.length)}return null};\r\nthis.set=function(a,c){var b=\"\",b=new Date;b.setTime(b.getTime()+6048E5);b=\"; expires=\"+b.toGMTString();document.cookie=a+\"=\"+c+b+\"; path=/; \"};\r\nthis.check=function(){var a=this.get(f);if(a)a=a.split(\":\");else if(100!=e)\"v\"==h&&(e=Math.random()>=e/100?0:100),a=[h,e,0],this.set(f,a.join(\":\"));else return!0;var c=a[1];if(100==c)return!0;switch(a[0]){case \"v\":return!1;case \"r\":return c=a[2]%Math.floor(100/c),a[2]++,this.set(f,a.join(\":\")),!c}return!0};\r\nthis.go=function(){if(this.check()){var a=document.createElement(\"script\");a.type=\"text/javascript\";a.src=g;document.body&&document.body.appendChild(a)}};\r\nthis.start=function(){var t=this;\"complete\"!==document.readyState?window.addEventListener?window.addEventListener(\"load\",function(){t.go()},!1):window.attachEvent&&window.attachEvent(\"onload\",function(){t.go()}):t.go()};};\r\ntry{(new g(100,\"r\",\"QSI_S_ZN_5o5yqpvMVjgDOuN\",\"//zn5o5yqpvmvjgdoun-wiley.siteintercept.qualtrics.com/SIE/?Q_ZID=ZN_5o5yqpvMVjgDOuN\")).start()}catch(i){}})();\r\n</script><div id='ZN_5o5yqpvMVjgDOuN'><!--DO NOT REMOVE-CONTENTS PLACED HERE--></div>\r\n<!--END WEBSITE FEEDBACK SNIPPET-->","enabled":false},{"pages":["all"],"location":"header","script":"<!-- Hotjar Tracking Code for //coursofppt.com -->\r\n<script>\r\n (function(h,o,t,j,a,r){\r\n h.hj=h.hj||function(){(h.hj.q=h.hj.q||[]).push(arguments)};\r\n h._hjSettings={hjid:257151,hjsv:6};\r\n a=o.getElementsByTagName('head')[0];\r\n r=o.createElement('script');r.async=1;\r\n r.src=t+h._hjSettings.hjid+j+h._hjSettings.hjsv;\r\n a.appendChild(r);\r\n })(window,document,'//static.hotjar.com/c/hotjar-','.js?sv=');\r\n</script>","enabled":false},{"pages":["article"],"location":"header","script":"<!-- //Connect Container: dummies --> <script src=\"//get.s-onetag.com/bffe21a1-6bb8-4928-9449-7beadb468dae/tag.min.js\" async defer></script>","enabled":true},{"pages":["homepage"],"location":"header","script":"<meta name=\"facebook-domain-verification\" content=\"irk8y0irxf718trg3uwwuexg6xpva0\" />","enabled":true},{"pages":["homepage","article","category","search"],"location":"footer","script":"<!-- Facebook Pixel Code -->\r\n<noscript>\r\n<img height=\"1\" width=\"1\" src=\"//www.facebook.com/tr?id=256338321977984&ev=PageView&noscript=1\"/>\r\n</noscript>\r\n<!-- End Facebook Pixel Code -->","enabled":true}]}},"pageScriptsLoadedStatus":"success"},"navigationState":{"navigationCollections":[{"collectionId":287568,"title":"BYOB (Be Your Own Boss)","hasSubCategories":false,"url":"/collection/for-the-entry-level-entrepreneur-287568"},{"collectionId":293237,"title":"Be a Rad Dad","hasSubCategories":false,"url":"/collection/be-the-best-dad-293237"},{"collectionId":295890,"title":"Career Shifting","hasSubCategories":false,"url":"/collection/career-shifting-295890"},{"collectionId":294090,"title":"Contemplating the Cosmos","hasSubCategories":false,"url":"/collection/theres-something-about-space-294090"},{"collectionId":287563,"title":"For Those Seeking Peace of Mind","hasSubCategories":false,"url":"/collection/for-those-seeking-peace-of-mind-287563"},{"collectionId":287570,"title":"For the Aspiring Aficionado","hasSubCategories":false,"url":"/collection/for-the-bougielicious-287570"},{"collectionId":291903,"title":"For the Budding Cannabis Enthusiast","hasSubCategories":false,"url":"/collection/for-the-budding-cannabis-enthusiast-291903"},{"collectionId":299891,"title":"For the College Bound","hasSubCategories":false,"url":"/collection/for-the-college-bound-299891"},{"collectionId":291934,"title":"For the Exam-Season Crammer","hasSubCategories":false,"url":"/collection/for-the-exam-season-crammer-291934"},{"collectionId":301547,"title":"For the Game Day Prepper","hasSubCategories":false,"url":"/collection/big-game-day-prep-made-easy-301547"}],"navigationCollectionsLoadedStatus":"success","navigationCategories":{"books":{"0":{"data":[{"categoryId":33512,"title":"Technology","hasSubCategories":true,"url":"/category/books/technology-33512"},{"categoryId":33662,"title":"Academics & The Arts","hasSubCategories":true,"url":"/category/books/academics-the-arts-33662"},{"categoryId":33809,"title":"Home, Auto, & Hobbies","hasSubCategories":true,"url":"/category/books/home-auto-hobbies-33809"},{"categoryId":34038,"title":"Body, Mind, & Spirit","hasSubCategories":true,"url":"/category/books/body-mind-spirit-34038"},{"categoryId":34224,"title":"Business, Careers, & Money","hasSubCategories":true,"url":"/category/books/business-careers-money-34224"}],"breadcrumbs":[],"categoryTitle":"Level 0 Category","mainCategoryUrl":"/category/books/level-0-category-0"}},"articles":{"0":{"data":[{"categoryId":33512,"title":"Technology","hasSubCategories":true,"url":"/category/articles/technology-33512"},{"categoryId":33662,"title":"Academics & The Arts","hasSubCategories":true,"url":"/category/articles/academics-the-arts-33662"},{"categoryId":33809,"title":"Home, Auto, & Hobbies","hasSubCategories":true,"url":"/category/articles/home-auto-hobbies-33809"},{"categoryId":34038,"title":"Body, Mind, & Spirit","hasSubCategories":true,"url":"/category/articles/body-mind-spirit-34038"},{"categoryId":34224,"title":"Business, Careers, & Money","hasSubCategories":true,"url":"/category/articles/business-careers-money-34224"}],"breadcrumbs":[],"categoryTitle":"Level 0 Category","mainCategoryUrl":"/category/articles/level-0-category-0"}}},"navigationCategoriesLoadedStatus":"success"},"searchState":{"searchList":[],"searchStatus":"initial","relatedArticlesList":[],"relatedArticlesStatus":"initial"},"routeState":{"name":"ArticleCategory","path":"/category/articles/technology-33512/","hash":"","query":{},"params":{"category":"technology-33512"},"fullPath":"/category/articles/technology-33512/","meta":{"routeType":"category","breadcrumbInfo":{"suffix":"Articles","baseRoute":"/category/articles"},"prerenderWithAsyncData":true},"from":{"name":null,"path":"/","hash":"","query":{},"params":{},"fullPath":"/","meta":{}}},"profileState":{"auth":{},"userOptions":{},"status":"success"}}
fun88 casino net cách chơi keno trực tuyến game đánh bài baccarat baccarat quốc tế sòng bài trực tuyến