Back

More like this

Recommendations from Medial

Image Description
Image Description

Tharuneshwar S

Technology Rapt | Py... • 1y

I have an idea to build an virtual-try-on software for apparel. Where you can view your outfit in 360 deg using 3d modeling technology which mimic you. Outfit recommendation engine. It recommends various outfits based on the ocassion. Share your v

See More
2 Replies
4
Image Description

Basavaraja V

Software Engineer • 9m

Let's make ByCelebrityChoice the go-to source for celebrity fashion and outfits. I need your help to populate the platform with accurate outfit details. Please contribute by uploading your findings.

3 Replies
2
Image Description

Vasvi Seth

Cyber Security Stude... • 1y

Protecting personal data is crucial in today's digital landscape. Personally Identifiable Information (PII) encompasses any data that can be used to discern an individual's identity. Safeguarding PII is not just a responsibility; it's a commitment to

See More
4 Replies
5

Vipul Soman

Founder at Prayog Cy... • 3m

How Cloud Security evolved over the years: CSPM → CWPP → CNAPP 1. Cloud Security Posture Management (CSPM) focuses on identifying and remediating cloud infrastructure misconfigurations. It continuously scans your cloud environments against security

See More
Reply
20

Aditya Sahu

No Risk, No Story. • 5m

"Guardio" security on demand, anytime, anywhere. Imagine an app where you can rent personal security just like booking a ride. With Guardio, you can instantly hire trained security guards on demand — choose how many you need, pick their attire (busi

See More
Reply
3
Image Description
Image Description

Sagar Anantwar

 • 

SimpliFin • 9m

Recently, Nikhil Kamath, who has often advocated renting over buying, bought a house, stirring mixed reactions. This move highlights that housing choices are complex, driven by multiple factors. I believe renting is better than buying—but only as lo

See More
4 Replies
8
25

Harish Kumar

Training Consoler • 8m

The future of cybersecurity focuses on using AI to detect threats, improving data protection, securing cloud platforms, and reducing risks through employee training. Zero-trust models will ensure strict verification for better security. These str

See More
Reply
2
Image Description
Image Description

Om Raut

"Entrepreneurial lea... • 1y

🔵Aftermath of Ambani-Merchant weeding that no media will cover..... ( Exclusively on Medial 😝) 1. 700-800 Kg dry and wet waste generated per day. 2. High Energy Consumption of energy leading to considerable amount of footprint. 3. 700-800 priva

See More
8 Replies
11

Sheikh Ayan

Founder of VistaSec:... • 5m

🔐 Top 12 Powerful Firewalls for Network Engineers in 2025 🔥 Protect your network with the best firewalls in the industry! Whether you're a network engineer, cybersecurity expert, or business owner, these top firewall solutions ensure maximum secur

See More
Reply
1
Image Description
Image Description

Yogesh Kuhade

"I am not a job seek... • 6m

Deepseek the chineseAI app has become a buzz word in the tech world lately. the app has surprised openAI's chatgpt on app store. In the latest the US Navy has asked its members not to use Deepseek AI due to security and ethical concern about its orig

See More
3 Replies
1

Download the medial app to read full posts, comements and news.