I’m tremendously proud of being multipotentiality. It makes it easy to research and write in-depth content in various fields, mainly on emerging digital technologies, from Cloud computing to Artificia
مؤتمر تقنيات المستقبل الذكية 2022
مؤتمر تقنيات المستقبل الذكية 2022 هو حدث سنوي قيادي على مستوى المنطقة، ويشتمل على معرض لأحدث التريندات وآخر الصيحات الحديثة في التكنولوجيات الرقمية الجديدة. المؤتمر يتهدف للوصول إلى ألمع قادة التقنية وكبار رواد الأعمال في الممكلة وحول العالم، وذلك لاستكشاف التقنيات الذكية المستقبلية بما يتفق مع رؤية المملكة 2030.
نظام الملك: وزير النهضة الإصلاحية
تُعد شخصية الوزير السلجوقي نظام الملك (408 هـ 1017 م – 485 هـ 1092 م) مجهولة نسبياً في أوساط الجماهير حالياً كما كان ذلك في الجيل السابق، حيث يعود الفضل لبعض الأفلام والمسلسلات التاريخية في التعريف بهذه الشخصية الكبيرة، وبالرغم من ذلك فلا يزال هناك نقص كبير في الربط بين نهضة عصر صلاح الدين وبين إصلاحات ومدارس الوزير نظام الملك، حيث لا يزال الغالبية من الناس يتخيلون أن ظهور القائد الرباني هو الحدث الفيصل والأمر الحاسم في نهضة الأمم، وهذا على خلاف ما هو معروف في أحداث التاريخ، إذ إن ظهور شخصية ...
ابن خلدون
يُعد ابن خلدون من أكبر وأشهر العلماء والمؤرخين في الحضارة الإسلامية، حيث وصلت شهرته ونظرياته إلى مستوى العالمية، فهو يُعتبر أول مؤسسٍ لعلم الاجتماع وأحد أكبر أصحاب النظريات في فلسفة التاريخ وعلوم السياسة والعلاقات الدولية. كانت حياة ابن خلدون حافلة بالعلم النظري والتطبيقي، فقد درس وقرأ العلم الشرعي والتاريخ، كما عاش الأحداث التاريخية والسياسية بنفسه في صلب دوائر صنع القرار في عصره.
Azure Cloud Fundamentals and Core Concepts
Microsoft has a deep-rooted history in the tech world when compared with the other global technology giants like Facebook, Google, and Twitter. Microsoft had dominated the PC operating system world with Windows for many years, far outpacing competitors like Linux and macOS.
But Microsoft is not immune to defeat, as it lost the battle in the mobile operating system war against Android. Facing down that defeat, it seems like Microsoft decided to step up its game and take on the next upcoming te...
Overview of IoT Security Challenges
Are you eagerly waiting to enter the era of smart homes and self-driving cars? There has been a lot of buzz around the Internet of Things (IoT) and connectivity over the past few years, as more and more home appliances gain the ability to connect to the Internet, networks, and mobile devices. Despite the rise and popularity of the connected devices, however, by and large, fully functioning “smart homes” are still a rarity outside of science fiction movies. Why is that? What will it take to fu...
Zero Trust Security Architecture Overview
If your tightly secured network has ever been hacked by a falsely authorized user, then you may benefit from learning about the Zero Trust architecture security model. While the term “Zero Trust” might seem like a buzzword referencing a dystopian science fiction concept, the truth of the matter is, once you know more about it, you will likely wish to add it to your security toolset.
That being said, implementing this magic buzzword will create some much needed security changes and great benef...
How to Choose A Code Editor
Using a professional code editor isn’t just for show – it is a necessity given the complexity of software development today. Gone are the days of writing your code in a Notepad file. To code efficiently, every programmer worth their salt needs to employ a set of developer tools to not only write their code in, but to optimize their coding experience and reduce errors as much as possible. One such tool a developer relies on is an integrated developer environment (IDE). Another option is a code...
What is Homebrew and How to Install on MacOS?
If you ever wondered how to install command-line tools such as telnet, cask, htop, wget, nmap, etc, on macOS? or do you need a package manager on macOS to install and update your favorite applications?
For you as a developer or sysadmin, Homebrew enables you to installs your needs that macOS didn’t include in its core OS.
What is Homebrew?
Homebrew (brew) is a free and open-source package manager that allows installing apps and software in macOS, depending on the user’s desire. It has been re...
11 Brute-force Attack Tools for Penetration Test
For your company’s IT system, you need a piece of concrete proof to demonstrate that your online business is solid against various kinds of cyberattacks, especially brute-force attacks.
What is a Brute-force Attack?
A brute-force attack is one of the most dangerous cyberattacks that you may have no trick in confronting! A brute-force attack aims at the heart of your website or your device’s security, the login password, or encryption keys. It uses the continuous trial-and-error method to expl...
Overview of AI-based Cybersecurity Technologies
In the new era of Artificial Intelligence (AI), the game of cat and mouse in the realm of cybersecurity has reached its head. AI, from its side, gives cybersecurity added power for more intelligent detection and analysis of cyber threats. But unfortunately, hackers are also using AI as a new weapon to create new – and stronger – malicious innovations.
There are hundreds of billions of changing signals crossing networks all the time – a number that can double monthly sometimes depending on the...
Introduction to IBM Cloud Computing
IBM (International Business Machines Corporation), the global computing company that established one of the first PC computers, made history once again in the age of cloud computing by acquiring SoftLayer cloud in 2013. SoftLayer, which was founded in 2005, offered bare-metal compute service before any other large provider companies at the time.
It is very difficult to speak comprehensively about any large cloud computing provider in the space of a singular article, so I’ll try to summarize t...
FusionAuth Localization Arabic trasnlation
FusionAuth Localization
Translating FusionAuth to Arabic
10 Most Important Basics of Personal Cybersecurity You Must Know
Personal Cybersecurity awareness became a necessity in the current situation of increasing digital transformation. Either at the business level or individuals, you need to protect your identity, accounts, money, and so on.
By the following basic tips about personal cybersecurity, this article aims to help you increase your ability to protect yourself against the sophisticated hackers’ techniques that continue to evolve.
Saudi Health Tech Forum
Presentation for Saudi Health Tech Forum. I have participated in writing it by adding some medical stories and information, in addition, to put some definitions for digital technical terms. Also, paraphrasing the whole text.
سبعة نصائح للنجاح في كتابة المحتوى للمواقع الأجنبية
لماذا تكتب للمواقع الأجنبية؟
يعاني حال مهنة كتابة المحتوى باللغة العربية أحياناً من ضعف في الأسعار والرواتب، حيث لا يحصل كاتب المحتوى العربي في كثير من الأحيان على ما يستحقه لقاء تعبه ووقته الذي قضاه في تحصيل ملكة الكتابة والإكثار من القراءة، ثم في تطبيق كل مهاراته لإخراج محتوى مكتوب مميز.
وللمساعدة في حل هذه المشكلة توجد الكثير من المقترحات مثل التوجه للنشر في السوشيال ميديا، أو العمل بوظيفة كاتب إعلانات مع الشركات التجارية، وغير ذلك من الحلول. إلا أن المشكلة الرئيسية تظل أيضاً في صغر حجم سو...