Fadmeter | Free Sentiment Analysis of Latest Twitter Trends (Hashtags)

sentiment analysis of twitter trends

Viewer RatingYou must sign in to voteFadmeter.com is a free SaaS platform which intends to help social media users stay up-to-date on the latest Twitter trends (hashtags) and public sentiment in a specific country. We can also track the public sentiment of tweets on Twitter for our chosen trend or hashtag. Fadmeter fetches a random … Read more

Application Deployment Checklist (Linux Systems)

application deployment

Viewer RatingYou must sign in to vote Application Deployment Checklist (Linux Systems) Security of software applications is an important aspect which is often underestimated or ignored at the peril of malicious cyber attacks. The following list is a quick check-list of validations and/or actions to be performed before deploying any enterprise-grade application in Production: 1. … Read more

FadURL | Benefits of URL Shortener

Viewer RatingYou must sign in to voteFadURL.com is a free, fast and secure url shortener which can take any long and unwieldy link and compress it into something very short, smart and easy to remember. In addition, FadURL lets you track who clicked your link to access your content – their country, city, timezone, device … Read more

What is a DDoS attack?

Viewer RatingYou must sign in to voteA distributed denial of service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. Historically, DoS (Denial of Service) attacks were a primary method for disrupting computer … Read more

Internet of Things (IoT)


Viewer RatingYou must sign in to voteThe Internet of Things (IoT) is a system of inter-connected computing devices, mechanical and digital machines, objects and tools, including animals or people carrying connected devices that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. It … Read more