Devpost
Devpost for Teams
Grow your developer ecosystem and promote your platform.
Drive innovation, collaboration, and retention within your organization.
Johnson and Wales University: Cyber Threat Intellgence and Defense Major
Modular e-textile based portion controlled jar. Does not allow people to grab more than one health serving size.
Worried about leaving your child with a sitter? You may have cameras, but can't they see everything. Teeter Toddler is a small device that takes real-time data capable of sensing if your child is safe
Using an array of sensors, we're able to measure the quality of the air the user is breathing while wearing the mask. If unsafe air is being breathed a buzzer is set off to alert the user to evacuate.
A two layer Artificial Neural Network that uses a Logistical Regression algorithm to defend against malware.
Reliable Affordable Secure.
Searching the Dark Web for usernames and profiles
For a Cyber Analyst, the amount of threat intel is key to any ongoing case but can be extremely time consuming. Instead of bouncing from tab to tab, why not just stop by Tom Nook's Cyber Cranney.
Ever wanted to prank your friends with the power of vine and memes while they type? Well memeboard is perfect for you. As a person types a vine or meme video will pop up based on the key pressed.
Wi-Fi Stalker aims to raise awareness about device security and privacy protection.
What does retro gaming and cyber security have in common? An extremely long 24 hours!!!!
N/A
A small form night stand that has a built in array of 25 LED's that light up when objects are placed on it.
email generator