<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sat, 18 Apr 2026 02:25:43 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/cumputer/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Which is better!]]></title><description><![CDATA[ryzen 1700 vs ryzen 2600 What would you like to use?]]></description><link>http://direct.ecency.com/cumputer/@cocain5314/which-is-better</link><guid isPermaLink="true">http://direct.ecency.com/cumputer/@cocain5314/which-is-better</guid><category><![CDATA[cumputer]]></category><dc:creator><![CDATA[cocain5314]]></dc:creator><pubDate>Sun, 18 Nov 2018 04:41:12 GMT</pubDate></item><item><title><![CDATA[How to Modernize Your Legacy Technology in 11 Ways.]]></title><description><![CDATA[Business technology has evolved a lot in the last few decades, and the speed of this change has increased exponentially in recent years. With mobile devices and cloud computing now a standard in the business]]></description><link>http://direct.ecency.com/technology/@tech-talk-too/how-to-modernize-your-legacy-technology-in-11-ways</link><guid isPermaLink="true">http://direct.ecency.com/technology/@tech-talk-too/how-to-modernize-your-legacy-technology-in-11-ways</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[tech-talk-too]]></dc:creator><pubDate>Thu, 06 Sep 2018 02:11:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/2r8F9rTBenJQfQgENfxADE6EVYabczqmSF5KeWefV5WL9W991yXnefdCA4gqJNQtH2MCY5Zrbb8FbLoAqzfZia2WUM2rqR6S5CzKZiLDjJwYQoVxX1pJejMrecFDhwga2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Computer]]></title><link>http://direct.ecency.com/cumputer/@neerajkua/computer-223d8fda5b7cd</link><guid isPermaLink="true">http://direct.ecency.com/cumputer/@neerajkua/computer-223d8fda5b7cd</guid><category><![CDATA[cumputer]]></category><dc:creator><![CDATA[neerajkua]]></dc:creator><pubDate>Fri, 27 Jul 2018 14:39:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/o1AJ9qDyyJNSpZWhUgGYc3MngFqoAMeoZgTCuZVENozKZKx6z?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Computer electronic calculator]]></title><description><![CDATA[Computer Computer is the electronic calculator with which it is possible to accomplish many other types of work faster than calculations. The development of civilization and its rapid progress now has]]></description><link>http://direct.ecency.com/cumputer/@bsaddi/computer-electronic-calculator</link><guid isPermaLink="true">http://direct.ecency.com/cumputer/@bsaddi/computer-electronic-calculator</guid><category><![CDATA[cumputer]]></category><dc:creator><![CDATA[bsaddi]]></dc:creator><pubDate>Mon, 26 Mar 2018 10:42:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/3MxaK27PJLaXTz3NjKNAfEc6rBk7t43NL7KxCQrVfLEXVxa?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Photograpy ]]></title><description><![CDATA[All the files on the computer are being scanned for viruses]]></description><link>http://direct.ecency.com/photograpy/@priok/4sjvpd-photograpy</link><guid isPermaLink="true">http://direct.ecency.com/photograpy/@priok/4sjvpd-photograpy</guid><category><![CDATA[photograpy]]></category><dc:creator><![CDATA[priok]]></dc:creator><pubDate>Sat, 17 Mar 2018 18:50:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjWMGm4Xa2MvD5AT2bJsSA8F9WeC71v1s1fKfGkK9mMKuc3LcvF4KigbWg9UsrpEPZ2Gw8j9bTgPPQdTj6S532vD7QdPTbzfFruPophtPNH5x?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[White, Grey, and Black Hat Hacking]]></title><description><![CDATA[For those who are relatively new to the world of hacking there are three categories of hackers. White hat hackers are exactly what you would expect them to be. White hat hacking would be performing pen]]></description><link>http://direct.ecency.com/technology/@sebastianverlac/white-grey-and-black-hat-hacking</link><guid isPermaLink="true">http://direct.ecency.com/technology/@sebastianverlac/white-grey-and-black-hat-hacking</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[sebastianverlac]]></dc:creator><pubDate>Wed, 24 Jan 2018 00:52:21 GMT</pubDate></item></channel></rss>