<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 21 Apr 2026 05:33:14 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/endpoint/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[## Road Map and more in this Tuesday update!
Check out the latest deve ...]]></title><description><![CDATA[Road Map and more in this Tuesday update! Check out the latest development news from the team at DBuzz. We think it is great and exciting!! #hive #buzz #lite #community #endpoint #update]]></description><link>http://direct.ecency.com/hive-193084/@dbuzz/ernz16e1gng52oar7985sz</link><guid isPermaLink="true">http://direct.ecency.com/hive-193084/@dbuzz/ernz16e1gng52oar7985sz</guid><category><![CDATA[hive-193084]]></category><dc:creator><![CDATA[dbuzz]]></dc:creator><pubDate>Wed, 01 Jun 2022 05:01:09 GMT</pubDate></item><item><title><![CDATA[Endpoint Security: What It Is and Why You Need It]]></title><description><![CDATA[Protecting a network can be a daunting task. A typical network can consist of a mix of desktop computers, laptops, tablets, and smartphones. Every one of these endpoint devices can be a point of entry]]></description><link>http://direct.ecency.com/endpoint/@eddiesegal/endpoint-security-what-it-is-and-why-you-need-it</link><guid isPermaLink="true">http://direct.ecency.com/endpoint/@eddiesegal/endpoint-security-what-it-is-and-why-you-need-it</guid><category><![CDATA[endpoint]]></category><dc:creator><![CDATA[eddiesegal]]></dc:creator><pubDate>Mon, 09 Dec 2019 08:17:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/7ohP4GDMGPrTps6cjBmVHvN4WKRELnFy9u363NA4sovnHTaMGvoEqnXeZnUQhkm3ykjYKY6eoVppdxRJ5nNu3u5Sn1GQTn4svA3g?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Using HA Proxy to loadbalance between HTTPS endpoints]]></title><description><![CDATA[For providing a high availability for a service which isn’t high available by design often results in a few hours of headaches before you can solve it. I had the same issue. The situation was a cloud service]]></description><link>http://direct.ecency.com/linux/@timoschuetz/using-ha-proxy-to-loadbalance-between-https-endpoints</link><guid isPermaLink="true">http://direct.ecency.com/linux/@timoschuetz/using-ha-proxy-to-loadbalance-between-https-endpoints</guid><category><![CDATA[linux]]></category><dc:creator><![CDATA[timoschuetz]]></dc:creator><pubDate>Sun, 29 Sep 2019 19:15:00 GMT</pubDate></item><item><title><![CDATA[Endpoint: scopri cos’è e perché dovresti averne uno]]></title><description><![CDATA[Che cosa si intende per Endpoint? Gli Endpoint sono quei dispositivi in grado di connettersi alla rete aziendale centrale come  stampanti, routers, server, laptop, smartphone. Dato che si tratta di]]></description><link>http://direct.ecency.com/aziende/@userx87/endpointscopricoseperchdovrestiaverneuno-7z2drov4he</link><guid isPermaLink="true">http://direct.ecency.com/aziende/@userx87/endpointscopricoseperchdovrestiaverneuno-7z2drov4he</guid><category><![CDATA[aziende]]></category><dc:creator><![CDATA[userx87]]></dc:creator><pubDate>Thu, 22 Aug 2019 14:09:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/4PYjjVwJ1UdtwYR96L3HaJcmDM9yufUoq4eXzRr9mfoSveAV3Ur1gkU5tm9tuD3xAgWuhBA1ZSWgaGHU9CaKja784DfCtNjBqn1wWGtkvVL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Sophos: greater visibility with the Endpoint Detection and Response]]></title><description><![CDATA[Automation affects not only traditional industries, but also cybercrime. In this case, there is no mention of repercussions on the world of work, but the ability of crackers to automatically identify possible]]></description><link>http://direct.ecency.com/sophos/@tolae/sophos-greater-visibility-with-the-endpoint-detection-and-response-1560020728</link><guid isPermaLink="true">http://direct.ecency.com/sophos/@tolae/sophos-greater-visibility-with-the-endpoint-detection-and-response-1560020728</guid><category><![CDATA[sophos]]></category><dc:creator><![CDATA[tolae]]></dc:creator><pubDate>Sat, 08 Jun 2019 20:05:48 GMT</pubDate></item><item><title><![CDATA[Elephant API - an endpoint for lots of data on elephants]]></title><description><![CDATA[Elephant API an endpoint for lots of data on elephants Screenshots Hunter's comment putting together a wireframe design and need some data to fill out the user records? why not take a look at the elephant]]></description><link>http://direct.ecency.com/steemhunt/@teamhumble/elephant-api-an-endpoint-for-lots-of-data-on-elephants</link><guid isPermaLink="true">http://direct.ecency.com/steemhunt/@teamhumble/elephant-api-an-endpoint-for-lots-of-data-on-elephants</guid><category><![CDATA[steemhunt]]></category><dc:creator><![CDATA[teamhumble]]></dc:creator><pubDate>Mon, 03 Jun 2019 10:28:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/26uUsAjKTsXCQXme1bcTw2BcB8wEfASLRHYbWGzf9zSKSQEdxukYLMTWtN3yxJjZChW8VX3bT6ydwcmPuLEtrGzvBwij35C9vdyim1CWWRWcyKxdzhSc3oL7nX7ERnBW6AkWvxC53CzCPuupf2gJ3ayBvSUvKc64X1qr14?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Kaspersky Endpoint Security Cloud, the endpoint security solution for SMEs]]></title><description><![CDATA[The choice of the device protection solution is never trivial, especially with regard to SMEs, small and medium-sized companies, which do not have the typical budgets of giants available and therefore]]></description><link>http://direct.ecency.com/technology/@blto83/kaspersky-endpoint-security-cloud-the-endpoint-security-solution-for-smes-1554832808</link><guid isPermaLink="true">http://direct.ecency.com/technology/@blto83/kaspersky-endpoint-security-cloud-the-endpoint-security-solution-for-smes-1554832808</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[blto83]]></dc:creator><pubDate>Wed, 10 Apr 2019 16:00:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45dtBuE95sMMVpomjkapcCTmf3ZA4f2j8msVx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Introducing new History find_actions endpoint]]></title><description><![CDATA[[DISCONTINUED as of August 2019] We have received multiple requests to implement ability to do free text search in content/memo of actions across EOS History. We are pleased to announce that we have built,]]></description><link>http://direct.ecency.com/eos/@eostribe/introducing-new-history-findactions-endpoint</link><guid isPermaLink="true">http://direct.ecency.com/eos/@eostribe/introducing-new-history-findactions-endpoint</guid><category><![CDATA[eos]]></category><dc:creator><![CDATA[eostribe]]></dc:creator><pubDate>Wed, 30 Jan 2019 08:25:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/3DLAmCsuTe3bV13dhrdWmiiTzq9WMPZDTkYuSGyZVu3GHrUZpB4BL7dpCSfYsG8Zi7DTomT5cTCKLXV6nhauJppsg7WeuZVXTtCBEwzBGuxSQPGYMmJ9YyJcAE4CunKfGDMuJbmLkTo9GJGXZ3SLwoCc8mE6fMp?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Ride to dhanushkodi (Ghost town)]]></title><description><![CDATA[Ghost town ??? You guys must be wondering what is ghost town🤔 filled with ghosts 😂😂😂 no no yours guess is wrong.... A ghost town is an abandoned place usually one that contains substantial visible]]></description><link>http://direct.ecency.com/ghost-town/@heelsonwheels/ride-to-dhanushkodi-ghost-town</link><guid isPermaLink="true">http://direct.ecency.com/ghost-town/@heelsonwheels/ride-to-dhanushkodi-ghost-town</guid><category><![CDATA[ghost-town]]></category><dc:creator><![CDATA[heelsonwheels]]></dc:creator><pubDate>Fri, 15 Jun 2018 16:59:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45dtBdrbsAvovG6Xdjy5tN54yDnagqEV83PHp?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Learn and Share: SOPHOS UTM FIREWALL AND SECURITY]]></title><description><![CDATA[Sophos is one of the large distributor of network security and other security for end points. The are known to be the one of the best firewall of the quadrant. As per demonstration a while ago here in]]></description><link>http://direct.ecency.com/firewall/@jriel/learn-and-share-sophos-utm-firewall-and-security</link><guid isPermaLink="true">http://direct.ecency.com/firewall/@jriel/learn-and-share-sophos-utm-firewall-and-security</guid><category><![CDATA[firewall]]></category><dc:creator><![CDATA[jriel]]></dc:creator><pubDate>Fri, 18 May 2018 08:04:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/4i88GgaV8qiGEw1xifwYz2xp7RJEnNpBZq7dn2K5xwC3Yab1nm7fSvXd4mm44rjUg6M2SWBtFnPWQn8vi4D5XuMMa2YU4dUjD6sELPJnxHaKYpotsf2nWoL8te?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Global Endpoint Security Market Investigation & Development Trends Analyzed till 2026]]></title><description><![CDATA[Market Research Report Search Engine (MRRSE) has added a new research report in its repository on Endpoint Security. The report has been titled, “Global Endpoint Security Market - Industry Analysis, Size,]]></description><link>http://direct.ecency.com/technology/@sumaanraina/global-endpoint-security-market-investigation-and-development-trends-analyzed-till-2026</link><guid isPermaLink="true">http://direct.ecency.com/technology/@sumaanraina/global-endpoint-security-market-investigation-and-development-trends-analyzed-till-2026</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[sumaanraina]]></dc:creator><pubDate>Mon, 23 Apr 2018 12:23:39 GMT</pubDate></item><item><title><![CDATA[Endpoint Advanced Protection Buyer’s Guide: The Attacks]]></title><description><![CDATA[This is an adaptation for Steemit of Securosis. if you want to have it in HTML format you can see it here. Posted under: Research and Analysis As we previewed in the Introduction to our Endpoint Advanced]]></description><link>http://direct.ecency.com/security/@securitynews/endpoint-advanced-protection-buyer-s-guide-the-attacks</link><guid isPermaLink="true">http://direct.ecency.com/security/@securitynews/endpoint-advanced-protection-buyer-s-guide-the-attacks</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[securitynews]]></dc:creator><pubDate>Mon, 16 Apr 2018 18:09:45 GMT</pubDate></item><item><title><![CDATA[2018-2025 Audio Conferencing Endpoint Market and Industry Analysis Research Report]]></title><description><![CDATA[Summary: Mart Research Published “Global Audio Conferencing Endpoint Market” Research Report Which Provides Industry Share, Key Players, Regions and Revenue. Description: This report studies]]></description><link>http://direct.ecency.com/audio/@morrisbeck07/2018-2025-audio-conferencing-endpoint-market-and-industry-analysis-research-report</link><guid isPermaLink="true">http://direct.ecency.com/audio/@morrisbeck07/2018-2025-audio-conferencing-endpoint-market-and-industry-analysis-research-report</guid><category><![CDATA[audio]]></category><dc:creator><![CDATA[morrisbeck07]]></dc:creator><pubDate>Tue, 27 Mar 2018 10:58:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/EEEoA8oLaAxvDZG9qYrsSvDqYeABF1GqkXYm2Ven95Pay5Z1dcfdti2XHv6h4rWCRghKZRwJxnGBQeeasGSVrGG2aTR1BYwXhoLs3PqJxFWEWC9FqN7mnFPxrc68dsZLNJmTgqeubaty9oW8S2ufc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Global Audio Conferencing Endpoint Market Trends, Analysis, Top-players & Forecast by 2025]]></title><description><![CDATA[An up-to-date research report has been disclosed by Market Research Hub highlighting the title “2018-2025 Report on Global and United States Audio Conferencing Endpoint Market Status and Forecast, by Players,]]></description><link>http://direct.ecency.com/machinery/@vivek494/global-audio-conferencing-endpoint-market-trends-analysis-top-players-and-forecast-by-2025</link><guid isPermaLink="true">http://direct.ecency.com/machinery/@vivek494/global-audio-conferencing-endpoint-market-trends-analysis-top-players-and-forecast-by-2025</guid><category><![CDATA[machinery]]></category><dc:creator><![CDATA[vivek494]]></dc:creator><pubDate>Thu, 08 Mar 2018 12:23:42 GMT</pubDate></item><item><title><![CDATA[Endpoint Security Market Likely to Register Significant Growth in Terms of Revenue Over the Forecast Period, 2017 till 2026]]></title><description><![CDATA[The report provides a comprehensive overview of endpoint security market across the globe. The report also offers an overall outline of global market. Along with that, it also presents information]]></description><link>http://direct.ecency.com/endpoint/@vishantchauhan/endpoint-security-market-likely-to-register-significant-growth-in-terms-of-revenue-over-the-forecast-period-2017-till-2026</link><guid isPermaLink="true">http://direct.ecency.com/endpoint/@vishantchauhan/endpoint-security-market-likely-to-register-significant-growth-in-terms-of-revenue-over-the-forecast-period-2017-till-2026</guid><category><![CDATA[endpoint]]></category><dc:creator><![CDATA[vishantchauhan]]></dc:creator><pubDate>Thu, 01 Mar 2018 06:49:18 GMT</pubDate></item><item><title><![CDATA[웹기반 백엔드 레가시 구조개선에 대한 고민 및 접근 전략]]></title><description><![CDATA[기존에 사용하는 레가시를 개선하려는 이유는 다음과 같습니다. 1.새로운 기능을 빠르게 추가하기 위한 최신 오픈소스 라이브러리 활용이 어렵다. 2.보안에 취약하다. 그러기에 최신 오픈소스 라이브러리를 사용 할 수 있는 환경을 만들고 유지하는 것이 중요합니다. 때를 놓치면 기존 시스템에서 개선을 하는 것보다 아예 새로운 시스템에서 하는 것이 더 빠르고 안전할 수]]></description><link>http://direct.ecency.com/it/@darion/62qow2</link><guid isPermaLink="true">http://direct.ecency.com/it/@darion/62qow2</guid><category><![CDATA[it]]></category><dc:creator><![CDATA[darion]]></dc:creator><pubDate>Tue, 27 Feb 2018 09:30:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXYSLfzJMMxjgRvYdthM1rk7nkGJ4PG4b3xYyEVcdACxbLNGJLXC33UXnUnzrLCtmV7QfYyMarZU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Future of the Global Unified Endpoint Management Market – Growth, Latest Trend & Forecast 2025:Radiant Insights, Inc]]></title><description><![CDATA[This report studies the global Unified Endpoint Management market, analyzes and researches the Unified Endpoint Management development status and forecast in United States, EU, Japan, China, India and]]></description><link>http://direct.ecency.com/unified/@radiantinsightsf/future-of-the-global-unified-endpoint-management-market-growth-latest-trend-and-forecast-2025-radiant-insights-inc</link><guid isPermaLink="true">http://direct.ecency.com/unified/@radiantinsightsf/future-of-the-global-unified-endpoint-management-market-growth-latest-trend-and-forecast-2025-radiant-insights-inc</guid><category><![CDATA[unified]]></category><dc:creator><![CDATA[radiantinsightsf]]></dc:creator><pubDate>Mon, 05 Feb 2018 09:47:27 GMT</pubDate></item><item><title><![CDATA[IoT and BigData - The coming $2 Trillion Tsunami]]></title><description><![CDATA[ Your car is no longer just a transportation device. It is an internet endpoint. As is your toaster, your microwave and your refrigator. And don't even get me started on your television; it was already]]></description><link>http://direct.ecency.com/iot/@avarmaavarma/iot-and-bigdata-the-coming-usd2-trillion-tsunami</link><guid isPermaLink="true">http://direct.ecency.com/iot/@avarmaavarma/iot-and-bigdata-the-coming-usd2-trillion-tsunami</guid><category><![CDATA[iot]]></category><dc:creator><![CDATA[avarmaavarma]]></dc:creator><pubDate>Tue, 09 Jan 2018 22:34:15 GMT</pubDate></item><item><title><![CDATA[[Security News_2017-11-29] 엔드포인트 보안 ‘르네상스’ 시대 열리나]]></title><description><![CDATA[***   Security Hot Issue ***      정보보호 시장 동향          2018년 국가정보화예산 5조 2천억...정보보호 4,487억    보안뉴스 엔드포인트 보안 ‘르네상스’ 시대]]></description><link>http://direct.ecency.com/endpoint/@loveryu/security-news2017-11-29</link><guid isPermaLink="true">http://direct.ecency.com/endpoint/@loveryu/security-news2017-11-29</guid><category><![CDATA[endpoint]]></category><dc:creator><![CDATA[loveryu]]></dc:creator><pubDate>Wed, 29 Nov 2017 06:51:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/axopCyoueqbbFRpD5g6NZkao2NgvgJkxBA3FFtuWfG3wA8QW6rtjzkRqeHz8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Endpoint Security Market | Industry Size, Share and Forecast Upto 2023]]></title><description><![CDATA[The Endpoint Security Market Research Report provides Industry analysis and evaluation of the current & prospective Market Size, Share, Trend and Growth during the study period 2016-2023. The report]]></description><link>http://direct.ecency.com/endpoint/@market-report/endpoint-security-market-or-industry-size-share-and-forecast-upto-2023</link><guid isPermaLink="true">http://direct.ecency.com/endpoint/@market-report/endpoint-security-market-or-industry-size-share-and-forecast-upto-2023</guid><category><![CDATA[endpoint]]></category><dc:creator><![CDATA[market-report]]></dc:creator><pubDate>Tue, 28 Nov 2017 10:42:42 GMT</pubDate></item></channel></rss>