Hey guys, I'm searching for free sports data api or sports data widgets for a website that is gonna be starter level. I did my research and found some options but I need more alternatives. Some providers like Opta or Sportradar offers a lot as sports widgets but they give no clue about pricing options. I cant calculate a budget and they all look like they are designed for big companies. I've managed to find only one provider with clear prices and a free trial option; www.broadage.com They have lots of widgets like livescore or matchcenter, the widgets look fine …

Member Avatar
+0 forum 0

I was browsing across the internet when i saw a site that genereates a random yes no and i begin thinking what if someboday asks a question whcih results in somthing criminal, then **does the site have any resposibilities if there is no policy in place ?**

Member Avatar
Member Avatar
+0 forum 1

It has long since been argued that continued exposure to something over a length of time will reduce the shock value of whatever it happens to be, from violence in movies to swearing in public. Now according to a [URL="http://www.usatoday.com/news/health/2007-12-12-porn-study_N.htm"]report[/URL] researchers at the Brigham Young University have suggested that the availability of 'pocket porn' via the Internet and mobile phones has led to a sea change in how women react to pornography. The full study is to be published in the Journal of Adolescent Research in January, but enough detail has been leaked ahead of publication for us to know …

Member Avatar
Member Avatar
+0 forum 10

It's that time of the year again when the whole 'prediction' business machinery gets fired up. So I thought I would grab some of the ones from my inbox that are perhaps most applicable to the digital marketing sector. The following were inspired by some crystal ball gazing by the folk at the Talkwalker social analytics people, and caught my attention today. So, what does the gathered DaniWeb consciousness make of them? Accurate, likely or total nonsense? Here goes: 1. **Facebook will become a major competitor to YouTube** during 2018 in terms of 'social video' consumption. This on the back …

Member Avatar
Member Avatar
+3 forum 9

Are there any filters that help choose the social media topics that are gonna be shared more? I was thinking about joining a course like one of these http://sites.bu.edu/social-media-analysis/ and https://knightcenter.utexas.edu/blog/00-15988-social-media-analytics-journalists-register-now-online-course-and-learn-how-measure-yo , cause there are no clear cut rules for the viral content. The only info (the newest) is a scheme of social media engagement by Tiffany Usher shared on Buzzsumo and then on https://www.essaytoday.net/business-plan-writers/ social business section. Tiffany mentioned that only 6% of people actually read the whole text. And the title of the content gets to more than 92% of the audience (research dated 12.12.2017).

Member Avatar
Member Avatar
+0 forum 2

The second annual Imperva Hacker Intelligence Initiative report, this one entitled [Monitoring Hacker Forums](http://www.imperva.com/docs/HII_Monitoring_Hacker_Forums_2012.pdf), is out and reveals that the threat surfaces being discussed by the hacker community are very different from those that businesses are spending money on defending against attack. ![dweb-hackers](/attachments/small/0/dweb-hackers.jpg "align-right") The Imperva research analysed the content of a number of online hacker communities, including many lesser known forums in order to get a more accurate snapshot of what those doing the hacking are actually discussing. By looking at a total of more than 400,000 different conversational threads, Imperva was able to determine that SQL injection and …

Member Avatar
Member Avatar
+0 forum 2

So, the [VeraCode 2017 DevSecOps Global Skills Survey](https://info.veracode.com/analyst-report-devsecops-global-skill-survey.html) recently found that software developers are not receiving the training they need to be successful as DevOps. Some of the numbers that caught my attention included 70 percent stating they don't think the 'security education' they have got is adequate for the requirements of the position they currently hold, and 40 percent of hiring managers reporting that the hardest employees to find are the all-purpose DevOps gurus with security testing expertise. Aside from the obvious vested interests of the companies behind such surveys, what does the DaniWeb developer community make of this? …

Member Avatar
+0 forum 0

Generally speaking, when it comes to being as secure as possible (and, just as importantly, staying as secure as possible) newer is better. This is certainly the case if we are talking mobile operating systems such as Android and iOS. As of the start of March 2017, according to [Apple's own metrics]([https://developer.apple.com/support/app-store/) some 79% of Apple mobile devices are using the latest iOS 10. Pretty good rates of adoption considering this version of the OS is only six months old. Now compare that to [Google's official figures](https://developer.android.com/about/dashboards/index.html) which reveal that as of March 2017 just 0.3% of Android devices are …

Member Avatar
Member Avatar
+4 forum 2

i've just got python ver3 it keeps jumping outof script mode what am i doing wrong, is there a command to return it to script mode ?

Member Avatar
+0 forum 0

what is the highest paying jobs in Canada?

Member Avatar
Member Avatar
+0 forum 2

It's all too easy to think that spam is an old problem, and one that has largely been dealt with. Certainly, many people will tell you that they see very little evidence of spam in their mailboxes. This, however, has less to do with the demise of the spammer and everything to do with the effectiveness of spam filters. The latest Kaspersky Lab analysis of the spam and phishing threat landscape for the first quarter of 2015 suggests that some 59.2 per cent of email traffic was actually spam, which is good news in as far as that number is …

Member Avatar
Member Avatar
+3 forum 3

Hi guys, I need someone to help me solve this problem. The conditions in the statement are very strict: APPLES AND PEARS Tom has three boxes with fruits in his barn: one box with apples, one box with pears, and one box with both apples and pears. The boxes have labels that describe the contents, but none of these labels is on the right box. How can Tom, by taking only one piece of fruit from one box, determine what each of the boxes contains?

Member Avatar
Member Avatar
+0 forum 3

Hello guys, pls help me solve this: THE ROUND TABLE Helen and her husband invited their neighbors - two couples - for a dinner at their home. The six of them sat at a round table. Helen tells you the following: Victor sat on the left of the woman who sat on the left of the man who sat on the left of Anna. Esther sat on the left of the man who sat on the left of the woman who sat on the left of the man who sat on the left of the woman who sat on the …

Member Avatar
Member Avatar
+0 forum 2

The Electronic Frontier Foundation (EFF) has released the latest version of its 'Who Has Your Back?' [report](https://www.eff.org/who-has-your-back-government-data-requests-2015) and accompanying infographic, and it makes for interesting reading. Once you appreciate that what the EFF is talking about here is how good, measured as a response to a handful of yes or no questions, a bunch of leading tech companies are at protecting our data from government snooping requests. It's not about privacy in the larger scheme of things, just from that particular angle. That said, let's look at how the EFF came to the conclusions that can be seen in the …

Member Avatar
+1 forum 0

One of the great things about social media is the way that it utilises the wisdom of crowds. This concept is perhaps best known through Wikipedia, where user editing can often create some wildly inaccurate entries in the short term but over time these get corrected by the larger volume of editors who truly care about the product they are using. Somewhere else that the wisdom of crowds has made an impact is the consumer review market. Most of my family, friends and work colleagues pretty much turn to the Internet for a quick and unbiased opinion before splashing the …

Member Avatar
Member Avatar
+1 forum 4

According to the latest [Verizon 2015 Data Breach Investigations Report](http://www.verizonenterprise.com/DBIR/) all but four per cent of the security incidents analyzed by researchers could be accounted for by just nine basic attack types. That's pretty useful information for enterprise looking to prioritize their approach to security in terms of establishing a stronger security posture. So, as far as the nearly 80,000 incidents that were analyzed to form the basis of the report, what were these nine basic patterns then? Verizon states that the nine threat patterns are: 1. Miscellaneous errors (such as sending an email to the wrong person for example) …

Member Avatar
+1 forum 0

It's that time of year again, and the latest [Secunia Vulnerability Review](http://secunia.com/vr2015/) has been published. This analysed anonymous data gathered from scans right across 2014 of millions of computers which have Secunia Personal Software Inspector (PSI) installed and revealed some interesting statistics. On average, the computers used by the people running PSI had 76 programs installed on them and these vary from country to country. Secunia focussed its attention on what it calls "a representative portfolio of the 50 most common applications" which compromised 34 Microsoft and 16 non-Microsoft ones. So what did the analysis discover? You might be surprised …

Member Avatar
+1 forum 0

You may be wondering what a superfecta actually is, and the answer is: the most dangerous and serious threat to business. To clarify, the superfecta as defined by secure cloud hosting outfit FireHost is a group of four attack vectors that comprises of Cross-Site Request Forgery (CSRF), Cross-Site Scripting (XSS), SQL Injection and Directory Traversal. Cross-Site Request Forgery (CSRF) is an attack mode that forces the end user to execute an unwanted action on a web application in which they are currently authenticated. Cross-Site Scripting (XSS) involves the insertion of malicious code into webpages in order to manipulate website visitors. …

Member Avatar
Member Avatar
+3 forum 5

According to research commissioned by security vendor [Bit9 + Carbon Black](https://www.bit9.com/solutions/carbon-black/), nearly half (49%) of the organisations questioned admitted they simply didn't know if their businesses had been compromised or not. This uncertainty regarding cyber-attack detection ability comes in stark contrast to the 32% who confirmed they had been attacked during the previous 12 months and the 64% expecting to be targeted in the next 12 months. Looking a little closer at the data, when it comes to who might be attacking them, hacktivists on 86% bizarrely came top of the list ahead of cyber-criminals with 77% and disgruntled employees …

Member Avatar
Member Avatar
+2 forum 29

Research results just published by digital marketing agency Visibility IQ would appear to confirm what the savvy marketeer already knows: social video is an important driver for engagement and purchase behaviour amongst online consumers. ![youtube](/attachments/small/0/youtube.jpg "align-right") The research, conducted by Entertainment Media Research Ltd, was based upon interviews with more than 2,600 consumers between the ages of 15 and 64. Although the research was conducted within the UK, the results are likely to be mirrored in any markets where broadband provision is good and Internet access widespread. The key findings of the research are as follows: 78% of UK adults …

Member Avatar
Member Avatar
+6 forum 23

There's a truism that I like to share with as many people as possible: if you don't want other people to see something, then don't post it online. It is, you might think, a pretty simple concept to grasp. After all, you wouldn't stroll into a bar with a megaphone and yell "I'm not wearing underwear" if you wanted to keep that secret would you? But would you write that fact down on small pieces of paper and slip them unnoticed into the pockets of people in that bar if you wanted to reveal all (please excuse the unfortunate choice …

Member Avatar
Member Avatar
+2 forum 6

Some interesting [research](http://www.proofpoint.com/threatinsight/posts/phishing-in-europe.php) from security outfit Proofpoint was published this morning which reveals that unsolicited email heading towards users in the UK is three times more likely to contain malicious URLs than that destined for users in the United States, or Germany, or France for that matter. It's not, as you may think at first glance, just a matter of the UK getting more spam. The research conducted over the summer, using the US as a baseline, shows Germany getting more spam as a percentage than the UK, US and France. The prevalence of spam and malicious URLs in the …

Member Avatar
+1 forum 0

According to newly published research from cloud-based social Wi-Fi software outfit [Purple WiFi](http://www.purplewifi.net/), of 2,540 consumer questioned vastly more were concerned about getting access to pornography than were worried about matters of data security. The 'Using Wi-Fi in Public Places’ study revealed that 28 percent of those asked (711 people) don't use public Wi-Fi, and of that number 27 percent (192 people) didn't do so due to fears about security. Compare and contrast to the 56 percent (1422 people) who were so concerned about being able to access pornography via free Wi-Fi that they thought content filtering should be a …

Member Avatar
Member Avatar
+2 forum 7

Bugs are, and always have been, a fact of life for the software developer. However, if Microsoft researcher Andrew Begel has his way, they could be a thing of the past. Last month a paper entitled '[Using Psycho-Physiological Measures to Assess Task Difficulty in Software Development](http://research.microsoft.com/apps/pubs/default.aspx?id=209878)' was published which Begel co-authored. This week, Begel spoke at the annual Microsoft Research Faculty Summit on the subject. Basically what Begel and his research colleagues are saying is that the existing work looking at dealing with programming errors tends to focus on the "post hoc identification of correlations between bug fixes and code" …

Member Avatar
Member Avatar
+1 forum 1

The average car is increasingly becoming a vehicle for the Internet; but does this also make it a vehicle for cybercrime? Security vendor Kaspersky Lab, in cahoots with Spanish digital media outfit IAB, reckons that software updates, in-car mobile apps and privacy are all areas which have ripe potential for the car crook to launch an attack. Announcing the first 'Annual Connected Cars Study' which aims to provide an overview of the Internet car market, Kaspersky Lab and IAB hope that some unity can be provided to the pretty fragmented software ecosystem offered by car manufacturers currently. In developing a …

Member Avatar
+2 forum 0

If a week is a long time in politics, then 24 hours is an absolute age in ecommerce security terms. Which make the findings of a Tripwire survey, published today, all the more worrying. The survey, conducted by Atomic Research, questioned 102 financial organizations and 151 retail organizations which process card payments in the United Kingdom. It has concluded that 35% of organisations takes two or three days to detect a breach, with 44% admitting they could protect customer data better. This gets more worrying when you realise that 24% had already been victims of a data breach which saw …

Member Avatar
+0 forum 0

Hey guys could you help me out regarding how to use the Google disavow tool and its functionalities, uses.

Member Avatar
Member Avatar
+0 forum 7

Today is another of those 'Hallmark' IT security days; in the case of Tuesday the 11th of February 2014 that means 'Safer Internet Day'. I'm not going to start yet another rant about the pointlessness of this, and why every day should be Safer Internet Day. If you want to know my feelings, go and take a look at what I said in my article '[Data Privacy Day sucks elephants through a straw, and here's why...](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/472024/data-privacy-day-sucks-elephants-through-a-straw-and-heres-why)' a couple of weeks ago. Instead, I'm going to concentrate on just what those of us who are in the business of trying to …

Member Avatar
Member Avatar
+0 forum 2

As a gamer myself, I thought that last year was a pretty good one. After all, not only did I get to play both GTA V and Call of Duty: Ghosts (indeed, I'm still playing it and working my may through the prestige levels) but if I had enough spare cash and will I could have bought an Xbox One or PlayStation 4. As it happens, I did buy a Lenovo IdeaPad Y510P which can manage a pretty respectable average of 40fps in Crysis on the high quality settings at native resolution. However, according to research figures from Kaspersky Lab, …

Member Avatar
Member Avatar
+0 forum 2

If you have never stopped to think about language in terms of Search Engine Optimisation (SEO) then the results of a survey by digital marketing agency Greenlight might make you do just that. According to the global Search and Social Survey, some 76% of people do their online searching in at least two different languages. This should come as no real surprise when you consider how many countries have more than one official language, and explains why Belgium with three official languages was towards the top of the survey for countries topping the multilingual searching stats. However, this explanation does …

Member Avatar
Member Avatar
+0 forum 13

The End.