
<rss version="2.0" xmlns:content="https://purl.org/rss/1.0/modules/content/" xmlns:atom="https://www.w3.org/2005/Atom">
    <channel>
        <title>RSS Feed</title>
        <description></description>
        <pubDate>Thu, 20 Oct 2022 15:09:26 &#x2B;0000</pubDate>
        <lastBuildDate>Fri, 24 Apr 2026 00:00:00 &#x2B;0000</lastBuildDate>
        <link>/</link>
        <atom:link href="/rss-feed/" type="application/rss+xml" rel="self" />
                <item>
                    <title>Digitally Supported Student Teaching Practice - Key Reflective and Educational Aspects</title>
                        <description><![CDATA[This article explores the reflective and educational aspects of digitally supported student pedagogical practice in the broader context of preparing future teachers in technology and entrepreneurship. It analyzes the role of pedagogical practice as a key component of professional training and highlights the significance of reflection for the development of pedagogical competence in a digitally transformed educational environment. The article presents a model based on an online platform that i...]]></description>
                            <pubDate>
                                Fri, 24 Apr 2026 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/digitally-supported-student-teaching-practice-key-reflective-and-educational-aspects/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/digitally-supported-student-teaching-practice-key-reflective-and-educational-aspects/</guid>
                </item>
                <item>
                    <title>DIGITAL TRANSFORMATION OF PEDAGOGICAL PRACTICE THROUGH A WEB PLATFORM FOR MANAGEMENT OF THE EDUCATIONAL PROCESS</title>
                        <description><![CDATA[This report analyzesthe  digital transformation in pedagogical  practice througha custom-developed  web platform that facilitatesinteraction between the student, primaryteacher,and academic  mentor. The study explores the  theoretical  foundations  of  digitalization  in  education,  the significanceof  digital  competences,and  European policies shapingthe preparation of future teachers.]]></description>
                            <pubDate>
                                Sun, 14 Dec 2025 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/digital-transformation-of-pedagogical-practice-through-a-web-platform-for-management-of-the-educational-process/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/digital-transformation-of-pedagogical-practice-through-a-web-platform-for-management-of-the-educational-process/</guid>
                </item>
                <item>
                    <title>How much does Umbraco Cost?</title>
                        <description><![CDATA[Umbraco CMS is open-source, free to download, and use for any web application. There are also many hundreds of add-on packages that have been written by the community for extending the functionality of Umbraco.]]></description>
                            <pubDate>
                                Fri, 13 Jan 2023 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/perspectives-blogs/how-much-does-umbraco-cost/
                    </link>
                    <guid>https://www.liluzenet.com/insights/perspectives-blogs/how-much-does-umbraco-cost/</guid>
                </item>
                <item>
                    <title>What is Umbraco CMS?</title>
                        <description><![CDATA[Umbraco is an open-source CMS providing a flexible web development]]></description>
                            <pubDate>
                                Fri, 13 Jan 2023 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/perspectives-blogs/what-is-umbraco-cms/
                    </link>
                    <guid>https://www.liluzenet.com/insights/perspectives-blogs/what-is-umbraco-cms/</guid>
                </item>
                <item>
                    <title>Security analysis on content management systems</title>
                        <description><![CDATA[This paper is dedicated to the challenges of the use of the most popular content management systems (CMS) in software development. Fundamental information about the selected CMS platforms and vulnerability analysis are introduced. The review is made on CMS like Umbraco, Sitecore, WordPress and Drupal categorized into two groups defined by the technology used for development. And as the IT world changes a lot this brings one constant battle against threats. Therefore, this article will add som...]]></description>
                            <pubDate>
                                Wed, 05 Oct 2022 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/security-analysis-on-content-management-systems/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/security-analysis-on-content-management-systems/</guid>
                            <thumbnail url="/media/nz1b1abj/cmsmarket.jpeg" length="304531" type="image/jpeg" />
                </item>
                <item>
                    <title>Security analysis on browsers</title>
                        <description><![CDATA[The article is going to make a security analysis on the most used application interface that provides access to the cyber space: browsers. Browsers have grown in breadth and depth creating a complex architecture with many components which at some point as every software development comes up with errors. Those flaws allow the attackers to overcome all kind of security policies harming different endpoints: from hardware to software, into data. And in every case the losses of the end user are ve...]]></description>
                            <pubDate>
                                Fri, 31 Dec 2021 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/security-analysis-on-browsers/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/security-analysis-on-browsers/</guid>
                </item>
                <item>
                    <title>Cybersecurity trends</title>
                        <description><![CDATA[With the evolution of the digital world and the constant interaction in the real time world, even the casual user must be constantly aware of all possible threats and all possible protection actions or at least follow the trends. The vulnerabilities&#x2019; definitions depend on their attacking area but with the huge space of data we never know what exactly is happening and to what is the harmed area. This article is going to provide a basic definition on the term cybersecurity and some of the most...]]></description>
                            <pubDate>
                                Fri, 31 Dec 2021 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/cybersecurity-trends/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/cybersecurity-trends/</guid>
                </item>
                <item>
                    <title>Vulnerabilities Space and the Superiority of Hackers</title>
                        <description><![CDATA[This work affirms the idea of comprehensive control over vulnerabilities in ICT systems. A new category related to the cardinality of vulnerabilities space is introduced and justified, referring to the comprehensive consideration of all vulnerabilities in the security of an ICT system. A new model demonstrating the reasons for the superiority of hackers against cyber defenders is presented. It is based on the new proposed category vulnerabilities space. The model reveals the reason for the su...]]></description>
                            <pubDate>
                                Thu, 30 Sep 2021 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/vulnerabilities-space-and-the-superiority-of-hackers/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/vulnerabilities-space-and-the-superiority-of-hackers/</guid>
                </item>
                <item>
                    <title>The relation of 3D technologies with virtual tourism education</title>
                            <pubDate>
                                Mon, 05 Jul 2021 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/the-relation-of-3d-technologies-with-virtual-tourism-education/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/the-relation-of-3d-technologies-with-virtual-tourism-education/</guid>
                </item>
                <item>
                    <title>Technological solutions to support e-learning through interactive presentation systems and a Google cloud platform.</title>
                            <pubDate>
                                Sun, 01 Nov 2020 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/technological-solutions-to-support-e-learning-through-interactive-presentation-systems-and-a-google-cloud-platform/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/technological-solutions-to-support-e-learning-through-interactive-presentation-systems-and-a-google-cloud-platform/</guid>
                </item>
                <item>
                    <title>An analysis of the new challenges facing cyber security expertise</title>
                        <description><![CDATA[The article provides an analysis of the challenges facing cyber-security expertise. The research is characterized by an integrated approach to the interdisciplinary nature of the problem. The reason for this approach is the need for the involvement of institutions that create new laws affecting the content of educational curriculum. Only an institutional approach is able to provide the basis for an adequate response to the cyber-security picture that is suffering from a growing shortage of cy...]]></description>
                            <pubDate>
                                Fri, 31 Jul 2020 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/an-analysis-of-the-new-challenges-facing-cyber-security-expertise/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/an-analysis-of-the-new-challenges-facing-cyber-security-expertise/</guid>
                </item>
                <item>
                    <title>CMS security tips and tricks</title>
                        <description><![CDATA[Content management systems become more popular and due to the speed provided during the development the number of websites developed with a CMS growns extremely. This is the reason the sites developed with a CMS become a more attractive target for cybercriminals. The CMSes are divided in 2 categories: free open-source and paid. According to that categorization the security level of the system is limitless. As part of my research, we are investigating only the free tools supporting the applica...]]></description>
                            <pubDate>
                                Fri, 31 Jan 2020 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/cms-security-tips-and-tricks/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/cms-security-tips-and-tricks/</guid>
                </item>
                <item>
                    <title>Security&#x2019;s leaks in SEO spamming</title>
                        <description><![CDATA[The full lack of security provides a huge omission in the application or software development life cycle. An example of security flaw is an ineffective search engine optimization (SEO). That can lead to various troubles in an already well developed or during development Internet sites. There has been a rise in SEO spam and malware which purpose is to destroy the application search indexes by adding content, which does not correspond to the idea of the application. Unusual links, pages or comm...]]></description>
                            <pubDate>
                                Tue, 31 Dec 2019 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/security-s-leaks-in-seo-spamming/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/security-s-leaks-in-seo-spamming/</guid>
                </item>
                <item>
                    <title>Code contracts VS Input validation</title>
                        <description><![CDATA[The unstoppable growth of security flaws makes the developers more patient in integrating different security defenses in the application development! Most of the security breaches are due to uninformed or unqualified developers! The good part is that Internet provides a&#xA0; large amount of rules/documentations/guidelines/tools free for use to help the developers in their work! But as the coin has two sides each web application needs to provide two parts of security flaws protection. The first le...]]></description>
                            <pubDate>
                                Tue, 31 Dec 2019 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/code-contracts-vs-input-validation/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/code-contracts-vs-input-validation/</guid>
                </item>
                <item>
                    <title>HTTP security headers</title>
                        <description><![CDATA[In this article, we explain the necessity of HTTP Security Headers and how they can help in preventing a cyber invasion in our web application! We will give details on the most important HTTP headers and will retrieve a basic information for some with a lower need. We will give examples for their implementation in one ASP.NET web application to provide more descriptive perspective of their use!]]></description>
                            <pubDate>
                                Sun, 31 Mar 2019 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/http-security-headers/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/http-security-headers/</guid>
                </item>
                <item>
                    <title>Types of dark data and hidden cybersecurity risks</title>
                        <description><![CDATA[Dark data as a term is used especially to denote operational data that is left unanalyzed. Growing accumulation of structured, unstructured and semi-structured data in organizations leads to difficulties with data life cycle management. With the adoption of big data applications such data is seen as an economic opportunity for companies. The unpleasant consequence of this process is the lack of control over the data, which leads to risks. The article coined the terms explicit and hidden dark...]]></description>
                            <pubDate>
                                Thu, 01 Nov 2018 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/types-of-dark-data-and-hidden-cybersecurity-risks/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/types-of-dark-data-and-hidden-cybersecurity-risks/</guid>
                </item>
                <item>
                    <title>SECURITY STANDARDS in software development</title>
                        <description><![CDATA[That article can be useful for every team member included in the software development process. It can help all members interested in improving the security quality of the software product during its entire developing by using some security standards and structured in a specific methodology.]]></description>
                            <pubDate>
                                Thu, 01 Nov 2018 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/security-standards-in-software-development/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/security-standards-in-software-development/</guid>
                </item>
                <item>
                    <title>Didactical model for augmented reality adaptation in educational environment of the digital generation</title>
                            <pubDate>
                                Sat, 25 Aug 2018 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/didactical-model-for-augmented-reality-adaptation-in-educational-environment-of-the-digital-generation/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/didactical-model-for-augmented-reality-adaptation-in-educational-environment-of-the-digital-generation/</guid>
                </item>
                <item>
                    <title>Study of attitudes about the application of &quot;Augmented Reality&quot; technology in education.</title>
                            <pubDate>
                                Wed, 01 Nov 2017 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/study-of-attitudes-about-the-application-of-augmented-reality-technology-in-education/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/study-of-attitudes-about-the-application-of-augmented-reality-technology-in-education/</guid>
                </item>
                <item>
                    <title>Augmented reality and motivation for student learning</title>
                            <pubDate>
                                Wed, 01 Nov 2017 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/augmented-reality-and-motivation-for-student-learning/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/augmented-reality-and-motivation-for-student-learning/</guid>
                </item>
                <item>
                    <title>Analysis of the importance of the concepts of 3D modelling and the possibility of integrating them into technological training.</title>
                            <pubDate>
                                Wed, 01 Nov 2017 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/analysis-of-the-importance-of-the-concepts-of-3d-modelling-and-the-possibility-of-integrating-them-into-technological-training/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/analysis-of-the-importance-of-the-concepts-of-3d-modelling-and-the-possibility-of-integrating-them-into-technological-training/</guid>
                </item>
                <item>
                    <title>Innovative technologies in educating students as a motivational mechanism</title>
                            <pubDate>
                                Wed, 01 Nov 2017 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/innovative-technologies-in-educating-students-as-a-motivational-mechanism/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/innovative-technologies-in-educating-students-as-a-motivational-mechanism/</guid>
                </item>
                <item>
                    <title>Expanding the educational reality of 3D modelling in QR technological training (rapid response)</title>
                            <pubDate>
                                Tue, 01 Nov 2016 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/expanding-the-educational-reality-of-3d-modelling-in-qr-technological-training-rapid-response/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/expanding-the-educational-reality-of-3d-modelling-in-qr-technological-training-rapid-response/</guid>
                </item>
                <item>
                    <title>Visualization of biological macromolecules</title>
                            <pubDate>
                                Tue, 01 Nov 2016 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/visualization-of-biological-macromolecules/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/visualization-of-biological-macromolecules/</guid>
                </item>
                <item>
                    <title>Exploring teachers&#x27; attitudes to 3D modelling and augmenting reality in the learning process</title>
                            <pubDate>
                                Tue, 01 Nov 2016 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/exploring-teachers-attitudes-to-3d-modelling-and-augmenting-reality-in-the-learning-process/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/exploring-teachers-attitudes-to-3d-modelling-and-augmenting-reality-in-the-learning-process/</guid>
                </item>
                <item>
                    <title>Conditions and factors for integrating technological training to expand educational reality</title>
                            <pubDate>
                                Sun, 01 Nov 2015 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/conditions-and-factors-for-integrating-technological-training-to-expand-educational-reality/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/conditions-and-factors-for-integrating-technological-training-to-expand-educational-reality/</guid>
                </item>
                <item>
                    <title>Virtual communities for team training</title>
                            <pubDate>
                                Sat, 01 Nov 2014 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/virtual-communities-for-team-training/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/virtual-communities-for-team-training/</guid>
                </item>
                <item>
                    <title>Augmented reality, a platform for interaction between real and virtual in technological learning</title>
                            <pubDate>
                                Sat, 01 Nov 2014 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/augmented-reality-a-platform-for-interaction-between-real-and-virtual-in-technological-learning/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/augmented-reality-a-platform-for-interaction-between-real-and-virtual-in-technological-learning/</guid>
                </item>
                <item>
                    <title>Corporate training a new didactic model in IT training</title>
                            <pubDate>
                                Tue, 01 Nov 2011 00:00:00 &#x2B;0000
                            </pubDate>
                    <link>
                    https://www.liluzenet.com/insights/publications/corporate-training-a-new-didactic-model-in-it-training/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/corporate-training-a-new-didactic-model-in-it-training/</guid>
                </item>
                <item>
                    <title>Lilyana Petkova</title>
                    <link>
                    https://www.liluzenet.com/people/lilyana-petkova/
                    </link>
                    <guid>https://www.liluzenet.com/people/lilyana-petkova/</guid>
                            <thumbnail url="/media/xztg5y3a/lp.jpeg" length="199483" type="image/jpeg" />
                </item>
                <item>
                    <title>Vasilisa Pavlova</title>
                    <link>
                    https://www.liluzenet.com/en/people/vasilisa-pavlova/
                    </link>
                    <guid>https://www.liluzenet.com/en/people/vasilisa-pavlova/</guid>
                            <thumbnail url="/media/s3qhiydk/0-02-05-4ffda4edfe77816d7b8713f0ad1f4229d430f677bcfe9e27bbc9b6f32c9d16dc_7380d2e742d0a4a2-2.jpeg" length="78259" type="image/jpeg" />
                </item>
                <item>
                    <title>uSync</title>
                        <description><![CDATA[uSync presentation from LiLuzeNet]]></description>
                    <link>
                    https://www.liluzenet.com/insights/perspectives-blogs/usync/
                    </link>
                    <guid>https://www.liluzenet.com/insights/perspectives-blogs/usync/</guid>
                </item>
                <item>
                    <title>How to resize PowerPoint presentation?</title>
                    <link>
                    https://www.liluzenet.com/insights/perspectives-blogs/how-to-resize-powerpoint-presentation/
                    </link>
                    <guid>https://www.liluzenet.com/insights/perspectives-blogs/how-to-resize-powerpoint-presentation/</guid>
                </item>
                <item>
                    <title>Export/Import data between databases</title>
                    <link>
                    https://www.liluzenet.com/insights/perspectives-blogs/exportimport-data-between-databases/
                    </link>
                    <guid>https://www.liluzenet.com/insights/perspectives-blogs/exportimport-data-between-databases/</guid>
                </item>
                <item>
                    <title>Content Security Policy validation</title>
                        <description><![CDATA[Due to the unstoppable growth of security flaws, the developers need to pay attention and be patient in the integration of security defense in the application development! In most of the cases, they are either uninformed or unqualified of implementing it, which cause some huge breaks in the application! There are many documentations/guidelines/tools free for use to help the developers in their work! For the last few years, browsers have integrated certain security header controls to support t...]]></description>
                    <link>
                    https://www.liluzenet.com/insights/publications/content-security-policy-validation/
                    </link>
                    <guid>https://www.liluzenet.com/insights/publications/content-security-policy-validation/</guid>
                </item>
    </channel>
</rss>
