If we were that metaphorical fly on the wall, following an all too common Slack conversation between a software engineer and DevOps engineers, it might go something like this:

Software Engineer: This is gonna take forever. “I need a new environment for my app.”

Source de l’article sur DZONE

Original release date: November 16, 2022

Summary

From mid-June through mid-July 2022, CISA conducted an incident response engagement at a Federal Civilian Executive Branch (FCEB) organization where CISA observed suspected advanced persistent threat (APT) activity. In the course of incident response activities, CISA determined that cyber threat actors exploited the Log4Shell vulnerability in an unpatched VMware Horizon server, installed XMRig crypto mining software, moved laterally to the domain controller (DC), compromised credentials, and then implanted Ngrok reverse proxies on several hosts to maintain persistence. CISA and the Federal Bureau of Investigation (FBI) assess that the FCEB network was compromised by Iranian government-sponsored APT actors.

CISA and FBI are releasing this Cybersecurity Advisory (CSA) providing the suspected Iranian government-sponsored actors’ tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help network defenders detect and protect against related compromises.

CISA and FBI encourage all organizations with affected VMware systems that did not immediately apply available patches or workarounds to assume compromise and initiate threat hunting activities. If suspected initial access or compromise is detected based on IOCs or TTPs described in this CSA, CISA and FBI encourage organizations to assume lateral movement by threat actors, investigate connected systems (including the DC), and audit privileged accounts. All organizations, regardless of identified evidence of compromise, should apply the recommendations in the Mitigations section of this CSA to protect against similar malicious cyber activity.

For more information on Iranian government-sponsored Iranian malicious cyber activity, see CISA’s Iran Cyber Threat Overview and Advisories webpage and FBI’s Iran Threats webpage.

Download the PDF version of this report: pdf, 528 kb.

For a downloadable copy of the Malware Analysis Report (MAR) accompanying this report, see: MAR 10387061-1.v1.

For a downloadable copy of IOCs, see: AA22-320A.stix, 1.55 mb.

Technical Details

Note: This advisory uses the MITRE ATT&CK for Enterprise framework, version 11. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK® tactics and techniques with corresponding mitigation and/or detection recommendations.

Overview

In April 2022, CISA conducted retrospective analysis using EINSTEIN—an FCEB-wide intrusion detection system (IDS) operated and monitored by CISA—and identified suspected APT activity on an FCEB organization’s network. CISA observed bi-directional traffic between the network and a known malicious IP address associated with exploitation of the Log4Shell vulnerability (CVE-2021-44228) in VMware Horizon servers. In coordination with the FCEB organization, CISA initiated threat hunting incident response activities; however, prior to deploying an incident response team, CISA observed additional suspected APT activity. Specifically, CISA observed HTTPS activity from IP address 51.89.181[.]64 to the organization’s VMware server. Based on trusted third-party reporting, 51.89.181[.]64 is a Lightweight Directory Access Protocol (LDAP) server associated with threat actors exploiting Log4Shell. Following HTTPS activity, CISA observed a suspected LDAP callback on port 443 to this IP address. CISA also observed a DNS query for us‐nation‐ny[.]cf that resolved back to 51.89.181[.]64 when the victim server was returning this Log4Shell LDAP callback to the actors’ server.

CISA assessed that this traffic indicated a confirmed compromise based on the successful callback to the indicator and informed the organization of these findings; the organization investigated the activity and found signs of compromise. As trusted-third party reporting associated Log4Shell activity from 51.89.181[.]64 with lateral movement and targeting of DCs, CISA suspected the threat actors had moved laterally and compromised the organization’s DC.

From mid-June through mid-July 2022, CISA conducted an onsite incident response engagement and determined that the organization was compromised as early as February 2022, by likely Iranian government-sponsored APT actors who installed XMRig crypto mining software. The threat actors also moved laterally to the domain controller, compromised credentials, and implanted Ngrok reverse proxies.

Threat Actor Activity

In February 2022, the threat actors exploited Log4Shell [T1190] for initial access [TA0001] to the organization’s unpatched VMware Horizon server. As part of their initial exploitation, CISA observed a connection to known malicious IP address 182.54.217[.]2 lasting 17.6 seconds.

The actors’ exploit payload ran the following PowerShell command [T1059.001] that added an exclusion tool to Windows Defender [T1562.001]:

powershell try{Add-MpPreference -ExclusionPath ‘C:’; Write-Host ‘added-exclusion’} catch {Write-Host ‘adding-exclusion-failed’ }; powershell -enc « $BASE64 encoded payload to download next stage and execute it »

The exclusion tool allowlisted the entire c:drive, enabling threat actors to download tools to the c:drive without virus scans. The exploit payload then downloaded mdeploy.text from 182.54.217[.]2/mdepoy.txt to C:userspublicmde.ps1 [T1105]. When executed, mde.ps1 downloaded file.zip from 182.54.217[.]2 and removed mde.ps1 from the disk [T1070.004].

file.zip contained XMRig cryptocurrency mining software and associated configuration files.

  • WinRing0x64.sys – XMRig Miner driver
  • wuacltservice.exe – XMRig Miner
  • config.json – XMRig miner configuration
  • RuntimeBroker.exe – Associated file. This file can create a local user account [T1136.001] and tests for internet connectivity by pinging 8.8.8.8 [T1016.001]. The exploit payload created a Scheduled Task [T1053.005] that executed RuntimeBroker.exe daily as SYSTEM. Note: By exploiting Log4Shell, the actors gained access to a VMware service account with administrator and system level access. The Scheduled Task was named RuntimeBrokerService.exe to masquerade as a legitimate Windows task.

See MAR 10387061-1.v1 for additional information, including IOCs, on these four files.

After obtaining initial access and installing XMRig on the VMWare Horizon server, the actors used RDP [T1021.001] and the built-in Windows user account DefaultAccount [T1078.001] to move laterally [TA0008] to a VMware VDI-KMS host. Once the threat actor established themselves on the VDI-KMS host, CISA observed the actors download around 30 megabytes of files from transfer[.]sh server associated with 144.76.136[.]153. The actors downloaded the following tools:

  • PsExec – a Microsoft signed tool for system administrators.
  • Mimikatz – a credential theft tool.
  • Ngrok – a reverse proxy tool for proxying an internal service out onto an Ngrok domain, which the user can then access at a randomly generated subdomain at *.ngrok[.]io. CISA has observed this tool in use by some commercial products for benign purposes; however, this process bypasses typical firewall controls and may be a potentially unwanted application in production environments. Ngrok is known to be used for malicious purposes.[1]

The threat actors then executed Mimikatz on VDI-KMS to harvest credentials and created a rogue domain administrator account [T1136.002]. Using the newly created account, the actors leveraged RDP to propagate to several hosts within the network. Upon logging into each host, the actors manually disabled Windows Defender via the Graphical User Interface (GUI) and implanted Ngrok executables and configuration files. The threat actors were able to implant Ngrok on multiple hosts to ensure Ngrok’s persistence should they lose access to a machine during a routine reboot. The actors were able to proxy [T1090] RDP sessions, which were only observable on the local network as outgoing HTTPS port 443 connections to tunnel.us.ngrok[.]com and korgn.su.lennut[.]com (the prior domain in reverse). It is possible, but was not observed, that the threat actors configured a custom domain, or used other Ngrok tunnel domains, wildcarded here as *.ngrok[.]com, *.ngrok[.]io, ngrok.*.tunnel[.]com, or korgn.*.lennut[.]com.

Once the threat actors established a deep foothold in the network and moved laterally to the domain controller, they executed the following PowerShell command on the Active Directory to obtain a list of all machines attached to the domain [T1018]:

Powershell.exe get-adcomputer -filter * -properties * | select name,operatingsystem,ipv4address >

The threat actors also changed the password for the local administrator account [T1098] on several hosts as a backup should the rogue domain administrator account get detected and terminated. Additionally, the threat actor was observed attempting to dump the Local Security Authority Subsystem Service (LSASS) process [T1003.001] with task manager but this was stopped by additional anti-virus the FCEB organization had installed.

MITRE ATT&CK TACTICS AND TECHNIQUES

See table 1 for all referenced threat actor tactics and techniques in this advisory, as well as corresponding detection and/or mitigation recommendations. For additional mitigations, see the Mitigations section.

Table 1: Cyber Threat Actors ATT&CK Techniques for Enterprise

Initial Access

Technique Title

ID

Use

Recommendations

Exploit Public-Facing Application

T1190

The actors exploited Log4Shell for initial access to the organization’s VMware Horizon server.

Mitigation/Detection: Use a firewall or web-application firewall and enable logging to prevent and detect potential Log4Shell exploitation attempts [M1050].

Mitigation: Perform regular vulnerability scanning to detect Log4J vulnerabilities and update Log4J software using vendor provided patches [M1016],[M1051].

Execution

Technique Title

ID

Use

Recommendation

Command and Scripting Interpreter: PowerShell

T1059.001

The actors ran PowerShell commands that added an exclusion tool to Windows Defender.

The actors executed PowerShell on the AD to obtain a list of machines on the domain.

Mitigation: Disable or remove PowerShell for non-administrative users [M1042],[M1026] or enable code-signing to execute only signed scripts [M1045].

Mitigation: Employ anti-malware to automatically detect and quarantine malicious scripts [M1049].

Persistence

Technique Title

ID

Use

Recommendations

Account Manipulation

T1098

The actors changed the password for the local administrator account on several hosts.

Mitigation: Use multifactor authentication for user and privileged accounts [M1032].

Detection: Monitor events for changes to account objects and/or permissions on systems and the domain, such as event IDs 4738, 4728, and 4670. Monitor for modification of accounts in correlation with other suspicious activity [DS0002].

Create Account: Local Account

T1136.001

The actors’ malware can create local user accounts.

Mitigation: Configure access controls and firewalls to limit access to domain controllers and systems used to create and manage accounts.

Detection: Monitor executed commands and arguments for actions that are associated with local account creation, such as net user /add , useradd, and dscl -create [DS0017].

Detection: Enable logging for new user creation [DS0002].

Create Account: Domain Account

T1136.002

The actors used Mimikatz to create a rogue domain administrator account.

Mitigation: Configure access controls and firewalls to limit access to domain controllers and systems used to create and manage accounts.

Detection: Enable logging for new user creation, especially domain administrator accounts [DS0002].

Scheduled Task/Job: Scheduled Task

T1053.005

The actors’ exploit payload created Scheduled Task RuntimeBrokerService.exe, which executed RuntimeBroker.exe daily as SYSTEM.

Mitigation: Configure settings for scheduled tasks to force tasks to run under the context of the authenticated account instead of allowing them to run as SYSTEM [M1028].

Detection: Monitor for newly constructed processes and/or command-lines that execute from the svchost.exe in Windows 10 and the Windows Task Scheduler taskeng.exe for older versions of Windows [DS0009]

Detection: Monitor for newly constructed scheduled jobs by enabling the Microsoft-Windows-TaskScheduler/Operational setting within the event logging service [DS0003].

Valid Accounts: Default Accounts

T1078.001

The actors used built-in Windows user account DefaultAccount.

Mitigation: Change default usernames and passwords immediately after the installation and before deployment to a production environment [M1027].

Detection: Develop rules to monitor logon behavior across default accounts that have been activated or logged into [DS0028].

Defense Evasion

Technique Title

ID

Use

Recommendations

Impair Defenses: Disable or Modify Tools

           

T1562.001

The actors added an exclusion tool to Windows Defender. The tool allowlisted the entire c:drive, enabling the actors to bypass virus scans for tools they downloaded to the c:drive.

The actors manually disabled Windows Defender via the GUI.

Mitigation: Ensure proper user permissions are in place to prevent adversaries from disabling or interfering with security services. [M1018].

Detection: Monitor for changes made to Windows Registry keys and/or values related to services and startup programs that correspond to security tools such as HKLM:SOFTWAREPoliciesMicrosoftWindows Defender [DS0024].

Detection: Monitor for telemetry that provides context for modification or deletion of information related to security software processes or services such as Windows Defender definition files in Windows and System log files in Linux [DS0013].

Detection: Monitor processes for unexpected termination related to security tools/services [DS0009].

Indicator Removal on Host: File Deletion

T1070.004

The actors removed malicious file mde.ps1 from the dis.

Detection: Monitor executed commands and arguments for actions that could be utilized to unlink, rename, or delete files [DS0017].

Detection: Monitor for unexpected deletion of files from the system [DS0022].

Credential Access

Technique Title

ID

Use

Recommendations

OS Credential Dumping: LSASS Memory

T1003.001

The actors were observed trying to dump LSASS process.

Mitigation: With Windows 10, Microsoft implemented new protections called Credential Guard to protect the LSA secrets that can be used to obtain credentials through forms of credential dumping [M1043]

Mitigation: On Windows 10, enable Attack Surface Reduction (ASR) rules to secure LSASS and prevent credential stealing [M1040].

Mitigation: Ensure that local administrator accounts have complex, unique passwords across all systems on the network [M1027].

Detection: Monitor for unexpected processes interacting with LSASS.exe. Common credential dumpers such as Mimikatz access LSASS.exe by opening the process, locating the LSA secrets key, and decrypting the sections in memory where credential details are stored. [DS0009].

Detection: Monitor executed commands and arguments that may attempt to access credential material stored in the process memory of the LSASS [DS0017].

Credentials from Password Stores

T1555

The actors used Mimikatz to harvest credentials.

Mitigation: Organizations may consider weighing the risk of storing credentials in password stores and web browsers. If system, software, or web browser credential disclosure is a significant concern, technical controls, policy, and user training may be used to prevent storage of credentials in improper locations [M1027].

Detection: Monitor for processes being accessed that may search for common password storage locations to obtain user credentials [DS0009].

Detection: Monitor executed commands and arguments that may search for common password storage locations to obtain user credentials [DS0017].

Discovery

Technique Title

ID

Use

Recommendations

Remote System Discovery

T1018

The actors executed a PowerShell command on the AD to obtain a list of all machines attached to the domain.

Detection: Monitor executed commands and arguments that may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for lateral movement [DS0017].

Detection: Monitor for newly constructed network connections associated with pings/scans that may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for lateral movement [DS0029].

Detection: Monitor for newly executed processes that can be used to discover remote systems, such as ping.exe and tracert.exe, especially when executed in quick succession [DS0009].

System Network Configuration Discovery: Internet Connection Discovery

T1016.001

The actors’ malware tests for internet connectivity by pinging 8.8.8.8.

Mitigation: Monitor executed commands, arguments [DS0017] and executed processes (e.g., tracert or ping) [DS0009] that may check for internet connectivity on compromised systems.

Lateral Movement

Technique Title

ID

Use

Recommendations

Remote Services: Remote Desktop Protocol

T1021.001

The actors used RDP to move laterally to multiple hosts on the network.

Mitigation: Use MFA for remote logins [M1032].

Mitigation: Disable the RDP service if it is unnecessary [M1042].

Mitigation: Do not leave RDP accessible from the internet. Enable firewall rules to block RDP traffic between network security zones within a network [M1030].

Mitigation: Consider removing the local Administrators group from the list of groups allowed to log in through RDP [M1026].

Detection: Monitor for user accounts logged into systems associated with RDP (ex: Windows EID 4624 Logon Type 10). Other factors, such as access patterns (ex: multiple systems over a relatively short period of time) and activity that occurs after a remote login, may indicate suspicious or malicious behavior with RDP [DS0028].

Command and Control

Technique Title

ID

Use

Recommendations

Proxy

T1090

The actors used Ngrok to proxy RDP connections and to perform command and control.

Mitigation: Traffic to known anonymity networks and C2 infrastructure can be blocked through the use of network allow and block lists [M1037].

Detection: Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g., extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure) [DS0029].

Ingress Tool Transfer

T1105

The actors downloaded malware and multiple tools to the network, including PsExec, Mimikatz, and Ngrok.

Mitigation: Employ anti-malware to automatically detect and quarantine malicious scripts [M1049].

 

 

INCIDENT RESPONSE

If suspected initial access or compromise is detected based on IOCs or TTPs in this CSA, CISA encourages organizations to assume lateral movement by threat actors and investigate connected systems and the DC.

CISA recommends organizations apply the following steps before applying any mitigations, including patching.

  1. Immediately isolate affected systems.
  2. Collect and review relevant logs, data, and artifacts. Take a memory capture of the device(s) and a forensic image capture for detailed analysis.
  3. Consider soliciting support from a third-party incident response organization that can provide subject matter expertise to ensure the actor is eradicated from the network and to avoid residual issues that could enable follow-on exploitation.
  4. Report incidents to CISA via CISA’s 24/7 Operations Center (report@cisa.gov or 888-282-0870) or your local FBI field office, or FBI’s 24/7 Cyber Watch (CyWatch) at (855) 292-3937 or by e-mail at CyWatch@fbi.gov.
     

Mitigations

CISA and FBI recommend implementing the mitigations below and in Table 1 to improve your organization’s cybersecurity posture on the basis of threat actor behaviors.

  • Install updated builds to ensure affected VMware Horizon and UAG systems are updated to the latest version.
    • If updates or workarounds were not promptly applied following VMware’s release of updates for Log4Shell in December 2021, treat those VMware Horizon systems as compromised. Follow the pro-active incident response procedures outlined above prior to applying updates. If no compromise is detected, apply these updates as soon as possible.
      • See VMware Security Advisory VMSA-2021-0028.13 and VMware Knowledge Base (KB) 87073 to determine which VMware Horizon components are vulnerable.
      • Note: Until the update is fully implemented, consider removing vulnerable components from the internet to limit the scope of traffic. While installing the updates, ensure network perimeter access controls are as restrictive as possible.
      • If upgrading is not immediately feasible, see KB87073 and KB87092 for vendor-provided temporary workarounds. Implement temporary solutions using an account with administrative privileges. Note that these temporary solutions should not be treated as permanent fixes; vulnerable components should be upgraded to the latest build as soon as possible.
      • Prior to implementing any temporary solution, ensure appropriate backups have been completed.
      • Verify successful implementation of mitigations by executing the vendor supplied script Horizon_Windows_Log4j_Mitigations.zip without parameters to ensure that no vulnerabilities remain. See KB87073 for details.
  • Keep all software up to date and prioritize patching known exploited vulnerabilities (KEVs).
  • Minimize the internet-facing attack surface by hosting essential services on a segregated DMZ, ensuring strict network perimeter access controls, and not hosting internet-facing services that are not essential to business operations. Where possible, implement regularly updated web application firewalls (WAF) in front of public-facing services. WAFs can protect against web-based exploitation using signatures and heuristics that are likely to block or alert on malicious traffic.
  • Use best practices for identity and access management (IAM) by implementing phishing resistant multifactor authentication (MFA), enforcing use of strong passwords, regularly auditing administrator accounts and permissions, and limiting user access through the principle of least privilege. Disable inactive accounts uniformly across the AD, MFA systems, etc.
    • If using Windows 10 version 1607 or Windows Server 2016 or later, monitor or disable Windows DefaultAccount, also known as the Default System Managed Account (DSMA).
  • Audit domain controllers to log successful Kerberos Ticket Granting Service (TGS) requests and ensure the events are monitored for anomalous activity.  
    • Secure accounts.
    • Enforce the principle of least privilege. Administrator accounts should have the minimum permission necessary to complete their tasks.
    • Ensure there are unique and distinct administrative accounts for each set of administrative tasks.
    • Create non-privileged accounts for privileged users and ensure they use the non-privileged accounts for all non-privileged access (e.g., web browsing, email access).
  • Create a deny list of known compromised credentials and prevent users from using known-compromised passwords.
  • Secure credentials by restricting where accounts and credentials can be used and by using local device credential protection features. 
    • Use virtualizing solutions on modern hardware and software to ensure credentials are securely stored.
    • Ensure storage of clear text passwords in LSASS memory is disabled. Note: For Windows 8, this is enabled by default. For more information see Microsoft Security Advisory Update to Improve Credentials Protection and Management.
    • Consider disabling or limiting NTLM and WDigest Authentication.
    • Implement Credential Guard for Windows 10 and Server 2016 (refer to Microsoft: Manage Windows Defender Credential Guard for more information). For Windows Server 2012R2, enable Protected Process Light for Local Security Authority (LSA).
    • Minimize the AD attack surface to reduce malicious ticket-granting activity. Malicious activity such as “Kerberoasting” takes advantage of Kerberos’ TGS and can be used to obtain hashed credentials that threat actors attempt to crack.
       

VALIDATE SECURITY CONTROLS

In addition to applying mitigations, CISA and FBI recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. CISA and FBI recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

To get started:

  1. Select an ATT&CK technique described in this advisory (see table 1).
  2. Align your security technologies against the technique.
  3. Test your technologies against the technique.
  4. Analyze your detection and prevention technologies performance.
  5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
  6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

CISA and FBI recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

References

Revisions

  • Initial Version: November 16, 2022

This product is provided subject to this Notification and this Privacy & Use policy.

Source de l’article sur us-cert.gov

Nothing breathes life into your designs like the typefaces you choose, so every month, we put together this roundup of the best new fonts we’ve found online.

This month, a distinctly medieval aesthetic permeates some of the designs. You’ll find plenty of rebellion in fonts that break the rules for fun. And as always, we’ve included some excellent practical options. Enjoy!

Arnika

Arnika is a relaxed typeface with much more character than typical sans-serifs. Its strokes flare to the point that it’s almost a serif, and the oversized x-height gives it an almost medieval sensibility. There are four weights crying out to be used in a branding project.

Nosi

Nosi is an irreverent typeface that does an excellent job of evoking the spirit of music fanzines, French cinema, and teenage dramas. It’s a great choice for editorial display work if used sparingly.

Parabole

Parabole Display is what happens when you join the wrong points on your outlines: outer curves become inner curves creating an engaging and very usable display font. Parabole Text is the simplified sans-serif. It’s an exciting pairing for editorial work.

Rizoma

There aren’t enough new serif fonts, perhaps because they are harder to draw than the more popular sans-serif. Rizoma is a welcome exception. Based on Roman inscription letters, it is confident, modern, and highly usable.

Guacheva

If you’re shopping for a festive typeface and want to avoid the usual brush scripts, look at Guacheva. The all-caps serif is elegant and feminine, with a clear sense of calligraphy.

Axios Pro

Axios Pro is a good solid workhorse of a sans-serif. Based on early 20th-century grotesques, it will feel familiar to anyone interested in western architectural type design. It’s available in 10 weights and two variable fonts, with extensive OpenType support.

GT Pressura

GT Pressura brings the warmth of print to the web by simulating the effect of ink spreading over paper. The subtle rounding of the sans typeface adds a unique visual interest to the mono, standard, and extended fonts.

Galdy

Script fonts are almost always based on a brush or a pen, traced into vectors. So it’s refreshing to see Galdy, a refined retro script. With a distinctly americana feel, it’s perfect for branding projects.

Nitido

Nitido is a humanist sans-serif typeface designed as a companion for Nitida. It is an expertly realized font family with seven weights and seven accompanying italics. As a result, it‘s ideally suited to corporate design work.

Kinckq

Kinckq is an intriguing experiment with variable font techniques. Inspired by a 19th-century woodcut font, Kinckq is a didone that bends through its middle, creating a 3D effect that’s made for large sizes.

Broger

Broger is another distorted typeface, this time twisting shapes and tying them together with elegant ligatures. It’s an excellent choice for branding in the health & beauty market.

Charte Mono

Charte Mono is another attempt to solve the unsolvable — the Latin alphabet is not monosized. However, when resolved as well as Charte Mono, monospaced fonts are excellent for user interface design, charts, and signage systems.

Lini

Lini is designed to be as compressed as possible while remaining highly legible. It supports Latin and Devanagari languages and works equally well in both forms. Lini is still in beta but is already award-winning.

Rotulo Variable

Rotulo is a variable font with huge contrast between its thick and thin strokes. Inspired by hand-lettering on signs, it’s a chunky option for branding or display type on websites.

Bouuuuuh

OK, so we’re a month late for Halloween, but Bouuuuuh is still worth a mention. Its cartoonish shapes are perfect for poster design, T-shirts, brand design, and, yes, next year’s Halloween marketing.

Source

The post 15 Best New Fonts, November 2022 first appeared on Webdesigner Depot.

Source de l’article sur Webdesignerdepot

Need help with your NoSQL migration? Look no further than our « NoSQL Migration Essentials » Refcard. We walk through the primary steps for moving out of a relational database, plus important design principles to understand and consider in your migration process.

Readers will review key concepts that range from denormalizing and modeling data to defining access patterns, designing primary keys and indexes, and creating an entity relationship diagram — all demonstrated with a simple site application example. As a bonus, readers can use the included JSON structure at the end to interact with a NoSQL playground.
Source de l’article sur DZONE

LAS VEGAS, NV – 15 novembre 2022 – SAP SE (NYSE : SAP) a annoncé, à l’occasion de la conférence SAP TechEd, le lancement d’une nouvelle offre visant à catalyser la prochaine vague de transformation des entreprises en mettant à profit l’expertise de ceux qui la connaissent le mieux : les utilisateurs professionnels.

 

SAP lance SAP Build qui met l’innovation entre les mains des utilisateurs

S’appuyant sur la profondeur et l’étendue unique de SAP Business Technology Platform (SAP BTP), SAP Build est une solution low-code qui met l’innovation et la puissance technologique de SAP entre les mains des utilisateurs professionnels, leur donnant un accès direct et sécurisé aux processus end-to-end, aux données et au contexte dont ils ont besoin pour prendre des décisions plus éclairées et stimuler rapidement l’innovation. Cette offre permet aux utilisateurs, avec un minimum d’expertise technique, de créer et d’enrichir des applications d’entreprise, d’automatiser des processus et de concevoir des sites d’entreprise par simple drag and drop[1].

« SAP Build réunit les applications de gestion les plus puissantes du monde sur une plateforme conçue pour révéler rapidement l’expertise business des utilisateurs », a déclaré Juergen Mueller, Chief Technology Officer et membre du Conseil Exécutif de SAP. « Dans un contexte économique instable, SAP Build et l’ensemble des innovations que nous lançons aujourd’hui – de notre nouveau partenariat avec Coursera Inc. aux améliorations apportées à notre portefeuille d’entreprises pour maximiser la productivité et réduire le délai de rentabilité – permettent aux clients de préparer l’avenir de leur entreprise et de tirer le maximum de valeur de leurs investissements technologiques. »

Avec SAP Build, les utilisateurs ont à portée de main toute la puissance de SAP BTP ainsi que les données des applications de gestion de SAP. Les utilisateurs peuvent facilement intégrer des systèmes, surveiller, analyser et automatiser intelligemment les processus, mais aussi créer des applications pour le dernier jalon d’innovation, le tout sans déplacer leurs données dans un système externe. Grâce aux solutions SAP Signavio déjà intégrées, les utilisateurs de SAP Build bénéficient également d’une visibilité approfondie sur l’ensemble de leurs processus, leur permettant de savoir où se concentrer et ainsi avoir le plus d’impact possible lorsqu’ils innovent et automatisent. Plus de 275 000 références de processus provenant de 4 000 clients, ainsi que 1 300 workflows et automatisations spécifiques à des cas d’utilisation, permettent aux utilisateurs d’exploiter instantanément l’ensemble de l’expertise métier intégrée à la technologie SAP. SAP Build fonctionne également avec les systèmes non-SAP. Enfin le nouveau programme SAP Builders aide les utilisateurs à se lancer rapidement et à entrer en contact avec leurs pairs par le biais de sessions de formations et de forums de partage des meilleures pratiques.

« La demande de solutions numériques actuelles étant supérieure à la capacité des Développeurs à les fournir, IDC prévoit que les professionnels s’impliqueront de plus en plus dans des initiatives visant à créer des solutions digitales pour résoudre les problèmes urgents des entreprises », a déclaré Arnal Dayaratna, Research Vice President, Software Development, IDC. « A l’échelle mondiale, IDC prévoit l’implication de plus de 100 millions de professionnels dans la production de solutions digitales au cours des dix prochaines années. Les solutions de développement low-code de SAP Build permettent aux utilisateurs de tirer parti de leur expertise dans leur domaine pour créer rapidement des solutions à grande échelle et y apporter des modifications. »

L’impact de SAP Build se fait déjà sentir : « Grâce à SAP Build, nous avons facilement construit une meilleure expérience pour nos clients, tout en réduisant considérablement nos coûts de développement de 90%“, a déclaré Spencer Cook, XM Advocates Lead chez Qualtrics, société leader dans la « gestion d’expérience ». « J’ai pu rapidement construire l’application pour améliorer notre programme de référence client, ce qui va permettre de propulser le taux de satisfaction clients.

 

SAP s’engage à former 2 millions de Développeurs en partenariat avec Coursera

À l’heure où chaque entreprise devient une entreprise technologique, SAP est également conscient de l’importance croissante des compétences et des connaissances que seuls les Développeurs sont en mesure d’apporter. A cet effet, SAP s’engage à former deux millions de Développeurs dans le monde d’ici 2025, en triplant ses offres de formations gratuites sur le site SAP Learning, en s’associant à la plateforme d’apprentissage Coursera Inc. de renommée mondiale, ceci afin d’aider les candidats à lancer leur carrière au sein de l’écosystème SAP, et en donnant des moyens d’action aux publics défavorisés dans le domaine de la technologie.

« Je suis heureux d’annoncer que SAP lance aujourd’hui un certificat professionnel de premier niveau sur Coursera. Un certificat destiné aux apprenants de tous niveaux, sans qu’aucun diplôme universitaire ou une expérience du secteur ne soit requis », a déclaré Jeff Maggioncalda, PDG de Coursera Inc. « Ce certificat préparera les candidats à des fonctions premières, et ce, dans certains des domaines les plus demandés. Nous sommes honorés de nous associer à SAP afin d’accroître l’accès aux compétences professionnelles et de développer les opportunités économiques pour tous. »

Ces deux annonces majeures, tant sur le plan business que celui de la formation, s’inscrivent dans le cadre d’une multitude d’innovations annoncées à SAP TechEd, pour aider les clients et partenaires de SAP à poursuivre les changements dont ils ont besoin pour rester performants. Qu’il s’agisse d’un tout nouvel accès Web natif pour les applications de gestion, améliorant la productivité dans le Cloud et prêt à l’emploi, ou d’innovations SAP dans le domaine des applications intelligentes, la Digital Supply Chain ou le développement durable, SAP TechEd 2022 vise à libérer le pouvoir des entreprises.

Pour en savoir plus, consultez notre guide des actualités ici.

Visitez le SAP News Center. Suivez SAP sur Twitter à l’adresse @SAPNews.

[1] Glisser – Déposer

The post SAP lance SAP Build pour révéler l’expertise métier et s’engage à former 2 millions de Développeurs en partenariat avec Coursera d’ici 2025 appeared first on SAP France News.

Source de l’article sur sap.com

Every developer knows that Angular is a powerful framework. However, there are some less-known features of Angular that every developer should know. 

Angular is a JavaScript framework that is used for building web applications. It is one of the most popular frameworks and is used by many big companies. Angular has many features that make it a great choice for web development.

Source de l’article sur DZONE

Artificial intelligence is the latest buzzword in the tech world. It’s everywhere and has been for a while, but AI-powered writing software is a relatively new concept.

AI Writing Software uses artificial intelligence to write articles, blog posts, and other content in your voice. The goal is to provide a tool that will save you time and energy so you can focus on different aspects of your business or life.

To help you get started, we’ve compiled a list of 20 AI writing software you can use to create content for your website, blog, or social media accounts.

1. Copy.ai 

Copy.ai uses Natural Language Processing (NLP) to produce high-quality content for your business, ebooks, blog posts, articles, product descriptions, social media content, and more. It can also be used to rewrite existing content so that you can use it on your website, blog, or social media pages.

Since it uses artificial intelligence to mimic human writing patterns and styles, the copy will be more natural and easier to read than the typical machine-generated text we’re used to seeing.

Copy.ai differs from traditional content creation tools because it doesn’t just offer suggestions on improving your current content; it generates new text based on what it thinks would be most relevant for the topic or audience.

Key Features: 

  • Pre-built Templates – Copy.ai has a ton of pre-built templates for different kinds of content. For example, you can see below that it has options for blogs, social media content, video, case studies, and more:

  • Different tones and variations – Get access to tones like friendly, persuasive, professional, luxury, witty, bold, and more to align the content with your writing style. It also creates multiple variations based on your input – you can pick the one you like or make more.

    To illustrate this, here’s a screenshot of the results we got while trying to write the introduction for this article using Copy AI. 

  • Writing and Brainstorming tools – You also get tons of writing tools, brainstorming tools, and personal tools. Writing tools include essay intro, cliffhanger generator, adjective accelerator, passive to active voice, verb booster, and the like. Brainstorming tools have a name generator, startup ideas, viral ideas, and more – while Personal tools include birthday cards, clubhouse bios, cover letters, love letters, and shower thoughts.

    You can save your content and then return to it later if you wish. Plus, the software’s user interface is easy to navigate, and the program is simple. 

Luciano Viterale, Co-founder of Ticker Nerd, also shares his experience with Copy.ai

“I’ve been experimenting with AI copywriting tools since GPT-3 was released. I have explored many of the popular tools. However, my favorite tool by far is Copy AI. They have an outstanding blogging outline feature; the UX is clean and easy to navigate, and the pricing is reasonable.

Copy AI also generated the name of my startup, “Ticker Nerd,” which is an investing newsletter that was recently acquired.”

That said, Viterale suggests that the blog outlines can be repetitive. He says, “one thing I don’t particularly like is that blog outlines include the same point repeatedly but articulated slightly differently, essentially adding no value.” 

Pros: 

  • Copy.ai produces content at least 80% as good as a human writer (and often better). The system continually learns, which means the more you use it, the better it gets. 
  • It has an extensive library of templates available for different requirements. 
  • It supports over 25 languages, including English, French, Spanish, Portuguese, German, Italian, Dutch, Russian, and more. 

Cons: 

  • Not suitable for long-form content. 
  • The content can get a bit repetitive after a while.  
  • The free plan lets you create only 2000 words per month. 

Pricing: 

It starts from $39 per month (if you pay yearly) for up to 40k words per month, unlimited copywriting tools, priority email support, Blog Wizard tool, support for 25+ languages, and five user seats. 

2. Jasper 

Jasper.ai is an AI copywriting tool that uses a combination of artificial intelligence (AI) and natural language processing (NLP) to create content based on user input. 

It helps you generate original content for your blogs, social media, websites, and more. Jasper also knows 10% of what’s on the internet and continues to learn more daily.

Just like Copy.ai, Jasper’s user interface is easy to use and navigate around. With its specific template for blog posts, articles, ebooks, and more, it’s also one of the few AI writing software suitable for long-form content. 

All you have to do is enter the title, your intended audience, tone of voice, and language options, along with the main point of your copy, and voila – Jasper can churn out a high-quality piece of content for you within seconds.

(Jasper Interface

Key Features: 

  • 50+ AI templates – Jasper.ai offers a variety of AI templates, including Blog Posts, Summary, Conclusion, Q&A, Ads, Videos, Social Media, Rewriter, Marketing Frameworks, Articles, and more. Each template has several use cases – for example, a blog has Blog Titles, Content Briefs, and Outlines.

Headline Generator

  • Boss Mode lets you write long-form content such as blog posts, stories, and books. It also allows you to organize your content into projects and find help with priority chat support, Grammarly integration, and plagiarism checks. You can also choose from 25 languages, including English, French, German, Italian, Spanish, Polish, and more.
  • SurferSEO Integration – If you have a Boss Mode plan, you can add SurferSEO to your Jasper account. This integration will enable you to find the best keywords, build a content strategy, create blog outlines, and more.

Content production using Surfer SEO Integration

Pros: 

  • No technical assistance is required.
  • Simple, easy-to-use interface.
  • Provides plagiarism-free content every time.
  • It helps you build a content strategy based on high-ranking topics and keywords.
  • Ready-to-use templates cover most of the use cases that a writer or marketer will need.
  • Excellent customer support is provided through live training sessions, live Q&A sessions, blogs, Facebook community, help docs, and emails.

Cons: 

  • Plagiarism-free content doesn’t always mean unique content.
  • Customer support options via chat or email are limited.

Pricing: 

It starts with $40/mo for 35K words, 50+ AI templates, 20+ languages, up to 5 seats, and chat support.

3. Rytr 

Rytr is a content generation tool that uses AI to generate high-quality, human-sounding content for emails, blogs, YouTube videos, and landing pages. 

It also supports multiple languages and tones and uses copywriting frameworks, including AIDA & PAS. And to ensure that your content is free of plagiarism, it comes with a built-in plagiarism checker.

Like Copy.ai. Rytr is also more suitable for short-form content and copywriting than long-form content. 

Key Features: 

  • 30+ languages – Rytr supports many languages, including English, Finnish, French, German, Greek, Italian, Japanese, Korean and Polish. It also uses a proprietary approach to support languages that are not supported by the limitations of GPT3.

Language Support

  • Use Cases: Rytr offers 40+ use cases, including Blog Section Writing, Blog Ideas & Outline, Brand Name, Business Idea Pitches, Call-to-action, Cover letters, Emails, and more.

    Each use case has a short description of what it’s about below it. Select the use case to write about, give a little context about what you want to write, and then select how many variants you want the AI to write for you (max is 3). 

You can also choose a creativity level by selecting one of 6 options, including Default, Non, Low, Medium, High, or Max.

Generating Blog Ideas & Outlines

  • Tone – You can add a personal touch to your content by choosing from over 18 tones, including Formal, Convincing, Inspirational, and more.

Writing in a formal tone.

Pros: 

  • Simple user interface.
  • Fast live chat support.
  • Using the magic command, you can produce content for poems, letters, and more.
  • Comes with an in-built tool for plagiarism checks.
  • Provides multiple resources for guidance.

Cons: 

  • Tone options are limited.
  • You will receive a small number of credits per month.

Pricing: 

It starts at $9/month for 100K characters per month. There is also a free plan with a 10K characters limit.

4. Writesonic 

Writesonic is a content-creation platform that uses generative artificial intelligence models to write SEO-optimized long-form blogs and articles. 

It has 65+ use cases or templates, including Article Writer 3.0, Landing Pages, Tweets, Quora Answers, Facebook Ads, and more.

You can easily create desired content by picking a suitable use case, typing a topic, and adding a paragraph of your own words. You can also set the language and quality level before generating it.

Generating Pros and Cons

Key Features: 

  • 24 Languages: You can produce content in 24 languages, including English, Dutch, French, German, Italian, Russian, Czech, Danish, Greek, Hungarian, and more. They’re also continually adding more language options.

Languages

  • Unconventional Use Cases: It’s got a more comprehensive range of templates, including Sentence Expander, Text Summary, Conclusion Writer, YouTube Outlines, LinkedIn Ad Descriptions, Analogy Maker, Question Generator, Song Lyrics, Definition, and more.
  • SEMrush and WordPress Integrations: Writesonic integrates with SEMrush, Zapier, and WordPress.org. SEMrush helps you optimize your content for search engines, and WordPress.org lets you publish your blog directly from Writesonic. Zapier integration enables you to automate your content from Writesonic.

SEMrush Integration

Pros: 

  • Easy to use.
  • The User Interface gives you step-by-step instructions and tips for how to use the tool more efficiently.
  • There are many unique use cases, including a hook generator, pros and cons generator, and landing page creator.
  • Free trial available.

Cons: 

  • Like other tools on this list, the copy may not always be accurate. 

Pricing: 

It starts at $10/month for 12K words, 70+ AI templates, a Landing page generator, a browser extension, Zapier integration, and more.

5. Grammarly Business 

Like most other tools on this list, Grammarly Business isn’t an AI-based content writer per se—it’s more like an AI-based writing assistant. Specifically, it checks your documents for grammar, spelling, plagiarism, and style mistakes.

Grammarly Business also provides feedback on your writing style so that you can improve as a writer over time. 

You can use Grammarly Business to:

  • Get suggestions to improve your writing style, including word choice and sentence structure.
  • Identify common grammatical mistakes and fix them in one click.
  • Improve your email response time by checking emails before they’re sent out.

It’s also ideal for larger teams of writers who need to access the same Grammarly accounts, enabling multiple users to edit documents simultaneously.

One of the best parts about this tool is that it integrates with every online writing space, including Google Docs. This allows you to write and edit simultaneously without waiting for one draft to be finished before making changes to the next.

Key Features: 

  • Custom Brand Tone: You can create multiple tone profiles to suit your needs and assign them to different Teams. You’ll also get real-time feedback on your tone and can adjust it while writing. Your tone can be anything from Joyful, Excited, Loving, and Surprised to Curious, Formal, and Cautionary.

Brand Tone Feedback

  • Grammar Checker: Grammarly gives you feedback on everything that can be improved in your writing – from typos to sentence structure. It also checks for grammar mistakes, spelling errors, and incorrect punctuation.
  • Style Guide: Grammarly Style Guide enables you to establish a uniform tone and style across all your teams. You can set a library of words, terms, and phrases that your teams should adhere to.

    You can also prevent them from using complex acronyms or jargon. Lastly, you can get feedback on how the performance has increased with the Style Guide.

Style Guide Analytics

Pros: 

  • Real-time feedback on errors and tone usage.
  • Grammarly gives instant, easy-to-understand feedback and lets you fix mistakes with just one click.
  • You can always add new words to the dictionary.

Cons: 

  • It flags passive voice as an error.
  • Grammarly is good at catching mistakes, but sometimes it corrects things unnecessarily.

Pricing: 

It starts at $15/month for one member, real-time feedback, style guide, snippets, brand tones, admin controls, and more.

6. Peppertype.ai 

Peppertype.ai is another AI-based content generation tool that claims to create content ten times faster, boost Google ranking, and optimize conversions.

It’s a simple but valuable tool for writers who need help getting started on their next article, email, or blog post.

Some of its use cases include a product review generator, Amazon product descriptions, personal bio, email subject lines, cold emails, paragraph writing, Google Ad copy, Meta descriptions, blog outlines, blog conclusion, and more.

Key Features: 

  • Projects: You can organize your content under Projects, which will group similar types of content so that you have an easier time finding and repurposing the content.

Projects

  • Output personalization: You can like or dislike the output so that the AI behind it can learn your preferences and improve its performance.

Personalizing output

Pros: 

  • If you invite your friends to use Peppertype.ai, join our community, write them a review, and schedule a training call, they’ll reward you with more word credits.
  • You can create teams, projects, and workspaces.
  • You can filter out unwanted results with annotations.

Cons: 

  • One seat is expensive, and the price increases with each added seat.

Pricing: 

It starts at $35/month for one user, 50K words, 40+ use cases, unlimited projects, customer support, and more.

7. Anyword 

Anyword is a copywriting AI that creates content tailored for your customers and target audiences. 

It has a unique feature – the predictive performance score to predict how well your copy will perform and engage with your audience. This helps you write optimized texts that boost your conversions.

It has 11 major use cases, including a social post generator, Instagram caption generator, sentence rewriter, AI writer tool, meta description generator, Ad copy, landing page, blog, and more. 

Generating Facebook Post

Although it can create blog post titles and outlines, it’s better suited for writing short-form content like ad copy, product descriptions, and headlines. When writing a blog post, it can generate the title, outline, and introduction before creating body paragraphs.

Key Features: 

  • Predictive Performance Score: This score is given to your copy based on its potential to perform well with your target audience. This can help you immediately improve your copy.

Predictive Performance Score

  • Website Triggered Messages: This feature helps you create and deploy multiple copy variations on your website and apply the best one automatically.

Pros: 

  • It offers a predictive performance score to optimize your copy beforehand.
  • It also offers a free social post generator. No sign-up is required.
  • It automatically creates and runs multiple copy variations to determine the best one.
  • A Freemium plan is available.

Cons: 

  • Limited use cases.
  • A bit expensive for the credits and the number of use cases it offers.

Pricing: 

It costs $24/month for 20K words and one seat.

8. Scalenut 

Scalenut uses Natural Language Processing (NLP) to produce content that ranks higher on search results. It also gives insights into statistics such as word count, grade level, H tags, readability, and the number of images you should use in your content piece. 

Aside from that, it offers a variety of use cases, including SEO Hub, AI Copywriter, Talent Network, Chrome Extension, Cruise Mode, and more. With these features, you can create content for blog ideas, product descriptions, website copies, blog intros, and more.

Key Features: 

  • Integrations: You can integrate Scalenut with SEMrush for keyword research, cluster boost, and Copyscape to check plagiarism.

App integrations

  • Cruise Mode: Cruise Mode helps you create blog content in 5 minutes. You just need to provide your blog post’s title, outline, and main points to get your intended content. You’ll also get a real-time quality score that helps you improve your search ranking.

Pros: 

  • It offers a quality score.
  • Affordable plans with a 7-day free trial.
  • 24*7 chat & email support.

Cons: 

  • Limited use cases and features.
  • Content quality is not consistent for all businesses.

Pricing: 

It starts at $12/month for 100K AI words, 5 SEO reports, 24*7 chat and email support, and more.

9. Frase.io 

Frase.io is an all-in-one AI writing tool that helps you, research competitors, develop content briefs, and produce and optimize content.

First, you’ll analyze your search competitors using Frase so you can see what your competition is writing about. Next, you can focus on Then, your overall outline or dig deeper by focusing on individual headlines, external links, statistics, etc. 

Next, use Frase’s AI writer to finish your draft. You can choose from dozens of use cases to generate content, including product descriptions, blog introductions, and more. You can even automatically expand on what you’re currently writing or rewrite what you’ve already written. 

Finally, you can optimize your draft using recommended keywords and readability scores. Again, Frase provides real-time feedback as you fill in the gaps. 

Key Features: 

  • AI Writing Tools: They include an AI content generator, introduction generator, outline generator, paraphrasing tool, paragraph rewriter, blog title generator, meta description generator, product description generator, slogan generator, summary generator, sentence rewriter, and more. 

Blog introduction generator

  • Content Analytics: It fetches data from Google Search Console to provide insights into organic growth, content decay, and keyword opportunities.

Frase Content Analytics

  • Integrations: It integrates with Google Docs, Google Search Console, and WordPress. It also offers a Chrome extension.

Frase Integrations

Pros: 

  • You can add multiple pages in a single doc.
  • It offers content analytics, allowing you to see which articles are getting the most traction and which ones are not.
  • It enables you to do competitors’ research.

Cons: 

  • Limited word credits in each plan.
  • Max 3 seats available.

Pricing: 

It starts at $14.99/month for one user, 20K AI characters, and four articles (write/optimize) per month. There’s also a 5-day free trial for $1. 

10. Surfer SEO 

Surfer SEO is an SEO tool and AI writing assistance that uses Natural Language Processing (NLP) and machine learning (ML) to help you manage and improve your content strategy.

Rather than creating the body of your copy, it helps you create outlines and optimize the content you write based on that outline. 

It helps you to evaluate your content and find places to improve it using its content score metric, competitor research, SERP analyzer, and keyword recommendations. It also offers a content planner that you can share with your team. 

Key Features: 

  • Outline Builder for Content Editor: The tool generates headlines and paragraphs based on your competitors’ postings. You can use that content as is or edit it by copy-pasting it into the editor. Content paragraphs are available in English, German, French, Polish, Swedish, and Dutch.

Outline Builder Content Builder

  • SEO Audit Tool: This tool performs step-by-step optimization on your website to improve your Google search results. When you pick an URL to audit, it provides suggestions such as missing backlinks, internal links, word count, and important keywords to use.

Terms to use

  • Content Planner: You can start with your content planner by keyword or domain. Based on your keywords, it comes up with clusters that you can use to create your content topics.

    However, there is a learning curve involved. You will need to understand topic clusters, search intent, and keyword difficulty, among other metrics.

Content Planner

Pros: 

  • Easy to use interface.
  • They offer a 7-day money-back guarantee – if you don’t find it helpful, you get your money back.
  • It identifies keyword stuffing and prevents you from doing so.

Cons: 

  • Each plan offers a limited number of pages that you can audit.

Pricing:

It starts at $49/month for one website tracking and ten articles/month.

11. Copysmith 

Copysmith markets itself as an AI content creation solution for teams. 

This AI writer is best suited for bulk and short-form content copy like product descriptions, blog templates, social media content, advertising content, and more.

Key Features: 

  • Use cases: It includes product descriptions, content enhancement, ads & social media, blog templates, and brainstorming. With Product descriptions, you can generate descriptions for eCommerce Products, Instagram, Amazon, eBay, Etsy, and Flipkart. Blog templates include blog titles, blog ideas, outlines, intro, Kickstarter, and more.

Product Description

  • Campaign Builder: It includes several AI templates to help you generate SEO-optimized product descriptions, Facebook posts, and Google ads in just a few seconds. 
  • Integrations: Copysmith integrates with Frase to use SEO data, Google Ads to publish campaigns, Microsoft Word to produce content, and WooCommerce for products.

Pros: 

  • It’s easy to use and generates SEO-optimized content.
  • It comes with an in-built plagiarism checker.
  • Provides good training material for new users.

Cons: 

  • Not suitable for long-form content. 

Pricing:  

It starts at $19/month for 75 credits, up to 40K words, and up to 20 plagiarism checks.

12. ClosersCopy  

ClosersCopy is an AI writing robot that provides various templates for producing marketing materials, including website content, sales copy, email marketing campaigns, and social media posts. This tool doesn’t require any special skills or training to create engaging text.

Key Features: 

  • Use cases: It includes Facebook & Google Ads, email subject lines, landing pages, sales copies, social media content, and more.
  • LongForm editor: You can create blog posts, articles, sales copies, and email marketing copies.
  • Drag-and-drop builders: The drag-and-drop content builder makes your tasks more manageable by allowing you to drag and drop elements on your copy. The only thing you need to do is provide some context at the time of configuring this builder.

Pros: 

  • Its user interface is easy to use and navigate.
  • You can easily create content with their drag-and-drop builder.
  • The video tutorials provide in-depth, step-by-step instructions for each process.
  • Tone analysis helps you understand the emotions in your writing.

Cons: 

  • No free plan or trial period is available.
  • More expensive than most other AI tools.

Pricing:  

It starts at $49.99/month for two seats, 300 AI runs, 50 SEO Audits, an SEO planner, Email support, and more.

13. LongShot AI

LongShot AI is another writing tool that can help you write SEO-friendly content. It comes with over 30 use cases and a plagiarism checker to ensure your content is original. 

While most of its use cases are for short-form content, you can use templates like the content expander, write more, or bullets to text generator to assist you with your long-form piece. 

Key Features: 

  • Use Cases: It includes content rephrasing, FAQ generator, headline generator, blog ideas generator, meta description generator, text extender, blog insights creator, headline intro generator, product description generator, FAB copywriting framework generator, content readability improver, sales email generator, video description generator, and more.

Headline Generator

  • Integrations: It integrates with WordPress to enable you to export AI-generated copies directly to WordPress. Its integration with SEMrush will help you write SEO-friendly content. Apart from these, LongShot AI will also provide integration with Hubspot and Grammarly soon.

LongShot X SEMrush

  • LongShot AI Community: The LongShot AI Community is a group of researchers and developers working on open artificial intelligence problems. Anyone can join and contribute to the research.

Pros: 

  • The free forever plan offers ten credits daily.
  • Community is a big help for new users.
  • It gives you multiple ways to know more about the product, including blog posts, help videos, customer support, and announcements.

Cons: 

  • Aside from the free plan, it’s costly, especially considering the limited number of use cases and credits.
  • Doesn’t have use cases for social media content.
  • Supports only eight languages.

Pricing: 

It starts at $49/month for 1000 monthly credits, one user, basic integrations, and more.

14. INK Editor

Inky is a suite of content marketing tools that include AI-powered tools: AI Writer, SEO Optimizer, Copy Assistant, and Content Planner. These features can be used individually or collectively, and the price will be adjusted accordingly.

The AI Writer offers unlimited credits and helps you write long-form and short-form content. In addition, you can re-edit the generated copy with a single click as often as you want. The tool also offers WordPress plugin integration and open-source export API.

In addition, you get access to use cases like product descriptions, social media copies, sales copies, blogs, essays, emails, microcopies, product ideas, and more.

AI Writing Tools

Key Features: 

  • SEO Optimizer: INK’s SEO Optimizer is a natural language optimization tool that can improve your SEO score and increase engagement by providing recommendations on keywords, titles, alt text, and the like. Enter a keyword or phrase, and the INK SEO Optimizer will do the rest.

SEO Optimization Score

  • Content Planner: The INK Content Planner helps you group keywords and analyze search intent. You can also import your keywords and download your clusters for further analysis.
  • Copy Assistant: A built-in grammar checker automatically checks your grammar and spelling. It also checks words, tone, and sentence fragments.

Pros: 

  • Easy to use.
  • You can use it as an all-in-one content marketing tool. 
  • Offers unlimited AI text writing even on a free plan.
  • Offers keyword clusters to optimize your SEO strategy.

Cons: 

  • The paid plan is relatively costly for one seat.

Pricing: 

It starts at $50/month for one seat, INK Copy Assistant PRO, INK AI Writer PRO, INK SEO Optimizer PRO, and INK Content Planner PRO with 1,000 Keywords.

15. Articoolo

Articoolo is an AI content generator developed by a group of mathematicians, computer scientists, content writers, and marketing specialists. Thanks to NLP and AI technology, the tool drafts articles in a way that mimics the human brain.

Key Features: 

  • Use Cases: It includes Text Writer, Article Rewriter, Article Summarizer, and Image Scraper. Based on your keyword, Articoolo will also fetch images from royalty-free websites.
  • WordPress Plugin: This will help you export your copies directly to WordPress so you can post faster.
  • Plagiarism Checker: All you have to do is enter your text into the program, and it will scan for instances of plagiarism.

Pros: 

  • It has pay-per-use plans.

Cons: 

  • There’s no official website.
  • Customer support is missing the mark.
  • Not much information about the tool online.

Pricing: 

It starts at $19/month for a ten-article fixed package.

16. NeuralText

NeuralText is a writing tool that offers users keyword reports and cluster credits. It also has an API for developers looking to integrate its services into other programs.

Some of its most prominent use cases include a paragraph generator, content outline, and product description – making it a short-form content-centric tool. 

The best part is that it not only creates content but also creates content briefs and optimizes the content based on keywords and SERP analysis.

Key Features: 

  • AI Writing Assistant: This tool will help you produce text in any format. It also provides text recommendations while you write.

AI Writing Assistant

  • Content Optimization: NeuralText can help make your content more search engine-friendly and improve its score in Google’s search results. It analyzes your word choice and sentence structure to ensure your content is easy to scan and relevant to your topic.

Content Score

  • Content research analysis: It makes content research and studies more accessible, allowing you to see real-time data across SERPs. It also has a Google Docs-style editor, making managing your data points and keeping track of your research effortless.

Content research analysis

Pros: 

  • Free plan available.
  • Offers keyword clusters.
  • You can group content into different projects.

Cons: 

  • The community is not active.
  • A bit on the expensive side. 

Pricing: 

It starts at $49/month for one user, unlimited AI text generation, 50 content analyses, and 50 keyword reports.

17. AI Writer

AI Writer helps you create unique, SEO-friendly content that you can publish directly to WordPress. In addition, it offers features like research & write, text rewording, verifiable citations, and source summarizer.

Key Features: 

  • AI-Writer Content Kit: AI Writer uses artificial intelligence to analyze keyword difficulty and ranking opportunities based on the field you enter. It chooses up to 250 keywords and generates one article per keyword, which can be directly published to WordPress.
  • (Sub)Topic Discoverer: It checks to see what other writers have written about and then uses that information to create new topics for you.
  • Verifiable Citations: When it produces content for you, it also provides a list of citations so that you can check the accuracy of the information.

Pros: 

  • It offers a free trial for seven days.
  • One of the few AI writing tools to offer verifiable citations so you can confirm the accuracy of the content.

Cons: 

  • Not enough resources in the knowledge base for new users.
  • Fewer use cases.
  • Does not offer a free version.

Pricing: 

It starts at $29/month for one user and up to 40 articles.

18. Wordtune

Wordtune makes your previously written content clearer, more compelling, and more authentic by bringing out the best.

Although this tool doesn’t write content from scratch, it makes your content look more professional. It also integrates with Microsoft Word, so you can edit your work while you write your content.

It provides tools to: 

  • Rewrite your content 
  • Make your content casual 
  • Make your content formal 
  • Shorten your sentences to make them crisp 
  • Expand your sentences to give more detail 

Key Features: 

  • Paragraph Rewriter: Wordtune can rewrite your paragraphs entirely at once, one sentence at a time, and one word at a time. See below for an example.

Paragraph Rewriter

  • Tone: You can alter how your content appears by making it more informal or formal. Here’s an example: 

Casual Tone

Pros: 

  • You can make the text longer or shorter.
  • It offers a casual and formal tone.
  • Simple and easy-to-use interface. 

Cons: 

  • It doesn’t offer any other benefits besides rewriting.

Pricing: 

It starts at $9.99/month for unlimited rewrites. 

19. ProWritingAid

Rather than a full-fledged artificial intelligence writer, ProWritingAid is a grammar checker and style editor that’s available online. It helps prevent spelling errors, suggests impactful words, and corrects grammar and punctuation.

It supports general English, British English, US English, Australian English, and Canadian English.

Key Features: 

  • Document type: You can choose from 35+ document types for your content. They include general academic abstract, academic essays, admission letters, book reviews, business books, and more.
  • Reports: ProWritingAid provides three types of reports: real-time reports, summary reports, and style reports.

    Real-time reports show errors and corrections as you write. Summary reports provide an overview of all reports. It contains a spelling score, grammar score, and style score. On the other hand, Style reports identify problems in writing style and readability.

Summary report

Pros: 

  • It offers 20+ reports to track your progress as you improve your writing.
  • There are no limits on the number of words you can use with premium plans.
  • Notifies of style changes and suggests corrections if needed.

Cons: 

  • Only available through the web browser. 

Pricing: 

It starts at $20 per month or $120 per year (if you pay yearly). 

20. Article Forge

Once you provide ArticleForge.com with a keyword, article length, and other custom information, the program creates a 1500+ word article in seconds.

Your content will be checked for plagiarism and uniqueness before being delivered.

Key Features: 

  • Media-rich content: It can automatically find and insert relevant images, videos, titles, and links in your articles. To make it more relevant, ArticleForge also uses LSI keywords.

Creating an article

  • SEO Automation: It integrates with WordPress to automate your scheduling and posting of articles.

WordPress Integration

  • Interlinking: It can automatically turn URLs into links within your article. You can choose how often to do this for every keyword or just the first occurrence.
  • Languages: It can generate content in English, French, German, Dutch, Portuguese, Spanish, and Italian.

Pros: 

  • Produces SEO-optimized content.
  • Can schedule posts on WordPress automatically.
  • Plagiarism-free content.
  • Automatic keyword linking.

Cons: 

  • The content can be repetitive.
  • You need to check the accuracy of the content before publishing.

Pricing: 

It starts at $13/month for 25K words and the rest of the features.

Frequently asked questions about AI writing software.

1. What is AI Writing Software?

AI writing software is an artificial intelligence program used to write text. It can generate content for websites, blogs, and other fields. The content created by AI writers is often indistinguishable from human-created content. Still, sometimes it has a slightly robotic feel or may include words or phrases that seem out of place in the context of the writing.

2. How does AI Writing Software work?

The software uses an algorithm to mimic the creative process of human writers. It first creates a base text that modifies by adding words and phrases specific to your content. This ensures that you get high-quality original content every time you use it.

3. Who can use AI Writing Software?

Anyone who needs to create texts for their business or website can benefit from using this software. It’s also an excellent option for freelance writers and content marketers facing writer’s block. As it’s easy and fast, even beginners can start using it immediately and see great results within minutes!

4. Can I use AI writers for everything I write?

No — AI writers are best suited for shorter pieces like headlines or product descriptions because they don’t have much time to learn about your company’s brand voice or personality. 

While there are tools to churn out long-form content, you still need the human touch for longer and more research-intensive pieces like blog posts or sales copy. AI algorithms still can’t pick up on nuances like a human can.

5. What are some of the benefits of using AI Writing Software?

There are many benefits to using AI writing software. The most obvious benefit is that you no longer need to spend time creating content yourself. The software will do it for you! 

Another benefit is that AI writing software allows you to create content in any niche or topic you desire. You can even target multiple niches at once! This makes it possible to scale your business quickly and easily by leveraging the power of automation while still keeping your hands on the work itself.

6. How much does it cost?

The pricing depends on the type of service you want to use. Some companies offer free trials or even freemium versions with limited credits so that you can test their services before making a purchase decision. Some companies offer lifetime discounts for repeat customers, so keep an eye out for those offers when making your choice!

7. What’s the difference between AI-powered and human-written content?

While humans are still required for high-quality content creation, AI makes scaling up your content marketing efforts easier. By automating much of the writing process – from keyword research to formatting – AI can help you create more content at a lower cost per article. In addition, this frees your team members to focus on other tasks that require their expertise (like outreach) or simply spend more time enjoying their lives!

8. What is the best AI Writer?

The best AI writer depends on what you want it to do and how much you want to spend. If you’re going to write books or articles, many different programs can help you with this task. Our top pick for long-form would be Jasper

On the other hand, if you only need help with short-form content such as blog posts or press releases, there may not be any need for an AI writer because these documents don’t require as much work or effort from the user. In that case, you might want to use tools like Copy.ai, Rytr, and more. 

9. Can I use AI Writing Software to replace my human writers?

No, AI writing software isn’t meant to replace human writers. It’s designed to work alongside them, helping them create more engaging and relevant content for their audiences. You’ll still need human writers who can add style and personality to your content.

Over to You! 

Do you find writing to be an exhausting activity? If yes, you would want to try one of the AI Writing Software tools we suggested above. These are some of the best AI writing tools specially developed to boost creativity, motivation, and productivity.

There’s room for experimentation with AI-generated content as long as you can recognize where specific tools are lacking and how to incorporate that into your work. Ultimately, the future of AI writing assistant software will mean ever-more versatile tools for writers, so don’t be shy about testing the waters.

 

Featured image by pch.vector on Freepik.

Source

The post 20 Best AI Writing Apps first appeared on Webdesigner Depot.

Source de l’article sur Webdesignerdepot

Want to build a live barcode scanner using the webcam in JavaScript but don’t know where to begin? Well, you have arrived at the right spot! In this article, we will share an easy way to do so. 

So, without further ado, let’s get started! 

Source de l’article sur DZONE

We analyzed more than 5,000,000,000 rows of GitHub event data and got the results here. In this report, you’ll get interesting findings about open-source software on GitHub in 2022.

Top Languages in the Open-Source World Over the Past Four Years

This chart ranks programming languages yearly from 2019 to 2022 based on the ratio of new repositories using these languages to all new repositories.

Source de l’article sur DZONE


Context

  • 1: Is choosing a database easy?
  • 2: What are the different categories of databases?
    • 2.1: What are Relational Databases?
      • Relational Databases – OLTP – Online Transaction Processing
        • Cloud SQL
        • Cloud Spanner
        • Cloud SQL vs Cloud Spanner
      • Relational Database – OLAP – Online Analytics Processing
        • BigQuery – Modern Data warehouse
    • 2.2: What are NoSQL Databases?
      • Cloud Datastore and Firestore
      • Cloud BigTable
      • Choosing between Cloud Firestore, Datastore vs Cloud BigTable
    • 2.3: What are In-memory Databases?
  • 3: Let’s get a quick summary

Is Choosing a Database Easy?Datacenters

Choosing a database for your use case is not easy. A few factors you would need to consider:

  • 1: Do you want a fixed schema? Do you want flexibility in defining and changing your schema? Do you want to go schemaless?
  • 2: What level of transaction properties do you need? (atomicity and consistency)
  • 3: What kind of latency do you want? (seconds, milliseconds or microseconds)
  • 4: How many transactions do you expect? (hundreds or thousands or millions of transactions per second)
  • 5: How much data will be stored? (MBs or GBs or TBs or PBs)

Before we get into the details, let’s explore the different categories of databases:

Source de l’article sur DZONE