http://206.189.178.169:3001/?freshness=All&show=1&q=Vulnerability-Rag-By-System+INR+loc%3Ain Search: Vulnerability Rag By System - Zipri.in

Vulnerability Rag By System

Debug Information

Array
(
    [meilisearch] => Array
        (
            [url] => https://msin.fadunews.in/indexes/zipri/search
            [http_code] => 200
            [response] => {"hits":[],"query":"Vulnerability-Rag-By-System","processingTimeMs":1,"limit":3,"offset":0,"estimatedTotalHits":0}
            [curl_error] => 
            [parsed] => Array
                (
                    [hits] => Array
                        (
                        )

                    [query] => Vulnerability-Rag-By-System
                    [processingTimeMs] => 1
                    [limit] => 3
                    [offset] => 0
                    [estimatedTotalHits] => 0
                )

        )

    [image_search] => Array
        (
            [url] => http://206.189.178.169:3001/?freshness=All&show=1&q=Vulnerability-Rag-By-System+INR+loc%3Ain
            [http_code] => 200
            [response] => {"name":"vulnerability-rag-by-system inr loc:in","totalEstimatedMatches":424,"nextOffset":120,"currentOffset":0,"value":{"580803E4B69CF240B6AB09F5999071D433524FFE":{"name":"Alere PT INR Monitoring System – Microsidd India","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.aPvV-rOSTLdc3Rp-p4Gv5gHaHa?pid=Api","datePublished":"2023-01-19T03:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://microsidd.com/cdn/shop/products/0000466_alereratioptinrmonitoringsystem.jpg?v=1685440218","hostPageUrl":"https://microsidd.com/products/alere-ratio-pt-inr-monitoring-system","contentSize":"14329 B","width":545,"height":545,"cDNContentUrl":"https://th.bing.com/th/id/R.68fbd5fab3924cb75cdd1a7ea781afe6?rik=hYAwTmvJLwRrug&riu=http%3a%2f%2fmicrosidd.com%2fcdn%2fshop%2fproducts%2f0000466_alereratioptinrmonitoringsystem.jpg%3fv%3d1685440218&ehk=cD35U4t52DgTwWXgWApDIpypXPkUf%2fDoIbbqwOGtX1w%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EFF425334D1709995F90BA6B042FC96B4E308085","accentColor":"78104B"},"CC065A066F2990269ECEFC2680B16F41BBAABD7D":{"name":"Sukrut CWS UV Disinfection System Products at price INR 0 in Bangalore ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.7IGXEz_55alnKIm8jDo3LwAAAA?pid=Api","datePublished":"2021-06-30T19:36:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://web.s-cdn.boostkit.dev/webaction-files/5ac4f587beef72050ad4e284_product_images/screen-shot-2019-12-04-at-11.46.32-am-5f439d47a32075000185e137.png","hostPageUrl":"https://www.ekjanassociates.in/products/sukrut-cws-uv-disinfection-system/45","contentSize":"15623 B","width":351,"height":483,"cDNContentUrl":"https://th.bing.com/th/id/R.ec8197133ff9e5a9672889bc8c3a372f?rik=zGClYPaSCWLp7A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D7DBAABB14F61B0862CFECE9620992F660A560CC","accentColor":"9F892C"},"FCBFDCB4E7898655A99367D827C37BBCB1F3BDD1":{"name":"Micropoint PT INR Meter, Finger Prick Blood Test, Rapid 2 Min Results ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.V68Jg3EBUTTU8J82SnXObgHaHa?pid=Api","datePublished":"2021-04-09T20:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/51dEBu2Y2WL._SL1000_.jpg","hostPageUrl":"https://www.amazon.in/Micropoint-q1-meter-INR-Meter/dp/B08RYRZHK8","contentSize":"56291 B","width":1000,"height":1000,"cDNContentUrl":"https://th.bing.com/th/id/R.57af098371015134d4f09f364a75ce6e?rik=z%2fvNS36YaFWaOQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1DDB3F1BCBB73C728D76399A5568987E4BCDFBCF","accentColor":"1F9AAC"},"5F9D9FB9DD8C747342CCFE05591104F96426A410":{"name":"INR Full Form: What is full form of INR?","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.-HbYAKjSJ-4PC_ZocKUqaAHaEU?pid=Api","datePublished":"2022-11-05T12:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://st.adda247.com/https://wpassets.adda247.com/wp-content/uploads/multisite/2022/11/05144815/What-is-INR.png","hostPageUrl":"https://www.bankersadda.com/inr-full-form/","contentSize":"35329 B","width":720,"height":420,"cDNContentUrl":"https://th.bing.com/th/id/R.f876d800a8d227ee0f0bf66870a52a68?rik=9dn5m93IRzckzA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"014A62469F40119550EFCC243747C8DD9BF9D9F5","accentColor":"B71414"},"82975A005330530D739FE452F6A0E53FF60E18F9":{"name":"Making INR 150 A Day Rag-Picking, This Woman Looks After 400 Stray Dogs ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.8EQYE91UooG-BeamqGa5JwHaED?pid=Api","datePublished":"2022-11-01T11:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://media.assettype.com/homegrown/import/facebook-58215-dog-lady.jpg?w=1200&ar=40:21&auto=format%2Ccompress&ogImage=true&mode=crop&enlarge=true&overlay=false&overlay_position=bottom&overlay_width=100","hostPageUrl":"https://homegrown.co.in/homegrown-voices/making-rs-150-a-day-rag-picking-this-woman-looks-after-400-stray-dogs-in-delhi-watch","contentSize":"124917 B","width":1200,"height":657,"cDNContentUrl":"https://th.bing.com/th/id/R.f0441813dd54a281be05e6a6a866b927?rik=KHmlADUDNdA3%2bQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9F81E06FF35E0A6F254EF937D035033500A57928","accentColor":"10407C"},"E29500FFF6FDBAA5413B65738D4F95D79F54A7D2":{"name":"KingFisher Duo Prime Purification System Products at price INR 0 in ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.UILEweQK9LNCTyBfuly_7QHaHA?pid=Api","datePublished":"2023-11-22T13:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://productimages.withfloats.com/tile/5d501d92b2ca9a0001ac173f.jpg","hostPageUrl":"https://www.niravbiosolutions.co.in/products/kingfisher-duo-prime-purification-system/6","contentSize":"33342 B","width":600,"height":568,"cDNContentUrl":"https://th.bing.com/th/id/R.5082c4c1e40af4b3424f205fba5cbfed?rik=LlkA%2f2%2ffq1oUsw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2D7A45F97D59F4D83756B3145AABDF6FFF00592E","accentColor":"366C95"},"801FC2D44EDE181FF3DD474FEAA124FB47B3668D":{"name":"IPL's brand value wiped out by INR 21576 crore before the 2026 season ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.43RC0rnWoWVeehNvOXsbjQHaEK?pid=Api","datePublished":"2025-12-10T14:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d16f573ilcot6q.cloudfront.net/wp-content/uploads/2025/06/Virat-Kohli-RCB-IPL-2025.webp","hostPageUrl":"https://www.insidesport.in/cricket/ipl-brand-value-wiped-out-by-inr-21576-crore-before-the-2026-season-rcb-csk-face-drop/","contentSize":"177038 B","width":1200,"height":675,"cDNContentUrl":"https://th.bing.com/th/id/R.e37442d2b9d6a1655e7a136f397b1b8d?rik=CPEsTeTtgfE%2f3Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D8663B74BF421AAEF474DD3FF181EDE44D2CF108","accentColor":"A7242C"},"6EBDCEA23DB541D5C91AB906B8762C6FB291EAD2":{"name":"KingFisher™ Flex Purification System Products at price INR 0 in Pune ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.DDoFhMVQzay3Fx9vIy3knQHaHa?pid=Api","datePublished":"2024-02-14T13:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://productimages.withfloats.com/tile/65a76890c4452f288e94f1a2.jpg","hostPageUrl":"https://www.niravbiosolutions.co.in/products/kingfisher-flex-purification-system/71","contentSize":"25162 B","width":500,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.0c3a0584c550cdacb7171f6f232de49d?rik=5tvsKtNbFF2coQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2DAE192BF6C2678B609BA19C5D145BD32AECDBE6","accentColor":"23496C"},"C8873D5B3E1445FB9D87626B974B2AF4943D37B5":{"name":"Best whiskey under INR 500: Bottles at a bargain for your home bar","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.VFmD_1pCHrw9mAomz7W8BwHaHa?pid=Api","datePublished":"2023-10-17T09:40:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images.lifestyleasia.com/wp-content/uploads/sites/7/2025/04/03135855/Whisky-and-whiskey-based-cocktails-by-top-Indian-bartenders-2-500x500.jpg?tr=w-800","hostPageUrl":"https://www.lifestyleasia.com/ind/dining/drinks/whiskey-under-inr-500-best-budget-bottles-in-india/","contentSize":"65577 B","width":800,"height":800,"cDNContentUrl":"https://th.bing.com/th/id/R.545983ff5a421ebc3d980a26cfb5bc07?rik=jHjTteNBVL%2fZeA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5B73D3494FA2B479B62678D9BF5441E3B5D3788C","accentColor":"C28A09"},"5A217F743A378D3DE0887DDA22B62B85B0DA048F":{"name":"Prompt Engineering vs. RAG vs. Finetuning: What’s the Difference? | by ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.s2gFfdHW50QjRPAwvRWBewHaFF?pid=Api","datePublished":"2024-08-05T00:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://miro.medium.com/v2/resize:fit:1358/format:webp/0*MwqEsP6YWzxVmaPT.gif","hostPageUrl":"https://blog.aidetic.in/prompt-engineering-vs-rag-vs-finetuning-whats-the-difference-78466d70b5df","contentSize":"456167 B","width":1160,"height":796,"proxyContentUrl":"https://tse4.mm.bing.net/th/id/OGC.b368057dd1d6e7442344f030bd15817b?pid=Api&rurl=https%3a%2f%2fmiro.medium.com%2fv2%2fresize%3afit%3a1358%2fformat%3awebp%2f0*MwqEsP6YWzxVmaPT.gif&ehk=7GVfCWgAO4xFim5MXlsz6YrkPs01cnmQ4Hv8he0Zy0U%3d","cDNContentUrl":"https://th.bing.com/th/id/R.b368057dd1d6e7442344f030bd15817b?rik=pRL3R6Nz2NMOiA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F840AD0B58B26B22ADD7880ED3D873A347F712A5","accentColor":"A78524"},"5EB9D7BBAC13DBA93925FA699E88B72BE3550016":{"name":"Types of RAG: An Overview. Retrieval Augmented Generation is the… | by ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.AyuHvBzUrnBFx-Ub7kvjkAHaEW?pid=Api","datePublished":"2024-01-21T04:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://miro.medium.com/v2/resize:fit:1358/1*JcsPrFx45RyMOvLlcml6Pg.png","hostPageUrl":"https://blog.jayanthk.in/types-of-rag-an-overview-0e2b3ed71b82","contentSize":"312457 B","width":1358,"height":798,"cDNContentUrl":"https://th.bing.com/th/id/R.032b87bc1cd4ae7045c7e51bee4be390?rik=5Zt9u8oxvZqTUg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6100553EB27B88E996AF52939ABD31CABB7D9BE5","accentColor":"7A2A24"},"B8A4CE972E6FE579C8906B600885CAC64FD9A2AC":{"name":"NVIDIA AI Enterprise | Cloud-native Software Platform | NVIDIA","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.FJI4BEJLkXyaJ_LqMAvH7gHaEK?pid=Api","datePublished":"2020-08-09T12:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.nvidia.com/content/nvidiaGDC/in/en_IN/data-center/products/ai-enterprise/_jcr_content/root/responsivegrid/nv_container_copy_co_907753176/nv_container_663442894/nv_image_copy_copy.coreimg.jpeg/1710788124032/cve-risk-analysis-fg-i2of6-d.jpeg","hostPageUrl":"https://www.nvidia.com/en-in/data-center/products/ai-enterprise/","contentSize":"57173 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.14923804424b917c9a27f2ea300bc7ee?rik=i0rseeL2XpeMCQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CA2A9DF46CAC588006B6098C975EF6E279EC4A8B","accentColor":"C99902"},"B028708F3AB9F08D04B4FA699E88B72BE3550016":{"name":"Types of RAG: An Overview. Retrieval Augmented Generation is the… | by ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.xEO5D0eI2kwitzdR8Y7tIAHaCk?pid=Api","datePublished":"2024-01-21T04:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://miro.medium.com/v2/resize:fit:1358/1*S1sWx3tcgZKzwv-SSj6mZQ.png","hostPageUrl":"https://blog.jayanthk.in/types-of-rag-an-overview-0e2b3ed71b82","contentSize":"17129 B","width":1024,"height":356,"cDNContentUrl":"https://th.bing.com/th/id/R.c443b90f4788da4c22b73751f18eed20?rik=C4IH%2bKObD9hASw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6100553EB27B88E996AF4B40D80F9BA3F807820B","accentColor":"572BA0"},"B2AEED613A3200C6E7FC12F59C0621792A528D4C":{"name":"Bitrefill offline after system vulnerability: partial restoration ...","thumbnailUrl":"https://tse3.mm.bing.net/th?id=OIF.HsuBuAM%2fiWY9vA4x2uithQ&pid=Api","datePublished":"2026-03-04T10:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://decripto.org/wp-content/uploads/2026/03/image-57-1024x683.png","hostPageUrl":"https://decripto.org/en/bitrefill-offline-after-system-vulnerability-partial-restoration-planned-for-4-march/","contentSize":"1180500 B","width":1024,"height":683,"cDNContentUrl":"https://th.bing.com/th/id/R.bc03a02a031f8a0c9f6cc0095ae01bd8?rik=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C4D825A2971260C95F21CF7E6C0023A316DEEA2B","accentColor":"C79104","isFresh":true},"1358A9E5C0807B7240F7AA9E12907E7565304C25":{"name":"Automation of System Security Vulnerabilities Detection Using Open ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.ZBFm_ewTXSTk-ZnA6Z9u5gHaGK?pid=Api","datePublished":"2024-02-24T09:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/electronics/electronics-13-00873/article_deploy/html/images/electronics-13-00873-g001-550.jpg?1708765490","hostPageUrl":"https://www.mdpi.com/2079-9292/13/5/873","contentSize":"26934 B","width":550,"height":458,"cDNContentUrl":"https://th.bing.com/th/id/R.641166fdec135d24e4f999c0e99f6ee6?rik=MYWaXgwItycEfw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"52C4035657E70921E9AA7F0427B7080C5E9A8531","accentColor":"2D579E"},"682376800113B4205C40D501A4B9816F322CFB5E":{"name":"Exploit Forge","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.7r2gvPXTGqwZ1g704hjAowHaGW?pid=Api","datePublished":"2023-06-03T21:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZNLcSaUe_tKv1lvCjqe1BrAlJhlohtmWNaRcNW4csb3uof2WCp_WWWiL97wlwhrAwelNtyh3ry8C8G1JbLSnEs9bpE-k5RJ_Ox27KrY9GYjocBRED08dNOfMYbAFR0MHoa-DwCfPVLPl8CzatayrgBVtP1oIyH0ZrP2QZ9_Yx2noeJADU6ZLpAForjeQ/w1600/common-web-application-vulnerabilities.jpg","hostPageUrl":"https://pygurutricks.in/","contentSize":"53106 B","width":700,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.eebda0bcf5d31aac19d60ef4e218c0a3?rik=hjJnCBAxSwLFBA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E5BFC223F6189B4A105D04C5024B311008673286","accentColor":"B01B2E"},"8FAA1461F814BA0AD052983429ED8D2CC42AE2A2":{"name":"Critical TeamViewer Vulnerability Allows File Deletion with SYSTEM ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.KEj7xkQS3TGB-SpTD0yYXwHaEz?pid=Api","datePublished":"2025-06-25T14:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogs.npav.net/media/magefan_blog/Critical_TeamViewer_Vulnerability_Allows_File_Deletion_with_SYSTEM_Privileges_3_.png","hostPageUrl":"https://blogs.npav.net/blogs/post/critical-teamviewer-vulnerability-allows-file-deletion-with-system-privileges","contentSize":"1098722 B","width":1080,"height":700,"cDNContentUrl":"https://th.bing.com/th/id/R.2848fbc64412dd3181f92a530f4c985f?rik=%2bKpBFo9Bq6ANJQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2A2EA24CC2D8DE924389250DA0AB418F1641AAF8","accentColor":"B65215"},"450A525CB9BB3626B971FA699E88B72BE3550016":{"name":"Types of RAG: An Overview. Retrieval Augmented Generation is the… | by ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.lJ84BjA8yo8LQuXOLP9C4AHaEK?pid=Api","datePublished":"2024-01-21T04:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://miro.medium.com/v2/resize:fit:1358/format:webp/1*78Ewd1vR-f_npT8F4prdrg.png","hostPageUrl":"https://blog.jayanthk.in/types-of-rag-an-overview-0e2b3ed71b82","contentSize":"27768 B","width":930,"height":522,"cDNContentUrl":"https://th.bing.com/th/id/R.949f3806303cca8f0b42e5ce2cff42e0?rik=VKAlxZu7Y2KbFw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6100553EB27B88E996AF179B6263BB9BC525A054","accentColor":"BC710F"},"8DD1685104EB7BC7538FFA699E88B72BE3550016":{"name":"Types of RAG: An Overview. Retrieval Augmented Generation is the… | by ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.YVxNtdWKc5K3YOMVSuY4xwHaFK?pid=Api","datePublished":"2024-01-21T04:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://miro.medium.com/v2/resize:fit:1358/format:webp/1*Y8ubvRkR_BYexGDWouEpWQ.png","hostPageUrl":"https://blog.jayanthk.in/types-of-rag-an-overview-0e2b3ed71b82","contentSize":"108402 B","width":1358,"height":947,"cDNContentUrl":"https://th.bing.com/th/id/R.615c4db5d58a7392b760e3154ae638c7?rik=2B2GFUC%2bt3w1%2bA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6100553EB27B88E996AFF8357CB7BE4015861DD8","accentColor":"045852"},"0D669858AA44FEAEAF66FA699E88B72BE3550016":{"name":"Types of RAG: An Overview. Retrieval Augmented Generation is the… | by ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.up82WR90Srwcdu-h8SwDIAHaF0?pid=Api","datePublished":"2024-01-21T04:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://miro.medium.com/v2/resize:fit:1358/1*xfhRl-AJMhxAYXazeycSyg.png","hostPageUrl":"https://blog.jayanthk.in/types-of-rag-an-overview-0e2b3ed71b82","contentSize":"658927 B","width":1200,"height":944,"cDNContentUrl":"https://th.bing.com/th/id/R.ba9f36591f744abc1c76efa1f12c0320?rik=0GaJhapE7%2br6Zg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6100553EB27B88E996AF66FAEAEF44AA858966D0","accentColor":"BE8A0D"},"055FB2DC0E340172D609393C58E06054535D9EE7":{"name":"Development of Vulnerability Assessment Framework for Disaster Risk ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.yETa_1N70yngy1Lp-ReReAHaHe?pid=Api","datePublished":"2020-10-23T12:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/sustainability/sustainability-12-08815/article_deploy/html/images/sustainability-12-08815-g001.png","hostPageUrl":"https://www.mdpi.com/2071-1050/12/21/8815","contentSize":"30501 B","width":2337,"height":2357,"cDNContentUrl":"https://th.bing.com/th/id/R.c844daff537bd329e0cb52e9f9179178?rik=UPUrzeBDECdtkA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7EE9D53545060E85C393906D271043E0CD2BF550","accentColor":"1E80AD"},"55198DFB4711A0C55126C0883A974C4002E58907":{"name":"Data-Driven Threat Analysis for Ensuring Security in Cloud Enabled Systems","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.M7MHuHYv65K7chHrayCjDQHaFM?pid=Api","datePublished":"2022-07-30T13:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/sensors/sensors-22-05726/article_deploy/html/images/sensors-22-05726-g001.png","hostPageUrl":"https://www.mdpi.com/1424-8220/22/15/5726","contentSize":"594768 B","width":1822,"height":1279,"cDNContentUrl":"https://th.bing.com/th/id/R.33b307b8762feb92bb7211eb6b20a30d?rik=VZHYv3QRClwVYg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"70985E2004C479A3880C62155C0A1174BFD89155","accentColor":"666566"},"83C709ED1F2FB594B88556397E6B52B7D01E184C":{"name":"Critical Vulnerability in Mitsubishi Electric AC Systems Allows Remote ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.BN_eEKg_MGn0JBMZqdJagQHaEz?pid=Api","datePublished":"2025-06-27T11:11:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://blogs.npav.net/media/magefan_blog/Critical_Vulnerability_in_Mitsubishi_Electric_AC_Systems_Allows_Remote_Control_3_.png","hostPageUrl":"https://blogs.npav.net/blogs/post/critical-vulnerability-in-mitsubishi-electric-ac-systems-allows-remote-control","contentSize":"1161174 B","width":1080,"height":700,"cDNContentUrl":"https://th.bing.com/th/id/R.04dfde10a83f3069f4241319a9d25a81?rik=OHyQ3vHyW0mLWA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C481E10D7B25B6E79365588B495BF2F1DE907C38","accentColor":"018A47"},"3D349A91369C8F621CD7F52DFECB8E06DB1D9C1F":{"name":"Protecting our Critical Infrastructure | U.S. GAO","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.Tdf67pWI3Je8-EJDHzdmrAHaE9?pid=Api","datePublished":"2019-11-22T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.gao.gov/assets/gao_blog/inline/4_8.png","hostPageUrl":"https://www.gao.gov/blog/2019/11/22/protecting-our-critical-infrastructure","contentSize":"754409 B","width":1173,"height":786,"cDNContentUrl":"https://th.bing.com/th/id/R.4dd7faee9588dc97bcf842431f3766ac?rik=00OpGWPJ%2bCbBfQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F1C9D1BD60E8BCEFD25F7DC126F8C96319A943D3","accentColor":"8D1F2C"},"0AA93679CCE508ABB4A3596E39D399DD9CC25B8B":{"name":"Exploit Kit - Definition - Trend Micro IN","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.AXSfjXG_lnLSRwwaszRn6gHaEP?pid=Api","datePublished":"2019-04-09T01:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://documents.trendmicro.com/images/tex/articles/exploitkit-figure-1.jpg","hostPageUrl":"http://www.trendmicro.co.in/vinfo/in/security/definition/exploit-kit","contentSize":"123862 B","width":1500,"height":858,"cDNContentUrl":"https://th.bing.com/th/id/R.01749f8d71bf9672d2470c1ab33467ea?rik=oJpjl8xegLpLOg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B8B52CC9DD993D93E6953A4BBA805ECC97639AA0","accentColor":"C78B04"},"B33F22511E0499B42D4B6CE4B3B78B25238DC30B":{"name":"A guide to implement effective cloud vulnerability scanning | nasscom ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.1vF25VD0pQBnph3u_9UWJAHaEo?pid=Api","datePublished":"2023-05-09T08:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://community.nasscom.in/sites/default/files/media/images/Secure-your-cloud-with-vulnerability-scanning-Nasscom.jpg","hostPageUrl":"https://community.nasscom.in/communities/cyber-security-privacy/guide-implement-effective-cloud-vulnerability-scanning","contentSize":"258453 B","width":960,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.d6f176e550f4a50067a61deeffd51624?rik=O%2fMiFeFAmUvStA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B03CD83252B87B3B4EC6B4D24B9940E11522F33B","accentColor":"C97E02"},"798C3916AAA164E3A82BAC8C8B8790E28E6D296A":{"name":"An Intelligent Attack Detection Framework for the Internet of ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.ghhnK_JovZgJ2Kx2uwRBxQHaDl?pid=Api","datePublished":"2024-08-08T10:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/wevj/wevj-15-00356/article_deploy/html/images/wevj-15-00356-g001.png","hostPageUrl":"https://www.mdpi.com/2032-6653/15/8/356","contentSize":"1181708 B","width":3040,"height":1475,"cDNContentUrl":"https://th.bing.com/th/id/R.8218672bf268bd9809d8ac76bb0441c5?rik=l8iTYaoaRj6Ksg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A692D6E82E0978B8C8CAB28A3E461AAA6193C897","accentColor":"BE930D"},"8C014D0EBBBCDA0579B465F81B6C57016D270CFF":{"name":"Complete Guide: Build Production-Ready RAG Systems with LangChain and ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.vDZ1qxN11EhftkaBdaNkUwHaHa?pid=Api","datePublished":"2025-08-25T06:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://python.elitedev.in/images/24bfcadc-34db-429e-93f0-ad7a66bd0a7c.webp","hostPageUrl":"https://python.elitedev.in/large_language_model/complete-guide-build-production-ready-rag-systems-with-langchain-and-vector-databases-in-2024-03bbca61/","contentSize":"84746 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.bc3675ab1375d4485fb6468175a36453?rik=yBDU4LvLrVCXSw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FFC072D61075C6B18F564B9750ADCBBBE0D410C8","accentColor":"0B7BC0"},"A2E4A4C2BA1D3EA5A48F1BA04C1E9204D1D8D07E":{"name":"Falcon Spotlight: Scanless Vulnerability Management","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.of8b3X11NVhg2ceuez6OJwHaDo?pid=Api","datePublished":"2021-03-06T17:33:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.crowdstrike.com/wp-content/uploads/2020/04/falcon-spotlight-vulnerability-assessment-dashboard.png","hostPageUrl":"https://www.electroon.com/cyber-security/antiviruses/falcon-spotlight-scanless-vulnerability-management/","contentSize":"162767 B","width":1600,"height":784,"cDNContentUrl":"https://th.bing.com/th/id/R.a1ff1bdd7d75355860d9c7ae7b3e8e27?rik=Kk5KLKvR41pK%2bA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E70D8D1D4029E1C40AB1F84A5AE3D1AB2C4A4E2A","accentColor":"C28B09"},"C33B10AFE091F3F9348CDB23039391D02438D2E0":{"name":"Buy Evaluating Cryptographic Vulnerabilities Created by Quantum ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.XjhxrMURjhBMJobNN5D4ngAAAA?pid=Api","datePublished":"2023-10-25T20:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41ZMx1ACemL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Evaluating-Cryptographic-Vulnerabilities-Computing-Industrial/dp/1977411886","contentSize":"18527 B","width":296,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.5e3871acc5118e104c2686cd3790f89e?rik=PLMB%2bg4ZP59DyA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0E2D83420D19393032BDC8439F3F190EFA01B33C","accentColor":"187AB3"},"F9E1B84062B01A550E5DD8BC018B0BD76191E01B":{"name":"How to Build Production-Ready RAG Systems with LangChain and Vector ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.aPMepr1UqSPtmxxKCp4y9wHaHa?pid=Api","datePublished":"2025-08-31T00:47:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://python.elitedev.in/images/9aca2efb-d2af-431a-80c7-5d1b5fbb3977.webp","hostPageUrl":"https://python.elitedev.in/large_language_model/how-to-build-production-ready-rag-systems-with-langchain-and-vector-databases-in-python-2024-f1ff1b5a/","contentSize":"110500 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.68f31ea6bd54a923ed9b1c4a0a9e32f7?rik=nx6LBCYLoVXg1Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B10E19167DB0B810CB8DD5E055A10B26048B1E9F","accentColor":"0C4464"},"20AE01531D7567C55D16525F0ABB98BC09F904EF":{"name":"Automated penetration testing services – T-Systems","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.rdkB87xiphnq4EufgfjK9wHaE8?pid=Api","datePublished":"2024-06-04T09:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.t-systems.com/resource/image/949816/ratio3x2/1440/960/f1bf670777503b584a2e277ee6783568/6A7AAADDAA8B1F893B56D857724C6A66/im-automated-penetration-testing-services-for-businesses.webp","hostPageUrl":"https://www.t-systems.com/in/en/security/solutions/automated-penetration-testing-services","contentSize":"38580 B","width":1440,"height":960,"cDNContentUrl":"https://th.bing.com/th/id/R.add901f3bc62a619eae04b9f81f8caf7?rik=AuoQNdFXdlzVYQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FE409F90CB89BBA0F52561D55C7657D13510EA02","accentColor":"184364"},"3D1E7EEB41E2EB7573725B18B4ABBDCB2398B84E":{"name":"Production-Ready RAG Systems with LangChain: Complete Vector Database ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.y1ovhd_6lGEXMIK2PMt__wHaHa?pid=Api","datePublished":"2025-09-06T17:07:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://python.elitedev.in/images/074747de-ecea-4eb3-972d-3f78d96c8adb.webp","hostPageUrl":"https://python.elitedev.in/large_language_model/production-ready-rag-systems-with-langchain-complete-vector-database-implementation-guide-b52da694/","contentSize":"76992 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.cb5a2f85dffa9461173082b63ccb7fff?rik=0%2bHnvhQuvlc3Jw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E48B8932BCDBBA4B81B5273757BE2E14BEE7E1D3","accentColor":"104A61"},"AC8C5CDFE600609DA2CB5BA0D3773651312CD3DA":{"name":"Ecosystem-Based Disaster Risk Reduction Framework as a Tool for ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.uhxzmIxlgGWXLVDDiigCvwHaGL?pid=Api","datePublished":"2022-10-25T11:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/environsciproc/environsciproc-21-00040/article_deploy/html/images/environsciproc-21-00040-g001-550.jpg?1666698334","hostPageUrl":"https://www.mdpi.com/2673-4931/21/1/40","contentSize":"45277 B","width":550,"height":459,"cDNContentUrl":"https://th.bing.com/th/id/R.ba1c73988c658065972d50c38a2802bf?rik=ysjF%2fW4ABtkqvA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AD3DC2131563773D0AB5BC2AD906006EFDC5C8CA","accentColor":"C00B0C"},"3208C3CC58A2164843F8A524163A6E3F9FE402ED":{"name":"Production-Ready RAG Systems with LangChain Vector Databases Complete ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.DVTCdlFoQsHq8bM-fCXp0QHaHa?pid=Api","datePublished":"2025-09-20T12:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://python.elitedev.in/images/8bf2ead6-b9ce-422f-a660-569f103bacd4.webp","hostPageUrl":"https://python.elitedev.in/large_language_model/production-ready-rag-systems-with-langchain-vector-databases-complete-implementation-guide-a7d6769a/","contentSize":"77010 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.0d54c276516842c1eaf1b33e7c25e9d1?rik=I4A8zIUqYYQ0jw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DE204EF9F3E6A361425A8F3484612A85CC3C8023","accentColor":"0F446A"},"E8BBBB66765F634851A950EB0459A245538C363F":{"name":"What Is Web Security? | Akamai","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.a97Jb1oO57RsCd6PQljzFQHaEK?pid=Api","datePublished":"2024-07-25T00:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.akamai.com/site/en/images/article/2022/common-types-of-attack-vectors.png","hostPageUrl":"https://www.akamai.com/glossary/what-is-web-security","contentSize":"210982 B","width":1920,"height":1080,"cDNContentUrl":"https://th.bing.com/th/id/R.6bdec96f5a0ee7b46c09de8f4258f315?rik=jru7Zmf1NoQVmg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F363C835542A9540BE059A158436F56766BBBB8E","accentColor":"A2292D"},"B78B0DE23F7BA887F9F3DA302BBC4395A16A942E":{"name":"IoT Devices: Common Vulnerabilities and Solutions","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.d74T8NVfvoVHuQ6gOkSYEgHaDt?pid=Api","datePublished":"2025-04-09T13:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://rhosigma.in/uploads/iot-devices-common-vulnerabilities-solutions-1744198355637.jpg","hostPageUrl":"https://rhosigma.in/blog/iot-devices-common-vulnerabilities-solutions","contentSize":"36013 B","width":800,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.77be13f0d55fbe8547b90ea03a449812?rik=e7jQLvO3inifPw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E249A61A5934CBB203AD3F9F788AB7F32ED0B87B","accentColor":"129CB9"},"4E07F0B7DD19585B6C4D5246F357231855628F37":{"name":"Vulnerability Assessment Services in India | Cyforce","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.k1Q4dVjYPUoc_J2HaLWR8QHaFO?pid=Api","datePublished":"2022-03-05T07:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cyforce.in/images/img/vulnerability-assessment.jpg","hostPageUrl":"https://cyforce.in/vulnerability-assessment.html","contentSize":"136323 B","width":851,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.9354387558d83d4a1cfc9d8768b591f1?rik=5HAPe92RhbXG1A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"73F826558132753F6425D4C6B58591DD7B0F70E4","accentColor":"060E29"},"CE18B93946F3D34A5D6FAF92B52F20975CB6C3D5":{"name":"BMTPC","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.0WQ1b44W1pCR8K8gqDPkUwHaKu?pid=Api","datePublished":"2020-05-27T06:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.bmtpc.org/DataFiles/CMS/file/VAI2019/MAP/eqmap/EQ_JPG/EQ_INDIA.jpg","hostPageUrl":"https://www.bmtpc.org/topics.aspx?mid=56&Mid1=178","contentSize":"1983941 B","width":3199,"height":4634,"cDNContentUrl":"https://th.bing.com/th/id/R.d164356f8e16d69091f0af20a833e453?rik=7IGbk2Q%2fPaTV9g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5D3C6BC57902F25B29FAF6D5A43D3F64939B81EC","accentColor":"C68C05"},"D3AAF313B992773BC57198113C612CEA29DD735A":{"name":"MN MRWA Security Vulnerability & Emergency Response Plan SelfAssessment ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.T8LNfdlH9mhl6kTZSO_M5AAAAA?pid=Api","datePublished":"2020-12-06T18:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.pdffiller.com/preview/441/759/441759627.png","hostPageUrl":"https://www.uslegalforms.com/form-library/151858-mn-mrwa-security-vulnerability-emergency-response-plan-selfassessment-for-small-water-systems","contentSize":"14197 B","width":298,"height":386,"cDNContentUrl":"https://th.bing.com/th/id/R.4fc2cd7dd947f66865ea44d948efcce4?rik=Pao%2fMZspd7NcFw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A537DD92AEC216C31189175CB377299B313FAA3D","accentColor":"A72434"},"41402A4B781EEBCC0EE8536BDEBBDED948112AB0":{"name":"Buy Security of Cyber-Physical Systems: Vulnerability and Impact Book ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.LJFYLLJUV347jmHQ77rB1gAAAA?pid=Api","datePublished":"2021-07-31T00:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41vzhEnmypS._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Security-Cyber-Physical-Systems-Vulnerability-Impact/dp/3030455432","contentSize":"14077 B","width":294,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.2c91582cb254577e3b8e61d0efbac1d6?rik=FASitIfhvszgjg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0BA211849DEDBBEDB6358EE0CCBEE187B4A20414","accentColor":"2C5364"},"D08C81E8E71D68DAA1141B9D4DF4F54D31A3B6EE":{"name":"Illegal constructions, weak drainage systems worsen PoJK's disaster ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.xU1kJN3BE5EaA8ncFLXzmQHaFj?pid=Api","datePublished":"2025-09-03T07:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d3lzcn6mbbadaf.cloudfront.net/media/details/ANI-20250903084446.jpg","hostPageUrl":"https://www.aninews.in/news/world/asia/illegal-constructions-weak-drainage-systems-worsen-pojks-disaster-vulnerability20250903141925/","contentSize":"275297 B","width":600,"height":450,"cDNContentUrl":"https://th.bing.com/th/id/R.c54d6424ddc113911a03c9dc14b5f399?rik=DcgYjn7Rhq0aQQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EE6B3A13D45F4FD4D9B1411AAD86D17E8E18C80D","accentColor":"4B5F20"},"F521036C6AFC04C30805F75F17A22834D9739067":{"name":"Water Leakage Detection System -Asha Enterprise India, AHMEDABAD","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.LUTQY_alQRy7uCdS3ENR1AHaEG?pid=Api","datePublished":"2025-08-19T18:46:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://productimages.withfloats.com/actual/68087572f165dc78820ae3f6.jpg","hostPageUrl":"https://www.ashaenterprise.in/products/water-leakage-detection-system/20","contentSize":"52354 B","width":1300,"height":719,"cDNContentUrl":"https://th.bing.com/th/id/R.2d44d063f6a5411cbbb82752dc4351d4?rik=XxIwxqbPQDyAUA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7609379D43822A71F57F50803C40CFA6C630125F","accentColor":"2B6CA0"},"8D494275BB56D336F2FAF75F17A22834D9739067":{"name":"Water Leakage Detection System -Asha Enterprise India, AHMEDABAD","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.4Fo0U3s69drn82ykQEst1QHaDq?pid=Api","datePublished":"2025-08-19T18:46:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://web.s-cdn.boostkit.dev/webaction-files/5ac4f587beef72050ad4e284_product_images/wldfs-2-68087569a34066c615699bd9.png","hostPageUrl":"https://www.ashaenterprise.in/products/water-leakage-detection-system/20","contentSize":"615916 B","width":1019,"height":505,"cDNContentUrl":"https://th.bing.com/th/id/R.e05a34537b3af5dae7f36ca4404b2dd5?rik=2JQkV7tlPWMvrw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7609379D43822A71F57FAF2F633D65BB572494D8","accentColor":"004175"},"904CB9DC2EC2EF491F4E33E08229370A35EDB13D":{"name":"Vulnerability Assessment of Physical Protection Systems eBook : Garcia ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.RSrRM3oTkdMtcVJSc7-jIgAAAA?pid=Api","datePublished":"2005-12-08T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/51j-SJscFxL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Vulnerability-Assessment-Physical-Protection-Systems-ebook/dp/B001V7U7K4","contentSize":"28678 B","width":312,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.452ad1337a1391d32d71525273bfa322?rik=CcSbzeIs%2fpTx5A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D31BDE53A07392280E33E4F194FE2CE2CD9BC409","accentColor":"054975"},"1DE7DD34BB7E007050A7DD4E99BEBD3C2FE1872D":{"name":"Early Warning System and Drought Vulnerability in Ilemi Turkana Kenya ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.u-o6SDH9mqxPDf0lq7kn2gAAAA?pid=Api","datePublished":"2022-04-29T12:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://rukmini1.flixcart.com/image/300/300/kjhgzgw0-0/book/w/2/q/early-warning-system-and-drought-vulnerability-in-ilemi-turkana-original-imafzfggkhqgwhkj.jpeg","hostPageUrl":"https://www.flipkart.com/early-warning-system-drought-vulnerability-ilemi-turkana-kenya/p/itm5e365a3b39cec","contentSize":"17600 B","width":200,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.bbea3a4831fd9aac4f0dfd25abb927da?rik=0X7dQ7vnAAcFeg&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fkjhgzgw0-0%2fbook%2fw%2f2%2fq%2fearly-warning-system-and-drought-vulnerability-in-ilemi-turkana-original-imafzfggkhqgwhkj.jpeg&ehk=RbeElkPxa8YyFWD2ShzdCg0D7Led5b10P3Z2W9LldvA%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D2781EF2C3DBEB99E4DD7A050700E7BB43DD7ED1","accentColor":"AB2022"},"10643F4E9F18C7AB788300273EE564161CC7E0CE":{"name":"Buy Topmate Products Online at Best Prices in India | Ubuy","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.JxPszUlWVxKVjU89AE7xCQHaD1?pid=Api","datePublished":"2021-04-07T00:20:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images-cdn.ubuy.co.in/633aba5bb961822663096fbe-topmate-c5-laptop-cooling-pad-gaming.jpg","hostPageUrl":"https://www.ubuy.co.in/brand/topmate","contentSize":"276652 B","width":1500,"height":777,"cDNContentUrl":"https://th.bing.com/th/id/R.2713eccd49565712958d4f3d004ef109?rik=AUbz5PmBfLqHOA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EC0E7CC161465EE372003887BA7C81F9E4F34601","accentColor":"1A22B1"},"21F51B88F460A9570BE7F6798E88E22C8DAC574F":{"name":"Natural language question answering in Wikipedia - an exploration ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.eGn2-t13xawtbfEKahSCtwHaEY?pid=Api","datePublished":"2023-07-21T08:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://docs.aws.amazon.com/images/sagemaker/latest/dg/images/jumpstart/jumpstart-fm-rag.jpg","hostPageUrl":"https://thottingal.in/blog/2023/07/21/wikiqa/","contentSize":"42727 B","width":898,"height":532,"cDNContentUrl":"https://th.bing.com/th/id/R.7869f6fadd77c5ac2d6df10a6a1482b7?rik=El%2bxiE8GmnWwfg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F475CAD8C22E88E8976F7EB0759A064F88B15F12","accentColor":"0C614D"},"754651D064429623C9F73D3C88EF111576BCE5B4":{"name":"Cybersecurity for Large Language Models: Protecting AI Systems from ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.aeQPVOm7u0QsLiKo_dnA8AAAAA?pid=Api","datePublished":"2024-10-07T03:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/51KIV36DUXL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Cybersecurity-Large-Language-Models-Vulnerabilities-ebook/dp/B0DD7SHZ2Y","contentSize":"28956 B","width":279,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.69e40f54e9bbbb442c2e22a8fdd9c0f0?rik=V2QVDUYkaTKcfw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4B5ECB675111FE88C3D37F9C326924460D156457","accentColor":"658D3E"},"B3D6F6D130F9FBB09F5BE31E2F55D1A2E61737DE":{"name":"Build Production-Ready RAG Systems: Complete LangChain Vector Database ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.TDJS9SXFM6PX1ebcQyPHGQHaHa?pid=Api","datePublished":"2025-09-08T00:52:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://python.elitedev.in/images/c8633024-38c0-4733-9b77-6a500c0c6ac4.webp","hostPageUrl":"https://python.elitedev.in/large_language_model/build-production-ready-rag-systems-complete-langchain-vector-database-implementation-guide-for-2024/","contentSize":"86192 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.4c3252f525c533a3d7d5e6dc4323c719?rik=O21vHQOfvwv5tQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"ED73716E2A1D55F2E13EB5F90BBF9F031D6F6D3B","accentColor":"0B416B"},"66E88FC04875619EACBB01C7728573BD8894DFA4":{"name":"Introduction to Solar PV and Diesel Generator Hybrid System","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP._D6_tbDMYW8QGCu52j2ioAHaEK?pid=Api","datePublished":"2023-07-21T03:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://edisonlms-fs.s3.us-east-2.amazonaws.com/tenant_renewableenergystudygroup/4611399a-8089-47a1-bbb2-1c9806a0e9a9_1689850929113_Intro-Lecture-PV-DG.jpg","hostPageUrl":"https://renewableenergystudygroup.in/store/Introduction-to-Solar-PV-and-Diesel-Generator-Hybrid-System-5yy6gcjdr579","contentSize":"277041 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.fc3ebfb5b0cc616f10182bb9da3da2a0?rik=Zo74DIRXFunKuw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4AFD4988DB3758277C10BBCAE91657840CF88E66","accentColor":"86733B"},"40D8AAD307F3922BB79D45C094411E82055DEF28":{"name":"Databricks Liquid Clustering: A Practical Guide | by Anurag Kumar | Aidetic","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.yMAUjZcTmnIFQSE7aJeIJQHaHL?pid=Api","datePublished":"2025-01-28T18:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://miro.medium.com/v2/resize:fit:1358/0*Ach5MoW36UTwW7Xg.png","hostPageUrl":"https://blog.aidetic.in/databricks-liquid-clustering-a-practical-guide-221e4d563266","contentSize":"478968 B","width":1260,"height":1221,"cDNContentUrl":"https://th.bing.com/th/id/R.c8c0148d97139a720541213b68978825?rik=BI2qPXA%2fKbJ72Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"82FED55028E114490C54D97BB2293F703DAA8D04","accentColor":"BD5C0E"},"A324772D1613153FCD4373FDDFCA6339B85A1073":{"name":"Modular Healthcare System in Greater Noida","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.y8Ioc_XpD09WNF_NYSCGHgHaDP?pid=Api","datePublished":"2024-11-02T11:41:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://backgroundimages.withfloats.com/actual/673e0142dc6cff61d650fe0d.jpg","hostPageUrl":"https://www.modularoperationtheatre.co.in/","contentSize":"105883 B","width":1198,"height":525,"cDNContentUrl":"https://th.bing.com/th/id/R.cbc22873f5e90f4f56345fcd6120861e?rik=OkJ30mExUfPcNA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3701A58B9336ACFDDF3734DCF3513161D277423A","accentColor":"161E88"},"151A67A85E723386B34165DF7C7D864538E7BBAF":{"name":"Exposed Vulnerability of the Supply Chain System","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.v3Z-N9ana2ZHeRZeW-D9IwHaEO?pid=Api","datePublished":"2020-08-09T06:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://peaklife.in/uploads/2020/07/Exposed-Vulnerability-of-the-Supply-Chain-System-cover-image.jpg","hostPageUrl":"https://peaklife.in/exposed-vulnerability-of-the-supply-chain-system/","contentSize":"281513 B","width":900,"height":514,"cDNContentUrl":"https://th.bing.com/th/id/R.bf767e37d6a76b664779165e5be0fd23?rik=UaF2iuUnM2g7FA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FABB7E835468D7C7FD56143B683327E58A76A151","accentColor":"A26829"},"3C12425FCB7FDA01A974C22B15AE98EDDF2D37D6":{"name":"Vulnerability Details","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.jEpxUqWWKRkqBNEk4BFmtAHaFW?pid=Api","datePublished":"2023-06-29T12:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://qualysguard.qg1.apps.qualys.in/portal-help/en/vm/images/group_by_download.png","hostPageUrl":"https://qualysguard.qg1.apps.qualys.in/portal-help/en/vm/assets/vulnerability_details.htm","contentSize":"63279 B","width":866,"height":625,"cDNContentUrl":"https://th.bing.com/th/id/R.8c4a7152a59629192a04d124e01166b4?rik=wyEk9bz3rRCaRw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6D73D2FDDE89EA51B22C479A10ADF7BCF52421C3","accentColor":"0053AD"},"8AAFED33F70473BDC09AEC37B09CD6B1B87060AE":{"name":"Aerosol Fire Suppression System -Asha Enterprise India, AHMEDABAD","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.cxH1F5Wx52FAeZXEsohT8gHaJ4?pid=Api","datePublished":"2025-07-27T14:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://productimages.withfloats.com/actual/68087244256442c04913f9d6.jpg","hostPageUrl":"https://www.ashaenterprise.in/products/aerosol-fire-suppression-system/15","contentSize":"141503 B","width":1200,"height":1600,"cDNContentUrl":"https://th.bing.com/th/id/R.7311f51795b1e761407995c4b28853f2?rik=qPreM39AN9sMqQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EA06078B1B6DC90B73CEA90CDB37407F33DEFAA8","accentColor":"853C35"},"2122374CA9D687378E3FEAD958A05A713AB73776":{"name":"Buy Unemployment, Social Vulnerability, and Health in Europe (Health ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.Bn2Lcdcna7Jw1q9jhpxBHgAAAA?pid=Api","datePublished":"2018-02-22T20:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41pcbJ2ycpL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Unemployment-Social-Vulnerability-Systems-Research/dp/3540178678","contentSize":"11283 B","width":312,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.067d8b71d7276bb270d6af63869c411e?rik=EiJzxJpteHPo8w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"67737BA317A50A859DAEF3E873786D9AC4732212","accentColor":"016BAC"},"1998D3A0671C6916F3C201AA1A862CBA6174F88D":{"name":"Tube Settler System - Envista","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.gUmzTIyTSdfisEXTASDsaQHaJ4?pid=Api","datePublished":"2023-05-01T06:13:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://envista.co.in/assets/uploads/product-featured-218.jpg","hostPageUrl":"https://envista.co.in/product/tube-settler-system","contentSize":"99071 B","width":768,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.8149b34c8c9349d7e2b045d30120ec69?rik=kYk9CnbBlmE%2fLA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D88F4716ABC268A1AA102C3F6196C1760A3D8991","accentColor":"7D624E"},"E3940803A4FA8E754DF1DB9734465CD1F255C20B":{"name":"Build Production-Ready RAG Systems with LangChain and Vector Databases ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP._WqOXCHeQiXU-zTMAAHxrQHaHa?pid=Api","datePublished":"2025-09-17T13:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://python.elitedev.in/images/62237d78-fcf5-4d15-91ad-c592340dd449.webp","hostPageUrl":"https://python.elitedev.in/large_language_model/build-production-ready-rag-systems-with-langchain-and-vector-databases-complete-implementation-guid-aabb103f/","contentSize":"155728 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.fd6a8e5c21de4225d4fb34cc0001f1ad?rik=PkmAMEqv6FfUHw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B02C552F1DC5644379BD1FD457E8AF4A3080493E","accentColor":"014CAF"},"F8BB473B7F39FC2C6FE5717996B29B117E3ED8EC":{"name":"Complete Guide to Building Production-Ready RAG Systems: LangChain ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.w1uhvdyM9rtMa_QYoy9XewHaHa?pid=Api","datePublished":"2025-09-16T22:59:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://python.elitedev.in/images/7d1e10ae-a16a-49f7-90b6-97f5bb59b205.webp","hostPageUrl":"https://python.elitedev.in/large_language_model/complete-guide-to-building-production-ready-rag-systems-langchain-vector-databases-and-document-q-a461ab21/","contentSize":"85674 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.c35ba1bddc8cf6bb4c6bf418a32f577b?rik=j7t0s%2feTz8L2Xg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CE8DE3E711B92B6997175EF6C2CF93F7B374BB8F","accentColor":"128BB9"},"060DEDD0FFCDB869924BAADFEF6C4F5F134415AF":{"name":"Somya Sharma | AI/ML Engineer & RAG Systems Expert","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.fLZwy6AmZjevB8gG-5JKEQHaFO?pid=Api","datePublished":"2025-08-21T22:59:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://somya-sharma.in/images/workshop03.jpg","hostPageUrl":"https://somya-sharma.in/","contentSize":"69462 B","width":800,"height":565,"cDNContentUrl":"https://th.bing.com/th/id/R.7cb670cba0266637af07c806fb924a11?rik=YNDeDf%2fci5YptA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"FA514431F5F4C6FEFDAAB429968BDCFF0DDED060","accentColor":"0836C3"},"6782287824B0907FDF6706EFF6BBCB2BC638546F":{"name":"How Do 5G and SD-WAN Work Together? - Palo Alto Networks","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.IcACPhNQlcOclz2ESQgHlQHaEK?pid=Api","datePublished":"2024-07-21T17:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.paloaltonetworks.in/content/dam/pan/en_US/images/cyberpedia/sdwan-and-5g/5g-threat-landscape.png","hostPageUrl":"https://www.paloaltonetworks.in/cyberpedia/sdwan-and-5g","contentSize":"80128 B","width":1600,"height":900,"cDNContentUrl":"https://th.bing.com/th/id/R.21c0023e135095c39c973d8449080795?rik=diiCh0ILCff9dg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F645836CB2BCBB6FFE6076FDF7090B4287822876","accentColor":"00A8C0"},"750DFA49AC5094F3E121AF92B52F20975CB6C3D5":{"name":"BMTPC","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.kit-n-uGcHFT4j87jxm9wQHaK1?pid=Api","datePublished":"2020-05-27T06:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.bmtpc.org/DataFiles/CMS/file/VAI2019/MAP/lsmap/ls_jpg/LS_India.jpg","hostPageUrl":"https://www.bmtpc.org/topics.aspx?mid=56&Mid1=178","contentSize":"583219 B","width":2148,"height":3143,"cDNContentUrl":"https://th.bing.com/th/id/R.922b7e9feb86707153e23f3b8f19bdc1?rik=V9CvlMoFST8eEg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5D3C6BC57902F25B29FA121E3F4905CA94AFD057","accentColor":"0FBCBC"},"F185A39B366C3CB53E13256C1B9677CABC0750D3":{"name":"Buy Solar System Planets Designs Products Online | Ubuy India","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.G2iKip-YltVn1LfznHykMwHaG2?pid=Api","datePublished":"2023-07-12T21:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images-cdn.ubuy.co.in/63400444e55ad53d0844ad75-hgod-designs-outer-space-pillow-case.jpg","hostPageUrl":"https://www.ubuy.co.in/brand/solar-system-planets-designs","contentSize":"93663 B","width":908,"height":840,"cDNContentUrl":"https://th.bing.com/th/id/R.1b688a8a9f9896d567d4b7f39c7ca433?rik=H1g6uWPGw1vjMQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3D0570CBAC7769B1C65231E35BC3C663B93A581F","accentColor":"147C86"},"E459F901E8F586297C7D1B442A03243C51F5353B":{"name":"Buy DYNAMIC VULNERABILITY ASSESSMENT AND INTELLIGENT CONTROL: FOR ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.6WZ-EBh10IMS2WAZne3luAAAAA?pid=Api","datePublished":"2020-10-24T18:56:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/61SLIofxcjL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/DYNAMIC-VULNERABILITY-ASSESSMENT-INTELLIGENT-CONTROL/dp/1119214955","contentSize":"25480 B","width":310,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.e9667e101875d08312d960199dede5b8?rik=TpWfEI5faJLH1w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B3535F15C34230A244B1D7C792685F8E109F954E","accentColor":"4A275C"},"D9DAE96AB381C48A223E5CAE68FEF48C4690F924":{"name":"Buy Trafficking Trajectories: Vulnerability, Failed Systems, and the ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.y1HHHdSUNc71qJTm4FXM7wAAAA?pid=Api","datePublished":"2025-05-13T01:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/413kQyWT5JL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Trafficking-Trajectories-Vulnerability-Systems-Prevention/dp/1512827835","contentSize":"15445 B","width":296,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.cb51c71dd49435cef5a894e6e055ccef?rik=na2epjsYTKgi4w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"429F0964C84FEF86EAC5E322A84C183BA69EAD9D","accentColor":"11252F"},"3C4DAAB44C83773CE21DEB38129D60FB9FD40B89":{"name":"Build Production-Ready RAG Systems: Complete LangChain Python Guide ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.XZszV3pj-gxjfNh8IzByHQHaHa?pid=Api","datePublished":"2025-09-11T00:20:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://python.elitedev.in/images/6d78d082-dd39-4638-a1b9-ebd87f42ab43.webp","hostPageUrl":"https://python.elitedev.in/large_language_model/build-production-ready-rag-systems-complete-langchain-python-guide-with-vector-databases-and-optimi-3ead6ab6/","contentSize":"123810 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.5d9b33577a63fa0c637cd87c2330721d?rik=w9SqS8Q4d8Mu0Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"98B04DF9BF06D92183BED12EC37738C44BAAD4C3","accentColor":"194262"},"DA2941FEB3F03CAFF943AFDBB586AD1E4AD3CFF4":{"name":"How to Build Production-Ready RAG Systems with LangChain and Vector ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.zKwW-cTbb7K2oYpSIbANSQHaHa?pid=Api","datePublished":"2025-10-04T20:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://python.elitedev.in/images/99363a8a-be41-4c14-a562-27b366e9d840.webp","hostPageUrl":"https://python.elitedev.in/large_language_model/how-to-build-production-ready-rag-systems-with-langchain-and-vector-databases-in-python-00c2723a/","contentSize":"139176 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.ccac16f9c4db6fb2b6a18a5221b00d49?rik=rZIU7zsPw%2fqfNA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4FFC3DA4E1DA685BBDFA349FFAC30F3BEF1492AD","accentColor":"1299B9"},"D62F326C99245327CC624F73EF8537349FA58BCA":{"name":"Build Production-Ready RAG Systems with LangChain and Vector Databases ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.IP2J30DA07dZRw_CYilrPgHaHa?pid=Api","datePublished":"2025-09-26T05:07:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://python.elitedev.in/images/cebc2210-c6d9-43b0-91af-4571440391b5.webp","hostPageUrl":"https://python.elitedev.in/large_language_model/build-production-ready-rag-systems-with-langchain-and-vector-databases-complete-implementation-guid-20443cd5/","contentSize":"87050 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.20fd89df40c0d3b759470fc262296b3e?rik=bfIjxplCNXLMJg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"ACB85AF9437358FE37F426CC72354299C623F26D","accentColor":"169EB5"},"D5C7AC1A8A68AD43EDFC3EECD9A31AF954EA88B5":{"name":"Indrajaal Partners with Sigma Advanced Systems for Indigenous Anti ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.ipjCj05MPZ5PkxUEV-QuBwHaD6?pid=Api","datePublished":"2023-09-25T12:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img-cdn.thepublive.com/fit-in/1200x675/filters:format(webp)/smstreet/media/post_banners/oGQA5c4t0rl9yYiGitAB.jpg","hostPageUrl":"https://smestreet.in/infocus/indrajaal-partners-with-sigma-advanced-systems-for-indigenous-anti-drone-defence-manufacturing/","contentSize":"74024 B","width":1200,"height":634,"cDNContentUrl":"https://th.bing.com/th/id/R.8a98c28f4e4c3d9e4f93150457e42e07?rik=XXzKoaiG2jTezw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5B88AE459FA13A9DCEE3CFDE34DA86A8A1CA7C5D","accentColor":"134663"},"58DDF9BE93C36FE78950BD7361440AD39D1E2EE1":{"name":"Buy Resilience, Robustness, and Vulnerability of Transport Systems Book ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.s3stDQqXnJILWNuV3gG7RwAAAA?pid=Api","datePublished":"2024-11-18T06:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/51XICUoFqcL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Resilience-Robustness-Vulnerability-Transport-Systems/dp/3031130405","contentSize":"22601 B","width":296,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.b37b2d0d0a979c920b58db95de01bb47?rik=hd2f6zk89n6YBQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1EE2E1D93DA0441637DB05987EF63C39EB9FDD85","accentColor":"C67805"},"29A98069F38807749EADDA56C6A9E8CD11099C85":{"name":"Build Production-Ready RAG Systems: Complete LangChain Vector Database ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.kvJwVUc_8gOkQtR-0xEplgHaHa?pid=Api","datePublished":"2025-07-20T10:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://python.elitedev.in/images/984829cf-a603-4177-86a5-12556c102f25.webp","hostPageUrl":"https://python.elitedev.in/large_language_model/build-production-ready-rag-systems-complete-langchain-vector-database-guide-for-retrieval-augmented/","contentSize":"92920 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.92f27055473ff203a442d47ed3112996?rik=kpoIlj%2bIcEfp2g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"58C99011DC8E9A6C65ADDAE94770883F96089A92","accentColor":"1496B7"},"843782735D778A4F70291927B6A6C512968DE6D4":{"name":"Building Production-Ready RAG Systems with LangChain and Chroma ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.w9hB4Y_N3aocfvs67llEHQHaHa?pid=Api","datePublished":"2025-07-19T12:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://python.elitedev.in/images/f1c93111-86af-4aba-99e7-c25578f5b5e2.webp","hostPageUrl":"https://python.elitedev.in/large_language_model/building-production-ready-rag-systems-with-langchain-and-chroma-complete-document-retrieval-guide/","contentSize":"94212 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.c3d841e18fcdddaa1c7efb3aee59441d?rik=SHMoN9V3qPQHkg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4D6ED869215C6A6B72919207F4A877D537287348","accentColor":"1F86AC"},"DD02919026494B8B697B8F14FD6851216C61ABC7":{"name":"Vulnerability - Free icons","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.7x5VaJ3dW-f53D4kU4iHmAHaHa?pid=Api","datePublished":"2025-03-02T00:56:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn-icons-png.flaticon.com/512/16873/16873738.png","hostPageUrl":"https://www.flaticon.com/free-icon/vulnerability_16873738","contentSize":"70397 B","width":512,"height":512,"cDNContentUrl":"https://th.bing.com/th/id/R.ef1e55689ddd5be7f9dc3e2453888798?rik=3SAZCWKUtLiWtw&pid=ImgRaw&r=0","isTransparent":true,"imageId":"7CBA16C6121586DF41F8B796B8B49462091920DD","accentColor":"035CC8"},"7ADDDB63A2900E4D4F65BA39F62A60F499F210D2":{"name":"Buy Funko Pop Products Online from Ubuy India","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.JytI9YONTNG3YRxn0R8RuwHaHN?pid=Api","datePublished":"2020-07-04T23:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images-cdn.ubuy.co.in/633abbc7645a0545f7101dc8-ubuy-online-shopping.jpg","hostPageUrl":"https://www.ubuy.co.in/brand/funko","contentSize":"237095 B","width":1500,"height":1459,"cDNContentUrl":"https://th.bing.com/th/id/R.272b48f5838d4cd1b7611c67d11f11bb?rik=p929NioJ4NT0Vg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2D012F994F06A26F93AB56F4D4E0092A36BDDDA7","accentColor":"B49A17"},"5ED29071BACE94DC1F2F2D745645A853511058F3":{"name":"Ultimate Guide to Tools and Techniques of Reconnaissance in Ethical Hacking","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.sKaloyW_cCOd5JblhYNWtgHaDt?pid=Api","datePublished":"2023-11-24T12:56:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.fita.in/wp-content/uploads/2023/11/Tools-and-Techniques-of-Reconnaissance-in-Ethical-Hacking-768x384.jpg","hostPageUrl":"https://www.fita.in/ultimate-guide-to-tools-and-techniques-of-reconnaissance-in-ethical-hacking/","contentSize":"55225 B","width":768,"height":384,"cDNContentUrl":"https://th.bing.com/th/id/R.b0a6a5a325bf70239de496e5858356b6?rik=5S0JF6vsSc3x8g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3F850115358A546547D2F2F1CD49ECAB17092DE5","accentColor":"CC4000"},"F38FE85AA8B808AE7E2273EF41672F02C8F06BDA":{"name":"Portable P.A. Systems","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.J0pFU8NFFMylfNfBkRTIBgHaHa?pid=Api","datePublished":"2017-12-28T11:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.megaindia.in/image/cache/2022/99%20uec-500x500.jpg","hostPageUrl":"https://www.megaindia.in/portable-pa-systems","contentSize":"49293 B","width":500,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.274a4553c34514cca57cd7c19114c806?rik=P%2fiOpYqLgOrnIg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"ADB60F8C20F27614FE3722E7EA808B8AA58EF83F","accentColor":"A64725"},"5E5E779201875E9BABAD3252F7DC00E44E3DE0A2":{"name":"Justice system must respond to vulnerabilities of children with ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.P6rFoPdXwtfg5kFl7umi6gHaEz?pid=Api","datePublished":"2024-09-28T09:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.millenniumpost.in/h-upload/2024/09/28/809828-pti09282024000123a.webp","hostPageUrl":"https://www.millenniumpost.in/big-stories/justice-system-must-respond-to-vulnerabilities-of-children-with-disabilities-cji-chandrachud-581342","contentSize":"404122 B","width":3152,"height":2043,"cDNContentUrl":"https://th.bing.com/th/id/R.3faac5a0f757c2d7e0e64165eee9a2ea?rik=5eV3KRB45bm62g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2A0ED3E44E00CD7F2523DABAB9E578102977E5E5","accentColor":"525C79"},"FE994604F68BAC8A59D373EF41672F02C8F06BDA":{"name":"Portable P.A. Systems","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.4kujEHxpIRzkznVCZGpN8wHaHa?pid=Api","datePublished":"2017-12-28T11:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.megaindia.in/image/cache/product/portablepa/03-500x500.jpg","hostPageUrl":"https://www.megaindia.in/portable-pa-systems","contentSize":"42822 B","width":500,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.e24ba3107c69211ce4ce7542646a4df3?rik=75lkQG%2b4yqiVPQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"ADB60F8C20F27614FE373D95A8CAB86F406499EF","accentColor":"6A6936"},"6E1A3969F5F0C450FC5F68BA439AF23577261A58":{"name":"Expert Blogs","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.lC9W22AZ0BfQNHxOeMItlwHaE8?pid=Api","datePublished":"2024-06-04T09:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.t-systems.com/resource/image/974718/ratio3x2/1440/960/b98509bdb462259a315719dcf93a516f/71F49E65DC06DC8C48C59FDA824EE6D3/im-its-time-to-go-on-the-cyber-security-offensive.jpg","hostPageUrl":"https://www.t-systems.com/in/en/insights/newsroom/expert-blogs","contentSize":"112010 B","width":1440,"height":960,"cDNContentUrl":"https://th.bing.com/th/id/R.942f56db6019d017d0347c4e78c22d97?rik=5qGTll8PTAXP9Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"85A16277532FA934AB86F5CF054C0F5F9693A1E6","accentColor":"2A76A1"},"0284368D3669B770F91381041E374175147AAB9E":{"name":"Ignite Technologies – Ethical Hacking","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.ZlV1yFwvc4X1kstH3hvoIgHaEK?pid=Api","datePublished":"2020-03-14T15:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ignitetechnologies.in/images/ethical-hacking.jpg","hostPageUrl":"https://www.ignitetechnologies.in/ethical-hacking.html","contentSize":"394010 B","width":1920,"height":1080,"cDNContentUrl":"https://th.bing.com/th/id/R.665575c85c2f7385f592cb47de1be822?rik=IEhj2GOWewefMQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E9BAA741571473E14018319F077B9663D8634820","accentColor":"836248"},"36DB3326A874E8E6E3B8B4FDA6EADBF1C24B2FFE":{"name":"Revolutionizing Quantum Security: Synergy Quantum Exposes ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.WMZBMqhHCkBmQz1Zjic7ZAHaFj?pid=Api","datePublished":"2025-04-19T07:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d3lzcn6mbbadaf.cloudfront.net/media/details/ANI-20250419115623.jpg","hostPageUrl":"https://www.aninews.in/news/business/revolutionizing-quantum-security-synergy-quantum-exposes-vulnerabilities-in-qkd-systems20250419172634/","contentSize":"88314 B","width":600,"height":450,"cDNContentUrl":"https://th.bing.com/th/id/R.58c64132a8470a4066433d598e273b64?rik=Y70zYopHjm4%2biw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EFF2B42C1FBDAE6ADF4B8B3E6E8E478A6233BD63","accentColor":"217EAA"},"566D1077CDBFD8E8B12696F6B2AD944C10643D15":{"name":"Buy Reducing the Vulnerability of Georgia's Agricultural Systems to ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.QKB7xnjTmFfUgRU6b6SrAQHaKl?pid=Api","datePublished":"2025-01-13T21:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/8195ogcnkLL.jpg","hostPageUrl":"https://www.desertcart.in/products/266051286-reducing-the-vulnerability-of-georgias-agricultural-systems-to-climate-change-impact-assessment-and-adaptation-options","contentSize":"397404 B","width":952,"height":1360,"cDNContentUrl":"https://th.bing.com/th/id/R.40a07bc678d39857d481153a6fa4ab01?rik=ZdYBd9z7jY4bYg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"51D34601C449DA2B6F69621B8E8DFBDC7701D665","accentColor":"1A97B1"},"A87228CBAAE4C1E14D2A72897420D2C94ADDCAF4":{"name":"Mega Public Address Systems","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.7i2pIgIj0R_pDPaY5vHARgHaDF?pid=Api","datePublished":"2017-09-22T11:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.megaindia.in/image/cache/banner--new-1200x500.jpg","hostPageUrl":"https://www.megaindia.in/","contentSize":"316005 B","width":1200,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.ee2da9220223d11fe90cf698e6f1c046?rik=iieCvKpOHB7Uog&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4FACDDA49C2D02479827A2D41E1C4EAABC82278A","accentColor":"B7141A"},"FB2BAE0484F5E79E340C540A761D98D74D18F18F":{"name":"CEH v10 Footprinting and Reconnaissance Methodology","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.3Kl6njC_HfhbE2u5XDOdPwHaDW?pid=Api","datePublished":"2022-11-16T01:59:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://1.bp.blogspot.com/-u6JKZJtQFnQ/XrT0SstSFSI/AAAAAAAAC_Q/e-K5XKnEXy8zVaR2NTjY-3ngbfKrnK4yACLcBGAsYHQ/s1600/footprinting-methodology4-26.png","hostPageUrl":"https://www.hackingtruth.in/2020/05/ceh-v10-footprinting-and-reconnaissance_7.html","contentSize":"190369 B","width":858,"height":388,"cDNContentUrl":"https://th.bing.com/th/id/R.dca97a9e30bf1df85b136bb95c339d3f?rik=v7LqQEhffulDwA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F81F81D47D89D167A045C043E97E5F4840EAB2BF","accentColor":"4F8843"},"C628C4D91467A5CBD95556A7D3EB9DD49FCA60E8":{"name":"Hi-Tech Home Automation System Services By House Story - HouseStory","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.f5cI5GAKFU8f77kQZXefVwHaHa?pid=Api","datePublished":"2023-06-19T08:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://housestory.in/system/storage/app/public/photos/1/House%20interior%20images/House%20Story%20Automation%20Service.jpg","hostPageUrl":"https://housestory.in/service/hi-tech-home-automation-system-gwalior","contentSize":"27987 B","width":600,"height":600,"cDNContentUrl":"https://th.bing.com/th/id/R.7f9708e4600a154f1fefb91065779f57?rik=bIJMnUF2WrydVQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8E06ACF94DD9BE3D7A65559DBC5A76419D4C826C","accentColor":"4F657C"},"894A59A0A00C2495DC800BE7768C3F3F6693195E":{"name":"Nadi Astrologer India Nadi Astrology Online India in Jaipur","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.aKqQSSTfLHk6HGVKrhgI_AHaHa?pid=Api","datePublished":"2018-09-05T03:20:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://productimages.withfloats.com/actual/6287603cf94ef8000113272a.jpg","hostPageUrl":"https://www.kundlionline.in/","contentSize":"330644 B","width":1500,"height":1503,"cDNContentUrl":"https://th.bing.com/th/id/R.68aa904924df2c793a1c654aae1808fc?rik=mKSVCgrAQlnNCA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E5913966F3F3C8677EB008CD5942C00A0A95A498","accentColor":"C4BC07"},"FEAF6CFB60922DBD82ED3F659122ADB61AA1526F":{"name":"Hillman Engineering Company in Bangalore","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.XxPHRjqlkZvaaQxN9uORcQHaHa?pid=Api","datePublished":"2019-09-13T13:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://bizimages.withfloats.com/actual/704000b548f94f4f8a0f0066f183a5c7.jpg","hostPageUrl":"https://hillmanengineering.in/","contentSize":"116125 B","width":1007,"height":1008,"cDNContentUrl":"https://th.bing.com/th/id/R.5f13c7463aa5919bda690c4df6e39171?rik=7%2frGvwYp0tso3g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F6251AA16BDA221956F3DE28DBD22906BFC6FAEF","accentColor":"AD251E"},"FF38CC881845BE230693DF02DDBA02AB344931C2":{"name":"Home | CSJMU","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.dr8bPVA_w_LcJ9DomIjkigHaHa?pid=Api","datePublished":"2025-02-18T02:12:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://lms-csjmu.samarth.ac.in/pluginfile.php/9101/course/overviewfiles/control-systems-Image.jpg","hostPageUrl":"https://lms-csjmu.samarth.ac.in/","contentSize":"287780 B","width":1000,"height":1000,"cDNContentUrl":"https://th.bing.com/th/id/R.76bf1b3d503fc3f2dc27d0e89888e48a?rik=%2f4PMiIFU6zJgOQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2C139443BA20ABDD20FD396032EB548188CC83FF","accentColor":"071E33"},"C05CCCB58BFFFA714BED72897420D2C94ADDCAF4":{"name":"Mega Public Address Systems","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.yh-PWrVOUBef0hS742cQmwHaHa?pid=Api","datePublished":"2017-09-22T11:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.megaindia.in/image/cache/2022/DSC_5650-500x500.jpg","hostPageUrl":"https://www.megaindia.in/","contentSize":"54890 B","width":500,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.ca1f8f5ab54e50179fd214bbe367109b?rik=DMXMW7j%2frxe03g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4FACDDA49C2D02479827DEB417AFFFB85BCCC50C","accentColor":"666666"},"9A126BA91BF97FB664A9479C5258DFA225A9A2B8":{"name":"mp-80usb+echo with 2 external speaker","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.3wOIhd9vMG-Mj8vsFblU8QHaHa?pid=Api","datePublished":"2023-05-30T10:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.megaindia.in/image/cache/2022/80%20ue%20b-1400x1400.jpg","hostPageUrl":"https://www.megaindia.in/index.php?route=product/product&product_id=483","contentSize":"320814 B","width":1400,"height":1400,"cDNContentUrl":"https://th.bing.com/th/id/R.df038885df6f306f8c8fcbec15b954f1?rik=qSG2mrGf92tGmg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8B2A9A522AFD8525C9749A466BF79FB19AB621A9","accentColor":"AE281D"},"428E153C7C2B8625C1BF932414AB835DD79BEF79":{"name":"Cisco Vulnerability Management (formerly Kenna.VM) - Cisco","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.JFE5Zz6-HGS8OatMGD_nxAHaDC?pid=Api","datePublished":"2015-10-19T08:14:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.cisco.com/content/dam/cisco-cdc/site/images/heroes/products/security/vulnerability-management-hero-index-desktop-3200x1312.jpg","hostPageUrl":"https://www.cisco.com/site/in/en/products/security/vulnerability-management/index.html","contentSize":"215639 B","width":3200,"height":1312,"cDNContentUrl":"https://th.bing.com/th/id/R.245139673ebe1c64bc39ab4c183fe7c4?rik=JOhRw8eyaFIc%2bw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"97FEB97DD538BA414239FB1C5268B2C7C351E824","accentColor":"042F76"},"9775AA66E9F4A28ABB26F82E7203A2CEA7367B54":{"name":"Fundamental Design of Small Scale Solar Wind Hybrid System","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.iT71YjyaXDIhPQ7qulG1cQHaEK?pid=Api","datePublished":"2023-08-21T01:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://edisonlms-fs.s3.us-east-2.amazonaws.com/tenant_renewableenergystudygroup/784e39c6-df9a-4328-b89d-1edf67f771a2_1689854505610_Poster.jpg","hostPageUrl":"https://renewableenergystudygroup.in/store/Fundamental-Design-of-Small-Scale-Solar-Wind-Hybrid-System-1ao98c2drleo","contentSize":"203911 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.893ef5623c9a5c32213d0eeaba51b571?rik=eVeqZp5PKqi7Yg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"45B7637AEC2A3027E28F62BBA82A4F9E66AA5779","accentColor":"385C93"},"F0D7D2EBF0AD91A83528781F704446A13D77178A":{"name":"Diffused Aerator System - Envista","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.dIN6A73oJHiT_vQb_7jSQgHaFj?pid=Api","datePublished":"2023-04-24T00:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://envista.co.in/assets/uploads/product-featured-217.jpg","hostPageUrl":"https://envista.co.in/product/diffused-aerator-system","contentSize":"106663 B","width":1056,"height":792,"cDNContentUrl":"https://th.bing.com/th/id/R.74837a03bde8247893fef41bffb8d242?rik=D30tvg%2faGYpTgg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A87177D31A644407F18782538A19DA0FBE2D7D0F","accentColor":"7F6A4C"},"E1D3CC488B5511942131FC6ACD3F59CA704876D5":{"name":"Build Production-Ready RAG Systems with LangChain and Vector Databases ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.uDW9VRJ_GufpzrcpyhojVAHaHa?pid=Api","datePublished":"2025-07-20T10:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://python.elitedev.in/images/a19c32d5-559a-44bf-a71e-cb732b1e97cd.webp","hostPageUrl":"https://python.elitedev.in/large_language_model/build-production-ready-rag-systems-with-langchain-and-vector-databases-complete-implementation-guid/","contentSize":"83264 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.b835bd55127f1ae7e9ceb729ca1a2354?rik=Hj3MhLhVEUkSEw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5D678407AC95F3DCA6CF1312491155B884CC3D1E","accentColor":"0F212F"},"E05107A180FB7032CDE03EB0A6854993772BE1A8":{"name":"Cyberphysical Infrastructures in Power Systems: Architectures and ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.V8BUW-9t-LCvlXPTY8gDrgAAAA?pid=Api","datePublished":"2021-05-27T19:27:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41hs6dmguML._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Cyberphysical-Infrastructures-Power-Systems-Vulnerabilities/dp/0323852610","contentSize":"21713 B","width":295,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.57c0545bef6df8b0af9573d363c803ae?rik=DhVwGgi%2fByPcDg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8A1EB2773994586A0BE30EDC2307BF081A70150E","accentColor":"3B8F90"},"9DF0DC42F16F3C3880BB5382B2B5AB095710FF0A":{"name":"Building Production-Ready RAG Systems: Complete LangChain and Vector ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.5tkLg2_9VMMmdXf2j_yNGAHaHa?pid=Api","datePublished":"2025-08-12T02:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://python.elitedev.in/images/a2506f38-087b-4dd3-992a-3ff4adcce590.webp","hostPageUrl":"https://python.elitedev.in/large_language_model/building-production-ready-rag-systems-complete-langchain-and-vector-database-implementation-guide/","contentSize":"78180 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.e6d90b836ffd54c3267577f68ffc8d18?rik=2Q%2fNJB%2f2w4MIuw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A0FF017590BA5B2B2835BB0883C3F61F24CD0FD9","accentColor":"0A406B"},"D4C92D3B8C44E2F494FBAF92B52F20975CB6C3D5":{"name":"BMTPC","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.bQIcvDe5s7Lyxpc0H4mvCQHaKY?pid=Api","datePublished":"2020-05-27T06:37:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.bmtpc.org/DataFiles/CMS/file/VAI2019/MAP/cymap/06_INDIA_CYCLONE_OCCURRENCE_DEC_2018.jpg","hostPageUrl":"https://www.bmtpc.org/topics.aspx?mid=56&Mid1=178","contentSize":"1330253 B","width":3360,"height":4713,"cDNContentUrl":"https://th.bing.com/th/id/R.6d021cbc37b9b3b2f2c697341f89af09?rik=TZzSs8hELk9Jvw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5D3C6BC57902F25B29FABF494F2E44C8B3D29C4D","accentColor":"AA7E21"},"FFA2FFD2B79F68D76C0043A13F5970DB06A71BB3":{"name":"AUTOMATIC LOCKABLE PASS BOX -MODULAR HEALTHCARE SYSTEM, Greater Noida","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.v9w6Sspa4zx91hqOnNXD0AHaCM?pid=Api","datePublished":"2025-03-24T18:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://web.s-cdn.boostkit.dev/webaction-files/5ac4f587beef72050ad4e284_product_images/manual_67e3d7f7bbf2fcb77c340225.jpeg","hostPageUrl":"https://www.modularoperationtheatre.co.in/products/automatic-lockable-pass-box/17","contentSize":"17570 B","width":484,"height":143,"cDNContentUrl":"https://th.bing.com/th/id/R.bfdc3a4aca5ae33c7dd61a8e9cd5c3d0?rik=%2fyr%2fLXv5hn3GAA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3BB17A60BD0795F31A3400C67D86F97B2DFF2AFF","accentColor":"7C704F"},"ED661C03F064F88BE528B137D2EA239C4A7D3053":{"name":"DELTA Online UPS Systems -Jupiter Electronics & Telecom Systems ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP._WruQYzu2t1SP2pKbjosqQHaKe?pid=Api","datePublished":"2024-07-13T21:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://productimages.withfloats.com/actual/60a78acebf6df5000165a777.jpg","hostPageUrl":"https://upsbattery.jetpower.co.in/products/delta-online-ups-systems/36","contentSize":"341232 B","width":905,"height":1280,"cDNContentUrl":"https://th.bing.com/th/id/R.fd6aee418ceedadd523f6a4a6e3a2ca9?rik=3mbBMA9Gj7hegg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3503D7A4C932AE2D731B825EB88F460F30C166DE","accentColor":"B75D14"},"DFC9E7BD7784F8A3723B8641AEFC66337288A693":{"name":"Rainwater Harvesting System (Recharge /Percolation Well) in Vadodara ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.zr8CXVEVHr1rAqUcYRtxEAHaFq?pid=Api","datePublished":"2020-04-10T14:47:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://productimages.withfloats.com/actual/5b8d0afe86aec206533d5cc3.jpg","hostPageUrl":"http://www.allegianceindia.in/products-and-services/rainwater-harvesting/0","contentSize":"292843 B","width":975,"height":745,"cDNContentUrl":"https://th.bing.com/th/id/R.cebf025d51151ebd6b02a51c611b7110?rik=%2fZx%2b23dIjzonsw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"396A88273366CFEA1468B3273A8F4877DB7E9CFD","accentColor":"10ACBB"},"F0250DF439715CA69929B97030F5966CDF41F0AA":{"name":"6 At-Home Peels That Are Easy And Effective | Grazia India","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.2-FG9IRwIJBHBBmeCFxc3AHaIe?pid=Api","datePublished":"2022-07-07T16:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://grazia.wwmindia.com/content/2022/jul/isclinicalpeels1657103076.jpg","hostPageUrl":"https://www.grazia.co.in/beauty-and-health/6-at-home-peels-that-are-easy-and-effective-9712.html","contentSize":"44781 B","width":894,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.dbe146f4847020904704199e085c5cdc?rik=D1LQT5MXxWqZkg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"AA0F14FDC6695F03079B92996AC517934FD0520F","accentColor":"1412B9"},"5B4F3669223AA19AC938FFC7FD61DF7548853667":{"name":"A Floor-level or Walk-in Showers Collection Online | Duravit","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.Y4jPK0y-aqr26acpgICwoAHaKX?pid=Api","datePublished":"2023-01-13T00:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://wgassets.duravit.com/photomanager-duravit/file/8a8a818d81d22c6b0181d867b5010e8c/b2_shower_systems_01.jpg?derivate=width~1920","hostPageUrl":"https://www.duravit.in/products/showering/walk-in_showers.in-en.html","contentSize":"697774 B","width":1920,"height":2688,"cDNContentUrl":"https://th.bing.com/th/id/R.6388cf2b4cbe6aaaf6e9a7298080b0a0?rik=tfRjliKjGqmcgw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7663588457FD16DF7CFF839CA91AA3229663F4B5","accentColor":"5E4E38"},"AC5B3C444D187F9D3875A8AB1FCFCDEDCE4A9BB3":{"name":"Administration of Warfarin Inhibits the Development of Cerulein-Induced ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.7iVcwzYi6Ckk9jHT0C03cAHaE0?pid=Api","datePublished":"2023-06-06T07:49:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/biomolecules/biomolecules-13-00948/article_deploy/html/images/biomolecules-13-00948-g001.png","hostPageUrl":"https://www.mdpi.com/2218-273X/13/6/948","contentSize":"47258 B","width":3698,"height":2408,"cDNContentUrl":"https://th.bing.com/th/id/R.ee255cc33622e82924f631d3d02d3770?rik=yrXDRNSB99mDVw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"3BB9A4ECDEDCFCF1BA8A5783D9F781D444C3B5CA","accentColor":"A0A000"},"41B25B9DE5A9A08C02337661E0548C8500877111":{"name":"Synergy quantum exposes vulnerabilities in QKD systems","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.ok_pOW8CFEGU7cupllMGbwHaE8?pid=Api","datePublished":"2025-04-19T12:05:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.awazthevoice.in/upload/news/1745064315Synergy_quantum_exposes_vulnerabilities_in_QKD_systems.webp","hostPageUrl":"https://www.awazthevoice.in/business-news/synergy-quantum-exposes-vulnerabilities-in-qkd-systems-36787.html","contentSize":"15308 B","width":750,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.a24fe9396f02144194edcba99653066f?rik=FCu12V6aCsggMw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1117780058C8450E16673320C80A9A5ED9B52B14","accentColor":"A42C27"},"58E2DDD2723DC9C2887E8A2E6005F0C1EB36618A":{"name":"Dosing System - Envista","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.CbAp6tP-oCTm3TeH4cFJmAAAAA?pid=Api","datePublished":"2023-04-29T07:19:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://envista.co.in/assets/uploads/product-featured-212.jpg","hostPageUrl":"https://envista.co.in/product/dosing-system","contentSize":"155396 B","width":474,"height":474,"cDNContentUrl":"https://th.bing.com/th/id/R.09b029ead3fea024e6dd3787e1c14998?rik=hS7dLSfTnCyI5w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A81663BE1C0F5006E2A8E7882C9CD3272DDD2E85","accentColor":"B9C006"},"9C527E24C4DBB695DBE6C41E49B94E49D1A50521":{"name":"Buy Rag Rug Grey Textured Cotton Woven Bath Rug - 50 x 80 cm from Home ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.oKrfc6Rd_RL12n0J5QpZzAHaHa?pid=Api","datePublished":"2021-10-21T14:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://media-uk.landmarkshops.in/cdn-cgi/image/h=750,w=750,q=85,fit=cover/homecentre/1000010044802-1000010044801_05-2100.jpg","hostPageUrl":"https://www.homecentre.in/in/en/Home-Centre/Furnishing/Floor-Coverings/Rugs/HOMECENTRE-Rag-Rug-Grey-Textured-Cotton-Woven-Bath-Rug--50-x-80-cm/p/1000010044802","contentSize":"70918 B","width":750,"height":750,"cDNContentUrl":"https://th.bing.com/th/id/R.a0aadf73a45dfd12f5da7d09e50a59cc?rik=ySXnQky9a1m9bg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"12505A1D94E49B94E14C6EBD596BBD4C42E725C9","accentColor":"796952"},"DEF3FD8A718347211B42009A8C0248EA56FC1772":{"name":"What is India's Climate Change Vulnerability Index (CVI) ? CEEW","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.52OwZSfO-wm4AxA3jHFkBgHaKe?pid=Api","datePublished":"2021-10-26T07:59:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ceew.in/sites/default/files/ceew-study-on-climate-change-vulnerability-index-and-district-level-risk-assessment-01.png","hostPageUrl":"https://www.ceew.in/publications/mapping-climate-change-vulnerability-index-of-india-a-district-level-assessment","contentSize":"1729891 B","width":1654,"height":2339,"cDNContentUrl":"https://th.bing.com/th/id/R.e763b06527cefb09b80310378c716406?rik=7T%2ffqBc4dBKxJA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2771CF65AE8420C8A90024B112743817A8DF3FED","accentColor":"1A4C87"},"30A4EA98CE829E76D3820E6E77750BA87DA8C4FD":{"name":"MEGA 50 WATT PORTABLE SYSTEM (MP-810)","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.Mk9bV3AzIOCsqQagO2JzRwHaHa?pid=Api","datePublished":"2022-10-04T22:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.megaindia.in/image/cache/WhatsApp_Image_2022-08-.01_at_3.56.18_PM-removebg-preview-1400x1400.png","hostPageUrl":"https://www.megaindia.in/index.php?route=product/product&product_id=515","contentSize":"315608 B","width":1400,"height":1400,"cDNContentUrl":"https://th.bing.com/th/id/R.324f5b57703320e0aca906a03b627347?rik=A0quiewo6Wc9KA&pid=ImgRaw&r=0","isTransparent":true,"imageId":"DF4C8AD78AB05777E6E0283D67E928EC89AE4A03","accentColor":"796B52"},"DFCF3F8F998AAF74DB29E23DC2E16DE288C9B3B5":{"name":"Ultra Autosonic India in Pune","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.vS1gIuDG1hNdAHjV-31CNgHaLF?pid=Api","datePublished":"2019-03-30T23:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://bizimages.withfloats.com/actual/2feb15be36744ad6adaf738568901674.jpg","hostPageUrl":"https://www.ultraautosonic.co.in/","contentSize":"557424 B","width":800,"height":1198,"cDNContentUrl":"https://th.bing.com/th/id/R.bd2d6022e0c6d6135d0078d5fb7d4236?rik=%2ffzz%2bJmo%2bke9kg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5B3B9C882ED61E2CD32E92BD47FAA899F8F3FCFD","accentColor":"69483C"},"319EED7E21891DF053F4C1AD1B1BB331C3ED06A9":{"name":"Creative Car Care","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.HfxSa0u3C9xutF3oykQ-PAHaHa?pid=Api","datePublished":"2023-06-15T00:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://admin.creativecarcare.in/storage/images/products/front-stp-ultra-5-in-1-d-5790.jpg","hostPageUrl":"https://www.creativecarcare.in/","contentSize":"285088 B","width":1000,"height":1000,"cDNContentUrl":"https://th.bing.com/th/id/R.1dfc526b4bb70bdc6eb45de8ca443e3c?rik=E%2bne5xKY0Q81Tw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9A60DE3C133BB1B1DA1C4F350FD19812E7DEE913","accentColor":"B31C18"},"087C5B4F0C5E8721CCFB5DAD9A5CC4DDB3A8A6E9":{"name":"Shop Pagers Online | Ubuy India","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.TT0dvUnyKSm8YszwiZ75-gHaGi?pid=Api","datePublished":"2021-12-09T19:40:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images-cdn.ubuy.co.in/66ea3ac41472ab0adb12d2c4-retekess-td175s-restaurant-pager-system.jpg","hostPageUrl":"https://www.ubuy.co.in/category/office-products/office-electronics/telephones-accessories/pagers-172621","contentSize":"78560 B","width":1500,"height":1325,"cDNContentUrl":"https://th.bing.com/th/id/R.4d3d1dbd49f22929bc62ccf0899ef9fa?rik=gMe19MDleBLMvw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9E6A8A3BDD4CC5A9DAD5BFCC1278E5C0F4B5C780","accentColor":"B31818"},"80B1C1B81260D2F27F50E52FB349F4055CFEC206":{"name":"Vulnerability - Free security icons","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.mebziaP-Knctwx6iGOGNxwHaHa?pid=Api","datePublished":"2023-08-20T09:49:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn-icons-png.flaticon.com/512/10961/10961480.png","hostPageUrl":"https://www.flaticon.com/free-icon/vulnerability_10961480","contentSize":"29512 B","width":512,"height":512,"cDNContentUrl":"https://th.bing.com/th/id/R.99e6f389a3fe2a772dc31ea218e18dc7?rik=CBsciyEGLS%2f3BQ&pid=ImgRaw&r=0","isTransparent":true,"imageId":"602CEFC5504F943BF25E05F72F2D06218B1C1B08","accentColor":"CA9501"},"A927806CFF7B61B2471C0E71F76B87DB9BD8CA39":{"name":"Buy & Sell | Heavy Machinery and Industrial Equipment | 10HP India","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.L0PwFvTy6Glxj1NmiZW9BQHaE8?pid=Api","datePublished":"2025-11-10T23:22:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://10hp.in/uploads/post/P2025-0003162/images%20(11).jpg","hostPageUrl":"http://10hp.in/posts/details/bed-exit-alarm-system/","contentSize":"157219 B","width":849,"height":566,"cDNContentUrl":"https://th.bing.com/th/id/R.2f43f016f4f2e869718f53668995bd05?rik=mnIIxv%2b3Fit0wQ&riu=http%3a%2f%2f10hp.in%2fuploads%2fpost%2fP2025-0003162%2fimages+(11).jpg&ehk=WJ1tc5zQ%2f74GC6aUMS7A5rTMuDPccIA%2ffSa9iGt8FhE%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"93AC8DB9BD78B67F17E0C1742B16B7FFC608729A","accentColor":"28678E"},"17B37E26054B939248432B1E3E1B8E9A0A1FBED7":{"name":"Design of Solar Photovoltaic Air Conditioning System","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.xJrvdhR0YDJBzy-jOG_l9wHaKe?pid=Api","datePublished":"2022-09-14T06:59:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://edisonlms-fs.s3.us-east-2.amazonaws.com/tenant_renewableenergystudygroup/ec9502e7-1a81-4567-8110-4e7844bf421c_1694538005081_Solar-Energy-Company-Flyer-15---Made-with-PosterMyWall.jpg","hostPageUrl":"https://renewableenergystudygroup.in/store/Design-of-Solar-Photovoltaic-Air-Conditioning-System-2zsy9sz8kbbv","contentSize":"374781 B","width":636,"height":900,"cDNContentUrl":"https://th.bing.com/th/id/R.c49aef761474603241cf2fa3386fe5f7?rik=cTvnYlC0OSmENA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7DEBF1A0A9E8B1E3E1B234842939B45062E73B71","accentColor":"B0A11B"},"0E794B97DE5586CFDB3B8894C6DF0715FE388A89":{"name":"Sony New Launch ULT Tower 10 Party Speaker with ULT Button(2 Modes) for ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.TGg5i6az0Uev59go2ekbPQHaHa?pid=Api","datePublished":"2024-06-01T03:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/81qcPual4CL._SL1500_.jpg","hostPageUrl":"https://www.amazon.in/Speaker-Massive-Powerful-Wireless-Bluetooth/dp/B0CXL5SZVQ","contentSize":"118275 B","width":1500,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.4c68398ba6b3d147afe7d828d9e91b3d?rik=4Je0ee1VaPy9sw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"98A883EF5170FD6C4988B3BDFC6855ED79B497E0","accentColor":"0E3CBD"},"C8891456312163C79B0973EF41672F02C8F06BDA":{"name":"Portable P.A. Systems","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.d14yQ6kQOLba_KlBtf45lwHaHa?pid=Api","datePublished":"2017-12-28T11:08:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.megaindia.in/image/cache/MP-250U-500x500.jpeg","hostPageUrl":"https://www.megaindia.in/portable-pa-systems","contentSize":"50488 B","width":500,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.775e3243a91038b6dafca941b5fe3997?rik=jJhBZRMSNny5kA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"ADB60F8C20F27614FE3790B97C3612136541988C","accentColor":"A5262B"},"63776B69A2CD9C223FDE0E6E77750BA87DA8C4FD":{"name":"MEGA 50 WATT PORTABLE SYSTEM (MP-810)","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.EEoMHHwRvCW50-IDhRkEkgHaHa?pid=Api","datePublished":"2022-10-04T22:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.megaindia.in/image/cache/2022/810d-1400x1400.jpg","hostPageUrl":"https://www.megaindia.in/index.php?route=product/product&product_id=515","contentSize":"83798 B","width":1400,"height":1400,"cDNContentUrl":"https://th.bing.com/th/id/R.104a0c1c7c11bc25b9d3e20385190492?rik=Nne2lircySLz7Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DF4C8AD78AB05777E6E0EDF322C9DC2A96B67736","accentColor":"666666"},"24B0A6BF40F72A4445155DAD9A5CC4DDB3A8A6E9":{"name":"Shop Pagers Online | Ubuy India","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.pEKEBnzB9JQ0d0b9G1nuJQHaHk?pid=Api","datePublished":"2021-12-09T19:40:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://images-cdn.ubuy.co.in/6479c17b7dc0bd76a224c51d-yycalling-restaurant-pager-pagers-for.jpg","hostPageUrl":"https://www.ubuy.co.in/category/office-products/office-electronics/telephones-accessories/pagers-172621","contentSize":"129134 B","width":1466,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.a44284067cc1f494347746fd1b59ee25?rik=Qgtq%2bwR%2fokRUUQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9E6A8A3BDD4CC5A9DAD5515444A27F04FB6A0B42","accentColor":"CA7801"},"9936F88F459069E3980FC325BF6E31E19E78CEE8":{"name":"How to Build Production-Ready RAG Systems with LangChain and Vector ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.oAKzl5EzDW7-kKHd-skFCwHaHa?pid=Api","datePublished":"2025-08-09T23:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://python.elitedev.in/images/51e22fa0-d2e3-4fa5-82ba-7bebdb4eefba.webp","hostPageUrl":"https://python.elitedev.in/large_language_model/how-to-build-production-ready-rag-systems-with-langchain-and-vector-databases-complete-2024-guide/","contentSize":"90610 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.a002b39791330d6efe90a1ddfac9050b?rik=mWOP%2bFQJlj6J8A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8EEC87E91E13E6FB523CF0893E960954F88F6399","accentColor":"072130"}},"relatedSearches":[{"text":"Network Vulnerability Assessment","displayText":"Network Vulnerability Assessment","webSearchUrl":"https://www.bing.com/images/search?q=Network+Vulnerability+Assessment&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5830.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Network+Vulnerability+Assessment","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Network+Vulnerability+Assessment&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cyber Security Vulnerabilities","displayText":"Cyber Security Vulnerabilities","webSearchUrl":"https://www.bing.com/images/search?q=Cyber+Security+Vulnerabilities&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5832.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cyber+Security+Vulnerabilities","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Cyber+Security+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cyber Security Vulnerability","displayText":"Cyber Security Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=Cyber+Security+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5834.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cyber+Security+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Cyber+Security+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Human Vulnerability","displayText":"Human Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=Human+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5836.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Human+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Human+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Management System","displayText":"Vulnerability Management System","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Management+System&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5838.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Management+System","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Vulnerability+Management+System&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Types of Vulnerability","displayText":"Types of Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=Types+of+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5840.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Types+of+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Types+of+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Process","displayText":"Vulnerability Process","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Process&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5842.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Process","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Vulnerability+Process&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Assessment Template","displayText":"Vulnerability Assessment Template","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Assessment+Template&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5844.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Assessment+Template","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Vulnerability+Assessment+Template&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Report Template","displayText":"Vulnerability Report Template","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Report+Template&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5846.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Report+Template","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Vulnerability+Report+Template&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Software Vulnerability","displayText":"Software Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=Software+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5848.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Software+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Software+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Definition","displayText":"Vulnerability Definition","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Definition&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5850.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Definition","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Vulnerability+Definition&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Examples","displayText":"Vulnerability Examples","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Examples&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5852.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Examples","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Vulnerability+Examples&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Test","displayText":"Vulnerability Test","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Test&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5854.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Test","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Vulnerability+Test&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Remediation","displayText":"Vulnerability Remediation","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Remediation&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5856.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Remediation","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Vulnerability+Remediation&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Exploitation","displayText":"Vulnerability Exploitation","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Exploitation&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5858.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Exploitation","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Vulnerability+Exploitation&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Scanning","displayText":"Vulnerability Scanning","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Scanning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5860.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Scanning","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Vulnerability+Scanning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"System Vulnerability and Abuse","displayText":"System Vulnerability and Abuse","webSearchUrl":"https://www.bing.com/images/search?q=System+Vulnerability+and+Abuse&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5862.1","searchLink":"https://www.bing.com/api/v7/images/search?q=System+Vulnerability+and+Abuse","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=System+Vulnerability+and+Abuse&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Define Vulnerability","displayText":"Define Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=Define+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5864.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Define+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Define+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Management Life Cycle","displayText":"Vulnerability Management Life Cycle","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Management+Life+Cycle&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5866.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Management+Life+Cycle","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Vulnerability+Management+Life+Cycle&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Map of a System","displayText":"Vulnerability Map of a System","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Map+of+a+System&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5868.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Map+of+a+System","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Vulnerability+Map+of+a+System&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"The Vulnerability of the Health System","displayText":"The Vulnerability of the Health System","webSearchUrl":"https://www.bing.com/images/search?q=The+Vulnerability+of+the+Health+System&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5870.1","searchLink":"https://www.bing.com/api/v7/images/search?q=The+Vulnerability+of+the+Health+System","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=The+Vulnerability+of+the+Health+System&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Operating System Vulnerability","displayText":"Operating System Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=Operating+System+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5872.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Operating+System+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Operating+System+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Management Website","displayText":"Vulnerability Management Website","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Management+Website&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5874.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Management+Website","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Vulnerability+Management+Website&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Category of Vulnerability","displayText":"Category of Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=Category+of+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5876.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Category+of+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Category+of+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cvss Score","displayText":"Cvss Score","webSearchUrl":"https://www.bing.com/images/search?q=Cvss+Score&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5878.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cvss+Score","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Cvss+Score&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Threat and Vulnerability","displayText":"Threat and Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=Threat+and+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5880.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Threat+and+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Threat+and+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"NIST Vulnerability Management Framework","displayText":"NIST Vulnerability Management Framework","webSearchUrl":"https://www.bing.com/images/search?q=NIST+Vulnerability+Management+Framework&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5882.1","searchLink":"https://www.bing.com/api/v7/images/search?q=NIST+Vulnerability+Management+Framework","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=NIST+Vulnerability+Management+Framework&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Management System VMS","displayText":"Vulnerability Management System VMS","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Management+System+VMS&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5884.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Management+System+VMS","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Vulnerability+Management+System+VMS&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Scanner","displayText":"Vulnerability Scanner","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Scanner&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5886.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Scanner","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Vulnerability+Scanner&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Computer Vulnerability","displayText":"Computer Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=Computer+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5888.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Computer+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Computer+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Hacker Computer Security","displayText":"Hacker Computer Security","webSearchUrl":"https://www.bing.com/images/search?q=Hacker+Computer+Security&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5890.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Hacker+Computer+Security","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Hacker+Computer+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Clip Art","displayText":"Vulnerability Clip Art","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Clip+Art&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5892.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Clip+Art","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Vulnerability+Clip+Art&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"User Vulnerability","displayText":"User Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=User+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5894.1","searchLink":"https://www.bing.com/api/v7/images/search?q=User+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=User+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Scans","displayText":"Vulnerability Scans","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Scans&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5896.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Scans","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Vulnerability+Scans&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Rag by System","displayText":"Vulnerability Rag by System","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Rag+by+System&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5898.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Rag+by+System","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Vulnerability+Rag+by+System&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Patch","displayText":"Vulnerability Patch","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Patch&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5900.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Patch","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Vulnerability+Patch&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Mapping","displayText":"Vulnerability Mapping","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Mapping&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5902.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Mapping","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Vulnerability+Mapping&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"What Is Vulnerability","displayText":"What Is Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=What+Is+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5904.1","searchLink":"https://www.bing.com/api/v7/images/search?q=What+Is+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=What+Is+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Rating","displayText":"Vulnerability Rating","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Rating&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5906.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Rating","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Vulnerability+Rating&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Physical Vulnerability","displayText":"Physical Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=Physical+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5908.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Physical+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Physical+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Cyber Security Risk","displayText":"Cyber Security Risk","webSearchUrl":"https://www.bing.com/images/search?q=Cyber+Security+Risk&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5910.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Cyber+Security+Risk","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Cyber+Security+Risk&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Icon","displayText":"Vulnerability Icon","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Icon&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5912.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Icon","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Vulnerability+Icon&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Critical Vulnerability","displayText":"Critical Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=Critical+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5914.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Critical+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Critical+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Management It","displayText":"Vulnerability Management It","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Management+It&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5916.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Management+It","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Vulnerability+Management+It&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Sharing Vulnerability","displayText":"Sharing Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=Sharing+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5918.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Sharing+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Sharing+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"OS Vulnerability","displayText":"OS Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=OS+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5920.1","searchLink":"https://www.bing.com/api/v7/images/search?q=OS+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=OS+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"EW System Vulnerability","displayText":"EW System Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=EW+System+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5922.1","searchLink":"https://www.bing.com/api/v7/images/search?q=EW+System+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=EW+System+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"System Vulnerability Wallpaper","displayText":"System Vulnerability Wallpaper","webSearchUrl":"https://www.bing.com/images/search?q=System+Vulnerability+Wallpaper&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5924.1","searchLink":"https://www.bing.com/api/v7/images/search?q=System+Vulnerability+Wallpaper","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=System+Vulnerability+Wallpaper&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Zero-Day Vulnerability","displayText":"Zero-Day Vulnerability","webSearchUrl":"https://www.bing.com/images/search?q=Zero-Day+Vulnerability&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5926.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Zero-Day+Vulnerability","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Zero-Day+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Vulnerability Model","displayText":"Vulnerability Model","webSearchUrl":"https://www.bing.com/images/search?q=Vulnerability+Model&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5928.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Vulnerability+Model","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Vulnerability+Model&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}}],"createdate":1773036088176}
            [curl_error] => 
            [product_name_used] => Vulnerability-Rag-By-System
            [parsed] => Array
                (
                    [name] => vulnerability-rag-by-system inr loc:in
                    [totalEstimatedMatches] => 424
                    [nextOffset] => 120
                    [currentOffset] => 0
                    [value] => Array
                        (
                            [580803E4B69CF240B6AB09F5999071D433524FFE] => Array
                                (
                                    [name] => Alere PT INR Monitoring System – Microsidd India
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.aPvV-rOSTLdc3Rp-p4Gv5gHaHa?pid=Api
                                    [datePublished] => 2023-01-19T03:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://microsidd.com/cdn/shop/products/0000466_alereratioptinrmonitoringsystem.jpg?v=1685440218
                                    [hostPageUrl] => https://microsidd.com/products/alere-ratio-pt-inr-monitoring-system
                                    [contentSize] => 14329 B
                                    [width] => 545
                                    [height] => 545
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.68fbd5fab3924cb75cdd1a7ea781afe6?rik=hYAwTmvJLwRrug&riu=http%3a%2f%2fmicrosidd.com%2fcdn%2fshop%2fproducts%2f0000466_alereratioptinrmonitoringsystem.jpg%3fv%3d1685440218&ehk=cD35U4t52DgTwWXgWApDIpypXPkUf%2fDoIbbqwOGtX1w%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EFF425334D1709995F90BA6B042FC96B4E308085
                                    [accentColor] => 78104B
                                )

                            [CC065A066F2990269ECEFC2680B16F41BBAABD7D] => Array
                                (
                                    [name] => Sukrut CWS UV Disinfection System Products at price INR 0 in Bangalore ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.7IGXEz_55alnKIm8jDo3LwAAAA?pid=Api
                                    [datePublished] => 2021-06-30T19:36:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://web.s-cdn.boostkit.dev/webaction-files/5ac4f587beef72050ad4e284_product_images/screen-shot-2019-12-04-at-11.46.32-am-5f439d47a32075000185e137.png
                                    [hostPageUrl] => https://www.ekjanassociates.in/products/sukrut-cws-uv-disinfection-system/45
                                    [contentSize] => 15623 B
                                    [width] => 351
                                    [height] => 483
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ec8197133ff9e5a9672889bc8c3a372f?rik=zGClYPaSCWLp7A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D7DBAABB14F61B0862CFECE9620992F660A560CC
                                    [accentColor] => 9F892C
                                )

                            [FCBFDCB4E7898655A99367D827C37BBCB1F3BDD1] => Array
                                (
                                    [name] => Micropoint PT INR Meter, Finger Prick Blood Test, Rapid 2 Min Results ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.V68Jg3EBUTTU8J82SnXObgHaHa?pid=Api
                                    [datePublished] => 2021-04-09T20:48:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/51dEBu2Y2WL._SL1000_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Micropoint-q1-meter-INR-Meter/dp/B08RYRZHK8
                                    [contentSize] => 56291 B
                                    [width] => 1000
                                    [height] => 1000
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.57af098371015134d4f09f364a75ce6e?rik=z%2fvNS36YaFWaOQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1DDB3F1BCBB73C728D76399A5568987E4BCDFBCF
                                    [accentColor] => 1F9AAC
                                )

                            [5F9D9FB9DD8C747342CCFE05591104F96426A410] => Array
                                (
                                    [name] => INR Full Form: What is full form of INR?
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.-HbYAKjSJ-4PC_ZocKUqaAHaEU?pid=Api
                                    [datePublished] => 2022-11-05T12:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://st.adda247.com/https://wpassets.adda247.com/wp-content/uploads/multisite/2022/11/05144815/What-is-INR.png
                                    [hostPageUrl] => https://www.bankersadda.com/inr-full-form/
                                    [contentSize] => 35329 B
                                    [width] => 720
                                    [height] => 420
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f876d800a8d227ee0f0bf66870a52a68?rik=9dn5m93IRzckzA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 014A62469F40119550EFCC243747C8DD9BF9D9F5
                                    [accentColor] => B71414
                                )

                            [82975A005330530D739FE452F6A0E53FF60E18F9] => Array
                                (
                                    [name] => Making INR 150 A Day Rag-Picking, This Woman Looks After 400 Stray Dogs ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.8EQYE91UooG-BeamqGa5JwHaED?pid=Api
                                    [datePublished] => 2022-11-01T11:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://media.assettype.com/homegrown/import/facebook-58215-dog-lady.jpg?w=1200&ar=40:21&auto=format%2Ccompress&ogImage=true&mode=crop&enlarge=true&overlay=false&overlay_position=bottom&overlay_width=100
                                    [hostPageUrl] => https://homegrown.co.in/homegrown-voices/making-rs-150-a-day-rag-picking-this-woman-looks-after-400-stray-dogs-in-delhi-watch
                                    [contentSize] => 124917 B
                                    [width] => 1200
                                    [height] => 657
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f0441813dd54a281be05e6a6a866b927?rik=KHmlADUDNdA3%2bQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9F81E06FF35E0A6F254EF937D035033500A57928
                                    [accentColor] => 10407C
                                )

                            [E29500FFF6FDBAA5413B65738D4F95D79F54A7D2] => Array
                                (
                                    [name] => KingFisher Duo Prime Purification System Products at price INR 0 in ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.UILEweQK9LNCTyBfuly_7QHaHA?pid=Api
                                    [datePublished] => 2023-11-22T13:18:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://productimages.withfloats.com/tile/5d501d92b2ca9a0001ac173f.jpg
                                    [hostPageUrl] => https://www.niravbiosolutions.co.in/products/kingfisher-duo-prime-purification-system/6
                                    [contentSize] => 33342 B
                                    [width] => 600
                                    [height] => 568
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5082c4c1e40af4b3424f205fba5cbfed?rik=LlkA%2f2%2ffq1oUsw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2D7A45F97D59F4D83756B3145AABDF6FFF00592E
                                    [accentColor] => 366C95
                                )

                            [801FC2D44EDE181FF3DD474FEAA124FB47B3668D] => Array
                                (
                                    [name] => IPL's brand value wiped out by INR 21576 crore before the 2026 season ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.43RC0rnWoWVeehNvOXsbjQHaEK?pid=Api
                                    [datePublished] => 2025-12-10T14:16:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d16f573ilcot6q.cloudfront.net/wp-content/uploads/2025/06/Virat-Kohli-RCB-IPL-2025.webp
                                    [hostPageUrl] => https://www.insidesport.in/cricket/ipl-brand-value-wiped-out-by-inr-21576-crore-before-the-2026-season-rcb-csk-face-drop/
                                    [contentSize] => 177038 B
                                    [width] => 1200
                                    [height] => 675
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e37442d2b9d6a1655e7a136f397b1b8d?rik=CPEsTeTtgfE%2f3Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D8663B74BF421AAEF474DD3FF181EDE44D2CF108
                                    [accentColor] => A7242C
                                )

                            [6EBDCEA23DB541D5C91AB906B8762C6FB291EAD2] => Array
                                (
                                    [name] => KingFisher™ Flex Purification System Products at price INR 0 in Pune ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.DDoFhMVQzay3Fx9vIy3knQHaHa?pid=Api
                                    [datePublished] => 2024-02-14T13:38:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://productimages.withfloats.com/tile/65a76890c4452f288e94f1a2.jpg
                                    [hostPageUrl] => https://www.niravbiosolutions.co.in/products/kingfisher-flex-purification-system/71
                                    [contentSize] => 25162 B
                                    [width] => 500
                                    [height] => 500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0c3a0584c550cdacb7171f6f232de49d?rik=5tvsKtNbFF2coQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2DAE192BF6C2678B609BA19C5D145BD32AECDBE6
                                    [accentColor] => 23496C
                                )

                            [C8873D5B3E1445FB9D87626B974B2AF4943D37B5] => Array
                                (
                                    [name] => Best whiskey under INR 500: Bottles at a bargain for your home bar
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.VFmD_1pCHrw9mAomz7W8BwHaHa?pid=Api
                                    [datePublished] => 2023-10-17T09:40:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images.lifestyleasia.com/wp-content/uploads/sites/7/2025/04/03135855/Whisky-and-whiskey-based-cocktails-by-top-Indian-bartenders-2-500x500.jpg?tr=w-800
                                    [hostPageUrl] => https://www.lifestyleasia.com/ind/dining/drinks/whiskey-under-inr-500-best-budget-bottles-in-india/
                                    [contentSize] => 65577 B
                                    [width] => 800
                                    [height] => 800
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.545983ff5a421ebc3d980a26cfb5bc07?rik=jHjTteNBVL%2fZeA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5B73D3494FA2B479B62678D9BF5441E3B5D3788C
                                    [accentColor] => C28A09
                                )

                            [5A217F743A378D3DE0887DDA22B62B85B0DA048F] => Array
                                (
                                    [name] => Prompt Engineering vs. RAG vs. Finetuning: What’s the Difference? | by ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.s2gFfdHW50QjRPAwvRWBewHaFF?pid=Api
                                    [datePublished] => 2024-08-05T00:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://miro.medium.com/v2/resize:fit:1358/format:webp/0*MwqEsP6YWzxVmaPT.gif
                                    [hostPageUrl] => https://blog.aidetic.in/prompt-engineering-vs-rag-vs-finetuning-whats-the-difference-78466d70b5df
                                    [contentSize] => 456167 B
                                    [width] => 1160
                                    [height] => 796
                                    [proxyContentUrl] => https://tse4.mm.bing.net/th/id/OGC.b368057dd1d6e7442344f030bd15817b?pid=Api&rurl=https%3a%2f%2fmiro.medium.com%2fv2%2fresize%3afit%3a1358%2fformat%3awebp%2f0*MwqEsP6YWzxVmaPT.gif&ehk=7GVfCWgAO4xFim5MXlsz6YrkPs01cnmQ4Hv8he0Zy0U%3d
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b368057dd1d6e7442344f030bd15817b?rik=pRL3R6Nz2NMOiA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F840AD0B58B26B22ADD7880ED3D873A347F712A5
                                    [accentColor] => A78524
                                )

                            [5EB9D7BBAC13DBA93925FA699E88B72BE3550016] => Array
                                (
                                    [name] => Types of RAG: An Overview. Retrieval Augmented Generation is the… | by ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.AyuHvBzUrnBFx-Ub7kvjkAHaEW?pid=Api
                                    [datePublished] => 2024-01-21T04:42:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://miro.medium.com/v2/resize:fit:1358/1*JcsPrFx45RyMOvLlcml6Pg.png
                                    [hostPageUrl] => https://blog.jayanthk.in/types-of-rag-an-overview-0e2b3ed71b82
                                    [contentSize] => 312457 B
                                    [width] => 1358
                                    [height] => 798
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.032b87bc1cd4ae7045c7e51bee4be390?rik=5Zt9u8oxvZqTUg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6100553EB27B88E996AF52939ABD31CABB7D9BE5
                                    [accentColor] => 7A2A24
                                )

                            [B8A4CE972E6FE579C8906B600885CAC64FD9A2AC] => Array
                                (
                                    [name] => NVIDIA AI Enterprise | Cloud-native Software Platform | NVIDIA
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.FJI4BEJLkXyaJ_LqMAvH7gHaEK?pid=Api
                                    [datePublished] => 2020-08-09T12:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.nvidia.com/content/nvidiaGDC/in/en_IN/data-center/products/ai-enterprise/_jcr_content/root/responsivegrid/nv_container_copy_co_907753176/nv_container_663442894/nv_image_copy_copy.coreimg.jpeg/1710788124032/cve-risk-analysis-fg-i2of6-d.jpeg
                                    [hostPageUrl] => https://www.nvidia.com/en-in/data-center/products/ai-enterprise/
                                    [contentSize] => 57173 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.14923804424b917c9a27f2ea300bc7ee?rik=i0rseeL2XpeMCQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => CA2A9DF46CAC588006B6098C975EF6E279EC4A8B
                                    [accentColor] => C99902
                                )

                            [B028708F3AB9F08D04B4FA699E88B72BE3550016] => Array
                                (
                                    [name] => Types of RAG: An Overview. Retrieval Augmented Generation is the… | by ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.xEO5D0eI2kwitzdR8Y7tIAHaCk?pid=Api
                                    [datePublished] => 2024-01-21T04:42:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://miro.medium.com/v2/resize:fit:1358/1*S1sWx3tcgZKzwv-SSj6mZQ.png
                                    [hostPageUrl] => https://blog.jayanthk.in/types-of-rag-an-overview-0e2b3ed71b82
                                    [contentSize] => 17129 B
                                    [width] => 1024
                                    [height] => 356
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c443b90f4788da4c22b73751f18eed20?rik=C4IH%2bKObD9hASw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6100553EB27B88E996AF4B40D80F9BA3F807820B
                                    [accentColor] => 572BA0
                                )

                            [B2AEED613A3200C6E7FC12F59C0621792A528D4C] => Array
                                (
                                    [name] => Bitrefill offline after system vulnerability: partial restoration ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th?id=OIF.HsuBuAM%2fiWY9vA4x2uithQ&pid=Api
                                    [datePublished] => 2026-03-04T10:28:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://decripto.org/wp-content/uploads/2026/03/image-57-1024x683.png
                                    [hostPageUrl] => https://decripto.org/en/bitrefill-offline-after-system-vulnerability-partial-restoration-planned-for-4-march/
                                    [contentSize] => 1180500 B
                                    [width] => 1024
                                    [height] => 683
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.bc03a02a031f8a0c9f6cc0095ae01bd8?rik=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C4D825A2971260C95F21CF7E6C0023A316DEEA2B
                                    [accentColor] => C79104
                                    [isFresh] => 1
                                )

                            [1358A9E5C0807B7240F7AA9E12907E7565304C25] => Array
                                (
                                    [name] => Automation of System Security Vulnerabilities Detection Using Open ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.ZBFm_ewTXSTk-ZnA6Z9u5gHaGK?pid=Api
                                    [datePublished] => 2024-02-24T09:09:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/electronics/electronics-13-00873/article_deploy/html/images/electronics-13-00873-g001-550.jpg?1708765490
                                    [hostPageUrl] => https://www.mdpi.com/2079-9292/13/5/873
                                    [contentSize] => 26934 B
                                    [width] => 550
                                    [height] => 458
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.641166fdec135d24e4f999c0e99f6ee6?rik=MYWaXgwItycEfw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 52C4035657E70921E9AA7F0427B7080C5E9A8531
                                    [accentColor] => 2D579E
                                )

                            [682376800113B4205C40D501A4B9816F322CFB5E] => Array
                                (
                                    [name] => Exploit Forge
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.7r2gvPXTGqwZ1g704hjAowHaGW?pid=Api
                                    [datePublished] => 2023-06-03T21:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZNLcSaUe_tKv1lvCjqe1BrAlJhlohtmWNaRcNW4csb3uof2WCp_WWWiL97wlwhrAwelNtyh3ry8C8G1JbLSnEs9bpE-k5RJ_Ox27KrY9GYjocBRED08dNOfMYbAFR0MHoa-DwCfPVLPl8CzatayrgBVtP1oIyH0ZrP2QZ9_Yx2noeJADU6ZLpAForjeQ/w1600/common-web-application-vulnerabilities.jpg
                                    [hostPageUrl] => https://pygurutricks.in/
                                    [contentSize] => 53106 B
                                    [width] => 700
                                    [height] => 600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.eebda0bcf5d31aac19d60ef4e218c0a3?rik=hjJnCBAxSwLFBA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E5BFC223F6189B4A105D04C5024B311008673286
                                    [accentColor] => B01B2E
                                )

                            [8FAA1461F814BA0AD052983429ED8D2CC42AE2A2] => Array
                                (
                                    [name] => Critical TeamViewer Vulnerability Allows File Deletion with SYSTEM ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.KEj7xkQS3TGB-SpTD0yYXwHaEz?pid=Api
                                    [datePublished] => 2025-06-25T14:45:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blogs.npav.net/media/magefan_blog/Critical_TeamViewer_Vulnerability_Allows_File_Deletion_with_SYSTEM_Privileges_3_.png
                                    [hostPageUrl] => https://blogs.npav.net/blogs/post/critical-teamviewer-vulnerability-allows-file-deletion-with-system-privileges
                                    [contentSize] => 1098722 B
                                    [width] => 1080
                                    [height] => 700
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2848fbc64412dd3181f92a530f4c985f?rik=%2bKpBFo9Bq6ANJQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2A2EA24CC2D8DE924389250DA0AB418F1641AAF8
                                    [accentColor] => B65215
                                )

                            [450A525CB9BB3626B971FA699E88B72BE3550016] => Array
                                (
                                    [name] => Types of RAG: An Overview. Retrieval Augmented Generation is the… | by ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.lJ84BjA8yo8LQuXOLP9C4AHaEK?pid=Api
                                    [datePublished] => 2024-01-21T04:42:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://miro.medium.com/v2/resize:fit:1358/format:webp/1*78Ewd1vR-f_npT8F4prdrg.png
                                    [hostPageUrl] => https://blog.jayanthk.in/types-of-rag-an-overview-0e2b3ed71b82
                                    [contentSize] => 27768 B
                                    [width] => 930
                                    [height] => 522
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.949f3806303cca8f0b42e5ce2cff42e0?rik=VKAlxZu7Y2KbFw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6100553EB27B88E996AF179B6263BB9BC525A054
                                    [accentColor] => BC710F
                                )

                            [8DD1685104EB7BC7538FFA699E88B72BE3550016] => Array
                                (
                                    [name] => Types of RAG: An Overview. Retrieval Augmented Generation is the… | by ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.YVxNtdWKc5K3YOMVSuY4xwHaFK?pid=Api
                                    [datePublished] => 2024-01-21T04:42:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://miro.medium.com/v2/resize:fit:1358/format:webp/1*Y8ubvRkR_BYexGDWouEpWQ.png
                                    [hostPageUrl] => https://blog.jayanthk.in/types-of-rag-an-overview-0e2b3ed71b82
                                    [contentSize] => 108402 B
                                    [width] => 1358
                                    [height] => 947
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.615c4db5d58a7392b760e3154ae638c7?rik=2B2GFUC%2bt3w1%2bA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6100553EB27B88E996AFF8357CB7BE4015861DD8
                                    [accentColor] => 045852
                                )

                            [0D669858AA44FEAEAF66FA699E88B72BE3550016] => Array
                                (
                                    [name] => Types of RAG: An Overview. Retrieval Augmented Generation is the… | by ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.up82WR90Srwcdu-h8SwDIAHaF0?pid=Api
                                    [datePublished] => 2024-01-21T04:42:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://miro.medium.com/v2/resize:fit:1358/1*xfhRl-AJMhxAYXazeycSyg.png
                                    [hostPageUrl] => https://blog.jayanthk.in/types-of-rag-an-overview-0e2b3ed71b82
                                    [contentSize] => 658927 B
                                    [width] => 1200
                                    [height] => 944
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ba9f36591f744abc1c76efa1f12c0320?rik=0GaJhapE7%2br6Zg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6100553EB27B88E996AF66FAEAEF44AA858966D0
                                    [accentColor] => BE8A0D
                                )

                            [055FB2DC0E340172D609393C58E06054535D9EE7] => Array
                                (
                                    [name] => Development of Vulnerability Assessment Framework for Disaster Risk ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.yETa_1N70yngy1Lp-ReReAHaHe?pid=Api
                                    [datePublished] => 2020-10-23T12:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/sustainability/sustainability-12-08815/article_deploy/html/images/sustainability-12-08815-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2071-1050/12/21/8815
                                    [contentSize] => 30501 B
                                    [width] => 2337
                                    [height] => 2357
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c844daff537bd329e0cb52e9f9179178?rik=UPUrzeBDECdtkA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7EE9D53545060E85C393906D271043E0CD2BF550
                                    [accentColor] => 1E80AD
                                )

                            [55198DFB4711A0C55126C0883A974C4002E58907] => Array
                                (
                                    [name] => Data-Driven Threat Analysis for Ensuring Security in Cloud Enabled Systems
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.M7MHuHYv65K7chHrayCjDQHaFM?pid=Api
                                    [datePublished] => 2022-07-30T13:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/sensors/sensors-22-05726/article_deploy/html/images/sensors-22-05726-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/1424-8220/22/15/5726
                                    [contentSize] => 594768 B
                                    [width] => 1822
                                    [height] => 1279
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.33b307b8762feb92bb7211eb6b20a30d?rik=VZHYv3QRClwVYg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 70985E2004C479A3880C62155C0A1174BFD89155
                                    [accentColor] => 666566
                                )

                            [83C709ED1F2FB594B88556397E6B52B7D01E184C] => Array
                                (
                                    [name] => Critical Vulnerability in Mitsubishi Electric AC Systems Allows Remote ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.BN_eEKg_MGn0JBMZqdJagQHaEz?pid=Api
                                    [datePublished] => 2025-06-27T11:11:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://blogs.npav.net/media/magefan_blog/Critical_Vulnerability_in_Mitsubishi_Electric_AC_Systems_Allows_Remote_Control_3_.png
                                    [hostPageUrl] => https://blogs.npav.net/blogs/post/critical-vulnerability-in-mitsubishi-electric-ac-systems-allows-remote-control
                                    [contentSize] => 1161174 B
                                    [width] => 1080
                                    [height] => 700
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.04dfde10a83f3069f4241319a9d25a81?rik=OHyQ3vHyW0mLWA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C481E10D7B25B6E79365588B495BF2F1DE907C38
                                    [accentColor] => 018A47
                                )

                            [3D349A91369C8F621CD7F52DFECB8E06DB1D9C1F] => Array
                                (
                                    [name] => Protecting our Critical Infrastructure | U.S. GAO
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.Tdf67pWI3Je8-EJDHzdmrAHaE9?pid=Api
                                    [datePublished] => 2019-11-22T12:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.gao.gov/assets/gao_blog/inline/4_8.png
                                    [hostPageUrl] => https://www.gao.gov/blog/2019/11/22/protecting-our-critical-infrastructure
                                    [contentSize] => 754409 B
                                    [width] => 1173
                                    [height] => 786
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4dd7faee9588dc97bcf842431f3766ac?rik=00OpGWPJ%2bCbBfQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F1C9D1BD60E8BCEFD25F7DC126F8C96319A943D3
                                    [accentColor] => 8D1F2C
                                )

                            [0AA93679CCE508ABB4A3596E39D399DD9CC25B8B] => Array
                                (
                                    [name] => Exploit Kit - Definition - Trend Micro IN
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.AXSfjXG_lnLSRwwaszRn6gHaEP?pid=Api
                                    [datePublished] => 2019-04-09T01:03:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://documents.trendmicro.com/images/tex/articles/exploitkit-figure-1.jpg
                                    [hostPageUrl] => http://www.trendmicro.co.in/vinfo/in/security/definition/exploit-kit
                                    [contentSize] => 123862 B
                                    [width] => 1500
                                    [height] => 858
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.01749f8d71bf9672d2470c1ab33467ea?rik=oJpjl8xegLpLOg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B8B52CC9DD993D93E6953A4BBA805ECC97639AA0
                                    [accentColor] => C78B04
                                )

                            [B33F22511E0499B42D4B6CE4B3B78B25238DC30B] => Array
                                (
                                    [name] => A guide to implement effective cloud vulnerability scanning | nasscom ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.1vF25VD0pQBnph3u_9UWJAHaEo?pid=Api
                                    [datePublished] => 2023-05-09T08:58:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://community.nasscom.in/sites/default/files/media/images/Secure-your-cloud-with-vulnerability-scanning-Nasscom.jpg
                                    [hostPageUrl] => https://community.nasscom.in/communities/cyber-security-privacy/guide-implement-effective-cloud-vulnerability-scanning
                                    [contentSize] => 258453 B
                                    [width] => 960
                                    [height] => 600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d6f176e550f4a50067a61deeffd51624?rik=O%2fMiFeFAmUvStA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B03CD83252B87B3B4EC6B4D24B9940E11522F33B
                                    [accentColor] => C97E02
                                )

                            [798C3916AAA164E3A82BAC8C8B8790E28E6D296A] => Array
                                (
                                    [name] => An Intelligent Attack Detection Framework for the Internet of ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.ghhnK_JovZgJ2Kx2uwRBxQHaDl?pid=Api
                                    [datePublished] => 2024-08-08T10:18:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/wevj/wevj-15-00356/article_deploy/html/images/wevj-15-00356-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2032-6653/15/8/356
                                    [contentSize] => 1181708 B
                                    [width] => 3040
                                    [height] => 1475
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8218672bf268bd9809d8ac76bb0441c5?rik=l8iTYaoaRj6Ksg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A692D6E82E0978B8C8CAB28A3E461AAA6193C897
                                    [accentColor] => BE930D
                                )

                            [8C014D0EBBBCDA0579B465F81B6C57016D270CFF] => Array
                                (
                                    [name] => Complete Guide: Build Production-Ready RAG Systems with LangChain and ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.vDZ1qxN11EhftkaBdaNkUwHaHa?pid=Api
                                    [datePublished] => 2025-08-25T06:21:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://python.elitedev.in/images/24bfcadc-34db-429e-93f0-ad7a66bd0a7c.webp
                                    [hostPageUrl] => https://python.elitedev.in/large_language_model/complete-guide-build-production-ready-rag-systems-with-langchain-and-vector-databases-in-2024-03bbca61/
                                    [contentSize] => 84746 B
                                    [width] => 1024
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.bc3675ab1375d4485fb6468175a36453?rik=yBDU4LvLrVCXSw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => FFC072D61075C6B18F564B9750ADCBBBE0D410C8
                                    [accentColor] => 0B7BC0
                                )

                            [A2E4A4C2BA1D3EA5A48F1BA04C1E9204D1D8D07E] => Array
                                (
                                    [name] => Falcon Spotlight: Scanless Vulnerability Management
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.of8b3X11NVhg2ceuez6OJwHaDo?pid=Api
                                    [datePublished] => 2021-03-06T17:33:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.crowdstrike.com/wp-content/uploads/2020/04/falcon-spotlight-vulnerability-assessment-dashboard.png
                                    [hostPageUrl] => https://www.electroon.com/cyber-security/antiviruses/falcon-spotlight-scanless-vulnerability-management/
                                    [contentSize] => 162767 B
                                    [width] => 1600
                                    [height] => 784
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a1ff1bdd7d75355860d9c7ae7b3e8e27?rik=Kk5KLKvR41pK%2bA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E70D8D1D4029E1C40AB1F84A5AE3D1AB2C4A4E2A
                                    [accentColor] => C28B09
                                )

                            [C33B10AFE091F3F9348CDB23039391D02438D2E0] => Array
                                (
                                    [name] => Buy Evaluating Cryptographic Vulnerabilities Created by Quantum ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.XjhxrMURjhBMJobNN5D4ngAAAA?pid=Api
                                    [datePublished] => 2023-10-25T20:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41ZMx1ACemL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Evaluating-Cryptographic-Vulnerabilities-Computing-Industrial/dp/1977411886
                                    [contentSize] => 18527 B
                                    [width] => 296
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5e3871acc5118e104c2686cd3790f89e?rik=PLMB%2bg4ZP59DyA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0E2D83420D19393032BDC8439F3F190EFA01B33C
                                    [accentColor] => 187AB3
                                )

                            [F9E1B84062B01A550E5DD8BC018B0BD76191E01B] => Array
                                (
                                    [name] => How to Build Production-Ready RAG Systems with LangChain and Vector ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.aPMepr1UqSPtmxxKCp4y9wHaHa?pid=Api
                                    [datePublished] => 2025-08-31T00:47:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://python.elitedev.in/images/9aca2efb-d2af-431a-80c7-5d1b5fbb3977.webp
                                    [hostPageUrl] => https://python.elitedev.in/large_language_model/how-to-build-production-ready-rag-systems-with-langchain-and-vector-databases-in-python-2024-f1ff1b5a/
                                    [contentSize] => 110500 B
                                    [width] => 1024
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.68f31ea6bd54a923ed9b1c4a0a9e32f7?rik=nx6LBCYLoVXg1Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B10E19167DB0B810CB8DD5E055A10B26048B1E9F
                                    [accentColor] => 0C4464
                                )

                            [20AE01531D7567C55D16525F0ABB98BC09F904EF] => Array
                                (
                                    [name] => Automated penetration testing services – T-Systems
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.rdkB87xiphnq4EufgfjK9wHaE8?pid=Api
                                    [datePublished] => 2024-06-04T09:10:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.t-systems.com/resource/image/949816/ratio3x2/1440/960/f1bf670777503b584a2e277ee6783568/6A7AAADDAA8B1F893B56D857724C6A66/im-automated-penetration-testing-services-for-businesses.webp
                                    [hostPageUrl] => https://www.t-systems.com/in/en/security/solutions/automated-penetration-testing-services
                                    [contentSize] => 38580 B
                                    [width] => 1440
                                    [height] => 960
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.add901f3bc62a619eae04b9f81f8caf7?rik=AuoQNdFXdlzVYQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => FE409F90CB89BBA0F52561D55C7657D13510EA02
                                    [accentColor] => 184364
                                )

                            [3D1E7EEB41E2EB7573725B18B4ABBDCB2398B84E] => Array
                                (
                                    [name] => Production-Ready RAG Systems with LangChain: Complete Vector Database ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.y1ovhd_6lGEXMIK2PMt__wHaHa?pid=Api
                                    [datePublished] => 2025-09-06T17:07:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://python.elitedev.in/images/074747de-ecea-4eb3-972d-3f78d96c8adb.webp
                                    [hostPageUrl] => https://python.elitedev.in/large_language_model/production-ready-rag-systems-with-langchain-complete-vector-database-implementation-guide-b52da694/
                                    [contentSize] => 76992 B
                                    [width] => 1024
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.cb5a2f85dffa9461173082b63ccb7fff?rik=0%2bHnvhQuvlc3Jw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E48B8932BCDBBA4B81B5273757BE2E14BEE7E1D3
                                    [accentColor] => 104A61
                                )

                            [AC8C5CDFE600609DA2CB5BA0D3773651312CD3DA] => Array
                                (
                                    [name] => Ecosystem-Based Disaster Risk Reduction Framework as a Tool for ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.uhxzmIxlgGWXLVDDiigCvwHaGL?pid=Api
                                    [datePublished] => 2022-10-25T11:21:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/environsciproc/environsciproc-21-00040/article_deploy/html/images/environsciproc-21-00040-g001-550.jpg?1666698334
                                    [hostPageUrl] => https://www.mdpi.com/2673-4931/21/1/40
                                    [contentSize] => 45277 B
                                    [width] => 550
                                    [height] => 459
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ba1c73988c658065972d50c38a2802bf?rik=ysjF%2fW4ABtkqvA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => AD3DC2131563773D0AB5BC2AD906006EFDC5C8CA
                                    [accentColor] => C00B0C
                                )

                            [3208C3CC58A2164843F8A524163A6E3F9FE402ED] => Array
                                (
                                    [name] => Production-Ready RAG Systems with LangChain Vector Databases Complete ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.DVTCdlFoQsHq8bM-fCXp0QHaHa?pid=Api
                                    [datePublished] => 2025-09-20T12:10:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://python.elitedev.in/images/8bf2ead6-b9ce-422f-a660-569f103bacd4.webp
                                    [hostPageUrl] => https://python.elitedev.in/large_language_model/production-ready-rag-systems-with-langchain-vector-databases-complete-implementation-guide-a7d6769a/
                                    [contentSize] => 77010 B
                                    [width] => 1024
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0d54c276516842c1eaf1b33e7c25e9d1?rik=I4A8zIUqYYQ0jw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => DE204EF9F3E6A361425A8F3484612A85CC3C8023
                                    [accentColor] => 0F446A
                                )

                            [E8BBBB66765F634851A950EB0459A245538C363F] => Array
                                (
                                    [name] => What Is Web Security? | Akamai
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.a97Jb1oO57RsCd6PQljzFQHaEK?pid=Api
                                    [datePublished] => 2024-07-25T00:34:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.akamai.com/site/en/images/article/2022/common-types-of-attack-vectors.png
                                    [hostPageUrl] => https://www.akamai.com/glossary/what-is-web-security
                                    [contentSize] => 210982 B
                                    [width] => 1920
                                    [height] => 1080
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6bdec96f5a0ee7b46c09de8f4258f315?rik=jru7Zmf1NoQVmg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F363C835542A9540BE059A158436F56766BBBB8E
                                    [accentColor] => A2292D
                                )

                            [B78B0DE23F7BA887F9F3DA302BBC4395A16A942E] => Array
                                (
                                    [name] => IoT Devices: Common Vulnerabilities and Solutions
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.d74T8NVfvoVHuQ6gOkSYEgHaDt?pid=Api
                                    [datePublished] => 2025-04-09T13:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://rhosigma.in/uploads/iot-devices-common-vulnerabilities-solutions-1744198355637.jpg
                                    [hostPageUrl] => https://rhosigma.in/blog/iot-devices-common-vulnerabilities-solutions
                                    [contentSize] => 36013 B
                                    [width] => 800
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.77be13f0d55fbe8547b90ea03a449812?rik=e7jQLvO3inifPw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E249A61A5934CBB203AD3F9F788AB7F32ED0B87B
                                    [accentColor] => 129CB9
                                )

                            [4E07F0B7DD19585B6C4D5246F357231855628F37] => Array
                                (
                                    [name] => Vulnerability Assessment Services in India | Cyforce
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.k1Q4dVjYPUoc_J2HaLWR8QHaFO?pid=Api
                                    [datePublished] => 2022-03-05T07:31:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cyforce.in/images/img/vulnerability-assessment.jpg
                                    [hostPageUrl] => https://cyforce.in/vulnerability-assessment.html
                                    [contentSize] => 136323 B
                                    [width] => 851
                                    [height] => 600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.9354387558d83d4a1cfc9d8768b591f1?rik=5HAPe92RhbXG1A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 73F826558132753F6425D4C6B58591DD7B0F70E4
                                    [accentColor] => 060E29
                                )

                            [CE18B93946F3D34A5D6FAF92B52F20975CB6C3D5] => Array
                                (
                                    [name] => BMTPC
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.0WQ1b44W1pCR8K8gqDPkUwHaKu?pid=Api
                                    [datePublished] => 2020-05-27T06:37:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.bmtpc.org/DataFiles/CMS/file/VAI2019/MAP/eqmap/EQ_JPG/EQ_INDIA.jpg
                                    [hostPageUrl] => https://www.bmtpc.org/topics.aspx?mid=56&Mid1=178
                                    [contentSize] => 1983941 B
                                    [width] => 3199
                                    [height] => 4634
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d164356f8e16d69091f0af20a833e453?rik=7IGbk2Q%2fPaTV9g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5D3C6BC57902F25B29FAF6D5A43D3F64939B81EC
                                    [accentColor] => C68C05
                                )

                            [D3AAF313B992773BC57198113C612CEA29DD735A] => Array
                                (
                                    [name] => MN MRWA Security Vulnerability & Emergency Response Plan SelfAssessment ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.T8LNfdlH9mhl6kTZSO_M5AAAAA?pid=Api
                                    [datePublished] => 2020-12-06T18:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.pdffiller.com/preview/441/759/441759627.png
                                    [hostPageUrl] => https://www.uslegalforms.com/form-library/151858-mn-mrwa-security-vulnerability-emergency-response-plan-selfassessment-for-small-water-systems
                                    [contentSize] => 14197 B
                                    [width] => 298
                                    [height] => 386
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4fc2cd7dd947f66865ea44d948efcce4?rik=Pao%2fMZspd7NcFw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A537DD92AEC216C31189175CB377299B313FAA3D
                                    [accentColor] => A72434
                                )

                            [41402A4B781EEBCC0EE8536BDEBBDED948112AB0] => Array
                                (
                                    [name] => Buy Security of Cyber-Physical Systems: Vulnerability and Impact Book ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.LJFYLLJUV347jmHQ77rB1gAAAA?pid=Api
                                    [datePublished] => 2021-07-31T00:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41vzhEnmypS._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Security-Cyber-Physical-Systems-Vulnerability-Impact/dp/3030455432
                                    [contentSize] => 14077 B
                                    [width] => 294
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2c91582cb254577e3b8e61d0efbac1d6?rik=FASitIfhvszgjg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0BA211849DEDBBEDB6358EE0CCBEE187B4A20414
                                    [accentColor] => 2C5364
                                )

                            [D08C81E8E71D68DAA1141B9D4DF4F54D31A3B6EE] => Array
                                (
                                    [name] => Illegal constructions, weak drainage systems worsen PoJK's disaster ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.xU1kJN3BE5EaA8ncFLXzmQHaFj?pid=Api
                                    [datePublished] => 2025-09-03T07:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d3lzcn6mbbadaf.cloudfront.net/media/details/ANI-20250903084446.jpg
                                    [hostPageUrl] => https://www.aninews.in/news/world/asia/illegal-constructions-weak-drainage-systems-worsen-pojks-disaster-vulnerability20250903141925/
                                    [contentSize] => 275297 B
                                    [width] => 600
                                    [height] => 450
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c54d6424ddc113911a03c9dc14b5f399?rik=DcgYjn7Rhq0aQQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EE6B3A13D45F4FD4D9B1411AAD86D17E8E18C80D
                                    [accentColor] => 4B5F20
                                )

                            [F521036C6AFC04C30805F75F17A22834D9739067] => Array
                                (
                                    [name] => Water Leakage Detection System -Asha Enterprise India, AHMEDABAD
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.LUTQY_alQRy7uCdS3ENR1AHaEG?pid=Api
                                    [datePublished] => 2025-08-19T18:46:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://productimages.withfloats.com/actual/68087572f165dc78820ae3f6.jpg
                                    [hostPageUrl] => https://www.ashaenterprise.in/products/water-leakage-detection-system/20
                                    [contentSize] => 52354 B
                                    [width] => 1300
                                    [height] => 719
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2d44d063f6a5411cbbb82752dc4351d4?rik=XxIwxqbPQDyAUA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7609379D43822A71F57F50803C40CFA6C630125F
                                    [accentColor] => 2B6CA0
                                )

                            [8D494275BB56D336F2FAF75F17A22834D9739067] => Array
                                (
                                    [name] => Water Leakage Detection System -Asha Enterprise India, AHMEDABAD
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.4Fo0U3s69drn82ykQEst1QHaDq?pid=Api
                                    [datePublished] => 2025-08-19T18:46:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://web.s-cdn.boostkit.dev/webaction-files/5ac4f587beef72050ad4e284_product_images/wldfs-2-68087569a34066c615699bd9.png
                                    [hostPageUrl] => https://www.ashaenterprise.in/products/water-leakage-detection-system/20
                                    [contentSize] => 615916 B
                                    [width] => 1019
                                    [height] => 505
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e05a34537b3af5dae7f36ca4404b2dd5?rik=2JQkV7tlPWMvrw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7609379D43822A71F57FAF2F633D65BB572494D8
                                    [accentColor] => 004175
                                )

                            [904CB9DC2EC2EF491F4E33E08229370A35EDB13D] => Array
                                (
                                    [name] => Vulnerability Assessment of Physical Protection Systems eBook : Garcia ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.RSrRM3oTkdMtcVJSc7-jIgAAAA?pid=Api
                                    [datePublished] => 2005-12-08T12:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/51j-SJscFxL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Vulnerability-Assessment-Physical-Protection-Systems-ebook/dp/B001V7U7K4
                                    [contentSize] => 28678 B
                                    [width] => 312
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.452ad1337a1391d32d71525273bfa322?rik=CcSbzeIs%2fpTx5A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D31BDE53A07392280E33E4F194FE2CE2CD9BC409
                                    [accentColor] => 054975
                                )

                            [1DE7DD34BB7E007050A7DD4E99BEBD3C2FE1872D] => Array
                                (
                                    [name] => Early Warning System and Drought Vulnerability in Ilemi Turkana Kenya ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.u-o6SDH9mqxPDf0lq7kn2gAAAA?pid=Api
                                    [datePublished] => 2022-04-29T12:16:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://rukmini1.flixcart.com/image/300/300/kjhgzgw0-0/book/w/2/q/early-warning-system-and-drought-vulnerability-in-ilemi-turkana-original-imafzfggkhqgwhkj.jpeg
                                    [hostPageUrl] => https://www.flipkart.com/early-warning-system-drought-vulnerability-ilemi-turkana-kenya/p/itm5e365a3b39cec
                                    [contentSize] => 17600 B
                                    [width] => 200
                                    [height] => 300
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.bbea3a4831fd9aac4f0dfd25abb927da?rik=0X7dQ7vnAAcFeg&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fkjhgzgw0-0%2fbook%2fw%2f2%2fq%2fearly-warning-system-and-drought-vulnerability-in-ilemi-turkana-original-imafzfggkhqgwhkj.jpeg&ehk=RbeElkPxa8YyFWD2ShzdCg0D7Led5b10P3Z2W9LldvA%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D2781EF2C3DBEB99E4DD7A050700E7BB43DD7ED1
                                    [accentColor] => AB2022
                                )

                            [10643F4E9F18C7AB788300273EE564161CC7E0CE] => Array
                                (
                                    [name] => Buy Topmate Products Online at Best Prices in India | Ubuy
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.JxPszUlWVxKVjU89AE7xCQHaD1?pid=Api
                                    [datePublished] => 2021-04-07T00:20:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images-cdn.ubuy.co.in/633aba5bb961822663096fbe-topmate-c5-laptop-cooling-pad-gaming.jpg
                                    [hostPageUrl] => https://www.ubuy.co.in/brand/topmate
                                    [contentSize] => 276652 B
                                    [width] => 1500
                                    [height] => 777
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2713eccd49565712958d4f3d004ef109?rik=AUbz5PmBfLqHOA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EC0E7CC161465EE372003887BA7C81F9E4F34601
                                    [accentColor] => 1A22B1
                                )

                            [21F51B88F460A9570BE7F6798E88E22C8DAC574F] => Array
                                (
                                    [name] => Natural language question answering in Wikipedia - an exploration ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.eGn2-t13xawtbfEKahSCtwHaEY?pid=Api
                                    [datePublished] => 2023-07-21T08:04:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://docs.aws.amazon.com/images/sagemaker/latest/dg/images/jumpstart/jumpstart-fm-rag.jpg
                                    [hostPageUrl] => https://thottingal.in/blog/2023/07/21/wikiqa/
                                    [contentSize] => 42727 B
                                    [width] => 898
                                    [height] => 532
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7869f6fadd77c5ac2d6df10a6a1482b7?rik=El%2bxiE8GmnWwfg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F475CAD8C22E88E8976F7EB0759A064F88B15F12
                                    [accentColor] => 0C614D
                                )

                            [754651D064429623C9F73D3C88EF111576BCE5B4] => Array
                                (
                                    [name] => Cybersecurity for Large Language Models: Protecting AI Systems from ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.aeQPVOm7u0QsLiKo_dnA8AAAAA?pid=Api
                                    [datePublished] => 2024-10-07T03:31:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/51KIV36DUXL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Cybersecurity-Large-Language-Models-Vulnerabilities-ebook/dp/B0DD7SHZ2Y
                                    [contentSize] => 28956 B
                                    [width] => 279
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.69e40f54e9bbbb442c2e22a8fdd9c0f0?rik=V2QVDUYkaTKcfw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4B5ECB675111FE88C3D37F9C326924460D156457
                                    [accentColor] => 658D3E
                                )

                            [B3D6F6D130F9FBB09F5BE31E2F55D1A2E61737DE] => Array
                                (
                                    [name] => Build Production-Ready RAG Systems: Complete LangChain Vector Database ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.TDJS9SXFM6PX1ebcQyPHGQHaHa?pid=Api
                                    [datePublished] => 2025-09-08T00:52:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://python.elitedev.in/images/c8633024-38c0-4733-9b77-6a500c0c6ac4.webp
                                    [hostPageUrl] => https://python.elitedev.in/large_language_model/build-production-ready-rag-systems-complete-langchain-vector-database-implementation-guide-for-2024/
                                    [contentSize] => 86192 B
                                    [width] => 1024
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4c3252f525c533a3d7d5e6dc4323c719?rik=O21vHQOfvwv5tQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => ED73716E2A1D55F2E13EB5F90BBF9F031D6F6D3B
                                    [accentColor] => 0B416B
                                )

                            [66E88FC04875619EACBB01C7728573BD8894DFA4] => Array
                                (
                                    [name] => Introduction to Solar PV and Diesel Generator Hybrid System
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP._D6_tbDMYW8QGCu52j2ioAHaEK?pid=Api
                                    [datePublished] => 2023-07-21T03:41:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://edisonlms-fs.s3.us-east-2.amazonaws.com/tenant_renewableenergystudygroup/4611399a-8089-47a1-bbb2-1c9806a0e9a9_1689850929113_Intro-Lecture-PV-DG.jpg
                                    [hostPageUrl] => https://renewableenergystudygroup.in/store/Introduction-to-Solar-PV-and-Diesel-Generator-Hybrid-System-5yy6gcjdr579
                                    [contentSize] => 277041 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.fc3ebfb5b0cc616f10182bb9da3da2a0?rik=Zo74DIRXFunKuw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4AFD4988DB3758277C10BBCAE91657840CF88E66
                                    [accentColor] => 86733B
                                )

                            [40D8AAD307F3922BB79D45C094411E82055DEF28] => Array
                                (
                                    [name] => Databricks Liquid Clustering: A Practical Guide | by Anurag Kumar | Aidetic
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.yMAUjZcTmnIFQSE7aJeIJQHaHL?pid=Api
                                    [datePublished] => 2025-01-28T18:55:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://miro.medium.com/v2/resize:fit:1358/0*Ach5MoW36UTwW7Xg.png
                                    [hostPageUrl] => https://blog.aidetic.in/databricks-liquid-clustering-a-practical-guide-221e4d563266
                                    [contentSize] => 478968 B
                                    [width] => 1260
                                    [height] => 1221
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c8c0148d97139a720541213b68978825?rik=BI2qPXA%2fKbJ72Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 82FED55028E114490C54D97BB2293F703DAA8D04
                                    [accentColor] => BD5C0E
                                )

                            [A324772D1613153FCD4373FDDFCA6339B85A1073] => Array
                                (
                                    [name] => Modular Healthcare System in Greater Noida
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.y8Ioc_XpD09WNF_NYSCGHgHaDP?pid=Api
                                    [datePublished] => 2024-11-02T11:41:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://backgroundimages.withfloats.com/actual/673e0142dc6cff61d650fe0d.jpg
                                    [hostPageUrl] => https://www.modularoperationtheatre.co.in/
                                    [contentSize] => 105883 B
                                    [width] => 1198
                                    [height] => 525
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.cbc22873f5e90f4f56345fcd6120861e?rik=OkJ30mExUfPcNA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3701A58B9336ACFDDF3734DCF3513161D277423A
                                    [accentColor] => 161E88
                                )

                            [151A67A85E723386B34165DF7C7D864538E7BBAF] => Array
                                (
                                    [name] => Exposed Vulnerability of the Supply Chain System
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.v3Z-N9ana2ZHeRZeW-D9IwHaEO?pid=Api
                                    [datePublished] => 2020-08-09T06:03:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://peaklife.in/uploads/2020/07/Exposed-Vulnerability-of-the-Supply-Chain-System-cover-image.jpg
                                    [hostPageUrl] => https://peaklife.in/exposed-vulnerability-of-the-supply-chain-system/
                                    [contentSize] => 281513 B
                                    [width] => 900
                                    [height] => 514
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.bf767e37d6a76b664779165e5be0fd23?rik=UaF2iuUnM2g7FA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => FABB7E835468D7C7FD56143B683327E58A76A151
                                    [accentColor] => A26829
                                )

                            [3C12425FCB7FDA01A974C22B15AE98EDDF2D37D6] => Array
                                (
                                    [name] => Vulnerability Details
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.jEpxUqWWKRkqBNEk4BFmtAHaFW?pid=Api
                                    [datePublished] => 2023-06-29T12:58:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://qualysguard.qg1.apps.qualys.in/portal-help/en/vm/images/group_by_download.png
                                    [hostPageUrl] => https://qualysguard.qg1.apps.qualys.in/portal-help/en/vm/assets/vulnerability_details.htm
                                    [contentSize] => 63279 B
                                    [width] => 866
                                    [height] => 625
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8c4a7152a59629192a04d124e01166b4?rik=wyEk9bz3rRCaRw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6D73D2FDDE89EA51B22C479A10ADF7BCF52421C3
                                    [accentColor] => 0053AD
                                )

                            [8AAFED33F70473BDC09AEC37B09CD6B1B87060AE] => Array
                                (
                                    [name] => Aerosol Fire Suppression System -Asha Enterprise India, AHMEDABAD
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.cxH1F5Wx52FAeZXEsohT8gHaJ4?pid=Api
                                    [datePublished] => 2025-07-27T14:04:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://productimages.withfloats.com/actual/68087244256442c04913f9d6.jpg
                                    [hostPageUrl] => https://www.ashaenterprise.in/products/aerosol-fire-suppression-system/15
                                    [contentSize] => 141503 B
                                    [width] => 1200
                                    [height] => 1600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7311f51795b1e761407995c4b28853f2?rik=qPreM39AN9sMqQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EA06078B1B6DC90B73CEA90CDB37407F33DEFAA8
                                    [accentColor] => 853C35
                                )

                            [2122374CA9D687378E3FEAD958A05A713AB73776] => Array
                                (
                                    [name] => Buy Unemployment, Social Vulnerability, and Health in Europe (Health ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.Bn2Lcdcna7Jw1q9jhpxBHgAAAA?pid=Api
                                    [datePublished] => 2018-02-22T20:43:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41pcbJ2ycpL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Unemployment-Social-Vulnerability-Systems-Research/dp/3540178678
                                    [contentSize] => 11283 B
                                    [width] => 312
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.067d8b71d7276bb270d6af63869c411e?rik=EiJzxJpteHPo8w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 67737BA317A50A859DAEF3E873786D9AC4732212
                                    [accentColor] => 016BAC
                                )

                            [1998D3A0671C6916F3C201AA1A862CBA6174F88D] => Array
                                (
                                    [name] => Tube Settler System - Envista
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.gUmzTIyTSdfisEXTASDsaQHaJ4?pid=Api
                                    [datePublished] => 2023-05-01T06:13:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://envista.co.in/assets/uploads/product-featured-218.jpg
                                    [hostPageUrl] => https://envista.co.in/product/tube-settler-system
                                    [contentSize] => 99071 B
                                    [width] => 768
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8149b34c8c9349d7e2b045d30120ec69?rik=kYk9CnbBlmE%2fLA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D88F4716ABC268A1AA102C3F6196C1760A3D8991
                                    [accentColor] => 7D624E
                                )

                            [E3940803A4FA8E754DF1DB9734465CD1F255C20B] => Array
                                (
                                    [name] => Build Production-Ready RAG Systems with LangChain and Vector Databases ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP._WqOXCHeQiXU-zTMAAHxrQHaHa?pid=Api
                                    [datePublished] => 2025-09-17T13:50:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://python.elitedev.in/images/62237d78-fcf5-4d15-91ad-c592340dd449.webp
                                    [hostPageUrl] => https://python.elitedev.in/large_language_model/build-production-ready-rag-systems-with-langchain-and-vector-databases-complete-implementation-guid-aabb103f/
                                    [contentSize] => 155728 B
                                    [width] => 1024
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.fd6a8e5c21de4225d4fb34cc0001f1ad?rik=PkmAMEqv6FfUHw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B02C552F1DC5644379BD1FD457E8AF4A3080493E
                                    [accentColor] => 014CAF
                                )

                            [F8BB473B7F39FC2C6FE5717996B29B117E3ED8EC] => Array
                                (
                                    [name] => Complete Guide to Building Production-Ready RAG Systems: LangChain ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.w1uhvdyM9rtMa_QYoy9XewHaHa?pid=Api
                                    [datePublished] => 2025-09-16T22:59:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://python.elitedev.in/images/7d1e10ae-a16a-49f7-90b6-97f5bb59b205.webp
                                    [hostPageUrl] => https://python.elitedev.in/large_language_model/complete-guide-to-building-production-ready-rag-systems-langchain-vector-databases-and-document-q-a461ab21/
                                    [contentSize] => 85674 B
                                    [width] => 1024
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c35ba1bddc8cf6bb4c6bf418a32f577b?rik=j7t0s%2feTz8L2Xg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => CE8DE3E711B92B6997175EF6C2CF93F7B374BB8F
                                    [accentColor] => 128BB9
                                )

                            [060DEDD0FFCDB869924BAADFEF6C4F5F134415AF] => Array
                                (
                                    [name] => Somya Sharma | AI/ML Engineer & RAG Systems Expert
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.fLZwy6AmZjevB8gG-5JKEQHaFO?pid=Api
                                    [datePublished] => 2025-08-21T22:59:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://somya-sharma.in/images/workshop03.jpg
                                    [hostPageUrl] => https://somya-sharma.in/
                                    [contentSize] => 69462 B
                                    [width] => 800
                                    [height] => 565
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7cb670cba0266637af07c806fb924a11?rik=YNDeDf%2fci5YptA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => FA514431F5F4C6FEFDAAB429968BDCFF0DDED060
                                    [accentColor] => 0836C3
                                )

                            [6782287824B0907FDF6706EFF6BBCB2BC638546F] => Array
                                (
                                    [name] => How Do 5G and SD-WAN Work Together? - Palo Alto Networks
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.IcACPhNQlcOclz2ESQgHlQHaEK?pid=Api
                                    [datePublished] => 2024-07-21T17:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.paloaltonetworks.in/content/dam/pan/en_US/images/cyberpedia/sdwan-and-5g/5g-threat-landscape.png
                                    [hostPageUrl] => https://www.paloaltonetworks.in/cyberpedia/sdwan-and-5g
                                    [contentSize] => 80128 B
                                    [width] => 1600
                                    [height] => 900
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.21c0023e135095c39c973d8449080795?rik=diiCh0ILCff9dg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F645836CB2BCBB6FFE6076FDF7090B4287822876
                                    [accentColor] => 00A8C0
                                )

                            [750DFA49AC5094F3E121AF92B52F20975CB6C3D5] => Array
                                (
                                    [name] => BMTPC
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.kit-n-uGcHFT4j87jxm9wQHaK1?pid=Api
                                    [datePublished] => 2020-05-27T06:37:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.bmtpc.org/DataFiles/CMS/file/VAI2019/MAP/lsmap/ls_jpg/LS_India.jpg
                                    [hostPageUrl] => https://www.bmtpc.org/topics.aspx?mid=56&Mid1=178
                                    [contentSize] => 583219 B
                                    [width] => 2148
                                    [height] => 3143
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.922b7e9feb86707153e23f3b8f19bdc1?rik=V9CvlMoFST8eEg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5D3C6BC57902F25B29FA121E3F4905CA94AFD057
                                    [accentColor] => 0FBCBC
                                )

                            [F185A39B366C3CB53E13256C1B9677CABC0750D3] => Array
                                (
                                    [name] => Buy Solar System Planets Designs Products Online | Ubuy India
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.G2iKip-YltVn1LfznHykMwHaG2?pid=Api
                                    [datePublished] => 2023-07-12T21:29:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images-cdn.ubuy.co.in/63400444e55ad53d0844ad75-hgod-designs-outer-space-pillow-case.jpg
                                    [hostPageUrl] => https://www.ubuy.co.in/brand/solar-system-planets-designs
                                    [contentSize] => 93663 B
                                    [width] => 908
                                    [height] => 840
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1b688a8a9f9896d567d4b7f39c7ca433?rik=H1g6uWPGw1vjMQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3D0570CBAC7769B1C65231E35BC3C663B93A581F
                                    [accentColor] => 147C86
                                )

                            [E459F901E8F586297C7D1B442A03243C51F5353B] => Array
                                (
                                    [name] => Buy DYNAMIC VULNERABILITY ASSESSMENT AND INTELLIGENT CONTROL: FOR ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.6WZ-EBh10IMS2WAZne3luAAAAA?pid=Api
                                    [datePublished] => 2020-10-24T18:56:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/61SLIofxcjL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/DYNAMIC-VULNERABILITY-ASSESSMENT-INTELLIGENT-CONTROL/dp/1119214955
                                    [contentSize] => 25480 B
                                    [width] => 310
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e9667e101875d08312d960199dede5b8?rik=TpWfEI5faJLH1w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B3535F15C34230A244B1D7C792685F8E109F954E
                                    [accentColor] => 4A275C
                                )

                            [D9DAE96AB381C48A223E5CAE68FEF48C4690F924] => Array
                                (
                                    [name] => Buy Trafficking Trajectories: Vulnerability, Failed Systems, and the ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.y1HHHdSUNc71qJTm4FXM7wAAAA?pid=Api
                                    [datePublished] => 2025-05-13T01:16:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/413kQyWT5JL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Trafficking-Trajectories-Vulnerability-Systems-Prevention/dp/1512827835
                                    [contentSize] => 15445 B
                                    [width] => 296
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.cb51c71dd49435cef5a894e6e055ccef?rik=na2epjsYTKgi4w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 429F0964C84FEF86EAC5E322A84C183BA69EAD9D
                                    [accentColor] => 11252F
                                )

                            [3C4DAAB44C83773CE21DEB38129D60FB9FD40B89] => Array
                                (
                                    [name] => Build Production-Ready RAG Systems: Complete LangChain Python Guide ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.XZszV3pj-gxjfNh8IzByHQHaHa?pid=Api
                                    [datePublished] => 2025-09-11T00:20:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://python.elitedev.in/images/6d78d082-dd39-4638-a1b9-ebd87f42ab43.webp
                                    [hostPageUrl] => https://python.elitedev.in/large_language_model/build-production-ready-rag-systems-complete-langchain-python-guide-with-vector-databases-and-optimi-3ead6ab6/
                                    [contentSize] => 123810 B
                                    [width] => 1024
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5d9b33577a63fa0c637cd87c2330721d?rik=w9SqS8Q4d8Mu0Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 98B04DF9BF06D92183BED12EC37738C44BAAD4C3
                                    [accentColor] => 194262
                                )

                            [DA2941FEB3F03CAFF943AFDBB586AD1E4AD3CFF4] => Array
                                (
                                    [name] => How to Build Production-Ready RAG Systems with LangChain and Vector ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.zKwW-cTbb7K2oYpSIbANSQHaHa?pid=Api
                                    [datePublished] => 2025-10-04T20:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://python.elitedev.in/images/99363a8a-be41-4c14-a562-27b366e9d840.webp
                                    [hostPageUrl] => https://python.elitedev.in/large_language_model/how-to-build-production-ready-rag-systems-with-langchain-and-vector-databases-in-python-00c2723a/
                                    [contentSize] => 139176 B
                                    [width] => 1024
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ccac16f9c4db6fb2b6a18a5221b00d49?rik=rZIU7zsPw%2fqfNA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4FFC3DA4E1DA685BBDFA349FFAC30F3BEF1492AD
                                    [accentColor] => 1299B9
                                )

                            [D62F326C99245327CC624F73EF8537349FA58BCA] => Array
                                (
                                    [name] => Build Production-Ready RAG Systems with LangChain and Vector Databases ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.IP2J30DA07dZRw_CYilrPgHaHa?pid=Api
                                    [datePublished] => 2025-09-26T05:07:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://python.elitedev.in/images/cebc2210-c6d9-43b0-91af-4571440391b5.webp
                                    [hostPageUrl] => https://python.elitedev.in/large_language_model/build-production-ready-rag-systems-with-langchain-and-vector-databases-complete-implementation-guid-20443cd5/
                                    [contentSize] => 87050 B
                                    [width] => 1024
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.20fd89df40c0d3b759470fc262296b3e?rik=bfIjxplCNXLMJg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => ACB85AF9437358FE37F426CC72354299C623F26D
                                    [accentColor] => 169EB5
                                )

                            [D5C7AC1A8A68AD43EDFC3EECD9A31AF954EA88B5] => Array
                                (
                                    [name] => Indrajaal Partners with Sigma Advanced Systems for Indigenous Anti ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.ipjCj05MPZ5PkxUEV-QuBwHaD6?pid=Api
                                    [datePublished] => 2023-09-25T12:53:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img-cdn.thepublive.com/fit-in/1200x675/filters:format(webp)/smstreet/media/post_banners/oGQA5c4t0rl9yYiGitAB.jpg
                                    [hostPageUrl] => https://smestreet.in/infocus/indrajaal-partners-with-sigma-advanced-systems-for-indigenous-anti-drone-defence-manufacturing/
                                    [contentSize] => 74024 B
                                    [width] => 1200
                                    [height] => 634
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8a98c28f4e4c3d9e4f93150457e42e07?rik=XXzKoaiG2jTezw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5B88AE459FA13A9DCEE3CFDE34DA86A8A1CA7C5D
                                    [accentColor] => 134663
                                )

                            [58DDF9BE93C36FE78950BD7361440AD39D1E2EE1] => Array
                                (
                                    [name] => Buy Resilience, Robustness, and Vulnerability of Transport Systems Book ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.s3stDQqXnJILWNuV3gG7RwAAAA?pid=Api
                                    [datePublished] => 2024-11-18T06:26:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/51XICUoFqcL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Resilience-Robustness-Vulnerability-Transport-Systems/dp/3031130405
                                    [contentSize] => 22601 B
                                    [width] => 296
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b37b2d0d0a979c920b58db95de01bb47?rik=hd2f6zk89n6YBQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1EE2E1D93DA0441637DB05987EF63C39EB9FDD85
                                    [accentColor] => C67805
                                )

                            [29A98069F38807749EADDA56C6A9E8CD11099C85] => Array
                                (
                                    [name] => Build Production-Ready RAG Systems: Complete LangChain Vector Database ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.kvJwVUc_8gOkQtR-0xEplgHaHa?pid=Api
                                    [datePublished] => 2025-07-20T10:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://python.elitedev.in/images/984829cf-a603-4177-86a5-12556c102f25.webp
                                    [hostPageUrl] => https://python.elitedev.in/large_language_model/build-production-ready-rag-systems-complete-langchain-vector-database-guide-for-retrieval-augmented/
                                    [contentSize] => 92920 B
                                    [width] => 1024
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.92f27055473ff203a442d47ed3112996?rik=kpoIlj%2bIcEfp2g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 58C99011DC8E9A6C65ADDAE94770883F96089A92
                                    [accentColor] => 1496B7
                                )

                            [843782735D778A4F70291927B6A6C512968DE6D4] => Array
                                (
                                    [name] => Building Production-Ready RAG Systems with LangChain and Chroma ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.w9hB4Y_N3aocfvs67llEHQHaHa?pid=Api
                                    [datePublished] => 2025-07-19T12:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://python.elitedev.in/images/f1c93111-86af-4aba-99e7-c25578f5b5e2.webp
                                    [hostPageUrl] => https://python.elitedev.in/large_language_model/building-production-ready-rag-systems-with-langchain-and-chroma-complete-document-retrieval-guide/
                                    [contentSize] => 94212 B
                                    [width] => 1024
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c3d841e18fcdddaa1c7efb3aee59441d?rik=SHMoN9V3qPQHkg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4D6ED869215C6A6B72919207F4A877D537287348
                                    [accentColor] => 1F86AC
                                )

                            [DD02919026494B8B697B8F14FD6851216C61ABC7] => Array
                                (
                                    [name] => Vulnerability - Free icons
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.7x5VaJ3dW-f53D4kU4iHmAHaHa?pid=Api
                                    [datePublished] => 2025-03-02T00:56:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cdn-icons-png.flaticon.com/512/16873/16873738.png
                                    [hostPageUrl] => https://www.flaticon.com/free-icon/vulnerability_16873738
                                    [contentSize] => 70397 B
                                    [width] => 512
                                    [height] => 512
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ef1e55689ddd5be7f9dc3e2453888798?rik=3SAZCWKUtLiWtw&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 7CBA16C6121586DF41F8B796B8B49462091920DD
                                    [accentColor] => 035CC8
                                )

                            [7ADDDB63A2900E4D4F65BA39F62A60F499F210D2] => Array
                                (
                                    [name] => Buy Funko Pop Products Online from Ubuy India
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.JytI9YONTNG3YRxn0R8RuwHaHN?pid=Api
                                    [datePublished] => 2020-07-04T23:54:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images-cdn.ubuy.co.in/633abbc7645a0545f7101dc8-ubuy-online-shopping.jpg
                                    [hostPageUrl] => https://www.ubuy.co.in/brand/funko
                                    [contentSize] => 237095 B
                                    [width] => 1500
                                    [height] => 1459
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.272b48f5838d4cd1b7611c67d11f11bb?rik=p929NioJ4NT0Vg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2D012F994F06A26F93AB56F4D4E0092A36BDDDA7
                                    [accentColor] => B49A17
                                )

                            [5ED29071BACE94DC1F2F2D745645A853511058F3] => Array
                                (
                                    [name] => Ultimate Guide to Tools and Techniques of Reconnaissance in Ethical Hacking
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.sKaloyW_cCOd5JblhYNWtgHaDt?pid=Api
                                    [datePublished] => 2023-11-24T12:56:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.fita.in/wp-content/uploads/2023/11/Tools-and-Techniques-of-Reconnaissance-in-Ethical-Hacking-768x384.jpg
                                    [hostPageUrl] => https://www.fita.in/ultimate-guide-to-tools-and-techniques-of-reconnaissance-in-ethical-hacking/
                                    [contentSize] => 55225 B
                                    [width] => 768
                                    [height] => 384
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b0a6a5a325bf70239de496e5858356b6?rik=5S0JF6vsSc3x8g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3F850115358A546547D2F2F1CD49ECAB17092DE5
                                    [accentColor] => CC4000
                                )

                            [F38FE85AA8B808AE7E2273EF41672F02C8F06BDA] => Array
                                (
                                    [name] => Portable P.A. Systems
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.J0pFU8NFFMylfNfBkRTIBgHaHa?pid=Api
                                    [datePublished] => 2017-12-28T11:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.megaindia.in/image/cache/2022/99%20uec-500x500.jpg
                                    [hostPageUrl] => https://www.megaindia.in/portable-pa-systems
                                    [contentSize] => 49293 B
                                    [width] => 500
                                    [height] => 500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.274a4553c34514cca57cd7c19114c806?rik=P%2fiOpYqLgOrnIg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => ADB60F8C20F27614FE3722E7EA808B8AA58EF83F
                                    [accentColor] => A64725
                                )

                            [5E5E779201875E9BABAD3252F7DC00E44E3DE0A2] => Array
                                (
                                    [name] => Justice system must respond to vulnerabilities of children with ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.P6rFoPdXwtfg5kFl7umi6gHaEz?pid=Api
                                    [datePublished] => 2024-09-28T09:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.millenniumpost.in/h-upload/2024/09/28/809828-pti09282024000123a.webp
                                    [hostPageUrl] => https://www.millenniumpost.in/big-stories/justice-system-must-respond-to-vulnerabilities-of-children-with-disabilities-cji-chandrachud-581342
                                    [contentSize] => 404122 B
                                    [width] => 3152
                                    [height] => 2043
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.3faac5a0f757c2d7e0e64165eee9a2ea?rik=5eV3KRB45bm62g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2A0ED3E44E00CD7F2523DABAB9E578102977E5E5
                                    [accentColor] => 525C79
                                )

                            [FE994604F68BAC8A59D373EF41672F02C8F06BDA] => Array
                                (
                                    [name] => Portable P.A. Systems
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.4kujEHxpIRzkznVCZGpN8wHaHa?pid=Api
                                    [datePublished] => 2017-12-28T11:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.megaindia.in/image/cache/product/portablepa/03-500x500.jpg
                                    [hostPageUrl] => https://www.megaindia.in/portable-pa-systems
                                    [contentSize] => 42822 B
                                    [width] => 500
                                    [height] => 500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e24ba3107c69211ce4ce7542646a4df3?rik=75lkQG%2b4yqiVPQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => ADB60F8C20F27614FE373D95A8CAB86F406499EF
                                    [accentColor] => 6A6936
                                )

                            [6E1A3969F5F0C450FC5F68BA439AF23577261A58] => Array
                                (
                                    [name] => Expert Blogs
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.lC9W22AZ0BfQNHxOeMItlwHaE8?pid=Api
                                    [datePublished] => 2024-06-04T09:10:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.t-systems.com/resource/image/974718/ratio3x2/1440/960/b98509bdb462259a315719dcf93a516f/71F49E65DC06DC8C48C59FDA824EE6D3/im-its-time-to-go-on-the-cyber-security-offensive.jpg
                                    [hostPageUrl] => https://www.t-systems.com/in/en/insights/newsroom/expert-blogs
                                    [contentSize] => 112010 B
                                    [width] => 1440
                                    [height] => 960
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.942f56db6019d017d0347c4e78c22d97?rik=5qGTll8PTAXP9Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 85A16277532FA934AB86F5CF054C0F5F9693A1E6
                                    [accentColor] => 2A76A1
                                )

                            [0284368D3669B770F91381041E374175147AAB9E] => Array
                                (
                                    [name] => Ignite Technologies – Ethical Hacking
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.ZlV1yFwvc4X1kstH3hvoIgHaEK?pid=Api
                                    [datePublished] => 2020-03-14T15:32:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.ignitetechnologies.in/images/ethical-hacking.jpg
                                    [hostPageUrl] => https://www.ignitetechnologies.in/ethical-hacking.html
                                    [contentSize] => 394010 B
                                    [width] => 1920
                                    [height] => 1080
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.665575c85c2f7385f592cb47de1be822?rik=IEhj2GOWewefMQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E9BAA741571473E14018319F077B9663D8634820
                                    [accentColor] => 836248
                                )

                            [36DB3326A874E8E6E3B8B4FDA6EADBF1C24B2FFE] => Array
                                (
                                    [name] => Revolutionizing Quantum Security: Synergy Quantum Exposes ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.WMZBMqhHCkBmQz1Zjic7ZAHaFj?pid=Api
                                    [datePublished] => 2025-04-19T07:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d3lzcn6mbbadaf.cloudfront.net/media/details/ANI-20250419115623.jpg
                                    [hostPageUrl] => https://www.aninews.in/news/business/revolutionizing-quantum-security-synergy-quantum-exposes-vulnerabilities-in-qkd-systems20250419172634/
                                    [contentSize] => 88314 B
                                    [width] => 600
                                    [height] => 450
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.58c64132a8470a4066433d598e273b64?rik=Y70zYopHjm4%2biw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EFF2B42C1FBDAE6ADF4B8B3E6E8E478A6233BD63
                                    [accentColor] => 217EAA
                                )

                            [566D1077CDBFD8E8B12696F6B2AD944C10643D15] => Array
                                (
                                    [name] => Buy Reducing the Vulnerability of Georgia's Agricultural Systems to ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.QKB7xnjTmFfUgRU6b6SrAQHaKl?pid=Api
                                    [datePublished] => 2025-01-13T21:37:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/8195ogcnkLL.jpg
                                    [hostPageUrl] => https://www.desertcart.in/products/266051286-reducing-the-vulnerability-of-georgias-agricultural-systems-to-climate-change-impact-assessment-and-adaptation-options
                                    [contentSize] => 397404 B
                                    [width] => 952
                                    [height] => 1360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.40a07bc678d39857d481153a6fa4ab01?rik=ZdYBd9z7jY4bYg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 51D34601C449DA2B6F69621B8E8DFBDC7701D665
                                    [accentColor] => 1A97B1
                                )

                            [A87228CBAAE4C1E14D2A72897420D2C94ADDCAF4] => Array
                                (
                                    [name] => Mega Public Address Systems
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.7i2pIgIj0R_pDPaY5vHARgHaDF?pid=Api
                                    [datePublished] => 2017-09-22T11:38:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.megaindia.in/image/cache/banner--new-1200x500.jpg
                                    [hostPageUrl] => https://www.megaindia.in/
                                    [contentSize] => 316005 B
                                    [width] => 1200
                                    [height] => 500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ee2da9220223d11fe90cf698e6f1c046?rik=iieCvKpOHB7Uog&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4FACDDA49C2D02479827A2D41E1C4EAABC82278A
                                    [accentColor] => B7141A
                                )

                            [FB2BAE0484F5E79E340C540A761D98D74D18F18F] => Array
                                (
                                    [name] => CEH v10 Footprinting and Reconnaissance Methodology
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.3Kl6njC_HfhbE2u5XDOdPwHaDW?pid=Api
                                    [datePublished] => 2022-11-16T01:59:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://1.bp.blogspot.com/-u6JKZJtQFnQ/XrT0SstSFSI/AAAAAAAAC_Q/e-K5XKnEXy8zVaR2NTjY-3ngbfKrnK4yACLcBGAsYHQ/s1600/footprinting-methodology4-26.png
                                    [hostPageUrl] => https://www.hackingtruth.in/2020/05/ceh-v10-footprinting-and-reconnaissance_7.html
                                    [contentSize] => 190369 B
                                    [width] => 858
                                    [height] => 388
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.dca97a9e30bf1df85b136bb95c339d3f?rik=v7LqQEhffulDwA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F81F81D47D89D167A045C043E97E5F4840EAB2BF
                                    [accentColor] => 4F8843
                                )

                            [C628C4D91467A5CBD95556A7D3EB9DD49FCA60E8] => Array
                                (
                                    [name] => Hi-Tech Home Automation System Services By House Story - HouseStory
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.f5cI5GAKFU8f77kQZXefVwHaHa?pid=Api
                                    [datePublished] => 2023-06-19T08:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://housestory.in/system/storage/app/public/photos/1/House%20interior%20images/House%20Story%20Automation%20Service.jpg
                                    [hostPageUrl] => https://housestory.in/service/hi-tech-home-automation-system-gwalior
                                    [contentSize] => 27987 B
                                    [width] => 600
                                    [height] => 600
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7f9708e4600a154f1fefb91065779f57?rik=bIJMnUF2WrydVQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8E06ACF94DD9BE3D7A65559DBC5A76419D4C826C
                                    [accentColor] => 4F657C
                                )

                            [894A59A0A00C2495DC800BE7768C3F3F6693195E] => Array
                                (
                                    [name] => Nadi Astrologer India Nadi Astrology Online India in Jaipur
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.aKqQSSTfLHk6HGVKrhgI_AHaHa?pid=Api
                                    [datePublished] => 2018-09-05T03:20:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://productimages.withfloats.com/actual/6287603cf94ef8000113272a.jpg
                                    [hostPageUrl] => https://www.kundlionline.in/
                                    [contentSize] => 330644 B
                                    [width] => 1500
                                    [height] => 1503
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.68aa904924df2c793a1c654aae1808fc?rik=mKSVCgrAQlnNCA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E5913966F3F3C8677EB008CD5942C00A0A95A498
                                    [accentColor] => C4BC07
                                )

                            [FEAF6CFB60922DBD82ED3F659122ADB61AA1526F] => Array
                                (
                                    [name] => Hillman Engineering Company in Bangalore
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.XxPHRjqlkZvaaQxN9uORcQHaHa?pid=Api
                                    [datePublished] => 2019-09-13T13:34:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://bizimages.withfloats.com/actual/704000b548f94f4f8a0f0066f183a5c7.jpg
                                    [hostPageUrl] => https://hillmanengineering.in/
                                    [contentSize] => 116125 B
                                    [width] => 1007
                                    [height] => 1008
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5f13c7463aa5919bda690c4df6e39171?rik=7%2frGvwYp0tso3g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F6251AA16BDA221956F3DE28DBD22906BFC6FAEF
                                    [accentColor] => AD251E
                                )

                            [FF38CC881845BE230693DF02DDBA02AB344931C2] => Array
                                (
                                    [name] => Home | CSJMU
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.dr8bPVA_w_LcJ9DomIjkigHaHa?pid=Api
                                    [datePublished] => 2025-02-18T02:12:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://lms-csjmu.samarth.ac.in/pluginfile.php/9101/course/overviewfiles/control-systems-Image.jpg
                                    [hostPageUrl] => https://lms-csjmu.samarth.ac.in/
                                    [contentSize] => 287780 B
                                    [width] => 1000
                                    [height] => 1000
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.76bf1b3d503fc3f2dc27d0e89888e48a?rik=%2f4PMiIFU6zJgOQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2C139443BA20ABDD20FD396032EB548188CC83FF
                                    [accentColor] => 071E33
                                )

                            [C05CCCB58BFFFA714BED72897420D2C94ADDCAF4] => Array
                                (
                                    [name] => Mega Public Address Systems
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.yh-PWrVOUBef0hS742cQmwHaHa?pid=Api
                                    [datePublished] => 2017-09-22T11:38:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.megaindia.in/image/cache/2022/DSC_5650-500x500.jpg
                                    [hostPageUrl] => https://www.megaindia.in/
                                    [contentSize] => 54890 B
                                    [width] => 500
                                    [height] => 500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ca1f8f5ab54e50179fd214bbe367109b?rik=DMXMW7j%2frxe03g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4FACDDA49C2D02479827DEB417AFFFB85BCCC50C
                                    [accentColor] => 666666
                                )

                            [9A126BA91BF97FB664A9479C5258DFA225A9A2B8] => Array
                                (
                                    [name] => mp-80usb+echo with 2 external speaker
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.3wOIhd9vMG-Mj8vsFblU8QHaHa?pid=Api
                                    [datePublished] => 2023-05-30T10:04:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.megaindia.in/image/cache/2022/80%20ue%20b-1400x1400.jpg
                                    [hostPageUrl] => https://www.megaindia.in/index.php?route=product/product&product_id=483
                                    [contentSize] => 320814 B
                                    [width] => 1400
                                    [height] => 1400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.df038885df6f306f8c8fcbec15b954f1?rik=qSG2mrGf92tGmg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8B2A9A522AFD8525C9749A466BF79FB19AB621A9
                                    [accentColor] => AE281D
                                )

                            [428E153C7C2B8625C1BF932414AB835DD79BEF79] => Array
                                (
                                    [name] => Cisco Vulnerability Management (formerly Kenna.VM) - Cisco
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.JFE5Zz6-HGS8OatMGD_nxAHaDC?pid=Api
                                    [datePublished] => 2015-10-19T08:14:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.cisco.com/content/dam/cisco-cdc/site/images/heroes/products/security/vulnerability-management-hero-index-desktop-3200x1312.jpg
                                    [hostPageUrl] => https://www.cisco.com/site/in/en/products/security/vulnerability-management/index.html
                                    [contentSize] => 215639 B
                                    [width] => 3200
                                    [height] => 1312
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.245139673ebe1c64bc39ab4c183fe7c4?rik=JOhRw8eyaFIc%2bw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 97FEB97DD538BA414239FB1C5268B2C7C351E824
                                    [accentColor] => 042F76
                                )

                            [9775AA66E9F4A28ABB26F82E7203A2CEA7367B54] => Array
                                (
                                    [name] => Fundamental Design of Small Scale Solar Wind Hybrid System
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.iT71YjyaXDIhPQ7qulG1cQHaEK?pid=Api
                                    [datePublished] => 2023-08-21T01:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://edisonlms-fs.s3.us-east-2.amazonaws.com/tenant_renewableenergystudygroup/784e39c6-df9a-4328-b89d-1edf67f771a2_1689854505610_Poster.jpg
                                    [hostPageUrl] => https://renewableenergystudygroup.in/store/Fundamental-Design-of-Small-Scale-Solar-Wind-Hybrid-System-1ao98c2drleo
                                    [contentSize] => 203911 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.893ef5623c9a5c32213d0eeaba51b571?rik=eVeqZp5PKqi7Yg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 45B7637AEC2A3027E28F62BBA82A4F9E66AA5779
                                    [accentColor] => 385C93
                                )

                            [F0D7D2EBF0AD91A83528781F704446A13D77178A] => Array
                                (
                                    [name] => Diffused Aerator System - Envista
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.dIN6A73oJHiT_vQb_7jSQgHaFj?pid=Api
                                    [datePublished] => 2023-04-24T00:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://envista.co.in/assets/uploads/product-featured-217.jpg
                                    [hostPageUrl] => https://envista.co.in/product/diffused-aerator-system
                                    [contentSize] => 106663 B
                                    [width] => 1056
                                    [height] => 792
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.74837a03bde8247893fef41bffb8d242?rik=D30tvg%2faGYpTgg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A87177D31A644407F18782538A19DA0FBE2D7D0F
                                    [accentColor] => 7F6A4C
                                )

                            [E1D3CC488B5511942131FC6ACD3F59CA704876D5] => Array
                                (
                                    [name] => Build Production-Ready RAG Systems with LangChain and Vector Databases ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.uDW9VRJ_GufpzrcpyhojVAHaHa?pid=Api
                                    [datePublished] => 2025-07-20T10:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://python.elitedev.in/images/a19c32d5-559a-44bf-a71e-cb732b1e97cd.webp
                                    [hostPageUrl] => https://python.elitedev.in/large_language_model/build-production-ready-rag-systems-with-langchain-and-vector-databases-complete-implementation-guid/
                                    [contentSize] => 83264 B
                                    [width] => 1024
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b835bd55127f1ae7e9ceb729ca1a2354?rik=Hj3MhLhVEUkSEw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5D678407AC95F3DCA6CF1312491155B884CC3D1E
                                    [accentColor] => 0F212F
                                )

                            [E05107A180FB7032CDE03EB0A6854993772BE1A8] => Array
                                (
                                    [name] => Cyberphysical Infrastructures in Power Systems: Architectures and ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.V8BUW-9t-LCvlXPTY8gDrgAAAA?pid=Api
                                    [datePublished] => 2021-05-27T19:27:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41hs6dmguML._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Cyberphysical-Infrastructures-Power-Systems-Vulnerabilities/dp/0323852610
                                    [contentSize] => 21713 B
                                    [width] => 295
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.57c0545bef6df8b0af9573d363c803ae?rik=DhVwGgi%2fByPcDg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8A1EB2773994586A0BE30EDC2307BF081A70150E
                                    [accentColor] => 3B8F90
                                )

                            [9DF0DC42F16F3C3880BB5382B2B5AB095710FF0A] => Array
                                (
                                    [name] => Building Production-Ready RAG Systems: Complete LangChain and Vector ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.5tkLg2_9VMMmdXf2j_yNGAHaHa?pid=Api
                                    [datePublished] => 2025-08-12T02:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://python.elitedev.in/images/a2506f38-087b-4dd3-992a-3ff4adcce590.webp
                                    [hostPageUrl] => https://python.elitedev.in/large_language_model/building-production-ready-rag-systems-complete-langchain-and-vector-database-implementation-guide/
                                    [contentSize] => 78180 B
                                    [width] => 1024
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e6d90b836ffd54c3267577f68ffc8d18?rik=2Q%2fNJB%2f2w4MIuw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A0FF017590BA5B2B2835BB0883C3F61F24CD0FD9
                                    [accentColor] => 0A406B
                                )

                            [D4C92D3B8C44E2F494FBAF92B52F20975CB6C3D5] => Array
                                (
                                    [name] => BMTPC
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.bQIcvDe5s7Lyxpc0H4mvCQHaKY?pid=Api
                                    [datePublished] => 2020-05-27T06:37:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.bmtpc.org/DataFiles/CMS/file/VAI2019/MAP/cymap/06_INDIA_CYCLONE_OCCURRENCE_DEC_2018.jpg
                                    [hostPageUrl] => https://www.bmtpc.org/topics.aspx?mid=56&Mid1=178
                                    [contentSize] => 1330253 B
                                    [width] => 3360
                                    [height] => 4713
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6d021cbc37b9b3b2f2c697341f89af09?rik=TZzSs8hELk9Jvw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5D3C6BC57902F25B29FABF494F2E44C8B3D29C4D
                                    [accentColor] => AA7E21
                                )

                            [FFA2FFD2B79F68D76C0043A13F5970DB06A71BB3] => Array
                                (
                                    [name] => AUTOMATIC LOCKABLE PASS BOX -MODULAR HEALTHCARE SYSTEM, Greater Noida
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.v9w6Sspa4zx91hqOnNXD0AHaCM?pid=Api
                                    [datePublished] => 2025-03-24T18:30:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://web.s-cdn.boostkit.dev/webaction-files/5ac4f587beef72050ad4e284_product_images/manual_67e3d7f7bbf2fcb77c340225.jpeg
                                    [hostPageUrl] => https://www.modularoperationtheatre.co.in/products/automatic-lockable-pass-box/17
                                    [contentSize] => 17570 B
                                    [width] => 484
                                    [height] => 143
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.bfdc3a4aca5ae33c7dd61a8e9cd5c3d0?rik=%2fyr%2fLXv5hn3GAA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3BB17A60BD0795F31A3400C67D86F97B2DFF2AFF
                                    [accentColor] => 7C704F
                                )

                            [ED661C03F064F88BE528B137D2EA239C4A7D3053] => Array
                                (
                                    [name] => DELTA Online UPS Systems -Jupiter Electronics & Telecom Systems ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP._WruQYzu2t1SP2pKbjosqQHaKe?pid=Api
                                    [datePublished] => 2024-07-13T21:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://productimages.withfloats.com/actual/60a78acebf6df5000165a777.jpg
                                    [hostPageUrl] => https://upsbattery.jetpower.co.in/products/delta-online-ups-systems/36
                                    [contentSize] => 341232 B
                                    [width] => 905
                                    [height] => 1280
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.fd6aee418ceedadd523f6a4a6e3a2ca9?rik=3mbBMA9Gj7hegg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3503D7A4C932AE2D731B825EB88F460F30C166DE
                                    [accentColor] => B75D14
                                )

                            [DFC9E7BD7784F8A3723B8641AEFC66337288A693] => Array
                                (
                                    [name] => Rainwater Harvesting System (Recharge /Percolation Well) in Vadodara ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.zr8CXVEVHr1rAqUcYRtxEAHaFq?pid=Api
                                    [datePublished] => 2020-04-10T14:47:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://productimages.withfloats.com/actual/5b8d0afe86aec206533d5cc3.jpg
                                    [hostPageUrl] => http://www.allegianceindia.in/products-and-services/rainwater-harvesting/0
                                    [contentSize] => 292843 B
                                    [width] => 975
                                    [height] => 745
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.cebf025d51151ebd6b02a51c611b7110?rik=%2fZx%2b23dIjzonsw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 396A88273366CFEA1468B3273A8F4877DB7E9CFD
                                    [accentColor] => 10ACBB
                                )

                            [F0250DF439715CA69929B97030F5966CDF41F0AA] => Array
                                (
                                    [name] => 6 At-Home Peels That Are Easy And Effective | Grazia India
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.2-FG9IRwIJBHBBmeCFxc3AHaIe?pid=Api
                                    [datePublished] => 2022-07-07T16:54:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://grazia.wwmindia.com/content/2022/jul/isclinicalpeels1657103076.jpg
                                    [hostPageUrl] => https://www.grazia.co.in/beauty-and-health/6-at-home-peels-that-are-easy-and-effective-9712.html
                                    [contentSize] => 44781 B
                                    [width] => 894
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.dbe146f4847020904704199e085c5cdc?rik=D1LQT5MXxWqZkg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => AA0F14FDC6695F03079B92996AC517934FD0520F
                                    [accentColor] => 1412B9
                                )

                            [5B4F3669223AA19AC938FFC7FD61DF7548853667] => Array
                                (
                                    [name] => A Floor-level or Walk-in Showers Collection Online | Duravit
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.Y4jPK0y-aqr26acpgICwoAHaKX?pid=Api
                                    [datePublished] => 2023-01-13T00:48:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://wgassets.duravit.com/photomanager-duravit/file/8a8a818d81d22c6b0181d867b5010e8c/b2_shower_systems_01.jpg?derivate=width~1920
                                    [hostPageUrl] => https://www.duravit.in/products/showering/walk-in_showers.in-en.html
                                    [contentSize] => 697774 B
                                    [width] => 1920
                                    [height] => 2688
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6388cf2b4cbe6aaaf6e9a7298080b0a0?rik=tfRjliKjGqmcgw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7663588457FD16DF7CFF839CA91AA3229663F4B5
                                    [accentColor] => 5E4E38
                                )

                            [AC5B3C444D187F9D3875A8AB1FCFCDEDCE4A9BB3] => Array
                                (
                                    [name] => Administration of Warfarin Inhibits the Development of Cerulein-Induced ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.7iVcwzYi6Ckk9jHT0C03cAHaE0?pid=Api
                                    [datePublished] => 2023-06-06T07:49:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/biomolecules/biomolecules-13-00948/article_deploy/html/images/biomolecules-13-00948-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2218-273X/13/6/948
                                    [contentSize] => 47258 B
                                    [width] => 3698
                                    [height] => 2408
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ee255cc33622e82924f631d3d02d3770?rik=yrXDRNSB99mDVw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 3BB9A4ECDEDCFCF1BA8A5783D9F781D444C3B5CA
                                    [accentColor] => A0A000
                                )

                            [41B25B9DE5A9A08C02337661E0548C8500877111] => Array
                                (
                                    [name] => Synergy quantum exposes vulnerabilities in QKD systems
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.ok_pOW8CFEGU7cupllMGbwHaE8?pid=Api
                                    [datePublished] => 2025-04-19T12:05:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.awazthevoice.in/upload/news/1745064315Synergy_quantum_exposes_vulnerabilities_in_QKD_systems.webp
                                    [hostPageUrl] => https://www.awazthevoice.in/business-news/synergy-quantum-exposes-vulnerabilities-in-qkd-systems-36787.html
                                    [contentSize] => 15308 B
                                    [width] => 750
                                    [height] => 500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a24fe9396f02144194edcba99653066f?rik=FCu12V6aCsggMw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1117780058C8450E16673320C80A9A5ED9B52B14
                                    [accentColor] => A42C27
                                )

                            [58E2DDD2723DC9C2887E8A2E6005F0C1EB36618A] => Array
                                (
                                    [name] => Dosing System - Envista
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.CbAp6tP-oCTm3TeH4cFJmAAAAA?pid=Api
                                    [datePublished] => 2023-04-29T07:19:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://envista.co.in/assets/uploads/product-featured-212.jpg
                                    [hostPageUrl] => https://envista.co.in/product/dosing-system
                                    [contentSize] => 155396 B
                                    [width] => 474
                                    [height] => 474
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.09b029ead3fea024e6dd3787e1c14998?rik=hS7dLSfTnCyI5w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A81663BE1C0F5006E2A8E7882C9CD3272DDD2E85
                                    [accentColor] => B9C006
                                )

                            [9C527E24C4DBB695DBE6C41E49B94E49D1A50521] => Array
                                (
                                    [name] => Buy Rag Rug Grey Textured Cotton Woven Bath Rug - 50 x 80 cm from Home ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.oKrfc6Rd_RL12n0J5QpZzAHaHa?pid=Api
                                    [datePublished] => 2021-10-21T14:18:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://media-uk.landmarkshops.in/cdn-cgi/image/h=750,w=750,q=85,fit=cover/homecentre/1000010044802-1000010044801_05-2100.jpg
                                    [hostPageUrl] => https://www.homecentre.in/in/en/Home-Centre/Furnishing/Floor-Coverings/Rugs/HOMECENTRE-Rag-Rug-Grey-Textured-Cotton-Woven-Bath-Rug--50-x-80-cm/p/1000010044802
                                    [contentSize] => 70918 B
                                    [width] => 750
                                    [height] => 750
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a0aadf73a45dfd12f5da7d09e50a59cc?rik=ySXnQky9a1m9bg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 12505A1D94E49B94E14C6EBD596BBD4C42E725C9
                                    [accentColor] => 796952
                                )

                            [DEF3FD8A718347211B42009A8C0248EA56FC1772] => Array
                                (
                                    [name] => What is India's Climate Change Vulnerability Index (CVI) ? CEEW
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.52OwZSfO-wm4AxA3jHFkBgHaKe?pid=Api
                                    [datePublished] => 2021-10-26T07:59:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.ceew.in/sites/default/files/ceew-study-on-climate-change-vulnerability-index-and-district-level-risk-assessment-01.png
                                    [hostPageUrl] => https://www.ceew.in/publications/mapping-climate-change-vulnerability-index-of-india-a-district-level-assessment
                                    [contentSize] => 1729891 B
                                    [width] => 1654
                                    [height] => 2339
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e763b06527cefb09b80310378c716406?rik=7T%2ffqBc4dBKxJA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2771CF65AE8420C8A90024B112743817A8DF3FED
                                    [accentColor] => 1A4C87
                                )

                            [30A4EA98CE829E76D3820E6E77750BA87DA8C4FD] => Array
                                (
                                    [name] => MEGA 50 WATT PORTABLE SYSTEM (MP-810)
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Mk9bV3AzIOCsqQagO2JzRwHaHa?pid=Api
                                    [datePublished] => 2022-10-04T22:55:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.megaindia.in/image/cache/WhatsApp_Image_2022-08-.01_at_3.56.18_PM-removebg-preview-1400x1400.png
                                    [hostPageUrl] => https://www.megaindia.in/index.php?route=product/product&product_id=515
                                    [contentSize] => 315608 B
                                    [width] => 1400
                                    [height] => 1400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.324f5b57703320e0aca906a03b627347?rik=A0quiewo6Wc9KA&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => DF4C8AD78AB05777E6E0283D67E928EC89AE4A03
                                    [accentColor] => 796B52
                                )

                            [DFCF3F8F998AAF74DB29E23DC2E16DE288C9B3B5] => Array
                                (
                                    [name] => Ultra Autosonic India in Pune
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.vS1gIuDG1hNdAHjV-31CNgHaLF?pid=Api
                                    [datePublished] => 2019-03-30T23:29:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://bizimages.withfloats.com/actual/2feb15be36744ad6adaf738568901674.jpg
                                    [hostPageUrl] => https://www.ultraautosonic.co.in/
                                    [contentSize] => 557424 B
                                    [width] => 800
                                    [height] => 1198
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.bd2d6022e0c6d6135d0078d5fb7d4236?rik=%2ffzz%2bJmo%2bke9kg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5B3B9C882ED61E2CD32E92BD47FAA899F8F3FCFD
                                    [accentColor] => 69483C
                                )

                            [319EED7E21891DF053F4C1AD1B1BB331C3ED06A9] => Array
                                (
                                    [name] => Creative Car Care
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.HfxSa0u3C9xutF3oykQ-PAHaHa?pid=Api
                                    [datePublished] => 2023-06-15T00:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://admin.creativecarcare.in/storage/images/products/front-stp-ultra-5-in-1-d-5790.jpg
                                    [hostPageUrl] => https://www.creativecarcare.in/
                                    [contentSize] => 285088 B
                                    [width] => 1000
                                    [height] => 1000
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1dfc526b4bb70bdc6eb45de8ca443e3c?rik=E%2bne5xKY0Q81Tw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9A60DE3C133BB1B1DA1C4F350FD19812E7DEE913
                                    [accentColor] => B31C18
                                )

                            [087C5B4F0C5E8721CCFB5DAD9A5CC4DDB3A8A6E9] => Array
                                (
                                    [name] => Shop Pagers Online | Ubuy India
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.TT0dvUnyKSm8YszwiZ75-gHaGi?pid=Api
                                    [datePublished] => 2021-12-09T19:40:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images-cdn.ubuy.co.in/66ea3ac41472ab0adb12d2c4-retekess-td175s-restaurant-pager-system.jpg
                                    [hostPageUrl] => https://www.ubuy.co.in/category/office-products/office-electronics/telephones-accessories/pagers-172621
                                    [contentSize] => 78560 B
                                    [width] => 1500
                                    [height] => 1325
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4d3d1dbd49f22929bc62ccf0899ef9fa?rik=gMe19MDleBLMvw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9E6A8A3BDD4CC5A9DAD5BFCC1278E5C0F4B5C780
                                    [accentColor] => B31818
                                )

                            [80B1C1B81260D2F27F50E52FB349F4055CFEC206] => Array
                                (
                                    [name] => Vulnerability - Free security icons
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.mebziaP-Knctwx6iGOGNxwHaHa?pid=Api
                                    [datePublished] => 2023-08-20T09:49:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cdn-icons-png.flaticon.com/512/10961/10961480.png
                                    [hostPageUrl] => https://www.flaticon.com/free-icon/vulnerability_10961480
                                    [contentSize] => 29512 B
                                    [width] => 512
                                    [height] => 512
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.99e6f389a3fe2a772dc31ea218e18dc7?rik=CBsciyEGLS%2f3BQ&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 602CEFC5504F943BF25E05F72F2D06218B1C1B08
                                    [accentColor] => CA9501
                                )

                            [A927806CFF7B61B2471C0E71F76B87DB9BD8CA39] => Array
                                (
                                    [name] => Buy & Sell | Heavy Machinery and Industrial Equipment | 10HP India
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.L0PwFvTy6Glxj1NmiZW9BQHaE8?pid=Api
                                    [datePublished] => 2025-11-10T23:22:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://10hp.in/uploads/post/P2025-0003162/images%20(11).jpg
                                    [hostPageUrl] => http://10hp.in/posts/details/bed-exit-alarm-system/
                                    [contentSize] => 157219 B
                                    [width] => 849
                                    [height] => 566
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2f43f016f4f2e869718f53668995bd05?rik=mnIIxv%2b3Fit0wQ&riu=http%3a%2f%2f10hp.in%2fuploads%2fpost%2fP2025-0003162%2fimages+(11).jpg&ehk=WJ1tc5zQ%2f74GC6aUMS7A5rTMuDPccIA%2ffSa9iGt8FhE%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 93AC8DB9BD78B67F17E0C1742B16B7FFC608729A
                                    [accentColor] => 28678E
                                )

                            [17B37E26054B939248432B1E3E1B8E9A0A1FBED7] => Array
                                (
                                    [name] => Design of Solar Photovoltaic Air Conditioning System
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.xJrvdhR0YDJBzy-jOG_l9wHaKe?pid=Api
                                    [datePublished] => 2022-09-14T06:59:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://edisonlms-fs.s3.us-east-2.amazonaws.com/tenant_renewableenergystudygroup/ec9502e7-1a81-4567-8110-4e7844bf421c_1694538005081_Solar-Energy-Company-Flyer-15---Made-with-PosterMyWall.jpg
                                    [hostPageUrl] => https://renewableenergystudygroup.in/store/Design-of-Solar-Photovoltaic-Air-Conditioning-System-2zsy9sz8kbbv
                                    [contentSize] => 374781 B
                                    [width] => 636
                                    [height] => 900
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c49aef761474603241cf2fa3386fe5f7?rik=cTvnYlC0OSmENA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7DEBF1A0A9E8B1E3E1B234842939B45062E73B71
                                    [accentColor] => B0A11B
                                )

                            [0E794B97DE5586CFDB3B8894C6DF0715FE388A89] => Array
                                (
                                    [name] => Sony New Launch ULT Tower 10 Party Speaker with ULT Button(2 Modes) for ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.TGg5i6az0Uev59go2ekbPQHaHa?pid=Api
                                    [datePublished] => 2024-06-01T03:21:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/81qcPual4CL._SL1500_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Speaker-Massive-Powerful-Wireless-Bluetooth/dp/B0CXL5SZVQ
                                    [contentSize] => 118275 B
                                    [width] => 1500
                                    [height] => 1500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4c68398ba6b3d147afe7d828d9e91b3d?rik=4Je0ee1VaPy9sw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 98A883EF5170FD6C4988B3BDFC6855ED79B497E0
                                    [accentColor] => 0E3CBD
                                )

                            [C8891456312163C79B0973EF41672F02C8F06BDA] => Array
                                (
                                    [name] => Portable P.A. Systems
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.d14yQ6kQOLba_KlBtf45lwHaHa?pid=Api
                                    [datePublished] => 2017-12-28T11:08:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.megaindia.in/image/cache/MP-250U-500x500.jpeg
                                    [hostPageUrl] => https://www.megaindia.in/portable-pa-systems
                                    [contentSize] => 50488 B
                                    [width] => 500
                                    [height] => 500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.775e3243a91038b6dafca941b5fe3997?rik=jJhBZRMSNny5kA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => ADB60F8C20F27614FE3790B97C3612136541988C
                                    [accentColor] => A5262B
                                )

                            [63776B69A2CD9C223FDE0E6E77750BA87DA8C4FD] => Array
                                (
                                    [name] => MEGA 50 WATT PORTABLE SYSTEM (MP-810)
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.EEoMHHwRvCW50-IDhRkEkgHaHa?pid=Api
                                    [datePublished] => 2022-10-04T22:55:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.megaindia.in/image/cache/2022/810d-1400x1400.jpg
                                    [hostPageUrl] => https://www.megaindia.in/index.php?route=product/product&product_id=515
                                    [contentSize] => 83798 B
                                    [width] => 1400
                                    [height] => 1400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.104a0c1c7c11bc25b9d3e20385190492?rik=Nne2lircySLz7Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => DF4C8AD78AB05777E6E0EDF322C9DC2A96B67736
                                    [accentColor] => 666666
                                )

                            [24B0A6BF40F72A4445155DAD9A5CC4DDB3A8A6E9] => Array
                                (
                                    [name] => Shop Pagers Online | Ubuy India
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.pEKEBnzB9JQ0d0b9G1nuJQHaHk?pid=Api
                                    [datePublished] => 2021-12-09T19:40:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://images-cdn.ubuy.co.in/6479c17b7dc0bd76a224c51d-yycalling-restaurant-pager-pagers-for.jpg
                                    [hostPageUrl] => https://www.ubuy.co.in/category/office-products/office-electronics/telephones-accessories/pagers-172621
                                    [contentSize] => 129134 B
                                    [width] => 1466
                                    [height] => 1500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a44284067cc1f494347746fd1b59ee25?rik=Qgtq%2bwR%2fokRUUQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9E6A8A3BDD4CC5A9DAD5515444A27F04FB6A0B42
                                    [accentColor] => CA7801
                                )

                            [9936F88F459069E3980FC325BF6E31E19E78CEE8] => Array
                                (
                                    [name] => How to Build Production-Ready RAG Systems with LangChain and Vector ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.oAKzl5EzDW7-kKHd-skFCwHaHa?pid=Api
                                    [datePublished] => 2025-08-09T23:09:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://python.elitedev.in/images/51e22fa0-d2e3-4fa5-82ba-7bebdb4eefba.webp
                                    [hostPageUrl] => https://python.elitedev.in/large_language_model/how-to-build-production-ready-rag-systems-with-langchain-and-vector-databases-complete-2024-guide/
                                    [contentSize] => 90610 B
                                    [width] => 1024
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a002b39791330d6efe90a1ddfac9050b?rik=mWOP%2bFQJlj6J8A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8EEC87E91E13E6FB523CF0893E960954F88F6399
                                    [accentColor] => 072130
                                )

                        )

                    [relatedSearches] => Array
                        (
                            [0] => Array
                                (
                                    [text] => Network Vulnerability Assessment
                                    [displayText] => Network Vulnerability Assessment
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Network+Vulnerability+Assessment&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5830.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Network+Vulnerability+Assessment
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Network+Vulnerability+Assessment&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [1] => Array
                                (
                                    [text] => Cyber Security Vulnerabilities
                                    [displayText] => Cyber Security Vulnerabilities
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Cyber+Security+Vulnerabilities&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5832.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Cyber+Security+Vulnerabilities
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Cyber+Security+Vulnerabilities&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [2] => Array
                                (
                                    [text] => Cyber Security Vulnerability
                                    [displayText] => Cyber Security Vulnerability
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Cyber+Security+Vulnerability&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5834.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Cyber+Security+Vulnerability
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Cyber+Security+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [3] => Array
                                (
                                    [text] => Human Vulnerability
                                    [displayText] => Human Vulnerability
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Human+Vulnerability&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5836.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Human+Vulnerability
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Human+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [4] => Array
                                (
                                    [text] => Vulnerability Management System
                                    [displayText] => Vulnerability Management System
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Management+System&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5838.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Management+System
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Vulnerability+Management+System&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [5] => Array
                                (
                                    [text] => Types of Vulnerability
                                    [displayText] => Types of Vulnerability
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Types+of+Vulnerability&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5840.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Types+of+Vulnerability
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Types+of+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [6] => Array
                                (
                                    [text] => Vulnerability Process
                                    [displayText] => Vulnerability Process
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Process&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5842.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Process
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Vulnerability+Process&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [7] => Array
                                (
                                    [text] => Vulnerability Assessment Template
                                    [displayText] => Vulnerability Assessment Template
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Assessment+Template&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5844.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Assessment+Template
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Vulnerability+Assessment+Template&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [8] => Array
                                (
                                    [text] => Vulnerability Report Template
                                    [displayText] => Vulnerability Report Template
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Report+Template&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5846.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Report+Template
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Vulnerability+Report+Template&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [9] => Array
                                (
                                    [text] => Software Vulnerability
                                    [displayText] => Software Vulnerability
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Software+Vulnerability&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5848.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Software+Vulnerability
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Software+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [10] => Array
                                (
                                    [text] => Vulnerability Definition
                                    [displayText] => Vulnerability Definition
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Definition&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5850.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Definition
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Vulnerability+Definition&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [11] => Array
                                (
                                    [text] => Vulnerability Examples
                                    [displayText] => Vulnerability Examples
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Examples&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5852.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Examples
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Vulnerability+Examples&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [12] => Array
                                (
                                    [text] => Vulnerability Test
                                    [displayText] => Vulnerability Test
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Test&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5854.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Test
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Vulnerability+Test&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [13] => Array
                                (
                                    [text] => Vulnerability Remediation
                                    [displayText] => Vulnerability Remediation
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Remediation&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5856.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Remediation
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Vulnerability+Remediation&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [14] => Array
                                (
                                    [text] => Vulnerability Exploitation
                                    [displayText] => Vulnerability Exploitation
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Exploitation&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5858.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Exploitation
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Vulnerability+Exploitation&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [15] => Array
                                (
                                    [text] => Vulnerability Scanning
                                    [displayText] => Vulnerability Scanning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Scanning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5860.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Scanning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Vulnerability+Scanning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [16] => Array
                                (
                                    [text] => System Vulnerability and Abuse
                                    [displayText] => System Vulnerability and Abuse
                                    [webSearchUrl] => https://www.bing.com/images/search?q=System+Vulnerability+and+Abuse&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5862.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=System+Vulnerability+and+Abuse
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=System+Vulnerability+and+Abuse&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [17] => Array
                                (
                                    [text] => Define Vulnerability
                                    [displayText] => Define Vulnerability
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Define+Vulnerability&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5864.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Define+Vulnerability
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Define+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [18] => Array
                                (
                                    [text] => Vulnerability Management Life Cycle
                                    [displayText] => Vulnerability Management Life Cycle
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Management+Life+Cycle&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5866.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Management+Life+Cycle
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Vulnerability+Management+Life+Cycle&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [19] => Array
                                (
                                    [text] => Vulnerability Map of a System
                                    [displayText] => Vulnerability Map of a System
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Map+of+a+System&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5868.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Map+of+a+System
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Vulnerability+Map+of+a+System&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [20] => Array
                                (
                                    [text] => The Vulnerability of the Health System
                                    [displayText] => The Vulnerability of the Health System
                                    [webSearchUrl] => https://www.bing.com/images/search?q=The+Vulnerability+of+the+Health+System&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5870.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=The+Vulnerability+of+the+Health+System
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=The+Vulnerability+of+the+Health+System&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [21] => Array
                                (
                                    [text] => Operating System Vulnerability
                                    [displayText] => Operating System Vulnerability
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Operating+System+Vulnerability&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5872.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Operating+System+Vulnerability
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Operating+System+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [22] => Array
                                (
                                    [text] => Vulnerability Management Website
                                    [displayText] => Vulnerability Management Website
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Management+Website&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5874.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Management+Website
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Vulnerability+Management+Website&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [23] => Array
                                (
                                    [text] => Category of Vulnerability
                                    [displayText] => Category of Vulnerability
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Category+of+Vulnerability&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5876.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Category+of+Vulnerability
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Category+of+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [24] => Array
                                (
                                    [text] => Cvss Score
                                    [displayText] => Cvss Score
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Cvss+Score&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5878.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Cvss+Score
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Cvss+Score&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [25] => Array
                                (
                                    [text] => Threat and Vulnerability
                                    [displayText] => Threat and Vulnerability
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Threat+and+Vulnerability&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5880.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Threat+and+Vulnerability
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Threat+and+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [26] => Array
                                (
                                    [text] => NIST Vulnerability Management Framework
                                    [displayText] => NIST Vulnerability Management Framework
                                    [webSearchUrl] => https://www.bing.com/images/search?q=NIST+Vulnerability+Management+Framework&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5882.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=NIST+Vulnerability+Management+Framework
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=NIST+Vulnerability+Management+Framework&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [27] => Array
                                (
                                    [text] => Vulnerability Management System VMS
                                    [displayText] => Vulnerability Management System VMS
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Management+System+VMS&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5884.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Management+System+VMS
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Vulnerability+Management+System+VMS&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [28] => Array
                                (
                                    [text] => Vulnerability Scanner
                                    [displayText] => Vulnerability Scanner
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Scanner&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5886.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Scanner
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Vulnerability+Scanner&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [29] => Array
                                (
                                    [text] => Computer Vulnerability
                                    [displayText] => Computer Vulnerability
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Computer+Vulnerability&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5888.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Computer+Vulnerability
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Computer+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [30] => Array
                                (
                                    [text] => Hacker Computer Security
                                    [displayText] => Hacker Computer Security
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Hacker+Computer+Security&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5890.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Hacker+Computer+Security
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Hacker+Computer+Security&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [31] => Array
                                (
                                    [text] => Vulnerability Clip Art
                                    [displayText] => Vulnerability Clip Art
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Clip+Art&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5892.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Clip+Art
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Vulnerability+Clip+Art&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [32] => Array
                                (
                                    [text] => User Vulnerability
                                    [displayText] => User Vulnerability
                                    [webSearchUrl] => https://www.bing.com/images/search?q=User+Vulnerability&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5894.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=User+Vulnerability
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=User+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [33] => Array
                                (
                                    [text] => Vulnerability Scans
                                    [displayText] => Vulnerability Scans
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Scans&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5896.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Scans
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Vulnerability+Scans&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [34] => Array
                                (
                                    [text] => Vulnerability Rag by System
                                    [displayText] => Vulnerability Rag by System
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Rag+by+System&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5898.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Rag+by+System
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Vulnerability+Rag+by+System&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [35] => Array
                                (
                                    [text] => Vulnerability Patch
                                    [displayText] => Vulnerability Patch
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Patch&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5900.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Patch
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Vulnerability+Patch&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [36] => Array
                                (
                                    [text] => Vulnerability Mapping
                                    [displayText] => Vulnerability Mapping
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Mapping&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5902.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Mapping
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Vulnerability+Mapping&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [37] => Array
                                (
                                    [text] => What Is Vulnerability
                                    [displayText] => What Is Vulnerability
                                    [webSearchUrl] => https://www.bing.com/images/search?q=What+Is+Vulnerability&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5904.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=What+Is+Vulnerability
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=What+Is+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [38] => Array
                                (
                                    [text] => Vulnerability Rating
                                    [displayText] => Vulnerability Rating
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Rating&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5906.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Rating
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Vulnerability+Rating&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [39] => Array
                                (
                                    [text] => Physical Vulnerability
                                    [displayText] => Physical Vulnerability
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Physical+Vulnerability&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5908.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Physical+Vulnerability
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Physical+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [40] => Array
                                (
                                    [text] => Cyber Security Risk
                                    [displayText] => Cyber Security Risk
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Cyber+Security+Risk&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5910.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Cyber+Security+Risk
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Cyber+Security+Risk&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [41] => Array
                                (
                                    [text] => Vulnerability Icon
                                    [displayText] => Vulnerability Icon
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Icon&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5912.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Icon
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Vulnerability+Icon&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [42] => Array
                                (
                                    [text] => Critical Vulnerability
                                    [displayText] => Critical Vulnerability
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Critical+Vulnerability&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5914.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Critical+Vulnerability
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Critical+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [43] => Array
                                (
                                    [text] => Vulnerability Management It
                                    [displayText] => Vulnerability Management It
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Management+It&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5916.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Management+It
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Vulnerability+Management+It&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [44] => Array
                                (
                                    [text] => Sharing Vulnerability
                                    [displayText] => Sharing Vulnerability
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Sharing+Vulnerability&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5918.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Sharing+Vulnerability
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Sharing+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [45] => Array
                                (
                                    [text] => OS Vulnerability
                                    [displayText] => OS Vulnerability
                                    [webSearchUrl] => https://www.bing.com/images/search?q=OS+Vulnerability&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5920.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=OS+Vulnerability
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=OS+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [46] => Array
                                (
                                    [text] => EW System Vulnerability
                                    [displayText] => EW System Vulnerability
                                    [webSearchUrl] => https://www.bing.com/images/search?q=EW+System+Vulnerability&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5922.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=EW+System+Vulnerability
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=EW+System+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [47] => Array
                                (
                                    [text] => System Vulnerability Wallpaper
                                    [displayText] => System Vulnerability Wallpaper
                                    [webSearchUrl] => https://www.bing.com/images/search?q=System+Vulnerability+Wallpaper&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5924.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=System+Vulnerability+Wallpaper
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=System+Vulnerability+Wallpaper&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [48] => Array
                                (
                                    [text] => Zero-Day Vulnerability
                                    [displayText] => Zero-Day Vulnerability
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Zero-Day+Vulnerability&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5926.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Zero-Day+Vulnerability
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Zero-Day+Vulnerability&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [49] => Array
                                (
                                    [text] => Vulnerability Model
                                    [displayText] => Vulnerability Model
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Vulnerability+Model&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5928.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Vulnerability+Model
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Vulnerability+Model&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                        )

                    [createdate] => 1773036088176
                )

            [json_error] => No error
            [products_count] => 120
            [related_searches_count] => 50
            [first_product_sample] => Array
                (
                    [name] => Alere PT INR Monitoring System – Microsidd India
                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.aPvV-rOSTLdc3Rp-p4Gv5gHaHa?pid=Api
                    [datePublished] => 2023-01-19T03:08:00.0000000Z
                    [isFamilyFriendly] => 1
                    [contentUrl] => http://microsidd.com/cdn/shop/products/0000466_alereratioptinrmonitoringsystem.jpg?v=1685440218
                    [hostPageUrl] => https://microsidd.com/products/alere-ratio-pt-inr-monitoring-system
                    [contentSize] => 14329 B
                    [width] => 545
                    [height] => 545
                    [cDNContentUrl] => https://th.bing.com/th/id/R.68fbd5fab3924cb75cdd1a7ea781afe6?rik=hYAwTmvJLwRrug&riu=http%3a%2f%2fmicrosidd.com%2fcdn%2fshop%2fproducts%2f0000466_alereratioptinrmonitoringsystem.jpg%3fv%3d1685440218&ehk=cD35U4t52DgTwWXgWApDIpypXPkUf%2fDoIbbqwOGtX1w%3d&risl=&pid=ImgRaw&r=0
                    [isTransparent] => 
                    [imageId] => EFF425334D1709995F90BA6B042FC96B4E308085
                    [accentColor] => 78104B
                )

        )

    [skipped_products] => Array
        (
        )

)

Related Searches

Search