One of the most interesting themes of my new O'Reilly book Hacker Culture: A to Z is the story of how the computer technology and internet we enjoy today came to be.
You'd be surprised by how old the concept of a GUI and computer mouse is. It sure wasn't invented by Apple.
Register for my free webinar! If you won't be available for 12 noon EST December 7th, you can enjoy the recording afterwards. #tech
A bit ironic given this is disseminated over the Internet...
The Internet would be far better if giant corporations didn't control platforms & endlessly surveille & profile & do so very unequally--to me that largely is a capitalism, governance & regulatory failure--power & control of infrastructure.
I've wrestled for years re: handling "important but not urgent" to-do projects. Analog bujo collections are a chore to manage vs a tool. This plugin keeps it all sorted on one board + backlinks to any other related notes. 😄
I can second this. Digital systems always felt like I was managing the system somehow, whatever it was. They always felt delicate, as if I had to do things a certain way. Paper journaling over the last couple of years has felt so much easier by comparison. I was going through my to-do list yesterday and I just suddenly realised I wasn’t even thinking about the system - I was just doing the work. I still work within Obsidian - my resources and annotations and notes are all still in there - but the basics of ‘knowing what to do next’ are on paper again.
@Leap - Zim Wiki is my digital scrapbook for organizing notes of all kinds. It's analogous to Obsidian, but has been around for longer. I have looked at moving to Obsidian and others, but Zim does everything that I need.
When we warn the real threat of AI is how it’s used against people in the present, not the fantasies that some day computers might think for themselves, this is exactly the kind of thing we’re talking about: health insurers using AI to deny care.
What is Continuous Vulnerability Exposure Management (CVEM)?
“Every attacker leverages weakness!”
The statement holds true in both the physical realm and the cyber sphere. Whether we're talking about Malware, DDoS attacks, phishing, spoofing, or various other tactics, they are all meticulously crafted to exploit specific vulnerabilities, be they technological, human, or procedural.
Understanding that every attack hinges on exploiting a weakness changes our approach to cybersecurity (CVEM). We start actively searching for these vulnerabilities, deepening the comprehension of our organization's IT infrastructure.
With this perspective, you can thoroughly analyze your IT infrastructure, gaining a detailed understanding of all its aspects, recognizing your weaknesses, establishing controls, identifying gaps, uncovering strengths, and much more. There are also alternative viewpoints, such as the Detection Perspective, Data Perspective, Attacker Perspective, User Perspective, Device Perspective, Network Perspective, Application Perspective, and more.
We refer to these weaknesses as "vulnerabilities," a concept well-known in the realm of Vulnerability Management. Despite our best efforts, however, attacks persist. Why is this the case?
Firstly, our focus often narrows down to what we commonly term "software vulnerabilities." Timely discovery and mitigation are frequently lacking, and we tend to rely on isolated, automated solutions.
Secondly, a myriad of vulnerabilities often elude our scrutiny.
Vulnerability management, attack surface management and exposure management must take a central role in our cybersecurity strategy. It's through a comprehensive understanding of these vulnerabilities and a proactive approach to fortifying our defenses that we can genuinely protect our digital domains. Elevate true Vulnerability and Exposure Management to the forefront and make it an ongoing, automated endeavor. Reimagine cybersecurity from the perspective of weaknesses.
Is it theoretically possible or even reasonable to imagine phones or devices being able to lip read?
Horrifying security implications aside, wondering if something like apples Face ID infrared scanning or whatever could accurately enough lip read for something like silently dictating text.
Swoje wrazenia z korzystania z #Garmin#Venu3 mialem opisac za pare dni, ale w sumie zrobie to juz teraz, a najwyzej za te pare dni jakas aktualizacje jak cos sie radykalnie zmieni
No wiec tak, zaczynajac od wygladu, zawsze myslalem, ze fajniejsze sa duze (ciezkie) zegarki, ale ten wielkoscia tarczy nie odstaje od #Samsung#GalaxyWatch4Classic, za to jest od niego o 1/3 cienszy i wykonany z troche innych materialow (twardy plastik + szklo gorilla glass), dzieki czemu wydaje sie jakby na rece nic nie bylo - zamienilem tylko domyslny silikonowy pasek na nylonowy bo nienawidze tych silikonowych. Przy okazji nie wyglada jak sportowa "cebula", tylko zegarek, ktory mozna zalozyc do koszuli z krawatem.
Plusy, ktore mi sie rzucily w oczy po tych paru dniach:
Zegarek swietnie analizuje sen, wykrywa drzemki - nawet takie "na siedzaco", przy kompie - Samsung nie byl w stanie wykryc drzemki nawet jesli sie celowo kladlem
Funkcje dedykowane ♿ - nie wiem na ile to "prawda" i te wszystkie analizy dzialaja, ale wozek rejestruje popchniecia zamiast krokow, dopasowuje do tego spalanie kalorii i wszelkie inne niezbedne obliczenia, zamiast zwyklych typow treningow sa takie dedykowane wozkowiczom - no jak dla mnie to mega motywacja zeby sie wiecej ruszac
Swietna, nieznana mi wczesniej funkcja czyli #BodyBattery - zegarek wylicza "bilans energii", ale nie takiej w kaloriach tylko na zasadzie - spisz to ladujesz swoja baterie, ale robisz intensywny trening albo duzo sie stresujesz to bateria sie "rozladowuje"
GPS - dokladny i lapie sygnal od razu, Galaxy sam w sobie tez nie mial z tym problemu, ale z racji, ze nie mial wbudowanej jazdy wozkiem jako treningu, musialem uzywac apki #Strava, a ta juz sie potrafila z GPS nie polubic - tu nie ma tego problemu, trening jest rejestrowany przez zegarek bez dodatkowych apek, a dzieki integracji leci na konto Strava
Chyba najwazniejsze - BATERIA! W ciagu 3 dni zjadlo mi moze 30%, Galaxy juz bym musial po tym czasie ladowac
Tryb gamingowy - ot, taki ciekawy bajer, wybierasz jeden z trzech typow gier i zegarek analizuje parametry Twojego ciala w czasie rozgrywki, a potem mozesz sobie to przejrzec w historii
Minusy:
Nawigacja wymaga przyzwyczajenia - o ile system jest responsywny (bardziej niz w Galaxy, ktory nie raz potrafil przymulic) o tyle odnalezienie sie w tym co jest pod jakim swipe i jakim guzikiem zajmie mi jeszcze pare dni
Przyciski - sa trzy, po prawej stronie, jak w wiekszosci zegarkow, ale maja bardzo niski klik, a w dodatku jeden z nich jest dodatkowo "miekki" - ponoc wszystkie Venu3 tak maja
Brak funkcji #EEG (czy jak ona sie tam nazywa) i pomiaru temperatury ciala - z tego co czytalem, zegarek ma taka mozliwosc, ale ogranicza go soft - zamiast EEG jest jednak parametr #HRV czyli Status zmiennosci tetna
Czy warto dac za ten zegarek 2k PLN? Coz, to troche jak pytac czy warto dac za zamochod 150 tys. zl - kazdy musi sobie odpowiedziec sam czy ten zestaw funkcji pasuje mu do takiej ceny, ja poki co jestem zachwycony ;)
Anyone know a good, hackable bluetooth mp3 player? Fitbit recently disabled transferring music to my Versa 1. Any cheap, preferably physically clippable, mp3 players? I guess storage being accessible over USB would be enough, but I'd love a device that is easily hackable to my hearts content.
Can’t really give you a recommendations but a starting point could be the rockbox firmware. They have a list of mp3 players that they have been able to install their custom firmware on. www.rockbox.org/wiki/TargetStatusMaybe there is a player on that list that you like. Do note that the last update was in 2019 so the devices on that last are probably even older than 2019
The Benefits of 410 Stainless Steel and How to Find Reliable 410 Stainless Steel Suppliers
When choosing the right materials for your project, stainless steel often tops the list due to its exceptional qualities, such as corrosion resistance, durability, and versatility. Among the various types of stainless steel available, 410 stainless steel stands out for its unique properties. In this blog post, we'll delve into the benefits of 410 stainless steel and guide you on how to find trustworthy 410 stainless steel suppliers. What is 410 Stainless Steel?
410 stainless steel is a type of martensitic stainless steel that contains 11.5-13.5% chromium. This alloy is known for its exceptional corrosion resistance, high strength, and excellent machinability. It's often used in applications where strength and resistance to corrosion are vital, such as in the production of cutlery, kitchen appliances, automotive parts, and industrial equipment. Benefits of 410 Stainless Steel:
Corrosion Resistance: 410 stainless steel provides excellent resistance to corrosion in various environments. It is particularly well-suited for applications where exposure to moisture, chemicals, and high temperatures is common.
High Strength: This type of stainless steel offers impressive tensile and yield strength, making it suitable for applications that require robust and durable components.
Machinability: 410 stainless steel is easy to machine, making it an ideal choice for applications that require complex shapes and precision.
Heat Resistance: It can withstand elevated temperatures, crucial for components exposed to high-temperature environments or thermal cycling.
Wear Resistance: 410 stainless steel exhibits excellent wear resistance, making it suitable for applications where abrasion is a concern.
Aesthetic Appeal: Its attractive, shiny finish makes it popular in producing decorative items, such as architectural trim, jewellery, and kitchen utensils.
Now that you understand the advantages of 410 stainless steel let's discuss how to find reliable 410 stainless steel suppliers. How to Find Trustworthy 410 Stainless Steel Suppliers:
Online Research: Conduct an online search for 410 stainless steel suppliers. Read through their websites to gather information about their product range, certifications, and customer reviews.
Industry Associations: Check if the supplier is a member of reputable industry aassociations or organizations, as this can be a sign of their commitment to quality and ethical practices.
Ask for References: Request references from the supplier and contact previous customers to inquire about their experiences with the supplier's products and services.
Certifications: Ensure that the supplier complies with industry standards and holds relevant certifications, such as ISO certifications for quality management.
Quality Control: Inquire about the supplier's quality control processes and measures they have in place to guarantee the quality of their products.
Customization Options: If your project requires specific dimensions or special requirements, confirm whether the supplier can accommodate custom orders.
Pricing and Delivery: Compare pricing and delivery terms from multiple suppliers to ensure you are getting a competitive deal without compromising on quality.
Remember that Good Place plotline about organic tomatoes being net negative because of all the unseen consequences? AI is like that too - the fun image generators and chatbots draw down vast amounts of power, and their operators don't want to reveal how resource-intensive your usage of their platforms really is. Will we look back in horror at this early wave of AI agents as wanton excess? Not all harm is visible. #techhttps://futurism.com/the-byte/ai-electricity-use-spiking-power-entire-country
After the Hamas attack, Israel began a campaign that has unleashed immense suffering on Palestinian civilians and will forever change Gaza.
I spoke to Antony Loewenstein about what’s happening in Israel and Palestine, the broader context of this war, and how it benefits Israel’s defense tech industry.