One of the most interesting themes of my new O'Reilly book Hacker Culture: A to Z is the story of how the computer technology and internet we enjoy today came to be.
You'd be surprised by how old the concept of a GUI and computer mouse is. It sure wasn't invented by Apple.
Register for my free webinar! If you won't be available for 12 noon EST December 7th, you can enjoy the recording afterwards. #tech
A bit ironic given this is disseminated over the Internet...
The Internet would be far better if giant corporations didn't control platforms & endlessly surveille & profile & do so very unequally--to me that largely is a capitalism, governance & regulatory failure--power & control of infrastructure.
Kanban for @obsidianmd -- 😍😍😍!
I've wrestled for years re: handling "important but not urgent" to-do projects. Analog bujo collections are a chore to manage vs a tool. This plugin keeps it all sorted on one board + backlinks to any other related notes. 😄
When we warn the real threat of AI is how it’s used against people in the present, not the fantasies that some day computers might think for themselves, this is exactly the kind of thing we’re talking about: health insurers using AI to deny care.
What is Continuous Vulnerability Exposure Management (CVEM)?
“Every attacker leverages weakness!”
The statement holds true in both the physical realm and the cyber sphere. Whether we're talking about Malware, DDoS attacks, phishing, spoofing, or various other tactics, they are all meticulously crafted to exploit specific vulnerabilities, be they technological, human, or procedural.
Understanding that every attack hinges on exploiting a weakness changes our approach to cybersecurity (CVEM). We start actively searching for these vulnerabilities, deepening the comprehension of our organization's IT infrastructure.
With this perspective, you can thoroughly analyze your IT infrastructure, gaining a detailed understanding of all its aspects, recognizing your weaknesses, establishing controls, identifying gaps, uncovering strengths, and much more. There are also alternative viewpoints, such as the Detection Perspective, Data Perspective, Attacker Perspective, User Perspective, Device Perspective, Network Perspective, Application Perspective, and more.
We refer to these weaknesses as "vulnerabilities," a concept well-known in the realm of Vulnerability Management. Despite our best efforts, however, attacks persist. Why is this the case?
Firstly, our focus often narrows down to what we commonly term "software vulnerabilities." Timely discovery and mitigation are frequently lacking, and we tend to rely on isolated, automated solutions.
Secondly, a myriad of vulnerabilities often elude our scrutiny.
Vulnerability management, attack surface management and exposure management must take a central role in our cybersecurity strategy. It's through a comprehensive understanding of these vulnerabilities and a proactive approach to fortifying our defenses that we can genuinely protect our digital domains. Elevate true Vulnerability and Exposure Management to the forefront and make it an ongoing, automated endeavor. Reimagine cybersecurity from the perspective of weaknesses.
General question for computer vision people:
Is it theoretically possible or even reasonable to imagine phones or devices being able to lip read?
Horrifying security implications aside, wondering if something like apples Face ID infrared scanning or whatever could accurately enough lip read for something like silently dictating text.
No wiec tak, zaczynajac od wygladu, zawsze myslalem, ze fajniejsze sa duze (ciezkie) zegarki, ale ten wielkoscia tarczy nie odstaje od #Samsung #GalaxyWatch4Classic, za to jest od niego o 1/3 cienszy i wykonany z troche innych materialow (twardy plastik + szklo gorilla glass), dzieki czemu wydaje sie jakby na rece nic nie bylo - zamienilem tylko domyslny silikonowy pasek na nylonowy bo nienawidze tych silikonowych. Przy okazji nie wyglada jak sportowa "cebula", tylko zegarek, ktory mozna zalozyc do koszuli z krawatem.
Plusy, ktore mi sie rzucily w oczy po tych paru dniach:
- Zegarek swietnie analizuje sen, wykrywa drzemki - nawet takie "na siedzaco", przy kompie - Samsung nie byl w stanie wykryc drzemki nawet jesli sie celowo kladlem
- Funkcje dedykowane ♿ - nie wiem na ile to "prawda" i te wszystkie analizy dzialaja, ale wozek rejestruje popchniecia zamiast krokow, dopasowuje do tego spalanie kalorii i wszelkie inne niezbedne obliczenia, zamiast zwyklych typow treningow sa takie dedykowane wozkowiczom - no jak dla mnie to mega motywacja zeby sie wiecej ruszac
- Swietna, nieznana mi wczesniej funkcja czyli #BodyBattery - zegarek wylicza "bilans energii", ale nie takiej w kaloriach tylko na zasadzie - spisz to ladujesz swoja baterie, ale robisz intensywny trening albo duzo sie stresujesz to bateria sie "rozladowuje"
- GPS - dokladny i lapie sygnal od razu, Galaxy sam w sobie tez nie mial z tym problemu, ale z racji, ze nie mial wbudowanej jazdy wozkiem jako treningu, musialem uzywac apki #Strava, a ta juz sie potrafila z GPS nie polubic - tu nie ma tego problemu, trening jest rejestrowany przez zegarek bez dodatkowych apek, a dzieki integracji leci na konto Strava
- Chyba najwazniejsze - BATERIA! W ciagu 3 dni zjadlo mi moze 30%, Galaxy juz bym musial po tym czasie ladowac
- Tryb gamingowy - ot, taki ciekawy bajer, wybierasz jeden z trzech typow gier i zegarek analizuje parametry Twojego ciala w czasie rozgrywki, a potem mozesz sobie to przejrzec w historii
- Nawigacja wymaga przyzwyczajenia - o ile system jest responsywny (bardziej niz w Galaxy, ktory nie raz potrafil przymulic) o tyle odnalezienie sie w tym co jest pod jakim swipe i jakim guzikiem zajmie mi jeszcze pare dni
- Przyciski - sa trzy, po prawej stronie, jak w wiekszosci zegarkow, ale maja bardzo niski klik, a w dodatku jeden z nich jest dodatkowo "miekki" - ponoc wszystkie Venu3 tak maja
- Brak funkcji #EEG (czy jak ona sie tam nazywa) i pomiaru temperatury ciala - z tego co czytalem, zegarek ma taka mozliwosc, ale ogranicza go soft - zamiast EEG jest jednak parametr #HRV czyli Status zmiennosci tetna
Czy warto dac za ten zegarek 2k PLN? Coz, to troche jak pytac czy warto dac za zamochod 150 tys. zl - kazdy musi sobie odpowiedziec sam czy ten zestaw funkcji pasuje mu do takiej ceny, ja poki co jestem zachwycony ;)
"We’ve heard your feedback, and the Web Environment Integrity proposal is no longer being considered by the Chrome team."
Anyone know a good, hackable bluetooth mp3 player? Fitbit recently disabled transferring music to my Versa 1. Any cheap, preferably physically clippable, mp3 players? I guess storage being accessible over USB would be enough, but I'd love a device that is easily hackable to my hearts content.
I still think there needs to be an OS-level way to see which of the #apps I have installed are #PWAs and which were installed from an #app #store like #Fdroid #PlayStore #MicrosoftStore or the #AAPL #AppStore.
I need to manage these different kinds of apps differently.
‘The UK, US, EU and China have all agreed that artificial intelligence poses a potentially catastrophic risk to humanity, in the first international declaration’ on AI.
https://www.gov.uk/government/publications/ai-safety-summit-2023-the-bletchley-declaration/the-bletchley-declaration-by-countries-attending-the-ai-safety-summit-1-2-november-2023 #tech #ai #law #politics #chatgpt
The Benefits of 410 Stainless Steel and How to Find Reliable 410 Stainless Steel Suppliers
When choosing the right materials for your project, stainless steel often tops the list due to its exceptional qualities, such as corrosion resistance, durability, and versatility. Among the various types of stainless steel available, 410 stainless steel stands out for its unique properties. In this blog post, we'll delve into the benefits of 410 stainless steel and guide you on how to find trustworthy 410 stainless steel suppliers.
What is 410 Stainless Steel?
410 stainless steel is a type of martensitic stainless steel that contains 11.5-13.5% chromium. This alloy is known for its exceptional corrosion resistance, high strength, and excellent machinability. It's often used in applications where strength and resistance to corrosion are vital, such as in the production of cutlery, kitchen appliances, automotive parts, and industrial equipment.
Benefits of 410 Stainless Steel:
Corrosion Resistance: 410 stainless steel provides excellent resistance to corrosion in various environments. It is particularly well-suited for applications where exposure to moisture, chemicals, and high temperatures is common.
High Strength: This type of stainless steel offers impressive tensile and yield strength, making it suitable for applications that require robust and durable components.
Machinability: 410 stainless steel is easy to machine, making it an ideal choice for applications that require complex shapes and precision.
Heat Resistance: It can withstand elevated temperatures, crucial for components exposed to high-temperature environments or thermal cycling.
Wear Resistance: 410 stainless steel exhibits excellent wear resistance, making it suitable for applications where abrasion is a concern.
Aesthetic Appeal: Its attractive, shiny finish makes it popular in producing decorative items, such as architectural trim, jewellery, and kitchen utensils.
Now that you understand the advantages of 410 stainless steel let's discuss how to find reliable 410 stainless steel suppliers.
How to Find Trustworthy 410 Stainless Steel Suppliers:
Online Research: Conduct an online search for 410 stainless steel suppliers. Read through their websites to gather information about their product range, certifications, and customer reviews.
Industry Associations: Check if the supplier is a member of reputable industry aassociations or organizations, as this can be a sign of their commitment to quality and ethical practices.
Ask for References: Request references from the supplier and contact previous customers to inquire about their experiences with the supplier's products and services.
Certifications: Ensure that the supplier complies with industry standards and holds relevant certifications, such as ISO certifications for quality management.
Quality Control: Inquire about the supplier's quality control processes and measures they have in place to guarantee the quality of their products.
Customization Options: If your project requires specific dimensions or special requirements, confirm whether the supplier can accommodate custom orders.
Pricing and Delivery: Compare pricing and delivery terms from multiple suppliers to ensure you are getting a competitive deal without compromising on quality.
Remember that Good Place plotline about organic tomatoes being net negative because of all the unseen consequences? AI is like that too - the fun image generators and chatbots draw down vast amounts of power, and their operators don't want to reveal how resource-intensive your usage of their platforms really is. Will we look back in horror at this early wave of AI agents as wanton excess? Not all harm is visible. #tech https://futurism.com/the-byte/ai-electricity-use-spiking-power-entire-country
After the Hamas attack, Israel began a campaign that has unleashed immense suffering on Palestinian civilians and will forever change Gaza.
I spoke to Antony Loewenstein about what’s happening in Israel and Palestine, the broader context of this war, and how it benefits Israel’s defense tech industry.