|
Quote: The researchers said that traditional AI dialogues usually offer introductions that frame their role as a helper.
In fact, power users may be put off by the way AIs typically communicate with users, which may seem patronizing to them,
...
On the other hand, when an AI system asks users for help, it is seen as social
Nah. Both cases sound like Big Tech begging me for more data to better violate my privacy (see farsebook's abuse of the phone numbers they claimed to only need for account verification purposes for a particularly blatant example); in either approach they can go themselves and die in a magic smoke release.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
|
|
|
|
|
Dan Neely wrote: Nah. Both cases sound like Big Tech begging me for more data to better violate my privacy (see farsebook's abuse of the phone numbers they claimed to only need for account verification purposes for a particularly blatant example); in either approach they can go [mastadon] themselves and die in a magic smoke release. This.
|
|
|
|
|
'I got bored sitting at home while retired ... I chose to go back to my roots' He couldn't do that before retiring?
"This is Microsoft's way of giving back to Python." <- I'm sure the Python folk will be delighted and enthusiastic about this.
|
|
|
|
|
|
Kent Sharkey wrote: I'm sure the Python folk will be delighted and enthusiastic about this. Probably the same as linux users are with WSL
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Wenyan is built on its namesake, Classical Chinese (or Wényán), the written form of Chinese used from the 5th century BCE to the early 20th century. Crouching tuple, hidden debugger
Yeah, yet another programming language used by one person, but it amused me. (Plus, you know - slow news day)
At least it's not Plain English
|
|
|
|
|
Kent Sharkey wrote: Crouching tuple, hidden debugger Featuring "House of flying bugs" and "Curse of the golden script"
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
With Project Moca, you can simplify your workflow so you can focus on what matters. Add tasks, goals, notes, files from OneDrive and other cloud storage providers, links, contacts, and even emails and events, all into one dynamic space. And now you have one more space to update everything!
|
|
|
|
|
MIT researchers have created a new system that automatically cleans "dirty data"— the typos, duplicates, missing values, misspellings, and inconsistencies dreaded by data analysts, data engineers, and data scientists. DROP TABLE messy
|
|
|
|
|
Colonial Pipeline paid hackers nearly $5 mln in ransom - Bloomberg News | Reuters
"...Colonial Pipeline paid nearly $5 million to Eastern European hackers on Friday after a crippling cyberattack that shut the largest fuel pipeline network in the United States, Bloomberg News reported, citing two people familiar with the transaction...."
I was surprised they were able to restart their operation that quickly; this answers that.
Since 5$ million is that that much money for that kind of company, We'll see how many infrastructure companies of that size will get hacked in the next few week.
CI/CD = Continuous Impediment/Continuous Despair
|
|
|
|
|
I work in a different industry and yesterday I got a call from the boss who said another organization in our industry was hit by ransomware so the call was made to back everything up including software and production systems. I've been doing it for years so I didn't change a single thing I was doing. Apparently this was a big thing for some people though.
BTW - this hasn't hit the news yet and they are trying to keep it quiet enough that it doesn't. I'm not sure how they are going to explain why hundreds people are not working so I expect a leak any day now. I don't even know who the organization is because I wasn't told. I just know it wasn't us.
"They have a consciousness, they have a life, they have a soul! Damn you! Let the rabbits wear glasses! Save our brothers! Can I get an amen?"
|
|
|
|
|
Use image backup every night and swap out the drives daily and you can thumb your nose at those crooks. Of the ransomware attacks that have happened to our customers over the years not one has had to pay a dime and being back and running was as easy as restoring the image.
World infrastructure cats, get a clue.
Windows server backup, Acronis true image, Image for Linux,Apple Time machine, there is just no excuse.
|
|
|
|
|
When the hackers look for quick money, that will work.
But some are more diligent. After infecting your system, they'll wait a couple of month, till they are sure that all your backups are infected with their malware too. And when you restore from the infected (though not yet encrypted) backup, they'll just ...
But of course, that comes with a different risk for the hackers: another group may be faster.
Oh sanctissimi Wilhelmus, Theodorus, et Fredericus!
|
|
|
|
|
Oh... I should have read all the messages before answering... you brought up exactly the same point I wrote... deleting redundant message.
You just answered to Rick and this fits more answering to Ron
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Quote: he hackers provided Colonial Pipeline with a decrypting tool to restore its disabled computer network after they received the payment, but the company used its own backups to help restore the system since the tool was slow,
So, they wasted the $5 million anyway.
|
|
|
|
|
Looks like a lot of criminal organizations know where to get their meal ticket now.
|
|
|
|
|
Just because they got paid doesn't mean they are going to get away with it. The FBI will be on to the job, as will potentially kinetic solutions. Being in eastern Europe won't save anyone. Only being protected by certain governments could provide protection and, even then, might not be guaranteed.
|
|
|
|
|
Old-school security guy’s reaction: The Ransomware Hack[^]
(He’s also expecting it to get worse)
TTFN - Kent
|
|
|
|
|
|
The are serious implications here, particularly for inspiring career choices. Is there anything intrinsically illegal about offering (online?) courses in "Ransomware Made Easy" or "Build Your Own Ransomware in 24 Hours" ?
Ravings en masse^ |
---|
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein | "If you are searching for perfection in others, then you seek disappointment. If you seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010 |
|
|
|
|
|
This makes me incredibly sad that, after years of this rubbish, corporations still don't understand the concept of backups.
My thinking here is that 5M for a massive corp is cheaper than what it would cost them to implement full backups. So they save a bit of money, and then pass the problem onto every other person on the planet who may not have the funds or ability or even know-how to manage backups properly.
Even my 82 year old dad does daily backups.
cheers
Chris Maunder
|
|
|
|
|
One such aspect is getting the WinForms designer to act the same in VB.NET projects as it does in C# projects because of the idiomatic differences between the two languages. Twenty-year-old technology fails to work with another twenty-year-old technology
Yeah, I know - WinForms 5 isn't WinForms 4++, so it's not exactly 20 years-old anymore. Still, this is what happens when you decide to stop putting effort into maintenance for a while.
|
|
|
|
|
they work for msft don't they....
Caveat Emptor.
"Progress doesn't come from early risers – progress is made by lazy men looking for easier ways to do things." Lazarus Long
|
|
|
|
|
Nearly every modern software development project relies heavily on open-source software. It's 'free' as in 'puppies', so it needs some care and feeding
|
|
|
|
|
Kind of mandatory[^]
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|