|
Criminals are using the cloud to cover their tracks as they deliver malware and steal data. Oh, that's who's using cloud computing
I knew someone other than the demo writers must have been.
|
|
|
|
|
Kent Sharkey wrote: Oh, that's who's using cloud computingI knew someone other than the demo writers must have been. You would be surprised
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
It's only because they haven't got a handle on AI, yet.
Even criminals can be slow in following trends, sometimes.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
As impressive as this invention is, does anyone actually need a handheld blaster that can hurl playing cards at speeds over 120 miles per hour? You're probably wondering: did I shoot 52 times, or only 51...
|
|
|
|
|
How long will it be until someone adapts the design to fire slices of steel or razor blades?
I wonder if this guy has ever applied his skills and knowledge to creating something that will help people, rather than kill them.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Why bother?
Ordinary guns are more than adequate, and (in the US) can be legally acquired without the services of a machine shop. Even in the rest of the world, acquiring a gun isn't exactly difficult (if you know the wrong people...).
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
Hmm, but what are the odds that you could get one of these on a plane, without any problems?
Mind you, there's any number of carry-on-able things that cab be used as weapons -- a manically violent group could probably hijack a plane with no more than pencils.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Mark_Wallace wrote: what are the odds that you could get one of these on a plane, without any problems?
Given the competence (or lack of it) exhibited by the TSA, I'd say the chances are pretty good. In tests of their ability to find forbidden items, they have missed most of the "weapons". The TSA Is Improving, Only Failing ~80% Of Tests | One Mile at a Time
Mark_Wallace wrote: a manically violent group could probably hijack a plane with no more than pencils.
Fpr that matter, plenty of SEALs/SAS/… soldiers have been taught to kill with their hands alone. How would that get a terrorist with the same training through the security door into the cockpit flight deck?
Before 9/11, victims of hijacking had an expectation of a few days or weeks of discomfort, but were usually (mostly) released unharmed. After 9/11, the expectation is of death. Even if the terrorists were killing passengers one after another, I don't see the pilots admitting the terrorists to the flight deck.
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
Much has been written about the shortage of IT talent required to develop internal enterprise software and mobile apps. Eh?
I was utterly shocked that he worked for a low-code company. I am also shocked every time I drink coffee and it's hot.
"Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives."
Really? Really?! Really.
|
|
|
|
|
Two questions:
0. Is he really saying that people who have never shown any proficiency (or inclination) in providing specs and use cases to developers will suddenly develop the skills to go a step higher and design the programs themselves?
1. Does everyone he talks to realise that he's an idiot, or just a very high percentage of them?
We don't need untrained people providing program designs, we need them to provide specifications and use cases.
I wanna be a eunuchs developer! Pass me a bread knife!
modified 20-Feb-20 5:06am.
|
|
|
|
|
|
In a troubling experiment, researchers at security firm McAfee were able to trick two 2016 Teslas, with cruise control enabled, into driving up to 50 mph in a 35 mph zone — simply by sticking two inches of black tape over the three on the speed sign, making the vehicles think they were in an 85 mph zone. Beware of hackers with sticky tape
|
|
|
|
|
I think we need to put a little work into the definition of "hacker".
But this should not work. The GPS I use doesn't read road signs, because all the data is available from various gubernatorial servers. If teslas rely on road signs for such information, they're designed by idiots.
I will now go and stick a scale model of a no-entry sign at the bottom of my road, to keep the buggers out, thereby reducing the risk of my being run over by one of the contraptions.
And I'll put some thought into which road signs I want on the backs of my jackets.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Mark_Wallace wrote: I think we need to put a little work into the definition of "hacker".
This could be a "hack" in the original sense of the term - The Meaning of ‘Hack’. OTOH, I wouldn't expect a contemporary "Tech. reporter" to be aware of this usage.
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
We will be exploring how ‘Default Interface Methods’ work under-the-hood, looking at what the .NET Core Runtime has to do to make them work and how the feature was developed. "I got a fuel injected engine sittin' under my hood"
Always make sure your acronyms aren't sending a message you don't want to send
|
|
|
|
|
The union will offer a common market for data-sharing, work on new rules for AI and invest in homegrown companies. Beyond fining them?
|
|
|
|
|
|
Nelek wrote: I do see the need to make something to compete for a piece of the cake. They don't want a piece of the cake, they want to defend their people.
That's the job of government (despite the fact that the UK and US governments think otherwise).
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Mark_Wallace wrote: They don't want a piece of the cake, they want to defend their people. Fair enough
But, sorry, I am not really sure about it
But I do want to think you are right, and hope they do what is needed to pay back your trust on them
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Yeah, right, like gov't run anything has ever worked well before.
#SupportHeForShe
Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson
You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun
|
|
|
|
|
You're right. Things are perfect as they are.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
#SupportHeForShe
Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson
You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun
|
|
|
|
|
I can't wait to see the FUD that google, fb, amazon, et al regurgitate, in an attempt to get people to go against this, but it's about time an authoritative body stood up and made it clear that US corporations do not rule the world.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Oh, but they DO.
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
The latest Verizon Data Breach Investigations Report eloquently argues that aside from wireless, the form factor of mobile in and of itself poses security risks. You mean that devices being used for every purpose other than their original intent aren't secure?
|
|
|
|