|
Once deprived of sunlight, the thin atmosphere condenses on the moon's surface. Hold your breath until sunrise
|
|
|
|
|
Uranus steals it.
#SupportHeForShe
Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson
You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun
|
|
|
|
|
Now we know why the dwarves favour mining at night...
IO, IO, its off to work we go.
(I'll fetch my coat)
"If you don't fail at least 90 percent of the time, you're not aiming high enough."
Alan Kay.
|
|
|
|
|
|
Of course (to steal one of the Ars responses), the correct pronunciation should always be proceeded by E, I, and E.
(I'll fetch my coat again)
"If you don't fail at least 90 percent of the time, you're not aiming high enough."
Alan Kay.
|
|
|
|
|
University of California, Berkeley engineers have built the first dust-sized, wireless sensors that can be implanted in the body. Time to jack into cyberspace
|
|
|
|
|
The sensor, 3 millimeters long and 1×1 millimeters in cross section,...
They have really big dust at UC, Berkeley!
...and ultrasound vibrations can penetrate nearly anywhere in the body, unlike radio waves, the researchers say.
Time to retire my tin foil hat for...what?
modified 4-Aug-16 16:30pm.
|
|
|
|
|
Says if companies don't modernize and adapt, they're "not going to be around." That crying you hear is coming from the Windows (and Office) buildings
|
|
|
|
|
If they don't take care of their current customers then their "Cloud" will only be accessed by Macs and Linux flavor os's. When the interent breaks they will have No customers.
|
|
|
|
|
Already, nearly 30% of Azure instances are linux([^]).
|
|
|
|
|
|
The two have unveiled OpenYOLO — not this YOLO, but short for “you only login once” — an open-source API project for app developers to access passwords stored in password managers, whichever one you happen to use. Counting down to when it gets hacked...
|
|
|
|
|
Sounds like, if it were hacked, it be an easy backdoor to all your secrets, or "EBAYS"tm for short.
#SupportHeForShe
Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson
You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun
|
|
|
|
|
|
InfoWorld talks with GitHub's Jamesha Fisher about the cultural shifts necessary for baking security early into the devops process. Alternately, "Does anybody really know what time it is?"
I only recently learned that "Twenty-five or six to four" was written as a response to this song. Or at least that's _what they say_.
|
|
|
|
|
Kent Sharkey wrote: I only recently learned that "Twenty-five or six to four" was written as a response to this song. Or at least that's _what they say_.
I was literally wondering about this just one hour ago. Thank you for saving my evening from hours of google, fora, and wikipedia -induced surfing.
|
|
|
|
|
It's a resource issue.
For simplicity, consider the following example. Developers invest 90% of their time into creating a product and 10% of the time into protecting it. Hackers can put 100% of their time into breaking protections.
|
|
|
|
|
My experience has been that developers care about security, management doesn't.
|
|
|
|
|
Four high-profile bugs have been found in the protocol, potentially placing 85 million websites at risk. That's it - I'm going back to NetBIOS. Who's with me?
Or maybe SNA. That's unhackable, right? :P
|
|
|
|
|
Nah! Bring back token ring! The problem isn't the application layer HTTP, not the control layer TCP, nor even the transport layer IP. It's in the hardware layer Ethernet where all the trouble starts.
|
|
|
|
|
A notorious black hat says he has more than 200 million hacked Yahoo accounts for sale on the dark Web. The company says it is "aware of [the] claim," but is refusing to comment on its veracity. Yahoo accounts are primarily used to log into the company's webmail service, but also for other sites like Flickr. Farther down in the text: "hashed passwords created with the md5 algorithm" - security first
|
|
|
|
|
It seems like MD5 was initially cracked about 10 years ago; which is inexcusable to still be in production.
|
|
|
|
|
I did some encryption work in the mid 1990s. I think I had to drop MD5 about 1997 or so.
I'm retired. There's a nap for that...
- Harvey
|
|
|
|
|
As CEO Satya Nadella outlined at Build 2016, the company envisions a day when natural language and machine intelligence will combine to enhance productivity and allow its customers to “get more done and have more fun.” Pardon me while I grimace (as a platform)
(as a platform)
|
|
|
|
|
The problem with moving faster than most companies is that Facebook was plagued by delays whenever it had to outsource prototyping and testing of its gadgets and gizmos. With so much hardware on its 10-year roadmap, and quarter after quarter of profits stacking up, it made sense to build a dedicated laboratory within its Menlo Park headquarters. Solid aluminum Like buttons!
Or 'aluminium' if you're of that sort.
|
|
|
|