Don’t Info Op Until You See The Whites of Their Eyes
Shared by Simon HarrisWhy the anti-Macron influence op should start now
Why the anti-Macron influence op should start now
Being a very-simplest introduction to those beautiful methods of reckoning which are generally called by the terrifying names of the Differential Calculus and the Integral Calculus.
Charity to help talented disadvantaged youths get infosec jobs
Information overload has reached an all time high. Is there a way to stay-up-to-date without losing your mind? Yes. We call it “single-tasking.” Here’s a reminder of what multi-tasking does to your brain plus a proven way to find focus.
GM went so far as to argue locking people out helps innovation.
From minimal information about the client to complete and total compromise of the entire environment In just under 13 hours.
Naked mole rats can survive 18 minute stretches without any oxygen because of a weird metabolic switch.
Patrick teaches 6.034, the undergraduate introduction to AI at M.I.T. and a recent set of his lectures is available as videos.
Overall, when screening for potential, look for signs of stepping up, caring about the people on the team, and thoughtfulness about the processes.
Fundamentally, it’s what happens when you ask a software engineer to design an operations function.
Mentorship, Impact, and a Culture of Growth
Building distributed transactions to support highly available applications is a great challenge that has inspired excellent innovation and great technology. Unfortunately, this is not broadly available to application developers.
What’s a quantum computer? How broken are your public keys? AES vs. quantum search. Hidden quantum powers. Defeating quantum computing. Hash functions to the rescue.
The profound impact the language we use has on thought, discussion and ultimately code.
Garbage collection is a hard problem, really hard, one that has been studied by an army of computer scientists for decades. So be very suspicious of supposed breakthroughs that everyone else missed.
300 hours responding to security incidents and data breaches this year as a consultant or volunteer.
Secure hashing functions like SHA have a critical flaw for password hashing: they are designed to be fast. A modern commodity CPU can generate millions of SHA256 hashes per second. Specialized GPU clusters allow for calculating hashes at a rate of billions per second.
Since the mid-1990s, it’s estimated that at least 100,000 Japanese men and women vanish annually. They are the architects of their own disappearances, banishing themselves over indignities large and small: divorce, debt, job loss, failing an exam.
Researchers have developed a way to radically miniaturise a MRI machine, using atomic-scale quantum computer technology.
Asymmetric warfare is where the attack is cheap but the defense is expensive. It is very difficult to win in this situation; the attacker can wage a war of attrition at much less cost than the defender.