Anyone stubbornly clinging to Windows 7 or 8 now has two choices: upgrade or stay stuck on outdated software.
I may not have a PhD in thinky stuff, but someone running Windows7 is on outdated software even if their word processor is current.
"Grocery store in the arctic goes out of business. Residents now have two choices: move or live in harsh conditions."
"Uranus does have its own internal heat"
I'm a weak man... a weak, petty man...
Corporate Vice President and head of Windows, said that voice will emerge as a primary input
Translation: In the same manner that Windows came up with a narrative about why screenshotting user activity is "good for the user", they're now coming up with a narrative about why listening/storing all audio at all times is "good for the user".
Whereas to me, this means windows machines now officially join the ranks of other machines-- like Alexa -- that I refuse to allow in my house EVER. It's arguable I could/should have gotten there even prior to this; let's call this the straw that will finally motivate me to go to the mattress about the issue with other people I live with.
The WSJ is actually read by influential people in most industries and there's been a problem with the lack of pushback against those promoting AI.
I read that Luigi Mangione was motivated by his conversations with an AI. I wonder if that'd get through to them?
(It was, btw, an AI that told me that.)
The Escobar Phone Scam Saga Has Finally Come To an End
It was actually a bar phone sold by Esco. Easy mistake to make.
Find the youtubers you like and stop paying attention to the algorithmic feed.
Artificial intelligence has proved to be even more valuable as a writer of computer code than as a writer of words.
I see zero evidence of this. I HEAR it all the time in articles like this, but as far as people I work with or code I experiment with myself using AI, AI has proven to be maybe break-even for very simple, limited-domain things (basically the rough equiv of looking up an answer on stackexchange), and far worse than nothing when doing complex system design (during which I spend so much time shaking out the plausible-sounding but ultimately-bullshit answers that I net lose time).
I know I'm just an anecdote and a small sample base, but I do this for a living, and I don't see anything approaching the benefit that such articles spin.
Ask yourself: if it's so easy to use, where are all the apps written by your neighbors, and the local firemen, and the grocery store folks, and so on?
Email, chat, post, and websurf like it will be used against you... whether read aloud in court, used to deny insurance, loans, and jobs, or fed to AI to make the case that you're likely to commit crimes and need to be pre-emptively locked up.
You mean this? https://account.cablelabs.com/...
Yes; that more-direct link works too. The link I suggested provides a little more context, perhaps, although to download the document it ends up using exactly the same link that you suggested.
About twenty years ago, I was privileged to be one of the authors of a security specification written at the behest of cable-based telecom companies that described the detailed design of a system for securing phone conversations that were carried over their networks. https://www.cablelabs.com/spec.... The design specifically started with the assumption that the network was penetrated, and was designed to ensure that the attacker could neither disrupt service nor learn anything useful about the traffic (for example, taken from the specification: "All media packets and all sensitive signaling communication across the network [are] safe from eavesdropping. Unauthorized message modification, insertion, deletion and replays anywhere in the network [are] easily detectable and [do] not affect proper network operation").
Once the specification was completed and it came time to deploy, all the telecom companies decided (whether in concert or individually, I do not know) that they were not going to deploy the design. When the lead security VP at one of the major telecom companies explained their decision to me: "We don't need gold-plated security like you've designed: we have firewalls"; I knew that the battle was lost. I also wondered how long it would be before the kind of intrusion like the one described in the article would occur.
Frankly, I'm amazed that it took this long; perhaps, though, what took the time was not the fact of a thorough intrusion, but, rather, the detecting of one.
When you call the store three miles from you using a local number, you won't get routed to Vidhya who's sitting in a call center somewhere in India.
Not true: I had exactly this happen to me this past week. FWIW, it was the local UPS store... and I got routed to India instead of the phone at the local store despite having called the local number.
Then not only did I have to navigate a phone tree that very nearly caused me to throw the phone across the room, but then (after hitting '0' so many times I lost count) got to speak to two lovely Indians, neither of whom -- as far as I could tell - had more than a very basic grasp of English. I say "as far as I could tell" because both the initial person and her supervisor had accents that were all but incomprehensible. In the end, I slammed the phone down, got into my car, and drove several miles to the store to talk to one of the people there in person (I should mention that they were very nice, sympathetic and apologised for the experience I'd been put through, even though, obviously, there was nothing they could have done about it).
Still, corporate UPS -- like so many companies these days -- are obviously unconcerned about the image they are projecting to the public.
When, if ever, is it okay to intentionally drive a species out of existence...?
When that species provides no value and brings huge dangers to the world. Hey, if we find we dreadfully miss them for whatever reason, clone 'em and bring them back.
In computing, the mean time to failure keeps getting shorter.