177961189
submission
Futurepower(R) writes:
10 Times AI And Robots Have Already Done Horrible Things...Including Killing Peo
172747333
submission
Futurepower(R) writes:
How 34 labs are teaming up to tackle robotic learning
170563505
submission
Futurepower(R) writes:
Python-based compiler achieves orders-of-magnitude speedups
Codon compiles Python code to run more efficiently and effectively while allowing for customization and adaptation to various domains.
142203044
submission
Futurepower(R) writes:
"Apple’s plan to make iPhone apps be transparent about the data they take falls short of being helpful — or even accurate."
124942086
submission
Futurepower(R) writes:
Engadget writer Richard Lawler revealed that users were now trying to hack the Windows 10 registry to disconnect their local file searches from Microsoft servers (more below) “and I can't say I blame them after this episode. Microsoft owes users a better explanation than this and should make sure it's impossible for offline features to get taken out when the cloud is having an issue.”
“That’s Microsoft’s underlying tactics all along: sneak questionable mechanics into Windows with updates, backtrack only if someone noticed them, reported them and if that creates a big enough public outcry,” commented one user.
[A] Windows 10 registry hack appears to be the only 100% fix for this issue and it also disconnects Bing and Cortana online services from Windows 10 search.
104288252
submission
Futurepower(R) writes:
Minister in Charge of Japan’s Cybersecurity Says He Has Never Used a Computer. (Nov. 15, 2018)
Japan's cybersecurity minister has never used computers. (Nov. 15, 2018. Fixed the title.)
Quote: "Lawmakers laughed incredulously at his replies, which were highlighted in Japanese media.
It is common that older people don't use computers and don't want to learn.
91939579
submission
Futurepower(R) writes:
What is the best way to isolate a network from the internet and prevent
intrusion of malware, while allowing carefully examined data transfer
from internet-facing computers?
An example of complete network isolation could be that each user would
have 2 computers with a KVM switch and a monitor and keyboard, or 2
monitors and 2 keyboards. An internet-facing computer could run a very secure version of Linux.
Any data to be transferred to that user's computer on the network would
perhaps go through several Raspberry Pi computers running Linux; the computers
could each use a different method of checking for malware.
Windows computers on the isolated network could be updated using Autopatcher, so that there would never be a direct connection with the internet.
Why not use virtualization? Virtualization does not provide enough separation; there is the possibility of vulnerabilities.
Do you have any ideas about improving the example above?