An Internet rumor that a large space rock is going to slam into Earth next month gained enough traction that NASA on Wednesday put out a statement denying that the world is about to end.
As the apocalypse story has it, the asteroid impact would occur between Sept. 15 and Sept. 28 near Puerto Rico. […]
ON AUGUST 11th Amnesty International, a human rights charity, announced its support for decriminalising prostitution between consenting adults. Laws over prostitution differ by country: in Britain the sale of sex is legal, but pimping and brothels are not, while in America it is illegal in all states but Nevada.
Increasingly, however, human rights campaigners are calling for it to be decriminalised, as it is in several European countries. Amnesty’s recommendation follows on from similar ones made by the World Health Organisation and UNAIDS. Is decriminalising sex work a good idea or not? […]
+Fix the police, comin’ straight from the Senate house, Legislature’s gonna bring brutality down Pass some laws, so police know…
This guide is designed to get you up to speed on Docker. It is going to cover a lot of ground. We will show you how to build your own containers and a whole stack from scratch. This is the best way for users to understand how Docker works.
Containers depend on namespaces in the Linux kernel. Container managers like LXC, Docker and Nspawn combine namespaces with chroots to provide end user containers. We have a short guide on How Linux Containers Work here.
The idea behind Docker is to reduce the container as much as possible to a single process and then manage all these single app containers with Docker. […]
The treaty, which some have dubbed a “nonaggression pact” for cyberspace, details cooperative measures both governments pledge to undertake, including exchange of information and increased scientific and academic cooperation. With this, Russia and China continue to advance their vision of “information security,” a view of security concerns in cyberspace that is markedly different from Western approaches of “cybersecurity.” […]
In the next 20 years, we will see amazing advances in artificial intelligence and machine learning. Software programs are going to be deciding whether a car runs people over, or drives off a bridge. Software programs are going to decide who gets a loan, and who gets a job. If intellectual property law will protect these programs from serious study, then the public will have no idea how these decisions are being made. Professor Frank Pasquale has called this the Black Box Society. Take secrecy and the profit motive, add a billion pieces of data, and shake.
In a Black Box Society, how can we ensure that the outcome is in the public interest? […]
If there’s one thing about space that anyone is likely to know, it is that Mars is red. Redness, in fact, is the defining quality of the fourth planet from the sun. Glimpsed from afar, through the telescopes of the 19th century or the Hubble Space Telescope, Mars looks red.
But what about on the ground? If you, a human, were to stand on Mars and kick a toe into the soil, what would the dust around your ankles look like? […]
TOR, the Onion Router, is the choice of dissidents and journalists alike. It anonymizes Web traffic by obfuscating the source and the destination through a mesh of intermediaries.
Unfortunately, anonymity comes at a high computational price. TOR is slow.
Created in 2004 by the US Navy Research Lab, Tor was designed among other reasons to help people in oppressive countries gain access to the Internet.
Recently, it has been speculated that law enforcement have found ways to decrypt routing information regarding source and destinations of TOR requests. This includes controlling some of the nodes. […]
The programs foster connections and sometimes increase productivity among employees who are geographically dispersed and often working from home. But as work force management becomes a factor in offices everywhere, questions are piling up. How much can bosses increase intensity? How does data, which bestows new powers of vision and understanding, redefine who is valuable? And with half of salaried workers saying they work 50 or more hours a week, when does working very hard become working way too much? […]
With millions of Americans’ personal information becoming compromised by recent high-profile data breaches, many people are wondering just how anonymous hackers target and infiltrate these supposedly secure systems. Here is a step-by-step explanation of how your data can be stolen. […]
The next step is to take this model to its logical conclusion: Move these tasks from humans to machines and dramatically improve speed, correctness, transparency and cost of work.
As software systems continue to cannibalise human tasks, we will need to find more meaningful tasks for the human workforce in the software industry. […]
+ Any time someone resorts to pseudo-Darwinistic “evolutionary” ideas to rationalize a predatory socioeconomic system, skepticism is necessary.
The company is conducting an experiment in how far it can push white-collar workers to get them to achieve its ever-expanding ambitions. […]
+ P.S. More amazing was a chorus of monstrous cheers by those who empower the dystopia that Bezos himself later disavowed.
Many chains are already at work looking for ingenious ways to take humans out of the picture, threatening workers in an industry that employs 2.4 million wait staffers, nearly 3 million cooks and food preparers and many of the nation’s 3.3 million cashiers. […]
MEBOURNE: Children in two South Australian schools will soon have new clasroom companions – robots.
For the first time in Australia, research is being conducted into how robots can be effectively implemented into primary and secondary school curriculums to improve classroom learning. […]
…even when they agree with you, if you’ve turned the conversation into a battle you’re going to attract people who want to fight rather than think. Science communication should be about starting conversations and answering questions, not battlefield tactics for shutting down the opposition. […]
We will see in this post some steps of a pentest against an ADDS domain. This pentest focuses only on the Microsoft System and does not take into account Antivirus, Firewall, IDS and IPS protections. The parts we describe in detail are scanning, exploitation and maintaining access. The pentest is performed with BackTrack 5 R3, you can download it here. The tools we use are Nmap, Nessus, Metasploit (the hacker’s framework, exploits are written in ruby), John the Ripper and Powershell. The pentest’s goal is to retrieve domain administrator credentials and maintain the access on the ADDS domain discretly. […]
Intelligent Personal Assistants (IPAs) — Siri, Cortana, Google Now — send a recording of what you’ve said to a data center where the application actually resides. IPAs have complete access to your electronic life and an ability to undertake tasks autonomously; these abilities are not within your immediate control. […]
+ And why is the concept of basic income still squarely situated in the realm of utopian science fiction?
Between October and June, bedrooms of over 5000 crime victims lacked even minimal video surveillance — despite judicial warrants to turn over any video surveillance.
Curtains significantly limit our capacity to investigate these crimes and severely undermines our efficiency in the fight against terrorism. Why should we permit criminal activity to thrive behind drawn curtains, unavailable to law enforcement? To investigate these cases without bedroom video surveillance is to proceed with one hand tied behind our backs. […]