Technology

87 readers
2 users here now

This magazine is dedicated to discussions on the latest developments, trends, and innovations in the world of technology. Whether you are a tech enthusiast, a developer, or simply curious about the latest gadgets and software, this is the place for you. Here you can share your knowledge, ask questions, and engage in discussions on topics such as artificial intelligence, robotics, cloud computing, cybersecurity, and more. From the impact of technology on society to the ethical considerations of new technologies, this category covers a wide range of topics related to technology. Join the conversation and let's explore the ever-evolving world of technology together!

founded 2 years ago
151
 
 

Altman is “ambivalent” and wants governance changes.

152
 
 

Google offers static PDF downloads for some content, refunds for others.

153
 
 

This is not an isolated case in the United States, a country that concentrates approximately 30% of all the data centers in the world. Arizona, Utah and South Carolina are well aware of the insatiable thirst of this type of infrastructure.

They are also familiar with it in the Netherlands, where Microsoft was involved in a scandal last year when news broke out that one of its facilities consumed four times more water than declared in a context of drought.

Or in Germany, where Brandenburg authorities denied Google permission to build a data center in the region, as a Tesla gigafactory was already consuming too much water.

154
 
 

Chief technology officer Mira Murati appointed interim CEO to lead penAI; Sam Altman departs the company. Search process underway to identify permanent successor.

155
 
 

The Federal Communications Commission has approved a new set of rules aiming to prevent “digital discrimination.” It means the agency can hold telecom companies accountable for digitally discriminating against customers — or giving certain communities poorer service (or none at all) based on income level, race, or religion.

156
 
 

Over the last few years, we’ve seen a seismic shift in the way we work. The days of commuting to the office, Monday to Friday, are over. More of us than ever are now working, at least some of the time, from home. And, that’s made it a lot easier to strike a healthier work-life balance.

However, with some swapping an ergonomic office setup for the dining room table, this change hasn’t necessarily been beneficial for our physical health. Time and time again, studies have shown that maintaining any static position throughout the day isn’t good. Our bodies have adapted to suit more movement.

That’s where a height adjustable sit-stand desk really shines. I’ve been using a budget option for a while, but the Fully Jarvis standing desk has been on my radar for some time, having received rave reviews from other YouTubers. So, ever since Herman Miller offered the opportunity to test out the Jarvis for myself—alongside the Ollin monitor arm—I’ve been looking forward to sharing my experience.

Is this really the ultimate home office setup? Let’s find out…

157
2
Ad Hoc Testing (www.webomates.com)
submitted 2 years ago by Webomates@kbin.social to c/tech@kbin.social
 
 

Ad hoc Testing is done after the completion of the formal testing on the application or product. To do ad-hoc test, a tester must first analyze the application’s security and user-perceptible features. A well-informed tester must also understand an application’s architecture and if not familiar with an application, then the process of building it can be time consuming. Therefore a Ad hoc Testing may be suitable for organization like those that have small groups of agile testers, security experts or developers who are able to meet often or whenever required

158
 
 

In a surprising move, Apple has announced today that it will adopt the RCS (Rich Communication Services) messaging standard. The...

159
 
 

What is Continuous Vulnerability Exposure Management (CVEM)?
“Every attacker leverages weakness!”

The statement holds true in both the physical realm and the cyber sphere. Whether we're talking about Malware, DDoS attacks, phishing, spoofing, or various other tactics, they are all meticulously crafted to exploit specific vulnerabilities, be they technological, human, or procedural.

Understanding that every attack hinges on exploiting a weakness changes our approach to cybersecurity (CVEM). We start actively searching for these vulnerabilities, deepening the comprehension of our organization's IT infrastructure.

With this perspective, you can thoroughly analyze your IT infrastructure, gaining a detailed understanding of all its aspects, recognizing your weaknesses, establishing controls, identifying gaps, uncovering strengths, and much more. There are also alternative viewpoints, such as the Detection Perspective, Data Perspective, Attacker Perspective, User Perspective, Device Perspective, Network Perspective, Application Perspective, and more.

We refer to these weaknesses as "vulnerabilities," a concept well-known in the realm of Vulnerability Management. Despite our best efforts, however, attacks persist. Why is this the case?

Firstly, our focus often narrows down to what we commonly term "software vulnerabilities." Timely discovery and mitigation are frequently lacking, and we tend to rely on isolated, automated solutions.

Secondly, a myriad of vulnerabilities often elude our scrutiny.

Vulnerability management, attack surface management and exposure management must take a central role in our cybersecurity strategy. It's through a comprehensive understanding of these vulnerabilities and a proactive approach to fortifying our defenses that we can genuinely protect our digital domains. Elevate true Vulnerability and Exposure Management to the forefront and make it an ongoing, automated endeavor. Reimagine cybersecurity from the perspective of weaknesses.

#tech

160
 
 

Apple's latest financial filings show that the company expects to be forced into allowing third-party App Store across Europe, starting in 2024.

161
 
 

The malicious ad is for CPU-Z, a popular utility for Windows users that want to troubleshoot their processor and other computer hardware details. The advertiser shows as Scott Cooper and is likely a compromised or fake identity, the report says.

162
 
 

Best Buy will reportedly stop selling physical DVDs in-store and online beginning in 2024, according to CNBC and other media outlets.

163
 
 

🌐✨ From gaming realms to virtual workspaces, these platforms are reshaping industries.

Explore limitless possibilities and redefine your digital experience!

164
 
 

Revolutionize NFT sports markets with Fancraze Clone Script - Your game-changing solution.

165
 
 

Arturo Béjar, known for his expertise on curbing online harassment, recounted to Meta CEO Mark Zuckerberg his own daughter's troubling experiences with Instagram. But he said his concerns and warnings went unheeded. And on Tuesday, it was Béjar's turn to testify to Congress.

"I can safely say that Meta's executives knew the harm that teenagers were experiencing, that there were things that they could do that are very doable and that they chose not to do them," Béjar says. This, he said, makes it clear that "we can't trust them with our children."

166
 
 

The Fire Bee Techno Services is a leading Metaverse game development company we specialize in creating unique and immersive virtual experiences. With a team of highly skilled developers and designers, we the forefront of innovation in the gaming industry.

167
 
 

Dive into the world of Location Intelligence with us! 🌍📊 Unlock the power of location data and discover how it's reshaping industries and decision-making.

Join us on this journey to explore the untapped potential of location insights.

168
 
 

Big Tech firms will face new European Union rules to clearly label political advertising on their platforms, who paid for it and how much and which elections are being targeted, ahead of important votes in the bloc next year.

169
 
 

Workers at Swedish ports blocked the unloading and loading of Tesla cars on Tuesday while cleaners and electricians threatened to join the strike against the company for its refusal to sign a collective agreement.

170
 
 

More than a hundred new flaws were recently discovered in Microsoft 365 apps

171
 
 

Integration Platform as a Service (iPaaS) is a cloud-based solution that seamlessly connects and automates data exchange between various applications, streamlining business processes.

172
 
 

YouTube expanded a “test” that threatens to cut off users who don't turn off their ad blocker. Developers of the tools are scrambling to respond.

173
 
 

The 2023 UAP Disclosure Act represents a watershed moment for the evolution of legislative action around UFOs and UAPs. This analysis explores the history and current trajectory of this emerging regulatory topic.

174
 
 

Anyone know a good, hackable bluetooth mp3 player? Fitbit recently disabled transferring music to my Versa 1. Any cheap, preferably physically clippable, mp3 players? I guess storage being accessible over USB would be enough, but I'd love a device that is easily hackable to my hearts content.

#tech

175
1
submitted 2 years ago* (last edited 2 years ago) by henryida@kbin.social to c/tech@kbin.social
 
 

Great template for asynonous daily standup over Slack

view more: ‹ prev next ›