ashar

joined 2 years ago
MODERATOR OF
[–] ashar 0 points 1 year ago (2 children)

If the politicians wanted to stop this they would go after the drug consumers as well because that would stop the drug gangs income. Unfortunately the drug consumers are the people who vote and the politicians kids ..... so nobody cares

[–] ashar 10 points 1 year ago (5 children)

The bombs are quite small, and it is drug dealing gang vs gang, which is why mostly normal people are not affected and don't really care. It makes for sensational news reports though so the xenophobes get wound up.

[–] ashar 1 points 1 year ago

Also 90 hostages were released by the Israelis

[–] ashar 7 points 1 year ago
[–] ashar 11 points 1 year ago

Attacking medical facilities and staff is a war crime, people.

[–] ashar 4 points 1 year ago

Who attacked?

[–] ashar 23 points 1 year ago
[–] ashar 11 points 1 year ago (1 children)

Reminder that attacking hospitals and people in hospitals is a war crime under the Geneva Conventions.

[–] ashar 5 points 1 year ago

Poverty increases to 50% is not good if you are the poor, but it is really good for some especially the target market for the article.

[–] ashar 26 points 1 year ago (1 children)

Israel occupies more territory as a buffer zone for its 50 year old buffer zone.

[–] ashar 1 points 1 year ago

I would suspect that very few Hamas fighters will have committed war crimes. Most of them only fight the IDF in Gaza.

[–] ashar 1 points 1 year ago (2 children)

Your premise that anyone suspected of being associated with Hamas should be killed is against the Geneva conventions. You are supporting war crimes.

 

This lecture given onsite at MIT Lincoln Laboratory on 25 April 1985 coveres many salient points still relevent today.

Rear Admiral Grace Hopper's famous MIT Lecture

Grace Brewster Hopper (née Murray; December 9, 1906 – January 1, 1992) was an American computer scientist, mathematician, and United States Navy rear admiral.[1] She was a pioneer of computer programming. Hopper was the first to devise the theory of machine-independent programming languages, and used this theory to develop the FLOW-MATIC programming language and COBOL, an early high-level programming language still in use today. She was also one of the first programmers on the Harvard Mark I computer. She is credited with writing the first computer manual, "A Manual of Operation for the Automatic Sequence Controlled Calculator."

Before joining the Navy, Hopper earned a Ph.D. in both mathematics and mathematical physics from Yale University and was a professor of mathematics at Vassar College. She left her position at Vassar to join the United States Navy Reserve during World War II. Hopper began her computing career in 1944 as a member of the Harvard Mark I team, led by Howard H. Aiken. In 1949, she joined the Eckert–Mauchly Computer Corporation and was part of the team that developed the UNIVAC I computer. At Eckert–Mauchly she managed the development of one of the first COBOL compilers.

1
HOU.SEC.CON. 2024 (www.houstonseccon.com)
submitted 1 year ago by ashar to c/security_cpe
3
submitted 1 year ago* (last edited 1 year ago) by ashar to c/security_cpe
 

Podcast

Why Aren't More Defenders Winning? Defender’s Advantage and How to Gain it!

Guest: Dan Nutting, Manager - Cyber Defense, Google Cloud

Topics:

What is the Defender’s Advantage and why did Mandiant decide to put this out there?

This is the second edition. What is different about DA-II?

Why do so few defenders actually realize their Defender’s Advantage?

The book talks about the importance of being "intelligence-led" in cyber defense. Can you elaborate on what this means and how organizations can practically implement this approach?

Detection engineering is presented as a continuous cycle of adaptation. How can organizations ensure their detection capabilities remain effective and avoid fatigue in their SOC?

Many organizations don’t seem to want to make detections at all, what do we tell them?

What is this thing called “Mission Control”- it sounds really cool, can you explain it?

Resources:

Defender’s Advantage book

The Defender's Advantage: Using Artificial Intelligence in Cyber Defense supplemental paper

3
submitted 1 year ago* (last edited 1 year ago) by ashar to c/security_cpe
 

Podcast

Transcript

Join G. Mark Hardy in Torremolinos, Spain, for a deep dive into the security of Generative AI. This episode of CISO Tradecraft explores the basics of generative AI, including large language models like ChatGPT, and discusses the key risks and mitigation strategies for securing AI tools in the workplace. G. Mark provides real-world examples, insights into the industry's major players, and practical steps for CISOs to balance innovation with security. Discover how to protect sensitive data, manage AI-driven hallucinations, and ensure compliance through effective governance and ethical guidelines. Plus, get a glimpse into the future of AI vulnerabilities and solutions in the ever-evolving tech landsc

2
submitted 1 year ago by ashar to c/security_cpe
5
SEC-T 2024 (infosec.pub)
submitted 1 year ago* (last edited 1 year ago) by ashar to c/security_cpe
2
submitted 1 year ago* (last edited 1 year ago) by ashar to c/security_cpe
 

Free and Open Source Software Conference.

Free Software and Open Source - these are the topics of FrOSCon (Free and Open Source Software Conference). Every year in August the computer science department of the University of Applied Sciences Bonn-Rhein-Sieg, supported by FrOSCon e.V., will organize an exciting program with talks and workshops for visitors of all ages

Schedule

Videos

view more: ‹ prev next ›