Browsing Tag

Sunday Paper

General

Sunday Paper - Flawed sea level models, Politically Motivated Violence, Instagram, Gun Control, First Amendment, Private Networks and Rights, Privacy hypocrites

Sunday Paper, Rucksack, Magazine, Camera, Pocket Watch, Notebook, Leather, Range Finder Camera, Camera, Ruck

The climate may be even more screwed up than we thought. There are a couple of reasons. One of the major reasons is that we are seeing ice sheets pushed to a point where processes are coming into play that we hadn’t seen before. And we’re still struggling to understand these processes. We saw this in the early 2000s with the complete disintegration of sections of the Larsen B ice shelf. Researchers knew that this region was one of the…

Continue Reading

General

Sunday Paper - Facial Recognition, Python, Happiness, Apple Software Quality, iCloud

Sunday Paper, Rucksack, Magazine, Camera, Pocket Watch, Notebook, Leather, Range Finder Camera, Camera, Ruck

The New York times and leaders within the democratic party agree that facial recognition technology is dangerous to civil liberties and must be banned. The essential and unavoidable risks of deploying these tools are becoming apparent. A majority of Americans have functionally been put in a perpetual police lineup simply for getting a driver’s license: Their D.M.V. images are turned into faceprints for government tracking with few limits. Immigration and Customs Enforcement officials are using facial recognition technology to scan…

Continue Reading

General

Sunday Paper - Cloud Misconfiguration, The Standard Two Kitchen House

Sunday Paper, Rucksack, Magazine, Camera, Pocket Watch, Notebook, Leather, Range Finder Camera, Camera, Ruck

It seems that most cloud security lapses are due to misconfigurations. The biggest problem is that when deploying cloud environments, many pieces need to be configured, including the routing and firewall rules that grant access to the servers being deployed, the servers themselves, and the application-level firewalls and access rules within those servers. With so many components, and with effectively non-existent security in most default configurations, it is easy to see why one or more components may be deployed in…

Continue Reading