Keyword: computers
-
There are 10 types of people. Those that understand binary and those that do not. --Ray Roton Old programmers never die... They just decompile. -- Peter Dick Walking on water and developing software from a specification are easy if both are frozen. -- Edward V. Berard, "Life-Cycle Approaches" I haven't lost my mind, I have it backed up on tape somewhere. -- Unknown CChheecckk yyoouurr dduupplleexx sswwiittcchh!! -- Unknown Beware of bugs in the above code; I have only proved it correct, not tried it. -- Donald Knuth Beware of programmers who carry screw drivers. -- Leonard Brandwein PCMCIA...
-
The Moscow-based cybersecurity firm, which says it has more than 400 million users worldwide, was added to the Federal Communications Commission’s list of restricted entities on Friday alongside two Chinese companies. Now that Kaspersky is on the list — which also includes Huawei and China Telecom, among other Chinese firms — American businesses are banned from buying its products or services using federal subsidies.
-
I have some WAV files I'd like to convert to text. Can Dragon Naturally Speaking convert sound files (WAV or MP3) to text? Or must I dictate live for Dragon to create a text file?I found many website that allow me to upload MP3 files and convert them to text in the cloud. But I prefer to have a program on my computer.If Dragon doesn't do this, is there some software that can do it? Something not cloud-based.
-
Apple App Store lists rightwing Twitter alternative but ex-congressman tapped to lead company indicates slow rollout Donald Trump’s rightwing riposte to Twitter – his new social media app Truth Social – is supposed to launch on Monday. But the rollout of what the former president hopes will be the start of a new media empire continues to be shrouded in confusion and secrecy. Tim Scott speaks at a press conference. Tim Scott, only Black Senate Republican, hints he could be Trump's running mate. ... Even the new app’s name is likely to be controversial, given Trump’s legendary struggles with veracity....
-
Facebook's user numbers declined for the first time in its history last quarter.Facebook's parent company Meta reported daily active user numbers of 1.929 billion over the last three months of 2021. In Q3 of 2021, it reported an average of 1.93 billion active users. This means it lost roughly 1 million users over that period.Facebook stock plunged 22% in premarket trading following its Q4 earnings.CEO Mark Zuckerberg said in the company's earnings call that the company's social-media business is facing stiff competition.
-
Carly Fiorina left the Republican debate Wednesday night with her head held high. Rapid reaction resulted in high praise for the former CEO of Hewlett-Packard, but not all the news was positive. During one portion of the debate, Fiorina and Republican front runner Donald Trump spared over their business records. Trump hit Fiorina hard, citing a recent editorial by Jeffrey Sonnenfeld, of the Yale School of Management , who referred to her as one of the worst CEOs in recent memory. While how bad Fiorina was as CEO of HP is up for debate, a recent report by Bloomberg points...
-
A 19-year-old hacker claims to have taken over more than 20 Tesla vehicles in 10 countries through a software vulnerability. David Colombo, who is based in Germany, shared the feat on Twitter saying the fault does not fall on the Elon Musk-founded company, but on owners of the Teslas. The flaw is said to have been found in third-party software that allowed Colombo to unlock doors and windows, start the cars without keys and disable security systems. He also tweeted the vulnerability lets him use the internal Tesla cameras to spy on the driver. Colombo told DailyMail.com that ‘it is...
-
Broken keyboard keys are quite a common occurrence on laptops and netbooks. Although it’s not a terrible problem if the keypress still registers without the key, it is quite difficult if a common key doesn’t work at all. Maybe there’s keys you keep hitting by mistake such as Caps Lock, or would just like a certain key to be in a more convenient location. Or, there might be a key on your keyboard you never seem to use or need.In all those situations, a simple solution would be to change the keyboard keys to do something else...or run a shortcut/hotkey...
-
Massive data breaches have become so common that we’ve gotten numb to reports detailing another hack or 0-day exploit. That doesn’t reduce the risk of such events happening, as the cat-and-mouse game between security experts and hackers continues. As some vulnerabilities get fixed, others pop up requiring attention from product and service providers. The newest one has a name that will not mean anything to most people. They call the hack Log4Shell in security briefings, which doesn’t sound very scary. But the new 0-day attack is so significant that some people see it as the worst internet hack in history.......
-
The US is starved for computer chips. In response, TI is building a new chip plant in Sherman, TX, and Samsung has announced a chip plant in Taylor, TX, which is a suburb of Austin. It will take a while to get the plants up and running, but it is a great sign of companies seeing that it is no longer profitable to rely on an Asian provider of products.
-
Cisco has updated its COVID-19 vaccination policy for US staff to make the jabs mandatory – even for those who work remotely. The new policy, a copy of which was obtained by The Register, requires "all US-based employees (including US Territories), regardless of whether you work remotely or in a Cisco facility, be fully vaccinated … or have an approved medical or religious accommodation, by December 8, 2021." Staff were informed of the policy in an email sent late last week. They have until November 5 to apply for medical or religious accommodations. Workers who don't qualify for those accommodations...
-
The great computer chip shortage of 2021 will likely get worse before it gets better. This conclusion was reached following brief study and anecdotal review. Moreover, while COVID lockdowns may have initially triggered the shortage, several decades of shortsighted decisions and simmering geopolitical tensions make it much more than a matter of fixing a few broken links in the supply chain. Here’s why… The world’s top two leading chip companies are Taiwan’s TSMC and South Korea’s Samsung Electronics. These two Asian firms, combined, control more than 70 percent of the semiconductor manufacturing market. The U.S., which was once a leader,...
-
KAUST researchers have found a way to significantly increase the speed of training. Large machine learning models can be trained significantly faster by observing how frequently zero results are produced in distributed machine learning that use large training datasets.AI models develop their “intelligence” by being trained on datasets that have been labelled to tell the model how to differentiate between different inputs and then respond accordingly. The more labelled data that goes in, the better the model becomes at performing whatever task it has been assigned to do. For complex deep learning applications, such as self-driving vehicles, this requires enormous...
-
The Dirty Ticking Time Bomb of Computing is About to Come Out!The Disk Manufacturers all know it. The Operating System producers have all known it. But for decades the Dirty Ticking Time Bomb of Computing is about to come out.It does not matter whether you are on a Laptop, Desktop, Smartphone or even a mainframe, the Ticking Time Bomb is on your system and you probably never knew it.It is under the heading of SPARES. Specifically when your drive runs out of them.And a couple of areas on your system disk. Sector 0. If sector 0 is bad, typically it's...
-
There is a lot of attention being paid to continuously updating servers to patch security vulnerabilities on Linux servers running in data centers – a basic step underpinning technology infrastructure in every industry. Yet, staff resources to deal with maintaining servers are not sufficient to meet the workload, said 55% of respondents in a worldwide survey by CloudLinux. Dealing with insufficient staff resources with automationThe survey finds 76% are deploying automated patching procedures and that live patching to fix vulnerabilities is commonly used (47%) to avoid downtime that is normally associated with patching. This is not surprising given the volume...
-
There are hundreds of Linux distributions. Some are for general purpose usage, while some are specifically tailored for education, robotics, hacking, gaming and what not.You’ll notice that most of them originate from Debian/Ubuntu, Arch and Red Hat/Fedora. If you like distrohopping and experiment with a range of distributions, you may soon get ‘bored’ out of it. Most Linux distributions would feel too similar after a point and apart from a few visual changes here and there, you won’t get a different experience.Does that sound familiar? If yes, let me list some advanced, independent, Linux distributions to test your expertise.Advanced Linux...
-
Although Chinese laws forbid kids to play video games at night, minors have been using different tricks to bypass these restrictions. However, they probably won’t be able to do it anymore with the deployment of Tencent’s new facial recognition system. According to the Chinese website Sixth Tone, Tencent has officially launched its controversial facial recognition system on July 6. The initiative, which was previously dubbed “Midnight Patrol,” uses AI and big data to detect kids who try to bypass the restrictions. “We will conduct a face screening for accounts registered with real names and that have played for a certain...
-
I tried every trick known to me to speed up my Dell laptop, from defragmenting hard drive to updating drivers. Nothing helped.
-
Ten years ago, only premium cars contained 100 microprocessor-based electronic control units (ECUs) networked throughout the body of a car, executing 100 million lines of code or more. Today, high-end cars like the BMW 7-series with advanced technology like advanced driver-assist systems (ADAS) may contain 150 ECUs or more, while pick-up trucks like Ford’s F-150 top 150 million lines of code. Even low-end vehicles are quickly approaching 100 ECUs and 100 million of lines of code as more features that were once considered luxury options, such as adaptive cruise control and automatic emergency braking, are becoming standard. Additional safety features...
-
At least 60 members of Congress from both parties have been unable to access data for weeks in the latest ransomware attack to strike the United States. The target was iConstituent, a tech vendor that provides constituent outreach services to dozens of House offices, including a newsletter service that allows lawmakers to communicate with residents in their districts and a service to track constituent casework. It's the latest cyber attack after a series of hacks against the US executive branch and American companies have left many institutions feeling vulnerable and the Biden administration struggling to deal with the situation. The...
|
|
|