136 private links
Die Stadt Siegen hat zwei Mitarbeiter abgestellt, die vor dem Haupteingang der Verwaltung stehen und die Besucher darauf hinweisen, dass das Rathaus bis auf Weiteres geschlossen ist.
Aufgrund eines Cyberangriffs auf den kommunalen IT-Dienstleister Südwestfalen-IT (SIT) sind die Kreisverwaltung Siegen-Wittgenstein ebenso wie die kommunalen Verwaltung bis auf Weiteres weitgehend außer Gefecht gesetzt. Die SIT hat in der Nacht zu Montag, 30. Oktober, alle Systeme zunächst heruntergefahren, um den Schaden zu begrenzen und überhaupt das Ausmaß des Angriffs zu ermitteln. Insgesamt betreut die SIT 73 Kunden, darunter alle Kommunen in Siegen-Wittgenstein – alle Rathäuser sind offline, die Dienstleistungen für die Bevölkerung stark eingeschränkt.
It struck me to put this together when I saw how close in size the 7" touchscreen, battery cells, and crkbd folded vertically that I had sitting on my desk were. And I I needed a build that was actually functional for normal computer stuff, so this seemed like a good idea.
It turns out that this is a pretty functional setup. The 7" display is okay as long as I fullscreen stuff. Alt+F11 works with a lot of stuff so far. I've been able to use onshape cad in firefox. It's a little slow, but works as long as firefox doesn't have issues with gfx acceleration. Console stuff and web browsing are great!
Ein Hackerangriff auf den kommunalen I-Dienstleister Südwestfalen-IT (SIT) hat weitreichende Folgen. Alle Verwaltungen in den Kreisen Olpe, Siegen-Wittgenstein, Hochsauerland, Soest und dem Märkischen Kreis sind seit Montagmorgen, 30. Oktober, nicht erreichbar. Betroffen sind der E-Mail-Verkehr und die kommunalen Webseiten sowie in den meisten Fällen die Telefonanlagen der Verwaltungen. Wie lange die Störung dauert, ist derzeit noch nicht absehbar.
So, there you have it. The interiors of our homes, coffee shops and restaurants all look the same. The buildings where we live and work all look the same. The cars we drive, their colours and their logos all look the same. The way we look and the way we dress all looks the same. Our movies, books and video games all look the same. And the brands we buy, their adverts, identities and taglines all look the same.
But it doesn’t end there. In the age of average, homogeneity can be found in an almost indefinite number of domains.
Mainframe computers are often seen as ancient machines—practically dinosaurs. But mainframes, which are purpose-built to process enormous amounts of data, are still extremely relevant today. If they’re dinosaurs, they’re T-Rexes, and desktops and server computers are puny mammals to be trodden underfoot.
It’s estimated that there are 10,000 mainframes in use today. They’re used almost exclusively by the largest companies in the world, including two-thirds of Fortune 500 companies, 45 of the world’s top 50 banks, eight of the top 10 insurers, seven of the top 10 global retailers, and eight of the top 10 telecommunications companies. And most of those mainframes come from IBM.
In this explainer, we’ll look at the IBM mainframe computer—what it is, how it works, and why it’s still going strong after over 50 years.
Wie teuer ist “ein Admin-Team”? So teuer wie Deine AWS Rechnung hoch wäre, und die ist in den meisten Läden dreimal bis fünfmal höher als ursprünglich gedacht. Das ist das Ausmaß des Understaffing in Operations in den meisten Firmen.
Accenture (vormals ARZ - Allgemeines Rechenzentrum, siehe https://newsroom.accenture.de/de/subjects/%C3%B6sterreich/accenture-vereinbart-uebernahme-des-arz.htm ), nach eigenen Angaben "führend in Digitalisierung, Cloud und Security" und quasi in jedem österreichischen Ministerium präsent, hat offensichtlich eine Abneigung gegen Elliptice Curve Cryptography.
A is for awk, which runs like a snail, and
B is for biff, which reads all your mail.
C is for cc, as hackers recall, while
D is for dd, the command that does all.
E is for emacs, which rebinds your keys, and
F is for fsck, which rebuilds your trees.
G is for grep, a clever detective, while
H is for halt, which may seem defective.
I is for indent, which rarely amuses, and
J is for join, which nobody uses.
K is for kill, which makes you the boss, while
L is for lex, which is missing from DOS.
M is for more, from which less was begot, and
N is for nice, which it really is not.
O is for od, which prints out things nice, while
P is for passwd, which reads in strings twice.
Q is for quota, a Berkeley-type fable, and
R is for ranlib, for sorting a table.
S is for spell, which attempts to belittle, while
T is for true, which does very little.
U is for uniq, which is used after sort, and
V is for vi, which is hard to abort.
W is for whoami, which tells you your name, while
X is, well, X, of dubious fame.
Y is for yes, which makes an impression, and
Z is for zcat, which handles compression.
Authorized transcript of Bruce Sterling’s lecture during the TU Eindhoven conference AI for All, From the Dark Side to the Light, November 25, 2022, at Evoluon, Eindhoven, co-organized by Next Nature.
YouTube link of the talk: https://www.youtube.com/watch?v=UB461avEKnQ&t=3325s
In Alan Turing’s Computing Machinery and Intelligence, deception is placed at the centre of the test to determine a machine’s capacity to exhibit intelligent behaviour.
...
And even tho deception was never the main objective, creating the illusion of intelligence rather than intelligence itself became the force driving sentient-like technologies like AI.
I've been aware of the Bechdel Test since the late 1990s and actively using it as part of my unconscious checklist for how to write a novel that doesn't suck in some way, but even keeping it in mind, I sometimes fail. And I think it's worth looking at where and why that happens.
So I decided to compile this score card for my books. (SF novels first, then Merchant Princes and Laundry Files.)
The US, China, and the EU are exporting their domestic regulatory models in an effort to expand their respective spheres of influence, pulling other countries into the orbits of the American, Chinese, or European digital empires. The US’ global influence today manifests through the dominance of its tech companies that exercise private power across the global digital sphere. China’s global influence can be traced to its infrastructure power, where Chinese firms—all with close ties to the Chinese state—are building critical digital network infrastructures in countries near and far. The EU exercises global influence primarily through regulatory power that entrenches European digital norms across the global marketplace.
Fringe Science Warning Signs
“Money in the Bank,” a new story by John Kessel and Bruce Sterling
Researchers at Google say they used existing noise-canceling headphones to get pulse readings by updating their software
Chile was building an analog of our modern internet way back in the 1970s. A massive, national communications network for business and government to coordinate efficiently. The engineer (Stafford Beer) who designed it was from Surrey, in the UK, and worked for the Allende goverment that was building this system.
After the 1973 coup, General Pinochet had the system destroyed.
Had it caught on, we might have had global internet in our homes in the 1970s.
The relation between expert communities and society at large does not take place in a vacuum, but in a field marred by vested interest. For if policies change, this creates winners and losers—and potential losers have an interest in the status quo remaining in place. One strategy they can choose is to accept the facts and openly fight for their interests. But often, these potential losers choose another strategy: undermine the public dissemination of the facts that would suggest that change is needed.
How can we reset the expectations we have of connected devices, so that they are again worthy of our trust and money? Before we can bring the promise back, we must deweaponize the technology.
Guidelines for the hardware producer
These are things we want consumers to expect and demand of manufacturers.
- Control
*Think local - Decouple
- Open interfaces
- Be a good citizen
LibreOffice-Anwender:innen wähnen sich hier oft auf der sicheren Seite und ändern, wie vermutlich auch viele MS Office Anwender:innen, nichts an ihrer Konfiguration. Das BSI hat aber auch für LibreOffice Richtlinien entwickelt bzw. entwickeln lassen:
- Sichere Konfiguration von LibreOffice: Empfehlungen für Unternehmen mit einer verwalteten Umgebung
- Sichere Konfiguration von LibreOffice – Empfehlungen für kleinere Unternehmen, Privatanwender und Privatanwenderinnen
Auf der Seite LibreOffice – Aber sicher! sind die Empfehlungen in Form einer LibreOffice XCD-Datei als Service zum Download verfügbar. Die enthaltenen Direktiven wirken vergleichbar zu Gruppenrichtlinien bei Microsoft Office und sichern LibreOffice entsprechend dem Leitfaden. Die Datei herunterladen und im Installationsverzeichnis von LibreOffice in den Pfad share/registry/res ablegen. Wenn man danach LibreOffice startet wird diese Vorkonfiguration automatisch angewandt. Damit lassen sich komplette LibreOffice-Deployments für viele viele Workstations sichern ohne die Anwender:innen das alles selbst machen zu lassen.