Idk how we fix it.
Simple. Don’t buy a TCL television. If you do have one, or any other brand of “smart” TV then for gods sake do NOT connect it to the internet.
Idk how we fix it.
Simple. Don’t buy a TCL television. If you do have one, or any other brand of “smart” TV then for gods sake do NOT connect it to the internet.
My employer uses WP Engine for a lot of varied content. I’m not directly involved with it, but it appears to be well designed for corporate use. We masquerade various WP sites behind different domains & paths on our site. For example, www.example.com/about/ is one WP environment, www.example.com/blog/ is another, and www.example.com/business/ is yet another. Only certain people in our organization can edit /about/ and /business/, but we hire external authors to provide content under /blog/ so they have access to that.
We also apparently have the ability to modify pages on a dev/test domain then migrate them to our production domain very easily. So changes can be tested & verified before going live.
All that being managed by WP Engine means we don’t have to worry about manually setting up WP, managing our users, making sure everything is properly backed up, etc.
So how would you use it to solve this problem? There still needs to be some sort of foolproof way of saying “person X is only 14 years old”.
There are actually tools that can unmask spoofed calls and show the true number that a call originates from. I’ve never used them personally, but I worked in computer telephony years ago so I have an understanding of how these tools work.
Caller ID was created so that a company like a bank that might have 100 or more telephone lines could program them so they always show up as “1-555-ACME-BANK” if they wanted to. So it’s trivial to set Caller ID to whatever you want.
But there’s another identification baked into calls that goes way back to the days when long distance calls were expensive and charged by the minute. The telephone companies needed to ensure the calling number was passed along from one phone carrier to another for billing purposes, and since it involved collecting money you can be sure it was accurate and unchangeable. This is called Automatic Number Identification (ANI).
Typically ANI is only passed between phone companies, or over high capacity phone circuits like T-1 lines, so it’s not sent to the person receiving the call. But there’s a feature available to most mobile phone plans that, combined with ANI, can provide for a way to do just that.
Depending on your mobile provider there’s likely a way to forward calls you explicitly ignore to another number. This only happens when you click to ignore/disconnect the call, and not let it time out and go to voicemail. When you sign up with one of these unmasking services then you set up your phone to forward these calls to their service. Then, if you get a spoofed call or even one where the caller id says unknown or unavailable, you click to ignore it. The call gets rerouted to the unmasking service, which has access to the ANI data. It reads the ANI number, replaces the Caller ID data with the ANI, then immediately routes the call back to you again. This time it will show you the number the call originated from and would be billed to.
Tesla Model Y owner here (never again, either). I hate the touchscreen, and also hate the way they’ve shoehorned functionality into the button/scroller controls on the steering wheel to try to address complaints.
When I first got the MY, the only way to control things like the wipers was through menus in the touchscreen. A software update introduced the ability to control them from the steering wheel controls, but even that “solution” sucks. You have to press & hold the control down while simultaneously scrolling it with your thumb. And most times you can’t scroll it from all the way off to all the way on in a single motion, so you press, scroll as much as you can, release & press again then scroll the rest of the way. A real PITA.
Exactly. I know somebody who died when a deer came through the windshield…
Wary why? I work remotely in IT and manage a ton of Linux systems with it. Because my company has a large number of remote employees they limit us to Windows or Macs only, and have pretty robust MDM, security, etc. installed on them. Since MacOS is built on top of a unix kernel it’s much more intuitive to manage other unix & linux systems with it.
Personally I haven’t used Windows really since before Windows 10 came out, and as the family tech support department I managed to switch my wife, parents, brother, and mother in-law all to Mac’s years ago as well.
When I was a junior dev back in the 90’s one of my primary tasks was to tackle customer bug reports. Basically grunt work. I doubt AI tools could do that kind of task very well, unless the bug was something like a buffer overflow. I would think it would be terrible when it involves business logic flow.
The problem is computer vision has a LONG way to go before it’s truly on par with human eyesight. Musk loves to crow how cameras are sufficient since we use our eyes to drive.
The thing is, eyes have special neural circuits that detect motion. They essentially filter out unnecessary information and send just the motion details to the brain. This prevents the brain from being overloaded with every detail the eye constantly sees.
And being overloaded with everything is exactly what computer vision currently does. It’s just a stream of images that the computer must analyze completely. So it’s working exactly opposite to how the eye & brain works.
I recall when I bought my first hybrid that the dealer said there were something like 15 different computers controlling things, from the ICE engine to the transmission to the charging of the battery, etc. They weren’t networked together.
I also once ran afoul of a software bug in the ECU of a Honda CR/V. That’s the embedded system that manages the whole operation of the engine - from fuel injection to timing to emissions etc. As they progress through model years they use different ECUs that require different software. Even though I work in IT, I wouldn’t feel comfortable trying to update it myself, given the different models, firmware revisions, etc. I was more than happy to take that car to a dealer to have them confirm my car had buggy software and to upgrade it to the right new version.
NHTSA are the ones who investigate safety issues and issue recall notices. Once they have done that then the manufacturer has very specific legal requirements to follow. Hiding data from them would eventually come to light, and that would be very bad. Look at the diesel emissions scandal for one example. Volkswagen payed billions in fines for that, and a dozen or so employees including the CEO have been indicted. A few have pled guilty and been sentenced to jail.
I’ve had software recalls for Toyotas and Hondas, both of which involved physical recall paperwork and required me to visit a dealer to install the new software.
Just because a software recall can be remedied over the air it doesn’t make it any less of a recall. As others have said, there’s a legal definition to a recall. They are issued by the NHTSA and require specific legal responses from the manufacturer.
And then when you have an emergency the response is along the lines of:
“Thank you for requesting to speak with a rider support agent. All agents are currently busy assisting other Waymo customers, but the next available agent will assist you as soon as possible. There are currently 32 other customers in front of you. Thank you for your patience.”
DigiCert recently was forced to invalidate something like 50,000 of their DNS-challenge based certs because of a bug in their system, and they gave companies like mine only 24 hours to renew them before invalidating the old ones…
My employer had an EV cert for years on our primary domain. The C-suites, etc. thought it was important. Then one of our engineers who focuses on SEO demonstrated how the EV cert slowed down page loads enough that search engines like Google might take notice. Apparently EV certs trigger an additional lookup by the browser to confirm the extended validity.
Once the powers-that-be understood that the EV cert wasn’t offering any additional usefulness, and might be impacting our SEO performance (however small) they had us get rid of it and use a good old OV cert instead.
Back in the 90’s before the days of Windows 3.0 I had to debug a memory manager written by a brilliant but somewhat odd guy. Among other thing I stumbled across:
If you have ssh open to the world then it’s better to disable root logins entirely and also disable passwords, relying on ssh keys instead.
Port 22 is the default SSH port and it receives a TON of malicious traffic any time it’s open to the whole internet. 20 years ago I saw a newly installed server with a weak root password get infected by an IP address in China less than an hour after being connected to the open internet.
With all the bots out there these days it would probably take a lot less time if we ran the same experiment again.
No, see, piracy is just you downloading movies for yourself. To be like OpenAI you need to download it, put it in a pretty package with a bow, then sell it over and over again. Only when it’s piracy for profit do you get to beg and plead for a pass.
I’ve not heard of that… Got any links to articles about it?