Comment The Apple way of doing things (Score 2) 203
Microsoft has adopted the Apple way of forcing users to do things a certain way, just like Apple has been doing for years. I'm ready to switch as many systems as I can to Linux.
Microsoft has adopted the Apple way of forcing users to do things a certain way, just like Apple has been doing for years. I'm ready to switch as many systems as I can to Linux.
I'm just glad the Firefox engine is getting some renewed love from a new project. Google is a messed up company (like too many greedy companies, but has gone unchecked for way too long). Why would you want to let them track you by using their browser?
... (remind you of anything?)
What can a quantum computing system running AGI do... I think the sky is the limit.
The Skynet's the limit?
I'm not sure what the current buzz means, but as the professor of my A.I. computer science class explained: "Weak AI refers to having computers do things in novel ways that haven't been done before. Strong AI is the pursuit of the creation of Lt. Cmdr. Data." I guess currently we're seeing a mixing of these two pursuits.
Wouldn't this only break encryption in transit using the RSA algorithm? Most encryption at rest uses AES or something similar, which it's currently uncertain whether a quantum computer could break (but generally assumed that it could). Also, other encryption in transit methods aren't affected yet either.
The fact that AWS has a system in place to get huge amounts of data into AWS quickly (ie aws snowball/snowmobile, etc), but doesn't have a system to get huge amounts of data out quickly besides the usual network stuff--which is I think what all other providers have--doesn't mean they're restricting getting data out. It just means they've made it easy to get data in.
During CoVID, my company allowed most technology employees to switch to permanent remote work. I opted for this, as did many others.
"buy an Android phone"
So, does that mean 2^5 (32x) or 10^5 (100000x)?
So, if you have two encrypted numbers, a and b, with homomorphic encryption, you can do operations on them like a + b = c. You still don't know what a, b or c is but you can pass c back to the person who has the encryption key and they can read it.
This doesn't sound like a new protocol. It sounds like something anyone who knows how to use a proxy can do themselves.
True... But this data is not usually used by managers to track employee's performance; that data would usually be used by security teams instead--although it can be used in various investigations after the fact. Using this type of data to measure and manage employee productivity usually ends in disaster: the wrong employees are pinned as the under-productive employees, employees find other ways to fake productivity while decreasing productivity, managers turn into micro-managers and hurt employee moral, etc.
* (Although there are a variety of tools security teams use, I don't think keyloggers are common)
The amount of time between slipping on the peel and landing on the pavement is precisely 1 bananosecond.