ashar

joined 2 years ago
MODERATOR OF
[–] [email protected] 11 points 4 months ago (5 children)

The bombs are quite small, and it is drug dealing gang vs gang, which is why mostly normal people are not affected and don't really care. It makes for sensational news reports though so the xenophobes get wound up.

[–] [email protected] 2 points 5 months ago

Also 90 hostages were released by the Israelis

[–] [email protected] 8 points 5 months ago
[–] [email protected] 12 points 5 months ago

Attacking medical facilities and staff is a war crime, people.

[–] [email protected] 5 points 5 months ago

Who attacked?

[–] [email protected] 22 points 6 months ago
[–] [email protected] 11 points 6 months ago (1 children)

Reminder that attacking hospitals and people in hospitals is a war crime under the Geneva Conventions.

[–] [email protected] 5 points 6 months ago

Poverty increases to 50% is not good if you are the poor, but it is really good for some especially the target market for the article.

[–] [email protected] 27 points 6 months ago (1 children)

Israel occupies more territory as a buffer zone for its 50 year old buffer zone.

[–] [email protected] 1 points 6 months ago

I would suspect that very few Hamas fighters will have committed war crimes. Most of them only fight the IDF in Gaza.

[–] [email protected] 1 points 6 months ago (2 children)

Your premise that anyone suspected of being associated with Hamas should be killed is against the Geneva conventions. You are supporting war crimes.

[–] [email protected] 2 points 6 months ago (4 children)

A trail does review evidence whereas here we just had a summary execution.

Your link to them UN press release says this:

"OIOS was not able to independently authenticate information used by Israel to support the allegations."

 

An analysis of the MoH methodology, the exacerbating challenges it faces as the war continues, and estimates from independent researchers and humanitarian organisations.

https://dataactivists.org/estimating_death_toll_of_war_on_gaza/

4
submitted 8 months ago* (last edited 8 months ago) by [email protected] to c/[email protected]
 

Schedule

Live Stream Track 1

The Track 2 audio is difficult to understand and the video shows the presentation very badly. Live Stream Track 2

Live Stream Track 3

 

This lecture given onsite at MIT Lincoln Laboratory on 25 April 1985 coveres many salient points still relevent today.

Rear Admiral Grace Hopper's famous MIT Lecture

Grace Brewster Hopper (née Murray; December 9, 1906 – January 1, 1992) was an American computer scientist, mathematician, and United States Navy rear admiral.[1] She was a pioneer of computer programming. Hopper was the first to devise the theory of machine-independent programming languages, and used this theory to develop the FLOW-MATIC programming language and COBOL, an early high-level programming language still in use today. She was also one of the first programmers on the Harvard Mark I computer. She is credited with writing the first computer manual, "A Manual of Operation for the Automatic Sequence Controlled Calculator."

Before joining the Navy, Hopper earned a Ph.D. in both mathematics and mathematical physics from Yale University and was a professor of mathematics at Vassar College. She left her position at Vassar to join the United States Navy Reserve during World War II. Hopper began her computing career in 1944 as a member of the Harvard Mark I team, led by Howard H. Aiken. In 1949, she joined the Eckert–Mauchly Computer Corporation and was part of the team that developed the UNIVAC I computer. At Eckert–Mauchly she managed the development of one of the first COBOL compilers.

1
HOU.SEC.CON. 2024 (www.houstonseccon.com)
3
submitted 8 months ago* (last edited 8 months ago) by [email protected] to c/[email protected]
 

Podcast

Why Aren't More Defenders Winning? Defender’s Advantage and How to Gain it!

Guest: Dan Nutting, Manager - Cyber Defense, Google Cloud

Topics:

What is the Defender’s Advantage and why did Mandiant decide to put this out there?

This is the second edition. What is different about DA-II?

Why do so few defenders actually realize their Defender’s Advantage?

The book talks about the importance of being "intelligence-led" in cyber defense. Can you elaborate on what this means and how organizations can practically implement this approach?

Detection engineering is presented as a continuous cycle of adaptation. How can organizations ensure their detection capabilities remain effective and avoid fatigue in their SOC?

Many organizations don’t seem to want to make detections at all, what do we tell them?

What is this thing called “Mission Control”- it sounds really cool, can you explain it?

Resources:

Defender’s Advantage book

The Defender's Advantage: Using Artificial Intelligence in Cyber Defense supplemental paper

3
submitted 9 months ago* (last edited 9 months ago) by [email protected] to c/[email protected]
 

Podcast

Transcript

Join G. Mark Hardy in Torremolinos, Spain, for a deep dive into the security of Generative AI. This episode of CISO Tradecraft explores the basics of generative AI, including large language models like ChatGPT, and discusses the key risks and mitigation strategies for securing AI tools in the workplace. G. Mark provides real-world examples, insights into the industry's major players, and practical steps for CISOs to balance innovation with security. Discover how to protect sensitive data, manage AI-driven hallucinations, and ensure compliance through effective governance and ethical guidelines. Plus, get a glimpse into the future of AI vulnerabilities and solutions in the ever-evolving tech landsc

view more: ‹ prev next ›