Jack Corrigan
It’s one of the many programs the agency will fund under its $2 billion next-generation artificial intelligence initiative. from galigio_blog’s favorite articles on Inoreader https://ift.tt/2D7EfKM
selected by Galigio
Jack Corrigan
It’s one of the many programs the agency will fund under its $2 billion next-generation artificial intelligence initiative. from galigio_blog’s favorite articles on Inoreader https://ift.tt/2D7EfKM
selected by Galigio
Tiny Tilos, in the Dodecanese, is a pioneering nature reserve. Now, Greece’s ‘green island’ is set to be powered by renewable energy Tiny Tilos, in the Dodecanese, is a pioneering nature reserve. Now, Greece’s ‘green island’ is set to be powered by renewable energy
Selected by Galigio via Computer Borders
An Indian teenager has won an international competition to build a functioning satellite, and not only has he produced what is reportedly the world’s lightest satellite device – NASA has also agreed to launch it next month.
The tiny satellite weighs just 64 grams (0.14 lb), and will embark on a 4-hour sub-orbital mission launched from NASA’s Wallops Flight Facility in Virginia on June 21. Once positioned in microgravity, its main objective will be to test the durability of its extremely light, 3D-printed casing.
from https://is.gd/beA6TK
Selected by Galigio via Computer Borders
Rupert Murdoch is hoping that Google‘s pain might be his gain.
Murdoch’s News Corp. is introducing a service that it says can ensure online ads don’t appear next to fake news or offensive videos, marking the latest salvo in the billionaire media mogul’s long battle with the world’s biggest search engine.
from https://is.gd/6BbXP9
Selected by Galigio via Computer Borders
The Portland (Maine) Press Herald is not the first local news organization to do a big project on the heroin epidemic. Last year, the Palm Beach Post documented more than 200 deaths in 2015. The Cincinnati Enquirer has a reporter dedicated to covering the heroin epidemic.
from https://is.gd/2bfRng
Selected by Galigio via Computer Borders
About six months ago, we bought a drone to help us cover stories at the Yakima Herald-Republic, a daily newspaper in Yakima, Washington. We’d seen other people’s drone footage of fires and floods and protests, and wanted to get our own.
from https://is.gd/9kRIN2
Selected by Galigio via Computer Borders
photo credit: Seth_Wilson Study via photopin (license) I came across this article: http://nybookeditors.com/2016/02/instantly-improve-your-writing-with-these-11-editing-tools/ Any tool which boosts my scrabbly prose is worth having. Not the least in that some of these tools are free. I’m going to test out each of the free ones (because I am a cheapskate). You can review how you feel […]
via Using Online Tools to Improve Your Writing — The Procrastination Pen
We live in the age of fake news — both the really fake news that’s simply fake and the kind of news that some people like to call “fake” only because they don’t like hard facts.
from https://is.gd/MkwaS0
Selected by Galigio via Computer Borders
The basic format of political fact-checking is identical the world over: Start from a widely circulated claim by a public figure, then rate the truthfulness of its objectively verifiable components.
from https://is.gd/uzF7oW
Selected by Galigio via Computer Borders
If you use TAILS you are certainly interested to better know HEADS because Heads isn’t simply another Linux distribution, it merges physical hardening of particular hardware platforms and flash protection attributes with a Linux boot loader in ROM as well as custom Coreboot firmware.
The key factor in Heads is represented by its steady monitoring of the boot process that allows detecting if the firmware has been changed by malware.
If this first check certifies that all is unchanged, heads uses the TPM as a hardware key to decrypt the hard disk.
The certified integrity checking of the root filesystem is really effective against exploits but it doesn’t secure the system against each possible attack but it is able to effectively divert many types of attacks against the boot process and physical equipment that have usually been ignored in conventional setups, hopefully increasing the issue beyond what most attackers are willing to spend.