ashar

joined 1 year ago
MODERATOR OF
 

This lecture given onsite at MIT Lincoln Laboratory on 25 April 1985 coveres many salient points still relevent today.

Rear Admiral Grace Hopper's famous MIT Lecture

Grace Brewster Hopper (née Murray; December 9, 1906 – January 1, 1992) was an American computer scientist, mathematician, and United States Navy rear admiral.[1] She was a pioneer of computer programming. Hopper was the first to devise the theory of machine-independent programming languages, and used this theory to develop the FLOW-MATIC programming language and COBOL, an early high-level programming language still in use today. She was also one of the first programmers on the Harvard Mark I computer. She is credited with writing the first computer manual, "A Manual of Operation for the Automatic Sequence Controlled Calculator."

Before joining the Navy, Hopper earned a Ph.D. in both mathematics and mathematical physics from Yale University and was a professor of mathematics at Vassar College. She left her position at Vassar to join the United States Navy Reserve during World War II. Hopper began her computing career in 1944 as a member of the Harvard Mark I team, led by Howard H. Aiken. In 1949, she joined the Eckert–Mauchly Computer Corporation and was part of the team that developed the UNIVAC I computer. At Eckert–Mauchly she managed the development of one of the first COBOL compilers.

1
HOU.SEC.CON. 2024 (www.houstonseccon.com)
3
submitted 1 month ago* (last edited 1 month ago) by [email protected] to c/[email protected]
 

Podcast

Why Aren't More Defenders Winning? Defender’s Advantage and How to Gain it!

Guest: Dan Nutting, Manager - Cyber Defense, Google Cloud

Topics:

What is the Defender’s Advantage and why did Mandiant decide to put this out there?

This is the second edition. What is different about DA-II?

Why do so few defenders actually realize their Defender’s Advantage?

The book talks about the importance of being "intelligence-led" in cyber defense. Can you elaborate on what this means and how organizations can practically implement this approach?

Detection engineering is presented as a continuous cycle of adaptation. How can organizations ensure their detection capabilities remain effective and avoid fatigue in their SOC?

Many organizations don’t seem to want to make detections at all, what do we tell them?

What is this thing called “Mission Control”- it sounds really cool, can you explain it?

Resources:

Defender’s Advantage book

The Defender's Advantage: Using Artificial Intelligence in Cyber Defense supplemental paper

 

Podcast

Transcript

Join G. Mark Hardy in Torremolinos, Spain, for a deep dive into the security of Generative AI. This episode of CISO Tradecraft explores the basics of generative AI, including large language models like ChatGPT, and discusses the key risks and mitigation strategies for securing AI tools in the workplace. G. Mark provides real-world examples, insights into the industry's major players, and practical steps for CISOs to balance innovation with security. Discover how to protect sensitive data, manage AI-driven hallucinations, and ensure compliance through effective governance and ethical guidelines. Plus, get a glimpse into the future of AI vulnerabilities and solutions in the ever-evolving tech landsc

[–] [email protected] 51 points 1 month ago (1 children)

Sending out IEDs that will probably explode in a supermarket and kill civilians is generally considered a war crime. So far 2 kids killed in Beirut by the Israeli bombs in devices.

[–] [email protected] 1 points 2 months ago

No, that is what the Americans want you to think. It is actually just simple recursion.

[–] [email protected] 6 points 2 months ago (2 children)

If this really was that useful, they wouldn't be telling us

That is what they want you to think

5
SEC-T 2024 (infosec.pub)
submitted 2 months ago* (last edited 2 months ago) by [email protected] to c/[email protected]
[–] [email protected] 1 points 2 months ago

Tell us about the reporting restrictions placed on this story

[–] [email protected] 2 points 2 months ago (2 children)

Reminder that the main Houthi demand is for an end to the genocide in Palestine

[–] [email protected] 10 points 2 months ago

Apartheid country going to apartheid

[–] [email protected] 16 points 2 months ago (1 children)

Well the BBC headlines are getting better. Previously it would have been ‘IDF says suspected terrorists dead’.

[–] [email protected] 4 points 2 months ago

My first computer was the zx spectrum with 256k RAM

2
submitted 2 months ago* (last edited 2 months ago) by [email protected] to c/[email protected]
[–] [email protected] 2 points 2 months ago

You guys still have checks?

 

Free and Open Source Software Conference.

Free Software and Open Source - these are the topics of FrOSCon (Free and Open Source Software Conference). Every year in August the computer science department of the University of Applied Sciences Bonn-Rhein-Sieg, supported by FrOSCon e.V., will organize an exciting program with talks and workshops for visitors of all ages

Schedule

Videos

[–] [email protected] 6 points 2 months ago

30 licenses suspended. 320 more to go.

[–] [email protected] 2 points 2 months ago

Which is why the headlined talk lasted 25 seconds. The rest of the time was taken up with training effectiveness and historical context.

[–] [email protected] 32 points 2 months ago (4 children)

The only news media I saw today to name Israel as the perpetrators of the shooting.

view more: ‹ prev next ›