Menu

Blog

Archive for the ‘internet’ category: Page 94

Nov 15, 2022

SpaceX buys large Twitter ad campaign for Starlink as advertisers pause spending after Elon Musk’s takeover, report says

Posted by in categories: Elon Musk, internet

Nov 14, 2022

Elon Musk’s Starlink buys ad time on Elon Musk’s Twitter

Posted by in categories: Elon Musk, internet, space

The employees past and present are calling it a Twitter “takeover.”

Elon Musk, in a move to wrap himself up in a blanket of his own financing, has bought ad space on Twitter. SpaceX bought the ads for Starlink, and they will play on top of the Twitter platform’s feed for one day in Spain and Australia.

In a tweet in reply to another Twitter account Musk said of the deal, “SpaceX Starlink bought a tiny — not large — ad package to test effectiveness of Twitter advertising in Australia & Spain. Did same for FB/Insta/Google,”

Continue reading “Elon Musk’s Starlink buys ad time on Elon Musk’s Twitter” »

Nov 12, 2022

Imgur: Imgur: The magic of the Internet

Posted by in category: internet

The magic of the Internet.

Nov 12, 2022

After Attacking Medical Center, Hackers Leak Patients’ Abortion Details on the Dark Web

Posted by in categories: biotech/medical, internet

In a disgusting move, cybercriminals published the personal medical details of individual patients to the internet this week.

Nov 10, 2022

Welcome! You are invited to join a webinar: Winning partnerships — Key to 5G Monetization: Evolving Ecosystems to the Metaverse. After registering, you will receive a confirmation email about joining the webinar

Posted by in categories: business, internet, robotics/AI

Successfully navigating the 5G transformation requires automation every step of the way—from network planning and preparation through implementation and monetization. 5G has made the consumers more empowered and demanding and this creates a need for CSPs to monetize beyond data bundles and introduce indirect monetization mechanisms. What CSPs must now do is look at investing in platforms that enable them to monetize innovative 5G business models.

CSPs have a huge opportunity to create new complex products and solutions for the B2B2C market assembled with the help of multiple partners. But this isn’t just a one-way opportunity. The biggest benefit of this model is the CSPs’ ability to participate in value chains and ecosystems that are orchestrated jointly with partners. CSPs will increasingly use partners to extend owned capabilities across product cocreation, marketing, sales, delivery, and customer support.

Moreover, CSPs need to evolve towards becoming service enablers and partner with businesses, developers, and other players across different domains and industries in order to create unique 5G service offerings to differentiate themselves in the market. To find success in the 5G era, they will need to maintain an ecosystem of partners that allow them to innovate and expand its reach across industry verticals. This will result in automated processes, the ability to launch any partner model, reduced time to market and reduced operational costs.

Nov 9, 2022

Alibaba Cloud Launches ModelScope Platform and New Solutions to Lower the Threshold for Materializing Business Innovation

Posted by in categories: business, computing, internet

Staying ahead of the emerging trend of serverless software development, Alibaba Cloud is making its key cloud products serverless to enable customers to concentrate on product deployment and development without worrying about managing servers and infrastructure. Essentially, Alibaba Cloud’s updated products focus on turning computing power into an on-demand capability for users.

Examples of these are the cloud native database PolarDB, the cloud-native data warehouse AnalyticDB (ADB) and ApsaraDB for Relational Database Service (RDS). Leveraging Alibaba Cloud’s serverless technologies, customers can enjoy automatic scaling with extreme elasticity based on actual workloads and a pay-as-you-go billing model to reduce costs. The automatic elastic scaling time on demands can be as little as one second. The use of updated database products can help businesses in the internet industry reduce their costs by 50%, on average, compared to using traditional ones. Currently, Alibaba Cloud has more than 20 serverless key products in total and is adding more product categories to become serverless.

Alibaba Cloud also upgraded its ODPS (Open Data Platform and Services), a self-developed integrated data analytics and intelligent computing platform, to provide companies with diversified data processing and analytics services. The platform can handle both online and offline data simultaneously in one system, providing businesses dealing with complex workloads with analytics for business decision-making with reduced cost and increased efficiency.

Nov 9, 2022

No, The James Webb Space Telescope Did Not Disprove the Big Bang (Eric Lerner is Delusional)

Posted by in categories: cosmology, internet

Something strange has been happening lately. Lots of people are under the impression that images from the James Webb Space Telescope have somehow proven big bang cosmology wrong. This is very stupid and objectively wrong, but it has caused a confusion among even pro-science people, who have been asking me if there is any legitimacy to such claims. I decided a brief debunk was in order, to shine a spotlight on the fraud behind this frenzy, briefly explain why such a claim is so ridiculous, and link to other resources for further information. Enjoy!

Lerner’s dumb article: https://iai.tv/articles/the-big-bang-didnt-happen-auid-2215
Astrophysicist Ethan Siegel explains how Lerner is a crackpot: https://bigthink.com/starts-with-a-bang/has-jwst-disproven-big-bang/
Cosmologist Brian Keating debunks Lerner: https://www.youtube.com/watch?v=iPna7WUODuo.
Astronomer Ned Wright debunks Lerner: https://www.astro.ucla.edu/~wright/lerner_errors.html.
Real scientists use an entire appendix to debunk Lerner’s mistakes: https://iopscience.iop.org/article/10.1086/529134/pdf.

Continue reading “No, The James Webb Space Telescope Did Not Disprove the Big Bang (Eric Lerner is Delusional)” »

Nov 9, 2022

From ‘Chief Twit’ to ‘Twitter Complaint Hotline Operator’

Posted by in categories: big data, computing, Elon Musk, evolution, futurism, innovation, internet, machine learning, Mark Zuckerberg, robotics/AI
Photograph: Shutterstock

Elon Musk doesn’t follow the same standards that most entrepreneurs do. He’s different, he likes to be different!

And when you’re different, and you’re not afraid to be, it’s okay to test a cigar (or should I say ‘joint’?) of tobacco mixed with marijuana, on Joe Rogan’s famous podcast. But if you look closely, Elon was just nice (polite) and followed Rogan’s elaborate script. Before trying it, Musk even asked him if it was legal.

Then all those facial expressions of Musk, which photojournalists love to catch, go viral as if he’s there promoting some soft drug or passing abroad that his office at Tesla (or SpaceX) is enveloped in a large cloud of smoke.

Quite the opposite. The expressions themselves spoke for themselves, as if to say, “This is nothing special, Joe. Why do you waste my time with these scenes”? Musk even claimed that weed is not good for productivity at all, but it has nothing against (as I do, by the way).

Continue reading “From ‘Chief Twit’ to ‘Twitter Complaint Hotline Operator’” »

Nov 8, 2022

Digital Doubles and Second Selves

Posted by in categories: augmented reality, automation, big data, computing, cyborgs, evolution, futurism, information science, innovation, internet, life extension, machine learning, neuroscience, posthumanism, robotics/AI, singularity, software, supercomputing

This time I come to talk about a new concept in this Age of Artificial Intelligence and the already insipid world of Social Networks. Initially, quite a few years ago, I named it “Counterpart” (long before the TV series “Counterpart” and “Black Mirror”, or even the movie “Transcendence”).

It was the essence of the ETER9 Project that was taking shape in my head.

Over the years and also with the evolution of technologies — and of the human being himself —, the concept “Counterpart” has been getting better and, with each passing day, it makes more sense!

Imagine a purely digital receptacle with the basics inside, like that Intermediate Software (BIOS(1)) that computers have between the Hardware and the Operating System. That receptacle waits for you. One way or another, it waits patiently for you, as if waiting for a Soul to come alive in the ether of digital existence.

Continue reading “Digital Doubles and Second Selves” »

Nov 7, 2022

Quantum Cryptography Is Unbreakable. So Is Human Ingenuity

Posted by in categories: business, computing, encryption, government, internet, mathematics, privacy, quantum physics, security


face_with_colon_three circa 2016.


Two basic types of encryption schemes are used on the internet today. One, known as symmetric-key cryptography, follows the same pattern that people have been using to send secret messages for thousands of years. If Alice wants to send Bob a secret message, they start by getting together somewhere they can’t be overheard and agree on a secret key; later, when they are separated, they can use this key to send messages that Eve the eavesdropper can’t understand even if she overhears them. This is the sort of encryption used when you set up an online account with your neighborhood bank; you and your bank already know private information about each other, and use that information to set up a secret password to protect your messages.

The second scheme is called public-key cryptography, and it was invented only in the 1970s. As the name suggests, these are systems where Alice and Bob agree on their key, or part of it, by exchanging only public information. This is incredibly useful in modern electronic commerce: if you want to send your credit card number safely over the internet to Amazon, for instance, you don’t want to have to drive to their headquarters to have a secret meeting first. Public-key systems rely on the fact that some mathematical processes seem to be easy to do, but difficult to undo. For example, for Alice to take two large whole numbers and multiply them is relatively easy; for Eve to take the result and recover the original numbers seems much harder.

Public-key cryptography was invented by researchers at the Government Communications Headquarters (GCHQ) — the British equivalent (more or less) of the US National Security Agency (NSA) — who wanted to protect communications between a large number of people in a security organization. Their work was classified, and the British government neither used it nor allowed it to be released to the public. The idea of electronic commerce apparently never occurred to them. A few years later, academic researchers at Stanford and MIT rediscovered public-key systems. This time they were thinking about the benefits that widespread cryptography could bring to everyday people, not least the ability to do business over computers.

Continue reading “Quantum Cryptography Is Unbreakable. So Is Human Ingenuity” »

Page 94 of 322First9192939495969798Last