A heroic effort by the IT team from Maersk. But this just goes to show the huge impact that randomware can have on today’s businesses.
The world’s largest container shipping company —A.P. Møller-Maersk— said it recovered from the NotPetya ransomware incident by reinstalling over 4,000 servers, 45,000 PCs, and 2500 applications over the course of ten days in late June and early July 2017.
Source: Maersk Reinstalled 45,000 PCs and 4,000 Servers to Recover From NotPetya Attack
The dust has yet to settle on WebGL2 and we’re already looking at a replacement…
Apple is pushing for WebGPU, which is modelled after Metal, their graphics library for iOS and macOS.
Here’s another view about what’s wrong with WebGL/WebGL2.
Source: WebGPU demos
Whoever thought it’s a good idea to put 2 vastly different scenarios next to each other with similar looking text.
Around 8:05 a.m., the Hawaii emergency employee initiated the internal test, according to a timeline released by the state. From a drop-down menu on a computer program, he saw two options: “Test missile alert” and “Missile alert.” He was supposed to choose the former; as much of the world now knows, he chose the latter, an initiation of a real-life missile alert.
Source: Hawaii missile alert: How one employee ‘pushed the wrong button’ and caused a wave of panic
Unicorn as in the mythical creature, not what VC’s think about.
Like every sentence that has the word “just”, this is at best horribly simplistic but mostly plain wrong. Let’s dive in more detail into this. If you look up simple Makefiles on the Internet, you might find something like this page. It starts with a very simple (but useless) Makefile and eventually improves it to this:
Source: Nibble Stew – a gathering of development thoughts: “A simple makefile” is a unicorn
At the current stage it could help front-end developers in some of the grunt work in converting design templates into code. Some would go further to think that it will eliminate web development jobs. That is certainly not the case, as modern websites are not static “pages” but more like applications. Someone will still need to design the behaviour and logic.
In this post, we’ll teach a neural network how to code a basic a HTML and CSS website based on a picture of a design mockup. Here’s a quick overview of the process:
Turning Design Mockups Into Code With Deep Learning
Either terrible security practices or malicious intent. Some security research firm found serious backdoor in a range of Western Digital MyCloud devices aimed at personal home or office users.
Several serious security issues were uncovered during my research. Vulnerabilities such as pre auth remote root code execution, as well as a hardcoded backdoor admin account which can NOT be changed. The backdoor also allows for pre auth remote root code execution on the affected device.
— WDMyCloud Multiple Vulnerabilities
Another huge blow for Intel. The critical flaws in Intel processors allow attackers to gain access to the entire memory space, meaning it could read in-memory contents of running apps like password managers, browsers etc.
Most Intel processors and some ARM chips are confirmed to be vulnerable, putting billions of devices at risk of attacks. One of the security researchers said the bugs are “going to haunt us for years.”
Source: Critical flaws revealed to affect most Intel chips since 1995 | ZDNet