Process of producing genetically identical individuals of an organism
POPULARITY
Dans cet épisode, 4 actualités sont décodées. La première concerne OpenAI, la start-up a dévoilé un nouvel outil d'intelligence artificielle, capable d'imiter n'importe quelle voix grâce à un simple enregistrement de 15 secondes, laissant entrevoir d'immenses risques de désinformation. La deuxième actualité porte sur Meta, le groupe va supprimer son logiciel CrowdTangle en août, outil pourtant central dans la lutte contre la désinformation. Sans oublier : AWS va investir 150 milliards de dollars dans des data centers, et les bénéfices de Shein explosent avant une potentielle entrée en Bourse.Les épisodes de Signaux faibles sont disponibles sur Siècle Digital et sur les plateformes de streaming. Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.
I respond to parts of recent Mohnish Pabrai Q&As, in which Pabrai discusses his concept of being a shameless cloner investor, and how to go about it successfully. Shameless cloning means a lot more than just copying the stock buys of great investors. See below timestamps: 00:34 How to be a good shameless cloner investor 04:32 Circle of competence and market mispricings 07:51 Knowing which rabbit holes to go down 11:25 There's always a bear market with opportunity somewhere Related episodes: Mohnish Pabrai: Why Great Stock Ideas Are Rare https://youtu.be/cIasDBIkoM0 Mohnish Pabrai Buys PayPal + These Stocks for Wagons Fund https://youtu.be/dr75eoQRvcY Reference videos: Mohnish Pabrai's Session with Columbia Business School (CSIMA) on February 14, 2024 https://youtu.be/ZrJA8q5Yixg Mohnish Pabrai's Q&A at London School of Economics on January 30, 2024 https://youtu.be/1xpY7-uyPqo Join The Art of Value Patreon community for exclusive videos and more: https://www.patreon.com/TheArtofValue I use TIKR Terminal to help analyze great businesses, follow top investor portfolios, and help monitor my portfolio (referral link): http://tikr.com/theartofvalue I use GuruFocus for historical, financial and valuation data, screeners, charts and comparison tools, to help me make smarter long-term investing decisions (referral link): https://www.gurufocus.com/?r=2c95d5930bb2537b2e0265075fb66581 Disclaimer: I am not a financial adviser and nothing in this content is financial advice. This content is for education and entertainment purposes only. Do your own analysis and/or seek professional financial advice before making any investment decision. --- Send in a voice message: https://podcasters.spotify.com/pod/show/theartofvalue/message
I respond to parts of recent Mohnish Pabrai Q&As, in which Pabrai discusses his concept of being a shameless cloner investor, and how to go about it successfully. Shameless cloning means a lot more than just copying the stock buys of great investors. See below timestamps: 00:34 How to be a good shameless cloner investor 04:32 Circle of competence and market mispricings 07:51 Knowing which rabbit holes to go down 11:25 There's always a bear market with opportunity somewhere Related episodes: Mohnish Pabrai: Why Great Stock Ideas Are Rare https://youtu.be/cIasDBIkoM0 Mohnish Pabrai Buys PayPal + These Stocks for Wagons Fund https://youtu.be/dr75eoQRvcY Reference videos: Mohnish Pabrai's Session with Columbia Business School (CSIMA) on February 14, 2024 https://youtu.be/ZrJA8q5Yixg Mohnish Pabrai's Q&A at London School of Economics on January 30, 2024 https://youtu.be/1xpY7-uyPqo Join The Art of Value Patreon community for exclusive videos and more: https://www.patreon.com/TheArtofValue I use TIKR Terminal to help analyze great businesses, follow top investor portfolios, and help monitor my portfolio (referral link): http://tikr.com/theartofvalue I use GuruFocus for historical, financial and valuation data, screeners, charts and comparison tools, to help me make smarter long-term investing decisions (referral link): https://www.gurufocus.com/?r=2c95d5930bb2537b2e0265075fb66581 Disclaimer: I am not a financial adviser and nothing in this content is financial advice. This content is for education and entertainment purposes only. Do your own analysis and/or seek professional financial advice before making any investment decision. --- Send in a voice message: https://podcasters.spotify.com/pod/show/theartofvalue/message
Lando tries and fails to protect Lobot in Jabba's Palace as the Scourge/Spark entity advances in its goal of melding meat to machine in the pages of Star Wars #39, while Obi-Wan Kenobi gives chase to Leia and encounters a false Jedi and learns that Anakin is alive and not so well in the Obi-Wan Kenobi adaption #2. Tales of the Death Star is 96 pages of Star Wars horror, from creepy crawlies to zombies, extending the tradition of macabre tales in a galaxy far, far away.Comics Discussed This Week:Tales From the Death Star (6:02)Obi-Wan Kenobi Adaptation #2 (10:24)Star Wars (Vol. 3) #39 (12:48)Star Wars Comics New to Marvel Unlimited This Week:Bounty Hunters #36Darth Vader (Vol. 3) #36News: Bounty Hunters will end with #42, but Ethan Sacks isn't going anywhere, as he'll be writing a new Jango Fett mini-series starting in March from Marvel.Thrawn: Alliances will be adapted by Marvel as a mini-series starting in January. It's being written by Jody Houser and Timothy Zahn.Mace Windu is getting a mini-series that starts in January.Dark Horse will publish a series of one-shot Hyperspace Stories graphic novels, with Obi-Wan Kenobi and Qui-Gon Jin the first two out of the gate in 2024.Check out the Facebook page for early looks at the covers of Shadows of Starlight #4, The High Republic Phase III #3 and The High Republic Adventures #3.Marvel is collecting the second phase of The High Republic in a hardcover that will collect issues 1-10, along with The Blade 1-4. It's due out in November 2024.Upcoming Star Wars comics, graphic novels and omnibuses: Oct. 25 _ D-Squad #2 (of 4), Doctor Aphra #37, Dark Droids #2 (2nd Printing)Oct. 31 _ The High Republic Adventures -- The Monster of Temple Peak and Other Stories (Collects Monster of Temple Peak 1-4 and The High Republic Adventures Annual); Star Wars Legends: The Empire Omnibus, Vol. 2 (Collects Dark Times -- Fire Carrier 1-5, Dark Times -- A Spark Remains 1-5, Darth Vader and the Ninth Assassin 1-5, Darth Vader and the Cry of Shadows 1-5, Droids Special 1, Droids (1994) 1-6, Droids (1995) 1-8, Star Wars: The Protocol Offensive, plus material from Star Wars Visionaries, Star Wars Tales 11-12, 15 and 20, Dark Horse Presents Annual '99 and Star Wars Galaxy Magazine 1)Nov. 1 _ Star Wars #40, Hyperspace Stories #10 (of 12)Nov. 7 _ Star Wars: Scoundrels, Rebels and The Empire TPB (Collects the Jabba's Palace, Ewoks, Lando, The Empire, The Rebellion and Max Rebo one-shots)Nov. 8 _ The High Republic (Vol. 3) #1, Shadows of Starlight #2 (of 4), Darth Vader #40 Nov. 14 _ Star Wars Legends Epic Collection: The Empire, Vol. 8 (Collects Star Wars: Empire 5-6, 8-13, 15; Star Wars: X-Wing Rogue Squadron 1/2; Star Wars: A New Hope Special Edition 1-4; Star Wars: Tag & Bink Are Dead 1; material from Star Wars Tales 1, 6, 8-10, 12, 14, 16, 19) Nov. 15 _ Star Wars: Visions Peach Momoko, Dark Droids #4 (of 5), Doctor Aphra #38, Return of the Jedi — The 40th Anniversary Covers, The Mandalorian Season 2 #6 (of 8) Nov. 21 _ The Mandalorian Season 2 Part 1 TPB (Collects 1-4) Nov. 22 _ Hyperspace Stories #11, Bounty Hunters #40, D-Squad #3 (of 4) Nov. 29 _ Obi-Wan Kenobi #3 (of 6)Dec. 5 _ Star Wars Legends Epic Collection: The New Republic, Vol. 7 (Collects Boba Fett - Bounty on Bar-Kooda 1, Boba Fett - When the Fat Lady Swings 2, Boba Fett - Murder Most Foul 3, Boba Fett - Agent of Doom 1, Jedi Academy - Leviathan 1-4, The Mixed-Up Droid 1, Union 1-4, Chewbacca 1-4 and material from Star Wars Tales 19); The High Republic Adventures (Vol. 2), Vol. II TPB (Collects 5-8) Dec. 6 _ Star Wars #41, D-Squad #4 (of 4), The High Republic Adventures Phase III #1 Dec. 13 _ The High Republic Phase III #2, Bounty Hunters #41, The High Republic Phase III #2, Shadows of Starlight #3 (of 4), Hyperspace Stories #12 Dec. 19 _ Yoda TPB (Collects 1-10)Dec. 20 _ Star Wars: Revelations (2023), Darth Vader #41, Doctor Aphra #39 Dec. 27 _ Dark Droids #5 (of 5), The Mandalorian Season 2 #7 (of 8) 2024Jan. 3 _ Darth Vader #42, Shadows of Starlight #4 (of 4), Star Wars: Visions Takashi Okazaki #1, Darth Vader -- Black, White & Red Treasury Edition (Collects 1-4) Jan. 10 _ Star Wars #42, The Mandalorian Season 2 #8 (of 8) Jan. 16 _ Star Wars: Hyperspace Stories Vol. 2, "Scum and Villainy" TPB (Collects 5-8)Jan. 17 _ The High Republic Adventures Phase III #2 Jan. 23 _ Star Wars Legends Epic Collection: The Menace Revealed, Vol. 4 (Collects The Bounty Hunters - Aurra Sing 1; Star Wars: Starfighter - Crossbones 1-3; Free Comic Book Day 2002: Star Wars 1; Star Wars: Republic 46-48; Star Wars: Episode II - Attack of the Clones 1-4; Star Wars: Hasbro/Toys ‘R' Us Exclusive 1-4 and material from Dark Horse Extra 44-47; Star Wars Tales 2, 7, 14, 18, 20, 24) Feb. 27 _ Star Wars Legends Epic Collection: Rise of the Sith, Vol. 1 NEW PRINTING (Jedi - The Dark Side 1-5, Qui-Gon & Obi-Wan: The Aurorient Express 1-2, Qui-Gon & Obi-Wan - Last Stand on Ord Mantell 1-3, Jedi Council - Acts of War 1-4 and material from Star Wars (1998) 4-6, Star Wars Tales 1-3, 5, 7, 9-10, 13-14 and 24)March 5 _ Star Wars (Vol. 3), Vol. 7 (Collects 37-41), Dark Droids: D-Squad TPB (Collects 1-4) March 19 _ Star Wars Legends Epic Collection: The Empire, Vol. 1 NEW PRINTING (Collects Republic 78-80, Purge, Purge - Seconds to Die, Purge - The Hidden Blade one-shots, Purge - The Tyrant's Fist 1-2, Darth Vader and the Lost Command 1-5 and Dark Times 1-5) March 26 _ Dark Droids TPB (Collects 1-5) April 2 _ The High Republic: Shadows of Starlight TPB (Collects 1-4) April 9 _ Darth Vader (Vol. 3) Vol. 8 TPB (Collects 37-41) April 16 _ Star Wars Legends Epic Collection: The New Republic, Vol. 1 NEW PRINTING (Collects Mara Jade - By the Emperor's Hand 0-6, Shadows of the Empire - Evolution 1-5, The Jabba Tape, Boba Fett - Twin Engines of Destruction and material from Star Wars Tales 1, 3-5, 10, 14-15, 20 and 22); Hyperspace Stories Vol. 3 TPB "Light and Shadow" (Collects 9-12); Bounty Hunters Vol. 7 TPB “Dark Droids” (Collects 35-41)April 23 _ Star Wars by Gillen & Pak Omnibus (Collects Star Wars (2015) 38-75, Star Wars Annual 4, Star Wars: Empire Ascendant 1); Doctor Aphra (Vol. 2) Vol. 7 “Dark Droids” TPB (Collects 32-33, TBD); Hyperspace Stories: Qui-Gon April 30 _ The High Republic (Vol. 3), Vol. 1 TPB (Collects 1-4) May 14 _ Star Wars Legends: The Rebellion, Vol. 2 Omnibus (Collects Star Wars: River of Chaos (1995) 1-4; Star Wars: Empire (2002) 28-40; Star Wars: Rebellion (2006) 1-16; Star Wars: Boba Fett – Overkill (2006) 1; Star Wars: Boba Fett (1997) 1/2; Star Wars: Splinter of the Mind's Eye (1995) 1-4; material from Star Wars: Knights of the Old Republic/Rebellion (2006) 0; Star Wars Tales (1999) 3, 15, 17, 21) May 21 _ Star Wars Legends Epic Collection: The Old Republic, Vol. 1 NEW PRINTING (Collects Knights of the Old Republic 1-18 and material from Kings of the Old Republic/Rebellion 0) June 11 _ Star Wars Legends: The New Republic Omnibus, Vol. 2 (Collects Star Wars: The Jabba Tape; Heir to the Empire 1-6, Dark Force Rising 1-6, The Last Command 1-6. Dark Empire 1-6, Dark Empire II 1-6), Empire's End 1-2, Boba Fett -- Twin Engines of Destruction, Bounty on Bar-Kooda, When the Fat Lady Swings, Murder Most Foul and Agent of Doom, Star Wars Handbook 3 and material from Star Wars Tales 1, 3-5, 10, 14, 20 and 22); Obi-Wan Kenobi Adaptation TPB (Collects 1-6)July 2 _ Star Wars Legends: Tales of the Jedi omnibus. (Collects Star Wars: Dawn of the Jedi - Force Storm 1-5, Star Wars: Dawn of the Jedi - Prisoner of Bogan 1-5, Star Wars: Dawn of the Jedi - Force War 1-5, Star Wars: Dawn of the Jedi 0, Star Wars: Tales of the Jedi - The Golden Age of the Sith 0-5, Star Wars: Tales of the Jedi - The Fall of the Sith Empire 1-5, Star Wars: Tales of the Jedi 1-5, Star Wars: Tales of the Jedi - The Freedon Nadd Uprising 1-2, Star Wars: Tales of the Jedi - Dark Lords of the Sith 1-6, Star Wars: Tales of the Jedi - The Sith War 1-6, Star Wars: Tales of the Jedi - Redemption 1-5, material from Star Wars Tales 23 and Dark Horse Comics 7-9)This show is part of the Spreaker Prime Network, if you are interested in advertising on this podcast, contact us at https://www.spreaker.com/show/3523617/advertisement
Maxiscience revient, trois fois par semaine.Vous pouvez consulter notre politique de confidentialité sur https://art19.com/privacy ainsi que la notice de confidentialité de la Californie sur https://art19.com/privacy#do-not-sell-my-info.
Cloner la voix de Manuel Davy et d'Elisabeth Zehnder pour vous proposer l'épisode en anglais tout en préservant fidèlement l'empreinte vocale des intervenants d'origine est une réalité ! Cette expérience se devait d'être réalisée par la Cité de l'IA dont la mission est d'aider les entreprises à démystifier et s'approprier le sujet de l'IA, en le rendant accessible aux dirigeants et à leurs collaborateurs. - Cloning the voices of Manuel Davy and Elisabeth Zehnder to bring you the episode in English while faithfully preserving the voiceprint of the original speakers is a reality! This experiment had to be carried out by the Cité de l'AI, whose mission is to help companies demystify and take ownership of the subject of AI, by making it accessible to managers and their staff. /// Elisabeth Zehnder is in charge of the DataHub, Adeo's digital domain. In this episode, she sheds light on the implementation and benefits of machine learning. Machine learning is the link between business and artificial intelligence. “We start with an idea, a need in the head of a data scientist or a sector manager, which we dig into and structure, to find out if it can enable us to create added value.” “Then there's the value of change ", explains Elizabeth. In addition to the financial benefits of machine learning, it can also help to reduce drudgery in the workplace, by reducing the number of low-value-added tasks. This sub-category of AI is also changing the mindset of professions: "It's no longer only up to us to fetch the data, the different professions will expose it to us, give us access to it, thanks to the tools that will have been provided to them. " In a group like Leroy Merlin, there is a wide variety of different professions and expertise: "It's our duty to distribute this model, this know-how, across all our digital and business teams. " Enjoy today's episode ! Les Carnets de l'IA is a podcast proposed by the Cité de l'IA. Animation : Manuel Davy Production : César Defoort | Natif. Hébergé par Ausha. Visitez ausha.co/politique-de-confidentialite pour plus d'informations.
Maxiscience revient, avec trois questions scientifiques par semaine !Vous pouvez consulter notre politique de confidentialité sur https://art19.com/privacy ainsi que la notice de confidentialité de la Californie sur https://art19.com/privacy#do-not-sell-my-info.
Plus d'infos sur Twitter : https://twitter.com/DividendeClub
La professeure Ryoa Chung précise où en est le clonage d'organes humains; le professeur Jean-François Gagnon explique quelle est la meilleure technique de brassage de cartes; la professeure Amélie D-Boisvert tente d'entrevoir les effets de ChatGPT sur le journalisme; et le physicien Martin-Jacques Deshaies explique la science derrière les probabilités de précipitations.
Vous avez peut-être déjà vu Her, ce film dans lequel la voix de Scarlett Johansson joue le rôle d'une intelligence artificielle.Aujourd'hui, coup de tonnerre ! L'intelligence artificielle permet désormais de reproduire n'importe quelle voix, la mienne, la vôtre, pour lui faire dire tout, mais aussi n'importe quoi. Un podcast de Lauren Boudard, cofondatrice de Tech Trash, pour Tech Paf. Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.
A l'heure du conflit Russo-Ukrainien, la nation de Poutine, en recherche de propagande sur le terrain international, utilise des pirates de l'informatique pour cloner nos médias européens et ainsi véhiculer de fausses informations.
Meituan (HKG: 3690) ก่อตั้งโดยนาย Wang Xing ถือเป็น Fu'er dai (富二代) The 2nd Generation Rich) ที่เกิดมาครอบครัวนักธุรกิจที่ร่ำรวย เกิดมารวยสบาย แต่ก็ไม่หยุดที่จะดิ้นรนเพื่อความสำเร็จของตัวเอง แต่แน่นอนคงไม่ใช่เพราะอยากทำเพื่อความร่ำรวยเพียงอย่างเดียว เพราะพื้นเพของเขาก็มีฐานะอยู่แล้ว • แต่การดิ้นรนของเค้า ทำให้หลายคนเรียกนาย Wang Xing ว่าเป็นนักลอกเลียนแบบ (The Cloner เพราะ startups หลายที่ที่เค้าก่อตั้งในจีนคือการ copy – paste จากผู้บุกเบิกหลายเจ้าในอเมริกาทั้งสิ้น • แต่การเลียนแบบรุ่นพี่ก็ไม่ใช่เรื่องแย่เสมอไป เพราะสุดท้ายจุดที่ทำให้ชนะและยืนหนึ่งคือเรื่อง business model เสียมากกว่าเพราะหากจำกันได้ Alibaba group สร้าง Taobao มาหลังจาก eBay แต่ก็ปราบ eBay ในจีนได้ราบคาบ Tencent ก็ลอกไอเดียจาก ICQ แต่สุดท้ายก็ปรับเปลี่ยนมาเป็น QQ และทำได้ดีกว่าและยั่งยืนมาจนถึงปัจจุบัน • Wang Xing ใช้เวลากว่า 13 ปี นับตั้งแต่เริ่ม drop out ล้มเหลวหลายครั้งต่อหลายครั้ง การโดนครหาว่าเป็น copycat เป็นเรื่องไส้ติ่งสำหรับตัวเขาเพราะเขาใช้เวลายาวนาน ผ่านร้อนผ่านหนาว กว่าจะมายืนอยู่บนจุดสูงสุดของอาชีพ และกลายเป็นเจ้าของ Meituan – บริษัทให้บริการในพื้นที่ on demand services ที่ใหญ่ที่สุดในจีน เลือกฟังกันได้เลยนะครับ อย่าลืมกด Follow ติดตาม PodCast ช่อง Geek Forever's Podcast ของผมกันด้วยนะครับ ========================= ร่วมสนับสนุน ด.ดล Blog และ Geek Forever Podcast เพื่อให้เรามีกำลังในการผลิต Content ดี ๆ ให้กับท่าน https://www.tharadhol.com/become-a-supporter/ ——————————————– ติดตาม ด.ดล Blog ผ่าน Line OA เพียงคลิก : https://lin.ee/aMEkyNA ——————————————– ไม่พลาดข่าวสารผ่านทาง Email จาก ด.ดล Blog : https://www.getrevue.co/profile/tharadhol ——————————————– Geek Forever Club พื้นที่ของการแลกเปลี่ยนข้อมูลข่าวสาร ความรู้ ด้านธุรกิจ เทคโนโลยีและวิทยาศาสตร์ ใหม่ ๆ ที่น่าสนใจ https://www.facebook.com/groups/geek.forever.club/ ========================= ช่องทางติดตาม ด.ดล Blog เพิ่มเติมได้ที่ Fanpage : www.facebook.com/tharadhol.blog Blockdit : www.blockdit.com/tharadhol.blog Twitter : www.twitter.com/tharadhol Instragram : instragram.com/tharadhol TikTok : tiktok.com/@geek.forever Youtube : www.youtube.com/c/mrtharadhol Linkedin : www.linkedin.com/in/tharadhol Website : www.tharadhol.com
Star Wars en Direct - Aude reçoit Fabien, un grand fan de Star Wars et Médecin de profession pour discuter de clonage. Le clonage a été introduit dans la saga Star Wars dès le départ en 1977 quand Ben (Kenobi) évoque une guerre des Clones à un fougueux Luke. Comment le clonage a-t-il été présenté dans SW au fil des années ? Le clonage est-il aujourd'hui une réalité ou reste t-il un fantasme de SF ?
Star Wars en Direct - Aude re
Chronique de Gabrielle Caron, humoriste, auteure et animatrice du balado “J'ai fait un humain” à QUB radio : profession nommeuse de bébé professionnelle. Une femme clône son chat après sa mort. Pour de l'information concernant l'utilisation de vos données personnelles - https://omnystudio.com/policies/listener/fr
Tous les soirs, retrouvez l'histoire du jour par l'édition du soir de Ouest-France. Crédit musique : Cuisine - Nctrnm / freearchivemusic.org (cc by 4.0) Capture d'écran : Instagram / adogandacat
DON'T YOU JUST LOVE A GOOD TEACHER HACK?I sure do, and in this episode of The Classroom Commute podcast - I've got a good one! If you have ever used a Smartboard before, the you're likely familiar with the concept of an infinite cloner. This feature allows you to have an object or image on the screen that students can reproduce, or clone, over and over and over - as many times as they'd like. This feature comes in handy in a lot of scenarios. However - this feature is NOT available inside of Google Slides - or is it?While the infinite cloner may not be a feature in Google Slides, I know of a little hack that will get the job done and work just as good!FOR COMPLETE SHOW NOTES VISIT: classroomnook.com/podcast/110------------------------------------Links & Resources Mentioned in the EpisodeEPISODE 53: Using a Reading Genre Wheel to Encourage Reading VarietyEPISODE 31: How to Use a Reader's and Writer's Notebook in the Upper Elementary ClassroomGrab the Done-for-You Reader's Notebook HEREGrab the Done-for-You Writer's Notebook HEREVIDEO TUTORIAL: How To Create an Infinite Clone in Google Slides
Tous les jours à 5h50, Anthony Morel, expert High-Tech vous fait découvrir les dernières actus techno, dans RMC Bonjour !, sur RMC. Chaque matin avec "RMC Bonjour !", écoutez un show radio/télé unique en France. Un rendez-vous exceptionnel mêlant infos, débats, réactions et intervention d'experts. En simultané de 6h à 8h30 sur RMC Story. En simultané de 8h35 à 9h sur BFMTV. RMC est une radio généraliste, essentiellement axée sur l'actualité et sur l'interactivité avec les auditeurs, dans un format 100% parlé, inédit en France. La grille des programmes de RMC s'articule autour de rendez-vous phares comme Apolline Matin (6h-9h), les Grandes Gueules (9h-12h), Estelle Midi (12h-15h), Super Moscato Show (15h-18h), Rothen s'enflamme (18h-20h), l'After Foot (20h-minuit).
Vous connaissez les concours de beauté pour chats, pour chiens ou pour chevaux... Mais connaissez-vous les compétitions de chameaux ? Aux Émirats, on prend ces concours très au sérieux... Au point de recourir au clonage.“Ailleurs dans le monde” au micro d'Alexis Breton et tous les jours à 6h40. See acast.com/privacy for privacy and opt-out information.
EP35 China Internet Landscape and Digital Giants Part 30 • Meituan (HKG: 3690) ก่อตั้งโดยนาย Wang Xing ถือเป็น Fu'er dai (富二代) The 2nd Generation Rich) ที่เกิดมาครอบครัวนักธุรกิจที่ร่ำรวย เกิดมารวยสบาย แต่ก็ไม่หยุดที่จะดิ้นรนเพื่อความสำเร็จของตัวเอง แต่แน่นอนคงไม่ใช่เพราะอยากทำเพื่อความร่ำรวยเพียงอย่างเดียว เพราะพื้นเพของเขาก็มีฐานะอยู่แล้ว • แต่การดิ้นรนของเค้า ทำให้หลายคนเรียกนาย Wang Xing ว่าเป็นนักลอกเลียนแบบ (The Cloner เพราะ startups หลายที่ที่เค้าก่อตั้งในจีนคือการ copy – paste จากผู้บุกเบิกหลายเจ้าในอเมริกาทั้งสิ้น • แต่การเลียนแบบรุ่นพี่ก็ไม่ใช่เรื่องแย่เสมอไป เพราะสุดท้ายจุดที่ทำให้ชนะและยืนหนึ่งคือเรื่อง business model เสียมากกว่าเพราะหากจำกันได้ Alibaba group สร้าง Taobao มาหลังจาก eBay แต่ก็ปราบ eBay ในจีนได้ราบคาบ Tencent ก็ลอกไอเดียจาก ICQ แต่สุดท้ายก็ปรับเปลี่ยนมาเป็น QQ และทำได้ดีกว่าและยั่งยืนมาจนถึงปัจจุบัน • Wang Xing ใช้เวลากว่า 13 ปี นับตั้งแต่เริ่ม drop out ล้มเหลวหลายครั้งต่อหลายครั้ง การโดนครหาว่าเป็น copycat เป็นเรื่องไส้ติ่งสำหรับตัวเขาเพราะเขาใช้เวลายาวนาน ผ่านร้อนผ่านหนาว กว่าจะมายืนอยู่บนจุดสูงสุดของอาชีพ และกลายเป็นเจ้าของ Meituan – บริษัทให้บริการในพื้นที่ on demand services ที่ใหญ่ที่สุดในจีน • รายละเอียดทั้งหมดติดตามได้ใน EP 35
Everybody's moving, some live action tv news, a rad new show on Disney+, things take a turn in Star Wars: The Bad Batch, and more! Here's what happens: Oh, crap. Who Got What did contain some collectables this week. Some. It looks like Andor may be getting some Mendo. This is a huge deal all the way around. Who else are we going to see? When is season 3 of The Mandalorian going to start filming? Indy 5 got crapped on, and James Mangold said some things. Some of this is really funny, and some of it is really sad. Did everyone watch Loki? Wow. We're all in on The Bad Batch for sure. Things got a little dicey, but Rex knew the score. How does cloning really work? We have zero answers. It's a whole scene at the end. WE HAVE MERCH! You can get t-shirts and the like at TeePublic.com and Redbubble.com. Dig the show? Support our podcast on Patreon! Go to patreon.com/thebadmotivators to find out more. Thanks for being awesome. Eric has a Bandcamp page where you can get uncompressed stereo versions of some of the great podcast themes and bumpers you've come to know and love! I know, right?!? Check it out here! A big thank you Xurxo (@laseraw) for the killer artwork! Our friend Chris Hall (@chrishallartist) is the genius behind some of our best designs. Check his work out at Black Sheep Rebellion and buy some stuff. Help us out! Consider leaving us a 5-star review on iTunes! Robbo said you should. Follow us on Instagram: @badmotivators Follow us on Twitter! The Bad Motivators: @bad_motivators Eric Strothers: @ericstrothers Dallas Wood: @tarkintangents Check us out Twitch! Luker: @super_cruser Eric: @ericstrothers
Ce sont des médicaments qui permettent de réduire les hospitalisations et les décès chez les patients à haut risque .. L'Allemagne les utilise déjà … En France on veut accélérer la recherche dans ce domaine … C'est ce type de médicament qui avait été administré à Trump pendant son hospitalisation … Comment ça fonctionne ? Quand notre système immunitaire reconnaît une présence étrangère, appelée « antigène », l'organisme développe des anticorps qui ont pour but de neutraliser l'effet toxique de l'antigène. Depuis le début de la pandémie de Covid, des patients ont été infectés et ont produit des anticorps … Les laboratoires ont essayé d'isoler chez eux les anticorps les plus efficaces contre le Covid … Une fois l'anticorps le plus efficace repéré, les scientifiques retrouvent son code génétique. Il peut alors être reproduit en laboratoire. Cloner … pour être administrer à d'autres patients … C'est ça le principe des traitements à base d'anticorps dits monoclonaux. Ils peuvent détruire les cellules virales déjà présentes, ou protéger de la contamination.
On vous a déjà demandé de trouver une copie conforme d'un de vos collègues vous? Ce n'est pourtant pas exactement rare. "Trouve-moi un quelqu'un comme lui", ou encore "Ça me prendrait 2 autres comme elle, mais en mieux". C'est suite à quelques publication LinkedIn qui ont généré d'excellentes discussions que nous avons décidé de traiter de diversité de culture, d'expérience et de compétences.Les sujets du jour : La tendance à vouloir engager des gens "tous pareils"Les risques de le faireLes avantages de consciemment rechercher la diversitéUne entreprise : machine bien huilée, ou écosystème vivant?La diversité dans une équipe VS dans un groupe de personnes éparsEt comme on en a pris l'habitude, 3 trucs et conseils pour mettre à profit une diversité qui fera grandir tout le monde dans votre entreprise. Support the show (http://www.patreon.com/gopyratecanada)
Hang Out Live With The Dude & Scotty Real For Todays Episode Of Grow Talk To Answer Your Grow Questions Like Can Plants Hear And How Can It Affect Them, Using A DWC Cloner And How To Get Perfect Roots Quickly, Are LED Grow Lights From Alibaba Any Good Or Should I Go With A Proven Light Like An HLG, A Hack To Keep Fungus Gnats At Bay Using Diatomaceous Earth, When And Where To Prune In Flower And How To Get The Best Looking Buds & Yields From Your Plants & More On Todays Episode Of Grow Talk
Hang Out Live With The Dude & Scotty Real For Todays Episode Of Grow Talk To Answer Your Grow Questions Like Can Plants Hear And How Can It Affect Them, Using A DWC Cloner And How To Get Perfect Roots Quickly, Are LED Grow Lights From Alibaba Any Good Or Should I Go With A Proven Light Like An HLG, A Hack To Keep Fungus Gnats At Bay Using Diatomaceous Earth, When And Where To Prune In Flower And How To Get The Best Looking Buds & Yields From Your Plants & More On Todays Episode Of Grow Talk
After Dinner Investing | On The Hunt For No-Brainer Stock Investments
This week Jason reviews the second quarter 13Fs of the great investors like Warren Buffett, Mohnish Pabrai, Guy Spier, Bill Ackman, and others. Thanks for listening and sharing!13F Cloning - https://afterdinnerinvestor.com/13f-cloning/Follow Jason - https://twitter.com/AfterInvestor
Cheap Home Grow - Learn How To Grow Cannabis Indoors Podcast
Shane from Cheap Home Grow sits down Cody from KCGrowDepot, and we talk about how to build a DIY aeroponic cloner. Cody has been growing for cannabis a long time, and he reached out to me to share his simple and easy DIY "recipe" for cloning your cannabis. After the show is over, please tell me what you thought of it in the comments section below. Learn How To Build A DIY Aeroponic Cloner https://cheaphomegrow.com/diy-aeroponic-cloner KC Grow Depot https://www.instagram.com/kcgrowdepot Follow CHG On YouTube https://www.youtube.com/channel/UCkdMfoCnXMiIsd6-qmMMcyQ Subscribe To The CHG Podcast on Spotify https://cheaphomegrow.com/spotify Listen To The CHG On Anchor https://anchor.fm/cheaphomegrow Learn How To Grow Your Own Cannabis https://cheaphomegrow.com/growing-cannabis Follow CHG On Social Media: https://instagram.com/cheaphomegrow https://twitter.com/cheaphomegrow https://facebook.com/cheaphomegrow --- Support this podcast: https://anchor.fm/cheaphomegrow/support
Shane from Cheap Home Grow sits down Cody from KCGrowDepot, and we talk about how to build a DIY aeroponic cloner. Cody has been growing for cannabis a long time, and he reached out to me to share his simple and easy DIY "recipe" for cloning your cannabis. After the show is over, please tell me what you thought of it in the comments section below. Learn How To Build A DIY Aeroponic Cloner https://cheaphomegrow.com/diy-aeroponic-cloner KC Grow Depot https://www.instagram.com/kcgrowdepot Follow CHG On YouTube https://www.youtube.com/channel/UCkdMfoCnXMiIsd6-qmMMcyQ Subscribe To The CHG Podcast on Spotify https://cheaphomegrow.com/spotify Listen To The CHG On Anchor https://anchor.fm/cheaphomegrow Learn How To Grow Your Own Cannabis https://cheaphomegrow.com/growing-cannabis Follow CHG On Social Media: https://instagram.com/cheaphomegrow https://twitter.com/cheaphomegrow https://facebook.com/cheaphomegrow
There are many kind of viruses in the world, but the one to really start it all was the Elk Cloner virus. Similar to the origin story of the worm virus, this virus entered into the world by accident… Sorta. Developed by entrepreneur Rich Skrenta, at age 15, he created this virus as a practical joke and placed it on a floppy disk. Little did he expect that the virus would latch onto Apple II operating system and start to wreak havoc. This was the very first virus that was spread out in the wild. It wasn’t created in a lab nor was it contained within a specific computer system. How it moved from computer to computer was via the floppy disks and using a technique called boot sector virus. How the virus worked was that it was attached to a game which was set to play automatically. After the 50th time the game started up, the virus would be released. People discovered this because on the 50th time, the graphics would change. Instead of the loading screen, users were greeted to a poem. This poem was what gave the virus the name Elk Cloner: Elk Cloner: The program with a personalityIt will get on all your disks It will infiltrate your chips Yes, it's Cloner!It will stick to you like glue It will modify RAM tooSend in the Cloner! Just as the poem stated, the virus clung to everything and in this case it kind of behaved like a worm. How it spread was solely based on the amount of floppy disks that you had. Basically if the computer booted up from an infected disk, the virus would copy itself in the computer’s memory. Every time after that, if an uninfected disk was inserted, the virus would then latch onto that floppy disk and spread that way. Overall, the Elk Cloner didn’t cause any kind of harm unlike the damages that occurred with worms. The only real issue was when you used Apple DOS disks that didn’t have standard images, their reserved tracks were overwritten. Still, despite the damages being minimal at best, many still remember this virus and was regarded as one of the first large-scale self-spreading personal computer virus ever made. As for Skrenta himself, he wasn’t punished for his actions. He was a prankster and a lot of his friends knew that.
Welcome back, Fellow Geeks, for Episode 075 of Geek So To Speak Podcast! This week, we grab our Pym-Particles and travel back to an alternate reality to discuss the TOP 10 CANCELLED COMIC BOOK MOVIES THAT SOUND AMAZING! Thats right, more bat-nipples, more weird casting, and more missed opportunities for greatness! On top of all that, theres so much Geek News that we practically recorded this episode twice: Nintendo announces more reasons why you should just give them all your money! James Gunn loves to add people named Pete to Suicide Squad! Dave Bautista is way too excited to be in Gears 5! Early Joker reactions put a smile on our faces! All that, plus: Shoff coins the phrase "Boner or Cloner", WonderRob has a strange love for Paul Giamatti, and we learn the hard way what "J*zz-Wailing" is. So sit back, relax, and thanks for tuning in... SAME GEEK TIME, SAME GEEK CHANNEL!
Welcome to the History of Computing Podcast, where we explore the history of information technology. Because by understanding the past, we're able to be prepared for the innovations of the future! Todays episode is not about Fear, Uncertainty, and Death. Instead it's about viruses. As with many innovations in technology, early technology had security vulnerabilities. In fact, we still have them! Today there are a lot of types of malware. And most gets to devices over the Internet. But we had viruses long before the Internet; in fact we've had them about as long as we've had computers. The concept of the virus came from a paper published by a Hungarian Scientist in 1949 called “Theory of Self-reproducing automata.” The first virus though, didn't come until 1971 with Creeper. It copied between DEC PDP-10s running TENEX over the ARPANET, the predecessor to the Internet. It didn't hurt anything; it just output a simple little message to the teletype that read “I'm the creeper: catch me if you can.” The original was written by Bob Thomas but it was made self-replicating by Ray Tomlinson thus basically making him the father of the worm. He also happened to make the first email program. You know that @ symbol in an email address? He put it there. Luckily he didn't make that self replicating as well. The first antivirus software was written to, um, to catch Creeper. Also written by Ray Tomlinson in 1972 when his little haxie had gotten a bit out of control. This makes him the father of the worm, creator of the anti-virus industry, and the creator of phishing, I mean, um email. My kinda' guy. The first virus to rear its head in the wild came in 1981 when a 15 year old Mt Lebanon high school kid named Rich Skrenta wrote Elk Cloner. Rich went on to work at Sun, AOL, create Newhoo (now called the Open Directory Project) and found Blekko, which became part of IBM Watson in 2015 (probably because of the syntax used in searching and indexes). But back to 1982. Because Blade Runner, E.T., and Tron were born that year. As was Elk Cloner, which that snotty little kid Rich wrote to mess with gamers. The virus would attach itself to a game running on version 3.3 of the Apple DOS operating system (the very idea of DOS on an Apple today is kinda' funny) and then activate on the 50th play of the game, displaying a poem about the virus on the screen. Let's look at the Whitman-esque prose: Elk Cloner: The program with a personality It will get on all your disks It will infiltrate your chips Yes, it's Cloner! It will stick to you like glue It will modify RAM too Send in the Cloner! This wasn't just a virus. It was a boot sector virus! I guess Apple's MASTER CREATE would then be the first anti-virus software. Maybe Rich sent one to Kurt Angle, Orin Hatch, Daya, or Mark Cuban. All from Mt Lebanon. Early viruses were mostly targeted at games and bulletin board services. Fred Cohen coined the term Computer Virus the next year, in 1983. The first PC virus came also to DOS, but this time to MS-DOS in 1986. Ashar, later called Brain, was the brainchild of Basit and Amjad Farooq Alvi, who supposedly were only trying to protect their own medical software from piracy. Back then people didn't pay for a lot of the software they used. As organizations have gotten bigger and software has gotten cheaper the pirate mentality seems to have subsided a bit. For nearly a decade there was a slow roll of viruses here and there, mainly spread by being promiscuous with how floppy disks were shared. A lot of the viruses were boot sector viruses and a lot of them weren't terribly harmful. After all, if they erased the computer they couldn't spread very far. The virus started “Welcome to the Dungeon.” The following year, the poor Alvi brothers realized if they'd of said Welcome to the Jungle they'd be rich, but Axl Rose beat them to it. The brothers still run a company called Brain Telecommunication Limited in Pakistan. We'll talk about zombies later. There's an obvious connection here. Brain was able to spread because people started sharing software over bulletin board systems. This was when trojan horses, or malware masked as a juicy piece of software, or embedded into other software started to become prolific. The Rootkits, or toolkits that an attacker could use to orchestrate various events on the targeted computer, began to get a bit more sophisticated, doing things like phoning home for further instructions. By the late 80s and early 90s, more and more valuable data was being stored on computers and so lax security created an easy way to get access to that data. Viruses started to go from just being pranks by kids to being something more. A few people saw the writing on the wall. Bernd Fix wrote a tool to remove a virus in 1987. Andreas Luning and Kai Figge released The Ultimate Virus Killer, an Antivirus for the Atari ST. NOD antivirus was released as well as Flushot Plus and Anti4us. But the one that is still a major force in the IT industry is McAfee VirusScan, founded by a former NASA programmer named John Mcafee. McAfee resigned in 1994. His personal life is… how do I put this… special. He currently claims to be on the run from the CIA. I'm not sure the CIA is aware of this. Other people saw the writing on the wall as well, but went… A different direction. This was when the first file-based viruses started to show up. They infected ini files, .exe files, and .com files. Places like command.com were ripe targets because operating systems didn't sign things yet. Jerusalem and Vienna were released in 1987. Maybe because he listened to too much Bad Medicine from Bon Jovi, but Robert Morris wrote the ARPANET worm in 1988, which reproduced until it filled up the memory of computers and shut down 6,000 devices. 1988 also saw Friday the 13th delete files and causing real damage. And Cascade came this year, the first known virus to be encrypted. The code and wittiness of the viruses were evolving. In 1989 we got the AIDS Trojan. This altered autoexec.bat and counted how many times a computer would boot. At 90 boots, the virus would hide the dos directories and encrypt the names of files on C:/ making the computer unusable unless the infected computer owner sent $189 a PO Box in Panama. This was the first known instance of ransomeware. 1990 gave us the first polymorphic virus. Symantec released Norton Antivirus in 1991, the same year the first polymorphic virus was found in the wild, called Tequila. Polymorphic viruses change as they spread, making it difficult to find by signature based antivirus detection products. In 1992 we got Michelangelo which John Mcafee said would hit 5 million computers. At this point, there were 1,000 viruses. 1993 Brough us Leandro and Freddy Krueger, 94 gave us OneHalf, and 1995 gave us Concept, the first known macro virus. 1994 gave us the first hoax with “Good Times” - I think of that email sometimes when I get messages of petitions online for things that will never happen. But then came the Internet as we know it today. By the mid 90s, Microsoft had become a force to be reckoned with. This provided two opportunities. The first was the ability for someone writing a virus to have a large attack surface. All of the computers on the Internet were easy targets, especially before network address translation started to somewhat hide devices behind gateways and firewalls. The second was that a lot of those computers were running the same software. This meant if you wrote a tool for Windows that you could get your tool on a lot of computers. One other thing was happening: Macros. Macros are automations that can run inside Microsoft Office that could be used to gain access to lower level functions in the early days. Macro viruses often infected the .dot or template used when creating new Word documents, and so all new word documents would then be infected. As those documents were distributed over email, websites, or good old fashioned disks, they spread. An ecosystem with a homogenous distribution of the population that isn't inoculated against an antigen is a ripe hunting ground for a large-scale infection. And so the table was set. It's March, 1999. David Smith of Aberdeen Township was probably listening to Livin' La Vida Loca by Ricky Martin. Or Smash Mouth. Or Sugar Ray. Or watching the genie In A Bottle video from Christina Aguilera. Because MTV still had some music videos. Actually, David probably went to see American Pie, The Blair Witch Project, Fight Club, or the Matrix then came home and thought he needed more excitement in his life. So he started writing a little prank. This prank was called Melissa. As we've discussed, there had been viruses before, but nothing like Melissa. The 100,000 computers that were infected and 1 billion dollars of damage created doesn't seem like anything by todays standards, but consider this: about 100,000,000 PCs were being sold per year at that point, so that's roughly one tenth a percent of the units shipped. Melissa would email itself to the first 50 people in an Outlook database, a really witty approach for the time. Suddenly, it was everywhere; and it lasted for years. Because Office was being used on Windows and Mac, the Mac could be a carrier for the macro virus although the payload would do nothing. Most computer users by this time knew they “could” get a virus, but this was the first big outbreak and a wakeup call. Think about this, if there are supposed to be 24 billion computing devices by 2020, then next year this would mean a similar infection would hit 240 million devices. That would mean it hits ever person in Germany, the UK, France, and the Nordic countries. David was fined $5,000 and spent 20 months in jail. He now helps hunt down creators of malware. Macroviruses continued to increase over the coming years and while there aren't too many still running rampant, you do still see them today. Happy also showed up in 1999 but it just made fireworks. Who doesn't like fireworks? At this point, the wittiness of the viruses, well, it was mostly in the name and not the vulnerability. ILOVEYOU from 2000 was a vbscript virus and Pikachu from that year tried to get kids to let it infect computers. 2001 gave us Code Red, which attacked IIS and caused an estimated $2 Billion in damages. Other worms were Anna Kournikova, Sircam, Nimda and Klez. The pace of new viruses was going, as was how many devices were infected. Melissa started to look like a drop in the bucket. And Norton and other antivirus vendors had to release special tools, just to remove a specific virus. Attack of the Clones was released in 2002 - not about the clones of Melissa that started wreaking havoc on businesses. Mylife was one of these. We also got Beast, a trojan that deployed a remote administration tool. I'm not sure if that's what evolved into SCCM yet. In 2003 we got simile, the first metamorphic virus, blaster, sobbing, seem, graybeard, bolgimo, agobot, and then slammer, which was the fastest to spread at that time. This one hit a buffer overflow bug in Microsoft SQL and hit 75,000 devices in 10 minutes. 2004 gave us Bagle, which had its own email server, Sasser, and MyDoom, which dropped speeds for the whole internet by about 10 percent. MyDoom convinced users to open a nasty email attachment that said “Andy, I'm just doing my job, nothing personal.” You have to wonder what that meant… The witty worm wasn't super-witty, but Netsky, Vundo, bifrost, Santy, and Caribe were. 2005 gave us commwarrior (sent through texts), zotob, Zlob, but the best was that a rootlet ended up making it on CDs from Sony. 2006 brought us Starbucks, Nyxem, Leap, Brotox, stration. 2007 gave us Zeus and Storm. But then another biggee in 2008. Sure, Torpig, Mocmex, Koobface, Bohmini, and Rustock were a thing. But Conficker was a dictionary attack to get at admin passwords creating a botnet that was millions of computers strong and spread over hundreds of countries. At this point a lot of these were used to perform distributed denial of services attacks or to just send massive, and I mean massive amounts of spam. Since then we've had student and duqu, Flame, Daspy, ZeroAccess. But in 2013 we got CryptoLocker which made us much more concerned about ransomware. At this point, entire cities can be taken down with targeted, very specific attacks. The money made from Wannacry in 2017 might or might not have helped developed North Korean missiles. And this is how these things have evolved. First they were kids, then criminal organizations saw an opening. I remember seeing those types trying to recruit young hax0rs at DefCon 12. Then governments got into it and we get into our modern era of “cyberwarfare.” Today, people like Park Jin Hyok are responsible for targeted attacks causing billions of dollars worth of damage. Mobile attacks were up 54% year over year, another reason vendors like Apple and Google keep evolving the security features of their operating systems. Criminals will steal an estimated 33 billion records in 2023. 60 million Americans have been impacted by identity theft. India, Japan, and Taiwan are big targets as well. The cost of each breach at a company is now estimated to have an average cost of nearly 8 million dollars in the United States, making this about financial warfare. But it's not all doom and gloom. Wars in cyberspace between nation states, most of us don't really care about that. What we care about is keeping malware off our computers so the computers don't run like crap and so unsavory characters don't steal our crap. Luckily, that part has gotten easier than ever.
3 conseils simples à appliquer pour mieux gérer son temps (à défaut de l'arrêter) et se décharger d'une partie de son stress. Adapté aux jeunes parents, mamans, papas débordées, surmenés et stressés. ________________________________________________________________ ◾ PASSEZ VOTRE TEST "ÊTES-VOUS PROCHE DU BURN-OUT MATERNEL" : https://bit.ly/2UgPqJY
durée : 00:07:56 - La Une de la science - par : Axel Villard - Pourquoi le sexe quand on peut cloner ? C'est une question que se posent les Biologiste depuis plus de 50 ans.
Jake and Michael discuss all the latest Laravel releases, tutorials, and happenings in the community.
Programa Nº 219 de InnovaRock en radio Futuro. Fecha: 13/07/2018 Invitado: Nicolás Lavin Empresa: Cloner Web: www.cloner.cl
Réagissez à l’émission en commentaires sur techcafe.fr Ajoutez l’émission à votre lecteur de podcasts Soutenez Tech Café sur Patreon ! Discutez avec nous sur Telegram ! L’initiative de Toorop : des cookies pour tous les goûts Première blockchain alimentaire d’Europe Par Carrefour. Pour les poulets. Sagrada Familia (suite et fin) Le Galaxy S9 aurait (provisoirement) le meilleur écran du monde. 51 200 ISOS avec un téléphone ? Sony dit oui ! Mais ni quand, ni comment... Le Zenphone 5, l’encoche haut de gamme pas chère. Le design de l’iPhone X copié à tour de bras. Le CCE désapprouve formellement. LG G7, le pokémon légendaire du MWC 2018. Wiko voudrait se faire désirer plutôt que se faire subir. Ok Djingo. Archos lance un assistant en bois avec écran. Google propose Flutter pour un développement universel plus facile. Bêtise Naturelle Get Rich or (most likely) Die Trying Pourquoi vous n’êtes pas riche. (Si vous êtes riche, le PATREON est ici). Plus de MVNO pour les pauvres ? Tu pousses le bouchon un peu loin Ajit…! Cloner votre chien ? C’est 50 000$. Police des moeurs FOSTA-SESTA, protection ou censure ? Avec AgeID, la galaxie porno Mindgeek devient le censeur de l’Angleterre. Vie de moins en moins privée Palantir, la pierre magique de la Nouvelle Orléans et … de la DGSI ? Smart City et vie privée, un mariage difficile… Au secours : le Hacking d’IA, ça marche aussi sur moi… Bientôt des parties de CIMON dans l’ISS. En bref Light Phone 2, ou la déconnexion bobo. Absolument pas du tout la rubrique crypto Cryptocasse : 600 ASIC miners bitcoin volés en Islande. 3 millions de GPU, 777 millions de dollars acheté par les mineurs en 2017. Dell aussi se met au “Mining”. Brèves sécurité: Hack de rTorrent : Linux aussi peut avoir des virus. La plus importante attaque par DDOS divulguée… et record battu quelques jours après. Nouvelle variante de Spectre, même SGX ne vous protègera pas ! LEGO lance de nouvelles pièces vertes. Enfin écolo quoi… Bientôt des alimentations plus petites ? Si seulement tu avais pu voir ça Xbox 360... Fin du test du fil explorer chez Facebook. De toute façon, il n’y aura plus de nouvelles des pages qu’on vous dit ! Facebook prépare le déploiement de la reconnaissance faciale en Europe sous le prisme du RGPD. Une taxe des GAFAM en Europe en préparation. Netflix chez Free : le problème n’est pas si évident… La chronique de la neutralité du net. Le Yéti montrera-t-il son nez à la GDC ? Désormais, bloquez les appels surtaxés ! Bonus GPP : CdG : pourquoi la SNCF nous laisse dans le flou ? Guillaume : Mon avis en construction sur les cryptomonnaies Participants : Guillaume Poggiaspalla Présenté par Guillaume Vendé
Anne Havens talks about her work, Cloner, in the 4th Rochester Biennial exhibition, on view at the Memorial Art Gallery, July 25-September 26, 2010.
Talking about hardware problems with my car, my own mental wiring and my laptop, leading up to attending Podcaster's across Borders in Kingston Ontario. I made it there an back, but I'll have to give you the high points in the next show.Check out these shows,On the Log - Episode 68: The Sound Between the NotesDicksnJanes #202: postPABblabBeing Buff # 36, Jowi Taylor PAB2009 Keynote: How a guitar brought a nation togetherCanadian Podcast Buffet will be uploading recordings of the sessions throughout the summer Also, google PAB09. Every attendee who writes a blog or posts a podcast/vidcast will put this tag in their RSS fee.In the process of troubleshooting problems with my laptop, using tools such as Techtool Pro, Carbon Copy Cloner and and Apple Disk Utility, the drive and the motherboard failed and an emergency trip to the Apple Store Genius Bar resulted in it being pronounced DOA.All that I can do at this point is offer some cautionary advice on how to prepare, and deal with the inevitable computer meltdown.Finally I go over some of the critical features I'm looking for in my next laptop.Corrections: I made an error in describing the pixel dimension of the MacBook Pro 15" laptop. It is 1440x900, which is identical to the highest resolution on my PowerBook 1.67 Ghz 17" laptop. Also I was wrong about the price difference. There is only a $200 price difference, not $400.Finally, the factory warranty is one year and you can purchase AppleCare, an extended warranty for a maximum of 3 years (not 4 years). A real bargain at $350. It covers any defective parts and service to replace them.There are two graphics cards in both the 15" and 17' which have 2.8Ghz processors, and they function the same. There are other, slower processor 15" MacBook Pros and their hardware configurations are very different. Here's the primary differences between the two laptops as far as I can determine right now. 15" 17" • Cost Difference $200 less • Two video cards Yes Yes • Drive 500 Gig 500 Gig • Card Slots SD ExpressCard/34 • Display Good Larger, HiRez • Battery 7 hours 8 hoursThe 17" is a good deal for the extra $200, no question about that.
Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference.
Black Hat DC 2007 was supposed to be the venue for "RFID For Beginners", a talk on the basic mechanisms of operation used by RFID tags. Legal pressure forced the talk to be curtailed, with only 25% of the material being presented. The remainder was replaced with a Panel debate involving IOActive, US-CERT, ACLU, Blackhat, and Grand Idea Studio. After spending far too much time and money dealing with lawyers and consulting with some strategic allies, IOActive has made some relatively minor tweaks to the original presentation, which will be presented as the first part of this talk. The second part of the talk introduces Cloner 2.0. The first Cloner was designed to be as simplistic as possible, and succeeded at the cost of read range, flexibility, and overall sophistication. Cloner 2.0 aims to address these concerns with a significantly enhanced read range, a "passive" mode to sniff the exchange between tags and legitimate readers, multi-tag storage capability, multiple RF frontends and an enhanced software backend to support many different type of Proximity tags, and overall improvements in reliability and flexibility. While we won't be able to give you full schematics or the names of any vendors whose tags can be cloned, we will be including significant information (including useful snippets of source and circuit diagram fragments) that will allow you to more deeply understand the significant flaws in older RFID technologies. This talk will give you th information you need to make informed decisions about the use and mis-use of the most common RFID implementations available today. Abstract for the original "RFID for Beginners" talk: RFID tags are becoming more and more prevalent. From access badges to implantable Verichips, RFID tags are finding more and more uses. Few people in the security world actually understand RFID though; the "radio" stuff gets in the way. This presentation aims to bridge that gap, by delivering sufficient information to design and build a working RFID cloner based around a single chip - the PIC16F628A. Assuming no initial knowledge of electronics, I'll explain everything you need to know in order to build a working cloner, understand how it works, and see exactly why RFID is so insecure and untrustworthy. Covering everything from Magnetic Fields to Manchester Encoding, this presentation is suitable for anyone who is considering implementing an RFID system, considering hacking an RFID system, or who just wants to know a little more about the inductively coupled, ASK modulated, backscattering system known as RFID.
Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.
Black Hat DC 2007 was supposed to be the venue for "RFID For Beginners", a talk on the basic mechanisms of operation used by RFID tags. Legal pressure forced the talk to be curtailed, with only 25% of the material being presented. The remainder was replaced with a Panel debate involving IOActive, US-CERT, ACLU, Blackhat, and Grand Idea Studio. After spending far too much time and money dealing with lawyers and consulting with some strategic allies, IOActive has made some relatively minor tweaks to the original presentation, which will be presented as the first part of this talk. The second part of the talk introduces Cloner 2.0. The first Cloner was designed to be as simplistic as possible, and succeeded at the cost of read range, flexibility, and overall sophistication. Cloner 2.0 aims to address these concerns with a significantly enhanced read range, a "passive" mode to sniff the exchange between tags and legitimate readers, multi-tag storage capability, multiple RF frontends and an enhanced software backend to support many different type of Proximity tags, and overall improvements in reliability and flexibility. While we won't be able to give you full schematics or the names of any vendors whose tags can be cloned, we will be including significant information (including useful snippets of source and circuit diagram fragments) that will allow you to more deeply understand the significant flaws in older RFID technologies. This talk will give you th information you need to make informed decisions about the use and mis-use of the most common RFID implementations available today. Abstract for the original "RFID for Beginners" talk: RFID tags are becoming more and more prevalent. From access badges to implantable Verichips, RFID tags are finding more and more uses. Few people in the security world actually understand RFID though; the "radio" stuff gets in the way. This presentation aims to bridge that gap, by delivering sufficient information to design and build a working RFID cloner based around a single chip - the PIC16F628A. Assuming no initial knowledge of electronics, I'll explain everything you need to know in order to build a working cloner, understand how it works, and see exactly why RFID is so insecure and untrustworthy. Covering everything from Magnetic Fields to Manchester Encoding, this presentation is suitable for anyone who is considering implementing an RFID system, considering hacking an RFID system, or who just wants to know a little more about the inductively coupled, ASK modulated, backscattering system known as RFID.