Podcasts about vgg

  • 27PODCASTS
  • 41EPISODES
  • 54mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Aug 19, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about vgg

Latest podcast episodes about vgg

Vetsapiens
Vacinação: qual a melhor conduta?

Vetsapiens

Play Episode Listen Later Aug 19, 2024 28:08


As colaboradoras do Vetsapiens, Dra.Mary Marcondes e Dra. Iauani Varison Costa Pancieri, abordam várias dúvidas dos clínicos sobre vacinas, entre elas: Quantas doses de vacina precisam ser administradas em filhotes? E se atrasar a administração? Por que alguns filhotes desenvolvem parvovirose ou cinomose durante o protocolo vacinal? O que fazer com a vacinação de animais que estão em tratamentos imunossupressivos? Aperte o play para essas respostas e outras mais.   Dra. Mary Marcondes -  Médica veterinária formada pela Faculdade de Medicina Veterinária e Zootecnia da Universidade de São Paulo (FMVZ-USP). -  Residência em Clínica Médica e Cirúrgica de Pequenos Animais pela FMVZ-USP. -  Mestre pela FMVZ-UNESP, Campus de Botucatu, Doutora pela FMVZ-USP e Livre-Docente pela Faculdade de Medicina Veterinária da UNESP, Campus de Araçatuba. - Pós-doutorado em doenças infecciosas na Faculdade de Veterinária da Universidade da Califórnia (UC Davis). -  Professora Associada aposentada de Clínica Médica e de Enfermidades Infecciosas de Pequenos Animais da Faculdade de Medicina Veterinária, UNESP, Campus de Araçatuba. -  Presidente do Grupo de Diretrizes de Vacinação (VGG) da Associação Mundial de Veterinários de Pequenos Animais (WSAVA).     Dra. Iauani Varison Costa Pancieri Médica Veterinária graduada pela Universidade Estadual de Londrina. Consultora Técnica da Boehringer Ingelheim.   Conecte-se com o Vetsapiens! www.vetsapiens.com https://www.facebook.com/vetsapiens https://www.instagram.com/vetsapiens/

Vanguard Garage Gaming
Conquest Q4 Catalogue Reveal - Vanguard Garage Gaming Episode 72

Vanguard Garage Gaming

Play Episode Listen Later Aug 11, 2024 68:21


Welcome back to VGG! Join us as we go through the brand-new catalogue for the last quarter of 2024 and all the amazing releases Para Bellum has coming for you all! Don't forget you can use the code VGG10 for 10% off your orders on the Para Bellum Eshop!

Tales of a Gearhead
Derek Bieri from Vice Grip Garage!

Tales of a Gearhead

Play Episode Listen Later May 16, 2024 29:30


This episode begins with part one of Stacey's interview Derek Bieri from Vice Grip Garage. They discuss Derek's youth growing up on a farm in Minnesota & Wisconsin and how that led to his automotive passion, the early days of his shop and the creation of his wildly popular YouTube Channel. Then it's into the mailbag where Stacey answers some listener questions about removing oil from your vehicle, cleaning and maintaining leather, and the differences between protectants and cleaners.

bieri minnesota wisconsin vgg stacey david gearz vice grip garage
Falso Vivo Archivos
Escena UNR - Laucha Bass

Falso Vivo Archivos

Play Episode Listen Later Dec 5, 2023 24:31


En Escena UNR nos visitó Laucha Bass antes de su fecha en La casa de la cultura de VGG donde va a presenta su nuevo disco, Buscando La Salida.

Tee Time - Der Golfpodcast
Tee Time GolfCamp und der VGG

Tee Time - Der Golfpodcast

Play Episode Listen Later Oct 16, 2023 29:46


In dieser Folge sprechen Bernd, Flo und Zille über DAWN, den VGG, Marcel Siems beste Runde und das Tee Time GolfCamp im April auf Mallorca!

Golf – meinsportpodcast.de
Tee Time GolfCamp und der VGG

Golf – meinsportpodcast.de

Play Episode Listen Later Oct 16, 2023 29:46


Dein Golf Podcast Zille gründet den VGG Zille liebt Golf. Kommt aber einfach nicht zum spielen. Warum sollte es dafür nicht auch den passenden Club geben? Zilles Überlegung: Gründung des VGG - die Vereinigung golffreier Golfer. Marcel Siem spielt die beste Runde seiner Karriere Das war mal wieder genau nach seinem Geschmack. Wenn einer Show liebt und Show kann, dann Marcel Siem. Bei der Open de Espana ging es am letzten Loch noch um die Chance eine 59 ins Ziel zu bringen. Am Ende wurde es mit ein er 61 die beste Runde seiner Karriere und ...Du möchtest deinen Podcast auch kostenlos hosten und damit Geld verdienen? Dann schaue auf www.kostenlos-hosten.de und informiere dich. Dort erhältst du alle Informationen zu unseren kostenlosen Podcast-Hosting-Angeboten. kostenlos-hosten.de ist ein Produkt der Podcastbude.Gern unterstützen wir dich bei deiner Podcast-Produktion.

Fridays on the Fly
406 - Colors Edge

Fridays on the Fly

Play Episode Listen Later Jul 28, 2023


VGG garage - engine swap at a car showWard still has paint for the SonataWard's cord wrap for a compressorVacation to Niagara FallsDisney vs UniversalGreat Wolf LodgeCar Shows

#arthistoCast – der Podcast zur Digitalen Kunstgeschichte
Folge 4: Visuelles Flanieren – Mit Computer Vision in großen Bildmengen suchen

#arthistoCast – der Podcast zur Digitalen Kunstgeschichte

Play Episode Listen Later Jul 5, 2023 74:06


Im Zuge der Digitalisierung von Museums- und Archivbeständen sind wir in der Kunstgeschichte mit einer enormen Menge heterogener Bilddatenbanken konfrontiert. Aber wie können wir uns diese großen Bilddatenmengen erschließen? Was ist visuelles Suchen und wie funktioniert die Technik dahinter?In dieser Folge spricht Jacqueline Klusik-Eckert mit Prof. Dr. Peter Bell und Stefanie Schneider, M.Sc., über das visuelle Suchen in großen Bilddatenmengen. Dabei geht es neben einer Reflexion über unsere Suchstrategien in der Kunstgeschichte auch um Prototypen für das visuelle Suchen. Hierbei werden in experimentellen Anwendungen unterschiedliche Verfahren des Computersehens, Computer Vision, erprobt. Angefangen bei der Frage, ob es visuelles Suchen überhaupt schon gibt, werden unterschiedliche Suchverhalten und Routinen besprochen, wie man sich großen Datenmengen nähern kann. Dabei wird klar, dass das visuelle Suchen mittels Computer Vision Verfahren eher einem mäanderndem Flanieren ähnelt und hilft, über unsere menschlichen Wahrnehmungsgrenzen hinauszugehen. Welche Rolle diese Hilfsmittel bei der Erschließung von unkategorisierten Datenmengen spielen und wie man sie auch zur Inspiration für neue Forschungsideen nutzen kann, wird im gemeinsamen Gespräch erörtert.Dabei gewinnt man einen Einblick in die Technik hinter der Benutzeroberfläche. Denn oft ist nicht klar, was ein Algorithmus als “ähnlich” betrachtet oder warum gewisse Werke miteinander in eine Art Punktwolke, dem Skatterplot, gruppiert werden. Die beiden Experti*innen erklären die dahinterliegenden Verfahren und zeigen auch ihre Grenzen auf. Es wird klar, dass der Einsatz dieser digitalen Werkzeuge als Hilfsmittel auch immer mit einer Diskussion über facheigene etablierte Verfahren und Methoden des Recherchierens und Suchens einhergeht.Prof. Dr. Peter Bell ist Professor für Kunstgeschichte und Digital Humanities an der Philipps-Universität Marburg. In seiner Forschung beschäftigt er sich schon länger mit den Einsatzszenarien von Computer Vision für die Kunstgeschichte. In seiner Arbeitsgruppe wurde u.a. die Bildsuche imgs.ai von Fabian Offert entwickelt.Stefanie Schneider, M.Sc., ist Wissenschaftliche Assistentin für Digitale Kunstgeschichte an der Ludwigs-Maximilians-Universität München. Als Fachinformatikerin und ausgebildete Anwendungsentwicklerin hat sie schon einige Prototypen für die Digitale Kunstgeschichte entwickelt und spricht über das Projekt „iART – Ein interaktives Analyse- und Retrieval-Tool zur Unterstützung von bildorientierten Forschungsprozessen“Begleitmaterial zu den Folgen findest du auf der Homepage unter https://www.arthistoricum.net/themen/podcasts/arthistocastAlle Folgen des Podcasts werden bei heidICON mit Metadaten und persistentem Identifier gespeichert. Die Folgen haben die Creative-Commons-Lizenz CC BY 4.0 und können heruntergeladen werden. Du findest sie unterhttps://heidicon.ub.uni-heidelberg.de/#/detail/1738702Bei Fragen, Anregungen, Kritik und gerne auch Lob kannst du gerne per Mail an uns schicken unterpodcast@digitale-kunstgeschichte.de

GV清槍BAR
EP87|情人節我們來約會吧!-G@mes虛擬約會系列

GV清槍BAR

Play Episode Listen Later Feb 12, 2023 28:53


小額贊助支持本節目: https://open.firstory.me/user/ckpkwnma34org0852t14kh1nk 留言告訴我你對這一集的想法: https://open.firstory.me/user/ckpkwnma34org0852t14kh1nk/comments 【本集介紹

The Nonlinear Library
LW - SolidGoldMagikarp (plus, prompt generation) by Jessica Rumbelow

The Nonlinear Library

Play Episode Listen Later Feb 5, 2023 10:27


Welcome to The Nonlinear Library, where we use Text-to-Speech software to convert the best writing from the Rationalist and EA communities into audio. This is: SolidGoldMagikarp (plus, prompt generation), published by Jessica Rumbelow on February 5, 2023 on LessWrong. Work done at SERI-MATS, over the past two months, with Matthew Watkins. TL;DR: Anomalous Tokens: a mysterious failure mode for GPT (which reliably insulted my colleague Matthew) We have found a set of anomalous tokens which result in a previously undocumented failure mode for GPT2 and GPT3 models. (The instruct models are particularly deranged.) It also appears to break determinism in the playground at temperature 0, which shouldn't happen. Prompt Generation: a new interpretability method for language models (which reliably finds prompts that result in a target completion). Good for eliciting knowledge Generating adversarial inputs Automating prompt search (e.g. for fine-tuning) In this post, we'll introduce the prototype of a new model-agnostic interpretability method for language models which reliably generates adversarial prompts that result in a target completion. We'll also demonstrate a previously undocumented failure mode for GPT-2 and GPT-3 language models, which results in bizarre completions (in some cases explicitly contra to the purpose of the model), and present the results of our investigation into this phenomenon. First up, prompt generation. An easy intuition for this is to think about feature visualisation for image classifiers (an excellent explanation here, if you're unfamiliar with the concept). We can study how a neural network represents concepts by taking some random input and using gradient descent to tweak it until it it maximises a particular activation. The image above shows the resulting inputs that maximise the output logits for the classes 'goldfish', 'monarch', 'tarantula' and 'flamingo'. This is pretty cool! We can see what VGG thinks is the most 'goldfish'-y thing in the world, and it's got scales and fins. Note though, that it isn't a picture of a single goldfish. We're not seeing the kind of input that VGG was trained on. We're seeing what VGG has learned. This is handy: if you wanted to sanity check your goldfish detector, and the feature visualisation showed just water, you'd know that the model hadn't actually learned to detect goldfish, but rather the environments in which they typically appear. So it would label every image containing water as 'goldfish', which is probably not what you want. Time to go get some more training data. So, how can we apply this approach to language models? Some interesting stuff here. Note that as with image models, we're not optimising for realistic inputs, but rather for inputs that maximise the output probability of the target completion, shown in bold above. So now we can do stuff like this: And this: I'll leave it to you to lament the state of the internet that results in the above optimised inputs for the token ' girl'. How do we do this? It's tricky, because unlike pixels, the inputs to LLMs are discrete tokens. This is not conducive to gradient descent. However, these discrete tokens are mapped to embeddings, which do occupy a continuous, albeit sparse, space. (Most of this space doesn't correspond actual tokens – there is a lot of space between tokens in embedding space, and we don't want to find a solution there.) However, with a combination of regularisation and explicit coercion to keep embeddings close to the realm of legal tokens during optimisation, we can make it work. Code available here if you want more detail. Prompt generation is only possible because token embedding space is semantically meaningful. Related tokens are close together. We found this out by doing k-means over the embedding space of the GPT vocabulary, and found many clusters that are surprisingly robust to random initialisation of the centroids. Here are a few examples. During this process we found some weir...

The Nonlinear Library
AF - SolidGoldMagikarp (plus, prompt generation) by Jessica Rumbelow

The Nonlinear Library

Play Episode Listen Later Feb 5, 2023 23:53


Welcome to The Nonlinear Library, where we use Text-to-Speech software to convert the best writing from the Rationalist and EA communities into audio. This is: SolidGoldMagikarp (plus, prompt generation), published by Jessica Rumbelow on February 5, 2023 on The AI Alignment Forum. Work done at SERI-MATS, over the past two months, by Jessica Rumbelow and Matthew Watkins. TL;DR Anomalous tokens: a mysterious failure mode for GPT (which reliably insulted Matthew) We have found a set of anomalous tokens which result in a previously undocumented failure mode for GPT-2 and GPT-3 models. (The 'instruct' models “are particularly deranged” in this context, as janus has observed.) Many of these tokens reliably break determinism in the OpenAI GPT-3 playground at temperature 0 (which theoretically shouldn't happen). Prompt generation: a new interpretability method for language models (which reliably finds prompts that result in a target completion). This is good for: eliciting knowledge generating adversarial inputs automating prompt search (e.g. for fine-tuning) In this post, we'll introduce the prototype of a new model-agnostic interpretability method for language models which reliably generates adversarial prompts that result in a target completion. We'll also demonstrate a previously undocumented failure mode for GPT-2 and GPT-3 language models, which results in bizarre completions (in some cases explicitly contrary to the purpose of the model), and present the results of our investigation into this phenomenon. Further detail can be found in a follow-up post. Prompt generation First up, prompt generation. An easy intuition for this is to think about feature visualisation for image classifiers (an excellent explanation here, if you're unfamiliar with the concept). We can study how a neural network represents concepts by taking some random input and using gradient descent to tweak it until it it maximises a particular activation. The image above shows the resulting inputs that maximise the output logits for the classes 'goldfish', 'monarch', 'tarantula' and 'flamingo'. This is pretty cool! We can see what VGG thinks is the most 'goldfish'-y thing in the world, and it's got scales and fins. Note though, that it isn't a picture of a single goldfish. We're not seeing the kind of input that VGG was trained on. We're seeing what VGG has learned. This is handy: if you wanted to sanity check your goldfish detector, and the feature visualisation showed just water, you'd know that the model hadn't actually learned to detect goldfish, but rather the environments in which they typically appear. So it would label every image containing water as 'goldfish', which is probably not what you want. Time to go get some more training data. So, how can we apply this approach to language models? Some interesting stuff here. Note that as with image models, we're not optimising for realistic inputs, but rather for inputs that maximise the output probability of the target completion, shown in bold above. So now we can do stuff like this: And this: We'll leave it to you to lament the state of the internet that results in the above optimised inputs for the token ' girl'. How do we do this? It's tricky, because unlike pixel values, the inputs to LLMs are discrete tokens. This is not conducive to gradient descent. However, these discrete tokens are mapped to embeddings, which do occupy a continuous space, albeit sparsely. (Most of this space doesn't correspond actual tokens – there is a lot of space between tokens in embedding space, and we don't want to find a solution there.) However, with a combination of regularisation and explicit coercion to keep embeddings close to the realm of legal tokens during optimisation, we can make it work. Code available here if you want more detail. This kind of prompt generation is only possible because token embedding space has a kind of semantic coherence. Semantically related tokens tend to be found close together. We discov...

The Nonlinear Library: Alignment Forum Weekly
AF - SolidGoldMagikarp (plus, prompt generation) by Jessica Rumbelow

The Nonlinear Library: Alignment Forum Weekly

Play Episode Listen Later Feb 5, 2023 23:53


Link to original articleWelcome to The Nonlinear Library, where we use Text-to-Speech software to convert the best writing from the Rationalist and EA communities into audio. This is: SolidGoldMagikarp (plus, prompt generation), published by Jessica Rumbelow on February 5, 2023 on The AI Alignment Forum. Work done at SERI-MATS, over the past two months, by Jessica Rumbelow and Matthew Watkins. TL;DR Anomalous tokens: a mysterious failure mode for GPT (which reliably insulted Matthew) We have found a set of anomalous tokens which result in a previously undocumented failure mode for GPT-2 and GPT-3 models. (The 'instruct' models “are particularly deranged” in this context, as janus has observed.) Many of these tokens reliably break determinism in the OpenAI GPT-3 playground at temperature 0 (which theoretically shouldn't happen). Prompt generation: a new interpretability method for language models (which reliably finds prompts that result in a target completion). This is good for: eliciting knowledge generating adversarial inputs automating prompt search (e.g. for fine-tuning) In this post, we'll introduce the prototype of a new model-agnostic interpretability method for language models which reliably generates adversarial prompts that result in a target completion. We'll also demonstrate a previously undocumented failure mode for GPT-2 and GPT-3 language models, which results in bizarre completions (in some cases explicitly contrary to the purpose of the model), and present the results of our investigation into this phenomenon. Further detail can be found in a follow-up post. Prompt generation First up, prompt generation. An easy intuition for this is to think about feature visualisation for image classifiers (an excellent explanation here, if you're unfamiliar with the concept). We can study how a neural network represents concepts by taking some random input and using gradient descent to tweak it until it it maximises a particular activation. The image above shows the resulting inputs that maximise the output logits for the classes 'goldfish', 'monarch', 'tarantula' and 'flamingo'. This is pretty cool! We can see what VGG thinks is the most 'goldfish'-y thing in the world, and it's got scales and fins. Note though, that it isn't a picture of a single goldfish. We're not seeing the kind of input that VGG was trained on. We're seeing what VGG has learned. This is handy: if you wanted to sanity check your goldfish detector, and the feature visualisation showed just water, you'd know that the model hadn't actually learned to detect goldfish, but rather the environments in which they typically appear. So it would label every image containing water as 'goldfish', which is probably not what you want. Time to go get some more training data. So, how can we apply this approach to language models? Some interesting stuff here. Note that as with image models, we're not optimising for realistic inputs, but rather for inputs that maximise the output probability of the target completion, shown in bold above. So now we can do stuff like this: And this: We'll leave it to you to lament the state of the internet that results in the above optimised inputs for the token ' girl'. How do we do this? It's tricky, because unlike pixel values, the inputs to LLMs are discrete tokens. This is not conducive to gradient descent. However, these discrete tokens are mapped to embeddings, which do occupy a continuous space, albeit sparsely. (Most of this space doesn't correspond actual tokens – there is a lot of space between tokens in embedding space, and we don't want to find a solution there.) However, with a combination of regularisation and explicit coercion to keep embeddings close to the realm of legal tokens during optimisation, we can make it work. Code available here if you want more detail. This kind of prompt generation is only possible because token embedding space has a kind of semantic coherence. Semantically related tokens tend to be found close together. We discov...

Ingenios@s de Sistemas
Episodio 168 - Proyectos IA IV

Ingenios@s de Sistemas

Play Episode Listen Later Dec 7, 2022 12:57


En el episodio de esta semana seguimos con ideas de proyectos sobre inteligencia artificial que podrás realizar por tu cuenta con estas pequeñas guías de ideas, atrévete a ser un ingenios@ de sistemas y poner en practica tus conocimientos 6. Modelo de reconocimiento de gestos de la mano Puedes crear una aplicación web de reconocimiento de gestos en Python. Para ello, puedes utilizar la base de datos de reconocimiento de gestos de la mano en Kaggle. Este conjunto de datos consta de 20.000 gestos etiquetados. Puedes entrenar este conjunto de datos en VGG-16. También puedes utilizar OpenCV para recoger un flujo de datos de vídeo en directo y utilizar el modelo para detectar y hacer predicciones sobre los gestos de la mano en tiempo real. Incluso puedes crear una aplicación de reconocimiento de gestos de la mano. Despliega tu modelo en un servidor y deja que haga predicciones a medida que los usuarios hacen una variedad de gestos con las manos. Dataset: Kaggle Hand Gesture Recognition 7. Modelo de generación de texto GitHub: GPT-3 8. Detección del color Dataset: Kaggle Color Recognition Dataset 9. Aplicación de reconocimiento de la lengua de signos con Python Dataset: World-Level American Sign Language dataset 10. Detección de la violencia en los vídeos Datasets: Violent Flows Dataset / Hockey Fight Videos Dataset Déjame un mensaje de voz

Astro arXiv | all categories
Detection of Einstein Telescope gravitational wave signals from binary black holes using deep learning

Astro arXiv | all categories

Play Episode Listen Later Nov 28, 2022 0:54


Detection of Einstein Telescope gravitational wave signals from binary black holes using deep learning by Wathela Alhassan et al. on Monday 28 November The expected volume of data from the third-generation gravitational waves (GWs) Einstein Telescope (ET) detector would make traditional GWs search methods such as match filtering impractical. This is due to the large template bank required and the difficulties in waveforms modelling. In contrast, machine learning (ML) algorithms have shown a promising alternative for GWs data analysis, where ML can be used in developing semi-automatic and automatic tools for the detection, denoising and parameter estimation of GWs sources. Compared to second generation detectors, ET will have a wider accessible frequency band but also a lower noise. The ET will have a detection rate for Binary Black Holes (BBHs) and Binary Neutron Stars (BNSs) of order 1e5 - 1e6 per year and 7e4 per year respectively. In this work, we explore the possibility and efficiency of using convolutional neural networks (CNNs) for the detection of BBHs mergers in synthetic GWs signals buried in gaussian noise. The data was generated according to the ETs parameters using open-source tools. Without performing data whitening or applying bandpass filtering, we trained four CNN networks with the state-of-the-art performance in computer vision, namely VGG, ResNet and DenseNet. ResNet has significantly better performance, detecting BBHs sources with SNR of 8 or higher with 98.5% accuracy, and with 92.5%, 85%, 60% and 62% accuracy for sources with SNR range of 7-8, 6-7, 5-6 and 4-5 respectively. ResNet, in qualitative evaluation, was able to detect a BBHs merger at 60 Gpc with 4.3 SNR. It was also shown that, using CNN for BBHs merger on long time series data is computationally efficient, and can be used for near-real-time detection. arXiv: http://arxiv.org/abs/http://arxiv.org/abs/2211.13789v1

Astro arXiv | all categories
Detection of Einstein Telescope gravitational wave signals from binary black holes using deep learning

Astro arXiv | all categories

Play Episode Listen Later Nov 27, 2022 0:56


Detection of Einstein Telescope gravitational wave signals from binary black holes using deep learning by Wathela Alhassan et al. on Sunday 27 November The expected volume of data from the third-generation gravitational waves (GWs) Einstein Telescope (ET) detector would make traditional GWs search methods such as match filtering impractical. This is due to the large template bank required and the difficulties in waveforms modelling. In contrast, machine learning (ML) algorithms have shown a promising alternative for GWs data analysis, where ML can be used in developing semi-automatic and automatic tools for the detection, denoising and parameter estimation of GWs sources. Compared to second generation detectors, ET will have a wider accessible frequency band but also a lower noise. The ET will have a detection rate for Binary Black Holes (BBHs) and Binary Neutron Stars (BNSs) of order 1e5 - 1e6 per year and 7e4 per year respectively. In this work, we explore the possibility and efficiency of using convolutional neural networks (CNNs) for the detection of BBHs mergers in synthetic GWs signals buried in gaussian noise. The data was generated according to the ETs parameters using open-source tools. Without performing data whitening or applying bandpass filtering, we trained four CNN networks with the state-of-the-art performance in computer vision, namely VGG, ResNet and DenseNet. ResNet has significantly better performance, detecting BBHs sources with SNR of 8 or higher with 98.5% accuracy, and with 92.5%, 85%, 60% and 62% accuracy for sources with SNR range of 7-8, 6-7, 5-6 and 4-5 respectively. ResNet, in qualitative evaluation, was able to detect a BBHs merger at 60 Gpc with 4.3 SNR. It was also shown that, using CNN for BBHs merger on long time series data is computationally efficient, and can be used for near-real-time detection. arXiv: http://arxiv.org/abs/http://arxiv.org/abs/2211.13789v1

PaperPlayer biorxiv neuroscience
Deep learning algorithms reveal a new visual-semantic representation of familiar faces in human perception and memory

PaperPlayer biorxiv neuroscience

Play Episode Listen Later Oct 18, 2022


Link to bioRxiv paper: http://biorxiv.org/cgi/content/short/2022.10.16.512398v1?rss=1 Authors: Shoham, A., Grosbard, I., Patashnik, O., Cohen-Or, D., Yovel, G. Abstract: Recent studies show significant similarities between the representations humans and deep neural networks (DNNs) generate for faces. However, two critical aspects of human face recognition are overlooked by these networks. First, human face recognition is mostly concerned with familiar faces, which are encoded by visual and semantic information, while current DNNs solely rely on visual information. Second, humans represent familiar faces in memory, but representational similarities with DNNs were only investigated for human perception. To address this gap, we combined visual (VGG-16), visual-semantic (CLIP), and natural language processing (NLP) DNNs to predict human representations of familiar faces in perception and memory. The visual-semantic network substantially improved predictions beyond the visual network, revealing a new visual-semantic representation in human perception and memory. The NLP network further improved predictions of human representations in memory. Thus, a complete account of human face recognition should go beyond vision and incorporate visual-semantic, and semantic representations. Copy rights belong to original authors. Visit the link for more info Podcast created by Paper Player, LLC

Vanguard Garage Gaming
Conquest FAQ and Errata June 2022 - Vanguard Garage Gaming Episode 51

Vanguard Garage Gaming

Play Episode Listen Later Jul 20, 2022 69:08


New rules updates means new VGG episode! Join us as we go through the new FAQ and Errata, for June 2022 Organised Play as well as the Army List updates bundled in as well! Don't forget you can use our affiliate code VGG10 on checkout on the Para Bellum Eshop for 10% off your first order with it! Follow our Facebook page to keep up to date with our content and giveaways!

Video Game Grooves
Episode 94 :: Street Fighter Alpha 2, Skullgirls

Video Game Grooves

Play Episode Listen Later Apr 24, 2022 97:19


Blog link: http://videogamegrooves.com/2022/04/24/episode-94-street-fighter-alpha-2-skullgirls No fighting game soundtrack left unfeatured! At least, that seems to be our motto, but can you blame us? We just can't pass up these pristine pressings of pugilistic polyphony! This week, Anthony takes us back to class and demonstrates the musical evolution of the Street Fighter series with Street Fighter Alpha 2. We listen to some of the riffs on the classic SF2 themes, and we're introduced to some new ones that fit seamlessly into the pantheon of music... but what are we left humming? Then we take a jog on the jazzy and jiggly side with Skullgirls, jamming to Michiru Yamane and Vincent Diamante's homage to the 1940s, while the gameplay recalls Marvel vs Capcom 2. The game's interesting history and ambitious art and music are front and center for appreciation. We may throw down a few gauntlets in this episode. Ready? Fight! We press on to discuss the "genre" considerations of listenability and vinyl pressing. Why have fighting games been regularly featured on VGG, and what types of games seem to be missing? We also catch you up on the latest releases and announcements! Could international currency exchange work in your favor this week? Mmmmmaybe. Outro: "Guy Theme" - Street Fighter 2 Alpha, by Setsuo Yamamoto, Syun Nishigaki, Tatsuro Suzuki Twitter – @vg_grooves, @jeremy_lamont, @ajohnagnello Links: Chrono Cross: The Radical Dreamers Edition Vinyl (Square Enix US) (Square Enix JP)    https://store.na.square-enix-games.com/en_US/product/725855/chrono-cross-the-radical-dreamers-edition-vinyl    https://store.jp.square-enix.com/item/SQEX_10936.html Final Fantasy Chocobo and Friends (Square Enix US)    https://store.na.square-enix-games.com/en_US/product/725858/chocobo-and-friends-select-tracks-from-the-fantasy-series-compi-vinyl-set Final Fantasy 9 (Square Enix US)    https://store.na.square-enix-games.com/en_US/product/726993/final-fantasy-ix-vinyl Needy Girl Overdose (Frontier Works, Amazon JP)    https://www.amazon.co.jp/dp/B09WYJYL5K/ Deathloop (Limited Edition X4LP Boxset) (Laced Records)    https://www.lacedrecords.co/products/deathloop-original-soundtracklimited-edition-x4lp-boxset Deathloop (Deluxe Double Vinyl) (Laced Records)    https://www.lacedrecords.co/collections/vinyl/products/deathloop-original-soundtrack-deluxe-double-vinyl Tiny Tina's Wonderlands (Laced Records)    https://www.lacedrecords.co/products/tiny-tina-s-wonderlands-limited-edition-deluxe-double-vinyl Far Cry 6 (Laced Records)    https://www.lacedrecords.co/products/far-cry-6-limited-edition-deluxe-triple-vinyl Mercenary Kings (Yetee Records)    https://theyetee.com/products/mercenary-kings-soundtrack Streets Of Rage 4: Mr. X Nightmare (Brave Wave)    https://limitedrungames.com/collections/all-soundtracks/products/streets-of-rage-4-mr-x-nightmare-vinyl-soundtrack Umurangi Generation (Stumpy Frog Records)    https://www.stumpyfrog.com/ About That... Paradise Killer B-Sides (Black Screen Records)    https://blackscreenrecords.com/collections/paradise-killer/products/about-that-paradise-killer-b-sides Eastward (iam8bit) Standard: https://www.iam8bit.com/collections/eastward/products/eastward-2xlp-vinyl-soundtrack Board game: https://www.iam8bit.com/collections/eastward/products/eastward-2xlp-limited-edition-board-game Unpacking (Limited Run Games)    https://limitedrungames.com/collections/all-games/products/unpacking-2lp-vinyl-soundtrack Assassin's Creed Valhalla: Dawn Of Ragnarök (Lakeshore Records)    https://www.lakeshorerecordsshop.com/product/assassin-s-creed-valhalla-dawn-of-ragnarok-original-game-soundtrack Banjo-Kazooie Re-Jiggyed (Respawned Records) (Black Screen Records) https://respawnedrecords.com/collections/vinyl-releases/products/banjo-kazooie-re-jiggyed    https://blackscreenrecords.com/collections/soundtracks-vinyl/products/banjo-kazooie-re-jiggyed Hypnospace Outlaw (Fangamer)

The Mental Health Podcast
#mhTV episode 79 - The role of the mental health nurse in mental health tribunals

The Mental Health Podcast

Play Episode Listen Later Feb 4, 2022 52:21


Welcome to episode 79 [originally broadcast on Thursday 3 February 2022] of #mhTV​​​​​​​​​​​​​. This week Vanessa Gilmartin Garrity and Nicky Lambert spoke with guest Helen Rees about the role of the mental health nurse in mental health tribunals. Helen Rees is a mental health nurse, health visitor and lecturer specialising in working with children and young people experiencing mental distress and nursing education. A key area of teaching interest is promoting the role of the mental health nurse in supporting people with the safeguards built into mental health legislation. Some Twitter links to follow are: VGG - https://twitter.com/VanessaRNMH NL - https://twitter.com/niadla​​​​​​​​​​​​​ HR - https://twitter.com/LavelleRees Credits: Presenter: Vanessa Gilmartin-Garrity & Nicky Lambert Guests: Helen Rees Theme music: Tony Gillam Production & Editing: David Munday (http://twitter.com/davidamunday)

Anomia - le partenaire Business des avocats
« Malgré les contraintes chez Bredin Prat, il fallait que je développe ma clientèle » Julien Sanciet, Associé fondateur chez Argos Avocats

Anomia - le partenaire Business des avocats

Play Episode Listen Later Jan 10, 2022 35:45


Cette semaine nous avons eu l'occasion d'échanger avec maître Julien Sanciet, avocat fondateur chez Argot Avocats.Pendant ses études au DJCE de Nancy, il se dirige vers le corporate. De ce fait, il choisit de passer son premier stage ainsi que sa première collaboration chez Bredin Prat, où il restera près de 7 ans. Julien nous parle des Jumbo Deal qu'il traitait et du management des avocats plus juniors.Il nous parle plus en détail du début de son développement de clientèle et notamment de son premier deal qu'il a traité conjointement avec Antoine Maisonneuve. Il développe de plus en plus sa clientèle, jusqu'au point critique où il ne peut plus développer sans y consacrer plus de temps.Il décide de quitter Bredin Prat après 7 ans, pour rejoindre le cabinet VGG en tant que Counsel. Il continue de faire des dossiers corporate large cap, mais avec une typologie de dossiers plus étaillée.Toutefois, après 1 an chez VGG, il choisit d'amorcer une aventure entrepreneuriale avec Magali Carosso, qu'il avait rencontré chez Bredin Prat lorsqu'il était collaborateur. Ils ont établi leur business plan et, depuis leur lancement en Octobre 2020, ils ont effectué pas moins d'une vingtaine de deals. Ils font maintenant face à des problématiques de recrutement.Mais nous ne vous en disons pas plus, et nous vous laissons découvrir cet épisode d'AdVocat !L'équipe Anomia vous souhaite une excellente écoute ! Voir Acast.com/privacy pour les informations sur la vie privée et l'opt-out.

The Mental Health Podcast
#mhTV episode 75 - Happy New Year?

The Mental Health Podcast

Play Episode Listen Later Jan 6, 2022 45:14


Welcome to episode 75 [originally broadcast on Wednesday 5 January 2022] of #mhTV​​​​​​​​​​​​​. This week Vanessa Gilmartin Garrity, Nicky Lambert and David Munday had a chat both looking backwards at 2021 and then forward to 2022 before we go back to our regular weekly episodes next week! Some Twitter links to follow are: VGG - https://twitter.com/VanessaRNMH NL - https://twitter.com/niadla​​​​​​​​​​​​​ DM - https://twitter.com/davidamunday Credits: Presenter: Vanessa Gilmartin-Garrity, Nicky Lambert & David Munday Theme music: Tony Gillam Production & Editing: David Munday

happy new year dm vgg david munday
Vanguard Garage Gaming
Conquest Rules Update 1.5.1 Deep Dive - Vanguard Garage Gaming Episode 37

Vanguard Garage Gaming

Play Episode Listen Later Jan 4, 2022 97:58


It's a new year of Conquest! And to start it all off we go back through the 1.5.1 Rules Update that snuck in just before the holidays and break down all the changes, this time with added Monty! We have some VGG dice up for sale as well, so please check out the Facebook page as everything to know about them is linked there! Get in quick if you want some, the stock is limited for this run and will let us know if we should do some more! And don't forget our affiliate code VGG10 when purchasing from the Para Bellum Eshop, you'll get 10% off your first purchase with it!

GV清槍BAR
EP30|2022新年快樂-超主觀年度G片排行榜

GV清槍BAR

Play Episode Listen Later Jan 1, 2022 30:45


【本集介紹

Video Game Grooves
Episode 87 :: Mana Wave Media, Magician Lord, The First Tree

Video Game Grooves

Play Episode Listen Later Oct 3, 2021 99:55


This Video Game Grooves podcast episode finds itself bookended between "magicians making machine gun sounds" and "undeniable cello" somehow, so figure that out. We're joined by Chehade Boulos from Mana Wave Media to talk about the work his young label is doing and how he plans to win the three-way-standoff with VGG cohost Caleb and Hiroki Kikuta. We begin this extraordinary discussion with Anthony's feature of Magician Lord, which is itself one of the better-known releases on the extraordinary Neo Geo. We appreciate its preposterous gameplay and its equally awesome music score by Yuka Watanabe. The Neo Geo exists in its own special world, including its sound, and we immerse ourselves in the experience while sparing ourselves the financial burden of the singular game console. We then let Chehade entrance us with The First Tree, the first release from his burgeoning label. We spend time talking about the game itself and its rather low-key development philosophy, and discuss how the "cinematic" score by Josh Kramer (and cello by Tina Guo) elevate the entire thing to make it an unassuming hit across multiple platforms. We take a moment to discuss the relationship between the most rudimentary of creative work being done in video games and how music forms a synesthesia to become a new entity in your mind and experience. ...but that gets a little too deep so we head over to new releases and announcements to get you in on that dirty capitalism you love to hate. Outro: "Magician's Dream" - Magician Lord, by Yuka Watanabe Mana Wave Media: http://www.manawave.co Twitter: https://twitter.com/manawavemedia Facebook: https://www.facebook.com/manawavemedia Instagram: https://www.instagram.com/manawavemedia/ Twitter – @vg_grooves, @jeremy_lamont, @ajohnagnello, @ch3records Links: Death's Gambit (Serenity Forge)    https://store.serenityforge.com/products/death-s-gambit-afterlife-2xlp-vinyl-soundtrack Windbound (Mana Wave Media)    https://manawave.co/products/windbound-lp-pre-order Star Stories (Super Mario Galaxy arrangement) (Mana Wave Media)    https://manawave.co/products/star-stories-lp-pre-order Super Monkey Ball Banana Mania (iam8bit)    https://www.iam8bit.com/products/super-monkey-ball-vinyl-soundtrack Evergate (Black Screen Records)    https://blackscreenrecords.com/products/evergate-original-soundtrack-by-m-r-miller Power Stone (Ship To Shore PhonoCo) https://shiptoshoremedia.com/collections/featured/products/power-stone NARITA BOY (Studio Koba)    https://studiokoba.com/music/ Incredibox - The Unreleased (Bandcamp)    https://incredibox.bandcamp.com/album/incredibox-the-unreleased Final Fantasy XIV: Endwalker (Square Enix NA) (Square Enix EU) (Square Enix UK)    https://store.na.square-enix-games.com/en_US/product/685130/endwalker-7-inch-vinyl-single-vinyl    https://store.eu.square-enix-games.com/en_EU/product/685472/endwalker-7-inch-vinyl-single    https://store.eu.square-enix-games.com/en_GB/product/685471/endwalker-7-inch-vinyl-single Jettomero: Hero of the Universe (Stumpy Frog Records, EU) (Channel 3 Records, US)    https://www.stumpyfrog.com/    https://ch3records.com/collections/vinyl/products/jettomero-hero-of-the-universe Sable (Channel 3 Records) (Mondo) (Light in the Attic)    https://ch3records.com/collections/vinyl/products/sable?variant=40906805477528    https://mondoshop.com/products/sable-original-video-game-soundtrack-2xlp    https://lightintheattic.net/releases/8098-sable-original-video-game-soundtrack Image Gallery

Game Investing
S3:E3 Grading Golden Age?

Game Investing

Play Episode Listen Later Jun 27, 2021 29:59


hopper attempts to cover a dozen grading companies after a 9.6 A++ sold for almost 4x of a 9.8 A Sonic 2 at Heritage Auctions within two weeks apart! Game Graders: WATA, VGA, UKG, CAS, IGS, VGG, WAG Card/Coin/Mag Graders: PSA, PCGS, BGS, BCCG, CGC, NGC, SGC, GMA, CBCS, etc. Under the 1st Amendment Freedom of Speech this podcast is for educational & entertainment purposes ONLY as this podcast is Ad-Free not for profit This episode's cover art is owned by Heritage Auctions under fair use for commentary ONLY as this episode is Ad-Free not for profit

Craig Peterson's Tech Talk
Tech Talk with Craig Peterson Podcast: The result of CPU and Disk Shortages during Pandemic, Big Tech and Anti-Trust Legislation, Info-Sec careers and more

Craig Peterson's Tech Talk

Play Episode Listen Later Feb 13, 2021 80:58


Welcome!   It is another busy week on the technology front.  We discuss Facial Recognition and some of the problems with false positives and how you can see if your pictures are included in some of these websites. Then we discuss Amy Klobachers anti-trust legislation against big tech.  Then we get into Info-Sec Careers and something you might want to know before considering a career move. We also discuss Zero-Trust and why you must be thinking about that if you want to be secure and there is even more, so be sure to Listen in. For more tech tips, news, and updates, visit - CraigPeterson.com. --- Tech Articles Craig Thinks You Should Read: Strengthening Zero Trust Architecture Here’s a Way to Learn if Facial Recognition Systems Used Your Photos Scalpers aren’t the main reason you can’t find a new console What I Wish I Knew at the Start of My InfoSec Career Chrome users have faced 3 security concerns over the past 24 hours Klobuchar targets Big Tech with biggest antitrust overhaul in 45 years I Fought the Dark Web and the Dark Web Won How the United States Lost to Hackers --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] We're going to talk a little bit about scalpers. They're not the main reason you can't find a new gaming console.  I've had a number of people ask about getting into information security. I'm going to give you some tips about what I wish I knew at the start of my career.  Hello everybody. Craig Peterson here.  I want to start out by talking a little bit about the facial recognition systems and there are a lot of concerns, legitimately, a lot of concerns because now our privacy is getting worse and worse. I'm going to talk next week a little bit, at least it's on my schedule about what's happening with GPS and pros and cons to it because there are some very concerning things about GPS. Much of our business and private lives is based on GPS, nowadays. You're in a plane, you're in a boat, trains, I guess don't use GPS a whole lot, but we depend on them in our cars, everywhere. We'll talk a little bit about that next week. When it comes to facial recognition, it has come to the forefront. Now we know that, for instance, London, England was probably the most surveilled city in the world. I don't think that's anywhere near true now, considering what the Chinese have been doing to their citizens. No, I probably shouldn't call them citizens. I'm not sure what the right thing would be to call them, but the people living over there in China are under a constant eye. They're even watching them over there for jaywalking and they use facial recognition systems to automatically send them a ticket. Oh, also this social credit score they have over there where if you do jaywalk or do something else, you get points taken off of your social credit score. If your score reaches a certain point, you can't even take public transportation anymore. That's how they're controlling people. One of the many ways that they're controlling people in China. These facial recognition systems are used there. We know they've been in use in London where they're trying to track people and reverse engineer crimes, someone commits a crime. There are sensors that listen for gunshots, for instance, and then they will just backtrack all of the people that were in the area. Okay. Watching them where they work, as you remember, it's being recorded. So you're here now, where did you come from? Some of that same type of technology was used in Washington, DC for what happened on January six, with the riot of well, 80 people. Some riot. We're also now aware of what was done in Oregon and in Washington state and New York City where they were tracking people as well now. Did they get charged? Did they go to jail? They were using facial recognition systems and they were figuring out where they were, where they had been. They were also looking forward to the fact, because unlike China, where they want to know where everybody is and they've got this whole social credit system. What we were doing is finding people who were committing serious crimes. The police obviously don't want to go into that area because there are so many rioters and they were armed with all kinds of things, the baseball bats, but they had frozen bottles of water. No, I don't know. I threw a bottle of water at him. You had. That thing, deep, frozen, in a deep freeze, below zero degrees, which is way cold Fahrenheit. You brought it with you and you use that liter bottle to bash someone over the head. We saw this again and again. So you find those people. You don't arrest them right away. You don't send the police in. No reason to put their lives in any more danger than they are everyday, normally. Then what you do is track them as they leave. Now when they were leaving, they were using facial recognition to figure out who was there and where did they go? That facial recognition technology then was able to track them down. Once they got into an area where there weren't a lot of rioters or no rioters about to get in their car, or however it is, they got there, they arrested them. Of course, some of these rioters, real rioters, right? Where there's hundreds of people rioting, not 80. They were able to track them down. Some of them were arrested, some of them were charged. In a lot of these cases, the mayor said, no, don't do anything. Just let them I was going to set them riot, but that's not how they phrased it. I'm trying to remember how they phrased it. So we are seeing. Facial recognition used in law enforcement. It's one thing to track them either.  What happens over in London where a crime is committed and they now track everybody back to figure out where did they come from? What car did they get into? Did they get out of it initially? Then what was the license plate number and who owns that car? Crime-solving that way, where they don't necessarily recognize your face. They don't know it's you.  However, now we're finding more and more of that happening, where the systems recognize your face and they know it's you, and they know what your social media accounts. They know obviously where you live, it's all tied in.  A lot of cases is tied in via your driver's license or now these federally mandated national ID cards that so many people are carrying around.  Apparently, I'll have to carry around to next time I get my license because my state has finally decided they are not going to issue regular driver's licenses anymore, which definitely bothers me. I'm sure you can figure that out too. How were they identifying people? It's one thing to see a face and okay. There's the face here. Okay. There's a face there. There's okay. Here. Okay. So he just got into this car to leave. That's one thing, right? I think that's pretty legit. You don't have a particular right to privacy when you're in a public place. In fact, you have no right to privacy when you enter a public place. So I don't have a problem with that.  Now we're using artificial intelligence and we've talked about some of them before, Clearview is a great example, clearview.ai. Here's a company that some would argue illegally captured scraped. What kind of her kind of wording you want to use pictures of people all from all over the internet and the police can subscribe to their service and Clearview says, Oh no, we only let police at it, although there's evidence that would suggest otherwise. They're allowing all kinds of third parties access to the database, but you can put a person's picture into their software.  Their software, by the way, includes a mobile app, so it can be done on the street and you know who they are.  Now, this is getting RoboCop-ish. If e you've ever seen the movie Robocop. Actually, there's a series of these things with the Ed two Oh nines. What happened is the police officer could go out and he'd be patrolling in the streets and he come across some people in the computer in that kind of the heads up display would figure out, okay, that's this person they've been arrested 20 times a felony, this and that, and okay that person was shoplifting with their names and addresses and things right there in the screen. That's been a theme of science fiction movies for very long time.   I interviewed probably about a decade ago, a guy out at the consumer electronic show who had a very cool device that you could wear.  It was designed for policemen and it was like a pair of big goggles back in the day, right? This is before Google glass and some of these other things came out, but they were able to with this the heads-up display put anything you wanted on it. So it's coming, it's not here yet. It's going to be here even more in the future.  If you want to check if your photo is part of all of this stash and there are billions literally of photos that Clearview AI has out there, but you can check at least the basics.  So many of us use this website online that allowed us to upload our photos and share them with friends and relatives and family, and put it together, and have a really great little album that you could share with people.  That was on a site called flicker. Today, many of us are uploading our photos to Amazon or to Google. Apple, of course, has many of them. What happened with flicker is they went out of business. They got sold and resold few times.  What they ended up doing is selling the pictures online. There's people I talked about this a couple of years ago, this guy driving down the highway and he sees a billboard with his picture on it, not the sort of thing that he was expecting that's for sure. It's probably not something you expected when you uploaded your photos to flicker. So take a minute.  Go to a website called exposing.ai.  This particular website is specifically aimed at flicker photos. It'll tell you if it has found your picture. So you can, you put in your flicker username and they'll let you know if your flicker photos have been taken and used for facial recognition by a few different companies.  Dive face, face scrub, mega phase Pippa, VGG face, and many others. You can just put in your username. You can put in a tag that you tagged that photo when you uploaded it, or the URL of a photo. If you have a photo, it is online and it's yours and you want to see if anybody else is using it somewhere on the internet.  The easy way to do this is to go to Google image search. You can upload the image, you can give it the URL of the image, and it'll tell you if it finds matching images or at least images that are close to it online.  Stick around. Visit me online Craig Peterson dot com. During the lockdown, we've had a lot of things that have become difficult to get your hands on. Turns out that includes various types of games like your PS5's, but it extends a whole lot further than that. Hi everybody. Craig Peterson here.  Here we go, man, another fallout from the whole lockdown thing. This is a pretty darn big deal because it's affected the entire computer industry. We've heard a lot of complaints about how difficult it's been to get a Sony PlayStation five or a Microsoft X-Box series SX. They both hit store shelves last year, but they have been almost impossible to find at any of the major retailers.  There's a great little article that was in ARS Technica, and they put together a graph based on some data obtained from E-bay. This data was looking at the availability and costs specifically of the PS five. Now, this is a fairly advanced computer, frankly, in order to play these video games, of course, it's got a lot of graphics capability built right into this silly thing.  It seems that there were a certain number of consoles sold on certain days at certain prices. You can see this massive price increase. It just jumped right up in November. Pretty much stayed up there in the thousand dollars plus range. Isn't that amazing.  It went down in January and is more or less flat right now. You can get them on eBay for about 380 bucks right now. Why is that? What's been going on here. We've got scalpers. Obviously, a thousand dollars is a lot higher than the $380 you can get it for right now.  It turns out that there is a huge problem and the problem we're seeing is affecting the entire computer world. There are certain chips for which there is a shortage. Why is there a shortage? Well, it had to do with the lockdown. Companies were trying to figure out, okay, how many of these devices am I going to sell when everybody's locked down?  They miscalculated, frankly. It wasn't a problem with supply. It was that these companies that had been ordering these components cut their orders back or stopped them entirely.  You've got Sony and others out there, Microsoft's console as well, trying to find the parts. They have had a very hard time. Well, what happens when it's hard to find something? Either the quality is going to go down to keep the price the same or the price is going to go up. There's only a couple of ways that it really can go.  They're estimating right now that these constraints on the supply chain are probably going to last for a few more months. We've seen it big time in the computer world, particularly in the storage space. You may not be aware of it, but there are, of course, hard disks that aren't really disks called SSD, which is a solid-state disk. Okay. You probably know about that. I wrote up a thing, in fact, Because people were asking me about what to buy, to upgrade their computers.  If you have a slower computer, putting an SSD in is usually a very good idea, but there are many grades of SSDs.  In fact, I've got a little document. If you want it to send an email to me@craigpeterson.com. I'll be glad to send you a copy. I wrote this for one of our clients. It drives me crazy. They need a new computer, in this case, a desktop. So they say, Hey Craig, can you guys go ahead and work us up a quote? So we look at what they're using the computer for. We look at the longevity of that computer so that they get the best bang for their buck and usefulness. How useful is it going to be? Is it going to be offline just five minutes a day, by the way, adds up to over $2,000 a year for just an average salary of a data entry worker.  It adds up pretty quickly if it goes down.   We put together this proposal and this was for a customed Dell machine and we specify all of the components that go into it. That's an important thing to remember because these components all have varying levels of quality.  We sent them the quote and we've done this before, right? Who's the fool here, them or us. They said no. I went to the Dell site and I got this special going on and then I can get the same computer for 300 bucks. Not true. It's not true. Now, you guys are the best and brightest, right? This sort of stuff, you can't compare a Yugo to a beautiful Cadillac right there. There's no comparison between the two, but that's what they were doing. They needed an F150 in order to haul stuff but instead of getting the F150, they just got a little hatchback that they can maybe throw a couple of things in the back, but they needed a big bed pickup truck. That just drives me crazy. So I wrote this probably three or four-page long, a thing explaining why you need to buy the right kind of hardware. Why the stuff that they're selling you at a discount isn't going to work for you and things need to be included, include things like the hardware encryption and SSDs.  Again, I'll send you this report if you want it. Just let me know, call me@craigpeterson.com.  I started this whole thing because we're talking about SSDs. SSDs are not all created equal. Some of these SSDs store one bit per little bubble, if you will. Some of them store two bits on them store three-bit bits. They're all constrained in their lifetime based on how many writes are occurring to that disc.  You've got to look at that as well to figure it out. Now, of course, I got into SSDs because we were talking about the capacity in manufacturing and the shortage that we're seeing right now. If some of these game consoles, there is a shortage in all of these types of disks, there's even a shortage of memory and certain CPUs.  The disc shortage started a few years ago when there was massive flooding in Indonesia. That's where a lot of the hard disks are made. Now, these are the things that spin, right? Now we've got new technology that lets us pack more data into the SSDs.  Whereas we were seeing the hard disk go up in size. I remember my first one was, I think it was five megabytes. It was just, Whoa, how could I have used five Meg and then 10 megabytes? Of course, hard disks, reasonably priced ones tend to 12 terabyte drives and again, multiple different types of drives.  There's the more server-oriented that if there's an error on the disk, the disc stays alive and it repairs itself in real-time in the background. Then there's the stuff you get as consumers where if the disc starts failing, the whole disc goes offline until it fits fixes itself. Then there's real crap. The ones like these green drives from Western digital, that I do not like. I just had confirmation on that this week that are even cheaper, but all of these are hard to get right now.  We will see eventually all of these supplies back in line. The manufacturers can make them. The whole lockdown hasn't really been a problem for them. The problem has been that people aren't ordering because they're afraid during the lockdown that people wouldn't be buying computers. Of course, we found the opposite to be true. Didn't we.  People were buying these consoles to play video games. Buying computers to work from home. Trying to buy network security stuff as well.  That's really changed the whole thing.  When we get back, let's get into we'll get into the InfoSec career a little bit later if you miss it. If you're thinking about getting into information security. Make sure you go online to Craig peterson.com. So you can catch that.  We'll talk about that, but let's do something I think that might affect a lot of people and that's Chrome users, three security problems in the last week. Hey, you guys are the best and brightest. You know what I think about Google and Google Chrome? Just this last week, over one 24 hour period, Chrome had three security problems. We're going to talk about that right now. Hi, everybody. Craig Peterson here.  Google is evil. I've established that I think, before, the things they do, the things they have been doing to us.  Remember their motto used to be, don't be evil. They removed that from the website a couple of years ago. Now, no longer don't be evil. Nowadays they're doing pretty much everything they can to, maybe be evil is a little strong a word, but they're pretty much-doing everything they can to get as much information about you and sell it.  Do you remember his goal? Larry Page when they were starting it up. The goal was okay, where we are going to get all of the world's information and democratize it. Make it available for everyone, anyone out there who wants to get at it. Frankly, it's been pretty good until fairly recently. At which point I switched over to duck duck go.  Chrome is another one of their products. Microsoft frankly, jumped right onto the Chrome bandwagon. What they ended up doing over Microsoft is taking Google's open-source version of the base of Chrome. They call it chromium. It's the guts, if you will, of the Google Chrome browser and they made it available to anyone that wants to get their hands on it. So Microsoft got their hands on it and messed around with it a little bit. As Microsoft is wont to do. They came up with their Edge browser. The latest Edge is really Google Chrome in disguise.  There are others out there too. You probably know if you've been through one of my courses when I'm talking about browsers. The Epic browser is a pretty good browser. It is designed to be more or less safe. But we go into that a lot more detail. In which cases is it not et cetera. Some people have used the Tor browser, which ties into the Onion network that provides even more anonymity. So there are options. Of course, Safaris available from Apple for almost every platform now. It is a very fast browser and it does a lot to try and keep your data secure. The same thing's true with Firefox. In the Improving Windows Security Course, I go into the problems with each one of these, including Firefox and what you have to consider.  This past week we had a bit of an issue. If you attended my webinars last year. This would have been in 2020.  I went through some of the privacy plugins that you can use for your browser. You might remember that one of them was something called the Great Suspender. Highly recommended at the time. Got to add that in there because I don't want you to just go grab it.  It was recommended. I used it, extensively on a bunch of different browsers, because what the Great Suspender did is save your machine's memory CPU, frankly, even a little bit of disc I/O when you were on a tab on your web browser, your tab would just respond.  Normally everything looks good, but if you're like me, you probably opened another tab or maybe another window and then another tab or another window. You just dig deeper and deeper as you're looking into something, trying to figure something out.  You might have 20 or 30 or 40 or 50 tabs. Open each one of those tabs represents a different thread, a different process, basically on your computer. That means it's using memory, it's using CPU and it might be also hitting your disk, using your disk. The Great Suspenders said wait a minute, now you haven't used this tab in whatever you set it for, I usually had it about 15 minutes. What I'm going to do now, Yes, I'm going to take a snapshot of this page.  I am going to just release all of the resources that were associated with the page. If you go back to that tab, all you have now is a snapshot, just a picture of what was on the page.  You can see what was on the page and depending on how you configure the Great Suspender, I had it set up so that if I activated a tab again, it would automatically reload that page. You could have had it so that if you got to that picture and you really wanted it, you'd click on it and it would reload the page. Very. Handy.  It allowed you to have hundreds of potentially of tabs open quote-unquote, when in fact they weren't open and they weren't using hardly any resources at all. The Great suspender this last June was sold.  The original person who wrote this thing, and it's a great little really great, actually a little piece of software decided that he wanted to make some money off of it. Why not?  He sold it. It's unclear as to who actually owns it or controls it right now and who he sold it to because the name of the account, the developer account, is the Great Suspender. So that's not going to help you at all.  It started showing some signs of what Google and what people are calling malice, under this new ownership. There was a thread in GitHub that was published in November and GitHub is where so much of this code is stored, right. It started to show some signs of frankly, of malice under this new ownership. They said that a new version contained malicious code that tracked users and manipulated web requests.  Now the Great Suspender did normally manipulate web requests, in order to keep everything flowing and smooth. So you might go to a website and then it suspends it, and it might use a different URL and the URL is going to cause the Great Suspender inside your browser to be called. Okay.  So I'm not sure what they mean about the manipulation here, but Google removed it. It's gone like that and no warning or anything else just within the last week. They completely removed the Great Suspender, not just from the store, they removed it from your machines where you were using it.  It said this - the extension contains malware, that's the only warning they gave. That is the only background they gave. They really haven't said a whole lot. People, by the way, who were using the Great Suspender were really left in a lurch because any suspended tabs when Google went bye-bye, any suspended tabs you had were a lost. How's that for a terrible thing? Absolutely terrible.  There is a Reddit thread out there that you can see.  They talk about how you can get your tabs back. So if you had followed my advice back then and put it on, good for you.  However, the problem is that it turned out to ultimately be malicious. So that's a big deal.  Remember I said three security problems in 24 hours, Google on Thursday, released a Chrome update that fixes what it called a zero-day vulnerability in the browser. This is another buffer, overflow problem. If you're programming, you know what that means in version eight, which is Google's open-source Javascript engine, and they rated it as high. Again, Google didn't say much about what the vulnerability was. Probably didn't want to encourage people to try and use it, but they said it was existing in the wild. That's not very good.  Then sync abuse, a security researcher reported on Thursday as well. Hackers were using malware that abused the Chrome sync feature to bypass firewalls so the malware could connect to command and control servers. Not good.   If you are using, if you have Chrome, I have it because I have to, cause I have to test things out.  If you are using it, make sure it is up to date. Most of the time Chrome will update itself, but this week is one where you should double-check Chrome and make sure it really has been updated. Cause these are some pretty nasties. All right.  I'm sure you're familiar with Senator Amy Klobuchar. She ran for President, under of course the Democrat ticket, this last election cycle. She is targeting big tech, at least. That's what she says. We'll talk about the reality. Hello everybody. Craig Peterson here. Thanks so much for joining us today. I really appreciate it. And I appreciate hearing from you as well. Any questions? I have so much information to give you guys we're starting some training courses, free email training, just everything me@craigpeterson.com. Any questions as well and visit me online at Craig peterson.com.  Senator Amy Klobuchar, is a Democrat from Minnesota and she has introduced a bill here in Congress and supposedly big tech is in her crosshairs. Now I think that's really funny because it's not in reality. Okay.  Here's an article from ARS Technica a very good website, by the way, on some of the tech. It says not only our major firms, such as Apple, Amazon, Facebook, and Google under investigation for allegedly breaking existing antitrust law.  A newly proposed bill in the Senate would make it harder for these and other firms to become so troublingly large in the first place.  If you've been listening to me for a while, I have friends that have been absolutely destroyed by some of these big tech firms. Where companies have gone ahead and then announced a product because they found, Oh, wait a minute. These guys over here, they're doing pretty darn well with that product. Let's see if we can't figure out if there's really a market forward or not end up, they're competing with us. So here's what we'll do. Let's go ahead and announce. We're going to have a product and it's going to be better than their product, and you can get it from us and you can rely on us. Don't pay attention to that small company over there. They are entirely unreliable.  All of a sudden that small company's sales plummet because people are waiting for big co to come up with their version of whatever it might be. Then they'll compare it to and maybe buy it a bit later on.  That's a way that many of these companies have grown and grown in a very big way.  Senator Klobuchar introduced this bill called Clara. Should have called it Clarice. The competition and anti-trust law enforcement reform act. This would be the largest overhaul to the US antitrust legislation in almost 50 years if it became law. It's interesting because her statement says while the United States once had some of the most effective antitrust laws in the world. Our economy today faces and massive competition problem.  I'm a little confused here. It looks like she is asking for competition. I don't know. I don't understand it. I thought she was one of these far-left ones. I remember the debates quite well. They're looking at expanding resources. In other words, give them more money at the federal trade commission, the department of justice in their antitrust division. They're looking to pursue a review of more mergers, more aggressively. Now my knee jerk reaction is, these big companies usually we'll fail. They usually just keep getting greedier and bigger. Look at what happened to GM. They went bankrupt and unfortunately, they use tax dollars to bail them out. Chrysler has gone bankrupt twice, and they've used our tax dollars to bail them out. I don't think that's a good idea.  Remember our tax dollars mean our time. We have to put in our time, we can't spend with our families. Time, we cannot spend on vacation. Time we cannot spend relaxing. It takes our time now, where we have to work to make money, to give to the government, to bail out companies that are failures. What the government decided to do rather than let these bigger companies fail as they ultimately always do. If you're old enough, you'll remember back in the seventies and eighties, IBM, too big to fail. They owned the business, the computer business in the sixties and seventies, and they just fell off the edge. Didn't they? That usually happens.  I'm not sure a hundred percent is going to happen with the social media companies but I suspect they are. Look at what's happening right now. If you have kids that are under 20, do they have a Facebook account? Even in their thirties, under 20-year-olds, they don't use Facebook anymore. Facebook is likely to die off unless they change in a big way. So what's Facebook do? They buy competitors. They buy WhatsApp. We've talked about WhatsApp before and my thoughts on that. They buy Instagram. They buy competitors and they use competitors too. Change their business model a little bit and move laterally rather than vertically. That's not a bad idea in business.  Frankly, most businesses expand their product line, expand their way of doing things by acquiring successful small businesses. So I get that. I think that's wonderful.  But what the Senator is proposing is that we have the government decide if a business should be allowed to acquire another business. There is a line in there where I agree with her. I'm not a hundred percent sure where that line should go. We've had antitrust laws here in the United States since 1800s, a very long time. The Sherman act short and simple back then it made it illegal to monopolize or attempt to monopolize or conspire to monopolize the market. I liked that one. How about if you're defining the market? There's two sides to this, one side often overlooked.  You've got the side of the supplier. You've got Facebook or GM or whoever. You say Facebook is the 800-pound gorilla. They own this market. So what should you do about Facebook? That's what she's trying to figure out here. What should we do? They're saying we should have a government regulator decide if it's a monopoly or not. We know how well that ends up working. You end up with a revolving door, the regulators working for the corporations, and then going back to the regulators right back and forth. It's absolutely crazy. That side of it.  There is another side and this other side is frankly not that new, but it has gotten worse more recently. It's called a monopsony. What this is where you have a lot of suppliers. So you'd have a whole lot of Facebook' for instance, but only one purchaser. You said, Craig, what are you talking about? We're the best and brightest. I'm not quite sure where you're going with this.  Here's where we're going. Monopsony is typified by Walmart. Walmart is well-known as a company that you do not want to sell to.  If you're a small business, you look at it, say, Oh yeah we got Walmart. They're going to sell our product. Okay. Okay. Great for you. It's not wonderful. Walmart took out every rubber hose they had, and they beat the supplier over the head and shoulders and back until they capitulated.  Walmart was routinely criticized for this forcing vendors to lower prices until it became unsustainable. I can think of a few of these products right off the top of my head. Do you remember Rubbermaid, right? It was the. The dominant force for those rubber containers at Walmart. Then all of a sudden it wasn't there anymore. Do you remember that? Because they couldn't sell it to Walmart at the prices Walmart wanted it at. That's one way Walmart keeps the prices low. With this monopsony problem. We're talking about a lot of companies that make competing products, but there's really one 800 pound gorilla. That's buying it. Walmart has a huge share of the US retail market.  Of course, now they've been one-upped by our friends over at Amazon. Amazon is there now in that kind of the same position. If you're going to sell something, you pretty much have to have it on Amazon. Amazon's basically going to dictate how much you can sell it for. Isn't that interesting. By the way, that word monopsony dates back almost a hundred years as well. Antitrust laws have never addressed the idea of this kind of anti-competitive behavior from the bottom-up direction. It's an interesting way.  So what do I think is the way to go on all of this stuff? First of all, we'll see if it ever becomes law. They tried something similar with a bill back in 2019, and it didn't get very far. With the Democrats controlling the white house, the house of representatives, and the Senate. The idea of reform being passed is more feasible, but there's one other side to this.  This goes back to my friends who have had their businesses effectively stolen by large companies. That is when we're looking at more regulation, which is exactly what she's proposing. More regulators, more money going to the regulators. They're making the entire marketplace harder.   If you're a small company and do you have to comply with all of these new rules, you now have to make all of these regulators happy. What are the odds? You're going to be able to do that compared to the big guys.  The big guys can quite easily afford all of the attorneys, all of the regulatory compliance people, everybody that's needed. But you can't.  So the big companies love this sort of thing because the regulations make it easier for them to keep competitors out of the market.  They're keeping competitors out of the market. We've already established that they're buying competitors, so they don't have to compete with them.   Now we're going to make matters worse with this Klobuchar bill. By doing what? By increasing regulation, making it harder to compete.  I propose that we'll actually have more monopolies after this. I would much rather just keep it simple and watch out for monopolies.  If a company makes mistakes and is going under, let it go under. Any parts of that company that have any value will be sold. That's what bankruptcy laws all about. If, someone who's thinking about maybe getting into an information security career. Or maybe you're looking at another career because right now there are millions of jobs open in InfoSec. We're going to talk about it. What do I wish I knew? Hi everybody, Craig Peterson here. Thanks so much for joining me.  You probably know that I have been in information security for a very long time. It started out as I had to protect my own company. When I got nailed 30 years ago with what was called the Morris worm. If you've been on any of my webinars where I do a little background, you heard my story there. It just scared me to death. I almost lost a bunch of clients because of this worm.  The worm is a piece of software that gets onto a computer and then spreads to other computers. Nowadays, we have a lot of things that act like worms. For instance, ransomware gets in and starts to spread. We have all kinds of bad guys that are doing the same thing. They'll get onto a machine in your network. Then they'll manually start looking around and seeing what you have, what file servers you have. Oh, let's connect to the G drive or whatever you call that file server drive or shared drive. They will look through your files and just the rest of the story, right?  You guys are the best and brightest. You really are. So here's where I come down. I think there is a lot of opportunities here and I did a little presentation for a mastermind group. I'm a member of last week.  I talked about a guy that became a friend of mine who is in his late fifties is right around 60 years old and decided he needed a new career. His prior career had literally disappeared. They had just been destroyed. He was in retail and he was managing a store and he had a lot of clients.  Of course, that job went away and he was looking for, what do I do next? He's been listening to me for a very long time on the radio and decided that maybe he should look into an InfoSe career. So he did.  I used him as a case study with my mastermind group. What should people be looking to do and how can I help them? So I figured let's do this because I saw an article in Dark Reading. That's one of my favorite websites for all of these articles on security. They were talking about exactly that, what should I be doing now, if I want a security career?  What are the things I should know and do?  The author of this is Joan Goodchild, an easy name to pronounce.  What happened to her? She points out, do you know information security can be really rewarding?  I absolutely agree with that. It is a thankless job, you miss one thing and something gets in. Someone brings it from home you don't quite have everything in place or everything up to date.  The biggest problem I've seen and I see with this friend of mine that I talked about in the mastermind is that we don't think we know enough. It's something called imposters syndrome. You've probably heard of it. It exists in a lot of different facets of our lives, not just in careers.   So he has imposter syndrome, as do a lot of people who are in cybersecurity because there's so much to know.  That's why I've said forever businesses cannot do cybersecurity.  Antivirus isn't going to work for you. Basic firewalls are not going to work for you. Even if you have the right equipment in place if you don't know how to manage it and set it up. All of this stuff, it's just not possible to do.  Maybe you should look at a security career, cybersecurity.  Let's run through some of the things that she put in there. Of course, I'll add my little side things, but she asked a bunch of people in cybersecurity, specifically what do you wish you would have known when you first started. Here's Gregory Touhill, president of Applegate, federal Brigadier general retired in first, us CSO under president Barack Obama, CSO is the chief information security officer for the federal government. He said. I love this quote. Cybersecurity is a full-contact team sport. There is no single person who is an expert on all of the various aspects of the area of the discipline. Once I got over myself and recognize that I couldn't do it all, I focused on building the right team of experts to solve issues before they become problems. That revelation triggered great future success. So there you go.  I think that's absolutely phenomenal to remember. You're going to have imposter syndrome if you decide to go into this, but the bottom line is to work with a team. If you can find a vendor like me, that knows what they're doing, that has people that can help you out because you cannot just be out there yourself. Next point here. This is from Wayne Pruitt, cyber-range, technical trainer in North America.  I've seen him before. He's been on one of my webinars where I was teaching about cybersecurity. To be effective in cybersecurity you need to have an understanding of all areas of information technology. Boy, is that true? If an analyst does not understand how a web application communicates with a database on the backend, how will he know if the traffic he's seen is normal or malicious? Without this understanding, analysts are just relying on security tools to make the determination. Hopefully, those tools are configured correctly. Sometimes you have to learn the basics. Don't understand the more complex. Again, this goes into you've got to have a team. You have to have multiple people who can help out at different levels because frankly, you can't know it all. Going back to that the general Brigadier general, he had such a good point. Next up is a chief strategist at Point 3 security.  Her name is Chloe Messdaghi. I really wish I knew how little diversity and inclusion were practiced. When I first entered the industry, many of us in our current organizations are now working for to improve the situation are gaining ground. But within my first year, I felt like I had entered the 1940s. I personally think this is ridiculous.  Men are attracted to certain things and certain careers, women, the same thing. There are some careers that are dominated by women and some that are men. One of my daughters works with me and she is a cybersecurity analyst and she's just finishing some more training. In fact, our people tend to spend about a third of their time in training and she's very good and it has nothing to do with the fact that my daughter's a girl. So come on, quit seeing sex and seeing the race everywhere. It's just crazy. It's out there and she's right there aren't many women that are in this career.  Next up here, Lakshmi Hanspal. She is CSO of a company called Box whom I have used before. They've got some very good products for file sharing. I switched over to Dropbox. I like some of the stuff a little bit better having come from a traditional stuff background.  It was not until I entered higher leadership roles and began formulating hiring strategies that I realized the more diverse teams solve the toughest challenges, skills, such as critical thinking, how to manage risk trade-offs and cybersecurity not being a zero-sum game are extremely fundamental and understanding and thriving in the security industry. It is obvious she spent some time writing that and trying to put in lots of big words.  She is right. We when we're talking about diversity in this case, what she's talking about are the diversity of skills, critical thinking, managing trade-offs, and understanding that we all have to work together on a team in the cybersecurity field. I thought she had a really great point.  Next up, we have Josh Rickard security research engineer over at Swimlane. I wish I knew and understood that an organization's priorities are guide rails for information security teams, as with most starting in InfoSec. I wanted to solve all the security issues I came across, but this is impossible. Understanding business priorities while communicating potential risks is critical. Okay. But helping the business with those priorities gives you credibility. Wow.  I'm going to save that one, frankly, because that is something that we all need to remember. I've had people on my team that was just a hundred percent focused on doing the right thing, quote unquote, on the cybersecurity front, and to them, the right thing was to make sure there are no holes. So I can see that from a certain perspective. And again, back to the diversity of thought, having someone like that on your team is a good idea, but it does have to be tempered.  Mary Writz VP product development over at ForgeRock. When I started 20 years ago as a penetration tester at IBM. I wondered how I even got the job because I did not feel qualified in hindsight. No one was truly qualified because it was such a young domain. I was hired because of my technical background, my curiosity, my interest, fast forward, 10 years, I was teaching a technical audience how to build hunt teams and I expect everyone in the audience knew more than me. A gentleman in the audience raised his hand and said, you're assuming we know what we're doing, but we don't. After we all laughed, we shared our notes and learned from each other. Wow. So insightful here, because again, she's pointing out.  The curiosity requirement. I think if you're not curious, you're not going to spend the time it takes to investigate and to learn more.   We're going to cover a few more.  You're listening to Craig Peterson and online@craigpeterson.com. We're talking right now about InfoSec, information security. Have you thought about maybe taking up a bit of a new career? Well there are some estimated 2 million open jobs in this one.  Of course, this is Craig Peterson.  We were just talking about this article that appeared in dark reading. Now, dark reading is an online magazine, right? It's a website. And they had this article that I absolutely had to read because it reminded me of someone I know. One of our listeners, who decided he needed a new career. He'd lost his job. He'd been out of work for over a year and he had been managing a retail camera shop and they shut it down. He was stuck. What do I do? He'd been listening to the show for a long time. He decided he wanted to go into information security. He took some courses on it and he got himself a job. A full-time job being the chief IT security guy for this company after just a few months. So that tells you how desperate these companies are. Kind of jerking his chain a little bit, but not right, because he just barely had any background.  If you want me to connect you with him, if you are serious about thinking about one of these careers, I'll be glad to forward your request to him, just to see if he's willing to talk to you. Just email me ME@craigpeterson.com and make sure you mentioned what this is all about. So I know what's going on.  Ran Harel, he's a security principal and product manager over at Semperis said, when I was growing up, I was quite an introvert, by the way, that sounds like a lot of us in it. I didn't realize until much later on in my career, just how great the security and tech community are looking back. I realize how quickly I could have solved so many issues, by just asking on an IRC channel or forum.  IRC is an internet relay chat, a bit of a technical thing, but it's an online chat. I would tell my former self, the problem you are facing now is probably been dealt with multiple times in the past year alone. Don't be afraid to ask the InfoSec community and then learn from them.  That's absolutely true. I found an online IRC channel basically, and they were set up just to talk about CMMC is this new standard that department of defense contractors are having to use. As you probably know, we have clients that are manufacturers and make things for the Department of Defense and they have to maintain security.  It's been interesting going in there answering questions for people and even asking a couple of questions. It is a great resource. This particular kind of IRC is over on discuss. You can find them all over the place. Reddit has a bunch of subreddits. It's dealing with these things, including, by the way, getting into an InfoSec career. So keep that in mind.  There's lots of people like myself that are more than willing to help because some of the stuff can get pretty confusing. All right. The next one. Is from Cody Cornell, chief security officer, and co-founder over at swimlane. He said, apply for jobs. You are not qualified for everyone else is. Man. I have seen that so many times everybody from PhDs all the way on, down throughout a high school and who have sent me applications that they were not even close to qualified for. Now, you can probably guess with me, I don't care if you have a degree. All I care about is can you do the work. Can you get along with the team are you really going to pull your weight and contribute?  I have seen many times that the answer to that is no, but I've seen other times where, wow, this person's really impressive. So again, apply for jobs you're not qualified for because everybody is. Security changes every day. New skills techniques and the needs of organizations are always shifting. And to be able to check every box from an experience and skills perspective is generally impossible. Looking back at 20 years of jobs in the security space, I don't believe that I was ever a hundred percent qualified for any of them, but felt confident that I could successfully do them.  So keep that in mind. Okay.  Again, imposter syndrome, we're all worried about it. This applies to more than just InfoSec. This applies to every job, every part of life, we all feel as though we're impostors and that we're not really qualified, but the question is, can you figure it out? Can you really do it? Next up here is Chris Robert, a hacker in residence, he calls himself over at Semperis and he says, overall, the most important lessons that I'd tell my younger self are not tech-based. Rather they focus on the human aspect of working in the cybersecurity industry. I think cybersecurity professionals in general, tend to focus on technology and ignore the human element, which is a mistake and something we need to collectively learn from and improve.  I agree with him on that as well. However, we know humans are going to make mistakes, so make sure you got the technology in place that will help to mitigate those types of problems.  Next up, we've got Marlys Rogers. She's CISO over at the CSAA insurance group that's a lot of four-letter acronyms. You are nothing without data. Data is queen. Coming from an insurance person, right? Without hard data, you can only speak to security in more imagined ways or ways. The board and C-suite are aware of in the media cost-benefit is only achievable with related data points. Demonstrating how much we are fighting off and how the tools, processes, and people make that happen. Next up we have Edward Frye, he's CSO over at our Aryaka. When I first started out, I was fairly impatient and wanted to get things done right away. While there are some things that need to be done right now, not everything needs to be done. Now have the ability to prioritize and focus on the items that will have the biggest impact. I think one of the biggest lessons I've learned along the way is while we may need to move quickly, this race is a marathon, not a sprint.  Patience is essential for security pros. I can certainly see that one.  Chris Morgan, senior cyber threat intelligence analyst over at Digital Shadows, despite the way that many in media liked to portray cyber threats, not everything will bring about the end of the world. For those getting into incident response and threats, try to have a sense of perspective and establish the facts before allowing your colleagues to push too quickly towards remediation mitigation, et cetera.  Expectation management amongst senior colleagues is also something you'll frequently have to do to avoid them breaking down over a mere phishing site. The quote, one of my former colleagues try to avoid chicken, little central.   I've seen that before as well.  The next one is things are changing daily and the last one is the perception of security is still a challenge.  So great little article by Joan Goodchild. You'll see it in my newsletter, which we're trying to get out now Sunday mornings. You can click through on the link if you'd like to read more.  As you can see. 2 million open jobs while between one and 3 million, depending on whose numbers you're going at in cybersecurity.  You don't have to be an expert. As I said, one of our listeners went from not knowing much about it at all, he can install windows that's it, to having a job in cybersecurity in less than six months.  I'm doing a special presentation coming up next month for the New England Society of Physicians and Psychiatrists. We're going to be talking a little bit about what we will talk about right now. What can you do to keep your patient information safe?  What can we do as patients to help make sure our data's safe.  You'll also find me on pretty much every podcast platform out there. Just search for my name, Craig Peterson. I have a podcast and it makes it pretty easy. I've found some of them don't understand if you try and search for Craig Peterson, tech talk, some of them do. I've been a little inconsistent with my naming over the years, but what the heck you can find me. It's easy enough to do.   I've got this new kind of purple-ish logo that you can look for to make sure it's the right one. And then you can listen to subscribe, please subscribe. It helps all of our numbers. You can also, of course, by listening online with one of these devices, help our numbers too. Cause it's you guys that are important.  The more subscribers we have, the way these algorithms work, the more promotion we'll get.  I think that's frankly, a very good thing as well.  What do you do if you need to see a doctor, that question has a different answer today than it did a year ago. I won't be able to say that in about another month, right? Because mid-March is when everything changed last year, 2020, man, what a year?  To see a doctor nowadays, we are typically going online, aren't we? You're going to talk to them. So many doctors have been using some of these platforms that are just not secure things like zoom, for instance, which we know isn't secure. Now, the fed kind of loosen things up a little bit under the Trump administration saying, Hey. People need to see doctors. The HIPAA PCI rules were loosened up a little bit in order to make things a little bit better. Then there's the whole DSS thing with HIPAA. All of these rules are just across the board are loosened up.  That has caused us to have more of our information stolen.  I'm going to be talking a little bit about this FBI, actually multi-agency warning that came out about the whole medical biz and what we need to be doing. Bottom line, Zoom is not something we should be using when we're talking to our doctors.  Now, this really bothers me too. Zoom is bad. We know that it's not secure and it should not be used for medical discussions, but Zoom has been private labeling its services so that you can go out and say, Hey, zoom, I want to use you and I'm going to call it my XYZ medical platform.  People have done that. Businesses have done that. Not really realizing how insecure Zoom is. I'm going to give them the benefit of the doubt here. You go and you use the XYZ medical platform and you have no clue of Zoom. Other than man, this looks a lot like Zoom, that's the dead giveaway. Keep an eye out for that because a lot of these platforms just aren't secure. I do use Zoom for basic webinars because everybody has it. Everybody knows how to use it.  I have WebEx and the WebEx version of it is secure. In fact, all the basic versions, even of WebEx are secure and I can have a thousand people on a webinar or which is a great way to go. It's all secure end to end.  Unlike again, what Zoom had been doing, which is it might be secure from your desktop, but it gets to a server where it's no longer secure. That kind of problem that telegram has, frankly.   If you are talking to your doctor, try and use an approved platform. That's how you can keep it safer. If you're a doctor and you have medical records be really careful. Zoom has done some just terrible things from a security standpoint. For instance, installing a complete web server on a Mac and allowing access to the Mac now via the webserver. Are you nuts? What the heck are you doing? That's just crazy. Just so insecure.  This is all part of a bigger discussion and the discussion has to do with Zero trust architectures.  We're seeing this more and more. A couple of you, Danny. I know you reached out to me asking specifically about zero trust architectures. Now Danny owns a chain of. Coffee shops and his family does as well. He says, Hey, listen, what should I do to become secure? So I helped them out. I got him a little Cisco platform, and second Cisco go that he can use as much more secure than the stuff you buy the big box retailers or your buying at Amazon, et cetera, and got it all configured for him and running. Then he heard me talk at about zero trust and said, Hey, can I do zero trust with this Cisco go, this Muraki go, is actually what it is and the answer is, well so here's the concept that businesses should be using, not just medical businesses, but businesses in general and zero trust means that you do not trust the devices, even the ones that you own that are on your network. You don't trust them to be secure. You don't trust them to talk to other devices without explicit permission.  Instead of having a switch that allows everything to talk to everything or a wifi network where everything can talk to everything, you have very narrow, very explicit ways that devices can talk to each other. That's what zero trust is all about.  That's where the businesses are moving.  There's zero trust architecture, and it doesn't refer to just a specific piece of technology. Obviously, we're talking about the idea that devices, and even on top of that, the users who are using the devices only have the bare minimum access they need in order to perform their job. Some businesses look at this and say that's a problem. I'm going to get complaints that someone needs access to this and such. You need that because here's what can happen. You've got this data that's sitting out there might be your intellectual property. You might be a doctor in a doctor's office and you've got patient records. You might have the records from your PCI your credit card records that you have. I put on. Those are sitting there on your network that is in fact a little dangerous because now you've got something the bad guys want.  It's dangerous if the bad guys find it and they take it, you could lose your business. It's that simple.  They are not allowing you to use the excuse anymore because of COVID. That excuse doesn't work anymore. The same thing's true with the credit card numbers that you have the excuse of I'm just a small business. It's not a big deal. Doesn't work anymore. They are taking away your credit card privileges.  We had an outreach from a client that became a client, that had their ability to take credit cards taken away from them because again, there was a leak. So we have to be careful when you're talking and you have private information, or if you don't want your machine to be hacked, do not use things like Zoom. I covered this extensively in my Improving Windows Security course. So keep an eye out for that as well. If you're not on my email list, you won't find out about this stuff. Go right now to Craig peterson.com. If you scroll down to the bottom of that homepage and sign up for that newsletter so you can get all of what I talk about here and more. Hey, thanks to some hackers out there. Your application for unemployment benefits might've been approved and you didn't apply for it in the first place. Turns out somebody stealing our information again. Hi everybody. Craig Peterson here.  Hey, this is a big concern of mine and I've often wondered because I have not been receiving these stimulus checks. I did not get the first round. I did not get the second round and I contacted the IRS and the IRS says depends on when you filed for 2019. Oh my gosh. Of course, I was a little late filing that year. They still haven't caught up. I guess that's good news, right? That the IRS data processing centers are terrible.  It goes back to aren't you glad we don't get the government we pay for is the bottom line here, but I've been concerned. Did somebody steal my refund?  Did somebody steal my unemployment benefits, did somebody steal my stimulus checks? It is happening more and more. There is a great little article talking about this, where someone had stolen the author's John personal information again. Now we probably all have had our personal information stolen, whether you're aware of it or not. As usual, I recommend that you go to have I been poned.com and pwnd is spelled, pwn, D have I been poned.com and find out whether or not your data has been stolen and is out there on the dark web.  They have a really good database of a lot of these major hacks.  Many of us have been hacked via these credit bureaus and one in particular Equifax who have all kinds of personal information about us, had it all stolen.  It's easy enough for people to steal our identities file fake tax returns. That's why the IRS is telling you, Hey, file your return as soon as possible. That way when the bad guy's file, we'll know it's the bad guys cause you already filed it. As opposed to you file your tax return and the IRS comes back and says, Oh, you already filed. We already sent you a refund or whatever. You already filed it.  That is a terrible thing to have to happen because now you have to fight and you have to prove it wasn't you. How do you prove a negative? It's almost impossible. At least in this case, hopefully, the check was sent to some state 50 States away, another side of the world. So you can say, Hey, listen, I never been there, then they can hopefully track where it was deposited.  Although now the bad guys are using these websites that have banks behind them, or maybe it's a bank with a website that is designed for people to get a debit card and an account just like that. That, in fact, it's what was used to hack my buddy. My 75-year-old buddy has been out delivering meals and had his paychecks stolen through one of those.  These fraudulent job claims are happening more and more. It's really a rampant scam. We've had warnings coming out from the FBI and they have really accelerated during the lockdown because now we've had these jobless benefits increased, people, making more money staying in their home than they made on the job. Disincentives for working, frankly. He's saying here the author again, John Wasik, that a third of a million people in his state alone were victims of the scam. This is an Illinois. This is where he lives. A third of the people in the state of Illinois, including several people that he knew.  We've got some national tallies underway. I don't know if you've seen these. I've seen them on TV and read about them, California. It is crazy. People were applying for California unemployment that didn't live in the state at all, would come into the state and once you're there in the state pick up the check, right? Cause that's all they were doing. Some people have been caught with more than a million dollars worth of California unemployment money.  Of course, it wasn't a check, it was actually a debit card. The same basic deal and California is estimating that more than $11 billion was stolen. Can you imagine that tens of millions of people could have been scammed because of this? This is the third time the author had been a victim of identity theft and fraud.  He wanted to know how could they get his information. Well, I've told you, check it out on, have I been poned. It'll tell you which breaches your information was in. It does it based on your email address.  It'll also tell what type of data was stolen in those breaches. So it's important stuff. I think you should definitely have a look at it.  He is very upset and I can understand it. Data breaches last year, more than 737 million data files are ripped off according to act.com.  Frankly, that was a digital pandemic, with more and more of us working at home. I just talked about the last segment. Your doctor's office and you are talking to your doctor. How now? Cause you don't go into the office. There are so many ways they can steal it.   The FBI's recording now a 400% increase in cybercrime reports that we had this mega hack of corporate and government systems. This whole thing we've talked about before called the SolarWinds hack, although it was really more of a Microsoft hack, and it went out via SolarWinds as well as other things. Be careful everybody out there. If you find yourself in these breach reports on, have I been poned make sure you go to the website. Set yourself up with a new password. At the very least use a password manager.  I just responded to an email before, when it went on the air today, from a listener who was talking about two-factor authentication.  He's worried about what to use. I sent him my special report on two-factor authentication, but it is the bottom line, quite a problem.  Again, Use one password, use two-factor authentication with one password. Don't use SMS as that and you'll be relatively safe.  I don't know I can't say do this and you'll be safe. I don't think there's any way to be sure your safe.  Having these organizations, businesses, government agencies hacked all the time that don't seem to care about losing our data, right? Oh, it's a cost of doing business,

Video Game Grooves
Episode 74 :: Best of 2020, Frederik “Blipblop” Lauridsen

Video Game Grooves

Play Episode Listen Later Dec 31, 2020 152:53


What a year. Period, not exclamation point. But what a year for video game music on vinyl record!  The full VGG crew is joined once again for our annual best-of-the-year episode by Frederik "Blipblop" Lauridsen from BlipBlop.net for the definitive breakdown of the very best releases from across the niche universe of our weird hobby. In our round-robin fashion, we count down our top 3 individually, as well as a few special shout-outs, and then we get to your favorite picks, as the community of Lovers of Video Game Music on Vinyl Record in the year 2020. Big thanks to you, our community, for toughing out 2020 with us, and get ready to spin up 2021 as big new things come our way! Happy New Year! Outro: "Staff Roll" - Tekken 3, by Nobuyoshi Sano, Keiichi Okabe & Yuu Miyake Twitter – @vg_grooves, @jeremy_lamont, @blipblopwax http://www.blipblop.net/ To shortcut to the good stuff you all wanted (community picks) you can click here, but it's a secret to everyone.

PaperPlayer biorxiv bioinformatics
High-Throughput Image-Based Plant Stand Count Estimation Using Convolutional Neural Networks

PaperPlayer biorxiv bioinformatics

Play Episode Listen Later Nov 6, 2020


Link to bioRxiv paper: http://biorxiv.org/cgi/content/short/2020.11.05.370437v1?rss=1 Authors: Khaki, S., Pham, H., Han, Y., Kent, W., Wang, L. Abstract: The future landscape of modern farming and plant breeding is rapidly changing due to the complex needs of our society. The explosion of collectable data has started a revolution in agriculture to the point where innovation must occur. To a commercial organization, the accurate and efficient collection of information is necessary to ensure that optimal decisions are made at key points of the breeding cycle. However, due to the sheer size of a breeding program and current resource limitations, the ability to collect precise data on individual plants is not possible. In particular, efficient phenotyping of crops to record its color, shape, chemical properties, disease susceptibility, etc. is severely limited due to labor requirements and, oftentimes, expert domain knowledge. In this paper, we propose a deep learning based approach, named DeepStand, for image-based corn stand counting at early phenological stages. The proposed method adopts a truncated VGG-16 network as a backbone feature extractor and merges multiple feature maps with different scales to make the network robust against scale variation. Our extensive computational experiments suggest that our proposed method can successfully count corn stands and out-perform other state-of-the-art methods. It is the goal of our work to be used by the larger agricultural community as a way to enable high-throughput phenotyping without the use of extensive time and labor requirements. Copy rights belong to original authors. Visit the link for more info

PaperPlayer biorxiv neuroscience
Biased orientation representations can be explained by experience with non-uniform training set statistics

PaperPlayer biorxiv neuroscience

Play Episode Listen Later Jul 18, 2020


Link to bioRxiv paper: http://biorxiv.org/cgi/content/short/2020.07.17.209536v1?rss=1 Authors: Henderson, M. M., Serences, J. Abstract: Visual acuity is better for vertical and horizontal compared to other orientations. This cross-species phenomenon is often explained by "efficient coding", whereby more neurons show sharper tuning for the orientations most common in natural vision. However, it is unclear if experience alone can account for such biases. Here, we measured orientation representations in a convolutional neural network, VGG-16, trained on modified versions of ImageNet (rotated by 0, 22.5, or 45 degrees counter-clockwise of upright). Discriminability for each model was highest near the orientations that were most common in the network's training set. Furthermore, there was an over-representation of narrowly tuned units selective for the most common orientations. These effects emerged in middle layers and increased with depth in the network. Our results suggest that biased orientation representations can emerge through experience with a non-uniform distribution of orientations. These findings thus support the efficient coding hypothesis and highlight that biased training data can systematically distort processing in CNNs. Copy rights belong to original authors. Visit the link for more info

Outlaw Mudcast
Outlaw Mudcast Episode 87

Outlaw Mudcast

Play Episode Listen Later May 3, 2020 48:29


On this May 3, 2020 episode of the Outlaw Mudcast, I report on the results of the 2019 Create-a-Competitor Contest semifinal round.  I also discuss the last Kickstarter update, the recent online tournaments, and LFF championship news, as well as review some of the new cards and competitors released around VGG weekend.

Video Game Grooves
Episode 49 :: Lumines, God of War

Video Game Grooves

Play Episode Listen Later Aug 9, 2019 93:21


With summer in full swing, the VGG crew is back to help you beat the heat with some cool tunes and chill game soundtrack records. It's like standing in front of the refrigerator while your hair blows in the wind! This episode brings Paul, Anthony, and Jeremy back together to guide you through the game music we have known, and spin it up on the vinyl you love! This week, we begin with the Limited Run Games release of Lumines Remastered, and the eclectic but bumpin' sounds of Takayuki Nakamura. We remember the phenomenon of Lumines and how it fits into the pantheon of Q Entertainment titles, and whether their games feel like musical creation... or something else. We also note the music that is NOT on this release as well its overall listenability. Next we shift gears significantly to Sony's God of War (2018), which propelled the franchise to new levels of dadliness and new musical textures and culture to explore. Bear McCreary's dramatic score is a departure from the series' prior motive cues but brings the player along the journey of discovery and epic adventure, and we discuss the brutally-violent Kratos as one of the huggiest protagonists in all of video games. As always, we bring you the latest news about new releases, crowdfunding efforts, and reprints that you need to know about (or will be disappointed you missed--sorry). We know... it's the segment of the show that causes us the most internal conflict too. We top off the show with a discussion about the importance (or not) of preserving the analog signal of the vinyl audio format versus the convenience of digital technology. What about that Bluetooth-capable turntable you (coughJeremycough) are considering? Wireless headphones? How about putting that signal through a digital receiver or other tech? Listen in for the important-est viewpoints to consider! Thanks for listening! Outro: "Talk 2 You" - Lumines, by Takayuki Nakamura Twitter – @vg_grooves, @walnutsoap, @jeremy_lamont, @ajohnagnello Links: Wandersong (Ghost Ramp) Bad Mojo (Ghost Ramp) Deltarune (Fangamer) Rend (Materia Collective) Poké & Chill (MateriaCollective) Bloodborne (Laced Records USA) (Laced Records EU) Red Faction (Limited Run Games) (sold out) Double Switch (Limited Run Games) (sold out) Teenage Mutant Ninja Turtles: Turtles In Time (iam8bit) The Witcher 3 repress (Spacelab9) (2LP variant) (4LP variant) Silent Hill (Fangamer) Silent Hill 2 (Fangamer) Image Gallery

Video Game Grooves
Episode 45 :: One Run Records, Flyrule: A Terrible Fate, Hotline Miami 2

Video Game Grooves

Play Episode Listen Later May 1, 2019 109:13


How does it feel when you got no Grooves? Five-one blaze it everyone! It's a new VGG podcast, and we once again got the munchies for video game music on vinyl records! Don't touch that desk calendar, and join us for our latest and dankest episode yet! Paul and Jeremy are joined today by Ryan Huff of One Run Records, who has a brand-new announcement for a really stellar initial release, but is also one of the biggest weird-audio nerds we've ever met. We jaw a bit about what's actually coming from the new label, but then we roll right into today's dank offerings! We begin with a hit of Flyrule: A Terrible Fate, by Shag. This Majora's Mask-themed (yet Link-to-the-Past-skinned) release has us pondering the mood and themes of the game, as well as the flowing yet edgy beat and samples from Shag's sophomore game vinyl. Ryan picks a couple of his favorite tracks from this stylish record and we let the dankness flow. We continue with a bit of a harder sound with Hotline Miami 2: Wrong Number from iam8bit. Another second-in-a-series, HLM2 continues the tradition of being excellent and listenable, while going even harder than its predecessor. There's so much good music and art in this release, we may just have to break the "2-per" rule. You'll have to listen to find out! We keep blazing with the new releases and news, highlighting the best bets for you to spend your cash or pass to the lefthand side. A few newsworthy announcements and other highlights of the last couple of weeks will definitely stoke some paranoia in your wallet, but we try to keep it mellow. Finally, we dig into the news that Bandcamp is beginning to roll out a vinyl pressing service for artists on its service. We discuss what the ramifications of this might be and whether it's all good or all great for the video game vinyl market and artists in general. It's a good and legal time (in several states) so why not join us? Outro: "Zora Hall" - Flyrule: A Terrible Fate, by Shag Twitter - @vg_grooves, @walnutsoap, @jeremy_lamont, @ajohnagnello One Run Records: Twitter / Facebook / Instagram Links: Oure Limited Edition (Red Art Games) Kingdom Come Deliverance (Official Store) Below Original Soundtrack (Jim Guthrie Bandcamp) (crowdfund) FRACT (Qrates) (crowdfund) Cuphead 2xLP (iam8bit) BLAM! Machinehead (Nathan McCree) Finnsids (Official Site) Mario & Chill (GameChops Bandcamp) Image Gallery  

Video Game Grooves
Episode 44 :: LISA the Painful RPG, Silent Hill 2

Video Game Grooves

Play Episode Listen Later Apr 11, 2019 111:30


It is time once again for us to reckon with the darkness inside us. The pain and longing. The struggle. The loss. The nurses. Yes, it's time for another VGG! Thanks for coming! We are joined this week by first-time guest but already-friend-of-the-show Cassie Baralis from Ship to Shore. As one of the "many hats" people at StS, Cassie handles brand and licensing for the label but is also a fan of music, vinyl, and darkness in her own right. And for this episode, Cassie is bringing us LISA the Painful RPG from Ghost Ramp Records. LISA is one of those hidden gems (totally unknown to some of our hosts) and Cassie sheds some light on the game itself, enlightens and evangelizes it over some of its contemporaries, and brings special focus on Austin Jorgensen's... unorthodox... score for the unusual one-man-created game. Next, Anthony is back in Mondo Records' thrall again with the release of Silent Hill 2. This iconic game and its iconic music both deserve some illumination, and Anthony and Cassie both have this one in their blood. Although we may not have composer Akira Yamaoka's recommended alcohol pairings on hand, we nurse our intoxication with the music and the mood, and generally adore the vinyl incarnation of this video game legend. In our second segment, of course, news and releases, and links below to let you spend that money (or those "dirty mags") on some stuff you might not have even known you needed. At least one record label is shutting down, but another will rise from its ashes! Finally, we get to spend some time with Cassie talking about some behind-the-scenes stuff working at a "weirdo" label like Ship to Shore. When you've spent so much of your life on a record label and you know what you like, what does that mean for licensing? How did Osamu Sato get involved on their recent release of LSD Revamped? What are the complications with licensing anyway? Did she get another tattoo? Anime?? Give us a listen! Outro: "Overdose Delusion" - Silent Hill 2, by Akira Yamaoka Twitter - @vg_grooves, @walnutsoap, @jeremy_lamont, @ajohnagnello Instagram: Cassie Baralis Ship to Shore Media (Website / Instagram / Facebook / Twitter) Links: LSD Revamped (Ship to Shore) Pocket Rumble (Yetee Records) Hotline Miami EP (Das Mörtal Bandcamp) Devil May Cry 5 Special Edition Box Set (Laced Records) Devil May Cry 5 Deluxe Double Vinyl (Laced Records) Thunder Force IV (Data Discs) Thunder Force IV (Mondo Distro) Katamari Damacy (final pressing) (Mondo) Image Gallery

BSD Now
Episode 275: OpenBSD in Stereo | BSD Now 275

BSD Now

Play Episode Listen Later Dec 9, 2018 84:52


DragonflyBSD 5.4 has been released, down the Gopher hole with OpenBSD, OpenBSD in stereo with VFIO, BSD/OS the best candidate for legally tested open source Unix, OpenBGPD adds diversity to the routing server landscape, and more. Headlines DragonflyBSD 5.4 released DragonFly version 5.4 brings a new system compiler in GCC 8, improved NUMA support, a large of number network and virtual machine driver updates, and updates to video support. This release is 64-bit only, as with previous releases. The details of all commits between the 5.2 and 5.4 branches are available in the associated commit messages for 5.4.0rc and 5.4.0. Big-ticket items Much better support for asymmetric NUMA (Non-Uniform Memory Access) configurations. In particular, both the memory subsystem and the scheduler now understand the Threadripper 2990WX’s architecture. The scheduler will prioritize CPU nodes with direct-attached memory and the memory subsystem will normalize memory queues for CPU nodes without direct-attached memory (which improves cache locality on those CPUs). Incremental performance work. DragonFly as a whole is very SMP friendly. The type of performance work we are doing now mostly revolves around improving fairness for shared-vs-exclusive lock clashes, reducing cache ping-ponging due to non-contending SMP locks (i.e. massive use of shared locks on shared resources), and so forth. Major updates to dports brings us to within a week or two of FreeBSD’s ports as of this writing, in particular major updates to chromium, and making the whole mess work with gcc-8. Major rewriting of the tty clist code and the tty locking code, significantly improving concurrency across multiple ttys and ptys. GCC 8 DragonFly now ships with GCC 8.0, and runs as the default compiler. It is also now used for building dports. GCC 4.7.4 and GCC 5.4.1 are still installed. 4.7.4 is our backup compiler, and 5.4.1 is still there to ensure a smooth transition, but should generally not be used. buildworld builds all three by default to ensure maximum compatibility. Many passes through world sources were made to address various warnings and errors the new GCC brought with it. HAMMER2 HAMMER2 is recommended as the default root filesystem in non-clustered mode. Clustered support is not yet available. Increased bulkfree cache to reduce the number of iterations required. Fixed numerous bugs. Improved support on low-memory machines. Significant pre-work on the XOP API to help support future networked operations. Details Checksums MD5 (dfly-x86_64-5.4.0_REL.img) = 7277d7cffc92837c7d1c5dd11a11b98f MD5 (dfly-x86_64-5.4.0_REL.iso) = 6da7abf036fe9267479837b3c3078408 MD5 (dfly-x86_64-5.4.0_REL.img.bz2) = a77a072c864f4b72fd56b4250c983ff1 MD5 (dfly-x86_64-5.4.0_REL.iso.bz2) = 4dbfec6ccfc1d59c5049455db914d499 Downloads Links DragonFly BSD is 64-bit only, as announced during the 3.8 release. USB: dfly-x86_64-5.4.0_REL.img as bzip2 file ISO: dfly-x86_64-5.4.0_REL.iso as bzip2 file Uncompressed ISO: dfly-x86_64-5.4.0_REL.iso (For use with VPS providers as an install image.) Down the Gopher hole with OpenBSD, Gophernicus, and TLS In the early 2000s I thought I had seen the worst of the web - Java applets, Macromedia (>Adobe) Flash, animated GIFs, javascript snow that kept you warm in the winter by burning out your CPU, and so on. For a time we learned from these mistakes, and started putting the burden on the server-side - then with improvements in javascript engines we started abusing it again with JSON/AJAX and it all went down hill from there. Like cloud computing, blockchains, machine learning and a tonne of other a la mode technologies around today - most users and service providers don’t need websites that consume 1GB of memory processing JS and downloading 50MB of compressed data just to read Alice’s one-page travel blog or Bob’s notes on porting NetBSD to his blood-pressure monitor. Before the HTTP web we relied on Prestel/Minitel style systems, BBS systems, and arguably the most accessible of all - Gopher! Gopher was similar to the locally accessed AmigaGuide format, in that it allowed users to search and retrieve documents interactively, with links and cross-references. Its efficiency and distraction-free nature make it attractive to those who are tired of the invasive, clickbait, ad-filled, javascript-laden web2/3.x. But enough complaining and evangelism - here’s how to get your own Gopher Hole! Gophernicus is a modern gopher daemon which aims to be secure (although it still uses inetd -_-); it’s even in OpenBSD ports so at least we can rely on it to be reasonably audited. If you need a starting point with Gopher, SDF-EU’s wiki has a good article here. https://sdfeu.org/w/tutorials:gopher Finally, if you don’t like gopher(1) - there’s always lynx(1) or NCSA Mosaic! https://cryogenix.net/NCSA_Mosaic_OpenBSD.html I’ve added TLS support to Gophernicus so you don’t need to use stunnel anymore. The code is ugly and unpolished though so I wouldn’t recommend for production use. https://github.com/0x16h/gophernicus https://github.com/0x16h/gophernicus/blob/master/INSTALL.openbsd News Roundup OpenBSD in Stereo with Linux VFIO I use a Huawei Matebook X as my primary OpenBSD laptop and one aspect of its hardware support has always been lacking: audio never played out of the right-side speaker. The speaker did actually work, but only in Windows and only after the Realtek Dolby Atmos audio driver from Huawei was installed. Under OpenBSD and Linux, and even Windows with the default Intel sound driver, audio only ever played out of the left speaker. Now, after some extensive reverse engineering and debugging with the help of VFIO on Linux, I finally have audio playing out of both speakers on OpenBSD. VFIO The Linux kernel has functionality called VFIO which enables direct access to a physical device (like a PCI card) from userspace, usually passing it to an emulator like QEMU. To my surprise, these days, it seems to be primarily by gamers who boot Linux, then use QEMU to run a game in Windows and use VFIO to pass the computer’s GPU device through to Windows. By using Linux and VFIO, I was able to boot Windows 10 inside of QEMU and pass my laptop’s PCI audio device through to Windows, allowing the Realtek audio drivers to natively control the audio device. Combined with QEMU’s tracing functionality, I was able to get a log of all PCI I/O between Windows and the PCI audio device. Using VFIO To use VFIO to pass-through a PCI device, it first needs to be stubbed out so the Linux kernel’s default drivers don’t attach to it. GRUB can be configured to instruct the kernel to ignore the PCI audio device (8086:9d71) and explicitly enable the Intel IOMMU driver by adding the following to /etc/default/grub and running update-grub With the audio device stubbed out, a new VFIO device can be created from it Then the VFIO device (00:1f.3) can be passed to QEMU I was using my own build of QEMU for this, due to some custom logging I needed (more on that later), but the default QEMU package should work fine. The events.txt was a file of all VFIO events I wanted logged (which was all of them). Since I was frequently killing QEMU and restarting it, Windows 10 wanted to go through its unexpected shutdown routine each time (and would sometimes just fail to boot again). To avoid this and to get a consistent set of logs each time, I used qemu-img to take a snapshot of a base image first, then boot QEMU with that snapshot. The snapshot just gets thrown away the next time qemu-img is run and Windows always starts from a consistent state. QEMU will now log each VFIO event which gets saved to a debug-output file. With a full log of all PCI I/O activity from Windows, I compared it to the output from OpenBSD and tried to find the magic register writes that enabled the second speaker. After days of combing through the logs and annotating them by looking up hex values in the documentation, diffing runtime register values, and even brute-forcing it by mechanically duplicating all PCI I/O activity in the OpenBSD driver, nothing would activate the right speaker. One strange thing that I noticed was if I booted Windows 10 in QEMU and it activated the speaker, then booted OpenBSD in QEMU without resetting the PCI device’s power in-between (as a normal system reboot would do), both speakers worked in OpenBSD and the configuration that the HDA controller presented was different, even without any changes in OpenBSD. A Primer on Intel HDA Most modern computers with integrated sound chips use an Intel High Definition Audio (HDA) Controller device, with one or more codecs (like the Realtek ALC269) hanging off of it. These codecs do the actual audio processing and communicate with DACs and ADCs to send digital audio to the connected speakers, or read analog audio from a microphone and convert it to a digital input stream. In my Huawei Matebook X, this is done through a Realtek ALC298 codec. On OpenBSD, these HDA controllers are supported by the azalia(4) driver, with all of the per-codec details in the lengthy azalia_codec.c file. This file has grown quite large with lots of codec- and machine-specific quirks to route things properly, toggle various GPIO pins, and unmute speakers that are for some reason muted by default. The azalia driver talks to the HDA controller and sets up various buffers and then walks the list of codecs. Each codec supports a number of widget nodes which can be interconnected in various ways. Some of these nodes can be reconfigured on the fly to do things like turning a microphone port into a headphone port. The newer Huawei Matebook X Pro released a few months ago is also plagued with this speaker problem, although it has four speakers and only two work by default. A fix is being proposed for the Linux kernel which just reconfigures those widget pins in the Intel HDA driver. Unfortunately no pin reconfiguration is enough to fix my Matebook X with its two speakers. While reading more documentation on the HDA, I realized there was a lot more activity going on than I was able to see through the PCI tracing. For speed and efficiency, HDA controllers use a DMA engine to transfer audio streams as well as the commands from the OS driver to the codecs. In the output above, the CORBWP=0; size=256 and RIRBRP=0, size=256 indicate the setup of the CORB (Command Output Ring Buffer) and RIRB (Response Input Ring Buffer) each with 256 entries. The HDA driver allocates a DMA address and then writes it to the two CORBLBASE and CORBUBASE registers, and again for the RIRB. When the driver wants to send a command to a codec, such as CORB_GET_PARAMETER with a parameter of COP_VOLUME_KNOB_CAPABILITIES, it encodes the codec address, the node index, the command verb, and the parameter, and then writes that value to the CORB ring at the address it set up with the controller at initialization time (CORBLBASE/CORBUBASE) plus the offset of the ring index. Once the command is on the ring, it does a PCI write to the CORBWP register, advancing it by one. This lets the controller know a new command is queued, which it then acts on and writes the response value on the RIRB ring at the same position as the command (but at the RIRB’s DMA address). It then generates an interrupt, telling the driver to read the new RIRBWP value and process the new results. Since the actual command contents and responses are handled through DMA writes and reads, these important values weren’t showing up in the VFIO PCI trace output that I had gathered. Time to hack QEMU. Logging DMA Memory Values in QEMU Since DMA activity wouldn’t show up through QEMU’s VFIO tracing and I obviously couldn’t get Windows to dump these values like I could in OpenBSD, I could make QEMU recognize the PCI write to the CORBWP register as an indication that a command has just been written to the CORB ring. My custom hack in QEMU adds some HDA awareness to remember the CORB and RIRB DMA addresses as they get programmed in the controller. Then any time a PCI write to the CORBWP register is done, QEMU fetches the new CORB command from DMA memory, decodes it into the codec address, node address, command, and parameter, and prints it out. When a PCI read of the RIRBWP register is requested, QEMU reads the response and prints the corresponding CORB command that it stored earlier. With this hack in place, I now had a full log of all CORB commands and RIRB responses sent to and read from the codec: An early version of this patch left me stumped for a few days because, even after submitting all of the same CORB commands in OpenBSD, the second speaker still didn’t work. It wasn’t until re-reading the HDA spec that I realized the Windows driver was submitting more than one command at a time, writing multiple CORB entries and writing a CORBWP value that was advanced by two. This required turning my CORB/RIRB reading into a for loop, reading each new command and response between the new CORBWP/RIRBWP value and the one previously seen. Sure enough, the magic commands to enable the second speaker were sent in these periods where it submitted more than one command at a time. Minimizing the Magic The full log of VFIO PCI activity from the Windows driver was over 65,000 lines and contained 3,150 CORB commands, which is a lot to sort through. It took me a couple more days to reduce that down to a small subset that was actually required to activate the second speaker, and that could only be done through trial and error: Boot OpenBSD with the full list of CORB commands in the azalia driver Comment out a group of them Compile kernel and install it, halt the QEMU guest Suspend and wake the laptop, resetting PCI power to the audio device to reset the speaker/Dolby initialization and ensure the previous run isn’t influencing the current test (I’m guessing there is an easier to way to reset PCI power than suspending the laptop, but oh well) Start QEMU, boot OpenBSD with the new kernel Play an MP3 with mpg123 which has alternating left- and right-channel audio and listen for both channels to play This required a dozen or so iterations because sometimes I’d comment out too many commands and the right speaker would stop working. Other times the combination of commands would hang the controller and it wouldn’t process any further commands. At one point the combination of commands actually flipped the channels around so the right channel audio was playing through the left speaker. The Result After about a week of this routine, I ended up with a list of 662 CORB commands that are needed to get the second speaker working. Based on the number of repeated-but-slightly-different values written with the 0x500 and 0x400 commands, I’m guessing this is some kind of training data and that this is doing the full Dolby/Atmos system initialization, not just turning on the second speaker, but I could be completely wrong. In any case, the stereo sound from OpenBSD is wonderful now and I can finally stop downmixing everything to mono to play from the left speaker. In case you ever need to do this, sndiod can be run with -c 0:0 to reduce the channels to one. Due to the massive size of the code needed for this quirk, I’m not sure if I’ll be committing it upstream in OpenBSD or just saving it for my own tree. But at least now the hardware support chart for my Matebook is all yeses for the things I care about. I’ve also updated the Linux bug report that I opened before venturing down this path, hoping one of the maintainers of that HDA code that works at Intel or Realtek knew of a solution I could just port to OpenBSD. I’m curious to see what they’ll do with it. Why BSD/OS is the best candidate for being the only tested legally open UNIX Introduction The UNIX® system is an old operating system, possibly older than many of the readers of this post. However, despite its age, it still has not been open sourced completely. In this post, I will try to detail which parts of which UNIX systems have not yet been open sourced. I will focus on the legal situation in Germany in particular, taking it representative of European law in general – albeit that is a stretch, knowing the diversity of European jurisdictions. Please note that familiarity with basic terms of copyright law is assumed. Ancient UNIX The term “Ancient UNIX” refers to the versions of UNIX up to and including Seventh Edition UNIX (1979) including the 32V port to the VAX. Ancient UNIX was created at Bell Laboratories, a subsidiary of AT&T at the time. It was later transferred of the AT&T UNIX Support Group, then AT&T Information Systems and finally the AT&T subsidiary UNIX System Laboratories, Inc. (USL). The legal situation differs between the United States of America and Germany. In a ruling as part of the UNIX System Laboratories, Inc. v. Berkeley Software Design, Inc. (USL v. BSDi) case, a U.S. court found that USL had no copyright to the Seventh Edition UNIX system and 32V – arguably, by extension, all earlier versions of Ancient UNIX as well – because USL/AT&T had failed to affix copyright notices and could not demonstrate a trade secret. Due to the obsessive tendency of U.S. courts to consider themselves bound to precedents (cf. the infamous Pierson v. Post case), it can be reasonably expected that this ruling would be honored and applied in subsequent cases. Thus under U.S. law, Ancient UNIX can be safely assumed to belong in the public domain. The situation differs in Germany. Unlike the U.S., copyright never needed registration in order to exist. Computer programs are works in the sense of the German 1965 Act on Copyright and Related Rights (Copyright Act, henceforth CopyA) as per CopyA § 2(1) no. 1. Even prior to the amendment of CopyA § 2(1) to include computer programs, computer programs have been recognized as copyrightable works by the German Supreme Court (BGHZ 112, 264 Betriebssystem, no. 19); CopyA § 137d(1) rightly clarifies that. The copyright holder at 1979 would still have been USL via Bell Labs and AT&T. Copyright of computer programs is transferred to the employer upon creation under CopyA § 69(1). Note that this does not affect expiry (Daniel Kaboth/Benjamin Spies, commentary on CopyA §§ 69a‒69g, in: Hartwig Ahlberg/Horst-Peter Götting (eds.), Urheberrecht: UrhG, KUG, VerlG, VGG, Kommentar, 4th ed., C. H. Beck, 2018, no. 16 ad CopyA § 69b; cf. Bundestag-Drucksache [BT-Drs.] 12/4022, p. 10). Expiry occurs 70 years after the death of the (co-)author that died most recently as per CopyA § 65(1) and 64; this has been the case since at least the 1960s, meaning there is no way for copyright to have expired already (old version, as per Bundesgesetzblatt Part I No. 51 of September 16, 1965, pp. 1273‒1294). In Germany, private international law applies the so-called “Territorialitätsprinzip” for intellectual property rights. This means that the effect of an intellectual property right is limited to the territory of a state (Anne Lauber-Rönsberg, KollisionsR, in: Hartwig Ahlberg/Horst-Peter Götting (eds.), ibid., pp. 2241 et seqq., no. 4). Additionally, the “Schutzlandprinzip” applies; this means that protection of intellectual property follows the lex loci protectionis, i.e. the law of the country for which protection is sought (BGH GRUR 2015, 264 HiHotel II, no. 25; BGH GRUR 2003, 328 Sender Felsberg, no. 24), albeit this is criticized in parts of doctrine (Lauber-Rönsberg, ibid., no. 10). The “Schutzlandprinzip” requires that the existence of an intellectual property right be verified as well (BGH ZUM 2016, 522 Wagenfeld-Leuchte II, no. 19). Thus, in Germany, copyright on Ancient UNIX is still alive and well. Who has it, though? A ruling by the U.S. Court of Appeals, Tenth Circuit, in the case of The SCO Group, Inc. v. Novell, Inc. (SCO v. Novell) in the U.S. made clear that Novell owns the rights to System V – thus presumably UNIX System III as well – and Ancient UNIX, though SCO acquired enough rights to develop UnixWare/OpenServer (Ruling 10-4122 [D.C. No. 2:04-CV-00139-TS], pp. 19 et seq.). Novell itself was purchased by the Attachmate Group, which was in turn acquired by the COBOL vendor Micro Focus. Therefore, the rights to SVRX and – outside the U.S. – are with Micro Focus right now. If all you care about is the U.S., you can stop reading about Ancient UNIX here. So how does the Caldera license factor into all of this? For some context, the license was issued January 23, 2002 and covers Ancient UNIX (V1 through V7 including 32V), specifically excluding System III and System V. Caldera, Inc. was founded in 1994. The Santa Cruz Operation, Inc. sold its rights to UNIX to Caldera in 2001, renamed itself to Tarantella Inc. and Caldera renamed itself The SCO Group. Nemo plus iuris ad alium transferre potest quam ipse habet; no one can transfer more rights than he has. The question now becomes whether Caldera had the rights to issue the Caldera license. I’ve noted it above but it needs restating: Foreign decisions are not necessarily accepted in Germany due to the “Territorialitätsprinzip” and “Schutzlandprinzip” – however, I will be citing a U.S. ruling for its assessment of the facts for the sake of simplicity. As per ruling 10-4122, “The district court found the parties intended for SCO to serve as Novell’s agent with respect to the old SVRX licenses and the only portion of the UNIX business transferred outright under the APA [asset purchase agreement] was the ability to exploit and further develop the newer UnixWare system. SCO was able to protect that business because it was able to copyright its own improvements to the system. The only reason to protect the earlier UNIX code would be to protect the existing SVRX licenses, and the court concluded Novell retained ultimate control over that portion of the business under the APA.” The relevant agreements consist of multiple pieces: the base Asset Purchase Agreement “APA” (Part I) the base Asset Purchase Agreement “APA” (Part II) the Operating Agremeent and Amendment 1 to the APA the Amendment 2 to the APA The APA dates September 19, 1995, from before the Caldera license. Caldera cannot possibly have acquired rights that The Santa Cruz Operation, Inc. itself never had. Furthermore, I’ve failed to find any mention of Ancient UNIX; all that is transferred is rights to SVRX. Overall, I believe that the U.S. courts’ assesment of the facts represents the situation accurately. Thus for all intents and purposes, UNIX up to and including System V remained with Novell/Attachmate/Micro Focus. Caldera therefore never had any rights to Ancient UNIX, which means it never had the rights to issue the Caldera license. The Caldera license is null and void – in the U.S. because the copyright has been lost due to formalities, everywhere else because Caldera never had the rights to issue it. The first step to truly freeing UNIX would this be to get Micro Focus to re-issue the Caldera license for Ancient UNIX, ideally it would now also include System III and System V. BSD/OS Another operating system near UNIX is of interest. The USL v. BSDi lawsuit includes two parties: USL, which we have seen above, and Berkeley Software Design, Inc. BSDi sold BSD/386 (later BSD/OS), which was a derivative of 4.4BSD. The software parts of the BSDi company were acquired by Wind River Systems, whereas the hardware parts went to iXsystems. Copyright is not disputed there, though Wind River Systems ceased selling BSD/OS products 15 years ago, in 2003. In addition, Wind River System let their trademark on BSD expire, though this is without consequence for copyright. BSD/OS is notable in the sense that it powered much of early internet infrastructure. Traces of its legacy can still be found on Richard Stevens’ FAQ. To truly make UNIX history free, BSD/OS would arguably also need to see a source code release. BSD/OS at least in its earliest releases under BSDi would ship with source code, though under a non-free license, far from BSD or even GPL licensing. System V The fate of System V as a whole is difficult to determine. Various licenses have been granted to a number of vendors (Dell UNIX comes to mind; HP for HP-UX, IBM for AIX, SGI UNIX, etc.). Sun released OpenSolaris – notoriously, Oracle closed the source to Solaris again after its release –, which is a System V Release 4 descendant. However, this means nothing for the copyright or licensing status of System V itself. Presumably, the rights with System V still remain with Novell (now Micro Focus): SCO managed to sublicense rights to develop and sell UnixWare/OpenServer, themselves System V/III descendants, to unXis, Inc. (now known as Xinuos, Inc.), which implies that Xinuos is not the copyright holder of System V. Obviously, to free UNIX, System V and its entire family of descendants would also need to be open sourced. However, I expect tremendous resistance on part of all the companies mentioned. As noted in the “Ancient UNIX” section, Micro Focus alone would probably be sufficient to release System V, though this would mean nothing for the other commercial System V derivatives. Newer Research UNIX The fate of Bell Labs would be a different one; it would go on to be purchased by Lucent, now part of Nokia. After commercial UNIX got separated out to USL, Research UNIX would continue to exist inside of Bell Labs. Research UNIX V8, V9 and V10 were not quite released by Alcatel-Lucent USA Inc. and Nokia in 2017. However, this is merely a notice that the companies involved will not assert their copyrights only with respect to any non-commercial usage of the code. It is still not possible, over 30 years later, to freely use the V8 code. Conclusion In the U.S., Ancient UNIX is freely available. People located everywhere else, however, are unable to legally obtain UNIX code for any of the systems mentioned above. The exception being BSD/OS, assuming a purchase of a legitimate copy of the source code CD. This is deeply unsatisfying and I implore all involved companies to consider open sourcing (preferably under a BSD-style license) their code older than a decade, if nothing else, then at least for the sake of historical purposes. I would like to encourage everybody reading this to consider reaching out to Micro Focus and Wind River Systems about System V and BSD/OS, respectively. Perhaps the masses can change their minds. A small note about patents: Some technologies used in newer iterations of the UNIX system (in particular the System V derivatives) may be encumbered with software patents. An open source license will not help against patent infringement claims. However, the patents on anything used in the historical operating systems will certainly have expired by now. In addition, European readers can ignore this entirely – software patents just aren’t a thing. OpenBGPD - Adding Diversity to the Route Server Landscape Introduction As of last year, there was effectively only a single solution in the Route Server vendor market: the BIRD Internet routing daemon. NIC.CZ (the organisation developing BIRD) has done fantastic work on maintaining their BGP-4 implementation, however, it’s not healthy to have virtually every Internet Exchange Point (IXP) in the RIPE NCC service region depend on a single open source project. The current situation can be compared to the state of the DNS root nameservers back in 2002 - their dependence on the BIND nameserver daemon and the resulting development of NSD as an alternative by NLnet, in cooperation with the RIPE NCC. OpenBGPD used to be one of the most popular Route Server implementations until the early 2010s. OpenBGPD’s main problem was that its performance couldn’t keep up with the Internet’s growth, so it lost market share. An analysis by Job Snijders suggested that a modernised OpenBGPD distribution would be a most viable option to regain diversity on the Route Server level. Missing features in OpenBGPD The following main missing features were identified in OpenBGPD: Performance In previous versions of OpenBGPD, the filtering performance didn’t allow proper filtering of all EBGP sessions. Current best practice at IXP Route Servers is to carefully evaluate and validate of all routes learned from EBGP peers. The OpenBGPD ruleset required to do correct filtering (in many deployment scenarios) was simply too lengthy - and negatively impacted service performance during configuration reloads. While filtering performance is the biggest bottleneck, general improvements to the Routing Information Base were also made to improve scalability. IXP Route Servers with a few hundred peering sessions are commonplace and adding new sessions shouldn’t impact the Route Servers’ service to other peers. We found that performance was the most pressing issue that needed to be tackled. Lack of RPKI Origin Validation As we’ve seen, Internet operators are moving to adopt RPKI based BGP Origin Validation. While it was theoretically possible to emulate RFC 6811-style Origin Validation in previous versions of OpenBGPD, the required configuration wasn’t optimised for performance and wasn’t user friendly. We believe that BGP Origin Validation should be as easy as possible - this requires BGP-4 vendors to implement native, optimised routines for Origin Validation. Of course, enabling Origin Validation shouldn’t have an impact on performance either when processing BGP updates or when updating the Route Origin Authorisation (ROA) table itself. Portability OpenBGPD is an integral part of OpenBSD, but IXPs may prefer to run their services infrastructure on an operating system of their choice. Making sure that there’s a portable OpenBGPD version which follows the OpenBSD project release cycle will give IXPs this option. Development steps By addressing the issues mentioned above, we could bring back OpenBGPD as a viable Route Server implementation. Since I was one of the core OpenBGPD developers, I was asked if I wanted to pick up this project again. Thanks to the funding from the RIPE NCC Project Fund, this was possible. Starting in June 2018, I worked full time on this important community project. Over the last few months, many of the problems are already addressed and are now part of the OpenBSD 6.4 release. So far, 154 commits were made to OpenBGPD during the 6.4 development cycle - around 8% of all commits ever to OpenBGPD! This shows that due to funding and dedicated resources, a lot of work could be pushed into the latest release of OpenBGPD. OpenBGPD 6.4 The OpenBGPD version, as part of OpenBSD 6.4 release, demonstrates great progress. Even though there have been many changes to the core of OpenBGPD, the released version is as solid and reliable as previous releases and the many bug fixes and improvements make this the best OpenBGPD release so far. The changes in the filter language allow users to write more efficient rulesets while the introduction of RPKI origination validation fixes an important missing feature. For IXPs, OpenBGPD now is an alternative again. There are still open issues, but the gap is closing! Feature highlights The following changes should be highlighted: Introduction of background soft-reconfiguration on config reload. Running the soft-reconfiguration task in the background allows for new updates and withdraws to be processed at the same time. This improves convergence time - one of the key metrics for Route Servers. BGP Origin Validation when a roa-set is configured Every EBGP route announcement is validated against the locally configured VRP table entries. Depending on the validation process’s outcome, the validation state is set to valid, invalid or not found. The filter language has been extended to allow checking for the origin validation state, and thanks to this, it is possible to deny invalid prefixes or regard valid prefixes different to the ones that aren’t found. The roa-set table is read from the configuration file and updated during configuration reloads. On production systems reloading the roa-set and applying it to all prefixes is done in a couple of seconds. Fast prefix-set lookups In OpenBSD 6.3 prefix-sets got introduced in OpenBGPD. A prefix-set combines many prefix lookups into a single filter rule. The original implementation wasn’t optimised but now a fast trie lookup is used. Thanks to this, large IRR DB prefix tables can now be implemented efficiently. Introduction of as-sets Similar to prefix-sets, as-sets help group many AS numbers into a single lookup. Thanks to this, large IRR DB origin AS tables can be implemented efficiently. Introduction of origin-sets Looking at the configurations of Route Servers doing full filtering, it was noticed that a common lookup was binding a prefix to an origin AS - similar to how a roa-set is used for RPKI. These origin-set tables are used to extend the IRR prefix lookup and generated from alternative sources. Improving third party tools Users can only benefit from the changes introduced in OpenBGPD 6.4 when the surrounding 3rd party tools are adjusted accordingly. Two opensource projects such as bgpq3 and arouteserver are frequently used by network operators and IXPs to generate BGP configurations. Thanks to our contributions to those projects, we were able to get them ready for all the new features in OpenBGPD. bgpq3 was extended to create as-set and prefix-set tables based on IRR DB entries. This is replacing the old way of doing the same with a large amount of filter rules. Thanks to the quick response from the bgpq3 maintainer, it was possible to ship OpenBSD 6.4 with a bgpq3 package that includes all the new features. arouteserver was adjusted to implement RPKI roa-set, as-set, prefix-set, and origin-set to generate a much better-performing configurations for the 6.4 version. With the v0.20.0 release of arouteserver, IXPs are able to generate an OpenBGPD configuration which is a ton faster but also implements the new functionalities. Looking at YYCIX (the resident IXP in Calgary, Canada) the ruleset generated by arouteserver was reduced from 370,000 rules to well under 6,000 rules. This resulted in the initial convergence time dropping from over 1 hour to less than 2 minutes, and subsequent configuration reloads are hitless and no longer noticeable. What still needs to be done A sizeable chunk of work still left on the table is the rework of the RIB data structures in OpenBGPD - these haven’t been changed since the initial design of OpenBGPD in 2003. There’s currently ongoing work (in small steps, to avoid jeopardising the stability of OpenBGPD) to modernise these data-structures. The goal is to provide better decoupling of the filter step from storing RIB database changes, to pave the way to multi-threaded operations at a later point. Looking forward Job Snijders oversaw this year’s fundraising and project management, he adds: It’s been incredibly productive to create an environment where a core developer is allowed to work full time on the OpenBGPD code base. However, it’s important to note there still is room for a number of new features to help improve its operational capabilities (such as BMP, RFC 7313, ADD_PATH, etc). It’d be beneficial to the Internet community at large if we can extend Claudio Jeker’s involvement for another year. Open source software doesn’t grow on trees! Strategic investments are the only way to keep OpenBGPD’s roadmap aligned with Internet growth and operator requirements. Beastie Bits DragonFly - git: annotated tag v5.5.0 created Torchlight 2 on NetBSD Older, but still good USENIX Login Article on Capsicum The Super Capsicumizer 9000 Dedicated and Virtual Server PXE provisioning tool Cirrus CI have announced FreeBSD support NetBSD PineBook Gameplay BSDCan 2019 CfP is out Allan’s first ZFS array, Zulu, turned 7 years old on Nov 29th Feedback/Questions Malcom - Installing Drivers in Development Samir - Introduction to ZFS Newnix - Drive Failures Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv

Intel Chip Chat
Microsoft Azure* Machine Learning and Project Brainwave – Intel® Chip Chat episode 610

Intel Chip Chat

Play Episode Listen Later Oct 19, 2018 11:35


In this interview from Microsoft Ignite, Dr. Ted Way, Senior Program Manager for Microsoft, stops by to talk about Microsoft Azure* Machine Learning, an end-to-end, enterprise grade data science platform. Microsoft takes a holistic approach to machine learning and artificial intelligence, by developing and deploying complex algorithms as well as accelerating them on hardware. Azure Machine Learning is powered by Project Brainwave, using Intel® FPGAs to deliver real-time AI in the form of image recognition and classification, language understanding, speech to text, and text to speech. Intel FPGAs shine when processing unstructured data and serving a response with very low latency. At Ignite, Microsoft announced four new algorithms – ResNet-152, DenseNet-121, VGG-16, and SSD-VGG – which will allow uses even more flexibility when using the Azure Machine Learning platform. To get started with Azure Machine Learning and Intel FPGAs, visit http://aka.ms/rtai. Intel technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com. Intel and the Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries. *Other names and brands may be claimed as the property of others. © Intel Corporation

FANTASM Podcast
62: The Beyond w/Vogg of Decapitated

FANTASM Podcast

Play Episode Listen Later Apr 16, 2018 164:29


In this lost episode, Dr. West interviews guitarist and founder, Vogg of Decapitated. Just a week or so prior to their Spokane show, where the band was arrested and detained due to rape allegations. Once their innocence was upheld in court and the charges were rightfully dropped, we felt comfortable with proceeding with honoring Vgg with a Horror movie review. We felt a Fulci film would be most appropriate. Given the savage and relentless brutality of Decapitated's music. What happened to Decapitated on their last Us Tour is a reminder to not always assume the news is right. Be patient, wait for the full story from both sides. Sites like Metalsucks embelished the trial and instantly condemned Decapitated for their allegations against them. We ask fans of FANTASM to think for themselves and not trust in these now tabloid metal websites. Get your copy of The Beyond ready! We review the 3 disc Blu ray from Grindhouse Releasing!

IN The Grill Room with Bob & Jay
Jack, Tiger and Justin

IN The Grill Room with Bob & Jay

Play Episode Listen Later Feb 27, 2018 38:59


Justin Thomas prevails in the Honda Classic playoff with Luke List. Jack Nicklaus talks to Bob and, yes, Tiger is back. Bob and guest co-host, Alex Miceli, discuss and analyze the Honda Classic. Alex explains his new venture, Morning Read, and the USGA's new playoff policy is discussed. In GROOVE UP! with Vertical Groove Golf Chris Reeves, the National Sales Manager for VGG, is the Feature Interview.

Video Game Grooves
Episode 18 :: Bastion, Rocket Knight Adventures

Video Game Grooves

Play Episode Listen Later Jan 17, 2018 87:45


Welcome one and all to 2018 with Video Game Grooves! In our inaugural episode for the year, we invite Aaron Hamel from ShiptoShore Media to kick things off! Ganbatte everyone and all that! We begin our game-music-on-vinyl-records journey with the news since our last show! A few new records are available, and even a couple of curious releases! How hard will our collective wallet be hit in the new year? Our features section kicks off with Bastion by Supergiant Games! This acclaimed 2011 soundtrack saw its vinyl release last year, and Jeremy explores the themes of restoration and "swampy guitar", and invents a super-hyphenated genre classification to finally place the Darren Korb score where it belongs on the shelf in our hearts. For our second pick, Aaron helps us explore the oft-overlooked music of Rocket Knight Adventures, for the Genesis/Megadrive. This release from ShiptoShore PhonoCo surprises us as some of the best music we didn't know the system could produce, alongside VGG's previously-featured greats like Gunstar Heroes! Anybody know where we can find a decent Sparkster plushie?? For our third segment we nail down our new year's resolutions as they pertain to game music, vinyl records, and game music on vinyl records. The whole crew express the ways they want to improve their relationships with their turntables and where applicable, their work at their respective music labels. We'd love to hear yours too! Tweet us or post in the comments on our episode blog! Outro: "Setting Sail, Coming Home (End Theme)" - Bastion, by Darren Korb (ft. Ashley Barrett, Darren Korb) Twitter - @vg_grooves, @ajohnagnello, @walnutsoap, @jeremy_lamont, @stsphonoco Tomb Raider Suite (TombRaiderSuite.com) 8-bit Time Paradox (closed) (IndieGoGo) My Singing Monsters (Amazon.com) Prisma & The Masquerade Menace (Backerkit) Arrowheads (TheYetee) Rocket Knight Adventures (ShiptoShore PhonoCo) Kid Dracula (ShiptoShore PhonoCo) Mother 2 (Meteor Splatter variant) (ShiptoShore PhonoCo) Vinyl record sale (ThinkGeek)

IN The Grill Room with Bob & Jay
Rose Wins Tiger to Return

IN The Grill Room with Bob & Jay

Play Episode Listen Later Oct 31, 2017 38:59


Justin Rose wins in China.Tiger announced his return to competitive golf...Bob and Jay examine all aspects of Tiger making a comeback, cautious but hoping for the best. Bernhard Langer...oh my, what a dominating talent on PGA TOUR Champions. Ryan Armour wins in Mississippi. New Feature: GROOVE UP with Vertical Groove Golf - all the news from VGG. Feature Interview: Golf Course Designer Bobby Weed who also talks about HEAL, his Foundation help Autistic children.

IN The Grill Room with Bob & Jay
Harvey Makes a Mess

IN The Grill Room with Bob & Jay

Play Episode Listen Later Aug 30, 2017 39:01


Harvey turned out to be a very unwelcome guest in Texas. Bob and Jay discuss the distress, the aftermath, how it impacted some players and how the golf community is responding. What's in the News is followed by a Presidents Cup update - who will the Captain's picks be? Feature Interview: Rubin Hanan, Founding Partner and COO of Vertical Groove Golf, with updates on John Daly playing in Europe and what's on the horizon for VGG

Startup Data Science
Episode 003 - Lesson 1 - Part 2 (Practical Deep Learning for Coders)

Startup Data Science

Play Episode Listen Later Jun 18, 2017 22:09


Alex Au, Apurva Naik, and Edderic Ugaddan discuss what it's like to go through the setting up for AWS instance so that they could run the 7 lines of code that abstracted the VGG model, which had best-in-class performance a few years back in classifying cats and dogs. Credit for the cat and dog podcast image goes to kitty.green66 (https://www.flickr.com/photos/53887959@N07/4985437148/)

lesson credit aws coders vgg practical deep learning