
Do Large Language Models Mean the End of Programming? Dr. Matt Welsh Elaborates
Matt Welsh is Co-founder and Chief Architect of Fixie.ai, a Seattle-based startup developing a new computational platform with AI at the core. He was previously head of engineering at OctoML, a software engineer at Apple and Xnor.ai, engineering director at Google, and a Professor of Computer Science at Harvard University. He holds a PhD from […]
Read More
How Integrating Foundation Models into Your Code with Amazon Bedrock
- Frank
- November 5, 2023
- amazon web services
- App
- app development
- AWS
- aws architecture
- aws certifications
- aws cloud
- aws cloud service
- aws services
- aws training
- aws tutorial
- Bedrock
- buildonaws
- Cloud
- Cloud Computing
- Cloud Data
- Cloud storage
- Computer
- Data
- Data Center
- Developer
- Developers
- DevOps
- Generative AI
- network
- networking
- Programming
- Technology
This video is from AWS Developers. Discover Amazon Bedrock and learn how to integrate generative AI models from leading AI startups and Amazon into your applications. In this video, AWS Senior Developer Advocate Mike Chambers steps through how to use Boto3, the Python SDK for AWS, to make text generations with models such as Anthropic […]
Read More
Pwnagotchi — hacking WiFi networks in seconds | Real Experiment
- Frank
- November 5, 2023
- Computer
- cyber attacks
- cyber forensics
- cyber-criminals
- CyberAttacks
- CyberCrime
- Cybersecurity
- cybersecurity awareness
- cybersecurity breaches
- data breach
- Device
- Electronics
- experiment
- flash drive
- Flipper Zero
- hacking
- hashcat
- hashcats
- internet safety
- IT security
- Linux
- Malware
- online gaming
- online security
- penetration testing
- phishing
- pwnagotchi
- Security
- Tamagotchi
- tech threats
- Technology
- video chat
- voice chat
- vulnerabilities
- WiFi
- wifi networks
In this video, Sumsub showcases the power of the Pwnagotchi, cheap wifi hacking device. Witness how cybercriminals can hack your wifi network in seconds just by standing near you and leaving you exposed and vulnerable to identity theft, data breaches, and more.
Read More
All Apple Products are Vulnerable to New Password Stealing Hack
This video is from Seytonic. Sources: https://arstechnica.com/?p=1978389 https://ileakage.com/ https://www.bleepingcomputer.com/news/security/new-ileakage-attack-steals-emails-passwords-from-apple-safari/ https://therecord.media/doj-seizure-web-domains-north-korean-tech-worker-scheme https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-action-disrupt-illicit-revenue-generation https://www.darkreading.com/careers-and-people/freelance-market-flooded-with-north-korean-it-actors https://www.ic3.gov/Media/Y2023/PSA231018 https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-action-disrupt-illicit-revenue-generation https://techcrunch.com/2023/09/05/flipper-zero-hacking-iphone-flood-popups/ https://techryptic.github.io/2023/09/01/Annoying-Apple-Fans/ https://www.bleepingcomputer.com/news/security/flipper-zero-can-be-used-to-launch-ios-bluetooth-spam-attacks/ https://www.instagram.com/p/Cyf5y2EtA_V/ https://www.youtube.com/watch?v=NBYiroTOOWg&ab_channel=TAKEAPART lockup spam demo https://www.youtube.com/watch?v=u5FKyRRaRjQ&t=386s&ab_channel=TalkingSasquach https://www.mobile-hacker.com/2023/10/17/spam-ios-android-and-windows-with-bluetooth-pairing-messages-using-flipper-zero-or-android-smartphone/ https://arstechnica.com/?p=1977141 https://www.bleepingcomputer.com/news/security/fake-keepass-site-uses-google-ads-and-punycode-to-push-malware/ https://www.malwarebytes.com/blog/threat-intelligence/2023/10/clever-malvertising-attack-uses-punycode-to-look-like-legitimate-website
Read More
Why RISC-V isn’t killing Arm (yet)
- Frank
- November 2, 2023
- 64-bit
- architecture
- ARM
- arm64
- armv8
- armv9
- beat
- better
- board
- bringup
- CISC
- cm4
- competitor
- compute module
- Computer
- computing
- Cores
- debian
- debug
- image
- Intel
- io board
- isa
- jh7110
- licenced
- licensing
- Linux
- Mars
- mars cm
- milk-v
- milkv
- open
- os
- pcie
- pioneer
- Raspberry Pi
- risc
- risc-v
- riscv
- SBC
- serial
- setup
- sifive
- single
- Software
- sophone
- source
- starfive
- support
- UART
- ubuntu
- visionfive
- win
- winning
- x64
- x86
This video is from Jeff Geerling. The Mars CM is neat. But is it an adequate replacement for the Raspberry Pi CM4? Links: Mars CM: https://milkv.io/mars-cm ARACE store: https://arace.tech/products/milk-v-mars-cm Mars CM test data: https://github.com/geerlingguy/sbc-reviews/issues/22 StarFive VisionFive 2 review: https://www.jeffgeerling.com/blog/2023/risc-v-business-testing-starfives-visionfive-2-sbc
Read More
Signal Did NOT Get Hacked
This video from Seytonic rounds up all the latest security news. Sources: https://www.bleepingcomputer.com/news/security/signal-says-there-is-no-evidence-rumored-zero-day-bug-is-real https://cybernews.com/news/signal-rumor-zero-day-vulnerability/ https://thehackernews.com/2023/10/signal-debunks-zero-day-vulnerability.html https://www.hackread.com/signal-zero-day-vulnerability-refuted/ https://www.bitdefender.com/blog/hotforsecurity/signal-debunks-online-rumours-of-zero-day-security-vulnerability/ https://www.washingtonpost.com/politics/2023/10/17/signal-says-rumored-vulnerability-doesnt-exist-heres-what-know/ https://blog.cloudflare.com/malicious-redalert-rocket-alerts-application-targets-israeli-phone-calls-sms-and-user-information/ https://www.bleepingcomputer.com/news/security/fake-redalert-rocket-alert-app-for-israel-installs-android-spyware/ https://www.hackread.com/hackers-israeli-rocket-alert-app-spyware/ https://www.darkreading.com/application-security/fake-airstrike-alert-app-targets-israelis https://www.hackread.com/ransomedvc-colonial-pipeline-cybersecurity-breach/ https://therecord.media/colonial-pipeline-attributes-ransomware-claims-to-unrelated-third-party-breach https://thehackernews.com/2023/10/pro-russian-hackers-exploiting-recent.html https://blog.cluster25.duskrise.com/2023/10/12/cve-2023-38831-russian-attack https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/ https://www.bleepingcomputer.com/news/security/google-links-winrar-exploitation-to-russian-chinese-state-hackers/ https://therecord.media/russia-china-hackers-exploit-winrar-bug https://www.theverge.com/2023/10/18/23922075/winrar-security-vulnerability-exploit-patch-update
Read More
Hacktivists Target Israel… What’s Happened So Far?
This video is from Seytonic. Sources: https://go.theregister.com/feed/www.theregister.com/2023/10/09/hacktivism_middle_east/ https://www.wired.com/story/israel-hamas-war-hacktivism/ https://www.wired.com/story/israel-hamas-war-surveillance/ https://www.wired.com/story/x-israel-hamas-war-disinformation/ https://www.darkreading.com/dr-global/hacktivists-enter-fray-following-hamas-strikes-against-israel https://www.darkreading.com/dr-global/hackers-for-hire-hit-both-sides-in-israel-hamas-conflict
Read More
The Computer Chronicles – Windows 98 (1998)
This video is from The Computer Chronicles and tracks the launch of Windows 98 as well as a new upstart Windows alternative called Linux.
Read More
How does Computer Hardware Work?
- Frank
- September 13, 2023
- Build a PC
- Central Processing Unit
- Computer
- Computer Desktop
- Computer Drivers
- computer engineering
- Computer Hardware
- computer hardware engineer
- Computer Hardware Tutorial
- Computer Keyboard
- Computer Mouse
- Computer Teardown
- CPU
- CPU Cooler
- desktop
- Desktop Power Supply
- DRAM
- engineering
- GPU
- graphics card
- hard drive
- Hardware
- how to build a pc
- inside a computer
- Motherboard
- Nvidia
- NVMe SSD
- PC
- PC Build
- Solid State Drives
- SSDs
- teardown
Branch Education takes us on a 3D animated adventure to every piece of computer hardware inside a desktop computer. You’ll also see a nanoscopic view of the transistors inside the CPU and GPU. This video is like a biology dissection lab; instead, we’re opening up a computer and seeing all the various computer hardware inside.
Read More