Wrong email address or username
Wrong email address or username
Incorrect verification code
back to top
Search tags: p-computers-it
Load new posts () and activity
Like Reblog Comment
show activity (+)
review 2018-01-14 22:50
Angel 1089 (Heaven Corp. #1) by C.C. Bridges
Angel 1089 - C.C. Bridges

For the life of me I could not connect with any of the characters. Some of them, I don't even know why they are there. Actually, I don't know why half the book is there.

I don't understand the world, there are bits of this and that and a glimpse of something else.

But why is the sun not shining outside the city? Why do soldiers (that's what angels are) live at the very top guarding warehouses, why not the richest and most privileged strolling through their high rise palaces?

Where is Rocco? I hoped Gabriel would recognize him in one of the other angels, or other modded. If Rocco loved Gabriel, he would have followed him and met the same (or almost) fate.

Jeff... nothing solid on him either.

I mean, you take every single character and they are just floundering around, barely afloat, flicking in and out of their cartoon-ish existence.

Someone told me not to bother with this book. It was on "my friends said no" shelf for a long time. But then I needed it for a challenge *ugh* I will NOT be buying book 2. 

Like Reblog Comment
show activity (+)
review 2018-01-14 20:23
Listening In: Cybersecurity in an Insecure Age
Listening In: Cybersecurity in an Insecure Age - Susan Landau

[I received a copy of this book through NetGalley.]

An interesting foray into encryption and privacy, especially when considering the point of view of authorities who may need to access data on devices seized upon arrests.

The author makes a case for strengthened encryption, and I feel this makes more sense than the contrary. The book is positioned around the main controversy of including backdoors to allow police and intelligence services to access a device, so that when they need to do it during an investigation, to apprehend a perp or to follow the trail of other people potentially involved, they could do so easily; whereas strong encryption would make it difficult or impossible. However, as has been discussed during actual investigations (an example given in the book involves Apple), there’d be no guarantees that in-built backdoors would be used only by authorities: if they’re here, sooner or later someone with ill intentions is bound to find them and use them, too.

This ties into a general concern about how we have evolved into a digital age, and have to envision security from this perspective. Here also, while not going into deep technical details, the book explains the principles underlying this new brand of security; how this or that method works; the pros and cons of going towards more encryption or less encryption; what other solutions have already been tested, especially in military environments; how cyber-attacks can disrupt governmental operations in many different ways, such as what happened with Estonia and Georgia, and even the 2016 US elections. All very current and hot issues that deserve to be pointed at and examined, because whatever solutions get implemented, if they create less security and impinge on civilian privacy as well, they’re not going to be useful for very long (if ever).

Also interesting, even though it’s not the main focus, is the concept of encryption methods needing to be made public in order to be really efficient: the more people have a chance of poking at them, testing them, and finding faults, the more these methods can be revised and strengthened.

Conclusion: Not a very technical book, but that’s precisely why it makes a good introduction to such matters: easy to understand, while highlighting major concerns that not only deal with national security, but with our own (and with our privacy) as well.

Like Reblog Comment
text 2017-08-10 15:31
The Advantages of Computer Tricks and Tips Hacks
How to Speed-Up your Windows PC like it's brand new again: Easy steps anyone can do to make your computer as snappy as it was the day you bought it! (Computer tips Book 1) - Kevin Meininger

You may even know if a person is hacking your PC. Not only are you going to learn the way to use each hack, you will also discover why it works. Eventually, they should learn how to find some suggestions and tricks for the iPhone. There are a few cool Facebook tricks and secrets which you can try and amaze friends and family with. Among the most fascinating ongoing hacker techniques is known as bait and switch. Or you could watch our custom made theme video tutorial. Also ensure you check out our big selection of guides on the best way to utilize Windows 10 to make certain you get the absolute most out of the new operating system.


Things You Should Know About Computer Tricks and Tips Hacks

A problem can be made in the event the keyboard isn't pointed to the overall direction of the receiver. If there's a network problem you would like an interface to reveal the range of the issue at a glance. Not all the questions are simple to answer but there is not going to be a problem if you concentrate on transmitting that you truly need work and you may be committed to it. It is possible to get questions regarding your own personal life which you don't expect, just answer honestly and don't attempt to delude the operator. Start to type a word and it'll find answers without needing to enter the full word or phrase.

Computer Tricks and Tips Hacks: No Longer a Mystery

If you often run numerous programs simultaneously, your desktop can become extremely cluttered. It makes it possible to in accessing your favourite programs easily and quickly. There are a number of programs installed in our PC. The most important reason to keep an eye on your network is to look at that your all your servers are readily available.

The Most Popular Computer Tricks and Tips Hacks

If your site hasn't updated its encryption protection in a couple of decades, you're probably in danger. All available sites are going to appear in a drop-down menu, which you are able to click to see on the present laptop. Other websites have the capability to provide images of nearby garage at which you might have hidden the car to prevent repossession. There are a number of websites that have many methods for iPhone. You may check this post that I have prepared earlier about the Top five Tools To accelerate Your laptop.

Windows 7 comes with some rather attractive new wallpapers, and it is not always simple to determine which one you enjoy the ideal. Windows does not supply you with a simple approach to switch the speed or fashion of the animation, though, an easy registry tweak can be applied to enable and manage the animation. If you're using Windows on a tablet, entering the password to be able to access the computer each time you login can be a little annoying. So now you know what things to do whenever you're working on a great deal of Windows together.

Now restart, and you will go right to your desktop. You could also restart the computer and check whether the keyboard works. If you prefer to shut off your computer after two minutes type the next command. You could also shut off your computer with command prompt. It let's users benefit from the hosted network (Virtualization) feature for making a digital wireless connection. In conditions where you don't need to allow users in order to get this done to be able to secure your PC. A great deal of avid Windows users aren't content with this substantial shift in the UI, and are annoyed by the extra step necessary to open the Desktop.

A new Windows 7 option, however, may not only explain the issue, but might get your program working again with no loss of information. This way that you don't have to at all times visit the Start Menu. More shortcuts are available here. The folder will then be launched in another procedure, and thus a crash is not as likely to affect anything else. Hiding a folder is among them. If you, similar to me, depend on folders to auto-expand so that you can quickly move files from subfolder to subfolder without needing to open all of them manually each moment, here's the easy fix which you want.

In fact, it isn't precisely the start button you're going to be utilized to from XP, Vista or Windows 7. As MIDI and audio parts show up on an identical screen in modern sequencers, it's quite easy arrange them in a song. After choosing the tile size, after that you can return to the Start screen and put it wherever you would like. It has come to be among the most well-known means of keeping in touch with long-lost family and friends members.

For good functioning, you ought to keep the keyboard clean and get a laptop cooling mat. Even though a regular keyboard may be used in such place, the replacement outlays, as a result of rough usage, would be astronomically large. Today, virtual keyboards are not only confined to computers. There are several kinds of virtual keyboards. You won't have the ability to work should youn't have a keyboard connected to the computer. It is well-known that the computer keyboard has become the most used portion of the PC.

Like Reblog Comment
show activity (+)
review 2017-07-30 20:18
The Comic Book Story of Video Games
The Comic Book Story of Video Games: The Incredible History of the Electronic Gaming Revolution - Jonathan Hennessey,Jack Mcgowan

[I received a copy of this book through NetGalley.]

Fairly interesting, although to be honest, in spite of the early chapters being educative in their own ways, I would’ve preferred to see the focus more on the actual video games (and industry) themselves, rather than also on the electricity/industrial revolution parts. The art style, too, was not always consistent, and sometimes too stiff.

On the other hand, I appreciated the inclusion of actual video games characters in panels, as watchers or part of the ‘narrative’; just trying to remember or find out who they were, was in itself another, different dive into history. (Well, maybe it wouldn’t work that well on someone who knows less about such games, but for me, it worked.)

I also liked how the book included some of the backstage workings behind the whole video games industry; they were plenty of things I didn’t know, for instance Sony and its Playstation, I had no idea there had been a deal in the plans with Nintendo for CD games, and that it completely fell through. (I’m not feeling younger, though. Being reminded that this PSX I got in 1998—and I made it a point to get a US model, too, since the European one didn’t run the games I wanted—was even a few years older than that... well...)

Conclusion: An informative and colourful read. I do wish it had spent just a little less time on the really early years, where ‘games’ per se weren’t so much concerned (to be fair, I already know a lot about computer history in general).

Like Reblog Comment
show activity (+)
review 2017-07-17 20:05
Turing's Imitation Game
Turing's Imitation Game: Conversations with the Unknown - Kevin Warwick,Huma Shah

[I received a copy of this book through NetGalley.]

That was an informative, albeit also controversial, read about Turing’s ‘Imitation Game’, focused on the game itself rather than on the man (who I like reading about in general, but here I was definitely more interested in his famous ‘test’, since I keep hearing about it, but never in much detail). It sheds light on Turing’s aim when devising the test, as well as on what he predicted, and that may or may not happen sooner than expected.

Several sections in the book are devoted to examples of studies and events during which the test took place, pitching human judges against both machines and other human beings, without the former knowing what or who the latter was. Actual, textual examples allow the reader to try and make their own judgment—and determining where the machines are is not so easy as it seems. I was accurate in my guesses except but once, I think, however I can see where judges were ‘fooled’, and why. At other times, I was surprised at the outcome, for instance quite a few human participants made ‘boring’ answers to conversations, which in turn prompted judges to believe they were talking to a machine—and conversely, some AIs were clearly programmed with a variety of lively potential responses. Eugene Goostman, especially, with its persona of a 13-year old Ukrainian boy whose English is only second language, has good potential (in that you can tell some of its/his answers are stilted, but not more than if it/he was an actual learner of ESOL).

The test as a whole posits several interesting questions and conundrums. Namely, the fact that it’s based on language, and that one may wonder whether being able to converse means one is gifted with ‘thought’. Another one is whether the test as it exists can really be used as a marker: aren’t the various chatbots/AIs out there simply well-programmed, but in no way indicative of whether they’ll be able to go further than that?

Also, I’m not sure I can agree with the 2014 ‘the Turing test has been passed’ result, as it seems to me the percentage is too low to warrant such a qualifier (if 90% of judges were fooled in believing they were conversing with a human, now that’d be something else... or am I aiming too high?), and it’s too early anyway for the current AIs to have been developed far enough (as fascinating as some of their conversations were, they still looked much more like complex chatbots than anything else—at least, to me).

Conclusion: 3.5 stars. I did learn quite a few things no matter what.

More posts
Your Dashboard view:
Need help?