Torna indietro   Hardware Upgrade Forum > Off Topic > Discussioni Off Topic > Storia, politica e attualità (forum chiuso)

Un mostro da MSI: QD-OLED WQHD a 500 Hz con AI Care e DisplayPort 2.1a
Un mostro da MSI: QD-OLED WQHD a 500 Hz con AI Care e DisplayPort 2.1a
Abbiamo potuto mettere le mani in anteprima sul nuovo monitor MSI dedicato ai giocatori: un mostro che adotta un pannello QD-OLED da 26,5 pollici con risoluzione 2560 x 1440 pixel, frequenza di aggiornamento fino a 500 Hz e tempo di risposta di 0,03 ms GtG
DJI Neo 2 in prova: il drone da 160 grammi guadagna il gimbal e molto altro
DJI Neo 2 in prova: il drone da 160 grammi guadagna il gimbal e molto altro
DJI aggiorna la sua linea di droni ultraleggeri con Neo 2, un quadricottero da 160 grammi che mantiene la compattezza del predecessore ma introduce una stabilizzazione meccanica a due assi, sensori omnidirezionali e un sistema LiDAR
L'IA "seria" di Appian è diversa: inserita nei processi e rispetta dati e persone
L'IA "seria" di Appian è diversa: inserita nei processi e rispetta dati e persone
Ad Appian Europe 2025, l'azienda parla molto della sua visione di cos'è e come dovrebbe essere usata l'intelligenza artificiale: è uno strumento che va sempre adoperato dalle persone, che devono rimanere responsabili dei processi all'interno dell'azienda. Non è un giocattolo con cui sperimentare, ma un aiuto per superare le sfide di business più importanti
Tutti gli articoli Tutte le news

Vai al Forum
Rispondi
 
Strumenti
Old 30-05-2009, 15:41   #21
Xile
Senior Member
 
L'Avatar di Xile
 
Iscritto dal: Nov 2003
Città: Utopia Planitia
Messaggi: 3875
Quote:
Originariamente inviato da Fil9998 Guarda i messaggi
"legittimo" non è il problema...

di guerre e massacri e sfruttamenti e sofferenze "legittime" è piena la storia e il presente, e dato che nessun vuol cambiare il registro, pure il futuro.


legittimamente tutti contro tutti a scannarsi, come nelle caverne.


evoluzione è un'altra cosa.
Ma che centrano i massacri e guerre?! Qua si parla di attacchi informatici e che Obama sta cercando di mettere su una protezione.
__________________
Xile è offline   Rispondi citando il messaggio o parte di esso
Old 30-05-2009, 17:33   #22
Fil9998
Senior Member
 
L'Avatar di Fil9998
 
Iscritto dal: Sep 2004
Città: Padova
Messaggi: 11762
è la terza volta che cerco di spiegarlo: è un concetto difficile, ne prendo atto:

il problema è che Obama promise e lasciò sperare in un cambio di mentalità rispetto a quella che vede da secoli ogni sforzo nelle azioni di "contro" piuttosto che nelle azioni "a favore".
nell'umano agire.
Egli in quanto leader della nazione più potente ed influente ha le leve per indurre simile cambio di mentalità e per supportarlo con azioni che lo tradcano in termini concreti.

"solo" questo,

ma fa la differenza fra il continuare ad ammazzarci o meno

e vista la situazione sociale militare tecnologica epolitica potrebbe essere la famosa terza mondiale di cui parava Einstaein fatta con l'atomica...

la quarta la faremo con le clave diceva ...


il "solo" racchiude in sè una concatenazione di variazioni STORICA per non dire EVOLUTIVA.



non posterò puù nel tread.

tanto chi vuol capire ha già capito.
__________________
mac user = hai soldi da buttare; linux user = hai tempo da buttare; windows user = hai soldi e tempo da buttare
Fil9998 è offline   Rispondi citando il messaggio o parte di esso
Old 30-05-2009, 17:46   #23
Andala
Senior Member
 
Iscritto dal: Oct 2003
Messaggi: 1372
Quote:
Originariamente inviato da Xile Guarda i messaggi
Ma che centrano i massacri e guerre?! Qua si parla di attacchi informatici e che Obama sta cercando di mettere su una protezione.
Con il livello tecnologico raggiunto, gli attacchi informatici potrebbero rilevarsi più devastanti di quelli convenzionali. Intere economie potrebbero venire distrutte in pochi minuti e con esse wellfare e sistemi sanitari. Lo scabio delle merci interrotto porterebbe a fame e carestie e lo stesso vale in merito all'energia. Se gli USA adottassero tale linea di condotta, non dovrebbero poi stupirsi se si trovassero qualche città nuclearizzata o l'intero midwest radioattivo. Azione reazione.
__________________
Trabant Meglio comprare un litro di latte quando serve, piuttosto che mantenere una vacca per tutta la vita ...
P54C 133Mhz Icomp Index 1110 Matrox Millenniun HD SCSI Seagate + IBM Creative Awe 32 DXR2 Win95C Mozilla Firebird 0.7 (Dec/1995-13/Apr/2009)
Andala è offline   Rispondi citando il messaggio o parte di esso
Old 30-05-2009, 17:49   #24
dantes76
Senior Member
 
L'Avatar di dantes76
 
Iscritto dal: Dec 2002
Città: AnTuDo ---------- Messaggi Totali: 10196
Messaggi: 1521
Quote:
Originariamente inviato da Andala Guarda i messaggi
Con il livello tecnologico raggiunto, gli attacchi informatici potrebbero rilevarsi più devastanti di quelli convenzionali. Intere economie potrebbero venire distrutte in pochi minuti e con esse wellfare e sistemi sanitari. Lo scabio delle merci interrotto porterebbe a fame e carestie e lo stesso vale in merito all'energia. Se gli USA adottassero tale linea di condotta, non dovrebbero poi stupirsi se si trovassero qualche città nuclearizzata o l'intero midwest radioattivo. Azione reazione.
magari russa, che manco hanno i soldi per tenere in volo i loro bombardieri

ah dimenticavo il concetto di ritrovarsi qualche citta nuclearizzata, vale anche per: ritrovarsi qualche scuola piena di terroristi..o no? azione reazione? chissa' ancora quante reazioni si dovranno vedere da parte dei ceceni
__________________
“ Fiat iustitia, et pereat mundus”-המעז מנצח -
dantes76 è offline   Rispondi citando il messaggio o parte di esso
Old 30-05-2009, 17:49   #25
eraser
Senior Member
 
L'Avatar di eraser
 
Iscritto dal: Nov 2001
Città: Bastia Umbra (PG)
Messaggi: 6395
Questo il testo del discorso di Obama:

Quote:
THE PRESIDENT: Everybody, please be seated. We meet today at a transformational moment -- a moment in history when our interconnected world presents us, at once, with great promise but also great peril.

Now, over the past four months my administration has taken decisive steps to seize the promise and confront these perils. We're working to recover from a global recession while laying a new foundation for lasting prosperity. We're strengthening our armed forces as they fight two wars, at the same time we're renewing American leadership to confront unconventional challenges, from nuclear proliferation to terrorism, from climate change to pandemic disease. And we're bringing to government -- and to this White House -- unprecedented transparency and accountability and new ways for Americans to participate in their democracy.

But none of this progress would be possible, and none of these 21st century challenges can be fully met, without America's digital infrastructure -- the backbone that underpins a prosperous economy and a strong military and an open and efficient government. Without that foundation we can't get the job done.

It's long been said that the revolutions in communications and information technology have given birth to a virtual world. But make no mistake: This world -- cyberspace -- is a world that we depend on every single day. It's our hardware and our software, our desktops and laptops and cell phones and Blackberries that have become woven into every aspect of our lives.

It's the broadband networks beneath us and the wireless signals around us, the local networks in our schools and hospitals and businesses, and the massive grids that power our nation. It's the classified military and intelligence networks that keep us safe, and the World Wide Web that has made us more interconnected than at any time in human history.

So cyberspace is real. And so are the risks that come with it.

It's the great irony of our Information Age -- the very technologies that empower us to create and to build also empower those who would disrupt and destroy. And this paradox -- seen and unseen -- is something that we experience every day.

It's about the privacy and the economic security of American families. We rely on the Internet to pay our bills, to bank, to shop, to file our taxes. But we've had to learn a whole new vocabulary just to stay ahead of the cyber criminals who would do us harm -- spyware and malware and spoofing and phishing and botnets. Millions of Americans have been victimized, their privacy violated, their identities stolen, their lives upended, and their wallets emptied. According to one survey, in the past two years alone cyber crime has cost Americans more than $8 billion.

I know how it feels to have privacy violated because it has happened to me and the people around me. It's no secret that my presidential campaign harnessed the Internet and technology to transform our politics. What isn't widely known is that during the general election hackers managed to penetrate our computer systems. To all of you who donated to our campaign, I want you to all rest assured, our fundraising website was untouched. (Laughter.) So your confidential personal and financial information was protected.

But between August and October, hackers gained access to emails and a range of campaign files, from policy position papers to travel plans. And we worked closely with the CIA -- with the FBI and the Secret Service and hired security consultants to restore the security of our systems. It was a powerful reminder: In this Information Age, one of your greatest strengths -- in our case, our ability to communicate to a wide range of supporters through the Internet -- could also be one of your greatest vulnerabilities.

This is a matter, as well, of America's economic competitiveness. The small businesswoman in St. Louis, the bond trader in the New York Stock Exchange, the workers at a global shipping company in Memphis, the young entrepreneur in Silicon Valley -- they all need the networks to make the next payroll, the next trade, the next delivery, the next great breakthrough. E-commerce alone last year accounted for some $132 billion in retail sales.

But every day we see waves of cyber thieves trolling for sensitive information -- the disgruntled employee on the inside, the lone hacker a thousand miles away, organized crime, the industrial spy and, increasingly, foreign intelligence services. In one brazen act last year, thieves used stolen credit card information to steal millions of dollars from 130 ATM machines in 49 cities around the world -- and they did it in just 30 minutes. A single employee of an American company was convicted of stealing intellectual property reportedly worth $400 million. It's been estimated that last year alone cyber criminals stole intellectual property from businesses worldwide worth up to $1 trillion.

In short, America's economic prosperity in the 21st century will depend on cybersecurity.

And this is also a matter of public safety and national security. We count on computer networks to deliver our oil and gas, our power and our water. We rely on them for public transportation and air traffic control. Yet we know that cyber intruders have probed our electrical grid and that in other countries cyber attacks have plunged entire cities into darkness.

Our technological advantage is a key to America's military dominance. But our defense and military networks are under constant attack. Al Qaeda and other terrorist groups have spoken of their desire to unleash a cyber attack on our country -- attacks that are harder to detect and harder to defend against. Indeed, in today's world, acts of terror could come not only from a few extremists in suicide vests but from a few key strokes on the computer -- a weapon of mass disruption.

In one of the most serious cyber incidents to date against our military networks, several thousand computers were infected last year by malicious software -- malware. And while no sensitive information was compromised, our troops and defense personnel had to give up those external memory devices -- thumb drives -- changing the way they used their computers every day.

And last year we had a glimpse of the future face of war. As Russian tanks rolled into Georgia, cyber attacks crippled Georgian government websites. The terrorists that sowed so much death and destruction in Mumbai relied not only on guns and grenades but also on GPS and phones using voice-over-the-Internet.

For all these reasons, it's now clear this cyber threat is one of the most serious economic and national security challenges we face as a nation.

It's also clear that we're not as prepared as we should be, as a government or as a country. In recent years, some progress has been made at the federal level. But just as we failed in the past to invest in our physical infrastructure -- our roads, our bridges and rails -- we've failed to invest in the security of our digital infrastructure.

No single official oversees cybersecurity policy across the federal government, and no single agency has the responsibility or authority to match the scope and scale of the challenge. Indeed, when it comes to cybersecurity, federal agencies have overlapping missions and don't coordinate and communicate nearly as well as they should -- with each other or with the private sector. We saw this in the disorganized response to Conficker, the Internet "worm" that in recent months has infected millions of computers around the world.

This status quo is no longer acceptable -- not when there's so much at stake. We can and we must do better.

And that's why shortly after taking office I directed my National Security Council and Homeland Security Council to conduct a top-to-bottom review of the federal government's efforts to defend our information and communications infrastructure and to recommend the best way to ensure that these networks are able to secure our networks as well as our prosperity.

Our review was open and transparent. I want to acknowledge, Melissa Hathaway, who is here, who is the Acting Senior Director for Cyberspace on our National Security Council, who led the review team, as well as the Center for Strategic and International Studies bipartisan Commission on Cybersecurity, and all who were part of our 60-day review team. They listened to a wide variety of groups, many of which are represented here today and I want to thank for their input: industry and academia, civil liberties and private -- privacy advocates. We listened to every level and branch of government -- from local to state to federal, civilian, military, homeland as well as intelligence, Congress and international partners, as well. I consulted with my national security teams, my homeland security teams, and my economic advisors.

Today I'm releasing a report on our review, and can announce that my administration will pursue a new comprehensive approach to securing America's digital infrastructure.

This new approach starts at the top, with this commitment from me: From now on, our digital infrastructure -- the networks and computers we depend on every day -- will be treated as they should be: as a strategic national asset. Protecting this infrastructure will be a national security priority. We will ensure that these networks are secure, trustworthy and resilient. We will deter, prevent, detect, and defend against attacks and recover quickly from any disruptions or damage.

To give these efforts the high-level focus and attention they deserve -- and as part of the new, single National Security Staff announced this week -- I'm creating a new office here at the White House that will be led by the Cybersecurity Coordinator. Because of the critical importance of this work, I will personally select this official. I'll depend on this official in all matters relating to cybersecurity, and this official will have my full support and regular access to me as we confront these challenges.

Today, I want to focus on the important responsibilities this office will fulfill: orchestrating and integrating all cybersecurity policies for the government; working closely with the Office of Management and Budget to ensure agency budgets reflect those priorities; and, in the event of major cyber incident or attack, coordinating our response.

To ensure that federal cyber policies enhance our security and our prosperity, my Cybersecurity Coordinator will be a member of the National Security Staff as well as the staff of my National Economic Council. To ensure that policies keep faith with our fundamental values, this office will also include an official with a portfolio specifically dedicated to safeguarding the privacy and civil liberties of the American people.

There's much work to be done, and the report we're releasing today outlines a range of actions that we will pursue in five key areas.

First, working in partnership with the communities represented here today, we will develop a new comprehensive strategy to secure America's information and communications networks. To ensure a coordinated approach across government, my Cybersecurity Coordinator will work closely with my Chief Technology Officer, Aneesh Chopra, and my Chief Information Officer, Vivek Kundra. To ensure accountability in federal agencies, cybersecurity will be designated as one of my key management priorities. Clear milestones and performances metrics will measure progress. And as we develop our strategy, we will be open and transparent, which is why you'll find today's report and a wealth of related information on our Web site, www.whitehouse.gov.

Second, we will work with all the key players -- including state and local governments and the private sector -- to ensure an organized and unified response to future cyber incidents. Given the enormous damage that can be caused by even a single cyber attack, ad hoc responses will not do. Nor is it sufficient to simply strengthen our defenses after incidents or attacks occur. Just as we do for natural disasters, we have to have plans and resources in place beforehand -- sharing information, issuing warnings and ensuring a coordinated response.

Third, we will strengthen the public/private partnerships that are critical to this endeavor. The vast majority of our critical information infrastructure in the United States is owned and operated by the private sector. So let me be very clear: My administration will not dictate security standards for private companies. On the contrary, we will collaborate with industry to find technology solutions that ensure our security and promote prosperity.

Fourth, we will continue to invest in the cutting-edge research and development necessary for the innovation and discovery we need to meet the digital challenges of our time. And that's why my administration is making major investments in our information infrastructure: laying broadband lines to every corner of America; building a smart electric grid to deliver energy more efficiently; pursuing a next generation of air traffic control systems; and moving to electronic health records, with privacy protections, to reduce costs and save lives.

And finally, we will begin a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital workforce for the 21st century. And that's why we're making a new commitment to education in math and science, and historic investments in science and research and development. Because it's not enough for our children and students to master today's technologies -- social networking and e-mailing and texting and blogging -- we need them to pioneer the technologies that will allow us to work effectively through these new media and allow us to prosper in the future. So these are the things we will do.

Let me also be clear about what we will not do. Our pursuit of cybersecurity will not -- I repeat, will not include -- monitoring private sector networks or Internet traffic. We will preserve and protect the personal privacy and civil liberties that we cherish as Americans. Indeed, I remain firmly committed to net neutrality so we can keep the Internet as it should be -- open and free.

The task I have described will not be easy. Some 1.5 billion people around the world are already online, and more are logging on every day. Groups and governments are sharpening their cyber capabilities. Protecting our prosperity and security in this globalized world is going to be a long, difficult struggle demanding patience and persistence over many years.

But we need to remember: We're only at the beginning. The epochs of history are long -- the Agricultural Revolution; the Industrial Revolution. By comparison, our Information Age is still in its infancy. We're only at Web 2.0. Now our virtual world is going viral. And we've only just begun to explore the next generation of technologies that will transform our lives in ways we can't even begin to imagine.

So a new world awaits -- a world of greater security and greater potential prosperity -- if we reach for it, if we lead. So long as I'm President of the United States, we will do just that. And the United States -- the nation that invented the Internet, that launched an information revolution, that transformed the world -- will do what we did in the 20th century and lead once more in the 21st.

Thank you very much, everybody. Thank you.
__________________
:: Il miglior argomento contro la democrazia è una conversazione di cinque minuti con l'elettore medio ::
eraser è offline   Rispondi citando il messaggio o parte di esso
Old 30-05-2009, 18:01   #26
Xile
Senior Member
 
L'Avatar di Xile
 
Iscritto dal: Nov 2003
Città: Utopia Planitia
Messaggi: 3875
Quote:
Originariamente inviato da Fil9998 Guarda i messaggi
è la terza volta che cerco di spiegarlo: è un concetto difficile, ne prendo atto:

il problema è che Obama promise e lasciò sperare in un cambio di mentalità rispetto a quella che vede da secoli ogni sforzo nelle azioni di "contro" piuttosto che nelle azioni "a favore".
nell'umano agire.
Egli in quanto leader della nazione più potente ed influente ha le leve per indurre simile cambio di mentalità e per supportarlo con azioni che lo tradcano in termini concreti.

"solo" questo,

ma fa la differenza fra il continuare ad ammazzarci o meno

e vista la situazione sociale militare tecnologica epolitica potrebbe essere la famosa terza mondiale di cui parava Einstaein fatta con l'atomica...

la quarta la faremo con le clave diceva ...


il "solo" racchiude in sè una concatenazione di variazioni STORICA per non dire EVOLUTIVA.



non posterò puù nel tread.

tanto chi vuol capire ha già capito.
Se lo dici te
__________________
Xile è offline   Rispondi citando il messaggio o parte di esso
Old 30-05-2009, 18:13   #27
beppegrillo
Senior Member
 
L'Avatar di beppegrillo
 
Iscritto dal: Mar 2004
Messaggi: 1451
Quote:
Originariamente inviato da Fil9998 Guarda i messaggi
è la terza volta che cerco di spiegarlo: è un concetto difficile, ne prendo atto:

il problema è che Obama promise e lasciò sperare in un cambio di mentalità rispetto a quella che vede da secoli ogni sforzo nelle azioni di "contro" piuttosto che nelle azioni "a favore".
nell'umano agire.
Egli in quanto leader della nazione più potente ed influente ha le leve per indurre simile cambio di mentalità e per supportarlo con azioni che lo tradcano in termini concreti.

"solo" questo,

ma fa la differenza fra il continuare ad ammazzarci o meno

e vista la situazione sociale militare tecnologica epolitica potrebbe essere la famosa terza mondiale di cui parava Einstaein fatta con l'atomica...

la quarta la faremo con le clave diceva ...


il "solo" racchiude in sè una concatenazione di variazioni STORICA per non dire EVOLUTIVA.



non posterò puù nel tread.

tanto chi vuol capire ha già capito.
Ma per favore, hai sempre da ridire o da lamentarti di qualcosa, sempre ad auspicare chissà quale disastro ed a sputare nella società nella quale, ti piaccia o no, ti permette di vivere.
Ti dimeni così tanto per l'istituzione di una sezione specializzata al cybercrimine e scommetto non hai detto a sui test missilistici della nord corea, anzi avrai commentato come tuo stile "perchè non possono farlo? fin quando non ce lo tirano contro, pensiamo ad i fatti nostri".
__________________
Ciao ~ZeRO sTrEsS~
beppegrillo è offline   Rispondi citando il messaggio o parte di esso
Old 30-05-2009, 19:00   #28
elevul
Senior Member
 
L'Avatar di elevul
 
Iscritto dal: Apr 2006
Città: Bassano del Grappa
Messaggi: 10431
Quote:
Originariamente inviato da eraser Guarda i messaggi
Questo il testo del discorso di Obama:
Il video del discorso in HD:
http://www.youtube.com/watch?v=wjfzyj4eyQM
__________________
"Non perdiamo di vista le vere priorità, l'economia serve a sostenere le vite, non devono essere le vite gli strumenti per sostenere l'economia." Conte Zero
Ipsa scientia potestas est
elevul è offline   Rispondi citando il messaggio o parte di esso
 Rispondi


Un mostro da MSI: QD-OLED WQHD a 500 Hz con AI Care e DisplayPort 2.1a Un mostro da MSI: QD-OLED WQHD a 500 Hz con AI C...
DJI Neo 2 in prova: il drone da 160 grammi guadagna il gimbal e molto altro DJI Neo 2 in prova: il drone da 160 grammi guada...
L'IA "seria" di Appian è diversa: inserita nei processi e rispetta dati e persone L'IA "seria" di Appian è divers...
Polestar 3 Performance, test drive: comodità e potenza possono convivere Polestar 3 Performance, test drive: comodit&agra...
Qualcomm Snapdragon X2 Elite: l'architettura del SoC per i notebook del 2026 Qualcomm Snapdragon X2 Elite: l'architettura del...
LG UltraGear 37G800A: 37 pollici, 4K e 1...
Stanco dei browser pieni di AI? Orion pe...
GeForce RTX 5000 custom in pericolo? NVI...
Windows Update prende il posto di Micros...
Segnali di crisi per il mercato Smart TV...
Lenovo LEGION e LOQ con NVIDIA GeForce R...
Nuova Fiat 500 ibrida al debutto. Elkann...
Ecco il primo PC da gaming basato su una...
Grok può battere i campioni di Le...
DEEBOT T50 Max Pro Gen2 e X2 Omni ai min...
Autoflight mostra il primo vertiporto ga...
TCL QD-Mini LED e QLED da 65'' crollano ...
Black Friday portatili gaming: Acer Nitr...
Nuova rimodulazione per WindTre: dal 10 ...
Plex ti farà pagare per lo stream...
Chromium
GPU-Z
OCCT
LibreOffice Portable
Opera One Portable
Opera One 106
CCleaner Portable
CCleaner Standard
Cpu-Z
Driver NVIDIA GeForce 546.65 WHQL
SmartFTP
Trillian
Google Chrome Portable
Google Chrome 120
VirtualBox
Tutti gli articoli Tutte le news Tutti i download

Strumenti

Regole
Non Puoi aprire nuove discussioni
Non Puoi rispondere ai messaggi
Non Puoi allegare file
Non Puoi modificare i tuoi messaggi

Il codice vB è On
Le Faccine sono On
Il codice [IMG] è On
Il codice HTML è Off
Vai al Forum


Tutti gli orari sono GMT +1. Ora sono le: 21:27.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Served by www3v