Code can be written by computers. Are programmers no longer needed?

Computers can write their own code. So are programmers now obsolete?

At University, I studied engineering, like the majority of my peers. I discovered that there were instances when I needed to develop computer programs to perform specific types of computations. I discovered from the experience that I was not a natural hacker. These pieces of utilitarian software were developed in Fortran, Algol, and Pascal. They are today thought of as the programming equivalent of Latin. Like Rory McIlroy might do if forced to play a game of golf with an 18-handicapper, the software I built was awkward and ineffective, and more skilled programmers would look at it and roll their eyes. But it accomplished the job, and in that sense, it was “excellent enough for government work,” as the renowned computer scientist Roger Needham described it. And I gained a lifetime admiration for programmers who can build elegant, efficient code as a result of the experience. Anyone who believes programming is simple has never tried it.

As AirTag worries grow, Apple releases a personal safety advisory.

Apple creates personal safety guide as AirTag concerns mount

On Tuesday, Apple quietly launched a Personal Safety User Guide to help “anyone concerned about or who has suffered technology-enabled abuse, stalking, or harassment.” Consumers may use the guide to learn about their choices for eliminating someone’s access to the shared data, as well as personal safety features available throughout the Apple ecosystem. Most importantly, it includes a page titled “Stay safe with AirTag and other Find My accessories”. It comes at a time when an increasing number of people have come out to say they have been stalked using the devices.

FSB- increasing Russian ransomware threat is costing businesses a fortune

How the growing Russian ransomware threat is costing companies dear

The snow was heavy on the ground in Moscow as disguised members of Russia’s formidable security agency. The FSB prepared to knock down the doors of one of the 25 residences they would attack that day. Their target was REvil, a clandestine group of hackers who claimed to have taken more than $100 million (£74 million) every year through “ransomware” assaults before mysteriously disappearing.   As members of the gang were brought away in handcuffs, FSB agents grabbed crypto-wallets carrying unimaginable amounts of digital cash such as bitcoin. Others utilized money-counting devices to tally dozens of stacks of $100 notes. REvil’s hackers had perfected extortion by grabbing control of enterprise computer systems and demanding cash to unlock them. The consequences of this increasingly widespread crime range from geopolitical tensions between Russia and the West to the United Kingdom’s impending lack of Hula Hoops, Skips, and Nik Naks. KP Snacks wrote to store owners this week to warn them of supply concerns until “the end of March at the earliest” because it “cannot securely process orders or send items.” KP – and admirers of its savory snacks – has become the latest victims of a ransomware attack, which the firm was still combating as of Friday afternoon. Several phone calls to the firm were answered. When the CEO of a business like KP receives the dreaded ransom note, no matter what time of day it is, their first contact may be to US cybersecurity FSB firm Mandiant. “The normal scenario is that they don’t see it coming and then they have a terrible impact,” says Dr. Jamie Collier, Mandiant’s senior threat intelligence consultant. He claims that the centrality of computer systems in firm supply chains gives hackers great influence if they overcome their defenses. “It gives these groups a lot more leverage and allows them to demand far bigger extortion money than they would have in the past.” While Mandiant’s employees strive to repair or minimize the damage, the victims engage in discussions with the hackers, who frequently act as if they are establishing a real commercial agreement. Dr. Collier describes threat groups as “extremely friendly.” “You’ll see them hire English speakers who can handle it [negotiations], almost like customer service, where you can make contact and connect professionally.” He claims that hackers will even walk CEOs through the process of purchasing and transferring the bitcoin used for ransom payments. Depending on the sophistication of the assault, the damage caused by a protracted outage, and if companies like Mandiant can repair it, there may be no alternative but to pay. In addition to operational inconvenience, organizations face regulatory fines and significant harm to their reputations if data is disclosed. Many now have cyber insurance that allows them to let the insurer make for the price, although at the expense of fueling criticism and potentially fueling further assaults. The DarkSide ransomware group — allegedly linked to REvil – shut down petroleum supplier Colonial Pipeline in May 2021. As gas stations ran out of fuel and American drivers panicked, the corporation had no choice but to pay $4.4 million (£3.3 million). Even coughing up didn’t work in the instance of Travelex. The consequences of Covid-19 on tourism may have been the most significant element in Travelex’s demise in August 2020, although residual harm […]

‘Virtual reality is genuine reality,’ argues philosopher.

‘Virtual reality is genuine reality’ so embrace it, says philosopher

It’s difficult to see people living their lives in virtual reality when the experience consists of swinging your arms around in the middle of the room while wearing a gadget the size of a house brick strapped to your face. But, according to philosopher David Chalmers, who advocates accepting fate, this is where mankind is headed. As technology advances, virtual worlds will match, and ultimately exceed, the actual universe. And, with endless, compelling experiences at his disposal, he believes the tangible world may lose its charm.

Digital transformation: 4 tips for being a successful IT leader in 2022

Digital transformation: 4 tips to be a successful IT leader in 2022

In 2021, leadership was about coming up with new ways to keep commitments and expand in the face of global challenges. It included coaching teams from home offices and balancing new diversions and personal duties. All while dealing with the fear of what was to come. By 2022, we want to have finally put the pandemic behind us. And set the tone for a new kind of workplace, digital transformation, and working culture.