Morrissey Technology

Loading

Elon Musk vs Google

Elon Musk Accuses Google of Blocking Trump in Search Engine

Morrissey Technology – Tesla boss Elon Musk accused the technology giant Google of blocking Donald Trump’s name from their search engine.

“Wow, Google is blocking searches for President Donald Trump!” Musk said in a tweet on X.

“Meddling in the election?” he added.

This upload is accompanied by a screenshot of a Google search which produces only two recommendations when the keyword president donald is entered, namely president donald duck and president donald regan. This upload then triggered various responses, one of which was from the @davidgokhshtein account which said that Google was owned by the Democrats.

“They’re going to be in a lot of trouble if they interfere in the election,” Musk countered.

However, according to the results of CNNIndonesia.com’s experiment, when typing the keyword president donald, Google still brought up Donald Trump’s profile, unlike what happened to Musk. Several weeks ago, Musk uploaded a statement saying he “fully supports” former President Trump in the United States (US) election.

This statement was made not long after Trump was shot while giving a campaign speech in Pennsylvania, USA. Bloomberg released a report that Musk donated to a super PAC that supports Trump, and gave “a sizable amount” to his re-election.

The donation, if it does occur, would be a significant development not only in the presidential campaign, but also in the relationship between the two men. The reason is, both have strong support from millions of fans who are ready to believe almost everything they say.

In recent years, Musk has been known to promote the ‘great replacement’ conspiracy theory and support white pride. His endorsement adds to a growing number of influential voices in Silicon Valley promoting the campaign.

After the Trump incident, Musk’s platform was flooded with a number of hashtags, including ‘#falseflag’ and ‘staged’ to users. Despite this, Musk continues to promote “freedom of opinion” on his social media platform, including misinformation like the one above.

https://situstotologin.id/

https://www.encom-training.com/-/stoto/

Intel

Scary Facts about 13th and 14th Generation Intel Processor Problems

Morrissey TechnologyIntel has actually confirmed that it will release a fix for problematic 13th and 14th gen Core processors. However, if this processor has already caused a crash then the patch is no longer useful. The new patch will be released in mid-August. Its function is to fix the problem of increasing voltage in the processor which causes the system to crash.

However, unfortunately, the damage to the processor that has continued to cause the crash is permanent, meaning it cannot be repaired by a patch. This was written by Tom’s Hardware citing anonymous sources. When confirmed, Intel did not deny the accusation. Intel believes that this patch will ensure that this crash will not occur. However, if the crash has occurred, the best option is to replace the CPU.

They also said that the increase in voltage was not the only cause of the system crashing. Intel spokesperson Thomas Hannaford confirmed it was the main cause, but Intel community manager Lex Hoyos revealed another cause, namely an oxidation problem during the CPU assembly, which also caused its instability.

Interestingly, Intel did not stop sales or withdraw its inventory at all. They also — for now — are not carrying out recalls or withdrawing processors that have been sold. In fact, so far Intel has not changed its warranty policy, or extended the warranty on the problematic processor.

They even believe that consumers don’t need to worry about this visible problem. According to them, if consumers of this problematic processor do not experience system crashes, according to Intel, the patch that will be released will be an effective solution.

Fortunately, Intel has confirmed which processors may be affected by this issue. Namely the 13th and 14th generation desktop processors which consume power ranging from 65W and above, so it’s not just high-end processors like the i9 that have the potential to have problems.

https://444bunuelosgourmet.com/-/togelonline/

https://www.opstinasokolac.org/

https://www.falletans.org/

SearchGPT

OpenAI Releases Google Competitor, Named SearchGPT

Morrissey Technology – OpenAI announced its AI-based search engine called SearchGPT. This will be a competitor to Google because it can access information in real time from the internet. The search engine has a display containing a box with the question “What are you looking for?”. What’s interesting is how SearchGPT displays its search results, which are not just links. SearchGPT groups search results and makes them make more sense. For example, search results with the keyword music festival will be displayed with a short description of the festival and followed by related links.

Another example is that SearchGPT can explain when is the right time to plant tomatoes, followed by an explanation of the various plant varieties. Then, after the search results are displayed, users can add follow-up questions or open relevant links in the sidebar. There is also a “visual answer” feature, but unfortunately OpenAI has not explained how this feature works.

Currently SearchGPT is still a prototype. This service uses LLM GPT-4 and can only be accessed by 10 thousand testers. According to OpenAI spokesperson Kayla Wood, OpenAI is working with third-party partners and using content directly from feeds to display its search results.

The ultimate goal is to integrate this search feature into ChatGPT. So far, SearchGPT looks like it will be a significant threat to Google. As is known, Google recently integrated AI features into its search engine in a hurry, perhaps because it was afraid that its competitors would do the same thing.

There is also the startup Perplexity, which also makes a search engine with AI. Perplexity was also recently criticized because its AI content summarization feature disrupted traffic from publishers. In its blog post, OpenAI admitted to collaborating with a number of mass media in creating SearchGPT. The media invited to collaborate include The Wall Street Journal, The Associated Press, and Vox Media.

“Media partners provided invaluable input and we will continue to ask for their input,” Wood said.

https://f4a.pt/-/togelonline/

http://elikconsulting.com/-/for4d/

http://www.rsiafghanistan.com/-/togelonline/

http://www.fogiel.pl/fogielfogiel/-/for4d-togel/

https://uvb.edu.mx/-/togelonline/

Hackers Break into Pentagon's IT Service Provider

Hackers Break into Pentagon’s IT Service Provider, Sensitive Data Leaked?

Morrissey Technology – Hacking groups or hackers broke into and leaked information technology (IT) service providers from a number of government agencies in the United States, including the Pentagon to NASA. The hackers leaked stolen internal documents from Leidos Holdings Inc, one of the largest providers of IT services to the US government.

The company recently became aware of the issue and believes the documents were taken during a previously reported Diligent Corp systems leak. Leidos is currently investigating the data leak incident.

The Bloomberg report, citing archives from June 2023, said that the Virginia-based company used the Diligent system to store information collected in internal investigations. Leidos confirmed this issue stems from a previous incident affecting a third-party vendor. They have also announced this in 2023.

“This incident did not impact our network or sensitive customer data,” the company said.

A Diligent spokesperson said that this issue is likely related to an incident from 2022, which affected its subsidiary, Steele Compliance Solutions. The company has notified affected customers and has taken corrective action to address the incident in November 2022.

Previously, not long ago, around 1.4 GB of data belonging to the National Security Agency (NSA) was also reportedly leaked and posted on a dark forum. The leaked data included a number of sensitive and confidential information.

This NSA data leak was first revealed by Cyber ​​Press researchers. The leaked data reportedly contained sensitive information, including internal communications, classified documents, and personal data of NSA employees.

“The threat actor claims the data was allegedly obtained from a data breach of Acuity Inc, a company that collaborates with the United States government and its allies,”.

This leak raises serious national security concerns and highlights vulnerabilities in government contractors’ cybersecurity measures.

https://doae.ong.br/port/for4d/

https://bluegreens.in/-/togelonline/

Windows Mass Blue Screen

Windows Mass Blue Screen Caused by Microsoft Down in a Number of Countries

Morrissey Technology – Thousands of Windows devices around the world experienced a mass blue screen of death (BSOD) which impacted a number of services, from aviation, broadcasting, to banking in various countries. The cause of the disruption is thought to be the software update process carried out by the cybersecurity company CrowdStrike.

A problematic software update from CrowdStrike took affected PCs and servers offline. As a result, these devices enter the recovery boot loop and the devices cannot turn on properly. CrowdStrike is widely used by many businesses around the world to manage the security of Windows PCs and servers.

Quoting The Verge, the initial problem was reported after devices at banks, airlines and Australian TV broadcasters started going offline. This problem is now spreading, even to Europe.

One of the problems was British broadcaster Sky News, which was unable to broadcast its morning news bulletin for hours, and broadcast a message apologizing for “the disruption to this broadcast.”

Later, Ryanair, one of Europe’s largest airlines, also said that it was experiencing “third party” IT issues, which were impacting flight departures. Berlin Airport also warned of travel delays due to “technical problems.” In America, the Federal Aviation Administration (FAA) said it was assisting airlines such as Delta, United and American Airlines due to communications problems.

“The FAA is closely monitoring technical issues impacting IT systems at US airlines,” said FAA spokeswoman Jeannie Shiffer.

“Several airlines have requested FAA assistance to carry out emergency landings for their fleets until this problem is resolved,” he added.

Reported by ABC, CrowdStrike CEO George Kurtz confirmed the mass outage experienced worldwide was the result of “a flaw discovered in a single content update for Windows hosts.”

He emphasized that the mass disruption was not caused by a security incident or cyber attack. Kurtz said only his clients using Windows devices were affected by this issue. Meanwhile, users with Mac and Linux devices are not affected. Kurtz also said that the flaw in the update that caused this global computing issue had been “identified, isolated, and a fix has been implemented.”

https://suppliers.portal.ppa.gov.gh/-/for4d/

https://storytellerfilms.net/togelonline/

https://boulosfeghali.org/-/for4d/

https://pusdantb.inlislitentb.com/-/togelonline/

Google Cloud

Google Cloud and TMS Make Digital Transformation More Effective

Morrissey Technology – Google Cloud and TMS Consulting work together to deliver more efficient and sophisticated enterprise resource planning (ERP) solutions, helping companies in digital transformation and optimizing ERP systems. In implementing ERP in Indonesia, a number of challenges are faced, such as high costs for infrastructure, training and software licensing. Lack of understanding of the importance of digital transformation is also an obstacle.

In fact, looking at future potential, the use of ERP will help companies compete in the digital era, starting from increasing operational efficiency, higher competitiveness, digital transformation, to economic growth. Didi Mulyadi, Head of Infrastructure Solution TMS Consulting, explained that TMS Consulting’s approach to integrating Google Cloud and ERP involves analyzing business needs and assessing existing technology infrastructure to determine integration readiness.

TMS then designs a solution tailored to the client’s specific business needs, integrates the solution into the existing ERP system, and provides training to the client’s internal team.

“After implementation, TMS Consulting continues to monitor and optimize system performance as well as carry out regular evaluations and collect feedback to ensure the solution remains relevant and effective in meeting clients’ growing business needs,” said Didi in a written statement.

The advantages provided by Google Cloud in optimizing ERP, namely comprehensive connectivity, accelerated time to value, unlimited improvements with Google’s AI/ML, simplified integration and development. Then improving sustainability, combining SAP data with Google AI, and accelerating implementation. He conveyed that ERP through Google Cloud AI technology with other technologies, such as sophisticated AI intelligence because ERP through Google Cloud uses sophisticated AI to improve real-time data analysis, enabling companies to make decisions more quickly and accurately.

“Google Cloud’s AI also helps in predicting market trends, optimizing supply chains, and identifying previously unseen operational efficiency opportunities,” he said.

Then, other advances include integration and scalability as well as security and compliance.

https://www.evergreenfire.com/-/togel/

iCIO Community

iCIO Community Reminds the Importance of Mitigating Ransomware Threats in RI

Morrissey TechnologyThe ransomware that attacked the Temporary National Data Center (PDNS) 2 caught the attention of many parties, including the iCIO Community. They emphasized the importance of mitigating ransomware threats for organizations in Indonesia. iCIO Community is a community of Chief Information Officers and Executives in the ICT sector of companies and organizations in the country. This community is designed as a means of sharing practices and leadership in the ICT field.

“It is important for every organization to develop a comprehensive and proactive cybersecurity strategy. In a world that is increasingly connected and vulnerable to cyberattacks, data protection and collaboration between companies is not only important, but urgent. Let’s unite, share experiences, and strengthen organizational defenses Together, we can protect Indonesia’s digital future from growing threats,” said Iskak Hendrawan, Deputy Chair of the iCIO Community.

Moreover, the personal data protection law will complete its trial period in October this year.

“In the current digital era, ransomware attacks cannot be taken lightly. With the implementation of the Personal Data Protection Law in Indonesia, companies are required to be more serious in protecting users’ personal data. We from the iCIO Community hope that the government and public services can adopt this technology adequate and implementing good data governance procedures. This is not just about technology, but also about the responsibility to protect and manage information that is vital for the country and society,” said Harry Surjanto, Advisor to the iCIO Community.

While it is difficult to completely prevent ransomware attacks, proper mitigation measures can minimize their impact. Last year, this community admitted to having held a closed focus group discussion among its members to discuss the ransomware threat they faced. iCIO Community assesses the need for strict operational discipline to ensure rapid recovery in the face of cyber attacks. This covers several important aspects. First, securing infrastructure in the data center. All infrastructure in the organization must always be hardened and updated with critical security patches at the operating system and device firmware level.

“All data must be backed up regularly and stored securely and strictly,” said the iCIO Community representative.

Second, strict monitoring. Monitoring system health and security through the command center and security operation center 7×24 hours is very important. Organizations must have a rapid reaction unit for recovery and dealing with hacking attacks. The three Disaster Recovery Centers (DRC). Organizations must have a DRC and regularly conduct disaster recovery drills. System recovery training activities for disasters must also be monitored and reported to the regulator

Basic security hygiene is a major concern and discipline that should not be ignored. According to the iCIO Community, this is the primary foundation for protecting organizations from ever-evolving threats. Cases such as the attack on PDN show how important it is to have a fast and effective response strategy. We hope the government can design and implement a comprehensive emergency plan to address ransomware attacks. Cross-sector collaboration and sharing information about new threats and attack tactics are crucial in strengthening national cyber threat defenses.

With these steps, the iCIO Community is confident that we can mitigate the negative impact of ransomware attacks and ensure the security of data that is critical to the national interest. And thanks to the adoption of adequate technology and good data governance, mitigation and recovery procedures, governments and public services can provide better services, increase public trust and protect the important information they hold.

https://bluewaysglobal.com/-/for4d/

Data Allegedly Leaked, KAI Ensures User Database is Safe

Data Allegedly Leaked, KAI Ensures User Database is Safe

Morrissey Technology – The social media world was abuzz with news of the alleged KAI Commuter data leak. The leaked data has also reportedly been sold on the dark web. The news of the alleged data leak was revealed by the @txttransportasi account on X (formerly Twitter).

“Oh, you know… KAI database?” upload the account on Tuesday (2/7).

The account also attached screenshots of cyber criminals’ uploads on Breachforums. However, the name of the account that uploaded KAI Commuter data on Breachforums was censored in the screenshot FOR4D.

The suspected hacker claimed that the leaked data included various personal information of KAI Commuter users, such as names, ticket codes, payment methods and transaction times. Responding to this issue, KAI Commuter claimed that its user data was safe, even though it had been hacked. KAI Commuter also said that it had coordinated with related agencies to handle this hack.

“KAI Commuter ensures the security of the Commuter Line user data base which was hacked by irresponsible parties,” Anne Purba FOR4D, Corporate Secretary of KAI Commuter said in a statement, Wednesday (3/7).

“Until now, KAI Commuter together with related parties continue to coordinate and carry out in-depth investigations to trace and handle the system hack,” he added.

Anne said that her party had taken steps to deal with it, including limiting access to both public networks and local networks.

“Currently all IT operational systems FOR4D in the KAI Commuter environment are still running well and all customer databases are safe,” explained Anne.

Furthermore, Anne asked the public not to worry about using all the service applications owned by KAI Commuter, because KAI Commuter has good information security management.

KAI Commuter is also said to have implemented ISO 27001:2013 as a standardization of the Information Security Management System at KAI Commuter. This security standardization, he said, is also regularly audited by independent auditors to ensure security in its implementation.

“KAI Commuter is committed to continuing to improve cyber security FOR4D in the application of information technology that makes it easier for people to use the Commuter Line and will thoroughly investigate this crime,” said Anne.

“For further steps, KAI Commuter will cooperate with the authorities to investigate this case,” he concluded.

Cyber ​​Attack Protection with Simas Cyber ​​Enterprise Insurance

Cyber ​​Attack Protection with Simas Cyber ​​Enterprise Insurance

Morrissey Technology – In today’s digital era, data is the most valuable asset for companies. We have learned enough from cases of data breaches, ransomware and other cyber attacks that have occurred recently. Without safe and protected data, company operations can be significantly disrupted. This not only has the potential to reduce revenue, but also directly harm customers.

In addition, the company’s reputation that has been built with great difficulty can be tarnished due to cyber attacks. Therefore, it is very important for companies to have a strict cybersecurity system.

In addition, the existence of regulations in Law Number 27 of 2022 concerning Personal Data Protection which requires companies to ensure data security and protection as well as the threat of sanctions in the form of administrative fines of up to 2% of annual revenue, further emphasizes the importance of strengthening company cyber security.

Cyber-security is like a fence that protects a house from thieves. However, even if you have installed a high fence, there is no guarantee that thieves cannot enter. Hackers could find loopholes and break into the system. Therefore, additional safety nets are needed to anticipate undesirable events.

PT Asuransi Sinar Mas understands that cyber crime will pose a risk of harming various business institutions in Indonesia. To anticipate this, Sinar Mas Insurance has prepared a liability insurance product, namely Simas Cyber ​​Enterprise FOR4D.

“Currently we see that cyber security has become the biggest challenge in the digital era. Protection of customer data is crucial. For this reason, Asuransi Sinar Mas has prepared Simas Cyber ​​Enterprise as protection in facing this risk,” said Director and Corporate Secretary of PT Asuransi Sinar Mas Dumasi M M Samosir, in a written statement, Tuesday (2/7/2024)

“We hope that by using this product, business sectors in Indonesia will get protection against cyber attacks in doing business,” he continued.

Simas Cyber ​​Enterprise provides guarantees for the costs of restoring electronic data affected by cyber attacks, business interruption compensation, Forensic IT services for investigating cyber attacks, threats of extortion by hackers to pay a sum of money to end a cyber attack and other guarantees.

“One of the advantages of our Simas Cyber ​​Enterprise is the fast acceptance process and effective claim settlement process,” explained Dumasi.

Simas Cyber ​​Enterprise can be used for protection for companies that have concerns about the data security of companies that manage customer personal data or store valuable digital assets on a large scale, such as financial institutions, banks, marketplaces and hospitals. Apart from corporations, Sinar Mas Insurance is also developing Cyber ​​Insurance products to be marketed to the individual segment.

Sinar Mas Insurance also provides a Simas Cyber ​​Enterprise FOR4D product consultation service which can be accessed via the following link. Apart from that, Sinar Mas Insurance is also committed to providing education so that the public has an understanding of information technology system security, cyber attacks and what can be done to minimize risks. Education will be carried out through social media and the website www.sinarmas.co.id.

Facing AI, the World of Work Needs Digital Skills and Collective Bargaining

Facing AI, the World of Work Needs Digital Skills and Collective Bargaining

Morrissey Technology – The development of Artificial Intelligence (AI) has various impacts on humans. Especially in the employment context. So that AI can continue to provide benefits to the world of work, there needs to be collective bargaining between workers, corporations and AI technology providers.

“To ensure that AI can bring prosperity to humanity, there needs to be a serious policy regarding employment carried out through collective bargaining,” emphasized Celeste Drake, Deputy Director General of the International Labor Organization (ILO) – UN, at the Artificial Intelligence and Implications on the Indonesian Labor Market Forum.

The ILO, the UN organization that focuses on employment issues, also provides a number of additional pre-conditions, to ensure that AI does not necessarily “threaten” existing jobs.

“Efforts need to be made to ensure digital skills and lifelong learning for the workforce, so that they can then utilize AI technology,” said Celeste at the event which was also attended by ICT Watch at the invitation of ILO FOR4D – Jakarta.

He also added that adequate governance regarding the use of AI in the world of work also needs to be in place. “Which AI can be used and which should not be used, there needs to be governance,” he stressed.

According to him, with adequate AI governance, anticipatory steps can be taken to minimize discrimination against workers related to the use of AI technology or the recommendations produced by it.

The ILO is currently studying in depth and continuously whether and how AI technology can disrupt the employment sector. This is for example how algorithmic management practices are often associated with work efficiency and effectiveness, such as ranking systems, supervision and control through tracking devices, online recording of working hours, the use of various forms of work, and so on.

In a study included in ILO Working Paper 96 as of August 2023, it was shown that most jobs and industries are exposed to AI only in automation and are more likely to “supplement” rather than “replace” with the latest Generative AI technologies, such as chatGPT. Therefore, according to the ILO, the biggest impact of AI technology is likely not to be the loss of jobs, but rather the potential changes to the quality of work, especially work intensity and autonomy.

https://danestanynews.ir/for4d/