The potential for empowering homeless people through digital technology, describes the role of digital technology in the lives of homeless and vulnerable people today.
Digital technology can enhance lives by giving a voice to those who didn’t feel as though they had one:
Alexandria Ocasio Cortez and the leader of the New Canadian Democratic Party Jagmeet Singh Raised over $185,000 for Hungry Kids and Rent Eviction Relief while streaming a video game (Among Us) on Twitch. She had initially planned to stream for 2 hours but ended up streaming for a total of 6 hours. We have all heard of youtube streamers making insane amounts of money playing video games online. In order to this you have to be able to keep people entertained. AOC did not disappoint!
I have been saying this to myself since her first stream a few weeks ago (before the elections), Why doesn't she do this more often? Can you think of a more effective fund raising method as a politician? As an added benefit this is another way to connect with her constituents. Seriously It's a no brainer. And if we bring grandpa Bernis on the stream we can easily get one million people online. You guys should do it and test out the Twitch infrastructure.
Then my next headline would be "AOC and Bernie Breaks Twitch!"
Thank you Jacque Fresco
The first and most important step will be to get a secure wallet provider.
Coinbase offers everything you will need to start accepting payments. There are many more providers out there but they are the 800 pound gorilla in the industry to date.
Square and Robinhood has crypto capabilities but they are not quite as polished yet.
And thats basically it. That's the whole article really. Lol!
Then you will need to get banners telling people you accept Bitcoin.
Below are general guidelines for setting up a cloud hosted server, then setting up to an Open Dental server.
To store images and documents in the cloud we use Amazon S3 services with encryption enabled.
There are a few companies who offer virtual servers that you can use to set up Opendental, we will be using Amazon Web Services (AWS): aws.amazon.com and the EC2 Amazon Elastic Compute Cloud Web Service (Amazon EC2).
Below are the general setup steps to be followed
Short Circuited’s NYC video security camera installations are done by professionals that have expertise in the business of installing high end video camera security systems.
The first step is usually a site survey. This is necessary to determine the type of cameras that would be right for the job, and where exactly each camera is to be installed. For the initial step customers can provide us videos of the areas they need cameras installed, and this can give us an initial 'feel' of the site before someone is acually physically sent out.
Visible security camera can also be a deterrent to thieves. Most criminals look for vulnerable targets. Visible security cameras makes most criminals think twice.
We also install a wide variety and styles of hiden cameras. Cameras can be hidden in clocks, smoke alarms and a variety of different devices.
One of our more popular models is the smoke alarm hidden camera
The downside of using these types of cameras is that they are battery operated and require on board storage that needs to be changed often.
We also install hidden for businesses in the New York City/ Brooklyn area.
Our pricing at ShortCircuited is very simple.
PC non Touch- $100 plus cost of replacement screen.
Labor cost: PC Touch Screen Replacement- $150 plus cost of replacement screen.
Hackers are threatening to dump a bunch of confidential documents relating to the 9/11 terror attacks if the companies involved do not pay out a hefty sum. The group, who go by the ominous sounding name of The Dark Overlord, has been blackmailing individuals and organizations including Hiscox Syndicates Ltd and Lloyds of London, and claim to have hijacked 18,000 secret documents, Motherboard reports. The hackers are threatening to release the documents in stages until a ransom is received in Bitcoin.
August 17, 2017 Kayla Thrailkill
Locky Ransomware is Back
Locky, a ransomware variant that was once upon a time one of the most popular types of ransomware, is back. This return is not surprising. Cyber criminals would rather make slight alterations to existing malware and reuse it, then have to create it from scratch. By making even the simplest changes, a known threat can become an unknown file. This is exactly what the hackers want, and here’s why.
Most security programs utilize a blacklist as their primary method of malware detection. A blacklist is a list of all known threats. If an unknown file tries to execute on a computer with a security program that uses a blacklist — it will run. Why? Because it is not a known threat. See the issue?
MSNBC reports tonight (7-28-2017) that it has exposed ties between Kaspersky labs and cyber forces within the Russian Government . Specifically the Russian Spy agency FSB.
U.S. government officials, including the Senate Intelligence Committee and members of the intelligence community are allegedly concerned that the Russian-headquartered security software manufacturer Kaspersky Lab might be colluding with the Russian government, claims the company denies and the cybersecurity community has never put much stock into.
Homeland Security, reports ABC News, issued a secret warning to avoid use of the company's products in February.
This isn't the first time someone has accused Kaspersky Lab of potentially using its software to undermine America. Similar allegations came out in 2015, when Bloomberg published a piece describing Eugene Kaspersky's friendship with government officials including those from the FSB - the Russian intelligence agency.
"I know Eugene and many of his GReAT team. All excellent and reputable," tweeted the cybersecurity consultant Jeffrey Carr who runs the Suits and Spooks intelligence conference.
We don't know what Homeland Security or the intelligence community knows, but we do know what allegations have been made in the past.