Ged Carroll

Search results: open source

Open source 5G + more things

Published: (Updated: ) in business | 商業 | 상업 | ビジネス, china | 中國 | 중국 | 中華, consumer behaviour | 消費者行為 | 소비자 행동, culture | 文明 | 미디어와 예술 | 人文, design | 設計 | 예술과 디자인 | デザイン, economics | 經濟學 | 경제학 | 経済, ethics | 倫理 | 윤리학, gadget | 小工具 | 가제트 | ガジェット, ideas | 想法 | 생각 | 考える, innovation | 革新 | 독창성 | 改変, legal | 合法的 | 법률학 | 法的, luxury | 奢華 | 사치 | 贅沢, marketing | 營銷 | 마케팅 | マーケティング, media | 媒體 | 미디어 | メディア, online | 線上 | 온라인으로 | オンライン, quality | 質量 | 품질 | 品質, retailing | 零售 | 소매업 | 小売業, software | 軟件 | 소프트웨어 | ソフトウェア, style | 時尚 | 유행 | ファッション, technology | 技術 | 기술 | テクノロジー, telecoms | 電信 | 통신 | テレコム, wireless | 無線 |무선 네트워크 | 無線 by .

Pentagon wants open-source 5G plan in campaign against Huawei – ok in theory only. Open source 5G including OpenRAN doesn’t provide the flexibility in installation that vendor solutions do. More related content here. It Seemed Like a Popular Chat App. It’s Secretly a Spy Tool. – The New York Times – Emirati’s do with Totok […]

Open Sources

Published: (Updated: ) in ideas | 想法 | 생각 | 考える, oprah time | 書評 | 서평 : 文芸批評, technology | 技術 | 기술 | テクノロジー by .

In Open Sources: voices from the revolution – O’Reilly Publishing recorded the history to date and ethos of the open source community by having the main protagonists write essays on their parts in it. The essays are insightful about the development of the open source phenomena, the technology and the personalities of the protagonists. In […]

GDPR resources

Published: (Updated: ) in business | 商業 | 상업 | ビジネス, design | 設計 | 예술과 디자인 | デザイン, ethics | 倫理 | 윤리학, france | 法國 | 프랑스 | フランス, germany | 德國 | 독일 |ドイツ, ireland | 愛爾蘭| 아일랜드 | アイルランド, legal | 合法的 | 법률학 | 法的, online | 線上 | 온라인으로 | オンライン, spain | 西班牙 |스페인 | スペイン, technology | 技術 | 기술 | テクノロジー by .

Partly due to Cambridge Analytica, General Data Protection Regulation (GDPR) is going to have a more profound impact on data usage globally. GDPR would have been seen as an extra-legal reach, but Facebook is making it look like a good idea. I thought I would pull together a few resources that I thought would be […]

Ukraine beta test + more things

Published: (Updated: ) in china | 中國 | 중국 | 中華, design | 設計 | 예술과 디자인 | デザイン, economics | 經濟學 | 경제학 | 経済, energy | 能源 | 에너지 | エネルギー, ethics | 倫理 | 윤리학, finance | 은행업, germany | 德國 | 독일 |ドイツ, hong kong | 香港 | 홍콩 | 香港, ideas | 想法 | 생각 | 考える, innovation | 革新 | 독창성 | 改変, japan |日本 | 일본, luxury | 奢華 | 사치 | 贅沢, marketing | 營銷 | 마케팅 | マーケティング, materials | 原料 | 원료 | 原材料, media | 媒體 | 미디어 | メディア, online | 線上 | 온라인으로 | オンライン, retailing | 零售 | 소매업 | 小売業, security | 保衛 | 정보 보안 | 情報セキュリティー, software | 軟件 | 소프트웨어 | ソフトウェア, style | 時尚 | 유행 | ファッション, taiwan | 中華民國 | 중화민국 | 民国, technology | 技術 | 기술 | テクノロジー, thailand | 泰國 | 태국 | タイ国, web of no web | 無處不在的技術 | 보급 기술 | 普及したテクノロジー by .

Ukraine beta test I subscribe to all kinds of weird and wonderful newsletters to get content for these posts, the idea of a Ukraine beta test was inspired by this post on SOFREP: Combat Sandbox: Ukraine’s ‘MacGyver Army’Tests Western Weaponry | SOFREP. SOFREP is written a self-described team of a team of former military, intelligence […]

Boa + more stuff

Published: (Updated: ) in beauty | 美容產品 | 화장품 | 化粧品, china | 中國 | 중국 | 中華, consumer behaviour | 消費者行為 | 소비자 행동, culture | 文明 | 미디어와 예술 | 人文, design | 設計 | 예술과 디자인 | デザイン, economics | 經濟學 | 경제학 | 経済, ethics | 倫理 | 윤리학, hong kong | 香港 | 홍콩 | 香港, innovation | 革新 | 독창성 | 改変, japan |日本 | 일본, korea | 韓國 | 한국 | 韓国, luxury | 奢華 | 사치 | 贅沢, marketing | 營銷 | 마케팅 | マーケティング, media | 媒體 | 미디어 | メディア, online | 線上 | 온라인으로 | オンライン, retailing | 零售 | 소매업 | 小売業, security | 保衛 | 정보 보안 | 情報セキュリティー, software | 軟件 | 소프트웨어 | ソフトウェア, technology | 技術 | 기술 | テクノロジー, web of no web | 無處不在的技術 | 보급 기술 | 普及したテクノロジー by .

Boa server hack Hackers breach energy orgs via bugs in discontinued web server – state-backed Chinese hacking groups (including one traced as RedEcho) targeted multiple Indian electrical grid operators, compromising an Indian national emergency response system and the subsidiary of a multinational logistics company. The attackers gained access to the internal networks of the hacked […]