#Session10
Explore tagged Tumblr posts
trollocs-ooc · 6 months ago
Text
Tumblr media Tumblr media
They just have more space to store love
5 notes · View notes
learnandgrowcommunity · 1 year ago
Text
youtube
Session 10: Open RAN Protocol Stack | Disaggregation, RLC Protocol, Transmission Modes, MAC Layer
Video Link - https://youtu.be/A7a_B8vxdoA
Welcome to Session 10 of our Open RAN series! This session delves into the protocol stack of Open RAN, illustrating how protocol layers are disaggregated in components such as DU and CU. We'll simplify the RLC protocol using a functional block diagram, providing clarity on its operation. Furthermore, we'll explore transmission modes in RLC (TM, UM, and AM), elucidating their significance in meeting diverse requirements. Finally, we'll unravel the MAC layer's functionality, offering a comprehensive understanding of the protocol stack in Open RAN. Join us for this enlightening session!
Subscribe to "Learn And Grow Community" Follow #learnandgrowcommunity
1 note · View note
trollocs-ooc · 2 months ago
Text
Tumblr media
Bingo bongo
inspired by @trollocs-ooc post.... grumblrina bingo....
share your results if you want :3
4 notes · View notes
Text
Post10 Session10 -Emotion
Emotions exist in everyone no matter who is young or old and it always influences the actions and decisions of people. Usually, it is difficult for people to control emotions by themselves and emotions are affected by others and events around them. This blog will focus on the effect of emotion induction on potential consumers’ visual attention, In the article of Paula (2022), the author mentions a control experiment to research the effect of emotion induction on potential consumers’ visual attention in beer advertisements. Volunteers were divided into three groups to watch different beer advertisements and these advertisements each included different emotions, such as neutral, joy, and fear. In addition, these researchers selected 20 images that expressed a variety of emotions which they believed to be sufficient to elicit visualized emotions. 
Tumblr media Tumblr media
 Moreover, the electroencephalogram and the electrical conductance sensor on the skin were used to assess the emotions of each person, which contributed to checking the validity of the manipulated experimental factors. According to the results of the test, the emotion level was significantly higher for participants who viewed fear and joy than neutral stimuli and the highest level was fear. 
The experiment also tested visual attention when participants viewed brand names, product packaging, and human faces within advertisements. The fear continued to be the highest emotional stimulus for the participants.
In conclusion, the results observed in this study conclude that emotional induction can affect the audience’s attention when watching advertisements.
Referene list:
Paula, A.L. Damião de, Lourenção, M., Moura Engracia Giraldi, J. de and Oliveira, J.H. Caldeira de (2023) ‘Effect of emotion induction on potential consumers” visual attention in beer advertisements: a neuroscience study’, European journal of marketing, 57(1), pp. 202–225.
0 notes
adventurersguidetoavis · 6 years ago
Quote
I'm looking for the fucking ring, stop touching the bodies.
Phillip, 29 Tollonnim 1273 VEK
4 notes · View notes
cosblogs · 2 years ago
Text
"An Unfortunate Awakening and Bridge of Trials"
A dread troll pursued our adventurers, forcing them to flee for their lives. Evading the creature's wrath, they regrouped and made camp, experiencing revelations and strange occurrences. Continuing their journey, they encountered Chuuls and engaged in a fierce battle. Despite the odds, they emerged victorious, but Ireena's magical attempts fell short. As they pressed on, another watchtower yielded fewer rewards. A daunting duel with Sir Stefan Alekseev tested their combat skills, and as they reached a bridge, caravans in the distance beckoned their attention.
1 note · View note
thegentlemanblagger · 8 years ago
Text
Encryption: “We’re Engineers, Not Wizards”
If you have kept up to date with my recent posts you may have noticed my love for the right to privacy, particularly in the online sphere, and hatred against the many, many attempts to infringe upon that right in some manner. Well, I’m afraid this post will be no different as we go down the rabbit hole of encryption and law enforcement, and the larger issue of privacy vs security. 
Tumblr media
While I might be quite vocal about the importance of the right to privacy, and the important role encryption plays in protecting that right online, there are others who see it as an annoyance, a barrier for “the good guys”: law enforcement. It makes it harder to use surveillance on a suspect’s communications due to end-to-end encryption, it means they can’t extract evidence from a suspect’s phone because they cannot access it, and then the terrorists will win! I mean, you have nothing to fear if you have nothing to hide right? I mean a government would never use this information for malicious purposes right? They’re totally trustworthy, right? Right?
Tumblr media
This debate is certainly not a new one. From the Crypto Wars of the Cold War (sadly not as awesome as it sounds, with the US Government attempting to limit public access to encryption strong enough to pose a problem for intelligence agencies) to the proposal for the Clipper Chip (a computer chip developed by the NSA in order to provide a back door into early computer systems and allow law enforcement agencies to access and decode “intercepted voice and data transmissions”), the war between law enforcement and encryption has been fought since the development of encryption itself. 
Tumblr media
However it has once again come to the fore due to a number of legal cases, most notably the San Bernadino terrorist attack. In the aftermath of this attack, the FBI attempted to compel Apple to design a back door into their operating system in order for the FBI to gain access to the encrypted data and gain more information on perpetrator. That sounds reasonable doesn’t it? A backdoor which only the FBI can use? There’s just one problem with it...
Tumblr media
Exactly! You cannot construct a back door for one party alone. A back door for one hacker is a backdoor for another, and complying with the FBI would have resulted in a massive vulnerability that any skilled hacker could take advantage of! But it was necessary! We needed it to get access! Again, this is nonsense, as can clearly be seen from the FBI gaining access without Apple’s help (albeit spending $900,000 to do so). And while a Big Brother scenario might be somewhat unlikely at the offset, a very real concern would be a massive data breach. In addition, there are countless apps in place to provide encryption so that even if there is a crackdown on encryption and back doors become commonplace, any criminal worth their salt could just use one of these apps. And if that apps gets removed, well then another will pop up, and some are very difficult to bring under a country’s jurisdiction. 
So just remember, when a government or body asks you to trade your privacy for security, they’re probably just trying to make their lives easier, and yours a hell of a lot less safe. 
2 notes · View notes
hakr-kat-blog · 8 years ago
Text
The problem with smart devices...
That things are getting smarter, smaller, and more complicated is an obvious trend and the fact that there are more businesses every day making and selling things is even more so. An interesting effect of all this is things are getting made in such a way that makes it difficult for the average person to understand how it works and becomes less involved in the process and in personal security.
Tumblr media
This discussion made me think of this video by Vox about phones and the environment. It discusses the (terrible) footprint of manufacturing these devices, about how we don’t repair or even keep the phones for long, about how these toxic these materials affect our environment, and about how we need to make these phones more sustainable. 
These points become increasingly when we think about how everything is being made to incorporate some element of ‘smart’. Companies focus on whether they can sell a product and consumers focus on whether they ‘need’ something to stay current.
But this isn’t how we should think about things in this digitizing of our world. We need to think about if there is an actual need, if we are somehow bettered by having this technology – do we need another plastic based water bottle with a chip that speaks with your phone to remind you to drink? How many resources were used to produce and ship that product, to advertise, to sell, and for the consumer to take home to probably not use for more than a few months? What about the cost of having more products that require electricity? Twitter, who produces no physical products, was listed as one of the least green technology firms, due to their energy usage which largely depends on natural gas (43%), coal (21%) and nuclear (14%) with clean energy only accounting for 10%.
Tumblr media
These environmental risks are important and need to be considered alongside risks to the individual such as a loss of agency and skills, dependency on experts, centralisation of power, and a loss of privacy to others, businesses, and the government. The legal challenges shouldn’t be limited to topics such as privacy and protection of copyright, but to the effects to the environment and ourselves psychologically (a discussion for another time).
We need to start thinking critically – what are the benefits, what are the risks right now, and what could these risks lead to in the future? Without these questions (and healthy optimism) we are likely to start trying to solve problems once it’s too late.
1 note · View note
xmmmmd-blog · 8 years ago
Link
The Tension Between Privacy and Security
1 note · View note
bloganyadelic · 7 years ago
Video
youtube
(со страницы https://www.youtube.com/watch?v=aGO-GFXi-pc)
4 notes · View notes
adinnaekenme-blog · 8 years ago
Link
Considering the fast movement of IoT and “smart” devices, there is an urgent call for every producers, intermediaries and users to protect firmware for the purpose of security. This is a thought provoking article about such need of protection!
1 note · View note
trollocs-ooc · 7 months ago
Text
I want the jade to have a nice name...not as in a pretty name but a name you'd go oh that persons nice it makes sense she'd have a nice person name
6 notes · View notes
Text
AATA SESSION 10 HIGHLIGHTS
Why does it always end up being the beach...
-Bear hands.
-We do a majestic backflip straight into the forest floor.
-Adam tries to confess to Held. He is violently rejected.     
-Only you can prevent forest fires, Adam.
-The Discord server finally realizes that they can just get Adam to make a map so Forest Expedition 2017 doesn’t happen again. Congrats guys!    
-Hard.
-We c͇̠a̤̻͙͇̲n͖̝̲n͇̝̠̟o̸t̰͍̥͎̱͖̗ ̻͟g̪̱͉o̧̠̻̼͖̜͙ ̙̣̼w̤͕e̱s̥͈̦t҉̙̻̠       
-We find the beach!
-Adam becomes self-aware.
3 notes · View notes
itwatchfox-blog · 7 years ago
Link
Tumblr media
(Picture from information-age.com)
While cloud computing seems to be beneficial to businesses, it is also essential to make a good choice of cloud computing providers by concerning their safeguards, locations of servers, and laws applicable to ensure the security of your data. 
"The biggest risk is giving up control of your data to someone else using different data centers in remote places" "What happens in the event of a disaster? You're also putting your data next to someone else's." 
says Mr. Gavan Egan
0 notes
therealmikeross-blog1 · 8 years ago
Text
Smart Home Devices: Simplicity vs Security
It is easy to see why smart home devices such as Amazon Echo and Google Home have taken hold in many of the worlds’ households today. On paper they offer a wide number of benefits for you and your family. Typically, these devices are voice controlled, can play music, control other smart home devices, provide information, read the news, set alarms and perform a wide variety of other functions. Most of us by by now have seen the television advert for Amazon’s Echo, where the home assistant Alexa performs a number of “intelligent” tasks. No longer will your family need to write down your shopping list the old fashioned way on a piece of paper, now all you need to do is tell Alexa or Google to add the items to your list. The future is finally here. (I hope my sarcasm is easily sensed).
 However, the stakes are rising as smart home devices, connected by increasingly ubiquitous Internet of Things technology, now come with a distinct risk. They are being transformed into drones for security breaches.
There are now more than 6 billion smart home devices according to a Machina Research analysis.
"Security has not been a prime focus on many devices and organizations that put these out helter-skelter. … In many cases they're not adjusting to security concerns," Leonard Kleinrock, a UCLA professor of computer science, told CNBC in a recent interview. "So it's not a surprise this [cyber attack] happened and it hasn't been taken seriously. There's no oversight in general."
Connected devices are reaching a saturation point: A 2015 Gartner study estimated that consumers around the world are adding a staggering 5.5 million IoT devices on a daily basis. According to Kleinrock, that's a major concern in the context of seemingly relentless cyberwarfare. A big problem is that most consumers use default passwords on these appliances that can easily be hacked.
Because of their limited computing capacity, "most of the IoT devices were not designed with serious protection capability, and so are susceptible to attack," said Kleinrock, who was influential in the development of Arpanet — the forerunner to the modern-day internet
"The net result is that if we are serious about protection, we may need to wait until a new generation of these devices … replaces the existing generation. The rub is that many of them are designed to remain installed for a decade or more," Kleinrock said. "At the same time, we need to address this growing threat now that it has been exposed." 
The disruptive ability of hackers is also amplifying concerns about artificial intelligence, a booming technology market in itself that is increasingly intertwined with IoT. The massive trove of data these devices produce is a potential gold mine for tech manufacturers and malicious actors alike. 
"One problem with DDoS attacks is you may not even notice it's happening," said Webb. "If it doesn't appear to be a problem, ... you won't take steps to prevent it. It is a difficult issue." 
It's also a concern taking on more urgency as AI assistants" like GoogleHome and Amazon Echo capture the public's imagination. Explosive smart home device growth is on track to more than quadruple by 2025, Mahina's research found. Separately, IDC estimated that worldwide IoT spending will hit $1.7 trillion by 2020. 
However, "the malware itself has the ability to mask itself and have variable signatures," Warren added, calling it an "arms race" between device makers and hackers.
Kleinrock, however, insisted that the onus is on manufacturers to require consumers to be more conscious about "security hygiene." 
Most device owners "are unaware and don't really care," he said. "'How bad can it be?' they'll argue. 'So what if some simple device fails to operate properly.'" 
Therein lies the risk, the scientist said, invoking the economic theory known as the "tragedy of the commons," in which one member in a shared resource system acts independently but risks the common good. 
"If everybody doesn't cooperate, than everybody is vulnerable," Kleinrock said.
0 notes
adventurersguidetoavis · 6 years ago
Quote
I'm gonna hit him in that spot I was tapping gently before, only this time... sleesh. Shleesh. That's the sound of a body being cut in half.
Phillip, 29 Tollonnim, 1273 VEK
3 notes · View notes