#NIST software
Explore tagged Tumblr posts
Text
Download HVAC-Cx: The Essential Building HVAC Systems Commissioning Tool
As building systems become increasingly complex, the need for efficient commissioning and monitoring tools has never been more critical. HVAC-Cx, developed by the National Institute of Standards and Technology (NIST), stands out as a powerful semi-automated commissioning software tool that’s transforming how we analyze and optimize HVAC performance in commercial buildings. Having worked…
#air handling units#APAR rules#BACnet#building automation#building energy management#custom rules#damper control#data analysis#diagnostic assistance#Energy efficiency#equipment monitoring#fault detection#functional performance testing#HVAC commissioning#HVAC-Cx v2.2#NIST software#operational modes#preventive maintenance#temperature sensors
0 notes
Text
He should be arrested for violating our privacy. He was not vetted by congress and has no security clearance.
Contact your state’s attorney general and request help.
Can we ask the ACLU to file a class action suit? Who’s with me?
“Let’s get into the details. Musk’s staffers have been caught plugging external hard drives into federal agency systems and reportedly locking others out of private rooms to perform—who knows what actions. This behavior violates key cybersecurity laws under FISMA and NIST guidelines, which are designed to protect sensitive federal information. Here’s why this is a serious problem.
Federal systems are strictly regulated, allowing only approved devices to connect. Unauthorized external drives can introduce viruses, ransomware, or other harmful software that may compromise entire networks and disrupt essential operations. This puts system stability and continuity of services at risk, endangering critical infrastructure.
These devices could also be used to steal or damage critical information, including personal data for millions of Americans—such as Social Security recipients and taxpayers. Unauthorized access creates significant vulnerabilities, exposing sensitive data to the risk of cyberattacks. Such attacks could cripple vital services and compromise the privacy and safety of millions of people.
Additionally, federal agencies have strict access controls to prevent unauthorized data manipulation or theft. When unauthorized devices are connected, these protections are bypassed, allowing unauthorized users to potentially alter or extract sensitive data. This undermines system integrity and opens the door to both internal and external threats.
External drives also often lack essential security features, such as encryption and antivirus scanning, making them vulnerable to cybercriminal exploitation. These security gaps further increase the risk of data breaches and system compromise, which can have far-reaching consequences.
Federal systems handle trillions of dollars in payments and manage personal data for millions of U.S. citizens. By bypassing cybersecurity laws and protocols, Musk’s staffers are putting these systems—and the public—at serious risk. This activity is illegal, reckless, and unacceptable. Immediate oversight and intervention are necessary to stop these violations!” ~ A N P S
225 notes
·
View notes
Text
alt text under cut
Alt National Park Service·
Let’s get into the details. Musk’s staffers have been caught plugging external hard drives into federal agency systems and reportedly locking others out of private rooms to perform—who knows what actions. This behavior violates key cybersecurity laws under FISMA and NIST guidelines, which are designed to protect sensitive federal information. Here’s why this is a serious problem.
Federal systems are strictly regulated, allowing only approved devices to connect. Unauthorized external drives can introduce viruses, ransomware, or other harmful software that may compromise entire networks and disrupt essential operations. This puts system stability and continuity of services at risk, endangering critical infrastructure.
These devices could also be used to steal or damage critical information, including personal data for millions of Americans—such as Social Security recipients and taxpayers. Unauthorized access creates significant vulnerabilities, exposing sensitive data to the risk of cyberattacks. Such attacks could cripple vital services and compromise the privacy and safety of millions of people.
Additionally, federal agencies have strict access controls to prevent unauthorized data manipulation or theft. When unauthorized devices are connected, these protections are bypassed, allowing unauthorized users to potentially alter or extract sensitive data. This undermines system integrity and opens the door to both internal and external threats.
External drives also often lack essential security features, such as encryption and antivirus scanning, making them vulnerable to cybercriminal exploitation. These security gaps further increase the risk of data breaches and system compromise, which can have far-reaching consequences.
Federal systems handle trillions of dollars in payments and manage personal data for millions of U.S. citizens. By bypassing cybersecurity laws and protocols, Musk’s staffers are putting these systems—and the public—at serious risk. This activity is illegal, reckless, and unacceptable. Immediate oversight and intervention are necessary to stop these violations!
64 notes
·
View notes
Text

Let’s get into the details. Musk’s staffers have been caught plugging external hard drives into federal agency systems and reportedly locking others out of private rooms to perform—who knows what actions. This behavior violates key cybersecurity laws under FISMA and NIST guidelines, which are designed to protect sensitive federal information. Here’s why this is a serious problem.
Federal systems are strictly regulated, allowing only approved devices to connect. Unauthorized external drives can introduce viruses, ransomware, or other harmful software that may compromise entire networks and disrupt essential operations. This puts system stability and continuity of services at risk, endangering critical infrastructure.
These devices could also be used to steal or damage critical information, including personal data for millions of Americans—such as Social Security recipients and taxpayers. Unauthorized access creates significant vulnerabilities, exposing sensitive data to the risk of cyberattacks. Such attacks could cripple vital services and compromise the privacy and safety of millions of people.
Additionally, federal agencies have strict access controls to prevent unauthorized data manipulation or theft. When unauthorized devices are connected, these protections are bypassed, allowing unauthorized users to potentially alter or extract sensitive data. This undermines system integrity and opens the door to both internal and external threats.
External drives also often lack essential security features, such as encryption and antivirus scanning, making them vulnerable to cybercriminal exploitation. These security gaps further increase the risk of data breaches and system compromise, which can have far-reaching consequences.
Federal systems handle trillions of dollars in payments and manage personal data for millions of U.S. citizens. By bypassing cybersecurity laws and protocols, Musk’s staffers are putting these systems—and the public—at serious risk. This activity is illegal, reckless, and unacceptable. Immediate oversight and intervention are necessary to stop these violations!
42 notes
·
View notes
Text
At the 2023 Defcon hacker conference in Las Vegas, prominent AI tech companies partnered with algorithmic integrity and transparency groups to sic thousands of attendees on generative AI platforms and find weaknesses in these critical systems. This “red-teaming” exercise, which also had support from the US government, took a step in opening these increasingly influential yet opaque systems to scrutiny. Now, the ethical AI and algorithmic assessment nonprofit Humane Intelligence is taking this model one step further. On Wednesday, the group announced a call for participation with the US National Institute of Standards and Technology, inviting any US resident to participate in the qualifying round of a nationwide red-teaming effort to evaluate AI office productivity software.
The qualifier will take place online and is open to both developers and anyone in the general public as part of NIST's AI challenges, known as Assessing Risks and Impacts of AI, or ARIA. Participants who pass through the qualifying round will take part in an in-person red-teaming event at the end of October at the Conference on Applied Machine Learning in Information Security (CAMLIS) in Virginia. The goal is to expand capabilities for conducting rigorous testing of the security, resilience, and ethics of generative AI technologies.
“The average person utilizing one of these models doesn’t really have the ability to determine whether or not the model is fit for purpose,” says Theo Skeadas, chief of staff at Humane Intelligence. “So we want to democratize the ability to conduct evaluations and make sure everyone using these models can assess for themselves whether or not the model is meeting their needs.”
The final event at CAMLIS will split the participants into a red team trying to attack the AI systems and a blue team working on defense. Participants will use the AI 600-1 profile, part of NIST's AI risk management framework, as a rubric for measuring whether the red team is able to produce outcomes that violate the systems' expected behavior.
“NIST's ARIA is drawing on structured user feedback to understand real-world applications of AI models,” says Humane Intelligence founder Rumman Chowdhury, who is also a contractor in NIST's Office of Emerging Technologies and a member of the US Department of Homeland Security AI safety and security board. “The ARIA team is mostly experts on sociotechnical test and evaluation, and [is] using that background as a way of evolving the field toward rigorous scientific evaluation of generative AI.”
Chowdhury and Skeadas say the NIST partnership is just one of a series of AI red team collaborations that Humane Intelligence will announce in the coming weeks with US government agencies, international governments, and NGOs. The effort aims to make it much more common for the companies and organizations that develop what are now black-box algorithms to offer transparency and accountability through mechanisms like “bias bounty challenges,” where individuals can be rewarded for finding problems and inequities in AI models.
“The community should be broader than programmers,” Skeadas says. “Policymakers, journalists, civil society, and nontechnical people should all be involved in the process of testing and evaluating of these systems. And we need to make sure that less represented groups like individuals who speak minority languages or are from nonmajority cultures and perspectives are able to participate in this process.”
81 notes
·
View notes
Text
This day in history
#15yrsago Pope passes special Vatican copyright giving him exclusive right to use his name, title, image https://www.catholicnewsagency.com/news/18122/holy-see-declares-unique-copyright-on-papal-figure
#15yrsago Norwegian public broadcaster torrents 7-hour, hi-def trainride https://nrkbeta.no/2009/12/18/bergensbanen-eng/
#10yrsago LISTEN: Wil Wheaton reads “Information Doesn’t Want to Be Free” https://ia600908.us.archive.org/24/items/idwtbf/Cory_Doctorow_-_Information_Doesnt_Want_to_Be_Free_Chapter_1_read_by_Wil_Wheaton.mp3
#10yrsago Kenya’s Parliament erupts into chaos as government rams through brutal “anti-terrorism” law https://www.standardmedia.co.ke/article/2000145159/chaos-disrupt-parliament-special-sitting-on-security-bill
#10yrsago Gingerbread Enterprise https://imgur.com/a/gingerbread-uss-enterprise-pvtYQ
#10yrsago NY DA gives unlicensed driver who killed senior in crosswalk a $400 fine https://nyc.streetsblog.org/2014/12/18/vance-deal-400-fine-for-unlicensed-driver-who-killed-senior-in-crosswalk
#10yrsago FCC seems to have lost hundreds of thousands of net neutrality comments https://www.reddit.com/r/technology/comments/2psxh9/the_fcc_ignored_hundreds_of_thousands_of_net/
#5yrsago Mass convictions of local warlords for 2009 massacre revive faith in Philippines’ justice system https://www.bbc.com/news/world-asia-50770644.amp
#5yrsago A vast network of shadowy news sites promote conservative talking points mixed with floods of algorithmically generated “news” https://www.cjr.org/tow_center_reports/hundreds-of-pink-slime-local-news-outlets-are-distributing-algorithmic-stories-conservative-talking-points.php
#5yrsago Volunteer “stick library” is a hit with neighborhood dogs https://metro.co.uk/2019/12/13/dad-creates-stick-library-dogs-11902209/?ito=article.tablet.share.top.messenger
#5yrsago Students at elite Shanghai university protest the removal of “freedom of thought” from the school charter https://asiatimes.com/2019/12/students-protest-at-shanghais-fudan-university/
#5yrsago NIST confirms that facial recognition is a racist, sexist dumpster-fire https://www.nist.gov/news-events/news/2019/12/nist-study-evaluates-effects-race-age-sex-face-recognition-software
#5yrsago Betsy DeVos quietly spends millions to promote the unpopular policies she hopes to enact as a federal official https://www.salon.com/2019/12/19/exclusive-betsy-devos-family-foundation-funnels-money-to-right-wing-groups-that-boost-her-agenda/
#5yrsago Bernie Sanders got the GAO to study the life chances of millennials, and the report concludes that debt is “crushing their dreams” https://www.teenvogue.com/story/bernie-sanders-report-millennial-living-standards
#1yrago What kind of bubble is AI? https://pluralistic.net/2023/12/19/bubblenomics/#pop
11 notes
·
View notes
Text
MÁY ĐO CƯỜNG ĐỘ UV LÀ GÌ ?
Máy đo cường độ UV cung cấp cấu hình hiển thị số liệu theo dõi chính xác chỉ số UV theo viện tiêu chuẩn và công nghệ quốc gia NIST (mJ/cm2).
Giúp xác định chính xác tia tử ngoại cho người dùng hoặc các biến thể liên quan đến tia tử ngoại.
Thao tác bằng nút bấm nhỏ giúp dễ sử dụng, tuân theo tiêu chuẩn IP67 để bảo vệ người dùng khỏi bụi và chất lỏng bắn vào
Máy đo cường độ UV LED ( phổ hẹp ) cung cấp cấu hình tia cực tím và nhiệt độ bên cạnh các giá trị bức xạ (W/cm2) và mật độ năng lượng (J/cm2)
Người dùng có thể điều chỉnh tốc độ lấy mẫu, dải động, bộ nhớ lớn, pin sạc
Tính năng ‘Tạm dừng’ cho phép người dùng tạo tối đa tám tệp khác nhau khi ở trên sàn sản xuất
Hỗ trợ các ứng dụng tốc độ cao như máy in kỹ thuật số, chuyển giá trị sang phần mềm PowerView Software® III
Máy đo cường độ UV thiết kế nhằm mục tiêu cho người dùng (R&D, kỹ thuật viên dịch vụ tại hiện trường, nhà cung cấp nguồn, người lập công thức), những người thường xuyên làm việc với các loại đèn LED khác nhau
Các giá trị trên màn hình cộng với Cấu hình bức xạ chuyển sang UV PowerView ® III ở tốc độ mẫu hiệu dụng là 128 Hz
Máy đo cường độ UV LED có thể hiển thị ở nhiều dải L. Người dùng nên sử dụng các giá trị trong dải phù hợp với đèn LED và không tính tổng số đọc của tất cả các dải
Nguồn: https://eit20.vn/may-do-cuong-do-uv/
3 notes
·
View notes
Text
Cybersecurity in smart grids
Cybersecurity in smart grids is a critical concern as these modern energy systems integrate digital communication and control technologies to enhance efficiency and reliability. However, this integration also introduces new vulnerabilities that can be exploited by cyber threats.
🔍 Key Cybersecurity Challenges in Smart Grids
1. Increased Attack Surface The incorporation of Internet of Things (IoT) devices, smart meters, and distributed energy resources expands the potential entry points for cyber attackers. Each connected device can serve as a gateway for unauthorized access if not properly secured.
2. Sophisticated Cyber Threats Smart grids face various cyber threats, including:
Denial-of-Service (DoS) Attacks: Overwhelming systems to disrupt operations.
False Data Injection: Manipulating data to mislead grid operations.
Advanced Persistent Threats (APTs): Long-term targeted attacks aiming to steal data or disrupt services.
3. Legacy Infrastructure Integration Many existing power systems were not designed with cybersecurity in mind. Integrating these with modern smart grid technologies can create compatibility issues and security gaps.
4. Supply Chain Vulnerabilities Dependence on third-party vendors for hardware and software components can introduce risks if those vendors do not adhere to stringent cybersecurity practices.
🛡️ Strategies for Enhancing Smart Grid Cybersecurity
1. Implementation of Robust Security Frameworks Adopting comprehensive cybersecurity frameworks, such as those provided by the National Institute of Standards and Technology (NIST), can help organizations identify and mitigate risks effectively.
2. Regular Security Assessments and Penetration Testing Conducting frequent evaluations of the smart grid's security posture helps in identifying vulnerabilities and addressing them proactively.
3. Advanced Monitoring and Anomaly Detection Utilizing machine learning and artificial intelligence to monitor network traffic and detect unusual patterns can aid in early threat detection.
4. Employee Training and Awareness Programs Educating staff about cybersecurity best practices ensures that human error does not become a vulnerability.
5. Secure Supply Chain Management Ensuring that all third-party vendors comply with established cybersecurity standards minimizes risks from external components.
🌐 Real-World Implications
Recent incidents underscore the importance of robust cybersecurity in smart grids. For instance, Spain's National Cybersecurity Institute investigated a massive blackout potentially linked to a cyberattack, highlighting vulnerabilities in smaller electricity generators.
Similarly, the U.S. has recognized the threat to clean energy infrastructure, prompting the Biden administration to unveil guidelines aimed at protecting critical technologies from cyberattacks.
As smart grids continue to evolve, integrating advanced technologies and expanding their reach, the importance of cybersecurity cannot be overstated. Proactive measures, continuous monitoring, and adherence to established frameworks are essential to safeguard these critical infrastructures against emerging cyber threats.
Sources
1 note
·
View note
Text
Download EVAP-COND 5.0: The Ultimate Heat Exchanger Simulation Tool for HVAC Engineers
In today’s energy-conscious world, optimizing HVAC systems has never been more critical. As a mechanical engineer who has worked extensively with heat exchanger design, I’m excited to share insights about EVAP-COND 5.0, NIST’s powerful simulation package that’s transforming how we design and analyze finned-tube evaporators and condensers. EVAP-COND represents the culmination of decades of…
#carbon dioxide refrigerant#computational intelligence#condenser design#custom refrigerant blends#evaporator modeling#heat exchanger performance#HVAC simulation#inned-tube heat exchangers#ISHED#low-GWP refrigerants#NIST simulation software#non-uniform air distribution#R1234yf#REFPROP#refrigerant circuitry optimization#refrigerant distribution#supercritical refrigerant operation#TableGen2#thermophysical properties#tube-by-tube analysis
0 notes
Text
Cybersecurity in 2025: What You Must Be Doing to Stay Safe Online
From phishing attacks to cloud vulnerabilities, cyber threats in 2025 are smarter, faster, and more dangerous than ever.
So how do you keep your business—or even your personal data—safe?
We’ve just released a massive guide on the most effective, actionable cybersecurity best practices for this year.
Here’s a sneak peek:
💻 Why outdated software is your biggest risk (and how to fix it) 📲 Must-do practices for small businesses on a budget 🔑 Why 2FA and password managers are non-negotiable now 📊 A checklist to secure your cloud, networks, and employees 🛠️ CISA, NIST, and low-cost tools you can implement right away
Don't wait until you're the next headline.
👉 Read the full cybersecurity guide here Visit us at Ambsan Technologies
0 notes
Text
naturally! The idea of a comprehensive code on cybersecurity and information security is excellent and required, especially with increasing awareness and attention to it. Gadi gives you one detailed structure for topics you can cover them, your blog is a reference and the rank of Meziane. We can call it, for example:
"Your comprehensive guide for cyberspace and information security"
1️⃣ basic concepts
The difference between cybersecurity and information security
Types of sensitive data (personal, financial, medical data …)
Information Security Principles: Secret, Safety, and availability (CIA TRIAD)
2️⃣ Electronic threats and attacks
Types of cyber attacks:
Phishing (Fraud)
Malware (malware: viruses, trojans, ransomware …)
DDOS (attacks on service disable)
SQL Inject
Zero-Day Exploits
Social engineering and how to protect it
3️⃣ Tools and techniques
Anti -virus software and how to choose the best
Firewall walls and their types
VPN and why is important
Curvement (SSL/TLS, PGP, End-To-End Encryption …)
Password Management (Password Managers)
4️⃣ best safety practices for individuals
How to manage strong passwords
Verify two steps (2FA)
E -mail insurance and social accounts
Protecting smartphone and personal computers
5️⃣ Network security
Securing Wi -Fi networks
IDS and infiltration prevention systems (IPS)
Using VPN for public networks
6️⃣ Institutions Security
Information security policies
Cyber awareness and training of employees
Risk evaluation and accident management
Compliance: standards such as ISO 27001, NIST, GDPR
7️⃣ Specializations and professional opportunities in cybersecurity
Types of disciplines: penetration test, digital criminal analysis, accident management …
Professional certificates: CEH, Cissp, Comptia Security+
How to start a professional path, so cyber security
8️⃣ modern news and articles
Cover the latest gaps and attacks
Real case studies analysis
New tools and software reviews
9️⃣ Free Courses and Resources
COURSERA, CYBRARY, Tyhackme …)
Comics books and articles
Training laboratories and challenges (CTF)
10️⃣ The legal and moral aspect
Laws related to electronic crime
Ethics in the penetration test
Privacy and data protection policies
Technical additions (for the Baggi deepening)
Digital Forensics
Cloud Security
Internet Security (IOT Security)
Artificial intelligence and cyber security
Bash notes the blog succeeds
✅ Topics organize in clear sections (for example: for beginners - for applicants) ✅ A practical examples and explanations with pictures or video ✅ Try to give continuous updates Bash, the blog remains up to keep up with
0 notes
Text
Price: [price_with_discount] (as of [price_update_date] - Details) [ad_1] Buslink CipherShield USB 3.0/eSATA 256-bit Encrypted Hard Drive Series prevents unauthorized access to your digital data. CipherShield design features a chip embedded in the access key which matches the AES encryption module on the controller board. The drive will automatically lock down its content once the key is unplugged, or power is shut off. And without the access key, data will not be seen or accessed in the event of theft or loss of the external drive. Data stored on the hard drive are safeguarded by hardware-based National Institute of Standards and Technology (NIST) certified industrial strength AES (Advanced Encryption standard) cryptographic engine. The advantage of hardware encryption over software encryption is that you need not be concerned about Trojans/viruses or software upgrades, which results in a decrease of total cost of ownership. Since CipherShield encrypts data independent of the operating system; removing the drive and connecting it directly to the SATA BUS will not defeat the encryption. Unit is bundled with two keys and registration is required for key duplication. System Requirement: Microsoft Windows 10, 8, 7, Vista, Server 2016, 2012, 2008, 2003 (XP and 2000 Server not supported for larger than 2TB), Mac OS X 10.4 or later with Intel Processor, Linux with GPT support. Package Content: CipherShield USB 3.0/eSATA 256-bit AES External Hard Drive, 2 Cipherkeys, USB 3.0 and eSATA cables, Power Adapter, and User manual. NIST FIPS 140-2 Level 2 compliant AES hardware encryption with 256-bit encryption Conforms to HIPAA regulation regarding patient privacy and to Sarbanes-Oxley regarding corporate financial and accounting practice CipherShield Smart Insert technology with CipherKey to authenticate the drive Encryption key is on the removable hardware key; can be removed and stored away to prevent unauthorized access Operates independently to the OS: does not require separate drivers [ad_2]
0 notes
Text
If Donald Trump wins the US presidential election in November, the guardrails could come off of artificial intelligence development, even as the dangers of defective AI models grow increasingly serious.
Trump’s election to a second term would dramatically reshape—and possibly cripple—efforts to protect Americans from the many dangers of poorly designed artificial intelligence, including misinformation, discrimination, and the poisoning of algorithms used in technology like autonomous vehicles.
The federal government has begun overseeing and advising AI companies under an executive order that President Joe Biden issued in October 2023. But Trump has vowed to repeal that order, with the Republican Party platform saying it “hinders AI innovation” and “imposes Radical Leftwing ideas” on AI development.
Trump’s promise has thrilled critics of the executive order who see it as illegal, dangerous, and an impediment to America’s digital arms race with China. Those critics include many of Trump’s closest allies, from X CEO Elon Musk and venture capitalist Marc Andreessen to Republican members of Congress and nearly two dozen GOP state attorneys general. Trump’s running mate, Ohio senator JD Vance, is staunchly opposed to AI regulation.
“Republicans don't want to rush to overregulate this industry,” says Jacob Helberg, a tech executive and AI enthusiast who has been dubbed “Silicon Valley’s Trump whisperer.”
But tech and cyber experts warn that eliminating the EO’s safety and security provisions would undermine the trustworthiness of AI models that are increasingly creeping into all aspects of American life, from transportation and medicine to employment and surveillance.
The upcoming presidential election, in other words, could help determine whether AI becomes an unparalleled tool of productivity or an uncontrollable agent of chaos.
Oversight and Advice, Hand in Hand
Biden’s order addresses everything from using AI to improve veterans’ health care to setting safeguards for AI’s use in drug discovery. But most of the political controversy over the EO stems from two provisions in the section dealing with digital security risks and real-world safety impacts.
One provision requires owners of powerful AI models to report to the government about how they’re training the models and protecting them from tampering and theft, including by providing the results of “red-team tests” designed to find vulnerabilities in AI systems by simulating attacks. The other provision directs the Commerce Department’s National Institute of Standards and Technology (NIST) to produce guidance that helps companies develop AI models that are safe from cyberattacks and free of biases.
Work on these projects is well underway. The government has proposed quarterly reporting requirements for AI developers, and NIST has released AI guidance documents on risk management, secure software development, synthetic content watermarking, and preventing model abuse, in addition to launching multiple initiatives to promote model testing.
Supporters of these efforts say they’re essential to maintaining basic government oversight of the rapidly expanding AI industry and nudging developers toward better security. But to conservative critics, the reporting requirement is illegal government overreach that will crush AI innovation and expose developers’ trade secrets, while the NIST guidance is a liberal ploy to infect AI with far-left notions about disinformation and bias that amount to censorship of conservative speech.
At a rally in Cedar Rapids, Iowa, last December, Trump took aim at Biden’s EO after alleging without evidence that the Biden administration had already used AI for nefarious purposes.
“When I’m reelected,” he said, “I will cancel Biden’s artificial intelligence executive order and ban the use of AI to censor the speech of American citizens on Day One.”
Due Diligence or Undue Burden?
Biden’s effort to collect information about how companies are developing, testing, and protecting their AI models sparked an uproar on Capitol Hill almost as soon as it debuted.
Congressional Republicans seized on the fact that Biden justified the new requirement by invoking the 1950 Defense Production Act, a wartime measure that lets the government direct private-sector activities to ensure a reliable supply of goods and services. GOP lawmakers called Biden’s move inappropriate, illegal, and unnecessary.
Conservatives have also blasted the reporting requirement as a burden on the private sector. The provision “could scare away would-be innovators and impede more ChatGPT-type breakthroughs,” Representative Nancy Mace said during a March hearing she chaired on “White House overreach on AI.”
Helberg says a burdensome requirement would benefit established companies and hurt startups. He also says Silicon Valley critics fear the requirements “are a stepping stone” to a licensing regime in which developers must receive government permission to test models.
Steve DelBianco, the CEO of the conservative tech group NetChoice, says the requirement to report red-team test results amounts to de facto censorship, given that the government will be looking for problems like bias and disinformation. “I am completely worried about a left-of-center administration … whose red-teaming tests will cause AI to constrain what it generates for fear of triggering these concerns,” he says.
Conservatives argue that any regulation that stifles AI innovation will cost the US dearly in the technology competition with China.
“They are so aggressive, and they have made dominating AI a core North Star of their strategy for how to fight and win wars,” Helberg says. “The gap between our capabilities and the Chinese keeps shrinking with every passing year.”
“Woke” Safety Standards
By including social harms in its AI security guidelines, NIST has outraged conservatives and set off another front in the culture war over content moderation and free speech.
Republicans decry the NIST guidance as a form of backdoor government censorship. Senator Ted Cruz recently slammed what he called NIST’s “woke AI ‘safety’ standards” for being part of a Biden administration “plan to control speech” based on “amorphous” social harms. NetChoice has warned NIST that it is exceeding its authority with quasi-regulatory guidelines that upset “the appropriate balance between transparency and free speech.”
Many conservatives flatly dismiss the idea that AI can perpetuate social harms and should be designed not to do so.
“This is a solution in search of a problem that really doesn't exist,” Helberg says. “There really hasn’t been massive evidence of issues in AI discrimination.”
Studies and investigations have repeatedly shown that AI models contain biases that perpetuate discrimination, including in hiring, policing, and health care. Research suggests that people who encounter these biases may unconsciously adopt them.
Conservatives worry more about AI companies’ overcorrections to this problem than about the problem itself. “There is a direct inverse correlation between the degree of wokeness in an AI and the AI's usefulness,” Helberg says, citing an early issue with Google’s generative AI platform.
Republicans want NIST to focus on AI’s physical safety risks, including its ability to help terrorists build bioweapons (something Biden’s EO does address). If Trump wins, his appointees will likely deemphasize government research on AI’s social harms. Helberg complains that the “enormous amount” of research on AI bias has dwarfed studies of “greater threats related to terrorism and biowarfare.”
Defending a “Light-Touch Approach”
AI experts and lawmakers offer robust defenses of Biden’s AI safety agenda.
These projects “enable the United States to remain on the cutting edge” of AI development “while protecting Americans from potential harms,” says Representative Ted Lieu, the Democratic cochair of the House’s AI task force.
The reporting requirements are essential for alerting the government to potentially dangerous new capabilities in increasingly powerful AI models, says a US government official who works on AI issues. The official, who requested anonymity to speak freely, points to OpenAI’s admission about its latest model’s “inconsistent refusal of requests to synthesize nerve agents.”
The official says the reporting requirement isn’t overly burdensome. They argue that, unlike AI regulations in the European Union and China, Biden’s EO reflects “a very broad, light-touch approach that continues to foster innovation.”
Nick Reese, who served as the Department of Homeland Security’s first director of emerging technology from 2019 to 2023, rejects conservative claims that the reporting requirement will jeopardize companies’ intellectual property. And he says it could actually benefit startups by encouraging them to develop “more computationally efficient,” less data-heavy AI models that fall under the reporting threshold.
AI’s power makes government oversight imperative, says Ami Fields-Meyer, who helped draft Biden’s EO as a White House tech official.
“We’re talking about companies that say they’re building the most powerful systems in the history of the world,” Fields-Meyer says. “The government’s first obligation is to protect people. ‘Trust me, we’ve got this’ is not an especially compelling argument.”
Experts praise NIST’s security guidance as a vital resource for building protections into new technology. They note that flawed AI models can produce serious social harms, including rental and lending discrimination and improper loss of government benefits.
Trump’s own first-term AI order required federal AI systems to respect civil rights, something that will require research into social harms.
The AI industry has largely welcomed Biden’s safety agenda. “What we're hearing is that it’s broadly useful to have this stuff spelled out,” the US official says. For new companies with small teams, “it expands the capacity of their folks to address these concerns.”
Rolling back Biden’s EO would send an alarming signal that “the US government is going to take a hands off approach to AI safety,” says Michael Daniel, a former presidential cyber adviser who now leads the Cyber Threat Alliance, an information sharing nonprofit.
As for competition with China, the EO’s defenders say safety rules will actually help America prevail by ensuring that US AI models work better than their Chinese rivals and are protected from Beijing’s economic espionage.
Two Very Different Paths
If Trump wins the White House next month, expect a sea change in how the government approaches AI safety.
Republicans want to prevent AI harms by applying “existing tort and statutory laws” as opposed to enacting broad new restrictions on the technology, Helberg says, and they favor “much greater focus on maximizing the opportunity afforded by AI, rather than overly focusing on risk mitigation.” That would likely spell doom for the reporting requirement and possibly some of the NIST guidance.
The reporting requirement could also face legal challenges now that the Supreme Court has weakened the deference that courts used to give agencies in evaluating their regulations.
And GOP pushback could even jeopardize NIST’s voluntary AI testing partnerships with leading companies. “What happens to those commitments in a new administration?” the US official asks.
This polarization around AI has frustrated technologists who worry that Trump will undermine the quest for safer models.
“Alongside the promises of AI are perils,” says Nicol Turner Lee, the director of the Brookings Institution’s Center for Technology Innovation, “and it is vital that the next president continue to ensure the safety and security of these systems.”
26 notes
·
View notes
Text
**Navigating Cybersecurity inside the Big Apple: Essential IT Support Solutions for New York Businesses**
Introduction
In right now’s digital landscape, cybersecurity is an predominant attention for firms of all sizes, quite in bustling metropolises like New York City. With thousands and thousands of transactions taking place every day and a plethora of delicate archives being exchanged, making sure sturdy IT beef up solutions has not ever been greater very important. As agencies progressively more depend on cloud services, community infrastructure, and numerous era providers, information the intricacies of cybersecurity turns into paramount.

New York companies face exciting challenges in the case of defending their documents and infrastructure. The town is a melting pot of industries—from finance to healthcare—both with its very own extraordinary compliance requisites reminiscent of NIST, HIPAA, and PCI DSS. In this entire marketing consultant, we’ll discover fundamental IT reinforce options tailor-made for New York organizations, concentrating on tactics to navigate the advanced world of cybersecurity.
The Importance of Cybersecurity for New York Businesses Understanding Cyber Threats
Every day, cybercriminals enhance new programs to make the most vulnerabilities inside of industry approaches. Whether it’s with the aid of phishing attacks or exploiting vulnerable endpoints, these threats can result in monstrous fiscal losses and reputational smash.
Types of Cyber Threats Malware: Malicious software designed to harm or make the most gadgets. Ransomware: A sort of malware that locks customers out unless a ransom is paid. Phishing Attacks: Fraudulent makes an attempt to achieve delicate archives by way of disguising as faithful entities. The Cost of Downtime
Did you realize that downtime can settlement organizations millions, if not thousands and thousands? A document from Forbes anticipated that unplanned outages can price establishments as much as $5,six hundred in line with minute. This miraculous figure underscores the importance of having potent cybersecurity measures in vicinity.
youtube
Regulatory Compliance in NYC
Different industries have particular regulatory specifications that dictate how they deserve to control files defense:
Healthcare (HIPAA): Mandates stringent safeguards for patient suggestions. Finance (PCI DSS): Protects cardholder data from breaches.
Understanding these regulations is necessary for imposing strong cybersecurity tactics.
Navigating Cybersecurity in the Big Apple: Essential IT Support Solutions for New York Businesses Managed IT Services: A Comprehensive Approach
When it comes to securing your commercial enterprise in New York City, outsourcing your IT needs is likely to be probably https://www.instagram.com/wheelhouse.it/ the most ideal tactics ahead. Managed IT amenities grant agencies with steady tracking and control in their IT structures.
Benefits of Managed IT Services 24/7 Monitoring: Ensure consistent surveillance in opposition to doable threats.
1 note
·
View note
Text
L’invenzione dello Schermo Braille: Tecnologia e Accessibilità
Lo schermo Braille, conosciuto anche come refreshable Braille display o Braille terminal, è un’invenzione che ha rivoluzionato l’accessibilità per le persone cieche o ipovedenti. Grazie a questa tecnologia, gli utenti possono leggere in Braille il contenuto di un dispositivo elettronico senza necessitare di un monitor tradizionale. L’invenzione dello schermo Braille ha rappresentato un passo fondamentale verso l’inclusione digitale, affiancandosi alla sintesi vocale e offrendo una soluzione efficace per l’accesso alle informazioni.
Descrizione dello Schermo Braille
Lo schermo Braille è un dispositivo elettro-meccanico che visualizza caratteri Braille su una superficie piana tramite una serie di punti sollevabili. Questi punti emergono da piccoli fori e possono essere aggiornati dinamicamente per rappresentare il testo in tempo reale. L’invenzione ha permesso agli utenti non vedenti di interagire con computer e dispositivi mobili, migliorando l’autonomia e l’accesso all’informazione.
A causa della complessità della produzione e della necessità di un meccanismo preciso e affidabile, lo schermo Braille è un dispositivo costoso. Generalmente, i modelli disponibili sul mercato offrono 40 o 80 celle Braille, ognuna composta da 8 punti, permettendo la rappresentazione completa della codifica ASCII estesa. Questa invenzione ha aperto nuove opportunità per le persone cieche, consentendo loro di accedere a contenuti digitali con maggiore facilità.
Alcuni modelli avanzati di schermo Braille includono funzionalità aggiuntive come la rappresentazione della posizione del cursore tramite punti vibranti e pulsanti dedicati per la navigazione diretta. Questa evoluzione dell’invenzione ha reso più intuitiva l’interazione con il dispositivo.
Funzionamento e Tecnologia
Il meccanismo che consente ai punti di sollevarsi sfrutta la tecnologia piezoelettrica. Cristalli piezoelettrici si espandono quando viene applicata una tensione elettrica, permettendo di sollevare i punti e rendere leggibile il testo Braille. Ogni cella richiede otto cristalli piezoelettrici, rendendo la produzione complessa ma altamente precisa.
Un altro elemento chiave dell’invenzione dello schermo Braille è il software di lettura dello schermo, noto come screen reader. Questo software raccoglie il contenuto testuale dallo schermo del sistema operativo e lo converte in Braille, trasmettendolo poi al display. Gli screen reader devono interpretare anche elementi grafici come finestre e barre di scorrimento, trasformandoli in informazioni testuali. Sistemi operativi moderni, come Windows con l’API MSAA, offrono strumenti per facilitare questa conversione.
Evoluzione e Innovazioni
Un’importante innovazione legata all’invenzione dello schermo Braille è il rotating-wheel Braille display, sviluppato dal National Institute of Standards and Technology (NIST) e dalla Leuven University in Belgio. Questa tecnologia utilizza una ruota su cui sono disposti i punti Braille, permettendo agli utenti di leggere in modo continuo con un solo dito mentre la ruota ruota a velocità selezionata. Questa invenzione riduce notevolmente la complessità di fabbricazione e potrebbe abbassare i costi rispetto ai display Braille tradizionali.
Attualmente, esistono due tipologie principali di schermi Braille:
Dispositivi solo terminale: forniscono una riga Braille con tasti funzione per navigare nel testo e modificare le impostazioni del display.
Dispositivi con memoria integrata: includono funzionalità avanzate come la gestione di appunti, la navigazione su Internet e l’invio di email, trasformandosi in strumenti indipendenti.
Il Monitor Braille per Computer
Un’altra significativa invenzione nel settore è il Braille computer monitor, composto da celle rettangolari con quattro righe e due colonne di punti. I punti vengono sollevati da driver elettromeccanici e mantenuti in posizione da cavi elastici. Questa tecnologia, coperta dal brevetto statunitense 6700553, rappresenta un ulteriore passo avanti nell’evoluzione dei display Braille.
Storia e Sviluppo
L’invenzione dello schermo Braille ha radici profonde nella storia della tecnologia assistiva. I primi terminali Braille permettevano l’input tramite gruppi di tre tasti e una barra spaziatrice, simile al Dattilobraille. L’output avveniva attraverso una fila di caratteri Braille elettromeccanici. Nel 1951, David Abraham, un insegnante di lavorazione del legno, progettò un terminale Braille portatile, contribuendo allo sviluppo di dispositivi più accessibili.
Oggi, lo schermo Braille continua a evolversi grazie a nuove invenzioni e miglioramenti tecnologici. Il progresso nella miniaturizzazione dei componenti e nell’abbassamento dei costi di produzione potrebbe rendere questi dispositivi più accessibili a un numero maggiore di persone, migliorando ulteriormente l’inclusione digitale.
Conclusione
L’invenzione dello schermo Braille ha trasformato l’accesso all’informazione per le persone cieche e ipovedenti, offrendo una soluzione tecnologica avanzata per la lettura digitale. Grazie agli sviluppi recenti e alle continue innovazioni, il futuro di questa tecnologia appare sempre più promettente. La ricerca e l’innovazione nel settore continuano a migliorare l’accessibilità, rendendo la conoscenza e la comunicazione più inclusive per tutti.
Leggici su Linkedin
Indicaci come contattarti
#arcobaleno#associazione#associazioneculturale#associazioni#associazionimondovi#cooperativaarcobaleno#eventi#eventiperilsociale#mondovi#monregalese#onlus#sociale#socialemondovi#oltrearcobaleno#braille#disabilità#solidarietà#lotta#invenzione#brown#inclusione#difficoltà#bellestorie#schermo#resilienza#genioumano
0 notes
Text
Efficient On-Site HDD Degaussing: The Ultimate Guide to Secure Data Destruction
In today’s data-driven world, protecting sensitive information is non-negotiable. Did you know that a single improperly erased hard drive can expose thousands of confidential records? That’s why efficient on-site HDD degaussing has become a crucial tool for organizations prioritizing data security. Let’s dive into how this process works, why it’s effective, and how you can implement it seamlessly.
What Is HDD Degaussing?
At its core, hard drive degaussing is a method of data destruction that uses powerful magnetic fields to erase all information stored on a hard disk drive (HDD). Unlike software-based methods, degaussing permanently disrupts the magnetic patterns on the drive platters, rendering the data completely unrecoverable—even with advanced recovery tools.
How Does It Work?
Magnetic Field Application: A degausser generates an intense magnetic field that neutralizes the magnetic alignment of the data.
Data Erasure: This process not only erases files but also removes essential startup files, ensuring the drive cannot be reused.
Verification: Most professional services provide detailed reports documenting serial numbers and confirmation of successful degaussing.
Why Choose On-Site Degaussing?
On-site degaussing offers unparalleled convenience and security. Instead of transporting sensitive drives to an off-site facility, the entire process happens at your location under your supervision.
Key Benefits:
Enhanced Security: Witnessing the process ensures no drive leaves your premises unprocessed.
Time Efficiency: No delays from transportation or external scheduling.
Compliance Assurance: Many industries require strict adherence to data destruction regulations, and on-site services provide documentation to meet these standards.
The Step-by-Step Process for Efficient On-Site HDD Degaussing
1. Preparation
Identify all drives requiring destruction.
Record serial numbers for tracking purposes.
Ensure access to a secure area for the degaussing equipment.
2. Degaussing Execution
A certified technician arrives with a portable degausser.
Drives are placed into the machine, which applies a magnetic field strong enough to erase all data within seconds.
Each drive is verified for successful data destruction.
3. Post-Degaussing Disposal
While degaussed drives are no longer functional, they still need proper disposal.
Many services combine degaussing with shredding to guarantee HDD shredding and degaussing compliance.
Why Degaussing Is Superior to Other Methods
While software-based wiping or physical destruction like shredding are common methods, they come with limitations:
Software Wiping: Time-consuming and prone to errors if not done correctly.
Physical Destruction Alone: Without prior degaussing, residual data may still be recoverable from fragments.
By combining hard drive degaussing with shredding or recycling, you achieve both complete data erasure and eco-friendly disposal.
Choosing the Right Partner for On-Site Degaussing
When selecting an on-site service provider, look for:
Certifications: Ensure they comply with industry standards like NIST or GDPR.
Detailed Reports: A comprehensive report should include serial numbers, timestamps, and confirmation of destruction.
Recycling Options: Partner with providers who responsibly recycle electronic waste after degaussing.
For reliable and secure solutions, explore efficient on-site HDD degaussing services tailored to your needs.
Final Thoughts
In an era where data breaches can cost millions in fines and reputational damage, taking proactive steps toward secure data destruction is essential. By leveraging efficient on-site HDD degaussing, you not only safeguard sensitive information but also streamline compliance and operational efficiency. Don’t leave your data security to chance—partner with experts who guarantee HDD shredding and degaussing for total peace of mind!
0 notes