#cyber physical systems
Explore tagged Tumblr posts
Text
#technology#education#blog#blogging#artificial intelligence#upsc#iot#internet of things#cyber physical systems#ecosystem#smartphone#drones#fitness tracker#traffic signal
0 notes
Text
Let's be real, if anyone actually cares about online security then they have unique passwords for every site that are just an incomprehensible string of characters. And they wouldn't use a digital keychain, they'd keep that shit written in a physical journal that they shove under their mattress when they're not actively transcribing a password.
#the key to cybersecurity is to keep the cyber part as minimal as possible#it's gonna be a lot harder for someone to physically enter your house and read the passwords from a journal under your mattress#than for them to just ctrl+f your username or email in the latest data breach#and yeah you could put a TXT file full of passwords on your desktop but that's only actually secure until some malware scrapes your system#and no I don't do this because I actually don't give a shit about my online security#i sleep in a shed with a ground floor window#I'm more concerned about getting murdered in my sleep#cybersecurity#bullshittery
4 notes
·
View notes
Text
Industry 4.0: Powering the Next Industrial Revolution with Intelligence, Connectivity, and Automation
The world is undergoing a radical transformation. As we move deeper into the 21st century, the fusion of digital, physical, and biological systems is reshaping how we manufacture, operate, and innovate. This revolution has a name: Industry 4.0—the fourth industrial revolution. It represents a new era where smart technology, real-time data, automation, and interconnected networks converge to…
#5G Connectivity#Additive Manufacturing#advanced robotics#Artificial intelligence#Automation#Big Data Analytics#Blockchain#Cloud Computing#connected industry#Cyber-physical systems#data-driven operations#Digital Transformation#Digital twin#Edge computing#fourth industrial revolution#IIoT#Industrial Networking#Industry 4.0#intelligent systems#manufacturing innovation#next-gen industry#Predictive maintenance#Real-time analytics#Robotics#smart factory#Smart Grid#Smart logistics#Smart manufacturing#SolveForce#Supply Chain Visibility
0 notes
Text
The GSDC Certificate In Cyber Physical Systems validates an individual's proficiency in the integration of computational and physical processes.Cyber Physical Systems (CPS) play a pivotal role in today's interconnected world, enabling real-time monitoring, control, and optimization across diverse industries. Obtaining a Certified Cyber Physical System Certificate demonstrates expertise in areas like security engineering, computer networking, and system security, making candidates highly sought-after professionals.The Cyber Physical System Certification equips individuals with the skills to address challenges in manufacturing, healthcare, energy, and transportation sectors, where seamless integration of digital intelligence and physical components is crucial.
#certified cyber physical system#cyber physical system certificate#certificate in cyber physical system#cyber physical system certification#learning and development certifications
0 notes
Text
Cyber-Physical System Market Set to Expand at a 7.9% CAGR from 2022 to 2028
Future Market Insights has recently published a market research report on Global Cyber-Physical System market. The study presents a detailed analysis on the historical data, current and future market scenario for the Cyber-Physical System market.
The report presents an in-depth analysis of key growth drivers and trends that are likely to impact the market in upcoming years. With the adoption of cloud computing and artificial intelligence, the technology industry is expected to witness a healthy growth over the forecast period. Increasing competitive pressure and advanced digital transformation in the area of data analytics and artificial intelligence are likely to improve the growth outlook for the Cyber-Physical System market in the upcoming decade.
Request a Sample Report with Table of Contents and Figures: https://www.futuremarketinsights.com/reports/sample/REP-GB-4498
According to the FMI’s report, Changes in consumer behavior, robust product innovations, and expanding distribution networks continue to influence growth of the Cyber-Physical System market. FMI’s analysts rely on unique research methods and comprehensive data study of the current and upcoming trends of the Cyber-Physical System market report and gather data from a wide range of primary and secondary sources.
Impact of COVID-19 on Cyber-Physical System Market
With the onset of COVID-19, there has been a significant impact on the technology sector. Disruptions of electronic supply-value chain and raw material supply have adversely impacted the technology industry. However, there has been a positive impact on the industry with the adoption of remote working. Rapid focus on integrating digital techniques and big data analytics in IT services and technology industry are expected to result in a healthy outlook.
FMI’s recently published report has a chapter exclusively dedicated to COVID-19 impact analysis. This is intended to aid Cyber-Physical System market stakeholders in deploying innovative strategies to overcome the challenges that are likely to affect the Cyber-Physical System market.
Reports available at attractive prices for first-time buyers! Offer expires soon!
Key Questions Addressed in the Cyber-Physical System Market Report
How will the Cyber-Physical System market expand through 2031?
Which are the major key growth drivers and opportunities driving the market growth?
What are the recent technological developments in the Cyber-Physical System market?
What are key challenges and competition threats faced by Cyber-Physical System market players?
Which region is the most lucrative in the Cyber-Physical System market?
Get more Insights Analysis on this Cyber-Physical System Market: https://www.futuremarketinsights.com/ask-question/rep-gb-4498
Cyber-Physical System Market: Competitive Analysis
The FMI’s Cyber-Physical System market report provides a detailed analysis of prominent players as well as emerging companies operating in the Cyber-Physical System market. Some of the key players are:
Dell EMC
VMware Inc.
Hewlett Packard Enterprise
Schneider Electric
SAP SE
Honeywell International Inc.
Hitachi Vantara
Oracle
With an extensive SWOT analysis, the FMI’s study provides the strengths, weaknesses, growth prospects and product expansion within the players. The report also offers key players marketing strategies, recent mergers and acquisitions and pricing strategy to gain a competitive edge in the industry.
Cyber-Physical System Market: Key Segmentation
By Region
North America
Latin America
Western Europe
Eastern Europe
Asia Pacific excluding Japan
Japan
Middle East & Africa
Incisive coverage of the regional markets offers deeper insights on the market performance across key regions along with relevant graphs, figures, and list of tables.
Component
Hardware
Software
Services
Vertical
Aerospace and Defense
Automotive
Energy and Utility
Healthcare
Manufacturing
Consumer Electronics
Others
0 notes
Text
Learning from the Dog that Didn't Bark
Gregory (Scotland Yard detective): “Is there any other point to which you would wish to draw my attention?” Holmes: “To the curious incident of the dog in the night-time.” Gregory: “The dog did nothing in the night-time.” Holmes: “That was the curious incident.” Arthur Conan Doyle “The Silver Blaze” from “The Memoirs of Sherlock Holmes” I work in the area of reliability and security. It is…

View On WordPress
0 notes
Text
B.Tech in Robotics & Cyber-Physical Systems
B.Tech degree with elements of robotics, cyber physical systems, autonomous systems, internet of things.
#Robotics engineering#Cyber-Physical Systems#Bachelor of Technology#Engineering program#Robotics degree#Technical education
0 notes
Text
So it's a pretty much accepted that being a member of the batfamily member means becoming a pretty decent detective but rather than simply having Batman be the worlds greatest detective and the rest of the family having the honour of being "almost as good as Batman" I would love to see stories that highlight how different members of the batfamily develop a unique style of detectiving.
Bruce is a Sherlock Holmes style detective. He relies on the physical evidence. He breaks down a crime scene, picks up the details others have missed, and then uses science and forensics to find the answer.
Dick is a Hercule Poirot/Benoit Blanc style detective. He relies more on reading people and understanding human nature. He can style use physical evidence but he is more interested in working out the people involved and making sense of their actions.
Jason is a Dick Tracy/Noir style detective. He understands the criminal underworld intimately and knows where to apply pressure to get the information he needs.
Barbara (especially as Oracle) is an information broker and cyber savant. She gets into systems noone else can and connects dots in ways noone else can see.
Tim is another Sherlock Holmes style detective, albeit one still honing his craft and someday will take over the mantle of the worlds greatest detective.
Damian is a combination of both Bruce and Dicks styles whilst still developing his own style.
#batman#dick grayson#nightwing#dc comics#bat family#batfam#damian wayne#tim drake#jason todd#dc robin#random thoughts
217 notes
·
View notes
Text
How To Find Cool Games: On Itch.io!
As I drift into a reduced posting schedule, I figured I’d give everyone a peek behind the screen for how I cultivate ttrpgs for recommendations! Some of these tips might even help you find your next favourite game.
This is a long read so let's put most of this beast under a read-more. Keep in mind that many of these strategies work best when you're checking itch.io a little bit every week, and when you're engaging with the platform as more than just a store page. There's a lot of features that you can choose to engage with if you want to find the game for you!
browsing physical game recent releases. This helps me see what’s new and happening, and it helps with a number of things. First of all, I get to see new games pretty much every time I browse recent releases. Secondly, I get a good sense of what’s currently popular in the design space. Thanks to my weekly browsing, I recognize Cy_Borg, Shadowdark and Mausritter as games whose content shows up rather regularly - if you see a lot of products attached to one game at once, that’s a good sign that there’s a related game jam going on (in this case, Shadowdark), or that a game is really resonating with its player base.
sorting games into collections. I personally organize by genre, system, player configuration and (in Games That Intrigue Me) games that I’m personally really hyped about. This works for me because of the nature of my work, but a few collections sorted according to level of interest or game style might work better for you.
Depending on the need, I might have a collection that works specifically for the request - Neon Lights & Cyber Nights is perfect for cyberpunk games, but I might also reference this folder for combat, inventory mechanics, resistance themes, or interesting tech rules. LUMEN is great for folks who want fast-paced games, folks who are looking for certain kinds of video games, or folks who want to feel powerful. If you follow other people on Itch, you'll probably also be able to see their collections, which is a great place to browse.
searching game tags. I don’t typically use the regular search feature, although recently the website did update the toggles to restrict your results to physical games, video games, etc. Instead what I usually do is type what I’m looking for into the url: so in this case, [deck-building]. I might use a couple different wordings, such as [deck-builder] and [deckbuilding] (no spaces). You’re not going to find everything that includes the thing you’re looking for, but you’ll definitely find places to start.
Game Jams! I find these either by looking at the “Jams” tab (although you'll have to wade through video games here) or by noticing that a number of games being published recently have the “for the _” jam in the description. Alternatively, I might be reading the page for a game and see the little “Submission” badge in interaction buttons. There’s game jams for specific systems, game jams for various themes, game jams with special restrictions, and game jams that are titled things like “finish your damn game jam.”
Bundles. I typically buy big-ass bundles and then sort through the games in my downtime. These games are sorted into collections for future reference, and if a game really pops out - into the Intrigue Me folder it goes! And the best part is that I already own it, so if I want to learn more, I can just download it and start reading.
following game designers that I like. This way I’ll get notifications if they release a new game, update an old game, rate someone else’s game, or sort games into their own collections. I also get to see what other folks in the space are excited about - on the day I was browsing, Plasmodics by Will Jobst was really hot.
If you follow me on Itch, you’ll get a notification every time I add a game to one of my non-private folders! Also - you can interact with designers on Itch by liking their updates, and even commenting on their posts, which is a great way to get involved in the design community - and also just make a designer’s day!
#how to#tabletop games#indie ttrpgs#itch.io#mint speaks#I don't think I can over-emphasize how much you can contribute to the game scene#simply by leaving a comment on a game or an update post#interaction on an itch page indicates that there's interest#which motivates designers to design#it tells us that our game is resonating with someone
300 notes
·
View notes
Note
Species-affirming cybersex. That is all
that's NOT all because I'm gonna break down these concepts and how they work.
species first. reffing chapter 2 of plural respect, system members have self-perceptions that can differ from the body and don't have to resemble things that exist in the outside world - and a shared understanding of this can help you connect. Nonhuman types often shorthand this as "species" to indicate something left field of human - but it practically encompasses impossible-human stuff like "human with a curse" or "human that's a wizard" and inorganics like "sentient computer virus" or "reanimated skeleton" for most use cases - anything physically impossible enough. if you're into shapeshifter language, you might prefer "form" - same difference.
with that in mind let's talk cybering. Cybersex in most of its forms is collaborative fantasy. You're taking "thinking about a hot thing" and extending it to include someone else over the internet somehow. Though valid barebones sexting can be purely something like discussing physically occurring masturbation, it usually involves constructing a scene of some kind and (though its rarely admitted) you're basically collaboratively writing smut fanfiction about you and your hookup.
I think breaking the "this is weird" glass is critical to engage with this properly and prevent mystifying it. yes you are writing self insert oc fiction with a friend over the internet, yes you're gonna be horny about it. and yes omg you DO get to choose the tense case and perspective you prefer to write in this is huge and nobody says it.
Furry ERP communities (owing to a common layer of seperation between the selves) often use third person language, refer to sonas by name, and put dialogue in quotes: (confused, she pokes her friend's arm. "Hello?" she whispers, "Anyone home?") etc etc, providing a clear seperation between OOC and not. You might find this stiff or impersonal or booky - and there's a tonne of variation you can apply to see if it fixes that:
first-person pronouns: (I poke your arm. "Hello?" I whisper. "Anyone home?")
qualify actions instead of dialogue: ([she pokes her friend's arm] hello? is anyone home?) - this also removes hard OOC separation, enabling chitchat
both: ([I poke your arm] hello? is anyone home?)
both while avoiding self-references where possible: (*pokes your arm* hello? is anyone home?)
So sexting gives you a canvas, and because it's collaborative smut writing, it really doesn't require you to adhere to what regular humans do and look and feel like. You can write directly about your metaphysical forms interacting because you're literally out here playing pretend for fun.
It definitely works for some people and doesn't for others, but don't get caught in "what do I write". you can't focus on cybersex being *good*, focus on silly little whims and suggesting whatever comes to your head - start by finishing the sentence "if I had you in a room right now, I'd __". Its a silly little playpen for exploring eachother's sexuality and relationship to themself, just be nice to eachother and run with it.
And, yknow, affirming? well, as long as you communicate well, take the standard safety measures you would for any kink scene, and understand consent applies just as much when you're acting out text - then you can do/pretend/play/perform all kinds of stuff via text cybersex you can't do in-person. It's a great way to connect with these parts of yourself and resulting tendencies, and acquire stupid fantastical kinks about it. All new weird ways to be found (find yourself?) attractive.
Ok. well. unrelated tangent. you CAN do it in person. invoking weird nonhuman or otherwise metaphysical junk in bed is not strictly typing only - for one you can literally bring your phone TO bed and do mixed-media sex where you get to sext *and* get handsy, but that's not even the point. Sexting might make you a sex-fanfic-author but don't forget you can be a sex-wrestler/sex-theatre-performer too - talk to your hookup about the impossible things you'd like to do, and then do things that physically resemble them and you can both enjoy filling in the blanks. Your brain WILL help, if you're thinking about picking someone up with your tentacles and you use your body's arms, you'll naturally want to move them in a different kind of way, and you'll both pick up on it. The more you engage, the more it comes through in how you move. Hell, you can even check verbally if you're understanding things right - "is that your arm" etc etc. It's a more complicated, subtextual language, but it can be a LOT of fun.
Anyway, species-affirming cybersex :)
115 notes
·
View notes
Text
Humans are weird: Prank Gone Wrong
( Please come see me on my new patreon and support me for early access to stories and personal story requests :D https://www.patreon.com/NiqhtLord Every bit helps)
“Filnar Go F%$@ Yourself!” was possibly the most disruptive software virus the universe had ever seen.
The program was designed to download itself to a computer, copy the functions of existing software before deleting said software and imitating it, then running its original programming all the while avoiding the various attempts to locate and remove it by security software.
What was strange about such a highly advanced virus was that it did not steal government secrets, nor siphon funds from banking institutions, it ignore critical infrastructure processes, and even bypassed trade markets that if altered could cause chaos on an unprecedented scale. The only thing the software seemed focused on was in locating any information regarding the “Hen’va” species, and deleting it.
First signs of the virus outbreak were recorded on the planet Yul’o IV, but once the virus began to migrate at an increasing rate and latched on to several subroutines for traveling merchant ships things rapidly spiraled out of control. Within a week the virus had infected every core world and consumed all information regarding the Hen’va. It still thankfully had not resulted in any deaths, but the sudden loss of information was beginning to cause other problems.
Hen’va citizens suddenly found that they were not listed as galactic citizens and were detained by security forces on numerous worlds. Trade routes became disrupted as Hen’va systems were now listed as uninhabited and barren leading to merchants seeking to trade elsewhere. Birth records and hospital information for millions of patients were wiped clean as they now pertained to individuals who did not exist.
Numerous software updates and purges were commenced in attempting to remove the virus. Even the galactic council’s cyber security bureau was mobilized for the effort, but if even a single strand of the virus’s code survived it was enough to rebuild itself and become even craftier with hiding itself while carrying out its programming. This was made worse by the high level of integration the various cyber systems of the galaxy had made it so the chance of systems being re-infected was always high.
After ten years every digital record of the Hen’va was erased from the wider universe. All attempts to upload copies were likewise deleted almost immediately leaving only physical records to remain untouched.
To combat this, the Hen’va for all official purposes adopted a new name; then “Ven’dari”. In the Hen’va tongue in means “The Forgotten”, which is rather ironic as the Hen’va have had to abandon everything about their previous culture to continue their existence. The virus had become a defacto component of every computer system in the galaxy and continued to erase all information related to the Hen’va. Even the translator units refused identify the Hen’va tongue and so the Ven’dari needed to create a brand new language.
It wasn’t until another fifty years had passed before the original creator of the virus stepped forward and admitted to their crime. A one “Penelope Wick”.
At the time of the programs creation Ms. Wick was a student studying on Yul’o IV to be a software designer. While attending the institution Ms. Wick stated that a fellow student, a Hen’va named “Filnar”, would hound her daily. He would denounce her presence within the school and repeatedly declared that “what are the scrapings of humans compared to the glory of the Hen’va?”
The virus was her creation as a way of getting back at the student for his constant spite. Ms. Wick was well aware of the dangers it could pose if released into the wild and so had emplaced the limitation that the virus would only infect computers on site with the campus. The schools network was setup that students could only work on their projects within the confines of the institution to ensure they did not cheat and have others make them instead. What she had not counted on was this rule only applied to students and not teachers. So when a teacher brought home several student projects to review and then sharing those infected files with their personal computer, the virus then gained free access to the wider planets networks.
When the Ven’dari learned of this there were several hundred calls for Ms. Wick to be held accountable for her actions, and nearly twice as many made to take her head by less patient individuals who had seen their entire culture erased. Much to their dismay Ms. Wick died shortly after her confession from a long term disease that had ravaged her body for several years.
Much to her delight, she had achieved her goals of removing the source of her mockery.
#humans are insane#humans are weird#humans are space oddities#humans are space orcs#story#scifi#writing#original writing#niqhtlord01#funny#prank#prank gone wrong#virus
370 notes
·
View notes
Text
We discovered that you can get the Cyber Wagon(™) in Satisfactory as an easter egg by very stupid means... it drives horribly due to its square wheels, it is physically incapable of turning left, it apparently does not include a braking system, and the textures are absolute shit aside from the driver-side window featuring two prominent impact cracks. 15/10 this is the only way I will ever even consider "owning" that car
#i love this game so fucking much#you get it by putting a ficsit coupon in the awesome sink#i've seen lots of jokes about that goddamned car but this is the best
88 notes
·
View notes
Text
The Future of Cyber-Physical Systems (CPS) Market: Transforming Healthcare, Manufacturing, and Smart Cities
The rise of Cyber-Physical Systems (CPS) is one of the most transformative forces shaping industries today. By blending physical processes with computational elements, CPS offers the ability to collect and analyze real-time data from the physical world, enabling automated decisions and intelligent responses. With advancements in technologies like Internet of Things (IoT), Artificial Intelligence (AI), and machine learning, CPS is not only reshaping how businesses operate but is also revolutionizing sectors such as healthcare, manufacturing, and smart cities.
As we look into the future of the CPS market, it's clear that these systems are poised to become central to creating more intelligent, efficient, and connected environments. In this article, we explore the future trajectory of CPS and how it is set to transform industries and drive economic growth in the coming years.
The global cyber-physical systems market size is expected to be valued at USD 124.1 billion in 2024 and is projected to reach USD 255.3 billion by 2029; it is expected to grow at a CAGR of 15.5% from 2024 to 2029.
0 notes
Text
Breakdown x Bumblebee daughter
Bluesun inherited the characters of both creators. Boundless courage and loyalty, despite her physically unthreatening physique. Her friendly nature means that she quickly makes friends with almost anyone, especially humans.
She also acts first and thinks later (like Breakdown), like her creators known for her daring skills and speed driving abilities. Her altmode allows her to drive at full speed, but sometimes she lacks experience.
She has been born with heterochromia, which she acquired during the formation of her body, due to the fact that she received a mutated cyber-gene from Breakdown. Breakdown was a laboratory experimenter and Shockwave often made modifications to his body, including with cyber-genes. Bluesun was born slightly larger than other newborn sparkling (poor Bee) , and she is as tall as Breakdown when she grows up.
The mark on her chest was Optimus and Megatron's idea. They wanted their granddaughter to be a symbol of the unification of the two races, so they decided to make a special mark for her. Bumblebee and Breakdown were against it, but they put up with it.
Bluesun loves speed and therefore she focuses her strength on this, she is weak but fast, and she also learns quickly and quickly masters skills that are useful to her. For example, she learned Holomatter, creating a hologram of a person for camouflage in races in which she often participates.
She has her Stinger but it is difficult for her to control it due to system failures, and the presence of Chaos energy in her. Therefore, she uses blasters made by Wheeljack. She was born during a solar eclipse, hence the origin of her name.


Holomatter Stinger
#nya art#transformers#breakbee fanchild#fankids#transformers OC#breakbee#transformers earthspark#transformers bumblebee#bumblebee earthspark#tranformer breakdown#breakdown earthspark#transformers sparkling#bluesun
145 notes
·
View notes
Text
I'm seeing some posting about a feeling of fishiness about the recently completed US Election.
In the attempt to do something more productive than my last post, I'm gonna do an adhoc examination of how feasible I think a "rigged election" actually is, looking at a few methods that could have been used. So, to start with, what is the actual evidence here?
Most of it is... honestly vibes based, which I get, but don't put a lot of stock in, There was a lot of energy around the Harris campaign, and she had some good polls, but Donald Trump has proved nothing else in the past fucking decade, its that the polls literally do not matter for him, and he can outperform them by a hundred miles.
But. There's also some numbers.
None of this has been verified yet, and I want to make that clear, but this year has largely reported record turnout in a ton of states, especially the swing states, and yet, so far.
The number of votes seems much lower this year.
Not republican votes, not democrat votes, all votes. Hell, third party voting collapsed this year--whatever else you take from this election, this was not a case of the left splitting the vote.
Now, it's true that the vote count hasn't been completed, and it's possible that the numbers will make more sense once that's done. It's also true that the states didn't have quite the same turn-out as last year... but it was only a percentage point or two lower.
Add that to the frequent postings about people having their ballots rejected for... questionable reasons, and.
Well. It starts going from a "the moon is fake!" conspiracy to "Epstein had sex slaves" conspiracy.
But, okay, is it even possible for Trump to have faked the vote like this? People talked about it, but it was mostly in terms of legal challenges trying to overturn a Harris victory, or pulling in the supreme court to decide narrow districts. This, by all accounts, seems to be a straight forward Trump sweep.
So if there is shenanigans afoot, how could he have done it?
There's three feasible(ish) pathways, in my opinion:
Voter suppression and manipulation pre-ballot: Yeah this happened. It's also irrelevant to any possibility that the vote counts were tampered with. Look, this election was flooded with misinformation, legal suits, court cases, and election officials doing everything in their power to fuck with people's right to vote. It was filled with ballot boxes being lit on fire. Elon Musk did a fucking paid vote scheme! Of course there was voter suppression! But there always is, and although it was worse this year than many others, it wouldn't cause any numerical mismatch between turn out and votes, and there's not much that can be done now for this election. Even if someone voted because Musk slipped them $100, no court will ever be able to prove they didn't just happen upon $100 bucks and then voted for Trump.
Voting machines were manipulated: A few hours ago I would have said this was practically impossible, but apparently a bunch of election officials and cyber-security experts were sounding the alarm about this a few months ago, so, uh. That being said, I've seen people claiming that Starlink or whatever hacked voting machines, and no. No, Starlink did not hack voting machines. No one "hacked" voting machines. They weren't connected to the internet, or any wireless communication systems, because anyone with any degree of cybersecurity knowledge will tell you that's how you create an insecure system. Now, it's not impossible, technically speaking, than Elon Musk or fucking Russia managed to hire engineers and somehow bribe enough officals to get access to the machines and install hardware that would allow external access, but in that case we live in a Bond movie and somehow have bigger problems. So, if the voting machines themselves were compromised in any technological way, it would have required direct, physical access, which should be basically impossible, unless...
Ballot officials fucked with the vote This is the one I think is plausible. Basically, in this case, what could have happened is that various election officials at different levels of the process more or less lied about the vote count. This could have happened in a lot of different ways--they could have found reasons to reject mail-in ballots, which several states attempted to make legal, they could have found reasons to reject in-person ballots, which several states attempted to make legal. They could have, if the corruption ran deep enough to make this feasible, just... not counted or reported votes that swung for Harris. They could have, if the election machines work similar to the ones up here in BC, seen the results from the machines, then called the central election office over the phone--because remember, the ballot boxes should not be connected to anything. I don't know. There's a lot of options, and it varies from state to state, because remember, each state runs their own elections, and has their own rules and procedures.
So yeah, three explanations, only one of which is really plausible.
Now, I want to be clear, I don't think this election was fraudulent. Not yet, at least, I need to see actual evidence, or this is nothing more than a theory, but I also want to be clear.
...3 makes sense.
3 would explain why urban areas seemed to be underrepresented in this election, while rural areas surged. 3 would explain a discrepancy between voter turn out and votes counted. 3 would fit the strategy Trump and MAGA loyalists have been describing for the last four years, of infiltrating the election machinery and manipulating it to their own ends.
So I'm not saying it's likely that Trump fucked with the vote, not without evidence. Not yet.
But I will say this looks a hell of a lot more plausible than any claims made in the aftermath of the 2020 election.
120 notes
·
View notes
Text
Heads up folks, NicoNicoDouga is currently down due to a large scale cyberattack
The attack happened on the 8th and the site is still down in terms of video streaming. Apparently there were reports of Ransomware being used during the attack.
The site is still “down” but the blog part is back up but from the report, videos and content posted are ok so do not fret. The site is still down as of this post (save for the blog) and it seems they are working their hardest to fix it and do damage control.
Here is a rough translation of their most recent post:
Report and apology regarding cyberattack on our services
As announced in Niconico Info dated June 8th, 2024, Dwango Co., Ltd. (Headquarters: Chuo-ku, Tokyo; President and CEO: Takeshi Natsuno) has been unable to use the entire Niconico service operated by our company since the early morning of June 8th. It has been confirmed that this outage was caused by a large-scale cyberattack, including ransomware, and we are currently temporarily suspending use of the service and conducting an investigation and response to fully grasp the extent of the damage and restore it.
After confirming the cyberattack, we immediately took emergency measures such as shutting down the relevant servers, and have set up a task force to fully clarify the damage, determine the cause, and restore the system. We would like to report the findings of the investigation to date and future responses as follows.
We sincerely apologize to our users and related parties for the great inconvenience and concern caused.
Response history>
Around 3:30 a.m. on June 8, a malfunction occurred that prevented all of our web services, including our "Nico Nico" and "N Preparatory School" services, from working properly. After an investigation, it was confirmed that the malfunction was caused by a cyber attack, including ransomware, at around 8 a.m. on the same day. A task force was set up on the same day, and in order to prevent the damage from spreading, we immediately cut off communication between servers in the data center provided by our group companies and shut down the servers, temporarily suspending the provision of our web services. In addition, since it was discovered that the attack had also extended to our internal network, we suspended the use of some of our internal business systems and prohibited access to the internal network.
As of June 14, we are currently investigating the extent of the damage and formulating recovery procedures, aiming for a gradual recovery.
June 8, 2024
We have begun an investigation into the malfunction that prevented all of our "Nico Nico" services from working properly and the failure of some of our internal systems.
We have confirmed that the cause of the failure was encryption by ransomware. "Nico Nico" services in general and some internal business systems suspended and servers were shut down
A task force was established
First report "Regarding the situation in which Nico Nico services are unavailable" was announced
June 9, 2024
Contacted the police and consulted with external specialist agencies
Kabukiza office was closed
KADOKAWA announced "Regarding the occurrence of failures on multiple KADOKAWA Group websites"
June 10, 2024
Reported to the Personal Information Protection Commission (first report)
Second report "Regarding the situation in which Nico Nico services are unavailable" was announced
June 12, 2024
Reported the occurrence of the failure to the Kanto Regional Financial Bureau (Financial Services Agency)
June 14, 2024
This announcement
This cyber attack by a third party was repeated even after it was discovered, and even after a server in the private cloud was shut down remotely, the third party was observed to be remotely starting the server and spreading the infection. Therefore, the power cables and communication cables of the servers were physically disconnected and blocked. As a result, all servers installed in the data centers provided by the group companies became unusable. In addition, to prevent further spread of infection, our employees are prohibited from coming to the Kabukiza office in principle, and our internal network and internal business systems have also been shut down.
In addition to public cloud services, Niconico uses private cloud services built in data centers provided by KADOKAWA Group companies, to which our company belongs. One of these, a data center of a group company, was hit by a cyber attack, including ransomware, and a significant number of virtual machines were encrypted and became unavailable. As a result, the systems of all of our web services, including Niconico, were shut down.
This cyber attack by a third party was repeated even after it was discovered, and even after a server in the private cloud was shut down remotely, the third party was observed to be remotely starting the server and spreading the infection. Therefore, the power cables and communication cables of the servers were physically disconnected and blocked. As a result, all servers installed in the data centers provided by the group companies became unusable. In addition, to prevent further spread of infection, our employees are prohibited from coming to the Kabukiza office in principle, and our internal network and internal business systems have also been shut down.
The Niconico Video system, posted video data, and video distribution system were operated on the public cloud, so they were not affected. Niconico Live Broadcasting did not suffer any damage as the system itself was run on a public cloud, but the system that controls Niconico Live Broadcasting's video distribution is run on a private cloud of a group company, so it is possible that past time-shifted footage, etc. may not be available. We are also gradually checking the status of systems other than Niconico Douga and Niconico Live Broadcasting.
■ Services currently suspended
Niconico Family services such as Niconico Video, Niconico Live Broadcast, and Niconico Channel
Niconico account login on external services
Music monetization services
Dwango Ticket
Some functions of Dwango JP Store
N Preparatory School *Restored for students of N High School and S High School
Sending gifts for various projects
■ About Niconico-related programs
Until the end of July, official Niconico live broadcasts and channel live broadcasts using Niconico Live Broadcast and Niconico Channel will be suspended.
Considering that program production requires a preparation period and that Niconico Live Broadcast and Niconico Channel are monthly subscription services, we have decided to suspend live broadcasts on Niconico Live Broadcast until the end of July. Depending on the program, the broadcast may be postponed or broadcast on other services.
The date of resumption of Niconico services, including Niconico Live Broadcast and Niconico Channel, is currently undecided.
Niconico Channel Plus allows viewing of free content without logging in. Paid content viewing and commenting are not available.
■ About the new version "Nico Nico Douga (Re: Kari)" (read: nikoniko douga rikari)
While "Nico Nico" is suspended, as the first step, we will release a new version of "Nico Nico Douga (Re: Kari)" at 3:00 p.m. on June 14, 2024. Our development team voluntarily created this site in just three days, and it is a video community site with only basic functions such as video viewing and commenting, just like the early days of Niconico (2006). In consideration of the load on the service, only a selected portion of the videos posted on Niconico Video is available for viewing. The lineup is mainly popular videos from 2007, and you can watch them for free without an account.
■About the Niconico Manga app
We have already confirmed that many systems were not affected, and we are considering resuming the service with a reduced-function version that allows basic functions such as reading manga, commenting, and adding to favorites. We aim to restore the service by June 2024.
If any new facts become known in the future, we will report them on Niconico Info, Official X, our company website, etc. as they become available. We appreciate your understanding and cooperation.
Added 6/10]
Thank you for your continued patronage. This is the Niconico management team.
Due to the effects of a large-scale cyber attack, Niconico has been unavailable since the early morning of June 8th.
We sincerely apologize for the inconvenience.
As of 6:00 p.m. on June 10th, we are working to rebuild the entire Niconico system without being affected by the cyber attack, in parallel with an investigation to grasp the full extent of the damage.
We have received many inquiries from you, such as "Will premium membership fees and paid channel membership fees be charged during the service suspension period?" and "What will happen to the time shift deadline for live broadcasts?". We are currently in the process of investigating the impact, so we cannot answer your questions, but we will respond sincerely, so please wait for further information.
Our executive officer Shigetaka Kurita and CTO Keiichi Suzuki are scheduled to explain the expected time until recovery and the information learned from the investigation up to that point this week.
We will inform you again about this as soon as we are ready.
■ Services currently suspended
Niconico Family Services such as Niconico Video, Niconico Live Broadcast, Niconico Channel, etc.
Niconico Account Login on External Services
[Added 2024/06/10 18:00]
Gifts for various projects (due to the suspension of related systems)
■ Programs scheduled to be canceled/postponed (as of June 10)
Programs from June 10 to June 16
■ Current situation
In parallel with the recovery work, we are investigating the route of the attack and the possibility of information leakage.
No credit card information has been leaked (Niconico does not store credit card information on its own servers).
The official program "Monthly Niconico Info" scheduled for June 11 at 20:00 will be broadcast on YouTube and X at a reduced scale. During this program, we will verbally explain the current situation in an easy-to-understand manner. (※There is no prospect of providing additional information, such as detailed recovery dates, during this program.)
"Monthly Niconico Info" can be viewed at the following URL. YouTube → https://www.youtube.com/@niconico_news X (formerly Twitter) → https://x.com/nico_nico_info
The latest information will be posted on Niconico Info and the official X (formerly Twitter).
We deeply apologize for the inconvenience caused to users and content providers who regularly enjoy our videos and live broadcasts. We ask for your understanding and cooperation until the issue is resolved.
Published on 6/8]
Thank you for your continued patronage. This is the Niconico management team.
Currently, Niconico is under a large-scale cyber attack, and in order to minimize the impact, we have temporarily suspended our services.
We are accelerating our investigation and taking measures, but we cannot begin recovery until we are confident that we have completely eliminated the effects of the cyber attack and our safety has been confirmed. We do not expect to be able to restore services at least this weekend.
We sincerely apologize for the inconvenience.
We will inform you of the latest situation again on Monday (June 10, 2024).
■ Suspended services
Niconico family services such as Niconico Video, Niconico Live Broadcast, and Niconico Channel
Niconico account login on external services
■ Current situation
In parallel with the recovery work, we are investigating the route of the attack and the possibility of information leakage.
No credit card information has been confirmed to have been leaked (Niconico does not store credit card information on its own servers).
Future information will be announced on Niconico Info and Official X (formerly Twitter) as it becomes available.
We deeply apologize to all users who were looking forward to the video posts and live broadcasts scheduled for this weekend. We ask for your understanding and cooperation until the response is complete.
#news#internet#translation#nico nico douga#cyber attack#cyber security#hatsune miku#niconico#japan#please spread#please reblog this
101 notes
·
View notes