22221
Autopsy: Raleigh woman slashed, stabbed 123 times :: WRAL.com
A medical examiner counted 24 stab wounds and 20 cuts to her head and neck, 13 stab wounds and 11 cuts to her torso, 16 cuts and one stab wound on her right arm and 35 cuts and three stab wounds to her left arm.

Attorney Karl Kundsen said the 123 wounds would likely rule out an accident but, for the defense team, the number of wounds could also suggest something else.

"It is, in fact, indicative of somebody who may be detached from reality or having a psychotic state because they're doing it far, far in excess of what would be necessary," he said.
murder  mentalhealth 
15 hours ago
Woman dies after getting infection from dog lick :: WRAL.com
Doctors told Dan that Sharon tested positive for capnocytophaga. The bacteria, found in the saliva of most dogs, cats and even some human is rarely problematic and almost never deadly.

Doctors say when some people come in contact with it, it can have devastating consequences.

This isn't the first case of an infection from dog saliva this year in Wisconsin. Another man lost his hands and legs in an effort for doctors to save his life.

Dr. Silvia Munoz-Price, an epidemiologist with Froedtert & the Medical College of Wisconsin, said animal lovers have no need to panic.

"It's extremely rare. Do not get rid of your pets. Continue behaving the same way that you have behaved with your pets up until now," Munoz-Price said.
medical  dog 
15 hours ago
Blue light from phones, tablets could accelerate blindness: study
The study found blue light triggers "toxic" reactions in retinal, molecules that sense light and signal the brain. The retinal used by photoreceptors in our eyes is what allows people to see.

Results showed blue light helps generate poisonous chemical reactions killing photoreceptors, which cannot be restored once they die off.

This leads to macular degeneration, an incurable eye disease that causes blindness starting in your 50s or 60s, researchers said. 
vision  health  medical  smartphone 
15 hours ago
Microsoft’s undersea data center now has a webcam with fish swimming past 27.6 petabytes of data - The Verge
Microsoft has taken the oppor-tuna-ty to install a webcam next to its undersea data center, offering live views of just how well the metal container is rusting and the hundreds of fish suddenly interested in cloud data and artificial intelligence. The software maker originally sunk a data center off the Scottish coast in June to determine whether the company can save energy by cooling it in the sea itself, or if it should leave it to salmon else.
microsoft  cybersecurity  globalwarming  datacenter  webcam 
4 days ago
The network device must detect unauthorized changes to software and information.
Verify integrity verification tools to detect unauthorized changes to software and firmware are used to monitor the network device application.
networking  ndi  cybersecurity  stig 
5 days ago
Cisco and Ansible
mbrace the DevOps model to accelerate application deployment and achieve higher efficiency in operating their data centers, the infrastructure needs to change and respond faster than ever to business needs. These changes can help you achieve an agile operational model by improving on automation, innovation, and consistency.
cisco  ansible  networking  cybersecurity  automation 
5 days ago
Hackers Infect Over 200,000 MikroTik Routers With Crypto Mining Malware
three massive malware campaigns exploiting hundreds of thousands of unpatched MikroTik routers to secretly install cryptocurrency miners on computers connected to them
cybersecurity  router  mikrotik 
5 days ago
CCleaner Adds Data Collection Feature With No Way to Opt-Out
Last year, CCleaner made headlines when it suffered a massive supply-chain malware attack of all times, wherein hackers compromised its servers for over a month and replaced the original version of the software with the malicious one, infecting over 2.3 million users worldwide.
supplychain  scrm  software  cybersecurity  ccleaner  malware 
5 days ago
How to Hack WiFi Password Easily Using New Attack On WPA/WPA2
developer of the popular password-cracking tool Hashcat, Jens 'Atom' Steube, the new WiFi hack works explicitly against WPA/WPA2 wireless network protocols with Pairwise Master Key Identifier (PMKID)-based roaming features enabled.

it is performed on the RSN IE (Robust Security Network Information Element) using a single EAPOL (Extensible Authentication Protocol over LAN) frame after requesting it from the access point
The attack to compromise the WPA/WPA2 enabled WiFi networks was accidentally discovered by Steube while he was analyzing the newly-launched WPA3 security standard
wpa2  cybersecurity  wifi  crypto  exploit 
5 days ago
Reddit Hacked – Emails, Passwords, Private Messages Stolen
Reddit social media network today announced that it suffered a security breach in June that exposed some of its users' data, including their current email addresses and an old 2007 database backup containing usernames and hashed passwords

June 19 and said that the attacker compromised a few of the Reddit employees' accounts with its cloud and source code hosting providers between June 14 and June 18.
The hack was accomplished by intercepting SMS messages that were meant to reach Reddit employees with one-time passcodes, eventually circumventing the two-factor authentication (2FA) Reddit had in place attacks.
reddit  databreach  exfil  cybersecurity 
5 days ago
STIG - Other Network Devices
SDN Controller SRG Version 1
8/3/2018 410 KB ZIP
SDN Controller SRG Version 1 Release Memo
8/3/2018 80 KB PDF
stig  cybersecurity  networking  router  sdn 
5 days ago
Server Infrastructure Security Management, Monitoring & Protection | HPE
The world’s most secure industry standard servers4
With the HPE Secure Compute Lifecycle, you have a new security foundation to protect against malicious threats that target server firmware, resulting in denial of service and data loss.
cybersecurity  scrm  supplychain 
5 days ago
Threat Hunting: 10 Adversary Behaviors to Hunt For | Sqrrl
As a reminder, Sqrrl has developed a hunting methodology called the Threat Hunting Loop. The hunting loop has four steps:
1) create hypotheses
2) investigate via tools and techniques
3) uncover new patterns and ttps
4) inform and enrich analytics

These behaviors are generally aligned to Lockheed’s Cyber Kill Chain and the MITRE Attack Matrix. One way to determine which behaviors to hunt for is to develop a Hunting Heat Map that identifies where you have detection gaps. Below are 10 behaviors that you might consider prioritizing for hunts depending on your current detection capabilities.
threathunting  cybersecurity  sqrrl 
7 days ago
Cyber Threat Hunting (1): Intro
After some long months debating whether to write a white paper, and what potential topics I could write about – I just decided that I do not have enough time to go through the process of writing a research paper for the next 6 to 12 months. Instead, I am taking some of my research and current experience and I am sharing it with you. I will be brief and to the point – it is not my intention to spend much time in the bushes. I want to provide you with a solid foundation to start hunting an understanding the “creativity” behind the process.
cybersecurity  threathunting 
7 days ago
Cyber Threat Hunting (2): Getting Ready
In my previous post I went through the basics of hunting and its benefits for the organization and for analysts. To continue the journey, today I am going to cover the preparations you need to do before you go out there and hunt. We are covering preparations and locations to hunt.
cybersecurity  threathunting 
7 days ago
Cyber Threat Hunting (3): Hunting in the perimeter
In this third post we are going to see what we need to look at when hunting and detecting adversaries in the perimeter. We are also going to look at some of the firewall technologies and their log formats in order to detect anomalies in the inbound and outbound traffic in your network.
cybersecurity  threathunting 
7 days ago
The applicability of Graphs for Information Security combatants – Medium
“ The relations between entities are often more interesting that the individual entities themselves in the context of modern Information Security ”
“ Maliciousness is often determined by something that is not normal in the given context ”
“ The creativity, ingenuity and brain power of the humans involved in Information Security matters more than the individual tools you buy from Infosec vendors”
threathunting  cybersecurity  graphs  dfir 
7 days ago
STRATCOM Chief Will 'Die Trying or Kill Somebody' to Get New Helo | Military.com
The process was soon tied up in a pre-award protest, however, when Sikorsky, a subsidiary of Lockheed Martin Corp., filed a pre-emptive opposition in February involving technical data rights, which it would have to turn over to the Defense Department if the company's helicopter, the HH-60U, won the competition, according to a Defense News report. The Government Accountability Office dismissed Lockheed's suit in May.
stratcom  sirkorsky  helicopter 
9 days ago
This Italian Town Once Welcomed Migrants. Now, It’s a Symbol for Right-Wing Politics - The New York Times
The March 4 elections swept in a new populist government which is deeply skeptical of the European Union and has already slammed the door to new migrants while threatening to expel the ones already in the country. To some in Brussels, Italy is now Europe’s greatest existential threat.

Mr. Salvini’s nationalist party, the League, has increased its support in Macerata from 0.6 percent in 2013 to 21 percent in March.

Macerata was not always that way.

It had a reputation for tolerance and, in 2013, won national recognition for its integration efforts. The former bishop once boasted about the “welcoming spirit” encoded “in the DNA of the city.”

On a drive outside the city, she indicated a housing project that she said had become a hub for drug dealers. Police helicopters whirled overhead as she pointed out a small house where women used to buy eggs and where addicts now bought drugs — the police had found human remains nearby.

For her and for others who share her extremist views, this was proof of the migrants’ noxious influence on her country and her city.

The Italian government adopted a humanitarian policy to rescue migrants at sea, while the country’s center-left prime minister, Matteo Renzi, promised to lead Italy into what he saw as modernity.

But roughly 620,000 migrants, many of them Africans, have arrived in Italy since the migration crisis began in 2014. They resided in government centers and local parishes, but many also loitered at train stations or outside supermarkets and bars.
europe  italy  immigration  fascism 
9 days ago
Google Will Not Renew Pentagon Contract That Upset Employees - The New York Times
Google’s work with the Defense Department on the Maven program, which uses artificial intelligence to interpret video images and could be used to improve the targeting of drone strikes, roiled the internet giant’s work force. Many of the company’s top A.I. researchers, in particular, worried that the contract was the first step toward using the nascent technology in advanced weapons.
ai  google  dod 
9 days ago
Alert Level Information - Center for Internet Security
The Alert Level is determined using the following threat severity formula:
Severity = (Criticality + Lethality) - (System Countermeasures + Network Countermeasures)

Lethality: How likely is it that the attack will do damage?
(Value = Potential Damage)
Criticality: What is the target of the attack?
(Value = Target)
System Countermeasures: What host-based preventive measures are in place?
(Value = Countermeasure)
Network Countermeasures: What network-based preventive measures are in place?
(Value = Countermeasure)
cybersecurity  alerts  risk 
9 days ago
Why You're Doing Cybersecurity Risk Measurement Wrong
1. Gather threat intelligence and data about the behavior of your users.
2. Do not reveal to miscreants how they were detected if you can help it.
3. Be deliberate in how you publicize risk mitigations in your organization
4. Be deliberate in how you share information externally.
5. Don’t spread FUD.
cybersecurity  riskmanagement  lockheed 
10 days ago
Yale Discloses Data Breach (in 2018 that took place in 2008)
According to Yale, sometime between April 2008 and January 2009 someone gained access to a database and exfiltrated information. The database was purged of personally identifiable information in 2011, but it wasn't until June 2018 that the university discovered a breach had taken place.
databreach  cybersecurity  yale 
10 days ago
Grieving Mother Orca Carries Dead Calf For More Than A Week, Over Hundreds Of Miles : NPR
The calf was the first to be born in the endangered pod of killer whales in three years, says Jenny Atkinson, executive director of The Whale Museum on San Juan Island. The plight of the mother orca highlights the latest setback for the declining killer whale population off the coast of the San Juan Islands in Washington state. Their numbers have shrunk from 98 in 1995 to 75 today.
orca  whale  seattle  environment  endangeredspecies  salmon  grief 
10 days ago
Portlander Colin O’Brady Just Set Another Speed Record | Portland Monthly
Colin O’Brady, former Olympic triathlete and son of New Seasons co-founder Eileen Brady, has already climbed the tallest peak on every continent in what’s known as the Explorer’s Grand Slam. He beat the world speed record while doing it, too, completing the challenge in 139 days. On July 19, the Portland native broke yet another speed record closer to home: early on Thursday morning, as he reached the top of Mt. Hood, he became the fastest person to summit the highest peak in each of America’s 50 states.
climbing  mountaineering 
10 days ago
Vashon tries to keep it real despite an influx of people and money | The Seattle Times
Bill Foege, widely credited with ridding the world of small pox, lives on Vashon. Joe Yarkin installs solar panels in Antarctica when not tending his organic farm. Tammy Brockway Joyce, a refugee from Boeing and Microsoft, runs a distillery and hosts memorable karaoke sessions.
vashon  vashonisland  travel  seattle 
10 days ago
Free waterfront shuttle service will run until October - Curbed Seattle
While the shuttle is branded as an option for tourists traveling by car to downtown to make parking easier, it also provides a west-of-Third transportation option that doesn’t currently exist—and is designed to connect to light rail and Amtrak for non-drivers. From 1982 to 2005, a trolley ran along the waterfront, but it was postponed and eventually abandoned due to waterfront tunnel construction. The shuttle bus meant to replace it, Metro route 99, was axed this past March (after a redundant reroute to Third Avenue where most other buses that carry passengers through downtown run).
seattle  waterfront  transit  trolley 
10 days ago
Nikkor SW 90mm or Grandagon 90mm?
It could take a whole photographic carrier to be able to differentiate between the two lenses

between the Fuji f8, Nikon f8, Rodenstock 6.8, or Schneider f8. Sadly, only the Rodenstock remains in current production.

f4.5 Nikkor and to a certain extent the Grandagon are notably heavier than the f8 versions. Since I carry my lenses in the field, my personal favorites were the lighter-weight Nikkor and Schneider f8's. I personally have settled on the Schneider SA, but only because its color/tone more closely matches my other (mostly Schneider) lenses than the Nikkor did.
nikkor90mm  largeformat  lenses 
11 days ago
Nikon Nikkor SW 90mm f/8 vs. 90mm f/4.5?
Equal image circle, maybe same sharpness. $400-600
Equal sharpness to Grandagon?

f4.5 =
- 82mm filters and heavier
+ easier to focus (shallow dof, brighter)
+ more even illumination?
+ condition: majority of SW 90mm f/4.5's were purchased by studio or location professionals who used them more or less daily

f8 =
+ 67mm filters and lighter
+ 8 lens elements, more corrected
+ more impressive results
+ 1/4 samples was very sharp! others only sharp as sharpest f4.5
- condition: most Nikon SW 90mm f/8's were bought by non-professional hiking landscape photographers shooting relatively occasionally for fun
+ http://www.hevanet.com/cperez/testing.html In fact the Nikkor 90/8 is the best 90mm for 4x5 from any manufacturer. BUT - no Rodenstocks, Fujis, f/5.6 SAs, or f/4.5 Nikkors

HAD BOTH - SOLD BOTH: I sold both Nikkors because I found them a bit more contrastier than " I like", (I shot mainly chromes), and kept Grandagon 90/4,5 because it fits my personal taste better. I also kept the SK SA XL 90/5,6 just because It allows for more shift capabilities when I shot 5x7.

side notes:
150mm f5.6 Sironar-S. It is the sharpest lens I have ever used on a 4x5
V700 scanner - not suggesting to downsample instead of sharpening, just scanning at 6400 to get the most out of the scanner. I get the best results from scanning at 4800-6400, downsampling to 2400 and then applying proper sharpening. Scanning at 2400 and sharpening does not give as good results in my experience.
nikkor90mm  largeformat  lens  reference  v700  scanning  advice 
11 days ago
Kenneth Lee Gallery - A Few Favorite Large Format Lenses
Fujinon A series of lenses represents an innovative compromise in lens design... closer distances, smaller filters

Fujinon 240 A weighs only 245 grams and takes 52mm filters, yet it has a 336 mm circle of coverage: enough to function as a portrait lens on 4x5, a normal lens for 5x7, a wide-angle for 8x10 and an excellent close-up lens for all 3. This lens is so small, it's a delight to carry into the field and is ideal for portraits in 4x5

Fujinon 450C is a compact lens with long reach and tremendous coverage. Mounted in a Copal #1 shutter, it weighs only 270 grams, takes 52 mm filters, yet covers 486 mm, enough for the 11x14 format. It makes a nice portrait lens for 8x10, a long lens for 5x7 and it's a very long lens for 4x5, but it's smaller and lighter than most lenses. The 300C is another in the same family: C stands for Compact !
largeformat  lenses  reference  macro  portrait  process 
11 days ago
Choosing a 4x5 Camera and Lenses — Alex Burke Photography
75mm on 4x5 ~ 23mm equivalent
90mm on 4x5 ~ 28mm equivalent
135mm on 4x5 ~ 45mm equivalent
210mm on 4x5 ~ 70mm equivalent
300mm on 4x5 ~ 100mm equivalent
4x5  largeformat  advice  reference  alexburke 
11 days ago
Converting a Polaroid 110A Camera to Large Format
I spend my days supporting a global IT server estate and, whenever I can, shoot a mix of analogue and digital photography.” says Steve. “I’m always on the lookout for the next project and am currently designing a bolt-on 4×5 conversion for Polaroid Land Cameras.”
filmphotography  camera  4x5  polaroid 
11 days ago
The Philosophy of ATT&CK | The MITRE Corporation
ATT&CK was developed with a driving use case in mind—better detection of post-compromise cyber adversary behavior..

Scaling that down and focusing in on empirically documented threat activity happening in the wild is a useful way to prioritize what to tackle first, and that serves as the core influence driving the types of information within ATT&CK.
mitre  attack  cybersecurity  threathunting  philosophy 
11 days ago
How Microsoft Advanced Threat Analytics detects golden ticket attacks – Enterprise Mobility + Security
Mimikatz’s DCSync and Impacket’s secretsdump are two tools that an adversary may use to “replicate” the Kerberos encryption “master key” (also known as a KRBTGT account) from a domain controller. Microsoft ATA detects the use of these tools and tactics.

ATA learns normal replication and ticket usage patterns to automatically detect and alert if an attacker steals the “master key”. More importantly, Microsoft ATA will alert you when an adversary begins using a golden ticket on your network.
goldenticket  kerberos  microsoft  threathunting  cybersecurity 
11 days ago
The Peculiar Math That Could Underlie the Laws of Nature | WIRED
Proof surfaced in 1898 that the reals, complex numbers, quaternions and octonions are the only kinds of numbers that can be added, subtracted, multiplied and divided. The first three of these “division algebras” would soon lay the mathematical foundation for 20th-century physics, with real numbers appearing ubiquitously, complex numbers providing the math of quantum mechanics, and quaternions underlying Albert Einstein’s special theory of relativity. This has led many researchers to wonder about the last and least-understood division algebra. Might the octonions hold secrets of the universe?

Günaydin had continued to study the octonions since the ’70s by way of their deep connections to string theory, M-theory and supergravity—related theories that attempt to unify gravity with the other fundamental forces.

Furey uses the product of the four division algebras, ℝ⊗ℂ⊗ℍ⊗𝕆 (ℝ for reals, ℂ for complex numbers, ℍ for quaternions and 𝕆 for octonions)—sometimes called the Dixon algebra, after Geoffrey Dixon,
math  physics  wired  relativity  einstein 
11 days ago
US warns of supply chain cyber-attacks - BBC News
"Software supply chain infiltration is one of the key threats that corporations need to pay attention to, particularly how software vulnerabilities are exploited," William Evanina, the NCSC's director and the US's top counter-intelligence official, told the BBC.

"To get around increasingly hardened corporate perimeters, cyber-actors are targeting supply chains.
cybersecurity  scrm  supplychain 
11 days ago
FACT CHECK: Cicero's 'Two Thousand Year Old Warning' About Treason
Although these words are now widely attributed to Cicero, in fact they originated in the 20th century, with novelist Taylor Caldwell’s 1965 book A Pillar of Iron. Even though that work often drew directly from the recorded speeches and letters of Cicero for its dialogue, it was nonetheless a work of fiction, and the warning from Cicero about “treason from within” was an invention of Caldwell’s and not a reproduction of Cicero’s own words.
rome  history  cicero  snopes  treason  trump 
12 days ago
Angus Parker Photography | How to avoid Fix Exhaustion
simple rule of thumb is that 1 roll of 35mm with 36 exposures, has roughly the same surface areas as 1 roll of 120mm Medium Format film, which has roughly the same surface areas as 1 sheet of 8x10 sheet film. 4x5 sheet film is a 1/4 of a sheet of 8x10,
angusparker  filmphotography  fixer  reference 
13 days ago
Angus Parker Photography | Book Review: Un-American: The Incarceration of Japanese Americans During World War II
An interesting side story is how U.S. Census data was used to round up Japanese Americans. Although the Census Bureau was barred by law from providing specific information that could be linked to an individual, this protection was temporarily repealed under The Second War Powers Act of 1942. As Scientific American reported in 2007: "Despite decades of denials, government records confirm that the U.S. Census Bureau provided the U.S. Secret Service with names and addresses of Japanese-Americans during World War II." Might history be repeated with talk of a registry of Muslim Americans? I found it chilling to read one particular passage of the book which I will quote in full:

"You are kidding yourself if you think the same thing won't happen again," Supreme Court Justice Antonin Scalia told a group of law students in 2014. He warned that camps similar to those opened in World War II might be built again. The government was wrong to force US Citizens into detention centers based on only suspicion, Scalia said, but he pointed to Roman philosopher Cicero, who cautioned: "In times of war, the laws fall silent."
wwii  filmphotography  history  anseladams  japanese 
13 days ago
Angus Parker Photography | My film choices
Fuji Velvia 100 - Data sheet - I would say Velvia 50 for 8x10 but at the moment its getting very hard to buy and only from Japan. Clearly Fuji is pushing Velvia 100 as the alternative. Not quite as saturated but still an excellent performer for landscapes.
anguspaker  filmphotography  film  velvia 
13 days ago
Whats in My Bag: 6x17 Panoramic Camera - YouTube
renaissance photo tech (rpt) backpack
Shen Hao TFC 617-A panoramic camera
Schneider Super-Angulon XL 72mm f5.6 = ultra wide, like 20mm?
Nikon Nikkor-SW 90mm f/4.5 = fairly wide, bright. Awesome for 6x17. Takes 82mm filter thread, very sharp too
Lee Filters 100mm Filter Holder
Light-falloff on both wide angle 72 and 90mm lenses
Center-ND filter for 90mm ($$$$?)
panorama  nickcarver  6x17  rpt  filmphotography  largeformat 
13 days ago
Angus Parker Photography | Review of Shen Hao PTB 617
4x5 view camera with 6x17 back vs. Shen Hao PTB 617

Pros (versus PTB 617)

Cheaper (if you already have a 4x5!) - approx $500
Not another camera to own
Less overall weight than two cameras, but heavier than just carrying the PTB 617


Cons (versus PTB 617)

Pain to mount ground glass, focus, unmount, and then mount roll film back
Vignetting at longer focal lengths (around 180mm or more)
May have issues focusing very short focal lengths due to bellows compression
Heavy unit that sticks out back of 4x5 - not very stable on light field cameras


Summary: Best option when you are on a budget, already own a sturdy 4x5 view camera and where you only want to shoot 6 x 17 occasionally and only with 90-180mm focal lengths.
6x17  filmphotography  panorama  review  camera  shenhao  angusparker  nickcarver  largeformat 
13 days ago
Angus Parker Photography | Kodak Ektascan B/RA film review
X-ray film that deals with the other two issues rather well. It's called Caresteam / Kodak Ektascan B/RA and "is a medium speed, single coated, tabular grain, orthochromatic medical x-ray film for photography of cathode-ray (CRT) tubes. It is coated on a blue, 7-mil blue-tinted polyester support with a dyed pelloid backing which affords anti-halation protection. The film orientation is that the emulsion side is up when the notch is at the right-hand side of the top edge of the film." So in translation, its thick and hardy and only has one side of emulsion! This film is quite easy to find in 8x10" at about 80¢ a sheet in a 100 sheet pack. 14x17" is another matter and at the moment its only found in 500 sheet units (five 100 sheet boxes in a pack) at Z&Z Medical. Cost is $920.00 a box or $1.84 a sheet. Ask them to wrap it in bubble wrap and put it in an additional box to protect the product as its heavy and easy to damage. Also since there are always people looking to try out cheaper films for their ULF cameras you will probably find others happy to take several of the 100 sheet boxes off you for cost and shipping - about $200/box. That just what I did on the Large Format Photography Forum.
xray  filmphotography  advice  shopping  ulf  largeformat  angusparker 
13 days ago
TREEANDB.COM
Professional carpenters built the treehouse, which we refer to as Halina's Triahouse in honor of two of my daughters Halina and Tria. It is a stud wood frame structure. It is insulated and has a metal roof, which has a 20 year fade guarantee. This treehouse is built to last.

Luke Lukoskie
16254 Westside Hwy SW
Vashon Island, WA 98070
206.953.7656
luke@treeandb.com
treehouse  seattle  vashonisland 
13 days ago
CloudGoat: The ‘Vulnerable-by-Design’ AWS Environment - Rhino Security Labs
CloudGoat is used to deploy (and shutdown) a vulnerable set of vulnerable AWS resources, designed to teach AWS security risks.  We ensure that all vulnerabilities we include are only exploitable by someone with access to the given AWS account. This includes white listing access to sensitive resources to a personal IP address you supply where possible.
aws  cybersecurity  pentest 
13 days ago
Inside Google’s Shadow Workforce - Bloomberg
Google’s Alphabet Inc. employs hordes of these red-badged contract workers in addition to its full-fledged staff. They serve meals and clean offices. They write code, handle sales calls, recruit staff, screen YouTube videos, test self-driving cars and even manage entire teams – a sea of skilled laborers that fuel the $795 billion company but reap few of the benefits and opportunities available to direct employees. Earlier this year, those contractors outnumbered direct employees for the first time in the company’s twenty-year history, according to a person who viewed the numbers on an internal company database. It's unclear if that is still the case. Alphabet reported 89,058 direct employees at the end of the second quarter. The company declined to comment on the number of contract workers.
google  employment  economics 
14 days ago
« earlier      
abortion adventure advertising advice apple architecture art article audio automobile awesome backup baltimore beauty blackandwhite blog book books business california camera camping canon catholic chasejarvis climbing code collab compsci copyright crypto culture cybersecurity darkroom dc death design development diy dod download eats editorial edu education election08 email europe events exercise facebook fashion film filmphotography firefox flash flickr food forensics foss free friends fuji gallery gear german germany google gps guns hack hacking hacks hawaii health hiking history home hotel howto humor inspiration international internet interview iphone iran iraq italy java landscape language laptop largeformat law legal lens life lighting lightroom linux magazine map maps maryland md military mobile model money monterey motorcycle movie mp3 music nature networking news norway npr nude nyc obama omaha outdoors panorama pdf people perl petapixel philosophy photo photographer photography photos photoshop php plugin polaroid politics portfolio portrait postprocessing printing privacy productivity programming psychology quote quotes radio realestate ref reference relationships religion rental research review ronpaul running sailing science search seattle security server service shopping society software strobist studio stuttgart switzerland tech techsupport threathunting tips todo tools toread trance travel tutorial tv video vimeo visualization volunteer war web web2.0 website wedding wifi windows windoze wireless women wordpress youtube

Copy this bookmark:



description:


tags: