Wednesday, February 16

Russia Ready to FIRE

Provided by Global News...


A senior Russian military official said on Monday that Russia was ready to open fire on foreign ships and submarines that illegally enter its territorial waters, the Interfax news agency reported.

Any such decision would, however, be taken only at the “highest level,”, Stanislav Gadzhimagomedov, deputy head of the main operational department of the General Staff, was quoted as saying.

The comment came two days after Moscow said a Russian naval vessel had chased away a U.S. submarine in Russian waters in the Pacific. The United States denied it had carried out military operations in Russian territorial waters.

Tensions between the two countries are running high, with Washington warning that Russia could attack Ukraine at any time. Moscow denies any such intention, despite massing more than 100,000 troops near Ukraine’s borders, and has accused Western governments of hysteria.

Flashy


 

Tuesday, February 15

Dancing Males


Mainstream Media FAILS the test...


The mainstream media is getting a wake-up call after new allegations in the Durham investigation that President Trump and his campaign were being spied on.

Special Counsel John Durham (above left) released in a filing Saturday that the Hillary Clinton (above right) campaign hired techs to "infiltrate" Trump Tower and White House servers to establish a "narrative" to link Trump to Russia. The new findings contradict various doubtful media coverage from programs like CBS’ "60 Minutes."

In an October 2020 interview, Trump appeared on the newsmagazine to address the ongoing investigation and his claim his campaign was spied on. He was shot down by host Lesley Stahl, who insisted the president was spreading unverified information.

"There’s no real evidence," she said. "This is ’60 Minutes.’ We can’t put on things we can’t verify."

CLINTON CAMPAIGN PAID TO ‘INFILTRATE’ TRUMP TOWER, WHITE HOUSE SERVERS TO LINK TRUMP TO RUSSIA: DURHAM

Meanwhile, former CNN dynamic duo Don Lemon and Chris Cuomo criticized John Durham and the Trump administration back in December 2019 for being adamant about uncovering the truth, yet coming up short.

"Nothing happens and they just move on to the next conspiracy theory," Lemon said to Cuomo during a handover. "It is never going to end and guess what? People who want to believe that BS are going to believe it."

In an October 2021 episode of MSNBC's "The Rachel Maddow Show," host Rachel Maddow suggested the intention behind efforts to probe the investigation was always to re-route the investigation away from Trump himself.
   READ MORE...

Galloping Horse


 

North Korea Cyberattacks Working


North Korea’s cyberattacks became famous in 2014, when Pyongyang’s hackers targeted Sony Pictures, seemingly in retaliation for a satirical movie about North Korean leader Kim Jong Un. But the reclusive regime’s greatly improved cybercapabilities are not a joke. They’re a serious threat to the stability of the global economy and critical infrastructure systems.

North Korean hackers have gone on to bigger and more financially profitable targets. Since 2014, North Korean hackers have attacked Bangladesh’s central bank, the U.K. National Health Service, and, more recently, cryptocurrency exchanges. And the odds are that many more major North Korean cyberattacks are to come in the near future.

In internal regime discourse, Pyongyang proudly refers to its cyberoperations as its “all-purpose sword.” According to testimony from a South Korean intelligence chief, Kim reportedly stated: “Cyberwarfare, along with nuclear weapons and missiles, is an ‘all-purpose sword’ that guarantees our military’s capability to strike relentlessly.” Subversive, criminal operations are a style of asymmetric warfare long embraced by the North. 

The country’s founding leader, Kim Il Sung, earned his nationalist credentials by fighting Japanese colonialists in the 1930s. His guerrilla band later became the political elite of the North Korean state. During the Cold War era, Kim regularly deployed guerrillas to subvert and instigate the South Korean government. North Koreas hackers are the 21st-century version of guerrilla fighters, moving in the dark and striking at the most vulnerable points.

Historically, guerrillas often depended on banditry and robbery to survive—and one reason for the recent amping up of cyberattacks is financial worries. While Kim Jong Un’s recent missile tests garner international condemnation and head-shaking in Washington and Seoul, Pyongyang’s cyberoperatives work in the shadows. 

Due to the COVID-19 pandemic, North Korean borders have been sealed shut for the past two years. North Korean trade with China has largely stalled, and many foreign diplomats have left the country, making the already reclusive state even more isolated.  READ MORE...

Listen to the Rain


 

Internet of Behaviors


The Internet of Behaviors (IoB) is an area of research and development (R&D) that seeks to understand how, when and why humans use technology to make purchasing decisions. IoB combines three fields of study: behavioral science, edge analytics and the Internet of Things (IoT).

IoB platforms are designed to gather, aggregate and analyze data generated from a wide variety of sources, including household digital devices, wearable computers and human online activities. The data is then analyzed in terms of behavioral psychology to look for patterns that can be used by marketing and sales teams to influence future consumer behavior.

An important goal of the IoB is to help marketers understand and monetize the massive amount of data produced by network nodes in the Internet of Things.

The Internet of Behaviors is expected to play an important role in e-commerce, health care, customer experience management (CXM) and search engine optimization (SEO).

Potential IoB use cases include:
  • Reducing insurance premiums for drivers whose vehicles consistently report desired brake and acceleration patterns.
  • Analyzing a specific user's grocery purchases in order to personalize menu suggestions.
  • Using location services and buying history to customize a shopper's point-of-sale (PoS) promotions in real-time.
  • Sending an alert when a fitness activity tracker's data indicates the wearer's blood pressure is too high or too low.
TO READ MORE ABOUT IoB, CLICK HERE...

Flashing Colors


 

Monday, February 14

All About Ukraine

 


Ukraine ranks...


1st in Europe in proven recoverable reserves of uranium ores;

2nd place in Europe and 10th place in the world in terms of titanium ore reserves;

2nd place in the world in terms of explored reserves of manganese ores (2.3 billion tons, or 12% of the world's reserves);

2nd largest iron ore reserves in the world (30 billion tons);

 2nd place in Europe in terms of mercury ore reserves;

3rd place in Europe (13th place in the world) in shale gas reserves (22 trillion cubic meters)

4th in the world by the total value of natural resources;

7th place in the world in coal reserves (33.9 billion tons)

Ukraine is an agricultural country:

1st in Europe in terms of arable land area;

3rd place in the world by the area of black soil (25% of world's volume);

1st place in the world in exports of sunflower and sunflower oil;

2nd place in the world in barley production and 4th place in barley exports;

3rd largest producer and 4th largest exporter of corn in the world;

4th largest producer of potatoes in the world;

5th largest rye producer in the world;

5th place in the world in bee production (75,000 tons);

8th place in the world in wheat exports;

9th place in the world in the production of chicken eggs;

16th place in the world in cheese exports.

Ukraine can meet the food needs of 600 million people.

Ukraine is an industrialized country:

1st in Europe in ammonia production;

2-е Europe's and 4th largest natural gas pipeline system in the world (142.5 bln cubic meters of gas throughput capacity in the EU);

3rd largest in Europe and 8th largest in the world in terms of installed capacity of nuclear power plants;

3rd place in Europe and 11th in the world in terms of rail network length (21,700 km);

3rd place in the world (after the U.S. and France) in production of locators and locating equipment;

3rd largest iron exporter in the world

4th largest exporter of turbines for nuclear power plants in the world;

4th world's largest manufacturer of rocket launchers

The Most Valuable Companies in the WORLD


 

Nikki Haley on CHINA


 

Lighted Tree

Master Sergeant & Chef Andre RUSH


Andre Rush is an American celebrity chef and military veteran. Rush worked in the White House as a Chef for four administrations. Rush, a retired Master Sergeant of the US Army, gained attention for his large biceps and muscular physique.

Rush grew up in Columbus, Mississippi.  He played football in the position of running back at Lee High School in Columbus.  He holds a bachelor's degree in Business Management from Trident University International, an associate degree in Hotel Restaurant Management from Central Texas College and an associate degree from Culinary Stafford University.

Rush enlisted as active duty in the US Army in 1993. He has been deployed several times, and has served as a trainer in hand-to-hand combat and food service. In 1997, he began to cook at the White House. He has served the presidential administrations of Bill Clinton, George W. Bush, Barack Obama, and Donald Trump.  He worked at the White House part-time while simultaneously working at The Pentagon.  He was in the gym of the Pentagon when it was hit during the September 11, 2001 attacks, and chose to enlist in combat duties afterwards.

In June 2018, Rush received fame when he was photographed by CNN reporter Kate Bennett preparing a Ramadan meal for a White House dinner.  The photo of him cooking on the White House lawn during the annual White House Iftar dinner circulated on Twitter, and subsequently went viral.  Later that year, Rush signed a deal to produce a television show entitled Chef in the City.  He has since left his job as a White House chef.

In 2020, Rush attended the opening of a Salvation Army in Harrisburg, Pennsylvania, whereupon they gave him a celebration of service award.

Rush was a member of the U.S. Army Culinary Arts Team. In addition to cooking, Rush's other pursuits include ice carving, motivational speaking and life coaching.

Fitness
Rush is known for his physique and large 24 inch biceps that gave him notoriety on social media.  As a high school senior he reportedly could bench press 350 pounds (160 kg) while weighing just 150 pounds (68 kg).  In 2010, he was reported to be able to bench press 605 pounds (274 kg).   Rush states he does 2,222 pushups daily as part of the 22 pushup challenge, with the goal to raise awareness for the roughly 22 veterans who die by suicide every day.

In 2021, Men's Health published an article featuring Rush's daily routine, which included him eating eight meals a day and up to 10,000 calories and only sleeping for 2 hours every night.  Some of his claims were received with skepticism by the professional bodybuilding community.  SOURCE: Wikipedia

To visit the website of Chef Rush, CLICK HERE...

Tiger


 

Edge Computing


Edge computing is a distributed information technology (IT) architecture in which client data is processed at the periphery of the network, as close to the originating source as possible.

Data is the lifeblood of modern business, providing valuable business insight and supporting real-time control over critical business processes and operations. Today's businesses are awash in an ocean of data, and huge amounts of data can be routinely collected from sensors and IoT devices operating in real time from remote locations and inhospitable operating environments almost anywhere in the world.

But this virtual flood of data is also changing the way businesses handle computing. The traditional computing paradigm built on a centralized data center and everyday internet isn't well suited to moving endlessly growing rivers of real-world data. Bandwidth limitations, latency issues and unpredictable network disruptions can all conspire to impair such efforts. Businesses are responding to these data challenges through the use of edge computing architecture.

In simplest terms, edge computing moves some portion of storage and compute resources out of the central data center and closer to the source of the data itself. Rather than transmitting raw data to a central data center for processing and analysis, that work is instead performed where the data is actually generated -- whether that's a retail store, a factory floor, a sprawling utility or across a smart city. Only the result of that computing work at the edge, such as real-time business insights, equipment maintenance predictions or other actionable answers, is sent back to the main data center for review and other human interactions.

Thus, edge computing is reshaping IT and business computing. Take a comprehensive look at what edge computing is, how it works, the influence of the cloud, edge use cases, tradeoffs and implementation considerations.  READ MORE...

Locked Out


 

Cognitive Computing


The goal of cognitive computing is to simulate human thought processes in a computerized model. Using self-learning algorithms that use data mining, pattern recognition and natural language processing, the computer can mimic the way the human brain works.

While computers have been faster at calculations and processing than humans for decades, they haven’t been able to accomplish tasks that humans take for granted as simple, like understanding natural language, or recognizing unique objects in an image.


Some people say that cognitive computing represents the third era of computing: we went from computers that could tabulate sums (1900s) to programmable systems (1950s), and now to cognitive systems.

These cognitive systems, most notably IBM ’s Watson, rely on deep learning algorithms and neural networks to process information by comparing it to a teaching set of data. The more data the system is exposed to, the more it learns, and the more accurate it becomes over time, and the neural network is a complex “tree” of decisions the computer can make to arrive at an answer.

What can cognitive computing do?

For example, according to this TED Talk video from IBM, Watson could eventually be applied in a healthcare setting to help collate the span of knowledge around a condition, including patient history, journal articles, best practices, diagnostic tools, etc., analyze that vast quantity of information, and provide a recommendation.  READ MORE.

Daffy Duck