70
70
May 18, 2018
05/18
by
CSPAN3
tv
eye 70
favorite 0
quote 0
much more so in quantum computing than in traditional computing. if this were furniture construction, what we have right now is piles of wood, screws and nails. an expert needs to figure out how to use those to create useful furniture. instead, what we want in the future is for nonexperts to be able to go to quantum ikea, get a prefabd kit and easily modify it for their application. this exists for classical computing, but not for quantum computing. another gap is between software and hardware. current algorithms are written for perfect hardware, but hardware on the horizon is very error-prone. we're on a journey, but we're not there yet. it's like if you met liiculousl planned to prepare a gourmet feel for ten but when you arrived there were only supplies for six. you would need to adjust your plans. current and quantum computers on the horizon can only sustain computation for a limited time and they're small. some modifications can be automated. however, for more advanced modifications, the plan needs to be rethought. thus, some of the specific h
much more so in quantum computing than in traditional computing. if this were furniture construction, what we have right now is piles of wood, screws and nails. an expert needs to figure out how to use those to create useful furniture. instead, what we want in the future is for nonexperts to be able to go to quantum ikea, get a prefabd kit and easily modify it for their application. this exists for classical computing, but not for quantum computing. another gap is between software and hardware....
57
57
May 19, 2018
05/18
by
CSPAN2
tv
eye 57
favorite 0
quote 0
although quantum computer holds a potential to solve non- computable problems there are skeptics who question whether it will be possible to ever develop such technology. we look forward to our witnesses giving us their thoughts on this question. on the other hand some fear that such a computer would pose [inaudible] when it comes to encryption and data security some fear that a quantum computer will make it nearly impossible to keep future computers secure and data security and consumer privacy are key concerns of this committee. we also look forward to our witnesses. quantum computers hold tremendous potential to help solve problems involving discovery of new drugs, developing more efficient supply chain and logistics operations searching to find the data in developing artificial intelligence. whichever nation first developed the practical quantum computer we will have a tremendous advantage over its foreign peers. we hope our witnesses will help us examine the state of the race to develop a quantum computer and how the unite states is doing in the race. this is obviously a dense s
although quantum computer holds a potential to solve non- computable problems there are skeptics who question whether it will be possible to ever develop such technology. we look forward to our witnesses giving us their thoughts on this question. on the other hand some fear that such a computer would pose [inaudible] when it comes to encryption and data security some fear that a quantum computer will make it nearly impossible to keep future computers secure and data security and consumer...
63
63
May 25, 2018
05/18
by
CSPAN3
tv
eye 63
favorite 0
quote 0
even with the computers and cloud computing today. for every day americans, problems like how do we optimize our financial portfolio in a 401(k)? the amount of work that's required to do that is already immense. if we want to include more factors and get the most efficiency for a portfolio. >> the scale increases exponentially. a quantum computer can help with that. we take on more complex and difficult problems and solve them in a much shorter time. >> now i am going to be honest. dr. putnam, i don't know what i'm going to say here. i am going to say it and hopefully you understand the question. okay. when you measure a qubit, it changes its value to a solid one or zero. as i understand it, which i don't, to manipulate a quantum computer, the operator needs to make measurements without a qubit observing you doing so. how do you do that and how does that match the capabilities of classic electronic computers and processors with billions of transistors? >> i feel like i should have one of the computer experts answer. this is something
even with the computers and cloud computing today. for every day americans, problems like how do we optimize our financial portfolio in a 401(k)? the amount of work that's required to do that is already immense. if we want to include more factors and get the most efficiency for a portfolio. >> the scale increases exponentially. a quantum computer can help with that. we take on more complex and difficult problems and solve them in a much shorter time. >> now i am going to be honest....
60
60
May 3, 2018
05/18
by
BBCNEWS
tv
eye 60
favorite 0
quote 0
every single one of these is a home computer. that's all it is. that is a desktop computer.nd there are thousands of them. these computers are working flat out. without a cooling system their processors would overheat in a matter of minutes. in the main area i would say the air temperature is about 20 degrees or so. but behind the ranks of computers it is much colder, probably about five. and that's not because you have expensive air chillers. remember we're in a cold climate. so all we have are holes in the external wall. the air comes in, all the dust and humidity is caught by these filters and then itjust washes over the computers and out through the giant fans in the room. so what is it that these computers are doing that warrants all this noise, this heat, and this power? well, they are creating — or mining — cryptocurrency. yep, cryptocurrency, the new family of virtual currencies that its enthusiasts say it will replace pounds, euros, and dollars, and all the traditional currencies in the coming years. that claim is, however, still a very live debate, with cryptocurre
every single one of these is a home computer. that's all it is. that is a desktop computer.nd there are thousands of them. these computers are working flat out. without a cooling system their processors would overheat in a matter of minutes. in the main area i would say the air temperature is about 20 degrees or so. but behind the ranks of computers it is much colder, probably about five. and that's not because you have expensive air chillers. remember we're in a cold climate. so all we have...
34
34
May 10, 2018
05/18
by
CSPAN3
tv
eye 34
favorite 0
quote 0
that's i think bad news because from a computer scientist and computer research perspective, attacks that look to effectively deny service, to make things not work, are easier to mount than ones that have a specific goal in mind that they try to induce, and in particular, i think you can compare the quite realistic but fairly involved scenario that alex laid out with one that would simply find any jurisdiction, any precinct, anywhere with a few hundred voters and just return a million votes for one of the candidates. you don't have to be undetected, getting detected, getting found, getting noticed is part of the attack. part of undermining the faith and the correctness of the elections, not just in that precinct, but really everywhere. or you can just keep a jurisdiction from voting. turn off the power. make the street lights not get people to the polling place. the thing about national elections, you can't have regional redo. you either get everybody's votes on election day or you don't. and third, if we're expanding our attacks that we're concerned with beyond just the ones that sh
that's i think bad news because from a computer scientist and computer research perspective, attacks that look to effectively deny service, to make things not work, are easier to mount than ones that have a specific goal in mind that they try to induce, and in particular, i think you can compare the quite realistic but fairly involved scenario that alex laid out with one that would simply find any jurisdiction, any precinct, anywhere with a few hundred voters and just return a million votes for...
23
23
May 5, 2018
05/18
by
CSPAN2
tv
eye 23
favorite 0
quote 0
we'll be talking to computers because the speech recognition of the computer is is going to be as good or better than people. now, think about language, the ability to translate from one longitude another. now, i will admit to some degree this has been on the holy grail for a long time. the notion that computers would say, replace professional enter prepare by e interpreters. it's a wonderful skill. ... it's always hard to know precisely when but if you look at the progress being made in the area, it's not necessarily something i would encourage someone who's 22 to go make their future. when we think about learning, only think about what goes into inspecting machine, at microsoft we have 3500 fire extinguisher on our campus. we used to have somebody who's job, several people who have the job of inspecting the fire extinguishers every month. they can tell whether the pressure had fallen in the fire extinguisher needed to be addressed. everyone of those 3500 fire extinguishers is connected with an internet of things device to the network so whatever the pressure falls below a certain lev
we'll be talking to computers because the speech recognition of the computer is is going to be as good or better than people. now, think about language, the ability to translate from one longitude another. now, i will admit to some degree this has been on the holy grail for a long time. the notion that computers would say, replace professional enter prepare by e interpreters. it's a wonderful skill. ... it's always hard to know precisely when but if you look at the progress being made in the...
79
79
May 26, 2018
05/18
by
BLOOMBERG
tv
eye 79
favorite 0
quote 0
it is a way that computers.w understand your voice, spot of friends face in the photo, or steer a carlos car. the reason why humans are talking about the coming of ai. whether there will be a wonderful thing or a coming end of days thing. many people who made this moment possible. but one figure towers above the rest. i have come to the university of toronto, to see the man they call the godfather of modern artificial intelligence, jeff hinton. because of a back condition, he has not been able to sit down for more than 12 years. would muchtanding, i rather sit down, but i have a difficulty when i sit down. ashlee: at least standing desks are fashionable now. guest: i was standing when they weren't fashionable. [laughter] ashlee if you can't sit in the car or a bus, he walks everywhere. . a lot about al him and his results. he has been trying to get computers to learn as people do. a class that many thought was crazy or hopeless, right up until the moment it revolutionized the field. amazon thinks it is the futur
it is a way that computers.w understand your voice, spot of friends face in the photo, or steer a carlos car. the reason why humans are talking about the coming of ai. whether there will be a wonderful thing or a coming end of days thing. many people who made this moment possible. but one figure towers above the rest. i have come to the university of toronto, to see the man they call the godfather of modern artificial intelligence, jeff hinton. because of a back condition, he has not been able...
52
52
May 7, 2018
05/18
by
MSNBCW
tv
eye 52
favorite 0
quote 0
computer was hacked.p search was planted. the prosecution had no smoking gun. so you're saying he didn't even search for that map? >> that's right. >> somebody else put it on his computer? >> yes. >> an fbi agent testified he saw no evidence of tampering, but the defense said it had experts who did. two of them. both of whom wrote reports. but trials have referees. and in this case, the judge ruled that neither one of those defense experts could testify about tampering. one, said the judge, wasn't sufficiently qualified. the other was brought in too late in the trial. wasn't sufficiently qualified. the other was brought in too late in the trial. but even if they had testified, there was one question they couldn't answer. if there was a hacker, who was it? >> i can tell you that police had access to it. i can tell you that anybody within wireless range had access to it. >> what possible reason would the police have to put that map on his computer? >> i can't say that the police put it on the computer. i do
computer was hacked.p search was planted. the prosecution had no smoking gun. so you're saying he didn't even search for that map? >> that's right. >> somebody else put it on his computer? >> yes. >> an fbi agent testified he saw no evidence of tampering, but the defense said it had experts who did. two of them. both of whom wrote reports. but trials have referees. and in this case, the judge ruled that neither one of those defense experts could testify about tampering....
37
37
tv
eye 37
favorite 0
quote 0
the role of women in computer games according to prevalent stereotypes in the male dominated scene they just walk around in revealing clothing and leaping fight their way to victory the stereotypes are on display at computer game festivals like the dream act convention in leipsic earlier this year it hosted germany's largest blend or local area network party. women made up only a small chunk of the one thousand seven hundred players and they were critical of the reductive depictions in games. i'd say sex sells big breasts big. it's just that's not an accurate depiction of women i can't identify with it at all i think it's nice when you can look at a woman's face and see something relatable like this does it would be nice if women weren't just small roles but main characters who are taken totally seriously and that puts. good. today estimates from the scene indicate that women comprise half of all gamers but they have little influence and are scarcely represented even if. only men do get out of the east tournament for around one hundred eighty thousand euros in prize money. the u.s. mark
the role of women in computer games according to prevalent stereotypes in the male dominated scene they just walk around in revealing clothing and leaping fight their way to victory the stereotypes are on display at computer game festivals like the dream act convention in leipsic earlier this year it hosted germany's largest blend or local area network party. women made up only a small chunk of the one thousand seven hundred players and they were critical of the reductive depictions in games....
32
32
May 20, 2018
05/18
by
BLOOMBERG
tv
eye 32
favorite 0
quote 0
really going into the core of how a computer works, this is deep stuff. >> when we think of computers of stuff we interact with. that's not what he is concerned about. he is concerned about the firmware. most people don't know what that is, but it's the code that exists inside the chips on your computer. and what he has discovered is a way to use these hardware exploits to get inside the firmware of your computer, and that's where all the secrets are stored. jason: and you mentioned that he works at intel, and i want everybody to understand, the company that has all of these chips inside so many computers. those are in personal computers, chips inside corporations, and chips inside the government. so how is the industry responded -- responding to this next level threat. >> in january, when meltdown and specter announced, the industry had a botched rollout. this was a new type of threat they weren't used to responding to. there were a lot of glitches, a lot of problems with the response. what is happening is you have a lot of different players. it's not like a typical vulnerability whe
really going into the core of how a computer works, this is deep stuff. >> when we think of computers of stuff we interact with. that's not what he is concerned about. he is concerned about the firmware. most people don't know what that is, but it's the code that exists inside the chips on your computer. and what he has discovered is a way to use these hardware exploits to get inside the firmware of your computer, and that's where all the secrets are stored. jason: and you mentioned that...
56
56
May 19, 2018
05/18
by
BLOOMBERG
tv
eye 56
favorite 0
quote 0
new threat, if you will, and possibly thousands of computers at risk.porter jordan robertson. >> so we're writing this week about a researcher. a cybersecurity researcher from portland. he used to have a top job at security. hacking their microprocessors and looking for advanced threats there so what he has found is this. his research shows the meltdown and spectrum januaryilities from which affected basically all of the world's processors, he's able to go a level those using vulnerabilities and what that means is basically what he's saying is those vulnerabilities were really bad and it gets worse. your computer hardware is than you know. >> you're talking as jason said to the core. really going into the core a computer works, you know, enabling it to shut down. deep stuff.ly >> that's right. when we think of computers we tend to think of the stuff we interact with, the theating system, applications. that's not what he's concerned about here. about is concerned the firmware. most people won't know what firmware is, but it's the exists inside the chips
new threat, if you will, and possibly thousands of computers at risk.porter jordan robertson. >> so we're writing this week about a researcher. a cybersecurity researcher from portland. he used to have a top job at security. hacking their microprocessors and looking for advanced threats there so what he has found is this. his research shows the meltdown and spectrum januaryilities from which affected basically all of the world's processors, he's able to go a level those using...
22
22
May 6, 2018
05/18
by
BLOOMBERG
tv
eye 22
favorite 0
quote 0
you also studied computers. how did you discover computers as a young girl?elinda: i was fortunate. i went to an all-girls catholic high school. one of the teachers, the math teacher who i really admired a lot and worked with a lot, she went to a conference. she saw these apple two's that had just come out. she was so excited about them, she came to the principal, who was a nun, and said, we have to get these for the girls. she got several of the girls who were in math class and asked us if we wanted to sign up for her new computer class she was going to start. that's how i got hooked. emily: you went on to duke. you got a bachelors in computer science and you got an mba at duke as well. this is when women were better represented in computer science. what was your experience like? melinda: it was exciting. i did notice after i got past the freshman class, there were just fewer and fewer women. that was just how it was. i learned to program with the guys. emily: you went on to microsoft where you got your first job in 1987. paint the picture of the early years
you also studied computers. how did you discover computers as a young girl?elinda: i was fortunate. i went to an all-girls catholic high school. one of the teachers, the math teacher who i really admired a lot and worked with a lot, she went to a conference. she saw these apple two's that had just come out. she was so excited about them, she came to the principal, who was a nun, and said, we have to get these for the girls. she got several of the girls who were in math class and asked us if we...
34
34
May 19, 2018
05/18
by
BLOOMBERG
tv
eye 34
favorite 0
quote 0
computer science, but also other technical fields.t's a way for students to ask and answer questions for their problem sets. it's usually done under the supervision of the professor. the professor realizes that somebody's answering a question wrong, they'll put him straight. they might endorse a question saying that's a good question, or a good answer. the company claims their research shows that students are spending more than three hours every night on this website. so think about it, this is a gold mine. because what companies need now, they are desperate for technical talent, and here is a website where it is like fishing in a well stocked lake. now, in 2016, it a company got the idea of theing students who opt in, companies can contact you. and interestingly, the companies that are most contacting students are the ones that are sort of like not top of mind for the students, and yet they need technical talent. jason: i want to go back to how this started. it seems like a no-brainer idea, and yet, it didn't exist. yeah, a woman bor
computer science, but also other technical fields.t's a way for students to ask and answer questions for their problem sets. it's usually done under the supervision of the professor. the professor realizes that somebody's answering a question wrong, they'll put him straight. they might endorse a question saying that's a good question, or a good answer. the company claims their research shows that students are spending more than three hours every night on this website. so think about it, this is...
81
81
May 26, 2018
05/18
by
MSNBCW
tv
eye 81
favorite 0
quote 0
computer was hacked.he 41 second google maps search was planned. the prosecution had no smoking gun. >> so you're saying he didn't even search for that map. >> that's right. >> somebody else put it on his >> an fbi agent testified he saw no evidence of tampering, but the defense said it had experts who did. two of them. both of whom wrote reports. but trials have referees. and in this case, the judge ruled that neither one of those defense experts could testify about tampering. one, said the judge, wasn't sufficiently qualified. the other was brought in too late in the trial. but even if they had testified, there was one question they couldn't answer. if it was a hacker, who was it? >> i can tell you that police had access to it. i can tell you that anybody within wireless range had access to it. >> what possible reason would the police have to put that map on his computer? >> i can't say that the police put it on the computer. i don't know who manipulated the computer. what i can say is, that a possible
computer was hacked.he 41 second google maps search was planned. the prosecution had no smoking gun. >> so you're saying he didn't even search for that map. >> that's right. >> somebody else put it on his >> an fbi agent testified he saw no evidence of tampering, but the defense said it had experts who did. two of them. both of whom wrote reports. but trials have referees. and in this case, the judge ruled that neither one of those defense experts could testify about...
60
60
May 7, 2018
05/18
by
CSPAN2
tv
eye 60
favorite 0
quote 0
what computer should do. that is really one of the great questions of our time. what does this require. some of them exist today but some of them are just in their infancy if you look at the sixth ethical areas. they were really well developed already. if you look at ethics or law it was really created by the world's transition to the automobile. on both sides of that there are issues that will be of huge importance. one is fairness. if are going to entrust computers to make decisions how do we ensure that they are made unfairly. what we've artie learned that if you have a data set that has a bias in the data that was selected the algorithm will not be easily to solve for that. in ways that they would find unacceptable or unlawful. on inclusiveness. they're going to be so profound it will either make people's lives better or if we don't think about this. we will hold these people back. this too will be a huge importance. if the world doesn't have some reasonable way to know what ai is doing. it actually has n
what computer should do. that is really one of the great questions of our time. what does this require. some of them exist today but some of them are just in their infancy if you look at the sixth ethical areas. they were really well developed already. if you look at ethics or law it was really created by the world's transition to the automobile. on both sides of that there are issues that will be of huge importance. one is fairness. if are going to entrust computers to make decisions how do we...
64
64
tv
eye 64
favorite 0
quote 0
and the communications that they're having and uses a computer algorithm to determine whether or not they are a terrorist now it's not known exactly what is all that is included but it is possible it's alleged that this computer program essentially would determine whether or not the person to be killed in a drone strike this is this program skynet is being widely criticized as violating human rights violating the rights of journalists and it seems to point to a big problem of artificial intelligence when you have a computer program determining whether or not someone is a terrorist or not and whether or not they could be killed in a drone strike. international criminal lawyer jennifer breeden told us it will be difficult for the journalists to prove that they were targeted by u.s. government. we don't really know what's going on even in this case it would seem that the whole case is being predicated on this thing skynet or or these things that this kill list so to speak that they have raised that they actually cannot prove if this is true there are some problematic issues this does ra
and the communications that they're having and uses a computer algorithm to determine whether or not they are a terrorist now it's not known exactly what is all that is included but it is possible it's alleged that this computer program essentially would determine whether or not the person to be killed in a drone strike this is this program skynet is being widely criticized as violating human rights violating the rights of journalists and it seems to point to a big problem of artificial...
38
38
tv
eye 38
favorite 0
quote 0
program called sky annette and apparently this computer program uses algorithms it follows a person's location in the communications that they're having and uses a computer algorithm to determine whether or not they are a terrorist now it's not known exactly what is all that is included but it is possible it's alleged that this computer program essentially would determine whether or not the person to be killed in a drone strike this is this program skynet is being widely criticized as violating human rights violating the rights of journalists and it seems to point to a big problem of artificial intelligence when you have a computer program determining whether or not someone is a terrorist or not and whether or not they could be killed in a drone strike. the u.s. is reportedly freezing its from going controversial syrian emergency response organization the white helmets the moves being met with major disappointment by the group's leaders who say it is going to impact on their ability to save lives the u.s. has been funding was to the tune of more than thirty two million dollars but the
program called sky annette and apparently this computer program uses algorithms it follows a person's location in the communications that they're having and uses a computer algorithm to determine whether or not they are a terrorist now it's not known exactly what is all that is included but it is possible it's alleged that this computer program essentially would determine whether or not the person to be killed in a drone strike this is this program skynet is being widely criticized as violating...
23
23
tv
eye 23
favorite 0
quote 0
diving into a new art world creative they're experimenting more and more with virtual reality the computer generated worlds offer totally new possibilities for the creator as well as the viewer. creating images in furch will reality figures appear live as viewers watch this is part of a theater production in berlin the actors themselves move in virtual space. you can even make music without real instruments. mines at sixty below you put on the glasses sanders sort of closed off from the rest of the world you can create your own world and it's kind of like playing god. got. there i mean this is a rehearsal for a stage play at a theater for young people in berlin the play is co-produced by cibo libre a group that combines theater and approachable reality special camera and digital software used to turn the actors into computer avatars. as i mentioned cannot capture one hundred percent of what actors do on stage with their bodies facial expressions and voices and transfer all that to this new medium but we're getting there. so this is one of the great strengths of this project is the interact
diving into a new art world creative they're experimenting more and more with virtual reality the computer generated worlds offer totally new possibilities for the creator as well as the viewer. creating images in furch will reality figures appear live as viewers watch this is part of a theater production in berlin the actors themselves move in virtual space. you can even make music without real instruments. mines at sixty below you put on the glasses sanders sort of closed off from the rest of...
55
55
May 27, 2018
05/18
by
ALJAZ
tv
eye 55
favorite 0
quote 0
modifying the applications on the computer that has sort of been hijacked and member those computers are actually inside the bank this is a case where this institution was compromised more so than anything swift specific . in bangladesh the investigation into who stole the eighty one million dollars continues but it's quite possible that the hackers may actually have never set foot in the country. missing millions was sent overseas and i'm following the money trail to the philippines where electronic wire transfer became cherish. i've come to manila it's one of the fastest growing cities in asia manila's business district has expanded substantially over the last decade but its banking sector operates under unusually strict secrecy little that includes the institution which helped turn the transfers from bangladesh into cash it was by sending money here that the thieves effectively made their getaway eighty one million dollars of bangladesh banks funds ended up in this local branch of a bank called aussie b.c. and they did it using bank accounts that had been opened months earlier usi
modifying the applications on the computer that has sort of been hijacked and member those computers are actually inside the bank this is a case where this institution was compromised more so than anything swift specific . in bangladesh the investigation into who stole the eighty one million dollars continues but it's quite possible that the hackers may actually have never set foot in the country. missing millions was sent overseas and i'm following the money trail to the philippines where...
60
60
May 17, 2018
05/18
by
CSPAN3
tv
eye 60
favorite 0
quote 0
and definitely i don't think everyone who studies computer science will move into the field of computer science. why i encourage my own school to teach my kid computer science is not because i expect my kid to become a programmer. it's because there is no better class you can teach to encourage confident problem solving. that's it. when you write software, it's a perfect pass/fail exercise. either it works or it doesn't. you know if you solved a problem. it's measurable. and you can also see your progress. it's an unusual subject from that respect. so i -- i blanked on the question. i'm sorry. >> are there people who can't do that, though? >> yes. right. >> you talk about your meter maids. maybe it was a nice honest job for them, but they couldn't pass algebra. >> i think the other truth about technology is it's always getting easier. so if you look at the way software development coding went, there used to be this stuff called for tran and cobalt. you're further back to the cards. and today there is something called ruby on rails, and i could literally teach it to you in two weeks. the
and definitely i don't think everyone who studies computer science will move into the field of computer science. why i encourage my own school to teach my kid computer science is not because i expect my kid to become a programmer. it's because there is no better class you can teach to encourage confident problem solving. that's it. when you write software, it's a perfect pass/fail exercise. either it works or it doesn't. you know if you solved a problem. it's measurable. and you can also see...
25
25
tv
eye 25
favorite 0
quote 0
that's what we saw a right there they don't know that they're speaking to a computer so does the computer have to notify them saying this is a computer i can actually really deal as a normal individual but you're talking to a computer does it have to let them know in advance can only be used for reservations had whistles tying itself up in ethical knots here but let's get back to business where does it come to the bottom line where do they make money from well that is really kind of the big question i mean you have to think back to siri the first days of digital assistants when siri came out for the i phone four s. it was the killer app it was the big thing everybody wanted to have now siri has kind of fallen by the wayside unless all years apple hasn't pushed it as fast as the other tech companies and i think it's really been left in the dust by the google assistance we saw here and i think that's really what google is focusing on by incorporating more machine learning artificial intelligence it's improving the overall they're improving the overall user experience or trying to streamline
that's what we saw a right there they don't know that they're speaking to a computer so does the computer have to notify them saying this is a computer i can actually really deal as a normal individual but you're talking to a computer does it have to let them know in advance can only be used for reservations had whistles tying itself up in ethical knots here but let's get back to business where does it come to the bottom line where do they make money from well that is really kind of the big...
119
119
tv
eye 119
favorite 0
quote 0
transformed into binary machine code which only computers can read and understand. this is the source code for the command display hello world one of the first things you might learn in your first programming class. and this is what the command looks like translated into machine code. microsoft only makes the machine code available to its customers but we can't decipher it ourselves microsoft keeps its source code a secret and to protect itself from copycats. this is what's called the proprietary business model only the manufacturer is able to change improve correct and fix security gaps in the software for better or worse the users are completely at the mercy of the manufacturer. the data belonging to every citizen from tax returns to parking fines flows through the enormous data centers maintained by our governments. we pay a visit to one of the high security server farms in hamburg we're not permitted to reveal its location let alone film it from the outside but all its security arrangements offer little protection against microsoft's vulnerabilities. so this is
transformed into binary machine code which only computers can read and understand. this is the source code for the command display hello world one of the first things you might learn in your first programming class. and this is what the command looks like translated into machine code. microsoft only makes the machine code available to its customers but we can't decipher it ourselves microsoft keeps its source code a secret and to protect itself from copycats. this is what's called the...