These are public posts tagged with #m5. You can interact with them if you have an account anywhere in the fediverse.
Saturday morning observations. Concentrated on Star Clusters today. #unistellar #odysseypro #space #astronomy #amateur #m13 #m3 #m5 #m10 #clusters
A US soldier uses an M5 Stuart tank as cover so he can get across a road - Normandy, France, June 1944 #ww2 #worldwar2 #history #m5 #stuarttank #tank #normandy #france #dday
CTF Prizes this year :
- 2x Car model kits
- 3x RC buggy
- 3x Lego boxes
- 2x Bath & shower set
- 5x M5 Cardputers
Cool prizes, aren't they?
All prizes, except the Cardputers, were sponsored by @hardwear_io :)
The Cardputers come from various sponsor contracts with @ringzer0 , SERMA and @Penthertz (their contract covered other important costs like travel costs for our speakers and organizers).
You can thank them all! :)
+ 1 special soldering prize for the Badge Contest.
蘋果 M5 晶片的雙重用途設計將驅動未來的 Mac 和 AI 伺服器 - MacRumors
➤ 蘋果下一代晶片將推動 Mac 和 AI 雲伺服器的發展
✤ https://www.macrumors.com/2024/07/04/apple-m5-chips-advanced-packaging-tsmc/
蘋果將採用更先進的 SoIC 封裝技術來製造其 M5 晶片,以滿足消費型 Mac 和未來依賴雲端的 AI 工具對硅片需求的雙重策略。這種技術允許晶片在三維結構中堆疊,提供比傳統二維設計更好的電氣性能和熱管理。新一代的混合 SoIC 封裝預計將於 2025 年至 2026 年量產,用於新款 Mac 和 AI 雲伺服器。
+ 看來蘋果正在大力推進其自家晶片在 AI 領域的應用,這對未來科技產品市場會有重大影響。
+ 很期待看到 M5 晶片如何提升蘋果產品的性能表現,特別是在處理 AI 相關的應用上。
#TSMC #M5
Apple will reportedly use a more advanced SoIC packaging…
www.macrumors.comA critical vulnerability, identified as CVE-2024-20356, has been found in Cisco's Integrated Management Controller (IMC). This flaw allows for command injection, potentially giving attackers the ability to gain root access to systems. The vulnerability is located in the web-based management interface of the IMC, which is used for remotely managing Cisco hardware. The issue arises from insufficient user input validation in the IMC interface, allowing an authenticated, remote attacker with administrative privileges to inject malicious commands.
Security researchers from Nettitude have developed a Proof of Concept (PoC) exploit, named "CISCown," to demonstrate this vulnerability. The exploit involves sending crafted commands through the web interface, enabling attackers to execute arbitrary code with root privileges on the underlying operating system of Cisco hardware. This PoC exploit is part of a toolkit developed by Nettitude and is available on GitHub. It uses parameters such as target IP, username, and password to automate the exploitation process and deploy a telnetd root shell service on compromised devices.
The release of this PoC exploit signifies a critical threat level for organizations using affected Cisco products. Gaining root access can lead to data theft, system downtime, and further network compromise. Cisco has responded by releasing software updates to address this vulnerability. It is strongly recommended that all affected organizations apply these updates immediately, as no known workaround mitigates this vulnerability.
The affected products include a range of Cisco servers and computing systems, such as the 5000 Series Enterprise Network Compute Systems (ENCS), Catalyst 8300 Series Edge uCPE, UCS C-Series M5, M6, and M7 Rack Servers in standalone mode, UCS E-Series Servers, and UCS S-Series Storage Servers. Users and administrators are advised to visit Cisco’s official security advisory page and the Nettitude GitHub repository hosting the exploitation toolkit for more detailed information and access to the updates.
https://labs.nettitude.com/blog/cve-2024-20356-jailbreaking-a-cisco-appliance-to-run-doom/
#cybersecurity #cisco #vulnerability #imc #cve #poc #nettitude #encs #ucpe #ucs #m5 #m6 #m7 #github
@exador23 I was wondering about that one. GDACS alert on it was orange. #Nepal #Earthquake #M5.6 https://www.gdacs.org/report.aspx?eventid=1398938&episodeid=1534053&eventtype=EQ
Gestern ist übrigens eine neue #Podcast-Episode erschienen. @FeyTiane, @Shoggoth & ich unterhalten uns über die sogenannten "Lern- & Trainingseinheiten" in #MIDGARD5. Viel Spaß beim Hören!
#MIDGARD #M5 #pnpde @KLNSCHNCK
https://steamtinkerer.de/2023/09/22/lernen-in-midgard-von-lern-und-trainingseinheiten/
FeyTiane, David und Mirco unterhalten sich in dieser…
steamtinkerer.deDiese Woche erscheinen gleich zwei #Podcast-Episoden im @KLNSCHNCK. Am Mittwoch reden @FeyTiane & ich über die #BerlinCon2023 und am Freitag erscheint die vorletzte Episode unseres #MIDGARD5 Audio Only Actual Plays #DasMysteriumVonByrnesCreek.
This globular cluster cataloged as M5 is around 13 billion years old, more than twice the age of our solar system, and almost as ancient as the universe itself. Captured with a 115mm refractor, cooled CMOS camera, on an equatorial mount all controlled a Raspberry Pi computer. #astrophotography #M5 #globular cluster #astronomy
#AI #Disaster in #StarTrek - 'The Ultimate Computer' #Battle Explained. #CG Breakdown.
https://www.youtube.com/watch?v=NsJxJoKXU6c&ab_channel=ResurrectedStarships
#Trek #Enterprise #USSEnterprise #Starfleet #WarGame #WarGames #AIDisaster #Computer #ArtificialIntelligence #CGI #Daystrom #M5 #M5Computer #Duotronic #Duotronics #Dunsel
Es gibt großartige Neuigkeiten zu #MIDGARD5! Im vergangenen Jahr wurde eine Neuauflage des Quellenbuchs "Waeland - Die Krieger des Nordens" angekündigt. Das Warten dürfte schon bald ein Ende haben.
https://steamtinkerer.de/2023/05/15/waeland-neuauflage-des-quellenbuchs-im-druck/
Die angekündigte Neuauflage des MIDGARD-Quellenbuchs…
SteamTinkerers Klönschnack | KLNSCHNCKKürzlich ist die Ausgabe 39 der #DausendDodeDrolle erschienen, in der mit "Der Palast im Walde" ein Abenteuer von mir enthalten ist. Die Karte dazu stammt von der großartigen @FeyTiane. Seit den 1990er-Jahren gibt es das #MIDGARD-Fanzine bereits.