www.How-Far-Is-It.com

Nothing screams efficiency like ripping out

Nothing screams efficiency like ripping out the wiring mid-flight. According to the CIO, the IRS IT division lost 40% of staff and nearly 80% of tech execs, in the biggest reorg in two decadesand 1,000 techies were detailed to frontline services during tax season. Who needs uptime when you have buzzwords

The Register: DEF CON bans three Epstein-linked men from future events

God I'm getting tired of this shit.

What's next Passwords must contain at least 2 non-consecutive Egyptian hieroglyphs A Chinese/Japanese character of at least 20 strokes At least one reference to the Ulster Cycle of Irish mythology Your social security number encoded in base64

The best part is that TP-Link's defense for such unreasonable requirements is adhering to a recommendation set by the *Singapore government*, and they didn't even implement it correctly.

The Register: NASA points fingers at Boeing and chaotic culture for Starliner debacle

The Register: Google germinates Gemini 3.1 Pro in ongoing AI model race

# :NOJPTPM :NOJPWDM :NOJPZTM

Saluton, Esperantistoj!

Mi estas Andersono, unu komencanto. Mi loas en . Mi estas Analizisto.

Mi volas praktiki kun vi, kaj renkonti novajn amikojn!

Kiu deziras parolas kun mi

:NOJPTPM :NOJPWDM :NOJPZTM

This post from reminded me of when I was younger and I worked on a project with a retail client that had multiple locations with back office servers. There was a period where they started seeing a single server suddenly reboot itself every night. And this would only happen at that one location.
From the home office they remotely reviewed logs, they checked who was on the server prior to it rebooting and they looked at what processes were running that could cause a reboot. They could not find anything. Everyone was perplex at the home office. What they did notice was that the server would go down at around 2AM every night.
After seeing this pattern, they sent out a tech to sit in the back office and watch the server to see what happened at around 2AM.
At 2AM, one of the cleaning crew entered the back office, dusted things and then from the wall unplugged the server from power, plugged in their vacuum and proceeded to vacuum the office.


Misconfiguration: Further chaos with electronic professional health cards

A few thousand doctors and pharmacists need to be strong now. Their electronic professional health cards from January 2026 will be exchanged again.

IT billion for employment agency: AI offensive and cloud expansion

In 2026, the BA invests almost one billion euros in digitalization. SAP Cloud and 32 AI tools shape daily life, but a job project slows budget.

Report: US has stopped funding technology against internet blockades

With more than 500 million US dollars, the USA has supported IT projects to protect internet freedom over ten years, according to a report. This is now over.

More memory: Samsung and SK Hynix are apparently accelerating plant construction

The two memory world market leaders Samsung and SK Hynix could complete new plants earlier than expected. But it will still take time until then.

macOS 27: Intel apps quietly say goodbye

With macOS 26.4, there are further clear indications of the end of support for Intel applications. However, it won't happen overnight.

Amazon takes packing robot Blue Jay out of service after a few months

Amazon has dismantled a robot for warehouse use after only a few months. The technology is to be further developed.

Scam: Fake "Gemini" chatbots sell fake "Google Coin"

A new scam relies on customized AI chatbots. These urge victims to buy worthless cryptocurrencies.

For Pixel 11 Google is working on improved facial unlocking like on iPhones

Googles Pixel smartphones are to receive improved facial unlocking in the future, similar to the iPhone and also works in the dark.

Find out how far it is between any two cities.

"Reduce crime to zero": Ring cameras were never supposed to just find dogs

AI-powered Ring cameras are supposed to search for lost dogs in neighborhoods. An internal email now seems to confirm that this is just the beginning.

The clock is ticking: NIS2 registration deadline at BSI expires on March 6, 2026

TV SD warns that the registration deadline for NIS2-obligated companies at the BSI ends in two weeks. Around 29,000 German companies are affected.

It is possible to invent a single machine which can be used to compute any computable sequence.

Alan Turing, 1936

The Register: Palantir spent $25M on CEO flights so Alex Karp could do all the talking

Few fals-isms out-of-principle haters claim:

1) Nobody wants this -> I do. Practically all my close IT friends and virtually all close friends do.
2) Ethical AI is not possible -> Yes it is. By definition.
3) What about your data being scrapped and used -> Please do. That's why I write blog posts & OSS code. More can then benefit. Including me.
4) It's always worse than by-hand code -> YMMV per case but by definition this one is false.

Fehlkonfiguration: Weiter Chaos bei elektronischen Heilberufsausweisen

Ein paar tausend rzte und Apotheker mssen jetzt stark sein. Ihre elektronischen Heilberufsausweise von Januar 2026 werden wieder getauscht.

IT-Milliarde fr die Arbeitsagentur: KI-Offensive und Cloud-Ausbau in Nrnberg

Die BA investiert 2026 fast eine Milliarde Euro in Digitalisierung. Die SAP-Cloud und 32 KI-Tools prgen den Alltag. Ein Job-Projekt bremst das Budget aber aus.

, , Matrix. , , fleacf.space, x.fleacf.space

Bericht: USA haben Finanzierung von Technik gegen Internetblockaden eingestellt

Mit mehr als 500 Millionen US-Dollar haben die USA laut einem Bericht in zehn Jahren IT-Projekte zum Schutz der Internetfreiheit untersttzt. Damit ist Schluss.

Mehr Speicher: Samsung und SK Hynix beschleunigen offenbar Werkbau

Die beiden Speicher-Weltmarktfhrer Samsung und SK Hynix knnten neue Werke frher fertigstellen als gedacht. Bis dahin dauert es aber trotzdem.

The Register: OpenClaw is the most fun I've had with a computer in 50 years

Sntax Hacking: Researchers discover Sentence Structure can bypass AI Safety Rules.

Researchers from MIT, Northeastern University and Meta recently released a paper suggesting that large language models LLMs similar to those that power ChatGPT may sometimes prioritize sentence structure over meaning when answering questions.

The findings reveal a weakness in how these models process instructions that may shed light on why some prompt injection or jailbreaking approaches work, though the researchers caution their analysis of some production models remains speculative since training data details of prominent commercial AI models are not publicly available.

Sind die Rolltreppen eigentlich irgendwie per IoT steuerbar

macOS 27: Intel-Apps sagen zum Abschied leise Servus

Mit macOS 26.4 gibt es weitere deutliche Hinweise auf das Ende des Supports fr Intel-Anwendungen. Von heute auf morgen geht es aber nicht.

Cybersecurity job posts are noisy on purpose. Titles change, requirements sprawl, and entry level often is not entry level.

I wrote a short breakdown of cybersecurity jobs in demand and how to read listings for signal instead of tool shopping. If you are pivoting into security or trying to choose a lane, this should make the market feel clearer.

Amazon stellt Packroboter Blue Jay nach wenigen Monaten auer Dienst

Amazon hat einen Roboter fr den Einsatz im Warenlager nach wenigen Monaten wieder abgebaut. Die Technologie soll aber weiterentwickelt werden.

AI-revolutie: IT-leiders, ben je klaar voor de toekomst Ontdek de strategische agenda die je niet mag missen!

I swear the most thing ever is a job posting that requires 10 years of experience in something that has existed for 5.

I have personally witnessed this several times, most memorable being requirement of 10 years of Ruby in early 2000.

S....praktiskt

Blick ins Heft ct 5/2026: Windows 11 produktiv einrichten

Heute geht es um die Bedienung von Windows 11, um die Frage, wer oder was eigentlich Schrdingers Katze ist, und wie KI-Mll das Internet vergiftet.

The Register: 6,000 execs struggle to find the AI productivity boom

Cybercriminelen richten zich op technologie-, productie- en financile organisaties met campagnes die een combinatie van phishing via apparaatcodes en telefonisch phishing (vishing) gebruiken. Hiermee misbruiken ze de OAuth 2.0-apparaatautorisati...

Lees verder op: