OF THE
TIMES
Drama. Both sides being western funded it's difficult for me to feel sorry for either one. Robbing Peter to pay Paul with U.S. tax dollars.
This is nuts seeing Professors arrested and snipers on roofs of Universities ! History repeats itself !
Just like, the debt of the Federal Reserve is not owned by the States nor the citizens of said. ~ Tavern is open - what is your pleasure?
Unfortunately the "States" mentioned have decided to secede - so this vote is null and void.
"I proposed three major principles: mutual respect, peaceful coexistence, and win-win cooperation. They are not only a summary of past experience,...
To submit an article for publication, see our Submission Guidelines
Reader comments do not necessarily reflect the views of the volunteers, editors, and directors of SOTT.net or the Quantum Future Group.
Some icons on this site were created by: Afterglow, Aha-Soft, AntialiasFactory, artdesigner.lv, Artura, DailyOverview, Everaldo, GraphicsFuel, IconFactory, Iconka, IconShock, Icons-Land, i-love-icons, KDE-look.org, Klukeart, mugenb16, Map Icons Collection, PetshopBoxStudio, VisualPharm, wbeiruti, WebIconset
Powered by PikaJS ๐ and InยทSite
Original content © 2002-2024 by Sott.net/Signs of the Times. See: FAIR USE NOTICE
High tech is not just a single thing. Using the word "hacker" for this type of task is rather stupid, especially since the term can be used in a lot of ways, but most people associate it with computer security experts. What they seem to want is an innovative way to use video editing algorithms to determine people's identifying features and blur them out selectively. It's a complex problem that has most to do with high level video processing algorithmic design. This type of high tech specialty has very little crossover with computer security expertise. Basically, if you have a keen interest in video manipulation, the amount of specialization required in order to be useful for this particular task, means you're a video person. Sure, taking high level video algorithms and making them practical, automated, and fast, requires very high skills, but it has almost nothing to do with computer security expertise. It would be highly unlikely to find somebody who was an expert in both creating this for the police, and also proficient in maintaining or breaking secure systems.