/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Phil Edwards

@philedwards
1 posts
2025-01-29
Yup, those AS/400s are wide open to cyber-attack from a trained AS/400 sysadmin with physical access to the server.  —  Depends what you mean by ‘legacy’, though - Windows 2000 was, well, 25 years ago.  [embedded post]
2025-01-29 View on X
Bloomberg

The UK National Audit Office says the government was operating at least 228 “legacy” computer systems as of March 2024, increasing the risk of a disruptive hack

Depends what you mean by ‘legacy’, though - Windows 2000 was, well, 25 years ago.  [embedded post] Mark O'Neill / @radiobeartime.com : The words “at least” are doing a hell of a lo...