/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Tim Starks

@timstarks
11 posts
2025-02-28
I'm going to call it Babou.  Probably desperate for stuff to play with.  I hope it remembers me.  [embedded post]
2025-02-28 View on X
Bloomberg

AWS unveils Ocelot, its new quantum chip built in partnership with Caltech, featuring five qubits that store data and four additional qubits to detect errors

www.amazon.science/blog/amazon- ... X: @awscloud : A step forward in quantum computing with #AWS. 🚀 Meet Ocelot, our first quantum computing chip tackling one of the field's bigges...

2025-02-27
I'm going to call it Babou.  Probably desperate for stuff to play with.  I hope it remembers me.  [embedded post]
2025-02-27 View on X
Bloomberg

AWS unveils Ocelot, its new quantum chip built in partnership with Caltech, featuring five qubits that store data and four additional qubits to detect errors

- Google, Microsoft recently announced their own quantum chips  — Quantum computing could spur health care, chemistry advances

2025-01-15
Teamed up with the excellent @markapomerleau.bsky.social of @defensescoop.bsky.social for this deep dive on the recent calls to go on offense in cyberspace. cyberscoop.com/aggressive-c...
2025-01-15 View on X
CyberScoop

Experts say Donald Trump and others pushing for stronger US cyber offense must clarify if escalation is a proper response to recent Chinese cyber breaches

cyberscoop.com/aggressive-c... X: Eric Geller / @ericgeller : Tale as old as time: “Advocates for increased offensive measures need to clarify what precisely they want to do, exper...

2023-09-13
Read the story first here... https://www.washingtonpost.com/ ...
2023-09-13 View on X
Washington Post

Researchers: the iPhone of Meduza owner Galina Timchenko was infected with Pegasus in Germany, the first known case of the tool being used against a Russian

Unclear is who planted the spyware while the founder of the Meduza news outlet was in Germany  —  The iPhone of a prominent Russian …

2022-09-19
Big story from @nakashimae: Pentagon opens sweeping review of clandestine psychological operations https://www.washingtonpost.com/ ...
2022-09-19 View on X
Washington Post

Sources: the Pentagon plans to audit how it conducts online clandestine information warfare after Meta, Twitter, and others removed pro-US operations

Complaints about the U.S. military's influence operations using Facebook and Twitter have raised concern in the White House and federal agencies.

2021-12-15
CISA's recently concluded phone briefing with industry on the Log4j vulnerability sounded some pretty dire notes. Here's what Easterly et al told critical infrastructure folk. https://www.cyberscoop.com/...
2021-12-15 View on X
Wall Street Journal

Microsoft and cybersecurity company Mandiant say hacking groups linked to China, Iran, North Korea, and Turkey are exploiting the Log4j flaw

Researchers call it one of the most dire cybersecurity threats to emerge in years and could enable devastating attacks

CISA's recently concluded phone briefing with industry on the Log4j vulnerability sounded some pretty dire notes. Here's what Easterly et al told critical infrastructure folk. https://www.cyberscoop.com/...
2021-12-15 View on X
CyberScoop

CISA Director Jen Easterly says the Log4j flaw likely affects hundreds of millions of devices and may be the most serious bug she has seen in her career

A vulnerability in a widely used Apache library … Ncsc-Nl / GitHub : Log4j overview related software Kyle Alspach / VentureBeat : Log4j exploits attempted on 44% of corporate netwo...

2021-12-14
CISA's recently concluded phone briefing with industry on the Log4j vulnerability sounded some pretty dire notes. Here's what Easterly et al told critical infrastructure folk. https://www.cyberscoop.com/...
2021-12-14 View on X
CyberScoop

CISA Director Jen Easterly says the Log4j flaw likely affects hundreds of millions of devices and may be the most serious bug she has seen in her career

Cybersecurity and Infrastructure Security Agency Director Jen Easterly told industry leaders in a phone briefing Monday that a vulnerability …

2021-07-09
This yarn from @HowellONeill is well worth the read, if you somehow haven't heard. (Despite the typeface on the capital “U"s freaking me out.) https://www.technologyreview.com/ ...
2021-07-09 View on X
MIT Technology Review

How a years-long cybercrime investigation by FBI, Russia, and Ukraine was undone by corruption, rivalry, and stonewalling, resulting in the hackers going free

2021-01-02
Microsoft updates on its SolarWinds-related investigation (Solorigate/SUNBURST) saying, more or less, coast is clear on its end. https://msrc-blog.microsoft.com/ ...
2021-01-02 View on X
New York Times

Microsoft says SolarWinds hackers were able to view some of its source code by hacking into an employee account but were unable to modify code or access emails

The hackers gained more access than the company previously revealed, though the attackers were unable to modify code or access emails.

2021-01-01
Microsoft updates on its SolarWinds-related investigation (Solorigate/SUNBURST) saying, more or less, coast is clear on its end. https://msrc-blog.microsoft.com/ ...
2021-01-01 View on X
New York Times

Microsoft says SolarWinds hackers were able to view some of its source code by hacking into an employee account but were unable to modify code or access emails

The hackers gained more access than the company previously revealed, though the attackers were unable to modify code or access emails.