article thumbnail

The Hacker Mind Podcast: A Hacker From Hollywood

ForAllSecure

He told her he really wanted to create faster planes so that he could sell them to the US military. This was done with program music recorded on either perforated paper or in rare instances, metallic roles, sales of player pianos had peaked in 1924, and then declined as the improvements in phonograph recordings continued.

article thumbnail

On Finding Rabindranath Tagore

Unwritten Record

Records created by the War Department, Military Intelligence Division between 1918 and 1947, include biographies of leaders, politicians, and significant people such as Tagore. Front cover and second page of Tagore Visits the United States , a 1961 USIS publication. neutrality laws. Less than two years later, the U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

And, of course the military in particular is always concerned with that and, you know, good friends of mine like Billy rails for example who most people you're probably have heard of, spend a lot of their time in classified environments, trying to figure out how to fix those issues for the government.

IT 52
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

And, of course the military in particular is always concerned with that and, you know, good friends of mine like Billy rails for example who most people you're probably have heard of, spend a lot of their time in classified environments, trying to figure out how to fix those issues for the government.

IT 52
article thumbnail

Sergeant Dennis Fisher and Marine Corps Combat Photography in Vietnam

Unwritten Record

Upon graduation everyone was assigned a Military Occupational Specialty (MOS) and sent off to train for it. Mine was 0311 which was an infantry rifleman, and I was sent off for advanced infantry training. ” with an emphasis on names, ranks, units, and hometowns so that news releases could be sent to local papers.

article thumbnail

CMMS vs. EAM: Two asset management tools that work great together

IBM Big Data Hub

CMMS evolved in the 1960s when the growing complexity of operations in large companies started to expose the limitations and inadequacies of manual and paper-based management. In the oil and gas or mining industries, for example, there is a strong need to bring safety, reliability and compliance information into workflows.

article thumbnail

EP 49: LoL

ForAllSecure

So why don't I do some side look why don't I use these legitimate tools so comes up in loads of applications, you know, kindly low mine hours. I worked at NSA both as a contractor and in the military for about 15 years, building those implants, building these exploits to do some of these attacks that we are currently talking about.