前兩天用Gemini作Spreadsheet的Apps Script,讓Gemini確認Spreadsheet裡的內容是不是廣告。如果是潛在客戶的詢問內容的話,發個通知內容到Google Chat群組裡。

沒想到很久沒碰程式也2, 3個小時就搞定了。只是途中有幾個Bug還是需要有寫程式跟debug的經驗才有辦法克服。Gemini丟了一堆版本,但沒法提供真正正確的程式。

雖然還是個PoC,可以多少節省需要人檢查電郵的時間,下週跟現在的業務負責人聊聊看。

不過印象深刻的是,Gemini的判斷結果跟人差不多,測了60件只有2件有點差異。

#gemini #poc

3 heures à configurer un #Ipad pour #Enfant #TSA, from scratch & zero Knowledges de l'environement à la c̶o̶n̶ pomme.
Compris reprise en main du compte initial de la maman et de truc ID machin, contrôle de la sauvegarde iMachin. Surtout config contrôle parental à donf, sans apps tiers à pognon.
Et #POC d'exfiltration des sauvegardes de l'application #PECS... via navigateur et Free transfert.

On est d'accord le transfert via #Bluetooth Ipad c'est une blague!?

#GAFAM #DarkPattern #Handicap #MiniMoi

My client today is an immigrant woman from Bhutan. Her ancestral background is with the Sharchops, an Indo-Mongoloid peoples. Despite Sharchops being the largest ethnic group in Bhutan, they're marginalized due to the Dzongkha-speaking Bhutanese societal & government powers. She came to Canada in 1999, after marrying a Canadian man who she met while working in neighbouring India.

I made her some steamed ginger cod & steamed rice. Bought a dragonfruit. That's her lunch. She asked for a fish dish.

I'm learning more about Bhutan, from this wonderful client 😊 I don't really know too much about that country. I only know they're very eco conscious, excel in biodiversity & sustainable green policies.

#food #fish #dragonfruit #AsianMastodon #AsianFood #lunch #POC #GlobalSouth #Immigrants #IndigenousAsia #AsianEthnicGroups #TribalAsia

I am invisible to white women, transparent, translucid, as if I am not even there.

Is this something they learn at school, at home, in society in general?

#POC #invisibility #invisibilization #iaminvisible

Hold your weak cowardly white folks accountable when they support wankerbutternoodles in public.
It is literally one of the lowest level of asking for white privileged bravery, online. Some folks cannot even step-up to that basic plate of online humanity.

I judge them on both actions & lack of actions.

#AsianMastodon #POC #BIPOC #TootSEA #LoudPOCVoices #POCWomen #WeWontBeQuietForWhiteMen

Louder for those in the back:
AI RELIES ON HUMAN EXPLOITATION!

"Artificial intelligence is an extractive technology that relies on the brutal labor of underpaid workers around the world."

"For years, the work of African data labelers has been more or less “ghost work,” the unseen, hidden labor that lets American tech companies build their products."

https://www.blackagendareport.com/ai-african-intelligence-workers-who-train-ai-are-fighting-back

#ai #tech #racism #africa #llm #news #poc #colonization #workers

'A.I. Is African Intelligence': The Workers Who Train A.I. Are Fighting Back | Black Agenda Report

Kenyan workers are still the underpaid labor behind A.I. training, moderation, and sex chatbots. The Data Labelers Association is fighting back.

Black Agenda Report
@alphabeta #POC stands for person(s) of color.
If I cannot attract people that engage and ultimately participate, then I am an artist that will do a nice little #POC, leave the evidence, and leave. I have other things to eventually do that are even more important to me. The infinity shit.

(watchtowr.com) Pre-Authenticated Remote Code Execution Chain Discovered in BMC FootPrints ITSM Platform

watchTowr Labs disclosed a pre authentication remote code execution chain across four vulnerabilities in BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001. The chain begins with an authentication bypass (CVE-2025-71257) that extracts a guest session token from the password reset endpoint, which is then used to reach an unsanitized Java deserialization sink (CVE-2025-71260) in the /aspnetconfig endpoint's VIEWSTATE parameter. Exploitation via the AspectJWeaver gadget chain enables arbitrary file write to the Tomcat web root, achieving full RCE. Two SSRF flaws (CVE-2025-71258, CVE-2025-71259) were also identified. BMC released hot fixes in September 2025.

Source: https://labs.watchtowr.com/thanks-itsms-threat-actors-have-never-been-so-organized-bmc-footprints-pre-auth-remote-code-execution-chains/

Fediverse: @watchTowr

#Cybersecurity #VulnerabilityResearch #Vulnerability #PoC

The Most Organized Threat Actors Use Your ITSM (BMC FootPrints Pre-Auth Remote Code Execution Chains)

SolarWinds. Ivanti. SysAid. ManageEngine. Giants of the KEV world, all of whom have ITSM side-projects. ITSMs, as a group of solutions, have played pivotal roles in numerous ransomware gang campaigns - not only do they represent code running on a system, but they hold a significant amount of sensitive information.

watchTowr Labs