amanfromMars 1 Sun 10 Oct 18:01 [2110101801] ……. says again even louder on https://forums.theregister.com/forum/1/2021/10/08/quantum_computing_startups/
Re: Flogging a dead cat @Anonymous Coward
Perhaps he could be unleashed onto other comment boards – or maybe write content for aggregation/ recycled story sites? …… JamesTGrant
Some other comments boards are terrified of what is being freely shared with them, JamesTGrant, ….. for reasons which we are not privy to, which is weird, for how is one then best to know exactly how to accommodate their needs and feeds and seeds.
Here be a prime example of the problem ….. which if Murphy has his say, will probably now appear in all its glory where it was earlier posted today at 1529 GMT 🙂 …..
GrahamC [2110101629] …… advises on https://www.nationaldefensemagazine.org/articles/2021/10/8/qa-with-gen-murray-leader-of-army-futures-command
Regarding ….. “The challenge in the long run is we’re going to have to figure out how to retain and utilize the talent, because with the skill sets these kids have, if we don’t figure this out pretty quickly they’re going to get snapped up by commercial industry.” …… surely that is something the new kids with talented skill sets are best suited and booted to provide to military commanders for exercising remotely with their existing practical and virtual control levers.
Nearly all of the really innovative and effective military and paramilitary developments for use in the theatres of both near and distant tomorrows are way beyond the normal ken of traditional soldiers, so it would be a dereliction of duty to expect existing conventional forces and sources to provide illustrative leadership in future highly contested fields of almighty endeavour and overwhelmingly advantageous engagement/JOINT AIDVenturing.
And such is certainly to be well recognised whether one lives in the West or the East, the North or the South for it is a universally pertinent fact which it is impossible to deny and retain any peer support and personal credibility.
And as such does require existing hierarchies to be prepared to make a whole series of quantum leaps into the new ways and means of doing things with Advanced IntelAIgent Memes.
[Thank you. Your comment will be displayed soon after reviewing.]
……………………………………..
amanfromMars 1 Mon 11 Oct 14:46 [2110111446] ……. just asking out loud on https://forums.theregister.com/forum/1/2021/10/11/data_guardian_police_bill/
A Real Nazty Virus …..
Seems like Political Party Conservatism and Parliamentary Democracy have caught/been smitten/are spreading the National Socialism bug.
Who wants to tell them it doesn’t deliver final solutions?
Are MPs and Westminster staff tested at all for recreational drugs or illegal substances? Is the water safe to drink in the Lower and Upper House environs or has it been tampered with? Where/What do you think the source cause of the batshit crazy outbreak be?
……………………………………..
amanfromMars 1 Mon 11 Oct 17:48 [2110111748] …….. being maybe disagreeable on https://forums.theregister.com/forum/1/2021/10/11/ncsc_ceo_speech_chatham_house/
Star Adam and Eve Turns Needed …….. for Mega Blockbuster Programs ahead.
If Lindy Cameron’s role as National Cyber Security Centre’s chief executive as reflected in that Chatham House puff piece were to be recast in the hardcore xxxx porn genre, it would be as wannabe backroom fluffer rather than centre stage star.
And that’s something UKGBNI needs to realise and accept in order to be able to even begin to be able and enabled to deal effectively and truthfully with the mountains of problems increasingly building and cascading down upon them from the realms that capture and captivate souls, hearts and minds and mine and refine and process novel proprietary intellectual property wherever it is to be found, whether at home or in foreign and alien fields, above the Earth or deep underground in secret caverns and dark cloisters.
Failure to adequately successfully address those monumental requirements leaves one at the mercy of those expert at exploiting such as be great game changing vulnerabilities.
…………………………….