|
Kent Sharkey wrote: misconfigured cloud services, untested security tools, and the enablement of macros. And that the cloud providers don't put the default settings in a reasonable configuration or that things get reset after an update and the security holes of the systems themselves... that has nothing to do, hasn't it?
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
|
Data privacy in the US is, in many ways, a legal void. While there are limited protections for health and financial data, the cradle of the world’s largest tech companies, like Apple, Amazon, Google, and Meta (Facebook), lacks any comprehensive federal data privacy law. If only we had some sort of general data protection regulation...
|
|
|
|
|
If they wouldn't laugh their asses off about those data protection regulations...
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
The inaugural launch of SLS is scheduled for Monday, August 29, and everything seems to be going according to plan. "We choose to go to the moon in this decade and do the other things not because they are easy, but because they are hard."
We can just recycle that speech every 60 years or so until the cockroaches take over.
|
|
|
|
|
Quote: 'We are go for launch' I read it first as "we are go for lunch" and I thought: "hmmm, something to nosh could be a good idea."
I think I need another or to go to bed.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Kent Sharkey wrote: until the cockroaches take over "until", what do you mean by "until"?
“That which can be asserted without evidence, can be dismissed without evidence.”
― Christopher Hitchens
|
|
|
|
|
A big a** rocket !!!
CI/CD = Continuous Impediment/Continuous Despair
|
|
|
|
|
Software systems are complex, and development teams have conflicting goals. Oh, and people are imperfect. So, let's just give up
|
|
|
|
|
At the end... we don't have anything to hide... do we?
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Huh? I thought deep quantum holographic AI systems were going to fix this? I sure wish our journalists would get their stories straight!
|
|
|
|
|
Co-creator of core Unix utility, now 80, just needs to run a few more tests. In case you were wondering what he's done for you lately
"Once I figure out how ... I will try to submit a pull request. I wish I understood git better, but in spite of your help, I still don't have a proper understanding, so this may take a while." <-- We feel your pain, Glorious Sir.
|
|
|
|
|
Once I grasped that git looks at the bits/bytes on the hard drive and not what we consider files and takes a snapshot of that it helped with my understanding. Before that, I would copy files off to another location because git deleted crap when I changed branches. I was used to being able to see two versions of a file side by side in an editor.
And if that description is not technically correct, I don't care. Don't correct it, I am finally happy with it as source control. Don't make go back to hating it with the passion of a white hot star.
I’ve given up trying to be calm. However, I am open to feeling slightly less agitated.
|
|
|
|
|
Kudos for him
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
The Last Bug
by Lou Ellen Davis
“But you're out of your mind,” they said with a shrug.
“The customer's happy; what's one little bug?”
But he was determined. The others went home.
He spread out the program, deserted, alone.
The cleaning men came. The whole room was cluttered
With memory-dumps, punch cards. “I'm close,” he muttered.
The mumbling got louder, simple deduction,
“I've got it, it's right, just change one instruction.”
It still wasn't perfect, as year followed year,
And strangers would comment, “Is that guy still here?”
He died at the console, of hunger and thirst.
Next day he was buried, face down, nine-edge first.
And the last bug in sight, an ant passing by,
Saluted his tombstone, and whispered, “Nice try.”
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
Oh wow, get a load of Google using strcpy() all wrong – strcpy! Haha, you'll never ever catch us doing that Revenge is a dish best browsed cold
|
|
|
|
|
Causal machine learning with Microsoft's next-best-question model could replace AB testing to help you make better business decisions. Your computer crashed because...
|
|
|
|
|
...the screen turned blue.
|
|
|
|
|
Israeli researcher Mordechai Guri has discovered a new method to exfiltrate data from air-gapped systems using the LED indicators on network cards. Beware of hackers that you let change the firmware on your network cards
Is that blurb a little awkward to read? Maybe I need an editor...
|
|
|
|
|
Kent Sharkey wrote: Beware of hackers that you let change the firmware on your network cards Exactly!
Quote from the article: The attack begins with planting on the target computer malware that contains a modified version of the firmware for the network card.
"the debugger doesn't tell me anything because this code compiles just fine" - random QA comment
"Facebook is where you tell lies to your friends. Twitter is where you tell the truth to strangers." - chriselst
"I don't drink any more... then again, I don't drink any less." - Mike Mullikins uncle
|
|
|
|
|
The first rule of security:
If a "black hat" has physical access to your system, your system is insecure.
The second rule of security:
If a "black hat" has access to your system's firmware, your system is insecure.
A manufacturer of secure devices will require that firmware updates be signed by the manufacturer, and design their devices so that they will only load properly-signed firmware updates.
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
When it comes to health issues, not all forms of being sedentary are equal. As we know - people only use one or the other
|
|
|
|
|
I know people using their computer with a TV instead of a monitor... does it count?
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Twice the dementia!
TTFN - Kent
|
|
|
|
|
Python's still #1, but employers love to see SQL skills It's IEEE, so you know it's almost as random as the other lists
RFC 1149.5 compliant, I'm sure.
|
|
|
|