|
Kent Sharkey wrote: You mean that devices being used for every purpose other than their original intent aren't secure? I've only recently realised that "mobile" is short for "mobile phone".
I even tried making a phone call with my mobile, and it worked!
Live and learn.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Users often interact with their mobile devices while walking, talking, driving, and doing all manner of other activities that interfere with their ability to pay careful attention to incoming information.
So that's why we're not allowed to use our phones and drive!
Driving distracts you from the important stuff, like mobile security.
I don't know which is worse, that this was written apparently with a straight face, or that I get where he's coming from.
|
|
|
|
|
Quote: Worse than you thought I doubt it.
"the debugger doesn't tell me anything because this code compiles just fine" - random QA comment
"Facebook is where you tell lies to your friends. Twitter is where you tell the truth to strangers." - chriselst
"I don't drink any more... then again, I don't drink any less." - Mike Mullikins uncle
|
|
|
|
|
When it comes to security, developers are saying one thing but doing another, according to a new study from MongoDB. I'd think that almost 100% take responsibility, just some of them do it too late
Granted, it's a study from MongoDB, that seems to take no responsibility for security
|
|
|
|
|
Kent Sharkey wrote: Granted, it's a study from MongoDB, that seems to take no responsibility for security And giving percentages without a sample size reeks of deception.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Or incompetent reporting.
#SupportHeForShe
Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson
You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun
|
|
|
|
|
Considering I read somewhere that 60% of business lack high enough software security measures, this seems to match up close enough
|
|
|
|
|
In its latest study, the Linux Foundation's Core Infrastructure Initiative discovered just how prevalent open-source components are in all software and their shared problems and vulnerabilities. Given enough eyeballs, all bugs are shallow...or hacked
I guess it's pretty bad that I've only heard of one of these components?
|
|
|
|
|
Kent Sharkey wrote: I guess it's pretty bad that I've only heard of one of these components? I'd be in awe of anyone who knew a dozen.
I remember the fuss over left-pad, but only because I read about it; I have no idea what it does.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Mark_Wallace wrote: I remember the fuss over left-pad, but only because I read about it; I have no idea what it does.
That's the saddest part - it does what it says on the tin - it left pads strings. Definitely something that needs a separate component.
TTFN - Kent
|
|
|
|
|
Kent Sharkey wrote: Definitely something that needs a separate component framework I'll get to work on it right now.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Kent Sharkey wrote: I guess it's pretty bad that I've only heard of one of these components?
Meanwhile I'm so used to worthless articles from ZDnyet that until seeing this comment I assumed my not seeing a list was due to the article being utter drivel, not due to a malfunctioning crapblocker rule I'd setup in the past.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Quote: The first is there's little rhyme or reason to how programs are named. The lack of a standardized naming schema for software components makes tracking these programs a major pain. That's not unique to open-source software.
What are they talking about {DictionaryWord} and {DictionaryWord}{DictionaryWord} are both standard naming schemes used for a huge number of software products both open and closed source.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
At the ISO C++ Committee meeting in Prague 🇨🇿, hosted by Avast, we completed the C++20 Committee Draft and voted to send the Draft International Standard (DIS) out for final approval and publication. With IDE support to follow in a few years (or so)
Hey, look: Concepts! It's not the Duke Nukem Forever of features.
|
|
|
|
|
The proprietary language I used to work in had the equivalent of std::span in 1980. And the equivalent of [[likely]] and [[unlikely]] in 1995.
I mimic std::basic_osyncstream by having threads that want to write to cout send a std::ostringstream to a singleton CoutThread . This also avoids any risk of those threads blocking.
Very pleased to see atomic_flag operations wait , notify_one , and notify_all .
Sadly, no mention of the proposal to deprecate volatile succeeding.
EDIT: Apparently, most uses of volatile have been deprecated.
modified 18-Feb-20 19:49pm.
|
|
|
|
|
Now, to start working on the C++21 Standard.
|
|
|
|
|
C++23. They take 3 years to develop the next version
|
|
|
|
|
The device, which is housed in a chip smaller than a grain of rice, enables Internet of Things (IoT) devices to communicate with existing Wi-Fi networks using 5,000 times less power than today's Wi-Fi radios Tin-foil hats available separately
|
|
|
|
|
Why is the old saw "If it sounds too good to be true..." bouncing around my head?
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Yeah, but the 21m range is pretty limiting.
I thought backscatter wasn't anything really new though?
TTFN - Kent
|
|
|
|
|
Kent Sharkey wrote: I thought backscatter wasn't anything really new though? Conceptually, no, but making it work through a metal and plastic shell at very low power is something of an accomplishment. If it works as advertised.
That'll probably be the drawback: you'll nave to wear a hat with a rotational antenna.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Our chronic sleep deficits play a big role in our difficulty focusing on one task. But—and no surprise here—so do our cellphones and constant stream of emails. Because you never know when you might need to ... SQUIRREL!
|
|
|
|
|
Ah, but
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Researchers have discovered multiple instances of unsigned firmware in computer peripherals that can be used by malicious actors to attack laptops and servers running Windows and Linux. Can I just mark it with an X?
How nice of them to include a list of vulnerable devices. That should save the hackers loads of effort.
|
|
|
|
|
So if someone can hack into your phone or computer to install a malware program that will allow them to do anything they want, they can use that malware program to replace any unsigned firmware with a malware program that will allow them to do anything they want?
Sounds bad.
If they did that, they could use the malware program that replaced the unsigned firmware to install a malware program that would allow them to do anything they want.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|