|
I think SpaceX will have to wait for their Falcon Heavy[^] - the sheer mass of JavaScript frameworks is starting to cause gravity to increase I think.
TTFN - Kent
|
|
|
|
|
The pursuit of thinner, lighter laptops, a trend driven by Apple, means we have screwed ourselves out of performance. They look at me funny when I set up the mini in the coffee shop though
|
|
|
|
|
Slightly misleading since few laptops use desktop CPUs and GPUs. Heat has always been a problem, along with flaky batteries, lack of expandability, crappy touchpads and breaking in expensive ways.
My kids used to ask why I never bought a laptop for myself and now that they've had the "joy", they've seen the light and have either switched or will be switching to desktops when their current laptops pine for the fjords. (Except my youngest, who uses her laptop for relatively trivial things.)
|
|
|
|
|
Cybercriminals are delving into the past to launch attacks based on some very old vulnerabilities according to the latest report from Kaspersky Lab, and they're using Linux to do it. Linux is the new Windows?
I didn't feel like a "The Year of Linux DDoS" item.
Then again, I guess I just did.
Bother.
|
|
|
|
|
What Go Cloud then gives these developers is a set of open generic cloud APIs for accessing blog storage, MySQL databases and runtime configuration, as well as an HTTP server with built-in logging, tracing and health checking. Go go gadget cloud?
|
|
|
|
|
Google wants lots of things.
I'm tempted to be more sarcastic, but given the choice of Node.js or Go, I'll take Go. (Okay, I won't take either since cloud development bores me, but I'd rather punt the project to someone using Go, since I won't have to vomit if I have to get involved. Remember, I C++.)
|
|
|
|
|
I would jump on it in a sec. Google just needs to make sure Android (Android Studio), iOS (XCode) and all major browsers support it out of the box.
|
|
|
|
|
Cloud Build is designed to work within a variety of environments, including Kubernetes, Firebase, serverless and virtual machines. To deliver you unto evil?
|
|
|
|
|
This bug occurs because Bluetooth-capable devices do not sufficiently validate encryption parameters used during "secure" Bluetooth connections. More precisely, pairing devices do not sufficiently validate elliptic curve parameters used to generate public keys during a Diffie-Hellman key exchange. Good job, Harald
|
|
|
|
|
Scientists have created the most dense, solid-state memory in history that could soon exceed the capabilities of current hard drives by 1,000 times. New technique leads to the densest solid-state memory ever created. Don't worry: file sizes will expand to fill those too
|
|
|
|
|
This month saw the release of a fascinating oral history, in which 76-year-old Brian Kernighan remembers the origins of the Unix command grep. "Tell us another story, grandpa!"
|
|
|
|
|
Kent Sharkey wrote: "Tell us another story, grandpa!" You mean grep-pa.
|
|
|
|
|
It's possible to use a dead person's fingerprints to unlock a device, but could you get away with exploiting the dead using an iris scanner? Not if a team of Polish researchers have their way. I'm not sure what's creepier - that someone might try, or that these researchers tried to prevent it
|
|
|
|
|
"it can only spot dead eyes when the person has been deceased for 16 hours or more"
So plunking out the eyeball and using it right away still works.
|
|
|
|
|
That makes things so much better. Thank you
TTFN - Kent
|
|
|
|
|
It handed down a combined €111 million in penalties to four electronics manufacturers. It's not just for Google anymore?
Odd. *That* company still seems to be missing from the list of ones being fined.
|
|
|
|
|
With the change, every site now gets a label in its address bar: "Secure" if the site is loaded over HTTPS, "Not Secure" otherwise. In September, Google will make another change and remove the "Secure" label, marking the transition to a world where secure HTTP is the default rather than the exception. I thought it was just commenting on my emotional state
|
|
|
|
|
Google has not had any of its 85,000+ employees successfully phished on their work-related accounts since early 2017, when it began requiring all employees to use physical Security Keys in place of passwords and one-time codes, the company told KrebsOnSecurity. "Only the One can open the door. And only during that window can that door be opened."
|
|
|
|
|
One key to rule them all ...
Zen and the art of software maintenance : rm -rf *
Maths is like love : a simple idea but it can get complicated.
|
|
|
|
|
Turns out it's hard to run a social network with 2.2 billion people. That's a lot of hamsters
|
|
|
|
|
The company’s been pretty secretive about these processes in the past Does it include the pixie dust and 'expecto patronum'?
|
|
|
|
|
I'm sure they have an entire department made up of fairies and unicorns that create and fix the hardware products. The software fixes are done by pirates. They send out an iPatch. What do you expected? its pirates software.
|
|
|
|
|
Filtering sites across the web is effective at keeping employees on task and reducing security risks for companies. But how much time does web filtering save organisations? Because of all the time spent trying to get around it?
|
|
|
|
|
Kent Sharkey wrote: Because of all the time spent trying to get around it? No... due to all the time you lose searching for partial valid information, because the moron responsible for the filter thought that MSDN or other technical websites are not a valid URL
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Is that ZDNet article "work-related web content"? Or should I ask my employer to filter it away?
Oh sanctissimi Wilhelmus, Theodorus, et Fredericus!
|
|
|
|