|
General consensus actually works quickest and best if the highest ranking person in the group threatens to have everyone else fired if they don't see things his/her way. Did they even try that method or did they stick with the whole fantasyland democratic approach?
|
|
|
|
|
Ah the old HiPPOcracy - Highest paid person's opinion rules
|
|
|
|
|
An otherwise healthy 34-year-old man throttled a sneeze—and had regrets. Not technical, but just so you're warned. Let those sneezes go!
|
|
|
|
|
Didn't your mother ever warn you not to cache cold?
Or something similar
If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack.
--Winston Churchill
|
|
|
|
|
Daniel Pfeffer wrote: not to cache cold That's an interesting idea. Never did I cache a cold, just sometimes larger objects which are costly to instantiate. What are the advantages of caching a cold? Could there be concurrency issues with a shared cold? And if so, how to handle them?
Oh sanctissimi Wilhelmus, Theodorus, et Fredericus!
|
|
|
|
|
- All colds are shared objects
- They are most easily shared by installing RHINOS - Really High Intensity Nasal Operating System
- Unfortunately, all versions of RHINOS are extremely susceptible to viruses
If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack.
--Winston Churchill
|
|
|
|
|
Android spyware has advanced surveillance capabilities, including turning on the mic when the victim enters specific geolocations. My "two cans and string"? Still unhacked.
But I did see someone with some scissors hanging around recently.
|
|
|
|
|
Microsoft is aware of a new publicly disclosed class of vulnerabilities, called “speculative execution side-channel attacks,” that affect many operating systems and modern processors, including processors from Intel, AMD, and ARM. On the MSVC team, we’ve reviewed information in detail and conducted extensive tests, which showed the performance impact of the new /Qspectre switch to be negligible. There's always room for one more switch on the msvc command-line
|
|
|
|
|
Hmmmmm,
Ostendo primo conditionem hominum extra societatem civilem, quam conditionem appellare liceat statum naturea, aliam non esse quam bellum omnium contra omnes; atque in eo bello jus esse omnibus in omnia.
The next generation exploit shellcode will probably iterate through the current process and WriteProcessMemory all lfence instructions with NOP and proceed to scan for the ntoskrnl.exe entrypoint via the spectre technique. Business as usual... Then in a few months the next MSVC 'chess-move' will be an additional sandbox API...
The modern approach to security mitigations can be described as a game of Whac-A-Mole[^].
We need a new generation of processors... with a dedicated OOB management SoC[^] tasked with 'verified execution flow' on the other main cores.
You could also add DRM, Forced OOB Emergency Updates and a myriad of other management tasks on the SoC.
|
|
|
|
|
Kent Sharkey wrote: There's always room for one more switch on the msvc command-line
Three more working in conjunction with each other is even better! Teamwork, Baby!
|
|
|
|
|
There was a one-word difference between sending a test alert and a real one Are you sure you want to create a panic, Yes/No? (defaulting to Yes, of course)
|
|
|
|
|
Great, kids today don't know what Drill is.
Or Vacant, to refer to a post from last week.
This is gonna be fun going forward.
|
|
|
|
|
Great, young "adults" today don't know what "Drill" is.
Or Vacant, to refer to a post from last week.
This is gonna be fun going forward.
|
|
|
|
|
Launch and Lunch do look very similar. Wish I had a lunch button.
|
|
|
|
|
Google today announced a new IT Support Professional Certificate that will help beginners start a new career in 8 to 12 months. The certification is just the latest front in its ongoing war to wrest control of the enterprise away from Microsoft. Beyond, "Just Google the problem?"
|
|
|
|
|
Juuust not to white male republicans though.
Otherwise, sure.
|
|
|
|
|
“Low complexity” hack for Transmission client may work against other clients, too. But the sites hosting torrents would never do anything criminal like this, would they?
|
|
|
|
|
Alibaba has developed an artificial intelligence model that scored better than humans in a Stanford University reading and comprehension test. So get it to write your next SAT for you
|
|
|
|
|
Ha, better than the 40 thieves I guess
|
|
|
|
|
Is that praise for the AI or an indictment of the test?
|
|
|
|
|
|
The team has created a first-of-its-kind algorithm that can interpret and accurately reproduce images seen or imagined by a person. Yeah, that was a good episode, but I liked "USS Callister" better
|
|
|
|
|
Facebook has long said that it doesn't use location data to make friend suggestions, but that doesn't mean it hasn't thought about using it. It's a conspiracy to get people to clean their lenses
|
|
|
|
|
Seems to me that facebook friend suggestions are mostly based on shared "likes". If you both "like" the same restaurant, you apparently should be friends! (I follow the Formula One news on facebook, which means I get friend suggestions from all over the world.)
|
|
|
|
|
Facebook already knows I'm a member of several vintage photographic groups. Most of my cameras and lenses are used. Their data will be skewed.
|
|
|
|