|
After a hefty Patch Tuesday comes news of an update for Git to deal with a vulnerability for the source shack when run on Microsoft's Windows. If someone else on this machine wants to fix my bugs, feel free
|
|
|
|
|
According to a new study by Instaclustr and Forrester Consulting, enterprises using open core technologies report a clear desire to move to pure open source alternatives — but 70% struggle with inter-company strategy and support roadblocks. Do they get confused by seeing all the source code?
|
|
|
|
|
Who is responsible for supporting open source software? Who is accountable for the flaws? Can your company afford to wait two years for the retired farmer in France to fix the math library he wrote a decade ago?
The customer has nuclear weapons.[^]
Best Wishes,
-David Delaune
|
|
|
|
|
For every great open source library/package, there are hundreds, if not thousands, of awful libraries/packages. Even good ones get abandoned. Then there is licensing; claims to the contrary, open source licenses are a legal [largely untested] minefield.
|
|
|
|
|
I wanted to use a small OS library for something at work... I had to file the license and the link where it was offered to the legal and the compliance departments, to fill several applications / petitions and wait a while for permission before being allowed to use it.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Microsoft says Windows admins can now opt into automatic updates for .NET Framework and .NET Core via Microsoft Update (MU) on Windows Server systems. It didn't already?
Shows you how long it's been since I've adminned a server.
|
|
|
|
|
As Microsoft continues to track the high-priority state-sponsored threat actor HAFNIUM, new activity has been uncovered that leverages unpatched zero-day vulnerabilities as initial vectors. schtasks /create /ru system /sc daily /tr hack-the-machine.bat
Although perhaps a VBS file would be more appropriate?
|
|
|
|
|
The custom face-computer interface relies on Morse Code and funny faces. si si si aye aye GREAT GATS-by hip-pi-ty-hop
|
|
|
|
|
Someone beat Foone big time.
GCS/GE d--(d) s-/+ a C+++ U+++ P-- L+@ E-- W+++ N+ o+ K- w+++ O? M-- V? PS+ PE Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|
|
Anytime you use a video teleconferencing app, you’re sending your audio data to the company hosting the services. "Papa, can you hear me?"
|
|
|
|
|
My only worry is that someone is going to package up these meetings and sell them as cures for insomnia, which would infringe on my patent pending idea, but I don't have the lawyers to fight big tech. I may have to grudgingly accept a seven figure settlement with single digit royalties.
|
|
|
|
|
That's why I use headphones with a physical mute button
GCS/GE d--(d) s-/+ a C+++ U+++ P-- L+@ E-- W+++ N+ o+ K- w+++ O? M-- V? PS+ PE Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|
|
It sounds a bit paranoid...
|
|
|
|
|
Matias Lopez wrote: It sounds a bit Paranoid
It often does, when I'm not supposed to listen to the meeting. But also other stuff from Black Sabbath.
GCS/GE d--(d) s-/+ a C+++ U+++ P-- L+@ E-- W+++ N+ o+ K- w+++ O? M-- V? PS+ PE Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|
|
More seriously, in a company I didn't trust as far as I could burn them down to the ground I went as far as to disable the drivers of the integrated microphones (laptop) and allow only the plugged in microphone, which had a physical power button.
In my current workplace it's standard operating procedure for everyone since corporate espionage is a thing, especially when you are one of the biggest Tier 1 suppliers in the world.
GCS/GE d--(d) s-/+ a C+++ U+++ P-- L+@ E-- W+++ N+ o+ K- w+++ O? M-- V? PS+ PE Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|
|
Kent Sharkey wrote: "Papa, can you hear me?" Didn't go with Pink Floyd. I slowly shake my head.
|
|
|
|
|
A rise in hybrid work and a shift to cloud platforms has changed how businesses operate - but it's also leaving them vulnerable to cyberattacks. I thought everything was automagically secure in The Cloud(tm)?
|
|
|
|
|
Well, the payment systems to get your own cloud space have been secured. Isn't that good enough?
|
|
|
|
|
Study shows how ‘dark’ personality traits affect Bitcoin enthusiasm "Why not both?"
And in related (and Canadian, sorry) news: Kevin O'Leary is into crypto[^].
|
|
|
|
|
|
Ugh. Yes, definitely also “why not both”.
I guess they smell more money that way…
TTFN - Kent
|
|
|
|
|
|
Hired's latest data points to the most lucrative languages, specialties, and regions That number in the box is your pay
Ruby on Rails is in such demand, it made the chart twice!
|
|
|
|
|
The top 5 cities in the highest software engineer salaries are in four states that also have the highest state income taxes and cost-of-living. So if you're not working remote from a state with lower or no income tax it's probably all a wash.
If you think 'goto' is evil, try writing an Assembly program without JMP.
|
|
|
|
|
The software supply chain security tool from GitHub and Google uses GitHub Actions and Sigstore to generate a "tamper-proof" record describing where, when, and how the software is produced. "Signed, sealed, delivered, I'm yours"
|
|
|
|