Monitor the room temperature.
Monitor the room temperature.
Please correct me if I’m wrong, but doesn’t this allow one to represent virtually any resource as a mail inbox/outbox with access through a generic mail app?
I’m working with a specialized healthcare company right now, and this looks like a way to represent patient treatments data as an intuitive timeline of messages. With a local offline cache in case of outages. Security of local workstations is a weak point of course, but when is it not…
deleted by creator
Sorry, but you don’t get to claim groupthink while ignoring state of Apache when Nginx got released.
Apache was a mess of modules with confusing documentation, an arsenal of foot guns, and generally a PITA to deal with. Nginx was simpler, more performant, and didn’t have the extra complexity that Apache was failing to manage.
My personal first encounter was about hosting PHP applications in a multiuser environment, and god damn was nginx a better tool.
Apache caught up in a few years, but by then people were already solving different problems. Would nginx arrive merely a year later, it would get lost to history, but it arrived exactly when everyone was fed up with Apache just the right amount.
Nowadays, when people choose a web server, they choose one they are comfortable with. With both httpds being mature, that’s the strongest objective factor to influence the choice. It’s not groupthink, it’s a consequence of concrete events.
Different disciplines - different thresholds. But yeah, that’s exactly it.
With software engineering, the unknown space is vast, yet the tools are great. So it’s very easy to start tinkering and get lost in the process.
That’s how engineers think in their free time.
When the specific goal is something I can do manually, and it’s not pressing, I would rather spend time learning how to make a tool to do it. I might not need the tool ever, I do use the knowledge picked up on those forays every day.
It’s because Unix was created by engineers rather than by ui/ux design professionals.
This is somewhat disingenuous. Unix terminal is one of the most ergonomic tools out there. It is not “designed by engineers”, it is engineered for a purpose with user training in mind.
Ergonomics is engineering. UI/UX design is engineering. UX designer that doesn’t apply engineering method is called an artist.
RAM is the fastest and most expensive memory in your PC. It uses energy, regardless of whether you use the memory. Not utilising RAM is a waste of resources.
There’s a reason good monitoring tools draw a stacked RAM chart.
I described a route to spoof DNS root authority that Russia and China can use already. Single root is not an advantage, it’s merely a different kind of implementation with different attack vectors.
When it comes to security, it is better to have multiple different implementations coalesce at a point of service delivery, than have a single source of truth. If everything is delivered via DNS, there’s your tasty target for a capable adversary. If there are multiple verification mechanisms, it’s easier to tailor an attack for a specific target.
I want cryptographic infrastructure I rely on to be the last resort for anyone capable of dealing with it.
You gotta love confident statements that don’t stand to scrutiny.
DNSSEC keys are signed in the same recursive manner SSL certificates are. If I, as a government, block your access to root servers and provide you my own servers, I can spoof anything I want. It’s literally the same bloody problem.
Chain of trust doesn’t disappear just because you use a new acronym.
When it comes to regulations, intent doesn’t matter when they enable abuse of power.
I don’t give a fuck if this is not aimed at spying. It trivially allows it, and that’s what matters.
Tissue. A cancer tissue.
Cells are expendable in pursuit of infinite growth.
Bullshit. If they wanted to cut ties and protect their image, they could block the channel and wash their hands.
This here is pure profiteering.
Every wave is affected by Doppler effect.
When a car rushes your way, it’s a tiny bit bluer, a little bit hotter, it’s drivers’ phone is operating on a slightly higher frequency and it sounds higher. According to you.
Every time someone confidently claims that we can cryptographically verify voting, they are deliberately or ignorantly keeping the complexity and necessity of verifying the verifier runtime, the data source, and the communication channels out of the picture.
Cryptography doesn’t solve voting verification problem, it obscures and shifts it.
By becoming a CTO and having an early retirement. Or not at all.
It’s your job to prove your assertion that we know enough about cognition to make reasonable comparisons.
Libcaca renderer for Metro Exodus would be… intriguing.
Identification != Authentication
As obvious as this sounds, I’ve learned over the years that most people don’t understand what it means exactly.