Every time my eyes see Capita, my brain still sees Crapita.
"EasyJet confirmed it is laying off 1,300 crew and 727 pilots"
727 pilots or, seven hundred twenty seven airplane pilots... :?
129 posts • joined 5 Apr 2015
I substantially automate Github. Something broke a few weeks ago and my automation fails. I am in the process of locally hosting all my clients except certain secure repos. I have done this a lot lately for other services as well. It appears that I am not groking continuous delivery as it constantly breaks needed features. I rather dislike dumbbing down features to be more inclusive.
So... their models are not AI - they are just matching patterns. If it was AI, the systems would adapt themselves to work with the new data stream. In the mid-eighties scientists could do pattern matching like this, but the hardware was not up to snuff to scale with PDP-11's with 1MB RAM or even the mighty VAX.
While some of the math has changed (more optimized), the end result is the same. It is all hardware driven. Now the problem will shift back to software since we no longer have exponential growth in CPU speed - proving yet again that our industry needs to do better than just software bloat and feature creep.
I am very fortunate that I got my degree when I did. What I learned then is still very much applicable to my work today, and that trait is sound judgement.
I know some guys that - lets just say they are very flexible on who they work with - tell me that it has never been easier to pwn networks, phones, IOT, or any endpoints for that matter. While I work in embedded and know what a crap shoot it is, if people actually saw what these guys do, they would never bank or pay with a phone. I don;t. Once they have your phone, they are into everything you are into. The sky isn't falling, it already fell.
I find it unbelievably depressing everytime freshman year mistakes are now the rule of thumb. Have they ever heard of format preserving encryption - or even a simple hash?
Computer Science has been dumbed down to the extent of being equivalent to a trade school. You can learn how to write PC program comments but not writing good code itself. Pathetic.
So, back full circle. It's nice to know that the way I was taught in the 70's and 80's is back in vogue again. I never lost sight of that and continue to this day writing fail-safe code.
I have fond memories of DEC FORTRAN. Both F IV and F77. I used to burn EPROMS under RT11 and RSX.
I read an article in the WSJ app today (UTC +8) about Mr. Yuan. Mr Yuan gave a good interview - he almost had me - then he finishes with the insinuation that "someone" has targeted his company.
It's game over for me - even if someone has targeted the company. This sentiment taken together with past statements Mr. Yuan has made paints a bad picture.
On reason for client side processing is that PWAs need to have persistence locally to save state. IF the js code is trusted, this is a more secure process.
Personally, I'm afraid I'm biased. I do not download non-trusted code and run it - if that can be prevented; and if not, only run in a sandbox (ie a browser.)
I have a couple of government contracts - one in the US and and another in Asia. I sent an email to my contact in Asia saying I understand their situation and offered them an out. " Na - you can continue - we are still setting sail." I also have several active contracts in the US and elsewhere that are business as usual. Life will still continue.
"... and that he accessed the document after his resignation from Google."
You can do that at Google? At all of my clients when they fire a person or when someone resigns, they are locked out before they ever even leave the office they quit or were fired in. By the time the interview is over, there is a list of what needs to be returned and also what the person has downloaded recently (about 1 yr.)
In fact a few of my clients have key people when hired agree to submit to a whole body scan on entrance and exit. This always includes me too although I never need to bring in anything.
All these companies streaming and locally hosting instead of going to conventions. If this process works out well for the companies, they might cut down on the many Cons they attend each year. The entire convention industry might be made redundant or shrink considerably. There are way too many conventions anyway....
I am glad that I make policy instead of following it. None of my clients use nodejs - they are smarter than letting all-comers inject code into their repositories. I wouldn't service the customer as I wouldn't want to take the blame when ransom ware strikes. My livelihood depends on that.
The below link is a nice summary to harden the Firefox browser. Also grab a search engine from Mycroft as Mozilla passes your browser info every time you use search.
My browser is locked down as much as possible and run in sandbox locked down as much as possible - I still will not run scripts or binary blobs. If a site breaks, I go somewhere else. Usually, I do not give a flying f*** what the standards say. If it looks like shite and smells like shite... Want Another Shite Meal?
I am so sick and tired of software that changes my configurations without telling me - I do things in there for a reason. I can not begin to count how many times vendors make those changes - and by people who should know better. It is just part of the new era apparently, I call it arrogance. Technically, that action is quasi illegal - modifying a computer system without authorization ...
I'm probably missing something, but the last time I looked I found C code in I think in relibc and one other spot I can not remember. I also noticed that when it's time to do "the fun stuff" every thing is prefixed with unsafe. So in the end it is still unsafe correct? Like I said though, I'm probably missing something.
Biting the hand that feeds IT © 1998–2020