Ray William Johnson on =3. I don’t know why I stopped watching. At some point it felt “too” polished and started getting ads in it.
My holders were mounted vertically, so there is no over and under, only left or right. I’m so confused as to which way to put it.
How close are you to your 666th comment?
I think he was meaning because of how easy it is to spoof and intercept sms. Use some thing like OTP that’s a common standard instead.
VMware went with Purple for their hypervisors so you get a PSOD instead. Always was fun when you’d hit the console for a server and get greeted by that instead of the yellow and black split screen.
Cool cool. Remove oil and gas subsidies and let’s see how much the true TCO is for owners (not manufacturers)
That’s why I liked Deep Impact. It went must more (potentially) realistic than Armageddon. But the latter wanted its “common man, that people can relate to, saves the day” trope.
I tend to lean towards neutral good it seems
And why leave them nameless? Name and shame. You can get multiple people asking at that point and apply more pressure.
I know others will expand on this, but in the past there were two main “bases”: Debian and Enterprise Linux (EL). The main differences were their package managers and how the handled things in init.d and configuration like networking. This was due to how they made their modules iirc.
So a lot of distros forked off of these two bases rather than reinvent the wheel. Ubuntu is based off of Debian and CentOS based off of RHEL.
There’s probably more nuances but that should give you an idea.
My favorite is seeing developers directly reach out to a DB of another microservice because “it’s just easier to pull the data from there”. One of the few times I’ve literally said “bruh”
What? No. This is complete hyperbole and speculation, and off at that too. Their Authenticator is used for personal accounts as well as managing 3rd party TOTP tokens. It’s no different than Google Authenticator, DUO Authenticator or Okta Authenticator. I could see that on a far end if they come out with a business only version, but given that everything is backed on their same platform it doesn’t behoove them to do that.
You’re thinking of Intune and the Company Portal app. That’s where the device enforcement comes into play. Authenticator can be installed on any system regardless of its state and their enforcement policies.
Your non-fiction books were all the other textbooks in all the other subjects. Literature specifically focuses on fiction, not just “books”
Just like using illegal aliens, why is just AT&T getting in trouble and not the politicians that took the bribes… oh wait
My thoughts on software in general over the past 20 years. So many programs inefficiently written and in 4th level languages just eats up any CPU/memory gain. (Less soap box and more of a curious what if to how fast things would be if we still wrote highly optimized programs)
You can have someone else do it for you. You just need the money. Give yourself Executive Producer credits, tell them your vision and pay them to make it happen.
Which is slightly better than some places I’ve seen cut the staff and keep the interns on to run with what’s left
Repost, like and reply are metrics that can be used to gauge how popular posts are, by removing that they can push whatever they want as “popular” with no real way of knowing. This is like Netflix Top 10 with no insight into the metrics.