Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)CM
Posts
6
Comments
33
Joined
2 yr. ago

  • Typically you put your independent variable on the X axis and the dependent on the Y. It now looks as if the more urgently you need to go, the closer people get to toilets (which, while not linear, will probably also be correct)

  • Password rotation isn't necessary anymore according to NIST. Use long/strong unique passwords combined with MFA.

    Furthermore, public wifi risk is overblown. As long as you ensure encrypted communication, you're good.

    This has no direct effect on privacy by the way.

    Source: I'm an information Security manager.

  • The 1990s just called. They want their article back.

    No one is still running a lot of bare metal. Everything is virtualized at the bare minimum, or containerized or Serverless code.

    Furthermore the article doesn't really teach you anything new except for the existence of the hypervisor layer. Threats and controls are mostly the same between physical and virtualized.

    :Edit: just saw you wrote this article. Sorry for the harsh criticism, but I stand by it. Try to be more accurate with your threat and control assessments or write about more niche technology.

  • EarthPorn @lemmy.ml

    Gasadalur, Faroe Islands, 4032 x 3024

    pics @lemmy.world

    Puffin nesting by a waterfall

    Nature Enthusiasts @lemmy.world

    puffin nesting by a waterfall

    pics @lemmy.world

    Sagrada Familia's beautiful lighting

    Travel Photography @lemmy.world

    The Italian Apennine mountain range

    Nature Enthusiasts @lemmy.world

    A fjord near Geiranger in Norway