You couldn't be more wrong you stupid idiot. /s
Partition
And go off to die in wars.
Let's say there is a user lmicroservice. I'm on a UI team. I don't get to tell the user service team what, or when, to implement any features.
I'm tasked with making a page displaying all the users who have a birthday this month.
User API service can only search by user id, email, display name, or nickname.
Now instead of just querying the goddamn database, a one line fucking SQL statement, I have to deal with the user team, getting them to first off even admit that my use case is valid, convince them to work on the feature, coordinate with them to make sure the query works, sorts the data the way I need, etc, et. al, blah blah blah.
They already have the next 3 sprints full so I'm sitting on my ass for the next month before I can test.
Meanwhile they decide they're gonna implement a super generic thing, and so despite me working on code that we talked about using an interface we talked about, they implement something else so i have to throw out half my work anyway.
Then when I finally start using it I find, oh, it doesn't support a sort, only returns 100 results max with no pagination, so if there's 200 this month with a birthday fuck the 2nd hundred they don't show up because they're implementing bare minimum and the rest is slated for another sprint.
And it was then, your Honor, I grabbed the lead dev for the user microservice and tossed him off the 9th story of the building.
/sarcasm
XML: Xtremely Masochistic Language
THIS IS THE HILL I DIE ON.
No one has ever recovered overwritten data, as far as anyone can tell. Go look it up. The technique was only a theoretical attack on ancient MFM/RLL hard drive encoding (Gutmann's paper). Even 20 year old drives' (post 2001, approx) magnetic encoding are so small there isn't an 'edge' to read on the bits. A single pass of random data is sufficient to permanently destroy data, even against nation-state level actors. Certainly enough for personal data.
from https://en.wikipedia.org/wiki/Gutmann_method :
Most of the patterns in the Gutmann method were designed for older MFM/RLL encoded disks. Gutmann himself has noted that more modern drives no longer use these older encoding techniques, making parts of the method irrelevant. He said "In the time since this paper was published, some people have treated the 35-pass overwrite technique described in it more as a kind of voodoo incantation to banish evil spirits than the result of a technical analysis of drive encoding techniques"
More reading material:
- https://commons.erau.edu/cgi/viewcontent.cgi?article=1131&context=jdfsl
- https://security.stackexchange.com/questions/26132/is-data-remanence-a-myth
- I can't find the page on wayback machine, but there was actually a contest someone ran to see if one, small, simple file on a new, unused drive could be recovered: https://www.root777.com/security/the-great-zero-challenge/
NOW THAT BEING SAID there is no harm in doing a secure, 35-pass overwrite other than the time, energy and disk wear. If watching all the bit-patterns of a DoD-level wipe using DBAN on a magnetic disk tickles your fancy, or you think this is a CIA misinformation campaign to get people to do something insecure so they can steal your secrets, please just go ahead and do a 35-pass overwrite with alternating bit patterns followed by random data. I can tell you that I believe in my heart-of-hearts, that one pass is sufficient.
Brave browser does an okay job, but remember under the hood everything is just a re-skinned Safari browser. There are content blockers, but AdBlock sold out (allows ads) and uBlock Origin doesn't work on iOS due to limitations Apple has in place.
no. POTS (plain old telehphone systems) still exists. None of that is VoIP, although it's almost certainly encoded to digital and sent as packets. VoIP is a very specific thing, and not the same as cellular or landlines.
And tomorrow is always just a day away.
cross-posted from: https://lemmy.cringecollective.io/post/9716
> Maybe some ALGOL 58 while we're at it too.
There was a sign in one of the games saying "Why wait for the elevator when you can climb" its an obscure reference to that.
cross-posted from: https://lemmy.cringecollective.io/post/9695
> Perfectly balanced as all things should be
cross-posted from: https://lemmy.cringecollective.io/post/9695
> Perfectly balanced as all things should be
Moroccan Zaalouk is a delicious and healthy dish that you can easily make at home. To start, you will need eggplants, tomatoes, garlic, oli...
cross-posted from: https://lemmy.cringecollective.io/post/5626
> can't make this shit up
cross-posted from: https://lemmy.cringecollective.io/post/5626
> can't make this shit up
Put a smile on your face Ten miles wide Looks so good Bring a tear to your eye Sweet cherry pie
In other news Exteter University is holding it's 24th annual "Hulk Hogan RULES Day"...
Attached: 2 images ยท Content warning: data+
Can you link to the data / source?
You can't do that, you're committing copyright infringement! Change game
to mygame
though, and you're golden.
Is that backlog per community, or per server? Because I was able to subscribe to other communities from the same server. I'm not an expert on the ActivityPub protocol but I thought information was pulled from my server, not pushed from the remote.
forever, in some cases.