• 0 Posts
  • 199 Comments
Joined 1 year ago
cake
Cake day: June 23rd, 2023

help-circle

  • Wary why? I work remotely in IT and manage a ton of Linux systems with it. Because my company has a large number of remote employees they limit us to Windows or Macs only, and have pretty robust MDM, security, etc. installed on them. Since MacOS is built on top of a unix kernel it’s much more intuitive to manage other unix & linux systems with it.

    Personally I haven’t used Windows really since before Windows 10 came out, and as the family tech support department I managed to switch my wife, parents, brother, and mother in-law all to Mac’s years ago as well.






  • The problem is computer vision has a LONG way to go before it’s truly on par with human eyesight. Musk loves to crow how cameras are sufficient since we use our eyes to drive.

    The thing is, eyes have special neural circuits that detect motion. They essentially filter out unnecessary information and send just the motion details to the brain. This prevents the brain from being overloaded with every detail the eye constantly sees.

    And being overloaded with everything is exactly what computer vision currently does. It’s just a stream of images that the computer must analyze completely. So it’s working exactly opposite to how the eye & brain works.




  • I recall when I bought my first hybrid that the dealer said there were something like 15 different computers controlling things, from the ICE engine to the transmission to the charging of the battery, etc. They weren’t networked together.

    I also once ran afoul of a software bug in the ECU of a Honda CR/V. That’s the embedded system that manages the whole operation of the engine - from fuel injection to timing to emissions etc. As they progress through model years they use different ECUs that require different software. Even though I work in IT, I wouldn’t feel comfortable trying to update it myself, given the different models, firmware revisions, etc. I was more than happy to take that car to a dealer to have them confirm my car had buggy software and to upgrade it to the right new version.





  • The use of the game controller, Excel, etc. all goes to document a pattern of cutting corners. True, these corners are tiny compared to the issues of the overall design of the sub, but it demonstrates a long pattern of overall behavior.

    This reminds me a bit of when I was a juror on a criminal trial. The prosecutor detailed a long string of seemingly small/inconsequential things that ultimately helped demonstrate a long pattern of behavior. That pattern definitely helped with our deliberations.



  • My employer had an EV cert for years on our primary domain. The C-suites, etc. thought it was important. Then one of our engineers who focuses on SEO demonstrated how the EV cert slowed down page loads enough that search engines like Google might take notice. Apparently EV certs trigger an additional lookup by the browser to confirm the extended validity.

    Once the powers-that-be understood that the EV cert wasn’t offering any additional usefulness, and might be impacting our SEO performance (however small) they had us get rid of it and use a good old OV cert instead.



  • IphtashuFitz@lemmy.worldtoLinux@lemmy.ml*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    26
    ·
    2 months ago

    Back in the 90’s before the days of Windows 3.0 I had to debug a memory manager written by a brilliant but somewhat odd guy. Among other thing I stumbled across:

    • A temporary variable called “handy” because it was useful in a number of situations.
    • Another one called son_of_handy, used in conjunction with handy.
    • Blocks of memory were referred to as cookies.
    • Cookies had a flag called shit_cookie_corrupt that would get set if the block of memory was suspected of being corrupt.
    • Each time a cookie was found to be corrupt then the function OhShit() was called.
    • If too many cookies were corrupt then the function OhShitOhShitOhShit() was called, which would terminate everything.


  • Port 22 is the default SSH port and it receives a TON of malicious traffic any time it’s open to the whole internet. 20 years ago I saw a newly installed server with a weak root password get infected by an IP address in China less than an hour after being connected to the open internet.

    With all the bots out there these days it would probably take a lot less time if we ran the same experiment again.