I’d go as far as to say it’s similar to a landlord requiring a key to access the apartment your renting from them. Sure, they probably won’t abuse that power, most don’t, but the doesn’t mean they can’t.
The bigger picture to me is it’s pretty clear then internally, Microsoft views you as a “tenant” of THEIR OS. Not a purchaser. This is why they use the words “This PC” in replace of “My PC”.
Yes, I think we can absolutely say that companies are pushing for consumers to use the cloud instead of their own hardware, but in this context, I’d say it’s more egregious showing their mindset that you’re just renting their software from them.
Finished my annual review and was told I was appreciated and loved by the clients I’m working with (contractor). Then was promptly told they’re rating me “meeting expectations” as they expected I’d do well.
Also no raises this year (3rd in a row)
Also also they may be pushing for 4 days, 8 hours (tracked) in office. My commute is an hour and a half each way.
looking at glass door, I’m paid less than even the bottom band for my position. But the market is shit as are my interview skills… mix that in with toxic management eroding my self esteem over the past few years to a point of learned helplessness.
Dunno what to do friends.. Wish me luck out there.
I JUST ran into this issue myself. I’m running Proxmox on an old Laptop and wanted to use its 750M…. Which is one of those legacy cards now that I guess means I’d need to downgrade the kernel to use?
I’m not knowledgeable enough to know the risks or work I’d be looking at to get it working so for now, it’s on hiatus.
Synthient wasn’t hacked, as a security company, they aggregated tons of stealer logs dumped to social media, Telegram, etc.
They found 8% of the data collected was not in the HIBP database, confirmed with some of the legitimate owners that the data was real.
They then took that research and shared it with HIBP which is the correct thing to do.
I was also thrown off by the title they gave it when I first saw it, a security company being hacked would be a terrible look. but they explain it in the article. Should probably have named it “list aggregation” or something.
"let your motto be 'eternal vigilance is the price we pay for liberty.'"
Freedom dies in the silence of the many at the hands of the few. We must always be adamant with opposition, because it’s hard to undo what has been done. The easiest way to put the genie back in the bottle is never letting it out in the first place.
Yes, correct. You can always locally host it as there are other benefits like unifying user credentials for all your hosted services. But its primary design is to be hosted externally.
currently I host everything locally, but I don’t like the fact that anyone visiting my domain can easily find my address.
I’m in the process of determining on if I set up Pangolin myself or not.
Another huge benefit is higher availability.
(ex. If my internet goes down at home, I won’t know until I try to connect, but if I have an external service and it’s monitoring that connection, it can inform me when it loses connection)
Price is certainly something to consider when weighing its value for your setup
The connection between your Pangolin service (hosted outside your network) and your LAN is through a VPN. Essentially you’re creating a proxy that you can point your domain address at which isn’t your house's IP address. Plus then everything inside your network is still secure behind your VPN.
So you connect to Pangolin, and Pangolin routes the traffic to your network.
Does anyone know of any good resources on writing good documentation? It’s a thing I’m weirdly passionate about and absolutely want to get better at for my own sanity and for others as well if I can contribute.
But it seems like it’s a very under discussed subject..
Veronica Explains has a really good video talking about how much of a dead skill it is now from the standards it used to be.
“Working Effectively with Legacy Code” by Michael C. Feathers
In my opinion, we treat it the same as any spaghetti code