I think the desktop is evolving, and may one day become effectively irrelevant, But there is still a long way to go before local compute goes away, which means a local OS is still needed.
I think the desktop is evolving, and may one day become effectively irrelevant, But there is still a long way to go before local compute goes away, which means a local OS is still needed.
In the server world, yes. The desktop is the place that needs to be won over.
Large office buildings have been cringe to me for a few years. And wearing suits to the office, which just look like personalised school uniforms to me.
Posting one for Firefly!
I dual boot windows and EndeavourOS. Every 6 to 12 months I make a concerted effort to make the switch 100% but it hasn’t worked out yet. So while Linux is great windows is unavoidable. In this use case I suspect managing Windows tools will be simpler, though I agree that effectiveness next to Linux options won’t be equal.
That was kinda my point. Securing a laptop that will have access to data you want to protect from loss is a near bottomless pit of issues. There comes a point you have to do a risk assessment and apply a level of security that meets your legal requirements and contractual obligations. I’m sure this is all doable on Linux as well but the low cost / easily available tools are mostly for Windows.
I suspect that taking the “secured remote session” approach is probably good enough for their needs. It just needs a client app you can trust to respect the security rules they want to enforce (no screen shots, no screen recording, no data transfers for any sort, etc).
OCRing what is on screen is not really stoppable unless you force them to keep their camera on so you can monitor them 24/7. But if you try hard enough there is usually a way around most security measures.
Either way, they need to decide what the risk impact vs likelihood profile is, and what the business can tolerate. They’ll need to discuss it with legal and data protection folks to assess that.
One tip is to embed records and values that look meaningful, but are unique, into the copy of the data given to the specific employee. This can be used to potentially prove that a data breach was a result of something that employee did. We like to put QUID’s as invisible watermarks in document headers. These trigger our DLP systems which is always funny cos its usually an employee who is leaving and wants to keep something. I love those conversions.
“Easy” from the point of view there a lots of off the shelf tools to help you do it that are easy to understand.
Yes, it is still excellent even by today’s standards, and you can see why so many new shows followed their big budget approach.
There are a couple small parts that can be a bit hard to get through, but for me that’s just part of the situation they are in, and it is all totally worth it.
No matter what anyone thinks of the ending, it does at least have a conclusion. You are not left wondering or half expecting a sequel.
This is the only reliable solution. To expand:
The real answer is you are probably screwed without investing a bunch of time, effort, and cost.
You might get away with more basic security measures if the user has very limited IT knowledge.
I suggest getting legal advice before you give the user access to your data in the manner you intend.
The phrase is “I Couldn’t care less”.
Sry. Long day. Still in pedantic mode.
To be consistent on a physical level.
I play guitar and games like rocket league, things that require excellent physical dexterity, and consistency is a big factor. I struggle to repeat physical actions the same way every time. I practice lots, and I’m reasonably good at both things (imho), but I know I screw up more than most people because I can’t repeat things the same way every time.
The ending of Battlestar Galactica.
Can confirm. There are a few web sites that have video evidence. Google it, and thank me later.
Omg now they’re trying to profile where you keep your shit so their hackers can find your porn stash more efficiently. Don’t tell them Pike!
Interesting. I never solved the issue so I’ll give this a go.
Omg this is getting silly. Asklemmy really is just a user profiling feed.
I’m looking for evidence that this post is real. It is too perfect, like the stuff chatgpt produces. But I’m old and very cynical.
One alternative is her low IQ diagnosis was off. I suggest seeing someone to have that rechecked. If it turned out to be closer to the average 100 it could make her feel more positive about her own potential.
Like I said undertaking is bad. No excuse for doing it, except where it is legal. If someone goes under speed limit in lane 3 you can undertake I believe, though I would still be super cautious.
Obviously speeding is illegal, and I’m not suggesting anyone should support do so. But we should let the police deal with it.
Just to clarify, you don’t think it is ok to sit in lane 2 or 3 at the speed limit if there is room to move over ? Not doing so is also illegal in the UK.
While the majority of people stay within the law (+/- 10%) there are enough people behaving badly on the roads that you should always take that into consideration.
This is a great example of the is/ought problem. You can try your best to make the “ought” true, but don’t neglect what reality “is”. On the road that means; assume there is an idiot nearby, and drive in a way that keeps you safe from their shit.
Yip, or at least be heavily discounted.