Wie steht es denn inzwischen mit den Antworten auf per #ActivityPubPlugIn aus #WordPress veröffentlichten Beiträgen? Werden die auch im Blog gepostet? Und kann ich dann von dort wieder antworten? Oder funktioniert ein weiterführendes Gespräch nur unter Einbeziehung des Autorenaccounts? Ist das am Ende ohenhin #bestpractice?
@pfefferle Vielen lieben Dank! Gibt es bereits irgendwo einen Beitrag zu #bestpractice in Sachen #Datenschutz bei der Einbindung via #ActivityPubPlugIn ? Wenn nein, wollen wir einen zusammen erstellen? Dann würde ich @thsch dazu bitten.
Mit dem Regio zum Bahnhof, weiter mit der Tram in den nächsten Bezirk und für den letzten Kilometer auf das Fahrrad oder den E-Scooter schwingen? Keine ungewöhnliche Reisekette – und mit einem guten Buchungssystem problemlos machbar.
Mobility-as-a-Service nennt sich das, wenn sich verschiedene Mobilitätsangebote so bequem kombinieren lassen, dass ein eigenes Auto schlicht überflüssig wird.
It's genuinely stunning to me to find out how many people think "I'm not interesting, why would someone hack me?"
It's because you're "not interesting" and identity theft works best for people who aren't public figures.
Be smart...
While we're here, fill in this quiz:
First job. - Stop
Current job - Sending
Dream Job - Your
Favourite food- Potential
Favourite dog - Passwords
Favourite footwear- Or
Favourite Candy bar - Memorable
Favourite Ice Cream - Data
Your Vehicle colour - To
Favourite Holiday - People
Night owl/early bird - Who
Favourite day - Collect
Tattoos - This
Favourite colour- For
Do you like vegetables - Social
Do you wear glasses - Engineering
This is a genuine request for input from the community.
A member of upper-middle management for a midsized internet technology company recently explicitly stated that they didn't want to install the company's management agent on their device. "I think for leadership, that sort of thing should be optional" was the quote.
This person is intelligent and capable, and is otherwise someone I would respect as a fellow member of the same circles and business.
This is so against axioms that I hold almost self-evident, that I realized I don't even have good arguments. I can endlessly find corners of the internet where this would be akin to "Pi is exactly 3!" at a Mathematics convention, but is there ever generally a time or company's infrastructure configuration where simply ignoring or allowing to be optional endpoint security wouldn't just be blatantly stupid?
Besides being aghast and expressing sharp chastisement, how does someone go about even beginning to describe why this cavalier attitude is so abhorrent?
Is there some situation where it's actually a kosher methodology or mindset?
I think I might just be so thrown off guard by the concept that I just can't think of even an obvious answer to start with here.