@againsthimself@ioc.exchange avatar

againsthimself

@againsthimself@ioc.exchange

This profile is from a federated server and may be incomplete. Browse more on the original instance.

againsthimself, to random
@againsthimself@ioc.exchange avatar

Look, I like olive oil too, but ...

againsthimself, to random
@againsthimself@ioc.exchange avatar

Misread this as "sense of mortality" and ... umm ... that's dark, man.

againsthimself, to random
@againsthimself@ioc.exchange avatar

Seems like it would be more efficient to keep the heavy outer part fixed and just spin the lighter inner part.
https://mstdn.social/@stux/112394630528565459

HalvarFlake, to random
@HalvarFlake@mastodon.social avatar

Waiting for a delayed flight, some idle thoughts on what Google needs to fix itself:

  1. Find a replacement for Sundar. This person needs to be both able if articulating a coherent vision for Google as a company, and inspire great engineers to want to work on great problems.
againsthimself,
@againsthimself@ioc.exchange avatar

@HalvarFlake a typical cycle of tech company leadership seems to be tech->ops->finance->tech. Not sure if many companies successfully revert from ops leadership back to tech without first trying handing over the reins to finance.

againsthimself,
@againsthimself@ioc.exchange avatar

@bert_hubert @HalvarFlake Apple (when Jobs returned) and Intel (Gelsinger) are two examples that come to mind.

againsthimself, to random
@againsthimself@ioc.exchange avatar

Microsoft's deja-vu security moment.

Nadella, 2024: "If you’re faced with the tradeoff between security and another priority, your answer is clear: Do security."
https://www.theverge.com/24148033/satya-nadella-microsoft-security-memo

Gates, 2002: "So now, when we face a choice between adding features and resolving security issues, we need to choose security."
https://www.wired.com/2002/01/bill-gates-trustworthy-computing/

againsthimself, to random
@againsthimself@ioc.exchange avatar

Has there been any PL work on languages with built-in support for software product lines (multiple variants of the same software)?

Conditional compilation could fall into this category. But that's just one part. The problem usually gets solved outside of the language (revision control, build system, etc.).

cc @regehr

againsthimself, to random
@againsthimself@ioc.exchange avatar

“Thus it has often been said about the British Infantry in World War I that experienced working-class sergeants managed the delicate task of covertly teaching their new lieutenants to take a dramatically expressive role at the head of the platoon and to die quickly in a prominent dramatic position, as befits public-school men. The sergeants themselves took their modest place at the rear of the platoon and tended to live to train still other lieutenants.”

cc @thegrugq

againsthimself, to random
@againsthimself@ioc.exchange avatar

"When you have eliminated all which is impossible, then whatever remains, however improbable, must be the truth." - Sherlock Holmes

"Infeasible alternatives should not be eliminated if there are no feasible alternatives." -NASA
https://www.nasa.gov/wp-content/uploads/2023/08/nasa-risk-mgmt-handbook.pdf

againsthimself, to random
@againsthimself@ioc.exchange avatar

Since everyone is offering an xz take, here's mine: I am worried that the "insider threat" will lead to working environments where everyone treats everyone else with suspicion. That's not healthy (not for the organization, not for the individuals).

againsthimself, to random
@againsthimself@ioc.exchange avatar

Brief moment of panic yesterday when I clicked on free in-flight wifi and saw "NSO access" in the url bar. 😬

The full url was sponsoredaccess.viasat.com

againsthimself, to random
@againsthimself@ioc.exchange avatar

The fundamental conclusion emerging from AI security research seems to be that the system's output should be considered as sensitive as the most sensitive data in the training set (everything leaks) and as untrustworthy as the least trustworthy data in the training set (everything contaminates). This has echoes of the Bell-LaPadula and Biba models. Of course, these models failed because even if they were theoretically sound, they were unworkable in practice. The workaround was to insert humans in the loop to make authorization decisions. But the whole point of AI is to take the human out of the loop. Interesting dilemma.

againsthimself, to random
@againsthimself@ioc.exchange avatar

Wait, that's not a plane.
[Alt tex: rocket launch in the evening sky]

image/jpeg

againsthimself, to random
@againsthimself@ioc.exchange avatar

Please tell me that I'm hallucinating, that this is just a bad dream.

againsthimself, to random
@againsthimself@ioc.exchange avatar

Hanging out in the common area at , come say hi!

againsthimself, to random
@againsthimself@ioc.exchange avatar

"In response to the watchdog’s report, the Office of the National Cyber Director said that performance measures don't really exist in the cybersecurity field."
https://cyberscoop.com/gao-national-cybersecurity-strategy/

againsthimself,
@againsthimself@ioc.exchange avatar

@andrei_chiffa @Viss can we really say what impact a particular set of protective measures will have one expected incident costs?

againsthimself,
@againsthimself@ioc.exchange avatar

@cigitalgem but I don't think it has to be that way. That's a policy choice we made.

againsthimself,
@againsthimself@ioc.exchange avatar

@andrei_chiffa @Viss I agree that a solution is theoretically possible, I'm just saying that we do not have it in our hands today.

againsthimself,
@againsthimself@ioc.exchange avatar

@cigitalgem have I made you watch this yet, Gary? https://youtu.be/qGD93mJ2ZAU?si=woqzkA1Aug2av8W_

againsthimself,
@againsthimself@ioc.exchange avatar

@cigitalgem let's catch up when you're in town!

againsthimself, to random
@againsthimself@ioc.exchange avatar

"We also employ a variety of [...] ideas to help us understand the phenomena in question, and do so with an attitude of theoretical promiscuity."

[brb, adding "theoretically promiscuous" to my bio]

againsthimself, to random
@againsthimself@ioc.exchange avatar

But does it integrate with analytics and as distribution libraries?
https://mastodon.social/@V4N4D1S/111849884652383845

lcamtuf, to random

deleted_by_author

  • Loading...
  • againsthimself,
    @againsthimself@ioc.exchange avatar

    @lcamtuf connectivity and payments when going on runs (don't need to bring phone or wallet, but can still buy a coffee, be reached, etc.)

    lcamtuf, to random

    deleted_by_author

  • Loading...
  • againsthimself,
    @againsthimself@ioc.exchange avatar
  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • everett
  • osvaldo12
  • magazineikmin
  • thenastyranch
  • rosin
  • normalnudes
  • Youngstown
  • Durango
  • slotface
  • ngwrru68w68
  • kavyap
  • DreamBathrooms
  • tester
  • InstantRegret
  • ethstaker
  • GTA5RPClips
  • tacticalgear
  • Leos
  • anitta
  • modclub
  • khanakhh
  • cubers
  • cisconetworking
  • megavids
  • provamag3
  • lostlight
  • All magazines