|
Fees will be added to the Apple Card in 5..4..3...
|
|
|
|
|
I just can't wait to get my new iSinglePointOfFailure!
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Sending a link instead of uploading a massive image is just one trick humans use to convey information without burning through data. In fact, these tricks might inspire an entirely new class of image compression algorithms, according to research by a team of Stanford Univeristy engineers and high school students. We can't even agree on how to pronounce GIF, so how are we to compress images?
|
|
|
|
|
Kent Sharkey wrote: Sending a link instead of uploading a massive image is just one trick humans use to convey information without burning through data.
Exactly how does that work? I can send a link of a 1000 byte image to a 1000 people, and assuming they all click the link, that's 1,000,000 bytes transferred.
Or I can compress the 1000 byte image to say, 200 bytes, send that image to 1000 people, and the data transfer is 200,000 bytes.
What am I missing?
Latest Article - Azure Function - Compute Pi Stress Test
Learning to code with python is like learning to swim with those little arm floaties. It gives you undeserved confidence and will eventually drown you. - DangerBunny
Artificial intelligence is the only remedy for natural stupidity. - CDP1802
|
|
|
|
|
You're not applying enough layers of BS.
By using a slightly more advanced version of the crap from that article by including www.Google.com in this post I've included a compressed version of the entire public internet a compression ratio of something like a trillion to one.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
|
Then provide better.
I’m more than a little tired of the complaints, so perhaps someone else should be doing this.
TTFN - Kent
|
|
|
|
|
But shooting messengers has been a popular hobby for, like, forever!
Me, I prefer to take the p1ss out of the people who inspired or sent the message.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
And that's (the latter) is appreciated.
TTFN - Kent
|
|
|
|
|
Kent Sharkey wrote: that's ... is appreciated OK, what idiot sent this message!
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Lost track of my verb due to parentheses. Quite an idiot, yes.
TTFN - Kent
|
|
|
|
|
Computer scientists astonished to learn that computers are dumb as sh*t.
|
|
|
|
|
Which is only because humans are dumber than sh!t
#SupportHeForShe
Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson
You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun
|
|
|
|
|
So, in future, if you want to look at a picture on the Interwebs, you'll have to draw it yourself, based on a description?
I really can't figure out exactly what it that they're trying to prove -- unless it's that a picture's worth a thousand words, which means they've wasted their time.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Mark_Wallace wrote: I really can't figure out exactly what it that they're trying to prove I think they are trying to find out the limit for the amount of bullshit one can publish before getting the funds taken away...
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
.NET Platform Invoke (PInvoke) makes it easy to consume native libraries. In this article, we’ll take a look at using PInvoke for Linux system functions. "Burn the heretic! Kill the mutant! Purge the unclean!"
|
|
|
|
|
Kent Sharkey wrote: PInvoke for Linux
Or call it XInvoke.
#SupportHeForShe
Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson
You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun
|
|
|
|
|
How is that pronounced?
"Ex-invoke", or "zinvoke"? Here we are, right back at the GIF pronunciation dilema again...
".45 ACP - because shooting twice is just silly" - JSOP, 2010 ----- You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010 ----- When you pry the gun from my cold dead hands, be careful - the barrel will be very hot. - JSOP, 2013
|
|
|
|
|
'nix-invoke
#SupportHeForShe
Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson
You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun
|
|
|
|
|
The app, Family Locator, built by Australia-based software house React Apps, allows families to track each other in real-time, such as spouses or parents wanting to know where their children are. It also lets users set up geofenced alerts to send a notification when a family member enters or leaves a certain location, such as school or work.
But the backend MongoDB database was left unprotected and accessible by anyone who knew where to look.
...
None of the data was encrypted.
None of this fail is a surprise either.
One thing I'm wondering about though. We virtually never see stories about OtherNoSqlDatabase or AnySqlDatabase being left wide open on the internet and megapwnd, it's always Mongo. Is there something specific about Mongo that makes it particularly prone to this sort of fail?
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
|
MongoDB is the most popular NoSQL technology, and it's marketed to beginners and amateurs more than other NoSQL technologies are.
If an inexperienced developer botches security, they probably do it with technology that's common among inexperienced developers.
|
|
|
|
|
Then why don't we see a similar number of mysql databases left wide open to the internet? It's the default backend to the most popular language among the clueless, PHP, but those sites are almost always pwnd via the webserver not by directly siphoning the database.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
The MySQL team has had a lot more time to idiot-proof their default installations and beginner guides, while the MongoDB team is still focusing on other things first.
Read the following article for its side notes (which reveal insights into MongoDB's development):
https://www.defmacro.org/2017/01/18/why-rethinkdb-failed.html
In any case, (whether you like it or not) a few security disasters won't slow down MongoDB adoption, but slowing down development to handle random things (such as idiot-proofing the product) can have large negative impacts on adoption rates.
|
|
|
|
|
For the same reason PHP pages are the most vulnerable to attacks and software written in Visual Basic usually sucks.
Give monkeys dangerous tools, get zillions of injured.
GCS d--(d+) s-/++ a C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- r+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|