Follow the money
Seems both sides are after a big pot o' cash - one protecting their envisioned future, one wanting to share the wealth (inbound). Unsure who is righter, but ICANN doesn't appear to be doing very well.
220 posts • joined 7 Jun 2012
"applying that power selectively every a few milliseconds, a humble phone can perform better than a company with a vast investment in server farms"
Selectively, and for a few milliseconds duration, I can run faster than Usain Bolt. Selections being that he's asleep, and I'm at the top of a large-ish hill.
Mine's the one with the track shoes still in the pockets.
I have mixed emotions about this. At one level - yes, great, providing some level of protection is good.
At another level, I'm not sure I'd want to brick my car and still face towing charges in the *hope* that they can fix the problem. For a limited number of occurrences.
And at the humor level, what a great opportunity to have the black-hat hackers provide their information in advance!!
I see it as Google setting an example. Yes, they had to let Kubernetes go in order to give it independence. They gave it a nice cushion in the $9M of services. I'm betting that AWS and Azure will step up and provide similar padding to the now-solo foundation.
I knew of someone who worked in an airline ticketing office at a military post. They could write tickets for any airline that serviced the destination requested. It wasn't bribery, but a lot of different airlines offered him perks to remember them when ticket-writing time came around. Azure and AWS aren't stupid. If Kubernetes works well with their playground (which it already does, but it could probably be better), they will also give the foundation some free playground space.
Prediction, not prophesy.
I just can't keep up with all the new emoticons coming down the pike these days. In what I thought was a perfect place for a smiley, I found this "R-in-a-circle" thingie:
"the newest and shiniest Azure toys may not be immediately available. Purists may well prefer things that way. ®"
What is this world coming to?
I would guess that Google could already determine which extensions are running.
I think all the commendards (and most of the readers of El Reg) understand that about Google. They can make their own choices about becoming the product (if it's free, *you* are the product).
This change doesn't alter that.
Remediation has been in the memcached documentation for years - I used it when I installed (since replaced) memcached at $WORK.
At the time, I thought "Nobody would be so silly as to leave that open, would they??" Then I did a quick search and found many publicly open. 'tain't like the bad guys have to wait on somebody else to compile a list.
I never thought about using the amplification against somebody - shows why I'm not in the black hat realm. Securing my own? Yup. Weaponizing? Never crossed my mind.
Back when I was a tike, I worked on an IBM 360 - an E30, if I remember right. It had an emergency power cutoff button on the front of the console, close to all the blinkenlights.
Nobody ever tried it, but the word was that the button would trigger a guillotine blade with a heavy weight, physically severing the power connection to the machine.
And of course requiring a visit from the friendly (and expensive) IBM service tech to repair.
Icon for the only job-sustaining reason for hitting the button ==>>
Biting the hand that feeds IT © 1998–2019