*YOU * apparently need it for streaming, etc.
I actually understand how TCP/IP works and don't need it at all.
At the very worst, there is this thing called nmap that will tell me everything I need to know about any device on my network.
245 posts • joined 19 Jan 2016
To get fewer features. Changing I/O ports, no SD slot etc makes the current model less attractive than what came before (although an 11” MBA has not has a SD slot for at least the last 3 years).
So far as running Photoshop on an iPad...ok, and the rest of the adobe suite? Hook it up to a calibrated monitor? What if I do a teathered capture? Oh...no port for that. And what if I use Capture One rather than Lightroom? No port to IOS for that...
Someday a tablet could be designed with the proper ports. With RAM and GPU capable of manipulated a >60MP image, connect to an external monitor, network and storage system. It would be a bit bulky...maybe you could permanently attach the keyboard so it could also serve as a screen protector.
Then, you could call it a “Laptop”
F’kin idiots at Apple....
Nimble storage made that play but much earlier in the company lifecycle. Had they stayed with the original go to market, Nimble would be remembered as a NFS caching appliance that few people once tested.. Varun (Founder, original CEO and storage legend) went to the board, killed the Cacher product and built the block storage device we all know. That was just under a decade ago.
if you are hosting public content, you will have publicly accessible buckets. The existence of public buckets doesn't mean that the sensitive info is in *THAT* bucket, even if you are Experian.
I know companies that host their publicly available content in Amazon rather than a CD network, and also was other buckets that are properly secured...AWS advanced certification and all that...
AWS has a self certifying protocol that is pretty comprehensive, actually. If you have actually paid attention and used the protocol to ensure you are following best practices, those buckets have been secured.
Completion of the protocols is then reviewed by Amazon and if passed “Advanced Parter” status is bestowed unto that company
To complete the protocols isn’t exactly trivial, but not impossible or even unlikely. Adherence to the protocols may slow down development slightly at worse until developers figure out how to work on their environment in a secure manner.
My opinion is that there is a certain class of software companies that have completely embraced “Agile” and behave like they are building gaming apps for cell phones, even if they are really building enterprise products that require a much more respectful attitude re: security than the current “We can do it this way and fix it properly if anyone notices”.
I studiously avoid most of this fluff as unneeded to my lifestyle... if I need to know what’s in my refrigerator I open the door etc.
However, recently I was gifted a sous vide cooker. If you’re not familiar, this is a recirculating water heater that you use to slow cook meat to specific levels of doneness. The great hook is, it is impossible to overcook with this method. So long as you cook for the minimum time, the meat is just done, whether you like rare, medium well, etc. The method works great.
If there was ever a device that did not need network connectivity, this is it. However, to use it, I am supposed to ...
Download an app
Connect to the device via Bluetooth
Use the app to identify the device
Configure the device for WiFi connectivity, which requires me to register with the manufacturer (who of course will allow me to identify myself via Faecesbook...)
Then, I can heat water.
Alternately, I can use another device, that has a power switch, and a rheostat to set the temperature.
I use that one.
Lack of headphone jack was enough to stop any upgrade plans. These “Innovations” make the phone less functional.
Thank goodness the old 6S is still running well, because the whole Apple vs Android thing is turning into the last presidential election...there are no good choices.
Tintri was one of the 2nd generation Flash startups, like Nimble and Pure. So, if they would have started 10 years earlier, they would have been waiting a long time for Flash prices and capacity to hit the inflection point that made them possible.
I know in 2012 Tintri was the company that worried Nimble the most, but (IMO) they made a couple of strategic design decisions that impacted early adoption. The singular focus on VMWare meant a much smaller addressable market than the Nimble or Pure block storage play.
Coverage of this thing is generally horrible.
How can you actually detect if your device has been compromised?
How do you mitigate the attack?
What are the specific attack vectors?
Three pieces of information that would be good to have in an article of this nature.
MY router isn't on the vulnerable list...but so what? A lot of routers that weren't on the first list now are listed as vulnerabe. There is no reason to trust that new list is comprehensive.
For my fellow commentards - patting yourself on the back because you adopted some other router brand/platform/homefgrown kludge isn't at all helpful if there is no information given on how to detect a compromised device.
Logged into my (ASUS, but not the listed as vulnerable model) router , found the router telling me "the fiirmware update failed"...and I hadn't triggered an update. Additionally, Username and password have both been changed from the defaults per every best practice ever. So, Whiskey Tango Foxtrot??
Please fire the monkey PR flak that came up with that nonsensical statement, and stupid stupid catchphrase. You are not “Growing” in any real world sense if growth entails making your workforce shrink.
As a corporate entity, DXE has no reason to exist other than to dump Megs losses and make HPE slightly more attractive. It didn’t work, either.
There are too many giant IT shitshows in the world.
HPE also sells Nimble - better availability numbers, telemetry enabled proactive support via infosight but HPE keeps thinking that Nimble is SMB and 3PAR is enterprise.
With Nimble, even if the first event happened, data would be available to identify root cause and prevent outage # 2, 3, and 4.
Despite what marketing tells you, 3PAR will NEVER be integrated into Infosight to the level Nimble is, because Nimble was built from he beginning with Infosight in mind. 3 par wasn't and inserting the sensors into the code base now can never be completed, especially since Rod is no longer there to oversee the effort.
Biting the hand that feeds IT © 1998–2019