Yep. It seems like for this application you'd want a larger one, a few feet across, with a nice shiny metal foil coating for the radar to bounce off. So, not a $1 balloon.
This approach seems much more likely to induce an incident. It’s an adversarial approach; it’s how you end up shooting people for filming. Constant vigilance! Shoot the nurse on his knees, to be safe!
Your list is correct in favoring intangibles. Ideas underpin all technology and are immune to entropy. Not so MS Excel, which is just a rock tricked into doing particularly structured mathematics. Spreadsheets, the concept, are significant; their implementation is incidental.
Good question. It’s a human who posts tech opinions on the internet. Recently I met one named bigyabai - ironically a rather small tech personality, but one nonetheless.
Chrome extensions shouldn’t be in the hands of users, no matter their title. CEO included. As a device sysadmin I feel this strongly. None of you can be trusted to vet extensions. Honestly anyone who uses vanilla Chrome has a suspect threat model.
On the rest I rather agree with you. General-purpose computers are key tools over which users should be admin. Sysadmins provide a security backstop. Full lock down is the sign of an unhealthy understanding of how the org’s value is actually created.
Also if you can’t figure out how to get around the Chrome extension restriction, you either have remarkably competent CPEs (not me, so unlikely), or you’re not trying hard enough. Go download Canary to start.
Depends on the OS and the “MDM rules.” For instance, it resides in a separate preference domain identifier on macOS. Your sysadmin must deploy “MDM rules” - a profile - which applies to Canary specifically.
They often don’t. Moreover some of the most common implementations of Apple’s MDM protocol also don’t do so automatically.
If they have remembered Canary, just compile your own Chromium with an amusing identifier.
Ah, so you admit that ICE’s public work of late has nothing to do with tech worker’s visas? They can just slide by while the more vulnerable are harassed?
How can this entire thing be written - including the observation that most entrances are “in or near” Christian churches - without even mentioning the extraordinarily obvious conclusion of forced or voluntary anchorites?
There is a deep tradition of chthonic ascetic monasticism
in Christianity. Many, many Churches from this same period have attached anchorite cells.
It is easy to imagine similar cells/tunnels being used, unremarked, by choice or coercion.
Why get philosophical and not just deal with the reality that 95% of the industry are dealing with languages that just compile down to C? We are already at some of the highest levels of abstraction thus far in the history of the trade.
reply