Until recently, thought it was also named after Pythagoras, with the snake being a double meaning.
Until recently, thought it was also named after Pythagoras, with the snake being a double meaning.
My first thought was also that it’s a Pi bottleneck. I have a 4b, and I don’t think I would really trust it to handle some of the higher-quality streaming. Maybe just barely.
lol you are correct. I meant to reply to the other guy. Low on sleep like many of us here
This happened because a file that CrowdStrike pushed out, which by their own processes is not one that is signed, was immediately pushed out with one of their updates. This update was pushed directly through CrowdStrike’s own method, not via Windows Update. CrowdStrike maintains this capability in order to quickly respond to and prevent security threats. The fact that they have .sys files that aren’t signed is crazy on its own, and a huge screwup by CrowdStrike. So many companies relied upon and trusted this company because up until now, everybody considered it a great product, so it was extremely popular and prevalent. It’s been a huge wake up call for everybody in I.T.
deleted by creator
Maybe a rogue entity trying to anonymously use it to train an AI or LLM. Either for its data or to learn how to more effectively attack.
I work in I.T. for a healthcare company. Ascension is a pretty large one. The bigger a company gets and the faster it grows, the more it takes on a diversity of varying technologies that all need to be managed, migrated, killed off, merged, hardened, etc. It’s a difficult job especially for healthcare. I know that the company I work for is working very hard to keep up with things, but it’s a logistical nightmare. You MUST have very smart people in charge that have the right priorities. You have to have information channels open to make sure administration knows what the potential issues are. Compartmentalization of information and access. There are so many potential points of failure it’s insane. And then there’s the most important thing of all: making sure all employees are educated enough that they don’t let their credentials get compromised.
Things are getting worse in general because of how hard it is to stay on top of everything nowadays. I just recently got a couple of letters in the mail about my info being leaked by some companies that had my info. I just have to do my part to stay on top of my own responsibilities, watch my own identity and finances, and make sure those around me are being secure, as well. Everybody needs to know how important this is, and many do, but I don’t think enough people really understand or make it a priority.
HHS is instituting new rules for healthcare (and other industries) to help track and respond to these things. The government is getting very involved with this now. I hope it helps.
We used to have ramp newbies handle the lavs as a sort-of right of passage. The Lav fluids we called “blue juice.” One day I told a newbie to go to maintenance and get a bucket of “red juice.” He disappeared for an hour. We were wondering where the hell he went about when he showed up looking a bit stressed out, actually carrying a bucket of red fluid of some sort. Apparently he started going around the entire airport’s maintenance shops asking them one by one for red juice, none of them knowing what the hell he was talking about. Instead of asking for clarification over the radio he just kept going. Eventually somebody in a completely different concourse poured some hydraulic fluid in the bucket for him. I was a bit astonished and then had to figure out what the hell I was going to do with a bucket of hydraulic fluid.
Is this blog yours?
I’ll bet the only reason this ended up a news story is because of one of those Brits who writes for the travel section was on the flight.
I’ve never understood that one. I understand even less now that I’ve written a Powershell script for remote troubleshooting at work. It started simple, but now it gathers tons of information, a lot of which is from the logs. On some machines it takes literal seconds to search and pull all of the log information. I could run this script probably 15 times in the time it takes to even launch Event Viewer.
Interesting observation. I initially assumed it was coincidental. Mainly because names like “The Circle” are actually a fairly common thing for cults or extremist groups. Just like “The Family.” It’s something I think a writer could have come up with independently without even being aware of that history. However, you do have a couple of points that indicate it could have been inspired by that specifically. Seems like the name may be more than coincidental!
“Short Treks”
We use Dell WD-19 docks. Not sure if you use similar. Updated dock firmware and laptop drivers made a difference for us with connection issues. Sometimes you gotta perform a reset on them to make them behave (disconnect dock power and USB-C and hold power button for just over 15 sec). Sometimes the laptop NVRAM needs to be reset instead (for Dell, disconnect all devices and power while off and hold button for just over 30 sec). Overall, though, no huge issues with DP specifically if the dock and laptop firmwares are up to date. Third-party docks/replicators definitely have way more issues, though.
Oh, there’s no way Elon wants a machine with a company image on it.
He probably bought a Win11 S-mode laptop, not knowing what that was.
Noticing the little two eyes over the voice one, I think that would be a fun way to indicate if you were you were to run a POTS line over Ethernet, too. Not only would it look like a little guy with his mouth open, but it would also be a reminder that only two pins in that port are connected. (You can actually connect a phone line to a jack like that and just plug an old phone cable into the middle of the port and it will work)