😬 I’m not sure how I’d feel about porn generated on a data set of potential STIs
😬 I’m not sure how I’d feel about porn generated on a data set of potential STIs
To be fair, I was in the camp of “put a sock in it” until I reached a point of “alright FINE, I’ll give it a go” and now I’m joining the choir on it, desktop Linux is a dream.
Agreed. I’m sure if I was heads down in Excel for years beforehand it would be a significant downgrade, but as a casual user, making better use of some of the more advanced features became so, SO much easier with the Ribbon.
I’ve always been hugely in favor of it. It’s the one change that could maybe justify their gargantuan salaries – if your company causes harm and suffering, the leaders absolutely need to be put on the hook.
I mean, they’re one implementor of about 10 that use the same container standards. It sucks that they were first so their name is now synonymous with containers a la Kleenex, but the technology itself is standard, very open and ubiquitous, and a huge step forward in simplifying deployments and development lifecycles that would otherwise be too complex to reasonably handle.
My insurance site (MyCigna) started working a couple months ago, but for years it failed to log in. It’s those types of contracted apps that seem to fail the most for me, like apps you’d see on a company intranet.
I think that’s the way both Splunk and JFrog work – you generate or enter a password into the key field in a YAML file somewhere, start the service, and next time you come back the field’s been encrypted.
Yeah, no. iPhone VPN apps aren’t the route that Russian hackers are taking.