• 0 Posts
  • 41 Comments
Joined 1 year ago
cake
Cake day: August 4th, 2023

help-circle

  • edric@lemm.eetoTechnology@lemmy.worldGoodbye FireFish.
    link
    fedilink
    English
    arrow-up
    12
    ·
    14 days ago

    Glad I held back from suggesting Firefish for my wife. I’ve been slowly trying to convince her to jump to the fediverse for microblogging and figured to have her try Firefish simply because it’s prettier than Mastodon. Guess it’s back to ol’ Mastodon.





  • Both links are paywalled, but if I’m remembering correctly, that company (CMG) eventually had to correct their claim that phones were actively listening to everything you say. It was an overzealous marketing guy trying to oversell. They admitted in the end that they use the same info that data brokers have on you based on data gathered from your browsing and other activity, not from actively listening to you.

    Siri for example is designed in a way where it “listens” for your voice to call it, but that mechanism is completely separate from the actual Siri that connects to the internet to understand you.



  • They also added stories which, despite what the internet might have you believe, was one of the most popular feature requests on the Signal message boards for many years

    This was weird for me personally. I consider Signal a messaging tool which in my mind is separate from an actual social media app, so it was a bit of a head scratcher for me to see stories as a very popular feature request. I don’t really care about sharing “stories” in that format to my contacts or seeing theirs, but then again that’s just me.












  • It is one of the most basic server management tasks.

    Except these were endpoint machines, not servers. Things grinded to a halt not because servers went down, but because the computers end users interacted with crashed and wouldn’t boot, kiosk and POS systems included.

    You acting like the concept is challenging seriously concerns me and I seriously wonder how anyone that thinks like that gets hired.

    Damn, I guess all the IT people running the systems that were affected aren’t fit for the job.

    unless you want to show me a budget that isn’t. Do you have a real one that you can provide?

    Can YOU show me the bloated budgets and where they are allocated on those mid to large size corporations? You are the one who insinuated that. All I said is that my experience for all the companies I worked with is that we always had to fight hard for budget, because the sales and marketing departments bring in the $$$ and that’s only what the executives like to see, therefore they get the budget. If your entire working experience is that your IT team had too much budget, then consider yourself privileged.

    It’s weird how you’re all defensive and devolve to insults when people are just responding to your post.


  • For sure there is a problem, but this issue caused computers to not be able to boot in the first place, so how are you gonna remotely reboot them if you can’t connect to them in the first place? Sure there can be a way like one other comment explained, but it’s so complicated and expensive that not all of even the biggest corporations do them.

    Contrary to what a lot of people seem to think, CrowdStrike is pretty effective at what it does, that’s why they are big in the corporate IT world. I’ve worked with companies where the security team had a minority influence on choosing vendors, with the finance team being the major decision maker. So cheapest vendor wins, and CrowdStrike is not exactly cheap. If you ask most IT people, their experience is the opposite of bloated budgets. A lot of IT teams are understaffed and do not have the necessary tools to do their work. Teams have to beg every budget season.

    The failure here is hygiene yes, but in development testing processes. Something that wasn’t thoroughly tested got pushed into production and released. And that applies to both Crowdstrike and their customers. That is not uncommon (hence the programmer memes), it just happened to be one of the most prevalent endpoint security solutions in the world that needed kernel level access to do its job. I agree with you in that IT departments should be testing software updates before they deploy, so it’s also on them to make sure they at least ran it in a staging environment first. But again, this is a tool that is time critical (anti-malware) and companies need to have the capability to deploy updates fast. So you have to weigh speed vs reliability.