

The new thing the kids flocked to because the adults found their old thing and started to join/ regulate it.
The new thing the kids flocked to because the adults found their old thing and started to join/ regulate it.
They make him look good and normal.
Well. Not exactly.
National security? What’s that?
Well, you could vote in the worst possible candidate in human history (short of a ressurected Hitler, I mean) into your country’s highest office as a sign of defiance and ‘warning’ to future administrations. That’ll show em!
Playing it now. I think kestis looked better in the earlier game.
This is fascinating. I mean we all know the theory, but to actually see the cells under magnification puts you in range, and makes you wonder what else there is to know. And the answer is always MORE.
Education should work more practical application in with the theory. I’m looking at you, calculus!
Twelve people in maga hats junior handed out doesn’t make a ‘yes’, dumbasses. But I guess it’s par for the course when your new leader is a convicted rapist.
These are the people they always want to apply the ‘higher ground’ and ‘congressional decorum’ to. Fuck em.
Automation. Not ai. Ai in its current form is still crap.
Figures. All the gps data in the world and the idiots on the road still can’t figure their exit, cut across 3 lanes to reach it, or realize they’ve passed it, slam it into reverse and move against incoming traffic to get back to it. Seriously. The most connected generation in human history can’t think themselves out of a goddamn box. Rant over, now get off my effing lawn!
Your phone acts as the gateway for other devices on the hotspot, since it hosts the network, so yes it needs to be visible. Which services and vulnerabilities are visible exactly depends on your individual setup.
For now, no point getting paranoid or anything, but maybe keep vigilant for suspicious activity for a few weeks - it’s done anyway, just take precautions for the future. Else start logging network activity and calls and monitor, I guess. Not a security expert btw.
If they can conect to your hotspot, they usually can see all devices connected to it, ie. your phone. So it’s a matter of hacking your phone using any of the established methods. Some of these methods may be as simple as running a script, but may depend if your phone is compromised, or running a vulnerable version of the os.
In short, usually not a good idea. If he’s really desperate, offer to sign in for him, using the usual precautions (shortened urls, unknown domains etc are a no for me). If he’s uncomfortable with that arrangement, eh, no thanks then, point him to the nearest public hotspot then.
Frankly, it’s tiresome trying to describe technical details with business analysts who glaze over something you’re passionate about, treating it like nerdsprak. If the engineer has spent any amount of time producing a solution, you can bet he’s passionate and invested. Give credit where credit is due and don’t sound like an obnoxious condescending douchbag when doing so. People can tell when a disinterested person is giving fake praise. It’s quite different when a crowd of peers is giving recognition of a job well done. And no, you’re probably not as smart as they are in their field of expertise.
Also, listen to their input. They don’t want a product with their name going live with a feature the bean counters want, but the engineers know make the product worse. It’s like a mom watching your daughter to go to prom with a cheap haircut because dad as too cheap to fork out for a perm. You know what I mean.
This is why documentation of business process and methods is so important. A lot of time, the engineer solves seemingly small problems without oversight, so imagine a decades old collection of many innocuous solutions leading to the whole ‘dunno what this does’. If it’s important enough to commit to a mission critical system, it’s important enough to document.
Also, it’s incredibly frustrating for an engineer to be given a one line brief, work his ass off producing the solution, then have the business analyst take credit for the work, and not bother to even learn how the system works, even at a high level. It sows distrust and disdain.
Is it easy to find in the dark?
Funny how contempt is so poorly defined in law.
Apparently they didn’t follow trump the first time around. The surest way to get him to do something is to tell him not to.
From what we hear, donald begs to differ.
Why does it look like she blew one at a time early on, but when the shot changes it looked like she blew them all at once?