Again, no one is claiming that they are the same thing.
Perhaps you should chat with the author of the article. He seems to make that equation.
Maybe he did it just to grab headlines, or maybe he did it for other reasons. Who knows his intent?
The bottom line is that page hits = $$
He got a lot of page hits from the story here on
The impression I get from the article is that the writer found that infrastructure providers' price models make "picking a vendor appropriate for the task at hand" not the easiest job.
Yeah, the writer seems to think that knowing what you need is a big problem.
...'The complete authorized session on the site is saved in the plist file in full view despite the use of https...
HTTPS only ensures security between the browser and the web server. HTTPS is not designed to ensure security of what the browser decides to store locally.
Seems like you can pick which vendor gives you the best value based on the use case of your application. Doesn't seem that absurd to me at all.
Exactly. It is a shame that the writer does not seem to be able to understand the process of picking a vendor appropriate for the task at hand.
What does seem absurd, however, is how magazines seem to create issues to write about.
... Ford says the research vehicle's sensors are sensitive enough to detect the difference between a small animal and a paper bag even at maximum range...
That is not as difficult as it may sound. And it is not a question of "sensitivity". The paper bag does not generate heat, while a small animal does.
So big deal - the car has an infrared camera on board.
Bitrot is a myth in modern times.
You state this without any substantiation as if it were a fact.
You are assuming you started with good files.
No assumption on my part. I did start with good files.
In the submitter's case, he started with some good files, some unknown number of bad files, etc.
That's not how I read the comment. From the OP:
With the quantity of data (~2 TB at present), it's not really practical for us to examine every one of these periodically so we can manually restore them from a different copy.
That sound to me as if he wants to check the files from time to time and locate ones that have gone bad.
Once a week, I use openssl to calculate a checksum for each file; and I write that checksum, along with the path/filename, to a file. The next week, I do the same thing, and I compare (diff) the prior checksum file with the current checksum file.
With about a terabyte of data, I've not seen any bitrot yet.
Long term, I plan to move to ZFS, as the server's disk capacity will be rising significantly.
ya need to move beyond it.
Maybe women don't like to work with ugly nerds, maybe they're not smart enough, or maybe they just don't like it. Stop blaming everything on us,
You are the problem.
So the question remains, what do you want to do to solve the problem. Technical people like to solve problems, why can't they seem to solve this one?
And people wonder why there are not more women in the computer industry.
When one admits defeat, one will succumb to defeat.
With eight qualified candidates for every 10 openings
To me that means that the companies are being far too selective and / or not using screening methods that reflect positive employment outcomes.
As google's selection process has shown, rejecting qualified candidates just because they do not do well on some obscure testing hurdles is not the way to find qualified candidates.
Executive ability is deciding quickly and getting somebody else to do the work. -- John G. Pollard