Comment Re:Darl McBride. That's his name. (Score 2) 105
That's right! It was all Darl's fault - it's important that people remember that.
That's right! It was all Darl's fault - it's important that people remember that.
...still no Edit button. *sigh*
What would you say to an American cop that wanted to search your EU located servers based on American laws?
"I can't let you do that as it would breach data protection requirements."
That's the same answer the EUcrats will get.
Really? The US must be more advanced than I thought. I would have expected something more like "how much will you pay for it?"
Let's continue the obvious - I don't consider that most professional roles have a specific training programme. They are built on experience and appropriate training and professional development as required.
I would consider CISSP and/or GIAC qualifications as being key indicators for professional development for someone in a CSO role. Of course there can be other qualifications or evidence of professional development - I'm not claiming there is a specific training programme; just as there isn't one for a web developer, call center agent, tester, CIO, or road sweeper.
-- Pete.
You didn't answer the question: what CSO training programs exist out there? None.
Well I'd start by expecting professional qualifications such as CISSP or at least one or more GIAC certifications...
Particularly GIAC Security Leadership or GIAC Strategic Planning, Policy, and Leadership.
-- Pete
They are *not* transparent! Trump's dad was a real man and Trump will tweet you to death if you say otherwise!
His dad, maybe, but I heard Trump himself wasn't man enough to join the army. If you know what I mean.
Hmm, I really don't know where to start with the misinformation that you're spreading here...
The DAO issue was early in the lifetime of Ethereum, and indeed was a "bad contract", ETH was forked due to the scale of the hack and that it was still a new usage of the cryptocurrency. This is the only time that Ethereum forked because of a hack. People are a lot more careful about how contracts are written after this.
The CoinDash ICO hack was caused by someone hacking the site, and replacing the Ethereum address for the ICO - this is like a hacker hacking into a company site and modifying the bank details for payment - customers paid into the wrong "account". This is not a hack of Ethereum, and nothing to do with the way smart contracts work - it can be done with fiat currency by changing bank details, or any other cryptocurrency (including Bitcoin) by changing the wallet address.
The Parity wallet hack was a sloppy 3rd party wallet implementation - again, if you use 3rd party software for any financial transactions you need to be really sure that you trust the software - this is also not a hack of Ethereum, it was a hack of a 3rd party wallet implemntation - again nothing to do with smart contracts and could have happened for another cryptocurrency wallet (such as a Bitcoin 3rd party wallet).
The Classic Ether Wallet hack was also a hacker taking control of a 3rd party wallet - the same warnings apply as for the Parity wallet hack - again nothing to do with Ethereum smart contracts.
The hack under discussion in this article was a hack of Veritaseum - their VERI tokens were stolen, and these were sold for Ethereum - again, nothing to do with any hack on Ethereum, it was just the cyrptocurrency that the hackers exchanged for their stolen property. They could have sold VERI for Bitcoin, USD, or cheese and it wouldn't make this a Bitcoin, USD, or cheese issue...just as this is not an Ethereum issue.
-- Pete.
I was working as a Major Incident Manager for a very large consulting company working on a huge government project. The management in the consultancy company were generally terrible, on my first day my colleagues took me out for a drink - they pointed out a bunch of people across the room and mentioned that it was the configuration management team who had all just been fired because management weren't happy with the way the process was going...just as my first example.
Another time I had someone from second line support come to my desk and point out that some of the monitoring was showing red, I immediately directed one guy to check from an end-user perspective to see the actual impact for users, another guy to pull the logs, and a third to dig deeper into the monitoring - they all scurried away to start assessing the situation. In the mean-time I leaned over the partition to my boss who was sat next to me, and mentioned the issue - she stuck her head up like a meercat, looked around, and said (quoting word for word), "I can't hear any shouting, I can't see people running around, I can't see people panicing, I don't feel this is being managed properly!". She then asked me if I'd informed her boss yet - I told her we were still evaluating the situation (again, apparently unacceptable), so she immediately snatched up her phone and called him saying the monitoring was red and we were in a crisis. Just as she finished her call the guy from the end-user perspective came back to my desk and reported that the issue was completely transparent to end-users. I passed this news to my boss who threw her hands up and said, "But I've called X! Now it's nothing?!". Yes. Quite.
A third story would be from the time her replacement (she was eventually demoted then fired) pulled me to one side and started screaming and swearing in my face because he didn't feel I was motivating technical staff to fix issues quickly enough because I wasn't in their faces screaming and swearing at them until any issue was fixed (yes - this is exactly what he meant). I'm sure any techies here will be happy to agree that this is not an appropriate motivational technique to get the best from your staff...but there you go.
I could go on - but instead I'll just summarise to mention that in the 12 months I worked there everyone in my team quit or was fired and replaced twice over except for me and one other guy...when my contract finished I wasn't sad to leave.
-- Pete.
Imagine an office environment where each desk/meeting room includes a monitor/keyboard/mouse for each user where the monitor passes through all connectivity via USB-C. Each user just carries a tiny lightweight computer that is "theirs" with all associated configuration/application/data, plugs it into the USB-C socket and off they go.
Not so different from having a laptop, except the devices are smaller, lighter, and cheaper - and with a higher quality screen, keyboard, and mouse. Sure you are constrained to work at points where there is a monitor, but in many cases this is a great solution.
-- Pete.
A few seconds with Google and I found this USB 3.0 to Dual Port Gigabit Ethernet Adapter NIC
-- Pete.
black men have longer
... you know, than white men
Prison sentences?
-- Pete.
Where did the speed instruction come from? The driver's foot on the pedal?
The driver sets the maximum speed when they activate the autopilot, in much the same way as you set the speed when you use cruise control on any other car. Or are you saying speeding isn't the responsibility of any driver if they're using cruise control to break the limit?
Autopilot will slow down if there is traffic ahead, otherwise it travels at the speed set by the driver.
-- Pete.
I'm not surprised to see Nashville listed as a "momentum market" in this report, there's a lot of interesting stuff going on there (I lived there for 9 years before relocating in 2014) and for 20-somethings it's an exciting and affordable place to live.
Agreed on entertainment, but for informational videos, a bit of a speed-up is really handy. The Team Treehouse site has nice material, and when you speed up the videos to 1.5x or so, you really feel like you're moving along.
So what happens when you're in a multi-story building, like the Water Tower in Chicago? You may be in the Lego store, but 3 floors below is Victoria's Secret...
Staff meeting in the conference room in %d minutes.