I type "LOL" occasionally, but this time I ACTUALLY DID.
Of course, even before that processor was outdated I was filling up 4K regularly. - SO I made extensive use of the cassette-tape backup.
Imagine if memory was still 2.5 cents per byte.
oddly enough, I have more of a need for RAM in my phone than my desktop.
But if you want a good laugh, flex your google-fu and compare your phone's memory and processing capacity to that of NASA's Mission Control center when we launched Apollo 11. -- Not the lunar lander (that is outclassed by modern parking meters), I mean the Mission Control mainframe back on earth.
That really drives home how crazy the whole "moon by the end of the 60's" thing was; and how amazing the success truly was.
... If I were to go to even a reasonable effort to combat all of them, I would be doing nothing else with my life.
In risk management,
Well, I am ALSO an IT Security professional, and I can certainly confirm your statement quoted above as that is indeed just about all I do while I am at work. Luckily, I am not the kind of person who takes work home with them, though.
I am a professional who gets paid to be obsessive over security. - I acknowledge that it is easy to confuse that with PARANOID; but trust me, there are distinct differences. And one of those differences is that I can see your point. If you are able to ACCEPT a risk, then it may be the simple way to go.
As for myself, the paperwork to list a risk as "accepted" is usually more of a headache than any possible mitigation. But if you can get away with it, Good on ya'. - I was just unsure from your first post here that you were ACCEPTING the risk and not IGNORING it...
projects I work on are of no interest to any entity able to intercept the data
And I thought I'd speak up.
On that topic, however... It sure is nice to come across somebody who can use Risk Management intelligently. - It seems that these days, most folks can't even manage to use it correctly in a sentence...
--I'll take the cake, please.
What!? No, you can't... We;ve had a run on the cake today, and we're all out.
--So, my choice is "or Death"?
Of course, if they were really trying to protect their people, they could say that "Previously classified information that has been released to public news organizations and made publicly available may be accessed by military personnel with no repercussions." Do they really want their own personnel to be less informed than the general public? It's not like preventing soldiers from reading the information is going to keep it out of the hands of the "enemy".
Classification authority stems from Presidential Executive Order. The Army (or any other Government component) can not counter that.
That said... I agree; the POTUS should make that change.
More the shame that we haven't elected a slashdotter as President.
With all due deference to a slashdotter with a 3 digit UID, I'd like to point out the danger of your last statement.
Primarily, the risk is that your smaller, side-projects may indeed pan out to be your primary revenue stream in the business environment of the future. But the consolidation affect is at least as dangerous. The conclusions that can be drawn by a talented analysts from the sum total of your small, seemingly insignificant data leaks can be staggeringly powerful. And if you think that your company is not worth the time of a talented analyst, then you may not have been paying attention to the cultural make-up of our current competitors in the world today. -- They take the time to analyze everything they can.
Now, I don't want to go off on a rant... but I did want to throw that out.
That said... Sure. Holiday pics fit nicely into a cloud.
I never did have any disk drives for it; I had to reenter the code every time I turned it on.
I've always credited it (we call it Blinky, BTW... since that's all it does) with my career in IT. - My dad was the first guy in the neighborhood with an actual computer and I was writing assembler code in 1978. I learned two things:1) digital processing was the wave of the future, and 2) I didn't want to be a programmer (I'm a network security engineer). - But of course, if you've ever done assembler code by switching 8 toggles up and down to form Hex instructions one-by-one, you'll understand.
I was keeping it purely for sentimental reasons... but if this guy builds a furver for it... maybe I finally get the infamous DotDotDot
1- get a computer in grade school
2- build a career in IT
Sadly, that won't prevent people from trying to sue somebody, these days...
Might I humbly suggest that you have a quick look at my slashdot signature that appears below?
A penny saved is a penny to squander. -- Ambrose Bierce