Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment It was all over by 1998 (Score 1) 134

I submitted my first Y2K fix to our products in 1989 and all of our software was fully tested by 1996. I still got lots of overtime as our Y2K team lead coming up to the deadline and even had authorization to use the corporate jet if there was any customer impacting emergency that could be solved faster on location but (as expected and planned for) nothing happened.

Comment She makes a good point, time to look elsewhere (Score 1) 162

There are some interesting alternative theories. For example Neil Turok (Higgs Chair of Theoretical Physics at the University of Edinburgh) argues that the Standard Model of particle physics is complete and his theory actually predicts many of the parameters.
https://youtu.be/d-hPmjjjC-I

Comment This allows large companies to use Linux (Score 2) 96

My company has been working with MSFT to pilot test these features. It enables us to offer the same security controls as we do for Windows and MacOS, so Linux laptops are now allowed on our network by security policy. I am currently using an Intune enrolled & compliant laptop with Ubuntu 22.04 LTS for my daily work with Office365, Teams etc. That was not possible last year. We block access from non-compliant laptops.

Comment misleading - it's not end-to-end encryption (Score 2) 41

Even Google's own FAQ says CSE is not end-to-end encryption. CSE is more like MSFT's MIP/AIP

.

With end-to-end encryption (e2e), encryption and decryption always occur on the source and destination devices (such as on mobile phones for instant messaging). Encryption keys are generated on the client, so as an administrator, you don't have control over the keys on the clients and who can use them. In addition, you don't have visibility into which content users have encrypted.

With client-side encryption (CSE), encryption and decryption also always occur on the source and destination devices, which in this case are the clients' browsers. However, with CSE, clients use encryption keys that are generated and stored in a cloud-based key management service, so you can control the keys and who has access to them. For example, you can revoke a user's access to keys, even if that user generated them. Also, with CSE, you can monitor users' encrypted files.

Slashdot Top Deals

A slow pup is a lazy dog. -- Willard Espy, "An Almanac of Words at Play"

Working...