|
NSA, CISA, and the Office of the Director of National Intelligence (ODNI) have shared a new set of suggested practices that software suppliers (vendors) can follow to secure the supply chain. Tip 0: let us in, or we'll huff and puff
|
|
|
|
|
He says he’s spent the last 17 years learning how to explain cohesion in software design, which has brought him to the point of writing a series of three books which will explore the software design. Good thing many developers are so good at dealing with other people
|
|
|
|
|
Kent Sharkey wrote: Good thing many developers are so good at dealing with other people Better than dealing with specifications
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
NASA’s Solar Dynamics Observatory managed to capture a spooky image of the sun. It's up to something, watch out!
|
|
|
|
|
Looks more like Sol is trying to extrude something painful.
|
|
|
|
|
it reminds me: this[^] (alternative[^])
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
modified 2-Nov-22 17:18pm.
|
|
|
|
|
Infer# performs cross-assembly analysis to find issues like null pointer dereferences, resource leaks, and thread safety violations, in addition to security vulnerabilities like SQL injections and DLL injections. Because sometimes you need more than braaaaiiinnnnsssss
Bonus points for them being seasonally appropriate. Although for those reading this in the newsletter, a little late.
|
|
|
|
|
With the relentless pace of enterprise digital transformation efforts, even in this softening economy, developers still face an enviable job market. Look to your right. Now look to your left. Now say goodbye and move to that new job.
|
|
|
|
|
Ironic that this appears on DevOps, which must be one of the reasons that developers look to jump ship.
|
|
|
|
|
Windows 365 and Microsoft's ad business both may have big roles to play in how Microsoft takes Windows forward. What's next for me: maybe, no, and elephant no
|
|
|
|
|
Your data pipeline is too slow, or uses too much memory. How should you speed it up? Which is why management goes there first?
He's a Python programmer - he knows about slow software
|
|
|
|
|
But slow / bloated software is the usual consequence of fast hardware.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Yep. Profiling and rethinking the inner loops that are causing your performance bottlenecks will get you far more performance bang for the buck in the long run. I say "rethinking" vs. "rewriting" because sometimes you have to change the actual approach to how you handle something.
|
|
|
|
|
The Cranefly hacking group, aka UNC3524, uses a previously unseen technique of controlling malware on infected devices via Microsoft Internet Information Services (IIS) web server logs. And I thought no one looked at their logs...
It strikes me as a very clever (and of course, evil) way of communicating with your machine.
|
|
|
|
|
Kent Sharkey wrote: And I thought no one looked at their logs... Actually they are not looking at their logs, they are looking at yours...
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
This is a specific kind of cryptographically obfuscated computer program — that is, a program that is “encrypted” but that you can mail (literally) to someone who can run it on any untrusted computer, using input that the executing party provides. No, it's not just the programs that only work once before crashing
|
|
|
|
|
I see a new generation of malware incoming...
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Pour one out for Lego's impressively capable DIY robots, which will be powering down at the end of the year. Back to building your robots the old fashioned way - cardboard boxes and duct tubes
|
|
|
|
|
R.I.P.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
The survey, published this week, is effectively a straw poll that found 42% of respondents are developing or plan to develop server-side applications using Wasm, while 48% are combining or planning to combine server-side workloads with client-side applications. You know it's accurate, because they queried _93_ people!
|
|
|
|
|
wtf is wasm?
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
webassembly
Because running everything in the browser worked so well all the other times it was tried.
TTFN - Kent
|
|
|
|
|
Microsoft has issued a workaround for an Outlook bug which was preventing users from signing in. So you (temporarily) need to go back to work
|
|
|
|
|
EU hopes DMA will force Big Tech platforms to break open their walled gardens. "I sentence you to be exposed before your peers. Tear down the wall!"
|
|
|
|
|
I wonder how many things will get worse after this rewriting of the rules...
Don't get me wrong. I welcome they trying it, but I suppose that the politicians will ignore what tech people say and do whatever they want think is better for all.
In other words... a good idea that will get a bad implementation.
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|