The Multi-Factor Authentication The Multi-Factor AuthenticationWhat is Multi-Factor Authentication (MFA)Multi-factor authentication (MFA) is a method of logon verification where at least two different factors of proof are required.
Before you buy Snapdragon X Elite device - check the chip model number There are four variants of Snapdragon X Elite with one severely weaker from the oter
How to do the jhanas The jhanas are a series of eight (or nine) altered mental states, which progress from euphoria, to calm, to dissolution of reality – culminating in cessation, or loss of consciousness. They are induced via sustained concentration, without any external sti...
The Raspberry Pi 5 is no match for a tini-mini-micro PC I've always been fond of the idea of the Raspberry Pi. An energy efficient, small, cheap but capable computer. An ideal home server. Until the Pi 4, the Pi was not that capable, and only with the relatively recent Pi 5 (fall 2023) do I feel the Pi is OK p...
Optimizing Resident Schedules for Minimum Suffering Blade's Website - Optimizing Resident Schedules for Minimum Suffering
The CEO Was catching up with a dear friend. She is a mother of two. Her boy is about 10 and the her daughter 3. Soon after her daughter was born she started an MBA at a prestigious school. Amidst the diape…
Safari 18 — what web features are usable across browsers? The new Safari 18 beta dropped and it's packed with new web features. I collected browser compat information and checked what features are safe to use today.
"Model G" as the original designation for Model M & the existence of Models "1A" and "1B" Newly discovered information pertaining to IBM Model M keyboards, nuances in their designation & other IBM keyboard "model" designations
Abstractions Are The Best, Abstractions Are The Worst Abstractions are the best Your code will be safer and more readable. It will prevent entire classes of bugs. It will be easier to add new features. You can inject dependencies at runtime to make testing easy. You can swap out your third party dependencies...
The Eras of Domain Names Let’s stroll through the history of the web by examining domain name trends. Each era has its own quirks and strategies for finding a good domain name that tells us about the constraints and opportunities of the time.
The Real Cost of Offshore Tech Teams Startups offshore their tech teams to save money, rush a product, or save time recruiting. They can be great if you know how to use them. If you don’t, you can end up maintaining code you barely understand and paying massive fees for a contractor you can’...
SKF I think most everybody thinks their travels are more interesting than they really are and that they are more well-traveled than they really are. I fall into both of these categories, and here are some musings on why.
Upstream, Why & How In a different epoch, before the pandemic, I’ve done a presentation aboutupstream first at the Siemens Linux CommunityEvent 2018, where I’ve tried to explain...
In First Case of its Kind, NLRB Judge Declares Non-Compete Clause Is an Unfair Labor Practice Coworker non-solicitation clauses also declared illegal for first time ever.
Do not try to be the smartest in the room; try to be the kindest. | Jorge Galindo's blog In business, being a nice person in the room can be more impactful than being the smartest. I share my insights on empathy, respect, and active listening as key skills for successful meetings and creating a positive team environment.
What You Get After Running an SSH Honeypot for 30 Days What is a honeypot?A honeypot detects and records attacks when an attacker tries to break into a system. The honeypot we will discuss here is an SSH honeypot. Environment12OS: Ubuntu 24.04 LTS x86_6
Google, Cloudflare & Cisco Will Poison DNS to Stop Piracy Block Circumvention * TorrentFreak Google, Cloudflare, and Cisco must poison their DNS resolvers to prevent access to around 117 domains used by pirate sport streaming sites.
Collection Performance: Introducing FrozenSet in .NET 8: Benefits and Benchmark PerformanceCollection Performance .NET version 8 introduced the FrozenSet type, offering immutable and hashable set collection with benefits including improved performance, memory efficiency, and thread safety. Benchmarks show comp…
How to modify the border of a .NET MAUI Entry on iOS and MacCatalyst In this post, I will show you how to modify the handler to take control over the Entry's border by changing the underlying native control.
George Fairbanks - Book: Just Enough Software Architecture This is the book I wish I had when I started developing software. At the time, there were books on languages and books on object-oriented programming, but few books on design. Knowing the features of the C++ language does not mean you can design a good ob...
ESASky 6.2 ESASky is an application that allows you to visualise and download public astronomical data from space-based missions.