Skip to content

IBM sues a Zurich-based startup over 'unlawful' use of mainframe technology

Technology
4 3 0
  • Get Your Filthy ChatGPT Away From My Liberal Arts

    Technology technology
    12
    1
    144 Stimmen
    12 Beiträge
    69 Aufrufe
    N
    Indeed—semicolons are usually associated wirh LLMs! But that’s not all! Always remember: use your tools! An LLM „uses“ all types of quotation marks.
  • UK police are being told to hide their work with Palantir

    Technology technology
    5
    1
    277 Stimmen
    5 Beiträge
    28 Aufrufe
    M
    This is really fucking dark for multiple reasons
  • 106 Stimmen
    25 Beiträge
    40 Aufrufe
    tryenjer@lemmy.worldT
    In short, we will need an open-source alternative to these implants, of course.
  • 559 Stimmen
    99 Beiträge
    336 Aufrufe
    N
    In this year of 2025? No. But it still is basically setting oneself for failure from the perspective of Graphene, IMO. Like, the strongest protection in the world (assuming Graphene even is, which is quite a tall order statement) is useless if it only works on the mornings of a Tuesday that falls in a prime number day that has a blue moon and where there are no ATP tennis matches going on. Everyone else is, like, living in the real world, and the uniqueness of your scenario is going to go down the drain once your users get presented with a $5 wrench, or even cheaper: a waterboard. Because cops, let alone ICE, are not going to stop to ask you if they can make you more comfortable with your privacy being violated.
  • Building a slow web

    Technology technology
    37
    1
    175 Stimmen
    37 Beiträge
    150 Aufrufe
    I
    Realistically, you don't need security, NAT alone is enough since the packets have nowhere to go without port forwarding. But IF you really want to build front end security here is my plan. ISP bridge -> WAN port of openwrt capable router with DSA supported switch (that is almost all of them) Set all ports of the switch to VLAN mirroring mode bridge WAN and LAN sides Fail2Ban IP block list in the bridge LAN PORT 1 toward -> OpenWRT running inside Proxmox LXC (NAT lives here) -> top of rack switch LAN PORT 2 toward -> Snort IDS LAN PORT 3 toward -> combined honeypot and traffic analyzer Port 2&3 detect malicious internet hosts and add them to the block list (and then multiple other openwrt LXCs running many many VPN ports as alternative gateways, I switch LAN host's internet address by changing their default gateway) I run no internal VLAN, all one LAN because convenience is more important than security in my case.
  • 846 Stimmen
    133 Beiträge
    309 Aufrufe
    A
    reminds me of the time when something with Amazon was Indian employees
  • San Francisco crypto founder faked his own death

    Technology technology
    10
    1
    98 Stimmen
    10 Beiträge
    43 Aufrufe
    S
    My head canon is that Satoshi Nakamoto... ... is Hideo Kojima. Anyway, Satoshi is the pseudonym used on the original... white paper, design doc, whatever it was, for Bitcoin. There's no doubt about that, I was there back before even Mt. Gox became a bitcoin exchange, on the forums discussing it. I thought it was a neat idea, at the time... and then I realized 95% of the discussions on that forum were about 'the ethics of fully informed ponzi schemes' and such, very little devoted to actual technical development... realized this was probably a bad omen.
  • 2 Stimmen
    8 Beiträge
    44 Aufrufe
    F
    IMO stuff like that is why a good trainer is important. IMO it's stronger evidence that proper user-centered design should be done and a usable and intuitive UX and set of APIs developed. But because the buyer of this heap of shit is some C-level, there is no incentive to actually make it usable for the unfortunate peons who are forced to interact with it. See also SFDC and every ERP solution in existence.