Strongly agree. A guide for dead simple setups would be incredibly useful (e.g. gsuite as idp, oauth for a single app).
It took me a few days to get that basic setup working, and a few days more to improve it. But once it was up, it was rock solid.
Strongly agree. A guide for dead simple setups would be incredibly useful (e.g. gsuite as idp, oauth for a single app).
It took me a few days to get that basic setup working, and a few days more to improve it. But once it was up, it was rock solid.
Keycloak might seem a little daunting to start with, but is basically glue between your idp (ldap) and whatever apps need to authenticate.
or in Jerboa
The original article smelled wrong when they claimed to have broken AES. Thankfully, Bruce Schneier is far more authoritative than I ever will be and gives a short and succinct list of links to debunkings of this.
Only on signup
Anything using Blind as a “verified industry source” is going to be skewed to the type of person who uses Blind. Beyond that, it’s low sample size, and there are suspiciously round fractions for some of the larger companies. Worse, because Blind is blind - this doesn’t represent current employees, but merely people who worked at some point in the past at those companies.
Not saying it’s not good - just saying not to get overly excited over a badly done survey
That makes a lot of sense - I wonder if they also do the SIGSEGV trick like HotSpot to know when they need to JIT the next chunk of instructions
But does it run Doom? Using CMOV instructions only?
I thought FAT binaries don’t work like that - they included multiple instruction sets with a header pointing to the sections (68k, PPC, and x86)
Rosetta to the best of my understanding did something similar - but relied on some custom microcode support that isn’t rooted in ARM instructions. Do you have a link that explains a bit more in depth on how they did that?
From what I’ve understood of this - it’s transpiling the x86 code to ARM on the fly. I honestly would have thought it wasn’t possible but hearing that they’re doing it - it will be a monumental effort, but very feasible. The best part is that once they’ve gotten CRT and cdecl instructions working - actual application support won’t be far behind. The biggest challenge will likely be inserting memory barriers correctly - a spinlock implemented in x86 assembly is highly unlikely to work correctly without a lot of effort to recognize and transpile that specific structure as a whole.
If you’re aware of someone or a company violating sanctions, you can earn up to 20% of the fines as a whistleblower.
Considering the fines start from 100,000 per transaction, you could easily retire on a single report.
Holy propaganda batman!
The list of articles on that website is…extremely focused on one subject only.
No need to wait. Here’s their statement: https://www.anera.org/press/anera-convoy-attacked-en-route-to-emirati-red-crescent-hospital-four-killed/
No Anera staff were harmed, though one Anera employee, who was in the second vehicle, witnessed the incident at close range.
Despite this attack, the remainder of the convoy continued its mission and successfully delivered the critical aid to the hospital. Anera has coordinated with the United Arab Emirates 24 prior shipments for the Emirati Red Crescent Hospital since May.
Considering that Hamas are holding bodies and hostages and demanding an end to the war in exchange for releasing the hostages, changes to that situation are quite relevant.
Are you communist left? Or socialist left? Or cryptoanarchist left?
Are you republican right? Or fascist right? Or tankie right? Or cryptocapitalist right?
If it’s off by one (center left instead of center, mixed instead of high) then just chill. It’s close enough. The point is to highlight the extremes, especially for when someone went headline shopping and posted some relatively unknown source.
Lemmy doesn’t have karma farming because it doesn’t have karma.
Accounts earn their reputation based on name recognition, not some artificial score.
I needed a laugh. Thank you.
Deif is dead. Haniyeh is dead. Something like 40% of all the senior leadership is dead.
The hostages aren’t keeping them alive, they’re putting them in the crosshairs.
Do you have a copy of the bridging proposal? I haven’t seen any actual text.
I have to say that this is the most color I’ve seen in months on the actual reasons why. On first read, it gives an understanding that both sides are willing to approach a deal - but lack trust in the process and the mediators ability to coerce the other side to actually commit and follow through.
A more cynical read (my second one) through this is that Hamas is still viewing civilian hostages as an asset and leverage. They are hesitant to get a six week ceasefire because they think they should get more than that for civilian hostages. Recent reports are making it clear that Hamas is executing the hostages. Whether as part of their negotiations, a breakdown in discipline, or just simple evil - the mediators have failed to impress upon Hamas the depth of their strategic mistake.
I get very far by just keeping a set of folders for each piece of equipment in a git repo.
Pictures, etc, and sometimes the PDF manual if I bother.
The difficult part here is being consistent over time - making sure you mark down when you bought things, serial numbers, etc. a proper website/app will force you to do this, but there is flexibility in having whatever convention you like most