I know the reference, and I’mma let you finnish, but 5/7, bruh that’s a gucci gun.
I know the reference, and I’mma let you finnish, but 5/7, bruh that’s a gucci gun.
Eh, if the bottle is just for water there’s enough spray and heat to kill and rinse it usually.
Can confirm, gitlab has a container registry built in, at least in the omnibus package installation.
Bonus: You could be paying and be the product anyway.
Every language is a scripting language if you’re brave enough.
My search engine usage for 25 years has been just me going “yeah right” and changing the query to make it better. But I’m wired to distrust what I feel is bullshit, and I’ve experienced not many people are.
I doubt Musk even knows about this case. X has lawyers for this type of pedestrian issues, and they come up with defense strategy.
Chromium.
But it was cheap, they even could afford the Oppenheimer actor back then.
I can’t recommend them because I haven’t used them, but AFAIK Motorola came out with their own take on trackable tags.
Nice, it’s like the “gsp protected” stickers on car windows and highly visible flashing LEDs that indicate the alarm is armed. Not that anyone ever checks if it’s their alarm that makes everyone’s around the car lives miserable.
Ok but can we keep it on the summer time? I like later sunsets.
It’s hard to believe but 16s are cheaper than 15s. I guess not enough 15s sold.
The fact that cuda means ‘wonders’ in polish is living in my mind rent free several days after I read about nvidia news.
Yea we’re doing something similiar. Only update base images for bigger OS updates or if something breaks or can break.
The general idea is to have config that works for both new PCs and the ones that are already in use. Saves on maintaining two configuration methods.
I’m the only one to swoon here, and I’m as sceptical as one can be.
I’m also a cost and my budget is on paper only. Non-IT management is complicit in crappy IT.
I wonder how you’re supposed to get PXE boot to work securely over the internet. And how that helps when affected disk is still encrypted and needs unusual intervention to fix, including admin access to system files.
I’ve been doing this for a while, and I like creative solutions, so I wonder about those issues a lot. Not much comes to my mind besides let’s recall all the laptops and do it one by one.
Sure. At the same time one needs to manage resources.
I was all in on laptop deployment automation. It cut down on a lot of human error issues and having inconsistent configuration popping up all the time.
But it needs constant supervision, even if not constant updates. More systems and solutions lead to neglect if not supplied well. So some “would be good to have” systems just never make the cut, because as overachieving I am, I’m also don’t want to think everything is taken care of when it clearly isn’t.
This works great for stationary pcs and local servers, does nothing for public internet connected laptops in hands of users.
The only fix here is staggered and tested updates, and apparently this update bypassed even deffered update settings that crowdstrike themselves put into their software.
The only winning move here was to not use crowdstrike.
Wait till they hear of scanners and copy machines. The books aren’t safe either!