You are here: Home

Search results

344 items matching your search terms.
Filter the results.
Item type







New items since



Sort by relevance · date (newest first) · alphabetically
Image PNG image Hawke's SIIMPAF Basic Data Pipeline Diagram
Located in Documents / images
Image PNG image Hawke's SIIMPAF Components Architecture
Located in Documents / images
Image PNG image Hawke's SIIMPAF Photorealistic animated Avatar Dashboard
Located in Documents / images
Image JPEG image Hawkes-Robinson RPG Ability Model (c) 2019
Located in Documents / images
Heartbroken about what Plone has become :-(
I have been involved with tech since the late 1970s when I first started programming. Fast-forward to the web, and content management systems and web applications, platforms, products, frameworks, etc. Plone has been a stellar solution up until the version 5.x line, and since then something seems to be going more and more "wrong" with the development and community, which breaks my heart...
How much do you actually value transparency, privacy, and security for you, your business, and your clients?
My response to a discussion on Alignable: "For small business owners : I have noticed and experienced uptick in legal issues and cybersecurity concerns with some of my clients. What do you small biz owners have in place to help and protect you legally and what do you have in place to not only help to prevent an attack on your company /clients / employees /devices but also to restore the identities and stop the bleeding? "
If killall by name not working try pkill -f
In recent years some distros and apps no loger responding to kill -9 <app name> such as killall -9 firefox.
images
Located in Documents
Increasingly Unmotived, Mercenary, Unethical, and Unaltrustic Global Work Force Culture and the Correlated Poisoning of the Open Source Movement
There has been a very disturbing increase in a trend over the past 5-10 years in the volunteer, paid, and opensource sectors: decreasing worth ethic, lack of motivation, and increasingly severe mercenary and inconsiderate attitudes and behaviors from workers and developers. This trend pre-dates covid. Of course, correlation does not prove causality, but these are some parallel observations.
InfoSec Beginners Reading List
This is a reading list for those interested in learning more about Information Security (InfoSec).