-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


today's leftovers


Posted by Roy Schestowitz on Feb 06, 2023


today's howtos

New GNU/Linux Titles on Steam Deck and a History Of Console Gaming



My Code Conquered Another OS!


↺ My Code Conquered Another OS!


> From the Mac OSX release history, Mac OSX versions appear to be supported for three years, so in three years, my bc should be in the majority of Mac OSX installs, which would make my bc the most widely-deployed bc in the world!



[librearts] Weekly recap — 5 February 2023


↺ [librearts] Weekly recap — 5 February 2023


> Week highlights: new features in GIMP, Inkscape, Penpot, and Ardour, Mayo review, Paul Davis in the Bezos movie, and more.



MidnightBSD Developer Journal


↺ MidnightBSD Developer Journal


> The delay in the release has been due to issues with several mports. We're still working through those problems, but one can't ship a desktop OS without a working desktop.



8 Major Advantages of Using MySQL


↺ 8 Major Advantages of Using MySQL


> From its open-source nature and robust security features to its flexibility and scalability, MySQL has a lot to offer. Let's take a closer look at MySQL and the benefits it offers, so you can make the right choice on determining whether to use it in your technology stack.



The Future (and the Past) of the Web is Server Side Rendering


↺ The Future (and the Past) of the Web is Server Side Rendering


> This is the problem with being a frontend dev today. What started out fun for frontend developers, building shit-hot sites with all the bells and whistles, has kinda turned into not fun. We're now fighting different browsers to support, slow networks to ship code over, and intermittent, mobile connections. Supporting all these permutations is a giant headache.


> How do we square this circle? By heading back to the server (Swiss basement not required).



Security Principles: Addressing underlying causes of risk in complex systems


↺ Security Principles: Addressing underlying causes of risk in complex systems


> On December 14th, 2022, in collaboration with technologists on team CTO and attorneys in BCP, I gave a presentation at the Federal Trade Commission’s December Open Commission meeting on the systemic approach to security found in the Commission’s orders.


> The goal of this post is to first explain how the FTC has worked to strengthen its remedies to address the underlying causes of risk in complex systems. The post then highlights some of the Commission's recent order provisions from data security and privacy cases and explains how they seek to systemically address risk.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Sat Jun 1 06:39:13 2024