https://muxup.com/2023q4/storing-data-in-pointers#some-real-...
Sadly, my go-to Linux hardware manufacturers either don’t offer ECC RAM, or only offer it as an option on their absolute top-end machines. Yes, yes, the extra two thousand dollars for a machine with a six-year lifespan probably is worth it on a monthly basis, but man it still hurts.
Old used enterprise server. None of them will be great at power/performance in typical (i.e. mostly idle) home use tho. Intel ones usually far better here
However, as a provider I can totally see a situation where I (proverbially, I'm not in this business) sue you for disclosing what amounts to a trade secret (depending on what's in the fine print) and compel you to give up all documents so I can go after my loose-lipped client too.
I hope you've got your legal bases covered
I don't see this holding in court aside from the company needing to remove that info from the site.
You are not beholden to NDA you have not signed, and it woudld be employee that shared it breaking any agreements, not the company that then shared it.
I feel like the way to go there would have been closer to the Meta/Facebook brand hierarchy.
X is the platform / super app and Twitter is the first app within X. Twitter accounts become X accounts but you still use them to Tweet on Twitter.
The destruction of the Twitter branding seems more out of spite than business development goals. Really the whole follow through of the Twitter purchase reeks of spite and destruction rather than building something new of value.
But I'm not a successful billionaire so I'm probably wrong.
Or just incompetence. Plenty of that. Assuming just because he is billionaire that he's competent at everything related to any company and the reason for failure is something else is silly.
He had no idea what the fuck he is doing and he fucked up.
There is strong nostalgia for aw-shucks persona of an inventor-turned-business-owner.
https://www.cnbc.com/2023/05/16/cnbc-exclusive-cnbc-transcri...
https://www.rev.com/blog/transcripts/dealbook-summit-2023-el...
That's why matching cable from cameras [ ... disappears, reappears ... ] and into visible on office desk sacrifical anode NAS box works. They don't trace the cabling, they make assumptions based on matching colour. The 'trick' is to make sure the camera display screens cut out if the "fake" NAS goes down .. best to route to screen through sacrifical secondary storage.
> That is a scenario that only happens in the movies.
Here, in my part of the world, it's used by several contracters I'm aware of, in homes, shops, warehouses .. fake drives near camera display screens get destroyed in break ins more often than you realise - and more frequently in recent years.
Even in the US the Afroman raids show the police about to rip drives out of the security system .. if there'd been a decoy box | real time cloud backup there'd be more footage of the raid for his songs and court case.
I think bigger problem is people that think they can do that in first place still being employed in police...
Most large sites put their cameras on segregated networks, so it might not even be obvious to folks for a while.