The blog is not a safe place for the overly literal mind. You must accept the glib overstatement and the poetic lie. There’s a reason he caused a paroxysm among the rationalists.
What then am I meant to take away from the piece on Zoroastrianism? I don’t know enough about the subject to navigate to the point around the distortions.
> Earlier today I was asking Gemini to find me a nearby bar that would optimize for price, tastiness of drinks, and “not making me feel lonely as a solo traveler on Valentine’s day.”
…this sort of behavior I don’t believe I understand. It seems a silly abdication of living one’s own life. Here’s a poem from just me.
Yep. It seems like for this application you'd want a larger one, a few feet across, with a nice shiny metal foil coating for the radar to bounce off. So, not a $1 balloon.
This approach seems much more likely to induce an incident. It’s an adversarial approach; it’s how you end up shooting people for filming. Constant vigilance! Shoot the nurse on his knees, to be safe!
Your list is correct in favoring intangibles. Ideas underpin all technology and are immune to entropy. Not so MS Excel, which is just a rock tricked into doing particularly structured mathematics. Spreadsheets, the concept, are significant; their implementation is incidental.
Good question. It’s a human who posts tech opinions on the internet. Recently I met one named bigyabai - ironically a rather small tech personality, but one nonetheless.
Chrome extensions shouldn’t be in the hands of users, no matter their title. CEO included. As a device sysadmin I feel this strongly. None of you can be trusted to vet extensions. Honestly anyone who uses vanilla Chrome has a suspect threat model.
On the rest I rather agree with you. General-purpose computers are key tools over which users should be admin. Sysadmins provide a security backstop. Full lock down is the sign of an unhealthy understanding of how the org’s value is actually created.
Also if you can’t figure out how to get around the Chrome extension restriction, you either have remarkably competent CPEs (not me, so unlikely), or you’re not trying hard enough. Go download Canary to start.
Depends on the OS and the “MDM rules.” For instance, it resides in a separate preference domain identifier on macOS. Your sysadmin must deploy “MDM rules” - a profile - which applies to Canary specifically.
They often don’t. Moreover some of the most common implementations of Apple’s MDM protocol also don’t do so automatically.
If they have remembered Canary, just compile your own Chromium with an amusing identifier.
reply