Why I don’t Facebook nor Twitter
I get asked all the time why I’m not on Facebook, nor on Twitter.
I get asked all the time why I’m not on Facebook, nor on Twitter.
When an employee or contractor leaves the company, it’s best practice to immediately disable their access to company resources.
In the digital and online world, it’s easy to miss some forms of access, and remember off-hand every single system where the employee’s access should be revoked.
The level of risk increases when the employee separation occurs involuntarily, which might create a situation where the former employee is disgruntled, and increases exponentially if the employee has administrative privileges to sensitive systems.
In this article, I will attempt to outline best practices for a policies and processes around identity and access management, enumerate specific forms of access, many of which might be overlooked, and share some anecdotes resulting from the failure to properly revoke a terminated employee’s privileges.
Port of Ularn (“Ultra” Larn), a 1990’s version of Larn, an ASCII-based text game from the 1980’s.
Runs on Windows (Win32) including XP, Windows 7, Wiindows 8
Added color!
Science generally agrees that “mankind”, homo sapiens, is about 200,000 years old.
During that span of time, technology has advanced at an ever-increasing rate, but there have been only a small handful of innovations – fundamental changes – that altered mankind’s ability to express itself technologically.
ULarn (Ultra-Larn) for Win32, built on Cygwin but runs natively
Ularn that runs on Windows 7!
Security screws are specially-designed fasteners that can’t be removed without the corresponding, specially-designed bit.
Security screws are an excellent way to help prevent people from tampering with public facilities and resources, and to help prevent someone from creating a public safety issue — for example, security screws can and should be used in buses, trains, and airplanes.
In most applications, however, they are more of an inconvenience than a deterrent.
Meanwhile, the two most common screw fasteners, “slotted” (standard) and Phillips, are both problematic.
Aside from laptops and other mobile computing platforms, I am a long-time user of hand-held computing devices.
I’ve assembled a chronological list of the devices that were most used or useful to me.
There are many kinds of blank or empty values, that mean different things.
Cooking a whole brisket is normally a 10 to 12 hour process for me, not including prep time, cooling time, nor the time it takes to cut it (brisket has to be cut properly, or it doesn’t turn out well). End to end, that works out to 14 to 15 hours.
I worked out a process for cooking a smoked, whole brisket in 4 hours (cook time), making the end-to-end time about 5.5 to 6 hours.
You might think that I sacrificed flavor or texture, but I didn’t!
Click to keep reading!