Hacker Newsnew | past | comments | ask | show | jobs | submit | whydoyoucare's commentslogin

Aren't advancements in AI actually helping drug discovery?


We scream at the expired certificate, yet happily let CloudFlare be an official MitM. How ironic is that? :)


Where the argument is rooted is helpful in determining if there is any sort of compromise or "seeing other's viewpoint" can be had. - Beliefs: Lowest level, simply held to be true. Arguments at this level cannot change anyone's mind and are pointless waste of time - Values: Higher up, what you value more. Still deep, but some middle ground possible with lot of effort - Morals: Right or wrong, middle ground and compromise or change of mind possible - Ethics: Top level, just morals into action. Easiest to argue/change mind.


The article rendering hurt my eyes, and then it was a pdf of the source code! :-(


If only Microsoft owned a place to post source code...


That would be either OneDrive or for the real l337 adminz: B:\

Git is for Linux and other cancers.


OneDrive? Look at mister corporate moneybags here. Sharepoint!


SharePoint is where the real money and fun stuff is at.

How do you think the likes of Delta and McDonalds manage their intranet and document storage? OneDrive is just a glorified SharePoint feature.

P.S. Joking only partially, and not much at all.


Yeah, it's pretty awesome, right?

REAL windows enterprise companies worth their salt use a shared drive on \\global.


I genuinely liked your opening statement (disagreeing...)

I am sorry to hear you had such a raw experience. Maybe you were dealing with pretty clueless engineers, since most do realize a buffer overflow should be treated exploitable unless proven otherwise. I've had better experience trying to argue the cost of fix -- it being pretty low was incentive enough for engineering to fix it.

That said, I am worried evilsocket may not be taken seriously next time he finds a vulnerability with CVSS 9.9. To some extent I am surprised by his argument on not knowing CVSS scoring rubrik. There may have been language barrier at play as well, leading to some of his sentences coming across as more abrasive than they should have been.


We must first precisely define "level of security" that is expected from OpenSSH and a commerical version. Only then the discussion about who can guarantee what would make sense.


You can pay for it and sign a file full of null characters. Signing has nothing to do with quality from what I understand.


"Yours sincerely,

Crowdstrike

---

PS - If you get hit by some massive crash, we refer you to our company's name. What were you expecting?"


True, especially when a reboot of Windows takes several minutes because it started auto-applying updates!


I believe instances like this will push people to reconsider the lax stance. Humans in general have a hard time regulating something abstract. The fact that people can be killed is well-known since the 80s', see https://en.wikipedia.org/wiki/Therac-25


I once worked on some software that generated PDFs of lab reports for drug companies monitoring clinical trials. These reports had been tested, but not exhaustively.

We got a new requirement to give doctors access to print them on demand. Before this, doctors only read dot matrix-printed reports that had been vetted for decades. With our XSL-FO PDF generator, it was possible that a column could be pushed outside the print boundary, leading a doctor to see 0.9 as 0. I assume in a worst worst case scenario, this could lead to an misdiagnosis, intervention, and even a patient's death.

I was the only one in the company who cared about doing a ton more testing before we opened the reports to doctors. I had to fight hard for it, then I had to do all the work to come up with every possible lab report scenario and test it. I just couldn't stand the idea that someone might die or be seriously hurt by my software.

Imagine how many times one developer doesn't stand up in that scenario.


This is why I made that point, similar to you I would not stand for having my code in something that I can't stand behind, especially if it potentially harms people.

But it should not hinge on us convincing people.


My guess is this was an auto-update pushed out by whatever central management server they use. Given CS is supposed to protect your from malware, IT may have staged and pushed the update in one go.


Auto-updates are the only reason something like this gets so widespread so fast.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: