• 1 Post
  • 100 Comments
Joined 1 year ago
cake
Cake day: August 15th, 2023

help-circle


  • It’s a markup language(ish) but it’s not a programming language. XML would be closer to programming, IMHO, since you could have simple things like recursion. That example is even pushing what I would consider “programming”, but anyone can feel free to disagree.

    SQL is in the same category for me. It’s a query language and can get super complex, perform some basic logic, but you can’t exactly write “snake” in it. Sure, you could use cmdshell or something else to do something more complex, but that would no longer be SQL.

    My simplistic expectation of an actual programming language would be that you can automate an entire platform at the OS level (or lower) instead of automating functions contained within a service or application. (JVMs and other languages that are “containerized” are weird outliers, by my definition.)

    I am not trying to step on anyone’s toes here. I just never have really thought about what I personally consider a programming language to be.







  • It’s one of the better EDR (Endpoint Detection and Response) tools on the market. For enterprises, they are able to suck down tons of system activities and provide alerting for security teams.

    For detection, when I say “tons of data”, I mean it. Any background logs related to network activity, filesystem activity, command line info, service info, service actions and much more for every endpoint in an organization.

    The response component can block execution of apps or completely isolate an endpoint if it is compromised, only allowing access by security staff.

    Because Crowdstrike can (kind of) handle that much data and still be able to run rule checks while also providing SOC services makes them a common choice for enterprises.

    The problem is that EDR tools need to run at the kernel level (or at a very high permission level) to be able to read that type data and also block it. This increases the risk of catastrophic problems if specific drivers are blocked by another kind of anti-malware service.

    When you look at how EDR tools function, there is little difference between them and well written malware.

    Crowdstrike became a choice recently for many companies that got fucked over by Broadcom buying VMWare. VMWare owned another tool, Carbon Black, which became subject to the fuckery of Broadcom so more companies scrambled to Crowdstrike recently.

    I hope that was enough of a summary.



  • Yeah, I got several replacement bits from them for no charge. It’s also super easy to get past their level 1 support if you present an issue clearly and with evidence. (… as opposed to being forced to perform every step in a level 1 playbook. (DiD yOu tUrN iT oN aNd oFf agAiN?))

    I have been following the power loss recovery issues on GitHub for a while. They finally came out and said, on GitHub, that they can’t implement. It was super shady of them to just quietly delete that feature from their product page.

    However: If your first layer is tuned correctly and you lose power long enough for the bed to cool down, the print (depending on the material) will likely pop off the bed anyway so power loss recovery is moot. IMHO, if the print is super important it should be supervised and attached to a beefy UPS.


  • Random rambling and opinions ahead.

    It’s $10k if anyone was wondering but as far as commercial products go, that is still peanuts.

    Prusa acquired the companies responsible for this product a couple years ago(?) and I believe it is a good thing that this product was in limbo for a bit. (It likely means a more refined product, but just speculation.)

    Unfortunately, Prusa is not beyond beta testing with their customers or making false promises about future product features. (re: Prusa Mini, as a good example.) I only say this because if you were planning to buy this for production immediately, I would personally wait a few months.

    That previous paragraph sounds bad, and it is, but their support channels are amazing and that is where most of the product cost is. My personal experience with Prusa support has always been excellent.

    (I was a Mini early adopter, so I expected some rough edges. Power loss recovery functionality was quietly buried over the last couple of years as their original board+psu wasn’t up to the task.)





  • Sorry, my points were mixed unintentionally.

    I agree, I stay away from JVMs because they are a pain in the ass to administer and like you said, are usually coded by the lowest bidder.

    In a well maintained environment, I have nothing against JVMs actually.

    I was just bitching about the spring framework family. While security updates are frequent, Java apps tend to not age well and commonly suffer from version lock-in. (I am going through a round of that at my current job with spring auth stuffs being the offender.)