I tried making this joke to the author when the book was released ("I purchased the book, but the link just took me to an empty page") and, unfortunately, they didn't get it and tried to give me customer support
Why would you disagree with the parent post and then fail to provide the title of the book in your own response? Just give the name of the book, please.
Log entry: Tried building a wall out of hard drives, but Gate walked around them and kept coming. Walls of information ineffective. I've forgotten my name, so I suspect this may be my final entry.
This bullshit attitude to make in-jokes that don't make any sense to people not part of the cultural or social phenomenom that an article is about is one of the most infuriating aspects of them. You can barely find proper user review for books like this or Welcome to Night Vale or such.
This is my experience as well. A solutions architect is likely to be working directly with customers to achieve what they want with the product which can involve deployment work, integration work, etc. Sometimes this work is found to be repeatable across customers and may be engineered into the product. An architect (in a software or IT context) can have pretty widely varying responsibilities, usually more focused on building product or internal company environments. But solution architects have been fairly consistent in scope of responsibility across the companies I’ve been exposed to
Depends a lot on how many Spring apps out there have the prereqs to be vulnerable. The widespread nature of Log4Shell is what made it “worse” than other RCE vulns. I don’t have a sense of how many vulnerable instances of this one might be out there but the number could be enormous.
OP here. Sorry that it felt that way to you, and curious why? Because it is from a corporate blog? The material answers the question posited in the title, IMO, but curious why it came off as an Ad to you. Mind sharing?
>ExtraHop Reveal(x) automatically detects unusual changes in DNS traffic based on device behavior over time, surfacing queries that should be investigated. A defender can investigate the DNS query from the detection card.
While it does answer the question it also presents one of the solutions as something it has stake in. Imagine a McDonalds blog post about ways to stop hunger:
How to stop hunger!
Hunger is when your body wants food. Here are 3 ways of stopping that feeling:
Yeah, that is incredibly frustrating. It seems to me that many of these types of scams target general consumers, piggybacking on legitimate app's names to get a few thousand people to pay a buck or give you some personal info, etc. These instances that target developer tools have the potential to do a different kind of damage to peoples' livelihoods.
:)
reply