• 0 Posts
  • 29 Comments
Joined 4 months ago
cake
Cake day: May 19th, 2024

help-circle

  • Fucking podman… Oh man. I have lost way too many hours dealing with podman.

    It’s frustrating, because they’ve put so much into it. It’s close enough that vendors think they can get away with saying their containers are compatible and they’ve probably really honestly tested for brief periods and it really usually is close enough that you don’t discover the differences until you’re already very well established, but then it’s just a little different and it takes you FOREVER to find out why but then the only option once you do find that out is to completely start over from scratch with docker. And, almost no vendor is going to treat them differently because if we talk to redhat, the first note we’ll get back is that everything we’re trying to do should be fully compatible and there should be no need to worry about that. And, then eventually after a few weeks, it’s docker’s fault that IT WORKS IN DOCKER AND NOT IN PODMAN. Docker needs to go fix it so it’s broken for them too, it’s not a bug for podman, the problem is with the one that’s working.

    I’m a bit traumatized, not always the same, but this isn’t a singular occurrence.














  • To be fair… I read the whole interview a few days ago, she was kind of pushed into this statement. The idea from the CEO was presented as a high-end luxury mouse that you’d treat like a fancy watch you could just repair and never need to replace. The closest we got to Logitech saying this was the interviewer asking if they could ever see a subscription being attached to the mouse and the CEO saying ‘possibly’ and then implying that it could be something like a maintenance/repair contract so that you would never have to worry about your mouse.

    This whole ordeal was mostly just poor form in interviewing where the interviewer pushed the interviewee into a statement that they knew would be good clickbait.





  • They definitely could, but most cybersecurity departments are paid too much to worry about minor items like that. If HR tells us to look into a specific user and gets the proper approvals so that everything is in compliance, we’ll definitely get someone on the team to do it, but otherwise if we happen to see evidence of unapproved usage, we’re mostly going to overlook it unless it could lead to something dangerous to your machine or the company as a whole.

    EDRs like Crowdstrike can see very very nearly everything you do though, definitely everything you would care about.