𝙲𝚑𝚊𝚒𝚛𝚖𝚊𝚗 𝙼𝚎𝚘𝚠

  • 0 Posts
  • 43 Comments
Joined 1 year ago
cake
Cake day: August 16th, 2023

help-circle



  • Wikipedia. Google Maps. The store of knowledge available from search engines. I use those all the time. You want to cut them off from that?

    That’s a bit overdramatic. Most kids have a laptop for schoolwork these days. I personally didn’t get a smartphone until I started university, got a Samsung S7 then. I had no issues accessing any of those sources. These days I have a comp sci masters degree, so it definitely didn’t “stunt” me in any way.

    I read and certainly write way more text than I did in the pre-Internet era. Do you want kids reading and writing less?

    Kids reading and writing skills appear to have been declining ever since the rise of the smartphone, so I doubt they’re reading anything of sufficient quality to hone those skills a bit.

    Schools here have recently mostly banned smartphones, and the kids seem happier for it and their grades and concentration in school is improving. Sound like positives to me.





  • A single server not booting should not usually lead to a loss of service as you should always run some sort of redundancy.

    I’m a dev for a medium-sized PSP that due to our customers does occasionally get targetted by malicious actors, including state actors. We build our services to be highly available, e.g. a server not booting would automatically do a failover to another one, and if that fails several alerts will go off so that the sysadmins can investigate.

    Temporary loss of service does lead to reputational damage, but if contained most of our customers tend to be understanding. However, if a malicious actor could gain entry to our systems the damage could be incredibly severe (depending on what they manage to access of course), so much so that we prefer the service to stop rather than continue in a potentially compromised state. What’s worse: service disrupted for an hour or tons of personal data leaked?

    Of course, your threat model might be different and a compromised server might not lead to severe damage. But Crowdstrike/Microsoft/whatever may not know that, and thus opt for the most “secure” option, which is to stop the boot process.