
(ℹ) Join us now at the IRC channel | ䷉ Find the plain text version at this address (HTTP) or in Gemini (how to use Gemini) with a full GemText version.
| schestowitz[TR2] | <admfubar> interesting; https://www.commodore.net/post/larry-hryb-joins-commodore-to-help-shape-the-future-of-its-global-community | Mar 12 05:52 |
|---|---|---|
| -TechBytesBot/#techbytes-www.commodore.net | Larry Hryb Joins Commodore to Help Shape the Future of Its Global Community | Mar 12 05:52 | |
| schestowitz[TR2] | <li> | Mar 12 10:03 |
| schestowitz[TR2] | <h5><a href="https://cloudnativenow.com/contributed-content/software-supply-chain-security-why-99-of-your-container-is-mystery-code/">Software Supply Chain Security: Why 99% of Your Container is Mystery Code</a></h5> | Mar 12 10:03 |
| schestowitz[TR2] | <blockquote> | Mar 12 10:03 |
| schestowitz[TR2] | <p>That single line pulled in 19,000 files, 700 binaries, and a complete Linux operating system. The actual business logic in a typical container represents 1% of what ends up in production. The other 99%? Mystery meat. </p> | Mar 12 10:03 |
| schestowitz[TR2] | <p> And guess how many lines it took me to fix all these problems? Yes, you might have guessed it right. One line. </p><p> The truth is, your code usually isn’t the source of your Software Supply Chain Security problems. Let’s take a look at how to take back control of your code, without any mystery in it. </p> | Mar 12 10:03 |
| schestowitz[TR2] | </blockquote> | Mar 12 10:03 |
| schestowitz[TR2] | </li> | Mar 12 10:03 |
| -TechBytesBot/#techbytes-cloudnativenow.com | Software Supply Chain Security: Why 99% of Your Container is Mystery Code - Cloud Native Now | Mar 12 10:03 | |
| schestowitz[TR2] | https://www.thelayoff.com/t/1kjx78wwh#replies | Mar 12 15:30 |
| -TechBytesBot/#techbytes- ( status 403 @ https://www.thelayoff.com/t/1kjx78wwh#replies ) | Mar 12 15:30 | |
| schestowitz[TR2] | " Yes that is the plan. Think lower costs by any means as the mainframe market is flat (eg no new customers coming onboard). ÌBM has followed a typical strategy to lower costs | Mar 12 15:30 |
| schestowitz[TR2] | Abandon commodity markets (pc, hda’s, intel servers, etc etc) | Mar 12 15:30 |
| schestowitz[TR2] | Outsource / spinoff (kyndryl) | Mar 12 15:30 |
| schestowitz[TR2] | Offshore labor / repeatable tasks / maintenance (eg India growth) | Mar 12 15:30 |
| schestowitz[TR2] | Abandon legacy (eg buy innovation and layoff legacy) | Mar 12 15:30 |
| schestowitz[TR2] | Automate (eg AI replacing labor). NOTE this impacts onshore and offshore labor | Mar 12 15:30 |
| schestowitz[TR2] | IBM has adopted all 5 over the last few years to goose the bottom line, and that will continue as the 5 strategies move up scale as AI improves" | Mar 12 15:30 |
| *psydroid2 has quit (Quit: KVIrc 5.0.0 Aria http://www.kvirc.net/) | Mar 12 17:46 | |
| *psydroid2 (~psydroid@36imbvshpgubk.irc) has joined #techbytes | Mar 12 17:52 | |
| *psydroid3 (~psydroid@36imbvshpgubk.irc) has joined #techbytes | Mar 12 17:57 | |
| *psydroid|2 (~psydroid@36imbvshpgubk.irc) has joined #techbytes | Mar 12 18:36 | |
| schestowitz[TR2] | <schestowitz[TR2]> <li> | Mar 12 19:06 |
| schestowitz[TR2] | <schestowitz[TR2]> <h5><a href="https://cloudnativenow.com/contributed-content/software-supply-chain-security-why-99-of-your-container-is-mystery-code/">Software Supply Chain Security: Why 99% of Your Container is Mystery Code</a></h5> | Mar 12 19:06 |
| schestowitz[TR2] | <schestowitz[TR2]> <blockquote> | Mar 12 19:06 |
| schestowitz[TR2] | <schestowitz[TR2]> <p>That single line pulled in 19,000 files, 700 binaries, and a complete Linux operating system. The actual business logic in a typical container represents 1% of what ends up in production. The other 99%? Mystery meat. </p> | Mar 12 19:06 |
| schestowitz[TR2] | <schestowitz[TR2]> <p> And guess how many lines it took me to fix all these problems? Yes, you might have guessed it right. One line. </p><p> The truth is, your code usually isn’t the source of your Software Supply Chain Security problems. Let’s take a look at how to take back control of your code, without any mystery in it. </p> | Mar 12 19:06 |
| schestowitz[TR2] | <schestowitz[TR2]> </blockquote> | Mar 12 19:06 |
| schestowitz[TR2] | <schestowitz[TR2]> </li> | Mar 12 19:06 |
| *psydroid|2 has quit (Quit: KVIrc 5.2.6 Quasar http://www.kvirc.net/) | Mar 12 19:53 | |
| *x-amarsh04 has quit (Quit: Konversation terminated!) | Mar 12 22:12 | |
| *x-amarsh04 (~amarsh04@aksg6tcpv6ixw.irc) has joined #techbytes | Mar 12 22:16 | |
| *psydroid3 has quit (Ping timeout: 2m30s) | Mar 12 22:46 | |
Generated by irclog2html.py 2.6 | ䷉ find the plain text version at this address (HTTP) or in Gemini (how to use Gemini) with a full GemText version.