Techrights logo

IRC: #techbytes @ Techrights IRC Network: Thursday, March 12, 2026

(ℹ) Join us now at the IRC channel | ䷉ Find the plain text version at this address (HTTP) or in Gemini (how to use Gemini) with a full GemText version.

schestowitz[TR2]<admfubar> interesting;  https://www.commodore.net/post/larry-hryb-joins-commodore-to-help-shape-the-future-of-its-global-communityMar 12 05:52
-TechBytesBot/#techbytes-www.commodore.net | Larry Hryb Joins Commodore to Help Shape the Future of Its Global CommunityMar 12 05:52
schestowitz[TR2]                                <li>Mar 12 10:03
schestowitz[TR2]                                    <h5><a href="https://cloudnativenow.com/contributed-content/software-supply-chain-security-why-99-of-your-container-is-mystery-code/">Software Supply Chain Security: Why 99% of Your Container is Mystery Code</a></h5>Mar 12 10:03
schestowitz[TR2]                                    <blockquote>Mar 12 10:03
schestowitz[TR2]                                        <p>That single line pulled in 19,000 files, 700 binaries, and a complete Linux operating system. The actual business logic in a typical container represents 1% of what ends up in production. The other 99%? Mystery meat. </p>Mar 12 10:03
schestowitz[TR2]                                        <p> And guess how many lines it took me to fix all these problems? Yes, you might have guessed it right. One line. </p><p> The truth is, your code usually isn’t the source of your Software Supply Chain Security problems. Let’s take a look at how to take back control of your code, without any mystery in it. </p>Mar 12 10:03
schestowitz[TR2]                                    </blockquote>Mar 12 10:03
schestowitz[TR2]                                </li>Mar 12 10:03
-TechBytesBot/#techbytes-cloudnativenow.com | Software Supply Chain Security: Why 99% of Your Container is Mystery Code - Cloud Native NowMar 12 10:03
schestowitz[TR2]https://www.thelayoff.com/t/1kjx78wwh#repliesMar 12 15:30
-TechBytesBot/#techbytes- ( status 403 @ https://www.thelayoff.com/t/1kjx78wwh#replies )Mar 12 15:30
schestowitz[TR2]" Yes that is the plan. Think lower costs by any means as the mainframe market is flat (eg no new customers coming onboard). ÌBM has followed a typical strategy to lower costsMar 12 15:30
schestowitz[TR2]    Abandon commodity markets (pc, hda’s, intel servers, etc etc)Mar 12 15:30
schestowitz[TR2]    Outsource / spinoff (kyndryl)Mar 12 15:30
schestowitz[TR2]    Offshore labor / repeatable tasks / maintenance (eg India growth)Mar 12 15:30
schestowitz[TR2]    Abandon legacy (eg buy innovation and layoff legacy)Mar 12 15:30
schestowitz[TR2]    Automate (eg AI replacing labor). NOTE this impacts onshore and offshore laborMar 12 15:30
schestowitz[TR2]IBM has adopted all 5 over the last few years to goose the bottom line, and that will continue as the 5 strategies move up scale as AI improves"Mar 12 15:30
*psydroid2 has quit (Quit: KVIrc 5.0.0 Aria http://www.kvirc.net/)Mar 12 17:46
*psydroid2 (~psydroid@36imbvshpgubk.irc) has joined #techbytesMar 12 17:52
*psydroid3 (~psydroid@36imbvshpgubk.irc) has joined #techbytesMar 12 17:57
*psydroid|2 (~psydroid@36imbvshpgubk.irc) has joined #techbytesMar 12 18:36
schestowitz[TR2]<schestowitz[TR2]>                                 <li>Mar 12 19:06
schestowitz[TR2]<schestowitz[TR2]>                                     <h5><a href="https://cloudnativenow.com/contributed-content/software-supply-chain-security-why-99-of-your-container-is-mystery-code/">Software Supply Chain Security: Why 99% of Your Container is Mystery Code</a></h5>Mar 12 19:06
schestowitz[TR2]<schestowitz[TR2]>                                     <blockquote>Mar 12 19:06
schestowitz[TR2]<schestowitz[TR2]>                                         <p>That single line pulled in 19,000 files, 700 binaries, and a complete Linux operating system. The actual business logic in a typical container represents 1% of what ends up in production. The other 99%? Mystery meat. </p>Mar 12 19:06
schestowitz[TR2]<schestowitz[TR2]>                                         <p> And guess how many lines it took me to fix all these problems? Yes, you might have guessed it right. One line. </p><p> The truth is, your code usually isn’t the source of your Software Supply Chain Security problems. Let’s take a look at how to take back control of your code, without any mystery in it. </p>Mar 12 19:06
schestowitz[TR2]<schestowitz[TR2]>                                     </blockquote>Mar 12 19:06
schestowitz[TR2]<schestowitz[TR2]>                                 </li>Mar 12 19:06
*psydroid|2 has quit (Quit: KVIrc 5.2.6 Quasar http://www.kvirc.net/)Mar 12 19:53
*x-amarsh04 has quit (Quit: Konversation terminated!)Mar 12 22:12
*x-amarsh04 (~amarsh04@aksg6tcpv6ixw.irc) has joined #techbytesMar 12 22:16
*psydroid3 has quit (Ping timeout: 2m30s)Mar 12 22:46

Generated by irclog2html.py 2.6 | ䷉ find the plain text version at this address (HTTP) or in Gemini (how to use Gemini) with a full GemText version.