Em Adespoton

  • 2 Posts
  • 2.8K Comments
Joined 2 years ago
cake
Cake day: June 4th, 2023

help-circle




  • I’ve been using Apple products since 1979. I’d definitely say that the statement is true; Apple rarely leads the charge. That doesn’t mean they never do, but they tend to, in most cases, wait for a trustworthy tech to come along, and then push forward with it, dragging the rest of the market along behind them. There’s always innovations and synergies, many of which wouldn’t happen naturally in the market, but the stuff they integrate is generally already well tested and proved.

    Counter examples include the original Macintosh, the Newton MessagePad and kinda-sorta the iPhone. More common behavior is related to things like PowerPC/ARM, USB, Firewire/Thunderbolt, nVME, trackpads, wireless peripherals, and the like.




  • I’ve spent time in sntsk’il’ntən, and one of the things I’ve observed is the amount of orchard and cattle fencing in the area that blocks larger animals from using the obvious corridors. In some places, animals moving through the area would have to climb a significant way up Black Mountain just to get around the fences.

    It’s better than nothing, but the corridor definitely doesn’t track the actual traditional routes the animals would choose to take.

    That said, the bears still use their old routes and routinely knock over any fences that get in their way, so there is that.











  • I wish reporters wouldn’t conflate two timelines.

    On June 26, Citrix had no verifiable evidence that it was being exploited.

    On July 9, Gossi had evidence that it had been exploited as far back as June 23.

    Now, Citrix isn’t innocent in all this; they’ve had 3 days to put out an update stating there’s now evidence it was abused as early as June 23.

    But that second paragraph in no way damns the first: an executive at Citrix had as little evidence as everyone else of the abuse 3 days after it had begun. That does indicate that telemetry to flag this sort of thing was lacking though — and Citrix knew about the issue itself long before; that’s just when it was made public and immediately abused.