It seems like you weren't really asking, but I'll answer anyway.
It's bad security practice, and opens up your network to attack and/or compromise, you're massively increasing the attack surface, and a compromise of one of those components leaves the attacker sat on your edge router, at which point your entire network is fair game.
Generally speaking you shouldn't expose anything on your edge router / firewall, it's a safety barrier.
You can sit things behind it in a "DMZ" and port-forward and isolate them etc so that there's no packets terminating on the actual edge device itself.m, that lowers the risk of a full network level compromise.
Chances are you might be fine and never have a problem, but it's still recommended against.
It was a genuine question, and while you reiterate the author's point about this being "bad security practice," neither you nor the author explain why this is the case.
I don't believe physical separation really buys you much here. At most, if may reduce downtime if you do indeed get pwned, but I think that you can achieve the same objective through a combination of containers, VMs, and UNIX users. And running multiple, somewhat redundant machines also has obvious downsides such as increased power consumption, increased maintenance burden, additional space and cabling, etc.
> opens up your network to attack and/or compromise, you're massively increasing the attack surface, and a compromise of one of those components leaves the attacker sat on your edge router, at which point your entire network is fair game.
I was looking at that RAC chart this morning. Given it's Sunday, and I was reading before my morning coffee, I'm not ashamed to say it took me a good few seconds of zooming in and out to realise they'd used a decimal point where a comma should have been.
Easy type to make, but seriously, does no one even take a cursory look at the charts when publishing articles like this? The chart looks _obviously_ wrong, so imagine how many are only slightly wrong and are missed.
The fuel prices one could surely be solved with a tiny bit of validation; are the coordinates even within a reasonable range? Fortunately, in the UK, it's really easy to tell which is latitude and which is longitude due to one of them being within a digit or two of zero on either side.
In January I upgraded my desktop, 9950X3D £600, 64GB DDR5-6000 £600, MSI MAG Tomahawk X870E £300, Samsung 990 Pro 4TB £350, Asus Prime 9070XT £580. I spent a another £250 on PSU and cooler and reused my case (Phanteks Evolv Enthoo TG, beautiful case but horrible cooling. Will cut some holes in it and if it doesnt work out look for something with more airflow).
The RAM price was already inflated at that time, and the same kit is now £800, but in October or earlier last year I'd have saved possibly the cost of the CPU/GPU on the whole thing, but now it's be about the cost of a CPU/GPU more expensive.
On a side note for anyone not aware, 9950X3D isn't the best choice for pure gaming, 9850X3D is cheaper and marginally better, also I went with 2 sticks of RAM kit, 4 sticks is much harder to run at the advertised speed (6000) which is actually an overclock.
Im a dev and a linux user/gamer hence my choice of CPU/GPU.
Very similar config, but I bought a second pair of ram. Running 4 sticks at 3600.
Also, the LAN port of the motherboard stopped working after a week, so I had to buy an Ethernet card
If you're curious, maybe you can look into Chuck's lawsuit against Penguin's book of Chuck Norris facts. He would eventually "co-author" his own book. The obvious guess here is trademark infringement (over use of Chuck's name/likeness) and/or copyright (if some of these facts were lifted from his book).
For better or worse, in the US you can pretty much sue anyone for anything. A court certainly requires more evidence to declare liability than Apple would to remove an app.
As far as copywriting facts, are you really under the impression that Chuck Norris is the only man who can factually slam a revolving door? :)
Nice! I loved that phone, was one of my favourites. One of the only, if not the only phone I ever owned that had a metal shell that I an recall.
I had most of the N range, and was particularly interested in music ones, N95 was love/hate because the music button/reverse slide was so slow sometimes, and generally it just wasn't as good as N91 for music listening with its proper headphone jack placement, and always accessible controls.
What kind of magic did that HDD have that it could be thrown around like a phone typically is without the issues we would see if we'd handled a laptop with HDD the same way?
Had an accelerometer that turned off hard drive when motion detected. High end ibm thinkpads had that too. Turns out if seek head is parked properly, its fairly robust
N91 also had a ridiculously high quality DAC that beat pants off iPods of that gen.
Do you know which HA integration I would use if I want to try out Qwen 3 ASR in HA? Some screenshots in the OP reference Qwen 3 ASR for STT but I can't seem to find any reference to which integration I'd use.
It has legal implications, as others have expressed.
It means your position was made redundant, and it allows you to be terminated with little legal complication, but on the understanding that the same position can't be re-hired for within a period, I think it's 6 months.
Of course in reality it's not that simple, you get "made redundant" then they rephrase the job title a bit and hire someone else.
Redundancy in the real, proper form is a consultation process where they will try, if possible to relocate people into other positions, government does it all the time when there's cuts, and they'll often offer voluntary redundancy where they pay you X amount to quit, it's usually a reasonable sum and should leave you with more than enough cash in "normal" circumstances to find another job comfortably, or see you through to retirement if you're pretty close.
Sometimes it's just a way to get rid of people who are shit or you don't like.
If you're gonna lose your job, being made "redundant" is the way you want to do it.
I’ve been involved in this once. There were two of us in the QA department that did subtly different jobs. They wanted rid of the other guy, but as we had very similar roles I had to be involved in the consultation process. What they did is very specifically outline the differences and that his were the ones that were redundant. My manager and friend pulled me into a room beforehand and told me ‘you’re gonna go through some shit but trust me you’re keeping your job’. It all left me with a fairly sour taste in my mouth and to this day I’m not entirely sure it was all above board. If a company wants you gone, they’ll figure a way to do it.
Yeah, I went through it 3 times in the first decade of my career, two of them were just like yours, I was told "look, this has to go like this, so you're gonna have to go through the stuff, but don't worry, we're promoting you so you won't be affected". After the second one, I left because it just becomes a shitty place to work. The good people who weren't given a hint they're safe end up leaving because of the risk and hit to morale, then the morale for the rest of you drops.
The third one was a little different, they just said this entire country is redundant were moving operations abroad. So everyone was gone.
I'm almost certain this was to win some sort of grant, award, subsidy, exemption, green credentials....something, and then once they had it, immediately forgotten.
I've seen this happen plenty where companies start campaigns for reasons and then ditch it as soon a they've achieved the thing from the list above.
It seems like you weren't really asking, but I'll answer anyway.
It's bad security practice, and opens up your network to attack and/or compromise, you're massively increasing the attack surface, and a compromise of one of those components leaves the attacker sat on your edge router, at which point your entire network is fair game.
Generally speaking you shouldn't expose anything on your edge router / firewall, it's a safety barrier.
You can sit things behind it in a "DMZ" and port-forward and isolate them etc so that there's no packets terminating on the actual edge device itself.m, that lowers the risk of a full network level compromise.
Chances are you might be fine and never have a problem, but it's still recommended against.
reply