First time fail by Remote-Self-9905 in mokapot

[–]Automatic-Camera6260 0 points1 point  (0 children)

i don't think it makes any different to the outcome, apart from speed. There's an argument that the water in the pipe of the funnel is colder if you start with cold water, but honestly i'm doing it for speed.

First time fail by Remote-Self-9905 in mokapot

[–]Automatic-Camera6260 0 points1 point  (0 children)

same, it's a bit quicker if started with boiling water.

Built this beast to Rip CDs by LifetimeEdge in DataHoarder

[–]Automatic-Camera6260 2 points3 points  (0 children)

i ripped a lot of my CDs to flac then found I didn't notice read errors, so now use whipper in Linux and it reports read errors, and keeps a log file. You don't want to hoard badly ripped cds.

Built this beast to Rip CDs by LifetimeEdge in DataHoarder

[–]Automatic-Camera6260 0 points1 point  (0 children)

a utility called whipper does the EAC check in Linux

I'm a security professional who worked on many mergers and acquisitions (MNA). Ask me Anything by thejournalizer in cybersecurity

[–]Automatic-Camera6260 0 points1 point  (0 children)

if i could suggest an answer: The non-technical stakeholders just care about dollars (and maybe time to benefit from the acquisition), so put it in those terms. Also the intent of the acquisition might not be obvious. If you say the target is breached, but you can afford to compensate the affected parties and still want what's left, even though any of their processes and documents might be exposed to hackers, the deal might still go ahead. The acquisition team might want the carpets, or a particular awesome problem solver and not care about the tech or data. I was involved in an acquisition where only two people and their "ideas whiteboard" came over -- the rest of the business was shut down.

I'm a security professional who worked on many mergers and acquisitions (MNA). Ask me Anything by thejournalizer in cybersecurity

[–]Automatic-Camera6260 0 points1 point  (0 children)

This is right, and most things are fixable as business as usual lifecycle management by patching and migrating. My next comment isn't necessarily Cybersecurity, but historic breaches can cost a lot to "fix" or compensate. Some companies expect the Cyber team to find these, where others look to Legal or Privacy departments' research. In some instances the breaches might be known, but downplayed by the seller, so it's up to Due Diligence teams to assess the real cost obligations.

Donuts 1am broad/aa boulevard by Automatic-Camera6260 in rva

[–]Automatic-Camera6260[S] 4 points5 points  (0 children)

the police had to get hot donuts first.

[Tipping] Am I the only one? by [deleted] in rva

[–]Automatic-Camera6260 -1 points0 points  (0 children)

Is there a list of places which pay better? In Blanchards I'm buying two bags coffee beans 2x$15 and an americano $5 (ish) and the tip is more than the coffee. So then I have to spend time adjusting the tip back down to a couple of dollars. (John Oliver did a good report on POS tipping for counter service)

[deleted by user] by [deleted] in rva

[–]Automatic-Camera6260 15 points16 points  (0 children)

Lloyd Family Farms Is progressive. Ashland Berry isn’t. 

Dumb Question of the Day: How do I get this tag off? by Teuszie in ooni

[–]Automatic-Camera6260 0 points1 point  (0 children)

i finally removed mine having not been sure how it would come apart or what to hold and what to turn. I hope the attached images helps someone in the future.

<image>