![](/static/66c60d9f/assets/icons/icon-96x96.png)
![](https://lemmy.world/pictrs/image/44bf11eb-4336-40eb-9778-e96fc5223124.png)
Hours spent working is not the same as productivity.
Twice as many people assigned to a project does not double productivity either.
I could go on…
Hours spent working is not the same as productivity.
Twice as many people assigned to a project does not double productivity either.
I could go on…
Don King had an alternative thesis:
https://youtu.be/o4qo161MRNE?feature=shared
You should probably do it twice, before and after. Just to be on the safe side.
Alan Rickman was a treasure. RIP
Nevermind hackers. Look up “corporation in the middle” attacks, which is a prime example of subverting secure channels at scale.
If you don’t own the hardware, nothing you do on it is truly private. Ditto if someone else has admin access to your hardware (eg BYOD scenarios) . Inserting a root certificate into the OS is trivial in both cases.
FDA vs. Alliance for Hypocritic Medicine.
I was thinking about the future. Think of a cornered Hitler with access to hydrogen bombs.
Wow that’s even scarier than what I had in mind. Good intentions all the way down.
The fucked up thing about humanity is that we invented our own destruction, put a shiny red button on top and wrote on it “do not touch”. As if there would ever be a scenario where pressing it would make sense. And seeing the rethoric coming out of Russia these days, I can’t help but wonder. Damn, I guess this is what my parents lived with at the height of the Cold War?
Iain M. Banks’ “Culture” series. RIP
Yes, and if 30 people can sing a symphony in 2 hours, imagine what 120 people could do.