Some of the elements that fisher might use like gypsum, not sure if any of it is safe either though. Soil needs more research, is what most people think but growing things is getting harder not sure if the opensoil project can cover enough of the problems yet.
A more safer alternative might be using transition metals and post transition metals in plant soil. Though using transition minerals usually results in having to be treated with something that can cover coding soil too.
Soil needs microbiology, gas exchange and hydrology this is what makes elements available. Nothing needs to be added and all the elements are plentiful. We killed the microbiology, the research is already done. Keep many kinds of plants in the soil year round, stop adding chems, this increases yield 3x and water retention enough to reduce irrigation demand up to 70%. Strange thing is, this is free and removes a bunch of business models + gov subsidies from industrial ag and the universities that support them through "research". Just finished a year talking to farmers and growers of all kinds across the US.
> We killed the microbiology, the research is already done. Keep many kinds of plants in the soil year round, stop adding chems, this increases yield 3x and water retention enough to reduce irrigation demand up to 70%.
Permaculture, no-till, ... Not sure there are definitive research conclusions on this, especially "3x yield".
IME, the conclusions are not as straight cut, nor as general and imply profound changes, such as mixing crops, cultivating more land, reducing yield, never leaving the soil exposed. Many things that have to be done together, with local optimizations, to get significant improvement.
Just like "electric cars" don't directly solve the "many privately owned petrol cars" problem. A solution being the "electric car tech" + another ownership / sharing model + urbanism changes.
"Applications to a sandy soil of the partially purified surface-active compounds improved soil water retention up to 314.3% compared to untreated soil. Similarly, after 36 h of incubation, the humidity uptake rate of treated sandy soil was up to 607.7% higher than untreated controls." ...
"Overall, results revealed that polyextremotolerant bioemulsifiers of bacteria from arid and desert soils represent potential sources to develop new natural soil-wetting agents for improving water retention in arid soils."
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5984429/
Water retention is something but food that isn't as good or yeild that results in not as good food is a even worse problem too though, the specifics about gypsum should be more researched. I suggested transition metals because it's different and it may be safer but even the alternatives associated with fisher are just as scary for food growth too.
Wow, can you point me to research and books on this? I happen to have a bachelor degree in the field and am always eager to find non traditional ways to grow especially pasture for dairy cows, but anything harvestable will be interesting just for the soil science alone.
Large repos make sense or don't make sense based on companies that work with large data or not based on predicate calculus and derivatives usually dealing with repos as well as stories and have more problems with ssds too.
There is lots of problems associated with ssds as well as large monorepos.
There are more complicated than people realize but if you did google code jam it teaches them somewhat but needs to be explained too.
There problem is stories sort of intersect with programming too. Clockwork with ssds needs to be reworked for google code jams.
The problem is elixir sort of works with stories and programming. Predicate calculus and proof theories sort of are the only way programming will really make sense in a world full of ssds.
Leveldb could be a more interesting problem for google code jams if it has some newer features too.
Conflict resolution is tower of hanoi and that has problems with consensus algorithms and concat too.SSDs need to do derivatives for pieceing and parting software too and that is more interesting too.
The problem record and replay is expansions of languages and apis too. That is a good thing for some things but it needs to be reworded sometimes too and implementations of things aren't always newer versions of things either.
> The problem record and replay is expansions of languages and apis too. That is a good thing for some things but it needs to be reworded sometimes too and implementations of things aren't always newer versions of things either.
Changes to languages and APIs can be a problem to record/replay depending on exactly how they're implemented.
Undo's core tech, rr (and, arguably, GDB's built in record/replay) operate at the level of machine instructions and operating system calls, so changes to language and library behaviours don't generally affect us, outside of a few corner cases.
When you have that, you don't need to even know what the language is in order to operate - though if you want source-level debugging then it does matter as you have to be able to map from "your program counter is here" to "you're at this source line".
We occasionally need to add support for new system calls but an advantage of Linux is that the kernel ABI is very stable. New extensions to CPU instruction set also require work - these can be harder to support but they change more slowly.
Of course, operating at such a low level level isn't the only way to record/replay - there are distinct costs and benefits to operating at a higher level in the stack.
The problem is clone is more of a start phase after vfork but before fork regardless for github. So it's kind of a bit strange that we call vfork first but that is about templates too.
As for templates they need to be in different languages and in different formats for video games consoles, and so many other formats they port systems and games that sort of work digitally to certain things but not playable to certain things too.
The other problem is that clone is part of syscall interfaces and part of apis and part of a lot of other things too.
Software is usually verified by some form of hashing scheme like md5, sha-1, or sha-2.
Windows used to run on md5 till it was proven it was horribly broken. A collision could be generated for the typical md5 having two programs have the same md5 disabling the security guarantees it usually provided. Part of stuxnet was believed to be able to overcome the installed package checking mechanisms.
SHA-1 has taken over for verification for a lot of sources including many linux packages. As for it's security it is debatable to a certain extent. There are efforts to port things to sha-2 but it hasn't been officially done yet I think.
Malware persistence is a focus on the malware persisting on the computer or network after infection. It is a very big field considering most organizations use apps from many different software vendors.
When you install an app it can be in source form but it also may contain many different binary(compiled sources). This is problematic. A good example is Hadoop (famous for computing big data problems) contains lots of pre-compiled .jars(java sources compiled).
Static analysis and verification became the go-to standards for a lot of study on verifying binary integrity. But every format and packaged store is different and has different levels of security. There are also more advanced methods or protecting like capabilties(monitoring based on what the apps have access to). A very good minimal for this are some of the libraries released by google including shipshape: https://github.com/google/shipshape
Many companies can no longer get away with just installing a firewall or relying on security products because security is now an "inside problem." Where the software they download from their cloud service(openstack for example) comes from many different vendors. Another example is docker(also many different vendors used to package apps together but provide isolation from the system).
SHA-1 has not been known to be broken, however there are some strange attacks that show that it might be possible it is overcome-able through other means. A prime questionable of how it is overcome example is ssh ebury (http://www.welivesecurity.com/2014/02/21/an-in-depth-analysi... ). SSH ebury seems to be unique in that it during regular execution of the program despite there being no noticeable changes to the user alas from running specific shell commands that are not normally run by regular users it looks not infected/safe.
As for companies installing older versions of software with known remote code execution vulnerabilities or other types of vulnerabilities that are very severe, I do not know of many services or open source software that checks against this! There are however many continuous integration services. Continuous integration services if not done from your company though has problems on verification as well.
A good monitoring practice would be to use homebrew(usually available for most operating systems) to monitor and track what is installed on a regular basis and have some form of whitelist.
Network Traffic analysis for companies is major headache as well. Traffic can be compromised in many different ways. Wikipedia covert channels is a good explanation of some of the complexity involved. There are many tricks for data ex-filtration that make it basically undetectable by normal means (they require some level of active-monitoring). Almost all anti-virus now include network Man-in-the-middle traffic monitoring to do their work.
Anti-virus companies generally have two methods of classifying software as good-ware vs. bad-ware. One is whitelisting and the other is blacklisting. Whitelisting is a selective list of good software. Blacklisting is a selective list of bad-ware. Both methods are generally debatable for which is better. Despite the fact that your anti-virus itself could be compromised usually having an anti-virus provides some level of security.
People despite all this realize that running a company without using pre-made opensource code is rather ridiculous as so much runs on the app stores or third party software sources(outside your company's control).
Security in many cases can be thought of as a castle with multiple walls or layers of defense, but your firewall as being your main wall of defense is a bad decision, because a wall is just what makes your castle stand up to some attacks, it doesn't actively patrol your inner walls for insider threats. Companies need active monitoring systems for access control logs espeically since many common interactions can seem malicious but are just part of people's daily jobs now.
A lot of security is moving to "anomaly detection" where anomalies are jolts of irregularities in the normal business day. Some things that are bad can be parts of normal activity, but done over a longer basis or with extended activity may be hazardous to businesses (a good example is Denial of service attakcs). While anomaly detection is a good trend with smart systems it also suffers from the same "packaging and extending attack surface" like everything else.
This is a short overview of how security works in general, though if you have any questions feel free to ask.
The expression don't quit your day job seems to suffice here. Don't quit your day job until your idea has a platform to rest on. You could always work for few years then pursue what you originally planned, just you will have more startup capital which is a plus.
On a side note, if your idea is a tech based startup idea you can save a whole lot of time/work/effort and money if you read up a bit on microservices, docker, coreos, devops, and selling Software as a Service(SaaS).
Some of the elements that fisher might use like gypsum, not sure if any of it is safe either though. Soil needs more research, is what most people think but growing things is getting harder not sure if the opensoil project can cover enough of the problems yet.
A more safer alternative might be using transition metals and post transition metals in plant soil. Though using transition minerals usually results in having to be treated with something that can cover coding soil too.