My hunch is that when push comes to shove, they will try to play the game of not having a repository for the machine code, or worse, having a repository but actually running with unreleased / undocumented builds.
If I was running the operation, I would demand periodic pulls of the machine program before/after making any changes, and save them as backups to a protected, master archive. That way, even if they were doing unscrupulous shit with changes to the machine code, you could always revert back and reproduce the issues, as well as demonstrate how the changed code fixed the issue, all without needing to dig into the proprietary code itself.
As an IT engineer, i would immediately fire anyone involved in this piss poor design.
Really need to requir federal audit and design standards on how all this has to be done. Specific laws, no data outside US borders, encryption, pass certification tests, etc.
IT pede here folks.
Anyone got any good info on exactly what these "glitches" are?
I would like to get the true details so us IT nerds can call out what the "glitches" really are.
We know, but have to explain it in meme format fir the normies and NPC folks.
Can we do foia request or how can we get the internal info about them?
No clue here, but also demanding answers.
My hunch is that when push comes to shove, they will try to play the game of not having a repository for the machine code, or worse, having a repository but actually running with unreleased / undocumented builds.
If I was running the operation, I would demand periodic pulls of the machine program before/after making any changes, and save them as backups to a protected, master archive. That way, even if they were doing unscrupulous shit with changes to the machine code, you could always revert back and reproduce the issues, as well as demonstrate how the changed code fixed the issue, all without needing to dig into the proprietary code itself.
https://www.youtube.com/watch?v=ficae6x1Q5A&feature=youtu.be&t=145
https://www.youtube.com/watch?v=ficae6x1Q5A&feature=youtu.be&t=145
Explains it all in detail.
Yep, already watched it.
As an IT engineer, i would immediately fire anyone involved in this piss poor design.
Really need to requir federal audit and design standards on how all this has to be done. Specific laws, no data outside US borders, encryption, pass certification tests, etc.
I can't believe this is real.