Weekly Shaarli
Week 03 (January 13, 2025)
/Applications/Python\ 3.11/Install\ Certificates.command
alternately:
uv pip install --system --upgrade certifiAs we get closer to Debian Bookworm's release, I thought I'd share one change in Python 3.11 that will surely affect many people.
Python 3.11 implements the new PEP 668, Marking Python base environments as “externally managed”<sup id="fnref:kudos"><a class="footnote-ref" href="https://veronneau.org/python-311-pip-and-breaking-system-packages.html#fn:kudos">1</a></sup>.
Jonathan Stark teaches solo consultants how to make more and work less without hiring
Offboard your visitors the right way, say goodbye or thank them for their visit.
Installing software can become overwhelming, requiring hours of research and painstaking attention to detail. However, there’s a tool that can make this process not only easier, but also enjoyable. In this article, we will guide you through installing Ansible, a powerful automation tool.
Stronger proposals may also see private sector applying for a payment 'license'
For over two decades the iPod was the portable music player, just as big as the Walkman was before it. In 2022 Apple announced that the iPod will be discontinued, this is a trip down memory lane of the most iconic iPods.
Killed by Google is the Google Graveyard. A full list of dead products killed by Google in the Google Cemetery.
🔗 See the source.
Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. Attackers may also steal an organization’s information and demand an additional payment in return for not disclosing the information to authorities, competitors, or the public. This Cybersecurity Framework (CSF) 2.0 Community Profile identifies the security objectives from the NIST CSF 2.0 that support governing management of, identifying, protecting against, detecting, responding to, and recovering from ransomware events. The Profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events. This Profile can be leveraged in developing a ransomware countermeasure playbook.
The public comment period on this draft is open.