cm0002@lemmy.world to Programmer Humor@programming.dev · 5 days agoJust keep codinglemmy.mlimagemessage-square39fedilinkarrow-up1782arrow-down16
arrow-up1776arrow-down1imageJust keep codinglemmy.mlcm0002@lemmy.world to Programmer Humor@programming.dev · 5 days agomessage-square39fedilink
minus-squarenebeker@programming.devlinkfedilinkEnglisharrow-up16arrow-down1·4 days agoThis is a dangerous metaphor. Remove the old wall and it turns out the new beautiful wall was leaning against and supported by it. I get what you mean, it’s just that the metaphor could support both perspectives.
minus-squareOwl@mander.xyzlinkfedilinkarrow-up15·4 days agoBuild the new wall airgapped from the old one
minus-squaretomiant@programming.devlinkfedilinkarrow-up11·4 days agoAnd keep both walls for redundancy.
minus-squarenebeker@programming.devlinkfedilinkEnglisharrow-up1·3 days agoAh, yes: weaponizing cybersecurity requirements to trick - I mean “motivate” - higher management to do things “right.”
This is a dangerous metaphor. Remove the old wall and it turns out the new beautiful wall was leaning against and supported by it.
I get what you mean, it’s just that the metaphor could support both perspectives.
Build the new wall airgapped from the old one
And keep both walls for redundancy.
Ah, yes: weaponizing cybersecurity requirements to trick - I mean “motivate” - higher management to do things “right.”