cm0002@lemmy.world to Programmer Humor@programming.dev · 6 days agoJust keep codinglemmy.mlimagemessage-square44linkfedilinkarrow-up1833arrow-down17
arrow-up1826arrow-down1imageJust keep codinglemmy.mlcm0002@lemmy.world to Programmer Humor@programming.dev · 6 days agomessage-square44linkfedilink
minus-squarenebeker@programming.devlinkfedilinkEnglisharrow-up17arrow-down1·6 days agoThis is a dangerous metaphor. Remove the old wall and it turns out the new beautiful wall was leaning against and supported by it. I get what you mean, it’s just that the metaphor could support both perspectives.
minus-squareOwl@mander.xyzlinkfedilinkarrow-up15·6 days agoBuild the new wall airgapped from the old one
minus-squaretomiant@programming.devlinkfedilinkarrow-up11·6 days agoAnd keep both walls for redundancy.
minus-squarenebeker@programming.devlinkfedilinkEnglisharrow-up1·5 days agoAh, yes: weaponizing cybersecurity requirements to trick - I mean “motivate” - higher management to do things “right.”
This is a dangerous metaphor. Remove the old wall and it turns out the new beautiful wall was leaning against and supported by it.
I get what you mean, it’s just that the metaphor could support both perspectives.
Build the new wall airgapped from the old one
And keep both walls for redundancy.
Ah, yes: weaponizing cybersecurity requirements to trick - I mean “motivate” - higher management to do things “right.”