Skip to content

Instantly share code, notes, and snippets.

CREATE EXTENSION IF NOT EXISTS pgcrypto;
CREATE TYPE ore_64_8_v1_term AS (
bytes bytea
);
CREATE TYPE ore_64_8_v1 AS (
terms ore_64_8_v1_term[]
);
➔ be rails s
=> Booting Puma
=> Rails 7.0.4.2 application starting in development
=> Run `bin/rails server --help` for more startup options
Puma starting in single mode...
* Puma version: 5.6.5 (ruby 3.1.3-p185) ("Birdie's Version")
* Min threads: 5
* Max threads: 5
* Environment: development
* PID: 18387

DevOps and Data Security: words vs actions

LastPass. Shangri-La. Optus. The last 12 months have seen a reckoning for data security around the world.

But are these examples really that out of step with how we actually do security in our own organisations (not just what we tell ourselves about how we do it)?

What do organisations doing devops actually think about data security? Who do they think they are defending against? What steps are they taking to safeguard customer data?

This talk will explore two years of qualitative interviews with business and government organisations about how they think and act on data security.

# default layout (can be bsp, stack or float)
yabai -m config layout bsp
# wild west on space 1
yabai -m config --space 5 layout float
# New window spawns to the right if vertical split, or bottom if horizontal split
yabai -m config window_placement second_child
# padding set to 1px
160 # you probably want to just uncomment these lines when you are debugging — Lindsay
161 #passenger_env_var CS_PROTECT_DEBUG yes;
162 #passenger_env_var RUST_LOG trace,hyper=trace;
163
164 #passenger_env_var CS_STATIC_RUNTIME_CACHE true;
165 #passenger_env_var CS_RUNTIME_CURRENT_THREAD true;
166 #passenger_env_var TOKIO_WORKER_THREADS 2048;
167 #passenger_env_var CS_PASSTHROUGH true;
168 #passenger_spawn_method direct;
Hi there,
Just wanted to provide some feedback on the "overcoming obstacles for deaf & blind jurors" segment on the May 30, 2023 episode of the Law Report:
https://www.abc.net.au/radionational/programs/lawreport/pwc-tax-leak/102347562
First up: this was a great episode, especially the Irish example about how improving accessibility for the deaf by eliminating courtroom crosstalk also improved the experience of everyone else in the court.
There was one small issue though: the lack of a transcript for this episode.
I recognise that transcripts aren't usually provided for Law Report episodes, and they can be costly to produce, but I thought this episode in particular would be appropriate to make a transcript available for.

DevOps and Data Security: where Aussie orgs are at

Optus. Medibank. Latitude. The last 12 months have seen a reckoning for data security in corporate Australia.

But are these examples really that out of step with how we actually do security in our own organisations (not just what we tell ourselves about how we do it)?

What do Australian organisations doing devops actually think about data security? Who do they think they are defending against? What steps are they taking to safeguard customer data?

This talk will explore two years of qualitative interviews with Australian organisations about how they think and act on data security.

# -*- ruby -*-
# frozen_string_literal: true
# The top-level PG namespace.
module PG
major_minor = RUBY_VERSION[ /^(\d+\.\d+)/ ] or
raise "Oops, can't extract the major/minor version from #{RUBY_VERSION.dump}"
begin
CipherStash Client Library Licence Agreement
0. Background
This licence sets out the terms on which you are permitted to use client side
components of software provided by CipherStash to query encrypted databases
(CipherStash Client Software).The operation of the CipherStash Client Software
is dependent on encryption keys generated by server software operated or
licensed by CipherStash.
//
// Housekeeping script to trim Gmail Inbox.
//
// Automatically archives threads in inbox older than n days.
// Useful for cleaning up threads I forget to archive.
//
// Requires authorization to run.
// Google will occasionally prompt to remove permissions, warning "this app has access to everything" and "it is not trusted".
// If you do remove the authorization, running the script here should prompt for re-authorization.