cm0002@lemmy.world to Programmer Humor@programming.dev · 2 months agoJust keep codinglemmy.mlimagemessage-square32fedilinkarrow-up1736arrow-down17
arrow-up1729arrow-down1imageJust keep codinglemmy.mlcm0002@lemmy.world to Programmer Humor@programming.dev · 2 months agomessage-square32fedilink
minus-squarenebeker@programming.devlinkfedilinkEnglisharrow-up15arrow-down1·2 months agoThis is a dangerous metaphor. Remove the old wall and it turns out the new beautiful wall was leaning against and supported by it. I get what you mean, it’s just that the metaphor could support both perspectives.
minus-squareOwl@mander.xyzlinkfedilinkarrow-up13·2 months agoBuild the new wall airgapped from the old one
minus-squaretomiant@programming.devlinkfedilinkarrow-up11·2 months agoAnd keep both walls for redundancy.
minus-squarenebeker@programming.devlinkfedilinkEnglisharrow-up1·2 months agoAh, yes: weaponizing cybersecurity requirements to trick - I mean “motivate” - higher management to do things “right.”
This is a dangerous metaphor. Remove the old wall and it turns out the new beautiful wall was leaning against and supported by it.
I get what you mean, it’s just that the metaphor could support both perspectives.
Build the new wall airgapped from the old one
And keep both walls for redundancy.
Ah, yes: weaponizing cybersecurity requirements to trick - I mean “motivate” - higher management to do things “right.”