The entire world, or most of it, was in crisis mode for the last 24 or 48 hours, depending on your time zone.
For the first time, many people hea...
For further actions, you may consider blocking this person and/or reporting abuse
Thank you.
You are most welcome.
do u have ongoing project now?
No, currently in search.
Do you have anyone open?
I am also searching now. I wish work with u.
Let's discuss
Send am email- blackbird001@duck.com
With so many spelling errors on this article, it not only makes for an uncomfortable read but also questionable reliability.
I do not think this article has spelling errors, as I use Grammarly to check spelling. If you check out my other articles, I write with a strong focus, but if you come across any, please let me know.
I feel you should take a second look and, this time, read with an open mind.
And for doubting the article's authenticity, I can only imagine what would be real in your eyes.
Best regards.
Below if a copy & paste, see for yourself.... Grammarly isn't working for you. Misspells are glaringly obvious...no?
"The Blue Screen of Death and the Future of Crowstrike
According to a recent CNN analysis, it would take weeks for the world to recover from the update issue fully, and while this is ongoing, malicious actors have started taking this gap as an avenue to send spam mail posing as support, according to the Crowdstrike monitoring team.
Major stakeholders have started asking questions: Was there no AGILE policy in place, and was the update properly tested before being pushed?
For a company this big, it would be irresponsible for such an update to be approved and sent out without proper vetting and approval.
So would companies look for alternatives after this issue, or would there be a need to not rely so much on one company, which, when taken down, can cause major downtime?
On the other hand, companies like Microsoft need a trusted and reliable partner to protect their infrastructure, thereby giving them free time to stick to innovating Windows Os, while Crowdstrike provides security and patches when needed.
While this was an unfortunate incident, the reality is the biggest tech organizations are interwoven and rely on each other, and a hit on anyone is like a hit on all of them.
This is a security flew; one new threat actors would likely try to milk. "
Below if a copy & paste, see for yourself.... Grammarly isn't working for you. Misspells are glaringly obvious...no?
Imagine trying to correct someone and your grammar is up and everywhere.
I appreciate your kind gesture and I will make the needed corrections.
It would be most appreciated if you were more thoughtful about how you correct people.
Your comment is noted. Although I must note that I certainly appreciate your efforts on bringing forth this article. My search came out of curiosity on who in CS is getting the hot seat given all the chaos and misery they've caused due to careless release of firmware patches on such a mission-critical service. I used to work in software QA and know this all too well....one can never do enough testing (test early, test often). Cheers.
"One can never do enough testing (test early, test often)"
True, too much was at stake for such a careless release, but we can only hope CS will learn and do better.
I do hope more companies decouple soon and early enough.
Best regards.
Thanks for informing 👍
You are most welcome.
crystal clear article!!thank you
Thank you for your kind word
Awesome article!
Also, Linux users were not effected. 💪
Yes there were not but that was not a reason to celebrate as I believe crowdstrike still has alot of companies depending on them.