I hereby claim:
- I am vandonselaar on github.
- I am vandonselaar (https://keybase.io/vandonselaar) on keybase.
- I have a public key whose fingerprint is B0DB 8A8C 470C CCFB 9E45 0264 87B1 90D3 9C70 1B95
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
# Retrieved from: http://iranzo.github.io/blog/2015/05/01/intel-amt-on-linux-for-remote-control-slash-fencing/ | |
ip=myhost | |
AMT_PASSWORD="Qwerty12#$" | |
# Must be exactly *8 characters long* and contain at least one of each: | |
# [ lower case, upper case, number, special character ] | |
VNC_PASSWORD="Abcdef1@" | |
# Enable KVM |
Extremely important when designing a Google datacenter. Or if you're an Oracle consultant. But you're not. Stop drawing, start coding.
What does this word even mean? Please get back to work. And no, I don't even want to know what a bounded context is.
You're testing WHAT? Let your code generator do the work and focus on testing something useful.
What the hell were you doing before then? Anecdotal Driven Design?
This is not Twitter/X. I bet you can update that database record synchronous in less than 100ms.