• 0 Posts
  • 25 Comments
Joined 2 years ago
cake
Cake day: June 30th, 2023

help-circle
  • oatscoop@midwest.socialtoLefty Memes@lemmy.dbzer0.comAre we the baddies? ...
    link
    fedilink
    English
    arrow-up
    10
    arrow-down
    1
    ·
    edit-2
    3 days ago

    Despite this, the affected specialists and their families were doing well compared to citizens of the Soviet Union and the Soviet Zone, apart from the suffering of deportation and isolation. The specialists earned more than their Soviet counterparts. The scientists, technicians and skilled workers were assigned to individual projects and working groups, primarily in the areas of Aeronautics and rocket technology, nuclear research, Chemistry and Optics. The stay was given for about five years.

    After this period of intellectual quarantine had passed, the specialists returned to Germany between 1950 and 1958, the majority of them before 1954. Before leaving, they were taught to keep their years in the Soviet Union secret. Some specialists received chairs in GDR universities (e.g., Werner Albring, Waldemar Wolff), became an East German party official like Erich Apel. Otherwise the GDR had difficulties to offer adequate jobs because the industry was mostly down. Brunolf Baade was given responsibility for developing and producing a passenger jet. A portion of about 10% made it to West Germany, Austria or the US, among them Fritz Karl Preikschat, Helmut Gröttrup and Kurt Magnus.

    Yeah, sounds like the Soviets punished them harshly. Totally treated them like “resources” and not better than most of their own citizens.




  • He’s not entirely wrong:

    BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called " xenix", which was written by Microsoft for the US government. These programs are used by hackers to break into other people’s computer systems to steal credit card numbers. They may also be used to break into people’s stereos to steal their music, using the “mp3” program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as “telnet”, which is used by hackers to connect to machines on the internet without using a telephone.

    You can learn more here.












  • can review it yourself.

    You’re a supervisor and you have 2 employees: Bill and Jim. As a supervisor your job is to ensure the work is being done correctly.

    Bill is competent and rarely makes major mistakes. Jim does a decent job most of the time … but he’s also a savant at screwing up – he regularly fucks up in ways that aren’t immediately obvious but are guaranteed to cause serious problems days to weeks from the screw up.

    You can glance over Bill’s work and be fairly certain it’s fine. You need to go over every single piece Jim’s work to check for problems, and even then some are probably going to slip through.

    AI is currently Jim, and Jim has no business writing code for anything privacy or security focused.