Résonance morphique — La mémoire de la Nature à travers l’espace et le temps

Articles intéressant sur certaines manifestations du monde physiques encore très méconnues. Son interprétation laisse beaucoup de place pour faire des expériences dans le futur.

Trop de choses restent inexpliquées, comme ces vaches qui s’arrêtent devant une clôture peinte même si elles n’ont jamais vues de vrais clôtures auparavant.

>>> “Comment, à partir de spores ou de graines, les plantes se développent-elles pour atteindre la forme caractéristique de leur espèce ? Comment les feuilles des fougères, des chênes et des bambous acquièrent-elles leur forme ? Ces questions sont liées à ce que les biologistes appellent la morphogenèse, la naissance de la forme (grec : morphe = forme ; genèse = naissance), l’un des grands problèmes de la biologie qui demeurent non résolus. “

fr.sott.net/article/35901-Resonance-morphique-La-memoire-de-la-Nature-a-travers-l-espace-et-le-temps

Critical SAP Bug Allows Full Enterprise System Takeover

I was never a fan of SAP. I think that the SAP popular wave was based on false assumptions, like “One can never go wrong by choosing IBM”, yeah right…, tell that to the Canadian Phoenix payroll system… (more on that in a future article).

I was a reseller/consultant of SBT ERP systems for many years in the 80s. They were not “Open Source” but, they were giving the source code to customers as a guaranty for buyers to become independent of the provider.

I believe that open source ERP is a better alternative for many reasons. Less bugs is one of the reasons, no dependency on a provider is another reason.

I do hate the hidden mentality of providers that “They have thought about everything.”. That is impossible and leads to many problems. Being open about your weaknesses is a better way to get rapid improvement.

>>> “According to an alert from the Department of Homeland Security, successful exploitation of the bug opens the door for attackers to read and modify financial records; change banking details; read personal identifiable information (PII); administer purchasing processes; sabotage or disrupt operations; achieve operating system command execution; and delete or modify traces, logs and other files.”

threatpost.com/critical-sap-bug-enterprise-system-takeover/157392/