mspencer712

joined 2 years ago
[–] mspencer712@programming.dev 5 points 2 days ago (1 children)

What have you tried?

[–] mspencer712@programming.dev 3 points 4 days ago (1 children)

There’s a lot of “And then for some reason we did this, and it was more complexity” in this paper. I think that’s missing the point of languages, as a conversion layer between machine code and weird, squishy human brains. We think better, hold abstractions in our minds better, when the language maps more closely with how we’re structuring the problem in our minds.

Not sure if you were even looking for paper reviews.

[–] mspencer712@programming.dev 9 points 6 days ago (1 children)

Buying the company usually means buying all of their user information as well. Other companies can change their policies too. I think you should judge them by their actions, and give them a chance to answer your questions before you condemn them.

(Did you try asking them about your concerns?)

[–] mspencer712@programming.dev 16 points 3 weeks ago

I’m with you, stuck at a billion dollar software company with an AI fetish. It’s a great search tool, can write some decent unit tests. But God help you if you let it write production code, for any of the “you won’t find this on stackexchange” stuff we all work on.

[–] mspencer712@programming.dev 20 points 4 weeks ago

Traffic shapers can prioritize connections or streams differently, even if they can’t see inside them. Higher priority for quick connections, like interactive web page views, diminished priority for “oops that’s actually a bulk download it seems”.

[–] mspencer712@programming.dev 9 points 2 months ago* (last edited 2 months ago)

This, 100%. Use whatever language you’re fast and fluent with. If you don’t have any of those yet, C is a good choice. Get books and tutorials from the 90s or 2000s and OpenGL is a great place to start.

The most limited resource that you have to manage would be your own energy and passion. Don’t go out and seek that dopamine hit of validation from others until you’ve built something. “I want to build something” is OK, but “I’ve started building something, it runs somewhat, here’s a repo, I’m stuck, HAAAALP!” is way more compelling.

[–] mspencer712@programming.dev 48 points 2 months ago (1 children)

Different domains need different authentication flows. If the provided email ends in a domain they recognize, instead of prompting for a password you’d be sent to another auth provider to authenticate there.

[–] mspencer712@programming.dev 3 points 3 months ago

As a Sennheiser HMDC 27 user, unsure if top left or top right. I’ll be playfully attacked enough for both I guess :-)

[–] mspencer712@programming.dev 9 points 3 months ago (1 children)

How old is that game? Are there other people in your demographic who also play the game, and then searched for the same thing?

[–] mspencer712@programming.dev 3 points 3 months ago* (last edited 3 months ago) (3 children)

Agreed, I have one of the last “good” HP Color LaserJets from a tech recycler and last time I checked it was two model revisions old. This one still has a config option to allow unofficial toner, so I pay like $120 for a set of all four high capacity cartridges now, I think 5k pages black and 3k pages C Y and M. (It’s a MFP m477fdw I think) I think the next model was the first one that took the option away.

You can still use third party toner with some of the later models, but those are more expensive and come with some kind of jig for transplanting an HP chip into their cartridge.

I will never buy another HP product again (apart from replacement parts for my current printer), and will jealously guard this one and nurse this one along until it dies.

But in a general sense, being able to completely ignore the printer for literally months, and then turn it on and get a perfect print, and then ignore it again… really nice. That’s all laser printers. Never buy HP.

[–] mspencer712@programming.dev 1 points 4 months ago (1 children)

To add to Onomatopoeia’s excellent post, separate devices also limit the blast radius of any compromise. Attackers pivot when they compromise a system. They use one system to talk to others and attack them from inside your network. So you don’t want everything on the same OS kernel.

Unfortunately I don’t feel like I’m qualified to say what works well yet, not until I have the pieces of my site put together and working, and vetted by whatever security professionals I can get to look at it and tell me what I did wrong.

But right now I think that looks like every service VM on its own VLAN on a /30 net, and ideally the service VM and firewall/router VM serving it on different physical hardware joined by a managed switch. That managed switch shouldn’t let either VM host touch its management VLAN, and (I think, I don’t do this yet) should send monitor traffic to yet another physical host for analysis.

(“I can see why you’re not done yet” - yeah I know.)

[–] mspencer712@programming.dev 1 points 4 months ago

Regarding the Lone SME thing, my wife has already told me if something happens to me, all my server stuff is getting donated. I should not expect her to maintain it after I’m gone. And I don’t. That’s entirely reasonable. If it lives on after I’m gone it’ll be because the recipe thing was useful enough for others to maintain. My specific server and domain kinda don’t matter.

view more: next ›