To see it positively, I wanted to get more powerful solar panels anyway.
To see it positively, I wanted to get more powerful solar panels anyway.
Came across „errors.As()“ today which is not that big of a deal until I noticed it takes the pointer to a pointer of a struct which made me curious.
Came across „errors.As()“ today which is not that big of a deal until I noticed it takes the pointer to a pointer of a struct which made me curious.
Usually I participate for the first 7 days or so but then dropping out due to my own time constraints.
One year I wanna solve all days!
Usually I participate for the first 7 days or so but then dropping out due to my own time constraints.
One year I wanna solve all days!
* Security
* Monitoring and Logging
* Billing
* Security
* Monitoring and Logging
* Billing
Documentaries really do this for me. They have a different sound. They tell stories differently.
Possibly I’m just getting old and don’t understand modernity anymore 🙃
Documentaries really do this for me. They have a different sound. They tell stories differently.
Possibly I’m just getting old and don’t understand modernity anymore 🙃
When fixing pipelines, there’s not much happiness, except when it finally works because there was a quote missing somewhere in a YAML that’s actually multiple layers of template hierarchy.
When fixing pipelines, there’s not much happiness, except when it finally works because there was a quote missing somewhere in a YAML that’s actually multiple layers of template hierarchy.
That still makes me giggle 🤭
That still makes me giggle 🤭
If you have one system that does input-processing-output, at least you have black-box observability.
If you have layered systems, the cognitive load to observe the system multiplies.
If you have one system that does input-processing-output, at least you have black-box observability.
If you have layered systems, the cognitive load to observe the system multiplies.
Early 2014, someone came to me about a catastrophic vulnerability in Apple's TLS implementation.
I shit you not, they'd overheard someone at a bar drunkenly bragging about how they were going to sell it to a FVEY intelligence agency for six figures.
Early 2014, someone came to me about a catastrophic vulnerability in Apple's TLS implementation.
I shit you not, they'd overheard someone at a bar drunkenly bragging about how they were going to sell it to a FVEY intelligence agency for six figures.
What remains?
In most cases, the answer is not „Kubernetes“, and still k8s is often the focus of all efforts.
What remains?
In most cases, the answer is not „Kubernetes“, and still k8s is often the focus of all efforts.
Conservation of complexity cannot be abstracted.
Make the necessary complexity the center of your architecture. Don’t try to push it to the edge.
Conservation of complexity cannot be abstracted.
Make the necessary complexity the center of your architecture. Don’t try to push it to the edge.
My experience with Mastodon was, after moving to my own instance, I involuntarily shadow-banned myself. Large instances are key for visibility, but expensive.
With Bluesky‘s different architecture, I am positive this will be a different experience.
My experience with Mastodon was, after moving to my own instance, I involuntarily shadow-banned myself. Large instances are key for visibility, but expensive.
With Bluesky‘s different architecture, I am positive this will be a different experience.
Trusting machine identities (on first use!) is the same claim as downloading source code directly from a large provider, but with more complexity.
We need to be able to build trust relationships with developers in the first place.
Trusting machine identities (on first use!) is the same claim as downloading source code directly from a large provider, but with more complexity.
We need to be able to build trust relationships with developers in the first place.
I prefer the first.
I prefer the first.
Maddening security design by Apple.
Maddening security design by Apple.