• 0 Posts
  • 60 Comments
Joined 1 year ago
cake
Cake day: June 14th, 2023

help-circle

  • Imo, the term “buy” for all goods should pass some sort of litmus test. Eg:

    does the product being sold have the same properties as a brick?

    • can the product be resold privately?
    • can the product be lent to another user temporarily?
    • would the product still perform its function when the manufacturer stops supporting it?
    • would the product still perform its function if the manufacturer ceased to exist.

    if the product does not pass all these tests, the customer is not buying. Consider using terms such as ‘rent’ or ‘lease’ or ‘subscription’






  • Why would it result in zero women playing? I’m not suggesting you merge the women’s teams with the open team.

    But have it so your women’s teams performance counts just as much as the men’s.

    Two teams (men’s and women’s), each playing against their own gender, scoring points in one league.

    No point paying your dudes millions per season to get the best players if your women’s team sucks and loses every game.

    Get teams and fans an incentive to invest and in both genders by playing for the same trophy.


  • Why does nobody watch the women’s leagues? Is it because nobody else does? can’t have all the social aspects of sports if nobody else is doing it.

    Imo, they need to stop the segregation. Ditch the women’s leagues, but keep the games and teams. Have both teams play in one league, and contribute to the overall score of the team.

    It’ll add new strategy to the seasons. Spend all of your budget on the dudes and hope they keep winning despite the ladies; build a strong women’s team to carry your b-tier men’s team; or something in between.





  • Yale’s Assure SL doesn’t have a key, but you can power it externally with a 9v battery. (And, keys are just another failure point). They also make some keyed variants.

    It out of the box doesn’t have any network capability. You can plug in a zigbee or Wifi module to give it connectivity.

    Zigbee support is pretty primitive. Basic functionality works fine. Lock, unlock etc. afaik, you can do whatever the unit can do through zigbee commands but I’ve not seen (nor really looked) for a usable interface to it.

    [edit] realised I mixed up zwave and zigbee.




  • I used to love ‘the cloud’. Rather, a specific slice of it.

    I worked almost exclusively on AppEngine, it was simple. You uploaded a zip of your code to appengine and it ran it at near infinite scale. They gave you a queue, a database, a volatile cache, and some other gizmos. It was so simple you’d struggle to fuck it up really.

    It was easy, it was simple, and it worked for my clients who had 10 DAU, and my clients who had 5 million DAU. Costs scaled nearly linearly, and for my hobby projects that had 0 DAU, the costs were comparable.

    Then something happened and it slowly became complicated. The rest of the GCP cloud crept in and after spending a term with a client who didn’t use “the cloud” I came back to it and had to relearn nearly everything.

    Pretty much all of the companies I’ve worked for could be run on early AppEngine. Nobody has needed anything more than it, and I’m confident the only reason they had more was because tech is like water. You need to put it in a bucket or it goes everywhere.

    Give me my AppEngine back. It allowed me to focus on my (or my clients) problems. Not the ones that come with the platform.




  • Could a hypothetical attacker not just get you to visit a webpage, or an image embedded in another, or even a speculatively loaded URL by your browser. Then from the v6 address of the connection, directly attack that address hoping for a misconfiguration of your router (which is probable, as most of them are in the dumbest ways)

    Vs v4, where the attacker just sees either your routers IP address (and then has to hope the router has a vulnerability or a port forward) or increasingly gets the IP address of the CGNAT block which might have another 1000 routers behind it.

    Unless you’re aggressively rotating through your v6 address space, you’ve now given advertisers and data brokers a pretty accurate unique identifier of you. A much more prevalent “attack” vector.


  • If you still do the sizing (it’s not entirely wasted as it’s a reasonably effective tool to gauge understanding across the team), This can still be done without the artificial time boxing.

    “How much work have we done in the last two weeks?” Just look at all the stories closed in the last two weeks. Easy.

    “When will X be delivered?” Look at X and all its dependencies, add up all the points, and guesstimate the time equivalence.

    Kanban isn’t a free for all, you still need structure and some planning. But you take most of that away from the do-ers and let them do what they do best… do.