[-] navigatron@beehaw.org 20 points 4 months ago

You’re out here solving impossible problems. You’re “The Fixer” from Pulp Fiction. Fools look at story points. Pros see an unsolvable story that languished for years until you came along and defeated it. A single point for you is an entire epic to other teams.

Everything is a differentiator that can be spun to your advantage. The points aren’t accurate, and you’re the only one with enough guts to step up to the plate and finally work these neglected tickets; even if it won’t “look good” on some “dashboard” - that’s not what’s important; you’re here to help the organization succeed.

If the system doesn’t make you look good, you have to make yourself look good. If you weren’t putting in the effort, it would be hard - but as you say, everyone who takes a deeper look clearly sees the odds stacked against you, and how hard you’re working / the progress you’re making; despite those odds.

Don’t let some metrics dashboard decide your worth, king!

[-] navigatron@beehaw.org 25 points 5 months ago

Hello yes my email is dot at dotat dot at

[-] navigatron@beehaw.org 23 points 5 months ago

The other six are (copied from the article):

  1. PUBG (3.2 mil)
  2. Counter-Strike: Global Offensive (1.8 mil)
  3. Counter-Strike 2 (1.4 mil)
  4. Lost Ark (1.3 mil)
  5. DOTA 2 (1.2 mil)
  6. Cyberpunk 2077 (1 mil)
[-] navigatron@beehaw.org 24 points 6 months ago

The VPN catches all network traffic and puts it far away - you can’t be on vpn and see local network resources (casting targets) at the same time.

If your vpn has an app, check your settings for something like “local network access”.

Otherwise, start reading about split-tunnels and/or default gateways

[-] navigatron@beehaw.org 84 points 7 months ago

The music streaming service, that I stream music from, knows which music I streamed. I’m shocked.

[-] navigatron@beehaw.org 24 points 7 months ago

This will go about as well as broadcom’s acquisition of Symantec (not well).

If you can get rid of vmware, you will have to, and if you can’t, you’ll ship buckets of benjamins to broadcom and in return they might keep your company alive.

[-] navigatron@beehaw.org 23 points 8 months ago

I tell my laptop to put the video in the vga port. It does. That’s it. There’s nothing plugged in, but it’s there.

I plug a vga cable in. There’s video in there now. With enough paperclips, I could get it out the other end. My laptop does not care. It wiggles the electrons regardless.

I plug the other end of the cable in. The shielding was eaten by mice and two pins are dead. But alas, lo and behold, purple tho it may be - the video comes out and is displayed.

Meanwhile, hdmi protocol negotiation wants to know if you’d like to set your screen as the default sound device. Not that teams would use it anyway. Actually nevermind, the receiving end doesn’t support the correct copyright protection suite. Get fucked, no video for you.

[-] navigatron@beehaw.org 21 points 10 months ago

I must disagree.

We need not wait for marginalized groups to be impacted to decry T1 ISP censorship. Ban whatever speech you want; the method of enforcement should be to arrest the perpetrators - not stop the sale of paper, the delivery of mail, or blocklist class A ip ranges.

On a more philosophical level, this is the question of “kindergarten policy” - do we punish those who crayon on the walls, or do we take away everybody’s crayons. To punish the ability to do wrong, or the act of doing wrong. Like most philosophical questions, there’s no good answer to this.

[-] navigatron@beehaw.org 31 points 10 months ago

I work as a cybersecurity consultant.

This is going to be excellent for business.

[-] navigatron@beehaw.org 20 points 11 months ago

Go a level deeper, beyond this news about news, and read the moat memo.

The third faction is the open source community.

The memo has an entire timeline section, dedicated to showing the speed at which the open source community absorbed and iterated on the leaked facebook model, LaMMa.

The memo puts a lot of emphasis on how google and co are building new models from scratch, over months, with millions of dollars - and yet open source is building patches, in days, with only a few hundred dollars - and the patches stack, and are easily shareable.

The open source models, through these patches, are getting better faster than google can re-architect and re-train new models from scratch.

The main point of the memo is that google needs to change their strategy, if they want to stay “ahead” (some would argue they’re already behind) of the competition.

[-] navigatron@beehaw.org 21 points 11 months ago

Wireguard creates a new network interface that accepts, encrypts, wraps, and ships packets out your typical network interface.

If you were to create a kernel network namespace and move the wireguard interface into that new namespace, the connection to your existing nic is not broken.

You can then use some custom systemd units to start your *rr software of choice in said namespace, rendering you immune to dns leaks, and any other such vpn failures.

If you throw bridge interfaces into the mix, you can create gateways to tor / i2p / ipfs / Yggdrasil / etc as desired. You’ll need a bridge anyway to get your requester software interface exposed to your reverse proxy.

Wireguard also allows multiple peers, so you could multi-nic a portable personal device, and access all your admin interfaces while traveling, with the same vpn-failure-free peace of mind.

[-] navigatron@beehaw.org 25 points 11 months ago

Decentralized identity is a field of active research. It’s tough, but very interesting. I’m particularly a fan of what nostr is doing, where accounts are completely separate from relays, and can post anywhere.

view more: next ›

navigatron

joined 1 year ago