I need to write up my experience. But I'm trying it out. Linux needs something like this. I've had issues, posted traces and had them fixed in seconds. Pretty damn amazing. I'd love to see a bigger team involved though.
Confidence intervals don’t have precise timelines associated with them. Sometimes you know exactly what the problem is when you hear the symptoms.
We always balance new work versus cleanup. I always have a laundry list of beefs with my own work. You often have a sneaking suspicion that this piece of code is wrong in a manner you can’t quite put your finger on. Or you do but a new customer is trumping a hypothetical error. Or ten people are blocked waiting for you to merge some other feature. And then someone gives you a test case and you know exactly what is wrong with it. Sometimes that’s fixing a null check, an off by one error, or sorting results. And sometimes the repro case basically writes itself.
“Imitation without understanding”, “imitating but misconstruing”, “mindless imitation”, “superficial emulation”, &c.
I think “cargo culting” in the popular sense means little more than that (whereas actual cargo culting is much more complex, as the featured article describes).
something happened but you’re not sure why, so you guess it’s because of something you did, and you decide to ritualistically repeat what you did in the hopes that thing that happened before happens again.
It’s a misunderstanding of cause and effect - so when you repeat the cause, looking to repeat the effect, you’re puzzled that it doesn’t work this time.
> Beam cannot support end-to-end encrypted buffers. While data is encrypted during transfer to and from the Beam host, it’s decrypted temporarily before being re-encrypted and forwarded. The host only holds a small buffer (typically 1 kB) of unencrypted data at any time and never stores the full stream. For extra security, you can encrypt your files or pipes before sending them through Beam.
With a little effort, beam is as trustable as any (if not more) of its alternatives. And, that extra effort is a result of the design goal of not having to force a binary installation.
Plus, you can always self host beam, it's not that complicated.
Most people who are only vaguely familiar with networking seem to be able to remember 10/8 and 192.168/16, but the 172.16/12 range is for some reason rather elusive --- I suspect it's not as commonly used as the other two.
I think it usually gets used by VM/container networks (maybe there's some historic reason)? I have seen it once used on a hotel WiFi network (as I was unable to connect because of docker conflicting).
They don't tell you why, so it's strange to say this is the reason. At Google the interviewers write up the discussion, questions and answers, and a separate committee decides based on the feedback from all the interviewers. There is no scoring for pun quality sadly.
No no, we have access to both the registrar and DNS provider, and have already updated DNS as instructed by Google. (We're doing the DNS in Google Cloud) They don't seem to care that we control the domain...