Avatar

azdle

azdle@news.idlestate.org
Joined
10 posts • 12 comments
Direct message

Yep, I’m genuinely unsure if the conversations actually happened or not. I’ve gotten different answers to that from different people.

permalink
report
parent
reply

As someone who is currently hiring: Anything

Beyond that it depends on what you know and what kind of work you want to do.

permalink
report
reply

At work we have a contractual design deliverable that was due yesterday, I still can’t get anybody to tell me what I’m supposed to be designing/building. I’ve got the contract, but its so vague that it’s more unhelpful than it is helpful and there’s apparently been 9 months of conversations with the customer, none of which have included engineering, nor has anything from them been written down. So we’re designing something just based on rumors.

So we’re in crunch mode, but also we don’t know what we’re trying to accomplish… 😩

permalink
report
reply

They may block IP addresses associated with consumer ISPs. Assuming that’s the case, I would guess you’re seeing that as an HSTS/TLS error because their network is trying to trick your browser into redirecting to/displaying an error page hosted by some part of their network.

permalink
report
reply

Hey, this might be something I’m interested in, but I’m not sure because there aren’t many details in your readme.

Some questions I’d suggest you answer in the readme:

[Edit: after looking through the code quickly, some of my questions probably don’t male sense because this seems to be an alerting style monitoring tool, not a observability style monitoring tool. Answering my own questions for others that are curious:]

What does it monitor?

[Disk space and CPU use]

What is the interface? Web? It does compare itself to grafana, so maybe. TUI? Maybe that’s what makes it more light weight?

[It doesn’t have one, it sends telegram messages when alarm thresholds(?) are hit.]

Does it only work on Debian? If not, are there deps that are required that are installed as dependencies of the deb?

[Looks like it should work anywhere, the ‘watchers’ use the nix crate and read procfs, so I assume that means it should work anywhere without depending on anything besides the Linux kernel.]

Is there history or is it real time only?

[Realtime only, well I guess there’s the telegram history.]

What does it look like? (Honestly, a screenshot could possibly answer most of these questions and a whole lot more.)

[It doesn’t look like anything. There’s no screenshot because there’s nothing to screenshot.]

permalink
report
reply

[edit: To be clear, I assume the part that OP is not sure if it’s satire or not is “or switching to a more privacy-conscious browser such as Google Chrome.”] The emphasis in

Firefox is worse than Chrome

is in the original. To me that clearly implies that they are of the opinion that in general Google & Chrome are worse on privacy than Mozilla & Firefox. The comment at the end is just tongue in cheek snark alluding to the fact that in this particular case google did better for privacy in Chrome than Mozilla in Firefox.

or switching to a more privacy-conscious browser such as Google Chrome.

permalink
report
parent
reply

Definitely satire, the context from earlier:

  1. Firefox is worse than Chrome in their implementation of ad snitching, because Chrome enables it only after user consent.
permalink
report
parent
reply

Unless you’re working with people who are too smart, then sometimes the code only explains the how. Why did the log processor have thousands of lines about Hilbert Curves? I never could figure it out even after talking with the person that wrote it.

permalink
report
parent
reply

C was originally created as a “high-level” language, being more abstract (aka high-level) than the other languages at the time. But now it’s basically considered very slightly more abstract than machine code when compared to the much higher level high-level languages we have today.

permalink
report
parent
reply