Posts

This profile is from a federated server and may be incomplete. Browse more on the original instance.

jawnsy, to random
@jawnsy@mastodon.social avatar

Humans shape technology and technology shapes us. Beyond the drama of change, there lie great opportunities for humanity.

"It follows that whenever we gain a new talent, we not only change our bodily capacities, we change the world. The ocean extends an invitation to the swimmer that it withholds from the person who has never learned to swim. With every skill we master, the world reshapes itself to reveal greater possibilities."

https://www.roughtype.com/?p=8783

skinnylatte,
@skinnylatte@hachyderm.io avatar

@phaedral @jawnsy for me it’s more about the form. The form factor of older vintage films cameras works better for me. If I shoot with a Yashica Mat 124G at an event it’s very different from using a DSLR. I feel I blend in more, and I have different types of tools for different types of shoots. Many modern digital cameras other than the Ricoh GR III, don’t have the same form factor : vibes thing I’m looking for.

skinnylatte,
@skinnylatte@hachyderm.io avatar

@phaedral @jawnsy and as someone who develops my own film, I also like having a certain degree of control over the whole thing without using a computer. I wouldn’t recommend it to everyone, but it’s a workflow that I personally enjoy

jawnsy, to random
@jawnsy@mastodon.social avatar

Insightful take about corporate contributions to open source, and whether IP is valuable:

"I’m sorry to be the one to have to break it to you, but most of the intellectual property that your company creates isn’t especially important and it’s certainly not business critical."

"What qualifies as critical intellectual property naturally varies by company and business, but you’ll probably know it when you see it."

https://anonymoushash.vmbrasseur.com/2024/01/open-source-contributions-and-the-risk-of-ip-exposure by @vmbrasseur

jawnsy, to random
@jawnsy@mastodon.social avatar

"The enshittification of the services we once loved and still rely on represents a series of victories for the forces of evil over the forces of good – a victory for the people who want to use the internet to trap us, over the people who want to use the internet to set us free.

As it got harder for users to leave online services, it got easier to abuse users."

https://locusmag.com/2023/11/commentary-by-cory-doctorow-dont-be-evil/ by @pluralistic

peterainbow,
@peterainbow@mstdn.social avatar

@jawnsy @pluralistic also see this post about recent Google history
https://dair-community.social/@trochee/112322372806186643

jawnsy, to random
@jawnsy@mastodon.social avatar

As engineers, it's easy for us to measure inputs (how much time we're spending) and outputs (lines of code written or features produced), but what really matters are the business outcomes (customers acquired and retained, revenue growth metrics, profitability), which are less directly related.

It's always useful for us to step back and ask ourselves: what's the point?

anderseknert,
@anderseknert@hachyderm.io avatar

@jawnsy This checks out if you're at a smaller company / startup, working close to your (potential) customers. If your at $MEGACORP "what's the point?" is sometimes the most detrimental question of all for your well-being 😄 Having some point or sense of purpose though — absolutely crucial... you'll just have to invent it yourself at some places. It was at a place like that I started contributing to open source. Likely wouldn't happen if I'd been busy doing interesting work for customers.

jawnsy, to random
@jawnsy@mastodon.social avatar

This is mostly how I use Twitter, er, X, too...

"The active use of platform X will be stopped and limited to monitoring."

https://www.uibk.ac.at/en/newsroom/2024/mastodon-for-all-university-employees/

jawnsy, to random
@jawnsy@mastodon.social avatar

Do you ever learn something so cursed that you regret having learned it?

I really enjoy learning, but sometimes when I get to the other side of it, I'm left even more confused than when I began.

anderseknert,
@anderseknert@hachyderm.io avatar

@jawnsy yeah, but it’s been a long time since the last time. Had a job where legacy “Enterprise Java” was one of the things I was supposed to do. You know going in that it’s useless knowledge, as the alternative is to stick around, which is of course much worse. The things I saw.

jawnsy, to random
@jawnsy@mastodon.social avatar

Periodic reminder that this repository of Resilience Engineering resources, papers, talks, etc. is incredible.

If you build, operate, or use large-scale software systems, take a few minutes to peruse this library: https://github.com/lorin/resilience-engineering by @norootcause

jawnsy, to random
@jawnsy@mastodon.social avatar

Reading this while reflecting on "big rewrite" type projects in software is, well, ouch:

"His seminal work on big projects can be distilled into three pitiful numbers:

• 47.9% are delivered on budget.
• 8.5% are delivered on budget and on time.
• 0.5% are delivered on budget, on time and with the projected benefits."

I think the solution is simple, but not easy: smaller, more frequent deliveries. Progress over perfection.

https://www.wsj.com/arts-culture/books/lego-megaprojects-bent-flyvbjerg-big-things-11675280517

flameeyes,
@flameeyes@mastodon.social avatar

@jawnsy my sworn enemies are projects of rewriting in different languages that don't establish a clear "this is what we're gaining by not using the old language" baseline.

https://flameeyes.blog/2022/10/26/on-rewriting-and-programming-languages/?mtm_campaign=social&mtm_kwd=mastodon

jawnsy, to random
@jawnsy@mastodon.social avatar

A great preface to a great article:

"The naive approach to securing software is to blindly implement a checklist of security features. But a deeper understanding of security will quickly uncover that perfect security is impossible; you have to make trade-offs and prioritize the most likely scenarios."

https://www.macchaffee.com/blog/2022/k8s-secrets/

jawnsy,
@jawnsy@mastodon.social avatar

@anderseknert Yeah. It tracks with my own experience, too.

I often wonder about these "last mile" problems - the tools are great, but require more effort to use effectively than many teams are able or willing to invest, which results in situations like this.

In the end, no technology or process is perfect: it's tradeoffs all the way down...

anderseknert,
@anderseknert@hachyderm.io avatar

@jawnsy totally. I have implemented encryption at rest for kubernetes secrets in a previous role, although entirely driven by compliance requirements and not because we wanted to. Vault was too expensive though. My god that service is expensive.

jawnsy, to random
@jawnsy@mastodon.social avatar

Very few software projects are successful over long periods of time. I think one explanation is that it is very challenging to evolve systems in ways that respect the needs of new users ("better" approaches to things, temptation to make backwards-incompatible changes) and existing users (backwards-compatibility is a virtue.)

In this respect, I think about these talks often:

https://youtu.be/2y5Pv4yN0b0 by @briangoetz

https://youtu.be/pEYpvYVlgQc by @rkatz & Carlos Panato

stuartmarks,
@stuartmarks@mastodon.social avatar

@jawnsy @briangoetz @rkatz TIL Kubernetes has a KEP process.

For my take on “Why doesn’t the JDK do X” see here, with respect to a particular feature, though of course it applies in general.

https://stackoverflow.com/a/77864463/1441122

jawnsy,
@jawnsy@mastodon.social avatar

@stuartmarks @briangoetz @rkatz Something that I find interesting about the various communities of experts (IETF, KEP, JEP, PEP) is the insights that people have, particularly around non-obvious interactions between features. Following the JDK development lists is a great lesson that implementing things hastily can really cost you enormously later, and I think often about all the avoided mistakes, too.

Also, Josh Bloch's Golden Rule of API Design, "when in doubt, leave it out," is so wonderful

jawnsy, to random
@jawnsy@mastodon.social avatar

Embedded devices are cursed.
Windows is cursed.
USB is cursed.

And yet...

@jberi is unafraid! 🙌

Thank you, Jonathan, this guide is amazing!

https://blog.golioth.io/usb-support-in-wsl2-now-with-a-gui/

jberi,
@jberi@hachyderm.io avatar

@jawnsy Ha, the pain is real. Just looking at our users, 36% are on Windows, 14% are on Linux & 12% are on macOS (and much unknown b/c of Cookie Consents.)

I've seen the numbers for embedded devs on Windows as high as 60% in reports!

jawnsy, to random
@jawnsy@mastodon.social avatar

The good thing about self-hosting software is that you own the SLA.

The bad thing about self-hosting software is that you own the SLA.

jawnsy, to random
@jawnsy@mastodon.social avatar

It's always a delightful surprise to come across posts from folks with familiar names when looking something up. I wanted to get a comparison of Kyverno vs Open Policy Agent Gatekeeper and came across this awesome comment by longtime Kubernetes security nerd, @raesene: https://www.reddit.com/r/kubernetes/comments/u5tcfd/comment/i56i5ta/

raesene,

@anderseknert @jawnsy @hrefna I'd agree there's a maturity piece, where more mature/complex environments will require solutions that have more power and flexibility.

At the moment I'd see VAP more at the level of allowing things like basic Pod Security Standards compliance (from a security standpoint, it has non-security use cases too).

That can be valuable for less complex environments, as it avoids the complexity of adding an external admission control solution.

anderseknert,
@anderseknert@hachyderm.io avatar

@raesene @jawnsy @hrefna Agreed. If you don't need more than VAP, there's benefits to that given how it's now native to kube. I'm just thinking that the same moment I'd need something more, I'd probably prefer to move over all admission control responsibilites to OPA/Kyverno/Whatever rather than having to maintain two disparate systems for that.

jawnsy, to random
@jawnsy@mastodon.social avatar

Great talk about configuring sampling for OpenTelemetry traces: https://youtu.be/97RTSznmDH4 by @paigerduty

This is a rare situation where it's easy to achieve five nines or greater... 😅

jawnsy, to random
@jawnsy@mastodon.social avatar

Looking through this list of libraries for working with JWTs, it seems that the highest-quality ones assume that keys are managed directly, instead of using a Vault, Cloud KMS, etc. to sign. This is true for Python and Go libraries at least. Why is that? https://jwt.io/libraries

anderseknert,
@anderseknert@hachyderm.io avatar

@jawnsy yeah the exchange of one OIDC token from one provider to another I get, as that’s covered by specs I know of. It’s the GITHUB_TOKEN -> OIDC JWT I don’t see how they manage to fit within the OIDC standard. My guess is “they don’t” but it’s useful enough to warrant an exception. Not like it would be the first time someone ignored a standard :) Or there’s something to it I missed. Either way, useful, and I’m looking forward to seeing what you come up with!

jawnsy,
@jawnsy@mastodon.social avatar

@anderseknert I think the GITHUB_TOKEN to JWT part is nonstandard: https://github.com/github/actions-oidc-debugger/blob/aa6f357e1e75bafb27d8d6528f2a02fe5c540a20/actionsoidc/actions-oidc.go#L85

But afterward, you're just working with a JWT.

I think it's similar in AWS, presumably you're using their Security Token Service to exchange a AWS Access Key ID and AWS Secret Key ID for a JWT? No idea, it's all relatively new & exciting stuff, IMO!

Google might be different, because Google Cloud uses JWTs natively, so you might get to skip that non-standard exchange step

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • kavyap
  • DreamBathrooms
  • thenastyranch
  • magazineikmin
  • tacticalgear
  • cubers
  • Youngstown
  • mdbf
  • slotface
  • rosin
  • osvaldo12
  • ngwrru68w68
  • GTA5RPClips
  • provamag3
  • InstantRegret
  • everett
  • Durango
  • cisconetworking
  • khanakhh
  • ethstaker
  • tester
  • anitta
  • Leos
  • normalnudes
  • modclub
  • megavids
  • lostlight
  • All magazines