But then arr.length == the last index, and that’s just too convenient :(
But then arr.length == the last index, and that’s just too convenient :(
The good old days. We ate berries in the woods; enjoyed the company of whomever we pleased; and worshipped the moon simply because it was cool.
Then we invented turbotax and multi-factor authentication :(
You’re out here solving impossible problems. You’re “The Fixer” from Pulp Fiction. Fools look at story points. Pros see an unsolvable story that languished for years until you came along and defeated it. A single point for you is an entire epic to other teams.
Everything is a differentiator that can be spun to your advantage. The points aren’t accurate, and you’re the only one with enough guts to step up to the plate and finally work these neglected tickets; even if it won’t “look good” on some “dashboard” - that’s not what’s important; you’re here to help the organization succeed.
If the system doesn’t make you look good, you have to make yourself look good. If you weren’t putting in the effort, it would be hard - but as you say, everyone who takes a deeper look clearly sees the odds stacked against you, and how hard you’re working / the progress you’re making; despite those odds.
Don’t let some metrics dashboard decide your worth, king!
Your current setting is the “loopback” address. You’re listening for traffic to this address, and the only thing that can send to the loopback is yourself. This is a safe default, it means only the computer running the software can talk to it. Generally 0.0.0.0 listens on all available addresses. If that doesn’t work, use your local / internal ip.
This ui smells like it’s trying to hide the implementation details, but that makes things extremely difficult when troubleshooting
I’m skeptical of certs, they don’t represent much more than a shallow baseline of knowledge and a minimum initiative to go get them. That being said, they’re much better than nothing.
Imo understanding networking fundamentals is huge. If you google “overthewire banditlabs”, there’s a series of challenges that test / teach you important skills.
Personally, I would rather see banditlabs over a cert, a cert over nothing, and tbh enthusiasm / teachability over everything.
How do you feel about cybersecurity? It’s a much larger field than it appears on the surface, and to my recollection the unemployment rate has never been positive - we have always had more jobs than people.
Vscode already supports linting yaml against a schema file. Once you start configuring your code with configuration-as-code, you’re just writing more code.
If I need to “generate” some insane config with miles of boilerplate, I would use js to build my json, which can be ported to just about anything. This would replace js in that process.
I’m not sold on the need for this.
Even with something like k8s, I’d reach for pulumi before I put another layer on top of yaml.
You can reduce doorknob turning dramatically by running on a non-standard port.
Scanners love 80 and 443, and they really love 20, but not so much 4263.
I used to run a landing page on my domain with buttons to either the request system / jellyfin viva la reverse proxy. If you’re paranoid about it, tie nginx to a waf. If you’re extra paranoid, you’ll need some kind of vpn / ip allow-listing
Hello yes my email is dot at dotat dot at
Phone picture album roll? Photo reel? Downloads folder! But on a phone. Apple hates calling things folders idk lol
Excellent! Thank you :)
This sounds incredible and I absolutely will find these people. Cooking my porkchops to a lower temperature and letting them rest before eating has changed my life.
My friend, you have no idea how much time I have spent searching for something like this on google. This is incredibly useful. I have saved this to my camera roll.
Naturally searching anything with “chicken” and “cook” present returns hundreds of recipe websites or food safety “articles” that all copy and paste “the fda says 165” with no further thought.
I knew a chart like this must exist, but had given up the search. Sincerely, thank you.
Broadcom***
I use a very simple “hashing” algorithm that I can do mentally. If I want to log into a service, I “hash” its name, and that’s my password.
Every service I use has a different password, and I don’t have to remember any of them. I have no keyvault that can be stolen.
MFA is still an issue. You’ll need your recovery codes to be accessible, but encrypted.
From the HN comments, R&D includes the infrastructure / datacenter costs to support AWS.
Given the scale of AWS, even if only measured by how much of the internet breaks when us-east-1 goes down, I would say the numbers make sense.
I walked along the sand dunes of the Sahara desert for 40 days and 40 nights with nothing but a pack of newports and a fifth of Henny. I really do this shit.
I love grammars. It’s like an API or a data schema, but for a language. This would be very cool and I would love to see it!