Balinares

joined 1 year ago
[–] Balinares@pawb.social 3 points 3 days ago

It... depends. There is some great tooling for Python -- this was less true only a few years ago, mind you -- but the landscape is very much in flux, and usage of the modern stuff is not yet widespread. And a lot of the legacy stuff has a whole host of pitfalls.

Things are broadly progressing in the right direction, and I'd say I'm cautiously optimistic, although if you have to deal with anything related to conda then for the time being: good luck, and sorry.

[–] Balinares@pawb.social 14 points 1 month ago (1 children)

The Earth's orbit is an ellipse, not a circle, and therefore the Earth speeds up or slows down depending on where on its orbit it is at the time. In turn this means that the duration of the solar day fluctuates from day to day, from a bit under 24h to a bit over 24h and back.

So if you take a picture every 24h precisely the sun will appear to move horizontally a little bit on top of the expected vertical movement.

[–] Balinares@pawb.social 17 points 1 month ago

I mean, he's been implementing hard right policies all along, so...

[–] Balinares@pawb.social 4 points 2 months ago

The default actually works pretty well these days.

Messing with the EFI partition, for instance by attempting to have two of those on separate disks, will probably cause you more pain than Windows will. As far as I understand, only one EFI partition can be configured in BIOS as the boot partition, so you will have to change the configuration in BIOS whenever you want to boot to the other OS.

Windows does have a history of changing the default EFI bootloader once in a while; however your chosen bootloader is still there, just not marked as the default anymore. A Windows app like EasyUEFI will let you change the default back.

[–] Balinares@pawb.social 9 points 2 months ago

The ONE time in half a decade I take a trip to Seattle...

"Possible cyberattack" plus "no threat actors or ransomware group has taken responsibility" sounds to me like someone fucked up and is timid about owning up.

[–] Balinares@pawb.social 18 points 2 months ago

Yup, that's a giant house spider. No kidding, that's the vernacular name of the species, see https://en.wikipedia.org/wiki/Giant_house_spider. Formerly filed under the tegenaria genus, now its own genus.

They're comically large and terror-inducing, but not aggressive. And they keep out more aggressive species too.

[–] Balinares@pawb.social 20 points 2 months ago

Windows 98 really sucked and running Unix at home became an option.

[–] Balinares@pawb.social 17 points 3 months ago (1 children)

Was this a mistake?

Clarifying: are you asking if downloading the Proton Mail app through the Google Play Store gives Google access to your Proton account? If so, the answer is no.

[–] Balinares@pawb.social 10 points 3 months ago (5 children)

Firefox's stance on privacy, like Apple's, is to some extent branding. Arguably it always was. You should still use Firefox (or any other third party browser) if it works for you. Ecosystem diversity matters.

[–] Balinares@pawb.social 13 points 3 months ago (7 children)

They didn't drop the don't be evil thing. It's still right there in the code of conduct where it always was, they just moved it to the conclusion of the document so it's the last thing that remains with you. See for yourself: https://abc.xyz/investor/google-code-of-conduct/

The supposed removal is a perfect example of the outrage-bait headlines I'm discussing in another comment.

[–] Balinares@pawb.social 5 points 3 months ago

It's not the company it once was, but there are also a lot of outrage-bait headlines about it that don't hold up well to scrutiny.

For instance, there have been a lot of Lemmy posts about Chrome supposedly removing the APIs used by adblockers. I figured I'd validate that on my own by switching to the version of uBlock that is based on the new API. Well... As it turns out, it works fine. It's also faster.

Mind you, figuring out the actual facts behind each post gets exhausting, and people just shutting down and avoiding the problem space entirely makes some sort of sense. That, and it is healthy for an ecosystem to have alternatives, so I'd keep encouraging usage of Firefox and such if only on that basis alone.

[–] Balinares@pawb.social 13 points 3 months ago

This is actually an excellent question.

And for all the discussions on the topic in the last 24h, the answer is: until a postmortem is published, we don't actually know.

There are a lot of possible explanations for the observed events. Of course, one simple and very easy to believe explanation would be that the software quality processes and reliability engineering at CrowdStrike are simply below industry standards -- if we're going to be speculating for entertainment purposes, you can in fact imagine them to be as comically bad as you please, no one can stop you.

But as a general rule of thumb, I'd be leery of simple and easy to believe explanations. Of all the (non-CrowdStrike!) headline-making Internet infrastructure outages I've been personally privy to, and that were speculated about on such places as Reddit or Lemmy, not one of the commenter speculations came close to the actual, and often fantastically complex chain of events involved in the outage. (Which, for mysterious reasons, did not seem to keep the commenters from speaking with unwavering confidence.)

Regarding testing: testing buys you a certain necessary degree of confidence in the robustness of the software. But this degree of confidence will never be 100%, because in all sufficiently complex systems there will be unknown unknowns. Even if your test coverage is 100% -- every single instruction of the code is exercised by at least one test -- you can't be certain that every test accurately models the production environments that the software will be encountering. Furthermore, even exercising every single instruction is not sufficient protection on its own: the code might for instance fail in rare circumstances not covered by the test's inputs.

For these reasons, one common best practice is to assume that the software will sooner or later ship with an undetected fault, and to therefore only deploy updates -- both of software and of configuration data -- in a staggered manner. The process looks something like this: a small subset of endpoints are selected for the update, the update is left to run in these endpoints for a certain amount of time, and the selected endpoints' metrics are then assessed for unexpected behavior. Then you repeat this process for a larger subset of endpoints, and so on until the update has been deployed globally. The early subsets are sometimes called "canary", as in the expression "canary in a coal mine".

Why such a staggered deployment did not appear to occur in the CrowdStrike outage is the unanswered question I'm most curious about. But, to give you an idea of the sort of stuff that may happen in general, here is a selection of plausible scenarios, some of which have been known to occur in the wild in some shape or form:

  • The update is considered low-risk (for instance, it's a minor configuration change without any code change) and there's an imperious reason to expedite the deployment, for instance if it addresses a zero-day vulnerability under active exploitation by adversaries.
  • The update activates a feature that an important customer wants now, the customer phoned a VP to express such, and the VP then asks the engineers, arbitrarily loudly, to expedite the deployment.
  • The staggered deployment did in fact occur, but the issue takes the form of what is colloquially called a time bomb, where it is only triggered later on by a change in the state of production environments, such as, typically, the passage of time. Time bomb issues are the nightmare of reliability engineers, and difficult to defend against. They are also, thankfully, fairly rare.
  • A chain of events resulting in a misconfiguration where all the endpoints, instead of only those selected as canaries, pull the update.
  • Reliabilty engineering not being up to industry standards.

Of course, not all of the above fit the currently known (or, really, believed-known) details of the CrowdStrike outage. It is, in fact, unlikely that the chain of events that resulted in the CrowdStrike outage will be found in a random comment on Reddit or Lemmy. But hopefully this sheds a small amount of light on your excellent question.

view more: next ›