• 0 Posts
  • 19 Comments
Joined 1 year ago
cake
Cake day: June 22nd, 2023

help-circle






  • I moved from the normal sized iPhone to the Max this year. No regrets so far. The most common thing I do with my phone is consume media so the cumbersomeness has been a good tradeoff.

    I had bought a 15 Pro on release day but returned it for the max after a week of continuing to doubt myself after holding a max in the store. I had jumbophones up till the iPhone X, I even had a Dell Streak back in the day.

    Most suprising thing to me was that the speaker was insainely better. I stopped carrying a Bluetooth speaker around with me for when I’m working cause the speakers get the job done well enough now. It’s not a 1-to-1 replacement but it is just ggod enough that it suffices. Also, the battery life from the smaller phone to the larger was such a big increase that I’ve stopped carrying around an external battery but just keep a usbc cable with my in case my ecig runs out of battery and I need to charge it off my phone.

    It’s been an interesting series of trade offs going back to a larger phone but then again, the bezels and thickness have reduced so much that a Max without a case feels the same as a normal size phone with a case. I thought I’d get bit by the screen being too big more than I have but I guess some honest self reflection on what I actually use my phone for compared to what I picture I use it for helped with the decision making. (I totally get that other people’s use cases with have completely calculus)



  • Here’s a link I found that might be good if you are interested in more:

    https://cloudnativenow.com/topics/ephemeral-idempotent-and-immutable-infrastructure/

    https://guymorton.medium.com/persistent-and-ephemeral-infrastructure-as-code-in-aws-42b33939dcf1

    There are different levels of effemeriality. The simplest example I use daily would be an autoscaling group in AWS. Especially if you use Spot Instances to save money, thi gs may scale in and out whenever.

    So if a development team creates a new autoscaling group and I need to get into an instance to test something, unless I add stuff to their IaC, I’m stuck with their configuration. I need to assume that every time I ssh into one of those instances, it’s a brand new instance. But it’d be a big challenge for me to go to their repo and make a PR to alias a command whenever an instance in that resource is created

    Stuff can be even more temporary if it’s something like an ECS task which creates a container with a read only filesystem only when a task is needed to be done. But I don’t want to get too deep in the weeds (or deeper than I already have)

    terraform workspace will at least stick around for a while so you might be in and out of the same system multiple times.


  • {vi} = 2 {vim} = 3 {v=vim} = 5

    I’d need to run vi at least 5 times to have a net gain in saving keystrokes. I’m typically in effemerial systems created by the users of our env, so rarely am I going to gain those strokes back

    But also, why am I trying to apply logic to this? I’ll often cat a file before editing it. This shit is just illogical idiosyncrasies I’ve picked up over the years. I’m probably creating posthoc justifications for insane things I do cause it’s hard to override muscle memory


  • I’ll have to check tomarrow if RHEL and UBI do this.

    Did some quick googling and looks like cent has that alias by default but doesn’t do it when root. Which would explain why I do get inconsistent results with vi. I never thought about it in detail besides just knowing that there are some visual changes. Thanks for the info, I’ll be noticing this now that I know!



  • I’m in DevOps so I’m in a lot of effemerial systems so in practice, I will run into systems where profile hasn’t been set up. Tho I do like the idea of making sure all systems properly have that aliased cause it’d be serial killer vibes to spend hours of time to make sure that I can save a keystroke.

    Tho it’d never make it through PR. Also, wild require explaining to my coworkers that I do this




  • The perps are taking a big risk as well. Finding and uploading csam means being in possession of it. So we can at least take solace in knowing it’s not a tool that just anyone wiill use to take down a community.

    Uploading to websites counts as distribution. The authorities will actually care about this. It’s not just some small thing that is technically a crime. It’s big time crime being used for skme thing petty.

    So while the perp might win in the short term, they are risking their lives using this tactic. I’m not terribly worried about it becoming a common tactic

    I’d anything, if I were the one doing this, I’d be worried that I might be pissing off the wrong group of people. If they keep at it and become a bigger problem, everyone is going to be looking for them. And then that person is going to big boy prison.