• 0 Posts
  • 19 Comments
Joined 1 year ago
cake
Cake day: June 23rd, 2023

help-circle



  • InverseParallax@lemmy.worldtoProgramming@programming.devSoftware Disenchantment
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    1
    ·
    edit-2
    10 months ago

    That’s not the problem.

    Software used to be an artisan job, a skilled engineer carefully sculpts a solution for a problem.

    Management didn’t have much to add there, or visibility, this was a world-breaking problem for them, where was their value?

    The solution was issue-tracking, make every line of code a bureaucratic nightmare, ensure panopticon-like visibility for everything, that guaranteed the manager was always in control.

    Progress slowed to a crawl, that’s fine, you just need to hire more developers, hundreds, they scale, right?

    Good programmers stick to startups because large companies are just well-paying torture firms. I wouldn’t go back to Google for any amount of money, but I’ll do a startup almost for free, because they let me write code.



  • This has been a problem forever, the googleization of CS where everything is assumed to scale to gigabytes and therefore all that matters is big-O.

    In systems that’s meaningless, what really matters is memory locality, loop placement, caching/lookaside and other features.

    The JDk is an excellent example of both large scale and small scale optimization, the GC systems and much of the low-level features like locking use microoptimizations while the higher order data structure features use algorithmic optimizations.








  • Dune had no good guys, none at all.

    Everyone was out for themselves or their narrow view of what was just and best for humanity from their simplistic and self-centered perspective.

    Leto 2 was the exception because he was out for his narrow view of what was best for humanity from his broad, self-centered perspective that still didn’t really lead anywhere.

    The actual point of the books is that no ideal survives the test of real time, and over time civilization tends to ossify, so we are doomed to catastrophe by our very nature.






  • Have an alias so trusted hosts can bounce through my authorization host and end up on a tmux session on the targetted host. It has logging and such but mostly it’s for simplicity.

    If I plan to use that connection a lot there’s a script to cat my priv key through the relay.

    Have an scp alias too, but that gets more complicated.

    For more sensitive systems I have 2fa from gauth set up, works great.