• 0 Posts
  • 97 Comments
Joined 1 year ago
cake
Cake day: July 30th, 2023

help-circle

  • “broken build” here likely refers to the phrase as defined by gamers to function as synonymous to “overpowered”.

    As in, “the build is so broken you can’t/it is difficult to play against it”. This phraseology could be used by either an ally or an enemy, but it contextually changes connotation from positive for allies to negative for enemies.

    Build is often used as a shorthand for a character’s combination of items, skills, and levels (as the various games define it).




  • That sounds like the average megacorp terms of service these days.

    Yes, just because everyone’s doing it doesn’t mean they can’t be better. They should be better, but worldwide government regulations don’t force that (yet).

    But at some point to interact with any kind of large company, your information is going to end up crossing the path of a large company, especially one of the hyperscale cloud and connectivity providers like Microsoft, Akami, Cloudflare, Google, Amazon, etc.

    Whether businesses get copies of information is usually included in a site’s privacy policy, and if you’re curious about that list (and it’s not publicly documented), I’d hope there’s a contact to get more info about the policy (like a privacy@ email address)

    If you really want to limit your information exposure, you either have to audit everyone you do business with this way (because most large companies do this) or hire someone (or a service) to do it.

    You could also consider not interacting with large companies at all - but you’d limit yourself from part of the modern world. If that’s your game, by all means by my guest.



  • Yup. My background is computer science transitioned to IT Infra.

    My sister sent me a screenshot of a Spotify one-liner error, white text on black background, captioned “they wrote a lazy error”. I immediately recognized that the actual problem was the load balancer in the front end trying and failing to connect to the backend/middleware in the first error, then in the second it recognized a failed health check and reporting that no back ends were available. Root cause is probably networking issue or actual server crash.

    I also have a bonus that in high school I had watched a ton of videos on VFX/SFX and knew a rough way around After Effects and compositing (before I jumped into CS I had considered this as a career path), so now when I watch TV and movies I can also see some of the “layers” they use to compile the on screen effect.






  • A to B made more sense in a world where devices cannot serve as both roles via negotiation. My android phone when I got it utilized a data transfer method of plugging my iPhone charge port into my Android charge port, then the Android initiated the connection as a host device.

    The true crime is not that the cable is bidirectional, the true crime is that there is little to no proper distinction and error checking between USB, Thunderbolt, and DisplayPort modes and are simply carried on the same connector. I have no issues with the port supporting tunneled connections - that is in fact how docking stations work - just the minimal labeling we get in modern devices.

    I’d be fine with a type-A to type-A cable if both devices had a reasonable chance at operating as both the initiator and target - but that type of behavior starts with USB-OTG and continues in type-C.


  • Others have some good information here - all I’d like to add to the root is that Windows and Mac have a built-in DNS cache and it’s pretty straightforward to add a DNS cache to systemd distros (if it’s not already installed or in use) using systemd-resolved or dnsmasq if you really dislike systemd. Some distros enable this from install time.

    Systems that utilize a DNS cache will keep copies of DNS query results for a period of time, making the application-level name lookup speed essentially 0ms for a cached result. Cold results obviously incur the latency of the DNS server itself.