Your feelings are shared by many others our age. Friends at work are important, especially if you're living alone. I live alone in a city with friends within reach, but only having friends outside of work is not enough social interaction for me.
Consider how much social time there is in high school and college. There was barely a moment to be alone. Classes are full of discussion, meals are eaten together, and shooting the shit with siblings or roommates fills in all the other time. If you forego social interaction during work hours, I don't see how the math adds up to get back to the baseline from high school and college.
It sounds like you have an office to go to even though your team doesn't come in often. This is the case for me too, but luckily I'm at a big enough company where there are people my age on other teams. At first, barely anyone came in, but someone has to break the deadlock so I kept coming in every day regardless. Fast forward a year and there is a group of 20-somethings that come in every day. I've formed some of the best friendships of my life here. I recommend going into the office every day even if it's going to be empty. It's a good routine anyway to get out of the house.
While I don't have any personally, I'd also recommend housemates. A lot of my friends from work have housemates and I feel like it's an easy way to build a large friend group since you can share each other's friends. It especially seems to help those who are new to the city and don't have a friend group yet. Your housemates can also easily become your friends!
I really sympathize with your situation. You're simply asking for what used to be normal to return. Don't lose hope - there are so many of us like you and we just need to find each other.
I do the same. I've yet to hear a convincing argument against this practice. Everyone seems okay with passwordless docker and you can use that to privilege escalate too.
> The problem is that ligature substitution is “dumb” in the sense that it only considers whether certain characters appear in a certain order. It’s not aware of the semantic context.
In many code editors (even my terminal with fish shell!) this is not true. Ligatures are broken up when the text changes style due to syntax highlighting. Syntax highlighting can consider context, so if there is a mistaken ligature, this can be fixed by changing the syntax highlighting rules.
I use Dracula color scheme along with the Cascadia Code font [1]. I've been using this set up in both VSCode for Rust and Java in IntelliJ. I find this combination to be extremely readable. Dracula uses many very different colors which make different parts of code obvious. Cascadia has unique shapes for many of the characters which makes distinguishing them a breeze. Would definitely recommend giving this combo a shot!
Yes, Cascadia is a bit quirky but pretty nice. Currently I’m on JetBrains Mono which I find works great for me in terms of legibility. I love the slightly increased letter height and use it at 11 pt on a 27” display in Visual Studio. It reminds me a bit of IBM Plex Mono but I like it more. https://www.jetbrains.com/lp/mono/
It took me years to switch from Ubuntu Mono[1] to IBM Plex Mono[2] but now I feel like I'm never gonna change fonts again. I gave Cascadia a try but it feels way too bold. On paper it looks like a really cool project but after I've installed it it felt like all my code was shouting at me (I mean even more than usual), it was disturbing.
I've been running something similar on my three Raspberry Pi 4 with microk8s and flux [1]. Flux is great for a homelab environment because I can fearlessly destroy my cluster and install my services on a fresh one with just a few commands.
Next on my list is set up a service mesh like istio and try inter-cluster networking between my cloud cluster and home Raspberry Pi cluster. Perhaps I can save some money on my cloud cluster by offloading non-essential services to the pi cluster.
I'm also curious about getting a couple more external SSDs and setting up some Ceph storage. Has anyone tried this? How is the performance?
One of my pain points is the interaction of the load balancer (metallb) with the router. It seems to want to assign my cluster an IP from a range, but may choose different ones at different times. Then I have to go update the port-forwarding rules on my router. What solutions do you all use for exposing Kubernetes services to the internet?
> One of my pain points is the interaction of the load balancer (metallb) with the router
That part is incredibly annoying. Wondering about that as well. The ideal solution would involve something like a CSI driver that could talk to the router directly, as is done with cloud provider APIs.
Using Pdfsandwich in college was like having a superpower. We would often be given PDFs with only image data. While my peers were still scrolling through and copying quotes by hand, I was there in seconds with Ctrl-F to find and copy/paste.
Once you have text in the PDF, you can use any sort of text analysis tools. You can use tools to convert it to plain text and grep through, or anything else you want.
That being said, it's not perfect, but still pretty awesome. Sometimes the spacing was off or it would confuse symbols like 1, I, or l. But these are minor and usually only on poorly scanned PDFs.
Here's a tangentially related fun fact! Before you take the uniform bar examination in New York, you first have to take an at-home section called the New York Law Examination. There is a book[1] that covers all the New York specific law that could be on the examination. It used to be provided as a simple PDF, where you could potentially search it, but people seemed to feel it made the test too easy - since everything was in that book. So they made it an image PDF.
Then, they put a warning on their site saying that they explicitly consider it to be misconduct search the book (e.g., by making the book searchable with OCR):
> The NYLC/NYLE Course Materials are locked in a non-searchable format in accordance with the Board’s misconduct rule prohibiting candidates from electronically searching the Course Materials when taking the NYLE. If a candidate, because of a disability, uses a screen reader to access written material, please contact the Board office by phone (518-453-5990), mail, or fax.
Kind of silly, sure! They don't want you searching the book during the exam, but they're fine with you going through it. And, following passing the bar exam, there is a character and fitness process, so students are fairly terrified of doing anything unethical, particularly things the bar explicitly says is unethical. So, it's basically an honor system, but with a big stick (although I haven't heard of any actual enforcement). If you OCR it, brag about it to your friends, and your friends really hate you, I guess they could report it.
As mentioned in your quote there’s a special version intended for disable candidates with larger text and searchable content so as to be compatible with screen readers. The version is freely available (not publicly but indexed by search engines) on their website.
On an even more macro level I've had a great experience with ripgrep-all[0], which uses Tesseract internally.
I have e.g. a directory with all weekly lecture slides for one lecture, and can directly find where (both file and page) we learned something related to photosynthesis via `rga photoshynthesis`.
In Azure I put all my stuff in a new resource group and then when I'm done I just delete the entire resource group. This has worked well for me so far and I haven't had any surprise charges like I did on AWS and Digital Ocean.
I wanted to clear out my account so I deleted the VM but it didn't delete the associated static IP, so I got charged for the unused IP address that month. I didn't know the IP was still around until I got the bill. If this were in Azure I would have deleted the entire resource group and the IP would have gone along with it.
The key takeaway for me is how this decision affects port scanning. According to the article:
> Van Buren is really good news for port scanning, for example: so long as the computer is open to the public, you don’t have to worry about the conditions for use to scan the port.
How is port scanning different legally from brute forcing passwords? Iterating integers is fine, iterating the dictionary is not? What if there's an integer ID in the URL but it's MD5 hash'd and I recognize for what it is and iterate integers and MD5 them?
It’s not about the techniques used, it’s about the intent of the functions. Remember that we’re in the legal domain and sometimes a common sense argument prevails even if there are some potential holes (if a hole is discovered, a future court case can worry about it). Port scanning is like looking at the outside of a house and noting where the doors and windows are. Brute forcing a password is like picking a lock to gain access to something, or possibly identity theft to authenticate yourself as someone else. Judges can easily understand the difference even if the technical method might be similar. Nobody is going to believe you “port scanned” your way into someone’s online banking access and took money out of their account.
> How is port scanning different legally from brute forcing passwords?
Because humans are trivially able to recognize the difference between those two activities. A judge that has that case in front of them can _really_ easily see the difference between those activities.
I think brute-forcing passwords offline isn't illegal under the CFAA.
Using a password you got that way would be illegal.
Similarly, password stuffing (just trying many passwords on the login form) would be illegal, since you are trying to gain access. Not sure how that works if you are not successful though.
Port-scanning would be fine. Interesting edge case is, what happens if you port-scan, find an open telnet port, and use it to get a shell.
There is no authentication, but does that mean you are authorized?
My gut says that logging in to such a telnet port (when the device is not yours) is a CFAA violation. Just like walking in to a random house when the door is open is still illegal.
For sure, it's been a while but IIRC the CFAA (and UK's CMA) refer to use of certain legal classes of computer "without authorization" or "exceeding authorization". Legal authorisation is an active state rather than something that happens passively.
Some conspiracy theories turn out to be true. Suppressing research into these would also lead to poorly informed decisions. For example, government mass surveillance on the scale revealed by Snowden was considered a conspiracy theory before the proof emerged.
So I would disagree that "conspiracy theories are problematic." Some are problematic, but there are also some that turn out to be extremely important. No progress is made without questioning authority and the status quo.
Needing to have evidence to not have your theory marked as misleading doesn't disincentivize research into conspiracies. It does the opposite. There would be more research into these theories so that their purveyors could say them without being labeled misleading. Anyone would still be able to do their own research under this model too, they would hopefully just know not to blindly believe what they read.
Investigating wrongdoing and backing up findings with evidence is extremely important. Spouting unfounded lies is not.
The bigger problem is when platforms block the content. In this case very few people will hear about the conspiracy theory. So then few will know that this is something worth investigating. This dramatically hinders research into the (potentially true) conspiracy theory.
I have less of a problem with marking things as unfounded if they are actually unfounded. I wouldn't use the term misleading because not all unfounded claims are false. There's still a lot of gray area here. Maybe the person in charge of making those judgements is not a subject matter expert. Or maybe the person making the claim has some additional information that cannot be revealed. (Perhaps they are inside the organization and cannot leak too much or they will be caught.)
I would set the bar for marking things as misleading as requiring evidence to the contrary. I think it is fine to mark things as lacking evidence, as long as that can be established fairly and reliably. I have my doubts that this can be done reliably, but as long as there is no blocking occurring, I think the harm of a mistake is minimized. Anyone claiming to be an impartial subject matter expert capable of making these judgements should provide evidence of that claim.
Consider how much social time there is in high school and college. There was barely a moment to be alone. Classes are full of discussion, meals are eaten together, and shooting the shit with siblings or roommates fills in all the other time. If you forego social interaction during work hours, I don't see how the math adds up to get back to the baseline from high school and college.
It sounds like you have an office to go to even though your team doesn't come in often. This is the case for me too, but luckily I'm at a big enough company where there are people my age on other teams. At first, barely anyone came in, but someone has to break the deadlock so I kept coming in every day regardless. Fast forward a year and there is a group of 20-somethings that come in every day. I've formed some of the best friendships of my life here. I recommend going into the office every day even if it's going to be empty. It's a good routine anyway to get out of the house.
While I don't have any personally, I'd also recommend housemates. A lot of my friends from work have housemates and I feel like it's an easy way to build a large friend group since you can share each other's friends. It especially seems to help those who are new to the city and don't have a friend group yet. Your housemates can also easily become your friends!
I really sympathize with your situation. You're simply asking for what used to be normal to return. Don't lose hope - there are so many of us like you and we just need to find each other.