In this blog post, the author provides reasons against abstracting away the concept of files, especially on mobile operating systems.
»Civil engineers have solid rules for the way a bridge ought to be constructed: we switch web application frameworks on an annual basis.«
»The dream of perfect harmony was destroyed with the harsh reality that someone has to own a problem. It can't be a community issue, someone needs to sit down and work on it.«
The author gives some examples where Tor can be of great help for everyday sysadmin tasks.
This post shows how HTTP/2 solved bottlenecks between frontend and storage nodes in LinkedIn's distributed object-store.
The author explains why high-percentile latency is not a good way to measure efficiency.
»A survey commissioned by industrial giant Honeywell showed that roughly a quarter of facility managers have admitted suffering a breach of operational technology (OT) systems in the past year.«
»Suffice it to say, if you work someplace with enough machines, there's probably some way for you to get root on all of them if you can hit them with a handful of packets. I've seen it happen far too many times at enough companies to expect things to stay secure. I'm not talking about buffer overflows and stuff like that, although those exist too. I mean just straight up asking a service to please run a command for you (as root), and it gladly complies.«