53 Matching Annotations
  1. Oct 2021
    1. One obstacle to improvement is a perceived dichotomy between software and data, which has its roots in computing technology but has no counterpart in the structure of scientific knowledge.
  2. Aug 2021
    1. is security hardened for containers

      What does that actually include?

    2. you can use CoreOS toolbox to install and run debugging and admin tools in an isolated container.
    1. access scopes:
    2. you can create firewall rules that allow or deny traffic to and from instances based on the service account that you associate with each instance.

      Different firewall rules for each service account?

    3. IAM policy hierarchy.
    4. Target user

      Is the target definitive or simply a recommendation?

    5. union of the policy set

      If a policy is unset on a higher level, does that mean I cannot restrict it on a lower level? Can I generally restrict a policy on a lower level?

    6. basic roles, and custom roles.
    7. Google Workspace domain
    8. a Google Group
    9. or is bound to a specific resource

      What does that mean?

  3. Jul 2021
    1. It does not have anything to do with processes having an opened socket; local delivery is controlled by the "local-delivery" routing table: ip route show table local.
    2. five available Netfilter hooks
  4. Jun 2021
    1. If you’re interested in other alternatives that have been considered, I recommend taking a look at the Design Doc for the Sidecar Containers KEP.

      Link to other approaches to solve the sidecar container lifecycle issues

    1. Start by defining the presentation class, ShoppingListItem:
      • Is <constructor signature> : <expression>; a general shorter syntax for a constructor or even a method in general?
      • What is ObjectKey and key of StatelessWidget?
      • What influence does the leading _ of some method names have on the visibility of that method?
    2. The following slightly more complex example shows how this works in practice:
      • How do return types and parameter types of overridden methods interrelate with those of the overriding methods?
      • Why is there a this qualifier in the parameters of the constructors? Does it reference the instance of the widget, i.e. does the whole qualified parameter reference the final member variable?
      • VoidCallback is an interesting type. How would other functions with other return types and parameters be typed?
    3. Consider this basic example, using the ElevatedButton mentioned earlier:
      • Are anonymous functions just like arrow functions in TS, only without arrows?
      • Is the type of a variable written before instead of after variable? (If so, dislike)
      • The StatefulWidget class seems redundant as it only holds the state where the actual methods, fields and the build() method reside. What other functions besides wrapping the state does it have?
      • Is string interpolation like in TS, only without braces for stuff to interpolate and normal single quotes?
    4. Below are some simple widgets that combine these and other widgets:
      • Constructor syntax, especially that parameters are written like an object (in TS) and that there is no body
      • Why does every field in a Widget subclass need to be final? Does that mean it is immutable?
      • What is the meaning of const keyword setting the padding? This does not exist in TS.
      • title is accessed inside build() without a qualifier, e.g., this. Does this mean that the Widget class is the default namespace?
      • What is the build context (for)?
    5. Many widgets use a GestureDetector to provide optional callbacks for other widgets.

      How do they use that (code)? Are these widgets actually wrapped in a GestureDetector?

    6. In addition, a Container can be transformed in three dimensional space using a matrix.
    1. Cloud Functions integrates with Firebase Hosting which you can use as an edge-caching proxy. What you do here is effectively direct web requests to Firebase Hosting, which checks to see if it already has a response in its cache. It will either serve previously-cached content, or forward the request to Cloud Functions.
    2. HTTP chunked transfer encoding
    3. Firebase Admin SDK
    4. Cloud Memorystore
  5. May 2021
  6. Feb 2021
  7. Oct 2020
    1. Most people seem to follow one of two strategies - and these strategies come under the umbrella of tree-traversal algorithms in computer science.

      Deciding whether you want to go deep into one topic, or explore more topics, can be seen as a choice between two types of tree-traversal algorithms: depth-first and breadth-first.

      This also reminds me of the Explore-Exploit problem in machine learning, which I believe is related to the Multi-Armed Bandit Problem.

  8. May 2020
    1. WhyGeneral infrastructure simply takes time to build. You have to carefully design interfaces, write documentation and tests, and make sure that your systems will handle load. All of that is rival with experimentation, and not just because it takes time to build: it also makes the system much more rigid.Once you have lots of users with lots of use cases, it’s more difficult to change anything or to pursue radical experiments. You’ve got to make sure you don’t break things for people or else carefully communicate and manage change.Those same varied users simply consume a great deal of time day-to-day: a fault which occurs for 1% of people will present no real problem in a small prototype, but it’ll be high-priority when you have 100k users.Once this playbook becomes the primary goal, your incentives change: your goal will naturally become making the graphs go up, rather than answering fundamental questions about your system.

      The reason the conceptual architecture tends to freeze is because there is a tradeoff between a large user base and the ability to run radical experiments. If you've got a lot of users, there will always be a critical mass of complaints when the experiment blows up.

      Secondly, it takes a lot of time to scale up. This is time that you cannot spend experimenting.

      Andy here is basically advocating remaining in Explore mode a little bit longer than is usually recommended. Doing so will increase your chances of climbing the highest peak during the Exploit mode.

  9. Apr 2020
  10. Jan 2020
  11. Jan 2019
  12. Oct 2018
    1. malignant eye,

      Birds of prey have excellent eyesight. Scientists estimate that they can see two to eight times better than humans. They also have a third eyelid for protection.

  13. Nov 2013