node

node

faried nawaz | @fn@p.node.pk

coffee

A programming error in the software used by UK airline TUI to check-in passengers led to miscalculated flight loads on three flights last July, a potentially serious safety issue.

The error occurred, according to a report released on Thursday by the UK Air Accidents Investigation Branch (AAIB), because the check-in software treated travelers identified as “Miss” in the passenger list as children, and assigned them a weight of 35 kg (~77 lbs) instead of 69 kg (~152 lbs) for an adult.

The AAIB report attributes the error to cultural differences in how the term Miss is understood.

“The system programming was not carried out in the UK, and in the country where it was performed the title Miss was used for a child, and Ms for an adult female, hence the error,” the report says.

Airline software super-bug: Flight loads miscalculated because women using ‘Miss’ were treated as children

@clacke yes, I use it over nntp.

Rust in the Android platform

In addition to ongoing and upcoming efforts to improve detection of memory bugs, we are ramping up efforts to prevent them in the first place. Memory-safe languages are the most cost-effective means for preventing memory bugs. In addition to memory-safe languages like Kotlin and Java, we’re excited to announce that the Android Open Source Project (AOSP) now supports the Rust programming language for developing the OS itself.

https://jrms-random-blog.blogspot.com/2021/03/a-google-interview-question.html

A Google Interview Question: determine if someone has won a game of tic-tac-toe.

> I expected most candidates to whip off a solution in a few minutes and then we'd move on to the next interview question. To my surprise, fully half the candidates were unable to finish this simple task.

from email:

Prof. Alex (Sandy) Pentland’s keynote speech to the Scotsman 2020 Data Conference:

https://www.youtube.com/watch?v=RQ920kSKvEU

Some background: Pentland’s research group has long been looking at how data can be used to understand how communities thrive —- improving bus routes to better reflect where the people in neighborhoods are going and when is one example —- and he’s looking at data-governance from a people-centric perspective. Part of his idea is that people’s data unions will hold and aggregate their data (just as a credit union holds and aggregates members’ money), and will use it for the purposes agreed to by its members.

He’s got a book coming out, much of which is available online: https://wip.mitpress.mit.edu/new-economy

disease follows people

@emacsen @raucao you can add a custom rule to handle the git clone step. for example, one co-worker’s .drone.yml starts with

---
kind: pipeline
type: docker
name: Deployment to Firebase Hosting

platform:
  os: linux
  arch: amd64

# tell drone not to do the git clone
clone:
  disable: true

# steps executed in order
steps:
  - name: git-clone
    image: alpine/git:1.0.7
    commands:
      - git clone https://bitbucket.org/team/proj-1
      - cd proj-1 && git checkout $DRONE_COMMIT

  - name: setup
    image: node:lts
    commands:
      - echo 'prefix = /data/.npm-packages' > /root/.npmrc
[...]

for the directories you need to build, maybe you can write a script that figures out what changed in the most recent commit, and figure out what to rebuild. run it as a drone step.

it’s too late to make suez canal jokes. that ship has sailed. — not mine

@emacsen i set it up for the co-workers over a year ago. a couple of projects use it heavily (do all deployment through it). one other project prototyped using a mac mini to automatically build unity3d games for iOS, using the mac os native drone runner. they ended up not using it in production, though for logistical reasons, not technical.

the projects that use it use the docker-based drone-runner to make builds or do deployments.

@lain i had to search for the video, just to hear the laughter.

When life gives you lemons, trade them for coffee

@kingcons it’s probably not about this, though that has several comparisons, too.

@thaha several services already have a list of list of IP ranges used by AWS, DigitalOcean, etc., and they block or rate-limit requests from there. i used to use a simple web proxy running on a VPS to view region-locked videos on youtube (for example), but i haven’t been able to do that for years.

it comes down to what you want to use the VPN for.

@drwho I use totp on my phone with a fido key, and use whichever is handy (usually my phone). that way I have a alternate in case I lose one of them.

if i lose both, I'll have to dig up the backup codes, saved in a pgp-encryted file and copied to a bunch of places.

»