• 9 Posts
  • 77 Comments
Joined 1 year ago
cake
Cake day: June 9th, 2023

help-circle




  • I have a similar story as your first point. It boils down to tucking away money with each financial gain. I put in enough to my 401k to get the full match, then with each raise, increase the amount invested by the raise. I’d already learned to spend within my limits and had no credit card debt, so each raise was “new money”. Years later, after adjusting our financials to pay for daycare, when the daycare expenses dropped (infants are most expensive, costs drop down as they age), we started putting into a college savings and some for school expenses. We had saved up enough to pay for private school, which was less than daycare. Now that private school is done, college is paid for, we’re paying down the mortgages. We locked in at 3% years ago. The house will be paid off when the kid graduates HS and we turn 55 and are eligible for the employer’s retirement program, including health care. We plan to travel in those years where we’re young enough to be healthy and old enough to have some money tucked away.

    Oh, we also did the same for cars. When the car was paid off, we’d put the same money into a separate bank account and when it was tome to look for a new car, we had almost enough to pay for it outright.

    Of course all of this can only happen when you have the skill to spend with your means.







  • It depends on what you do with Docker. Podman can replace many of the core docker features, but does not ship with a Docker Desktop app (there may be one available). Also, last I checked, there were differences in the docker build command.

    That being said, I’m using podman at home and work, doing development things and building images must fine. My final images are built in a pipeline with actual Docker, though.

    I jumped ship from Docker (like the metaphor?) when they started clamping down on unregistered users and changed the corporate license. It’s my personal middle finger to them.





  • I’m using Kubernetes and many of the apps that I use require environment variables to pass secrets. Another option is the pod definition, which is viewable by anybody with read privileges to K8s. Secrets are great to secure it on the K8s side, but the application either needs to read the secret from a file or you build your own helm chart with a shell front end to create app config files on the fly. I’m sure there are other options, but there’s no “one size fits all” type solution.

    The real issue here is that the app is happy to expose it’s environment variables with no consideration given to the fact that it may contain data that can be misused by bad actors. It’s security 101 to not expose any more than the user needs to see which is why stack dumps are disabled on production implementations.



  • Video guides are nice, but I prefer Grog’s Knots. He even has an app for offline knot learning, say, when you’re deep in the woods and it’s raining hard and your tent’s rain cover blows off into the lake and you thankfully brought a tarp and rope but don’t know how to make one of those adjustable knots that you can just slip-tighten. You know, theoretically speaking.

    On a side note and completely unrelated, bring one of those big grout sponges when you go camping. In addition to mopping up all the water in your tent, it makes a nice pillow if your inflatable pillow decides to run away in the night in a storm and go swimming in the lake.

    TL;DR: I hate camping.





  • In the early kernel (think pre 1.0), I “fixed” the CPU scheduler for performance. I gave too much privilege to user processes, who refused to relinquish control back to the OS.

    Another time I was working on a multiprocess bootup configuration (before systemd) in a configuration where the main process would orchestrate the workers. Well, the main process would fork a child to do the work, then the child process would fork a child process to do it’s work. It was infinite delegation and I ran out of pids.