• 0 Posts
  • 129 Comments
Joined 1 year ago
cake
Cake day: June 22nd, 2023

help-circle


  • Because computers have come even close to needing more than 16 exabytes of memory for anything. And how many applications need to do basic mathematical operations on numbers greater than 2^64. Most applications haven’t even exceeded the need for 32 bit operations, so really the push to 64bit was primarily to appease more than 4GB of memory without slow workarounds.


  • Best practice varies based on the specific use case, but generally you don’t want to modify sound any more than you have to. The more you modify, the more it has the potential to distort the sound depending on the quality of the particular amplifier and other components. It can get complicated, especially with hardware/analog EQs because of physical quality of the wiring, connections, and components. So, in general, it’s best to leave most things at 0db and change only the things you want to change. However, there are exceptions. Like if you want to change all but one of the frequencies by -4db, you’re better off changing the main amp by -4db and increasing just the one you didn’t want changing by 4db this the EQ is only modifying a small amount of frequency and the rest is passthrough. And generally the main amp is going to have less distortion than the EQ.

    That being said, this is talking about cases where your tolerance for distortion is extremely low or you have a really shitty EQ, in which case it’s probably better to just throw it out and forget the whole thing 🤣. Because most people aren’t going to notice the difference of using the EQ for amplification or the main, even if they aren’t the best quality.

    So, if you really are as picky about stuff that doesn’t matter much, but just want things to be as perfect as possible, like me, balance towards 0 as much as possible using both the EQ and the main. Otherwise, do whatever, probably no one will know the difference.

    Also, I know the math isn’t exactly right for the -4 and +4, but there are other things you need to know to get it perfect anyway for one inline -4 to equal another inline +4. But it’s close enough…






  • I got asked that by a gaggle of 18 yo boys while I was waiting on an elevator in boot camp, trying to embarrass me or something since I was quiet. I looked at them weirdly and said, “Of, course”, like they had just asked if I breathed air. The elevator opened just then and I walked in and though I didn’t get to see their faces, they didn’t get in. It’s small victories over bullies like that that made me realize bullies are weak AF.


  • But it hasn’t always been free to file electronically. The government made it required for them to offer free versions for simple returns, but that was recent.

    Also, access to the Internet isn’t universal. You’d be surprised how much of the US doesn’t have affordable Internet and a fair number don’t have Internet available at all, or limited to just dialup which is not very useful. And a lot of apps don’t work right on phone browsers, especially older phones, so then you need a desktop or laptop which a lot of people don’t have. Some have access in libraries, but a lot don’t or traveling to a library is a burden. And lots of other reasons that internet isn’t a given for a large portion of households. So paper is still not just necessary, but the easiest way.


  • Yeah, very limited, but it’s very good for more than half of the population that don’t have enough deductions to exceed the standard and don’t own property (if you properly count houseless “households” that earn income as not owning property and not just renters like most statistics). It’s dumb that they have to file a return anyway just to acres money that never should have been collected. Most just don’t know how to properly file their W-4 to not have taxes withheld in the first place. Mostly because they follow the directions and/or are afraid of paying a fine plus interest.

    Anyway, it’s a step in the right direction. And if we can unbury all of the staff out of the pile of paper returns, we can devote some to go after the rich and their frivolous, often fraudulent deductions and have them pay the tax they owe.




  • Is that employee autistic? One of the things that management requires is learning to communicate with all types of people and help others communicate. After all, your job isn’t producing something, it’s making sure your employees that do the actual work are able to do their job effectively.

    I’m just using autism as an example because I happen to be on the spectrum, though I’ve learned to mask well over the years. Autism has tons of advantages in the way we think. Great at analysis, great at handling emergencies, etc., but our communication style is a little different. We tend to need communication to be direct and precise because we analyze things too much sometimes. Problem is that because we’re so used to being misunderstood or misunderstanding people and getting into trouble for it and being scolded for asking clarifying questions because we “should just know what they meant”, that we often don’t ask the questions and try to interpret things in all the possible ways.

    And maybe it’s not even at this job that they were scolded, they just are used to neurotypical people scolding them for the way they think, that they no longer even try to ask questions. So my advice is to make sure the person is not only able to ask questions, but is encouraged to do so if they need to. Make sure to be very positive when they do and make sure the other people they interact with are positive as well. It’s a very small accommodation that could help them thrive and end up being one of your best employees if given the right atmosphere.

    Again, I’m using autism as an example because it’s a commonly misunderstood condition that is not a disease and not curable, nor should anyone try to cure it, it is just a different way of thinking and is a spectrum of various types of ways of thinking that people are often forced to mask and so is commonly undiagnosed or misdiagnosed. Heck, I didn’t figure it out until a few years ago and I’m in my mid-40s. But it took me decades to learn to effectively communicate without knowing why some people just couldn’t get me. Even now I tend to over-communicate as you can see from this wall of text.

    But as a manager you should try to get to know your employees’ strengths and weaknesses, communication styles, etc., and help them to communicate more effectively with each other. It has helped me to be effective at coordinating people.


  • Sounds like the instructions were unclear so the person implemented all possible interpretations in order to avoid any misinterpretation causing problems. If they were forwarded an email and told to send “this” to someone, I can easily see that being interpreted as the email itself. Especially if this wasn’t the first time your instructions were unclear and they got in trouble for not guessing the right interpretation. Being more clear and saying “the product” instead of just “this” might help or even saying the name of the product. Good communication is about being precise, but brief.

    If people are always having to guess your intentions, then some are going to get it right and some won’t. Some will learn how you think and how to interpret your vague instructions and some won’t. But if you learn better communication skills to be more direct in your instructions and leave fewer things open to interpretation, then there won’t be any need for people to guess your intentions. Remember, no one else has the information in your head, only the information in your communication.




  • I’m not saying it doesn’t count as authentication, it just doesn’t count as authentication to the security of the server directly. That’s the device’s security and configured by the user, not the server. And user devices are very prone to exploits to the point that many law enforcement agencies don’t even bother asking for a password anymore to access a device.

    So, let’s move to a physical model as an example. Let’s say you have a door. It has a very simple door handle lock. You keep your key inside a hotel safe. Sure it might be difficult to get the key if they had to enter the hotel room, cut open the safe in place, and get the key while they’re standing in front of the secure door, exposed. But that’s dumb. They could just as easily grab the safe out of the room and open it later where there’s room for proper equipment, use a known exploit for the particular safe, or use other exploits all out of view of the door/server and at any time until the user realizes you know how to open their safe, because the door/server will never find out. Once that safe is open, you have not just the key to the door, but the key to all locks the user uses since now we only have “something you have” factors and the user uses only one device. Just like when we only had “something you know” factors and the user uses the same password everywhere.

    So what does the passkey help with? It makes the lock and thus the key itself more complex. This makes it so that brute force attacks against the server are more difficult. But it doesn’t solve anything that existing TOTP over text messages didn’t solve, other than some complexity, and it eliminated the password (something you know) factor at the server. Something a lot of companies are already doing and we already know from experience is a bad practice. It has changed the hacking target to the device rather than the person. But still just one target, you don’t need both. Sure it’s better than a really bad password that’s reused everywhere. But it’s not better than a really good password unique to a site that’s only stored in a password manager on the user’s device that requires a separate master password to access (outside of MitM attacks that TOTP mitigates).

    Now, what if we have a door with two locks, one that requires a code, and one that requires you to have access to a device. Now in order to attack the door, you need two factors right at the time you’re standing at the door. Also, there’s probably a camera at the door and someone paid to check it periodically when someone tries too many times, which isn’t the case in the user’s safe/device. So even if you get the key from the user, you still need to brute force the second lock efficiently or you need to implement a second exploit to get the second factor ahead of time. This is the idea of two factors at the server and the current state of things before passkeys.


  • But authentication to access the passkey is on a remote device. So the server doesn’t have any information about if or how authentication was performed for the person to access the key. If they use a 4 digit pin or, worse, the 4 point pattern unlock, it’s easy enough to brute force on most devices.

    This is also why using a password manager is not two factor authentication. It is one factor on your device and one factor on the server. But no one monitors the security logs on the device to detect brute force attacks and invalidate keys. Most don’t even wipe the device if the pin is being brute forced.