bzbz's comments

bzbz | 2 years ago | on: How big is YouTube?

For anyone who's wondering, their estimation method works like so:

1. Assume a range of values

2. Assume a fair probability function for sampling over the range of values

The estimated size is the %-of-hits * the total range of values.

bzbz | 2 years ago | on: Weak-to-Strong Generalization

In your example, the amino acids order is sufficient to directly model the result: the sequence of amino acids can directly generate the protein, which is either valid or invalid. All variables are provided within the data.

In the original example, we are testing weather using the previous day’s weather. We may be able to model using whatever correlation exists between the data. This is not the same as accurately predicting results, if the real-world weather function is determined by the weather of surrounding locations, time of year, and moon phase. If our model does not have this data, and it is essential to model the result, how can you accurately model?

In other words: “Garbage in, garbage out”. Good luck modeling an n-th degree polynomial function, given a fraction of the variables to train on.

bzbz | 2 years ago | on: Biscuit authorization

So sign your UUIDs and combine them into “$UUID:$HASH” strings for the same benefit. Or a more structured JWT-like payload that still verifies auth against the DB (as opposed to carrying authorization within the token).

No need to reinvision the rest of the auth flow if you just want to add hashing to reduce DB load.

bzbz | 2 years ago | on: The Ambassador Pattern

If anything, an obfuscated microservice-based application is easier to understand than a monolithic version: network data transfer is easier for observers to understand than memory modification.

bzbz | 2 years ago | on: The Ambassador Pattern

> An ambassador service can be thought of as an out-of-process proxy that is co-located with the client.

> This pattern can be useful for offloading common client connectivity tasks such as monitoring, logging, routing, security (such as TLS), and resiliency patterns in a language agnostic way. It is often used with legacy applications, or other applications that are difficult to modify, in order to extend their networking capabilities. It can also enable a specialized team to implement those features.

Not surprised this is a Microsoft page, given their legacy of long lifetime support for their software products.

It’s not for microservices, but rather for software maintenance of systems that other vendors would consider past EOL.

bzbz | 2 years ago | on: Privacy is priceless, but Signal is expensive

This number includes taxes, benefits, etc, not just raw salary.

Notably Signal employees do not get equity, so the salary must be higher to remain competitive.

Signal is probably the hardest class of product to build. Name an optimization/distributed systems problem, they probably have it. And quite literally, a Signal bug could jeopardize an activist/journalist’s life.

So for a <$200k salary and no equity, how many world-class engineers do you think you could hire?

I simply wouldn’t trust the product, if it had mediocre engineers.

bzbz | 2 years ago | on: Tell HN: LinkedIn has one of the worst dark patterns I have seen on the web

I think you may be misinterpreting it. Was there an option to log into another account after you clicked “Sign out and Remember”?

Being able to switch between two accounts seems useful in the context of:

1. A recruiter signing out in order to sign into the profile of their CEO/Eng Director to send recruiting messages on their behalf.

2. A marketing person signing out in order to sign in to the company account.

bzbz | 2 years ago | on: Google changed ad auctions, raising prices 15%, witness says

“Google gave the second-place bidder a built-in handicap to make their offer more competitive” is the tamest way of phrasing it, given that the “handicap”’s only effect is to cost the first-place bidder more money.

It never helps the second-place bidder. I’d argue “handicap” is deceitful.

bzbz | 2 years ago | on: How we manage 200 open-source repos

I was skeptical when the author implied automation was the solution.

But actually, the given solutions are mostly communication-focused, and the automation is to aid in that.

Good read.

bzbz | 5 years ago | on: I am an 80 column purist

> Maybe in context of old C, but in java you have two nestings just for being in class method. So as a general point, it does not stand anyway.

In reference to your above point. You’re saying modern Java makes you start out at 2 levels of indentation. I’m saying your modern monitor’s width compensates.

bzbz | 5 years ago | on: I am an 80 column purist

And screens are bigger than they used to be, so you conveniently have more tabs to make up for it. I think it evens out

bzbz | 5 years ago | on: Salesforce is in talks to buy Slack

Is this really a problem? Async/await makes async simple, and using a store like zustand gives you hooks and [g/s]etters out of the box.
page 1