As someone who previously led development of a commercial VPN system, I assure you, there are about 100 ways for a VPN to go slower than the network hosting it. Unfortunately.
Two cases I can think of are MTU misconfigurations and constrained CPU on either endpoint, where the node CPU can handle non-VPN network demands but can't handle the VPN demand.
> The rapid growth of revenue of AI model companies, OpenAI, Anthropic, etc.
You can't use growth of AI companies as evidence to refute the article. The premise is that it's a bubble. The growth IS the bubble, according to the claim.
> I don't know why the author of TFA claims that he can't make a bunch of one-off apps
I agree... One-off apps seem like a place where AI can do OK. Not that I care about it. I want AI that can build and maintain my enterprise B2B app just as well as I can in a fraction of the time, and that's not what has been delivered.
Bubbles are born out of evaluations, not revenue. Web3 was a bubble because the money its made wasn't real productivity, but hype cycles, pyramid schemes, etc. AI companies are merely selling API calls, there is no financial scheming, it is very simply that the product is worth what it is being sold for.
> I want AI that can build and maintain my enterprise B2B app just as well as I can in a fraction of the time, and that's not what has been delivered.
AI isn't at that level yet but it is making fast strides in subsets of it. I can't imagine systems of models and the models themselves won't reach there in a couple years given how bad AI coding tools were just a couple years ago.
With regards to wrapping your head around heat loss- this winter some work was done on our property while there was snow on the ground. A bunch of snow got covered in dirt. In the spring, maybe three weeks after all the snow on the ground had melted, I moved the pile and was surprised to find all the snow still frozen. It had been under maybe 18 inches of dirt. I was pretty surprised to see it.
Their own tools would need the various API keys, of course, and they did build a method to filter out those variables and managed most user code through it, but it sounds like they forgot to put Rubocop through the special method.
So this researcher may have gotten lucky in choosing to dig into the tool that CodeRabbit got unlucky in forgetting.
It sounds like a pretty bad approach in general to have to "filter out the bad stuff" on a case-by-case basis. It should be as simple as launching everything from a sanitized parent environment, and making it impossible to launch any tool otherwise. Or better, make that sanitized environment the default and make privileged operations be the thing that jumps through hoops to talk to a bastion/enclave/whatever that holds the actual keys.
Yes although somewhere there will be an `if` statement to determine if the process being started should get the complete environment or a key to get the other keys or whatever. Best to make that `if` at the highest level of the architecture as possible and wrapped in something that makes it obvious, like a `DangerousUserCodeProcess` class.
The only other safety I can think of is a whitelist, perhaps of file pathnames. This helps to maintain a safe-by-default posture. Taking it further, the whitelist could be specified in config and require change approval from a second team.
As a teenager I did about 4.5 minutes, as I recall, in a bucket of water. I played the trumpet quite a bit at the time, so I think my capacity was above average. It was a competition and I got first, and the second place fellow was also a trumpet player.
All three of us trumpet players in my middle school band would sit in the back and have breath holding contests while the director was working with other sections or whatever.
In middle school, I was a swimmer on two teams and played trombone. We had a fun little “who can play the longest note” contest…everyone thought I cheated because I lasted about 30 seconds longer than anyone else. Really wasn’t that hard once you find the right position to use minimal air output, since the game wasn’t who could hold the same note, but any note. We regularly trained on the swim team to go as far as possible underwater in an Olympic pool — record on our team was 4 or 5 round-trips if I recall correctly (can’t remember 100%…long ago…but that kid was crazy in both speed and time underwater).
Pretty demoralizing to be labeled a cheater after such hard work expanding lung capacity and efficiency. After that, I wouldn’t even try anymore just so I wouldn’t be called a cheater again. Quit band the next year.
It should given that it works with trumpet (and even voice). I remember listening to some jazz piece on the radio where the DJ, before the song, alerted listeners to the long note that was being held and suggested trying holding your breath for the length of the note (but not—he warned—if you were driving).
It would, which was exactly what I was accused of but wasn’t something I knew how to do…even to this day. I have an idea of the mechanics, I just lack the ability because it has never been something I’ve practiced or developed.
I too just yesterday had my first positive experience with Claude writing code in my project. I used plan mode for the first time and gave it the "think harder" shove. It was a straightforward improvement but not trivial. The spec wasn't even very detailed- I mentioned a couple specific classes and the behaviour to change, and it wrote the code I would have expected to write, with even a bit more safety checking than I would have done.
14 years of experience in startup software development and DevOps across web apps, cloud, and Linux networking. Six years of leadership in teams of up to 7 people.
Looking for an engineering manager or senior IC position to mentor your team and make something people want.
Here are a sample of my accomplishments:
* Built a platform for hosting web apps using Kubernetes at a major cloud provider and taught engineers to operate and improve it. Introduced Terraform, Helm, and incident management processes.
* Led a B2B SaaS company through their first SOC 2 Type II audit.
* Published and maintained the community Apt package for Helm, the Kubernetes package manager, which is downloaded more than 200,000 times per month.
* Trained a team of developers in software patterns, communication, and prioritizing work, leading to a 72% increase in velocity in two months.
* Improved performance of a proprietary VPN by adopting Cython, permitting use of C functions in Python, resulting in a 2.5x increase in network throughput when limited by CPU.
14 years of experience in startup software development and DevOps across web apps, cloud, and Linux networking. Six years of leadership in teams of up to 7 people.
Looking for an engineering manager or senior IC position to mentor your team and make something people want.
Here are a sample of my accomplishments:
* Built a platform for hosting web apps using Kubernetes at a major cloud provider and taught engineers to operate and improve it. Introduced Terraform, Helm, and incident management processes.
* Led a B2B SaaS company through their first SOC 2 Type II audit.
* Published and maintained the community Apt package for Helm, the Kubernetes package manager, which is downloaded more than 200,000 times per month.
* Trained a team of developers in software patterns, communication, and prioritizing work, leading to a 72% increase in velocity in two months.
* Improved performance of a proprietary VPN by adopting Cython, permitting use of C functions in Python, resulting in a 2.5x increase in network throughput when limited by CPU.
14 years of experience in startup software development and DevOps across web apps, cloud, and Linux networking. Six years of leadership in teams of up to 7 people.
Looking for an engineering manager or senior IC position to mentor your team and make something people want.
Here are a sample of my accomplishments:
* Built a platform for hosting web apps using Kubernetes at a major cloud provider and taught engineers to operate and improve it. Introduced Terraform, Helm, and incident management processes.
* Led a B2B SaaS company through their first SOC 2 Type II audit.
* Published and maintained the community Apt package for Helm, the Kubernetes package manager, which is downloaded more than 200,000 times per month.
* Trained a team of developers in software patterns, communication, and prioritizing work, leading to a 72% increase in velocity in two months.
* Improved performance of a proprietary VPN by adopting Cython, permitting use of C functions in Python, resulting in a 2.5x increase in network throughput when limited by CPU.
Hey, The_Fox - how difficult is it to land a decent IT / dev job in the Okanagan valley? I've got family there and we have been considering to relocate there but from a distance it's always looked to me like most everything is actually down in Vancouver?
Two cases I can think of are MTU misconfigurations and constrained CPU on either endpoint, where the node CPU can handle non-VPN network demands but can't handle the VPN demand.