I use Claude code hooks to prompt and store memories. It’s taken a lot of iterations mostly on the definition of “significant” events being stored in memory. Indeed, it works very well now but I’m hesitant to start from scratch on some guys tool.
I think demos are going to need reviews here on out. Vibe coded projects look too legit but it’s a waste of time to test the 100 that come out each day
I hear you. I've been slowly building up my own tool (linked above) and keep feeling like someone is going to soon release something that a lot of people will agree should be an independent standard. I'm reluctant to host it with someone else so it needs to be opensource. But then again what I've got is working well for me.
It’s an idea that obfuscates keys a bit, but how are you going to prevent the agent from gaining access to the vault and keys itself? I’ve seen it reverse engineer many things to expose the underlying credentials. I can only think running this on a firewall that the agent can’t access to prevent escalation.
The sandboxed agent and AV should ideally not run on the same host because if it did then you're right that a sufficiently sophisticated agent like Mythos could try to reverse engineer and like find kernel exploits to gain access AV credentials.
For this reason, you'd want to keep the two separate; we have some ideas in the works for that atm but largely still experimental.
Understood. Development was in a private repo, squashed on open-source. I know that makes evaluation harder — we'll publish incremental commits going forward.
You're describing the fake breakup. Where you tell your girlfriend/boyfriend you want a break, then let them talk you back into the relationship. This is just a bad relationship move. Now they don't trust you and you have a needy or untrusting partner now.
I've had 50% pay raises that were nearly matched by the current employer. My last manager literally said the words, "What if we offered you a big bag of money to stay?". I left.
Now I work at a place where people stay literally until the die, 10, 15, 25 year tenures. My coworkers are mediocre. I'd say it's a mixture of laziness and sometimes maybe just incompetence.
It's a two fold problem. Employees that stay this long do not progress in their careers or learn new skills. I've learned next to nothing in my 5 years here. Employers that don't create churn in their workers create numerous problems. If we didn't hold a monopoly in our field, I'm sure we would have been bought out and had mass layoffs by now.
> You're describing the fake breakup. Where you tell your girlfriend/boyfriend you want a break, then let them talk you back into the relationship.
Oh no, you tell them before you start looking that you feel like your TC is too low based on your contribution. You don't threaten to shop around, you just tell them your skillet has value beyond what they're offering.
It goes like this: either they come back with something to make you happy and everybody is satisfied, or they don't and you start applying.
But people don't always give employers this chance and just start applying first. Then when they go to leave things get weird with counter offers.
If you think your job sucks and you're ready to move on, there's no reason to bother with this approach. But if the only reason you're thinking of moving on is to increase your pay, it never hurts to ask first.
Free way to share photos across all your devices. Super great feature when I tuned off iCloud Photos due to costs. I’ll miss it, this won’t push me to shell out for iCloud storage though.
The problem with art is good provenance. NFTs specifically solves this issue. Provenance was a common word used by art collectors describing the issues with Art auctions during NFT.NYC. Noah Davis really opened my eyes to this topic, here's his speech at NFT.NYC https://www.youtube.com/watch?v=HeVZeXsRKhs
It would take a while to explain provenance in crypto space. It's largely based on credibility and ownership of addresses. Once credibility and address is established, it is a simple operation to prove the Bridge picture came from a specific artist. Things like ENS (Ethereum Name Service) are examples of deep support for provenance in Crypto.
reply