Comment SOLR at Etsy.com? (Score 3, Interesting) 302
The folks at Etsy do it to replicate SOLR:
http://codeascraft.etsy.com/2012/01/23/solr-bittorrent-index-replication/
Not sure if that's what you mean.
The folks at Etsy do it to replicate SOLR:
http://codeascraft.etsy.com/2012/01/23/solr-bittorrent-index-replication/
Not sure if that's what you mean.
This move will probably kill a few startups, or at least force them to alter their strategy. There are a few out there who were trying to allow users monetize their private information in some form and give you the opt-in/opt-out ability in a centralized fashion (kind of like the apps settings page in Facebook). They all face the same problem of critical mass for adoption and their problem just got harder. Why would you bother with a www.personal.com (which has a neat app) or anything like that if you're already a google.com account holder in some form (and between gmail, google/android and YouTube, who isn't?) and could get paid in real cash instead of free services. Like the saying goes, If you're not paying for it, the product they're selling is you.
It'll be interesting to see what the next step is in this. What if you could increase your payout by allowing 3rd parties access to your usage profile? Say an advertising agency or consumer research agency? Instead of a virtual wallet it could become your virtual dossier. Link your gym membership and your grocery store loyalty card to your virtual dossier and you have a treasure trove of information that could actually be cashed in on. We currently give that information away for free email or other web services online and for slightly lower shopping prices with the store loyalty cards. This would give you a single entity to deal with who could aggregate and allow you to profit from all of this consumer data. That's the 'hugs and lollipops' vision. The sinister vision (which is probably more likely) is one where companies only target the high profit potential consumers and marginalize everyone else. The have/have-not divide would widen.
Why am I not asleep again?
I know this ship has basically sailed and the conversation has moved on, but wanted to add my $0.02 to the mix. First off, I'm basically a dilbertonian Pointy-Haired-Boss. I'm also not going to get into the issue that you used your insider knowledge to custom taylor a statement of work to present to me. I have engineers who write stuff in their own time, like you have done. Most of the time it pisses me off. Not because they took the initiative, not because they wrote it in Ruby when we're a java shop, but because it didn't align with my priorities. I'd be angry at myself, because that means I wasn't clear what the priorities are. I'd be angry at the individual because they weren't listening and/or didn't come and ask for clarification if they didn't understand. So my questions to you would be: When your boss gets his ass chewed, is it because his team isn't efficient and streamlined? Has he ever mentioned your team spends too much time on process and workflow and not enough time "their respective punch lists" as you state? Does your tool leverage languages and software packages that you already have in house (care and feeding after your gone)?
For me, unless you're solving a problem that I have stated as a problem or in some way eluded to I'd say, no thanks, you're fired. Of all the holes in the leaking IT Bucket, is the one you plugged the same one your boss would plug?
Why bother mucking with the real source tree? Just make a clone on your mozilla.org-impostor site with an update that has all the appropriate back doors in it.
Just deliver a DNS spoof/change (like dns cache poison, etc) via another exploit, get the browser to self-update (and clean up your previous exploit tracks) and then sit back and wait to spring your trap. The only code change you need to insert at first is to get future updates from the impostor site.
Later on you can 'update' the browser to proxy all $MONEY web traffic through you and your proxy farm. You could even add a new trusted CA to your code base to make it all the more convincing and to cover tracks from the 'imposter-mozilla.org' cert in case it's discovered and revoked.
I get up each morning, gather my wits.
Pick up the paper, read the obits.
If I'm not there I know I'm not dead.
So I eat a good breakfast and go back to bed.
Oh, how do I know my youth is all spent?
My get-up-and-go has got-up-and-went.
But in spite of it all, I'm able to grin,
And think of the places my get-up has been.
-- Pete Seeger
If practice makes perfect, and nobody's perfect, why practice?
God grant me the senility to accept the things I cannot change,
The frustration to try to change things I cannot affect,
and the wisdom to tell the difference.
> When there isn't sufficient virtual memory, the compiler bails out,
> giving an internal error message. When I kill some processes, the
> error goes away.
And what is the compiler supposed to do instead? Go shopping for you
and buy more memory?
-- Falk Hueffner, on the GNU C++ compiler
"Pseudocode can be used to some extent to aid the maintenance
process. However, pseudocode that is highly detailed -
approaching the level of detail of the code itself - is not of
much use as maintenance documentation. Such detailed
documentation has to be maintained almost as much as the code,
thus doubling the maintenance burden. Furthermore, since such
voluminous pseudocode is too distracting to be kept in the
listing itself, it must be kept in a separate folder. T
THE LESSER-KNOWN PROGRAMMING LANGUAGES #8: LAIDBACK
This language was developed at the Marin County Center for T'ai Chi,
Mellowness and Computer Programming (now defunct), as an alternative to
the more intense atmosphere in nearby Silicon Valley.
The center was ideal for programmers who liked to soak in hot tubs
while they worked. Unfortunately few programmers could survive there
because the center outlawed Pizza and Coca-Cola in favor of Tofu and
Perrier.
taken from a web page:
I particularly like:
I've learned to not sweat the petty things, and not pet the sweaty things.
http://www.frontiernet.net/~jlbeam/specials/life/life.htm
some kind of chain letter my dad forwarded me...
As I've Matured...
I've learned that you cannot make someone love you. All you can do is
stalk them and hope they panic and give in...
I've learned that one good turn gets most of the blankets.
unzip ; strip ; touch ; grep ; finger ; mount ; fsck ; more ; yes ; umount ; sleep
I forgot how dirty unix is...
I do hate sums. There is no greater mistake than to call arithmetic an exact science. There are permutations and aberrations discernible to minds entirely noble like mine; subtle variations which ordinary accountants fail to discover; hidden laws of number which it requires a mind like mine to perceive. For instance, if you add a sum from the bottom up, and then again from the top down, the result is always different.
A Severe Strain on the Credulity
An engineer is someone who does list processing in FORTRAN.