• 2 Posts
  • 97 Comments
Joined 1 year ago
cake
Cake day: July 13th, 2023

help-circle


  • Basically because every time this happens the burden of debt is passed towards the tax payers. They just built a long toll lane in my city in what was a 2 lane highway. Adding another lane or two would have alleviated traffic immensely. The company that built it owns all profits for approx 50 years. What could have been a 5 lane highway is still two except now you have the option of paying a ridiculous amount of money to not have to deal with the traffic. This is money that could have been spent on improving the city’s other methods of transportation, trains, bicycles, etc.

    It doesn’t affect me personally. I ride a motorcycle every day. It’s just painful to see how private interests are almost never in line with what’s best for constituents


  • As a data center engineer of 10+ years, I struggled to understand this at first. In my world, the hardware does a POST before the OS boots and has an inventory of what hardware components are available, so it shouldn’t matter in what order they are discovered, since the interface names should make a correlation between the interface and the pcie slot that NIC exists in.

    Where the water gets muddled is in virtualized servers. The NICs no longer have a correlation to a specific hardware component, and you may need to configure different interfaces in the virtualized OS for different networks. I think in trying to create a methodology that is agnostic to bare metal/virtualized OSs, it was decided that the naming convention should be uniform.

    Probably seems like bloat to the average admin who is unconcerned with whether these NICs are physical or virtual, they just want to configure their server.



  • Yeah you’re obviously beyond reason and we’re speaking across different levels of intellect here. Bringing up NOCs shows you’re entry level, despite how many years of experience you have. Find my phone is a network because the phone which has cellular capabilities reports that to Apple/Google.

    It wasn’t my intention to start a dick measuring contest here but since it’s on the table, im a six figure(deep into six figures) engineer at a fortune 10 company. Your 25+ years of CompTIA A+ experience mean nothing to me. You’re talking to a CCIE.

    No one with any amount of intellect would call something communicating at layer two a “network”, though anything that transfers data between two devices can technically be called a network, “networking” is being able to communicate with OTHER networks.


  • Brother, I’m a 10+ year network engineer… Bluetooth is a low power, low speed, short range(30 feet) technology. The power of Bluetooth signals are over 1000x weaker than what cellphones use to connect to cell towers. There isn’t going to be any sophisticated “networking” happening between airtags. Your original post was almost gibberish, I had to struggle to arrive at the point you’re trying to make. You can call it a network if you want but you’re asking if it could be practical as a standalone, autonomous network and the answer is no. They lack the capability to communicate over any meaningful distance. Not much “networking” capability if it can’t talk to other networks. Others have struggled to talk sense into you so I won’t waste anymore of my time. Though I’d suggest that if you’re going to argue against logic then you should be more open to reason.


  • I think you need to take the thought of “network” completely out of your mind. This protocol is specifically regarding devices such as air tags, which don’t have any network capability themselves but rely on “connecting” to Bluetooth of the manufacturers models. The phones themselves are what gives tracking information back, based on GPS of the phone that was in proximity of the tracker.

    The question that Google/Apple have is, how can we make sure people aren’t unknowingly being tracked by someone putting a physical tracker in say, your car. THAT’S the “protocol” part. A protocol is just an agreement on how a technology is going to be implemented. If your own tracker is following you that’s fine, the MAC address will keep changing. If someone else’s air tag is following you, your phone will know this tracker has been near you for some time, and will tell you.



  • Zebras are scary AF man. They will bite you and are very food aggressive. I went through one of these petting drive through zoos years ago, they have signs posted that say not to feed the zebras… After feeding cows, bulls, horses, ostriches(which were scariest) I forgot to be cautious with the zebra. I tried to feed one and it bit down on my hand extremely hard. All the other animals were super chill and they grab the food with their lips/tongue but zebras seem to not be able to restrain themselves. They’re crazy



  • I came across this early in my career in networking. I ended up having to support another technicians customer(we primarily managed our own workloads) and he did not use the tools(vault) we had to manage the network equipment credentials, so I always had to call him and ask him what the password is and why he doesn’t update it in the vault(it frequently changed) … After bothering him enough about it he said it was job security.

    This was a 45k entry level job that he was years into. Why someone would want job security at the bottom part of the totem pole is beyond me, but that is where I mostly came across tribalistic tendencies(I worked in a lot of small/medium sized companies before getting a big break)

    If I look up those people on LinkedIn, they’re exactly where they were or in another lateral position. They don’t tend to make it very far.



  • Not trying to start an argument here but you sound very far removed from individual contributors, so maybe from your point of view it would simply look like adding it to a pile. More important than adding it to a pile is to make sure there’s systems in place to make sure OSs are patched. You wouldn’t be complaining to the IT/sysadmin guy about your servers’ vulnerability or patching schedules, you’d be talking to your cybersec department who’d have oversight. And if there’s a breach and your only defense is “I added it to the IT guys pile”, 100% you are getting fired as well.





  • I’m not going to argue conjecture. I have over $10,000 in audio equipment and like I already said I play many instruments, so you’re not even picking someone good to make generalizations about. Bluetooth codecs are always going to be subpar, but they’re probably how most people listen to streaming services most of the time. Anything that is streaming from a PC except Bluetooth is a notable difference.

    I just checked the headphones I’m wearing again, they’re actually using aptx lossless with a bitrate of 1200kbps. The point is that Deezer offers the same services for less money and higher quality audio streaming.

    Apparently, when Spotify does roll out hifi, it will probably be a higher paid tier. Until then, for me, Deezer is the far superior service.


  • Not really. It’s noticeable over Bluetooth as well, if your device supports codecs with a high enough bitrate. Obviously Bluetooth is still lossy, but listening experience is way better. The headphones I’m wearing now use aptxHD, with a bitrate of 576kbps. Spotify only offers AAC, with a bitrate of 256kbps.

    As far as who can appreciate the difference, I guess? But you don’t need to be a concert pianist to appreciate audio. That said, I play many instruments, so maybe I’m biased.