Links
Generative AI is not going to build your engineering team for you
Charity Majors1 has a good, long-form article on the Stack Overflow blog. The title is misleading as, while AI’s impact on software engineering and its hiring process (spoiler: you’ll still want to hire junior engineers) is at the heart of the article, there’s so much more in it. It gets exciting in the second part, where she dispenses much from-the-trenches advice on team management and building. Hiring engineers is about composing teams. The smallest unit of software ownership is not the individual, it’s the team. ...
Experts vs. imitators
I love this concise checklist on detecting fake experts, with which my experience wholeheartedly agrees. The first one: Imitators can’t answer questions at a deeper level. Specific knowledge is earned, not learned, so imitators don’t fully understand the ideas they’re talking about. Their knowledge is shallow. As a result, when you ask about details, first principles, or nonstandard cases, they don’t have good answers. For more advice, see the original post. ...
What Open AI just did
Open AI just released ChatGPT 4o. The launch demo is available on YouTube, and yes, it is impressive. They did not launch v5, though, and 4o is only incremental, not exponential, as v4 has been compared to its predecessor. It may mean we’re at the end of the “exponential growth” phase of LLM models. However, the most critical aspect of this release is not technical, as Ethan Mollick correctly pinpoints in his timely What Open AI Did post: ...
Tor: from the Dark Web to the Future of Privacy
This one looks like a promising read: Tor, one of the most important and misunderstood technologies of the digital age, is best known as the infrastructure underpinning the so-called Dark Web. But the real “dark web,” when it comes to Tor, is the hidden history brought to light in this book: where this complex and contested infrastructure came from, why it exists, and how it connects with global power in intricate and intimate ways. In Tor: From the Dark Web to the Future of Privacy,Ben Collier has written, in essence, a biography of Tor—a cultural and technological history of power, privacy, politics, and empire in the deepest reaches of the internet. ...
Redis is forked
Vicki Boykis has a good piece on Redis’s recent vicissitudes. At the same time, she recaps where we stand and sings the praises of a project that many are fond of, and not just for its technical worth. I, like many developers who have worked on high-scale, low-latency web services over the last fifteen years, have an intimate relationship with Redis. At any new job, when you ask where the data is, and someone points you to a server address with port 6379, you know you will meet an good, reliable friend there. ...
AI isn't useless. But is it worth it?
Molly White’s experience with LLMs corresponds more or less with my own, but she is much better at recounting, critiquing, and drawing conclusions than I am. I find my feelings about AI are actually pretty similar to my feelings about blockchains: they do a poor job of much of what people try to do with them, they can’t do the things their creators claim they one day might, and many of the things they are well suited to do may not be altogether that beneficial. And while I do think that AI tools are more broadly useful than blockchains, they also come with similarly monstrous costs. ...
Timeline of the XZ open source attack
The so-called “XZ attack” is all over the internet these days, and for good reason. Over a period of over two years, an attacker using the name “Jia Tan” worked as a diligent, effective contributor to the xz compression library, eventually being granted commit access and maintainership. Using that access, they installed a very subtle, carefully hidden backdoor into liblzma, a part of xz that also happens to be a dependency of OpenSSH sshd on Debian, Ubuntu, Fedora, and other systemd-based Linux systems. That backdoor watches for the attacker sending hidden commands at the start of an SSH session, giving the attacker the ability to run an arbitrary command on the target system without logging in: unauthenticated, targeted remote code execution. ...
William Adams: english advisor to the Shogun
I am not a fan of TV series. However, I have been following the Shogun miniseries with a fair amount of interest, mainly because I am intrigued by the setting and historical period covered. As is always the case with modern TV series, it started very well (the first two to three episodes). Then it slowed down, getting stuck in the main characters’ fanciful and improbable personal affairs and agendas, straying from the main plot, essentially muddling along until, I assume, the last episode of the season that will end with a bang. ...
Cannibalism as a way to honor the dead
As it appears, cannibalism was much more widespread than previously thought, and perhaps for more complex reasons than we think. To honor the dead, for example. Our ancestors have been eating each other for a million years or more. In fact, it seems that, down the ages, around a fifth of societies have practised cannibalism. While some of this people-eating may have been done simply to survive, in many cases, the reasons look more complex. In places like Gough’s cave, for example, consuming the bodies of the dead seems to have been part of a funerary ritual. Far from a monstrous affront to nature, cannibalism may be a way of showing respect and love for the dead, say some archaeologists. ...