name:"Struthless: The Answer Isn't Online Masculinity"
emoji:"📺"
summary:|
If you don't know Struthless (Campbell Walker) yet, he's making some of the best video essays about creativity, life improvement, mindset, and internet culture on YouTube right now. Go check out his stuff.
In this one, he tackles the "radioactive" subject of masculinity. I know what you're thinking. Uh oh. Is he for or against masculinity? Which camp is he in? Watch the video.
name:"Slop is the new name for unwanted AI-generated content"
summary:|
> Watching in real time as “slop” becomes a term of art. the way that “spam” became the term for unwanted emails, “slop” is going in the dictionary as the term for unwanted AI generated content.
name:"Brett Harned: They broke the cookie cutter!"
summary:|
> Essentially, Scrum Masters are corporate dog trainers. Command, control, and structure strengthen the pack and the bottom line. Once they're trained, it's time to move on
I wish more people in the software business understood this. Having permanent, full-time Scrum Masters is an anti-pattern. Their prescence, at least in the long term, is a sign that you don't actually have an empowered agile product team.
> The thing is: none of this is gone. Nothing about the web has changed that prevents us from going back. If anything, it's become a lot easier. _We can return._ Better, yet:we can restore the things we loved about the old web while incorporating the wonderful things that have emerged since, developing even better things as we go forward, and leaving behind some things from the early web days we all too often forget when we put on our rose-colored glasses.
> In the hours following the release of CVE-2024-1086 for the project The Linux kernel, site reliability workers and systems administrators scrambled to desperately rebuild and patch all their systems to fix a vulnerability that allows an attacker with unprivileged command execution to gain read/write access to page tables. This is due to the affected components being written in C, the only programming language where these vulnerabilities regularly happen. "This was a terrible tragedy, but sometimes these things just happen and there's nothing anyone can do to stop them," said programmer King Bud Hodkiewicz, echoing statements expressed by hundreds of thousands of programmers who use the only language where 90% of the world's memory safety vulnerabilities have occurred in the last 50 years, and whose projects are 20 times more likely to have security vulnerabilities.
name:"Pivot to AI: Pay no attention to the man behind the curtain -- by Amy Castor and David Gerard"
summary:|
> The magical claim of machine learning is that if you give the computer data, the computer will work out the relations in the data all by itself. Amazing!
> In practice, everything in machine learning is incredibly hand-tweaked. Before AI can find patterns in data, all that data has to be tagged, and output that might embarrass the company needs to be filtered.
> Commercial AI runs on underpaid workers in English-speaking countries in Africa creating new training data and better responses to queries. It’s a painstaking and laborious process that doesn’t get talked about nearly enough.