Posted inInformation Technology / Raspberry Pi / Thank You Sir May I Have Another

How Far We’ve Come – Pt. 9

I will begin this post by informing you not everything works yet. I’m including this post in the series because learning how to un-screw stuff is almost as important as learning how to do it right. In fact, it is probably more important. Configuring build environments has got to be my least favorite thing to do. As a consultant I typically don’t join a project until after someone else has already done that and created … How Far We’ve Come – Pt. 9Read more

Posted inExperience / Information Technology / Thank You Sir May I Have Another

Script Kiddies and the Catastrophes They Cause

This is yet another installment of “Move Quickly and Turn Worthless Shit Into Production.” When you come up through real software development, not this worthless script kiddie shit being touted as great, but real software development, you understand there is a method to the madness. You have to do all of that documentation up front so there are procedures and rules in place the QA team can use to verify everything using tests which do … Script Kiddies and the Catastrophes They CauseRead more

Posted inExperience / Information Technology / Thank You Sir May I Have Another

The getkey Trap

This topic came up on my Jed mailing list the other day and, once again, I got in touch with my inner Bill. Your inner Bill? Yes, that cranky old man who isn’t putting up with the world around him and wants it to be his way. The older you get the easier it is to find your “inner Bill.” In this case it fits because I have lived this death at least a hundred … The getkey TrapRead more

Posted inInformation Technology / Thank You Sir May I Have Another

How OpenSource Bugs are -fixed-

      These 3 “solutions” are what typically “fix” all OpenSource bugs. Close without testing because “code has changed too much.” Declare it an “upstream” bug so you get credit for the close without actually doing anything. Let it rot until the version it was logged against is “no longer supported” and tell the user to retest against a currently supported code base.

Posted inExperience / Information Technology / Investing / Thank You Sir May I Have Another

The Gender Fluid IT Crisis

Most everyone reading this is familiar with the Y2K crisis where lots of computer systems simply weren’t going to work after December 31, 1999. Many conspiracy theorists believe it was a scam to earn more money and that there never was a crisis. The theorists are wrong. IT workers put in millions and millions of hours fixing things incompetent management was too greedy to fix. They were all too busy laying off workers they needed … The Gender Fluid IT CrisisRead more