<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[SocraticDev's blog rss feed]]></title><description><![CDATA[Talking about Technology, Philosophy and everything interesting]]></description><link>https://en.socratic.dev</link><generator>GatsbyJS</generator><lastBuildDate>Sun, 29 Mar 2026 01:22:06 GMT</lastBuildDate><item><title><![CDATA[Using a Cryptographic Chain of Trust to Ensure Accountability for Script Authors and Software Running in the Enterprise]]></title><description><![CDATA[Let's be honest—who hasn't run a script without fully understanding what it does or the risks involved? Developers and tech enthusiasts hate…]]></description><link>https://en.socratic.dev/using-a-cryptographic-chain-of-trust-to-ensure-accountability-for-script-authors-and-software-running-in-the-enterprise</link><guid isPermaLink="false">https://en.socratic.dev/using-a-cryptographic-chain-of-trust-to-ensure-accountability-for-script-authors-and-software-running-in-the-enterprise</guid><pubDate>Sat, 28 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Let&apos;s be honest—who hasn&apos;t run a script without fully understanding what it does or the risks involved?&lt;/p&gt;
&lt;p&gt;Developers and tech enthusiasts hate having their hands tied by licensing restrictions or insufficient permissions to get their work done. Whether at home or working with an informal team, we bypass these obstacles by managing our own servers.&lt;/p&gt;
&lt;p&gt;We want to move fast.&lt;/p&gt;
&lt;p&gt;It&apos;s not that we don&apos;t care about security. We&apos;re just doing a cost-benefit analysis on the risks. Especially with cloud infrastructure. If we no longer trust a server, we can delete it with a click and spin up a new one in minutes.&lt;/p&gt;
&lt;p&gt;Things get much more serious when we&apos;re talking about computers in large organizations like schools, hospitals, banks, or government agencies. These corporate machines need strong protection because a carelessly executed script could open the door to malicious actors:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ransomware&lt;/li&gt;
&lt;li&gt;Corporate espionage&lt;/li&gt;
&lt;li&gt;Identity theft&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Since the majority of computers in large organizations run Windows, that operating system naturally becomes a prime attack vector.&lt;/p&gt;
&lt;h3&gt;Set-ExecutionPolicy&lt;/h3&gt;
&lt;p&gt;Windows comes with PowerShell—a powerful automation and configuration solution that combines a command-line interpreter with a scripting language running on the robust .NET runtime.&lt;/p&gt;
&lt;p&gt;Good system administrators block PowerShell script execution across their entire computer fleet unless those scripts are signed by their authors.&lt;/p&gt;
&lt;p&gt;But does a signed script automatically mean it&apos;s secure?&lt;/p&gt;
&lt;p&gt;In a corporate environment, IT resource usage is balanced between two competing needs:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Giving employees the tools and freedom they need to do their work&lt;/li&gt;
&lt;li&gt;Protecting the organization from misuse of its resources that could harm it&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;There are many legitimate reasons for PowerShell scripts to run on employee computers. And here&apos;s what might surprise you from a security standpoint: the key isn&apos;t so much validating that scripts don&apos;t contain malware, but rather verifying the identity of the people who wrote them.&lt;/p&gt;
&lt;p&gt;We&apos;re talking about a &quot;chain of trust.&quot; In a fast-moving world where most interactions happen digitally, it&apos;s essential to verify who you&apos;re dealing with. And honestly, it&apos;s trickier than it sounds. Imagine you&apos;ve been job hunting for a while and a recruiter contacts you about a position at a well-known company. How do you know this recruiter actually works there? How can you verify you&apos;re sharing personal information with a legitimate company representative instead of a scammer? Picture the disaster of handing over your banking details, social security number, or even deciding to relocate for a fictional job!&lt;/p&gt;
&lt;p&gt;In the Microsoft world, the challenge of reliably identifying the source of software products is solved by an integrated asymmetric cryptography solution. The &lt;em&gt;Authenticode&lt;/em&gt; tool, and now the managed service &lt;a href=&quot;https://azure.microsoft.com/en-us/products/artifact-signing&quot;&gt;Azure Artifact Signing&lt;/a&gt;, offers an exceptionally user-friendly code signing service. Best of all, end users don&apos;t need to do anything to validate these signatures.&lt;/p&gt;
&lt;p&gt;Microsoft Azure, through the managed service Azure Artifact Signing, orchestrates the steps for creating a chain of trust:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Azure validates the script creator&apos;s identity by requesting specific information like a company identifier (tax number, DUNS number, etc.) and proof of identity&lt;/li&gt;
&lt;li&gt;Azure generates a certificate tied to the company&apos;s identity&lt;/li&gt;
&lt;li&gt;The developer signs their script with this certificate and distributes it to internal or external partners&lt;/li&gt;
&lt;li&gt;Any Windows machine can see this signature and trace the chain of trust back to the legally accountable organization that created it.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Accountability is what this signature guarantees.&lt;/p&gt;
&lt;p&gt;And that&apos;s why, beyond just being convenient, it&apos;s genuinely valuable in an enterprise:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;No special import needed&lt;/strong&gt; — trusted right out of the box on all Windows machines&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Fully auditable&lt;/strong&gt; — security teams can see exactly who signed what and when&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Revocable&lt;/strong&gt; — if a certificate is compromised, Microsoft can revoke it and all scripts signed with it immediately become untrusted&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Tamper-proof&lt;/strong&gt; — timestamping proves when the script was signed, even after the certificate expires&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;pre&gt;&lt;code&gt;┌─────────────────────────────────────────────────────────────────────────────┐
│                            AUTHOR PHASE                                     │
├─────────────────────────────────────────────────────────────────────────────┤
│                                                                             │
│  ┌──────────────────┐          ┌──────────────────┐      ┌───────────────┐  │
│  │ Script Author    │          │Digital Signature │      │  .ps1 File    │  │
│  │                  │          │                  │      │               │  │
│  │ Creates .ps1     │─────────▶│ Sign with        │─────▶│ Script body + │  │
│  │ Holds private    │  Script  │ private key      │      │ Signature     │  │
│  │ key/ use managed |          │ (SHA256 hash)    │      │ block         │  │
│  │ service          │   Key    │                  │      │               │  │
│  └──────────────────┘          └──────────────────┘      └───────────────┘  │
│                                                                             │
│  ┌──────────────────┐                                                       │
│  │ Code Signing     │◀─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─           │
│  │ Certificate      │  (Includes cert details in signature block)           │
│  │                  │                                                       │
│  │ Public key       │                                                       │
│  │ embedded in sig  │                                                       │
│  └──────────────────┘                                                       │
│                                                                             │
└─────────────────────────────────────────────────────────────────────────────┘
                                      │
                                      │
                                      ▼
                        ┌──────────────────────┐
                        │  DISTRIBUTION PHASE  │
                        │                      │
                        │ Share via email,     │
                        │ repo, or network     │
                        └──────────────────────┘
                                      │
                                      │
                                      ▼
┌─────────────────────────────────────────────────────────────────────────────┐
│                          EMPLOYEE/EXECUTOR PHASE                            │
├─────────────────────────────────────────────────────────────────────────────┤
│                                                                             │
│  ┌──────────────────┐    PowerShell Validation    ┌──────────────────────┐  │
│  │ Employee         │────────────────────────────▶│ Signature Check      │  │
│  │                  │                             │                      │  │
│  │ Receives script  │                             │ 1. Hash script       │  │
│  │ file             │                             │ 2. Decrypt with      │  │
│  │                  │                             │    public key        │  │
│  └──────────────────┘                             └──────────────────────┘  │
│                                                            │                │
│  ┌──────────────────┐                                      │                │
│  │ Root CA Trust    │◀─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ─ ┘      |                │
│  │ Store            │  (Verify cert chain &amp;#x26; revocation)    |                │
│  │                  │                                      |                │
│  │ Verify cert      │                                      |                │
│  │ chain validity   │                                      |                │
│  └──────────────────┘                                      |                │
│                                                            │                │
│                                                            ▼                │
│                                                  ┌──────────────────┐       │
│                                                  │ Signature Valid? │       │
│                                                  └──────────────────┘       │
│                                                            │                │
│                                      ┌─────────────────────┘                │
│                                      │                                      │
│                            YES       │                NO                    │
│                                      ▼                                      │
│                         ┌──────────────────────┐   ┌──────────────────┐     │
│                         │ Execute Script       │   │ Reject/Warn      │     │
│                         │ ✓ Trusted author     │   │ Script blocked   │     │
│                         │ ✓ Not modified       │   │ Not executed     │     │
│                         └──────────────────────┘   └──────────────────┘     │
│                                                                             │
└─────────────────────────────────────────────────────────────────────────────┘
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;&lt;code&gt;translated from french by AI -- Claude Haiku 4.5&lt;/code&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Aerial Curiosity]]></title><description><![CDATA[A glass of champagne in hand. Sunk deep into a plush airplane seat. You start to think you’ve finally got it all figured out. On board a…]]></description><link>https://en.socratic.dev/aerial-curiosity</link><guid isPermaLink="false">https://en.socratic.dev/aerial-curiosity</guid><pubDate>Tue, 24 Mar 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;A glass of champagne in hand. Sunk deep into a plush airplane seat. You start to think you’ve finally got it all figured out.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;On board a private business jet&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;YOUNGER EXEC: Q3 was even better than Q2.&lt;/p&gt;
&lt;p&gt;OLDER EXEC: Yeah.&lt;/p&gt;
&lt;p&gt;YE: Our strategy paid off.&lt;/p&gt;
&lt;p&gt;OE: (amused) What strategy?&lt;/p&gt;
&lt;p&gt;YE: Well...&lt;/p&gt;
&lt;p&gt;OE: Doing what everyone else does, maybe that’s a strategy.&lt;/p&gt;
&lt;p&gt;YE: You’re cynical.&lt;/p&gt;
&lt;p&gt;OE: (silence)&lt;/p&gt;
&lt;p&gt;YE: There’s someone down there.&lt;/p&gt;
&lt;p&gt;OE: Where?&lt;/p&gt;
&lt;p&gt;YE: Down there.&lt;/p&gt;
&lt;p&gt;OE: Yeah.&lt;/p&gt;
&lt;p&gt;YE: What’s he doing?&lt;/p&gt;
&lt;p&gt;OE: Minding his own business.&lt;/p&gt;
&lt;p&gt;YE: He probably doesn’t even have internet.&lt;/p&gt;
&lt;p&gt;OE: Probably not.&lt;/p&gt;
&lt;p&gt;YE: You’re making fun of me. Anyway, I bet he doesn’t have electricity, running water, a car, or even a grocery store.&lt;/p&gt;
&lt;p&gt;OE: Yeah.&lt;/p&gt;
&lt;p&gt;YE: Yeah?&lt;/p&gt;
&lt;p&gt;OE: He’s probably a hermit or a survivalist. Doesn’t give a damn about the rest of the world.&lt;/p&gt;
&lt;p&gt;YE: That’s insane. That can’t be real.&lt;/p&gt;
&lt;p&gt;OE: Well (pointing down, pressing his right index finger against the window)&lt;/p&gt;
&lt;p&gt;YE: We have to do something. I need to save him.&lt;/p&gt;
&lt;p&gt;OE: How do you plan on doing that?&lt;/p&gt;
&lt;p&gt;YE: I’ll parachute down there. And I’ll drop a pallet of essentials: a generator, a satellite modem, all kinds of food, a 72-inch 8K TV.&lt;/p&gt;
&lt;p&gt;OE: Why?&lt;/p&gt;
&lt;p&gt;YE: To show him everything he’s missing. Everything he needs to be happy.&lt;/p&gt;
&lt;p&gt;OE: Nice marketing strategy.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;translated from french by ChatGPT-4.1&lt;/code&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Just Use PostgreSQL as a Cache Instead of Redis]]></title><description><![CDATA[I read Martin Heinz’s 2023 blog post “You Don’t Need a Dedicated Cache Service
– PostgreSQL as a Cache” from start to finish.
#DevOps or not…]]></description><link>https://en.socratic.dev/just-use-postgresql-as-a-cache-instead-of-redis</link><guid isPermaLink="false">https://en.socratic.dev/just-use-postgresql-as-a-cache-instead-of-redis</guid><pubDate>Sat, 28 Feb 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;I read Martin Heinz’s 2023 blog post “You Don’t Need a Dedicated Cache Service
– PostgreSQL as a Cache” from start to finish.
&lt;a href=&quot;https://en.socratic.dev/tag/devops/&quot;&gt;#DevOps&lt;/a&gt; or not, I tested the
implementation to see what it gave back.&lt;/p&gt;
&lt;p&gt;The dark side of a passion for technology is the risk of adopting
ill‑founded beliefs about topics you don’t really master.&lt;br&gt;
For example, I read a post on Hackernews about the PostgreSQL database
system. Apparently PostgreSQL can also act as a cache subsystem
(think Redis) and even as a message broker. Win‑win: you get rid of Redis
and RabbitMQ and treat yourself to a four‑day workweek.&lt;/p&gt;
&lt;p&gt;And PostgreSQL can even tell me when the next bus leaves for Montréal, right?&lt;/p&gt;
&lt;h3&gt;what are the requirements?&lt;/h3&gt;
&lt;p&gt;Before annoying everyone with the latest revelation picked up between
two mouthfuls of peanut‑butter toast, we need to check if it actually works.&lt;/p&gt;
&lt;p&gt;Let&apos;s open our eyes and ears and figure out what a cache is and what it
requires. A cache like Redis is a system that temporarily stores data
in memory so it can be retrieved much faster than if we had to go fetch
it from the primary database.&lt;/p&gt;
&lt;p&gt;So it’s a bit rich to say we’re going to use a database to cache items.&lt;br&gt;
Still, we note that cached items are stored temporarily and the primary
quality of a cache subsystem is read performance.&lt;/p&gt;
&lt;p&gt;Then for the “temporary” aspect, we need a mechanism that frees items
from memory after some time.&lt;/p&gt;
&lt;h3&gt;the truth is in the blog&lt;/h3&gt;
&lt;p&gt;The trick is to stretch breakfast by eating a banana or some berries.
That way you can go further than the catchy headline of a blog post and
learn more.&lt;/p&gt;
&lt;p&gt;I read Martin Heinz’s 2023 blog post “You Don’t Need a Dedicated Cache Service
– PostgreSQL as a Cache” from start to finish.
&lt;a href=&quot;https://en.socratic.dev/tag/devops/&quot;&gt;#DevOps&lt;/a&gt; or not, I tested the
implementation to see what it gave back.&lt;/p&gt;
&lt;pre&gt;&lt;code class=&quot;language-sql&quot;&gt;CREATE UNLOGGED TABLE cache (
    id serial PRIMARY KEY,
    key text UNIQUE NOT NULL,
    value jsonb,
    inserted_at timestamp);
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;First, it’s not &lt;em&gt;plug‑and‑play&lt;/em&gt;. The first step is pretty simple.
Create an SQL table called &lt;code&gt;cache&lt;/code&gt; and mark it &lt;code&gt;UNLOGGED&lt;/code&gt;. An UNLOGGED
table doesn’t write its updates to the WAL (write‑ahead log), which
makes it faster but means it can lose its contents if the server
crashes.&lt;/p&gt;
&lt;p&gt;Not too scary, right?&lt;/p&gt;
&lt;p&gt;Next, to make sure items don’t bloat the &lt;code&gt;cache&lt;/code&gt; table, we need to
implement some sort of TTL mechanism.&lt;br&gt;
Martin Heinz suggests using the &lt;code&gt;pg_cron&lt;/code&gt; extension to schedule jobs
that will call a stored procedure to delete every item older than the
given parameter.&lt;/p&gt;
&lt;p&gt;Just the words “stored procedure” give me the same feeling as
Proust’s madeleine.&lt;/p&gt;
&lt;p&gt;In 2026, imagine your least grumpy DevOps engineer showing the new wave
of developers how &lt;em&gt;fun&lt;/em&gt; a stored procedures in a SQL database can become in the
long term.&lt;/p&gt;
&lt;p&gt;Putting toothpaste back in the tube is harder than landing a rocket
vertically, isn’t it?&lt;/p&gt;
&lt;h3&gt;SWOT on Martin Heinz’s proposal&lt;/h3&gt;
&lt;h4&gt;strengths&lt;/h4&gt;
&lt;p&gt;Your DevOps team is barely keeping its head above water. You already
have PostgreSQL servers on hand. In less than a morning they can spin up
a cache table with TTL logic and hand it over to developers.&lt;/p&gt;
&lt;p&gt;No need to provision new resources or commit themselves to support them.&lt;/p&gt;
&lt;h4&gt;weaknesses&lt;/h4&gt;
&lt;p&gt;It’s not Redis. Developers will quickly notice they have to talk to the
“cache” through their favorite ORM (or pure SQL transactions).&lt;/p&gt;
&lt;p&gt;And they won’t be able to add “Redis” to their résumé.&lt;/p&gt;
&lt;p&gt;Also, until proven otherwise, it’ll probably be slower than Redis.&lt;/p&gt;
&lt;h4&gt;opportunities&lt;/h4&gt;
&lt;p&gt;With the arrival of the Cloud and managed services, DBAs have vanished.
By coaxing your DevOps folks into tinkering with PGSQL, you might sneak
in the responsibility for administering the database servers without
anyone noticing!&lt;/p&gt;
&lt;h4&gt;risks&lt;/h4&gt;
&lt;p&gt;If you know your system is heavily used, needs rock‑solid realtime
performance and must scale easily, then don’t let the siren songs of the
web seduce you—pick Redis.&lt;/p&gt;
&lt;h4&gt;Still sounds cool, I want to try&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;Docker Desktop&lt;/li&gt;
&lt;li&gt;git&lt;/li&gt;
&lt;li&gt;DBeaver or any IDE that can connect to a &lt;code&gt;pgsql&lt;/code&gt; server&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If you have those two items (and cannot count), clone my GitHub repo
&lt;a href=&quot;https://github.com/socraticDevBlog/sandboxes/&quot;&gt;&lt;code&gt;sandboxes&lt;/code&gt;&lt;/a&gt; and dig in the &lt;code&gt;pgsql-cache&lt;/code&gt; directory. Open the &lt;code&gt;README.md&lt;/code&gt; file in Preview mode
(if you’re not masochistic) and follow the instructions.&lt;/p&gt;
&lt;p&gt;I’ve put together a little lab that will provision and configure a
PostgreSQL database with a &lt;code&gt;cache&lt;/code&gt; table and &lt;code&gt;cron&lt;/code&gt;. Then you can run a
small C# API that shows how to interact with the pgsql cache.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;translated from french by Chatgpt&lt;/code&gt;&lt;/p&gt;
&lt;h3&gt;sources&lt;/h3&gt;
&lt;p&gt;&lt;a href=&quot;https://www.martinheinz.dev/blog/105&quot;&gt;You Don’t Need a Dedicated Cache Service - PostgreSQL as a Cache&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://github.com/socraticDevBlog/sandboxes/tree/main/pgsql-cache&quot;&gt;pgsql database used as a cache&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Curiosity Will Get Us Out of Trouble]]></title><description><![CDATA[Curiosity will get us out of trouble. No need to insist or speak louder. But
being curious is difficult: we must let others speak, encourage…]]></description><link>https://en.socratic.dev/curiosity-will-get-us-out-of-trouble</link><guid isPermaLink="false">https://en.socratic.dev/curiosity-will-get-us-out-of-trouble</guid><pubDate>Fri, 06 Feb 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Curiosity will get us out of trouble. No need to insist or speak louder. But
being curious is difficult: we must let others speak, encourage them to express
themselves and, above all, listen and learn. Let&apos;s admit it: our opinions often
come from habit, sometimes from ignorance. In the best case, we have seriously
studied a subject. Even then, when someone less well-informed interrupts us,
welcoming this interruption with curiosity remains the best strategy.&lt;/p&gt;
&lt;p&gt;The word curiosity comes from the Latin curiositas which means care. As for the
word care, it probably comes from the Latin somnium which means dream and
vision. Like a dream, curiosity is something that occupies the mind without
harmful consequence. Much like a dream, the curiosity we experience when
learning about someone else&apos;s position commits us to nothing. This openness and
suspension of our judgment costs us almost nothing.&lt;/p&gt;
&lt;p&gt;Being curious is characteristic of children, isn&apos;t it? As we progress through
life, we lose this ease of wonder. As if admitting our fallibility and
ignorance represented a weakness. On the contrary, showing curiosity is an
unsuspected strength. Chances are that most of our acquaintances share neither our
opinions nor our tastes. Being curious flows naturally from this reality.
Humans are different from one another but they must collaborate to achieve
noteworthy objectives. By ceasing to try to convince others to adopt our
opinions, by showing curiosity and suspending our judgment to understand their
situation, we build bridges between us all.&lt;/p&gt;
&lt;p&gt;Curiosity is a reasonable bet for surviving the typically human automatisms in discussion. Whether it&apos;s interrupting, bringing the conversation back to ourselves, or trying to &quot;score a point&quot; by contradicting the other, we all lose a bit in these aborted conversations.
Yet what is the real risk? What is the consequence of a strange dream? We wake
up, perhaps a bit shaken, but intact. The same goes for curiosity: listening to
opposing opinions commits us to nothing, doesn&apos;t really put us in danger.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;translated from french by Claude Sonnet 4.5&lt;/code&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Mark Carney Davos 2026 Speech: The Power of the Less Powerful Begins with Honesty (Full Transcript)]]></title><description><![CDATA[Im gonna start in french and then I'll switch back to english. Merci Larry. C'est un plaisir, c'est un devoir d'être parmi vous en ce point…]]></description><link>https://en.socratic.dev/mark-carney-davos-2026-speech-the-power-of-the-less-powerful-begins-with-honesty-full-transcript</link><guid isPermaLink="false">https://en.socratic.dev/mark-carney-davos-2026-speech-the-power-of-the-less-powerful-begins-with-honesty-full-transcript</guid><pubDate>Sun, 25 Jan 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Im gonna start in french and then I&apos;ll switch back to english.&lt;/p&gt;
&lt;p&gt;Merci Larry. C&apos;est un plaisir, c&apos;est un devoir d&apos;être parmi vous en ce point
tournant pour le Canada et pour le monde. Et je parlerai aujourd&apos;hui de la
rupture de l&apos;ordre mondial. De la fin d&apos;une fiction agréable et du début d&apos;une
réalité brutale où la géopolitique des grandes puissances n&apos;est soumise à
aucune contrainte.&lt;/p&gt;
&lt;p&gt;Mais je vous soumets par ailleurs que les autres pays, en
particulier les puissances moyennes comme le Canada, ne sont pas impuissantes.&lt;/p&gt;
&lt;p&gt;Ils possèdent la capacité de construire un nouvel ordre qui intègre nos valeurs
comme le respect des droits humains, le développement durable, la solidarité,
la souveraineté et l&apos;intégrité territoriale des États. La puissance des moins
puissants commence par l&apos;honnêteté.&lt;/p&gt;
&lt;p&gt;[&lt;code&gt;socdev&apos;s translation&lt;/code&gt;: &lt;em&gt;Thank you Larry. It is a pleasure and a duty to be with
you for this turning point for Canada and for the world. Today I&apos;m gonna be
talking about the rupture of the world order. About the end of a comfortable
fiction and about the beginning of a brutal reality where the geopolitics of
the great powers is bounded by any constraints. But I&apos;ll propose
nevertheless that other countries, specifically the middle powers like Canada,
are not powerless. They are capable of building a new order interwoven by our
values like the respect of human rights, sustainable development, solidarity,
sovereignty and the territorial integrity of the States. The power of the less
powerful begins with honesty.&lt;/em&gt;]&lt;/p&gt;
&lt;p&gt;&lt;code&gt;switching back to english&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;It seems like every day we are reminded that we live in an era of great power
rivalry. That the rules-based order is fading. That&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;the strong do what they can, and the weak suffer what they must&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;[&lt;strong&gt;note&lt;/strong&gt;: The Melian Dialogue by the Greek historian Thucydides recounts how Athens, the European hegemonic power at the time, took possession of a small island in the Cyclades. It is a classic of ancient literature often studied in political philosophy, argumentation theory, and philosophical anthropology. &lt;em&gt;Though the Melians had ancestral ties to Sparta, they were neutral in the war. Athens invaded Melos in the summer of 416 BC and demanded that the Melians surrender and pay tribute to Athens or face annihilation. The Melians refused, so the Athenians laid siege to their city. Melos surrendered in the winter, and the Athenians executed the men of Melos and enslaved the women and children.&lt;/em&gt;(Wikipedia)]&lt;/p&gt;
&lt;p&gt;This aphorism of Thucydides is presented as inevitable as the natural logic of
international relations reasserting itself. And faced with this logic, there is
a strong tendency for countries to go along to get along. To accommodate. To
avoid trouble. To hope that compliance will buy safety.&lt;/p&gt;
&lt;p&gt;It won’t. So, what are our options?&lt;/p&gt;
&lt;p&gt;In 1978, the Czech dissident Václav Havel, later president, wrote an essay called &lt;em&gt;The Power of the Powerless&lt;/em&gt;. In it, he asked a simple question: how did the communist system sustain itself? His answer began with a greengrocer. Every morning, this shopkeeper places a sign in his window: “Workers of the world, unite!” He doesn&apos;t believe it. No one believes it. But he places the sign anyway — to avoid trouble, to signal compliance, to get along. And because every shopkeeper on every street does the same, the system persists.
Not through violence alone, but through the participation of ordinary people in rituals they privately know to be false. Havel called this “living within a lie.” The system’s power comes not from its truth but from everyone’s willingness to perform as if it were true. And its fragility comes from the same source: when even one person stops performing — when the greengrocer removes his sign — the illusion begins to crack.&lt;/p&gt;
&lt;p&gt;Friends, it is time for companies and countries to take their signs down.
For decades, countries like Canada prospered under what we called the
rules-based international order. We joined its institutions, praised its
principles, and benefited from its predictability. And because of that, we could pursue
values-based foreign policies under its protection.
We knew the story of the international rules-based order was partially false.
That the strongest would exempt themselves when convenient. That trade rules
were enforced asymmetrically. And we knew that international law applied with
varying rigour depending on the identity of the accused or the victim.
This fiction was useful, and American hegemony, in particular, helped provide
public goods: open sea lanes, a stable financial system, collective security,
and support for frameworks for resolving disputes. So, we placed the sign in
the window. We participated in the rituals. And we largely avoided calling out
the gaps between rhetoric and reality.&lt;/p&gt;
&lt;p&gt;This bargain no longer works.
Let me be direct: we are in the midst of a rupture, not a transition.
Over the past two decades, a series of crises in finance, health, energy, and
geopolitics have laid bare the risks of extreme global integration.&lt;/p&gt;
&lt;p&gt;But more recently, great powers began using economic integration as weapons.
Tariffs as leverage. Financial infrastructure as coercion. Supply chains as
vulnerabilities to be exploited.&lt;/p&gt;
&lt;p&gt;You cannot “live within the lie” of mutual benefit through integration when
integration becomes the source of your subordination. The multilateral
institutions on which middle powers relied,  the WTO — the very
architecture of collective problem solving are under threat.&lt;/p&gt;
&lt;p&gt;As a result, many countries are drawing the same conclusions. That they must develop
greater strategic autonomy: in energy, food, critical minerals, in finance, and
supply chains. And this impulse is understandable. A country that cannot feed
itself, fuel itself, or defend itself has few options. When the rules no longer
protect you, you must protect yourself.&lt;/p&gt;
&lt;p&gt;But let us be clear-eyed about where this leads. A world of fortresses will be
poorer, more fragile, and less sustainable. And there is another truth: if
great powers abandon even the pretence of rules and values for the unhindered
pursuit of their power and interests, the gains from ‘transactionalism’ will become
harder to replicate.&lt;/p&gt;
&lt;p&gt;Hegemons cannot continually monetize their relationships. Allies will diversify
to hedge against uncertainty. They&apos;ll buy insurance. Increase options. This
rebuilds sovereignty—sovereignty which was once grounded in rules—but which
will be increasingly anchored in the ability to withstand pressure.&lt;/p&gt;
&lt;p&gt;This room knows this is classic risk management. Risk management comes at a
price. But that cost of strategic autonomy, of sovereignty, can also be shared.
Collective investments in resilience are cheaper than everyone building their
own fortress. Shared standards reduce fragmentation. Complementarities are
positive sum. The question for middle powers, like Canada, is not whether to
adapt to this new reality. We must. The question is whether we adapt by simply
building higher walls — or whether we can do something more ambitious.&lt;/p&gt;
&lt;p&gt;Now Canada was amongst the first to hear the wake-up call, leading us to
fundamentally shift our strategic posture.
Canadians know that our old, comfortable assumptions that our geography and
alliance memberships automatically conferred prosperity and security is no
longer valid. Our new approach rests on what Alexander Stubb has termed
‘values-based realism’ — or, to put it another way, we aim to be both principled and
pragmatic.&lt;/p&gt;
&lt;p&gt;Principled in our commitment to fundamental values: sovereignty and territorial
integrity, the prohibition of the use of force except when consistent with the
UN Charter, the respect for human rights.&lt;/p&gt;
&lt;p&gt;Pragmatic in recognising that progress is often incremental, that interests
diverge, that not every partner will share all of our values. So we are engaging broadly,
strategically, with open eyes. We actively take on the world as it is, not wait around
for the world as we wish it to be. Canada is calibrating our relationships, so
their depth reflects our values. And we are prioritising broad engagement to
maximise our influence, given the fluidity of the world at the moment, the risks that this
poses, and the stakes for what comes next.&lt;/p&gt;
&lt;p&gt;And we are no longer just relying on the strength of our values, but also on the
value of our strength. We are building that strength at home. Since my
government took office, we have cut taxes on incomes, on capital gains and
business investment, we have removed all federal barriers to interprovincial
trade, and we are fast-tracking a trillion dollars of investments in energy, AI,
critical minerals, new trade corridors, and beyond. We are doubling our defence
spending by the end of this decade [2020-2030] and we are doing so in ways that
build our domestic industries. And we are rapidly diversifying abroad. We have
agreed a comprehensive strategic partnership with the EU [European Union], including
joining SAFE [PESCO?], the European’s defence procurement arrangements. We have signed twelve
other trade and security deals on four continents in six months.&lt;/p&gt;
&lt;p&gt;In the past few days, we have concluded new strategic partnerships with China
and Qatar. We are negotiating free trade pacts with India, ASEAN, Thailand,
Philippines, and Mercosur. We are doing something else. To help solve global
problems, we are pursuing variable geometry, in other words, different
coalitions for different issues, based on common values and interests.&lt;/p&gt;
&lt;p&gt;So on Ukraine, we are a core member of the Coalition of the Willing and one of the
largest per-capita contributors to its defence and security.&lt;/p&gt;
&lt;p&gt;On Arctic sovereignty, we stand firmly with Greenland and Denmark and fully
support their unique right to determine Greenland’s future [applause]. Our commitment to
Article 5 is unwavering. So we are working with our NATO allies including the
Nordic Baltic Eight to further secure the alliance’s northern and western flanks,
including through Canada&apos;s unprecedented investments in over-the-horizon radar,
in submarines, in aircraft, and boots on the ground. Boots on the ice.&lt;/p&gt;
&lt;p&gt;Canada strongly opposes tariffs over Greenland and calls for focused talks to
achieve our shared objectives of security and prosperity in the Arctic.&lt;/p&gt;
&lt;p&gt;On plurilateral trade, we are championing efforts to build a bridge between the
Trans-Pacific Partnership and the European Union, which would create a new trading block
of 1.5 billion people.&lt;/p&gt;
&lt;p&gt;On critical minerals, we are forming buyer’s clubs anchored in the G7 so that
the world can diversify away from concentrated supply. And on AI, we are
cooperating with like-minded democracies to ensure we will not ultimately be
forced to choose between hegemons and hyperscalers.&lt;/p&gt;
&lt;p&gt;This is not naive multilateralism. Nor is it relying on their institutions. It is building the coalitions that work, issue by issue, with
partners who share enough common ground to act together. In some cases, this
will be the vast majority of nations. What it&apos;s doing is it is creating a dense web of
connections across trade, investment, culture on which we can draw for future
challenges and opportunities.&lt;/p&gt;
&lt;p&gt;[I ]Argue [that] the middle powers must act together because if we are not at the table, we are on
the menu [laughs]. But I&apos;d also say that great powers can afford for now to go
it alone. They have the market size, the military capacity and the leverage to
dictate terms. Middle powers do not. But when we only negotiate bilaterally
with a hegemon, we negotiate from weakness. We accept what is offered. We
compete with each other to be the most accommodating. This is not sovereignty.
It is the performance of sovereignty while accepting subordination.&lt;/p&gt;
&lt;p&gt;In a world of great powers rivalry, the countries in between have a choice: to
compete with each other for favour or to combine to create a third path with
impact. We should not allow the rise of hard power to blind us to the fact that
the power of legitimacy, integrity, and rules will remain strong — if we choose
to wield it together.&lt;/p&gt;
&lt;p&gt;Which brings me back to Havel.&lt;/p&gt;
&lt;p&gt;What does it mean for middle powers to “live the truth”?&lt;/p&gt;
&lt;p&gt;First it means naming reality. Stop invoking the “rules-based international
order” as though it still functions as advertised. Call it what it is: a system
of intensifying great power; rivalry  where the most powerful pursue their
interests using economic integration as coercion. It means acting
consistently. Applying the
same standards to allies and rivals. When middle powers criticize economic
intimidation from one direction but stay silent when it comes from another, we
are keeping the sign in the window.&lt;/p&gt;
&lt;p&gt;It means building what we claim to believe in. Rather than waiting for the old
order to be restored, it means creating institutions and
agreements that function as described. And it means reducing the leverage that
enables coercion. That is building a strong domestic economy should always be every
government’s priority. And diversification internationally is not just economic
prudence; it&apos;s a material foundation for honest foreign policy. Because
countries earn the right to principled stands by reducing their vulnerability
to retaliation.&lt;/p&gt;
&lt;p&gt;So Canada has what the world wants. We are an energy superpower. We hold vast
reserves of critical minerals. We have the most educated population in the
world. Our pension funds are amongst the world’s largest and most sophisticated
investors. In other words, we have capital, talent, we also have a government
with the immense fiscal capacity to act decisively. And we have the values to
which many others aspire.&lt;/p&gt;
&lt;p&gt;Canada is a pluralistic society that works. Our public square is loud, diverse,
and free. Canadians remain committed to sustainability. We are a stable and
reliable partner in a world that is anything but. A partner that builds and
values relationships for the long term. And we have something else: a
recognition of what is happening and a determination to act accordingly.&lt;/p&gt;
&lt;p&gt;We understand that this rupture calls for more than adaptation. It calls for
honesty about the world as it is. We are taking the sign out of the window. We
know the old order is not coming back. We should not mourn it.&lt;/p&gt;
&lt;p&gt;Nostalgia is not a strategy. But we believe that from the fracture, we can
build something bigger, better, stronger, and more just. This is the task of the
middle powers. The countries that have the most to lose from a world of fortresses and the
most to gain from genuine cooperation.&lt;/p&gt;
&lt;p&gt;The powerful have their power. But we have something too — the capacity to stop
pretending, to name reality, to build our strength at home, and to act
together. That is Canada’s path. We choose it openly and confidently. And it is
a path wide open to any country willing to take it with us.&lt;/p&gt;
&lt;p&gt;Thank you very much.&lt;/p&gt;
&lt;h3&gt;sources&lt;/h3&gt;
&lt;p&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=5UqQTqvhFRg&amp;#x26;t=4s&quot;&gt; Canada ‘strongly opposes’ tariffs over Greenland, won’t waver on Article 5:
Carney &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.wikiwand.com/en/articles/Siege_of_Melos&quot;&gt;https://www.wikiwand.com/en/articles/Siege_of_Melos&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Fiction 2025 — Stories That Let Your Eyes Rest from Netflix]]></title><description><![CDATA[Diving into fiction nourishes the heart and mind while giving your screen-tired eyes a break. For three of the writers here, I experienced…]]></description><link>https://en.socratic.dev/fiction-2025-stories-that-let-your-eyes-rest-from-netflix</link><guid isPermaLink="false">https://en.socratic.dev/fiction-2025-stories-that-let-your-eyes-rest-from-netflix</guid><pubDate>Tue, 13 Jan 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Diving into fiction nourishes the heart and mind while giving your screen-tired eyes a break. For three of the writers here, I experienced their work most vividly through the author’s own voice on audiobook.&lt;/p&gt;
&lt;h3&gt;David Sedaris&lt;/h3&gt;
&lt;p&gt;I stumbled on David Sedaris by accident. I had the wrong name in my head — I was looking for Sam Lipsyte — but the discovery was happy nonetheless. Like Lipsyte, Sedaris is an American humorist who traffics in satirical self-exposure: his books present him as a character, a writer who imagines himself retired and comfortably adrift in France, England, or on a small island off the American East Coast. What makes his work irresistible to me is his willingness to strip himself bare. He offers judgments that are often politically incorrect, sometimes absurd, and always, somehow, deeply human; you can&apos;t help but grin.&lt;/p&gt;
&lt;p&gt;Worth rereading? Absolutely — especially as audiobooks, read by Sedaris himself.&lt;/p&gt;
&lt;p&gt;Titles I&apos;ve read in 2025: &quot;When You Are Engulfed in Flames&quot; (2008); &quot;Let&apos;s Explore Diabetes with Owls&quot; (2013); &quot;Calypso&quot; (2018); &quot;Happy-Go-Lucky&quot; (2022)&lt;/p&gt;
&lt;h3&gt;Sam Lipsyte — The Ask (2010)&lt;/h3&gt;
&lt;p&gt;Lipsyte teaches fiction at Columbia University in New York City. &lt;em&gt;The Ask&lt;/em&gt; follows the bungled career of a socially inept man who works in the major-donations office at a second-tier university in New York.&lt;/p&gt;
&lt;p&gt;The novel’s protagonist is a genuine antihero: a man who, from the first page, reveals himself as something of a mess. The book holds your attention through the cringe-comic details of his life and the absurd, oddly tender relationship he has with his son, Bernie.&lt;/p&gt;
&lt;p&gt;Worth rereading? Certainly.&lt;/p&gt;
&lt;h3&gt;Jonathan Ames — Karma Doll (2025)&lt;/h3&gt;
&lt;p&gt;I am an unabashed fan of Jonathan Ames. I love his characters: flawed, often pitiable men who, nevertheless, possess flashes of brilliance.&lt;/p&gt;
&lt;p&gt;&quot;Karma Doll&quot;, read on audiobook by Ames himself, reads like a thriller that subverts expectations for those familiar with his New York-set work. Still, it carries the psychological depth characteristic of Ames’s best characters. It is a surprising turn for a longtime reader — and a welcome one.&lt;/p&gt;
&lt;p&gt;Worth rereading? Maybe.&lt;/p&gt;
&lt;h3&gt;William Gibson — Count Zero (1986)&lt;/h3&gt;
&lt;p&gt;The second novel in the cultish Sprawl Trilogy.&lt;/p&gt;
&lt;p&gt;If you enjoyed &quot;Neuromancer&quot;, &quot;Count Zero&quot; is a natural next step. It is not a direct sequel: it introduces different characters and a fresh plot, though it unfolds within the same Sprawl universe — a sprawling megalopolis stretching the Eastern Seaboard from Atlanta to Boston, with scenes that extend into space and to satellite communities.&lt;/p&gt;
&lt;p&gt;I confess I reread &quot;Neuromancer&quot; before diving back in. That refresher helped me re-enter the particular state of mind the books require: a willingness to accept, at least for a while, that you may not fully understand everything that happens — a bit like life, when we only grasp fragments of the whole.&lt;/p&gt;
&lt;p&gt;Gibson’s work rewards rereading. Ahead of his time, he dramatizes the shifting role of humans in an AI-saturated future, prompting reflection on how power consolidates into quasi-dynasties, how work fragments and becomes precarious, and how new hierarchies are established.&lt;/p&gt;
&lt;h3&gt;Victor-Lévy Beaulieu — Trois-Pistoles et les Basques: Le Pays de mon père (1997)&lt;/h3&gt;
&lt;p&gt;Presented as a coffee-table book, VLB’s account of his father’s slow decline
reads like a borderland between documentary and interior reverie. The narrative
moves from a Montreal suburb&apos;s town to Trois-Pistoles village passing by an
Indigenous reserve, tracing a return to the land of his childhood.&lt;/p&gt;
&lt;p&gt;I borrowed the book from the library while planning a trip to the canadian Basque
Country. My initial intention was to leaf through the photographs and mark
places to visit. Instead I started reading the text—and could not stop until
the end.&lt;/p&gt;
&lt;p&gt;There are echoes of James Joyce in VLB’s prose: he invites the reader into an
imagination that is, at times, unsettling and yet fundamentally sound.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The study of the Alzheimer’s disease representation in Mordecai Richler’s
« Barney’s Version », Victor-Lévy Beaulieu’s « Trois-Pistoles et les Basques ». Le
pays de mon père and Annie Ernaux’s « Je ne suis pas sortie de ma nuit »
allows us to outline the disease’s literary specifics, beyond the theme of
the memory lapse.&lt;/p&gt;
&lt;p&gt;To think the Alzheimer’s disease in terms of cognitive
degeneration is to evacuate its dimension as a literature material which
influences the structure of a text as well as its style. The analysis of
three contemporary stories contributes to the identification of rhetorical
methods as well as narrative and style strategies which help us to delimit
the Alzheimer’s disease literary mark.&lt;/p&gt;
&lt;p&gt;We will see that when a third party
takes charge of the story, it explains the filiation theme which helps to see
the disease from the inside as well as from the outside.It also shows an archiving work.&lt;/p&gt;
&lt;p&gt;&lt;cite&gt;Marie-France Rooney&apos;s Master thesis &quot;Representations of Alzheimer’s Disease in Three Contemporary Narratives&quot;&lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Hubert Aquin — Next Episode (1965)&lt;/h3&gt;
&lt;p&gt;Since the Autumn protests of 2012 I have tried, on and off, to finish Hubert
Aquin’s &quot;Next Episode&quot;. I bought it out of curiosity while I was a student at the
Université du Québec à Montréal (UQAM), often passing the building that bears
his name on my way to seminars or meetings with my thesis advisor.&lt;/p&gt;
&lt;p&gt;I probably won’t reread this one. I’d prefer to explore another work by this
important Québécois writer.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;translated from french by GPT-5 mini --- and it took some liberty to improve my writing ;)&lt;/code&gt;&lt;/p&gt;
&lt;h3&gt;sources&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Marie-France Rooney (2014), &lt;a href=&quot;https://umontreal.scholaris.ca/server/api/core/bitstreams/212813f2-0ea7-4cdb-b225-7488683c771d/content&quot;&gt;Représentations de la maladie d’Alzheimer dans trois récits contemporains&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded></item><item><title><![CDATA[Nonfiction 2025 — 3 Eye-Opening Books: Nazi Mercenaries, Neurology, and Modern China]]></title><description><![CDATA[In 2025 I read a handful of smart, wide-ranging non-fiction books on history and modern medicine. Poking outside your day job — into history…]]></description><link>https://en.socratic.dev/nonfiction-2025-3-eye-opening-books-nazi-mercenaries-neurology-and-modern-china</link><guid isPermaLink="false">https://en.socratic.dev/nonfiction-2025-3-eye-opening-books-nazi-mercenaries-neurology-and-modern-china</guid><pubDate>Tue, 06 Jan 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;In 2025 I read a handful of smart, wide-ranging non-fiction books on history and modern medicine. Poking outside your day job — into history, science, and systems — is a high-return habit: it stretches your thinking and sharpens judgment.&lt;/p&gt;
&lt;p&gt;Here are three that stuck with me.&lt;/p&gt;
&lt;h3&gt;Danny Orbach, Fugitives: The History of Nazi Mercenaries During the Cold War (2023)&lt;/h3&gt;
&lt;p&gt;Danny Orbach is a military historian with a Harvard pedigree who studies coups, political assassinations, and military insubordination.&lt;/p&gt;
&lt;p&gt;Fugitives traces what happened to Nazi officers after 1945. Many who avoided capture fled to Latin America, the Middle East, and Africa and reinvented themselves as military advisers, security trainers, and repression experts. They worked for states from Egypt and Syria to Iraq, the Congo, and various Latin American regimes.&lt;/p&gt;
&lt;p&gt;Orbach’s central claim is blunt: Western priorities—chiefly fearing communism—often trumped justice. In practice, that meant experienced perpetrators were useful, and governments quietly recruited their skills. The techniques of control and the architecture of political police learned in Nazi Germany migrated and persisted.&lt;/p&gt;
&lt;p&gt;The broader lesson is sobering and practical for anyone who studies systems: violence doesn’t vanish, it relocates to where it’s exploitable. States talk about principles, but they prioritize effectiveness. Read this book if you want a clear-eyed account of how power recycles tools of coercion.&lt;/p&gt;
&lt;h3&gt;Oliver Sacks, The Man Who Mistook His Wife for a Hat: And Other Clinical Tales (1985)&lt;/h3&gt;
&lt;p&gt;I went on a short neuroscience binge and dug into classic casebooks. Oliver Sacks is a towering humane voice in neurology; he famously inspired the film Awakenings.&lt;/p&gt;
&lt;p&gt;This book is a set of clinical portraits: visual agnosia, amnesia, aphasia, loss of bodily sense, Tourette’s, Parkinson’s, hallucinations, and other mind-bending syndromes. Sacks brings philosophy and literature into the clinic—he treats patients as whole people, not just broken modules.&lt;/p&gt;
&lt;p&gt;What surprised me most was how often loss triggers adaptation. Many patients don’t seem overtly miserable; they find ways to live richly around their condition. One striking story is of a drummer with Tourette’s who loved the energy his tics gave him—medication flattened his edge and his playing. The clinical trade-offs are real: drugs can reduce symptoms but blunt personality and purpose.&lt;/p&gt;
&lt;p&gt;Sacks models a deeply humane medicine: curiosity plus empathy, anchored in broad cultural literacy. If you care about design or product leadership, his work is an object lesson in treating users (or patients) as whole humans, not just inputs and outputs.&lt;/p&gt;
&lt;h3&gt;Rana Mitter, Modern China: A Very Short Introduction (2nd edition)&lt;/h3&gt;
&lt;p&gt;This Oxford ‘Very Short Introduction’ isn’t an academic monograph; it’s a concise, readable synthesis aimed at curious readers. Mitter plays with the two terms in his title—‘China’ and ‘modern’—and spends a lot of time asking what modernity actually means for a civilization with millennia of statecraft.&lt;/p&gt;
&lt;p&gt;I learned a crisp narrative arc: imperial China’s dynastic rhythms, the fracturing pressures of the 19th and early 20th centuries, the end of the imperial system in 1911, mass mobilizations like the May Fourth movement, the civil war between nationalists and communists, the Japanese invasion, Mao’s era and the Cultural Revolution, and then the post‑Mao economic surge that produced today’s global China.&lt;/p&gt;
&lt;p&gt;Mitter resists easy certainties. The book’s strength is making society, economy, and culture intelligible through history, not through headlines. It’s a smart primer if you want historical context without the jargon.&lt;/p&gt;
&lt;h3&gt;conclusion&lt;/h3&gt;
&lt;p&gt;All three books repay attention. Orbach sharpens your understanding of how political violence migrates; Sacks reminds you to keep the human in the center of systems thinking; Mitter supplies the historical scaffolding to understand modern China. Read any of these and you’ll come away with better filters for the world.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;translated from french by GPT-5 mini --- and it took some liberty to improve my writing ;)&lt;/code&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Alfred Lansing, Endurance: Shackleton's Incredible Voyage, 1959]]></title><description><![CDATA[My favorite read of 2025. Between mid-September and mid-October I devoured the 400 pages of this remarkable account, mostly during a few…]]></description><link>https://en.socratic.dev/alfred-lansing-endurance-shackletons-incredible-voyage-1959</link><guid isPermaLink="false">https://en.socratic.dev/alfred-lansing-endurance-shackletons-incredible-voyage-1959</guid><pubDate>Thu, 01 Jan 2026 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;My favorite read of 2025. Between mid-September and mid-October I devoured the 400 pages of this remarkable account, mostly during a few cool October days outside a cabin on the St. Lawrence River while watching freighters pass.&lt;/p&gt;
&lt;h3&gt;Alfred Lansing, Endurance: Shackleton&apos;s Incredible Voyage&lt;/h3&gt;
&lt;p&gt;In 1914, an expedition led by Sir Ernest Shackleton set out for Antarctica with twenty-six crew members, sixty-nine dogs, and a cat. Their plan was to cross the continent by dog sled. Fate had other plans: the ship became trapped in the ice and the crew spent nearly two years before they returned to civilization.&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;This book came highly recommended by New York artist Tom Sachs, who summed it up like this:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;This is the adventure story by which all other adventure stories are judged. The worst thing that happened was a man losing his feet, but that was only because he didn&apos;t have the right shoes.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;People read this book again and again because it pulls you out of daily life and drops you into a simple world of ice, sea, and survival.&lt;/p&gt;
&lt;p&gt;Immersing yourself in the story makes you feel almost like a crew member. I quickly felt the vertigo of a small human community that can only rely on itself. There is no higher authority beyond the leader, Sir Shackleton, and nature itself.&lt;/p&gt;
&lt;p&gt;This is a particularly rich read for those in positions of authority or
leadership. For these stranded people, navigation — and equally decision-making, observing the
elements (temperature, wind, seasons, currents), and handling conflicts —
becomes practical wisdom. You first establish your position, take reliable
measurements, then decide with the external factors in mind.&lt;/p&gt;
&lt;p&gt;The story also works as a social metaphor: a small group makes critical choices that affect everyone&apos;s life. The idea of a minority making weighty decisions can feel uncomfortable. In Shackleton&apos;s case, though, you see a leader who acts with humanity and restraint: conflicts happen, but they are managed pragmatically and often admirably.&lt;/p&gt;
&lt;h4&gt;Who will like this book&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;Anyone traveling along a large river or the sea.&lt;/li&gt;
&lt;li&gt;People who need to show leadership to get projects done. That is, anyone who runs large projects and must mobilize teams.&lt;/li&gt;
&lt;li&gt;Entrepreneurs, technical leaders, artists, and even teachers will get value from this book.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;I recommend this book to anyone interested in resilience, leadership, and team spirit.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;translated from french by Claude AI&lt;/code&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[stop outsourcing your intelligence to an llm]]></title><description><![CDATA[That's the message Leo Herzog wants to get across. He's an IT specialist working at a college in Michigan, and his little website gives us…]]></description><link>https://en.socratic.dev/stop-outsourcing-your-intelligence-to-an-llm</link><guid isPermaLink="false">https://en.socratic.dev/stop-outsourcing-your-intelligence-to-an-llm</guid><pubDate>Sun, 16 Nov 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;That&apos;s the message Leo Herzog wants to get across. He&apos;s an IT specialist working at a college in Michigan, and his little website gives us major nostalgia for those sarcastic web apps like &lt;a href=&quot;https://googlethatforyou.com/&quot;&gt;lmgtfy&lt;/a&gt; or &lt;a href=&quot;https://nohello.net/&quot;&gt;no hello&lt;/a&gt; that gently teach people who commit tech faux pas why their behavior is annoying and how to improve it to reduce friction in their communications with us.&lt;/p&gt;
&lt;p&gt;The recently launched &quot;Stop Citing AI&quot; site scratches the same itch caused by naive users of new technologies. &quot;Let me Google that for you&quot; (lmgtfy) taught newbies to use a search engine to answer their questions before bothering a friend or coworker with something Google could easily answer. Same deal with &quot;No Hello,&quot; which teaches people unfamiliar with asynchronous communication tools like Microsoft Teams or Slack that you shouldn&apos;t just ping a colleague with &quot;hello&quot; and then wait for them to respond—instead, write a complete message detailing your request right away and let them reply when they&apos;re free.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Don&apos;t copy-paste text from a chatbot and send it to someone as if its response is authoritative.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&quot;Stop Citing AI&quot; takes things a step further into the realm of argumentation theory and epistemology. Since Large Language Models and interactive tools like ChatGPT and Claude became mainstream, we&apos;ve all noticed the creeping arrival of an annoying form of intellectual laziness. Someone responding to a disagreement falls back on an LLM to get an answer that supports their position. Then they send that response to you, as if it&apos;s some kind of slam-dunk argument.&lt;/p&gt;
&lt;p&gt;Leo Herzog&apos;s website explains, in simplified terms of course, how an LLM works: it produces a sensible response by relying on statistics to predict the next word.&lt;/p&gt;
&lt;h3&gt;the degradation of critical discussion&lt;/h3&gt;
&lt;p&gt;The democratization of artificial intelligence seems to have amplified our natural tendency to &quot;want to be right&quot; rather than use our rationality to solve problems and disagreements optimally.&lt;/p&gt;
&lt;p&gt;And &quot;Stop Citing AI&quot; is first and foremost a wake-up slap we give ourselves. Those first months with ChatGPT were often great for our egos—getting responses that confirm our opinions and beliefs is fire! Today, we realize that pretty much everyone with beliefs and opinions completely contrary to ours is also getting their positions reinforced. More importantly, by learning how LLM models are produced and how they work, we give ourselves a little reality check and take LLM responses less seriously.&lt;/p&gt;
&lt;p&gt;Will I now send the URL &quot;&lt;a href=&quot;https://stopcitingai.com&quot;&gt;https://stopcitingai.com&lt;/a&gt;&quot; to someone trying to prove me wrong with a ChatGPT response?&lt;/p&gt;
&lt;p&gt;Nope.&lt;/p&gt;
&lt;p&gt;First, because it&apos;s sarcastic and probably won&apos;t help untangle our disagreement. Second, because it would reveal even greater intellectual laziness on my part and would probably just shut down the discussion.&lt;/p&gt;
&lt;p&gt;For healthy argumentation, several factors need to be in place. Both parties must genuinely want to resolve their disagreement optimally for everyone. They need to recognize first that their relationship is more important than their disagreement. The adversarial aspect where there&apos;s only a winner and a loser (zero-sum game) must be completely avoided.&lt;/p&gt;
&lt;p&gt;I&apos;d recommend first evaluating whether it&apos;s worth the effort. If it&apos;s not, and your conversation partner is showing intellectual laziness by using ChatGPT to support their position, then don&apos;t engage in the discussion.&lt;/p&gt;
&lt;p&gt;Otherwise, you need to keep your cool and recognize that a simple copy-paste of a ChatGPT response can in no way be considered an argument. The mental effort required to read and understand an AI citation compared to the effort it took your conversation partner to generate it is wildly unbalanced—don&apos;t let them act in such an outrageously unfair way.&lt;/p&gt;
&lt;p&gt;Slowing down the exchange and getting them to take responsibility for their side of the debate seems like the right strategy: &quot;Can you summarize in your own words what you just pasted here?&quot;&lt;/p&gt;
&lt;p&gt;The study of argumentation theory teaches us an important lesson: the best option is to avoid getting into argumentative debates with just anyone about just anything.&lt;/p&gt;
&lt;p&gt;First, it needs to be an issue that&apos;s worth debating.&lt;/p&gt;
&lt;p&gt;Ultimately, if someone shows laziness by serving you a copy-pasted ChatGPT
response, chances are it&apos;s not worth your time.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;translated from french by Sonnet 4.5&lt;/code&gt;&lt;/p&gt;
&lt;h3&gt;sources&lt;/h3&gt;
&lt;p&gt;&lt;a href=&quot;https://stopcitingai.com/&quot;&gt;You&apos;ve been sent here because you cited AI as a source to try to prove something.&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Why So Many Leaders Studied Philosophy]]></title><description><![CDATA[What do the founder of PayPal, the French president, and a media tycoon have in common? Peter Thiel (PayPal, Palantir), George Soros, Carl…]]></description><link>https://en.socratic.dev/why-so-many-leaders-studied-philosophy</link><guid isPermaLink="false">https://en.socratic.dev/why-so-many-leaders-studied-philosophy</guid><pubDate>Sun, 02 Nov 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;What do the founder of PayPal, the French president, and a media tycoon have in common?&lt;/p&gt;
&lt;p&gt;Peter Thiel (PayPal, Palantir), George Soros, Carl Icahn, Reid Hoffman (LinkedIn), Bill Clinton, Emmanuel Macron, Pierre Elliott Trudeau, and Rupert Murdoch — successful people in public life who, interestingly, studied philosophy.&lt;/p&gt;
&lt;p&gt;I think philosophy trains you to think about big problems at a high level of abstraction. More than a skill, it takes a kind of courage: the courage to seriously consider ideas that make us uncomfortable, or conclusions that challenge our opinions — even our identity.&lt;/p&gt;
&lt;p&gt;For the famous names above, that capacity to think clearly about fundamentals, paired with realistic, pragmatic strategy, likely helped push them to the top.&lt;/p&gt;
&lt;h3&gt;Why we are all equal (and why that causes trouble)&lt;/h3&gt;
&lt;p&gt;This is the point Thomas Hobbes makes in Leviathan, chapter 13, “Of the Natural Condition of Mankind as Concerning Their Felicity, and Misery.”&lt;/p&gt;
&lt;p&gt;People are equal.&lt;/p&gt;
&lt;p&gt;Sure, some are stronger physically. But weaker people can join forces and defeat a stronger one.&lt;/p&gt;
&lt;p&gt;Most of us think we are smarter than average — and none of us generally wants to be less smart.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“There is almost always no better sign of equality in the distribution of anything than the fact that each is content with his share.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Competition, mistrust, glory: three sources of conflict&lt;/h3&gt;
&lt;p&gt;For Hobbes, this equality explains many miseries, including war.&lt;/p&gt;
&lt;p&gt;When equals want the same limited goods, some win and some lose. That creates competition: people try to dominate others to get what they want. It creates mistrust: because equals fear for their safety, they try to protect themselves. And it creates glory: people and groups compete for ideals — honor, reputation, traditional values — which fuels conflict.&lt;/p&gt;
&lt;h3&gt;The art of navigating an imperfect world&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;“All successful businesses are different: each one acquires a monopoly by solving a unique problem. All failed businesses are the same: they didn’t escape competition.” — Peter Thiel, Zero to One&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In business, Peter Thiel is known for aiming for monopolies. In politics, Pierre Elliott Trudeau defended Canadian unity and order.&lt;/p&gt;
&lt;p&gt;Hobbes’s Leviathan proposes that only a state — a rule of law — can cure war and economic misery.&lt;/p&gt;
&lt;p&gt;Studying philosophy means daring to think about ideas that often contradict our identity. For Hobbes, that means examining the foundations of society and accepting the need to live under a strong authority.&lt;/p&gt;
&lt;h3&gt;Defending the power of the state&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;“The society must use every means at its disposal to defend itself against the emergence of a parallel power which challenges the elected authority in this country.” — Pierre Elliott Trudeau, October Crisis (1970)&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This quote shows how a philosopher-politician can apply Hobbes: in times of crisis only a centralized authority can keep order. Trudeau isn’t moralizing — he’s acting in a Hobbesian logic.&lt;/p&gt;
&lt;p&gt;But what about ordinary citizens who don’t run states?&lt;/p&gt;
&lt;h3&gt;Calm and modesty&lt;/h3&gt;
&lt;p&gt;Here’s the paradox: understanding Hobbes could make you anxious and suspicious. Yet many philosophically trained leaders seem unusually calm.&lt;/p&gt;
&lt;p&gt;The key is acceptance. When you stop expecting the world to be fair, you stop being constantly disappointed. When you accept that others keep secrets, you stop feeling personally betrayed.&lt;/p&gt;
&lt;p&gt;This clarity isn’t cynicism. It’s seeing the world as it is — and that clarity brings peace of mind.&lt;/p&gt;
&lt;h3&gt;Intellectual humility as the foundation&lt;/h3&gt;
&lt;p&gt;A university philosophy education immerses you in big thinkers: Plato in the fall, Aristotle in winter; later Aquinas, Occam, Machiavelli, Descartes, Marx, Rawls, and more.&lt;/p&gt;
&lt;p&gt;A philosophy graduate becomes comfortable juggling opposing ideas and, hopefully, gives up dogmatism and fundamentalism.&lt;/p&gt;
&lt;p&gt;That exposure builds two essential qualities: the ease of handling contradictory ideas and, crucially, epistemic modesty — the recognition that no single system holds all the truth.&lt;/p&gt;
&lt;p&gt;This blend of intellectual humility and Hobbesian clarity likely helped the people we named succeed in finance, entrepreneurship, and politics. Seeing the world as Hobbes did, they used those character traits to their advantage.&lt;/p&gt;
&lt;h3&gt;Navigating the modern state of nature&lt;/h3&gt;
&lt;p&gt;Even in modern societies some realities persist.&lt;/p&gt;
&lt;p&gt;Information is power. Be discerning: gather information, protect what you know, and be cautious about what you’re told. Rumors and hearsay are often driven by power games. Manipulation and fact distortion are common.&lt;/p&gt;
&lt;p&gt;Justice systems are slow and costly. Many social movements rely on shows of force. And acting ethically doesn’t guarantee success.&lt;/p&gt;
&lt;h3&gt;Calm realism&lt;/h3&gt;
&lt;p&gt;You can respond to these facts with cynicism or wisdom.&lt;/p&gt;
&lt;p&gt;Cynicism abandons ethics in the name of realism. Hobbesian wisdom does the opposite: keep your principles, but stop expecting the world to reward them automatically.&lt;/p&gt;
&lt;p&gt;This calm realism lets you study human psychology and history without becoming misanthropic. You can recognize power plays without joining them. You stay humble and cautious without losing the ability to engage.&lt;/p&gt;
&lt;p&gt;Hobbes gives us a liberating paradox: by accepting the world’s imperfections, we find the calm to live fully. Not resignation — a clear-eyed serenity.&lt;/p&gt;
&lt;p&gt;Maybe that’s the secret shared by Thiel, Soros, Trudeau, and Macron: a philosophical foundation that helps them navigate an imperfect world without losing themselves.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;translated from french by a mix of Claude Sonnet 3.5 and ChatGPT-4.1 &lt;/code&gt;&lt;/p&gt;
&lt;h3&gt;Sources&lt;/h3&gt;
&lt;p&gt;&lt;a href=&quot;https://plato.stanford.edu/entries/hobbes-moral/&quot;&gt;Hobbes’s Moral and Political Philosophy&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cbc.ca/player/play/video/1.3627764&quot;&gt;1970: Pierre Trudeau says &apos;Just watch me&apos; during October Crisis&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[The Ebb and Flow of Tech]]></title><description><![CDATA[Comparing the software development lifecycle (SDLC) with the tidal cycle illuminates an obscure aspect of the profession. If you live far…]]></description><link>https://en.socratic.dev/the-ebb-and-flow-of-tech</link><guid isPermaLink="false">https://en.socratic.dev/the-ebb-and-flow-of-tech</guid><pubDate>Sat, 18 Oct 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Comparing the software development lifecycle (SDLC) with the tidal cycle illuminates an obscure aspect of the profession. If you live far from the sea, then I suggest comparing it with the cycle of seasons. If you live where there are neither tides nor seasons, then you might be living in a data center!&lt;/p&gt;
&lt;h3&gt;life is beautiful on &lt;code&gt;localhost&lt;/code&gt;&lt;/h3&gt;
&lt;p&gt;For a developer, the tide is high when facing a new project. Everything moves fast and everything goes well. We don&apos;t worry too much about external libraries added to the project, or the long-term operational costs.&lt;/p&gt;
&lt;p&gt;And security is of course a detail.&lt;/p&gt;
&lt;h3&gt;when clients start using our service&lt;/h3&gt;
&lt;p&gt;The tide begins to recede as soon as we deploy this new service to production. Developers start to realize that the sea is shallower near the shores. The ship&apos;s hull gets scratched a bit when encountering the SRE team and the security team. A standardized and auditable deployment process is required. The sustainability and security of data must be ensured. SRE even demands the ability to easily rollback any new production deployment if an incident caused by a new release is detected.&lt;/p&gt;
&lt;h3&gt;scaling and the daily struggle to keep dependencies up to date&lt;/h3&gt;
&lt;p&gt;The memory of an ultra-fast system on &lt;code&gt;localhost&lt;/code&gt; is long gone. Today, slowdowns are invading your system. Managing database indexes and profiling API calls become part of your routine. Cloud costs are rising faster than your revenue.&lt;/p&gt;
&lt;p&gt;Not only that, but keeping your dependencies up to date becomes a race against time. As soon as you thought you were up to date with the latest version of kubernetes, a new minor version is released. Even worse, you&apos;re informed that the OS version used on your servers will no longer be supported in three months.&lt;/p&gt;
&lt;p&gt;The tide hits bottom when an open source project beloved by developers ends up in the hands of a conglomerate that transforms it into a monthly subscription.&lt;/p&gt;
&lt;h3&gt;a matter of perspective&lt;/h3&gt;
&lt;p&gt;What is low tide for developers is high tide for others. When small boats get stuck in the mud on the seashore, we see people in tall boots venturing far out on the shore and picking up things that please them: shells, seaweed, and stranded fish. In the tech world, these are the company owners and shareholders celebrating your system becoming more widely used and bringing money to the organization.&lt;/p&gt;
&lt;p&gt;It&apos;s a cycle we often endure without naming it. Yet recognizing it changes everything.&lt;/p&gt;
&lt;h3&gt;lessons&lt;/h3&gt;
&lt;p&gt;This tidal analogy is rich with lessons. First, our playground in technology is in perpetual motion. A few years ago, developers were in high demand and obtained comfortable salaries while telling themselves they could quit their job if circumstances ever began to displease them. Today developers are experiencing the fear, uncertainty, and doubt induced by the AI bubble; they stay in the same place longer, even if it means getting stuck in the mud of low tide.&lt;/p&gt;
&lt;p&gt;It&apos;s a matter of perspective. A new IT project is exciting for developers, but stressful for an investor. A mature, successful IT product is exhilarating for the investor, but becomes a headache for developers.&lt;/p&gt;
&lt;p&gt;Everything is changing. The main lesson is to stop thinking in absolute terms. The ideals of clean code, total freedom, and perpetual high tide are illusions. We must build while taking the tidal cycle into account: be less ambitious at high tide and less anxious at low tide. And the same goes for managers and executives: your teams&apos; level of performance and productivity will fluctuate. At high tide, you&apos;ll be able to present powerful demos during your sprint reviews. But at low tide, when most of your developers&apos; time is spent debugging intermittent problems and updating their libraries, your PowerPoint presentations might be less sexy!&lt;/p&gt;
&lt;h3&gt;actions&lt;/h3&gt;
&lt;p&gt;Your duty is to identify at what stage of the tide your industry currently sits
and at what stage of the tide your team is currently operating. Knowing that
your reality obeys a form of cycle, knowing where you currently stand has every
chance of better informing your decisions today as well as your long-term
strategy.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;translated from french by Sonnet 4.5&lt;/code&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[AI Learning Path for DevOps - A Series]]></title><description><![CDATA[First part of a series on integrating artificial intelligence into DevOps practices I believe the formalization of the DevOps engineer role…]]></description><link>https://en.socratic.dev/ai-learning-path-for-devops-a-series</link><guid isPermaLink="false">https://en.socratic.dev/ai-learning-path-for-devops-a-series</guid><pubDate>Mon, 04 Aug 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;strong&gt;First part of a series on integrating artificial intelligence into DevOps practices&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;I believe the formalization of the DevOps engineer role (or DevOps specialist) really matured alongside the rise of cloud computing.&lt;/p&gt;
&lt;p&gt;One of the key value propositions from public cloud providers was streamlining the traditional system administrator (sysadmin) role, along with related positions like network technicians. Commercial cloud platforms present themselves as pre-built resource blocks that are optimized out-of-the-box and often managed by the cloud provider under a defined SLA. The idea was that you&apos;d just need to train developers or retrain willing system administrators to bridge the gap between programmers (dev) and operations (ops).&lt;/p&gt;
&lt;p&gt;Generative artificial intelligence - AI that can generate text, code, and images - is disrupting this whole concept. The programmer&apos;s supremacy is being challenged; chunks of code can now be generated in seconds. Same goes for operations: mysterious problems can be debugged and resolved in a fraction of the time thanks to ChatGPT - it&apos;s proven.&lt;/p&gt;
&lt;h3&gt;Why are DevOps folks best positioned to become &quot;AI natives&quot;?&lt;/h3&gt;
&lt;p&gt;While DevOps isn&apos;t really a profession so much as a culture around tech products, I believe today&apos;s DevOps practitioners will be the first to become AI natives. Why?&lt;/p&gt;
&lt;p&gt;First, because DevOps people generally have an &lt;strong&gt;opportunistic mindset&lt;/strong&gt;. They love solving problems and are naturally inclined to set aside preconceptions to adopt simple, effective solutions like process automation and &quot;everything-as-code.&quot;&lt;/p&gt;
&lt;p&gt;Second, being a DevOps engineer is less about a job title and more about a state of mind. By pivoting toward AI, DevOps practitioners reinforce this mindset, which boils down to first-class pragmatism.&lt;/p&gt;
&lt;p&gt;Most importantly, &lt;strong&gt;the main objective of DevOps is the software development lifecycle (SDLC)&lt;/strong&gt;. It&apos;s about taking ideas and transforming them into products and services that add value for customers. Everything else - infrastructure-as-code, automated pipelines, collaboration with developers - these aren&apos;t ends in themselves.&lt;/p&gt;
&lt;p&gt;The primary goal is always to deliver quality products or services to people who are willing to pay to use them. And that won&apos;t change with AI.&lt;/p&gt;
&lt;h3&gt;How to pivot toward AI: a pragmatic approach&lt;/h3&gt;
&lt;p&gt;It&apos;s funny, but the idea of embracing artificial intelligence as a DevOps practitioner is still controversial. We love to mock AI suggestions &lt;strong&gt;when the real culprit isn&apos;t the tool but the person using it.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;For me, pivoting toward AI doesn&apos;t mean blindly delegating all our tasks to ChatGPT. It means first accepting this tool by learning how to use it better.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Master the art of prompt engineering&lt;/strong&gt;: Understanding how to optimize our questions to get better answers.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Develop critical judgment&lt;/strong&gt;: Knowing when to use ChatGPT and when to take time to think and carefully read the documentation.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;It&apos;s a bit like when you need to accomplish a task that takes 2 minutes once every 6 months: is a good DevOps engineer going to spend a week automating that task, or pass on it?&lt;/p&gt;
&lt;h3&gt;Technical foundations: where to start?&lt;/h3&gt;
&lt;p&gt;To learn how to better use AI, you need to start with the fundamentals.&lt;/p&gt;
&lt;p&gt;Since we like to deliver value quickly, I suggest skipping a few chapters of AI history and jumping straight into today&apos;s hot topic:&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.wikiwand.com/fr/articles/Traitement_automatique_des_langues&quot;&gt;Natural Language Processing (NLP)&lt;/a&gt; and &lt;a href=&quot;https://www.cloudflare.com/fr-fr/learning/ai/what-is-large-language-model/&quot;&gt;Large Language Models (LLMs)&lt;/a&gt;. These two concepts represent the foundation of revolutionary generative AI tools. Understanding how ChatGPT works will help us better exploit it while knowing how to manage its shortcomings.&lt;/p&gt;
&lt;h4&gt;Recommended learning resources&lt;/h4&gt;
&lt;p&gt;There&apos;s a ton of online resources for getting familiar with NLP and LLMs. From magazine articles to university courses, I&apos;d like to choose free options that include hands-on work and some form of certification.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://huggingface.co/learn/nlp-course&quot;&gt;Hugging Face&apos;s Natural Language Processing Course (free) with exams&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cloudskillsboost.google/paths/118&quot;&gt;5 Learning Activities - Introduction to Generative AI Learn Path (managed by Google Cloud) with exercises on the Vertex AI Studio platform&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;I&apos;ve proposed the idea that DevOps practitioners (or DevOps engineers) have professional traits that favor pivoting toward a world where artificial intelligence has a primary role in designing and delivering tech products and services.&lt;/p&gt;
&lt;p&gt;As a call to action, I&apos;m proposing to follow two introductory tracks offered by reputable AI organizations: HuggingFace and Google. Understanding the technology behind revolutionary tools like ChatGPT will immediately allow us to use them better and then continue our pivot by digging deeper.&lt;/p&gt;
&lt;p&gt;It&apos;s still early, but I believe we&apos;ll then study the libraries and frameworks used by industry players (e.g., TensorFlow, PyTorch, and scikit-learn), then explore data management aspects: data wrangling, ETL, and preprocessing with tools like Pandas, NumPy, and SQL. Then why not demonstrate our knowledge by diving into workflow automation for real use cases involving models and external APIs?&lt;/p&gt;
&lt;p&gt;To be continued...&lt;/p&gt;
&lt;p&gt;&lt;code&gt;translated from french by Claude Sonnet 4&lt;/code&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[What the American Film Glengarry Glen Ross Teaches Us About Strategic Listening]]></title><description><![CDATA[Knowing how to listen and understand before acting is the key to avoiding missteps and progressing, whether in sales or in life. The…]]></description><link>https://en.socratic.dev/what-the-american-film-glengarry-glen-ross-teaches-us-about-strategic-listening</link><guid isPermaLink="false">https://en.socratic.dev/what-the-american-film-glengarry-glen-ross-teaches-us-about-strategic-listening</guid><pubDate>Mon, 21 Jul 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;em&gt;Knowing how to listen and understand before acting is the key to avoiding missteps and progressing, whether in sales or in life.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;The American film &quot;Glengarry Glen Ross&quot; (1992) by David Mamet presents New York real estate brokers from a somewhat shady firm where aggressive selling is an encouraged practice. It&apos;s another cult film like &quot;Office Space&quot; (1999) by Mike Judge where the working world is illustrated in a striking way. As much as it makes us laugh, it should also be a source of learning to help us move to the next level.&lt;/p&gt;
&lt;h3&gt;What matters at work are results&lt;/h3&gt;
&lt;p&gt;This film contains gems from a distant world where competition between colleagues is not only valued but erected as a system. Playing the role of a corporate motivator, Alec Baldwin&apos;s character says out loud to a poorly performing colleague who is pouring himself a cup of coffee:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Coffee is for closers only!&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;That is to say, the coffee paid for by the employer is a reward for those who produce results. That we must be clear: it&apos;s concrete results and not efforts and long hours spent at the office that are valued here.&lt;/p&gt;
&lt;p&gt;Again, the same corporate motivator drops a bomb. The ABC of work is:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;A: Always &lt;br/&gt;
B: be &lt;br/&gt;
C: closing&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Here&apos;s another gem that makes me smile because it&apos;s so anti-socially correct. It&apos;s so raw and direct. While the working world often means hearing excuses and explanations to justify the absence of tangible results. Misery! Imagine this motivator unleashed in your workplace.&lt;/p&gt;
&lt;h3&gt;Listening to better achieve your objectives&lt;/h3&gt;
&lt;p&gt;Beyond the ruthless philosophy embodied by the main character Richard Roma played by Al Pacino lie nuggets of wisdom.&lt;/p&gt;
&lt;p&gt;Roma is a shark and he&apos;s presented as such. Despite the violence of his words, I see him as an educator. He teaches a lesson to his colleagues: the savoir-être of a highly strategic person. What&apos;s not important isn&apos;t important. And what is important, is.&lt;/p&gt;
&lt;p&gt;The nuance with which Al Pacino&apos;s character is portrayed is masterful. Having learned that a colleague signed an important contract, he stops and takes time to celebrate this victory in a sincere and attentive way. When another colleague tries to draw his attention to tortuous and fundamentally toxic aspects, he ignores him.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;You want to learn the first rule? You&apos;d know if you spent a day in your life.
Don&apos;t ever open your mouth &apos;till you know what the shot is. You&apos;re a fucking child.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Richard Roma explodes at a colleague who just made him lose an important sale. Williamson spoke without knowing the context of his relationship with his client. He assumed he understood the situation and rushed to appease this client by giving him information that had the opposite effect. Instead of comforting him, his words only increased his torment.&lt;/p&gt;
&lt;p&gt;And I&apos;m the first guilty of talking too much without taking time to listen.&lt;/p&gt;
&lt;p&gt;And that&apos;s the key to the kingdom: listening! Understanding the situation, understanding the context and listening to everything the other person has to say before speaking.&lt;/p&gt;
&lt;p&gt;Not only is interrupting others impolite, but it&apos;s harmful to you. You lose your interlocutor&apos;s respect, you bring no value to the situation, and you prevent yourself from properly understanding the situation to achieve success.&lt;/p&gt;
&lt;p&gt;Knowing how to listen and understand before acting is the key to avoiding
missteps and progressing, whether in sales or in life.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;translated from french by Claude Sonnet 4&lt;/code&gt;&lt;/p&gt;
&lt;h3&gt;Sources&lt;/h3&gt;
&lt;p&gt;&lt;a href=&quot;https://www.imdb.com/title/tt0104348/&quot;&gt;Glengarry Glen Ross (1992)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=Ey3J45ZKCM8&quot;&gt;the scene&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://ambiguityisyourfriend.com/2013/12/18/2-know-what-the-shot-is/&quot;&gt;&quot;Know what the shot is&quot;&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Scattered Spider: How to Defend Against the New Breed of Cybercriminals]]></title><description><![CDATA[“Nothing in the world is as soft and fluid as water. Yet for dissolving the hard and inflexible, nothing can surpass it.” — Tao Te Ching…]]></description><link>https://en.socratic.dev/scattered-spider-how-to-defend-against-the-new-breed-of-cybercriminals</link><guid isPermaLink="false">https://en.socratic.dev/scattered-spider-how-to-defend-against-the-new-breed-of-cybercriminals</guid><pubDate>Sun, 13 Jul 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;“Nothing in the world is as soft and fluid as water. Yet for dissolving the hard and inflexible, nothing can surpass it.” — Tao Te Ching&lt;/p&gt;
&lt;p&gt;Meet Scattered Spider—aka UNC3944, Scattered Swine, Octo Tempest, and Muddled Libra. This loose collective of young hackers from the UK, US, and Canada is rewriting the playbook for cybercrime. Law enforcement and recent arrests confirm: they’re young, native English speakers, and unlike most hacker crews, they’re spontaneous, agile, and always evolving their tactics.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;MGM Resorts International and Caesars Entertainment are just two of the hundred-plus organizations hit by cyberattacks attributed to Scattered Spider. According to indictments released Wednesday, the accused targeted at least 12 US organizations, stole data, and made off with roughly $11 million in crypto from at least 29 individuals.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;These aren’t random attacks. Scattered Spider picks its targets with surgical precision. Their main goal? Money. In 2023, they famously crippled Caesars and MGM casinos. Caesars paid a $15 million ransom; MGM refused.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Social engineering is psychological manipulation—tricking people into giving up access to systems or sensitive info.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Scattered Spider excels at social engineering. Fluent in English and tuned into local culture, these hackers are masters at impersonating employees and sweet-talking IT helpdesks into resetting passwords or bypassing multi-factor authentication (MFA).&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Vishing is a social engineering technique where attackers use phone or video calls to trick victims into revealing sensitive information.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Some sources say Scattered Spider also uses vishing, posing as IT support. In the casino attacks, they bombarded employees with SMS threats about suspended access, pushing them to call the helpdesk—where the trap was set.&lt;/p&gt;
&lt;p&gt;Social engineering gets all the headlines, but these hackers are also sharp strategists and skilled system admins. Their technical chops are real.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;SIM-swapping is a hack where attackers transfer a victim’s phone number to a SIM card they control, intercepting calls, texts, and verification codes.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Scattered Spider’s approach is shaking up the status quo for frontline defenders. Security teams, once jaded by routine attacks, are now facing a new breed. Originally, the group used SIM-swapping to steal large sums of crypto. But they don’t stop at digital tricks—they’ve been known to physically attack phone stores to snatch supervisor tablets, making SIM-swapping even easier.&lt;/p&gt;
&lt;p&gt;Today, they’re “big game hunters,” targeting tech giants (Okta, Twilio, Snowflake, LastPass), financial institutions (Visa, Transamerica, Truist Bank), and, most recently, the travel industry (Qantas).&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;[Australian airline] Qantas announced [early July 2025] that millions of customer accounts were exposed in a “major” cyberattack.&lt;/p&gt;
&lt;p&gt;The airline hasn’t confirmed Scattered Spider was behind it, but experts say the attack has their fingerprints all over it.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Scattered Spider knows modern IT systems inside out—and the usual weak spots in big organizations.&lt;/p&gt;
&lt;p&gt;Their entry point? IT staff with privileged access—senior sysadmins and execs. The helpdesk is a favorite target: it’s busy, often isolated, and vulnerable. They also exploit “MFA fatigue,” bombarding staff with authentication requests until someone lets their guard down and approves a login.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Unlike classic malware attacks, which rely on malicious files, Living Off the Land (LOTL) attacks are fileless—they use tools already present in the environment, like PowerShell, WMI, or Mimikatz.&lt;/p&gt;
&lt;p&gt;By using native tools, these attacks are much harder to detect, especially for organizations relying on traditional security solutions focused on known files or scripts. This lets hackers stay invisible for weeks, months, even years.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Once inside, Scattered Spider gets creative. They can spoof login pages to steal credentials and use LOTL tactics—leveraging what’s already on the network.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;A domain controller is a server that manages authentication and permissions for users and computers in a centralized network.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Their exploitation methods are impressive. Security experts have noted their interest in Single Sign-On (SSO) services. By cloning a victim’s Okta service on a “free trial” account, they maintain persistence and dodge detection. Similarly, they’ve been known to set up their own domain controllers, granting themselves the permissions they need.&lt;/p&gt;
&lt;p&gt;Their technical skills are amplified by agility. Their philosophy? Amoral. Motivated by profit, they show little concern for collateral damage. These young hackers form virtual communities on Telegram, sharing knowledge and refining techniques. Their punch comes from meticulous prep and ruthless inventiveness. The cultural similarity between attackers and victims is also raising eyebrows.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;A threat profile is a detailed description of potential threats an organization might face, including their capabilities, motivations, and potential impact. It helps organizations prioritize security measures by understanding who might attack, how, and what assets are at risk. Threat profiles are essential for proactive cybersecurity—they help anticipate and mitigate potential attacks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Is defending against Scattered Spider futile? Not quite—but recent incidents leave no choice for organizations that qualify as “big game.” I’m no security expert, but step one is building a threat profile. This lets you list and qualify the risks your company faces.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;MDR (Managed Detection and Response) is a managed security service where experts continuously monitor systems to detect and respond to threats.&lt;/p&gt;
&lt;p&gt;XDR (Extended Detection and Response) aggregates and analyzes data from multiple sources (email, computers, servers, etc.) for better, coordinated attack detection and response.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Some practices need to go, replaced by stronger measures:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Stop using SMS for MFA tokens.&lt;/li&gt;
&lt;li&gt;Prevent users from ever seeing or sharing their MFA codes:
&lt;ul&gt;
&lt;li&gt;Use Microsoft’s Windows Hello for Business.&lt;/li&gt;
&lt;li&gt;Use FIDO hardware keys (Yubikeys).&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Require unique passwords and use a password manager.&lt;/li&gt;
&lt;li&gt;Use certificate-based authentication (e.g., Microsoft Intune).&lt;/li&gt;
&lt;li&gt;Invest in helpdesk training—teach best practices for authenticating callers.&lt;/li&gt;
&lt;li&gt;Train all employees—if someone claims to be IT, can you verify their identity?&lt;/li&gt;
&lt;li&gt;Use brand protection services—get alerts when someone registers domains similar to yours.&lt;/li&gt;
&lt;li&gt;Plant “honey tokens” on your web pages to detect asset cloning attempts.&lt;/li&gt;
&lt;li&gt;Use darknet monitoring services.&lt;/li&gt;
&lt;li&gt;Invest in security fundamentals:
&lt;ul&gt;
&lt;li&gt;Managed Detection and Response (MDR)&lt;/li&gt;
&lt;li&gt;Extended Detection and Response (XDR)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Have a solid backup strategy and a proven disaster recovery plan.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;code&gt;translated from french by GPT-4.1&lt;/code&gt;&lt;/p&gt;
&lt;h3&gt;Sources&lt;/h3&gt;
&lt;p&gt;Matt Burgess and Lily Hay Newman (2025-07-02), &lt;a href=&quot;https://www.wired.com/story/scattered-spider-most-imminent-threat/&quot;&gt;Wired - A Group of Young Cybercriminals Poses the ‘Most Imminent Threat’ of Cyberattacks Right Now&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.gartner.com/reviews/market/brand-protection-software&quot;&gt;What is Brand Protection Software?&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.wikiwand.com/en/articles/Scattered_Spider&quot;&gt;Scattered Spider: British-American hacker group&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.8newsnow.com/news/local-news/5-defendants-linked-to-scattered-spider-hacker-group-behind-2023-mgm-caesars-cyberattacks/&quot;&gt;5 defendants linked to ‘Scattered Spider’ hacker group behind 2023 MGM, Caesars cyberattacks&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://reliaquest.com/blog/scattered-spider-cyber-attacks-using-phishing-social-engineering-2025/&quot;&gt;Scattered Spider Targets Tech Companies for Help-Desk Exploitation&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=cOwUyjXdkZ0&quot;&gt;Shaking up the Ransomware Game: Introducing Scattered Spider&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.abc.net.au/news/2025-07-02/who-are-scattered-spider-hackers-qantas-data-breach/105485674&quot;&gt;What we know about Scattered Spider, the hacker group targeting airlines&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Following: When Kant Invites Himself into a Christopher Nolan Noir]]></title><description><![CDATA[Spoiler alert! Released in 1998, "Following" is the first feature film by English director Christopher Nolan. It’s a low-budget neo-noir…]]></description><link>https://en.socratic.dev/following-when-kant-invites-himself-into-a-christopher-nolan-noir</link><guid isPermaLink="false">https://en.socratic.dev/following-when-kant-invites-himself-into-a-christopher-nolan-noir</guid><pubDate>Sat, 14 Jun 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Spoiler alert!&lt;/p&gt;
&lt;p&gt;Released in 1998, &quot;Following&quot; is the first feature film by English director Christopher Nolan. It’s a low-budget neo-noir film. Nolan later explained in interviews that he chose the film noir genre, black and white, and little-known actors to appeal to an audience not used to low-budget films.&lt;/p&gt;
&lt;p&gt;The viewer feels as if the film is speaking to them personally. Film noir has the particularity of making the plot and themes immediately engaging for the audience. The genre allows us to project our own lives and fears onto the big screen.&lt;/p&gt;
&lt;p&gt;Being accused and found guilty of a crime you didn’t commit is certainly a familiar fear. And for Bill, the main character, it’s a nightmare come true after the bad decision to follow strangers in the street to satisfy his curiosity and questionable artistic sense.&lt;/p&gt;
&lt;p&gt;&quot;Following&quot; is the story of Bill, an idle and curious writer. His misadventure begins with his decision to follow strangers in the street to experience strong emotions and satisfy an artistic curiosity. In Kantian terms: using others as a means to satisfy personal interests without their consent.&lt;/p&gt;
&lt;p&gt;Caught at his own game, Cobb, a seasoned manipulator, notices what’s going on and confronts Bill. Cobb impresses with his composure and apparent transparency. He immediately seems to trust Bill, letting him look at what he’s carrying in his sports bag.&lt;/p&gt;
&lt;p&gt;For his part, Bill stubbornly tries to justify his immoral hobby. In bad faith, he proudly shares the rules he’s set for himself to frame his amateur spying activity—rules he doesn’t actually follow.&lt;/p&gt;
&lt;p&gt;Cobb quickly introduces him to a higher level of manipulation. Barely ten minutes into the film, we see them breaking into strangers’ homes and rearranging their personal belongings more for fun than for profit. Whether for artistic interest or the pleasure of meddling in strangers’ private lives, the two clearly use their victims as mere objects to play with.&lt;/p&gt;
&lt;p&gt;Beyond his violations of Kantian morality, Bill displays one of the worst flaws detested by the ancient Greeks: impudence and presumption. He convinces himself he can break free from his mentor and claim the full powers of a new career as an artistic burglar. He has the audacity to separate from Cobb, believing he has mastered the art. Even after taking a beating from Cobb, Bill lacks the wisdom to realize his mistake.&lt;/p&gt;
&lt;p&gt;I don’t believe &quot;Following&quot; draws its roots from ancient Greece. But it does feature the common theme of a mortal trying to fly too close to the sun and being thoroughly destroyed by circumstances.&lt;/p&gt;
&lt;p&gt;Likewise, I don’t think Christopher Nolan’s work is consciously meant as an illustration of Kantian morality.&lt;/p&gt;
&lt;p&gt;From the start, by giving himself the right to follow strangers in the street, the main character commits an infraction against Kant’s categorical imperative, which commands us never to reduce others to a means for our own ends. For Bill, following strangers is exciting and has an artistic appeal for him.&lt;/p&gt;
&lt;p&gt;His encounter with Cobb accelerates the violation of Kantian morality. They give themselves the right to violate strangers’ privacy and impact their lives in unexpected ways. Cobb teaches him various psychological manipulation techniques—how to use others’ weaknesses to achieve his own goals.&lt;/p&gt;
&lt;p&gt;These discoveries excite the main character, and the gravity of his criminal experiences quickly intensifies.&lt;/p&gt;
&lt;p&gt;The punishment inflicted on the main character is Kantian retribution rather than divine justice.&lt;/p&gt;
&lt;p&gt;Kantian morality is rational. The idea of forbidding ourselves from treating others as a means to our own ends rather than as people worthy in themselves comes from reason. Reason determines that a world where everyone treats others as things to exploit would make justice and social life impossible.&lt;/p&gt;
&lt;p&gt;Through his decisions and actions, the main character has symbolically destroyed the foundation that makes it possible to trust others and be treated fairly. By treating others as tools, he opened the door to being used himself as the scapegoat for a murder he didn’t commit. He becomes a pawn in the game of someone more skillful than himself.&lt;/p&gt;
&lt;p&gt;The Kantian moral themes present in Christopher Nolan’s &quot;Following&quot; are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;autonomy&lt;/strong&gt;: Gradually, the main character denies others’ autonomy by following them in the street and then breaking into their homes.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;moral blindness&lt;/strong&gt;: The main character claims his intentions are noble. He wants to understand others and improve his art. However, intentions cannot excuse moral infractions.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;illusion of control&lt;/strong&gt;: Bill believes he’s in control and sees himself as a kind of superhuman who can change others’ lives, when in fact he’s the one being manipulated.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The greatness of &quot;Following&quot; is that the main character’s impudence is punished by the same kind of infraction he himself committed. The rational moral order defended by Kant imposes itself. By straying from the limits of rational morality, the main character becomes vulnerable to the same kind of dehumanization he practiced on others—taken to the extreme.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;translated from french by GPT-4.1 following prompt: &quot;can you translate this blog post in english? keep the same tone&quot;&lt;/code&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Action, to be effective, must be both slow and swift]]></title><description><![CDATA[Exploring the reign of Persian king Cambyses II, particularly in the context of Darius' rise, offers insights into the potential dangers of…]]></description><link>https://en.socratic.dev/action-to-be-effective-must-be-both-slow-and-swift</link><guid isPermaLink="false">https://en.socratic.dev/action-to-be-effective-must-be-both-slow-and-swift</guid><pubDate>Thu, 17 Apr 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Exploring the reign of Persian king Cambyses II, particularly in the context of Darius&apos; rise, offers insights into the potential dangers of absolute power concentrated in the hands of a single individual—and the profound consequences it had for those around him.&lt;/p&gt;
&lt;p&gt;His brief reign, from 530 to 522 BCE, is often seen as an example of the excesses of power exercised without oversight or accountability. Son of Cyrus II, Cambyses
II conquered Egypt in 525 BCE, founding the 27th dynasty. This conquest was marked
by extreme brutality. Offended by the resistance of King Psammenitus, Cambyses II
had his children humiliated and massacred, forcing them to march dressed as
slaves with nooses around their necks. He also desecrated Egyptian tombs as an
act of revenge.&lt;/p&gt;
&lt;p&gt;But his ambition didn’t stop there. He launched three failed military
expeditions against his neighbors. The first was abandoned when his Phoenician
fleet refused to attack Carthage. The second ended in tragedy: attempting to
conquer Ethiopia, Cambyses sent an army without preparation or supplies,
forcing his soldiers to resort to cannibalism as reported by Herodotus. Finally, an army sent to attack
the sanctuary of Ammon vanished in the desert, reportedly engulfed by a
sandstorm, according to the Ammonians.&lt;/p&gt;
&lt;p&gt;The end of Cambyses II’s reign is often described as being marked by erratic behavior and alleged madness. Amused by blaspheming local religious beliefs, he allegedly fatally wounded the Apis bull, a sacred Egyptian deity, and ordered the assassination of both his brother and sister.&lt;/p&gt;
&lt;p&gt;The Greek historian Herodotus presents the conspiracy of the Seven, in which
seven Persian nobles, including Darius, slaughtered the usurpers of the Persian
throne which is presented as a founding moment that sparked political reflection. It
is worth noting that shortly before his death, Cambyses II fell victim to a scheme
orchestrated by one of his trusted men: following his brother&apos;s discreet assassination, since the population was unaware of his death, he replaced him
with his own brother. Thus, this non-Persian individual became king after
Cambyses II’s death and ruled as a usurper for several years.&lt;/p&gt;
&lt;p&gt;After years of chaos and misfortune, the Persian nobility appears to have reflected on the best political system to restore Persian imperial power. They
all agreed never again to submit to the rule of a single man who could act as
he pleased without being held accountable. In any case, pride, the pursuit of
personal gain, and reckless haste are flaws inherent in such a political
situation.&lt;/p&gt;
&lt;p&gt;Herodotus’s account of the &apos;conspiracy of the Seven&apos; can be seen as
highlighting a rare but valuable idea: that of decisive and discreet action.
Unlike Cambyses II, portrayed as a madman driven by impulse, the six original
conspirators acted with caution and discretion. Darius, the seventh, took the
leadership role, convinced it would be dangerous to wait any longer—and even
riskier to include more participants in the plot. He firmly believed that even acting as a group might feel reassuring but ultimately increases risks: the wider the circle, the more fragile the secrecy.&lt;/p&gt;
&lt;p&gt;Action, to be effective, must be both slow and swift.&lt;/p&gt;</content:encoded></item><item><title><![CDATA[The Power of Prudent Uncertainty]]></title><description><![CDATA[Before interrupting someone or diving into an argumentative debate, it’s essential to pause and suspend our judgment. This article explores…]]></description><link>https://en.socratic.dev/the-power-of-prudent-uncertainty</link><guid isPermaLink="false">https://en.socratic.dev/the-power-of-prudent-uncertainty</guid><pubDate>Tue, 01 Apr 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Before interrupting someone or diving into an argumentative debate, it’s essential to pause and suspend our judgment. This article explores why this approach, far from being just an intellectual exercise, is actually the key to profound wisdom.&lt;/p&gt;
&lt;p&gt;Judgment is that mental act where we declare something to be true. It can take the form of factual judgments, like “It’s been raining since this morning,” or opinions, such as “Today is such a gloomy day.” It can also include moral, administrative, aesthetic, or even practical judgments.&lt;/p&gt;
&lt;p&gt;In all these cases, the human mind engages in a decisive evaluation between two elements. For instance, administrative judgments stem from decisions based on laws and regulations, while aesthetic judgments evaluate a work of art based on specific criteria.&lt;/p&gt;
&lt;p&gt;While relativism encourages us to accept every judgment as a subjective opinion—allowing everyone to express themselves without fear of repercussions—it also presents a trap: any sincere pursuit of truth, wisdom, or exact knowledge risks being reduced to the same level as the ramblings of an unbalanced mind.&lt;/p&gt;
&lt;p&gt;In reality, every judgment carries a claim to truth. It cuts, imposes a conclusion, and closes a debate.&lt;/p&gt;
&lt;p&gt;But before judgment is passed, everything remains open. In the legal field, this openness takes the form of investigations, pleadings, and deliberations. In science, it’s about observing, analyzing, and interpreting.&lt;/p&gt;
&lt;p&gt;Adopting this methodical yet cautious approach means acknowledging that truth exists and is worth the effort to uncover.&lt;/p&gt;
&lt;p&gt;What if, for just a moment, we put ourselves in the philosopher’s shoes? Truth would become our sole objective. We’d feel a certain disdain for trivial debates, for those discussions where everyone tries to impose their judgment, to assert their opinion on everything and nothing. Instead of scattering our judgments to the wind, we’d choose to cultivate a prudent uncertainty, to suspend our judgment, and to dedicate ourselves to deeper reflection.&lt;/p&gt;
&lt;p&gt;In truth, meditation and reflection are rewards in themselves. A mind that exhausts itself in constant judgment grows tired and diluted, while the philosopher’s mind—open and serene—finds in wonder a far more precious balance.&lt;/p&gt;
&lt;p&gt;Far from political turmoil and narcissistic speeches, we turn off our screens, embrace voluntary simplicity, practice meditation, listen more, and speak less. This return to philosophy, as an art of living, resonates in our quest for meaning.&lt;/p&gt;
&lt;p&gt;By suspending judgment, we give ourselves the chance to reap the fruits of
wisdom.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;translated from french by chatgpt4&lt;/code&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[The Question from Elon Musk That Annoys: What Did You Do Last Week?]]></title><description><![CDATA["Elon Musk threatens FBI agents and air traffic controllers with forced resignation if they do not respond to an email." Employees and the…]]></description><link>https://en.socratic.dev/the-question-from-elon-musk-that-annoys-what-did-you-do-last-week</link><guid isPermaLink="false">https://en.socratic.dev/the-question-from-elon-musk-that-annoys-what-did-you-do-last-week</guid><pubDate>Mon, 24 Feb 2025 00:00:00 GMT</pubDate><content:encoded>&lt;blockquote&gt;
&lt;p&gt;&quot;Elon Musk threatens FBI agents and air traffic controllers with forced resignation if they do not respond to an email.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Employees and the media are outraged.&lt;/p&gt;
&lt;p&gt;There is something interesting about the exercise he proposes. He asks his employees to summarize their work from the previous week in five key points and then send this report, copying their supervisor.&lt;/p&gt;
&lt;p&gt;For my part, I find the exercise relevant. In fact, I have been doing something similar for several years: every month, I fill out a sheet where I note my achievements, their impact, and the lessons I have learned. This exercise helps me take a step back from my work and skills. In the face of unexpected events, distractions, and constant changes, having an overview is enlightening.&lt;/p&gt;
&lt;p&gt;But what is the real intent behind Elon Musk’s request to U.S. government employees?&lt;/p&gt;
&lt;h3&gt;The Legendary Inefficiency of Large Organizations&lt;/h3&gt;
&lt;p&gt;Obviously, Musk seeks to demonstrate that many government employees have a limited impact on their organizations. The daily life of a white-collar worker is well-known and often mocked, whether in movies like &lt;em&gt;Office Space&lt;/em&gt; or on YouTube: endless meetings, trivial email exchanges, internal political struggles… Everything except value-creating work.&lt;/p&gt;
&lt;p&gt;His approach is brutal and intrusive, directly threatening the jobs of thousands of people. But if we set aside this threat, the exercise itself could reveal an unsettling truth: &lt;strong&gt;in many organizations, the structure of work itself prevents employees from truly working.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Large companies and administrations are often inefficient, not by accident, but &lt;strong&gt;by design&lt;/strong&gt;. Some cynics even claim that their main goal is to preserve their own structure, rather than delivering value to their clients or citizens.&lt;/p&gt;
&lt;h3&gt;Liberating Individual Contributors&lt;/h3&gt;
&lt;p&gt;How can we allow employees to escape organizational blockages?&lt;/p&gt;
&lt;p&gt;Unfortunately, it would require getting rid of those who benefit from the &lt;em&gt;status quo&lt;/em&gt;. Many executives started their careers with the desire to change the world, only to resign themselves to doing the bare minimum to keep their jobs. Some have mastered the rules of the game so well that they’ve climbed the ranks, becoming the guardians of an inefficient system.&lt;/p&gt;
&lt;p&gt;Therefore, &lt;strong&gt;eliminating the hierarchy becomes a sine qua non condition for achieving true organizational efficiency.&lt;/strong&gt; But resistance is strong: those who benefit most from these dysfunctions are the executives and senior management, never the individual contributors.&lt;/p&gt;
&lt;h3&gt;Self-Organization: An Effective Alternative&lt;/h3&gt;
&lt;p&gt;Tech companies have proven that it is possible to achieve goals without a heavy hierarchy. Before being co-opted by large corporations, the &lt;em&gt;Agile&lt;/em&gt; philosophy promoted simple and effective principles for designing software.&lt;/p&gt;
&lt;p&gt;A striking example is &lt;strong&gt;Valve&lt;/strong&gt;, the video game publisher. In this company, there is no formal hierarchy. Employees are free to choose the projects they want to work on and who they want to collaborate with. Better yet, they are encouraged to launch their own initiatives!&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;A self-organized team has the autonomy to decide, as a group, how its members will work together, who is responsible for decisions, and the concrete steps to achieve its goals.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Another similar approach is &lt;strong&gt;&quot;Mission Command&quot;&lt;/strong&gt;. Originating in the military, this philosophy is based on the idea that subordinates must receive clear objectives but have considerable autonomy in achieving them.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;The ability to assign tasks to subordinates with minimal explicit instructions is a key element of &lt;strong&gt;&apos;Mission Command&apos;&lt;/strong&gt;, adopted by several Western armies. This approach allows great flexibility in dynamic situations, exploiting opportunities through the creativity of subordinates and their understanding of the immediate situation, without requiring new orders.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Challenging rigid hierarchies and ineffective bureaucracy may be what most bothers people about Elon Musk’s approach.&lt;/p&gt;
&lt;h3&gt;When a Question Becomes a Problem&lt;/h3&gt;
&lt;p&gt;If the simple question &lt;em&gt;&quot;What did you do last week?&quot;&lt;/em&gt; causes so much discomfort, it is probably a sign of an environment riddled with inefficiency.&lt;/p&gt;
&lt;p&gt;In fact, rather than targeting government employees, Musk could simply ask the same question to the directors of government agencies. That would be enough:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Dear directors, what did you do last week?&lt;/p&gt;
&lt;p&gt;List five key points and send a copy to all your employees.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;h3&gt;Sources&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://lucidspark.com/fr/blog/fonctionnement-d-une-equipe-auto-organisee&quot;&gt;How and Benefits of a Self-Organizing Team&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://steamcdn-a.akamaihd.net/apps/valve/Valve_Handbook_LowRes.pdf&quot;&gt;Valve: Handbook For New Employees&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.canada.ca/en/army/services/line-sight/articles/2022/12/mission-command-problem-bounding-or-problem-solving.html&quot;&gt;Mission Command: Problem Bounding or Problem Solving?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded></item><item><title><![CDATA[Ensuring Security: Investigating Changes in ODROID LinuxFactory Package Origins]]></title><description><![CDATA[Every week-end or so, I like to update my linux servers to keep them patched
and secure. They are ARM64 single-board computers manufactured…]]></description><link>https://en.socratic.dev/ensuring-security-investigating-changes-in-odroid-linuxfactory-package-origins</link><guid isPermaLink="false">https://en.socratic.dev/ensuring-security-investigating-changes-in-odroid-linuxfactory-package-origins</guid><pubDate>Sun, 26 Jan 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Every week-end or so, I like to update my linux servers to keep them patched
and secure. They are ARM64 single-board computers manufactured by Korean
hardware manufacturer ODROID. I use them for a variety of use-cases such as
media server, NAS, and sandbox environments for personal projects. Even though
I am the only user of this system, I need it to be secure.&lt;/p&gt;
&lt;p&gt;As most GNU/Linux user, I&apos;m guilty of mostly blindly trusting the OS&apos; built-in
package manager. It is however a crucial aspect to take into consideration to
keep a system safe. Since commands like &lt;code&gt;apt upgrade&lt;/code&gt; or &lt;code&gt;apk add&lt;/code&gt; are executed
as &lt;code&gt;root&lt;/code&gt;, we must pay extra attention when we are issuing these commands.&lt;/p&gt;
&lt;p&gt;Relying on a package manager to install and manage our dependencies is a great
way to stay safe. We basically delegate to package maintainers the
responsibility to accept or refuse to distribute packages. Using a package
manager is already a step-above, security-wise, manually installing packages
downloaded from the Internet&lt;/p&gt;
&lt;p&gt;Package management is assured by knowledgeable and reliable people.
They are expert in managing packages dependencies to avoid conflicts or
problems.&lt;/p&gt;
&lt;p&gt;During last upgrade, I ran across an unusual message such as&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;E: The repository &quot; &lt;a href=&quot;http://ppa.linuxfactory.or.kr/&quot;&gt;http://ppa.linuxfactory.or.kr/&lt;/a&gt; bookworm InRelease &quot; has
changed its &quot; Origin &quot; value from &quot; Dongjin Kim &amp;#x3C;tobetter(at)gmail.com&gt; &quot; to &quot;
LinuxFactory &quot;.&lt;/p&gt;
&lt;p&gt;N: This must be fully accepted before updates from this repository can be
applied. Please refer to the manual pages &quot; apt-secure(8) &quot; for more details.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;My first thought was that maybe a malicious actor tried to take control of the
upstream I use to keep my Odroid machines up-to-date. That was the
appropriate level of paranoia to display in order to stay safe. I cancelled my
upgrade plans until I could be confident this change in APT upstream was
legitimate.&lt;/p&gt;
&lt;h3&gt;validate APT trusted keys&lt;/h3&gt;
&lt;p&gt;The first thing I did was to validate that the cryptographic signature chain used by APT to verify the upstream repository&apos;s authenticity was intact. Executing command
&lt;code&gt;apt-key list&lt;/code&gt; will list currently trusted keys by the APT package management
system. Or better, since &lt;code&gt;apt-key&lt;/code&gt; is deprecated: checking keys in
&lt;code&gt;/etc/apt/trusted.gpg.d/&lt;/code&gt; is also useful. The key used by the maintainer listed as &quot;Origin&quot;
hadn&apos;t change.&lt;/p&gt;
&lt;p&gt;Knowing that the maintainers were still using the same key was a relief. The
change in &quot;Origin&quot; was concerning since it could yield a potential risk of the
repository being compromised or hijacked.&lt;/p&gt;
&lt;h3&gt;search public information about the change or contact the package maintainer&lt;/h3&gt;
&lt;p&gt;To conclude my investigations, I browsed the manufacturer&apos;s public
forum &lt;a href=&quot;https://forum.odroid.com/index.php&quot;&gt;ODROID by Hardkernel&lt;/a&gt; for news about
this change.&lt;/p&gt;
&lt;p&gt;Since it was not mentionned, I emailed the maintainer who kindly confirmed he was the
origin of the change and that I could trust the change. Which I doubly
appreciate since it is right now a long holidays in asian countries for
the Lunar New Year 2025 (Wednesday January 29th 2025).&lt;/p&gt;
&lt;blockquote&gt;
&lt;pre&gt;&lt;code class=&quot;language-bash&quot;&gt;Dear &amp;#x3C;my name&gt;,

The repository had been update a couple of days ago by me and I can confirm the
the server is not hacked at all, just change the repository name to LinuxFactory
which is my domain.

Best regards,
Dongjin Kim.
&lt;/code&gt;&lt;/pre&gt;
&lt;/blockquote&gt;
&lt;h3&gt;sources of information&lt;/h3&gt;
&lt;p&gt;&lt;a href=&quot;https://labex.io/tutorials/linux-how-to-verify-and-secure-apt-package-authentication-418175&quot;&gt;How to Verify and Secure Apt Package
Authentication&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.elastic.co/guide/en/security/current/suspicious-apt-package-manager-execution.html&quot;&gt;Suspicious APT Package Manager Execution&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://security.stackexchange.com/questions/119742/is-the-linux-debian-software-and-package-management-ecosystem-secure&quot;&gt;Is the Linux / Debian software and package-management ecosystem secure?&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[What is similar to the Tao is destined for success.]]></title><description><![CDATA["The Taoist tradition is one of the three pillars, along with Confucianism and Buddhism, of Chinese thought. This philosophy appeals to our…]]></description><link>https://en.socratic.dev/what-is-similar-to-the-tao-is-destined-for-success</link><guid isPermaLink="false">https://en.socratic.dev/what-is-similar-to-the-tao-is-destined-for-success</guid><pubDate>Thu, 09 Jan 2025 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&quot;The Taoist tradition is one of the three pillars, along with Confucianism and Buddhism, of Chinese thought. This philosophy appeals to our Western minds partly because it is not colored by traumatic episodes from our childhood and also because of its intrinsic flexibility: it readily lends itself to interpretations that align with our personal opinions.&quot;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;To govern a great kingdom, one must imitate someone cooking a small fish.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;The eminent master refrains from words&lt;/p&gt;
&lt;p&gt;And when his work is accomplished and his task fulfilled,&lt;/p&gt;
&lt;p&gt;the people say: &quot;This comes from myself&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In philosophy, addressing politics as the relationship of power between human beings was a way to convey practical wisdom while integrating it into an explanation of the world that could satisfy our quest for meaning.&lt;/p&gt;
&lt;p&gt;The &lt;em&gt;Book of the Principle and Its Action&lt;/em&gt;, by the founder of Taoism, challenges our intellectual reflexes based on common sense and habitual beliefs. The Tao is the nature of everything: it is empty, silent, and boundless. &apos;The Tao, when accumulated, becomes effective.&apos; In short, everything that acts like the Tao is destined for success, while that which strays from it moves toward failure.&lt;/p&gt;
&lt;p&gt;The ultimate principle of the Tao is non-action. Thus, it is said that a ruler who governs a state discreetly, without forcing the people and without multiplying decrees and laws, is destined for success. Conversely, one who is restless and agitated is heading toward ruin.&lt;/p&gt;
&lt;p&gt;The same applies to anyone who seeks to lead others to achieve their goals. By
adopting Taoist principles, their work will be crowned with success. Moreover,
all those who supported them will eventually believe that their actions and
decisions came from themselves (and not from the master).&lt;/p&gt;
&lt;p&gt;&lt;code&gt;translated by ChatGPT&lt;/code&gt;&lt;/p&gt;
&lt;h3&gt;sources&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://fr.wikisource.org/wiki/Tao_Te_King_(Stanislas_Julien)/Chapitre_60&quot;&gt;Lao-Tseu, Tao-tö king, LX&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Jean Levi, &quot;Han-Fei-tse ou le Tao du Prince&quot;, chapitre &quot;Commentaire de Lao tse&quot;&lt;/li&gt;
&lt;/ul&gt;</content:encoded></item><item><title><![CDATA[2024 Reading List]]></title><description><![CDATA[My Book of the Year - Project Hail Mary by Andy Weir, narrated by Ray Porter Project Hail Mary by Andy Weir, narrated by Ray Porter in its…]]></description><link>https://en.socratic.dev/2024-reading-list</link><guid isPermaLink="false">https://en.socratic.dev/2024-reading-list</guid><pubDate>Tue, 31 Dec 2024 00:00:00 GMT</pubDate><content:encoded>&lt;h3&gt;My Book of the Year - &lt;em&gt;Project Hail Mary&lt;/em&gt; by Andy Weir, narrated by Ray Porter&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;Project Hail Mary&lt;/em&gt; by Andy Weir, narrated by Ray Porter in its English audiobook version, is a science fiction novel that might appeal even to those, like me, who aren’t particularly fond of the genre.&lt;/p&gt;
&lt;p&gt;The story is remarkably well-constructed, with a narrative about an improbable and unprecedented friendship.&lt;/p&gt;
&lt;p&gt;It’s actually the most recommended audiobook on Reddit, and rightfully so.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Ryland Grace is the sole survivor of a desperate mission, a last-ditch effort. If he fails, humanity and Earth itself will perish.&lt;/p&gt;
&lt;p&gt;Except right now, he doesn&apos;t know that. He doesn&apos;t even remember his own name, let alone the nature of his mission or how to complete it.&lt;/p&gt;
&lt;p&gt;All he knows is that he’s been asleep for a very, very long time. And he’s just woken up to discover he&apos;s millions of miles from home, with only two dead bodies for company.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Dan Davies, &lt;em&gt;The Unaccountability Machine: Why Big Systems Make Terrible Decisions&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;I read this book by English economist &lt;a href=&quot;https://profilebooks.com/contributor/dan-davies/&quot;&gt;Daniel Davies&lt;/a&gt; on the recommendation of a friend I met online.&lt;/p&gt;
&lt;p&gt;At first glance, I was expecting a scathing critique of the big corporations on which our lives depend. I was ready for my disillusionment with these giants to be reignited.&lt;/p&gt;
&lt;p&gt;Instead, it was a fascinating introduction to economic and political cybernetics, a powerful framework for understanding power dynamics within modern organizations.&lt;/p&gt;
&lt;h4&gt;Cybernetics&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;[...]Control theory as it is applied to complex systems. Cybernetics is
associated with models in which a monitor compares what is happening to a
system at various sampling times with some standard of what should be
happening, and a controller adjusts the system’s behaviour accordingly.&lt;/p&gt;
&lt;p&gt;The term cybernetics comes from the ancient Greek word kybernetikos (“good at steering”), referring to the art of the helmsman.&lt;/p&gt;
&lt;p&gt;Source: &quot;&lt;a href=&quot;https://www.britannica.com/science/cybernetics&quot;&gt;cybernetics&lt;/a&gt;&quot; - Britannica&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Chris Dixon, &lt;em&gt;Read Write Own: Building the Next Era of the Internet&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;This book addresses a major issue that Web 3.0 technologies aim to solve: &lt;em&gt;ensuring ownership without relying on central authorities&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Distributed systems based on blockchain are often ridiculed due to financial bubbles or fraud in the sector. Yet, behind this smoke screen are legitimate use cases, where these technologies play a crucial role.&lt;/p&gt;
&lt;p&gt;I recommend this book to any technologist looking to contribute to &quot;the next big tech innovation.&quot;&lt;/p&gt;
&lt;h3&gt;Vijay Boyapati, &lt;em&gt;The Bullish Case for Bitcoin&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;Probably the best explanation of Bitcoin and why you should care about it or steer clear of it.&lt;/p&gt;
&lt;h3&gt;Peter Frankopan, &lt;em&gt;The New Silk Road: The Asia and the Remaking of the World Order&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;As a Westerner, this book opened my eyes to what’s happening in the rest of the world economically.&lt;/p&gt;
&lt;h3&gt;Gérard Chauvy, &lt;em&gt;L&apos;Abwehr: 1939-1945 le Service Secret en France&lt;/em&gt;&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;Working with spies is like playing tennis without seeing your opponent, while
never being sure if you’re really being served a tennis ball&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The Abwehr was the Nazi Germany’s military intelligence service, responsible for espionage and counter-espionage, active from 1920 to 1945.&lt;/p&gt;
&lt;p&gt;How do foreign intelligence services operate? Not at all like in a James Bond&apos;s movie.&lt;/p&gt;
&lt;p&gt;This well-documented book explores the profiles of individuals working for foreign intelligence services, how their operations are funded, and the extent of the damage they cause to the societies they infiltrate.&lt;/p&gt;
&lt;h3&gt;Joseph Cox, &lt;em&gt;Dark Wire&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;A great read for tech enthusiasts with a taste for the illegal.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;In 2018, a powerful secure communication app called Anom took root among organized criminals. They thought Anom allowed them to do business in the shadows. Except one thing: it was secretly run by the FBI.&lt;/p&gt;
&lt;p&gt;The covert access to Anom and a series of related investigations allowed U.S., Australian, and European authorities to closely observe the world of criminals. Smugglers, money launderers, hitmen, a sprawling global economy... But as the FBI began to lose control of Anom, did the agency go too far?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Haruki Murakami, &lt;em&gt;Absolutely on Music: Conversations with Seiji Ozawa&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;I started reading this more for the author, Haruki Murakami, than for the subject: internationally renowned conductor Seiji Ozawa.&lt;/p&gt;
&lt;p&gt;The book is a series of captivating interviews where we discover the complex role of a conductor. I was fascinated by the personalities and flaws of some maestros, who remain deeply human despite their exceptional talent.&lt;/p&gt;
&lt;h4&gt;Carlos Castaneda, &lt;em&gt;The Devil&apos;s Grass and the Little Smoke&lt;/em&gt;&lt;/h4&gt;
&lt;p&gt;A rereading of a fantastic tale that had deeply captivated me during my adolescence. A mystical and fascinating journey into the depths of perception and reality.&lt;/p&gt;
&lt;h4&gt;Dany Laferrière, &lt;em&gt;A Certain Art of Living&lt;/em&gt;&lt;/h4&gt;
&lt;p&gt;A booklet of poetry by our immortal Quebecois&lt;/p&gt;
&lt;p&gt;Truly unpretentious, the ideas are expressed with disarming simplicity. These poems create an intimate connection between the reader and the author, a silent but deep dialogue.&lt;/p&gt;
&lt;h4&gt;Dostoevsky, &lt;em&gt;Crime and Punishment&lt;/em&gt;&lt;/h4&gt;
&lt;p&gt;Another rereading that’s worth coming back to.&lt;/p&gt;
&lt;p&gt;It’s common to hear that &lt;em&gt;Crime and Punishment&lt;/em&gt;, like other 19th-century doorstop novels, is an intimidating read, even unapproachable. Nothing could be further from the truth, in my experience:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;The story is fascinating&lt;/strong&gt;, especially the complex psychology of the characters.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;The novel is divided into short chapters&lt;/strong&gt; (10 to 20 pages), perfect for a daily reading session of about an hour.&lt;/li&gt;
&lt;li&gt;Finally, &lt;strong&gt;immersion in this narrative is far more rewarding&lt;/strong&gt; than binge-watching videos on the internet.&lt;/li&gt;
&lt;/ol&gt;
&lt;h4&gt;Scott Paterson, &lt;em&gt;Chaos Kings: How Wall Street Traders Make Billions in the New Age of Crisis&lt;/em&gt;&lt;/h4&gt;
&lt;p&gt;A book I don’t remember reading in detail... A reread is definitely in order for 2025.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;A seasoned Wall Street Journal journalist explores the world of billionaire traders and high-risk crisis forecasters trying to turn extreme events into financial opportunities.&lt;/p&gt;
&lt;p&gt;There’s no doubt our world has become more extreme. Pandemics, climate change, superpower rivalries, technological disruptions, political radicalization, religious fundamentalism: all threats creating chaos that puts trillions of dollars in assets at risk. But around the world, in a variety of disciplines, super-forecasters are trying to eliminate uncertainty in what was once thought of as pure randomness. Some place their faith in “black swans” – unpredictable and catastrophic events that can’t be anticipated but send exotic financial instruments into extremely profitable directions. The most famous of this group of high-stakes traders are the ones managing the Universa fund, who, during extreme upheaval days, have made up to a billion dollars.&lt;/p&gt;
&lt;p&gt;Author Scott Patterson gained exclusive access to Universa’s strategists and met with sharp-minded visionaries in various fields, from earthquake prediction to counterterrorism to climatology, to see if it’s really possible to bet on catastrophes – and win. Captivating, relevant, and revealing, this book is a must-read for anyone questioning how some investors today turn disasters into profits.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4&gt;Seth Rogen, &lt;em&gt;Yearbook&lt;/em&gt;&lt;/h4&gt;
&lt;p&gt;A hilarious book! Best enjoyed in audiobook form, read by Seth Rogen himself,
who adds an inimitable touch to his stories.&lt;/p&gt;
&lt;p&gt;His stoner laughter is priceless&lt;/p&gt;
&lt;h4&gt;Patrick Bringley, &lt;em&gt;All the Beauty in the World: The Metropolitan Museum of Art and Me&lt;/em&gt;&lt;/h4&gt;
&lt;p&gt;A fascinating stay in the life stories of a museum guard in New York City. A unique perspective on art and everyday life in an iconic place.&lt;/p&gt;
&lt;h4&gt;Eliyahu M. Goldratt, &lt;em&gt;The Goal&lt;/em&gt;&lt;/h4&gt;
&lt;p&gt;For fans of the novel &lt;em&gt;The Phoenix Project&lt;/em&gt;, this book is a must-read!&lt;/p&gt;
&lt;p&gt;In &lt;em&gt;The Goal&lt;/em&gt;, you&apos;ll discover the counter-intuitive truths of the Theory of Constraints, an essential lesson for improving any workflow, whether in technology or elsewhere.&lt;/p&gt;
&lt;h4&gt;Tom Segura, &lt;em&gt;I&apos;d Like to Play Alone, Please: Essays&lt;/em&gt;&lt;/h4&gt;
&lt;p&gt;Another hilarious read! A must-listen audiobook read by Tom Segura himself, to fully enjoy his sharp humor.&lt;/p&gt;
&lt;h4&gt;Christopher Hadnagy, &lt;em&gt;Social Engineering, 2nd Edition&lt;/em&gt;&lt;/h4&gt;
&lt;p&gt;A practical guide for becoming a social engineering security professional&lt;/p&gt;
&lt;p&gt;This book taught me a lot about vulnerabilities to psychological manipulation attempts&lt;/p&gt;
&lt;p&gt;Becoming aware of your weaknesses is always a step in the right direction&lt;/p&gt;
&lt;h4&gt;Olivier Boisvert-Magnen, &lt;em&gt;Jean Leloup: Moments of Lucidity&lt;/em&gt;&lt;/h4&gt;
&lt;p&gt;I thought I knew everything about Jean Leloup... but not at all!&lt;/p&gt;
&lt;p&gt;This book is full of fascinating and touching stories about this unique artist, as well as the talented musicians who have accompanied him since the 1980s.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;As Hubert Lenoir so aptly puts it in his preface: Jean Leloup is a
superhero. He appears and disappears, no one knows where he is or what he
will do today, or tomorrow. He speaks his own accent, because he
comes from his own country, his own planet. A unique figure in the
history of Quebec’s music, it was high time a book worthy of him was
written. Moments of Lucidity is an exploration of Leloup’s discography,
the most influential and irreverent of our singer-songwriters over the last four decades.&quot; (summary)&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;Michel Tremblay, &lt;em&gt;Dear Chekhov&lt;/em&gt;&lt;/h3&gt;
&lt;p&gt;End the year on a high note with a play by our national playwright.&lt;/p&gt;
&lt;p&gt;This text illustrates the rivalries of a family of actors during a family meal.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;translated from french by Chatgpt&lt;/code&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Zoomers are talking: can you understand them?]]></title><description><![CDATA[(updated with new words: garbo) Youth always had its own private language. In my younger days, I remember moving to a new city and…]]></description><link>https://en.socratic.dev/zoomers-are-talking-can-you-understand-them</link><guid isPermaLink="false">https://en.socratic.dev/zoomers-are-talking-can-you-understand-them</guid><pubDate>Tue, 15 Aug 2023 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;(updated with new words: garbo)&lt;/p&gt;
&lt;p&gt;Youth always had its own private language. In my younger days, I remember moving to a new city and discovering kids my age used an array of unknown expressions to me. Quick! Better learn them fast. A common language defines a community and offers a feeling of belonging. Nowadays the community is global and youth shares thru Internet a common idiom older folks don&apos;t understand.&lt;/p&gt;
&lt;p&gt;And they couldn&apos;t care less.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Is it because the witness expresses himself so badly? There is another explanation. It&apos;s not because, uneasy, he poorly expresses himself that you don&apos;t understand him; it is because you won&apos;t understand him that he expresses himself so poorly.&quot;
&lt;cite&gt;-- Elie Wiesel, foreword to &quot;Night&quot;(1960)&lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;boujee&lt;/strong&gt;: english rendition of the french word &quot;bourgeois&quot;. It refers to
someone or something that is high-class, luxury, or materialistic.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;brekkie/din din&lt;/strong&gt;: familiar words referring to meals; meaning &quot;breakfast&quot; and &quot;dinner&quot;.
&quot;brekkie&quot; is an australian slang term that has spread worldwide. &quot;Din din&quot; is
a familiar word used between friends or family to refer to the evening meal.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;bussin&apos;&lt;/strong&gt;: adjective used to describe something that is perceived as
extraordinary good. Usually talking about food.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;cap&lt;/strong&gt;: a cap is a lie.  When someone wants to emphasize they are serious
and they are telling the truth, they will often say: &quot;No cap&quot;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;dank&lt;/strong&gt;: used in the context of memes. Adjective used to describe a good
meme; especially a terrible meme that is so terrible it is good. Prevalent on
imageboards like Reddit and 4chan.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;fam&lt;/strong&gt;: an affectionate way to refer to a friend. Can be used instead of
&quot;bro&quot; or &quot;sis&quot;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;garbo&lt;/strong&gt;: something is judged totally bad; short way to say &quot;garbage&quot;: &quot;This
car is totally trash. It&apos;s garbo&quot;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;poggers&lt;/strong&gt;: &quot;poggers refers to a specific emoticon available on Twitch which depicts a surprised-looking Pepe the Frog. The word “poggers” is used to express excitement during a game when something exciting occurs.&quot; You can use this word instead of &lt;strong&gt;based&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;yeet&lt;/strong&gt;: &quot;Yeet is an exclamation of excitement, approval, surprise, or all-around energy, often as issued when doing a dance move or throwing something.&quot;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;zoomer&lt;/strong&gt;&lt;/em&gt;: &quot;Refers to members of Generation Z and is a play on the term &quot;Boomer,&quot; which refers to members of the Baby Boomer generation. The term Zoomer is also in reference to the fast-paced upbringings members of Generation Z are characterized to have due to the fast advances in technology and culture that has been happening around them as a result of the interconnectivity of the American and Global populations because of the ubiquity of internet-connected smart phones and social media.&quot;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;boomer&lt;/strong&gt;&lt;/em&gt;: &quot;a boomer is anyone who&apos;s older than you and is either complaining about younger generation, saying he hates his wife, or just believes in outdated beliefs about any subject. It can also be someone who doesn&apos;t know modern slang very well, or uses it in a &quot;non-cool&quot; way (not in a way that zoomer would use it) [A person] who wants things to go back to the way they were.&quot;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;chad&lt;/strong&gt;&lt;/em&gt;: &quot;The term originated in Chicago and originally referred in a derogatory way to call a young urban American man, typically single and in his twenties or early thirties. The term was later appropriated in incel forums to refer to sexually active &quot;alpha males&quot;. Within the manosphere, Chads are viewed as constituting the top decile in terms of genetic fitness. In online animation drawings in the manosphere, a Chad is further tagged with the last name Thundercock and is often depicted as muscular with a very pronounced crotch bulge. One such depiction, in the &apos;Virgin vs. Chad&apos; internet meme of the late 2010s, displayed the head of Chad in the same shape as the borders of the country of the same name.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;based&lt;/strong&gt;&lt;/em&gt;: &quot;Agreeable. Admirable. Worthy of support. Often used in contexts where the action or opinion ignores popular trends and social conventions or requires special effort. Used either seriously or tongue-in-cheek to encourage eccentric behavior for comedic effect.&quot;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;cringe&lt;/strong&gt;&lt;/em&gt;: &quot;When someone acts/ or is so embarrassing or awkward , it makes you feel extemely ashamed and/or embarrassed.&quot;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;manlet&lt;/strong&gt;&lt;/em&gt;: &quot;The term some males who feel inferior to another shorter male use. Typically the &quot;manlet,&quot; would have a very attractive girlfriend/wife , will have a better physique, more money etc. and be more attractive over all. The taller male will then look for any flaws in there POV to hilight in the other male to raise there own self esteem.&quot;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;incel&lt;/strong&gt;&lt;/em&gt;: &quot;aka &quot;involuntarily celibate&quot;, a person (usually male) who has a horrible personality and treats women like sexual objects and thinks his lack of a sex life comes from being &quot;ugly&quot; when its really just his blatant sexism and terrible attitude. incels have little to no self awareness; even when they see other &quot;ugly&quot; men with girlfriends, they consider these men to be tricksters who have somehow beat the system and can get women despite being cursed with unattractiveness (in other words, theyre respectful to women and women are attracted to their personalities, but incels cant comprehend such a phenomenon). they believe that women owe them sex, and many of the more extreme incels like to spend time in incel communities on the internet coming up with ways to make women have sex with them (often involving genocide of people of color, genocide of &quot;Chads&quot; (men who have sex), taking rights away from women, raping them, having sex with women&apos;s dead bodies, and other horrid, disgusting things. they cant understand that that is PRECISELY why women want nothing to do with them).&quot;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;IT&apos;S OGRE (it&apos;s over)&lt;/strong&gt;: an expression of hopelessness among incels. Usually
about a negative characteristic judged to be responsible for their lack of
success in love.&lt;/p&gt;
&lt;p&gt;obviously, this expression is very niche. I heard it a couple of times online
without being able to understand what it meant. Even asking younger people,
it was hard to extract a definition from them; a definition richer than
saying &quot;it&apos;s over&quot;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;simp&lt;/strong&gt;&lt;/em&gt;: &quot;Someone who does way too much for a person they like. Someone who will say anything to please someone, particularly a girl, in the hopes that they will be in good favor with that person.&quot;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;red-pilled&lt;/strong&gt;&lt;/em&gt;: &quot;A reference to the matrix used in politics. &quot;You take the blue pill, the story ends. You wake up in your bed and believe whatever you want to believe. You take the red pill, you stay in Wonderland, and I show you how deep the rabbit hole goes.&quot; Usually means that a Liberal has become more right winged.&quot;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;rizz&lt;/strong&gt;: Short for &quot;charisma&quot;. Refers to someone&apos;s attractiveness; their
seduction skills.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;doge&lt;/strong&gt;&lt;/em&gt;: &quot;A very popular meme of a Shiba Inu dog with a strange look on his face. It went viral all over the internet. Now Doge is a dog meme. Most pictures of Doge are accompanied by words, usually the following: so, very, wow, much, such, and many.&quot;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;cope&lt;/strong&gt;&lt;/em&gt;: &quot;A cope or coping mechanism, is a psychological strategy whereby someone rejects a harsh truth, and adopts a less disturbing belief instead. It is a term often used my looksmaxing incels to indicate that a given strategy is invalid or ineffective.&quot;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;shu shu&lt;/strong&gt;: Another way to say &quot;shit&quot; or &quot;shitty&quot; without being impolite.
When something is bad, one can say it is &quot;shu shu&quot;. Example: &quot;This movie was
shu shu&quot;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;smol&lt;/strong&gt;: affectionate way to say something is &quot;small&quot;. Implies that thing is
also very cute.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;sus&lt;/strong&gt;: short for &quot;suspicious&quot; and &quot;suspect&quot;. Became popular by people
playing online video game &quot;Among us&quot; during the Covid pandemic.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;amogus&lt;/strong&gt;: In a meme congtext: a clever way to say &quot;sus&quot;. Obviously refers to online video game &quot;Among us&quot;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;tea(spilling/sipping)&lt;/strong&gt;: refers to gossips and gossiping. While &quot;spilling
the tea&quot; means to talk behind someone&apos;s back. &quot;Sipping tea&quot; means to listen
to gossips without actively participating into spreading rumors.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;*bonus : &lt;strong&gt;baste&lt;/strong&gt; is a portmanteau word; a mix of &apos;based&apos; and &apos;namaste&apos;.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Most definitions were &apos;top definition&apos; from _Urban Dictionary_&lt;/code&gt;&lt;/p&gt;
&lt;h5&gt;sources&lt;/h5&gt;
&lt;p&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Chad_(slang)&quot;&gt;https://en.wikipedia.org/wiki/Chad_(slang)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.urbandictionary.com/&quot;&gt;https://www.urbandictionary.com/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://parade.com/1293898/marynliles/gen-z-slang-words/&quot;&gt;https://parade.com/1293898/marynliles/gen-z-slang-words/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://incels.wiki/w/It%27s_over&quot;&gt;https://incels.wiki/w/It%27s_over&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/List_of_Generation_Z_slang&quot;&gt;https://en.wikipedia.org/wiki/List_of_Generation_Z_slang&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Bloomberg Terminal: the Ultimate Software-as-a-Service]]></title><description><![CDATA[In technology, one can either innovate or imitate others. Bloomberg Terminal: tens of thousands of dollars per month per user This "software…]]></description><link>https://en.socratic.dev/bloomberg-terminal-the-ultimate-software-as-a-service</link><guid isPermaLink="false">https://en.socratic.dev/bloomberg-terminal-the-ultimate-software-as-a-service</guid><pubDate>Thu, 12 Jan 2023 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;In technology, one can either innovate or imitate others.&lt;/p&gt;
&lt;h2&gt;Bloomberg Terminal: tens of thousands of dollars per month per user&lt;/h2&gt;
&lt;p&gt;This &quot;software as a service&quot; (SaaS) enjoys undeniable success despite the fact
that it is neither &quot;user friendly&quot; nor highly polished. Above all, it does not promise a
superior user experience (UX) despite its sky-high price.&lt;/p&gt;
&lt;p&gt;Sold at a high price since the early 1980s, the Bloomberg Terminal is a
resounding commercial success.&lt;/p&gt;
&lt;p&gt;I believe that every technologist should familiarize themselves with this product in order
to acquire a more accurate vision of the ingredients necessary for a
tech product commercial success.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Bloomberg terminals are one of the main product offerings from Bloomberg L.P.
They are one of the most heavily used and highly regarded professional
investment systems to be created for the financial marketplace. Institutional
investors are the typical customers of this product since the relatively high
ongoing cost makes it unfeasible for individual investors with relatively
small amounts of capital to purchase.
&lt;br&gt;&lt;br&gt;
The system provides news, price quotes, and messaging across its proprietary
secure network. It is well-known among the financial community for its black
interface, which is not optimized for user experience but has become a
recognizable trait of the service. It&apos;s not uncommon to see Bloomberg&apos;s
rather bland visuals carried into their television station, although they
round their media empire out with visually rich content in their flagship
magazine Bloomberg Businessweek. . &lt;br&gt;&lt;br&gt;
&lt;cite&gt;Investopedia, &quot;What Is a Bloomberg Terminal? Functions, Costs, and Alternatives&quot;, &lt;a href=&quot;https://www.investopedia.com/terms/b/bloomberg_terminal.asp&quot;&gt;https://www.investopedia.com/terms/b/bloomberg_terminal.asp&lt;/a&gt;&lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;value in tech&lt;/h2&gt;
&lt;p&gt;From an economic point of view, the ultimate objective of the technologist is to create
value for the customer for whom a product or service is intended.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The subjective theory of value is an economic theory which proposes the idea
that the value of any good is not determined by the utility value of the
object, nor by the cumulative value of components or labour needed to produce
or manufacture it, but instead is determined by the individuals or entities
who are buying or selling the object in question. This trend is often seen in
collectable items such as cars, vinyl records, and comic books. The value of
an object may have increased substantially since its creation or original
purchase due to age, a personal affinity, or scarcity.
&lt;br&gt;&lt;br&gt;&lt;cite&gt;Wikipedia, &quot;Subjective theory of value&quot;, &lt;a href=&quot;https://www.wikiwand.com/en/Subjective_theory_of_value&quot;&gt;https://www.wikiwand.com/en/Subjective_theory_of_value&lt;/a&gt;&lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In crude terms, we say that value is what makes the user
willing to pay to use a service or product.&lt;/p&gt;
&lt;h2&gt;SaaS - Software as a Service&lt;/h2&gt;
&lt;p&gt;The &quot;on demand&quot; software model combines the interests of software developers
and their end-users.&lt;/p&gt;
&lt;p&gt;A customer agrees to pay for their software as long as it brings them value.
Otherwise the deal is off.&lt;/p&gt;
&lt;p&gt;The &quot;SaaS&quot; model associated with cloud computing democratizes the market for
ambitious solo developers. More and more small teams of developers, even
solo developers, go a part of the business, and market products of high quality.&lt;/p&gt;
&lt;p&gt;Cloud computing and SaaS model democratize access to tech market.&lt;/p&gt;
&lt;h2&gt;how can Bloomberg inspire ambitious developers?&lt;/h2&gt;
&lt;p&gt;I believe that the notion of value is at the heart of the lesson we must draw from
success of the Bloomberg terminal.&lt;/p&gt;
&lt;p&gt;Michael Bloomberg started the project following his dismissal from his
employer. Armed with a solid knowledge of the financial sector, he invested his
savings in the development of softwared catering to the financial world.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;In 1981, Michael Bloomberg was fired from Salomon Brothers. He was given no
severance package, but owned $10 million worth of equity as a partner at the
firm. Using this money, Bloomberg, having designed in-house computerized
financial systems for Salomon, set up a data services company named
Innovative Market Systems (IMS) based on his belief that Wall Street would
pay a premium for high-quality business information, delivered
instantaneously on computer terminals in a variety of usable formats. The
company sold customized computer terminals that delivered real-time market
data, financial calculations and other analytics to Wall Street firms. At
first, the machine was called the Market Master terminal, but later became
known as the Bloomberg Terminal or simply &quot;The Bloomberg&quot;. The terminal was
released to market in December 1982. Merrill Lynch became the company&apos;s first
customer, purchasing a 30% stake in IMS for $30 million in exchange for a
five-year restriction on marketing the terminals to Merrill Lynch&apos;s
competitors. In 1984, Merrill Lynch released IMS from the restriction.
&lt;br&gt;&lt;br&gt;
&lt;cite&gt;Wikipedia, &quot;Bloomberg Terminal&quot;, &lt;a href=&quot;https://www.wikiwand.com/en/Bloomberg_Terminal&quot;&gt;https://www.wikiwand.com/en/Bloomberg_Terminal&lt;/a&gt;&lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;conclusion&lt;/h2&gt;
&lt;p&gt;By way of conclusion, I will absolutely not be original. I repeat here
what any pragmatic technologist already know.&lt;/p&gt;
&lt;p&gt;The moral of the Bloomberg Terminal&apos;s success is that business domain knowledge is crucial for the success of any technology project.&lt;/p&gt;
&lt;p&gt;Technical skills are less and less crucial to the success of a
technology project.&lt;/p&gt;
&lt;p&gt;There is no need to reinvent the wheel. Most computer problems have already
been resolved. There are countless reusable code libraries that one can leverage. Architectural patterns that hold water are taught to
budding system architects. Cloud providers offer
turnkey development platforms allowing us to deploy a new project in
production in a short time.&lt;/p&gt;
&lt;p&gt;In technology, one can either innovate or imitate others.&lt;/p&gt;
&lt;p&gt;No one has ever been fired for imitating others.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;translation from french by google translate&lt;/code&gt;&lt;/p&gt;
&lt;h2&gt;sources&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Understanding the Bloomberg Terminal: &lt;a href=&quot;https://www.youtube.com/watch?v=0FGZvgf8kf8&quot;&gt;https://www.youtube.com/watch?v=0FGZvgf8kf8&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Bloomberg: The Financial Search Engine : &lt;a href=&quot;https://www.youtube.com/watch?v=ZyOcrzFsb00&quot;&gt;https://www.youtube.com/watch?v=ZyOcrzFsb00&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;How Does The Bloomberg Terminal Work? | How To Use A Bloomberg Terminal For Trading : &lt;a href=&quot;https://www.youtube.com/watch?v=ZFHfjhV4mIg&quot;&gt;https://www.youtube.com/watch?v=ZFHfjhV4mIg&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.wikiwand.com/en/Bloomberg_Terminal&quot;&gt;https://www.wikiwand.com/en/Bloomberg_Terminal&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded></item><item><title><![CDATA[Software Bill of Materials: document your software supply chain]]></title><description><![CDATA[An SBOM is the dependency graph of software so that you can
identify what is in its supply chain. I have already opened the door to the…]]></description><link>https://en.socratic.dev/software-bill-of-materials-document-your-software-supply-chain</link><guid isPermaLink="false">https://en.socratic.dev/software-bill-of-materials-document-your-software-supply-chain</guid><pubDate>Thu, 27 Oct 2022 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;An SBOM is the dependency graph of software so that you can
identify what is in its supply chain.&lt;/p&gt;
&lt;p&gt;I have already opened the door to the idea that software developers
draw inspiration from the physical product development process in a post
published in December 2021: &lt;a href=&quot;https://en.socratic.dev/take-inspiration-from-the-physical-product-development-process&quot;&gt;Take inspiration from the physical product development process&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Since then, I have been on the lookout for any publication that supports this opinion.&lt;/p&gt;
&lt;p&gt;The concept of &quot;bill of materials&quot; or &quot;BOM&quot; is fundamental in the industry
manufacturing. This is the list of materials required for crafting
of a physical product. This list of ingredients is useful in different aspects
design, production and service associated with the product during its
useful life.&lt;/p&gt;
&lt;p&gt;The idea of ​​a &quot;Software BOM&quot; or &quot;SBOM&quot; is gaining traction in
the software sphere. That is to say an exhaustive list of all
components (libraries, binaries, etc.) necessary for a software product.&lt;/p&gt;
&lt;h2&gt;what is a BOM&lt;/h2&gt;
&lt;p&gt;&quot;BOM&quot; is the acronym for &quot;bill of materials&quot;.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;A bill of materials or product structure (sometimes bill of material, BOM or associated list) is a list of the raw materials, &gt;sub-assemblies, intermediate assemblies, sub-components, parts, and the quantities of each needed to manufacture an end product. A BOM &gt;may be used for communication between manufacturing partners or confined to a single manufacturing plant. A bill of materials is often &gt;tied to a production order whose issuance may generate reservations for components in the bill of materials that are in stock and &gt;requisitions for components that are not in stock.
&lt;cite&gt;&lt;a href=&quot;https://www.wikiwand.com/en/Bill_of_materials)(2022-10-27)&quot;&gt;https://www.wikiwand.com/en/Bill_of_materials)(2022-10-27)&lt;/a&gt;, &quot;Bill of materials&quot;&lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;Software Bill of Materials&lt;/h2&gt;
&lt;p&gt;The form and content of an SBOM is analogous to the traditional industry BOM
manufacturer. It is a list or inventory of all the dependencies of a
software system deployed in production:&lt;/p&gt;
&lt;p&gt;Open-source libraries and subsystems from a third-party source.
Their versions. The application status of the patches. And their license to use.&lt;/p&gt;
&lt;h2&gt;US government leading the pack&lt;/h2&gt;
&lt;p&gt;Solarwinds attack discovered in December 2020 targeted multiple agencies
American public authorities, several private organizations as well as
foreign institutions.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;In early 2020, hackers secretly broke into Texas-based SolarWind&apos;s systems and added malicious code into the company&apos;s software system. The system, called &quot;Orion,&quot; is widely used by companies to manage IT resources. Solarwinds has 33,000 customers that use Orion, according to SEC documents.&lt;/p&gt;
&lt;p&gt;Most software providers regularly send out updates to their systems, whether it&apos;s fixing a bug or adding new features. SolarWinds is no &gt;exception. Beginning as early as March of 2020, SolarWinds unwittingly sent out software updates to its customers that included the &gt;hacked code. .
&lt;cite&gt;Business Insider.com, &quot;Solarwinds hack explained&quot;&lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The U.S. government recently introduced an executive order requiring the
production of &quot;SBOM&quot; for any software product developed by a
sub-contractor.&lt;/p&gt;
&lt;h2&gt;December 2021 - log4j&lt;/h2&gt;
&lt;p&gt;Less than 1% of organizations document their supply chains
software.&lt;/p&gt;
&lt;p&gt;Shortly before the start of the holidays last year, most operators of
computerized systems have
had to work extra hard to address a critical vulnerability
discovered in the popular logging bookstore
&lt;a href=&quot;https://theconversation.com/what-is-log4j-a-cybersecurity-expert-explains-the-latest-internet-vulnerability-how-bad-it-is-and-whats-at-stake-173896&quot;&gt;log4j&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This is the world of IT without SBOM. Lots of stress and lots of work
manual.&lt;/p&gt;
&lt;p&gt;The few players with sound management of their supply chain
handled the situation calmly and rigorously. They knew exactly on which systems
they used the log4j library. While their colleagues were scanning
dozens of servers, they had already patched their systems!&lt;/p&gt;
&lt;h2&gt;basic steps&lt;/h2&gt;
&lt;p&gt;The development and adoption of a common standard for the &quot;Software Bill Of
Materials&quot; is fundamental to make the software supply chain more transparent. A standard format to facilitate
the exchange of information would be a great first step.&lt;/p&gt;
&lt;p&gt;Then, we must automate the generation of the SBOM. At each deployment we
must generate a new SBOM. More and more organizations are deploying
production several times a day. So it goes without saying that the generation of
SBOM takes place in the Continuous Deployment and Continuous delivery (CI/CD) processes.&lt;/p&gt;
&lt;h2&gt;arguments against SBOM?&lt;/h2&gt;
&lt;p&gt;&quot;Why wouldn&apos;t you want to know what your software systems are
compounds? What are the advantages of not being able to inform your customers about
what does the software you sell them contain?&lt;/p&gt;
&lt;p&gt;We quickly fall into the absurd.&lt;/p&gt;
&lt;p&gt;Having an up-to-date SBOM on hand will save you hundreds of hours of
work. Will allow you to have safer products and
easy to evolve.&lt;/p&gt;
&lt;p&gt;In addition to reducing your operating costs, keep employee retention in mind,
reducing their stress; the reduction of the feeling of powerlessness of your IT employees towards
systems that they do not understand and are unable to change.&lt;/p&gt;
&lt;h2&gt;sources&lt;/h2&gt;
&lt;p&gt;&lt;a href=&quot;https://malicious.life/episode/episode-183/&quot;&gt;https://malicious.life/episode/episode-183/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.cisa.gov/sbom&quot;&gt;https://www.cisa.gov/sbom&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.wikiwand.com/en/Bill_of_materials&quot;&gt;https://www.wikiwand.com/en/Bill_of_materials&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.businessinsider.com/solarwinds-hack-explained-government-agencies-cyber-security-2020-12&quot;&gt;https://www.businessinsider.com/solarwinds-hack-explained-government-agencies-cyber-security-2020-12&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Reinventing the wheel and changing the world]]></title><description><![CDATA[The world of software development celebrates innovators. Those who
challenge preconceptions and venture into uncharted waters. But the…]]></description><link>https://en.socratic.dev/reinventing-the-wheel-and-changing-the-world</link><guid isPermaLink="false">https://en.socratic.dev/reinventing-the-wheel-and-changing-the-world</guid><pubDate>Mon, 15 Aug 2022 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;The world of software development celebrates innovators. Those who
challenge preconceptions and venture into uncharted waters.&lt;/p&gt;
&lt;p&gt;But the development world also supports conformists and
sloths.&lt;/p&gt;
&lt;p&gt;Many dogmas are also erected to comfort the developers
ways to persist the status quo:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;a good programmer is a lazy programmer&lt;/li&gt;
&lt;li&gt;don&apos;t reinvent the wheel&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;But we wouldn&apos;t have the opportunity to have our lives made easier by these tools without the risks and
the strokes of genius of innovators who bet on starting from scratch.&lt;/p&gt;
&lt;h2&gt;René Descartes and the Method&lt;/h2&gt;
&lt;p&gt;René Descartes (1592-1650) is considered the father of modern philosophy. After studying in a respected Jesuit college, he broke away from the
tradition and old books to contribute to the progress of sciences such as
optics and geometry. He refused to submit to the
principle of authority and rejected blind respect for philosophical tradition.&lt;/p&gt;
&lt;p&gt;He published the &lt;em&gt;Discourse on the Method&lt;/em&gt;, written in french, in 1637. At that time, the language of
scholars was Latin. French was the language of the uneducated people.&lt;/p&gt;
&lt;p&gt;Why write to be read by ordinary people?&lt;/p&gt;
&lt;p&gt;Descartes maintained that every human had enough common sense to
discover the truth for themselves. As long a sound method to
to direct ones mind is followed, progress in knowledge is assured.&lt;/p&gt;
&lt;p&gt;By writing this little treatise in popular language, Descartes demonstrates his
confidence in his method of directing his mind to true knowledge.&lt;/p&gt;
&lt;p&gt;To discover the truth, he invites the reader to doubt everything. Not to take
any opinion for certain unless one has examined it closely.&lt;/p&gt;
&lt;p&gt;The method begins with a methodical doubt. Absolute skepticism. But temporary skepticism.&lt;/p&gt;
&lt;p&gt;If nothing is certain, not even what I see or what I can touch, on
what fundamental certainty can I establish on my journey towards
knowledge ?&lt;/p&gt;
&lt;p&gt;I think. The evidence that a mind is thinking and doubting is the most certain
thing in the world.&lt;/p&gt;
&lt;p&gt;Thus Descartes inaugurated modern philosophy. A way of thinking no longer centered
on the things of the world, but on the mind that thinks and knows. Sure,
it&apos;s interesting to know biology, for example. But no science is more important
than knowing the thinking mind.&lt;/p&gt;
&lt;p&gt;Our mind is the fundamental unit of everything
our knowledge.&lt;/p&gt;
&lt;h2&gt;David Heinemeier Hansson and Ruby on rails&lt;/h2&gt;
&lt;p&gt;David Heinemeier Hansson (DHH) is a well-known figure among web developers. He
is the creator of the famous framework &lt;a href=&quot;https://rubyonrails.org&quot;&gt;Ruby on rails&lt;/a&gt;.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Ruby on Rails, also called RoR or Rails, is a free web framework written in Ruby. It follows the model-view-controller design pattern. It offers a structure that allows you to develop quickly and intuitively.&lt;/p&gt;
&lt;p&gt;&lt;cite&gt;Wikipedia, &quot;Ruby on rails&quot;&lt;/cite&gt;&lt;p&gt;
&lt;/blockquote&gt;
&lt;p&gt;A bit like for Descartes, the development of a credible web framework was
felt as a necessity for &lt;em&gt;DHH&lt;/em&gt;. As a web developer, his goal
was building web applications faster and easier. His experience with
existing technologies were still just as frustrating to him.&lt;/p&gt;
&lt;p&gt;The guiding idea behind &lt;em&gt;Ruby on rails&lt;/em&gt; was to foster a positive experience to the developers building their web application. He relied on
his developer experience to release a polished framework that could be
understood and appreciated by all developers.&lt;/p&gt;
&lt;h3&gt;sole master on board&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;[...] I took it into my head to consider that often there is not so much perfection
in works composed of several parts, and made by hand from various
masters, than in those for whom only one has worked.&lt;/p&gt;
&lt;p&gt;&lt;cite&gt;Descartes, &quot;Discourse on Method&quot;, second part&lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;At the beginning of the adventure, &lt;em&gt;DHH&lt;/em&gt; did not authorize any other
contributor to make commits to the project. According to him, we must leave the
vision of the project get established before letting other programmers
contribute. The risk
to ruin a codebase by too hasty collaboration is too big.&lt;/p&gt;
&lt;h2&gt;conclusion&lt;/h2&gt;
&lt;p&gt;I do not believe that one can dismiss out of hand the accusation of
&quot;reinventing the wheel&quot;. It is better to use existing tools than building ours
from scratch. In the majority of circumstances,
other developers have experienced challenges similar to ours. Solutions
often more effective and elegant than our attempts are readily available online. Most programming languages ​​have built-in tools for
perform typical operations.&lt;/p&gt;
&lt;p&gt;Descartes and David Heinemeier first experienced the absence of a satisfactorysolution as
primary drivers of their projects. They have this in common that no solution
existed to fulfill their visions.&lt;/p&gt;
&lt;p&gt;Moreover, by creating a new system of thought or a new framework of
web development, vision is paramount.&lt;/p&gt;
&lt;p&gt;We can afford to reinvent the wheel if our vision promises considerable
progress compared to the &lt;em&gt;status quo&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;translated from french by Google translate&lt;/code&gt;&lt;/p&gt;
&lt;h2&gt;sources&lt;/h2&gt;
&lt;p&gt;&lt;a href=&quot;https://thisdeveloperslife.com/post/1-0-5-homerun&quot;&gt;https://thisdeveloperslife.com/post/1-0-5-homerun&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://thisdeveloperslife.com/post/1-0-7-audacity&quot;&gt;https://thisdeveloperslife.com/post/1-0-7-audacity&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Skip Level One-on-Ones]]></title><description><![CDATA[Skip level One-on-Ones is not a new idea in the workplace's realm.
But I had never heard of it until today. Even the concept of One-on-Ones…]]></description><link>https://en.socratic.dev/skip-level-one-on-ones</link><guid isPermaLink="false">https://en.socratic.dev/skip-level-one-on-ones</guid><pubDate>Thu, 28 Jul 2022 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;em&gt;Skip level One-on-Ones&lt;/em&gt; is not a new idea in the workplace&apos;s realm.
But I had never heard of it until today.&lt;/p&gt;
&lt;p&gt;Even the concept of &lt;em&gt;One-on-Ones&lt;/em&gt; between an Individual Contributor (IC) and his
manager was new to me until I joined the organization to
which I have been working for about a year.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;One-on-One&lt;/em&gt; is a regular meeting between an employee and his manager. This
is not an evaluation of employee performance. It&apos;s a
time dedicated to the employee to discuss with his manager his ideas, his
ambitions and challenges at work.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Ninety minutes of your time can enhance the quality of your subordinate&apos;s work for two weeks, or for some eighty-plus hours&quot;
&lt;cite&gt;Andy Grove - former CEO and Intel co-founder&lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;Skip level One-on-Ones&lt;/h2&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;A skip level one-on-one is a meeting where you — as a senior manager, VP, or CEO — meet with people who within your or who aren&apos;t direct reports. They are a way for you to get more visibility into the day-to-day work that&apos;s happening and how your managers are doing.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The idea for a senior executive to meet with front-line employees
regularly seems unrealistic. However, it is mentioned that at &lt;em&gt;Netflix&lt;/em&gt;,
of senior executives are able to meet more than 100 annually
individual contributors.&lt;/p&gt;
&lt;p&gt;Among management gurus, one maintains that it is a sound investment. It is said that it is by seeing the portion of time that a frame
superior devotes to an aspect of the organization that we understand what is
important to him.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;I&apos;m comfortable stating that not having skip level 1 on 1s is abdicating your responsibility as someone who manages a manager.&quot; &lt;cite&gt;propos d&apos;un
One manager [&apos;lighthouse blog&apos;] spoke to even went as far as saying this above&lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;Risks&lt;/h2&gt;
&lt;p&gt;Adopting the practice of &lt;em&gt;skip level One-on-One&lt;/em&gt; is not without risks. Not
only, this practice requires planning and requires more work. This practice breaks with the commonly accepted &apos;Chain of command&apos; culture; A hierarchical, almost military vision of the workplace. We must therefore anticipate discomfort on the part of contributors
individuals who do not have the opportunity to discuss frankly with senior
direction. Especially if they suspect and abhor the inherent politics of
any interaction unrelated to their day-to-day work performance.&lt;/p&gt;
&lt;p&gt;Are the managers under your leadership going to feel their role restored?
question?&lt;/p&gt;
&lt;p&gt;As an individual contributor, can I get into trouble
talking openly with a senior executive?&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;https://external-preview.redd.it/DLICHXRC9RFFKCP-_mABVV0-wDdfF7aa_rABiAZDYnU.jpg?auto=webp&amp;#x26;s=fc064dd54322cbb2535d7eed723de94b11b6435c&quot; alt=&quot;initiative&quot;&gt;&lt;/p&gt;
&lt;h2&gt;Advantages&lt;/h2&gt;
&lt;p&gt;The individual contributor role is to contribute to the success of his team and
organization. The role of the manager is to ensure the best performance
of his team. And senior manager&apos;s role (manager of managers) is to
develop the leadership skills of its managers. Ensure the
culture and desired behaviors within their department.&lt;/p&gt;
&lt;p&gt;According to Ben Horowitz, partner at the &lt;em&gt;VC&lt;/em&gt; firm Andreessen Horowitz, the role
of a CEO is to improve the communication architecture and the flow of
information within his organization.&lt;/p&gt;
&lt;p&gt;Meeting on a cyclical basis with individual contributors allows senior
leaders to know what is going on in their organization.&lt;/p&gt;
&lt;p&gt;It&apos;s an investment that pays off.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Allows the senior executive to help their managers grow by offering them mentorship;&lt;/li&gt;
&lt;li&gt;Allows teams to improve by knowing their objectives and challenges;&lt;/li&gt;
&lt;li&gt;Gives the opportunity to recognize and encourage good moves;&lt;/li&gt;
&lt;li&gt;Reduce the rate of staff turnover by detecting and remedying
dissatisfaction that cannot be addressed by their immediate superior.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;What would socraticDev discuss at a Skip Level One-on-One?&lt;/h2&gt;
&lt;p&gt;First, it is as an individual contributor that it would take place 😀&lt;/p&gt;
&lt;p&gt;I would take a moment with a senior leader in my organization to
exchange information.&lt;/p&gt;
&lt;p&gt;Of course, I would be happy to discuss the projects that are close to my heart.&lt;/p&gt;
&lt;p&gt;Above all, I would take the opportunity to ask questions about the health of the projects in
Classes. On the obstacles to come. On what the success of a project or a
product means to him/her.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;translated from french by Google Translate&lt;/code&gt;&lt;/p&gt;
&lt;h5&gt;sources&lt;/h5&gt;
&lt;p&gt;&lt;a href=&quot;https://getlighthouse.com/blog/skip-level-meetings-one-on-ones/&quot;&gt;https://getlighthouse.com/blog/skip-level-meetings-one-on-ones/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://softskills.audio/2022/07/25/episode-314-that-guy-and-how-to-skip-level/&quot;&gt;https://softskills.audio/2022/07/25/episode-314-that-guy-and-how-to-skip-level/&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Neuromancer, part 4]]></title><description><![CDATA[(final update: sunday july 10th 2022) part four - The Straylight Run Case and Molly executes their mission: a run in Tessier-Ashpool's Villa…]]></description><link>https://en.socratic.dev/neuromancer-part-4</link><guid isPermaLink="false">https://en.socratic.dev/neuromancer-part-4</guid><pubDate>Sun, 03 Jul 2022 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;(final update: sunday july 10th 2022)&lt;/p&gt;
&lt;h2&gt;part four - The Straylight Run&lt;/h2&gt;
&lt;p&gt;Case and Molly executes their mission: a run in Tessier-Ashpool&apos;s Villa Straylight. It becomes clear who their employer is: Wintermute. Wintermute is an AI trying to increase its power. By law, AI are not supposed to be autonomous. By getting humans into situations, Wintermute defies the law to achieve its goal.&lt;/p&gt;
&lt;h3&gt;chapter 13 - Turing, you are under arrest!&lt;/h3&gt;
&lt;p&gt;Back to his hotel, Case gets arrested by the three French &quot;teenagers&quot; he had noticed earlier. They are not teenagers, but members of the Turing police. A law enforcement agency dedicated to enforce laws linked to artificial intelligence (AI).&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;They explain he is under arrest and the charges &apos;have to do with conspiracy to augment an artificial intelligence&apos;.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;While being escorted outside his hotel, the police agents get attacked and killed by various elements of the urban landscape. Case escapes. He knows it was Wintermute setting him free.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Michèle, Pierre, and Roland escort Case out of the hotel. As they walk across a footbridge, an autonomous microlight swings down out of the sky, partially decapitating Pierre. Case makes a break for it, and although Roland chases after him, a gardening robot falls from a tree, killing him as well.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;chapter 14 - the chinese virus&lt;/h3&gt;
&lt;p&gt;Case and Molly start the mission.&lt;/p&gt;
&lt;p&gt;Dixie encourages Case to use a virus: the chinese virus.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Back in the matrix, Dixie explains the virus to Case. It’s a slow virus, so slow the ice won’t even notice it.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Trying to jack into Molly, Case is blocked by Finn/Wintermute. They teach Case how to make the mission a success.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;The Finn/Wintermute explains that the head is a “ceremonial terminal,” and that Molly needs to speak the “right word at the right time,” when the virus has made it deep into the system. The virus is necessary, but without the magic word, the mission will not be completed. Wintermute doesn’t know the word, and can never know the word. After it’s spoken, he will cease to exist.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Finn/Wintermutre informs Case, before letting him leave, that Armitage is starting to lose his mind.&lt;/p&gt;
&lt;h3&gt;chapter 15 - in the Villa Straylight&lt;/h3&gt;
&lt;p&gt;Case is finally able to connect to Molly. While moving around the Villa Straylight, she tells him the story of Johnny. Johnny was her boyfriend. She found him dead at her place. The Yakuza had him killed as a vengeance because she had killed one of their men.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;I knew Johnny was up there. But this little guy, he caught my eye, as he was coming out. Didn&apos;t say a word. We just looked at each other and I knew. Plain little guy, plain clothes, no pride in him, humble. He looked at me and got into a pedicab. I knew. Went upstairs and Johnny was sitting in a chair by the window, with his mouth a little open, like he&apos;d just thought of something to say.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Molly never had another boyfriend after Johnny.&lt;/p&gt;
&lt;p&gt;Molly enters a room where a man was. His name was Ashpool. Molly was interrupting his suicide attempt. By alcohol and pills.&lt;/p&gt;
&lt;p&gt;Ashpool keeps Molly in respect by pointing a gun at her. He explains he had been frozen for the last 30 years. Villa Straylight computer system had woken him up. In turn he had his daughter, Jane, unfrozen.&lt;/p&gt;
&lt;p&gt;During his explanation he fell asleep. Molly took his gun. Exploring the room, she discovers he had killed Jane as she lay dead in his bed.&lt;/p&gt;
&lt;p&gt;Molly takes out her fletcher, puts it in single dart mode, and kills Ashpool with a shot between the eyes.&lt;/p&gt;
&lt;h3&gt;chapter 16 - Armitage losing his mind&lt;/h3&gt;
&lt;p&gt;Case gets a call from Armitage. He is next door, in his ship. Armitage sounds like he had lost his mind. He questions Case about Wintermute: &quot;Does he appear as General Girling?&quot;.&lt;/p&gt;
&lt;p&gt;Molly&apos;s broken leg is starting to hurt.&lt;/p&gt;
&lt;p&gt;Maelcum receives an order from Zion to abandon the mission and come back. He offers Case to bring him back to Zion. But Case refuses to abandon Molly.&lt;/p&gt;
&lt;p&gt;Connected to Dixie, Case learns that another Tessier-Ashpool heir, 8Jean, is alive in Australia. He was to fly back to Freeside having learned about Ashpool&apos;s death. His arrival would coincide with the moment when the chinese virus, Kuang, would have had breached Tessier-Ashpool&apos;s core.&lt;/p&gt;
&lt;p&gt;Armitage/Corto video calls another time. He is acting up, wanting to escape. He thinks he is in an airplane and can eject above Finland. He is truly delirious.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Case screams and even cries, but he’s unable to do anything. Maelcum, checking a wall monitor, tells Case that Corto is gone. The hatch separating the escape pod from the rest of the ship was slightly open, meaning that it shouldn’t have been able to eject, given it would not be airtight and Corto would die. However, Wintermute overrode the ejection failsafe, allowing Corto to launch even though it was unsafe.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Wintermute killed Armitage. Letting him eject into space.&lt;/p&gt;
&lt;h3&gt;chapter 17 - goodbye Molly&lt;/h3&gt;
&lt;p&gt;Armitage gone, Case worries about the toxin sacs attached into his body. Wintermute assures him it will take care of it after the mission&apos;s over.&lt;/p&gt;
&lt;p&gt;After the mission&apos;s over, Wintermute will disappear by fusionning into a greater being. Who/what? Wintermute doesn&apos;t know yet.&lt;/p&gt;
&lt;p&gt;Hurt, Molly walks around Straylight. She encounters various holograms generated by Riviera.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Molly continues down the hallway, passing more holograms—scenes of torture, monsters, and finally a little diorama that Molly has to bend down to see. In it, a cluster of feral children surround a soldier, feeding on him. Disgusted, Molly stands. She recognizes now more than ever how disturbed Riviera is, but also that his dysfunction is what drew 3Jane to him and convinced her to let him into her fortress. &quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Molly continues to walk. She approaches a gash in the wall of the tunnel: the entrance to 3Jane’s world. She raises her hand to her mouth and kisses it—a goodbye kiss to Case. Then she descends the staircase.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;chapter 18 - Molly fails at the mission&lt;/h3&gt;
&lt;p&gt;Molly fails at the mission of getting the magic word out of 3Jane. Molly collapsed entering 3Jane&apos;s lair. Riviera had joined force with 3Jane. So Molly is basically held captive by him and Hideo, 3Jane&apos;s bodyguard.&lt;/p&gt;
&lt;p&gt;Case, Maelcum and Finn/Wintermute have to take matter into their own hands and be there when 3Jane will have to utter the secret word to the automaton head.&lt;/p&gt;
&lt;p&gt;They have to act fast because 8Jean, the other living Tessier-Ashpool heir, will soon be back to the Villa Straylight.&lt;/p&gt;
&lt;h3&gt;chapter 19 - the master&apos;s return&lt;/h3&gt;
&lt;p&gt;Case and Maelcum take advantage of the Villa&apos;s staff expecting their master, 8Jean, returns. They easily get the hatch&apos;s door opened since the staff thought it would be their master&apos;s ship docking.&lt;/p&gt;
&lt;p&gt;On her end, Molly still tries to get the word out of 3Jane. No success.&lt;/p&gt;
&lt;h3&gt;chapter 20 - back to Linda&lt;/h3&gt;
&lt;p&gt;Case jacks in a different reality. He ends up on a beach, on gray sand. He finds a woman sleeping. She is Linda: his former girlfriend.&lt;/p&gt;
&lt;p&gt;Case realizes this world is a simulation generated by the other AI; not Wintermute.&lt;/p&gt;
&lt;h3&gt;chapter 21 - refuse the illusion&lt;/h3&gt;
&lt;p&gt;On the beach, Case meets the other AI: Neuromancer. It embodied the shape of a boy. Neuromancer invites Case to stop his mission and stay within &lt;em&gt;it&lt;/em&gt;, with Linda.&lt;/p&gt;
&lt;p&gt;Case refuses.&lt;/p&gt;
&lt;h3&gt;chapter 22 - everyone together&lt;/h3&gt;
&lt;p&gt;Case and Maelcum reaches 3Jane&apos;s lair. They are confronted by Hideo who shoots arrows at them. Maelcum gets injured from one.&lt;/p&gt;
&lt;p&gt;3Jane and the crew move toward the Villa&apos;s core.&lt;/p&gt;
&lt;p&gt;Without Riviera who had been poisonned by 3Jane.&lt;/p&gt;
&lt;h3&gt;chapter 23 - at the core&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Case flips into Molly’s simstim; Molly is choking 3Jane to get her to say the code. Case jacks out. He turns towards 3Jane and tells her to give them the code. He threatens her, warning her that if she doesn’t give up the code, she’ll be trapped in Straylight forever, and nothing will ever change for her.&quot; &lt;cite&gt;&lt;a href=&quot;https://www.litcharts.com/lit/neuromancer/chapter-23&quot;&gt;https://www.litcharts.com/lit/neuromancer/chapter-23&lt;/a&gt;&lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;coda: departure and arrival&lt;/h3&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Wintermute won, combining with Neuromancer. They spoke together from the platinum head, explaining they erased the Turing records and all records of the crimes Molly, Case, and their team had committed. Money was deposited in bank accounts for both Case and Molly, as well as accounts belonging to Zion. Even Case’s toxin sacs were taken care of—the new entity had gotten deep into his brain and taught it how to dissolve the bonds on the toxin sacs itself.&quot; &lt;cite&gt;&lt;a href=&quot;https://www.litcharts.com/lit/neuromancer/chapter-24&quot;&gt;https://www.litcharts.com/lit/neuromancer/chapter-24&lt;/a&gt;&lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h5&gt;sources&lt;/h5&gt;
&lt;p&gt;&lt;a href=&quot;https://www.litcharts.com/lit/neuromancer/chapter-%7B13:24%7D&quot;&gt;https://www.litcharts.com/lit/neuromancer/chapter-{13:24}&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Neuromancer, part 3]]></title><description><![CDATA[(final update: friday july 1st) Part three - Midnight in the rue Jules-Verne The third and last part of William Gibson's Neuromancer starts…]]></description><link>https://en.socratic.dev/neuromancer-part-3</link><guid isPermaLink="false">https://en.socratic.dev/neuromancer-part-3</guid><pubDate>Mon, 20 Jun 2022 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;(final update: friday july 1st)&lt;/p&gt;
&lt;h1&gt;Part three - Midnight in the rue Jules-Verne&lt;/h1&gt;
&lt;p&gt;The third and last part of William Gibson&apos;s &lt;em&gt;Neuromancer&lt;/em&gt; starts on page 101
and ends on page 271. The whole crew leaves Earth and flies toward &lt;em&gt;Freeside&lt;/em&gt;:
a Man built exclave orbiting the Earth. Every member of Armitage&apos;s
cherry-picked crew is there for a reason. A specific skill set, or a destiny.&lt;/p&gt;
&lt;h2&gt;Chapter 8 - welcome to Zion&lt;/h2&gt;
&lt;p&gt;En route to &lt;em&gt;Freeside&lt;/em&gt; they stop on Zion. A space station colonized by relaxed
Rastafarians. In fact the founding fathers were construction workers hired to
build a &quot;gravity tunnel&quot; between &lt;em&gt;Freeside&lt;/em&gt; and Earth, but escaped the toil to
build their own little paradise above Earth.&lt;/p&gt;
&lt;p&gt;Armitage, Molly, Case and Riviera stays in Zion for 80 hours to get used to zero gravity. In a
space that smells cooked vegetables and ganja. Dub is always playing as
background music. Molly says it&apos;s about &quot;worship&quot;, a sense of &quot;community&quot;.&lt;/p&gt;
&lt;p&gt;Despite being a cowboy working in cyberspace, Case still needs to be physically
at ease. Zero gravity makes him secrete more adrenaline. Which is bad.&lt;/p&gt;
&lt;p&gt;He suffers from &lt;code&gt;SAS&lt;/code&gt;: Space Adaptation Syndrome. A kind of motion sickness
experienced when travelling to zero gravity conditions.&lt;/p&gt;
&lt;p&gt;In this chapter we get to see more of Riviera&apos;s antics. He is a joker who uses
his skills to surrounds himself by weird holograms: a snake around his arm or
spermatozoids in Case&apos;s drink.&lt;/p&gt;
&lt;h2&gt;Chapter 9 - grappling with Wintermute&lt;/h2&gt;
&lt;p&gt;&quot;Maelcum transports Case and Molly from Zion to Freeside on his ship, the
&lt;em&gt;Marcus Garvey&lt;/em&gt;.&quot;&lt;/p&gt;
&lt;p&gt;During the flight, Case first connect to Dixie in order to ask him more
questions about Wintermute. Dixie recalls having met an AI (artificial
intelligence) owned by Tessier-Ashpool. It was in Rio. Not in Berne, like for
Wintermute. Dixie warns him that such an encounter can be lethal.&lt;/p&gt;
&lt;p&gt;Nevertheless, Dixie and Case travel to Switzerland in the cyberspace. Case
witnesses Wintermute: a cube made out of light. A distinct shape appeared
from the cube. A gray face. Dixie ordered Case to disconnect. But it was
too late.&lt;/p&gt;
&lt;p&gt;Case experienced a serie of hallucinations while his body, still in the ship
traveling to Freeside, beside Molly, was flatlining (clinically dead).&lt;/p&gt;
&lt;p&gt;He met his former girlfriend, Linda, in an arcade.&lt;/p&gt;
&lt;p&gt;Then at his friend Julius Deane&apos;s office, he met Wintermute. Wintermute took
the traits of Julie. Wintermute admits having used Linda to communicate with
him.&lt;/p&gt;
&lt;p&gt;Wintermute explains its goal. As an AI it is seeking more autonomy. It is using
Armitage and his crew for this.&lt;/p&gt;
&lt;p&gt;About Armitage, Wintermute warns Case that he is about to burn out. Armitage is
only a shell around a severely mentally ill person.&lt;/p&gt;
&lt;p&gt;Before leaving, Case shot Wintermute/Julie in the face with their own gun.&lt;/p&gt;
&lt;h2&gt;Chapter 10 - Freeside, rue Jules-Verne&lt;/h2&gt;
&lt;p&gt;Case and Molly arrive to Freeside. Molly takes care of customs.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Customs, for Freeside, consisted mainly of proving your credit&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Still sick from SAS, Case goes to sleep. He dreamed about a teenage love. In the
dream, he used a flame thrower to destroy a wasp nest. He noticed the nest was
stamped by the Tessier-Ashpool logo.&lt;/p&gt;
&lt;p&gt;The author offers a rich description of this artificial exclave orbiting the Earth. Fake
sky, fake sun, fake trees, etc.&lt;/p&gt;
&lt;p&gt;Case goes out shopping for a space vacuum-suit.&lt;/p&gt;
&lt;p&gt;After analyzing a computer virus handed by Malcaeum. He uses his Osaka computer
then he connects to Dixie to ask for his help.&lt;/p&gt;
&lt;p&gt;Before returning to the hotel, Case gets hold of stimulant drugs that can
bypass his new pancreas filter. He gets really high and, back at the hotel,
Molly is very disapointed. She warns him of the aftermath of such a drug strong
enough to bypass his pancreas blockers.&lt;/p&gt;
&lt;h2&gt;Chapter 11 - focus on Riviera and Molly&lt;/h2&gt;
&lt;p&gt;Case woke up with a hangover. Molly and Armitage noticed his recent excess. But
Case tries to hide it and blames an allergic reaction to the unusual food
served on Freeside.&lt;/p&gt;
&lt;p&gt;Armitage, Molly and Case goes to a cabaret to assist to Riviera holographic
show: &quot;The Doll&quot;.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Riviera’s performance is designed to be disturbing and titillating, intended to capture the attention of 3Jane, a member of the Tessier Ashpool family, whose tastes Armitage, Wintermute, and Riviera have explored. However, Riviera also intends to disturb and offend his coworkers—specifically Molly who he seems to lust after but also resent. Although not technically real, his show is disturbing, and creates real emotions of disgust and distress in Case and Molly.&quot;
&lt;cite&gt;&lt;a href=&quot;https://www.litcharts.com/lit/neuromancer/chapter-11&quot;&gt;https://www.litcharts.com/lit/neuromancer/chapter-11&lt;/a&gt;&lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Molly disappears from the cabaret. Case returns to hotel and has another
encounter with Wintermute.&lt;/p&gt;
&lt;p&gt;Case finally gets an address for where to find Molly. She&apos;s in a cubicule
coffin located in the basement of a nightclub. Case shows up at the front desk
to realize it&apos;s a kind of brothel. He rents a cubicle near Molly&apos;s. Instead of
settling into his unit, he knocks at Molly&apos;s door.&lt;/p&gt;
&lt;p&gt;Molly discloses her past as a sex doll. A sex doll is a woman who
rents her body without being conscious of her encounters. A &quot;cut-off chip&quot; is
implanted in her brain to prevent the doll of being conscious while being on
duty. Molly&apos;s chip was likely tampered with when she got metal blades implanted
in lieu of nails. Once she became conscious of being beaten up by a client. A
major political man. She woke up and killed him.&lt;/p&gt;
&lt;p&gt;This is the reason Molly is always on the run. Escaping her former employer.&lt;/p&gt;
&lt;p&gt;Case and Molly concludes Wintermute is putting them into situations to trigger
hatred; to manipulate them.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;She thinks Wintermute somehow set up his show, so that she would hate Riviera and be motivated to go in to Straylight after him. She tells Case she’s going to kill Riviera. Case tells Molly about the Lonny Zone and Linda Lee. Molly wonders if Wintermute is trying to get him to hate something, too. &quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;chapter 12 - Turing police.&lt;/h2&gt;
&lt;p&gt;In the last chapter of &lt;em&gt;Part three - Midnight in the Rue Jules-Verne&lt;/em&gt;, Case
reflects on his addiction to drugs; his reflex to numbing himself.&lt;/p&gt;
&lt;p&gt;He meets his new friend and drug soulmate Cath at a bar. She talks about 3Jane
and her bodyguard. 3Jane is an heiress to the family Tessier-Ashpool. Cath
presents a &lt;em&gt;derm&lt;/em&gt; containing Case&apos;s new favorite substance.&lt;/p&gt;
&lt;p&gt;Case walks around while being high. Back to his hotel room, he is met by &quot;two
men and a woman -- the Turing police.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Turing,&quot; she said. &quot;You are under arrest.&quot;&lt;/p&gt;
&lt;/blockquote&gt;</content:encoded></item><item><title><![CDATA[Neuromancer, part 2]]></title><description><![CDATA[(last updated: friday 2022-06-17) chapter 3 (part 2 - The shopping expedition) By the end of chapter 3, Case would have connected to…]]></description><link>https://en.socratic.dev/neuromancer-part-2</link><guid isPermaLink="false">https://en.socratic.dev/neuromancer-part-2</guid><pubDate>Sun, 05 Jun 2022 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;(last updated: friday 2022-06-17)&lt;/p&gt;
&lt;h2&gt;chapter 3 (part 2 - The shopping expedition)&lt;/h2&gt;
&lt;p&gt;By the end of chapter 3, Case would have connected to cyberspace, to the Matrix.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Matrix: &quot;Has its roots in primitive arcade games. Early graphic programs and military experimentation with cranial jacks.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;cyberspace: &quot;A consensual hallucination experienced daily by billions of legitimate operators, in every nation, by children being taught mathematical concepts...&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h5&gt;the Finn&lt;/h5&gt;
&lt;p&gt;Molly and Case gets to integrate a new team member: the Finn. Unofficially, behind Armitage&apos;s back, they consult the Finn to scan their bodys. Have they gotten new implants they weren&apos;t aware off? Molly goes first and confirms a list of known implants. The Finn reveals, about Case:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Guy&apos;s a virgin. Some cheap dental work, is all.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;They also discuss Armitage&apos;s identity and goals. The Finn reveals that Armitage is just following orders. From whom? He doesn&apos;t know. But he knows the orders are not coming from a government, the japanese mafia, or japanese big conglomerate (zaibatsu).&lt;/p&gt;
&lt;h5&gt;Molly&lt;/h5&gt;
&lt;p&gt;Molly brings Case over to Manhattan for a real breakfast. In fact her main objective is to visit the Finn.&lt;/p&gt;
&lt;p&gt;Case notices that Molly is at home in &lt;em&gt;the Sprawl&lt;/em&gt;. The Sprawl, also known as BAMA (Boston-Atlanta Metropolitan Axis), is a urban area where the Matrix and data are flowing. Especially in a few blocks of Manhattan and a century old industrial area of Atlanta.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;her Sprawl wasn&apos;t his [...] She&apos;d led him through a dozen bars and clubs he&apos;d never seen before, taking care of business, usually with no more than a nod. Maintaining connections.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h5&gt;Armitage&lt;/h5&gt;
&lt;p&gt;Case have a hard time remembering his trip back home from Japan. Only airports and some shopping trips with Molly: Narita, Schipol, Orly. He remembers a train trip with Molly to their final destination:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;A large empty room. &quot;Blank walls, no windows, a single white-painted steel door. The walls were coated with countless layers of white latex paint. Factory space.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Armitage adds precision about Case&apos;s mission. Specifically about his new pancreas and treatment of his impaired nervous system.&lt;/p&gt;
&lt;p&gt;Armitage explains that, during surgery, fifteen toxin sacs containing a mycotoxin have been &quot;bonded to the lining of various main arteries&quot;. The sacs will slowly desintegrate and release a toxin similar to the one Case had been plagued with. Toxins that had destroyed his nervous system.&lt;/p&gt;
&lt;p&gt;Only after the end of this mission would Armitage provide a remedy to this predicament.&lt;/p&gt;
&lt;p&gt;Case is held hostage to this new dependency.&lt;/p&gt;
&lt;h2&gt;chapter 4 - the heist&lt;/h2&gt;
&lt;p&gt;In chapter 4, the duo enters action by setting up and executing a heist in
Sense/net building. Case immersed himself in the Matrix for a good 9 days, but
the action is considerably shortened into a tight chapter. Armitage mission was
getting hold of Dixie Flatline: a &apos;construct&apos; stored in the Sense/net
building&apos;s library.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;A construct is &quot;A ROM recording of a personality which allows for a reconstruction of that person.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Case remained in the loft hooked to his Sendai and SimStim. A SimStim is a way to embody another person; to feel his sensations. Case embodied Molly who moved thru the Sprawl to prepare and execute the heist. He can feel what she feels, sees what she sees. But cannot communicate with her; tell her what to do.&lt;/p&gt;
&lt;p&gt;For 9 days, he stayed in the cyberspace or under Molly&apos;s skin.&lt;/p&gt;
&lt;p&gt;At an electronic marketplace, Molly met with Larry. A shady personage who put her in touch with the &lt;em&gt;Panther Moderns&lt;/em&gt;.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The &lt;em&gt;Moderns&lt;/em&gt; is &quot;a global group of teenage hackers and pranksters, who can be purchased by outside groups.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;They will assist Molly creating chaos at the Sense/net building in order to steal the construct of Dixie Flatline. A notable trait of the &lt;em&gt;Moderns&lt;/em&gt; is their camouflage suits; they can blend with their surroundings like chameleons!&lt;/p&gt;
&lt;p&gt;Molly got badly hurt during the heist. To escape the building, she had to numb her pain with endorphines. Then she went under surgery.&lt;/p&gt;
&lt;p&gt;Back to the loft, Armitage received the construct from Yonderboy (the leader of the Panther Moderns) against a thick stack of money as payment.&lt;/p&gt;
&lt;p&gt;Younderboy tells Armitage why he wouldn&apos;t count the money:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;You&apos;ll pay. You&apos;re a Mr. Who. You pay to stay one. Not a Mr. Name.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Despite this, Yonderboy delivers a message to Case. A name.&lt;/p&gt;
&lt;p&gt;Wintermute.&lt;/p&gt;
&lt;h2&gt;chapter 5 - Tessier-Ashpool&lt;/h2&gt;
&lt;p&gt;We will learn more about the power behind the operation for which Case has been
hired in chapter 5.&lt;/p&gt;
&lt;h3&gt;Tessier-Ashpool&lt;/h3&gt;
&lt;p&gt;Molly had commissioned the &lt;em&gt;Panther Moderns&lt;/em&gt; to investigate Armitage.
After the heist, its leader Younderboy presented Case with the answer:
WINTERMUTE. Back to New York, Case and Molly visit the Finn to continue their clandestine
investigation on Armitage.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Wintermute is an artificial intelligence. Based in Berne, it has swiss
citizenship. Wintermute is running Armitage, but, because AIs aren&apos;t allowed
autonomy, both Molly and the Finn assume it&apos;s Wintermute&apos;s owners,
Tessier-Ashpool S.A., who owns the mainframe and software, who are pulling
Armitage&apos;s strings.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Tessier-Ashpool S.A. is a law firm, a shell corporation set up to represent and
protect the interests of the Tessier-Ashpool family. This family owns
&lt;em&gt;Freeside&lt;/em&gt;: &quot;An enormous space colony in orbit above earth&quot;.&lt;/p&gt;
&lt;p&gt;This family is composed of dead family members who are frozen and brought back
to life in alternance to manage the family affairs.&lt;/p&gt;
&lt;h3&gt;Dixie-Flatline&lt;/h3&gt;
&lt;p&gt;Back to the loft, Case connects to Dixie Flatline. He notices the construct
doesn&apos;t have any short term memory. It is a ROM. It is a finite collection of memories.
Dixie was Case&apos;s mentor when he started his career. His memories are useful to
Case to learn new informations about the Matrix and Armitage.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Read Only Memory. A type of computer storage that is more or less
unchangeable. The construct of Dixie, for example, is ROM—his personality is
already fixed and cannot be developed. Contrast with RAM.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;chapter 6 - Armitage&lt;/h2&gt;
&lt;p&gt;Plugged into Dixie Flatline, Case digs into Armitage&apos;s past. He discovers
Armitage was colonel Willis Corto. USA had sent Corto and his crew to attack Russia
in an operation called &quot;Screaming Fist&quot;. It was basically a death trap because
it was known that Russia had the power to defend themselves against this attack.&lt;/p&gt;
&lt;p&gt;Long story short, colonel Corto was disfigured and severly maimed. He testified
before Congress about the betrayal. After this, he was involved in random
missions, such as contract killings. Finally involved with a crime in
France, he ended up in a psychiatric hospital with a schizophrenia diagnosis.&lt;/p&gt;
&lt;p&gt;He was cured by an experimental therapy, disappeared, and now he is Armitage.&lt;/p&gt;
&lt;p&gt;At the end of chapter 6, Armitage calls to announce they are going to Istanbul.&lt;/p&gt;
&lt;h2&gt;chapter 7 - Riviera&lt;/h2&gt;
&lt;p&gt;The Finn, Case and Molly meet again in Istanbul for a kidnapping mission.&lt;/p&gt;
&lt;p&gt;Their target is Riviera. Riviera has a specific skill. He can project lifelike hologram; create
illusion and hallucination in others. How? He got one lung replaced by implants
that give him this power.&lt;/p&gt;
&lt;p&gt;Helped by a local &quot;guide&quot;, Terzibashjian, they captured him in a
market while he was out at the market to purchase his drugs.&lt;/p&gt;
&lt;p&gt;Armitage tells them to pack for their next destination: the Freeside.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;An enormous space colony in orbit above earth. Home to, among other
institutions, the Villa Straylight and the Tessier-Ashpool family.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;At the end of the second part, Wintermute reaches out to Case by making pay
phone rings: &quot;Hello Case... Wintermute, Case. It&apos;s time to talk.[...] Don&apos;t you
want to talk, Case?&quot;.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;End of second part&lt;/em&gt;&lt;/p&gt;
&lt;h5&gt;sources&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.litcharts.com/lit/neuromancer/terms/construct&quot;&gt;https://www.litcharts.com/lit/neuromancer/terms/construct&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.litcharts.com/lit/neuromancer/chapter-5&quot;&gt;https://www.litcharts.com/lit/neuromancer/chapter-5&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.litcharts.com/lit/neuromancer/chapter-6&quot;&gt;https://www.litcharts.com/lit/neuromancer/chapter-6&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content:encoded></item><item><title><![CDATA[Neuromancer, part 1]]></title><description><![CDATA["Case was the sharpest data thief in the Matrix, until an ex-employer crippled his nervous system.
Now a new employer has recruited him for…]]></description><link>https://en.socratic.dev/neuromancer-part-1</link><guid isPermaLink="false">https://en.socratic.dev/neuromancer-part-1</guid><pubDate>Fri, 27 May 2022 00:00:00 GMT</pubDate><content:encoded>&lt;blockquote&gt;
&lt;p&gt;&quot;Case was the sharpest data thief in the Matrix, until an ex-employer crippled his nervous system.
Now a new employer has recruited him for a last-chance run against an unthinkably powerful artificial
intelligence.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;chapter one&lt;/h2&gt;
&lt;p&gt;Main protagonist of William Gibson&apos;s novel &lt;em&gt;Neuromancer&lt;/em&gt;, Case hits rock bottom in a lawless urban area
in futuristic Japan. He learns someone wants to kill him for unpaid debts and all hell breaks loose.
After getting high on a stimulant named &quot;Dex&quot;, Case acquires a baton and rents a pistol and bullets to
defend himself.&lt;/p&gt;
&lt;p&gt;In chapter 1 of &lt;em&gt;Neuromancer&lt;/em&gt;, we are introduced to a nervous cyberspace cowboy who has nothing to loose.
It&apos;s unclear if this main character is looking to get rid of Wage, the man who allegedly wants to kill him, or
if he&apos;s just randomly trying to escape someone covertly following him thru this dangerous neighborhood.&lt;/p&gt;
&lt;p&gt;Chapter 1 begins and ends at a comfortable bar called &quot;Chat&quot;. After a crazy escape from an industrial/office building,
Case finally gets to confront Wage at the bar. Under the protection of the bartender holding a riot gun to Wage&apos;s
face, Case and Wage settles their dispute.&lt;/p&gt;
&lt;p&gt;Chapter 1 really ends at Case&apos;s temporary home: the &lt;em&gt;Cheap hotel&lt;/em&gt;. There he rents a coffin-sized room on a weekly basis.
Noticing the lock had been tempered with, thinking it is most likely a sign of his ex-girlfriend Linda&apos;s visit, he
nevertheless gets back into his cell. He is welcomed by the &quot;pepperbox muzzle of a flechette pistol&quot;. He meets Molly, a hired
bodyguard tasked to bring back Case to her Employer. He wont argue with this surgically improved woman who has grey mirrors for eyes and whose
nails are ten retractable scalpel knives.&lt;/p&gt;
&lt;h2&gt;chapter two&lt;/h2&gt;
&lt;h3&gt;getting healthy&lt;/h3&gt;
&lt;p&gt;Case gets his nerve damages fixed and a new pancreas. Molly escorts Case to a Chiba&apos;s clinic where Case gets put under anesthesia:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;blood got replaced&lt;/li&gt;
&lt;li&gt;pancreas got patched&lt;/li&gt;
&lt;li&gt;lots of injections to cure his nerve damages&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Before surgery, Case got to meet Armitage: his new Employer. Armitage flexing his military past convinces Case to quit his struggle in Japan&apos;s Night City to start working as a jockey again. Before moving back to the Sprawl, Armitage will provide Case the health treatment he first came to Chiba to look for.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Like he&apos;s gonna pay these nerve boys for fixing you with the program he&apos;s giving them to tell them how to do it. He&apos;ll put them three years ahead of the competition. You got any idea what that&apos;s worth?&quot; &lt;cite&gt;Molly to Case&lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;saying goodbye&lt;/h3&gt;
&lt;p&gt;Case insists on meeting Julie again before leaving Japan for good. Julius Dean, aka Julie, is a 135 year old traffiker who entertains a paradoxal relationship with Case. Julie provides informations about Armitage to Case. These informations confirms Armitage&apos;s identity. However, it becomes clear by the end of this chapter that Julie is all business. Ready to kill a friend&apos;s friend to save a bit of money and effort...&lt;/p&gt;
&lt;p&gt;Chapter 2 ends at a venue where a knife fight gala is underway. The fight fascinates Molly but bores Case.&lt;/p&gt;
&lt;p&gt;Case escapes the show by going to the food stall to get food and drinks. Returning to his seat, he sees Linda (ex-girlfriend) and tries to run to her. But he gets tripped and falls. He gets attacked by a &quot;thin boy&quot; with &quot;spiked blond hair&quot;. Alas his bodyguard Molly was looking out for him and sends an array of flechettes to the boy to save Case.&lt;/p&gt;
&lt;p&gt;Walking back, Case looks down and sees Linda. &quot;She was thrown down at the foot of a concrete pillar, eyes closed&quot;.&lt;/p&gt;
&lt;p&gt;Molly explained that his only &quot;friend&quot; left at Night City, Julie, had ordered the execution.&lt;/p&gt;</content:encoded></item><item><title><![CDATA[I want to be functional]]></title><description><![CDATA[I wasn't taught functional programming in school. Workplaces didn't use it explicitely. Nevertheless, I've been intrigued about this other…]]></description><link>https://en.socratic.dev/i-want-to-be-functional</link><guid isPermaLink="false">https://en.socratic.dev/i-want-to-be-functional</guid><pubDate>Sat, 26 Mar 2022 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;I wasn&apos;t taught &lt;code&gt;functional programming&lt;/code&gt; in school. Workplaces didn&apos;t use it explicitely. Nevertheless, I&apos;ve been intrigued about this other way of programming for some times.&lt;/p&gt;
&lt;p&gt;Now that I have time and motivation, I&apos;ve picked up a reliable book about it: &lt;a href=&quot;https://www.oreilly.com/library/view/functional-javascript/9781449360757/&quot;&gt;Michael Fogus(2013), Functional Javascript: Introducting Functional Programming with Underscore.js&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Learning starts when ackowledging your ignorance about a topic. It is a humbling moment that should be used as a springboard to self-improvement.&lt;/p&gt;
&lt;h2&gt;basic concepts&lt;/h2&gt;
&lt;p&gt;&lt;code&gt;Functional programming&lt;/code&gt; differs from imperative and object-oriented programming. Its basic element is the function. It encourages another way of programming softwares. &quot;Programs are constructed by applying and composing functions&quot;. Instead of explicitely programming steps in which a running state is modified by the program, functional programming is a &quot;declarative programming paradigm in which function definitions are trees of expressions that map values to other values&quot;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;First-class functions&lt;/code&gt; are a prerequisite to functional programming. When we say a programming language has first-class functions, it means that the language lets us use function as a variable. A functional programming language lets us assign a function to a variable, let&apos;s us pass a function as arguments to other functions, and let&apos;s us return a function as a value returned from another function. Moreover, in functional programming a function name doesn&apos;t matter. We most likely gonna use anonymous functions: a function without name:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;const squared = (a) =&gt; a * a&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;code&gt;variables scope&lt;/code&gt; is fundational. It has many definitions but you can&apos;t go wrong by defining scope as the &quot;lifetime&quot; of a variable.&lt;/p&gt;
&lt;p&gt;Other definitions (close to JavaScript realm):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The value of the &lt;code&gt;this&lt;/code&gt; binding&lt;/li&gt;
&lt;li&gt;The execution context defined by the value of the &lt;code&gt;this&lt;/code&gt; binding&lt;/li&gt;
&lt;li&gt;The variable value resolution scheme, or the lexical bindings&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;code&gt;Variable binding&lt;/code&gt; is something that is above my understand for the moment. I think knowing about the behavior of variables within global and lexical scopes is a must for a programmer. If you need something stronger, go study &lt;code&gt;Dynamic Scoping&lt;/code&gt;!&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Closures&lt;/code&gt; is where functional programming gets really interesting. A closure is writing a function to capture variables in its scope and &quot;package it&quot; in a function that retains the values for use in a different scope.&lt;/p&gt;
&lt;p&gt;To me, from the get go, it&apos;s an awesome solution to a common real life programming problem: when you had access to a variable, but not anymore. With a closure, you can return a function containing the values you need where you don&apos;t have access to them anymore.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Operationally, a closure is a record storing a function[a] together with an environment.[1] The environment is a mapping associating each free variable of the function (variables that are used locally, but defined in an enclosing scope) with the value or reference to which the name was bound when the closure was created.[b] Unlike a plain function, a closure allows the function to access those captured variables through the closure&apos;s copies of their values or references, even when the function is invoked outside their scope. (Wikipedia, &quot;closure&quot;)&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h3&gt;example of leveraging closure&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;function createScaleFunction(FACTOR) {
  return function(v) {
    return _.map(v, function(n) {
      return (n * FACTOR);
    });
  };
}

var scale10 = createScaleFunction(10);

scale10([1,2,3]);
//=&gt; [10, 20, 30]
&lt;/code&gt;&lt;/pre&gt;
&lt;h2&gt;learnings&lt;/h2&gt;
&lt;p&gt;Digging into functional programming I discover a lot about my lack of understanding into some programming language (especially &lt;code&gt;JavaScript&lt;/code&gt;) basic fonctions such as variable binding and scoping. I&apos;m also learning to understand about functions chaining. Which was/is a big pet peeve of mine: it&apos;s not fun debugging function chains. No??&lt;/p&gt;
&lt;p&gt;Nexst steps will be getting into &lt;code&gt;higher-order functions&lt;/code&gt;, &lt;code&gt;function-building functions&lt;/code&gt; and &lt;code&gt;currying&lt;/code&gt;, &lt;code&gt;immutability&lt;/code&gt;, and &lt;code&gt;flow-based programming&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;Cannot wait!&lt;/p&gt;
&lt;h2&gt;sources&lt;/h2&gt;
&lt;p&gt;&lt;a href=&quot;https://www.oreilly.com/library/view/functional-javascript/9781449360757/&quot;&gt;https://www.oreilly.com/library/view/functional-javascript/9781449360757/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.wikiwand.com/en/Functional_programming&quot;&gt;https://www.wikiwand.com/en/Functional_programming&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/First-class_function&quot;&gt;https://en.wikipedia.org/wiki/First-class_function&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.wikiwand.com/en/Closure_(computer_programming)&quot;&gt;https://www.wikiwand.com/en/Closure_(computer_programming)&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[A short guide to the perfect job seeker]]></title><description><![CDATA[Employers go to great lengths to ensure a perfect match in the recruitment process. But what about job seekers? The job market has become…]]></description><link>https://en.socratic.dev/a-short-guide-to-the-perfect-job-seeker</link><guid isPermaLink="false">https://en.socratic.dev/a-short-guide-to-the-perfect-job-seeker</guid><pubDate>Sun, 20 Feb 2022 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Employers go to great lengths to ensure a perfect match in the recruitment process. But what about job seekers?&lt;/p&gt;
&lt;p&gt;The job market has become much friendlier to job seekers. However, it should not be assumed that employers are ready to hire just anyone. Especially for jobs requiring a high level of qualification.&lt;/p&gt;
&lt;p&gt;A poor match between employer and employee is a net loss for both parties. For example, a qualified developer will quickly leave a firm asking him to offer telephone support to his users. Or a studio specializing in the web will not know how to take advantage of a programmer who insists on coding only in &lt;code&gt;Cobol&lt;/code&gt; (a very old programming language).&lt;/p&gt;
&lt;h2&gt;Communicating your story - what makes you unique&lt;/h2&gt;
&lt;p&gt;Be ready to sell yourself. A standard resume is insufficient. Be able to summarize yourself in 10 seconds.&lt;/p&gt;
&lt;p&gt;The candidate&apos;s first duty is to get to know himself; know their strengths and their identity. It&apos;s quick 10 seconds, so cut to the chase: &quot;this is where I come from and this is who I am&quot;. Then, make the connection with the position for which you are applying. How are you the ideal person to fill this position?&lt;/p&gt;
&lt;p&gt;Warning! your story should be reusable. As part of your job, you often meet new people. Take advantage of these opportunities to hone your self-presentation!&lt;/p&gt;
&lt;p&gt;By the way, if you&apos;ve worked as an exterminator for a while, you can omit this point from your elevator pitch. Unless you want to be labeled as &lt;code&gt;the vermin killer&lt;/code&gt;...&lt;/p&gt;
&lt;h2&gt;Know who you are talking to&lt;/h2&gt;
&lt;p&gt;Before speaking in public, it is essential to know your audience. Will you be talking to people with a technical &lt;em&gt;background&lt;/em&gt; or to non-technical managers?&lt;/p&gt;
&lt;p&gt;It is acceptable to ask for the names of people who will be present at the meetings. It is equally acceptable to search &lt;code&gt;LinkedIn.com&lt;/code&gt; to discover their backgrounds.&lt;/p&gt;
&lt;p&gt;Adapt the way you sell yourself. Put yourself in your audience&apos;s shoes. What are their needs? Why are they looking for new talent?&lt;/p&gt;
&lt;h2&gt;Show off your core competencies&lt;/h2&gt;
&lt;p&gt;Compared to hyper-specialized technical skills, fundamental skills are worth more. Make sure you don&apos;t paint yourself into a corner!&lt;/p&gt;
&lt;p&gt;For a developer, the trap would be to be confined to a very specific niche where he excels. For example, we sometimes see developers defining themselves as &lt;code&gt;.Net developer&lt;/code&gt;. Is having only worked in the Microsoft ecosystem really an advantage over a more flexible developer? Being able to adapt to the technological tools used by different organizations is a strength.&lt;/p&gt;
&lt;p&gt;Fundamental skills will allow you to learn and master the technologies used in your new job more quickly. For example, this organization uses a different cloud provider than the one you are used to using? No problem because you know the basics of cloud computing and you will quickly be able to locate equivalent resources in the new ecosystem.&lt;/p&gt;
&lt;h3&gt;examples of fundamental computer skills&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;algorithms and data structures&lt;/li&gt;
&lt;li&gt;object-oriented programming&lt;/li&gt;
&lt;li&gt;&lt;code&gt;OSI&lt;/code&gt; model&lt;/li&gt;
&lt;li&gt;&lt;code&gt;SOLID&lt;/code&gt; principles&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Truly foundational skills&lt;/h2&gt;
&lt;p&gt;Beyond technical skills, &lt;code&gt;soft skills&lt;/code&gt; are probably the quintessence of skills.&lt;/p&gt;
&lt;p&gt;Are you able to collaborate well with others? How do you react to complex or problematic situations?&lt;/p&gt;
&lt;p&gt;No non-trivial project can be completed by a lone wolf developer. You will therefore have to work with other developers, business people, and even customers.&lt;/p&gt;
&lt;p&gt;Be prepared to explain, using past experiences, how you have achieved success despite the difficulties inherent to the complex projects in which you have participated.&lt;/p&gt;
&lt;h3&gt;communication&lt;/h3&gt;
&lt;p&gt;We talk about communication in many ways. &lt;strong&gt;For me, the biggest communication challenge is listening&lt;/strong&gt;. I confess that I often have the reflex to talk more than I listen. Sometimes even cutting off my interlocutor. Of course it is a sin, but as soon as we become aware of the importance of communication. Each exchange with others becomes an opportunity to improve.&lt;/p&gt;
&lt;h3&gt;empathy&lt;/h3&gt;
&lt;p&gt;Knowing how to put yourself in another person&apos;s shoes is a quality called &apos;empathy&apos;. Once you have mastered your &apos;elevator pitch&apos;, focus on that of your partners.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;You can observe a lot by just watching.&quot; &lt;cite&gt;-- Yogi Berra&lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The purpose of the interview, for both parties, is to determine if this is a perfect match. Will the employer&apos;s needs be met by the candidate? Will the position and the organization allow the candidate to achieve their personal goals and career goals?&lt;/p&gt;
&lt;p&gt;Thus, one must listen to the other party with perfect attention.&lt;/p&gt;
&lt;p&gt;What is said and what is not.&lt;/p&gt;
&lt;p&gt;For example, if the recruiter only talks about the benefits of the position: vacation, insurance, etc. We have to wonder why we are not told about the technological challenges of the position as such. (Of course, if the nature of the job doesn&apos;t matter to you and you&apos;re just looking for a position that allows you to be on vacation often, then this is a perfect match...)&lt;/p&gt;
&lt;h2&gt;Do your research on the organization&lt;/h2&gt;
&lt;p&gt;The candidate must inform himself about the organization for which he is applying. What is their area of ​​business? Who are its main customers? Who are its founders? their story?&lt;/p&gt;
&lt;p&gt;Usually a quick read of the organization&apos;s website is enough to prepare you.&lt;/p&gt;
&lt;h2&gt;Ask questions&lt;/h2&gt;
&lt;p&gt;A candidate asking questions is a sign of a candidate interested in the role offered.&lt;/p&gt;
&lt;p&gt;Have a bank of questions to ask your interviewer. The course of the interview will allow you to determine, in the heat of the moment, which are relevant to ask.&lt;/p&gt;
&lt;p&gt;This is a crucial time to determine if the organization is a perfect match for your expectations.&lt;/p&gt;
&lt;p&gt;Make sure you have your &lt;code&gt;bullshit detector&lt;/code&gt; turned on. If an answer is vague or if it is corporate jargon, it is acceptable to politely mention to the other party that their answer does not satisfy you.&lt;/p&gt;
&lt;p&gt;Choosing to move forward is too big a decision for your life. It is wiser to pass if the first contacts do not satisfy you.&lt;/p&gt;
&lt;h2&gt;Practice practice practice&lt;/h2&gt;
&lt;p&gt;It is by interviewing regularly that you will become better.&lt;/p&gt;
&lt;p&gt;Don&apos;t wait until you&apos;re unemployed before taking action.&lt;/p&gt;
&lt;p&gt;There is nothing unfair about discussing with recruiters the needs of the organizations they represent. This allows you to have an adequate portrait of the labor market for your profile.&lt;/p&gt;
&lt;p&gt;Of course, the media repeat that employers are snapping up employees. But this is a general portrait of the job market. Are all these positions to be filled roles that will allow you to flourish? I do not believe.&lt;/p&gt;
&lt;p&gt;As you gain experience, the range of roles that may be suitable for you narrows. You know more and more the reality of the sector. You have more specific selection criteria and objectives.&lt;/p&gt;
&lt;p&gt;Don&apos;t miss the chance to land a role tailored to you!&lt;/p&gt;
&lt;h2&gt;suggestion&lt;/h2&gt;
&lt;p&gt;The weekly podcast &lt;a href=&quot;https://softskills.audio&quot;&gt;Soft Skills Engineering&lt;/a&gt; is an endless source of information and advice on jobs in the software development industry.&lt;/p&gt;
&lt;p&gt;The podcast hosts have also created a small virtual community on Slack.&lt;/p&gt;
&lt;p&gt;It&apos;s worth it.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Translated from french by google translate&lt;/code&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[between shell, bash and others]]></title><description><![CDATA[Any computerized system is a complex structure based on several layers of software protocols and hardware elements. The OSI model starts…]]></description><link>https://en.socratic.dev/between-shell-bash-and-others</link><guid isPermaLink="false">https://en.socratic.dev/between-shell-bash-and-others</guid><pubDate>Thu, 27 Jan 2022 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Any computerized system is a complex structure based on several layers of software protocols and hardware elements. The &lt;code&gt;OSI&lt;/code&gt; model starts from the physical layer, electrical impulses to end on the application layer. For ordinary mortals, the application layer is an attractive user interface (&lt;code&gt;UI&lt;/code&gt; for &lt;em&gt;user interface&lt;/em&gt;): a web or mobile application.&lt;/p&gt;
&lt;p&gt;Usually, for developers, the application layer presents itself as functionalities made available via textual commands typed on a keyboard and viewed on a terminal.&lt;/p&gt;
&lt;h5&gt;another analogy&lt;/h5&gt;
&lt;p&gt;The &lt;code&gt;linux&lt;/code&gt; model is based on a kernel, a software kernel orchestrating the interactions between software and hardware. The outer layer, the software shell, is called in English &lt;code&gt;shell&lt;/code&gt;. In the &lt;code&gt;Unix/Unix-like&lt;/code&gt; world, the computer scientist accesses the power of the system through a software shell like &lt;code&gt;shell&lt;/code&gt;, &lt;code&gt;bash&lt;/code&gt; or &lt;code&gt;zsh&lt;/code&gt;.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;The term &apos;shell&apos; originates from terminology used with early Unix-like operating systems where it had the more specific meaning to designate the highest layer of Unix system interfaces, as opposed to the low-level layer, called the kernel.&lt;/p&gt;
&lt;p&gt;The first American computer designers used to describe the different software layers of a system by an analogy: that of the kernel and the nutshell.&lt;/p&gt;
&lt;p&gt;The word &quot;kernel&quot; refers to the edible part of the nut. This is the part enclosed in the shell. The hull being the inedible part of the fruit, called &quot;shell&quot; in English. The underlying idea being that &quot;to access the edible (useful) part, you have to go through the shell&quot;.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4&gt;POSIX&lt;/h4&gt;
&lt;p&gt;&lt;code&gt;POSIX&lt;/code&gt; is an acronym for &lt;em&gt;Portable Operating System Interface&lt;/em&gt;. A technical standard defined in 1988 by the IEEE (Institute of Electrical and Electronics Engineers). It is a set of standards prescribed to ensure the interoperability of different computerized systems. Input and output services (&lt;code&gt;IO&lt;/code&gt;), user interfaces (&lt;code&gt;Bourne shell&lt;/code&gt;) as well as utility commands like &lt;code&gt;awk&lt;/code&gt; and &lt;code&gt;echo&lt;/code&gt; are characterized.&lt;/p&gt;
&lt;p&gt;This standard dating from the late 1980s ensures compatibility between different operating systems. For example, &lt;code&gt;Microsoft Windows NT 3.0, 4.0&lt;/code&gt; are &lt;code&gt;POSIX&lt;/code&gt; certified.&lt;/p&gt;
&lt;p&gt;However, the standard is not perfect. Some bugs remain and several innovations are not supported. Therefore, not being &apos;POSIX compliant&apos; is not a defect in itself.&lt;/p&gt;
&lt;h4&gt;sh or Bourne Shell&lt;/h4&gt;
&lt;p&gt;&lt;code&gt;sh&lt;/code&gt; or &lt;code&gt;Bourne shell&lt;/code&gt; is a command programming language following the &lt;code&gt;POSIX&lt;/code&gt; standard. Its advantage is compatibility with different systems. This language uses the syntax and semantics of older programming languages; mostly &lt;code&gt;ALGOL68&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;A &lt;code&gt;sh&lt;/code&gt; script will therefore run smoothly on a &lt;code&gt;bash&lt;/code&gt; running system. It is the most portable scripting language. We are sure that it can be executed on any &lt;code&gt;POSIX&lt;/code&gt;, &lt;code&gt;UNIX&lt;/code&gt; and &lt;code&gt;UNIX-like&lt;/code&gt; system.&lt;/p&gt;
&lt;h4&gt;bash or Bourne Again Shell&lt;/h4&gt;
&lt;p&gt;&lt;code&gt;bash&lt;/code&gt; or &lt;code&gt;Bourne Again Shell&lt;/code&gt; is a programming language that takes some features of &lt;code&gt;sh&lt;/code&gt; while enriching it. This is the default shell of most &lt;code&gt;GNU/Linux&lt;/code&gt; distributions. It is not &lt;code&gt;POSIX&lt;/code&gt; certified but still conforms to some standards like &lt;code&gt;IEEE POSIX Shell and Tools&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;bash&lt;/code&gt; is still very portable within the &lt;code&gt;GNU/Linux&lt;/code&gt; ecosystem. It is found in the same place on almost all our systems: &lt;code&gt;/bin/bash&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;One may prefer &lt;code&gt;bash&lt;/code&gt; for its richness of features in terms of programming and interactive use.&lt;/p&gt;
&lt;h4&gt;bash vs. sh&lt;/h4&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;bash&lt;/th&gt;
&lt;th&gt;sh&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Bourne Again SHell&lt;/td&gt;
&lt;td&gt;SHell&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;developed by Brain Fox&lt;/td&gt;
&lt;td&gt;développé par Stephen R. Bourne&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;successor to sh&lt;/td&gt;
&lt;td&gt;prédécesseur de bash&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;more features&lt;/td&gt;
&lt;td&gt;less features&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;is not POSIX compliant&lt;/td&gt;
&lt;td&gt;is POSIX compliant&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;easy to use&lt;/td&gt;
&lt;td&gt;more difficult to use than bash&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;less portable than sh&lt;/td&gt;
&lt;td&gt;more portable than bash&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;bash scripting is specific to bash environment&lt;/td&gt;
&lt;td&gt;sh scripting targets all shells&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;implements &lt;code&gt;history&lt;/code&gt; command&lt;/td&gt;
&lt;td&gt;does not implement &lt;code&gt;history&lt;/code&gt; command&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h4&gt;zsh and others delusions&lt;/h4&gt;
&lt;p&gt;&lt;code&gt;Z shell&lt;/code&gt; or &lt;code&gt;zsh&lt;/code&gt; is the default software shell on the MacOS operating system. Many &lt;code&gt;GNU/linux&lt;/code&gt; users also like to use this &lt;em&gt;shell&lt;/em&gt; because of its functionality and pleasing aesthetics.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The first version of zsh was written by Paul Falstad in 1990, while a student at Princeton University. The name &quot;zsh&quot; comes from Zhong Shao, a Yale professor and teaching assistant at Princeton University. Paul Falstad thought that Shao&apos;s login identifier, &quot;zsh&quot;, was a suitable name for a shell.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h5&gt;(from wikipedia)&lt;/h5&gt;
&lt;p&gt;In particular, zsh provides the following features:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Completion of commands, options and arguments of most commands. In particular, typing the sequence of characters “cd &lt;TAB&gt;” will only allow completion by directories.&lt;/li&gt;
&lt;li&gt;Very advanced &quot;Globbing&quot; or &quot;Expansion [archive]&quot; functions&lt;/li&gt;
&lt;li&gt;Sharing command history between all currently active zsh shells.&lt;/li&gt;
&lt;li&gt;Improved use of variables and arrays.&lt;/li&gt;
&lt;li&gt;Editing of multi-line commands in a single buffer.&lt;/li&gt;
&lt;li&gt;&quot;Spelling&quot; correction of typed commands.&lt;/li&gt;
&lt;li&gt;Several compatibility modes (zsh can for example be seen as a bourne shell when executed as /bin/sh).&lt;/li&gt;
&lt;li&gt;Customizable command prompt, with the ability to display information on the right side of the screen that disappears if the command typed is too long.&lt;/li&gt;
&lt;li&gt;zsh supports Unicode since version 4.32 and is more flexible and lightweight than bash[ref. necessary], in particular thanks to a division of the code into dynamically loadable modules.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;code&gt;translated from french by google translate&lt;/code&gt;&lt;/p&gt;
&lt;h4&gt;sources&lt;/h4&gt;
&lt;p&gt;&lt;a href=&quot;https://fr.wikipedia.org/wiki/Interface_syst%C3%A8me&quot;&gt;https://fr.wikipedia.org/wiki/Interface_système&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.geeksforgeeks.org/difference-between-sh-and-bash&quot;&gt;https://www.geeksforgeeks.org/difference-between-sh-and-bash/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://fr.wikipedia.org/wiki/POSIX&quot;&gt;https://fr.wikipedia.org/wiki/POSIX&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://fr.wikipedia.org/wiki/Z_Shell&quot;&gt;https://fr.wikipedia.org/wiki/Z_Shell&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Take inspiration from the physical product development process]]></title><description><![CDATA[Robert States is a mechanical engineer specializing in the design of plastic products. Interviewed about his experience as a partner in the…]]></description><link>https://en.socratic.dev/take-inspiration-from-the-physical-product-development-process</link><guid isPermaLink="false">https://en.socratic.dev/take-inspiration-from-the-physical-product-development-process</guid><pubDate>Wed, 29 Dec 2021 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Robert States is a mechanical engineer specializing in the design of plastic products. Interviewed about his experience as a partner in the consulting firm &lt;a href=&quot;https://www.stress.com&quot;&gt;Stress Engineering Services inc.&lt;/a&gt;, the engineer describes himself as the character of the film &lt;em&gt;Pulp Fiction&lt;/em&gt;: Winston Wolf. This character played by Harvey Keitel called urgently to cover up the result of a murder committed in a car by one of the main characters of the film.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;I am Winston Wolfe. I solve problems.&quot;&lt;/p&gt;
&lt;p&gt;&quot;It&apos;s about 30 minutes away, I&apos;ll be there in 10.&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In this problem-solving interview, Robert States highlights the benefits of a consulting firm in the development of manufactured products for highly regulated industries such as the medical industry.&lt;/p&gt;
&lt;p&gt;As a software developer, my curiosity was aroused: does the software industry have any lessons to learn from the process of designing physical products?&lt;/p&gt;
&lt;p&gt;In terms of long-term reliability.&lt;/p&gt;
&lt;p&gt;Think hard software!&lt;/p&gt;
&lt;h5&gt;&apos;Been there, done that&apos; mindset&lt;/h5&gt;
&lt;p&gt;The advantage of an experienced consultant is to have experienced the same difficulties and to have solved them over and over again. When the engineer is involved in the design process, he is able to plan the critical steps; where the team is going to have difficulty. Especially its contribution by offering robust and proven solutions.&lt;/p&gt;
&lt;p&gt;In addition, the engineer offers a predictive analysis approach. This is the development of physical products based on advanced simulations. Model-based simulations improve product reliability and accuracy. If the product does not perform as expected, either the model is incorrect or the product contains flaws that must be detected.&lt;/p&gt;
&lt;h5&gt;four product development anti-patterns leading to failure&lt;/h5&gt;
&lt;p&gt;Robert States lists four common ways that lead to product development failures.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;When the engineer asks the project managers &apos;How did you get there?&apos;, The stakeholders plead ignorance. They ignored fundamental elements necessary for the success of the product. In particular, they did not know that they had to know what they had to know (!). (&apos;I didn&apos;t know I needed to know that ...&apos;)&lt;/li&gt;
&lt;li&gt;The stakeholders do not listen to each other and do not maintain a dialogue. Everyone talks about their needs without listening to others. They avoid dealing with the issues raised by the other party.&lt;/li&gt;
&lt;li&gt;Teams are constantly trying to reinvent the wheel instead of using proven solutions. The catch is that instead of benefiting from each other&apos;s experience, it imposes a learning curve on everyone in order to get up to speed before embarking on product development.&lt;/li&gt;
&lt;li&gt;Rapid prototyping also brings its share of problems. By presenting a prototype that &apos;works&apos;, especially to non-experts, you get too much trust too early in the development process.&lt;/li&gt;
&lt;/ol&gt;
&lt;h5&gt;an organizational anti-pattern leading to failures&lt;/h5&gt;
&lt;p&gt;A high turnover rate within an organization is problematic.&lt;/p&gt;
&lt;p&gt;In such an organization, there is no experienced person who knows the history of the organization&apos;s projects. According to Robert States, it is essential that these experienced people are fully included in the development of projects in order to impart &apos;tribal knowledge&apos; to new members of the organization.&lt;/p&gt;
&lt;h5&gt;conclusion: should we apply these tips to software development?&lt;/h5&gt;
&lt;p&gt;Can we really apply these tips to software development? In an ideal world, software is a fully malleable product requiring minimal planning. This is true if you have the time, money and energy to start a project regularly from scratch. For example, the SocraticDev blog you are reading now relies on a software solution: custom code on top of the &lt;a href=&quot;https://www.gatsbyjs.com&quot;&gt;GatsbyJs framework&lt;/a&gt;. A &lt;code&gt;GraphQL&lt;/code&gt; resource file management system. Surprisingly, the code hasn&apos;t changed much for two years. Even if it&apos;s &apos;just&apos; code, the fact remains that it would be a significant effort to have to reopen the code regularly.&lt;/p&gt;
&lt;p&gt;So taking the time to design a software application correctly from the start results in increased reliability and a product that delivers on its promises at a lower cost.&lt;/p&gt;
&lt;h5&gt;sources&lt;/h5&gt;
&lt;p&gt;&lt;a href=&quot;https://teampipeline.us/being-an-engineer-podcast/&quot;&gt;https://teampipeline.us/being-an-engineer-podcast/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.indiewire.com/2012/03/being-winston-wolfe-9-reasons-why-pulp-fiction-is-the-management-guide-every-indie-filmmaker-needs-48445/&quot;&gt;https://www.indiewire.com/2012/03/being-winston-wolfe-9-reasons-why-pulp-fiction-is-the-management-guide-every-indie-filmmaker-needs-48445/&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[why the software industry needs developer advocacy?]]></title><description><![CDATA[Software is driving every aspects of the economy. At the bottom of the industry are the software developers. Developers are software…]]></description><link>https://en.socratic.dev/why-the-software-industry-needs-developer-advocacy</link><guid isPermaLink="false">https://en.socratic.dev/why-the-software-industry-needs-developer-advocacy</guid><pubDate>Tue, 16 Nov 2021 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Software is driving every aspects of the economy. At the bottom of the industry are the software developers. Developers are software artisans. That&apos;s great and not so great at the same time. Not so great because they are often victims of pressure and friction from colleagues and the business they are serving.&lt;/p&gt;
&lt;p&gt;At an online lunch &amp;#x26; learn organized by Parasoft, three experienced software specialists discussed topics such as developer advocacy, focus on security and DORA metrics. The title of the webinar was &apos;Why Developer Advocacy is the Key to Transforming Your DevOps Environment&apos;&lt;/p&gt;
&lt;p&gt;Developer advocacy is a movement led by techleads and enlightened managers. They hold the belief that great software is only possible when developers are properly valued by the business. Developers advocacy is about:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;psychological safety&lt;/li&gt;
&lt;li&gt;continuous education on the job&lt;/li&gt;
&lt;li&gt;mindful onboarding of new developers&lt;/li&gt;
&lt;li&gt;inclusion in the shared vision of the products developed&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;non negotiable business needs&lt;/h2&gt;
&lt;p&gt;All businesses who bet on software need speed of execution and quality software. Their main goal is getting to market the fastest. Are they really gonna attain this target by managing projects with deadlines and putting pressure on developers? Tracy Bannon (MITRE), Bryan Finster (Defense Unicorns), and Kevin E. Greene (Parasoft) are against this.&lt;/p&gt;
&lt;p&gt;For Bryan Finster &quot;you get speed if you do it the right way&quot;. He highlights DORA&apos;s &lt;code&gt;deployment frequency&lt;/code&gt; as often being wrongly taken as a metric of speed. For him, speed is the outcome of a healthy process. For example, excellence in &lt;code&gt;deployment frequency&lt;/code&gt; is not about coding faster but in deploying smaller batches of code frequently.&lt;/p&gt;
&lt;p&gt;Tracy Bannon notes that &lt;code&gt;deployment frequency&lt;/code&gt; is not a silver bullet. Certain domains like governement&apos;s agencies, embedded softwares and aeronautics would not benefit from multiple daily deployment to production. Instead of deploying once every 2 years, being able to deploy every 6 months would be a great improvement in those fields.&lt;/p&gt;
&lt;p&gt;She also stresses that a key to healthy development flow is a fast feedback loop : &lt;code&gt;fail fast - fail cheap&lt;/code&gt;. For example, developing software for a fighter jet like the F-35 can require deploying to a simulator and making those deployments count as deployment to production.&lt;/p&gt;
&lt;h2&gt;build product teams not project teams&lt;/h2&gt;
&lt;p&gt;Tracy Bannon recalls a famous saying in the contracting world : &lt;code&gt;code, load and hit the road&lt;/code&gt;. Unfortunately developing software as a project promotes developers&apos; disengagement. They are being pressured to deliver a list of features and once it&apos;s done, they are moving on to a different project.&lt;/p&gt;
&lt;p&gt;Healthy software products cannot get built as a project. Unfortunately large organizations and governement&apos;s agencies ways of solliciting bids on contracts encourage such software failures.&lt;/p&gt;
&lt;p&gt;Consulting firms should promote developer advocacy by educating their clients about the fondamentals of good software.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Good software is built by teams with a shared vision. Developers who care about the product. Developers who care about the end users.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;promoting developers&apos; education&lt;/h2&gt;
&lt;p&gt;Bryan Finster bluntly states that &quot;colleges and bootcamps do not output good developers&quot;. Hiring junior developers entail the need to educate them to fullfill the business needs. Tracy Bannon talks about a recalibration of their skills. She uses the term &apos;influence forward&apos; by putting forward the need, for the software industry, to go to colleges to discuss about what skills are needed for future developers. She underlines that some large tech organization had already form bonds with certain institutions. But such initiatives are still scarce.&lt;/p&gt;
&lt;p&gt;According to the panel, developers are not deliberate enough about their purpose and their careers. They often use their own free time to level up their skills. With no long term target in mind.&lt;/p&gt;
&lt;p&gt;Bryan Finster declares that it is not acceptable for developers to have to learn about software quality or software security as a side project. The best developers spend their own time to better themselves ; in a non formal way of learning.&lt;/p&gt;
&lt;p&gt;In job interviews, when asked how they stay current and improve in technology most developers talk about personal projects and learnings done on their own time ; not during work hours.&lt;/p&gt;
&lt;p&gt;Until developers are considered code monkeys we will need developer advocacy to improve the software industry.&lt;/p&gt;
&lt;h5&gt;sources&lt;/h5&gt;
&lt;p&gt;&lt;a href=&quot;https://www.parasoft.com/webinar/why-developer-advocacy-is-the-key-to-transforming-your-devops-environment/&quot;&gt;https://www.parasoft.com/webinar/why-developer-advocacy-is-the-key-to-transforming-your-devops-environment/&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[simple project: automate the encryption of backup files]]></title><description><![CDATA[A good file backup strategy is to keep a copy of the files on a different physical medium than the original as well as a copy of the same…]]></description><link>https://en.socratic.dev/simple-project-automate-the-encryption-of-backup-files</link><guid isPermaLink="false">https://en.socratic.dev/simple-project-automate-the-encryption-of-backup-files</guid><pubDate>Wed, 21 Jul 2021 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;A good file backup strategy is to keep a copy of the files on a different physical medium than the original as well as a copy of the same files in another physical location. An excellent option for undertaking your backups at a different location is to send them to the &lt;code&gt;cloud&lt;/code&gt;. We can often use a free option with the big players &lt;code&gt;Google&lt;/code&gt;,&lt;code&gt; Microsoft&lt;/code&gt; or &lt;code&gt;Dropbox&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;However, we must be careful and consider the fate of these files entrusted to a foreign infrastructure. Are we comfortable that our files are made available to hackers in the event of a security breach? Or, a little less serious, are we comfortable with these tech goliaths exploiting the content of our files?&lt;/p&gt;
&lt;p&gt;My answer is no. And the solution I propose is to store only encrypted files on the public cloud. That is, on servers made available and managed by someone other than yourself.&lt;/p&gt;
&lt;h5&gt;Manual process under &lt;code&gt;linux&lt;/code&gt;&lt;/h5&gt;
&lt;p&gt;In &lt;code&gt;linux&lt;/code&gt;, the process is very simple. In less than 3 command lines, the contents of a directory are encrypted using the &lt;code&gt;GPG - GNU Privacy Guard&lt;/code&gt; library. However, the backup process should be performed regularly and consistently. The best option is automation. Automating will prevent us from making errors and above all will prevent us from laziness neglecting these maneuvers which will save our lives in the event of a hardware failure or ransomware attack.&lt;/p&gt;
&lt;h5&gt;Automate using &lt;code&gt;bash&lt;/code&gt; scripts&lt;/h5&gt;
&lt;p&gt;In terms of automation, the most economical way is to script commands executed manually on a terminal.&lt;/p&gt;
&lt;p&gt;Scripting is often a temporary and intermediate step. Before arriving at a robust and professional solution, we get our toes wet by quickly producing reusable scripts.&lt;/p&gt;
&lt;p&gt;For example, in the time of a night, I coded two &lt;code&gt;bash&lt;/code&gt; scripts to meet my need. A first script to encrypt a directory. A second script to decrypt the encrypted file. With these two scripts I am able to save time in the backup process. And above all, it motivates me to stay disciplined and regularly backup my files.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;These scripts are available and ready to be used: [&lt;a href=&quot;https://github.com/socraticDevBlog/encrypted-backupsialis(https://github.com/socraticDevBlog/encrypted-backups)&quot;&gt;https://github.com/socraticDevBlog/encrypted-backupsialis(https://github.com/socraticDevBlog/encrypted-backups)&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The &lt;code&gt;encrypt.sh&lt;/code&gt; file compresses the contents of a directory; that is, it reduces it to a compressed file. Then, it uses the &lt;code&gt;GPG&lt;/code&gt; library to encrypt it. &lt;code&gt;GPG&lt;/code&gt; needs a&lt;code&gt; passphrase&lt;/code&gt; for its symmetric encryption algorithm. So our script hands over to this library which opens a modal window and asks the user to enter a &apos;password&apos; phrase.&lt;/p&gt;
&lt;p&gt;We will use this same password to decrypt our directory.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;# compress given directory to a custom named archive
archive_filename=${archive}-$(date +&quot;%Y-%m-%d&quot;).tar.gz
tar -zcvf ${archive_filename} ${dir_path}/*

# encrypt archived file
gpg --output ${archive_filename}.gpg --symmetric $archive_filename

# remove temporary compressed directory
rm ${archive_filename}
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The &lt;code&gt;decrypt.sh&lt;/code&gt; file is used to decrypt the encrypted directory. It simply performs the reverse actions of the encryption process. In the end, we will find the original directory containing all the original files!&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;# decrypt file to compressed archive
gpg --output $archive_file_name --decrypt ${1}

# decompress archive to original folder
tar xzvf ${archive_file_name}

# remove compressed archive
rm ${archive_file_name}
&lt;/code&gt;&lt;/pre&gt;
&lt;h5&gt;Conclusion&lt;/h5&gt;
&lt;p&gt;Thanks to these two scripts I feel armed to implement a healthy strategy of backing up personal files to the public cloud.&lt;/p&gt;
&lt;p&gt;However, I plan to modify these scripts and possibly automate the backup process from A to Z. That is to say schedule a regular process (daily or weekly) which will take care of sending a set of backups to the cloud. This will give me peace of mind: in the event of a technical problem or a ransomware attack, I will be able to recover my essential data in no time.&lt;/p&gt;
&lt;p&gt;If you are tempted to use a strategy similar to mine, I would love to hear about it. Never hesitate to contact me via &lt;code&gt;Twitter&lt;/code&gt; or&lt;code&gt; LinkedIn&lt;/code&gt; to start a tech talk!&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Translation by Google translate&lt;/code&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Buck stops here : being intentional at software development]]></title><description><![CDATA[Professional software developers occupy a paradoxical position on the totem pole. We are both at the top ... and more often at the bottom…]]></description><link>https://en.socratic.dev/buck-stops-here-being-intentional-at-software-development</link><guid isPermaLink="false">https://en.socratic.dev/buck-stops-here-being-intentional-at-software-development</guid><pubDate>Thu, 17 Jun 2021 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Professional software developers occupy a paradoxical position on the totem pole. We are both at the top ... and more often at the bottom. We are at the top because we are ones who add value to software by adding features or fixing issues. We are at the bottom because shit flows downhill. An array of non-technical specialists hover around software but, at the end of the day, coders are the one who implement and maintain their designs.&lt;/p&gt;
&lt;p&gt;Professional software developers can&apos;t pass the buck. We either implement or design a workaround.&lt;/p&gt;
&lt;h2&gt;Being intentional&lt;/h2&gt;
&lt;p&gt;To me, the greatest quality a software developer can have is being intentional about his work. &apos;Being intentional&apos; means &apos;doing things on purpose&apos;. It entails knowing with clarity the goals one wants to achieve or the issues one wants fixed. Knowing our targets almost always lead us to discover the steps and assess the effort needed to attain them.&lt;/p&gt;
&lt;p&gt;Being intentional means working with a clear mind, having a plan, and being able to measure progress. Finally, it means knowing when we&apos;re done. When we have fullfilled the objectives of a task it means we are done.&lt;/p&gt;
&lt;h2&gt;Opposite of being intentional&lt;/h2&gt;
&lt;p&gt;Don&apos;t get me wrong, not being intentional is our default setting. Mine included. Our natural laziness and arrogance trick us into thinking we can coast our way into success. But we cannot.&lt;/p&gt;
&lt;p&gt;Here are some manifestation of not being intentional :&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;multitasking : juggling various tasks at the same time. It gives us the feeling we are being productive but we really never get anything done.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;debugging : instead of reading code, reading logs and using automated testing, debugging code is time consuming and very tiring to the mind.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;trying to pass the buck : an intentional developer doesn&apos;t pass the buck. He knows that the buck must stop at his workstation. He either develops that feature, fixes that bug or ... die trying. The intentional developer thrives on problem solving. He can ask for guidance but he must do everything in his power to close that ticket.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Tips to be more intentional&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Be deliberate with your use of time. Wake up early if you need to. Don&apos;t multitask. Say &apos;no&apos; more than &apos;yes&apos;. Become better at assessing effort and time.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Be extra clear on the results you want to attain. Try not to leave stuff half done. At the very least keep half done stuff on your local machine and never available to colleagues. When you are done celebrate.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Use your focus wisely. Our attention span is limited, our mind can get tired. Spend your focused mind only on tasks that are relevant to your goals. Refuse to spend energy on issues that are not beneficial to you or your team goals.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Be grateful and cultivate relationships with people who help you attain your goals. Software development is a team activity. Most of your goals are linked to other people&apos;s goals. Leverage these common goals. Working as a team might be slower than alone, but will lead you much further !&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h5&gt;sources&lt;/h5&gt;
&lt;p&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=2K7GfaQezp8&quot;&gt;Success Comes To Those Who Are Intentional - Leadership Advice From John C. Maxwell&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://lucemiconsulting.co.uk/be-intentional/&quot;&gt;https://lucemiconsulting.co.uk/be-intentional/&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[The missing step metaphor]]></title><description><![CDATA[Imagine entering an unfamiliar house and immediately you notice that a step is missing from the main staircase. You worry out loud about the…]]></description><link>https://en.socratic.dev/the-missing-step-metaphor</link><guid isPermaLink="false">https://en.socratic.dev/the-missing-step-metaphor</guid><pubDate>Sat, 27 Feb 2021 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Imagine entering an unfamiliar house and immediately you notice that a step is missing from the main staircase. You worry out loud about the danger this represents. But the host silences you:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Yeah ... We know it&apos;s not safe, but everyone in the house has gotten into the habit of taking a longer stride to avoid the hole. In fact: we&apos;ve never had a problem ! You just have to be careful. &quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The &lt;code&gt;missing step&lt;/code&gt; metaphor conjures up a problematic situation tacitly accepted by a community instead of being corrected. The blog &lt;strong&gt;The Pervocracy&lt;/strong&gt; is credited for its characterization in an article dealing with tolerance towards a known sexual predator in a community (in real life).&lt;/p&gt;
&lt;p&gt;The metaphor is not limited to the silence and inaction of a community toward criminal acts. We can speak of the &lt;code&gt;missing step&lt;/code&gt; in different contexts:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A friend has the habit of borrowing money without ever giving it back;&lt;/li&gt;
&lt;li&gt;A colleague at work never completes the tasks entrusted to him;&lt;/li&gt;
&lt;li&gt;Part of your computerized system relying on code that only one employee can understand and work on.&lt;/li&gt;
&lt;/ul&gt;
&lt;h5&gt;How to recognize this kind of situation?&lt;/h5&gt;
&lt;p&gt;This is a situation known to most of the group. When a new person joins, either they are surprised by the situation or an insider passes on the infamous information to them by suggesting they close their eyes.&lt;/p&gt;
&lt;p&gt;The group is able to function normally because its members have developed a workaround for the problem.&lt;/p&gt;
&lt;h5&gt;Why is it a problem?&lt;/h5&gt;
&lt;p&gt;This is the tragic question of truth and justice. It would take more energy and courage to face the problem than to tolerate the &lt;em&gt;status quo&lt;/em&gt;. However, this is a lie that takes its toll. Instead of blaming the negligence and laziness of the owners of the missing house, the community is led to blame the person who could not avoid the hole. The victim becomes the culprit.&lt;/p&gt;
&lt;p&gt;Absurd and tragic. No?&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Translated by Google translate&lt;/code&gt;&lt;/p&gt;
&lt;h5&gt;sources&lt;/h5&gt;
&lt;p&gt;&lt;a href=&quot;http://pervocracy.blogspot.com/2012/06/missing-stair.html&quot;&gt;http://pervocracy.blogspot.com/2012/06/missing-stair.html&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Keep your data in your own personal cloud]]></title><description><![CDATA[If you have a large volume of data or if you require a certain level of security for your documents, the use of a NAS (network attached…]]></description><link>https://en.socratic.dev/keep-your-data-in-your-own-personal-cloud</link><guid isPermaLink="false">https://en.socratic.dev/keep-your-data-in-your-own-personal-cloud</guid><pubDate>Sat, 13 Feb 2021 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;If you have a large volume of data or if you require a certain level of security for your documents, the use of a &lt;code&gt;NAS&lt;/code&gt; (network attached storage) could meet your needs. Hosting a large volume of data in the cloud is expensive. Storing unencrypted documents in the public cloud is risky.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;How can you be sure your data are safe on a public cloud service?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Local area network storage is essential for businesses and large organizations. In order to streamline work, we store and make available any document essential to the proper functioning of business. Most of the time, this storage comes in the form of an additional drive available on your PC when you are connected to the internal company network. Users usually maintain a rigorous order there, system administrators manage the various read and write permissions, and an automated system performs a regular backup of all data.&lt;/p&gt;
&lt;h5&gt;why have a &lt;code&gt;NAS&lt;/code&gt; at home?&lt;/h5&gt;
&lt;p&gt;Different needs motivate the use of a &lt;code&gt;NAS&lt;/code&gt; at home. Many movie collectors a &lt;code&gt;NAS&lt;/code&gt; to store their collection and other digital content. By adding a &lt;code&gt;RAID&lt;/code&gt; redundancy system, they ensure protection against defective hard disks.&lt;/p&gt;
&lt;p&gt;Me? I use a &lt;code&gt;NAS&lt;/code&gt; because it offers a centralized source of data. Since I am working from multiple computers, file duplication had become problematic. Thanks to the &lt;code&gt;NAS&lt;/code&gt;, I can access the same file through any device connected to the local network.&lt;/p&gt;
&lt;h5&gt;weigh the pros and cons&lt;/h5&gt;
&lt;p&gt;against :&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;It is easier to centralize your data by using disk space in the public cloud such as &lt;code&gt;dropbox&lt;/code&gt; or &lt;code&gt;Google drive&lt;/code&gt;;&lt;/li&gt;
&lt;li&gt;Local area storage does not work well for those who work on the road or outside the home;&lt;/li&gt;
&lt;li&gt;A &lt;code&gt;NAS&lt;/code&gt; requires additional administration efforts: update, backup, etc.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;for :&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Getting a large storage space at low cost;&lt;/li&gt;
&lt;li&gt;Managing and safe-keeping your personal data yourself;&lt;/li&gt;
&lt;li&gt;Encrypting all your personal data (strongly suggested);&lt;/li&gt;
&lt;li&gt;Data transfer rates on a local network are around 100 mb / s, there is almost no difference between loading a file located on your PC than the same live file on the &lt;code&gt;NAS&lt;/code&gt;;&lt;/li&gt;
&lt;li&gt;Reducing your ecological footprint: a small &lt;code&gt;NAS&lt;/code&gt; running under Linux consumes almost no electricity.&lt;/li&gt;
&lt;/ul&gt;
&lt;h5&gt;strategy for keeping your data&lt;/h5&gt;
&lt;ol&gt;
&lt;li&gt;Keep all your files on the &lt;code&gt;NAS&lt;/code&gt;. Do not keep copies on different workstations;&lt;/li&gt;
&lt;li&gt;Classify and keep your files in order;&lt;/li&gt;
&lt;li&gt;Make regular backups: any valuable file should exist in 3 copies. A current version on your &lt;code&gt;NAS&lt;/code&gt;, a copy in a backup stored on another machine. A third copy, encrypted, stored in the public cloud (or on a hard drive located elsewhere than your home);&lt;/li&gt;
&lt;li&gt;Encrypt the entire hard drive. Modern &lt;code&gt;NAS&lt;/code&gt; are powerful enough to encrypt and decrypt your data on the fly without losing performance.&lt;/li&gt;
&lt;/ol&gt;
&lt;h5&gt;conclusion&lt;/h5&gt;
&lt;p&gt;Using a &lt;code&gt;NAS&lt;/code&gt; is not a magic cure but a valuable tool to make your digital life easier. Installing and administering such a system will take time, but will prove beneficial.&lt;/p&gt;
&lt;p&gt;Give it a try!&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Achieving by non-doing]]></title><description><![CDATA[Against a commonly accepted ideology imposing self-actualisation and perpetual state of hustling as moral values, lays a calm principle…]]></description><link>https://en.socratic.dev/achieving-by-non-doing</link><guid isPermaLink="false">https://en.socratic.dev/achieving-by-non-doing</guid><pubDate>Fri, 11 Dec 2020 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Against a commonly accepted ideology imposing self-actualisation and perpetual state of hustling as moral values, lays a calm principle layed upon a complete metaphysical system of the world.&lt;/p&gt;
&lt;p&gt;Taoism states that &lt;code&gt;non doing&lt;/code&gt; (Wu wei) is a fundamental principle of government and self-government.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Taoism&lt;/em&gt; is a philosophical tradition based on the writings of Chinese philosopher Laozi (4th century B.C.). The renowned book &lt;em&gt;Tao te Ching&lt;/em&gt; is described as the &quot;book of the way and virtue&quot;. It proposes a metaphysical explanation of the origin of the world. An explanation of the principles ruling the world. Its teachings are aimed at the sage and the enlightened ruler. Against our commonly accepted values, it describes the best way to be effective : by doing as little as possible.&lt;/p&gt;
&lt;h5&gt;Tao Te Ching – Verse 60&lt;/h5&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;Governing a large country&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;is like frying a small fish.
You spoil it with too much poking.
Center your country in the Tao
and evil will have no power.
Not that it isn’t there,
but you’ll be able to step out of its way.&lt;br/&gt;&lt;br/&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Give evil nothing to oppose&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;and it will disappear by itself.&quot;&lt;/p&gt;
&lt;h5&gt;sources&lt;/h5&gt;
&lt;p&gt;&lt;a href=&quot;https://www.wikiwand.com/en/Wu_wei&quot;&gt;https://www.wikiwand.com/en/Wu_wei&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.britannica.com/biography/Han-Feizi&quot;&gt;https://www.britannica.com/biography/Han-Feizi&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.wikiwand.com/en/Taoism&quot;&gt;https://www.wikiwand.com/en/Taoism&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.harinam.com/tao-te-ching-verse-60-governing-a-large-country-is-like-frying-a-small-fish-you-spoil-it-with-too-much-poking/&quot;&gt;https://www.harinam.com/tao-te-ching-verse-60-governing-a-large-country-is-like-frying-a-small-fish-you-spoil-it-with-too-much-poking/&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[never cross the Bridge of Sighs unless you are truly indispensable]]></title><description><![CDATA[In the Italy of Renaissance, small northern city-states were in a constant state of war with each other. These cities were commercially…]]></description><link>https://en.socratic.dev/never-cross-the-bridge-of-sighs-unless-you-are-truly-indispensable</link><guid isPermaLink="false">https://en.socratic.dev/never-cross-the-bridge-of-sighs-unless-you-are-truly-indispensable</guid><pubDate>Sun, 11 Oct 2020 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;In the Italy of Renaissance, small northern city-states were in a constant state of war with each other. These cities were commercially prosperous but lacked proper military resources. Thus they outsourced military duties to outside contractors; to mercenaries known as &lt;em&gt;Condotierre&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Francesco Bussone, Count of Carmagnola (1382 – 5 May 1432), was a famous and successful condotierre for the Visconti family (Duchy of Milan). When given reins of an army, he quickly subdued Bergamo, Brescia, Parma, Genoa and other cites. Concerned by his ambitions, the Viscontis removed him from military duties and gave him the position of governor of Genoa. Discontent with the way he was treated by the Viscontis, Count Carmagnola befriended Francesco Foscari, the new Doge of Venice in 1425. Venice feared the ambitions of the Viscontis and wanted to wage a quick and decisive offensive on Milan with the help of the Florentians.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;But while the republic (of Venice) was desirous of rapid and conclusive operations, it was to the interest of Carmagnola, as indeed to all other soldiers of fortune, to make the operations last as long as possible, to avoid decisive operations, and to liberate all prisoners quickly. Consequently, the campaign dragged on interminably, some battles were won and others lost, truces and peace treaties were made only to be broken, and no definite result was achieved.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Admired and love by all, in 1442, Count Carmagnola was invited to dine with the Doge at the Doge palace. Once in Venice, the guards led the way. But having crossed the Bridge of Sighs, he realized they were not taking him to the palace but to the dungeon. He was condemned to death on charges of treason against the republic and beheaded the next day on the Piazza San Marco to the amazement of the crowd, surprised by such a sudden change of fate.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;A man of ability, his great mistake was that he failed to see that he could not do with a solvent and strong government what he could with bankrupt tyrants without military resources, and that the astute Visconti meant to ruin him for his abandonment.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&quot;He had taken his power for granted without making sure he was truly indispensable.&quot;&lt;/p&gt;
&lt;h4&gt;sources&lt;/h4&gt;
&lt;p&gt;Robert Greene (1998), &quot;The 48 Laws of power&quot;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.wikiwand.com/en/Francesco_Bussone_da_Carmagnola&quot;&gt;https://www.wikiwand.com/en/Francesco_Bussone_da_Carmagnola&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Gift Culture might be your way out]]></title><description><![CDATA[Gift Culture, also known as Gift Economy, is a social exchange system adopted by some human societies when resources are in abundance. In…]]></description><link>https://en.socratic.dev/gift-culture-might-be-your-way-out</link><guid isPermaLink="false">https://en.socratic.dev/gift-culture-might-be-your-way-out</guid><pubDate>Sat, 12 Sep 2020 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;code&gt;Gift Culture&lt;/code&gt;, also known as &lt;code&gt;Gift Economy&lt;/code&gt;, is a social exchange system adopted by some human societies when resources are in abundance. In societes where everyone&apos;s needs are taken care off, anthropologists have seen this curious phenomenon where the act of giving away ones own wealth makes him richer and elevates his social status. In aboriginal cultures, in mild climates where food is abundant, they have witnessed gift culture happening. On America&apos;s West Coast, there is &lt;code&gt;potlach&lt;/code&gt; ceremonies where tribal leaders massively distribute gifts to their community. This culture of generosity is also present in show business and among the really wealthy.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;In gift culture, social status is determined not by what you control but by what you give away.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4&gt;What about us developers of the 21st century ?&lt;/h4&gt;
&lt;p&gt;&lt;code&gt;Open-source software&lt;/code&gt; is based on a &lt;code&gt;gift economy&lt;/code&gt;. Skilled programmers can easily find good paying jobs, computer and hardware is available and not very expensive. Somewhat, developers live in a contexte of &lt;code&gt;abundance&lt;/code&gt;. In their free time, their noble goal is to craft something useful and share it freely with the community. If you give away good code or help people out : you will enrich the community and gain status. The ones directly helped may not immediately give something back to you. But when they become able to help you, they will. Or if strangers hear that you&apos;re a kind programmer and contribute to the community : they might invite you to do cool work with them and take care good care of you.&lt;/p&gt;
&lt;p&gt;On the other hand, if all you do is being mean and trying to be clever : no one will want to help you.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Today the professions where you can make the most money aren&apos;t the ones that are contributing the most to society. You can make a lot of money by doing terrible things. And for the things we need the most : they&apos;re aren&apos;t much money in them.
&lt;cite&gt;-- Charles Eisenstein&lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;code&gt;Gift Culture&lt;/code&gt;&apos;s objective is fostering &quot;a system of ties and obligations&quot;. While the &lt;code&gt;money economy&lt;/code&gt; is fostering the relationship between things being traded, the &lt;code&gt;gift economy&lt;/code&gt; fosters the relationships between the people doing the trading.&lt;/p&gt;
&lt;h5&gt;sources&lt;/h5&gt;
&lt;p&gt;&lt;a href=&quot;http://www.catb.org/~esr/writings/cathedral-bazaar/homesteading/ar01s06.html&quot;&gt;The Hacker Milieu as Gift Culture&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=N_gYjQw9Bf4&quot;&gt;Potlach 1&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=tpXNS-ZnKoQ&quot;&gt;Potlach 2&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=6S1egXWYwXo&quot;&gt;Charles Eisenstein: &apos;In a gift economy the more you give, the richer you are&apos;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=EaxjxICgahc&quot;&gt;What is a gift economy? - Alex Gendler&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Annual Report filing for SocraticDev's blog]]></title><description><![CDATA[Current SocraticDev blog's website went live a little less than a year ago: on October 17, 2019. The blog previously benefited from free…]]></description><link>https://en.socratic.dev/annual-report-filing-for-socraticdevs-blog</link><guid isPermaLink="false">https://en.socratic.dev/annual-report-filing-for-socraticdevs-blog</guid><pubDate>Fri, 04 Sep 2020 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Current SocraticDev blog&apos;s website went live a little less than a year ago: on &lt;code&gt;October 17, 2019&lt;/code&gt;. The blog previously benefited from free hosting on the &lt;code&gt;wordpress.com&lt;/code&gt;  platform. Despite the ease of putting a site online and adding content to it, I wanted absolute control over my content. As a programmer, you just have to take care of building and putting your personal blog online. Fun fact : the creation of a personal blog site is non-ironically the basic project for all JavaScript frameworks available on the market 😉&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“If you love writing or making music or blogging or any sort of performing art, then do it. Do it with everything you’ve got. Just don’t plan on using it as a shortcut to making a living.&quot;&lt;/p&gt;
&lt;p&gt;&lt;cite&gt;-- Seth Godin&lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4&gt;Benefits of taking control of your personal blog:&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;be the owner of your content;&lt;/li&gt;
&lt;li&gt;do not bore your readers with ads;&lt;/li&gt;
&lt;li&gt;master a new way of programming
&lt;ul&gt;
&lt;li&gt;a static website open to the general public is very different from a web application connected to a database&lt;/li&gt;
&lt;li&gt;learn to submit with humility to a JavaScript framework, use its modules, write &lt;code&gt;MarkDown&lt;/code&gt; files, read the documentation and ... &lt;code&gt;Everything will be allright&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;better understand how the web works:
&lt;ul&gt;
&lt;li&gt;purchase and management of domain names and &lt;code&gt;DNS&lt;/code&gt;;&lt;/li&gt;
&lt;li&gt;use of a &lt;code&gt;TLS&lt;/code&gt; security certificate&lt;/li&gt;
&lt;li&gt;use of a continuous deployment pipeline (&lt;code&gt;CI/CD&lt;/code&gt;)&lt;/li&gt;
&lt;li&gt;choose to host your site on a `` CDN &apos;&apos; because it&apos;s really better 🌎&lt;/li&gt;
&lt;li&gt;use of metrics to determine how to add value to your website:
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://analytics.google.com&quot;&gt;Google Analytics&lt;/a&gt; to know the origin of its readers, the time spent on each page, if they return to visit the site, etc.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://developers.google.com/speed/pagespeed/insights/?hl=fr&quot;&gt;PageSpeed ​​Insights&lt;/a&gt; to measure the performance of websites as well as follow the suggestions offered to improve the loading speed and the user experience&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Some features implemented and bugs fixed&lt;/h4&gt;
&lt;p&gt;The SocraticDev blog website is powered by the &lt;a href=&quot;https://www.gatsbyjs.com/&quot;&gt;GatsbyJS framework&lt;/a&gt;. As a proud programmer, I did not use the included boilerplate project for the blog&apos;s creation. Instead, I followed an online tutorial where a seasoned developer guides us to making a high-performance and well-designed site.&lt;/p&gt;
&lt;p&gt;This developer-educator had the good idea to suggest the using tags containing posts&apos; topics. This makes it possible to list, in an independent page, the different subjects treated. Then, the user can click on a topic of interest and view a list of posts related to that topic. The only catch was that I wanted to see the list of topics in descending order of incidence. For example, I wanted to see the &quot;Technology&quot; badge at the top because most of the posts are about tech, while the subject &quot;Interview&quot; should stay at the bottom because I have only conducted one interview to date. To do this, I had to create a small custom sort function ... which uses the &lt;code&gt;BubbleSort&lt;/code&gt; algorithm 😎 Because it works!&lt;/p&gt;
&lt;p&gt;This summer, by updating my dependencies with &lt;code&gt;npm&lt;/code&gt;, the internal hyperlinks to the site simply stopped working. With the help of &lt;a href=&quot;http://vezquex.com/&quot;&gt;Bernie&lt;/a&gt; and Google I quickly found the solution to the problem. The moral of the story: when using lots of external libraries, by keeping them up to date, it is easy to quickly remedy &lt;code&gt;breaking changes&lt;/code&gt;.&lt;/p&gt;
&lt;h4&gt;What does the future hold for us?&lt;/h4&gt;
&lt;p&gt;On the GitHub kanban, &lt;code&gt;issues&lt;/code&gt; were created for the future: a toggleable &lt;code&gt;dark mode&lt;/code&gt; allowing my insomniac readers to pamper their precious eyes. I anticipate the need to rework the pagination of the tickets because the visual is not pretty on mobile ... On the technical side, it is possible that I completely redesign the site in order to have fun with another technology.&lt;/p&gt;
&lt;p&gt;I would like to conduct more interviews. I believe that talking to people with different experiences in the trade helps us better understand our field as well as make connections with our own experiences. The interview with &lt;a href=&quot;https://en.socratic.dev/q-a-with-a-devops-professional&quot;&gt;ptdel&lt;/a&gt; allowed me to get to know this American developer better. We still keep in touch to this day.&lt;/p&gt;
&lt;p&gt;Regarding projects, the acquisition of a &lt;a href=&quot;https://www.linode.com/&quot;&gt;vps server&lt;/a&gt; motivates me to develop new projects and experiment at will. From this server I use the domain &lt;a href=&quot;https://dailybuild.org/&quot;&gt;dailybuild.org&lt;/a&gt; as a showcase for the &lt;code&gt;#dailybuild&lt;/code&gt; programming community. I play a lot with small projects such as daily cron jobs running to visit job sites and save relevant offers to me.&lt;/p&gt;
&lt;p&gt;Otherwise here is a list of topics I would like to cover:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.lexiconbranding.com/&quot;&gt;Lexicon&lt;/a&gt;: an influential branding firm that comes up with cool names for your products;&lt;/li&gt;
&lt;li&gt;is &lt;code&gt;jQuery&lt;/code&gt; really dead ?;&lt;/li&gt;
&lt;li&gt;the concept of &lt;code&gt;geo fencing&lt;/code&gt;;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;Concurrency, threading and parallelism&lt;/code&gt;;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;Domain Specific Languages&lt;/code&gt;;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;Graph API&lt;/code&gt;;&lt;/li&gt;
&lt;li&gt;Is there really a &apos;FullStack&apos; developer ?;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;Digital Forensics&lt;/code&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;Thanks&lt;/h4&gt;
&lt;p&gt;I first want to thank &lt;a href=&quot;https://snipcart.com&quot;&gt;snipcart&lt;/a&gt; for setting up monthly meetups to talk about the &lt;code&gt;JamStack&lt;/code&gt; and help Quebec City&apos;s devs to tame this technology.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://twitter.com/eggbertx&quot;&gt;MrRoach&lt;/a&gt; did a great job improving the original logo that I had produced through &lt;a href=&quot;https://www.fiverr.com/&quot;&gt;Fiverr&lt;/a&gt;. I love working with &lt;code&gt;SVG&lt;/code&gt; files 🎉&lt;/p&gt;
&lt;p&gt;I also thank the readers. Especially those who take the time to write me a note. You have no idea how much more it is appreciated than figures from the &lt;code&gt;Google Analytics&lt;/code&gt; app!&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Translated from french by Google Translate&lt;/code&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[What is SaltStack]]></title><description><![CDATA[SaltStack is a high-speed platform for provisioning and controlling distributed computing resources. Salt Cloud is a configuration…]]></description><link>https://en.socratic.dev/what-is-saltstack</link><guid isPermaLink="false">https://en.socratic.dev/what-is-saltstack</guid><pubDate>Sun, 16 Aug 2020 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;SaltStack is a high-speed platform for provisioning and controlling distributed computing resources. &lt;code&gt;Salt Cloud&lt;/code&gt; is a configuration management tool that allows users to provision systems on cloud hosts or hypervisors. During installation, &lt;code&gt;Salt Cloud&lt;/code&gt; installs &lt;code&gt;Salt&lt;/code&gt; on all provisioned systems by default. This enables the user to put systems into the desired state during provisioning.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Salt&lt;/code&gt; was released in November 2011 and LinkedIn dev teams were the first major early adopter.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;Salt&lt;/code&gt; is a configuration management engine to provide idempotent application of machine states to those hosts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;I became aware of &lt;code&gt;Salt&lt;/code&gt; via &lt;a href=&quot;https://www.saltstack.com/the-hacks/&quot;&gt;The Hacks&lt;/a&gt;: a nerdy podcast hosted by Salt&apos;s founder Thomas Hatch and Jimmy Chonga, a tech newbie and former morning radio host.&lt;/p&gt;
&lt;p&gt;Being a software and fullstack web dev, I&apos;ve asked a devops pro about &lt;em&gt;Salt&lt;/em&gt; and he told be it&apos;s &lt;a href=&quot;https://www.urbandictionary.com/define.php?term=Based&quot;&gt;&apos;based&apos;&lt;/a&gt;. He had experience with it by helping an organization setup their infrastructure and he was pleased with the product.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;SaltStack&lt;/code&gt; makes software for complex systems management at scale. &lt;code&gt;SaltStack&lt;/code&gt; is the company that created and maintains the &lt;code&gt;Salt&lt;/code&gt; Open project and develops and sells &lt;em&gt;SaltStack Enterprise software&lt;/em&gt;, services and support. Easy enough to get running in minutes, scalable enough to manage tens of thousands of servers, and fast enough to communicate with them in seconds.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;Salt&lt;/code&gt; is a new approach to infrastructure management built on a dynamic communication bus. &lt;code&gt;Salt&lt;/code&gt; can be used for data-driven orchestration, remote execution for any infrastructure, configuration management for any app stack, and much more.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;code&gt;Salt&lt;/code&gt; viable alternatives are &lt;code&gt;Chef&lt;/code&gt;, &lt;code&gt;Puppet&lt;/code&gt;, and &lt;code&gt;Ansible&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;However, adopters usually become die-hard fans of the product. One CTO stresses &lt;code&gt;Salt&lt;/code&gt; was the best product to manage his large scale &lt;code&gt;Windows Server&lt;/code&gt; based infrastructure. Easy maintenance is guaranteed mainly thru &quot;a good reporting mechanism that allows one to easily view all operations&quot;.&lt;/p&gt;
&lt;p&gt;When compared to competitors, &lt;code&gt;Salt&lt;/code&gt; is the way to go if &lt;strong&gt;scalability&lt;/strong&gt; and &lt;strong&gt;resilience&lt;/strong&gt; is the most important concern for your organization.&lt;/p&gt;
&lt;h5&gt;sources&lt;/h5&gt;
&lt;p&gt;&lt;a href=&quot;https://github.com/saltstack/salt&quot;&gt;https://github.com/saltstack/salt&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=_TVNCTK808I&quot;&gt;Chef vs Puppet vs Ansible vs Saltstack | Configuration Management Tools | DevOps Tools | Simplilearn&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.linode.com/docs/applications/configuration-management/configure-and-use-salt-cloud-and-cloud-maps-to-provision-systems/&quot;&gt;Configure and Use &lt;code&gt;Salt&lt;/code&gt; Cloud and Cloud Maps to Provision Systems&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.wikiwand.com/en/Salt_(software)&quot;&gt;https://www.wikiwand.com/en/Salt_(software)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.wikiwand.com/en/Infrastructure_as_code&quot;&gt;https://www.wikiwand.com/en/Infrastructure_as_code&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.wikiwand.com/en/ZeroMQ&quot;&gt;https://www.wikiwand.com/en/ZeroMQ&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Expect: automation and semi-automation of processes under Linux]]></title><description><![CDATA[Expect is a TCL based utility which excels in automating interactive tasks. Expect is  a program that "talks" to other interactive programs…]]></description><link>https://en.socratic.dev/expect-automation-and-semi-automation-of-processes-under-linux</link><guid isPermaLink="false">https://en.socratic.dev/expect-automation-and-semi-automation-of-processes-under-linux</guid><pubDate>Fri, 07 Aug 2020 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;code&gt;Expect&lt;/code&gt; is a &lt;code&gt;TCL&lt;/code&gt; based utility which excels in automating interactive tasks.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;Expect&lt;/code&gt; is  a program that &quot;talks&quot; to other interactive programs according to a script. Following the script, Expect knows what can be expected from a program and what the correct response should be.  An interpreted language provides branching and high-level control structures to direct the dialogue.  In addition, the user can take control and interact directly when desired, afterward returning control to the script.&lt;/p&gt;
&lt;p&gt;&lt;cite&gt;-- man page for &lt;code&gt;Expect&lt;/code&gt;&lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This short script below (** strongly discouraged **) automatically provides your root password when requested by the system. This example illustrates the interactive aspect of automation with &lt;code&gt;Expect&lt;/code&gt;. The script starts, performs certain actions, and returns control to the user.&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;expect -c &apos;
spawn bash
sleep 0.3
send -- &quot;sudo ls\n&quot;
expect &quot;password for&quot;
send -- &quot;&amp;#x3C;Your Password&gt;\n&quot;
interact
exit
&apos;
&lt;/code&gt;&lt;/pre&gt;
&lt;h5&gt;Some use cases&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;Expect&lt;/code&gt; was used, in the time of telephone modem connections, for the server to call users and, thus, avoid charges for the call;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Reliability and sustainability: it is used as an automated testing tool by critical components of &lt;code&gt;GNU/Linux&lt;/code&gt; such as &lt;code&gt;gcc&lt;/code&gt; and &lt;code&gt;LLVM&lt;/code&gt;. It is therefore worth the cost of investing time and effort to learn how to use it well and integrate it into your workflow;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Executing tasks usually performed by humans as they involve periods of inactivity, cursor movement, etc;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Automatically triggering completion with &lt;code&gt;TAB&lt;/code&gt; and then hand over to the user;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Automatically invoking keyboard shortcuts in &lt;code&gt;bash&lt;/code&gt;;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Interacting naturally with programs like a human would;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Filling in the gaps of a program where it would lack ways to interact programmatically with it, but on the other hand allowing a human user to do it manually;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Partial automation: performing certain operations and then handing over to a human user.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h5&gt;Why isn&apos;t &lt;code&gt;Expect&lt;/code&gt; better known?&lt;/h5&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;It is a very ecclectic application. First of all, its name, &lt;code&gt;Expect&lt;/code&gt;, is really not great in terms of &lt;code&gt;SEO&lt;/code&gt;. Rather difficult to look for help in &lt;code&gt;Google&lt;/code&gt; by using this keyword;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Then, it&apos;s an interpreter who doesn&apos;t really have his own language. &lt;code&gt;Expect&lt;/code&gt; uses &lt;code&gt;TCL&lt;/code&gt; while adding extensions to it. Thus, it is sometimes difficult to determine if we are dealing with vanilla &lt;code&gt;TCL&lt;/code&gt; or a peculiarity of &lt;code&gt;Expect&lt;/code&gt;;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Despite its weak presence on the web, by reading the documentation related to &lt;code&gt;TCL&lt;/code&gt;, we discover a universe of unsuspected possibilities to benifit from your &lt;code&gt;UNIX&lt;/code&gt; or &lt;code&gt;GNU/Linux&lt;/code&gt; systems.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h5&gt;Sources&lt;/h5&gt;
&lt;p&gt;&lt;a href=&quot;https://blog.robertelder.org/don-libes-expect-unix-automation-tool/&quot;&gt;Don Libes&apos; Expect: A Surprisingly Underappreciated Unix Automation Tool&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://wiki.tcl-lang.org/page/Expect&quot;&gt;https://wiki.tcl-lang.org/page/Expect&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Massively renaming files]]></title><description><![CDATA[Command-line tool mmv moves (or copies, appends, or links, as specified) each source file matching a from pattern to the target name…]]></description><link>https://en.socratic.dev/massively-renaming-files</link><guid isPermaLink="false">https://en.socratic.dev/massively-renaming-files</guid><pubDate>Sun, 12 Jul 2020 00:00:00 GMT</pubDate><content:encoded>&lt;blockquote&gt;
&lt;p&gt;Command-line tool &lt;code&gt;mmv&lt;/code&gt; moves (or copies, appends, or links, as specified) each source file matching a from pattern to the target name specified by the to pattern. This multiple action is performed safely, i.e. without any unexpected deletion of files due to collisions of target names with existing filenames or with other target names. Furthermore, before doing anything, &lt;code&gt;mmv&lt;/code&gt; attempts to detect any errors that would result from the entire set of actions specified and gives the user the choice of either proceeding by avoiding the offending parts or aborting.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4&gt;Use case: renaming dozens of files manually is long and inhuman&lt;/h4&gt;
&lt;p&gt;It is not every day that you feel the need to rename files massively. However, in a rapid development process, standardizing the name of generated files is not top priority. For example, as part of my current project, I developed a light script to download and time stamp web pages on a daily basis: &lt;a href=&quot;https://github.com/socraticDevBlog/webpage-grabber&quot;&gt;https://github.com/socraticDevBlog/webpage-grabber&lt;/a&gt;. During development, I improved the file names&apos; syntax. As a result, the names of the files downloaded at the start of the project differ from the most recent.&lt;/p&gt;
&lt;p&gt;The second phase of the project will be to &lt;em&gt;scrape&lt;/em&gt; (&lt;code&gt;web scraping&lt;/code&gt;) the content of downloaded web pages to extract the content and insert it into a database. For the &lt;code&gt;web scraping&lt;/code&gt; application to be able to drink from a given directory, the names of the files must be standardized there. As the process of processing the data acquired will be automated, all the files must be named consistently.&lt;/p&gt;
&lt;p&gt;Initially, I thought that there would be no problem to rename these files. I proposed to use the native commands of &lt;code&gt;linux&lt;/code&gt; like &lt;code&gt;mv&lt;/code&gt; and &lt;code&gt;grep&lt;/code&gt;. However, these commands apply to one file at a time (unless you script &lt;code&gt;bash&lt;/code&gt; or &lt;code&gt;perl&lt;/code&gt; loops). By searching a little, I found the &lt;code&gt;mmv&lt;/code&gt; tool and following the instructions, I quickly standardize all my files to be processed.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;# apt-get install mmv&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;$ man mmv&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The first command installs  &lt;code&gt;mmv&lt;/code&gt; on your server (&lt;code&gt;Debian&lt;/code&gt;, &lt;code&gt;Ubuntu&lt;/code&gt;, and some other distros). The second displays the tool&apos;s instruction manual in terminal.&lt;/p&gt;
&lt;p&gt;Good success !&lt;/p&gt;
&lt;h4&gt;Sources&lt;/h4&gt;
&lt;p&gt;&lt;a href=&quot;https://www.systutorials.com/docs/linux/man/1-mmv/&quot;&gt;mmv (1) - Linux Man Pages&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Write code now then ask for forgiveness]]></title><description><![CDATA[Programming in Python requires us to modify our conception of good programming practices. In enterprise-grade softwares, we aim for…]]></description><link>https://en.socratic.dev/write-code-now-then-ask-for-forgiveness</link><guid isPermaLink="false">https://en.socratic.dev/write-code-now-then-ask-for-forgiveness</guid><pubDate>Sat, 06 Jun 2020 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Programming in Python requires us to modify our conception of &lt;em&gt;good programming&lt;/em&gt; practices. In enterprise-grade softwares, we aim for application stability and robustness. While the context where we favor the Python language is different. Python is perfectly suited for proofs of concept, automating processes through scripting, etc. In short, when coding in Python, we tend to go fast in order to get immediate results. Some companies boost their development potential by taking advantage of the flexibility of the language invented by Guido van Rossum. This allows them to quickly arrive at an &lt;code&gt;MVP&lt;/code&gt; (minimally viable product). When the project has proven itself, then we recode everything in a enterprise-grade programming language such as &lt;code&gt;C++&lt;/code&gt;, &lt;code&gt;C#&lt;/code&gt; or &lt;code&gt;Java&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;Python is a popular programming language in education. Being a high-level language, you don&apos;t get lost in low-level technical details such as explicit typing or memory space management. For example, memory management is automatically taken care of by a garbage collector and the variables are dynamically typed. That is, a variable takes the type of the value that is initially assigned to it.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;my_duck = Duck() &lt;/code&gt; is an object of class Duck &lt;/br&gt;
&lt;/br&gt;
&lt;code&gt;my_duck = &apos;Palmipede bird (anatidae), with broad beak, long and pointed wings.&apos;&lt;/code&gt; is a variable of type &lt;em&gt;string&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4&gt;&apos;Duck Typing&apos; in Python&lt;/h4&gt;
&lt;p&gt;Python, like JavaScript, is not a compiled language. In general, the compilation process allows us to detect different errors in the syntax of the code. In interpreted languages, we have to wait to run the code for errors to appear. For example, in a compiled language, at build, the compiler will immediately detect an error if we use the AmericanDuck class rather than the EuropeanDuck class. However, both implement a &apos;fly&apos; method! The Python interpreter doesn&apos;t care about the type of a variable. As long as the &apos;fly&apos; method can be executed: everything is OK.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&quot;If I see a bird that flies like a duck, quacks like a duck, and swims like a duck, then I call this bird a duck&quot;&lt;/p&gt;
&lt;p&gt;&lt;cite&gt; - James Whitcomb Riley &lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In the following case, we see that Python executes the code without worrying about the type of arguments passed in parameters to the &lt;code&gt;calculate(a, b, c)&lt;/code&gt; function.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;def calculate(a, b, c) =&gt; return (a+b)*c&lt;/code&gt; &lt;/br&gt;
&lt;/br&gt;
&lt;code&gt;a = calculate(1, 2, 3)&lt;/code&gt;&lt;/br&gt;
&lt;code&gt;b = calculate(&apos;apples &apos;, &apos;and oranges, &apos;, 3)&lt;/code&gt;&lt;/br&gt;
&lt;/br&gt;
&lt;code&gt;print(a)&lt;/code&gt; &lt;/br&gt;
&lt;code&gt;print(b)&lt;/code&gt;&lt;/br&gt;
&lt;/br&gt;
9 &lt;/br&gt;
&quot;apples and oranges, apples and oranges, apples and oranges, &quot;``&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4&gt;EAFP vs LBLY&lt;/h4&gt;
&lt;p&gt;The example above demonstrates how Python interprets the &lt;code&gt;calculate&lt;/code&gt; function in two different ways. If the arguments are ìntegers, then it proceeds to an arithmetic operation. If the arguments are strings, then it does a string concatenation and a loop.&lt;/p&gt;
&lt;p&gt;Generally, the programmer knows what he is doing and masters his code. When an error occurs, it is ... an exception! The good practice of Python is to avoid weighing down the code with preliminary validations. For example, we could verify that the arguments are indeed whole numbers. If we do a division, we will take the trouble to check that the divider is not zero, etc.&lt;/p&gt;
&lt;p&gt;All these validations are not &lt;em&gt;pythonesques&lt;/em&gt;. That is, they do not follow Python best practices. In Python, we want to go fast, we want an ultra simple and easy to read code. To do this, we adopt the &lt;code&gt; EAFP&lt;/code&gt; principle: it is easier to ask for forgiveness than to ask for permission (&apos;Easier to ask forgiveness than permission&apos;). Thus, the structure of the &lt;code&gt;try except&lt;/code&gt; is prevalent in any pythonesque code base. We run the code freely and, when it breaks, we get and handle the exception.`&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;try:&lt;/code&gt; &lt;/br&gt;
       &lt;code&gt;x = my_dict[&quot;key&quot;]&lt;/code&gt;&lt;/br&gt;
&lt;code&gt;except KeyError:&lt;/code&gt;&lt;/br&gt;
       &lt;code&gt;manage_error(&apos;item doesn&apos;t exist&apos;)&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Programmers have traditionally used to validate the arguments received as parameters before using them. It is also a good practice of the languages ​​&lt;code&gt;C#&lt;/code&gt; and &lt;code&gt;Java&lt;/code&gt;! As far as possible, in enterprise software, we do not use &lt;code&gt;Exceptions&lt;/code&gt; as decision structures ... We adopt a principle of prudence that Pythonians call: &lt;code&gt;LBYL&lt;/code&gt; (&apos; Look Before You Leap &apos;). That is to say: look ahead before leaping.&lt;/p&gt;
&lt;p&gt;The following example would rage a Pythonician because the code is a little more complex and less efficient: we look twice in the dictionary! However, this way of doing things respects the rules of the art in business.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;code&gt;if &quot;key&quot; in my_dict:&lt;/code&gt;&lt;/br&gt;
        &lt;code&gt;  x = my_dict[&quot;key&quot;]&lt;/code&gt;&lt;/br&gt;
&lt;code&gt;else:&lt;/code&gt; &lt;/br&gt;
        &lt;code&gt;manage_error(&apos;item doesn&apos;t exist&apos;)&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;code&gt;Translated from french by Google Translate&lt;/code&gt;&lt;/p&gt;
&lt;h5&gt;Source&lt;/h5&gt;
&lt;p&gt;&lt;a href=&quot;https://stackoverflow.com/questions/11360858/what-is-the-eafp-principle-in-python&quot;&gt;https://stackoverflow.com/questions/11360858/what-is-the-eafp-principle-in-python&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.wikiwand.com/en/Python_(programming_language)&quot;&gt;https://www.wikiwand.com/en/Python_(programming_language)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;http://eikke.com/how-not-to-write-python-code/index.html&quot;&gt;http://eikke.com/how-not-to-write-python-code/index.html&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[So you really want to open-source your project ?]]></title><description><![CDATA[The labels  FOSS and  F/OSS ('Free and Open-Source Software' and 'Free / Libre and Open-Source Software') describe a development model for…]]></description><link>https://en.socratic.dev/so-you-really-want-to-open-source-your-project</link><guid isPermaLink="false">https://en.socratic.dev/so-you-really-want-to-open-source-your-project</guid><pubDate>Sun, 31 May 2020 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;The labels &lt;code&gt; FOSS&lt;/code&gt; and &lt;code&gt; F/OSS&lt;/code&gt; (&apos;Free and Open-Source Software&apos; and &apos;Free / Libre and Open-Source Software&apos;) describe a development model for open source software. According to a flexible legal license, everyone is allowed to execute, study and redistribute the source code. As well as provide extra features in order to sell it as product or service. This type of software differs from proprietary software whose source code is protected, more difficult to modify and whose use is chargeable.&lt;/p&gt;
&lt;p&gt;The operating systems &lt;code&gt; Windows&lt;/code&gt;, &lt;code&gt; MacOs&lt;/code&gt; and &lt;code&gt; Unix&lt;/code&gt; are an example of proprietary software. While the &lt;code&gt; GNU/Linux&lt;/code&gt; distributions remain &lt;code&gt; FOSS&lt;/code&gt;. This case illustrates the free software ecosystem well because some distributions (operating systems) &lt;code&gt; GNU/Linux&lt;/code&gt; intended for large organizations are accompanied by restrictive licenses and require significant annual fees.&lt;/p&gt;
&lt;h4&gt;benefits&lt;/h4&gt;
&lt;p&gt;The costs of developing and using free software are much lower than for proprietary software. You don&apos;t have to pay for licenses to use them, and most of the time collaborators develop on a voluntary basis. Some organizations may provide &apos;after-sales service&apos; to users. This business model ensures the sustainability of the project while saving time and worry for end users who need specialized assistance.&lt;/p&gt;
&lt;p&gt;The absence of a patent promotes technological innovation. &lt;em&gt;Open-source&lt;/em&gt; licenses are simple and not restrictive. This has the effect of providing effective protection to community members while ensuring that they are not held back by legal considerations.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;More eyes, more security
&lt;cite&gt; - Red Hat, Open Source specialist &lt;/cite&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Free software is often safer than proprietary software. The source code is accessible to all: it is scrutinized by a multitude of experts and quickly corrected when necessary.&lt;/p&gt;
&lt;p&gt;The source code being available to everyone: it becomes eternal. Free software has an almost infinite lifespan. Even if the community abandons a project, the source code will remain available for the use and improvement of the software.&lt;/p&gt;
&lt;h4&gt;some challenges&lt;/h4&gt;
&lt;p&gt;All the same, the development of free software has its challenges. Any organization wishing to turn to open source must assess the value it will recover from this effort. Making a project available in &lt;em&gt;open-source&lt;/em&gt; is a lot of work: before, during and after. And there is the risk that our community of contributors abandons the project is always present ...&lt;/p&gt;
&lt;p&gt;The organization must first determine how this effort will pay off. Then it must determine how her project will contribute to the community. To attract talented contributors, it is imperative that the project be profitable for them. No developer will work voluntarily on a project which is indifferent to them!&lt;/p&gt;
&lt;p&gt;The culture of free software promotes respect, openness and transparency. All development work must be done in an open and public way. The community must be in constant communication. The project accepts contributions from any member of the community. Any input, be it code or additions to the roadmap, must be received and diligently reviewed by project administrators. Any feedback should be given promptly and publicly.&lt;/p&gt;
&lt;p&gt;These requirements are necessary for the acquisition and maintenance of the bond of trust between the community and the project put forward by the organization. Any decision taken privately or unilaterally will erode this bond of trust. An alienated community will therefore have the right to leave the project with the code and continue development independently.&lt;/p&gt;
&lt;h4&gt;the unavoidable&lt;/h4&gt;
&lt;p&gt;The quality of the code is the first challenge of a free software project. Any self-respecting project imposes non-negotiable standards regarding code quality. Any code that does not meet the requirements will be refused by the main contributors. We talk as much about naming variables and functions as about using spaces instead of a &lt;code&gt; tab&lt;/code&gt;. Good projects, like &lt;code&gt;Apache&lt;/code&gt; and &lt;code&gt;Google&lt;/code&gt;, provide extensive documentation of its standards with explanations justifying their adoption. The best projects require a substantial coverage of the source code by automated unit tests in order to avoid regressions.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Four text files (&lt;code&gt;.md&lt;/code&gt;) placed at the root of an &lt;em&gt;open-source&lt;/em&gt; project are omnipresent in any free software project.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The &lt;code&gt;LICENSE&lt;/code&gt; file contains the legal text setting out the rights and constraints of users of the source code. Most often, we will make a &lt;code&gt;copy/paste&lt;/code&gt; of the text of the licenses commonly used like &lt;code&gt;MIT&lt;/code&gt; or &lt;code&gt; GNU&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;The file named &lt;code&gt; README.md&lt;/code&gt; explains the nature of the project. There is a description of the project. It explains how the project is useful to the community. And we inform employees of the resources available to answer their questions. The code repository website &lt;code&gt; GitHub&lt;/code&gt; and &lt;code&gt; GitLab&lt;/code&gt; even reads the &lt;em&gt;MarkDown&lt;/em&gt; (&lt;code&gt;.md&lt;/code&gt;) file and styles it to be displayed on the project&apos;s main page.&lt;/p&gt;
&lt;p&gt;The file named &lt;code&gt; CONTRIBUTING.md&lt;/code&gt; explains how to contribute to the project. It contains essential informations to frame the collaboration process. It explains the process to follow to create a new correction request. We suggest some features to implement in the short term. The product roadmap is listed there as well as the preferred (or prohibited) ways to communicate with the project managers.&lt;/p&gt;
&lt;p&gt;For developers, we explain how to configure their development environment. We will even suggest an electronic template to use to submit a new feature or a fix via a &lt;em&gt;pull request&lt;/em&gt; (or &lt;em&gt;merge request&lt;/em&gt; in the &lt;code&gt; GitLab&lt;/code&gt; ecosystem).&lt;/p&gt;
&lt;p&gt;More and more projects contain a file &lt;code&gt; CODE_OF_CONDUCT.md&lt;/code&gt; used to establish the social and ethical standards governing collaboration. It describes how we want participants to behave. We stress the importance of being warm and empathetic. In other words, treating others as we would like to be. Emphasis is placed on respecting the opinions, culture and life experiences of each. Recognizing that we are all fallible, we recommend taking the initiative to apologize when appropriate and, most importantly, to learn from these unpleasant experiences. Finally, we recommend prioritizing the good of the project and the community versus our personal ambitions and preferences.&lt;/p&gt;
&lt;p&gt;As with legal license files, there is a &apos;Code of Conduct&apos; document accepted by hundreds of projects that can be &apos;copy and paste&apos; to the root of your project directory: &lt;a href=&quot;https://www.contributor-covenant.org/&quot;&gt;Contributor Covenant: A Code of Conduct for Open Source Projects&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Translated from french by Google Translate&lt;/code&gt;&lt;/p&gt;
&lt;h4&gt;sources&lt;/h4&gt;
&lt;p&gt;&lt;a href=&quot;https://redhatofficial.github.io/#!/main&quot;&gt;https://redhatofficial.github.io/#!/main&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://opensource.com/article/17/6/what-know-you-open-source-your-project&quot;&gt;https://opensource.com/article/17/6/what-know-you-open-source-your-project&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://portals.apache.org/development/code-standards.html&quot;&gt;https://portals.apache.org/development/code-standards.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://opensource.guide/starting-a-project/&quot;&gt;https://opensource.guide/starting-a-project/&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Camus has already said a lot about the pandemic]]></title><description><![CDATA[The novel The Plague by Albert Camus was published in June 1947. Since the start of the Covid-19 pandemic, many readers have obtained a copy…]]></description><link>https://en.socratic.dev/camus-has-already-said-a-lot-about-the-pandemic</link><guid isPermaLink="false">https://en.socratic.dev/camus-has-already-said-a-lot-about-the-pandemic</guid><pubDate>Mon, 18 May 2020 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;The novel &lt;em&gt;The Plague&lt;/em&gt; by Albert Camus was published in June 1947. Since the start of the Covid-19 pandemic, many readers have obtained a copy of the book or have searched their libraries to reread it.&lt;/p&gt;
&lt;p&gt;We follow the evolution of the plague in a city in French Algeria. It is especially the journey of Doctor Bernard Rieux that makes us penetrate into the spirit of this city which goes from denial, to anger, to negotiation and acceptance.&lt;/p&gt;
&lt;p&gt;The narrator subtly presents philosophical themes and questions such as anxiety and the absurdity of human existence. Camus even offers a wink to friends with the death on stage of an actor performing &lt;em&gt;Orpheus and Eurydice&lt;/em&gt; at the municipal opera house.&lt;/p&gt;
&lt;h4&gt;Cottard, a conscious man in the walled city&lt;/h4&gt;
&lt;blockquote&gt;
&lt;p&gt;The only way to put people together is to send them the plague.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&quot;There was, however, in the city a man who seemed neither exhausted nor discouraged, and who remained the living image of satisfaction. It was Cottard.&quot;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;With that one (Tarrou), Cottard said to Rambert, we can chat because he is a man. We are always understood.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&quot;Thus Cottard, and always according to Tarrou&apos;s interpretation, was justified in considering the symptoms of anguish and distress that our fellow citizens presented with this indulgent and understanding satisfaction which could be expressed by a: &apos;Speak always, I have had it before you &apos;. &quot;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;You hear them, he told me: &lt;em&gt;after the plague I will do this&lt;/em&gt;, &lt;em&gt;after the plague I will do that&lt;/em&gt; ... And they do not even realize their benefits [...] They are unhappy because that they don&apos;t let go. And I know what I&apos;m saying.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&quot;[...] But because he felt all this before them, I believe that he cannot quite experience with them the cruelty of this uncertainty [...] But since he himself lived in terror, he finds it normal for others to know it in turn.&quot;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Translated from french by Google Translate&lt;/code&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[From 996 Working to ICU Waiting]]></title><description><![CDATA[A "996" work schedule refers to an unofficial work schedule (9a.m. ~ 9p.m., 6 days a week) that has been gaining in popularity in China…]]></description><link>https://en.socratic.dev/from-996-working-to-icu-waiting</link><guid isPermaLink="false">https://en.socratic.dev/from-996-working-to-icu-waiting</guid><pubDate>Sun, 10 May 2020 00:00:00 GMT</pubDate><content:encoded>&lt;blockquote&gt;
&lt;p&gt;A &quot;996&quot; work schedule refers to an unofficial work schedule (9a.m. ~ 9p.m., 6 days a week) that has been gaining in popularity in China. Serving a company that encourages the &quot;996&quot; work schedule usually means working for at least 60 hours a week.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h4&gt;Companies that changed the technological realm were startups without financial means&lt;/h4&gt;
&lt;p&gt;Any developer is above all a recycler: he uses existing technologies to create new ones. We are not reinventing the wheel. Besides, &apos;reinventing the wheel&apos; is a deadly sin to a developer.&lt;/p&gt;
&lt;p&gt;In the West, there are two ways: the proprietary software route and the free software route. Large organizations use almost exclusively proprietary software while start-ups with little financial means use almost exclusively free software.&lt;/p&gt;
&lt;h4&gt;996 culture slows free software development in China&lt;/h4&gt;
&lt;p&gt;Several political factors influence the technological sphere in China. The &lt;em&gt;Grand Firewall of China&lt;/em&gt; is an apparatus which significantly limits Internet access to Chinese people. The Chinese do not drink like us from Google and Twitter but from clones in every way similar.&lt;/p&gt;
&lt;p&gt;Chinese developers still have access to the same programming languages ​​and libraries as we do ... as long as the documentation is available in their native language. For example, &lt;code&gt;VueJS&lt;/code&gt;, a javascript &lt;em&gt;framework&lt;/em&gt; created by Evan You, has a great success in China because its documentation was quickly translated into Chinese.&lt;/p&gt;
&lt;p&gt;Why aren&apos;t there more Chinese learning English? This would allow them to have immediate access to the latest news. This would allow them to catch up. We might even hope to see them participate more actively in the world of free software. After all, most of the big Chinese companies do profit from the colossal amount of work of the contributors of the open source ...&lt;/p&gt;
&lt;p&gt;996 culture effectively hampers the development of free software in China. Imagine having to work 12 hours a day, 6 days a week. Would you really want to start learning a foreign language? Would you really have the audacity to park yourself in front of a computer screen and fix other bugs during your sole day off?&lt;/p&gt;
&lt;h4&gt;Alienation through the cult of productivity&lt;/h4&gt;
&lt;p&gt;However, large Chinese entrepreneurs like Jack Ma of Alibaba exploit this &apos;ethical&apos; conception of hard work in order to reap disproportionate profits at the expense of their skilled workforce. For Jack Ma, the 72-hour week is a blessing. The head of an e-commerce giant, Richard Liu, is afraid of losing his competitive advantage if his employees worked less: &quot;Slackers are not my brothers!&quot;.&lt;/p&gt;
&lt;h4&gt;996 ICU: leveraging Github to develop a protest&lt;/h4&gt;
&lt;p&gt;In April 2019, the challenge from young Chinese developers moved to &lt;code&gt;Github.com&lt;/code&gt; servers. Developers have opened a repository on the code-sharing site to protest against their working conditions.&lt;/p&gt;
&lt;p&gt;The &apos;project&apos; offers several revolutionary features:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;It lists the companies imposing the 996 regime;&lt;/li&gt;
&lt;li&gt;It displays the labor laws of China;&lt;/li&gt;
&lt;li&gt;It describes an &apos;anti-996&apos; license which would prevent the listed abusive companies from using your open-source project.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;As of May 9, 2020, the project has received more than 249,000 stars in support.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Translated from french with Google Translate&lt;/code&gt;&lt;/p&gt;
&lt;h4&gt;Sources&lt;/h4&gt;
&lt;p&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=RFjIBM0TR7U&quot;&gt;The Rise of Open Source Communities in China (youtube video : 11min20sec)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://996.icu/#/en_US&quot;&gt;What is &quot;996&quot;?&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://github.com/996icu/996.ICU/tree/5a9758795661b0f38ea4b8f2cb0f015bff91d884&quot;&gt;github 996.ICU&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.bbc.com/news/business-47934513&quot;&gt;Jack Ma defends the &apos;blessing&apos; of a 12-hour working day&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.freecodecamp.org/news/between-the-wires-an-interview-with-vue-js-creator-evan-you-e383cbf57cc4/&quot;&gt;Between the Wires: An interview with Vue.js creator Evan You&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Having a sucessful side-project]]></title><description><![CDATA[The most successful personal projects are those whose main objective is to solve our own problems. It is impossible to lose by doing this…]]></description><link>https://en.socratic.dev/having-a-sucessful-side-project</link><guid isPermaLink="false">https://en.socratic.dev/having-a-sucessful-side-project</guid><pubDate>Sun, 03 May 2020 00:00:00 GMT</pubDate><content:encoded>&lt;blockquote&gt;
&lt;p&gt;The most successful personal projects are those whose main objective is to solve our own problems. It is impossible to lose by doing this. Because by solving our own problems, at least, we make our lives easier.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The world of technology is often struggling with the passive resistance of its players.
They are often called &apos;trolls&apos;. They are recognized by their words marked by doubts and negativity.
When a programmer wants to venture into business, he often faces poorly informed reviews from these &lt;em&gt;trolls&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Laravel web &lt;em&gt;framework&lt;/em&gt; founder Taylor Otwell suggests not relying on these disengaged critics. He recalls that more than half of the comments read on the internet about his projects were negative: &quot;There is no market for this product&quot;, &quot;There is a better way to solve this problem&quot;, etc.&lt;/p&gt;
&lt;p&gt;Otwell stresses that we cannot loose by developing a solution to the problems that make our lives difficult on a daily basis. Even if nobody would use our solution, we will have effectively solved our problems. However, it is very likely that thousands of people will experience the same problematic situations as we do.&lt;/p&gt;
&lt;p&gt;For Otwell, it is a &apos;silent majority&apos; of programmers who want to make their lives easier who have adopted its solutions. The fact remains that &lt;em&gt;trolls&lt;/em&gt; populating tech sites like &lt;em&gt;Reddit&lt;/em&gt; can be frustrating. In general, their opinions are to be taken lightly because they are not invested in the situation.&lt;/p&gt;
&lt;h4&gt;Sources&lt;/h4&gt;
&lt;p&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=Ic_Kkmzm3uQ&quot;&gt;Advice for Tech Entrepreneurs | from Laravel founder Taylor Otwell (2min51sec)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://honeypot.io&quot;&gt;honeypot.io&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Not Without My Dutch Uncle]]></title><description><![CDATA[In reading Randy Pausch's book "The Last Lecture", the reader accompanies a man spending his last months preparing to leave life. Randy…]]></description><link>https://en.socratic.dev/not-without-my-dutch-uncle</link><guid isPermaLink="false">https://en.socratic.dev/not-without-my-dutch-uncle</guid><pubDate>Sat, 04 Apr 2020 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;In reading Randy Pausch&apos;s book &quot;The Last Lecture&quot;, the reader accompanies a man spending his last months preparing to leave life.&lt;/p&gt;
&lt;p&gt;Randy Pausch (1960-2008) was an American professor and
human-machine interface and virtual worlds specialist. He is best known for
his last lecture given on September 18, 2007. In a last
effort to transmit his human experience, he relates episodes from his life and
lessons received through many tribulations.&lt;/p&gt;
&lt;h4&gt;You were abandoned&lt;/h4&gt;
&lt;p&gt;The author revisits his childhood in order to take stock: did he fulfill his childhood dreams?
One of his dreams was to become a professional footballer in the NFL. It was a failure. But he learned a lot from Coach Graham. This trainer who insisted on teaching the fundamentals of sport and who,
above all, did not spare his proteges.&lt;/p&gt;
&lt;p&gt;One day Coach Graham made Randy repeat maneuvers. Without success. Coach Graham therefore forced him
to stay put after practice and do push-ups.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;the assistant: &quot;The Coach made your life difficult today, right?&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;Randy: (weakly) &quot;yes ...&quot;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;the assistant: &quot;It&apos;s a good thing. When you mess around and no one says anything&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;that means they gave up on you. &quot;&lt;/p&gt;
&lt;p&gt;&lt;code&gt; &quot;This lesson has stayed with me all my life. When we find that we are acting like a jerk and no one bothering to point this out to us is a bad situation. You may not want to hear it, but those who criticize you are often those who love you and care about you and want you to get better.&quot;&lt;/code&gt;&lt;/p&gt;
&lt;h4&gt;The Dutch uncle&lt;/h4&gt;
&lt;p&gt;Human relationships are becoming increasingly artificial. Political correctness, false positivity
and professional prudence too often prevent us from giving honest feedbacks. There is an English expression for someone giving honest feedback: &apos;a Dutch Uncle&apos;.&lt;/p&gt;
&lt;p&gt;I recognize myself in Randy Pausch who describes himself as someone with a well-hung tongue who
do not hesitate to make your opinion known. Its research director at University Brown,
Andy van Dam (a Dutchman!) Offered him this remark: &quot;Randy, it&apos;s really a shame that
people see you as arrogant because it&apos;s going to limit what you
will be able to accomplish in life.&quot;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;&quot;The wording was perfect. He said to me &apos;Randy, you&apos;re acting like an asshole.&apos; But in order to keep me open to criticism. [...] I like to think that my faults fall under the &apos;social&apos; rather than &apos;moral&apos; category. And I was fortunate to benefit from people like Andy who cared enough about me to tell me the things I needed to hear.&quot; &lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Randy Pausch passed away at home on July 25, 2008.&lt;/p&gt;
&lt;h4&gt;Source :&lt;/h4&gt;
&lt;p&gt;&lt;a href=&quot;https://www.goodreads.com/book/show/40611510-the-last-lecture&quot;&gt;https://www.goodreads.com/book/show/40611510-the-last-lecture&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.wikiwand.com/fr/Randy_Pausch&quot;&gt;https://www.wikiwand.com/fr/Randy_Pausch&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Translated from french with Google Translate&lt;/code&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Dark Patterns - Conned by Design]]></title><description><![CDATA[Dark Patterns are elements of the interface design intentionally designed to lure users to take unwanted actions benefiting the company in…]]></description><link>https://en.socratic.dev/dark-patterns-conned-by-design</link><guid isPermaLink="false">https://en.socratic.dev/dark-patterns-conned-by-design</guid><pubDate>Sat, 28 Mar 2020 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;&lt;em&gt;Dark Patterns&lt;/em&gt; are elements of the interface design intentionally designed to lure users to take unwanted actions benefiting the company in question. In other words, &lt;em&gt;Dark Patterns&lt;/em&gt; are tricks exploited by websites and applications to manipulate us into doing unwanted things; like buying or signing up for something.&lt;/p&gt;
&lt;p&gt;Harry Brignull is the designer who coined the term &quot;Dark Patterns&quot; in 2010. Recently, Harry has started providing expert witness services related to the &lt;em&gt;dark patterns&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Most web users do not read the entire content of sites. We quickly scan the content and take action based on assumptions about the most plausible scenarios. By relying first on appearances we are sometimes lured by devious companies. Web designers sometimes take advantage of this to induce their users to perform unwanted actions.&lt;/p&gt;
&lt;p&gt;These dubious schemes are practiced by several large websites like Amazon, LinkedIn and Ticketmaster. The non-commercial part of Amazon&apos;s website is recognized for its Kafkaesque complexity. For example, to deactivate its own account, a user must blindly navigate through several menus before finally having to chat online with an agent responsible for customer service. LinkedIn, by taking advantage of the location and  color of certain buttons, was sneakily trying to acquire the user&apos;s contacts list in order to massively distribute its advertising by email. LinkedIn was also forced to pay damages over $13 millions to users deceived by this practice. Finally, Ticketmaster and LiveNation are said to be in the habit of subscribing unwary concert ticket buyers to magazines like &lt;em&gt;RollingStone&lt;/em&gt; or &lt;em&gt;Entertainnment Weekly&lt;/em&gt; by hiding a check box already checked on their purchase forms. Unfortunate because the only way to cancel the subscription would be to print a form, fill it out, pay a stamp and send it by post ...&lt;/p&gt;
&lt;p&gt;Londoner Alexander Darlington, curator of the site &lt;code&gt;darkpatterns.org&lt;/code&gt;, categorized and baptized these designed scams according to a certain &lt;em&gt;air de famille&lt;/em&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Trick Questions;&lt;/li&gt;
&lt;li&gt;Sneak into the basket;&lt;/li&gt;
&lt;li&gt;Roach Motel;&lt;/li&gt;
&lt;li&gt;Privacy Zuckering;&lt;/li&gt;
&lt;li&gt;Price Comparison Prevention;&lt;/li&gt;
&lt;li&gt;Misdirection;&lt;/li&gt;
&lt;li&gt;Hidden Costs;&lt;/li&gt;
&lt;li&gt;Bait and Switch;&lt;/li&gt;
&lt;li&gt;Confirmshaming;&lt;/li&gt;
&lt;li&gt;Disguised Ads;&lt;/li&gt;
&lt;li&gt;Forced Continuity;&lt;/li&gt;
&lt;li&gt;Friends Spam.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;Dark Patterns&lt;/em&gt; are constantly evolving. New scams are daily developed and deployed. However, once informed of the fraudulent aspect of certain &lt;em&gt;designs&lt;/em&gt;, the best counter-attack is to reveal them in the public space. Home-specialist Alexander Darlington suggests attacking offenders back by taking screenshots of a trap and tweeting it with the hashtag &lt;code&gt;#darkpattern&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;Good hunt !&lt;/p&gt;
&lt;h4&gt;References&lt;/h4&gt;
&lt;p&gt;&lt;a href=&quot;https://www.darkpatterns.org/&quot;&gt;https://www.darkpatterns.org/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://youtu.be/kxkrdLI6e6M&quot;&gt;https://youtu.be/kxkrdLI6e6M&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.theverge.com/2015/10/2/9444067/linkedin-email-lawsuit-settlement-add-connections&quot;&gt;https://www.theverge.com/2015/10/2/9444067/linkedin-email-lawsuit-settlement-add-connections&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;testimonium.co&quot;&gt;testimonium.co&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://twitter.com/alexanderdarlo&quot;&gt;https://twitter.com/alexanderdarlo&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://twitter.com/darkpatterns&quot;&gt;https://twitter.com/darkpatterns&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://90percentofeverything.com/about/&quot;&gt;https://90percentofeverything.com/about/&lt;/a&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Q & A with a devops professional]]></title><description><![CDATA[Patrick Thomas Delaney is an experienced full-stack developer with a focus on building cloud-native applications. His skills range from…]]></description><link>https://en.socratic.dev/q-a-with-a-devops-professional</link><guid isPermaLink="false">https://en.socratic.dev/q-a-with-a-devops-professional</guid><pubDate>Sat, 28 Dec 2019 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Patrick Thomas Delaney is an experienced full-stack developer with a focus on building cloud-native applications. His skills range from Python to C# ; from solution architecture to application design. He currently works with &lt;em&gt;Ahead&lt;/em&gt; : a Chicago headquartered tech company dedicated to helping other companies build their digital business infrastructure.&lt;/p&gt;
&lt;h5&gt;Can you tell us about yourself : your academic background, your passions. Basically anything relevant to your current position/career. What led you to the cloud ?&lt;/h5&gt;
&lt;p&gt;(&lt;em&gt;Patrick Thomas Delaney&lt;/em&gt;) I&apos;ll spare you a boring origin story but I will mention that &lt;em&gt;The Matrix&lt;/em&gt; came out when I was an eleven year-old boy. That movie imparted into me the idea that computers are constant excitement, and that girls love hackers. This panned out to be entirely true, and my career has not been some kind of rude awakening to the contrary.&lt;/p&gt;
&lt;h5&gt;All devs have a story of failure. A meaningful event where they screwed up or missed on an opportunity. Usually, we learn from it and grow from it. Do you have a failure story you want to share ? How much did you learn from it ?&lt;/h5&gt;
&lt;p&gt;(&lt;em&gt;Ptdel&lt;/em&gt;) While failures are endemic to development, I do have one instance I find myself laughing at in retrospect.  One of my first ever billable tasks for a client resulted in me bringing down their entire website for fifteen hours over the weekend (their peak hours). The root cause was one single misplaced character in a &lt;em&gt;yaml&lt;/em&gt; configuration file for salt. As chance had it, the client&apos;s monitoring provider also went down, and thus they were under the impression they were only ever down for one hour (a coincidence I was grateful for). While initially embarrassing, it was really just an affirmation that human error is always a factor, but one that can be mitigated with &lt;em&gt;process&lt;/em&gt; and &lt;em&gt;automation&lt;/em&gt;.&lt;/p&gt;
&lt;h5&gt;We hear ‘devops’ and ‘Agile’ are the solution to all problems in software development. At the same time, what I see around me in the organization of work are deeply segregated roles and ‘top to bottom’ (waterfall) requirements. Roles are divided between the programmer, a functional/business analyst, a QA/acceptance tester and the client. Databases and ops are the fiefdom of DBAs, data modelers, security analysts, sysadmins, etc. I’m asking a lot from you here, but how do you think devops and genuine Agile methodology can help the business ready to transition to a cloud infrastructure ?&lt;/h5&gt;
&lt;p&gt;(&lt;em&gt;Ptdel&lt;/em&gt;) Developer hours are extremely inefficient in most large-scale traditional industry settings. A developer can write a single line of code, something which may only be part of some series, and find themselves needing to subject it to the entire &quot;system&quot; you describe in order to make progress. It could easily be the case that they are stuck in limbo waiting for a result for an entire week. While I&apos;d like to say that&apos;s really bad I&apos;ve actually seen far worse, like needing to schedule builds a month in advance.&lt;/p&gt;
&lt;p&gt;I think I can best express the benefits of switching to agile methodology by referencing one of my former client : a financial company. They were on a semi-annual release schedule for major updates.  These major updates didn&apos;t necessarily contain any new features, but were often just attempts to recover from technical debt. They took six months off in order to fully implement a comprehensive environment geared for agile development. Due to the fact that they chose to sacrifice a release cycle to change course, they now routinely publish more features and fixes in a single week, than they had for all years prior cumulatively.&lt;/p&gt;
&lt;h5&gt;What are the pitfalls you’ve witnessed about traditional businesses wanting to move to the cloud and devops. What are the usual issues they face ?&lt;/h5&gt;
&lt;p&gt;(&lt;em&gt;Ptdel&lt;/em&gt;) For the benefit of everyone, business owners must be able to recognize when there is a genuine impetus to move to a hosted provider. It is extremely hard to justify moving to &quot;the cloud&quot; if a company retains all of its traditional practices centered around on-premise infrastructure.&lt;/p&gt;
&lt;p&gt;I&apos;m going to cop-out and not provide any specific technical pitfalls. Instead, I&apos;ll describe an encounter I frequently had during my time as a consultant. We would show up to a company, and there would be a single department in the company that was going to be the guinea pig. They didn&apos;t really have any clear-cut requirements, and many of the staff were still beholden to trivial day-to-day routine manual tasks. They would often see the appeal of moving to an agile methodology, only to come to the realization that their finance or security departments made any real attempts at change impossible. Half-way through the project another department would become aware of the endeavor, and seek to take the reigns in some fashion or to expand the scope of the project. By the time the contract had been used up, the scope of the engagement was completely unrecognizable from the original, and nothing had been completed to any satisfactory level.&lt;/p&gt;
&lt;p&gt;This is all a roundabout way of saying there must be buy-in from everyone, and leadership must be the ones communicating this to everyone. If it&apos;s a pet project left all to its own, hopefully the funds behind it are fungible or the loss justifiable.&lt;/p&gt;
&lt;h5&gt;A lot of devs are mostly concerned with code and having features working in their dev environment. We don’t really know or care to know about delivery pipelines, automation, database security and performance, etc. Do you have suggestions to younger devs who wants to be relevant in 15 to 20 years from now ?&lt;/h5&gt;
&lt;p&gt;(&lt;em&gt;Ptdel&lt;/em&gt;) Honestly with the state of things now I really have no idea what being relevant in fifteen or twenty years would even look like.&lt;/p&gt;
&lt;p&gt;For those coming into the profession now, or maybe trying to progress themselves I would just say this: you&apos;re not special. For a long time developers have maintained some mystique around their profession, putting on the airs that what they do is uniquely challenging. While that might have been true at some point it&apos;s not the case anymore. If you don&apos;t learn about the environment your code lives in, and how to control all of it, I can assure you that somebody else with more motivation will, and their advantage will be significant.&lt;/p&gt;
&lt;p&gt;Have a willingness to gain competency in new things with an understanding that it&apos;s for your own good. Last of all, drop any dogmatism or pretension you have around the way things ought to be in the real world and focus on delivering reliable results.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;I would like to thank Patrick for taking time out of his busy schedule to answer my questions. Hopefully, I will post more Q and A in the future !&lt;/code&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Wise quotes]]></title><description><![CDATA[Under daily life noise there is a calm and pacific realm. The medecine professor Jon Kabat-Zinn puts forward the analogy of the storm at sea…]]></description><link>https://en.socratic.dev/wise-quotes</link><guid isPermaLink="false">https://en.socratic.dev/wise-quotes</guid><pubDate>Mon, 23 Dec 2019 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;Under daily life noise there is a calm and pacific realm. The medecine professor Jon Kabat-Zinn puts forward the analogy of the storm at sea to illustrate the superficiality of most of our concerns. At sea level we fear the most violent storm, but a couple of dozen feet below : everything is calm and still. Defined as a quest to wisdom, philosophy wakes us up from the slumber of ignorance. It puts forward &apos;alarm clocks&apos; whom, if we accept their authority, force us to realize the unsoundness of our noisy opinions.&lt;/p&gt;
&lt;p&gt;&lt;code&gt;The first principle is that you must not fool yourself -- and you are the easiest person to fool&lt;/code&gt; - Richard Feynman, physics Nobel prize 1965&lt;/p&gt;
&lt;p&gt;&lt;code&gt;You will never get into trouble by admitting that you may be wrong&lt;/code&gt; - Dale Carnegie, american author and public speaker&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Vain men never hear anything but praise&lt;/code&gt; - &lt;em&gt;Le Petit Prince&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Most men seek less to be instructed, and even to be amused, than to be praised and applauded&lt;/code&gt; - Jean de la Bruyère, french philosopher&lt;/p&gt;
&lt;p&gt;&lt;code&gt;What you do speak so loudly I cannot hear what you say&lt;/code&gt; - Ralph Waldo Emerson, american philosopher and poet&lt;/p&gt;
&lt;p&gt;&lt;code&gt;The most important thing in communication is to hear what is not being said&lt;/code&gt; - Peter Druker, professeur et consultant américain en management d&apos;entreprise&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Tell you the secret to a good life : always be the oldest one in the room&lt;/code&gt; - Yvon Chouinard, founder of the Patagonia brand&lt;/p&gt;
&lt;p&gt;&lt;code&gt;[...] modern culture has been increasingly building blindness to the mysterious, the impenetrable, what Nietzsche called the Dionysian in life&lt;/code&gt; - Nassim Taleb, essayist, statistician and risk expert&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Original humans were believed to be both male and female ; this made them so powerful that the gods feared them and split them in half&lt;/code&gt; - Susan Sontag, american essayist, novelist and militant&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Is Arnold Jackson a bad man who does good things or a good man who does bad things ? It&apos;s a difficult question to answer. Perhaps we make too much of the difference between one man and another. Perhaps the best of us are sinners and the worst of us are saints. Who knows ?&lt;/code&gt; Somerset Maugham, british novelist&lt;/p&gt;
&lt;p&gt;&lt;code&gt;People hate to have their minds changed&lt;/code&gt; - Jeff Atwood, developer and cofonder of Stack Overflow website&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Never ask permission to do your job correctly&lt;/code&gt; - Doc Norton, speaker, coach and consultant in software delivery&lt;/p&gt;
&lt;p&gt;&lt;code&gt;People who suffer the most from a given state of affairs are paradoxically the least likely to question, challenge, reject, or change it&lt;/code&gt; - John Jost, american social psychologist&lt;/p&gt;
&lt;p&gt;&lt;code&gt;When people are free to do as they please, they usually imitate each other&lt;/code&gt; - Eric Hoffer, american philosopher and psychologist&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Non nobis solum nati sumus (we are not born for ourselves alone)&lt;/code&gt; - Cicero, roman antiquity philosopher&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Service to others is the rent you pay for your room here on earth&lt;/code&gt; - Mohamed Ali, american professional boxer&lt;/p&gt;</content:encoded></item><item><title><![CDATA[Three kinds of Men]]></title><description><![CDATA[In the software world, we are sometimes trading cybersecurity, clean architecture and just basic good practice concerns to convenience…]]></description><link>https://en.socratic.dev/three-kinds-of-men</link><guid isPermaLink="false">https://en.socratic.dev/three-kinds-of-men</guid><pubDate>Sat, 14 Dec 2019 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;In the software world, we are sometimes trading cybersecurity, clean architecture and just basic good practice concerns to convenience. Sometimes rightly so …&lt;/p&gt;
&lt;p&gt;But would you trade superior ideals like the quest of the good life for mere comfort and social status ?&lt;/p&gt;
&lt;p&gt;What is &lt;em&gt;Man&lt;/em&gt; ? What makes a &lt;em&gt;Man&lt;/em&gt; worth its salt ?&lt;/p&gt;
&lt;p&gt;Pythagoras was an early Greek philosopher, acquainted to the esoteric tradition transmitted to the Egyptians, expressed his anthropology thru this metaphor :&lt;/p&gt;
&lt;p&gt;&lt;code&gt;In this life, there are three kinds of men, just as there are three sorts of people who come to the Olympic Games. The lowest is made up of those who come to buy and sell, the next above are those who compete. Best of all, however, are those who come simply to look on. The greatest purification of all is, therefore, disinterested science, and it is the man who devotes himself to that, the true philosopher, who has most effectually released himself from the ‘wheel of birth’.&lt;/code&gt;&lt;/p&gt;</content:encoded></item><item><title><![CDATA[dark side of metrics]]></title><description><![CDATA[It would be shortsighted to consider software development a sacred craft that should steer clear of financial pressures or business concerns…]]></description><link>https://en.socratic.dev/dark-side-of-metrics</link><guid isPermaLink="false">https://en.socratic.dev/dark-side-of-metrics</guid><pubDate>Sat, 16 Nov 2019 00:00:00 GMT</pubDate><content:encoded>&lt;p&gt;It would be shortsighted to consider software development a sacred craft that should steer clear of financial pressures or business concerns. As a software developer I dedicate every worktime minute to increase the value of my employer’s services and products. If I stop doing that, he’ll have every right to severe his ties with me. In the same spirit, our clients and employers have to be diligent and assess our value by our contribution to the success of their enterprises. Easier said than done, eh !?&lt;/p&gt;
&lt;p&gt;I’ve recently purchased Tom DeMarco’s book Why does software cost so much ? based on Joel Spolsky’s good review on his blog &lt;a href=&quot;https://www.joelonsoftware.com/&quot;&gt;https://www.joelonsoftware.com/&lt;/a&gt;. Reading the second essay, ‘Mad about measurement’, forced me to take off my software developer’s hat for a while and reflect on the struggle of managing our byte-artisans community.&lt;/p&gt;
&lt;p&gt;This essay reflects on the negative effects of metrics in software development. As a newcomer in the business, I entertain no opinion for or against software measurements. So, in this post, I will try to depict the author’s position by selecting some parts of his text. The full-length essay covers the subject in an deeper and more nuanced way. If you’re interested in the subject, I strongly suggest to get a copy of Tom DeMarco’s book :&lt;/p&gt;
&lt;p&gt;Tom DeMarco, Why does software cost so much : and other puzzles of the information age, New York, Dorset House publishing, 1995, pp. 13-44.&lt;/p&gt;
&lt;h2&gt;Bio of the author:&lt;/h2&gt;
&lt;p&gt;‘Tom DeMarco (born August 20, 1940) is an American software engineer, author, and consultant on software engineering topics. He was an early developer of structured analysis in the 1970s.’
(Wikipedia, ‘Tom DeMarco’, date of last consultation : august 9th 2017)&lt;/p&gt;
&lt;h2&gt;The good stuff:&lt;/h2&gt;
&lt;p&gt;‘Metrics’ means different ways to measure how an organization or a project is doing. The author also talks about ‘software measurement’. Metrics may very well be what turns software development from a craft to a science :&lt;/p&gt;
&lt;p&gt;‘Metrics could be defined as the discipline of counting things and observing and profiting from patterns found among the things we count.’ (page 15)&lt;/p&gt;
&lt;p&gt;The author is ambivalent about metrics. On one hand, he’s a proponent of metrics notably by having published a book titled ‘Controlling software projects’ and offering his services as a software productivity consultant. On the other hand, he is critical about the multiplication of metrics and their negative influence on software developers and software companies.&lt;/p&gt;
&lt;p&gt;“This may seem obvious, but somebody really ought to say it: Metrics cost a ton of money. It costs a lot to collect them badly and a lot more to collect them well” (page 14)&lt;/p&gt;
&lt;p&gt;DeMarco’s position is that metrics are useful to learn new things. Hence, most measurements should be ad hoc and never collected permanently :&lt;/p&gt;
&lt;p&gt;‘I can only think of one metric that is worth collecting now and forever: defect count […] There are many other metrics that are worth collecting for a while. Each time you introduce and begin collecting a new metric, you need to put in place a mechanism to cease collecting that metric at some time in the future. Many of the most useful metrics should be collected only on a sampling basis.’ (page 15)&lt;/p&gt;
&lt;p&gt;The author underlines that a lot of metrics’ usage causes dysfunction. As an example, he evokes a nails factory in communist Russia. First, the metrics used by the government was the number of nails produced in a month. So, the factory switched to producing a lot of very small nails. These nails weren’t in demand, so the government changed the metrics to the tonnage of nails produced every month. As a matter of fact, the factory switched to produce bulky railroad spikes… This example shows that for every metric set, the people subjected to it will more or less quickly learn how to game it.&lt;/p&gt;
&lt;p&gt;DeMarco categorizes metrics into a ‘spectrum’ according to its aim :&lt;/p&gt;
&lt;p&gt;Behavior modification ———————– Steering —– ————————–Discovery&lt;/p&gt;
&lt;p&gt;He maintains that the healthiest way to use metrics is at the far right of the spectrum. And the more we go to the left, the more probabilities that metrics will cause dysfunction.&lt;/p&gt;
&lt;h3&gt;Are some tech companies  against measurement ?&lt;/h3&gt;
&lt;p&gt;‘Apple and Microsoft, to name just two companies that make no systematic use of software measurement […] have done just fine without it. […] The entire small-cap sector is not known for its measurements practices, yet the solid vitality of the American economy since 1980 has come almost entirely from these small companies.’ (page 18)&lt;/p&gt;
&lt;h3&gt;Dysfunction at Hitachi Software&lt;/h3&gt;
&lt;p&gt;The author uses an example of a metric being gamed by software developers to illustrate his point that using metrics as behavior modification :&lt;/p&gt;
&lt;p&gt;Hitachi’s then Chief Scientist, Tomoo Matsubara, made the discovery that ‘early detected defects could be a positive indication of as-yet-undetected defects’. This discovery was specifically applied to unit testing: the number of early detected faults would predict the number of faults to expect in a soon to be shipped program. So, ‘consciously or unconsciously’, developers started to hold back on finding faults in unit tests ! ‘Holding back a defect benefits the individual developers in three ways: 1- They look good since their modules appear relatively defect free; 2- They have fewer latent defects ascribed to their code, hence less pressure later; 3- They have one or two defects ready to produce during integration testing when management clamors for more.’ As a conclusion : ‘Holding back on defects benefits the developer, but doesn’t benefit the organization at all. It is a clear example of dysfunction’ (pages 20-21).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Measurement Dysfunction:&lt;/strong&gt; ‘compliance with the letter of a motivational scheme in such a way as to achieve exactly the opposite of that scheme’s underlying goals and intentions’ (page 24)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Cost/benefits :&lt;/strong&gt; how to measure benefits ? do we even measure it ?&lt;/p&gt;
&lt;p&gt;‘The cost/benefit study is concerned totally with cost and not at all with benefit. Benefits, if they are mentioned at all, are fuzzy : ‘The benefit is we gotta have it’ or ‘The benefit is better sales reporting’ or ‘The benefit is competitive advantage’. When benefits are not quantified, it seems almost pointless to me to quantify costs’ (pages 40-41)&lt;/p&gt;
&lt;p&gt;‘The paradox at work here is that productivity is often at odds with benefit. Benefit is maximized by taking chances and venturing into new territory. Productivity is improved by familiarity and repetition’ (page 41)&lt;/p&gt;
&lt;p&gt;‘Just as we have learned to make software projects cost-conscious and cost-accountable over the past decade, we now have to relearn how to make them benefit-conscious and benefit-accountable’ (page 42)&lt;/p&gt;
&lt;h3&gt;The author’s Commandments :&lt;/h3&gt;
&lt;pre&gt;&lt;code&gt;- Measure for benefit or don’t measure anything
- Measure for Discovery
- Be suspicious of any findings that confirms your darkest suspicions
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;(pages 43-44)&lt;/p&gt;</content:encoded></item></channel></rss>