• 1 Post
  • 17 Comments
Joined 1 year ago
cake
Cake day: July 13th, 2023

help-circle




  • Basically because every time this happens the burden of debt is passed towards the tax payers. They just built a long toll lane in my city in what was a 2 lane highway. Adding another lane or two would have alleviated traffic immensely. The company that built it owns all profits for approx 50 years. What could have been a 5 lane highway is still two except now you have the option of paying a ridiculous amount of money to not have to deal with the traffic. This is money that could have been spent on improving the city’s other methods of transportation, trains, bicycles, etc.

    It doesn’t affect me personally. I ride a motorcycle every day. It’s just painful to see how private interests are almost never in line with what’s best for constituents


  • As a data center engineer of 10+ years, I struggled to understand this at first. In my world, the hardware does a POST before the OS boots and has an inventory of what hardware components are available, so it shouldn’t matter in what order they are discovered, since the interface names should make a correlation between the interface and the pcie slot that NIC exists in.

    Where the water gets muddled is in virtualized servers. The NICs no longer have a correlation to a specific hardware component, and you may need to configure different interfaces in the virtualized OS for different networks. I think in trying to create a methodology that is agnostic to bare metal/virtualized OSs, it was decided that the naming convention should be uniform.

    Probably seems like bloat to the average admin who is unconcerned with whether these NICs are physical or virtual, they just want to configure their server.



  • I think you need to look into string concatenation, the easiest and best of which is f strings. You could do something like;

    print(f’welcome, {nam}')

    You could also “add” the strings together.

    print('welcome, ’ + nam)

    Another thing, when assigning the output of something to a variable, you can think of it as “the result of the code right of the equals sign is the value of the variable”.

    The input function assumes that the value should be interpreted as a string, but what if want it to be a number? You can just wrap another function around your input

    user_number = int(input(‘what’s the number?’))


  • Your experience may vary but I’m a network engineer who learned Python and I think learning regex and pandas is invaluable. Depends on what you want to build though. As far as learning resources, I’ve always liked w3schools, it’s free and to the point.

    For books, python 101 by Michael Driscoll is very good. I wouldn’t spend money on courses. They can be pretty demotivating and expensive.


  • Brother, I’m a 10+ year network engineer… Bluetooth is a low power, low speed, short range(30 feet) technology. The power of Bluetooth signals are over 1000x weaker than what cellphones use to connect to cell towers. There isn’t going to be any sophisticated “networking” happening between airtags. Your original post was almost gibberish, I had to struggle to arrive at the point you’re trying to make. You can call it a network if you want but you’re asking if it could be practical as a standalone, autonomous network and the answer is no. They lack the capability to communicate over any meaningful distance. Not much “networking” capability if it can’t talk to other networks. Others have struggled to talk sense into you so I won’t waste anymore of my time. Though I’d suggest that if you’re going to argue against logic then you should be more open to reason.


  • I think you need to take the thought of “network” completely out of your mind. This protocol is specifically regarding devices such as air tags, which don’t have any network capability themselves but rely on “connecting” to Bluetooth of the manufacturers models. The phones themselves are what gives tracking information back, based on GPS of the phone that was in proximity of the tracker.

    The question that Google/Apple have is, how can we make sure people aren’t unknowingly being tracked by someone putting a physical tracker in say, your car. THAT’S the “protocol” part. A protocol is just an agreement on how a technology is going to be implemented. If your own tracker is following you that’s fine, the MAC address will keep changing. If someone else’s air tag is following you, your phone will know this tracker has been near you for some time, and will tell you.




  • I mean I kind of see your point but calling those results AI is not accurate unless you’re just calling any kind of data collation/wrangling or even just basic programming logic “AI”. What Google is doing is taking the number of times a game is mentioned in the pages that are in the gaming category and trying to spoon feed you what it thinks you want. But that isn’t AI. the point of the person you were replying to is that it wasn’t as if he had intended to perform a Google search and was misled, you have to go to Google bard or chatgpt or whatever and prompt it, meaning it’s on you if you’re a professional who’s going to cite unverified word salad. The YouTube stuff is pretty obvious, it’s a part of their platform. What was done has nothing to do with web searches.





  • I recommend getting very familiar with pythons help(), dir() and type() functions. The help function almost always includes examples for the methods you’re trying to use, tells you what arguments it expects, and what arguments are passed by default. The type function can help you understand the inheritance of OOP and what type of object you’re looking at, and dir on that object will tell you what attributes/methods are defined for your object type.

    Other than that, find some good books. I’m a big fan of Michael Driscoll’s Python 101 and 201 books.