Suramya's Blog : Welcome to my crazy life…

May 22, 2023

How not to do Interview Screening: Take 1000

Filed under: Humor,My Thoughts — Suramya @ 9:05 PM

Interviewing people is hard and each of us has their own bag of tricks and filters we use to identify the correct candidate for the position. However, some of the ways that people use to filter out applicants just make you go ‘Wow!’ with a head shake. One such example is below:

The iPhone is so much better than any other phone it isn't funny. I now check for phone type in interviews and automatically disqualify the Android Users
The iPhone is so much better than any other phone it isn’t funny. I now check for phone type in interviews and automatically disqualify the Android Users

Using a phone preference as a filter is not the right way to filter out candidates, if this becomes the norm then folks will start filtering candidates on what music they like, what brands they wear or what car they drive. Unless you are working at apple rejecting people for using an Android phone (which for the record is way better then iPhone) is foolish. It is also extremely classist, it automatically filters out people who can’t afford to buy an expensive iPhone as the General cost range for an iPhone is between $500 – $1,500+ whereas an Android phone would range between $100-$1,750+. It also filters out people who care about compatibility of their phone with other users at their home as it is hard to connect an iPhone to an Android ecosystem.

Plus it tells me that you are more concerned about arbitrary markers of evaluation than actually relevant criteria. Personally, I think that if the person interviewing me is using something like this as a filtering mechanism then I am better off getting rejected as who know what insane criteria they might come up with for performance evaluation once you join and start working with them.

I do have a lot of thoughts on interview processes and how some companies do screening but that is a post for another time.

– Suramya

May 18, 2023

Lost in Translation: Movie Synopsis edition

Filed under: Humor — Suramya @ 10:52 PM

This screenshot of the synopsis for ‘Alien’ popped up in my feed earlier and I couldn’t stop laughing.

“Space ship people get up from sleeping coffin and have eat. Computer woman find strange noisings on planet and astronauts go to seeing. Astronauts find big elephant man who dead then find too many egg/

Astronaut is possess by egg demon and new egg demon is come when eat bad noodle. Seven friends and cat all try to find egg demon before ship go home but is hard working.

Who will life to escaping? Who is bad milk blood robot? Scream not working because space make deaf.”

This reminds me of “All your base are belong to us” which was another masterpiece of bad translation.

– Suramya

May 17, 2023

Request to advertise ‘Men’s Beauty’ topics on Linuxgazette.net

Filed under: Humor,Linux/Unix Related — Suramya @ 7:18 PM

As some of you might know, I host a mirror for Linuxgazette.net and this usually results in an email every couple of months for changes to the existing articles and requests to advertise. I recently received an email requesting information about linuxgazette.net for advertising. Now there are a few problems with this, firstly I don’t host linuxgazette.net I just host a mirror of the site. Second problem was the content/topic they want to advertise on the site:

Beards seem to have become popular again, but do you think they will stick? Time will tell, but personally, I wouldn’t mind seeing more men with a cleanly shaven face 😍

I’m getting in touch today because I have some clients looking for advertising opportunities that are related to Men’s Beauty (Should I call it Men’s “Beauty”). After I stumbled across linuxgazette.net I figured I’d reach out and see if you ever work with brands, or have a media kit available.

I mean historically Linux admins do have a reputation of keeping big beards but this is ridiculous. Of course I know that this mail was probably sent out by an automated bot but it did make me laugh .

– Suramya

March 6, 2023

Twitter is down… Again!

Filed under: Computer Related,Humor — Suramya @ 11:07 PM

Twitter downtimes are becoming more and more common, and even though I don’t spend that much time on Twitter anymore (Mastodon is so much better and more fun) this was too good to ignore.
If you visit Twitter.com (or any url on twitter) right now instead of the content you get an API error message stating that “Your current API plan does not include access to this endpoint, please see https://developer.twitter.com/en/docs/twitter-api for more information”.


Current API plan does not include access to this endpoint

Looks like the team managed to nuke their own connections to the API while attempting to restricting some API calls to paid customers only. Although this is an error that should have been caught in UAT or QA testing. I mean that is the basic 1st thing to check to see if all services are working after a major change like this one. But it looks like it was pushed to prod directly without validation.

I guess firing a majority of your teams with almost no notice or Knowledge Transfer sessions is a bad move and makes it harder to keep your site up and running. Who knew?

– Suramya

March 3, 2023

Someone is now claiming that they can’t use Microsoft Windows for “Religious Reasons”

Filed under: Humor,News/Articles,Tech Related — Suramya @ 3:10 PM

The Operating System (OS) wars have been going on since we have had computers and the ferocity with which some OS users defend their preference at times borders on that of fundamentalist religions. The following incident just takes it to the logical conclusion, where a new joiner in a company doesn’t want to use windows on their office laptop because their religion does not allow use of Apple or Microsoft owned Operating Systems.


Employee claims that she can’t use Microsoft Windows for “Religious Reasons”

I wonder that their stance is about using other software/websites/services owned by Apple/Microsoft. Have they stopped using Github because it is owned by MS? What about LinkedIn? or Mojang, X-Box? or any of the thousands of companies they own or have stakes in. Do they use Beat headsets? Shazam? Akamai? Apple either owns or has stakes in them and a ton of other companies as well.

I personally use Linux as my primary OS and would always prefer to use it whenever possible. However, I have had to use Windows at work in most of the companies that I have worked in because that’s what the standard setup was over there. I did push for Linux in some of the orgs and we ended up replacing Windows with Linux for some of the developers in a few companies. That being said, refusing to work with an OS because you don’t want to is a bit over the top for me and calling it against their religion makes it even more out there…

Source: Whitney Merrill on Mastadon

– Suramya

December 21, 2022

“Linux is a meme and only autistic people use it” brainstorm from an anonymous coward

Filed under: Humor,Linux/Unix Related,My Thoughts — Suramya @ 8:28 PM

It is funny how people will make up stuff to explain why Linux (or any other OS) is difficult and why the person making the pronouncements can’t get it to do what they want it to do. Recently, the screenshot below came up in my feed and it made me laugh. As per the author only autistic people use Linux and everyone else “has just fallen for the meme”.


Linux is only for Autistic People

I have been using Linux almost full time since 2001 and am definitely not autistic. I can’t identify trains by their sounds and instead of not being able to talk to girls, according to some I sometimes talk too much. I have no interest in learning the names of the cast for any TV show and as far as I can tell I am leading a pretty normal life.

The genius who penned this (and I am of half a mind that this is just someone trolling Linux users) doesn’t seem to know that it is used to power 96.3% of the world’s top web servers and Android is based on Linux as well. It is the world’s 3rd most popular OS (after Windows and Mac) and while it has its own quirks it def doesn’t need you to know the in’s and out of the computer in order to use it. In fact in my experience, it is easier to install Linux and have a functional setup than it is to install Windows as Windows requires a lot of extra stuff to be installed in order to be productive while in Linux most of that is already pre-installed or built-in.

This was good for a laugh so I wanted to share it here.

– Suramya

August 29, 2022

Can you explain complex ideas using only the top 1k most used English words?

Filed under: Humor,Interesting Sites — Suramya @ 10:27 PM

They say that the best way to gauge if someone understands a topic in depth is to see if they can explain it in language simple enough that a 5 year old can understand. Too many people use acronyms and buzzwords to explain stuff that just confuses people and makes it harder to figure out what people are talking about. There was an old XKCD joke about explaining something using the top 1k most commonly used words in English (See an example about a Rocket below). There is a book about it as well called the ‘Thing Explainer‘ that I had gifted to Vir (my Nephew) a while ago. They both (Vir & Sara) love it and still refer to it quite often.

Theo Sanderson was inspired by the idea and has created a website where you can attempt to explain something with only the top 1000 most commonly used English words.


Up Goer Five

Writing like this actually sounds a lot easier than it is and when I tried it, it took me a few tries to write something that passed the test. Check it out and share your creative writing. 🙂

– Suramya

July 1, 2021

Never used foo/bar/baz as variable names, can I still call myself a programmer?

Filed under: Humor,My Thoughts,Tech Related — Suramya @ 4:14 PM

Just realized today that in my 24+ years of programming I have never named a variable foo, bar or baz. These are the goto names for placeholders in code & metaphysical variables and have decades of history behind them. Most programmers use them for temporary variables or place holders. Since I have never used them, can I still call myself a programmer? 😀

Jokes aside, you should use good variable names in your code that are meaningful, easy to read and concise. Some guidelines on how to do that are below:

Also, another point to keep in mind is to avoid acronyms that can have a different meaning in a different language or resemble rude words etc. See the screenshot below for an example of a ‘bad’ variable name:

Example of a bad variable name
Example of a bad variable name

Well this is all for now. Will post more later.

– Suramya

May 22, 2021

The Programmer Move: Automating everything has a logic behind it

Filed under: Humor,My Thoughts — Suramya @ 11:48 PM

In the past few weeks I have seen this joke multiple times where they talk about programmers automating something in 10 days that could be done manually in 10 mins. It does seem funny and people love to think that programmers like doing things the hard way. At times this is true but not always. There is a reasoning behind why we spend 10 days automating a 10 min task. When people look at this they don’t consider the frequency of the task i.e. how many times we are doing that 10 min task. Most of the time you will find that the 10 min task was being done fairly frequently and wasting a lot of time.


Programmers move

When I evaluated candidates for automation in one of my previous companies we had a calculation we used to determine if a process was a candidate for automation. We looked at the time required to complete, complexity of the task (ease of automation), the frequency at which it was done (hourly/daily/weekly/yearly) and the resources freed if automated. Then we looked at how long it would take to automate the process. Looking at the two values we would take the call to automate or not depending on the return of investment from the automation. So, if we had something that was only 10 minutes but done daily then spending the 10 days to automate would probably make sense. On the other hand if the task was a one-off or done yearly then it wouldn’t be a candidate for automation.

Programmers love to automate things. I have automated most of the tasks that I do frequently for system maintainance etc. However not every task needs to be automated and assuming that programmers are doing it just for the heck of it is a disservice. But it is funny. Take a look at a Rube Goldberg machine if you want to see this taken to the extreme, where everything is automated in a manner as complicated as possible.


Rube Goldberg machine: Professor Butts and the Self-Operating Napkin

– Suramya

May 6, 2021

Blast from the Past: Is Your Son a Computer Hacker?

Filed under: Humor — Suramya @ 5:37 PM

While surfing the web, I came across this article on Hacker News from 2001, where a parent found out that their son is a computer hacker and now wants to highlight the symptoms to other parents so that their kids don’t fall to the same trap that he did. I first read this article when I was in college and found it as idiotic and funny then as I do now. Apparently, using AMD or having flash installed on your machine makes you a hacker. So does reading “Programming with Perl” by Timothy O’Reilly. If any of you reading this are parents, please do actual research rather than reading random articles on the web or watching YouTube videos.

Without further ado, read on to find out if your son is a hacker:

———
As an enlightened, modern parent, I try to be as involved as possible in the lives of my six children. I encourage them to join team sports. I attend their teen parties with them to ensure no drinking or alcohol is on the premises. I keep a fatherly eye on the CDs they listen to and the shows they watch, the company they keep and the books they read. You could say I’m a model parent. My children have never failed to make me proud, and I can say without the slightest embellishment that I have the finest family in the USA.

Two years ago, my wife Carol and I decided that our children’s education would not be complete without some grounding in modern computers. To this end, we bought our children a brand new Compaq to learn with. The kids had a lot of fun using the handful of application programs we’d bought, such as Adobe’s Photoshop and Microsoft’s Word, and my wife and I were pleased that our gift was received so well. Our son Peter was most entranced by the device, and became quite a pro at surfing the net. When Peter began to spend whole days on the machine, I became concerned, but Carol advised me to calm down, and that it was only a passing phase. I was content to bow to her experience as a mother, until our youngest daughter, Cindy, charged into the living room one night to blurt out: “Peter is a computer hacker!”

As you can imagine, I was amazed. A computer hacker in my own house! I began to monitor my son’s habits, to make certain that Cindy wasn’t just telling stories, as she is prone to doing at times.

After a few days of investigation, and some research into computer hacking, I confronted Peter with the evidence. I’m afraid to say, this was the only time I have ever been truly disappointed in one of my children. We raised them to be honest and to have integrity, and Peter betrayed the principles we tried to encourage in him, when he refused point blank to admit to his activities. His denials continued for hours, and in the end, I was left with no choice but to ban him from using the computer until he is old enough to be responsible for his actions.

After going through this ordeal with my own family, I was left pondering how I could best help others in similar situations. I’d gained a lot of knowledge over those few days regarding hackers. It’s only right that I provide that information to other parents, in the hope that they will be able to tell if their children are being drawn into the world of hacking. Perhaps other parents will be able to steer their sons back onto the straight and narrow before read this list carefully and if their son matches the profile, they should take action. A smart parent will first try to reason with their son, before resorting to groundings, or even spanking. I pride myself that I have never had to spank a child, and I hope this guide will help other parents to put a halt to their son’s misbehaviour before a spanking becomes necessary.

1. Has your son asked you to change ISPs?

Most American families use trusted and responsible Internet Service Providers, such as AOL. These providers have a strict “No Hacking” policy, and take careful measures to ensure that your internet experience is enjoyable, educational and above all legal. If your child is becoming a hacker, one of his first steps will be to request a change to a more hacker friendly provider.

I would advise all parents to refuse this request. One of the reasons your son is interested in switching providers is to get away from AOL’s child safety filter. This filter is vital to any parent who wants his son to enjoy the internet without the endangering him through exposure to “adult” content. It is best to stick with the protection AOL provides, rather than using a home-based solution. If your son is becoming a hacker, he will be able to circumvent any home-based measures with surprising ease, using information gleaned from various hacker sites.

2. Are you finding programs on your computer that you don’t remember installing?

Your son will probably try to install some hacker software. He may attempt to conceal the presence of the software in some way, but you can usually find any new programs by reading through the programs listed under “Install/Remove Programs” in your control panel. Popular hacker software includes “Comet Cursor”, “Bonzi Buddy” and “Flash”.

The best option is to confront your son with the evidence, and force him to remove the offending programs. He will probably try to install the software again, but you will be able to tell that this is happening, if your machine offers to “download” one of the hacker applications. If this happens, it is time to give your son a stern talking to, and possibly consider punishing him with a grounding.

3. Has your child asked for new hardware?

Computer hackers are often limited by conventional computer hardware. They may request “faster” video cards, and larger hard drives, or even more memory. If your son starts requesting these devices, it is possible that he has a legitimate need. You can best ensure that you are buying legal, trustworthy hardware by only buying replacement parts from your computer’s manufacturer.

If your son has requested a new “processor” from a company called “AMD”, this is genuine cause for alarm. AMD is a third-world based company who make inferior, “knock-off” copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well.

4. Does your child read hacking manuals?

If you pay close attention to your son’s reading habits, as I do, you will be able to determine a great deal about his opinions and hobbies. Children are at their most impressionable in the teenage years. Any father who has had a seventeen year old daughter attempt to sneak out on a date wearing make up and perfume is well aware of the effect that improper influences can have on inexperienced minds.

There are, unfortunately, many hacking manuals available in bookshops today. A few titles to be on the lookout for are: “Snow Crash” and “Cryptonomicon” by Neal Stephenson; “Neuromancer” by William Gibson; “Programming with Perl” by Timothy O’Reilly; “Geeks” by Jon Katz; “The Hacker Crackdown” by Bruce Sterling; “Microserfs” by Douglas Coupland; “Hackers” by Steven Levy; and “The Cathedral and the Bazaar” by Eric S. Raymond.

If you find any of these hacking manuals in your child’s possession, confiscate them immediately. You should also petition local booksellers to remove these titles from their shelves. You may meet with some resistance at first, but even booksellers have to bow to community pressure.

5. How much time does your child spend using the computer each day?

If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites. DOSing involves gaining access to the “command prompt” on other people’s machines, and using it to tie up vital internet services. This can take up to eight hours. If your son is doing this, he is breaking the law, and you should stop him immediately. The safest policy is to limit your children’s access to the computer to a maximum of forty-five minutes each day.

6. Does your son use Quake?

Quake is an online virtual reality used by hackers. It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school.

If your son is using Quake, you should make hime understand that this is not acceptable to you. You should ensure all the firearms in your house are carefully locked away, and have trigger locks installed. You should also bring your concerns to the attention of his school.

7. Is your son becoming argumentative and surly in his social behaviour?

As a child enters the electronic world of hacking, he may become disaffected with the real world. He may lose the ability to control his actions, or judge the rightness or wrongness of a course of behaviour. This will manifest itself soonest in the way he treats others. Those whom he disagrees with will be met with scorn, bitterness, and even foul language. He may utter threats of violence of a real or electronic nature.

Even when confronted, your son will probably find it difficult to talk about this problem to you. He will probably claim that there is no problem, and that you are imagining things. He may tell you that it is you who has the problem, and you should “back off” and “stop smothering him.” Do not allow yourself to be deceived. You are the only chance your son has, even if he doesn’t understand the situation he is in. Keep trying to get through to him, no matter how much he retreats into himself.

8. Is your son obsessed with “Lunix”?

BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called “xenix”, which was written by Microsoft for the US government. These programs are used by hackers to break into other people’s computer systems to steal credit card numbers. They may also be used to break into people’s stereos to steal their music, using the “mp3” program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as “telnet”, which is used by hackers to connect to machines on the internet without using a telephone.

Your son may try to install “lunix” on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional.

If you see the word “LILO” during your windows startup (just after you turn the machine on), your son has installed lunix. In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive. Lunix is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface.

9. Has your son radically changed his appearance?

If your son has undergone a sudden change in his style of dress, you may have a hacker on your hands. Hackers tend to dress in bright, day-glo colors. They may wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to match their clothes. They may take to carrying “glow-sticks” and some wear pacifiers around their necks. (I have no idea why they do this) There are many such hackers in schools today, and your son may have started to associate with them. If you notice that your son’s group of friends includes people dressed like this, it is time to think about a severe curfew, to protect him from dangerous influences.

10. Is your son struggling academically?

If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous “Otaku” hacker association. Excessive time spent on the computer, communicating with his fellow hackers may cause temporary damage to the eyes and brain, from the electromagnetic radiation. This will cause his marks to slip dramatically, particularly in difficult subjects such as Math, and Chemistry. In extreme cases, over-exposure to computer radiation can cause schizophrenia, meningitis and other psychological diseases. Also, the reduction in exercise may cause him to lose muscle mass, and even to start gaining weight. For the sake of your child’s mental and physical health, you must put a stop to his hacking, and limit his computer time drastically.

I encourage all parents to read through this guide carefully. Your child’s future may depend upon it. Hacking is an illegal and dangerous activity, that may land your child in prison, and tear your family apart. It cannot be taken too seriously.
———

– Suramya

« Newer PostsOlder Posts »

Powered by WordPress