Fixing a Baritone Tuning Stability Problem

I really enjoyed this article. Solid thinking and a clear exposition of the details.

Innovation Fascinations

How did I get into baritone guitar? I’m not sure I even remember the motivation accurately. I recall wanting to extend the range of tonal possibilities in my music. For those that don’t know what they sound like, the baritone guitar is featured in the solo on Wichita Lineman. It has a very deep, dark, masculine tone, reminiscent of the Wild West. When distorted, the sound is throaty and testosterone-laden, somewhere between the guitar and the bass guitar. It’s a bit like comparing the viola to the violin. You can create ominous, sombre, emotionally-charged melodies with one. They have a way of gently weeping, if coaxed into it.

There is a growing sub culture of baritone guitar players. Some very famous guitar players have recorded with them, yet it’s still a minority interest. Baritone guitars are sometimes difficult to find, choice is limited and the prices are higher, compared to…

View original post 3,544 more words

Advertisements

Terrible password policies

I just ran into a remarkably bad password entry implementation.
(https://registrationcenter.intel.com/en/accounts/register/)

1) The password I entered didn’t conform to the policy.

2) There’s a separate *link* to go to get the password policy, which is the usual ridiculous coconut headsets pseudo-safe “upper case, lower case, a symbol and a number.”
(HINT: this is NOT safe, it’s just stupid false security. Password hackers are way past the common variants of simple passwords obscured by these changes. This is BAD POLICY).

3) And…the password doesn’t work despite compliance with the policy, so the password checker is broken. I have no idea what would work, and that’s really not my problem.  So bad policy, badly implemented.

If you can’t even get basic password checking right, I don’t trust that you’ve gotten the security of the site right. So I’m stopping right there, and not registering on the site. This is a complete failure of the primary objective of the site.

What password selection requires is proof that the password is resistant to a dictionary attack, and high entropy.  If you don’t know what that means, educate yourself before attempting to implement a password system! Here’s a good example.  And here are the guidelines from NIST with an excellent rationale.

Why should I care about Kubernetes, Docker, and Container Orchestration?

Scott Hanselman wrote a great piece on why you care about containers.  (Yes, *you*).  Kubernetes is not just a fortunate choice in his example, it’s becoming the dominant orchestrator on the market.

Check it out:

A person at work chatted me, commenting on my recent blog posts on the Raspberry Pi Kubernetes Clusters that are being built, and wondered “why should I care about Kubernetes or Docker or any of that stuff?” Great question, and I’m figuring it out myself.

Source: Why should I care about Kubernetes, Docker, and Container Orchestration?