<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: kevin_nisbet</title><link>https://news.ycombinator.com/user?id=kevin_nisbet</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 14 Apr 2026 22:58:49 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=kevin_nisbet" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by kevin_nisbet in "jj – the CLI for Jujutsu"]]></title><description><![CDATA[
<p>I really wanted to like JJ, it was handy for a few months when I used it. But for me in the end I reverted back to regular git.<p>What triggered me to go back was I never got a really clean mental model for how to keep ontop of Github PRs, bring in changes from origin/main, and ended up really badly mangling a feature branch that multiple contributors were working on when we did want to pull it in. I'll probably try it again at some point, but working in a team through Github PRs that was my main barrier to entry.</p>
]]></description><pubDate>Tue, 14 Apr 2026 14:29:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=47766145</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=47766145</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47766145</guid></item><item><title><![CDATA[New comment by kevin_nisbet in "The economics of software teams: Why most engineering orgs are flying blind"]]></title><description><![CDATA[
<p>Agreed, and this is where I think some more nuanced and conscious use of tech debt can be used when applicable.<p>It might be OK to place some bets on an initiative or feature, but if we all understand we're placing a bet, this is an area to load up on debt and really minimize the investment. This also requires an org that is mature about cutting the feature if the bet doesn't materialize, and if the market signal is generated will reinvest in paying down the debt. And also has the mega-danger territory of a weak market signal, where it's not clear if there is market signal or not, so the company doubles down into the weak signal.<p>Also these bets shouldn't be done in isolation in my view, well executed product and market discovery should also provide lots of relevant context on the ROI.</p>
]]></description><pubDate>Mon, 13 Apr 2026 18:15:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=47755880</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=47755880</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47755880</guid></item><item><title><![CDATA[New comment by kevin_nisbet in "The economics of software teams: Why most engineering orgs are flying blind"]]></title><description><![CDATA[
<p>I'm not commenting too much on the details of the article, but the premise does resonate with me. I would argue all the engineering teams I've been on do not spend enough time thinking about how much a piece of work will cost to execute, and whether it will generate a return.<p>I suspect this is most apparent on things like meeting culture. Something happens and all of a sudden there is another recurring meeting on the calendar, with 15 attendee's, costing x dollars in wages, that produces no value for the customers because the lesson was already learned.<p>Or when reacting to an incident of some sort, it's so easy to have a long list of action items that may theoretically improve the situation, but in reality are incredibly expensive for the value they produce (or the risks they reduce). It's too easy to say, we'll totally redesign the system to avoid said problem. And what worries me, is often those very expansive actions, then cause you to overlook realistic but small investments that move the needle more than you would think.<p>And as a hot topic I also think the costs are an input into taking on tech debt. I know we all hate tech debt with a passion, but honestly, I think of it as a tool that can be wielded responsibly or irresponsibly. But if we don't know what our attention costs, we're going to have difficulty making the responsible choices about when and where to take on this debt. And then if we're not conscious about the debt, when it comes do it stings so much harder to pay down.</p>
]]></description><pubDate>Mon, 13 Apr 2026 13:53:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=47752004</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=47752004</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47752004</guid></item><item><title><![CDATA[New comment by kevin_nisbet in "Three Cache Layers Between Select and Disk"]]></title><description><![CDATA[
<p>Thanks for sharing, this was a great read. And it brought up some old memories, of fighting with telecom vendors about how their calculated their memory usage. At that time you only really got what the vendors gave you.<p>I think the most fun I had with the page cache was when one of the vendors "fixed" a bug where the memory calculation has previously excluded the page cache. These boxes were all network services, they didn't rely on the disk for anything more than holding the binaries, configuration, and logs. Where the fun comes in is the first time you grep through the logs, which fills the page cache, and sets off the alarms that the cellular network is about to die. ;)<p>Anyways, important concept to know and understand when it comes to how software performs when interacting with a host.</p>
]]></description><pubDate>Thu, 12 Feb 2026 23:41:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=46996897</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=46996897</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46996897</guid></item><item><title><![CDATA[New comment by kevin_nisbet in "Tell HN: DigitalOcean's managed services broke each other after update"]]></title><description><![CDATA[
<p>> I chose managed services specifically to avoid ops emergencies. We're a tiny startup paying the premium so someone else handles this. Instead, I spent late night hours debugging VPC routing issues in a networking layer I don't control.<p>This happens with managed services and I understand the frustration, but vendors are just as fallible as the rest of us and are going to have wonky behaviour and outages, regardless of the stability they advertise. This is always part of build vs buy, buy doesn't always guarentee a friction free result.<p>It happens with the big cloud providers as well, I've spent hours with AWS chasing why some VMs are missing routing table entries inside the VPC, or on GCP we had to just ban a class of VMs because the packet processing was so bad we couldn't even get a file copy to complete between VMs.</p>
]]></description><pubDate>Tue, 13 Jan 2026 02:03:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=46596585</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=46596585</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46596585</guid></item><item><title><![CDATA[New comment by kevin_nisbet in "Nearby peer discovery without GPS using environmental fingerprints"]]></title><description><![CDATA[
<p>> I see, this sheds some new light on your initial concerns. I'm aware an attacker can keep pretending to be inside an environment once they've seen it. I wasn't accounting for a scenario where an attacker has a huge database for queries like coords -> list of wifi networks<p>I think this is the issue, is these datasets are out there and at least big tech companies have them since they're used to assist with GPS. I was about to post the same thing as above but saw vessenes beat me to it.<p>Without thinking about it too hard, the two directions I see are either making observations of the environment in real-time that is only relevant at that time (IE sniffing actual wireless frames, even if they're encrypted and making observations on them, however, most devices won't let you go into promiscuous mode and do this) or encrypting the messages in flight so only participants can decrypt them (IE a model like the signal protocol with E2E message encryption).<p>Anyways, this is a cool approach, but that risk occurred to me as well about the ability to just brute force the entire dataset to decode every location.</p>
]]></description><pubDate>Tue, 25 Nov 2025 17:19:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=46048094</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=46048094</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46048094</guid></item><item><title><![CDATA[New comment by kevin_nisbet in "X.com is gonna snitch you out to the public if you use a VPN"]]></title><description><![CDATA[
<p>I'm not as sure and would want to consider the angles a bit more.<p>I ponder how effective this would be against an adversary sufficiently motivated to look like they're not using a VPN. And then does it result in a false sense of trust, since a user thinks the system more reliably detects a VPN then it does. Or an adversary who has bypassed the system to then point to it to build additional trust.</p>
]]></description><pubDate>Sun, 23 Nov 2025 13:41:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=46023513</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=46023513</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46023513</guid></item><item><title><![CDATA[New comment by kevin_nisbet in "K8s with 1M nodes"]]></title><description><![CDATA[
<p>I'm with you, I think most people might think they don't need this reliability, until they do. I'm sure there is some subset of clusters where the claim is correct.<p>But from the article, turning off fsync and expecting to only lose a few ms of updates. I've tried to recover etcd on volumes that lied about fsync and experienced a power outage, and I don't think we managed to recover it. There might be more options now to recover and ignore corrupted WAL entries, but at that time it was very difficult and I think we ended up just reinstalling from scratch. For clusters where this doesn't matter or the SLOs for recovery account for this, I'm totally onboard, but only if you know what you're doing.<p>And similar the point from the article that "full control plane data loss isn’t catastrophic in some environments" is correct, in the sense of what the author means by some environments. Because I don't think it's limited to those that are management by gitops as suggested, but where there is enough resiliency and time to redeploy and do all the cleanup.<p>Anyways, like much advice on the internet, it's not good or bad, just highly situational, and some of the suggestions should only be applied if the implications are fully understood.</p>
]]></description><pubDate>Sat, 18 Oct 2025 21:21:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=45630437</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=45630437</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45630437</guid></item><item><title><![CDATA[New comment by kevin_nisbet in "The email they shouldn't have read"]]></title><description><![CDATA[
<p>Yup, even for smaller business stuff. For a non-profit I'm on the board of, the staff wanted a more useful printer/copy machine than just a store bought thing, it's a small office, so I said sure find something and let us know.<p>So I get a contract and am told it's been vetted and I should sign it. What I found was outrageous.<p>- If we cancelled for any reason, including if they just didn't do any of there terms in the contract, we owed the full price of the remaining contract immediately.<p>- The way they structured it was also as a rental, so we were paying full price for purchase of the equipment embedded into the term of the contract, but it was the vendors equipment, so if we cancelled we still paid them full price for the equipment, and they got to keep it.<p>- If there were any legal disputes, no matter which party was at fault, my side would pay for all the lawyers.<p>I said nope, can't do it. And my staff were pissed at me for like a year because everyone just signs those things.</p>
]]></description><pubDate>Wed, 08 Oct 2025 15:14:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=45517111</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=45517111</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45517111</guid></item><item><title><![CDATA[New comment by kevin_nisbet in "AWS Lambda Silent Crash – A Platform Failure, Not an Application Bug [pdf]"]]></title><description><![CDATA[
<p>I don’t know about node but a fun abuse of this is background tasks can still sometimes run on a busy lambda as the same process will unsuspend and resuspend the same process. So you can abuse this sometimes for non essential background tasks and to keep things like caches in process. You just cant rely on this since the runtime instead might just cycle out the suspended lambda.</p>
]]></description><pubDate>Tue, 15 Jul 2025 02:56:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=44567460</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=44567460</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44567460</guid></item><item><title><![CDATA[New comment by kevin_nisbet in "Avoid ISP Routers (2024)"]]></title><description><![CDATA[
<p>My ISP does this as well, provides Huawei modems with hardcoded backdoor passwords that can easily be found online. So yup, I've got a dedicated firewall between my networks and the modem. With slow updates and backdoors, I'd include any ISP modem and networks as part of my personal threat model.</p>
]]></description><pubDate>Sun, 02 Feb 2025 01:30:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=42904643</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=42904643</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42904643</guid></item><item><title><![CDATA[New comment by kevin_nisbet in "EV maker Canoo, once worth $2.4B, files for bankruptcy"]]></title><description><![CDATA[
<p>I kind of like what the folks in British Columbia are doing for their EV prototypes for Semi Trucks (technically a hybrid, EV with onboard generator): <a href="https://www.edisonmotors.ca/topsy" rel="nofollow">https://www.edisonmotors.ca/topsy</a></p>
]]></description><pubDate>Mon, 27 Jan 2025 06:01:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=42837897</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=42837897</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42837897</guid></item><item><title><![CDATA[New comment by kevin_nisbet in "No one is disrupting banks – at least not the big ones"]]></title><description><![CDATA[
<p>I don't know if the point should be that people won't use a startup bank, just that the assets being directed to the startups/disruptors are not presently threatening to the big banks. I would suspect this is currently the case with WealthSimple here in Canada as well. WealthSimple is at something like $50 billion assets under management [1].<p>Vanguard asset allocation ETFs are at like $1.3T [2]. 4 Of Canada's Big banks appear to add up to just over 2T Assets under management based on what Google just gave me as summary. So while I think this is a great outcome for a startup (even with Power backing them), to me it seems in a similar space as the above article that we're still talking a relatively small market share, and likely still closer to early adopter status.<p>[1] - <a href="https://en.wikipedia.org/wiki/Wealthsimple#:~:text=As%20of%20September%2018%2C%202024,billion%20in%20assets%20under%20management." rel="nofollow">https://en.wikipedia.org/wiki/Wealthsimple#:~:text=As%20of%2...</a>
[2] - <a href="https://www.vanguard.ca/en/product/investment-capabilities/asset-allocation-etfs" rel="nofollow">https://www.vanguard.ca/en/product/investment-capabilities/a...</a></p>
]]></description><pubDate>Mon, 27 Jan 2025 05:58:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=42837876</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=42837876</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42837876</guid></item><item><title><![CDATA[New comment by kevin_nisbet in "Ask HN: How to learn marketing and sales as a solo entrepreneur?"]]></title><description><![CDATA[
<p>+1 on recommending the Mom Test, it's one of the most important books I've read.<p>I'd say in addition to entrepreneurs, it's an important book for product teams / product engineers to understand what the Mom Test teaches, and tune the filter on asking the right questions to get the highest signal, and ensure the solution closely matches the value prop for the customer. Then sales and marketing get a whole lot easier when you've asked the right questions and solved the right problems.</p>
]]></description><pubDate>Fri, 03 Jan 2025 21:22:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=42589606</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=42589606</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42589606</guid></item><item><title><![CDATA[New comment by kevin_nisbet in "Portspoof: Emulate a valid service on all 65535 TCP ports"]]></title><description><![CDATA[
<p>Yea, thinking about it for a minute I would expect limited threat models this tool would help with. I think for broad attacks, this would only be somewhat effective if deployed on tens of millions of hosts so it becomes impractical because the adversary is just finding and interacting with the honeypots.<p>If you are specifically getting targeted, there might be a slight delay by having the adversary try and exploit the honeypot ports, but if you're running a vulnerable service you still get exploited.<p>Also if you're a vendor, when prospective customers security teams scan you, you'll have some very annoying security questionnaires to answer.</p>
]]></description><pubDate>Thu, 26 Dec 2024 16:47:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=42516178</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=42516178</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42516178</guid></item><item><title><![CDATA[New comment by kevin_nisbet in "Serverless VPN Self-hosted"]]></title><description><![CDATA[
<p>Probably. I'm not sure what you have in mind, but WireGuard would just be an intermediate network layer, so it would be up to however you're configuring multi-wan routing would still be apply/available.</p>
]]></description><pubDate>Fri, 06 Dec 2024 17:40:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=42342040</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=42342040</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42342040</guid></item><item><title><![CDATA[New comment by kevin_nisbet in "Engineers do not get to make startup mistakes when they build ledgers"]]></title><description><![CDATA[
<p>This is a good explanation, I've had to explain this topic a few times as well, it seems like it's one of those topics that is very missunderstood.<p>To just expand a bit, I believe some of the confusion around printing of money comes from the way some economics reports are built. As a micro example, Assume a 10% required reserve, If Alice deposits $100 and the bank lends $90 to Bob. Alice ($100 deposits) + Bob ($90 cash) think they have $190 in total.<p>This is mainly useful for economists to understand, study, and report on. However, when the reports get distributed to the public, it looks like the banks printed their own money, as we now see $190 on the report when there is only $100 of cash in our example system.<p>Whether the system should work on a fractional reserve is it's own debate, but we need to know what it is to debate the merits and risks of the system.</p>
]]></description><pubDate>Fri, 29 Nov 2024 05:41:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=42271157</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=42271157</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42271157</guid></item><item><title><![CDATA[New comment by kevin_nisbet in "This Pull Request was generated automatically using cover-agent"]]></title><description><![CDATA[
<p>I suspect there is also another angle, which is are the tests maintainable as well? Like you said, if you're not testing intent, this might be one more thing to maintain.<p>In another view, this might just be a fancy way of doing snapshot testing, use AI to generate all the inputs to produce a robust snapshot, but realize the output isn't unit tests, it's snapshots that report changes in outputs that devs will just rubber stamp.</p>
]]></description><pubDate>Tue, 19 Nov 2024 15:10:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=42184239</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=42184239</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42184239</guid></item><item><title><![CDATA[New comment by kevin_nisbet in "We built a self-healing system to survive a concurrency bug at Netflix"]]></title><description><![CDATA[
<p>This is along the lines of how one of the wireless telecom products I really liked worked.<p>Each running process had a backup on another blade in the chassis. All internal state was replicated. And the process was written in a crash only fashion, anything unexpected happened and the process would just minicore and exit.<p>One day I think I noticed that we had over a hundred thousand crashes in the previous 24 hours, but no one complained and we just sent over the minicores to the devs and got them fixed. In theory some users would be impacted that were triggering the crashes, their devices might have a glitch and need to re-associate with the network, but the crashes caused no widespread impacts in that case.<p>To this day I'm a fan of crash only software as a philosophy, even though I haven't had the opportunity to implement it in the software I work on.</p>
]]></description><pubDate>Wed, 13 Nov 2024 19:15:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=42128961</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=42128961</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42128961</guid></item><item><title><![CDATA[New comment by kevin_nisbet in "Fearless SSH: Short-lived certificates bring Zero Trust to infrastructure"]]></title><description><![CDATA[
<p>I'm with you, I imagine it's mostly people just drawing parallels, they can figure out how to get a web certificate so think SSH is the same thing.<p>The second order problem I've found is when you dig in there are plenty of people who ask for certs but when push comes to shove really want functionality where when user access is cancelled all active sessions get torn down immediatly as well.</p>
]]></description><pubDate>Thu, 24 Oct 2024 03:42:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=41931686</link><dc:creator>kevin_nisbet</dc:creator><comments>https://news.ycombinator.com/item?id=41931686</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41931686</guid></item></channel></rss>