<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: skilning</title><link>https://news.ycombinator.com/user?id=skilning</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 30 Apr 2026 13:27:22 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=skilning" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by skilning in "Jonathan Haidt Brings New Evidence to the Battle Against Social Media"]]></title><description><![CDATA[
<p>Anyone have a non-paywalled mirror?</p>
]]></description><pubDate>Fri, 16 Jan 2026 21:10:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=46652265</link><dc:creator>skilning</dc:creator><comments>https://news.ycombinator.com/item?id=46652265</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46652265</guid></item><item><title><![CDATA[New comment by skilning in "SparkFun Officially Dropping AdaFruit due to CoC Violation"]]></title><description><![CDATA[
<p>Can't help but read that and think, "And Nick thinks this email chain makes HIM look like the reasonable person?"</p>
]]></description><pubDate>Wed, 14 Jan 2026 17:38:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=46619181</link><dc:creator>skilning</dc:creator><comments>https://news.ycombinator.com/item?id=46619181</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46619181</guid></item><item><title><![CDATA[New comment by skilning in "Pricing Changes for GitHub Actions"]]></title><description><![CDATA[
<p>> is $0.002/minute a good price for this<p>Absolutely not, since it's the same price as their cheapest hosted option. If all they're doing is orchestration, why the hell are they charging per-minute instead of per-action or some other measure that recognizes the difference in their cost between self-hosted and github-hosted?</p>
]]></description><pubDate>Tue, 16 Dec 2025 23:10:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=46296001</link><dc:creator>skilning</dc:creator><comments>https://news.ycombinator.com/item?id=46296001</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46296001</guid></item><item><title><![CDATA[New comment by skilning in "Pricing Changes for GitHub Actions"]]></title><description><![CDATA[
<p>Have any suggestions to those community-developed and maintained options?</p>
]]></description><pubDate>Tue, 16 Dec 2025 23:00:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=46295898</link><dc:creator>skilning</dc:creator><comments>https://news.ycombinator.com/item?id=46295898</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46295898</guid></item><item><title><![CDATA[What's your company's standard approach to developer workstations?]]></title><description><![CDATA[
<p>The short version of this question is: How does your company apply company-wide security monitoring and enforcement to Developer and DevOps machines? What exceptions are made, if any, to the workstations used by your technical power-users such as development leads and devops engineers? Does your CISO office enforce the same babysitting software -- endpoint monitoring, aggressively active threat scanning of all accessed files, etc. -- on these workstation as on the rank-and-file business employees, or are there common-sense exceptions made to accommodate the different, more i/o and CPU intensive workloads run by the technical staff?<p>For some background, my company has recently undertaken a growth initiative, and in the process our director of infrastructure has started applying all sorts of "best-practices" to corporate security policy indiscriminately to all machines on the domain. This has followed short on the heels of requiring our very small team of developers (five when I started, now even less) to stop using MacBooks for our development and to move to Microsoft Surface Laptops because "infrastructure can't manage multiple types of machines", despite the fact that we develop for cloud systems that run on Linux.<p>Needless to say, the indiscriminate application of mounds of third-party security services on top of moving us to an already less-powerful machine is impacting productivity in random and unpredictable ways. The director in question is not overly technical, and was last in the trenches around the time Windows NT was coming out, so the arguments my team are making for exceptions to some of these (in our perspective) arbitrary rules are falling on deaf ears.<p>I've been in the game for over 25 years, and this is the first time I've run across a director so completely brainwashed by cybersecurity marketing that he doesn't realize there's a difference between putting up baby gates for the toddlers and telling the adults they're not allowed to walk down a set of stairs by themselves, so I'm looking for some perspective on current industry practices as the HN crowd has seen it.</p>
<hr>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=44041353">https://news.ycombinator.com/item?id=44041353</a></p>
<p>Points: 6</p>
<p># Comments: 1</p>
]]></description><pubDate>Tue, 20 May 2025 13:24:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=44041353</link><dc:creator>skilning</dc:creator><comments>https://news.ycombinator.com/item?id=44041353</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44041353</guid></item><item><title><![CDATA[New comment by skilning in "Show HN: Tramway SDK – An unholy union between Half-Life and Morrowind engines"]]></title><description><![CDATA[
<p>I can't decide if this article is satire.</p>
]]></description><pubDate>Wed, 08 Jan 2025 15:57:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=42635494</link><dc:creator>skilning</dc:creator><comments>https://news.ycombinator.com/item?id=42635494</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=42635494</guid></item><item><title><![CDATA[New comment by skilning in "Raft: Understandable Distributed Consensus (2014)"]]></title><description><![CDATA[
<p>I was asked to click "continue" after each of the first two sentences, and the fade-in of the text took longer than reading the text.<p>This may be a great article, but I'll never know because it's frustrating to try and read.</p>
]]></description><pubDate>Fri, 27 Sep 2024 15:10:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=41671441</link><dc:creator>skilning</dc:creator><comments>https://news.ycombinator.com/item?id=41671441</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41671441</guid></item><item><title><![CDATA[New comment by skilning in "Firewalling your code"]]></title><description><![CDATA[
<p>This concept has been around for ages. I remember way back in a previous life as a Java dev having a framework where you could annotate methods with permission requirements, and the framework would add runtime instrumentation to ensure the proper context was created in the current thread and had the proper permissions to invoke that method any time it was called.</p>
]]></description><pubDate>Tue, 27 Aug 2024 13:52:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=41367522</link><dc:creator>skilning</dc:creator><comments>https://news.ycombinator.com/item?id=41367522</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41367522</guid></item></channel></rss>