Irrelevant Hacks

Irrelevant musings of a hack blogger


Leave a comment

DevOps – The Four Types of Work – Part 2

So after my initial post, I decided to dig a bit deeper into the processes of DevOps, rather than go directly into the tools used (Docker, Kubernetes, Jira, etc.). I’m doing this mainly because the general view of many people in IT that DevOps is more about the tools used, rather than the actual processes that are needed to achieve success with DevOps.

Continue reading


Leave a comment

Peeple, the review site you never knew existed, but that you’re on because someone else signed you up for it

So, another day, another App or Startup.

This time it’s Peeple, a service like Yelp, but for reviewing actual people! So, it’s like a site that manages a database of information of different people and their reputations. All comments are NOT anonymous, and if any negative comment violates the rules, it might be removed. All relatively nice and interesting, but there’s a catch. And it’s a big one.

peeple1

peeple2

Or, you don’t even have to sign up for it to be on it. And no, the text message is to confirm that your profile has been added to the site, and NOT to ask your permission to BE added.

Continue reading


Leave a comment

The Sony Hack and Bandwidth

Ever since the GOP (Guardians of Peace) released corporate emails and data from Sony, there’s been huge amounts of speculation. Both by media and by security professionals alike. To sum it up, there are two lines of thought that have come up:

  1. North Korea is behind this (Media & FBI)
  2. It’s an inside job (IT Security experts)

But one thing has been on my mind, if it’s true that the GOP really has 100 Terabytes of files from Sony, how long would it take them to actually get it from Sony via the Internet?
Continue reading