Jake Gold

Profile banner

Jake Gold

@jacob.gold

Former engineer @ Tech giant Bluesky

Mountain View, CA

I like people and other animals, technology, programming, history, gaming, and a lot of other stuff. I probably like you.

Views expressed here are my own.

DMs open. Email [email protected]
Avatar
atproto is the first opportunity ever for independent devs to build on a locked-open social network with millions of users. Making this better understood and more accessible (e.g. easier to use SDKs) is all that stands between us and an explosion of much more fun (and healthy) social apps!
We're getting to spend more time on protocol again, which has me happy. Not just adding capabilities, but fixing annoyances and simplifying things. There's a few changes we can make that will make the stack more obvious, and get closer to that goal of "it's just http and json"
Avatar
This is such a great thing for Go users, open source, and for the maintainers that get to do this work. (Go devs should encourage their companies to sponsor this work. Will pay dividends.) Great job Filippo!
In 2022, I left Google in search of a sustainable approach to open source maintenance. A year later, I was a full-time independent maintainer. Today I’m announcing the natural progression of that experiment: Geomys, a small firm of professional maintainers with a portfolio of critical Go projects.
Geomys, a blueprint for a sustainable open source maintenance firmwords.filippo.io Announcing Geomys, a small firm of professional maintainers with a portfolio of critical Go projects.
Avatar
Just be happy I didn't use a table!
Avatar
I suppose we just didn't have them on VHS when I was a kid 😉 Was just reminded by a recent Martin Short interview of him teasing Spielberg with "You've made so many films when are you gonna do the big one??"
Jiminy Glick Interviews Steven Spielbergwww.youtube.com
Avatar
I keep an empty black `empty.html` page as my active browser tab on browser instances I'm not currently using to prevent myself from being distracted by whatever the last active tab would otherwise be. (also nice for making secondary monitors less bright) Can recommend!
Avatar
DMCA takedown initiated!
Avatar
lol, thanks. I *meant* to write 1979 so I would have been wrong either way!
Avatar
And it certainly solves the problem of having to evaluate all the options every so often. The fact that there's a UUIDv8 that is customizeable really drives home the frustration!
Avatar
Just watched Close Encounters Of The Third Kind (1997) for the first time and enjoyed it. But it was so distracting every few minutes realizing how many movies were so closely inspired by it. The weird helicopter flashy lights in Independence Day (1996) make a lot more sense now.
Avatar
Definitely not a bad option but at least some of the time I really need (want) the ability to use the timestamp stored in the ID for TTLs, range/prefix searches, etc. 💭 If I used sufficiently large random UUIDs the data I want would be in the ID itself *somewhere*.
Avatar
I've also yet to come across a case where I really care about leaking the timestamp in the ID. Or maybe once or twice and just had a secondary field that could be used.
Avatar
MAUs is incredibly easy to game, especially with a budget/audience. You have to ask what the DAUs are and then do the DAU/MAU math to see what the stickiness looks like. Nothing original about it, but a16z (love 'em or hate 'em) did a great job with this blog post on social app metrics.
Do You Have Lightning In a Bottle? How to Benchmark Your Social App  | Andreessen Horowitza16z.com When a new social app starts to “work,” it feels like magic, but often looks like a black box. What causes a product to take off, and then continue to pick up steam—to the point where millions of peop...
Avatar
Good point, that's another problem with the typical string version of UUIDs. I'd like base32 at least. Added to the wishlist!
Avatar
Avatar
It's remarkable how well low power devices perform but there's just no way for a 20W iPad to perform the way a 500W+ machine can. I'm always encouraging professionals to get workstations and just use mobile devices when on-the-go.
Avatar
Yeah xid is great but no random component and second-level precision is a deal-breaker for some use-cases...
Avatar
Picking identifiers... I suppose UUIDv7's 40 bit random component is almost always enough but I like ksuid's 128 "kill it with fire" approach. Seems like end game for UUIDs is time-ordered, millisecond precision Unix epoch timestamps, >128 bit random component, sortable string representation.
Avatar
UUIDv9 should be 256 bits (maybe)
Avatar
One of those Airbnb's that look much bigger/nicer in the photos. Was 8 of us sharing a bathroom and doubled up in rooms. Was actually a ton of fun but because we could stay up late in the living room debating and start again early the next morning. Everyone agreed that once was enough 😉
Avatar
How atproto’s current architecture was designed. (iPhone Photos surprising me with some nostalgia)
Avatar
It’s possible that the Bluesky team is the only to have ever successfully bonded in an escape room. It should’ve been lame but magically wasn’t 😆 #NoClues
Avatar
Yeah, you can go much further!
Avatar
That's good but I think they're persistent (they save cookies, etc) so not quite the same thing but maybe even better for many others.
Avatar
Arc has no Linux version but I've "used" it over @divy.zone's screen sharing and it seems pretty cool. Can you make a Profile "ephemeral" the way an Incognito is? Because the way all your cookies/etc disappear every time you close it is a big part of the benefit of this pattern.
Avatar
Not sure how many others do this, but I highly recommend: 1. One "trusted" browser instance for your signed-in apps (email, chat, work stuff, etc) 2. One "throwaway" browser instance in Private/Incognito mode for everything else (news, random sites, etc.) It's a big privacy/security improvement.
Avatar
Avatar
Avatar
Enjoying another day of (sufficiently) permission-less-ly adding services to the internet to do new things... The Internet truly is the existence proof for the greatness of open and decentralized networks.
Avatar
I've seen it enabled so that hosting companies can allow you to ssh to your instance with some default password. So they wouldn't know the IP range. But there's no good reason to do it like this anymore. They should ask the customer for a public SSH key and place it in the authorized_keys file.
Avatar
That is cool, hadn't seen it.