Avishai Ish-Shalom (@nukemberg) 's Twitter Profile
Avishai Ish-Shalom

@nukemberg

reality: the show where everything's made up and the points don't matter.
sw eng, complex systems and math. Hard truths, no sugarcoating.

ID: 893214032

linkhttps://blog.nukemberg.com calendar_today20-10-2012 13:07:55

9,9K Tweet

1,1K Followers

220 Following

Joscha Bach (@plinz) 's Twitter Profile Photo

A lot of what people mistake for โ€œkindnessโ€ is actually just self serving cowardice avoiding to speak a necessary truth. (The opposite exists as well: malice, vindictiveness, envy and meanness masquerading as honesty.)

Avishai Ish-Shalom (@nukemberg) 's Twitter Profile Photo

World press describing Ismail Haniyeh as "pragmatic" and "moderate" is practically a parody. The man headed one of the most extreme terrorist organizations in the world. He was moderate in the same way Gรถring was a moderate Nazi. Srsly, go watch a video of him speaking

Avishai Ish-Shalom (@nukemberg) 's Twitter Profile Photo

Classic United Nations blame game. "Urging" everyone else to do something. Fun fact, the UN has a peacekeeping force already deployed in south Lebanon. We wouldn't be having this conversation if it did its job. Or anything at all TBH

Avishai Ish-Shalom (@nukemberg) 's Twitter Profile Photo

ืชื–ื›ื•ืจืช ืฉื”ื’ื•ืฃ ืฉืงื•ืจื ืœืขืฆืžื• "ืžืžืฉืœืช ื™ืฉืจืืœ" ื•ื”ื’ื•ืคื™ื ื”ืžืกื•ื ืคื™ื ืืœื™ื• ืฉืงื•ืจืื™ื ืœืขืฆืžื "ืžืฉืจื“ื™ ืžืžืฉืœื”" ื”ื ืืจื’ื•ื ื™ื ื˜ืคื™ืœื™ื ืฉื‘ืขื™ืงืจ ืžืคืจื™ืขื™ื ืœืื–ืจื—ื™ ื™ืฉืจืืœ

ืขื™ื“ืŸ ืืœืชืจืžืŸ | edan alterman (@alterman) 's Twitter Profile Photo

ื ืจืื” ืœื™ ืฉื”ืžืขืจื›ื•ืŸ ื”ื–ื” ืฉืฆื•ืœื ืœืคื ื™ ื›- 25 ืฉื ื” ืชืžื™ื“ ื™ื”ื™ื” ืืงื˜ื•ืืœื™ ื‘ื”ืชืื ืœืžืฆื™ืื•ืช ืฉืœื ื• ืคื”. ื•ื‘ื™ืžื™ื ืืœื• ื™ื•ืชืจ ืžืชืžื™ื“.

Omer van Kloeten ๐ŸŽ—๏ธ (@omervk) 's Twitter Profile Photo

ืคืชื—ื ื• ื‘ืคื•ืจื˜ืจ ืžื—ื–ื•ืจ ืื ืœื™ืกื˜ื™ื ื—ื“ืฉ ืœื ื•ื‘ืžื‘ืจ. ื‘ืžื™ื•ื—ื“ ื‘ื™ืžื™ื ืฉื‘ื”ื ืงืฉื” ืœื”ื›ื ืก ืœืชืขืฉื™ื”, ื–ื• *ืื—ืœื” ื“ืจืš ืœื”ื›ื ืก ืœื”ื™ื™ื˜ืง* - ืœื™ืžื•ื“ื™ื ืžื”ื”ืชื—ืœื”, ื’ื ืื ื™ืฉ ืืคืก ื ืกื™ื•ืŸ. ืงืฆืช ืœืงืจื•ื ืขืœ ื”ืชืคืงื™ื“: grnh.se/9d900ac22us ื•ืœืžื™ ืฉื™ืฉ ื›ืŸ ืื™ื–ื” ืฉื ืชื™ื™ื ื•ืžืขืœื” ื ืกื™ื•ืŸ ื‘ืชื—ื•ื: grnh.se/27842a5a2us

Eric S. Raymond (@esrtweet) 's Twitter Profile Photo

I shipped an essay yesterday about how relatively smart people are oblivious about what life on the low end of the IQ distribution is like. It mentioned UBI because what stimulated me to write it was somebody else's thread about a recent study of UBI. I should have expected what

dax (@thdxr) 's Twitter Profile Photo

a lot of debates on here seem to ignore the existence of 1. async work 2. batchable work 3. parallelizable work 4. resource contention are there really that many engineers who work just on synchronous api endpoints and nothing else

Aviran Mordo (@aviranm) 's Twitter Profile Photo

ืชื•ื›ื ื™ืช ื”ื’'ื•ื ื™ื•ืจื™ื ืฉืœ ื•ื•ื™ืงืก ื—ื•ื–ืจืช! ืชื•ื›ื ื™ืช Kickstart ืฉืœ ื•ื•ื™ืงืก ื”ื™ื ื”ื–ื“ืžื ื•ืช ืžื“ื”ื™ืžื” ืœื”ืฉืชืœื‘ ื‘ื”ื™ื™ื˜ืง ื•ืœืจื›ื•ืฉ ื™ื“ืข ื™ืงืจ ืขืจืš. (ื”ื›ืฉืจื” ื‘ืฉื›ืจ ืžืœื) ื‘ืกื™ื•ื ื”ืชื•ื›ื ื™ืช - ื‘ื•ื’ืจื•ืช ื•ื‘ื•ื’ืจื™ ื”ืชื•ื›ื ื™ืช ื™ืชื—ื™ืœื• ืœืขื‘ื•ื“ ื‘ืฆื•ื•ืชื™ ื”ืคื™ืชื•ื— ืฉืœ ื•ื•ื™ืงืก ื”ืจื™ืฉื•ื ื™ื™ืคืชื— ื‘20.8 ืœ-48 ืฉืขื•ืช ื‘ืœื‘ื“! wixkickstart.com

ืชื•ื›ื ื™ืช ื”ื’'ื•ื ื™ื•ืจื™ื ืฉืœ ื•ื•ื™ืงืก ื—ื•ื–ืจืช!

ืชื•ื›ื ื™ืช Kickstart ืฉืœ ื•ื•ื™ืงืก ื”ื™ื ื”ื–ื“ืžื ื•ืช ืžื“ื”ื™ืžื” ืœื”ืฉืชืœื‘ ื‘ื”ื™ื™ื˜ืง ื•ืœืจื›ื•ืฉ ื™ื“ืข ื™ืงืจ ืขืจืš. (ื”ื›ืฉืจื” ื‘ืฉื›ืจ ืžืœื)

ื‘ืกื™ื•ื ื”ืชื•ื›ื ื™ืช - ื‘ื•ื’ืจื•ืช ื•ื‘ื•ื’ืจื™ ื”ืชื•ื›ื ื™ืช ื™ืชื—ื™ืœื• ืœืขื‘ื•ื“ ื‘ืฆื•ื•ืชื™ ื”ืคื™ืชื•ื— ืฉืœ ื•ื•ื™ืงืก
ื”ืจื™ืฉื•ื ื™ื™ืคืชื— ื‘20.8 ืœ-48 ืฉืขื•ืช ื‘ืœื‘ื“!

wixkickstart.com
The Persian Jewess (@persianjewess) 's Twitter Profile Photo

Catherine Perez-Shakdam (Catherine Perez-Shakdam) a Jewish mom of two from Paris, CONCEALED her identity and spent TEN YEARS infiltrating the Islamic Regime, gaining unprecedented access to the IRIโ€™s ruling class including Ayatollah Khamenei, President Raisi, and General Soleimani. During

Catherine Perez-Shakdam (<a href="/ShakdamC/">Catherine Perez-Shakdam</a>) a Jewish mom of two from Paris, CONCEALED her identity and spent TEN YEARS infiltrating the Islamic Regime, gaining unprecedented access to the IRIโ€™s ruling class including Ayatollah Khamenei, President Raisi, and General Soleimani.

During
Stanza (@stanzasystems) 's Twitter Profile Photo

Weโ€™re pleased to announce the BETA launch of Stanza's Interactive Outage Simulator, a training and modeling tool that SRE's are going to get a kick out of! outage-sim.dev.getstanza.dev Visit our LinkedIn to learn more details and instructions: linkedin.com/feed/update/urโ€ฆ

Weโ€™re pleased to announce the BETA launch of Stanza's Interactive Outage Simulator, a training and modeling tool that SRE's are going to get a kick out of!

outage-sim.dev.getstanza.dev

Visit our LinkedIn to learn more details and instructions: linkedin.com/feed/update/urโ€ฆ
Drew Pavlou ๐Ÿ‡ฆ๐Ÿ‡บ๐Ÿ‡บ๐Ÿ‡ธ๐Ÿ‡บ๐Ÿ‡ฆ๐Ÿ‡น๐Ÿ‡ผ (@drewpavlou) 's Twitter Profile Photo

Hezbollah supporters in the West: โ€œEvery person targeted today was a puppy, doctor or orphaned child. Sometimes all three.โ€ Actual Hezbollah guys: โ€œStop posting videos you donkeys, you are exposing our fighterโ€™s identitiesโ€

Hezbollah supporters in the West: โ€œEvery person targeted today was a puppy, doctor or orphaned child. Sometimes all three.โ€

Actual Hezbollah guys: โ€œStop posting videos you donkeys, you are exposing our fighterโ€™s identitiesโ€
Avishai Ish-Shalom (@nukemberg) 's Twitter Profile Photo

Huh. Just like any American hardware and software should be treated as a potential supply chain attack by the NSA? I seem to recall something about that... maybe Edward Snowden can refresh your memory?

Avishai Ish-Shalom (@nukemberg) 's Twitter Profile Photo

Ppl seem to forget that Hezbollah could be easily targeted because being a *designated terrorist organization* it cannot legitimately purchase equipment from bonafide western companies. Legitimate companies should have a very different threat model.