Brought to you by Michael and Brian - take a Talk Python course or get Brian's pytest book


Transcript #391: A weak episode

Return to episode page view on github
Recorded on Tuesday, Jul 9, 2024.

00:00 Hello and welcome to Python Bytes, where we deliver Python news and headlines directly to your earbuds.

00:05 This is episode 391, recorded July 9, 2024.

00:10 And I am Brian Ock.

00:11 And I am Michael Kennedy.

00:13 This episode is sponsored by Code Comments, an original podcast from Red Hat.

00:18 Listen to their segment later in the show.

00:20 You can connect with us on Mastodon, of course.

00:24 The links are in the show notes.

00:25 We're all on Fosstodon, but you can get to us from any Mastodon.

00:29 You can also join us if you're listening to it later.

00:33 You can join us live by going to pythonbytes.fm/live, be a part of the audience.

00:40 Or if you just want to see the show later, it's all there.

00:44 It's usually 10 a.m. Pacific time on Tuesdays, but sometimes it changes.

00:50 But if you go to that live thing, it'll tell you when the next one is.

00:53 And finally, I'd really like to thank a lot of the people that have subscribed to the mailing list, the newsletter.

01:00 If you go to our pythonbytes.fm, there's a newsletter link.

01:04 And we'll send you all of the links of the stuff we cover every week.

01:08 And we'll just send it to your inbox.

01:10 So even if you miss an episode, you won't miss any of the goodness.

01:13 So speaking of goodness, what do you got for us, Michael?

01:16 Well, you know how we all love PyPI and the ability to go and just pip install a thing and make it, make our apps be so much more.

01:27 Right.

01:27 Programming in Python becomes like Lego block clicking together, not algorithm class.

01:31 Yeah.

01:32 You know what I mean?

01:33 Which is amazing.

01:34 It's amazing.

01:34 However, there are issues that you run into if you use third party packages.

01:39 Not the least of which is you now probably should have a virtual environment.

01:43 You definitely require some pip install commands.

01:46 Just stuff all along those lines, right?

01:49 Just the management of setup before you can even run your app.

01:52 Plus then any potential changes.

01:55 If people don't pin their versions, then you're at the whims of what potentially can happen there.

02:00 So what some people do is something called vendoring or vendorizing dependencies.

02:06 So for example, if I depend on some functionality from requests, I don't know if that's a super good example, but let's say it is.

02:13 I could just download the source code of requests, stick it into my code and use it.

02:18 It's not probably not a great example because it itself has a bunch of dependencies, but stuff that's kind of like pure Python, no other dependencies.

02:24 You could have it as a third party package, or you could just stick the code of that somewhere to your app and refer to it as a relative import within your app.

02:32 Right.

02:33 Yeah.

02:33 Then people just pip install your package, pip x install your package, or even just get a script and run it or a set of scripts.

02:39 So there's this project from M Williamson called Python vendorize that I want to talk about.

02:47 So it'll vendorize packages from PyPI, as I just described, right?

02:52 So it allows you pure Python dependencies to be vendorized.

02:55 That is, it'll copy that into your project best use for small pure Python dependencies to avoid version conflicts with other packages, require different versions and so on.

03:05 So what you do is you set up a vendorize.toml file and in there, you basically set up, what is your module where, what sub section of your module do you want it to go into what sub module and then what.

03:20 PyPI packages you want.

03:21 So example here is like a hello package.

03:23 So they create a dunder, just not an underscore vendor folder.

03:28 And then they say the packages are six.

03:30 And once you run it, it'll create that underscore vendor folder and it'll put the six dist info, the dunder and nit pie, the six up high, all the stuff it needs to basically have that there.

03:42 So then in your app, you can say from dot underscore vendor import six rather than having an external dependency.

03:49 What do you think?

03:49 kind of neat.

03:51 How do you keep up?

03:52 Yeah, I've got questions.

03:54 Like how do you keep up with, updates and things like that?

03:57 Well, I believe that you just run a command line.

04:01 right.

04:02 Just run Python vendor eyes in the directory and I don't know if it'll read download it, but it will create it.

04:08 So, you know, worst case, delete the folder, run it again.

04:10 Yeah.

04:11 Yeah.

04:11 And then that'll update it.

04:12 So the whole point of this is like, you want less change than normal.

04:15 Yeah.

04:16 You want to like kind of freeze it in a place and things like six that don't really change.

04:20 I mean, or have gotten kicked out of the.

04:22 standard library.

04:23 Yeah, exactly.

04:24 Yeah, exactly.

04:25 A lot of stuff that's really super stable.

04:27 and pretty small, right?

04:29 You don't want to, because if, if you do something that's got a bunch of dependencies, you've then got to start doing their dependencies and then it gets really wonky.

04:36 Right?

04:36 Yeah.

04:37 Yeah.

04:37 For small things.

04:38 Yeah, actually.

04:39 it's pretty cool.

04:40 yeah.

04:41 Neat.

04:41 Neat.

04:41 Well, that's what I got for you.

04:43 The first one, I got a bunch of other stuff, as you can see.

04:45 No, I, I like it.

04:47 there's, there's projects that I've, open source that it really wasn't intended for somebody to actually use as a dependency.

04:54 It's like an exam, some example code that happens to be pip installable, but, but somebody would probably take it and just copy it and run from there and using something like vendorize would work.

05:06 Yeah, for sure.

05:07 Cool.

05:07 I would like to talk about something not as strong as this, but weaker.

05:13 some weak, so weak, so some weak references.

05:17 so this is a, article from Martin Heinz, a guide to Python's weak references using weak ref modules.

05:26 So weak ref is a, built in standard library module.

05:29 And, I actually have never played with it.

05:33 And I kind of knew that Python must have weak references, but I just didn't really explore it before now.

05:39 And this is a great introduction to just talk about what they are.

05:42 So if, I mean, we, the, the term weak reference might be new to somebody that's, that's like, I don't know, maybe new to you.

05:50 it's a, it's a term that we talk about in, in like C++ and other things a lot, because of the, using, and I use it a lot in C++, but, using strong references and weak references.

06:02 Python also has strong references and weak references.

06:05 A strong reference is just sort of a copy of something.

06:08 but a weak references is a way to point to something else, but not, not muck up the garbage collection.

06:14 So this is a great article.

06:16 It talks about, starts out with, talking about, sorry, starts out talking about garbage, dark garbage collection and how, how weak references are used with garbage, how garbage collection and weak references and strong references affect that.

06:32 So why do we care?

06:33 Well, it is used in things like log, the logging module for instance.

06:39 so you have named, this is a cool example cause you have, you have named, logging modules.

06:44 oh, where was it?

06:45 This is an example.

06:46 Anyway, some named modules that, you, you, you named a logging module or a named logger.

06:55 Sorry.

06:55 it's been a rough weekend.

06:57 And, and then like, if you want another one of the same name, it might be there.

07:02 It might not.

07:03 So it's a caching sort of thing that how logging uses it, but there's also ways to use it as a, like for trees.

07:09 If you're building a data structure, where you might want, bi-directional, links between objects.

07:16 one of the objects, it shouldn't be really hard links in both directions.

07:20 So one of those links should be, a weak reference, like the, the, the link between a parent and a child and a tree, structure would be good like that.

07:30 Or other things like he talks about, he talked about using an observer, building an observer pattern from the design pattern book, using weak references, just some really cool stuff.

07:42 I don't know.

07:42 I don't build a lot of data structures.

07:44 Like there's enough data structures in Python already.

07:46 But if, especially if you're in a, in a CS class or you have, some special needs for data structure, weak references are built in and they might help you a lot.

07:57 So.

07:58 Yeah.

07:58 And they're pretty interesting.

07:59 The only chance, only time I've really played with them is for the Python memory course that I created at talk Python to like understand.

08:05 Cause you want to look at stuff and see, we did this, it's alive.

08:08 We did this.

08:09 Now it's garbage collected or now it's reference count deleted.

08:12 but if you have a, a pointer to it, then obviously it's never going away.

08:17 So weak references allow you to ask questions like that.

08:20 Like, I think you can do interesting stuff with caching too.

08:22 For example, like if you've got a cache and you've handed out an instance of the object and it's still alive and people are still using it, the parts of the app are still using it.

08:31 You can have a weak reference to it.

08:33 And if someone else asks for you, like you can upgrade the weak reference to a strong reference, right.

08:37 And hand that out again without recreating it.

08:39 But if no one's using it, it'll get cleaned up because a weak reference won't keep it around.

08:43 So it's like sort of a self-managing cache type of structure could be fun to make too.

08:48 Yeah.

08:48 But that said, I was thinking just like you, I don't usually make data structures these days.

08:53 Python's pretty much got something for you.

08:55 Right.

08:55 But, you know, people are building, well, there's some third-party library data structures I use too.

09:01 And they probably use weak references.

09:02 And I just haven't poked into there to find out.

09:05 Yeah, exactly.

09:05 Let someone else do cool stuff with it for us.

09:08 But I love the idea of the, like the logging module that uses named items, doing something like a cache named item thing.

09:17 Yeah.

09:18 Very cool.

09:19 Do you know what else is cool?

09:20 Code comments from Red Hat.

09:22 Yeah.

09:23 This episode is brought to you by Code Comments, an original podcast from Red Hat.

09:27 You know, when you're working on a project and you leave behind a small comment in the code, maybe you're hoping to help others learn what isn't clear at first.

09:35 Sometimes that code comment tells a story of a challenging journey to the current state of the project.

09:41 Code Comments, the podcast, features technologists who've been through tough tech transitions and they share how their teams survived that journey.

09:49 The host, Jamie Parker, is a Red Hatter and an experienced engineer.

09:53 In each episode, Jamie recounts the stories of technologists from across the industry who've been on a journey implementing new technologies.

10:01 I recently listened to an episode about DevOps from the folks at Worldwide Technology.

10:06 The hardest challenge turned out to be getting buy-in on the new tech stack rather than using that tech stack directly.

10:12 It's a message that we can all relate to.

10:14 And I'm sure you can take some hard-won lessons back to your own team.

10:18 Give Code Comments a lesson.

10:20 Search for Code Comments in your podcast player or just use our link, pythonbytes.fm/code dash comments.

10:26 The link is in your podcast player's show notes.

10:28 Thank you to Code Comments for supporting the show.

10:30 This one is Make Time Speak from Preycin.

10:34 Preycin's been on the show before, a friend of the show and also a former co-guest, co-host.

10:40 And the idea is it's a little bit of a human-friendly way to refer to time.

10:46 You might know about things like, I think it's Arrow, that has a humanized thing that says, you know, five minutes from now or in ten minutes or just now.

10:56 Those kinds of things.

10:57 But the way this one works is it talks in sort of colloquial way of saying the time.

11:03 So you create a clock object and you give it a language to use, like English, German, Swahili, I think, all those things, Dutch.

11:14 And then you can ask it, you know, what is 11 colon 15?

11:19 It'll say quarter past 11 or a bunch of different times.

11:21 What is 729?

11:23 And well, it says that in Swahili, which I can't get that.

11:27 I'm not going to get that right.

11:28 But it'll convert time into spoken expressions in multiple languages.

11:31 Super easy to use.

11:33 Pure Python.

11:33 So you could vendorize it, I guess.

11:35 And so on.

11:37 Even as plugins.

11:37 So super easy to use if people want to check that out and play with it.

11:42 This is pretty fun.

11:43 Yeah.

11:43 I like it.

11:43 Very simple.

11:44 But if you've got a use case like that, you have a date time and you wanted to say it in a more human version, well, here you go.

11:51 All right.

11:52 Nice.

11:52 Yeah.

11:53 I am going to cover a topic that I get asked all the time.

11:57 So I talk about testing a lot and machine learning and AI is kind of a big thing now.

12:03 So I get questions like, how do I test machine learning projects?

12:07 And I got an answer.

12:09 I have no idea.

12:09 So I'm excited that somebody made an attempt at this.

12:12 Here is a article called How Should You Test Your Machine Learning Project?

12:17 The Beginner's Guide by Francois Porcher.

12:20 So and it's published in the Towards Data Science blog.

12:24 Anyway, kind of a cool intro.

12:27 talked about some of the simple stuff.

12:30 I mean, there is like, how do you test machine learning?

12:34 It's complex.

12:35 But there are there's a lot of pieces that are pretty straightforward to test.

12:39 So cool introduction.

12:41 Had a project.

12:42 This article also includes a repository that you can play with directly, which is nice.

12:48 You just follow along with the code.

12:50 So this is doing what is it doing?

12:53 It's essentials of testing with a machine learning pipeline focusing on on fine tuning BERT for text classification on an IMDB data set.

13:04 So that's just what he's using.

13:06 He's using pytest and pytest Cove, which are awesome things to start with.

13:11 And so it kind of goes through some of the easy stuff right away is starting with some of the simple things like has a clean text function.

13:22 So a function within within the source that takes a string and makes it all lowercase and strips it.

13:29 But it might do other things, too.

13:30 But these are these are great examples.

13:32 You've in a lot of machine learning stuff, you've got a lot of little helper functions along the way.

13:37 May as well go test those and it'll get in the habit of writing tests, too.

13:41 And this in this case is just giving giving some examples of of some some random text input and what the clean output should look like.

13:49 And these are your expectations of like if I pop pop this data into this function, what should the output look like?

13:54 So it's a great way to get started.

13:56 I personally would have put this in a parameterized, but I guess we're trying to teach people slowly.

14:00 These are really three test cases.

14:03 They could be three test functions, but it works.

14:07 And so I'm referring to a test function that does a test for capital letter stripping and removing extra spaces.

14:16 And what how how it should handle the empty string.

14:20 And this is actually a good point.

14:22 One of the things they test with interviews a lot is the edge cases for testing.

14:27 So like with what test examples are like derivative small cases that you wouldn't possibly think about.

14:36 And it's important to test those, too.

14:37 Like what is it?

14:38 What is an empty string get cleaned as or good?

14:41 A good thing.

14:41 Like if I already had the word spaces in lowercase, how would that end up showing up in the output?

14:48 Things like that.

14:48 So good start.

14:50 And then jumps up to higher level things.

14:53 He talks about a larger chunk of the script.

14:57 So he's got a tokenized text, tokenized text function that uses a lot of sub pieces, uses the tokenizer with certain input.

15:06 And how you test that?

15:08 Well, this is a great example of just figuring out really some examples, some example input and what how you would expect it to be tokenized on the output.

15:18 Looking at the length and the shape of the result.

15:22 And then, you know, making sure that that not all values or I don't know what this would be.

15:28 Oh, he's making sure that all values are torched by torched tensors.

15:33 I don't even really know what that means.

15:34 But, you know, thinking about what the output should be.

15:38 If even if you don't know the specifics, you can have some way to describe how it should sort of look.

15:43 And these are good enough tests or they possibly are good tests to have anyway.

15:49 So I think this is a good, good starting point to to start a discussion on your team for how to how to add testing to a machine learning project.

15:59 Yeah, it's interesting.

16:00 I really would have no idea how to test machine learning.

16:02 It seems like black box type stuff.

16:04 So, yeah, this is a lot more to work with than I would have come up with, I think.

16:08 Yeah, just getting started, taking a chunk out of it and then where to go from there.

16:12 So after you kind of have a sense of some of the easy stuff, some of the middle level stuff of testing examples and shapes and whatnot.

16:19 What's left?

16:21 Well, that's where a quick introduction to how code coverage works and looking at what other what what the rest of your code is doing and that maybe you want to add tests to.

16:32 Or maybe those are the things that you manually test or something.

16:36 So anyway.

16:37 Yeah.

16:38 Excellent.

16:38 Sounds good.

16:39 Well, those are our items.

16:41 Do you have any extras for us this week?

16:43 I am out of extras.

16:45 Clean out.

16:46 Well, I'll tell where I'll make up for it for you.

16:47 Okay.

16:48 So wonderful news from Authy.

16:51 You know, Authy, the 2FA password thing that you can get for multi-factor authentication.

16:58 Super nice because, you know, so many of the devices are locked to or some of the apps are locked to one platform like Google, a Google authenticator.

17:07 You lose your phone or you have to reformat it or something.

17:10 Sorry.

17:10 Sorry.

17:10 Good luck.

17:11 Now.

17:11 You know, there's no sinking things like that.

17:14 But with Authy, you have an account.

17:16 It syncs it across your different devices.

17:19 One device can authenticate another.

17:21 If you want to add a new one.

17:22 It's really nice except now Authy is urging users to stay alert after 33 million phone numbers were leaked.

17:32 How?

17:33 Well, there's an authenticated API endpoint, but apparently it would return an error that would indicate whether the phone number that you passed in to try to authenticate with was valid or invalid.

17:47 Like, sorry, that phone number doesn't exist or sorry, wrong password.

17:50 Something like that.

17:51 I think is the deal.

17:52 Okay.

17:52 And so somebody just hammered it with, you know, every phone number combination they could think of and recorded the results when it said that phone number exists.

18:01 And we know that Authy has it.

18:03 And then we know that you have 2FA and all of these things.

18:06 And so from what I could tell, no real information about people was stolen.

18:10 But given that they know you have 2FA and they know that you have, that this is your phone number, they can start sending you all sorts of spoof things, social engineering type things.

18:21 Right.

18:22 Yeah.

18:22 Yeah.

18:22 Yeah.

18:22 Well, and Authy recently canceled their desktop apps.

18:26 You know, Authy being a Twilio, the parent company, canceled their desktop apps.

18:31 It just seems like it's really in a kind of a state of disrepair and lack of love and a lack of confidence in Michael at this point.

18:38 So I went through the super fun experience of resetting about 30 different 2FA logins.

18:44 And boy, oh boy.

18:46 I learned some things, Brian.

18:48 I've learned that some companies make it super easy to reset.

18:52 Because my thought was, look, if this is, you know, what else potentially has happened?

18:56 I'm going to revoke all of my 2FA logins and set new secret keys that will generate new passwords.

19:03 So even if they were able to get a hold of everything in my account, that stuff doesn't work anymore effectively.

19:08 Right.

19:09 That was my plan.

19:10 And it took like six hours or something, five hours.

19:13 You go to different places and you'll see some of them will let you, some have an awesome button.

19:19 Reset 2FA here's a QR code you scan.

19:21 Boom.

19:21 You're good to go.

19:22 Others say, your Google authenticators is enabled.

19:27 Like what?

19:28 I don't have a Google authenticator.

19:30 There's like 50 apps that are 2FA apps, T-Mobile and like 10 of the other ones say, use your Google authenticator here.

19:38 Like, no, it is not.

19:39 It's like, use your internet explorer six here.

19:43 Like, no, there are other browsers.

19:44 Please don't just say use your Google authenticator.

19:48 Right.

19:48 But you could just go, yep, this is my Google authenticator.

19:51 It's called something else and it doesn't come from Google, but sure enough, I'm going to set this up.

19:55 Right.

19:55 And like Christopher out in the, in the audience here, that is my next recommendation is well, if not Authy, what?

20:04 Because Google authenticators garbage.

20:06 Like I said, you, if you, your phone gets messed up, you've lost all logins forever.

20:11 There's not a sink.

20:11 At least last time I use it, there's no way to sink it or export it or any of that stuff.

20:15 Right.

20:15 That's bad news.

20:16 So Bitwarden.

20:18 Bitwarden is awesome.

20:19 This is a premium feature.

20:20 So you have to have the premium version of Bitwarden, which is $10 a year or 80 cents a month or something.

20:26 I'm like, yeah, fine.

20:27 That's, that seems fair.

20:28 But Bitwarden is cool.

20:29 It's open source, multi-platform.

20:30 you just scan, scan stuff or enter the code and that they give you for the 2FA and off it goes.

20:37 And because it has a browser plugin, you can just click on your name when it says type in your 2FA code.

20:43 You don't have to go pull it up.

20:43 You just click the button and boom, it auto fills it, which is great.

20:46 I don't put it in my one password because I'm just not ready to say my 2FA logins and my passwords are all stored behind one single platform.

20:54 Because then your 2FA is kind of toast if somebody breaks into that.

20:58 So Bitwarden for 2FA, one password for logins for me at the moment.

21:02 What do you think?

21:03 Well, I'm using, maybe I shouldn't tell people, but yeah, I'm using Authy.

21:07 So are they, they're still supporting it on like, aren't they?

21:11 they're not supporting it on, they used to have a desktop app.

21:16 They don't have that anymore.

21:17 They have a iPad and an iOS and Android app.

21:20 Since you have an Apple Silicon one, you can run the iPad version on your Mac, just like a desktop app.

21:29 So it's kind of feels the same, except for it doesn't have like, like the keyboards behave weirdly and stuff.

21:33 Right.

21:34 Cause it doesn't expect you to have a keyboard.

21:35 Maybe you're using it a lot more than I am, but it doesn't bother me to run, run it on my phone.

21:40 But yeah.

21:42 Well, I mean, it doesn't bother me either, but I've got, there's like a bunch of different apps that I have.

21:47 For example, the credit card front end system for talk Python courses.

21:52 It has a remember me button.

21:53 It never remembers me.

21:55 Never.

21:56 It has a 2FA.

21:58 It never remembers the 2FA.

21:59 So even if I say, remember me 20 minutes later, I'm putting in the password and the 2FA.

22:04 And then 20 minutes later, I'm putting the password in the job.

22:06 I'm like, ah, so there's like a few places like that.

22:09 They're just constantly asked for the 2FA.

22:12 digital issues a little bit like that.

22:13 Like if, you, every single time you're putting in the 2FA, there's not like a trust this device sort of thing.

22:19 And so I ended up, I'm probably in used to be in offing now in bit warden.

22:23 I'm probably not like five times a day, at least every day.

22:26 So anyway, so one final thing before I move off of this, after all of this, they said, I don't know how this helps.

22:32 It doesn't seem like it should help, but somehow they said, as part of our recommendation to users, it's very important that you upgrade to the latest version of Authy.

22:41 Why that because the endpoint hands, I don't understand, but, anyway, it says you must.

22:47 And then if you go and look at the upgrade, all that says for the, it says you must get version 26.1.0.

22:52 What does it say here?

22:53 Bug fixes, not, this is an important security update and you need to update because we're trying to protect your privacy.

23:00 They're hiding behind bug fixes and it's disgraceful, right?

23:03 This is bad.

23:03 So all these things taken together, I'm like, you know what?

23:06 It may be safe.

23:07 It may be not, but I'm out.

23:09 Like this is not where my, my important things live.

23:12 So.

23:12 Okay.

23:12 Yeah.

23:13 And OFAC also out there says, Hey, if you're okay with recommending paid services, which I am one password is what I migrated away to from Authy.

23:20 Yeah.

23:20 One password is awesome.

23:21 But like I said, I have my logins at one password.

23:24 So I put my two FA and bit word.

23:25 All right.

23:26 Woo.

23:26 That was a long extra.

23:27 That should just been a thing, right?

23:28 Extra.

23:29 Remember a while ago, I did this article unsolicited advice for Mozilla and Firefox, like your AI, your, your good citizen AI project.

23:38 Probably won't save Mozilla.

23:40 It probably needs more than that.

23:41 And it won't really probably help Firefox either.

23:43 So let's do some things that help them because I'm in principle, a fan of them.

23:47 Well, I said, one of the things that my main recommendation was like a privacy focused Google docs.

23:52 Well, they didn't do it, but, proton, the Proton Mail people just came up with a, like a Google docs equivalent, but with end to end encryption.

24:00 And no AI training and no AI training and, you know, all the kinds of things you would like about your data without the negatives.

24:07 So if you have proton, there's, there's now collaborative docs with it, which is kind of cool.

24:12 And it looks pretty, I think it looks pretty nice.

24:14 So just want to give that a shout out.

24:15 Does it, do you know if, I probably don't want to ask, does our Google docs open to scanning for AI?

24:23 Do you know, I believe that the, the freeware versions are the free versions, but the business ones, maybe not, you know, I think your business workspace stuff is not open to that, but like your, your personal Gmail is open to like scanning for ads and stuff.

24:39 Whereas the business one is that's, so that's the price you pay.

24:43 Last thing, is the code in a castle thing I'm doing in October 5th.

24:47 The early bird discount closes tomorrow.

24:50 If you listen to this, right.

24:52 When it comes out, so if you're interested, please check it out.

24:54 it'd be super awesome to spend a week hanging out in Tuscany, doing all sorts of things together.

24:59 And yeah, that's, that's, it's for my extras, Brian.

25:01 That's a lot of extras, Tony.

25:03 I mean, Michael.

25:04 Yeah.

25:05 All right.

25:07 All right.

25:07 Shall we have a joke?

25:08 Yeah.

25:09 This joke I called, I lied.

25:11 And it's a, it's like a cartoon.

25:14 It's a woman behind a esoteric programming sort of thing.

25:18 She's got a gun.

25:19 It says, I lied.

25:20 I don't have Netflix, take off your shoes.

25:22 We're going to learn rust.

25:23 And I just thought about like this, all this like rust energy.

25:27 Like we're converting that to the rest.

25:29 We're rewriting that in rust.

25:30 It's just like, you're doing rust.

25:32 That's what the world's doing.

25:33 Sit down.

25:34 So she invited someone over to like watch Netflix.

25:37 Like I lied.

25:38 I don't know Netflix.

25:38 Take off your shoes.

25:39 We're going to learn rust.

25:41 I thought it would catch the zeitgeist.

25:43 Well, right.

25:44 It's bizarre, man.

25:45 It's amazing.

25:47 Okay.

25:49 And I'll, I'll, I'll maybe I'll put that is the, the chapter art for this one.

25:53 Cause the picture, the eyes are amazing.

25:55 The desperation.

25:56 That's pretty good.

25:57 Yeah.

25:58 Yeah.

25:58 Yeah.

25:58 Yeah.

25:58 Yeah.

25:59 Yeah.

25:59 Yeah.

25:59 I've resisted.

26:01 I've resisted rust so far.

26:02 I mean, I'm, I'm, I'm happy that things are getting faster and whatnot, but I haven't

26:07 learned it yet.

26:08 We'll see.

26:08 Same.

26:09 All right.

26:10 Well, cool.

26:11 Nice episode.

26:11 Thanks for joining today.

26:13 You bet.

26:14 Fun as always.

Back to show page