<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Poojan (Wagh) Blog</title>
	<atom:link href="https://poojanblog.com/blog/feed/" rel="self" type="application/rss+xml" />
	<link>https://poojanblog.com/blog</link>
	<description>Requests for comment</description>
	<lastBuildDate>Tue, 05 Apr 2022 01:39:40 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
<site xmlns="com-wordpress:feed-additions:1">12440710</site>	<item>
		<title>Fixing OneDrive annoyance with Rstudio on Windows</title>
		<link>https://poojanblog.com/blog/2022/04/fixing-onedrive-annoyance-with-rstudio-on-windows/</link>
		
		<dc:creator><![CDATA[Poojan Wagh]]></dc:creator>
		<pubDate>Tue, 05 Apr 2022 01:37:45 +0000</pubDate>
				<category><![CDATA[Data Science]]></category>
		<category><![CDATA[MBA]]></category>
		<guid isPermaLink="false">https://poojanblog.com/blog/?p=1049</guid>

					<description><![CDATA[By default, Rstudio on Windows with OneDrive installed stores packages in the OneDrive documents folder. This package location causes a lot of issues: It causes a lot of upload to OneDrive It can cause conflicts between machines (since they will be storing to the same OneDrive folder) It can cause unnecessary delays in having to [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>By default, Rstudio on Windows with OneDrive installed stores packages in the OneDrive documents folder. This package location causes a lot of issues:</p>



<ol class="wp-block-list"><li>It causes a lot of upload to OneDrive</li><li>It can cause conflicts between machines (since they will be storing to the same OneDrive folder)</li><li>It can cause unnecessary delays in having to download files from OneDrive (if they are not locally cached)</li></ol>



<p>All in all, this location seems to be a poor side-effect of making OneDrive the default storage location on Windows. It can be easily rectified. Simply create a file called .Renvironment in &#8220;C:\Users\&lt;username>\OneDrive\Documents&#8221; (AKA your OneDrive documents folder) with the following line:</p>



<pre class="wp-block-preformatted">R_USER="C:/User/&lt;username>"</pre>



<p>This one line redefines the user-specific directory to be on the local disk, in C:\Users\&lt;username>. This is the exact same place as the %USERPROFILE% environment variable on Windows. The site-wide .Rprofile will make use of this variable and create an package path using it as a base.</p>



<p>These mechanisms <a href="https://support.rstudio.com/hc/en-us/articles/360047157094-Managing-R-with-Rprofile-Renviron-Rprofile-site-Renviron-site-rsession-conf-and-repos-conf" data-type="URL" data-id="https://support.rstudio.com/hc/en-us/articles/360047157094-Managing-R-with-Rprofile-Renviron-Rprofile-site-Renviron-site-rsession-conf-and-repos-conf">are explained here</a>, and it is simpler than <a href="https://medium.com/@ValidScience/how-to-fix-rstudios-package-installation-on-windows-10-c1e602bf3a1f" data-type="URL" data-id="https://medium.com/@ValidScience/how-to-fix-rstudios-package-installation-on-windows-10-c1e602bf3a1f">editing the site-wide .Rprofile as described here (and many other places)</a>, which would require you to repeat the procedure on new installations (and also requires modifying files in the base installation path).</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1049</post-id>	</item>
		<item>
		<title>Causation, Correlation, and Instrumentation</title>
		<link>https://poojanblog.com/blog/2021/05/causation-correlation-and-instrumentation/</link>
		
		<dc:creator><![CDATA[PoojanWagh]]></dc:creator>
		<pubDate>Wed, 26 May 2021 08:27:32 +0000</pubDate>
				<category><![CDATA[MBA]]></category>
		<category><![CDATA[instrumentation]]></category>
		<category><![CDATA[regression]]></category>
		<category><![CDATA[statistics]]></category>
		<guid isPermaLink="false">https://poojanblog.com/blog/?p=1020</guid>

					<description><![CDATA[One confounding problem in statistics (and life) is distinguishing causation and correlation. Let&#8217;s say we can observe two things simultaneously: X and Y. We collect many such observations. We notice that X and Y always move together. When X goes up, Y goes up (and vice versa). When Y goes down, X goes down (and [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>One confounding problem in statistics (and life) is distinguishing causation and correlation. Let&#8217;s say we can observe two things simultaneously: X and Y. We collect many such observations. We notice that X and Y always move together. When X goes up, Y goes up (and vice versa). When Y goes down, X goes down (and vice versa). We would like to say that X causes Y. That is, we would like to draw a graph as follows, where the arrow indicate the direction of impact: X causes Y.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img decoding="async" width="397" height="60" src="https://poojanblog.com/blog/wp-content/uploads/2021/05/PoojanBlog-Model-for-Random-Causality.png" alt="" class="wp-image-1021" srcset="https://poojanblog.com/blog/wp-content/uploads/2021/05/PoojanBlog-Model-for-Random-Causality.png 397w, https://poojanblog.com/blog/wp-content/uploads/2021/05/PoojanBlog-Model-for-Random-Causality-300x45.png 300w" sizes="(max-width: 397px) 100vw, 397px" /></figure></div>



<p>However, we can&#8217;t make that statement (at least not based on these observations) for a few different reasons.</p>



<h2 class="wp-block-heading">Reverse Causation</h2>



<p>The first is that we only know X and Y move together. It could be that Y in fact causes X. An example would be an alien observing human behavior. The alien notices that days that humans have umbrellas tend to be rainy days. The alien concludes that umbrellas cause rain. Instead of the model of X causing Y, our model is that Y causes X:</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img decoding="async" width="397" height="60" src="https://poojanblog.com/blog/wp-content/uploads/2021/05/PoojanBlog-Model-for-Random-Noncausality-Reverse.png" alt="" class="wp-image-1022" srcset="https://poojanblog.com/blog/wp-content/uploads/2021/05/PoojanBlog-Model-for-Random-Noncausality-Reverse.png 397w, https://poojanblog.com/blog/wp-content/uploads/2021/05/PoojanBlog-Model-for-Random-Noncausality-Reverse-300x45.png 300w" sizes="(max-width: 397px) 100vw, 397px" /></figure></div>



<p>Fundamentally, the problem here is Y and X are just things we can observe. We don&#8217;t really know which is Y and which is X. <a href="https://www.psychologytoday.com/us/blog/digital-world-real-world/202002/anxiety-and-social-media-use">Does social media cause anxiety/depression, or are depressed/anxious people more likely to go on social media?</a></p>



<h2 class="wp-block-heading">Hidden Variable</h2>



<p>It could also be the case that X and Y both depend on another variable V that we can&#8217;t see. Here is an example:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>Do churches cause murder? In the 1980s several studies used census data to show that the more churches a city has, the more murders occur in the city each year. With tongue in cheek, the authors claimed to have proved that the presence of churches increases the prevalence of murders. While the data were correct, the conclusion was obviously nonsense. What is the hidden variable here? Larger cities tend to have more of everything, including both churches and murders, so the hidden variable is population size.</p><cite><a href="https://www.stewartmath.com/precalc_7e_dp/precalc_7e_dp6.html">Stuart Math &#8211; Discovery Project: Causation and Correlation</a></cite></blockquote>



<p>We have the model below:</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img decoding="async" width="397" height="65" src="https://poojanblog.com/blog/wp-content/uploads/2021/05/PoojanBlog-Model-for-Random-Noncausality-Correlation.png" alt="" class="wp-image-1023" srcset="https://poojanblog.com/blog/wp-content/uploads/2021/05/PoojanBlog-Model-for-Random-Noncausality-Correlation.png 397w, https://poojanblog.com/blog/wp-content/uploads/2021/05/PoojanBlog-Model-for-Random-Noncausality-Correlation-300x49.png 300w" sizes="(max-width: 397px) 100vw, 397px" /></figure></div>



<p>In this case, X does not cause Y. And Y does not cause X. V causes both of them. What&#8217;s worse, we can never be sure that one or more such variables exist. </p>



<h2 class="wp-block-heading">Overall Confounding Model</h2>



<p>Putting it all together, we get a model where we can only observe X &amp; Y. X can cause Y and/or Y can cause X (possibly simultaneously). In addition, both X and Y could depend on another variable which we cannot see.</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="397" height="155" src="https://poojanblog.com/blog/wp-content/uploads/2021/05/PoojanBlog-Model-for-Random-Noncausality.png" alt="" class="wp-image-1028" srcset="https://poojanblog.com/blog/wp-content/uploads/2021/05/PoojanBlog-Model-for-Random-Noncausality.png 397w, https://poojanblog.com/blog/wp-content/uploads/2021/05/PoojanBlog-Model-for-Random-Noncausality-300x117.png 300w" sizes="auto, (max-width: 397px) 100vw, 397px" /></figure></div>



<p>To make things clear, I split out X into two terms: Xc (which does cause Y) and Xu (which is caused by Y). We do not have access to Xu and Xc: they both contribute to X (which we can observe). (In fact, they really don&#8217;t exist: they are just a convenient way of splitting X up into two contributors.)</p>



<p>By definition, the hidden variable V is a root cause: it does not depend on anything else,</p>



<p> but both observations (X &amp; Y) depend on it.</p>



<p>What we are after is the term Bc: that tells us what portion of Y depends on X.</p>



<h2 class="wp-block-heading">Instrumentation</h2>



<p>To do so, we are basically going to cheat: we are going to try to find another variable Z which we can observe. </p>



<p>This variable needs to be unrelated to Y. That is, there can be no direct relationship between Y and Z. Other than through X (Xc in this model), Y and Z cannot have any dependencies on each other. In fact, we cannot just judge this by looking at statistics. We need a non-statistical reason for this to be the case.</p>



<p>Our model now looks as follows:</p>



<div class="wp-block-image"><figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="397" height="237" src="https://poojanblog.com/blog/wp-content/uploads/2021/05/PoojanBlog-Model-for-Random-Noncausality-Instrumentation.png" alt="" class="wp-image-1038" srcset="https://poojanblog.com/blog/wp-content/uploads/2021/05/PoojanBlog-Model-for-Random-Noncausality-Instrumentation.png 397w, https://poojanblog.com/blog/wp-content/uploads/2021/05/PoojanBlog-Model-for-Random-Noncausality-Instrumentation-300x179.png 300w" sizes="auto, (max-width: 397px) 100vw, 397px" /></figure></div>



<p>The key here is that we have found a miracle variable Z. We know (through some other argument) that Y does not depend on Z.</p>



<p>What if (hypothetically) V depends on Z? Well, it can&#8217;t. By definition, a hidden variable cannot depend on another observable variable in the system.</p>



<p>By correlating/regressing X to Z, we can get Bz. Then, by correlating Y to X (or really an estimate of X synthesized from Z), we can get Bc.</p>



<h2 class="wp-block-heading">Motivation</h2>



<p>I really wanted to just draw the diagrams of all these different effects without introducing math. I came across all these ideas in a statistics class last week, and I could not keep an understanding in my mind without a picture.  Once I had the pictures, I felt the concepts were much easier to understand.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1020</post-id>	</item>
		<item>
		<title>Asking the Wrong Questions</title>
		<link>https://poojanblog.com/blog/2020/12/asking-the-wrong-questions/</link>
		
		<dc:creator><![CDATA[PoojanWagh]]></dc:creator>
		<pubDate>Tue, 08 Dec 2020 05:32:46 +0000</pubDate>
				<category><![CDATA[Behavior]]></category>
		<category><![CDATA[framing]]></category>
		<category><![CDATA[happiness]]></category>
		<category><![CDATA[personal development]]></category>
		<guid isPermaLink="false">https://poojanblog.com/blog/?p=1013</guid>

					<description><![CDATA[One question I like to answer myself essentially poses itself is the personal investment question: if I had some extra time, money, wishes, etc. Would I put them into making the best hours of my week better? Or would I put them into making the worst hours of my week better? For example, should I [&#8230;]]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="683" src="https://poojanblog.com/blog/wp-content/uploads/2020/12/brown_rock_formation_on_body_of_water-scopio-aa77181c-068b-49dc-bf72-8fca2bae1637-1024x683.jpg" alt="" class="wp-image-1014" srcset="https://poojanblog.com/blog/wp-content/uploads/2020/12/brown_rock_formation_on_body_of_water-scopio-aa77181c-068b-49dc-bf72-8fca2bae1637-1024x683.jpg 1024w, https://poojanblog.com/blog/wp-content/uploads/2020/12/brown_rock_formation_on_body_of_water-scopio-aa77181c-068b-49dc-bf72-8fca2bae1637-300x200.jpg 300w, https://poojanblog.com/blog/wp-content/uploads/2020/12/brown_rock_formation_on_body_of_water-scopio-aa77181c-068b-49dc-bf72-8fca2bae1637-768x512.jpg 768w, https://poojanblog.com/blog/wp-content/uploads/2020/12/brown_rock_formation_on_body_of_water-scopio-aa77181c-068b-49dc-bf72-8fca2bae1637-1536x1024.jpg 1536w, https://poojanblog.com/blog/wp-content/uploads/2020/12/brown_rock_formation_on_body_of_water-scopio-aa77181c-068b-49dc-bf72-8fca2bae1637-2048x1365.jpg 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption>Photo by   <a href="https://scop.io/collections/vendors?q=I%C3%B1aki+Bolumburu">Iñaki Bolumburu</a> via <a href="https://scop.io">Scopio</a></figcaption></figure>



<p>One question I like to answer myself essentially poses itself is the personal investment question: if I had some extra time, money, wishes, etc. Would I put them into making the best hours of my week better? Or would I put them into making the worst hours of my week better?</p>



<p>For example, should I buy a new coffee maker, so that my morning coffee on my way to work is better? Should I buy new headphones so that I can listen to music in bliss while I work?</p>



<p>Or should I put that money into an attachment for my bike, so that when I go for a bike ride, I can capture video of it. Or should I instead buy tickets to a fun concert for me to attend on the weekend?</p>



<figure class="wp-block-image size-large is-resized is-style-default"><img loading="lazy" decoding="async" src="https://poojanblog.com/blog/wp-content/uploads/2020/12/Weekly-Life-Path.png" alt="" class="wp-image-1015" width="600" height="450" srcset="https://poojanblog.com/blog/wp-content/uploads/2020/12/Weekly-Life-Path.png 800w, https://poojanblog.com/blog/wp-content/uploads/2020/12/Weekly-Life-Path-300x225.png 300w, https://poojanblog.com/blog/wp-content/uploads/2020/12/Weekly-Life-Path-768x576.png 768w" sizes="auto, (max-width: 600px) 100vw, 600px" /></figure>



<p>Knowing this goal is somewhat useful knowledge. For example, if I&#8217;m already energized at work maybe the coffee doesn&#8217;t make sense, or if I look forward to interacting with my workmates, maybe the headphones don&#8217;t make sense.</p>



<p>Alternatively, if I&#8217;m constantly worried about work, the concert could either be a great distraction, or it could be pointless if I&#8217;m going to obsess about the work I have to do anyway.</p>



<p>Thing is, this question of optimization is pretty limited. And, in fact, it might actually be in the way of my happiness.</p>



<p>There is another alternative: maybe neither the best hour of my nor the worst hour of my week need fixing. I posit that viewing life itself as an optimization problem is a problem itself. (Well, maybe not a problem, but certainly a short-sighted distraction.)</p>



<p>This constant need to improve ones&#8217; life is itself an incessant treadmill. You&#8217;re constantly looking for the best deal on what you need next. Or you feel like you don&#8217;t have enough time to do the project you set out to do that will make life (the best or worse moments) better.</p>



<p>Instead of buying better headphones, enjoy the ones you have.</p>



<p>I&#8217;d place this seemingly logical question in a class of questions which seem like they are useful, but are really an artificial mental construction which doesn&#8217;t necessarily have any grounding in reality. But, since we thought the thought, it&#8217;s hard to admit (or understand) that the question itself can be dismissed, that it was conceived in our mind, and isn&#8217;t indeed part of the world around us. Usually, &#8220;Why did so-and-so do that?&#8221; fall into this category: trying (or pretending to try) to explain someone else&#8217;s behavior when we have our own mental model.</p>



<p>Finally, optimizing on a week-by-week basis is also arbitrary. Maybe the best thing you can do is to forego any change for months, so you can incrementally get to a better point in a year. (I picked a week here, because most people have 5 work days and 2 weekends, so you see the contrast between the best and worst times during the course of a week.) Things that have made me truly happy usually took longer than a week.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1013</post-id>	</item>
		<item>
		<title>Mesh WiFi Recommendations</title>
		<link>https://poojanblog.com/blog/2020/06/mesh-wifi-recommendations/</link>
		
		<dc:creator><![CDATA[PoojanWagh]]></dc:creator>
		<pubDate>Mon, 08 Jun 2020 02:56:48 +0000</pubDate>
				<category><![CDATA[Desktop Computing]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[Wi-Fi]]></category>
		<guid isPermaLink="false">http://poojanwagh.opalstacked.com/poojanblog/?p=971</guid>

					<description><![CDATA[Mid-2020 Recommendation So if you are in the market for a mesh WiFi solution, which one should you get? It depends on whom you trust. WireCutter rated Eero the best. But Eero is owned by Amazon, so consider whether you trust Amazon. Synology also has a good name with tech enthusiasts; and it has a [&#8230;]]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">Mid-2020 Recommendation</h2>



<p>So if you are in the market for a mesh WiFi solution, which one should you get? It depends on whom you trust.</p>



<p><a href="https://www.nytimes.com/wirecutter/reviews/best-wi-fi-mesh-networking-kits/">WireCutter rated Eero the best</a>. But Eero is owned by Amazon, so consider whether you trust Amazon. <a href="https://www.synology.com/en-us/products/compare/routers">Synology</a> also has a good name with tech enthusiasts; and it has a good upgrade path. <a href="https://www.nytimes.com/wirecutter/reviews/best-wi-fi-router/">WireCutter considers it their 2nd best WiFi router</a> (outside of mesh), and you can add up to 6 mesh devices later; that said, WireCutter says the setup is more complicated than Eero.</p>



<p>If it were me, I would probably go with Synology. They are well-known in other network device markets. They also have a good track record of updating their routers (for security, etc). While the setup may be more complicated, I like that you can add more devices in the future.</p>



<p>I have seen many other tech-enthusiasts go with Google/Nest WiFi. (I bought my WiFi equipment from someone who was selling it because he bought the Google WiFi solution.) But <a href="https://arstechnica.com/gadgets/2019/04/googles-constant-product-shutdowns-are-damaging-its-brand/">Google has a history</a> of <a href="https://arstechnica.com/series/google-kills-product/">dropping products</a>, and I worry that WiFi could be next. Finally, WireCutter said it was behind Eero in performance.</p>



<p>Gory details and discussion follows.</p>



<span id="more-971"></span>



<h2 class="wp-block-heading">Introduction</h2>



<p>With many people having work-form-home constraints, I have received a few questions about at-home WiFi equipment. I have gone through dozens (dozens, I tells ya) of different WiFi systems in my house: Buffalo, Linksys, D-Link, Western Digital, TP-Link, D-Link (again). Some of this was my own doing: when things went from 802.11g (WiFi 3) to 802.11n (WiFi 4) to 802.11ac (WiFi 5), I upgraded my setup. (I will at some point switch to WiFi 6, but probably not for another 5 years or so.)</p>



<p>Here&#8217;s what I have learned along the way:</p>



<ul class="wp-block-list"><li>The best setup is to have multiple access points, each having a wired connection back to the main router. This is what I call wired backhaul.</li><li>You do want 5 GHz WiFi (especially 802.11ac AKA WiFi 5). It does not penetrate nearly as good as 2.4 GHz WiFi. But (because 2.4 GHz travels farther and because there are fewer channels), 2.4 GHz is more congested: your neighbor&#8217;s WiFi is interfering in your house on 2.4 GHz.</li><li>Powerline Ethernet connections are not rock solid. In some cases, they are better than WiFi, but it really depends on your house construction (as does WiFi).</li><li>Extenders don&#8217;t work. There is most likely an incompatibility with your router and some other manufacturer&#8217;s extender. It&#8217;s better to go with a centrally-managed system made from one brand (AKA a mesh system).</li></ul>



<p>If you&#8217;re in the market, I recommend a mesh WiFi system with <em>dedicated backhaul</em>. What is <em>dedicated backhaul</em>? It is a separate channel and separate radio that can do the meshing. What that means is that each WiFi access point (each satellite that you put in your house) has two radios: Radio B connects back to the main router. Radio A is what services your laptop/desktop/Roku/cell-phone/etc. (I call laptop/desktop/Roku/smartphone the user traffic.)</p>



<h2 class="wp-block-heading">Backhaul</h2>



<p>Dedicated backhaul means that the satellite (Access Point) can service user data and relay it back to the main router simultaneously. It has 2 wireless links to do so. However, there&#8217;s a problem with distancing: you still need to put the satellite in the range of the main router. Here&#8217;s are a couple of crudely drawn pictures showing the problem and solution:</p>



<figure class="wp-block-image size-medium"><img loading="lazy" decoding="async" width="300" height="168" src="https://poojanblog.com/blog/wp-content/uploads/2020/06/Router-Mesh-Problem-no-signal-300x168.png" alt="" class="wp-image-972" srcset="https://poojanblog.com/blog/wp-content/uploads/2020/06/Router-Mesh-Problem-no-signal-300x168.png 300w, https://poojanblog.com/blog/wp-content/uploads/2020/06/Router-Mesh-Problem-no-signal-1024x572.png 1024w, https://poojanblog.com/blog/wp-content/uploads/2020/06/Router-Mesh-Problem-no-signal-768x429.png 768w, https://poojanblog.com/blog/wp-content/uploads/2020/06/Router-Mesh-Problem-no-signal-1536x858.png 1536w, https://poojanblog.com/blog/wp-content/uploads/2020/06/Router-Mesh-Problem-no-signal.png 1685w" sizes="auto, (max-width: 300px) 100vw, 300px" /><figcaption>Problem Case: the satellite (Access Point) is placed too far away form the main router; it cannot receive/send a signal to the main router.</figcaption></figure>



<figure class="wp-block-image size-medium"><img loading="lazy" decoding="async" width="300" height="188" src="https://poojanblog.com/blog/wp-content/uploads/2020/06/Router-Mesh-Problem-overlapping-signal-300x188.png" alt="" class="wp-image-973" srcset="https://poojanblog.com/blog/wp-content/uploads/2020/06/Router-Mesh-Problem-overlapping-signal-300x188.png 300w, https://poojanblog.com/blog/wp-content/uploads/2020/06/Router-Mesh-Problem-overlapping-signal-1024x642.png 1024w, https://poojanblog.com/blog/wp-content/uploads/2020/06/Router-Mesh-Problem-overlapping-signal-768x481.png 768w, https://poojanblog.com/blog/wp-content/uploads/2020/06/Router-Mesh-Problem-overlapping-signal-1536x962.png 1536w, https://poojanblog.com/blog/wp-content/uploads/2020/06/Router-Mesh-Problem-overlapping-signal.png 1553w" sizes="auto, (max-width: 300px) 100vw, 300px" /><figcaption>Mesh Case: the satellite (Access Point) is placed within the wireless range of the main router. It can connect and create its own signal farther than the original main router.</figcaption></figure>



<p>This is a little worse than what I do myself, which is wired backhaul:</p>



<figure class="wp-block-image size-medium"><img loading="lazy" decoding="async" width="300" height="186" src="https://poojanblog.com/blog/wp-content/uploads/2020/06/Wired-Backhaul-300x186.png" alt="" class="wp-image-974" srcset="https://poojanblog.com/blog/wp-content/uploads/2020/06/Wired-Backhaul-300x186.png 300w, https://poojanblog.com/blog/wp-content/uploads/2020/06/Wired-Backhaul-1024x634.png 1024w, https://poojanblog.com/blog/wp-content/uploads/2020/06/Wired-Backhaul-768x476.png 768w, https://poojanblog.com/blog/wp-content/uploads/2020/06/Wired-Backhaul-1536x951.png 1536w, https://poojanblog.com/blog/wp-content/uploads/2020/06/Wired-Backhaul.png 1629w" sizes="auto, (max-width: 300px) 100vw, 300px" /><figcaption>Wired Backhaul Case: the satellite (AP) is connected with a wired (Ethernet) connection to the main router. So, it does not need to be within wireless range of the main router.</figcaption></figure>



<p>What&#8217;s the difference? In the mesh configuration, you have to place each access point within the range of another access point. In the 2nd picture, you can place access points <em>outside</em> the range of each other. And, in fact, it&#8217;s preferred that they don&#8217;t overlap. (Non-overlap causes less interference and makes it clearer for the user device which network to connect to.)</p>



<h2 class="wp-block-heading">Corner Cases</h2>



<p>You can pretty much stop reading at this point. The next few scenarios are pretty unlikely.</p>



<p>Now, what if you set up things like so?</p>



<figure class="wp-block-image size-medium"><img loading="lazy" decoding="async" width="300" height="225" src="https://poojanblog.com/blog/wp-content/uploads/2020/06/20200607_214052-300x225.jpg" alt="" class="wp-image-976" srcset="https://poojanblog.com/blog/wp-content/uploads/2020/06/20200607_214052-300x225.jpg 300w, https://poojanblog.com/blog/wp-content/uploads/2020/06/20200607_214052-1024x768.jpg 1024w, https://poojanblog.com/blog/wp-content/uploads/2020/06/20200607_214052-768x576.jpg 768w, https://poojanblog.com/blog/wp-content/uploads/2020/06/20200607_214052-1536x1152.jpg 1536w, https://poojanblog.com/blog/wp-content/uploads/2020/06/20200607_214052-2048x1536.jpg 2048w" sizes="auto, (max-width: 300px) 100vw, 300px" /><figcaption>Daisy Chained Case: Traffic from rightmost access point must pass sequentially through each access point to the left to make it to the main router</figcaption></figure>



<p>Each radio can hop as many times as necessary to get to the main router. So, it&#8217;ll probably function. But it won&#8217;t work well. The reason is that AP1 inherits all the traffic from AP2 and AP3. This multi-hop adds delay to user traffic. Delay causes slowdown: both perceived slowness and actual reduction in data rates. This setup can also over-burden the satellites, because they are sending traffic in both directions on their backhaul radios. Finally, the backhaul channel can get congested from the proximity of multiple satellites.</p>



<p>I have simplified things a bit in the above diagrams: there are really 3 networks: the main router&#8217;s user network (blue), the satellite user&#8217;s network (green), and the wireless backhaul network (shared between the main router and sarellites). But the wireless backhaul on each device will have roughly the same extent as the blue/green network, so I didn&#8217;t clutter the pictures separating that detail.</p>



<p>From a user&#8217;s perspective, there is only one network in all of the above. Both the main router and satellite will appear to have one WiFi network. The user&#8217;s laptop (for example) will switch between the blue and green networks as necessary. The technical jargon for this is that both the blue and green networks should have the same WiFi name (SSID) and password (security credentials), so the user&#8217;s devices will see them as the same. They will be on separate frequencies, though, to prevent self-interference of the radio signals.</p>



<h2 class="wp-block-heading">Recommendations</h2>



<p>Now, for my recommendations. Most consumer solutions are primarily made to work as a mesh, not with wired backhaul. While you can do wired backhaul, it&#8217;s not something that really comes out-of-the box. So, I&#8217;m not recommending it unless you know what you&#8217;re doing. (In which case, you probably wouldn&#8217;t be asking me for advice.)</p>



<p>To plan this out, you need to know how far your WiFi propagates. If possible, you&#8217;ll want your main router somewhere centrally located. And the access points (satellites) concentrically located. For example, if you have a 2-story house with basement, put the main router on the 1st (ground) floor. Put a satellite in the basement and one satellite on the 2nd floor.</p>



<p>But <em>where</em> on each floor is a trickier question. If you place satellites directly above and below the main router, they will be as close as possible. But maybe that&#8217;s not where you have an outlet. And in some cases, the routers and satellites will be optimized to broadcast horizontally but not vertically (not directly above and below).</p>



<p>Really getting to the bottom takes a little bit of measurement. If you have an Android device, I recommend using <a href="https://play.google.com/store/apps/details?id=com.ubnt.usurvey&amp;hl=en_US">WiFi-Man</a> by Ubiquiti to map out your current situation. Start near your router and walk away. Go upstairs, downstairs, etc. You will see the signal change. You can get a crude map for where the signal propagates and where it doesn&#8217;t. Based on this information, you can decide where to place your satellites. And hopefully, the new router will have around the same radiation pattern as your old one. (There is an Apple version of this app, but I do not believe it has the same signal strength function. A <a href="https://www.google.com/search?q=ios+wifi+signal+strength">google search for similar apps</a> showed an iOS app that had too few reviews for me to recommend it here.)</p>



<p>I should say at this point: I don&#8217;t own a mesh system. So, I had to resort to some web researching. You should take the following advice with a grain of salt. A lot of the above is taken from a <a href="https://www.nytimes.com/wirecutter/reviews/best-wi-fi-mesh-networking-kits/">WireCutter article on Mesh WiFi</a>. This article also corroborates my experience above. In fact, you should at this point read through the article for more detailed testing on all the mesh options out there.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">971</post-id>	</item>
		<item>
		<title>My Password Setup</title>
		<link>https://poojanblog.com/blog/2020/03/password-advice-intro/</link>
					<comments>https://poojanblog.com/blog/2020/03/password-advice-intro/#respond</comments>
		
		<dc:creator><![CDATA[PoojanWagh]]></dc:creator>
		<pubDate>Sun, 29 Mar 2020 04:00:28 +0000</pubDate>
				<category><![CDATA[Desktop Computing]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[2-factor]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[YubiKey]]></category>
		<guid isPermaLink="false">http://poojanwagh.opalstacked.com/poojanblog/?p=899</guid>

					<description><![CDATA[So, I&#8217;m basically making this post so I can share with friends/family. In this post, I will explain what I do for managing passwords, including two-factor authentication (2FA), and give some options for getting 2FA. Before I do that, I will explain how I got to the conclusion on what I am using. For those [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>So, I&#8217;m basically making this post so I can share with friends/family. In this post, I will explain what I do for managing passwords, including two-factor authentication (2FA), and give some options for getting 2FA. Before I do that, I will explain how I got to the conclusion on what I am using.</p>



<p>For those that don&#8217;t know me, I am not a security expert. You should do your own research (and maybe consult the security experts out there). I could be wrong about some of my conclusions. And more generally, what might work for me might not work for you.</p>



<p>Also, the scope of what I explaining here is only for my personal accounts. My company (and most out there) has an IT policy for work accounts.</p>



<p>You can skip past the Intro, if you don&#8217;t need convincing on why reusing passwords is insecure. Also, I put my recommendations right up-front in the Bottom Line section, if you don&#8217;t want to read the whole article.</p>



<span id="more-899"></span>



<h2 class="wp-block-heading">Bottom Line</h2>



<p>My bottom line recommendation is to look in to the following combination and see which one works for you: something to manage your password, and something for 2-factor rolling codes (OTPs).</p>



<p>For managing passwords, you can go with a hard-paper notebook (where you write passwords down and you never store them on a computer) or a password management app, such ass KeePass, Bitwarden, or LastPass.</p>



<p>For getting 2-factor rolling codes (OTPs), you can go with a device such as a YubiKey or an app such as Authy, Microsoft Authenticator, or Google Authenticator.</p>



<ul class="wp-block-list"><li>Password Manager<br>Pick one from below:<ul><li>Paper Notebook<br>with unique entries for each password<br>&#8211; OR &#8211;</li></ul><ul><li>Password Manager App <br>Pick one of:<ul><li><a href="https://bitwarden.com/">Bitwarden</a><br>&#8211; OR &#8211;</li><li><a href="https://keepass.info/index.html">KeePass2</a><br>&#8211; OR &#8211;</li><li><a href="https://www.lastpass.com/solutions/business-password-manager">LastPass</a></li></ul></li></ul></li><li>&#8211; AND &#8211; </li><li>One-Time Password (rolling code) Generator<br>Pick one of:<ul><li><a href="https://www.yubico.com/products/">Hardware Device YubiKey<br></a> &#8211; OR &#8211; </li><li>Authenticator App<br>Pick one of:<ul><li><a href="https://authy.com/">Authy</a><br>  &#8211; OR &#8211;  </li><li><a href="https://www.microsoft.com/en-us/account/authenticator">Microsoft Authenticator</a><br>  &#8211; OR &#8211;  </li><li><a href="https://www.google.com/landing/2step/">Google Authenticator</a></li></ul></li></ul></li></ul>



<h2 class="wp-block-heading">Intro</h2>



<p>There have been a lot of password leaks lately. I mean, a lot. This multitude of leaks culminated in a meta-dump of everyone&#8217;s password. That is, someone compiled many of the previous leaks and put them into one big password dump.  As a result, if you&#8217;ve been using a password for any amount of time, and if any of the sites you used practiced sub-par security practices, your password is probably available on the Internet.</p>



<p>(You can <a href="https://haveibeenpwned.com/">check here</a>. Just enter an email and it will likely show which of the many breaches your password appeared. Alternatively, you can enter a <a href="https://haveibeenpwned.com/Passwords">password here </a>and it will show you if that password was in a data dump. But I&#8217;ll save you some time: yes, your email and password are available online.)</p>



<p>Now, one solution is to use unique passwords for each site, and don&#8217;t share them between websites. In this case, even if one of your favorite websites leaks their users&#8217; passwords, you only have to worry about someone hacking your account on that site.</p>



<p>Unique static passwords solves most, but not all the ways people can gain access to your account. </p>



<p>Most experts <a href="https://www.grc.com/sn/sn-090.htm">recommend a 2nd factor</a> called one-time-passwords (OTPs) to use in combination with unique static passwords. OTPs changes with time. So, if someone sees you logging into a website, they might get your static password, and they might get your OTP once. But that one-time-password (OTP) is only usable once. They can&#8217;t come back to the website and log in as you unless they get the latest OTP.</p>



<p>Remember that there can be a huge profit motive to someone hacking your account. They may want to get your LinkedIn network, your FaceBook contacts, or your financial institution. Taking these two steps can make these attacks much more difficult.</p>



<p>Incidentally, <a href="https://www.blog.google/technology/safety-security/five-things-you-can-do-right-now-to-stay-safer-online/">similar recommendations </a>are <a href="https://www.theverge.com/2020/2/11/21133110/google-campaign-security-2020-elections-defending-digital-campaigns">being provided to US officials participating in elections</a>, albeit with Google&#8217;s own hardware product.</p>



<h2 class="wp-block-heading">The Limitation with Passwords</h2>



<p>If you want to create unique passwords for each site, you&#8217;ll need to create a lot of passwords. And you probably want to use either a notebook to write them all down, or a password manager to store them (in a secure, encrypted format).</p>



<p>This unique password is a reasonable solution. But, it does suffer from a significant problem: someone could impersonate a website. If, for example, I wanted to go to <em>real cat video site</em> but typed the address in wrong. I mistakenly go to <em>fake cat video site</em>. <em>Fake cat video site</em> has completely impersonated <em>real cat video site</em>. Unless I paid very close attention to the web address, I would not know the difference.</p>



<p>I then type in my password (unwittingly) to <em>fake cat video site</em>. Now, they have my password. They have complete access to my account at <em>real cat video site</em>. They can do whatever they want with that password—including delete my videos, or even replace them all with dog videos.* The problem with passwords is that they are static. Once you&#8217;ve handed it out, the cat is out of the bag.</p>



<p>This website imitation is easier than you think online: <em>fake cat video site</em> can pass all traffic through to <em>real cat video site</em> without you knowing. They don&#8217;t actually have to copy the information; they can simply forward every request and return every answer. This attack is known as a man-in-the-middle (MITM) attack. <a href="https://nudatasecurity.com/resources/blog/bypassing-passwords-with-man-in-the-middle/">Passwords can&#8217;t help you with them.</a></p>



<h2 class="wp-block-heading">2-Factor Authentication</h2>



<p>To mitigate this deficiency, most experts recommend something in addition to the password, a second factor. This is called 2-factor authentication (2FA). </p>



<p> The simplest and most obvious way to add a 2nd factor is to add a rolling code: that is, an extra code that changes with each login attempt. With this rolling code, if you log in to <em>fake cat video site</em> with your password and rolling code, they get access to your <em>real cat video site </em>account only once. They can do some damage, but they do not have permanent access. If they try to log in again, they will need a new rolling code.</p>



<p>There are many ways of getting such a rolling code. One of the most convenient is to use an authenticator app, such as <a href="https://authy.com/">Authy</a>, <a href="https://www.microsoft.com/en-us/account/authenticator">Microsoft Authenticator</a>, or <a href="https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2&amp;hl=en_US">Google Authenticator</a>. (All of these use a common standard, so you can use any of these with most sites that support a rolling code authentication app.) </p>



<p>These methods uses your phone to create the rolling code (which changes every 30 seconds or so on an app on your phone). For many people, this is a safe enough option. There are flaws with this method, but it really is a very good compromise between convenience and security. If you are going to do nothing else, enable 2-factor authentication using an app.</p>



<p>The problem with app-based authentication is the scenario where you lose physical control over your phone. Or you install an app or download something that compromises your phone. More generally, if someone has access to your phone, you can&#8217;t count a security app <em>on your phone</em> to really be a 2nd factor. That 2nd factor app (if it sits on your phone) really becomes more of formality in logging in to an app on your phone.</p>



<p>That said, if you lose your phone and someone has the ability to unlock it, there are much bigger worries than them logging into a specific app or trying to steal a specific account.</p>



<p>The official name of the rolling code is one-time-password (OTP). I use an OTP wherever I can. However, I don&#8217;t use an app on my phone to store it. See the next section.</p>



<h2 class="wp-block-heading">What I Do for OTP</h2>



<p>I use a YubiKey for one-time passwords (OTP).</p>



<p>The reason I like the YubiKey is that it allows you to store/generate a one-time password on a hardware device: the small YubiKey itself (which fits on a keychain). </p>



<p>In addition, the YubiKey solves another problem: it&#8217;s independently portable. I generally do have it on my keychain, where all my keys are. (Most people are used to keeping their keys secure.) In my case, I duplicate my credentials to two keys. One is a USB-C key (usable on my phone and recent computers) and the others is a regular USB-A key (for backup). So, I have a backup YubiKey that stays at home.</p>



<p> You do need to plug the YubiKey in to your phone or computer to read the codes, but this is  done securely: only that single code gets passed through your  phone/computer and onto your screen. No one can steal the secret that generates all the codes; it is protected within the hardware of the YubiKey itself.</p>



<p>I also do create backup/recovery codes and print them out. These allow me to log in if I lose both my YubiKeys. (Or if they get corrupt.) I don&#8217;t store the backup codes on a computer. They are hard copies and kept in a fire-proof envelope. (Most sites, including FaceBook, allow you to create backup codes.)</p>



<h2 class="wp-block-heading">What I do for Password Manager</h2>



<p>There are many options for software-based password managers. The one I  use is <a href="https://keepass.info/">KeePass 2</a>. The reason I use it is that it&#8217;s free (open source),  has options for Windows, Linux, and Android. (I&#8217;m not sure about  Apple/iOS, but I&#8217;d guess there&#8217;s a solution there.) And cloud sync is  optional. You can store it on a single device, and that device does not  necessarily need Internet access. The downside is that if you do want to  sync it across devices, it takes some configuration. </p>



<h2 class="wp-block-heading">Other Options for Password Management</h2>



<h3 class="wp-block-heading">Paper Notebook</h3>



<p>While I don&#8217;t use a paper notebook—I like the convenience of having a software password manager—they are a good solution. It&#8217;s the cheapest (in terms of up-front time and money) solution.</p>



<p>You probably have a notebook lying around your house. If not, take a look at books on Amazon written by <a href="https://www.amazon.com/Lourdes-Welhaven/e/B00LJWMADI/ref=sr_ntt_srch_lnk_11?qid=1550948524&amp;sr=8-11-spons">Lourdes Welhaven</a>. The only thing to be careful of is that you generate good passwords, which are hard to guess. Your brain is pretty bad at doing random. <a href="https://www.eff.org/dice">Here&#8217;s a systematic way using dice (if there are no restrictions on password length).</a> (<a href="https://smile.amazon.com/gp/product/B07RLTF7W1/">Here are some dice I used for this purpose</a>.**) If there are restrictions on password length, <a href="https://www.grc.com/passwords.htm">go here</a> or <a href="https://www.random.org/passwords/">here</a>. Incidentally, password-generation is a place where password-management apps really shine.</p>



<p>No one can hack into your computer and steal your trove of passwords, if they are not on your computer. That said, people hacking a regular Joe&#8217;s computer doesn&#8217;t seem to be the way passwords are leaking—or at least it isn&#8217;t the only way. It is, in fact, the websites we use that seem to be the weak link. Every time a website gets hacked, your password at that website spills on the Internet.</p>



<h3 class="wp-block-heading">Other Password Management Apps</h3>



<p>There are quite a few other options if you want to for a cloud-bases service. I&#8217;ve heard good things online about BitWarden and LastPass. I don&#8217;t have extensive experience with either of these management apps, but I have come across many good comments about BitWarden.</p>



<p>I did try BitWarden very briefly on my Android device, but I kept KeePass because the <a href="https://play.google.com/store/apps/details?id=keepass2android.keepass2android&amp;hl=en_US">Keepass2Android App</a> has an extremely useful feature: you can set it up as a software keyboard in Android. It can then enter your username/password in other apps with a button on the screen.</p>



<p>The SecurityNow Podcast is sponsored by LastPass, and I generally am comfortable with their recommendations; they seem to have a decent vetting process for their sponsors.</p>



<p>Finally, the <a href="https://haveibeenpwned.com/">Have I Been Pwned site</a> I linked in the intro is sponsored by 1Password.</p>



<h2 class="wp-block-heading">Other Options for OTP</h2>



<p>Authenticator Apps are pretty neat. You set it up once by scanning or typing in a long code given by the website you want to use it with (FaceBook, Microsoft, Snapchat, etc). There&#8217;s a different code for each.</p>



<p>Then, after setup, it generates a rolling number that&#8217;s needed every time you log in. What&#8217;s nice is that the apps conform to a standard. So, you can have one app installed for all your different websites.</p>



<p>I have heard <a href="https://authy.com/">Authy</a>. Authy is multi-platform (Windows/iOS/Android) and will sync across platforms. Google Authenticator is equally good, but it <a href="https://authy.com/blog/authy-vs-google-authenticator/">doesn&#8217;t sync your OTPs across platforms</a>. Similar with <a href="https://www.microsoft.com/en-us/account/authenticator">Microsoft Authenticator</a>.</p>



<p>One could make the case that OTP&#8217;s should be unique to the device they are on, but for most people, the convenience of setting Authy up once is worth the risk. There are those, however, <a href="https://arstechnica.com/information-technology/2016/12/this-low-cost-device-may-be-the-worlds-best-hope-against-account-takeovers/">that disagree</a>: using an authenticator app is better than nothing, but a dedicated hardware security key is much better.</p>



<p>Google also has <a href="https://cloud.google.com/titan-security-key">their Titan security key solution</a>, which is hardware-based. I have not done any analysis <a href="https://www.theverge.com/2019/2/22/18235173/the-best-hardware-security-keys-yubico-titan-key-u2f">comparing </a>it to YubiKey. I just know the YubiKey supports many standards and does whatever I need it do do. I started with YubiKey many years ago and never saw a need to switched. <a href="https://arstechnica.com/gadgets/2019/04/googles-constant-product-shutdowns-are-damaging-its-brand/">I also have a cautious opinion of Google solutions because their repeated exit from markets</a>.</p>



<h2 class="wp-block-heading">SMS for Two-Factor</h2>



<p>I really don&#8217;t like this option, and I wish companies would stop providing it. (Especially banks, where this seems to be prevalent.)</p>



<p>Once again, I am no security expert, but <a href="https://www.grc.com/sn/sn-604.htm">experts don&#8217;t like it</a> and <a href="https://arstechnica.com/information-technology/2018/11/millions-of-sms-texts-in-unsecured-database-expose-2fa-codes-and-reset-links/">SMS has failed</a> <a href="https://arstechnica.com/information-technology/2018/08/password-breach-teaches-reddit-that-yes-phone-based-2fa-is-that-bad/">in the past</a>.</p>



<p>* I am a dog person (too), but people like their cat videos.</p>



<p>** I do not have an affiliate relationship with any of the vendors on this page (at/since the time of writing this post).</p>
]]></content:encoded>
					
					<wfw:commentRss>https://poojanblog.com/blog/2020/03/password-advice-intro/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">899</post-id>	</item>
		<item>
		<title>A Morning in Fond du Lac</title>
		<link>https://poojanblog.com/blog/2020/01/a-morning-in-fond-du-lac/</link>
		
		<dc:creator><![CDATA[PoojanWagh]]></dc:creator>
		<pubDate>Mon, 20 Jan 2020 04:07:50 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Alpha 6000]]></category>
		<category><![CDATA[landscape]]></category>
		<category><![CDATA[photos]]></category>
		<guid isPermaLink="false">http://poojanwagh.opalstacked.com/poojanblog/?p=914</guid>

					<description><![CDATA[I woke up on Saturday morning in Fond du Lac, Wisconsin. I took some pictures.]]></description>
										<content:encoded><![CDATA[<p>I woke up on Saturday morning in Fond du Lac, Wisconsin. I took some pictures.</p>


<figure class="wp-block-gallery columns-3 wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex"><ul class="blocks-gallery-grid"><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="1707" height="2560" src="https://i1.wp.com/poojanblog.com/blog/wp-content/uploads/2020/01/DSC00343-1-scaled.jpg?fit=683%2C1024&amp;ssl=1" alt="" data-id="919" data-full-url="https://i1.wp.com/poojanblog.com/blog/wp-content/uploads/2020/01/DSC00343-1-scaled.jpg?fit=1707%2C2560&amp;ssl=1" data-link="https://poojanblog.com/poojanblog/?attachment_id=919" class="wp-image-919" srcset="https://poojanblog.com/blog/wp-content/uploads/2020/01/DSC00343-1-scaled.jpg 1707w, https://poojanblog.com/blog/wp-content/uploads/2020/01/DSC00343-1-200x300.jpg 200w, https://poojanblog.com/blog/wp-content/uploads/2020/01/DSC00343-1-683x1024.jpg 683w, https://poojanblog.com/blog/wp-content/uploads/2020/01/DSC00343-1-768x1152.jpg 768w, https://poojanblog.com/blog/wp-content/uploads/2020/01/DSC00343-1-1024x1536.jpg 1024w, https://poojanblog.com/blog/wp-content/uploads/2020/01/DSC00343-1-1365x2048.jpg 1365w" sizes="auto, (max-width: 1707px) 100vw, 1707px" /></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="2560" height="1707" src="https://i1.wp.com/poojanblog.com/blog/wp-content/uploads/2020/01/DSC00361-1-scaled.jpg?fit=1024%2C683&amp;ssl=1" alt="" data-id="920" data-full-url="https://i1.wp.com/poojanblog.com/blog/wp-content/uploads/2020/01/DSC00361-1-scaled.jpg?fit=2560%2C1707&amp;ssl=1" data-link="https://poojanblog.com/poojanblog/?attachment_id=920" class="wp-image-920" srcset="https://poojanblog.com/blog/wp-content/uploads/2020/01/DSC00361-1-scaled.jpg 2560w, https://poojanblog.com/blog/wp-content/uploads/2020/01/DSC00361-1-300x200.jpg 300w, https://poojanblog.com/blog/wp-content/uploads/2020/01/DSC00361-1-1024x683.jpg 1024w, https://poojanblog.com/blog/wp-content/uploads/2020/01/DSC00361-1-768x512.jpg 768w, https://poojanblog.com/blog/wp-content/uploads/2020/01/DSC00361-1-1536x1024.jpg 1536w, https://poojanblog.com/blog/wp-content/uploads/2020/01/DSC00361-1-2048x1365.jpg 2048w" sizes="auto, (max-width: 2560px) 100vw, 2560px" /></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="2560" height="1440" src="https://i0.wp.com/poojanblog.com/blog/wp-content/uploads/2020/01/PhotoLemur_DSC00382-scaled.jpg?fit=1024%2C576&amp;ssl=1" alt="" data-id="921" data-full-url="https://i0.wp.com/poojanblog.com/blog/wp-content/uploads/2020/01/PhotoLemur_DSC00382-scaled.jpg?fit=2560%2C1440&amp;ssl=1" data-link="https://poojanblog.com/poojanblog/?attachment_id=921" class="wp-image-921" srcset="https://poojanblog.com/blog/wp-content/uploads/2020/01/PhotoLemur_DSC00382-scaled.jpg 2560w, https://poojanblog.com/blog/wp-content/uploads/2020/01/PhotoLemur_DSC00382-300x169.jpg 300w, https://poojanblog.com/blog/wp-content/uploads/2020/01/PhotoLemur_DSC00382-1024x576.jpg 1024w, https://poojanblog.com/blog/wp-content/uploads/2020/01/PhotoLemur_DSC00382-768x432.jpg 768w, https://poojanblog.com/blog/wp-content/uploads/2020/01/PhotoLemur_DSC00382-1536x864.jpg 1536w, https://poojanblog.com/blog/wp-content/uploads/2020/01/PhotoLemur_DSC00382-2048x1152.jpg 2048w" sizes="auto, (max-width: 2560px) 100vw, 2560px" /></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="2560" height="1707" src="https://i1.wp.com/poojanblog.com/blog/wp-content/uploads/2020/01/PhotoLemur_DSC00432-scaled.jpg?fit=1024%2C683&amp;ssl=1" alt="" data-id="922" data-full-url="https://i1.wp.com/poojanblog.com/blog/wp-content/uploads/2020/01/PhotoLemur_DSC00432-scaled.jpg?fit=2560%2C1707&amp;ssl=1" data-link="https://poojanblog.com/poojanblog/?attachment_id=922" class="wp-image-922" srcset="https://poojanblog.com/blog/wp-content/uploads/2020/01/PhotoLemur_DSC00432-scaled.jpg 2560w, https://poojanblog.com/blog/wp-content/uploads/2020/01/PhotoLemur_DSC00432-300x200.jpg 300w, https://poojanblog.com/blog/wp-content/uploads/2020/01/PhotoLemur_DSC00432-1024x683.jpg 1024w, https://poojanblog.com/blog/wp-content/uploads/2020/01/PhotoLemur_DSC00432-768x512.jpg 768w, https://poojanblog.com/blog/wp-content/uploads/2020/01/PhotoLemur_DSC00432-1536x1024.jpg 1536w, https://poojanblog.com/blog/wp-content/uploads/2020/01/PhotoLemur_DSC00432-2048x1365.jpg 2048w" sizes="auto, (max-width: 2560px) 100vw, 2560px" /></figure></li></ul></figure>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">914</post-id>	</item>
		<item>
		<title>Orion</title>
		<link>https://poojanblog.com/blog/2020/01/orion/</link>
		
		<dc:creator><![CDATA[Poojan Wagh]]></dc:creator>
		<pubDate>Sat, 11 Jan 2020 22:40:39 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[constellation]]></category>
		<category><![CDATA[photogrphay]]></category>
		<category><![CDATA[space]]></category>
		<guid isPermaLink="false">http://poojanwagh.opalstacked.com/poojanblog/?p=903</guid>

					<description><![CDATA[My first foray into astrophotography—if you can call it that. I took two pictures at two different exposure lengths and then merged them.]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-gallery columns-1 is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex"><ul class="blocks-gallery-grid"><li class="blocks-gallery-item"><figure><img loading="lazy" decoding="async" width="2560" height="1677" src="https://i2.wp.com/poojanblog.com/blog/wp-content/uploads/2020/01/2020-01-11-Orion-Constellation-Merged-DSC0313-DSC0310-2-scaled.jpg?fit=1024%2C671&amp;ssl=1" alt="" data-id="924" data-full-url="https://i2.wp.com/poojanblog.com/blog/wp-content/uploads/2020/01/2020-01-11-Orion-Constellation-Merged-DSC0313-DSC0310-2-scaled.jpg?fit=2560%2C1677&amp;ssl=1" data-link="https://poojanblog.com/poojanblog/2020/01/orion/2020-01-11-orion-constellation-merged-dsc0313-dsc0310-2/" class="wp-image-924" srcset="https://poojanblog.com/blog/wp-content/uploads/2020/01/2020-01-11-Orion-Constellation-Merged-DSC0313-DSC0310-2-scaled.jpg 2560w, https://poojanblog.com/blog/wp-content/uploads/2020/01/2020-01-11-Orion-Constellation-Merged-DSC0313-DSC0310-2-300x197.jpg 300w, https://poojanblog.com/blog/wp-content/uploads/2020/01/2020-01-11-Orion-Constellation-Merged-DSC0313-DSC0310-2-1024x671.jpg 1024w, https://poojanblog.com/blog/wp-content/uploads/2020/01/2020-01-11-Orion-Constellation-Merged-DSC0313-DSC0310-2-768x503.jpg 768w, https://poojanblog.com/blog/wp-content/uploads/2020/01/2020-01-11-Orion-Constellation-Merged-DSC0313-DSC0310-2-1536x1006.jpg 1536w, https://poojanblog.com/blog/wp-content/uploads/2020/01/2020-01-11-Orion-Constellation-Merged-DSC0313-DSC0310-2-2048x1342.jpg 2048w" sizes="auto, (max-width: 2560px) 100vw, 2560px" /></figure></li></ul></figure>


<p>My first foray into astrophotography—if you can call it that. I took two pictures at two different exposure lengths and then merged them.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">903</post-id>	</item>
		<item>
		<title>VOIP Cost Calculations</title>
		<link>https://poojanblog.com/blog/2017/11/voip-cost-calculations/</link>
					<comments>https://poojanblog.com/blog/2017/11/voip-cost-calculations/#respond</comments>
		
		<dc:creator><![CDATA[PoojanWagh]]></dc:creator>
		<pubDate>Fri, 17 Nov 2017 23:00:22 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://poojanwagh.opalstacked.com/poojanblog/?p=888</guid>

					<description><![CDATA[So, in August we made a total of 1755 seconds of outgoing calls from our landline. I currently use voip.ms to make these outgoing calls. Their rate (using premium routing) is 1 cent per minute. (Curiously slightly higher for toll-free calls.) Anyway, I paid a whopping 30.7 cents for all these outgoing calls in August. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>So, in August we made a total of 1755 seconds of outgoing calls from our landline.</p>
<p>I currently use voip.ms to make these outgoing calls. Their rate (using premium routing) is 1 cent per minute. (Curiously slightly higher for toll-free calls.) Anyway, I paid a whopping 30.7 cents for all these outgoing calls in August.</p>
<p>Right now, I still have AT&amp;T handling incoming calls. If I were to cancel AT&amp;T, I would save roughly $20 per month.</p>
<p>Instead, I would have to pay for incoming calls as well. As well as 911 (E911) service. Both voip.ms and CallCentric (a service which seems to be mentioned a lot online) provide E911.</p>
<p>With CallCentric, their <a href="https://www.callcentric.com/rate/plans/north_america_basic/" target="_blank" rel="noopener">North America Basic</a> plan includes E911 and 120 minutes of outgoing calls; this costs $1.95 per month. (After 120 minutes, which I probably won&#8217;t use, it&#8217;s roughly 2 cents a call.) In addition, I can <a href="https://www.callcentric.com/rate/plans/pay_per_call/" target="_blank" rel="noopener">pay $1.95 monthly plus 1.5 cents per minute</a> to receive calls. (I could also  pay <a href="https://www.callcentric.com/dids/personal_unlimited" target="_blank" rel="noopener">$5.95 for unlimited outgoing calls</a>, but given how few calls we take, that does not make much sense.)</p>
<p>With CallCentric, the costs would come out to $1.95/month + $1.95/month + 1.5 cents/minute-incoming. So, $3.80/month + incoming 1.5c/minute.</p>
<p>With voip.ms, as I said before, they charge per-minute on outgoing calls. (This is why I picked them in the first place: no monthly fees, and very cheap usage rates.) For incoming calls, the rate is $0.85/month plus 0.9c/minute. For E911, I pay another $1.50/month. So, I&#8217;d pay $2.35/month + 1c/minute-outgoing + 0.9c/minute-incoming. (voip.ms also has a $4.25/month unlimited incoming call plan. However, it isn&#8217;t clear to me whether this includes E911.)</p>
<p>So, all of this depends on how many incoming calls I receive on average. (Unfortunately, AT&amp;T does not list this on the bill, since it&#8217;s basically free&mdash;er, included with my monthly service.) I can&#8217;t imagine it amounts to more than a few hours per month. And to be honest, the differential between CallCentric and voip.ms is so low, I don&#8217;t know that it matters (roughly a buck or two in the end).</p>
]]></content:encoded>
					
					<wfw:commentRss>https://poojanblog.com/blog/2017/11/voip-cost-calculations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">888</post-id>	</item>
		<item>
		<title>Shipping Options while eBaying Electronics</title>
		<link>https://poojanblog.com/blog/2017/06/shipping-options-while-ebaying-electronics/</link>
					<comments>https://poojanblog.com/blog/2017/06/shipping-options-while-ebaying-electronics/#respond</comments>
		
		<dc:creator><![CDATA[PoojanWagh]]></dc:creator>
		<pubDate>Sun, 25 Jun 2017 21:23:06 +0000</pubDate>
				<category><![CDATA[Home]]></category>
		<category><![CDATA[eBay]]></category>
		<category><![CDATA[selling]]></category>
		<category><![CDATA[shipping]]></category>
		<guid isPermaLink="false">http://poojanwagh.opalstacked.com/poojanblog/?p=883</guid>

					<description><![CDATA[I've been e-Baying old electronics lately. Because, I visit this topic so many times (every time I eBay), I thought I'd put some conclusions for myself on how to ship items I sell.]]></description>
										<content:encoded><![CDATA[<p>I&#8217;ve been spending some time e-baying electronics lately. (Just trying to get rid of old, unused stuff that never panned out.)</p>
<p>Because, I visit this topic so many times (every time I eBay), I thought I&#8217;d put some conclusions for myself on how to ship these.</p>
<p>I really like the priority options from the USPS. There are two options here: flat-rate or regional rate.</p>
<p>First, this chart lists whether it&#8217;s better to do regional rate or flat-rate. The important thing to remember is that it&#8217;s heavily dependent on the size of the item you are shipping.</p>
<p>If it can fit, the <a href="https://www.usps.com/ship/priority-mail.htm" target="_blank">small flat-rate box</a> is preferred. It is $6.65 at the Post Office or $5.95 &#8220;commercial base&#8221; (which I think means online).</p>
<p>The only issue is that the small envelope is the inside of these boxes are 8 5/8&#8243; x 5 3/8&#8243; x 1 5/8&#8243;. This should be big enough for a 3.5&#8243; internal hard disk drive (which measures 5.75&#8243; x 4&#8243; x 1&#8243;).</p>
<p>But it&#8217;s probably not big enough for anything else (routers, external hard drives, etc.). Instead, for a flat-rate option, you&#8217;d have to go with the Medium Flat Rate Box &#8211; 1 (top loading). This costs $13.60 at the post office or $12.40 &#8220;commercial base&#8221;.</p>
<p>Instead, if you have something this big, it probably makes more sense to go with the regional rate box A1. These are 10 1/8&#8243; x 7 1/8&#8243; x 5&#8243;. This goes by zones (difference between starting and ending zone). As long as you are within 8 zones, it makes sense to go with these. If you are within one or two zones, <a href="http://www.stamps.com/usps/priority-mail-regional-rate-box/" target="_blank">it is as cheap as $6.52</a>. (Curiously, this price list is hard to come by on the USPS website. Instead, I&#8217;m linking to stamps.com.)</p>
<p>Finally, for 2.5&#8243; SSDs, you can probably get away with a padded envelope (or small flat-rate box). The prices are around the same, but there&#8217;s a lot less packaging/padding to add with the envelope.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://poojanblog.com/blog/2017/06/shipping-options-while-ebaying-electronics/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">883</post-id>	</item>
		<item>
		<title>My plane ride back from San Diego</title>
		<link>https://poojanblog.com/blog/2014/11/my-plane-ride-back-from-san-diego/</link>
					<comments>https://poojanblog.com/blog/2014/11/my-plane-ride-back-from-san-diego/#comments</comments>
		
		<dc:creator><![CDATA[PoojanWagh]]></dc:creator>
		<pubDate>Wed, 05 Nov 2014 04:54:16 +0000</pubDate>
				<category><![CDATA[Career/Work-Life]]></category>
		<category><![CDATA[DiSC]]></category>
		<guid isPermaLink="false">http://poojanwagh.opalstacked.com/poojanblog/?p=848</guid>

					<description><![CDATA[I&#8217;ve always held that you can&#8217;t judge people by appearance. I also lament the dearth of women in engineering (and STEM in general). Here&#8217;s a little anecdote: On a recent flight back from San Diego (for work), I sat next to two young women. As people boarded, I overheard snippets of banter from the two [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I&#8217;ve always held that you can&#8217;t judge people by appearance. I also lament the dearth of women in engineering (and STEM in general). Here&#8217;s a little anecdote:</p>
<p>On a recent flight back from San Diego (for work), I sat next to two young women.</p>
<p>As people boarded, I overheard snippets of banter from the two women about plans for the weekend and possibly a popular musician.</p>
<p>I started a conversation the way I start every conversation on a plane: <a href="http://www.manager-tools.com/2010/03/how-engage-your-seatmate" title="Manager Tools: where I get all my ideas" target="_blank" rel="noopener noreferrer">&#8220;How are you today?&#8221;</a> And the young lady closer to me smiled and said she&#8217;s doing great. I asked if they were going home, and she said they were on business.</p>
<p>I asked what it is that she does. We talked for a while, and I learned that they work for Abbott Labs. They are in a rotation plan that lasts 2 years, and each rotation lasts 6 months. She had done a few rotations, and one of them was in Chicago. They are both currently assigned to a location 45 minutes away from San Diego.</p>
<p>What struck me here is that this is how things used to be at Motorola (well, sort of—a better example is Intel). I was happy to hear of a company that still invests so much into young talent. That it&#8217;s a Chicago company was a nice bonus.</p>
<p>I asked what they do for Abbott, and they are both engineers. I asked if this was chemical and they said biomedical. Abbott basically spun off their pharma business as AbbVie and retained medical devices.</p>
<p>As we took off and I looked along the coast, I asked whether they worked north or south of San Diego. The young lady closer to me said north, &#8217;cause 45 minutes south would be Mexico. I smiled at my obvious error.</p>
<p>For most of the flight, I put my headphones on as they talked amongst themselves. They were clearly traveling together, and I didn&#8217;t want to be an interloper.</p>
<p>Closer to Chicago, I heard them talk about restaurants. I asked if they wanted a recommendation. The young lady closer to me reminded me that she had lived in Chicago and she knows the area. I took this rebuke to mean that they prefer to converse amongst themselves, and so I went back to reading the WSJ that I grabbed from the hotel. (I tend to be on the chattier end of things and have to watch it—especially with strangers.) I smiled and suggested that maybe she should give <em>me</em> a recommendation, seeing as how I don&#8217;t get out much.</p>
<p>Finally, near the end of the flight (when they were both quiet and seemingly bored), I asked where they went to school. They had both gone to Cal-Poly (the good one &#8217;cause there are apparently two). I asked where they want to be when they&#8217;ve finished the rotation program. They both wanted to move to the Bay area when their rotations were over. The young lady closer to me reminded me that she was almost done with the rotation program.</p>
<p>They both agreed that Northern California was Better. (I said how Northern California is nice because it is cooler and that&#8217;s good for running.) The young lady farther from me talked about how in Northern California, they say &#8220;Hella&#8221;. Like, &#8220;Hella-fun day.&#8221; But they don&#8217;t say that in Southern California.</p>
<p>At the end of the flight, I told them it was nice to meet them and I hope they have a good time this week in Chicago. I said, &#8220;Would that be a hella-good time?&#8221; They young lady farther from me laughed and said that I got it. The young lady closer to me smiled and said that I don&#8217;t have to say &#8220;hella&#8221;; she&#8217;s from Northern California and she doesn&#8217;t.</p>
<p>So, here&#8217;s why I&#8217;m bothering to write about this particular conversation: I was absolutely delighted that the young lady closer to me acted like almost every other engineer I have met—correcting factual mistakes when dealing with people. Because if you don&#8217;t correct people, they will veer off in the wrong direction. And Bad Things will happen.</p>
<p>It made me feel glad that I had evidence for something I&#8217;ve long held—that there&#8217;s no inherent difference between men and women. And you can&#8217;t judge people by the way they look. And you can only know someone by interacting with him/her.</p>
<p>And at some point in the past, these young ladies would have been encouraged to be pharma reps, not engineers. (I do not suggest that being an engineer is necessarily better than being in sales—I do suggest that reducing bias and allowing individuals to choose their own career options is better.)</p>
<p>Well done, Universe.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://poojanblog.com/blog/2014/11/my-plane-ride-back-from-san-diego/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">848</post-id>	</item>
	</channel>
</rss>
