The Pile
Collection
23 items
•
Updated
text
stringlengths 44
776k
| meta
dict |
---|---|
Facebook has hired the Patriot Act's co-author as a general counsel - Jerry2
https://boingboing.net/2019/04/22/mass-surveillance-r-us.html
======
javagram
“Jennifer Newstead helped craft the Patriot Act, a cowardly work of treasonous
legislation foisted on the American people in the wake of the 9/11 attacks;”
Source seems a little biased. Treasonous? That’s gotta require a lot of
cortortion around the definition of treason.
Patriot Act provisions have been repeatedly reauthorized by the democratically
elected legislature since it was originally passed. This isn’t a case of
foisting anything upon the people, the people are perfectly happy to vote in
supporters of the Patriot Act.
[https://en.wikipedia.org/wiki/Patriot_Act#Reauthorizations](https://en.wikipedia.org/wiki/Patriot_Act#Reauthorizations)
~~~
thundergolfer
It's well known that many members of congress passed through the act _without
having read it_. Given the enormity of the act's effects on the country, this
is quite a problematic thing.
I don't it was democracy that saw that bill through. It was crisis politics.
Democracy requires a well-informed public, and capable representatives. With
the USA PATRIOT act there was neither.
~~~
foxyv
With the current state of campaign finance, congress is essentially two
corporations with congressmen/women as employees. If you don't vote the party
line or you don't secure funding for the party you get defunded on your next
election. Surprising they don't bother to read the bills they are told to
pass.
------
canada_dry
A perfect fit really.
This guy figures it's ok to allow personal records like telephone, e-mail,
financial, and business records to be surreptitiously captured without full
due process/transparency.
Facebook would love to push the (no-)privacy envelope much further: a complete
data free-for-all for their commercial gain.
------
Jerry2
It's unfortunate that mods decided sink this story. Any explanation as to why?
------
tuxxy
What exactly... do they think is going to happen when news outlets hear this?
~~~
joshmn
The 30 minute news cycle we've had for the last 3 years of course.
~~~
isoskeles
Yeah unlike when the Patriot Act passed, and the news media spoke truth to
power or whatever, and saved us all from that treasonous law.
Apologies for the snark but it’s been like this for more than 20 years.
~~~
thundergolfer
To add to your comment. _Manufacturing Consent_ came out in 1988, 31 years
ago. That book manfully built the case that this stuff has been going on for
well over a century, but that it really kicked up in the post WW2 era with the
erosion of labour-class news media.
Today 6 US media companies control 90% of US media, and any hope one has of
the internet disarming them dims more than a little at the sight of a
P.A.T.R.I.O.T act author crossing over into the arms of a tech giant.
| {
"pile_set_name": "HackerNews"
} |
Ask HN: How to approach two competing job offers - is bidding war an option? - mbord
I studied Computer Science, and I recently graduated as a bachelor. I went on to apply to two major Silicon Valley companies, let's call them A and B, and aced the interviews.<p>I got an offer from A, which I would have happily accepted had I not had another company still contemplating their offer. Now B contacted me, not yet ready to give an offer, but they mentioned that their offer would likely be significantly larger if they would be able to see the offer from A in writing.<p>I got my offer from A both verbally and in informal writing to my e-mail. I find it clear that if I asked them for the offer in writing now, they would certainly know what's happening (given that I've kept them waiting for some time now). I told this to B already previously, they understood, but it would certainly benefit me if I had it in writing now.<p>How should this game be played in your opinion? I actually prefer A, and if B's offer were roughly the same size, I would be very happy to take A. However, I am wondering whether I am a wussy if I play it safe now, and take no action, and should I instead try to get some competition between these two. There's also a small chance that A is trying to lowball me with their offer, since I might be too humble analyzing my own value. All this leads me to think that I might just want to get the offer in writing, not caring what they think about it, but I am very very open to other ideas.<p>Also, I know that I should probably never try to bluff, and that's my intention, too - I'll never try to inflate my offer if I am not really willing to take the competing one. These both are great companies, and B can become better in my mind if their offer triumphs on the financial side.
======
gvb
_Now B contacted me, not yet ready to give an offer, but they mentioned that
their offer would likely be significantly larger if they would be able to see
the offer from A in writing._
I see nothing but red flags here.
It also sounds like you are already dabbling with a bidding war... you are
holding back on A, B knows about A, B is "offering" to out-bid A. Now you are
wondering if you can leverage a questionable offer from B to up A's offer.
If you escalate this further into a full out bidding war, the probability is
high that it won't turn out well. If B wins, you work for a sketchy company
just for the money... or they don't come through with a _real_ offer, A drops
out (note that you do not have a _formal_ offer from A yet), and you are
screwed. If A wins, the person you work for knows what you did to them and
resents it.
Sorry to be harsh, but from the outside looking in, B sounds pretty sketchy
and your line of questioning doesn't reflect well on you.
------
antidoh
"I recently graduated"
"aced the interviews"
"I got an offer from A"
" I actually prefer A"
"B can become better in my mind if their offer triumphs on the financial
side."
I believe that last is the only untrue thing you've said.
You're young, capable and have a lot of years in front of you. Work where you
want and enjoy it.
------
helen842000
I think B only want to see the letter in writing so that they can go slightly
above what A has offered.It makes no sense to go largely over.
Why not ask B to make a blind offer based on the value you can bring and what
you're worth, tell them you're not interested in them upping A's offer, just
formulating their own based on value not competition. You want to hear what
they would have offered without company A in the picture.
Not only do you come across less money-motivated but I think you're more
likely to get a higher offer from B this way. Plus if you do get company B's
offer in writing - maybe you can take that back to A.
After all if you prefer company A, you should be going with them regardless.
------
ggk
IMO, there is no harm asking for formal offer letter (probably a soft copy).
But I would suggest choose the job which is of your interest. Salary should be
the second factor. If you choose a job of your interest, you will perform well
there and your career growth will be much faster there.
~~~
pmtarantino
That's my opinion too. I worked in two different jobs in the last years. One
of them was in company A, which I always wanted to be part of. The salary was
not amazing (in fact, after of some talk with friends, it was low), but I was
happy. Then, I worked in company B. The salary was superb, it was higher than
average, but I was not happy. That was not what I wanted. I quit.
------
lsiebert
ask for offer in writing, explain why, and that you'd prefer A, see if they
are open to matching B's offer. If so, you might want to take their initial
offer to B.
Get B's offer in writing and go to A. Tell A if they match it, you'll work for
them.
Do so, that is, if they match B's offer, work for A. Explain to B, but invite
them to contact you sometime in the future to see if you are happy at A. Use
B's contact to either move to B if A isn't great or to negotiate from position
from strength at A.
But work at A to start with.
| {
"pile_set_name": "HackerNews"
} |
CIA bought an encryption company and used it to spy on clients and countries - edu
https://www.businessinsider.com/cia-secretly-bought-encryption-company-crypto-ag-spy-countries-report-2020-2
======
ekimekim
Original Washington Post article discussed here:
[https://news.ycombinator.com/item?id=22297963](https://news.ycombinator.com/item?id=22297963)
------
cryptos
The same could happen with Threema. As much as I like and want to trust
Threema, but the story could be repeated, even if I think, that it is not used
by governments or military large-scale.
Essentially every closed source crypto application isn't trustworthy. Same is
true for operating systems.
~~~
bangboombang
Exactly my first thought. I like Threema and one of the reasons I was an early
adopter is that the founder worked on m0n0wall before, an OSS firewall that I
used for a long time, in contrast to it being just some guy I never heard of.
It made me accept the closed source nature. Another big factor was that I
indeed consider Switzerland to be a more trustworthy/neutral party in general
when it comes to global politics, but this obviously doesn't have to apply to
every single individual in that country.
~~~
_-___________-_
Why use Threema when there are alternatives that are not closed-source? You
had to begin to use Threema, which presumably carries the same difficulty as
beginning to use something which isn't as questionable.
~~~
mmPzf
A big plus for me was the option of using it without mapping the user account
to a phone number, something that e.g. Signal doesn't allow.
------
fit2rule
The free world needs to realise that no matter what systems of enormous value
to the world we build, others will attempt to usurp that power for their own
needs.
It happens with all technology. The reason is, all technology can be
weaponised.
Some simple facts .. The institutions covered by Crypto AG's technology
products, were attempting to maintain their own secrecy. They were, thus,
usurped by their own technology - and the CIA merely exploited this fact.
This case with the CIA directly addresses the lynchpin in the military-
industrial-surveillance states' armour - the ability to keep secrets.
From a certain perspective, one might say that .. the Vaticans .. inability to
keep secrets is a blessing and a curse. This is also true of many of the other
clients. Would that we had access to all the things the CIA knows, as a world
people, mmm..
These groups weaponised their own technology, against themselves, by using it
to keep secrets. It also happens to be the spooks' biggest weakness too: the
light of truth melts any and all justification for these peoples existence,
and it whither them.
Let us try a thought experiment: If the Vatican applied its vast resources to
providing a "Peoples Internet" a la Starlink, instead of using its billions to
hide heinous secrets, would the technology of communication have been so
easily weaponised?
All secrets are weapons, because you cannot have a secret without technology -
and all technology can be weaponised.
So this is a foot-bullet on the part of Crypto AG, the Vatican et al., and a
big win for the CIA - because it means these institutions will now be making
_more_ commitment, alas not less - to the keeping of secrets.
------
jo-m
A lot of this has been known for 25 years:
[https://www.spiegel.de/spiegel/print/d-9088423.html](https://www.spiegel.de/spiegel/print/d-9088423.html)
------
lallysingh
Is this why US export encryption had to be 40 bits? To push countries to a
vendor that was compromised?
------
jokoon
Is the leak coming from wikileaks? I've heard Assange will soon go to trial. I
was still wondering about that "dead's man switch", although I'm not sure it
will activate if he get convicted.
~~~
_-___________-_
I read about this quite a while ago, and while it's a revelation, it doesn't
seem big enough to be Assange's dead man's switch. Most people are just going
to shrug at this.
~~~
fit2rule
I have heard it from the crypto cognoscenti circles I know, that this is the
calm before the storm and that there will be many, many more leaks to come
during the actual trial period.
The idea is to point out to the world that Julian isn't the only leaker.
This terrifies the spook establishment, and they are therefore preparing for
their own campaign of controlled releases, designed to dull the general
publics' appetite for the subject.
I mean, this is all conjecture and hearsay, but it sure is an interesting time
to be watching the show. I do believe we are seeing a cyberwar, like
legitimately, underneath all the battle reports ..
| {
"pile_set_name": "HackerNews"
} |
ZURB Tavern - jacobwg
http://zurb.com/tavern
======
pepsi
By the name, I thought that this was going to be a MUD.
| {
"pile_set_name": "HackerNews"
} |
Is there a ProductHunt without the “selection process”? - hoodoof
i.e. a site that actually shows what's new, not just what ProductHunt thinks we should see is new?
======
ledil
[http://www.produktfang.de](http://www.produktfang.de)
I'm the author of produktfang. We aggregate new apps and show them on the
front page ... there is no "community" that decides what should be shown or
not like in producthunt.
------
getdavidhiggins
[http://urli.st/](http://urli.st/)
Lots of products can be found on URLIST. It's basically product hunt, except
not sabotaged by trends and a karma system
| {
"pile_set_name": "HackerNews"
} |
Dear Facebook, It Could Really Be This Simple - ezdebater
http://techcrunch.com/2012/08/02/zucks-karmas-bitch/
======
salman89
While I don't feel Facebook is doomed, this article really lacks meaningful
content.
"And, if it can leverage the physical goods loophole on iOS, it can become the
social shopping platform.
So buh bye lame “Social stories” and buh bye Amazon (which currently has a
$100b market cap, around twice that of Facebook)."
Really, Facebook's save is social shopping... and that would upend Amazon?
~~~
mtgx
Sounds like a pie in the sky theory, like the one that floated around a few
years ago that Facebook only needs to introduce search, and it could kill
Google.
~~~
majani
Time's clearly up for selling investors on the future of Facebook. Investors
want to see results now on these tech companies.
------
Freestyler_3
What is the last thing facebook implemented that 10% or more of the users are
now using?
------
mariusz331
I wouldn't advise this guy putting money into facebook just yet. A stock's
price is supposed to reflect all information pertaining to a company
(including a lock-up expiration). However, as with Groupon and LinkedIn, the
price before their lock-ups expired didn't correctly reflect the value of the
stock with all the 'unlocked' shares flooding the market.
I speculate that facebook's price will continue to go down post lock-up.
Insiders aren't ignoring the poor news or outlook and I think they'll sell for
more reasons than those. That's not necessarily because these insiders don't
trust their company. They may have to pay off expensive things (maybe a nice
home?) they bought when the company IPO'd and can't risk the uncertainty of
facebook's future value. Also, if you ask any investor, they'll tell you that
diversifying your portfolio is important.
Another interesting thing to think about are tax implications. I know a lot of
facebook insiders were happy that their IPO was pre-July because otherwise,
the lock-up would have crossed into 2013. This is when taxes on capital gains
are expected to rise and it can cost them a lot of money.
I'm curious to see the performance of the stock in the coming months.
Especially with the uncertainty of growth, possible tax increases, and the
implications of the lock-up expiry, this will be an interesting journey for
facebook.
------
redwood
It does feel like FB could rake in enormous amounts of cash quickly if it
really wanted to, but then doing so would kill its long-term viability.
Trouble is it's current approach seems death by a thousand pokes. I suppose
the execs who've already cashed out already had their payday. Sorry the saps
who bought...
------
jgroome
Not quite sure what they're suggesting. A wishlist system, whereby I have a
bunch of products in which I've expressed an interest? Some kind of digital
gifting system where people pay money to buy virtual "presents"?
In the case of the former, we already have Amazon wishlists, or I suppose
someone could go through my Pinterest and see what I like. In the case of the
latter, if anyone actually bought me a digital gift then they'd probably get
unfriended.
If Facebook can come up with a wishlist system to rival Amazon's then people
will absolutely flock to it.
------
bitdiddle
What the "I don't trust Zuck" means to conservative investors (senior
programmers, parents, and other fossils) is that management counts, in fact to
old fogies like Buffett it's a major league concern.
The same thing that holds true of a YC company is true of large corporations.
To channel Lombardi, "management isn't everything, it's the only thing"
------
paul9290
Recently there was a shower curtain with the design of a Facebook
profile/users wall.
It was being widely shared throughout FB. Why isn't Facebook attaching an
affiliate link under these types of photos to where I can buy the product or
service?
~~~
majani
There are other apps that have been built on the Facebook platform for that.
Facebook has to stay out of their way in order to remain a true platform.
~~~
paul9290
Are they built into users' news feeds?
------
brador
It gets interesting when the giants start competing.
Facebook moves into real goods, to compete, Amazon then needs to start a
social network.
If Google starts gaining market share on Google Plus, Facebook will step into
the search space.
------
ahi
She want's to give monetization advice, but doesn't even know how to buy
stock?
------
parbo
Wrapp does this, but with gift certificates. Multiple friends can chip in to
the same gift certificate. <https://www.wrapp.com/>
------
se85
I'm glad I stopped reading Techcrunch.
------
maked00
farcebook seems intent on pulling a "Digg" crash and burn. Same kind of
swamped in hubris jerk pulling the strings. Notice the Zuck, cashed out quite
a bit recently. What does he know that we don't? Maybe that the site is a fad
and the bubble is bursting in slomo.
~~~
xSwag
Except, this time, there is no Reddit to fall back to.
------
mser
Why is this nonsense being voted up?
| {
"pile_set_name": "HackerNews"
} |
Passive solar glass home: watching the sun move - kirstendirksen
http://faircompanies.com/videos/view/passive-solar-glass-home-watching-sun-move/
======
jbrun
If you are keen on this, see Amory Lovins talk on buildings: Short version:
<http://www.youtube.com/watch?v=DvmHJNeif24> Long Version:
[http://www.youtube.com/watch?v=O5txQlEI7bc&feature=chann...](http://www.youtube.com/watch?v=O5txQlEI7bc&feature=channel)
------
electromagnetic
Rather impressive, but genuinely simple. He maximized sunlight in the winter
while minimising it in the summer and increased the buildings connection to
the earth below frost level where the ground stays a constant 14C/57F year
round.
------
timmaah
My dad built the house I grew up in like this in the mid 70's. Big south
facing windows with large overhang. Brick wall sucks up the heat for the
night. Our greenhouse had huge 20ft high cylinders filled with dyed black
water. Worked great.
What happened in the 80s and 90s to make this not as popular?
~~~
kirstendirksen
Passive solar used to be the way everyone built... at least before way back
with the Ancient Greeks and Chinese. But when we stopped relying on sun for
energy, most of us stopped building this way.
I would guess passive solar gained popularity in the seventies due to more
attention to energy conservation (oil crisis and all) and then when oil got
cheap again, it wasn't so trendy. Hope that's not that case now.
Though cheap oil and global warming aside, I'd still prefer to live in a home
heated by the sun and cooled by the earth. AC gives me a headache and I much
prefer the feel of sun through a window than the blast of central heating.
------
kjell
Earthships are worth a look for anyone who wonders why the average modern
house is so wasteful.
| {
"pile_set_name": "HackerNews"
} |
Atomic Scala - blearyeyed
http://www.atomicscala.com/book
======
thebluesky
Glad to see Bruce Eckel involved. It's interesting to see just how many Scala
books have been cranked out in the last 6-12 months or are currently in
progress.
------
Toshio
<p>You can download the first 25% of the book <strong>here</strong>.</p>
Ummm ... where?
~~~
thebluesky
Seems he forgot the link. Another excellent book for learning Scala is Scala
for the Impatient. The first 9 chapters are free:
<http://horstmann.com/scala/>
~~~
michaels0620
The link is now working.
| {
"pile_set_name": "HackerNews"
} |
Only 25% of Internet Users Trust the Cloud – Survey - pain_perdu
https://medium.com/@intelligentvox/we-live-in-the-big-cloud-and-we-hate-it-is-it-time-for-hipster-it-1f130a44d2b8#.axo45awhb
======
flukus
Judging by the conversations I've had on HN, a lot of people here will be
surprised by this. Personally I'm slowly moving away from the cloud, it simply
doesn't give me enough options to do what I want with my data.
The most likely effect phrases like "cloud based" and "web app" have is to
make me lose interest.
| {
"pile_set_name": "HackerNews"
} |
The 25% Discount that Cost Us $12,000 (Plus, a Big Announcement) - ph0rque
http://www.groovehq.com/blog/discounting
======
eterm
I'm confused, the article starts with "Don't do heavy discounting, don't give
away your stuff too easily" then ends up "Here's a load of discounts!".
What was the message you wanted to give?
~~~
mcintyre1994
They did say extended free trials did work for them, and while I struggle to
believe long-term free users convert better than discounted users, that's what
their data says. Most of their offers seem to be very extended free trials.
------
timje1
These article titles are very link-baity, regardless of their relevance to HN.
| {
"pile_set_name": "HackerNews"
} |
Downloading a file regularly - how hard can it be? - joeyespo
https://adblockplus.org/blog/downloading-a-file-regularly-how-hard-can-it-be
======
sophacles
A common solution to this problem, is to make a 2 stage process, where step 1
is a request of "should I download?", where there are 2 possible replies: "no,
check again in N time" and "yes, here is a token". Step 2 is then presenting
the token to the api point for download, and getting the file.
On the server side, you don't even need specific instance tracking, just a
simple decision based on current resource usage, and a list of valid tokens
(optionally, they can expire in some short time to avoid other thundering herd
type issues). Say, you set a max number of file transfers, or bandwidth or
whatever metric makes sense to you, and you simply reply based on that metric.
Further, you can smooth out your load with a bit of intelligence on setting N.
Even better, you get a cool side-effect: since the check isn't so resource
intensive, you can set the time between checks lower, and make the updates
less regular.
Now that I think of it: it seems that this would be a nice nginx plugin, with
a simple client side library to handle it for reference. Anyone want to
collaborate on this over the weekend? Should be relatively straight-forward.
~~~
masklinn
> A common solution to this problem, is to make a 2 stage process, where step
> 1 is a request of "should I download?", where there are 2 possible replies:
> "no, check again in N time" and "yes, here is a token". Step 2 is then
> presenting the token to the api point for download, and getting the file.
You don't even need two steps, just have one step with previously known data.
That's how HTTP conditional requests (Last-Modified/If-Modified-Since and
ETag/If-None-Match) work: the client states "I want this file, I already have
one from such moment with such metadata", and the server replies either
"you're good" (304) or "here's your file (200).
Issue is, that only works when the file changes rarely enough, or you need
additional server logic to reply that the file is still good when it's not.
> Now that I think of it: it seems that this would be a nice nginx plugin,
> with a simple client side library to handle it for reference. Anyone want to
> collaborate on this over the weekend?
I'd be _very_ surprised if nginx didn't support conditional requests already.
edit: according to [0] and [1] — which may be outdated — Nginx provides built-
in support for last-modified on static files, it does not provide ETag support
(the developer believes this is not useful for static files — which is usually
correct[2]) but [1] has apparently written a module to do so [3]. The module
being 4 years old, it might be way out of date.
[0] [http://serverfault.com/questions/211637/what-headers-to-
add-...](http://serverfault.com/questions/211637/what-headers-to-add-for-most-
efficient-file-caching)
[1] [https://mikewest.org/2008/11/generating-etags-for-static-
con...](https://mikewest.org/2008/11/generating-etags-for-static-content-
using-nginx)
[2] There are two situations in which it is not (keep in mind that this is for
_static_ content, dynamic is very different): if somebody willfully touches a
file, it will change its Last-Modified but not its checksum, triggering a new
send without ETag but not with it; and ETags can be coherent across servers
(even in CDNs), the chances of last-modified being exactly the same on all
your servers is far smaller.
On the other hand, no etag is better than a shitty etag, and both Apache and
IIS generate dreadful etags — which may hinder more than help — by default.
[3] <https://github.com/mikewest/nginx-static-etags/>
~~~
sophacles
Yes, this work for cache updating, and it is fantastic for that purpose. It
does not solve the actual stated problem, which is that periodic checks in an
attempt to smooth server loading away from peaks don't usually drift towards
extremely bursty behavior. When the file does change, you still get a large
number of clients trying to download the new content all at once. The solution
I was suggesting is similar to what you are talking about, but also has the
feature of smoothing the load curves.
_Issue is, that only works when the file changes rarely enough, or you need
additional server logic to reply that the file is still good when it's not._
My algorithm is that logic -- albeit implemented with client side collusion
rather than pure server side trickery (this allows better control should the
client ignore the etags).
~~~
masklinn
> The solution I was suggesting is similar to what you are talking about, but
> also has the feature of smoothing the load curves.
It has no more feature of smoothing the load curve than using Cache-Control
with the right max-age.
> My algorithm is that logic
It is no more that logic than doing what I outlined with proprietary
behaviors.
> this allows better control should the client ignore the etags
by making the whole client use a custom communication channel? I'd expect
ensuring the client correctly speaks HTTP would be easier than implementing a
custom client from scratch.
~~~
sophacles
You still seem to be missing the point. Cache-Control as implemented commonly,
and by your description, will instantly serve every request the new file as
soon as a new file is available. It takes into account exactly one variable:
file age.
The algorithm I describe takes into account variables which affect current
system loading, and returns a "no, try again later", even when the file is
actually different, because the server is trying to conserve some resource
(usually in such cases it is bandwidth). Like I said, this can be done with
etags, but a more explicit form of control is nicer. Which brings us to this:
_> this allows better control should the client ignore the etags
by making the whole client use a custom communication channel? I'd expect
ensuring the client correctly speaks HTTP would be easier than implementing a
custom client from scratch._
A client speaking proper http would be perfect for this. So point your http
client to:
domain.com/getlatest
if there is a token available, respond with a:
307 domain.com/reallatest?token=foo
If no token is available and no if-modified headers are sent, reply with:
503 + Retry-After N
if there is not a token available, and the requestor supplied approrpiate if
modified headers respond with a:
304 + cache control for some scheduled time in the future (which the client
can ignore or not)
Of course that last condition is strictly optional and not really required,
since then it would be abusing cache control, rather than the using 503 as
intended.
(also note, a request to domain.com/reallatest with an invalid token or no
token could result in a 302 to /getlatest or a 403, or some other form of
denial, depending on the specifics of the application).
edit: Strictly speaking, the multiple url scheme above isn't even needed, just
a smart responder associated with the 503 is needed, however the url redirect
method above was there because there may be a larger application context
around system, in which getlatest does more than just serve the file, or in
which multiple urls would redirect to reallatest, both easily imaginable
situations.
~~~
masklinn
> If no token is available and no if-modified headers are sent, reply with:
> 503 + Retry-After N
That's cool. There's still no reason for the second url and the 307, and
you're still getting hit with requests so you're not avoiding the request
load, only the download. You're smoothing out bandwidth, but not CPU &
sockets.
~~~
sophacles
This is sort of true. I don't know of a way to simply limit the number of
incoming sockets without getting a lot of ISP level involvement or just
outright rejecting connections. It does limit the number of long-lived sockets
for file transfer. On static file serves, I am assuming the cpu has plenty of
spare capacity for doing the algorithm, so I am not worried about that.
Finally I am assuming the limiting factor is bandwidth here, so bandwidth
smoothing the main goal.
------
moe
I assume changes are usually small, you may want to try serving diffs?
I.e. have the clients poll for the md5 of their _current_ list-version.
On the server store the diff that will upgrade them to the current version
under that filename. If a client requests an unknown md5 (e.g. because he has
no list or his list is corrupted) default him to a patch that contains the
full file.
This requires a little logic on both ends (diff/patch), but would probably
slash your bandwidth requirements to a fraction.
A little napkin math:
25 lists * 150kb * 1mio fetches = ~3.75T
vs
25 lists * 1kb (patch) * 1mio fetches = 25G (0.025T)
~~~
pjscott
This is probably the Right Way, but it would be more work than minor tweaks to
the delay logic.
------
K2h
call me oldschool, but having a huge peak demand is the perfect application
for distributed source, like torrent. I know it is much more complicated to
introduce P2P and way more risky if it gets poisoned, but it seems to me this
underlying problem of huge peak demand was solved 10 years ago.
~~~
nitrox
but there is a problem with bittorrent. Most Schools and works places block
bittorrent. We would need to fallback to http or any other method that works
in restricted places.
~~~
skeletonjelly
I wonder if there's a market for Bittorrent over HTTP? Node.js,
websockets...surely it's possible?
~~~
icebraining
All of those are strictly client-to-server, not P2P. You could in theory proxy
bittorrent over it, but you wouldn't gain anything over just serving the file
from the server.
You can probably write a true P2P client as a Firefox extension, since its API
gives you very low level access (raw sockets, for example), but certainly not
for e.g. Chrome.
~~~
AntiRush
WebRTC[1] seems to be the perfect platform for these sorts of things. It's in
Chrome dev channel / Firefox Alpha right now.
[1] <http://www.webrtc.org/>
------
fleitz
I love random numbers for distribution. I had a similar problem with a set of
distributed clients that needed to download email, but only one client
downloading at a time. The email servers also had an issue where a large
number of emails in the inbox would cause the server to slow down
exponentially. (eg. it didn't matter how many MB of email were in the inbox
but it did matter if there were more than about 1000 emails)
The downloaders would download the list of inboxes to be fetched, randomize
them and then lock the inbox when they started downloading, then the
downloader would randomly pick a size cutoff for the max email size it would
download, 10K, 1 MB, unlimited with a n inversely proportional maximum email
count so that about 100MB could be downloaded at anytime.
We even had an issue with one server behind an old cisco router that barf'd on
window scaling, so a few machines in the pool had window scaling disabled and
that account would naturally migrate to those servers with window scaling
disabled.
It worked wonders for distributing the load and keeping the Inbox counts to a
minimum.
------
fromhet
I know it's overkill for a browser extension, but wouldnt this be easily
solved by having built-in bittorrent for updates?
The publisher would always be seeding the latest version, and the clients
would connect maybe every other day. It would lower the preassure on the
publishers servers and make sure everyone could always have the latest
version.
With theese fancy magnet links, the publisher would only have to send the
magnet and the actual file a couple of times, and then the peer to peer swarm
would do the rest.
------
kogir
I would just sign it, stick it on S3, and forget it. Did I miss why that
wasn't considered?
~~~
nitrox
It is too expensive. 1TB of bandwidth costs about $120. A project like adblock
plus will be consuming about 3 - 4 TB a month which will add up to around $450
a month.
Adblock list subscriptions are maintained and hosted by individual people who
do at their spare time. They mostly pay for the servers out of their pockets.
As one of the co-author of popular adblock list, I wouldn't want to break my
bank to pay for S3 hosting. Our current solutions works out and when we reach
our bandwidth limit, we could just simply buy addition TB of bandwidth at a
much cheaper price than S3.
Btw, i just made a rough calculation using AWS simple monthly calculator. So
correct me if I am wrong about S3 pricing.
~~~
tedunangst
Terabytes per month? That's insane. That's a million users (I can believe)
downloading a megabyte (I can't quite believe). It appears my patterns.ini
file is 600K, or about 150K compressed, so if I download it 30/5 = 6 times a
month, that's... a megabyte. Wow.
~~~
tripzilch
Wow, that suggestion elsewhere in the thread, to serve diffs instead seems
rather important now :)
------
antihero
Why not assign people a day and time, and then if they regularly miss that
time, assign them a different one?
------
tantalor
> with the effect that people always download on the same weekday
What's so bad about that?
~~~
rmc
Server load goes really high on that day, and if you get more popular, you'll
need more servers and hence more money.
~~~
rb2k_
Isn't that something that nginx/varnish should easily be able to handle? It is
just a static file download after all...
~~~
ComputerGuru
CPU and bandwidth are entirely different issues. Sure, nginx can handle the
processing. But do you have the piping to match?
A run of the mill dedicated server has a 100mbit uplink. Do the math. (Hint:
it's easy to saturate in no time).
~~~
prostoalex
Has anybody tried <https://developers.google.com/speed/pagespeed/service> for
this?
~~~
oconnor0
This is just downloading a single static text file so there's nothing to
optimize.
| {
"pile_set_name": "HackerNews"
} |
Google is completely redesigning AdWords - uptown
http://searchengineland.com/adwords-redesign-first-look-246074
======
eggy
In Dart and Angular 2. I have to take a look at Dart again. I thought it was
going to be left to wither and die, but with Flutter and now this, I have to
go back and take another look. The tooling was fun, and they are developing or
have developed a 'strong mode' for stronger typing.
------
rylest14
Love the new interface - going to make Adwords much more user friendly!
| {
"pile_set_name": "HackerNews"
} |
Pornhub handing out free premium subscriptions to help Italy fight coronavirus - ignaloidas
https://thenextweb.com/shareables/2020/03/12/pornhub-free-italy-coronavirus/
======
paul_milovanov
Who said the civic spirit is dead? Thank you MindGeek for your service!
| {
"pile_set_name": "HackerNews"
} |
Ask HN: Minority Report with NSA data? - klasdfakaf
Just a thought experiment. Can we prevent crimes from happening with NSA backed data? Can we use AI to predict the actions of individuals and then take action before they do? Like using browser history patterns and linking it with suspicious phone calls and online posts etc.
======
w_t_payne
In a sense, yes, but it will not look like the highly accurate oracle that the
film presents.
What you will be able to do is to, for example, rank people by how similar
they are to specific examples.
Say, for example, you were a dictator that wanted to cement his authority on
the nation.
You could rank your entire population by how similar their behaviour appears
to be to known dissidents, and then implement strategic discrimination based
on that ranking: targeted imprisonment, punitive taxation, barring from
positions of power & property ownership etc... etc...
| {
"pile_set_name": "HackerNews"
} |
How to market my NoSQL technology - tom_andersson
I have been developing a technology which best can be described as an object oriented / graph NoSQL database, and I need some ideas on how to market it. Check out my web site at: http://www.clear-objects.com/clearodb<p>The end users would be software developers who writes distributed applications. I haven't thought to much about it's use for web site development, but maybe that could work too.<p>I am a bit lost as to what approach to take to get this out. I think, the best way is to somehow find individual users who can see the value and that way step by step build up a customer base. I don't think open source is necessarily the way to go (in my life as a professional developer, I have never made a decision to use a technology based on whether it is open source or not, but rather whether it will save me time). I guess the main problem is to convince people that this technology will save them time.<p>Questions:
- Anyone who has launched products to a similar market who has any experiences to share?
- Any thoughts on whether an open or closed source approach is better? Would I be more successful in making money long term, if I have a large number of users who use it for free?
- I don't really want to sell this as a database technology, but rather a cost saving tool for creating distributed applications (that was really the problem I tried to solve in the first place, it just turned out to be a graph database). Any thoughts on this?
======
opendomain
There are over 100 different NoSQL databases - so you have to definately show
something on how your software is better. Most NoSQL are open sourced and are
free to use for limited installs, so it will be very hard to make money with
licensing. Some offer a base version for free, but offer clustering or other
advanced features at a cost. Some charge money for consulting. Where does your
db sit on the CAP spectrum? How is it the best for a specific use case?
~~~
tom_andersson
Yeah, I realise there are quite a few nosqls around. But only a few have just
recently started to gain momentum. It is still very easy to find developers
who have never heard of anything but traditional relational databases (not
sure if I would dare to say the majority of all developers). In most cases
relational databases is the best option for what they are doing, but I think
there are many situations where people choose the old sql just because they
don't know better. So, although there might be a point in comparing and
competing between different NoSQL technologies, I think all within the NoSQL
movement can gain from better marketing to all these relational database
users.
Anyway, I think what you are saying is I need to be very good at describing
why my technology is better than others, which as a developer I find very
difficult. It is easy to be technical about it, but how to describe something
at a level that makes sense to the average guy is something I am still trying
to learn.
What my solution does very well is integration with object oriented languages
and where the data is described by complex inheritance structures and
ownership relations (say a financial model with different types of financial
instruments, different types of market data, static data, deal data, etc which
would be described by a number of class hierarchies; and all linked together).
With the risk of getting too technical, if you are building a C++ application
for example, you only create your C++ classes (with any inheritance structure
which can be single/multiple etc), and you can use pointers to other objects
(polymorphic pointers and cyclic graphs are ok), use standard collection
classes etc. Basically what you would normally do when designing a C++
application. You use a minimum amount of declarative code as C++ doesn't have
built-in reflection. You send your C++ classes to the database and receive the
data as your C++ classes. It traverses your objects to find all linkages to
other objects prior to sending and links objects together upon retrieval. In
short, the solution tries to make life as easy as possible for an application
programmer.
What my solution does in terms of CAP and ACID: Atomicity - A transaction is
either committed in full or not at all. A transaction may consist of one or
multiple objects.
Consistency - No consistency checks in the sense that there are defined
constraints on the member fields. However, all objects are versioned, and if
two clients are trying to commit the same version of an object, the second
client will fail and it would have to retrieve the most recent version before
updating the object.
Isolation - All transactions are processed in isolation, i.e. all objects in a
transaction are locked prior to being updated
Durability - Transactions are never overwritten, i.e. new transactions are
always added to the end of the data store. If a transaction has completed
successfully, you can be certain that the transaction will be completed even
after a server crash.
Availability - Concurrency is handled by locking objects. Many clients can
read simultaneously, but if you try to read an object that is locked for
writing by someone else, you will have to wait (there is room for improvement
here). If you try to write to an object that someone else is writing to, you
will fail. I have not looked into performance of a large number of clients,
however the simple answer is that consistency is prioritised above
availability.
Partition Tolerance - None at the moment. I have not looked into distributing
the database yet.
~~~
opendomain
Please contact me - I would love to discuss. [username] at NoSQL dot com
| {
"pile_set_name": "HackerNews"
} |
In 5 Minutes, He Lets the Blind See - laex
http://www.nytimes.com/2015/11/08/opinion/sunday/in-5-minutes-he-lets-the-blind-see.html?_r=0
======
Elte
My mom used to tell me about a similar procedure she would perform to help
people with cateracts in Africa 30 years ago, so I'm a bit confused. I'm not
saying this isn't awesome or special, just a bit curious what has changed to
make it particularly special _now_.
EDIT: So I asked her, it seems the main difference is the new lens they're
putting in. With a cateract the lens is clouded and the essence of this
procedure is cutting out that lens so that light reaches the retina once more.
30 years back they did not have new lenses to put in though, so (quote) "we
would send everyone home with +10 glasses". She also recalls the expeditions
into Nepal going into the mountains to operate cateracts 14 consecutive days
full time even back then (takes a while to get up to 100.000 I suppose :]).
So it used to be they were getting people who saw nothing to see something.
Now they get people who see nothing to see really well, which is of course
huge.
~~~
eps
Lower cost, probably. But if your mom is around, perhaps just ask her instead
of HN?
~~~
Elte
That e-mail went out before I posted here, and I fully intend on providing the
answer myself ;). Should've probably made that more obvious. EDIT: Updated
with the answer!
------
stevetrewick
Quite a few things bug me about this piece.
>I’m on my annual win-a-trip journey, in which I take a university student
with me on a trip to the developing world to cover underreported issues.
Firstly, I don't think this is 'under reported', I've seen at least two full
length documentaries about this procedure in Nepal, the project has its own
Facebook page [0] and a Google search for 'Nepal cataract' turns up lots of
trad media results.
Secondly, if the author has taken a student to cover things, why aren't e
reading the student's piece ?
Lastly, the author - like most people who haven't undergone this type of
surgery - falls into the trap of breathlessly hailing this as a miraculous
cure for blindness. It's not. While the restored sight is absolutely better
than having cataracts and will indeed cheer you up in the immediate term, the
vision provided by the replacement lenses is a far cry from a person's natural
vision, for one thing these lenses have a fixed focus. Another issue is the
limited life span - eventually they fur up, but don't go hard like UV induced
cataracts - which necessitates replacement or laser surgery.
Humans - particularly the kind that live up mountains in Nepal - are adaptable
and can cope, but as someone who has had this surgery (and the follow up laser
surgery) it annoys me that reportage routinely fails to mention these kinds of
things.
In this particular case, it is also quite peculiar that the author fails to
point out that handing out a $5 pair of sunglasses would prevent the cataracts
in the first place (these are pretty much all UV induced). Education and
prevention in this respect _are_ very much under reported.
[0]
[https://www.facebook.com/cureblindness/](https://www.facebook.com/cureblindness/)
~~~
IkmoIkmo
> handing out a $5 pair of sunglasses would prevent the cataracts in the first
> place (these are pretty much all UV induced).
I've also heard that vitamin sufficiency prevents UV induced cataracts, is
this true and on what scale would vitamins be sufficient? Introducing a
particular crop with the particular vitamin to the local farmers, potentially
a GMO crop, or selling supplements or adding vitamins to food (e.g. in the
Netherlands I know virtually all bread has government-encouraged iodine to
prevent iodine deficiency illnesses and effects, not sure if it's a worldwide
standard, but iodising table salt is common practice for the majority of the
world, too) might be a practical alternative.
------
curiousAl
Modern (science-based) medicine is a miracle of biblical proportions.
~~~
fasteo
Cataract surgery is not exactly modern medicine. There are records [1] of
cataract surgery as far as 2500 BC, that is, more than 4000 years ago.
[1] [http://cdn.intechopen.com/pdfs/42710/InTech-
The_history_of_c...](http://cdn.intechopen.com/pdfs/42710/InTech-
The_history_of_cataract_surgery.pdf)
~~~
afsina
Removing the infected lens is something, replacing it with an artificial
intraocular lens implant is something else.
------
pmontra
Bypass of the NY login: original text from
[https://translate.google.com/translate?hl=es&sl=en&tl=es&u=h...](https://translate.google.com/translate?hl=es&sl=en&tl=es&u=http:%2F%2Fwww.nytimes.com%2F2015%2F11%2F08%2Fopinion%2Fsunday%2Fin-5-minutes-
he-lets-the-blind-see.html%3F_r%3D0&anno=2&sandbox=1)
------
rokhayakebe
This guy needs a kickstarter, or GoFundMe, or some other easy way to give him
$25. Imagine a "LET'S FREAKING END CATARACT BLINDNESS" movement.
~~~
_mgr
[http://www.hollows.org.nz](http://www.hollows.org.nz)
The Fred Hollows Foundation has been doing this since at least 1992 around the
world including Nepal where Dr. Hollows and Dr. Ruit worked closely together.
Unfortunately Dr. Hollows passed away years ago but the foundation continues
his work.
------
Kiro
I can recommend "Inside North Korea" (National Geographic) where he's treating
cataracts in NK.
------
ck2
I'm curious what $25 per eye translates into American healthcare prices?
$1000? $2500?
~~~
psykovsky
$25,000 probably.
| {
"pile_set_name": "HackerNews"
} |
Feedback wanted: Any demand for 18x24 Business Model Canvas posters? - mgav
http://aintnojive.com/
======
mgav
@rman666 - Thank you! Yes, I wanted to print the free PDF on Friday last week,
so I looked on the Kinkos website (and a host of others) and all showed $45-
to $50- for one 20x24 poster, which seemed ridiculous and made me think there
might be something here. Based your experience, it's now obvious there isn't.
I'll zip to Kinkos, spend $4 and be on my way. THANK YOU AGAIN!
------
mgav
Thank you for generously sharing your feedback about whether anyone wants
these or not (better to find out now, before buying inventory)
------
rman666
The BMC is a free PDF. I took it to FedEx (Kinko's) and they printed it 18x24
for $4.
| {
"pile_set_name": "HackerNews"
} |
FBI director: Cover up your webcam - grej
http://thehill.com/policy/national-security/295933-fbi-director-cover-up-your-webcam
======
6t6t6t6
From all they ways I can be spied, the webcam is the one that concerns me the
least.
At the end, all they will see is a bearded man staring to the front. May they
be able to see me naked? Well, probably, but I honestly don't think that they
will make a lot of money by selling my naked pictures... My wife tells me that
I still look good, but I suspect that she is being nice to me.
What would scare more is that they manage to capture what is on my screen, or
install a keylogger, or activate the microphones to hear my conversations, or
that they access my hard disks and steal data, including my private keys.
Hey, but putting a sticker on your webcam is a way to show how 1337 your are!
I prefer not to have to bother removing stickers every time I want to do a
Skype call.
~~~
matt_wulfeck
You're displaying a common trope I see sometimes with security:
> "because this particular thing does affect me personally, it doesn't matter.
> And because it doesn't matter to me it doesn't matter at all"
Blackmailing people with pictures taken from webcams is not theoretical. It
happens[0] and it's good advice to tape up your cam. It may not affect you
personally, but it may affect your wife, daughter, or sister in a much more
sinister way. Believe it or not this kind of thing can ruin someone's life.
[0] [http://www.computerweekly.com/news/2240209018/US-teen-
hacker...](http://www.computerweekly.com/news/2240209018/US-teen-hacker-
pleads-guilty-to-webcam-blackmail)
~~~
iceman99
I know someone whose camera and microphone were taken over. A window showed on
her computer where the person watching her chatted with her and told her
things that he only knew because he was watching her. It scared her to death
and made her cry.
Beyond blackmail, it is probably close to the psychological equivalent of a
stranger just suddenly appearing in your home watching you.
I think that every electronic camera and mic device should have a hard
switch/button that physically disables both the camera and mic. Having to use
tape or a cover does not keep you from being spied on; it only eliminates the
visual spying. The attacker can still listen.
~~~
zyngaro
Smartphones represent a bigger security risk in that regard. Front facing rear
facing, mic all ones personal data, pictures and so on.
~~~
JohnStrange
Hardly. You put your phone on the desk and it's going to show the ceiling. In
contrast to this, people do all kinds of weird things in front of laptops.
I've even heard once of someone who allegedly masturbated (!) in front of a
laptop. Of course, that must have been an extreme outlier ...
------
janvidar
Isn't this really just a sign of flawed hardware design?
In my opinion hardware should be designed so that the camera LED lamp should
always be lit if the camera is used. If there is a malfunction with the LED,
then the camera should also not work. Also there should be a hardware LED for
when the microphone is being used which should work in the same fashion for
laptops with built-in microphones.
In the webcam drivers I have looked at the LED is controlled independently of
capturing, although drivers do enable the LED when the camera is used. This
essentially means that hackers can record and disable the lamp.
I've been considering hacking together some piece of software that will
continuously use the camera (/dev/video) in order to block it for other
applications, and have it fail with visible alerts if unable to block the
camera. Not sure if the same thing can be achieved for the audio recording
devices due to multiplexing.
~~~
awesomerobot
>If there is a malfunction with the LED, then the camera should also not work.
Many would argue that this is the more flawed design.
~~~
Kadin
It seems like a "fail safe" to me. The current design is a bit closer to a
"fail deadly" in that it creates a mode that's the worst-case from the user's
perspective: the camera works but the indicator doesn't.
It is probably worse to have an unreliable indicator light than it is to not
have any indicator light at all.
------
_Codemonkeyism
"The head of the FBI on Wednesday defended putting a piece of tape over his
personal laptop's webcam, claiming the security step was a common sense one
that most should take."
One needs to ask why is the head of the FBI telling you this? Cui bono?
This is a red herring.
The FBI has no interest in filming you through your webcam.
They want to listen to your microphone, watch your screen, get the keys you've
typed, see the websites you've visited, read the emails you've sent.
Watch you on video? Nah. This is a red herring.
That is the reason the head of the FBI tells you to cover your webcam.
I wish the The Last Psychiatrist would come back.
~~~
tingol
The FBI isn't telling you this so you could protect yourself from the
government. They are telling you this because they know how easy it is for
someone else to take control of the camera and make your life hard. So it is a
common sense step for you to take if you're concerbed about security.
You took a pretty huge jump from that to the FBI listening to your mic.
------
ipsin
If you're so concerned about having your webcam subverted, it seems like the
first step would be to insist on a hardware LED that can't be subverted in
firmware. If nothing else, it would serve as a canary, indicating that your
machine has been thoroughly compromised.
~~~
gkoberger
And who do we trust to do that? More importantly, is it even possible?
~~~
krastanov
In terms of electronics it is fairly trivial and it can be inspected by eye
(or microscope) if the manufacturer decides to not encapsulate everything on a
chip (which presumably would be the point of such a feature).
Just have the only positive voltage rail going to the camera be the same one
that is directly powering the LED. The firmware will be turning this rail on
and off, hence turning the camera and the LED on and off simultaneously.
~~~
1_2__3
Idle though on possible attack vectors:
Convince the firmware to use a lower voltage, one that doesn't hit the
breakover voltage on the LED but still powers the camera.
Strobe the line, get snapshots without the LED doing more than very faintly
glowing.
~~~
umanwizard
LED activation voltage is less than what cameras typically require.
------
white-flame
I said it then, and I say it now:
\- Encryption is our webcam tape.
That tape cannot be thwarted by any remote attacker, legally warranted or not.
It's perfect, unbreakable security from webcam visuals being exfiltrated,
exactly the security features that Comey says we shouldn't be allowed to have
for our data.
~~~
pdkl95
"What if everyone believed that law-abiding citizens should use postcards for
their mail? If a nonconformist tried to assert his privacy by using an
envelope for his mail, it would draw suspicion. Perhaps the authorities would
open his mail to see what he's hiding. Fortunately, we don't live in that kind
of world, because everyone protects most of their mail with envelopes. So no
one draws suspicion by asserting their privacy with an envelope. There's
safety in numbers. Analogously, it would be nice if everyone routinely used
encryption for all their email, innocent or not, so that no one drew suspicion
by asserting their email privacy with encryption. Think of it as a form of
solidarity."
~ Philip Zimmermann, "Why I wrote PGP"
[https://www.philzimmermann.com/EN/essays/WhyIWrotePGP.html](https://www.philzimmermann.com/EN/essays/WhyIWrotePGP.html)
~~~
drvdevd
A brilliant point and a salient quote. Why must we continue to live,
collectively, with our heads in the sand?
------
meowface
I know this thread will probably get politicized, but I see nothing wrong (or
necessarily hypocritical; he's law enforcement, not IC) with his advice here.
~~~
waterphone
It's not a bad thing to do, it's just hypocritical of him to value his own
privacy but tell everyone else they need to give up theirs and let the FBI and
NSA have access to everything they want to keep private.
~~~
nathancahill
Why would you be concerned about the FBI or the NSA knowing about the content
of your digital communiques if you have nothing to hide? Even the most ardent
supporter of personal freedoms will admit that the government observing you
over a network is the same as taking pictures of you with a telephoto lens on
a busy street. The truth is the same: there are too many people and you aren't
special enough to deserve personal surveillance.
~~~
anexprogrammer
> there are too many people
Oh _please._ They can probably harvest the lot. It'll be some algorithm that
deems you worthy or otherwise or gets you on an "of interest" list. Let's keep
"personal surveillance" for '50s spy movies and Banksy murals.
More generally, what about the chilling effect on legal and legitimate
conversation?
~~~
jeremysmyth
_It 'll be some algorithm that deems you worthy or otherwise or gets you on an
"of interest" list._
...or your association with "Occupy" or some other political protest movement
that someone in power disagrees with, or that your wife bullied some
politician's wife for two weeks in school, or that your interfering neighbour
with a petty dislike of how you landscape your garden works as a government
clerk and can access your data.
There are many reasons why some individual might want to know private things
about some other individual. When individuals with some tiny (or vast) power
want to wield it over _anyone else_ , especially when they can do it with
little oversight, it's very tempting.
That "the government" has access to my private information does not mean it's
blind and faceless. It's made up of people with complex motivations.
------
sotojuan
The webcam cover up is interesting to me because it's the only "weird privacy
thing" I've seen regular, non-technical people do. A good amount of people at
my university, most of which use social media liberally and don't care about
encryption, cover their camera up.
~~~
pseudonymcoward
This is only idle speculation but:
A web cam resembles an eye staring at you all the time. This makes people feel
weird, like something is staring at them. The threat to privacy is right in
their face and on a gut level.
That's the reason so many people cover them even when they won't take other
basic online privacy precautions.
~~~
Sylos
Also just in general, people understand what a camera does. It's much harder
to understand the implications of abstract "data" going off onto the internet.
------
rdtsc
This is like the coal burning power plant telling you to make sure to sort
your recyclables into appropriate containers, to make the environment cleaner.
Also people enjoy and feel good about accomplishing small things. Putting a
sticker on your laptop is a small easy task. Do it and they feel more "secure"
in an instant.
------
benevol
Every electronic communication device (laptop, mobile, tablet, etc) should
have _1 hardware switch per sensor_ (camera, mic, motion/acceleration, etc)
which disables the sensor.
Why manufacturers still haven't introduced this is beyond me.
~~~
pwg
>Why manufacturers still haven't introduced this is beyond me.
Expense and lack of demand.
Some older laptops used to feature hardware kill switches for the wifi (this
was prior to the advent of a camera in every laptop). The old Dell D820 model
was one such laptop. Eventually they were dropped all around because from the
makers point of view, the presence of the switch had no effect on the sales of
the laptops.
Anything you add to the BOM (Bill of Materials) for the device raises the
final net cost, and there is still enough competition in the laptop/phone
space that keeping the costs down is necessary to compete. Additionally,
twenty-five cents per unit does not sound like much, until of course you
multiply that by 10+ million units built (where a twenty-five cents difference
per unit amounts to $2.5+ million difference in the end). So if having the
switch or not having the switch made no difference in sales, the maker could
either raise their profit, or lower their price (or more likely split the
difference) by dropping the switches.
The lack of demand is that not enough purchasers are telling manufacturers
they want hardware on/off switches (the purchasers do this by buying only
laptops with them, and by not buying laptops without them [which may be
difficult to bootstrap now, given that almost no laptop has a hardware on/off
switch anymore]).
~~~
jcadam
I've found many of those supposedly 'hardware' wifi kill switches were
software controlled (When I installed Linux on an old Dell, it completely
ignored the state of the wifi switch).
I want a switch that physically cuts power to a device, but no... :(
------
Hilyin
I guess this is just as good place as any to bring this up. In current OS X,
you cannot disable your mic. You can turn down the input volume, but never
disable. All malware needs to do is raise the input volume and it can listen
to you to its hearts content.
And its worse with your iPhone.
~~~
the_common_man
Can someone confirm if this is actually true? Sounds too far fetched that you
cannot disable the mic (i.e not muting, I assume?).
~~~
Hilyin
Just look around on the internet, you'll find the same thing. I researched
this a few weeks ago and was amazed.
You basically have to disable the audio driver in OSX to disable it, and doing
that, means you can't play audio at all. And even that isn't enough, it
technically can be hijacked at an even lower level.
------
ssebastianj
I was looking for a way to cover the mics and webcam integrated in my laptop
which doesn't require a tape. So, I grabbed a couple of those magnets stripes
usually found on fridges and then , using a scissor, made two little
rectangular stripes and a larger one. Next, I glued the little stripes on the
laptop, near close the mics. The nice thing is that the large stripe covers
both, the mics and webcam. For me, it's an easy way to cover/uncover fast.
------
boxkite
I keep mine covered because I work remotely a lot and I don't want to
accidentally shirtless video chat someone from bed when I meant to make a
different type of call.
~~~
3chelon
It was unusually hot and I actually did that myself just the other day -
embarrassing!
------
conradev
I use a MacBook Pro as my daily driver, but I recently purchased a Lenovo
ThinkPad to play around with. Sometimes I forget how awesome it is to have a
repairable and modular computer.
I didn't want the webcam or microphone in the ThinkPad… so I took 30 minutes
and removed it. Easy as that.
~~~
csydas
Well,to be fair you could just open the MacBook Pro and unplug the ribbon for
the webcam. iFixit will have instructions. Removing it entirely granted is
another matter, involving opening the screen, but you'd have to do the same on
any modern laptop with an integrated camera wouldn't you?
~~~
wruza
For my mac I just used a knife to open screen and shoved black paper strip
before camera.
------
greglindahl
I experimented a bit with an Apple laptop microphone, and it took 2 layers of
electrical tape to block the mic. There doesn't appear to be any way to block
an iPhone mic without blocking the speaker, too, and I'm not confident that it
could be blocked at all.
------
mpetrovich
But what about his computer's built-in mic? Unless he's pantomiming all
sensitive info...
------
neom
It's pretty sad that he used the word "authority" in this sentence: You do
that so that people who don’t have authority don’t look at you. I think that’s
a good thing.”
------
throwaway13337
It's relatively common to have access to private security cameras. Some are
even google indexed.
The software included relies on the users protect the web interface.
Obviously, this is the vulnerability. Especially with things like default
passwords.
Here's an article about it:
[http://www.networkworld.com/article/2844283/microsoft-
subnet...](http://www.networkworld.com/article/2844283/microsoft-
subnet/peeping-into-73-000-unsecured-security-cameras-thanks-to-default-
passwords.html)
A lot of these cameras are controllable and have speakers.
People now do live video streams of pranking people through this means.
Pictures: [http://imgur.com/a/0WImd](http://imgur.com/a/0WImd)
------
skybrian
Back in the day, SGI workstations had a hardware shutter. I still think it's a
good idea.
------
24gttghh
My Asus 1015PEM netbook from 6 years ago has a physical screen that slides
over the camera; sliding the screen also turns on the camera. Why don't more
laptops have this feature if this is such a 'big deal'?
------
throw2016
The hacker news readership is focussed on startups and technology. It's a
career, a business and in some cases an interest in technology.
So privacy as a social good may not be the primary perspective and it often
devolves into how this affects readers personally rather than the society they
live in or side tracks into technology nuances.
Technology is enabling new negative possibilities but it does not follow that
technologists can make a difference. There is no ethical code of conduct. Like
everyone else they are another cog in the wheel and software engineers may not
have an interest or priority on privacy, social and political issues.
There are a large number of folks working in the nsa, gchq, google, facebook,
palantir, hardware vendors and elsewhere actively enabling this.
Like technology itself politics, liberty, privacy and the evolution of modern
system from the time of feudalism requires interest and priority. From this
perspective the need to tape up your webcam may have completely different
ramnifications.
------
xcasperx
I agree with what most people are saying on here, but I believe there's a
bigger picture to it.
Let's say that your computer has been completely 'pwned', and that you are
currently reading an article with an ad for Cow Porn, or whatever, on the
right hand hand side of the site. The hacker can write some code to check what
your eyes, and eyebrows, did when you looked at the ad. If it peaked your
interest, the hacker can maliciously add more 'Cow Porn' ads to sites you
visit - via swapping out the regular ones.
Now one day you get curious and click on it, and boom they take a screen shot
and try to blackmail you.
This is obviously quite outlandish but think about purposefully planting
posts, lets say on reddit, by switching out posts. They then look at your head
movements, and, or, eye movements then boom, you're added to some list that
you wouldn't have be added to if it weren't for your eye movements.
------
dingo_bat
I have never covered my Webcam because I trust the light to come on if the
camera turns on. Is it possible to bypass that led?
~~~
Steuard
In addition to the attacks that others have mentioned here, I've also heard
folks comment previously on the possibility of turning on the camera very
briefly, just long enough for a single still shot. If it was done fast enough,
the brief flicker of the LED might not be noticeable.
(Like you, I had always assumed that the power for the webcam was literally in
series with the LED, so that disabling the LED would render the camera
inoperable. That seemed like the obvious way to do it if you wanted to provide
a truly reliable signal. But evidently that's not the case.)
~~~
abraae
Perhaps you mean in parallel. An LED is driven by 20 mA, whereas a camera
requires more like 200 mA, so it's not feasible to wire them in series -
either the LED will burn out or the camera won't power up.
~~~
Steuard
Yeah, I was pretty sure I was being a little sloppy by using the term "series"
(for shame, physics prof, for shame!), but I was hoping to evoke the general
sense of "if current doesn't flow through the LED for any reason, the camera
can't turn on." Honestly, I'm not 100% certain offhand of a way to wire that
(which is why I didn't want to be specific earlier, despite using a specific
term: shoulda added some weasel words :) ). Do the LED and the camera run off
of the same _voltage_? (If not, then parallel wiring won't work, either.)
------
pjc50
Previously: [http://www.independent.co.uk/life-style/gadgets-and-
tech/yah...](http://www.independent.co.uk/life-style/gadgets-and-tech/yahoo-
webcam-users-intimate-images-intercepted-by-gchq-spy-programme-snowden-files-
reveal-9158140.html)
------
eosrei
What about the cameras in your phone and the microphones in everything?
Security theater isn't security.
------
krinchan
I'm about to die laughing at the hoops people are jumping through in the
comments to claim they've never pulled up some porn and enjoyed themselves in
front of their laptop. Ever. _EVER_
------
laurent123456
This article describes how to turn off the led light on Windows, which is
surprisingly easy:
[http://blog.erratasec.com/2013/12/how-to-disable-webcam-
ligh...](http://blog.erratasec.com/2013/12/how-to-disable-webcam-light-on-
windows.html)
TLDR: Webcams follow the UVC standard and, according to this standard, the LED
indicator light is controlled by the host software. So a simple hack is to
find the webcam driver DLL, find the function that controls the LED (such as
TurnOnOffLED()), make it return immediately, done.
------
tedmiston
Does anyone feel the need to cover their iPhone front facing camera?
~~~
e1ven
Yes. I cover both the cameras on my phone with tape, and only remove it when I
want to take a picture.
That said, I have a lot more faith in the security of a whitelist-based model
like the App store, versus the blacklist model of a PC with antivirus.
------
foobarcrunch
Unless you're using Prey[0] and want an opportunity to photograph would-be
crooks.
[0] [https://preyproject.com](https://preyproject.com)
------
markyc
in this day and age how come we don't see laptops carry a physical on/off
switch for the microphone and camera?
~~~
Shanea93
This is the day and age of removing headphone jacks to make a phone slimmer,
taking away your disk drive, etc. Most companies care more about aesthetics
than functionality at this point.
~~~
ojii
can I have a laptop without a webcam/integrated mic then?
~~~
soylentcola
How courageous of you!
------
awesomerobot
Also remove your microphone and don't use a keyboard? If I were hacking you
I'd _much_ rather log your keystrokes or hear what you're saying.
The number of scenarios where having a visual would be useful would be
incredibly low by comparison.
Putting a sticker over your webcam is like putting a lock on a screen door.
~~~
maxerickson
Most screen doors I can think of do have locks.
Even quite home made ones often end up with a hook that kids can't reach.
~~~
awesomerobot
That's my point. It does one thing, but it's by no means security.
------
piedradura
I prefer to have a computer composed by parts, so I attach the webcam to the
computer when I need to, same thing for the audio and many other applications.
I only need 1k of ram to send a secret message, so no virus or malware could
be in my tiny computer.
------
zelos
Didn't all Sun webcams used to have little irises that you could close on
them?
It seems like a sensible precaution: makes it less likely I'll accidentally
log into a company conference call in my dressing gown with my camera enabled.
------
whitenoice
Just saw the prescreening of snowden movie with online live event with movie
cast and snowden post movie, and this was exactly what was depicted in the
movie and in the event talk.
------
andrewflnr
So the guy who decries "going dark" when it comes to encryption wants us to
literally go dark with our webcams. It's like a dystopian comedy setup.
------
JustUhThought
At some of my house parties I require guests to check their phone at the door.
Price of admission. (I keep a landline and am ok with giving that number out
as an emergency contact number). Boy does this get the conversation started.
I can tape my phn camera, but what about the other 20 phns in the room? I have
no control over them to keep them from posting photos of me drinking or
whatnot during a party, photos I do not want online.
From the tin-hat perspective one must do (much) better than consider their
personal devices. One must consider _all_ devices in their _personal
proximity_.
~~~
GarrisonPrime
It'd be amusing to have a little Faraday cage by the door for them to deposit
into. :)
------
demonshreder
Aren't these attacks primarily for Windows? Would using Linux (say Arch)
mitigate these?
Edit: Shouldn't we be more concerned about phones and tabs?
~~~
facepalm
Nice attempt at humor :-)
------
codethief
In case anyone's looking for something a little bit more sophisticated than a
sticker to put on his/her webcam:
[https://soomz.io/detail/webcam_covers_a10](https://soomz.io/detail/webcam_covers_a10)
Been using it for a while and it works like a charm. (Though on a phone it
does tend to attract a bit of dirt and the color wears off over time. If you
keep your phone in the pocket of your pants, that is.)
------
chrischen
Quick question for HNers: why isn't something like the camera insicator light
implemented for the microphone?
------
SG-
Anyone know what kind of laptop he uses?
------
wickedlogic
Please cover your webcam, it is distracting while we are trying to listen to
what you are clicking on.
------
listentojohan
What I don't understand is why he has to defend it? (Yes, it might seem
hypocritical.)
------
bobsoap
Instead of a sticker, one could also use this clever, simple, magnetic gadget
(not affiliated):
[https://www.kickstarter.com/projects/1893116150/nope-20-live...](https://www.kickstarter.com/projects/1893116150/nope-20-live-
free)
~~~
bobsoap
Seriously, downvoted without an explanation? That's quite poor. If something
about my post offends anyone, I'd love to know about it.
------
mangeletti
I swear this is a true story:
I worked at Staples when I was 19, and when I first started I was a "front end
lead" (read: the only full-time cashier), so I would work behind the service
counter at the front.
Once, I was standing up front while there were no customers when all of the
sudden the voice of the general manager (we'll call him Bill) popped onto the
phone's speaker, "Hey, Michael". I looked up and noticed the light next to
"Manager's Office" was on. I instinctively replied, "Hey, Bill; what's up?",
despite the fact that it nearly gave me a heart attack.
Bill proceeded to tell me to run something he needed to the back, which I did,
and that was the end of that.
Then, one day I was helping a customer with some Cross pens behind the
counter. I stood up to grab a key that was next to the register when I noticed
out of the corner of my eye that the phone's "Manager's Office" intercom light
was on. It made my heart jump because I hadn't talk to anybody through it, and
I knew that Bill was in the back office. I immediately realized, 'oh my god,
he's probably spying on me to see how my service is!'. It made me feel
uncomfortable, until I realized it was an opportunity to be extraordinarily
helpful and jovial with the customer and be "candidly" observed by my manager.
So I did that. I rang the customer up and she left. The light went off after a
few minutes of silence.
After that, I noticed the light come on a number of times on different days,
which surprised me. I even ran to the back after helping a customer once,
while the intercom light was still on, sneaked around the corner, and looked
into his office window to see if it was really him. He was sitting there
looking at his phone. I looked for just a moment when I heard from the speaker
above, "<beep!> cashier to the front". I ran.
Bill was probably the greatest manager I've ever known, such a hard worker, a
really cool guy to talk to, well respected by everyone, etc. In fact, if all
managers were like him, Staples would probably still be a force to be reckoned
with. So, it never bothered me the way it probably would have, had it been
some creepy manager. This is necessary for the rest of the story, because had
it not been the case, I would have probably called him out, etc.
Eventually I started being extra jovial all the time, because I never knew
when I'd miss seeing the light come on and miss the opportunity to impress
Bill.
Bill was so impressed with my service that I was given a raise and promoted to
manager of the copy & print center about 6 months later, which eventually led
to me opening my own print company and quitting Staples (after seeing how high
the margins were), which led to me learning how to use Adobe Creative Suite
and graphic design, which led to me shifting my focus to print design for
clients (brochures, cards, etc.), which led to me meeting some guys who ran an
Internet marketing company one day while trying to sell my print design
services. They wanted to hire me full time, and did, so I began learning web
design, then web development, then back end code, etc.
I always tell myself, 'I was probably destined for this kind of work', but the
reality is that my entire life might have been changed by simply knowing I was
being spied on by my Boss. I realize that it probably worked out for the
better in my case, but the fact is, knowing that somebody is watching you
causes you to change who you are. It's a form of control in and of itself. In
fact, it doesn't even need to happen to you. Now that we have all seen that
the government does spy on people, it's hard to imagine all the tiny ways that
it might change your behavior and the things you say (e.g., online).
~~~
repler
I worked at Staples too (Business Machines!), the management was not shy about
reminding us about mystery shoppers.
My managers would always walk around the corner right at the instant I would
sit down for a minute when it wasn't busy 5 hours into my shift. Never failed.
Ugh.
I know we didn't have surveillance cameras in the store at the time though,
because it was a sore point (and against Staples policy at the time).
------
mmaunder
I wonder if he covers front and back cellphone cameras.
------
caub
Laptops have a LED showing when webcam is in use
------
stanislavb
Hypocrite!
------
orthogon
What about the part where we stop buying products with integrated cameras?
What about the part where we stop buying devices that we have seeemingly no
hope of control over?
What about that?
Is boycott a word too strong?
Gee, you're right.
We should all just give up, and accept that what we're sold, is that which we
must buy.
~~~
deathanatos
I think you're being a bit quick to judge people here…
Having an integrated camera is obviously a lot easier to deal with,
logistically, than lugging along an external USB camera.
I think a lot of the people here would love to have hardware-level kill
switches for their video camera. And mic. And WiFi. (I would; I used to own a
Thinkpad with a hardware kill switch for WiFi. It was useful, even aside from
the privacy benefits.)
~~~
orthogon
I think you're neglecting a key detail: alternatives are hardly even on the
shelves, and NO ONE QUESTIONS IT.
> Oh, well, that's just
supply and demand, of
course!
> Everyone just WANTS an
always on internet connection!
> Why would anyone ever remove
the battery from their
cell phone???
> It's more cost effective
to build the device
like that. Common sense!
> Everyone wants a unique
identifier, GPS and 911
service. It's safer!
Yup, no one would ever want things any other way. It's silly to question why
the invisible hand of the market works as it does.
~~~
derogator
The really amazing part about the downvotes here, is that HN is unable to
reconcile the realities of mass surveillance that tend to conflict with profit
motives, and yet the collective overtone of HN professes itself to be a
bastion of progressive futurist space exploring tranhumanism. Few seem to
notice the cognitive dissonance.
Sort of a cruel prank. Those in the best position to release the yoke, are
only motivated to tighten it.
| {
"pile_set_name": "HackerNews"
} |
Google SSL Search - jamesbkel
http://www.google.com/support/websearch/bin/answer.py?answer=173733&hl=en
======
wladimir
This was available for quite a while already, though in beta/labs. I'm not
sure what is new.
~~~
JonnieCache
Yeah, it doesn't seem any different to how its been in the past year. The
_beta_ sigil is still under the logo.
I wish theyd put the links to maps and images back in, maybe with some visual
warning that theyre not encrypted. I have SSL search as the default search in
chrome, and I hate having to manually jump back to normal google to do image
searches.
While we're here, don't forget SSL wikipedia!
<https://secure.wikimedia.org/wikipedia/en/wiki/Main_Page>
~~~
mike-cardwell
If you're using the HTTPS-Everywhere Firefox addon (1), or the HTTPS-
Everywhere Squid redirector (2), you don't need to know/remember about the SSL
versions of Wikipedia or Google. You're just sent there by default.
1.) <https://www.eff.org/https-everywhere>
2.) <https://github.com/mikecardwell/perl-HTTPSEverywhere>
------
mahrain
Been using this for a year now, there's also a hack to use it in the Chrome
bar by entering a custom search engine. Very handy and works nice.
Only miss is that I can't immediately click through to image searches, they're
only available over unsecured HTTP.
~~~
lobster_johnson
Unfortunately, you lose autocompletion (other than history autocompletion)
when you use something other than the built-in Google search.
------
nodata
Good, but to make this truly useful we need a really simple way to specify
which country-specific google search engine we would like results from.
------
jamaicahest
DuckDuckGo has been using this for many months, when you use the !g bang
~~~
rlpb
Really? It doesn't seem to do it for me. Do you have some setting set
somewhere?
------
lini
Anyone that has the HTTPS everywhere extension (Firefox) is already using the
SSL search in Google. As others noted it has been in beta for quite a long
time and is missing some features like the image search or the doodles on the
homepage.
------
buster
Also, if you want to browse on SSL whereever possible:
[https://chrome.google.com/webstore/detail/flcpelgcagfhfoegek...](https://chrome.google.com/webstore/detail/flcpelgcagfhfoegekianiofphddckof)
Love this Extension!
------
RyanKearney
The only thing I dislike about this is it hides the refer, screwing up my
analytics. I'd have to completely convert all of my sites to HTTPS only to be
able to make use of the additional headers for analytical purposes. Not really
a big deal I guess, but kind of unnecessary to have to purchase wildcard certs
if you have many sub domains.
~~~
dspillett
The free certs from <http://www.startssl.com/> are apparently accepted by most
browsers these days (the exception being IE6/7 users on XP who have not
downloaded the optional CA cert updates):
<http://en.wikipedia.org/wiki/Startssl#StartSSL>
I've not used their cert for anything yet (I plan to test them on some
personal sites when I get chance, before using them elsewhere), and wildcard
certs are not free (but they do seem relatively cheap), but it might be worth
looking into for someone in your position.
~~~
thepsi
I've used them for a few personal sites and projects with no complaints.
The fee for wildcard certs (~60USD) is a one-off to verify your identity -
usually via a quick phone call to confirm details from your official
documents.
Once that's complete, you can generate as many certs as you need (incl.
wildcards and Subject Alternative Name) from their control panel, subject to
jumping through the usual hoops to prove that you have control of each domain.
~~~
RyanKearney
I do use StartSSL but the problem just comes from having multiple sub domains.
I get IPv4 addresses for $0.50/mo/each but I'd rather not setup each subdomain
on its own dedicated IP for the sakes of using free SSL certs.
~~~
dspillett
You don't need multiple IPv4 addresses to make use of a wild-card (or other
multi-name) certificate. A wildcard certificate will verify any matching
domain so you could have many sub-domains of the same domain (using a single
certificate for *.domain.tld) on one address and browsers would not complain.
Also you could run the distinct (sub)domains on different ports on the same
address, though this is perhaps less useful.
Also, with SNI you can use many single-name certificates on one address (and
all on the same port) using SNI. Unfortunately there are a number of
significant client combinations that won't play nice with this (most notably,
if you can't guess, IE on Windows XP):
<http://en.wikipedia.org/wiki/Server_Name_Indication#Support>
~~~
RyanKearney
I know that. I'm saying I don't want to have to pay for a wildcard certificate
since you can get free certs for individual domains. The alternative for me
purchasing a wildcard domain would be to get many different single domain
certs for free and assign each one to a different IP address.
| {
"pile_set_name": "HackerNews"
} |
Ask HN: What is best email client (to replace Inbox) - clarky07
I love Inbox and I'm dreading Google shutting it down. I've tried several others in the past but haven't found anything else I like as much. At this point I suspect I'll just go back to gmail and be less happy but I'm hoping there is an alternative I could like as much.<p>Tell me what you use for email and why it's awesome.<p>only requirements are works on iOS and Mac. Doesn't need desktop app, web is fine (perhaps even preferable).
======
PaulHoule
fastmail
| {
"pile_set_name": "HackerNews"
} |
Why primary care will soon only treat chronic conditions - tomohawk
https://www.kevinmd.com/blog/2019/11/why-primary-care-will-soon-only-treat-chronic-conditions.html
======
mean_gene_1976
I want everyone on the team. I want the best my budget can handle. I have
requirements for technical positions that are posted with factors on how the
candidates will he judged. Attributes of all the candidates will not be looked
at by the technical review team. They will score and the winner gets an offer.
There is one more thing. If I pull data on my NAICS code and see that women or
minorities etc are not apart of the workforce, you bet your ass I’m going to
put them first. Disabled veterans are prioritized. I do not believe the actual
data pull for the rate of return specified. Statistics is something I want all
the details, or it is just fluff.
| {
"pile_set_name": "HackerNews"
} |
Show HN: Test and edit tilejson in the browser - andrewljohnson
http://static.gaiagps.com/tilejson-tester/
======
andrewljohnson
This is a pretty quick hack we did, because tilejson is useful in our apps,
and we started to get lots of support requests for help making/importing
files.
------
detaro
Error 404?
| {
"pile_set_name": "HackerNews"
} |
Simple example of machine learning in TensorFlow - jostmey
https://github.com/jostmey/NakedTensor?bare
======
dbcurtis
I like these kind of "Hello, world!" examples for TensorFlow. As a TensorFlow
beginner, I need all the references I can get. Here is what I need right now:
"Hello, we meet again!". I can build a neural net model, and train (albeit,
often badly) a model, but saving and restoring the trained weights so that I
can run the model again is giving me fits. I am clearly missing something
fundamental about how to restore a TensorFlow NN model.
For your next tutorial, may I suggest: 1) a list of do's and don'ts for
constructing a savable/restorable model, and 2) a wee bit of example code.
Of course, now that I have discovered Keras I'm moving away from low-level
direct TensorFlow. But I suspect I'm not the only one a bit foggy about the
whole save/restore work flow.
~~~
pmalynin
As a person that uses TensorFlow for his day job:
I find that saving and restoring are of the weirder things with TensorFlow,
you can either go all out an decide to save out all the variables, or only the
ones needed for the model.
You usually don't want to save out gradients (which are also variables) since
they take up a bunch of space and aren't actually that useful to restore. Now
on the other, what are model variables -- do you want to save model variables
+ the moving averages ... or just the averages. But then when you're loading
you'll have to "shadow" the moving averages to the real variables that
actually run in your model.
Good news though, most of the scaffolding code you can write once and re-use
it over and over again.
~~~
minimaxir
In Keras, it's just a simple model.save() [to a hdf5 file] and load_model().
This includes both the weights and the architecture.
Models with a few million parameters result in a file around ~50MB, which is
still reasonable for modern production use cases.
~~~
glial
Keras makes using deep learning for simple-ish use cases sooooo easy.
~~~
matheweis
I second this - I'm really excited about Keras being integrated into the core
of Tensorflow (other than the chance it might lose the Torch compatibility).
------
pred_
That's nifty; I was looking for something like that just a few weeks ago for a
work demonstration! Ended up doing
[https://gist.github.com/fuglede/ad04ce38e80887ddcbeb6b81e97b...](https://gist.github.com/fuglede/ad04ce38e80887ddcbeb6b81e97bbfbc)
instead.
~~~
rhcom2
Thank you to you and OP for both sharing these resources. Really helpful.
------
nemo1618
I wish there were more TensorFlow examples written in Go. I made the mistake
of checking out TensorFlow as my first intro to ML and it flew about 10 miles
over my head. Slowly learning now, but most of the documentation and tutorials
are written in Python.
This blog series was also helpful on a conceptual level:
[https://medium.com/emergent-future/simple-reinforcement-
lear...](https://medium.com/emergent-future/simple-reinforcement-learning-
with-tensorflow-part-0-q-learning-with-tables-and-neural-
networks-d195264329d0#.4znc3ulur)
~~~
make3
as a deep learning professional, the deep learning community is something like
99% Python. You'd probably better learn Python at least well enough to
recreate the corresponding Go code in your mind instantly.
------
calebm
>>> You are one buzzword away from being a professional. Instead of fitting a
line to just eight datapoints, we will now fit a line to 8-million datapoints.
Welcome to big data.
LOL :) (Side-note: 8 million is still not big data)
~~~
mcrad
Big Data is a reference to complexity of the data & underlying system that
data represents, NOT the number of datapoints.
lol
~~~
pyromine
Big data is really just a buzzword that no one knows what it really means,
because everyone's definition is different
lol
~~~
happycube
I always think in terms of Munchkin: "any data that is not Big is small"
------
JonathonCwik
So I'm still wrapping my head around some of the math (I haven't had a math
class in a handful of years)...
I get the output of the model (y_model = m*xs[i]+b), it's the y = mx + b where
we know x (from the dataset) and have y be a variable.
The error is where I start to lose it, so I get the idea of the first part
(ys[i]-y_model). It's basically the difference between the actual y value
(from the dataset). I get that we want this number to be as small as possible
as the closer to zero it is for the entire dataset that means we get closer to
the line going through (or near) all the points and the closest fit will be
when this total_error is nearest to zero.
What I don't get is the squaring of the difference. Is it just to make the
difference a larger number so that it's a little more normalized? How do you
get to the conclusion that it needs to be normalized? Same thing with the
learning rate? I believe these to be correlated but I can't tell you how...
~~~
cowabungabruce
Squaring gets you guaranteed positive numbers. Remember, we are adding all the
errors together to optimize the model: If we get
sum_errors_A = 4 + -3 + -1
sum_errors_B = 1 + 1 + 1
B is obviously the better model, but it has a higher error than A when
comparing. If we squared all the terms and then added, B would be the stronger
model.
~~~
JonathonCwik
Ah, gotcha! Makes a lot more sense now.
------
Kiro
This is awesome!
I currently have a small pet project where I think some simple ML would be
cool but I don't know where to start so these things are great.
Basically my use case is that I have a bunch of 64x64 images (16 colors) which
I manually label as "good", "neutral" or "bad". I want to input this dataset
and train the network to categorize new 64x64 images of the same type.
The closest I've found is this: [https://gist.github.com/sono-
bfio/89a91da65a12175fb1169240cd...](https://gist.github.com/sono-
bfio/89a91da65a12175fb1169240cde3a87b)
But it's still too hard to understand exactly how I can create my own dataset
and how to set it up efficiently (the example is using 32x32 but I also want
to factor in that it's only 16 colors; will that give it some performance
advantages?).
~~~
nl
[https://blog.keras.io/building-powerful-image-
classification...](https://blog.keras.io/building-powerful-image-
classification-models-using-very-little-data.html) is what you want.
------
cosmicexplorer
What is the meaning of the "?bare" query string in the url? I googled around
for the meaning of query strings on the github site but only found rnandom
repos on github (not sure how to narrow the search). The first time I tried
removing it I saw another folder named "to_do", but this is gone now so it
might give a version which is cached for longer somehow?
~~~
cosmicexplorer
OK, found out what a bare repository means and pretty sure that's what it
refers to. Still can't find any documentation for the query string parameter
and don't know how that makes sense for github's repository view page.
------
blauditore
I'm not sure about the rules, but shouldn't posts linking to own, personal
projects be prefixed with "Show HN:"? I've seen a lot such posts lately where
the poster was clearly the author as well.
~~~
pvg
No, Show HN is a different thing with its own (generally stricter) rules. You
don't have to add it to things just because you happen to be the author.
[https://news.ycombinator.com/showhn.html](https://news.ycombinator.com/showhn.html)
------
kyleschiller
I think you meant bare bones.
------
mediocrejoker
I'm guessing english is not your first language, so I just wanted to point out
that "bare bottom" is generally synonymous with "uncovered buttocks" ie. in
the context of changing an infant's diaper.
Perhaps you were meaning to put "bare bones"? Google's definition of the
latter is "reduced to or comprising only the basic or essential elements of
something."
Don't want to detract from your point but I think your title is throwing some
people off. I know I would be hesitant to click something at work that sounds
like it could contain nudity.
~~~
dekhn
I think the last example was a clASSifier, so it makes sense.
------
bencollier49
"Bare bottom"? I'm not clicking on this.
~~~
bencollier49
Downvoted! The title might have changed now, but the original one was
completely indecipherable. As far as I could tell it was genuinely some sort
of image recognition algorithm for naked buttocks.
------
BonoboBoner
Simple example? Before finishing the first paragraph, it says
"The slope and y-intercept of the line are determined using gradient descent."
What on earth does that mean? Maybe they should teach mathematics in english
at universities outside of english speaking countries. German mathematics does
not help here.
I wish there was a 4GL like SQL for machine learning using dynamic programming
for algorithm selection and model synthesis like a dbms query planner.
PREDICT s as revenue LEARN FROM company.sales as s GROUP BY MONTH ORDER BY
company.region
~~~
sampo
> _" The slope and y-intercept of the line are determined using gradient
> descent."_
Slope and intercept are very standard names for the parameters of a linear
regression model. Gradient descent is the name of the algorithm used.
| {
"pile_set_name": "HackerNews"
} |
Copper - Data analysis toolkit for python - dfrodriguez143
http://pypi.python.org/pypi?:action=display&name=copper&version=0.0.2
======
johncoogan
Looks awesome, always love seeing my favorite tools wrapped up in new ways.
Thanks a lot for posting.
Quick note, since PyPi doesn't seem to parse markdown, the more information
link to GitHub is malformed. I believe the plain link will hyperlink
automatically. (See <http://scrible.com/s/2acQ2> for details).
Thanks again for the package.
| {
"pile_set_name": "HackerNews"
} |
What’s up with ARM - pmjordan
http://ldn.linuxfoundation.org/blog-entry/what%E2%80%99s-with-arm
======
edderly
Some context:
_Gaah. Guys, this whole ARM thing is a f-cking pain in the ass_
<https://lkml.org/lkml/2011/3/17/492>
_Let ARM rot in the mainline. I really don't care anymore._
<https://lwn.net/Articles/441384/>
It'll be interesting to see what direction this goes. Considering also the
forks for the Android kernel and the different directions ARM development
wants to go compared to Intel.
~~~
dochtman
Yeah, this isn't really new to anyone who reads the LWN (which is edited by
the author of the OP, BTW). The LWN is really very good, and subscribing is
worth it for those hackers who care about the larger Linux/POSIX ecosystem.
------
zdw
This is very welcome.
ARM has tended to be somewhat difficult to port to - vendors have multiple
versions of the instruction set out there depending on device size/power
requirements, with different floating point units (NEON, VFP) etc.
The result is we end up with situations like OpenEmbedded supporting multiple
kernel trees in it's build engine just to take care of the wide range of
hardware it supports.
Hopefully this will make the situation somewhat better.
~~~
rbanffy
Anything that increases functionality/LoC in the kernel is good. In any
complex software project - and the Linux kernel is about as complex as sanity
and present technology will allow - you have to do periodical codebase clean-
ups. This is one case where the pain to maintain is forcing a cleanup.
And, as always, it's discussed openly, so, whoever depends on it doesn't get
surprised by the next release.
------
paines
This biggest problem with ARM devices is, that the only devices out there for
usage are embedded ones. Up to now there is only one Notebook out there
(alwaysinnovating) which could be used as a computer on a daily basis. But
IMHO 10'' is too small to do serious stuff. 13'' is minimum. Hope we will see
them soon in the wild.
| {
"pile_set_name": "HackerNews"
} |
SF millennials won’t be able to buy a home for 20 years, says survey - rajnathani
https://sf.curbed.com/2018/12/13/18139261/millennial-renters-homebuyers-san-francisco-apartmentlist-down-payment
======
pontifier
Every dollar paid in rent increases the value of property in support of those
who already own it. It's a double whammy.
I myself benefit from this situation, but see it's vicious cycle.
As long as people keep paying rent, rents will rise and property values will
rise as well. It's not sustainable indefinitely, and I see problems on the
horizon as people change their priorities.
~~~
rajnathani
The only direct variable which has an inverse relation to the vicious cycle is
the property tax rate, as higher property taxes increases the effective price
for property ownership. In California due to Prop 13, the property tax rate
(of ~1% of the initially appraised market value of the home) gets negated by
inflation, and it's further countered in regions such as the Bay Area by the
sustained increase in demand from the influx of residents and higher wage
growth.
| {
"pile_set_name": "HackerNews"
} |
A Windows feature which can result in bypassing User Group Policy - miles
https://medium.com/tenable-techblog/bypass-windows-10-user-group-policy-and-more-with-this-one-weird-trick-552d4bc5cc1b
======
gruez
_yawn_ yet another case of an "exploit" that involves being other side of an
airtight hatchway[1]. most/all of the important group policy settings are
machine, rather than user. the user group policy settings are mainly with
appearance/styling.
Let's go through each of the "implications".
>Single File Code Execution
If you were able to drop that file, you're either that user, or an
administrator on the computer. If you're that user, you could also achieve
"single file code execution" by dropping a file to the startup folder, or
creating an autorun registry key. If you are an administrator, you already own
the machine.
>Antivirus/EDR Bypass
possibly, although your payload would still have to get pass behavioral
analysis when it's executing.
>Denial of Service
yeah, but you can achieve the same thing by adding "logoff" as an autorun
entry.
[1]
[https://devblogs.microsoft.com/oldnewthing/?p=100665](https://devblogs.microsoft.com/oldnewthing/?p=100665),
or search for that term on the blog, there are multiple entries.
~~~
wolrah
> If you were able to drop that file, you're either that user, or an
> administrator on the computer. If you're that user, you could also achieve
> "single file code execution" by dropping a file to the startup folder, or
> creating an autorun registry key. If you are an administrator, you already
> own the machine.
As I see it the biggest practical issue with this is that it provides a method
for persistence that no user will ever find and even most Windows
administrators will have no idea to look for.
~~~
gruez
>As I see it the biggest practical issue with this is that it provides a
method for persistence that no user will ever find
This isn't relevant because if you're logged in as the affected user, nothing
you see can be trusted because you're already pwned. For instance, the
attacker could have replaced the regedit icon with a patched regedit, or
attached a debugger to every process and patched any system calls. The only
safe course of action would be to create a new profile.
> and even most Windows administrators will have no idea to look for.
AFAIK user hives aren't loaded until they're logged in, in which case they're
subject to the caveats of the previous paragraph. Also, are administrators
really going around and loading each user's registry hive to check for
infections? The only real threat I can think of is antivirus vendors not
knowing about this feature and not scanning the file as a registry hive.
~~~
throwanem
As the article mentions, the threat model here is primarily an insider one,
with a "rogue" user leveraging this method to obtain capabilities the domain
administrator intends to deny. There are certainly more effective exploits for
an outside attacker to use, but that's beside the point.
~~~
dfox
User Group Policy isn't exactly a security mechanism, it exists to prevent
users from unintentionally breaking their profile. There is multitude of ways
how the user in question can inject arbitrary code into processes that are
affected by user group policy as these processes are owned by that user.
------
jve
Is this a real concern?
I always treat User Settings overridable, because they happen either in
security context of user or within user registry which lives in %userprofile%
- the user has full access to ntuser.dat file.
IMHO for real security stuff, Computer Settings are way to go.
> Some exploits may be able to drop a file somewhere on the Windows filesystem
> as non-admin. If the exploit dropped a “%USERPROFILE\ntuser.man”, with an
> autostart registry key to execute a file off of a remote SMB share, then the
> exploit now gained reliable code execution simply by dropping one non-
> executable file.
Well, if malicious guy can write your %USERPROFILE% folder, it's already no-
go. You could potentially plant powershell profile scripts etc.
> By dropping an empty ntuser.man file in %userprofile%, ProfSvc will fail to
> load registry and thus prevent the user from logging in
You've already got bigger problems if someone can write %userprofile%
~~~
ocdtrekkie
I wonder how many sysadmins truly think about User Settings that way. They
should, but I imagine when people are trying to apply a setting to a group of
people, and they feel those permissions should follow them regardless of what
PC they are on, they would just think to make it a user setting.
~~~
GordonS
I work for a mega corp, and many security-related policies are indeed set at
the user, rather than machine, level. Even ones that apply to everyone, no
idea why.
They also enabled the "disable registry editing" policy, but for obvious
reasons this only prevent the official regedit app from running, so anyone
with local admin can edit the registry using a different app.
I feel like I'm pushed in the direction of wasting my time figuring out ways
to bypass what I see as silly restrictions - why would you disable registry
editing for a developer? Why would you force credentials to be entered _every_
time the UAC prompt is shown? The list goes on...
------
userbinator
_Microsoft deemed this to be expected behavior and not a security issue._
For once, thank you for not caving into corporate pressure to make the work
experience even more dystopian... those who have worked in such environments
will known what I'm referring to. (I wonder if their developers themselves
make use of this.)
~~~
Ididntdothis
I rely on several of these “exploits” in order to be able to do my job on my
work machines. I think even IT knows about these tricks but luckily they look
the other way.
~~~
cosmie
Besides the one referenced in the article, any tips (or references) about
those tricks?
~~~
GordonS
I got one I mentioned elsewhere here - if registry editing is disabled, just
use a different registry app (there are some on Github that are better than
the standard one anyway).
Then you can undo group policy settings at will, as long as you know which
registry keys to flip. A good site for this is:
[https://gpsearch.azurewebsites.net](https://gpsearch.azurewebsites.net)
Some settings are set in the local security policy file, rather than in the
registry. From memory, if you have local admin rights you have to specifically
grant your user account full control to the adm files, then you can use the
local security policy MMC snap in to change settings.
Once you change things, they will periodically be set back, which is annoying,
but the tip near the end of the article might work to stop that.
Another tip is to install a dual boot version of Windows on an encrypted
partition, and use that instead of the "official" install. Of course, this
only works if you don't need frequent access to resources on the domain.
------
Spivak
This is actually one of those features that GNOME gets right with dconf
lockdown. You can, on a per setting basis, decide whether users are allowed to
override each setting.
------
amaccuish
Agree with others, yawn. Unplug your computer during login to interrupt the
profile load and be assigned a temporary profile (unless disabled) and you'll
see no user policies applied.
| {
"pile_set_name": "HackerNews"
} |
Zebrello only delivers news which is tailored to your personal interests - zebrello
http://www.zebrello.com
======
qsymmachus
[http://en.wikipedia.org/wiki/Filter_bubble](http://en.wikipedia.org/wiki/Filter_bubble)
| {
"pile_set_name": "HackerNews"
} |
Low-overhead rendering with Vulkan on Android - sam42
http://android-developers.blogspot.com/2015/08/low-overhead-rendering-with-vulkan.html
======
gulpahum
It's great that Google Android will support Vulkan. Now, the support list
seems to be: Android, Windows, SteamOS, Tizen, and many Linux distributions
including Ubuntu and Red Hat. [1]
It's sad that it doesn't include Apple, most likely because they have now
their Metal API.
[1] [http://venturebeat.com/2015/08/10/khronos-wins-support-
from-...](http://venturebeat.com/2015/08/10/khronos-wins-support-from-google-
android-for-its-vulkan-graphics-api/)
EDIT: here's another list of hardware vendors: AMD, ARM, Intel, Imagination,
NVIDIA, Qualcomm, Samsung.
[https://www.khronos.org/news/press/khronos-expands-scope-
of-...](https://www.khronos.org/news/press/khronos-expands-scope-of-3d-open-
standard-ecosystem)
------
sgrove
I'd love to see a WebVulkan [0], as wrestling with WebGL's setup is really a
slog to get it to work predictably in the way you want.
WebGL is making progress via extensions with Uniform Buffers, instanced
geometry, etc., but as most people end up using e.g. Three.js, it seems like
exposing a sane, more fine-grained API would help everyone.
[0] Knowing full-well that WebVulkan naturally won't magically solve any
performance issues, and seems to be a very different beast
[https://twitter.com/Tojiro/status/628660898756825089](https://twitter.com/Tojiro/status/628660898756825089)
~~~
gulpahum
I think WebVulkan would be great with WebAssembly! The nice thing about those
technologies is that they are low-level APIs, which means less rooms for bugs.
WebGL, HTML, DOM, and most other web technologies suffer from not being
consistent and they are full of bugs. How many graphics cards have been
blacklisted from WebGL because the drivers don't have the required features or
have too many bugs? [1][2]
[1]
[https://www.khronos.org/webgl/wiki/BlacklistsAndWhitelists](https://www.khronos.org/webgl/wiki/BlacklistsAndWhitelists)
[2]
[https://wiki.mozilla.org/Blocklisting/Blocked_Graphics_Drive...](https://wiki.mozilla.org/Blocklisting/Blocked_Graphics_Drivers)
------
StavrosK
Can someone knowledgeable tell me if Vulkan is a good API? I've heard that
OpenGL is a bit of a mess (maybe DirectX is too?), did they get it right this
time?
~~~
flippinburgers
Vulkan is still in development. I don't believe anything about the api is
published yet.
~~~
caligastia
But you can check out the SPIR-V IR spec which is almost finished:
[https://www.khronos.org/registry/spir-v/](https://www.khronos.org/registry/spir-v/)
Not only the Vulkan API but new programming languages will target this IR, so
far it appears to be an innovative architecture for concurrent software, that
integrates graphics and compute, not a bolt-on like OpenCL.
| {
"pile_set_name": "HackerNews"
} |
Dress to Profess: What Should Scientists Wear? - jawns
http://sciencecareers.sciencemag.org/career_magazine/previous_issues/articles/2014_04_24/caredit.a1400104
======
tedsanders
I'm a scientist. I'm at conference this second, in fact. Plenty of people are
wearing suits.
Also, lab coats in lab make sense. You don't to spill acids or solvents on an
expensive suit. You also want to be mobileoso you can reach into hard to
access machines and spaces. A suit is not practical for mobility.
~~~
chrisBob
Conferences are completely different. At a conference there is a 50% chance I
will wear a suit, but back at work on a regular day I am in jeans and a
T-shirt which makes me _very slightly_ underdressed compared to my peers.
A conference is more similar to a job interview which is the one time that
even scientists get dressed up.
| {
"pile_set_name": "HackerNews"
} |
Arch Linux – Best Distro Ever? (Update with Pacaur and Linux-Zen) - akitaonrails
http://www.akitaonrails.com/2017/01/10/arch-linux-best-distro-ever
======
ake1
I love arch and would be using it if my hardware worked better out of the box.
Having to tinker with blacklisted drivers and manual pulseaudio configuration
is only fun the first couple of times. Nowadays I just install xubuntu and add
bspwm on top and everything works.
| {
"pile_set_name": "HackerNews"
} |
MIT Fellow Says Facebook ‘Lifted’ His Ideas for Libra Cryptocurrency - espeed
https://www.coindesk.com/mit-fellow-accuses-facebook-of-lifting-his-ideas-for-libra-cryptocurrency
======
paulsutter
Oh come on, neither a basket of commodities nor a basket of currencies are
original ideas. During the security token craze of 2017/2018 many similar
ideas were proposed and we don’t see those folks whining about Libra.
One example was a local currency based on a basket of goods such as real
estate so that employers could pay a salary that adjusted as rents and other
costs changed locally. Hundreds of these ideas were discussed freely in
telegram groups.
The article is just outrage porn.
~~~
blhack
Hey that’s actually a great idea.
------
cameldrv
Please. Even I had this idea in 2012 and I got it from being a user of Chaum’s
digicash in the nineties and understanding parts of how the IMF works, etc. I
even helped (not successfully) launch it in 2013. These ideas have been around
for a good while by many people, it’s just that crypto is mainstream enough
and facebook has enough clout now to take it seriously. If facebook ripped off
anyone it was John Maynard Keynes. That’s not to say that it is even that good
of an idea or that facebook will be successful with it.
------
vitno
I know people who were working on, what is now called, Libra at FB more than a
year ago though. The paper was published a year ago. This just looks like a
case of multiple people having the same idea.
~~~
yodaml
It may just be another case of the "adjacent possible" principle at work.
~~~
TeMPOraL
"Adjacent possible" is the case of one of the weirdest possible definition for
a very simple concept. I see people quoting this:
"The adjacent possible is a kind of shadow future, hovering on the edges of
the present state of things, a map of all the ways in which the present can
reinvent itself."
(Whatever the hell that means.)
Even though the concept is much simpler: "adjacent possible" is the set of
things within reach. Or: all the things on the border between what we have,
and what we could have.
------
ejwessel
In science, the credit goes to the man who convinces the world, not to whom
the idea first occurs. \- Francis Darwin.
------
BubRoss
This is just like when Google stole my idea to run fiber optic internet to
people's houses. I totally had that idea a long time ago when I was trying to
download a gif with a 28.8 modem. I'm not sure which of the neighborhood kids
told Google about my idea but they sure screwed me over.
~~~
jboles
Yeah, I once had an idea for auto-scrolling based off tracking eye gaze
through the webcam. I never told Microsoft or Samsung about it, but they
totally stole my idea!!1eleventyone
~~~
dmihal
Even worse: Google stole my idea for self driving cars. I was like " it would
be cool if cars drove themselves" and sure enough, Google copies me. Do you
think I have grounds for a lawsuit?
------
rdl
The idea of a market-basket currency goes back to at least 1976 and Hayek.
[https://en.wikipedia.org/wiki/The_Denationalization_of_Money](https://en.wikipedia.org/wiki/The_Denationalization_of_Money)
~~~
m-i-l
The idea of a supranational currency goes back to at least 1940 and Keynes -
see
[https://en.wikipedia.org/wiki/Bancor](https://en.wikipedia.org/wiki/Bancor) .
------
anbop
MIT is supposed to create ideas that are “lifted” by others. Produce your
patent or shut up.
------
compsciphd
cry me a river. It happens
Docker did the same thing to me.
Compare these two papers (published in 2010 and 2011 in conferences that
docker and everyone else in the space are regular participants at, for
reference Docker was announced in March 2013)
[https://www.usenix.org/legacy/event/atc10/tech/full_papers/P...](https://www.usenix.org/legacy/event/atc10/tech/full_papers/Potter.pdf)
[https://www.usenix.org/legacy/events/lisa11/tech/full_papers...](https://www.usenix.org/legacy/events/lisa11/tech/full_papers/Potter.pdf)
It was then patented (patent filed in 2011, issued in November 2013)
[https://patents.google.com/patent/US8589947B2/en](https://patents.google.com/patent/US8589947B2/en)
This was also my "job talk" to IBM Research and it got me a post doc, but
didn't get much traction in support of continuing to pursue / refine the ideas
within IBM Research (which I find sort of ironic in retrospect with their
recent strategic moves)
------
Animats
It's certainly not a novel idea. Arguably, it's "E-Gold 2.0".[1]
[1]
[https://en.wikipedia.org/wiki/E-gold](https://en.wikipedia.org/wiki/E-gold)
------
codegladiator
> this paper was published as part of this free-for-all part of the Free
> Science part of the Royal Society effort
But but ... can facebook not "lift for free" ?
------
quotemstr
Nobody owns ideas.
~~~
csallen
If only more people understood this. Not only does nobody own an idea, but we
really don't want to live in a world where the opposite is true.
~~~
allana
Right to Read is a good piece on this topic:
[https://www.gnu.org/philosophy/right-to-
read.html](https://www.gnu.org/philosophy/right-to-read.html)
------
0xC0FFEE
The paper was published 18 July 2018. The public inital commit of libra was on
18 June 2019 and had 1,063 changed files. That could be a coincidence or not.
Fact is, only one has realized the idea.
------
xwdv
No sympathy for this guy at all. Think just because you’re an “MIT fellow”
your claims to an idea carry more weight than people from other institutions
or organizations? Get out of here with this entitlement, tons of people come
up with exactly the same ideas all the time.
~~~
gibba999
Plus, 9 times out of 10, it's the MIT types who lift ideas from others and
promote them with MIT's increasingly well-polished hype machine. Within MIT,
Media Lab is central to this problem.
------
malicioususer11
mark zuckerberg stole something? call the Police! :3
------
doctorpangloss
Facebook's faithful copying is the large tech corp _standard operating
procedure_. Google, Amazon, Microsoft and Apple will start product lines based
on accurate rumors about what the others are doing, and then cancel them as
soon as their competitors do. This form of "copy thy neighbor" just happened
with something like three major R&D products/features, one of which was
cancelled and another leaked in the tech press.
Sandy Pentland cares a lot about these things and it's too bad Facebook just
ripped this stuff off.
But he will have the last laugh: People already don't want to work at
Facebook. It didn't matter so much that all those supposedly smart people
aren't really capable of meaningful innovation. There will be a lot fewer of
those smart people now.
~~~
skybrian
Which products/features do you mean?
~~~
petre
Google+? Personal assistants? Self driving vehicles? Cargo drones?
| {
"pile_set_name": "HackerNews"
} |
This Week in HN podcast – our first episode - ThatMightBePaul
https://soundcloud.com/thatmightbepaul/this-week-in-hacker-news
======
jaywunder
You guys really need better quality microphones. I appreciate the idea that
you have, and I think you're generally a funny bunch, but I can't hear what
you're saying if your laughing overcomes that one quiet guy's audio. Other
suggestions would be to introduce yourselves at the start, and keep topicality
more. I enjoyed listening though!
| {
"pile_set_name": "HackerNews"
} |
Windows 10 marks the end of 'pay once, use forever' software - aceperry
http://www.theregister.co.uk/2015/07/31/rising_and_ongoing_cost_of_windows/
======
chmike
I have my finger hanging over the mouse button ready to click install Ubuntu.
I'm not a cash cow waiting to be milked.
~~~
Rockdtben
I will be switching to Ubuntu as well. I have encouraged my friends to do the
same.
------
teaneedz
What will Microsoft be doing a year from now in regards to pricing and
services? This really requires some clarity, because so far Win10 is not
looking good from a privacy perspective IMO. It's not easy to recommend an
upgrade right now with so much unanswered questions regarding data usage and
price roadmap. What is their strategy after the first year?
~~~
matthewarkin
Pricing for Windows 10 has been announced, $110 for Home and $199 for Pro. You
have 1 year to upgrade for free, then you have a license for Windows 10
forever for that machine and you'll be supported for the lifetime of that
device (as defined by Microsoft). If you don't upgrade within that year then
you'd have to pay for the upgrade.
| {
"pile_set_name": "HackerNews"
} |
We are starting WebKit modularization - robin_reala
http://markmail.org/thread/fkiibwrwv3xporxx
======
dhx
_> We hope this will make it much easier to develop vendor-specific features._
DRM[1]? Flash/"ActiveX 2012"[2]?
We've seen a great deal of recent discussion about the harm vendor-specific
CSS properties[3] and X- prefixed application protocol header fields[4] are
causing. No two parties can agree on proposals for the HTML specification.
Microsoft, Google, Apple and Mozilla all tend to disagree and we're stuck with
vendor-specific browser features.
These are not good signs for the health of the Web.
[1] <http://news.ycombinator.com/item?id=3620432>
[2] <http://news.ycombinator.com/item?id=3620537>
[3] [http://lists.w3.org/Archives/Public/www-
style/2012Feb/0998.h...](http://lists.w3.org/Archives/Public/www-
style/2012Feb/0998.html)
[4] <http://tools.ietf.org/html/draft-ietf-appsawg-xdash-03>
| {
"pile_set_name": "HackerNews"
} |
Ask HN: Looking for few testers for my website & associated open-source darknet? - mikeliu8
I'm a dual-class programmer/lawyer who's decided to use my powers for good. I've made an open-source system to let you copy/lend/share files and media privately with friends. It plugs into a site where you can add friends and recommend stuff to them.<p>The website is called LibraryMixer. The open-source system is called the Mixologist.<p>Many have tried before to create software that builds darknets (decentralized, private networks that connect only to your friends). However, darknets have a lot of difficulties that have kept them from being user-friendly enough to gain traction.<p>I've designed a hybrid system where basic, non-sensitive information such as friends lists are handled through the website, and adding friends or notifying them of your activity is as easy as using Facebook, while all of the communications and file transfers over the Mixologist are direct, encrypted P2P connections and still fully decentralized and private.<p>The real benefits emerge when you add reviews and lists of what you have or want on Librarymixer, highlighting them for your friends. The world of media is oversaturated with interesting stuff out there, making the problem not how you should get stuff you want, but how you should find the wheat among the chaff. When used together, LibraryMixer and the Mixologist offer the integrated experience of recommending music or videos or books to your friends via your reviews, and if they're interested, the ability to immediately ask to get those from you using the Mixologist via a single click on LibraryMixer.<p>It's also possible to just drag-and-drop entire folders on your computer into the Mixologist, which your friends can then browse. Or, if you're purely interested in the media reviews and listings, LibraryMixer itself is a fully functional, independent website, and you don't even have to install or use the Mixologist at all.<p>Unlike past P2P file sharing services that have realistically only had minimal non-copyright infringing uses, this system provides a whole range of other functionality besides just sending copies of files, such as lending and borrowing files, responding with automatic messages (think: "Got your request, will bring it next time I see you."), privately browsing and downloading from your friends' personal collections such as their photos, etc. In this sense, like GMail or instant messengers that are neutral tools, it makes it possible to treat users as adults and place the responsibility of staying within legal limits on the users of the tool. In other words, like back when we had VCRs (if you guys still remember what those are), the VCR had the capacity to record ten thousand copies of that Blockbuster video tape you rented, but at the end of the day, it was only you that prevented yourself from doing that.<p>I'm hoping for a small group of tech-savvy volunteers to help test this before I launch. Testers would add each other as friends on LibraryMixer and also use the Mixologist for a week or so to give me some honest, substantive feedback.<p>If this goes anywhere at all in the future, you'll be sure to get some sort of special recognition for helping alpha test.<p>I'd be super grateful if any of you would be willing to help out, and I can set you up with an account if you email me at [email protected].
======
nyellin
Remove your html tags and add double lines for newlines.
~~~
mikeliu8
Thanks, fixed.
| {
"pile_set_name": "HackerNews"
} |
Why Startups Really Succeed: Strings of Luck - dennybritz
http://blog.dennybritz.com/2015/09/13/why-startups-really-succeed/
======
SQL2219
I agree, unicorn founders are not a bazillion times smarter than the rest of
us, maybe 1.05X smarter and 10,000X luckier. But what is the formula for luck?
Do we have some minor control over that? I think I read somewhere that
luck=opportunity + preparation. Preparation we have control over, but we must
be preparing for the right thing. I guess we have some control over
opportunity, which might include building your network and getting out of the
basement once in a while.
~~~
dennybritz
Good question. The problem with "luck" is that you only know what's good or
bad in hindsight. For example, if Google had been acquired for $1M the
founders may have lived happily every after. Only in hindsight we can say that
it was lucky the deal fell through. So I guess it'd be better to call them
"random events" instead of "luck".
~~~
dkersten
I do believe that we can influence our luck (increase or decrease the
likelihood of said random events) but I think some people are better at
capitalising on random events than others.
But despite our influences or skills at making use of these things, at some
point random chance does take over and we have no control over that. All we
can do is influence the probability of random events, not control them
completely.
| {
"pile_set_name": "HackerNews"
} |
Intel to Discontinue Itanium 9700 ‘Kittson’ Processor, the Last of the Itaniums - ch_123
https://www.anandtech.com/show/13924/intel-to-discontinue-itanium-9700-kittson-processor-the-last-itaniums
======
q3k
Mixed feelings. On the one hand, Itanium (as a platform) was batshit insane,
impossible to write good compilers for and the pinnacle of Intel
overengineering. Good riddance.
On the other hand, Itanium was ugly, but had its charm and uniqueness. Itanium
is what EFI was first developed for. Itanium is where the C++ ABI got started.
Itanium being discontinued further reduces mainstream CPUs to the most boring,
safe designs possible: IA32/amd64. ARM was kinda quirky (conditional
execution, barrel shifter), but those were slowly neutered (by introducing
Thumb), and then totally thrown out of the window with aarch64. SPARC is dead.
PA-RISC is dead. RISC-V is new and promising, but is also the most pragmatic
and safe design of an ISA ever. The Mill CPU is interesting, but is
underfunded and I don't think it will ever be taped out.
Similar as with OS research (think: Solaris, Plan9/Inferno), researchy and
experimental CPU ISAs seem to be a thing of the past now.
~~~
pcwalton
x86-64 is anything but "boring" and "safe". :)
Real mode, Mod R/M and SIB byte encoding weirdness, REX prefixes, 80-bit
floats, parity flag, hard-wired registers for shifts/multiplies/divisions,
builtin CRC32 over the wrong polynomial, Pascal calling convention support,
binary-coded decimal, high halves of 16-bit registers, MMX overlap with x87
floating point, etc. etc.
~~~
q3k
Right, but most of these are just past crimes^W^Wlegacy that Intel has to deal
with in the name of backwards compatibility.
~~~
Klathmon
>most of these are just past crimes^W^Wlegacy
This is completely off topic, but I've seen things like the "^W^W" a few times
before, and I don't know what it means.
Is this a weird encoding mismatch thing? is it from some editor/system that
people instinctively type? Is it from some other forum which has a strange
markup syntax for something?
~~~
q3k
Emacs/readline bindings for Delete Word. Open up a bash shell, type in `foo
bar baz`, then press ctrl-W twice.
'^W' is what would appear instead if you weren't in a readline/emacs editor,
but instead a dumb line terminal. Thus, leaving '^W' behind makes it look like
you didn't realize what you just corrected is still visible.
It's a joke. I've now explained and ruined it.
~~~
bluedino
Slashdot posters would use ^H^H in their posts (backspace)
~~~
lscotte
It goes back way further than that - probably to the dawn of IRC or so.
~~~
pjscott
I believe it dates back to the unix talk(1) program, quite a bit earlier than
IRC.
~~~
TheCondor
It’s from the dec terminal emulation, VT100. I think specifically when you
connected to like an ansi type system with dec mode. Or something like that,
the memories are fuzzy
------
chx
From almost exactly ten years ago: How the Itanium Killed the Computer
Industry
[https://www.pcmag.com/article2/0,2817,2339629,00.asp](https://www.pcmag.com/article2/0,2817,2339629,00.asp)
> The MIPS chip, the DEC Alpha (perhaps the fastest chip of its era), and
> anything else in the pipeline were all cancelled or deemphasized. Why?
> Because Itanium was the future for all computing. Why bother wasting money
> on good ideas that didn't include it?
> The failure of this chip to do anything more than exist as a niche processor
> sealed the fate of Intel—and perhaps the entire industry, since from 1997 to
> 2001 everyone waited for the messiah of chips to take us all to the next
> level.
> It did that all right. It took us to the next level. But we didn't know that
> the next level was below us, not above. The next level was the basement, in
> fact. Hopefully Intel won't come up with any more bright ideas like the
> Itanium. We can't afford to excavate another level down.
~~~
ghaff
I'm not sure what point Dvorak is even making in that article. Yeah, a lot of
ultimately wasted effort went into Itanium. But we ended up with x86-64 plus a
somewhat diminished set of CPUs from some of the big Unix vendors. It's an
interesting question but I'm ultimately not sure that the computer industry
would look all that different today had Intel just done 64-bit extensions to
x86 or something similarly evolutionary.
AMD might well not exist. But, except for HP, the big Unix vendors mostly
hedged their bets anyway. The large Japanese companies who also backed Itanium
never were going to make the investments to break out beyond Japan.
~~~
codinger
X86-64/AMD64 was solely developed by AMD and licensed to Intel.
I'm stating this because I can't tell what you mean by:
"wasted effort went into Itanium. But we ended up with x86-64"
~~~
ghaff
Intel was independently developing 64-bit extensions under the code name
Yamhill. I know there some legal settlements around the time so they may have
cross-licensed technology. AMD came out first but Intel had much the same
thing in its back pocket.
What I last statement meant was we ended up by an industry dominated by 64-bit
x86 anyway in spite of all the effort that went into an alternative 64-bit
architecture. So we’d probably be in a similar place had Intel just decided
Itanium was a bad idea from the start.
~~~
chx
What ...? Yamhill was an _answer_ to AMD64. The first rumors appeared in 2002
where AMD announced AMD64 in 1999, released the full specs in 2000 and
actually shipped the first Opteron CPU in 2003 April, Intel shipped the Nocona
in June 2004. This trailing remained for a while -- LAHF/SAHF in 64 bit was
shipped in March 2005 by AMD but only December 2005 by Intel.
~~~
ghaff
Well sure. Intel much preferred Itanium to succeed. Absent AMD, it’s possuble
Itanium would have muddled through in the end. (Or something completely
different would have played out.)
it’s safe to say that Intel has some sort of contingency plan going back quite
a while. Some analysts even thought they saw features in Pentium that
suggested 64-bit readiness.
But it wasn’t until Opteron’s success and its adoption by esp. HP and Dell
that Intel felt they needed to make their 64 bit extensions plan public.
~~~
FullyFunctional
You are correct. What people don't seem to appreciate are the internal
conflicts within large organizations. There were in fact massive internal
conflicts at Intel between the Itanic and the legacy. Companies that large
doesn't "think with a single brain".
Random aside: Itanic was HP's brainchild that was adopted and refined at Intel
(and far from all of Intel was excited about that). Having experienced a VLIW
that _didn't_ suck (the internal engine of Transmeta's Astro 2/Efficieon) I'm
sad that EPIC/Itanic gives VLIW as bad name. However, the future belongs to
RISC-V.
------
johnklos
They shouldn't have killed an excellent processor (the Alpha) which already
had tons of software and history and was already being used in the fastest
supercomputers in the world for a product that was never (and still isn't)
proven. The Itanic was never best in its class at anything.
~~~
skynetv2
agreed, Itanium investment should have gone to the Alpha.
Itanium was really good at raw performance as long as you could write hand
tuned math kernels or kept working with the compiler team to optimize code for
your kernel. Took me a while, but I got 97% efficiency with single core DGEMM.
~~~
shereadsthenews
Hand-written code for Itanium was always smoking fast. One-clock microkernel
message passes and other insanity. But nobody ever figured out how to write a
compiler that could generate code like that for that machine.
~~~
zamalek
> nobody ever figured out how to write a compiler that could generate code
> like that for that machine
Were a lot of people trying? It was a pretty difficult platform to get hold of
and tinker with.
~~~
shereadsthenews
I’m not sure how many people, but it’s all the compiler group at HP did for
the last twenty years.
~~~
Something1234
HP has a compiler group. I wasn't aware there were all that many commercial
compilers still around, and I definitely wouldn't have thought of HP.
~~~
ghaff
Who else do you think would have developed the compilers for HP-UX, VMS, and
NonStop?
~~~
Something1234
Present tense. The GP comment was in present tense, not a long time ago.
------
leetrout
The end of an era and one of the worst technology bets / choices. Every time I
hear Itanium I think of SGI going under.
~~~
tyingq
The original RISC/Unix players were most of my career. Pyramid MIPS/OSX, then
Sparc/SunOS, AIX, PA-RISC/HPUX, Dec Ultrix followed by Alpha, etc. I remember
trying to tell my co-workers that Linux would wipe it all out, shortly after
AMD rolled out Opteron. Most of them chuckled.
~~~
Theodores
I chuckled. Which was silly as I missed the boat with Linux until Ubuntu came
along. The versions of Linux I first saw were mere toys compared to the SGI
awesomeness I knew at the time.
~~~
tyingq
Oh, yeah. I did not see it with early Linux, and like you, thought it was a
fun toy. It was specifically the 64 bit x86 thing that caught my attention.
The memory ceiling for 32 bit x86 made it easy to ignore Linux. If I remember
right, Linux was also still crashing pretty regularly under load just before
that time frame too.
~~~
burfog
Before that time frame, PC hardware vendors had little incentive to make
stable hardware. It was easy to blame crashes on Windows. If the hardware
itself made a few crashes per week, that wasn't going to be enough to be
noticed.
The early 64-bit PC hardware was server grade, intended for NT and Linux. That
set a standard, and then gradually people moved away from junk like Windows
98SE and Windows ME. Hardware bugs no longer had such an easy time hiding in a
flood of software crashes.
------
tyingq
So HPUX finally dies. Doesn't leave much of the original commercial RISC/Unix
players still on some level of life support. I guess there's still AIX/Power.
~~~
protomyth
Last I looked, they were porting HP/UX over to x86. The port came up in the
whole HP vs Oracle lawsuit.
~~~
ch_123
There was talk of this, but it went away. The last suggestion I’ve read about
were some kind of ‘containers’ which emulate HP-UX
[https://www.pcworld.com/article/3196353/data-center/hpe-
offe...](https://www.pcworld.com/article/3196353/data-center/hpe-offers-an-
escape-from-the-aging-hp-ux-os-via-containers.html)
[https://www.theregister.co.uk/2012/06/08/hp_ux_on_x86_projec...](https://www.theregister.co.uk/2012/06/08/hp_ux_on_x86_project_kinetic/)
~~~
greglindahl
Novell Netware lived on for a long time running as a VM. Doing that makes it
much easier to support new hardware.
~~~
Twirrim
I didn't realise Netware had finally been discontinued. That's the server OS I
originally cut my teeth on, dealing with IPX/SPX based networks.
~~~
pjmlp
Me too. :)
We used it for a Clipper based management application.
My first task was bringing back to life our school labs network, so that we
could use it for that application, got to love those coaxial cable
terminators.
~~~
Twirrim
> got to love those coaxial cable terminators.
Man. So many memories of walking around the school with a cable tester trying
to find where the ring had been broken _this_ time.
I was so glad to see that ring network be retired.
~~~
protomyth
We are buying a new iSeries and the IBM person was very specific that the
terminal we have in the server room is NOT supported anymore without some
weird interface board. I was kind of sad at the thought. Even sadder knowing
I'm going have to load IBM's client access software on some poor PC.
~~~
Twirrim
SNA? It's super fantastic fun. Honest.
I worked for an egovernment company several years ago. A state (county?)
agency built a service with us, and wouldn't expose the actual database to us,
just an SNA supporting interface. We were essentially scraping the data.
Messy, unsanitised data. I really didn't envy the developer who looked after
that particular application.
~~~
protomyth
I'm pretty sure what we are getting is a renamed Client Access on a small PC
we need to set in the server room. Client Access is legendary for how bad it
is from installing to using. I would rather have the terminal.
------
gumby
I wonder what it’s like working on Itanium over the last decade (and perhaps
earlier). I can see someone joining early on when the marketing buzz was
exciting and reality had not set in.
But now...you’re working on a product that is widely mocked and has no future,
yet releases are still being made. How depressing...what causes someone to
stay on?
~~~
ghaff
A lot of people have good jobs supporting and incrementally enhancing legacy
products and product lines of various kinds in software, computer hardware,
and in many other areas. It’s mostly a Silicon Valley concept that if you’re
not working on something ground-breaking you’re wasting your life. And how
many people at some of those big SV companies are mostly just working on ad
tech?
~~~
gumby
True, my point is that itanium itself was a laughingstock, and clearly with no
future, so must have been embarrassing to talk to your friends about what you
do for work.
Making spare parts for the B-52, or maintaining security fixes for Solaris
(which has its fanatic fans) can be rewarding, no question. But to work on the
Itanium any time in the last decade must have been soul-sucking.
~~~
achiang
I was an HP-UX kernel engineer from 2002 til 2005, a brief interlude writing
IA64 CPU diagnostics, and then and a Linux kernel engineer from 2007 til 2010,
all on Itanium systems.
In that time frame, it wasn't clear that horizontal scale out architecture
(aka "the cloud") was going to dominate, and that scale up systems were going
the way of the mainframe. The thinking was that there would always be a
healthy balance of scale out vs scale up, and btw, HP alone did $30B+ revenue
yearly on scale up with very slow decline, just like the mainframe market,
which is still $10B+, even today.
To put that in today's terms, if you pitched a startup with a $30B TAM, VCs
will definitely be returning your emails.
So no, it wasn't embarrassing to talk about working on IPF any moreso than it
would be to talk about POWER today. It's just another CPU architecture with
some interesting properties but ultimately failed in the market place. Just
like Transmeta or Lisp Machines.
What _should_ be embarrassing, but clearly is not, is to slag off entire
industries not knowing shit about them.
Edit: I think working on B-52 parts would be an amazingly fun job.
~~~
gumby
thanks.
------
ithkuil
OpenVMS port to x86-64 still work in progress:
[http://www.openvms.org/node/111](http://www.openvms.org/node/111)
~~~
rocky1138
I was surprised to see this so far down the comments chain. What will OpenVMS
do without Itanium?
~~~
ghaff
As the parent indicates they're porting it to x86-64. I've been away from
following HP proprietary systems for almost 10 years but they put a plan in
place quite a while ago when it became obvious that Itanium had no future.
Remember that systems in this space don't need to be the latest and greatest.
They need a long support roadmap but it's mostly fine if hardware is on the
older side.
------
pinewurst
Back in 2012, Oracle published some interesting (and IMHO amusing) internal HP
documents re Intel and ongoing Itanium development.
[http://www.oracle.com/us/corporate/features/itanium-346707.h...](http://www.oracle.com/us/corporate/features/itanium-346707.html)
------
ttul
I got to work with one of the first Itanium machines back in 2000 working as
an intern. My job was to port Perl to IA-64. It was an amazingly fast machine
- like living a few years into the future.
I can see why it failed to gain mass traction, but that’s a shame. IA-64 was
so innovative.
~~~
macintux
HP paid my employer (Progeny) to help port Debian packages to an early Itanium
system. I don’t remember thinking it was fast _at all_ , but maybe my memory
is colored by later miseries.
------
arnon
It's interesting that it was actually AMD that kept the Intel x86-64
architecture alive.
Intel knew that the x86 architecture was limited in time, and tried to kill it
off with the the 64-bit Itanium.
AMD had a different plan, and released 64-bit capable x86 processors,
obstructing Intel’s plans to dominate with Itanium. I think this is key to why
Itanium never caught on, and why writing software for it is so hard.
------
kijiki
Itanic inspired what is unquestionably the best graph-based trolling of
bullshit marketing ever:
[https://regmedia.co.uk/2004/09/19/itanium_sales_small.jpg](https://regmedia.co.uk/2004/09/19/itanium_sales_small.jpg)
Wikipedia has an updated version as well:
[https://upload.wikimedia.org/wikipedia/commons/8/88/Itanium_...](https://upload.wikimedia.org/wikipedia/commons/8/88/Itanium_Sales_Forecasts_edit.png)
------
InclinedPlane
Itanium represents a classic case of jumping architectures and committing too
soon. Any mature system represents not just the sum of a huge amount of design
work but also an untold number of hours (years really) of beta testing, bug
fixing, and iterative refinement. A new system may be built on a better
foundation but more often than not in its immature state it will still have
shortcomings until it's been through a long period of "burn-in" and bug
fixing.
------
ddtaylor
It's x86 all the way down.
------
baybal2
People have to admit that "Itanic" was a just name for it.
------
tapland
Well, guess we'll hope for that X86 OpenVMS to be released soon then.
------
paulie_a
Honestly I thought they ditched the itanic a decade ago.
------
robk
Goodbye Itanic
------
hestefisk
R.I.P. Itanic.
| {
"pile_set_name": "HackerNews"
} |
Sourcing a 3d Printer - ph0rque
http://blog.reprap.org/2011/04/sourcing-3d-printer.html
======
sambeau
The most exciting news from this project is that it has gone from costing
$3000+ to just $400 in 3 years.
If they keep innovating at that rate we could see some seriously useful kit in
a few year's time.
~~~
rcamera
Actually, the most exciting news from the project is that it has gone from a
prototype with poor printing quality to a 3d printer of a great quality to its
low cost. Not to mention that it has also inspired dozens of other printers
design, including comercial ones like the Makerbot, and can easily be modified
to support a lot more printing materials than just thermoplastics (you can
even use it to print electronic circuits or food!). In the end, if you know
what you are doing, with a couple of these you can print models as good as the
ones from the expensive comercial printers.
| {
"pile_set_name": "HackerNews"
} |
Doom on GLium, in Rust - hansjorg
https://docs.google.com/presentation/d/1TjWba0CR9RHFm47rvW1nFUlmouaR55Xt235aHyLPf9U/edit#slide=id.p
======
outworlder
Are my perceptions clouded from being inside the Hacker News echo chamber, or
is Rust really picking up steam really fast?
It seems to have more libraries and the ones it has are more advanced than
what would be expected from a language this young.
~~~
swah
[http://arewewebyet.com/](http://arewewebyet.com/)
I always look for a SQL driver, and _then_ if it has connection pool support.
If a language passes this second test, the language is ready ;)
~~~
killercup
So, rust is ready? There are multiple database drivers and there is at least
one crate for connection pools (r2d2) that also works with diesel (query
builder).
------
xvilka
Same user (tomaka) also wrote Rust bindings for Vulcan API - vulcano[1], which
obviously can be used for creating modern games.
[1] [https://github.com/tomaka/vulkano](https://github.com/tomaka/vulkano)
------
devishard
God, Google Docs is really horrible for non-documents. They literally just
scroll me way too fast through content when I try to go to the next slide, and
worse, they hack my back button so that each slide is a new page, meaning I
basically have to open a new tab.
It's also bad for images; for some reason they thought the scroll wheel should
zoom in and out instead of scroll, and the only way to scroll is to click and
drag. It's like their UI devs are on crack.
~~~
bitmapbrother
I don't have this issue in Chrome, but you can always use the arrow keys if
your mouse is having issues. As for the back button - works fine for me and
takes me to the previous slide. You can even download it as a PDF or
Powerpoint if you like.
~~~
debaserab2
Ugh, the last thing I want is for my browser back button to be hijacked by a
slideshow presentation. Help, I'm stuck in a powerpoint.
~~~
tracker1
If you think of each slide as a separate page, as some do, it makes sense.
~~~
debaserab2
I just wish there was a way to opt-in to it first.
My instinct when I hit the site was to use my mousewheel to scroll down,
because I didn't immediately realize it was a slide deck. So my mousewheel
advanced the deck about a dozen slides and wrecked my back button.
------
vvanders
+1 on glium as I've previously mentioned here:
[https://news.ycombinator.com/item?id=11620852](https://news.ycombinator.com/item?id=11620852)
As someone who spends a lot of time in OpenGL it's a really solid, rusty API
that's quite a joy to work with.
------
Keyframe
It says "Glium: Multi-threading... Send + Sync + Context Management (means it
can be done)".
Can someone explain a bit about this? I'm not familiar with Rust, but with C
you have to run GL calls from one and the same thread or you're gonna have a
bad day.
Bonus question: Anyone that was/is C programmer (not C++) with opinions on
Rust?
~~~
vvanders
There's more details in the presenter notes:
>I won’t get into much detail about threading, but imagine how the OpenGL
skynet-state-machine interacts with multiple threads. GLium ensures only a
thread-specific OpenGL context is used on any particular thread.
>By making everything neither Send nor Sync, it prevents you from using
resources created by one thread in another, enforcing OpenGL semantics at
compile-time.
Basically any type without Send+Sync traits will not work with existing
threading APIs(since they require combinations of Send+Sync based on threading
semantics) forcing API calls to be done on the right thread.
~~~
Keyframe
Thanks! I was in presentation mode, for some reason, and didn't see the notes.
------
hansjorg
There's more info and links in the speaker notes (on the options menu).
------
alex_duf
I don't get why slides are popular. We're missing 50% of the actual content of
the talk here.
~~~
lockyc
I agree, but this one has the speaker notes
------
cm3
Right after slide 1 appearing, this redirects to
[https://support.google.com/accounts/answer/32050](https://support.google.com/accounts/answer/32050)
for me in Firefox.
~~~
Sarkie
Fine for me?
~~~
cm3
It works in an unrestricted Chrome instance. I wonder if there's a Google docs
downloader script that directly gives me the PDF without dealing with the
wonky website.
~~~
qwertyuiop924
<rant> Google, take your browser team of the loony pills for FIVE SECONDS!
Chrome isn't the only browser in the world. Having your website crash and burn
one one of the most popular browsers out there that isn't yours is beyond
unacceptable. Especially if you push web standards and make recommendations to
other developers and sites to make their sites support all browsers. </rant>
| {
"pile_set_name": "HackerNews"
} |
US/UK news has been responding to Coronavirus since 2020 - massanishi
https://public.tableau.com/profile/masatoshi.nishimura#!/vizhome/CoronavirusMentionedinNewsPublishers/ResponsestoCoronavirusby5MajorPublishers?publish=yes
======
massanishi
I analyzed 46,601 news over the past 3 months from the major US and UK
publishers (New York Times, CNN, Forbes, BBC, Guardian). It measures how often
the word "coronavirus" is mentioned. The second graph shows how different
countries are covered, mapped with the outbreak incidents.
It demonstrates how our attention has shifted more to the virus and jumped
among different countries based on the outbreak occurrences.
I've used my project for the data source. If you like to visualize your
reading, come check it out ([https://kaffae.com](https://kaffae.com))
| {
"pile_set_name": "HackerNews"
} |
The Interrobang, Symbol of WTF Culture - JamesLowell
http://www.theatlantic.com/science/archive/2010/07/the-interrobang-symbol-of-wtf-culture/60546/
======
wglb
Most judiciously used in discussing <http://cuiltheory.wikidot.com/what-is-
cuil-theory>
| {
"pile_set_name": "HackerNews"
} |
Communication blackout is forcing young entrepreneurs out of Kashmir - amrrs
https://www.thehindu.com/news/national/in-a-land-without-internet-how-the-communication-blackout-is-forcing-young-entrepreneurs-out-of-kashmir-valley/article30219792.ece
======
amrrs
For some context on Internet Shutdown:
[https://news.ycombinator.com/item?id=20701204](https://news.ycombinator.com/item?id=20701204)
| {
"pile_set_name": "HackerNews"
} |
A short critique of the Khan Academy - edtechdev
http://www.tonybates.ca/2012/03/14/a-short-critique-of-the-khan-academy/
======
edtechdev
There do not appear to be any instructional designers or learning scientists
or faculty developers working with Khan Academy, Udacity, or Coursera. The
closest is a 'course operations specialist' for Coursera: "As part of this
multi-faceted role, you will train our teaching staff to produce video
lectures". It's all just lecture videos.
As a contrast, here are a few free, self-paced non-lecture-based courses from
the Open Learning Initiative (the downside is they take millions of dollars
and years to make their courses)
<https://oli.web.cmu.edu/openlearning/forstudents/freecourses>
| {
"pile_set_name": "HackerNews"
} |
Verizon Has Never Challenged NSA, Exec Mocks Internet Companies For Doing So - opendais
http://www.techdirt.com/articles/20130917/17490324560/same-day-its-revealed-verizon-has-never-challenged-nsa-it-mocks-internet-companies-doing-so.shtml
======
skunkednoH2O2
How could they admit this publicly?
~~~
mschuster91
A clear case of "the company's PR rep was asleep/out of office and could not
prevent the fool from talking about stuff he wasn't supposed to"
| {
"pile_set_name": "HackerNews"
} |
Text Recognition Simplified. Capture any text from your Mac's screen - twoperkg
https://textsniper.app/
======
twoperkg
Hi HN,
The idea to build TextSniper was born from my personal, trivial use-case. I
was watching a YouTube video tutorial and on the video was a link I needed to
paste into Terminal application. The link was quite long and the only option
was to retype it. Then I thought, would not be great, if I just could draw a
selection around this link on the video and turn it to typed text and then
easily paste anywhere I need. No mistyping and the job is done in seconds.
| {
"pile_set_name": "HackerNews"
} |
“Not Safe for Brand” (NSFB) or How Reddit Will Censor Controversial Content - neverminder
https://penetrate.blogspot.com/2018/01/not-safe-for-brand-nsfb-or-how-reddit.html
======
krapp
I don't understand the conspiratorial language here. The premise that
businesses "love leftist dogma" because it's "non-controversial" is farcical,
and an API flag marking something as unsafe for advertisement isn't
"censorship."
The slippery slope arguments being employed by certain people in defense of
"free speech" are starting to devolve into a swamp. I put free speech in
quotes there because I have little doubt, judging from the site's content and
my impression of the author's views, they would have no issue at all with
censorship of "leftists" and their speech.
~~~
CommieBobDole
One the one hand, as someone more or less on the left, I am a little concerned
with the political orthodoxy I see on the left, where there's a package of
"correct" ideas of varying quality, and disagreeing with or having varying
levels of enthusiasm about any of them is seen as almost worse than rejecting
them all entirely.
On the other hand, nearly everyone I see these days who talks about being
really passionate about free speech and preventing groupthink seems to be an
actual goddamned neo-Nazi whose idea of free speech is the right to scream
racial slurs at top volume into the faces of "libtard cucks" until they're
driven out of public spaces and they can resurrect the Third Reich without
interference.
~~~
existencebox
I realize your statement may be slightly hyperbolic, but I want to reassure
you there are many moderate/centrally leaning individuals passionate about
free speech and the power of questioning any status quo as a tool to seek
truth. (obviously not as many as I might desire, but...) This _cannot_ be an
issue that only becomes provenance of the worst kinds, because then it becomes
easy to dismiss. One need only be a student of history to see the importance
of the above for _breaking_ oppression and tyranny.
(Sorry, not to distract from the OP and the primary discussion, I just felt
strongly enough about the above statement to wave a "I promise we're out here"
flag.)
------
CommieBobDole
This is literally a flag for "this thing is uncontroversial enough that we can
display ads on it without the advertiser complaining". I don't see how this is
a problem for a commercial enterprise that makes its money from advertising.
I encourage anyone reading this to browse around the rest of the linked site
and decide for yourself whether the authors are driven by a sincere desire to
protect free speech for everyone on Reddit, or if maybe they have another
agenda in mind.
------
freeone3000
So the insidious actions here are that certain subreddits are going to be
manually reviewed, and marked as safe for large advertisers based on the
absence of objectionable content. And reddit has yet to make a public
announcement on this.
Cool? Seems like a sensical approach to monetization for me.
~~~
paulddraper
Choosing where to have your brand is really basic advertising stuff.
\---
That said, it's a little weird to have a global NSFB tag.
Safe for what brand? NRA? Ben & Jerry's? NFL? Chick-fil-a? Planned Parenthood?
Hooters? Disney? Communist Party USA?
It further coalesces a division between universally "acceptable, popular" and
universally "unacceptable, unpopular" thoughts.
~~~
freeone3000
There is already a global "nsfw" tag (applied per-post) for users to flag
content as potentially objectionable. I don't see this as a huge step beyond
that conceptually, it's the same thing with a different purpose.
~~~
paulddraper
But NSFW has a very well-understood definition: obscenity/gore. Obscenity is
even a matter of legal interest and gets tried in court.
NSFB is really, really mushy. It's a matter of marketing interest.
------
nazihunter1234
Umm ... if it wasn't already obvious, this guy is a nazi. See:
"But if I tell that obvious truth about the ongoing program of genocide
against my race, the white race, Liberals and respectable conservatives agree
that I am a naziwhowantstokillsixmillionjews. They say they are anti-racist.
What they are is anti-white."
[https://penetrate.blogspot.com/2016/02/americas-race-
problem...](https://penetrate.blogspot.com/2016/02/americas-race-problem.html)
See also: [https://penetrate.blogspot.com/2016/02/why-europe-is-
committ...](https://penetrate.blogspot.com/2016/02/why-europe-is-committing-
suicide.html) [https://penetrate.blogspot.com/2010/01/racist-word-
invented-...](https://penetrate.blogspot.com/2010/01/racist-word-invented-by-
ussrs-leon.html) [https://penetrate.blogspot.com/2016/11/an-alt-right-
search-e...](https://penetrate.blogspot.com/2016/11/an-alt-right-search-
engine.html) [https://penetrate.blogspot.com/2016/10/anonymous-email-is-
an...](https://penetrate.blogspot.com/2016/10/anonymous-email-is-anti-
semitism-new.html)
~~~
paulddraper
Where in those blog posts do you see that he is a member, ally, or ideological
proponent of the National Socialist German Workers' Party?
He's a nationalist, but explicitly rejects Nazism/neo-Nazism.
> Why the Future of Nationalism is Far from the Mess that is "White
> Nationalism"
> To my mind, it's a mistake to identify as pro-white or neo-Nazi when what we
> want is much simpler...That means that each nation rules itself, makes its
> own rules, and does so through culture instead of the bureaucratic
> governments that absorb infinite money, make crazy rules, become corrupt,
> and kick down your door in the night because you said something socially
> unpopular on Farcebook or Twitless.
> In my view, those who want to be "pro-white" should shift to this
> generalized nationalist program
[https://penetrate.blogspot.com/2013/11/why-future-of-
nationa...](https://penetrate.blogspot.com/2013/11/why-future-of-nationalism-
is-far-from.html)
EDIT: I definitely don't agree with his views; I'm just don't want HN to
devolve into factless name-calling/labeling. I wouldn't call indiscriminately
call anyone with far-left views "commies". We already have Reddit.
~~~
CommieBobDole
Thank you for your pedantry - You are indeed correct that the author of the
linked site does not appear to be a current member of a political party that
ceased to exist some 70+ years ago.
He or she does, however, appear to be a neo-Nazi, a white nationalist and a
white supremacist.
~~~
paulddraper
CommieBobDole, it's not pedantics; I simply saw his public denouncement of
white nationalism/white supremacy/neo-Nazism (while still supporting general
nationalism/cultural unity) and took it at face value.
If you disagree, you might explain why.
~~~
CommieBobDole
Here's an article from the site calling for less race-baiting because it's
harmful to the public perception of white nationalism, thereby hindering white
nationalists from reaching their goals:
[https://penetrate.blogspot.com/2015/05/you-can-fight-for-
rac...](https://penetrate.blogspot.com/2015/05/you-can-fight-for-racial-
nationalism.html)
Here's an article that suggests it's counterproductive to beat up gay people
because again, it's unpopular, and instead advocates that they be segregated
and their behavior outlawed as an unpleasant nuisance:
[https://penetrate.blogspot.com/2016/03/a-word-on-
homosexuals...](https://penetrate.blogspot.com/2016/03/a-word-on-
homosexuals.html)
Here's a link to a donation campaign being run by the organization "White
Revolution" with the context that if white nationalist groups were more
practical like this, the author would like them more.
[https://penetrate.blogspot.com/2011/04/unbelievable-white-
na...](https://penetrate.blogspot.com/2011/04/unbelievable-white-nationalists-
do.html)
Here is a link to a lighthearted funny meme about Anders Breivik, a neo-nazi
who murdered 77 people.
[https://penetrate.blogspot.com/2014/01/anders-breivik-
king-o...](https://penetrate.blogspot.com/2014/01/anders-breivik-king-of-all-
media.html)
The general tone of the site seems to be that of a white supremacist and neo-
nazi who believes that others who share his or her goals are not effective and
should adopt other tactics in order to achieve their aims.
If you're not able to see this, I have to question whether you've reviewed the
material your commenting on, or if you're incredibly politically naive, or if
perhaps your questioning is not entirely in good faith.
~~~
true_religion
So the author is calling for less violence against minorities, wants to remove
racist language from public discourse, but he must still be racist because he
does not totally condemn racists who happen to want the same goals as he does?
Not criticizing, I just want to know if this is a fair assessment. I do not
know how I feel about this in general, but in specific, his short term goal of
reducing violence makes him a more tollerable enemy.
~~~
krapp
> but he must still be racist because he does not totally condemn racists who
> happen to want the same goals as he does?
Yes, because those goals are racist.
He's racist because of his belief in and support for white nationalism and
racial segregation, and the genetic and cultural superiority of the white
race, and his definition of "western civilization" in purely (pun intended)
racial terms. He's racist because he views the presence of non-white people as
a form of pollution and believes in racist conspiracy theories like white
genocide.
Being racist and civil is still being racist.
~~~
paulddraper
I'm not sure "genetic superiority" is in his list of claims. But in any case,
going back to the original point, there's some real muddling of terminology
here.
Racist != Nazi
My great grandmother was racist. Woodrow Wilson was racist. Neither one was a
Nazi.
~~~
krapp
>My great grandmother was racist. Woodrow Wilson was racist. Neither one was a
Nazi.
Fair enough. Racist but not full Nazi.
------
notatoad
The mix of conspiracy theory and condescension in this article is really
obnoxious.
------
John_KZ
Reddit has already devolved into a forum for 15 year olds to post nonsense
jokes. Those of us who knew how reddit used to be and still occasionally visit
tend to stay away from the main subs and visit for very specific reasons.
We should make another forum-aggregator to replace reddit and it's terrible
moderation system, but it probably just won't get big enough.
~~~
Finch2193
I have been patiently waiting for an alternative to Reddit. In this time, I
have been reading books, and hacker news. Going back to Reddit feels like an
extreme regression.
Should I give up on the hope that one day we'll see another, better Reddit?
Digg died when they redesigned their site, I was hoping we'd see the same
thing with reddit, rinse and repeat...
~~~
elektor
There is an offshoot of Reddit that I frequent and enjoy, it was made by a
former Reddit dev: [https://blog.tildes.net/announcing-
tildes](https://blog.tildes.net/announcing-tildes)
I've got 2 more invites for those are that interested.
| {
"pile_set_name": "HackerNews"
} |
Time to Get Past Facebook and Invent a New Future - ryandvm
http://www.theatlantic.com/technology/archive/12/04/the-jig-is-up-time-to-get-past-facebook-and-invent-a-new-future/256046/
======
AznHisoka
Yes, it's time invent a Matrix, and finally make humans immortal. That's the
next killer app. No more prettified digital pixels, please.
| {
"pile_set_name": "HackerNews"
} |
PostgreSQL Monitoring Cheatsheet - websec
http://russ.garrett.co.uk/2015/10/02/postgres-monitoring-cheatsheet/
======
dijit
Reddit discussion;
[https://www.reddit.com/r/PostgreSQL/comments/3nhcnh/postgres...](https://www.reddit.com/r/PostgreSQL/comments/3nhcnh/postgresql_monitoring_cheatsheet/)
I actually met the author before, he's a nice guy and a good sysadmin- I'm
glad he incorporated feedback from reddit (even if he was downvoted).
| {
"pile_set_name": "HackerNews"
} |
Graceful Athiest – What If I Grant You That? (2016) - logicprog
https://gracefulatheist.wordpress.com/2016/11/26/what-if-i-grant-you-that/
======
logicprog
I'm a Christian but this is a particularly well thought out and fair anti-
apologetic piece. I thought it would be interesting to see what HN thought of
it (as a long-time lurker :)
------
microwavecamera
In fairness of disclosure I'm not a Christian or an Atheist but I think it's
ironic every Atheist's argument I've read so far uses the exact same dubious
logic, unscientific reasoning and cherry picking of facts that they criticize
Christians for.
~~~
diehunde
argument for what?
~~~
microwavecamera
Check out the article.
~~~
diehunde
I did but you said every atheist, not the author. So what argument are you
talking about
~~~
microwavecamera
I did not say every Atheist. I said every Atheist's arguments I've read so far
which, so far, fall victim to the same logical fallacies they argue against.
I'll try cover some of the broader points I keep seeing repeated without
writing a book here.
1\. Assuming all Christians believe the same thing.
I'm Irish-American, my father's side of the family are Catholic and my mother
side are Protestant. I can tell you from first hand experience "Christians"
don't agree on crap when it comes to Christianity. And the author leaves a
telling clue to this towards the end when they mention most of their
experience is with Evangelicalism. The Evangelicals are a small minority among
Christians worldwide, and most mainstream Christians think Evangelicalism is
way out in left field. The author makes no effort to address this issue but
instead builds their arguments off assumptive axioms without explanation or
clarification.
2\. Christians aren't the only people who believe in the Biblical "god"
The author again homes in on specific cherry picked tenants of Christianity,
specifically the question of the divinity of Jesus, as an argument against the
existence of God. Jews and Muslims don't share that belief. Hell, not even all
Christians agree on this point. In fact, the first schism of early Christian
church was over the question of the divinity of Jesus. Why is this never
addressed?
3\. Skepticism = Science
This is another common fallacy I keep coming across. Skepticism itself is
inherently unscientific and attempting to contort science to fit an opinion is
equally unscientific.
4\. Science is an opposing view to belief in "God"
The author attempts to make this same core argument I see used repeatedly.
That belief in "God" comes from ignorance of science and rejection of rational
thought therefor believing in "God" is unscientific and irrational. This
argument is just illogical. If this were true, we should be able to deduce
that most scientist are also Atheists but we know that's simply not true. Even
Einstein believed in God. One doesn't negate the other. Again this is never
addressed.
.....
You'll have to excuse me if that was disjointed and doesn't cover everything.
That's off the top of my head, I wasn't expecting to get into this today. And
look, as I mentioned before, I'm not a Christian or an Atheist and if you're
an Atheist, that's fine. I'm not criticizing you for what you think or
believe, but as an outside observer, I don't see much difference in the
arguments the author makes and the particular "Christians" they single out to
refute.
~~~
diehunde
That's fine. But you know, Einstein didn't believe in god. That is a lie
spread out by Christians probably to refute the same point you're trying to
make. Also most of the modern scientists (the ones that know or knew about big
bang, evolution, etc) also don't believe in god. I bet they don't even call
themselves atheists. Today we are reaching a post-theistic stage in which
people don't want to waste their time thinking in religion or stuff like that.
I personally hate the "atheist" title. Is ridiculous, just like it would be
ridiculous to have a name for someone who doesn't believe in ghosts or
goblins.
Finally, any serious person that knows about science and philosophy of science
knows that religion and science have nothing to do with each other. You can
perfectly be both. What you can't do, is call yourself a person of science,
and don't accept scientific evidence for something that was scientifically
measured.
~~~
microwavecamera
> Einstein didn't believe in god.
"I am not an atheist" \- Albert Einstein
> Also most of the modern scientists (the ones that know or knew about big
> bang, evolution, etc) also don't believe in god.
Who? Research it, their views pretty much run the gamut like anyone else's.
For example:
"Although I am now convinced that scientific truth is unassailable in its own
field, I have never found it possible to dismiss the content of religious
thinking as simply part of an outmoded phase in the consciousness of mankind,
a part we shall have to give up from now on. Thus in the course of my life I
have repeatedly been compelled to ponder on the relationship of these two
regions of thought, for I have never been able to doubt the reality of that to
which they point."
\- Werner Heisenberg
Pascual Jordan was Christian, Enrico Fermi was Agnostic, Max Born was a Jewish
Lutheran but was just completely apathetic to organized religion while Niels
Bohr, Richard Feynman and John Bell were self avowed Atheists. Schrödinger
called himself an Atheist but had a strong affinity for Eastern spiritually
and Oppenheimer was into Hinduism. And if you want to get into some _really_
weird stuff, look up Jack Parsons, founder of JPL at NASA.
Scientists are just people like the rest of us and grapple with the same
questions in life all of us do.
| {
"pile_set_name": "HackerNews"
} |
Love Is All You Need: Insights from the Grant Study - dankohn1
http://www.artofmanliness.com/2014/09/02/love-is-all-you-need-insights-from-the-longest-longitudinal-study-on-men-ever-conducted/
======
lutusp
A classic psychology study -- it discovers traits that successful, mentally
healthy people have in common, but without being able to explain _why_ those
traits might be important, or uncover any cause-effect relationships that
might exist.
Not having an explanation, only a description, means that the detected traits
are mere correlations, neither causes nor effects. Like most such studies, the
conclusion is that people are happy because they're in relationships -- or is
it that people are in relationships because they're happy? Or is it that an
unexamined variable, such as one or more genetic traits, produces a person who
is both happy and in a relationship?
Psychology can't tell us. But it can certainly pretend to.
This is why work that relies only on description isn't science. _Science
requires testable, falsifiable explanations_.
Further reading:
[http://arachnoid.com/science_of_mind](http://arachnoid.com/science_of_mind)
| {
"pile_set_name": "HackerNews"
} |
Namecoin - rfreytag
https://en.wikipedia.org/wiki/Namecoin
======
JacobAldridge
At the risk of hijacking yet another cryptocurrency thread, this is an
opportunity to note how valuable I believe HN to be when it highlights primary
sources.
Secondary sources - whether it's lazy journalism, blog-jacking, or Wikipedia,
engages us here in a discussion already framed through another person's or
group of people's editorial eyes. Is there no better overview of Namecoin than
its Wikipedia page?
~~~
bachback
[http://namecoin.info](http://namecoin.info)
This is where it started:
[https://bitcointalk.org/index.php?topic=1790.0](https://bitcointalk.org/index.php?topic=1790.0)
satoshi's comment on the matter, posted 4 days before he left the forum.
"I think it would be possible for BitDNS to be a completely separate network
and separate block chain, yet share CPU power with Bitcoin. The only overlap
is to make it so miners can search for proof-of-work for both networks
simultaneously.
The networks wouldn't need any coordination. Miners would subscribe to both
networks in parallel. They would scan SHA such that if they get a hit, they
potentially solve both at once. A solution may be for just one of the networks
if one network has a lower difficulty.
I think an external miner could call getwork on both programs and combine the
work. Maybe call Bitcoin, get work from it, hand it to BitDNS getwork to
combine into a combined work.
Instead of fragmentation, networks share and augment each other's total CPU
power. This would solve the problem that if there are multiple networks, they
are a danger to each other if the available CPU power gangs up on one.
Instead, all networks in the world would share combined CPU power, increasing
the total strength. It would make it easier for small networks to get started
by tapping into a ready base of miners."
"@dtvan: all 3 excellent points. 1) IP records don't need to be in the chain,
just do registrar function not DNS. And CA problem solved, neat. 2) Pick one
TLD, .web +1. 3) Expiration and significant renewal costs, very important."
~~~
baddox
JacobAldridge asked whether there is a better overview of Namecoin than it's
Wikipedia page. Having read the Wikipedia page and the Namecoin homepage you
linked, I can confidently say that the former is a much more detailed and
informative overview.
~~~
bachback
strangely enough there are a million people who know about this project and
1-2 actually participate. it's a wiki and opensource project, so everyone in
the world is free to contribute. same with bitcoin. roughly 5 active
developers at the moment, working mostly in their spare time.
~~~
wcoenen
Look at the list of contributors at the end of the release notes of the
upcoming 0.9.0 release of the bitcoin reference client[1]. Or look at the
activity of other projects, e.g. the bitcoinj google group[2]. There's a lot
more than 5 people working on bitcoin.
[1]
[https://bitcoin.org/bin/0.9.0/test/README.txt](https://bitcoin.org/bin/0.9.0/test/README.txt)
[2]
[https://groups.google.com/forum/m/#!forum/bitcoinj](https://groups.google.com/forum/m/#!forum/bitcoinj)
~~~
bachback
the number of people contributing is extremely small compared to the people
who know about it/make money of it/are enthusiastic about it/could contribute.
There is not a deep bench of developers. Many open issues which don't get
solved because the 3-4 main devs (laanjw, sipa, gavin) are to busy. look at
coinbase: they get rich of it, take 1% fees and add nothing back whatsoever.
------
Sanddancer
I like the idea of namecoin -- uncensorability is pretty cool from a
technological standpoint -- however the other flaws of bitcoin make me wary of
basing any sort of serious DNS replacement on it. Given that there's no plans
to increase the number of namecoins in circulation, and that creating a domain
by its very definition destroys namecoins, that 50nmc cost to buy a domain
becomes increasingly expensive over time as people buy namecoins, peoples'
wallets get lost, fraud occurs, etc. I'd be more interested if they did
something like dogecoin and reated some sort of inflationary method to
counteract this, so that we don't end up with the same mess DNS is in, only
with slightly different bad actors.
~~~
walden42
Namecoin is not controlled by anyone in particular. If it grows in demand and
people want the inflationary feature (or anything else), it will be
implemented by the network.
~~~
bachback
no, money supply is fixed. changing money supply like doge did is possible,
but risks destroying the network.
~~~
kushti
Money supply is fixed but prices for database record insertion/update could be
changed painlessly.
~~~
sillysaurus3
If the money supply is fixed, then people will have a harder time acquiring
namecoin after all the namecoin is generated. People will have to buy it, and
since it's a scarce resource, it may become extremely expensive. Especially if
namecoin exploded in popularity.
I suppose if it becomes expensive then the namecoin admins could lower the
cost of database inserts/updates. But it seems like that would prompt the
price per namecoin to rise accordingly, because the value of namecoin is a
single database insert or update.
------
thefreeman
I'm confused as to why this is suddenly at the top of HN? Were people not
aware of one of the original "alt" cryptocurrencies?
~~~
bachback
silicon valley found out about it. several tweets of major figures last week.
~~~
based2
[https://news.ycombinator.com/item?id=7401999](https://news.ycombinator.com/item?id=7401999)
------
al2o3cr
"On October 15, 2013, a major flaw in the namecoin protocol was revealed by
the Kraken exchange COO, Michael Grønager. The exploit allowed any user to
freely steal any domain from any other user.[34] A temporary fix was deployed
which prevents fraudulent name transactions from affecting the name database
without requiring miner intervention, and a long-term fix which rejects blocks
containing such transactions is scheduled for block 150,000 if a majority of
miners upgrade.[35]"
Well, I'm sure stoked that we're building the future infrastructure of the Net
on something that we're pretty sure doesn't have a ginormous security hole
_anymore_...
------
FredericJ
If you don't know about Namecoin here are too additional ressources you might
want to check out: "OkTurtles + DNSChain" (working Namecoin + DNS
implementation): [http://okturtles.com/](http://okturtles.com/) and "Providing
better confidentiality and authentication on the Internet using Namecoin and
MinimaLT" :
[https://github.com/FredericJacobs/safeweb/blob/master/paper....](https://github.com/FredericJacobs/safeweb/blob/master/paper.pdf?raw=true)
------
bachback
There are currently 1-2 developers working on Namecoin (mostly Khan, another
core developer died recently). Namecoin itself has quite a few issues. The
design is only the beginning.
~~~
appleflaxen
Can you elaborate on the issues you allude to? The "criticism" section on
wikipedia is pretty thin.
~~~
bachback
well, at the moment there is not much reason to use the system. if you
register a ".bit" then you have to get your users to install complicated
software and in the end what you are getting is very similar to ".com". There
are major benefits, which are not explored yet. rolling out a world wide
nameservice is not trivial. at the moment it's not even used by the
underground. onename.io is the first application I have seen.
------
teach
This article has more citations per sentence than anything I have ever seen on
Wikipedia.
~~~
jebus989
Citation spam is usually an attempt to prevent article deletion, especially
pertinent as it's been deleted [0] and merged into bitcoin [1] in the past.
[0]
[https://en.wikipedia.org/wiki/Wikipedia:Articles_for_deletio...](https://en.wikipedia.org/wiki/Wikipedia:Articles_for_deletion/Namecoin)
[1]
[https://en.wikipedia.org/wiki/Wikipedia:Articles_for_deletio...](https://en.wikipedia.org/wiki/Wikipedia:Articles_for_deletion/Namecoin_\(2nd_nomination\))
------
jabgrabdthrow
I'm working on an alternative to namecoin with the following features:
* Profitable (what? profitable cryptocurrency? what?) * Powerful disincentives for squatting * Lots of funding for the project, which means we can actually push towards critical-mass adoption
More will be available at domains.bitshares.org within ~2 weeks.
~~~
rictic
Count me as interested. I've been trying to think of a distributed solution to
squatting and fraud but I've had very little luck coming up with anything
workable.
------
rumcajz
I don't get why it doesn't use bitcoin's block chain. That would give it a
strong existing infrastructure of users, miners etc. This way it is on its
own.
~~~
aaron-lebo
The Bitcoin devs don't really want the blockchain used for non-financial
transactions.
If makes sense if you think about it. The current BTC blockchain is gigabytes
of data. Add text information to every transaction and you are adding even
more bloat.
~~~
baddox
Do you have a source for that claim? The official Bitcoin wiki certainly talks
about non-financial uses of Bitcoin, and Script obviously makes such uses
possible.
~~~
aaron-lebo
Well, I remember reading something like that once, so it must be true. ;)
In all seriousness, I did some Googling and the closest I can find is this:
"One final reason is that Satoshi was opposed to putting non-Bitcoin related
data into the main chain. As creator of the system, his opinion should carry a
lot of weight with anyone serious about extending it."
[https://en.bitcoin.it/wiki/Alternative_chain](https://en.bitcoin.it/wiki/Alternative_chain)
I realize that is close to being useless, but I can't find the direct post in
question by Satoshi that it is referencing. I seem to recall it not being
Satoshi, however, but one of the current devs that I read a similar sentiment
from.
But again, I don't have any direct links. I apologize.
------
kushti
I'm interesting in developing services on top of Namecoin / other p2p more-
than-currencies (MasterCoin/Ethereum?). Please mail me (kushtech [at] yahoo
(dot) com) if you want to discuss related things or join me. I'm
Scala/Java/etc developer myself / entrepreneur also in past and future.
~~~
iterationx
You might be interested in learning about Twister, decentralized microblogging
(twitter) [http://twister.net.co/](http://twister.net.co/)
~~~
thisiswrong
I can't believe how potentially disruptive Twister is! Haha and I love its
system of mining for promoted tweets.
As I have always said, bitcoin (the invention) means the end of FB, Twitter,
and all similar centralized corporate entities.
------
mm0
keep pumping it op
------
RexRollman
"Namecoin is a cryptocurrency which also acts as an alternative, decentralized
DNS"
So, finally, a cryptocurrency which serves a purpose aside from filling up
HN's article listing. Cool.
~~~
atmosx
The bitcoin protocol is an extremely important advancement as it solved the
double spending[1] problem and can be used for all sorts of interesting
community and business applications. Especially for systems used by
organizations (e.g. DNS) that need to be public, uncensored and accessible
from everyone (institutions, countries and individuals).
Here are just a few ideas:
[http://www.convalesco.org/#31](http://www.convalesco.org/#31)
[1] [https://en.bitcoin.it/wiki/Double-
spending](https://en.bitcoin.it/wiki/Double-spending)
| {
"pile_set_name": "HackerNews"
} |
Could There Be More To Google, Android, Chrome, & Gears Than Meets The Eye? - robg
http://www.informationweek.com/blog/main/archives/2008/09/could_there_be.html
======
bouncingsoul
_My guess is that Google sees an offline technology like Gears as being so
fundamental to the future of Web applications, that it can't not be built into
the browser._
Unless that offline technology is based on the HTML 5 client-side storage
recommendation and isn't named Gears. In that case it should be ripped out and
replaced with Gears.
~~~
peregrine
Google doesn't care that you use gears or not. They want you to use the
internet to get to it. If your on the internet chances are your seeing their
ads.
------
shutter
Developers don't want to have to develop for multiple platforms. There are two
ways to solve that: Either develop for a platform which has a monopoly share,
or develop cross-platform.
Web Applications' ability to work on every platform, combined with an
increasing feature-set (thanks to Gears), makes it a very viable platform.
The web is Google's domain: The better the web stack works in all platforms
(including mobile), the better chance they'll have to beat out Microsoft,
Apple, and all the rest.
------
vbhtngr
I would add Google App Engine to the list and see it a direct competitor to
Microsoft's Live Mesh.
| {
"pile_set_name": "HackerNews"
} |
Tag Clouds For Every App Store Category - dbachelder
http://bustedloop.com/blog/2009/7/2/iphone-app-tag-clouds.html
======
andrewljohnson
This is kind of fun to look at, but I wish tag clouds would die the innocuous
death they deserve. They are basically a useless, and worse a distracting, UI
element. If you have a tag cloud on your blog, you're not doing yourself any
favors.
~~~
joshu
I blame flickr.
------
jfno67
What would be nice now is a tag cloud of all the search the app store is
getting...
------
pclark
they missed the news category..
~~~
dbachelder
Nice catch. It's up there now. Thanks!
| {
"pile_set_name": "HackerNews"
} |
Why My MOOC Is Not Built on Video - minthd
https://www.class-central.com/report/why-my-mooc-is-not-built-on-video/
======
trisreed
It's all well and good to be able to use IPython notebooks for math and CS
related MOOC's, but I think it's a lot harder to translate practical
activities from other fields online - I guess interactive features will be the
best bet in this regard.
| {
"pile_set_name": "HackerNews"
} |
Project to Run RTL-SDR Dongle with Microcontroller Host - fallingmeat
https://fallingnate.svbtle.com/portable-rtl2832-usb-dongle
======
fallingmeat
I started this project a while back and am just now releasing the results
piecemeal. If anyone has experience running SDR DSP operations on an MCU, I'd
be very interested to hear about it! So far, this seems very feasible for at
least small-ish bandwidth applications (ie ~100 KHz) and simple modulation
schemes. Looking forward to pushing the limits of ~450DMIPS processor...
| {
"pile_set_name": "HackerNews"
} |
Merb ♡ Rails - qhoxie
http://merbist.com/2008/12/02/merb-loves-rails/
======
Locke
Yes, it's clear that Rails blazed the path for Merb. At the same time, the
Rails people really shouldn't be surprised (or feel badly) that their
"opinionated software" has created a market for flexible, agnostic software.
Both projects are great, and will probably appeal to different sets of
developers. In a lot of ways I think of it like the dynamic between Python and
Ruby. Both are excellent languages with very similar capabilities, yet they
appeal to different developers. It's like there's an element of personality in
there, and there's nothing wrong with that.
~~~
jamesbritt
" In a lot of ways I think of it like the dynamic between Python and Ruby."
I see more of that in the contrast of how Ramaze (and, previously, Nitro)
approaches things and how it is with Rails/Merb.
I've been trying to get my head around Merb, but it's still too Railszy to get
me excited.
Ramaze is to Merb (and Rails) as Ruby is to Python.
------
shabda
And for the same reason, I use Django everyday, but I ♡ Rails. Rails, Django
(and Merb, Ramaze)are not fighting each other for mindshare, but Struts and
company.
------
gamache
Yet another chirp from the echo chamber...
~~~
bk
I will cautiously agree with that - cautiously because I don't want to become
a part of it exacerbating the problem.
To everybody wondering why there is such an echo chamber in the rails and
(increasingly) merb communities: consultants. They all try to build a profile
online to get better paid gigs (and to boost their egos).
Resorting to the rules of (self-)promotion, these consultants write link-bait,
(fake) flames/controversies, etc. They give noobs and hype sheep the warm
feeling of "being part of something big" and enterprisey folks can point to
the "wide adoption" and "active communities" around them. That does not make
them great or better than other solutions technologically. (As an aside,
they're still very good web dev tools, no doubt, but not the second coming of
<deity of choice's son>).
------
mikeryan
Anyone else notice that Ruby was actually 11th on the language list?
~~~
Locke
Not that I follow it too closely, but I think Ruby _was_ in the top 10 until
it slipped a few spots recently.
------
siong1987
I am a Rails. But, I am more a Ruby(Rubyist).
~~~
Herring
I think you forgot the in that sentence.
------
jamesbritt
"Without Rails, we would not have all the other cool Ruby frameworks"
The author is delusional.
| {
"pile_set_name": "HackerNews"
} |