text
stringlengths 44
442k
| meta
dict |
---|---|
The first ever accurate molecular simulation with quantum computing by Google - gri3v3r
http://www.sciencealert.com/google-s-quantum-computer-is-helping-us-understand-quantum-physics
======
selimthegrim
dupe:
[https://news.ycombinator.com/item?id=12132700](https://news.ycombinator.com/item?id=12132700)
| {
"pile_set_name": "HackerNews"
} |
Why did Quora choose Python for its development - Alex9762
http://www.quora.com/Quora-Infrastructure/Why-did-Quora-choose-Python-for-its-development
======
waiterZen
Python is good choice
| {
"pile_set_name": "HackerNews"
} |
Postmortem from getting kicked out of college for hacking - getbackto
https://medium.com/@wololodev/fdd85b99e0c5?hnattempt=2
======
lun4r
The encryption method is a simple XOR cypher. It uses the key
"581fad87738939".
<?php function encryptSID2($sid) { return dechex(0x58 ^ $sid{0}) . dechex(0x1f
^ $sid{1}) . dechex(0xad ^ $sid{2}) . dechex(0x87 ^ $sid{3}) . dechex(0x73 ^
$sid{4}) . dechex(0x89 ^ $sid{5}) . dechex(0x39 ^ $sid{6}); } ?>
------
JoshTheGeek
?hnattempt=2 is the query string of the URL...
| {
"pile_set_name": "HackerNews"
} |
Norwegian lawyer had visa withdrawn after private chat with client on Facebook - Deestan
http://translate.google.com/translate?sl=no&tl=en&js=n&prev=_t&hl=en&ie=UTF-8&u=http%3A%2F%2Fwww.vg.no%2Fnyheter%2Finnenriks%2Fartikkel.php%3Fartid%3D10104089&act=url
======
belorn
Be you a lawyer talking privileged to a client, a priest talking privileged to
a follower, a hot-line worker talking privileged to someone thinking about
suicide, or a social service person talking to a child who been sexually
assaulted, every ones communication is equally collected.
This is after all the result of ubiquitous surveillance. When people learn
about it, the reaction is very simple. people stop talking. They do not call
the lawyer. They don't call the priest. The person thinking about suicide
won't call the hot-line, and the sexually assaulted child will stay quiet in
fear of people finding out. After Germany introduced their ubiquitous
surveillance law, this was exactly what the statistics ended up showing. I
wonder, while hoping not, if the same result will happen in the US too after
the current wave of news.
~~~
nikatwork
Bizarrely, this whole scenario is very similar to the privacy issues explored
in Brunner's 1975 book "The Shockwave Rider"[1].
Perhaps, as in the book, we need to setup an independent encrypted
communication service where people can vent their frustrations at pervasive
surveillance.
[1]
[http://en.wikipedia.org/wiki/The_Shockwave_Rider](http://en.wikipedia.org/wiki/The_Shockwave_Rider)
~~~
Zigurd
Never mind PRISM. The week before the PRISM leaks, the news was full of hack
attacks by state actors against US business and government targets. Why are we
emailing and talking in the clear? That's just dumb.
Moreover, the toothpaste can't be put back in the tube. Short of
transformative change in government, how do we know there isn't another PRISM
at another TLA?
The only way to restore confidence in communications is to secure them against
all attacks.
~~~
fnordfnordfnord
You're right, but I'd still like to see us make a giant collective bowel
movement on the spilled toothpaste, and generally make it so undesirable for a
government agency to use the toothpaste that they'll only do so when no other
alternative exists, or only when it's actually very important to do so.
------
Vivtek
Ah. This one is actually kind of credible.
But if the client was already accused of terrorism, then this monitoring was
on his end, and surely covered by a specific warrant. So this isn't
(presumably) the kind of massive data hoovering that is the primary concern;
every country does this kind of thing. (Back when I was running Despammed.com
I'd get requests from various LEOs - one came with a real live subpoena for
information related to an identity theft ring, and one was from Italian
authorities pursuing an insult to Mary.)
Where it gets to be a concern is revoking a guy's visa because he's defending
a terror suspect.
~~~
drrotmos
I know this isn't an opinion shared by the current US administration, but
having a fair trial for one's crimes is a human right. It's a right guaranteed
by articles 10 and 11 of the UN Universal Declaration of Human Rights.
Part of having a fair trial includes having legal representation, and the
ability to communicate with your legal council in confidence.
Eavesdropping on privileged lawyer-client conversations, regardless of
legality is outrageously indecent and _should_ be illegal. Revoking a lawyer's
visa because he is representing a particular client is equally outrageous,
especially due to the chilling effects it causes upon the legal community
making it much more difficult for suspects of serious crimes to find good
legal representation.
~~~
rayiner
It's not the view of any administration. The client was Norwegian-Chilean.
Foreigners not in the US don't have A right to counsel (which is the
constitutional basis of attorney client privilege in the US).
And I'd argue that's the way it should be. Every time courts declare something
unconstitutional, they use up limited political capital. I don't think
defending the "human rights" of non Americans is a valid use of that political
capital.
~~~
meepmorp
> Foreigners not in the US don't have A right to counsel (which is the
> constitutional basis of attorney client privilege in the US).
Do you have a cite for this? I know that there's no right to counsel in civil
trials, and this includes immigration courts (say in a deportation hearing),
but thought that criminal trials do guarantee right to counsel regardless of
citizenship.
Edit: sorry, I misread what you wrote. It's totally reasonable and doesn't
deserve downvotes.
FWIW, web searching does seem to indicate that there's no explicit
constitutional basis for attorney client privilege, and that it's just
provided for by US (and often, state) law.
~~~
DannyBee
Wong Wing v. United States, 163 U.S. 228 (holding that noncitizens charged
with crimes are protected by the Fifth, Sixth, and Fourteenth Amendments)
Fong Yue Ting v. United States, 149 U.S. 698 ((concurrence arguing that
noncitizens are protected by the First, Fifth, and Fourteenth Amendments)
Almeida-Sanchez v. United States, 413 U.S. 266
Bridges v. Wixon, 326 U.S. 135, 161
etc. The only holding otherwise is the 4th amendment one of a number of
appeals courts.
~~~
meepmorp
Thanks. I kind of assumed that those protections extended to non-citizens, but
it's nice to have actual case law.
------
anologwintermut
I'm shocked, shocked to find that the NSA is spying on a foreign terror
suspect in a foreign country communicating with another foreign person.*
Actually, I am shocked. Why'd the lawyer use Facebook for privileged
communication? Why does the NSA care about someone who posted a threatening
video in Norway? Hint: they don't. If they looked, it's probably because
Norwegian Intelligence asked them to.( Which might well be a huge legal
problem, for Norway)
In fact, it seems there is little evidence that any of this happened. Marking
messages as spam does not seem like something the NSA would do and as to
denying him entry into the US: if US gov is in the habit of denying visa's to
those who represent a foreign terror suspect, they didn't need Facebook to
establish that.
*Note, attorney client privilege doesn't apply to cases completely out of US jurisdiction with lawyers who are not lawyers in the US
~~~
polemic
It's hard to say without knowing what was said, but the fact that his visa was
withdrawn on the basis of a conversation between a laywer and his client is
alarming.
In other words: did the US government consider him a threat, or was it a
tactic to infringe the alleged terrorist's right to a fair trial? If the
latter, then it's an abuse of surveillance privileges.
~~~
spinlock
It would be alarming if a lawyer and his client were using facebook for
privileged communications. That's your first hint you need a new lawyer. If
they can't understand Facebook's TOS they can't possibly defend you.
But, seriously, these are foreign nationals. We've had a longstanding
distinction between foreign and domestic surveillance. Think of it this way,
would you really want to need permission from Pakistan to surveil Osama bin
Laden? He was an enemy of the USA and he was being harbored by Pakistan.
Different rules apply in that case than in a domestic case.
~~~
cmircea
Horrible example. In the case of Osama the US could have broken each and every
law in Pakistan and nobody would give a shit.
This is about a suspect, at best. Not the world's most wanted terrorist.
------
vidarh
Here's a rough/quick manual translation:
\---
Private Facebook-correspondance between John Christian Elden and a client
charged with terror offenses was monitored by American security services
(NSA), the lawyer claims.
Elden was discussing scheduling of the case with the Norwegian-Chilean client
(20), who was charged with publishing a video where he threatened Norwegian
officials and the royal family. Elden says that he has documentation that it
was American authorities that were snooping on his Facebook-profile, TV2
writes.
\- That we as Norwegians are under surveillance by American authorities, I am
not particularly happy about. It is uncomfortable to know that someone
continuously reads what you write at communicate with other persons via what
one believes is a closed channel, says the lawyer.
The messages of the person in question got deleted on an ongoing basis, and in
the chat-log they are now marked as "identified as offensive or marked as
spam". Four days after the conversation, the well known lawyers visa was
withdrawn.
Elden says his client wished to show up in court, but that he no longer is
able to contact him after the Facebook-profile was deleted.
Facebook is one of the websites mentioned in The Guardian and Washington Posts
revelations of NSAs surveillance of foreign citizens in the PRISM project.
Ministor of Justice Grete Faremo has sent a request to the US, where the
justice department requests a clarification about whether or not Norwegian
citizens have been under surveillance.
\---
The main thing to note is that the bit about the deleted Facebook profile was
unclear in the machine translation. It appears quite clear in the original
article that the reason his communication with his client ceased was that the
client used Facebook as his only communications-channel with his lawyer, and
so the deleted Facebook profile means Elden is _unable_ to communicate with
his client.
It is not made clear whether he suspects or claims that American authorities
caused the profile to get deleted too, or if the client got spooked by the
deleted messages.
------
Deestan
Summary: Lawyer conversing with client accused of terrorism, via private
Facebook messages. Client's messages suddenly deleted as "spam", and 4 days
later the lawyer was notified that his US Visa had been revoked.
~~~
smartician
In other words: A Norwegian lawyer notices something weird going on with his
private Facebook messages, and four days after this, his visa gets revoked.
Later, after reading about PRISM in the morning newspaper, he's convinced that
the NSA has been spying on him.
It's obvious! After all, spy rule #1 is "make sure your subject knows he's
being spied on by marking his messages as 'infringing or spam'". And it's
totally impossible that the visa thing coincided with this.
~~~
einhverfr
Twice in my life I have noticed things that made me wonder. The first time I
currently think was in my imagination. This time I am not so sure. I am
noticing for example a cell phone whose battery level drops when connected to
the charger and not in airplane mode. Google chat messages apparently long
delayed. That this started after the Snowden leak makes it even more
suspicious to me. I am an American citizen residing abroad.
I could just be seeing things that aren't there. However as a vocal opponent
of this sort of surveillance, it would make sense that I would be caught up in
some sort of filter especially as the hunt for Snowden continues.
(So note: If you are listening I think you might be. I am a patriot, as I
believe Snowden is. I have not provided any active assistance for him, but I
applaud those who do. My wife thinks I am too political but at some point my
loyalty to my country, the United States, compels me to stand up to this sort
of thing.)
~~~
Filligree
Battery levels will drop when connected to the charger - because of code in
the battery controller. It's bad for the battery to stay at 100% for any
amount of time, so the controller will cycle it in the 95-100% area. Smarter
controllers will hide what they're doing.
Google chat messages can be delayed for any number of reasons, ranging from
internal glitches to "Your network connectivity was bad at the precise moment
the message was attempted to be delivered, thrice, and it retries at
exponentially longer intervals."
~~~
einhverfr
But go from 5% to 0%? I am used to glitches but there are oddities here that
are either hardware issues (battery discharging while low and connected to the
charger), network issues. This is beyond what I am used to. Again, I could be
connecting the dots incorrectly but I would not be surprised if I am right :-P
------
woof
* The lawyer John Christian Elden defends several terror suspects, including Arfan Bhatti (now arrested in Pakistan) who was charged for terror planning agains the US embassy in Norway several years ago.
* He disucussed a court meeting with another client on Facebook, it was not a attorney–client privileged discussion. Elden was briefed by the FBI on their e-surveilence in 2005 (with a group from Norwegian Justice dept.) so he probably has a good grasp on how private Facebook really is.
* His US Visa was revoked four days after the conversation, the US embassy in Norway cites "Homeland Security"
* Eldens comments gives the impression that he believes he's automaticly flagged, while still beeing a friend of the US.
More facts:
[http://translate.google.com/translate?hl=en&sl=no&tl=en&u=ht...](http://translate.google.com/translate?hl=en&sl=no&tl=en&u=http%3A%2F%2Fwww.dagbladet.no%2F2013%2F06%2F11%2Fnyheter%2Finnenriks%2Fovervakning%2Fusa%2F27658066%2F)
------
werid
This lawyer is a known figure in Norway and not some guy looking for his
fifteen minutes of fame. He has defended people on terrorism charges in Norway
before, and gotten them acquitted on those charges (while other lesser charges
still stuck).
On his twitter, he claims that the US embassy doesn't know why his visa was
revoked, only that "Homeland security's computers" are telling them it's
revoked.
This is then connected to NSA leak by journalists. He is still waiting for a
proper explanation from the US embassy.
------
Zimahl
Isn't the NSA supposed to be for foreign intelligence only? I don't find it
shocking that the US would track the messages of an accused terrorist. What I
find funny is that a lawyer used Facebook for privileged communication.
------
einhverfr
Just remember, if you ever want to visit the US and you are not an American,
you must be much more supportive of American foreign policies than most
Americans are!
------
tropicalmug
Isn't this a bigger deal than just monitoring supposedly private Facebook
communications? This would also violate attorney-client privilege too, right?
EDIT: This is just naïveté on my part.
~~~
saraid216
Why would the not-an-American-citizen lawyer speaking to a not-an-American-
citizen have attorney-client privilege from the perspective of an American
governmental organization?
Edited to add: It's remarkably difficult to quickly find information about
attorney-client privilege in settings other than US, UK, Canada, and
Australia. I found a brief mention that the privilege does not apply to in-
house counsel in the EU, and that Brazil breaches it with a court order, but
that's all. I'd hope I could find more given some more time, but I need to get
back to work.
~~~
anaptdemise
Ha. Also, what kind of attorney would have the kind of conversation covered
under attorney client privileges on Facebook, PM or otherwise?
~~~
nullc
The same kind that run third party provided spyware on their personal
computers in order to take exams in law school.
(In other words: Practically all newly minted attorneys in the US)
There is no education in law school in the US at least on responsible data
handling, and— in fact— schools often direct students to behave irresponsibly
with respect to data security.
~~~
andreyf
_The same kind that run third party provided spyware on their personal
computers in order to take exams in law school._
Do you have a specific case in mind?
_schools often direct students to behave irresponsibly with respect to data
security_
Why would they do that? Reference?
~~~
nullc
Sure, the practice is ubiquitous
Example software and policies are things like:
[http://www.exam4.com/](http://www.exam4.com/) (used by Harvard, George
Washington, etc)
[http://www.law.wisc.edu/help/for_students/securexam/](http://www.law.wisc.edu/help/for_students/securexam/)
[http://www.law.columbia.edu/academics/registrar/Laptop_Exams](http://www.law.columbia.edu/academics/registrar/Laptop_Exams)
[https://www.law.umich.edu/currentstudents/registration/exams...](https://www.law.umich.edu/currentstudents/registration/exams/Pages/default.aspx)
Most (all?) schools offer students the ability to take their exams on paper,
but doing so is a substantial competitive disadvantage because examinations
are usually timed and writing on paper is much slower, students are marked
down for legibility and copy-editing noise, etc.
I don't have a citation studying it— but by all appearances it's only a small
minority of students that opt out of using their laptops. ("Most Stanford Law
School students take their examinations on laptops")
IIRC the California bar exam now also uses one of these spyware exam packages.
I'm mostly amused that we have a whole information-security critical
profession who is nearly required to behave negligently wrt information
security from day one. :P
~~~
andreyf
Wow, no kidding. Why the heck could it need "Administrator level account
permissions" (both on OSX and Windows [1])? I guess you could run it in a VM
and wipe it afterwards.
1\.
[https://www.examsoft.com/dotnet/Default.aspx?f=mtlaw](https://www.examsoft.com/dotnet/Default.aspx?f=mtlaw)
~~~
nullc
You're prohibited from running it in a VM, and at least some law schools have
the students sign some form under penalty of the school ethical code yadda
yadda that you won't do that.
(And then— some students do it anyways, because thats the only way to use it
on their otherwise non-supported system or because of some other
incompatibility. And nothing comes of it... I guess until something does.
Better not make too many enemies)
~~~
andreyf
A friend in law school to explained that this software is used for in-
classroom exams and prevents any other programs from being used while a
student is taking the exam, as well as saving all the work incrementally (in
case the computer crashes).
It's certainly not the most secure thing to do, but they need to focus on
studying law, not securing systems. I imagine that when lawyers are working on
cases, they might end up using more secure devices than their old college
laptops.
------
etchalon
This story reeks. None of it makes any sense (the messages were marked as
SPAM?).
I'm filing this under the same rubric mentally as all those tea party lunies
who suddenly swore their legitimate, random audit was caused by their
membership in the Tea Party.
~~~
Filligree
Elden is a top-flight defence lawyer. He's not any good with computers
(clearly..), but I'm sure he told the truth as he understands it.
------
platz
Two Facebook articles on foreign privacy events in one day? Where were these
reports before Snowden hit the news cycle?
~~~
stackedmidgets
Before that, you'd be voted down and hollered at because there would be little
credibility for it among common idiots. This has been the case for years,
because a lot of the information about the NSA published by journalists was
built on anonymous sourcing. Now, there's more documentary evidence available
to support it, so the US government no longer enjoys the benefit of ignorant
doubt.
Now, these stories can gain traction.
~~~
untog
Conversely, these stories were previously ignored because of a lack of
supporting evidence. Now that US surveillance is a talked about topic, these
stories are gaining traction without people going through the critical thought
processes they otherwise would have.
Neither of these options are provably false.
------
XorNot
Ok can anyone who reads Norwegian actually translate this properly? Because
the Google translation certainly doesn't capture the nuance, and their are
some notable inconsistencies in it - namely, why is someone's lawyer "no
longer in contact now that their Facebook profile has been deleted".
------
deshmane
what I am curious about in this and similar stories is whether the officials
actually carry out due diligence in making sure the profile actually belongs
to the person in question. after all, anybody can get an email and spoof a
profile.
------
gcb0
This is the same a lawyer sending private information via a post-card. Plain
irresponsible.
But then again, which layer knows how to send PGP'ed emails?
------
brown9-2
Worth noting that the lawyer says he has evidence but has not presented it,
and until then it's just his word.
------
mariuolo
Just tell me what kind idiot would use Facebook for a private conversation.
~~~
vidarh
Who are you talking about? Elden or his client? The article implies Facebook
was Elden's only way of reaching his client, so the "idiot" appears to have
been the client. If the client is not very technical it is not unreasonable to
assume the client felt Facebook was easier for him to use to communicate
covertly with Elden and didn't want to give out a phone number or other
details.
~~~
mariuolo
Either. Facebook retains forever anything done or written on their platform
and that's a well known fact.
Why anyone would use it for anything remotely confidential, is beyond me.
------
ttrreeww
This is the generation in which freedom was lost.
~~~
hughes
Or perhaps the generation in which freedom is to be reclaimed? It's too early
to tell.
~~~
TillE
It's extraordinarily difficult not to be pessimistic when you see the abuses
initiated by one party continued and expanded by the other, after bleating on
about their supposed opposition to such programs.
I'm convinced that the Democratic Party is the biggest roadblock to
accomplishing meaningful change in the US. It exemplifies the mushy,
frightened middle in the worst possible way, and should be reviled by anyone
with principles.
For example: [http://www.people-
press.org/files/2013/06/6-10-13-4.png](http://www.people-
press.org/files/2013/06/6-10-13-4.png)
~~~
nikster
It's hard to see any difference between Democrats and Republicans at this
point. The entire system needs to be thrown out.
I remember Ralph Nader was once asked why he is running for president when his
candidacy might take away crucial votes from the Democrats and let the
Republicans win; Wouldn't it be better if the lesser of two evils won? His
answer: The difference between the Republics and Democrats is "the difference
between Humpty and Dumpty".
At the time, I didn't agree with him. But when I see what's going on now; how
the Obama administration is basically run by the CIA and US big business; then
I have to think of this quote and how right he was.
| {
"pile_set_name": "HackerNews"
} |
How to Make a Computer Operating System - hitr
https://github.com/SamyPesse/How-to-Make-a-Computer-Operating-System
======
joelg
Another great free OS resource is MIT's 6.828: Operating System Engineering.
"This course studies fundamental design and implementation ideas in the
engineering of operating systems. Lectures are based on a study of UNIX and
research papers. Topics include virtual memory, threads, context switches,
kernels, interrupts, system calls, interprocess communication, coordination,
and the interaction between software and hardware. Individual laboratory
assignments involve implementation of a small operating system in C, with some
x86 assembly."
Lecture notes from 2012: [https://ocw.mit.edu/courses/electrical-engineering-
and-compu...](https://ocw.mit.edu/courses/electrical-engineering-and-computer-
science/6-828-operating-system-engineering-fall-2012/)
Video lectures from 2014:
[https://www.youtube.com/watch?v=kDRHsNauoxk&list=PLfciLKR3Sg...](https://www.youtube.com/watch?v=kDRHsNauoxk&list=PLfciLKR3SgqNJKKIKUliWoNBBH1VHL3AP)
------
Jeaye
Note that this book is half-finished and work on it has been discontinued (as
of 2 years ago). If you want a good resource on OSdev, start here:
[http://wiki.osdev.org/Main_Page](http://wiki.osdev.org/Main_Page)
~~~
dreta
Got another great resource here
[http://www.brokenthorn.com/Resources/](http://www.brokenthorn.com/Resources/)
------
OJFord
> Chapter-1
> Chapter-2
> ...
> Chapter-8
> chapter9
Aaargh!!
------
k_sze
I wish people would stop teaching C/C++. I want a book that teaches writing OS
using Rust.
~~~
pkaye
And what is a good book on writing an OS using Rust?
~~~
dbaupp
There's [http://intermezzos.github.io/](http://intermezzos.github.io/)
~~~
steveklabnik
Maintainer here! We actually have more developed than the tutorial lets on; at
Rust Belt Rust next week, we're running a six-hour class, so focus has been on
material for that, rather than on writing more book chapters. I hope to get
them out afterwards, though.
There's also some open PRs with more functionality too! Basically, check out
the kernel repo if you finish the book and want more :)
| {
"pile_set_name": "HackerNews"
} |
For sale: an Enigma machine - epo
http://www.christies.com/lotfinder/lot_details.aspx?from=salesummary&intObjectID=5370959&sid=5d471a41-553e-4a2d-b9ee-cf27e36133b8
======
Robin_Message
Also, the next lot is even more exciting: Some offprints of Turing's papers
and manuscripts, formed by Prof. Maxwell Newman, guide price _300 to 500
thousand pounds!_ Apparently these are extremely rare; none have appeared in
auction for 35 years!
[http://www.christies.com/lotfinder/lot_details.aspx?from=sal...](http://www.christies.com/lotfinder/lot_details.aspx?from=salesummary&pos=10&intObjectID=5370960&sid=5d471a41-553e-4a2d-b9ee-
cf27e36133b8)
~~~
KoZeN
[http://www.christies.com/lotfinder/lot_details.aspx?from=sal...](http://www.christies.com/lotfinder/lot_details.aspx?from=salesummary&pos=5&intObjectID=5370965&sid=5d471a41-553e-4a2d-b9ee-
cf27e36133b8)
I'm surprised this hadn't had more attention here!
_APPLE-1 -- Personal Computer. An Apple-1 motherboard, number 82, printed
label to reverse, with a few slightly later additions including a 6502
microprocessor, labeled R6502P R6502-11 8145, printed circuit board with 4
rows A-D and columns 1-18, three capacitors, heatsink, cassette board
connector, 8K bytes of RAM, keyboard interface, firmware in PROMS, low-profile
sockets on all integrated circuits, video terminal, breadboard area with
slightly later connector, with later soldering, wires and electrical tape to
reverse, printed to obverse Apple Computer 1 Palo Alto. Ca. Copyright 1976_
~~~
asmithmd1
Wow! a the Apple-1 is estimated to go for £100,000 - £150,000
I wonder if there are any artifacts from todays companies that we should be
grabbing up
~~~
asmithmd1
Now I see why - it comes with the optional cassette interface and BASIC on a
tape :)
Seriously it is an exceptional artifact: original invoice (Salesperson:
STEVEN) and a typed note from Steven Jobs explaining how to hook-up a TV and
keyboard:
[http://www.christies.com/lotfinder/ZoomImage.aspx?image=/lot...](http://www.christies.com/lotfinder/ZoomImage.aspx?image=/lotfinderimages/D53709/d5370965)
------
user24
I hope a museum gets it, but I think it will probably go for much more than
the estimate.
By the way, any UK HNers should definitely try to get down to the museum at
Bletchley park and the national computing museum. Geek heaven :)
edit: wow, they also have the first published ENIAC patents:
[http://www.christies.com/lotfinder/lot_details.aspx?from=sal...](http://www.christies.com/lotfinder/lot_details.aspx?from=salesummary&intObjectID=5370963&sid=b1077a41-474f-47b4-8f48-25f5c24fca97)
~~~
shrikant
Visitors might want to be a bit patient on the guided tour - largely seems a
waste of time initially, with the guide talking a lot about the history of the
land/park itself, and the WW2/code-breaking info being somewhat superficial.
Then he takes you into the National Museum of Computing and demonstrates the
machines, and sometimes lets you touch and feel as well - awesome! The guided
tour ends on quite the high!
~~~
user24
depends on the guide I guess, I've been there about 4 times (used to live just
down the road, and the ticket is for a whole year!) and took the tour twice,
the code-breaking content wasn't highly technical, but it was covered in a
decent amount of depth I felt.
Riddle from the tour: What must you add to nine to get six? (and no, it's not
-3)
~~~
user24
replying in case someone years from now reads this:
Gur nafjre vf f. avar va ebzna ahzrenyf vf vk, nqq na f naq lbh trg fvk ;)
------
cromulent
One day, I'd like to have a library like Jay Walker's to add this to. He's
even got a Sputnik in there, along with his Enigma.
[http://www.wired.com/techbiz/people/magazine/16-10/ff_walker...](http://www.wired.com/techbiz/people/magazine/16-10/ff_walker?currentPage=all)
------
wgrover
Bay Area folks who've read down this far, you'll absolutely love the Computer
History Museum, <http://www.computerhistory.org>
------
Luc
That would look nice on the living room cupboard, but you can't beat this one
for glamour: <http://www.tatjavanvark.nl/tvv1/pht10.html>
Perhaps someone here will be able to decrypt that encoded Haiku...
------
pbhjpbhj
I was interested in the many manuscripts in that sale. I wonder if Google
would buy them, scan them and resell them ... they could buy through a third
party/anonymous bid and only release the scanned copy after the resale to
avoid a negative effect on price.
------
ljf
Amazing piece of kit that would be great to own - but what would /you/ do with
one?
~~~
brk
You could probably gut it and put an Arduino inside of it that played MP3's.
~~~
astine
With all due respect, wouldn't that be a little like upholstering your couch
with the Bayeux Tapestry? While the Enigma machine isn't exactly one of a
kind, it is quite rare and has a great deal of historical significance.
~~~
brk
Sorry, I had a feeling the sarcasm in my initial post wouldn't fully come
through :)
I probably should have gone with the steampunk-themed comment I was originally
planning.
------
tomjen3
30-50k pounds. Shit thats a high price.
~~~
user24
You think? I wouldn't have been surprised to see it fetch twice the high
estimate. It's got appeal to people interested in:
Computing
Codes/Ciphers
WW2
That's pretty broad appeal. I mean even if it was only of interest to Turing
fans that's still a huge market, and Turing fans are only a small subset of
those larger markets.
Just my opinion, I've no idea if these things come up fairly often or not.
~~~
tomjen3
It may still fetch more, but honestly that doesn't change that it is a very
large amount of money.
~~~
shabda
> that it is a very large amount of money.
Compared to what?
People pay 100K$ for rocks which have no intrintrinsic value.
| {
"pile_set_name": "HackerNews"
} |
Extinct Startups Tees - signaler
http://extinctstartups.com/
======
pstevesy
Clever. I'd like to see an Enron or Compaq tee.
| {
"pile_set_name": "HackerNews"
} |
A wiki for anecdotal or useless informations - lawyearsdw
http://www.bt-wiki.net/Main_Page
======
ende
How is this different from Wikipedia ?
| {
"pile_set_name": "HackerNews"
} |
IRS SSL problems - heyyeverybody
https://sa.www4.irs.gov/irfof-efp/start.do;jsessionid=vNun6wfS+l+xKLt39TSDaOfF
======
heyyeverybody
It appears to only give you a warning when using Windows, Chrome, and on a
desktop. Says they are using SHA1 and RSA.
| {
"pile_set_name": "HackerNews"
} |
Searching For Online Video's Holy Grail - myoung8
http://money.cnn.com/2008/02/04/technology/kirkpatritck_iamplify.fortune/index.htm?section=money_latest
Guesses on what happens when you get people from Random House and McKinsey running a company, plus a CTO from Accenture?
======
myoung8
Guesses on what happens when you get people from Random House and McKinsey
running a company, plus a CTO from Accenture?
~~~
xirium
@0% affiliate fees on US$100 niche videos sounds really good. However, if the
management doesn't understand their market then you'd be a fool to associate
with this venture.
| {
"pile_set_name": "HackerNews"
} |
Google's Project Zero researcher discovers “major” security issue in LastPass - aloukissas
http://www.independent.co.uk/life-style/gadgets-and-tech/news/lastpass-hack-security-problem-password-manager-a7658806.html
======
sp332
Previous discussion
[https://news.ycombinator.com/item?id=13960097](https://news.ycombinator.com/item?id=13960097)
------
kakarot
If you use online password management for anything security-critical then
you're a fool. It pains me to see Lastpass so readily trusted even by the HN
community.
~~~
thraway2016
Agreed. A combination of cryptsetup luksOpen foobar && mount foobar && vim
foobar/passwords.txt has always worked fine.
I suspect it has to do with the modernist fetish of convenience. Not having
all your data synchronized to all devices at all times is apparently a fate
worse than death.
~~~
CobrastanJorji
I started using LastPass because I found that for all but my bank, Google, and
Amazon passwords, I was using the same password on every other page. I've
found that it's really great to just let LastPass pick a lengthy password for
every new site I join and know that I'll still be able to log into it later
from my phone or my laptop or my desktop without problem.
I get that it's got some serious security holes, but it's better than not
using it, because if I don't use it then I'm just gonna start repeating the
same username and password across sites again.
The enemy I'm fighting is my own laziness. I'm not choosing between "use
LastPass" and "lock my passwords in an encrypted fileystem." I'm choosing
between "use LastPass" and "use the same password everywhere," and LastPass is
better than that.
------
ry_ry
So if they want 2fa enabled and users to avoid browser plugins it
inadvertantly suggests a vector to start looking at.
At a guess, an API vuln that issues a token of some description?
------
astrodust
LastPass tire fire continues to spread.
| {
"pile_set_name": "HackerNews"
} |
Twins’ Facebook Fight Rages On - donohoe
http://www.nytimes.com/2010/12/31/business/31twins.html?_r=1&src=twr
======
strlen
The fact that this travesty continues (and how it is portrayed in the media)
shows what society still thinks of as a proper place for geeks like
Zuckerberg[1]: to implement some business guy's vision. The message is loud
and clear: "you may be smart, you may go to the same schools as we do, but you
are an inferior being." Our skills are thought of as a commodity, that we can
implement a site like Craigslist, Amazon or Facebook (in its modern
incarnation) in a weekend: it's as if the idea is the hard part.
This applies not only to Zuckberg, but also to the employees at Facebook who
have been busy working nights and weekends building, scaling out and
monetizing the site. Apparently, however, society thinks nothing of a wealth
transfer from the workers to the privileged elite (i.e., the twins).
I'll be the first to say: even if the allegations are true, fuck these
jocks[1]: everybody and their mother had a "social network for X" idea; the
idea wasn't unique, turning it into an a product users love was.
[1] It's popular to portray Zuck as some PHP script kiddie, but that's not the
case. He's written a Winamp plugin in high school, for which Microsoft offered
him a $1mm bonus if he signed on as a full time employee (forgoing Harvard).
His initial technology choices may be disagreeable, but he's still one of us.
[2] <http://news.cnet.com/8301-13577_3-10016183-36.html>
~~~
alexgartrell
Fuck these jocks
So maybe I'm being a little oversensitive here, but attitudes like this toward
athletes are total bullshit. I'm going to go out on an egotistical limb here
and say that I'm a pretty fucking competent coder, but before I was I was a
pretty decent Football player. Don't make this an "us vs. them" thing, because
that's a false dichotomy if I've ever heard one.
~~~
strlen
No, you're not oversensitive here. I am. I regret putting that comment in.
It's a visceral, emotional gut reaction. Nonetheless, I'll leave it there:
editing it out would be Orwellian.
However, there's an interesting point: they spent their time perfecting their
rowing skills to an olympic level, that's where their passion lays. It's
difficult to be an olympic rower and a top notch hacker at the same time: it's
one thing to dabble in both, it's another to master one.
I work out for at least an hour 5-6 days a week, but I'm not an athlete. The
hours I have to spend to become proficient at programming don't leave time for
equal amount of hours (10,000 according to Gladwell) to be spent on sport.
Winklevii made their choices, Zuck made his.
~~~
fingerprinter
Going on a HUGE side tangent here b/c working out, fitness and overall health
is a huge passion of mine...
people don't know how to workout....and people don't know what an 'athlete'
does when they workout. I've been around professional and collegiate athletes
for quite some time and I think most people would be amazed to see how little
they actually workout.
The basic thought the past 20 years was 'more is better' when it comes to the
body; more working out is better than less working out. What we are learning
and something good trainers and athletes have known for some time is that the
amount of working out takes a huge backseat to doing the right kind of working
out at the right intensity level.
It is more mythos created by the sports industry when we hear that someone is
'in the gym' 10 hours a day. This might be accurate, but the time they are
actually working out is minimal (or, rather, it should be if they value their
asset aka body).
Now, to someone like you working out 5-6 days a week for (guessing) an
hour...I guarantee that if I changed your routine and intensity levels you
would become an athlete you never dreamed you could be. I could probably do it
in literally half the time as well.
I'll leave you with this...which do you think is more effective as a workout:
60 minutes on the treadmill or elliptical or 10 minutes of sprinting intervals
@ 75 max effort? Did you know you can get one of the best and hardest workouts
of your life if you just did 5 minutes of Tabata style kettlebell swings (20
seconds swings, 10 sec break for 5 minutes)?
Knowing the body and being able to hack the body are so foreign to most folks
they literally have no idea what it means to workout like an athlete.
~~~
moultano
Have a good resource on "tabata style kettleball swings?"
~~~
fingerprinter
The technical name is 'Tabata Protocol' and google is your friend here. Also,
YouTube is awesome for finding good workouts if you know the right search
terms.
To get you started, this is a good video.
<http://www.youtube.com/watch?v=GtgRcqaOqDo>
Just note that you should be going much, much harder (more intense) than she
is doing. Remember, 20 seconds all out, 10 seconds rest. You can also vary the
intensity by weight of KB and not just speed. I use a 53 pound KB for single
arm swings and a 70 pound for double arm swings (at the gym...don't have a 70
for the home yet).
If you have a tough time counting 20 seconds and 10 seconds, the GymBoss timer
(<http://www.gymboss.com/> ), available on Amazon is a great way to time.
Some quick articles on tabata: [http://www.thefitnessmonster.com/2010/02/hiit-
for-fat-loss-t...](http://www.thefitnessmonster.com/2010/02/hiit-for-fat-loss-
tabata-protocol.html)
[http://ezinearticles.com/?Kettlebell-Tabata-Workout---
Swings...](http://ezinearticles.com/?Kettlebell-Tabata-Workout---Swings-For-
Rapid-Fat-Loss&id=3772838)
You can do anything in a tabata fashion. For instance, you can sprint, you can
do an exercise bike if you have some issues running (I'm rehabbing an Achilles
tear so I stick to KB, swimming and some variants I'll talk about in a minute)
or anything you can do for 20 seconds.
I'll even make circuits for Tabata workouts. This is a great one that gets you
quite exhausted and will boost your metabolism sky high as well...
2-4 rounds, 20 seconds of each exercise in order, 10 second in between
exercises.
Pushup - you can do any type: traditional, military, diamond, plyo. Even vary
it up in the different rounds. KB swings - See previous Burpees -
<http://www.youtube.com/watch?v=7MGljX4bbps> Air Squats or Jack/Power Squats*
- <http://www.youtube.com/watch?v=g1FpWEfJW1s> \-
[http://www.youtube.com/watch?v=PEwitPuU0Xg&feature=relat...](http://www.youtube.com/watch?v=PEwitPuU0Xg&feature=related)
Plank crunch (or variants) - <http://www.youtube.com/watch?v=31SbKgmHcmw>
Once done...take a 10 second break and start over again going for 2-4 total
rounds. If you do 2 rounds, that is 5 total minutes for working out. 4 Rounds
is 10 minutes. This is very, very tough (honestly) and sometimes I have a hard
time doing all 10 minutes w/ full intensity.
------
narrator
Moral of the story folks. Be very careful about people you go into business
with. If you smell a hint of "douche" or especially narcissism, just walk
away.
------
snprbob86
Now that I'm working on a proper startup -- raising money, building a product,
hiring a team, making deals, acquiring customers... I feel a renewed deep
respect for people who _actually make things_. No amount of hearing "the idea
isn't as important as the execution", no amount of startup culture
indoctrination can really prepare you for doing it yourself.
Building something that people want is just so much harder than anyone could
possibly imagine until they try it. I don't think any typical judge could
possibly understand. If they did, a case about "he stole the idea" would be
instantly thrown out with prejudice. The idea is so unbelievably
inconsequential in the scope of skill, determination, and heart needed to
succeed.
Even if Zuck mislead these guys into thinking he was building this exact
product for them and on their time, I don't think they are entitled to
anything. Even if the Harvard Connection was the most popular social network
and Zuckerberg was hired as a 10th engineer and left and build Facebook to
compete. I don't think they'd be entitled to a dime. Love him or hate him,
Zuckerberg built an incredible business with a stellar team in a remarkably
short time period. Luck was involved, but this was no accident.
------
edanm
It still amazes me how different my perception is on starting successful
businesses, versus most other people.
I mean, there's the whole "the idea is not the important part" slogan, which
is true to at least some degree, which seems completely lost on the twins.
And take this quote: _When asked if they could have turned ConnectU into a
site with hundreds of millions of users, like Mr. Zuckerberg did with
Facebook, the twins replied in unison, “Absolutely.”_
Seriously, have you ever heard anyone who would say that they could
_absolutely_ succeed with _any startup_? The optimistic chances of success for
any startup aren't huge, what makes them think they would absolutely succeed?
Moreover, they're not talking about the kind of success that YC is happy with,
or even the kind of success that VCs are happy with. They're talking about the
kind of success of a once-in-a-decade company.
Lastly, I've worked on my own startup for almost the past year. It's been a
year of attempts, false starts, "pivots", eventually throwing out some ideas
altogether and starting from new. From what I understand, after the Winkelvoss
twins approached Zuck, less than 2 months passed before he went and released
Facebook. 2 months, to me, seems like such a tiny, inconsequential amount of
time when you're talking about starting a startup.
Any way you look at it, from the facts as I understand them, this just seems
like 3 people who have no idea what they're talking about, trying to squeeze
money out of someone successful just because they can.
------
kylelibra
This is getting to the point of embarrassing. It is time to give it a rest.
------
naner
[http://viewtext.org/article?url=http://www.nytimes.com/2010/...](http://viewtext.org/article?url=http://www.nytimes.com/2010/12/31/business/31twins.html)
------
bl4k
It seems you can't be successful, especially in tech/web, without a dozen
people hanging onto your coattails claiming that you stole the idea or that
you were lucky.
MySpace were written off as lucky spammers, Zuck a theif, Bill Gates stole MS-
DOS, etc. etc.
~~~
pyre
Bill Gates stole MS-DOS? So far as I know, he _bought_ DOS to license to IBM.
There's a difference between being a skillful hacker and being a shrewd
businessman. Claiming that someone isn't a skillful hacker doesn't mean they
are completely without brains/skills/etc.
MySpace were 'lucky' in that people latched on to their horrible interface
because it had features that they wanted (to put music, videos, media on their
'homepage'). People could have easily rejected the interface despite yearning
for the features.
Zuckerberg isn't necessarily a thief, but he certainly should have covered his
ass a lot better with contracts and such. Though, with the amount of money
that's on the line, there would be people coming out of the woodwork no matter
how airtight of a contract they had.
> It seems you can't be successful, especially in tech/web,
It's the "I thought of that too, so where's my money" syndrome. "I thought of
The Clapper first! I should be the one making money!"
~~~
bl4k
I didn't say I agree with it - I said that is what you hear a lot of.
Zuck and Bill deserve absolute credit for their successes.
------
blantonl
It is pretty clear what is driving this - attorney's fees. The attorneys can
conjure up all kinds of (remote) scenarios for additional, potential,
settlements now that they had the taste of the previous settlement.
~~~
edanm
Their original attorneys were fired, not paid, and had to go to court to force
the Winkelvosses to pay them their attorney fees. The Winkelvosses withheld
the money due to their claims of their lawyer's incompetence.
------
smokey221
If Zuckerberg was a more likable guy like Leo Laporte or Kevin Rose I'd feel
sympathy for him. The Winklewosses might be tools but Zuckerberg is hardly
more sympathetic.
~~~
younata
Never met Zuck, but, I have far more respect for him than I do for the
Winklewosses.
| {
"pile_set_name": "HackerNews"
} |
Someone Just Found an Embeddable Google +1 Button - It Works - Jsarokin
http://techcrunch.com/2011/03/31/omg-someone-just-found-an-embeddable-google-1-button-%E2%80%93-and-it-works/
======
trotsky
Good job keeping up your journalistic standards in your headlines, TC.
~~~
robinwauters
I read somewhere that the more braincells one has, the easier it is for a
person to recognize sarcasm.
~~~
RiderOfGiraffes
Sarcasm is _awesome!_
------
aw3c2
Direct link:
[http://www.yvoschaap.com/weblog/the_google_1_button_discover...](http://www.yvoschaap.com/weblog/the_google_1_button_discovered)
------
ck2
Ah so here it is
[https://madrelease.google.com/_/doodad/button?url=http://new...](https://madrelease.google.com/_/doodad/button?url=http://news.ycombinator.com&height=100)
[https://ssl.gstatic.com/s2/oz/images/stars/po/ESAPv1/buttonS...](https://ssl.gstatic.com/s2/oz/images/stars/po/ESAPv1/buttonSprite.png)
Ugh so now we are going to see those everywhere.
Google basically will now be able to track you across every last site, even if
they don't use analytics or adsense.
One more thing for adblock I guess.
~~~
tonfa
My guess would be that the number of sites having a +1 button and not using
analytics is __very __small.
------
jcapote
ZOMG!!!
------
zachahack
All those poor single people..
| {
"pile_set_name": "HackerNews"
} |
Show HN: My first iOS game released - jason_slack
My first iOS game is released. It took me 2 weekends to develop and 9 day approval time.<p>Here are a few promo codes. If you take a promo code, can you please also leave a review?<p>Happy to answer any questions. An update is already being prepared for iPhone support as well as a more major update that adds difficulty adjustments and a "dreaded" twist :-)<p>The Game: https://itunes.apple.com/us/app/pop-corn/id905859076?mt=8&ign-mpt=uo%3D4<p>Promo Codes:<p>F79LRP4JNWT4<p>X94XXNNW77E3<p>PEWJ77FHTME7<p>9PHN99RLLE6W
======
chrisBob
The game was interesting, but I have a few critiques:
1) The first thing I checked was to see if it was multitouch, and I was
disappointed. I should be able to tap kernels with as many fingers as I have
(or 11, whichever is smaller).
2) It is not obvious when a round will end. One lasted 41 seconds. Another
lasted 44. There are not instructions, and I can't tell after playing a few
rounds.
3) I would recommend giving your contact info either in the app description or
on your webpage. If I can't find contact info then I am likely to complain
about bugs via an app review because that is the only method you gave me.
4) Please give some visual feedback for which kernel is about to pop. Some are
different colors, but there is no apparent reason as they are all the same
type.
5) You only see the opening menu the first time you play the game. There is no
way to get back to the menu after a round only a exit button which exited the
whole app. That is possibly a bug and it just crashed.
6) After one of the rounds I didn't get any menu and had to force quit the app
to play again.
7) If you exit the game (ie. with the home button) it does not stop the clock,
and then it shows a large time when you resume and finish the round.
8) The splash screen flashes up for a fraction of a second. The recommended
method is to have a splash screen that looks mostly like the menu screen, but
maybe without the buttons, so that the launch looks smoother.
~~~
jason_slack
Could you tell me which model IPad you have?
Thank you for the feedback! I'll go over each of these with a fine tooth comb.
I have a 1.1 version that addresses a few of these concerns already.
1\. Good idea on multitouch
2\. The round ends when you have 125+ kernels on the screen
3\. I'll update both today
4\. The time each kernel pops is generated at random. I think you are right,
feedback is important.
5\. Its not a bug. I did it on purpose :-) Well my logic behind it was you
either want to replay or quit. Getting back to the main menu right now felt
weird since the only options are Play and About.
6\. I'll look into this.
7\. You are right, I have this fixed in the next build.
8\. I'll look into this. I used other games I was playing as an example and
they all seemed to have a different launch image and main menu, etc.
~~~
chrisBob
Its a 4th generation iPad.
1) depending on how you wrote this, it could be easy to implement. The easiest
way would be to have each kernel be its own view, and then a touch makes it
disappear. Then each view handles one touch each, but the result is a better
experience.
5) This is the only app I have seen with an exit button. I did not even know
that there was code to do this since there is a nice hardware button that does
the same thing.
8) The splash screen makes more sense if there is a longer loading time. One
option would be to have another view that is the same image and then hold it
for 1-2 seconds. I have seen some apps do this.
~~~
jason_slack
1\. Each corn kernel has its own event listeners on it. I'll debug this. I
actually (as well as my wife and son) tended to play it with 1 finger. Thanks
for demonstrating another method of play.
8\. Good idea.
~~~
chrisBob
It is interesting to find out how other people play your games. I had one
where I knew to just touch and hold, but when other people swiped repeatedly
it showed a problem that I would have never seen on my own.
~~~
jason_slack
Just FYI There is a 1.1 update waiting for approval and I am submitting a
1.1.1 that utilizes full multi-touch. What a difference it makes in the game
play....
------
tjosten
As far as I remember, customers who used a Promotion Code to buy something
from the (Mac) App store are not able to leave a review for the app.
~~~
chrisBob
I used the first promo code, and I can confirm that you can't leave a review
if you use a code.
~~~
jason_slack
I had no idea this was the case. Thanks for trying to leave feedback though.
| {
"pile_set_name": "HackerNews"
} |
Scalable C – Writing Large-Scale Distributed C - ingve
https://hintjens.gitbooks.io/scalable-c/content/preface.html
======
jasode
_> The more C++ you know the worse you become at working with others. First,
because your particular dialects of C++ tend to isolate you._
So why is using something non-standard and non-universal like <czmq.h> not
perceived as a "dialect" of C?[1] Any non-trivial source codebase beyond _"
printf("hello world")"_ will be a "dialect" of the programmer(s). When looking
at the C source files of Linux kernel, Redis, and SQLite, etc, the syntax
patterns, helper macros, string manipulations, etc do not look the same.
Also the author's example of,
for (i = List.begin (); i != List.end (); ++i)
cout << *i << " ";
is not the same semantics as:
char *fruit = (char *) zlist_first (list);
while (fruit) {
printf ("%s ", fruit);
fruit = (char *) zlist_next (list);
}
The C++ loop is multithread safe. The C version is not. For the zlist_next()
to work, the "list" data structure needs to maintain mutable state in between
subsequent calls. (Think of how something like strtok() works by mutating the
string).
[1]possibly because Pieter Hintjens is the programmer & CEO behind ZeroMQ and
czmq.h. Therefore, it doesn't feel like a dialect to him?
~~~
PieterH
CZMQ is a library of around 30K lines of code. The Scalable C book is in many
ways a guide to using that library in real projects.
Of course every programmer develops their own dialects, just as every writer
has their own voice. C is however a small language and if you stay away from
weird macro magic, any well-written C code is mutually intelligible to other C
programmers. Whereas with C++, dialects can have so little overlap they are
not mutually intelligible.
FWIW neither of the fragments is safe if you are sharing state between
threads. In practice we do _not_ share objects between threads, and each
object holds its own state, and thus our C code is 100% thread safe and
reentrant.
~~~
jasode
_> The Scalable C book is in many ways a guide to using that library in real
projects._
I'm not criticizing the book or czmq. I'm sure it's a fine library. I just
found your characterizations of C++ to be strange.
For example: " _> , any well-written C code is mutually intelligible to other
C programmers._"
If you're going to qualify C code with " _well-written_ " to help make your
point then can't the same qualification be applied to C++? If so, it means you
believe that there is " _well-written C++ code_ " that is simultaneously
unintelligible to other programmers. In your opinion, what would be an example
of that? (E.g. If you can point to github of unintelligible but well-written
C++ source code.)
And your other statement: _> , because your particular dialects of C++ tend to
isolate you._
I don't know if CryEngine and Unreal game engines are well-written C++ but
they seem attract developers. There's also the scuba diving app[1] written in
C++ that also has Linus (who you already know hates C++) modifying the source
code. I contend there are bigger factors than C++ dialects causing isolation.
The C++ _ABI_ may be more isolating than the C _ABI_ because of C++ name
mangling incompatibilities. But I don't see how the C++ dialects (of well-
written code) are isolating.
[1][https://github.com/torvalds/subsurface](https://github.com/torvalds/subsurface)
~~~
PieterH
Since you ask, I'll admit it: I enjoy trolling C++ users because the language
has so often thought of itself as superior to C. Beating on the language
always gets lots of discussion going, which is fun. I've nothing against the
language, or any other language, as such. Good tools, in the hands of good
developers.
~~~
unscaled
I find it the other way around. It's usually C hackers who tend to describe
C++ as the devil incarnate. C++ developers tend to be more pragmatic - we'd
happily write in C if necessary, we just find it limited. And since C++ is
almost a superset of C, there's rarely any need to use it.
------
SFjulie1
Exactly the kind of code I make.
I use C for performance.... as an extension for python that have a GC and a
GIL. But more than never, I first use numpy (fortran) because it is dazzling
fast and has specialized tricks of digital signal processing availables
(ifft). And I do C after the profiler says to do so. When needed. If needed.
Most of the dynamic data structure (message sent with zmq) the config, the
parsing are better handled in python.
And since I do as much sloc / day in C and python ...
(1 python loc = 6 C loc)
I code 6 times faster.
And I don't have the headeaches of the dependency management
I am totally okay with C, but when doing distributed system more often than
never you also multi-threading. And C is not builtin for thread safety, it is
harder.
So I C some masochisms at work here.
And I am pretty sure I am not the only coder thinking this book is full of
pedantism and of advices not to be followed and it is empty.
How did such a poor news made it to the top?
~~~
vidarh
> more often than never you also multi-threading
This is a Windows-ism that's crept into Unix-likes over the years, and it's
not a good trend. Just don't do it. Especially since sharing direct access to
state makes it harder to decouple components to scale them further. This book
specifically argues to pass state via IPC for a reason.
> And I am pretty sure I am not the only coder thinking this book is full of
> pedantism and of advices not to be followed and it is empty.
Maybe, but iMatix has been a successful company for more than two decades, and
delivered impressive open source applications (e.g. Xitami web server) and
code-generation tools (Libero ec.) as well as cross-plaform utility libraries
for C (SFL etc.) already two decades ago, and have gone on to develop large-
scale C-based distribued systems and in the process developed things like AMQ
and 0MQ that's been incredibly successful, so I for one tend to at least pay
careful attention as they actually do have a track record.
~~~
SFjulie1
I know a lot of successful companies with products that are notoriously poorly
coded : \- "security software"; \- "game industry"; \- "car industry";
And if you read correctly I think the biggest issue is TIME is MONEY.
What are the advantages of using techniques that:
\- are expensive (productivity is constant in sloc whatever the language);
\- are notoriously a systemic risks given their domain of work and is hard to
audit;
\- that can be smoothly achieved by upgrading a faster to build architecture
in a scripting language ;
They may have bigger balls of steels than me doing it in C and be the best
programmers in the world. My question is business oriented: what is the
economic rationale of a full C solution from start?
~~~
ArkyBeagle
Beats me.
I know that if I had a large enough project and had to add people, I have a
dozen people in my Rolodex who speak 'C' at the expert level and that they
will perform. But depending on the problem domain, that might mean C++ or it
might mean Python or something else.
But given the level of hostility the language inspires, I have to wonder. To
wit "bigger balls of steel" and "best programmers in the world." Both
sentiments are quite foreign to the sorts of environments I've worked in, I
assure you.
~~~
SFjulie1
Sorry for you then. Living in such a boring world, and what a disdain-full
answer that makes my point.
I have add my share of conferences technical or about FOSS. And I met peoples
with a _lot of_ passion ... and code delivered. You probably use their
software daily.
I have been using more than 13 langages ranking from C to forth, matlab, vhdl,
spice, python, perl and php.
There are definitively cultures associated with languages and beliefs.
Perl community is thinking coding is like speaking/writing a foreign language;
Ruby about you IQ and technical skills are totally correlated with how nice
your apple laptop looks like and how expensive it is. They are our hipsters
(troll);
Python secretly hides a sect hating braces and everything that looks like C
and believe C coder can't make safe thread code, malloc, correct string
handling. And they hate braces.
for c++ coder referring to linus torvalds rant would be the spirit.
Java coder believe in the utltimate safe portable VM and the power of GoF. And
think people look the wrong way;
Haskell thinks of themselves as alchemists loving to use obscure terms coined
by an hallucinated metaphyscian priest that said ET must exists and that no
one will notice. They still laugh of their ultimate joke;
And C coders think that only them are the pure programmer, the only one that
can see the matrix between the purity of abstraction and the undetermination
of hardware/norms due to the imperfection of the humans. But, with their
discipline that is above the norm (no noob accepted) they can fight the God of
Entropy
FORTRAN coder think that computers are a pain and would just like to have
exact figures much more than nice looking interface and wonder when a correct
intuitive language will appear (<\--- My sect)
They appear maybe because for each language comes a practical field of use and
that one computer language cannot fill all the needs.
The need for correction and exactitude in science conflicts with the "ease of
use" of numbers.
The need for having cheap workforce conflicts with efficient cheap to maintain
code;
The need for preventing embezzlement (origin of SQL) conflicts with creative
accountability;
At one moment, at my opinion C is like a middle age corporation. Trying to
promote a one best way of CS that always boil down to C.
C community maybe "professional" as opposed to "enthusiasts". But I think it
does not always serve them.
And I do not think that recognizing Computer Science is a peaceful uniform
land, but an arena full of organic entities in conflicts with logical distinct
rationalities for the same resources.
In short, I have the write to mock other cultures.
~~~
ArkyBeagle
Nicely put. Very nicely put.
I don't know how you came up with "disdainful"; it's more sort of sad and
weary as I read it now. After all, I started with "Beats me" \- such a
decision would have to be very local. The first rule of 'C' is "don't use 'C'"
these days... the people I know _DON 'T_ swagger; that was my point.
The "professionals" vs. "enthusiasts" divide is extremely interesting in all
fields of endeavor. I'm definitely on the "professional" side.
I... don't think 'C' programmers are "above any norm"; they just sort of know
where the rocks are right under the surface of the water. It's more difficult
to explain than to do. If a bunch of people misrepresent themselves as ...
badass because they sling 'C', I can't help that. The appropriate mentality
for it is one of caution. I specifically called that out here...
It also matters less because coding a system is roughly 5-10% of the actual
cost of most deployed systems. Language matters much less than mechanism.
Meanwhile, the worst horrors are inflicted using systems like SAP.
Don't feel _too_ sorry for me; I use at least three language systems every
day, and have messed with ... dozens ( all resulting in deployed code at some
level) , including graphical CASE tools.
------
halayli
This looks like it's coming from someone who doesn't know C++ well and is just
coming up with reasons to fit their bias. The fact that he/she didn't mention
any disadvantage to the C code written beside verbosity makes it clear.
For one, it's easy to forget to call zlist_destroy. Who owns what in C can get
very complicated and you can run into dangling pointers. At least in the C++
version you can manage ownership easier in their case.
I am not defending one language over the other, I use them both and have
experienced the advantages and disadvantages of each.
What's being shown in this book is not how typically you create link-lists.
man queue(3) to see how it's generally done.
The C++ for-loop is not how you typically iterate over a list , again the
author decided to show a bad example to confirm their bias:
for (const auto& i : List)
cout << i << " ";
~~~
unscaled
More likely, someone who hasn't programmed C++ in the last 10 years.
Forgetting auto, and using the cumbersome 3-part for loop with iterator
boilerplate when you only need value shows age. Initializing the list is also
easier now, with initializer lists syntax, so you could just do:
list<string> lst = { "tomato", "grape", "apple", "orange"};
and cut another 4 lines, making the C++ line count half of C version. Not a
negligible difference, as the author claims.
------
nickpsecurity
Nice work in progress, Peter. Look forward to seeing more of it given your
prior work. I light how you preempt many C-related counterpoints with model-
driven development that generates C. Done excellently by iMatix and many
others. I'm especially interested in how you'll apply that to distributed C.
------
petke
I'm a cpp programmer who recently spent a week learning zeromq to replace
named pipes in a project. By the end I was disappointed by the cpp language
bindings as they only cover the low level library. Had I known from the start
I probably would have looked elsewhere. Its a shame cpp is ignored in much of
the open source community in favor of c. If nothing else Cpp after all is a
safer c.
~~~
dschiptsov
http://250bpm.com/blog:4
http://250bpm.com/blog:8
~~~
petke
Yes I read those before. I didn't find them convincing. Intrusive lists is an
anti pattern that you can also do in cpp if you want. Getting rid of
exceptions doesn't mean you get rid of errors. It just means you can more
easily ignore errors and continue running a corrupted program. But the big
picture though is that cpp I a safer language. A core library might be written
in c for whatever reason. But its good to provide a wrapper in a safer
language for users to use.
------
neikos
> _/ /Solution: make /usr/local writeable.//_
> _This is a brutal and effective solution, the best kind of solution_
I... uhm, what?
> _Solution: grab the latest CZMQ git master from github._
No, you do not want to run your software off of master, and the fact that
Master doesn't always build (because of errors) should be a fringe occurrence
with CI now being free/cheap and highly flexible.
~~~
michaelmior
I'm not sure about CZMQ, but I assume what you eat is that you don't want to
run code from a development branch that's rapidly changing. That's not
necessarily what master is in all projects. The master branch is sometimes
used as the latest stable release.
~~~
neikos
True, I forgot about that aspect. However in this case that doesn't apply
either as a stable branch should always compile.
------
lukaslalinsky
It's funny how this centered around ZeroMQ, which is written in C++.
~~~
geocar
This might be part of the reason:
* [http://250bpm.com/blog:4](http://250bpm.com/blog:4)
* [http://250bpm.com/blog:8](http://250bpm.com/blog:8)
~~~
jeremyjh
Which are weak arguments that point more to the author's dissatisfaction with
the architecture of libzmq than with problems in C++ language. This was
discussed previously here:
[https://news.ycombinator.com/item?id=3953434](https://news.ycombinator.com/item?id=3953434)
------
vidarh
Github repository:
[https://github.com/hintjens/scalable-c](https://github.com/hintjens/scalable-c)
------
tom_mellior
I'd be interested in this if it were nearing completion. I think structuring
the book around problem-solution pairs is a nice technique. But it would be a
much better read if fewer irrelevant statements of opinion were strewn in.
Also, a lot of the bizarre statements of irrelevant "fact" should be checked,
for example:
> In the Old Times, creating a repository was days, weeks of work.
I can't begin to comprehend what this may mean. "svn create" (or whatever it
was called) was always instantaneous. Setting your project up for network
access took longer because you had to read docs and write a config file, but
the same is true for Git.
> Optimizing compilers (...) may remove assertions.
Bullshit. Using NDEBUG removes assertions, and yes, this indeed means that
assertions must be side-effect free. But an optimizing compiler? No. If that
actually happened for calls to impure functions (and no, it really doesn't
happen), it would be a major compiler bug.
> a nasty reminder of the old days when computers stored data and code on
> different kinds of rust, and languages enforced that
Code and data do live in different places in memory; nowadays more than ever,
for reasons of security. C's original "declarations before statements" rule
(the context here) was simply because it makes it much simpler to write a
primitive single-pass compiler.
> The standard C library often puts destination arguments first, which is a
> hangover from assembly language. MOV X, Y.
... or maybe it's an analogy with assignment statements, X = Y?
Note that three out of these four examples are just irrelevant opinions, so
they should be removed from the text even if they weren't factually false.
~~~
PieterH
Creating an svn repo was fast, yet you could not use it without a dedicated
server, DNS configuration, security configuration, firewall configuration,
etc. etc. If this was your only job, sure, a few hours' work. For the rest of
us, begging a sysadmin or spending days learning the details.
Whereas with git it's literally "git init ." or clicking on Github.com and
we're ready to roll.
I do appreciate the fact checking, and you're welcome to send me more
comments. Errors of fact don't survive the editorial process, one hopes.
Opinions, that's a different story.
~~~
tom_mellior
> with git it's literally "git init ."
That doesn't magically give you a shared, network-accessible repository with
all the correct access controls.
> or clicking on Github.com
SourceForge has existed since 1999, and after a click you have always been
ready to roll.
> and you're welcome to send me more comments
But I probably won't if your strategy is "spread misinformation first, then
make others work to point out mistakes, then defend an indefensible position,
then maybe change it". That's not how communities are built. That's what you
yourself criticize in the section on merging strategies...
------
bluejekyll
> then you know where C stops working, as a language.
He actually makes a really strong argument against using C right in the first
two paragraphs.
C is a dangerous language. Assembly is even more dangerous. There are
languages that compile to close the same speed and are systems oriented with 0
overhead.
I'm truly curious, if you're working on a new project would you pick C? Or
would you reach for something that's going to reduce the bugs that inevitably
come from writing even 10 lines of C?
~~~
chris11
What languages would you personally pick over C?
~~~
bluejekyll
Rust, no debate.
------
signa11
this seems to be still it is early nascent stage, with a complete toc missing,
most likely, in the works. caveat emptor.
~~~
PieterH
Yes, indeed. I've updated the book title on Gitbooks to make this clear. I'm
writing and publishing the book piece by piece, to get feedback early on in
the process.
------
magicmu
I know the basics of C, but stopped short of getting deep into threading and
concurrency since it seems like Go and Rust handle that in a more efficient
way (although there's no way I would use Rust in production yet). Are there
any advantages to using C/C++ for a new large-scale project?
~~~
steveklabnik
Just for curiosity's sake, what specifically would make you not use Rust in
production yet?
~~~
OopsCriticality
Not OP but from the perspective of the industrial side: no track record, no
formal standard, changes too fast, incomplete documentation, doesn't have an
extensive commercial and supporting ecosystem (e.g. Parasoft, Java Path
Finder), limited pool of experienced programmers with embedded and regulated
environment experience. Arguably, it falls under the heading of "too new".
I'd prefer to deal with known knowns rather than the known unknowns or _gasp_
unknown unknowns of something new. It's a very conservative position, but it's
borne out of the expense associated with mistakes and corrections of.
~~~
steveklabnik
Cool thanks! I'm trying to figure out what blockers are so we can prioritize
things; a lot of these are very reasonable, but not immediately actionable
things for me. Sounds good. :)
~~~
OopsCriticality
Sorry I can't offer anything more specific and actionable; I guess comparing
Rust to a fine wine, something that must be aged to reach full potential, will
have to do :)
~~~
steveklabnik
Hehe, no need to be sorry. It's one of the best answers, actually: it means
that there aren't any fires, it's just about playing the long game and letting
time pass. I prefer that. :)
------
_pmf_
> While C lends itself to building libraries, it has no consistent API model.
What language has? Wouldn't this require first class modules (which few
systems have; JS' hacked together solution is obviously not to be considered a
true solution)?
~~~
vog
OCaml has a typesystem in which modules are first-class citizens, just like
functions. They have a clear separation between interface (they call it
"signatures") and implementation. The compiler enforces that you can only
write against the interface, making modules with the same interface really
exchangeable. The modules are also parametrizable (they call such modules
"functors").
[http://caml.inria.fr/pub/docs/manual-
ocaml/moduleexamples.ht...](http://caml.inria.fr/pub/docs/manual-
ocaml/moduleexamples.html)
[https://realworldocaml.org/v1/en/html/functors.html](https://realworldocaml.org/v1/en/html/functors.html)
[https://realworldocaml.org/v1/en/html/first-class-
modules.ht...](https://realworldocaml.org/v1/en/html/first-class-modules.html)
~~~
tom_mellior
That's all true, but it doesn't mean that OCaml has a "consistent API model",
whatever that may mean. Unless "provide a fold and a map for all datatypes",
which I guess is consistent across most APIs, is a "model".
------
doodpants
So far I've only read the Preface and part of Chapter 1. What bugs me is this:
> * Write portable code that runs on all platforms.
Ok, good plan.
> * An operating system you are comfortable with. Linux will give you the best
> results. OS/X [sic] and Windows are usable if you have no choice.
So... results vary by platform? And then after the "hello world" example:
> And you should see that familiar Hello, World printed on your console. If
> you are using OS/X [sic] or Windows, it won't be this easy. I'll repeat my
> advice to install Linux.
Funny, this example works just fine for me on OS X. You do realize OS X is a
Unix-like system, right?
> Having said that, remember this rule:
> Linux is the native environment for C development.
Gee, I wonder how people like Dennis Ritchie ever managed to write C code
before Linux came along?
------
jheriko
those three points in the bullet list near the start all seem to miss the mark
for me.
------
fizixer
Love it.
I dream of the day when all current system-level fads bite the dust, replaced
by new fads, while C is still running as the system layer. (hint: just like it
is happening today with the 90s fad called C++, replaced by fads like Go,
Rust, D).
~~~
dunerocks
lol? C++ is hardly a "fad"!
~~~
kev009
Well, IMHO it was, and C was too (google books magazines from 80s and 90s).
The people left using both languages are usually doing so deliberately rather
than because it is trendy.
| {
"pile_set_name": "HackerNews"
} |
Why computer programmers need to stop calling themselves engineers already - gukov
http://www.businessinsider.com/why-computer-programmers-need-to-stop-calling-themselves-engineers-already-2015-11
======
DrScump
Original article posted days ago:
[https://news.ycombinator.com/item?id=10513371](https://news.ycombinator.com/item?id=10513371)
------
mohaine
I've got to call bullshit on this one. Sure SOME engineers need
certifications, but most do not. Pretty much just the ones that build
buildings/bridges here in the US. I've got 2 engineering degrees(CE/EE) and
when I got out college, I took the first half of the PE exam (need to take the
second part after 5 years in the field to be a PE) but the only reason I took
it is because it is almost impossible to pass after you leave college since it
covers the entire field, not just your specialty. It was a "Better off safe"
sorta thing. All my professors basically said an EE/CE will never need a PE
but you never know...
That said the term Engineer is definitely watered down, but this has been the
case at least as long as "Custodial Engineer" has been a term.
------
sotojuan
I would welcome an ABET accreditation for software engineering with open
hands. It would get rid of the whole debate on what Computer Science degrees
should teach.
------
wmat
I'm pretty sure all Engineers in Canada get to wear the iron ring, including
Software Engineers.
| {
"pile_set_name": "HackerNews"
} |
Robert Scoble: I didn’t sexually harass women as I lacked power over them - briandear
https://arstechnica.com/tech-policy/2017/10/robert-scoble-i-didnt-sexually-harass-women-as-i-lacked-power-over-them/?comments=1
======
ColinWright
[https://hn.algolia.com/?query=Robert%20Scoble&sort=byDate&da...](https://hn.algolia.com/?query=Robert%20Scoble&sort=byDate&dateRange=all&type=story)
| {
"pile_set_name": "HackerNews"
} |
Programmers Are Hipster Librarians - throwaway344
http://omniref.com/blog/blog/2014/09/19/programmers-are-hipster-librarians/
======
dalke
For comments, see
[https://news.ycombinator.com/item?id=8341158](https://news.ycombinator.com/item?id=8341158)
from 6 hours ago.
| {
"pile_set_name": "HackerNews"
} |
Ask HN: What happened to flutter? - sourabh86
There is this awesome app at flutterapp.com, I have been using this since some time now, but there have been no updates to it since they were acquired by Google. I thought now there might be frequent releases and many more supported gestures, but nope nothing! Anyone knows what happened?
======
dotcoma
This? ;-)
[http://www.youtube.com/watch?f&v=BeLZCy-
_m3s](http://www.youtube.com/watch?f&v=BeLZCy-_m3s)
| {
"pile_set_name": "HackerNews"
} |
Ireland Lacrosse sacrifice place in 'Medicine Game' tournament for greater good - bryanrasmussen
https://www.rte.ie/sport/other-sport/2020/0905/1163463-iroquois-nationals-lacrosse-ireland-world-games/
======
chrisbennet
Reminds me of Jack Sock vs. Lleyton Hewitt act of sportsmanship:
[https://www.youtube.com/watch?v=JvhLq09FaZg](https://www.youtube.com/watch?v=JvhLq09FaZg)
| {
"pile_set_name": "HackerNews"
} |
Kaminsky, Mitnick pwned on Black Hat eve - madair
http://www.theregister.co.uk/2009/07/29/kaminsky_hacked/
======
jacquesm
<http://news.ycombinator.com/item?id=730664>
| {
"pile_set_name": "HackerNews"
} |
Tom Scott: How the First Ever Telecoms Scam Worked [video] - lifthrasiir
https://www.youtube.com/watch?v=cPeVsniB7b0
======
lifthrasiir
I'm not a fan of video-first contents, but I'm linking to Tom Scott because he
commissioned various source materials and their translations just for this
video as it turned out that all existing English sources varied in details. I
love this amount of dedication.
(If you simply don't like videos, Wikipedia gives a reasonable article:
[https://www.inc.com/magazine/19990915/13554.html](https://www.inc.com/magazine/19990915/13554.html))
| {
"pile_set_name": "HackerNews"
} |
Self-Driving Cars May One Day Face Decision of Who to Save or Kill - jaequery
http://abcnews.go.com/Technology/driving-cars-day-face-decision-save-kill/story?id=40072003
======
jaequery
"Would you get into an automated self-driving vehicle, knowing that in the
event of an accident, it might sacrifice your life if it meant saving the
lives of 10 other people?"
Interesting dilemma.
------
yehosef
Or with less sugar coating - "Robots will decide who to kill"
------
boznz
I wouldn't want to write the if..then statement for that decision..
| {
"pile_set_name": "HackerNews"
} |
Ask HN: Have a Happy Christmas - vinnyglennon
======
harianus
You too
| {
"pile_set_name": "HackerNews"
} |
First app for audio transcription base on your mobile and speech recognition - comprobot
https://itunes.apple.com/us/app/agile-dictation-audio-file/id979463309?mt=8
======
comprobot
It is a first app to let people convert the wav, mp3 which more than 3 minutes
to text!
| {
"pile_set_name": "HackerNews"
} |
RE42927: System and method for obtaining and using location specific information - caf
http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=RE42,927.PN.&OS=PN/RE42,927&RS=PN/RE42,927
======
caf
Reading through the claims, the requirements for a "beacon" suggest that this
_doesn't_ read on geolocation by IP address. I'm not sure about geolocation by
triangulation from towers that don't specifically transmit information
intended to identify a location.
(As always, read the claims, not the abstract).
| {
"pile_set_name": "HackerNews"
} |
The Commercial Satellite Imagery Business Model Is Broken - jofer
https://medium.com/@joemorrison/the-commercial-satellite-imagery-business-model-is-broken-6f0e437ec29d
======
aurizon
Cube sats are about to shake this business up. In the past the cost of entry
was very high = few entrants, that went to fewer by predatory pricing against
any new entrants. The old birds are complex beasts that operate across many
spectral bands and are task commanded. The Cubes will be single band small
units with large lenses and larger sensors. They will accumulate and send data
to a ground based cloud and as time goes by will cover the earth in all bands
and in all seasons - all of which will be saleable at a price that will make
the old commercial monopolists to crap their pants. I am sure they will lobby
to limit these cubes, but many are immune to pressure. They might well agree
to no military base imagery. A trip to the planetlabs web site does show that
a huge acquisitive beurocracy lurks therein as there is zero mention of any
sort of fee structure = high fees IMHO, it is not the solution for all mankind
that cube sats might bring. Their videos seem to be staffed by summer
students??
~~~
campchase
Planet has hundreds of cube sats in orbit already. Low and medium resolution
data is not suitable for most commercial use cases. The only way to get high
res data is from big lenses = big satellites = big costs. I agree that cubes
sats are exciting especially for non-optical use cases like blanketing the
earth with internet or GPS-RO or Synthetic Aperture Radar. But they are not a
game-changer for visible-spectrum earth observation data in my opinion.
~~~
aurizon
Yes, but a crack in the monopoly edifice has appeared. It is true - the large
lenses rule - for now. I anticipate larger sensors, coupled with Cassegrain
reflectors(which are far lighter than glass and fold to shrink the path and
can fold even more for launch - unfolding on cue) will soon be flying and will
begin the cube sat's climb towards parity with the big boys as the weight
saving will enable their implementation in cube sats. This will make the big
boys fight back via access and price relaxations. I hope the cube sats people
stay independant and do not make common cause with the big boys? Better and
lower power SARs and control electronics are emerging to run within the
smaller power budget of the cubes.
~~~
campchase
Interesting, I’m unfamiliar with Cassegrain reflectors.
~~~
aurizon
[https://en.wikipedia.org/wiki/Cassegrain_reflector](https://en.wikipedia.org/wiki/Cassegrain_reflector)
------
randyzwitch
The selling model sounds strangely like the car buying model. Pre-COVID, even
the suggestion that the total price of a car be listed on the car was viewed
as idealistic nonsense. Only until a pandemic broke out, did car dealers admit
"you're right, we could always sell you a car online"
~~~
campchase
I sympathize. I sell stuff without a price tag all the time--it's the trap of
having large, high-paying customers and trying to lean down to serve small
customers. They're incompatible sales motions, and the effort to set up an
entirely independent, second distribution model is very expensive and time
consuming so it doesn't seem worth investing in.
------
PaulHoule
So many problems with this post.
It's on Medium (not sure if Medium was broken but I wish it was -- if you are
posting on Medium everybody knows you are a dog.)
Scatological language: there are better words than "shitty" to describe your
experience.
Missing the point: to many users the value of satellite imagery is that they
have it and that 'competitors' do not. In the case of the US Govt they don't
want unfriendly military organizations to have it, if it is somebody like the
Bridgewater hedge fund they might want to know the occupancy of the parking
lot at every Wal-Mart in America, but it's only valuable to them if nobody
else knows it.
~~~
campchase
Thanks for your feedback, Paul! To your points:
1\. Medium is crappy, agreed. I would prefer to use Ghost and might do that in
the future. They say on the internet, no one knows you're a dog, but I guess
you are the exception to the rule.
2\. Use of scatological language is kind of my specialty. I mean, shit!
3\. You say I'm missing the point and then go on to make two points that don't
really address the argument I made. Maybe you are the the one that missed the
point. But what do I know, I'm just a dog that likes shit.
| {
"pile_set_name": "HackerNews"
} |
Innovative technology for better decision-making - hpereira
http://www.d-sight.com
======
deniseadeva
Interesting indeed! Useful insights.
------
juanp
Very interesting technology :)
| {
"pile_set_name": "HackerNews"
} |
C64 Keyboard Prototype - erickhill
http://www.breadbox64.com/blog/c64-keyboard-prototype/
======
vardump
Keyboard is pretty amazing for C64 preservation efforts. Perhaps lessons
learned could be applied to other same era systems.
There's one part in C64 that's becoming more and more rare — the amazing SID
sound chip.
I wonder whether it'd be possible to have production runs of truly new 6581
and/or 8580 SID chips. Does someone still have the old masks?
Other chips you could emulate with an FPGA. But SID is partially analog, so
it's special. Some say no two SIDs sound the same.
Btw, recent C64 music demo playing off 1 MB Ocean style (= ROM) cartridge (not
REU):
[https://www.youtube.com/watch?v=7qxxnJVU4jQ](https://www.youtube.com/watch?v=7qxxnJVU4jQ)
[https://www.youtube.com/watch?v=UYAf_awh5XA](https://www.youtube.com/watch?v=UYAf_awh5XA)
Yes, it's real. Not particularly good example of SID though, but still
impressive for 1982/83 technology.
But this one does show off SID; C64 "Cubase", realtime DSP (timestretch,
low/high pass filter, distortion, etc.) pretty amazing:
[https://www.youtube.com/watch?v=k4GWheE4Gkw](https://www.youtube.com/watch?v=k4GWheE4Gkw)
~~~
monocasa
> Does someone still have the old masks?
You can probably reverse the masks with a microscope with a little elbow
grease. Not trivial by any means, but doable by someone in a garage as a
hobby.
The real question, does a fab that can work with that process still exist?
~~~
jdswain
There’s an ongoing effort to understand the SID here
[http://forum.6502.org/viewtopic.php?f=8&t=4150](http://forum.6502.org/viewtopic.php?f=8&t=4150)
Lots of interesting analog chip level stuff, it’s all new to me as I’ve only
dealt with things at the digital level, but very interesting to see how the
fabrication technology works in an analog way..
------
ChickeNES
Those acrylic backing plates are going to crack at some point. The author
should look into aluminum composite panel (Dibond is one brand name). It's a
sheet of HDPE plastic sandwiched between two thin layers of aluminum, and is
much stiffer and stronger than acrylic of the same thickness.
------
beamatronic
As a kid all I ever wanted from any computer was this:
Set pixel (x,y) to color (r,g,b)
I wish today’s kids had this with as little overhead as possible
~~~
egeozcan
var canvas = document.getElementById('canvas');
var ctx = canvas.getContext('2d');
ctx.fillStyle = `rgb(${r}, ${g}, ${b})`;
ctx.fillRect(x, y, 1, 1);
I say it's pretty close.
~~~
codeflo
It's pretty amazing to me that in 2018, the way we pass colors to a modern
graphics API is to build a string with comma separated list of the individual
components _encoded in decimal_.
And then people wonder why computers feel slower than they did 15 years ago.
~~~
egeozcan
Legacy APIs for DOM are hard to get rid of, which the Canvas API is based on.
There is some progress though:
[https://developers.google.com/web/updates/2018/03/cssom](https://developers.google.com/web/updates/2018/03/cssom)
------
pault
Those keycaps are gorgeous. If someone could manage to get those manufactured
I guarantee they would fetch upwards of $150/set on a site like massdrop.
~~~
xenomachina
I wonder how much it would cost to get custom keycaps made today with double-
shot top and front legends.
~~~
pault
Ask signature plastics!
[http://www.solutionsinplastic.com/](http://www.solutionsinplastic.com/)
~~~
xenomachina
It just occurred to me that using the Commodore logo probably adds to the
cost, as you'd have to license it from the company that owns the trademark.
(The C64 Mini avoids using the logo, presumably for this reason.)
~~~
pault
There's a set called SA Retro[1] that used the C64 logo; no idea if it was
cleared or not.
[1]: [https://www.geekzone.fr/wp-content/uploads/2015/09/Minila-
Ai...](https://www.geekzone.fr/wp-content/uploads/2015/09/Minila-Air-SA-
Retro-1.jpg)
| {
"pile_set_name": "HackerNews"
} |
Show HN: My Android App - Quotes - europa
https://play.google.com/store/apps/details?id=com.quotes.app
======
zethus
You should consider grabbing the 4.0 UI Kit
| {
"pile_set_name": "HackerNews"
} |
A programmable controller for connected devices (YC S13) - twald
https://medium.com/@senic/developing-for-the-nuimo-controller-7292becfacff
======
gyuriy
Wonderful!
| {
"pile_set_name": "HackerNews"
} |
Samsung Announces TecTiles, Brings Programmable NFC Tags to the Masses - kul
http://www.droid-life.com/2012/06/12/samsung-announces-tectiles-brings-programmable-nfc-tags-to-the-masses/
======
sturmeh
... or you could get them here: <http://www.tagstand.com/> for a third of the
price and use an app that ties in with the existing profile infrastructure
like tasker.
~~~
kul
thanks. kul from Tagstand here. Submitted this to see what HN had to say.
We've been working on NFC Task Launcher
([https://play.google.com/store/apps/details?id=com.jwsoft.nfc...](https://play.google.com/store/apps/details?id=com.jwsoft.nfcactionlauncher))
for a while now, which is similar to this Samsung app.
~~~
ben1040
This tool is great. I have an NFC sticker on my nightstand lamp now so when I
trigger it, my ringer/notification volume goes to zero, alarm volume goes way
up, and I set an alarm to wake up the following morning.
I used to be really sloppy at muting the phone at night and this cures that.
My wife is a light sleeper and I can now make sure I am not waking her up at
stupid o'clock in the morning when I get an email overnight.
I bought a bunch more tags from Tagstand and I am looking forward to finding
more stuff to do with them.
------
51Cards
Simple use... two of these by the door would make my life easier.
Going out: turn off WiFi, turn on GPS, Bluetooth, turn up the ringer volume
and screen brightness, etc.
Coming in: do the reverse.
Of course I can make it even easier with On{X} and trigger the same on
detection of my home WiFi network (other than turning off WiFi of course)
~~~
gojomo
When you lose the home Wifi signal, do the 'going out' actions (including turn
off Wifi). When GPS tells you you're back home, do the 'coming in' actions
(including Wifi back on). Seems even smoother than NFC touchpoints.
~~~
__alexs
That requires running GPS a lot. Better to just look for certain sets of cell
towers. Llama does this on Android already.
~~~
coob
iOS does this with Location reminders. Not editing system settings, but you
can geofence like this.
------
zheng
Its things like this that will hopefully continue the push of automation in
general society. We as hackers have long seen the power in automation, but the
general public sees a computer as something that is powerful, but adds
complexity to their life. Apple does a great job at fighting this image that
technology == complexity, and that's part of why they are successful, IMHO. I
just can't wait until the real wave of automation hits the general market with
force.
------
roel_v
Are these things rfid under another name? If so, what rfid tech do they use? I
have an rfid tag implanted in my hand that I'd love to find a use for in this
context :)
~~~
a-stjohn
As I understand it, NFC is similar to RFID, but RFID provides one-way
communication, while NFC provides two-way communication. Someone please
correct me if I'm wrong.
------
vannevar
How is this different from handing your unlocked phone to a stranger and
telling them to have at it?
------
miahi
The price ($3 each) is huge. Passive RFID tags usually cost less than $0.15.
------
stevejabs
Doesn't ICS out-of-the-box support the majority of what this app is trying to
accomplish?
~~~
omarseyal
Yeah, you could say that. Lots of the features are simply writing uris that
trigger intents. That said, they're selling passive tags for $3 each. The user
who buys that is likely not going to know how that placing a uri on a tag is
easy and free...
| {
"pile_set_name": "HackerNews"
} |
PSA: InSight Mars probe is landing in about 8 hours - huhtenberg
https://mars.nasa.gov/insight/
======
huhtenberg
InSight mission homepage -
[https://mars.nasa.gov/insight/](https://mars.nasa.gov/insight/)
Wikipedia page -
[https://en.wikipedia.org/wiki/InSight](https://en.wikipedia.org/wiki/InSight)
Mission Control live stream -
[https://www.youtube.com/watch?v=bGD_YF64Nwk](https://www.youtube.com/watch?v=bGD_YF64Nwk)
(in ~7 hours from now)
| {
"pile_set_name": "HackerNews"
} |
Hikikomori - networked
https://en.m.wikipedia.org/wiki/Hikikomori
======
jawerty
Anyone interested in this phenomenon should check out the anime "Welcome to
the NHK."
| {
"pile_set_name": "HackerNews"
} |
Ask HN: Best find-a-cofounder sites? - fjabre
Any consensus on the best sites to find technical cofounders?<p>I've looked around a bit and most of these sites seem very young and/or don't have a lot of a traffic..<p>Any suggestions?
======
nickfromseattle
HN Cofounder Wishlist -
[https://spreadsheets.google.com/ccc?key=0AgCvDTyBjHdOdDFfMEN...](https://spreadsheets.google.com/ccc?key=0AgCvDTyBjHdOdDFfMENqeWVGNVFxTXdnaDZBRkd0cUE&hl=en#gid=9)
reddit.com/r/cityname
------
smiler
Post a comment on this post with a rough idea (and preferred technology) and
contact info. If anyone is interested they'll e-mail you.
------
geekytenny
github.com ....and you get to see what they have been up to!
| {
"pile_set_name": "HackerNews"
} |
Backdoor SOPA -- CISPA - K_O_G_I
http://act.demandprogress.org/letter/cispa/?akid=1306.1076593.HixRPH&rd=1&t=2
======
kylemaxwell
Totally false. There are no blocking provisions __whatsoever __in CISPA, no
one has any right to the information from ISPs or any other provider or
organization, and it does not supercede other provisions. ("The phrase
"notwithstanding..." is boilerplate language that is not interpreted by the
courts the way a layman might.)
| {
"pile_set_name": "HackerNews"
} |
Codota AI Pair Programmer - whadar
https://www.codota.com/
======
addcn
What are people's impression of these kinds of tools?
| {
"pile_set_name": "HackerNews"
} |
The creator of CoffeeScript actually merged my pull request to fix coffee steam - elwell
https://github.com/jashkenas/coffee-script/pull/3193
======
elwell
day was made.
| {
"pile_set_name": "HackerNews"
} |
The NSA named one of its top-secret programs Skynet - milesf
https://www.theverge.com/2015/5/9/8577515/nsa-skynet-program-is-real
======
tux
"Google: Rise of the Machines" @
[https://www.youtube.com/watch?v=f1QB9DW_0kM](https://www.youtube.com/watch?v=f1QB9DW_0kM)
| {
"pile_set_name": "HackerNews"
} |
NAT Tunneling Without a Third-Party - devbug
http://samy.pl/pwnat/
======
Gys
Earlier (6 years ago!) discussion:
[https://news.ycombinator.com/item?id=1224905](https://news.ycombinator.com/item?id=1224905)
| {
"pile_set_name": "HackerNews"
} |
NSA mathematician shares from-the-trenches view of agency's activities. - ohjeez
http://www.zdnet.com/nsa-cryptanalyst-we-too-are-americans-7000020689/?utm_source=buffer&utm_medium=twitter&utm_campaign=Buffer
======
bediger4000
In case "devx's" succint comment isn't clear...
That NSA mathematician writes: _Do I, as an American, have any concerns about
whether the NSA is illegally or surreptitiously targeting or tracking the
communications of other Americans?_
How would you know? Based on everything that your organization has
declassified and released, the NSA keeps its knowledge compartmentalized.
Maybe what you say is true for your compartment, but not for any other. You're
also not supposed to even ask about other mathematician's compartments, right?
Again, how would you know?
Also, Mr Mathematician, you've got a legal obligation, complete with
penalties, to not give out any information. You're legally obligated to lie,
according to Clapper. Why should we believe you?
------
devx
Bullshit. Everything he said.
| {
"pile_set_name": "HackerNews"
} |
Donnfelker/android-bootstrap · GitHub - Kittynana
https://github.com/donnfelker/android-bootstrap
======
Kittynana
This basically wraps a bunch of useful libraries for android.
| {
"pile_set_name": "HackerNews"
} |
Ask HN/PG: Leaderboard acting strange? - johns
This morning I was about 100 short of the leaderboard and made two submissions that got me about 60 points. A minute ago I was 95th and the 100th spot was at 3900 but now I'm 98th with the last spot at 4072. Any idea what's up with the fluctuating numbers?
======
pg
I just restarted the server. Users are lazily loaded, so the leaderboard will
look odd for a brief period after a restart.
~~~
ivankirigin
The 'submitted' link on the profile basically doesn't work
<http://news.ycombinator.com/submitted?id=pg>
<http://news.ycombinator.com/submitted?id=ivankirigin>
I suppose it is related to the lazy loading?
~~~
pg
Yes, items are lazily loaded too. Responses to http requests get killed after
30 sec, so if the server has to load too much stuff to satisfy a request, it
will die first.
It's always been this way. After the server has been running for a bit it
stops being a problem.
~~~
ivankirigin
Perhaps you should hide features that are likely going to be unavailable if
the server recently restarted.
No need to send users down a rabbit hole, and certainly no need to waste the
cycles on your machine.
~~~
icey
Or limit it to far fewer results. I click the submissions link pretty
frequently from my own profile as an easy way to check up on conversations on
threads I've started. Now I feel kind of bad for doing it that way.
------
lincolnq
I'd be interested to see what fraction of the leaderboard users' karma comes
from comments vs. stories.
------
bdfh42
And you care bacause?
~~~
johns
Pure curiosity of how it works. That's all. I don't really care either way
where I rank.
~~~
bdfh42
I believe you...
| {
"pile_set_name": "HackerNews"
} |
Worst practices in ad design on iOS - xonder
http://www.pocketnext.com/stories/the-hard-sell/?utm_campaign=jason&utm_medium=twitter&utm_source=twitter
======
elicymet
I agree with near everything in the article, but think even interstitial ads
prove disruptive in a way that I can't get behind. I don't begrudge a game
provider for the use of ads, but think that unobtrusive banner space to be the
most acceptable. Oddly I feel like it goes a long way when ad providers use
language like "thank our sponsors" and have some self-awareness; it's easy to
tell when they've been suckered in by an ad provider to use all their most
annoying API's. Integration of ads that reward you for either clicking or
looking at them are also an interesting idea.
| {
"pile_set_name": "HackerNews"
} |
Create a minimal Wiki in Python+Django in 15 minutes (screencast) - danielha
http://www.silverstripesoftware.com/blog/archives/27
======
danielha
This supplements lucks' submission on creating a Wiki with Python+TurboGears
(http://news.ycombinator.com/comments?id=1981)
| {
"pile_set_name": "HackerNews"
} |
Show HN: Quickly enable popups that support any HTML - madprops
https://madprops.github.io/Msg/
======
davchana
Nice one. Starred :)
Also opened two issues..
| {
"pile_set_name": "HackerNews"
} |
DadHacker » Blog Archive » Dead Newt - marcus
http://www.dadhacker.com/blog/?p=1120
======
plaes
Ha.. another trick to try out...
| {
"pile_set_name": "HackerNews"
} |
Building a visual language for the 99% - apz
http://occupydesign.org/
======
rick888
Otherwise known as propaganda.
| {
"pile_set_name": "HackerNews"
} |
Microsoft Azure IoT Hub - dstaheli
https://azure.microsoft.com/en-us/services/iot-hub/
======
nielsbot
I totally read this as "Azure Hot Tub"
| {
"pile_set_name": "HackerNews"
} |
Taking PHP Seriously - throwaway-hn123
https://slack.engineering/taking-php-seriously-cf7a60065329#.28p8bbfkj
======
samuellb
Duplicate of
[https://news.ycombinator.com/item?id=12702845](https://news.ycombinator.com/item?id=12702845)
| {
"pile_set_name": "HackerNews"
} |
Collection Pipeline - chillax
http://martinfowler.com/articles/collection-pipeline/
======
rikkus
Half my code looks like this, these days:
return products
.Where(p => p.Type == ProductType.Bean)
.OrderBy(p => p.Group)
.ThenBy(p => p.Name)
.Select(p => p.Name)
;
Sometimes I'll write it like this:
return from p in Products
where p.ProductType == ProductType.Bean
orderby ... etc.
Everything's a query, or a sh pipeline, or...
One of the nice things about this idiom is that it's supported all over the
place, so you can write similar code in many different languages, for many
different platforms.
~~~
balakk
Here's where F# shines - you could write your query like:
products |> Seq.filter(fun a -> a.Type = ProductType.Bean) |> Seq.sortBy(fun a
-> a.Group, a.Name) |> Seq.map(fun a -> a.Name)
It doesn't save a lot of lines here, but the big difference is this: suddenly
you aren't constrained by the syntax of the single Linq query. So you want an
additional filter,join,merge happening in between? No problem!
~~~
virtualwhys
Pretty noisy.
Instead of:
products |> Seq.filter(fun a -> a.foo =...)
In another language you can do:
products.filter(_.foo =...)
Those `|> Seq...(fun a ->` all over the place look Java-ish ;-)
~~~
CmonDev
They had to deal with the OCAML baggage instead of starting from scratch.
------
CoffeeDregs
I've generally appreciated Fowler's work on cataloging software patterns (and
based my MBA thesis on doing something similar for organizational design), but
I find this post a bit puzzling. Having spent a bunch of time with Haskell 6-7
years ago, the treatment of functions such as these was much more rigorous and
generalized (e.g.
[http://en.wikibooks.org/wiki/Haskell/The_Functor_class](http://en.wikibooks.org/wiki/Haskell/The_Functor_class)).
However the items this time are generic collection types
themselves - where an OO collection pipeline would use objects,
a functional language would use a hashmap.
Again, I'm a bit confused (though I might have missed some context).
Functional languages tend to be much more generic so that a "collection
pipeline" or map can operate over a wide range of types.
I'm reasonably certain that I'm missing some critical point, but I'm not sure
about what?
~~~
sparkie
> cataloging software patterns
Otherwise known as inventing new terms for old concepts. Please stop doing
this Mr Fowler! The programmer's glossary is already full of redundancy. Just
stick to the language everyone else is using (ie, the language that was used
by whoever wrote the original research papers in the given topics)
~~~
Dewie
But, we need to rename things like Functor to Mappable and Monad to Bindable
because everything has to be a vaguely relatable (even if possibly misleading)
adjective, damnit.
------
jgrodziski
I would have liked to have seen Martin Fowler mentioned the parallelism and
state implication of the unix pipeline, somewhat limited (see
[http://www.quora.com/Parallel-Computing/Do-pipelined-unix-
co...](http://www.quora.com/Parallel-Computing/Do-pipelined-unix-commands-run-
faster-on-multicore)) but this is for me a very profond way of looking at this
kind of pattern: whether you finish completely your processing on the data
structure or you emit the result downstream as soon as you have finished
processing one element.
Stream is for me the fundamental nature of the unix pipeline, and this is
rarely met in programming language (channels to the rescue like in Clojure and
Go). The Java Streams seems to work this way with the distinction between
stateless and stateful processing element
([http://docs.oracle.com/javase/8/docs/api/java/util/stream/pa...](http://docs.oracle.com/javase/8/docs/api/java/util/stream/package-
summary.html)).
------
platz
Not really a mention of whether these 'chained' methods should be returning a
new collection, mutating an existing collection, or returning something
completely different.
Would expect to at least see some kind of discussion on this here - otherwise
_every_ method call is a "pipeline"
~~~
munificent
From the article:
> ...returns a collection of only those articles for which the lambda resolves
> as true.
> Like select it returns a new collection so I can continue the pipeline...
> ...return a collection of records.
> Each operation takes a collection as an input and emits another collection
> (expect the last operation, which may be a terminal that emits a single
> value).
| {
"pile_set_name": "HackerNews"
} |
65 Accomplished Writers and Marketers Reveal Their Secrets to Productivity - stickhandle
http://www.focusalot.com/blog/accomplished-writers/
======
robertaoliu
thanks for posting our article =D - rob from focusalot
| {
"pile_set_name": "HackerNews"
} |
How can a robot express emotion without a face? - hhm
http://www.robotworldnews.com/100390.php
======
naish
R2-D2
| {
"pile_set_name": "HackerNews"
} |
How to create a natural baseline in CSS - joecritch
http://joecritchley.svbtle.com/bring-back-the-baseline
======
dancecodes
very cool,
thanks!
| {
"pile_set_name": "HackerNews"
} |
My First Facebook App - I Want One - djworth
http://www.facebook.com/apps/application.php?id=2389878632
This app provides you and your friends the ability to vote on different Amazon.com products. You can add products via an Amazon Search or an Amazon Wish List.<p>Please feel free to check out the app and provide feedback.<p>Thanks!
======
djworth
I entered the text below into the text field on the submission form but I
guess that only works for posts where the link is blank.
This app provides you and your friends the ability to vote on different
Amazon.com products. You can add products via an Amazon Search or an Amazon
Wish List.
Please feel free to check out the app and provide feedback.
Thanks!
| {
"pile_set_name": "HackerNews"
} |
Programmer's Calculator - gregorymichael
https://www.embeddedrelated.com/showarticle/1061.php
======
kazinator
POSIX syntax, entered into BusyBox shell (not even Bash or anything), running
__on__ an ARM embedded system:
# echo $(( (0x0110 << 14) & 0xDEADBEEF ))
262144
# printf "%x\n" 262144
40000
Now let's make a calculator REPL out of these:
# while read expression ; do eval "result=\$(( $expression ))"; printf "dec = %d, hex = %x\n" $result $result ; done
2 + 2
dec = 4, hex = 4
a=3
dec = 3, hex = 3
b=4
dec = 4, hex = 4
a + b
dec = 7, hex = 7
(a + b) << 3
dec = 56, hex = 38
[Ctrl-D][Enter]
#
| {
"pile_set_name": "HackerNews"
} |
Masscan: Scan the entire Internet in under 5 minutes - pmoriarty
https://github.com/robertdavidgraham/masscan
======
yzzxy
There's a great talk from Defcon 22 on using Massscan for security research:
[https://www.youtube.com/watch?v=UOWexFaRylM](https://www.youtube.com/watch?v=UOWexFaRylM)
------
ianremsen
Note: your ISP and third-parties probably won't like this very much.
------
NelsonMinar
This is a hell of a piece of engineering. Really fun to read the README, a
custom TCP/IP stack is genius.
~~~
Zaheer
Indeed. I was quite impressed by his solution for randomly iterating through
the IP space. I've had use cases before for randomly iterating through a space
while ensuring to hit every space and they've never been quite as efficient in
space/time complexity as his.
[[https://github.com/robertdavidgraham/masscan#randomization](https://github.com/robertdavidgraham/masscan#randomization)]
~~~
chii
can you elaborate on what/how one would randomly iterate a space? i imagine
it's like trying to draw a space filling curve on the place (for spaces with 2
components, such as a coordinate)
~~~
Zaheer
My terminology was off, I more-so meant range rather than space.
------
sirwolfgang
Title should be updated to include that this system scans only via IPv4. Doing
such a thing with IPv6 would be a little more surprising. (7.9228163e+28 times
more difficult)
~~~
dsl
There is a false assumption that IPv6 will make mass scanning like this
impossible. In reality you just need to be more clever about it. (Remember way
back when people used "needle in a haystack" security for dial-up systems,
because nobody would ever have the resources to call every phone number in an
area code?)
Link-local multicast (the replacement for ARP) allows tools like alive6 to
very easily enumerate all live v6 addresses on a network. So once a spear
phishing attack is sucessful, you can still scan the entire internal network.
Google hacks like "site:ipv6.*" and passive DNS monitoring allow you to easily
separate used vs allocated/announced subnets on remote networks. IPv6 breaks
in strange ways when you firewall ICMPv6, so ping scanning a subnet has become
much easier.
There was also a great talk (i'll try to dig it up) that talked about
predictable patterns in DHCPv6 implementations, so you can cut down v6 to a
near v4 search space.
The best part of all is that very few security products on the market really
support IPv6 correctly, so I suspect we will see more advanced attacks being
possible because of IPv6 in the coming years than things being stopped.
~~~
pixl97
>There is a false assumption that IPv6 will make mass scanning like this
impossible.
Well, this is an IPv4 brute force search, so technically a IPv6 brute force
search is still impossible.
You are correct though, no one is going scan something that is 99% empty by
brute force.
------
twolfson
"It's the program that scanned the Internet in less than twelve parsecs."
~~~
colinbartlett
From the README:
"Note that it'll only melt your own network. It randomizes the target IP
addresses so that it shouldn't overwhelm any distant network."
------
jwcrux
Here's [1] an example of using Masscan to scan the IPv4 space for shellshock.
[1] [http://blog.erratasec.com/2014/09/bash-shellshock-scan-of-
in...](http://blog.erratasec.com/2014/09/bash-shellshock-scan-of-
internet.html)
------
gear54rus
I might have missed it while reading the README, but can someone ELI5 why do
we need to randomize our scans?
Can't we just go scan one-after-another IP address? Is this because such scan
can easily be detected by ISP?
~~~
anti-thought
Think of the internet like a tree, where the root is you and all other IPs are
the leaves at the end. IPs close together tend to share more path of the tree
as you attempt to reach them from the root. If you are sending an overwhelming
amount of packets in one direction for too long, you have a higher chance of
harming nodes (i.e. routers) along that path. Randomizing your end goal on the
tree, by definition, equally spreads the packet spray accross the tree.
This is how they can claim: "... it'll only melt your own network. It
randomizes the target IP addresses so that it shouldn't overwhelm any distant
network."
Note "shouldn't", this was probably added due, in part, through use-case. If I
were not scanning the whole Internet, and instead just scan a small section.
Masscan has less of a space to randomize through, which means the tree is
smaller and the shared paths are more frequent.
------
pvnick
How likely is this to be used for anti-piracy efforts? I don't hear much about
en masse copyright enforcement these days, but it seems like the ability to
quickly scan large IP ranges would allow one to periodically (every couple
minutes or so) obtain a list of every single seeded file in the US, at least
for the people not using a VPN.
~~~
Scaevolus
That's not how torrents work. You can't connect to a port on a seeder and get
a list of torrents it's seeding. Even for trackers, you have to request a
specific URL to get a (partial) list of available seeders.
~~~
sanxiyn
On the other hand, it is easy to crawl DHT. "Crawling BitTorrent DHTs for Fun
and Profit" (2010) says "We find that we can establish a search engine with
over one million torrents in under two hours using a single desktop PC".
------
pvaldes
Sorry if I seem naive but, is this even legal? ...
~~~
gcommer
I am not a lawyer, but as long as your local laws do not prohibit you from
pinging a given IPv4 address, then I can't imagine any issues. Being
technically legal doens't mean you won't step on some toes though. Everyone
who runs full internet scans has reported getting lots of exclusion requests,
(baseless) legal threats, and even retaliatory DDoS attacks coming back at
their source IPs.
Massscan ships with an exclude list which you would do well to utilize:
[https://github.com/robertdavidgraham/masscan/blob/master/dat...](https://github.com/robertdavidgraham/masscan/blob/master/data/exclude.conf)
If you try to run an internet wide massscan without this list, it will stop
you and give you a warning about how to use the list. You then either manually
override the warning, or use the list.
~~~
ahelwer
Some interesting emails are transcribed in the comments of that exclusion
list. I liked the one from General Dynamics.
------
curiously
what are ip port scanners commonly used for?
------
sigmonsays
great.. now everyone can easily find out if my ssh port is open...
~~~
hobs
Everyone already does, and is trying to login right now. Check your logs.
------
cmdrfred
Intresting...
| {
"pile_set_name": "HackerNews"
} |
US pushing local cops to stay mum on surveillance - ser_ocelot
http://hosted.ap.org/dynamic/stories/U/US_CENSORING_SURVEILLANCE?SITE=AP&SECTION=HOME&TEMPLATE=DEFAULT&CTIME=2014-06-12-14-47-09
======
bediger4000
Does anybody else get the feeling that there's still quite a bit left of the
warrantless, dragnet surveillance rabbit hole?
I keep wondering when the next really big thing will drop - like evidence of
industrial espionage by the NSA on behalf of some specific company, or a list
of targeted organizations that includes things like the Red Cross, or IEEE.
| {
"pile_set_name": "HackerNews"
} |
Pioneer spacecrafts' anomalous acceleration solved - cpeterso
http://www.planetary.org/blogs/bruce-betts/3459.html
======
ColinWright
Submitted a few days ago with a small amount of discussion and context:
<http://news.ycombinator.com/item?id=3865881>
The story has been discussed many times:
[http://www.hnsearch.com/search#request/all&q=title%3Apio...](http://www.hnsearch.com/search#request/all&q=title%3Apioneer+anomaly&sortby=create_ts+desc&start=0)
| {
"pile_set_name": "HackerNews"
} |
The five “Next Big Things” in open source - SD Times: Software Development News - hendler
http://www.sdtimes.com/content/article.aspx?ArticleID=35058&print=true
======
zhiel
I'm so appalled by the design of this site that I'm not going to read this,
although the topic is interesting...
| {
"pile_set_name": "HackerNews"
} |
Europe heatwave: record high of 45C (113F) expected in France - ForHackernews
https://www.theguardian.com/world/2019/jun/25/highs-of-45c-expected-in-france-as-heatwave-scorches-europe
======
pier25
This is the video that opened my eyes on climate change 7 years ago:
[https://www.youtube.com/watch?v=pznsPkJy2x8](https://www.youtube.com/watch?v=pznsPkJy2x8)
It's amazing to think that humanity is still mostly clueless about what is
going to happen.
------
dv_dt
Ironic given the EU has just missed passing a zero carbon 2050 pledge.
[https://www.theguardian.com/environment/2019/jun/20/eu-
leade...](https://www.theguardian.com/environment/2019/jun/20/eu-leaders-to-
spar-over-zero-carbon-pledge-for-2050)
~~~
chewz
Well in Central Europe climate is getting pleasantly mediterranian. People
spend hollidays in the country instead of going to Spain. Agriculture is
booming.
I do not miss cold rainy summers of my youth.
~~~
ForHackernews
Will you miss not having your country swamped with hundreds of thousands of
climate refugees? Because they're coming.
------
billconan
this terrifies me
| {
"pile_set_name": "HackerNews"
} |
Discussing Tradeoffs of TLS 1.3 (via Colm MacCárthaigh on Twitter) - evv
https://threadreaderapp.com/thread/978430840198742016.html
======
evv
Prior discussion here:
[https://news.ycombinator.com/item?id=16666057](https://news.ycombinator.com/item?id=16666057)
What a contentious issue! I'm curious to see who will end up swallowing the
cost of this, because it sounds like 0-rtt poses a direct tradeoff between the
expense of application developers and leaf nodes like CloudFlare.
| {
"pile_set_name": "HackerNews"
} |
Show HN: Recommendo – Get personalized recommendations from the people you trust - BenJammin81
https://itunes.apple.com/de/app/recommendo/id932405753?mt=8
======
BenJammin81
Free mobile recommendation app turning your friends into your remote eyes and
ears on the hunt for great brands, products and events.
| {
"pile_set_name": "HackerNews"
} |
Promiscuous Cookies and Their Impending Death via the SameSite Policy - kkm
https://www.troyhunt.com/promiscuous-cookies-and-their-impending-death-via-the-samesite-policy/
======
AndrewDucker
Firefox is planning likewise:
[https://bugzilla.mozilla.org/show_bug.cgi?id=1604212](https://bugzilla.mozilla.org/show_bug.cgi?id=1604212)
| {
"pile_set_name": "HackerNews"
} |
High Energy Electron Confinement in a Magnetic Cusp Configuration - kristianp
http://arxiv.org/abs/1406.0133
======
kristianp
Discussion on talk-polywell.org here: [http://talk-
polywell.org/bb/viewtopic.php?f=10&t=5425](http://talk-
polywell.org/bb/viewtopic.php?f=10&t=5425)
| {
"pile_set_name": "HackerNews"
} |
Coding for Entrepreneurs – Learn to Code and Build Real Projects Step by Step - Osiris30
https://www.codingforentrepreneurs.com/
======
eble
Thanks for practical youtube videos
| {
"pile_set_name": "HackerNews"
} |
I Put In 5 Miles at the Office: Walking Workstations - robg
http://www.nytimes.com/2008/09/18/health/nutrition/18fitness.html?ref=fashion
======
michael_dorfman
Has anyone here actually tried this? It sounds interesting, but I'd sure like
to suss it out further before making the investment...
| {
"pile_set_name": "HackerNews"
} |
Urban heat island - onetimemanytime
https://en.wikipedia.org/wiki/Urban_heat_island
======
gavia1
London is regularly 3-4° warmer than the towns and village that border the M25
ring road. You can genuinely feel the difference when you take a train into
the city and vice versa.
~~~
quickthrower2
Is that allowing for the time difference between when you get on and get off
the train affecting the temperature?
~~~
gavia1
Absolutely. If you so wish you can take the train at noon and get off at 12:30
where any temperature difference due to the sun should be minimal.
~~~
majewsky
Not terribly relevant to your point, but: Noon is actually a time in the day
where it is still getting warmer. Temperature usually peaks around 16:00 or
17:00 in the summer.
Example:
[http://wetterstationen.meteomedia.de/?station=104870&wahl=vo...](http://wetterstationen.meteomedia.de/?station=104870&wahl=vorhersage)
(the forecast diagram for my local weather station)
~~~
onetimemanytime
any idea why? The ground starts releasing accumulated energy or what?
~~~
gavia1
It probably reaches saturation at that time of day where it can no longer
absorb anymore heat.
------
Uhhrrr
From the article: 'If the urban heat island theory is correct then instruments
should have recorded a bigger temperature rise for calm nights than for windy
ones, because wind blows excess heat away from cities and away from the
measuring instruments. There was no difference between the calm and windy
nights, and one study said that "we show that, globally, temperatures over
land have risen as much on windy nights as on calm nights, indicating that the
observed overall warming is not a consequence of urban development."'
This is really surprising to me. Not least because, on a sunny day, SF can go
from pleasant to brutal as soon as a breeze kicks up.
------
Albertchrist
Not only in US. This is applicable to all the major cities in the world.
------
ccheath
isn't this also (at least partly) why cities are less likely to be affected by
tornadoes?
~~~
eesmith
Quoting the link:
> Research has been done in a few areas suggesting that metropolitan areas are
> less susceptible to weak tornadoes due to the turbulent mixing caused by the
> warmth of the urban heat island.
------
haunter
So every big city pretty much
------
quickthrower2
Sydney is one of those.
~~~
H8crilA
Aren't all cities one of those? Bigger=bigger impact.
~~~
quickthrower2
I think it has quite an effect in the summer because the city is cooled by
being near the ocean but the western suburbs get super hot, so a 10 degree
difference might not be unusual at times, for two places about 30km away.
| {
"pile_set_name": "HackerNews"
} |
Random street view - kirchhoff
http://www.mapcrunch.com
======
Muzza
Very cool.
| {
"pile_set_name": "HackerNews"
} |
Writing Your Last For-Loop - Beautiful Code - nickb
http://beautifulcode.oreillynet.com/2007/10/writing_your_last_forloop.php
======
cperciva
Before criticizing a language, understand it. In this case, the author can't
even write a for loop correctly:
for(int n = 0; n < size; ++n)
sum += elements [n];
Leaving aside the stylistic question of declaring variables in the middle of a
for statement, and trusting that the author knows that the variable _sum_ will
never overflow and (if he's dealing with floating-point values) that rounding
errors won't matter, the code should still be
for(size_t n = 0; n < size; ++n)
sum += elements [n];
An index to an array should always be declared as _size_t_ , not as _int_.
Otherwise really bad things can happen on systems where size_t is 64 bits but
int is 32 bits.
EDIT: Before someone accuses me of being overly pedantic: I've lost count of
how many security issues I've fixed which have existed because someone used
_int_ where they meant _size_t_ , but it's at least in the double-digits.
~~~
dfranke
Pedantically you're correct, but on what archictecture/compiler is (sizeof
int) != (sizeof size_t), and in what circumstances have you seen this become a
vulnerability? (I'm not trying to be argumentative here; I'm legitimately
curious.)
~~~
brl
I was going to argue against this too because using integers to index loops is
such a huge convention in C and then I realized that he's absolutely right.
On LP64, integers are 32 bits and size_t must be 64 bits (or you could
overflow it with otherwise legal code).
Even when integer and size_t are the same size, using an integer as an array
index is dangerous unless you make sure that it is not negative and can never
become negative.
Here's what easily exploitable code looks like:
void pad_ten(char *array, size_t length) {
if(length < 10) {
error();
return;
}
for(int i = (length - 10); i < length; i++) {
array[i] = doPadding();
}
}
It's exploitable by either choosing a 'length' which becomes negative when
assigned to the integer or choosing a 64 bit 'length' which becomes an
entirely different (and incorrect) value when truncated to an integer.
------
edw519
Sorry, but I have the same reaction to any "programming language" argument, no
matter how eloquent: so what?
90% of your code should either be generated or copied from standard templates.
I've put over 2500 new programs into the library in the past couple of years,
yet I don't remember the last time I wrote a program from scratch.
I, too, am a stickler for details, but I let the compiler (or interpreter) do
its job. Why worry about nanoseconds when I have users running the asylum?
~~~
damon
I would argue a language that is eloquent, concise, and for lack of a fancier
word, pretty, is important. Language features change how you view and approach
a problem. I approach problems much differently in scheme given I have a macro
system than I would in C. I _think_ differently depending on the language.
And it's usually not about performance for me. I like code that looks good and
is dense.
| {
"pile_set_name": "HackerNews"
} |
iTunes Store Japan labels all purchases as Title “” by Artist “null” - kalleboo
https://twitter.com/search?q=itunes%20null&src=typd
======
kalleboo
Anyone who let through a massive Unicode bug into production, you can feel
_slightly_ better now that the world's biggest music retailer broke sales in
their second biggest market...
| {
"pile_set_name": "HackerNews"
} |
Confirmed: Amazon RDS Mysql is not vulnerable to the Password Exploit - mark_ellul
https://forums.aws.amazon.com/thread.jspa?messageID=353148
======
mark_ellul
Sorry my last post had a funky char after the URL
| {
"pile_set_name": "HackerNews"
} |
The Top 5 Crashes on iOS - andrewmlevy
https://www.apteligent.com/developer-resources/top-5-most-frequent-crashes-on-ios/?partner_code=GDC_hn_top5ios
======
makecheck
The first example’s remedy seems to be wrong.
I am not aware of any reason to test for "nil" in Objective-C, as that remedy
suggests. Sending the "doSomething" message to "nil" should do nothing.
If SIGSEGV does occur for an object, it is probably for the exact opposite
reason: you have a pointer that is NOT "nil" but it refers to something that
has been freed. (Or, the SIGSEGV is not related to objects at all, and is
caused by some other access such as plain C code.)
| {
"pile_set_name": "HackerNews"
} |
Alfa Data – Analytics Ruins Football - tropianhs
http://www.alfadata.xyz
======
tropianhs
A Football (Soccer) Analytics Portal made in Flask
| {
"pile_set_name": "HackerNews"
} |
The biggest leak of TTIP documents yet: more than 100 confidential papers - rendx
https://www.reddit.com/r/europe/comments/3d0ftu/this_is_the_biggest_leak_of_ttip_documents_yet/
======
AndrewGaspar
Proposal to make it easier for US professionals to work in the EU and vice-
versa:
[https://www.documentcloud.org/documents/2162296-14-10-07-eu-...](https://www.documentcloud.org/documents/2162296-14-10-07-eu-
kom-themenpapier-mobilitat-geschwarzt.html)
------
ExpiredLink
Don't know what "confidential papers" means but TTIP documents are published
regularly (e.g.
[http://trade.ec.europa.eu/doclib/press/index.cfm?id=1230](http://trade.ec.europa.eu/doclib/press/index.cfm?id=1230)
) but seemingly not many people are interested in them.
~~~
swombat
From this page:
> The European Commission is negotiating TTIP as openly as possible.
> A final agreement would have 24 chapters, grouped together in 3 parts:
> \- Market access
> \- Regulatory cooperation
> \- Rules
> And as part of our latest transparency initiative, we're publishing:
> \- new 2-page factsheets, in plain language
> \- negotiating texts we've given US negotiators:
> \- - EU textual proposals on parts 2 and 3 of the TTIP – these set out how
> we'd want a final deal to read, line by line
> \- - EU position papers – what we want to achieve in a chapter.
> We will publish further texts as they become available.
> We will make the whole text of the agreement public once negotiations have
> been concluded – well in advance of its signature and ratification.
Sure seems like they're trying to open this up... wonder what the leak is
about then?
~~~
M2Ys4U
Saying that they're trying to open this up is like saying a fat person is on a
diet because they've switched from regular cola to diet cola.
It doesn't make a dent unless they also exercise more and eat less.
------
tomohawk
It is so ridiculous that we allow these people to play masters of the
universe, with little or no accountability or transparency.
We shouldn't settle for scraps.
~~~
andybak
My off-the-cuff reaction is the same as yours but look what happens to
institutions where all negotiation is public: posturing, media tyranny,
corridor diplomacy and a huge gap between public position and any real
opinion.
Transparency has a cost also.
------
stsp
Direct links to documents:
[http://pastebin.com/fA7z2BPi](http://pastebin.com/fA7z2BPi)
(pastebin since HN wouldn't let me post the full link list as a comment)
~~~
13throwaway
Download them all with wget:
wget -O -
"[http://pastebin.com/raw.php?i=fA7z2BPi"](http://pastebin.com/raw.php?i=fA7z2BPi")
| wge -i -
------
dhimes
TTIP: Transatlantic Trade and Investment Partnership- a secret deal between US
and EU
~~~
sandstrom
It's correct that much of the details are secret, but I'd stay it's still more
correct to label it as a free-trade agreement than a 'secret deal'.
I think it's insane that negotiations aren't public, and I also disagree with
some of the contents being discussed. But I think it's more objectively
described as a free-trade agreement (in which there are also a lot of good
parts).
~~~
dhimes
That's a fair point, but since we are all pissed off at our governments for
taking liberties with our well-intentioned permission to conduct espionage on
behalf of our well-being, your are extending more benefit-of-the-doubt than a
lot of us are. That's probably to your credit. But I am wary that the 'secret'
stuff has a lot of implications that are only on the edge of what we would
think of as trade agreement- intel sharing and such.
It _could_ , I suppose, be a positive: everybody come clean about the
past(keep that stuff a secret) and then have fair and reasonable limitations
going forward. There was a day when I thought like that... :)
------
Dwolb
Does anyone know credentials of the people negotiating these deals? Are they
well-paid?
If these deals' negotiations have to be secret and since so much is at stake,
I'd hope my government would have the best negotiators, psychologists,
economists, spies, or other personnel that money can buy.
~~~
swombat
Based on ExpiredLink's comment elsewhere in this thread, it doesn't seem like
the deal is secret at all? Here's the EU page on it:
[http://trade.ec.europa.eu/doclib/press/index.cfm?id=1230](http://trade.ec.europa.eu/doclib/press/index.cfm?id=1230)
~~~
sandstrom
I some parts are still held secret; this is only the EU-side, I think the US
are still keeping their citizens in the dark; and EU only started publishing
some details after heavy criticism, it should have been transparent from the
beginning.
~~~
kuschku
And the EU side decided that all ISDS trials have to be done at a court that
is staffed with judges from both contract partners and rules in public.
------
gotofritz
Needs a mirror
| {
"pile_set_name": "HackerNews"
} |
Firefox reached 29% share in Europe - rockstar9
http://mozillalinks.org/wp/2008/04/firefox-reached-29-share-in-europe/
======
dualogy
Sometimes you have no choice. Under Linux, for once: I'm loving it, but I
loathe FireFox which is still the only decent browser I've come across there
(but then, I'm only a recent convert = noob in Unixland). Under Windows, my
favourite was Safari, with IE 7 second. But Safari under Wine isn't pretty.
------
kxt
Also, accoring to <http://www.en.rankings.hu/> Firefox 2.x is the most used
web browser version in Hungary. (Although IE6 + IE7 combined are still way
beyond 50%.)
| {
"pile_set_name": "HackerNews"
} |
Apple's Swift Programming Language May Be Adopted by Google for Android - Jerry2
http://www.macrumors.com/2016/04/07/google-possibly-adopting-swift-for-android/
======
thevibesman
Discussion on the original source of the story:
[https://news.ycombinator.com/item?id=11451093](https://news.ycombinator.com/item?id=11451093)
------
Grazester
I don't see that happening
| {
"pile_set_name": "HackerNews"
} |
Study of 4chan's Politically Incorrect Forum and Its Effect on the Web - jtanderson
https://arxiv.org/abs/1610.03452
======
internaut
Are the academics involved in the creation of this document aware that they
are, in 4chan parlance, 'raiding'?
So far as I am aware this is not illegal, merely annoying or immoral.
Here's an example of when somebody almost certainly from /pol/ managed to
stage a TED talk.
Sam Hyde's 2070 Paradigm Shift - YouTube
[https://www.youtube.com/watch?v=-yFhR1fKWG0](https://www.youtube.com/watch?v=-yFhR1fKWG0)
Professional trolling is an ancient internet tradition that is worth
defending. There's a difference between harassment and bringing narcissists
back to earth.
------
dugditches
the board's quality is very bad. lots of racism/shitposting that got /new/
shutdown in the first place.
However it's very useful for breaking news and events if you're able to sift.
'Happenings' are often kept in fast moving threads where people pool together
information rapidly as the threads degrade and vanish.
------
chippy
Chapter eight is refreshing. I hope it makes it into print.
| {
"pile_set_name": "HackerNews"
} |
BitBucket now has voting on issues. - planckscnst
https://bitbucket.org/site/master/issue/3674/add-ability-to-vote-for-issues-bb-3647
======
planckscnst
Issues for BitBucket itself, sorted by votes.
[https://bitbucket.org/site/master/issues?status=new&status=o...](https://bitbucket.org/site/master/issues?status=new&status=open&sort=-votes)
| {
"pile_set_name": "HackerNews"
} |
Show HN: A Google chrome extension to add a little bro in your browsing. - swiil
https://chrome.google.com/webstore/detail/bro-ifyme/hfpgpmnapkjlmdogaeiimdoplddnokeb?hl=en-US&utm_source=chrome-ntp-launcher&authuser=1
======
DonateKarma
Bro, did you give yourself a 5 star review? Not cool.
------
swiil
I whipped this up in a couple of hours as a fun project.
| {
"pile_set_name": "HackerNews"
} |
In Law Schools, Grades Go Up, Just Like That - dnorris10
http://www.nytimes.com/2010/06/22/business/22law.html?&pagewanted=all
======
gaius
_If somebody’s paying $150,000 for a law school degree_
Colleges don't sell degrees, they sell educations - you have to earn the
degree. Or you used to, anyway. Why not skip all the lectures, coursework and
exams and save time?
| {
"pile_set_name": "HackerNews"
} |
The Impending Demise of the University - nostrademons
http://www.edge.org/3rd_culture/tapscott09/tapscott09_index.html
======
tokenadult
I thought this looked familiar:
<http://news.ycombinator.com/item?id=642478>
| {
"pile_set_name": "HackerNews"
} |
Young entrepreneurs turn a Tweet from Richard Branson into $1 Million - ahlemk
http://smallbusiness.yahoo.com/advisor/young-entrepreneurs-turn-a-tweet-from-richard-branson-into--1-million.html?fb_action_ids=10100137262022753%2C10100137211768463%2C4381961266023%2C10100137295874913%2C10100137272476803&fb_action_types=news.reads&fb_ref=type%3Aread%2Cuser%3Ayo7P_jX-MtPx1x1aimvV0XIDiNE%2Ctype%3Aread%2Cuser%3AdNxYkXFY8RDbENFkZ8cz-oFwOPs%2Ctype%3Aread%2Cuser%3A8WxvqIFAUhtDWjtWTnfik46e8fU&fb_source=other_multiline&action_object_map=%7B%2210100137262022753%22%3A10151032496944835%2C%2210100137211768463%22%3A10151032496944835%2C%224381961266023%22%3A10150969731529342%2C%2210100137295874913%22%3A10151086246274935%2C%2210100137272476803%22%3A10151906558735416%2C%2210100137271788183%22%3A10151022720879675%7D&code=AQDR1t5ao7gGR4OkAlE4PNTI7gXZAqwr_NpJBcAW67r7qpzIzX-Shkw5R2-sdr3LveO52R9KqKdUUO09s-oICChAi1_bq0aBOa1kI1qUK6LQATQMrCKiiSgXtEkYIyta6mzZqTxUpRL1uXg5KxPVqxP_Ui8FtGq_6h0Vwbx6jCw1NiMXmR4Mlub8IZaenWWpm5A#_=_
======
natrius
From their security page:
_We are very secure and make sure to cover many angles to insure your data
can never be compromised. Many often ask what exactly we do to make the data
so secure. Unfortunately, one of the things that makes the site so secure is
that we do not disclose the exact encryption practices._
I just threw up in my mouth a little.
It's also a bit weird that it's apparently two unrelated products in one.
Pinterest and LastPass: two great tastes that taste great together?
~~~
justauser
This is quite an eye-opener too...
"How secure is MySocialCloud.com? From day one, it has been our goal to
provide the best security on the web. While we don't expose how we keep
MySocialCloud secure (if we told you, it would be unsecured!), we do ensure
that not even our employees are able to see any of your sensitive data."
One of their videos shows a bookmarket so I'm going to presume they're using
that for somekind of encryption clientside with AES???
~~~
tylermenezes
"if we told you, it would be unsecured!" doesn't sound like AES... It sounds
like they're using _entirely_ security through obscurity.
------
AlexMuir
Only managed the first paragraph before the bubble-o-meter went off the
fucking scale.
\- Crap buzzword filled domain name. Check.
\- All encompassing vague idea. Check.
\- Young computer whizzkids. Check.
\- 1 millllion dollars. Check.
~~~
law
Don't forget the obligatory leave-of-absence from NYU.
~~~
wickedchicken
Drop out of college to make a combo Delicious/LastPass!
~~~
adrinavarro
Why the hell would anyone want such thing? The fact that people might use both
things doesn't mean they can go together.
Hell, there is a lot of things you can glue together, but these aren't ones.
~~~
borplk
I'm sick of this social frenzy in web already. Every goddamn website wants me
to share, discover, connect, cloud, blah blah blah...share friends boom
revolutionary idea...why don't we share photos? wow! here...take all my
billions...what if we mix your cloud crap with your passwords? sweet jesus
take all my money. Don't get me wrong, it's good to see people innovate, but
it feels like most (at least those who are being seen) have forgotten about
the true problem solving and innovation and are just mixing services and APIs
together and selling it as yet another revolutionary idea.
------
richardv
This is ridiculous. I actually started reading with a really positive mind,
but Richard Branson is never going to see any of that $1M.
\- Scott... got the idea when his computer crashed and he lost a spreadsheet
containing all his usernames and passwords.
Using this as a story to explain his startup is awful. So, you are running a
tool to manage passwords, where you previously stored everything in a
spreadsheet? This guy obviously knows a lot about security. Where can I sign
up?
~~~
toyg
That's harsh. I have to say, his pitch resonates with the common man more than
you think. How many people keep their passwords in spreadsheets or other
haphazard ways? Zillions. How many stop and think "mh, what's gonna happen if
I lose this spreadsheet"? Not many -- otherwise they wouldn't store passwords
in spreadsheets to begin with. Scott just reminded them that they'll be
screwed at some point, and he's here to help. I expect part of the reasoning
behind Branson's investment is that the man himself (or some of his minions)
must have had the occasional lost-password-crisis here or there.
Clearly, with a bland but fairly descriptive name like MySocialCloud, they are
not targeting paranoid geeks (the ones who worry about details like "who's
running this service?", and would rather use services going by dorky names
with random missing vowels), they are targeting the common man who stores
passwords in spreadsheets. They are scratching an itch they themselves had,
which is often how you validate your own business plan. I don't see why they
should be ridiculed for it.
(This said, the whole post is just planted marketing of the lowest quality.
Hardly HN-worthy, if you ask me.)
~~~
lelele
> Scott just reminded them that they'll be screwed at some point, and he's
> here to help.
Problem is: he doesn't know how to help, yet people are going to trust him
because they don't know better. I'd bet they are going to store their users'
password on an Excel spreadsheet, but they will take care to backup it often
;-)
There is LastPass already, and they are doing a great job. Competition is
good, but why should we support clueless competitors?
That said, I'd bet MySocialCloud.com will succeed. Worse is better, isn't it?
And now they have lots of money.
------
coderdude
There's a lot of over-the-top hating from the peanut gallery in this thread.
I'll balance it out:
What a ride this must have been so far. They're doing a great job getting
their name out there, that's for sure. An investment from Richard Branson and
a co-founder of Photobucket, plus this article in Yahoo Small Business that is
now trending the HN front page. I hope they're able to take this massive
opportunity they've been given and turn it into a successful business.
------
elmuchoprez
Regardless of whether this is a good idea or not, to say they "turned a tweet
into $1 million" is a bit of a reach.
They saw a tweet advertising an event which Branson would be at, borrowed
several thousands of dollars from their parents to attend the event, and used
that opportunity to get an email address that was capable of reaching Richard
Branson, which they used over a period of time to develop some sort of
relationship with him and another (Murdoch), and through a series of pitches
both in person and remote, they secured initial funding.
~~~
mkramlich
... in a time when investors are desperately seeking anything to throw their
money at that will get good returns. And it's hard to find software engineers.
And, especially to less sophisticated investors, they just know "social" and
"cloud" are the hot hot thing so they want to park some bets in something with
those words involved. Thus... MySocialCloud.com
------
jakeonthemove
I just checked out the service and I don't understand what's with the hate?
It's a Pinterest/Delicious/LastPass mashup, and while I would not trust them
with my passwords (they really should rephrase that explanation, or give a
real overview of their security measures), there are plenty of people who will
(my parents still store their passwords in simple text files :-)).
If they add RSS-reader functionality, I can actually see myself using the site
as a home page!
I believe it's got potential - they'll have to work hard on the marketing and
keeping even or ahead of the competition, though...
------
gilrain
...and so we told Richard, "Hey, just sign up for LastPass!" He was so
grateful, he gave us a million dollars.
------
calydon
This reads like there is something missing from the story. They already had an
office and a 9 person team, but they needed to borrow $4k from their parents
to meet Branson?
------
SagelyGuru
What a ridiculous country. It is OK to lend them $1M but illegal to offer them
a cocktail?
------
mkramlich
Wow. This has both bubble and disaster written all over it. May things go much
better than that for them, though, of course. But it reads more like a parody
or a list of warning signs than an article about a real new business.
------
jbranchaud
Here's a better venture idea based on the experience, "Scott... got the idea
when his computer crashed and he lost a spreadsheet containing all his
usernames and passwords."
How about designing computers that crash when users try to store usernames and
passwords on them. Users will eventually learn to stop doing that.
~~~
natrius
There's nothing wrong with storing usernames and passwords. There is something
wrong with storing them in a spreadsheet.
------
yaix
> he got the idea when his computer crashed and he lost a spreadsheet
> containing all his usernames and passwords.
Sounds like a good idea to entrust him with all your passwords then.
------
tkahn6
The more I see things like this, the more I believe I have no idea how the
world works.
~~~
codgercoder
It just reinforces my feeling that it's easier for simple, bad ideas to get
funding than complicated, good ones. Modulo the reporting, of course.
~~~
waterlesscloud
Your last sentence is probably the most insightful on the thread. We really
have no idea what actually happened.
------
kasahmed
Great story
------
waldemarb
This startup app stores your encrypted passwords on DropBox:
<http://passboxapp.com/>
| {
"pile_set_name": "HackerNews"
} |
Designing Fast and Programmable Routers [pdf] - lainon
http://web.mit.edu/anirudh/www/anirudh_dissertation.pdf
======
cottonseed
Free association: Good talk by Sonja Keserovic (Facebook) from Strange Loop on
their programmable network switch infrastructure:
[https://www.youtube.com/watch?v=WDfWd-
Utcgo](https://www.youtube.com/watch?v=WDfWd-Utcgo)
edit: I thought this was exciting stuff. Where else can you find teams
straddling the hardware/software boundary?
------
agnivade
This is great stuff. Are there any currently available programmable routers in
the market ?
| {
"pile_set_name": "HackerNews"
} |
Chris Lattner to Lead SiFive Platform Engineering Team - gok
https://www.businesswire.com/news/home/20200127005141/en/Google-Tesla-Engineer-Chris-Lattner-Lead-SiFive
======
dang
Comments moved to
[https://news.ycombinator.com/item?id=22159963](https://news.ycombinator.com/item?id=22159963),
which is currently on the front page and was posted a bit earlier.
------
nochance
Related: [https://www.sifive.com/blog/with-sifive-we-can-change-the-
wo...](https://www.sifive.com/blog/with-sifive-we-can-change-the-world)
| {
"pile_set_name": "HackerNews"
} |
Flappy48 by Broxxar - asharpe
http://broxxar.itch.io/flappy48
======
a_c
The gravity is a bit weird yet the idea is awesome. Blending the most played
games together. Nice.
| {
"pile_set_name": "HackerNews"
} |
Ask HN: Is Stripe going to ban Onlyfans for processing adult content payments? - solaarphunk
Seems like onlyfans is primarily in the adult content business, however, they appear to use stripe to process payments. Most card processors have clauses against supporting this type of activity, but it appears that Stripe is probably making a ton of money, given the growth of Onlyfans.
======
RickS
This was asked recently:
[https://news.ycombinator.com/item?id=24291790](https://news.ycombinator.com/item?id=24291790)
Relevant answer:
[https://news.ycombinator.com/item?id=24294801](https://news.ycombinator.com/item?id=24294801)
TLDR: onlyfans uses multiple payment processors, and presumably shuffles
customers to different ones based on risk. The adult payments likely don't go
through stripe.
~~~
leerob
OnlyFans might have just gotten bit by this. A popular celebrity joined
OnlyFans [1], created a bunch of turnover (chargebacks), and some policies
changed.
[1]: [https://www.nbcnews.com/pop-culture/celebrity/sex-workers-
bl...](https://www.nbcnews.com/pop-culture/celebrity/sex-workers-blame-bella-
thorne-changes-onlyfans-harm-their-income-n1238810)
| {
"pile_set_name": "HackerNews"
} |
Steve Wozniak's First Dance on "Dancing with the Stars" - zeedotme
http://www.youtube.com/watch?v=aoiGJMZjs0o&eurl=http://thenextweb.com/#
======
coglethorpe
OK, I'll admit to watching The Woz dance. I think he moved pretty well for a
big guy, but the judges didn't agree with me.
It was great to hear him go on about how he's used to digital things and how
dance is analog, all while his dance partner's eyes glazed over. He's lost 30
pounds while practicing for the competition, so even if he loses the
competition right away, he's got that going for him.
It's also great to see Woz, who apparently doesn't need the money, doing it
just for fun. He stands out from some of the other "celebrities" who really
are just desperate for a paycheck. It was obvious he was having a blast and
his dance partner said he was the nicest man she's ever met.
| {
"pile_set_name": "HackerNews"
} |
Predict the Output Challenge in C#, part 3 - bursurk
http://www.volatileread.com/Wiki/Index?id=2092
======
koyote
These are quite good and definitely result in quite surprising output in some
cases.
I would have liked the descriptions/answers to be a bit more detailed though.
For example, why is the static constructor called only after the instance
constructor (in part 2)? As far as I can see in the docs, this should not be
the case?
~~~
bursurk
static constructor does get called first. The problem is in this line: static
readonly Singleton _instance = new Singleton();
The static variable depends on the instance. So static gets called first and
starts running, but before it could call the Console.WriteLine, instance of
Singleton gets created due to the above line and hence the instance
constructor.
| {
"pile_set_name": "HackerNews"
} |
Säkkijärven polkka - luu
https://en.wikipedia.org/wiki/S%C3%A4kkij%C3%A4rven_polkka#Military_use
======
Ndymium
The English Wikipedia page, to me, seems to suggest that the record was played
to explode the mines in a controlled fashion. In fact, according to Finnish
Wikipedia, it was used to scramble the Soviet radio signals to prevent the
mines from exploding, and there was a sort of radio war going on for a while.
This is the specific record that apparently was used:
[https://www.youtube.com/watch?v=gZx1zl_sVTI](https://www.youtube.com/watch?v=gZx1zl_sVTI)
~~~
ashtonkem
The English page does say “jamming”, but I too originally read it as if they
were trying to detonate them prematurely.
------
tgsovlerkhgsel
When I read "mine", I thought of anti-personnel landmines and was confused why
you'd want to radio-trigger those.
These were demolition charges designed to destroy objects like bridges.
According to [https://www.quora.com/Is-it-true-that-the-Finnish-army-
used-...](https://www.quora.com/Is-it-true-that-the-Finnish-army-used-the-
song-S%C3%A4kkij%C3%A4rven-Polkka-to-prevent-the-detonation-of-Soviet-radio-
controlled-mines-during-the-recapture-of-Viipuri-in-the-Continuation-
War/answer/Alexander-Denisov-9), there were a total of 25 such mines hidden,
with each containing hundreds to thousands of kilograms of explosives.
[https://www.standingwellback.com/russian-ww2-radio-
controlle...](https://www.standingwellback.com/russian-ww2-radio-controlled-
explosive-device/) is also worth a read.
------
Legogris
Another Finnish polka more known through Internet culture[0] is Ievan polka:
[https://www.youtube.com/watch?v=7yh9i0PAjck](https://www.youtube.com/watch?v=7yh9i0PAjck)
I remember having the original Flash clip on loop on for entire days back
when.
[0]: Leekspin:
[https://www.youtube.com/watch?v=B-N1yJyrQRY](https://www.youtube.com/watch?v=B-N1yJyrQRY)
~~~
krebs_liebhaber
The Finns contributed more to early Internet culture than we give them credit
for. They invented IRC, and about half of the weirder memes on 4chan.
~~~
saq
And Linux
~~~
vsipuli
And Git (kind of, although that happened after Linus moved away from Finland)
~~~
Eyght
MySQL in the same vein.
~~~
welfare
MySQL is actually of Swedish origin.
~~~
cfinnberg
Well, at least Michael Widenius, the most visible head of MySQL and one of two
cofounders, is finnish. He also created the MySQL's fork MariaDB. Both names
came from Michael's daughters My and Maria.
------
Pandabob
As a finn, I did not expect to see this on the front page of HN. Ever.
But did not know about the military use of the song. Very interesting.
~~~
stevekemp
As somebody who moved to Finland, and hasn't learned too much Finnish, I was
just pleased I recognized the language and the words themselves!
Interesting read though, regardless.
------
9nGQluzmnq3M
Sakkijarven polkka is (well, was) also famous as one of standard Nokia
ringtones:
[https://youtu.be/UYSdiQl8BQY?t=54](https://youtu.be/UYSdiQl8BQY?t=54)
------
alkonaut
Interesting. This is basically an early version of the phone bomb where you
get a burner phone and just call the number of the sim card to blow it up.
Being able to pull that off in the 40's was impressive.
Hard to say what use it has though? Normally a "mine" is something that is
triggered by an event such as a person or vehicle passing. Setting one off
remotely or on a timer isn't useful.
If the mines were used to rig specific infastructure such as railways or
bridges then I can see the use (blow specific bridges at specific points in
time, without having to send saboteurs). I remember practicing bridge
destruction in the army using dozens of tank mines, simply because they were
readily available and easily handled explosives.
~~~
doikor
These were "mines" used to blow up bridges, roads and railroads. The bigger
ones had thousands of kg of explosives. So more like remote demolition over
radio. Idea being that you could destroy the critical infrastructure after
retreating from the area and if you had vision on it when someone was on it
like the first one that killed a couple officers (killed a major who was the
chief lawyer for the Finnish General Staff)
Modern equivalent would be cellphone bombs in roads in Afghanistan/Iraq.
------
elgfare
Wikipedia articles are quickly becoming my favorite type of HN link.
------
leo150
Eurobeat remix:
[https://www.youtube.com/watch?v=fxx5p8KnZ3w](https://www.youtube.com/watch?v=fxx5p8KnZ3w)
------
tryauuum
> These mines were set off when a three-note chord was played on the frequency
> the radio was tuned to, causing three tuning forks (of which each mine had a
> unique combination) to vibrate at once.
so, ehm, what was the soviets' plan? to blow them all at once when the city
would be taken by finns?
russian wikipedia page says the plan was to blow them periodically. But it
doesn't make much sense, how would the soviets control which mines to blow?
hard to imagine they would be aiming radio signal somehow
~~~
tgsovlerkhgsel
Each mine could be set to a different combination of three trigger
frequencies. There weren't many of them in place (I'll write another top-level
comment about this - edit:
[https://news.ycombinator.com/item?id=23089418](https://news.ycombinator.com/item?id=23089418)).
~~~
kmill
Adding to that, even just six frequencies to choose from would let you have
twenty distinct targets. (Six choose three.)
------
swebs
[https://www.youtube.com/watch?v=uMszu_VgMfY](https://www.youtube.com/watch?v=uMszu_VgMfY)
~~~
michalu
Nice song. Finnish language is part of the Uralic group of languages Finno-
Ugric spoken by Hungarians and Estonians too.
These languages don't belong to Indo-Iranian group like every other language
in Europe.
I like to speculate the language came to northern Europe with Huns who,
according to Procopius (I believe it was him) controlled Scandinavia too and
there are many sagas of Norsemen fighting Huns there, such as Hlöðskviða.
The modern Finns show Nordic genetic, yet the language is Uralic and perhaps
the first Finns were only the ruling class as it was often the case with Huns.
Obviously, there are other more widely accepted theories.
~~~
vesinisa
Sorry but that is quack. Replace "Finnish" with "Aryan" and it's almost
directly from the 1930s Nazi occultism book.
~~~
swebs
>Aryan language is part of the Uralic group of languages Finno-Ugric spoken by
Hungarians and Estonians too.
???
~~~
vesinisa
No, I mean more generally terms like "Nordic genetics" and proposing fringe
linguistic and ethnic theories about modern nationalities.
~~~
michalu
I'm sorry to ruin your imaginations but genetics, linguistics and history are
real sciences concerned with tangible facts. Unlike some political theories
with no right to claim credibility other than calling themselves "modern."
Aryan (term I didn't use) simply means Iranian, regardless of whether nazis
abused the term or not. You may find it useful to know that.
~~~
philangist
I do agree with your more general point but I think we shouldn't dismiss
changes in usages of words over time. Aryan doesn't simply mean Iranian in a
modern western context, just like the swastika isn't just a sign from Buddhism
or Hinduism. Both have strong associations with one of the most defining wars
of the 20th century and the genocidal regime that started said war. That can't
be easily ignored.
~~~
ganzuul
The Black Death killed a hundred million.
Blood flows like a river.
------
afandian
If you're unfamiliar with Finnish traditional music, they have some great
polkas. Frigg are good fun.
[https://www.youtube.com/watch?v=77lw3hp9q7M](https://www.youtube.com/watch?v=77lw3hp9q7M)
~~~
drran
[https://www.youtube.com/watch?v=7yh9i0PAjck](https://www.youtube.com/watch?v=7yh9i0PAjck)
~~~
afandian
THAT polka.
------
bjowen
... hey! [https://youtu.be/q98Y86jfXaY](https://youtu.be/q98Y86jfXaY)
------
paweladamczuk
This reminded me about the Ride of the Valkyries scene in Apocalypse Now.
~~~
CHB0403085482
I guess you haven't heard the action-scene version of Sakkijarven polkka on a
kantele;
[https://www.youtube.com/watch?v=F1PAy4JZfrE](https://www.youtube.com/watch?v=F1PAy4JZfrE)
Bonus violin edition by Linda Lampenius;
[https://www.youtube.com/watch?v=o-Skam8GUUU](https://www.youtube.com/watch?v=o-Skam8GUUU)
| {
"pile_set_name": "HackerNews"
} |
Show HN: FAS – C distributed Real-Time graphical audio synthesizer server - onirom
https://github.com/grz0zrg/fas
======
person_of_color
<3 for C
| {
"pile_set_name": "HackerNews"
} |
Pirate Bay Takes Over Distribution of Censored 3D Printable Gun - mnazim
https://torrentfreak.com/pirate-bay-takes-over-distribution-of-censored-3d-printable-gun-130510/
======
ColinWright
<https://news.ycombinator.com/item?id=5686403>
| {
"pile_set_name": "HackerNews"
} |
This typeface could help dyslexics read - jonathanehrlich
http://www.dezeen.com/2014/11/09/christian-boer-dyslexie-typeface-dyslexia-easier-reading-istanbul-design-biennial-2014/
======
davelnewton
Oh like
[https://news.ycombinator.com/item?id=5671568](https://news.ycombinator.com/item?id=5671568)?
| {
"pile_set_name": "HackerNews"
} |
Robinhood (backed by a16z) started offering free equity trading platform - ivom2gi
https://www.robinhood.io/
======
salient
Will this work only for Americans? Is there a minimum deposit amount?
| {
"pile_set_name": "HackerNews"
} |
A Teenager’s View on Social Media - dpflan
https://medium.com/backchannel/a-teenagers-view-on-social-media-1df945c09ac6#.tgc3a48px
======
greenyoda
Note: This article is from a year ago.
Original discussion on HN:
[https://news.ycombinator.com/item?id=8851902](https://news.ycombinator.com/item?id=8851902)
A response to the article:
[https://news.ycombinator.com/item?id=8874411](https://news.ycombinator.com/item?id=8874411)
~~~
dpflan
Thanks, didn't do enough due diligence; searching for the URL yielded no
results as it appears to do an exact match.
The URL after the # appears to change on each GET of the article:
[https://medium.com/backchannel/a-teenagers-view-on-social-
me...](https://medium.com/backchannel/a-teenagers-view-on-social-
media-1df945c09ac6#.xbnp9xwza)
~~~
greenyoda
It's actually OK to repost an article after a year if it hasn't had
significant discussion in the last year. However, it's customary to put the
year in parentheses after the title if it's an old article so that people know
it's something they may have read before.
I was mainly pointing out the earlier discussions because they could be of
interest to someone reading the article.
| {
"pile_set_name": "HackerNews"
} |
Making Sense of Complexity - robg
http://www.nytimes.com/2010/05/02/weekinreview/02segal.html?ref=weekinreview
======
Gibbon
Is it just me or do others get peeved when the words complex and complicated
are used interchangeably?
To me they mean very different things:
A complicated problem is one that is difficult to understand. A complex
problem is one composed of many distinct parts.
A complex problem could also be very complicated, but a complicated problem
may not or may not be complex at all depending on the situation.
~~~
johnm
Indeed. Most people use "complex" when they really mean "complicated".
| {
"pile_set_name": "HackerNews"
} |
Simple, safe, and fund anonymous chat - adamlieb
http://techcrunch.com/2014/09/18/reveal-chat-for-ios-helps-you-build-real-social-connections-via-anonymous-chat/?ncid=twittersocialshare
======
schars1
awesome app
| {
"pile_set_name": "HackerNews"
} |
7 YC startups find success in the heartland - kochb
https://venturebeat.com/2017/07/09/7-yc-startups-find-success-in-the-heartland/
======
sharemywin
A lot of products I think find initial traction and then flop because SV is a
shitty test city.
[http://www.npr.org/templates/story/story.php?storyId=1137953...](http://www.npr.org/templates/story/story.php?storyId=113795356)
| {
"pile_set_name": "HackerNews"
} |
Police Force Suspect to Unlock Phone with Face ID - kposehn
https://www.theatlantic.com/technology/archive/2018/10/face-recognition-iphone-unlock-police-force/572353/?single_page=true
======
jshevek
Since the FBI got a warrant and were responding to allegations of a sexual
assault, I can respect the argument for doing this in these circumstances.
Though I don't like that the difference in the way the law treats passcodes vs
biometrics may weaken privacy rights.
| {
"pile_set_name": "HackerNews"
} |
Jeff Dean Endorses New AI Powered Healthcare Platform - jmarty
https://plus.google.com/+JeffDean/posts/V1LeP3Pnhrt?sfc=true
======
dbdriscoll
Mike Ng is excelllent
------
kevin_lin0
jeff dean + healthcare + AI....makes sense
------
talliehuang
WHAT
------
r_allen023
god has spoken
| {
"pile_set_name": "HackerNews"
} |
Subsets and Splits