text
stringlengths
89
1.12M
meta
dict
New Startups Aren't Keeping Big Mattress Up at Night - prostoalex http://www.bloomberg.com/news/articles/2015-03-12/new-startups-aren-t-keeping-big-mattress-up-at-night ====== Scoundreller They're merely in the early adopter phase. The internet didn't destroy printed newspapers overnight, but one by one, they're finishing them off (in print and in organization). The sad thing is when people don't work less when their costs go down but instead spend the freed money on something else, like higher rents or mortgage payments.
{ "pile_set_name": "HackerNews" }
I Do Not Want Your Stupid App - sagivo http://techcrunch.com/2015/10/03/with-apologies-to-theodor-geisel/ ====== greenyoda Ironically, TechCrunch, the publisher of this amusing rant, has an app: [https://play.google.com/store/apps/details?id=com.aol.mobile...](https://play.google.com/store/apps/details?id=com.aol.mobile.techcrunch) [https://itunes.apple.com/gb/app/techcrunch/id526058642?mt=8](https://itunes.apple.com/gb/app/techcrunch/id526058642?mt=8) ~~~ minimaxir TechCrunch, in fairness, doesn't beg the user to download the app. ~~~ Quanttek Also: Just because the publishing media has one of _those_ apps, it doesn't mean that one of their writers can't express his dislike for those apps. If anything it proves that he has a certain independence from the business facing side and that's always good. ------ staunch > _Redecentralize the web!_ Redecentralize all internet services! Shameless plug ahead, I believe in this idea so much I co-founded a company to help spread the idea and see it through. Every person should have their own domain name and have the ability to run arbitrary services in the cloud. The price of computing power and bandwidth has come down so much that it's completely practical to do this now. Would love feedback/thoughts: [https://portal.cloud?invite=hn](https://portal.cloud?invite=hn) (invite code is just there so free domain discount is applied). The most important thing is that no company (including mine) should ever have the ability to dominate the internet the way Google, Facebook, and Twitter do today. We should be able to move from cloud provider to cloud provider with very little friction. If we truly control our own domain names, apps, and data this isn't even hard to do. Google, Facebook, and Twitter could be just apps we run (webmail, web search, photo sharing, status updates). We shouldn't have to give up our privacy and be locked into a service that feeds us a hundred ads a day just to be able to check our email, search the web, share photos, or post 140 characters to the web. ~~~ acconrad I like the headline! I was initially intrigued because I just started a side project, bought the domain, and set up Google Apps for email. Then I'll probably set up a Medium blog for the project. I thought "oh neat, it's all contained in here, and a free domain that's cool!" Then I saw the price point: $8/mo. Yeah sorry, you need to be more competitive for groups that only want a few services. Google Apps is $5/mo and Medium is free...is it worth an extra $3/mo for me to decentralize project/business type emails and documents? Not really, because I don't have any sensitive documents that I don't care for Google to have access to. Maybe if I were a journalist starting a secretive blog and needing to communicate between journalists over sensitive information - yeah, I could see that. I think those are the kinds of people you're going to want to market to. Reasonably priced for sensitive documents and files, but more than conventional app solutions who don't really need the extra decentralized security. ~~~ jlgaddis I think I must be misunderstanding. You talk about "decentralizing" but you mention Google Apps for e-mail and Medium for a blog. If you want to decentralize, you should be running these things on your own server(s) that you control. What am I missing? ~~~ narrowrail I think acconrad is just saying: Decentralized is for sensitive things with a need for "extra decentralized security," and that most conventional needs can be met more adequately, and cheaply, with the services 'everyone' already uses. Basically, it's a philosophical difference, but the ideas expressed may give proponents of decentralization some insight into why we are currently in another centralizing phase of the internet. ------ radicalbyte But how else can these sites get access to your contact list and call history? ~~~ adevine Require Facebook login - close enough. ------ SCdF See, I agree, but this is what this article looks like on my phone: [https://imgur.com/VqchKIp](https://imgur.com/VqchKIp) Perhaps one should become a good example of an enjoyable mobile experience before one starts throwing stones. ~~~ Bahamut Installing an app for everything is not what I call an enjoyable mobile experience... ~~~ SCdF Sorry, not sure if I was clear. What I meant was: Techcrunch shouldn't proudly point out that everyone else is making reading on a mobile device unenjoyable by asking if you want to install an app, because they themselves crap so much non-content on your screen and make their own mobile experience an unenjoyable one. ------ jgh Maybe get a windows phone or something if you want to surf the web and not have to worry about installing any apps... ~~~ toomuchtodo Or just use ad blockers to block app download notifications on the website ~~~ LeoNatan25 But then poor publishers might be forced to abandon their terrible ways! How undemocratic of you to suggest that! ;-) ------ omarish This is why I'm super bullish on The Information ([https://www.theinformation.com](https://www.theinformation.com)). ------ jagermo I always thought: "Well, those apps, I don't know. I don't use webapps on the pc anymore, because the browser does everyting. And some day, the mobile browser will be just as good and no one will need those apps." That was before peope discovered mobile ads, access to phonebook/email etc pp. Maybe it'll change. ------ sagivo Apps are only popular because we don't do mobile web good enough. Most of the mobile web is either a banner asking download the app, or tons of adds with no room for content. ~~~ corndoge Mobile web doesn't come anywhere close to replicating the fluidity and functionality of a native app and it never will. Running a dedicated application designed for the system will always beat an application designed for the system on top of the system (web browser). I prefer native applications every time. ~~~ currysausage Yeah, but maybe I just want to, you know, read an article and not _replicate the fluidity and functionality of a native app._ Reading articles worked just fine with NCSA Mosaic, I promise it works fine mith Mobile Safari too. ~~~ corndoge OP's argument was that mobile apps are only popular because the mobile web is not good enough. Obviously when the mobile web is used for it's original intent -- pages of information, mostly text, some images -- and not full web applications with heavy JavaScript dependencies and animation and share buttons and shit, it's a pleasure to use. ------ paulpauper Email subscription popups ...those are annoying
{ "pile_set_name": "HackerNews" }
The Nano Membrane Toilet - ph0rque http://www.cranfield.ac.uk/research/research-activity/current-projects/research-projects/nanomembrane-toilet.html ====== matt_wulfeck Is residential water usage really a large problem? I assume that municipalities have a decent ability to reclaim and reuse much of the water flushed down the drain and toilet. I know at least for California residential water use makes up just 15%[0]. I know every little bit helps, but a toilet is an incredibly simple invention and it would be a shame to replace it with something so much more complicated. [0] [http://www.environment.ucla.edu/media/images/water- fig1-lrg....](http://www.environment.ucla.edu/media/images/water-fig1-lrg.jpg) ~~~ glibgil I wish you would read the article and watch the video. The target market and business model is well explained. Can you imagine a region in the world that does not have running water and sewers and may actually enter in the "first world" before those services do? Well then, that's what this toilet is for. ~~~ roywiggins Composting toilets don't need water either. [https://en.wikipedia.org/wiki/Composting_toilet](https://en.wikipedia.org/wiki/Composting_toilet) Alternatively, just try to divert urine so it never mixes in the first place: [https://en.wikipedia.org/wiki/Urine- diverting_dry_toilets](https://en.wikipedia.org/wiki/Urine- diverting_dry_toilets) Both of these seem on first glance to be easier to maintain. ~~~ glibgil Yeah, this toilet isn't for rural use. It is for places that should have sewers but don't and that probably never will get sewers. It is for dirty cities in the third world. ~~~ brianwawok Will the cost of these toilets ever make sense for that? When I see things like "Turn a 2L bottle into a light" for a really poor area - I think awesome, something they already have laying around can make their lives way better. When I see things like "Nano-polmer super toilet for those without running water" I just kind of shrug. Seems to cost more than adding running water, while still not providing a clean place to drink. What am I missing? ~~~ cpayne (I think!!!) it is a problem of scale. In 3rd world locations, you can be walking 3km every 2nd day to fill a jerrycan of water. If that's the case then you aren't going to use that to flush. And even if you do (using grey water after cleaning etc.), then you won't have the toilet inside the house. ~~~ brianwawok So how much does installing this super toilet cost, best case? How much to run a line of fresh water to the house? If <cost of toilet> is not less than <cost of fresh water line / 10>, it seems like not a win - as fresh water can solve both drinking and help with sanitation (though not get you all the way there). ------ jasonpeacock And yet this problem has already been solved with composting toilets for many years. Why do we need to build such a fancy and complicated device when all you need is to pee in a separate bucket from your poo, and let the poo aerate/dry naturally? Mix in some dry mulch and you're done! Urine itself is sterile and can be easily treated/recycled. ~~~ serf >Urine itself is sterile This is a misconception that particularly annoys me, probably because it was the (incorrect) excuse a nurse once gave me when he accidentally spilled a urinal filled with liquid all over me while I was bed-ridden in an ICU. [0] [1] [0]: [http://www.smithsonianmag.com/smart-news/turns-out-urine- isn...](http://www.smithsonianmag.com/smart-news/turns-out-urine-isnt- actually-sterile-180954809/?no-ist) [1]: [http://www.stritch.luc.edu/newswire/news/study-debunks- commo...](http://www.stritch.luc.edu/newswire/news/study-debunks-common- misconception-urine-sterile-0) ~~~ tomcam he accidentally spilled a urinal filled with liquid all over me while I was bed-ridden in an ICU. [0] [1] Well that's a horrible experience. I too am quite surprised the sterile urine legend lives on. ------ evanlivingston So, My late father recently developed a waterless toilet which is significantly simpler and likely cheaper than this one. [http://www.dry-flush.com/videos/](http://www.dry-flush.com/videos/) ~~~ hmottestad Neat. Reminds me of the nappy bins. However, the one in the video seems more geared at sustainability and reuse. They filter the water out of the pee. Dry out the poo for fertilisation. ------ joezydeco That schematic view of human feces is....let's just say it's incredibly optimistic. ~~~ ph0rque Agreed. The whole concept is too complicated for the real world, in my opinion. But, if the team is willing to iterate based on feedback, and incorporate some of the advances of other composting and incinerating toilets, the end product might work really well. ~~~ codingdave That is exactly what i was thinking - making this produce compost instead of waste intended for a collection facility would be not only more useful in developing areas, but could even improve the urban gardening/homesteading movement. and lets face it - in developed nations, it is us crazy hippie folk who would buy this anyway. ~~~ erroneousfunk In developing areas, people grow food as close to their drinking water as possible to make watering and/or irrigation easy. I don't know if anyone wants to recommend that they start adding human waste to the mix. ~~~ codingdave I'd love to know where you are talking about, because everyone I talk to does exactly the opposite. We know we are going to use animal waste, and other compost, to fertilize our garden beds. So we pull our drinking water from upstream of any food production. my family does not use humanure in our systems, but it certainly is done by other people and in other areas. If there really are developing areas who fail in this design principle, they need education on how to design their food production. Holding back a useful tool just because some people might use it incorrectly doesn't make sense. But most people who are even somewhat self-sufficient know that the flow of water is a crucial design point. If not composted and used productively, then human waste is just a pollutant. But if you can increase food production and have a productive recycling of materials at the same time, you are killing two birds with one stone. ------ Xeoncross The problem is that the toilet's estimated cost is $0.05 per user. So for a 4 person family potentially living on only a couple dollars per day this would make up 10-20% of their living expenses. This isn't like our budgets where we can afford 10-20% because we are WAY past trying to eat and live. This is 10-20% of all the money you have for food, clothing, and medicine. Also, I'm assuming the toilet will go up in price as more people try to make more off the system. All that said, I welcome the Nano Membrane toilet to the much needed market. I'm all for composting toilet technology as our current system of simply creating raw sewage then trying to treat it with massive amounts of chemicals (which are very bad for the environment) isn't sustainable. 1) Natureshead, 2) Airhead, and 3) Separett toilet These three all much better suited to low cost, rural uses. For more hi-tech versions we have Sun-Mar. However, all these still cost at least $1,000 USD. ~~~ ghshephard For "low cost, rural use" \- nothing beats a hole in the ground. :-) ~~~ david-given Digging a safe latrine pit is more complex than you might think! [http://www.who.int/water_sanitation_health/hygiene/emergenci...](http://www.who.int/water_sanitation_health/hygiene/emergencies/fs3_4.pdf) Plus they have a limited lifetime; they fill up, and you need to dig a new one. ------ fab13n It would also make sense in developed countries: shitting in water makes it much more complicated to treat afterwards, and greatly increases the ecological footprint of that processing. Moreover, it makes failures to properly treat much more dangerous (human feces are where you most easily find pathogens specialised in human invasion, besides human cadavers). Feces compost just fine in a dry environment, if you mix it with enough carbon (dried plants or sawdust). No treatment, except letting it decompose over a couple of years, and very little smell if the nitrate/carbon/humidity balance is respected. Of course, water companies wouldn't be thrilled by such a simplification, and people like the illusion that their poo-poo just magically disappears when they press a button. ------ nikolay Even simpler mechanisms clog and I don't think this scraper can do such a good job, but this still could be better than a septic tank or others alternatives. ------ ww520 This device has quite a bit of moving parts, needs periodic part replacement, and requires electricity to operate. ------ rayiner What does it do with the toilet paper... ~~~ fab13n that's just more fiber. Besides, in many of the countries targeted by this, people wash with water, rather than sweeping with paper. ~~~ brianwawok It is designed for no running water, so I would assume no bidet water also. Could go for the shared sponge ala Rome (was that really healthy?) ------ noobie Can someone create a social enterprise that uses this idea to generate profit and make a wider impact? ~~~ glibgil yes
{ "pile_set_name": "HackerNews" }
How easy did people find RTML to use? - omouse ====== omouse I'm thinking about using context parsing as in "I need to go to the store tomorrow" will add the event "I need to go to the store" to the calendar for tomorrow. But for some things I need a certain structure like this: "Wait for Bob to finish report, do whatever". And "wait for Bob" would send an email off to Bob that he needs to finish the report. I want to know how easy it would be to train a user to follow that structure for certain things and would like to know if any users had trouble with something like RTML. ~~~ byrneseyeview Livejournal uses something vaguely similar (a special HTML-y tag that creates an automatic link to a particular user's journal). If you use a known schema like "Getting Things Done" (<http://www.43folders.com/2004/09/08/getting- started-with-getting-things-done/> ), users can represent a task in a hierarchy of Context/Goal/Project/Task (so Store/Prepare dinner/Buy ingredients/Go to store).
{ "pile_set_name": "HackerNews" }
Language Aptitude Not Math Predicts Programming Skill - ukj https://www.i-programmer.info/news/99-professional/13517-language-aptitude-not-math-predicts-programming-skill.html ====== 0xff00ffee I guess it depends who you are talking about. Computer Scientists are generally great at math, but it doesn't mean they are good programmers. A good programmer has style: from how the code looks, to how it is arranged, test, regressed... to how defensive the code is to soft-failures. I've worked with spectacular computer scientists who wrote compiler kernels, but their code looked like a big pile of... well, you get it. ------ tj-teej Makes sense, as naming is the one of the two hardest problems in programming! (the other is maintaining distributed cache consistency and catching off-by- one-errors :D) ~~~ tobmlt Agreed! Questions though... about two... is this two where two comes from 0,1,2 ? Also, on a relational note, what kind of “and” are you using? ‘Could be my isolation talking, but the further I look into this comment the more dad/logic jokes I see. Caveat: am dad. Eh hem... I will see myself out. ------ anta40 In general, you don't need to be exceptional at math for doing programming. A basic understanding of arithmetic is sufficient. Okay, perhaps if you work with numerical analysis on daily basis, or doing type theory/lambda calculus/any theoritical computer science stuffs. ------ ttizya20 It's 2020 and the g factor ism't mainstream
{ "pile_set_name": "HackerNews" }
Banks, Arbitrary Password Restrictions and Why They Don't Matter - weinzierl https://www.troyhunt.com/banks-arbitrary-password-restrictions-and-why-they-dont-matter/ ====== mquander _He turned to me and said, "Do you really think the only thing the bank does to log people on is to check the username and password?" Banks are way more sophisticated than this and it goes well beyond merely string-matching credentials; there's all sorts of other environment, behavioural and heuristic patterns used to establish legitimacy. You won't ever see a bank telling you how they do it, but those "hidden security features" make a significant contribution to the bank's security posture._ Their response to having visible security that sucks is to say that they also have a lot of super complicated invisible security which is actually really good? Why am I supposed to believe that? Their invisible security probably sucks even more. ~~~ tialaramex I agree, Troy is way too gullible here. > Do you really think the only thing the bank does to log people on is to > check the username and password? Yes. I assure you that when bad guys with your username and password log in and steal all your money the bank _won't_ say: "Doh, our sophisticated environment, behavioural and heuristic patterns used to establish legitimacy let you down this time. We'll pay for this" No, they'll say it is your fault because the bad guys had your username and password. And that's all you need to know. ~~~ Swizec On the other hand I log into my bank with my computer using the same browser as always and my username and password, but this time I'm in a different country. Even just a different Wi-Fi (like at a coffee shop) And the bank _freaks out_. Omg omg omg hacking hacking! Quick to the 2FA mobile! Should we call you? Can we text you? Do you prefer email? That's before we even get into how trigger happy they are about credit cards being used in weird ways. You buy one thing out of the ordinary (like a $3000 downpayment for a motorcycle) and immediately get 5 texts, 10 emails, and 2 phone calls. YO did you do that? Or the one time my girlfriend deposited a physical cheque and it was so out of the ordinary the bank had a melt down and started shutting down all her accounts and blacklisting her from the bank. I don't know about "sophisticated", but they definitely do _something_. ~~~ dpark You really want to work yourself into a frenzy about minor inconveniences, huh? You’re so hyperbolic here that you sound like you’re basically making stuff up. > _You buy one thing out of the ordinary (like a $3000 downpayment for a > motorcycle) and immediately get 5 texts, 10 emails, and 2 phone calls. YO > did you do that?_ First, dropping 3 grand at a motorcycle dealership is extremely out of the ordinary for most people. Second, my money says you got exactly one text, one email, and either one or zero calls. It makes perfect sense that they’d want to do the fraud check here. It also makes sense that they’d use multiple means of contact to reach you quickly. As for the girlfriend blacklisting story, I don’t know if you’ve just horribly mangled this story or what. It doesn’t make sense. If you deposit a check, there is no potential fraudulent withdrawal from your account. Also, a bank cannot randomly close your accounts and “blacklist” you. They are _holding your money_. Stealing money from your depositors is generally frowned upon from a regulatory standpoint. ~~~ NewsAware I didn't understand the gist of the GP to criticize bank actions, but wanting to point out that banks do indeed have alarm systems in place beyond simple IP-change rules. ~~~ joshjje Some do. Many do not. ------ viraptor > Do you really think the only thing the bank does to log people on is to > check the username and password? Yes, I do think that. I automated some banking functions for myself and the last 4 retail banks worked just fine when accessed with curl, or headless chrome. I didn't even change the user agent for curl and used no delay between requests. Not only do they trust credentials, there are no extra checks in most cases. This is experience from UK and Oz. Lloyds, CommBank, ANZ, ING. ING is actually the "hardest" one. Their 4-digit scrambled keypad varies colours slightly so it requires closest-match comparison to known samples. That was like 3 extra lines of code. ~~~ throwaway201606 Access control is not on a binary 'yes-or-no ' decision on a per single-signal basis. It is usually a weighted result of multiple signals. For example, it may look at say 20 factors and have a failure threshold of 15 passed. Most of the signals are evaluated server-side. By design, some signals used are picked such that customer convenience, among other things, is not affected (e.g. the account holder data pull automation that you describe in your example ). Examples of signals include timezone, time of login vs. past logins, hardware profiling (OS, screen resolution, IP, ISP, VPN vs. no VPN - based on known VPN server lists ) etc. I agree that not all banks are doing this but the more sophisticated ones are (quite a few of them). Point here is curl or headless browsers working is not evidence of only account and password being checked. ~~~ viraptor I did it scheduled past midnight, from "abroad", from known AWS us-east ranges, with headless resolution set to 1000x1000, completely ignoring their browser detection JS, identifying as either curl or "bank bot", not following links and redirects, causing lots of unexpected failures which should be impossible with a normal browser while developing my scripts. (including 503s from bad csrf token passing) Basically if there was any check, I would fail it. I did that on purpose - better to know immediately than get silent failures later on. I really don't know what else I'd have to do to trigger "this it not a real person" detection. ~~~ throwaway201606 Thanks for taking the time to explain this: it does indeed seem clear that they are just doing username and password detection for access. A followup question: I have lived in Europe and have accounts in banks in Ireland. For those accounts, actually executing any financial transaction requires entering a one time token generated by a device that uses your debit card and PIN. Like so: [https://www.youtube.com/watch?v=kEOEQzC8-Fc](https://www.youtube.com/watch?v=kEOEQzC8-Fc) Do the banks you tested have a similar setup? Just trying to find out if these specific banks have chosen to control view transactions with just the username / password but require some other additional authentication for actual financial transactions. ~~~ viraptor None of them required extra authorisation to get data. (even transactions going back 5+ years) They did have the SMS validation when adding new transfer targets, but not for executing transactions to existing contacts - which is potentially an issue if you can pay off a different credit card just by changing the reference field. ------ hyperman1 The 5 number 3 tries bank does not seem very secure: It is (at least in my country) very easy to guess valid acount numbers: They are incrementally numbered + have a checksum. So while 1 account of a 5 number 3 tries bank is safe, attacking all of them in volume is not: With N numbers, T tries, A accounts, the chance of guessing at least 1 account is pow(1-T/pow(10,N),A) 5 numbers 3 tries means a chance of 0.9997 of being locked out of 1 account. For A=100 000 accounts, the chance is 0.049, so more than 95% chance you guessed one account right. For A=1 000 000, you're almost certain. And that's the dumbest possible way. Try guessing with the most common password like 12345, take only 1 try each month so people unknowingly reset the account number when doing payments, and use a botnet to spread the load over tons of IP adresses and randomize the numbers. ~~~ SamBam Exactly. The math is not in their favor at all if the attacker is able to work out or guess numerous account numbers. ~~~ bscphil I think this is exactly right. My bank has predictable account numbers too, and if they had one of these 4 or 5 digit password limitations, they would be a very ripe target for someone using a botnet to just go through all the accounts. The risk isn't that someone will target you personally, the risk is that someone will happen to hit you while attempting the profitable activity of hacking every account. (Plus, at least with a bank, if they manage to hack in and steal the database, one of the most profitable ways to use it would just be to log in and steal money. No effective hashing on a 5 char password.) I also _completely_ distrust the "advanced security measures" claim. I have no trouble logging into my bank via curl, including from remote IP addresses. (They finally rolled out 2FA, but I can still type the text code into my script.) A couple years ago I discovered a number of vulnerabilities in their account site, too (including some many years old software with vulnerabilities with a CVSS of 10). After I reported this to them, the response from the guy who worked there was basically "Yeah, that's from the crappy vendor who supplies us with this software. Please don't say anything about this because we're replacing it with a new in-house backend in a couple months." ------ RHSeeger >> Hey [bank], does that 16 character limit mean you've got a varchar(16) column somewhere and you're storing passwords as plain text? > As much as I don't believe that's the case in any modern bank of > significance, it's definitely not a good look. Inevitably the root cause in > situations like this is "legacy" \- there's some great hulking back-end > banking solution the modern front-end needs to play nice with and the > decisions of yesteryear are bubbling up to the surface. It's a reason, > granted, but it's not a very good one for any organisation willing to make > an investment to evolve things. But the only reason that "legacy" system would have a limit is because it's storing your password. So > I don't believe that's the case in any modern bank of significance It _is_ the case. It may not be the case in their most recent systems, but a chain is only as strong as it's weakest link. You can be hashing/salting the user's password and locking it behind a vault door to make sure noone can access it. But if you _also_ keep a copy of the password in plain text on a piece of paper taped to the outside door, the vault copy doesn't protect it. ------ kemiller2002 Wow this made me laugh. I spent long time working for banks, financial institutions, and credit agencies. "So many things that lock the account down" Really? Out of ALL of articles about breaking into systems leveraging techniques like lateral attacks on systems, and this is supposed to be believable. People ask me what it was like working there as far as processes etc. I always say the same thing. "Banks are like the mafia. They have a lot of money, and they don't like giving any of it away." Banks (especially) care about 2 things, money and risk. They spend just enough money to mitigate the risk and then stop. What this means is that they may buy good systems to help with security administration, but rarely did I see them take extra time to make sure they have multiple security redundancies like Troy describes. Employees were "trained" to what the letter of the law required. Don't get me wrong, there were some great people there, but let's not pretend they only hired from a select group of highly trained and extremely smart people. It's just like almost anyplace else. Employee's and contractors are there to get a paycheck and go home. They do what risk wants and when their done, bam they go home til tomorrow, because the fights just not worth it after a while. I briefly worked with a sales guy from a vendor we used, and he used to work in the banking industry. He had the best quote (that I shamelessly stole) to describe banks. He said, "If people knew what I know about banks, mattress sales would skyrocket." ------ ufmace I think basically everyone in this thread is looking at this all wrong. Banks don't have a ton of fancy hidden security gating the login itself most of the time. Trying to build a digital Ft. Knox in front of the login page and then paying no attention to what the users do after they login is the wrong way to go about securing these types of accounts. I'm pretty sure they have much more security around detecting and blocking suspicious behaviors after you've logged in, like adding new payees on bill pay systems, requesting transfers of large amounts of money to random accounts, particularly overseas, etc. I also argue that banks have much, much better security than anything most of us have ever touched, because they handle billions of dollars moving around routinely and manage not to lose it. Meanwhile, half of the internet can't manage not to lose the email addresses of everyone who signed up for their cat picture website. If they're trying that hard to steal something of little value like that, how hard to you think people are trying to steal the billions of dollars that banks handle? ~~~ Radle " I also argue that banks have much, much better security than anything most of us have ever touched, because they handle billions of dollars moving around routinely and manage not to lose it. Meanwhile, half of the internet can't manage not to lose the email addresses of everyone who signed up for their cat picture website. If they're trying that hard to steal something of little value like that, how hard to you think people are trying to steal the billions of dollars that banks handle?" Exactly this is the reason why I don't think Troy is being gullible here. ~~~ lawn There's a logical fallacy here that I don't know the name of: "Because it's so important, surely they must be competent." Which does __not __follow. ~~~ ufmace I do not argue that they're competent because they're important. I argue that they are competent because there is a multi-billion dollar pile of cash that they're guarding. If they aren't competent, how come nobody has stolen it all yet? Look at the efforts spent hacking Bitcoin exchanges and identified large holders. Lots and lots of money being taken there. Look at the efforts made to hack much less important things. How come no big banks have suffered a serious compromise leading to the loss of 9-figure plus amounts of money yet? ~~~ syrrim Banks normally don't actually transfer any money. There's a funny story from the 1920s of the Bank of England pushing money across the vault floor to indicate a transfer to France, who held an account with them. The money doesn't actually go anywhere, it just says so on the balance sheet. If someone "steals" 1 billion dollars by making the system think they took it, someone will eventually notice, then they'll send somebody down to the vault to push it back to the other side. Bitcoin is very different: when the bitcoin blockchain says someone else has your money, they have it. Imagine someone had heard that Ethereum had suffered no major attacks on exchanges, but hadn't heard of the DAO attack. They must think that Ethereum is extremely secure. Actually, Ethereum is very insecure, but a large enough target will get special treatment. Bitcoin doesn't have the same tendency as Ethereum (and real life) towards hard forks, so of course it will have more attacks on it. But this doesn't imply that anyone will hard fork when you get hacked, nor will the banks necessarily reverse the transaction when someone guesses your password. ------ shanecoin I would argue that this is not just banks but a number of different services. This entire Github repository [1] and this Twitter account [2] are dedicated to sites with dumb password rules. Passwords are not meant for humans. Here is a link to a hackernews thread discussing the worst of the requirements in the repository is here [3]. [1] [https://github.com/dumb-password-rules/dumb-password- rules](https://github.com/dumb-password-rules/dumb-password-rules) [2] [https://twitter.com/dumb_pw_rules](https://twitter.com/dumb_pw_rules) [3] [https://news.ycombinator.com/item?id=20890381](https://news.ycombinator.com/item?id=20890381) ~~~ pingyong The PayPal section doesn't mention that they have a 20 character limit too. I honestly wonder what kind of buffoons are in charge of making this shit up at multi-million dollar companies. ------ londons_explore If someone guesses the _2 numeric digits_ necessary to gain telephone access to my pension fund, and they then transfer out the $10M value to the cayman islands, will they really give me back the money? Would I have any chance in court? - proving it wasn't me is near impossible. Yet this pension company has millions of customers, and presumably isn't seeing widespread fraud. How come? ~~~ patio11 Because you're evaluating the effectiveness of one control in isolation, whereas the pension fund has a lot of controls, including e.g. an operational team which knows that wiring money to the Caymans is intrinsically high risk, a written procedure that they'll follow for high risk transfers specifically to papertrail up evidence in the event it is contested, a legal environment which will put the burden of proof on them rather than you if they did something that self-evidently stupid, the medallion guarantee program and associated regulation, etc etc. Fraud happens. Financial institutions spend a lot of money defanging it; they also, when push comes to shove, have budgets for it. ~~~ whitepoplar I'm curious--how big are those budgets? ~~~ throwaway201606 For the really large banks: $XYYMM (i.e. hundreds of million dollars aka the cost of doing business) across all lines of business. All this is mostly public info as it has to go into financials, you can find it under "Operational Losses" for any public bank (Note that "Operational Losses" are not the same as "Operating Losses"). A sample multi-year summary can be found here from an industry body in Europe for losses for debit. (losses are demonimated in Euro):look at page 7 under the last column for the rows "Retail Banking". Important to note that credit ops losses are an order (or maybe two) of maginitude higher. [https://managingrisktogether.orx.org/sites/default/files/dow...](https://managingrisktogether.orx.org/sites/default/files/downloads/2018/09/annualbankinglossreport2018-printversion.pdf) ~~~ whitepoplar Thanks! ------ PhasmaFelis > _That very first tweet touched on the first reason why it doesn 't matter: > banks aggressively lock out accounts being brute forced._ Until a hacker steals the salted password database and brute forces it as much as they like. A truly strong password is secure even when the attacker has the salted version. (Anyone who tells you that it's completely impossible for a hacker to ever get their password file is lying either to you or to themselves.) ------ kardos This 'hidden security features' explanation sounds a bit like security by obscurity. Mouse movement fingerprinting? Browser fingerprinting? Locking people out when they get a new laptop doesn't sound like a good time ~~~ mobjack It likely means they use reCAPTCHA. They could be doing 2FA when someone logs in with a new device too. ------ pridkett The challenge is that if a system only offers a four or a five number passcode, you can still attack accounts by just guessing passcodes for account names/numbers. This is addressed a little bit by pointing out that it’s sometimes not easy to enumerate accounts - but if you’re malicious and have purchased a list of compromised accounts, you could then pound the system from a botnet even after the passwords have been changed. In this case you’re not concerned about a _specific_ account, but rather you’re concerned about _any_ account. And with a 4 or 5 number passphrase, you’d get hit pretty quickly. ~~~ philliphaydon If you knew the bank and the account, you could assume that people login to their account atleast once a month. So every month you could try a combination. Known passcodes could be tried first. If a dump also has the person Birthday then their birth year is a good Guess for a 4 digit pass code. 2 failed attempts reset when the user succeeds their login during the month. There’s so many things people could do. Limiting passwords is a bad idea :/ ------ Thriptic What's odd to me about this post and all of the responses in this thread so far is that everyone is only thinking about password length as a way to defend against online bruting attempts when in reality long passwords mostly serve to protect against offline bruting attempts. The reason you don't want 6 or 8 character passwords is that when your password hashes get dumped it's a lot easier to crack them. ~~~ throwaway201606 "What's odd to me about this post and all of the responses in this thread so far is that everyone is only thinking about password length as a way to defend against online bruting attempts when in reality long passwords mostly serve to protect against offline bruting attempts. The reason you don't want 6 or 8 character passwords is that when your password hashes get dumped it's a lot easier to crack them." This is: i) not accurate and ii) bad info Password hash dumps are worthless if the password hashing scheme used is i)crypto-hashing based and ii) uses salt. 6-8 char passwords are not an issue under this scenario. Current password management best practice is to use both standard crypto-hashing algorithms and salt. [https://en.wikipedia.org/wiki/Salt_(cryptography)](https://en.wikipedia.org/wiki/Salt_\(cryptography\)) Almost all platforms use standardized crypto-hashing packages that come as standard libraries in the language these days and those require salt. Further, _almost_ all banks will all use these packages. This is the reason you do not see rainbow tables these days, they are worthless in face of almost any current acceptable crypto-hashing implementation ... assuming one does break rule #1 of crypto and try to roll their own crypto ... [https://security.stackexchange.com/questions/18197/why- shoul...](https://security.stackexchange.com/questions/18197/why-shouldnt-we- roll-our-own) [https://www.schneier.com/blog/archives/2015/05/amateurs_prod...](https://www.schneier.com/blog/archives/2015/05/amateurs_produc.html) .. ad nauseam Salting also has the additional benefit of making brute-forcing magnitudes of difficulty harder. This is because salting rules can be implement that always add non-standard chars.. [https://en.wikipedia.org/wiki/Salt_(cryptography)#Common_mis...](https://en.wikipedia.org/wiki/Salt_\(cryptography\)#Common_mistakes) As others have said, the 6-8 chars limits are are a function of legacy system somewhere in the application chain (online banking is never a single platform, it is usually a front-end that talks to a standard backend that tellers, operations etc also access, usually some type of _greenscreen_ app - which is where the password hashes end up). ~~~ Thriptic I'm not talking about rainbow tables or hash tables, I'm talking about straight up bruting with GPUs and hashcat. You seem to be implying that using a salt adds entropy, but the salt is known (plaintext) and it's added in a set way so it doesn't. Sure your choice of algorithm and complexity factor will definitely affect your guess rate and ease of bruting, and yes using a salt prevents the use of precomputed hash tables, but it's not like it's impossible to crack a salted 6-8 character password hashed with bcrypt if you throw enough GPUs at the problem. The only question is if it's cost effective. ~~~ throwaway201606 Am confused here, is there something I am missing ? Brute-forcing bcrypt-hashed passwords on GPUs has a ridiculously low success rate even on most commonly used password data sets. Failure rate on passwords outside the most commonly used list is more than 95% [https://arstechnica.com/information- technology/2015/08/crack...](https://arstechnica.com/information- technology/2015/08/cracking-all-hacked-ashley-madison-passwords-could-take-a- lifetime/) ~~~ drblast So let's assume a 6 character alpha-numeric password with upper and lowercase. 36^6 possible passwords or about 2.1 billion. The article linked is one guy and one machine who can do 156 bcrypt hashes per second, with salted hashes. That's ~161 days to hash them ALL. If you have a dump of thousands of passwords it's extremely probable to get a few of them in under a day. Which is what the article shows - common short passwords were owned. What's funny about the additional restrictions (you must use 2 upper, 2 lower, etc.) is that they _reduce_ the complexity of this problem so there are fewer possibilities the attacker needs to check for. So you're making it more difficult for users while decreasing actual security against this kind of attack. Much better policy is something like, "at least 16 characters, whatever ones you want." Easier for users because then passphrases are possible, easier to implement because there's only a string length check on the client, and more secure because it doesn't completely rely on users not choosing trivial passwords. ~~~ FabHK > common short passwords were owned. > What's funny about the additional restrictions (you must use 2 upper, 2 > lower, etc.) is that they [...] decreasing actual security against this kind > of attack. Not necessarily - the additional restrictions might prevent even more common short passwords from being used by the users, thus making it harder for both the user and the attacker. (If the bank says you can't use "Password" as your password, then yes, the attacker only needs to check 62^8 - 1 passwords instead of 62^8, making it insignificantly "easier" for the attacker, but at the same time a lot of people must switch from "Password" to something else, making it much harder for the attacker). EDIT to add: Having said that, what you propose (at least 16 chars, no other restrictions) makes perfect sense (maybe introduce a maximum of 32k chars). ------ yellowapple Yeah, this is thoroughly disappointing - and alarming - coming from Troy Hunt. "Secret" security mechanisms that may or may not actually exist (let alone actually prevent attackers from successfully attacking) do not in the slightest bit excuse banks from their abysmal password policies. That he would not only accept that half-baked excuse at face value, but go so far as to regurgitate it and present it as if it's in any way reasonable, means that my perception of his trustworthiness now has a pretty substantial dent. I'm glad he at least acknowledged that banks should modernize their password policies regardless of their other security measures, but he's quite wrong to claim that we end-users shouldn't be incensed by banks' bass-ackwards security policies just because "well um uh they told me they're doing secret things so I'm gonna totally take their word for it and you should too". And no, account lockouts do not address the concerns caused by arbitrary password limits. Arbitrary password limits - be they for length or which characters can or cannot be used - are a rather bright red flag for storing passwords in plaintext, which means that when - _not if_ \- that bank inevitably has some kind of database leak, congrats, now the attackers don't even have to go through the trouble of brute-forcing or rainbow-tabling or whatever a bunch of hashes to get my plaintext password. ------ exabrial My favorite is "locking the account after x number of password attempts". Ever want to annoy the hell out of someone? Try their username or email a bunch of times and lock them out of their accounts. Bonus points if it's one of those super duper ultra secure banks that does password resets via snail mail. /s [I don't condone doxing anyone. My point is that an attacker should not be able to modify the state of a system he's unauthorized to access] ~~~ SamBam That seems to be the least objectionable to me. You need to have _some_ protection against brute-forcing. Whether it's limiting the rate of guessing or whatever, the attacker is still "modifying the state of a system." Indeed, that's a weird rule. When someone stole my credit card number and ran up charges, my bank called me to verify them. How was that not "modifying the state of a system?" ~~~ zAy0LfpBZLC8mAC > You need to have some protection against brute-forcing. Yes, that protection is called "password". > Whether it's limiting the rate of guessing or whatever, the attacker is > still "modifying the state of a system." Which is why you should not limit the rate of guessing (or at least offer that option--limiting the rate of guessing does help users who use terrible passwords, after all). > Indeed, that's a weird rule. When someone stole my credit card number and > ran up charges, my bank called me to verify them. How was that not > "modifying the state of a system?" Which is exactly why that shouldn't be a thing. Being able to pay with a semi- public number is just stupid. You should have to authenticate using a strong password, and "stealing credit card numbers" simply wouldn't be a thing anymore. ~~~ SamBam > Yes, that protection is called "password". [...] Which is why you should not > limit the rate of guessing _Any_ password can be brute-forced if you neither limit the number of guesses nor limit the rate that you can guess them. ~~~ zAy0LfpBZLC8mAC No, it can't. If you are willing to say that a cow can not jump over the moon, then a strong password can not be brute-forced, even though it might theoretically be possible for a cow to quantum-tunnel over the moon, and it might theoretically be possible that an attacker guesses your password. The probability is so vanishingly small that you would call it impossible in any other context. ------ cm2187 Amazon really understands what security means. When it does 2FA, sends you a unique code by email, it disables the option to paste that code back into the login form, you have to type it. You know you are dealing with really competent people when you see that! ~~~ jjoonathan Ah, yes, messing with paste, the ultimate in security. /s ~~~ darkhelmet Hence wonderful addons like "Don't f*ck with paste" to fix such stupidity. ~~~ jjoonathan I've got it installed, and it's good, but the world built a better idiot: sites that use flash, implement their own key event processing, etc. ------ mnm1 Good points, however this one is wrong. > Banks typically use customer registration numbers as opposed to user-chosen > usernames or email addresses so there goes the value in credential stuffing > lists. I've had accounts at most of the major US banks and I don't think I can think of a single one that did this. Almost every single bank allows the user to select a username or occasionally uses email for login. This is not a good argument for Chase, Citi, Amex, Discover, Capital One, Barclays, and a whole bunch more I can't think of off the top of my head. ------ lovehashbrowns That whole blog post was sad, but this quote was particularly dumb: > Banks like ING will give you your money back Now, I don't have any experience with having my bank account hacked, but I have had experience with my credit card getting used without my consent, and it's NOT a fun process. I can't even imagine how that'd go with a bank and a checking account. I can only guess that you have to 1. get the right customer rep on the line and 2. wait a good while. ------ blackbrokkoli People tend to get lost in mathematical technicalities in these discussion. Yes, even really dumb limitations leave 100k+ possibilities open, much more than you can brute force with a three-strike-lockdown. But that's not making it ok. Even if some crafty hackers on the other side of the world find a way to crack my account I'm confident the bank will look at the possible PR and legal costs and just refund my money fully, yes, yes, wonderful. That is not the problem. The problem is _user inertia_. Let me speak as an averaged one, mixed with my own deeds prior to being knowledgeable in cyber security. If I'm forced to remember my password because my password manager gets shut out or because of weird requirements, like uppercase letter + two numbers + non-alphanumeric, I'm nudged to use the same variation of my "default password" I used before, 27 times. "DognameBirthyear&". "+KeysThatAreCloseOnTheKeyboard1234+". And of course, I use a slight variation of that for everything. Shady web- server-under-the-desk web forum in 2007 three of my friends were on. Indie game servers, another classic. Bank. Google. It also was my facebook password which I gave to my bff once to check if that cute boy really liked me. It also can be guessed by obtaining my ID and watching me super slowly type the added non-alphanumerical at the end. _This_ opens the very real possibility of revenge of ex partners, witty people at the coffee shop gaining access and the like. Crimes are committed overwhelmingly by people knowing the victim. No fancy AI is gonna help you with that, reasonable withdraws in the middle of the day in your time zone from your own MacBook's IP address. Good luck with customer support. You are enabling THAT with your dumb requirements. And why?? You are a _bank_ , hire someone who knows their job and does not just act on blog spam FUD or whereever you got the idea of exactly 5 digits numbers only. No, I choose to be mad about this because there is no excuse for such horrifying UX _and_ security. Just enforce a minimum limit of like four characters to prevent breach by putting down coffee mug on keyboard, enforce a maximum limit so you don't fall victim to an embarrassing flavor of DOS attack. If you feel fancy, throw a bunch of money at haveibeenpwned to check whether people are putting dumb passwords and let your local RegEx wizard check against all other silliness. There you go. I even waive you the $150k fee for that extraordinary piece of consulting. ------ whitepoplar Given the nature of HN, I'm sure many of you have had inner-contact with financial technology infrastructure. Are there any banks that stand out for their technical competence/incompetence? Which bank(s) would you patronize/avoid? ------ pier25 Not sure why but banks seem to be consistently bad at web dev, at least on the front end. I have never used a good looking modern web app from a bank. Usually it's a slow bloated crap that looks and works like a project from 10-15 years ago. ------ joeblau I have USAA and they are pretty bad as well. Max password length is 20 characters. They only do MFA through cell phone numbers and email which allows someone to Sim-Swap if they are able to get your username and password. To top it off, they have a mobile app knock-off 2FA screen, but you _can not_ see it when you're trying to log in to your account via the mobile app because the modal doesn't let you leave the input screen. I was going to write them an email, but they have no clear email to report security concerns so I figured they don't care. ~~~ yellowapple Extra stupidity: you literally can't use the USAA app on a rooted Android device; it'll detect that the phone's rooted and refuse to let you login. God forbid I assert control over my own goddamn device, right? It ain't USAA's job to lecture me about my own device security; its job is to shut up and show me information about my car insurance. ------ paulpauper the money is in hacking bitcoin/crypto-related stuff anyway. Get the 12 words and there is nothing than can be done to recover the $ and nearly untraceable. hacking banks is overrated unless you can not onyl produce a facsimile of the victim including ID and other docs but also get past all the restrictions and then not be found and arrested in the process. ------ evanb I recently lived in Germany and was impressed by the security mandated there. In order to do anything of note (meaning where you could lose money) you were challenged to produce a TAN, one six-digit number from a one-time pad of ~100 that the bank mailed you. You produce that number, cross it out, and never use it again. Also available were SMS TANs, where they texted you a code. I avoided these after reading about SIM swapping. But, further, was a photoTAN. The bank mailed me a private key that I entered into a reader app. Then they would present me with a QR-code-like image that the app could read and decrypt into a six-digit code via the secret key. Type that in, good to go. The reader app and the banking app also had some message- passing thing where if you were banking on your phone (and couldn't take a picture of your own screen...) it could still work. ------ ineedasername If the thesis of this article were correct then there really shouldn't be much of any account hacking. I couldn't find anything that gives the prevalence of this, but there's tons of "what to do if hacked" articles and lots of posts on reddit/message board about "I was hacked! Will I get my money back?" Also, if the first line defense with passwords is poorly designed, why would these security-by-obscurity hidden ones be any different? Sure, you sign in form a new computer (or one that had its cookies deleted) and the site says "You haven't used this computer before, answer this security question: What is you Father's middle name?" That isn't a high barrier. If you know my name and a little about me, plenty of white-pages style sites show relatives etc. ------ daveFNbuck Having 100k possible passwords and locking my account after 3 failed attempts does a pretty good job protecting a single account from being brute-forced, but you can still brute force access to some accounts if you can guess enough usernames. ------ NotATroll > Do you really think the only thing the bank does to log people on is to > check the username and password? Yes. Yes I do. If you're putting arbitrary limitations on a user's password length, down to _6_ characters even. I see no reason why you wouldn't be equally as insane with the rest of your system. And, frankly speaking. The whole "you're locked out after 3 attempts" non- sense is complete crap. What is this now? We're supposed to believe databases don't get hacked into, and hashed passwords aren't leaked on the net for countless people to hack at and break? This sentiment leads me to believe the passwords are stored in plaintext. ------ shin_lao When the accounts of our company started to be beyond the low 6 figures, we got upgraded by our bank to a different online banking system with a smartcard and a keypad for strong 2FA. Our admin team is informed every time someone logs in the system, and wiring money is a 2 phase process. If a transaction is unusual, the bank usually contacts us. So yes, I do think banks have additional protection measures, it's just not worth it for smaller amounts where the insurance will just cover it. ------ atoav I don’t see how a bank that in 2019 doesn’t manage to have a decent password policy earns any trust on that front. If they allow for longer passwords with more characters the perceived security rises and in the age of password managers the usability gets better. If these advantages don’t outweigh the disadvantages of a bank, one could read this as a red flag regarding the systems behind that interface. ------ nitwit005 > banks aggressively lock out accounts being brute forced This is good, because it means people can't brute force the 5 digit password they forced you to use, but also bad, because if someone doesn't like you, they can easily block access to your bank. If the account numbers are sequential, or otherwise patterned, they may be able to block access to all users without using all that much bandwidth. ------ te Sure, three-strikes-and-out reduces probability of brute forcing any particular account with forced 5-digit password, but if an attacker has a list of just 25k usernames, odds are that at least one is going to get brute- forced. ------ JulianMorrison A bad short password is only protected against crude online guessing by aggressive lock-outs. If those passwords leak in hashed form, having a small search space means they can be broken offline with ease. ------ meuk My bank allows arbitrary length, but enforces certain special characters while disallowing others. Which means I can't use the (long and secure) password and have to write it down. Not sure what they hope to accomplish. ------ zAy0LfpBZLC8mAC Sorry, but that article is just dumb. For one, obviously, the possible existence of other security mechanisms is exactly no reason for intentionally breaking password security. Either you store passwords as plain text, in which case you have just failed, or you are storing a hash, in which case there is no cost to doing the right thing and accepting arbitrarily long passwords. There is no way to start with "we have other security mechanisms in place" and end with "therefore, we should weaken password security". And if an organisation is incapable of understanding that trivial piece of logic, I have very little hope for their supposed magic security solution. But even worse: The idea that locking users out after so many failed attempts is a security mechanism. When a small bandwidth of unauthenticated requests can disable a critical service, that is known as a denial of service vulnerability and not a security mechanism. If you have proper passwords, locking users out is completely useless for security, but it's still a DoS vulnerability. A brute force attack will not crack a 128 bit random password, no matter the rate at which it is tried. And while non-public user IDs can help mitigate that risk, it is not at all a given that banks don't use essentially public account numbers as user names, even ones that have 6-digit password limits. Plus, the user ID at that point effectively becomes part of the password, just that it's a password that you can't change, which isn't exactly brilliant either. And finally: It's quite a failure at assessing attack scenarios if you think that user lockout actually solves a problem. Your typical bank has a failure counter per account. A failure counter that is reset on every successful login. So, the real number of attempts an attacker could make is the number of attempts you have before lockout minus one, multiplied by the number of successful logins by the customer. An attacker might not necessarily be able to know very well when the user has logged into their bank account, which sure will limit the exploitability somewhat, but then, that very much depends on the circumstances. If you know someone pulls their transactions every 15 minutes, say (especially a business, which might even leak the time they pull transactions by sending payment receipts in response, for example), then you might very reliably be able to make 8 guesses per hour, or ~ 70000 per year, without causing lockout. If you instead want to target the general public, you might also just use a bot net to attempt login into accounts only occasionally, risking some lockout, but statistically compromising a certain number of accounts over time. And all of that when proper passwords do solve all of those problems perfectly reliably. Oh, yes, and the idea that some banks will give you your money back? Seriously? Now, if that isn't a failure at assessing risks, I don't know what is. Who seriously believes that banks will give you your money back on your word that you didn't authorize some transaction? Of course, they won't, they'd be wide open to fraud if they did. If the attacker is good enough at making it seem like the customer authorized the fraudulent transaction, obviously, the customer won't get back a cent. Those claims by banks are marketing bordering on fraud, and obviously not something anyone claiming to be an expert in security should just trust to be something you can rely on. ~~~ gruez >When a small bandwidth of unauthenticated requests can disable a critical service, that is known as a denial of service vulnerability and not a security mechanism. But what's your threat model here? Some attacker who's targeting you that somehow got your randomly assigned username but not your password? Or someone hitting every account number for "the lulz"? In the first case, it can be resolved with a 10 minute call to the bank to get your username changed (although you have bigger issues if your attacker was able to get sensitive information such as your banking username). In the second case, the attacker will get ip banned/rate limited very quickly. >If you know someone pulls their transactions every 15 minutes, say (especially a business, which might even leak the time they pull transactions by sending payment receipts in response, for example), then you might very reliably be able to make 8 guesses per hour, Sounds like a very non typical use case. Most businesses I know pull transactions end/start of day. Considering most/all banking transactions (ie. not done through a third party platform like venmo) are done daily, this isn't surprising. Even then, this exploit only works if there isn't a persistent login fail counter. Getting a password wrong twice before getting it right is ususal a couple times a day. Doing that 10+ times a day is definitely suspicious. >Who seriously believes that banks will give you your money back on your word that you didn't authorize some transaction? Of course, they won't, they'd be wide open to fraud if they did. AFAIK they're obligated by law. ~~~ zAy0LfpBZLC8mAC > But what's your threat model here? What do I know? DoS attacks are a thing, so that's the threat model?! > Some attacker who's targeting you that somehow got your randomly assigned > username but not your password? You are assuming the username is randomly assigned. > In the first case, it can be resolved with a 10 minute call to the bank to > get your username changed Wut? For one, how is being denied access to your capital for ten minutes in any way "solving" the DoS risk? Then, how does that even solve anything if the attacker simply disables your account again within a few seconds? If your suggestion is that using the username as the password somehow is supposed to protect you, I have bad news for you: You usually can't change your username, so you can not change that "password" to something the attacker doesn't know. > (although you have bigger issues if your attacker was able to get sensitive > information such as your banking username) You have it all backwards? The sensitive part is what is called the password. If your username is sensitive, you are already doing it all wrong. Especially because, see above, you can change your password, you can not (usually, easily) change your username-pretending-to-be-your-password. > In the second case, the attacker will get ip banned/rate limited very > quickly. You have heard of this thing called a bot net, right? Also, congrats, you have just introduced the next DoS risk: If you happen to use an ISP where your IPv4 connectivity is only through NAT, and given that most banks are IPv4-only, suddenly, some random customer of that ISP, or the malware on their machine, can disable your access to your account. You know what would actually solve that problem? Wait for it ... it's passwords! Like, proper, real, high-entropy passwords. Who would have thought? > Sounds like a very non typical use case. The idea that banks should only be secure for "typical use cases" primarily sounds like a very bad design principle. > Most businesses I know pull transactions end/start of day. Considering > most/all banking transactions (ie. not done through a third party platform > like venmo) are done daily, this isn't surprising. Except other countries have a slightly more modern banking infrastructure. All of the EU is currently introducing realtime money transfers with a guaranteed payment delay of maximum 10 seconds between any two banks in the EU. Pulling transactions only every 15 minutes seems like quite a massive delay in comparison. > Even then, this exploit only works if there isn't a persistent login fail > counter. Getting a password wrong twice before getting it right is ususal a > couple times a day. Doing that 10+ times a day is definitely suspicious. Well, yes, sure. But for one, that there is a persistent login fail counter is a big if. If you are lucky, maybe there is. If there isn't, the bank will blame you. And also, regardless, the problem still remains: There definitely is no permanent login fail counter. Customers occasionally do mistype their passwords, and that does not lead to lockout. But whatever the real maximum rate of failed attempts is: The total number of possible attempts is more than the advertised supposed maximum number of attempts. > AFAIK they're obligated by law. They are obligated to do what? Give you back your money because you say so? Certainly not. Be able to determine with 100% accuracy whether a transaction was fraudulent? Yeah, sure?! ~~~ gruez >What do I know? DoS attacks are a thing, so that's the threat model?! It matters because you need to consider the attacker's motivations, goals, and resources. >You are assuming the username is randomly assigned. So? If not randomly assigned, the best you can do is enumerate all users in an unpredictable manner. It's not like sequential usernames allows you to easily guess the username for a specific person. >Wut? For one, how is being denied access to your capital for ten minutes in any way "solving" the DoS risk? Then, how does that even solve anything if the attacker simply disables your account again within a few seconds? It solves the DoS risk because it makes subsequent attacks sufficiently hard to perform afterwards. If your username can be leaked within seconds, the attacker probably has access to perform more devastating attacks than a simple DoS. >You usually can't change your username, so you can not change that "password" to something the attacker doesn't know. You might not be able to change your username online, but support can probably change it. >You have it all backwards? The sensitive part is what is called the password. If your username is sensitive, you are already doing it all wrong. Especially because, see above, you can change your password, you can not (usually, easily) change your username-pretending-to-be-your-password. Yes, usernames are supposed to be identifiers only, but keeping it a secret from your enemies isn't particularly hard. Please explain how the attackers are getting a hold of your username in the first place. >You have heard of this thing called a bot net, right? Here's why you need to consider the threat model. If it's some guy out for the lulz, using a botnet incurs a cost (both in terms of actual risk in terms of detection, and opportunity cost in terms of other things he could be using it for eg. credit card fraud, DDoS for fire, etc.). And the guy is willing to expend unlimited resources, then all bets are off. He could use amplification attacks to take down the bank's website by raw bandwidth alone. Worst case the bank mails/emails everyone new high entropy usernames. >Also, congrats, you have just introduced the next DoS risk: If you happen to use an ISP where your IPv4 connectivity is only through NAT, and given that most banks are IPv4-only, suddenly, some random customer of that ISP, or the malware on their machine, can disable your access to your account. Strange. I can log into my financial accounts while using VPN without a problem. You'd think that a VPN service that anyone can sign up for anonymously would invite more abuse than an ISP that you need to provide real credentials for. >You know what would actually solve that problem? Wait for it ... it's passwords! Like, proper, real, high-entropy passwords. Who would have thought? You seem to be misunderstanding Troy's position. He's not saying it's ideal, or even good practice. He's merely saying it's not as bad as you think. ie. having a 6 digit numeric password doesn't mean you're going to get you hacked within minutes. >Except other countries have a slightly more modern banking infrastructure. All of the EU is currently introducing realtime money transfers with a guaranteed payment delay of maximum 10 seconds between any two banks in the EU. Pulling transactions only every 15 minutes seems like quite a massive delay in comparison. I have a feeling that businesses that need low latency transactions aren't doing so by scraping their bank's web page. They're probably using some sort of payment provider, or the bank has an API. >Well, yes, sure. But for one, that there is a persistent login fail counter is a big if. If you are lucky, maybe there is. If there isn't, the bank will blame you. If anything, having a weak password gives you more plausible deniability than having a 256 bit entropy password. >They are obligated to do what? Give you back your money because you say so? Certainly not. Be able to determine with 100% accuracy whether a transaction was fraudulent? Yeah, sure?! That's the point of obligating it by law. It's consumer protection to give them the benefit of the doubt. If you have an airtight case against the bank you wouldn't need it in the first place. I'd think you understand this concept, given that you're from the EU. In any case, here's a citation for you: [http://www.nbcnews.com/id/8915217/ns/technology_and_science-...](http://www.nbcnews.com/id/8915217/ns/technology_and_science- security/t/know-your-rights-bank-account-fraud/) ~~~ zAy0LfpBZLC8mAC > So? If not randomly assigned, the best you can do is enumerate all users in > an unpredictable manner. It's not like sequential usernames allows you to > easily guess the username for a specific person. ... or just use their account number that's on their website. Really, what's your point? Yes, you can potentially use some usernames as passwords. Doesn't mean it's somehow more sensible than using passwords as passwords. > It solves the DoS risk because it makes subsequent attacks sufficiently hard > to perform afterwards. If your username can be leaked within seconds, the > attacker probably has access to perform more devastating attacks than a > simple DoS. What? Denying you service prevents denying you service because it makes denying you service any longer sufficiently hard, except it doesn't, because that's just another three requests? > You might not be able to change your username online, but support can > probably change it. So, now you are just pulling stuff out of your ass? And in any case, how does any of this make any sense? Having bad passwords is a good idea, because we can use the username as a sort-of password? Sure you can, but why the heck not use the password as the password? > And the guy really does have resources for a botnet, then all bets are off. > He could use amplification attacks to take down the bank's website by raw > bandwidth alone. Erm, yeah? And why should he do that if a low-bandwidth attack does the job just fine? And in any case, how is the fact that there is one kind of DoS attack vector that you can not prevent a reason to also add another DoS attack vector, and to then use that to justify that you put in effort in order to weaken password security? Like ... what's your point? > Strange. I can log into my financial accounts while using VPN without a > problem. You'd think that a VPN service that anyone can sign up for > anonymously would invite more abuse than an ISP that you need to provide > real credentials for. Which is a reason for building weakened security how exactly? > You seem to be misunderstanding Troy's position. He's not saying it's ideal, > or even good practice. He's merely saying it's not as bad as you think. ie. > having a 6 digit numeric password doesn't mean you're going to get you > hacked within minutes. Yeah, having a root ssh account on your server with password "test" doesn't get you hacked within minutes. So, how is that an argument? There is real security, which doesn't get you hacked in decades, and then there is everything else that is pointlessly insecure, and in this case way less secure than he suggests in any case. > I have a feeling that businesses that need low latency transactions aren't > doing so by scraping their bank's web page. They're probably using some sort > of payment provider, or the bank has an API. ... and banks use the exact same idiocy on their APIs, correct. Why would they not if they are convinced that that is how you are secure, as they seem to be? > If anything, having a weak password gives you more plausible deniability > than having a 256 bit entropy password. Well, sure. But then, not ever having any unauthorized transactions means you don't have to worry about plausible deniability? > That's the point of obligating it by law. It's consumer protection to give > them the benefit of the doubt. Erm ... you do realize that that can not possibly be the case, right? That a bank can not possibly be obligated to give money to a customer simply because the customer demands it? > If you have an airtight case against the bank you wouldn't need it in the > first place. I'd think you understand this concept, given that you're from > the EU. You are completely missing the point. There are cases where the bank is at fault (like, they simply handed your money to someone else for no reason) and you can show it. That's the case where the bank's general liability would be all you need. Then, there are cases where the bank received an order to execute some payment that was authenticated with your credentials. Now, as subcategories of that you have the actual legitimate payment that you ordered, the somehow fraudulent order where you were defrauded and the bank can tell, somehow, and the somehow fraudulent order where the bank doesn't see any signs of fraud and you can't demonstrate it either. Banking regulation and/or voluntary guarantees usually (mostly) cover that second subcategory. But there is no way to possibly cover the third subcategory: That is the category or fraudulent transactions that are indistinguishable from legitimate transactions by anyone but you, and you obviously have a conflict of interest, so your word that some transaction was fraudulent obviously is worthless in determining whether it was. Anyone who wanted to defraud a bank could submit a legitimate transaction and then claim that is was fraud, so that alone can not possibly be sufficient to get your money back. ~~~ NLips In the UK at least, the regulations cover the third category i.e. where you can't demonstrate fraud, but neither does the bank have reasonable grounds to suspect you acted fraudulently. From [https://www.fca.org.uk/consumers/unauthorised-payments- accou...](https://www.fca.org.uk/consumers/unauthorised-payments-account), explaining when a bank is allowed not to refund you (although they are allowed to refund you and then ask questions and report you to the police). """ Why a refund can be refused Your bank can generally only refuse a refund for an unauthorised payment if: \- it can prove you authorised the transaction – though your bank cannot simply say that use of your password, card or PIN conclusively proves you authorised a payment \- it can prove you are at fault because you acted fraudulently or because you deliberately, or with ‘gross negligence’, failed to protect the details of your card, PIN or password in - a way that allowed the transaction \- you told your bank about an unauthorised payment 13 months or more after the date it left your account, so make sure you contact the bank as soon as possible. """ [edit - remove block formatting] ~~~ zAy0LfpBZLC8mAC Gee, what is your point? Whatever the exact rules are: There are cases where the bank will not be able to distinguish an actually fraudulent transaction from a legitimate one. In those case, you, the customer, will be stuck with the loss, there just is no way around that, other than preventing the loss in the first place. ~~~ NLips "There are cases where the bank will not be able to distinguish an actually fraudulent transaction from a legitimate one. In those case, you, the customer, will be stuck with the loss" No, that's contrary to the FCA regulations. In cases where you can't tell if there's been a third party committing fraud, the benefit of the doubt must be given to the consumer. If the bank cannot demonstrate that the consumer is committing fraud, they cannot refuse the consumer their money. It's obviously complete nonsense to say "_whatever the rules are_, in scenario X the bank will be able to do thing Y"; in this case the rule is "in scenario X, the bank is not permitted to do thing Y". ~~~ zAy0LfpBZLC8mAC > In cases where you can't tell if there's been a third party committing > fraud, the benefit of the doubt must be given to the consumer. Which is why I obviously was not talking about that. > If the bank cannot demonstrate that the consumer is committing fraud, they > cannot refuse the consumer their money. OK. Now, the bank demonstrates that you committed fraud (that you didn't). Now what? ~~~ NLips If the bank satisfies a court with evidence to show the customer committing fraud, then the customer won’t get their money back. Just like if the CPS satisfies a court that someone committed murder, prison will follow even if the person didn’t kill anyone. This thread is rapidly losing value to readers now, since you seem to be dishonestly representing what you’ve previously said, at best guess because you don’t like to be wrong. Quoting you: “the somehow fraudulent order where the bank doesn't see any signs of fraud and you can't demonstrate it either.” “That is the category or fraudulent transactions that are indistinguishable from legitimate transactions by anyone but you” “There are cases where the bank will not be able to distinguish an actually fraudulent transaction from a legitimate one.” Only now have you changed this to apparently mean the bank can falsely prove the customer committed fraud. There’s nothing wrong with not being up to speed on recent banking regulation changes in the UK. There is something wrong with pretending you were saying something you weren’t, just for the sake of internet points. ~~~ NLips I’ll add an example to help get across how the regulations have changed: If someone calls me pretending to be my bank and tricks me into giving them enough details (passnumbers etc) to move money out of my account, or persuaded me to authorise transactions they’re making (because I think they’re the bank saving the money from being stolen by someone else), then the transactions will look real to the bank. Previously, that was my problem. Now it is the bank’s - I may have divulged my details in good faith, but I didn’t give the criminal any money. The bank, unwittingly, gave the criminal money. The bank is no longer allowed to claim it was my money. Rather, the bank still owes me my deposit - nothing has happened to change that. This has been a more commonly occurring crime in recent years, and the regulations are specifically there to: Protect the consumer Put the onus on the bank, to encourage them to do better protecting their money. ------ mark-r I haven't been able to log into my bank for something like 10 years, because their password restrictions made me pick a password I couldn't remember. ------ systematical Still waiting on two-factor authentication from my bank. Even just basic SMS with a 4 or 5 digit code like Vanguard does would be nice. ------ htfu I cannot believe _ANY_ banks are using passwords at all in this day and age. Reading discussions like this makes my brain hurt - even a decade and a half back we were on chip and pin card readers for login/signing verification, now since a long time back there's a universal app-based 2fa equivalent (Mobile BankID). That's not the case for "my bank(s)" but all banks here. I wonder what makes the US/UK/AUS so special? It's all incredibly alien. ~~~ jbarberu Moving from a country with Mobile BankID to the US, all I can speculate is that it's not a big enough problem for the banks to make the investment. Similar to the healthcare system keeping the status quo is "cheaper" until you're one of the unlucky ones... ------ nsfyn55 They do matter but not for the reason you'd first think. It's about liability. Imagine a bank testifying in a hearing about a recent data breach. They are going to want to give the perception that they have done everything within reason to protect their user's data. Password restrictions are a cheap feather in one's due diligence cap. ~~~ zAy0LfpBZLC8mAC So ... how exactly is "your honor, we didn't allow passwords longer than 5 chars" going to help them, you reckon? ~~~ nsfyn55 Easy. Civil law operates on a concept called "preponderance". It's not absolute in nature it's a measure of likliehood as measured by non subject matter experts(a judge and some randos). Imagine a person has fallen on your property and injured themselves. If you are known in the neighborhood as a person that takes care of your sidewalk(shovels, patches broken concrete, etc.) and can produce evidence(character witnesses, testimonials, visuals) to that effect your case is strengthened. No one ever got directly hacked because their password was too strong, but lots of people have had passwords guessed by brute force. So put the two together. Its beneficial to have strong passwords because they can be presented as evidence of due diligence and there is no security risk to enforcing them. There may be some business risk(people fleeing because they don't like your password policy) but someone needs to quantify that its a problem for it to be considered in the calculus. ~~~ zAy0LfpBZLC8mAC That is a lot of text for not addressing my point at all!? ~~~ nsfyn55 You asked how it would help and I explained exactly how it would help. I directly addressed your point. Your content free, one sentence response not withstanding. Is there something specific you'd like clarification about? ~~~ zAy0LfpBZLC8mAC How exactly you think preventing your customers from using secure passwords is going to demonstrate due diligence? ~~~ nsfyn55 Look at that sally, a false equivocation right out of the gate. I'll just change your text so that it represents what I actually said .... >How exactly does taking steps that have previously been used in civil suits to demonstrate due diligence such enforcing password requirements going to demonstrate due diligence? Well I'm glad you asked billy! The answer is tautology. Thanks for playing. This argument is stupid. You want to talk about yak shaving, theoretical nonsense. FWIW I agree with you and think that password requirements are dumb, but you live in the real world. These are the legal realities of IT policy. ------ QuantenGhost What I hate is the impression. You can have mitigation controls galore. I trust that they all do. However, it's difficult for average customers to understand that. When even NIST has longer password recommendations, people who hear that "long passwords are safer" should have that option. Banks are relatively arbitrarily depriving security conscious people of that nominal opportunity to try to practice good password hygiene. The line is that password resets increase with password length. I'd be fine with that. I am an Information Security professional, customer of financial institutions, and started my earliest engineering career for a large bank.
{ "pile_set_name": "HackerNews" }
Show HN: How to stop iOS9 daily prompts for iOS10 upgrade - walterbell iOS9 automatically downloads iOS10 and then prompts daily for permission to upgrade. The dialog only allows deferral of upgrade, no option to decline. Since it usually takes a few point releases for Apple to stabilize a new major version, you may not want to spend the next few months postponing this dialog box every day.<p>To stop the iOS10 upgrade prompts:<p><pre><code> Settings General Storage &amp; iCloud Manage Storage, scroll down through the list iOS10 Update -&gt; Delete </code></pre> Go back to enjoying stable iOS9 workflow and battery life. Avoid security threats for which fixes were disclosed in iOS10. ====== rubyfan Thank you.
{ "pile_set_name": "HackerNews" }
On the Moon, astronaut pee will be a hot commodity - rbanffy https://arstechnica.com/science/2020/05/on-the-moon-astronaut-pee-will-be-a-hot-commodity/ ====== nurettin Does this mean that all this pee on earth is going to waste along with all the water that carries it simply because we haven't thought long and hard enough on this issue?
{ "pile_set_name": "HackerNews" }
Westinghouse Files for Bankruptcy, in Blow to Nuclear Power (2017) - mzs https://www.nytimes.com/2017/03/29/business/westinghouse-toshiba-nuclear-bankruptcy.html ====== dang Discussed at the time: [https://news.ycombinator.com/item?id=13987046](https://news.ycombinator.com/item?id=13987046) ------ epistasis This article is more than three years old, but the story hasn't changed much. VC Summer was abandoned, leaving utility customers with massive bills. Vogtle soldiers on, but seems to be unlikely to finish. Nucleae's problems are not the politics, the problem is that basic competency in design and construction logistics have been lost. Plans get delivered to construction that are "unconstructable," but construction soldiers on and wings it. Then it al has to go through design review again. And maybe redone. Delays delays delays. Incompetence abounds. All the partners are planning from the beginning for a massive lawsuit at the end, and work harder to limit their liability (or create liability for others?) than to make the project work. Executives lie about the progress, there are guilty pleas to fraud: [https://www.postandcourier.com/business/former-scana- executi...](https://www.postandcourier.com/business/former-scana-executive- pleads-guilty-to-fraud-charges-tied-to-failed-sc-nuclear- project/article_26e23ca8-c50b-11ea-8377-e7b39854212b.html) 20 years ago, I though nuclear was essential to fighting climate change. Today, I don't see how nuclear can ever help. We can't build it before it's too late, and by the time we build anything other technology has completely leapfrogged it. We started these two AP-1000 reactors in 2008! A dozen years later we have nothing to show for it except for bankruptcy, plea deals, billions of dollars that would have been more effectively spent on solar and storage. ~~~ CydeWeys Yup. For all the people boosting nuclear power, the reality on the ground seems to be that it just does not work anymore. It's way too expensive and never gets done, and this problem is global, not just in the US; see e.g. [https://www.popularmechanics.com/science/energy/a33499619/fr...](https://www.popularmechanics.com/science/energy/a33499619/france- nuclear-reactor-epr-expensive-mess/) At some point the results have to speak for themselves, and solar/wind plus battery storage is actually working and being built. That seems a more realistic path forward than nuclear power, which is demonstrably failing over and over. ~~~ kurthr Yes, but what will we do if/when wind and solar just "doesn't work anymore". In the US trains "don't work anymore"... but they do in other countries. This gradual erosion of technical capability is a generic problem the US needs to solve. Nuclear is a case study of what is wrong and where the problems are (political, business, education). ~~~ manicdee The way the US chose to address accidents in rail was to armour plate their rail cars. In Europe they worked on better processes to ensure trains don’t run into each other in the first place. The erosion of technical capability in rail is driven by the legislature. You have many states that will need to work together to completely abandon the US regulations on rail, adopt European regulations, and replace every piece of rolling stock to comply with the new regulations. That’s quite the undertaking, but achievable since the required expertise still exists outside the USA. The erosion of technical capability in nuclear power is likely unsolvable. There is no brains trust outside the USA from which to borrow the knowledge of metallurgy, concrete, site preparation, building design, or even design for manufacture. This is rebooting the entire industry from scratch to produce an unprofitable product. ~~~ bobthepanda Actually now the US has alternative compliance regulations that let operators use European stock without waivers: [https://pedestrianobservations.com/2018/11/20/fra-reform- is-...](https://pedestrianobservations.com/2018/11/20/fra-reform-is-here/amp/) Now the problem is getting operators to actually buy such equipment, and then operators getting the slots and ability to run these at a usable frequency, speed, and reliability. ------ danans Anyone know of there is a connection beyond history and a logo between the nuclear power plant company and the household lighting company? [http://www.westinghouselighting.com/](http://www.westinghouselighting.com/) ~~~ kn0where They used to be the same company: [https://en.m.wikipedia.org/wiki/Westinghouse_Electric_Corpor...](https://en.m.wikipedia.org/wiki/Westinghouse_Electric_Corporation) ------ LanguageGamer Somewhat tangential, but wikipedia has good article on the cost of different energy sources: [https://en.wikipedia.org/wiki/Cost_of_electricity_by_source](https://en.wikipedia.org/wiki/Cost_of_electricity_by_source) The cost of nuclear energy has been flat for decades, but the cost of sources like solar has been plummeting. Nuclear doesn't have much of change without some technological break through. ~~~ nabla9 Nuclear and renewables are not 1:1 match or comparison. Nuclear provides steady source of electricity 24/7. If you want same from renewable, you must add the cost of energy storage and the cost of overcapacity. ~~~ epistasis Same for nuclear though, a steady source of power is not a good fit for our energy use. You have to start building thermal or battery storage, or do specialized more-expensive designs that can operate at variable power, or get customers to shift their load. ~~~ xenspidey Just make hydrogen during off-peak hours and get the hydrogen powered vehicles up and running. ~~~ epistasis Same goes for renewables, but the electrons are cheaper and easier to get on the grid! ~~~ xenspidey Off-peak hours for solar is also when there is no sun, so no. Wind isn't constant either. We need a constant 24/7 source of uninterruptible energy. ~~~ epistasis Important to define the "peak" part of "off-peak" here. Is it peak production, peak differential between supply demand, etc. Mid-day is off-peak for solar in many markets, and they curtail their output so that they don't oversupply. As there is more solar built, more and more will be curtailed. Both nuclear and solar would need a hydrolysis system that was economical even if not run 24x7 in order to utilize their supply-demand mismatches. This is the biggest road block to hydrogen production with the GWh of "free" electricity that we could currently be generating in the spring in California, but currently just don't use. ------ HPsquared Traditional light water reactors are pretty much dead at this point, they are not economic with the layers upon layers of required safety equipment. What's needed is simplification - there are a wide range of inherently / passively-safe Generation 4 designs - of which my particular interest is in the molten salt designs (e.g. Terrestrial Energy's Integral MSR) which could be made MUCH smaller, simpler and cheaper than traditional reactors. These might never clear the various financial, regulatory and technical hurdles, but one can hope... ------ look_lookatme Why is this article from 3 years ago on the front page? ~~~ arkanciscan Sweet sweet karma points
{ "pile_set_name": "HackerNews" }
Facebook told by Belgian court to stop tracking non-users - denzil_correa http://www.bbc.com/news/technology-34765937 ====== tdkl Good, I hope they'll pay as much money as it gets until this is removed. FB is a sleazy company by its core. In other news, their FB Messenger app will scan the phones Camera roll for new photos, recognize faces and offer sharing to your friends it recognized. In certain regions only for now and of course it's opt-OUT by default [1]. [1] [http://9to5mac.com/2015/11/09/facebook-messenger-photo- magic...](http://9to5mac.com/2015/11/09/facebook-messenger-photo-magic-scans- friends/)
{ "pile_set_name": "HackerNews" }
Apache Mesos is not as reliable a we used to think - tailhook https://medium.com/@paulcolomiets/evaluating-mesos-4a08f85473fb ====== preillyme Pretends to be a common standard for different solutions? ~~~ tailhook Ah.. yeah, my English is not very good. I mean Mesos tries to be platform to build on top. Some common denominator for other solutions.
{ "pile_set_name": "HackerNews" }
Why I like comments - brilliant http://scripting.com/stories/2010/08/24/whyILikeComments.html ====== aphyr _But rebuttal, esp principled rebuttal, really doesn't add anything to a comment thread._ Ever wonder why Winer's purportedly popular blog has so few comments? Now you know!
{ "pile_set_name": "HackerNews" }
Australia says it's under nation-state cyberattack - CalmStorm https://thecyberwire.com/newsletters/daily-briefing/9/119 ====== dang [https://news.ycombinator.com/item?id=23569524](https://news.ycombinator.com/item?id=23569524) ------ dicomdan Should the international laws be amended to consider state-led cyber attacks an act of war in additional to traditional aggression? Seems like UN Security Council should deal with these matters. ~~~ caymanjim International law barely exists and is unenforceable. If a superpower-- especially a permanent Security Council member--wants to do something, there's absolutely no recourse. Look at Russia and Crimea. That's the most egregious violation of the notion of international law in recent history, and nothing of consequence happened. The big powers can do whatever they want, and the worst response will be token economic sanctions. China is so economically intertwined with the world that nothing at all would happen unless they nuked someone. ~~~ speeder There are better examples than Russia and Crimea. I am not Russian, and have nothing to do with Russia or Ukraine or whatever (I am Brazillian, of Iberian descent). Still, Crimea was not a "invasion" or "conquest". Long story short: Russia invaded Crimea in 1700s, taking it from Tartars. When a Ukranian became leader of URSS, he "gave" Crimea to Ukraine, it was only nominal, nothing changed in Crimea itself, the place still was basically a navy base for Russia. When URSS broke up, because of previous decision, it was decided Crimea was Ukranian, except most of population there is Russian (including a huge amount of Russian military), and their only warmwater seaport deep enough for the good warships Russia had, was still there, to make this work, Russia "rented" the place from Ukraine. When Ukraine most recent revolution happened, do you think all the Russian military personel families that live there since 1700s would want to leave? Now... if you want to claim what is happening in Donbass is a invasion, then that is more plausible. ~~~ 8ytecoder Is URSS a Brazilian way of saying USSR? Edit: it’s an alternate spelling. I had not heard that before. [https://en.wikipedia.org/wiki/URSS](https://en.wikipedia.org/wiki/URSS) ------ trabant00 What a low effort article. Zero details. And the page is in huge part advertising and unrelated stuff. ~~~ TedDoesntTalk Agreed. I want my two minutes back. ------ ve55 Just as covid seemed to hit many with little warning and little preparation, serious cyberattacks will at some point too. Nations need to have more preparation, funding, and simulations, for potential large future cyberattacks before one causes significant destruction. ~~~ cheez They simulate all of them, still screw it up when it happens. 9/11 was simulated, pandemic was simulated, etc. ------ wallacoloo So the attacker is using “open-source code exploits” followed by phishing. To what effect? DoS of govt services? Ransoms? Something more ambitious? ------ yumraj China is going rogue again. Cyberattacks against Australia, bullying in South China Sea, border fights against India and so on. We need a unified world approach. ~~~ nix23 Can you please give me a proof that it's China and not someone else...or nothing at all? I always hear cyber-attack's from Russia, North Korea or China, but never from Israel or the US, are they just so bad in covering up or is maybe something else behind it? ~~~ bawolff Well tbf, stuxnet & flame are probably the two cyber-attacks that can actually beyond all doubt be called cyber warfare. Most everything else seems more about finding a scapegoat to blame. ~~~ nix23 Yes your right, i am not saying cyber-warfare does no exist, i just don't see often good point's for the origin of the attack...often its like HAHA we found the timezone of Peking in a file....as if a professional agency is that stupid (well sometimes they are) ------ adventured Not just cyber attack, Australia is also under economic attack [1] for the same reason. And China just suddenly decided to sentence an Australian to death (same move they made against Canada), after five years of sitting on the case [2]. It's all about intimidation and leverage. China will press until Australia capitulates. Fortunately the Australians have backbone. As a superpower capable of standing off with China, the US should be stepping in and offering very public political and economic support to Australia. It's the only approach that will work when dealing with China's new era of extreme belligerence. If the US were currently being led by a wiser politician, they would be rallying allies old and new (such as India) at China's expense. [1] [https://www.theguardian.com/australia- news/2020/may/21/austr...](https://www.theguardian.com/australia- news/2020/may/21/australias-iron-ore-exports-hit-by-rule-change-as-china- escalates-war-of-words) [2] [https://www.cnn.com/2020/06/13/china/australian-drug- smuggli...](https://www.cnn.com/2020/06/13/china/australian-drug-smuggling- sentence-china-intl-hnk/index.html) ~~~ fit2rule Why is it the US' problem? If _AUSTRALIA_ were currently being led by a wiser politician, or indeed had in the last .. 20 years .. been led by wise politicians .. it wouldn't be in this mess right now in the first place. Its only because Australia kowtows with fluidity every time the US snaps its fingers that its in this mess right now. Australians need to stop being the lapdogs to the American empire, and start thinking about their own future. Australias future isn't white American: it is multi-cultural and mostly Asian. ~~~ jacquesm Because Australians have been led to believe that the US and Australia are allies, resulting in Australia punching _way_ above its weight in giving the USA cover whenever it went abroad, for instance in Iraq, Afghanistan and so on. The usual understanding is that such loyalty is a two-way street. Not that the current US government cares about such pesky details but that's where it stands. ------ microcolonel Every time PRC turns up the heat, we should get closer with Taiwan. ------ m0zg I'm old enough to remember everyone here shitting on Trump for suggesting Huawei 5G is a national security threat. This opinion is now so uncontroversial that even Eric Schmidt agrees: [https://www.telegraph.co.uk/technology/2020/06/18/huawei- pos...](https://www.telegraph.co.uk/technology/2020/06/18/huawei-poses- national-security-risk-warns-ex-google-boss-eric/) ~~~ dane-pgp > everyone here That's an interesting claim to test, actually. Could you provide links to one or more discussions on this site where the overwhelming consensus was that Huawei 5G would not be a national security threat to the US? ~~~ slacka Below are the top stories. No consensus, let alone overwhelming. [https://news.ycombinator.com/item?id=21757097](https://news.ycombinator.com/item?id=21757097) [https://news.ycombinator.com/item?id=19954673](https://news.ycombinator.com/item?id=19954673) [https://news.ycombinator.com/item?id=23191055](https://news.ycombinator.com/item?id=23191055) [https://news.ycombinator.com/item?id=19923655](https://news.ycombinator.com/item?id=19923655) [https://news.ycombinator.com/item?id=20279227](https://news.ycombinator.com/item?id=20279227) ~~~ m0zg Now do the following: search the threads you provided for "Trump". The decision might have been "right", but easily 90% of posters say that Trump was "wrong" to make it somehow, because saying he was right at anything is socially unacceptable here. Note that I did not say HN disagreed with the decision necessarily. I was just saying it was shitting on Trump for making it. ~~~ dane-pgp > Now do the following: search the threads you provided for "Trump". Okay then. The first two links have 8 occurrences of the string "Trump": 1\. "Meaning while Trump is trying to make other country buy more Boeing planes?" I don't think this person is complaining that Trump is trying to support American businesses, but in any case they aren't saying that he shouldn't have opposed Huawei. 2\. "... Trump only says pleasant words [about trade] which is completely legal in both countries?" This seems to be a defence of Trump. 3\. "Trump considered [purchasing Greenland]." A criticism of a different Trump policy (in the context of an article about the Faroese prime minister). 4\. "I think that Trump's move with banning Huawei is bad for the US in the mid and long run." An actual criticism of Trump's Huawei decision, based on fear of retaliation from China. Two child comments support Trump, while one supports the criticism. 5\. "Trump's trade war with China, as many contract manufacturer move out of China, will prove none of that supply chain myth is true within a year or two." A comment supporting Trump's approach. 6\. "These things, and I'm not passing judgment on them, are simply pushing the Chinese to be self-sufficient on everything. Stroke of the Trump pen and X chip for your hardware is denied." A comment trying to look at the long term consequences without being critical of Trump. 7\. "I'm sure that the EU/australia/the west is breathing a sigh of relief that Trump did this instead of forcing them to make up some more draconian law..." A comment supportive of Trump. 8\. "FYI: Trump says U.S. "wants to be the leader' in 5G development" A comment potentially trying to explain Trump's actions, but not critical of them. If that is an accurate analysis of a random sample of comments, I would say that most posters agree with Trump about Huawei. I don't know where you get your "easily 90%" statistic from. ------ AngeloAnolin I am pretty sure that nations with the resources are pretty much doing some stealth cyber attack to nations they consider a threat - whether by economic or defence policies. Likely the scale of the attack happening is something that may have surprised the victim nation that they are calling out the attacks in the hope that it would at least calm down the intruder or even have the government intervene. On a side note, reading the article in a mobile device was a big PITA. Lots of ads and unnecessary information included. And they had the temerity to tell me that I am using n/3 free articles. I think I would pass from subscribing if on the limited free version and the reading experience was just worst.
{ "pile_set_name": "HackerNews" }
Using Magnets to Reduce Beer Foaming - allisterk http://www.sciencedirect.com/science/article/pii/S0260877414003380 ====== allisterk A much fluffier article with video is at: [http://www.theatlantic.com/technology/archive/2014/12/how- to...](http://www.theatlantic.com/technology/archive/2014/12/how-to-keep-beer- from-foaming/383775/)
{ "pile_set_name": "HackerNews" }
Ask HN: how to go about finding internships? - zxcvvcxz How's it going HN.<p>It's summer time, and students much like myself are having a tough time finding interesting summer jobs. It's not that I don't enjoy waiting tables or anything, but at some point I think it's time to look for more meaningful employment.<p>Some background on myself - I've just completed my second year of engineering education, and have project experience coding C/C++ and assembly. As well, I have web development experience with PHP and MySQL on the backend, and Javascript/html/css/Ajax. In terms of non-programming technical knowledge, I've probably taken a course on "$subject mechanics" (fluid, statistical, quantum... you name it).<p>So I figure my best way out of waiting tables would be to apply for some internships. In particular, being an HN reader, I'd love to work at a smaller company closer to a start up.<p>But I'll be honest - I have very little work experience. Just a lot of drive/motivation to work on something interesting and challenging, and a few projects to show.<p>What advice would HN give? ====== potatolicious Go for all the big companies - they have established internship programs that they recruit heavily for. Try Amazon, Google, Microsoft, Facebook, and any other BigCos you can think of. That's generally the easiest way to go since these companies make it a point to hire a _lot_ of interns every year. It is probably way too late to make it anywhere for _this_ summer at these companies though, given their structured schedule in recruiting (the intern season at Amazon has already started). Talk to small companies. I have a friend who literally drove down the highway with a stack of resumes. He walked into every place that seemed like it would be beneficial to work at, walked in, demanded to speak to a manager of sufficient seniority (didn't take no for an answer), explained to said manager his skills and how he could contribute to their business, gave them his resume, and left. He's also the guy I know who never seems to be lacking a job. ~~~ rednum It _is_ too late for google, microsoft and facebook - their hiring processes for summer start in winter (I even know some guys who had interviews in november) and most places are taken; you can however try autumn if you want - I know that fb hires for autumn now. Try some smaller ones - you are on site dedicated to startups so you should find some that hire! My algorithm when searching for interns was going through lots of companies, look into their jobs/careers for interns ad and sending my cv, starting from the most intersting. Edit: I didn't have lots of projects to show either, but many companies don't really ask for them during interview (however for some it's a must - eg my friend wanted to work in android apps startup and they wanted him to already have something done for android) - algorithm puzzles seem to be popular, also you may be asked to read/write some code and some easy questions checking what you wrote about technology you mentioned in cv. That's really all I think. ------ c_t_montgomery I hope everything works out for you! Next year, I'd start looking for summer gigs around December or so, just because that's when companies (in my experience - I'm a sophomore CS major) tend to hire for the summer. Typically, they like to get you on for a few months part-time before the summer starts, too, to work out any kinks. If that doesn't happen to fall into place for you, the only thing stopping you from creating your own little side company while waiting tables or something is yourself. Analyze your day, see what irritates you or you wish could be done better (programmatically), and write up something to fix it. Put it on Github, get to know some other coders (maybe even from around your area - I highly recommend hnDir - <http://www.hndir.com/> \- just to see who all is around your area, and in college as well). Also, to note, to add on to the dev experience you have, I'd highly recommend checking out some iTunesU or MIT OCW courses on Algorithms and Data Structures. I would do this regardless of your situation this summer. Heck, I'd do both of these regardless of your situation this summer. There are great opportunities out there to be taken advantage of! If you ever want to work on anything, email me (in my bio)! ------ ZackOfAllTrades This might only work for some companies, but it worked out well for me: Take one of a company's flagship products and remake it using open source technology. You don't even have to do the entire thing: just enough to show that you understand the subject material and are a potential threat if left to your own devices over the summer with nothing to do. Put it up on github or your own website depending on the product, and include all the url's in the application or email that you send to the company. It will make you stand out and show that you are interested in working on the types of things they work on. All it takes is one open source project gaining momentum to completely change a product space. It's less troublesome/expensive for the company to hire you than it is to try and fight a grassroots opensource movement later on. If you can make a company engineer think that they are getting a deal by hiring you early on, then you are pretty much set. Bonus points: get the sales department to email the engineers for you. ------ Zev _But I'll be honest - I have very little work experience._ Neither do most other summer interns. Don't worry about it. The benefit of an internship is skewed in your favor and not the companies; you get to learn (and gain work experience that you need). Depending on where you are, you might be working on an important product, but, it isn't expected that you'll be as productive as a full-time engineer is. The real benefit that a company gets from having interns is that its basically a two or three month hiring process. If it goes well, you'll be able to another internship with them next summer and/or possibly get a job offer at the end of college. Practically everyone out there is looking for smart people to hire. If you want to intern at a startup, find one you like and make yourself known. Send them an email with your resume attached and a quick note. At the very least, you'll get a real response from someone (rather than a canned one, or none at all). ------ veyron Do you have a portfolio to show? Also, you should put your email in the HN profile ------ dtwwtd Where are you based out of? At least here in the Ann Arbor/Detroit area the demand for good developers/interns is huge, and it seems most people that want a software job around here have one. My best advice would be try to get involved in local startup/entrepreneurship events if you have such things. Connect with the community, in my experience everyone is happy to talk to others about what they're working on - they won't bite :). Talk to people about their needs and your skills. Good luck! ------ wyclif Best strategy I've found is to email the founders of companies you're interested in and need the skills you have, and ask them flat out if they need interns. ~~~ rrwhite This ------ olalonde I'm in a similar position (completed 2nd year of software engineering, about same skill set plus some work experience). What I did is email a niche mailing list as well as contact some startups I like directly. Even found about an internship opportunity on Freenode. Started working on this yesterday and currently have about 6 interviews scheduled :) ------ sebkomianos I am graduating next month (last exam in a few hours literally) so I started sending emails for job opportunities a few weeks ago. I found the "Who's hiring" threads (<http://news.ycombinator.com/submitted?id=whoishiring>) of great help. ------ qq66 Email me at [email protected] . I am still hiring interns starting June 1st in San Francisco. Paid internship of course. ------ danzheng My startup is looking for software engineering interns, send me your resume, [email protected] ------ onwardly <http://jobzle.com/> ------ bauchidgw do what woody allen did: just show up! works, not always, but often enough. ------ yarone Internships.com ------ szcukg internmatch.com ------ stupidhurts Where are you? ~~~ zxcvvcxz Toronto! =)
{ "pile_set_name": "HackerNews" }
Show HN: Personalize Every Article for Every Reader - sahadeva http://sahadeva.com/interactive-article-experiment.html ====== RyanHamilton This is cool, I like it. Though I worry about a future where everyone reads only what they agree with. ~~~ jlg23 Indeed, though it is just the logical extension of the status quo: People tend to follow news sources whose overall tone/agenda they agree with (let it be online sources or good old newspapers).
{ "pile_set_name": "HackerNews" }
What happened to the inaugural class of travel startup Remote Year - aaronbrethorst http://www.atlasobscura.com/articles/remote-year-promised-to-combine-work-and-travel-was-it-too-good-to-be-true?Src=longreads ====== reustle It's amazing how much money these people are spending on this trip, especially with such inexperienced founders/staff. $3k down, $2k a month, and $2.5k to leave, while many don't have solid income streams in place? Unfortunately, after having been in this "digital nomad" scene for over a year and a half now, it is nothing new. I've lived across 14~ countries since 2014 and have met my fair share of people who dropped everything to come to Chaing Mai, Ubud, Saigon, etc to work on their next big company, only to end up struggling to make a living off a travel blog or affiliate marketing tactics. It feels like many don't make it past a few months, before it sets in that not everyone is cut out for it. ~~~ soneca I always assumed the term "digital nomad" would refer to a kind of stabilished digital freelancer that had relevant (if unstable) source of income. I indeed don't see it working for founders developing a company. ------ phantom_oracle for $2000, all they are getting is a workspace and shared-accommodation? That amount of money is a lot in countries like Vietnam, Thailand, etc. You could easily get yourself a 2-bedroom place and cooked-meals everyday for less than that. ~~~ chrisfosterelli Yeah, simply taking a bit more initiative to manage those things yourself could easily save you 75% of what they are paying... As someone who has done some travel while working, I'd say it sounds very cool in theory but the price you're paying to have them manage your accommodation and office space is _way_ too high. ------ sneak I heard through the grapevine that it was total amateur-hour, drunk American bro nonsense. This article doesn't really dispel that.
{ "pile_set_name": "HackerNews" }
Novel Laser-Based Method Effectively De-Ices Aircraft - rajnathani https://optics.org/news/11/1/97 ====== blakesterz Sadly it appears this is not a giant laser that shoots the plane when it's covered with ice. It's a way to change the surface of the wings so that ice/snow doesn't stick in the first place. ~~~ zwieback Yeah, I was expecting to read about how to get a gigantic laser out onto the runways. Still cool, though. ~~~ NovemberWhiskey Right - this is anti-icing; not deicing. ------ ghastmaster What happens when they paint the parts to prevent corrosion? I imagine all the properties of the laser etching are negated. ~~~ oliveshell As far as I understand it, corrosion isn’t that much of a worry with aluminum airframes— as long as the plane doesn’t spend too much time near salt water. There are many past and present airline liveries where the fuselage is left largely bare, for instance: [https://upload.wikimedia.org/wikipedia/commons/5/5f/Boeing_7...](https://upload.wikimedia.org/wikipedia/commons/5/5f/Boeing_767-323-ER%2C_Oneworld_%28American_Airlines%29_AN2217029.jpg) ~~~ metaphor Just because it looks bare doesn't mean it's unfinished. If I specified sheet aluminum for Type II Class 3 chemical conversion per MIL- DTL-5541, any materials QC professional would be hard pressed to visually determine that anything was actually done to the material. To be sure, no, MIL-DTL-5541 isn't an uncommon spec constrained to military applications. ~~~ hinkley I know I've noticed on airplanes before that while some of the wing is aluminum colored, some areas in particular are painted a vaguely aluminum- colored shade of grey. And I think the... it seems they're called Krueger flaps? Those are often painted aren't they? And those I'd think you'd definitely want to de-ice. ~~~ handedness On an aircraft that has a mixture of polished and painted surfaces, the painted surfaces often aren't bare aluminum. Often that's the wing root fairings, winglets, nacelles, radar cones, vertical stabilizer, and so on. ~~~ hinkley I don’t think I was meant to get a giggle out of this. Can you explain using other words? Of course a painted surface isn’t bare. It’s got paint on it. Did you mean it’s not aluminum? Or a different grade? ~~~ handedness Thanks, I laughed at it myself, in hindsight. I should have stipulated "underneath" and likely appended an "if you follow...". Yes, well, they may either be materials that have other surface textures/coatings/treatments/finishes that aren't conducive to polishing, or they may be other metals, or non-metallic composites (can't put aluminum over a radar, for example), and so on. TL;DR: The painted surfaces are generally instances in which polished aluminum won't really work, for a variety of reasons. ------ AWildC182 Interesting approach and hugely useful if practical, though it bears mentioning that the leading edges on aircraft experience a fair amount of abrasion from dust, debris, and insects. I wonder how long this treatment would be effective for in a real world environment ~~~ jcims Super important question, first thing that came to mind. How would you even test it for efficacy? Just look for ice building up and say 'welp, time for refinish?' ~~~ colechristensen There are wind tunnels for testing icing behaviors, not too hard to do an accelerated aging test and come up with standard procedures. ~~~ AWildC182 Could be easier said than done. There are lots of edge cases that could become a problem in real use. Stuff like surface contamination from various fluids or environmental factors. ~~~ dmurray Do 90% of your testing in the wind tunnel, and sanity check your results by flying it for real. ------ forkexec If it can be manufactured for reasonable cost, effectiveness and sensible power consumption, seems like a fit for small aircraft, fighter jets and any aircraft that don't have deicing boots or anti-ice systems. ------ AWildC182 Anyone with a better background, are micro surface features required for this kind of thing or could teflon/rain-x type chemical coatings create a more durable/corrosion resistant/easily repairable effect? ------ frandroid Did Fraunhofer just repurpose MP3 codecs to aluminium surface patterns? ------ DailyHN Very clever. Also seems like something pulled from ancient aliens. ~~~ excalibur I was thinking Tony Stark. "How did you solve the icing problem?" ~~~ pjmorris Nice. I'd drummed up Dr Evil, "Mr. Powers, you'll notice that all the sharks (planes) have laser beams attached to their heads. I figure every creature deserves a warm meal."
{ "pile_set_name": "HackerNews" }
What's the best way to find UI/graphic design company for a $10,000 budget? - andrewstuart Is there some site where you can say (for example) "I have a $10K budget and I'd like to choose a designer to work with"? And then designers respond with some expression of interest.<p>Note: not looking at crowdsourcing solutions, just a way to find one designer/design company to work with. ====== calebcjb We might be interested. Please email me [email protected] Let me do a needs audit with you to see if we are the right fit for you. ~~~ andrewstuart Sorry I should clarify - I am not asking for submissions, I'm asking if such a site exists where buyers can state their budget and designers respond.
{ "pile_set_name": "HackerNews" }
The 4-hour workweek for startups - pius http://www.mystealthstartup.com/2008/04/14/the-4-hour-workweek-for-startups/ ====== flux The book is mainly about building a business that sits in the background making a dependable but not necessarily huge income. It's not really surprising that it's popular with internet marketers because they generally are not concerned about the quality of products they are producing, more about if they sell and make money. Tim's example was selling supplements online, do you think he was really passionate about this business? I doubt it but that's kind of the point of the book, focusing on enjoying a lifestyle rather than your work. For people wanting to create an internet site/service of value and are really passionate about technology and the internet and enjoy focusing a lot of time on that then this probably isn't a good book to read. ~~~ tjakab On the other hand, is it necessarily bad to follow the techniques in the book to create a steady revenue stream (even if it's just enough to cover some basic debt) while putting your energy into a proper startup? The general point of the book is to find a way to separate income from labor and thus free up your time to do things you really want to do. That probably includes founding a startup just as much as it would traveling around the world or cage fighting or whatever else. ~~~ flux I guess if it's necessary to get your startup off the ground it could be a good idea. It's just that I see a lot of people looking at the internet just as a source of money, rather than thinking how can I improve this or add something of value. Having said this I do think some of his techniques could be useful and the book was quite interesting. ------ truebosko The whole idea of spending 4 hours a week to run your startup business is just silly. Yes, I've read the book and know what kind of techniques he mentions but it doesn't fit for many businesses. As an example. I could outsource my customer service to someone else, but then I lose that connection between the customer and I. I like having that connection, it allows me to see what my customers are looking for, what irks them, and allows me to further advance my business Basically, I can't stand this book. :) ~~~ pchristensen That aspect gets talked about a lot (both in and out of the book), but the truth is he already had a business with paying customers, and he streamlined it so he could run it easily instead of trying to maximize revenue. A rarely mentioned part of the book is where he gives you steps to build a business like his. First, you have to do a _lot_ of work, including doing _everything_ from answering phones, writing marketing copy, packaging every item, etc _by yourself_. Only when you have a product, traction, customers, and experience managing them, can you write the scripts, evaluate vendors and outsourcers, and streamline the business so that a customer can buy, receive, return, or complain about your product without ever encountering you. Despite the popular misconception, Tim Ferriss says you still have to _build_ your own business. But if you pick the right business, you can put it on autopilot _once it's built_. But that aspect isn't controversial enough to get a lot of press. Did you read the book or just hear about it? ------ noodle i'll summarize the article for everyone: "buy and read tim ferriss' book and make sure to click on my amazon affiliate link to buy it." ~~~ pchristensen It's not affiliate link.
{ "pile_set_name": "HackerNews" }
Harvard: The Class of 2013 Senior Survey - ekm2 http://www.thecrimson.com/article/2013/5/28/senior-survey-2013/?page=1 ====== hkmurakami I was going to comment on how only 5% of the class sees a permanent future in the finance industry while 20% of the class sees a long term career in health/medicine, and how it reflects the perceived attractiveness of the various industries as our population ages and finance is increasingly bound up by legislation. But then I saw this: _39 percent of respondents said they sought some form of mental health care during their time at Harvard._ A culture and society that coerces its most potent individuals to develop depression and other mental issues is one that we cannot by any means be proud of. While I technically didn't seek mental health care during my college years, I should have by all means. During those four years, one friend visibly broke down and took a leave of absence for a year. Another committed suicide using cyanide from her lab. I can't imagine things are any better at my alma mater both compared to my years of attendance and compared to Harvard today. I really wish I could even have _hope_ that things are getting better. ~~~ w1ntermute > finance is increasingly bound up by legislation. The health care industry is also bound up by legislation. The difference is that the legislation is in the favor of those who pursue a career in the industry. ------ acjohnson55 I find it really interesting that 11.1% of men identify as gay coming out of college, yet only 1.7% of women do. Those numbers are respectively higher and lower than I would expect. It really speaks to the differences between male and female sexuality, even outside of "normal" heterosexual identity. Any thoughts as to why these numbers are so different? Is our conception of sexual orientation fundamental or just a social construction? I'm endlessly fascinated by these questions. There's so much we don't understand, complicated by politics of heteronormativity and equality. Wikipedia has an interesting article here: [http://en.wikipedia.org/wiki/Demographics_of_sexual_orientat...](http://en.wikipedia.org/wiki/Demographics_of_sexual_orientation) ------ beloch Ivy league students, on average, come from wealthier families than those attending other universities. Even ivy league students from poor backgrounds are likely under higher pressure to succeed than similar students going to other universities. The result is a stronger than average motivation to cheat and a stronger ability to cheat (e.g. Ghost writers do cost money). Couple this with a higher probability of litigation when students are punished/expelled, which causes Harvard to typically go easy on cheaters, and it's no surprise that cheating is more common at Harvard. The question for HN employers is whether or not this should impact the value of an Ivy League degree. ------ aashaykumar92 The cheating statistics really don't surprise me. In fact, I think they are underestimated, understandable considering some students may fear that their answers could be held against them despite being assured it won't. "Why is this on HN?" Well I think the cheating part has a some transferrable takeaways, the main one being online education. Online education is much like Harvard's honor system in that every assignment, quiz, and test can be completed on your own time (at least that's what I hear Harvard's policies are) and just have to be turned in by a certain date. But what you do to finish in that time is totally unknown to the administrators. Personally, I think it is the biggest obstacle for online education and this so-called Honor system. When there are people who want to succeed, and in class succeeding is generally represented by high grades, they will do whatever it takes and if using external resources is the way, why wouldn't they if no one is going to stop them? Not saying this is everyones mentality, but it obviously exists in many intelligent brains. The problem is outlined and has been for a while...the solution will have to be amazing. ------ wavefunction These are the people being groomed to make decisions that affect our world? Terrifying. ------ ggamecrazy Why is this on HN? I'm not seeing it. ~~~ ruswick Admittedly, it might not coincide with the ostensible subject matter of HN (other than it being tangentially related to statistical analysis and the technology sector), but evidently, a nontrivial number of people see value in reading it. The entire point of HN is that is to organically select superior content. Differentiation and evaluation shouldn't happen before posting, it should happen afterwards and be conducted by the community. The whole point of HN is that nothing has to be strictly topical. Everyone is free to throw whatever the fuck they want into it, and the readership will identify and promote the best content. ~~~ ggamecrazy ...or to put it another way: "Lets see if this shit sticks"
{ "pile_set_name": "HackerNews" }
Using the /proc filesystem to monitor progress of script - shanemhansen http://www.whitane.com/blog/uncategorized/proc-filesystem-to-see-progress-of-script/ A tip for using the /proc filesystem to monitor file upload/processing progress. ====== obfuscate `lsof' is a nice front-end to this particular usage of /proc, and also works on other Unixes (/proc is, I think, a Linux innovation, and absent at least on OS X). ~~~ shanemhansen Oh, I never realized that's what the offset column is for. Leave it to me to reinvent (poorly) lsof by digging in some obscure corner of the kernel.
{ "pile_set_name": "HackerNews" }
The script Uber is using to make anti-union phone calls - Trombone12 http://qz.com/621977/this-is-the-script-uber-is-using-to-make-anti-union-phone-calls-to-drivers-in-seattle/ ====== hackuser It's hard to imagine why the drivers wouldn't unionize. Why wouldn't you want to increase your negotiating leverage? It's just part of business. I'm sure Uber management increases theirs every chance they get, as does everyone else running a business.
{ "pile_set_name": "HackerNews" }
Apple axes 1,600 full-time retail positions - yvesrn http://www.macnn.com/articles/09/04/24/apple.loses.1600.at.retail/ ====== electromagnetic This is misleading, they lost 1,600 full-time (or equivalent) workers. This could mean a lot of their part-time workers getting extra hours could no longer get extra hours, it doesn't mean they 'axed' 1,600 full-time positions, they likely cut the hours of 1,600 part-time employees. Then there's the whole, it was the Christmas season. I bet if you look back at records for the past decade there's either been a decline in employees in Q2 as apposed to Q1 or that their growth rate stalls in the Q2 as they no longer need new workers. Then I bet if you look at Q4, there's a big employment spike for the Christmas season. There's too many variables here to say Apple predicted the recession. Maybe they did, however there's much more practical reasons why this decision would have been made. The best reason I can think of is that when the economy started to falter, they reduced part-time workers hours. I don't know about Apples statistics, but most retail companies tend to have double (or more) the number of part- time workers as full-time (usually due to paying less in benefits). This likely means Apple has 28,000 part-time employees, 1,600 of which could have been working extra at Christmas to, you know, pay _for_ Christmas. ------ TJensen Once again, a title shouts "Panic at the economy" while the actual meat of the article says something completely different.
{ "pile_set_name": "HackerNews" }
XEP-0280: Message Carbons (2013) - dgellow http://xmpp.org/extensions/xep-0280.html ====== imaginator Background: XEPs are the protocol building blocks of XMPP. The XSF (XMPP Standards Foundation) are working hard to make XMPP more mobile friendly. (disclaimer: I'm an XMPP board member). There are three problems to solve: 1\. knowing when to retrieve messages (push notifications) 2\. retrieving messages (message archive management) 3\. synchronising messages between devices (what this solves) More background: XMPP is designed around keeping a connection open to the client and pushing through updates and new messages. These assumptions worked well in a desktop environment on a solid TCP connection. But for power, intermittent network, and mobile OS design reason, holding open a socket isn't ideal. Push notification work because the OS provider (Apple, Google, Mozilla etc.) keep one socket open and then push through important notifications. This keeps the phone's radio from powering up for silly things like "contact came online/went offline" type messages. A push notification might be "xyz posted ... ". Your phone needs to now come online and synchronise messages that might have been posted on your tablet or desktop client. Hence XEP-0280. It helps resync messages from other clients. The XSF is also writing up a push notification XEP that makes it easy for mobile apps to use XMPP as a signalling channel and throw out push notification where necessary. ~~~ etherealG Thanks for the hard work on this. It's a problem I find particularly bad in my day to day use of chat on various clients across a phone, tablet and laptop. ------ schneid Though as described here: [http://op- co.de/blog/posts/mobile_xmpp_in_2014/#index2h2](http://op- co.de/blog/posts/mobile_xmpp_in_2014/#index2h2) \-- Message Carbons don't help if your phone is out of coverage for a few minutes, as your desktop client will get the carbons, but when you come back online, you'll be oblivious to any messages sent during that time. ~~~ imaginator Ge0rg wrote that post shortly before the last XMPP summit. Then we put together the plans for push notifications ([https://github.com/legastero/customxeps/blob/gh- pages/extens...](https://github.com/legastero/customxeps/blob/gh- pages/extensions/push.md)) working in conjunction with Message archive management ([http://xmpp.org/extensions/xep-0313.html](http://xmpp.org/extensions/xep-0313.html)) to catch up on messages that might have been missed (in your example: on your desktop client). ~~~ schneid Cool, thanks for the link. I knew about MAM, but hadn't seen the push stuff. ~~~ imaginator Be aware that push is very early. But there are two working implementations already - oTalk and Buddycloud ([https://github.com/buddycloud/buddycloud- pusher](https://github.com/buddycloud/buddycloud-pusher)). What's interesting is that we both came up with very similar solutions. So specing something official and then adapting our code to match the spec should be trivial (in the grand scheme of things). ------ tete Does anyone know how this will work when combined with OTR? I guess the alternative would be PGP, which has disadvantages, but no sessions. ~~~ Zash Not well. OTR doesn't integrate with XMPP in any way, so adding carbons is just going to feed undecryptable garbage to your other clients. Solving that is pretty much the same problem as mpOTR aims to solve. There's also a new proposed end-to-end encryption spec for XMPP being developed: [http://tools.ietf.org/html/draft-miller- xmpp-e2e](http://tools.ietf.org/html/draft-miller-xmpp-e2e) ~~~ simoncion Doesn't this resolve the issue that you describe? [http://xmpp.org/extensions/xep-0280.html#disabling](http://xmpp.org/extensions/xep-0280.html#disabling) ------ davexunit Using this and XEP-0313 allows for syncing conversations to all clients, whether they were online or offline. I helped implement an XMPP chat feature on a large web application last year and I think that implementing these two XEPs are critical to fixing the things users complain about most: Receiving a message in one browser window, opening a new tab or window and not being able to see those old messages, just new ones. ------ brugidou this XEP is supported by the most popular XMPP servers (prosody, ejabberd) but it is still quite difficult to get a good XMPP client on all platforms that can support this. this is especially important for mobile clients on iOS or Android or web clients. I don't see another way to have OSS multi-client chats with XMPP similar to hangouts/Facebook/WhatsApp. ~~~ andor yaxim supports message carbons ------ dfc One of the nice things about the "do not change the title"-policy is that submitters do not need to be concerned with spelling. Unfortunately, pg can not save you from yourself if you do choose to violate the policy and change the title. ~~~ dgellow Can you tell me what was wrong with the old title ? ~~~ dfc You spelled conversations incorrectly. I forget what word your computer autcorrected/substituted for it. ------ tomphoolery noooooooooooooooooice! something i've wanted for a long time, and it seems only iMessage has perfected. ------ Fasebook TIL piping data together for big data purposes is called a protocol and not a dragnet.
{ "pile_set_name": "HackerNews" }
Our Software Dependency Problem - dmit https://research.swtch.com/deps ====== tc The security of package managers is something we're going to have to fix. Some years ago, in offices, computers were routinely infected or made unusable because the staff were downloading and installing random screen savers from the internet. The IT staff would have to go around and scold people not to do this. If you've looked at the transitive dependency graphs of modern packages, it's hard to not feel we're doing the same thing. In the linked piece, Russ Cox notes that the cost of adding a bad dependency is the sum of the cost of each possible bad outcome times its probability. But then he speculates that for personal projects that cost may be near zero. That's unlikely. Unless developers entirely sandbox projects with untrusted dependencies from their personal data, company data, email, credentials, SSH/PGP keys, cryptocurrency wallets, etc., the cost of a bad outcome is still enormous. Even multiplied by a small probability, it has to be considered. As dependency graphs get deeper, this probability, however small, only increases. One effect of lower-cost dependencies that Russ Cox did not mention is the increasing tendency for a project's transitive dependencies to contain two or more libraries that do the same thing. When dependencies were more expensive and consequently larger, there was more pressure for an ecosystem to settle on one package for a task. Now there might be a dozen popular packages for fancy error handling and your direct and transitive dependencies might have picked any set of them. This further multiplies the task of reviewing all of the code important to your program. Linux distributions had to deal with this problem of trust long ago. It's instructive to see how much more careful they were about it. Becoming a Debian Developer involves a lengthy process of showing commitment to their values and requires meeting another member in person to show identification to be added to their cryptographic web of trust. Of course, the distributions are at the end of the day distributing software written by others, and this explosion of dependencies makes it increasingly difficult for package maintainers to provide effective review. And of course, the hassles of getting a library accepted into distributions is one reason for the popularity of tools such as Cargo, NPM, CPAN, etc. It seems that package managers, like web browsers before them, are going to have to provide some form of sandboxing. The problem is the same. We're downloading heaps of untrusted code from the internet. ~~~ faissaloo This right here is why Go's 'statically link everything' is going to become a big problem in the long run when old servers are running that software and no one has the source code anymore. ~~~ stcredzero Given the ease with which the parser and AST are made available to developers, we should be able to implement tools which can detect naughty packages. Also, given the speed at which projects can be compiled, the impetus to keep the source code should remain strong. ~~~ viraptor [https://en.m.wikipedia.org/wiki/List_of_tools_for_static_cod...](https://en.m.wikipedia.org/wiki/List_of_tools_for_static_code_analysis) They're either going to miss things or have false positives. They sure improve the situation, but you can't find all of the issues automatically. ~~~ stcredzero Granted. But it will at least raise the bar for building an exploit package from "knows how to code" to "knows how to code, knows something about exploits, and knows how to avoid detection by an automated scanner." ------ smacktoward It's an interesting line of inquiry to think about how many of these evaluation heuristics, which are all described as things a person can do manually, could instead be built into the package manager itself to do for you automatically. The package manager could run the package's test suite, for instance, and warn you if the tests don't all pass, or make you jump through extra hoops to install a package that doesn't have any test coverage at all. The package manager could read the source code and tell you how idiomatically it was written. The package manager could try compiling from source with warnings on and let you know if any are thrown, and compare the compiled artifacts with the ones that ship with the package to ensure that they're identical. The package manager could check the project's commit history and warn you if you're installing a package that's no longer actively maintained. The package manager could check whether the package has a history of entries in the National Vulnerability Database. The package manager could learn what licenses you will and won't accept, and automatically filter out packages that don't fit your policies. And so on. In other words, the problem right now is that package managers are undiscriminating. To them a package is a package is a package; the universe of packages is a flat plane where all packages are treated equally. But in reality all packages _aren 't_ equal. Some packages are good and others are bad, and it would be a great help to the user if the package manager could encourage discovery and reuse of the former while discouraging discovery and reuse of the latter. By taking away a little friction in some places and adding some in others, the package manager could make it easy to install good packages and hard to install bad ones. ~~~ DoctorOetker those are really good ideas! a vague additional idea: can we improve rough assessment of code quality? 1) suppose we have pseudonym reputation ("error notice probability"): anyone can create a pseudonym, and start auditing code, and you mark the parts of code that you have inspected. those marks are publicly associated with your pseudonym (after enough operation and eventual finding of bugs by others, the "noticing probability" can be computed+). 2) consider the birthday paradox, i.e. drawing samples from the uniform distribution will result in uncoordinated attention, while with coordinated attention we can spread attention more uniformly... \+ of course theres different kinds of issues, i.e. new features, arguments about wheiter something is an improvement or if it was an oversighted issue etc... but the future patch types don't necessarily correlate to the individuals who inspected it... ALSO: I still believe formal verification is actually counterintuitively cheaper (money _and time_ ) and less effort per achieved certainty. But as long as most people refuse to believe this, I encourage strategies like these... ~~~ EvilTerran There's some relevant work going on in the "crev" project, discussed here a couple of weeks ago: [https://news.ycombinator.com/item?id=18824923](https://news.ycombinator.com/item?id=18824923) The big idea is for people to publish cryptographically signed "proofs" that they've reviewed a particular version of a given module, allowing a web-of- trust structure for decentralised code review. I particularly like how, thanks to the signatures, a module's author can distribute reviews alongside the module without compromising their trustworthiness - so there's an incentive for authors to actively seek out reviewers to scrutinise their code. ------ peteforde This paper lends significant legitimacy to a casual observation that I've been concerned about for a long time: as the standard for what deserves to be a module gets ever-lowered, the law of diminishing returns kicks in really hard. The package managers for Ruby, C#, Perl, Python etc offer ~100k modules. This offers strong evidence that most developer ecosystems produce (and occasionally maintain) a predictable number of useful Things. If npm has 750k+ modules available, that suggests that the standard for what constitutes a valuable quantity of functionality is 7.5X lower in the JS community. Given that every dependency increases your potential for multi-dimensional technical risk, this seems like it should be cause for reflection. It's not an abstract risk, either... as anyone who used left-pad circa 2016 can attest. When I create a new Rails 5.2 app, the dependency tree is 70 gems and most of them are stable to mature. When I create-react-app and see that there's 1014 items in node_modules, I have no idea what most of them actually do. And let's not forget: that's just the View layer of your fancy JS app. ~~~ jrochkind1 When I create a new rails 5.2.2 app, I see 79 dependencies in entire tree. Which is about what you said, and a lot less than 1014, sure. There are various reasons other than "low standards" that the JS ecosystem has developed to encourage even more massive dependency trees. One is that JS projects like this are delivered to the browser. If I want one function from, say, underscore (remember that?), but depend on all of it... do i end up shipping all of it to the browser to use one function? That would be unfortunate. Newer tools mean not necessarily, but it can be tricky, and some of this culture developed before those tools. But from this can develop a community culture of why _shouldn't_ I minimize the weight of dependencies? If some people only want one function and others only another, shouldn't they be separate dependencies so they can do that? And not expose themselves to possible bugs or security problems in all that other code they don't want? If dependencies can be dangeorus... isn't it better to have _surgical_ dependencies including only exactly what you need so you can take less of them? (Makes sense at first, but of course when you have 1000 of those "surgical" dependencies, it kind of breaks down). Another, like someone else said, is that JS in the browser has very little stdlib/built in functions. Another is tooling. The dependency trees were getting unmanageable in ruby before bundler was created (which inspired advanced dependency management features in most of the rest subsequent). We probably couldn't have as many dependencies as even Rails has without bundler. Your dependency complexity is limited by tooling support; but then when tooling support comes, it gives you a whole new level of dependency management problems that come with the crazy things the tooling let you do. These things all feed back on each other back and forth. I'm not saying it isn't giving rise to very real problems. But it's not just an issue of people having low standards or something. ~~~ peteforde You are correct, sir: 79 dependencies. Need more coffee! The influence of Bundler is just another example of Yehuda Katz doing something initially perceived as unpopular having a massive long-term impact on developer ecosystems. He is the Erdős of the web dev world. I wish he would sell options on his future endeavours like David Bowie did. Anyhow, in trying to keep my initial comment relatively brief, I held back on several points; what I really and truly don't get about the 750k thing is how anyone can track the libraries available. You know... with their brains. In Rails, gems are big ideas: authentication, an ORM, the ability to address all of AWS, send tweets. The idea that someone would even think to publish a "left-pad" (which I understand is just missing from the also-missing stdlib) as something people should import is what seems crazy. What makes you stop and think... wait, I'm typing too many characters, I need to see if there's anything on Github that can insert spaces at the beginning of a string. How would you even know what it's called? Is there a module for concatenating two strings? When does it become silly? How is it possible that finding a library to add padding which may or may not exist, doing even cursory code review and integrating it not take longer than just writing a few lines of code? Using the example of the escape-string-regexp module mentioned in the whitepaper... this would be a deeply flawed thing to add to your project. It has a hard-coded error message that has zero affordances for localization strategies. It is, at best, a few random lines from someone's hobby app. If every one of those 1014 modules in an empty project have weird, unknown- unknown failure modes, that sounds like a recipe for trouble. Finally, 1014 packages getting frequently version bumped is way less reliable in terms of unfortunate conflicts. Your surface area of all things that can go wrong shoots up and to the right... all to save a few lines of code? ~~~ IggleSniggle I don’t really disagree with anything you’ve said, just want to add. It’s not really 750k packages you’re keeping in your head. Instead, there are swirling communities of standard convention. This happens because the js community is so large and the code syntax so “forgiving” that many different “dialects” of js exist. There’s a reason “Babel” is called “Babel.” Within your dialect, one package may be better suited than another package, which does the same thing. A great example of this is where ‘_ => result’ may look perfectly coherent in one sub-ecosystem, another sub-ecosystem would more readily understand ‘function AsyncCalculationProvider(callback: CompletionFunction) { return callback }’, both for perfectly legitimate reasons. That people wish to ‘standardize’ on one common way of doing a thing within their sub-ecosystem is the reason people accept dependencies for dumb little things. That people disagree on how those things should manifest in the context of their subculture is the reason there’s 10 different popular ways to do the same exact little thing. This isn’t even just ECMAScripts fault. The Web APIs provide a lot of great fill-in as a standard library (for example, for Date localization), but even here we do not see consistency. For example, the “fetch” api for browsers is nice enough, but is not implemented in Nodejs. If you want to share a signature for HTML requests between nodejs and browsers, you’re going to use “axios” or maybe “node-fetch” (which replicates the Web api but is more verbose), or you’re going to end up rewriting a wrapper for that functionality, and why would you do that when there’s a community that will immediately see and understand what you mean when you import the “axios” module? Big optional standard library needed, but minimized deliverable also needed. Recent tooling (eg tree-shaking and Babel), make this more reasonable today than it was in the past. ~~~ peteforde If historical lessons continue to apply, what will likely happen is a few more significant iterations of shakeout as the community coalesces around something closer to consensus. It's important to remember that the vast majority of developers in any ecosystem are simply trying to use a tool to do a job; they are far less likely to commit a significant amount to the ecosystem and that's okay. Wikipedia is very similar in this regards. Perhaps the best comparison is the evolution of the Linux distribution ecosystem. Maybe React is Ubuntu? The story is still being written. ------ Sir_Cmpwn >Is the code well-written? Read some of it. Does it look like the authors have been careful, conscientious, and consistent? Does it look like code you’d want to debug? You may need to. This, 10,000x. I've repeated a similar mantra many, many times, and it's one of the most important reasons I refuse to use proprietary software. You should consider no software a black box, and consider the software you chose to use carefully, because it's your responsibility to keep it in good working order. ~~~ bunderbunder Making it someone else's responsibility to keep it in good working order is the value proposition behind (good) proprietary software: You give them money, they give you a support contract. For a company with more money than development resources, or even just a company whose development resources can be more profitably focused elsewhere, this can be a quite reasonable trade to make. ~~~ vharuck If a company behind proprietary software goes belly up, there's no support. But there are always companies or even freelance devs who can be paid to support open source code. ~~~ IggleSniggle Proprietary _and closed source_. We make use of open source (but not open license) proprietary software on my team. ------ raphlinus My personal sense, from watching developments in this space, is that we are going to have to find some way for taking on an open source dependency to be an economic transaction, with money actually changing hands. With open source, the code itself is free (in both the libre and gratis sense), but there are other places to identify value. One of them is chain of custody - is there an actual, somewhat responsible human being behind that package? Many of the most dramatic recent failures are of this nature. Other value is in the form of security analysis / fuzzing, etc. This is real work and there should be ways to fund it. I think the nature of business today is at a fork. Much of it seems to be scams, organized around creating the illusion of value and capturing as much of it as possible. The spirit of open source is the opposite, creating huge value and being quite inefficient at capturing it. I can see both strands prevailing. If the former, it could choke off open source innovation, and line the pockets of self-appointed gatekeepers. If the latter, we could end up with a sustainable model. I truly don't know where we'll end up. ~~~ skybrian On the other hand, it seems like making automatic payments to dependencies would be easy to screw up. Adding money to a system in the wrong way tends to attract scammers and thieves, requiring more security vigilance, while also giving people incentives to take shortcuts to make money. (Consider Internet ads, SEO, and cryptocurrency.) Monetary incentives can be powerful and dangerous. They raise the stakes. You need to be careful when designing a system that you don't screw them up, and this can be difficult. Sometimes it can be easier to insulate people from bad incentives than to design unambiguously good incentives. ~~~ x0x0 A counterpoint: the system has already attracted scammers. see eg the bitcoin injection in npm. And now that someone smart has blazed the way and demonstrated the opportunity, others are sure to follow. ------ jasode Fyi, the article's title and sibling top-level comment by austincheney may give the wrong impression of what Russ Cox is talking about. His essay is _not_ saying software dependencies itself is a problem. Instead, he's saying software dependencies __evaluation__ methodology is the problem. He could have titled it more explicitly as _" Our Software Dependency Evaluation Problem"_. So, the premise of the essay is already past the point of the reader determining that he will use someone else's software to achieve a goal. At that point, don't pick software packages at random or just include the first thing you see. Instead, the article lists various strategies to _carefully evaluate_ the soundness, longevity, bugginess, etc of the software dependency. I think it would be more productive to discuss _those evaluation strategies_. For example, I'm considering a software dependency on a eventually consistent db such as FoundationDB. I have no interest nor time nor competency to "roll my own" distributed db. Even if I read the academic whitepapers on concurrent dbs to write my own db engine, I'd still miss several edge cases and other tricky aspects that others have solved. The question that remains is if FoundationDB is a "good" or "bad" software dependency. My evaluation strategies: 1) I've been keeping any eye on the project's "issues" page on Github[0]. I'm trying to get a sense of the bugs and resolutions. Is it a quality and rigorous codebase like SQLite? Or is it a buggy codebase like MongoDB 1.0 back in 2010 that had nightmare stories of data corruption? 2) I keep an eye out for another high-profile company that successfully used FoundationDB besides Apple. 3) and so on.... There was recent blog post where somebody regretted their dependency on RethinkDB[1]. I don't want to repeat a similar mistake with FoundationDB. What are your software dependency evaluation strategies? Share them. [0] [https://github.com/apple/foundationdb/issues](https://github.com/apple/foundationdb/issues) [1] [https://mxstbr.com/thoughts/tech-choice-regrets-at- spectrum/](https://mxstbr.com/thoughts/tech-choice-regrets-at-spectrum/) ~~~ SmirkingRevenge A couple questions that I like to ask myself... \- How easily and quickly can I tell if I made the wrong choice? \- How easily and quickly can I switch to an alternative solution, if I made the wrong choice? To contextualize those a bit, its often when trying to pick between some fully managed or even severless cloud services vs something self-managed that ticks more boxes on our requirements/features wish-list. Also, its pretty important to consider the capabilities and resources of your team... \- Can my team and I become proficient with the service/library/whatever quickly? ------ athenot > Does the code have tests? Can you run them? Do they pass? Tests establish > that the code’s basic functionality is correct, and they signal that the > developer is serious about keeping it correct. This is one thing I thoroughly miss from Perl's CPAN: modules there have extensive testing, thanks to the CPAN Testers Network. It's not just a green/red badge but reporting is for the version triplet { module version, perl version, OS version }. I really wish NPM did the same. Here's an example: [http://deps.cpantesters.org/?module=DBD::mysql](http://deps.cpantesters.org/?module=DBD::mysql) ~~~ SomeHacker44 My opinion... That implies too much faith in tests. Tests are no better or worse than any other code. In fact, writing good tests is an art and most people cannot think about every corner case and don’t write tests that cover every code path. So, unless you audit the tests they add no practical additional layer of trust, IMO, to just using the “package” with or without tests. ~~~ nobody271 Many times I've had the most use for a test that didn't fit into the conventional unit test format but I didn't try to get it approved because I didn't want to get into a dogmatic argument about what a test should or shouldn't be. A lot of what I worry about doesn't get tested well using unit tests. ~~~ woolvalley Why not call it an integration or e2e test and be done with it? ------ jancsika Modest proposal: do the opposite of everything suggested in this article. After all, if you spend all your time inspecting your dependencies, what was the point of even having them in the first place? This will ensure that maximum time possible is spent implementing new features. _Everyone_ on your team can pitch in to accelerate this goal. Even non-technical outsiders can give valuable feedback. At the same time, this ensures minimum time spent fiddling about in a desperate attempt to secure the system and slowing everyone else down. Besides, unless you're already a fortune 500 company, _no one_ on your team knows how to do security at all. (And even then the number of experts on your team is probably still dangerously close to zero.) The software you ship will obviously be less secure than if you had focused any time at all on security. However, the utility of your software will _skyrocket_ compared to what it would have been if you had sat around worrying about security. So much that your userbase is essentially _forced_ to use your software because nothing else exists that even has a fraction of its feature set. Sooner or later the insecurity will catch up with you. But this is the best part-- your software has so many features it is now a _dependency_ of nearly everything else that exists. There is no chess move left except to sit down and somehow _actually_ secure it so that arbitrarily tall stacks of _even less secure_ software can keep being build atop it without collapsing like a house of cards. And it's at this point that the four or five people in the world who actually understand security step in and sandbox your software. Hey, now it's more secure than a system built by a cult of devs tirelessly inspecting every little dependency before they ship anything. Problem solved. ------ et1337 Worse than package dependency is platform dependency. My code runs on top of 10 million lines of Kubernetes insanity that no one really understands, including the thousands of authors who wrote it. In theory, that means at the drop of a hat I can switch to a different cloud, kubectl apply, and presto! Platform independence. In reality, every cloud is slightly different, and we now depend on and work around a lot of weird quirks of Kubernetes itself. We're stuck with what we've got. ------ austincheney Easily explained in two points. 1\. Convenience at cost to everything else. Easier is generally preferred over simplicity. If the short term gains destroy long term maintenance/credibility they will solve for that bridge when they come to it at extra expense. 2\. Invented Here syndrome. Many JavaScript developers would prefer to never write original code (any original code) except for as a worst case scenario. They would even be willing to bet their jobs on this. ~~~ RealDinosaur For me (Javascript Developer), you have to stand on the shoulders of giants if you want to compete. Any code you re-invent is code you have to maintain. I've found though, some engineers love to create everything from scratch, and this greatly hinders their ability to hire/fire as everything is proprietary, and usually not documented. Most decisions are pretty grey, but for me, choosing to handle stuff yourself is never a good choice. In the same way as no-one should ever try and create Unity from scratch, no-one should try to create React from scratch. You simply can't compete with the support and effort of a global development team. If you wanna learn though, that's a different kettle of fish. Reinvent the wheel all day. Just don't use it in production. ~~~ loup-vaillant > _no-one should ever try and create Unity from scratch_ Some game developers do write their game engines from scratch. I know of at least one successful example: Jonathan Blow, with _Braid_ (2D engine) and _The Witness_ (3D engine). Note that in both games, a generic engine wouldn't have worked, or at least would have required such an amount of customisation that it's not clear it would have cost less, or looked and felt as good. Sure, don't go rebuild a generic engine from scratch. But a custom one, tailored to a very specific use case? That's not such an obvious no-no. Another example would be Monocypher¹, my crypto library. Why would I write such a thing when we already have Libsodium? The reason is, I saw that I could do better for my use case: an opinionated, easy to use, portable package. The result is _massively_ simpler than Libsodium. I don't care that I cannot compete with the support and effort of Libsodium team. I made sure I didn't need to. [1]: [https://monocypher.org/](https://monocypher.org/) ~~~ RealDinosaur Braid and Witness _could_ have been written in Unity though. I'd argue that dealing with high level concepts such as game/level design and art direction and low level stuff like graphics and rendering simultaneously is insane. I don't know how Jon Blow did it, but personally being able to abstract away all that low level stuff makes the design process way easier for me. There was a recent game, 'Return of the Obra Dinn', which went the opposite way. It was the dev's first game with Unity, and he attributed most of his success to the Engine. It doesn't look like a Unity game, it doesn't play like a Unity game, and it has won several game of the year awards. ~~~ loup-vaillant Come to think of it, there's _Antichamber_ , a non Euclidean labyrinth based on Unreal Engine (4, I believe). As for how Jon Blow did it, I suspect having his own engine let him explore gameplay ideas more readily than using a generic one. The time travelling in Braid and all its variations would be pretty hard to bolt on a generic engine: it's not just rewind, it's _partial_ rewind, with some entities being immune to the rewind. There's even a level where time goes forward and backward depending on the _position_ of the main character. Go right, forward. Go left, backwards. For The Witness, it's a bit more subtle, but about a third of the game required pretty crazy 2D projective analysis of the 3D world (the "environmental puzzles", don't look them up if you don't want spoilers). While it didn't en up being central to the game, it was basically the starting point. The engines of Jonathan Blow's games are more central to their gameplay than for most games. Still bloody impressive, but probably less unnecessary than one might originally think. Also, Jonathan Blow has pretty strong opinions about game development, and I got the feeling that he disagrees with most generic engines out there. Working with them would probably caused suffering, whose cost he didn't want to pay. (Speaking for myself, my productivity drops pretty sharply when I spot stuff I too strongly disagree with, _and I can 't fix it_.) ------ jsty It might be that data protection regulations start to 'encourage' movement in this area regards more careful consideration of the software dependency chain. If you pull in a malicious dependency which results in personal information being exfiltrated, I doubt the "we pulled in so many third party dependencies it was infeasible to scrutinise them" defence is going to mitigate the fines by very much. ~~~ DoctorOetker that is the ideal path, but sadly most things indicate the system prefers the opposite path, especially if we look at "responsible disclosure" where the contributor is expected to give a _centralized_ temporary secrecy agency advance warning, and we blindly have to trust them not to weaponize what essentially amounts to an endless stream of 0days (or trust them not to turn a selective blind eye to malicious exfiltration of these 0days) ------ rossdavidh I like (and basically agree with) the article, but I have to think it basically does a good job of pointing out the problem, and a bad job of suggesting a solution. The sheer number of dependencies of most commercial software now, and the ratio of backlog-to-developers, basically insures that the work required to check all your dependencies does not normally get done. Hypothesis: it will require a massive failure, that causes the ordinary citizen (and the ordinary really, really rich citizen) to notice that something is wrong, before it changes much. Hypothesis 2: after that happens, the first language whose dependency manager handles this problem well, will move up greatly in how widely it's used. ~~~ alkonaut For a 100 man year project we have accumulated around a dozen external dependencies and only two of them are transitive (one for zipping and one for logging). I think that’s fairly reasonable and about what I’d expect. So as you might have guessed it’s not a node project, but that’s my point - perhaps the idea of dependencies is manageable so long as the platform allows you to keep it reasonable. Meaning, at the very least, a good standard library. ------ bluetech I think object-capabilities are one way to have much safer code reuse. Suppose a dependency exports a class UsefulService. In current languages, such a class can do anything - access the filesystem, access the network, etc. Suppose however that the language enforces that such actions can only be done given a reference to e.g. NetworkService, RandomService, TimeService, FilesystemService (with more or less granularity). Therefore if UsefulService is declared with `constructor(RandomService, TimeService)`, I can be sure it doesn't access any files, or hijacks any data to the network - nor do any of its transitive dependencies. The method of sandboxing using OS processes + namespaces and what not is too heavy and unusable at such granularity. The method of per-dependency static permission manifests in some meta-language is also poor. The method of a single IO monad is too coarse. Also using any sort of `unsafe` should not be allowed (or be its own super-capability). Obviously there are many tricky considerations. [For example, it is anti- modular - if suddenly UsefulService does need filesystem access, it's a breaking change, since it now must take a FilesystemService. But that sounds good to me - it's the point after all.] But does any language try to do this? ------ 3xblah The problem I see is not in the fact the develpers choose to rely on third party software reuse and thus create dependencies, but in how developers _choose_ which third party software to use. If their judgment fails, the consequences for the user can be dire. For example, Google chose to reuse the c-ares DNS library for their Chromebooks over other available DNS libraries. It is maintained by the same person who oversees the popular libcurl. The company issued a challenge and a $100,000 bounty for anyone who could create a persistent exploit with the Chromebook running in guest mode. As it happened, the winnning exploit relied on an off-by-one mistake in the c-ares library. Users are not in the position to decide which (free, open-source) code is reused in a mass market corporate product. They must rely on the judgment of the developers working for the corporation. On my personal computers, where I run a non-corporate OS, I prefer to use code from djbdns rather than c-ares for DNS queries. If someone finds an off-by-one mistake in djbdns, and this has negative consequences for me, it will be my own judgment that is to blame. ------ Felz The real dependency problem is that most languages give out way too much trust by default. Any code can have any side effects. I'd like ways to guarantee my dependencies have no side effects, like they were Haskell with no IO/unsafePerformIo, or to aggressively audit and limit those side effects. Malicious event stream package suddenly wants to use the network? No. ~~~ beardedwizard Another way to state this is: accept the state of the world and approach the problem using an existing methodology - treat code as untrusted and whitelist execution paths. SElinux and others do this, intrinsic is another product that uses the same approach for app runtime, I think this is probably the future of this problem space. This is zero trust, and this pattern is showing up everywhere (again?). ------ tabtab There used to be talk about how to increase "reuse" of software, and now that systems use masses of libraries, the down-sides of heavy but casual reuse are coming to light. I'm not sure of an easy answer. Perhaps the libraries can be reworked to make it easier to only use or extract the specific parts you need, but it's difficult to anticipate future and varied needs well. Trial and error, and blood, sweat, and tears may be the trick; but, nobody wants to pay for such because the benefits are not immediate nor guaranteed. OOP use to be "sold" as a domain modelling tool. It pretty much _failed_ at that for non-trivial domains (in my opinion at least), but made it easier to glue libraries together, and glue we did. ~~~ jerf It's not _that_ hard. You just need to think of dependencies as something that has non-zero benefits _and_ non-zero costs. The problem is that, as usual, whereever you've got a "zero" showing up in your cost/benefits analysis, you're overlooking _something_. Sometimes it's minor and negligible stuff, but sometimes it's not. Act accordingly. One thing that I believe we will come to a consensus on is that there is a certain fixed cost of a dependency, analogous to the base cost of a physical store to manage the stock of _anything_ that appears on the shelves no matter how cheap the individual item may be, and that a dependencies will need to overcome that base cost to be worthwhile. I suspect that the requisite functionality is generally going to require in the low hundreds of lines at a minimum to obtain, and that we're going to see a general movement away from these one-line "libraries". I say generally more than a few hundred lines because there are some exceptional cases, such as encryption algorithms or some very particular data structures like red-black trees, where they may not be a whole lot of lines per se, but they can be very dense, very details-oriented, very particular lines. Most of our code is not like that, though. ~~~ tabtab Re: _It 's not that hard_ Do you mean creating libraries that are flexible and partitioned well for _future_ needs? I do find that hard and almost no library maker I know of gets it right the first time. Analysis of current needs is difficult; analysis of future needs is extra difficult. Experience helps, but is still not powerful enough. The future continues to surprise the heck of out me. Tell God to slow things down ;-) ~~~ jerf No, I mean that it's not _that_ hard to do some due diligence when picking a dependency. You just need to get over the idea that it's something you don't need to do. No, you're not going to read every single line, but you ought to be running through the basics outlined by Russ in his post. If you're being paid to code and you're not doing those basics, you're being negligent in your professional duty. And knowing the internet and its inability to deal with nuance, let me say again, no, it's not _trivial_. But it's not _that hard_ , either. If a dependency is worth bringing in, it's bringing you enough value that you ought to be able to spare the effort of doing the basic due diligence. ------ trhway 15 years ago adding an external module was an endeavor involving approval forms, lawyers, etc. so that it frequently were much easier just to develop required functionality yourself. These days i still shudder seeing how the build goes somewhere, downloads something (usually you notice it only when whatever package manager being used for that part of the build didn't find the proxy or requires very peculiar way of specifying it - of course at the companies with transparent proxies people didn't notice even that ) ... completely opaque in the sense that even if i spend some time today looking into what is downloaded and where from, tomorrow another guy would just add another thing ... ------ jayd16 Is the package management story significantly worse for js/node than other languages or is it just a meme? If it actually does have more issues, why? Are the npm maintainers less rigorous than, maven central (for example)? Java is lucky enough to have a lot of very solid Apache libraries built with enterprise money. Is the culture different for js and npm? ~~~ aaaaaaaaaab Java/.NET/C++/etc. people don’t have the urge to publish every other line of code they deem “useful”. They also don’t have the urge to import said one- liners when writing a helper method in 15 seconds is perfectly adequate. ~~~ saagarjha > Java/.NET/C++/etc. people don’t have the urge to publish every other line of > code they deem “useful”. I do for my code sometimes, except I make GitHub Gists out of them instead of putting them on NPM. ------ baq > Adapting Leslie Lamport’s observation about distributed systems, a > dependency manager can easily create a situation in which the failure of a > package you didn’t even know existed can render your own code unusable. Gold right here. Makes me wonder what Lamport’s TLA+ could be used for in the problem area. ------ jrochkind1 > We do this because it’s easy, because it seems to work, because everyone > else is doing it too, and, most importantly, because it seems like a natural > continuation of age-old established practice. And because we literally could not be creating software with the capabilities we are at the costs it is being produced without shared open source dependencies. I guess this is the same thing as "it's easy", but it's actually quite a different thing when you say it like this. ------ BinaryIdiot Dependencies are such a huge pain but I kinda liked the way we handled it when I did contracting work for the NSA years ago. Essentially we told them _exactly_ what dependencies we needed, including subdependencies, and we audited them the best we could and then we included them. To avoid this headache meant we were less incentivized to just pull in a module for every little thing and, instead, write our own where necessary or used modules that had less subdependencies. I think we're ready for a new class of dependencies. Dependencies that have little to no subdependencies. Dependencies that you can more easily audit because of fewer subdependencies. Also, we need less building of JavaScript code in npm packages. Instead, let people access the raw code so they can not only do tree shaking but they can examine the code that is running versus the code that may be in git. You can still include it and minify it with your stuff. This would also mean you could have larger libraries that do more stuff because you'd only include what you use (think how many Java libraries work except you could pull out what you need). I don't think there is a good software / npm solution. I think we need to change the way we work with dependencies entirely. ------ mberning I am reminded of this gem: [https://www.mikeperham.com/2016/02/09/kill-your- dependencies...](https://www.mikeperham.com/2016/02/09/kill-your- dependencies/) ------ jackfoxy I ran across a great quote that sums up the situation. _...functionality is an asset, but code is a liability._ [http://widgetsandshit.com/teddziuba/2010/10/taco-bell- progra...](http://widgetsandshit.com/teddziuba/2010/10/taco-bell- programming.html) Don't know if the OP came up with it himself, but he is now a candidate for the California State Senate. ------ quantumwoke I much prefer Java's model of software dependency consisting of (for the most part) well-documented, large, feature-filled libraries distributed in an easily discoverable and maintainable manner (maven/gradle/...) to the dependency hell that is modern JS libraries. Hopefully newer languages like rust don't succumb to the same trap. ~~~ willtim I once took a close look at a Java Web service application running internally at a large bank. It depended on over 3000 jar files, most of them likely transitive. When I queried the rationale of this, the dev team just shrugged it off as common Java practice. I do not think Java is in a significantly better place than the JS world with regard to dependencies. ~~~ rhacker I am curious if it was actually 3000, or if that is embellished. I've been in about 6 java shops from Nike to startups, and the number is USUALLY around 100. The reason is really simple - Jar files used to be required to download manually to add as a dependency. So there was a history of about 15 years of doing it the hard way. After maven was introduced, it took a while before OSS libs started adding other libs. Most of the time OSS libs are just including other Jars from their own organization. ~~~ willtim It's possibly an embellished number, I cannot remember the actual number but it was significantly larger than 100. I seem to have remembered it as 3000. The project had many frameworks: spring, glassfish, camel among others. ~~~ rhacker Gotcha, I'm guessing 300 range. That is quite a bit for Java actually - so still counts as pretty bad. Contextually here's a fairly complicated program in our current stack (which is all JS), the node_modules folder has 722 dependencies in it right now. Edit: I was replying to your first edition of the reply. If it's truly 3000 that's quite insane. That being said, the projects with a few hundred would have Glassfish, CXF, Spring, etc... ------ m0zg Yes, that's why I package as much stuff as I can into a hermetic Bazel build, including Python modules (and yes, I build Python programs in Google PAR format using Subpar). They're all stored in my own cloud bucket, the entire transitive closure can be tracked down, and they don't change underneath me willy-nilly. For C++ cross-builds I also package toolchains in a similar fashion. You could also package a toolchain for the host if you'd like, I just don't bother. And I package test data likewise. The build isn't 100% hermetic, but I'd say about 90%. I feel pretty good about this set-up and recommend it to others. Grabbing random packages (and worse, their transitive closures) from the internet as a part of the build sounds insane to me. ------ romeisendcoming Article kind of mangles the relationship between software reuse (which _has_ been here for a long time) and specific language library, etc..management. many years ago now systems administrators were tasked with providing a safe and sane environment for end user and developers by performing the exact due diligence that is described in this article. In the 'move fast and break things age' all this has been thrown to the wind and everyone decries the language manager code sprawl and breakage. Of necessity enterprises revert to 'immutability' as if it was a desirable and necessary deployment characteristic. This is an ugly time in IT. ------ mrdoops The way I see it, our over-dependency (sorry for overloading the phrase) on Javascript as the de-facto web language has the pendulum far in one direction. How much longer can we keep this up? What's the maximum capacity of a developer ecosystem before dependency-hell and framework churn reaches critical mass? This is still a complicated information system - how far can it scale? What's the breaking point? There's so much amateur work and muddied merit-sense-making of what's good software, who to listen to, and how to move forward - my feeling is that pendulum is just about at peak. ~~~ k__ For me this sounds like FUD. Sure, you can install a bunch of deps for every small problem, but you don't have to. If you just take a bit time to think, you can roll your own solution for 90% of the deps, which are tiny packages anyway. ~~~ mrdoops But what of the newbie developer? Is he/she going to just roll their own dependencies and do so in a way that's tenable? Green developers make up most of the category. I guess I was trying to approach a few concerns beyond just dependencies: learning curve, conventions/standards, framework volatility, and merit assess- ability of ideas. The more people involved (popularity), the greater the difficulty to parse the merit of an idea without pre-existing competence. How easy is it for a new developer to find a cogent way of doing things in Javascript land compared to a smaller more specific ecosystem? In the smaller ecosystem the experts are easier to determine due to a smaller population, whereas in Javascript-land there's so many people, opinions, articles, and conventional disparities; a much more challenging exercise. ~~~ k__ In PHP people would (often badly) reinvent the wheel on every project. In JS people would install packages for every small problem they have. Neither is good. I always check if I can write it myself in reasonable time, if not, I install a package for it. I'd install React, but I'd write the navigation myself. I'd install a video-player, but I'd write a SVG animation myself. etc. ------ simonjgreen Along the same lines is Docker Hub. Blindly building your own images via dockerfiles that pull from others images should warrant serious consideration, especially given those images can be updated at any time. ------ jorangreef "Dependency managers can often provide statistics about usage" Using module usage statistics as a proxy for trust is not always a good idea. For example, I confirmed with the security team of npm that they do not audit module download statistics, i.e. no detection of gaming the system through multiple downloads from a given IP. It's quite possible for a module to have 10,000 weekly downloads, all generated by a cron curl script run by the module's author. I wouldn't be surprised if this was the case for not a few modules on npm, especially to develop trust for later exploits. ------ adgasf Great article. Some thoughts (mostly informed from design of Buckaroo [https://github.com/LoopPerfect/buckaroo/](https://github.com/LoopPerfect/buckaroo/) ): \- Cost of creating a package must be low (ideally the package just lives in source control). This encourages code reuse and therefore testing. \- Verification of changes must be easy. Git is a great tool for this - we can review patches between versions, rather than whole versions at once. \- It should be easy to extract dependency graph (including transitive deps) so that you analyze who you are trusting. \- There must be a verifiable chain from package source to package bundle (NPM fails here, do you really know the source code reviewed on GitHub is what went into the bundle on the NPM registry)? Better yet, have no bundles at all, just source code + build instructions. \- Reproducible installations (usually implemented via lock-files) are critical. Many package managers have lock-files that do not actually give reproducible installs. Beware! \- Package builds must be isolated from each-other (otherwise one package might tamper with another; I believe this is possible in NPM packages) ------ rdiddly This is excellent. Not only for the subject matter but the quality of writing. I often take an article like this, distill it into my own (usually fewer) words and save it as a text file. This one I kept "distilling" only to realize, nope, nope, the way he said it was more exact/precise/correct. ------ iand This is probably a prelude to a deeper discussion of the module notary service that the Go project intends to run. First announced in this post from the end of last year: [https://blog.golang.org/modules2019](https://blog.golang.org/modules2019) ------ monksy On dependencies: There aren't a lot of tools out there to keep you 100% up to date and to keep moving. There is maven-dependencies that can auto upgrade, however, that's just a simple version upgrade and may have issues with non-standard versioning. Also it doesn't help with transitive dependency conflicts. We need good tools to alert and stop transitive dependency conflicts in their tracks. Versions helps with this, but it doesn't tell you much. What we do need: Jenkins dependency triggers for the projects. We need something that will automatically work wtih SCM and CI to create commits based on new found dependencies. If there is something that changed your tests should confirm if it works or not. ~~~ riyakhanna1983 What about existing tools, such as Synk, OSSIndex? ~~~ monksy That's good for reporting. There should be an automated approach to keep projects up to date. ------ richardwhiuk If you can easily write a replacement for it, then the cost of depending on it is very small - because the worst case for the fix is replacing it.... ~~~ jeremycw Worst case is more along the lines of a bad actor makes malicious changes to the dependency which you then unwittingly deploy to prod potentially compromising your entire system. ~~~ cortesoft Or if the dependency disappears and breaks deploys [https://www.theregister.co.uk/2016/03/23/npm_left_pad_chaos/](https://www.theregister.co.uk/2016/03/23/npm_left_pad_chaos/) ~~~ Nasrudith Really I couldn't help but facepalm when I heard about that. "Haven't those people heard of local caching?!" Really and also freeze the version number to what you know will work while you are at it. Unless it is an actual security and/or standardization important component (say SSH) it can wait until you know what it will do and that it won't break anything. It is good for bloat avoidance, security, and reliability. ------ zzo38computer Reducing the number of dependencies can avoid many of the problems, and makes it easier to examine the code, as well as less likely to cause problems (of several kinds). Many code has too much dependencies. Whether writing in JavaScript or C or something else, I will usually not use many external libraries; most commonly none at all. ------ rurban I wouldn't qualify zlib as trusted high-quality code. He really needs to look deeper. ------ profalseidol There's a talk from Rich Hickey about this. ~~~ LandR Got a link? ~~~ profalseidol I think it's this one: [https://www.youtube.com/watch?v=oyLBGkS5ICk](https://www.youtube.com/watch?v=oyLBGkS5ICk) HN Post: [https://news.ycombinator.com/item?id=13085952](https://news.ycombinator.com/item?id=13085952) ------ yyyymmddhhmmss I am pretty new to development, and I keep trying to prove myself wrong over my apprehension to willy-nilly accumulate dependencies just because “the time savings add up”. Before starting any new project, I research and try all the existing similar projects I can find. I can predict their stability with overwhelming precision just by glancing at the dependencies, so the few projects I have built use only the most vanilla version of mainstream dependencies. And another result of this observation has been that I have come to devalue the word of devs with that happy-go-lucky approach to dependency accumulation. It seems to correlate with the exaggerated optimism that persists around everything in the development community. I’d like to be more optimistic just like everyone else, but ignoring debt like this doesn’t seem like the right way to do it. ------ ilaksh I'll just go ahead and take the downvotes/burial/lectures/ridicule whatever but I need to say it anyway. I've been programming for thirty years and in my opinion effective code reuse with npm is one of the greatest achievements in the history of software engineering. It's not perfect but it should be appreciated more and the issues are being overblown.
{ "pile_set_name": "HackerNews" }
We overcomplicated the hell out of both our products - joelle https://medium.com/p/1816bd8a341a ====== goldvine It's interesting to hear from some people that the direction we've ended up pursuing is the direction they originally perceived us to be pursuing. #CommunicationFail Anyone else experienced this?
{ "pile_set_name": "HackerNews" }
Ask HN: What technologies can we use to minimise data collected into PRISM - mark_ellul We all now know the news about PRISM, so I was wondering on your thoughts on how we can stop the majority of our data going into PRISM.<p>So I thought this would be a good Forum to discuss the technical approaches to minimizing our Data making it into PRISM?<p>There are essential services and tasks that we all use and do and I was wondering what suggests we as a community can provide to minimize the Privacy Invasion.&lt;p&gt;Here are some examples:<p>Browsing: Tor<p>Email: Private Mail Server with PGP<p>Social Network &#x2F; Media Sharing : Diaspora?<p>Storage: Mega?<p>Etc....<p>Looking forward your comments. ====== gesman Wasting less time on facebook will leave NSA emptyhanded! :) ~~~ mark_ellul Yes, I guess removing Facebook account and completely stop using the service would definitely be an option.
{ "pile_set_name": "HackerNews" }
Lean Domain Search Adds 450 New Search Results; Now Checks 2,500 Domains/Search - matt1 http://www.leandomainsearch.com/blog/8-lean-domain-search-adds-450-new-search-results--now-checks-2-500-domain-names-per-search ====== petercooper I've seen a lot of projects like this come and go or, most often, sit around getting few updates. For some reason I started to follow Matt on Twitter when he first launched LDS and I've been impressed at how he's kept chipping away at it making it better. (His technique for catching people who don't use his links to register the domains found is genius and, I've inferred, works well.) He just put a graph of his traffic on Twitter as well and it clearly shows the value of continuing to hammer away at a project over time rather than releasing and forgetting about it: <http://cl.ly/3C181Q3A1n2k142C0c0L> So big thumbs up to Matt.
{ "pile_set_name": "HackerNews" }
Do Difficult Job Interviews Lead to More Satisfied Workers? - gcz92 https://www.glassdoor.com/research/studies/interview-difficulty/ ====== at-fates-hands I would think this is pretty obvious. I don't think it's a direct correlation as much as it feels like a side effect of said process. An example would be you find a great candidate who is a great fit, and then they demonstrate this with a great technical interview. I would also think when you go through a tough interview and are successful, that candidate feels vindicated they have the chops to compete and succeed in a company with a lot of competition. A lot of these companies in my area are well known and the guys who work there like to say they work there - since it's like getting accepted into an Ivy League school, there's a sense of satisfaction with getting chosen to work there. In my experience, I've had it go both ways. One shop I had three interviews, a code challenge and a final interview with the IT director. Afterwards, I got the gig, and then they low balled my salary. It was a very hipster startup and well known among developers as a "cool, geeky" place to work. I was surprised at how they promoted all the perks, "All the Red Bull you can drink! Free video games! Beer:30 EVERY DAY!!" but failed to say how little their developers get paid. It was eye opening to say the least. On the flip side, I've had "one-time" interviews where you get one shot to impress somebody and have been successful and loved the job and stayed there for many years.
{ "pile_set_name": "HackerNews" }
Advice for Startup CEOs - randfish http://www.seomoz.org/blog/advice-for-startup-ceos ====== mixmax Some good advice in there. But the best advice is this: be lucky :-) ------ igorthetroll I am glad you are self analyzing yourself. Wag of the Finger at you, You got me Wrong! Igor The Troll
{ "pile_set_name": "HackerNews" }
Show HN: Stig – A CLI tool for searching GitHub from the terminal - octobanana https://octobanana.com/software/stig ====== octobanana Hello there! For a weekend project, I wanted to write a program that would use the C++ HTTP client library I've been working on recently. I was curious to put it to the test in a real scenario and see what works and find any pain points. I decided on making a CLI program that utilized GitHub's HTTP API to perform search queries. Stig is a CLI tool for searching GitHub from your terminal. It has all the same sorting and filter options that are present on GitHub, and outputs coloured, formatted results to stdout. Feedback and thoughts are welcomed! View on my personal website - [https://octobanana.com/software/stig](https://octobanana.com/software/stig) View on GitHub - [https://github.com/octobanana/stig](https://github.com/octobanana/stig)
{ "pile_set_name": "HackerNews" }
Ray Dalio – The Changing World Order: Where we are and where we are going - Lx1oG-AWb6h_ZG0 https://www.linkedin.com/pulse/chapter-1-big-picture-tiny-nutshell-ray-dalio ====== chewz This is the moron who said 'Cash is trash' just few weeks before market sellout... and his alpha strategy is to sit out the losses [https://m.youtube.com/watch?v=tZyWVxGXPHo](https://m.youtube.com/watch?v=tZyWVxGXPHo) [https://www.ft.com/content/6addc002-6666-11ea-800d-da70cff6e...](https://www.ft.com/content/6addc002-6666-11ea-800d-da70cff6e4d3) [https://www.reuters.com/article/health-coronavirus-funds- bri...](https://www.reuters.com/article/health-coronavirus-funds-bridgewater- idUSL1N2B803V) ~~~ jmeister That’s harsh, he has a multi-decade track record ~~~ chewz They all do have track record until they don't. The LTCM guy, the PIMCO guy etc.. There were so many of them. You simply don't hear about guys who do not have track record until they do..
{ "pile_set_name": "HackerNews" }
Ask HN: Which stock market website/app are you using? - dodoflying Im curious to know: Which stock market website/app are HN users using? What's the reason? ====== pjd7 In Australia comsec.com.au, large financial institution. Solid financials. Easy to transfer money in and out. Has a regular bank account with it that earns above 4% interest when my money isn't in stocks. In the USA scottrade.com, colleague uses them. Read some reviews of them vs etrade, tdameritrade etc. And scottrade has the least evil reviews based on my limited sample of what I read. ------ 1123581321 If you mean broker, I am in the United States and use Scottrade. I use them because their fees are low, their tools are good enough and their service is excellent -- especially because they have an office in my city where I can fill out transfer paperwork in front of an employee to reduce the chance of time-wasting mistakes.
{ "pile_set_name": "HackerNews" }
Diabetes Gene Common In Latinos Has Ancient Roots - rosser http://www.npr.org/blogs/health/2013/12/25/256832685/diabetes-gene-common-in-latinos-has-ancient-roots ====== tokenadult I read through the submitted article here to find the link to the scientific journal article[1] that has just come out from this research group. The abstract tells the basic story: "Performing genetic studies in multiple human populations can identify disease risk alleles that are common in one population but rare in others1, with the potential to illuminate pathophysiology, health disparities, and the population genetic origins of disease alleles. Here we analysed 9.2 million single nucleotide polymorphisms (SNPs) in each of 8,214 Mexicans and other Latin Americans: 3,848 with type 2 diabetes and 4,366 non-diabetic controls. In addition to replicating previous findings2, 3, 4, we identified a novel locus associated with type 2 diabetes at genome-wide significance spanning the solute carriers SLC16A11 and SLC16A13 (P = 3.9 × 10−13; odds ratio (OR) = 1.29). The association was stronger in younger, leaner people with type 2 diabetes, and replicated in independent samples (P = 1.1 × 10−4; OR = 1.20). The risk haplotype carries four amino acid substitutions, all in SLC16A11; it is present at ~50% frequency in Native American samples and ~10% in east Asian, but is rare in European and African samples. Analysis of an archaic genome sequence indicated that the risk haplotype introgressed into modern humans via admixture with Neanderthals. The SLC16A11 messenger RNA is expressed in liver, and V5-tagged SLC16A11 protein localizes to the endoplasmic reticulum. Expression of SLC16A11 in heterologous cells alters lipid metabolism, most notably causing an increase in intracellular triacylglycerol levels. Despite type 2 diabetes having been well studied by genome-wide association studies in other populations, analysis in Mexican and Latin American individuals identified SLC16A11 as a novel candidate gene for type 2 diabetes with a possible role in triacylglycerol metabolism." The most novel and startling part of the factual claims in the abstract, and definitely the part that I am most dubious about, is "the risk haplotype introgressed into modern humans via admixture with Neanderthals." Well, maybe, but maybe not. There have been very few samples of ancient hominid DNA so far, so we are still not sure what range of variation was found among ancestors of today's _Homo sapiens_ species to which we all belong. [1] [http://www.nature.com/nature/journal/vaop/ncurrent/full/natu...](http://www.nature.com/nature/journal/vaop/ncurrent/full/nature12828.html) ~~~ csense Since the "Latino" category encompasses people of European, African, and Native American ancestry [1] [2], I was thinking the headline/article would be more informative if it stated which of these ancestral populations had the gene (assuming that question could be answered from the research methodology used). Your comment answers my question; the gene occurs at highest frequency in Native American samples. [1] [http://en.wikipedia.org/wiki/Latino#Terminology](http://en.wikipedia.org/wiki/Latino#Terminology) [2] [http://en.wikipedia.org/wiki/Latin_Americans#Demographics](http://en.wikipedia.org/wiki/Latin_Americans#Demographics) ------ DonGateley Does this imply that Neanderthals skedaddled to the Americas? There was equal mention of Neanderthals and native Americans in the article but they seem to have avoided making the connection explicit. ~~~ gonnakillme No. It's disputed, but Neanderthals almost definitely died out before the human migration to North America. ------ kimonos Very interesting! Thanks for sharing!
{ "pile_set_name": "HackerNews" }
Ask HN: Going in circle – no traction, no investors - gab007 I am the single developer of a note-taking app. I&#x27;ve reached a point where the app needs a team and some funding to move forward. I would like to apply for seed-investment, but given the fact that investors like to see (among other things) traction, some customer base, etc - I know that chances are slim for me to get any investment. Did my homework and I am able to articulate the key differentiators properly.<p>Right now I cannot get any traction with the current state of the app (not consumer-ready). So I am stuck in this loop... I am reluctant to apply for seed investment as a single developer - as I know that this does not look good to investors. All I have is a website, screenshots, a blog, a demo and a deck.<p>I know that&#x27;s not enough, but I also know that this has some potential. How do you break this loop? ====== thecupisblue Because, as you say it yourself - there is a million note-taking apps out there. Your "differentiator" feature isn't that big of a deal. The UI is ugly- ish. Honestly, if I was an interested investor and you pitched me this I'd be out of that meeting faster than you can say elevator pitch. It's not a niche, you've got competition that raised a ton of money and is dominating the market and the competition is showing wounds that point at the market being not just saturated but not profitable as much as some investors thought. Don't waste your talents on this. ~~~ gab007 Thanks, thecupisblue. This is a "cold shower" \- I appreciate you being straight-forward. I agree that the UI is not the best, that's not what's worrying me :) Initially I've started working on this because I needed an app that does this, this and that - and I could not find one. As it is now, I am actually using it on regular basis. Right now I am trying to figure out if there are any others looking for the same features - and validate that. Thanks for the input. ~~~ quickthrower2 Its a nice feature set, but its hard to sell me on a separate app. I persevere with google keep and google calendar even though they are less than ideal because I already have a login for them. For notes at work its one note because everyone else uses it. So great features are less of a sell than convenience for me. ~~~ gab007 Same here - I only sign-up for services that are a "need" not a "want". If I implement a "Sign up with Google" feature - would you try the app? Thanks for checking! ~~~ quickthrower2 I'm still not sure. I am not sure it solves any pressing need. Sure Google apps have problems but I can get by with them. It's kind of an 'activation energy' thing where if Google were to cancel keep/calendar I would hunt for another solution. But it might be a .txt file on Dropbox because then again I don't need another service. It is a bit like JavaScript fatigue. I have SaaS fatigue! Especially as a developer using Azure, Dropbox, Travis, GitHub, Keepass, Google, etc. then at home using Netflix etc. ~~~ gab007 > I have SaaS fatigue! I've smiled at this one. Taking a moment to think about it, it's true. If you've looked at the presentation, one the things I'm looking at - is to market this as a personal device, for exactly that reason. Thanks for input. ------ mygo what exactly do you need seed money for? what’s its purpose? Is it to keep you eating so that you can finish building the app? IMO you need proof that people actually want this thing. I wouldn’t write another line of app code. put up marketing material and get your market to sign up to be notified for when it comes out. Treat those sign ups as validation of demand. It won’t be as good validation as actual payment, which would validate the business prospect... but those RSVP numbers will indicate that this is something probably worth investing your time in (and other people’s money in). and you can get your beta users from that list. ~~~ gab007 The funding would be for driving the development of the application further, and not to "keep me eating". Right now "it screams" single developer all over. I agree that the app needs validation. About a month ago I've put Mailchimp signup forms on my website - to see if there is any interest in the app. This is not ideal however, without a demo of the app (sign up for what?) Proof that people actually want/need the service - yes, this is a good point, I am still trying to figure out how to validate this without having a finished product... Thanks! ~~~ mygo You need validation. You don't need to develop the app to have a demo of it. You can put together mockups that look and function the way the finished app is supposed to look and function. You can have someone to put together an animation based on the mockups. If there's a problem it's addressing that people are trying to address, someone's going to want to be notified when the solution is brought into the world. ------ fundamental Looking at the app/block/deck in question, it feels like it is still somewhat unfocused. You compare it to your competitor and it comes off as "like them, just better". Obtaining 1-2 alpha users could help refine how you would present and target specific differentiating factors. Since I'm not very familiar with the space, feel free to take this with a large grain of salt. ~~~ gab007 Thank you! May I ask where did you see the deck (you can use the email associated with my account)? ~~~ fundamental The deck appears to be the second google result when searching for "NoterBox". ~~~ gab007 Thanks - got it. ------ DrNuke > How do you break this loop? Crowded market, half-baked product, no sales? Honest answer is stop here, learn from your own post-mortem, add this project to your portfolio and move on. Next time you will do better. ------ navd Probably not what you want to hear but, the next step is that you continue iterating to test to see if you can get traction. If you can’t convince people to use the product it might mean that it is not something people want. Try treating your product like a science experiment. Your idea and execution is a hypothesis for what you think people want. If you’re an engineer then the above doesn’t cost any money and hence doesn’t require investors. If not you have to get good at convincing people to work with you. ~~~ gab007 I have not attempted to convince anyone to use the app so far :) Initially, I've built the app for personal use (and I am using it). And yes, it will cost a considerable amount of money to have the app live - for testing purposes. "If not you have to get good at convincing people to work with you". That is actually very good advice. Without money and proper market validation, this is not a bad idea at all. Thank you. ------ ezekg If you don't have traction yet, how have you reached a point where you need a team? ~~~ gab007 That's actually a valid question - never thought of it this way. It's probably what an investor would ask. Thank you ezekg. ------ zachguo How about serving a tiny niche first and aiming at profitability?
{ "pile_set_name": "HackerNews" }
Ask HN: Someone ripped off my app, is there any recourse with Apple? - wacheena I built a simple Android app: https://market.android.com/details?id=com.tenromans.birthdaycake.free<p>And I discovered today that a developer has taken the graphics and rebuilt it for iPhone: http://itunes.apple.com/us/app/make-birthday-cake/id469010303?mt=8<p>Frankly, that's the nature of the business. Things get copied all the time. But it also kinda sticks because the graphics and whatnot are my IP.<p>Is there any recourse with Apple to have them remove the app from the iTunes store? ====== tstegart You should be able to file a copyright complaint with Apple: <http://www.apple.com/legal/contact/> ~~~ squidbot This is definitely the appropriate response, and I've found Apple very reasonable in these situations if you are able to prove copyright. ------ kentnguyen I have witness a similar case where one Apple dev rip off another developer by repacking and then resubmit the same app. He submit a request to Apple and then a few days later that clone app got pulled. ------ chris_dcosta The was a thread here on HN about another copycat app but I can't find it for now. It was a slightly different case in that both apps were in the Apple App store, and I guess it would be easy to prove "prior art". Your case is different in that Apple hav no record of your app being in their echo system, you would have to demonstrate prior art somehow, otherwise it could be argued that you have copied them. If you have any documentation proving the dates on which your app was accepted into the Android market, that would help. ------ smashing You could send a DMCA notice to Apple for the app, but I find it strange that you would ask people on this site on protecting your copyright when YC is so vehemently opposed to copyright monopolies like yours. I support copyrights though, so good luck. Here is the link: <https://www.apple.com/legal/trademark/claimsofcopyright.html> ------ wacheena Android link correction. This is the paid ($0.99) version: [https://market.android.com/details?id=com.tenromans.birthday...](https://market.android.com/details?id=com.tenromans.birthdaycake) ------ coryl Quick question, do people buy your app on android?
{ "pile_set_name": "HackerNews" }
This one guy is in every tech video - 0898 https://www.linkedin.com/pulse/article/20141010151209-25388572-the-guy-in-every-tech-video?trk=object-title ====== minimaxir Linkbaity titles don't work if you're not BuzzFeed or Business Insider. ------ 5414h fake title damn u ~~~ razster How is the title fake? I'm not awake enough to catch it. The Sandwich dude is in almost every start-up companies video ad. Title seems accurate.
{ "pile_set_name": "HackerNews" }
The 21st IOCCC Winners - dlowe http://www.ioccc.org/2012/whowon.html ====== hafabnew The way the site is run really lets the contest down. ~~~ TazeTSchnitzel Why? How? They have a single page with all the winners ever, and for each C file they also have a hint.text/hint.markdown/hint.html file. They also have a Twitter feed. What's so bad about that? ~~~ hafabnew Weeeelll: 1) As others have pointed out, the separate release of code/writeup. I wager that most people really just want to see the code. Why bother doing both? If it's just to attract attention, that's a reasonably valid reason -- but it probably has the opposite of the desired effect, people get annoyed that they can't view the code now, and therefore start disliking the contest in general. 2) Even when the code is released, the format they use makes it difficult to actually look at the code. Let's take the 2011 winners for example [1]. One would assume that clicking each entry (e.g., the top entry[2]) would perhaps show the code, perhaps annotated in a useful way... nope! Surely it must link to the code then... nope! Perhaps it links to a page that links to the code... nope! You have to go to the 'Winning Entries' page from the main menu (from [1]), scroll down to the appropriate year, then play a fun game of matching up entrant's surnames to their entries (yes, I know the surname is in the URL of [2]). [ 3) While not a 'real' complaint: the I-just-learned-how-to- use-a-3D-modelling-program logo really is awful. It makes the contest look juvenile, when in fact the quality of the winning entries is very high. The site looks much better without the logo -- try it yourself, delete the img node from the homepage using Inspector/Firebug/whatever. ] In conclusion: show us the code, delete the logo :). [1] <http://www.ioccc.org/2011/whowon.html> [2] <http://www.ioccc.org/2011/blakely/hint.html> ~~~ lifthrasiir 1) The primary reason to do separate releases is because the winning entries do not appear in the website as is. As far as I know the judges have to write separate remarks, the authors have to check any remaining problems and judges and authors have to agree on the finished write-ups. While it is a bit tedious, given the number of winning entries it seems reasonable. 2) Yup, agreed. For example the current website does not allow inspecting the code without downloading it first. (That's why I love www2.us.ioccc.org...) 3) They are not ordinary logos. They are made from the ray tracers from previous IOCCC winners (2004/garave and 2011/zucker, respectively). I do think that those logos should really link to the relevant entries, however. ~~~ ioccc (2) and (3) are now fixed. (2) The mime types for the .c and .h files are now set to text/plain on <http://www.ioccc.org>. (3) I (Simon) have added a link to the winning entry that generates the current logo. ~~~ lifthrasiir Oh, thank you a lot! Should have sent emails before, but I always forget... ------ VMG So - where is the code? ~~~ dbaupp I wondered that too. But in the news section[1] of the front page: _The winning source will be released later this year after the winners have reviewed the writeup of their entries._ [1]: <http://www.ioccc.org/index.html#news> ~~~ tisme The whole fun of the ioccc is to go through the code and figure out how it is done. Without the code this is a non-event. ~~~ pmr_ Reading the write-up in combination with the code is usually really entertaining. Having the code before that would make it a lot less entertaining. But you are of course right, as long as there is no code, there isn't much to actually see here.
{ "pile_set_name": "HackerNews" }
Brilliantly coded 64k pc demo by Approximate released at Revision 2012 - carlhblomqvist http://www.youtube.com/watch?v=4Kx66_i3ue4 Brilliantly coded 64k pc demo by Approximate released at Revision 2012 in southwest Germany (April 6th to 9th). All in a 64kb executable file. ====== sp332 As usual, YouTube doesn't do this demo justice. If you have the hardware for it, you really should watch this demo as it was intended: rendered in real- time! It's available from pouet.net <http://www.pouet.net/prod.php?which=59107> Just click the "download" link. You can see the binary is exactly 65,536 bytes :)
{ "pile_set_name": "HackerNews" }
Google readies its own chip for future Pixels and Chromebooks - rbanffy https://www.axios.com/scoop-google-readies-its-own-chip-for-future-pixels-chromebooks-e5f8479e-4a38-485c-a264-9ef9cf68908c.html ====== est31 In the north american phone market, Google has 2.3% market share. The other two vendors with their custom chips have 55% (Apple) and 26% (Samsung) and are market leaders globally as well. Globally, Google's market share is even worse. They certainly have the capital and manpower to design chips, but as selling phones and chromebooks isn't such a great priority for Google, they might not pour as much money into it as Apple so the resulting performance might be disappointing. Furthermore, no matter the amount of money spent, they likely won't it get back unless they start licensing the SoC but for that to work it has to be much better than the alternatives. Overall, with Moore's law dying, there _will be_ a trend towards more and more vendors building custom chips, but that's a rather long term trend and I think Google is a bit early for it. From a strategic point of view though it does make sense because it gives Google a foot in the door, seats on committees, etc., giving Google both information as well as influence. But I wouldn't be surprised if the project gets cancelled in 3 years.
{ "pile_set_name": "HackerNews" }
[re]Designing the Nutrition Label - ajaimk http://www.ajaimk.com/2010/11/03/redesign-1-nutrition-labels/ ====== charliepark Red and Green are colors with an inherent value (at least, in the US), suggesting good and bad. Unless there's a reason that they're the colors they are, you should use a color (I'd suggest a dark gray) that doesn't have a specific value. I normally rail against pie charts, but in this case, you're comparing a part (calories in the serving size) to the whole (recommended calories per day), so I'm okay with it. But the bigger thing I'd want to comment on: If you're redesigning the label, REALLY redesign it. Show the volume of the serving suggestion with a photo on a standardized plate / bowl. Or bring in some other piece of data that helps people make decisions. Do something wholly different with it. (Basically, what DanielStraight said.) ------ DanielStraight Aside from the pie chart and Christmas colors (which I can't figure out the logic of intuitively), I don't see what's much different, and since we know that people are terrible at reading pie charts, I don't see how the pie charts will help. I would like to see numbers per 100 g, or some other standard that can be compared across foods. I would also like to see a nutrient density score of some kind.
{ "pile_set_name": "HackerNews" }
Programmer Is Bringing Bricked Flywheel Bikes Back to Life - elsewhen https://www.vice.com/en_us/article/v7gxga/this-programmer-is-bringing-bricked-flywheel-bikes-back-to-life ====== 1f60c Previous discussion: [https://news.ycombinator.com/item?id=24022751](https://news.ycombinator.com/item?id=24022751)
{ "pile_set_name": "HackerNews" }
Birth and Death of Microsoft Bing - domino http://myprasanna.posterous.com/birth-and-death-of-microsoft-bing ====== raganwald Perhaps a bit OT, but... The post seemed to be riddled with formatting and grammar errors. This rubbed my old-school English sensibilities at first, but then I began to enjoy its rough feel. After all, it's a post about how people who worked tirelessly to bring a product to market were shipping things while the rest of Microsoft slept. The story very clearly describes a dichotomy in Microsoft's culture between process/rules/superficial quality on the one hand and relentlessly shortening the ship/fix cycle on the other. This post is not just about shortened ship/fix cycles, _it is itself an example of a shortened write/fix cycle_. When that struck me, the style of post suddenly "clicked:" It was as if I was reading an email that was furiously blasted out to Posterous while the author's compiler worked, and thereafter there was no time for extensive editing and proofing by a circle of reviewers. What mattered was to get the idea out and to start the conversation, editing and polish would follow later. Great stuff! ~~~ myprasanna I'm the author of this post and by no means I expected this to be on the top of HN today. It was a surprise. I din't do any good editing on this, since it was my personal blog and I had sent to Michael Arrington, who wanted to edit/publish it. For some reason, he backed out at the last moment and it din't make it to TC. Welcome to the world of citizen journalism. Sorry about the typos/errors. I'm looking into this now :) ~~~ AJ007 Was this get modified? I didn't notice anything reading through. ------ latch The OP seems to attribute the "failure" of bing to common problems associated with Microsoft (in specific) and large companies (in general). With a specific point that it all started wonderfully, then got corporatized. I'm happy believing that this was the main problem. But...as an end user i don't think Bing was/is ever as as close to Google as the OP seems to think. ~~~ exit why was kami8844's comment instantly flagged? it's really disgusting to see people quietly being blacklisted. \--- 1 point by kami8844 0 minutes ago | link [dead] I had to do some web scraping for an application that I recently wrote and only when my app's performance started to rely on the results provided by the various search engines out there, I started to fully appreciate how good Google is. It's just no comparison; in edge cases and unconventional searches (where it really matters) Google completely creams the competition. While Bing came closest to providing search results as accurate as Googles it still wasn't at any comparable level, so all in all I agree with your point. \--- ~~~ gjm11 I wonder whether it's an automatic consequence of having substantial negative karma. (I'm ambivalent about the stealth-blacklisting thing. It's probably the right thing to do with genuinely abusive users. It might be the right thing with people genuinely incapable of contributing much. But I've seen too many cases where someone's comments are all being auto-deaded -- invisibly to them, AIUI -- with no obvious reason why they should deserve it.) ~~~ jules Right, the system is far too trigger happy. Instead of showing a newcomer what kind of comments are valued here and possibly gaining a valuable new contributor, the system severely punishes beginner mistakes. We can't reasonably expect that a new user knows what kind of comments are valued because on the rest of the internet such comments are perfectly acceptable. Perhaps something like Quora does would help: before you can use the site you have to do a quiz on what kind of comments are good comments. ~~~ redthrowaway "Perhaps something like Quora does would help: before you can use the site you have to do a quiz on what kind of comments are good comments." Really? Sorry, but that sounds like a terrible idea. HN is already insular enough, we don't need to start demanding newcomers pass a test before we let them comment. ~~~ jules Let's see. There are two groups of people: people who would have passed the test and people who would not have. The people who would not have would most likely be hellbanned after their first 3 comments (and of course people are allowed to take the test as many times as they want). So you lose nothing. By using a test fewer legitimate people get hellbanned. In other words, this is only going to improve the situation. I'm not talking about a difficult test here: just a couple of questions like: Comment: LOL Is this an acceptable comment? Right now people are used to that being an acceptable comment on the rest of the internet. These people currently get hellbanned on HN because other people downvote these comments. It's not a test for testing whether the people are acceptable on HN, it's method of teaching customs and a test for whether people have read the guidelines. ~~~ redthrowaway I'm not opposed to it because I think it wouldn't keep bad posters off, I'm opposed to it because it would keep _most_ posters off. It's arrogant and self-righteous. "Sorry, you have to _prove_ you're good enough to post on our holy news aggregator." It leaves a bitter taste in my mouth and it's the last thing this community needs. ~~~ jules So you're saying that the current method of silencing those people without even notifying them is preferred? They keep posting and most times their posts add value. Yet these posts are invisible to users without the showdead option on. ~~~ redthrowaway The karma metric is pretty transparent. You learn very quickly which comments are and are not appreciated. Dropping a friendly comment to someone you see who hasn't caught on yet works, as well. What do you think the likes of a Matt Cutts would do if they were trying to sign up for HN and the site forced them to say whether "LOL" was an appropriate comment before allowing them to post? It's insulting and arrogant and will drive away the kind of people we want posting here. All that for a "problem" that is invisible the vast majority of the time. ~~~ jules Stopping famous people from signing up is a good point. On the other hand the system is clearly broken now. > The karma metric is pretty transparent. You learn very quickly which > comments are and are not appreciated. Dropping a friendly comment to someone > you see who hasn't caught on yet works, as well. This is not the case as it is currently implemented. If one of your first comments gets downvoted you get hellbanned. There is no chance to learn from your mistakes. Dropping a friendly comment doesn't work either because you cannot respond to hellbanned people. Do you have showdead on? Try it and you'll probably see that about half of the hellbanned people still posting invisible comments are legitimate. For example you will find 3 of those people commenting on this post, two of them having no idea that nobody is reading their comments. For example look at <http://news.ycombinator.com/threads?id=bshock> This guy has been banned for 2 downvoted comments and has been posting legitimate but invisible comments for over a year. You can clearly see the learning effects: his first couple of comments are not HN quality. Unfortunately by the time he got accustomed to HN he had been silenced. ~~~ redthrowaway I think we can fix hellbanning without too much tinkering. Perhaps a simple notice if someone's first posts are downvoted advising them to check the submissions and comments guidelines, perhaps with some common first time mistakes and their more preferable counterparts added. That should help the noobs while still allowing trolls to be banned. ------ enjo This is tangential, but somehow related: My level of frustration Redmond has reached epic levels. My company spends thousands of dollars a week managing advertising campaigns on Adcenter. They have an API which has been nothing but issues, but given the breadth of our advertising base it's absolutely necessary that we use it. Today we have entered day number FIVE of an outage in which the API (at least one critical portion of it) simply errors out no matter what call you make. So for five days we've been unable to pause campaigns, change bid prices, or otherwise do anything to effectively manage our campaigns. It's nuts. This is the second major outage in the last couple of weeks. The part that KILLS me is that nobody in Redmond seems to give a damn. They announced that they had a problem two days after I brought it to their attention. They are apparently working on some sort of fix that may or may not be pushed sometime in the last three days. Meanwhile we are absolutely blowing through cash because of the things that we can't adjust. We're tens of thousands of keywords spread out over more than a thousand campaigns. We don't employ anybody to manage these by hand... ~~~ forwardslash I assume you're using the REST API? While they try and roll out a fix, have you tried to use the adCenter Desktop to at least somewhat manage the ads? ~~~ AJ007 That might work if adcenter desktop was actually stable! ~~~ robryan That would be of little comfort I'd imagine if you had a lot of custom stuff running through the API. At least they opened the thing up recently to add customers, that's a step in the right direction. (Although that could also be the cause of instability, they did have years to prepare for it though.) ------ mattmanser The whole article seems to be back to front. As far as I knew Live search was essentially failing then they made it Bing and it's started to succeed. Am I missing something here or what? I'm no expert on the history but it seems to me that the opposite of what the author is saying actually happened! ~~~ nchlswu I think that's one of the objectives of this article; provide that alternate perspective. I thought that Bing was the true turning point as well, but I never gave Live Search a fair chance then, and I don't think many others did either. To me, it looks like the author saw Bing/Live Search as something truly transformational within Microsoft. Public perception was that Live was a failure. But if I understand currently, the team was easily beating internal estimates extremely fast . For one reason or another there was a team reorganization that coincided with the PowerSet acquisition and the Bing rebrand. While there was a jump in market share, the foundation of the Bing team was taken out from under them and replaced with MS status quo. Bing's death isn't a result of their success or failure as a search engine. Bing's death refers to the loss of something that could have made a difference in Microsoft, internally. The death of a team that could have done something truly great , (EDIT: as said by Cicero, when they were at their peak). ~~~ dwc _> Public perception was that Live was a failure._ At that time I was paying a lot of attention to search results, from two perspectives: 1) I had some slightly unusual / difficult searches I performed regularly, and 2) examining search terms that brought people to some sites I ran. For case 1, Google simply wiped the floor with Live. Note that Live had the most relevant results in their index, but they'd be _way_ down on the 5th page, 10th page, wherever. For case 2, the majority of people coming to my sites from Live were coming there with search terms indicating that they did not want my site. For example, I had content for Phoenix, AZ and some polls. My site stayed within the top 5 on Live for search terms like "phoenix polling locations." Of course every site gets some of this from any search engine, but with Live is was problematic. My perception was that Live was a failure, and I think my reasons were valid. ~~~ nchlswu I was too young and never paid attention to search results. I definitely think your reasons are valid. I didn't intend to say people's perspectives weren't, rather that from an insider's perspective, Live was very much approaching success. ------ Matt_Cutts "They [Bing] had weekly release cycles - faster than Google back then" Hmm. I'm gonna have to disagree with that part. :) ~~~ myprasanna Matt, How long would you estimate, for a search changelist to hit the production at Google? I've got friends working there. Prepare to be surprised. ~~~ hexis I think you've got a bit of a surprise in store for you, too, when you find out what Matt does for a living. ~~~ myprasanna Got it :) I still know for a fact that, it takes at-least a month on average, for a search change list to reach production. Would you disagree Matt? ~~~ shadowmatter I'm an ex-Googler, and I disagree. Before I left the GWS team (<http://www.theregister.co.uk/2010/01/29/google_web_server/>) became a model for how frequent, stable releases should be done within the company. That's all I'll say. ~~~ myprasanna I've just recently spoken with my friends, and I know for a fact that it atleast takes a month from point of checkin to review/test/stage/production. If you disagree, I think what you are talking about, is probably an exception and not the norm. Being secretive about release cycles is pointless stealth. ~~~ Semiapies What else do you "know for a fact"? ------ athom "The report of my death was an exaggeration." -- Mark Twain I was having a look at Terabyte drives in Best Buy yesterday, and while wondering how well a model might work with Linux, I realized, now the display computers actually have internet capability, I _should_ be able to look it up right there in the store! So, I wander over to a convenient laptop, kick it out of screensaver mode, start up the browser, and plug in the product name. Only after I hit the search button did I notice WHAT service I was using. Added bonus: Google was NOT an option. I'll believe that Bing is dead when it isn't the default search engine in the default browser on the default operating system at the default computer store. ------ jdp23 Interesting perspectives. I was there in 2006-2007 when they made the decision to throw resources at the problem and challenge Google head-on in algorithmic search. The strategy at the time was to become #2 in a duopoly by investing at a level that Yahoo! couldn't compete with, and focus on the most valuable searches (travel, shopping, etc.), and leverage Microsoft Research a lot more. From an abstract business perspective it's worked remarkably well. But if so many motivated and talented people are leaving, then there's something fundamentally flawed. And there were a lot of other much-less-expensive approaches they could have taken instead (or in addition, if they wanted to shoot for the moon) that would have also created a lot more opportunities for growth and excitement for younger engineers in particular. Ah well. ------ hanifvirani Strange. To me, as an outsider, it looks like Bing has just started to get good enough to be considered as a threat to Google. Of course, they have a _long long_ way to go. But it appears as a rapidly emerging product rather than a dying product. ~~~ kenjackson I agree. It was only in the last year that I could use Bing as my primary search engine. ------ scorpion032 The biggest problem that comes in the way is the condescending attitude of the "grown ups". It is very important for the "management" to realize that they are actually only facilitating what is "happening" and they should let the system handle itself and get out of the way than get into and disturb the existing norm. ~~~ raganwald One of the most serious problems with modern "management" is that the incentives are all wrong. Imagine that I hire a programmer and pay him by the line of code. This idea has been so thoroughly debunked that it is nearly impossible to write out the consequences without sounding cliché. Yet it happens all the time: Companies promote "Architects" who are evaluated by the weight of their "architecture." The result is stultifying and demoralizing. The architect does not work to facilitate the programmer's work, he works to produce evidence of his contribution in the form of frameworks, standards, and software process. So, how are most managers evaluated? By the amount of "managing" they do, as measured by the amount of process they impose on their team. Evaluating a manager by the amount of managing they _do_ is exactly the same thing as evaluating a programmer by the amount of code they write. And it produces results like you describe, where the manager works to produce evidence of their management in the form of processes and decisions from the top down, rather than facilitating the work actually being done. In a simplistic world, the answer would be to change the incentives and the behaviour would change itself. But as they say, "correlation does not equal causation." The incentives have to change, but so do the people. Results- oriented managers don't work in those kind of environments to begin with, and after a year or two in such a place they will already have left. You need to change the incentives and the culture and the people all together. ~~~ JoeAltmaier Middle managers are rewarded for making budget and meeting release dates. Seems good, right? So they agitate for (wait for it) maximum budget and minimum feature set. So that success is assured and their metric is optimized. Unfortunately those things are exactly contrary to company goals. Why does this happen? {opinion} Middle managers are too remote from either customers (financial goals) or top management (company goals). They're in the middle, right? With layers between them and either end. And when you try to optimize any process with too many degrees of freedom, you have too many variables and get to choose which ones to look at. So middle managers look at their own career and ignore the rest. My suggestion: line up all middle managers in the parking lot (important), stand at the end of the line, and put one bullet through all of them (optimizes cost in bullets). If my company Ever has middle managers, its time to call it quits. ~~~ ajays I think it's not the presence of middle managers; but how they are evaluated and incentivized. I don't envy their jobs; the upper managers have entire teams with clear tasks; the engineers on the other side have stuff to do; the middle managers are, well, caught in the middle. So they try to make themselves relevant by injecting themselves into various processes; by blocking things to make sure that everyone knows that they are present; by taking credit wherever possible. So eventually it's the fault of the upper management, if they can't come up with the right incentive scheme to keep things moving smoothly. I hate middle-managers too with a passion; but having seen them operate, I can't blame them for doing what they do. They're just playing the game by the rules. Blame the one who made up the rules. ------ rufugee _Bing was extremely lavish in compensation, making offers to the best hackers for $90K/year when the adjacent teams were making $75K/year offers._ This is what really stood out to me. I'm in tech management these days...I pay my good developers close to $90K, and I'm no Google or Microsoft. What's wrong with this picture? Bing was created what...four years ago? Is this really a realistic salary for the best hackers? ------ fferen For all the people saying X search engine is better, here's a tool to compare Google and Bing (and Yahoo) results without bias. It simply shows you three columns of results, you click on the one with the best results, and it reveals which ones came from which search engines. <http://blindsearch.fejus.com/> Note: I am not affiliated with this site in any way. ~~~ GFischer Hmmm, it's giving me the wrong results... it shows the results I voted from are from "Bing", but when I went to Google it showed me those results, and Bing's results where the ones marked "Yahoo". See here [http://blindsearch.fejus.com/?q=21+de+setiembre+y+sarmiento&...](http://blindsearch.fejus.com/?q=21+de+setiembre+y+sarmiento&type=web) it would have me believe that Bing's were the better results (they weren't for this particular search). Also, when I'm logged in and using my country-specific search, Google is way, way, way better than the competition. Edit: I'll probably message the creator (parent is not affiliated with the site) ------ InclinedPlane I don't know that Bing has "failed" yet, but I highly doubt it'll be anything other than one amongst many in the pack in 5 years. Microsoft has always been good at the pivotal turnaround. Recognizing when a key moment was on the wind, mustering together a tremendous effort, making a good number of smart decisions and putting out a solid anchor product that (re)cements their position in the industry and reinvigorates the brand in doing so. Windows 95 and Windows 7 are perfect examples. IE4 (yes really), Bing, and Windows Phone 7 are also good examples. One of the big problems with Microsoft is that its organization and its culture are extremely tied to the traditional 3-ish year ship cycle. A hugely successful diving catch every other ship cycle or so is rapidly becoming less and less feasible as a means to hang on to or acquire a market. Microsoft does not seem to get the web at a fundamental level, it doesn't seem to have the capacity to release software at a pace of yearly, monthly, or continuously. And that will ultimately be the undoing of Bing and the Windows Phone. The only way MS knows how to crank out releases faster is the deathmarch, and that is a certain route to doom. Worse yet, since Gates left MS has no real technical or managerial leadership, it's bureaucracy all the way up and down. This has been affecting the culture at Microsoft little by little, also partly coupled to the stock price having plateaued. More and more talented devs are finding that MS lacks the excitement and the reward of cutting edge development, so they are moving elsewhere. Also, without that talent around fewer good projects are pushed forward, fewer projects succeed, people become less satisfied with their jobs, etc. (think about the movie "It's a Wonderful Life" only translate the bad stuff, on a corporate level, to hundreds and then thousands of George Bailey's going away). This makes the environment that much less rewarding for everyone else who remains, so yet more people leave. And slowly but surely the creep of a more rigid and bureaucratic corporate culture and organization fills in the gaps left by the people who had the most clout in the company, causing yet more and more talent to evaporate away. It's a self-reinforcing cycle that will lead to the rapid diminution of the company and its prospects over time and the examples the article provides of the process as it happened at Bing have played out throughout the company. Nobody young with high prospects seriously considers Microsoft as a destination anymore, and increasingly the older devs are either retiring on their massive earnings from the glory days or they're just looking for somewhere else to be that's a better use of their time and talent. MS continues to make a crap-ton of money from its core products, but it will be institutionally ham-strung in responding to the threats that will steal away that revenue (such as mobile-heritage operating systems). Because those threats will grow at a rate MS is incapable of competing with. ~~~ brudgers > _"I don't know that Bing has "failed" yet, but I highly doubt it'll be > anything other than one amongst many in the pack in 5 years."_ For Microsoft, having a full featured reliable non-core product with measurable market share is a success because it allows Microsoft to offer vertical integration without the specter of anti-trust allegations - imagine the howling in DC and Europe if Bing controlled 70% of search (never mind the valley). Bing's robustness helps Microsoft sell software and services, while it's modest market share keeps infrastructure costs lower and Microsoft's core revenue stream coming from areas other than search reduces the pressure to game search algorithms towards their advertisers in order to increase revenue in the way that Google does. What the article shows is not that Microsoft is inept, but rather that they are able to create an internal unit with many elements of a startup, scale that unit massively, and then transition it into a solid corporate structure capable of surviving over the long term - in other words, the article shows that Microsoft was not only able to successfully foster internal entrepreneurship in order to quickly move into a new market and capture meaningful market share in the face of a mammoth, entrenched, and powerful rival which dominated the market, but also to consolidate that position swiftly before their rival could respond in a significant way. ~~~ Splines I'm not following you. I imagine that the Bing team would gladly increase their market share in exchange for the costs involved. ~~~ mredbord Of course more market share is good. But Microsoft is not purely interested in growing share with Bing; non-differentiation with Google is a good thing in and of itself. The less differentiated Microsoft is from Google, the greater perception of their platform having feature parity with Google. That way consumers are not forced to choose based on features, just ecosystem. This is a the reason that Microsoft is a fast copier of market leaders, so that everything consumers could want, on paper, is housed within their roof (and Google's). It seems counterintuitive that less differentiation would be useful, but I think it's what Microsoft is going for. ~~~ Cossolus Microsoft used to be able to "embrace and extend" in order to extinguish the competitor. With Bing it seems they can only "embrace", by which I mean copying and trying to decrease differentiation. But look at the trend. In the future, when/if Google search incorporates social feedback effects (ala +1), Bing won't even have the user-base to be able to copy the competitor, let alone extend and extinguish. One look at my website statistics tells me Bing is already as good as dead. ~~~ DaveMebs Yeah, except Bing gets to mine Facebook and Google doesn't. Maybe that's why it has a higher success rate? [http://www.bing.com/community/site_blogs/b/search/archive/20...](http://www.bing.com/community/site_blogs/b/search/archive/2010/10/13/bing- gets-more-social-with-facebook.aspx) [http://www.stateofsearch.com/bing-gaining-share-in-the-us- su...](http://www.stateofsearch.com/bing-gaining-share-in-the-us-success-rate- much-higher-than-google/) ------ jeremydavid Just thought I'd let you know your text rendered _very_ small on my browser, and the light grey quotes were almost unreadable. ~~~ steve-howard Indeed, I have no idea why bloggers are so insistent on using gray-on-white quotations. ------ tocomment Bing is dead? ~~~ bartl Well, according to this post, everyone who was technically knowledgeable about Bing has left. That implies that there will no longer be any relevant technical progress, any more. ~~~ cdesmar Not sure this is relevant progress but 18 march bing for "HG download" gave no mercurial results (hg was assumed to be a mistyping of HD), by 24 march it was giving all mercurial results. I twittered about both. That is at least anecdotal evidence that things are progressing in some way or another. ~~~ code_duck Unpredictability is progress? ~~~ cdesmar Returning meaningful results is progress. Why would you want a predictably wrong answer, you must be a manager. ~~~ code_duck Actually, you've plotted two data points here. That doesn't tell you much. How do you know it doesn't go back to showing irrelevant results on the 28th? ------ wightnoise The only value I ever had for Bing was their cashback shopping engine, and they've gotten rid of that. Birth and Death of Jellyfish.com <http://en.wikipedia.org/wiki/Jellyfish.com> ------ RyanMcGreal > They totally din't see Google as a threat, till it had a huge market cap. > (Don't be evil, was a joke?) Does having a huge market cap automatically make a company evil? ~~~ dstein Not automatically. But I think it would be easy to prove there's a correlation between market cap and corruption. ~~~ antiterra If it would be easy, then perhaps you should do it. Such a conclusion would have a nice amount of academic value. I imagine there are a large number of small and/or untraded businesses with dishonest or illegal practices. Perhaps data would even show that larger market cap indicates corruption is less likely, depending on your measurement for corruption? ------ TheCondor A buddy and I were drinking months back, and for whatever reason (most likely several beers was the reason) he misinterpreted the Bing and Facebook arrangement that was made for "Facebook is buying Bing." Completely un-Microsoft, I can't see it happening but if it did.. Damn that could make things interesting. Bing is interesting, it's a great attempt. The problem is Microsoft, so long as they're running it and setting the "standard" for it, it's going to be a failure. It's not going to knock Google off their perch. It's just not. And anything less than that will be a failure. Cut that team and product free, hand it over to like a facebook? IBM went through some similar stuff, MS should be spinning stuff out, if their current phone effort fails again to live up to their hype, they should just cut that group free too, let them go and be successful. that stuff creates new industries which in turn create new opportunities for everybody, including MS. Let Bing or Bing + FB cultivate an army of guys that want to get rich and can control their own destiny, the output will be far more interesting ------ arihant But what if Bing uses Microsoft's Facebook ties to bring social to search? Isn't that the root of "Google is scared by social" thing that's going on? A lot of times when things seem to be dead, they are on the edge of killing everything else. ------ rjhackin I am not sure about the death of Bing, Bing has momentum and they should take it forward and not lose ground. Competition is important to bring the best out of technology. ------ rebelidealist Would you consider likealittle.com a startup? The definition of a startup is company with a limited operating history and a company is an organization aimed at making profits. ------ tedsbardella The web site he is promoting is very creepy. ------ rorrr > _Bing was extremely lavish in compensation, making offers to the best > hackers for $90K/year_ Is this a joke? ~~~ aChrisSmith No. Remember the article talked about poaching students right out of college. $90k a year isn't much for an experienced developer, however right out of college (and at the time) that was 10-20k more than they could expect joining another company. ~~~ rorrr "experienced hackers" and "students right out of college" are quite different in my world view. ------ franklindholm Is this written in English? ------ dvfer Bing is not really providing anything more than google's service. It only shows "big company's" routine of trying to drive others out of business. Death for Bing. ~~~ parfe I disagree. I remembered Bing's decision engine commercials when looking for a plane ticket. Turns out that Bing is way better for flights than Google is, by far. Just try typing New York City to Los Angeles into both search engines. Bing finds what you are after and Google does not. ~~~ kami8845 I prefer how Google handles that search query. If you're looking for a flight does entering 'fly' after your two destinations really hurt that much? 'to' is -more often than not - a pretty meaningless keyword, and I'm pretty sure most people don't want half of what's above the fold to be taken up by flight information if all they enter is a very general 'New York City to Los Angeles'. ~~~ parfe It's not just the flight specific widget bing has, but the fact is consolidates several sites worth of data into a single interface. On Google you don't get a unified view of data. The ticket vendor is not important to me. It's only the flight cost and number of stopovers that matter, which google does not help with.
{ "pile_set_name": "HackerNews" }
Do we still need photoshop to create great website? - damaru But even further, do we still need proprietary software in our workflow to create the best web design, now that we have tools like css3, saas compass and a plethora of javascript tools ? ====== robotys It is the same with hand sketching, nothing beats fast mockup of what the end result could be. Unless we can code faster than using photoshop. Untill that, photoshop will be around. ~~~ damaru But that's what I see with generator like yeoman, bootstrap template and compass mixin, it's getting really fast to get a UI up and running. I mean making a quadratic color palette in sass is simple 3rd grade math, shading, grading and other color transformation are few mixin away. I can't have a function in photoshop that tell give me the best contrast on the font I use when I change the color of my button for example. And I am wondering how it has affected the workflow.
{ "pile_set_name": "HackerNews" }
Kramera - samlassman https://itunes.apple.com/gb/app/kramera/id753155884?mt=8 ====== samlassman seinfeldify your life!
{ "pile_set_name": "HackerNews" }
Show HN: Kickstarter project for snap-together, desktop trebuchets - carpdiem https://www.kickstarter.com/projects/1803756771/trebuchette-the-snap-together-desktop-trebuchet ====== vnchr This guys need 1600 pre-sales to make this happen? (their unit price of the smallest product divided into the fundraising minimum goal) Even if they get an array of donations/sales for their smallest to biggest versions, that's a lofty goal to set as the minimum requirement to produce these things for the public. I call that this is truly a niche product and the fundraiser won't hit $48k... ~~~ carpdiem Well, it's a combination of two things: 1) We wanted to keep the price / trebuchet low, so our margin after materials is slim. and 2) The laser cutter that we need to produce these is expensive. But such is life!
{ "pile_set_name": "HackerNews" }
Show HN: Borg Voice Generator - dsteinman https://jaxcore.github.io/jaxcore-say/borg-example/ ====== agucova I've always wondered if there is something like this for the voice of Majel Barrett-Roddenberry (Computer). I know her voice was recorder phonetically before she died ([https://io9.gizmodo.com/the-voice-of-star-treks-computers- co...](https://io9.gizmodo.com/the-voice-of-star-treks-computers-could-be- coming-to-bo-1786251988)), but I don't think there's public access to that. Perhaps transfer learning could be used to copy the style, using something like SV2TTS. ~~~ dsteinman As far as I know they have not released those phonetic recordings. But even without those recordings it might be possible to use those deepfake voice fingerprinting systems to build an STT engine from sound clips from the show. ~~~ makerofspoons IIRC there are a lot of sound clips voiced by her on the Star Trek Encyclopedia CD: [https://en.wikipedia.org/wiki/The_Star_Trek_Encyclopedia](https://en.wikipedia.org/wiki/The_Star_Trek_Encyclopedia) ------ UI_at_80x24 Very cool effort, but I think it sounds more like Daleks from Dr. Who. [https://www.youtube.com/watch?v=YQLbwOGT8eM](https://www.youtube.com/watch?v=YQLbwOGT8eM) ~~~ nerfhammer Incidentally the Dalek voice is an effect that can be accomplished really cheaply in hardware or software, called a ring modulator: [https://webaudio.prototyping.bbc.co.uk/ring- modulator/](https://webaudio.prototyping.bbc.co.uk/ring-modulator/) ~~~ davidw Dr Who used cheap special effects?! Say it ain't so! I loved the Tom Baker version as a kid. ------ nulbyte Fun project, I'm sure, but sounds nothing like the Borg I remember. ~~~ Gys I agree, this is how I remember it: [https://www.youtube.com/watch?v=AyenRCJ_4Ww](https://www.youtube.com/watch?v=AyenRCJ_4Ww) ~~~ UI_at_80x24 Same here. It's obvious from the other clip provided that the voice evolved over time; but it's not something I noticed at the time. The voice you linked to is the one that is most memorable to me. ~~~ mathgeek > It's obvious from the other clip provided that the voice evolved over time I'd be surprised if this wasn't intentional, based on the premise. ------ devbas It doesn't work for me in Safari on Mac ~~~ greggman2 Safari has all kinds of issues with audio. Every report just leads to a rdar: url and then silence, both from Apple and from Safari haha (cry) For a while couldn't send streamed but redirected audio through the webaudio api on Safari only. Workaround was to manually catch the redirect but the latest safari that doesn't help. Like WebGL I don't think Apple wants Web Audio to work. They've got several outstanding bugs in WebGL (3yrs+) and their non-existent WebGL2 support as not seen a single commit in > 3yrs. Web Audio appears to be the same. It's frustrating. ~~~ tinus_hn They do have their own Apple Music streaming platform, perhaps you can just do what they do ------ greggman2 This is cool but I'm curious why it sounds so much worse than the built in speech to text API [http://greggman.github.io/fanfictionreader/](http://greggman.github.io/fanfictionreader/) Which voices are available are browser and OS dependent and there's no "borg" voice anymore. There used to be several alien and or non human voices but Apple removed them from the OS and most browsers just call the OS's text to speech API \--correction-- You need to go into the VoiceOver Utilities and add all the novalaty voices back in [https://recordit.co/ZGgw9MhepW](https://recordit.co/ZGgw9MhepW) ~~~ dsteinman This wasn't made with the window.speechSynthesis API, it's using 2 older systems (espeak and sam) that have been ported to JavaScript. They don't sound as good but they generate AudioContext data which can be processed, mixed, and visualized in the browser. I don't think it wouldn't be possible to make this kind of Borg voice using the speechSynthesis API -- I did it by generating the speech using 6 voices, 3 in each channel. I totally agree the built-in OS speech systems sound better over and I may end up adding window.speechSynthesis support to the API I made so it'll expose more voice profiles, but those ones will lack the visualization ability. ------ degenerate Can this be modified to include the original voices from the 1998 _Microsoft Sam TTS Generator_ , or is that voice technology not open-source? ex: [https://tetyys.com/SAPI4/](https://tetyys.com/SAPI4/) ~~~ dsteinman I like the way that one sounds. But it looks like it's using a server-side script to generate the audio: view- source:[https://tetyys.com/SAPI4/scripts/tts.js](https://tetyys.com/SAPI4/scripts/tts.js) ------ durpleDrank It would be fun if you could generate a link with a hash of a message so you can send it to your friends and coworkers with a silly message that autoplays. ~~~ dsteinman It already does this, when you click the "say" button it generates a base64 url. You can share that url. The problem is when someone loads the URL the browser will not autoplay the clip. You have to click a button (or some other user interaction) to start the Web Audio API, it's a really annoying limitation that I wish Firefox and Chrome would change to a one-time popup confirmation. So what I did was hide the text box until after playing the audio. ------ m4r35n357 scary!
{ "pile_set_name": "HackerNews" }
Learn Echolocation like a Dolphin - wglb http://www.wired.com/wiredscience/2009/06/echolocation/ ====== wglb When I was in high school, I had a blind friend who used something similar to do some rather amazing things. He would follow me on his bicycle (!), tracking by the sound the bike made. Solo, he could turn into the driveway next to his house. When prompted, he told me he could tell where he was by the trees. What? "Yes, I can hear the sound the trees make". The light rustling of the leaves, the reflection of the bike's sound off the tree itself. I suspect that we may use a bit of this already without being aware of it. I have always felt that there are opportunities to extend our senses, not only by practice as suggested by the article, but also by some sort of electronic assist. ------ RiderOfGiraffes A few months ago I had to spend four days with my eyes closed. I was surprised to discover that I could tell where my coffee was just by holding out my hands and tracking the heat source. I also tended to stop suddenly when walking around, feeling that something was wrong, and then finding that there was indeed an object out of place and in the way. Sometimes these were quite small - mug-sized (although not mugs). Feynman had more to say about training the senses. You can read about it in his semi-autobiographical books. ------ Bjoern Comparing Human Echo location to a Dolphin is highly unfair, at least for the human. The Dolphins brain has specifically adapted to use this technique and it is quite impressive. Dolphins are actually able to see through things which block their view of an object. Meaning that they can distinguish objects without actually seeing them directly. Here is more on this: [http://www.guba.com/watch/2000977386?duration_step=0&fie...](http://www.guba.com/watch/2000977386?duration_step=0&fields=8&filter_tiny=0&pp=5&query=404934828&sb=7&set=5&sf=0&size_step=0&o=3&sample=1231730837:f40ae2aaa7e3b1508fe84d3aa954dc6b786be741)
{ "pile_set_name": "HackerNews" }
File sharing is for everyone. With Dropshare Cloud - tisba https://dropshare.cloud/ ====== tisba That service is actually a batteries included hosting service for the very well made desktop file sharing tool Dropshare ([https://getdropsha.re/](https://getdropsha.re/)).
{ "pile_set_name": "HackerNews" }
New theory explains the origin of Saturn's rings - japaget http://www.nytimes.com/aponline/2010/12/12/science/AP-US-SCI-Saturn-Rings.html ====== DupDetector If you like that, you'll like this: "Elegant New Theory Explains Origin Of Asteroid Belt (technologyreview.com)" <http://news.ycombinator.com/item?id=1991448>
{ "pile_set_name": "HackerNews" }
Polygonal Map Generation, HTML5 Version - signa11 https://simblob.blogspot.com.au/2017/09/mapgen2-html5.html ====== indescions_2017 "New algorithms" for tilemap generation? Maxim Gumin’s WaveFunctionCollapse is fast and produces nice results. A recent paper has been published outlining its technique. WaveFunctionCollapse is Constraint Solving in the Wild [http://isaackarth.com/papers/wfc_is_constraint_solving_in_th...](http://isaackarth.com/papers/wfc_is_constraint_solving_in_the_wild/) Combine WFC with a touch of "domain distortion" to add some organic panache: [http://www.iquilezles.org/www/articles/warp/warp.htm](http://www.iquilezles.org/www/articles/warp/warp.htm) Or if you have space for several terabytes of high resolution NASA satellite imagery, you can always use that as a training set ;) A step towards procedural terrain generation with GANs [https://arxiv.org/abs/1707.03383](https://arxiv.org/abs/1707.03383) ~~~ amitp All cool techniques — also see this paper about procedural terrain generation with GANs [https://hal.archives-ouvertes.fr/hal-01583706v2](https://hal.archives- ouvertes.fr/hal-01583706v2) ~~~ indescions_2017 Now there is a potential demo ;) And thanks to you Amit for your gamedev resources. I reference your site all the time and know many have learned a lot from them! ------ timvdalen I really like this generator and the original tutorial. In fact, I implemented a version of this in C++/OpenGL a few years back for a school project: [https://github.com/Heightened/2IV06-map- generator](https://github.com/Heightened/2IV06-map-generator) We also built a 3D viewer that could then display the generated maps: [https://github.com/Heightened/2IV06-map- viewer](https://github.com/Heightened/2IV06-map-viewer) It was a fun project, we got some really nice results: [https://imgur.com/a/VlkYk](https://imgur.com/a/VlkYk) ------ wiz21c I tried it, it looks very much made of hexagons... It feels like a wargame map. I wonder how it looks if it's rendered in 3D. ~~~ fenwick67 It's using "barycentric dual mesh", which is a lot like Voronoi, so you get lots of 5,6, and 7-sided polygons. [https://www.redblobgames.com/x/1721-voronoi- alternative/](https://www.redblobgames.com/x/1721-voronoi-alternative/) If you turn on "lighting" you will get a good idea for how it would look in 3d, I agree it would be cool to set this to a heightmap and look around it in 3d with Google Maps style controls. Dangit, there goes my weekend. ~~~ wiz21c Maybe it's because it's based on some noise ? Maybe there are actual geology simulator somewhere ? That'd be interesting, a simulation of a mountain growing over 1 billion years... ------ Zelizz Reading through these articles and the linked papers was both thrilling and disheartening. Thrilling, because it's a huge amount of information that is immediately interesting and useful to me. Disheartening, because I have been working on similar things for two years now and always feel like I'm struggling more than the authors. ------ drabiega Link doesn't work for me, but I found the article on the site: [http://simblob.blogspot.com/2017/09/mapgen2-html5.html](http://simblob.blogspot.com/2017/09/mapgen2-html5.html) ~~~ falsedan Apparently flagging a submission doesn't get the mods attention, and we should email them if we see these kinds of errors in links/typos in titles. What's the email address to use? ~~~ grzm You can contact the mods via the Contact link in the footer. ------ CodeCube If the author happens to read this, thanks for Realm of the Mad God. Fantastic game :) ~~~ amitp Glad you liked it! It's still going, with new owners :) I'm revisiting the map generation because the authors of RotMG are working on a new game, and have asked me to work on the maps. ~~~ cultureulterior Will you put this html5 version on your github? ~~~ amitp The javascript data structures and algorithms are on my new github page: \- [https://github.com/redblobgames/dual- mesh/](https://github.com/redblobgames/dual-mesh/) \- [https://github.com/redblobgames/mapgen2/](https://github.com/redblobgames/mapgen2/) However the html5 UI isn't (it's a big hack I'm abandoning, and working on a different version). Feel free to View Source if you want to see the ugly UI code :)
{ "pile_set_name": "HackerNews" }
Rockset does to Elasticsearch, what Snowflake did to Redshift - ssb006 https://rockset.com/press/rockset-shatters-operational-barriers-for-real-time-analytics/ ====== tarun_anand Amazing stuff. We have been investigating for a few years and wondering why someone has not done this. Congratulations.. Looks exciting. Any plans to run this on premises with serverless stack being available for on premise also.
{ "pile_set_name": "HackerNews" }
Keybase launches encrypted Git - aston https://keybase.io/blog/encrypted-git-for-everyone ====== malgorithms Keybase team member here. Interesting fact: git doesn't check the validity of sha-1 hashes in your commit history. Meaning if someone compromises your hosted origin, they can quietly compromise your history. So even the fears about data leaks aside, this is a big win for safety. From an entrepreneurial perspective, this is my favorite thing we've done at Keybase. It pushes all the buttons: (1) it's relatively simple, (2) it's filling a void, (3) it's powered by all our existing tech, and (4) it doesn't complicate our product. What I mean by point 4 is that it adds very little extra UX and doesn't change any of the rest of the app. If you don't use git, cool. If you do, it's there for you. What void does this fill? Previously, I managed some solo repositories of private data in a closet in my apartment. Who does that? It required a mess: uptime of a computer, a good link, and dynamic dns. And even then, I never could break over the hurdle of setting up team repositories with safe credential management...like for any kind of collaboration. With this simple screen, you can grab 5 friends, make a repo in a minute, and all start working on it. With much better data safety than most people can achieve on their own. ~~~ eropple So I _love_ Keybase unconditionally and if you guys weren't rolling in physical offices (and not one in Boston) I'd have been beating down your door to come work there--I think what Keybase is doing is important and it's something I'd love to work on. But I have a serious question that maybe you can answer, and it's something everybody who I've showed this to has asked me: How is Keybase gonna make money? How am I assured that this, and everything else in my Keybase storage, is going to be there in six months? Like, I _still_ have a private server in a closet in my apartment that syncs all the stuff I trust Keybase with because I don't know what the business-side failure case is. You guys should be taking my money, is what I'm saying. Also probably hiring me. But definitely taking my money. ~~~ malgorithms We believe the right long-term answer for Keybase is finding a way to charge large corporations and offer pretty much everything else for free. Obviously there would have to be some paid tier if you really wanted 10TB of storage or something, but very few people want that right now. We're still just getting started. Of course to achieve our goal, we'll also have to find a way to distinguish communities - which we'll want to use Keybase for free - and companies. Many of us on the team have come from ad-supported businesses and we really, really never want to do that again. I personally guarantee I will never be a "publisher" again. Fortunately that just can't work with Keybase, so no fears there. But charging for anything on Keybase right now would be a big mistake. We only have ~180,000 users, and we want to bring crypto to _everyone_. That basically means making products we believe are better. Another way of looking at your concern: I think if we were charging right now, it wouldn't actually _decrease_ the odds we disappeared in a few years. It might distract our attention from working on the best product and cause our bloody demise. So maybe we're not choosing the path that gives you the highest impression of safety, but I think we actually are. ~~~ QuinnWilton Everything you just said makes perfect sense. That being said, I think Keybase is one of the most important companies around right now. I would gladly pay $10/month, even if literally all it did was put a "Supporter" badge on my profile. I'm sure hundreds of other people agree. Crypto is far too important for it to remain locked away behind GPG. ~~~ malgorithms The outpouring of positive energy (on HN!) is really inspiring. Everyone on the Keybase team is feeling good about our work right now, so thanks! ~~~ QuinnWilton The team seriously deserves it. For what it's worth, I think my above comment is my highest upvoted comment of all time. There's a lot of people out there who want Keybase to succeed. ~~~ eropple My comment that started this subthread is in my top ten, and I have been here entirely too long, so, yeah. Keybase is good. It staying around is important. People around here, at least, seem to know it, and that's awesome. ------ zeroxfe I'm really happy about this. I have private repos for personal information (e.g., tax spreadsheets going back a decade) that I keep synchronized across machines, and have to jump through hoops to get an encrypted authoritative remote source. Right now I do that with an encrypted partition on a private VM. And, it really sucks that GitHub does not encrypt data at rest: \--- SNIP from [https://help.github.com/articles/github- security](https://help.github.com/articles/github-security) \--- We do not encrypt repositories on disk because it would not be any more secure: the website and git back-end would need to decrypt the repositories on demand, slowing down response times. Any user with shell access to the file system would have access to the decryption routine, thus negating any security it provides. Therefore, we focus on making our machines and network as secure as possible. \--- SNIP --- Encrypted disks are now the norm across various cloud providers, as is HTTPS. The crypto overheads are really low, and their benefits significantly outweigh the risks of leaving clear-text data on disks. Also, defense-in-depth is always worth pursuing. The claim "it would not be any more secure", is so far from true, it's almost insulting to their target audience. Keep killin' it, Keybase! Great job! ~~~ Remed Out of curiosity: why do you keep such documents in repositories instead of simply in a filesystem (on an encrypted volume, backed up and possibly synced across devices)? Tax spreadsheets usually don't change, so there's no need for version history (if anything, new rows for new years are added, but without changing past data). I ask this because I'm trying to figure out a solution for myself for keeping sensitive personal information and I never thought about storing such documents in a repository. Maybe I am missing something and your use case will open my eyes. Thanks! ~~~ Too For me one big benefit is that it's distributed. I like to keep my important documents backed up on all the computers i have, on a USB drive stored in a safe location and also store the data with a cloud provider. Now, if i update one document on computer A, and another document using computer B, i have to sync it to all other devices which is a PITA without git. You get into the situation where you don't know if the version on the USB drive was newer or older than the one on computer B etc, whereas with git all this is available in the version tree and there are nice merge tools available. I've been planning to do this even for photos, for all the reasons above, but haven't taken the full step yet. ~~~ dx034 Wouldn't encrypted files with a service like Dropbox help? Containers usually sync well (only syncs changed parts). Only downside is that you can't access files without decryption software. ~~~ Too Dropbox, as all other "just-works" sync services, don't handle merge conflicts very good. Suddenly you have thousands of Filename_EditedByX(3).txt in every folder and dont know which one of them is the newest and don't have their most common ancestor version easily available for a 3-way merge. ~~~ dx034 To be fair, they cannot handle merge conflicts with encrypted containers. I find that merge conflicts almost always cause more trouble than the work of avoiding them from the start. As long as you don't share data (with containers unlikely), merge conflicts should be extremely rare (and anticipated). ------ theptip Has anyone seen a security audit of the Keybase platform? I love the product from a usability perspective, but have no idea if it's actually a safe repository for my team's key material. ------ jack12 This is exciting, but I'm new to Keybase and don't entirely understand it yet. How can I clone a Keybase-hosted repository on a remote server? Can gpg-agent proxy through ssh similarly to ssh-agent to allow access to GPG keys (and is that what keybase uses?), without having to store my keys on the remote server? Or would I need to create a new Keybase account just for the remote server, with that account's private keys stored on the server but at least segregated from my account's full access to communication, team-management, etc? Or would the best approach be to clone the Keybase-hosted repository locally and then push it to the remote server over SSH? ~~~ ptspts Yes, probably you need a new Keybase account just for that remote server if you want the remote server be able to do git pull after the initial git clone. If all you need is a single git clone, and you already have a Keybase account, just do a git clone locally, and use rsync to upload the result to the remote server. ------ chishaku In case you're wondering... > ~ Anticipated q's ~ > What if we're living in a simulation? > Keybase offers no guarantees against sophisticated side-channel attacks by > higher-level entities. ~~~ seanlane It appears that this may no longer be an open question: [http://www.pbs.org/wgbh/nova/next/physics/physicists- confirm...](http://www.pbs.org/wgbh/nova/next/physics/physicists-confirm-that- were-not-living-in-a-computer-simulation/) There was a Hacker News post about this a few days ago, likely from a different source, but I can't find it. ~~~ qudat This only applies to classical computers not quantum, some combination of both, or by some means of computation we haven't discovered yet. ------ falsedan Nice to see people work on git remote helpers, a shame that there's already a fine remote helper that is not tied to a specific hosting provider & uses GPG[0] already. 0: [https://spwhitton.name/tech/code/git-remote- gcrypt/](https://spwhitton.name/tech/code/git-remote-gcrypt/) ~~~ zeveb I came here precisely to see how this compares to git-remote-gcrypt (which I use to protect my password-safe filenames). Anyone from keybase prepared to comment? ~~~ ptspts I'm not a Keybase developer, but I'm a user of Keybase Git, git-remote-gcrypt and git-gpg, and I've just written a comparison of the 3. Here you are: [http://ptspts.blogspot.com/2017/10/comparison-of- encrypted-g...](http://ptspts.blogspot.com/2017/10/comparison-of-encrypted- git-remote.html) If I missed some of the aspects, please let me know. ------ RKlophaus For anyone interested in alternatives, we built a utility (creatively named git-gpg) with the same goal: end-to-end encrypted git. It works over ssh, is self-hosted, and requires no additional software on the shared server. [https://github.com/glassroom/git-gpg](https://github.com/glassroom/git-gpg) ------ ericfrederich This removes the ability for collaborating, browsing online, basically any feature of GitLab/GitHub/BitBucket. ... I think I'm in favor of this. I think of the things that those services provide on top of Git should actually be ported or mapped to Git itself. Branches, pull requests, comments, etc... should all be Git objects of some sort. ~~~ quadrangle Branches are Git objects. Incidentally, here's a distributed VCS that includes bug tracking: [https://fossil-scm.org](https://fossil-scm.org) ~~~ falsedan > _Branches are Git objects_ That's not how I understand refs, they don't even live in the .git/objects hierarchy. ~~~ ericfrederich You're correct, they're just files. To create a new branch off of master you can just... cp .git/refs/heads/master .git/refs/heads/WTFFF ... no SHA-1 involved at all, no parent, history, etc. ~~~ swsieber However what they point to are git objects. And being pointed to prevent them from being garbage collected (pruned). ------ ams6110 _Remember, it is impossible to delete cloud data with any kind of confidence, and your host may already be compromised._ Should be the epitaph of the current era of computing. ------ notheguyouthink As an aside, does key base offer tools to encrypt data from code, lets say from Python/Go/Rust/etc, that is moron proof? I say tools, because while a library would be cool, I'd understand if it was a binary/application to provide the functionality/user-experience that key base is aiming for. I know this likely doesn't sound like something key base _should_ be aiming for, but to me, programmers need encryption just as much as users. I'd like to write my libraries/programs with encryption, but I also want to be able to trust it and not fear some inherent vulnerability I'm adding. To me, Keybase is aiming to solve/reduce these complexities for users, and I'm hoping they also aim to solve it for developers to. Thanks for all the hard work folks @ Keybase, it's definitely appreciated! ~~~ ofek This is a perfect use case for [https://github.com/ofek/privy](https://github.com/ofek/privy) ------ Walkman I have a private repo on GitHub which contains my dotfiles with SSH private keys, tokens, secrets and all kinds of secret stuff. I was uncomfortable storing it there, but my laziness/lack of time kept it there. Finally I will be able to encrypt the entire repo, yay!! ~~~ philsnow if you're uncomfortable storing them there, you're going to rotate all the secrets after you move the repo to keybase, right? ~~~ Walkman Yes, I will. That's a long overdue also :D ------ OrangeTux Keybase has quite a few interesting and unique features. But I'm cautious, because it's not clear to me how they are going to monetize it. ------ NikolaeVarius My first initial gut thought is, could this be as a good ol cross platform method of password management? I've never been able to properly manage keepass due to syncing between different platforms being a pain. ~~~ tehno Maybe combine Keybase git with gopass, that one stores data in a git repo: [https://www.justwatch.com/gopass/#features](https://www.justwatch.com/gopass/#features) ~~~ NikolaeVarius That sounds promising. I can't be the only one with this problem. (aka secure cross platform synchronized password management without requiring personal/managing cloud infrastructure. ------ ex3ndr Was expected one question but haven't found one: how it is actually encrypted? Any whitepaper or information how diffs could be handled over encrypted data? Or it is a just encrypted .git folder? ~~~ pfg Looks like it's built on top of kbfs[1]. [1]: [https://keybase.io/docs/kbfs/understanding_kbfs](https://keybase.io/docs/kbfs/understanding_kbfs) ~~~ FullyFunctional The "actually encrypted" part is NaCL (ED25519 + sha256) as supported by Go [2]. Interestingly, the common way to use NaCL applies Curve25519 to encrypt a symmetric key which is the used for the payload. They don't do that. AFAICT, everything is using the ECC curve. [2] [https://keybase.io/docs/crypto/kbfs](https://keybase.io/docs/crypto/kbfs) ------ kazinator These benefits can be obtained by sharing a remote encrypted _filesystem_ , in which sits an ordinary git repo. Then simply check out that git repo using a _file: //path/to/repo_ reference, creating a clone on a local drive out of the encrypted volume. The encrypted filesystem can then reside on an untrusted server in the cloud. Ultimately, this is a cleaner solution than the whack-a-mole approach of hacking every application one by one to retrofit it with crypto storage capabilities. ~~~ timerol This question has a FAQ entry near the bottom of TFA: > Why not just make a bare repo in KBFS? The Keybase filesystem journals changes and syncs them after writes, kind of like Dropbox. Which means you and another team member could be fighting each other and make a conflicted HEAD, where there'd be 2 copies side by side. Similarly, you shouldn't put git repos in Dropbox. Keybase's git prevents this by locking. Also: it's nicer to use the Keybase app to discover and manage your teams' repositories. ------ phren0logy I really like keybase, and I wish they could issue certs for me to sign PDFs. I would pay for that. ------ elahd This is excellent. I've been looking for practical uses for my Keybase account -- it's been sitting around, verified but idle for years. The chat app is nice, but none of my friends or co-workers use the service (or understand crypto, for that matter). ------ FullyFunctional Let me be unoriginal and sing your praises also. I'd LOVE to replace my use of Dropbox with Keybase, but I pretty much use every single feature of the iOS Dropbox App [1] and Keybase really isn't an alternative right now. Also, one unique design choice of Dropbox is to use the underlying file system which means that working out of a Dropbox folder is native speed, even for high intensity IO. Keybase is a lot better than, say, Wuala was, but it's still noticeable. [1] In prioritized order: camera uploads, viewing and editing plaintext, show photos, playing music and video, uploading to Dropbox from random other iOS apps, and finally selective offline access. ------ ptspts On Linux, you can try this encrypted Git without installing Keybase or using the Keybase GUI. You need the following Go binaries from keybase*.deb: keybase, git-remote-keybase and kbfsfuse. Start kbfsfuse (specify a directory as a mount point); put get-remote-keybase to your $PATH; run keybase git create myrepo; you can stop kbfsfuse now; then this works (after substituting $KEYBASEUSER): git clone keybase://private/$KEYBASEUSER/myrepo ------ ericfrederich Awesome... any plans to support LFS? I know with LFS you can write custom backend handlers. ~~~ sridvijay Was just thinking that as well, the hard part about changing GitHub hosts like bitbucket/github is the feature parity between them. This is really enticing though. ------ patrick_haply Nice, this is perfect timing for me to see this actually. I've been slowly building out a little cli tool that I use to track .env files (and other files that you don't want to check into source) in a git repository that is parallel to your project's git repository. The way it works is you identify a file that you don't want to check into source. The cli moves it to a parallel repo, commits the file to the parallel repo, and symlinks the file back to the original location. From then on, you get all of the normal source control features like local changes, revision history, etc... that you get with every other file in your project. I basically got fed up with "crap what was that value I was using before? Let me dig through my credentials store" or resorting to commenting out old lines just in case I needed to revert. So far, I've just been keeping those parallel repositories local for lack of an encrypted remote to push to. Definitely checking this out. ------ rcthompson It's amazing how many new features and even new complete products Keybase has been able to build on top of their core in such a short span of time. Even more so considering that a large part of that core is "just" a much better UX for a technology (GPG) that has existed for decades. ------ AdrianRossouw The two most interesting companies in crypto for me right now are KeyBase, and Wire. I kind of wish there was some way for them to interact with each other, because it feels like they each have a piece of some bigger puzzle. ~~~ choosegoose Are you not concerned with the data Wire collects? [https://news.ycombinator.com/item?id=14069674](https://news.ycombinator.com/item?id=14069674) Versus the data Signal collects: [https://signal.org/bigbrother/eastern-virginia-grand- jury/](https://signal.org/bigbrother/eastern-virginia-grand-jury/) Although I agree Wire looks like a much more (visually) polished chat service, it seems like they (Wire) collect more data than is necessary. ~~~ AdrianRossouw Wire has open sourced it's server code (gplv3 even) and is working on federation support : [https://medium.com/@wireapp/wire-server-code-now-100-open- so...](https://medium.com/@wireapp/wire-server-code-now-100-open-source-the- journey-continues-88e24164309c) So you can run your own copy of it, and be in complete control of any information it collects. ~~~ choosegoose That seems really exciting. When that occurs I will most likely switch over. Unfortunately you can't quite host it your self yet: [https://github.com/wireapp/wire- server/issues/2](https://github.com/wireapp/wire-server/issues/2) ------ payomdousti is there some way to verify what was actually uploaded, and that it was indeed encrypted properly? ~~~ ptspts You can ask the same question about copying the .git directory with rsync over SSH, and the answer for that one applies to your original qustion as well: * You can take a look at the packets (using e.g. tcpdump). * You can take a look at what the binaries (rsync, ssh vs. keybase and git-remote-keybase) read and write (using e.g. strace). * You can read the source code. * You can read the white papers and other analyses about the crypto used, and decide if you trust it. The average user probably won't bother with these, because they need time, effort and experience. If you can imagine a fundamentally better possible way for the average user to verify crypto, please let us know. ------ TomasHubelbauer This is amazing. I've been aware of KeyBase for some time now, but never really explored it. This is the push. Typing this comment as I am setting up my proofs. ------ jboynyc I made a test repository and proceeded to clone it using the keybase:// uri, expecting it not to work, but by some dark magic, it just did. Impressive! ~~~ pqs Not in my case. $:~/projectes$ git clone keybase:// [uri] Cloning into 'something'... fatal: I don't handle protocol 'keybase' I'm on an ubuntu machine. What can I do to solve the problem? Keybase version 1.0.34-20171006000413+5fe91ae13 ~~~ jboynyc Have you installed and are you running the keybase client software? I start it on my system (Arch Linux) using the run_keybase command. ------ philip1209 Some hypothetical questions: \- How could CI/CD be set up? (Is read-only access possible to the repo? Would Keybase work on a Jenkins box? Could a deploy server verify signatures before deploying?) \- Could one set up mirroring to GitHub? How would this work? (I could see the signing without encryption as a value-add) \- What happens in the event of a force push? Could certain users destroy history? \- Could protected branches eventually be added, eg only certain users can push to master? ~~~ strib > \- How could CI/CD be set up? (Is read-only access possible to the repo? > Would Keybase work on a Jenkins box? Could a deploy server verify signatures > before deploying? You could have a deploy/CI user as a "reader" in your team. But we don't yet support hooks or anything (as that implies running arbitrary code on endhosts without their knowledge), so it would have to pull the repo. > Could one set up mirroring to GitHub? How would this work? (I could see the > signing without encryption as a value-add) You can of course continue to use Github as a regular remote, but you'd lose all the encryption and signing unfortunately. > \- What happens in the event of a force push? Could certain users destroy > history? We do currently allow force pushes. Being able to turn that off on a repo-by- repo basis is something we'll consider in the future, definitely. > Could protected branches eventually be added, eg only certain users can push > to master? Yes, but again, as with any "server"-side feature, this is complicated by the fact that it has to run on the client itself, and thus isn't really strictly enforceable against modified clients. As we get more experience with people using this, we will definitely be thinking about how to make it better by adding power features like these. Thanks for the feedback! ------ iamthirsty This actually got me to signup for Keybase today. ------ ryanqian I have a long running vm on Google cloud with only tiny configuration. I communicate to it with strong crypt way to access my 'pass' s git repo. So far so good, but I'm good to see what keybase's good work on how to improve the personal data safety, that's a good choice. ------ earlybike I could basically store all my sensitive data there? Passwords, SSNs, private keys of ETH wallets, etc.? ~~~ aeorgnoieang Yes ------ j7ake Hi security newbie here, I have private bitbucket repo for storing my pass data. One problem is that pass often leaks some metadata like headers of directories. From security standpoint does this mean it is more private to host the git repo on keybase versus bitbucket ? ~~~ jredmond That depends - is that data encrypted on your system? Since git is decentralized, there's a chance that any plain-text copy (such as a clone on your system) could be compromised. Keybase even addresses this in the FAQ, to an extent: > What if my computer is compromised? > Your work is only as safe as your endpoints, so we can't help you there. This applies regardless of host or protocol, BTW, and it isn't even specific to computing. (It doesn't matter how many locks you have on your front door if you leave the back door propped open.) ~~~ j7ake Hi pass uses gpg encryption on the text files my only concern are the file names which can leak meta info, for example just searching GitHub [https://github.com/zurchpet/pass](https://github.com/zurchpet/pass) shows this person has passwords in a public repository but encrypted. Nevertheless I can see that the file names are credit card info and other sensitive info. It's like having a safe with a label "important stuff inside" ! Does keybase solve this problem ? ~~~ tanderson92 Yes, the contents of the git repository holding your pass files are encrypted, meaning that the file names are not visible to anyone without the private key (you). You may also want to look at [https://github.com/roddhjav/pass- tomb](https://github.com/roddhjav/pass-tomb) ~~~ j7ake Thanks for that I'll consider it. ------ ValentineC From the article: >> _What are the limits?_ > _You can have as many repositories as you want, but the total for your > personal repositories can 't exceed 100GB. Each team also gets 100GB._ Is there anything stopping people from creating team after team just to hoard data in Keybase? ------ tln This is pretty cool. I've used git-crypt before to encrypt parts of a repo, but this approach seems much easier to manage. [https://github.com/AGWA/git-crypt](https://github.com/AGWA/git-crypt) ------ gwenzek I don't really understand how it works. Are the git objects encrypted before being pushed? In that case how are they handled by the server? Does it accept them even though they make no sense? What Github is going to show? ~~~ mrsteveman1 Keybase is just another Git remote you can push to, one that transparently encrypts whatever is pushed to that remote. The Git repo itself is completely normal in every other respect, so if you push to Github, everyone can still see the entire repo. This is a good design as it lets people move repos easily and avoid too much lock-in, but it may (will...) come back to bite people soon, who push things to Github thinking they were "encrypted by Keybase", which is not what's going on. ------ WindowsFon4life If only their app did not have so many pages marked writable and executable... ------ ris Keybase, please just support web of trust already. In _some_ way. Not everyone I want to be able to authenticate necessarily has public social media accounts. ~~~ JBiserkov Do they have a website/server? #1. Host a file on your site You can host a text file, such as yoursite.com/keybase.txt. This is preferred, if you have a website. #2. Set a DNS TXT record Instead of hosting a web page, you can place a keybase proof in your DNS records. ~~~ ris > Do they have a website/server? Not necessarily. I'm talking about people who want to remain anonymous (or pseudonymous) and might want to keep as low a public online profile as possible. ------ ryanpcmcquen This is amazing and convinced me to install Keybase on all my comps. I would like the ability to browse the repo in the Keybase app though. ------ squashmode My thanks to the keybase crew, I've waited for a practical PGP solution for nearly 20 years. Keybase delivers, thank you! ------ jancsika > Keybase team member here. Interesting fact: git doesn't check the validity > of sha-1 hashes in your commit history. Not sure I understand. git clone blah cd blah git fsck What am I missing? ------ hollander Does this work for a local repository? ------ dorfsmay I'm confused. Is the entire repo encrypted, or some files only? If the former, what are case where this is needed? ~~~ aeorgnoieang The entire repo is encrypted. Consider a repo containing passwords. It's easy enough to encrypt the files containing the passwords but the names of the files or even the directories in which they're located are also info you might wish to hide, e.g. that you _have_ an account at some-site-you-do-not-want-anyone-to-know-you-visit.com. ------ gigatexal This is really friggin' cool! Best of luck to you guys, hope the work continues. ------ payomdousti is there a way to view / verify that the payload has actually been encrypted? ------ voanhduy1512 Thanks for nice product. From now on I will move all my git repo into keybase ------ zrg I give gitlab 2 months before they implement and launch encrypted git ------ paule89 just to clarify: 1\. Do you need a private git repository? 2\. Is everything really encrypted? 3\. If everything is encrypted how can i access it through Git Desktop? ~~~ strib You can have team-based or private repos hosted by Keybase. Everything is encrypted and signed before it leaves your computer, and decrypted and verified when your computer downloads it. But your local checkout of that git repo is unencrypted. It's just a normal repo. So Github Desktop has full access to it, like it does for all files in your local filesystem. ------ Zynjec This is awesome, thanks for the heads up. ~~~ simonRedwards Yup! Definitely not just posting this to verify myself. ------ daveheq Just wait til the government bans this because people will store kiddie porn, terrorist communications, and copyrighted media into it. ~~~ sorokod "Just wait til the government bans this because people will store kiddie porn, terrorist communications, and copyrighted media into it." More precisely, the government will _claim_ that ... ------ LeicaLatte Fantastic! ------ hasenj Wait, what exactly _is_ keybase? The home page says: > Keybase is a new and free security app for mobile phones and computers. ok, so, what does it do? > For the geeks among us: it's open source and powered by public-key > cryptography. Still have no idea what it does .. > Keybase is for anyone. Imagine a Slack for the whole world, except end-to- > end encrypted across all your devices. Or a Team Dropbox where the server > can't leak your files or be hacked. ok, so what is it? what does it do? > [picture that looks like a chat app] So it's an encrypted chat server? What is it? How can you have a homepage for a product that doesn't talk about what the product is and what it does? Why so obscure? Are you trying to hide something? Is this really a home page for a product aimed at people who care about security? Compare it to, for example, tarsnap's[0] homepage, which explains exactly what the product does and doesn't leaving you wondering about anything. [0]: [https://www.tarsnap.com/](https://www.tarsnap.com/) ~~~ OJFord It's a lot, isn't your third quote a pretty good description? > Keybase is for anyone. Imagine a Slack for the whole world, except end-to- > end encrypted across all your devices. Or a Team Dropbox where the server > can't leak your files or be hacked. It's not much of a reach to assume familiarity with Slack and Dropbox; the message is clearly that Keybase is those (via Keybase Chat & FS) but encrypted. For what it's worth, it's also a keyserver, and (now) git remote. ~~~ hasenj > isn't your third quote a pretty good description? It's not. I think the person who wrote it think it's good marketing, but even that, it is not. Here, try to see if this makes any sense as a product description: > FeedHamster is for anyone! Imagine a Yelp that's customized just for you! Or > a YouTube feed that only shows you interesting videos that _you_ would like! > Install FeedHamster now! Now, can you guess what FeedHamster does? Maybe it curates content? Honestly I have no idea. I just made it up. It doesn't really say anything useful at all, but I think it makes more sense that that description on Keybase's website. ~~~ kinoshitajona Tarsnap was a good example of a service selling to technically apt customer base. Guys who have years of IT training would love to read about deduplication and picodollars. Keybase isn’t charging money to begin with, so “sales pitches” are not their primary concern. Also, they are marketing to “the masses” with the idea that more people should have secure e2e encrypted communication and collaboration solutions where identity is cryptographically proven. But if their welcome page started showing diagrams of encryption pathways and key derivation algorithm names with server client relationship diagrams, I guarantee no one besides people in tech will download it. I still think they need to do better selling the idea to the masses, I in no way think their current front page is sufficient, but I understand that right now they aren’t concentrating on sales pitches. ------ adiosdfisndf Tried to create an account and no matter what I tried to name my devices all I got was "keybase has reserved this name." Welp. ~~~ cjbprime Ah, it's not the device names that are reserved, it's the username itself. ------ feelin_googley Does it use libgcrypt? [https://www.theregister.co.uk/2017/07/04/gnupg_crypto_librar...](https://www.theregister.co.uk/2017/07/04/gnupg_crypto_library_cracked_look_for_patches/) Maybe it only uses the Go crypto libraries? ------ aauthespian [http://www.aauthespian.news/2017/10/why-are-some-nigerian- mo...](http://www.aauthespian.news/2017/10/why-are-some-nigerian-mothers.html) ------ hdhzy Sounds intriguing but I'm missing the deep technical info on how it works. > All data you push is signed by your device's private key, which never leaves > your device. For the reference git already supports signed pushes (git push --signed): [https://github.com/git/git/commit/a85b377d0419a9dfaca8af2320...](https://github.com/git/git/commit/a85b377d0419a9dfaca8af2320cc33b051cbed04) ~~~ welder Signing a commit does not encrypt that commit's contents, just adds a signature to prove you wrote that commit. From the Keybase FAQ: > So is this signing my commits? > No, this is happening at a lower level, (1) to allow encryption, and (2) to > ensure no unsigned or unencrypted data makes it in. Intuitively you can > think of it as you and your teammates using a cryptographic secure storage > layer for your git origin that doesn't really understand git. > Your commits themselves are untouched from git's perspective, so if you > mirror your repository elsewhere, it'll be a regular checkout. ~~~ hdhzy I did not mention signing commits but signing push requests and that was a reference to: > All data you push is signed by your device's private key, which never leaves > your device. ------ therealmarv If you go crypto don't use git. It's not designed for cryptography in mind and the Keybase approach looks nice IF I can control every chain or can keep using github (or any other git server) with it. But for the storing part alone I would not trust Keybase. I would even say if you do crypto and need cloud storage then store it in multiple places and avoid git. Better flat file and some daily backup strategy with e.g. encfs as the bottom layer. In worst case you get your data back. Sorry keybase.... you are not a trustable cloud storage for me. It feels like betting on your company... I want to bet on your company without feeling dependent on worst case restore scenarios (computer dying while your company dies). ~~~ eridius > _But for the storing part alone I would not trust Keybase._ Why not? You're making a bunch of claims about this being bad but you're not providing any reasoning for it. ~~~ therealmarv It's basically new closed source one bucket crypto on one company which is not known for storage. A little bit too much of uncertainty for my taste. ~~~ kristianp A large portion of their code is open source: [https://github.com/keybase](https://github.com/keybase) ~~~ sigjuice How easy is it to build and run my own copy of this code, especially the server side stuff?
{ "pile_set_name": "HackerNews" }
On the detection of quantum insert - ingve http://www.tedunangst.com/flak/post/on-the-detection-of-quantum-insert ====== noinsight Well, who actually does packet-level analysis of every connection they make? Maybe some troubled/paranoid individuals are constantly running tcpdump and analyzing all the traffic to/from their computer but that can't be a large subset. This sort of discussion is also hard to come by - people/organizations rarely, if ever, actually advertise what kind of traffic analysis / security systems they're running, yet it's extremely interesting (at least to me) and I've always wondered. To detect (and actually analyze) some sort of unknown zero-day you probably need to have entire network packets/connection streams stored so you can see what sort of traffic and data was incoming? Who does that and what sort of system can do that at large enough scale? The topic of moving beyond protection (firewalls etc.) and into actual detection (log analysis, traffic analysis etc.) seems to be rarely discussed. ------ joosters All the author is showing is that no-one who he tried to scam spotted his fake duplicate packets. At best, none of the people were running any QI-detecting code, and if they were, no-one reported the incident to a forum that he read. It's not a very conclusive result, really. ------ majke Maybe detecting QI is actually hard? You need a buffer of TCP data, that was possibly already passed to application. 1) Is there a kernel patch yet? 2) "HoneyBadger is a passive TCP protocol analyzer whose only purpose in life is to detect and optionally record TCP injection attacks." [https://github.com/david415/HoneyBadger_docs/blob/hackpad1/s...](https://github.com/david415/HoneyBadger_docs/blob/hackpad1/source/how- to-badger-the-puppet-masters.rst#tcp-injection-attack-categories) ------ hkparker I wrote a script a while ago in Go to detect quantum insert attacks. It's not perfect but its well commented. I noticed quite a few detections when I ran it for a few days but they seemed to be benign, probably retransmissions. [https://gist.github.com/hkparker/97548b2c0c79a9149f50](https://gist.github.com/hkparker/97548b2c0c79a9149f50) ------ tempodox _... I can only churn out so much linkbait, even for the sake of science._ As a consolation, I offer the idea that the sum of linkbait in the universe is constant. And since the days of Max Planck & Erwin Schrödinger, no-one can know the contents of a link until you klick it. If we produce enough quantum haze, the NSA might just get confused. ------ agd If you detected a Quantum Insert attack against you, would you even say anything? Why alert your adversary?
{ "pile_set_name": "HackerNews" }
Cache eviction: when are randomized algorithms better than LRU? (2014) - signa11 http://danluu.com/2choices-eviction/ ====== ordinaryperson Related: the author, Dan Luu has, IMHO, one of the best IT-related Twitter feeds out there: [https://twitter.com/danluu](https://twitter.com/danluu) Highly recommended. ------ falcolas One thing I've seen is that a weighted LRU is usually slightly better for unpredictable workloads. i.e. it will never evict high use cache data when there's a flurry of one-off traffic that would normally start evicting a normal LRU cache, and even a 2 random LRU scheme. This is particularly relevant for databases and keeping rows in memory. The algorithm is something like "add two weight when an item is used, and decay one from every item every second, evict items under pressure from the lowest weight to the highest." ~~~ rozim Well, once you go down this path you gotta consider ARC: [https://en.wikipedia.org/wiki/Adaptive_replacement_cache](https://en.wikipedia.org/wiki/Adaptive_replacement_cache) as I believe it is designed to be scan-resistant. ~~~ logophobia Which is, unfortunately, patented: [http://patft1.uspto.gov/netacgi/nph- Parser?Sect1=PTO1&Sect2=...](http://patft1.uspto.gov/netacgi/nph- Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=6996676.PN.&OS=PN/6996676&RS=PN/6996676). ~~~ takeda Hmm given that patents span for 20 years, and that's essentially forever in computer world, once this patent expires it probably will be worthless. In a world where advances are built on top of other advancements, patents just stifle innovation. ~~~ noonewhocounts And yet innovation proceeds at a pace unmatched in history, and is so commonplace it gets dismissed as not counting when it's not a revolutionary breakthrough. ~~~ takeda When you're referring to innovation, you're talking about everything. I'm referring to software. ~~~ stilldontcount It's relatively impolite to tell someone what they meant ------ jandrese Are there any languages that allow you to give the compiler a hint that you're about to grind over a gigantic dataset so don't bother to cache any of this data because it won't be accessed again for a long time? It seems like it could be helpful in keeping a big crunch from obliterating the cache constantly. You might also be able to apply other optimizations, like preloading the next data blocks so they're ready when the CPU rolls around. Maybe compilers already do this behind the scenes? ~~~ dom0 Don't. Yes, there are instructions for this. No, don't use them, unless you really exactly know what you are doing and optimizing towards a specific, single µarch _only_ , otherwise they will invariably hurt performance, not improve it. Similarly explicit prefetching usually does not improve performance, but reduces it. (Non-temporal stores are quite a good example here, since a game engine used them in a few spots until recently, causing not only worse performance on Intel chips, but also heavily deteriorated performance on AMD's Zen µarch. Removing them improved performance for all chips across the bank. Ouch!) ~~~ vvggff Links, examples, tutorials? ------ SomewhatLikely This 2 random cache scheme reminds me a lot of the 2 random load balancing scheme laid out in "The Power of Two Choices in Randomized Load Balancing" [https://www.eecs.harvard.edu/~michaelm/postscripts/mythesis....](https://www.eecs.harvard.edu/~michaelm/postscripts/mythesis.pdf) Which shows an exponential improvement in choosing the less loaded of two randomly chosen servers over just random. ~~~ colonelxc It is indirectly referenced near the bottom of the page, with a pointer to [http://brooker.co.za/blog/2012/01/17/two- random.html](http://brooker.co.za/blog/2012/01/17/two-random.html), which references [http://www.eecs.harvard.edu/~michaelm/postscripts/handbook20...](http://www.eecs.harvard.edu/~michaelm/postscripts/handbook2001.pdf) ------ j2kun The "2 random choices" idea also shows up as a good idea in other settings, such as load balancing for hashing. I wrote a writeup[1], but if you google "power of two random choices" you'll see a lot of literature on it. [1]: [https://jeremykun.com/2015/12/28/load-balancing-and-the- powe...](https://jeremykun.com/2015/12/28/load-balancing-and-the-power-of- hashing/) ------ krallja Redis supports LRU and random eviction: [https://support.redislabs.com/hc/en- us/articles/203290657-Wh...](https://support.redislabs.com/hc/en- us/articles/203290657-What-eviction-policies-do-you-support-) I wonder if it would be worth adding a k-random eviction strategy, for a balance between the two. ~~~ antirez Hello, now Redis (4.0, still in release candidate) supports LFU (Least Frequently Used) which should work better in most cases since LRU also is also just a way to approximate LFU, since the most frequently used items are often the last recently used ones. ~~~ danbruc _[...] since LRU also is also just a way to approximate LFU, since the most frequently used items are often the last recently used ones._ That is not really true. LRU and LFU favor different items, LRU ones used frequently in the short term, LFU ones used frequently in the long term. Only under special circumstances does one approximate the other, for example if your cache is large enough that LRU does not evict the most frequently used items when many less frequently used items are placed in the cache before the most frequently used items are accessed again, then LRU approximates LFU. ~~~ antirez What I mean is that, the most frequently used objects, if accessed roughly with an even period of time, tend to be also the least frequently used objects, so if the accesses are very even LFU and LRU tend to be similar. For uneven access patterns, they are different, but usually LRU is used because access patterns are even so that it approximates LFU, since what we want to have in cache is, without other application-specific clues, the objects that we use more often. Knowing _exactly_ the access pattern one can use an application-assisted strategy which is optimal, but without clues LRU adapts well to different scenarios while LRU may fail in a catastrophic fashion. Also note that your idea of LFU (in this context), from what you write, is perhaps one that does not adapt over time. Redis LFU employs a decay strategy so that the recent frequency is computed, not the whole-lifetime frequency of access, so even short lived items accessed very frequently for some time, will do well and will not get easily evicted. Full story: [http://antirez.com/news/109](http://antirez.com/news/109) ~~~ danbruc That is what I meant, under specific assumptions about the access pattern they can show similar behavior. Classical LFU tracking the absolute frequency of items will keep items that are used frequently in absolute terms but infrequently in terms of the instantaneous frequency in the cache while LRU will evict such items in favor of items with high instantaneous frequency. Those two algorithms are in some sense two extremes, LRU cares about what is most frequently used right now, LFU cares about what is most frequently used over the entire lifetime of the cache. The LFU variant you describe in the linked article is somewhere in the middle, it tracks the absolute frequency of access just like classical LRU but then it also decays this frequency and therefore turns it into something like a weighted and averaged relative frequency. But it is, at least for me, hard to tell what exactly the algorithm tracks, how the accesses are wighted over time and therefore were exactly this falls on the spectrum between LRU and classical LFU. Algorithms like ARC and CAR also try to strike a balance between LRU and LFU with the difference that they adaptively control where on the spectrum to operate. ~~~ antirez Yes, there is a tuning problem indeed. I made two parameters user-tunable (the decay and the logarithm factor of the Morris counter), but tuning needs some expertise. I've severe limitations on the number of bits I can use per object, but depending on the user feedbacks I may try some auto-adaptive approach as well in the future. ~~~ NovaX I used hill climbing to tune TinyLFU. A larger admission window improves recency-biased workloads, while a smaller improves for frequency. By sampling the hit rate and making an initial adjustment, it can determine when to change directions and hone in on the best configuration. Other than a small warm-up penalty, it quickly optimizes itself. ------ danbruc _[...] choosing the least recently used (LRU) is an obvious choice, since you’re more likely to use something if you’ve used it recently._ There are many other cache replacement policies [1] and they can outperform LRU especially if the quoted assumption is not true. It is for example quite common to have two types of data, one is frequently reused over very long periods, the other is reused over short periods after the first use. In those cases a more complex policy like ARC or CAR can provide noticeable improvements. [1] [https://en.wikipedia.org/wiki/Cache_replacement_policies](https://en.wikipedia.org/wiki/Cache_replacement_policies) ~~~ bnegreve > There are many other cache replacement policies [1] and they can outperform > LRU especially The article is about CPU caches so speed and memory usage are very critical. One of the main benefit of LRU is that it only needs one extra bit per cache line. ~~~ flgr > One of the main benefit of LRU is that it only needs one extra bit per cache > line. This might be well known, but why's that? I've recently seen a Go implementation of LRU and it uses a lot of memory. Maybe this would allow us to save some of that in a better implementation. ~~~ danbruc Requiring only a single bit is only true for a two-way set associative cache, i.e. the content stored at every memory address may only be cached in two different cache slots. In this case you can simply flag the other corresponding cache entry you did not access as least recently uses every time you access a cache entry. The implementation in software was probably fully associative, i.e. every item can be cached in every slot. This requires a lot more memory and it is the same for caches in processors, they require more additional bits and logic the more freedom they have where to cache the content of every address. To be more precise, you have to keep track of the order all cache entries were accessed which requires at least about n * log(n) bits unless you only implicitly store the access order by using something like move to front. ------ kazinator LRU is predicated on locality of reference. Ideally we could peer into a crystal ball and know which items are going to be accessed in the near future and keep those in the cache at all costs. Since we don't know that, we use a predictor based on past behavior. If past behavior is random, then prediction is for shit. So we assume that behavior has locality: something referenced recently is more likely to be referenced again than something not referenced recently. Based on that guess, we sort things from least recently used to most recently (or approximately sort, using aging tricks to avoid actually sorting), and boot out the least recently used entries. If accesses are completely random, then the LRU selection is pure overhead. Or worse; some patterns, like repeated sequential accesses of something large through a small cache, are anti-locality. If we are accessing a big buffer in a circle, then the next thing we are accessing at all times is _precisely_ the least-recently used item that LRU wants to boot out. For situations like that, caching mechanisms sometimes support some API for providing a hint. "These memory locations are going to be needed soon". "This memory mapped file is being sequentially accessed". And such. ------ SomewhatLikely Another characteristic of the data which would make random particularly bad is if reloading/recomputing the most popular items took significantly longer than reloading unpopular items. This could be the case for instance if item data size grew in proportion to popularity. ------ mapgrep Dumb question, what is "2-random"? ~~~ sethammons From the article: ...on real workloads, random tends to do worse than other algorithms. But what if we take two random choices and just use LRU between those two choices? __ " 2-random" is his short hand for the above scenario. [edit: formatting, I have no idea how to signify a quote; I don't want preformatted because it makes a scroll box.] ~~~ AnimalMuppet On HN, typically a quote is done like this: > This is a quote. It won't become a scroll box, no matter how long it gets. > It will just wrap to the next line. True, the next line won't begin with a > ">" character, but the convention is that the whole paragraph is a quote if > the first line begins with a ">". ------ PaulHoule Often you can get away with dumping the whole cache when it fills up and starting fresh. ~~~ Coding_Cat that's a horrible pattern. As soon as you go 1 bit over your cache size in a hot loop you'll have a 100% miss rate. (assuming each element is loaded once in the hot loop). ~~~ rspeer You don't use this pattern while looping. You use it while memoizing results that you don't want to compute again. Here's an example, in the Python package wordfreq [1]. When you look up word frequencies, there's some normalization it has to do to your text. Some words are very common, and it would be silly to normalize them repeatedly. So frequency lookups are cached. The cache dictionary has a maximum size of 100,000, so that exceptional or malicious cases don't use up all your memory. It is extremely rare for text to contain 100,000 distinct words, but if that happens, the cache gets full and the entire thing is dropped. It will quickly be re-populated with common words, of course. Yes, you can make this perform horribly by looking up frequencies of ["zero", "one", "two", "three", "four", ..., "one hundred thousand"] in a loop. That's not realistic data. Do you actually have a suggestion for how to do this faster? We benchmarked this against other cache strategies (with smaller cache sizes so it would drop sometimes) on realistic data. It's much faster than Python's LRU decorator, for example. [1] [https://github.com/LuminosoInsight/wordfreq/blob/master/word...](https://github.com/LuminosoInsight/wordfreq/blob/master/wordfreq/__init__.py) ------ nsebban When the cost of retrieving an item from your slower storage is pretty much the same for every item, may it be old or new, small or big, popular or not. ------ pacificleo11 Ajax made predictive (random)prefetching mainstream .its only natural that random eviction algorithm are coming along . when you pick one end of stick you pick another too
{ "pile_set_name": "HackerNews" }
Countly | Mobile Application Analytics - basil http://count.ly/ ====== nickpresta Awesome demo! However, I seem to have trouble finding the "docs" section for developers. I see: * <http://support.count.ly/kb/sdk-installation> (but there is nothing about how to call init(), etc). * [http://support.count.ly/kb/web-installation/installing-count...](http://support.count.ly/kb/web-installation/installing-countly-server-v12051-to-ubuntu) (but nothing about the requirements in the event I'm not on Ubuntu and have to install from source/other packages) Having these two things are paramount to the usage of your software. Thanks! ~~~ onur We have shortage of documentation for now thats for sure. We will be providing more documents about installation on different platforms in the coming days. If you have any problems or questions we will be more than happy to help if you open up a discussion from <http://support.count.ly> ------ Parseco This is really cool! Have you thought about the possibility of contacting the gamers via SMS or USSD (for polls and feedback). When you see that they haven't used a game for a while?...etc...? Give our Rest api beta a try! ~~~ gorkemcetin Yes, polls, surveys and feedbacks are in the roadmap. We are not a lot interested in SMS/USSD since it's really under control of operators, but would like to invest more in exchanging data using 3G/4G networks. It's really a good idea to trigger rules when an app is not used after a certain period of time. Will think on it :) ~~~ Parseco (thumbsup!) :) ~~~ onur It would be interesting to play with your API since Countly team is composed of all telco professionals :) ------ kenrikm It's cool, I'm interested in trying it out. Rethink the use of Lobster as your logo/text font a bunch of different companies Including Codecademy and HireAry use it. So it's Generic at best. ~~~ onur Thanks for pointing that out. I'm pretty sure our co-founder/designer Osman knows about this but anyways being unique is always better :)
{ "pile_set_name": "HackerNews" }
Abusing Contributors is not OK - joeyh http://www.curiousefficiency.org/ ====== polemic Let's add: flag killing [the original, multi-upvoted front page] links to articulate and well reasoned pieces about why abusing contributors is not OK, is not OK. ~~~ dang We've unkilled that post and are burying this one as a duplicate. ~~~ mjg59 You've unkilled that post, but left it buried on the third page. ~~~ dang Yes, what we usually do when there is a tug of war between upvotes and flags is prevent the flags from killing the post so active discussion can continue, but not override the flags altogether. This happens on controversial posts where the community is divided, and it's not uncommon to see large fluctuations in rank under the tug of war. ~~~ mjg59 Your voting system actively discourages discussion of topics that upset portions of the community, which results in many people not being exposed to those topics at all. Does this seem like a desirable outcome? ~~~ dang That isn't an accurate description. Those topics come up on HN all the time. There's no one who reads the site regularly who isn't well aware of them. ~~~ mjg59 How, when they get pushed off the front page within minutes?
{ "pile_set_name": "HackerNews" }
The Bonfire of the Humanities - benbreen http://www.thenation.com/article/195553/bonfire-humanities ====== aridiculous As a lover of the humanities and social 'sciences', I am always cheered up when a postmodernist snaps out of it, so we can actually have intelligible conversations again. Paraphrasing famous modernist designer Massimo Vignelli, postmodernism was/is a critique, at best. It doesn't actually provide a worldview. To me, it's intellectual madness. Fun, in moderation. Useful, to shake things up. ------ jseliger I'm surprised Moyn doesn't mention Edge.org, whose founder John Brockman has explicitly talked about starting Edge and becoming a literary agent to offer alternatives to what he calls "book reviewers" dominating "intellectual" conversations. Incidentally, the Edge.org annual question books are excellent. In addition, WRT this: _It seems as if, in roundabout ways, all of our current historiographical trend-followers finally agree with White, in the face of what they regard as a great crisis for historical writing today. But it is one thing to call for speculation for the sake of relevance, and another to bring about a new marriage of history and philosophy._ writers like Keith Windschuttle have been discussing these problems since _The Killing of History_ , if not earlier, and Camille Paglia has been discussing them in essays since the 1990s. Finally, the lack of jobs in the humanities has been acting as both a negative IQ test and a conformity test for decades. I wrote a little more about that in the context of English here: [http://jakeseliger.com/2012/05/22/what-you- should-know-befor...](http://jakeseliger.com/2012/05/22/what-you-should-know- before-you-start-grad-school-in-english-literature-the-economic-financial-and- opportunity-costs) . This may relate to the willingness of academic historians and other academics to speak to the public or avoid conformity more generally. ------ walterbell Are there any non-academic professions which employ a high percentage of humanities PhDs, e.g. publishing, think tanks? Phrasing the question differently, if the economics of a humanities education means that only the already-wealthy need apply, where do such people put their education to work? The article could have benefited from a historical perspective on grad school economics and tenure opportunities. When and why did these change and what does it mean for society? ------ joshdick I'm surprised that this doesn't mention Fukuyama's "end of history" idea [1]. When it looks like the world is full of liberal democracies and nations becoming liberal democracies, history feels less compelling. [1] [http://en.wikipedia.org/wiki/End_of_history](http://en.wikipedia.org/wiki/End_of_history) ~~~ nyolfen the state of affairs since the neoconservatives attempted to implement this philosophy through the iraq war, or the direction russia has tacked since 91 to name just two prominent examples, has made this idea kind of a joke
{ "pile_set_name": "HackerNews" }
On Silos - panarky https://blog.ethereum.org/2014/12/31/silos/ ====== marak830 A little offtopic, but that minutes left counter on scrolling is a little disquieting. I cannot put my finger on exactly why, but rushing to read an article didnt feel right (i prefer to take my time).
{ "pile_set_name": "HackerNews" }
Show HN: Parametric Activation Pools greatly increase performance in ConvNets - clmcleod http://blog.claymcleod.io/2016/02/06/Parametric-Activation-Pools-greatly-increase-performance-and-consistency-in-ConvNets/ ====== Ono-Sendai What does 'loss' mean on your graphs? Error fraction?
{ "pile_set_name": "HackerNews" }
Jack Abraham (Milo.com) on being an entrepreneur and why to drop out of school - wesleyzhao http://wesleyzhao.com/2011/02/17/inspiring-words-from-jack-abraham-pdf/ ====== yoshyosh wow great read, especially liked the last part, just goes to show how easily I give up when acquiring new clients
{ "pile_set_name": "HackerNews" }
Rebol is back - neuro http://www.rebol.com/cgi-bin/blog.r ====== Garovix Where was it?
{ "pile_set_name": "HackerNews" }
How I Turned Down $300,000 from Microsoft to go Full-Time on GitHub - jseliger http://tom.preston-werner.com/2008/10/18/how-i-turned-down-300k ====== jmtame Loved Tom's social hack for finding cofounders, from Startups Open Sourced. He also has a really good outlook on the role of design in startups. Q: So, the best way to get to know somebody is to go drink with them? A: That is absolutely the best way to really get to know a person and what they really like and are interested in because if they are interested in technology, then they will have no problem geeking out with you about Ruby or Node or something for three hours, over drinks; that’s when you know that you found someone that could be a really successful cofounder. I think there really is something to doing business in bars. In the early days when there were four of us—we had hired Scott Chacon—we would go to this bar called O’Reilly’s, up in North beach. We went there almost every week and that’s where we would talk about what we had done. This is after we had started full time and it was where all the decisions were made. A couple of drinks in, you start to just say what you mean instead of thinking so much about whose feelings you are going to hurt or whatever, you say things very bluntly, like, “I think we should do this, and I think you are wrong for saying we should do it a different way,” and now you can have an honest argument about what needs to get done and what the concerns are about the company or how it’s structured or how the stock is going to be split. All this stuff will come up over drinks and as long as you are not too drunk, it can be helpful. ~~~ sahillavingia Warning: this restricts you to finding cofounders that are 21 and over. :) ~~~ i386 Not if you live in a country where you can vote and drink at the same age :) ------ larrykubin I'll be honest. When I first read this post nearly three years ago, I barely knew what Git was, the stock market was crashing hard every day, hundreds of thousands were being laid off, and turning down that offer seemed pretty foolish. Now I can't live without GitHub. ~~~ jrockway Honestly, I don't think turning down an offer is ever a real problem. You can always ask for the offer again; does a company as big as Microsoft ever have enough smart programmers? People come and go every day. There is probably room for you somewhere. ~~~ hammock This is very true, just want to add the caveat that the notion of low cost of foregone opportunity you are talking about could apply to mature-stage companies, not necessarily fast-growing ones. Also there is tremendous selection bias in which of these "I turned down X to do Y" stories get told, of course. ~~~ notJim I would definitely read the "How I turned down a $300,000 job at bigcorp to found a startup that crashed and burned 18 months later" story. ~~~ tlipcon I turned down a job at Google (not 300k but hey, it's Google!) to join a startup. The startup started to sink about 2 years later. I learned a ton and didn't regret it for an instant. Moved on to a new startup 2 years ago when it became clear the first was a dead end. Google recruiters continued to ping me religiously every 6 months regardless. Moral of the story: Google, MSFT, Facebook, etc will all still be there in 2 years. Especially if you're early in your career and don't need the cash today, go wherever you will learn the most. ~~~ akronim it was 300k over 3 years... so your offer probably wasn't that far off! ------ BrandonM _> When I’m old and dying, I plan to look back on my life and say "wow, that was an adventure," not "wow, I sure felt safe."_ A great conclusion to a great article. Definitely a motto to live by. ~~~ davidw A cynical mind might say that a really adventurous life might also expose one to more risk of being _young_ and dying, rather than old. Or other less than pleasant outcomes. ~~~ acangiano That's why our brains afford us both desires: the need for adventure, and the need for security. The two keep each other in check. Adventurous people, who aren't reckless, simply choose to be more adventurous than fearful when there aren't too many real safety risks, but mostly perceived ones. ------ pjhyett It's worth noting that none of the Ruby guys Tom worked with at Powerset are still working for Microsoft 3 years later. The guys I've spoken with had a miserable time working there and left to work for other startups like Greplin, Bank Simple, and Square. ------ lawnchair_larry How did github get early users? ~~~ mojombo We invited everyone we knew in the Ruby community. We all attended local Ruby meetups and talked to anyone that would listen. We used it for our own open source projects and invited would-be contributors to join the fun. We used an invite-only model during the private beta to create artificial scarcity and encourage people to invite their friends. ~~~ brandnewlow Am sending this to every person I know building a community-driven site. You've perhaps unwittingly boiled the general solution down to its base components. ------ twakefield Great post, but dammit, now I'm going to have "You’re The Best" by Joe Esposito stuck in my head all day. ------ joelhaasnoot This story is encouraging! I'm soon to graduate college and am figuring out what exactly I want to do next. One of the options is to work part time on my startup, next to another part time job or freelancing. It's a lot easier when you have savings to make such a leap, then again, I live lean and live cheap. ------ vipivip Turned out to be the best move. ~~~ jmtame No kidding. Coming from a guy who has never raised a single round of funding and has operated profitably every single month since launching (except for one month where he hired two people), they're doing really, really well. ------ wildmXranat Very nice read. That also leads me to mention that Github, as good as it is in 'social' coding or whatever that means, does not fill a gap for a proper resource on how to use Git. Not that it should and it clearly doesn't carry that mandate, but there is hefty amount of respect to be made for any group that de-mystifies git in all it's glory. Hell, there are plenty of comments here, on groups and proggit from users that lose their hair over advanced use of git. In my opinion advanced consulting services and migration planning for currently SVN,CVS engaged companies would be nice. ~~~ dasil003 > _proggit_ One too many Gs: progit.org ~~~ drbaskin I'm having trouble determining whether you are serious, but I suspect the original poster was referring to reddit's programming community. ~~~ dasil003 I'm suggesting that's a better place to learn about git not to mention being created by one of the Github guys. ~~~ dasil003 Okay since I'm just getting driveby downvotes, let me explain the source of my comment. The original comment said: > _That also leads me to mention that Github, as good as it is in 'social' > coding or whatever that means, does not fill a gap for a proper resource on > how to use Git._ Well, Scott Chacon (#4 githubber I believe?) wrote the book to demystify Git. Of course, there is a certain irreducible complexity there, but I think Github has made a significant contribution there, so I don't think it's fair to level this criticism at them out of passing unfamiliarity. ------ chopsueyar "You're the best around, Nothing's gonna ever keep ya down!" ------ greg_gti When I’m old and dying, I plan to look back on my life and say “wow, that was an adventure,” not “wow, I sure felt safe.” Great quote and I try to live my life by the same philosophy ------ emehrkay I pay for github, great decision :) ~~~ zackattack GitHub makes using version control fun. ------ louislouis "The next night, Friday, October 19, 2007 at 10:24pm" Was there a time-machine involved overnight or is it supposed to be 2008? ~~~ spacemanaki I think the post was published in 2008 but it was talking about events from a year earlier: "2008 is a leap year. That means that three hundred and sixty six days ago, almost to the minute, I was sitting alone in a booth at Zeke’s Sports Bar..."
{ "pile_set_name": "HackerNews" }
The Inconvenient Truth About Dynamic vs. Static Typing - redshift1010 https://blog.jooq.org/2014/12/11/the-inconvenient-truth-about-dynamic-vs-static-typing/ ====== oldandtired Since static typing systems use dynamic typing to determine the static types, his comment about dynamic types languages being dead is simply wrong. Many years ago, it became obvious that static typing is useful in some class of programs, dynamic typing is useful in another class of programs and soft typing is useful across them all. A range of typing systems exist now, they will continue to exist into the future as long as we have need of digitally based computing systems. We live it and we continue to solve the problems put before us. As a side not, it was interesting that he didn't specify a List("abc", 0, 0.2) and answer what the static type of such would be. There are many examples of data structures that has non-uniform base types which can only be determined at runtime. Let the silly season start. ~~~ lukaseder In Java, the type of such a List("abc", 0, 0.2) would be List<? extends Serializable & Comparable<?>> or something like that. There's always an appropriate type for any expression. ------ tedmiston > Dynamically typed languages are dead The author seems to overlook existing efforts from the dynamically typed end of the spectrum to add type inferencing and optional static typing to dynamic languages. Either as type checkers e.g., mypy [1] or for runtime improvements. [1]: [http://mypy.readthedocs.io/en/latest/index.html](http://mypy.readthedocs.io/en/latest/index.html)
{ "pile_set_name": "HackerNews" }
Using Travis-CI with Python and Django - craigkerstiens http://justcramer.com/2012/05/03/using-travis-ci/ ====== pydanny Time to switch to Travis-CI!
{ "pile_set_name": "HackerNews" }
Ask HN: Should I pay programmers I hire per hour or per task? - MavropaliasG ====== ToFab123 It depends on if it is possible to make precise time estimate of how long the task is expected to take for an developer with same level as your dev. It also depends on the quality of the specifications you have written. If you are unable to write clear and precise specs then hard for someone to commit to a set numbers of hours. If there are elements of research and development in the task it is also hard to set a firm price. So the answer is that it depends on the quality of your specifications and ability to describe and explain the work that needs to be done ------ gregjor [http://typicalprogrammer.com/how-to-work-with-freelance- deve...](http://typicalprogrammer.com/how-to-work-with-freelance-developers) ------ catacombs Pay them by hour and pay them fairly. Simple as that.
{ "pile_set_name": "HackerNews" }
3D images of tissue may help spot and treat cancer - ximeng http://www.bbc.co.uk/news/health-17817146 ====== ximeng Paper (abstract, paywall for full text): [http://www.sciencedirect.com/science/article/pii/S0002944012...](http://www.sciencedirect.com/science/article/pii/S000294401200168X) Press release: [http://www.elsevier.com/wps/find/authored_newsitem.cws_home/...](http://www.elsevier.com/wps/find/authored_newsitem.cws_home/companynews05_02300) Alternative article: [http://medicalxpress.com/news/2012-04-virtual-reveal- disease...](http://medicalxpress.com/news/2012-04-virtual-reveal- disease-3d.html) Apparently 1.45 TB data for 5000 slices of data.
{ "pile_set_name": "HackerNews" }
Zenefits Scandal Highlights Perils of Hypergrowth at Startups - tpatke http://www.nytimes.com/2016/02/18/technology/zenefits-scandal-highlights-perils-of-hypergrowth-at-start-ups.html ====== throwaway-zcs It's so convenient for everyone if this is all on Conrad. Mr Sacks did an excellent job of throwing Conrad under the bus, but as COO for 16 months, a board member and with a desk adjacent to Conrad and a seasoned guy, it strains credulity that he didn't know. There's some schaudenfreude here (and an anonymous account) because these guys all acted like they were smarter than everybody else. I hope regulators do a real investigation and I suspect Mr Sacks will come out more culpable than he would have you believe. ~~~ mathattack My guess on this situation... You have a group of people sitting around the table saying, "If we do nothing, the value of the company goes to zero. We have to do something visible and credible." Conrad had to agree to jumping on his sword - as the largest shareholder, he has the most to lose if the company goes under. So he jumps on the sword, and lets everyone kick him while he's down, because it increases the likelihood that the company survives. I have no real information though, so for all I know he could have been stabbed in the back instead. ------ gkoberger It's interesting how Uber, Airbnb and Draftkings blatantly broke laws and won. They set the precedent that if you're growing fast enough, the laws will change to fit you. Didn't work out that way for Zenefits. They seemingly lost. ~~~ ___ab___ I think the reason that {Uber, AirBNB, DraftKings} succeeded in flouting the law is that they operated in industries that are consumer-facing, and where the cost of regulation is obvious to consumers. Many people understand that taxi regulations (for the most part) negatively affect them, and in many cases are extremely frustrated with them: see Washington, DC. Most people aren't familiar with and don't care about the company that manages their health insurance, and as a result there's little public support. ~~~ pron Exactly, but I'd phrase it a bit differently: when it comes to taxis and apartments, regulations are bad for _you_ , the consumer, and good for the people in your community (taxi drivers, neighbors), while in insurance, regulations directly protect the consumer. Because people (especially in the US) couldn't care less about other people, regulation that annoys consumers is "bad", and the consumers then defend the companies breaking those particular laws. Those companies exploit the fact that in _every_ industry, consumers always outnumber providers (or conversely, every person consumes from many more industries than those where they provide), and so the disregard for this kind of regulation will always work. Every new company will get consumers to gang up on the far fewer incumbent providers until they break the regulation that protects them, and so on, industry by industry. It's a little like the robber barons, who used every new wave of immigrants to beat up the previous generation of immigrants who tried to unionize, and then hired the new ones in their place... that is, until the next wave of immigrants. Except the new way of doing this is far more effective, because it's always easy to obtain a majority that supports you _and_ feel like they're doing the right thing at the same time. ~~~ lazerwalker For the most part I think you're spot-on, although it's worth emphasizing the nuance that not ALL taxi/hotel regulations are bad for the consumer. Most of the AirBnB and Uber horror stories you hear are things that don't happen, or happen far less relative to the overall volume, in a world of licensed taxis and professional hotels/B&Bs. Does the good of current regulations outweigh the bad? Likely not, in many cases. But there are reasons (at least some of) these regulations exist outside of capitalism being terrible and the successful trying (and succeeding) at pushing out competition. ~~~ nommm-nommm I would argue that many (most?) housing regulations are good for the consumer. My landlord has to provide me with a safe and structurally sound place to live, which is good for me. If my heat breaks in the winter he's obligated to fix it, he can't evict me and leave me on the streets on a whim, or turn off my water if I am late on the rent, etc. Laws around security deposits are usually good for the consumer as well. Nobody wants what is referred to as a "slumlord." Landlords often are annoyed about regulations (and some tenants unfortunately abuse them) but many came about because of the abusive practices of the slumlords. Our society deems having a safe place to live pretty essential so landlords have a massive amount of power over their tenants if unchecked. ------ rifung It seems like a recurring theme in these "scandals" is that if you put too much pressure on your executives, they end up either quitting or doing something they shouldn't be doing in order to keep up with your demands. Another example is with VW and their diesel emissions. I feel like people just have a difficult time saying they were wrong or pushing back and saying they can't do something. I am guilty of this myself. ~~~ mcguire "You" who? The system can be as rotten as you like, but in any particular case, at some point, someone said, "Let's start cutting corners." ~~~ bsder > The system can be as rotten as you like, but in any particular case, at some > point, someone said, "Let's start cutting corners." Yes, but... Normally things like this build up gradually from "just one step" on something that is patently stupid. And, let's face it, if you can get a certification from an online course, it's stupid, prima facie. So, you need to get one more person online to file benefits. Get them certified. Okay, these certifications are stupid and any idiot can sit through these. Okay, let's get the same idiot to sit through each one. Okay, we're still not getting certified fast enough. Okay, hire more idiots to sit through this. Okay, but they'll have to learn this. Okay, let's put some programmers on this so we only need one idiot to do things on multiple sessions. Okay, now that we have the macro, we don't need the idiot anymore. etc. If the feds weren't clamping down on this, everybody would be singing their praises like Uber and AirBnB. It's all about the bandwagon, baby. ------ stygiansonic From the article: " _Growth broke stuff. To increase revenue, the company moved beyond small businesses to customers with hundreds of employees — and the software struggled to keep up. Instead of pausing to fix bugs, Zenefits simply hired more employees to fill in where the software failed, including repurposing product managers for manual data entry._ " From a different article about the downfall of Target Canada[1], which also suffered from trying to ramp up too fast: " _Getting the details from suppliers largely fell on the young merchandising assistants... “There was never any talk about accuracy,” says a former employee. “You had these people we hired, straight out of school, pressured to do this insane amount of data entry, and nobody told them it had to be right.”_ " Don't underestimate the proliferation of data entry jobs, especially when there is chaotic growth/lack of a proper plan. 1\. [http://www.marketingmag.ca/?p=166300&preview=true](http://www.marketingmag.ca/?p=166300&preview=true) ~~~ Lawtonfogle >“You had these people we hired, straight out of school, pressured to do this insane amount of data entry, and nobody told them it had to be right.”" My first guess is that it was worse than this. The people doing data entry who took the time to do it right were likely showing up as doing worse on what ever metrics were being ran and were replaced by people who were fast but error prone. Bad metrics leading to bad optimizations. ------ yummyfajitas I wonder why "The Macro" doesn't also highlight the perils of clueless regulators imposing moronic laws on HR departments. The specific law that Zenefits violated was a law insisting that before selling insurance, your employees need to sit at a computer and click "next" for 52 hours. Once they've clicked "next" sufficiently many times, only then are they permitted to take the exam to determine whether they have enough knowledge to sell insurance. Shouldn't this scandal also highlight the perils of a regulatory state? ~~~ maxerickson Modest amounts of wasted time? Oh no. I suppose one way to estimate how onerous this requirement is (I agree that to the extent it is arbitrary that it is dumb) would be to compare how much compensation the insurance license makes available to how much compensation spending the equivalent time learning a skill like welding makes available. (I think most people wouldn't be very good at welding after 50 hours of training and practice) ~~~ yummyfajitas All you propose measuring is the _individual_ benefit to sitting through training. That's a terrible way to measure the social cost of a bad regulation. The social cost is 52 hours of productive output from moderately skilled employees. (Or moderately less - if learning the material takes 20 hours, then the waste is 32 hours assuming people can simultaneously learn the material and click.) The right thing to do is simply make people take the test, and if the test isn't accurately measuring people's insurance selling ability, fix the test. ~~~ st3v3r And what's the social cost of unlicensed, untrained people selling insurance? What's the societal cost of people who have not studied selling insurance that they might not understand? ~~~ yummyfajitas I don't see a very high social cost from licensed insurance salespeople who passed the exam selling insurance. Do you? If so, what is it? Again, note that we are discussing _spending 52 hours clicking through a powerpoint_ before you are allowed to take the test to get the license. ~~~ st3v3r "I don't see a very high social cost from licensed insurance salespeople who passed the exam selling insurance. Do you? If so, what is it?" How do you know that they passed the exam? They told you? "Again, note that we are discussing spending 52 hours clicking through a powerpoint before you are allowed to take the test to get the license." No, we are not. ~~~ yummyfajitas All anyone has accused Zenefits of doing is using a macro to prevent people from being auto-logged out of training. E.g.: [http://www.buzzfeed.com/williamalden/zenefits-program-let- in...](http://www.buzzfeed.com/williamalden/zenefits-program-let-insurance- brokers-fake-training#.qmexedRMl) _The Macro functioned to keep a person logged into the course and prevented the person from being logged out for inactivity. The Macro did not advance through the required material or quizzes in the education course — the Macro only kept the person logged in. The Macro only pertained to the prelicensing education course and did not affect the broker exam taken later._ If you have even accusations of some other activity (let alone evidence of it), go ahead and post it. ~~~ manigandham Have you not read any of the articles? The cheating on the time is just one issue. They had unlicensed brokers selling insurance in two states, which is an actual crime. ------ GCA10 Rhetoric aside, isn't this really just another example of "... Highlights Perils of Hard-Charging CEOs"? It's that simple. We can wander far from fast- growing startups and find the same kind of conduct anywhere in business. The guy running my corner grocery store decided to set up a sit-down cafe without getting a city license. The folks running a nearby office suite are in no hurry to put in city-mandated sprinklers. Business founders/owners like to get things done without asking permission. That's how they roll. Trying to invoke unicorn valuations, VCs, etc. is silly. It's a classic case of finding an exciting anecdote and trying to attach causality theories after the fact. ~~~ unoti > The guy running my corner grocery store decided to set up a sit-down cafe > without getting a city license. The guy at the corner grocery store isn't discussing my employee's private medical records with me in between slamming down hits on the beer bong. ~~~ mdonahoe Are you referencing something in particular with this beer bong comment, or just being hyberbolic? ~~~ untog Reasonably sure it is exaggeration for comic effect. We are not in a court room. ~~~ mcguire Bam! mdonahoe is overruled! ------ coldcode Being good at starting a company and raising funds is no guarantee of being any good at running a company. Add to that growth from 15 to 1600 in two years is also likely to be a massive failure. Add to that insane pressure from investors to do the impossible (that you promised). I've seen a lot of people crumble at a much smaller size. ------ chillingeffect Come on now, NYT, there is virtually no evidence of corruption at startups being any worse than any other business or human endeavor. NYT, you're just spreading FUD because people look to you for guidance and you need to respond to their fear. Yes, these guys (Zenefits) were, in one area, dishonest and cheated. But it's not like Cigna, PacTel, BoA, Citizens and zillion other companies are paragons of virtue. Nevermind Volkswagen. [1] [https://en.wikipedia.org/wiki/Accounting_scandals](https://en.wikipedia.org/wiki/Accounting_scandals) [2] [https://en.wikipedia.org/wiki/List_of_corporate_collapses_an...](https://en.wikipedia.org/wiki/List_of_corporate_collapses_and_scandals) ------ jmckib Alternative title: "Zenefits Scandal Highlights Perils of Excessive Occupational Licensure". What exactly is the purpose of requiring a license for selling insurance? If consumers desire some assurance of quality in their insurance brokers, then certification, not licensure, would be sufficient. The only justification for licensure over certification is a paternalistic one: consumers are simply too ignorant to choose their own insurance brokers, even if some are certified and some are not. As Milton Friedman said in Chap 9 of Capitalism and Freedom, this argument "amounts to saying that we in our capacity as voters must protect ourselves in our capacity as consumers against our own ignorance." This isn't to say that Zenefits hasn't made a huge misstep for seemingly little benefit (bypassing a 56 hour course?), but I wish there was some discussion of the absurdity of the law that was broken alongside the bashing of Zenefits for breaking it. ~~~ CPLX Insurance is _important_. Unlike many other consumer products you really don't have any idea what you're buying until after you've bought it. Making an incorrect or misled choice in health insurance is sufficient -- literally -- to completely ruin your life financially in a matter of hours, or cause unnecessary death via untreated illness. If you want to claim that you can read a health insurance policy binder and understand it be my guest. I am a frequent writer and editor of technical literature and capable of writing code and I have a pilots license and I find health insurance policies almost incomprehensible. We make sure that you don't get a bad _haircut_ by requiring licenses for barbers. You can't fix my sink or chimney without licensing. We require licensing and testing to act on someone's behalf in the legal system, and in nearly all sales of securities, and of financial products, of which insurance is one mind you. If Zenefits wanted to make an in-public argument that these rules are not necessary they were free to do so. I would have disagreed, and I'm sure others would have shared my opinion. Maybe they could have won the argument. They didn't do that. They aren't righteous crusaders passionate about consumer choices and regulatory issues, they're opportunistic business people who broke the law and committed fraud instead of following the rules or working to change them. ~~~ yummyfajitas Since you would have disagreed, can you explain why you think 52 hours of clicking "next" is a necessary step in becoming a broker? Zenefits employees did pass the exam, and they possess the knowledge you believe is necessary. It's just that the law requires 52 hours of clicking before you are even permitted to take the exam. Why do you think this is a good law? ~~~ CPLX You're being disingenuous. The requirement isn't "clicking next for 52 hours" it's spending that amount of time studying an online course. You're required to actually pay attention for 52 hours and then certify that you did. For another example, the requirement inherent in a multiple choice exam isn't a matter of "filling out a semi random sequence of the letters A, B, C, and D" it's _knowing the answers to the test._ The filling out the letters is a signal that you know. Signals aren't perfect, in that example if you don't know but copied answers from someone else that's cheating and the signal would be unreliable then, and you've subverted the actual intended requirement. The requirement in this case is _spending about a week of your life actually studying this material_ and the clicking of the next button as well is a signal that you did it. Don't confuse the means with ends. You could have argued that the amount of hours spent studying the material is also a useless metric. But that's a more nuanced argument that you haven't made, and one that has defensible positions on both sides. Clearly clicking next isn't a meaningful requirement, but so what, it's not actually the requirement. Spending time studying is, and they cheated and lied about it. ~~~ yummyfajitas What the law actually requires is clicking for 52 hours. But lets take your claim as a premise; why is it important that a person spend time learning? Suppose two people know the material equally well, but one of them learned it faster than the other. Why is that a good regulation? How does it benefit consumers to make it illegal to learn things fast? I know a former algebraic geometer (lots of category theory) who learned Haskell very rapidly. Would it benefit consumers of his services to pass a law saying he needs to learn Haskell at a slower rate comparable to a RoR hipster without a math PhD? ~~~ CPLX I'm going to go out on a limb and guess you have no idea what the law actually requires in detail. It's ok neither did I. Here's an example of what it looks like, there is a _lot_ more on the linked pages, which collectively comprise the actual requirements: [https://govt.westlaw.com/calregs/Document/ID813F6A0622011E4A...](https://govt.westlaw.com/calregs/Document/ID813F6A0622011E4A9828577DD5F1BF2?viewType=FullText&originationContext=documenttoc&transitionType=CategoryPageItem&contextData=\(sc.Default\)) > why is it important that a person spend time learning? Suppose two people > know the material equally well, but one of them learned it faster than the > other. Why is that a good regulation? How does it benefit consumers to make > it illegal to learn things fast? I don't know. But I do know that basically every educational institution requires some level of engagement measured in time. You can't just pass tests to get an undergrad degree or a PhD either. The requirement to spend actual time is hardly cruel and unusual. I also know that the requirements were clear enough to be known to Zenefits and they willfully evaded them. What is the difference between a Harvard graduate in Economics and someone who attended and completed all the requirements for an Econ degree but was short one art elective class and never got a degree? Should he just fudge his job applications since the art class isn't important? What's the difference between someone assigned 100 hours of court ordered community service who did it and someone who went back to court with forged paperwork saying they did it? In all the examples, and Zenefits as well, the difference is that the person is committing fraud, is lying, and is not ethical. Cheating on requirements isn't the same as arguing to change the rules, regardless of how confused you continue to pretend to be about it. ~~~ dsp1234 _You can 't just pass tests to get an undergrad degree_ Yes you can. Almost every school has a procedure for taking a test or convincing a professor that you have the knowledge the class provides. You still pay the cost of the course, but do not actually attend it. Getting my degree many, many years after entering the field, I skipped a huge swath of undergrad classes this way. Stuff like non-computer related classes was all that I needed to do 'in person'. In other words, I skipped 'pressing buttons' for a large chunk of time due to fact that I knew the material and could prove it. The main difference to the above being that the school recognized that it was possible for a student to understand the core material completely without taking the class, and the above rules do not admit that possibility. ~~~ frotak _Getting my degree many, many years after entering the field_ So would you say you had experiential learning in the subject matter of the classes you were being allowed to skip after demonstrating both evidence of this experiential learning and the attendant competency? Testing out of a course due to earned knowledge is different from passing a multiple choice exam with Cliff Notes awareness of the material. ~~~ dsp1234 _is different from passing a multiple choice exam_ Some of the classes did just have multiple choice tests that would have been easy enough to 'Cliff'. Though it's not really relevant to larger discourse. That still doesn't change the facts of the original situation. The test is the determining factor of whether or not they 'completed' the course. Indeed, someone who 'Cliff'ed the notes, and passed the test, and watched Netflix on a second screen while pushing all of the right buttons would still be accepted. Which is the ultimate failure here. Either the time limit is necessary and can't be skipped (due to the physical limitations of some inherent process), or the time limit is artificial and the actual possession of knowledge is sufficient. Who is served by putting an artificial time limit in place that does not actually prove knowledge of the material? ------ Pxtl Wait, all it did was prevent auto-logout? That's it? Seriously? ~~~ ritchiea It does seem to be low scale cheating but a culture of writing and distributing internal software to cheat on tests required for certification sounds toxic. ~~~ jmckib Someone correct me if I'm wrong, but I believe they were cheating on the broker license course, not the exam. It would be similar to skipping a class with an attendance policy because you already know the material. ~~~ st3v3r It still shows an incredible amount of unethical behavior, and more of this pattern of "I'm a startup! I'm special! The law shouldn't apply to me!" Special snowflake syndrome, just exhibited by a company. ------ amsilprotag If we are to use this [0] definition, then "Hypergrowth at" can be omitted. It seems like a better title would include "in highly regulated industries." It's interesting to note that the essay only includes discussion of law as it relates to defending startups from incumbents, not as a caveat to the advice: "The good news is, if you get growth, everything else tends to fall into place." Is it the case that Zenefits merely failed to grow fast enough to present a more credible threat to state prosecutors? [0] [http://www.paulgraham.com/growth.html](http://www.paulgraham.com/growth.html) ------ pbreit This article is terrible. The takeaway is the hypergrowth ultimately overcomes. Cleaning up the mess will be comparatively easy. Zenefits flouting regulations was silly and didn't appear to be necessary. With Sacks at the helm, a huge and growing business and $500m in the bank, Zenefits is very well-positioned. ~~~ tyre You may be right, but it isn't that one-sided. 1) Sacks was COO when all of this happened. These were specifically lapses in policy and operations. Are you sure he is immune to the repercussions? 2) "[H]uge and growing" as of last year. Every one of these articles discourages new companies from signing up and talented people from joining the company. Trust is a tremendous factor in health insurance, especially when there are many other options on the market. If I have other options, why go to a company under investigation with a horrendous culture? 3) Based on the state of their operations (poor), company culture (dismal), and customer feedback (even worse), I would push back on them being "well- positioned." $500 million can buy you a lot, but if culture, brand, and operations were that easy, Comcast could turn itself into a modern company in a few months. ~~~ pbreit 1\. Sacks has a sterling reputation (and a JD from U of Chicago). He's immune. 2\. Zenefits now has a PayPal CEO, exec staffer and board member plus the backing of A16Z. It is an attractive to place to work and obtain services from. 3\. I think those things will come around (if they are even as bad as you opine). Comcast is a 50 year-old, former monopoly, $140b company. SO not only a bad comparison but a terrific outcome. ------ financedfuture Regarding unicorns (> U$1 billion valuation), the U.S should implement certain regulations. These startups have market caps that are larger than thousands of public companies that go through several laws and openly disclosure their financial information. Not only does this lack information hurt shareholders that are not "part of the club", but also stakeholders that rely on the company in other matters. [http://papers.ssrn.com/sol3/Papers.cfm?abstract_id=2674420](http://papers.ssrn.com/sol3/Papers.cfm?abstract_id=2674420) "Regulation of unicorns should recognize that outsized power." ~~~ alexc05 I'm not actually sure I agree with this. Consider that the people & companies investing in pre-IPO U$1B companies are _extreme_ expert investors. They take the risk on. Now if we're talking about post IPO, then actual financial regulations kick in and market-traders are afforded the protections that they have now (which is still sometimes significant) Imposing additional regs on a 'privately held' company simply because they accepted enough money to give them a U$1B valuation punishes them for growth. Additionally, valuations are sometimes voodoo calculations for example (and someone else can check my math) but is someone gave me $1 for 1/10,000,000 of my company, wouldn't that be a billion dollar valuation? Obviously not a _credible_ one - but - where's the line? $1M for 1/1000? It's still not a billion real dollars. If you look at linkedin's valuation it's based on current potential for future revenue. But revenue that is like 10 or 20 years in the future. (reference: my foggy recollection of Peter Thiel's lecture in Sam Altman's startup school) Maybe I'm confused as to how valuations actually work. ~~~ st3v3r "Consider that the people & companies investing in pre-IPO U$1B companies are extreme expert investors" And regular employees getting paid in options. "Imposing additional regs on a 'privately held' company simply because they accepted enough money to give them a U$1B valuation punishes them for growth." No, it doesn't. It shows an acceptance of reality. ~~~ alexc05 > And regular employees getting paid in options. Ahhh... That makes more sense to me. > No, it doesn't. It shows an acceptance of reality. Fair point. Consider my mind swayed. I'm not sure valuation is the right meter stick, but as another point in the thread, total $$ raised _might_ be closer to the right answer. There is probably something there. ------ dpweb Had some personal experience in bending the rules (a very ugly experience) - and its better to follow the laws, even if the laws don't make sense. In a B2B business especially, follow very closely and to the letter. ------ whoknowsnotme It is unfortunate that the public doesn't know much about insurance or how it's regulated. While what Zenefits did was wrong in several cases, there are some important things to understand: \- This macro program didn't have anything to do with whether an agent would/could pass an insurance exam. That's separate and in order for someone to practice, they need to pass the test. \- If this training program were so critical to understanding and effectively selling insurance, why wouldn't all state adopt it? \- The unfortunate fact is that the details you must study and know to pass the test have very little do with how you will sell insurance. The study packets, courses etc. do not prepare you in any way to sell these products better. Actually a lot of the test talks about annuities and things completely unrelated to medical insurance. \- The licensing issues largely relate to non- resident licenses, not the actual resident license where the test is required to pass. It's a common practice in brokerages across the US to get licensed when business is closed or about to be closed in the different state. \- If you want a comparable, lawyers obviously have to pass the bar to practice. But they can actually practice legal advice before ever passing the bar as long as they are working under a licensed attorney. This is how many pro-bono cases are worked by students in law school etc. ------ manishsharan So what will Zenefits eventual business model look like if they survive this ? I don't think they can be an insurance broker; customers would have to be incredibly stupid to buy insurance from them. If they are going to be an HR software company, then do they even deserve that kind of valuation, as their current valuation seems to be base on an expectation of hypergrowth. HR s/w companies rarely have hypergrowth , what with SAP and Oracle owning large chunks of the enterprise market. ------ Fede_V What I found particularly illuminating was this: 'Some investors said Mr. Dalgaard was as instrumental as Mr. Conrad in pushing for steep revenue targets, and that both men’s ambition pointed in the same direction — toward hypergrowth.' (in fairness, later on, the article says this: Another person familiar with the board disputed this, saying Mr. Dalgaard, who formerly ran the cloud software company SuccessFactors, was among those asking Mr. Conrad to restrain Zenefits’ growth plans and fix the culture. ) This is the same person that had a glowing profile written about them in the NYT: [http://www.nytimes.com/2015/10/18/business/lars-dalgaard- bui...](http://www.nytimes.com/2015/10/18/business/lars-dalgaard-build-trust- by-daring-to-show-that-youre-human.html) With this beautiful paragraph: 'I learned so many things from my dad, but in particular he taught me about ethics and that there is no easy way to get to your goal. You’ve got to be like Lambeau Field in Green Bay and build for bad weather. That’s basically the only way to achieve any type of success. But you often see with some companies, particularly start-ups, that they’re telling themselves and others a bit of a story, and not being honest about what the real issues are. Instead of taking all that energy and focusing on the core outcomes, they’re just glazing over it and hoping it will be O.K. There is no such thing as a quick fix.' There's no way to know what the real truth actually is - but, wow, that's quite a contrast between the two articles. ~~~ poof131 The most telling quote for me was “The two men also differed over whether to address employee morale by re-pricing stock options to the new lower valuation, according to people familiar with the matter. Mr. Conrad favored the move, but Mr. Dalgaard believed it would train employees to expect a re- pricing any time the company’s fortunes changed.” So the “we support founders” mantra may also mean we support founders and ourselves at the expense of employees. Despite all Conrad’s miss-steps, such as the ill-mannered Quora response, I now have a new respect for him. At least he was trying to fight for the employees. Sad to see a16z in this light. With fantasy valuations crashing to reality, repricing options should become the standard. Or you can follow the current SV playbook and hope employees don’t really understand what’s going on with equity. ~~~ JoeAltmaier Ok, so I have a new interview question for any startup job: "Will you reprice options should valuations decrease?" They say No, I walk. ------ kneel At the center of this 'scandal' is a program that prevents auto log-out during license training. Being licensed: Sitting at a computer for 52 hours and clicking on it before passing an exam. What a waste of time. Pretty much an entire week and a half of full time staring at a screen to get a license to sell insurance. They were just skating bureaucracy, plenty of companies do this. ~~~ run4yourlives2 At the centre of this scandal is a company selling insurance with unlicensed brokers. That means people advising others on what insurance to buy where their health is concerned who didn't know what the hell they were doing. The software made to skirt the licencing requirements is only a subset of the overall issue. Frankly, I'm getting a little tired with the group of commentators on here that think its a-ok for a company like zenefits to tell people "Sure, you're covered for that in this policy" when they frankly have no idea if that is the case. Selling insurance advice without a license is exactly like selling financial services advice without a license. And both actions are illegal for very good reasons. ~~~ mattmanser I worked with mortgage brokers for a while. They had a big exam, all complicated and they were supposed to be able to advise. What they actually did was put 5 figures into a computer and pick the mortgage nearish the top with the biggest commission. I have no idea how complicated health insurance is in the US as I'm from the UK but I'm willing to bet £100 that's what 90% of health insurer brokers do too. ~~~ run4yourlives2 >I have no idea how complicated health insurance is in the US Exactly. ~~~ mattmanser Your comment just drips with enlightening anecdotes and interesting exposition explaining how picking health insurance is so much more complicated than all the other financial advice that today is basically little more than: Put client's answers in brokerage program Choose highest commission in top 10 Recommend product ~~~ run4yourlives2 1\. Mortgage brokerages are not financial advice brokerages. A mortgage broker finds the best deal for the consumer, usually for products that are more or less the same. 2\. A financial planner or investment advisory is about helping a client gauge what product works best for their particular situation, and being able to communicate the very real downsides of certain courses of action. 3\. An insurance broker acts in a very similar way to #2, in that there are some very real concerns that may not be obvious to the layperson that the broker should be providing advice on. For example: what a health insurance product covers, and why (for example) not providing coverage for children in your female dominated company could result in very real losses to your employees, and by extension, you as a company. >Put client's answers in brokerage program; Choose highest commission in top 10; Recommend product ..is PRECISELY the type of thing that licensing is designed to protect the consumer from. Group health insurance is extremely complex, particularly in the US where it is really the ONLY health insurance a person has. These are people's lives we're talking about here...you can't wait until you HAVE cancer to find out that your plan doesn't cover it. The only thing this entire thread is showing is exactly why not having licensed, knowledgeable professionals advising on insurance is a very real concern. ------ wslh It is very interesting to read about other approaches for growth. For example, Google waited patiently several years until a business model worked. Imagine Google starting today with a protoversion of PageRank. ------ snappy173 it's a matter of risk. when you're trying to be a billion dollar company, you have to take big risks. in that context, the risk of getting caught for breaking the law becomes palatable. when you're trying to create a stable, profitable, but more modest sized company, that risk becomes a threat to your business. it's a big problem when these types of risks start to make sense from a business perspective, because it's the public, not the people that create this environment, that end up suffering. ------ pascalxus I don't understand what all the outrage is about. The online training keeps you logged in for a period of inactivity that COUNTS towards your 52 hours, which is perfectly legitimate. All they did was create and use a tool which extends this period of inactivity. How in the world is it that this is outragous in any way? This is a very minor fault, certainly not worthy of all the sensationalism that NY times has created, once again. ------ jonesb6 "Zenefits scandal highlights the perils of breaking the law at startups" ------ auggierose >Mr. Conrad had overseen a company that had become _derelict_ in its culture and ethics Zoolander much?
{ "pile_set_name": "HackerNews" }
Harmony OS and Compatibility - ingve http://commonsware.com/blog/2019/08/10/harmony-compatibility.html ====== roca > Simply making an operating system open source is insufficient on its own to > guarantee success. If it were, Ubuntu Phone and Firefox OS would be > significant players. Unfortunately, neither “crossed the chasm”, in part due > to lack of manufacturer and carrier support. Actually FirefoxOS pretty much has "crossed the chasm". It's just that that happened after Mozilla abandoned it and KaiOS took it over. They've shipped 100M units. [https://techcrunch.com/2019/05/22/kaios-raises-50m-more- hits...](https://techcrunch.com/2019/05/22/kaios-raises-50m-more- hits-100m-handsets-powered-by-its-feature-phone-os/) Weird that a mobile- focused developer site would miss this. It's true that Huawei open-sourcing HarmonyOS is no guarantee of success, but that's a bit obvious. ~~~ rahimnathwani Earlier in the same article, they quote "Huawei will need to solve the biggest hole in the adoption of Harmony OS: the app ecosystem". I think that's part of what they're talking about when they say these others never crossed the chasm. And, yes, KaiOS has crossed the chasm, but I don't see: \- that being open source helped with carrier deals and hence adoption, or \- that they've solved the app ecosystem issue ~~~ fabrice_d Having official apps for WhatsApp, FB, GMaps, Youtube, Google Voice Assistant, Twitter helps a lot with the ecosystem part. ------ jhcl I am not a mobile developer nor am I a web developer but can't Huawei base their apps on web apps? That would mean they could port any web app from IOS or android to Harmony OS as long as there are no native bindings as react native has. Eventually they can incorporate webassembly when that really gets of the ground. ~~~ s_y_n_t_a_x Wouldn't be very battery (or other resource) friendly. ------ Tinfoilhat666 Android and iPhone app stores are already saturated. The app store for HarmonyOS isn't. This could be a good opportunity for new mobile app developers. ~~~ Kipters The same thing has been told referring to the Windows Phone 7 Marketplace though ~~~ addicted This OS, if it’s anh good, should at least have the Chinese market locked up though. Which is a few hundred million users. If it’s good, and Huawei follows up on making it truly open source, I suspect every Chinese manufacturer would at least have a line of Harmony OS phones, because they could always be the next trade war target. And once the Chinese manufacturers are supporting it, you can also add a huge chunk of the South and South East Asian markets as your customer base as well, since a lot of users in those areas basically just buy the latest Xiaomi or Huawei phones. ------ JohnStrangeII Of all the efforts at an alternative mobile OS so far, Harmony OS seems to have the best chances of success, because it is backed up by the Chinese state and its pervasive surveillance apparatus. With government help and full integration into the total surveillance of all Chinese citizens, they can get their share of the Chinese market and break the application barrier. ~~~ pjmlp As if Google and Apple don't have to obey the wishes of FBI, CIA, NSA,... regarding "making the world safer". ~~~ JohnStrangeII The US doesn't have a citizen score, political re-education camps, Tiananmen Square massacre, widespread censorship (like disconnecting a phone when you say a certain word), filtering of all foreign content and blocking of sites like Wikipedia or New York Times, BBC News, massive displacements and forced re-settlements, a vast number of political prisoners, massive squelching of protests and demonstrations (right now, there are videos of large troop movements towards Hong Kong), and so on. Not to speak of Tibet... Anyway, my point was not primarily meant political, it was more that Huawei has good chances of succeeding with this OS, because they are backed up and supported by the Chinese government. That's true even if you are 100% pro Chinese one-party government. ~~~ pjmlp You mean like Guantanamo? Or the ones managed by CIA outside American borders to do it more cleanly? ~~~ camgunz Guantanamo is bad, no question. But there's a chasm between holding 800 foreign nationals (and, from time to time, traitorous Americans) and rounding up millions of ethnic minorities for re-education based on their race, religion, or politics. If you looked up false equivalence in the dictionary, this would be Exhibit A. ~~~ pjmlp [https://en.m.wikipedia.org/wiki/Haska_Meyna_wedding_party_ai...](https://en.m.wikipedia.org/wiki/Haska_Meyna_wedding_party_airstrike) ~~~ camgunz Moving the goalposts isn't helpful; let's skip to the end. I'm no believer in American Exceptionalism. I've read A People's History, I'm pretty familiar with the crisis of mass incarceration and the general failure of our criminal justice system, I'm well-informed about widespread domestic surveillance and espionage programs, and I'm deeply cynical about US foreign policy as a whole. But even someone like me has to admit that the US is closer to a free state than China. Here's why I think that: \- Our court system is constantly in the throes of "freedom" vs. "tyranny" (lots of judges disagree with _Citizens United_ , for example. \- We have a free press that is _constantly_ critical of our president and government. \- I can be critical of our president and government with absolutely no repercussions from my government. \- We give billions in foreign aid. \- We still accept tons of asylum and immigration applications \- In fact many of our cities are "sanctuary cities" for immigrants \- We celebrate the history of Americans who have fought for fundamental freedoms and civil rights \- We are the most diverse nation on the planet, and many of us are intensely proud of it. \- We have free elections. - Don't @ me about election problems; they're still nothing like the fraudulent elections in Russia/China/etc. \- We have healthy opposition parties. \- We actually believe the US is a work in progress, not "perfect as it is" (see: "a more perfect union"). Sure there's a lot of work to do. And I'm sympathetic to the fact that China and Russia face different challenges than we do. But I absolutely refuse to accept the assertion that the US is anywhere near the same point on the authoritarian spectrum as they are. Such comparisons are facile, ignorant, and reinforce a nihilistic vision of Western, classically liberal values that is at the root of the rise of nationalism and authoritarianism -- which is itself responsible for the destruction of many millions of lives across the world. These things are not the same, any more than Democrats and Republicans are the same. One is clearly better than the other, and it is literally a matter of life and death that we figure that out. ------ jotm If only Huawei devices will use it, it's doomed. I've said it before and got downvoted, but here's the truth again: Android's app ecosystem is what makes it popular, followed by the huge number of manufacturers using it. Microsoft failure with Windows Phone was partly because even after incentivizing developers, they still could not get a critical mass of apps on their platform. Plus any new apps were not getting WP versions along with Android/iOS. Huawei is huge, but not outside China, for consumers. Couple that with everyone being wary of their spyware and whatnot. Samsung tried this at some point with Tizen, but quickly gave up, as well. ~~~ iforgotpassword > Microsoft failure with Windows Phone was partly because even after > incentivizing developers, they still could not get a critical mass of apps > on their platform. Plus any new apps were not getting WP versions along with > Android/iOS. My thoughts exactly. For the Chinese market everything might work out just fine, as the article says. But for the west, as soon as one or two killer apps won't get ported, it's game over. I think Google never did for Windows phone, which probably did play an important role (among the many other mistakes made. Microsoft didn't exactly make it easy to jump into app development, probably due to arrogance.) If harmony doesn't get YouTube, Facebook, Spotify or Snapchat, it doesn't matter how great the OS is under the hood. ~~~ addicted Other than YouTube, all the other apps have a vested interest in seeing a new competitor to Google controlled Android. If Harmony OS is a decent and open OS, I suspect they will all jump onto it. The only concern may be Google apps, but then, it’s possible that Google may also create Harmony OS supported apps so they can access the Chinese market. ~~~ iforgotpassword That's a good point, but it's also a hen and egg problem. If the platform isn't that widespread you might be hesitant to support it. (assuming it's not actually super easy to port over Android apps as suggested). While Windows phone definitely was a very different platform from both IOS and Android, it was still amazing how shoddy some major players' apps ran on it. Stability, performance and features were often lacking. The tools, documentation and lack of sample code was definitely to blame, but even then you still need to learn a new platform.
{ "pile_set_name": "HackerNews" }
Show HN: Minimal and clean ordinal date utility - pngmangi https://julian.today ====== pngmangi I need the 'julian date' frequently at work, and got tired of searching a table, or clicking through a site filled with lots of other 'stuff' looking for it, so I created this instead. My intent was to make it as single-focused, clean, and fast as possible. Clicking on the day number allows you to type in another to get the date for that ordinal date. Feedback/criticism welcome!
{ "pile_set_name": "HackerNews" }
LispyScript - amelius http://lispyscript.com/ ====== lighthawk Neat! Now look at: [https://github.com/clojure/clojurescript](https://github.com/clojure/clojurescript) And try it: [http://himera.herokuapp.com/index.html](http://himera.herokuapp.com/index.html) ~~~ zupatol Clojurescript has to be compiled by the google closure compiler on the server side. The closure compiler doesn't work out of the box with other libraries, you need some kind of bridge. Lispyscript has the very nice advantage of being able to run directly in the browser. Since it's translated directly to javascript, I expect it won't have problems using other javascript libraries. ~~~ swannodette Some inaccuracies here. ClojureScript does not have to be compiled by Google Closure. That pass is an optional one for production builds. There is no "bridging" when using the Closure Compiler with non-Closure compatible code. The issue is that in production mode the Closure Compiler will make aggressive assumptions about what it can rename. So it's not about bridging it's about preventing renaming - again this is only relevant for advanced production builds. That said for non-Web applications or applications where advanced compilation isn't that useful providing a bootstrapped ClojureScript is desirable. We've been working on that slowly for a long time now. In the coming months you'll see changes such that the ClojureScript compiler can itself be compiled into JavaScript. ~~~ didyoucheckthe > "again this is only relevant for advanced production builds" So, all real-life builds that anyone would care about. ~~~ moonchrome Think about where you would use CLJS - my use cases would not have an issue with extra 100kb of code - you don't use CLJS to do jQuery animations on your web page - you would use it to build complex single page apps or write server side code/scripts. You don't use clojure for performance anyway, it's going to be slower by default (because of immutability/persistent data structures, and yeah I know about react benefits with immutability that's not my point - you're still going trough a lot more memory and stressing GC) - you use it to help you deal with your code because of it's semantics. But in reality last time I tried CLJS I didn't really feel like it delivers on the productivity part and it's mostly because of implementation issues. IMO the decision to implement CLJS on top of Closure compiler and in Clojure (instead of going for a self hosting compiler) was a mistake - you can't overstate the value of REPL and fast iteration in a language like Clojure - and my last attempt to use CLJS the compiler/REPL environment far from what I would consider fast iteration : compiler took forever to start because of JVM and while it could run as a service it needed to be restarted frequently enough that it mattered, REPL was very unstable it would just die randomly - sometimes you'd need to refresh the page, sometimes you'd need to restart the server process. Oh and don't even get me started on the voodoo needed to get the damn thing running - install piggieback, then install austin and then add this weasel thingy then configure the server process all so you can get a halfworking repl and pray it doesn't break because good luck figuring out what's actually going on. Compare this to JS where I just go in to the devtools panel and test my code. ~~~ minikomi Things are progressing and I encourage you to have another look. $ lein new figwheel myproject $ cd myproject $ rlwrap lein figwheel Browse to http://localhost:3449 If you return to the terminal, you should have a connected REPL now running. Along with live code reloading on save of your cljs files. ~~~ moonchrome Maybe, but things progressed way further outside of CLJS space. If you told me this 2 years ago when I was in to it I would be jumping right on it - back when people were saying coffescript fixed JS problems :D Right now JS has persistent datastructure libraries and TypeScript is a huge productivity boost - tooling is top notch - it makes JS manageable, once it gets async/await (which it should in the next couple of months) I'll be pretty happy with JS development story. I'll miss some niceties like collection operations, homoiconicity and macros but on the other hand I have working optional type checking, excellent tooling and I don't have to code in AST serialization format with macros :D ~~~ minikomi Interesting. Do you have a link to a very basic "get-started" in this space? Right now, figwheel / om or figwheel / reframe are very quick to get started with (although familiarity definitely plays a part..). Last time I looked at js there were 5 or 6 or so flux implementations competing for mindshare and I had to stumble my way through setting up a project with webpack / babel.. ------ evmar Coincidentally, I've been fiddling with a rather similar project, just as a hobbyist thing. It looks like this one is much farther along, kudos! Unfortunately from the contributions graph perhaps interest in it is dying off -- the last 10% (aka the last 90%) is always the hardest part to slog through... I've been meaning to write up the various approaches to sexpressions+macros in JS. Mine differs from the others (and perhaps is closer to LispyScript) mostly in that it's close to JS in its names and semantics (e.g. "function" defines a function and you're still required to use a "return" statement), but then it lets you write macros to e.g. define "fn" where the return is implicit. Anyway, here's some sample code from mine (which is itself defining macros used elsewhere in the compiler): [https://github.com/martine/pjs/blob/master/lib/macro.pjs](https://github.com/martine/pjs/blob/master/lib/macro.pjs) ------ lispm Doesn't look like Lisp, more like Clojure. Basically none of the functions, macros or syntax is from Lisp. The documentation says: [http://lispyscript.com/docs/](http://lispyscript.com/docs/) > LispyScript is not a dialect of Lisp. There is no list processing in > LispyScript . LispyScript is Javascript using a Lispy syntax (a tree > syntax). That's about right. It actually uses some kind of s-expressions, but not Lisp syntax. ~~~ gjm11 > Basically none of the functions, macros or syntax is from Lisp. Sounds like it's extremely well named, then. LispyScript is to Lisp as Javascript is to Java: an entirely different language with different syntax, semantics, standard library and performance characteristics, but with just enough superficial similarity to provide plausible deniability for the name. ~~~ lispm Well said! ;-) ------ aidenn0 See also: [https://github.com/vsedach/Parenscript](https://github.com/vsedach/Parenscript) TLDR: s-expression syntax for javascript, macros are written in common lisp. ~~~ TeMPOraL Macros can actually be written in Parenscript as well, AFAIR. But the language blends itself very naturally with CL code. ~~~ aidenn0 parenscript macros are in straight common-lisp. They expand to parenscript, of course. ------ 1971genocide Also check out LiveScript. [http://livescript.net/](http://livescript.net/) and its awesome FP library inspired by haskell's prelude.hs [http://www.preludels.com/](http://www.preludels.com/) I have done all forms of projects using LiveScript - robotics, simple websites, blog, cryptography, computer vision. Its actually becoming silently fairly mature. It helps when it doesn't generate any hype like most languages. The community around is also very helpful ! And LiveScript is awesome with React.js or any other virtual DOM based MVC framework. ~~~ amyjess Why did they name it that? LiveScript was Netscape's original name for JavaScript, before Sun asked them to throw in some Java branding. ~~~ rane > Name > > LiveScript was one of the original names for JavaScript, so > it seemed fitting. It's an inside joke for those who know > JavaScript well. ------ jestar_jokin Doesn't it say something about JavaScript, dissatisfaction with it, and the overwhelmingly splintered ecosystem, when _every_ comment is suggesting alternatives to the solution in the article? I guess we chalk this one up to "neat if you're a hobbyist or solo dev with no maintenance handover, but generally commercially unviable." ------ grayrest > An inherent problem with Javascript is that it has no macro support, unlike > other Lisp like languages. [http://sweetjs.org/](http://sweetjs.org/) There are macro systems for Javascript, just not native ones. ~~~ JoelMcCracken Not that you're wrong -- you're correct -- but I want to bring up that this was likely true at the time this was written. LispyScript has been around for a while. ~~~ drunkcatsdgaf First commit for lispy - march 5, 2012 First commit for sweet.js - August 1, 2012 im actually pretty shocked they are that close together. ~~~ JoelMcCracken I bet they both started around the time CoffeeScript started to get big -- it showed there was a market for compile-to-js-but-almost-js langs. ------ breuleux I wouldn't say Lisp-like syntax is necessary for a macro system. It helps a bit... but all things considered, I believe pattern matching is a bigger boon to macro writing than syntax per se. For those it may interest, I have made a language with mostly conventional syntax which supports macros: [http://breuleux.github.io/earl- grey/](http://breuleux.github.io/earl-grey/) The macro system is modular, so you can easily write and publish macro libraries. I have written some for testing, gulp, and react. It's not _super_ mature but it's getting there. ------ frakturfreund Also Spock (Chicken Scheme wiki): [http://wiki.call- cc.org/eggref/4/spock](http://wiki.call-cc.org/eggref/4/spock) ------ elwell Wisp should also be added to this list: [https://github.com/Gozala/wisp](https://github.com/Gozala/wisp) ------ woadwarrior01 Nice. This is reminiscent of HyLang[1], which is like this for Python. [1]: [http://hylang.org/](http://hylang.org/) ------ rndn There is no shortage of JavaScript-Lisps, that’s for sure! ------ ktg LispScript | [https://bitbucket.org/ktg/lispscript](https://bitbucket.org/ktg/lispscript) Try LispScript | [http://ktg.bitbucket.org/lispscript/lispscript.html](http://ktg.bitbucket.org/lispscript/lispscript.html) ------ sebastianconcpt Nice! reminded me of [http://ympbyc.github.io/LittleSmallscript/](http://ympbyc.github.io/LittleSmallscript/) ------ Turing_Machine BiwaScheme is also pretty decent. [http://www.biwascheme.org/](http://www.biwascheme.org/) ------ Touche also [http://sibilantjs.info/](http://sibilantjs.info/)
{ "pile_set_name": "HackerNews" }
Sniff browser history for improved user experience - skorks http://www.niallkennedy.com/blog/2008/02/browser-history-sniff.html ====== tptacek Respectfully, this is a batshit crazy idea. History sniffing is a gaping security flaw. The thing we need to do with it is eliminate it. What we don't need to do is arm unscrupulous developers with arguments for why the behavior should be protected. ------ whyenot _In this post I will teach you how to mine the rich treasure trove of personalization data sitting inside your visitor's browser history for deep personalization experiences._ There is no discussion of the privacy issues, which seems like a huge omission. I wouldn't use this on a website unless you like playing with fire. ~~~ angelbob He mentions it (very) briefly with the Audi example. But yeah, this is a bit terrifying. I hadn't thought about this trick before now, and I don't see how you could easily turn it off... ~~~ Fixnum See <http://news.ycombinator.com/item?id=800693> and associated link. Summary: To mitigate, either (a) tell your browser not to save any history, or (b) in Firefox, go to about:config and turn off layout.css.visited_links_enabled. (Chrome doesn't seem to have about:config ...) This should probably be the default ... ~~~ akamaka Agreed about making that the default. Another workable approach are keeping a full history graph, and only showing visited links on the site where you originally clicked on them. Or, the browser could highlight visited links in a way that can't be detected with JavaScript code. This isn't hard to fix, so obviously we just haven't been complaining loud enough. ------ DrewHintz People have been using this technique in this way since at least 2006: <http://int2e.com/blog/improved-digg-integration-script/> [http://jeremiahgrossman.blogspot.com/2006/08/i-know-where- yo...](http://jeremiahgrossman.blogspot.com/2006/08/i-know-where-youve- been.html) Since changing browsers to prevent this will not happen tomorrow, this can be partially worked around both server and client-side. Server-side: If you have any sensitive URIs you don't want leaked or brute- forced, add an extra parameter containing a random value. URIs you might want to protect are those with XSRF tokens or session IDs. URIs can be brute-forced locally on the victim at a speed of approximately 40,000 URIs per second. Client-side: Use incognito mode for sensitive surfing. Plugins such as noscript can partially defend against this, however it's possible to do history detection using pure CSS which I believe will work even if you're using noscript. Update: Fixnum posted another client-side solution "in Firefox, go to about:config and turn off layout.css.visited_links_enabled" ------ gridspy It was just a matter of time before the CSS history trick was put to use. I can see the benefits, though I don't like the privacy implications. History trick here (JS, no cookies, can poll user's web history): [http://jeremiahgrossman.blogspot.com/2006/08/i-know-where- yo...](http://jeremiahgrossman.blogspot.com/2006/08/i-know-where-youve- been.html) ------ dotBen Niall wrote about this in 2008 (see post/url of post), and there have been several interesting write ups about this across the various outlets. I'm pretty sure it's beeing used in loads of places by now - there's probably (/should be) a jQuery plugin for it, even. I'm wondering why this is making it to HN now, 2 years later? ~~~ orangecat _there's probably (/should be) a jQuery plugin for it, even_ No, there shouldn't. Taking advantage of this design flaw is no better than trying to send a Javascript exploit to read my history file directly. I'm surprised that supposedly legitimate sites think using it is an acceptable practice, but I guess I shouldn't be. ------ sambeau Please, don't do that.
{ "pile_set_name": "HackerNews" }
Show HN: ChargeBack.cc - Get your money back - myotherthings https://www.chargeback.cc/ ====== aristidb That seems a bit sketchy to me - black-mailing merchants into signing up for your "service" of not sending them chargebacks?! Maybe you should explain why it's not. ~~~ mario1900 Merchants don't need to sign up to resolve chargebacks. If we receive one, we'll send them links to resolve it before it gets sent to the banks. They can choose not too respond and it becomes a normal chargeback. Even if they do respond - all they have to do is acknowledge they're making a refund or change the customer's mind. The basic resolution service is free for merchants. They only have to pay or even sign up if they want to use any of the premium features to help them reduce future chargebacks. Hopefully this isn't too dodgy :) I definitely think we need to be more upfront about what we get out of it. A lot of people seem skeptical when they first see the site. ~~~ blantonl The existing chargeback process is already enourmously skewed against a merchant from an online transaction perspective. _all they have to do is acknowledge they're making a refund or change the customer's mind_ Well, that means the merchant continues to be at a significant disadvantage during an even more complex chargeback process. ~~~ mario1900 Absolutely. We've found that under the existing chargeback system only 21% of claims are decided in the merchant's favour. We started ChargeBack.cc with the aim to level the playing field a little more. Under the existing chargeback system in most cases the merchant receives very little information about what has gone wrong and who the customer is. Our aim is to use data to help merchants resolve chargebacks with less cost to themselves. By keeping the chargeback outside of the banking system we take away a lot of risk and cost from fee, fines etc... so that's one step. The next step is to give merchants the tools to provide the best response to the customer. Yes, it's still not going to be equal, but hopefully it'll help merchants spend less time, less money and generally get a better result than they used to. ------ robryan It is better if charge backs are seen as somewhat of an inconvenience to do, so customers will think more about if they really want to chargeback. Lots of things can and do go wrong in ecommerce, if anyone slightly annoyed reached for a chargeback rather than trying to resolve an issue with the merchant it would be a big hit for merchants. ~~~ blantonl it is actually worse than that. There is certain type of online customer that will literally click through "Interested->Purchase->Yes->Confirm>Pay>Done" without every really looking at what they purchased or why they did so in the first place. After they realize what they actually purchased which is a legitimate product but not appropriate for the customer, they just uses the chargeback process to get their money back. ~~~ notatoad it is actually worse than that. There is a certain type of customer that will click through the whole process like you describe, and be perfectly satisfied with their purchase but not remember the name of the merchant. Then when it comes time to pay the credit card bill, it's an 'unrecognized charge' and they do a chargeback. They don't look through their email receipts and try to figure out what they've bought, they just initiate a chargeback blindly. fortunately it's fairly easy to fight these as a merchant, but it still takes valuable time. ~~~ saurik Slightly _less_ worse than that (sorry to break pattern), but another irritating example: it wasn't them that made the purchase, it was their son, husband, niece, whatever; I often get people sending me threatening e-mails about how I stole money from them, when in fact they share their credit card, PayPal account, etc. with other people and didn't have the courtesy to ask "anyone else know what this is?" before going all ballistic and demanding their money back. ------ notatoad chargeback only works because most users don't know it exists. If you start telling people all they have to do to get their money back from a merchant is to click a button, it won't be long before credit card companies are forced to get rid of it. please don't abuse this. ~~~ myotherthings The goal with ChargeBack.cc is to divert unhappy customers away from the traditional chargeback system and into direct contact with their merchant. It is backed by sending unresolved disputes through the banks, but if we get to that stage I consider the chargeback failed on our behalf. ~~~ notatoad The banks will put you in direct contact with the merchant. From a merchant's perspective, your service is just another unnecessary middleman to deal with. The damage you're doing is advertising the chargeback feature. You are encouraging users to initiate chargebacks (whether through your service or not), which is not a good thing. ------ lionhearted Feedback / thoughts about potential pitfalls: You're probably going to get a cease and desist letter at some point if you haven't already talked with the various financial institutions and have contacts there... you're almost certainly violating their terms of service (and maybe people filing through you are too). You might want to be proactive about reaching out and making some contacts with the financial institutions. Or maybe not, maybe it's OK. Just uninformed intuition there. Also, you probably want to add some pretty serious language in bold saying "You must be telling the truth, not telling the truth here can cause serious harm, etc." You probably also want to do some basic confirmation of a person's identity so you don't get whacky results. Ask for a phone number maybe, and occasionally spot check calls? I could see this being used for pranking, harassment, or inappropriate use (disgruntled employee, uninformed spouse/boyfriend/girlfriend, etc). ~~~ mario1900 Thanks for the feedback. I've spoken to a few financial instituions. The general consensus seems to be that we're not doing anything they didn't wish customers did already - which is contact the merchant for a refund before creating a chargeback. We've been told that in only around 18% of chargebacks have the customers even told the merchant they have a problem before filing the chargeback. I do expect someone along the line will have a problem with it, in which case we don't offer services for customers with that institution (after attempting to change their mind!). We do have a layer of manual checks on each chargeback before they are processed. I like the idea of spot phone calls though - might add that in! ------ ericcholis Ugh...charge backs. I work in an industry that has high charge back rates and amounts, most of the time because people are disgruntled. Most people don't realize how easy a charge back is. ~~~ jarin I do too, and I wish people would realize that we practically trip over ourselves to issue refunds whenever they are requested, because we want to avoid chargebacks at all costs. ------ Sire This business will fail even though the idea to improve the chargeback process is a good one (for both merchants and customers). Most customers don't know what a chargeback is. Those who do will never find your site. Only if you sell your service to the credit card companies will this work. ~~~ saurik That seems to be how BillGuard (a site that seems to have a similar purpose) is attempting to play this: to provide a service to users, but really attempt to get the ear of banks as a value-add to their online offerings. ------ mikeash I've never had trouble with chargebacks, personally. I try the merchant, and if they don't play ball, I contact my card issuer. It's been pretty painless, so I don't see the point of this service. Is my experience just abnormal? ~~~ BryanB55 I think it depends on your credit card company. American Express is well-known for very good customer service and easy no hassle chargebacks. My Bank of America card was a bit more of a hassle though trying to find the correct form to fill out online then they had to mail me papers and I had to sign them and send them back and talk to 3 different people. ------ jasonlotito So, who are your customers? Businesses with chargeback problems or customers filing chargebacks? The followup is how are you intending to step between customers filing chargebacks and their banks which are a phone call away? ------ saurik How is this different from BillGuard.com? (edit:) Well, I mean, for the features this site offers; BillGuard also seems to scan your bills proactively trying to help you deal with charges, but at the end of the process seems to be fairly similar: I (the merchant) receive an e-mail from them rather than a chargeback, combined with information that might be useful to look into the matter and fix the problem. (I only started dealing with BillGuard yesterday, so I don't know much about them yet, and certainly not much about this new site.) ~~~ mario1900 The concepts are similar, but the implementations are quite different. In order to use BillGuard you must sign up for constant monitoring of your credit card. ChargeBack.cc is more of an a la carte service - you only use it when you want to perform or resolve a chargeback. ~~~ stpsg "In order to use BillGuard you must sign up for constant monitoring of your credit card" - simply not true. Anyone can file a dispute, without signing up. ------ tyrelb How would consumers find out about you? If I buy something online, I would call merchant first, then bank. How would I find out to use you first vs. going to merchant and/or bank? Thanks! ~~~ Evbn Advertising like this thread. ~~~ tyrelb Would be hard though... PR/blog hits only lasts so long. ------ Petefine In my experience as a merchant, disputes can be very time sensitive (i.e. travel cancellations). On one hand, finding out about a misunderstanding from you (rather than a chargeback fax two months later) may allow a much easier dispute resolution and be so be valuable to a merchant. But on the other hand, customers who cancel/complain by charging back instead of calling the merchant may therefore lose a chargeback because they miss an agreed deadline. Adding your service as a middleman could lead to further missed deadlines. This is especially true since any good merchant privacy policy/PCI DSS would of course prevent them from discussing anything with you without direct approval from the customer first - and if they did that, they may as well discuss the issue direct anyway. Lastly, the toughest chargebacks can take months to resolve. Help with that (as a merchant) would be very useful(and so I can imagine you providing a compelling service), but are you really committing to take on a potentially complex issue for the customer? And wouldn't it be a conflict to represent both parties? Still, a tool that eases the admin of chargebacks could be great for both sides... ------ iusdfhsdfiuh Your terms and conditions at the end of lodging says <http://james/something> I like the service (just used mailinator to test it) but in the end I'm left with the feeling there is some hidden cost to me. I'd like if it was clear that it was a free service for me. I notice you are Australian? Or have you localised your site really well? >You must not modify, adapt or hack the Service or modify another website so as to falsely imply that it is associated with the Service, ChargeBack.cc, or any other ChargeBack.cc service. You must not do illegal stuff? >ChargeBack.cc reserves the right to update and change the Terms of Service from time to time without notice Please change your policy on this, tos-dr.info will likely rate that section badly. Have yet to get a notice as a "merchant" but I love the experience as a consumer. ~~~ myotherthings Ah thanks for that TOS fix. The feedback about the "hidden cost" is great. I've heard that a lot. I definitely need to communicate somehow that we attempt to up-sell merchants with premium services and use the chargeback essentially as a lead to talk to them. Yup, Australian :) Although the site does localise to the US and UK as well. There will be a short delay before the merchant notification emails come out. We put them through a degree of manual approval and due to load from HN traffic it may take some time for them to be fully processed. ------ eCa I think a page called "Who we are" [1] should answer that question, and not describe "what we do" (again). Especially with something involving such sensitive information. [1] <https://www.chargeback.cc/who-we-are> ------ twodayslate I'd rather just file a chargeback with my credit card company. It is just as easy imo. ------ breck I think there is a big need for this type of service. The majority of my transactions are fine, but there are times when I have a problem and getting it resolved is a huge hassle. Like last month when the NYTimes charged me $15 but a bug in their database prevented me from actually using my account. Took 2 painful hours to get a refund. In those cases I assume the merchant has better things to do as well, and it seems like a service like this could offload some work from their support staff and, by adding things like exit surveys, turn those small number of bad experiences into positive, constructive experiences for all parties. ------ malbs Well I had a disputed charge I was planning on seeking to have overturned, so I've just tested the chargeback.cc system with this dispute as a trial ~~~ myotherthings Please do. If you have any feedback, please post it here or email it to [email protected] ------ iusdfhsdfiuh [http://www.sedo.com/search/details.php4?language=us&doma...](http://www.sedo.com/search/details.php4?language=us&domain=chargeback.cc) <\-- might want to fix that ------ kkt262 One thing that popped right out to me was how similar the top banner looks to the Paypal top banner. ------ hnwh free services.. hmm.. whats in it for you? ~~~ mario1900 Premium services for merchants. Essentially the basic chargeback resolution is free, but we charge merchants to access additional tools like exit surveys, the ability to configure questions on chargebacks for their business. Also we're working on a set of tools to help merchants reduce chargebacks in general - like domains to put on credit card receipts, that type of thing. The value is that each chargeback is a lead to a business with a chargeback problem :) ------ wilfra This is the online equivalent of "protection" money the mafia asks for when they say they're going to burn down your store if you don't pay them. I applaud making it easier for people to file chargebacks but shame on your business model. Edit: after reading the explanation given below perhaps the business model is not as bad as it first seems - if that's the case, you need to make it more clear! It looks like you are encouraging people to file chargebacks and then shaking down the merchants for money with the threat of the chargeback getting filed if they don't pay you. ~~~ mario1900 Maybe using the word "protection" on the business page was a bad idea. Merchants don't need to pay us to resolve chargebacks. We just try to make their services better in the future through premium data services. Please see this comment <http://news.ycombinator.com/item?id=4799225> ~~~ wilfra you're also not being honest with your users. you're not actually filing chargebacks on their behalf, at least not at first. you're asking for their permission to harass/spam/threaten the merchants they have a problem with - then filing a chargeback if you don't get what you want.
{ "pile_set_name": "HackerNews" }
Comcast Is Threatening to Cut Off Customers Who Use Tor - bndr http://finance.yahoo.com/news/comcast-threatening-cut-off-customers-092817979.html ====== ufmace I know it's popular in tech circles these days to hate on Comcast, and I'm not saying they don't deserve the hate or that they wouldn't do something like this, but I'm not buying this one just yet. This is all supposedly statements by 2 telephone support people. The actual source article seems to be confusing running a connection to Tor and the Tor browser with running a Tor relay node or exit node. Prohibiting the Tor browser would be a bad move on the part of any ISP who isn't part of a police state, but none of their document suggest that they're doing that. I can understand them prohibiting running a Tor node on your residential internet connection though. Almost all residential ISPs officially prohibit running servers, though it usually isn't enforced as long as you aren't pushing too much traffic. A Tor node can easily fall on those lines. I think even the Tor project doesn't recommend running nodes on your home connection rather than actual servers with server-class connections. ~~~ sailfast Thank you for this. This may be a stupid question, but how would your ISP know you were actively running a Tor (non-node) connection? Obviously I need to read up on all the back-end tech but I would assume that if it was easy to identify someone using Tor, it would no longer provide the anonymity / security because it would clearly identify outliers. It makes sense to ban someone running a node off their Comcast connection (not because it's logical but because of their high traffic / server banning track record) but for Comcast to detect a browsing session? Seems odd. ~~~ nitrogen Using DPI or even just flow analysis (sizes, port numbers, destination addresses, protocol (TCP/UDP) bits, and timings of packets), it should be possible to distinguish between encrypted TOR and other encrypted protocols with ease. ------ w1ntermute Sounds like a great way to cancel your Comcast service when they just won't let you go: [http://www.theguardian.com/technology/shortcuts/2014/jul/17/...](http://www.theguardian.com/technology/shortcuts/2014/jul/17/comcast- customer-services-call-ryan-block) ------ jrochkind1 Where I live, comcast is pretty much the ONLY broadband provider. There are lots of places like this. These are the risks of a monopoly on broadband internet access. (Did you go send your comments to the FCC saying to treat ISP's like common carriers yet? 1) Go to [http://fcc.gov/comments](http://fcc.gov/comments) 2) Click on Proceeding 14-28 3) Say "I want internet service providers classified as common carriers." ) ------ orr94 > Comcast Is Threatening To Cut Off Customers Who Use Tor, The Web Browser For > Criminals Uh, it's not "The Web Browser For Criminals". It's for people who want anonymity. And being slightly pedantic, Tor is also not a web browser. Tor Browser is. ~~~ ObviousScience I find it hilarious that they pitch Tor as for criminals, despite the US military being the largest backer (and source) of the Tor project. ~~~ fluidcruft [insert typical libertarian talking points about government being criminals] ------ cik This is how it begins. First they come for TOR, then they come for VPNs. Eventually, they come for your SSL certs. ~~~ smnrchrds Done, done and done. Well, not necessarily in that order. Living in Iran sometimes feels like living in the future. Unfortunately it's a slightly dystopian future. ~~~ cik It's also like the past. It blows my mind that the dystopian future we read about is always the UK - and that so much dystopian fiction comes out of Britain as well. ------ Zikes AT&T U-Verse admitted to actively disrupting my connection whenever I used torrents. ~~~ mayneack Was it based on connecting with the wrong tracker or identifying torrent traffic? ~~~ Zikes As far as I could tell it was by identifying the type of traffic. I was primarily torrenting various linux distros, and I tried a wide variety of them on various clients and systems. It was fairly consistent behavior, even if I torrented a 'buntu distro on my phone and throttled it to a few KBps my TV's Netflix would stutter, degrade, and ultimately drop out entirely within a few minutes. If I stopped the torrent the connection would resume normally a few minutes later. One thing that really bothered me, though, was that every time I experienced this problem I could go to speedtest.net and run their tool and get consistently good results every time. Even when the rest of the internet was bollocks. It makes me wonder if they intentionally toss speed test traffic into one of their "fast lanes" to trick people into thinking they're getting faster speeds than what they're actually getting. ~~~ cmdrfred I've always thought this myself, what prevents them from doing so? ~~~ Zikes Apparently, nothing. After I had narrowed the issue down to torrents, I called AT&T and confronted them with the evidence. On the phone with me they directly said "we do that to prevent illegal activity over our service lines." No amount of "torrenting is not illegal" worked, and I didn't really expect it to. They don't care about the legality, they only use it as an excuse to keep customers from getting the full usage of the service they pay for. ------ dj-wonk The source article is more detailed and worth reading: [http://www.deepdotweb.com/2014/09/13/comcast-declares-war- to...](http://www.deepdotweb.com/2014/09/13/comcast-declares-war-tor/) ------ kstenerud The title of this posting is wholly inaccurate. Comcast is DENYING that any threat to cut off Tor users occurred. They deny most points in the article on DeepDotWebm including all alleged evidence, and have flatly stated that customers can use Tor all they want. ------ at-fates-hands I got lucky. I went with Century Link when I found out the D-Mark is about 50 yards from my house and haven't looked back. Dropped my bill by about $40/month and the customer service is a bit more. . .reliable than Comcast. ------ stevekl I use TOR and I would really like to get a call from comcast so that I can inform Comcast I am using a Navy funded project. ------ illumen Comcast denies this. ~~~ mark-r I don't know much about how TOR works, but could you use it over a VPN so that it's outside of Comcast's network before connecting to TOR? Surely they'd never ban VPN. ~~~ herge > Surely they'd never ban VPN. Wait until all file-sharing is done through VPNs. Or maybe they'll require people to pay for a "business" plan to use such a "business" feature. ------ Nanzikambe Could someone take these guys to court and force them to rebrand themselves as a SISP (Some Internet Services Provider) ? ------ doubt_me 1\. Be comcast 2\. How do I get the NSA off my back as much as possible? 3\. Oh lets threaten to cut off customers service because of Tor! that will totally work (comcast logic) 4\. ....NSA still on our backs guys what do I do? 5\. Ban Tor 6\. Make NSA happy = TWC merger will happen 7\. NSA still not happy 8\. Spend millions on trying to kill net neutrality because the survival of comcast/ twc/ NBC universal depends on it
{ "pile_set_name": "HackerNews" }
Why does Facebook change my link to translate.google.com? - szeldon Hi.<p>Maybe it's just me, but whenever I try to put any link to translate.google.com (for instance http://translate.google.com/#en|cs|asaasa) I see this link on my board: http://translate.google.com/#en|cs|Suck%20my%20balls<p>Maybe I'm doing something wrong, but this looks weird, to say the least.<p>Best regards, szeldon ====== jasonhe This happened to me and a friend earlier today, but it seems the problem has been fixed. ------ szeldon Now it works just fine... Argh, probably just a stupid bug. ------ drivebyacct2 Not sure what you're talking about to be honest. <http://imgur.com/B7HAZ.png>
{ "pile_set_name": "HackerNews" }
Baggage Handling System – Schiphol Airport [video] - curtis https://www.youtube.com/watch?v=rv-Y0-ruzi8&feature=youtu.be ====== masida This reminds me of one of my first programming jobs as external consultant for the Baggage Handling System at Schiphol in 2000/2001, I was 17 years old. My employer at that time was using MS Excel to parse the log files of all sensors of the predecessor/older part of the system that is shown in this video. I told her that I could probably do it 10,000 times faster by creating a simple program in Visual Basic. Visual Basic was way too slow on our "high-end" Pentium laptop to parse that many 1MB log files, so I rewrote it in C++ (learned it on the job)[1]. The managers got insight in the performance of the various components of the system which they never dreamed of having (they were hardly aware that the system was creating this detailed log messages). By the way, the system is developed (at least partly) by Vanderlande [2]. [1] Took me a couple of days, probably even weeks back then. I would write the code in 1 or 2 hours now. [2] [https://www.vanderlande.com/](https://www.vanderlande.com/) ------ david-given Is there a version without the edits? Because I found this practically unwatchable; it kept cutting away just as things started to get interesting. ~~~ mike_hearn This video of the T5 system at Heathrow is better and shows equipment just as cool (though no robot at the end) [https://www.youtube.com/watch?v=Wn8qogHH9bM](https://www.youtube.com/watch?v=Wn8qogHH9bM) Oh and if you want a REALLY crazy version of the Schipol video, this one is actually a 360 degree live draggable version of it - no kidding! [http://www.schiphol.nl/Reizigers/OpSchiphol/Bagage/BagageVid...](http://www.schiphol.nl/Reizigers/OpSchiphol/Bagage/BagageVideo.htm) ~~~ david-given The first one isn't an FPV... and the second one is _also_ full of edits! ------ codejoust Was looking for some backgrojnd and found an overview presentation [pdf]: [http://netlipse.eu/media/77918/11nwm-bratislava-lex- pepping-...](http://netlipse.eu/media/77918/11nwm-bratislava-lex-pepping- baggage-handling-at-amsterdam-airport-schiphol-implementing-new- technologies.pdf) ------ elcapitan Wow. It's actually a miracle that this works most of the time. That suitcase is pretty standard, I could imagine a million ways how some backpack or other unusually formed piece of baggage would jam that thing. And how on earth do they route individual packages through the system with that speed? Is there some pattern recognition system that identifies them on the fly and then routes left, right, left right, etc? This reminds me of a funny part of a book I read about automation (and its impact on human labour), which described how modern corn mills identify bad grain: they shoot every single grain through a high speed tunnel and identify malformed (bad, moldy) grain with pattern recognition and then filter them out. ~~~ mike_hearn They have sets of barcode scanners dotted around routing points. With enough of them and the big barcodes on the baggage tags, they can scan most automatically. Any that fail scanning are diverted to a side belt where a human scans them with a handheld unit. ------ darkvertex That was incredible. Remove the "flip aside" parts and it's much better than your average rollercoaster! :D ------ bronz This is unbelievable. How can they possibly justify the cost of this system? ~~~ mike_hearn Same as for any automated system: reliability and throughput. Some of these airports are enormous, Schipol especially so. They're handling 150,000 bags per day at peak times. If you generously assume a 1% error rate ([http://panko.shidler.hawaii.edu/HumanErr/Basic.htm](http://panko.shidler.hawaii.edu/HumanErr/Basic.htm)) and that each bag is touched by only one human, then you'd be misrouting or losing 1500 bags per day, which is huge. But of course bags aren't going to be handled by just one human, there would be many making complex routing decisions, over and over again. So the true loss rate would be much worse. Bear in mind that if the airline doesn't get the bag to the right place then the bag has to be sent onwards later, and then the airline has to pay for home delivery of the baggage. So the cost of mistakes adds up fast. Then you have the sheer amount of manpower needed to move all the bags around by hand. And not just any manpower, it often has to be _literally_ manpower because you need strong men to do this as the bags are so heavy, and they can't work long shifts because they get tired. It's pretty easy to see how such things can be justified. You wouldn't be able to scale air travel to the current levels it sees without such systems. ------ rosege not sure if this is a new system but I flew through Schiphol a lot around 2010-2012 and the baggage was very slow. Typically half an hour wait. Whenever possible I flew with carry on as I found it frustrating to have an hour flight then half an hour wait.
{ "pile_set_name": "HackerNews" }
Introducing Bloom: The Future of Credit - el_duderino https://blog.hellobloom.io/introducing-bloom-the-future-of-credit-3b0d6ee04f24 ====== sschueller A little thin on details how this exactly works. Does anyone have a TLDR as I can't open the white paper in my phone for some reason?
{ "pile_set_name": "HackerNews" }
Eric Schmidt's book is wrong about how Google works - mandeepj http://venturebeat.com/2014/11/30/why-eric-schmidt-doesnt-know-how-google-works/ ====== gilgoomesh If we take this article at face-value (that Google is as big as it is because of its monopoly in search) a related question is immediately raised: why is Google's search engine a monopoly? If the monopoly is due to superior technology, why are Google able to write a better search engine and maintain this search engine lead? If the monopoly is due to other effects (buying favored search-engine status in Safari, Firefox and pushing Chrome/Android) why don't the browsers have all the power? I guess I agree with the article that Google's power is search-engine derived but there's more to the source of that monopoly than I think the article discusses. ~~~ mixmax Google's monopoly is based on their early superior technology. That's it, pure and simple. I'm old enough to remember the web before google, and it was terrible. Back then we switched between hotbot, altavista, yahoo and a few others - and they all sucked. Some of them ranked searches _alphabetically_ \- try searching through 100.000 results that are ordered alphabetically. I remember the first time I ever used google. From the very first day I never used anything else, and recommended it to all my friends. If you haven't experienced the web before google I think it's hard to imagine what it was like. Pagerank made the difference. ~~~ twelvechairs Unfortunately since this time results have gotten worse ( anecdotal I know, but I know many who agree). I think this is down to a mixture of issues - the SEO industry has made search optimisation much harder, googles probably been a bit complacent with no competition too. Also introducing big changes like search personalisation and localisation which (IMO) has taken away more than it adds. ~~~ jodrellblank _Unfortunately since this time results have gotten worse ( anecdotal I know, but I know many who agree)_ Showing results for _I know many who disagree_. To search for what you typed in and wanted to search for, jump through {this hoop}. ~~~ username223 It's worse than trying to write a paper on the Teh tribe in the Amazon in Microsoft Word with autocorrect. The relationship between query terms and results is complex and opaque. ------ fivedogit > the authors are confusing causation and correlation... they are all > consequences of Google’s success. For example the authors write: “Their plan > for creating that great search engine... Hire as many talented software > engineers as possible, and give them freedom.” Well, this worked because the > search was already successful enough to fund that freedom. This is the key point and the clickbait-y headline notwithstanding, it's a very valid point. People look at Google and say "wow they have super-smart engineers and let them work on whatever they want with 20% of their time" and tons and tons of products sprung up all over the place. But after a while, management seemed to back off of that philosophy quite a bit. In 2011, Google killed off many of its less successful projects, including Google Labs, and I read in some nook or cranny of the Internet that the 20% time has been quietly deemphasized over a number of years. So the idea that you can just hire smart people and magic will happen, though often copied and lionized, is not all it's cracked up to be. <Insert quip about monkeys, typewriters and Shakespeare here.> ~~~ deciplex For an even more dramatic example, look at Valve. Great company to work for, no doubt, and open allocation which makes 20% time look like a death march. They can fund this because of the money fountain that is Steam. But improvements to the Steam client are underwhelming and come at a snail's pace, if they come at all (e.g. Steam has been delaying my shutdowns in Windows now for _two years_ ). They are about a year behind now with SteamOS, and have pissed off most of their potential partners with SteamBox delays as well. And, of course, Half Life 3, which should be renamed Half Life Pu-239 based on when we should expect it to be released. (How is episodic gaming working out?) "Freedom" certainly makes a place nice to work for. It might even get you some really good technology. And it probably can, eventually, indirectly, _maybe_ eventually manage to achieve some of a company's goals. But if it is the most efficient way to do this, I am struggling to come up with any good examples. ~~~ cpks Conversely, neither Valve nor Google are digging their graves, like much of the rest of the industry does over time. See the prior post about Dell. Look at Microsoft. Focus helps, but good people make a bigger difference. The overhead, be that 20% time or whatever else, is peanuts in comparison. ~~~ nicklaf Interesting. One might go further and postulate an inverse relationship between the focus of a company and it's ability to attract 'good people'. It's tempting to argue that the kind of long-term vision usually shared by the best researchers is at odds with having pressure from management to compete. To be sure, companies with focus also fund pure R&D, but non-monopolies won't usually be able structure an an entire corporate culture around the research mentality. ------ bronbron Hmm. Preface: I do not work at Google. > I would love to see one single company that isn’t dominating a market with > no cash cow in-flow that can succeed without strict discipline, sharp focus, > hard work, and hands-on management I've worked for plenty. I'm not going to name them because it's tactless, but they were both huge monolithic corporations and small-ish companies that were pretty profitable. I'm sure others have too. Those companies that you think to yourself, "how the fuck are we making money when we're so fucked up?". I wouldn't say it's a rare scenario. The idea of companies as "hyper-efficient market machines" is pretty laughable. In fact, I've met plenty of people who worked at IBM (the company he alludes to being one of these strict discipline companies) who said IBM was/is a complete mess. > why have the majority of initiatives at Google either failed or been > financially inefficient and unprofitable The majority of initiatives full stop are failures, or unprofitable. This is kind of pointless without comparing Google to other companies. > When interacting with sales people at Google, I am shocked to see how > untrained and inefficient they are This is admittedly one of Google's faults: they're awful at customer support and the like in general. Well known, but it seems to be working out fine for them. > If there are known companies with great sales cultures such as Oracle, Google is doing considerably better than Oracle in most senses of the word. One possible conclusion is the author's, that Google succeeds in spite of this because of their search monopoly. The alternative is that maybe a strong sales culture doesn't mean as much as the author thinks for the bottom line. > everything else in the Google world, you get $5 billion or 10 percent of > Google’s revenue. Peanuts! Peanuts? Facebook's revenue last year was $8 billion. > Google is in a situation of monopoly with its search business Why do they continue to be a monopoly? There are certainly competitors. One explanation is because they continually offer the best results, because they hire the best software engineers, because they have free food, and offer "20% time", and etc... ------ abalone _> why have the majority of initiatives at Google either failed or been financially inefficient and unprofitable? If they were standalone startups, they would have most likely already been dead._ It takes a lot of experimentation to produce hits. Even the best companies are going to have a lot of failed projects. One reason Google "appears" to have so many failures is that they're more open then other companies. No doubt Apple has tons of internal failures. Projects that don't see the light of day, get canceled if they're not looking good. Tim Cook even talks about it in interviews. I do think that Apple's producing more hits overall, but the point here is that they are not failure-free; they just don't ship crap. Google likes to publicly experiment. In the startup world this experimental function is fulfilled by the startup pool as a whole. Most will fail. Most winners have "focus, discipline, hands on management", but I'm sure that's true for most product teams at Google too.. where "management" = the local team's product & engineering management, which is more equivalent to a startup's executive team than the CEO of Google. If bigger companies want to stay innovative I think there's still a lot of value to supporting experimentation and freedom within the company. It's going to look like a lot of failure. But then so does the startup universe. ------ candybar This article is aggressively awful. His entire premise: "According to the company’s 2013 financial filings, 83 percent of Google’s revenue came from ads, about 7 percent from Motorola (which is now gone), and 10 percent from everything else. In other words, when you add up all the revenue from Google Apps (Gmail, Docs, Drive, Maps, etc.) together with the Android and other mobile businesses, and then add Chromebooks, Chromecast, Chromeboxes, and everything hardware and everything Chrome, Google Developers Network, Google+, Google cars, Google robots and drones, Google Glass and other wearables, Google Cloud, and everything else in the Google world, you get $5 billion or 10 percent of Google’s revenue." is completely wrong because Google's ad revenue cannot be separated from its products outside of Search. Google+, Gmail, Docs, Drive, Maps, Android and Chrome are all designed to add to their ad revenue. Saying that Google's ad revenue is the vast majority of their non-Motorola revenue, therefore Google's non-Search products must not be adding much to the bottom line is to conflate Google's advertising businesss with their Search product, when Search is one of their many products that lead to their advertising revenue. Once you destroy this premise, this whole notion that Search is the only thing Google does well (or makes a lot of money from) becomes obviously absurd. Gmail, Google Maps, Android, Youtube and Chrome are all market leaders in absolutely gigantic markets. Edit: The synergy between many of Google's products and advertising should be obvious. They all capture information about the user, which improves their ability to display "relevant" ads or at least ads that advertisers will pay more money for. They also prevent other dominant players in that space from getting a foothold in advertising. Chrome and Android ensure that Google's various services are not a disadvantage on the web and in mobile computing respectively and may gradually be used to advantage their services over competitors'. Edit2: jjoonathan, your point regarding Amazon and competitive threats they face is correct, but it has very little to do with the article, which is taking Google's successful position for granted and asking how they got there. And the idea that Gmail, Maps, Android and Chrome haven't helped and won't help in the future is fairly absurd. Edit3: Multiple downvotes seem a little fishy, as does this article getting voted to the top of Hacker News. Edit4: Another thing the article is ignoring is that Google's continued dominance in search and web advertising is a massive accomplishment that was not at all guaranteed from its initial success. And its massive investment in engineering that the author sees as excess I'm sure has a lot to do with how it was able to sustain that dominance. ~~~ jjoonathan Google has some very impressive moats, but the real question is how much protection they actually provide. Business-idea-space is super high dimensional. You can't just walk the perimeter and say "yep, the moat protects us from all viable routes of assault." Specifically, if all the valuable searches start going through Amazon how quickly can Gmail, Google Maps, Android, and Chrome make up the missing revenue? Of the products you listed, Youtube is the only one that I think is really orthogonal in the sense that it could bring in significant revenue if google's core product were disrupted. Perhaps maps and docs as well, to a much lesser extent. Gmail and chrome exist in competitive enough market spaces that I don't see them being able to stand on their own at all. It's the familiar old adage about backup systems: interdependencies lead to concerted failures. A nuclear reactor with 500 backup systems that all depend on having a stable electrical supply isn't safe at all. ~~~ arfliw Android could. If they spun that off into it's own company it would be worth tens of billions, minimum. It's headed toward a mobile OS monopoly. It would be difficult to overstate how valuable that is. AdSense could as well. They roll that into 'advertising' but it has nothing to do with search or any of G's products - and it's a huge chunk of their advertising revenue. Even if search lost all of its marketshare overnight they would still bring in many billions every year via AdSense. (AdSense is their ad network where they display ads on 3rd party sites, acting as a middleman between publishers and advertisers). ~~~ pron > Android could. If they spun that off into it's own company it would be worth > tens of billions, minimum. That's tricky. Android's success depends heavily on phone vendors, and the vendors -- at least the large ones -- have only bet on Android because Google's control over it is relatively subtle. If Google tries to extract too much money off of Android, you'll see phone manufacturers forking it in a heartbeat. ~~~ jpdus This is just wrong. Android forks were never successful (see eg Amazon's fire phone) an will never be - the lock-in factor is incredible. In the opposite direction, more and more customers want "pure" software and good hardware is increasingly available from many different manufacturers. Nokia arguably has made the best hardware and hardly sold any phones with WP because customers wanted Android. Google knows this and moves more and more parts from AOSP in its proprietary play framework because manufacturers are way more dependent on Android than Google is dependent on any single manufacturer (including Samsung). ~~~ gbog This depends. If Google is able to run ahead of the others fast enough and have very compelling updates to force competitors to follow them, then yes, their grab on Android is still strong. But my feeling from having looked at Android 5 (which is apparently superficial) is that Google still try to run fast, but there is not more any very compelling innovation to propose. So quite soon a normal two years old version of Android will be just good enough for manufacturers and users. Then Android will still be the main player, but it will exist as multiple forks and Google will have to adapt and propose apps compatible with the most successful forks (just like they propose apps on Apple store). ~~~ bad_user Google's lock in is more about Google Play than about what is coming in Android. Basically as a manufacturer, if you don't play nice, then you don't get Google Play (or YouTube, or Gmail, or GMaps), which then means that your smartphone is just an expensive brick with no apps on it. iOS is special because it is popular and was here first. But do you see Google giving a shit about Amazon's stuff or about the Windows phone? You know, i'm an Android user because of its openness, because of its ability to be forked, but Google practices a kind of lock-in that is very hard to escape. Basically everything they do is technically excellent, plus they end up dominating the underlying platforms. ------ AndrewKemendo Being dominant is not the same as being a monopolist. I wish people would quit bringing that term up anytime a company is at the top of a market because it has legal and social implications. I have even heard people say that they have a natural monopoly which is just silly if you understand how natural monopolies work. In fact Google isn't a monopolist on any terms, but they do currently dominate search. My guess is they could be knocked off their perch fairly swiftly if someone came along with an amazing recommendation service (not like what we see now) that was more advisory than search as it would necessarily absorb search. ------ millstone I would disagree with characterizing GOOG's P/E (27.5) as "low" or "not on par with its financial performance." That's well above the average. The comparisons are suspect: Facebook is an outlier, MSFT in the 90s was surely overvalued along with most tech stocks, and Amazon is deliberately pursuing growth at the expense of profitability. Why not compare instead to other mature tech companies today: Microsoft, IBM, HP, Cisco? Or Apple, who has had a P/E under 20 for the last five years, yet whose stock has outperformed GOOG by 3x over the same period? ------ jpatokal _Another special characteristic of Google is its sales force. When interacting with sales people at Google, I am shocked to see how untrained and inefficient they are._ Did the author just make a wild generalization about a very large number of people, backed up with no evidence whatsoever? Why yes they did. Come on, the least they could do is offer up an anecdote to justify that bizarre claim. ------ wahsd Interesting article. It also adds more validation to my theory that Google is "successful" in spite of itself in many ways. I really think Google's search supremacy is vulnerable, although there is no one really positioned to disrupt Google's domination in search quite yet. ------ leoc "First off, the authors are confusing causation and correlation. Schmidt points out a series of characteristics of Google as a company and presents them as the reasons for Google’s success, but in my opinion, they are all consequences of Google’s success. For example the authors write: “Their plan for creating that great search engine, and all the other great services was equally simple: Hire as many talented software engineers as possible, and give them freedom.” Well, this worked because the search was already successful enough to fund that freedom. [...] The key is market dominance. If you have a de facto position of a monopoly in your market, money pours in, and you can afford to give your employees even more than 20 percent of their time free." This is itself backwards, yes? ISTR that [http://blogoscoped.com/archive/2007-09-03-n78.html](http://blogoscoped.com/archive/2007-09-03-n78.html) AdWords — and thus the profitability of Google's search business, if (arguably) not the search monopoly itself — was the product of early Google's 20% time and employee freedom, rather than the other way round. (Oh, and they got GMail into the bargain.) Similarly for: "I would love to see one single company that isn’t dominating a market with no cash cow in-flow that can succeed without strict discipline, sharp focus, hard work, and hands-on management." I thought that Google's 20% time was modelled after practises at 3M and Hewlett-Packard? I have no doubt that in their day these were companies that enjoyed comfortably high margins on many of their products, but from my limited knowledge I don't have the impression that they were monopolists sitting on their laurels from one of two huge hits. (As Xerox apparently was.) I also don't know how reasonable it would be to claim that private-project time didn't contribute anything to the bottom line of these companies either: 3M itself tends to claim that the Post-It note was a product of its 15% time [http://solutions.3m.com/innovation/en_US/stories/time-to- thi...](http://solutions.3m.com/innovation/en_US/stories/time-to-think) . Accordingly I'm unsure why this article has been voted to the top of HN. None of which is to say that _How Google Works_ is a model of candour and insight, or to suggest that Google has no problems with how it handles innovation, of course. ------ rajlalwani Google is one of the most innovative companies. It has successfully maintained agility (start up culture) even after becoming multi billion dollar giant. What Eric might be hinting and what author of the article sees may not be contrary! ... It's perceptual difference deliberately created. ------ zobzu " “Their plan for creating that great search engine, and all the other great services was equally simple: Hire as many talented software engineers as possible, and give them freedom." Man I so dislike these. Its pure bullshit. (its a quote from the book, mind you). ------ mathattack He had me at "Correlation doesn't equal causality" but it rapidly went downhill. I get that the concept of "Cut loose smart creatives" is not universally successful, but the article seems to go rapidly downhill from there. ------ jackmaney I know that the old saying of "don't judge a book by its cover" has been around a long time for a very good reason, but I honestly can't get past the title of this article. I find myself incapable of taking it seriously. ------ dang We changed the title in a somewhat feeble attempt to make it less baity. If anyone suggests a better title, we'll edit it again. ------ ajhsieh Its certainly not in Schmidt's interest to proclaim in a book that Google has a search monopoly even if he did realize it. ------ BrandonM _> I would love to see one single company that isn’t dominating a market with no cash cow in-flow that can succeed without strict discipline, sharp focus, hard work, and hands-on management._ I would not work for this person. It's ironic that he thinks Schmidt is the one that has it wrong. ~~~ gumby I disagree with you (even despite the fact that the author describes himself as a buzzwordy "Enterprise SaaS Executive" \-- he writes better than someone with a description like that should be able to). It's no secret, within Google or without, that Google is not particularly well run. This article cites the sales team (without backing up the talk) but talk to any of the tech folks and most will tell you the same thing. And as the article says, the Street seems to think so too. What Google _does_ get right are two things. First, they _do_ get the core stuff right: search, search infrastructure, and adsense. That's sine qua non and they aren't bozos! Second, at the other end, the stuff that's flakyest is the stuff that _should_ be flaky: Google X (and as the article says, it's a tiny amount of money). In between, however, the company isn't great. Not a mess, but mediocre on execution. The article says that the company's killing of products is a sign they are trying to get their house in order. I don't see it, but it could certainly be true. The good news for Google is that they have a huge cash flow so can actually afford to take their time to fix things. The bad news is that they have a huge cash flow which removes any sense of urgency. Big cash flow covers a multitude of sins. Big cash flow kills a lot of companies. In such a circumstance hard to do anything new, especially since while it's new it doesn't move the needle on revenue. That's why great, paranoid companies like Intel and Microsoft that had dominant cash flow suddenly struggled when the tide went out. In the case of IBM they had an existential (near death) experience and it forced them to get their act together. The point of books like these is to be talismanic. The company is successful so others look for the surface gimmicks that made it successful. It almost doesn't matter what is inside them, since the readers generally aren't looking for insight but rather validation (they are the business equivalent of self help books). ~~~ BrandonM I wasn't responding to the entire article. I agree that he got a few things right. The specific part I quoted, though, stands out to me as a rather old-fashioned management philosophy, one that is unlikely to attract and retain top talent in a competitive hiring market. ------ mickreggel "As a fan of his, I’ve followed most articles, interviews, and slides about his latest book" The author of this piece of shit is a fan of Eric Schmidt??? WTF? Someone needs a life. This article is the biggest load of bullshit I've ever read.
{ "pile_set_name": "HackerNews" }
FPGAs for Dummies [pdf] - vonmoltke http://www.altera.com/literature/misc/FPGAs_For_Dummies_eBook.pdf ====== asynchronous13 I've been using an embedded system based on a combination of FPGA and DSP for about ten years now. If I could go back in time and start over, I would ditch the FPGA. The reason I say that is because of the time costs associated with realizing any benefit of an FPGA design. 1) FPGA based design is "future proof", we can use the same hardware to interface with new sensors in the future! Reality: we could spin a new rev of the circuit board faster than we can develop and debug the new interface in the FPGA. 2) everything can done in parallel! Reality: it's faster (development time) to put a soft core CPU on the FPGA and write linear c code to get the job done. When that solution runs fast enough, why spend more time optimizing? Bad FPGA developers are hard to find, good FPGA developers are nearly impossible to find. FPGAs are super cool. For certain niche applications they can't be beat. But most of the time, the development cost is just not worth it. ~~~ vonmoltke Sounds like the program I used to work on, though we were doing FPGA cards feeding into a small MPI cluster. The only real reason I can think of to use FPGAs in production is that you need ASIC-like functionality, but the total build out isn't worth the cost of taping out an ASIC. On my first program the hardware had several FPGAs and CPLDs for that reason. That design was finalized in 1994, though. Today those chips could be replaced by microcontrollers. As microcontrollers and soft-core processors get more capable, the applications for FPGAs will decrease. ~~~ reportingsjr Any time you are dealing with massive amounts of data in a fairly restricted environment (something out in the field) FPGAs are about your only solution. Image processing is really one of the largest and best uses of FPGAs that I have seen. I think they are very overblown for many things though. I'm sure eventually when semiconductor technology slows down (Moore's Law) that FPGAs will start becoming worthwhile for most things simply due to their efficiency. We are still a long way from that though! ~~~ asynchronous13 Do you have any examples of FGPAs used with image processing? I've done a little, and I've seen some academic examples. But I haven't seen anything in production. ~~~ wcunning The acquisition systems in almost all medical imaging, along with their noise reduction and such are built with FPGAs. An MRI machine costs several million dollars or more, and GE sells a handful each year, so spending $10,000 on the FPGA that it's built around makes more sense than millions on spinning an ASIC that will be out-of-date the day the machine is put in the field. Not to mention the need to maintain these machines for decades, given the replacement cost. Nothing else will do, when an applications processor is too slow to do data acquisition and an ASIC isn't cost effective. ------ tryp I am truly excited that there is a push to popularize FPGAs. They often allow a fundamentally different approach to problems and afford a massive improvement in efficiency and flexibility when applied to a given task. This book is a very approachable high-level answer to the question "wtf is an fpga and why do I care?" but I'm a bit disappointed that is lacks much direction on where to look next for more depth. I'll take the liberty to suggest a couple possibilities here: [http://www.fpga4fun.com/](http://www.fpga4fun.com/) Fpga4Fun is pretty accessible. [http://opencores.com/](http://opencores.com/) Opencores is kind of a SourceForge for FPGA stuff. There are lots of interesting components there to mix into a project. nitpick: This is my first encounter with the ASSP (Application-Specific Standard Product) initialism. It seems like a needless distinction from ASIC to me. ------ malanj Interesting, they claim a 5x power efficiency for FPGAs over GPUs in Monte Carlo Black-Scholes simulation. [http://postimg.org/image/6o52lcgir/](http://postimg.org/image/6o52lcgir/) I wonder if Amazon will start hosting FPGA boosted compute instances anytime soon... ~~~ aylons At Amazon scale, most of the time they could use an FPGA, they would be better served by an ASIC. The only exception I can think of would be if they dynamically implemented different algorithms in a FPGA in a just-in-time model. Or, at least, in a regular basis. ~~~ adamnemecek He's talking about FPGAs for AWS. ASICs would not make sense for that. ------ chuckcode I'd love to see a higher level language binding for FPGAs like CUDA for GPUs. I've seen real experts make data fly through an FPGA but it seemed like development was slow (no surprise given 8hrs just to compile) and getting the clocking/pipelining right to run at really high speeds was non-trivial. In contrast using CUDA for GPUs was pretty approachable even for regular developers to get started although it did take expertise to squeeze all of the performance out of them. Hard to beat FPGAs though when you need low latency though... ~~~ oflordal I have not tried it myself but both Altera and Xilinx can compile opencl for their FPGAs nowadays ------ sargun FPGAs have finally become used in some compute clouds. Specifically, Microsoft published some work in this space called Catapult: ftp://ftp.cs.utexas.edu/pub/dburger/papers/ISCA14-Catapult.pdf I predict that we'll see FPGAs become in use more often, but there are certain hurdles in both the operational, and programmability model that need to first be solved. Disclaimer: I used to work for MSFT. ~~~ agumonkey I second that, the parallella board comes with a Zinq 6000 IIRC, it's amazing to me that you can get a nice FPGA at such low price. ------ linker3000 Minor point: The book refers to LEGOs (sic). That will upset the pedants. /Proof readers lose 1 point. ------ radikalus I've still never really seen any FPGA deployments beyond using them basically as DSPs in finance which is too bad as I would LOVE to play with something that can rip through the generation of stochastic processes quickly. ------ aniijbod FPGAs for dummies? _This_ is FPGAs for dummies (and it's in pure Australian) [https://www.youtube.com/watch?v=gUsHwi4M4xE](https://www.youtube.com/watch?v=gUsHwi4M4xE)
{ "pile_set_name": "HackerNews" }
Missing the point about microservices - zbb https://erikbern.com/2018/06/04/missing-the-point-about-microservices.html ====== ankurdhama IMO the idea of micro services makes sense when you have a bunch of services and they don't call each other. If they do call each other then they are coupled and that bring whole slew of problems and they are not independent anymore. Soon your system will looks like a messy graph.
{ "pile_set_name": "HackerNews" }
6 MAC Apps. 6 Design Goodies. 1 Shokingly Low Price - sourabhmca14 http://bundlehunt.com/?holidaybundle ====== Udo How is this not spam?
{ "pile_set_name": "HackerNews" }
Sad to see Google Reader go? Come on, folks...it's 2013. - christopheraden http://www.zdnet.com/sad-to-see-google-reader-go-come-on-folks-its-2013-7000012596/ ====== phasevar Twitter and social sharing doesn't fit my use case. I want to be able to scan all the articles on Hacker News even if I can't log onto Hacker News for days at a time. There's useful information here that I want access to but I can't be at my computer clicking reload on the Hacker News homepage every 30 minutes.
{ "pile_set_name": "HackerNews" }
Ask HN: A List of HN-esque TV Programs - DarrenMills I'd like to get a list all in one place. I'll edit this post with your suggestions as they come, then migrate to a google doc. I'll add my ideas shortly. ====== DarrenMills The complete lack of response I got from fellow hackers today was surprising, if not disheartening. Does timing play a much larger role on HN than I realized? ~~~ philwelch Have you watched TV lately? There's no such thing as an HN-esque TV program. ------ marilyn Dragon's Den (Canada & UK) & SharkTank for the pitch/investment side of business, though not exclusively tech focused. ------ DarrenMills The Big Idea (Donny Deutsch - CNBC) How'd you get so Rich? (Joan Rivers - TV Land) ------ emarcotte <http://www.makezine.tv/>
{ "pile_set_name": "HackerNews" }
Show HN: Converspace, kinda like what blogs should have evolved into - sandeepshetty https://github.com/sandeepshetty/converspace ====== mikkel The one big issue I see is lack of a small concrete goal. > Like a blog that allows publishing of content of any size or type (long- > form, mirco-updates, videos & photos using oembed, links, quotes) via a > single textarea. Take any one of those things, and you can find entire sites devoted to just that. A picture is worth a thousand words - so a mockup of the screen layout would be helpful to envisioning this product. ~~~ sandeepshetty I'm only implementing textual content at the moment (long-form and micro- updates). Think about the textarea like Facebook's status update box: You usually add text, but if you add a link it figures out if it's a video, etc. Think even Twitter's web interface does this now. Note to self: Finish mocks ASAP. ------ sandeepshetty I've updated the link with a basic mock: [https://github.com/sandeepshetty/converspace/blob/master/REA...](https://github.com/sandeepshetty/converspace/blob/master/README.md) ------ sandeepshetty I have some running code but it isn't ready for launch yet. Just putting this out there to get feedback on what you like and what you think needs improvement. ~~~ wmf To understand this I feel like I need to see some examples or mockups showing how it would be used. ~~~ sandeepshetty I've primarily worked on the backend and have been some sketches on paper but nothing concrete to share yet. If you have any specific questions I'd be glad to answer them.
{ "pile_set_name": "HackerNews" }
GPL version 2 is a bare license. Rescind.(Re linux Code of Conduct Bannings) - e67f70028a46fba https://www.spinics.net/lists/kernel/msg2909797.html ====== throwaway5250 The whole thing is very sad, but this is not a useful response. ~~~ __d How is it sad? ~~~ throwaway5250 Linus has spent decades of his life creating and tending one of the most socially useful pieces of software ever created. Now he's being vilified by a bunch of craven busybodies. Although he's treating it with undeserved grace in public, it seems entirely possible that this will end his serious involvement with the project. Which is tragic.
{ "pile_set_name": "HackerNews" }
It's time for Slack to get physical - ahmadss http://code.viget.com/slackalert/ ====== stopshinal Hey everyone! I worked on SlackAlert (along with several other talented folks at Viget), so I’m happy to answer any questions you might have. We were itching for a screenless UI when we decided to make SlackAlert. It’s fully functional with lights, sound, and four tactile buttons. You can easily make your own for ~ $50 and customize to your heart's content. Check it out and let us know what you think!
{ "pile_set_name": "HackerNews" }
I'm a founder, I'm at Bootup Labs - domino http://dshan.me/blog/2010/04/im-a-founder-im-at-bootup.html ====== ghshephard One of the events that comes to mind, as I read through the roller-coaster that is Bootup Labs, was an event that happened about five years ago in our company's early history. We had a tiny little engineering staff, and were working out of a small office in San Mateo, CA, and had invested a _ton_ of time and energy into fund raising, but finally had managed to get a term sheet from a good second-tier VC. Based on that, we managed to get a board member, hired a few employees, and in general thought that we had 6-9 months of runway...and then the funding dropped through. The VC basically just walked away - to this day, I don't think we know why - certainly no developments on our side. We had to scramble to make payroll (and pay the rent) and our executives _truly_ earned their salary/equity for those months while we tried (and eventually succeeded) to raise funding from somewhere else. It was a defining moment in our company's history. I guess this is just my way of saying that _every single_ entrepreneur should be prepared for their funding to disappear until they have the check cashed and sitting in their bank account. You have to have a Plan-B that leads to success, whether it be consulting, credit-cards, friends-and-family, or living on zero dollars. That's just the reality in this completely unfair world of ours. I particularly like the fairly positive attitude of the statusly guys - they aren't vindictive, or whining - they're just sharing their war story, and they finish off with just excellent advice: "If you’re a Startup, and you’ve been accepted into one of these incubators, be sure to get some sort of paperwork done where money is provided, or proof of income is shown, or something. No matter how nice the people seem, and how badly your heart wants your business to succeed, don’t get yourself into a similar grey-area/possibly unethical situation." ~~~ anamax > I guess this is just my way of saying that _every single_ entrepreneur > should be prepared for their funding to disappear until they have the check > cashed and sitting in their bank account. You have to have a Plan-B that > leads to success, whether it be consulting, credit-cards, friends-and- > family, or living on zero dollars. The above suggests that you "finish" fundraising. You don't. You can't stop fundraising when the check hits the bank because you're already behind schedule for raising the next round. ~~~ whatusername I think DHH (and others) would disagree with you. At some point you need to stop raising money and start raising revenue. ~~~ anamax > At some point you need to stop raising money and start raising revenue. Actually, you need to start raising revenue before you stop raising money because you need to keep raising money until you've got sufficient revenue. My point was that you're continuously raising money until you hit that point ------ solutionyogi OT: Summify is a fancy Snap (<http://www.snap.com/>) and is equally annoying. Is there anyone who likes these link preview plugins? ~~~ dnsworks Michael Arrington seems to be fond of them. ~~~ bvi I think he was, but he scrapped it. I don't see those preview links on TechCrunch anymore. ------ joegaudet I wonder if this guy would be seeing things this way, if his company was among the 4 that got cut and not the 3 that didn't. ~~~ chc I wonder if he's seeing things this way BECAUSE he doesn't want to be the next one to get cut. See, now Bootup Labs are "receiving something in return" from this startup like they wanted. (I don't mean to imply that this guy is dishonest, but when your situation is as precarious as his was just shown to be, you will want to curry favor.) ------ dshanahan Hey guys, so that's my post. I'm the founder who was here with Jamie, who I consider a friend and think is a really talented and genuine guy. I've watched this story grow and I think even Jamie might agree that it's been hard (and largely inappropriate) to communicate all the specific details which might inform such a wide audience on the events around here. I was specifically emailed by 'icey' to jump in and be a resource. He/she asked me specifically regarding the stated financing situation prior to my moving to Vancouver from Chicago and joining Bootup. It was contingent on closing the round. I'm not sure what to say other than that was clear. I took that risk knowingly. ~~~ icey It was made clear, or it was clear because you read through all the agreements? I'm asking because I think it's a different story if it was buried in some fine print versus stated clearly up front. Jamie is the one who brought such a wide audience to the story, but he didn't mention anything about being aware of the chance that there may not be any funding. I still think that what Bootup has done is pretty shady, but it may end up being less shady than the blog posts have made it sound. ~~~ dshanahan I re-read my answer to your question and wanted to clarify; the fact that funding wasn't secure was clear before I moved to Van. It was included as a contingency on the (simple and short) term sheets. ------ icey They knew that all of the funding was contingent ahead of time? I wonder how that was communicated to them. ~~~ chc The fact that everybody at Bootup Labs keeps using the vague, single-word description of "contingent" is makes me suspicious. If the terms were presented to the founders that vaguely, I wouldn't blame some of them for not realizing just how "contingent" they were. ~~~ jarek When it comes to getting money, assume "not vague" to mean "cheque cashed, not bounced". ------ kylebragger Imagine your bank saying (discounting the existence of the FDIC) "sure, you can deposit your money here, we'll probably have some cash around if you ever want to withdrawal it — maybe!" Obviously, there are multiple sides to the story, but this is the gist of what I'm interpreting from it thus far. ------ unconed I'm next door to Bootup Labs... all I know is, Hackernews needs to chill out. The people at Bootup, both the startups and management, are great folks who care about tech, care about the community and about innovation. The character assassinations of the people involved are unwarranted. Securing funding is always hard, and the whole VC scene is crazy. Some companies get millions thrown at them even though they've been burning cash for years, others have great ideas and just can't secure some pocket change to get going. As far as I can see, Bootup is doing a pretty good job. ~~~ kls \--After everything that we did for you and Steven Enough said about their attitude towards these individuals. Like they did them some type of favor, business is business and deals fall through all the time, but to then turn it on those guys like they should be grateful for getting screwed is just absurd and then to complain that they did not get anything in return for paying 2 months rent for the guys. Dan's post reeks of a self entitled prick, like he some sort of benevolent god or something and that is why they are getting their just crucifixion, not because a deal fell through.
{ "pile_set_name": "HackerNews" }
Show HN: Site calculates how long it takes famous authors to write books - batub http://rabbitwriters.com/ ====== dalke Out of curiosity I looked for Isaac Asimov, but he wasn't there. Instead, I looked at Mark Twain. The site only lists his novels, and curiously one of his short stories. Twain wrote a lot of short stories (also available in collections) which aren't on the list. Also, it uses a line graph to connect publication dates and word counts, but the line between those points is meaningless. At best it should be a step graph, where the height is based on the number of words for a publication divided by the time between publications. Otherwise it looks like Twain wrote less and less from 1875 to 1880, until finally publishing The Prince and the Pauper. ~~~ batub I'll look into the missing short stories. The tool I created that aggregates all the metadata is pretty good at finding novels, but it still needs A LOT of work with short stories. It'll probably be easier if I focus on collections, though. Yeah, after thinking about your comment, a line graph doesn't make a lot of sense. As you said, it kinda skews the viewer's mind about how the author was writing his books. I'll look into step graphs and change all the graphs soon. Thanks for the feedback! This is just a pet project, but it's nice to have some helpful criticism. ~~~ dalke You're welcome. The premise is nice - how long it takes famous authors to write books - it's just that the graphs don't answer that question. It looks like you made the change to a step function. I think you have the direction wrong. Consider C. S. Lewis. I don't think he wrote 150K words per year for almost 5 years to produce the 36K words for The Lion, The Witch, and The Wardrobe. Lewis was also an essayist. Take a look at [http://en.wikipedia.org/wiki/C._S._Lewis_bibliography](http://en.wikipedia.org/wiki/C._S._Lewis_bibliography) for the many essays not included in your list. In fact, the bio says "His most distinguished and popular accomplishments include Mere Christianity ..." but Mere Christianity isn't on the list of books. Or consider that 'The Great Divorce' was originally written as a serial for The Guardian, and at the same time as writing 'That Hideous Strength', so it's not that he worked full time on first one then the other. I hope your project it's a labor of love, as the complete answers (the sort that won't irritate fans or detailed oriented people like me) will get you bogged down in details that require a lot of manual research. But you'll have the admiration of the few who really do care. ~~~ batub So you think a right step graph would work better? I changed the graphs to have a right step instead of a left step, but the graphs still don't make a lot of sense. The lines in the graphs are supposed to represent the time it took between publications, but I think people are thinking that the author was writing at a constant X amount of words for however long the line between publications is. Yeah, there's probably a lot of books that were being written while others were being finished up or started as well. When I first started developing this, I thought about finding data about how long it takes an author to WRITE book X, Y, or Z, but I couldn't find accurate information about that for most authors. So that's why I decided to use publication dates. I understand how people think that books are written in a linear fashion - one after another - because of this, but there's not much I can do about it, because most authors don't share this information and a lot of ones are already dead. For the missing works, I'll have to revise my tool to find anything that are not novels or just enter the data for essays, short stories, collections, etc. manually, though that'll probably not be feasible time wise. ~~~ dalke Assuming all the information were available, I would like to see how many words (of the published version; not all the intermediate drafts) were written during a given year. If it took 2 years to write 100,000 words for a release on 2014-01-01 then 2012 and 2013 would be at 50,000 words each. That would indeed be a 'constant X amount of words for however long the line between publications is'. (This also assumes no publication delay. I have no idea how to tell how long it took to get edited and reviewed.) It's possible to fake it. You could compute the average publication rate then backtrack that amount for each publication date, assuming a constant rate. Then let overlapping publications sum, and use a smoothing function to interpolate. It's still a mess. Especially if there are any posthumous publications. Yes, getting the actual rate requires a lot of research, including perhaps talking to people who study those authors. Eg, a Twain scholar probably knows a lot more about when things were published. But this gets into serious labor of love (or Master's thesis) territory. ~~~ batub hahaha, I like working on this, but researching each individual publication sounds like something that I wouldn't be able to do. What I'll probably end up doing is open sourcing the database + website and allowing others to contribute. Again, thanks for your help.
{ "pile_set_name": "HackerNews" }
If we work day and night, we can match our competitor's features within 12 mos. - kevindication http://dilbert.com/fast/2009-12-09/ ====== nroach I got a good laugh out of that comic, and it's frighteningly familiar for a lot of enterprise developers. But taken too literally, it sends entirely the wrong message to a startup. In some cases I guess you really do want to swing for the fences and bypass everything that's been done in your industry. However, I suspect that the failure rate among those that take a completely divergent approach is pretty high. Maybe you don't have to match the competition feature-for-feature, but you do need to match them need-for-need. If you don't address customer needs, good luck with your conversion rate. And in the end, a feature matrix is just one company's articulation of what it thinks those customer needs are. Maybe you disagree or maybe you have a better way, but if the same 70% of features show up over and over again amongst your competition, you'd better find a way to satisfy those needs. In the interest of not posting a tome, I've elaborated on my blog (see profile for link). ~~~ patio11 _you do need to match them need-for-need_ I disagree. In particular, you may not be addressing the same niche that the "competition" addresses. To use an example I've been thinking a lot about today: it is stupid and suicidal for any startup to go head to head with Google on a core Google competency, right? Well, Wingify just released an A/B testing product which is about 5% as featureful as the Google Website Optimizer/Google Analytics tag team o' doom. It lacks on enterprise features, it doesn't have the Google ops team backing it, etc etc. It also won't be free due to a cross-subsidy from Google AdWords. Instead of trying to reach feature or need parity with Google, they said "There is a portion of the market here which is untechnical and knows they want to do A/B testing but whom are undeserved by EVERY vendor. We're going to make A/B test easy enough for them to incorporate it into their businesses in a few minutes." With respect to those users, they're going to eat Google's lunch. Granted that might only be a couple hundred thousand customers but, well, how many customers do you really need, anyhow. ;) ~~~ nroach Well, my surreply would be that for those customers, there is only one one need, and Google's feature matrix attempts to address more needs than actually exist in that segment of the marketplace. But segmentation is a good point that I hadn't really addressed. I'd presumed competitors going after the same market. A more mature competitor may simply be seeking a bigger market (and thus requires more features). If you're satisfied with attacking just one segment, everything else is extraneous. ------ mrcharles I've had this conversation in the game industry more times than I can count. ------ SamAtt We were just talking about this in my office the other day. How "feature match" is such a popular strategy because it's something a non-technical manager can say without having to rely on his technical staff (which in many managers' eyes makes them seem weak) ------ Anon84 Or... you can work just as hard to find a new approach to the same problem that gives you an edge over them. ------ mnemonik Ah! A modern example of Zeno's Paradox! <http://en.wikipedia.org/wiki/Zeno%27s_paradoxes> I bet Douglas Hofstadter would appreciate at this one. ------ seasoup 37 points for posting a dilbert? ~~~ kevindication It's my opinion that this dilbert is fairly relevant to HN. A lot of pg's early articles were addressing this feature-matching sentiment and how they approached it at viaweb.
{ "pile_set_name": "HackerNews" }
Show HN: Lofi – A Minimalist Spotify Client with Better UX - dvt http://www.lofi.rocks/ ====== dvt Hi HN, a few weeks ago I made a "replacement" for the Spotify desktop app because I wanted a tiny player instead of a whole window I need to bring up to skip songs/etc. It's free & open source, works on Windows and MacOS and even has visualizations (remember those?). Anyway, I thought I'd share it here. Any feedback is welcome. Download it by going here: [http://www.lofi.rocks/](http://www.lofi.rocks/) MIT-licensed source code here: [https://github.com/dvx/lofi](https://github.com/dvx/lofi) ------ new_guy Spotify has revenue in the billions each year. And while this is a nice bit of code and obviously scratches your itch, don't you feel maybe a bit silly doing their work for free? ------ newsbinator > "Lofi is light-weight and runs on less than 100MB of RAM." Ah, when I first started programming this would have been tongue in cheek. But times change!
{ "pile_set_name": "HackerNews" }
Ask HN: 3 months in - where should I take this project? - bazookaBen A few months ago I made a prototype HTML5 game called Private Joe. Got tons of great feedback from HN.<p>I just released a radically improved facebook version of the game at http://bit.ly/rhoHkH . It has everything set up, social elements, invite system, leaderboard, store , etc.<p>My question is, how do I get to the next level?<p>Some major barriers that I'm facing:<p>1) As an indie student developer, I find it very hard to compete with other social game developers.<p>2) The pros work in teams, have a marketing budget, and iterate very fast. They seem to have all the right ingredients to scale.<p>3) I can't afford a marketing budget. I can only put more sweat equity in game design.<p>4) Because I don't have a solid user base, I can't even start working on the 'business intelligence' side of social games (metrics monitoring, A/B testing, k-factors, etc). I'm missing out on that big time.<p>5) Mobile-wise, I'm working on porting the game to iOS+Android. Using existing frameworks like appMobi and PhoneGap decreases development time.<p>6) I considered starting a company solely developing multi-platform games. No luck so far (don't have VC connections, no access to talent, not based in the Valley). I also submitted my application to mobile game funds (TinyCo, YouWeb).<p>How do I get my skin in the game? Should I join a game startup? Can my talent be used in other startups? Should I form one myself?<p>Honestly, I don't think I can go far by working alone. I need to get into the major league.<p>PS: Am a grad student in Indiana (international citizen). Non-CS major. ====== Feeble I think that the important part is that you keep being productive. Keep improving your game our push out new content if you can. Opportunities usually arise with time around talented people. Like you say, it is very hard to compete with developer studios, but realize that to design, develop and actually _ship_ a game by yourself is no small feat. I can assure you that this will not go unnoticed in your future company/work/career choices =) ------ superted Private Joe is really a solid game. Excellent work! Would you mind sharing some basic usage stats? Have adding the elements you list been worth the effort? The reason I am asking is that I created a HTML5 a couple of months ago (<http://www.thearca.de/gardenmadness/>), and I have been pondering whether it is worth the effort to create a FB version or not. ~~~ bazookaBen at this early stage, the facebook version doesn't have many users Private Joe's core audience is male, 18-24. I really can't tell if adding a leaderboard/store/gifting system has helped the game. All I can do is to make sure i have those systems in place, so I can at least compete with the big guys. in a way, it's similar to an arms race - if the other guy has it, you got to have it too. ------ bazookaBen link to the game is <http://bit.ly/rhoHkH>
{ "pile_set_name": "HackerNews" }
A Heretic's Guide to Deplatforming - StuntPope https://easydns.com/blog/2018/11/02/a-heretics-guide-to-deplatforming/ ====== dleslie > The tech giants today are by their own actions cultivating the motivation > and the will to necessitate the creation of their own challengers and > everybody is watching closely what works and what doesn’t. And this is why I find the trend towards deplatforming to be altogether _exciting_. I haven't been this _excited_ about potential changes in how we communicate since I first installed Skype; when it was still P2P. There hasn't been this much social pressure on individuals with technical ability for some time, and sufficiently many appear to be attempting to turn that pressure into new ways to communicate. Safely, securely, and in a way that is resilient to outside attempts to silence. Our current state of affairs is distressingly centralized; we have but a handful of _enormous_ silos of personal information and communication, and progressively less independent sources of content distribution. While it may seem a non-issue when it's ethnic supremacists and fascists being silenced; it's a situation precariously vulnerable to abuse by the powerful. These experiments in decentralized communication and data storage couldn't come any sooner. ~~~ wuliwong I am right there with you! I am oddly excited by the recent waves of de- platforming. I think they are hastening the next step of development. ~~~ arto Indeed, sometimes things have to get worse before they can get better. ------ evrydayhustling Reading this article is like watching someone beat the ocean with a stick. What would it look like for an "anti-deplatforming" initiative to succeed? All ideas have equal access to all platforms? Just the big ones? The objective is so poorly formed, it's not even wrong. A platform's identity and ability to attract an audience are determined by the activities they accept / cultivate, not vice versa. Infowars wanted to be on Facebook because it made it easier to sell your grandparents vitamin supplements, but Facebook felt that leaving them on make it a place families (and their grandparents) won't visit. Gab would like to use Stripe or Paypal because they are trusted payment providers, but those networks felt they'd stop being trusted payment providers if they let Gab stay on. And there's plenty of reason to think they're right: super-permissive platforms exist and work (4chan et al.), they just don't attract the same broad audience. When people complain about being deplatformed, they're just saying "the platforms that accept me aren't popular enough". I'm glad our internet is enough of a distributed commons that many platforms are broadly accessible -- but nobody owes you an audience at the most popular ones. ~~~ im3w1l First people get kicked off their platforms "build your own platforms" Then platforms got kicked off the platform platforms "build your own platform platforms" What reason is there to assume those platform platforms will not get kicked off the platform platform platforms? These people are not arguing in good faith. ~~~ amputect What's the alternative to "build your own platforms" though. Are you willing to compel Stripe by threat of force to keep processing credit cards for nazis? Are you willing to completely torpedo freedom of association, as long as the people demanding your company continue associating with them are sufficiently monstrous? ~~~ hakfoo What makes the 'deplatforming' threat viable is that so many critical aspects of an online business are a choice between private-enterprise players. Stripe or Authorize.net. AWS or DigitalOcean. GoDaddy or Namecheap. As you suggest, they have no individual legal obligation to serve a business that may cause bad press/high risk/whatever. But when you can enough of them pointing in the same direction, it creates the chilling effect-- a business that's technically legal but can't get the services they need. It basically creates am unspoken private regulation well beyond the actual law of the state. I tend to think the answer might be non-profit or state-run "service providers of last resort" \-- charter-bound to provide service for any legal purpose, no matter how distasteful. Not necessarily cheap or slick, but they won't pull your plug because people complain about your content. Such a provider would defang the deplatforming strategy pretty fast. ~~~ Faark > it creates the chilling effect-- a business that's technically legal but > can't get the services they need They can get it, but have to pay for that. Just like the porn industry had to build their own payment providers. The chilling effect is working as intended. You need something in society to make people find common ground and live in a similar reality. The current US seems like a great example of people not being able to do so. They blame more and more blame other side for their problems. And i wonder if that trend can be reversed before you guys start shooting each other. Recent developments like social media made and the US TV landscape make it easier than ever to live in your favorite filter bubble. Algorithms getting better and better at giving you what you want to hear. I don't see developments emerging to counteract that. If de-platforming is bullet we have to bite for society to keep functioning, than so be it. It's still somewhat mild tool you can work around... i take that over government intervention any time. ~~~ hakfoo >They can get it, but have to pay for that. Just like the porn industry had to build their own payment providers. There are two problems with that argument. First, it's nowhere near as trivial as you make it sound. A one man shop could potentially build and maintain a custom forum service himself, but trying to create a real-world ready payment processing infrastructure from scratch is going to mean a team of tens of specialists. The porn industry was able to solve it because it was a big, industry-wide problem that left a lot of money on the table-- a need big enough to create a market for specialists. Second, it may not be possible to bypass every firm that presents a deplatforming risk. The porn industry may have avoided rejection by the mainstream gateway providers, but they're still dependent on retaining good relationsips with Visa and Mastercard at the end of the day. I'd think those guys are the nuclear option for deplatforming-- no matter who you line up to take your payments, if you can't accept 90% of the cards on the market, you're not going to be able to monetize effectively. ------ tptacek It's probably unrealistic to expect us to stop seeing threads about this (Gab's #1 objective at this point will be to make more noise and surely something "newsworthy" will happen with them sometime soonish). But it's worth noting that we've had several recent discussions about Gab stemming from the events that occurred after the mass shooting. Here, Jeftovic is arguing from faulty premises. Correcting those premises might not change the conclusions he draws, but they're worth fixing anyways. While it's true that the worst speech on Gab.ai doesn't come from the operators of the site themselves, it's _not_ true that the site operators have clean hands. Gab's (verified) Twitter account has repeatedly been screenshot posting anti-Semitic comments, and retweeting white supremacist posts from others (for instance: they pointedly RT'd a white supremacist mocking Ken White, of Popehat fame, for being the adoptive father of Asian children). Gab itself openly embraces white nationalism. Gab is white supremacist Twitter (you might have called it "white nationalist Twitter" before whatever weird Brazilian politics thing conspired to begin its transformation into Fascist Orkut, which is where it's heading now). That doesn't mean you have to agree it should be taken off the Internet by GoDaddy; you can form coherent arguments in either direction. But the idea that it's being taken offline solely because of the actions of its users is false. It has the users it has because those are the users its operators begged to get. ~~~ StuntPope Jeftovic here. I actually wasn't aware of many things you cite above, having cursorily examined, then abandoned Gab I never followed their twitter feed, etc. Without having seen any of that myself, I wrote the article extending a certain benefit of the doubt, trying to look at it from a neutral (ostensibly) vendor vantagepoint. ~~~ pvg You've added an update to your article pointing out it was 'flagged' after 'rapidly ascending'. Flagging is done done by users, so both the (brief) rapid ascent and the flagging are results of user action. ~~~ StuntPope So what's your point? ~~~ pvg There's nothing 'ironic' about it, flagging is like downvoting. You aren't being 'deplatformed' by some inscrutable power, users just don't think it's a fit for the site. ~~~ StuntPope No, flagging is not like "downvoting", this isn't reddit. As somebody else here already pointed out: > From > [https://news.ycombinator.com/newsguidelines.html](https://news.ycombinator.com/newsguidelines.html) > > If a story is spam or off-topic, flag it. This isn't spam and given the interest it's garnered it's obviously not off- topic. So if you're flagging it you're basically throwing your opinion over it and preventing others from seeing it and from upvoting it. That's imposing your opinion over everybody else's. If you don't like the post, then don't upvote it or better still, post an erudite missive on why the author is a brain-dead moron, but don't mis-label it as spam or off-topic. ~~~ tptacek Can I offer a different complaint? Mine is: you updated your post to reflect that it had been flagged by HN users, but _not_ with material new information you acquired from the thread before that flag had occurred. That feels a little dishonest. ~~~ StuntPope What material new information is that? ~~~ tptacek You acknowledged it upthread! ------ asdfasgasdgasdg > Most successful deplatformings are Pyrrhic victories Big fat citation needed on this. You speculate as to how they _may_ become pyrrhic victories, but it's far from concluded that this will be the case. Previous deplatformings (Milo, Alex Jones) haven't produced any visible negative consequences for the platforms. There's little reason to think this will either. Surprisingly few people care if a den of hate speech has trouble finding a DNS registrar. Especially, surprisingly few important DNS registrar customers care. ~~~ stcredzero Likewise, almost no one cares what a Jehovah's witness has to say. The US government coming in and telling a private entity, no you must tolerate free speech on your property is historical fact and precedent. There is a lawsuit where a company owned this mining company town, including all of its roads and sidewalks. A Jehovah's witness won a lawsuit on the basis of the First Amendment, enabling her to walk about that town and distribute her pamphlets. [https://www.youtube.com/watch?v=lBozijndSLc](https://www.youtube.com/watch?v=lBozijndSLc) Originally, it was once widely recognized by US jurisprudence, though property rights and freedom of association are important, the First Amendment was even more important and trumps property rights. _Surprisingly few people care if a den of hate speech has trouble finding a DNS registrar._ Surprisingly few people cared when the US government carted off my bandmate's parents to concentration camps. That's a very poor metric to apply to a principle of rights and justice. ~~~ tptacek It sounds suspiciously as if you're drawing a direct comparison between the internment of Japanese-Americans during World War 2 and Gab getting kicked off GoDaddy. That can't possibly be an argument you really want to make. ~~~ badatshipping His argument is that few people caring about something doesn’t mean that thing doesn’t matter. ~~~ tptacek Isn't that, like, an extremely banal observation? It doesn't mean it _does_ matter either. Meanwhile: what was the point of comparing this situation to internment camps? ~~~ PavlovsCat Banally true, yes. > It doesn't mean it does matter either. Someone said something doesn't matter because "few people care", just one example of something that mattered and about which also "few people cared" refutes that reasoning. They're not making an argument, they're refuting one. edit: Another example would be Linus' announcement of Linux at the time. Few people cared, in contrast to the people who today find Linux extremely important, or depend on it without knowing. And there you go, I now made a "direct" (whatever that means) comparison between Linux and Japanese being put into concentration camps in the US, as well as a "direct" comparison between Linux and neo-nazis being deplatformed. The point matters more than the comparison used to make it. ~~~ TheSpiceIsLife > The point matters more than the comparison used to make it. Only if we assume the soundbite _it 's just like when Japanese Americans were put in concentration camps_ didn't happen. The point could have been made without the comparison, by writing something like this: _" Surprisingly few people cared" is a very poor metric to apply to a principle of rights and justice._ And then we can discuss how _social norms_ and _the legal system_ interact, rather than have _this_ conversation. ~~~ PavlovsCat The complaint wasn't that it was worded poorly, but that a direct comparison was made at all, using kinda spooky language such as " _It sounds suspiciously as if you 're drawing a direct comparison_" and " _That can 't possibly be an argument you really want to make._". English isn't my first language, even I had no problem understanding the intention of the words, and arguing against the "strongest plausible interpretation" is in the guidelines. > And then we can discuss how social norms and the legal system interact Personally I'm content with it being settled that "few people care" is an invalid argument. ------ mattsfrey It seems like many people are caught up in the details here and missing the wider principles.. What kind of internet do you want? I grew up with an internet that was entirely open and free, there have always been the hate dens and their garbage. I view domain services as essentially infrastructure, not arbitrators of content. If sites/services are being shut down at the infrastructure level, we've entered a new age of the internet and it is terribly frightening. ~~~ tptacek Stormfront is still up and running. They had a hard time getting access to the same QOS and pricing as do sites that companies actively want to host, but at some point we're complaining that white nationalists don't get FRAND terms, and it's a little hard to get worked up about that. Gab ran Twitter for White Nationalists off Digital Ocean, Azure, and who knows where else. Gab's users have a disconcerting tendency to blow up synagogues. Gab itself has a disconcerting tendency to recruit people who cheerlead anti- Semitism. Are we surprised they aren't getting the $15,000 startup promo credit from AWS? ~~~ mattsfrey Again, details.. What if every single domain company decides to blackball them? What do they do then? Nothing, they are off the internet. ~~~ wpietri I guess they'll have to return to sharing their desire to kill black people the old fashioned way, in person. Something you aren't grappling with here is the way the Internet has enabled previously-scattered terrible people to connect and self-radicalize. David Neiwart, who tracked various "patriot", white supremacist, and other fringe groups since the 90s, wrote a very readable book about how things have changed since then: [https://www.amazon.com/Alt-America-Rise-Radical-Right- Trump/...](https://www.amazon.com/Alt-America-Rise-Radical-Right- Trump/dp/1786634236) I definitely appreciate the early ethos of the Internet. It's a good founding myth, and I would like to work to keep things open by default. But if the worse 0.1% of humankind ends up not being able to host anything because otherwise they will work together to murder people, I am 100% ok with bending my "anything goes" bias a bit. ~~~ mattsfrey Actually inciting violence or conspiring to do so is covered under common law statutes and can be easily prosecuted. This is far different, it is companies deciding on their own volition to unilaterally ban entities from accessing the very "pipes". Today it's at the domain level, so the convenience of being able to type in a name versus an IP is what's at stake. What next, ISP's blocking traffic?.. Like I've said it's the principle. I believe in free speech and a free and open internet, if there is criminal activity the FBI, et al. can easily get involved. This is about the fact that the very infrastructure of the internet is largely dictated by private entities who are now imposing their own discretion based on content they object to, odious as it may be. I for one am not keen on allowing the sociopolitical whims of the time to dictate who is allowed on this great thing called the internet. I see something once pure, beautiful, and glorious entering its first stages of death. ~~~ b1daly I’m responding to your comment more as a representative of a general sentiment. The implicit psychological construct behind this little “mini-panic” around fringe groups be “de-platformed” is a common one: something bad is happening, and we are losing freedoms/rights/capabilities we (society) has in the past. It’s a variation on the notion that “the world is going to hell a hand basket.” The rhetorical fallacy is called “false idealization of the past.” In fact, the access of everyday people to a variety of mediated forms of communication is at historically unprecedented levels. In virtually the entire history of human society, access to powerful methods of communication was completely under the control of the elite power structures of the society. The problem that these new communication platforms are trying to deal with is unprecedented. It turns out there are unexpected consequences of allowing access to mass communication, and means of spreading propaganda, to “fringe” groups like “white supremecists” The problem is unique in a couple of ways. One is that it is only very recently, very recently, in our society (the US in this case) that the precepts of white supremacy have been “fringe!” In fact these are the hateful ideologies that built much of our modern world, on the backs of those unfortunate to have not been born “white.” This has been hard fought-for progress, and banishment to the “fringe” of these ideas is a major success. The attempts to drive these ideas even further to the fringe represents a triumph of humanistic values. Especially as reactionary groups inevitably fight back with whatever means they have at hand. It just happens to have happened right around the time that technology put methods of mass media into the hands of more and more everyday people. Using “De-Platforming” as a method of social control is entirely civilized, and justified. We have bedrock principles of free speech in the US, but those are almost entirely based around the idea of preventing the government from jailing speakers it diagrees with. To raise an alarm about, “well, what if your currently considered ‘progressive’ movement is deemed deserving of De-Platforming in the future” is a false alarm, because there simply are no historical examples to draw from. These technologies are too new. (Not just the technology, also the increasing ubiquitousness of networked communication.) It also pretends that in some philosophical sense, all ideas are equally valid, and is divorcing the content of ideas from the form. I don’t agree that all points of view are equally valid, and viewing ideas through the lens of “form” over “content” is antithetical to the very core concept of ideas and thought itself. IMO, people are too quick to trot out “slippery slope” fears about difficult problems. However, we can’t get “off of the slope” in a metaphysical sense. We are alive, until we aren’t,and must navigate the treacherous slopes of reality to the best of our capabilities. As both individuals and as members of society. ~~~ cousin_it > _The problem that these new communication platforms are trying to deal with > is unprecedented._ The early internet had to deal with the same problems, yet it was much more free than the internet of today. This isn't a false idealization of the past - I was around at the time. To me the only reason the internet matters is to let individual people speak and be heard - without being silenced by advertisers, the government, or the mob. If we let these entities institute censorship for the common good, we might as well have TV. ~~~ tptacek Large portions of the Internet were cordoned off from commerce altogether. There was a weekend back in the 90s (probably more than one, but this is the one I remember) where there was an Internet-wide netsplit that cut commercial ISPs like Ripco off from the rest of the Internet. Most conversations on the Internet took place on Usenet, and even in the alt. hierarchy, there were rules and politics behind what stuff got propagated. ~~~ hollerith I spent a decent amount of time on news.admin.net-abuse.email in 1993 and in the mid-1990s. (ISTR that is where spam on Usenet was mainly discussed.) I was very curious about Usenet, but recall no restrictions on any unmoderated newsgroup (and most newsgroups were unmoderated). I always believed that the reason it took years for Usenet to do something about spam is because (1) before spam got so bad they had to do something about it, there were no existing restrictions on the propagation of messages and (2) a widespread ethic among those running news servers that _any_ restrictions on propagation, even restrictions on spam, were to be avoided. What sort of content, in your opinion, was denied propagation back when most conversations on the Internet took place on Usenet? I got the impression that the ban on commerce over the US backbone was to prevent making any business big enough to be able to afford a PR person or a lobbyist in Washington afraid that the Internet was a threat to its revenue stream. Back when only a small fraction of the public knew anything about the Internet, the US Government was spending a relatively large amount of money keeping it running, and was consequently vulnerable to sniping from journalists and politicians to the effect that the US government is spending money to giving, e.g., people who are sexually attracted to people dressed up as animals, a forum to communicate with each other. You and I know that the _marginal_ cost of adding an alt.sex.furries news group to the Internet was so low as to be not worth thinking about, but it would've been hard to get that point across to the voting public. People were worried for example about the National Science Foundation, one of the major funders of the Internet, getting one of these: [https://en.wikipedia.org/wiki/Golden_Fleece_Award](https://en.wikipedia.org/wiki/Golden_Fleece_Award) Or maybe the ban on commerce over the US backbone was a concession the US backbone's patrons in Washington needed to make to get Congress to continue to allocate funds for it. The ban was mostly successful only because very few people _wanted_ to do commerce on the internet while the ban on commerce over the US backbone was in place. Possible exception: the last year or so of the ban when the internet was growing very quickly. Exception: people seeking W2 workers or W2 jobs rather than 1099 workers / jobs would've liked to be able to use ba.jobs to advertise, but IIRC it was a moderated newsgroup, and the moderator, like most people running internet infrastructure back then, grudgingly recognized the need for the ban (i.e., to protect the Internet's supporters in Washington from ridicule or from the animosity of powerful groups). ------ throwawaysea This is a good article that explores many of the angles involved. Deplatforming is a dangerous step for a free society, especially when so much power is accumulated in a few platforms* The big risk is this: when only a few entities funnel so much societal discourse or control our communication infrastructure or process payments, those entities making arbitrary decisions about who they serve has similar impacts and risks to the government imposing similar restrictions through the law. These companies should not act as a moral police and should not impose their own personal governance above what is minimally required by the law. Nor should they rely on the judgment of an angry mob to make decisions. Case and point, take a look at Medium blocking Gab, as referenced in this article. Gab's _statement about the shooting_ is being blocked? That is ridiculous, and unacceptable. And we should not patronize such businesses. * Spare me the tired arguments that these private companies have a right to not serve customers at will. That seems like self-serving cherry-picking, when in other situations the same folks would be against granting freedom of association. ~~~ roenxi > has similar impacts and risks to the government imposing similar > restrictions through the law We can't really compare them to the government until they have a standing army. That said, pure scale does matter. There will debate over whether powerful organisations are currently benign or hostile, but there is no doubt whatsoever that they are a mighty force. If Google or Facebook ever decides to seriously wake up politically, China's internet strategies will start looking very sensible. I don't agree with them either though. ~~~ dragonwriter > We can't really compare them to the government until they have a standing > army. While I disagree that the firms in question have government-like comprehensive power, even without their own army, a monopoly or coordinating oligopoly able to lock out new participants on essential communication services would have such power, and be a de facto part of the government, even if they lacked formal command relationship over the armed forces of the host state. ------ DoreenMichele _Gab illustrates a “catch-22” around setting out to be specifically a “free speech platform”. You initially appeal to the most fringe elements of public discourse. Your first wave of users are going to be people for whom this has been a problem, and if you’re an absolutist and let them on then suddenly that’s your base._ For me, this is one of the more profound take-aways from the article. This piece is very thought provoking. ~~~ teddyh Yes, the first wave defines the project; if the first wave has problems, the project is infused with these problems. This is true of free software projects also. I have a couple of examples: • The KDE project (to create a nice graphical desktop environment based on the X windowing system) was initially formed around using the Qt library for graphical user interface widgets. The Qt library had, at the time, a somewhat friendly but distinctly non-free license. The first wave of developers on KDE, therefore, were developers who considered proprietary software and/or sketchy licensed to be A-OK.¹ This will probably forever define the development practices of the KDE project. • The Go language is, by many accounts, a very nice programming language. But it was started, and still run, by Google people, for Google purposes, and with Google backing. This means that the first wave of developers were and are those developers who think it’s perfectly fine to _work at Google_ , or to work with Google to further Google’s goals. People who don’t like Google will of course have stayed away from the Go project at the outset, and so the developer elite of the Go project will probably always reflect Google values and priorities. 1\. Those developers who did not agree went on to start Gnome, which is in fact the very reason Gnome was started. ~~~ DoreenMichele Yeah, that's obvious on the face of it and not what grabbed me. I'm fascinated by the power of positioning of the creators of the project and how easily that can go wrong. That has long fascinated me and this is an incredibly powerful example summed up in a nutshell in the paragraph I quoted, which is a rare thing to see. ------ woodruffw > Most successful deplatformings are Pyrrhic victories We have reasonable (not perfect!) empirical evidence that this is _not the case_ [1]. It appears that toxic and hateful movements can only resist disapprobation when they develop a sufficiently large, sufficiently public (in the visibility sense, not the publicly-owned sense) channel. Continually disrupting those channels works. [1]: [http://comp.social.gatech.edu/papers/cscw18-chand- hate.pdf](http://comp.social.gatech.edu/papers/cscw18-chand-hate.pdf) ~~~ stcredzero For awhile, the Soviets could "deplatform" people from their lives entirely by threatening them or sending them to the Gulags. They held things together for many decades through that continual disruption. Yes, you can coerce people with your advantages, and it will work for awhile. You can even create enclaves where you can keep undesirables out. But no, that never wins in the end. ~~~ woodruffw > For awhile, the Soviets could "deplatform" people from their lives entirely > by threatening them or sending them to the Gulags. They held things together > for many decades through that continual disruption. I take the scarequotes there to be you admitting that gulags aren't really deplatforming -- it's a government terrorizing its citizens. Nobody in this conversation is interested in building gulags or putting the undesirables in them. > Yes, you can coerce people with your advantages, and it will work for > awhile. You can even create enclaves where you can keep undesirables out. > But no, that never wins in the end. I don't understand this reasoning. I've presented some research indicating that banning hateful online communities actually does have some kind of positive effect, and your response it that it "never wins in the end"? What is the "end" here? Do we have _any_ sort of evidence or overarching political theory that suggests that it _doesn 't_ win in the end? Most of us are on board, intuitively at least, with the notion that you can't have both a dictator and be a democratic republic. Why are we so hesitant to accept that other entities fundamentally conflict with the notion of liberal democracy? ~~~ stcredzero _I 've presented some research indicating that banning hateful online communities actually does have some kind of positive effect_ I'm sure that you can find a Soviet study indicating that certain of their programs had an effect against Bourgeois oppressor thinking and activity for some number of years. _Why are we so hesitant to accept that other entities fundamentally conflict with the notion of liberal democracy?_ Conditioning a society to accept the practically suppression of free speech fundamentally conflicts with the notion of liberal democracy. ~~~ woodruffw > I'm sure that you can find a Soviet study indicating that certain of their > programs had an effect against Bourgeois oppressor thinking and activity for > some number of years. Again, no gulags here. Just Twitter, Reddit, and bad clones of the aforementioned. It's also worth noting that the Soviet Union, at its best, simply _was not a liberal democracy._ The position that I'm taking is nonsensical outside of a liberal democratic context, so comparing it with various inhumanities under a non-democracy is unconvincing at best. > Conditioning a society to accept the practically suppression of free speech > fundamentally conflicts with the notion of liberal democracy. We're talking about the scope and structure of liberal democracy itself, a discussion that's been going on for as long as liberal democracies have existed (others have brought up Popper, but Popper cribbed the idea from Immanuel Kant). There's no conditioning going on. ------ jstanley > Does this mean that if Zerohedge, or Black Lives Matter, two of our clients > from opposite ends of the political spectrum, post something, or even if one > of their users posts something, that is beyond the pale, then we have to > worry about having our finances cut off? > I know as “the DNS guys” we have a near pathological aversion to single- > points-of-failure, but it’s not a stretch to come to the conclusion for any > business that it’s not an acceptable risk to have that possibility just > looming there and to do nothing about it. > That means we will now be looking for backup payment processors. FWIW, this is _exactly_ what Bitcoin does well: uncensorable payments with no single points of failure. And, by way of anecdata, I currently pay for domain names in Bitcoin already (from gandi). People buying domain names are probably one of the best demographics to have if you want to take Bitcoin as they are likely to be technically savvy. ------ djsumdog What's interested about Gab is that it wasn't content hosting on another platform (Facebook/Twitter). It was their own platform, that people wrote and built. What if you run a Plemore/Mastodon server that has users with controversial content? Is it okay for Vultr or DigitalOcean or Amazon to just yank your account? Sure you can claim capitalism and find another provider, but we've seen here that finding another provider is hard and migration is expensive! I wrote about this almost a year ago when it happened to The Daily Stormer and I still think it's more relevant today: [https://fightthefuture.org/article/the-new-era-of- corporate-...](https://fightthefuture.org/article/the-new-era-of-corporate- censorship/) Shutting down platforms just drives people to more extreme platforms. You can't just yell "decentralization" because then you could have providers pulling individual instances of federated ActivityPub/OStatus based software. At some point we're going to need to address free speech online, because it's not like the real world. You can't just go to another news stand or buy your own printer. There are a limited of people that can host general purpose VMs at a reasonable price with a decent provisioning API. The domain issue is the most troubling. I don't see any reason a registrar should be allowed to pull domain services from people. Right now it's just content some people don't like, but what if a business starts pulling domain registrar service for business they just don't like, and claim it has to do with hate? ~~~ wuliwong I agree that there is a difference between deplatforming gab and someone like Alex Jones. I don't think that any solution is going to be a permanent one, whether it is a law or a technology. I tend to look towards technological advancement to first outpace laws and then the govts slowly catch up. I do think that decentralized storage solutions behind decentralized applications are pretty interesting. There is even something called IPFS which is being pitched as a possible challenger to HTTP. In some of the distributed solutions, the computers holding the data only ever see it encrypted, so the possibility of censorship on that end is mitigated at least for a while. I'm not expert on the topic but I've recently found it very exciting and has given me a glimmer of hope. ------ kmooney > We run the risk that the act of deplatforming can become as extreme as the > hate speech it seeks to banish. Let us cross that bridge when we get to it. ~~~ colonelpopcorn Pretty sure we're already here. Ignorant or evil folks won't become enlightened or good if they can't use the internet. ~~~ fhood No, but they will be isolated, and an isolated person is powerless person. ~~~ colonelpopcorn Seems like a recipe for creating a lot of people with very little or nothing to lose. ~~~ fhood Nah, I think the real danger is when they find others who re-affirm their convictions. ~~~ jesssse You are advocating isolating, deplatforming, etc.. These are tactics that hurt. Hurt people hurt people. If people are allowed to be heard and socialize, they gain happiness and are less likely to hurt people. ------ wuliwong The conclusion of the article where it speaks about the consequences of de- platforming people leading to 'counter measures' is what I'm thinking will happen. In my opinion, the difference between government censorship and godaddy censorship is that I can just stop using godaddy. Then I can either close my business, use a different service, or try to help build something new to circumvent godaddy. I've been back and forth on distributed storage and blockchain in my mind but my current thinking is that the recent de-platforming is going to hasten the development of alternate solutions that are more robust with regards to censorship. I'm not even considering about whether it is right or wrong, I just think that's going to happen. ------ justaaron Despite all the handwringing here, there's no concrete proposal for what to do with rent-seeking attention-seeking deliberatvely difficult individuals whom one has no obligation to entertain the ideas of. If I were NYU, I would simply never book Milo Whatever-his-name-is. Having to deplatform him indicates that someone wanted to platform him in the first place. Kick his useless ass to the curb/kerb, as the case may be. ------ superkuh As long as the ISP stays as a dumb pipe there will always be alternatives. Self hosting is the best hosting and these days ISP connections are definitely fast enough to host anyones' small personal site up to a medium size forum. Hopefully as this wave of authoritarian practices sweeps the globe and the 'net people will simply adopt federated services like IRC or notabug for communication and host it among themselves. ------ tomohawk A private company has quite a bit of latitude, until it becomes a monopoly (or part of an oligopoly). Monopolists always hide behind the "but, we're a private company" defense. Who wouldn't? Settled law and legal tradition holds that we tolerate a monopoly only when they are regulated and conduct themselves in a manner that is fair to all. It is unacceptable for monopolists to infringe on peoples constitutionally protected rights. When a monopolist offers a service, they have to provide it to everyone. We can't have electric monopolists cutting power to people because they voted for the "wrong" party. We can't have banks and payment processors making it practically impossible for people to conduct commerce. Going down that path leads us to where China already is. Calling someone on the phone leads to a message about how the person is socially unacceptable and that proceeding with the call may cause you to be similarly blacklisted. Or, you just get phone access cut off. ------ adamrezich The problem with free speech on the Internet is that our human minds have not sufficiently evolved to even remotely begin to understand just how fundamentally the Internet changes our perception of our fellow humans. Dunbar's number shows that we're only able to keep track of a very small number of ongoing human relationships relative to the Internet-connected population of the planet, and at a societal level we're used to only hearing ideas from people around us, and those in published works or in mass media such as radio and television. Yet now anyone, literally anyone, can go online and proclaim whatever they want in certain online public spaces. If I walked into a local bookstore and saw a whole shelf dedicated to white supremacy, I would rightfully be appalled that it was allowed to exist, because stocking such books would reflect on the bookstore. The Internet is like a bookstore where anyone can write a book and guarantee it's stocked, and free to read, and therefore completely unlike a bookstore at all. Yet we tend to think of online discussion platforms in these terms because the idea of a true online free speech platform where only content that is Actually Illegal is taken down and reported to the authorities accordingly is still incredibly foreign to us at a societal level. Someone who's never used the Internet and never met any (for example) white supremacists in their lives may go online for the first time and see an active discussion among white supremacists taking place, and this causes cognitive dissonance: "I've never met a single white supremacist in my life, yet here's _dozens_ of them, virtually congregating and discussing their racist viewpoints! What the hell is happening? Is the Internet full of racists?" Humans are terrible at comprehending numbers on the scale of "the number of Internet-connected users in the world," so it's hard to understand "the proportion of vocal white supremacists online compared to the total number of people using the Internet in the world is just about as small as you previously thought it was" when they're given the same equal voice as everyone else. There's no easy solution to this. Unless a massive societal shift in understanding how the Internet works and fits into modern human society happens, "safe" yet censored platforms like Twitter will always be more popular with normal users compared to "true free speech" havens like Gab, and generally-offensive extremist viewpoints will congregate on services like the latter after being kicked off of services like the former, making services like the latter a hard sell to people who don't hold extremist viewpoints themselves, in spite of the promise of unrestricted free speech. It's been wild seeing the increase of people openly advocating _against_ unfiltered free speech on the Internet as the Internet has gotten popular with the rise of smartphones, to the point where some people seem to consider "free speech" a "talking point" or "dogwhistle" of "the other side." Until the singularity happens and we become one global consciousness and ascend to a higher plane of being, we're never going to have uniform beliefs as individual members of our species, and people with offensively extremist views will always exist. Silencing their views on a given platform out of a sense of righteousness and justice may feel good but solves nothing. You cannot change peoples' minds or eliminate ideas by making them illegal or against platform policy to express. Once you acknowledge and internalize this, browsing the Internet and occasionally coming across extremist opinions becomes a lot easier to grapple with. ~~~ stcredzero _The problem with free speech on the Internet is that our human minds have not sufficiently evolved to even remotely begin to understand just how fundamentally the Internet changes our perception of our fellow humans._ Douglas Adams understood. (Babelfish) ~~~ YouAreGreat > our human minds have not sufficiently evolved They're also not evolved to deal with TV news. ~~~ stcredzero Hell, I don't think we're all that good with distorted print media either! ------ SideburnsOfDoom > We run the risk that the act of deplatforming can become as extreme as the > hate speech it seeks to banish. So, they're saying "I won't help your speech reach millions" runs the risk of being as bad as encouraging the idea that "all $ethnics must die" \- speech which as very real and deadly consequences. I don't know where to even with that. Someone has not though it through at all. Is the rest worth reading? ------ cauwelaert People should have a chance to speak their mind but in an ideal world decency would prohibit some things from being said. It's dangerous when certain platforms who coordinate with government agencies decide what is acceptable and what is not. I'm not ready for a ministry of truth like snoopes. ------ InclinedPlane Read this instead: [https://datasociety.net/output/oxygen-of- amplification/](https://datasociety.net/output/oxygen-of-amplification/) ------ wstuartcl Freedom of speech is a right provided by the constitution. Me, You or privately held platform(s) providing the venue for that speech is not. Just like I will not be allowing GAB like speech from my properties, I will also look poorly upon anyone else hosting that garbage. ~~~ neuralk >Freedom of speech is a right provided by the constitution No, it is not. It explicitly is not. Freedom of speech is one right among many other unstated rights held in common by the people. The first amendment merely prohibits Congress from passing a law that restricts it. The wording is clear that this freedom is something that exists inherently beyond the scope of the Constitution, and is certainly not "provided" by the document. We naturally have rights such as freedom of speech. It is from institutions like the government that restrictions are placed on them. Also, the 9th amendment was included precisely to clarify and codify the fact that the Constitution, in enumerating the rights, is not itself granting those rights or even stating that these are the only rights people have. ~~~ tptacek The 9th Amendment does not mean that Twitter must allow your speech. In fact, at the time the 9th Amendment was drafted, it didn't even require _the states_ to grant you a right to free expression; that right wasn't incorporated onto the states until Reconstruction. So, no, not so much. ~~~ dragonwriter > that right wasn't incorporated onto the states until Reconstruction. Much later, actually; while the Supreme Court grounded incorporation in the Due Process clause of the 14th Amendment, which was part of Reconstruction, the doctrine of incorporation was articulated and developed in the 20th Century, starting, IIRC, with _Gitlow v. New York_ in 1925. ------ mlillie This reeks of both-sides-ism and enablement. "Where does it stop?" is the same slippery slope garbage peddled by #HimToo and #BlueLivesMatter acolytes. But even engaging with the question at face value, the answer is very simple, and the author of this piece didn't try very hard if he couldn't find someone who is able to answer it. In fact, the best answer was given by Karl Popper in 1945. > In order to maintain a tolerant society, the society must be intolerant of > intolerance. That's it. Platforms like Gab are themselves intolerant, and we must continue to be intolerant of them. ~~~ stcredzero _This reeks of both-sides-ism and enablement._ The whole point of Free Speech is to enable all sides of any issue to have their say. That is a fundamental mechanism against totalitarianism. _In order to maintain a tolerant society, the society must be intolerant of intolerance._ Sorry, but Karl Popper's idea is just Orwellian nightmare fuel. "War is peace. Freedom is slavery. Ignorance is strength." Tolerance is to live and let live. Oppressing those you disagree with is the very opposite of tolerance. (Even if they are truly horrible people.) If Silicon Valley were tolerant, they'd let Gab live and possibly be a cesspit of horribleness. A society that de-platforms and un-persons everyone and every idea it doesn't like isn't a free society. That's not a free market of ideas. That's totalitarianism through economic hegemony. ~~~ archagon Totalitarianism is gaining power _right now_ through bad actors operating under the cloak of free speech. The bigger their communities get, the more they infect the communities around them with their hatred and lies. This should be blindingly obvious if you’ve been online for more than a couple of years. Your mechanism against totalitarianism will lead you straight into a dictatorship. ~~~ BurningFrog This is the "fascism is infectious" theory, under which we are all potential fascists if we just get exposed to the "infection". By this theory fascism is somehow so inherently attractive that is has to be regulated similar to an addictive drug. ~~~ archagon People are surprisingly easy to reprogram. You can read countless stories of once-liberal parents turning into hateful conspiracy nuts in their old age out of prolonged exposure to right-wing media. If you see people around you saying “white males are undergoing a genocide” or “brown people are criminals” every day, chances are you’ll eventually start to internalize some of those talking points. Without tremendous effort, we’re nothing more than a rough aggregation of the opinions we surround ourselves with. ~~~ philwelch > People are surprisingly easy to reprogram. Not you, though. No way could YOU be under the influence of a totalitarian ideology despite the fact that you are _openly advocating restricting basic human rights_. ~~~ archagon I am advocating the right for private organizations to ban fucked-up ideologies from their services. That this is being framed as some sort of totalitarian assault on free speech shows just how far the right-wing rot has gotten. The balance fallacy will be the death of democracy in America. ~~~ ThrowawayR2 > _I am advocating the right for private organizations to ban fucked-up > ideologies from their service._ Can we start with yours? /s This has nothing to do with "right-wing rot". We already have ample historical examples of what happens when those wielding power, whether religious, royal, or financial, can suppress views and speech and it wasn't a good thing! The Enlightenment and the birth of the liberal movement (now classical liberalism, I suppose) were in reaction to those abuses and they fought many hard battles to get us the rights we enjoy today. It would be insane to throw that away for a little temporary advantage. ~~~ archagon You're speaking as if these groups are working to amend the Constitution. It's a ridiculous comparison. Worse yet, all this anger is a massive distraction. We should be talking day and night about the rampant voter suppression and e-voting security flaws that _do_ actually pose an existential threat to our democracy. But no, let's just focus all our attention on Gab for weeks on end. ~~~ ThrowawayR2 > _We should be talking day and night about the rampant voter suppression and > e-voting security flaws that do actually pose an existential threat to our > democracy._ In that much, at least, I will agree with you. ------ throwawaysea Why is this article being flagged? From [https://news.ycombinator.com/newsguidelines.html](https://news.ycombinator.com/newsguidelines.html) > If a story is spam or off-topic, flag it. This story is not spam, and it is not off-topic since it clearly relates to current news in technology. ~~~ hcg People flag controversy because they want to avoid flame wars and this place devolving into political discussion constantly. ------ happilycentrist In my other writings, I've touched on how these tech companies compromise their stability and reliability when they engage in witch-burning campaigns. For example - once upon a time, I could trust the google search engine, g-mail and the chrome browser. I recommended them to other people, and utilized them myself. But now, I can't in good faith steer folks to any google property, because they run the risk of losing access to their data. Today it's fashionable to cut off GAB, what will the moral panic of tomorrow be? Another example - I used Pay-pal weekly to make purchases and send money to people and causes I supported. But after PayPal began denying service based on what keeps the outrage mob mollified, I've closed my account and have been helping website operating on the dissident right to transition away from a system that might deny them service on a fit of whimsy. Paypal, like so many other platforms, has become too unreliable to be a single point of failure. All of these institutions were, until the last few years, treated like utilities - which bolstered their reputation for reliability. But now, so many of these giant Near-Monopolies have decided to become overtly political, denying their services without any manner of due process or even a reasonable amount of notice to the people being cast off. This damages the brand reliability, and where once customers could rely on their Registrar, Host, or Payment Processor, they now must consider it imperative to have redundant systems - lest they risk having their service cut because they suddenly find themselves on the bad side of "the fashionable opinion" of the hour. (Goal- posts that move by the hour, and today's cleric of the faith can easily find themselves tomorrow heretic). A high-trust business environment is required to maintain the sorts of business relationships a content creator enters into with a platform/host/registrar. The fact is, as it stands now, no content creator, business or group can trust these tech-corporations to maintain a stable relationship - or even adhere to a basic contract - in good faith. Once a company - like PayPal for instance - has proven itself unreliable, it has already done half the work of replacing itself. ------ StuntPope Article flagged. Nice. Love the tolerance and receptiveness to discussion here. ------ wisty While Americans seem obsessed with defining "free speech" as being exactly the same thing as the 1st Amendment, it might help to ask exactly why the 1st Amendment is a good idea. JS Mill argued that censorship is wrong on a rights basis, that it leads to bad ideas being unchallenged, and it leads to people not being able to understand the reason why ideas are rejected. If censorship by a government is harmful, how is deplatforming by a near-monopoly different? I suspect some left-wingers argue this in a hypocritical way, because they think it will "trigger the conservatives" to force them to attack the actions of private companies, but this is hardly a good argument. ~~~ YouAreGreat > "trigger the conservatives" to force them to attack the actions of private > companies Conservatives will come to understand that big capital is not a conservative. ~~~ wisty I'm not personally a conservative, but I'm pretty sure conservatives are not all hardcore libertarians or objectivists. Some of the intellectual brain- trust of conservative thought is libertarian or objectivist, but a lot of the broader conservative movement is not. ------ CM30 I've said it before, and I'll say it again; online platforms needed to be treated like their offline equivalents. Why can an ISP not censor traffic but a web host can? Why can the utility company or a credit card processor not 'shut down' customers they disagree with while the likes of Cloudflare or PayPal or Stripe can? There's no logic behind this. No, you can't just say 'offline stuff has a monopoly', because it doesn't. It might in some parts of the US (where choice in ISPs is limited), but it certainly doesn't in much of Europe, other parts of the US or other countries around the world. You've got multiple choices for banks and building societies, multiple choices for electric companies and multiple choices for ISPs, yet we're sane and don't let them discriminate by political views at will. It's time similar standards were set up for online services too. If you market yourself as a platform or network or service that should be morally neutral, then you should be obligated to act that way, just like your offline equivalents generally do. There should always be a way to host a platform for your views, no matter how many people hate them and you in the process. Google and Apple should also be looked into in regards to their app stores too. They're defacto monopolies on their platforms (unless you jailbreak them), and their standards for what's 'acceptable' are clearly broken and biased to all hell. Apparently something like Gab isn't allowed, but dozens of copyright/trademark/whatever infringing ripoffs are? It's fine for apps to ripoff consumers and target kids with exploitative in app purchases but not provide a platform for 'questionable' views? Yeah, that doesn't add up much, and it's clear they're falling short as both a platform and a publisher. Finally, something should definitely be done about the whole 'contact their employer and try and get them fired' crap. I'm not really sure what, but there should be a legal way to stop people trying to screw over people's livelihoods based on online disagreements. Maybe an actual ban on contacting someone's employer/company/coworkers unless it's about illegal activity? I don't know, anything I can think of seems like it'd hurt freedom of speech more in the attempt to save it. But something does need to change, before the laws basically become ineffective and trial by media/mob becomes the judge, jury and executioner. ~~~ TheAceOfHearts Unfortunately, credit card processors can and do deny services to people with which they disagree. To give one example: you can't use any mainstream payment processors for anything related to pornography. Also, on Android you can run alternative app stores without having to "jailbreak" the phone. One example of this is f-droid [0]. You just need to change a single configuration option to allow installing APKs from third-party sources. Fortnite is an example of a popular Android game which you have to download and install outside of the Play Store, presumably because they don't want to pay for the large cut that Google normally takes. I think domain name registrars should probably be treated like utilities, although I'd have to think it through very carefully to consider any consequences. I'm generally in agreement that platforms should be neutral, otherwise they should be treated as publishers and be forced to deal with the consequences. It sets a poor precedent when rules are not enforced evenly. [0] [https://f-droid.org/](https://f-droid.org/) ~~~ amanaplanacanal Are there any platforms that are still neutral? It seems like reality has shown those that tried to be, that really, they can't. Spam takes over your email, hostile ads take over your advertising space, trolls take over your forums. Maybe there is some way around this, but I have no idea what it might be. ------ Krasnol > The next challenger to Twitter will not be another centralized platform like > Gab. It will be decentralized – perhaps a federation like Mastodon, where > each node runs its own CoC and community standards – similar to IRC days. You might want to ask Wil Wheaton what he thinks about Mastodon... ~~~ mmirate Why is some random actor's opinion unusually important, let alone on a technical topic such as this? ~~~ Krasnol Because what happened to him is relevant to the topic.
{ "pile_set_name": "HackerNews" }
We have bought followers fo $5 and discovered 15M botnet on Twitter - investjtravolta http://sadbottrue.com/article/15/ ====== MichaelGG 15M is nearly 5% of Twitter's active users, or all the growth they've had in 2015. Assuming these bots are "active". ~~~ marak830 If it's true, I wonder what effect it will have on the value of Twitter(I do assume this isn't the only one). If it turns out half the use base is made out of bots or non-active registered users that is. ------ DougN7 Besides these 'obvious' bots, there are more that have humans in control, but which the humans never read tweets, they just post them. I would bet, though have no data, that there is a large percentage of these 'post-only' accounts. Not sure if they should be called bots or not... ------ imaginenore $1M from 15M fake accounts is rather low. 6.67 cents per account. Isn't it easier and much more profitable to fake click ads at such scales? Also getting 15M fake accounts means getting 15M fake emails, which isn't cheap: [https://buyaccs.com/en/](https://buyaccs.com/en/) ~~~ ryanlol >Also getting 15M fake accounts means getting 15M fake emails, which isn't cheap Unless you create them yourself, which seems rather logical if you're in the account creation business anyway. ------ ikeboy So you spent $40,000 to reveal those bots? All to write a short blog post? Am I missing something? ~~~ marak830 I think that's how much it would cost or the full amount. I do think they spent $400 though. Very weirdly written article.
{ "pile_set_name": "HackerNews" }
How the Feds Took Down the Silk Road Drug Wonderland - hepha1979 http://www.wired.com/threatlevel/2013/11/silk-road/ ====== belorn If this has not been posted before, its good to see that all the worries about the tor protocol can be laid to rest. They did not identify the server by some advanced technical hacks against tor. They used simple basic police methods and arrested an administrator with the use of an undercover agent posing as a drug seller. The administrator purchased a kilo of cocaine, and by doing so, gave his home address to the undercover agent. After interrogation, they gained user credentials that even included DPR's private messages. This could have easily been a episode script for the wire. ~~~ bediger4000 If simple, basic police methods sufficed here, then why the massive dragnet surveillance the rest of us are caught up in? Either (a) the dragnet surveillance isn't doing what it's supposed to or (b) there's another reason for the spying. And yes, I could be accused of whipping on the NSA no matter what, that in my view, they're damned if they do, and damned if they don't. So what? Even if I don't have "standing", and the NSA is doing "legal" things, and the 3 Prong Test for Violations of Privacy hasn't been met, the NSA is still doing things that until recently were considered grossly unamerican, a violation of the principles that made the USA different than commie Russia. ~~~ nitid_name You're forgetting: (c) parallel construction lead to the "simple police work" success. It possible that this wasn't such a cut and dry case of police work, and instead the police were handed leads that came from the NSA work. ~~~ belorn The differential factor of an conspiracy theory, and a plausible event is the matter of indicating clues. In this case, there is not a single indicating factor to point towards the conspiracy theory of parallel construction, so why should it be considered? An other equally plausible would be that the silk road was a false flag operation, run by a undercover unit. Nothing points in that direction either, but hey, it "could be" right? ~~~ aliakbarkhan I think you're too quick to dismiss the possibility. The point of parallel construction is that the police construct a plausible (and, more importantly, legal) means of finding the evidence that they used in an investigation that masks its true, illegal origin. More importantly, unlike false flags -- where the only "evidence" for their use is the ravings of conspiracy theorists and some internal suggestions by government officials in the 60's -- parallel construction is a technique that we know the government uses by their own admission. From Reuters ([http://www.reuters.com/article/2013/08/05/us-dea-sod- idUSBRE...](http://www.reuters.com/article/2013/08/05/us-dea-sod- idUSBRE97409R20130805)): > The undated documents show that federal agents are trained to "recreate" the > investigative trail to effectively cover up where the information > originated, a practice that some experts say violates a defendant's > Constitutional right to a fair trial. [...] > After an arrest was made, agents then pretended that their investigation > began with the traffic stop, not with the SOD tip, the former agent said. > The training document reviewed by Reuters refers to this process as > "parallel construction." > The two senior DEA officials, who spoke on behalf of the agency but only on > condition of anonymity, said the process is kept secret to protect sources > and investigative methods. "Parallel construction is a law enforcement > technique we use every day," one official said. "It's decades old, a bedrock > concept." > A dozen current or former federal agents interviewed by Reuters confirmed > they had used parallel construction during their careers. Most defended the > practice; some said they understood why those outside law enforcement might > be concerned. > "It's just like laundering money - you work it backwards to make it clean," > said Finn Selander, a DEA agent from 1991 to 2008 and now a member of a > group called Law Enforcement Against Prohibition, which advocates legalizing > and regulating narcotics. Given how they talk about parallel construction, it certainly sounds like it's not an uncommon technique, so do you think it's so implausible? I'm not going to say they did or didn't use it, because the simple fact is that I don't know, but given that "Parallel construction is a law enforcement technique we use every day" that is "decades old, a bedrock concept," it doesn't seem too implausible that they would use it in such a high profile and important case. ~~~ belorn One should not quickly to dismiss the possibility. Especially, one should keep a eye out since the proof of parallel construction as a tool is indeed verifiable true. But in the mean time, one should not jump to it directly when more simpler explanations are available. Using undercover cops to entrap drug sellers is even older, and even more common method than parallel construction. It also extremely simple and effective. I would also suspect, that entrapping a first time offender, an 47 year old administrator who sells drugs anonymously on-line from his home, to not be very hard. Especially if the undercover cop could impersonate flawlessly established "trusted" drug sellers by taking over their accounts, as it seems to be in this case. All points toward parallel construction as an something that might had been, but in this case, is less likely to actually have happened. ------ tptacek _Investigators staged the torture and killing — which included mock waterboarding according to officials — and sent Dread Pirate Roberts about half a dozen pictures, including photos depicting what they said was his corpse._ So much for the absolutely inane "it was all a face-saving ruse" theory of the murder-for-hire scheme. ~~~ MichaelGG I think that "face-saving ruse" was in relation to the second "hit", which sounded incredibly implausible. Someone says they need $500K and blackmails DPR, then the creditor shows up and is willing to kill the blackmailer for 20% of that? Yeah, OK. The details on the first "hit" weren't known before, were they? And it still doesn't invalidate the logic behind it some people were proposing: _Given the prior that the USG will do harm to SR users and dealers_ , is it less harm to kill one person that is going to give information to the USG? (Again, that logic only works if you take the assumption that the USG is acting immorally and will impose a large amount of suffering onto many others.) ~~~ tptacek It freaks me out that anyone would believe that any amount of message board political bullshit could justify murder. But I bet you're right. ~~~ MichaelGG Murder is justified for all sorts of reasons. IIRC, the US was founded on a base of murdering people over disputes on taxes and government. Treason was (or is?) punishable by death. I'm not sure why message board political bullshit is intrinsically less valid than "official" government or LE reasons. Additionally, most people believe lethal force is justified in cases of defense. It's not a huge jump of logic to view these hits as defense. ~~~ georgemcbay "Additionally, most people believe lethal force is justified in cases of defense. It's not a huge jump of logic to view these hits as defense." uh, wat? The dude was a drug dealer protecting his criminal empire. If I'm robbing a bank and shoot a cop who is going to shoot me, is that also defense? So I should be charged for the original crime but not for killing the cop? Because that's pretty much what your argument sounds like to me. ~~~ MichaelGG I'm not saying he's right and not criminally liable for his actions. I'm just questioning why people are so confused as to why this is justifiable, in some peoples' opinions. As to the specific example: If someone is trying to shoot you, no one would wonder why you shoot back. The bank robber would be held responsible because it's his action of robbing the bank that started the whole mess. If you were sitting peacefully in your home, and someone broke down the door and started firing, you'd be quite justified in returning fire. (Even legally, depending on state, AFAIK.) Folks sympathetic to DPR are more likely to view him in the second category. He was peacefully minding his own business running a marketplace when someone threatened him, his buyers, and his vendors. These folks are likely to view access to medicines as a moral action, and thus DPR and people involved with SR to be people doing the right thing, despite an oppressive government ------ jdmitch This seemed a bit worrying: _Federal agents say the use of Tor and Bitcoin were major obstacles for them and that investigating the site was “uncharted territory” that involved a reversal of their usual investigative methods. Instead of starting with probable cause against a specific suspect who is already identified and then obtaining a search warrant to collect more evidence, the investigation of Silk Road involved collecting evidence from the site first and then trying to identify individuals._ Sure it is "uncharted territory" in terms of the technology for maintaining anonymous identities, but shouldn't most investigations start with evidence of the crime and an empirical investigation into who could have committed it, rather than starting with suspects and trying to link them with the crime? Maybe I am naive, but sounds like dodgy criminal investigation methodology to me... ~~~ saraid216 > shouldn't most investigations start with evidence of the crime and an > empirical investigation into who could have committed it, rather than > starting with suspects and trying to link them with the crime? This might surprise you, but there are very often situations where the police and the public are remarkably aware of the facts of the crimes being committed, but unable to do anything about it. Drugs fall into this category. Everyone knows that "that's where the deals go down" and "that's where they count the money", but that's only because we're not completely stupid. Proving direct culpability, on the other hand, is an entirely different story, as is proving the culpability of people who matter. (Street level dealers, for instance, are pretty interchangeable: one gets shot, you get someone else to do his job. Ain't no thing.) If you find a druggie on a corner, it's not exactly a stretch of the imagination to recognize he's probably guilty of possession. It's also sort of pointless to prosecute him, since the actual issue you're fighting is lots of people _taking_ particular drugs, which means what you care about are the people _managing_ the city-wide operation. You want evidence of that crime? That's also the druggie on the corner. Half of whom can tell you exactly who it is who manages the city-wide operation. None of which are willing to take the witness stand to accuse him in a court of law. Because he knows that he goes right back to that corner the next day and not only does he no longer have someone bringing him drugs, but he's also get a bullet in his head for the trouble. If you want a visceral primer, watch _The Wire_. ~~~ WildUtah _the actual issue you 're fighting is lots of people taking particular drugs, which means what you care about are the people managing the city-wide operation_ That is a complete non sequitur. Actually, if you really want people to stop using drugs, arresting and imprisoning users is the single most effective technique yet known. It's especially effective against the middle class white population that consumes most drugs in the USA, but it works against poor minorities and addicts, also. And if you want to stop dealers, arresting and imprisoning retail dealers is the most effective technique. It clears the ones that work in public or sell to strangers out quite quickly. Arresting the kingpins or traffickers is totally ineffective at reducing drug use or reducing drug availability. If reducing public harm were a priority, the kingpins and traffickers could be ignored. Once the users and retailers are imprisoned, the bosses are out of business, anyway. And if you do catch the kingpins and traffickers, your efforts are completely ineffectual. There are always more kingpins in line to get rich quickly and easily. Decades of police targeting kingpins has only seen increases in drug availability. In fact, the faster you turn them over, the more violent the whole business becomes. The reason police agencies target kingpins and traffickers is because the purpose of the war on drugs, from the point of view of police administration, is to seize cash to fund police operations. There is no law enforcement justification for such a policy, merely an agency budgeting justification. ~~~ saraid216 > That is a complete non sequitur. Agreed. I'm not remotely a fan of the war on drugs or its consequences for the prison-industrial complex or the militarization of the police. The real root is really shitty legislation based on shitty moralizations based on shitty philosophical grounds, the absurd nature of how the police are funded, and the ridiculous political reality of law enforcement offices. It's such a multifaceted problem that I'm unwilling to try to tackle it myself. But all of this was just a handy example for why wishing for an "empirical investigation" is not necessarily the right way to go about things. ------ Xeroday I wonder how much of this was actually parallel reconstruction vs "investigative research" ~~~ tptacek How exactly would parallel construction have helped here? To effect a search, with or without "parallel construction", you have to have probable cause. ~~~ bandushrew the entire _point_ of parallel construction is to construct a legal explanation for the presence of data needed for the conviction. ie, I would use illegal means to obtain proof that you have convicted a crime, then I would use parallel construction to provide a legal explanation for how I obtained the proof. iee, parallel construction is what they use when they did not have probable cause. I am having trouble believing that you do not understand that? what am I missing? ~~~ tptacek You're having trouble because you are incorrect about how parallel construction works. Parallel construction is not the Orwellian term for simply "coming up with a bullshit story about where you got your evidence when it in fact came from NSA". Instead, it is the Orwellian term for "coming up with the complicated story of what precise piece of unrelated probable cause enabled you to effect a search that was motivated by evidence that came from NSA". Notice that the latter definition includes some notion of some kind of probable cause. The NSA is not PC in a "parallel construction" scenario. ~~~ bandushrew ok, I do understand the distinction you are making. I am not sure how you are so confident that the NSA was not at all involved in this capture, and that parallel construction was therefore entirely unnecessary. When reading that article, and various other sources, one thing that stands out is that even after arresting an administrator - which did lead to various other arrests - they still had no direct link or identification for Ulbricht. Ulbricht was careful enough that although the police were apparently communicating directly with him, and arresting a number of others that were more directly involved, there was no way for them to locate or identify him. Note, that this remains true even after he believes that one of his contacts has murdered someone on his behalf. He maintains the firewall between himself and that contact. Frankly, that is fairly impressive, he must have been a careful man. Suddenly they find a link buried in the forever webs between a nickname he uses and his actual name and bingo, they have him. Now, it entirely could have gone down like that. It is completely plausible. Most likely the link was there all along, just waiting for someone to stumble on it. BUT, that is rather the point of parallel construction, isn't it? to bridge the gap between the information they have and the information that they can present in court, in a totally plausible way. I am not claiming the truth to be one way or the other, who knows (hell, who cares in this case), but I am claiming that to disregard the possibility and maintain that it is absurd is to ignore the fact of parallel construction and the fact of its frequent use. ------ ChuckMcM Sounds like a police thriller novel. That said, and BitCoin hitting an all time high, is it even possible to convert BitCoin into dollars any more? I note that the article says the agents seized over two million dollars from the Mt GOX founder [1]. So given how many btc to dollar exchanges have been targeted how does that work now? Western Union or something? [1] "The seizures included $2.9 million from a Dwolla account that was controlled by a U.S. subsidiary of Mt. Gox and $2.1 million seized from two Wells Fargo accounts, one controlled by the same subsidiary, the other by Mt. Gox CEO Mark Karpeles." ~~~ Synaesthesia Yes, it's easy to convert Bitcoin to USD. You can sell them at Coinbase, Bitstamp, LocalBitcoins and all kinds of other exchanges. ------ etler Wow, this is the funniest thing I've read all week!
{ "pile_set_name": "HackerNews" }
The Story of the Apollo Guidance Computer, Part 1 - sohkamyung https://www.universetoday.com/142897/the-story-of-the-apollo-guidance-computer-part-1/ ====== sohkamyung Part 2 at [1], Part 3 at [2] [1] [https://www.universetoday.com/143102/the-story-of-the- apollo...](https://www.universetoday.com/143102/the-story-of-the-apollo- guidance-computer-part-2/) [2] [https://www.universetoday.com/143113/the-story-of-the- apollo...](https://www.universetoday.com/143113/the-story-of-the-apollo- guidance-computer-part-3/)
{ "pile_set_name": "HackerNews" }
State of Startups - ValG http://stateofstartups.firstround.com/2016/ ====== GrumpyNl “One of the problems with raising money is it teaches you bad habits from the start,” said Jason Fried, the co-founder of the software company Basecamp, who has written frequently on the perversions of the venture capital industry. “If you’re an entrepreneur and you have a bunch of money in the bank, you get good at spending money.” But if companies are forced to generate revenue from the beginning, “what you get really good at is making money,” Mr. Fried said. “And that’s a much better habit for a business to work on early on, to survive on their own rather than be dependent on money people.” ~~~ justinzollars I've worked at startups that have taken no money (0) and those that have taken boat loads (Hundreds of Millions). I made much more money from the former situation. ------ pascalxus The 2 biggest reasons start ups fail are: 1\. No/not enough market demand for what your building 2\. User acquisition costs exceed LTV. Those 2 things should be the very top concern of any software entrepreneur/founders. I don't understand why the survey doesn't reflect that. They say hiring good talent is a primary concern, but if that were really the case, wouldn't start ups be moving to cities where the labor supply was greater than the labor demand? And wouldn't there be a corresponding willingness to hire remote workers (as this greatly increases the pool of candidates)? Moving to an area where labor is 1/2 as cheap, could double your runway, assuming there aren't other timed restraints. >Nearly 1 in 5 founders say they're raising a unicorn This is not necessarily optimism. some companies require that kind of scale in order to get the economies of scale required for profitability. ------ nedsma I love this one: How confident are you that you're building a billion dollar company? Answers: 1\. I'm certain that we will - 18% 2\. I'm confident we have a decent shot at it - 42% Thumbs up for the optimism! ~~~ porter Well, they are telling this to VCs afterall... ~~~ kornish Recently on a John Oliver segment, Oliver was speculating on how Trump University received 98% excellent approval ratings from current students. Turns out that the students were asked to give feedback while still enrolled in the course, meaning that giving a bad review could negatively influence their grade or relationship with the teachers, and thus the students were motivated to give more positive answers than they otherwise might have. I wonder if founders giving answers here had names attached to their answers or if they were anonymous at submission-time. ~~~ tedmiston That's how every university course evaluation I've ever done has worked. Though they say data is shielded from the instructor until after final grades are submitted. Not sure if that applies to the Trump thing. ------ benmarten Are we in a bubble answered yes is declining from 73% -> 57%. That means the real probability of being in a bubble just increased ;P Remember the 2008 crisis was only seen by very few in advance... ------ EduardoBautista > 9\. Are you optimizing for growth or profitability? > Profitability - 39% > Growth - 61% This is what happens when your business goal is to get acquired and not to have a business sustained by paying customers. ~~~ pc86 Well this is one of the few but key differences between a "startup" and a "business." A business that isn't profitable is either a hobby or a bad idea. A startup that isn't growing is dead. Personally I'd rather make $5/10/15/25k a month with a _business_ than kill myself trying to get millions in funding, pay myself a $10k/mo in salary and leave with nothing through either failure, dilution or some combination thereof. ~~~ rsp1984 Given that you can make $5/10/15/25k a month with a cushy 9-5 corporate job where everything's taken care of for you, in most cases the choice is not small-business vs. startup, it's corporate job vs. startup. The "lifestyle" self-running company that spits out a comfortable amount of cash and is easier to handle than a corporate job is somewhere between a myth and a unicorn. It's _very_ rare. If you want to stay on the legal side of things it takes a great amount of connections, experience, time and effort to build such a company. You might as well invest that time in a "proper" startup and get some funding. Chances of success will be similar in the end. ~~~ WhitneyLand I don't notice that many people making 15/25k a month that think their jobs are cushy. There are usually high expectations at that level. ------ vsloo There's a disconnect between founders who want to build a startup and founders who want to build a business. They think the two are the same but they're really not and this study clearly shows that. There are situations where startups turn into businesses but I'd rather build a profitable business for myself from the start and our team than to build a startup purely focused on "growth". ~~~ monkmartinez I am very disconnected from the "startup" world, and something in your comment has me asking: What is the difference between a startup and a business? To me, they ought to be one in the same... ~~~ GFischer Paul Graham (and Y Combinator I guess) believe that the difference is the goals. _A startup is a company designed to grow fast._ PG, 2012 [http://www.paulgraham.com/growth.html](http://www.paulgraham.com/growth.html) [http://www.forbes.com/sites/natalierobehmed/2013/12/16/what-...](http://www.forbes.com/sites/natalierobehmed/2013/12/16/what- is-a-startup/#6b2321f14c63) _a startup is a company designed to scale very quickly_ Steve Blank believes a startup is determined by the search of a business model. If you have a business model, then you have a small or new company, not a startup. [https://steveblank.com/2014/03/04/why-companies-are-not- star...](https://steveblank.com/2014/03/04/why-companies-are-not-startups/) ~~~ angersock Quite right. Another distinction worth making, almost its own axis really, is the difference between "a tech business" and "a business that uses tech". Companies like Cisco, Facebook, Apple, Google, Canonical, and so forth are companies that are tech companies--without their technology, they wouldn't be in business at all. They provide a service or product that is IP in its own right. Companies like Chipotle, Subway, Uber, Lyft, AirBNB, DoorDash, Dollar Shave Club, and so forth are companies that use tech to achieve economies of scale and growth that wouldn't be as easy otherwise but could still be done. You can imagine a way of making something that to the user is substantially like the Uber today without a complicated backend, even just using call centers and massive dispatch. The key part of their business is part-time contractor drivers, which is a business and not tech innovation. It's easy to assume that all startups are tech startups, but that's not quite true and it also can limit and slow developing a good business model. ~~~ pzh But then, can't you make the same analogy for early stage Google--basically, a big marketing firm that manually places ads in the yellow pages? Similarly, Facebook can also be executed over a phone system ("Press 1 to hear your friends' updates, press 2 to post an update...") I'm not sure there's such a strong distinction between a tech business and a business that uses tech nowadays. ~~~ angersock Google's core beginning was PageRank (under license from Stanford), without which it would've been no better than similar offerings at the time. Additionally, their approach to setting up their equipment and making use of cheap gear and managing said cheap gear probably gave them a leg up...something they still do today at scale. So, no, you can't really make that analogy. Facebook was a tech company specifically, and not a company using tech, because the entire product was devoted to rapidly filling social profiles and spinning up the microsites that were user accounts, mining those accounts for information, and then integrating as a platform for advertisers and game developers. None of that tech is really stuff they could've outsourced and still had a business--they couldn't have just white-labeled MySpace for example and gotten away with it. ------ coldcode Did anyone else find the constant shifting colors irritating? ~~~ Etheryte Yes! Closed the page as soon as I figured out what was going on. ~~~ Kiro That seems like an extreme reaction to be honest. ------ aedron Interesting answers on lack of gender diversity in IT: Most of the men believe the reason is that there just aren't that many women entering the field, while almost all the women blame bias at various stages of education, hiring and promotion. Someone has a cognitive dissonance. ~~~ whoops1122 there were less than 5 girls on my computer science class, so unless woman are claim that they should have the job without education. I can totally see the reason why there is a gender diversity in IT? ~~~ beat Why is a computer science background necessary for an IT career? I know many, many IT professionals who did not study CS in college. ~~~ ci5er "IT Professionals" is a broad label. Maybe we can think of getting a 'degree in a field' as a proxy-variable for 'interest in the field'. What's astonishing to me is through the 60s, 70's and into the mid-80s, computer-tech interest in female cohorts tracked with science, law and medical fields. Then it flattened and fell, while female participation in those other three fields continued to expand at the rates they had before. (So, what happened in 1985?) ~~~ rrdharan This Planet Money episode attempted to tackle that question: [http://www.npr.org/sections/money/2014/10/21/357629765/when-...](http://www.npr.org/sections/money/2014/10/21/357629765/when- women-stopped-coding) Their tl;dr answer is that video games happened, and they were marketed exclusively to boys; that's what created and drove the cultural rift. ~~~ ci5er Thanks for that link. My original sighting of the phenomena used the exact same graph, but made no attempt at being explanatory. I have since then, been searching, but failed to re-find a copy of that graph to stick into my files. Now, thanks you you, I have! Thanks! ------ codingdave State of Venture-backed Startups. Just to be clear. It is a specific subset of the larger startup picture. ~~~ tedmiston This really depends on your definition of a "startup" vs small business, lifestyle business, etc. ~~~ codingdave I guess that is technically true, but if anyone who is NOT a VC is buying into the idea that VC backing is the only valid definition of a startup... you have drunk too much of the kool-aid. ~~~ tedmiston I would say they more just look at it as an easy filter. While there will be some false negatives, you have very few to none false positives i.e., venture- backed companies that turn out to be non-startups but don't close or exit. The example that comes to mind that breaks this is the failing startup turned dev shop in attempt to revive the startup pattern. ------ traviswingo Oh yeah, startup founders with venture backing aren't biased about this topic... ------ gnicholas > And it only gets less balanced with time. Among respondents' companies, the > boards of later-stage startups are almost three times less likely to have a > woman on their board. If later-stage companies are older (probably correlated, but not perfectly), then this could be a function of the year in which the boards were created. There's more of a push for diverse boards now than there was 3 years ago, so if a company got funding and formed a board back then, it's not surprising their board would look different. ------ personjerry > Now’s the time to launch companies and set sail. > Though the majority of founders say we’re in a bubble, 9 out of 10 founders > believe that it’s a good time to be starting a company. All aboard! Wow that's the worst example of sample bias I've ever seen. It betrays the fund's motives behind this post, I suppose. ------ jdavis703 I think this is a very interesting question to ask when interviewing at a startup: "If you're not successful, why do you think that will be?" And also "what leads the culture" (engineering, sales, design etc). ------ contingencies Sector spread (Q51) is very biased; perhaps the method of sourcing respondents was insufficiently broad or random. ------ misiti3780 1 out of 5 founders thinks they are raising a unicorn ? ~~~ almostarockstar 1 out of 5 founders want you to think that they think they are raising a unicorn. ------ dmark3 So 10% of startups give out more than 1% of equity to a mid-level engineer ? Perhaps this is a small sample, but it sounds odd. ~~~ brianwawok What should first and second hire get? 1 or 2% doesn't seem crazy after a seed round. ~~~ taneq Anyone who puts in sweat equity should get double digits IMO (unless the company has been around for years as a one man band, and maybe even then.) ~~~ ptero Double digit ownership usually means the person is a cofounder. This question was about engineers. ~~~ taneq ...who by definition aren't cofounders? Maybe I'm on the wrong site. O.o ~~~ brianwawok If you join BEFORE seed money, and do a bunch of work for free, you can be a cofounder. If you join AFTER seed money, and get something like a market salary, you are an engineer. The gray area is the in-between places. If you join before seed money, but only work 1 hour a week (say to help out a buddy), are you a cofounder? I would likely vote no. Or if you join AFTER seed money, but work for 75% of market rate. Or 50%. At what pay do you appear to be a cofounder vs engineer? ~~~ taneq So you're saying it _is_ a definition issue. Regardless of what work you do at a startup, you are considered a "co-founder" if you put in initial sweat equity (ie. did work for free) but an "engineer" if you only joined after the company was funded and paying wages at market rates? As for the grey area, it seems as if common-sense should prevail but sadly that doesn't always happen so you always need a contract laying out exactly what each side gets, even for volunteer work. I seem to recall a story earlier this year (can't remember the company involved) where one of the founders' friends had helped out occasionally before they got funded, then the company got funded, ended up with a fairly large valuation, and the 'friend' reappeared and claimed that they were owed a significant share of the company. ------ demonshalo sigh... Europe does not stand a fucking chance! ~~~ cbcoutinho What does this article have to do with Europe? I know First Round is based in SF, but they don't state where the startups are located - the only mention of the US is when comparing demographics of the workforce with the US itself. ~~~ demonshalo What I mean is, Europe generally does not even come close to that level of pay/compensation. So I assumed that these are US based startups. I could be wrong though. ~~~ jdavis703 Yes but you (generally) get other things like universal healthcare, free or cheap university, retirement plans, no need for a car due to proper urban planning, etc. In the US you have to shell out for all these things, paying into a private 401(k) for retirement, paying back student loan debt, paying for your health insurance etc. And these are at well funded tech firms. ~~~ discordianfish While true, that doesn't even come close to filling the gap. In Berlin "the silicon valley of Europe", as people here like to say, there are pretty much zero engineering jobs paying >$100k/year. There is some magical ceiling of around $90k/year, no matter how senior you are. This isn't only true for startups but pretty much any company. That's one of the reasons I work remote for Silicon Valley. ~~~ dx034 On the other hand, costs in SV are way higher than Berlin. Berlin has very low living costs, even compared to other European (and German) cities. With $90k/yr you probably have the same living standard as in SV with twice as much. Probably even a higher standard, with $90k/year in Germany you can afford a large appartment, eat out regularly, don't have to worry about retirement or health care. Of course living in a cheap area and being paid the salary of the high cost area is always better. But that's not specific to Berlin. ~~~ discordianfish "$90k/year in Germany you can afford a large appartment, eat out regularly, don't have to worry about retirement or health care" \- That's definitely true. But I'd argue with similar profile you can make at least 2x that in SV at which point I don't think you have to worry about those things either, even if you pay $5k/month for your apartment. ------ greenspot tl;dr because the presentation is super long. I just picked data which I find interesting and not obvious, there's much more information which I don't cover. Data is in chronological order and often aggregated to less numbers. 700 founders inside and outside of FirstRound were surveyed. \- 7 of 10 say bitcoin is overhyped \- cofounder relationship: 5% fired their cofounder, 5% are strained, 40% collegial, 28% best friends \- 13% sold secondaries \- 61% optimise on growth, rest on profitability \- 52% want to fire up to 10 people, 32% up to 50, 10% more than 50 the next 12 months \- Hardest people to hire: tech, sales and marketing leader \- 90% of mid-level engineers get <1% equity, 64% <0.4% \- Most (55%) of mid-level engineers get between $100K and $150K \- Primary drivers of company culture are tech, sales and design \- Most (43%) people leave between 6-7pm, 10% work longer than 8pm \- 75% could close a round in 4 months or less \- 78% pitched less than 20 investors \- 76% raise exactly or more compared to what they planned \- 55% expect that raising gets harder the next 12 months \- 22% of investors didn’t meet expectations \- 20% <= 30yrs, 32% older than 40yrs, rest inbetween \- Most popular sectors are enterprise, consumer, fin-tech \- 43% web, 29% mobile, 1% VR ~~~ spyspy What defines a mid-level engineer? ~~~ mi100hael I'd say someone who's not in a senior position like team lead but more than 3 years removed from college. ------ Dowwie This is a duplicate post. First post: [https://news.ycombinator.com/item?id=13080477](https://news.ycombinator.com/item?id=13080477) ~~~ ValG Didn't see that when I posted. Usually HN catches dupes, but I posted this on mobile on the go. My bad. ~~~ Dowwie It's not on you. :) HN ought to match on dupes like this. ~~~ sctb The software allows resubmissions of stories that didn't get significant attention after enough time has past and there's no longer any hope for them. It does this so that those stories have more than one chance, which is often needed before they catch on. Sorry that it wasn't yours that did! Community members have analyzed the submission data to see if there's any way for submitters to do better than random here and it seems like there isn't.
{ "pile_set_name": "HackerNews" }
VuePress: a fully Vue-powered static site generator - tomcam https://vuepress.vuejs.org/ ====== dang Comments moved to [https://news.ycombinator.com/item?id=16836394](https://news.ycombinator.com/item?id=16836394).
{ "pile_set_name": "HackerNews" }
Sex, lies, and video games: Inside Roblox’s war on porn - car https://www.fastcompany.com/90539906/sex-lies-and-video-games-inside-roblox-war-on-porn ====== Traubenfuchs As an adult, it feels weird to say this, but it's probably the former child in me speaking: This is absolutely beautiful. It sounds like the vibrant, lawless communities no longer found on 4chan and obscure forums that are now dead. Children and teenagers finding their own way without adult supervision. If I was 15 years younger I would probably download Roblox right now. Keeping the pedos and other bad actors out is probably impossible, instead society and parenting should focus on educating children on the dangers and mitigation. Teach them not to give out personal information, not to send pictures they wouldn't want the whole world to see and not to be too trusting and they should be good. If they follow those rules, this kind of exploring and creation of (youth) culture is actually safer than anything that happens irl. Whatever happened to Second Life, where all of this should be possible without fighting censorship? ~~~ bitwize > This is absolutely beautiful. It sounds like the vibrant, lawless > communities no longer found on 4chan and obscure forums that are now dead. Leaving aside the fact that a lack of strict moderation where kids congregate is a virtual smorgasbord for pedophiles, remember that the "vibrant, lawless community" of 4chan and the like gave rise to a right-wing movement powerful enough to put Trump into office. It was Marcuse's repressive tolerance being played out before our eyes. An increasingly censored and regulated internet is inevitable, _for the good of civilization_. ~~~ jimmygrapes I am sure this goes against HN rules, but I found your comment particularly disgusting. Just wanted you to know.
{ "pile_set_name": "HackerNews" }
Mega Man for TempleOS - robertelder https://github.com/tramplersheikhs/megaman ====== LVB Whenever I watch one of Terry's videos, I get highly motivated to program. Not read a blog post comparing frameworks, or a debate about some programming idiom, or even designing some larger project. But literally type stuff into a computer and make things appear on the screen. It is remarkable how watching his TempleOS videos uncovers the fascination I had of computers from my youth, 30 years ago. ~~~ runeks You've got me curious. Who's Terry? And where can I see one of his videos? ~~~ pkd One should probably add a trigger warning. He is schizophrenic and not quite himself at times, especially in the comments. Not to take away from his technical feats. ~~~ dajohnson89 I think it's worth being specific here -- he uses the word "nigger" frequently and regularly makes other nasty comments about black people and other minorities. ~~~ panglott When I've seen his website in the past, the crazy religious stuff has always been there, which I can look past, but now it seems like the crazy racist stuff is way way more prominent, which I just cannot. ~~~ dajohnson89 Completely agreed. I understand that he's mentally ill, and I wish him all the best in that regard. But I can't help but see him as just another racist hick. Super cool project he has, but I want nothing to do with him or anything he works on. ~~~ ng12 Do you understand what schizophrenia entails? If it makes you uncomfortable that's one thing, belittling him as a "racist hick" is another. ~~~ dajohnson89 See my post below. He is a racist hick, who happens to be ill. If that's "another" thing, then so be it. Don't really care which came first. I will not let racists duck undercover of his illness. I stop short of being genuinely​ upset at him, but hate speech is hate speech. Since he has a large-ish audience, his ideas are becoming part of culture. Agree with him or defend him or apologize for his racism all you wish -- you are kinda/sorta part of the problem. ~~~ ng12 What an absolutely absurd opinion. I really don't think you appreciate the manifestation of schizophrenia. Would you feel the same about someone suffering from Tourette's for swearing in front of a child? The guy believes lots of crazy things: men in suits are after him, aliens put things in his body, that he has conversations with god about music, etc. He translates random number generators into ASCII attempting to divine messages from god. He writes long-winded nonsensical rants jumping from detailed technical dissertations to rambling about old war movies. Schizophrenia literally means "split mind" \-- ideas, concepts, hallucinations attack his brain and he has no basis for dispelling which are grounded in reality and which are not. It's the biological equivalent of radio interference or a loose wire. A large chunk of the things he writes are unintelligible. Yes, people focus on his work, because it's pretty amazing that somebody suffering so profoundly from an illness can do such interesting (and esoteric) work. The fact that a subset of his schizophrenic attacks include racist language is something I feel sad, not angry about. ~~~ dajohnson89 Yeah, the sadness really shows. I wish I could share your clinical detachment. I guess I'm too PC (as someone else implied) or ignorant of mental illness (as you implied). Let's agree to disagree about our opinion of Owens. He's a deranged and schizophrenic genius, I get it. We can agree that he's brilliant and is producing something really cool. I'm not bothered by his racism -- it's too common for me to be really upset by it. What bothers me is how you and others are so quick to point out how cool TempleOS is, and how smart he is, and how his hate speech is OK because he's ill. You've defended him more than you've defended my disapproval of what he says, which is telling. Enjoy his streams, hell -- make TempleOS your default OS and mail all of your friends/family a copy of it. Just consider that white males happen to make up the vast majority of his audience. Blacks and whoever else he hates will have a harder time than you do sympathizing with his hateful speech, schizophrenic or not. Again, Hitler was a schizophrenic but that doesn't make his hateful rhetoric OK does it? Oh wait, Mein Kampf was recently a bestseller in Germany and we have a former Breitbart editor in the White House. Touché. ~~~ kstenerud "You've defended him more than you've defended my disapproval of what he says, which is telling." It's very telling. When someone does something out of mental illness, there is no reasoning them to change their course. When someone does it out of bigotry, there is. ------ tsheikhs Cool! This project started out as a way to learn Gr library routines in HolyC, and kind of Frankensteined its way into a game engine. In the coming weeks I'll be doing lots of refactoring to bring the code in line with proper TOS guidelines naming conventions. (Author here: I cross-posted this comment from a reddit thread, hope it isn't against the rules..) ~~~ abrookewood Can I ask why you decided to do this rather than learning on a more conventional platform? ~~~ cyberpunk I was kind of interested in writing something for the temple (well, okay, I spent a bored afternoon contemplating giving it a go and half heartedly booting vms and reading code ....) While I can't answer for the OP, my motivation was _specifically_ that this is kind of an alien environment and the challenge involved in even getting to hello world would definately have seen me walk away at the end the better for the exp, even if walking away from those hours without having gained some marketable understanding of framework foo or language bar. In the end I didn't do that because the code is insanely complicated (all single letter vars) and my downtime is too precious for such masochism currently; I don't think it's too much of a strech to understand why others might be interested though. I'm glad to live in a world where such an outstanding personal achievement like Terry's OS really is can exist, and that there are people out there prodding at it. Isn't it cool that we don't always do things for the money? I dearly hope that none of the recent templeos projects are attempts to antagonize Terry though. He is a profoundly accomplished software engineer and deserves nothing but respect for his technical achievements from us all alongside understanding of the rest of the package. ~~~ timv > half heartedly booting vms I initially read that as VMS rather than VMs. Very confusing. I don't think too many people half-heartedly boot VMS. Reactions tend to be one extreme or the other. ~~~ bluejekyll Wouldn't a half-hearted boot of VMS be Windows? ------ huangc10 Per wikipedia: TempleOS (formerly J Operating System,[1] SparrowOS and LoseThos)[2] is a biblical themed lightweight operating system created over the span of a decade by the American programmer Terry A. Davis. The software is a x86-64 bit, multi-tasking, multi-cored, public domain, open source, ring-0-only, single address space, non-networked, PC operating system for recreational programming.[3] The operating system was designed to be the Third Temple according to Davis and uses an interface similar to a mixture of DOS and Turbo C. Davis describes the operating system as a modern x86-64 Commodore 64 with C in place of BASIC. ~~~ corndoge I'll bite. Why did you paste a paragraph from the Wikipedia article? ~~~ tracker1 Because many people will have no idea what TempleOS is from the link, or the demo video on the GH page. ~~~ corndoge But if they are reading HN, surely they know how to use Google and Wikipedia and could acquire this information in seconds? ~~~ largeprime as an incredibly lazy person i found it to be helpful ~~~ udkl You logged out, signed up for a temp account and then logged back in - just to post this comment. That IS incredibly lazy ;) ~~~ rangibaby He probably doesn't want to be on record saying that he is lazy ~~~ udkl Is that you there, Mr Obvious ? ------ fiatjaf I find TemploOS a pretty normal name, but HolyC is an amazing name for a language. I always laugh when I see it. ~~~ wolfgke > but HolyC is an amazing name for a language For those who don't understand the pun: > > [https://en.wikipedia.org/wiki/Holy_See](https://en.wikipedia.org/wiki/Holy_See) ~~~ fiatjaf I didn't think of this pun. ~~~ sambeau Me neither, I assumed the pun was to do with "Holy Cow" ------ mikejmoffitt It's interesting and fun that Terry's odd but impressive project is getting a little cult traction. This is kind of neat, though the physics and animations could use some work. ------ jancsika Can someone explain the TempleOS author's sprite and graphics interface? From one of his videos it appears that: 1\. Once a sprite set has been defined the user can manually (programmatically?) rasterize it 2\. User can set affine transforms 3\. It _seems_ like the boundary between 2d and 3d API is small, or easily traversable, or non-existent. In one of his 2d examples it appears he changes a parameter to get animation in the z-axis. 4\. Sprites are somehow part of the language (or at least seem to be integrated deeply into it). To me it looks a bit like editing an SVG, automatically converting it to HTML5 canvas, then switching to WebGL, seamlessly. ~~~ evv Sometimes it is nice to browse HN with 'showdead' enabled, because you can see Terry commenting on these threads. (his comment is sibling to mine) Terry, keep up the great work! Its super refreshing to see your commitment over the years on such an ambitious project. ~~~ jancsika > Sometimes it is nice to browse HN with 'showdead' enabled, because you can > see Terry commenting on these threads. (his comment is sibling to mine) Did he give a relevant technical response to my technical questions? If so, are you or someone else willing/able to repost that here? I _really_ don't want to dig into HN caves and learn about its subculture. I just want to discuss a technical topic that I find interesting (and apparently others do, too, if those little numbers next to the post mean anything). ~~~ kennethbgoodin He said "I wrote everything from scratch. I am the smartest programmer ever lived with divien intellect. [https://www.youtube.com/watch?v=1EDLCs4fBJc](https://www.youtube.com/watch?v=1EDLCs4fBJc) " ------ milkey_mouse 4chan's /g/ is especially obsessed with TempleOS and Terry's livestreams; there's typically a /tosg/ thread somewhere on the front page. ------ frostirosti [https://youtu.be/5gfoDHycEi0?t=2m12s](https://youtu.be/5gfoDHycEi0?t=2m12s) That sentiment! I know that feeling so well. ------ PhilWright "God's favorite game is Donkey Kong." Surely the best quote of all time. ------ dylz What the hell is that top comment on the YouTube? ([https://www.youtube.com/watch?v=DepFpVt- mIo](https://www.youtube.com/watch?v=DepFpVt-mIo)) ~~~ lobotryas It's a meme. Google "defend kebab" for more info. As for why it's there? ¯\\_(ツ)_/¯ ~~~ muterad_murilax The in-game music is a chiptune version of the "Defend Kebab" song. ------ kristofferR Some background, for those who haven't heard about TempleOS before: [https://news.ycombinator.com/item?id=8658283](https://news.ycombinator.com/item?id=8658283) ------ nikolasavic Vice wrote a piece on him in 2014: [https://motherboard.vice.com/en_us/article/gods-lonely- progr...](https://motherboard.vice.com/en_us/article/gods-lonely-programmer) He drinks a lot of caffeine and lives mostly on a 48-hour schedule: "I stay awake 16 * 2 and sleep 8 * 2." ------ register Did I understand correctly that HolyC is a C like dynamic Language with AOT compilation and dynamic binding? Does this mean that functions can be redefined in the REPL while the code is running? Looks like a pretty cool language! ------ nickpsecurity So, they put a game I used to love and hate on TempleOS. Guess I finally got a reason to visit the Temple. Although that comment about the HolyC going into the shell, compiled, and running was pretty cool. ------ bitwize Looks better than Mega Man for DOS! ------ partycoder TempleOS is a very interesting OS with many original innovations, as mentioned in the "constructive review of TempleOS" (which you can look up). However it is a ring 0 only OS, with all the consequences that implies. You can make irreversible mistakes in this way, especially outside a VM. Other OSes worth looking into are: \- Redox OS (Rust) \- MenuetOS / KolibriOS (x86-64 Assembly) \- Haiku OS \- GNU Hurd ~~~ pekk Did you pay attention to what TempleOS is for? Do you know what it was like to program for the C64? It is ring 0 only on purpose! That's the whole point! The idea that someone would go into a thread about TempleOS, trash TempleOS for one of its central and distinguishing features, and then use the thread as an opportunity to promote some new OS written in Rust is boggling my mind. ~~~ partycoder Well that's one aspect of TempleOS that appeals to some and that is fine. But you an also appreciate TempleOS from other perspectives such as how HolyC is compiled, dynamic documentation, etc. ------ knd775 This isn't Terry, is it? ~~~ thesmallestcat No, but the Github user sure is interesting. Have to wonder how Terry feels about [https://github.com/tramplersheikhs/hgbd](https://github.com/tramplersheikhs/hgbd) and [https://github.com/tramplersheikhs/uriel](https://github.com/tramplersheikhs/uriel) \-- is the Temple being desecrated?? Either way, seriously cool stuff. ~~~ mintplant Terry has stated that, apart from serving God, the goal of TempleOS is to encourage C64-like hobbyist experimentation. He seems quite happy with outsiders writing software for his system, and has endorsed this MegaMan game on the TempleOS software page: [http://www.templeos.org/Wb/Home/Web/AppStore/AppStore.html#l...](http://www.templeos.org/Wb/Home/Web/AppStore/AppStore.html#l1) ~~~ shultays Supposedly, there is a guy on E-Bay selling TempleOS merchandise. It's okay. Heh, what a cool guy. ------ bredren Is it just me or is the official templeos site hacked / defaced right now. ~~~ problems Nope, it's standard, Terry Davis is the author and he's a very religious schizophrenic. He's a very smart guy, but he got banned many times on HN and Reddit for going off about "India niggers" and spamming blocks of random words. ~~~ pekk Actually all the times I've read him use the word "niggers" (and it is an offensive word, I won't dispute that) he actually means something different than you would expect. ------ faragon Amazing project! :-D ------ amsheehan Weird. Makes me want to start a crusade. ~~~ sctb We detached this subthread from [https://news.ycombinator.com/item?id=13973144](https://news.ycombinator.com/item?id=13973144) and marked it off-topic. ------ Orangeair A cult following for the God-given operating system. Huh. Sounds a bit sacrilegious. ~~~ krylon Isn't that exactly what God would want? I just wonder how long it'll take for some heretical sect to start a fork and add blasphemous features like networking or 32-bit colors... ;-) ~~~ bri3d Fear not: [https://github.com/minexew/Shrine](https://github.com/minexew/Shrine) ~~~ krylon Sometimes truth is stranger than fiction, as Bad Religion used to sing. ;-) (NB what a great name for a band that is in this context!)
{ "pile_set_name": "HackerNews" }