text
stringlengths 44
776k
| meta
dict |
---|---|
Show HN: API Testing for Developers - tadasv
http://bluebook.run
======
tadasv
Hi! I'm the author of bluebook. I'd love to hear your thoughts on this idea,
and any suggestions or improvements you may have.
| {
"pile_set_name": "HackerNews"
} |
Cambridge Analytica scrambles to halt Channel 4 exposé - foxh0und
https://www.ft.com/content/7ed1572c-2aa4-11e8-a34a-7e7563b0b0f4
======
neonate
[http://archive.is/VfEuT](http://archive.is/VfEuT)
[https://outline.com/gdN45D](https://outline.com/gdN45D)
~~~
chillidoor
Thank you for this.
------
sabertoothed
[https://www.youtube.com/watch?v=FXdYSQ6nu-M](https://www.youtube.com/watch?v=FXdYSQ6nu-M)
["Christopher Wylie, who worked for data firm Cambridge Analytica, reveals how
personal information was taken without authorisation in early 2014 to build a
system that could profile individual US voters in order to target them with
personalised political advertisements. At the time the company was owned by
the hedge fund billionaire Robert Mercer, and headed at the time by Donald
Trump’s key adviser, Steve Bannon. Its CEO is Alexander Nix"]
| {
"pile_set_name": "HackerNews"
} |
Budget-Cutting Colleges Bid Some Languages Adieu - tokenadult
http://www.nytimes.com/2010/12/05/education/05languages.html
======
tokenadult
Perhaps the opportunity for hackers here is providing language instruction at
less expense than college major programs.
~~~
zdw
Rosetta Stone anyone?
Beyond the basics (what you'd learn in a 101 series college course), the best
learning method seems to be immersion, either by classes that focus on it or
going to a country where the language is used.
| {
"pile_set_name": "HackerNews"
} |
Information age tarot deck - blackobelisk
http://nettarot.net
======
lelandbatey
Gotta say, the dorito taco is awesome:
[http://i.imgur.com/gzSyXlT.png](http://i.imgur.com/gzSyXlT.png)
| {
"pile_set_name": "HackerNews"
} |
Show HN: I built a 2FA token from a Gameboy clone - afitnerd
https://developer.okta.com/blog/2018/08/30/build-one-time-password-token-for-mfa
======
pinewurst
I could imagine doing it with a real Gameboy with persistent clock in the
cartridge too.
~~~
afitnerd
Love that idea. Although, the original Gameboy is a little bulky to carry
around ;)
| {
"pile_set_name": "HackerNews"
} |
Pop-up Fabrication of the Harvard Monolithic Bee - nealabq
http://www.youtube.com/watch?v=VxSs1kGZQqc
======
nealabq
Related links:
<https://micro.seas.harvard.edu/media.html>
[http://trvideo.technologyreview.com/services/player/bcpid263...](http://trvideo.technologyreview.com/services/player/bcpid263777539?bctid=1118118784)
| {
"pile_set_name": "HackerNews"
} |
Show HN: Tet – A todo app that deletes your tasks at the end of the day - aswinmohanme
http://tet.aswinmohan.me/
======
roughfalls
I once read a statement attributed to Steve Ballmer that every six months, he
tears his todo list in half and throws the bottom half away. If anything far
down that list was actually a priority, it will naturally get re-added (by
thinking of it again, in response to a customer, etc.).
My implementation of that approach is to do the following each month:
1. Export all my unfinished todo items older than 6 months.
2. Place that export alongside my other backups.
3. Then delete those items from my todo app.
I deliberately do not look at any of those items during this process, lest I
be tempted to dive back into them.
That way, I limit my total mental clutter while retaining some peace of mind,
since I know that I can get back to those items (I sometimes attach photos,
notes, etc. to tasks) if needed. I never do.
~~~
klenwell
That's an interesting idea. I picked up this book, Principles of Product
Development Flow, based on some recommendations I think I came across here on
HN:
[https://www.goodreads.com/book/show/6278270-the-
principles-o...](https://www.goodreads.com/book/show/6278270-the-principles-
of-product-development-flow)
Reinertsen really helps you appreciate the costs associated with queues (of
which the TODO list would be a common form) and this seems consistent with the
principles he advocates.
One key quote related to this that I am still trying to wrap my head around:
_Few product developers are aware of the causal links between high capacity-
utilization, queues, and poor economic performance. Instead, developers assume
that their cycle times will be faster when resources are fully utilized. In
reality, as we shall see later, high levels of capacity utilization are
actually a primary cause of long cycle time._
~~~
TeMPOraL
> _In reality, as we shall see later, high levels of capacity utilization are
> actually a primary cause of long cycle time._
So what's the reason explained by the book?
(My guess would be something along the lines of: high level of utilization
lead to sudden peaks in load exceeding available capacity, and thus throwing a
wrench in the process as you scramble to add capacity.)
~~~
jwhitlark
100% use of nearly anything is over use, not just because of peaks in load,
but because it must both be done and perfect.
Think of a bookcase. 100% means you can never add more books, and it also
makes it very difficult to reorganize anything.
------
monkeynotes
This would just give me huge anxiety. One reason I write things down in a todo
list is to remove the anxiety of having to remember everything. I am happier
with triaging my todo list myself, but everyone works differently.
~~~
weego
I like the idea of this as a complement to a more rigorous todo system. Maybe
I'm just bad at it but it's easy for my lists to get overwhelming, a system
like this demands that more care is put into making choices over what is and
isn't achievable in a day.
------
carrier_lost
I like the Ivy Lee method for to-do lists: [https://jamesclear.com/ivy-
lee](https://jamesclear.com/ivy-lee) Bonus: No app required, just pencil and
paper.
------
menacingly
I use a shell script called "jrnl" that opens vim with 3 tabs: today,
yesterday, tomorrow. It's got a "TODO" section, and if I care enough about
something from yesterday, I can bring it over. The files are stored like
2018/2018-02-06.txt, and if I really want something I can just grep for it.
~~~
diggan
Guessing it's [http://jrnl.sh](http://jrnl.sh) ? Seems to written in Python
though, while you say shellscript.
Sounds like a useful script, care to share it here?
~~~
menacingly
No, it's mine, although I realized how unoriginal I was when I saw that. It's
pretty crappy, maybe if I cleaned it up someone might find it useful.
It's pretty much just a handy way to generate the filenames for vim. Oh, and
it generates a git commit after vim closes.
------
dvdhnt
I'm a fan of Bullet Journaling. It helps to categorize, document, and carry
tasks, thoughts, and ideas forward, or remove them while making them available
for sourcing.
All it takes is a pen and notebook.
[http://bulletjournal.com/get-started/](http://bulletjournal.com/get-started/)
~~~
bluesroo
As someone who's been trying to pick up a consistent task tracking system, I
have a question: Do you just always have a notepad with you? I tried something
similar to this with a pocket-size notepad, but it was annoying and didn't fit
very well with a pen.
So far the closest I've gotten is having a Google Doc, but it doesn't have the
same flexibility that a hand-written notepad does (e.g. symbols, indexes, ease
of writing/ access).
~~~
keyboardhitter
Yes, I always carry a notebook even in non work situations. It's never been an
issue for me as far as transportation is concerned, I just slip it alongside
my laptop or other books.
I also have a Samsung Note phone which is useful in the rare case I'm caught
without a notebook or pen. I'll re-write any notes to my work notebook as
needed.
------
Joeri
I use separate daily, monthly and yearly todo lists. Daily means finish it
within 24 hours, monthly within the next 30 days. Items promote or demote
based on need and get thrown off the yearly list when it’s clear they won’t
happen within the year (which I interpret as “not really needed”).
Really helps me focus by removing clutter.
------
dugmartin
One of these days I'm going to follow through on an old idea of mine to use
flash paper for my todo list.
[https://www.dreamlandmagic.com/products/flash-paper-
pads-2x3...](https://www.dreamlandmagic.com/products/flash-paper-
pads-2x3-inch-size-20-sheets)
------
dnqthao
Is the name "Tet" related to the Vietnamese New Year?
~~~
donquichotte
That was the first thing that came to my mind, too.
It might well be - the Vietnamese like to clean their house before Tết to
start fresh into the new year.
------
turc1656
Not all tasks are designed to be done in one day, or the same day. For that
reason I won't be using this app, but appreciate and respect its purpose and
possible utility to others.
However, I think other todo apps could use this as a great April Fool's joke
to put people into a momentary panic to get them thinking about all the stuff
they should have done. When they logged into the app they it would be blank
with a "what happened to my stuff?" link which directs them to an announcement
they allegedly received in email about the changes taking place and then after
a minute it could revert with the April Fool's message. That might get people
thinking about their procrastination.
------
shennyg
I agree that automatically carrying over todo's to the next day is a bad idea.
You need to be able to trust your todo tracker. It would be helpful to have
some sort of history/log of your tasks just in case you need it.
It reminds me of [https://complice.co/](https://complice.co/) each day you
need to put in your new tasks __but __you get to review yesterday 's
incomplete items and pull them in. It has a lot of smarts built in and tell
you you've pulled in the same task day after day and suggests you split it
into smaller pieces.
Nice job shipping aswinmohanme!
------
wruza
Another cool idea is to have an app that records your todos with check marks
and posts doge memes at the end of the day on your twitter.
“I was going to study convolutional neural networks today @ but instead bought
milk”.
------
harryf
Nice use of "behavioural economics"
~~~
tw1010
Did you mean "psychology"?
------
ronreiter
I just write my todos on toilet paper and wipe my ass with it
------
hmhrex
Asking honestly, what would be the benefit of this?
~~~
blocked_again
Does it make a difference if you were asking it dishonestly?
~~~
hmhrex
I guess I should have clarified, I didn't want to sound snarky while asking
what the benefit would be, I'm actually curious.
~~~
gnclmorais
You mean… the benefit of a to-do list? Asking honestly.
------
Jeaye
s/thier/their/g on the home page, please.
~~~
dangoor
I spotted this and actually imagined that it was on the todo list to fix... (
_was_ being the operative word)
------
aswinmohanme
[https://www.producthunt.com/posts/tet](https://www.producthunt.com/posts/tet)
Here is the product hunt link
| {
"pile_set_name": "HackerNews"
} |
YouTube launches their iPhone app - kurtvarner
http://techcrunch.com/2012/09/11/youtube-iphone-app-ads-exclamation-point/
======
vpdn
I started building ToddlerTube, a YouTube iPad app for kids. The first minimal
version is almost finished.
Is anyone with kids maybe interested in helping beta testing it? Some more
info in the google docs form: <http://goo.gl/nYIGD>
Background: We have an iPad first gen and an iPad3 at home. My young nephew
would always ask for the older iPad and for a long time, I didn't understand
why. After looking over his shoulder for a few days, I came to realize that he
loved to watch certain clips on YouTube (other kids singing his kindergarten
songs, Mr. Bean, kitten videos).
Since he cannot type, his search strategy works as follows:
1\. Start up the youtube app
2\. Go to History (recently watched videos)
3\. Piggyback on the app's history feature to watch existing videos and find
new related videos.
Since the history of "his videos" were only available on the old iPad1, it
makes sense that he would insist on using this device only.
YouTube channels were cumbersome to create and maintain. The user experience
was so bad and my nephew so insistent, that I believe there is a problem here
to be fixed.
~~~
mcobrien
Sounds good! I've filled in my details on the form.
------
kurtvarner
Direct iTunes link: <http://itunes.apple.com/app/youtube/id544007664>
------
ricardobeat
Has anyone ever clicked one of the youtube ad overlays?
~~~
citricsquid
Not sure if you mean the actual little ad pop-up boxes, or just adverts in
general... I watch* on average 25 Youtube videos per day and I'd estimate
around 10 of those have pre-roll adverts, I normally watch 1 or 2 pre-roll
adverts (assuming I have not seen them before) per day and click through
after. The sidebar adverts I've never clicked and same goes for the little
ones that slide in about 10 seconds into a video.
* some of the videos I "watch" are in the background (music) so I included those in my count but they rarely (if ever) have adverts (because I listen to independent music on Youtube)
~~~
Swizec
Interesting thing I've noticed: At home, no video's got a pre-roll (Slovenia),
but when I was in the US almost every video had a pre-roll ... it was so
annoying I almost stopped using YouTube while I was in the US even though I
watch probably 20+ videos per day at home.
Thing is, I watch mostly music videos and it's really really really really
annoying to listen to a pre-roll first.
------
Newky
I know that this is only for iOS but I would definitely sit through a few ads,
if they were to improve the quality of the youtube application for android.
1\. I need to be able to leave it in the background and for the video to still
play. 2\. I don't seem to be able to access my likes playlist. This is the
majority of what I watch on youtube and it should be available through the
mobile phone application.
------
citricsquid
I can't locate the application in the app store via my iPhone but can via
iTunes, is this normal for newly updated/release applications?
~~~
mattparcher
Yes, unfortunately. Apps take time to show up in search results even after
they are officially on the store. (The time before visibility, either in
search results or even at a direct link, can vary by country as well.)
------
ckurdziel
It's interesting that they chose not to include the ability to pull videos
being shared on Facebook, Google+, and Twitter (these are all options in the
web app).
Curious what the HN community thinks about that lack of "social" inflow - I
always feel like those networks are better at curating video that YouTube's
"recommended" stream.
------
mullr
The sidebar swipe animation needs some attention; they tried to add a cute
little bounce at the end when the main panel slides in and out, but it just
feels weird. Nothing else does that on iOS.
~~~
rheeseyb
You mean, except for every other scrolling view in iOS...
~~~
forsgren
...but this isn't a scrolling view.
~~~
mullr
Exactly. But this isn't the same as the scrollview bounce. Especially try
doing a slow grab and letting go near the edge; the sudden artificial bounce
is jarring and strange.
------
therealarmen
Nice to see them include Facebook and Twitter (along with Google+) in the
sharing options: <http://i.imgur.com/z7fex.jpg>
~~~
fwr
Is this something extraordinary?
~~~
speg
I think the sharing options were more limited w/ the previous app. (Mail, msg,
twitter, ?)
------
89a
2/10 for effort on that icon
| {
"pile_set_name": "HackerNews"
} |
I am a time-traveler from the future, here to beg you to stop what you are doing - SirLJ
https://www.reddit.com/r/Bitcoin/comments/1lfobc/i_am_a_timetraveler_from_the_future_here_to_beg/
======
jraedisch
I am slightly more pro Bitcoin, but it is still a great read.
| {
"pile_set_name": "HackerNews"
} |
The growing importance of monopoly rents (2013) - bainsfather
http://www.nytimes.com/2013/06/21/opinion/krugman-profits-without-production.html
======
bainsfather
There's also a meta-summary of this and related articles by others, here:
[http://bruegel.org/2014/02/blogs-review-profits-without-
inve...](http://bruegel.org/2014/02/blogs-review-profits-without-investment-
in-the-recovery)
| {
"pile_set_name": "HackerNews"
} |
REST APIs must be hypertext-driven (2008) - dvaun
https://roy.gbiv.com/untangled/2008/rest-apis-must-be-hypertext-driven
======
dozzman
Most of the APIs I use and build are best suited as RPC systems rather than
hypermedia networks, so implementing the entire REST idea has never been
immediately useful. Broadly the real consumers of RESTful APIs are not generic
hypermedia clients (generalisation of browsers) which are able to traverse
your flavour of hypermedia, but the things operating those clients. Most of
the time, those “things” are dumb business logic applications that can’t
explore the hypermedia to discover new functionality and furthermore are not
designed to do anything with it anyway.
If it is a human traversing the hypermedia however, they’re able to derive a
lot of understanding about the API and its features, as if the API is self
documenting, but that generally only occurs during the development and
debugging stages. After that the hypermedia is useless to the dumb business
logic. Also I’m sure most humans prefer to browse the documentation on the
alternative World Wide Web hypermedia network, as any good API would have
documentation published there.
All in all hypermedia is mostly useful for intelligent consumers, so if that
is not the consumer of your API and you suspect instead the consumer will be
static business logic (the vast majority of cases) then REST will not be
particularly useful. As I mentioned an interesting use case would be bundling
up documentation into the API itself and hyperlinking between that and related
URLs, however the overhead is generally not worth it since you’re likely to do
it better with documentation site.
~~~
rumanator
> Most of the time, those “things” are dumb business logic applications that
> can’t explore the hypermedia to discover new functionality and furthermore
> are not designed to do anything with it anyway.
Dumb business logic is not the point. One of the benefits of HATEOAS is that
it allows REST clients to be loosely coupled with REST services, in a way that
APIs can change freely change (i.e., change endpoints around, break away
functionalities into other services, etc.) without requiring clients to be
updated under the penalty of breaking compatibility.
The main reason why no one does REST and everyone does RPC-over-HTTP is that
while REST clients require tracking and updating state to support service
discovery, RPC-over-HTTP just requires a single HTTP request to achieve the
same purpose, albeit without the resilience and future-proof.
~~~
dozzman
> One of the benefits of HATEOAS is that it allows REST clients to be loosely
> coupled with REST services, in a way that APIs can change freely change
My point is that even though they're loosely coupled, the API actually cannot
change freely because the actual consumer of the API, the business logic, is
still tied to the API through the client. If your API changes and the
client/browser is still able to traverse it fine, but your business logic
breaks, does that _actually_ mean that the API is free to change? I don't
believe so.
~~~
rumanator
> My point is that even though they're loosely coupled, the API actually
> cannot change freely because the actual consumer of the API, the business
> logic, is still tied to the API through the client.
The main promise of REST is that following that particular application style
does indeed allow the API to freely change without breaking backwards
compatibility.
The main drawback of REST is that no one actually follows those principles.
With REST, the client is not tied to an API. The client seeks resources, and
relies on content discovery processes to determine how to access those
resources. The only endpoint that may be hard coded is a home/root endpoint,
and all other resources are accessible through it by following hypermedia.
With REST you care about the what, not the where.
> If your API changes and the client/browser is still able to traverse it
> fine, but your business logic breaks
This is where you're getting it wrong. REST is all about the interface. The
interface has zero to do with the business logic. If you have an interface
that allows you to access the same data but for some reason your business
logic breaks due to non-opersrional reasons (i.e. extra latency from the
content discovery process) you need to have a talk with whoever screwed that
up.
------
cryptos
There was a great article about the common misconceptions about REST recently:
[https://twobithistory.org/2020/06/28/rest.html](https://twobithistory.org/2020/06/28/rest.html)
The longer I think about it, the more I come to the conclusion that REST is
simply not useful for application development in general. It is no accident
that most APIs called "RESTful" by their creators are violating basic REST
principles. But REST has some useful attributes even if not used strictly -
caching comes to mind.
The question is: should we have another "standard" for web application
development? Something more like RPC? There are some approaches, but nothing
that I would call a broadly accepted standard. How should such a standard look
like?
~~~
mathw
Yes we should. We should have a standard which is actually a standard and
actually makes sense for what people are actually writing APIs to do.
gRPC would be a candidate, but the need for dev-side tooling to turn proto
files into code is a bit of a downer.
------
fbn79
Does JSON API ([https://jsonapi.org/](https://jsonapi.org/)) follow all this
rules? If not what rules is not followeb and why in your opinion?
------
lowercase1
I've never really seen a good explanation of why REST is a meaningful concept.
Why REST? Why these requirements? What do you mean stateless? What is bad
about deviating?
~~~
dvaun
I would suggest taking a skim through Chapter 5 of Roy Fielding's
dissertation[0] (where REST came from) to answer some of your questions.
As for "What do you mean stateless?", read this quote from the posted article:
> ...if the engine of application state (and hence the API) is not being
> driven by hypertext, then it cannot be RESTful and cannot be a REST API.
Why does he say this? Well, he was explicit about state in his
dissertation[1]:
> ...each request from client to server must contain all of the information
> necessary to understand the request, and cannot take advantage of any stored
> context on the server. Session state is therefore kept entirely on the
> client
[0]:
[https://www.ics.uci.edu/~fielding/pubs/dissertation/rest_arc...](https://www.ics.uci.edu/~fielding/pubs/dissertation/rest_arch_style.htm)
[1]: From Section 5.1.3
[https://www.ics.uci.edu/~fielding/pubs/dissertation/rest_arc...](https://www.ics.uci.edu/~fielding/pubs/dissertation/rest_arch_style.htm#sec_5_1_3)
~~~
gridlockd
This doesn't answer the question as to _why_ this is a good idea.
~~~
dvaun
That’s fair. I don’t have a decent explanation supporting why REST is a
meaningful concept. Rather, I focused on the other questions that could be
answered by the dissertation.
The choice to create an API in this fashion, without RPC and other things
mixed in, is up to the developer. Others have commented on this with their
arguments.
------
solipsism
This is equivalent to complaining that rap isn't music. The meanings of words
change, sometimes in ways we consider irrational or inconvenient in various
ways. Complaining about it never seems to help.
I long ago stopped complaining to people in this forum about the difference
between "it's" and "its". In response, please stop trying to reclaim the term
REST. It's long gone.
~~~
macca321
This is an article from 2008 by the person who invented REST.
| {
"pile_set_name": "HackerNews"
} |
Ask HN: When does programming start to make sense? - amorphid
How long did it take before you could write code on your own? Every time I try to learn programming, it feels painfully slow compared to other things I've picked up. Maybe I'm the opposite of a natural. I took C++ in college and studied Ruby & PHP on my own.
======
10ren
Alan Turing said that programming would always be interesting because the
boring mechanical aspects could be automated (where "interesting" means "you
don't understand it" - or else you could automate it.) I daily run into issues
that I don't understand. That's what programming _is_ for me, I'm afraid;
rather like science. It's a sequence of monsters. The best we can do is to be
tackling new monsters, not the same ones.
Of course, programming jobs do exist where you do the same thing over and over
again. And there's a threshold of skill required before you can automate some
classes of things; and you also need a clear understanding of the task, to see
precisely which aspects are mechanical, and which aspects are configurable. It
pretty quickly gets into compsci research. And sometimes it's not worth the
effort (it can take a _lot_ of effort.)
But if you've ever called a method twice, instead of writing the code twice,
then you have done some of it.
I feel that your question "start to make sense" suggests your thinking is all-
or-nothing. Does _no_ aspect of programming make sense to you - or do some
"trivial" aspects make sense but they "don't count"? Does a print statement
make sense to you, to some extent? Does a loop make sense to you? There's a
continuum of mastery. If you only acknowledge perfect and complete mastery as
"mastery", then you won't feel any satisfaction in mastery of one small bit of
it. And without the confidence and encouragement of that success, it's very
hard to be motivated to continue. (oh yeah, plus, of course, it's impossible
to have perfect and complete mastery of programming anyway, for Turing's
reason.)
------
patio11
It took me a long, long time until I became reasonably confident that most
problems would eventually succumb to my programming ability. Probably almost
twenty years from when I wrote my first program, or a few years after college.
I can't write code on my own, though -- unless the problem is trivial and the
APIs I'm using I know like the back of my hand, I _need_ an Internet
connection to do it.
Part of this issue is possibly that competent people are disproportionately
stalked by the worry that they're secretly incompetent.
~~~
donaq
That is interesting. The experience has been almost the opposite for me. When
I first started programming, it did not take me long to start "getting it",
and I was very confident that there was no programming problem I could not
solve. As the years went by, I've noticed that my confidence has decreased to
the point where I am almost certain that there is no problem I _can_ solve
(besides the most trivial ones). Maybe I'm just getting dumber.
~~~
sga
Absolutely not. As you gain domain knowledge you should feel exactly this way.
I'd suggest that you be concerned if you didn't feel this way. When I finished
highschool I thought I was pretty damn smart and had a lot of things figured
out (clearly not the case). From an academic point of view as I worked towards
my Ph.D. I was constantly reminded of how very little I did know. While I did
learn new things day by day, my appreciation for how much I didn't know grew
exponentially. In fact I think what I'm left with after the whole exercise is
not a confidence in my knowledge but rather a confidence in my ability to
learn, problem solve and ask questions.
~~~
7402
"Universities are repositories of learning because students enter knowing
everything, and leave knowing nothing."
------
gagi
> Every time I try to learn programming, it feels painfully slow compared to
> other things I've picked up.
It's probably slow because you're not having fun with it. You're probably not
having fun with it because you're not solving a compelling goal. Ask yourself
whether you're learning "just to learn it" or are you trying to solve a
problem and this particular language/api/compiler/implementation will help you
achieve that goal.
I might be presumptuous here (and I apologize if I'm wrong) but the times I've
found myself stuck "learning" have been when I was just going through the
lessons for the heck of it, without a real goal in mind, without something to
accomplish.
Also, have a look at this:
[http://railstips.org/blog/archives/2010/01/12/i-have-no-
tale...](http://railstips.org/blog/archives/2010/01/12/i-have-no-talent/) I
found it inspirational.
~~~
owyn
It was no fun when I REALLY learned how to program, it was pure panic. I was
half way through a CS degree and got a summer job, and I just had get it done
no matter what so I beat my head against the problems and solved them. After
that, all the theory that I'd been learning started to make sense, and now I
have a more nuanced approach to coding, and a successful career.
Just trying to say, learning is not always fun. Get a job doing something you
don't know how to do. Maybe that will motivate you. :)
------
InclinedPlane
I cannot stress this enough: _learn refactoring_ ,
[http://www.amazon.com/Refactoring-Improving-Design-
Existing-...](http://www.amazon.com/Refactoring-Improving-Design-Existing-
Code/dp/0201485672)
You will simultaneously learn:
\- terminology and models relevant to software design and construction at
every level
\- principles of good coding and how to tell good code from bad
\- the ability to redesign code as needed
\- the experience and knowledge necessary to approach coding with confidence
All of these are the most critical tools you need to transform yourself from
someone who sorta-kinda knows a few principles of coding to someone who groks
software construction.
If I had to choose between a co-worker who truly groked the principles of re-
factoring and a co-worker who had a PhD in Computer Science I would choose the
former every time. It's really that important.
~~~
jng
I don't think that's good advice for a newbie.
To the OP: practice, practice and practice. It will take a long time. Months
to start getting it, years to go anywhere. 10+ years to be good. If it's too
hard, choose another profession. 99% of folks out there would hate
programming.
~~~
InclinedPlane
I could not disagree more, refactoring is perfect for a newbie. It's not an
advanced technique, it's fundamentals. Any beginner who can write a method can
extract a method.
But more than that, refactoring provides the mental models and the vocabulary
to talk about, reason about, and understand code. It provides well-worn expert
advice about the characteristics that make good code good and bad code bad,
heuristics to be able to recognize good and bad code, and basic techniques to
transform bad good into good safely and effectively.
There may be some advanced techniques in the book itself which won't be useful
to beginners, but that's true of any programming book, and that's easy enough
to skip over and return to later (especially with the organization of the
canonical refactoring book specifically).
A beginning programmer who has learned even the simplest of refactoring
techniques (extract method, insert/remove cached value, etc.) will be able to
look at a piece of code and see the ways it can be changed, and will also have
a reasonable idea about which changes are more likely to improve the code.
They will also have the mental models and vocabulary to talk about, reason
about, and understand the code, even if only to themselves. These tools are
hugely important for beginners. They can transform coding from a task filled
with uncertainty, fear, and irregular advancement born from experimentation to
a task filled with confidence, knowledge, and curiosity.
Certainly practice a lot, but don't just blindly stumble about on your own,
there's lots of good material out there, learn the techniques and then
practice applying them, build up your toolkit a bit at a time until you feel
more and more comfortable with coding.
------
rmorrison
For what it's worth, it took me several years before I really understood
programming. I distinctly remember thinking that I wasn't making progress, and
that I was wasting my time writing silly programs that didn't do anything
useful.
However, eventually things start to click (though it took me several years).
You'll get to a point where things make sense, and you can fathom how you'd go
about writing most of the software you use on a daily basis.
------
sunkencity
It took me about 5 minutes to get started writing code.
For some people programming can make sense, for others it's just a craft
that's in the hands. When I was at the university lots of people struggled
with "understanding" programming and they wrote little code, trying to more to
come to terms with what programming is rather than trying to do it. The people
that succeeded in learning to program wrote lots of code even though it was
hard to write the code and to understand. Some of the people that didn't never
entered their programs into computers and just ran the code by hand on a piece
of paper (to what practical use is that?).
For me programming is in the hands. When I learn a new programming language
it's total chaos for 1-2 weeks and then the new regime settles and I can
understand what I have been doing. After half a year of being exposed to a new
programming language even more of the teachings settle and I can begin
understanding more, but programming it's a practical art. I suppose it can be
different if you are more mathematically minded than I am.
I suggest doing ALL the exercises in a programming book - as fast as you can
without trying to really understand what is going on behind the scenes. The
secret is that you don't have to really understand what the hell is going on
behind the scenes, you just have to know enough to stay out of trouble and
that knowledge comes from experience. In the beginning of a programming career
it'll be impossible to guess what weird bugs might occur so just code and see
what happens.
In short, _you have to have a lot of practical knowledge of programming to
support your theoretical knowledge_ , otherwise you cannot do anything with
either. A chicken and egg situation, so it's best just to jump into the deep
waters and try to swim to the surface.
------
ajuc
I've got C64 and manual in German when I was 10 (I've only knew Polish at that
time, but who cares :)).
For a few years I only played games, and sometimes entered some example BASIC
code and tinkered with constans in code to see what will happen. I remember
that my copy of manual had error in some magic graphic system initialization
code, so I've never programmed graphic on C64. It was very frustrating.
Then I've got PC when I was 15 and I played with Turbo Basic, then Turbo
Pascal - then I've understood variables and it all started to make sense.
Since then I only feel like I know less, and less :)
PS - the most impressive thing I've seen that encuraged me to keep programming
was ASCII art adventure game written in windows batch files. I've thought - if
someon can do so much witch bat files, I can do everything with my knowledge
of Turbo Pascal :)
------
thibaut_barrere
Even once you can write code on your own, things are painful from times to
times, and I believe that's normal and a good thing.
It means you're pushing yourself out of the comfort zone, staying current.
But it's also important to detect when you should "give up" or not invest time
in something that is just too painful (I personally gave up on EJB, or
temporarily on C++ to go back to Pascal, then back to C++ a few years later).
------
csomar
Don't worry, you don't become a professional programmer in one day. It's a
long process.
I started programming (Qbasic) at the age of 12. My first programs were just
some combinations of blocks of code taken from the help document. Until 18, I
had been always an amateur programmer. Then Things changed. Programming can be
flipped from fun to work. I can get paid to have fun, so why don't do it?
I was introduced to the real world and I discovered that my knowledge, as huge
as it was (a little from everything) wouldn't really help building the
smallest application. I also can't write code on my own. I need another
application to copy from or re-use the code. My frustrations began, but they
lasted short.
I started reading books. My target was Visual C#. I read a book about .Net
fundamentals and another one about Visual Studio. I become a better
programmer. It did took me months to understand OOP, but I finished by
mastering it. And yay! I used collections.
I left Visual C# and decided to develop for the web. I planned to learn it
from scratch. From the start to the end. First, I need a strong knowledge
about the Client Side. That is HTML, CSS and JavaScript. The first two are
somewhat easy to master and learn. JavaScript is very expressive and can take
a while to master.
Actually, I felt in love with JavaScript and with it's prototypal and dynamic
nature. I'm 19 and I already built 2 scripts that I'm selling on code canyon
(I'm working on the third right now ;)) Suddenly while browsing on the web, I
found a small niche, that can be valued to $100K/year. It's hidden somewhere
and related to JavaScript. No one explored this domain (except low-quality
Open Source solutions) I made my researches, grabbed a related domain and
making a plan.
Learning Programming? Oups! I forgot about it!!!
------
CyberFonic
You need to design first - on paper, white-board, etc. You wouldn't build a
house without blueprints, so why try to write a big program without sketching
stuff out so that you can break down into manageable chunks.
If that doesn't help, then maybe you need to take a good CS course. If you
have only programmed in C++, then it doesn't sound like a comprehensive
background in CS.
~~~
jff
Exactly this. The image of the lone hacker sitting down and pouring out a
bunch of code straight from his brain is a romantic one, but if you haven't
spent a little time deciding what your data structures are going to look like
and how you're going to pass stuff around, etc., your code will be crap. "Just
coding it" leads to both frustration as you sit wondering what you should be
writing and why programming is so hard, and poor code. The poor code comes in
when you start throwing in stuff like one-use elements in your structs to keep
track of something you hadn't forseen, when a little bit of planning could
have alleviated that.
I'm certainly not saying you should go write up a design document complete
with UML and everything. That would be ridiculous, damn it I'm an engineer not
a bureaucrat! Just sit down and think (on paper) about how some of the
important stuff needs to look. It'll help a lot.
As for the second point, C++ does seem like a weird place to start. Go learn
assembly or C. Learning to write assembly is a process of continually solving
tiny programming puzzles, as you figure out how to hand-roll a loop and such.
------
wccrawford
I've been writing code 'on my own' since 4th grade. My school gave a class on
programming the Apple IIe and I loved it. My parents bought me a series of
computers, starting with a Sinclair 1000, and I wrote little programs for all
of them until they weren't good enough and we upgraded. I taught myself
several other forms of basic, then started on other languages like C, PHP and
Cold Fusion.
Maybe you need to stop 'learning' programming and just do it. Pick a task you
want to complete, possibly even a task you've done before, and just do it.
I learned all those other languages and language variants starting with the
same program: Sierpinski's Triangle. Why? Because I already knew the logic for
it inside and out and it was entertaining to watch. Every new language I came
across, I wrote another Sierpinski's Triangle program on it as my first
program.
------
ajuc
By the way, I have other problem with programming.
For some time it's not technical difficulty that prevents me from acomplishing
my programming goals, but my laziness.
I am very good at learning new languages, APIs, programming techniques, etc,
because that offers me fast positive feedback. I feel good because I've
learned sth new.
But to achieve anything I have to sit down to real, boring work, and this I am
to lazy to do. I prefer to try new cool languages than do any useful work in
languages I already know. I feel worse programmer than I was when I only knew
Basic and Turbo Pascal, no matter all the techniques, design patterns,
languages, etc, that I now know.
Do you have similiar experiences? How do you deal with this?
------
grigy
Can you explain how have you tried to learn? I have learned by books. Yes, it
took long time, but reading a good book is both fun and productive way to
learn. Unfortunately I can't recommend any of my books as they all were in
Russian.
------
rndmcnlly0
Programming, as a whole, is far larger than any one person could come to
comprehend in a single lifetime (imagine it being 1000x bigger). And to make
matters worse, it is continually growing more complex at a rate no person
could follow either!
Just when you think you've finally gotten a solid grasp on writing CRUD apps
in PHP, someone shows you Haskell, or Prolog, and suddenly realized just how
little you thought you knew.
That said, this all makes for programming being an excellent domain for both a
career and a passionate hobby. Easy to learn (a tiny corner) and hard to
master (a chunk you can really appreciate 10 years in) -- what more could you
want?
~~~
moggie
Disclaimer: I am very much a novice when it comes to any kind of programming;
I have only been working in PHP, which I know is considered a scripting
language and not a programming language, for a few months now. My
understanding is relatively limited.
"Programming, as a whole, is far larger than any one person could come to
comprehend in a single lifetime (...) And to make matters worse, it is
continually growing more complex at a rate no person could follow either!"
Isn't programming, essentially, the writing of instructions and providing them
to systems that act upon them? Reading through that statement I wonder whether
it's not _programming_ that is complex, but many problems that exist in
various fields of business or study—problems that need a programmed solution.
Please—if you don't mind—would you elaborate?
~~~
mechanical_fish
_whether it's not programming that is complex, but many problems that exist in
various fields of business or study_
Unfortunately, it's both. ;)
While PHP is indeed a programming language (the term "scripting language" is a
fairly meaningless label) when you work in PHP building web pages you're
likely to spend most of your time working on things that are computationally
tractable [1], but hard because it's just hard to translate the customer's
problems into code within the available budget. Your customer has a problem,
it's lots of work to map that problem onto code, it's hard to explain to the
customer just how much work it is to turn the "simple" activities performed by
(say) their administrative assistant into algorithms, and the result tends to
be expensive to document, deploy, and maintain. So, yeah, it's the problems
that seem to be hard, not the "programming" -- though, in fact, there is no
hard-and-fast distinction there.
But then there are problems in programming that are difficult to impossible,
all by themselves. The CS folks around here can point you at plenty of them,
but here's a famous one:
<http://en.wikipedia.org/wiki/Travelling_salesman_problem>
which is a member of an entire class of famously hard-to-compute problems:
<http://en.wikipedia.org/wiki/List_of_NP-complete_problems>
which (I believe) are not particularly rare, but which come up in various
disguises, and which must be carefully worked around.
On a somewhat more applied level, there are lots of difficult problems in code
optimization that you can work on:
<http://en.wikipedia.org/wiki/Low_Level_Virtual_Machine>
Or you can spend your day exploring a giant set of data-storage possibilities,
each of which is right in its own way, and wrong in its own way:
<http://en.wikipedia.org/wiki/CAP_theorem>
[http://www.allthingsdistributed.com/2008/12/eventually_consi...](http://www.allthingsdistributed.com/2008/12/eventually_consistent.html)
One may suspect, of course, that this distinction I'm trying to draw between
"difficult programming" and "difficult problems" is not real; it's just a
matter of the degree of abstraction you use when describing the programming.
And I think you'd be right to suspect that. Programming is programming, and
programming is hard.
\---
[1] Though it is very, very possible to put something that is computationally
intractable into a "simple" web page. Web pages have no upper bound of
complexity.
------
skowmunk
If you really want to badly do it, then
Be patient with yourself, don't let frustration get the better of yourself,
keep trying, get immersed and give yourself some time.
For me, it took quite some time of interspersed half-hearted attempts, then
accidental and incremental opportunities to do increasingly complex tasks that
I could learn and scale (on different environments, SAP, NC, Excel Macros,
JMP), then some big time immersion over 4 weeks with David Power's books (his
style clicked for me). I am no expert now, but am doing stuff that I didnt'
think I could.
Would have to disagree about the "Natural" part of your comment. Keep working
at it.
Good luck.
------
davidw
Reading that makes me think I should call my parents and thank them again for
putting me in front of a Commodore PET at about 5. I may not be great at it,
but programming's always seemed fairly natural to me.
------
kapitalx
There are 2 aspects to programming that you might or might not be getting.
First is figuring out what the solution to your problem is, Second is to put
the solution on paper (write the program). Both of these take practice, but
the former is much harder to learn that the latter. Most programming courses
will teach you the latter. I wrote my first C program at 11, but I certainly
didn't understand what that * meant next to a variable at the time, but I
could think of the solution to the problem in terms of a program.
------
bobwaycott
I found programming a slow, grueling task until I had an ephiphany one day--
it's like learning any other [spoken] language. Now, I don't know if you're
particularly adept at picking up foreign languages, but the moment I realized
programming itself was the new language, I began viewing programming languages
through the lens of learning a new grammar or syntax or vocabulary, and
everything opened up for me. This was the same way things went with learning a
foreign language--once I understood that I was still just expressing myself
verbally, saying the same thoughts, it was only a matter of vocabulary,
grammar, and syntax.
Since then, I have picked up new languages that interest me far more rapidly.
I don't focus on how it compares to any other language I know or use. I don't
focus on it from the perspective of how classes and functions differ. I look
at any new programming language from a grammatical and syntactic view--and
once I have read enough code & documentation to understand its grammar and
syntax, I can start coding productively. That's the point I begin studying
classes, functions, built-ins, libraries--the grammar and vocabulary of
implementation.
I am by no means an expert programmer. I'd never call myself that. But I do
find that many would be better programmers if they understood the "language"
of programming. Learn as much as you can stand about data structures & types.
This is core--especially types. I have so often been frustrated by inherited
code that didn't show a solid understanding of data types (e.g., strings,
ints, arrays, etc.). Learn about classes, functions, inheritance, etc. These
are the building blocks of language, if you'll permit extending the analogy--
it's a bit like knowing how to structure a sentence, capitalize, punctuate,
etc. Learn the language of programming before you ever try to learn a
programming language. This is, perhaps, what you're missing. You're using a
programming language to understand programming. Take a step back and
understand programming itself first. Then sit back down with your language and
do programming.
Regardless of chosen language, the task is the same and the result should
(usually) be the same. The chosen language is really just an implementation
detail. You can write a program in Ruby, Python, C, PHP, etc., and it's still
going to be the same program. Most programmers, I believe, tend to choose the
grammar & syntax they like best. But the job of programming remains the same.
------
jasonkester
You're not going to like the answer, but:
Immediately.
Like in the first 5 minutes. When I was seven years old.
And frankly, if it didn't happen like that for you, you're pretty much
screwed.
Every good programmer I've ever known started doing it young and immediately
just "got it". Most mediocre programmers I know followed the path you're on,
learning it in a class in school, fighting to get things done, eventually
coming up with ways to solve particular problems, but never attaining fluency.
Try not to feel bad about it. It's just about the way your brain is wired.
Good programmers have a specific something wrong with their brain that makes
them ridiculously good at logic, and, sadly, not very good at much else. We
can overcome the "everything else" part through hard work, though we'll never
be as good at it as you. Similarly, you can overcome the programming part
through hard work, but you'll never be as good at it as us.
Sorry to be the one to break the news.
~~~
cturner
Try not to feel bad about it. It's just about the way your brain is wired.
No. I spent an entire summer staring at C and getting blocked on ridiculous
basic stuff because I had dumb learning techniques and kept being too
ambitious. I know a solid guy who did first-year C _three times_ before he
passed.
What got me through was learning to break problems up into tiny pieces,
practicing and learning patterns, and ignoring advice like "if you don't get
pointers straight away you'll never be a programmer".
For example, a pattern you use all the time is open a file, read some data,
close the file. More than half the people I've interviewed as programmers
can't do an adequate job of this from memory in their language of choice.
Practice just that until you have it memorised and can type it out at speed.
Look at programs as collections of patterns, and look for excuses to practice
dumb simple stuff (like scales in music). Something I knocked out over
breakfast on Sunday morning to price a collection of stocks: I have a file
containing a list of symbols. The program reads this data. It splits it into
tokens. It uses a yahoo web service to look up prices for them. It collects
the data in an object. I pass that to a formatter. Then I print it. I built
each pattern independently, and then stiched them together. Some people do
test-driven development to force themselves to construct software in this way,
and you might find that useful (I just do it that way without formalising the
tests).
amorphid wrote,
Maybe I'm the opposite of a natural.
I felt the same for five years _after_ I'd finished my degree. Work towards
mastering two things: (1) learn to reduce all problems to triviality. You can
use code to feel out a problem but do not ever try to cruise through
complexity - that's a path to certain failure. (2) Hone your tools (including
your memory for patterns) so that your cognitive load can be dedicated to
problems at hand rather than typing or looking up patterns for bread-and-
butter stuff like reading the contents of a file.
amorphid - I don't know what your problems are specifically but maybe some of
that will be useful.
Edit: I made a claim at the top that I couldn't reference. Removed.
~~~
jasonkester
_I spent an entire summer staring at C and getting blocked on ridiculous basic
stuff because I had dumb learning techniques and kept being too ambitious. I
know a solid guy who did first-year C three times before he passed._
Sounds like we're just using different definitions for "good". You seem to
define it as meaning competent, so yes, you and your friend fall into the
category of people who have successfully taught yourself to program computers
despite not being wired to do it.
I was talking about the Fred Brooks 10X types when I said "good". Those guys
didn't drop Comp Sci 101.
Again, please try not to take it personally. They're not better people than
you. They just took to computer programming like everybody else takes to
breathing.
~~~
thereddestruby
There's no magic wiring there - humans don't speak computer out of the womb.
Some people start programming at a younger age than others. Some move on, some
stick, some take it more seriously, some go on to become great.
It's like any other thing really. Football, Soccer, Jiujitsu, Ping-Pong, etc.
------
sethwartak
Work on something useful, something that has a goal.
Beating your head against a problem for hours is the best way to learn
something (because you learn all the ins and outs of that thing, not just the
part you were working on).
------
spooneybarger
Can you define what you mean by 'on your own'?
~~~
amorphid
Picked up a few books, wrote basic programs, etc. When it got harder, found
ways to ask people questions. I usually get frustrated when it comes to
solving puzzles that aren't linear programs.
~~~
spooneybarger
What is causing the frustration?
~~~
amorphid
I can see the solution in my head as a picture, not words. Maybe I need to
practice framing problems more.
~~~
Chris_Newton
That's interesting, and actually quite encouraging: it suggests that you do
think in terms of abstractions of the problem you're trying to solve, which is
arguably the most fundamental skill in programming. If your difficulty is that
you haven't got the mechanical process of turning your thoughts into code down
yet, that's a much easier thing to overcome.
Could you share with us what books and programming languages/tools you've been
using? While there are certainly common ideas, different types of language
take a different approaches to describing a program. Maybe whatever you've
chosen doesn't suit your way of thinking particularly well, and you would find
another tool more intuitive at this stage.
~~~
amorphid
The book I've had the most luck with is _Learning To Program_ by Chris Pine.
There's a question in the book about counting the sections of land on a
standard X,Y grid map. That would be a good example of a problem that blows up
my brain.
~~~
Chris_Newton
Which of these would you say is closest to your difficulty?
a) You don't understand what the problem means.
b) You can't describe an algorithm that would solve the problem in plain
English or "pseudocode".
c) You could describe the algorithm informally, but don't know how to code it.
| {
"pile_set_name": "HackerNews"
} |
How the Medium Editor Works - tosh
https://medium.com/medium-eng/why-contenteditable-is-terrible-122d8a40e480
======
adamtj
> 3\. All visible edits should map onto an algebraically closed and complete
> set of visible content.
And suddenly I have a common-sense understanding of what the mathematical
terms "closed" and "complete" mean. I can now use these ideas.
Non-closure is a problem that I've encountered often, but I've never had a
name for it. If problems are obstacles, then names are the handles that let
you grip them and move them out of the way.
| {
"pile_set_name": "HackerNews"
} |
The myth of 'bulletproof' Linux - unstoppableted
http://www.itworldcanada.com/news/analysts-linux-security-mystique-dangerous/144662
======
nodata
The article is correct: no system can be 100% secure, and adding an anti-virus
layer helps.
But the article specifically discusses desktop Linux and Ubuntu Linux in
particular. If we were to discuss Fedora Linux with SELinux enabled
(+enforcing) I'd argue that the anti-virus part is unnecessary.
| {
"pile_set_name": "HackerNews"
} |
Show HN: get location from tweets - abava
http://tl.linkstore.ru
======
vbm
The background color of the page is irritating my eyes. May be it is happening
only to me
| {
"pile_set_name": "HackerNews"
} |
House orders Pentagon to say if it weaponized ticks and released them - no_wizard
https://www.rollcall.com/news/congress/house-orders-pentagon-report-whether-weaponized-ticks
======
cascom
Interesting that this might officially come out - it’s been an open secret for
years
[https://www.amazon.com/Lab-257-Disturbing-Governments-
Labora...](https://www.amazon.com/Lab-257-Disturbing-Governments-
Laboratory/dp/0060011416)
------
hairytrog
How do you defend against weaponized ticks or mosquitoes?
~~~
opwieurposiu
DDT and plenty of it!
[https://en.wikipedia.org/wiki/DDT](https://en.wikipedia.org/wiki/DDT)
| {
"pile_set_name": "HackerNews"
} |
The Book Market Stares At Ubiquity - peter123
http://www.avc.com/a_vc/2009/03/the-book-market-stares-at-ubiquity.html
======
thorax
Kindle makes me more excited for the next generation of ebook readers than it
does for itself. When I use it, I think how amazing the next-gen readers are
going to be. And the great part is that all the tech it needs to Get It Right
exists in an affordable fashion.
I think my primary issue is with the slowness of the device and the clunkiness
of the "5-way". Once they get this part right, perhaps replacing 5-way with a
touch screen, they'd be great. I don't need color, though that will come with
time, but I don't like feeling frustrated trying to use the device quickly to
look up information or move from mode to mode.
------
MikeCapone
I'm looking forward to trying the Kindle, but it's not available (afaik) in
Canada.
| {
"pile_set_name": "HackerNews"
} |
Microsoft shipped Python code in 1996 - znpy
http://python-history.blogspot.com/2009/01/microsoft-ships-python-code-in-1996.html
======
teh_klev
Repost here with discussion:
[https://news.ycombinator.com/item?id=12141311](https://news.ycombinator.com/item?id=12141311)
| {
"pile_set_name": "HackerNews"
} |
Google posts Windows 8.1 vulnerability after 90 days - mmorris
http://www.engadget.com/2015/01/02/google-posts-unpatched-microsoft-bug/
======
cheald
This story is surprisingly hostile to Google. A 90-day window after which the
bug is published is about as responsible as responsible disclosure gets. The
headline really rubs me the wrong way, as though Google raced to publish this
vulnerability to spite Microsoft.
Not talking about the bug doesn't mean it's not there, but talking about it
sure makes people aware that they should perhaps take extra precautions until
Microsoft patches the bug. The attitude that "you're giving info to the evil
hackers and now we're all unsafe!11" is the very essence of the fallacy of
security by obscurity - your ignorance of a bug is not guarantee of others'
ignorance of it. Pinning blame on Google for putting us all at risk is the
exact wrong response; Microsoft is at blame for taking more than three months
to fix a critical security bug, which has been there for even longer.
This sentiment is very visible in the comment section - the story's suggestion
that Google did something wrong here, and the torrent of clueless commenters
raging about how evil Google is being is disheartening, to say the least. I
wonder how much of that is a result of the story's tone.
~~~
giovannibajo1
On the other hand, project zero publishes kiddies-ready exploits for their
vulnerabilities, which is a very questionable practice for vulnerabilities
which are still in the wild. Even if patches were available, it would be far
better to wait for most devices to be patched before releasing a full exploit.
They did this with iOS and now with Windows. We are now waiting for such
useful ready-to-use exploits for major Android versions as well.
~~~
cheald
Metasploit does the same thing, and we've managed to not have the internet
implode yet.
Yours is the standard argument against _any_ form of disclosure. I'm not
discounting it, because no disclosure has its merits, but responsible
disclosure satisfies both an ethical imperative (you can't let people believe
they're secure if you know otherwise) and provides pressure on vendors to fix
their software, when the vendor might otherwise deem it not worth the time or
money to fix the issue, which leaves their customers vulnerable.
The basic idea behind disclosure is "we might not be the first people to find
this, and we definitely won't be the last, so let's remove all doubt and rob
the bad guys of the element of surprise". Responsible disclosure is intended
to permit responsible vendors to fix the issue before wide publication, but an
uncooperative vendor doesn't mitigate the reality that the bug exists and will
eventually be found by someone less benevolent.
~~~
boracay
It's still just an excuse. Of course there's no liability in computing so no
one actually have to come to terms with that.
------
dragonwriter
Why isn't the source's headline "Microsoft fails to patch privilege-escalation
vulnerability within 3 months"?
~~~
btian
Because that would cause Microsoft to shift their advertising budget
elsewhere.
Just being practical.
------
DominikD
It's more nuanced than article or commenters on HN want it to be. If there's a
constant communication channel between companies and there's a reason to
believe that patch can't be created in 90 days, sticking to deadlines seems to
prioritize the wrong things.
On the other hand if MS wasn't responsive enough and upfront about the time
it'd take to patch and reasons for that, then sure, 90 days seems more than
needed leeway for Microsoft. But I don't know how things worked and I've seen
enough to assume that both scenarios are possible.
------
doe88
I think the initial principle of the disclosure policy is good, it is intended
to put a bit of pressure on _bad_ vendors to fix their bugs. That said I don't
think we can classify MS as a _bad_ vendor. They fix lot of critical issues
every years, they certainly have their own internal teams working on security
issues, they're _responsibles_.
Vendors with a quite good track record should be allowed to have some slip
ups. You cannot compare a vendor who doesn't fix anything on time with one
that usually fix issues promptly but occasionally shows a delay on a report.
The process should take that into account. I think the binary handling by
Google on this one is not very well thought-out.
------
lawnchair_larry
What a terrible linkbait headline.
~~~
dang
We edited the title in an attempt to make it more neutral.
------
mcintyre1994
> It is important to note that for a would-be attacker to potentially exploit
> a system, they would first need to have valid logon credentials and be able
> to log on locally to a targeted machine.
Are Microsoft downplaying or is this genuinely quite minor? The article
discusses a disgruntled employee and since all their money comes from
Enterprise presumably disgruntled employee can cause major damage is a pretty
huge problem?
~~~
scarmig
A not-particularly informed take:
It means that every user effectively has root privileges. Which means that
every user can eavesdrop on other users, view their saved data and files
(unless encrypted on disk), intercept their network communications,
impersonate them, steal their passwords (system, application, external web
sites).
How bad that is depends on your particular use case. But for pretty much any
setup where security is a concern or there's any sensitive data at stake, this
is a very serious issue.
~~~
jenscow
However, in the case of Windows, this issue isn't that much severe as it would
be on a unix-like, for example.
With the set up of Windows servers I've seen, only the admin logs in anyway.
It's not really used as a "multi-user" system per-se, where you get different
users logging in at the same time. It does happen, but it's not common.
~~~
scarmig
Hahah, I figured Windows might be slightly better about this, hence the self-
admitted uninformed take.
Could you clarify, though: do you mean to say Windows isn't as vulnerable
because of cultural reasons (i.e. Windows systems aren't multi-user usually)
or because of technical ones (they support something like SELinux out of the
box)?
~~~
jenscow
The _impact_ isn't as severe, for cultural reasons.
------
dang
Url changed from [http://www.pcworld.com/article/2864312/google-discloses-
unpa...](http://www.pcworld.com/article/2864312/google-discloses-unpatched-
windows-vulnerability.html), which points to this.
------
Siecje
This is going to be more common when Windows 7 is no longer supported
2015-01-13.
~~~
_delirium
Windows 7 has security support through January 2020 [1]. What's ending this
month is "mainstream support", which seems to mean new features, phone
support, etc. [2]
[1] [http://windows.microsoft.com/en-
us/windows/lifecycle](http://windows.microsoft.com/en-us/windows/lifecycle)
[2] See point 6 at
[http://support2.microsoft.com/gp/lifepolicy](http://support2.microsoft.com/gp/lifepolicy)
| {
"pile_set_name": "HackerNews"
} |
Genghis Khan's genetic legacy has competition - benbreen
http://www.nature.com/news/genghis-khan-s-genetic-legacy-has-competition-1.16767
======
slg
Maybe I am missing something in the article, but how do they identify the
"founders" of these Y-chromosome lineages? What distinguishes the founder from
their father's Y-chromosome lineage? Are they just trying to attribute the
common lineage back to a historically powerful man who likely was involved in
its spread and therefore calling them the "founder"?
~~~
IndianAstronaut
This is puzzling to me as well. It may be more a familial thing than just one
man. Ghenghis Khan was a member of a very powerful tribe and all the men, who
were likely very closely related, would have engaged in the same prolific
behavior during conquests.
~~~
Florin_Andrei
Yes and no.
Genghis Khan actually rose from a modest station in life, unremarkable by that
time and place's standards. But you're right that it was a family thing - he
had lots and lots of descendants, about half of which were male, and these
descendants inherited some of the high status of their father, and therefore
also had lots of descendants. And so on over generations, until the status
faded.
It was a family thing indeed, but it started with one man, and that man was
Temujin, a.k.a. Genghis Khan.
------
duaneb
For the 850AD lineage, it seems like the formation of the Holy Roman Empire
would seem a prime candidate for an "event" in europe that led to the "modern
european". Was Charlemagne a profitable pater for his family?
~~~
milesskorpen
Sounds like you need a powerful man AND a man who fathered many, many,
children. A quick search suggests he had 20 kids, not sure whether that's
enough to qualify.
~~~
Raphmedia
I doubt 20 kids would be enough to qualify. Most people of my grand parent's
generation had around 20 kids. It used to be the norm.
~~~
benbreen
Keep in mind that mortality prior to reaching one's first birthday was upwards
of 50% in most premodern societies, so the key factor here seems to me to be
not only fertility, but the ability to wield social capital over multiple
generations (employing court physicians, wetnurses, etc) to ensure that all
those kids actually live to adulthood. Hence why I find this study so
interesting - it's using genetic evidence to map the flows of social power
across generations (like with the dynasties of Genghis and the Qing).
~~~
smallhands
20 kids!?,the man is a serial rapist.please listen to the wrath of the khan
podcast by Dan Carlin
[http://podbay.fm/show/173001861/e/1343775512?autostart=1](http://podbay.fm/show/173001861/e/1343775512?autostart=1)
~~~
milesskorpen
Once again, not talking about Genghis, the thread refers to Charlemagne.
------
ctchocula
One glaring mistake I observed was: "In addition to Genghis Khan and his male
descendants, researchers have previously identified the founders of two other
highly successful Y-chromosome lineages: one that began in China with
Giocangga, a Qinq Dynasty ruler who died in 1582." while Wikipedia says Qing
Dynasty did not begin until 1644.
edit: Looks like a commenter addresses it: "Here is part of the abstract of
that paper: "We suggest that the lineage was spread by Qing Dynasty
(1644-1912) nobility, who were a privileged elite sharing patrilineal descent
from Giocangga (died 1582), the grandfather of Manchu leader Nurhaci, and
whose documented members formed approximately 0.4% of the minority population
by the end of the dynasty." Giocangga died in 1582 and was in Ming Dynasty. He
was the ancestor of Qing Dynasty rulers. His lineage was spread by Qing
Dynasty nobility. BTW, It is Qing Dynasty (1644-1912) not Qinq Dynasty."
------
samatman
I wonder if it would be possible to use eigenface analysis to produce a
'typical' face borne by men who carry these particular Y chromosomes. That
would be interesting indeed.
~~~
samatman
This could also be done for lineages of women as well, by following
mitochondrial DNA.
| {
"pile_set_name": "HackerNews"
} |
Ask HN: Scale of 1-10, how much did you trust Cloudflare before and after ban? - dfps
======
dfps
Just curious. Cloudflare published this a while ago:
[https://blog.cloudflare.com/why-we-terminated-daily-
stormer/](https://blog.cloudflare.com/why-we-terminated-daily-stormer/)
What is the temperature, though?
Scale of 1-10, how much did you trust them before the ban, and how much
currently?
------
matchmike1313
10 before the ban, 4 after the ban.
| {
"pile_set_name": "HackerNews"
} |
Show HN: ShelfLife, a social commerce platform for collectors - nickh
http://www.shelflife.net/?utm_source=hackernews&utm_medium=post&utm_campaign=showcase_shelflife
======
eterm
"Blocked, category games"
I think perhaps it's matching on *lflife and making some assumptions?
~~~
nickh
What's blocking you? A corporate firewall?
------
nickh
ShelfLife co-founder here. We're aiming to document to every collectible ever
made, and provide collectors with the best tools for buying, selling, and
tracking their collections.
~~~
ToastyMallows
Awesome site, I've had this idea many times I hope it takes off.
Question: How general will catalogs be? I collect keychains, will something
this general be supported?
~~~
nickh
Thanks! Nearly anything can be catalogued, provided there's information
available for it (E.g. manufacturer, release date, etc), and it's not
something like the sweater that your grandmother knitted you.
~~~
ToastyMallows
Ehh that might be hard for keychains. Thanks for the info!
------
hoopism
Have to check out the Canadian version of DD. Site looks promising but lacked
the few things I am interested in. Hope it takes off and I encounter it again.
~~~
nickh
What do you collect that isn't on ShelfLife yet? There might be a curator
working on it right now.
| {
"pile_set_name": "HackerNews"
} |
Rules of Logo Design - jwilliams
http://www.tannersite.com/rules-of-logo-design/
======
neilk
Every successful design breaks at least one "rule". Because information is
retained when it's distinct from the norm. Talent in design consists not in
following rules but knowing when and how a rule can be broken.
IBM's logo is way too busy. Apple's original logo has too many colors and
isn't serious enough. GE is almost antique. UPS has that dull brown.
------
huhtenberg
Hmm .. let's see .. rules demand logo to be recognizable, unique, timeless,
bold, confident, surprising in presentation, solid, simple, not distracting
and balanced visually.
If you are having trouble with memorizing all these cool adverbs, just stick
to the rule #42 .. ready ? ..
It should be honest in it's representation.
A list that is perfect in its complete and utter uselessness.
~~~
apmee
Pedantry Corner: They're adjectives, not adverbs.
~~~
huhtenberg
Damn right they are :)
------
maxklein
His logos suck. A good logo should be recognized from it's outline - like BMW,
IBM, Apple, Mercedes, the Nazi Party. Using a nice font and adding a butterfly
is not a good logo.
So I prefer not to take advice from someone who is not even particularly good.
------
eventhough
Too many rules. Examples would work better than a list of rules.
~~~
jfornear
I'm sure you are supposed to assume he follows his own rules and that examples
are in his portfolio. That being said, after looking at his portfolio, I was
not impressed. Some of the logos he created did not seem memorable at all, had
unnecessary detail, etc.
You can't just follow a set of rules to come up with a nice logo. You kind of
need to have talent and an eye for colors, typography, etc.
Nevertheless, give him credit for listing out some helpful things to keep in
mind for designing things.
The one thing I would say differently is that if you really like a certain
logo's style, it isn't a crime to adopt similar styles for your own. All art
is influenced by others in some way, and don't stick with something that sucks
merely because it's 'original'.
~~~
jwilliams
Yeah. The most interesting ones were ones of practice rather than design -
check it in b&w, scale it, mirror it, etc. All perhaps obvious to many.
------
fjsjex
"Use sharp lines for sharp businesses, smooth lines for smooth businesses."
What is that supposed to mean?
~~~
whacked_new
use vague descriptions for va...
... blog articles.
------
manny
Was I the only one who read this as "Rules of Lego Design" only to have my
excitement crushed into a fine powder?
| {
"pile_set_name": "HackerNews"
} |
Ask HN: Software pricing criteria for startups/freelancers? - asyazwan
Can anyone share how do you price your software? As startup/freelancer the software will not be as popular compared to the big players out there, so high price may hurt. Likewise too low will starve you.<p>Is there an effective mechanism to price based on customer? ie. if customer is individual, low price, otherwise, high. But it seems to be easily exploitable.<p>Any insights? It would be great to know <i>exact</i> methods you use to measure LOCs, intangible costs such as time spent, and anything else.
======
aditya
Pricing is mostly a dark art / finger in the air analysis, here's what I think
you should do:
<http://news.ycombinator.com/item?id=677396>
| {
"pile_set_name": "HackerNews"
} |
Commitment vs. Forecast: A Subtle But Important Change to Scrum (2011) - bradmwalker
https://www.scrum.org/resources/commitment-vs-forecast-subtle-important-change-scrum
======
jryan49
I still think it ironic that when looking at the actual Agile manifesto at
[http://agilemanifesto.org/](http://agilemanifesto.org/) (which is short and
uncomplicated), that the first line is "Individuals and interactions over
processes and tools" and these days practicing agile, at least in a big-house
corporate environment feels like anything but.
~~~
jt2190
The Agile Manifesto suffers from "the curse of knowledge": The signatories are
all very experienced, and deeply understand all of the differences between
projects and people and when to be flexible and when to be rigid, and they
know that it's important to _not_ specify a method for _every_ situation. But
there are many, many people entering the software industry who don't have
their years of experience, and who need very clear, basic instructions as a
starting point, and hence Scrum steps in to fill the gap. What's unfortunate
is that scrum isn't a program for developing software managers from rigid, by-
the-book managers into experienced, _agile_ managers: Instead it encourages
newbie practices for everyone, forever.
~~~
mistermann
> Instead it encourages newbie practices for everyone, forever.
I feel like YAGNI is similarly abused, I don't know how many times I've said
"You know what, while we're at it we should...." only to be overridden with
"YAGNI!", only to be proven right 3 months later, only now the cost of
refactoring > value of the feature, and saying I told you so isn't being a
"team player", so no one ever learns.
I very often wonder if I am the only one that feels this way.
~~~
0x445442
> I very often wonder if I am the only one that feels this way.
You're not. One of the bigger issues I've seen with Scrum is not being able to
shoe horn in work that needs to be done because business didn't identify it as
a "story".
I believe development is there to serve business and any processes used to
facilitate this serving should be defined by development. I don't dictate how
a general contractor satisfies my requirements for my home build, I leave that
to them. I just expect my requirements to be met at or near budget.
A lot of these software process issues boil down to managements never ending
quest to commoditize developers.
~~~
beat
There's an analogy I like to use... you're baking bread. Bread is just flour,
water, yeast, and salt, plus maybe decoration ingredients. You mix things in
the correct proportions, let it rise, bake at the right temp/time, and you get
bread. Easy, right? Then someone wants you to put in raisins. "It should be
easy! It's just a handful of raisins, I don't see why you're telling me it
can't be done!", they shout, five minutes before the oven timer goes off.
Scrum is, at heart, _designed precisely to stop the behavior you 're
demanding_ \- that is, the endless stream of "small" interruptions and
constantly shifting priorities. The raisins.
Why are you trying to "shoe horn in work" for _this iteration_ that you
weren't aware was even an issue when the iteration planning happened? Is
production down? Is it a hair-on-fire emergency that threatens the business?
Or is it just "important". FUCK important. If it's so important, put it in the
story backlog and have it done in the next iteration.
If it's important enough to disrupt the iteration, it's important enough to
cancel the iteration, toss all that iteration's unfinished work onto the
backlog, and start over. That's how Scrum is supposed to work, but never does,
because _someone_ wants raisins at the last minute and thinks it's not a big
deal.
~~~
Nomentatus
Yes, I have seen businesses die, both ways. The problem is that YAGNI cashes
out to "make the right decisions" \- it's logically a tautology, but an
emotional encouragement to drop features. Dropping is usually the correct
decision - but too often catastrophic when it's not. If you invoke YAGNI you
have to be careful you aren't "picking up nickles in front of steamrollers" \-
a great idea until suddenly it's not. Fortunately, frequent iteration gives
people a more realistic view of the cost of raisins.
~~~
beat
I haven't seen businesses die because they _can 't wait two weeks_ for a new
feature, and had to have it _right now_. I have seen businesses die because a
development team was so paralyzed by constant interruptions that they were
dysfunctional and couldn't get any real work done.
~~~
Nomentatus
If it's a better data structure, then two weeks might set the course, alas.
It's happened to me. Fact is, one can't get away from judgement calls, slogans
might nudge in one direction or another, but it all remains a judgement call
what's just a raisin and what isn't. The fatal problem is bosses up the chain
who want to demonstrate they matter and are worth their expense by throwing in
superfluous raisins; having a crude slogan (misleading or not) to deter them
is fine by me.
~~~
beat
A "better data structure" is almost never an emergency. And being unable to
adapt or extend a data structure in the future is not agile, and it's not the
simplest thing that can possibly work.
Back when I first started building a startup, I thought "Thank Dog I no longer
have to deal with stupid compromised software, and can start writing
everything right!" By the time I was getting anywhere, I was well into toss-
over-wall methodology. I did things that I knew full well were compromised and
would hurt me later, because the work needed done, and needed to "be done". It
was a real education.
I actually have a lightning talk in mind on this subject, called "Why software
sucks", that argues that suckage is the nature of software development, and
that "barely works" is the best we can realistically ask for - or even should
ask for.
------
justspamjustin
My team moved from scrum to a kanban style process a couple years ago. The
benefits were immediate. We no longer have drawn out sprint planning meetings
where we discuss requirements of features that we never end up working on in
that sprint. We don’t waste time debating complexity of features. Everything
is now just ad hoc. When we need more requirements definitions, we pull the
necessary members of the team together and discuss it. When we see that there
needs to be architectual discussions and high level planning, we do it
immediately when we recognize the need for it. The idea that you can try and
commit to or even forecast how much can be completed for a period of time is
pretty absurd. Just identify the minimum requirements of what needs to be done
and do it. Retrospective is still productive. But sprint planning is a waste
of time IMO.
~~~
jryan49
If you read the actual Agile manifesto, what you are doing now is more agile
than scrum :)
~~~
smackay
A lot of the artefacts of a process are intended to help teams transition from
the old way of doing things and to help teams who have stalled or failed to
deliver. Sprints, as far as I understand them, were intended to get the wheels
turning and to demonstrate results at regular intervals so the customers for
any software development effort could see progress and gain confidence that
the team was going to deliver. Once everything is up and running smoothly then
it's entirely reasonable to drop all that and just focus on delivering - you
don't need a lot of packaging an rituals to do that.
~~~
hinkley
But Scrum is working! Why would we ever change?
------
gedy
We had Ken Schwaber come in to our shop early on in Scrum when we were
struggling to get a new product going, and at its basics Scrum made tons of
sense. Get a small group of people together to figure out how to make the
highest priority items to ship to the customer (each written in a few
sentences), then _leave that group alone_ until the sprint was done. The
"commitment" was on delivering the value in the few sentences, not matching
mockups, specs or some never-ending chain of tasks.
It was a really simple and effective approach, but where it broke down was:
there's a lot of people/roles/depts who have no idea how to work
incrementally. UX "needs to work ahead", product "needs the whole backlog",
Ops "have their own backlog", etc.
Scrum didn't work with everyone hawking over a few engineers - then it just
becomes task tracking bullshit.
------
qznc
Now I would suggest to deprecate "sprint". It is not healthy to sprint
continuously. Sane software development is much more like a marathon.
~~~
dudul
I don't know if this is meant to be facetious, but I actually fully agree.
"Sprint" is a terrible analogy because in reality it is impossible to be
sprinting all the time. I usually just say "iteration".
~~~
neltnerb
I'm confused, doesn't your statement mean the analogy is good? You can neither
"sprint" at work continuously nor constantly sprint in reality.
~~~
dudul
Let's say you do 2 week sprints as part of your process. You do a sprint,
finish it, and then do another sprint immediately after. How is that viable?
Effectively it means that you never stop sprinting. I don't think it's
sustainable.
~~~
neltnerb
Is that actually what scrum suggests sprints are? Thanks, I missed that,
that's silly if so. I assumed by the name that this was like a one week a
month kind of thing.
~~~
theptip
I think there's quite a lot of getting hung up on the word itself here...
According to the Scrum guide, a sprint is just:
> a time-box of one month or less during which a "Done", useable, and
> potentially releasable product Increment is created. Sprints have consistent
> durations throughout a development effort. A new Sprint starts immediately
> after the conclusion of the previous Sprint.
([http://www.scrumguides.org/scrum-guide.html#events-
sprint](http://www.scrumguides.org/scrum-guide.html#events-sprint))
There's nothing that says you need to "sprint" through your sprints, quite the
contrary it's supposed to be a way of measuring your team's steady-state
output by making the feedback loop short.
If people are really hearing the word "sprint" and thinking "ah, Scum is
telling me to work at 110% all the time without stopping", then I put forth
that no methodology or change of terminology is going to save them from
themselves. However, I suspect there's something about the timebox structure
that makes short-term thinking the default unless discipline is applied, and
discipline is hard.
~~~
rapala
Exactly. The point of time boxing is that you have to stop and reflect on the
time spent. It gives you the chance to switch tasks if priorities have changed
or to split the current task.
Or to go on to the next sprint with the same task. But here lies the problem
in many cases. The sprint is taken not as a time box but as a deadline. A
sprint should meen: "You can work 2 weeks, 5 days a week, 8 hours a day on
this. Then you stop to think."
------
taeric
Funny to see this. I thought getting commitment was one of the soft mechanisms
of scrum. An annoying one, because power dynamics are always at play. Still a
mechanism, though.
I think I'm supportive of the idea on removing it. Seems the goal is
ultimately to find ways in rhetoric and action to align the teams in working
to the end goal. Which, often, might require tradeoffs to reach a timely
delivery. And timing is a requirement.
~~~
crdoconnor
It probably made more sense to put it in in the beginning when the process was
still being sold to senior managers. Now that scrum is much more embedded,
taking out for the reasons given makes more sense.
------
bamboo_7
Yes yes yes. It never made sense to me that our ticket sizing was supposed to
be an estimate and yet the planning that used those estimates was considered a
commitment. Totally insane.
~~~
philbarr
[https://imgur.com/a/OnJKA](https://imgur.com/a/OnJKA)
~~~
joejerryronnie
Fantastic, I'm using this in my next presentation to management.
------
daanlo
I am a big fan of scrum precisely because of the word commitment (I hand't
realized it was removed). Forecast means we need to use a larger estimate next
time. Commitment means: "how can we still get this live". In a good culture
the answer to this should rarely be work extra hours or reduce code quality -
it should be reduce scope of functionality. Without the commitment you often
get micro feature creep, where a bunch of non-essential micro features are
added. A bit like this ([https://lawsofux.com/parkinsons-
law.html](https://lawsofux.com/parkinsons-law.html)). It is also the obvious
moment in time to tell a product owner "we need to remove functionality x or
not ship". Without the commitment that important conversation is never had. In
my experience micro & macro feature creep is one of the biggest issues in sw
development. Obviously you can still do the above with the word forecast, but
forecast empowers you less to actually change anything (apart from better aka
higher estimates next Sprint). On a general note: I feel scrum is often
misused to "manage" engineering teams, when it is really a productivity tool
that the team should use for itself.
~~~
brightball
Depending on the size or the organization, that word commitment can create
numerous issues.
It can keep teams from collaborating because of a need to finish their
commitments first, effectively blocking the other teams and delaying actual
delivery of the product. You can see the same issues in customer support
requests. The second that somebody decides to measure completed sprint
commitments, you are in deeeeeep trouble because it forces people to low ball
to hit that number. It removes your ability to pivot.
The entire concept of sprint commitments in a moderately sized team is
borderline destructive.
This change is the best news about software development I’ve read in YEARS.
------
EngineerBetter
I wrote an article on the negative psychological impact of commitments in
sprints ([https://www.linkedin.com/pulse/scrum-makes-you-dumb-
daniel-j...](https://www.linkedin.com/pulse/scrum-makes-you-dumb-daniel-
jones)). It's great to see renewed focus on shifting away from a term that has
been used to make developers' working lives unpleasant, leads to lower-quality
code, and gives false certainty to stakeholders.
------
je42
This PDF is pretty nice. Regarding the differences of Kanban vs Scrum.
[https://www.crisp.se/file-uploads/Kanban-vs-
Scrum.pdf](https://www.crisp.se/file-uploads/Kanban-vs-Scrum.pdf)
------
perseusprime11
Is Agile & Scrum still relevant? I am seeing more and more consultants who
used to selling this stuff have moved upmarket into Lean and Digital
Transformation of companies.
------
romanovcode
Can we deprecate scrum in 2018?
~~~
dang
Please don't post unsubstantive comments here. I'm sure few people here have
any fondness for software processes, especially in the corporate decadence
stage, but that's no reason to make HN worse.
------
brightball
This is perfect.
------
saas_co_de
[http://programming-motherfucker.com/](http://programming-motherfucker.com/)
~~~
make3
do people really pair program in real life? I've never actually seen it
~~~
dudul
Yes.
~~~
make3
at which company did you see it, and was it everyone
------
woliveirajr
Tag [2011] is missing...
~~~
sctb
Thanks! Updated.
| {
"pile_set_name": "HackerNews"
} |
Quantum Computing Hardware Teardown - szczys
https://hackaday.com/2018/01/22/quantum-computing-hardware-teardown/
======
szczys
I can definitely follow this article, but I still don't feel like I have an
intuitive understanding at all the way I do with traditional processors that
use plain old electron flow. It makes me wonder if that's how people felt when
integrated circuits were first being seen in the world.
~~~
wd5gnr
I think the harder transition was from tubes to bipolar transistors. FETs
were/are more like tubes.
| {
"pile_set_name": "HackerNews"
} |
Ask HN: What domain registration and DNS service do you use? - dangayle
I love using Digital Ocean and Heroku for my websites. Clean designs, straightforward navigation and functionality, affordable.<p>And then you have domain registrars like GoDaddy, Domain.com and others that are the exact opposite (except cheap).<p>Is there a domain registrar that doesn't severely suck the life out of creating a new domain? Something that has an easy to use API, clean and modern?
======
niclupien
Namecheap works well. They have an API but I never used it.
~~~
kkoch986
I'm up to about 12 domains on namecheap, can't complain
~~~
d0ugie
Do they have a good deal on SSL certs when buying or transferring domains? the
certs are good, yes?
~~~
gesman
I used namecheap and buy SSL certs, including wildcarded SSL certs.
I think they have the best prices for that.
SSL certificate cost is a scam anyways - so you better off with whoever is the
cheapest.
------
workhere-io
[https://gandi.net](https://gandi.net) /
[http://doc.rpc.gandi.net](http://doc.rpc.gandi.net). For DNS I sometimes use
AWS' Route 53 because it provides some unique options regarding S3 and
CloudFront.
------
pairing
I've been using Name ([http://name.com](http://name.com)) for a few years now
and I've been happy with their services. They also have two factor auth for
accessing your account which is a huge plus.
------
ekpyrotic
A Small Orange ([http://asmallorange.com](http://asmallorange.com)). Simple,
clean & top-quality support. Used them for 2 years now - and it's been a
pleasure.
~~~
chrxn
I may be wrong, but this company seems to only offer hosting services. I see
no domain name registration services offered.
------
Swanty
[https://www.gandi.net/](https://www.gandi.net/) and
[https://dns.he.net](https://dns.he.net).
------
RexRollman
I used Gandi for my domains for the last six years. They been great, but since
I've never had an issue, I can't say how good their customer service is.
------
randallma
dnsimple ([https://dnsimple.com](https://dnsimple.com))
| {
"pile_set_name": "HackerNews"
} |
The Reproduction of Privilege - pg
http://campaignstops.blogs.nytimes.com/2012/03/12/the-reproduction-of-privilege/?src=recg
======
rdl
There are a lot of points in this (some of which seem bogus), but just to
focus on one:
"Higher education itself has polarized" -- relative growth in competitive,
very competitive, and most highly competitive colleges AND in community
colleges, but not in the less and noncompetitive 4-year colleges.
This seems like something to be celebrated and encouraged, not reviled. I
really don't see any reason for any but the top 100 universities (maybe less)
to exist as residential institutions, focused primarily on research; the
community college system, plus the Internet, should be sufficient for the vast
majority.
High quality community colleges (and not forgoing income by going to school
instead of working for 4 years) would go a long way to reducing the income
gap, especially combined with decent public education and free Internet
resources.
Pell Grants cover 62% of the cost of community college, and there are usually
state funds on top of that. There are very good reasons to not cover 100% of
the cost of education with "free money" -- bringing it down in cost to the
point where the poor can afford it at some acceptable sacrifice should be the
goal. Lowering the actual cost of delivering community college classes makes
more sense than trying to use federal money to subsidize inefficient
producers, too.
The big problem with community colleges is branding and prestige. A lot of
people could get just as good an education in the community college format,
but as long as employers view a 4 year BA in communications from some
relatively worthless college or university as superior to the community
college degree, it will be a problem. Some kind of independent credentialing
system (vendor certs in tech are one example -- a self-taught CCIE is probably
a better pick to build and admin a Cisco network than a guy with a BA in IT
from U of Phoenix), merit based candidate evaluation (which in some cases runs
up against antidiscrimination laws...), and a move away from hiring as
employees to hiring contractors or buying services from small firms.
I wish there were a way for the super-rich to earn as much prestige by
endowing basic technical courses at thousands of community colleges as by
building yet another stadium at a mediocre large university.
~~~
buss
> There are very good reasons to not cover 100% of the cost of education with
> "free money" -- bringing it down in cost to the point where the poor can
> afford it at some acceptable sacrifice should be the goal. Lowering the
> actual cost of delivering community college classes makes more sense than
> trying to use federal money to subsidize inefficient producers, too.
I think that you shouldn't _have_ to sacrifice _anything_ to become educated.
I think that would mean the poor are always sacrificing relatively more than
their richer contemporaries. If we don't cover the entire cost of education
for those most unable to pay then we are continuing the stratification of
higher education.
Say the cost was covered at 80% for individuals coming from families making
$40,000 or less per year. This family is probably already struggling to save
money while paying their bills, and having to divert any amount of money to
the continued education of a child is probably off the table. This requires
that the child work while attending school which takes valuable time away from
studying and getting enough sleep. Lots of people work while going to school
and end up dropping out or going every other semester because they don't make
enough in their low-paying unskilled labor job. This is a vicious cycle which
results in the poor staying poor because they can't make enough at the job
they must have in order to pay for education.
Children from wealthier families can afford to funnel a bit of money towards
their education, and maybe only work part-time for some spending money. Don't
get me wrong - highly educated people are great for a society and this
shouldn't be discouraged, but I also think we have a duty to help those living
harder lives than our own.
~~~
rdl
I agree most education should be free -- just not that 4-year residential
institutions (particularly mediocre ones) should be subsidized. The purpose of
partial payment by the user for a service like community college is to
discourage waste; something on the order of $100-200 per class would be
adequate for that. It would be payment by the student, not by his family.
The community college model is that you can work while attending. I don't
think it is unreasonable to expect someone to do so -- working full time while
attending a 4 year university is probably not viable (I tried doing it, and
ultimately dropped out), but I think the Internet should allow an expansion of
the role of online courses and community college, both highly compatible with
work-study.
I would go so far as to eliminate non-merit scholarships and financial aid
(subsidized loans, etc.) for 4 year institutions (except for things like the
GI Bill which are a form of compensation). They should not be the mainstream
form of education.
This only works if we can remove "must have 4 year degree, we don't really
care from where or in what" as a job qualification for most jobs. I'd like
there to be qualification tests for jobs, vs. checking a box for a degree. In
this case, only circa 1900 level of 4 year college attendance would happen,
and the vast majority (95%+) would have high school for general education and
some specialized training beyond that for employment.
------
kunle
I dont know if it's more scary that you can basically predict someone's SAT
score by knowing their family income, or that you can predict their family
income by knowing their SAT score.
------
snambi
My father used to tell me this "Provide education for free to those who really
want it and deserve it. If not provide it only those who can pay for it".
My father was a professor in India, where college education is free. All state
funded colleges are free and most of them are easy to get into. But most of
the students are not interested in learning, they come to college for time
pass. So, free education should be given to only those who deserve.
| {
"pile_set_name": "HackerNews"
} |
/usr/bin/time: not the command you think you know - activatedgeek
https://hackernoon.com/usr-bin-time-not-the-command-you-think-you-know-34ac03e55cc3
======
jimrandomh
The reason 'time' is a builtin is because it can time a complete shell
pipeline, not just a single command. If you type
time foo |bar
Then the result is the total time taken by foo and bar together. This requires
it to have special-case syntax. Whereas
/usr/bin/time foo |bar
Would run foo and give its time statistics as input to bar.
~~~
jcoffland
Run these commands for a better demonstration:
time echo | sleep 1
vs.
/usr/bin/time echo | sleep 1
The former times the entire pipeline whereas the later only times the first
command in the pipe.
~~~
fnord123
This also gives the time of the entire pipeline (since the commands all begin
together and only finish when the last command has completed):
echo | /usr/bin/time sleep 1
~~~
roblabla
I'm pretty sure this is wrong.
As an example :
sleep 2 | /usr/bin/time sleep 1
This gives an output of "1 second" even though the entire pipeline took 2
seconds.
~~~
fnord123
Ok you can wangle your way out of it. But if you're doing something like `grep
"$something" | /usr/bin/time some_job` then generally you're fine.
~~~
perennate
Wouldn't the system/user time be wrong though?
------
graton
On bash you can do this to have it not use an alias or built-in command:
$ \time echo
0.00user 0.00system 0:00.00elapsed 100%CPU (0avgtext+0avgdata 1764maxresident)k
0inputs+0outputs (0major+66minor)pagefaults 0swaps
The built-in version:
$ time echo
real 0m0.000s
user 0m0.000s
sys 0m0.000s
~~~
yrro
Is this behaviour documented anywhere? The closest I can find is
[https://www.gnu.org/software/bash/manual/bashref.html#Aliase...](https://www.gnu.org/software/bash/manual/bashref.html#Aliases)
which remarks,
> The first word of each simple command, if unquoted, is checked to see if it
> has an alias.
I observe that t\ime works just as well as \time.
~~~
sigjuice
_t\ime_ is rather surprising. Is there any documentation or explanation on why
it does what it does?
~~~
yrro
[https://www.gnu.org/software/bash/manual/bashref.html#Escape...](https://www.gnu.org/software/bash/manual/bashref.html#Escape-
Character)
I think it's because using the backslash to escape counts as quoting. So the
following are all equivalent:
$ \time foo
$ t\ime foo
$ 'time' foo
------
dredmorbius
Since the article doesn't clarify on shell command priority, commands are
search in order:
1\. Alias expansion.
2\. Defined shell functions.
3\. Built-in shell functions.
4\. Command path.
If you provide an unqualified command that matches more than one of these
elements, the _first match_ wins.
Prepending a backstroke: "\command", will inhibit alias expansion. E.g.:
alias date="echo no date"
date
\date
Should return "no date", and your current system date, respectively.
To invoke a system command directly, call the full path. If you don't feel
like running the fish shell (not that there's anything wrong with that).
Some simple shells (e.g., dash, and IIRC the original Bourne shell, though
that is _not_ what you'll find as /bin/sh on most modern systems) don't
include a time builtin, and can invoke the system time command directly.
~~~
knome
Perhaps, but time is a syntactic form, like `if` or `case`.
[https://www.gnu.org/software/bash/manual/html_node/Pipelines...](https://www.gnu.org/software/bash/manual/html_node/Pipelines.html#Pipelines)
~~~
dredmorbius
I'm sorry, that's not clear to me. What's the significance exactly?
~~~
knome
A command takes a series of arguments, stdin/out/err pipes and returns an
error code on completion.
time prefixes a pipeline ( the most basic case being a single command without
a pipe into another ), a command block { ... } a subshell block ( ... ), a for
statement, an if statement, just whatever really.
This "time" would output how long "a" took to run:
/usr/bin/time a b c | { d e ; f g ; } | h i ;
This "time" outputs how long the pipeline "a", "d", "f", and "h" took to run:
time a b c | { d e ; f g ; } | h i ;
This is a syntax error:
/usr/bin/time { d e ; f g ; }
This returns how long the command group takes to run:
time { d e ; f g ; }
Further examples:
$ time sleep 10 | sleep 1 ;
real 0m10.073s
user 0m0.000s
sys 0m0.000s
$ time sleep 1 | sleep 10 ;
real 0m10.003s
user 0m0.000s
sys 0m0.000s
$ /usr/bin/time sleep 10 | sleep 1 ;
0.00user 0.00system 0:10.00elapsed 0%CPU (0avgtext+0avgdata 1796maxresident)k
0inputs+0outputs (0major+80minor)pagefaults 0swaps
$
$ /usr/bin/time sleep 1 | sleep 10 ;
0.00user 0.00system 0:01.00elapsed 0%CPU (0avgtext+0avgdata 1808maxresident)k
0inputs+0outputs (0major+82minor)pagefaults 0swaps
Note the two /usr/bin/time's output their timing information as soon as the
first command is done, but the pipeline doesn't return until both commands
have exited.
> hope this rant helps in some way
~~~
dredmorbius
Thanks, that _does_ raise some interesting points.
What of:
/usr/bin/time ( sleep 1 | sleep 10 )
Explicitly invvoking a subshell. Which I understand the builtin to be doing.
------
metafunctor
A more interesting command is /bin/[.
Yep, it's the same as /bin/test, but basically requires the last argument to
be a ]. Typically /bin/test and bin/[ are hard links, that is, they are
physically the same file and share the same inode(s).
You know, so you can type
if [ $foo = $bar ]; then
yes
else
exit
fi
This actually _runs_ the command /bin/[, except most of the time it doesn't,
because it's built-in to the shell.
As as side-note, an article like this should at least mention which OS and
shell the author is using.
~~~
Elrac
> As as side-note, an article like this should at least mention which OS and
> shell the author is using.
Very much agree! I just tried this on my 2.6.32 RHEL system, and it's never
heard of "-l". It outputs very similar-looking information as in the article,
though, when given "-v" .
------
halostatue
In both bash and zsh, you can force the shell to use $PATH for lookup
(bypassing functions and shell builtins) by calling a builtin name with
'command' ('command time -l ls'). You can equivalently force a builtin with
'builtin', but that does not work with reserved words (and 'time' is a shell
reserved word).
~~~
ramshorns
TIL that a shell reserved word is different from a shell builtin.
[http://unix.stackexchange.com/questions/267761/differences-b...](http://unix.stackexchange.com/questions/267761/differences-
between-keyword-reserved-word-and-builtin)
~~~
xelxebar
Yeah. Shell semantics can be pretty unintuitive sometimes. I often find it
helpful to translate these ideas to standard programming language terms.
* Commands are like functions * Commands in /bin etc. are like library functions * Builtins are like a language's primitive functions * Keywords are keywords
------
hobarrera
$ which time
time: shell reserved word
$ ls /usr/bin/time /bin/time
ls: cannot access '/usr/bin/time': No such file or directory
ls: cannot access '/bin/time': No such file or directory
Looks like something specific to the author's distribution.
~~~
kylek
Exists on a debian(/testing?) system I've:
$ time ls / bin boot dev etc home lib lib64 lost+found media mnt opt proc root
run sbin srv sys tmp usr var
real 0m0.004s
user 0m0.000s
sys 0m0.000s
$ /usr/bin/time ls /
bin boot dev etc home lib lib64 lost+found media mnt opt proc root run sbin
srv sys tmp usr var
0.00user 0.00system 0:00.00elapsed 0%CPU (0avgtext+0avgdata 2304maxresident)k
0inputs+0outputs (0major+109minor)pagefaults 0swaps
Edit: formatting
~~~
kevinoid
Sometimes. It depends whether you have the time[1] package installed.
1\.
[https://packages.debian.org/sid/time](https://packages.debian.org/sid/time)
------
7171u
I had to use "\--verbose" instead of "-l" in my RHEL7
\time --verbose echo
~~~
aij
I bet you're using GNU time rather than BSD time.
It did seem odd to me that the author didn't bother to mention which OS he is
using, though from the hostname I have a pretty good guess.
------
brendangregg
No, /usr/bin/time is indeed what I know, and its extended stats is why I
suggested using it in my last perf book (time -v).
"/usr/bin/time: not the command you think you know" -> "/usr/bin/time: may not
be the command you think you know"
There, I fixed the title.
~~~
an_account
/r/iamverysmart
------
d4l3k
/usr/bin/time doesn't seem to be a thing on my Arch Linux install. ¯\\_(ツ)_/¯
~~~
fbernier
Same here. I had to fetch it via pacman. Also, the -l option doesn't exist on
the non-bsd version.
~~~
tomsmeding
I love arch. Sudo doesn't exist until you install it (directly or indirectly).
~~~
jcoffland
That's the same on Debian.
~~~
ajsalminen
Yeah, I don't think it's all that rare for sudo to be an optional package not
installed by default in distributions. At least that used to be the case back
when I used try various ones a lot more.
------
devnonymous
So also are /usr/bin/{cd,[,echo,pwd,fg,..etc} a lot of them having subtle
differences with their corresponding shell builtins. Most of the time the
differences are not worth the hassle to remember, unless you somehow end up on
a system with a broken filesystem (for example where /lib or /usr/lib is
destroyed) and need to rescue stuff.
------
cmurf
On Fedora Linux, '/usr/bin/time -v <command>' rather than -l.
------
saagarjha
So it's just like /usr/bin/cd–a builtin that also has a binary.
~~~
tyingq
How would that work? A forked/execed subprocess somehow forcing chdir() in
it's parent?
Guessing it isn't terribly useful.
~~~
zwp
I too don't see how it is useful but it's certainly a thing. The Solaris
implementation looks like this:
#!/bin/ksh -p
# ...
cmd=`basename $0`
$cmd "$@"
I just noticed that the what(1)-string (I haven't seen on of those for a long
time) references "alias.sh", perhaps this is a clue?
#ident "@(#)alias.sh 1.2 00/02/15 SMI"
Were builtins actually aliases in an early shell? I still don't understand how
this works though.
~~~
tyingq
That's a funny implementation. It would end up being an infinite loop for any
command that wasn't a builtin, or didn't have an identically named thing
higher up the PATH. Like if you renamed it from /usr/bin/cd to /usr/bin/mycd.
| {
"pile_set_name": "HackerNews"
} |
Using “and” and “or” in Ruby - fogus
http://avdi.org/devblog/2010/08/02/using-and-and-or-in-ruby/
======
raganwald
I use this a lot. I dislike side effects in the subject clause of an if
statement, so I used to rewrite:
if user = User.find(...)
...
end
as:
user = User.find(...)
if user
...
end
I then got into the habit of using and:
user = User.find(...) and begin
...
end
It just seems to resemble something I'd say to a colleague: "user becomes blah
blah blah and then we do this with it..." Likewise:
user = User.find(...) or begin
user = User.create(...)
SecurityTheatre.starring(user)
end
This looks to me like it says "find the user or create the user." The
precedence of the words "or" and "and" seems obvious when you think of them as
words rather than as operators, while the precedence of operators naturally
seems higher/tighter.
JM2C...
~~~
KirinDave
I like your find-or-begin pattern, and I've used the or operator to pun that
way before as well.
But just a note, the if x = ... is not a side effect unless the variable "x"
already exists. There's not problem using that as a pun to get rid of lots of
if nesting. Similarly if x &&= ... is very good for avoiding an if-cascade,
albeit more obscure and perhaps less performant.
It's too bad there isn't a beautiful way to do monads or the thrush operator
in Ruby.
------
tomstuart
As per Tim Bray ([http://www.tbray.org/ongoing/When/201x/2010/06/29/No-
Default...](http://www.tbray.org/ongoing/When/201x/2010/06/29/No-Defaults)),
remembering this kind of nonsense is a waste of a perfectly good brain. Just
don't bother.
~~~
msie
I agree with you, but I always wonder if we discount memorization too much
that it impedes learning a language. We can't expect all of a language to be
"logical". There will be always quirks that have to be remembered. If we
discount those parts that have to be remembered then have we shortchanged
ourselves in mastery of a language? Warts and all?
------
draegtun
Also see this blog post: _Logical operators in Perl and Ruby_
[http://eli.thegreenplace.net/2007/06/02/logical-operators-
in...](http://eli.thegreenplace.net/2007/06/02/logical-operators-in-perl-and-
ruby/)
------
gmac
I knew this, but I always find it a rather disappointing choice in the
language design, as I think its capacity for inspiring bugs rather outweighs
its usefulness (which extends as far as making some parentheses unnecessary).
In a nutshell: there are two forms of the AND and OR operators, with different
precedences; in many contexts, you can use them interchangeably; but in some,
they'll behave differently, and could bite you.
------
jim_h
I'm slow this morning. That took me a couple of minutes to get the example.
'foo = 42 and foo / 2'
I was expecting an undefined variable since foo was never set because I was
thinking of it as foo = (42 and foo / 2)
Basically I would write the example as this in 2 lines to avoid confusion and
not use 'and':
foo = 42
foo / 2
Maybe another example in the article would have been better to show the power
of 'and'.
~~~
avdi
Writing it in two lines would defeat the purpose of demonstrating the
difference between && and 'and'.
~~~
CodeMage
Yep, that's an important point: you should probably have chosen a different
example. The one you used will either make people say "it's a lot better to
write it in two lines" or "oh, cool, I can write one liners like that".
Your post is explaining and demonstrating the use of "and" and "or", whose
purpose is to allow idioms which rely on short-circuiting logic to control
side effects, but that particular example didn't involve side effects _after_
the operator (which is the whole point).
Perhaps it would be a good idea to replace that example with one that shows
what would happen if you used "and" in an "if". It would serve the same
purpose as the one you have currently -- show the unintended effects of using
the wrong flavor of operator -- without confusing people or unintentionally
teaching bad practices.
~~~
stevejohnson
I agree that the numeric example in the blog post was a bad one. The use of
'and' just looks confusing in that situation. You might try something like
"foo = open_connection() and send_data()" instead.
------
jewbacca
This seems like a kind of hack-y laziness, specifically in the form of a poor
man's exception. It's no more "magic" than an if statement or any other kind
of block. I would probably use this plenty if I were to use Ruby (Haskell has
spoiled me for strict evaluation forever), but it definitely smells like
language bloat -- you wouldn't need to tell me it's Perl-inspired for me to
strongly suspect it.
------
sunkencity
Yeah I've looked briefly at and before and not gotten it's use, this is
awesome.
In a similar vein it's possible to just hang on a rescue at the end, very
practical and easy to read, like in a view:
<% percent = (count /total.to_f * 100 ).round_with_precision(2) rescue 0 %>
------
bryanlarsen
There's just too much semantic overload on those two operators. I myself have
misread these before. When I use these operators, I always follow with "raise"
or "begin". This customary usage is not going to cause confusion and covers
99% of their usage anyways.
------
code_duck
It works exactly the same in PHP, another twisted offspring of Perl.
------
aneth
If you're relying on obscure not well known operator precedence rules, you are
writing less maintainable code. It's as bad or worse than using meaningless
variable or function names. Use parentheses so your code communicates your
intention.
~~~
KirinDave
Except that it's not obscure at all. "and" and "or" exist specifically to
facilitate this kind of code. That's their primary purpose.
And it's not like that's exactly unusual in the ruby language. Post-
conditionals have a similar low precedence.
~~~
acgourley
Is "this kind of code" worth it? It certainly is aesthetically pleasing and
somewhat terse compared to a parenthesis jungle. But that does outweigh the
fact non-experts don't know exactly what the statement is doing?
~~~
sketerpot
To anyone who learns the idiom, this code is fine, and perfectly readable. I
don't even know Ruby yet, and it took me less than a minute to become fully
comfortable with this kind of code. This isn't a huge barrier to "non-
experts".
~~~
acgourley
Of course it took under a minute, you were reading a nice blog post on the
topic. The problem is not every instance of 'and' will include that
information. And so I worry that if I drop 'and' into some minor glue script I
write - it becomes less self documenting to my coworkers. It's a minor point,
but it can become a slippery slope (see: perl)
~~~
KirinDave
This entire argument is moot. No one cares how obscure a language looks to
someone who is not familiar with it. Do you regularly sit down and decide, “I
am going to use a language I don't know to accomplish something essential and
immediate?” And even if the answer is yes, then do you still not know the
language at the end of that exercise?
This is a very simple, easily understandable and easily readable feature of
Ruby. It's not obscure, complex, or even that unusual. Precedence is something
every competent programmer needs to understand, and it should be part of every
programmer's research to learn a new language. After all, this is a
conversation about the existence of "and" & "or", not their abuse.
~~~
Roboprog
I used to be competent, but now I guess I avoid writing stuff that relies on
_any_ knowledge of operator precedence.
I try to learn what I can of such precedence in the language of the day, since
I will have to maintain other people's "code" (cypher?), but I try to write
obvious "programs" (who is in this play, what are the acts?).
I've been at this over 2 decades, and it's much easier to read something that
uses a few parentheses, a well named intermediate variable or two, or even a
few functions, than it is to read bunch of multiple operators on the same line
gobble-de-gook. Watching somebody else generate a hundred thousand dollars of
wasted product in a manufacturing preparation process a few years back, due to
such a run-on if-statement being fouled up, was also a good confirmation of
this bias. I'm sure my current job in finance offers similar opportunities for
expensive blunders.
------
GrandMasterBirt
Wow, honestly this article helped :), I really did think it was a synonym and
did not realize the precedence implications.
------
sabat
The logic for and/or vs. &&/|| is borrowed directly from Perl. It makes sense
once you use them for a bit.
~~~
_delirium
Maybe I'm not good at the context-switching between parsing things as
operators versus as English, but I find them confusing in Perl except in some
very simple idiomatic cases, where they're fine because I read them as
boilerplate. The common _do_thing or die "error"_ idiom is perfectly readable,
but anything more complex and I start explicitly reasoning about short-circuit
semantics.
It's possible I have that reaction due to the strong negative consensus about
using short-circuiting as control flow in C being hammered into my head at an
early age, though.
| {
"pile_set_name": "HackerNews"
} |
Show HN: Convert walkthroughs to working programs - j-angnoe
https://github.com/j-angnoe/code-walkthrough-compiler/
======
zzo38computer
I think Knuth did something similar before. TeX is written in WEB, which like
that you can define many blocks and include them within other blocks, but it
also has other features such as it will generate an index automatically.
------
ldb
I like the idea. Reminds me of the Eve language/IDE (www.witheve.com).
~~~
j-angnoe
I can see why, Eve looks brilliant! It's pretty close to the way I would like
to learn, develop and play with a program.
Thank you for this!
| {
"pile_set_name": "HackerNews"
} |
Pixie Pi - jonnybgood
http://stuarth.github.io/pixie/pixie-pi
======
therealmocker
There doesn't seem to be a homebrew package for Pixie yet on OS X. I made a
quick Brewfile ([http://brew.sh](http://brew.sh)) but was bitten by pixie
needing to find its standard libraries in a specific location.
I should look again because the project looks like a way to use Clojure style
syntax for quick one off scripts instead of making an uberjar.
~~~
_halgari
It's pretty trivial to fix the default locations that Pixie looks for files.
Create an issue on our github page and I'll help you get it working.
------
BFay
Cool, I wanted to use Clojure on the Raspberry Pi, but the startup time is
very slow, due more to loading the core Clojure libraries than the JVM.
It makes writing a Clojure web server really impractical on the Pi. I
considered using clojurescript for the server, but ended up just going back to
node for my project.
~~~
evilduck
I wouldn't get too excited just yet. Just built this on my RPi2 without JIT
and ran the hello world file in the example folder:
./examples/hello-world.pxi 24.33s user 0.40s system 99% cpu 24.797 total
~~~
_halgari
There's something pretty wrong with that example. Times from my RPi2:
time ./pixie-vm ./examples/hello-world.pxi Hello, World!
real 0m1.167s user 0m1.160s sys 0m0.000s
~~~
evilduck
No clue what was different but I started from scratch and now get
./pixie-vm ./examples/hello-world.pxi 1.01s user 0.00s system 98% cpu 1.021 total
Sorry for the negative report.
------
rasur
In what way is this clojure inspired? (Just curious.. Does it need the JVM, or
is it a brackety/syntax thing?)
~~~
dorfsmay
Pixie (1) is a Clojure-like language that is written in rpython and is run via
pypy (python jit), the advantages being fast startups (Clojure compile some
libraries on startup which doesn't make it very suitable for writing CLI).
This particular article is about running Pixie on the Raspberry Pi, check the
Pixie language page to learn more about Pixie itself.
Pixie does not require the JVM.
> In what way is this clojure inspired? is it a brackety/syntax thing?
Have you looked at the article? It shows an example (that uses brackets and
indeed looks like Clojure/lisp syntax).
[1]: [https://github.com/pixie-lang/pixie](https://github.com/pixie-
lang/pixie)
~~~
rasur
> Have you looked at the article?
Well, yes briefly (it lead to the question by saying it was clojure inspired),
but I didn't have time to delve fully into the minutiae, as am at work and for
some reason they keep expecting me to do stuff /shrugs/
------
acron0
This is interesting. I've had success in the past at running Hy [1] (a Lisp
running on Python) on a Raspberry Pi as well. This could be a nice, speedier
alternative, however you lose the Python ecosystem.
[1] [http://hylang.org](http://hylang.org)
------
fit2rule
I want to do the same but with Lua. I think that would be a very nice
environment.
~~~
malkia
Then you should look no further than luajit ->
[http://luajit.org](http://luajit.org)
------
rcarmo
I tried to get the JIT to work on ARM a couple of months back. Since the
author explicitly turned off the JIT, I suppose there's still work to be
done...
~~~
_halgari
The jit works, it's just that RPython's support for cross compilation is weak,
and it requires a fair amount of memory to compile.
The gist of it all is that compiling pixie with a JIT for ARM requires an ARM
machine with at least 1GB of RAM. I've gotten it to compile with a JIT on my
Raspberry Pi 2, but it's a bit tricky.
Once the interpreter is compiled it only takes about 10MB of ram to run, so my
long term goals are to release pre-built binaries.
------
karmakaze
Clojure, Pi, FFI, oh my! (couldn't resist)
| {
"pile_set_name": "HackerNews"
} |
Show HN: HackerNews for Social Entrepreneurs - dhruvkar
http://news.socent.io
======
dhruvkar
Currently using the very useful telescope app. Any feedback on design and user
experience would be very helpful.
| {
"pile_set_name": "HackerNews"
} |
Zero-day in jQuery plugin sample code exploited for at least three years - john37386
https://www.zdnet.com/article/zero-day-in-popular-jquery-plugin-actively-exploited-for-at-least-three-years/
======
lcashdol
Larry Cashdollar here. I don’t blame the author either. None of the folks
including my self knew .htaccess support was no longer default.
------
blueimp
Author of jQuery File Upload here.
The vulnerability is a combination of Apache v.2.3.9's default setting to not
read .htaccess files and my mistake of relying on .htaccess to enforce
security of the sample PHP upload component.
To give you some context on how this could happen:
\- As the project name implies, this started as a client-side jQuery plugin,
with a dummy PHP script to echo out the uploaded file
\- Over time, I added a couple of sample server-side upload components,
including two for Google App Engine (Python + Golang) - which I used for the
demo - and one for PHP, which I never used myself in production
\- I used the PHP component for local tests with various possible file
uploads, including very large files and chunked uploads, which required
enabling all file types for upload. My thinking was that allowing all file
types for upload is not critical as long as the handling of those files is
properly configured.
\- Prior to adding the .htaccess file, I mistakenly assumed developers would
configure their Apache server themselves so that no PHP scripts would be
executed in the uploads folder. It was only added in this commit:
[https://github.com/blueimp/jQuery-File-
Upload/commit/13931c7...](https://github.com/blueimp/jQuery-File-
Upload/commit/13931c7e4f7113c7b6832fe6d9abe0edf627ab3d#diff-4ea7e687ccf6a97c37a1a198b894aae1)
\- The Apache servers I tested with always had support for .htaccess enabled,
so I never bothered to check that the default Apache configuration since
version 2.3.9 actually disabled it
\- The original .htaccess configuration didn't even prevent script execution
in all Apache configurations and had to be fixed, see:
[https://github.com/blueimp/jQuery-File-
Upload/pull/3381](https://github.com/blueimp/jQuery-File-Upload/pull/3381)
Looking back, there are a couple of things that I should have done
differently:
\- Move out the server-side components into separate repositories
\- Inform users better about file upload security - see
[https://github.com/blueimp/jQuery-File-
Upload/wiki/Security](https://github.com/blueimp/jQuery-File-
Upload/wiki/Security)
\- Never assume people actually read information about security
\- Never rely on .htaccess for security configurations in Apache
\- Make sure that published code is secure in all default configurations
\- Never allow all file types for upload by default, even if it is secure in
your configuration
\- Recommend users to not upload files in the same root as their executable
web application
\- Always follow security best practices, even if it makes setup for users
more difficult
I wanted to make it really simple for users to install a generic and secure
file upload service with a great user interface. Unfortunately, security best
practices and ease-of-use are often at odds to each other.
Bonus info:
The client-side component had a cross-site scripting vulnerability in the
Iframe Transport HTML site back in 2012: [https://github.com/blueimp/jQuery-
File-Upload/commit/4175032...](https://github.com/blueimp/jQuery-File-
Upload/commit/41750323a464e848856dc4c5c940663498beb74a)
The App Engine components had an open redirect vulnerability back in 2015:
[https://github.com/blueimp/jQuery-File-
Upload/commit/f74d2a8...](https://github.com/blueimp/jQuery-File-
Upload/commit/f74d2a8c3e3b1e8e336678d2899facd5bcdb589f)
~~~
willeh
I really don't blame the author here, sure there was an issue with the sample
code - but come on it was sample code. If someone is implementing user uploads
they should really do the due diligence and understand what the sample code
does.
To be honest I'm not really that surprised that the vulnerability stayed
hidden for so long; many PHP users are hobbyists or come from a more
traditional "webmaster" background. This is not to say that there aren't good
PHP programmers, just that there is a large group of novices.
~~~
blihp
It wasn't exactly hidden seeing as how there was a YouTube video titled
'Exploit jQuery File Upload Vulnerability' available since 2015. I don't blame
the author (given the timing of the Apache change it probably would have been
easy for him to overlook[1]) and it is surprising that this took years for
anyone to make him aware of the issue since the exploit wasn't exactly
unknown. Apparently there's some groundbreaking work left to be done in
infosec searching on combinations of various library / application names and
'exploit'...
[1] I assume that like most of the rest of us he was lagging behind the latest
and greatest Apache release a bit. So when he was writing/testing this, it
probably wouldn't have been an issue.
~~~
blueimp
Unfortunately, I never tested it with an Apache configuration that had
.htaccess support disabled and so it simply did not occur to me that the
default was "off".
I think the bigger issue was that the PHP sample code allowed all file types
by default - this would not only affect Apache, but any Webserver that had
broad rules to execute PHP scripts found in a directory.
Originally I didn't see this as an issue as I trusted developers to securely
configure their server to make sure no uploaded files would be executed, which
is why the .htaccess security settings were only added later in this commit:
[https://github.com/blueimp/jQuery-File-
Upload/commit/13931c7...](https://github.com/blueimp/jQuery-File-
Upload/commit/13931c7e4f7113c7b6832fe6d9abe0edf627ab3d#diff-4ea7e687ccf6a97c37a1a198b894aae1)
But neither was the documentation informing developers clearly enough about
the security implications, nor should I have relied on people actually reading
security notices.
~~~
blihp
Fair enough... but I still don't blame you ;-)
~~~
blueimp
Hehe, thanks! :)
------
yebyen
OK. I'll be that guy. Is there nobody who is going to talk about Larry
Cashdollar, the person who discovered this vulnerability and first reported
it?
I'm honestly not sure how I'd be more impressed; if you told me this man
actually uses this as his real name in his daily life, or by finding out that
this is actually his birth name.
~~~
hlieberman
He's a former co-worker of mine, and is an awesome dude in many ways.
His name really is Larry Cashdollar, born and raised. Sometimes I wrote his
name as 'Larry $$' though.
~~~
blueimp
Larry was also super helpful in identifying the underlying issue and very
polite in his emails.
Would definitely write another security vulnerability into my code again if I
knew that Larry would report it. ;)
~~~
lcashdol
Thanks, :-)
------
galaxyLogic
Isn't a JQuery Plugin something that executes on the client-side? If so then
how can something on the client-side compromise the security of a server?
Isn't the fault on the server-side?
Or is this a PHP server-plugin which if installed on a PHP server makes them
insecure? But of course anything you install on server can make it insecure.
No?
~~~
runn1ng
There is an example PHP code in the same repo and people copy-pasted that into
production.
The issue is not in the front-end jQuery library, despite the title.
------
fulafel
What other vulnerabilities did this backwards-incompatible Apache change
cause? Probably many people rely on .htaccess, for example to disable access
to non-public files or disable php execution on a DIY CMS file sharing area.
Sounds like the risk from this is not widely known. Probably the correct
solution for Apache would have been to detect presence of now-ignored
.htaccess files and signal an error.
~~~
blueimp
That was my thought as well.
I think one of the reasons nobody reported this earlier was that people simply
assumed that .htaccess support was the default - Larry Cashdollar, the
security researcher, also confirmed this:
[https://news.ycombinator.com/item?id=18271880](https://news.ycombinator.com/item?id=18271880)
------
xab9
Isn't this a click-baitish title? I would say that this is a configuration
issue and not "exactly" a vulnerability and basically get off my lawn.
Reading blueimp's and larry's comments here I envy their constructivity, open
mindedness and professionalism.
~~~
blueimp
Thanks! Comments like yours are what keeps me motivated to continue
contributing to open source software.
But although the title is somewhat click-bait, I still think this counts as a
vulnerability in my project, since there is a possible combination of default
Apache setting and default project files that is exploitable.
------
jpic
Another apache disaster, blueimp's plugin has nothing to do with it: it's
common for script kiddies to try to upload php executables on php sites, and
sometimes it works.
~~~
blueimp
I do think that my project is responsible and not Apache, since I provided
sample code that was not secure by default when used in a default Apache
configuration as is.
However I wish Apache would have changed their default config in a way that
would have signalled an error if an .htaccess file is present but not applied.
Something that HA user fulafel also pointed out here:
[https://news.ycombinator.com/item?id=18272407](https://news.ycombinator.com/item?id=18272407)
------
based2
[https://github.com/blueimp/jQuery-File-
Upload/commit/aeb47e5...](https://github.com/blueimp/jQuery-File-
Upload/commit/aeb47e51c67df8a504b7726595576c1c66b5dc2f)
------
vel0city
Can someone share some information on the reasoning behind httpd's default
handling of htaccess files? How does ignoring a security feature that many
relied on improve security?
~~~
__david__
I suspect it's so that a user can't accidentally make security worse by
fiddling with security settings that they don't understand. That said, I
might've considered turning any page that had the disabled .htaccess settings
into a 500 response instead of just keeping on like everything is working
fine.
------
londons_explore
Haven't seen this sample code, but in general letting your users set the
filename of anything on your server is a bad plan.
If the upload script just generated a random filename (046359905445.bin), and
then stored the mime type, users filename, other metadata, etc. in a database,
that would be a much better design.
~~~
blueimp
I agree with you that this would be the safer route. For a production file
upload service, file uploads should ideally stored in a specialized blob
store, e.g. Amazon S3 or Google Cloud Storage.
However the PHP code was written as easy-to-use sample code and I did not want
to introduce a database as dependency and keeping the sanitized filename plus
extension keeps the meta information intact.
If I had provided better information about how to securely configure the
Webserver to allow all file types for upload, using the original - but
sanitized - filenames would not be an issue.
------
john37386
So this afect only apache? Anyone have any thoughts on nginx, IIS and other
web servers like tomcat, websphere?
~~~
blueimp
Please refer to the vulnerability documentation here to see if you are
affected: [https://github.com/blueimp/jQuery-File-
Upload/blob/master/VU...](https://github.com/blueimp/jQuery-File-
Upload/blob/master/VULNERABILITIES.md#remote-code-execution-vulnerability-in-
the-php-component)
------
Assossa
I'm curious as to how this could be a widely known exploit in the hacker
community, but no one reported it until 3 years after its publicity.
~~~
jpic
It's not 3 years old, we've been exploiting it when we were 14 yr old trying
to find server to host warez content, and has nothing to do with the plugin
itself: it's all about apache's mod_php configuration: does it allow execution
of php files that are in the directory where users upload their avatar ? If
yes, then they can try to upload a php script and execute it on the server.
------
paulie_a
In 2018 Apache, phone and jQuery is a doormat saying "please hack my servers"
------
based2
[https://www.bleepingcomputer.com/news/security/jquery-
file-u...](https://www.bleepingcomputer.com/news/security/jquery-file-upload-
plugin-vulnerable-for-8-years-and-only-hackers-knew/)
------
solidr53
Hey Larry $$
~~~
dang
Please don't post unsubstantive comments here.
Don't you think maybe he's heard this a few times already?
We detached this comment from
[https://news.ycombinator.com/item?id=18271880](https://news.ycombinator.com/item?id=18271880)
and marked it off-topic.
| {
"pile_set_name": "HackerNews"
} |
Portland Startup Weekend - jmorin007
http://startupweekend.com/portland-startup-weekend/
======
olefoo
Anybody here been to one of these dos?
Is it worth doing?
~~~
timr
Never been, but it sounds like exactly the wrong sort of environment for
creativity and productivity. Too many people attend; the communication
overhead must be insane.
I _can_ tell you that the folks in Seattle failed to launch last weekend. From
what I read, it sounded like there were too many chiefs, and not enough
indians (or maybe just too many chiefs). I might have gone, but by the time
that I found out about it, the event was sold out. It was therefore a bit
galling to hear (later, via the blog) that some large percentage of the
attendees were PMs, BizDev, and Marketing types.
Anyway, if you view it as a professional networking event, your expectations
will probably be more in line with the reality of the situation.
| {
"pile_set_name": "HackerNews"
} |
T-Mobile kills the 1GB data cap, takes a more friendly approach - terpua
http://www.engadget.com/2008/09/24/t-mobile-kills-the-1gb-data-cap-takes-a-more-friendly-approach/
======
kqr2
They need to at least match AT&T's data plan in order to be competitive.
For an unlocked i-phone, there is a $5.99 "t-zones hack" that allows you
unlimited data access using t-mobile.
<http://www.modmyi.com/forums/t-mobile/>
I wonder if this hack will work on the G1.
| {
"pile_set_name": "HackerNews"
} |
What would happen if we randomly gave $1,000 to poor families? Now we know - Reedx
https://www.washingtonpost.com/opinions/2019/12/03/what-would-happen-if-we-randomly-gave-poor-families-now-we-know/
======
mymacbook
Link to actual study:
[http://emiguel.econ.berkeley.edu/assets/miguel_research/88/G...](http://emiguel.econ.berkeley.edu/assets/miguel_research/88/GE-
Paper_2019-11-20.pdf)
~~~
xyst
Thanks for the study, getting pay walled. Will have to read this later.
Side note: on mobile, the papers in line citations are anchored to the
individual reference (tapping the citation redirects user to reference). This
is a pretty neat feature. Hope more people start to use it.
~~~
uoaei
That's a PDF which has been compiled by LaTeX.
------
abraCadabstrax
Famed anthropologist James Ferguson wrote a pretty thorough read that breaks
down the arguments on both sides that was also reviewed by the Washington
Post: [https://www.washingtonpost.com/news/monkey-
cage/wp/2015/07/2...](https://www.washingtonpost.com/news/monkey-
cage/wp/2015/07/24/this-book-will-change-the-way-you-think-about-cash-
transfers-for-the-poor/)
------
IXxXI
Tax cuts are the best way to put $$ in the hands of the poor.
Raising taxes on the poor, to "give them" more money as proposed by UBI is a
terrible policy no matter what this or any other study says.
~~~
gdubs
Why?
~~~
IXxXI
Governments are the largest, most inefficient and wasteful monopolies in the
world. There's zero incentive for them to provide cost effective or reliable
solutions to problems. Private sector alternatives are better the large
majority of the time.
~~~
beatgammit
UBI does precisely that. Instead of the government offering a service, they
redistribute that money so the poor can get that service on the open market.
~~~
IXxXI
Social Security pays out negative returns. Meaning you're guaranteed to
receive lower returns from it in contrast to whatever capital you invest. A
person could do better putting their money in a bank account that pays out
0.000001% APY.
UBI is the same as social security. You're guaranteed to receive less money
than whatever you invest in it. The state will likely funnel a major portion
of collected tax revenues into dubious projects like giving free healthcare to
illegal immigrants and funding transexual beauty pageants.
Then when the program fails as it inevitably will, they'll say the problem is
taxes are too low. They'll propose tax hikes and people unfortunately being
uneducated will far for it and think its a good idea, the same way many are
falling for it right now.
| {
"pile_set_name": "HackerNews"
} |
Twitter is not a public utility - daveid
https://medium.com/@Gargron/twitter-is-not-a-public-utility-2bc49567152b
======
messo
Federation makes a lot of sense for a micro blogging service, as no community
is the same. Allowing for different rules and styles of moderation without
trapping users in silos / walled gardens, is exactly what we need in the
social media space, in my opinion.
------
CM30
Of course it isn't, the big question is really whether it should be, since
network effects mean it's much harder to compete with established social
networking sites/services.
Still, I do hope Mastodon does well, since a federated Twitter esque service
makes a lot more sense than a centralised one, and feels far more in tune with
what the internet should be.
| {
"pile_set_name": "HackerNews"
} |
Three Minutes to Midnight - masteryupa_
https://thedaleyreview.wordpress.com/2016/10/09/three-minutes-to-midnight/
======
hourislate
>Surely it is clear that if anything the build up of troops on the Russian
border acts to position NATO in an overtly aggressive posture, regardless of
any predilection for defensive contrivance.
Seriously?
I feel like I'm reading something Putin wrote for the Russian people.
Wasn't it Russia that annexed Crimea? Wasn't it Russia that shot down MH17?
Wasn't it Russia that invaded eastern Ukraine? Wasn't it Russia that is
bombing UN Convoys and Hospitals in Syria? Wasn't it Russia that has openly
invaded the Airspace of Baltic Countries?
Everything Johnathan Frances has written reeks of the Kremlin Propaganda
Machine.
| {
"pile_set_name": "HackerNews"
} |
India court blocks Bayer generic drug appeal - hemantv
http://www.thehindu.com/business/Industry/generic-drug-makers-get-a-boost-from-sc-ruling/article6689370.ece
======
hemantv
just to give some perspective
Rs 8880 = 141.751 US Dollar
Rs 284000 = 4533.486 US Dollar
| {
"pile_set_name": "HackerNews"
} |
Self-Documented Makefile - fzaninotto
http://marmelab.com/blog/2016/02/29/auto-documented-makefile.html
======
ArnaudRinquin
As I used `make` more and more for our node projects, I missed the clean
outputs `grunt` or `gulp` provide.
To fix that, I created `make2tap`:
[https://www.npmjs.com/package/make2tap](https://www.npmjs.com/package/make2tap)
This small utility takes a `make` output and generate a `TAP` one that you can
pipe to any `TAP reporter`.
Our current `make build | make2tap | tap-format-spec` looks like:
[http://i.imgur.com/chs0Jf3.png](http://i.imgur.com/chs0Jf3.png)
~~~
agumonkey
Beautiful, just beautiful.
------
chubot
They should really be using bash for this, not make. There is nothing wrong
with bash scripts calling Make -- for building with DEPENDENCIES. But when you
aren't doing that, just use bash (because Make is actually Make + bash to
begin with).
This is dumb:
restart-frontend: ## Restart the frontend and admin apps in dev
@make stop-frontend-dev && make run-frontend-dev
@echo "Frontend app restarted"
Write it with a shell script like this:
stop-frontend-dev() {
...
}
run-frontend-dev() {
...
}
restart-front-end() {
stop-frontend-dev
run-frontend-dev
echo "Frontend app restarted"
}
build() {
make # this actually does stuff you can't do in bash.
}
"$@" # call function $1 with args $2... Can also print help here.
This is a lot cleaner. The PID stuff can be done with bash too.
~~~
jlg23
This is only cleaner in your simple case. Make's power lies in dependency
tracking and its declarative approach to defining those dependencies.
When you use make anyway, adding those targets there is the logical thing to
do. One interface instead of two. It's even less lines of code than your
proposed solution (which btw does not fail hard like make does, so a recipe
for desaster).
Finally: Pretty please, _sh_ , not _bash_. Almost none of the bash-scripts out
there use actual bash-features and those that do can usually easily be
rewritten to just rely on a plain posix shell.
~~~
chubot
My point is precisely that the script is not using "Make's power in dependency
tracking". It's just running commands. If you need Make, use Make; otherwise
use shell. It's far from unusual to have a Makefile and some shell scripts at
the top level of a project.
Make's semantics are to invoke the shell at EVERY LINE. This is slow and makes
quoting a nightmare (try quoting find or sed in bash in Make correctly; you
cannot directly invoke them from Make). Conversely, bash's semantics do not
involve make whatsoever :)
Shell also has local variables for modularity, and better constructs for
conditionals and iterations. And functions. Make has a poor man's
implementation of Turing-complete constructs compared to shell (which is a
little ironic since shell is already sort of a poor man's procedural
language).
'set -o errexit' makes bash fail on errors. Also, as mentioned, the Makefile
isn't using phony targets. Neither shell or Make is perfect, but shell is the
more appropriate tool when you're not making use of Make's incremental build
features.
Another pattern I find useful is to have the actions take more arguments,
like:
./run.sh dev-frontend --flag-for-testing
which is implemented just like this:
dev-front-end() {
./frontend.py --port 8080 --other-default-flag "$@"
}
"$@"
The arguments to Make are actually TARGETS/files and not functions, so I don't
think you can do this.
~~~
jlg23
> Make's semantics are to invoke the shell at EVERY LINE. This is slow [...]
I assume you mean commands here? Actually, how slow is it? Ever measured it? I
am sure me writing this line took more time than they could save by a rewrite
over the course of a few years of using the performance optimized version.
> Shell also has local variables for modularity, and better constructs for
> conditionals and iterations
And variables in make that you set for a command are only visible to it.
Besides - wasn't your point that the OP should not use make because s/he does
not use its features?
> 'set -o errexit' makes bash fail on errors
Indeed it does, it was just missing from your _better_ version.
> Another pattern I find useful is to have the actions take more arguments
> [...] The arguments to Make are actually TARGETS/files and not functions, so
> I don't think you can do this.
Yes, one communicates with make through variables, not through arguments.
Over the last 20 or so years I've done my fair share of shell scripting and of
writing makefiles. Maybe I am just too old and boring to get excited over
this, but let me recap: The OP happens to be using make, s/he used an elegant
hack to have the file document itself and its usage. S/He wrote about the
latter. No, I am not impressed by the post - I used a similar technique in
2003 or 2004 to bootstrap the documentation of a very complex build system -
and I'm sure others have before and after me. But I like the concise article.
Debating whether make is "better" than "sh" is completely off-topic here - if
there was a universal truth we'd not have seen tools like psh, scsh and the
rest of language-specific shell substitutes nor would we have the myriad of
language-specific build tools. Back then, when I was young and naive, I've
implemented a few of those myself. But now I am not young anymore. And now I
naively believe that people should use what they are most productive with. Or
everybody come to their senses and just use lisp.
------
jdp
I like the ideas here, but for long-running processes like file watching, dev
servers, hot reloading, etc. a better format is Procfile
([https://devcenter.heroku.com/articles/procfile](https://devcenter.heroku.com/articles/procfile)).
The ideas from this article could be nicely applied to it.
Procfil is a format that declares a named list of processes to be run that can
be controlled by tools like Foreman
([http://ddollar.github.io/foreman/](http://ddollar.github.io/foreman/)) and
Honcho
([https://pypi.python.org/pypi/honcho](https://pypi.python.org/pypi/honcho)).
The advantage is being able to start and stop them concurrently as a group,
useful for things that otherwise take a tmux session or multiple windows/tabs,
like dev server + file watching + live reload: they become a simple `foreman
start`. Processes can also be started individually. Procfiles can also be
exported to other formats, like systemd, upstart, inittab, etc.
Here's an example Procfile from a web project I've been working on. Since it
uses node I went with node tools like http-server and watch, but it could just
as easily use any other web server or file watcher. The way it works is it
starts a web server serving public/; starts a live reload server for public/;
and watches the src/ directory for changes and re-runs make. The makefile has
a few rules for compiling JS and CSS from src/ to public/.
web: ./node_modules/.bin/http-server
livereload: ./node_modules/.bin/livereload public
watch: ./node_modules/.bin/watch make src
~~~
aikah
> but for long-running processes like file watching, dev servers, hot
> reloading, etc.
I don't think anybody should use make to do that at first place. That's not
what make was built for. Likewise Foreman should not be used as a build tool
because it is not.
EDIT:
now i've seen the makefile in the example,I understand your comment and this
is absolutely not where one wants to use make, that's just ridiculous.
~~~
solipsism
Wouldn't "it's not appropriate for the task" be a better reason not to use
something than "it's not made for the task"? Don't you have any better reasons
at all? Does _make_ bring out people's conservative side or something?
Let me ask you this. Would you sit on a tree stump? How about kill a fly with
a newspaper? Sometimes things are great for purposes for which they weren't
originally intended.
~~~
aikah
> Does make bring out people's conservative side or something?
Misuse of tools in software development is why we end up with broken software,
useless solutions that solve stupid problems because the problem wasn't well
understood as first place, and first and foremost unnecessary dependencies.
That's why we end up with this makefile "hack".
Now explain what it's got to do with "conservatism". bad practices !=
innovation .
~~~
solipsism
Do you really believe any use of a tool in a way that wasn't intended is a
"bad practice"? Is there no more subtlety or thought to it than that? This
adherence to an ultra-simplistic black-and-white rule is absolutely a form of
conservatism.
If you think this particular use of make is a "bad practice", then argue why
it is! If there's no better reason than "This use isn't as intended!" then
your opinion won't have much weight with people.
------
yxlx
>Wouldn’t it better if we could just type make, and get a list of available
commands, together with their desciption?
No, Jesus Christ, please don't. Preserve default action as being to build.
Good user interface and good user experience relies on meeting expectations.
This behavior breaks those expectations. What if your expectations are
different, you ask? In environments where there is an established tradition I
think it is rude to break with the norm unless there is a compelling reason to
do so. The commandline is popular among developers, other IT professionals and
power users because of how efficient it is. It is efficient because there is
not all the noise, handholding and other bullsh*t. Please let us keep it that
way.
Use a specific target to list other targets. I've seen some people use "make
targets".
~~~
solipsism
Bah. What's the harm here? It's not like you'll type _make_ and then not be
able to figure out what to do next. The problem you're trying to avoid when
preserving default behavior is confusing the user, and that's not applicable
here.
Instead of blindly following laws like "Always meet user expectations" we
should think about things in a case-by-case basis. Your law is at best a rule
of thumb.
~~~
bschwindHN
There are few things more infuriating than a build tool that prompts for user
input when it doesn't need to. Most people like to automate these things, and
having a prompt ask for input after typing `make` is completely unexpected and
annoying.
Bower is a particularly bad offender here. By default it will periodically ask
you if it can send anonymous usage statistics. If you've never experienced it
before, you have to angrily google the problem once piping `yes` to it fails
and find a github issue where the solution is `bower install
--config.interactive=false`
_Always_ assume your build tool is running in an automated environment
without user input. If the user wants to do something out of the ordinary,
provide command line options and try to follow the conventions that already
exist.
~~~
solipsism
I agree 100% that a good build tool makes it easy to build in an automated
context. But that's not relevant here, is it? _make build_ is not less
automatable than _make_. Sure, someone has to manually run _make_ once to
figure out what the actual build command is. But no person in his right mind
would automate a build without running it manually once. I say this as someone
whose job it used to be too automate builds.
~~~
bschwindHN
Yeah you're right, you'd run it at least once locally and discover what the
right command is. I guess I'm just letting my feelings for Bower permeate to
other build tools, because sometimes it'll run without user input, and other
times it will prompt for it.
------
jgrahamc
An alternative way that just uses GNU make functions:
[http://www.cmcrossroads.com/article/self-documenting-
makefil...](http://www.cmcrossroads.com/article/self-documenting-makefiles)
------
saiki
Thanks for sharing! This is a great way to document and see documentation for
main targets in Makefile.
We use Makefile in same way to execute project related tasks like deployments
and run development environments. This will even further help to show main
targets from a Makefile easily and pretty standard way. Will be taken into
use.
You can achieve similar by writing bash scripts, but it will be mostly custom
and others need to learn how to use it and extend it. Makefile gives you a
standard way of writing small utilities related to all your project, and
almost everybody knows how Makefile works and if not, they can learn from
existing documentation.
------
to3m
You probably want to be using phony targets if your Makefile consists of stuff
like this. See: [https://www.gnu.org/software/make/manual/html_node/Phony-
Tar...](https://www.gnu.org/software/make/manual/html_node/Phony-Targets.html)
------
kluck
Good idea but target names might contain numbers as well, so you should adjust
the regular expression used:
@grep -P '^[a-zA-Z0-9_-]+:. _?## ._ $$' $(MAKEFILE_LIST) | ...
------
m6w6
Shorter, more fail-proof help target:
help:
@awk -F ':|##' \
'/^[^\t].+?:.*?##/ {\
printf "\033[36m%-30s\033[0m %s\n", $$1, $$NF \
}' $(MAKEFILE_LIST)
... but I agree, breaking expectations is somewhat bad. Also, many shells have
completion for Makefiles nowadays, though, that won't get you an additional
help text.
------
spoiler
I've been using a similar self-documenting technique myself for a while now,
too. Although, my version preserved the traditional part where just calling
`make` starts building the program and also supported short one line
descriptions and longer ones.
Slightly OT: I like how Rake handles this, which is what gave me the idea in
the first place
------
rekado
Instead of using `awk` to break lines you could just use `fmt`, which is part
of the GNU coreutils.
------
tempodox
Change `grep -P` to `grep -E` (or simply `egrep`) and it also works on OS X.
~~~
fzaninotto
Yep, that fixes the OSX problem. Post updated with this version.
------
beaufils
Here is a version with no dependencies to grep or awk but just sed. I did not
tested it on OS X yet.
help:
@eval $$(sed -r -n 's/^([a-zA-Z0-9_-]+):.*?## (.*)$$/printf "\\033[36m%-30s\\033[0m %s\\n" "\1" "\2" ;/; ta; b; :a p' $(MAKEFILE_LIST) | sort)
~~~
LukeShu
I don't have an OS X box, but I do know that you'll need to change the `-r` to
`-E` (GNU sed vs BSD sed). Recent versions of GNU sed (4.2+, I think) also
accept `-E` for compatibility with BSD sed (though this is undocumented).
------
ehartsuyker
I do this in my bash scripts, if anyone wants to see how.
[https://github.com/ehartsuyker/node-
deb/blob/ede596b2c8a07f1...](https://github.com/ehartsuyker/node-
deb/blob/ede596b2c8a07f1f1925e4f8e51df5ba9ef15be3/node-deb#L44)
------
Gratsby
But then you have lost the default target of make and instead of make && make
install you end up with make build && make install. That's going to break a
brain or two when people try to figure out why their default MO doesn't work.
| {
"pile_set_name": "HackerNews"
} |
Kevin Spacey on the potential of Netflix to disrupt traditional TV [video] - wiremine
http://www.businessinsider.com.au/everyone-in-the-tech-and-tv-industries-is-passing-around-this-speech-by-kevin-spacey-2013-8
======
nrivadeneira
Kevin Spacey clearly gets it. Rampant piracy is an indication of a failing
business model. It's not that people aren't willing to pay, and that's
evidenced by the success of Netflix and shows like House of Cards. Same can be
said of Steam's game distribution model. Give people what they want, how they
want it, at a fair price, and you'll surely be able to make money.
~~~
clebio
I like the message -- and the messenger in this case -- a lot. Having read the
full transcript of his speech, I'm trying to imagine what he might have left
out, what his opponents will use to dismiss this event.
Off-hand, the easy out would be that 'giving people what they want' is
actually pretty costly. The steep pilot culling selects for mass appeal. If
80% of the (paying) viewing public like a pilot, it's probably a low-risk
venture with pretty predictable rewards. If those returns (ROI) are sufficient
to keep the studio running, do the people writing the checks really care that
more niche products _might_ gain slightly better rewards?
~~~
ballard
Yeap. Locking it all away for an absurdly high price or just giving it all
away are suboptimal. Charge a "no brainer" price that most people won't have a
problem with is supply meeting demand more optimally... For potentially
_higher_ profits.
------
avalaunch
_For example, Spacey says there will be 146 pilots made this year at the cost
of $US300-$US400 million. Only 56 of those will actually be made into a
series. “That makes our House of Cards deal for two seasons really cost
effective,” Spacey says in the speech._
Of course it seems cost effective when the show is a big hit. But had it been
a flop, it would have seemed a colossal waste of money - something that could
easily have been surmised with a much smaller investment. For Netflix's
strategy to work, they'll need to be able to continue to pick winners at a
much higher percentage than the traditional television network has been able
to. To do so they'll need to have content producers that understand what it
takes to tell a good story. I think the downside is that this high risk
strategy is likely to make them more risk averse in the shows that they choose
to produce. They'll be a lot less likely to invest in first time writers,
actors and directors. And they'll probably shy away from any story that is at
all experimental in nature.
~~~
shazzdeeds
This is a good point. A company should not be expected to just throw a bunch
of shows out and see which ones stick. Too expensive.
What stuck out to me most in the speech was Kevin Spacey's quick mention of
Netflix's response to the pitch: "We ran the numbers and we think our customer
base would like it".
Media outlets thinking of taking the all-in approach will need the technology
to calculate and hedge the risk . Netflix clearly has that in place, and it
helped convince them to take a chance.
~~~
hershel
It's even better for netflix. They has the technology to allow directing
decisions , small and big, be decided by data :
[http://gigaom.com/2013/07/25/at-netflix-big-data-can-
affect-...](http://gigaom.com/2013/07/25/at-netflix-big-data-can-affect-even-
the-littlest-things/)
------
shmerl
However it's not a DRM free streaming model. So it's not much healthier than
other types of restrictions - it's still DRM. Some truly DRM free streaming
should emerge in the face of all these Netflix-like DRMed barbed-wired
gardens. Streaming should be a convenience, not a way to restrict copying.
Others brought Steam as an example - for Steam, there is competing GOG which
is DRM free and proves the point that DRM free gaming without regional
restrictions and other such junk can be successful. So what is there for
Netflix?
Also, I didn't get his point about the music industry. Most music is easily
available DRM free, _unlike_ video.
~~~
methodin
I don't think most people expect DRM-free content when paying for a
subscription model - I know I don't. I'm paying for the right to access that
content when I want as long as it's available but I am under no assumption
that I assume the right to take that content with me and do with it what I
please. That type of content is completely different than what this streaming
model represents. Netflix is surely on a better trajectory here than other
providers, no?
~~~
shmerl
It's not better as long as there is DRM in it. Why can't you expect to get the
content with you? You can expect paying for titles some one time fee. Not
unlike music and games. Streaming is just a way of accessing it from the
"cloud" without the need to download it first. But why should it prevent you
from downloading if you want to back it up, take it with you somewhere where
you have no access to the cloud and so on? There is no good reason for
"subscription model" in the digital world which restricts your ability to
copy. Buy and use, that's what it's supposed to be.
~~~
smtddr
_> But why should it prevent you from downloading if you want to back it up,
take it with you somewhere where you have no access to the cloud and so on?_
That's the real problem; that internet is not accessible & free everywhere. I
think DRM is fine as long as I can access my media anytime & anywhere on all
my devices. Netflix pretty much fits this requirement aside from the hack of
Linux+Netflix. The issue that internet isn't available to every human being or
costs a ridiculous amount of money is a problem that needs to be fixed. I want
to be able to say "Everyone has internet these days" and _really_ mean it for
all people of the world. We need to make it impossible for anyone to make the
argument _" but what if I don't have internet access?"._
~~~
shmerl
_> I think DRM is fine as long as I can access my media anytime & anywhere on
all my devices._
I think DRM is never OK. Not only because of privacy and ethical issues, but
because if you can't fully control the content and the service which issues
DRM closes down you would simply lose everything you paid for. It should be a
deal breaker. Then pirating that content will be the only option to get it
back. This Xkcd applies to video pretty much the same way as to audio for
which it was made: [http://xkcd.com/488](http://xkcd.com/488)
~~~
smtddr
Unless we're talking about Win8-BIOS-TPM stuff(which I don't clearly
understand just yet), I don't think proper(non-remote-controllable) DRM is a
privacy concern. I'm not sure how it's an ethical concern either. But, I do
think that if the DRM servers and/or media streaming servers are going offline
and making the content disappear forever they should allow it to just be
downloaded without DRM for free - since turning off the servers implies
they're done making money off it(?).
~~~
shmerl
When Netflix (or any other DRMed code) runs on your machine, it runs as a
black box for you. Why isn't that a privacy concern and why should it ever be
trusted? It's unethical because it's an overreaching preemptive policing, but
it's a long subject.
_> do think that if the DRM servers and/or media streaming servers are going
offline and making the content disappear forever they should allow it to just
be downloaded without DRM for free_
They may be "should" allow it, but they will never do at that point. They have
more important problems to care about when they close down. So it's our
obligation as responsible users to demand DRM free content from them right
away, and avoid those who refuse to sell such.
~~~
smtddr
Okay, I think I see what you're saying about the decryption binary blob. With
all this Ed Snowden stuff, it would not be unreasonable to have some suspicion
of any network-software that has a wide user base. Netflix-app would be a good
place to have a government backdoor...
Then how do we deal with piracy? Is piracy even a problem at all? I guess if
iTunes is selling music without DRM and not falling apart, then we think TV-
shows/movies can do the same?
~~~
shmerl
_> Okay, I think I see what you're saying about the decryption binary blob.
With all this Ed Snowden stuff, it would not be unreasonable to have some
suspicion of any network-software that has a wide user base. Netflix-app would
be a good place to have a government backdoor..._
No need even to go so far. DRM by definition implies that they don't trust
you, the user. So, I see no point to trust them in return. It's normal to
assume that DRM is always a risk of privacy violation. Surely, it's a good
ground for sinister abuses like your example as well.
_> Then how do we deal with piracy?_
DRM doesn't deal with piracy. Publishers and distributors don't even hide this
fact these days. So what are they using DRM for? Guess yourself, but expect
nothing good in there.
The recipe for dealing with piracy is ages old - increase quality to be
competitive. I.e. some part of piracy which can be affected is caused by the
fact that pirated content has higher usability (no DRM, regional restrictions
and other such junk). By releasing quality products while being DRM free and
delivering them with high level of convenience, distributors can compete with
that sector of piracy. The segment of piracy which is caused by people being
crooks and getting free stuff won't be affected at all. DRM doesn't affect it
either.
~~~
bluntly_said
I think you're being too black and white here.
I agree with you in principle on a LOT of the points, but the real issue is
that most content producers (publishers are a different issue...) would LOVE
to be able to do this:
"The recipe for dealing with piracy is ages old - increase quality to be
competitive"
But realistically it's fucking HARD. Mainly because increasing quality to be
competitive with piracy would generally require breaking tax and import laws
everywhere.
Even if it doesn't require breaking those laws to be competitive, you have to
at least pay enough people to be aware of them, for each and every country you
want to be able to distribute your content in.
So decent* DRM isn't about stopping piracy, really. It's about slowing it down
just enough that it's still worthwhile to jump through the hoops required to
bring that content legally to other regions.
*: It's actually fairly hard to hit this goal on the head, and often I feel companies buy too far into their own bullshit and sense of entitlement with DRM. A lot of shoddy executives with poor understanding of software misuse DRM to the extent that it drastically lowers the value of the content (see: always on DRM) Please continue to bash them, they deserve it.
~~~
shmerl
_> Mainly because increasing quality to be competitive with piracy would
generally require breaking tax and import laws everywhere._
I'm not exactly sure why so? Take for example gaming. GOG sells DRM free games
worldwide, without regional restrictions and no inflated pricing for countries
like Australia for example. Why can't video be sold on similar terms?
_> So decent DRM isn't about stopping piracy, really. It's about slowing it
down just enough that it's still worthwhile to jump through the hoops required
to bring that content legally to other regions._
In my view it never pays off. The downside of reduced usability is always
worse than any potential gain in slowing down piracy on the period between
some new DRM scheme is introduced until it's broken. Usually that period is
small, and ever since that DRM becomes obsolete, while usability stays
crippled for legitimate users. All those involved in production and
distribution should always keep in mind that DRM means their voluntary
reduction of quality for practically absent gain of shortly slowed down
piracy. How are they planning to compete, when instead of increasing quality,
they cripple their own products?
------
DigitalSea
I think Spotify which I might add has dramatically reduced piracy in the
countries it is available has proven that streaming is the future. People
don't care about not being able to download it, as long as they can watch it
whenever they want. Going back to Spotify, I don't remember the last time I
downloaded any music for free, I just use Spotify.
~~~
adamnemecek
It has been argued multiple times that Spotify is not sustainable.
[http://www.npr.org/blogs/therecord/2012/09/26/161758720/how-...](http://www.npr.org/blogs/therecord/2012/09/26/161758720/how-
musicians-make-money-by-the-fraction-of-a-cent-on-spotify)
So it's cool that you are getting your music legally, nonetheless, in the end
it's not that different than in you had pirated it.
~~~
randyrand
That's not all that related to sustainability. Sure, it might mean musicians
make less but that's just supply and demand and supply is HUGE (still not
infinite).
~~~
adamnemecek
Yeah supply of shitty music is huge but that's the way it works with
everything.
~~~
bluntly_said
I think this is the wrong way to look at it.
When you're in a constrained format like radio or cable tv you can only play
one thing for your audience at a time. Because of that it's critical that what
you play has mass appeal so that lots of people will be okay listening to it.
When you're in an unconstrained model that lets users pick what to watch or
listen to, that mass appeal factor becomes much less important.
Sure, there's a HUGE array of music available, and each of us can claim that
we think most of it's shitty. But when you actually start comparing what you
consider shitty to what I consider shitty, I'd be willing to bet there are a
LOT of areas that don't overlap.
This is the power that comes with being able to stream the content that the
user wants. Mass appeal becomes much less important.
So yeah, there's a huge amount of music out there that I think is shitty. But
there's an equally huge number of people that all have different opinions on
what the shit actually is.
~~~
adamnemecek
I'm not sure I understand your argument. I agree that in an unconstrained
format mass appeal is much less important. Yet I don't feel some sort of 'good
music' saturation point has been reached within the single subgenres (and
subsubgenres) and I think that it will take a while for that to happen.
------
zalew
HN title sums up Business Insider summing up a video sum up of the speech.
~~~
3rd3
As long complexity is only hidden but not lost, that’s OK.
Here is the full speech:
[http://www.youtube.com/watch?v=oheDqofa5NM](http://www.youtube.com/watch?v=oheDqofa5NM)
~~~
Tyrant505
Thank you, from the lazy.
------
lukifer
I still think Netflix is sapping some of the fun and vitality out of their
original series by putting all the episodes up at once. Is binge-watching
great? Of course it is! A huge library of great shows to binge-watch is one of
the Netflix's biggest selling points.
But getting it all at once is like peeking at your Christmas presents early:
you think you want it, but it spoils some of the fun, the eventy-ness of it,
and the social context created by a shared timeline (the so-called "water-
cooler effect").
Anyone who doesn't want that experience can still wait until the whole thing
is out, probably just a few months, at which point it will still be available
in the binge library, presumably forever. (I know some who prefer not to start
a new series _at all_ until the entire thing is finished, which is also okay.)
~~~
avalaunch
_Anyone who doesn 't want that experience can still wait until the whole thing
is out, probably just a few months, at which point it will still be available
in the binge library, presumably forever. (I know some who prefer not to start
a new series at all until the entire thing is finished, which is also okay.)_
Likewise, I could say that anyone who doesn't want to watch them all at once
doesn't have to. You can choose to watch only 1 episode a week.
~~~
werid
the problem is that these people tend to enjoy discussing "this week's
episode" with their friends, and that's hard when they've watched the entire
season/series.
~~~
Tyrant505
This discussion of an ep or event in series happens regardless... You are just
defending a timescale based on an old model as a reason for it to exist.
------
benackles
The technology and business model side of the equation could be solved, if the
licensing problems were resolved. Too bad all the streaming services are still
hamstrung by licensing issues from truly providing a service wherever you are.
Netflix is still unavailable in most parts of the World, including many Asian
countries where piracy is the most prevalent.
------
davemel37
This reminds of Fred Wilson's post about Piracy
[http://www.avc.com/a_vc/2012/01/screwcable.html](http://www.avc.com/a_vc/2012/01/screwcable.html)
------
jamesmcbennett
In this interview, is there a relationship between a TV pilot and a lean
startup MVP where Spacey is against such a pursuit preferring more visionary
endeavours that take longer to get feedback?
| {
"pile_set_name": "HackerNews"
} |
Dumb Screenplay Robot - smacktoward
https://dumbscreenplayrobot.wtf/
======
duxup
>A series about a group of U.S. veterans succeeding in life after stumbling
upon a full zombie outbreak!
This seems like it would be already a thing.
>An erotic comedy smorgasbord of blackout gags inspired by goings on by the
circumstances of the matriarch's death come into question.
I'm having trouble wrapping my head around this one...
------
liquid153
Highly doubt any AI is being done by this shitbot
| {
"pile_set_name": "HackerNews"
} |
German parliament votes to legalise gay marriage - rbanffy
http://uk.businessinsider.com/german-bundestag-votes-for-gay-marriage-law-merkel-opposes-2017-6
======
iMerNibor
..and right after voted to pass a law against free speech :)
[http://www.bbc.co.uk/news/technology-40444354](http://www.bbc.co.uk/news/technology-40444354)
(companies will be very careful and delete everything that could potentially
not be legal)
Quite a coincidence this happened right after, if you were cynical you might
assume they did this on purpose..
| {
"pile_set_name": "HackerNews"
} |
Introducing the LEDE project – A reboot of the OpenWrt community - ycmbntrthrwaway
https://www.lede-project.org/
======
ausjke
A long time openwrt user here. What puzzles me the most is that, those who are
forking openwrt are the the majority group of core developers for openwrt, so
I don't know why they are leaving the project they're in control in the first
place. It seems a few core developers left behind are also in shock, nobody
knows why, and there is no dispute in the community that led to the split
either, truly a mystery.
~~~
dman
Maybe this is the first step towards launching a commercial offering?
~~~
mcbridematt
Given that OpenWRT is the reference distribution of choice for networking
chipsets these days, the reference goals do seem to be focused on making it
better for that.
The last couple of OpenWRT releases have moved fast, in the future OpenWRT
could move closer to the cutting edge without the pressure of users who want
long term stability?
------
ge0rg
It is a real pity that the lack of developers is compensated by splitting
developer focus on two different forks. If the reasons stated are true, let's
hope it works out and strengthens embedded Linux, maybe even leading to a
reunion like egcs/gcc.
~~~
embeem
This announcement comes as a surprise to all the other developers, myself
included.
\- mbm (openwrt founder)
~~~
JeremyNT
OpenWRT is an impressive project and I've really enjoyed using it over the
years.
It's always disappointing to see a project you use and rely upon face this
kind of challenge. With technical forks, you can usually at least appreciate
the motivations, but with political forks it can be difficult to understand
what or how things will be improved (especially for users who only see events
from the outside).
Best of luck to you and the rest of the team in resolving whatever issues are
at play here.
------
revelation
They have a point, maintaining something based on OpenWRT is extremely painful
if you are not very in tune with the development.
I remember one instance where they just switched the entire package feed stuff
around and didn't bother porting all old packages over. Or when core packages
move around willy-nilly.
Another instance was when they changed over to a new freaking libc (musl).
That's the kind of thing for major releases, and the fallout was that stuff
like hwclock suddenly segfaulted.
------
symlinkk
oh boy more fragmentation! I wish the devs behind OpenWrt, dd-wrt, and LEDE
would just work together for god's sake. OpenWrt is far from complete. the
documentation alone is terrible.
~~~
embeem
Agreed, but the irony in that statement is that the OpenWrt developers who
started LEDE are also DD-WRT developers.
------
patrickg_zill
Concerning those who complain about the fork - Debian has spawned Ubuntu and
many other distros.
RedHat has spawned CentOS and Scientific Linux.
Is anyone arguing that this has destroyed Linux?
------
Animats
Now if they could just get rid of Linux underneath and use something with
better security. L4, maybe. After all, this is for embedded devices which
basically run one program.
~~~
DiabloD3
I don't know why parent is being downvoted. Linux probably isn't the best OS
for this, a microkernel OS or something based on BSD seems to be far saner,
especially since we _don 't_ need weird hardware support, all home routers use
the same three or four families of MIPS and ARM SoCs.
~~~
wtallis
Home routers come with one of three instruction set families (MIPS, ARM,
PowerPC) with CPUs or SoCs from at least six major manufacturers (Broadcom,
Qualcomm-Atheros, Ralink/MediaTek, Marvell, Freescale/NXP, Realtek) and WiFi
interfaces from any of them except Freescale but plus Quantenna. And there are
multiple generations of hardware in the market at any one time. That adds up
to a hardware ecosystem that is vastly more diverse than PCs; this is in no
way a narrow scope of problem. And I'm ignoring all the devices that also have
a cable, DSL, or cellular modem.
The boundaries of what tasks are handled by the CPU vs by dedicated offloads
on the SoC vs by the NIC (which usually has software of its own) differs with
every manufacturer and every hardware generation. The job we want our routers
to do is a moving target as the industry continues to develop new routing and
configuration protocols (eg. Homenet) and new QoS techniques and new WiFi rate
control techniques that need to be incorporated into the software running on
the CPU and/or NIC. The hardware is usually weak enough that the products can
only get the job done by prioritizing performance over expensive security
measures.
I could get behind the idea of a line-rate dedicated firewall+NAT with
formally specified behavior. But any attempt to enumerate the core
functionality of a modern wireless router will leave you with a job that is
far larger than any successful formally specified/verified software project.
Running atop Linux is the only option that doesn't leave you stranded with a
'90s-era feature set and a cripplingly small base of supported hardware, and
the userspace stuff is the low-hanging fruit for securing anyway.
~~~
duaneb
What about {net|free|open}BSD?
~~~
wtallis
Their hardware support is not as good as Linux, especially for WiFi and for
embedded SoCs. Their network stacks are lacking in more advanced features like
QoS that's not from the '90s (AQM, FQ, traffic shaping that accounts for the
overhead your DSL or cable modem adds) and I'm not aware of any efforts to
eliminate bufferbloat from NIC drivers the way BQL has for most Linux Ethernet
drivers. I'm not sure how Linux compares against the BSDs for dumb packet
forwarding and NAT performance, but for real-world performance the better QoS
makes it no contest.
Linux is what the chipset manufacturers target, it's what the router
manufacturers ship, it's what most of the academics seem to turn to when
they're not using a network simulator, and Linux seems to have the most active
networking developers. The only compelling argument for BSDs is that pf.conf
is more approachable than the Linux tools, but BSD advocates usually don't
mention that it's because pf does a lot less than tc and the other Linux
tools.
~~~
antxxxx
FreeBSD has QoS available via PF and ALTQ. As for performance, Netflix chose
FreeBSD for their CDN for the better network performance over linux. I do take
your point about hardware support on consumer routers though - most of these
are based on linux so its relatively easy to get linux based *wrt installed on
them
~~~
wtallis
Stop thinking like QoS has a singular meaning. ALTQ provides the
aforementioned '90s-era inferior QoS techniques, and it isn't even available
on FreeBSD without recompiling the kernel. The dummynet module is a little
more modern, and in February patches appeared implementing the CoDel and FQ-
CoDel AQMs that Linux has had for four years.
------
DominikD
It's interesting to compare contributors from both LEDE[1] and OpenWRT[2]
sites. Most of the folks involved in LEDE seem to be from Germany. With
OpenWRT devs mostly from DE to begin with, this fork may end up as something
interesting. Hope it's not another libav/ffmpeg snafu.
[1] [https://www.lede-project.org/about.html](https://www.lede-
project.org/about.html) [2]
[https://dev.openwrt.org/wiki/people](https://dev.openwrt.org/wiki/people)
------
patrickg_zill
What I can tell you, is that I found it very difficult to find what the
situation was on the Netgear router that I wanted to work with.
A series of well-designed pages that would help me find the latest info, with
notes of workarounds or "no it won't work" would have saved me a lot of
Googling to find posts, then having to look at the date of each post to work
out the chronology; and would go a long way to helping with adoption.
I was very pleased with OpenWRT even 5-6 years ago! I am sure that things are
better now.
------
Hydraulix989
I really don't understand why there needs to be a newly forked router firmware
project every few years. Back in my day, we used DD-WRT, and it worked.
~~~
the-dude
They went over to the dark side.
~~~
randomchars
How so?
~~~
the-dude
Tried to go commercial, relicensing a community effort. Not sure if this is
what sparked OpenWRT into existence.
~~~
gear54rus
Is this it? [http://www.wi-
fiplanet.com/columns/article.php/3816236/The-D...](http://www.wi-
fiplanet.com/columns/article.php/3816236/The-DD-WRT-Controversy.htm)
~~~
the-dude
yes.
------
pmorici
Interesting. I've always found OpenWRT a lot easier to use for embedded
development than alternatives like OpenEmbedded even if I didn't care about
the Wireless or Router focus of the project.
------
ksec
Slightly Offtopic, are there anything similar based on FreeBSD / BSD?
~~~
nissimk
There are several listed here, but most of them only work on x86, not consumer
routers.
[https://en.m.wikipedia.org/wiki/List_of_router_and_firewall_...](https://en.m.wikipedia.org/wiki/List_of_router_and_firewall_distributions)
------
chris_wot
What are the benefits of using procd? And are you going to fork that also?
What's the scope of this project - really very interested...
------
bluesign
"AGREED: 4/6 attendees agree to create and agenda and finding a date on the
mailing list (jow_laptop, 13:05:51)" [1]
First major disagreement :)
[1] [http://meetings.lede-project.org/lede-adm/2016/lede-
adm.2016...](http://meetings.lede-project.org/lede-adm/2016/lede-
adm.2016-03-30-11.05.html)
------
Zekio
More of this type of projects is good, gives consumers/developers more
choices.
~~~
pferde
Not always. If a fork is made because some group wants to move in a different
direction code-wise, it's good, because it gives users more choice. However,
if the fork is made because of administrative reasons (as it seems to be the
case here), then often all it does is muddy the waters and create confusion.
We'll see how this one plays out.
------
lindadarnell
I don't like it
------
grandalf
While I'm excited about OpenWrt, why wouldn't the ecosystem move to Raspberry
Pi at this point, considering that a Pi and multiple wireless NICs can be
purchased for much less than a typical access point?
~~~
grandalf
My comment is getting lots of downvotes. I'd argue:
\- All the routers (buffalo, linksys) I've installed OpenWRT on have ended up
being fairly unstable and have required reboots. The only consumer grade wifi
router I've tried that seems stable is the Apple Airport Extreme.
\- Most home users never come close to maxing out the throughput a pi can
offer.
\- If not a pi, perhaps another open hardware device -- seems like one could
be sold for under $50 with nic support that addresses all the max USB
bandwidth concerns (it may already exist).
\- All the complexity of installing on random wifi router hardware (version
maintenance, minimal storage space, etc.) seems prohibitive compared to the
simplicity of a pi, risk of bricking the router, etc.
~~~
easp
"Most home users" are never going to install OpenWRT on anything, RPi, or
otherwise. Of those that do, it seems likely that they will max out the
throughput of a RPi, especially now that >100Mbps internet is common place is
some countries, and is becoming increasingly available in others (like the
US).
There are some RPi like boards with a single GigE, but they suffer from having
smaller developer communities, and still come up short on IO when compared to
a networking platform, which will typically have 1-2GigE lanes to the SoC,
integrated 2 or 3 stream 2.4 GHz WiFi and a 1-2x miniPCIe interfaces.
Right now, probably the cheapest most capable router is the Ubiqti EdgeRouterX
for $50 (no wifi though). It has a 2 core/4 thread MIPS CPU that can do ~1Gbps
NAT/ROuting with hardware offloads and ~500Mbps just using the CPU and DMA
hardware.
~~~
grandalf
> It has a 2 core/4 thread MIPS CPU that can do ~1Gbps NAT/ROuting with
> hardware offloads and ~500Mbps just using the CPU and DMA hardware.
Wow! What do you think is the best one that _does_ do wifi?
| {
"pile_set_name": "HackerNews"
} |
Scraping Roger Ebert’s reviews and finding his favorite movies on Amazon Prime - catwind7
https://www.linisnil.com/articles/scraping-roger-ebert-reviews-and-amazon/
======
sonofgod
If you need a more stateful version of requests:
import requests
session = requests.session()
# now use session like you would requests
session.get("http://httpbin.org/cookies/set/name/value")
print(session.get("http://httpbin.org/cookies").content)
~~~
catwind7
oh I need to try that - I had this feeling that there was a more stateful
version but for ..... some reason ... reaching for a new dependency felt
easier at the time haha. Thanks
------
gabrielsroka
See also "Where to Find Roger Ebert’s Great Movies Streaming" [0] which has US
listings for Netflix, Amazon Prime, Hulu, Disney Plus, Criterion Channel,
Kanopy, HBO, Starz, and Showtime as of March 2020.
[0] [https://www.rogerebert.com/features/where-to-find-roger-
eber...](https://www.rogerebert.com/features/where-to-find-roger-eberts-great-
movies-streaming)
------
jyriand
I guess this list of movies applies to people who live in US. Available movies
differ substantially between countries. With Netflix it's easy, it doesn't
even show the movie you can't watch, with Amazon you have to click through
every movie you are interested in to see the screen that says that this movie
is not available in your region. There are even series where only one or two
episodes are unavailable.
------
Mediterraneo10
It is the fact that we have a relatively agreed-upon canon of great films
(with immense re-watch value over the years) that keeps me torrenting instead
of streaming. Sure, you could search from one streaming site to another for a
given film, but the film may be either completely unavailable, or it may be
offered one moment and the mysteriously removed the next. Meanwhile, some
torrent communities are run by ardent cinephiles and they have all of these
films, and once you have downloaded it, you can go back to it whenever you
want.
~~~
kjakm
You can also solve the “what streaming service” issue by buying the movie on
DVD or Blu Ray allowing you to go back to it whenever you want. Additionally
if you’re ok with DRM iTunes has most stuff.
Useful tip for finding which streaming service a film is on: google “film name
streaming” and google lists the answers in a box at the top of the results.
~~~
Mediterraneo10
The problem with recommending that people buy the DVD/Blu-Ray is that the
agreed-upon canon of great films stretches into the many hundreds of titles
(Ebert’s list at 364 titles is only an abridged canon.) Therefore, for someone
seeking a cultural education, buying the physical releases would run into the
thousands and thousands of dollars. It would be a challenge even for North
Americans or Western Europeans to amass a suitable collection, let alone
people in lower-income countries. Consequently, a person can only
realistically learn about great cinema by streaming from multiple subscription
sites, or torrenting, and people disappointed by the former ought to remember
that the latter exists.
~~~
dfxm12
You can sub to one streaming service and never run out of great films to watch
(in part _because_ titles rotate, not in spite of, but that's beside the
point). Justifying piracy because, for example, you're disappointed that
Netflix is missing one great film, is disingenuous.
~~~
Mediterraneo10
You misunderstand my point. It’s not that a person might be looking just for
"great films to watch", in which case any streaming site might satisfy them.
It is that a person might be looking for _the_ great films, that entire canon
of films which scholars hold to be important. Netflix is never going to have
them all regardless of how much they rotate.
~~~
dfxm12
That doesn't really affect my point. No streaming service will meet your
unreasonable demands (for many reasons, first of all is that there is not an
objectively agreed upon list of _the_ great films), and therefore justifying
piracy because of it is disingenuous.
~~~
Mediterraneo10
That a service should have it all is not an unreasonable demand, and it is
peculiar that you chide someone for "justifying piracy". After all, the HN
crowd is generally very sympathetic to Library Genesis, which is aiming to
gradually contain all books on all subjects, and therefore the curious reader
can conveniently and at no cost learn about classic 20th-century literature,
copyright be damned. Someone who wants the same solid cultural education with
regard to films will not be served very well by the commercial offerings
compared to torrent communities, but a cultural education is more precious
than anyone’s claim to copyright.
As for "there is not an objectively agreed upon list of the great films",
there may not be one single list, but as a broad consensus one can take the
overlapping suggestions of the critics who contribute to the Sight and Sound
poll, the winners at Cannes and Venice, those films and directors who have
been celebrated year after year in _Cahiers du Cinéma_ , and so forth.
~~~
dfxm12
_That a service should have it all is not an unreasonable demand_
Yes it is, especially when you said that it is a requirement for a service to
have a certain list of movies, and then admit that that no such list exists.
Therefore, a service _can never_ meet your stated requirements (and therefore,
you've created a self fulfilling framework to justify your piracy of certain
movies). If you're playing so fast and loose with what constitutes a list of
great films, then you can subscribe to the Criterion Collection and call it a
day.
_it is peculiar that you chide someone for "justifying piracy"_
You said piracy of certain films was ok _because_ of their lack of inclusion
in a service didn't meet your requirements, requirements that could never be
met. I'm saying it's wrong to knowingly create unrealistic requirements and
justifying piracy based on that.
If you're going to change your argument to say that certain films should be
free to all, due to certain significance to the public, that's a different
stance (and one I'm more sympathetic to).
------
staycoolboy
Thank you for doing this. I wish "top critics" was a search option on Prime
(but their Roku interface is just abhorrent).
There was a time when I hoped Netflix would do something similar: click here
to see your favorite critics film list, but since Netflix has lost the
streaming rights to soooo many films compared when they first started
streaming ca. 2007, this is not doable. (Even DVD rights in most cases: films
that are in my "Movies You Rated" queue from 2003 are no longer in Netflix's
library.)
~~~
ddrt
They have a really poor UX imo. The categories are seemingly arbitrary, and
they have niche and seasonal ones that don’t make sense. During the December
holidays they didn’t have a holiday themed category until near holiday end.
Further, they make “innovation” like auto play when nobody asked for this, and
without any way to stop it (unless you go to desktop and disable it deep in
your settings).
When searching you will receive similar results for titles they used to
have... well why not state “are you searching for x? It’s no longer available,
here are some recommendations” so the user isn’t wasting time wondering if the
search feature is just “bad”.
In the world of constant, unannounced, and live experimenting on huge user
bases a little messaging goes a long way (with the comparison being nothing)
------
greggman3
I'm surprised not to see more people adding their favorite movies. Just
sticking to things semi-related. I may have to go watch "My Man Godfrey" again
but at least for me "The Thin Man" and its 5 sequels stuck with me where as
though I watched "My Man Godfrey" years ago but I don't remember any details
of it. (same lead actor and he pretty much always plays the same type of
person)
"The Man Who Shot Liberty Valance" is a good movie but if you want some other
westerns starting James Stewart I can recommend "Destry Rides Again" which is
not super serious but I found it throughly entertaining. Also "Broken Arrow"
(1950), (not the 90s John Woo movie which is a fun popcorn movie).
Seeing "The Good, the Bad, and the Ugly" on the list I recently saw "The
Outlaw Josey Wales" which I enjoyed (also a Western with Clint Eastwood)
Of the movies on that list I've seen the one I'd recommend the most is "Women
in the Dunes". I don't want to over hype it I've seen most of the movies on
the list and they are all great stories but "Woman in the Dunes" might give
you something new to think about where as the others are mostly just great
entertainment.
~~~
patrec
In addition to “Woman in the Dunes”, I'd also nominate “The Gospel According
to Saint Matthew”. And, in fact, “It's a Wonderful Life” for those who haven't
seen it (it's a much more grown up and dark film than you may have been led to
believe).
------
sfaruque
There used to be a site call ClerkDogs.com that probably had the best movie
recommendation system I've used. You started off naming a few movies you
liked, and it would provide a list of movies you'd also probably like, and it
was very accurate.
From what I remember, the database was cataloged and maintained by actual
humans, and not some algorithm following behavior patterns.
~~~
fastball
Yep, jinni.com did the exact same thing, and I loved it. Unfortunately, it
seems like B2C just didn't work financially so they switched to an entirely
B2B model to help providers with their recommendation engines and no longer
have their data accessible to end-users.
~~~
cpach
It’s a shame that the economics of recommendation engines doesn’t seem to work
very well in the B2C space. Good rec. engines can be very useful.
------
x3blah
Instead of using Python, here is a solution that only requires sh, curl, sed,
sort, uniq and grep.
This solution uses a generous 87s delay to retrieve the Amazon pages. There
are 328 films listed as "great movies" on rogerebert.com. As such, the script,
named "1.sh", needs 8h to complete, e.g., the time while you are at work or
sleeping. No cookies, no state, no problems.
Usage: sh -c 1.sh > 1.html
Open 1.html in a browser and it shows whether each "great movie" is available
as Prime Video or whether it is only available in some other format, such as
Blu-ray, DVD, Multi-format, Hardcover. A link to the item on Amazon is
provided.
#!/bin/sh
curl -HUser-Agent: -H'Accept: application/json' --compressed 'https://www.rogerebert.com/great-movies/page/[1-16]?utf8=%E2%9C%93&filters%5Btitle%5D=&sort%5Border%5D=newest&filters%5Byears%5D%5B%5D=1914&filters%5Byears%5D%5B%5D=2020&filters%5Bstar_rating%5D%5B%5D=0.0&filters%5Bstar_rating%5D%5B%5D=4.0&filters%5Bno_stars%5D=1'|grep -o "/reviews/great-movie-[^\\]*"|sed 's/.reviews.great-movie-//'|sort|uniq|while read x;do y=$(echo $x|sed 's/-/+/g');echo $x;curl -s --compressed -HUser-Agent: https://www.amazon.com/s/?k=$y 2>/dev/null|grep -m1 -C4 a-link-normal.a-text-bold;sleep 87;done|sed '/^[^< ]/s/.*/@&,/;1s|.*|<base href=https://www.amazon.com />&|;s/ *//;/^$/d;/^[@<]/!s|$|</a>|;1s/@//;s/@/<br>/'
------
dvt
Roger Ebert had an unexpected impact on me in my 20s. In my late teens, I
started religiously reading his reviews, and this continued until his death.
I've never really been a "movie buff," but Ebert's witty prose and pointed
technical critique reminded me of Scalia (whom I also loved reading). Thank
you for putting this list together!
~~~
Mediterraneo10
The tragedy of Roger Ebert is that, although he had a vast knowledge of great
cinema, he established a niche where he was expected to mainly write about
ephemeral popular films. His time was mostly spent on Hollywood blockbusters
and popcorn, and he was appearing in media where he could not go into any
great depth due to space limitations, or because that would be a turnoff for
his mass audience.
So, only in a few Ebert productions like his "Great Movies" books can one get
a sense of the films that really mattered to the man and to art. Compare this
to a critic like Richard Brody, who in his career has been fortunate to focus
entirely on art cinema (though of course Brody’s net worth is probably an
order of magnitude less than Ebert’s was).
~~~
ctchocula
I've only read a few Ebert reviews, enjoyed them and happened to be looking
for a book to read, so I appreciate the recommendation!
edit: The introduction alone makes the book worth reading:
> Of all the arts, movies are the most powerful aid to empathy, and good ones
> make us into better people. Not many of them are very good.
------
catwind7
Author here.
The list (both on my post + the google sheet) should be correct now - I
underestimated how many different releases of the SAME movie title there are
...
Thanks all for catching the mistakes.
~~~
jchazin
FYI - the "Review URL" links at the bottom don't seem to be working properly.
e.g. for "Moonstruck", the link leads to:
"www.linisnil.com/articles/scraping-roger-ebert-reviews-and-
amazon/www.rogerebert.com/reviews/great-movie-moonstruck-1987"
instead of:
"www.rogerebert.com/reviews/great-movie-moonstruck-1987"
~~~
catwind7
hey thanks for catching that - turns out leaving out the protocol in markdown
causes makes it a relative url. fixed.
------
duxup
I miss Roger Ebert.
I honestly watch fewer films since his death.
Maybe this list will change that.
Also "Spirited Away" is on the list but doesn't seem to be included with
prime.
~~~
vincentmarle
Spirited Away is now on HBO Max if you're looking for it
------
lostgame
I’d like to see this for more services. Amazon Prime has IMHO the worst UI/UX
I have used in a streaming service.
~~~
TechBro8615
Agreed. What’s most annoying is how they deal with geo blocked content. They
don’t tell you it’s blocked until you start watching it. So you browse the
catalog for five minutes, finally find a movie to watch, press play, and then
get an error message.
~~~
glenneroo
Or how they sometimes won't allow you to watch the original English version
because you're not in an English speaking country. Even if your language is
set to English (of which around 1/4 is still not translated). All movie
previews are in native language which necessitates a visit to YT or IMDB. Even
non-prime content is affected, just recently I paid 2.99 to watch some cheesy
90s movie with my friend who had always wanted to see this "classic". The
syncing was abysmal and resolution 480p i.e. 720x480 i.e. DVD.
After we were done, I noticed there were a handful of HD torrents in various
languages. Reminded me immediately of Gabe Newell's thoughts on pirating
games: "Piracy is almost always a service problem and not a pricing problem".
------
Curnee
Self-promotion: A number of years ago I made a little website which links you
to a random review written by Roger Ebert. It isn't the cleanest of
implementations, but it did what I needed it to do when I built it.
[http://randomebert.com/](http://randomebert.com/)
------
alexilliamson
Side note: one excellent film that Roger Ebert didn't review is Life Itself,
the documentary about his life that came out right after he died. It's full of
joy and heartbreaking at times, but it really solidified his place of most
universally relatable movie critic in my mind.
~~~
catwind7
thank you for this. We will be checking this out!
------
Alex3917
FWIW the link for "The Bicycle Thief" (1949) links to "The Bicycle" (2015).
Great list though. It would be interesting to see the thing done for the AFI
and BFI top 100. (Although I suspect that most movies on the AFI are probably
already on Ebert's list.)
------
intellijdd
I was just seeing someone else's tutorial on scraping Amazon prices. They also
ran into an issue where they needed to scrape twice instead of once. Not sure
that it's the same issue you're facing but I thought I might drop my two
cents.
~~~
catwind7
I actually did notice that issue, even with using a stateful client like
mechanize. Sometimes I had to scrape > 5 times in order to get through the
"anti robot" page.
Other times, I get no issue at all. It's weird - maybe they're doing some
pattern matching on request metadata on their end?
------
trimbo
"The Man Who Shot Liberty Valance"
IMO, John Ford's best movie, hands down.
Unfortunately, it is not actually available on Prime without "CBS All Access"
[Edit: ah, I see that this is not just "Included with prime", but all movies]
~~~
dmix
Prime just recently introduced channels, which dramatically increased the
amount of content available, but each is $3.99. I personally love this because
I’d rather have the option to subscribe to Smithsonian content or MGMs back
catalog using the same streaming service I already use, rather than paying to
use 10 different or getting stuck using the small list of (mostly old, TV
movie, or B movie) content on just prime or Netflix.
So this is a feature, not a bug. Mostly because I’ve accepted how backwards
the movie industry is going to be with copyright. But still having the option
is the less evil.
That said, Maybe the UI can make this more obvious?
~~~
wolco
First time surprised me. I can see it being useful when you have the channel.
Or as a separate tab when you want to possible add a channel.
It kinda taints the other content. You ask internal.. Is it really available
without subscribing? to channels you have access to. Then you finally click
and they have season 1 and 3 and 5 of some show. Terrible UI. Feels like you
get so much less than you do.
With netflix it feels like you could just fall into a series immediately.
------
bogomipz
Although it's not listed in this post because it's a rental. I feel like it
deserves a mention nonetheless. "Beyond the Valley of the Dolls" is a 1960s
cult classic. It was directed by Russ Meyer and written by Roger Ebert.
There's a link to it on Roger's site as well as available to stream from
Amazon for cheap:
[https://www.rogerebert.com/reviews/beyond-the-valley-of-
the-...](https://www.rogerebert.com/reviews/beyond-the-valley-of-the-
dolls-1980)
------
cottager
When you said you were faking a proper agent with `requests`, do you mean you
were setting the headers to look like a browser, as in here?:
[https://stackoverflow.com/questions/27652543/how-to-use-
pyth...](https://stackoverflow.com/questions/27652543/how-to-use-python-
requests-to-fake-a-browser-visit)
That was going to be my suggestion for how to get around the anti-robot
responses.
~~~
x3blah
No agent at all is required. I got past the anti-robot response using no user-
agent header and a simple delay.
------
youngamerican
Reading Ebert's Great Movies site was hugely formative for me. I also love
that he's low-key one of the best writers about addiction and recovery. Side
note: A colleague who worked at the Sun-Times when Ebert also did recently
told me about how whenever management threatened cuts, he'd come into the
newsroom to throw his weight around against it. Even when he was getting to be
in ill health. Much respect.
------
DarknessFalls
I think this is referring to his list of "Movies You Must See Before You Die".
On that note, I should mention "Gates of Heaven", which is part of that list.
A compelling documentary on animal cemeteries, by Errol Morris.
[https://www.rogerebert.com/reviews/great-movie-gates-of-
heav...](https://www.rogerebert.com/reviews/great-movie-gates-of-heaven-1978)
------
chillee
Self-promotion (of sorts), but I (with some friends) have been watching lots
of movies and keeping globally ordered rankings on github here:
[https://github.com/chillee/movierankings](https://github.com/chillee/movierankings)
I find globally ordered rankings of movies to be an interesting exercise of
consistency.
------
samteeeee
Folks interested in this topic might like my new side-project: get an email
when your favorite director releases a new movie -
[https://directoralerts.website](https://directoralerts.website)
------
ngcc_hk
Minor instruction to make it work for me:
pip3 install BeautifulSoup pip3 install mechanize mkdir data
Guess you can check data directory but not sure about the pip3, python does
not like R I am not sure and can it pip3 install when not exist ....
------
boomboomsubban
Only three movies in the past fourty years, non past 87, is surprising. Is
Prime that full of older content or did Ebert's recommendations just stop
coming from major studios?
~~~
zucker42
Using [https://www.rogerebert.com/great-
movies](https://www.rogerebert.com/great-movies) you can filter by date
~~~
boomboomsubban
Thanks, but that doesn't explain why Prime doesn't have any released after 87.
~~~
ThePadawan
I'm having a hard time coming up with the data to confirm this theory but
1986/1987 seems to me to be the peak of both VHS sales and the bottom of VCR
prices.
I assume from that many studios had to come up with their first licensing
schemes for movies "for home use" (contrary to movie theater and broadcast
use), which could potentially still apply to (and restrict) streaming.
Once again, this is my personal hypothesis (and I'd be happy to see some data
to support or contradict it).
~~~
boomboomsubban
1988 was the year of the Writers Guild strike, so while your exacts may be
mistaken you're probably right that the licensing scheme is involved.
------
NicoJuicy
I cancelled my Amazon prime subscription, because of the ridiculous things
they did in France.
And following the dark pattern path to unsubscribe. I'm happy that I did it.
Fyi, I'm from Belgium
~~~
jrib
I didn't hear about this. Can you give a quick summary of what actions Amazon
took in France that you are referring to?
------
s1artibartfast
Useful information but the results look like garbage in Chrome and IE. The
multi-line titles all run together and would greatly benefit from a table
outline.
~~~
adamzegelin
Safari too. I just discovered that modern user agents don't include table
borders by default in their stylesheets -- at least, choosing Develop ->
Disable Styles didn't make the table borders appear.
I'm having flashbacks to the chiseled borders of Netscape.
------
xtiansimon
Are these free on Amazon or is this just an advertisement for Amazon Prime (or
does everyone have a subscription but me?)
~~~
catwind7
Not an advertisement for amazon prime :) These are free with prime, not free
for non-subscribers
I'm actually going to be cancelling my prime membership, which is another
reason I wanted to see what I could watch for "free".
------
exhilaration
If the author reads this, the link in the Google sheet to the Battle of
Algiers goes to Algiers, a totally different movie.
~~~
catwind7
i'm fixing this list ... just realized a few bugs in the code. _sigh_
------
gittes
Don't mean to undermine this guy's screen-scraping adventure... but if you
want to use something that will tell you all the streaming services that have
the list of movies, you can use:
[https://letterboxd.com/dvideostor/list/roger-eberts-great-
mo...](https://letterboxd.com/dvideostor/list/roger-eberts-great-movies/)
You can look at each movie to see what streaming service it's on one at a time
for free.
If you have a pro paid account, you can even do:
[https://letterboxd.com/dvideostor/list/roger-eberts-great-
mo...](https://letterboxd.com/dvideostor/list/roger-eberts-great-
movies/on/amazon-prime-us/)
Which shows that there are 39 movies in Amazon Prime US from Ebert's "Great
Movies," not 21 like this guy's spreadsheet says.
To be fair, the exercise was to scrape the reference sources... so it might
just need some refinement.
Need to double check though if both lists are correct, only confirmed number
totals.
__Full disclosure: That letterboxd list is not mine, I just found it __
~~~
js2
FWIW, I screen scraped rogerebert.com and copied all of his ratings and an
excerpt of every review to letterboxd:
[https://letterboxd.com/re2/](https://letterboxd.com/re2/)
Just the great movies:
[https://letterboxd.com/re2/tag/great-
movie/films/by/release-...](https://letterboxd.com/re2/tag/great-
movie/films/by/release-earliest/)
You can then filter those by streaming service, but you need a pro account.
Looks like 38 movies:
[https://letterboxd.com/re2/tag/great-
movie/films/on/amazon-p...](https://letterboxd.com/re2/tag/great-
movie/films/on/amazon-prime-us/by/release-earliest/)
[https://ibb.co/KFSj9jg](https://ibb.co/KFSj9jg)
Apparently I missed the Buster Keaton movies:
[https://www.rogerebert.com/reviews/great-movie-the-films-
of-...](https://www.rogerebert.com/reviews/great-movie-the-films-of-buster-
keaton)
[https://letterboxd.com/director/buster-
keaton/](https://letterboxd.com/director/buster-keaton/)
But that means 39 isn't quite right either since Ebert is saying all of Buster
Keaton's films are great.
Anyway, the scraping was easy. The harder problem was parsing the html reviews
(even with BeautifulSoup, the html is a mess), and then matching the reviews
on Ebert's site to the correct movie, which I did via queries to tmdb and a
lot of heuristics. There's nearly 8000 reviews and many have wrong years, bad
titles, etc on rogerebert.com. It was a fun spare time project for a couple
weeks.
~~~
gittes
Nice! Yeah, I wish letterboxd was free somehow without ads and they made their
beta api public.
Yeah, I bet there's not a great standard for normalization/corrections of
tiles, making a distinction of like when a movie was made and when a movie was
released and translations and imports.
Good work.
~~~
js2
I ended up using the director and cast that are listed for most reviews on
Ebert's site for matching the right movie. Even that required some tricks due
to spelling errors or differences in how names were listed. I then flagged any
matches that weren't unique or where the title wasn't similar enough for me to
manually review. I think I only had to double-check about a hundred or so.
I didn't use the letterboxd api. Instead, I generated csv files for the
letterboxd importer. I then did a csv export from their site I could reconcile
to look for import errors.
Trivia: Ebert reviewed a few adult films which I couldn't import to letterboxd
because the site officially doesn't allow those.
BTW, it's only $19/year for an account. I have my own account I pay for which
follows the re2 account. That way I can easily see any of the re2 reviews for
movies in my own watchlist.
~~~
gittes
Yep, I caved and got an account last month too
------
cm2187
A weekend project idea for geeks like me who like films, but have the feeling
to have already watched everything. I find that imdb ratings have a high (but
not 1.0) correlation with me liking the movie (provided I like the genre). You
can still download from imdb flat files that contain all movies, ratings, as
well as cast/directors/producers/writers. Stick that in a database, with a
basic UI to hide movies you have already watched. And you can make a good
personal recommandation engine for movies you didn’t suspect exist. The power
of this approach is that imdb is pretty much an exhaustive catalog.
~~~
jraedisch
I tend to like movies/shows on Rotten Tomatoes, where the critics like the
movie less than the other users, e.g. The Orville
[https://www.rottentomatoes.com/tv/orville](https://www.rottentomatoes.com/tv/orville)
P.S.: And audience score should roughly be above 70.
~~~
kspacewalk2
I completely agree with this. Whenever critics' and users' assessments of a
movie or a TV show diverge, it is almost universally the critics who end up
being wrong (in my subjective view).
They sometimes over-rate things people in their position cannot be seen
disliking because it's about Societal Importance or some such thing that has
little to do with actual quality. And conversely, they sometimes ignore or
under-rate things because they cannot be seen to overly praise a work that's
criticised for things having little or nothing to do with actual quality.
Thing is, I don't need to be culturally influenced, have my outdated views
updated to match what's currently considered mainstream, my privilege checked,
etc. I just want to watch a good fucking movie and decide for myself whether
it contains a message that changes my mind on a topic.
For example, critics and users disagree on The Shape of Water[0] (users are
right, it's very mediocre). They also disagree on Green Book[1] (users are
right again, it's a great film even if it doesn't tick all the wokeness and
political correctness checkboxes).
[0] [https://www.metacritic.com/movie/the-shape-of-
water](https://www.metacritic.com/movie/the-shape-of-water)
[1] [https://www.metacritic.com/movie/green-
book](https://www.metacritic.com/movie/green-book)
~~~
clairity
> "For example, critics and users disagree on The Shape of Water[0] (users are
> right, it's very mediocre). They also disagree on Green Book[1] (users are
> right again, it's a great film even if it doesn't tick all the wokeness and
> political correctness checkboxes)."
no, the _green book_ is awful, a particularly bad example of the feel-good
movie, never once inviting the viewer to get lost in a believable world,
instead inviting the viewer to question every directorial decision made. it
was fake and pretentious at the same time, and completely safe around race
relations.
the _shape of water_ was not perfect, but better. not the best example of
interracial relations (metaphorically), but gentle, revealing, quirky,
ambient, and unpretentious.
------
jamesrcole
On a tangent: I dream of a web where whenever there are sets of items (eg
eberts-great-movies, and movies-on-amazon) you can easily apply set operations
(like intersection) on them (so if ‘n’ stands for ‘intersection’, eg eberts-
great-movies n movies-on-amazon).
So, in effect if you’re on a site that deals with a set of items, like the
amazon prime movies, you can tell the browser to intersect this set with a
different set at another URL.
I understand that doing this would require the right ‘infrastructure’ to be in
place.
~~~
castratikron
I don't know why there's no good way to know what's streaming on a certain
service. Seems like the only way is through third party sites that are
probably made up of people manually adding to the list.
If everyone is going to make their own streaming service then there needs to
be a standard interface to make them collectively easier to use. A "guide", if
you will.
~~~
pjc50
Unfortunately their profit incentive is the opposite: to train you to watch
what they choose to recommend, rather than take a step back and look at what
isn't there. See the hollowing of the Netflix catalog.
| {
"pile_set_name": "HackerNews"
} |
Chief Executive of Social Finance to Step Down - coloneltcb
https://mobile.nytimes.com/2017/09/11/technology/sofi-mike-cagney-sexual-harassment.html?_r=1&referer=
======
throwaway6497
Interesting that branding is not important/creatively skirted when negative
news is involved. Doesn't come as a surprise. Wondering, if this is
intentional. Difficult to imagine that the company is spoon feeding an NY
times reporter the headlines. Always saw SoFi everywhere in ads and branding.
Social Finance on Google doesn't rank SoFi in the top two organic search
results. Wonder why the headline is Social Finance instead of SoFi though
there is mention of SoFi in the article.
~~~
CPLX
Maybe they put that in the headline because that's the name of the company.
Doesn't seem particularly confusing to me.
~~~
greglindahl
The NYT frequently uses full company names, for example they used to refer to
SpaceX as "Space Exploration Technologies", and they still put periods in
places where other journalists won't (I.B.M.).
I wouldn't read anything into it other than the NYT marches to the beat of a
different drummer.
------
djchung23
Yikes. Culture starts from the person at the top and flows down.
Curious to see how and if the cultural narrative within Silicon Valley
companies will change one year from now after all that's happened. Will there
actually be meaningful change? I don't know, but I'm hoping so.
~~~
lefstathiou
I was chatting in bed with my lady about this last night and we hit on a few
negative potential outcomes and concerns:
Companies and their investors are going to look for ways to prevent these
issues from happening. Part of the solution will rest on coaching, monitoring
and policing (perhaps through employee empowerment etc) the "aggressive"
people (mostly men) in the workplace.
A concern my girlfriend highlighted is that this may increase unconscious bias
in the hiring process, for example:
Will men consider beautiful girls a risk to the workplace? If you have 90%
male employees working in your office and a beautiful girl who is definitely
qualified for the job but for the sake of argument not someone you "have to
have" for this role, are you introducing risk into the workplace by hiring her
knowing that people react stronger to attractive people? Said differently, is
there a possibility that her presence becomes a potential "distraction" in the
office.
Will progressive personalities be considered a risk to the workplace? Beyond
looks to personality types, if you are interviewing a candidate and through
rounds of interviews you discover they actively contribute their spare time
and energy toward socially progressive movements, rallies, campaigns etc, will
they be deemed higher risks as potential work-place agitators?
I never really thought about these things until my gf mentioned them but
apparently she and her girlfriends consider these factors when strategizing
about interviews ("don't look too good, etc").
Another anecdote: we have a handful of couples we're close to whose
girlfriends/wives insist that their CEO boyfriends/husbands never conduct
challenging performance based conversations with female employees without a
witness present. This was consistent with my girlfriend's experience in
banking where she found that her senior managers were comfortable having
performance reviews 1-1 (which in theory facilitates more candid dialogue and
deeper relationships) whereas all the girls had multiple managers present
reviews. On the margin, does this disadvantage women? I don't know but my gf
seemed to think so.
~~~
neo4sure
"Companies and their investors are going to look for ways to prevent these
issues from happening. Part of the solution will rest on coaching, monitoring
and policing (perhaps through employee empowerment etc) the "aggressive"
people (mostly men) in the workplace."
Just be a good person... It's really easy. I don't know why a guy would need
coaching on basic decency.
~~~
cflewis
Yeah, this is classic victim blaming. "Oh, she looked too pretty, I couldn't
help myself from touching her ass."
How about not hiring assholes in the first place? If they have to be coached
to not have issues with women, then they aren't worth your time.
------
mgkimsal
Maybe he was busy having "inappropriate relations" with the people who should
have been "reviewing" my paperwork?
Tried to use them years ago and... turnaround time took _weeks_. Their web
interface just kept telling me they were "reviewing" then "need more info"
without any concrete info as to what was needed. Emails took days to get a
reply to.
Tried to use them again last year - same horrible turnaround/response time
(days/weeks).
I was able to use another institution and have my financial stuff handled and
done in less time than it took them to even clarify why the exact same info
other financial agents were fine with wasn't good enough (and, they never
did).
They followed up about 4 months later to ask if I still needed service.
------
SoFiThrowaway
The internal messaging is the same as external: "buisness is strong, we
continue to execute as we did, looking for a new ceo".
However, if you read between the lines, it sounds like the board might have
been looking for an excuse to oust Mike, who preferred high risk ventures and
expansions, and replace him with someone experienced in bringing companies to
an IPO. It seems like this is an attempt to kill two birds with one stone, in
terms of bad press.
------
blizkreeg
“I believe now is the right time for SoFi to start the search for a new
leader,” Mr. Cagney said in a statement.
What's with these cowardly statements? Admit your mistakes, say you're no
longer the right leader, and that's why you're stepping down.
| {
"pile_set_name": "HackerNews"
} |
Analytics at GitHub - janerik
http://johnnunemaker.com/analytics-at-github/
======
phunge
Jay Kreps speaks the truth. His talk "Building LinkedIn's Real-time Data
Pipeline" is along the same lines as the Log blogpost mentioned here and is
also extremely informative.
------
fuziontech
Fantastic read. Concise and solid decision explanations. Thanks for writing!
Was there any other reason you chose kestrel over alternatives like kafka? Did
you test any others, or where you just that satisfied with kestrel?
~~~
jnunemaker
We chose kestrel mostly just from usage/familiarity. We've been satisfied with
it, but are currently researching/testing kafka.
~~~
nextplaylist
Are you guys using either of them elsewhere or just for analytics?
~~~
technoweenie
We use Kestrel for our internal hooks delivery system also (based on
jnunemaker's suggestion).
------
khaledh
Very good article. It aligns with our envisioned architecture for our next-gen
analytics platform.
So far our decision is to keep the raw events in Cassandra, and pre-aggregate
most data for fast reads. Just wondering about your decision to not store raw
events in Cassandra, and use raw files for that, and using Cassandra only for
storing Hadoop analysis results. Do you think this decision may affect you
later if you ever decide to support real-time analytics?
------
nicklovescode
As an aside, do you have any info on the visual software used to run the
charts? I'm guessing d3 is there somewhere., but maybe not. I've struggled to
find a beautiful charting library and yours are beautiful!
~~~
calavera
we use d3 for all our charts.
~~~
nicklovescode
any chance of you guys open-sourcing them?
~~~
Caged
Most of our graphs are pretty stock d3 code tailored for specific datasets, so
I don't see much value in open sourcing them. Is there anything in particular
you're interested in?
~~~
jrpt
There's a need for a good charting library built on top of d3. Kind of like
Highcharts, in terms of usability, but free. d3 is powerful but not as easy to
use and customize as Highcharts.
~~~
middleman90
Can I suggest [http://www.sibdo.com](http://www.sibdo.com) For individuals
it's free and built on top of d3 with some extra functionality that Higcharts
does't have. You can even drag files directly onto to the visualizations and
the data will render. Also really nice UI for mobile.
~~~
sheff
Looking at the Sibdo pricing page, it looks like much higher pricing (compared
to the more established competitors) at $95 a month for use on a SINGLE
website with a confusing limitation to "50 users" whatever that means.
Not only that, the example graphs and charts look very basic.
~~~
middleman90
Good feedback thanks
It would be interesting to know what you mean by basic as we're a start-up and
would appreciate any feedback.
------
nickstinemates
> For any business, the process of collecting data, measuring performance,
> making changes, and reviewing if those changes were successful is really
> important.
This applies for any sort of goal/process/?, whether programmatic or personal.
Very cool story, I'm looking forward to additional features. We pull a _lot_
of data about Docker from GitHub that could be more readily available. We'd be
more than happy to discuss or beta any new features, if you're interested.
------
alexatkeplar
Nice to see lots of parallels to how we have architected things at Snowplow
(trackers -> collectors -> enrich -> storage -> analytics)
| {
"pile_set_name": "HackerNews"
} |
Pinterest, We Have a Problem - CMartucci
http://whatblag.com/2012/03/07/pinterest-we-have-a-problem/
======
OneBytePerGreen
Pinterest has a market valuation of > 200 million dollars...
30%+ of its images are flickr images...
... 99%+ of which are "All Rights Reserved".
How many
... page views,
... new subscribers,
... and $$$
have the most-pinned flickr images generated for pinterest, with the author
not seeing a single cent... not even having the satisfaction of seeing their
popularity on pinterest reflect in their flickr stats?
And: Pinterest does not even have the decency to display the author name and
license info next to the image.
Pinterest's business model is flawed; it is based on systematic violation of
copyright. At some point, someone will start a class-action lawsuit and invite
flickr photographers whose works got "pinned" to sign up, to reclaim part of
that >$200 million pie.
In fact, this seems like a valid startup idea to me: Create a one-page website
explaining to flickr users what has been going on. Do a systematic reverse
image search to find out which authors have been affected and invite them to
join. Arrange with an interested lawfirm to get a % of their fee in exchange
for delivering the list of potential plaintiffs.
~~~
js2
Recently, I wanted to make some picture postcards of various locations around
the US for personal use, so I went looking for images. I found many on Flickr.
I wanted to compensate the original photographer. There is no easy way to do
this.
At best, some photographs have a "request to license" link that bounces you to
a third party (typically Getty Images) which offers to "Review the photo to
determine if it's a good fit for licensing through us; Contact the
photographer; Handle the details like releases and pricing" and takes "between
two and seven days to arrange licensing." with prices typically around $100
for usable resolution for a postcard.
At worst, you have to sign in to Yahoo so that you can send the photographer a
message about wanting to use their photo. You may or may not get a reply, and
you have to arrange how to pay the photographer, if at all.
This may make sense for images which are to be used in a commercial context,
but for personal use like how I wanted to use the images, it's way too
expensive and much too much friction.
The vast majority of images will never be used commercially. There should be
an easier way to remunerate the photographer, and at more reasonable prices. A
"Pix Store" if you will. Maybe that's what the stock photo sites are supposed
to be, but they don't have nearly the inventory.
Sorry for the tangent.
~~~
Terretta
"This may make sense for images which are to be used in a commercial context,
but for personal use like how I wanted to use the images, it's way too
expensive and much too much friction."
That's why Flickr lets you search for Creative Commons images, for which the
photographer gives you that personal use permission in advance.
~~~
js2
There are shades of a grey between commercial use and free use which are
unaddressed.
~~~
Terretta
You think so? I license photos through Creative Commons, and differently
depending on the shades of personal to commercial I consider inherent in the
potential market for a photo.
I find it covers all the shades of commerciality I've considered. Meanwhile,
for a purely commercial photographer, the getty images option is there, and
those won't come up in the Creative Commons search unless licensed
appropriately.
The CC search tool on Flickr is a fantastic tool for finding photos of the
exact "shade" of use you're looking for.
~~~
js2
CC photos are all free for non-commercial use, correct? What if you'd like to
be compensated, but not at rates that justify the overhead of Getty Images?
Many of the images I found were not CC licensed, nor did they have a Getty
Images option. Those are the images I'm referring to.
e.g., go search Flickr for "drawdy falls". No results in Getty, no results in
the Commons, but a handful of images from photographers that are retaining
full copyright, but have't posted contact info. Maybe they don't want
compensation and just failed to select CC when they posted. Who knows.
Regardless, many of the images I found were in this middle ground. I'm not
trying to sound entitled here, just pointing out that there's lots of images
that sadly cannot be used.
------
jfarmer
I have one direct comment and one meta-comment about the issue of Pinteret and
copyright.
First, I see no issue with their Terms of Service. That language is 100%
cover-your-ass boilerplate, and any site that allows people to upload content
will have a similar clause in their ToS. Facebook, YouTube, SoundCloud, etc.
all do.
See, e.g., section 6.C of YouTube's ToS:
[http://www.youtube.com/static?gl=US&template=terms](http://www.youtube.com/static?gl=US&template=terms)
If you find people are sharing your copyrighted material on Pinterest you
should file a DMCA claim with them. That's how the mechanism is designed to
work, for better or worse.
Second, when you react viscerally to what Pinterest is doing or enabling,
think carefully about your opinion of YouTube. With respect to content, is
there a substantive difference between these early days of Pinterest and the
early days of YouTube?
The MPAA is probably saying, "See? You don't like it when it happens to you,
either."
~~~
antiterra
The indemnification clause is definitely 100% boilerplate and used in most any
site that allows user-generated content. Facebook contains it near verbatim in
item 15.2 of their terms. The license grant is a bit different, since Facebook
allows you to terminate the license, though under particular conditions.
The significant issue here is the idea that the intended primary use for
Pinterest may infringe on the rights of others. This is what took down
Napster, and, to me, indemnifying Pintereist is too risky at this point.
It's my understanding that Pinterest is attempting to move to licensed and
sponsored pins and they haven't annoyed any large industry groups and might
even fare better legally than YouTube did. Who knows.
~~~
jfarmer
Yes, they're definitely playing with fire, and they'll have to address it soon
given the rate they're growing.
But the outrage, _outrage_ , OUTRAGE at Pinterest over this clause here just
tells me people are ignorant of (1) what this clause really means and (2) how
many times they've agreed to it in the past.
It's 100% nerdrage in my opinion, and a month from now nobody will be talking
about it.
~~~
ktizo
I cannot see how you can have (in reality, not legally) agreed to a clause
without first knowing about it.
~~~
jfarmer
Much of it is a conceit, yes, and I'm not qualified to comment on the legal
precedents surrounding such licenses.
I'm sure Pinterest makes you check a box saying you agree to the Terms of Use
before they let you create an account.
Whether that's sufficient is up to a court to decide, and an attorney could
tell you the likelihood of a successful suit given a specific fact pattern.
I'm not an attorney, though.
As I said below, people -- engineers, especially -- get caught up in
contractual technicalities. The fundamental question is: do you trust
Pinterest to do right by you?
Flickr has a similar clause that every photographer who has uploaded their
photos has agreed to, but they do right by their users and so nobody believes
one day Flickr is going to undo all that work. It would alienate their
customers.
If you think Pinterest is untrustworthy, why do you think some text on a
screen that _they wrote themselves_ is going to impact their behavior one way
or another?
~~~
jacobolus
Actually, Flickr’s TOS (now a general Yahoo one) is quite different. They make
it clear that their rights are limited to the specific uses obvious and
essential to the function of their sites:
> _Yahoo! does not claim ownership of Content you submit or make available for
> inclusion on the Yahoo! Services. However, with respect to Content you
> submit or make available for inclusion on publicly accessible areas of the
> Yahoo! Services, you grant Yahoo! the following worldwide, royalty-free and
> non-exclusive license(s), as applicable:_
> _With respect to photos, graphics, audio or video you submit or make
> available for inclusion on publicly accessible areas of the Yahoo! Services
> other than Yahoo! Groups, the license to use, distribute, reproduce, modify,
> adapt, publicly perform and publicly display such Content on the Yahoo!
> Services solely for the purpose for which such Content was submitted or made
> available. This license exists only for as long as you elect to continue to
> include such Content on the Yahoo! Services and will terminate at the time
> you remove or Yahoo! removes such Content from the Yahoo! Services._
The key here is “solely for the purpose for which such Content was submitted
or made available.” Pinterest’s ToS doesn’t have such language.
Additionally, Yahoo’s ToS doesn’t indemnify Yahoo against all possible
liability or force their legal bills w/r/t copyright claims &c. onto users.
The relevant language is much more constrained:
> _You agree that Yahoo! has no responsibility or liability for the deletion
> or failure to store any messages and other communications or other Content
> maintained or transmitted by the Yahoo! Services. You acknowledge that
> Yahoo! reserves the right to log off accounts that are inactive for an
> extended period of time._
~~~
afiske
Although Yahoo is definitely more constrained then Pinterest in terms of their
license language, they actually do have a similar indemnity clause:
"You agree to indemnify and hold Yahoo! and its subsidiaries, affiliates,
officers, agents, employees, partners and licensors harmless from any claim or
demand, including reasonable attorneys' fees, made by any third party due to
or arising out of Content you submit, post, transmit, modify or otherwise make
available through the Yahoo! Services, your use of the Yahoo! Services, your
connection to the Yahoo! Services, your violation of the TOS, or your
violation of any rights of another."
------
yuvadam
Oh please, not again.
Absolutely any and every product you use has ridiculous Terms of Service.
These documents are drafted up by lawyers. Their job is not to please the end
users who care to read through the legalese. Their job is to create a document
that will protect the product vendor in court, if and when the time comes.
Lets put an end to finding eccentricities in ToSs/EULAs, it's getting kind of
redundant. If this is some sort of game to see who can find the most absurd
clauses in these documents, we're all losing.
~~~
Terretta
For "content" creators, these are not absurdities, these are terms that can
make or break your ability to get paid for your work and put food on the
table.
A photographer having to go to court to defend his ownership of photos they'd
exhibited through twitpic and get paid by newspapers who claimed the ToS said
he'd released his rights, demonstrates this is not a "please not again"
problem, this is ongoing, big corps are misusing these at the expense of
individual artists, and the problem's getting worse.
Every day I talk to artists who have no idea that posting their latest music
video to a video sharing site could give that company performance rights in
other media, or, as in this case, that pinning their own photos to Pinterest
would let Pinterest publish a "Best Pins of 2012" book w/o compensating the
artist.
This needs to be called out and both consumers and creators deserve to be
informed.
~~~
pork
Let me rephrase GP's comment, since I felt the same thing as them. Allow me to
set out a hypothetical.
You find that Pinterest's terms are awful, and stage a very successful revolt
with your own site, sans the offensive terms. Users flock to your site, and
Pinterest dies a sad death. One of the copyright owners of your "pinned"
content decides to go after you, and decides to sue the pants off you. So you
freak out and hire a top-notch lawyer, who will draft a new set of terms for
your users to shield you from the liability you now realize you have.
Repeat, iterate, and before you know it -- your top-notch lawyer guarantees
that you will face no more expensive liability, but you now have the onerous
terms set out in practically all sites that allow user-generated content.
Basically, these terms allow you to bump the liability from yourself to the
user who uploaded it (because they have pinned the pictures in bad faith, in
violation of your terms, etc.)
So there's really no point railing against the terms -- they aren't going
away, and the best you can hope for is very minor modifications of wording
with sufficient popular pressure. Good luck on that.
~~~
alxp
This post we're discussing _is_ the popular pressure. And yes, I also wish
them good luck because the pendulum is currently far too in the direction
against fairness to end-users.
~~~
growingconcern
Exactly. Saying that this is just the way it is is ludicrous. They could under
sufficient pressure change the wording so that they aren't assuming ownership
or unlimited use and that it is something more akin to fair use.
------
chrisacky
There was a similar HN post/Google+ post last week. I can't remember where I
read it.
Something along the lines of an avid lawyer decided to kill her account
because she read the ToS and drew exactly the same conclusions as what you had
just wrote.
While it's quite easy to regard this as been a ticking timebomb, a few things
to probably note.
If you are a photographer or someone who holds copyright in a work you would
most likely just issue a DMCA.
Now, lets assume that you aren't content with that. You might argue that you
have incurred losses and want some form of damages. You are first going to
have to contact Pinterest to get the information of the user who has listed
this said work. Are Pinterest goijng to give up this information so willingly?
Probably not...
~~~
cbs
>You are first going to have to contact Pinterest to get the information of
the user who has listed this said work. Are Pinterest goijng to give up this
information so willingly? Probably not...
IIRC, in this case you sue John Doe and have the court compel Pinterest to
identify him.
~~~
pavel_lishin
Does pinterest require identifying information in order to register?
~~~
girlvinyl
It requires a facebook or twitter login. Plus it should have some kind of IP
log somewhere. Pinterest won't have the entire identity, but this is how
e-discovery works. You keep sending subpoenas up the hierarchy until you get
to the ISP. The ISP provides the subscriber information.
------
zaroth
Speaking of the DMCA Safe Harbor...
Images on Pinterest, in some cases, were not even uploaded from a user's hard
drive; they were pulled in via a the 'Pin It' button
(<http://pinterest.com/about/goodies/>)
In this case, Pinterest even acknowledges that the images are not the property
of the user, "When you pin from a website, we automatically grab the source
link so we can credit the original creator."
I'll bet the 'Pin It' button ultimately gets them in hot water, because it's
hard to argue the content is 'user generated' when they know, via their 'Pin
It' code, exactly where the content is actually coming from.
§ 512(c) [DMCA Safe Harbor] also requires that the OSP: 1) not receive a
financial benefit directly attributable to the infringing activity, 2) not be
aware of the presence of infringing material or know any facts or
circumstances that would make infringing material apparent,
I wonder if 'the original source URL' of a image may be construed as a fact
that would make infringing material apparent. IANAL.
~~~
icebraining
_In this case, Pinterest even acknowledges that the images are not the
property of the user, "When you pin from a website, we automatically grab the
source link so we can credit the original creator."_
And that's fine - their ToS says you need to be either the copyright holder
_or_ have consent from the copyright holder. For example, if I "pin" a CC
licensed image, I have such consent.
~~~
waitwhat
_their ToS says you need to be either the copyright holder or have consent
from the copyright holder._
I've seen warez sites with exactly the same disclaimer. It didn't work for
them either.
~~~
icebraining
But Youtube, Flickr, DeviantArt and thousands of other user submitted content
sites are still online.
~~~
antiterra
As far as I know there is no industry group for still-image photographers
anything like the MPAA or RIAA. All three of those sites are and were filled
with substantial original content, so they can claim that illegal use is not
their primary drive. I don't know if Pinterest can successfully argue the same
thing.
It also should be noted that YouTube spent a _great_ deal of money on
settlements and arrangements with RIAA & MPAA members, content networks and
others to survive.
~~~
jlujan
"As far as I know there is no industry group for still-image photographers
anything like the MPAA or RIAA."
The American Society of Media Photographers, Graphic Artists Guild, the
Picture Archive Council of America, the North American Nature Photography
Association, Professional Photographers of America. They do not have the deep
pockets or political clout of MPAA or RIAA but they are large industry groups.
I think someone else mentioned a class action suite against Google for
copyright infringement by photographers. The lawsuit started with scanning and
displaying images from the Google Library Project but includes infringement
claims for images.google.com, etc.
<http://asmp.org/articles/asmp-qa-google-class-action.html>
------
Alex3917
So you're claiming that pinterest should pay your legal bills for you? That's
ridiculous. If you upload a photo that's copyrighted by someone else and get
sued, why should pinterest foot the bill for that? There is no way the service
would ever be viable under those conditions, because it would create an
enormous moral hazard.
~~~
why-el
There is no moral hazard when they are claiming the right to sell material
that might be copyrighted.
~~~
Alex3917
That isn't an issue because you are co-assigning your copyright to them,
assuming you own the copyright. And if you don't own the copyright then it's
not a valid contract, so it doesn't matter. It's not like you're legally able
to sign away someone else's copyright. Which is exactly why the indemnity
clause is there, to prevent pinterest from being responsible if people are
dumb enough to do that.
------
otterley
I am an attorney (and as far as I can tell, the author is not one, so take his
"analysis" with a pillar of salt). This is not legal advice though.
With respect to the following paragraph:
"So, if you snap an awesome photograph, upload it to your blog, and someone
pins it, that person is either (1) claiming exclusive ownership of it; or (2)
giving Pinterest your consent to reproduce it (and you just thought you were
being flattered)."
Actually, no. You can't transfer a right you don't have. All rights to a work
are vested in the author of a protected work; only the author can consent to
any of the activities protected by copyright.
It's just like selling a house you don't own. First, you're committing fraud
if you falsely represent that you have the right to sell it; and second, the
actual owner isn't bound by anything you have done (the deed doesn't go to the
putative buyer).
~~~
1point2
And there in lies the problem with TOS (or is the problem with the law?) if
one needs to be an attorney to understand them, what hope is there for the
ordinary folk - just saying. No wonder people just click through.
------
edwinnathaniel
Watermark the pictures in your blog?
By the way, I found out that you can watermark all of your images that you're
about to upload to Picasa Web via Picasa Desktop (there's an option to do that
before you Sync to Web). I found that feature very useful if you organize your
pictures using Picasa (and show them on your blog).
~~~
freehunter
Problem is, copyright is implied on the part of the creator. It does not need
to be applied for, nor is there any _requirement_ for a copyright notice.
Just because you didn't watermark your image doesn't mean the copyright now
belongs to Pintrest (or imgur, or Google+, or Facebook, etc) because people
who didn't hold the copyright and didn't have the standing to give it away
posted it.
~~~
icebraining
And that's why you can send a DMCA takedown request and they'll have to take
it down. I fail to see the problem here.
------
mtgentry
'The “pin” button remains inactive until the user types something. Anything.
Might this count as “criticizing” or “commenting”?'
Interesting. I'd like to see a court case further define what constitutes a
"comment" on the web. Other sites do this too, for example Buzzfeed.com's
entire business model is based on taking content from bloggers and then
hosting it on their own site, without providing any kind of insightful comment
_.
_[http://www.buzzfeed.com/mjs538/if-both-of-angelinas-legs-
wer...](http://www.buzzfeed.com/mjs538/if-both-of-angelinas-legs-were-showing)
~~~
anothermachine
"commenting" is only one aspect of fair use, and it generally is interpreted
to mean "copying a small snippet as an example" or "reproducing a low-
resolution copy for reference" to provide context.
Another aspect of fair use is "not depriving the owner of their own commercial
use of the work".
------
zaroth
If I'm a copyright holder who feels like my work is being misappropriated by
Pinterest, I'm going to sue Pinterest, not the user. Their Terms of Service
won't stop them from getting sued, and the indemnity clause won't magically
make money appear in their pockets to pay for their defense. If they decide to
start suing their users for recovery, that would be pretty amusing.
"I trusted the person who gave me the image" is not a legal defense for
copyright infringement. Their only chance is to stay within the DMCA safe
harbor or else they will eventually be shut down.
~~~
wpietri
As my lawyer explained to me long ago, who eventually "wins" a lawsuit is
rarely interesting. Cost, time, and agony to get there are much more relevant
factors.
The "our users represent that the content is theirs" may not keep Pinterest
from losing an eventual lawsuit, but it does complicate things enough that it
discourages legal action. That may be sufficient for them to cash out long
before the suits are complete.
Or, like YouTube, things like that may allow them to grow big enough that they
end up with sufficient negotiating power that they can get away with quite a
bit, and possibly reshape what's considered reasonable.
------
npsimons
I think many are dismissing this as "standard TOS/EULA legalese" and missing
the point. Let's consider a scenario: let's say you post some photos online,
and license them under the CC-By-SA license
(<http://creativecommons.org/licenses/by-sa/3.0/>). Then someone pins the
photos you took to Pinterest. Next, Pinterest sells the photos you took, then
catches someone copying or modifying the photos you took and sues them for
copyright. To top it all off, Pinterest doesn't even give you attribution.
This is _exactly_ the sort of thing that CC and GPL were created to combat:
ruining someone's life through the legal system based on abuse of the
copyright system. You want to sue someone over copyright violations of
information you have copyright on? Fine. You want to sell something licensed
under CC-By-SA? Fine. But you better be ready to comply to the license and
allow whoever you give those works to the right to copy, sell and modify those
works. I highly doubt Pinterest is prepared for this, and their TOS _is_
overreaching.
------
maqr
Maybe all the buzz about Pinterest is because so many people think that
finding an image online makes it publicly redistributable. "Pinning" is just
another way of sharing.
I get the impression that there's much wider public acceptance of sharing
(pirating?) pictures than music, movies, or software. I don't have a good
answer as to why this might be, but I'd be curious what HN thinks.
~~~
elithrar
> I get the impression that there's much wider public acceptance of sharing
> (pirating?) pictures than music, movies, or software. I don't have a good
> answer as to why this might be, but I'd be curious what HN thinks.
Anecdotally, it's because photographs and images are seen as "easier to
reproduce" (whether this is true or not is another matter), and therefore
possibly easier to justify by those doing the sharing.
That, and there's far less friction to sharing photos/images than video and
software.
~~~
eurleif
Perhaps it's also that photos seem less valuable than songs or movies, since
pretty much anyone can take a decent photo? (Decent by the person's own
standards, at least; maybe not by a professional photographer's.)
------
brador
Could this argument also apply to sites like Readability? Since it removes
advertising (hence income for the writers) from articles.
~~~
viraptor
I don't think so, unless readability grants itself rights to reproduce and
sell every article that passes through its engine. Does it?
~~~
icebraining
Maybe not sell, but they it'd be impossible for Readability to work without
reproducing the articles.
------
fotoblur
Pinterest and Tumblr are by far the worse offenders when it comes to sharing
content from other providers as its not 100% clear, or sometimes elusive, on
how visitor can view the original content. Its as if these sites are cutting
content providers out of the loop which is like throwing out the baby with the
bathwater. They are essentially going to injure the entire ecosystem of
sharing if they keep up with these practices
([http://www.sv411.com/index.php/2012/02/pinterest-gets-
caught...](http://www.sv411.com/index.php/2012/02/pinterest-gets-caught-
changing-user-links-for-extra-income/)).
What's worse is that these shady sharing practices have begun to support a
broader ecosystem of image finding scavengers such as
<http://www.whattopin.com> (see below).
Here is a support ticket we received today at Fotoblur which illustrates the
problems we are seeing (a bit of broken English but you get the picture):
" _I am user
the[http://www.fotoblur.com/portfolio/agnieszkabalut?p=1&id=...](http://www.fotoblur.com/portfolio/agnieszkabalut?p=1&id=370425)
Another user Elinka used my photo art- senza titolo2 by Agnieszka Balut.......
(via Elinka) in the web-site
<http://www.whattopin.com/topic/photography/?id=283634> \- Printerest
(commercial use)
and in the [http://elinka.tumblr.com/post/18734723798/senza-
titolo2-by-a...](http://elinka.tumblr.com/post/18734723798/senza-titolo2-by-
agnieszka-balut) without my permission.
All my images are protected by Copyright (reproduction and printing). All
images on these are the exclusive property of Agnieszka Balut and protected by
the Copyright . Therefore prohibited the publication and reproduction without
written permission from Agnieszka Balut. Any violation will be prosecuted._"
As you can see, this type of sharing confuses people. We usually explain "fair
use" to them but they really don't care. They feel they have rights and they
want action taken. I can fully understand why Flickr blocked Pinterest if they
have been getting the complaints such as we've seen. In the end the burden
falls on the image owner and what ends up happening is they have to chase down
every site owner whose members improperly post their content. They then lose
faith in participating at all because of their inability to control their
content.
------
veverkap
Didn't Pinterest address this to a certain degree? At least from the content
creators - <http://blog.pinterest.com/post/17949261591/growing-up> says that
you can add a meta tag marking your content as not pinnable.
~~~
FireBeyond
"To a certain degree"... Not so much...
So I, as a Content Creator, have to a) be mindful of, and b) take action to
opt out of 1) Pinterest, 2) any other of a potentially large number of sites /
applications, purely in order to ensure said sites don't claim commercial
rights to and derive income from my work and effort?
Not the way it works, or should work, say I.
~~~
icebraining
You can send a DMCA takedown request if you see that someone is misusing your
content. What exactly do you propose? Eliminate any website with user
submitted content? I mean, what if someone posts a work to Hacker News without
permission, should YCombinator be held liable?
------
mikeknoop
So here is a thought. I presume the article is mostly critical of the terms
based on comments here. But consider a service without any "ownership" terms,
etc. Two scenarios:
1\. When a user "pins" an image elsewhere online, the image is downloaded by
Pinterest to their server. When other users browse Pinterest, it is served
directly by Pinterest's servers.
2\. When a user "pins" an image elsewhere online, the image URL is saved by
Pinterest to their server. When other users browse Pinterest, they are
downloading the image directly from the original source.
Scenario (1) I see legal issues with. But scenario (2)? Isn't Pinterest simply
providing a link (ala a search engine)? Moreover, isn't this just how the
internet works?
Surely this has come up before yet I am having trouble finding a similar case.
------
EGreg
This is the problem with importing PUBLIC CONTENT YOU FIND ON THE INTERNET
into a website. Not uploading from your computer, or importing from your own
account somewhere on another site. If the website actually makes a copy of the
media (picture, etc.) and stores it on their servers, they should hope that
the DMCA still considers them a safe harbor.
I think their best bet is to store the images only as a cache, and not as a
permanent import. If the site owner decides to take down the original, then
the cache should disappear soon thereafter.
------
danboarder
Pinterest is more like a visual social bookmarking service than a blog. When
people save bookmarks or share links on delicious or reddit or even twitter,
of course they don't claim ownership of that content, it's just a bookmark.
Similarly, with Pintrest people are saving a visual bookmark of something they
saw that was interesting out on the web or on other social streams, tumblr,
etc. I think a lot of people are missing the point here.
------
xn
If posting an image with a comment is fair use, then arguably the combination
of the image and the comment constitute the Member Content for which the
poster is claiming ownership.
If I publish a review of a work of art, including a reproduction of the work,
in a magazine, my copyright would cover the entire article including the
reproduction. I wouldn't be claiming copyright on the original work.
~~~
ajross
That's pretty much how I see it too. Yes, you own the review, which includes
the right to the image _for the fair use purposes of explaining the review
only_. There is no transitive right if you sell that review to use the image
for any other purpose.
I too find this insane. If anything qualifies for fair use, surely pinterest
does. "Hey look at this cool thing!" is about as close as I can imagine to the
platonic ideal of discussing a copyrighted work.
No one freaked out over /r/pics, so what's the deal here? I hesitate to point
out that pinterest differs mostly in the gender demographics of the user base,
but... yeah.
~~~
dangrossman
> No one freaked out over /r/pics,
/r/pics is just a collection of links to images; it does not reproduce or
redistribute the images.
~~~
ajross
Right, but that's the same sort of legalese excuse-making (or alternatively:
just substitute imgur, which hosts most of that content).
It has nothing to do with whether or not /r/pics constitutes fair use, just
if-it-isn't-fair-use-who-gets-sued? No one, at the time or now, seriously
thought that there was a legal problem for anyone with reddit. So why
pinterest? Again, part of me is really suspicious that it's because it's a
chick site that doesn't cater to geeks.
------
villagefool
Funny thing is that Pinterest in their terms of service are asking people to
follow rules they are breaking for other services...
------
treelovinhippie
I was under the assumption that all social-based sites/companies follow the
same policy, not so they can resell user content, but so they can eventually
go through an acquisition without facing a class action lawsuit from its users
who would demand a % of the sale. e.g. Geocities.
------
JBiserkov
<http://500px.com/terms>
I prefer the old ones though
[http://web.archive.org/web/20110619022738/http://500px.com/t...](http://web.archive.org/web/20110619022738/http://500px.com/terms)
------
yonasb
One phrase comes to mind after reading this: "so what." It's not about what
the terms say, it's about how they're enforced. I don't see any users getting
sued, just a bunch of stories on how you could potentially get sued.
------
kfcm
Just opening the door for business casual G-men [video]:
[http://www.southparkstudios.com/clips/382781/business-
casual...](http://www.southparkstudios.com/clips/382781/business-casual-g-men)
------
cmiles74
Pinterest is caching these images on their servers, not their customers who
are only pasting in links. I find it hard to believe that these end-users will
be held liable for an implementation detail on Pinterest's end. And linking, I
believe is legal.
These are images that are publicly available on the internet and have been
made available, in most cases, by the owner. Is there really a case that
copying these images off the internet is illegal?
~~~
ceol
It's not an issue of copying images off the Internet. It's an issue with
_redistributing_ it, which Pinterest does. Just because an image is on the
Internet does not mean it's up for grabs to whoever gets it.
------
billpatrianakos
What we have here is manufactured outrage. Total non-story. I hope others
don't start piling on now that this has been written.
The real deal is that Pinterest is screwed either way. These terms sound scary
but so long as they are enforced sanely there should be no problem. What do
you expect them to do? Assume liability for users posting content they should
not be posting? They might as well not exist. A lot of startups these days may
as well not even try to get traction as long as bloggers keep getting their
panties in a twist over every TOS they see.
Pinterest provides a service for free that people seem to love. So long as no
one is paying them and they haven't gone public they're damn smart to have
these terms. If I ran Pinterest I wouldn't want to assume liability for some
asshole who leaks a top secret photo on my site that I let him use for free
and as long as I'm giving that service for free I'm going to make some cash
out of my users. This is nowhere near evil. It's business. If someone doesn't
like it they don't have to use it.
Question: How do you get over writer's block? Answer: Start reading some terms
of service or privacy policy docs from any popular online startup and
manufacture some outrage over it. Truth is, if you read any TOS or privacy
policy you're going to find something you can turn into a big deal most of the
time. I've had it with the TOS/privacy policy outrage blogs.
~~~
seldo
I agree completely, but there's a double-standard here. What if instead of
(mostly) photographs pinterest was mostly video? Then it would be YouTube, and
everyone is pretty clear that you shouldn't upload a video to YouTube if you
don't own it. Of course, some people flout that rule, but I figure the
majority of content on YouTube is genuinely owned by the people who post it,
while I very much doubt this is the case on Pinterest.
So which is it? Is it bad that Pinterest is mostly "stolen" content, or bad
that we're not allowed to post similarly "stolen" content on YouTube? The
former implies that Pinterest should start cracking down on people who post
content they don't own; the latter implies that YouTube should stop doing so
(and therefore, copyright law should change).
~~~
kapkapkap
_> but I figure the majority of content on YouTube is genuinely owned by the
people who post it, while I very much doubt this is the case on Pinterest._
That assumption seems fairly inaccurate, see this quote: "Remarkably, more
than one-third of the two billion views of YouTube videos with ads each week
are ... uploaded without the copyright owner’s permission but left up by the
owner’s choice." [1]
[1] <http://www.nytimes.com/2010/09/03/technology/03youtube.html>
~~~
jtheory
Didn't read the article, but as far as I can see that doesn't disprove his
assumption.
The NYT quote is talking just about the videos with ads, and then only
discussing them in terms of views (not in terms of percentages of actual
content uploaded, which is something like 24+ hours of content every minute).
------
aiscott
I'm an amateur photographer, and I wasn't too concerned about this until I
read that by Pinning something, their TOS says I am granting them rights to
sell my work.
I don't like that very much.
By making available any Member Content through the Site,
Application or Services, you hereby grant to Cold Brew Labs
a worldwide, irrevocable, perpetual, non-exclusive,
transferable, royalty-free license, with the right to
sublicense, to use, copy, adapt, modify, distribute, license,
sell, transfer, publicly display, publicly perform,
transmit, stream, broadcast, access, view, and otherwise
exploit such Member Content only on, through or by means of
the Site, Application or Services.
The rest just seems like standard CYA stuff.
~~~
jfarmer
Again, this is 100% boilerplate. YouTube, Reddit, Facebook, etc. will all have
similar clauses.
See for example section 6.C in YouTube's ToS.
[http://www.youtube.com/static?gl=US&template=terms](http://www.youtube.com/static?gl=US&template=terms)
Why? Because without this blanket waiver it opens them up to all kinds of
legal issues since a core mechanic of their site is re-pinning.
If you upload a photo to their site and someone else re-pins it, did that
person just violate your copyright?
If Pinterest implements a "most popular pins" page and features one of your
photos on that page, did they just violate your copyright?
Yes, you can come up with legalese for each potential scenario, but it really
does complicate things. It's easier for them to just have a blanket clause and
act in good faith, than open themselves up to the possibility of accidentally
using someone's work in a way their ToS didn't whitelist.
~~~
adamc
Saying it's boilerplate doesn't make it right. It's scammy.
~~~
icebraining
What do you propose instead?
~~~
glimcat
Be explicit about what forms of (re)distribution are allowed instead of going
for a blanket license. Where appropriate, also be explicit about what is not
allowed.
It shouldn't say much more than "you give us the right to use your content to
fulfill the services you ask us to provide, and you have the right to remove
your content at any time."
~~~
adamc
I like that answer, because it is clear and doesn't seem like a sneaky over-
reach.
------
rjurney
I am SO fucking sick of douchebag angst driven attacks by sniveling failure-
driven wannabees on legalese in terms of service that are essential to make
any and every successful consumer Internet site, application or platform work.
If you don't like it, don't use it. Go back to the pre-social web with your
mom and grandmother. If you are going to criticize it or upvote it, think for
a moment about the reasoning behind it. Yesterday Path. Today Pinterest. Let's
hope someone else makes something great for you to kick in the teeth tomorrow.
Shut the fuck up already.
~~~
angryasian
don't know why im responding to obvious troll. but they are really no better
than megaupload at this point. Redistributing copy righted material without
permission. Its a far bigger legal matter.
| {
"pile_set_name": "HackerNews"
} |
The Real Pirates Of Silicon Valley? - nickfrost
http://techcrunch.com/2011/11/10/the-real-pirates-of-silicon-valley/
======
Swizec
As a foreigner wanting to come to Silicon Valley some day I feel this ship
doesn't solve any of my problems.
There is no need for physical proximity, at least not in the slave kind as is
offered here, the only reason I want to physically move to the US is the
ability to get off my computer at any time and meet cool people for coffee or
whatever.
Being stuck on a ship solves that problem no better than being on a different
continent.
~~~
steelaz
He mentioned business visit (B-1) visa, which is much easier to get. Also, if
you live in one of 35 countries that participate in Visa Waiver Program, you
don't even need a visa for a short term visit.
<http://travel.state.gov/visa/temp/types/types_1262.html#2>
~~~
Swizec
Sure, but I'm on a freaking boat! This hardly facilitates a quick coffee meet
for an hour after lunch.
~~~
Kavan
You we will sleep on the boat and commute into work.
Being from the UK you get 90 days in the US, then you need to do a visa run
out of the country and can then come back. I think as long as you are being
paid by an non US business immigration don't mind.
Perhaps instead of a trip to Mexico or Canada a night on the boat would
suffice?
------
rmc
_The sea platform was its own country called Sealand, with its own passports,
currency, etc_
That's a bit of a stretch. Sealand never really was any sort of
internationally recognised country that seriously printed its own money or
anything that serious.
------
kokey
As a foreigner outside of the US, I like this idea. There are many of us who
are already strong earners but don't have anywhere near the million dollars
required for an entrepreneur visa. In other words we probably can afford to
sustain a nice ship. Getting a visa to visit the US is pretty easy, and
staying on the US mainland and attending meetings, conferences, etc. are
practical. We're just not allowed to work there.
------
pellias
Will this work ? As mentioned, its in international waters outside the
jurisdiction of the United States. Any gangster or real pirates can just board
their ship and wreak havoc ?
They'll need security staff to protect the ship then ?
~~~
knowtheory
I would have a more pressing concern. If this ship is outside US waters and
jurisdiction, under whose law and authority would they operate?
What's stopping them from just stealing all your startup secrets? Forming rape
squads? Ransoming you for your all of your family's worth?
How are disputes settled? Do they just throw people overboard?
Sure there are workable systems which would lead to some predictability in a
culture/situation like this, but that doesn't and probably can't guarantee
equitability and/or fairness. Sure the US government doesn't provide either
equitability or fairness, but they do try their hardest to provide stability.
You can count on the stupid shit that is going to go wrong to go wrong, and
there is often recourse when someone does you wrong.
I don't see how you could guarantee things won't go tits up in these bizarre
libertarian "paradises" a la bioshock (well, okay, minus the splicers).
~~~
wisty
tldr: They have to fly a flag, and follow the laws of whatever country's flag
they are flying.
Under The United Nations Convention on the Law of the Sea, they would be in a
US Exclusive Economic Zone - between 12 and 200 nautical miles of the coast,
so no fishing or mining without US permission. As it's not Territorial waters
(up to 12 nautical miles), US law will not apply, but there are international
laws against Piracy in the High Seas which do. Of course, that only protects
you from people who come from another boat.
As for what happens _on_ the boat, it's governed by the laws of the country
that they choose to be registered under. Let's say Panama. But they still have
to follow some legal system. Panama law is based on Spanish traditions, and is
probably acceptable.
------
buro9
If a person has trouble getting a US work visa, wouldn't that person also have
trouble freely travelling in and out of the USA?
In which case, how do they get to the seastead? It seems that they would need
a ferry, but does that ferry port have passport facilities and act as an
international port? And if you're on the seastead for a long period of time
and US access required a visa, how do you now renew that visa seeing that you
couldn't land in the US without it and there is no US Embassy on the seastead?
Or more plainly... what problem is this solving for whom? It doesn't seem to
solve the problem for anyone who is unable to get into the USA without a visa.
~~~
vidarh
I'm Norwegian, and live in the UK. I can travel to the US on the visa waiver
program for up to 90 days at the time. At one point I worked for a US company
for three years, and travelled into the US for meetings every 6-8 weeks. A
couple of additional questions because of the huge number of stamps from SFO
in short timeframe was all the hassle I ever got on entry.
Yet getting a work visa was still hard enough that we gave up trying.
~~~
buro9
That makes sense, thanks for sharing.
------
jholman
Wow, awesome claim in the third graf:
_"one can imagine how similar ships could provide low cost healthcare all
around the world by operating out in the open waters free from the various
laws that restrict the ability for inexpensive medical treatments through
competitive pricing"_
So, if I read correctly, this is asserting that medicine is so over-regulated
an industry, in developed countries 'all around the world', and so anti-
competitive, that the introduction of unregulated competitive for-profit
hospital ships would lower prices (for market-rate users)? Despite the
obviously higher costs of running a hospital on a ship, vs running it on land,
from a strictly logistical standpoint?
I guess it's conceivable. I admit I do hear these rumours about U.S. medicine
and malpractice insurance, and also that the U.S. spends more on healthcare
than civilized nations while still getting lower quality of care (all rumours
for which I have no citations). But the weird part there is that, according to
those rumours, the countries that outperform the U.S. all have more
regulation, not less, so that doesn't fit. Also, medical tourism is a real
thing, so maybe the same market forces could be exploited on a hospital ship.
But then again maybe not, because I'd guess that some of those market forces
include doctors and lab techs who (relative to the U.S.) have really cheap
living expenses.
Anyway. On the one hand, on the face of it, I find the idea that hospital
ships could lower prices laughable. On the other hand, maybe I should keep an
open mind.
------
dandv
I really wish the media included links to the FAQs for both Blueseed and
Seasteading.
<http://blueseed.co/faq.html>
[http://www.seasteading.org/about-seasteading/frequently-
aske...](http://www.seasteading.org/about-seasteading/frequently-asked-
questions)
------
EponymousCoward
Charles Symoni (sp, I know) used to float the Intentional Programming team
around on his yacht for weeks at a time. I think it was mainly to increase
productivity though.
------
sskates
Hopefully this can also act as a signal to the federal government about how
costly the lack of immigration reform is. I certainly hope we see a real
solution sooner rather than later.
| {
"pile_set_name": "HackerNews"
} |
Did the CEO of Reddit Pierce Section 230 of the Communications Decency Act? - mbgaxyz
http://associatesmind.com/2016/11/24/did-the-ceo-of-reddit-pierce-section-230/
======
mbgaxyz
Summary:
> Reddit CEO Steve Huffman has confessed to modifying the posts of some users
> on the most visible Donald Trump-supporting “subreddit” community after they
> repeatedly slung verbal abuse in his direction…
> By editing users’ comments to reflect something other than their original
> intent, Huffman changed himself and Reddit from being an “interactive
> computer service” to an “information content provider.” i.e. If Huffman or
> Reddit are sued, they cannot claim Section 230 immunity from a lawsuit.
> In legal terms, Huffman has exposed Reddit to liability.
> That the CEO of a media company so flagrantly violated the integrity of the
> copyright of its users is insane. It represents a complete lack of
> understanding of the ethical, moral, and legal duties he has to his
> customers and his shareholders. Huffman has potentially exposed Reddit to
> legal liability through his actions. By any account, it’s a breach of his
> fiduciary duty to shareholders.
EFF:
[https://www.eff.org/issues/bloggers/legal/liability/230](https://www.eff.org/issues/bloggers/legal/liability/230)
> Section 230 says that "No provider or user of an interactive computer
> service shall be treated as the publisher or speaker of any information
> provided by another information content provider."
> However, you may still be held responsible for information you provide in
> commentary or through editing. For example, if you edit the statement, "Fred
> is not a criminal" to remove the word "not," a court might find that you
> have sufficiently contributed to the content to take it as your own.
> Likewise, if you link to an article, but provide a defamatory comment with
> the link, you may not qualify for the immunity.
| {
"pile_set_name": "HackerNews"
} |
Why usability is still a competitive differentiator - nithyad
http://teamblog.supportbee.com/2011/03/18/why-usability-is-still-a-competitive-differentiator/
======
tokenadult
Usability (in the sense of a product not frustrating the user's intentions)
will always be key to getting good word-of-mouth advertising. Friends don't
tell their friends to buy frustrating products or services. When I first
started using Google for Web searching, way back before Google's IPO, I told
all my friends about it, because it got me better results than the other
search engines of the time.
After edit: And the reason I knew about Google way back then is that I checked
my server logs for my personal website, and noticed a new search engine spider
coming by to visit. As I began using Google, I discovered its usability, and
soon began telling everyone I knew, tech-oriented or not, about it. That's
viral marketing at its best.
------
cantastoria
It can be a differentiator but it's a hard one to sell. Telling someone your
software is easier to use will usually be met with an eye roll or a snarky "of
course you think it's easier to use, it's your software...". Ease-of-use needs
to be either demo'd or experienced during a trial period. The question is how
do you get a potential user to that point?
Further, you'll notice very few companies that make highly usable products
advertise them that way. Look at an Apple ad or Netflix or Toyota. Very rarely
do they ever talk about ease-of-use. They always focus on what the product can
do and how it makes you feel.
~~~
jpallen
What you say is true if you restrict the term usability to just mean user
interface design, but usability can go far beyond that. Usability should be
about how your product solves a problem, not just how its options and menus
are laid out. As soon as you hear about how Dropbox works you know instantly
that it's far more usable than other sync options.
~~~
alsomike
It sounds like you're talking about usefulness, not usability. In HCI/UX
circles, the classic catchphrase is "useful, usable, desirable."
------
Stormbringer
From the article:
_"Businesses can’t make their products usable by just painting a thick coat
of usability over their already functioning complex applications. "_
I don't know about you, but I can think of more than a few products where
layering on a thick coat of usability might not solve all their problems, but
it would be a jolly good start.
------
yannickmahe
It will also become a differentiator in that services that don't have good
usability will become ostracised.
I remember when Wifi was becoming mainstream in Estonia's capital Talinn.
Coffeeshop owners started providing Wifi, not because it brought customers,
but because not having it pushed customers away.
| {
"pile_set_name": "HackerNews"
} |
Audio: Robby Russell on zsh and the bash vs. zsh debate - adamstac
http://thechangelog.com/episode-0-6-1-oh-my-zsh-with-robby-russell/?t=0h12m58s
======
adamstac
This is an old podcast, but the content is not stale one bit.
This is also one of our top podcasts (<http://thechangelog.com/podcast/>), so
I thought I'd share this here to get the Hacker community back into this topic
and hear the details from the maker of Oh my zsh.
| {
"pile_set_name": "HackerNews"
} |
US Gov Requests Feedback on Open Access – ACM Gets it Wrong (Again) - drallison
http://www.realtimerendering.com/blog/us-gov-requests-feedback-on-open-access-acm-gets-it-wrong-again/
======
lutorm
What a golden quote:
"How would U.S. voters react to a Senator claiming that a given piece of
legislation (say, one reducing restrictions on campaign financing) “strikes a
fundamental balance between the needs of the Senate and those of the United
States of America”?
In my minds eye, I saw Joe Lieberman giving a press conference: "The health-
care bill now strikes an appropriate balance between the interests of Joe
Lieberman and those of the United States of America".
~~~
Kadin
Well, that actually seems more reasonable than the ACM situation. I _expect_
Lieberman, as an individual, to have interests that are not the same as his
constituents'. (He may be derelict in his duty as a Senator if he puts his own
interests above those of his constituents, but that's a discussion for another
day.) But there's no reasonable expectation, in my mind, that Lieberman's
interests as an individual and my interests as a voter are going to be the
same.
Likewise, I wouldn't expect the interests of one of the ACM's directors -- as
individuals -- to be the same as the ACM's membership. (I'd want them to set
aside their personal interests while acting in their official capacity within
the organization, but that's different from saying that their personal
interests don't exist.) But I would expect the ACM _as an organization_ to
reflect the interests of the membership.
When an organization that supposedly exists for the benefit of its membership
starts doing things that are almost certainly out of line with the best
interests of the membership, it's a good sign that the organization has been
subverted and is being used for some other purpose (e.g. simple self-
perpetuation).
------
djcapelis
I just left the following comment on the OSTP blog: (We submitted an NSF
proposal yesterday, so this is particularly well-timed.)
As a graduate student and researcher in Computer Science I would welcome the
application of NIH’s open publication policy to NSF funded research as well. I
just helped submit an NSF proposal and would welcome such guidelines on our
research. We already follow them for the most part, and it would help us
ensure that conferences and publishers won’t object to the dissemination of
the results of our research if it’s not just our own desire, but an obligation
from our funding agency.
I would also appreciate if you look into the feasibility of establishing open
data and open source requirements for the CISE division of NSF where funded
projects would be obligated provide data generated as part of the research
(this isn’t always reasonable, so some care will be necessary in formulating
this policy) as well as source code used. Right now, especially in computer
science, it’s extremely difficult to replicate the results of experiments and
often we find that researchers have to invest time in reverse engineering
someone’s experiment simply to be able to compare the results one research got
with the results of another or their own work. In addition, university
technology transfer departments sometimes get in the way of researchers who
try and open up their work. Making this a firm requirement from the funding
agency provides the researchers with the credibility and leverage they need to
ensure technology transfer departments stop interfering with dissemination
efforts.
It’s rare someone ever asks for a requirement, but in this case I think
extending these types of requirements to NSF programs will give us the power
and leverage we need to overcome the obstacles in the way of disseminating our
work in the fashion we’d like to be doing anyways.
------
smutticus
Article is spot on.
This makes me want to cancel my ACM membership. Which I only got in the first
place so that I could get access to their digital library of published papers.
------
waterlesscloud
I'm sure they're worried about a membership drop, but you really would think
that the ACM of all people would understand that false scarcity is not a
business model for information-based organizations in today's world.
------
blasdel
The ACM have always been a bucket of dicks -- their Digital Library index
pages dominate Google search results but have no content.
They used to have some intentionally confusing text like "Please login with
your free ACM Web Account to see the full text". Sure the account itself is
free, but the subscriptions required to see anything ain't. All that happened
is that I get spammed by them regularly with _Join ACM today and receive a 15%
discount plus an ACM Free World Clock Calculator!_
A desk calculator! I don't see how they could be more out of touch.
------
codeodor
As much as I'd like to see open access to ACM and other journals, I wonder how
much it would benefit anyone? Surely almost everyone doing that work has a
subscription. If not an outright membership, at least the University library
will get them the articles.
------
heresy
Screw ACM, glad I ignored all their spamming to get me to renew my membership.
Never again.
------
Daishiman
Good thing my ACM membership has just expired.
| {
"pile_set_name": "HackerNews"
} |
The Fay Programming Language: Compile Haskell to JavaScript - djohnsonm
http://fay-lang.org/
A proper subset of Haskell that compiles to JavaScript.
======
drostie
While I appreciate that they moved the site out to a dedicated URL, this is a
duplicate of yesterday's HN submission:
<https://news.ycombinator.com/item?id=4276625>
People may appreciate the comments there.
~~~
chrisdone
Indeed, the old URL 301 redirects to this one. Noticed a spike in traffic from
HN and came to see the cause. I see it's at the bottom already, voting-based-
moderation works. :-)
------
flyhighplato
Amazing stuff. This may finally give me an excuse to learn Haskell.
I have some concerns, though. I'm no JS expert, but it seems to me the
resulting code is a bit difficult to read. The good thing about CoffeeScript
is that the code that comes out is more or less like what you put in.
| {
"pile_set_name": "HackerNews"
} |
Coronavirus: Kodak pivots itself to become strategic drug maker - onetimemanytime
https://www.bbc.com/news/business-53563601
======
ggm
Kodak always was in the chemistry business. Drugs are chemistry.
Kodak is why we have 35mm and 70mm movie film: it's the production cycle sizes
they could make when acetate was invented as a chemistry flow process.
Ten minute reels and the crank rate for film, and lenses all stem from
production limits to technology when Kodak and a small number of like
companies made the photographic world.
~~~
onetimemanytime
what an amazing brand Kodak is /was. Worldwide and a few decades back, their
name was everywhere.
I posted this to also show that USA is finally waking up and doing essential
meds in house. Can't ask China to ship penicillin if we're at war with them.
~~~
ggm
It's not a war
~~~
onetimemanytime
states (should) prepare for every possible contingency. Once war starts, it's
too late. I'm sure USA has a plan to invade Canada somewhere in the shelves.
Here's something
[https://en.wikipedia.org/wiki/War_Plan_Red](https://en.wikipedia.org/wiki/War_Plan_Red)
~~~
ggm
The current president is the only one with any delusion that his populus want
him to invade Canada. What he misunderstands is that they want to "invade" to
get cheap healthcare, and rational (relatively speaking) social order. Its not
lebensraum, its "escape from new york".
That aside, all states plan for war, but health economics and strategic supply
chain risks here don't need war plans to justify them. Self reliance is so
good, it generates surpluses and America could turn from a health problem, to
a health solution for others: in times of strife, your strategic assets help
you AND help everyone else.
| {
"pile_set_name": "HackerNews"
} |
Fixing the 949 problem with Fipes - tOkeshu
http://monkeypatch.me/blog/fixing-the-949-problem-with-fipes.html
======
alexchamberlain
Does `priv` stand for `private`?
<https://github.com/tOkeshu/fipes/tree/master/fipes/priv/ssl>
~~~
tOkeshu
Theses files are examples files. You can find the same in the cowboy_examples
repository[1] (Cowboy is the erlang server I use to build the application).
I should remove these files as the application do not use them.
For your information, there is no https available yet for
<http://fipelines.org> as described in the blog post and the README. You have
been warned ;)
[1]
[https://github.com/extend/cowboy_examples/tree/master/priv/s...](https://github.com/extend/cowboy_examples/tree/master/priv/ssl)
------
alexchamberlain
You should consider using Fountain Codes as an easy way to resume file
downloads and send to multiple downloaders.
~~~
tOkeshu
Yes Fountain Codes are definitively something I have to look at. Improving
bandwidth usage and resuming downloads are part of the next improvements with
https.
For now Erlang have been an excellent fellow to deal with these things :)
| {
"pile_set_name": "HackerNews"
} |
Fake Obama speech is the beginning of the end of video evidence - dctoedt
https://boingboing.net/2017/07/17/fake-obama-speech-is-the-begin.html
======
glbrew
Fortunately this will counteract a total lack of privacy caused by ubiquitous
microscopic drones and cameras. You come forward with a
celebrity/political/ceo sex tape? There is no difference between the "real"
tape and thousands of already synthetic ones; no one could know the
difference. In other words, this technology will return privacy to everyone by
allowing us to all "hide" in plain sight.
------
basicplus2
I dare say deaf people who lip read could pick it, with forewarning I could
see discrepancies.
~~~
girvo
Yeah same. Seems to struggle with sounds that require more vertical shapes, or
closed lips for short periods
------
glbrew
Politicians/business/others will have to cryptographically sign their official
audio/video
------
sixQuarks
I don't know, this doesn't really impress me. It's not that hard to do using
After Effects. Also, they're still using his real voice, if you're going to
fake something like this, you have to have the person say something they never
said.
~~~
propogandist
look into project voco, a feature that was introduced to Adobe Creative
product suite last year or so...you can make anyonr say virtually anything, by
typing in text. This combined with video manipulation can be very effective.
------
dctoedt
The researchers' own Web page:
[https://grail.cs.washington.edu/projects/AudioToObama/](https://grail.cs.washington.edu/projects/AudioToObama/)
| {
"pile_set_name": "HackerNews"
} |
You can now mount SMB/CIFS on ChromeOS - ron0c
https://plus.google.com/u/0/+YoichiroTanaka/posts/55Z5ojCPDQ4
======
c0nsumer
Specifically, SMB/CIFS, not just shares from Samba (a specific implementation
of an SMB/CIFS server).
~~~
ron0c
Yes, you are correct, title changed to reflect this.
------
tedchs
Important note, this is not a feature provided by Google; it is "offered by
www.eisbahn.jp/yoichiro" per Chrome Web store.
------
pgrote
Has anyone gotten it to work? I've tried connecting to shares on Windows 7 and
Windows Server 2008 without luck.
~~~
mbreese
It's been a while since I messed around with SMB/CIFS on Windows servers, but
IIRC you can force the server to downgrade the version of CIFS it will
support. I remember having to adjust a server that needed to support older
clients. Based on the comments from the post, it sounds like this is the
problem.
A quick Googling turned up these:
Information about CIFS dialects:
[http://blogs.technet.com/b/josebda/archive/2012/06/06/window...](http://blogs.technet.com/b/josebda/archive/2012/06/06/windows-
server-2012-which-version-of-the-smb-protocol-smb-1-0-smb-2-0-smb-2-1-or-
smb-3-0-you-are-using-on-your-file-server.aspx)
How to enable/disable specific CIFS versions:
[https://support.microsoft.com/en-
us/kb/2696547](https://support.microsoft.com/en-us/kb/2696547)
------
RodrigoT
why not follow the smbnetfs or fusesmb and create a whole tree for all the
shared discs on the network?
| {
"pile_set_name": "HackerNews"
} |
Ab Initio ETL Tool - breck
http://abinitio-interviews.weebly.com/
======
rubyfan
That might be the most I’ve ever seen written about Ab Initio in public. The
company is notoriously private with documentation and even discussion boards.
~~~
breck
Agreed. I couldn't find much about it. Looks quite smart though (not
surprising, given the founders).
~~~
rubyfan
For the reasons above I’m not a fan. What I’ve seen first hand, you can build
powerful solutions but you can also build powerful solutions with Perl,
python, Hadoop and Spark and I can at least read documentation with those.
| {
"pile_set_name": "HackerNews"
} |
Unorthodox Strategies for Winning (by Jason Shen) - lionhearted
http://www.sebastianmarshall.com/unorthodox-strategies-for-winning
======
chegra
I love seeing this, HN members teaming up. Let me add some strategies:
"Dog Strategy" - Use timing to win. Certain times of the day or month or year
goals are easily accomplished and obstacles easier to overcome, use those
times to your advantage. For instance on HN, certain times of the week it is
easier to get a post on front page.
"Leopard Strategy" - The leopard strategy stresses taking actions based on
your strengths and directing this action at your opponent’s weaknesses(Differs
from aiming at your opponents weakness, in that you use your strength to
target their weakness). For instance, in selecting your major choose something
you are good at(strength), and when choosing modules, choose lecturers with a
reputation for high class average(weakness).
These were taken from: <http://en.wikipedia.org/wiki/Six_Secret_Teachings>
~~~
lionhearted
> I love seeing this, HN members teaming up.
I feel really lucky here - Jason reached out to me to do this, and I think I
got one of his best concepts and executed work. I almost feel a little guilty
here that such an excellent concept/piece is on my site instead of his own.
> <http://en.wikipedia.org/wiki/Six_Secret_Teachings>
Thanks, I hadn't seen these before. Good stuff.
As a sidenote, I generally make myself available to anyone I have common
interests with, as I do with pretty much all of this community. I've connected
with a lot of people, but I'm always surprised more people don't take me up on
my offers. Just today I talked out with a few people about various business
things, in particular with one guy who is having trouble with a business
partner's work rates. Turns out, I happen to know the answer to that (assign a
market rate dollar value to every task, pay all those tasks before
distributing what's left in profits as founder's dividends, let a person
choose to do the tasks they're assigned for the pay or outsource it if not...
set up correctly in a profitable business, this lets people work different
amounts without friction) - anyways, in 20 minutes we covered a lot of ground,
and I think chatting it over it'll help him.
So, yes, once again I'm available via email and all sorts of other ways, for
whatever people need. Quite a lot of people take me up on this, but I'm
surprised more don't. No downside, plenty of upside and all... anyways, feel
free to drop a line if I can be of service in some way.
~~~
jasonshen
Not to turn this into too much of a lovefest but it's been an honor to post on
Seb's site. It's amazing how much you can learn from a guy just by reading the
things he posts online. Glad my post made the cut quality-wise.
Win-win collaboration for sure. And yes, he is definitely a helpful positive
guy - so reach out!
------
Stora_Kuken
I lost by reading this.
| {
"pile_set_name": "HackerNews"
} |
GitHub Hires Former Bitnami Co-Founder Erica Brescia as COO - CrankyBear
https://techcrunch.com/2019/06/11/github-hires-former-bitnami-co-founder-erica-brescia-as-coo/
======
dmor
Erica is an incredible founder who worked on Bitnami/Bitrock for 14 years. I’m
lucky enough to have invested in her at Demo Day, have her as my partner at
XFactor Ventures and as my friend. She is going to be phenomenal in this role,
she is so deserving of this win and Microsoft is very lucky!
------
throwawaythat1
Didn't bitnami get acquired less than a month ago? How come the co-founder
moves out so quickly? Was it an acqui-hire? Atleast
[https://blog.bitnami.com/2019/05/vmware-to-acquire-
bitnami.h...](https://blog.bitnami.com/2019/05/vmware-to-acquire-bitnami.html)
talks about doubling down and what not but the co-founder has moved on
already?
~~~
ztratar
Would you rather be COO of Github, or a VP at VMWare?
~~~
warp_factor
do you imply that it's better to be COO of Github? Because I would disagree
with that.
~~~
skinnymuch
Why do you feel that way?
~~~
warp_factor
VMWare has annual revenue of about 9B$. Github.... 300M$
Github is way more hyped accross engineers but VMWare is 30 times bigger!
VMWare is simply one league above Github.
Github is a Business Departement part of Microsoft. VMWare is a huge company.
This is the typical fallacy of B2C vs B2B. Consumer products are way more
hyped and therefore people think they are way bigger than other less famous
B2B Enterprise products
~~~
ceejayoz
Would you rather eat the world's _largest_ steak, or the world's _best_ steak?
Plus, a VP at VMware isn't going to be in charge of that whole $9B like a COO
is. Bitnami is going to be a "Business Departement" too.
~~~
saalweachter
How big of a steak are we talking here?
------
joewadcan
Erica did a great job building up Bitnami, so I'm pretty pumped to see her +
Nat at the helm of GitHub.
------
ajaurio
VMware acquires Heptio - Kris Nova quits.
VMware acquires Bitnami - Ara Pulido and Erica Brescia quit.
What's wrong with VMware?
~~~
gkoberger
Maybe nothing? Many founders have no desire to stick around for an
acquisition, and VMWare has a lot of competent people who would be eager to
take over.
It's possible that's _why_ they sold to VMWare... they get to walk away rather
than being stuck at a big company for 4 years vesting.
~~~
jessaustin
Yeah VMWare may get a reputation as the firm to call when founders are feeling
restless.
------
pbiggar
Congrats to Erica! Phenomenal executive - looking forward to seeing how she
moves GitHub forward.
------
koolhead17
Lucky Github. Erica is an incredible founder, met her few times in early days
of Bitnami at OSCON, Portland.
------
smudgymcscmudge
The link doesn't work. Probably because of the WordPress issue discussed here
[https://news.ycombinator.com/item?id=20157882](https://news.ycombinator.com/item?id=20157882)
~~~
mastazi
And when it’s back online you will still probably be unable to read due to
intrusive pop-ups, reloading on scroll and other dark patterns in which
Techcrunch excels
| {
"pile_set_name": "HackerNews"
} |
PhoneFactor acquired by Microsoft - marshray
https://www.phonefactor.com/news/microsoft-acquires-phonefactor
======
marshray
We'll be part of the Server and Tools Division, which includes things like
Azure.
Consider me your inside contact. (though I can't go making any promises yet
:-)
| {
"pile_set_name": "HackerNews"
} |
IPhone 3.0 has copy/paste, subscriptions, micropayments, P2P, maps, push, MMS, etc - sama
http://www.engadget.com/2009/03/17/live-from-apples-iphone-os-3-0-preview-event/#continued
======
ryanwaggoner
_"Now as I said before, 3.0 brings a lot of new features for devs, but for
customers as well... starting... with cut, copy, and paste."_
Freaking finally!
~~~
jgfoot
> Q: Why did copy paste take so long?
> A: Scott: It's not that easy. There were security issues.
What does this mean? Could it be that with the iPhone, letting the user
extract his own data from the device and sending it elsewhere is a "security"
issue?
~~~
tptacek
You download a game. You play it once. It sucks. Meanwhile, it has stolen your
mail and phoned it back home to a server in Uzbekistan.
~~~
jonursenbach
What does this have to do with copy and paste?
~~~
cameldrv
If you don't trust the free game you just downloaded, you might not want it to
be able to see what's on the clipboard. Some number of people will copy their
passwords, credit card numbers, etc. If an app phoned home the contents of the
clipboard every time it ran, eventually it would pick up some private
information.
~~~
tptacek
And that's assuming that all the bug gives you is the cut buffer. Who knows
how they were actually led to implement the feature?
------
bemmu
In-app sales will create huge new opportunities.
~~~
wvenable
From the talk: "Would you like to purchase one rocket launcher for $0.99?"
Oh yeah, that sounds like fun. Clearly a great way to be nickle and dimed to
death in every application and game.
~~~
henning
_Clippy resurrects himself from the grave and pops up in the lower right-hand
corner_
It looks like you're trying to copy and paste. Would you like to pay $0.05 in
order to continue? (Continue/Cancel)
It looks like you're trying to exit the application. Would you like to pay
$0.10 in order to continue? (Exit and pay $0.10/Stay for free)
It looks like you're shocked to see one of Microsoft's worst creations pwn
your smartphone. Would you like to buy a copy of iLithium(R), iXanax(TM), or
iProzac(TM) to soften the blow for $14.99? (Yes/No)
~~~
mechanical_fish
I have no idea why this is getting downmodded. _I_ think it's funny. Maybe I'm
just the right age for this joke.
Obviously, this in-app payment feature was _deliberately_ designed to be
irritating and intrusive. Apple understands that, to most paying customers,
the word _micropayment_ carries a connotation of _being slowly and
imperceptibly bled to death by vampires_. So perhaps Apple is going to provide
an API which turns in-app charges into such an ugly, flow-shattering
experience that nobody could possibly miss it -- which will also compel app
designers to avoid using this feature unless they really have to.
~~~
wensing
It's possible to abuse any feature. I can see this being a win-win for apps
that provide layers of value (depth).
------
nanexcool
"So, copy/paste in iPhone 3.0." Applause. Applause for a feature that every
other device in the world has. Odd.
I like the iPhone, but this sums up what I usually feel about Apple products.
~~~
sounddust
Applause because the iPhone went from being the best mobile phone despite
lacking major features, to the best mobile phone which lacks no major
features.
~~~
pietro
Except for video recordings, a decent camera, and built-in TV. Those are
standard features in high-end phones in Europe and Japan.
~~~
pxlpshr
Built-in TV is a joke.
~~~
c3o
Why?
~~~
pxlpshr
Have you ever seen an OTAHD antenna? That's why.
~~~
nailer
N95 has TV in some countries. The phones look like ordinary N95s. So do lots
of Telstra phones in Australia (which have Foxtel content) and KDDI phones in
Japan. They just look like ordinary phones.
~~~
Andys
The Telstra phones stream the Foxtel content digitally over NextG if I'm not
mistaken?
~~~
nailer
Yup, and good point: there's no need for a giant antennae, anything capable of
3G can do it fine.
------
comatose_kid
SDK access to bluetooth? Awesome, I have a client who is dying for this...
------
markessien
Lovely. This was a good platform choice for me to specialize in. I'm going to
start consulting almost exclusively for the iPhone, I think it's a platform
that will be here for a good number of years.
------
pxlpshr
Apple really nailed it with version 3.0, and this is going to be great for us.
I suspect you'll start seeing app acquisitions as companies look to acquire an
'install' base to leverage.
Time to get crankin' on more apps before gold rush 3.0!
~~~
pxlpshr
Actually, hmm.. I wonder how the subscription will work for apps that were
formerly free. I assume users will be able to 'opt-in' for subscription
payment, otherwise the application is deleted.
~~~
GHFigs
In-application payments are not available for free applications.
------
Hexstream
96% of apps are approved? I thought the percentage was much lower. Vocal
minority, I guess.
~~~
jedberg
That doesn't say how many times the app had to be resubmitted before approval.
I'd like to see the rate of _first time_ rejections.
~~~
jshen
A lot of first time rejections are for things like version numbers not
matching. I'm not sure why that stat would be meaningful.
~~~
wizard_2
Well obviously we want to know more about the procedure and why apps get
rejected. We want to know what Apple's "moral" objections are and what values
they're trying to impose. Its more a fear of some agenda (beyond no apps that
don't work or do harm) that we may not agree with then stats.
It also doesn't hurt to know what your chances are to have trouble.
------
ObieJazz
3.0 SDK beta is available today. Can't wait to try it out.
~~~
kylec
Is the new OS just for registered developers? How hard would it be for a non-
developer to obtain and install it?
~~~
ROFISH
It's just the normal $99 developers. Originally the betas were limited to
whoever Apple liked.
------
ivankirigin
30% cut to Apple isn't a micropayment, which I define as tolerating small
amounts without getting killed on overhead. You could just charge their credit
card and get better rates. I wonder if they'll block services like
<http://tipjoy.com> from working on the iphone.
This sounds like an awesome release though.
~~~
auston
I agree. If I wanted to sell an ebook or mp3 or something at a competitive
price it would be impossible!
------
sama
Search mail on the server!
------
jonursenbach
I'm pretty pissed about MMS not being available on the 2G, but at least now
with copy & paste I can finally copy those fucking username/password
combinations that AT&T sends me.
~~~
gamache
If I understand correctly, MMS will be available on all iPhones once they are
updated to iPhone OS 3.0. It was never a hardware issue.
~~~
jonursenbach
Nope.
\---- Engadget ----
11:27AM "What about the rest of us? iPhone OS 3.0 will be available this
Summer. A free update to all of our iPhone 3G customers. And it works on the
original iPhone. Now the hardware has changed between these two devices. For
instance, A2DP and MMS won't be available on the iPhone 1st gen. It's also
available for the iPod touch... for $9.95."
\---- gdgt ----
11:27AM - “As a bonus, we’ve enabled it to work on the original iPhone. The
hardware’s changed though: MMS and A2DP won’t be available on the original
iPhone.” iPod touch users: $10.
11:27AM - App Store will be in 77 countries. 3.0 ships this summer for free.
~~~
generalk
This sounds like bullshit to me: maybe I'm just naive, but I can't for the
life of me figure out how a cell radio could be unable to transmit MMS.
Especially the radio in a phone released after 2002.
------
charlesju
Shouldn't we wait until this conference is done before posting?
~~~
sama
too exciting
------
zhyder
Lots of great updates, but still missing voice-activated dialing, which
-especially with a bluetooth headset- is very useful when driving.
------
quilby
Why does apple not just release new features once they finish working on them?
Why do they have to do these we-got-new-features press conferences and only
release new features on those dates?
~~~
Angostura
Not suprisingly, Apple releases the SDK ahead of the OS release, so that
developers get some lead time. When the SDK is released it also announces the
new features.
------
jhatcom
Can someone tell me why cut and paste is so much in demand? I've been using my
iPhone for months and never once needed it. Are folks editing documents on
their iPhone?
~~~
sounddust
What I need it for the most is when someone sends me the details of a social
event via mail/facebook (location/time/phone number) and I need to SMS it to
my friends. Currently, the only way to do so is to flip back and forth between
the apps and rely on your short term memory.
It's also a pain the other way: When you receive an SMS and you need to
facebook/e-mail/SMS others (although SMS forwarding solves 1/3 of this
problem).
------
pieter
I wonder how the dock accessoires will influence the app review process.. Will
you be required to ship your accessoire to Apple before they can review your
app?
------
jodrellblank
Does the MMS and voice notes support mean you could record a voice message and
'text' it to someone?
Like the best bits of voicemail and SMS combined? Because that would be
brilliant.
~~~
modoc
Yes, it does exactly that!
~~~
dans
Wow. How very revolutionary! You have been able do that with any standard Sony
Ericcson phone, for the last 2-3 years, and probably Nokia, HTC, Samsung too.
My phone has a button that says "reply with voice-message" and then using some
sort of black voodoo it gets sent over mms.
I like it when apple make a new product, strip it of most basic features and
then when they finally add the long missing features... It's like the second
coming of Jesus.
~~~
modoc
I never said it was revolutionary. It's a feature that seems useful, is new to
the iPhone, and will be a free upgrade. As a very happy iPhone owner (and yes
I've had Sony Ericcsons, Motorolas, Nokias, HTCs, etc...) this upcoming
feature (and the others) are something to look forward to.
If Sony Ericcson offered a software upgrade that did over the air sync of all
my MobileMe data, that would be great, and I can't imagine saying "well I've
been able to do that for ages with my iPhone" to a happy Sony Ericcson owner.
Why does it have to be a battle?
------
dustineichler
What was the report on streaming video? if it's what i think it is, this is a
huge win for qik and others.
------
mattmaroon
As a serial app developer (though not yet on that platform) here's what I
heard from Apple's announcement:
crap, crap, crap, IN GAME PAYMENTS!!!, crap, crap, crap.
P.S. background notifications
I guess that list would probably be a little less bland were I an iPhone user.
------
martythemaniak
The app store upgrades look like they might be useful for many devs, but to be
honest it's pretty hard to get excited over features other smartphones have
had for many years.
And of course, users still don't have access to their own data.
------
statictype
Wait - the iPhone didn't have bluetooth before this update right? Which means
it was enabled entirely through a software update. Is that right? I know it
operates on the same frequency as wifi but still, that's pretty impressive,
isn't it?
~~~
allenbrunson
the iphone had bluetooth before this update, but it was very limited in scope.
------
ajju
How good the micropayments feature is depends on what their cut on it is. 30%
off of 10 cents hurts a lot more than 30% off of $10.00
~~~
cubicle67
um... in what way does it hurt more?
~~~
ajju
That was a stupid comment made in haste that makes no sense as written. Paying
apple 30% of repeated micropayments _would_ hurt me more than the alternative,
but it's only true in my context - which is probably not the context Apple
designed their system for.
I am building a web based service which can also be accessed via an iPhone
app. I get paid via micropayments which I aggregate till they reach a certain
dollar amount and then process via a payment processor that charges me in
single digit percentages. I have the option of using iPhone's own micropayment
service but that would hurt me more.
~~~
pieter
The advantage of using the app store micropayments is that users don't have to
create a new account somewhere and put their account info in your app. They
can use an existing system and have a one-click buy option.
It'd be interesting to see what will result in more profits. My guess would be
that the increased sales on the iPhone outweigh the higher profit margin with
the alternatives. This depends on your costs too of course (e.g. copyright
fees for eBooks)
------
phd_student
is iphone 3.0 only for the iphone, or is it supported on the ipod touch too?
~~~
robotron
There is a fee for Touch users to upgrade.
------
tocomment
So you can embed Google maps in your app, but you can't use their maps? Isn't
that kind of worthless?
~~~
peregrine
You can use their maps just not for turn-by-turn. Read the article. :)
------
raptrex
yay for turn by turn apps in the future
~~~
briansmith
It will be interesting to see what happens with the pricing for those apps. On
other phone platforms, they usually cost over $100 _per year_. A very bad
deal, IMO.
~~~
pieter
I came across <http://sygic.com/press/press_12.3.09.html> which says it'll
release its software for the 3G for $79
------
jodrellblank
Soooo ... how long until people pull the SDK apart looking for indications of
a new iphone with new hardware in June?
Software streaming video support, the recent release of an Apple patent on a
front facing camera behind the screen - are we likely to see a videophone
iPhone?
~~~
briansmith
What would a new iPhone be like? Slightly smaller? Better battery life? Better
camera? It would be hard for many people to justify dropping $600+ for just
those features. And, Apple has demonstrated with these major firmware
revisions that they can upgrade the device substantially; I think consumers
will get angry if they start withholding firmware updates as an incentive to
buy more hardware. That is exactly what Nokia does, and I don't think Nokia's
customers are going to take it anymore after seeing what Apple's doing here.
Very soon the typical smartphone lifespan will be close to 5 years and the
average computer lifespan will be close to 10 years. The Nokia N95 was
released in 2006 and there are still tons of people rocking that device. There
will probably be millions of people using the iPhone 3G and the Nokia N97 in
2014 (maybe as hand-me-downs).
~~~
ryanwaggoner
_the average computer lifespan will be close to 10 years_
Is anyone here using a computer they purchased in 1999?
Come on.
~~~
zandorg
I'm using a 2nd-hand Omnibook 6100 which is from 2000-2001. It still works,
and it's pretty powerful, so I use it.
The main reason is the CPU fan almost never comes on, so it's a quietbook.
Other than that, software development on it is a good idea, because if it runs
adequately on this, it'll run blazingly faster on a new machine!
------
trezor
From the report:
_No backgrounding, no multitasking, no unobtrusive notifications. No copy and
paste (yet), no MMS, no video. Really pretty minor stuff thus far._
Ah well. So we have push notification, better hardware access and the maps API
opened up for apps. Not totally shit but not revolutionary either.
~~~
jws
You really should watch the live coverage by someone other than engadget. I
get the impression their person is only there because someone threatened to
fire him if he didn't go.
If you are looking for information the Grumpy Mystery Science Theater version
of the live cast is the wrong place to be.
~~~
ashr
I recommend watching the video on apple.com
------
asciilifeform
Micropayments: death by a thousand cuts. Mark my words.
~~~
icey
Well, that's kind of the nice thing about capitalism. If you don't like it,
vote (or rather don't vote) with your wallet.
~~~
asciilifeform
This would be true in a market driven by competition between near-equals.
The iPhone does not live in such a market. It has no competition. It is a
qualitatively different product from other mobile phones. The cell phone
market is divided into two categories: the iPhone, and inferior crud. If Apple
were to begin charging $0.05 per "click", you would have to cough up the dough
or switch to a vastly inferior product. Therefore, your ability to "vote" with
your money is academic in this case.
~~~
GHFigs
You're conflating the third party iPhone application market (which can now use
micropayments) with the cell phone market as a whole. That's very odd.
~~~
asciilifeform
Micropayments could easily become a standard, expected part of iPhone use. In
that case, there will be no escape.
I suspect that this is the reason why Apple users complain about (even
potential!) misfeatures to the extent they do. In the product categories where
Apple is a player, from the standpoint of a dedicated Apple user, they have
zero competition. All of the supposedly competing products are far below the
quality-of-user-experience Apple users are accustomed to. Hence the perception
that there is nowhere to run to.
~~~
GHFigs
_Micropayments could easily become a standard, expected part of iPhone use._
Given how everything else you've said hinges on this assumption, you'd have
done well to explain why you think it is true. Like I said before, you're
conflating two markets.
As it depends on all players in a highly competitive market suddenly colluding
to degrade the user experience upon which they all depend without anyone
realizing that they might stand to make more money by not doing so, I find it
hard to believe.
~~~
asciilifeform
> degrade the user experience upon which they all depend... I find it hard to
> believe.
Try this on for size:
[http://arstechnica.com/apple/news/2008/11/apple-brings-
hdcp-...](http://arstechnica.com/apple/news/2008/11/apple-brings-hdcp-to-a-
new-aluminum-macbook-near-you.ars)
~~~
GHFigs
That doesn't relate at all to anything I've said, nor does it reinforce your
point in the slightest. Your powers of misinterpretation are astounding and I
hope that in the future you will refrain from commenting anywhere on anything.
~~~
asciilifeform
The linked article shows an instance of Apple unambiguously, deliberately
degrading user experience. It is highly relevant to this discussion.
~~~
GHFigs
That's not a discussion that any of my posts in this thread have been about.
| {
"pile_set_name": "HackerNews"
} |
RIP to the Perfectly-Sized iPhone - mrzool
https://www.popularmechanics.com/technology/gadgets/a23105271/iphone-se-perfect-size-discontinued/
======
anoncoward111
My LG Zone 4 cost me $115, it's the perfect size and speed and weight. I used
to run an iphone5.
Long may it live!
~~~
Finnucane
I still have my iPhone 5, and the size is surely one of the reasons I keep it.
That and I figure why bother upgrading before there's 5G phone service.
| {
"pile_set_name": "HackerNews"
} |
Bottled-water purchase leads to night in jail for UVa student - anaptdemise
http://www.dailyprogress.com/news/bottled-water-purchase-leads-to-night-in-jail-for-uva/article_b5ab5f62-df9b-11e2-81c4-0019bb30f31a.html
======
dsl
The ABC agents are obviously not correctly trained law enforcement officers.
Even in "undercover" operations, police will have a mix of plain clothes and
uniformed officers to avoid situations like this.
------
mjn
earlier discussion:
[https://news.ycombinator.com/item?id=5962494](https://news.ycombinator.com/item?id=5962494)
------
SurfScore
They need to have better procedures in situations like this. A woman at night
being approached by a bunch of men? The cons of staying are far greater than
anything that could justify it. Sadly these situations happen so late that
once the arrest is made, there is nothing that can be done until morning. That
needs to change somehow.
------
stephengillie
Protect yourself from police abuse. There was a similar situation from an ABC
agent for a different state(NC):
(NSFW - language)
[https://www.youtube.com/watch?v=Ug8rT1oxlRc](https://www.youtube.com/watch?v=Ug8rT1oxlRc)
------
chrisabrams
This sounds like a college prank...so confused how agents could ever act like
this?
| {
"pile_set_name": "HackerNews"
} |
What Is the Definition of a Seed Round or an a Round? - adidash
http://www.bothsidesofthetable.com/2014/10/07/what-is-the-definition-of-a-seed-round-or-an-a-round/
======
adidash
Related content from Pando - [http://pando.com/2014/10/07/what-you-label-your-
funding-roun...](http://pando.com/2014/10/07/what-you-label-your-funding-
round-matters-a-lot-less-than-how-much-you-raise-and-what-you-accomplish/)
| {
"pile_set_name": "HackerNews"
} |
It looks to me that Nintendo tried turning the SNES into a full blown 'computer' - easton
https://www.reddit.com/r/retrogaming/comments/hxy4je/gigaleak_it_looks_to_me_that_nintendo_tried/
======
mr-ron
Great video that summarizes whats going on here. Seems like a big deal to a
lot of people interested in this era of games:
[https://www.youtube.com/watch?v=jwDPwLE7DBw](https://www.youtube.com/watch?v=jwDPwLE7DBw)
------
xenadu02
After the video game crash several companies, including Nintendo, rebranded
their next-gen systems as "home computers" to avoid the stigma of being a
"video game" system. In that light I don't think it's terribly surprising.
~~~
contextfree
Video game crash was 1983 and affected the US marketing and positioning of NES
(8-bit), this is 1991 and SNES (16-bit).
| {
"pile_set_name": "HackerNews"
} |
Someone Just Leaked Obama's Rules for Assassinating American Citizens - erichocean
http://reason.com/blog/2013/02/04/someone-just-leaked-obamas-rules-for-ass
======
ghshephard
For everybody commenting on this article, please take 45 minutes to read the
document. It applies only to the following scenario:
1) The US Citizen has to be a Sr. Operational Leader of al-Qa'ida.
2) An informed high level official of the US Government has determined that
the targeted individual poses an imminent threat of Violent Attack against the
United States.
3) Capture is infeasible, and the United states continues to monitor whether
capture is feasible.
4) The operation would be conducted in a manner consistent with applicable law
of war principles.
This Document does not consider American Citizens who are not Sr. Operational
Leaders of al-Qa'ida. If you are just an American Citizen who has become a
low-level Al-Qa'ida terrorist who is planning imminent attacks on the United
States, that the government has discovered, and they are unable to capture
you, this document does NOT provide justification to target you.
It's a dense document, and hard to read with all that NBC NEWS watermarking,
but take the time to read it before commenting on it.
~~~
rgrieselhuber
It still violates due process.
~~~
rayiner
It might, but it doesn't clearly do so. Due process does not mean a trial. It
means what is reasonable under the circumstances. The length of the paper
tries to show that there are no reasonable alternatives in the case capture is
not feasible. It's a non trivial argument.
~~~
rgrieselhuber
Yes it does, because the protections provided by the constitution allow for
the deprivation of life, liberty, property, etc. in accordance with the "due
process of law."
There is no law here. Only an arbitrary, internal memo.
~~~
rayiner
Pursuant to the AUMF.
~~~
rgrieselhuber
Yeah, there is no room for abuse in that little gem.
The US Supreme Court has already decided at least once that the AUMF could not
be cited in defense of the goverment's actions (in this case, military
tribunals) because those actions violated the principles of the Geneva
Conventions, among others.
That's the whole problem with this. The accused never get a chance to defend
themselves in court, are presumed guilty and sentenced without any reasonable
defense.
~~~
rayiner
None of those things are due process problems necessarily.
------
iwwr
This unchecked expansion of executive power is happening all over the world.
Enabled by technology, but also lack of public outrage, soft, welfarish*
dictatorships are in the works. Outwardly, it looks democratic, but the
democratic principle rests on a limitation of power. Currently, there is no
limit, so long as the right language and people are targeted (whistle-blowers,
traitors and ultimately, "terrorists"). The public is not yet aware of the
danger and by the time they are it may be too late.
__*In a "guns and butter" sort of way
~~~
arrrg
Sigh. What’s this ideological drivel doing here?
Dragging welfare into this doesn’t even begin to make sense. You do it purely
for ideological reasons.
~~~
maratd
> Dragging welfare into this doesn’t even begin to make sense.
If the state feels it's appropriate to take from one and give to another, then
it must also feel that it is appropriate to simply take and eventually, not to
merely take property but life itself. It's the taking mindset and mentality
that's the problem.
~~~
arrrg
Yes, that is the ideological view exhibited here. A near perfect description
of it, actually.
What you say is not, in any sense, the truth or self-evident or anything like
that, it’s just one ideological view of many.
------
charonn0
I think I see a problem with the reasoning on the very first page (second
para.):
> The President has authority to respond to the imminent threat posed by al-
> Qa'ida and its associated forces, arising from his constitutional
> responsibility to protect the country, the inherent right of the United
> States to national self defense under international law, Congress's
> authorization of the use of all necessary and appropriate military force
> against this enemy, and _the existence of an armed conflict with al-Qa'ida
> under international law._ (emphasis mine.) <
An armed conflict under international law is a war; and war is a power of
nation states, not non-governmental actors (NGAs) no matter how violent. Not
very many years ago the US began imprisoning non-Citizens on the justification
that al Qaida (an NGA) was ineligible for protection by the Geneva, Hague, and
other conventions, and as such the prisoners were neither criminal nor
military defendants but prisoners of the President.
Now they are arguing that war _does_ exist, permitting the US government to
act violently against a US Citizen despite the Constitutional prohibition
against punishment without trial. The administration's actions are
inconsistent: despite a state of war now supposedly existing, prisoners of war
still are not afforded the rights guaranteed to PoWs; despite the writ of
habeas corpus not being suspended, US Citizens may be summarily executed at
the order of the President.
------
ck2
I'm curious if people actually have more of a problem with this than invading
Iraq which caused the death of thousands if not millions of innocents. Now
history is being rewritten that Iraq was okay. Why are American citizens more
important than thousands of innocent Iraqis?
We should be protesting war in all forms, not just assassinations.
But we're going to have enough problems domestically in a few years with
drones everywhere.
~~~
logn
Well, clearly, we invaded Iraq because it was run by a dictator executing his
own citizens, so we were justified.
~~~
camus
Saddam was US BACKED ! like Castillo , Pinochet , Palavi and countless others
, armed and supported for YEARS by USA ! there is even a footage with Rumsfeld
shaking hands with Saddam.
And you wonder why people hate you all over the arab world ? your only
strenght is fear, you definetly lost the cultural battle there.
The war in Iraq killed far more iraqis than Saddam ever did, and i'm not even
talking about the 1 millions children that died during the oil for food
program.
And yes ,they still call you the "great Satan" there. Ironic isnt it ?
~~~
logn
I was being sarcastic. It's ironic that in this case Obama is doing what we
claimed Hussein did in my comment above.
------
redthrowaway
You know what? Seems reasonable. An American citizenship should not be
considered a writ of special treatment for a terrorist. If you're going to say
that terrorists can be killed without judicial overview, which I think you
have to, then you can't say that doesn't apply to those terrorists who happen
to be American.
~~~
chao-
_If you're going to say that terrorists can be killed without judicial
overview, which I think you have to_
I vehemently disagree: You don't have to think that terrorists can be killed
without judicial overview. I'm also willing to bet I'm not alone, and am
curious about why you think the opposite.
~~~
gfodor
To play devil's advocate the reason would be if the terrorist could otherwise
not be captured or detained without serious risk to American lives. The
problem is that it's hard to trust the executive to not push the limits of
what this means.
~~~
dlss
This sounds right. I guess I would be in favor of drone airstrikes that froze
suspects in carbonite so they could be collected for questioning.
However, focusing on current technology, I think the scary part about these
rules for airstrikes is:
\- Suspected people can be killed without being told that they are wanted.
This is made worse by the fact that the list of wanted people is not publicly
available.
\- Suspected people can be killed without being given the option of submitting
to trial (no "stop or I'll shoot")
The above two items make airstrikes unpalatable for me. Thankfully they don't
seem beyond remedy (perhaps version 2 of the drone shoots down a ball-and-
chain + warrant before resorting to a missile), but in the mean time I find it
very disturbing. If this was happening in America I would feel like America
was over.
~~~
anigbrowl
_the list of wanted people is not publicly available._
<http://www.treasury.gov/ofac/downloads/t11sdn.pdf> is a good proxy.
As for your other point, I'm no expert on the laws of war, but I don't believe
one is required to abstain from acting against a legitimate enemy absent a
reasonable possibility of taking them prisoner. This distinction is discussed
in the white paper; it's against the laws of war to attack an enemy who you
have taken into your confidence (eg agreed to meet under a flag of truce, or
promised safe passage as one might to a plenipotentiary), but it's quite OK to
ambush an enemy who is conducting their own operations against you.
~~~
dlss
I wasn't saying that no lists of wanted persons was publicly available... just
that no complete list of people a drone would kill on sight was available. Are
you saying the people on this list would be killed on sight? (if so, thanks
for the link) Or are you just saying that they are wanted?
As for the laws of war, I think they were created for situations where the
opponents could be easily identified. (Opponents wearing a uniform for
example).
Applying them to a situation where 'enemy' has a stochastic definition is a
dubious thing. Of course it creates benefits, but it also creates a lot of
problems. Killing people without due process, in the long run, creates an
incredible amount of ill will. I think this, beyond rhetoric about justice, is
the reason we have due process for criminal procedures -- the people who knew
the innocent person you just killed get angry with you. Even if it was an
accident. Note that this definition doesn't really effect two uniformed
opponents on a battle field -- at least not in the same sense as "John was
killed by a drone while driving to Texas for his vacation".
The other good argument for providing due process is that without due process
you give a huge weapon to your enemy... as it becomes easier to frame someone,
and as that framing becomes more deadly, it becomes easier to convert people
to your cause through blackmail.
In summary: laws of war weren't handed down on a stone tablet, they codify a
way of being that reduces the long term negative outcomes of war. When a new
form of war is crated, you probably new new laws. The old ways of minimizing
negative outcomes are probably obsolete.
~~~
anigbrowl
You did ask for wanted. I'd imagine you'd end up on this list first.
I think you're assuming that due process and judicial process are the same
thing, but I don't agree with this.
------
brianlovin
The title of this is really, really misleading.
The first paragraph:
This white paper sets forth a legal framework for the...use [of] lethal force
in a foreign country outside the area of active hostilities against an
American citizen who is a senior operational leader of al-Qa'ida
~~~
logn
Well if this justification is somehow valid for senior al-Qaida members, it
would hold for senior al-Shabaab members, senior Zetas in Mexico, senior
Capone members, senior Bloods and Crips, senior LulzSec and Anon, etc.
Then you apply the logic which hinges on it being a foreign country and
parallel that to a condition in our own country and it gets ugly. After
reading this whole memo, I actually see very little about geography or why
this wouldn't be legal in the US. The bottom of page 4 and top of 5 seem to
actually justify executions within our borders.
~~~
ghshephard
The difference is spelled out very clearly in the document. The United States
is in a state of congressionally approved armed conflict with Al Quaida. Where
they not in a state of armed conflict, then there would be no legal basis.
The consequences of going to war, is that the executive (President, acting as
Command in Chief of the armed forces) is authorized to kill the enemy without
judicial review.
------
ghshephard
Sometimes you have to kill people. One hopes that, as a nation of laws, the
United States does so within reasonable constraints and at the appropriate
time, and for the appropriate reasons.
See: [http://www.nytimes.com/2013/02/05/us/boy-is-safe-after-
alaba...](http://www.nytimes.com/2013/02/05/us/boy-is-safe-after-alabama-
hostage-standoff.html?hp) for a tragic example today.
I've skimmed through the entire document - it spends a lot of time talking
about things that must be tried prior to these targeted killings - including
multiple references to the fourth and fifth amendments of the constitution
(Unreasonable Seizures, Due Process)
There doesn't seem any reason why this document shouldn't be made public.
Seems pretty much reasonable (if somewhat overly legalistic for this layperson
to totally follow)
~~~
nilved
> Sometimes you have to kill people.
This is not true.
~~~
tokenadult
> > Sometimes you have to kill people.
> This is not true.
The position that one must never kill someone else is certainly a defensible
position, defended over the centuries by many honorable people. I respect that
position. But, even though I have largely pacifist ancestors, I think as a
father of a daughter that if the Taliban tried to set up their women-
oppressing rule anywhere my daughter might have occasion to live or work, I
would oppose them by all means necessary, up to and including lethal force.
That's not because forcing women to be covered from head to toe when they go
out of their homes is itself a capital crime, but because some Taliban fellow-
travelers also commit capital crimes like murdering women who try to teach
mothers how to vaccinate their children to keep the children from dying from
infectious diseases. I would not be ashamed to kill a baby-killer or woman-
murderer.
AFTER EDIT: I will now take time to give a careful lawyer's read to the
document (white paper) linked to from the blog post submitted here.
[http://msnbcmedia.msn.com/i/msnbc/sections/news/020413_DOJ_W...](http://msnbcmedia.msn.com/i/msnbc/sections/news/020413_DOJ_White_Paper.pdf)
~~~
vy8vWJlco
> _I would not be ashamed to kill a baby-killer or woman-murderer._
So your ends justify their means.
------
joshfraser
The strength of your principles is only tested at the extremes. I hate
Westboro Baptist Church, but I'll support their right to say what they want,
because that's how much I believe in free speech. And even terrorists deserve
the right to a speedy and public trial if they're American. It's part of our
constitution, something we're supposed to stand for as a country. It even
makes me sad the way we handled the whole Osama Bin Laden assassination. How
much of a bigger statement would it have made to the world if we had pulled
him out and made him sit trial for his crimes? What happened to our principles
that we used to care so much about?
~~~
mc32
W/re WBC, I think while they have a right to hold views, express them, share
them, I do not think, and others have agreed[1], that they have the right to
disrupt other people's proceedings (funerals) as part of their right to free
expression.
[1] [http://www.kansascity.com/2012/10/16/3870092/appeals-
court-d...](http://www.kansascity.com/2012/10/16/3870092/appeals-court-
delivers-westboro.html)
------
olefoo
The following questions come to mind.
1\. What is "an informed, high-level official of the US government"; is it the
President only, or does it include Cabinet Members? Is it restricted to
political appointees, or does it extend into civil service roles as well?
2\. "imminent threat of violent attack against the United States" sounds like
a definition of a legal standard, what are the elements of such a standard and
would the mere possession of weaponry sufficient to carry out such an attack
meet it?
3\. The phrase "senior operational leader of al-Qa'ida or an associated force"
is used repeatedly in the document; what qualities put one in the category of
an "associated force"? Would it be plausible to say that Wikileaks could be
described as an associated force with al Qa'ida? Could the Syrian government
be so described? What are the strictures here?
4\. Given that several known killings of American citizens seem on the face of
it to violate the guidelines of this document; most notably the death of
Abdulrahman al-Aulaqi <http://en.wikipedia.org/wiki/Abdulrahman_al-Aulaqi> it
would behoove the government to explain the apparent contradiction. Or if the
definition of "operational leader of al-Qa'ida" has been watered down to
"military aged male"; to state that publicly.
There is no question that dealing with non-state paramilitary actors
undermines the nation state paradigm that the existing law of war assumes and
that there are a number of edge cases where it is hard to determine whether a
given individual should be treated as a combatant or as a criminal; however we
as a nation and as a society cannot afford to let our leaders become mere
killers without restraint; no matter how heinous the opposition.
~~~
tptacek
The "military aged males" killed by drones aren't US citizens. This memo does
not suggest that the US can kill any military aged male regardless of
nationality.
And no, it would not be plausible to say that Wikileaks could be described as
"associated with al Qaeda". You could have used the same reasoning in the
1930s and 1940s to suggest that the US could have killed Charles Coughlin;
after all, he was on the radio advocating for Mussolini and Hitler!
~~~
olefoo
In the particular case I referenced, he was, Abdulrahman al-Alauqi was born in
Denver and was aged 16 when he was killed.
Coughlin could have faced the death penalty for sedition; but he was silenced
by his bishop before that was necessary. And the logic in this document is
perniciously close to that used to incarcerate thousands of US citizens of
Japanese descent after Pearl Harbor.
This is why we should not vest the executive with untrammeled ability to kill
on their own authority, but should restrain them to a procedure that asks them
to justify the exigency to a judge at the very least.
------
ahmadss
Here's a response from the ACLU - [http://www.aclu.org/blog/national-
security/justice-departmen...](http://www.aclu.org/blog/national-
security/justice-departments-white-paper-targeted-killing)
------
superkuh
This memo spends the entire time talking about the 'evil' al-qa'ida and how
even if a US citizen joins them then legally they should get to kill them. It
goes into deep detail about this scenario for a number of pages.
But it skips over, in 5 lines at the very beginning, that it also applies to
anyone they arbitrarily say are associated with al-qa'ida. No details about
that.
The important issue isn't the legal justification of some mythical US al-
qa'ida as this document tries to stress. It's about the fact that they decide
who is an 'associated group' they can also kill and that decision is secret
and arbitrary.
------
orionblastar
I am just wondering but can people in Occupy Wall Street be targeted for
assassination just as well as as a 'potential terrorist' in a foreign nation
who happens to be a US citizen? If so we may be seeing a new form of US
Government.
BTW I thought President Jimmy Carter made assassinations illegal when he was
President? Has that law been lifted?
~~~
jowiar
Read the paper. The issue is not "potential terrorist" but rather swearing
allegiance to Al Qaida, between whom and the United States there exists a
present state of armed conflict. The US is not in a state of armed conflict
with OWS.
Also note that the application here is with regard to US citizens outside the
US - picture someone training terrorists in a cave in Afghanistan, not someone
camping on the streets of New York.
~~~
obstacle1
The paper starts off dealing specifically with high-level Al-Qa'ida
operatives. However around page 4 or 5 the language changes to "and associated
forces". That definition is too broad to be meaningful, which is a bit creepy.
~~~
jowiar
Reading the original 2001 AUMF explains where this language comes from.
[http://en.wikipedia.org/wiki/Authorization_for_Use_of_Milita...](http://en.wikipedia.org/wiki/Authorization_for_Use_of_Military_Force_Against_Terrorists)
~~~
obstacle1
It doesn't explain anything. In fact it is even broader than this whitepaper:
>the President is authorized to use all necessary and appropriate force
against those nations, organizations, or persons he determines planned,
authorized, committed, or aided the terrorist attacks that occurred on
September 11, 2001, or harbored such organizations or persons, in order to
prevent any future acts of international terrorism against the United States
by such nations, organizations or persons
Hamlily v. Obama (2009) crystallizes the legal interpretation of the phrase a
bit. Some key points:
>The key inquiry, then, is not necessarily whether one self-identifies as a
member of the organization (although this could be relevant in some cases),
but whether the individual functions or participates within or under the
command structure of the organization
>The Court also concludes that the authority claimed by the government to
detain those who were "part of ... Taliban or al Qaida forces" is consistent
with the law of war
>the government has the authority to detain members of "associated forces" as
long as those forces would be considered co-belligerents under the law of war
But note that _Hamlily_ applies to detention and not execution. And in this
execution whitepaper, it clearly states that the definition of associated
forces " _includes_ a group that would qualify as a co-belligerent under the
laws of war". The phrase _includes_ leaves a lot of room for the term
"associated forces" to apply to other things.
But anyway, IANAL.
Link to Hamlily v. Obama (PDF):
[http://scholar.google.ca/scholar_case?case=15512898181635760...](http://scholar.google.ca/scholar_case?case=15512898181635760339&hl=en&as_sdt=2&as_vis=1&oi=scholarr&sa=X&ei=MpUQUaXcF82ayQGAyoGYDw&ved=0CC4QgAMoADAA)
Link to AUMF (PDF): [http://www.lawfareblog.com/wp-
content/uploads/2012/10/Author...](http://www.lawfareblog.com/wp-
content/uploads/2012/10/Authorization-for-Use-of-Military-Force-2001.pdf)
------
matmann2001
Unfortunate automatic URL generation.
------
untog
Is it really that fair to describe this as "Obama's rules"? They were prepared
by the Office of Legal Counsel, after all.
In any case, good to see this out there- it appears that the New York Times
brought a court case to release these papers but were unsuccessful.
~~~
caseysoftware
They were written by officials of the Obama Administration for policies
established and enacted by the Obama Administration and used to evaluate
decisions the Obama Administration is making.
It seems quite logical to call them "Obama's" whether they are rules or
justifications..
------
rhizome
Good thing all that energy has been put into preserving the 2nd Amendment.
------
tokenadult
The full text of the purported Justice Department white paper mentioned in the
submitted blog post:
[http://msnbcmedia.msn.com/i/msnbc/sections/news/020413_DOJ_W...](http://msnbcmedia.msn.com/i/msnbc/sections/news/020413_DOJ_White_Paper.pdf)
------
dkokelley
Without reading the memo (only the linked article), wouldn't top Al Qa'ida
operatives be classified as traitors and enemies of the state? (Maybe that's
the legal angle expressed in the memo.) Within the country's borders, the
government kills its citizens all of the time when the judgement is made that
the suspect represents and immediate threat to the safety and well-being of
others (see: hostage situations and police shootouts). Otherwise, the state's
decision to end someone's life is a long and arduous process filled with
courts and laws and appeals (and rightly so!).
------
thisrod
Let's turn this around. Suppose that an American citizen believes they're on
the list, and the president is plotting to kill them. In what circumstances
should it be legal for them to assassinate the president?
The president is supposed to be just another citizen: one who's very certainly
plotting to kill Americans. It's curious how few people apply his reasoning to
his own case. Do people believe in some kind of divine right of presidents?
------
DigitalJack
Just curious...do people usually title their white papers with the words
"White Paper"?
~~~
bobbles
Every white paper I've ever seen has the words white paper in the title.. but
I don't think its expected, just a convention some organisations use
------
logn
Nice to read a treatise on how the Fourth Amendment doesn't prohibit executing
citizens without trial. Neither does the First Amendment. The Fourth is about
"searches and seizures". That it applies to taking possession of someone's
life so as to extinguish it is a pretty twisted premise.
------
hakaaaaak
If the war is over, then assassination would seem to be possible breach of the
Geneva convention.
If the war isn't over, then when will it be over? And is it even legitimate?
The U.S. declared war on the concept "Terrorism" during Bush Jr's presidency,
not on specific terrorists or al-Qa'ida. The U.S. also declared a war on
"drugs" during the Reagan years. Though I'm in support of both "wars" because
I'm in favor of the well-being and defense of the U.S. people, I don't think
Congress or the president should have a right to declare war on something that
cannot end, i.e. cannot terminate via treaty, surrender/capitulation, complete
destruction, or victory.
I am a little concerned that we are declaring that it is ok to kill our own
citizens without due trial, although I understand there are conditions.
~~~
camus
well the point you are missing is , it takes place outside a war context.
AlQaida is not the army of afghanistan , in fact most of its members are
saudis , egyptians or from yemen. So the Geneva convention "doesnt apply" ,
that's the why of the enemy combattant status and all that illegal crap made
legal.
------
revelation
These are not "rules", these are _justifications_ should the political fallout
be of the atomic type. Rules is a horrible euphemism for this absurdity, it
implies that there is someone to enforce these rules, which is what is so
conspicuously absent from the picture here.
------
jkoschei
Best. Permalink. Ever.
~~~
brokentone
In case they change it: "[http://reason.com/blog/2013/02/04/someone-just-
leaked-obamas...](http://reason.com/blog/2013/02/04/someone-just-leaked-
obamas-rules-for-ass)
------
drcube
This isn't the outrage. The AUMF, which fairly elected US legislators enacted,
and this white paper simply attempts to interpret, is. What's it been, 11
years now? We've always been at war with Oceania.
------
cpursley
This power grab will only continue as governments lose their grip on the
digital realm - mainly their ability to keep secrets and collect taxes. Real
crypto currencies and encrypted communications will change human organization
and governments will fight back with everything they have. These new laws over
the past several years have been to address the above - they have nothing to
do with 'terrorism' - cyber or otherwise. Government's only effective role is
to maintain its power. Everything thing else is secondary.
------
rtpg
Can someone explain to me how citizenship comes into play for any of these
things? I was always under the impression that non-citizens also had basic
rights.
------
ryanmarsh
When you consider that humans have been on the earth some 150,000 - 200,000
years it's interesting that only in the last heartbeat of humanity's existence
(4,000 or so) did we decide en masse to grant a monopoly on the use of deadly
force to someone else, namely bureaucrats.
------
allingeek
I had to giggle when I took a look at the URL, "someone-just-leaked-obamas-
rules-for-ass." Which made me wonder if this, rather lengthy, but clearly
truncated URL was hand chosen. Either way makes you think about more
intelligent filters for URL generators.
------
logn
[https://petitions.whitehouse.gov/petition/impeach-
president-...](https://petitions.whitehouse.gov/petition/impeach-president-
obama-unconstitutional-execution-united-states-citizens/Rdq942HF)
------
mens_rea
I love that this title is so unbiased and doesn't at all blow the document out
of proportion or make it appear more sinister than it actually is.
Thank you for not misleading readers with your title in order to get views and
points.
------
etherael
"Because I feel like it" would be less vague than this travesty.
------
coloneltcb
This is really a biased source. Reason.com has a clear agenda
------
mvid
How long until someone makes a flow chart out of this?
------
conductr
nice slug, someone-just-leaked-obamas-rules-for-ass
------
smiley1121
The president is black. I don't see how this this story is relevant.
| {
"pile_set_name": "HackerNews"
} |
Took me more than 2 years to get 200 paying customers for my Web App - barmstrong
http://www.startbreakingfree.com/1640/universitytutor-races-past-200-paying-customers/
======
user24
congrats! It's always inspiring to see people having success doing what they
love. 200 users seems almost laughably smalltime compared to some of the
companies who get featured on here, but to me, and I'm sure much of the HN
readership, it's a dream; if I can get 200 paying users of my business when I
launch I'll be ecstatic!
It's really good to see a success story which doesn't focus on "hey wow, I got
a million users overnight through sheer luck". It reminds us that 99% of the
time, companies are built slowly and surely, not astronomically.
~~~
JarekS2
People have no idea how hard it is to get first 10 paying customers (not to
mention 200!!). It's one thing to get people to say "I love your product -
will buy premium plan for sure!" and the completely other thing to actually
receive a payment ("I'm sorry I was busy", "Will buy, just waiting for my
customer to place an order" etc.).
Best of luck to everyone trying to persuade their customers to pay. I'm also
one of you!
~~~
patio11
_People have no idea how hard it is to get first 10 paying customers_
I'm kind of conflicted on this. Yes, it is hard to get ten people to pay
money, in that you have to have a mostly-functioning product, a website which
markets it, and some way to charge their credit cards. But this is not really
_that_ hard.
BCC 1.02 ("Like 1.00, but with less crash bugs and the brand new ability to
print to non-default printers") got to ten customers in six weeks from 1.0's
launch, entirely on the strength of organic search marketing on two pieces of
content. That was when I was young and stupid. Y'all can do better.
I think software (let's scope it to B2C software for the moment) is like
lemonade stands. You know how you get ten customers with a lemonade stand?
Your price? Doesn't really matter. Your stand's design? Doesn't really matter.
Your taste? Doesn't really matter. Your location? Probably matters for getting
hundreds or thousands of customers, but for 10, pretty much any street will
do. The key hurdle you have to get over is _charging money for lemonade_. I am
worried that people think it is really really hard to run a successful
business, and that stops them from ever charging for lemonade.
~~~
wlievens
But how do you get over charging for something that competitors offer for
free? Even if your product is better in different ways, that's a hard sell.
~~~
parfe
3/10 cent a gallon for water delivered straight to the home.
$1.50 gallon for a jug in isle 13 at your super market
or $1.75 for a 20oz bottle at the checkout counter.
Are these all the same product? Do they even compete?
~~~
patio11
That example is going in my playbook. (And the product is available for free,
in nigh-infinite quantities, in every occupied building in America. You don't
even have to ask for it. In fact, asking for permission to take some would
have whomever you asked immediately question your mental state!)
------
jasonkester
This is actually a significant milestone for any entrepreneur. 200 * $10/mo ==
enough to pay your rent.
$2k/month is the tipping point where you're no longer bleeding money and
eating into savings. Sure, you're not getting richer and you might still need
to take the odd freelance job for spending money, but it's a great place be,
no longer watching your bank account on its slow & steady march toward zero.
From here, it's all profit!
~~~
etm117
Remember, not everyone lives in the Bay Area. ;-) Depending on where you live
and if you have roommates, the $2k per month may be enough to pay rent, bills,
college loans and leave some left over for spending money.
~~~
jasonkester
Don't you mean "not everybody lives in Honduras"? There aren't many places in
the US where you can live for $2k/month all in, and the Bay Area would be the
last place I'd expect to do so.
I meant "pays your rent" quite literally. As in, taking the biggest of your
financial worries away and leaving you only needing to deal with the spending
money part. So you still can't live on your income, but you can coast along
for an entire year on $10k savings.
Up to that point, $10k in the bank meant you'd better start scrambling to pick
up a contract in the next couple months before you run out of money.
~~~
patio11
_There aren't many places in the US where you can live for $2k/month all in_
$2,000 / 160 = $12.50, which is substantially higher than the minimum wage in
all fifty states of the Union, so I'm guessing that there exist at least a few
people who are somehow making do...
~~~
bkmartin
I'm guessing you've never tried to live on $12.50/hr. And if you take that as
a gross number not a net number its even worse. Sure, people are "making it
work" but if you aren't single without kids and have zero college debt then
you aren't doing it without some sort of assistance. Just because the minimum
wage is $7.25 or up to $8.55 (depending on the state you live in), doesn't
mean you can live on it.
~~~
bkmartin
Really? negative points for a post that simply points out the fact that
$12.50/hr is a lot harder to live on that what the majority of people on here
want to make it sound? I'm not trolling, just offering a different point of
view from different observations. I live in rural PA not a metro area or
anything like that. I'm not saying it can't be done, but its not the norm.
~~~
Dove
_Really? negative points . . . ?_
Well, you opened with,
_I'm guessing you've never tried to live on $12.50/hr._
I consider this aggressive and personal. Rather than stating your position and
evidence, you've attacked the credentials of anyone who disagrees with you.
Aside from the fact that it's naive and almost certainly false (there are
folks on this site from _all_ walks of life with _all_ kinds of experience and
opinions), it is distracting. I do not care at all whether someone has the
particular credentials you think are necessary to comment on the topic; I care
only about what evidence and experience they _do_ have.
Above all, I want to hear about ideas, not people. If you speculate on
people's motives or qualifications (especially if you're suggesting downvotes
are the result of disagreement or censorship), or any time in general that you
attack the person of other commenters, you won't interest me. You'll annoy me.
And unless you say something particularly redeeming, I'll probably downvote
the comment.
~~~
bkmartin
Understandable, I agree I came off a bit strong. It struck me the wrong way a
bit, and I overreacted. I certainly mean no disrespect. I hope that what I
said after that was on point with what I was trying to get across. I'll be
better, thanks for the heads up.
------
JangoSteve
Congratulations on the 220 paying customers, that's certainly no small feat.
I've been running RateMyStudentRental.com for about 3 years now (well, really
I stopped actively working on it about a year ago), and it only reached about
half that in revenue.
Then, LeadNuke sprang forth as an internal sales tool for RMSR barely a year
ago and it's approaching that level already. In hindsight, I'm really glad I
didn't have this kind of success the first time around, because I have a much
more realistic perspective now and I can appreciate it that much more.
In summary, mad props and respect to you.
~~~
steveklabnik
> In summary, mad props and respect to you.
Totally off-topic, but some of my friends lately have started joking around
about making a subgenre of Nerdcore devoted to startups. There's so many good
names and parody opportunities...
> I got 99 problems, but my pitch ain't one.
> whatddup, founda?
> An east vs west style rivalry between the 'Limited Liability Crew' and
> 'S-corp'.
> Names: 'Series C', ... I forget the rest. There's others.
~~~
trafficlight
That's awesome. Have any of them been so brave as to actually record a song?
~~~
steveklabnik
Not yet, but this is pretty close: [http://www.kalzumeus.com/2010/01/12/the-
solo-founder-startup...](http://www.kalzumeus.com/2010/01/12/the-solo-founder-
startup-rap/)
Patrick doesn't know about what I'm talking about though, this is unrelated.
------
adamt
Congrats. As other people have said - it's refreshing to see some stories like
this rather than just the 'here's my web app I built in 48 hours'. Hopefully
it will help people reliase the difference between building something and
building a business.
At 200, you are close to what I consider to be a major inflexion point. It's
often as easier (big separate post that I won't go into the full reasons why)
to go from 200-2000 then it is to go from 20-200.
Well done and good luck!
~~~
barmstrong
Yep, I think you're right on that - the first 200 was just figuring out the
right place for everything. Should get easier from here...
------
rubyrescue
congratulations! when barmstrong was down here in Buenos Aires, we talked a
lot about universitytutor.com and it's cool to see him just make little tweaks
to the site and let it grow slowly and steadily. very inspiring!
~~~
barmstrong
Yep - those were some good discussions, learned a lot from you down there!
------
ryanb
How did you get 16,000+ tutors signed up? That's an impressive number.
~~~
barmstrong
Tried a bunch of ideas, but the most successful was posting jobs to university
websites. Can email me if you want more details.
------
stretchwithme
Congratulations. A great idea and an important niche to serve. I just told two
friends that do tutoring about it.
~~~
barmstrong
Awesome, thanks!
------
tnorthcutt
I may be assuming too much based on my reading of your post, but it sounds
like you could really stand to implement some (or more) A/B testing. The fact
that it took two years to reach 200 customers but in only a week or so you've
added another 20 customers after making some changes makes me think you should
have been making (and testing!) changes like that all along. Either way,
congratulations, and best of luck in the future!
~~~
barmstrong
Yur right - I just didn't have the idea to do this test until recently :) Have
done some split testing on price etc, but could def stand to do more.
~~~
tnorthcutt
Hopefully you'll continue to see a faster increase in signups. Good luck!
------
spencerfry
Congrats! With 200 paying customers, you now have more than enough information
to start tracking churn, CPA, life time value, life time profit, etc. You can
turn those 200 paying customers into a lot more by accurately tracking your
metrics and building from them.
I recommend reading:
[http://thinkvitamin.com/web-apps/how-to-track-six-key-
metric...](http://thinkvitamin.com/web-apps/how-to-track-six-key-metrics-for-
your-web-app/)
------
mrbird
Maybe I missed this in the post, but are you working on this full time? If
not, how many hours/week would you estimate you've invested, on average?
~~~
colonelxc
read his about page: <http://www.startbreakingfree.com/about/>
Shows he's started a few other sites, including working on a YC funded
(stealth) startup.
~~~
barmstrong
Yep, I have a day job. Right now it takes very little time to run the site,
maybe a few hours per week. But I definitely spent a lot of time building it
up front, and occasionally still do when I add new features. As a strict
hourly ROI I could have made way more at a job or doing consulting work, but
it's an investment that may pay off long term (or not, but either way it was
way more fun :)
------
senthil_rajasek
Not to nitpick but your about page shows that universitytutor.com was started
in 2004 but your post shows that you started the site in 2008? Also the
dashboard shows decreasing timeline which means you are either losing
customers and below the 200 (can't guess the scale) subscribers or there is a
simple error somewhere...
What are we missing ?
~~~
barmstrong
Good point - I actually first registerred and built a site back in 2004 but it
was a different business (matching people manually in Houston only). 2008 was
when I switched it over to a directory site that was open to anyone and let
tutors and students contact each other directly (also rebuilt it in rails).
Not sure what you mean on the graph though - it seems correct to me.
~~~
senthil_rajasek
The dashboard graph shows just a months worth of data and for some reason I
thought the timeline was decreasing. Congratulations on your success.
------
dfischer
Congratulations. That's a great milestone.
------
antidaily
The site is beautiful. Nice work!!
~~~
barmstrong
I did the programming, but hired this guy to design it:
<http://www.jackherbert.com/>
I'd recommend him, he was good and fairly priced. (Found him on 99designs).
------
qq66
Nice job dude! -Amal
------
ohashi
Congrats :)
------
cinimod
That's an AWESOME dating service.
| {
"pile_set_name": "HackerNews"
} |
Any good world calling options? - nphyte
======
ankitgarg43
I prefer Google Voice, from one place you can dial out to many countries. Also
rates change accordingly. And the rates are very competitive against other
service.
------
someone_new
$10-$15 T-Mobile unlimited international calling #gooddeal
| {
"pile_set_name": "HackerNews"
} |
70,000 Blogs Shut Down by U.S. Law Enforcement - dwynings
http://www.readwriteweb.com/archives/70000_blogs_shut_down_by_us_law_enforcement.php?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+readwriteweb+%28ReadWriteWeb%29&utm_content=Google+Reader
======
joshwa
If the hosting company says that they can't name the agency and can't say
anything about the nature of the claim, that immediately makes me think of a
National Security Letter:
<http://en.wikipedia.org/wiki/National_security_letter>
"[A National Security Letter] is a demand letter issued to a particular entity
or organization to turn over various record and data pertaining to
individuals. They require no probable cause or judicial oversight. They also
contain a gag order, preventing the recipient of the letter from disclosing
that the letter was ever issued."
~~~
DavidSJ
derwiki replied to this comment by saying:
_"The gag order was ruled unconstitutional as an infringement of free speech,
in the Doe v. Ashcroft case." (same article)_
For some reason, his reply is dead, but it seems like a valuable comment so
I'm reproducing it.
~~~
fmora
Thank god for the separation of powers. It is incredible how many rights the
Bush presidency attempted to take away from its citizens all in the name of
national security. The more I read stuff like this the more it seems that we
were heading to a totalitarian government.
Edit: In case anybody wonders why I threw in Bush's name in there is because
the Patriot Act, created during his presidency, greatly extended the NSL
powers. <http://en.wikipedia.org/wiki/National_Security_Letter>
~~~
fmora
If you are going to down vote me at least explain why.
~~~
Yzupnick
Maybe it is because you pick on a single president what every president has
done. (From all parties.) Did Bush do things that where a violation of rights?
Probably, but so did every president including but not limited to Obama,
Clinton, Bush (senior), and Reagan. I would venture to guess it is impossible
to name a president that did not infringe on the rights of citizens. Second,
it was the current government that did this, not Bush.
~~~
jeromec
_I would venture to guess it is impossible to name a president that did not
infringe on the rights of citizens._
The degree to which any perceived infringement occurs is what is significant.
Bush pushed for and succeeded in suspending habeas corpus, a Constitutional
protection by which people can challenge their imprisonment. This was only
done twice in history, once by Bush and once by Lincoln at the start of the
Civil War. By contrast, President Obama opposed the suspension of habeas
corpus since he was a senator.
~~~
Yzupnick
And yet is continued by the current administration:
[http://www.nytimes.com/2009/05/21/us/politics/21obama.text.h...](http://www.nytimes.com/2009/05/21/us/politics/21obama.text.html?_r=1&pagewanted=all)
And Obama authorized the assassination of a US citizen; something even Bush
never did:
[http://www.nytimes.com/2010/04/07/world/middleeast/07yemen.h...](http://www.nytimes.com/2010/04/07/world/middleeast/07yemen.html)
~~~
GiraffeNecktie
The speech you point to does not support your point. My reading is that he is
trying to cleaning up the toxic legal spill that the previous administration
left behind (while trying not to give his Republic critics ammunition).
Re. the assassination of a US citizen, that hardly seems notable given that
the guy is very actively involved in putting together terrorist attacks.
Surely any president would make the same decision.
~~~
Yzupnick
It seems the origigonal post was deleted I guess... Now it seems I'm like I'm
talking to myself.
1) Among all his rhetoric about not continuing the policy he slips in
"there may be a number of people who cannot be prosecuted for past crimes, in
some cases because evidence may be tainted, but who nonetheless pose a threat
to the security of the United States...must be prevented from attacking us
again "
His policy stays the same, he is just better at hiding it from the public.
2) Thats the same rhetoric people used to defend Bush. Innocent till proven
guilty in a court of Law I say.
~~~
jeromec
You should have listed more of that quote. Directly above that President Obama
said:
_Now, finally, there remains the question of detainees at Guantanamo who
cannot be prosecuted yet who pose a clear danger to the American people. And I
have to be honest here -- this is the toughest single issue that we will face.
We're going to exhaust every avenue that we have to prosecute those at
Guantanamo who pose a danger to our country. But even when this process is
complete, there may be a number of people who cannot be prosecuted for past
crimes, in some cases because evidence may be tainted, but who nonetheless
pose a threat to the security of the United States. Examples of that threat
include people who've received extensive explosives training at al Qaeda
training camps, or commanded Taliban troops in battle, or expressed their
allegiance to Osama bin Laden, or otherwise made it clear that they want to
kill Americans. These are people who, in effect, remain at war with the United
States._
The ease/danger of a transition from a democracy to a totalitarian regime was
something of which the Founders were aware. Our freedoms are protected
precisely by a Constitutional framework which provides safeguards, like habeas
corpus. President Obama is a Constitutional scholar, and acknowledges our
bindings to it. Compare that with Bush who was rumored to say it's "just a
piece of paper". There may be case by case issues which are difficult as well
as debatable for any president to decide, but altering the legal framework in
ways which diminish civil liberties and protections is dangerous, and can too
easily lead a public that is not paying attention to a place they realize too
late they don't want to be.
<http://www.youtube.com/watch?v=Wmc60JmaLbE>
~~~
anamax
> Directly above that President Obama said:
It doesn't matter what he says in a speech. What matters is what he says via
executive orders, policy, and executive branch action.
> President Obama is a Constitutional scholar, and acknowledges our bindings
> to it.
Oh really? Feel free to cite any of his scholarly writings.
> Compare that with Bush who was rumored to say it's "just a piece of paper".
By someone who had an axe to grind. What has that person said about Obama's
continuation and expansion of the same policies? (To be fair, some folks who
criticized Bush for doing certain things have criticized Obama for continuing
and expanding, but they're a marginalized minority. The "good people" have
largely fallen into line.)
Of course, if you want to play "was rumored to say", there are some doozies
attributed to Obama.
Double-standard much?
~~~
jeromec
_It doesn't matter what he says in a speech._
I disagree. Words have both immediate and historical significance and impact,
whether by a dictator like Hitler or a president like John F. Kennedy.
_What matters is what he says via executive orders, policy, and executive
branch action._
I agree.
_Oh really? Feel free to cite any of his scholarly writings._
"Mar 28, 2008 ... Barack Obama is correct in saying he is a constitutional law
professor." source: FactCheck.org
([http://www.factcheck.org/askfactcheck/was_barack_obama_reall...](http://www.factcheck.org/askfactcheck/was_barack_obama_really_a_constitutional_law.html))
_Of course, if you want to play "was rumored to say", there are some doozies
attributed to Obama._
I will retract the rumor text. I almost didn't put it in, but I wanted to give
some context for G. W. Bush's apparent disregard for Constitutional law. But I
don't need to. Just watch the 6 minute YouTube video with a noted
Constitutional law professor I included. Here it is again:
<http://www.youtube.com/watch?v=Wmc60JmaLbE>
~~~
anamax
>> Oh really? Feel free to cite any of his scholarly writings.
> "Mar 28, 2008 ... Barack Obama is correct in saying he is a constitutional
> law professor." source: FactCheck.org
> (<http://www.factcheck.org/askfactcheck/was_barack_obama_reall...>)
The claim was that he was a constitutional law scholar, not that he was a
professor. While there are overlaps between the two groups, neither one is a
subset of the other.
I'll ask again - if Obama is a constitutional law scholar, where is his
scholarly output?
~~~
jeromec
_The claim was that he was a constitutional law scholar, not that he was a
professor. While there are overlaps between the two groups, neither one is a
subset of the other._
You're kidding, right? Him being a scholar is an even easier proof than him
being a questionable professor -- which the link I listed at FactCheck.org
also asserts is true.
Oxford Dictionary (First Definition):
scholar (schol·ar): a specialist in a particular branch of study, _especially
the humanities_ ; a distinguished academic
From the UC Law School statement at FactCheck.org:
"Senior Lecturers are considered to be members of the Law School faculty and
are _regarded as professors_ , although not full-time or tenure-track ... Like
Obama, each of the Law School's Senior Lecturers have high-demand careers in
politics or public service, which prevent full-time teaching. Several times
during his 12 years as a professor in the Law School, Obama was invited to
join the faculty in a full-time tenure-track position, but he declined."
~~~
anamax
>>The claim was that he was a constitutional law scholar, not that he was a
professor. While there are overlaps between the two groups, neither one is a
subset of the other.
>You're kidding, right?
Not at all. I have reasonably high standards for scholars.
For example, even though the degree is "Juris Doctor", I don't call lawyers
"Dr.". (However, I will call them "Esquire".)
Meanwhile, you'd call a 6th grade history teacher a "scholar" if they teach
some constitution....
~~~
jeromec
_Not at all. I have reasonably high standards for scholars._
This is not about you. It's about the definition in the dictionary. It has as
a primary entry for scholar "a distinguished academic".
The definition for "professor" from Wikipedia:
_The meaning of the word professor (Latin: professor, person who professes to
be an expert in some art or science, teacher of high rank[1]) varies by
country. In most English-speaking countries it refers to a senior academic who
holds a departmental chair_ ... etc.
I don't know how you equate "Senior Lecturers regarded as professors" by a
university to a 6th grade history teacher who may also be the school gym
teacher filling in. That's stretching things a bit.
~~~
anamax
> In most English-speaking countries it refers to a senior academic who holds
> a departmental chair
Which Obama didn't....
In general, real professors have publications. Heck, so do real academic
doctors. Honorary and "we're giving him an appointment to curry favor" ones
don't.
~~~
jeromec
Bottom line:
Point 1: You had a problem with me referring to President Obama as a scholar.
Regardless of your semantic arguments, dictionaries also define scholar as
simply a student or learned person.
Point 2: The university statement clarifies how and why Obama was regarded as
a professor -- and not just an "honorary" one.
Point 3: Most academic doctors or professors with publications do not go on to
become the President of the United States. Have you ever stopped to think
maybe he was busy in service of the public as well as his family?
Honestly, the original point was about the contrast in perspective, as far as
the Constitution is concerned, between Obama and Bush. I really don't see what
you are challenging.
~~~
anamax
> Most academic doctors or professors with publications do not go on to become
> the President of the United States.
Irrelevant. Becoming president doesn't imply that he's anything else.
Or, do you want to argue that he's an astronaut too? He didn't ever go into
space, but that's just because he had better things to do.
> Have you ever stopped to think maybe he was busy in service of the public as
> well as his family?
It doesn't matter why he doesn't have scholarly output. If he doesn't....
FWIW, almost every other editor of the Harvard Law Review managed to crank out
a paper or two during their tenure.
> Honestly, the original point was about the contrast in perspective, as far
> as the Constitution is concerned, between Obama and Bush. I really don't see
> what you are challenging.
You seem to think that teaching a class tells us something important. Without
scholarly output, we know nothing about what he did. (I'm a lecturer at a
major university....)
~~~
jeromec
_You seem to think that teaching a class tells us something important._
Correct. In the context of a presidency, along with his words, I believe we
can infer a regard for the Constitution. And Obama made essentially this
point. Take a look at an excerpt from a speech by President Obama on national
security:
_We are building new partnerships around the world to disrupt, dismantle, and
defeat al Qaeda and its affiliates. And we have renewed American diplomacy so
that we once again have the strength and standing to truly lead the world.
These steps are all critical to keeping America secure. But I believe with
every fiber of my being that in the long run we also cannot keep this country
safe unless we enlist the power of our most fundamental values. The documents
that we hold in this very hall - the Declaration of Independence, the
Constitution, the Bill of Rights -are not simply words written into aging
parchment. They are the foundation of liberty and justice in this country, and
a light that shines for all who seek freedom, fairness, equality and dignity
in the world._
I challenge you to find _any_ reference Bush made to any of the above
documents at any time while on the subject of national security where he is
clearly expressing a regard for the document(s) as a guide.
------
DanBlake
I am skeptical - The host, <https://www.burst.net/> Looks like a template
monster design with a reseller system, no traffic rank and a nearly empty
forum- From a outsider looking in, it looks like a host that is barely in
business and likely ran by one guy from his apartment.
Maybe they are over-exaggerating for press? Maybe the server crashed, and they
dont want the bad press so did a bogus excuse? Stranger things have happened.
But I highly doubt this has even remotely anything to do with "operation in
your sites" and is likely related to some issue at burstnet. I wouldnt be
surprised if law enforcement isnt even involved.
~~~
zaidf
Trust me, burstnet is far from a small host. They went through a rebranding I
believe as part of their clean up effort from their last brand which had a
reputation for attracting high bandwidth questionable sites.
------
datawalke
BurstNET is located very close to where I am. About a year and a half ago I
toured their facilities for a colocation project. Upon walking in I was
horrified. They rows of tower based servers with their cases ripped off on the
wire-frame racks you would find in a home improvement store. After seeing that
and hearing they lacked any fire suppression system I respectfully walked away
from their bid.
------
MadWombat
Well, there is a link to a thread on a webhostingtalk.com, where some people
are discussing the issue. After reading the original posting by the blog
service provider and some of the replies, here are some basic lessons to be
learned from this.
1\. A lot of people have no clue as to the legal process
2\. It pays REALLY well to have external backups
3\. It might be a good idea to use encrypted volumes to store sensitive data,
so if authorities are involved, they have to serve you with papers to get your
decryption keys. This way you stay more informed.
4\. Your hosting provider probably has a clause in their ToS that more or less
says "we can terminate your service whenever, the hell, we want and there is
nothing you can do about it". Deal with it.
5\. This story still sucks.
6\. Seems like this guy was simply small enough to just serve a court order
and shut down his service. I don't think anyone would shutdown Google for
questionable content on a blogger account or google web pages.
7\. I am pretty sure, that there is no legal way for a law enforcement agency
to remain anonymous while doing something like this. Either I am wrong about
it or something is amiss.
~~~
adamc
Your hosting provider probably does have such a clause, but after exercising
it they should expect to go out of business.
~~~
MadWombat
Not if they only do it to a small percentage of clients and within common
sense. Generally the clause is there, so that they have a legal ground to shut
you down without waiting for legal process to catch up (i.e. if legal
authorities ask them without providing a warrant, if they get complaints about
some questionable content etc.)
------
jacquesm
A blogging service works on a per-account basis, for them to shut down the
whole server instead of just taking down the offending account(s) seems to be
pretty excessive, no matter what those accounts have 'done'.
There is some chance they found themselves the unwitting participant in a
child pornography distribution network, and that they don't know which
accounts are 'the ones', and they've taken everything off-line until they've
verified which accounts are bad and which are good.
~~~
j_baker
Why keep it a secret if it's just kiddie porn?
~~~
jacquesm
Brand damage.
------
gphil
If this isn't just sensationalist reporting, then this is pretty bad. I wonder
if it's related to the piracy crackdown that was recently announced by the
White House.
~~~
derwiki
The spokesperson said it wasn't a copyright thing; it sounds a little extreme
for that anyway. I'd rather not speculate on what it is though until we get
more details.
~~~
gphil
Sorry, I missed that the first time I read through the article.
------
kwamenum86
From BurstNET:
"We cannot give him his data nor can we provide any other details"
I guess this is one of the dangers of hosting a user-generated content site-
law enforcement may confiscate your server. This seems highly unusual even for
something like child pornography. Usually they ask (politely then forcefully)
the server owner for cooperation. It's possible that the owner of Blogerty is
a suspect.
------
known
Instead of closing down the blogs why not impose fine on print & electronic
media, if they publish a lie.
------
deanerimerman
Yeah! joshwa's got a point there! Law enforcement agents concerned with not
publicly identifying themselves might also likely be concerned with:
<http://en.wikipedia.org/wiki/Posse_Comitatus_Act>
~~~
j_baker
That only applies if this was done by the _military_ though.
------
Spoutingshite
A phrase with the words sledgehammer and nut comes to mind.
Obviously somebody was a naughty boy, but what about the other users of the
server?
------
logic
More details from BurstNet's CTO:
<http://news.cnet.com/8301-31001_3-20010923-261.html>
------
pinksoda
This is why I don't trust the government with an internet kill switch.
------
Ardit20
That is a bit Kafkaesque.
Everyone has the right to know why their right is being denied or what they
are being charged with. If it was a privet firm then fine, but the government
can't just go around closing websites without saying if not in detail then in
general what the charges are. How, if the website owner is wronged, is he able
to challenge the decision if he does not even know what the allegations are
against him.
~~~
Roboprog
What you say was more or less true in 2000. Things have changed a bit since
then. The fact that many recent laws and programs obviously defy the first ten
amendments to the US Constitution have gone "unnoticed" by the SCOTUS, and
both major brands (D & R) seem content with how things have developed the last
decade.
"We the rabble" are likely in for a 10 year slog to fix things, if we are
lucky: paper ballots; some kind of coalition or runoff voting rule changes to
take down the "two" party system; reestablishment of the rule of law.
~~~
Ardit20
I am sorry. I can not quite agree with that. I do not know about the united
states, but here in the united kingdom we have a very independent judiciary
which has ruled against the government time and time again.
I do agree in a way, just before Tony Blair left, which I think was 2008 or
2007 things seemed to be going in a very dark direction, but frankly, it is
the peoples fault.
We are so lucky as to be able to change government without bloodshed and in
the UK for what I know we are so lucky as to not go down without a very real
power struggle between the executive and the judiciary.
Take them to court I say. That is what they are for.
------
ndimopoulos
I am thinking that the subject might be child pornography, espionage or cyber
terrorism. Should some of those blogs had some sort of method of communicating
information with terrorists I do not see why the NSA would not shut the whole
thing down.
I hate to be in the shoes of those 70000 people but from the article and
evidence available right now this is a really serious matter.
~~~
danek
maybe the fbi thinks terrorists were communicating via blog comments, in a
secret code designed to look like spam? as far as 'movie-plot terrorism' goes,
i don't think it's too far fetched.
~~~
naturalized
Does it mean that any site can be shut down if it's used by terrorists? Which
one is next: facebook, because terrorists can create a group there and send
messages, twitter, because a terrorist cell can use it to coordinate attacks,
or perhaps wordpress? Which service will be shut down next?
| {
"pile_set_name": "HackerNews"
} |
Firefox web browser - ericras
https://itunes.apple.com/app/apple-store/id989804926
======
po1nter
duplicate of this:
[https://news.ycombinator.com/item?id=10553646](https://news.ycombinator.com/item?id=10553646)
~~~
ericras
Thanks - I stumbled across it and submitted the itunes link hoping to find the
discussion on here.
------
wodenokoto
I'm disappointed that the styling didn't include the iconic round, enlarged
back button.
It also doesn't have the swipe-from-left to go back functionality.
| {
"pile_set_name": "HackerNews"
} |
Rate my startup: Feedlooks, a web-based RSS reader - arturadib
Designed this out of my own frustration with current web-based RSS readers:<p>As a blogger, I was wondering why I was spending my time working on the blog design if most feed readers would strip off the visuals anyway.<p>All I needed was a web app that would list new items since I last checked, and would show the <i>actual</i> web content in full visual glory once I clicked on an item. (Without opening a new tab).<p>Hence Feedlooks. The bet is that there is a chunk of the RSS reader market that feels a similar need.<p>I'm looking for ideas and suggestions on how to get traction, comments on the app itself, and possible business opportunities.<p>Thanks!<p>http://www.feedlooks.com
======
crux
Well, as a blog reader, I rather like the absence of bloggers' visual glory
when I read my feeds. I'm interested in articles, not in someone else's design
skills. Especially since, in most readers, I can set my own CSS preferences
and thus read feeds that are not only stripped off but then customized exactly
how I like them.
~~~
arturadib
Hi crux,
At some point it boils down to personal preference, but here's a counterpoint
from a reader's perspective:
When all of my 50+ feeds look identical, sometimes it is hard for me to
identify whose blog I am reading based on its title alone--"this is an
interesting article, but who's this JoeDoe guy again?". By seeing the actual
website I can more quickly identify the guy. I guess in this case, "a web
design is worth a thousand words".
I'm not saying Feedlooks is for everyone; it sure is for me, and hopefully for
many other people.
Thanks for the honest feedback though!
~~~
arturadib
Another advantage is that you get to see user comments on blog entries.
------
zackola
\- Keyboard shortcuts or bust.
\- Signup link too hidden. Man I hate most web service signups. if I try to
log in and you don't have the email in your system, maybe you should just
create an account for me and send me a verification w/ whatever password I
entered in the verification email - or require that to not have my account
deactivated shortly I must click on the activation link sent and set my
password.
~~~
arturadib
Good idea. I guess signup was the most commented on issue so that's definitely
a priority now.
Thanks!
------
javery
<http://www.feedlooks.com> \- clickable
------
conesus
This is quite a good idea. I'm working on a very similar idea myself, except I
use the feed's main page and link the feed stories to where they are on the
main page.
My criticism is largely the same, but I want to echo it so it becomes that
much louder. First, an instant demo is invaluable. It teaches the user
immediately what they are getting into without the login/signup cost. Also,
you should let the user in right on signup (logging them in so they don't have
to login in immediately after they confirm). If they don't confirm in 24
hours, gently remind them, and then in a month of no use, delete the account.
Also, I wish organization of the feeds was easier so I could read the feeds
that start with the letter 'Y' much quicker than having to load 50-some feeds
first.
This could go far, so hats off to you. I know from experience that this isn't
easy.
~~~
arturadib
Thanks for the kind feedback!
Yeah, live demo is definitely a common theme here; it's now in my to-do list.
I do have plans to add feed organization features. Meanwhile, to get to 'Y',
you can click on "Collapse" to see only feed titles and quickly scroll down to
'Y'.
------
JangoSteve
Though my personal preference is for no layout in my feed reader, I actually
do like the idea and I think there is definitely a market for it.
One small nitpick: the specific example you chose for the screenshot under the
"Why" tab is a bad example. If I had to choose between a plain-text article
and that hard-on-the-eyes-gray-text-on-bright-green-background, I'd definitely
choose the plain-text hands down.
On a related note, if you do decide that you want to integrate a button that
allows the user to view a plain-text stripped-down version of the article, I
recently implemented similar functionality in LeadNuke and wrote an article
about the "algorithm" (it's actually quite simple) I used to strip down the
page. It's specifically written for Ruby, but you can skip to the "algorithm"
part of the article: [http://www.alfajango.com/blog/create-a-printable-format-
for-...](http://www.alfajango.com/blog/create-a-printable-format-for-any-
webpage-with-ruby-and-nokogiri/#meat-algorithm)
~~~
arturadib
I guess if I decide to go with a plain-text option I guess I can simply show
the content from the RSS feed itself.
As to the Why tab: Any takers for that real estate? I'd be happy to advertise
a good-looking blog there. :)
~~~
JangoSteve
Oh yeah good point. In my app, you can manually bookmark links that aren't
from feeds. Also I like allowing users to see the full article contents when
the feed just had a one paragraph summary.
Feel free to use my blog, but I imagine you can find a much better looking
blog from a designer somewhere.
------
metageek
I cannot use it at all. My minimum font size is set at 24 (weak eyes); you
apparently hard-code the font size and the line spacing, and Firefox is
overriding only the font size. The result is that I see only the top half of
each line.
~~~
arturadib
Will definitely look into that! Thanks for pointing that out.
------
deno
Sign Up link should be most visible item on your page. Actually you could
offer Google OpenID/OAuth Hybrid connection and grab user's Google Reader data
while you're at it.
I prefer Akregator but I'd like to ask where did you get the idea for such
personal captions on buttons? (“I understand what is happening”, “I _will_
check my email” etc.) Do you actually have some data as to whether it makes
people read messages more carefully?
~~~
arturadib
Ah, those button captions :) I do not have any data, but I _do_ know that I am
an "OK"-button hunter. If I see one, I'm likely to click on it without
thinking.
I think I got this idea from the SVN blog at 37signals, but I'm not sure.
------
sfennell
Ok, one huge grip - don't make me verify my email, that adds a whole _huge_
step to the account creation process.
Also, If I click on a link in the blog, the feedlooks bar should go away, I
dont want that hanging around - or at least open the link in another window,
like greader.
Overall though, I really like the idea - really cool ,and nice implementation
- I will try using this over greader for now :)
~~~
arturadib
So you prefer to click "back" to get to the feed list?
Hmm, that's tough. I really like having that toolbar there--I can pin an item,
skip to the next unread, etc.
Agreed about the signup process. Clearly the issue most commented here!
------
sgt
I was thinking about the same idea the other day and now I'm very happy that
someone actually implemented it. It looks pretty slick and the overall speed
is fast. Good work.
Just one small detail I noticed is that when I signed up with an email address
that contained a '+', it didn't autofill that on the login screen when I
clicked on the redirect url I got on email.
~~~
arturadib
Thanks that's very kind! Will look into that login issue soon.
~~~
metageek
It looks like the problem is that the redirect to the login page doesn't URL-
escape my email address. Since I used one with + in it, they got turned into
spaces. (Bonus points for not rejecting +, though.)
------
AlexBlom
My feedback on the signup process:
I'd be changing the Login box with the Signup box. You want to make it REALLY
easy for people to join!
Users who come specifically to login will find the login button no matter
where you go. Users considering registering may not look ("Oh, this is too
hard to find, not to worry")
~~~
arturadib
Good idea, will try to make changes to reflect all comments about the signup
link/page!
------
rgrieselhuber
I've been wanting something like this for a long time. One less thing I have
to build. :) It's like an inverse Tumblr.
I'd love to try a demo where you just put in a feed URL (without requiring
email / password) and it shows you to display it. Or let me create a password
if I want one.
~~~
arturadib
Thanks! I got several live demo requests. It's now in my to-do list.
------
sgt
Out of curiosity, what technologies are you using for Feedlooks?
~~~
arturadib
LAMP
------
pavs
Looks nice, the logo design could use some work.
------
pclark
the sign up link is too obscure
also, google reader integration?
~~~
arturadib
Hey, thanks for the feedback.
OK I gotta work on that signup link.
Currently Feedlooks can import your feeds from Google Reader. I don't know how
they'd feel if I constantly pulled content from their servers though.
------
wonginator1221
How about a live demo?
~~~
arturadib
That's a very good idea I somehow forgot about after a while.
Will probably implement soon. Thanks!
| {
"pile_set_name": "HackerNews"
} |
Facebook takes down ‘call to arms’ event after two shot dead in Kenosha - century19
https://www.theverge.com/2020/8/26/21402571/kenosha-guard-shooting-facebook-deplatforming-militia-violence
======
scohesc
Crazy that the Verge doesn't do enough fact checking when writing their
articles that they thought Jacob Blake was dead. It was common knowledge at
the time the article was written that he wasn't dead.
------
Buttons840
"The protests have incurred significant property damage, destroying a local
Department of Corrections facility on Monday night."
Does The Verge know the definition of _incurred_?
------
stickyricky
Word to the wise. If you haven't seen the videos (more specifically their
aftermath) I'd recommend you avoid them. I'm sure a jury will watch them
enough times for all of us.
| {
"pile_set_name": "HackerNews"
} |
Los Angeles learns to love its river - ColinWright
http://www.bbc.co.uk/news/world-us-canada-14690082
======
ColinWright
I wouldn't usually submit this sort of thing to HN, but I found it to be an
intriguing read. I've also lived in a city where the original river on which
it was founded had, and still has, completely disappeared.
It will be interesting to see if anything ever comes of this.
Quote:
That led to the first permits being issued, on a trial
basis, to lead kayaking tours down a mile-and-a-half-long
stretch.
...
The 280 tickets to join the limited number of kayak tours
sold out in the first 10 minutes. People kayaking down the
LA river Kayaking down the river is an opportunity to
explore nature in the heart of the city.
Those who snapped up a "golden ticket" were delighted to
get on the river, rather than just walk, bike or drive
past it.
| {
"pile_set_name": "HackerNews"
} |
Competitive lockpicking growing in US popularity - robg
http://www.boston.com/business/articles/2010/07/28/competitive_lockpicking_growing_in_us_popularity/?page=full
======
djacobs
One of the more striking points of this article (for me) was not so much about
lockpicking. It was this statement:
"Some lockpickers observe a code of responsible disclosure by providing
manufacturers information on weaknesses they discover in locks they defeat --
_just like responsible computer hackers do when they detect security flaws in
software_."
I'm thrilled to see a statement like this coming from the mainstream media.
~~~
baddox
Yeah, and both types of responsible whistleblowers probably end up getting
arrested.
------
proee
I'm surprised there are not more digitally controlled locks on the market -
something that has an embedded microcontroller that releases a solenoid if the
right code is entered.
What's a locksmith hacker to do with such a lock? There's no keyhole to use a
diamond pick and so its basically a metal brick. I don't see too many ways to
open it without destroying it physically.
Maybe I'm missing the big picture, but a traditional keyed lock seems about as
high-tech as an ancient model-T car. It's completely out of place given the
latest technology available today.
~~~
shabble
The big problem with digital and electronic locks in general is maintaining
the power source. Mechanical locks have extremely low maintenance
requirements, and could be left unattended for months or years without issue.
Even if they then stick, a quick shot of WD40 will usually allow entry.
Electronics, on hte other hand, rely either on external power, or some sort of
internal battery. A battery is ill-suited to heavy duty-cycling when the lock
will be opened/closed regularly, and an external source is potentially subject
to tampering.
There do exist many electronic locks, typically for fairly low-security shared
access doors, or where various additional requirements make them more suited
(such as easily rekeyable card-locks for hotel rooms)
There's an interesting article at
[http://www.wired.com/threatlevel/2009/08/electronic-locks-
de...](http://www.wired.com/threatlevel/2009/08/electronic-locks-defeated/)
regarding some work by Marc Weber Tobias and others in defeating hybrid
electro-mechanical locks and their built-in audit logs.
Electronic locks on the whole don't magically ensure security, and open up a
whole new set of attack surfaces, whereas mechanical locks have been around
for centuries, and have well-defined failure/exploitation modes.
~~~
sabat
Problem, yes. Engineering problem to solve. The real issue is that these
companies don't feel they need to innovate much, and so we're still stuck with
technologies invented in the 19th century.
~~~
jerf
Handwaving at a problem and declaring it's just an "engineering problem"
doesn't actually do anything to solve it... hey, wait, are you my manager?
The power problem is actually a big deal and shouldn't be minimized. Take the
hotel situation; what happens when the hotel loses power? You _can't_ have the
locks fail closed, you end up with people trapped away from their stuff.
Failing open is of course a bit of a problem, too. Locks by their nature tend
to congregate around things that are actually important so you actually have
some serious problems with a lock that is "down" even five minutes a year.
~~~
sabat
I'm hand-waving at it because this industry has had 40-50 years of high
technology at its beck and call and has done little or nothing with it. This
_is_ an engineering problem, and making excuses for them ("Failing open is of
course a bit of a problem, too") does not change the reality. They have failed
to innovate, and the world is going to pay for that. The power problem? So
don't use traditional power: experiment with something else. Try. They've had
half a century, at least. If that industry had tried at all, it would've come
up with more than this.
~~~
jerf
You deny my point, then just go on to reinforce it. The lock industry should
just create a new magical power source? You just moved around the "mere
engineering problem" label but if anything you've made your problem worse by
being more clear about what you want to have magicked into existence, not
better.
------
piramida
Non-destructive lockpicking is a sport these days; burglars would use bumping
or other destructive technique like crowbar (with a much shorter path to
success) since they won't care about the clean result. Maybe only relevant for
spies/intelligence/other areas where you need to hide the fact that the lock
has been picked.
And the fact that weak lock mechanisms are publicized encourages manufacturers
to invent, it's all good.
~~~
blhack
I'm sorry, but this isn't completely true. (The part about burglars not using
lock picks).
I am an amatuer locksmith, and I can open Masterlock No. 3 or No. 5 (which are
used _everywhere_ ) incredibly quickly (less than 10 seconds, typically
[especially on No. 5, which are horrible).
A half diamond pick and a torsion wrench are tiny, I can keep them in my
pocket and nobody will ever notice... I can't do this with a huge bolt cutter.
Now, do I steal things? Absolutely not. Has getting into picking caused me to
be much much more careful about what I lock up, where, and with what?
_definitely_.
I'm all for locksports, I think the fact that people are getting into picking
is awesome, but the idea that using a bolt cutter against a padlock is faster
and more conveinient than using a pick is just plain wrong.
~~~
aquateen
I remember first seeing the MIT guide and it sparked my interest, however I
didn't want to make homemade picks. Can you recommend a good lock pick set?
~~~
bmalicoat
I have this set [1]. Though mine has a plastic handle so it was about half the
price listed there. It's a nice set, quite small and very pocketable.
There's something deeply satisfying about picking locks, hearing each pin tick
and feeling the barrel give just _a little_ bit more than the last time you
torqued it. I love it.
[1] [http://www.southord.com/Lock-Picking-Tools/Jackknife-
Pocket-...](http://www.southord.com/Lock-Picking-Tools/Jackknife-Pocket-Lock-
Pick-Sets.html)
~~~
blhack
Ha! YES! That little snapping feeling. I still remember getting my first lock,
:). I was on the phone with a friend and just raking the crap out of it until
finally _POP_.
She did not understand my excitement.
| {
"pile_set_name": "HackerNews"
} |
Asshole x software = Asshole at scale - hermitcrab
http://successfulsoftware.net/2013/07/14/asshole-x-software-asshole-at-scale/
======
dethtron5000
Another use case that the author doesn't go into is the proliferation of
penetration/injection/other security attack scripts that allows people to
throw a battery of common attacks against dictionaries of sites. That's
allowed malicious people to be malicious at scale.
------
quchen
I wonder what state of mind suggested throwing "asshole" around all over the
place leads one to think it's a good stylistic device for a semi-technical
article. The text feels like it's written by a 3-year-old just after learning
a forbidden word.
~~~
acuozzo
Don't be an asshole.
| {
"pile_set_name": "HackerNews"
} |
Scientists 'may have crossed ethical line' in growing human brains - nnx
https://www.theguardian.com/science/2019/oct/21/scientists-may-have-crossed-ethical-line-in-growing-human-brains
======
nsonha
even a full brain is just a computer without memory, ethical what
| {
"pile_set_name": "HackerNews"
} |
Sony Shuts Down PlayStation Network Indefinitely - pwim
http://blogs.wsj.com/japanrealtime/2011/04/26/sony-shuts-down-playstation-network-indefinitely/
======
wmf
While it's true that Sony hasn't given a definite promise for when PSN will be
back up, I don't think "indefinitely" gives an accurate impression — they're
still saying that they're trying to get back online as soon as possible. So
there's really nothing new in this article (and it's self-blogspam as well).
------
bluedanieru
So does this lend credence to the theory that the attackers compromised the
network to the point that they were able to install compromised firmware on
users machines?
~~~
ares2012
If they didn't I imagine that Sony is afraid that they could have. I'm more
curious if credit card numbers etc. were stolen...
| {
"pile_set_name": "HackerNews"
} |
The hackers hacked: main Anonymous IRC servers seized - thornjm
http://arstechnica.com/tech-policy/news/2011/05/the-hackers-hacked-main-anonymous-irc-servers-seized.ars
======
joshes
The tl;dr of it all is that, according to at least one Anon, this "Ryan"
fellow was a former moderator of the IRC and was the legal owner of the
AnonOps.ru and AnonOps.net domains. Apparently, two others, "Nerdo" and "Owen"
(whom you may remember from the HBGary fiasco), revoked his IRC credentials.
Ryan somewhat predictably responded by DDOS'ing (with help from 808chan) and
essentially taking his domains and going home. Some Anons responded by getting
"Ryan"'s docs and now it's all just a bunch of circle jerking.
~~~
citricsquid
It's as if you just described the entire "Anonymous" thing in one simple
sentence fragment:
> it's all just a bunch of circle jerking.
------
GoodIntentions
Reading that article brought to mind a sarcastic question I heard addressed
from a skin to a young punk decades back:
"So who is in charge of this whole anarchy thing anyway?"
~~~
gcb
You can only hear that from someone that still mix up anarchy with chaos.
a good example to end this discussion quickly is to point that international
law is anarchy, and is pointing to a pretty stable direction. And I do not see
anyone claiming for a global earth goverment. just see how little UN has to
say in anything.
~~~
udoprog
Well little is a relative term. UNs had a big impact on politics in my
country. I also found the quote a pretty amusing and quite valid tidbit, given
that Anarchy simply means a gov. without ruler.
~~~
orblivion
But, membership in the UN is as of yet voluntary, yes? Membership of states in
the US, for instance, is not.
~~~
udoprog
It was just a comment. I did not disagree with international politics being an
anarchic system contrary to chaos. Just the UN bit. I do in fact see it as a
very clever observation.
~~~
gcb
The UN is just a face to the power. Do you think the global nations agreed on
Israel for example? No, the powerful nations decided, UN just delivered the
news.
Of course UN has some power. but it's mostly a messenger.
------
jrockway
Lesson learned today: if you're going to commit crimes, you'd better trust
your co-conspirators.
Follow-up lesson: turns out that random people on IRC are not automatically
trustworthy.
Follow-up follow-up lesson: use Tor.
~~~
iwwr
Tor is far from safe, especially if your opponent has the ability to
intersperse a majority of treacherous nodes into the network.
~~~
jrockway
I don't know if that's something to be worried about or not, but it just seems
like common sense to try and cover your tracks if you are doing something that
The Authorities don't approve of.
Sure, Tor might be broken (though there is no evidence of anyone getting in
trouble for doing something through Tor), but it might also not be broken. We
don't know. We do know for sure that when your IP address is 1.2.3.4 in the
logs, they are going to call your 1.2.0.0/16's ISP and be on your doorstep in
hours.
To be honest, I guess it's good for society that criminals are so stupid. The
downside for me is that I don't get to read anything interesting when the
media covers these stories -- all I get is "we got a bunch of IPs and people
using their real names to harrass Sony executives' kids".
------
sc68cal
I guess someone decided to ride the split?
<http://en.wikipedia.org/wiki/Internet_Relay_Chat_takeover>
~~~
yurisagalov
IRC operators and Channel operators are very different.
IRC servers have IRC operators. They are volunteers who make sure that the
server remains connected to the network (They can split/reconnect leaf nodes
and hubs to/from other servers based on pre-defined rules in the IRC daemon's
configuration. This allows you to rebalance the network, and reconnect servers
if a central hub goes down/becomes unresponsive). They are also in charge of
"policing" the network, they have the ability to kill (ban) users who
misbehave, re-assign control in channels which are "taken over", and so on.
I've never been on Anon's IRC network, but most IRC networks these days use a
"network services" scheme to automate the policing of channels (e.g.
ChanServ/NickServ on DALnet/Freenode/Other networks, X/W on Undernet. They are
essentially sophisticated robots that have IRC-operator priviliges. They can
make someone a channel moderator, automatically ban users by ip/hostname/etc,
as well as numerous other functions... I believe EFnet is one of the few
"major" networks that doesn't have a services scheme). In any case, a channel
takeover, or what this wiki entry referrs to as internet relay chat takeover,
can only happen temporarily. Most servers will reset the channel to pre-split
conditions upon reconnection. Moreover, any IRCop can reset the channel's
operators/moderators/numerous other settings.
The problem in this case was that an IRCop misbehaved, not a channel operator
:)
(I grew up on IRC...can you tell? ;)
edit: I'm aware I'm not using proper terminology for most of these things;
this is on purpose.
~~~
shii
Definitely. Good ol EFnet has always been great about having lax rules.
------
getsat
SmilingDevil -> owen: :P we need a hidden irc server for the admins.
Why not run their network inside I2P or something similar?
~~~
marshray
Probably some are, but the only ones we tend to hear about are those which are
not. The more visible ones are also likely to have the most and loudest
followers.
------
BasDirks
Am I the only one thinking this is all just smoke and mirrors?
~~~
pjscott
I was going to go with "sound and fury, signifying nothing," but smoke and
mirrors works, too.
Anonymous is chaotically aligned. Should it come as any surprise that their
innards are equally tumultuous?
------
hm2k
reading this is like "when news isn't news"
| {
"pile_set_name": "HackerNews"
} |
Interview with Rob Pike on Concurrency/Parellelism (Video) - m0nastic
http://www.infoq.com/interviews/pike-concurrency
======
m0nastic
Oops, sorry, what I thought was a transcript was just links to that section of
the video (updated the title to remove "with transcript")
~~~
tsuyoshi
You can see the transcript by clicking on "Full Page Transcript"
| {
"pile_set_name": "HackerNews"
} |
Ask HN: Should I use Docker? - hacknrk
I am building an internal server for my company in Flask. As of now I have successfully deployed it to a Digital Ocean droplet, configured nginx and WSGI and got it running. Another developer is building a React app to interact with my server's API which I think I will deploy on the same droplet too. Because it's just an internal app, I only use one droplet. I don't know whether I should use Docker to containerize both the server and client apps or just put them on the same machine as two monolithic applications. I heard the good practice these days is to use Docker and microservices but I don't want to overengineer things.
======
allsunny
There will be a bit of "yak shaving" up front to get it working in the
container but I think it's probably worth it over the long run. The main
benefit is that you can be sure that the environment you develop in locally
will be the same as what is deployed in the wild. As you share your
code/application with other developers (which it sounds like you're starting
to do) this will become more and more important. Just make sure you're writing
your application to be "cloud native" up front (e.g. put your configuration
parameters in environment variables)
------
atsaloli
Have you got any problems with your current setup?
~~~
hacknrk
Currently no, but I want to structure it in a maintainable way.
~~~
atsaloli
I understand. Still, if it ain't broke...
Check out Max Kanat-Alexander's piece on over-engineering (10 minute Google
video)
[https://www.youtube.com/watch?v=0wxyOng0-14](https://www.youtube.com/watch?v=0wxyOng0-14)
In other words, if you're not having maintainability issues with it now, leave
it be... once you start having issues, you can re-design (when you actually
need it). =)
| {
"pile_set_name": "HackerNews"
} |
The best data visualisation I've ever seen - rudenoise
http://brendandawes.posterous.com/the-best-data-visualisation-ive-ever-seen
======
TeMPOraL
Great idea. Thanks for posting this!
Reminds me of an advice my friend gave me once. I was writing a small game
with a ball flying between planets in 2D space. Sometimes the ball would
travel outside of the screen boundaries. I used to draw a marker on the proper
side of the screen to point to where the ball is. The friend suggested much
better idea - a circle centered on the ball should be drawn, with radius big
enough to make it visible on the game screen. The continuous change of the
curvature and length of the visible part of the circle provides feedback on
the ball-to-screen distance in the same way that, in your example, hand
gestures can provide information on the distance between the car and the wall.
Screenshot:
[http://temporal.pr0.pl/devblog/download/projects/ClozeCall/s...](http://temporal.pr0.pl/devblog/download/projects/ClozeCall/screenshot-
marker.jpg)
Note the part of the circle visible near the bottom of that picture.
~~~
hammock
That is a much better solution than the "marker" or arrow approach that I've
seen in many video games. The arrow approach basically only gives directional
information, doesn't offer much feedback in terms of distance from the edge of
screen.
------
BigglesZX
I too have seen this before, but I believe the point that the author was
making was an observation of the hand signal's simplicity.
It's an unabiguous indicator of the physical situation he's observing, and
doesn't involve any added complication of an ad-hoc signalling system (like
waving for "come on" or "slow down" or "left/right", which are often somewhat
ambiguous or at least require a second or two's thought).
A fleshy progress bar, if you will!
------
joezydeco
I'm guessing the author has never watched an aircraft being guided into it's
parking spot at an airport. The ground crew does the same thing with the
handheld cones/flashlights.
------
mtarnovan
Seriously ? This is something that I've been doing all the time when I assist
someone in parking in a tight spot.
------
sandstrom
I agree, it's an excellent example of good visualization. My dad taught me a
few years ago, it's very effective.
| {
"pile_set_name": "HackerNews"
} |
The Super Productive Programmer - andrewtbham
http://seriouslackofdirection.blogspot.com/2012/11/the-super-productive-programmer.html
======
lmm
My experience is that we validate our assumptions when debugging far less than
we should. Most of the time your assumption can be tested very trivially,
while you can waste a huge amount of time if it's wrong.
| {
"pile_set_name": "HackerNews"
} |
Automattic trial data and employee retention - krogsgard
http://www.poststat.us/automattic-trial-data-employee-retention/
======
x0x0
I still think it's weird.
0 - they claim this can be done around a fulltime job, but some people in the
thread disagree from experience. Plus, I have a very fulltime job, and
particularly come winter, I am busy every single weekend. Your job <
snowboarding. In fact, your job <<< snowboarding.
1 - $25/hour is almost worse than $0; it's a fraction of my consulting rate.
2 - I, like many engineers, am not hurting for job opportunities at the
moment.
------
jds375
Interesting concept to implement company-wide. It's much like having an intern
and then giving them a full-time offer afterwards.
~~~
krogsgard
Automattic is the first non-freelance job for many of their employees, but
most of them are hardly entry-level like an intern. It's pretty widely
considered the premiere place to work in the WordPress ecosystem, given they
maintain WordPress.com and their employees are responsible for a considerable
amount of the development to the .org project as well.
| {
"pile_set_name": "HackerNews"
} |
Show HN: StatusNotify monitors status of 250+ cloud services - kamizoo
https://statusnotify.com/
======
QuinnyPig
Does this just scrape the AWS status page, or is it getting something that’s
indicative of failure sooner?
| {
"pile_set_name": "HackerNews"
} |
Ask HN:Kindle Popularity and the affect of physical books - pedalpete
Has anybody else noticed the cost difference between physical books and kindle books on Amazon seems to have shrunk significantly?<p>As an example, Guy Kawasaki's book
Enchangement is more expensive as an e-book than a physical book.
http://www.amazon.com/Enchantment-Changing-Hearts-Minds-Actions/dp/1591843790/ref=sr_1_1?ie=UTF8&s=books&qid=1298425537&sr=1-1<p>Was this inevitable??
Do you think we will likely continue to see an increase in the price of e-books?
======
mechanical_fish
Ebooks and print books have different markets. Ergo, we should expect pricing
to be correlated, but different.
Consider: The economics of producing a hardcover book and a trade paperback
are not as different as their prices suggest. The hardcover costs a bit more
to print, but not significantly much more, because most of the cost of
producing a book is in the writing and editing and marketing. The difference
between hardcover and paperback is an artificial marketing distinction:
Hardcovers seem more substantial, and (more importantly) they come out
earlier, so they sell to the people with more money than patience and with a
taste in bookbinding. They are therefore priced higher to take advantage of
those folks' willingness to pay.
I suspect that so long as e-readers cost hundreds of dollars (and, more
importantly, e-books have DRM and can't be borrowed or resold) they will
naturally tend to be priced like hardcovers, or worse.
| {
"pile_set_name": "HackerNews"
} |
Let's Talk TED Talks - johndbritton
http://johndbritton.com/2011/10/27/lets-talk-ted-talks/
======
johndbritton
tl dr; TED Talks spark discussion, let's watch some together and discuss. The
group will be facilitated by a program.
------
andrewmwatson
Sounds like an awesome idea! A TedXViewingParty!
~~~
growdetroit
Great, great, great idea. I'm in.
------
thekevan
I'm interested and just signed up. Thanks!
| {
"pile_set_name": "HackerNews"
} |
US Coast Guard won't see paychecks due to government shutdown - mariuolo
https://www.militarytimes.com/news/pentagon-congress/2018/12/28/coast-guard-wont-see-paychecks-for-several-more-weeks-as-shutdown-continues/
======
imroot
What's interesting is that normally, USAA (and other banks that tend to cater
to government employees) will offer 0% APR loans to those who are impacted by
this.
There have been quite a few reports of USAA not offering loans to those who
are affected by this -- and other credit unions (NFCU) only offering $1000 as
a quick loan...
If the banks don't want to deal with the risk of this until the shutdown is
over, this makes me believe that the shutdown will last a while.
Interestingly enough, Congresspeople's staff are not getting paid during this
break as well -- but the congressfolks are.
~~~
AndrewKemendo
I am a USAA member and think this is because the military is not losing pay or
being furloughed. The DoD is fully funded in this partial shut down.
USAA and NFCU, while they do serve government employees, primarily cater to
the DoD with these types of programs.
------
myrandomcomment
This is wrong on so may levels. Congress should not see a cent if everyone
else is not getting paid.
~~~
max76
The partial goverment shutdown is caused by the president's unwillingness to
sign a bill as well as Congress's inability to pass a bill the president is
willing to sign.
The defused blame sets the game matrix to a state where the delta value
between the bill congress agrees on and the bill the president will sign is
significantly larger than the defecting penalty any oneside side will suffer.
Removing a paycheck from all actors won't provide a significant adjustment to
the game matrix, because the reputation deduction portion of the the defector
penalty is significantly more valuable than salary. Some actors actually see a
reputation increase for fighting this fight.
While increasing the defector penalty is a good idea, reduction of salary
doesn't increase it much.
~~~
gammateam
> The partial goverment shutdown is caused by the president's unwillingness to
> sign a bill as well as Congress's inability to pass a bill the president is
> willing to sign.
you forgot: or pass a bill the president can't sign, by overriding a veto
but that also requires even greater consensus than Congress can currently
achieve.
~~~
stephenboyd
The Senate unanimously passed a budget bill to extend current funding levels
into February. It had a good chance of veto-proof supermajority support in the
House, but the outgoing Speaker of the House refused to bring it to a vote.
------
Jedi72
I wonder what's going to be more effective - building the wall, or paying the
people employed to guard the border?
------
pbalau
Maybe it's the time for us to get a RNLI?
~~~
gerdesj
You might want to drop the R bit but actually the same org works across both
the UKoGBnNI and the Republic of Ireland in a rare example of pragmatism.
The US Coast Guard has a rather different remit to the RNLI which is devoted
purely to rescue. I believe the USCG has other duties as well. Contrast:
[https://www.uscg.mil/](https://www.uscg.mil/) and
[https://rnli.org/](https://rnli.org/)
The UK and Eire have a huge coastline relative to their land area and the RNLI
are a treasured institution. Mostly staffed by volunteers and financed as a
charity. We also have a Coast Guard which is actually responsible for search
and rescue at sea. It's a little bit complicated but you will be pulled out of
the water by a very highly trained civilian volunteer.
There is no reason not to start a non military ANLI. The RNLI already have
boat designs that are proven and a operational model that is also proven. Just
copy it.
~~~
ryacko
There was one.
[https://en.m.wikipedia.org/wiki/United_States_Life-
Saving_Se...](https://en.m.wikipedia.org/wiki/United_States_Life-
Saving_Service)
~~~
gerdesj
Then this happened:
[https://en.m.wikipedia.org/wiki/Coast_Guard_Act](https://en.m.wikipedia.org/wiki/Coast_Guard_Act)
You (US) have made your choice on how you want to be rescued at sea and we
have made ours. They are simply different models on how to do it.
~~~
dingaling
The UK didn't really make a deliberate 'choice'. The RNLI evolved to fill a
need that Government wasn't funding; the Coast Guard is only two years older
than the RNLI but was formed to prevent smuggling and to protect _shipwrecks_.
Once the RNLI was founded as a charity there was of course no pragmatic reason
to dedicate tax money to that mission, so here we are today. The contracted
Coast Guard helicopter pilots on £150k each hovering beside a lifeboat staffed
by volunteers. Whilst the paid RNLI executives sleep.
Something's not right there and that's not a model I'd encourage others to
adopt. If maritime rescue is considered worthwhile then it should be
professionally rewarded, and at all levels.
------
Bodhisattya
A president holding the government hostage to its people....... Just wow.
| {
"pile_set_name": "HackerNews"
} |
How Robber Barons hijacked the "Victorian Internet" - alecco
http://arstechnica.com/tech-policy/news/2009/12/how-the-robber-barons-hijacked-the-victorian-internet.ars/1
======
nickpinkston
Why is no one here mentioning plug-in laws? With proper governance (ie: laws)
we can remove the market externality that exists in the natural monopoly of
telecom infrastructure. These laws force all infrastructure owners to sell
access at bulk rates (like a T3) that allow new ISPs, etc. without any burdens
(ie: throttling). Most people would pick the independents without
restrictions.
Net neutrality, as it's currently setup, makes it too easy for companies to
influence the law. Plug-in laws are at work in many developed economies, and
are more subject to market forces due to the competition for bulk rate
product.
------
javert
I smell a straw man here.
All the problems mentioned arose because WU was a monopoly. But, why was WU a
monopoly?
Telegraph lines could only be installed profitably along railroad lines. Thus,
the railroad companies could create a situation where there could only be one
telegraph company--a monopoly.
Why could telegraph lines only be installed profitably alongside railroad
lines?
Well, one could lay telegraph lines through the countryside fairly cheaply,
but the problem is: high taxes on the land you're using, government not
allowing you to bury lines below roads and other obstructions, and similar
_regulatory_ issues.
In other words, there were no non-regulatory reasons one couldn't set up a
competing telegraph company (at great profit, if it's true that WU charged
exorbitant prices and spied on your messages).
Likewise, in the modern telco industry, there are _government-granted_
monopolies to certain companies like AT&T and Time Warner through regulatory
means. E.g. typically, only one company is allowed to install communication
lines in a given area.
Doing away with government-granted monopolistic regulations is the solution.
Consider what happens if the other route is taken.
The other answer is to have government more heavily regulate the existing
monopolies - which _will_ lead to abuse and corruption. If you allow for
excessive regulation, you have the recipie for the problem cited in the
article: government and certain companies will conspire with each other, to
everyone's detriment. It's already happening with AT&T and the US government
(consider the extra/quasi-legal spying AT&T has done for the government), and
it _will_ get worse under net neutrailty.
~~~
pradocchia
> Doing away with government-granted monopolistic regulations is the solution.
I have no prescriptions, but I do observer that the grantor and grantee are
typically two hands of the same will. That monopolies are granted because _the
grantee wants it_ , and has found ways to make it so. How do you do away with
that?
Capitalism is premised on the concentration of wealth to fund capital-
intensive investment. Given the concomitant concentration of power, how do you
prevent regulatory capture and the general perversion of government? How do
you dilute power and preserve the system?
~~~
anamax
Of course the grantee wants it. However, if there's no grantor, it doesn't
matter what the grantee wants.
> Given the concomitant concentration of power, how do you prevent regulatory
> capture and the general perversion of government?
A govt that doesn't regulate isn't subject to regulatory capture. A "not govt"
that tries to regulate can usually be ignored.
~~~
pradocchia
I don't see how this answers the question.
There is nothing to prevent a sufficiently influential grantee-to-be from
creating a grantor. In fact, I believe this is the origin of many regulatory
bodies and government powers.
------
steveklabnik
Very cool article. As someone who's very much for small gov't, net neutrality
has been a really hard issue for me, personally, as it's making another law to
ensure more freedom? Those two concepts are kind of hard to fit together
sometimes.
~~~
RyanMcGreal
> making another law to ensure more freedom? Those two concepts are kind of
> hard to fit together sometimes.
Really? What do you think guarantees freedom, if not the rule of law?
~~~
gojomo
Laws enforced against deceit and theft and murder help freedom. Laws dictating
what's legal to sell, at what price, not at all.
The FCC that would enforce "neutrality" also enforces "indecency" rules and
has in the past required a minute-for-minute accounting and balance of
political expression -- the "fairness doctrine". There is reason to doubt
whether neutrality laws would be freedom-promoting or welfare-promoting, in
the long run.
How well did "rail neutrality" work, in the long run? See:
<http://www.nytimes.com/2006/08/03/opinion/03lee.html>
~~~
weavejester
> Laws enforced against deceit and theft and murder help freedom. Laws
> dictating what's legal to sell, at what price, not at all.
Laws are far from the only way to restrict what is sold to the public. Large
corporations can leverage their market share to shut down competition in other
areas. In order to maintain a healthy market place, you have to ensure that a
market is not completely controlled by a few large corporations.
~~~
dpatru
A simple way to do this would be to limit some of the advantages of a
corporation, which is itself a state-created entity. I've no problem with
government limiting the freedom of its own creation which enjoys unlimited
life, limited liability, tax advantages. I do have a problem with government
restricting the freedom of individuals and partnerships to contract freely in
the marketplace.
~~~
weavejester
I think the problem still remains; a free market does not necessarily mean it
is an optimum market, and the government is not the only factor that can
adversely affect a marketplace.
------
chrischen
"Freedom is not a zero sum game, where taking it away from some gives more to
others. Taking away freedoms of some takes away freedom from all."
I wonder how he'd feel after we make murder legal, and then I shoot him in the
face. Have him see how much freedom he has when he's dead.
My point is that it's a gray area. It's not all freedom or nothing.
~~~
gills
Some might see your analogy as backwards, especially if they view individual
freedom as having natural bounds which are easily identifiable to mentally
stable humans. I have a feeling that's why you were voted down (not by me,
sorry). An example of this line of reasoning:
<http://en.wikipedia.org/wiki/A_Theory_of_Justice>
| {
"pile_set_name": "HackerNews"
} |
Google fired engineer for breaking internal privacy policies - cristinacordova
http://techcrunch.com/2010/09/14/google-engineer-spying-fired/
======
thesethings
I'm going to temporarily put aside what this guy did (which is really bad, but
people with bad intent aren't common), to discuss what this tells us about
Google (which is about The System, and cause for larger concern).
If anybody from Google can (anonymously if necessary) step in and answer
questions, it'd be great.
* Different gmail accounts. Google knows they're all you.
In the original Gawker story, this caught my eye:
"...pulled up the person's email account...[and] a list of other Gmail
addresses that the friend had registered but didn't think were linked to their
main account—within seconds"
Keeping separate Gmail accounts is how many protect against "Google knows
everything about me." In fact on Google's "What Google knows about you" page,
it never crosses accounts (unless you've manually connected them). This story
basically tells us the "What we know about your account" page is a bit
misleading. Of course most folks in IT know it's a bit naive to think one
could never figure out that different gmail accounts are related. But it was
interesting that Google pretty formally knows the relationship, but doesn't
tell you right where it should.
* SREs, and their level of access.
It's not so much that I care is a specific group has lots of access. I care
that not that many groups do in total. This story makes me concerned that
actually many groups have lots of access. Despite the "elite navy seal" vibe
presented in the Gawker story about SREs, I'm now thinking that many, many
teams have this kind of access. (Previous to this story, I was led to believe
that SREs were quite low level (not in importance. but in nature of
responsibilities. Very performance oriented, having little reason to have
access to an individual user's data.).
Please feel free to jump in and correct this, Google peeps. It would make me
feel better.
* What this does for SaaS and web apps in general
I love Google Docs and sincerely believe that most web apps that allow across-
the-net collaboration are good for us. And are preferable to The Old Way. I
want people to TRUST their stuff to Google (and Github and Amazon, etc).
I hate security FUDers who love to derail conversations of great possibility
with some far out scenario, "Can my enemy see my Google Docs?!?!"
I'm way less worried about a few creeps who work at Google (they work
everywhere...) and more concerned about laissez-faire access processes.
~~~
nl
_"...pulled up the person's email account...[and] a list of other Gmail
addresses that the friend had registered but didn't think were linked to their
main account—within seconds"_
This surprised me too. In the absence of any further comment from Google, I'd
be very interested to see some journalists doing some investigation here.
Assuming that this is real and not mis-reporting or user error, I'm guessing
Google links using either their google.com cookie, IP address and/or browser
identification. Any of those methods have potential for errors (in particular
they mean you should never share a _browser_ with another person in case your
account ends up linked. That seems.... extreme..)
~~~
heinel
Not a journalistic investigation, but a while back I decided that I need a new
gmail account. I signed it up using some different credentials, including a
different name. However, I did not mention my old gmail account in the entire
sign-up process. After I activated my new account, I got an email on my old
account referencing the new address I just signed up for and a verification
code "in case something happens."
From this it seems to me like this is not a deliberate maneuver to deceive,
but rather just an oversight.
~~~
nl
I have a second gmail account (in the olden days that's what they recommended
on <http://code.google.com/apis/gadgets/docs/publish.html> \- I see now that
they have switched to using filters), and this didn't happen to me.
Are you sure you didn't use the first gmail account to send an invitation?
Because in that case it does add the address to both accounts address books.
------
cperciva
He was fired? That's all?
From all reports, it seems that this Google employee accessed data which he
knew he had no authorization to access. That sounds like a textbook case of
computer crime -- why hasn't he been arrested yet?
~~~
pvg
He did have authorization to access it. He didn't have authorization to abuse
it in the way that he did. It's all kinds of icky but what do you think was so
obviously criminal about it that you expect him to be in jail?
~~~
cperciva
Unless Google's policies were written by bungling idiot, Barksdale would have
authorization to access _information required for him to fulfill his duties_.
The information he accessed very obviously goes well beyond such
authorization.
~~~
pvg
Well. We can get into a silly discussion about what 'authorization' means, I
just don't understand why you find this so obviously criminal. Remember these
idiots -
[http://www.pcworld.com/article/154392/snoopy_verizon_employe...](http://www.pcworld.com/article/154392/snoopy_verizon_employees_fired.html)
Didn't get charged, let alone arrested, either.
------
tptacek
Regardless of how Google is playing this in the press, the question people
need to be asking isn't about the rogue employee. It is: "what are the
controls being put in place to prevent SRE's from accessing sensitive data
inside Google apps, and what specific forms of information is Google
considering sensitive for those purposes, and is there a class of employee at
Google that is expected to be exempt from these controls?"
~~~
btilly
And Google has answered that question. See
[http://techcrunch.com/2010/09/14/google-engineer-spying-
fire...](http://techcrunch.com/2010/09/14/google-engineer-spying-fired/) for
the following passage:
_We dismissed David Barksdale for breaking Google’s strict internal privacy
policies. We carefully control the number of employees who have access to our
systems, and we regularly upgrade our security controls–for example, we are
significantly increasing the amount of time we spend auditing our logs to
ensure those controls are effective. That said, a limited number of people
will always need to access these systems if we are to operate them
properly–which is why we take any breach so seriously._
I would assume that the logs he is talking about are logs of accesses made by
Google employees to data covered by the privacy policy.
(Disclaimer, I am an SRE at Google. I do not speak for Google.)
~~~
tptacek
First hit: [http://jobs.metafilter.com/173/Site-Reliability-Engineer-
at-...](http://jobs.metafilter.com/173/Site-Reliability-Engineer-at-Google)
Required Skills/Qualifications:
* BA/BS in Computer Science, MS or PhD is preferred.
* 0-15 years experience.
* 3+ years developing web-based applications.
~~~
btilly
You left out most of the credentials that were listed in that ad. And I don't
think that anyone believes that every SRE who has the paper credentials gets
hired.
Also most SREs don't get access to the same things that this guy did. (What
you get access to depends on what you're working on.)
~~~
tptacek
The rest of the credentials were skills-based, except for that last one, which
suggested that some management skills would be a nice-to-have. Do you take my
point about how "SRE" isn't a very strong answer here?
~~~
btilly
I think you don't know what you are talking about here.
It is like someone seeing an ad for entrepreneurs that says, "Willing to work.
Willing to take risks. Strong computer skills a significant plus"." And then
concluding that the bar to being a successful entrepreneur is very low so they
should be dismissed as a group.
Becoming an SRE is much, much harder than just having the credentials you
listed. Being an SRE generally does not give you full access to everything at
Google. I never met this one, so I don't know what his role was or why he was
given that level of access. But that access really isn't something that just
gets handed out to people off the street.
The fact that you found that ad, and that Google screwed up this particular
case, doesn't say that Google doesn't limit who gets access to sensitive data.
~~~
tptacek
I think you're extrapolating too much out of my comments. I'm saying that "SRE
is an important job" doesn't answer the concern. I'm not surprised that Google
has controls beyond "you're an SRE, you can do whatever you want" --- in fact,
I'd be shocked if they didn't. But it sure sounds that way from the story that
just broke yesterday.
------
jacquesm
At first glance, google comes off pretty good on how they dealt with this, but
you have to wonder how come a single engineer has access to google voice _and_
google mail and IM data of end users. SRE's as these employees are labeled
(site reliability engineers) are 'highly experienced engineers who can be
trusted'.
It goes beyond just snooping too, apparently this guy changed end-user
settings which had specifically made to lock him out, and spent a lot of time
and effort to use his position at google to achieve real world effects with
the people he was snooping on.
This guy has a serious case of sysadmin god complex and while I'm really not
sure if it is ok for him to be exposed with name and picture I hope he'll
never be in a position of such responsibility again, and I hope that google
will perform better oversight of the people that have access like this.
The only thing that got the ball rolling here was the parents of some of the
kids alerting google.
~~~
yrb
I got the impression that SRE basically have low level access to the storage
stack. So wouldn't be subject to most of the normal application level logging
that I would assume would red flag this behaviour pretty fast.
The only way to get around this is to have someone audit _all_ their actions
constantly, which you need someone equally or more familiar with the systems
they are working with.
I think that is pretty impossible to implement that level of overview with
humans, the best way to go normally is the 'buddy system' so no one can access
a system unless they have a 'buddy' with them. Like the military do in nuclear
weapon silos.
~~~
jacquesm
Access to the low level storage stack would not allow you to query with so
much detail and would likely not have an interface that would allow you to
modify user settings at will. So he must have used some higher level tools.
~~~
birken
Well it depends.
For example if an application uses Bigtable, then the key + column names often
gives a lot of information about what data is stored there, which if somebody
had access to some basic application data they might be able to get at
somebodies specific data.
However as you might expect there are many safeguards in place, including
ensuring every action is fully and securely authenticated so even low level
SREs cannot read application data without a paper trail. This story is pretty
surprising to me, and if true this guy is an idiot.
------
robk
This is pretty serious and the fact it's turned into a story is one of the
more damaging things you could expect to see about Google w.r.t. privacy. SREs
are indeed very privileged and in many cases have carte blanche on their
associated products. It's saddening one of them used his rights for nefarious
purposes and broke some of the trust around Google's handling of personal
data. I hope this leads to better auditing at least internally - seems like
something that better transparency of access would have brought to light
earlier.
~~~
Kadrith
While it is no guarantee of any change I like that they are not attempting to
sweep this under the rug. There are a lot of companies where people have
access to a lot of sensitive data. All you can do is screen the employees,
limit their access where possible and audit their use of the security.
But then someone needs to audit the auditors. Just before I started here we
used to have an employee who would look in the Oracle database used by Lawson
to check payroll data. Nobody knew for a long time since he was the UNIX admin
and DBA.
~~~
jacquesm
I don't know where 'here' is but you might want to edit that comment.
------
js2
I'm not a big fan of Gawker, but why not link to the original story instead of
the meta-story?
<http://gawker.com/5637234/>
~~~
epi0Bauqu
Because HN auto-banned it: <http://news.ycombinator.com/item?id=1692807>
~~~
Anechoic
That link just goes to a empty HN page
~~~
epi0Bauqu
Turn on showdead.
------
nkassis
I think google manned up well on this one. They will always have this problem.
At least it seems they have less (that we know off) incidents than the
government does. It's pretty incredible how many stories of government
employees snooping (even selling it to organize crime) information stored in
their databases.
~~~
jacquesm
That was my first take as well, but after reading up a bit on it it seems that
they tried to make it go away by not charging him, when if you look at the
severity of this case they had every reason to.
So they tried to sweep it under the rug by just letting the guy go.
If an employee of mine had ever snooped on end-user data and would have used
that data in order to get real-world effects in the lives of those users I'm
fairly sure I would have registered a complaint with law enforcement.
Google has their 'image' to be aware of, but in this case just letting the guy
go may not be the best way to preserve that image.
~~~
jonknee
Not that I have any information, but it could be that the parties affected did
not want to pursue legal action. All we know about the story is a quote from
Google and a speculative article from Gawker.
------
lippe_maia
this isn't that surprising. this stuff happens all the time at any company
that has that many employees. a person i know who is a software developer at
facebook told me that everyone there looks at people's private stuff and reads
people's private messages when they want to and you just have to be discrete
about it so that no one (i.e. users) notices.
~~~
enneff
I can tell you that it does NOT typically happen at Google. If you so much as
joke about this stuff people will give you negative reactions. I was genuinely
shocked to read about this today as I never would have expected any Google
employee to be so unethical.
If what you say about the practices at Facebook is even remotely true then it
is disgusting and shameful behaviour.
------
brisance
"For evil to flourish, all that is needed is for good people to do nothing."
-- Edmund Burke.
Google's mere dismissal of the guy comes across as pretty evil. According to
the article, there was a previous instance of malfeasance. If the bad PR
behind all these privacy breaches were taken more seriously, Google would
probably have to clean up their act and users would benefit as a result.
~~~
cdibona
Wait, are you saying that we should be reacting to the PR (we didn't, he was
let go some time ago) or to the act? I would always rather we react
appropriately to the act. (disclaimer, work at google, blah blah blah)
------
stevefink
I'm impressed with how transparent Google was with handling the issue.
Unfortunately, things like this can and will occasionally happen. You can
either put up your own Postfix server if you do not like it - or you can thank
Google for continuing to provide such a kick ass free service.
As for David Barksdale, good luck to you, you will need it.
------
code_duck
I'm a lot more concerned about the data centers full of government employees
wiretapping innocent people for no apparent reason. A fair bit came about
concerning this a year or two ago, with ex-employees stating that the system
was routinely abused for amusement. What's up with that these days?
------
Xurinos
Just to keep this into perspective, we are reading about this because it is
Google. But _every_ system and _every_ relay through which your email passes
is a point where somebody with less then well-meaning intentions can read your
email. We may be able to somewhat rely on Google to enforce some privacy
policy, given publicity pressures, but some danger lies in all the carriers
between point A and point B.
It is a shame that PGP only took off in the hardcore user community. If it was
made insanely accessible to users -- maybe even transparent -- maybe we could
have a better assumption of privacy for our communications (as well as a
potential reduction in spam?).
------
jakarta
Maybe Google should add more questions related to ethics in their rigorous
interview process.
------
spaznode
Still kind of alarming, I mean I do personally know some google employees and
none would even remotely consider doing anything like this for both
philosophical and practical reasons. Either way it's kind of scary that some
douche fucker "quality assurance" dweeb had enough access to do this kind of
thing.
I think we ought to have some kind of equivalent HIPPA act for ALL data
personally identifiable to us, not just in medical contexts. That'd put the
fire under googles ass enough to take our privacy seriously. Fuck Eric Schmidt
and his "change your name at 18" bullshit. We know who that fucker is right
now.
~~~
124816
Did you ever see the full quote of the "change your name" stuff?
> Mr. Schmidt is surely right, though, that the questions go far beyond
> Google. "I don't believe society understands what happens when everything is
> available, knowable and recorded by everyone all the time," he says. He
> predicts, apparently seriously, that every young person one day will be
> entitled automatically to change his or her name on reaching adulthood in
> order to disown youthful hijinks stored on their friends' social media
> sites.
Which makes sense to me. Hell, I wish I could delete some videos and/or photos
of me on various sites.
Lately Schmidt has been making statements like this though; they are
reasonable when complete, but some reporters snip out five words (or, just
paraphrase or interpret) and create a news storm. CEOs are supposed to be good
at avoiding that sort of thing.
> equivalent HIPPA act for ALL data personally identifiable
We ought to start with getting the same level of laws for voip, IM, and email
that phone and mail have. "All PII" is too vague, but those seem like a slam
dunk.
------
braindead_in
Are GV calls all recorded? Is it there somewhere in the TOS? Even if its
there, the consent of the other party is required to record calls. Otherwise
its a offense. Right?
------
cristinacordova
TC followup - [http://techcrunch.com/2010/09/14/google-engineer-fired-
secur...](http://techcrunch.com/2010/09/14/google-engineer-fired-security/)
------
heyrhett
I love that this is on the front page at the same time as Don Dodge's blog
article about what an amazing job google does at hiring people:
[http://dondodge.typepad.com/the_next_big_thing/2010/09/how-t...](http://dondodge.typepad.com/the_next_big_thing/2010/09/how-
to-get-a-job-at-google-interview-questions-hiring-process.html)
~~~
cdibona
You hire 20k people over 10 years and make not one mistake? Iknow you are
being snarky, but there is no perfect hiring process, no matter what you
measure.
------
Pyrodogg
Probably going way off deep end here... Sometimes I wonder if someone in the
process shouldn't be licensed by the state in the interest of protecting the
interests of the public. Just like doctors, lawyers and engineers.
That way, if something goes horribly wrong, someone's ass is more on the line
than them just losing their paycheck.
~~~
msisk6
As someone who formally worked in an engineering profession that required
state licensing and now working doing the same job Mr. Barksdale did (not for
Google, though), I can't see any sort of licensing helping with this sort of
problem.
And I think at this point Mr. Barksdale ass is pretty much screwed -- it's
unlikely he'll ever get a job doing this sort of work again.
It's a tricky problem. I know to do my job I need root access to everything. I
guess at Google scale you could compartmentalize so the same person doesn't
have free access across services.
But at some point you just gotta trust your people.
OTOH, perhaps I just don't understand -- what this fellow did is so over the
top it's difficult for me to understand _why_ he would do such a thing. It's
wrong on so many levels -- it's just not something I can comprehend.
~~~
nostrademons
My read on it was that he's a typical Aspergian nerd (of which there are
several at Google), and it never occurred to him that what he was doing was
not-okay. A lot in the story seems to support that. Why else is he hanging out
with high schoolers - who don't even like him? Why does he feel the need to
brag about his position at Google and the power it gives him?
Some people are born knowing all the rules to social interaction. But others
have to learn them through painful trial and error. A lot of us got that out
of the way in middle school, high school, and college, before we were given
the responsibility to do anything truly damaging to ourselves and others.
Maybe he just had the bad luck to not seriously screw up until he's at an age
where everyone will blacklist him for it.
------
spaznode
This is a really big deal guys, it means nothing at all how comfy we feel
knowing google peeps personally. The fact is there is no regulation or
oversight dictating how seriously google needs to take our privacy other than
random - easily ignored - blips like this. We need government
intervention/oversight to make this stuff go away. The gov is already there
unofficially anyway, let's not kid ourselves about that. Google gave that
little piece away years ago. No us company with that much personal data would
be allowed to exist otherwise. I would know, did gigs at bellatlantic long
before "it" happened and uncle sam was and always has been there just the
same. More about what they're allowed to officially charge you with in court -
don't think they couldn't know either way at some level..though probably what
they were doing really was in our national best interest. Not judging, just
saying..we need offiial public oversight or be left at the mercy of what the
corporation decides to do with our data. The same data that provides the
overwhelming majority of revenue via advertisers. It's just sick is all.
------
thought_alarm
No worries. I don't personally know anyone who works for Google, so I guess
I'm safe.
However, I do know people who work at a local ISP, and I'm sure as hell not
passing my email through those servers.
~~~
btilly
If you hang out here long enough, you will likely get to know people who work
at Google. (Like me.)
------
vegai
I'm amazed, positively. I wouldn't have thought they would be taking the
users' privacy so seriously.
------
towndrunk
I'm surprised all of Googles interviewing tricks didn't catch this.
------
TheAmazingIdiot
Hard call. They offer great free services and have changed the landscape of
email, phone, and document communication. Yet they are one entity with all the
information of DeJa News, Keyhole Maps, YouTube, DoubleClick, GrandCentral,
Gizmo5, DocVerse, and their own email and app offerings. (see
<http://en.wikipedia.org/wiki/List_of_acquisitions_by_Google>)
So yes, it is refreshing to see transparency of "Engineer fired for snooping
where they shouldnt". But we keep using them as a service, so it's a hard
problem to combat. After all, the price is right. Just costs your privacy.
~~~
ZeroMinx
While I enjoy bashing big corporations as the next guy, this isn't really a
Google problem.
If you're on the internet, your information will always be available to
someone. On the internets, as in real life, this power can be abused.
Appreciate the fact that they're open about it.
~~~
TheAmazingIdiot
Trust me. I'm not bashing.
I have a blackberry hooked up to Google Voice and Mail servers. They know my
name, address, all my phone numbers, all my emails, my contact lists,
frequency I receive calls on my Google number, text transcription of
voicemails. They also can potentially record every call I receive and make
with GV.
Considering the benefit I get from _just Mail and GV_ , the datamining is a
cost I'm willing to make. I also know if my phone is lost, I dont lose my
data. And I can back it up elsewhere.
And I am somewhat happily shocked that they came such forthright that they
"fired him for snooping". Most places will only say "They no longer work for
the company".
------
Charuru
So this genius violated policy, and then bragged about it to his victim / the
person who have the most reason to report him?
He's totally dumb.
------
rufugee
Wow...it appears Daniel Faraday left the island and took up programming...
| {
"pile_set_name": "HackerNews"
} |
“Oh By” Is the Universal Shortener - rsync
https://0x.co/index.html
======
smt88
Don't use this or any other URL shortener for any reason. It degrades online
security[1], creates a bad UX, and breaks the web[2].
If you insist on using one, use one that is owned and maintained by a massive,
stable company, like Google[3]. Smaller services, with no culpable business
behind them, tend to die off[4][5].
1\.
[https://www.schneier.com/blog/archives/2016/04/security_risk...](https://www.schneier.com/blog/archives/2016/04/security_risks_11.html)
2\. [https://t37.net/why-link-shorteners-harm-your-readers-and-
de...](https://t37.net/why-link-shorteners-harm-your-readers-and-destroy-the-
web.html)
3\. [https://goo.gl](https://goo.gl)
4\. [http://www.webpronews.com/study-claims-61-of-url-
shorteners-...](http://www.webpronews.com/study-claims-61-of-url-shorteners-
are-dead-2012-05/)
5\. [https://bit.do/list-of-url-shorteners.php](https://bit.do/list-of-url-
shorteners.php)
~~~
rsync
Hi - a few things...
First, URL shortening is not what this tool is for.
It _will_ function as a URL shortener if you put in a URL and _tell it to_ ,
but again - that's not what it was built for.
Second, I tend to agree with the notion that URL shorteners are "bad for the
web". So, since we happen to have a (secondary) URL shortening function, I did
two things:
1\. Made a commitment with actual resources to keep 0x.co running
_forever_.[1]
2\. Had a short discussion with my friend Jason Scott[2][3] about giving
Internet Archive and Archive Team an easy port for download/archiving. In our
conversation he reiterated his (well known) position that URL shorteners are
bad in general, but less terrible if there is a published (and maintained)
spec for data exfiltration.
But _again_ ... URL shortening is NOT what this tool is for.
[1] simple, lightweight pages combined with massive, leftover rsync.net
bandwidth/hosting resources make this trivial.
[2]
[https://en.wikipedia.org/wiki/Jason_Scott](https://en.wikipedia.org/wiki/Jason_Scott)
[3] [http://ascii.textfiles.com/](http://ascii.textfiles.com/)
~~~
hga
Yes, this is _not_ a URL shortener per se, although it can obviously be used
as such.
Sad story, but I worked for a company named Netword exactly two decades ago
that was going to do this in a big way, even got one of the major SV
investment firms, Hambrecht & Quist, very interested (and their in with
Netscape, who they helped take public, would have been important), as in, we
launched, and they came to us....
But it was killed by devil investors who due to previous resource
misallocations and bad risk management (MPV, MPV, MVP!!!) had gotten their
hooks into the company about the time I started there. Weird and nasty
denouncement, 13 of us resigned in masse one day from our lawyer's office, we
had to fight to get our last paychecks (something state government enforcement
agencies have no humor about at all), etc. etc.
It a very good idea, I think, and who knows, maybe it's time has come. Mr.
rsync (who I'm a very happy customer of ([http://www.ancell-
ent.com/1715_Rex_Ave_127B_Joplin/images/](http://www.ancell-
ent.com/1715_Rex_Ave_127B_Joplin/images/) )), you're welcome to drop me an
email check my info) for what we figured out in that effort.
Note that we were going to do "Networds(TM)", as in "Intel annual report",
obviously one thing that made this less important was the increasing quality
of search engines. This isn't quite the same thing....
~~~
rsync
First of all, thanks for being our customer (at rsync.net, that is).
Yes, I'll email to hear your story - it would be interesting.
I think the key to what I'm trying to do here is keeping the product, and the
interface, extremely stripped down and simple - which causes costs to drop
dramatically (in terms of hosting, bandwidth, server costs, etc.).
Not having any advertisements or tracking or third party hooks, etc., makes
that much easier - and makes for a much nicer product. The revenue model is
selling custom codes, so _you are not the product_. The codes are.
~~~
hga
_The revenue model is selling custom codes,_ so you are not the product _. The
codes are._
That, BTW, was the business model of Netword, and in those gold rush days it
worked very well. Today, resources are so cheap it ought to work as well, even
if it doesn't really take off.
And you're welcome, and again, thanks for saving my email etc. from a
tornado....
------
geofft
How should someone unfamiliar with Oh By realize that the string "0x7DBZ3G" is
a thing they can look up? Is your plan to get sufficient popularity that
people will recognize them like they recognize URLs?
IIRC, the "Visit us on the World Wide Web at aitch tee tee pee colon slash
slash" days lasted quite a while. (Not to mention the "colon backslash
backslash" days.) I don't think I can just write "0x7DBZ3G" today (but maybe
in a few years!); I'd have to write some reference to
[http://0x.co/](http://0x.co/).
~~~
rsync
"Is your plan to get sufficient popularity that people will recognize them
like they recognize URLs?"
Yes, that is indeed the plan, and yes, that will be a challenge.
That's why we chose that domain name and that sort-of-phonetical-mouthing of
it ...
------
bunni
Don't think of this as a url shortener, my use case would be something like
pastebin or gist but with free private anonymous pastes. It also took me all
of 2 minutes to get a python implementation working with the API. One
suggestion, when I look up the codes if I include the 0x eg. "0xDV2HW7" or "0
x DV2HW7" it fails to lookup the code - it wasn't immediately obvious to me to
discard the 0x on lookup.
~~~
rsync
Hmmm .... we have it coded to accept _either_ :
[http://0x.co/EXAMPLE](http://0x.co/EXAMPLE)
or:
[http://0x.co/0xEXAMPLE](http://0x.co/0xEXAMPLE)
... so I wonder, how are you doing the lookup that it is failing without the
0x ?
EDIT: OH, ACTUALLY - are you looking up "0 x EXAMPLE", with the spaces in
there ? No, that won't work - we just have the spaces in place on the webpage
to make it easy on the eyes ... is that what you're doing ?
edit: and for anyone reading, you can do the lookup _even simpler_ with plain
old 'nc' \- you can specify [http://](http://) (non SSL) address if you need
to ...
~~~
cbhl
If you decide that spaces aren't valid identifiers in 0x codes, then it might
be worthwhile to strip all of them out when someone enters one.
~~~
rsync
Ok, we now ignore spaces in the code inputs, so it no longer matters if you
enter:
7DBZ3G
0x7DBZ3G
0 x 7DBZ3G
... they all work the same way.
------
kqr
Question not covered by the FAQ: for the mathematically lazy, what kind of
size are we looking at in terms of "oh by" code space? How many documents can
be stored until codes become too long to store in the (human) working memory?
Will there be an option to generate a code "long enough" that it can not
easily be brute force guessed?
~~~
rsync
Right now, as in, launch day, we are handing out 6 character codes that are
0-9,A-Z (but excluding '0', 'o', 'x', '1' and 'l') ... so 31^6 codes.
But you can _purchase a custom code_ [1] and the price is based on the length
(shorter being more expensive) and the max size is 32 characters.
So you can choose what you like, and it's as low as $8/year if it's 9
characters or longer...
[1] [https://0x.co/custom.html](https://0x.co/custom.html)
------
rsync
There is an "HN FAQ" which we think addresses things HN folks will be
interested in, as opposed to the "civilian" FAQ.
Not at all related to rsync.net, but yes, I'm the rsync.net guy.
Happy to answer questions here.
------
cbhl
The codes in your FAQs (0x7DBZ3G, 0xDY34NK) don't actually lead anywhere --
that might get confusing if they get handed out (e.g. start linking to
malware) later.
~~~
rsync
Thanks - we'll get those populated after lunch here...
------
bobuking
Not working on Opera 12.16 (last Presto engine). Not working on Chromium 37
So.
[https://www.ssllabs.com/ssltest/analyze.html?d=0x.co](https://www.ssllabs.com/ssltest/analyze.html?d=0x.co)
\- and apache behind...
------
tokenizerrr
The time that is displayed should include the timezone. No idea what timezone
it's in, but it definitely isn't UTC.
------
chrismartin
Another curious rsync.net customer taking a look.
I think you're actually offering a key-value store (aaS) with a 4 KB maximum
page size, and one of the use cases happens to be a text/URL shortener.
It looks like someone is squatting on ox.co. You could contact them and hope
they haven't seen your project yet..
How are the codes derived?
~~~
rsync
"Another curious rsync.net customer taking a look."
Thanks for being our customer (at rsync.net).
"How are the codes derived?"
# generate the ohby code
use String::Random;
my $pattern = new String::Random;
my $size = 6;
# don't use i,I,1,l,L,0,O,X,x etc..
$pattern->{'A'} = [ 'A'..'H', 'J', 'K', 'M', 'N', 'P'..'W', 'Y' .. 'Z', '2'..'9' ];
my $code = $pattern->randpattern('A' x $size);
(We disallow ILOX and 0 since that could get confusing)
Right now we are handing out random (free) codes that are 6 characters long,
but at some point I suppose we have to increase to 7 ... like ICQ ...
------
LeoPanthera
It seems like a bad choice of domain, given the example usage. "0x" will be
regularly confused with "ox", and ox.co is a completely different site.
------
fraXis
What language / framework is the backend programmed in?
~~~
rsync
perl.
Also: view source on any page to learn _just what kind_ of a website 0x.co is
...
------
wcf3
What does the public/private option do?
~~~
rsync
At some point (not now) we will present existing codes as a searchable
resource from the outside. I haven't decided what that presentation layer will
look like, but the idea is that a lot of Oh By Codes will contain important or
helpful information and benefit from being searchable.
But some won't. So if you want to keep the content of your code
private/unindexed/norobots, you would set that flag to "private".
I think the expiration pick-list is self-explanatory, yes ?
------
thde
Do you provide a .onion address?
| {
"pile_set_name": "HackerNews"
} |
AEZ: An Easy-to-Use Authenticated Encryption Scheme - mehrdada
http://www.cs.ucdavis.edu/~rogaway/aez/index.html
======
pbsd
There aren't many comments here, so I'll take the liberty of adding a thing or
two.
This is a CAESAR submission by Rogaway and friends. It is essentially a
construction that uses AES and transforms it into a block cipher of arbitrary
size. The authentication comes for free by appending zeroes at the end of the
message and checking that they remain zeroes after decryption.
This is a nice scheme for users, since it provides strong misuse guarantees.
Repeating nonces won't be catastrophic like in many of the other CAESAR
ciphers, and the speed is quite nice (mostly owing to the hardware-accelerated
AES-NI instructions). For implementers it's not so nice, as it seems rather
complicated (especially if you do not have constant-time hardware AES
instructions).
Like the majority of AES-based schemes, security starts to break down once you
encrypt around 2^64 blocks with the same key. This is not AES's or AEZ's
fault, it's a consequence of AES's small 128-bit block size. As a result, the
authors do not recommend encrypting over 4 petabytes of data under the same
key.
It would be nice if AEZ was defined in terms of a generic block cipher, but as
far as I understand the scheme is quite tied to AES.
------
akerl_
Does somebody wanna give the layman's version of why I would use this?
I don't blame the site for this, given that it doesn't appear designed to be
read by a layperson, but without some kind of I'm-Not-A-Crypto-Wizard
translation it just reads like big-word-bingo to me.
~~~
mehrdada
Relatively short description of the design goal:
The goal of an encryption scheme is to provide confidentiality. It is
important to know that most traditional encryption schemes, like block ciphers
in CBC, CTR, OFB modes, do not provide any authenticity, i.e. while you cannot
recover the plaintext from a ciphertext, you might be able to feed the
decryption algorithm a ciphertext that you crafted, without the decryption
algorithm having a means for detecting its lack of authenticity (e.g. flipping
a bit in ciphertext generated with CTR mode will result in a flipped bit in
decrypted plaintext), and in effect, making the system do things that an
adversary wants it to do. In practice, this can often be more dangerous than
loss of confidentiality.
In order to add authenticity to an encryption scheme, you would traditionally
apply a separate message authentication algorithm to the ciphertext and the
initialization vector to generate an _authentication tag_ , which you can then
use to verify if the ciphertext was tampered with.
There are many ways this combination can go wrong (and has gone) due to design
and implementation mistakes, like sharing the key for the MAC and encryption
algorithms, not authenticating the IV, not verifying the tag correctly and
exposing yourself to timing attacks, applying the MAC to plaintext, as opposed
to the ciphertext, etc.. For this reason, and performance implications, it is
desirable to have encryption schemes that also somehow provide authenticity
almost "for free", as a natural byproduct of the ciphertext generation.
Encryption schemes that achieve that, like OCB, CCM, CWC, and GCM modes, are
called Authenticated Encryption.
Most of the regular authenticated encryption schemes rely on passing a unique
number when encrypting each message, called nonce or initialization vector.
For instance, encrypting more than one message with AES in GCM mode with the
same nonce will result in total loss of authenticity, among other things.
Therefore, they are not very resistant to accidental misuse, and extreme care
should be taken while using them.
AEZ, on the other hand, strives to be a more robust authenticated encryption
scheme in the face of nonce reuse (misuse), that is, it will not face a
catastrophic loss of security if a nonce is accidentally reused.
| {
"pile_set_name": "HackerNews"
} |
Federal judge puts limits on FBI use of “stingray” cell site simulators - declan
https://plus.google.com/+DeclanMcCullagh/posts/3gc6o6B3Pex
======
Sniffnoy
The actual requirements start on page 8. Here's my summary:
> First, law enforcement officers must make reasonable efforts to minimize the
> capture of signals emitted from cell phones used by people other than the
> target of the investigation. [...] Moreover, law enforcement officers must
> not use a cell-site simulator when, because of the location and time, an
> inordinate number of innocent third parties’ information will be collected.
> Second, law enforcement officers must immediately destroy all data other
> than the data identifying the cell phone used by the target. The destruction
> must occur within forty-eight hours after the data is captured. [...]
> Additionally, the destruction must be evidenced by a verification provided
> to the Court with the return of the warrant.
> Third, law enforcement officers are prohibited from using any data acquired
> beyond that necessary to determine the cell phone information of the target.
------
scintill76
"Cell site simulators" Somehow I don't think they'd call it that if I
"simulated a law enforcement officer", presented a "simulated identification
document", or enticed someone to pay me for a "simulated service", opening
mail addressed to my "simulated persona" but not to me, etc. These devices are
fraudulently impersonating users' cell service carriers. They are fake cell
towers.
~~~
thaumasiotes
They likely operate with permission from the cell service carriers, which
would make a big difference legally.
~~~
TazeTSchnitzel
Do they? Why would the Govt. tell the carriers about it?
~~~
toomuchtodo
Because without carrier permission, they're violating Federal laws
administered by the FCC.
~~~
scintill76
Without carrier permission, they might be violating some type of interference
regulations, but I would also think the fake cell device itself and maybe its
operator would need FCC licenses regardless of carrier permission. As an Ars
Technica post I linked in another comment shows, the cell sites are probably
being used outside of the constraints of their FCC licenses.
------
dogma1138
This is the actual link [http://law.justia.com/cases/federal/district-
courts/illinois...](http://law.justia.com/cases/federal/district-
courts/illinois/ilndce/3:2015mc00021/317964/1/)
~~~
declan
Well, yes, but HN often links to blog posts and news articles about a court
opinion rather than the opinion itself.
A summary (that links to the opinion) tends to be more useful to non-
specialists than a document beginning with: "United States of America v. In
the Matter of the Application of the United States, No. 3:2015mc00021 -
Document 1 (N.D. Ill. 2015)"
~~~
privacy101
the blog post does not even mention warrants but the justia link does... I
would be curious to know if a warrant is required for all people located in
the area where such a device is used (which of course should be impossible).
------
omginternets
Silly thought experiment:
Police dogs are known for being trained to deliver false positives, i.e.
saying "drugs" when the are no drugs. Couldn't STINGRAY et al be used to the
same effect? I.e.: "the suspect showed a pattern predictive of child
pornography" being used as a pretext for executing a warrant?
Where is this wrong? Is there any evidence in favor of this interpretation?
------
leeoniya
It says the destruction of collected info not pertaining to the target must
occur within 48 hours but prior to this it says they frequently need to diff
multiple sessions possibly at different locations to pinpoint the target and
eliminate others.
Does this mean they cannot run sessions separated by > 48 hours, since no diff
would be possible afterwards?
~~~
jacquesm
No, it means they're going to do the sessions anyway, keep the data, do the
diff whenever they feel like it and then phone in an anonymous call with the
evidence, _then_ destroy the collected information.
~~~
leeoniya
[https://en.wikipedia.org/wiki/Parallel_construction](https://en.wikipedia.org/wiki/Parallel_construction)
FTW
i guess with the W = warrant
------
distantsounds
I wish I were surprised these provisions weren't originally penned when
drafting laws related to cell site simulators, but my faith in the US
government actually looking out for the privacy of its citizens has been less
than stellar.
~~~
exelius
Law in the US tends to come only after abuses have happened, especially with
regards to government powers. It was a brilliant marketing strategy on the
part of the companies providing the cell tower simulators to claim they were
covered under "national security rules" to avoid giving secrets to terrorists
-- even though use of such cell site simulators by police/military has been
commonplace across the world since the 90s. Especially in the types of
totalitarian regimes that often push people into extreme ideologies. It
prevented this from being much of a story for a long time, and by shielding
the source of information in court, it allowed them to sell a lot of these
devices before the legal system caught up.
~~~
oxide
this is a great point.
I often think of the current research chemical market in regards to this: a
poorly understood drug like MDPV makes the rounds on the internet, someone
decides to take the risks for the rewards in the gray-area and makes it widely
available, someone buys it at a gas station and ends up in the hospital after
doing something dumb, a panic ends up getting it banned, and a short while
later the cycle restarts with a new drug that is still in the gray-area of the
law.
------
nickysielicki
Fuck the FCC. We need open source radios.
~~~
arca_vorago
I hate that you were downvoted for the unfortunately negative truth. Open
source firmware, with radios seperate from cpus (and seperate DMA), is exactly
what we need for security. All these proprietary peices, half from foreign
countries, are more a threat to "national security" and "cybersecurity" than
just about anything else. They want to pass CISA etc because of cybersecurity
but their actions show levels of incompetence with few bounds.
When is the government going to embrace open source as a basis for security of
users?
| {
"pile_set_name": "HackerNews"
} |
Matchimals.fun – a puzzle card game built with boardgame.io and React (PWA) - chrisheninger
https://www.matchimals.fun/
======
chrisheninger
This is a simple puzzle card game I built over the winter holidays for my
nieces. I wanted to explore Google's boardgame.io state management library. It
works best in landscape on tablet + desktop.
All the code is open source for anyone who wants to check it out, more info
at:
[https://github.com/chrisheninger/matchimals.fun](https://github.com/chrisheninger/matchimals.fun)
| {
"pile_set_name": "HackerNews"
} |
How to get a job as a web developer - charlieirish
https://medium.com/kickstart-your-developer-career/how-to-get-a-job-as-a-web-developer-104127e0149d
======
bloggerden
I'm noticing portfolios are much more important for dev jobs these days
| {
"pile_set_name": "HackerNews"
} |
Don't Blame Your Community: Ad Blocking Is Not Killing Any Sites (2010) - dsr12
https://www.techdirt.com/articles/20100306/1649198451.shtml
======
citricsquid
> If you're reading Techdirt, and the ads we serve are not good, you have
> every right to use an ad blocker. It's your browser, do whatever you want
> with it. I, personally, do not use an ad blocker because I don't find most
> ads annoying -- but if you do, more power to you. You're absolutely welcome
> here on Techdirt.
I know I'm in a minority so even posting this is absolutely pointless, but...
if I don't like the adverts that a website runs I do one of the following: pay
them to not have to view them (if they have a subscription option), don't
visit the website again or begrudgingly view them.
Yes it's "my browser" but it's also the websites content. If they didn't want
me to view adverts they wouldn't have adverts, so the assumption is the
adverts are there for me to view them. Either I view the adverts or I don't
visit the website. If techdirt doesn't mine me blocking adverts, great, but
why not make it a profile option? Sign up and get the option to disable
adverts!
Maybe I'm crazy, but I view access to websites, media and items (eg: biscuits)
the same. If I want access / ownership / consumption of something and the
owner wants me to pay $10, view an advert or give them my email address then I
do that or I don't get the content. Just like I would hope everyone thinks the
same of the content I'm involved in the production of (although I don't run
adverts on the websites that I own...)
As an aside I know of a website that has been around for a long time now that
is suffering because of sticking to their guns regarding advertising. They
don't want to sacrifice the "spirit" of the website so they're losing
advertising options fast (some of the content is _not_ advertiser friendly...)
and this is going to lead to them shutting down soon, which is a shame because
it's a website that matters a lot to me and has a significant userbase and is
a part of the internet history. Sometimes sticking to your guns to the death
isn't the best thing for your users...
~~~
islon
This is the internet not television. I'm not obliged to see their ads. Yes,
it's their content but my viewport. By the same argument I shouldn't be
allowed to surf the web using lynx (the console browser) because it doesn't
show pictures and many ads are pictures or flash. On my client I can change
the content all the way all want, if I don't want to see the word "fuck" I can
replace it for " _beep_ " with a greasemonkey script, if I don't want to see
ads I use an adblock. Internet is about freedom, television is about not-
filterable predefined content down your throat.
~~~
Goronmon
_This is the internet not television. I'm not obliged to see their ads._
I don't think anyone is really saying that. But I agree with criticsquid in
that if I think a site has content worth viewing, I want to do what I can to
support that site, whether it means subscriptions or viewing ads.
So I don't run an ad-blocker. If I run into a site with ads that annoy me, I
just don't visit that site. A site decides whether or not to run annoying ads,
even if they don't get to pick the ads specifically, so I show my frustration
by not giving such sites my traffic at all.
~~~
dubya
There are sites that I visit regularly and many more sites that I arrive at
only through search results. It's the second set of sites that keeps the
adblocker turned on.
There is an option in Adblocker Plus, I think, to allow non-annoying ads. If
it comes to the Safari version I will try it. OTOH, every time I open a new
tab, the Expose version of 12 most visited sites are retrieved with ads, so
maybe I'm contributing enough.
------
gurkendoktor
As the author states in the last paragraph, this is exactly the same argument
as with piracy, but the OP is in a worse position to make it because the
author has to pay for traffic - unlike pirated music/ebooks/software, where
pirates generously share the bandwidth costs.
And the impression I get is the same as with piracy. A few % have no problem
because they are huge, have a devoted following, another income stream or
because they post link-bait without mercy. It's like the lottery winners
calling other people stupid for not winning. (Same reasoning in the software
world: Adobe still exists despite lots of people torrenting Photoshop, Apple
doesn't even bother to add copy protection to its OS, so then why are all the
little crybaby studios whining about piracy?! Similar examples exist for
games, music...)
The headline, as explained in the article, is also a tautology. Because if a
site goes bankrupt due to ad blocking, it is _the staff's fault_ , and
therefore the site did not go bankrupt due to ad blocking. Besides, it is
conveniently hard to prove for what reason a site went bankrupt - same story
as with pirated goods again.
------
Karunamon
I use an adblocker because most sites I visit that serve ads do not personally
vet the ads that run (with the great exception I can recall being 4chan, of
all places!), they use an unfiltered third party network, which generally are
great vehicles for malware.
The few tenths of a penny my ad impression is worth does not offset the cost,
nor the risk, of your site infecting me with the rootkit of the day. Where do
I send the bill?
The second reason being the ads are generally scammy (One simple rule...),
distracting (moving things, sound, etc), irrelvant (I live at home by myself.
I am male. Why are you showing me women's fashion magazines and breast
enlargement ads?!), etc.
I've got no problem with text ads (ala Google) which eliminate most of these
concerns - heck, in Google's case, they're even usually relevant!
~~~
Goronmon
_I use an adblocker because most sites I visit that serve ads do not
personally vet the ads that run (with the great exception I can recall being
4chan, of all places!), they use an unfiltered third party network, which
generally are great vehicles for malware._
While sites might not be able to vet individual ads, they do get to choose
which advertisers to use and it's glaringly obvious which ones use the ads
people hate.
Why not just not visit sites that decide to use annoying ads?
~~~
Nursie
Because you've already caught the malware by the time you figure it out?
------
graeme
There is a good article, linked within, about how as an entrepreneur, of
things go wrong, it's your fault.
I'd say that's valuable advice for humans, not just entrepreneurs.
This belief is useful not because it _true_ , but because acting as of it's
true offers you the best chance of changing what you can change.
[http://www.marksonland.com/2010/03/note_to_entrpreneurs_its_...](http://www.marksonland.com/2010/03/note_to_entrpreneurs_its_your_1.html)
~~~
stephengillie
One of my friends uses this philosophy in competitive gaming -- each point
lost, each teammate death, each tower destroyed is his fault -- to inspire him
to become better.
It's too easy to find scapegoats for our blame. I try to remember this when I
find myself sliding back into mediocrity.
------
snowwrestler
A major failing of this article is that it presupposes that people actually
considered the quality of advertising in their decision to run ad blockers.
When running an ad blocker, most ads are blocked by default on every site.
Therefore the user never even has a chance to see if the ads are "good" or
not.
The question is, what happens if everyone starts using this software? Granted,
it's a very unlikely scenario since it takes effort to install and manage ad
blockers. But it's not hard to imagine that a relationship would exist between
marginal increases in ad blocker usage, and marginal decreases in ad revenue.
Most of the "good" examples in this article are not even ads, they are
sponsored content. It's roughly analogous to using product placements in TV
shows to replace revenue lost to ad skipping software in DVRs. But not many
websites are big enough (like TechDirt is) to command the special attention
from advertisers to create these "one off" deals.
------
hayksaakian
The qq around ad blockers is the same as the qq around piracy. Bootleg vhs
tapes were available before streaming media, relatively easy to make, and
share. However the vast majority of people do not consume them to a damaging
extent. The same is true for ad blockers and content distribution now. Ad
blockers are a solution to a usability and business model problem. If you as a
producer of content find it to be a huge issue, then you have it in your power
to change it.
Only when its more convenient to do something the 'correct' way will it be
guaranteed to be the predominant way.
------
TomMasz
I don't mind ads _when I want to buy a product or service and don't know where
to look_ , but otherwise they're just noise that generally slows page loading
or makes the readable content scroll up and down (I really hate those ads). I
use an ad blocker to make reading web content as easy as reading the newspaper
(where I can skip entire pages of ads).
If I like a web site, I'll pay for it. But I'm paying _because I like the
content_ , not to remove the ads. It's a thank you, not a ransom payment.
------
kushti
"Ad Blocking Is Not Killing Any Sites" - another false-positive thought of
trendy venture-backed hipsters. Ok, speak your post-scarcity bla-bla-bla
further.
------
leeoniya
i use ad blockers primarily so that third parties cannot track me across
different domains all over the internet and to increase page load times
dramatically.
------
DanBC
I would love for a simple easy way to make micro-payments to the websites I
use regularly.
It'd be even better if that allowed me to turn off ads.
I'm gently concerned that would mean that site owners would allow obnoxious
ads in an attempt to drive people to paying, but I guess they realise that
people would ad-block or never visit again.
------
debacle
I think it's likely that this is untrue. Slashdot and reddit are the two
examples that come to mind of a userbase who are likely to be filtering ads
and thus greatly reducing the revenue of their hosts.
~~~
gilrain
...you think it's untrue that ad-blocking does not kill sites, because two
sites likely to be ad-blocked more than the average are very, very successful?
~~~
mylittlepony
In this context successful should be synonym of profitable. Which, last time I
checked, reddit is not.
------
commentzorro
This article is years old and no longer reflects current information.
~~~
mylittlepony
What do you mean?
------
pretoriusB
> _"Ad Blocking Is Not Killing Any Sites"_
That's only because it's not really prevalent to the general masses. If it
was, e.g if browsers came with Ad Blocking pre-installed and enabled as a
default, thousands of news sites and blogs would suffer and crash.
~~~
mylittlepony
<https://news.ycombinator.com/item?id=4804474>
------
rprasad
I use an adblocker at home but not at work. Honestly, for most of the sites I
visit, there isn't much of a difference (anymore). Websites have realized that
having fewer high-quality ads is better than having a massive number of crap
ads.
| {
"pile_set_name": "HackerNews"
} |
Cloud just got easier - nlolks
https://finance.yahoo.com/news/amazon-makes-cloud-contract-more-customer-friendly-rivals-224556349--finance.html
======
bgrohman
I think the title should be updated to match the article:
"Amazon makes cloud contract more customer-friendly as rivals loom"
This isn't about making anything easier other than legal questions around
Amazon's contracts.
| {
"pile_set_name": "HackerNews"
} |
Show HN: Sinkhole – A CLI tool to archive your files into AWS Glacier - lunarcave
https://github.com/ncthis/sinkhole
======
brudgers
Glacier as a first order archive reminded me of this discussion:
[https://news.ycombinator.com/item?id=10921365](https://news.ycombinator.com/item?id=10921365)
~~~
lunarcave
Yeah, that sound like a nightmare. I was wondering why it would be that high
and then I saw there were a bunch of failed attempts being billed for as well
in that instance.
I personally just push anything that would be highly improbable for me to ever
need.
| {
"pile_set_name": "HackerNews"
} |