Hacker News new | past | comments | ask | show | jobs | submit | hiroprot's comments login

Fun fact about the sequel, it comes with a sticker that says "kids" that can optionally be used to cover up the Babies label, for those children who'd refuse to pick up anything that is targeted at babies :)


The first book came with a bunch of stickers, saying "monsters", "kids", and some other funny ones I don't remember. (My sister gifted it to my 1yo daughter. I mostly enjoyed explaining to everyone who would listen how the latch circuit worked, and what it was for ...)


That brings back fond memories. In high school (a long time ago), I coded up a client-server application in Perl/Delphi to utilize the ISDN D-channel to transmit small amounts of data by repeatedly dialing a destination, using the call initiation metadata to communicate, and then hanging up before the call got established.

In Europe at that time, every call (even local ones) started getting billed as soon as the dialed party picked up. So effectively, this allowed for fee-less small applications that didn't need much data, but that I wanted to invoke many times a day (think checking email, checking server status, IM, etc).


This is the coolest, old school hacker tech I've heard in a while


Fantastic channel, and I love that he named it (and designed the logo) after his heterochromia: https://en.wikipedia.org/wiki/Heterochromia_iridum


From his FAQ:

What does the name 3blue1brown refer to?

I'll be the first to admit this is a little odd. The logo is a loose depiction of my right eye color. It has what's known as "sectoral heterochromia", meaning there are different colors in different sectors, which in my case looks like 3/4 blue and 1/4 brown.

In the same way that many channels simply share their name with the author, a younger me thought that a more genetic signature might be neat. Plus, the channel is all about seeing math in certain ways, so it felt fitting. The name is just a reference to the logo, factoring in a desire for something deliberately weird-sounding that stands out.


Maybe somewhat off-topic, but visiting this URL causes my Ubiquiti setup to trigger a Security Alert about an Incoming connection from the IP that hosts plover.com related to TOR (screenshot of the alert: https://share.cleanshot.com/J1cfSd1W)

Curious if anybody else experienced this, and what's behind it?


This was a fun distraction to track down...looks like the IP that this site is hosted on is in some IDS rulesets, likely this one, which Ubiquiti uses: https://github.com/vncloudsco/suricata-rules/blob/main/tor.r...

Looks harmless, but I learned something new today :)


This


Given that they are not necessarily the same, perhaps more accurate to say "So who crossed the finish line first?" in your article? We know who won.

As someone who has both won and lost bike races determined by photo finish, I enjoyed this article a lot. Well done sir!


Most blog posts are marketing efforts. I think the test is whether the article provides value. I have a pretty okay background in this field and found it interesting.


I filed my first claim with AirHelp a few weeks back. It’s “sent to airline” now, so we’ll see what happens.

I don’t think that I’ll hook this directly into my email, but if the one-off service works well, I’m sold.




I really like this, but am wondering if something like ZModem over SSH would make the file transfer stuff more convenient...I feel like some things have become more complicated since the BBS days.


You can do that too, but the download.sh script is much more straightforward: https://github.com/gnachman/iTerm2/blob/master/tests/downloa...


Standard ssh protocol supports this already, you can open a file transfer channel on an existing shell connection dynamically.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: