Hacker News new | past | comments | ask | show | jobs | submit | aichi's comments login

But these are exactly in Africa, phone only.


Email without tags or folders works fine on a phone. I barely use it on desktop. You can always make multiple mail addresses.


They aren't employed.



I have no brand loyalty whatsoever, but all my monitors have been Eizo's Since I bought Eizo Nanao Trinitron CRT monitors in 1990s. I'm a lazy shopper and those things are high quality every way. I still have FlexScan EV2303W's from 2009 or 2010 and use them daily.


While that looks like a great monitor, it's a 21.6" 4K OLED monitor that seems to retail for over $3000. It's less of a ridiculous option than the $6000 Apple 32" display, but for most of us (including, I'm fairly confident, original article author Casey Liss), it still falls into the "if you aren't sure you need this, you don't need this" category.


At first glance the history looks legit but there are missing holes. From 2004 till now we have multi platform/language editor called Eclipse. From early days it supports plugins. How that one fit in the story? Shouldn't author prefer that one for it's longevity?


The article seems to be focused on text editors, not IDEs. I'm not sure why it completely overlooks IDEs as an alternative. Perhaps the author is mostly a web developer, which I find is the main area where text editors really match IDEs in terms of features.


This is happening to me on Catalina with Safari. Having on dual monitor another app and Safari, clicking in another app and Safari takes focus back.


There is tool from Microsoft which is used also internally. It has predefined questions for actions over boundaries.

https://www.microsoft.com/en-us/securityengineering/sdl/thre...


There is Czech initiative to provide same and being available under Open Hardware license soon.

https://www.corovent.eu/



Same surprise for me when I got back my password from AMEX over phone.


whiteboard = artificial. I don't agree. When I interview I don't expect working code on WB, I expect discussion about what is written there. Also I expect when interviewed that there will be discussion about approach I took.

WB usage is also testing presentation skills. It is used in companies when you want to present your ideas to others, etc.


It is not about PR with malicious code, I expect. I think the PR which will have backdoor code wold bump version of some dependency package only. Like the targeted attack on Bitcoin vallet few weeks ago. If you or your company isn't scanning dependencies you would never discover it.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: