Hacker News new | past | comments | ask | show | jobs | submit | fmeyer's comments login

This is the recipe to have 100+ different runtimes.

Don’t forget that In large deployments, you have no idea who is using what, which features are enabled or what’s the flavor of optimization someone pushed to make things work for the customer. You have dozens of engineers and all trying to keep the lights on.

This was the state when I joined Auth0 and it took us a year to migrate every individual customer env to a managed PAAS and another year to migrate our multi tentant environments later.


I tried RMPP for a weekend and decided not to stick with it. Honestly, it doesn't even come close to how good my Note Air 3C* is. Being an Android device allows you to perform customization especially regarding setting accessibility features beyond the basics.

* I understand that some people have concerns about the brand's security practices and affiliations, but I went further and completely locked it down from public cloud features.


This is the debate I'm having internally. I like the RM2, but the appeal of a full Android tablet is hard to get past.

How hacker-friendly is the Note Air? Is it heavily locked-down or is it more on the open side?


I think the remarkable is better because it's not a full tablet.

It's an incredibly good scratchpad and is fine for reading papers. The epub reflow and layout is incredibly slow though, and PDFs suck because you can't resize them.

If I didn't have kids/made more money I'd probably buy the Pro but that's not my life now.


I have a boox note air, and if you use it as a "full tablet" then you're doing it wrong and will not enjoy it. It shines as an ebook reader (it runs kindle and kobo as well as epub readers and calibre companion). I run file sync on it so it always matches my library. I take notes (using the remarkable pen which is better than the boox note one and works great with it). But I don't use it for browsing or anything like that, the slow screen refresh just makes that sort of thing miserable.


BOFH, BileBlog, The Daily WTF;

No wonder we all turned cynical.


it's the opposite. we are cynical, so we build that stuff


Artifacts of the toxic "contempt culture" historically endemic to hacker culture.

https://blog.aurynn.com/2015/12/16-contempt-culture/


"Contempt culture" is one way to put it, definitely had some toxic elements, but it was also actual hacker culture. The nice-ification of tech has come with corporatization and has its own downsides.


It was a gatekeeping strategy. Opening the gates means opening them for the people you like and the people you don't. Ultimately, it's the hackerly thing to do. Knowledge wants to be free.


Strategy? You think a bunch of people sat down and planned a specific set of rules to ensure only the “right sort” (cynical bastards), were allowed in the club?

The BOFH “culture” was the IT admin culture (exaggerated for comic effect); more cynical than anyone because they had to deal with people. It’s probably still like this. IT (or IS as it seems to have been re-branded), sits as a “cost centre”, frequently at the end of a long line of sewage pipes, coping the blame for any number of other peoples mistakes. I suspect the prickly nature is a necessary survival trait.

Cultures develop as they develop. There’s no conspiracy. They also evolve and change, and targeted interventions can push them in certain directions. “Hacker Culture” was never just one thing, and that’s never been more true than today. Certain “clubs” might have been more or less exclusionary at various times, but the scene as a whole has always been a welcoming one.


I think a bunch of people, without explicit coordination, were rude to the sorts of people who weren't seen as belonging. My experience jives with the article GGP linked, and I've played both parts (and for anyone who had to put up with me shit talking PHP, I apologize). It's a tale as old as time; people form cliques and gatekeep, c'est la vie. Rarely is it by explicit coordination (secret societies notwithstanding), but I would still call it a strategy.

Please note, I'm talking about the "contempt culture" specifically and not prickly nerds broadly. Some people are prickly and that's fine. It makes sense to me too that people with a complex and difficult job which is perceived as a cost center might be prickly for entirely different reasons.


You can only deal with stupid (or ‘differently aligned competencies’) for so long before it starts to irk you, and you start assuming that anyone that calls—and anything they want—is stupid


Identity is tricky. Proving who you are depends on a certain level of trust. Whether it's through email, devices, phones, or, in more advanced settings, some sort of digital certificate; you won't have much options.

Unless you're in Germany using a service provided by the Vogons, you might end up getting a letter containing an activation PIN via snail mail or worst having to visit the post office to show your passport.


I reported a similar and even more damaging I my opinion (https://hackerone.com/reports/2240374) and they also dismissed as by design.

Turns out I found out you could even invite external collaborators into your fork and totally bypass enforced SSO.

Even if you block forking into your main repo, the existing forks remains active and still can pull from upstream.

It feels like if you need proper security, you have to go with enterprise


Great work Lucas;

You're going in the right direction! for the near future, I suggest you to add a cli, connectors, simple symbolic calculation on notebooks (take some inspiration from calca http://calca.io/examples), offline support and fully encrypted namespaces.

That will put you miles away from everyone else in the field :)

You're probably busy with the launch, but you can contact me if you wanna discuss the list above,

Abraços


Hey Fernando, thanks for the enthusiastic comment.

Would love to hear more about what you mean regarding the CLI and connectors. Can you give me a few examples of what these would look like?

By the way, I didn't know Calca. Looks neat, I'll definitely have a look.


I have some trauma built up thanks to POVRay and countless hours wasted trying to render computer graphics exercises in a sh* computer.

Recently I tried to render an animated scene that took me a weekend to render properly in 2003. It's still slow :D

https://fernandomeyer.com/microblog/2023-07-29-1107998078355... https://fernandomeyer.com/microblog/2023-07-29-1107998901402...


Despite modern advancements in ML, rules engines are still preferred in some scenarios as their execution tends to be deterministic.

They have different heuristics for conflict resolution when more than one rule can be fired. Once you define the strategy, it will be consistent throughout the entire lifecycle.

Once the network is compiled, it ensures that previously matched patterns are not recomputed, which increases performance.


Yeah modern ML is not really at all comparable and they're more complementary than modern approaches replacing rules. All these agent frameworks and platforms cropping up will be using things like rules, workflow DAG models and so on as the execution engine with LLMs embedded as steps and/or to construct a workflow.

Likewise either with knowledge graphs or using LLMs to generate possible predicates and constraints to run against a rule engine or backwards chain through facts is a way to minimize hallucinations of generative models.


There’s plenty of pirated paid cable channels there.

I’d be careful aggregating this.


Is it pirated or is it legit and you need login? I thought the latter, but list also had legit 'open access' channels from around the world that don't require anything to watch! :)


Actually, its free access to pirated cable channels, so the pirates are being pirated, and what can they really about that except rotate IPs on a daily basis, hence the daily list updates.


I've drop down two networks in my life,

First time I run a dhcp server by accident and suddenly went sideways but the blast radius was small,

Second time and more interesting one, My campus had a mac address allow list; when I got a new computer and didn't want to handle the process of updating my access access permission, I just run a script to change my mac to the old known address.

Later, I also sold the old computer to another colleague which didn't bother to register as well since everything was working. Long story short, we keep disconnecting each other.

One day I was, "c'mon, I'll fix this". Opened wireshark and started to capture network traffic. I've got a list of mac addresses from the pcap dump and every time I got disconnected, I ran the script spoofing my address to the next one in my list.

That worked fine until the day I spoofed the mac address of a central managed switch that shit itself out of the network.

:)


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: