Hacker Newsnew | past | comments | ask | show | jobs | submit | gertrunde's commentslogin

That's not really what happened...

https://www.theverge.com/tech/856149/microsoft-365-office-re...

tl;dr : the website formerly known as office.com that was a portal for accessing a bunch of stuff changed name to "Microsoft 365" in 2022, and then again more recently (adding the copilot bit).

Edit: Although the horror show that is Microsoft product naming in that area left the door wide open for this confusion.


Replacing Office with Microsoft 365 as the brand is still stupid. I was messing with Windows 11 a while back pre Copilot, and in the start menu was a pre installed spam link for “Microsoft 365 (Office)”. The fact they had to put the old brand in parentheses at the end should have been a hint they’re doing something stupid.

"British FBI"...?

And what exactly do they think the NCA is?

[National Crime Agency]

On digging further: OK, this is not really creating anything at all, it's just merging the NCA and various existing regional organised crime outfits together into one body.


Epoch Times is not news.

Yup - and worse than that too.

In the last week or two it's been rumoured that Oppo are pulling the plug on OnePlus, and are going to wind up the brand entirely. (Although it may cling on in certain markets, like India).


Similiarly vintage classic Coleman...

https://www.youtube.com/watch?v=zAssh20BF-k

(Circa 2004-ish?)

(Not really sure if it counts as SFW/NSFW tbh?)


Nice to hear it's not dead, as the website and github repos do give that impression.

I'll have to give it a spin.


Their Github repos seem fairly active, from a quick look: https://github.com/TritonDataCenter

Their website is indeed out of date. Reminds me of Haxe in that aspect. The language itself is receiving significant development, but the website looks abandoned, and no new blog posts have been posted in a while.


From one of the photos, the cable spec "G657A2" is visible on the outside - and specs listed for that indicate it's "bending insensitive single-mode fibre", apparently it can tolerate 10 loops around 15mm mandrel. (Which does surprise me).

But yes, agreed, a lot of "Er... why would you do it like that?" bits.


Those 10 loops definitely only apply to the single mode fibre itself, not the entire assembly with armor and everything, because that's just... physically impossible.

Cables for direct burial only like to be bent once or twice, and then only gently. Anything else may very well break the armor (whether plastic or metal), after which all bets are off.

Still, for the outer jacket to become brittle to the extent described, something else is required, which may very well turn out to be "shoddy manufacturing"...


Also, Bill Atkinson of Apple fame.

https://news.ycombinator.com/item?id=44530767

(posted here a few months back)


Basic version is it's a sort of developer focused zero trust network service.

Encrypted overlay network based on wireguard tunnels, with network ACLs based around identity, and with lots of nice quality-of-life features, like DNS that just works and a bunch of other stuff.

(Other stuff = internet egress from your tailscale network ('tailnet') through any chosen node, or feeding inbound traffic from a public IP to a chosen node, SSH tied into the network authentication.

There is also https://github.com/juanfont/headscale - which is a open source implementation of some of tailscale's server side stuff, compatible with the normal tailscale clients.

(And there are clients for a very wide range of stuff).


I can’t tell if you’re trying to help, or just getting into the spirit of the website’s “how it works (using ten pages of terminology and acronyms we just made up)” page.


None of the terminology or acronyms that user used were made up or unique to this. I think you are blaming other people for your unfamiliarity with this kind of tech.

It is simply a managed service that lets you hook devices up to an overlay network, in which they can communicate easily with each other just as though they were on a LAN even if they are far apart.

For example, if you have a server you'd like to be able to SSH into on your home network, but you don't want to expose it to the internet, you can add both it and your laptop to a Tailscale network and then your laptop can connect directly to it over the Tailscale network no different than if you were at home.


Sorry if I appeared rude. That was very much tongue in cheek.

But notice how you just did a much better job of explaining what this thing does without using any jargon at all. The jargon helps if everyone already knows what you’re talking about. It hurts if anyone doesn’t.

That’s what I’m poking fun at. There’s a trait in lots of engineers I’ve worked with over the years to be almost afraid to talk about tech stuff in layman terms. Like they’re worried that someone will think less of them because they used words instead of an acronym. Like they won’t get credit for knowing what a zero trust network is if they describe the concept in a way that regular people might understand.

One of those guys was certainly in charge of this company’s website copy.


> But notice how you just did a much better job of explaining what this thing does without using any jargon at all.

There was plenty of jargon and acronyms like LAN and SSH. You're just used to those ones.


Perhaps if we were on Reddit, and also on a general subreddit, then people would speak in less technical terms.

Since this is HN, it’s almost expected the participants here would either know the terms, or at the very least be able to find out what they mean on their own and realize it’s not made up jargon but rather common industry terms.

Tailscale is not trying to sell to the average buyer, it’s trying to sell to a specific audience.


> Like they won’t get credit for knowing what a zero trust network is if they describe the concept in a way that regular people might understand.

I've been trying to get a definition of zero trust at $client from the security people who are pushing tools onto our platform, so we can have an honest conversation around threats and risks, and finding the best balance of tools, techniques and processes to achieve their desired outcomes.

Unfortunately, it seems like everybody just want "zero trust" because a vendor sold them on that idea and they gave money to the vendor, so now there's the need to justify that expense and "extract value" from the tool - even if it may in fact be worse than the controls that are already in place.


Your ignorance of the topic is no excuse to be rude to someone who's trying to help you.


That's just networking jargon


Possibly one of the better known (and widely used?) implementations is Microsoft's PhotoDNA, that may be a suitable starting point.


"AI Overviews now have 2 billion users every month."

"Users"? Or people that get presented with it and ignore it?


Maybe you ignore it, but Google has stated in the past that click-through rates with AI overviews are way down. To me, that implies the 'user' read the summary and got what they needed, such that they didn't feel the need to dig into a further site (ignoring whether that's a good thing or not).

I'd be comfortable calling a 'user' anyone who clicked to expand the little summary. Not sure what else you'd call them.


You're right, I'm probably being a little uncharitable!

Normal users (i.e. not grumpy techies ;) ) probably just go with the flow rather than finding it irritating.


They're a bit less bad than they used to be. I'm not exactly happy about what this means to incentives (and rewards) for doing research and writing good content, but sometimes I ask a dumb question out of curiosity and Google overview will give it to me (e.g. "what's in flower food?"). I don't need GPT 5.1 Thinking for that.


"Since then, it’s been incredible to see how much people love it. AI Overviews now have 2 billion users every month."

Cringe. To get to 2 billion a month they must be counting anyone who sees an AI overview as a user. They should just go ahead and claim the "most quickly adopted product in history" as well.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: