Hacker News new | past | comments | ask | show | jobs | submit | justinclift's comments login

Yeah, bot generated nonsensical issues is pretty common. :(

PinePhone development seems to be kicking along ok?

Genode (a secure OS in development for years) seems to be working decently well with it:

https://genode.org

https://genodians.org/nfeske/2024-02-15-fosdem-aftermath

... though most people are running various Linux distros from what I remember.


Or be outright killed, depending upon who you decided to cross.

That'd be explaining by someone trying to "fix the damn disconnection bug with this new usb $THING I bought a few weeks ago".

Stuff like that often ends up trawling through LKML posts trying to figure out wtf kernel might have a fix, potential things to try, and so on.

Probably also by people with zero interest in software development themselves.


> If you spend a lot of time liking fireman calendar photoshoots ...

That could be incorrect if (say) someone was researching fireman calenders for some non-sexual reason. ie boss assigned them the task of writing an article about fireman calenders through history

I'd have to wonder what other weird things such a person would be labelled with, given that they'd probably be researching a bunch of topics every week or so. ;)


>That could be incorrect if (say) someone was researching fireman calenders for some non-sexual reason. ie boss assigned them the task of writing an article about fireman calenders through history

That's fine. It doesn't have to be accurate for every single individual. As long as it's vaguely accurate to bring a targeting uplift, it'll be worthwhile to use.


That approach sounds like pessimistic locking: https://en.wikipedia.org/wiki/Lock_(computer_science)#Databa...

Optimistic locking might work better, as long as the underlying data can be automatically diffed and merged reliably well.

Git generally does well using this approach, though it's pretty easy to diff text.


> Why is WP Engine scared of talking to journalists live?

You're meaning apart from the active law suit yeah? ;)


That's pretty cool. Wonder what the upper limits of this technique would be, given stronger base materials?

ie rapid deployment of light weight bridges in disaster areas, military engagements (such as fording rivers), and that kind of thing


Wouldn't it have been amazing if they'd taken that attitude with the PlayStation series? :)

Ugh:

  ... the application tries not only uploading the ID3 Tags, but also geolocation data,
  which is most likely gathered from Wi-Fi triangulation from windows itself.
That's likely breaking some EU GDPR rules, at the very least.

Doesn't seem like that'd be an accidental thing?


I would assume so since much of the code seems to have been stolen in the first place

s/stolen/illegitimately used/g

Or made by a contractor or is cots in another region?

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: