Hacker News new | past | comments | ask | show | jobs | submit | louis-paul's comments login

Cool I had never seen this before. All seem on point, but I have light disagreements with this one:

> The basic rule: the further from its declaration that a name is used, the more descriptive the name must be. For a method receiver, one or two letters is sufficient. Common variables such as loop indices and readers can be a single letter (i, r). More unusual things and global variables need more descriptive names.

In the tighter parts of some algorithms I love seeing more descriptive variables (obvious exclusions, as noted, are things like i, j, x, y). It's very common to see double letter variable names that become hard to track (plenty in the go source as well).

Historic Tale Construction Kit: https://htck.github.io/bayeux

https://twitter.com/profannieoakley/status/13577684086710272... "I turned my art history students loose with a make-your-own-Bayeux Tapestry app."

Missing a feature in your database? Just write a layer for it! Works for every requirement of the original post.

Do Shopify's competitors produce similarly high-quality engineering content? (if you know some, please link!)

Bigcommerce does have a developer blog, but it seems a bit more limited in scope:


Meaningful Availability, Hauer et al.: https://www.usenix.org/system/files/nsdi20spring_hauer_prepu...

A good incremental improvement in service level indicator measurements for large-scale cloud services.

Obligatory The Morning Paper post: https://blog.acolyer.org/2020/02/26/meaningful-availability/

Even if not implemented in such a sophisticated manner, "meaningful availability" is a better metric than pure uptime/downtime for most websites.

At one startup we worked at we had availability problems for some time, with the service going down in a semi-predictable manner ~2 times a day (and the proper bugfix a few weeks away). Because once a day the service went down was in the middle of the night with no one on call, pure availability was 80-90%. Given that it was a single country app with no one trying to do any business during the night, meaningful availability was ~99%. Knowing that gave us peace of mind and made tackling the problem a much more relaxed ordeal than the crunch time for a few weeks I've seen at other companies in similar situations.

Easy fix: back up your iPhone locally on your computer instead of using iCloud: https://support.apple.com/en-us/HT203977#computer

The ambiguous position on true end-to-end encryption shows once again that Apple is in for the marketing (both to consumers—predatory and dangerous, and to engineering talent—dishonest). Same hypocrisy as on the China issue. Not that there is an easy solution when you are one of the biggest companies on the planet and that shareholders essentially expect you to grow forever while playing nice with everyone.

Eh, maybe, maybe not. What guarantees are there that the backups actually get deleted? Storage is cheap these days...

If you delete your remote backups, they are likely be deleted, eventually. If you don't delete your remote backups, they won't be deleted.

There's no business case for keeping backups around for Apple, unless they suddenly became an ad company and started mining your backups for personalization data.

There is a business case - charge the FBI or any government agency for the cost of restoring/delivering it to them, or use the contents to improve any machine learning they are conducting, and I'm sure there are others.

For the longest time Facebook couldn't actually delete photos that you requested the deletion of. They could remove it from indexes so it couldn't be found, but if you had the link it would still be available (akamai cdn). Because, to them, either the cost of the hosting was miniscule compared to the cost of writing the software to ensure things actually got purged from the CDN.

In the EU, big tech companies actually delete your data within a short period of you clicking the delete button because they're scared of the GDPR requirements.

Outside the EU, small companies, or non-tech companies might we'll keep it forever.

Yep, this is what I do. I have a Synology NAS which I backup my Mac to using Time machine. Works like a charm, and everything is actually encrypted.

Makes me wonder why they only mention iCloud specifically, does that imply our local OS is already pwnd?

On the contrary, Apple has very decent device security. See their Platform Security guide: https://manuals.info.apple.com/MANUALS/1000/MA1902/en_US/app.... Some of their online services are end-to-end encrypted with very smart designs (see iCloud Keychain page 82, Find My page 103).

In contrast, iCloud Backup is pretty much an open door: https://www.apple.com/legal/transparency/account.html

I discovered The Anthropocene Reviewed last year. My favorite review is Tetris: “Tetris is a game about time and space. Time is always speeding up, with blocks falling faster and faster, and space is always filling in. There is no winning, Tetris always ends the same way, no matter how expertly you place the blocks. You play until you die. It takes five minutes to learn Tetris. It’s not grand or ambitious. It’s merely perfect.” — https://www.wnycstudios.org/podcasts/anthropocene-reviewed/e...

Special mention for the Kauaʻi ʻōʻō: https://www.wnycstudios.org/podcasts/anthropocene-reviewed/e...

What an excerpt! I have to check this out now.

I am reading through The Righteous Mind myself at the moment and it is a GREAT book! The ideas are very well presented.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact