Hacker News new | past | comments | ask | show | jobs | submit | mrucci's comments login

I found this blog post to explain trampolines quite well: http://blog.richdougherty.com/2009/04/tail-calls-tailrec-and...


Hey, I made something pointless too! http://mrucci.github.io/dumb-cat/


It's hard to believe that articles in this newspaper are not generated by a markov chain or some other machinery.

Just look at the titles of articles published by this author: http://www.theregister.co.uk/Author/2578

What the hell does this means?

    "MI5 boss: We NEED to break securo-tech, get 'assistance' from data-slurp firms"


The Register originally aimed to parody the style of headline writing in British tabloids.

And the irony has slipped into being just a house style now - one which is rather uneven in quality and appropriateness.


ELB Health Check: min, max = (1s, 300s)

Route 53 Health Check: either 10s or 30s


Interesting points. Here is a few things you'll miss choosing Route 53 over ELB:

* HTTPS termination.

* Autoscaling group management. By connecting an ELB to an autoscaling group, the logic of registration and deregistration is fully managed behind the scenes. With route53, you have to implement it yourself.

* Minimum autoscaling group size. If you enable ELB health checks, you can rely on the ELB to maintain a group of instances of constant size.


ELB's HTTPS termination is mediocre and, last I checked, doesn't offer the best ciphers. A year ago It was impossible to get an A+ on ssltest https://www.ssllabs.com/ssltest/ using ELB to terminate SSL.

Not to mention it still needlessly includes a ton of dangerously insecure ciphers just begging to be misclicked.


The current default, ELBSecurity Policy-2014-01 [1] enables ECDSA/PFS and is close to the Mozilla TLS recommendations [2]. Getting an A+ on the Qualys test requires the HSTS header [3], which isn't an ELB issue.

[1] http://docs.aws.amazon.com/ElasticLoadBalancing/latest/Devel...

[2] https://wiki.mozilla.org/Security/Server_Side_TLS#Amazon_Web...

[3] http://mir.aculo.us/2014/04/04/how-to-get-an-a-on-the-qualsy...


ELB scales horrible and can not scale to even tens of thousands of connections per second, let alone handling spikes of 100k/sec simultaneous connections. Even if you get AWS to prewarm to ELB at a higher peak rate, if you spike over those limits you will drop new incoming connections. HTTPS termination is trivial compared to a requirement to be able to actually handle hundreds of thousands to millions of simultaneous connections per second.


Actually, ELB can scale pretty well... but... you need to file a form and they will up your ELB capacity. Totally ridiculous; the situation with CloudFront.


Is https termination really worth mentioning? They'll still be running some type of web server (nginx, apache, whatever) and enabling https termination there is probably easier than going through the elb wizard.


Cool. You can do it also with `vlc` and the `-V aa` (ascii) or `-V caca` (colored ascii) video output in the console.

Can play any videos or stream the webcam:

    vlc -V aa file.avi
    vlc -V aa v4l2:///dev/video0


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: