Hacker Newsnew | comments | show | ask | jobs | submit | randomstring's comments login

Dmoz nearly died in 2006...



I wouldn't call it #winning. Did Edmund Hillary "win" because he climbed Everest first?

I think the misunderstanding of Perl is based in the "There is more than one way to do it" philosophy. A corollary to that motto could be "There is no right way to do it." Using that corollary, no matter what Perl code you look at the correctness is in the eye of the beholder.

Even looking at your own code a year later, you'll ask yourself "why did I do it that way?" This is because the Perl syntax and choice of modules is so deep and varied that you cannot help but continuously evolve your style.

It takes real world trial and error of writing and reading Perl code to build your own style and get a handle on what good, readable Perl code should be... for you.

Haters are going to hate, but Perl programmers know the power and aren't going to it give up. Winning isn't everything. Getting there first? Well, that just means you should respect your elders. :)


Which would explain why Erdos might be confounded by the answer. He was an expert at numbers, not psychology.

Proofs are built with an adversarial mind set. Always assuming the worst possible case and proving that a theorem holds in all conditions. The "hand of god" (or in this case the game show host) doesn't move to make theorems easier to prove. That isn't the universe works!


I think you're seeing a couple different effects here.

1. The data is reported from a many varieties of GPS devices and phones. So the data is noisy. Some singles tracks will be very noisy, to the point of being fiction.

2. Not all of these tracks are on the road. If you click between bike/run/both you'll see the bike rides are more correlated with roads and the runs seem to have more "off roading."

3. some of those paths are sidewalks and pedestrian bridges and underpasses.


Have a look in GuangZhou it is definitely the China GPS skew crap.

The major routes are offset north and west of the actual roads: i.e. People are not really running/riding through lakes and rivers ;)


So they killed Google Reader (and RSS with it) for nothing?


Ooph, twist the knife a little more. I'm still mad about Reader's death. At least Feedly has mostly replicated the simple interface and quick scanning of Reader.


In our office we really like the MultiTable.com tables. These were the cheapest high quality tables we could find. Ikea now sells adjustable desks, but the last time I looked they didn't show up on the US version of their site. Ikea prices were comparable to MultiTable. You can buy your table top from MultiTable, or re-use your existing Ikea table tops as we did. Our company was able to negotiate a (modest) bulk discount as well.


Speaking of Ikea. I stared with an Ikea hack as my standing desk. Building a combo coffee table with a book shelf as a keyboard tray, all for about $34. That sat on top of my existing Ikea desk/table. I used that until I was convinced I wanted to stay with the standing desk.

There are two drawback to the Ikea hack solution. 1) they are not readily adjustable. You don't want to stand 100% of the time, certainly not when starting out. 2) they can be very top heavy if you have more than one monitor and a workstation AND a laptop.

The electric motors look cool, but are totally unnecessary. It takes about 10 seconds to crank the table up or down by hand.

What goes unmentioned in most standing desk articles is the need for a really good mat to stand on. Here are the best I've found that are also a reasonable price:

http://www.thehumansolution.com/notrax-974-ergomat-grande-an... http://www.amazon.com/dp/B001BQR23K/


Sounds like a classic Man-in-the-Middle (MITM) attack.

Just a guess, but from the short description I suspect if you have control over DHCP you can get iOS to use your proxy. From there you can use something like mitmproxy ( http://mitmproxy.org/) to forge SSL certificates on the fly and intercept and decrypt SSL traffic without any warnings showing up on the iOS device.


You can do that but you'll be throwing certificate errors everywhere if they're self signed. By the sounds of it this is a bypass or method of getting around the CA altogether.


Yes, normally certificate errors would be thrown.

In this case Apple is not performing the domain validity checks on the presented cert. This allows an attacker that is performing an mitm attack to present a valid cert for another domain and establish an SSL connection with the victim.


Ugh, that's unbelievably awful.



This sounds like a NSA backdoor to me.


Anyone else find it ironic you cannot +1 that page?


This article reads like something out of Asimov's The Foundation series.

The author seems to suggest that secrets will be impossible in the future because no one will have any loyalty to one organization.

Oh, and we can blame the Economy, the Internet, and Facebook for that.


The obvious solution is more technology!

Neural Implants with TPM/DRM. Maybe we have it already, but your hippocampus doesn't think you have Need To Know.

I know it's been written about, but I can't remember where.



Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact