Hacker Newsnew | comments | show | ask | jobs | submit | wnoise's comments login

Is it named after the Usenet grepper?

James "Kibo" Parry -- could be. Or perhaps they are both named after Kibo, the dormant volcano at the peak of Mount Kilimanjaro?

https://en.wikipedia.org/wiki/Mount_Kilimanjaro#Geology_and_...


Shouldn't it be expanded by the shell when it is first set?

FOO=~/bin/vim export FOO env | grep FOO shows it as expanded.


You are running that in shell by hand. The python program running here is not shell. If you do a print(os.environ["GIT_EDITOR"]) in the python3 program you'll still see ~/bin/vim .

SMS?

-----


GPG is awful; GPG is terrific.

-----


See also OpenSSL.

-----


> The majority of times, this is the case. At least one exception is when the shell pattern does not match one or more files in the directory

Thankfully zsh has the NULLGLOB option which will do the right thing and expand to an empty list, of the zero matching files.

-----


> "absence of evidence is evidence of absence" fallacy

It's not a fallacy. Absence of evidence really is evidence of absence. The fallacy version is "absence of proof is proof of absence".

-----


Thanks. That is better wording for what I meant.

-----


Unfortunately, there's no "herd-immunity" externalized benefit, so the efficient way to allocate it is by individuals buying doses for themselves. (Well, for Homo economicus, rather than Homo sapiens.)

-----


I'm fine with buying it (for a semi-reasonable price, i.e. not $10K) but no one makes an FDA-approved version and it's not clear how active the efforts are to get a LYMErix replacement approved. (There have been early-stage clinical trials but there don't seem to be aggressive efforts to move forward.) Presumably the canine versions would be safe enough but you can't just buy those on the open market and administer them.

-----


The attack is not on Baidu, but via Baidu.

Whoever is the attacker appears to control the great firewall of China. Who else would that be but the Chinese government?

-----


The Honker Union http://en.wikipedia.org/wiki/Honker_Union and/or the Red Hacker Alliance http://en.wikipedia.org/wiki/Red_Hacker_Alliance

-----


The line seems to be blurry - as I'm sure it is around the world when it comes to state level "hacking".

http://en.wikipedia.org/wiki/Honker_Union#Relationship_with_...

-----


Sure, but the Chinese government has far more sophisticated ways of taking down sites so their own citizens can't access them, and they're not afraid to use them - even against big name sites. And in fact they often do, to help local companies providing the same offerings to prosper.

The current DDoS attack just strikes me as too crude a method when they have so many other options available.

If you were going to argue that it's just a retaliation towards GitHub for hosting these projects, then once again there are others sites the government is far more concerned about and they could use DDoS to bring them down with far less publicity than what the GitHub DDoS is generating.

It just doesn't seem to make sense from either the method being used or the motivation behind the attacks.

-----


What happens if you add a second camera?

The actor/CSP model makes each device a separate process, which can be hooked together with processing nodes works wonderfully.

-----


> What happens if you add a second camera?

You call it TheSecondCamera, duh.

-----


If there's the potential for multiples then I'll have a CameraManager (TheCameraManager) that finds out what's connected to the system and provides enumeration and access. I'll generally try to make the cameras look like a singleton and hide the Camera class. Sort of like a factory, except you'll only ever get N instances of your Camera class for N cameras.

-----


TheCameraArray[1]

-----

More

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: