chosen
int64 353
41.8M
| rejected
int64 287
41.8M
| chosen_rank
int64 1
2
| rejected_rank
int64 2
3
| top_level_parent
int64 189
41.8M
| split
large_stringclasses 1
value | chosen_prompt
large_stringlengths 383
19.7k
| rejected_prompt
large_stringlengths 356
18.2k
|
---|---|---|---|---|---|---|---|
22,088,260 | 22,088,097 | 1 | 2 | 22,087,093 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>slavik81</author><text>&gt; I recently wanted to take a hierarchy of items and draw them in a nice tree structure. For example, a Family Tree.<p>In general, a family tree is a directed acyclic graph. Branches of the tree will always join back together if you follow the history far enough.<p>The number of ancestors in a generation is 2^N, with N being the number of generations back you&#x27;re looking. There were only 100 billion people that ever lived, so by the time you get about a thousand years back, it becomes literally impossible for all your ancestors to appear only once.<p>Of course, that&#x27;s just an easy upper bound to make the point that becoming a graph is unavoidable. In practice, branches will come together a lot sooner than that.</text><parent_chain></parent_chain></comment><story><title>Algorithm for Drawing Trees</title><url>https://rachel53461.wordpress.com/2014/04/20/algorithm-for-drawing-trees/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>anigbrowl</author><text>It&#x27;s a source of ongoing perplexity to me that so many Linux file managers don&#x27;t even offer a tree view, never mind some of the more advanced possibilities. Consider Robertson&#x27;s work on Cone Trees from Xerox Parc in....1991.<p><a href="https:&#x2F;&#x2F;research.tableau.com&#x2F;sites&#x2F;default&#x2F;files&#x2F;p189-robertson.pdf" rel="nofollow">https:&#x2F;&#x2F;research.tableau.com&#x2F;sites&#x2F;default&#x2F;files&#x2F;p189-robert...</a><p>and variants thereof at <a href="https:&#x2F;&#x2F;infovis-wiki.net&#x2F;wiki&#x2F;Cone_Trees" rel="nofollow">https:&#x2F;&#x2F;infovis-wiki.net&#x2F;wiki&#x2F;Cone_Trees</a><p>Oddly, there has been some work done on <i>source code</i> trees such as Gource, but for some reason nobody has yet thought of applying this to file systems or browser navigation paths.<p><a href="https:&#x2F;&#x2F;gource.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;gource.io&#x2F;</a></text><parent_chain></parent_chain></comment><story><title>Algorithm for Drawing Trees</title><url>https://rachel53461.wordpress.com/2014/04/20/algorithm-for-drawing-trees/</url></story> |
35,456,474 | 35,453,441 | 1 | 2 | 35,434,435 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>autokad</author><text>I built a similar website when working for a research lab ~2009. The lab is now closed, and thus so is the website but you can see some screen shots in this old time article: <a href="https:&#x2F;&#x2F;content.time.com&#x2F;time&#x2F;health&#x2F;article&#x2F;0,8599,2083636,00.html" rel="nofollow">https:&#x2F;&#x2F;content.time.com&#x2F;time&#x2F;health&#x2F;article&#x2F;0,8599,2083636,...</a><p>What was interesting how many jurisdictions got mad at me, because they thought I was targeting them. A hospital in Chicago that shut down their trauma center to save money but caused the south side of Chicago to loose 1 hour access thought I was targeting them as revenge over that action. The Florida Keys was mad at me because they had a hospital but no access and I&#x27;d be like &quot;I&#x27;m sorry but that hospital is not a Trauma center and this is a Trauma Center access map, if the hospital gets certified I&#x27;d be happy to update the data&quot;.<p>The hardest part was the data. I had to join the list of Trauma centers (levels 1 - 5, about 500 hospitals) with a hospital database (~5500 hospitals) to get additional information. I had to verify manually all the joins as well as the GPS coordinates.<p>Its a shame the app got shut down, it had some useful tools. You could see trauma center access via ambulance, air ambulance, or both for 45 and 60 minutes. It also had overlays for hospitals, trauma centers (levels 1, 2,..5), stroke centers, VA hospitals, and helipads. I also built an additional tool in a similar app to &#x27;build your own hospital system&#x27; by clicking on available hospitals and &#x27;upgrading&#x27; them to a TC or stroke center and then see how many people in the state gained access.</text><parent_chain></parent_chain></comment><story><title>Mapping hospital accessibility with OpenStreetMap</title><url>https://wcedmisten.fyi/post/visualizing-hospital-accessibility/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>sl-dolt</author><text>That&#x27;s really cool. I&#x27;ll probably end up trying to reproduce this by following your work step-by-step. I&#x27;m not too familiar with OSM, besides having used Nominatim.<p>Along the same lines we&#x27;re crowdsourcing a database of hospital prices, starting this week. I&#x27;m reviewing our first pull request as we speak. You can follow our progress live. The data is here: <a href="https:&#x2F;&#x2F;www.dolthub.com&#x2F;repositories&#x2F;dolthub&#x2F;standard-charge-files&#x2F;data&#x2F;main" rel="nofollow">https:&#x2F;&#x2F;www.dolthub.com&#x2F;repositories&#x2F;dolthub&#x2F;standard-charge...</a><p>We talked a little about the problems we&#x27;re encountering here: <a href="https:&#x2F;&#x2F;docs.google.com&#x2F;document&#x2F;d&#x2F;1uMx1sUYwP_uE7ebd3PtGvF0tZgWUhqgPd7lofxYzO3I&#x2F;edit#heading=h.y2u8vk12zbd7" rel="nofollow">https:&#x2F;&#x2F;docs.google.com&#x2F;document&#x2F;d&#x2F;1uMx1sUYwP_uE7ebd3PtGvF0t...</a> and here <a href="https:&#x2F;&#x2F;docs.google.com&#x2F;document&#x2F;d&#x2F;1NifwgKHBCeF35ZRZsfpgg4bErvlgsPnJBzPLvztwXLU&#x2F;edit#" rel="nofollow">https:&#x2F;&#x2F;docs.google.com&#x2F;document&#x2F;d&#x2F;1NifwgKHBCeF35ZRZsfpgg4bE...</a></text><parent_chain></parent_chain></comment><story><title>Mapping hospital accessibility with OpenStreetMap</title><url>https://wcedmisten.fyi/post/visualizing-hospital-accessibility/</url></story> |
24,572,425 | 24,572,448 | 1 | 2 | 24,564,669 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>wenc</author><text>This is reasoning that I&#x27;ve heard from MBAs themselves (I don&#x27;t have an MBA myself, so would welcome any thoughts from actual MBA holders). The value of an MBA is in signaling, networking and knowledge, roughly in that order.<p>In late career, assuming you&#x27;re doing well-enough that you&#x27;d want to pursue an MBA, you&#x27;d already have amassed quite a bit of business knowledge from the school of hard knocks, that likely exceeds the theory b-schools can teach (although they can definitely still fill in knowledge gaps say in finance or strategy etc.). The marginal value of the theory is even less if you majored in business in college -- the difference between a BBA and an MBA in terms of coursework is generally not substantial.<p>In late career, your experience and success (in different roles) is a generally stronger signal than credentials.<p>In late career, you&#x27;d have developed a fairly good network unless you&#x27;re looking to pivot to a totally different field or industry.</text><parent_chain><item><author>jasonzemos</author><text>&gt; A late career MBA in most cases has vastly diminished signalling&#x2F;credentialing value.<p>That anecdote seems to insinuate the essence of an MBA offers no substantive value, nor does even the achievement of the accreditation itself. It is the timing of the latter which projects the value.<p>Is that a really low or a really high bar?</text></item><item><author>wenc</author><text>I think my take-away is that a dollar consistently removed from one&#x27;s budget and invested will compound and hence there exists a nonlinear relationship between budget adjustments and runway. It&#x27;s definitely a relationship that people desiring financial independence can exploit.<p>However, there&#x27;s also time value to different classes of purchases. For instance, spending money acquiring certain skills early in life allows time for those skills to compound while the same investment later in life may have no utility.<p>The commonly cited example is an MBA: getting an MBA in early career provides more leverage than if it was obtained in mid career or later. A late career MBA in most cases has vastly diminished signalling&#x2F;credentialing value.<p>Frugality (in early life) that optimizes for the date of financial independence (and runway) is not a bad idea, but seems to me that employed in isolation, it may increase the chances of landing on a local optimum when other more favorable optima may exist.<p>People often talk about time value of money... but there&#x27;s also the time value of time&#x2F;age.</text></item></parent_chain></comment><story><title>Frugality Is Non-Linear (2019)</title><url>https://scattered-thoughts.net/writing/frugality-is-non-linear/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>toby</author><text>Whether it&#x27;s for the essence or the achievement of a particular degree, getting a better job earlier in life has substantial effects on lifetime earnings. Whatever the credential gets you, for whatever reason, it&#x27;s advantageous to have more time to take advantage of it.<p>The parent could have used MD (there are some people who switch careers to become doctors in their 30s) and it would be the same... just having a chance to have been a doctor for longer will put you ahead.</text><parent_chain><item><author>jasonzemos</author><text>&gt; A late career MBA in most cases has vastly diminished signalling&#x2F;credentialing value.<p>That anecdote seems to insinuate the essence of an MBA offers no substantive value, nor does even the achievement of the accreditation itself. It is the timing of the latter which projects the value.<p>Is that a really low or a really high bar?</text></item><item><author>wenc</author><text>I think my take-away is that a dollar consistently removed from one&#x27;s budget and invested will compound and hence there exists a nonlinear relationship between budget adjustments and runway. It&#x27;s definitely a relationship that people desiring financial independence can exploit.<p>However, there&#x27;s also time value to different classes of purchases. For instance, spending money acquiring certain skills early in life allows time for those skills to compound while the same investment later in life may have no utility.<p>The commonly cited example is an MBA: getting an MBA in early career provides more leverage than if it was obtained in mid career or later. A late career MBA in most cases has vastly diminished signalling&#x2F;credentialing value.<p>Frugality (in early life) that optimizes for the date of financial independence (and runway) is not a bad idea, but seems to me that employed in isolation, it may increase the chances of landing on a local optimum when other more favorable optima may exist.<p>People often talk about time value of money... but there&#x27;s also the time value of time&#x2F;age.</text></item></parent_chain></comment><story><title>Frugality Is Non-Linear (2019)</title><url>https://scattered-thoughts.net/writing/frugality-is-non-linear/</url></story> |
27,355,663 | 27,355,932 | 1 | 3 | 27,354,761 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>Diggsey</author><text>I used D for a while. It improves several things over C++, among them:<p>- More powerful metaprogramming capabilities.<p>- Better module and library system.<p>- Nicer syntax.<p>The problem IMO is it&#x27;s just not enough to justify a total move from C++ -&gt; D. The syntax of C++ can&#x27;t really be fixed, but the other aspects can be improved without a new language.<p>Furthermore, many of the other downsides of C++ are still present:<p>- The complexity of the language, and then the sheer number of different ways of doing the same thing.<p>- Some pretty dark corners in the way stdlib&#x2F;language feature were implemented that seemed hard to ever fix.<p>- The way behaviour is specified in the language is very tied to the underlying hardware: rather than explicitly describing behaviour in terms of an abstract machine, it works more in the way C++ is specified where we all know it operates on an abstract machine thanks to compiler optimizations, but the spec likes to pretend it doesn&#x27;t...<p>And then there are problems that are introduced by D, such as the fact that a safe subset exists, but depends on GC, so there&#x27;s a weird split where no &quot;safe code&quot; can be used in contexts where GC is unsuitable.<p>Contrast this to Rust, where:<p>- There is a true step-change in bringing safe code to <i>all</i> contexts, not just those where GC can be used.<p>- It&#x27;s missing a lot of the complexity of C++. Rust is hard because it has concepts that are foreign to a lot of programmers, but the total number of features is low (compared to C++) so there are fewer surprising ways they can interact.<p>- Rust is a suitable replacement for C, not just C++, because it&#x27;s not just adding more features.</text><parent_chain><item><author>fnord77</author><text>Any reasons D never caught on more? No big tech company anchor behind it?</text></item></parent_chain></comment><story><title>Driving with D</title><url>https://dlang.org/blog/2021/06/01/driving-with-d/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>systems</author><text>As far as I know D&#x27;s original design strategy, was to be a simpler to use C++ with a GC, but with the same expressive power<p>Over time, this proved to be a bad strategy, C++ key strength became RAII (deterministic memory management), so the GC became a failed strategy<p>The maintainers tried to move in different directions, adding manually memory management, making the GC optional, moved D to be a C replacement, with the -betterc compiling option, and many other tweaks and features added overtime, but nothing really caught on</text><parent_chain><item><author>fnord77</author><text>Any reasons D never caught on more? No big tech company anchor behind it?</text></item></parent_chain></comment><story><title>Driving with D</title><url>https://dlang.org/blog/2021/06/01/driving-with-d/</url></story> |
41,295,776 | 41,295,626 | 1 | 3 | 41,294,764 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>cooperx</author><text>Its the same as all the &quot;we are a blockchain company&quot; startups that popped up looking for a problem to solve with their tech rather than the right way round.<p>However, a lot of those got a bunch of investment or made some decent money in the short term. Very few are still around. We will see the same pattern here.</text><parent_chain><item><author>ryandrake</author><text>Companies keep going at it the wrong way. Instead of saying &quot;We have AI, let&#x27;s find products we can make out of AI!&quot; they should be saying, &quot;What products do people want, let&#x27;s use whatever tools we have (including maybe AI) to make them.&quot;<p>The idea that a company is an AI company should be as ridiculous as a company being a Python company. &quot;We are Python-first, have Python experts, and all of our products are made with Python. Our customers want their apps to have Python in them. We just have to &#x27;productize Python&#x27; and find the right killer app for Python and we&#x27;ll be successful!&quot; Going at it from the wrong direction. Replace Python in that quote with AI, and you probably have something a real company has said in 2024.</text></item></parent_chain></comment><story><title>AI companies are pivoting from creating gods to building products</title><url>https://www.aisnakeoil.com/p/ai-companies-are-pivoting-from-creating</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>necroforest</author><text>I don&#x27;t entirely disagree with you, but &quot;what products do people want&quot; is overly conservative. Pre-ChatGPT, very few people wanted a (more or less) general purpose chatbot.</text><parent_chain><item><author>ryandrake</author><text>Companies keep going at it the wrong way. Instead of saying &quot;We have AI, let&#x27;s find products we can make out of AI!&quot; they should be saying, &quot;What products do people want, let&#x27;s use whatever tools we have (including maybe AI) to make them.&quot;<p>The idea that a company is an AI company should be as ridiculous as a company being a Python company. &quot;We are Python-first, have Python experts, and all of our products are made with Python. Our customers want their apps to have Python in them. We just have to &#x27;productize Python&#x27; and find the right killer app for Python and we&#x27;ll be successful!&quot; Going at it from the wrong direction. Replace Python in that quote with AI, and you probably have something a real company has said in 2024.</text></item></parent_chain></comment><story><title>AI companies are pivoting from creating gods to building products</title><url>https://www.aisnakeoil.com/p/ai-companies-are-pivoting-from-creating</url></story> |
35,076,625 | 35,074,590 | 1 | 2 | 35,069,740 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>asveikau</author><text>If they get a warrant like the story in this article you&#x27;ll still have to hand it over.<p>The fact that it&#x27;s not on a popular cloud camera provider may make it harder for them to discover what it is they need to request, but they can still do it and you could still be compelled to comply.<p>In that case I would kind of rather they go to a megacorp vs. me needing to get a lawyer and figure out how to respond.<p>But generally I agree that it&#x27;s sketchy for a third party to hold the data.</text><parent_chain><item><author>giantg2</author><text>&quot;Who owns private home security footage&quot;<p>I do. DIY on-site only system.<p>Pretty simple really - stop using third party vendors for data storage. They&#x27;re cheap and easy because <i>your data</i> is usually the product. Sure, you would still be forced to comply with warrants&#x2F;subpoenas if they think you have data, but that&#x27;s basically unescapable.</text></item></parent_chain></comment><story><title>Who owns private home security footage, and who can get access to it?</title><url>https://www.politico.com/news/2023/03/07/privacy-loophole-ring-doorbell-00084979</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>hot_gril</author><text>&gt; stop using third party vendors for data storage<p>No. I need a system that detects motion during scheduled times (ideally only humans) and buzzes my phone instantly, giving me a live view and saving a recording around that time. And most of all, it has to be reliable enough that I don&#x27;t question whether it&#x27;s working. Anyone who says this is easy is underestimating it.<p>Something on-prem could do all that, but nobody sells it, and most DIY systems don&#x27;t have those features (does yours?). So here I am with the Ring.</text><parent_chain><item><author>giantg2</author><text>&quot;Who owns private home security footage&quot;<p>I do. DIY on-site only system.<p>Pretty simple really - stop using third party vendors for data storage. They&#x27;re cheap and easy because <i>your data</i> is usually the product. Sure, you would still be forced to comply with warrants&#x2F;subpoenas if they think you have data, but that&#x27;s basically unescapable.</text></item></parent_chain></comment><story><title>Who owns private home security footage, and who can get access to it?</title><url>https://www.politico.com/news/2023/03/07/privacy-loophole-ring-doorbell-00084979</url></story> |
10,256,000 | 10,255,453 | 1 | 2 | 10,252,378 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>eegilbert</author><text>Hey look, it&#x27;s my paper. :-)<p>Dunno why this caught back on now. Paper is from 2012.</text><parent_chain></parent_chain></comment><story><title>The Linguistics of Writing an Email Like a Boss</title><url>http://priceonomics.com/the-linguistics-of-writing-an-email-like-a-boss/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>basseq</author><text>This is fascinating. Unsurprised by a lot of the findings, as I see them on a pretty regular basis.<p>I really interesting technology offering would be an application of this used to map the &quot;real&quot; power structure vs. the org. chart. Imagine the power of that as a starting point in an organizational design?<p>Conversely, I know people who say, &quot;Great thanks!&quot; in threads in which they otherwise play no part. And I <i>hate</i> those people.</text><parent_chain></parent_chain></comment><story><title>The Linguistics of Writing an Email Like a Boss</title><url>http://priceonomics.com/the-linguistics-of-writing-an-email-like-a-boss/</url></story> |
21,622,261 | 21,621,549 | 1 | 2 | 21,620,687 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>smnrchrds</author><text>I am a mechanical engineer. Mechanical engineering jobs ask for SolidWorks&#x2F;AutoCAD&#x2F;CATIA&#x2F;Creo&#x2F;etc experience, not just computer-aided design; ANSYS&#x2F;ABAQUS&#x2F;NASTRAN&#x2F;etc expertise, not just finite element method; Fluent&#x2F;CFX&#x2F;OpenFOAM&#x2F;etc knowledge, not just computational fluid dynamics.<p>With the exception of OpenFOAM, all of these software are proprietary, largely non-interoperable, and expensive—like thousands to tens of thousands of dollars for the cheapest option with basic functionality kind of expensive; like I can never imagine opening my independent consultancy business because how expensive the basic tools are kind of expensive.<p>Outside of programming, this is the norm. The number of free and&#x2F;or open-source tools available to a mechanical engineer or an electrical engineer are infinitesimally small and it is almost impossible to do a serious engineering project with only free tools.<p>Since this is quite lucrative for the companies making those tools, I can only imagine tech companies would be more than happy to lead us to a future where software engineering is similar in this regard to other engineering disciplines. Perhaps this is what happens when a field matures, and since software is maturing, it will become more and more like this as the time goes on.</text><parent_chain><item><author>_bxg1</author><text>It remains weird and disturbing to me that &quot;AWS&quot; is treated as a skill. Not &quot;cloud system management&quot;, but &quot;<i>AWS</i>&quot;.<p>Edit: I do understand <i>why</i> it can be lucrative to have expertise with a specific cloud provider. It&#x27;s just the status quo of these services being their own unique silos that disturbs me: I would personally be wary of making &quot;ability to effectively use Amazon&#x27;s servers&quot; a pillar of my career.</text></item></parent_chain></comment><story><title>Today’s Top Tech Skills</title><url>https://www.hiringlab.org/2019/11/19/todays-top-tech-skills/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>moltar</author><text>You can say smithing like, “weird to see Linux admin, instead of OS admin”. But doesn’t make sense in a business context, if you want a Linux admin.</text><parent_chain><item><author>_bxg1</author><text>It remains weird and disturbing to me that &quot;AWS&quot; is treated as a skill. Not &quot;cloud system management&quot;, but &quot;<i>AWS</i>&quot;.<p>Edit: I do understand <i>why</i> it can be lucrative to have expertise with a specific cloud provider. It&#x27;s just the status quo of these services being their own unique silos that disturbs me: I would personally be wary of making &quot;ability to effectively use Amazon&#x27;s servers&quot; a pillar of my career.</text></item></parent_chain></comment><story><title>Today’s Top Tech Skills</title><url>https://www.hiringlab.org/2019/11/19/todays-top-tech-skills/</url></story> |
10,789,651 | 10,789,638 | 1 | 2 | 10,789,170 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>romanhn</author><text><i>Bronnikov&#x27;s elder son Vladimir ... also served in police. After 17 years of service, he was badly beaten undertaking his duties and his spine was broken. He now walks on crutches. His younger son Evgeniy was beaten to death in the street when trying to save a girl from rapists.</i><p>What a dark reminder that in society&#x27;s underbelly convict tattoos are a sign of prestige and no good deed goes unpunished. No wonder that in cultures with &quot;well-developed&quot; underbellies, altruistic behavior tends to be less prevalent.</text><parent_chain></parent_chain></comment><story><title>Russia's leading expert on criminal tattoos</title><url>http://siberiantimes.com/other/others/features/f0195-the-man-who-reads-the-criminal-mind-by-analysing-convicts-tattoos/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>m0nastic</author><text>A few years back I picked up &quot;Russian Criminal Tattoo Encyclopedia Volumes 1-3&quot; on Amazon[1] for something I was working on and they are fascinating.<p>[1] <a href="http:&#x2F;&#x2F;www.amazon.com&#x2F;Russian-Criminal-Tattoo-Encyclopaedia-I&#x2F;dp&#x2F;0955862078&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.amazon.com&#x2F;Russian-Criminal-Tattoo-Encyclopaedia-...</a></text><parent_chain></parent_chain></comment><story><title>Russia's leading expert on criminal tattoos</title><url>http://siberiantimes.com/other/others/features/f0195-the-man-who-reads-the-criminal-mind-by-analysing-convicts-tattoos/</url></story> |
6,820,872 | 6,820,715 | 1 | 3 | 6,819,472 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>aaronbrethorst</author><text>Just try reading it on an iPad. It&#x27;s an absolutely miserable experience. It feels like they tried to reimplement scrolling, which, of course, they get totally wrong.<p>It baffles me that companies spend significant amounts of time and resources making a user experience that <i>works great</i> rather awful[1].<p>[1] See also: Flickr.</text><parent_chain><item><author>pg</author><text>Is it the default now for individual entries on blogger.com blogs to be displayed as lightboxes, or is this just an unusual option this one user chose?</text></item></parent_chain></comment><story><title>An engineer's emergency kit business card</title><url>http://boldport.blogspot.co.uk/2013/11/an-engineers-emergency-kit-business-card.html</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>pavel_lishin</author><text>Every blog there seems to do this by default, which means that Pocket, etc., can&#x27;t read them.</text><parent_chain><item><author>pg</author><text>Is it the default now for individual entries on blogger.com blogs to be displayed as lightboxes, or is this just an unusual option this one user chose?</text></item></parent_chain></comment><story><title>An engineer's emergency kit business card</title><url>http://boldport.blogspot.co.uk/2013/11/an-engineers-emergency-kit-business-card.html</url></story> |
11,571,421 | 11,571,587 | 1 | 3 | 11,569,657 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>harryf</author><text>20 years ago it wouldn&#x27;t have been news at all. Now it&#x27;s hard to make things completely vanish. Its just the balance between scandals and outrage has shifted; far more scandals are floating to the surface in the Information Age and outrage has yet to catch up. But it will</text><parent_chain><item><author>jmnicolas</author><text>This article will not change anything. By the time our day end we will have been bombarded by so much other information that it will just be one more forgotten thing.<p>And there&#x27;s so much things that are revolting that our brains are just shutting down as a self defense mechanism.<p>Sociopaths in power don&#x27;t even need to hide anymore, they know they are hidden in the noise.<p>I mean look at Turkey : they help ISIS, they shoot Syrian refugees crossing the border, they kill their own Kurdish population and they denies a genocide ... barely a blip in the news.</text></item></parent_chain></comment><story><title>The Al-Qaeda Leader Who Wasn’t: The Shameful Ordeal of Abu Zubaydah</title><url>http://www.tomdispatch.com/post/176132/tomgram%3A_rebecca_gordon%2C_exhibit_one_in_any_future_american_war_crimes_trial/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>user_0001</author><text>yes, but we need Turkey. They are in Nato, they are on &quot;our&quot; side - thus we do not criticise (and if we do - very meekly).<p>The same as when they are &quot;our&quot; dictators, or &quot;theirs&quot;. Whether the government is murdering &quot;communists in their 10s &#x2F; 100s of thousands or whether the government is trying to improve the lot of the country&#x27;s people via social programs at the experience of foreign (our) international businesses.</text><parent_chain><item><author>jmnicolas</author><text>This article will not change anything. By the time our day end we will have been bombarded by so much other information that it will just be one more forgotten thing.<p>And there&#x27;s so much things that are revolting that our brains are just shutting down as a self defense mechanism.<p>Sociopaths in power don&#x27;t even need to hide anymore, they know they are hidden in the noise.<p>I mean look at Turkey : they help ISIS, they shoot Syrian refugees crossing the border, they kill their own Kurdish population and they denies a genocide ... barely a blip in the news.</text></item></parent_chain></comment><story><title>The Al-Qaeda Leader Who Wasn’t: The Shameful Ordeal of Abu Zubaydah</title><url>http://www.tomdispatch.com/post/176132/tomgram%3A_rebecca_gordon%2C_exhibit_one_in_any_future_american_war_crimes_trial/</url></story> |
18,183,714 | 18,182,706 | 1 | 2 | 18,182,425 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>amelius</author><text>Also, what they usually don&#x27;t tell you is that the recipe bag only works for toy problems. For real applications you most often need numerical approximations.</text><parent_chain><item><author>acjohnson55</author><text>DiffEq seemed like black magic to me when I took it as a freshman in college. They basically just taught us the recipe bag for solving equations in different shapes, but very little insight.<p>When I started a gamified music discovery company, I actually ended up using DiffEq to define a scoring algorithm that would produce continuously varying point values based on time series input data. I had to relearn how to do it, but the concepts made far more sense with a real application.</text></item></parent_chain></comment><story><title>Introduction to Differential Equations (2008)</title><url>http://tutorial.math.lamar.edu/Classes/DE/Definitions.aspx</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>craig_asp</author><text>Yeah, it&#x27;s relatively dry material which is hard to grasp without the context of why we need it and how it can be applied in the real world. While the intro is good, it still has the same problem - just shows (in a good way) &quot;some math&quot;.</text><parent_chain><item><author>acjohnson55</author><text>DiffEq seemed like black magic to me when I took it as a freshman in college. They basically just taught us the recipe bag for solving equations in different shapes, but very little insight.<p>When I started a gamified music discovery company, I actually ended up using DiffEq to define a scoring algorithm that would produce continuously varying point values based on time series input data. I had to relearn how to do it, but the concepts made far more sense with a real application.</text></item></parent_chain></comment><story><title>Introduction to Differential Equations (2008)</title><url>http://tutorial.math.lamar.edu/Classes/DE/Definitions.aspx</url></story> |
17,561,391 | 17,560,108 | 1 | 2 | 17,556,497 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>blub</author><text>Having worked for so many years at Google, you should be aware that your employer is forbidding Android manufacturers to also produce any non-certified Android-based devices. No Android logo, no app store, no GApps, still forbidden if that company happens to sell an unrelated Android device.<p>So in fact it is not about &quot;whether Google is allowed to control the experience of Android phones that want to use the Google apps and app store or not&quot;.<p>Regarding open source, Android v1 was an underpowered and underfeatured newcomer in a market dominated by Symbian and Blackberry where Windows was at a few percent and iOS was making inroads.<p>There&#x27;s a very good chance that without it being open source it would have went precisely nowhere. Let&#x27;s not rewrite history and make it look like Android was a clear winner from the beginning, back then even iPhone was pretty crap, and Android was that times two.</text><parent_chain><item><author>DannyBee</author><text>The net outcome of this decision will be that nobody will create significant open platforms of this type anymore, because once you are successful you will no longer be able to have any control over the experience. Someone will always be able to find a market that you are hurting.<p>If you actually read the decision that&#x27;s essentially their underlying complaint. They dress it up in terms about search market blah blah blah, but in the end it&#x27;s really about whether Google is allowed to control the experience of Android phones that want to use the Google apps and app store or not.
Android being open at all was already a fight inside Google, this decision will essentially make it impossible for anybody win that fight in the future. I can&#x27;t see why anyone would risk making an open platform again. Success only has downsides versus Apple&#x27;s model.
I expect the next major player here will either sell the operating system or sell the phones, and keep the other stuff closed</text></item></parent_chain></comment><story><title>European Commission fines Google €4.34B in Android antitrust case</title><url>http://europa.eu/rapid/press-release_IP-18-4581_en.htm</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>codedokode</author><text>I cannot agree. The main problem is that Google has proprietary Google Play Services and instead of just selling it Google sets additional terms that prevent competition, like preinstalling competitors&#x27; search engines, or competitors&#x27; software. It is difficult to earn large profits in a competing market; but this is benefecial for consumers and their interests should be put before Google&#x27;s.</text><parent_chain><item><author>DannyBee</author><text>The net outcome of this decision will be that nobody will create significant open platforms of this type anymore, because once you are successful you will no longer be able to have any control over the experience. Someone will always be able to find a market that you are hurting.<p>If you actually read the decision that&#x27;s essentially their underlying complaint. They dress it up in terms about search market blah blah blah, but in the end it&#x27;s really about whether Google is allowed to control the experience of Android phones that want to use the Google apps and app store or not.
Android being open at all was already a fight inside Google, this decision will essentially make it impossible for anybody win that fight in the future. I can&#x27;t see why anyone would risk making an open platform again. Success only has downsides versus Apple&#x27;s model.
I expect the next major player here will either sell the operating system or sell the phones, and keep the other stuff closed</text></item></parent_chain></comment><story><title>European Commission fines Google €4.34B in Android antitrust case</title><url>http://europa.eu/rapid/press-release_IP-18-4581_en.htm</url></story> |
34,738,550 | 34,737,967 | 1 | 3 | 34,736,745 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>knaik94</author><text>This isn&#x27;t going to be released commercially, as a very successful artist, he knows that better than most. No record label would release songs without clearing things with the relevant artist. Many artists and DJs don&#x27;t release live sets&#x2F;remixes because it would be impossible to clear all the samples, I don&#x27;t see why this would be any different.</text><parent_chain><item><author>tlarkworthy</author><text>The music industry will not like this, seems like a short circuit around royalties and the value of a music deal with an artist.</text></item></parent_chain></comment><story><title>David Guetta uses ChatGPT and uberduck.ai to deepfake Eminem rap for DJ set</title><url>https://twitter.com/davidguetta/status/1621605376733872129</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>rapsey</author><text>It is like in the early youtube days where everyone was just waiting who is going to shut them down.</text><parent_chain><item><author>tlarkworthy</author><text>The music industry will not like this, seems like a short circuit around royalties and the value of a music deal with an artist.</text></item></parent_chain></comment><story><title>David Guetta uses ChatGPT and uberduck.ai to deepfake Eminem rap for DJ set</title><url>https://twitter.com/davidguetta/status/1621605376733872129</url></story> |
37,831,549 | 37,831,728 | 1 | 2 | 37,829,964 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>korginator</author><text>As with many Pāli words (e.g., dhamma, samkhāra, etc.), it&#x27;s hard to provide a simplistic one-dimensional translation of the phrase &quot;mettā&quot;, often crudely translated as loving-kindness. When you read through the Sutta Nipata and the early texts, it comes across more as unconditional or unconstrained friendliness which is far easier to practice in real life, even when you can&#x27;t make yourself feel loving-kindness.<p>There are several other passages from the oldest strata of Pāli texts, e.g., the SNP (Sutta Nipata) and some of the connected discourses (Samyutta Nikāya) that talk more about metta, a rich and complex tapestry that paints a picture of the actual and original intent behind the word or phrase.<p>This talk by Prof. John Peacock has some good insights into the phrase mettā, and provides a good overall context.<p><a href="https:&#x2F;&#x2F;www.audiodharma.org&#x2F;talks&#x2F;2600" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.audiodharma.org&#x2F;talks&#x2F;2600</a><p>Mettā is part of the four brahmavihārās or practises to cultivate wholesome states of mind, the others being karuṇā (compassion &amp; kindness for oneself and for others), muditā (simplistically translated as &quot;empathetic joy&quot;) and upekkhā (equanimity).</text><parent_chain></parent_chain></comment><story><title>Karaniya Metta Sutta: The Buddha's Words on Loving-Kindness</title><url>https://www.accesstoinsight.org/tipitaka/kn/snp/snp.1.08.amar.html</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>krzat</author><text>Interesting to see this here, without any context attached. I&#x27;ve been practicing loving kindness meditation for a few months now and the results have been incredible.<p>I&#x27;m atheist, pretty sure reincarnation is bullshit, but the method described in this sutta works. In mundane terms, you can train your brain to be happier and more joyful by those simple visualizations.<p>I&#x27;m not quite sure what is the role of spreading kindness in all directions, perhaps it somehow ties our perception of space and time, which is always present, with good feelings - what fires together, wires together - making them more likely to appear in future.</text><parent_chain></parent_chain></comment><story><title>Karaniya Metta Sutta: The Buddha's Words on Loving-Kindness</title><url>https://www.accesstoinsight.org/tipitaka/kn/snp/snp.1.08.amar.html</url></story> |
39,804,931 | 39,804,702 | 1 | 3 | 39,803,845 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>safety1st</author><text>Yeah, that map looks a lot like developed world vs. developing world. So two major factors here almost certainly are:<p>1) Fewer people in developing countries are dying from other things than they were 30 years ago, for example malnutrition and maternal or infant mortality.<p>2) Better diagnostics and screening. Screening is a big deal, in a sufficiently immature medical system you&#x27;ll have people who die of cancer that never even get diagnosed. Start doing better screening and you will find and treat these cases earlier.<p>The fact that one of the biggest increases was in prostate cancer supports this idea (at least to my layman&#x27;s eye). Prostate cancer tends to remain benign for a long time so you won&#x27;t catch it without screening.<p>If you look at the right-hand column you will notice, compared to the West, there&#x27;s barely any cancer in Africa! (Incidence rate is very low) Of course that isn&#x27;t because no one gets cancer in Africa, it&#x27;s because much of the population has limited access to screening&#x2F;diagnoses.<p>I don&#x27;t think we need to leap to the conclusion that microplastics are causing cancer to skyrocket.<p>In the developed world it is almost all good news. Incidence rates are flat to down over the last 30 years. Death rates are flat to dramatically down due to improved treatment.<p>Here is a direct link <a href="https:&#x2F;&#x2F;bmjoncology.bmj.com&#x2F;content&#x2F;bmjonc&#x2F;2&#x2F;1&#x2F;e000049&#x2F;F3.large.jpg" rel="nofollow">https:&#x2F;&#x2F;bmjoncology.bmj.com&#x2F;content&#x2F;bmjonc&#x2F;2&#x2F;1&#x2F;e000049&#x2F;F3.la...</a></text><parent_chain><item><author>twothreeone</author><text>Figure 3 shows incident rate changes in percent by country, it seems there are stark increases in South American and African countries and mainly declining incident rates in western countries. Intuitively, I would associate increases in those regions with increased access to medical care there - so, overall a good thing?</text></item></parent_chain></comment><story><title>Cancer under age 50 increased 80% from 1990 to 2019</title><url>https://bmjoncology.bmj.com/content/2/1/e000049#DC1</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>sdenton4</author><text>When I was living in Kenya around 2013, open pit burning was the main way of dealing with trash... And included a lot of plastics, batteries, you name it.</text><parent_chain><item><author>twothreeone</author><text>Figure 3 shows incident rate changes in percent by country, it seems there are stark increases in South American and African countries and mainly declining incident rates in western countries. Intuitively, I would associate increases in those regions with increased access to medical care there - so, overall a good thing?</text></item></parent_chain></comment><story><title>Cancer under age 50 increased 80% from 1990 to 2019</title><url>https://bmjoncology.bmj.com/content/2/1/e000049#DC1</url></story> |
24,708,511 | 24,708,399 | 1 | 3 | 24,707,924 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>finnthehuman</author><text>There are a number of youtube channels that would (probably still will) tear down the PS5 as soon as they get one.<p>This way Sony gets to control the messaging. The person doing the work has disassembled a ps5 dozens of times, doesn&#x27;t question any design decisions, or share any information that could be learned from the PCB that Sony doesn&#x27;t want to publicize.</text><parent_chain><item><author>eatonphil</author><text>Is this standard practice to do in gaming consoles? That the manufacturer themselves does this teardown? I have never seen this sort of first party teardown for any console or laptop manufacturer. It&#x27;s great to see that degree of confidence and transparency.</text></item></parent_chain></comment><story><title>PS5 Teardown [video]</title><url>https://www.youtube.com/watch?v=CaAY-jAjm0w</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>Cthulhu_</author><text>They did one for the PS4: <a href="https:&#x2F;&#x2F;www.wired.com&#x2F;2013&#x2F;11&#x2F;playstation4-teardown-video&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.wired.com&#x2F;2013&#x2F;11&#x2F;playstation4-teardown-video&#x2F;</a> (couldn&#x27;t find a YT link), and one for the PS4 Pro: <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=euBlNq5kda0" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=euBlNq5kda0</a></text><parent_chain><item><author>eatonphil</author><text>Is this standard practice to do in gaming consoles? That the manufacturer themselves does this teardown? I have never seen this sort of first party teardown for any console or laptop manufacturer. It&#x27;s great to see that degree of confidence and transparency.</text></item></parent_chain></comment><story><title>PS5 Teardown [video]</title><url>https://www.youtube.com/watch?v=CaAY-jAjm0w</url></story> |
33,158,954 | 33,158,766 | 1 | 2 | 33,156,918 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>CrHn3</author><text>It is my understanding (from reading Kiss Your Dentist Goodbye) that bacteria is seeded from primary caregivers in the first year of life, and it can be difficult to modify them after this, but it’s possible.<p>My sister has impeccable dental hygiene and many cavities. Her children have had anesthesia because they needed so much dental work. I’m the kind of person who would floss once a year and never had a cavity until I was 28 and drinking many acidic diet sodas. I started the book’s regimen using xylitol, eating basic foods like chocolate and cheese after acidic foods and drinks, took Florassist dental probiotic and stayed on top of cleanings and have had less problems since. My child is okay so far despite some not so great habits. I get extra cleanings that first year and make sure other caregivers do too.</text><parent_chain><item><author>Waterluvian</author><text>Anecdotally, I’m having one hell of a time with my 3yo and 5yo’s teeth.<p>No juice. No soda. No bad snacks. Lots of dentist recommended foods and snacks. Full brushing and flossing regimen. Fluoride. Dentist applied special fluoride treatments. Trust me when I say we’re doing everything right.<p>And yet they’re 3 and 5 and have had so many cavities.<p>I asked my dad about it and he said my brothers and I had, frankly, poor dental hygiene, and not a single cavity until our teens.<p>I’m not saying it’s because of this organism or any specific thing. But I cannot shake the feeling that something significant has changed in the last 30 years.</text></item></parent_chain></comment><story><title>Microbes that cause cavities can form superorganisms able to ‘crawl’</title><url>https://penntoday.upenn.edu/news/microbes-cause-cavities-can-form-superorganisms-able-crawl-and-spread-teeth</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>bmau5</author><text>Any chance they are mouth-breathing at night? It can lead to a shift in pH in the mouth which may increase risk of cavities [1]<p>[1] <a href="https:&#x2F;&#x2F;pubmed.ncbi.nlm.nih.gov&#x2F;26666708&#x2F;" rel="nofollow">https:&#x2F;&#x2F;pubmed.ncbi.nlm.nih.gov&#x2F;26666708&#x2F;</a></text><parent_chain><item><author>Waterluvian</author><text>Anecdotally, I’m having one hell of a time with my 3yo and 5yo’s teeth.<p>No juice. No soda. No bad snacks. Lots of dentist recommended foods and snacks. Full brushing and flossing regimen. Fluoride. Dentist applied special fluoride treatments. Trust me when I say we’re doing everything right.<p>And yet they’re 3 and 5 and have had so many cavities.<p>I asked my dad about it and he said my brothers and I had, frankly, poor dental hygiene, and not a single cavity until our teens.<p>I’m not saying it’s because of this organism or any specific thing. But I cannot shake the feeling that something significant has changed in the last 30 years.</text></item></parent_chain></comment><story><title>Microbes that cause cavities can form superorganisms able to ‘crawl’</title><url>https://penntoday.upenn.edu/news/microbes-cause-cavities-can-form-superorganisms-able-crawl-and-spread-teeth</url></story> |
37,387,323 | 37,384,355 | 1 | 3 | 37,383,283 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>crote</author><text>I&#x27;d say that the CPU example actually <i>proves</i> the point.<p>A computer today costs <i>roughly</i> the same as a computer in the 1980s, and it also consumes <i>roughly</i> the same amount of energy as a computer from that era. We got faster computers because we got better at making transistors.<p>If we look at laptops, a device which consumes 200W already gets hot enough that it is uncomfortable to actually place on your lap. A 1kW desktop computer is pretty much impossible to cool.<p>At our current population, those 5 million exajoules a year is a constant power consumption of roughly 16 megawatt per person. For comparison, that&#x27;s about the same magnitude of energy you&#x27;d need for every human to launch a Falcon 9 to eat lunch in the ISS. Once figures get this big, you simply run out of things to do.</text><parent_chain><item><author>Nition</author><text>Humanity needing that amount of energy seems obviously absurd, but then I suppose a CPU with 100 billion transistors seemed clearly impossible in 1960.<p>Maybe a few hundred years from now, Internet archaeologists will find your comment as one of the first harbingers of the coming World Energy Crisis, much as we see the 1912 Rodney &amp; Otamatea Times &quot;Coal Consumption Affecting Climate&quot; snippet today.[0]<p>Then they&#x27;ll find this comment...<p>----<p>[0] <a href="https:&#x2F;&#x2F;paperspast.natlib.govt.nz&#x2F;newspapers&#x2F;rodney-and-otamatea-times-waitemata-and-kaipara-gazette&#x2F;1912&#x2F;08&#x2F;14&#x2F;7" rel="nofollow noreferrer">https:&#x2F;&#x2F;paperspast.natlib.govt.nz&#x2F;newspapers&#x2F;rodney-and-otam...</a></text></item><item><author>wcoenen</author><text>I&#x27;m not sure the author realized this, but they&#x27;re actually making a statement about how crazy exponential growth is. Not about the sustainability of tidal power. This becomes obvious once you look closer at what that 2% growth rate (as assumed in the post) implies.<p>Our global energy consumption in 2008 was estimated to be 474 exajoules. The total energy received by the earth from the sun during a year is about 5 million exajoules, a fraction of which reaches the surface. 5 million is much more than 474. But at a seemingly modest 2% per year growth rate (as it was between 1980 and 2006), our energy consumption will match those 5 million exajoules in less than 500 years!<p>Think about that: if energy consumption growth continues at the current pace, then in 500 years we&#x27;ll either be using ALL solar energy received by the earth (leaving none for the biosphere), or we&#x27;ll have figured out some magic technology to produce 5 million exajoules of energy per year. Assuming the magic technology, where are we going to get rid of all that extra heat? It would effectively be like having a second sun on earth, cooking us in place.<p>edit: I copied the numbers above from a post I wrote in 2010, so it may be a bit out of date. But Sabine Hossenfelder recently made a video where she talked about a similar timescale, i.e. boiling oceans in 400 years: <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=9vRtA7STvH4">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=9vRtA7STvH4</a></text></item></parent_chain></comment><story><title>Tidal energy is not renewable</title><url>https://cs.stanford.edu/people/zjl/tide.html</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>mNovak</author><text>A direct link to the mentioned snippet:<p><a href="https:&#x2F;&#x2F;paperspast.natlib.govt.nz&#x2F;newspapers&#x2F;ROTWKG19120814.2.56.5" rel="nofollow noreferrer">https:&#x2F;&#x2F;paperspast.natlib.govt.nz&#x2F;newspapers&#x2F;ROTWKG19120814....</a></text><parent_chain><item><author>Nition</author><text>Humanity needing that amount of energy seems obviously absurd, but then I suppose a CPU with 100 billion transistors seemed clearly impossible in 1960.<p>Maybe a few hundred years from now, Internet archaeologists will find your comment as one of the first harbingers of the coming World Energy Crisis, much as we see the 1912 Rodney &amp; Otamatea Times &quot;Coal Consumption Affecting Climate&quot; snippet today.[0]<p>Then they&#x27;ll find this comment...<p>----<p>[0] <a href="https:&#x2F;&#x2F;paperspast.natlib.govt.nz&#x2F;newspapers&#x2F;rodney-and-otamatea-times-waitemata-and-kaipara-gazette&#x2F;1912&#x2F;08&#x2F;14&#x2F;7" rel="nofollow noreferrer">https:&#x2F;&#x2F;paperspast.natlib.govt.nz&#x2F;newspapers&#x2F;rodney-and-otam...</a></text></item><item><author>wcoenen</author><text>I&#x27;m not sure the author realized this, but they&#x27;re actually making a statement about how crazy exponential growth is. Not about the sustainability of tidal power. This becomes obvious once you look closer at what that 2% growth rate (as assumed in the post) implies.<p>Our global energy consumption in 2008 was estimated to be 474 exajoules. The total energy received by the earth from the sun during a year is about 5 million exajoules, a fraction of which reaches the surface. 5 million is much more than 474. But at a seemingly modest 2% per year growth rate (as it was between 1980 and 2006), our energy consumption will match those 5 million exajoules in less than 500 years!<p>Think about that: if energy consumption growth continues at the current pace, then in 500 years we&#x27;ll either be using ALL solar energy received by the earth (leaving none for the biosphere), or we&#x27;ll have figured out some magic technology to produce 5 million exajoules of energy per year. Assuming the magic technology, where are we going to get rid of all that extra heat? It would effectively be like having a second sun on earth, cooking us in place.<p>edit: I copied the numbers above from a post I wrote in 2010, so it may be a bit out of date. But Sabine Hossenfelder recently made a video where she talked about a similar timescale, i.e. boiling oceans in 400 years: <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=9vRtA7STvH4">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=9vRtA7STvH4</a></text></item></parent_chain></comment><story><title>Tidal energy is not renewable</title><url>https://cs.stanford.edu/people/zjl/tide.html</url></story> |
9,893,767 | 9,893,018 | 1 | 2 | 9,892,970 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>Animats</author><text>The main trend for Bitcoin in 2015 is that not much happened. The price is within 10% of where it was at the beginning of the year. Transaction volume in dollars is flat, or down a little. Many of the companies which were accepting Bitcoin no longer are; those that are report low transaction volumes. (There are lots of merchants which &quot;accept Bitcoin&quot; because it&#x27;s an option in some shopping cart programs, but those just send the Bitcoins to Coinbase, which converts them to dollars and sends the funds to the merchant.)<p>The big trends in Bitcoin seem to be:<p>- Amateur hour is over. The remaining exchanges are bigger and seemingly more stable, although none of them are up to bank-level yet. New York&#x27;s Bitcoin regulation seems to have been accepted.<p>- Mining is more centralized than ever. Most of the big Bitcoin miners are in cold areas of China with cheap power. China has well over 50% of the hash rate now. This may just be a way to convert yuan to dollars. (China has currency controls, but encourages exports. For a few months, it was legal in China to buy Bitcoins with yuan through regular payment channels, then sell the Bitcoins outside China for dollars. That drove the $1000 Bitcoin bubble, and was shut down by the People&#x27;s Bank of China last year, causing the Bitcoin crash. <i>Mining</i> Bitcoin in China, and selling it outside China, is considered &quot;exporting&quot; and is a legal way to convert yuan to dollars.)<p>- Since the shutdown of Silk Road I and Silk Road II and the related arrests, Bitcoin is no longer considered a safe way to buy drugs. This doesn&#x27;t seem to have affected the price much one way or the other.<p>- Bitcoin ATMs are disappearing. In the SF bay area, Hacker Dojo and Workshop Cafe got rid of theirs, and Nakamoto&#x27;s doesn&#x27;t have theirs working. Hero City (a co-working space) may still have one.<p>History of Bitcoin:<p><pre><code> 2013: Wow!
2014: Aargh!
2015: Meh.</code></pre></text><parent_chain></parent_chain></comment><story><title>Bitcoin Trends in the First Half of 2015</title><url>https://blog.coinbase.com/2015/07/15/bitcoin-trends-in-1h-2015/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>ceallen</author><text>No mention of the &#x27;stress test&#x27; that&#x27;s brought the network to its knees the past few days, or of the soft fork that resulted in suggestions to wait for 30+ confirmations? Puff piece.<p>C&#x27;mon Coinbase, at least spin them into a &#x27;&lt;X&gt; is actually good for Bitcoin, because &lt;Y&gt;&#x27; format.</text><parent_chain></parent_chain></comment><story><title>Bitcoin Trends in the First Half of 2015</title><url>https://blog.coinbase.com/2015/07/15/bitcoin-trends-in-1h-2015/</url></story> |
35,303,931 | 35,303,951 | 1 | 3 | 35,303,391 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>jeffbee</author><text>As a teenager I got to work and study at Fermi for two weeks under a DoE summer program. There was one kid from each US state and territory, and a few from other countries. We worked in the shops assembling the D0 and Leon Lederman tried to teach cosmology, which was both an incredible privilege and ultimately futile. I was eating in the cafeteria the day the Texas Supercollider was canceled and I don’t think there’s ever been a sadder crowd of physicists anywhere.<p>I wonder if they still do that summer program.</text><parent_chain><item><author>h2odragon</author><text>One of my great joys as a teenager exploring electronics was the opportunity to clean out an old storage closet at some Fermilab facility with a friend. This was in the late 80s, we got several 1950s oscilloscopes and much other gear of similar era.<p>The room had been overlooked in the usual surplus process for years. My friend was related to someone working for the janitorial services company, and they&#x27;d been told to clean that room out and throw the stuff away. So what we got to do was help with that, and put anything we liked in my car instead of the dumpster.<p>We were stripping stuff there in the parking lot to save space. Crammed that car <i>full</i> of junk. It was a truly wonderful day.</text></item></parent_chain></comment><story><title>Major shake-up coming for Fermilab, the troubled U.S. particle physics center</title><url>https://www.science.org/content/article/major-shake-coming-fermilab-troubled-u-s-particle-physics-center</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>jjtheblunt</author><text>Fermilab was built from late 1967 and opened in 1969 so that must have been really old stuff.<p>Similar to your story, I got to take high school physics extra classes there, and it was awesome, like being in a Star Wars set with entirely normal parents who worked there and who could teach us really interesting physics (classical mostly, and relativity).</text><parent_chain><item><author>h2odragon</author><text>One of my great joys as a teenager exploring electronics was the opportunity to clean out an old storage closet at some Fermilab facility with a friend. This was in the late 80s, we got several 1950s oscilloscopes and much other gear of similar era.<p>The room had been overlooked in the usual surplus process for years. My friend was related to someone working for the janitorial services company, and they&#x27;d been told to clean that room out and throw the stuff away. So what we got to do was help with that, and put anything we liked in my car instead of the dumpster.<p>We were stripping stuff there in the parking lot to save space. Crammed that car <i>full</i> of junk. It was a truly wonderful day.</text></item></parent_chain></comment><story><title>Major shake-up coming for Fermilab, the troubled U.S. particle physics center</title><url>https://www.science.org/content/article/major-shake-coming-fermilab-troubled-u-s-particle-physics-center</url></story> |
16,301,322 | 16,300,738 | 1 | 2 | 16,299,632 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>assface</author><text>AFAIK, there are only a handful of DBMSs that do complete query compilation with the LLVM:<p>* MemSQL (<a href="http:&#x2F;&#x2F;highscalability.com&#x2F;blog&#x2F;2016&#x2F;9&#x2F;7&#x2F;code-generation-the-inner-sanctum-of-database-performance.html" rel="nofollow">http:&#x2F;&#x2F;highscalability.com&#x2F;blog&#x2F;2016&#x2F;9&#x2F;7&#x2F;code-generation-the...</a>)<p>* Tableau&#x2F;TUM HyPer (<a href="https:&#x2F;&#x2F;blog.acolyer.org&#x2F;2016&#x2F;05&#x2F;23&#x2F;efficiently-compiling-efficient-query-plans-for-modern-hardware&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.acolyer.org&#x2F;2016&#x2F;05&#x2F;23&#x2F;efficiently-compiling-ef...</a>)<p>* CMU Peloton (<a href="http:&#x2F;&#x2F;db.cs.cmu.edu&#x2F;papers&#x2F;2017&#x2F;p1-menon.pdf" rel="nofollow">http:&#x2F;&#x2F;db.cs.cmu.edu&#x2F;papers&#x2F;2017&#x2F;p1-menon.pdf</a>)<p>* Vitesse (<a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=PEmVuYjhQFo" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=PEmVuYjhQFo</a>)<p>I think Greenplum was talking about doing this too, but that was about a year ago (<a href="http:&#x2F;&#x2F;engineering.pivotal.io&#x2F;post&#x2F;orca-profiling&#x2F;" rel="nofollow">http:&#x2F;&#x2F;engineering.pivotal.io&#x2F;post&#x2F;orca-profiling&#x2F;</a>)<p>Most systems just compile the predicates (Impala, SparkSQL).<p>A lot of companies are talking about adding this now. The performance gains are significant.</text><parent_chain></parent_chain></comment><story><title>JITing PostgreSQL using LLVM [pdf]</title><url>http://anarazel.de/talks/fosdem-2018-02-03/jit.pdf</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>dfox</author><text>For me this is great demonstration of how SSDs have changed the performance landscape. Exactly this idea was discussed on P2D2 10 or so years ago and generally dismissed as too much work for negligible performace gain because the disk IO will still dominate. Today I believe that this makes sense.<p>Edit: and probably it is not only about SSDs, but also about cheap DRAM as today in most deployments I know about most queries only touch indices and tuples that are in RAM (and in fact often the whole pg_base is smaller on disk than RAM of the server).</text><parent_chain></parent_chain></comment><story><title>JITing PostgreSQL using LLVM [pdf]</title><url>http://anarazel.de/talks/fosdem-2018-02-03/jit.pdf</url></story> |
37,070,903 | 37,070,665 | 1 | 3 | 37,070,398 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>anyfoo</author><text>Probably everyone who has used a Taxi in Germany in the past can tell you how professional, knowledgeable, and safe Taxis were there, and that came through very strong regulations.<p>Getting a taxi concession was no joke. You literally had to study on the layout of the city. And given that those are European cities, there is no grid system. You also had to know about safety and take first aid courses.<p>Additionally, taxis require special inspection on top of the rigid inspections necessary for cars in Germany (you wouldn’t want to endanger people with a rust bucket on the autobahn). So yes, they were exceptionally safe.<p>Taxis are mostly Mercedes in Germany, as traditionally Mercedes had the most experience with taxis, and the proper programs in place for taxi use. When I see a Mercedes E wagon on a freeway, I still think &quot;taxi&quot; (like some think police car when they see a Crown Victoria).<p>Source: There was a time where I took a taxi almost every day in Germany, and a close family member owns a German taxi concession for many decades now.<p>Lyft+Uber are an absolute joke in comparison.<p>(I talk mostly in the past tense, because I haven’t lived in Germany for long now. I don’t know whether the gig economy damaged the enormous quality of taxis over there.)</text><parent_chain><item><author>galkk</author><text>There is very thin line, alas. And it goes to same old &quot;were you really happy to use taxi before uber&quot;. In 2 countries where I did live and in many where I used just them, I wasn&#x27;t happy.<p>Taxis were as unreliable and untrusworthy and they could be - unpredictable prices, you never know if it will actually come even if company accepted your request, shady city navigation when pay by meter etc.<p>So I&#x27;m all for company like Uber to be able to cut such bad actors very fast to be able to provide good service for customers. But that ability seems like quickly and universally degrades to &quot;we own you and your schedule&quot; attitude by ubers of the world</text></item></parent_chain></comment><story><title>Seattle becomes first in U.S. to protect gig workers from sudden 'deactivation'</title><url>https://kuow.org/stories/seattle-becomes-first-in-u-s-to-protect-gig-workers-from-sudden-deactivation</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>edgyquant</author><text>Yes because Uber didn’t have to actually compete with taxis. They offered a nicer service at a cheap cost and both of these things were an illusion. The price was subsidized and the drivers weren’t required (at the time) to meet any of the regulations that apply to drivers or third party passengers (for good reasons.)<p>So they replaced one crappy service with another that has a better UX. All other benefits seem to have vanished when forced to actually make money and we’ve seen a ton of rationale for the existing regulations in the process. Similar to Airbnb</text><parent_chain><item><author>galkk</author><text>There is very thin line, alas. And it goes to same old &quot;were you really happy to use taxi before uber&quot;. In 2 countries where I did live and in many where I used just them, I wasn&#x27;t happy.<p>Taxis were as unreliable and untrusworthy and they could be - unpredictable prices, you never know if it will actually come even if company accepted your request, shady city navigation when pay by meter etc.<p>So I&#x27;m all for company like Uber to be able to cut such bad actors very fast to be able to provide good service for customers. But that ability seems like quickly and universally degrades to &quot;we own you and your schedule&quot; attitude by ubers of the world</text></item></parent_chain></comment><story><title>Seattle becomes first in U.S. to protect gig workers from sudden 'deactivation'</title><url>https://kuow.org/stories/seattle-becomes-first-in-u-s-to-protect-gig-workers-from-sudden-deactivation</url></story> |
38,064,619 | 38,064,089 | 1 | 2 | 38,063,112 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>hipadev23</author><text>xfire, roger wilco, teamspeak, kali, ventrilo, mumble, icq. Relics of better times.</text><parent_chain><item><author>thoughtpalette</author><text>Have not heard the name xfire in a long long time. It was the initial (IIRC) defacto gaming messaging service back in the early 2000s. You could download skins (like Winamp) and it would track game time hours and show running game status.<p>Looks like they pivoted into a obscure news site. Will always have fond memories.</text></item></parent_chain></comment><story><title>Alan Wake 2 is an unexpected visual marvel even on older GPUs</title><url>https://www.xfire.com/alan-wake-2-performing-well-low-end-pcs/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>andrewmcwatters</author><text>Entirely different Xfire, as far as I can tell. The two are unrelated.</text><parent_chain><item><author>thoughtpalette</author><text>Have not heard the name xfire in a long long time. It was the initial (IIRC) defacto gaming messaging service back in the early 2000s. You could download skins (like Winamp) and it would track game time hours and show running game status.<p>Looks like they pivoted into a obscure news site. Will always have fond memories.</text></item></parent_chain></comment><story><title>Alan Wake 2 is an unexpected visual marvel even on older GPUs</title><url>https://www.xfire.com/alan-wake-2-performing-well-low-end-pcs/</url></story> |
33,680,198 | 33,680,055 | 1 | 2 | 33,678,263 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>matkoniecz</author><text>&gt; The point of art art is that it is created by a human or group of humans.<p>Not for me as a consumer of art.<p>If I read a fictional story, or admire a graphic I do not really care about author. Except as something that hints at quality. Maybe in extreme cases I would want to avoid some due to unrelated issues[1].<p>It is different for nonfiction, but I would read engaging story that was entirely automatically generated.<p>I admired fractals despite that human effort that went into <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Mandelbrot_set#&#x2F;media&#x2F;File:Mandelbrot_sequence_new.gif" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Mandelbrot_set#&#x2F;media&#x2F;File:Man...</a> was only part of outcome. If AI would find other interesting parts of fractal - it also would be enjoyable.<p>----------<p>Yes, it is different for nonfiction and author can add relevant context that can increase or dimmish the art, but in vast majority of cases of fiction&#x2F;music&#x2F;graphics I know nothing about author and I am not really interested in them.<p>----<p>[1] I would not hang in my room landscape painted by certain painter who become the leader of Germany. Even if landscape would be pretty.</text><parent_chain><item><author>tuatoru</author><text>I don&#x27;t quite understand the &quot;art&quot; comment. I&#x27;ve seen it several times so this is not aimed at you.<p>The <i>point</i> of <i>art</i> art is that it is created by a human or group of humans. Artists (performance or visual) will be out of a job when runners are all replaced by race-cars, and pro golfers, tennis players, football players, and basketball players by robots.</text></item><item><author>xg15</author><text>Fully agreed. I first misunderstood the article as mocking AI alarmism, but it really does the opposite: It&#x27;s parodying articles that <i>underestimate</i> the potential of the tech, because applications are not a 1:1 drop-in replacement to what we have today.<p>Hence references to such future-proof technologies as delivering messages or cargo(!) via carrier pigeon.<p>Doesn&#x27;t bode well for artists if they are essentially compared with carrier pigeons here...</text></item><item><author>vages</author><text>This article’s main point is that AI technology has economic potential. It goes about this by parodying common arguments against whether such AI can develop into goal-driven beings.<p>One example of such criticism is this five year old piece: <a href="https:&#x2F;&#x2F;www.wired.com&#x2F;2017&#x2F;04&#x2F;the-myth-of-a-superhuman-ai&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.wired.com&#x2F;2017&#x2F;04&#x2F;the-myth-of-a-superhuman-ai&#x2F;</a> Few are skeptical about AI technologies’ economic impact. In that sense, the article misses the ball slightly, but it’s so funny that I don’t mind.<p>To state my point in the vein of the article: The bulldozer did change our economy. It does most, if not all, of its productive work in cooperation with a human. Turning a bulldozer on and letting it run by itself is usually a waste, and may be dangerous.</text></item></parent_chain></comment><story><title>Planes are still decades away from displacing most bird jobs</title><url>https://guzey.com/ai/planes-vs-birds/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>satvikpendem</author><text>There is a difference between artists who create for their own sake, and commercial or professional artists who make a living off art. The latter is what many people worry about with AI. Of course, it&#x27;s more an indictment on a lack of UBI than on AI itself; to blame it on AI is a Neo-Luddite-esque argument that confuses the root cause the root cause with the more proximal cause. It&#x27;s akin to people being mad at immigrants taking their jobs than the forces of globalism.</text><parent_chain><item><author>tuatoru</author><text>I don&#x27;t quite understand the &quot;art&quot; comment. I&#x27;ve seen it several times so this is not aimed at you.<p>The <i>point</i> of <i>art</i> art is that it is created by a human or group of humans. Artists (performance or visual) will be out of a job when runners are all replaced by race-cars, and pro golfers, tennis players, football players, and basketball players by robots.</text></item><item><author>xg15</author><text>Fully agreed. I first misunderstood the article as mocking AI alarmism, but it really does the opposite: It&#x27;s parodying articles that <i>underestimate</i> the potential of the tech, because applications are not a 1:1 drop-in replacement to what we have today.<p>Hence references to such future-proof technologies as delivering messages or cargo(!) via carrier pigeon.<p>Doesn&#x27;t bode well for artists if they are essentially compared with carrier pigeons here...</text></item><item><author>vages</author><text>This article’s main point is that AI technology has economic potential. It goes about this by parodying common arguments against whether such AI can develop into goal-driven beings.<p>One example of such criticism is this five year old piece: <a href="https:&#x2F;&#x2F;www.wired.com&#x2F;2017&#x2F;04&#x2F;the-myth-of-a-superhuman-ai&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.wired.com&#x2F;2017&#x2F;04&#x2F;the-myth-of-a-superhuman-ai&#x2F;</a> Few are skeptical about AI technologies’ economic impact. In that sense, the article misses the ball slightly, but it’s so funny that I don’t mind.<p>To state my point in the vein of the article: The bulldozer did change our economy. It does most, if not all, of its productive work in cooperation with a human. Turning a bulldozer on and letting it run by itself is usually a waste, and may be dangerous.</text></item></parent_chain></comment><story><title>Planes are still decades away from displacing most bird jobs</title><url>https://guzey.com/ai/planes-vs-birds/</url></story> |
3,496,405 | 3,496,381 | 1 | 3 | 3,496,173 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>culturestate</author><text>I'll be honest, I don't understand this uproar. Apple isn't marketing iBooks Author as a general-purpose eBook publishing tool, they're providing it <i>for free</i> for the <i>express purpose</i> of publishing to their platform. This is how they describe it on their website:<p>"iBooks Author is an amazing new app that allows anyone to create beautiful Multi-Touch textbooks — and just about any other kind of book — for iPad."<p>That's why every comparison between iBooks Author and Office or Photoshop or 3DS Max or any other creative application rings so disingenuous in my mind. They're not even restricting distribution outside of their platform, they just don't want you making money from it. What evilness am I missing?</text><parent_chain></parent_chain></comment><story><title>Apple's mind-bogglingly greedy and evil license agreement</title><url>http://www.zdnet.com/blog/bott/apples-mind-bogglingly-greedy-and-evil-license-agreement/4360?tag=nl.e539&h=1</url><text></text></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>extension</author><text>I can't imagine them defining "Work" so vaguely if they were trying to write a clear contract. More likely Apple wants to wait and let the courts decide how much they can get away with. God knows how that will turn out. I guess either the license will be ruled invalid or some ludicrous precedent will be set.<p>I can't think of any sensible way to decide whether or not data was "generated by" a piece of software. If you export your book to plain text, is that not "generated by" the app? Why not? It's the app's output. But it's also your own copyrighted work in a more or less rudimentary form.<p>Imagine you first write your book in Apple's app and save it to an iBook file that falls under Apple's restrictions. Then you retype your entire book in a 3rd party app that can export iBooks perfectly. The 3rd party generated iBook is bit-for-bit identical to Apple's. Now you have "two" files that are subject to different licenses, except of course they are the same file.<p>That's already absurd. But what if instead of retyping your book, you just import it into the 3rd party app from the Apple generated iBook file. You should be able to do that, right? Surely the legal status of the data can't depend on whether or not you typed it by hand. But again, this is absurd because you are importing and exporting to the same format. It optimizes to a file copy.<p>And this isn't a reductionist argument. The above is an entirely realistic scenario that will inevitably come up whenever an iBook author wants to sell their book outside of Apple's store.</text><parent_chain></parent_chain></comment><story><title>Apple's mind-bogglingly greedy and evil license agreement</title><url>http://www.zdnet.com/blog/bott/apples-mind-bogglingly-greedy-and-evil-license-agreement/4360?tag=nl.e539&h=1</url><text></text></story> |
25,230,330 | 25,227,827 | 1 | 3 | 25,226,621 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>adkadskhj</author><text>This is super interesting, appreciate the post!<p>I am toying with ideas for my own knowledge base, with integration into SRS for improved retention. I hadn&#x27;t thought it would go much beyond fact retention, but my hope was to frame facts in such a way that larger pictures could be also retained, analyzed, etc.<p>It sounds like you&#x27;ve solidified some of the aspirations my idea .. area, so huge thanks for that! This is the first time i&#x27;ve seen mention of SRS going beyond simple facts, and i thought perhaps my idea was a pipe dream.</text><parent_chain><item><author>jackkinsella</author><text>The value of SRS goes way beyond memorization. When applied seriously to a field like programming, it enables you to think about the program-design space in a more abstract manner and quickly call to mind and evaluate possibilities. Look up &quot;chunking&quot; as it relates to performance (e.g. in chess).<p>I&#x27;ve written (and, more recently, made a video) about my 10 years of experience using SRS (via the free tool, Anki) to boost my IT skills.<p><a href="https:&#x2F;&#x2F;www.jackkinsella.ie&#x2F;articles&#x2F;janki-method" rel="nofollow">https:&#x2F;&#x2F;www.jackkinsella.ie&#x2F;articles&#x2F;janki-method</a></text></item></parent_chain></comment><story><title>How to Memorize Faster with the Spaced Repetition Learning Technique</title><url>https://productive.fish/blog/spaced-repetition/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>yarinr</author><text>Thanks! I just watched the video and it looks great, will also read the article later.
Also - did you happen to share your (programming related) anki deck? I would love to see that!</text><parent_chain><item><author>jackkinsella</author><text>The value of SRS goes way beyond memorization. When applied seriously to a field like programming, it enables you to think about the program-design space in a more abstract manner and quickly call to mind and evaluate possibilities. Look up &quot;chunking&quot; as it relates to performance (e.g. in chess).<p>I&#x27;ve written (and, more recently, made a video) about my 10 years of experience using SRS (via the free tool, Anki) to boost my IT skills.<p><a href="https:&#x2F;&#x2F;www.jackkinsella.ie&#x2F;articles&#x2F;janki-method" rel="nofollow">https:&#x2F;&#x2F;www.jackkinsella.ie&#x2F;articles&#x2F;janki-method</a></text></item></parent_chain></comment><story><title>How to Memorize Faster with the Spaced Repetition Learning Technique</title><url>https://productive.fish/blog/spaced-repetition/</url></story> |
39,375,918 | 39,374,177 | 1 | 2 | 39,373,814 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>qwertox</author><text>Interesting. Just a couple of hours ago I came across MetaVoice-1B [0] (Demo [1]) and was amazed by the quality of their TTS in English (sadly no other languages available).<p>If this year becomes the year when high quality Open Source TTS and ASR models appear that can run in real-time on an Nvidia RTX 40x0 or 30x0, then that would be great. On CPU even better.<p>Also note the Ethical Statement on BASE TTS:<p>&gt; An application of this model can be to create synthetic voices of people who have lost the ability to speak due to accidents or illnesses, subject to informed consent and rigorous data privacy reviews. However, due to the potential misuse of this capability, we have decided against open-sourcing this model as a precautionary measure.<p>[0] <a href="https:&#x2F;&#x2F;github.com&#x2F;metavoiceio&#x2F;metavoice-src">https:&#x2F;&#x2F;github.com&#x2F;metavoiceio&#x2F;metavoice-src</a><p>[1] <a href="https:&#x2F;&#x2F;ttsdemo.themetavoice.xyz&#x2F;" rel="nofollow">https:&#x2F;&#x2F;ttsdemo.themetavoice.xyz&#x2F;</a></text><parent_chain></parent_chain></comment><story><title>BASE TTS: The largest text-to-speech model to-date</title><url>https://amazon-ltts-paper.com/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>minimaxir</author><text>The emotion examples are interesting. One of the current most obvious indicators of AI-generated voices&#x2F;voice cloning is a lack of emotion and range, which make them objectively worse compared to professional voice actors, unless a lack of emotion and range is the desired voice direction.<p>But if you listen to the emotion examples, the range essentially what you&#x27;d get from an audiobook narrator, not more traditional voice acting.</text><parent_chain></parent_chain></comment><story><title>BASE TTS: The largest text-to-speech model to-date</title><url>https://amazon-ltts-paper.com/</url></story> |
17,399,583 | 17,399,504 | 1 | 2 | 17,395,342 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>cricalix</author><text>The most 1Password has ever done (in my experience) is submit after I select the login to use, even on sites with only one login. I disabled that aspect, and I always have to toggle the helper via ctrl&#x2F;cmd-\. It has never pre-filled a login field without me asking it to, and that&#x27;s across v4, v5, v6, and v7.</text><parent_chain><item><author>BartBoch</author><text>This. I am using LastPass for example, because it is probably only password manager, where you can completely disable auto-fill (you need to click on an input field and then pick a profile - so it is &quot;on demand&quot; fill) which makes automatic harvesting attacks much harder. I have switched from 1Password exactly for that reason - 1Password is very aggressive in filling input fields for you.</text></item><item><author>2T1Qka0rEiPr</author><text>I have such great respect for Troy and all the work he&#x27;s done&#x2F;is continuing to do to promote good security practices. I just went on HIPB though and noticed the advise for better security is &quot;use 1Password&quot; (after checking your email for compromises).<p>This just seems a little too commercial to me and I&#x27;m not sure I like the phrasing. I fully understand the need for Troy to be sponsored and it&#x27;s great that 1Password works well with his tooling, but it&#x27;s <i>not the only solution</i>. I&#x27;d feel a little less uneasy if it was phrased in such a way as &quot;Use a password manager, like 1Password&quot;.</text></item></parent_chain></comment><story><title>We're Baking ‘Have I Been Pwned’ into Firefox and 1Password</title><url>https://www.troyhunt.com/were-baking-have-i-been-pwned-into-firefox-and-1password/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>dzhiurgis</author><text>LastPass have a horrible security track record.<p>I’ve even caught them editing their wiki page, trying to erase their past, which was reverted thanks to HN.</text><parent_chain><item><author>BartBoch</author><text>This. I am using LastPass for example, because it is probably only password manager, where you can completely disable auto-fill (you need to click on an input field and then pick a profile - so it is &quot;on demand&quot; fill) which makes automatic harvesting attacks much harder. I have switched from 1Password exactly for that reason - 1Password is very aggressive in filling input fields for you.</text></item><item><author>2T1Qka0rEiPr</author><text>I have such great respect for Troy and all the work he&#x27;s done&#x2F;is continuing to do to promote good security practices. I just went on HIPB though and noticed the advise for better security is &quot;use 1Password&quot; (after checking your email for compromises).<p>This just seems a little too commercial to me and I&#x27;m not sure I like the phrasing. I fully understand the need for Troy to be sponsored and it&#x27;s great that 1Password works well with his tooling, but it&#x27;s <i>not the only solution</i>. I&#x27;d feel a little less uneasy if it was phrased in such a way as &quot;Use a password manager, like 1Password&quot;.</text></item></parent_chain></comment><story><title>We're Baking ‘Have I Been Pwned’ into Firefox and 1Password</title><url>https://www.troyhunt.com/were-baking-have-i-been-pwned-into-firefox-and-1password/</url></story> |
40,140,218 | 40,140,071 | 1 | 3 | 40,139,837 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>danielmarkbruce</author><text>It&#x27;s mostly naivety. There are a lot of people who really don&#x27;t understand that people are doing something without getting paid, as a side gig, just to be helpful. They just don&#x27;t get it. An uncle, who is a totally decent human being otherwise would complain loudly and bitterly at folks who ran kids sporting events when things didn&#x27;t run smoothly. At the time I didn&#x27;t think much of it, until I was an adult and saw the adults running things things in their spare time despite having families and jobs etc. Just being good people. This uncle was just a very naive person, it&#x27;s like he thought these people&#x27;s entire existence was to run kids sporting events.</text><parent_chain><item><author>lordleft</author><text>I will never understand how entitled or mean people can be towards OSS devs. I sympathize with this post a great deal and wish the author all the best in whatever he does next.</text></item></parent_chain></comment><story><title>I'm giving up on open source</title><url>https://nutjs.dev/blog/i-give-up</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>roenxi</author><text>It goes a bit beyond OSS; try doing anything important in life and you&#x27;ll be a target sooner or later. Jealousy is a powerful force; ignorant mobs are powerful forces and there are a lot of evil opportunists in the mix. People really need to get a little more cynical at a young age. <i>Everyone</i> should be doing things because they think it is in their personal best interests. People can still be altruists, but it is important to understand that is a personal belief in what a local optimum looks like and it can&#x27;t be seen as a noble sacrifice.<p>I thought this dev&#x27;s attitude was fairly healthy. Try something, see it didn&#x27;t work, start charging.</text><parent_chain><item><author>lordleft</author><text>I will never understand how entitled or mean people can be towards OSS devs. I sympathize with this post a great deal and wish the author all the best in whatever he does next.</text></item></parent_chain></comment><story><title>I'm giving up on open source</title><url>https://nutjs.dev/blog/i-give-up</url></story> |
38,918,949 | 38,919,253 | 1 | 3 | 38,918,310 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>2mol</author><text>Duplicate of <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=38917820">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=38917820</a> ?</text><parent_chain></parent_chain></comment><story><title>United Airlines inspections find loose bolts on several 737 Max 9 aircraft</title><url>https://www.cnbc.com/2024/01/08/united-airlines-737-max-9-inspections-turn-up-loose-bolts.html</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>ChrisArchitect</author><text>[dupe]<p>Discussion here: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=38917820">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=38917820</a></text><parent_chain></parent_chain></comment><story><title>United Airlines inspections find loose bolts on several 737 Max 9 aircraft</title><url>https://www.cnbc.com/2024/01/08/united-airlines-737-max-9-inspections-turn-up-loose-bolts.html</url></story> |
22,067,397 | 22,066,445 | 1 | 3 | 22,065,523 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>IceDane</author><text>I recently got a job in the ERP industry(SAP), though my purpose is essentially to do stuff that is not SAP related.<p>I don&#x27;t think it should surprise anyone that SAP makes mistakes and&#x2F;or that ERP systems are hard to implement. SAP in particular is an absolute monstrosity. I don&#x27;t just mean in terms of size either. I can&#x27;t help but think about that Nietzsche quote about the abyss.<p>SAPs systems should become textbook examples of tech debt left to accumulate, of what happens when systems are allowed to grow in whatever direction is useful at the time without any thought for the future or proper design.
This isn&#x27;t very surprising either since I can&#x27;t imagine that there is any group of human beings on Earth that is capable of understanding SAPs systems to the point where they could extend it safely.<p>SAP also takes the NIH syndrome and makes it a core value. Everything they make is worse than that other technology that accomplishes the same. See UI5 - it&#x27;s like they traveled back in time and hired a CS freshman in the late 90s to develop it.<p>When they don&#x27;t have the expertise to create a copy from scratch, they just use the competitors&#x27; solutions and wrap that in their own marketing. They want you to only use SAP stuff.<p>The figures mentioned in the article about how important SAP is to the world&#x27;s economy and logistics should scare the living shit out of anyone.</text><parent_chain></parent_chain></comment><story><title>Mistakes were made: ERP screwups</title><url>https://tedium.co/2020/01/14/sap-enterprise-vendors-mistakes-history/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>wayoutthere</author><text>I don&#x27;t think I&#x27;ve ever heard of an ERP implementation that <i>wasn&#x27;t</i> an absolute clusterfuck. My impression is that while most folks from the integrators know their segment of the product pretty well, they don&#x27;t have deep technical skills in a general sense or know much about other modules of the product. Also that the salespeople know almost nothing about the product and promise that it can do things it cannot. The customer eventually figures this out and ends up ripping out and re-implement tools from other vendors.<p>It&#x27;s a common joke for senior technology leaders at industrial companies to ask eachother &quot;so what was the first ERP implementation you got fired for?&quot;</text><parent_chain></parent_chain></comment><story><title>Mistakes were made: ERP screwups</title><url>https://tedium.co/2020/01/14/sap-enterprise-vendors-mistakes-history/</url></story> |
27,127,475 | 27,127,214 | 1 | 3 | 27,126,939 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>goto11</author><text>Lots of programming wars is just tribalism. Java is disliked on HN because it represent &quot;enterprise&quot; - big long-lived organizations which maintain a codebase for decades and therefore conservative. A different tribe than the startup tribe HN represent. Java is not in particular more verbose than say C or Rust for solving the same task, it is just a random slight on the language of a different tribe.<p>HN is a great community, but it has a very narrow perspective on the world.<p>As a beginner it is fine to chose to master one language first, but in the long run you should not &quot;choose a language&quot;, but rater learn to learn any language, and understand they all have their strength and weaknesses.<p>But there are so many choices of tools and technology in this industry and it is impossible to learn it all. Tribalism makes the world simpler because it narrows your perspective.</text><parent_chain><item><author>Flex247A</author><text>I started attending college a year ago. At that time, I didn&#x27;t know much about programming: just a bit of C and some Python - enough to make first year college projects. After I started frequenting HN, I came across a lot of comments by developers on programming languages, toolchains, libraries, etc. Even though I didn&#x27;t understand their arguments, I still believed what they said, because I thought they were experienced, so they must be right. Even though I hadn&#x27;t
used the tools personally, I started developing premature opinions on them: Java is verbose, so it must be avoided, PHP is inelegant etc. These opinions also gave a feeling of security: because I thought that I had chosen the right language for programming (Rust!), the right operating system, the right text editor (vim), and the right window manager (i3). This made me arrogant, because I saw myself as above my classmates, who were still using &#x27;inferior&#x27; tools and still struggling to grasp the concept of command line arguments. Over time, I realised that I was just basing my beliefs on HN comments, and it is not healthy in the long run. This article helped me a lot towards realising that. Thank you for posting this article :)<p>Edit: grammar</text></item></parent_chain></comment><story><title>The Importance of Humility in Software Development (2020)</title><url>http://humbletoolsmith.com/2020/08/10/the-importance-of-humility-in-software-development/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>SilverRed</author><text>To be fair though, there are better and worse tools. There are legitimate reasons to say that PHP should be avoided and that Rust is a good choice. It&#x27;s just important to understand how much weight these opinions have and understand why they apply.<p>If you are building a bulk file rename tool, it doesn&#x27;t matter how you do it as long as it works. If you are handling untrusted data from remote sources, then you may want to consider if C is a good idea.</text><parent_chain><item><author>Flex247A</author><text>I started attending college a year ago. At that time, I didn&#x27;t know much about programming: just a bit of C and some Python - enough to make first year college projects. After I started frequenting HN, I came across a lot of comments by developers on programming languages, toolchains, libraries, etc. Even though I didn&#x27;t understand their arguments, I still believed what they said, because I thought they were experienced, so they must be right. Even though I hadn&#x27;t
used the tools personally, I started developing premature opinions on them: Java is verbose, so it must be avoided, PHP is inelegant etc. These opinions also gave a feeling of security: because I thought that I had chosen the right language for programming (Rust!), the right operating system, the right text editor (vim), and the right window manager (i3). This made me arrogant, because I saw myself as above my classmates, who were still using &#x27;inferior&#x27; tools and still struggling to grasp the concept of command line arguments. Over time, I realised that I was just basing my beliefs on HN comments, and it is not healthy in the long run. This article helped me a lot towards realising that. Thank you for posting this article :)<p>Edit: grammar</text></item></parent_chain></comment><story><title>The Importance of Humility in Software Development (2020)</title><url>http://humbletoolsmith.com/2020/08/10/the-importance-of-humility-in-software-development/</url></story> |
20,281,071 | 20,280,228 | 1 | 3 | 20,276,551 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>fma</author><text>NPR has a podcasts that interviews founders and how they got started, how they made money (likely they didn&#x27;t, at first) and how they continue to be better than everyone else. It&#x27;s called How I Built This.<p><a href="https:&#x2F;&#x2F;www.npr.org&#x2F;podcasts&#x2F;510313&#x2F;how-i-built-this" rel="nofollow">https:&#x2F;&#x2F;www.npr.org&#x2F;podcasts&#x2F;510313&#x2F;how-i-built-this</a></text><parent_chain><item><author>bcp2384</author><text>I honestly think there&#x27;s an opportunity to create a YouTube channel that literally does nothing more than explain how X makes money, whether it&#x27;s a VC firm, a Subway franchise, a toothpaste manufacturer, etc.<p>As someone with an entrepreneurial tick but not someone who&#x27;s gone all in it would be so helpful to have edu videos that just explained the basic business model of XYZ.</text></item></parent_chain></comment><story><title>How Discount Brokerages Make Money</title><url>https://www.kalzumeus.com/2019/6/26/how-brokerages-make-money/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>steveklabnik</author><text>There’s a similarish channel called Company Man. I treat it as purely entertainment, because I have no idea what the credentials of the dude are, but it’s fun.</text><parent_chain><item><author>bcp2384</author><text>I honestly think there&#x27;s an opportunity to create a YouTube channel that literally does nothing more than explain how X makes money, whether it&#x27;s a VC firm, a Subway franchise, a toothpaste manufacturer, etc.<p>As someone with an entrepreneurial tick but not someone who&#x27;s gone all in it would be so helpful to have edu videos that just explained the basic business model of XYZ.</text></item></parent_chain></comment><story><title>How Discount Brokerages Make Money</title><url>https://www.kalzumeus.com/2019/6/26/how-brokerages-make-money/</url></story> |
24,966,169 | 24,965,938 | 1 | 3 | 24,965,635 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>gorgoiler</author><text>The Pi has come of age.<p>With this form factor, it is truly the grandchild of the BBC Model B and <i>I love it</i>.<p><a href="http:&#x2F;&#x2F;www.computinghistory.org.uk&#x2F;userdata&#x2F;images&#x2F;large&#x2F;76&#x2F;58&#x2F;product-77658.jpg" rel="nofollow">http:&#x2F;&#x2F;www.computinghistory.org.uk&#x2F;userdata&#x2F;images&#x2F;large&#x2F;76&#x2F;...</a><p>If they made one with big black mechanical switches and deep cherry red status LEDs, I would happily pay whatever they asked.</text><parent_chain></parent_chain></comment><story><title>Raspberry Pi 400 teardown and review</title><url>https://www.jeffgeerling.com/blog/2020/raspberry-pi-400-teardown-and-review</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>omnibrain</author><text>&gt; Has anyone reading this ever used scroll lock? I&#x27;ve at least used num lock before, but never scroll lock.<p>Yes, to see the check the output of the console when it is fast scrolling, or occasionally in other programs to decouple the scrolling from cursor-movement.<p>Similarly the lack of a PAUSE button gives me pause. How would I stop running scripts&#x2F;programs to check the output before making them continue? I guess there is some magic ctrl+??? combo for that...</text><parent_chain></parent_chain></comment><story><title>Raspberry Pi 400 teardown and review</title><url>https://www.jeffgeerling.com/blog/2020/raspberry-pi-400-teardown-and-review</url></story> |
27,062,812 | 27,062,337 | 1 | 2 | 27,061,631 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>g051051</author><text>&gt; incompetent managers or tech leads.<p>This is one of the things that ruined my last gig. I have 3 decades of experience. Managers and tech leads are unlikely to have a fraction of that, so let me do my job.<p>&gt; Agile is a time stuck and time waster<p>This was the other thing. We fell into the hands of Agile cultists (really no other way to portray them) and wound up getting buried in process, useless meetings, etc.<p>&gt; I&#x27;m probably not with your product or service&#x27;s target demographic<p>Same! I&#x27;ve never worked on anything that I would have an interest in using personally. I don&#x27;t have anything against the products, and they served their target audience well, but that&#x27;s not me.<p>&gt; Stop drowning us in processes.<p>See above. The so called &quot;Agile&quot; stuff they brought in basically crushed our development staff. It was used as a bludgeon.</text><parent_chain><item><author>junon</author><text>I&#x27;m a senior eng out of work for a year (per my own choice) slowly looking to get back into the market. These points are my own:<p>- My managers have always been a point of friction. If you hire an expert, stop telling them what they do and don&#x27;t know. I&#x27;m afraid of full time work because of incompetent managers or tech leads.<p>- I don&#x27;t care if your company is a unicorn. I care that I&#x27;m going to be happy doing the work that I do.<p>- Agile is a time stuck and time waster. Proudly advertising it as your Modus Operandi is a sure way to get your cold-email dumped in the trash.<p>- If you&#x27;re approaching me claiming you&#x27;ve seen my work, you better not mention a technology I haven&#x27;t used in a decade. I don&#x27;t care, personally, if you&#x27;ve done your research on me, but don&#x27;t act like you have if you haven&#x27;t.<p>- My #1 priority at this point in my career is being comfortable - in work and out of work. Showing that the company cares about that - work life balance, good pat, etc. - is a little thing but helps a lot in recruiting people like me.<p>- I&#x27;m probably not with your product or service&#x27;s target demographic (yes, even if it&#x27;s some fancy SaaS). Don&#x27;t knock me if I&#x27;m not. Most senior engineers I know of don&#x27;t like SaaS products and tend to keep things fairly vanilla to retain control over the system. We&#x27;re probably not going to use your service in our personal lives, and that&#x27;s okay.<p>- Working remotely, especially these days, is almost a must. I want to be with family, especially now that we&#x27;re making some life altering changes to catch up after the pandemic (moving, new jobs, getting married, etc.)<p>- Stop drowning us in processes. The more we have to play around with your gold-plated project management system, the less we&#x27;re interested in writing code for you. Remember that a lot of us get by with GitHub issues and nothing else.<p>- A lot of us are tired of the industry. Going to be real. If you can figure out that problem, you&#x27;ll be fighting us off with bats.</text></item></parent_chain></comment><story><title>Ask HN: How to attract perm Snr Engs when the contract market is so lucrative?</title><text>As above - what strategies have people got for attracting senior engineers to join a company full-time, when it&#x27;s pretty much impossible to match day rates pro-rata in the contract market for anyone other than the FAANG&#x27;s?</text></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>jameshart</author><text>You’re shooting yourself in the foot by ignoring companies that take pride in offering an agile development environment.<p>There are, sure, places that have control-through-forced-scrum as their management philosophy who will call themselves ‘agile’; but there are also places that practice exactly what you’re looking for: getting out of the way of tech practitioners, giving them direct access to stakeholders to decide how and what to work on, trusting teams to self-organize; and those companies are going to say they are agile too.<p>Consider the alternative: a company whose ad says “we don’t follow any agile practices” - what would you interpret that to mean? That they just let you get on with things your way, or that they are stuck in their requirement-gathering change-control-document waterfall ways?<p>You can choose to interpret anything a job ad says cynically.<p>Just like any company’s claim in a job ad it needs to be evaluated.</text><parent_chain><item><author>junon</author><text>I&#x27;m a senior eng out of work for a year (per my own choice) slowly looking to get back into the market. These points are my own:<p>- My managers have always been a point of friction. If you hire an expert, stop telling them what they do and don&#x27;t know. I&#x27;m afraid of full time work because of incompetent managers or tech leads.<p>- I don&#x27;t care if your company is a unicorn. I care that I&#x27;m going to be happy doing the work that I do.<p>- Agile is a time stuck and time waster. Proudly advertising it as your Modus Operandi is a sure way to get your cold-email dumped in the trash.<p>- If you&#x27;re approaching me claiming you&#x27;ve seen my work, you better not mention a technology I haven&#x27;t used in a decade. I don&#x27;t care, personally, if you&#x27;ve done your research on me, but don&#x27;t act like you have if you haven&#x27;t.<p>- My #1 priority at this point in my career is being comfortable - in work and out of work. Showing that the company cares about that - work life balance, good pat, etc. - is a little thing but helps a lot in recruiting people like me.<p>- I&#x27;m probably not with your product or service&#x27;s target demographic (yes, even if it&#x27;s some fancy SaaS). Don&#x27;t knock me if I&#x27;m not. Most senior engineers I know of don&#x27;t like SaaS products and tend to keep things fairly vanilla to retain control over the system. We&#x27;re probably not going to use your service in our personal lives, and that&#x27;s okay.<p>- Working remotely, especially these days, is almost a must. I want to be with family, especially now that we&#x27;re making some life altering changes to catch up after the pandemic (moving, new jobs, getting married, etc.)<p>- Stop drowning us in processes. The more we have to play around with your gold-plated project management system, the less we&#x27;re interested in writing code for you. Remember that a lot of us get by with GitHub issues and nothing else.<p>- A lot of us are tired of the industry. Going to be real. If you can figure out that problem, you&#x27;ll be fighting us off with bats.</text></item></parent_chain></comment><story><title>Ask HN: How to attract perm Snr Engs when the contract market is so lucrative?</title><text>As above - what strategies have people got for attracting senior engineers to join a company full-time, when it&#x27;s pretty much impossible to match day rates pro-rata in the contract market for anyone other than the FAANG&#x27;s?</text></story> |
4,670,714 | 4,670,684 | 1 | 2 | 4,668,508 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>blauwbilgorgel</author><text>It isn't about which is easiest to implement. No one said CSS(3) was super-easy. This discussion is also very old by now. I am surprised to bump into this view again.<p>A CSS layout is better than a table-based layout, due to:<p>- Maintenance: Maintaining or redesigning a table-based layout is very cumbersome, especially with nested tables, because:<p>- Seperation of content and design: The content has to be changed, to change the design, and that is not a nice workflow.<p>- Accessibility: CSS designs allow much better for a user-specified stylesheet. Resize the browserwindow and tables keep sticking out, where with CSS you can change the order (put columns under each other). Screenreaders behave in a specific way for tables, they try to read the "summary", or they assume the table holds tabular data, reading it row by row. A table lay-out can therefor confuse.<p>- SEO: CSS designs make content stacking possible, tables only allow to put the content in the order of the table cells. Webmaster guidelines ask you to check for correct use of HTML, which tables for lay-out isn't:<p>- Semantics/standards: Use tables for tabular data. Provide a summary and table header if relevant and possible. Using tables for lay-out semantically turns your entire page into tabular data.<p>- Pagespeed: CSS allows for faster, progressive rendering. HTML tables take their width from the resulting table-cell: Content will jump around while rendering or some browsers even show a blank table before all content is loaded.<p>A CSS framework like this is far from hacky. Using tables for layout, because CSS is deemed too complex, now that is hacky.<p>Also, don't forget support for "display: table" is in near all modern browsers. If you really want to design lay-out like you are using tables, it is possible with CSS too.<p>For responsive designs, much more is possible with CSS than a 100% width table. You can't just slap a few lines of table and expect it to work well on an ipad.</text><parent_chain><item><author>zaidf</author><text>So I am trying extremely hard to convince myself that these css grids are much better than html tables. Yet, when I see projects like these that make the act of making two columns of arbitrary widths such a big deal, I find it hard to convince myself that css for your basic page container is worth the hacks. I really want to be convinced otherwise because I'd like to believe if <i>so many</i> people are for it, I am obviously not seeing something they can.<p>So dear HN, please help me convince myself that CSS and its hacks are superior than tables.<p>My mind's first objection: "to make a simple two column layout that would typically take a few lines with the table tag and be compatible across browsers. The same thing in css would require the use of an open-source grid or bunch of hacks and testing--taking much more effort than the table tag". How do I respond to this objection?</text></item></parent_chain></comment><story><title>Show HN: A simple lightweight CSS grid, not a bloated framework</title><url>http://thisisdallas.github.com/Simple-Grid/</url><text></text></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>drhayes9</author><text>Okay, I'll bite first.<p>A table for layout is semantically meaningless. If you view a webpage as vaguely structured data, then using a table for layout is akin to using a String to represent an enumerated value. Sure, you can do it and it will work, but you're diminishing our ability to reason about your data and access it with our tools.<p>If I'm working in a codebase and wanted to see where we're presenting tabular data to the user and we're using tables for layout, I now cannot know which kind of table I'm looking at: presentational or structured.<p>If a user is using a screenreader to access a site, the screenreader will see the table and read it line-by-line. In a presentational case, that means &#60;tr&#62; by &#60;tr&#62;. This is meaningless to a non-sighted person and lowers the usability of the site.<p>Tables don't respond to CSS as well as other block elements. Try setting the width or height of an individual cell in relation to the container. You'll likely end up using spanning columns or spanning rows or setting the width using table attributes. Now we're breaking the abstraction between HTML (structured data, our model) and CSS (presentation, our view). We're now scattering view-related semantics inside of our model.<p>Are those good enough reasons?</text><parent_chain><item><author>zaidf</author><text>So I am trying extremely hard to convince myself that these css grids are much better than html tables. Yet, when I see projects like these that make the act of making two columns of arbitrary widths such a big deal, I find it hard to convince myself that css for your basic page container is worth the hacks. I really want to be convinced otherwise because I'd like to believe if <i>so many</i> people are for it, I am obviously not seeing something they can.<p>So dear HN, please help me convince myself that CSS and its hacks are superior than tables.<p>My mind's first objection: "to make a simple two column layout that would typically take a few lines with the table tag and be compatible across browsers. The same thing in css would require the use of an open-source grid or bunch of hacks and testing--taking much more effort than the table tag". How do I respond to this objection?</text></item></parent_chain></comment><story><title>Show HN: A simple lightweight CSS grid, not a bloated framework</title><url>http://thisisdallas.github.com/Simple-Grid/</url><text></text></story> |
21,939,461 | 21,939,459 | 1 | 3 | 21,936,930 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>s0rce</author><text>I wouldn&#x27;t really consider the Tetons in the Midwest, they are part of the Rocky mountains. Same with Glacier.<p>This map seems to capture how I think of the larger regions in the USA<p><a href="https:&#x2F;&#x2F;www.touropia.com&#x2F;regions-of-the-united-states&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.touropia.com&#x2F;regions-of-the-united-states&#x2F;</a><p>Probably would divide Socal from Norcal.<p>Also, there is a distinct inter-mountain west between the Rockies and the Sierra&#x2F;Cascades. Utah isn&#x27;t really in the Southwest and Eastern WA&#x2F;OR isn&#x27;t really in the PNW but close enough.</text><parent_chain><item><author>ctdonath</author><text>Last summer, family vacation. Tetons-Yellowstone-Glacier-Badlands region in particular, scenic backroads also. Was surprised at how extensive coverage (down to 3G) was, but there were large areas of zero connectivity as well. That&#x27;s overlooking lack of wifi hotspots lest my cell tethering data cap run out. Kids were subject to &gt;week of no TV&#x2F;data&#x2F;games, having no internet <i>and</i> no power (solar-gathered electricity used only for lighting &amp; mapping).<p>From that perspective, methinks Starlink.com will contribute to significant population shifts, making such low&#x2F;no-connectivity areas viable to those dependent on internet connectivity. I&#x27;d move to that region quick were data fast &amp; reliable.<p>[ETA: &quot;Midwest&quot; as in &quot;west side of mid&quot; a la broad boundary of central plains and Rocky Mountains.]</text></item><item><author>chapium</author><text>&gt; American Midwest, in part because of the no-tech&#x2F;no-connectivity of large swaths<p>Wait, what? When is the last time you went to the midwest!?</text></item><item><author>ctdonath</author><text>If you already have an inclination to travel to Mongolia, this makes for an interesting &quot;last straw&quot; to justify going. I like the relative desolation of the American Midwest, in part because of the no-tech&#x2F;no-connectivity of large swaths; any excuse to go there is appreciated.<p>Once that hurdle is cleared, going to such an extreme for disconnecting helps hammer home the point to the kid: cellular connectivity isn&#x27;t just a few feet of separation from phone, or a few miles outside cell service, it&#x27;s far enough that disconnection is absolute &amp; profound - you can drive (not just walk) for <i>days</i> and still not get a connection.<p>The real horror is a society so deeply dependent on something they use so intimately yet so completely fail to understand. Getting kids &quot;back to the Earth&quot; is very important, full &amp; complete disconnect from &quot;technology&quot; so they can grasp their own ability to live &amp; thrive without it. Clarke: &quot;any sufficiently advanced technology is indistinguishable from magic&quot;; we&#x27;re there, and while the benefits are good, the psychological dependency &amp; mystery isn&#x27;t. Go somewhere distant from technology, forage&#x2F;hunt food, make a meal over an open fire, and sleep under the stars - so vital for a child&#x27;s psychological well-being.<p>[ETA: &quot;Midwest&quot; referring to roughly the boundary between central plains and Rocky Mountains.]</text></item></parent_chain></comment><story><title>Dad takes son to Mongolia to get him off his phone</title><url>https://www.bbc.com/news/world-us-canada-50830944</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>andymcsherry</author><text>Wyoming and Montana are definitely not in the Midwest, and I’d even argue that the Western South Dakota where the Badlands are should be considered the Mountain West as well. The majority of the Midwest is far more populated than this region</text><parent_chain><item><author>ctdonath</author><text>Last summer, family vacation. Tetons-Yellowstone-Glacier-Badlands region in particular, scenic backroads also. Was surprised at how extensive coverage (down to 3G) was, but there were large areas of zero connectivity as well. That&#x27;s overlooking lack of wifi hotspots lest my cell tethering data cap run out. Kids were subject to &gt;week of no TV&#x2F;data&#x2F;games, having no internet <i>and</i> no power (solar-gathered electricity used only for lighting &amp; mapping).<p>From that perspective, methinks Starlink.com will contribute to significant population shifts, making such low&#x2F;no-connectivity areas viable to those dependent on internet connectivity. I&#x27;d move to that region quick were data fast &amp; reliable.<p>[ETA: &quot;Midwest&quot; as in &quot;west side of mid&quot; a la broad boundary of central plains and Rocky Mountains.]</text></item><item><author>chapium</author><text>&gt; American Midwest, in part because of the no-tech&#x2F;no-connectivity of large swaths<p>Wait, what? When is the last time you went to the midwest!?</text></item><item><author>ctdonath</author><text>If you already have an inclination to travel to Mongolia, this makes for an interesting &quot;last straw&quot; to justify going. I like the relative desolation of the American Midwest, in part because of the no-tech&#x2F;no-connectivity of large swaths; any excuse to go there is appreciated.<p>Once that hurdle is cleared, going to such an extreme for disconnecting helps hammer home the point to the kid: cellular connectivity isn&#x27;t just a few feet of separation from phone, or a few miles outside cell service, it&#x27;s far enough that disconnection is absolute &amp; profound - you can drive (not just walk) for <i>days</i> and still not get a connection.<p>The real horror is a society so deeply dependent on something they use so intimately yet so completely fail to understand. Getting kids &quot;back to the Earth&quot; is very important, full &amp; complete disconnect from &quot;technology&quot; so they can grasp their own ability to live &amp; thrive without it. Clarke: &quot;any sufficiently advanced technology is indistinguishable from magic&quot;; we&#x27;re there, and while the benefits are good, the psychological dependency &amp; mystery isn&#x27;t. Go somewhere distant from technology, forage&#x2F;hunt food, make a meal over an open fire, and sleep under the stars - so vital for a child&#x27;s psychological well-being.<p>[ETA: &quot;Midwest&quot; referring to roughly the boundary between central plains and Rocky Mountains.]</text></item></parent_chain></comment><story><title>Dad takes son to Mongolia to get him off his phone</title><url>https://www.bbc.com/news/world-us-canada-50830944</url></story> |
30,834,103 | 30,833,941 | 1 | 3 | 30,831,386 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>the_af</author><text>Interesting. I didn&#x27;t feel that way about <i>Papers Please</i>, because it has a story and it&#x27;s more like a short puzzle.<p>It&#x27;s not endless. It&#x27;s basically a sequence of puzzles (with a story and some choices thrown in), where each stage introduces a variation on the puzzle. There is a very limited number of stages, after which the game ends.<p>Compare this to something like Factorio, which is essentially endless (and you&#x27;re programming, so basically it&#x27;s job #2).</text><parent_chain><item><author>Wowfunhappy</author><text>This was how I felt playing <i>Papers Please</i>.<p>I absolutely respect and appreciate that the game wasn&#x27;t trying to be &quot;fun&quot;; it was trying to communicate a message. And I firmly believe that not all games <i>should</i> be fun.<p>But at the same time... well, I have enough work to do in my life. There has to be a balance. Not every movie is &quot;fun&quot; but even art house films are generally &quot;pleasant&quot; to watch on some level.</text></item></parent_chain></comment><story><title>‘This game is so realistic it feels just like working overtime’</title><url>https://www.sixthtone.com/news/1009982/this-game-is-so-realistic%21-it-feels-just-like-working-overtime</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>INTPenis</author><text>I don&#x27;t work as hard at work as I did in papers please.</text><parent_chain><item><author>Wowfunhappy</author><text>This was how I felt playing <i>Papers Please</i>.<p>I absolutely respect and appreciate that the game wasn&#x27;t trying to be &quot;fun&quot;; it was trying to communicate a message. And I firmly believe that not all games <i>should</i> be fun.<p>But at the same time... well, I have enough work to do in my life. There has to be a balance. Not every movie is &quot;fun&quot; but even art house films are generally &quot;pleasant&quot; to watch on some level.</text></item></parent_chain></comment><story><title>‘This game is so realistic it feels just like working overtime’</title><url>https://www.sixthtone.com/news/1009982/this-game-is-so-realistic%21-it-feels-just-like-working-overtime</url></story> |
12,340,749 | 12,340,732 | 1 | 2 | 12,340,348 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>gcr</author><text>Branch prediction strategies can be learned, just like any other model. I could certainly see something like this outperforming the huge bag of hand-tuned optimization strategies for branch prediction anyway. It could save some silicon.<p>Even a simple dot product can be called a &quot;neural network,&quot; albeit a small uninteresting one. Your features could be (say) the state of cache, the number of jumps, the number of recent stalls &#x2F; stack size &#x2F; returns, and so on. Put them into a 10-dimensional vector or whatever, take the dot product between that and a set of 10 learned weights, and preload the branch if the result is above some threshold. Even a simple model could perhaps work really well here.<p>Of course it&#x27;s not like they have some deep learning convolutional net running on the program input. I also bet the weights are set at the factory so it&#x27;s not &quot;learning&quot; anything.</text><parent_chain><item><author>dingo_bat</author><text>This is literally insane. I&#x27;ve never heard of a neural net branch predictor.<p>Edit: my layman knowledge about branch prediction and neural networks is showing its gross inadequacy :&#x2F;</text></item></parent_chain></comment><story><title>Neural network spotted deep inside Samsung's Galaxy S7 silicon brain</title><url>http://www.theregister.co.uk/2016/08/22/samsung_m1_core/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>DannyBee</author><text>It&#x27;s actually really common these days.
:)<p>Search google for &quot;hashed perceptron branch predictor&quot;</text><parent_chain><item><author>dingo_bat</author><text>This is literally insane. I&#x27;ve never heard of a neural net branch predictor.<p>Edit: my layman knowledge about branch prediction and neural networks is showing its gross inadequacy :&#x2F;</text></item></parent_chain></comment><story><title>Neural network spotted deep inside Samsung's Galaxy S7 silicon brain</title><url>http://www.theregister.co.uk/2016/08/22/samsung_m1_core/</url></story> |
18,710,751 | 18,710,259 | 1 | 3 | 18,709,383 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>mirimir</author><text>Yes, the public Freenet opennet contains lots of horrible content. But then, Freenet&#x27;s focus has always been censorship resistance. Content gets distributed and replicated according to its popularity. It&#x27;s a lot like BitTorrent, but with serious transport encryption and randomized routing.<p>And arguably it&#x27;s worked pretty well for that, given that there&#x27;s been consistently lots of horrible content for 18 years. Content providers (and users) have been busted, but that hasn&#x27;t eliminated much of their content.<p>However, being a pure P2P system, you only have &quot;anonymity&quot; through plausible deniability. And that&#x27;s a dangerous game to play. Criminal investigators have used modified Freenet nodes to track chunks of illegal content, and have prosecuted users whose nodes processed those chunks.<p>The Freenet Project argues that it&#x27;s impossible to reliably determine whether nodes are requesting those chunks, or merely relaying requests from other nodes. But if you end up in court, you&#x27;ll need an expert witness to convince the jury of that. So you&#x27;ll likely end up with a plea bargain.<p>So anyway, it&#x27;s safest to run Freenet on anonymously leased VPS, and access its webGUI as a Tor .onion service. Just as you&#x27;d prudently run a BitTorrent seedbox.</text><parent_chain><item><author>simcop2387</author><text>I&#x27;ve always loved the ideals and design of Freenet for what it does, but the main issues I always ran into when I&#x27;d check it out were that discoverability was horrible and then once you did manage to dig into things and find content it was usually stuff I wouldn&#x27;t want to find to begin with. That&#x27;s left a lot of bad impressions on people I think, and caused it to have a reputation for only illegal things on it.</text></item></parent_chain></comment><story><title>Freenet: A Distributed Anonymous Information Storage and Retrieval System (2000) [pdf]</title><url>http://snap.stanford.edu/class/cs224w-readings/clarke00freenet.pdf</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>yason</author><text>It&#x27;s no wonder really. If you build a system that allows anonymity and untraceability you will end up hosting everything that can&#x27;t normally happen without anonymity and untraceability.<p>Hackers marvel at the idea of complete anonymity and untraceability because it&#x27;s technically exciting and fits so well with the hacker thinking. I mean, why <i>should you</i> have to reveal who you are because of mere accountability? Everyone knows hackers don&#x27;t cause harm and when they do it&#x27;s only a good deed because the system they &quot;broke&quot; was obviously broken already. But the same technology is a much more prominent tool for criminals, molesters, and such. So that&#x27;s what you will get on the anonymous networks and not so much hackers with good intentions.</text><parent_chain><item><author>simcop2387</author><text>I&#x27;ve always loved the ideals and design of Freenet for what it does, but the main issues I always ran into when I&#x27;d check it out were that discoverability was horrible and then once you did manage to dig into things and find content it was usually stuff I wouldn&#x27;t want to find to begin with. That&#x27;s left a lot of bad impressions on people I think, and caused it to have a reputation for only illegal things on it.</text></item></parent_chain></comment><story><title>Freenet: A Distributed Anonymous Information Storage and Retrieval System (2000) [pdf]</title><url>http://snap.stanford.edu/class/cs224w-readings/clarke00freenet.pdf</url></story> |
19,516,577 | 19,516,595 | 1 | 2 | 19,513,531 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>enobrev</author><text>I&#x27;ve been building my desktop (and now servers) for 25 years. The idea of taking my computer in to a store to fix a drive or ram or worse, buying a new one because of a hardware issue is absolutely foreign to me.<p>I had hoped laptops would be just as easy to tweak and build by now but it seems the world favors the apple way.<p>I&#x27;m going to keep building. It&#x27;s _far_ less expensive. I can tweak my system to fit my needs and adjust as my needs change. And I have a solid understanding of the most used tool in my life.<p>Also things like PC part picker make it so much simpler than it used to be that I barely even need to think about it any more.</text><parent_chain><item><author>danet</author><text>That is why I&#x27;m holding to my 2011 ThinkPad T420 for dear life. I replaced keyboard 3 times ($30-$40 off ebay), changed HDD to SSD, and replaced CD-ROM with another SATA drive bay.<p>Not having USB3 is annoying, the CPU is a little slow and the batteries aren&#x27;t what they used to be, but the things still works and gives me no problems.<p>I would like to get something smaller and lighter but all the affordable light laptops come with at most 8GB of not upgradable memory, whereas mine has 12GB and upgradable to 16.<p>What I ended up doing is getting a desktop computer for anything that needs performance and every time I look at anything apple, it just looks like I&#x27;m about to get on a treadmill of shelling out a couple of thousand dollars every year without the ability to own, upgrade or repair any of my devices.</text></item></parent_chain></comment><story><title>Internal Documents Show Apple Is Capable of Implementing Right to Repair</title><url>https://motherboard.vice.com/en_us/article/d3mqna/internal-documents-show-apple-is-capable-of-implementing-right-to-repair-legislation</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>errantspark</author><text>I don&#x27;t think this really holds water. I bought a Thinkpad L380 recently, it was a great computer with upgradable ram and ssd. I ended up returning it because of the lack of a ThunderBolt 3 port, but if it had one of those I think it would have been near perfect.</text><parent_chain><item><author>danet</author><text>That is why I&#x27;m holding to my 2011 ThinkPad T420 for dear life. I replaced keyboard 3 times ($30-$40 off ebay), changed HDD to SSD, and replaced CD-ROM with another SATA drive bay.<p>Not having USB3 is annoying, the CPU is a little slow and the batteries aren&#x27;t what they used to be, but the things still works and gives me no problems.<p>I would like to get something smaller and lighter but all the affordable light laptops come with at most 8GB of not upgradable memory, whereas mine has 12GB and upgradable to 16.<p>What I ended up doing is getting a desktop computer for anything that needs performance and every time I look at anything apple, it just looks like I&#x27;m about to get on a treadmill of shelling out a couple of thousand dollars every year without the ability to own, upgrade or repair any of my devices.</text></item></parent_chain></comment><story><title>Internal Documents Show Apple Is Capable of Implementing Right to Repair</title><url>https://motherboard.vice.com/en_us/article/d3mqna/internal-documents-show-apple-is-capable-of-implementing-right-to-repair-legislation</url></story> |
29,700,693 | 29,700,051 | 1 | 2 | 29,697,137 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>kelnos</author><text>Well:<p>&gt; <i>Anywho, that’s Apple for you. Why am I still an iOS developer? I dunno, I got bills to pay.</i><p>People will chase the money. Even with the onerous review process and 30% cut, there&#x27;s still a good amount of money to be made on the App Store.<p>This is the standard collective action problem: if a significant chunk of iOS app developers just said &quot;that&#x27;s enough, we&#x27;re not working on this anymore&quot; (and if legions of other developers didn&#x27;t surge in to replace them), then you better believe things would change. But no one wants to stick out, and most software developers seem to think they&#x27;re too good for a union.</text><parent_chain><item><author>djrockstar1</author><text>It&#x27;s appalling to me that iOS developers still exist after all the hoops you have to jump through to get an iOS app out. I&#x27;m a web developer that got roped into developing and then publishing a react native app for android and iOS. The android process was relatively painless compared to the crap Apple has you do. For starters, you can&#x27;t even produce an app build without running on iOS, so the company had to procure an old Mac just so we could compile. Once I got Xcode set up, I learn that I need to connect to an iPhone as a target device in order to build. Thank god for small companies and being able to get things done quick. Another hoop and painful 30-40 minute compile times later (for a relatively small app mind you, also caching didn&#x27;t seem to help whatsoever cause even back to back compiles were still slow as hell), we finally get out a build out on TestFlight, only to wait an undisclosed amount of time for Apple&#x27;s approval.<p>I realize these aren&#x27;t issues if you&#x27;re already drunk on the Apple Kool-aid and have the latest Mac with the latest iPhone. Then these barely seem like hurdles, but to someone who hasn&#x27;t already sold their soul to Apple, publishing an iOS app should not be this difficult.</text></item></parent_chain></comment><story><title>A Tumblr developer on the App Store approval process</title><url>https://sreegs.tumblr.com/post/671649355334336512/alright-lets-talk-about-apple-and-tumblrs</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>phreack</author><text>The reason is of course money. The profit per user on the Apple garden is light years beyond any other platform. I&#x27;ve seen the exact same app make 100 times as much money on iOS than on Android with half as many users.</text><parent_chain><item><author>djrockstar1</author><text>It&#x27;s appalling to me that iOS developers still exist after all the hoops you have to jump through to get an iOS app out. I&#x27;m a web developer that got roped into developing and then publishing a react native app for android and iOS. The android process was relatively painless compared to the crap Apple has you do. For starters, you can&#x27;t even produce an app build without running on iOS, so the company had to procure an old Mac just so we could compile. Once I got Xcode set up, I learn that I need to connect to an iPhone as a target device in order to build. Thank god for small companies and being able to get things done quick. Another hoop and painful 30-40 minute compile times later (for a relatively small app mind you, also caching didn&#x27;t seem to help whatsoever cause even back to back compiles were still slow as hell), we finally get out a build out on TestFlight, only to wait an undisclosed amount of time for Apple&#x27;s approval.<p>I realize these aren&#x27;t issues if you&#x27;re already drunk on the Apple Kool-aid and have the latest Mac with the latest iPhone. Then these barely seem like hurdles, but to someone who hasn&#x27;t already sold their soul to Apple, publishing an iOS app should not be this difficult.</text></item></parent_chain></comment><story><title>A Tumblr developer on the App Store approval process</title><url>https://sreegs.tumblr.com/post/671649355334336512/alright-lets-talk-about-apple-and-tumblrs</url></story> |
11,551,747 | 11,551,644 | 1 | 2 | 11,550,305 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>jdmichal</author><text>Let&#x27;s see how well <i>any</i> programmer, much less an entry-level one, handles an indeterminate execution environment... It&#x27;s like C++, except every line has potentially undefined behavior.</text><parent_chain><item><author>quanticle</author><text>Yet somehow despite wrangling with it for hundreds of years, they manage to do a worse job than most entry-level programmers.</text></item><item><author>matt4077</author><text>It&#x27;s also the reason why tech people shouldn&#x27;t be so dismissive of politicians, lawyers or the social sciences: they&#x27;ve been wrangling this shit for hundreds of years.</text></item><item><author>eldavido</author><text>Another thing: this is why we (tech) need to engage with politics.<p>If there&#x27;s one thing we really understand, it&#x27;s <i>complexity</i>: why it sucks, how to avoid it, and how piling on rule after rule can make the legal code &quot;unmaintainable&quot; (sound familiar?)</text></item></parent_chain></comment><story><title>San Francisco Is Requiring Solar Panels on All New Buildings</title><url>https://nextcity.org/daily/entry/san-francisco-require-solar-panels-buildings</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>ep103</author><text>I challenge you to interview more entry-level programmers : )</text><parent_chain><item><author>quanticle</author><text>Yet somehow despite wrangling with it for hundreds of years, they manage to do a worse job than most entry-level programmers.</text></item><item><author>matt4077</author><text>It&#x27;s also the reason why tech people shouldn&#x27;t be so dismissive of politicians, lawyers or the social sciences: they&#x27;ve been wrangling this shit for hundreds of years.</text></item><item><author>eldavido</author><text>Another thing: this is why we (tech) need to engage with politics.<p>If there&#x27;s one thing we really understand, it&#x27;s <i>complexity</i>: why it sucks, how to avoid it, and how piling on rule after rule can make the legal code &quot;unmaintainable&quot; (sound familiar?)</text></item></parent_chain></comment><story><title>San Francisco Is Requiring Solar Panels on All New Buildings</title><url>https://nextcity.org/daily/entry/san-francisco-require-solar-panels-buildings</url></story> |
19,211,781 | 19,211,077 | 1 | 2 | 19,210,727 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>ebiggers</author><text>AFAICS, this was exposed by the addition of sockfs_setattr() in v4.10. So it&#x27;s incorrect to claim that kernels older than that are vulnerable, even though the code being fixed was older.<p>Also, note that there may not actually be a proof-of-concept exploit yet, beyond a reproducer causing a KASAN splat. When people request a CVE for a use-after-free bug they usually just assume that code execution may be possible. (Exploits can be very creative.)</text><parent_chain></parent_chain></comment><story><title>Linux Kernel Through 4.20.10 Found Vulnerable to Arbitrary Code Execution</title><url>https://coocoor.com/advisory/cve/CVE-2019-8912</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>sargun</author><text>How does this use-after-free turn into an arbitrary code execution vuln? I don&#x27;t see any jmp to the pointer?</text><parent_chain></parent_chain></comment><story><title>Linux Kernel Through 4.20.10 Found Vulnerable to Arbitrary Code Execution</title><url>https://coocoor.com/advisory/cve/CVE-2019-8912</url></story> |
28,163,327 | 28,163,492 | 1 | 3 | 28,160,673 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>windexh8er</author><text>&gt; The false positive rate for any given image is not 1 in a trillion. Perceptual hashing just does not work like that. It also suffers from the birthday paradox problem - as the database expands, and the total number of pictures expands, collisions become more likely.<p>There was a good article [0] that was on HN a couple days ago that touches on the flat out lie regarding &quot;one in a trillion&quot; and how PhotoDNA sounds poorly thought out.<p>[0] <a href="https:&#x2F;&#x2F;www.hackerfactor.com&#x2F;blog&#x2F;index.php?&#x2F;archives&#x2F;929-One-Bad-Apple.html" rel="nofollow">https:&#x2F;&#x2F;www.hackerfactor.com&#x2F;blog&#x2F;index.php?&#x2F;archives&#x2F;929-On...</a></text><parent_chain><item><author>stickfigure</author><text>The false positive rate for any given image is not 1 in a trillion. Perceptual hashing just does not work like that. It also suffers from the birthday paradox problem - as the database expands, and the total number of pictures expands, collisions become more likely.<p>The parent poster does make the mistake of assuming that other pictures of kids will likely cause false positives. Anything could trigger a false positive - especially flesh tones. Like, say, the naughty pictures you&#x27;ve been taking of your (consenting) adult partner. I&#x27;m sure Apple&#x27;s outsourced low-wage-country verification team will enjoy those.</text></item><item><author>fortenforge</author><text>Lots of people responding to this seem to not understand how perceptual hashing &#x2F; PhotoDNA works. It&#x27;s true that they&#x27;re not cryptographic hashes, but the false positive rate is vanishingly small. Apple claims it&#x27;s 1 in a trillion [1], but suppose that you don&#x27;t believe them. Google and Facebook and Microsoft are all using PhotoDNA (or equivalent perceptual hashing schemes) right now. Have you heard of some massive issue with false positives?<p>The fact of the matter is that unless you possess a photo that exists in the NCMEC database, your photos simply will not be flagged to Apple. Photos of your own kids won&#x27;t trigger it, nude photos of adults won&#x27;t trigger it; only photos of already known CSAM content will trigger (and that too, Apple requires a specific threshold of matches before a report is triggered).<p>[1] &quot;The threshold is selected to provide an extremely low (1 in 1 trillion) probability of incorrectly flagging a given account.&quot; Page 4 of <a href="https:&#x2F;&#x2F;www.apple.com&#x2F;child-safety&#x2F;pdf&#x2F;CSAM_Detection_Technical_Summary.pdf" rel="nofollow">https:&#x2F;&#x2F;www.apple.com&#x2F;child-safety&#x2F;pdf&#x2F;CSAM_Detection_Techni...</a></text></item><item><author>querez</author><text>I have a newborn at home, and like every other parent, we take thousands of pictures and videos of our newest family member. We took pictures of the very first baby-bath. So now I have pictures of a naked baby on my phone. Does that mean that pictures of my newborn baby will be uploaded to Apple for further analysis, potentially stored for indefinite time, shared with law enforcement?</text></item></parent_chain></comment><story><title>The deceptive PR behind Apple’s “expanded protections for children”</title><url>https://piotr.is/2021/08/12/apple-csam/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>nonbirithm</author><text>Then where are the news reports or articles of these false positives that would have shown up within the past decade? That&#x27;s how long these companies have been using PhotoDNA on the server side. And the version of PhotoDNA from ten years ago would probably have been inferior to the version in place now. Is there even a single verifiable report of such a false positive? I feel that with the amount of attention brought to this issue, if there was such a report then it probably would have been brought up by now.<p>Beyond that, assume that a false positive occurs and the innocent person is taken to court. Why would they have to fear being convicted if they don&#x27;t actually hold any incriminating evidence? At most, that would become evidence <i>against</i> using perceptual hashing in future court cases.<p>The issue in that case is the violation of the innocent person&#x27;s privacy, not that they have a risk of being falsely convicted. The courts would still need admissible evidence, and I don&#x27;t believe that only having a perceptual hash and a set of legally photographed images clears that bar.<p>However, it becomes a completely separate issue if the false positives are &quot;coincidentally&quot; used to persecute marginalized groups in other countries where the same set of laws don&#x27;t apply. But Apple has stated that they have no intention of expanding the system&#x27;s scope to follow those laws. There isn&#x27;t any evidence yet that Apple will do such a thing, or that they&#x27;ve already done it in the past. We are free to disbelieve them, but that&#x27;s what they&#x27;ve stated. We can only hope that they won&#x27;t change their minds.</text><parent_chain><item><author>stickfigure</author><text>The false positive rate for any given image is not 1 in a trillion. Perceptual hashing just does not work like that. It also suffers from the birthday paradox problem - as the database expands, and the total number of pictures expands, collisions become more likely.<p>The parent poster does make the mistake of assuming that other pictures of kids will likely cause false positives. Anything could trigger a false positive - especially flesh tones. Like, say, the naughty pictures you&#x27;ve been taking of your (consenting) adult partner. I&#x27;m sure Apple&#x27;s outsourced low-wage-country verification team will enjoy those.</text></item><item><author>fortenforge</author><text>Lots of people responding to this seem to not understand how perceptual hashing &#x2F; PhotoDNA works. It&#x27;s true that they&#x27;re not cryptographic hashes, but the false positive rate is vanishingly small. Apple claims it&#x27;s 1 in a trillion [1], but suppose that you don&#x27;t believe them. Google and Facebook and Microsoft are all using PhotoDNA (or equivalent perceptual hashing schemes) right now. Have you heard of some massive issue with false positives?<p>The fact of the matter is that unless you possess a photo that exists in the NCMEC database, your photos simply will not be flagged to Apple. Photos of your own kids won&#x27;t trigger it, nude photos of adults won&#x27;t trigger it; only photos of already known CSAM content will trigger (and that too, Apple requires a specific threshold of matches before a report is triggered).<p>[1] &quot;The threshold is selected to provide an extremely low (1 in 1 trillion) probability of incorrectly flagging a given account.&quot; Page 4 of <a href="https:&#x2F;&#x2F;www.apple.com&#x2F;child-safety&#x2F;pdf&#x2F;CSAM_Detection_Technical_Summary.pdf" rel="nofollow">https:&#x2F;&#x2F;www.apple.com&#x2F;child-safety&#x2F;pdf&#x2F;CSAM_Detection_Techni...</a></text></item><item><author>querez</author><text>I have a newborn at home, and like every other parent, we take thousands of pictures and videos of our newest family member. We took pictures of the very first baby-bath. So now I have pictures of a naked baby on my phone. Does that mean that pictures of my newborn baby will be uploaded to Apple for further analysis, potentially stored for indefinite time, shared with law enforcement?</text></item></parent_chain></comment><story><title>The deceptive PR behind Apple’s “expanded protections for children”</title><url>https://piotr.is/2021/08/12/apple-csam/</url></story> |
30,725,829 | 30,724,720 | 1 | 2 | 30,724,475 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>mmarq</author><text>I’m not familiar with American labelling, but in the EU there are several labels that mean different things.<p>I’m not an expert, but roughly speaking PDO (<a href="https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Protected_designation_of_origin" rel="nofollow">https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Protected_designation_of_ori...</a>) means that the entire process follows certain procedures, ingredients come from a particular area and production happens in certain areas (usually the same as the ingredients).<p>PGI (<a href="https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Protected_Geographical_Indication" rel="nofollow">https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Protected_Geographical_Indic...</a>) instead is looser.<p>For instance you may have PGI Tuscan oil that is produced with North African olives, while Lametia DOP (a PDO oil) must be produced near Lametia Terme and must use Carolea olives from the same area.<p>You can’t label your oil “Lametia DOP”, if you produce it near Milan or if you use different olives.<p>All this to say that for “product of USA” to make sense, it should not necessarily mean that in order to get that label all ingredients must come from the USA. You probably miss a PDO-like certification.</text><parent_chain><item><author>o-o-</author><text>Lobbying at its finest – an open form of corruption. The system needs an institution controlling these &quot;interest groups&quot;. A force that can weigh the millions of dollars they spend to sway decision makers&#x27; opinions against &quot;the greater good&quot; (which often turns out to be public health).<p>The same goes for the unneccessarily prolonged fight against tobacco companies and junk food in schools.</text></item></parent_chain></comment><story><title>Court affirms imported beef still allowed to be labeled "Product of USA"</title><url>https://www.foodsafetynews.com/2022/03/product-of-u-s-a-or-not-system-doesnt-bother-denvers-10th-circuit-court/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>alexfromapex</author><text>Calling food that is 90%+ made in another country a &quot;Product of the USA&quot; is just insulting and I think if there was no money involved in the judges&#x27; decision making they&#x27;d just call this what it is; deceptive trade practices.</text><parent_chain><item><author>o-o-</author><text>Lobbying at its finest – an open form of corruption. The system needs an institution controlling these &quot;interest groups&quot;. A force that can weigh the millions of dollars they spend to sway decision makers&#x27; opinions against &quot;the greater good&quot; (which often turns out to be public health).<p>The same goes for the unneccessarily prolonged fight against tobacco companies and junk food in schools.</text></item></parent_chain></comment><story><title>Court affirms imported beef still allowed to be labeled "Product of USA"</title><url>https://www.foodsafetynews.com/2022/03/product-of-u-s-a-or-not-system-doesnt-bother-denvers-10th-circuit-court/</url></story> |
13,135,321 | 13,135,320 | 1 | 2 | 13,134,702 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>bob1122</author><text>Country: Belarus<p>Probed ISPs: Beltelecom (AS 6697)<p>Censorship method: TCP injections<p>We have recently heard of network anomalies in Belarus. Tor has been finally blocked in December 2016, although it had been explicitly declared that Tor should be blocked since February 2015.<p>Directly connected users from Belarus<p>An anonymous cypherpunk has helped to gather some evidence regarding Tor being blocked in Belarus. It’s neither a complete study nor an in-depth research and it’s unclear if any other further evidence will be gathered, so we decided to share current knowledge as-is:<p>Tor directory authorities are not blocked
Public onion routers have their ORPort blocked by TCP RST injection
The onion routers’ DirPort is not blocked
Plain-old non-obfuscated Tor Bridges from BridgeDB circumvent the interference
Beltelecom (or its upstream) has strange configuration of the networking gear injecting reset packets
The strangeness in equipment is the following. The first injected RST packet does not have have proper SEQ&#x2F;ACK numbers. These packet fields are just filled with zeroes. So this packet is dropped by the client’s TCP&#x2F;IP stack per RFC5961 and does not actually terminate the client’s connection:<p>$ tshark -Tfields -eframe.time_relative -eip.src -etcp.srcport -eip.dst -etcp.dstport \
-eip.ttl -etcp.flags.str -etcp.seq -etcp.ack -r urandom.pcap | sed | awk | perl
0.000000 192.168.1.2 42555 87.118.94.227 443 64 <i></i><i></i><i></i><i></i><i></i>S* 899897236 0
0.029459 87.118.94.227 443 192.168.1.2 42555 125 <i></i><i></i><i></i><i></i><i>R</i>* 0 0 (sic!)
0.096914 87.118.94.227 443 192.168.1.2 42555 52 <i></i><i></i><i></i><i>A</i><i>S</i> 1984028404 899897237
0.096958 192.168.1.2 42555 87.118.94.227 443 64 <i></i><i></i><i></i><i>A</i><i></i>* 899897237 1984028405
0.136874 87.118.94.227 443 192.168.1.2 42555 125 <i></i><i></i><i></i><i></i><i>R</i>* 1984028405 0<p>That’s all for today. Remember, fried potato is better with onion!</text><parent_chain><item><author>netule</author><text>Is it possible for anyone to share the full text of the post for those of use behind a great firewall?<p>Edit: thanks!</text></item></parent_chain></comment><story><title>Belarus finally bans Tor</title><url>https://ooni.torproject.org/post/belarus-fries-onion/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>willvarfar</author><text>urandom.pcap: Belarus (finally) bans Tor
Leonid Evdokimov 2016-12-08 00:00:00 +0000 UTC
Country: Belarus<p>Probed ISPs: Beltelecom (AS 6697)<p>Censorship method: TCP injections<p>We have recently heard of network anomalies in Belarus. Tor has been finally blocked in December 2016, although it had been explicitly declared that Tor should be blocked since February 2015.<p>Directly connected users from Belarus<p>An anonymous cypherpunk has helped to gather some evidence regarding Tor being blocked in Belarus. It’s neither a complete study nor an in-depth research and it’s unclear if any other further evidence will be gathered, so we decided to share current knowledge as-is:<p>Tor directory authorities are not blocked<p>Public onion routers have their ORPort blocked by TCP RST injection<p>The onion routers’ DirPort is not blocked<p>Plain-old non-obfuscated Tor Bridges from BridgeDB circumvent the interference<p>Beltelecom (or its upstream) has strange configuration of the networking gear injecting reset packets<p>The strangeness in equipment is the following. The first injected RST packet does not have have proper SEQ&#x2F;ACK numbers. These packet fields are just filled with zeroes. So this packet is dropped by the client’s TCP&#x2F;IP stack per RFC5961 and does not actually terminate the client’s connection:<p><pre><code> $ tshark -Tfields -eframe.time_relative -eip.src -etcp.srcport -eip.dst -etcp.dstport \
-eip.ttl -etcp.flags.str -etcp.seq -etcp.ack -r urandom.pcap | sed | awk | perl
0.000000 192.168.1.2 42555 87.118.94.227 443 64 **********S* 899897236 0
0.029459 87.118.94.227 443 192.168.1.2 42555 125 *********R** 0 0 (sic!)
0.096914 87.118.94.227 443 192.168.1.2 42555 52 *******A**S* 1984028404 899897237
0.096958 192.168.1.2 42555 87.118.94.227 443 64 *******A**** 899897237 1984028405
0.136874 87.118.94.227 443 192.168.1.2 42555 125 *********R** 1984028405 0
</code></pre>
That’s all for today. Remember, fried potato is better with onion!</text><parent_chain><item><author>netule</author><text>Is it possible for anyone to share the full text of the post for those of use behind a great firewall?<p>Edit: thanks!</text></item></parent_chain></comment><story><title>Belarus finally bans Tor</title><url>https://ooni.torproject.org/post/belarus-fries-onion/</url></story> |
26,427,836 | 26,427,697 | 1 | 3 | 26,426,602 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>david38</author><text>The hypocrisy is that to even get to the point where you have a 24 &#x2F; 48 hour exploding offer, you (the candidate) had to often wait weeks to get a response to the application, phone screen, on-site, decision.<p>So I don’t buy this fairness argument. If we’re talking about fairness, the process would be super quick, and then I would get a week to think about a decision that will affect YEARS of my life. To say nothing of things like asking previous salary, salary expectations, etc. Everyone knows why it’s done. If you wanted to be fair, the salary would simply be posted with the criteria that would influence it up or down. There is a reason unions and public sector jobs do this.<p>Companies have access to far more market salary data than I do. It’s not close to fair.<p>My job is far more influential to me than the company. It’s 100% of my income and yet I’m only one of many for the company. This should be taken into consideration.</text><parent_chain><item><author>sethhochberg</author><text>From the hiring side, a (reasonable) expiration on the offer helps be fair to the other people who are interviewing, too. If I have a single position open and multiple people interviewing, as a hiring manager I really need to know whether my top choice is serious once we&#x27;re having a discussion about signing a contract - because if they aren&#x27;t, or are still trying to land better offers from other places because they have concerns about my offer and aren&#x27;t raising them, I have other candidates just hanging out and waiting. Its not fair to the other candidates to say &quot;you&#x27;re not my top choice from this round, please hang on just in case we need you&quot;, or to just stall while we see how things play out - nobody feels good about that.<p>Granted, if you&#x27;re getting very short exploding offers from big companies who are almost certainly hiring for a role continuously or in bulk, that would leave a bad taste in my mouth too. But if you&#x27;re interviewing at the kind of company that may have budget for just a single new hire, and multiple people are interviewing, a reasonable expiration makes sure we&#x27;re both mutually serious about eachother. I want to hire you enough that we&#x27;ve put together a (hopefully) compelling offer, you want to work on the team enough that you (hopefully) either feel good accepting the offer quickly or raising your concerns so we can discuss. If the offer isn&#x27;t right for you, sitting on it as a backup in hopes that you can find something better is detrimental everyone involved.</text></item><item><author>vmception</author><text>&gt;I turned down the [exploding] offer because the experience got me thinking about the company’s work culture. Were the methods employed by the company to get me to accept the offer indicative of their work culture?<p>I&#x27;ve never found the interview process to be reflective of the company. I find the interview process to be a random hodgepodge across the entire industry because nobody knows what they are doing. Small&#x2F;not-big-tech companies literally just have people that googled &quot;how to do a programming interview for ________ language&quot; and skimmed a youtube video, lifted some questions from some articles, and made you solve it in codepen.<p>Extrapolating that to the actual culture is totally a miss.</text></item></parent_chain></comment><story><title>Red Flags I Saw While Doing 60 Technical Interviews in 30 Days</title><url>https://meekg33k.dev/6-red-flags-i-saw-while-doing-60-technical-interviews-in-30-days-ckm53wt5f00avscs13xf9fhcs</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>devoutsalsa</author><text>I liked to ask the question, &quot;If I extended an offer you like, would you accept it?&quot; It helps facilitate a regular conversation about if &amp; when someone would accept an offer, and if any steps can be taken to make an offer happen.</text><parent_chain><item><author>sethhochberg</author><text>From the hiring side, a (reasonable) expiration on the offer helps be fair to the other people who are interviewing, too. If I have a single position open and multiple people interviewing, as a hiring manager I really need to know whether my top choice is serious once we&#x27;re having a discussion about signing a contract - because if they aren&#x27;t, or are still trying to land better offers from other places because they have concerns about my offer and aren&#x27;t raising them, I have other candidates just hanging out and waiting. Its not fair to the other candidates to say &quot;you&#x27;re not my top choice from this round, please hang on just in case we need you&quot;, or to just stall while we see how things play out - nobody feels good about that.<p>Granted, if you&#x27;re getting very short exploding offers from big companies who are almost certainly hiring for a role continuously or in bulk, that would leave a bad taste in my mouth too. But if you&#x27;re interviewing at the kind of company that may have budget for just a single new hire, and multiple people are interviewing, a reasonable expiration makes sure we&#x27;re both mutually serious about eachother. I want to hire you enough that we&#x27;ve put together a (hopefully) compelling offer, you want to work on the team enough that you (hopefully) either feel good accepting the offer quickly or raising your concerns so we can discuss. If the offer isn&#x27;t right for you, sitting on it as a backup in hopes that you can find something better is detrimental everyone involved.</text></item><item><author>vmception</author><text>&gt;I turned down the [exploding] offer because the experience got me thinking about the company’s work culture. Were the methods employed by the company to get me to accept the offer indicative of their work culture?<p>I&#x27;ve never found the interview process to be reflective of the company. I find the interview process to be a random hodgepodge across the entire industry because nobody knows what they are doing. Small&#x2F;not-big-tech companies literally just have people that googled &quot;how to do a programming interview for ________ language&quot; and skimmed a youtube video, lifted some questions from some articles, and made you solve it in codepen.<p>Extrapolating that to the actual culture is totally a miss.</text></item></parent_chain></comment><story><title>Red Flags I Saw While Doing 60 Technical Interviews in 30 Days</title><url>https://meekg33k.dev/6-red-flags-i-saw-while-doing-60-technical-interviews-in-30-days-ckm53wt5f00avscs13xf9fhcs</url></story> |
11,443,590 | 11,442,761 | 1 | 3 | 11,442,060 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>rsync</author><text>&quot;As Americans, you may have this impression that mass transit is a horrible thing for poor people. That impression comes from busses&quot;<p>This cannot be overstated.<p>There is nothing in the urban, built environment that is as terrible aesthetically and functionally as some big lumbering bus bonking its way through the city (and usually belching black smoke as it goes).<p>I am a huge advocate of public transit and I will <i>do anything to not ride a bus</i>.<p>Always remember the quote from Steve Jobs about tablets and the stylus:<p>&quot;If you see a (bus), they blew it.&quot;<p>edit: Yes, yes I know all about BRT. Lipstick on a pig.</text><parent_chain><item><author>timthelion</author><text>I for one, am extremely dissapointed with the concept of &quot;bus rapid transit&quot;. I live in Prague, and so I experience all three froms of mass transit: metro(subway), tram, and bus. Busses are extremely uncomfortable. They rock as they drive, and they have really awful seating arangements due to the need for tall wheel wells. I don&#x27;t see the point in including busses as a part of a modern system. They also have a much shorter lifespan, and have horible gas milage&#x2F;electric efficiency compared to tram cars which last over 50 years. I think that busses are only included in the system due to the convenience of not having to have a line to the depo, and perhaps the corruption of the consultants involved.<p>As Americans, you may have this impression that mass transit is a horrible thing for poor people. That impression comes from busses, where the bus is rocking around so much that you cannot whip out your cellphone and read on the way to work(one of the big advantages of mass transit over a car). Trams, however, are very comfortable. The floor is always extremely stable, you can comfortably read or do work on your laptop. You no longer feel the stress of driving and your commute can become a &quot;free time&quot; part of your day, rather than a stressfull period between home and work.</text></item></parent_chain></comment><story><title>Seattle is putting up $50B for transit</title><url>http://www.thetransportpolitic.com/2016/04/06/youve-got-50-billion-for-transit-now-how-should-you-spend-it/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>sfilmeyer</author><text>&gt;I think that busses are only included in the system due to the convenience of not having to have a line to the depo<p>Busses are just a lot more flexible in general. The costs with starting and stopping bus lines are much less than other forms of transit, the vehicles tend to be more interchangeable, the infrastructure is less substantial, and so on. I&#x27;m not saying I generally enjoy riding busses, but the costs to the system are very different than other forms of transit.</text><parent_chain><item><author>timthelion</author><text>I for one, am extremely dissapointed with the concept of &quot;bus rapid transit&quot;. I live in Prague, and so I experience all three froms of mass transit: metro(subway), tram, and bus. Busses are extremely uncomfortable. They rock as they drive, and they have really awful seating arangements due to the need for tall wheel wells. I don&#x27;t see the point in including busses as a part of a modern system. They also have a much shorter lifespan, and have horible gas milage&#x2F;electric efficiency compared to tram cars which last over 50 years. I think that busses are only included in the system due to the convenience of not having to have a line to the depo, and perhaps the corruption of the consultants involved.<p>As Americans, you may have this impression that mass transit is a horrible thing for poor people. That impression comes from busses, where the bus is rocking around so much that you cannot whip out your cellphone and read on the way to work(one of the big advantages of mass transit over a car). Trams, however, are very comfortable. The floor is always extremely stable, you can comfortably read or do work on your laptop. You no longer feel the stress of driving and your commute can become a &quot;free time&quot; part of your day, rather than a stressfull period between home and work.</text></item></parent_chain></comment><story><title>Seattle is putting up $50B for transit</title><url>http://www.thetransportpolitic.com/2016/04/06/youve-got-50-billion-for-transit-now-how-should-you-spend-it/</url></story> |
28,416,064 | 28,415,302 | 1 | 2 | 28,414,806 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>xerox13ster</author><text>I moderated the DID subreddit for about two years and there was incredible controversy over this constantly in the community and in the mod team. The mod team wanted to have absolutely no discussion of it, while most of the community wanted to either complain or fight with DID youtuber followers. I don&#x27;t miss moderating that community.<p>The general consensus in the wider text and image based DID community is that most of them are faking, but we don&#x27;t have a way of knowing for sure or how many because of just how inconsistent the presentation of the disorder can be in real life. You&#x27;d never know I had DID if you met me in person, but I have a good friend who is disabled because she can&#x27;t function on her own.<p>The important thing to remember about DID is that it&#x27;s caused by childhood trauma, abuse, and long term patterns of neglect as simple as &quot;crying it out&quot; or as significant as parentifying. It&#x27;s not interesting times we live it it has been this way this is often generational, psychology is just finally catching up in this regard.<p>I was raised (and abused) by my aunt who was only continuing the cycle of her and my mom&#x27;s abuse that she faced, continued by her father who was abused because of traumas his parents faced on the Trail of Tears. They both described feeling like they had more than one person in them, that their age was not aligned with their body, and the stories of abuse they both told me align. My dad was abused by the Boston Archdiocese, his psychiatric records claimed he referred to himself in turns by John, Jack, and other names, claiming they would act on his behalf. They called it schizophrenia then because of a backlash against diagnosing DID after Sybil and other films reached mainstream.</text><parent_chain><item><author>themgt</author><text>A similar one I just became aware of is Dissociative Identity Disorder, or multiple personality disorder. There seems to be a huge surge of people doing TikToks etc showing themselves going through identity changes (often &quot;rapid switching&quot;), some with hundreds of thousands or millions of views and seemingly a lot of supporters. There&#x27;s a whole huge sort of jargon&#x2F;ontology to this intersecting with other ideas and people identify as a &quot;system&quot; e.g:<p><i>Systems, Collectives, and&#x2F;or Plurals are those who experience being more than one entity in one physical body [1]. Systems are under the neurodivergent umbrella, and are not inherently LGBT+, but being plural can impact sexuality, romantic orientation, attraction, identities, and&#x2F;or gender (such as with systemfluid). Systems can also commonly intersect with LGBT+ experiences[2]. The experiences may overlap to the point of ones queer identities being a large part of headmates, such as within queergenic systems.</i><p>I am not quite sure what to make of all this, but we live in interesting times.<p><a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;results?search_query=rapid+switching" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;results?search_query=rapid+switching</a><p><a href="https:&#x2F;&#x2F;lgbta.wikia.org&#x2F;wiki&#x2F;System" rel="nofollow">https:&#x2F;&#x2F;lgbta.wikia.org&#x2F;wiki&#x2F;System</a><p><a href="https:&#x2F;&#x2F;www.inputmag.com&#x2F;culture&#x2F;dissociative-identity-disorder-did-tiktok-influencers-multiple-personalities" rel="nofollow">https:&#x2F;&#x2F;www.inputmag.com&#x2F;culture&#x2F;dissociative-identity-disor...</a><p><a href="https:&#x2F;&#x2F;podcasts.apple.com&#x2F;us&#x2F;podcast&#x2F;the-did-influencers-of-tiktok-and-the&#x2F;id1504298199?i=1000530029977" rel="nofollow">https:&#x2F;&#x2F;podcasts.apple.com&#x2F;us&#x2F;podcast&#x2F;the-did-influencers-of...</a></text></item></parent_chain></comment><story><title>Many young people diagnosed with Tourette’s after watching a YouTube channel</title><url>https://www.wired.co.uk/article/tourettes-youtube-jan-zimmermann</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>pfarrell</author><text>I’m wondering if this is a modern extension of the old “psych-101 syndrome”. Where undergrads, upon learning of the existence of various mental health diagnoses, suddenly realize they too are OCD or have depression, etc…</text><parent_chain><item><author>themgt</author><text>A similar one I just became aware of is Dissociative Identity Disorder, or multiple personality disorder. There seems to be a huge surge of people doing TikToks etc showing themselves going through identity changes (often &quot;rapid switching&quot;), some with hundreds of thousands or millions of views and seemingly a lot of supporters. There&#x27;s a whole huge sort of jargon&#x2F;ontology to this intersecting with other ideas and people identify as a &quot;system&quot; e.g:<p><i>Systems, Collectives, and&#x2F;or Plurals are those who experience being more than one entity in one physical body [1]. Systems are under the neurodivergent umbrella, and are not inherently LGBT+, but being plural can impact sexuality, romantic orientation, attraction, identities, and&#x2F;or gender (such as with systemfluid). Systems can also commonly intersect with LGBT+ experiences[2]. The experiences may overlap to the point of ones queer identities being a large part of headmates, such as within queergenic systems.</i><p>I am not quite sure what to make of all this, but we live in interesting times.<p><a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;results?search_query=rapid+switching" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;results?search_query=rapid+switching</a><p><a href="https:&#x2F;&#x2F;lgbta.wikia.org&#x2F;wiki&#x2F;System" rel="nofollow">https:&#x2F;&#x2F;lgbta.wikia.org&#x2F;wiki&#x2F;System</a><p><a href="https:&#x2F;&#x2F;www.inputmag.com&#x2F;culture&#x2F;dissociative-identity-disorder-did-tiktok-influencers-multiple-personalities" rel="nofollow">https:&#x2F;&#x2F;www.inputmag.com&#x2F;culture&#x2F;dissociative-identity-disor...</a><p><a href="https:&#x2F;&#x2F;podcasts.apple.com&#x2F;us&#x2F;podcast&#x2F;the-did-influencers-of-tiktok-and-the&#x2F;id1504298199?i=1000530029977" rel="nofollow">https:&#x2F;&#x2F;podcasts.apple.com&#x2F;us&#x2F;podcast&#x2F;the-did-influencers-of...</a></text></item></parent_chain></comment><story><title>Many young people diagnosed with Tourette’s after watching a YouTube channel</title><url>https://www.wired.co.uk/article/tourettes-youtube-jan-zimmermann</url></story> |
37,554,956 | 37,554,168 | 1 | 2 | 37,553,574 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>rakoo</author><text>Why do you use a secondary, volatile database ? Performance-wise you won&#x27;t gain a lot more (we&#x27;re talking about a user editing a file, so not even 1 write per second).<p>A proposal: write directly, and automatically in the database. No more Save button. There are multiple advantages:<p>- the system is crash-resistant. I like taking the approach of CouchDB where the only correct way to close the system is to crash it. That way a crash is an expected situation that you actually account for, not a special case that you might forget<p>- there is only one database. Less code, fewer bugs.<p>- it is safe. A write to SQLite works or doesn&#x27;t work, there is no in-between. As said in the VACUUM doc you point to: &quot;However, if the VACUUM INTO command is interrupted by an unplanned shutdown or power lose, then the generated output database might be incomplete and corrupt&quot;<p>- it is how SQLite was intended to work. And because of that, you won&#x27;t have to think about it for the lifetime of SQLite</text><parent_chain><item><author>p4bl0</author><text>I&#x27;m currently working on an application where I use SQLite as the file format. I want to keep a usual workflow for users where you can make edit to your document and it only changes the file when you save it.<p>So to open a file I copy it into the :memory: database [1], then the user can do whatever manipulation they want and I can directly make the change in the database I don&#x27;t need to have a model of the document other than its database format. And to save the document I VACUUM [2] it back to the database file. It works quite well, at least for reasonably sized file (which is always the case for my app) :).<p>[1] <a href="https:&#x2F;&#x2F;www.sqlite.org&#x2F;inmemorydb.html" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.sqlite.org&#x2F;inmemorydb.html</a><p>[2] <a href="https:&#x2F;&#x2F;www.sqlite.org&#x2F;lang_vacuum.html" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.sqlite.org&#x2F;lang_vacuum.html</a></text></item></parent_chain></comment><story><title>What if OpenDocument used SQLite? (2014)</title><url>https://www.sqlite.org/affcase1.html</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>nextaccountic</author><text>This means that like a regular app, you lose data if the app crashes or there is a power loss.<p>It&#x27;s much better to save after each operation in a temporary place (probably in ~&#x2F;.local&#x2F;share&#x2F;application&#x2F;yourapp, using XDG directories), and when the user clicks save, just copy the file into the desired location. That way, if there is a power loss and you reopen the app, it opens right back where it was doing (losing maybe he last few seconds of changes, but not all unsaved data)</text><parent_chain><item><author>p4bl0</author><text>I&#x27;m currently working on an application where I use SQLite as the file format. I want to keep a usual workflow for users where you can make edit to your document and it only changes the file when you save it.<p>So to open a file I copy it into the :memory: database [1], then the user can do whatever manipulation they want and I can directly make the change in the database I don&#x27;t need to have a model of the document other than its database format. And to save the document I VACUUM [2] it back to the database file. It works quite well, at least for reasonably sized file (which is always the case for my app) :).<p>[1] <a href="https:&#x2F;&#x2F;www.sqlite.org&#x2F;inmemorydb.html" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.sqlite.org&#x2F;inmemorydb.html</a><p>[2] <a href="https:&#x2F;&#x2F;www.sqlite.org&#x2F;lang_vacuum.html" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.sqlite.org&#x2F;lang_vacuum.html</a></text></item></parent_chain></comment><story><title>What if OpenDocument used SQLite? (2014)</title><url>https://www.sqlite.org/affcase1.html</url></story> |
2,011,184 | 2,011,019 | 1 | 2 | 2,009,147 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>fredoliveira</author><text>That tone is asking for some passionate replies ;-)<p>This isn't about PostgreSQL at all. There's things where relational databases are a good fit, and things that are a bad fit. As such, this isn't about what PostgreSQL does poorly, but about the cases where a key-value store with some pretty good data structures comes in handy. Would you really store temporary data in your relational database? Would you use it as a caching mechanism? Perhaps as a queue? Not unless you're crazy. So I guess this isn't about what PostgreSQL performs poorly, but about where Redis is a better solution.</text><parent_chain><item><author>seunosewa</author><text>Really? What stuff is PostgreSQL not good at, exactly?</text></item><item><author>geoffc</author><text>I love Redis and the new features rock! I use Postgres and Redis in tandem and it is a great combo. Postgres for all the stuff SQL databases are good at and Redis for all the stuff they are not.</text></item></parent_chain></comment><story><title>Redis 2.2.0 RC1 is out</title><url>http://antirez.com/post/redis-2.2.0-rc1-is-out.html</url><text></text></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>defen</author><text>I'm not sure how to efficiently implement redis-style sorted sets using SQL, but the fact that I have to think about it at all means it's easier to use redis.<p>A lot of the other things could probably be done with the right combination of stored procedures and clever SQL but again, redis makes it so much easier as to make things qualitatively different. It's just a bunch of C files with no real external dependencies (I don't even have to run ./configure before building it!).<p>Operationally, for a generic non-db-expert kind of person like me, redis is much simpler to manage than PostgreSQL. With redis I don't need to worry about vacuuming, write ahead logs, archiving, query tuning &#38; statistics, lock management, etc (to name a few things from the config file).</text><parent_chain><item><author>seunosewa</author><text>Really? What stuff is PostgreSQL not good at, exactly?</text></item><item><author>geoffc</author><text>I love Redis and the new features rock! I use Postgres and Redis in tandem and it is a great combo. Postgres for all the stuff SQL databases are good at and Redis for all the stuff they are not.</text></item></parent_chain></comment><story><title>Redis 2.2.0 RC1 is out</title><url>http://antirez.com/post/redis-2.2.0-rc1-is-out.html</url><text></text></story> |
21,784,713 | 21,783,650 | 1 | 2 | 21,782,196 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>sho</author><text>&gt; explore Go or Elixir<p>I have never seen a good argument for using golang for business logic. If you are writing <i>the actual server</i> then sure, use golang. If you are writing some high-speed network interconnect, use golang. Some crazy caching system, sure use golang. The public WS endpoint, use golang.<p>But if you need to access a DB with golang for anything more than, like, a session token, then you made the wrong choice and you need to go back and re-assess.<p>Elixir is in the &quot;germination phase&quot; and I predict massive adoption in the next 5 years. It is a truly excellent platform, every fintech company I know at least has their toe in the water. Everyone I show this video to [1] just says &quot;well, shit.&quot;<p>[1] <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=JvBT4XBdoUE" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=JvBT4XBdoUE</a></text><parent_chain><item><author>spamizbad</author><text>The only way this makes sense to me is if they have to contend with lots of expensive parsing, event sequencing, and throttling requirements. Payment APIs, bank websites, etc can be quite byzantine. I could understand how one might code yourself into a corner with a monolithic node app and basically just say &quot;F-it, we&#x27;re doing this synchronously!&quot;<p>I don&#x27;t even think it&#x27;s a terribly <i>bad</i> thing to do assuming it favors feature velocity.... but at that point, I&#x27;d recommend moving away from Node towards something like Python. And if you wanted to dip your toes back into async plumbing land, explore Go or Elixir.</text></item></parent_chain></comment><story><title>We 30x'd our Node parallelism</title><url>https://blog.plaid.com/how-we-parallelized-our-node-service-by-30x/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>bjacokes</author><text>You hit the nail on the head here. When N different API requests simultaneously time out – all because a ramda.uniq call in one of them received an array of 100,000 nested objects – it&#x27;s easy to make a spot code fix, but harder to systematically prevent it from happening in the future. There aren&#x27;t really linters for &quot;bad event loop blockage&quot;. Code reviews are the main tool we have, but you&#x27;d be surprised what sorts of logic can trickily block the event loop. For API reliability and development velocity in the short-term, by far the easiest approach was to throw more infrastructure at the problem.<p>We do use Go for almost all of our other services, and there are an increasing number of integrations written in Python. But we&#x27;re still using and investing in our Node integrations code for the foreseeable future, and this was an important step for simplifying our infrastructure.<p>We certainly hope the tooling and rollout process in the post were instructive for anyone using Node, even if their stacks were pristine from day 1 and never need this sort of complex migration :)</text><parent_chain><item><author>spamizbad</author><text>The only way this makes sense to me is if they have to contend with lots of expensive parsing, event sequencing, and throttling requirements. Payment APIs, bank websites, etc can be quite byzantine. I could understand how one might code yourself into a corner with a monolithic node app and basically just say &quot;F-it, we&#x27;re doing this synchronously!&quot;<p>I don&#x27;t even think it&#x27;s a terribly <i>bad</i> thing to do assuming it favors feature velocity.... but at that point, I&#x27;d recommend moving away from Node towards something like Python. And if you wanted to dip your toes back into async plumbing land, explore Go or Elixir.</text></item></parent_chain></comment><story><title>We 30x'd our Node parallelism</title><url>https://blog.plaid.com/how-we-parallelized-our-node-service-by-30x/</url></story> |
15,019,394 | 15,018,803 | 1 | 3 | 15,017,858 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>valine</author><text>This is very cool. After a quick skim I noticed this relies on Blender&#x27;s ops api. Using bpy.ops is generally considered a bad practice because a lot of the bpy.ops operators depend on the state of the UI - things like which objects are selected and which object interaction mode is active. The alternative to bpy.ops is to write scripts that manipulate the datablocks directly. Using bpy.ops can save a lot of time as it maps more cleanly to the GUI, but if you use it too much things can spiral out of control. Its just something to be aware of.</text><parent_chain></parent_chain></comment><story><title>Real-time 3D visualization of geospatial data with Blender</title><url>https://github.com/ptabriz/FOSS4G_workshop</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>ingenieroariel</author><text>Could Blender be used as a lidar point cloud annotation tool?</text><parent_chain></parent_chain></comment><story><title>Real-time 3D visualization of geospatial data with Blender</title><url>https://github.com/ptabriz/FOSS4G_workshop</url></story> |
25,412,196 | 25,412,009 | 1 | 2 | 25,411,660 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>Austin_Conlon</author><text>I can&#x27;t stress enough how high quality the writing, acting, and character development is in Ted Lasso, and you don&#x27;t need to care about sports going into it. What a shame that it doesn&#x27;t have the fame of something like The Queen&#x27;s Gambit without the reach of Netflix.</text><parent_chain><item><author>herbstein</author><text>&gt; Like Amazon, even like two good shows would be an enormous accomplishment<p>They&#x27;ve, imo, already gone one amazing show in &#x27;Ted Lasso&#x27;. The premise doesn&#x27;t sound like it should work. A comedy based on old American soccer commercials? But somehow it really, really works.</text></item><item><author>an_opabinia</author><text>&gt; Another company, Anonymous Content, bought the option to develop a New Yorker article about Gawker, a person familiar with the deal said. (The New Yorker article was written by Jeffrey Toobin, a frequent target of Gawker.)<p>That is really fucking funny.<p>&gt; Apple TV+, which started a year ago, has struggled to find its feet in a climate in which its top creative executives, Jamie Erlicht and Zack Van Amburg, appear to be constantly trying to guess what Mr. Cook and Mr. Cue might like, or might object to.<p>Pretty much everyone expected Apple to make terrible TV. Like Amazon, even like two good shows would be an enormous accomplishment.</text></item></parent_chain></comment><story><title>Apple TV Was Making a Show About Gawker. Then Tim Cook Found Out</title><url>https://www.nytimes.com/2020/12/13/business/media/apple-gawker-tim-cook.html</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>lotsofpulp</author><text>Ted Lasso&#x2F;Morning Show&#x2F;Mythic Quest are easily my favorite shows this year.</text><parent_chain><item><author>herbstein</author><text>&gt; Like Amazon, even like two good shows would be an enormous accomplishment<p>They&#x27;ve, imo, already gone one amazing show in &#x27;Ted Lasso&#x27;. The premise doesn&#x27;t sound like it should work. A comedy based on old American soccer commercials? But somehow it really, really works.</text></item><item><author>an_opabinia</author><text>&gt; Another company, Anonymous Content, bought the option to develop a New Yorker article about Gawker, a person familiar with the deal said. (The New Yorker article was written by Jeffrey Toobin, a frequent target of Gawker.)<p>That is really fucking funny.<p>&gt; Apple TV+, which started a year ago, has struggled to find its feet in a climate in which its top creative executives, Jamie Erlicht and Zack Van Amburg, appear to be constantly trying to guess what Mr. Cook and Mr. Cue might like, or might object to.<p>Pretty much everyone expected Apple to make terrible TV. Like Amazon, even like two good shows would be an enormous accomplishment.</text></item></parent_chain></comment><story><title>Apple TV Was Making a Show About Gawker. Then Tim Cook Found Out</title><url>https://www.nytimes.com/2020/12/13/business/media/apple-gawker-tim-cook.html</url></story> |
10,682,231 | 10,681,505 | 1 | 2 | 10,677,207 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>tremendo</author><text>Love this. I did the first couple of days within irb (Ruby REPL) before deciding to actually write scripts, seeing the second exercise for a given day builds on the first. Found it interesting there&#x27;s a &quot;Leader board&quot; since well, there&#x27;s no &quot;points&quot; to accumulate other than completing two puzzles per day, so whomever is listed there is just those 100 who came to see the puzzles first. So far they&#x27;re not very hard, but still fun.</text><parent_chain></parent_chain></comment><story><title>Advent of Code – solve a puzzle every day</title><url>http://adventofcode.com/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>jschulenklopper</author><text>26 points, but no discussion here... I guess many were lured into the challenges, trying to solve the currently available puzzles instead of commenting. #nerd-sniping</text><parent_chain></parent_chain></comment><story><title>Advent of Code – solve a puzzle every day</title><url>http://adventofcode.com/</url></story> |
19,852,837 | 19,852,831 | 1 | 3 | 19,852,563 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>manfredo</author><text>Do most mobile users encounter applications where processor speed is the limiting factor? Almost all smartphone usage in my experience is bottle necked by network IO. I don&#x27;t really use my phone for gaming or anything intensive - I guess people expect their phones to run Fortnite these days so maybe processor speed is more important.</text><parent_chain><item><author>tw04</author><text>The 670 is a far bigger downgrade than you indicate. Yes it&#x27;s &quot;only&quot; 20% slower from a pure clock speed perspective, but performance is more like half.<p>It&#x27;s also missing the IP68 certification - after having a waterproof-ish phone, I would never go back.</text></item><item><author>manfredo</author><text>The tech specs between the 3a and 3 don&#x27;t show too much of a downgrade:<p>* Screen is smaller, but on the Pixel 3a XL version the screen dimensions excluding the notch appear to be the same.<p>* Same 4GB LPDDR4 RAM, but no 128GB persistent storage option on the 3a. 64GB is usually plenty anyway, though.<p>* Processor is somewhat slower: Qualcomm® Snapdragon™ 670 2.0GHz + 1.7GHz, 64Bit Octa-Core on the 3a. vs a Qualcomm® Snapdragon™ 845 2.5GHz + 1.6GHz, 64Bit Octa-Core on the pixel 3.<p>* 3a removes wireless charging. Never used it on my Pixel 3 XL.<p>* Under the sensors section, the normal Pixel 3 has &quot;Advanced x-axis haptics for sharper&#x2F;defined response&quot; whereas the 3a does not.<p>* 3a only has one front facing camera instead of dual front cameras.<p>* 3a has a headphone jack. Personally, I adjusted pretty well to Bluetooth headsets but some people really appreciate the jack.<p>Overall seems like a modest downgrade for a big drop in price. Most of the stuff cut out seems like premium features where the dollar-to-user-value ratio isn&#x27;t very good. The only significant downgrades seem to be processor speed and dropping the second front facing camera. It&#x27;s probably also safe to assume more economical build materials and fabrication. Specs taken from Google Play store:<p><a href="https:&#x2F;&#x2F;store.google.com&#x2F;product&#x2F;pixel_3a_specs" rel="nofollow">https:&#x2F;&#x2F;store.google.com&#x2F;product&#x2F;pixel_3a_specs</a><p><a href="https:&#x2F;&#x2F;store.google.com&#x2F;us&#x2F;product&#x2F;pixel_3_specs?hl=en-US" rel="nofollow">https:&#x2F;&#x2F;store.google.com&#x2F;us&#x2F;product&#x2F;pixel_3_specs?hl=en-US</a></text></item></parent_chain></comment><story><title>Pixel 3a</title><url>https://blog.google/products/pixel/io-pixel-3a/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>akhilcacharya</author><text>How does it compare to the OG Pixel or the Nexus 5?</text><parent_chain><item><author>tw04</author><text>The 670 is a far bigger downgrade than you indicate. Yes it&#x27;s &quot;only&quot; 20% slower from a pure clock speed perspective, but performance is more like half.<p>It&#x27;s also missing the IP68 certification - after having a waterproof-ish phone, I would never go back.</text></item><item><author>manfredo</author><text>The tech specs between the 3a and 3 don&#x27;t show too much of a downgrade:<p>* Screen is smaller, but on the Pixel 3a XL version the screen dimensions excluding the notch appear to be the same.<p>* Same 4GB LPDDR4 RAM, but no 128GB persistent storage option on the 3a. 64GB is usually plenty anyway, though.<p>* Processor is somewhat slower: Qualcomm® Snapdragon™ 670 2.0GHz + 1.7GHz, 64Bit Octa-Core on the 3a. vs a Qualcomm® Snapdragon™ 845 2.5GHz + 1.6GHz, 64Bit Octa-Core on the pixel 3.<p>* 3a removes wireless charging. Never used it on my Pixel 3 XL.<p>* Under the sensors section, the normal Pixel 3 has &quot;Advanced x-axis haptics for sharper&#x2F;defined response&quot; whereas the 3a does not.<p>* 3a only has one front facing camera instead of dual front cameras.<p>* 3a has a headphone jack. Personally, I adjusted pretty well to Bluetooth headsets but some people really appreciate the jack.<p>Overall seems like a modest downgrade for a big drop in price. Most of the stuff cut out seems like premium features where the dollar-to-user-value ratio isn&#x27;t very good. The only significant downgrades seem to be processor speed and dropping the second front facing camera. It&#x27;s probably also safe to assume more economical build materials and fabrication. Specs taken from Google Play store:<p><a href="https:&#x2F;&#x2F;store.google.com&#x2F;product&#x2F;pixel_3a_specs" rel="nofollow">https:&#x2F;&#x2F;store.google.com&#x2F;product&#x2F;pixel_3a_specs</a><p><a href="https:&#x2F;&#x2F;store.google.com&#x2F;us&#x2F;product&#x2F;pixel_3_specs?hl=en-US" rel="nofollow">https:&#x2F;&#x2F;store.google.com&#x2F;us&#x2F;product&#x2F;pixel_3_specs?hl=en-US</a></text></item></parent_chain></comment><story><title>Pixel 3a</title><url>https://blog.google/products/pixel/io-pixel-3a/</url></story> |
472,795 | 472,513 | 1 | 2 | 472,389 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>Bjoern</author><text>Why a article with such a provocative headline (and so little content) makes the top here at HN is a riddle for me. Might have something to do with the fact that the HN Rules have been floating around too, namely alot of new people around. (Sorry for digressing.)<p>Coming back to the article I want to mention some points.
(Maybe some things are biased..)<p>Ref. 1.)
While a bigger font size is good for your eyes (hope you guys don't stare to long in one session on the screen) it is bad to understand the bigger picture in my opinion.
Sure you are "forced" to write good code, but that is a standard mantra which you should follow anyway. People who like TDD (BDD) aso. have embraced this deeply. Doesn't that huge font size rather reduce your productivity? Please consider this: <a href="http://www.codinghorror.com/blog/archives/000012.html" rel="nofollow">http://www.codinghorror.com/blog/archives/000012.html</a><p>"Its better to have more screen space, not less."<p>Ref. 2.)
Making a syntax element like hard coded strings so much stand out is contra productive in my opinion. It would be much smarter to focus on emphasizing the important aspects of your code rather than over-highlighting strings. No?
I mean sure, everybody has a different taste and style, but where is the harm in hard coding certain strings? Firstly its fast, secondly this is a typical flame of how far can we eliminate certain things from our code? (instead of embedding SQL use ActiveRecord, etc.) If you want to go so far great, start by embracing e.g. gettext, and put everything is a DB. Oh wait, why is my code so slow?<p>Ref. 3.)
I fully agree, though why does this whole article sound like a sales story for .net ?
"Here are lists for a few .net languages: C#, VB.net, F#."<p>Ref. 4.)
Basically I agree but "Ghoulish regular expressions"? If you define it by "ghoulish", how about rewriting it to make it more clear anyway? Increase tests by 1%? Uh, well I think with proper input verification you can eliminate alot of problems. I mean its great to work with unittests but a good advice would probably have been, hey please work with unittests its has shown to make code better but if you are too lazy at least use assertions?<p>Ref. 5.)
Interesting advice, good idea though but if you look at code from "an open source project" than it might make you scream and run away. I think this advice is maybe better:
<a href="http://norvig.com/21-days.html" rel="nofollow">http://norvig.com/21-days.html</a>
This is btw. the perfect article to outline why this whole "How to manage x in y &#60;time unit&#62;." is stupid.<p>Ref. 6.)
Good advice. ".. distraught at just how much room you've got for improvement." Hm, depends on what my goal is.<p>Ref. 7.)
Interesting advice, though wouldn't a "cruicial to your application method" be rather well programmed? Often it is probably better to refactor the whole function because if its so long that you have problems just writing it from scratch again, then there is too much code in it in the first place.<p>Ref. 8.)
"And don't just write. Write a compiler!"
WTH. Please Mr. Justice Gray, could I remind you that the article title is "8 ways to be a better programmer in 6 minutes." ? I mean the whole idea of this article is rubbish, (see peter norvig link) but compiler, 6 minutes, what?<p>While I generally agree than understanding "a" compiler and what it does. (Scanning, lexing, parsing etc.) Then also implementing one, is very good for your education but it should rather be in your next article of "how to be a better .net programmer in x years."<p>General comment:<p>I really like HN, the quality coming from reddit is great, but posts like this are a waste of time. (At least in my opinion.)</text><parent_chain></parent_chain></comment><story><title>How to be a better programmer in 6 minutes</title><url>http://www.secretgeek.net/6min_program.asp</url><text></text></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>Niten</author><text>I'm supposed to master an obscure language element, read through the source code of an open source project, refactor a method, run a static analysis tool, and do all the rest--all within six minutes?<p>I do like the idea for making hard-coded strings stand out, however.</text><parent_chain></parent_chain></comment><story><title>How to be a better programmer in 6 minutes</title><url>http://www.secretgeek.net/6min_program.asp</url><text></text></story> |
22,226,771 | 22,226,844 | 1 | 2 | 22,226,066 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>bitwize</author><text>It means if the arresting officer or prosecutor thinks you have CP, you will be charged with CP possession and perpwalked into the courtroom as a likely child molester in the eyes of the public. It will take an expensive trial to exonerate you if all you have is a Japanese erotic manga involving 100-year-old vampires who look six. But in the eyes of the public, accusation is guilt when it comes to serious sex crimes. So, good luck finding a job.<p>But, in this case, you have to remember that the FBI is perhaps one of the world&#x27;s largest possessors and distributors of CP. For purposes of law enforcement, of course. And they have a way of &quot;discovering&quot; CP on the hard drives of espionage suspects at risk of exposing how the national-security sausage gets made...</text><parent_chain><item><author>pc86</author><text>Can explain what you mean by &quot;it&#x27;s what anybody assumes is CP?&quot;</text></item><item><author>LeoTinnitus</author><text>Actually the thing is, CP isnt clearly defined. It&#x27;s what anybody ASSUMES is CP, as well as what a lawyer can convince a jury it is.<p>So if he just had some Loli hentai, they could charge him with CP, even if it isn&#x27;t CP.</text></item><item><author>degenerate</author><text>Full article: <a href="http:&#x2F;&#x2F;archive.fo&#x2F;THoPp" rel="nofollow">http:&#x2F;&#x2F;archive.fo&#x2F;THoPp</a><p>&gt; <i>Mr. Schulte wasn&#x27;t charged immediately, and in conversations with authorities he denied leaking classified information. But by early April he faced a different legal peril: while searching Mr. Schulte&#x27;s devices, agents found evidence of child pornography, opening up a new line of investigation. Mr. Schulte was arrested in August 2017 on federal child-pornography charges.</i><p>Yeah, sure they did.</text></item></parent_chain></comment><story><title>Ex-CIA Software Engineer Goes on Trial for Vault 7 Leak</title><url>https://www.wsj.com/articles/ex-cia-engineer-goes-on-trial-for-massive-leak-11580741119</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>speeder</author><text>I think he meant literally that.<p>For example: There was one guy that the jury was going to convict him for possession of CP, because he had videos of an adult actress that was asian and had small breasts, and so people believed her to be a child...<p>The only reason he was not convicted, is that when internet found out about it, they got in touch with the actress, that then personally went to the guy trial, and personally handed to the judge her ID and her studio documents, to prove she was adult when she made the movies.<p>EDIT: if someone remembers the name of the actress in question, please post it, I can&#x27;t remember it and for some reason I am not finding it either... Juts so people know I am not inventing things.</text><parent_chain><item><author>pc86</author><text>Can explain what you mean by &quot;it&#x27;s what anybody assumes is CP?&quot;</text></item><item><author>LeoTinnitus</author><text>Actually the thing is, CP isnt clearly defined. It&#x27;s what anybody ASSUMES is CP, as well as what a lawyer can convince a jury it is.<p>So if he just had some Loli hentai, they could charge him with CP, even if it isn&#x27;t CP.</text></item><item><author>degenerate</author><text>Full article: <a href="http:&#x2F;&#x2F;archive.fo&#x2F;THoPp" rel="nofollow">http:&#x2F;&#x2F;archive.fo&#x2F;THoPp</a><p>&gt; <i>Mr. Schulte wasn&#x27;t charged immediately, and in conversations with authorities he denied leaking classified information. But by early April he faced a different legal peril: while searching Mr. Schulte&#x27;s devices, agents found evidence of child pornography, opening up a new line of investigation. Mr. Schulte was arrested in August 2017 on federal child-pornography charges.</i><p>Yeah, sure they did.</text></item></parent_chain></comment><story><title>Ex-CIA Software Engineer Goes on Trial for Vault 7 Leak</title><url>https://www.wsj.com/articles/ex-cia-engineer-goes-on-trial-for-massive-leak-11580741119</url></story> |
19,791,297 | 19,791,249 | 1 | 3 | 19,785,560 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>floatingatoll</author><text>As an airport traveler, I&#x27;m glad they blocked the ads for the phrasing submitted, but I&#x27;m upset that they refused to explain their reasoning and negotiate better phrasing. For example:<p>&quot;Know your digital rights at the border&quot; is great. It&#x27;s in the classic tone of raise-awareness campaigns, does not use fearmongering, and can be safely ignored by anyone who already understands them.<p>&quot;Your phone isn&#x27;t safe at the border&quot; is not great. It makes you feel afraid, mis-describes the issue (what about laptops?), and doesn&#x27;t specify the vested interest (it&#x27;s about rights).<p>Both parties deserve censure for their choices.</text><parent_chain></parent_chain></comment><story><title>Vancouver Airport blocking ads with information on travellers’ privacy rights</title><url>https://globalnews.ca/news/5203960/yvr-rejects-ads/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>RickS</author><text>Good idea, bad approach. &quot;Your phone isn&#x27;t safe at the border&quot; might be a hard fact but it&#x27;s nonetheless an intentionally divisive expression of that sentiment. It&#x27;s ambiguous, fearmongering.... facts can be clickbait, and this is one such case.<p>If the ads said &quot;You can be legally compelled to X, even if Y. Learn more about your airport rights at www.url.com&quot; then it would be much less objectionable IMO.<p>I don&#x27;t get why campaigns keep making this mistake. Take the freaking high road. Imagine the mind of your opposition, and accomodate the low-hanging complaints they&#x27;re going to have. Craft a message that&#x27;s maximally agreeable to the people who disagree, while maintaining accuracy.<p>Weasels on both sides here, IMO.</text><parent_chain></parent_chain></comment><story><title>Vancouver Airport blocking ads with information on travellers’ privacy rights</title><url>https://globalnews.ca/news/5203960/yvr-rejects-ads/</url></story> |
5,049,016 | 5,048,982 | 1 | 2 | 5,048,699 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>jordanb</author><text>Honestly I don't care if she spends her nights and weekends caring for orphans and war widows. She's a politician who treated Aaron Swartz as a pawn in the political game she is playing.<p>No doubt she intended for her campaign for governor to describe her as a "staunch defender of intellectual property rights" who, as prosecutor, put a "dangerous hacker behind bars" for "breaking into MIT and stealing millions of dollars of federally funded research."<p>The Obama administration has thrown better people than her out the airlock because they became political liabilities. We need to add a new rule to the political rulebook that she's playing by. Ending her career is necessary to send a lesson to every other prosecutor who sees a guy like Aaron the way a housecat sees a cornered rat.</text><parent_chain><item><author>danso</author><text>Some more context about the prosecutor:<p>She was named "Bostonian of the Year" for her successful cases against mob bosses and drug companies:
<a href="http://www.mainjustice.com/2012/01/03/massachusetts-u-s-attorney-carmen-ortiz-is-bostonian-of-the-year/" rel="nofollow">http://www.mainjustice.com/2012/01/03/massachusetts-u-s-atto...</a><p>Out of the 94 U.S. DA offices, her office alone collected ~67% of the total criminal and civil fines in 2012, mostly owing to the successful prosecution of drug companies. Her success led to speculation that she would run for higher office:
<a href="http://www.mainjustice.com/2013/01/07/mass-u-s-attorney-carmen-ortiz-says-no-to-run-for-higher-office/" rel="nofollow">http://www.mainjustice.com/2013/01/07/mass-u-s-attorney-carm...</a><p>She is no stranger to being part of a disenfranchised group, as she was the first Hispanic and first woman to hold the position of U.S. attorney in Boston. Her first internship was with the DOJ's public integrity unit, created after Watergate:
<a href="http://www.boston.com/news/local/massachusetts/articles/2011/12/30/bostonian_of_the_year_carmen_ortiz_2011/" rel="nofollow">http://www.boston.com/news/local/massachusetts/articles/2011...</a><p>She's not of the "evil prosecutor" mold as is commonly thought and her background, particularly her history of fighting white-collar crime and corporations, doesn't strike me as someone who is intent on screwing the little guy over. That said, the seemingly-excessive charges could stem from a result of misconception and, let's face it, technological ignorance (hacking sounds bad, period). But in solving the overall problem in the justice system, let's not attribute to malice what can be attributed to other issues just yet.<p>--
One edit: a link to a piece by Aaron on yelling at the machine, rather than the person:
<a href="http://www.aaronsw.com/weblog/nummi" rel="nofollow">http://www.aaronsw.com/weblog/nummi</a><p>My intent is not to say that the petition is wrong, but to argue that if people are going to call for action, call it for the right and <i>productive</i> reasons, rather than simplifying cause and effect to just one main person (even if the buck technically stops with her).</text></item></parent_chain></comment><story><title>Petition the Whitehouse to remove Carmen Ortiz from office</title><url>https://petitions.whitehouse.gov/petition/remove-united-states-district-attorney-carmen-ortiz-office-overreach-case-aaron-swartz/RQNrG1Ck</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>ChuckMcM</author><text>My Grandfather, who was the US Attorney for west Memphis, once explained that prosecuting the law was messy. It was messy because there was rarely a case which hinged on exactly one part of the law or that had circumstances that nicely isolated the principle at stake. He was talking about pornography, and the difficulty of a general consensus that pornography was "bad" and should be outlawed, with the challenge of defining exactly what it was and the actual "bad" part of it.<p>I see a lot of parallels between his struggle to enforce pornography laws with the current struggle to enforce copyright laws. These situations seem to arise when there is a fundamental disconnect between what "the people" think and what "the system" thinks. "The system" is represented by a codified set of strictures that are put in place by a variety of people representing what they assert are the best interests of "the people." Whereas the people themselves, act in what they consider a rational way given their understanding of or perhaps agreement to, the laws of the land. Finally our system of laws are a combination of written text, and argued cases, and the sum of those is an emergent thing thought of as public policy. When the rational acting people don't consent to the public policy, there is a rash of disobedience, and whether it is alcohol, porn, or copyright, the process of emerging to a consensus is challenging at best.<p>One possible explanation for the zeal in which this case was pursued may be the lack of confounding factors with respect to copyright infringement, as codified by law. I don't know of course so this is just speculation. Having a clear, published, decision on the legitimacy or illegitimacy of what Aaron was doing might have been seen as a way to clear up a confusing pile of statutes and other decisions. An unambiguous marker between fair use and infringement, or perhaps a litmus test for intent. We'll probably never know.</text><parent_chain><item><author>danso</author><text>Some more context about the prosecutor:<p>She was named "Bostonian of the Year" for her successful cases against mob bosses and drug companies:
<a href="http://www.mainjustice.com/2012/01/03/massachusetts-u-s-attorney-carmen-ortiz-is-bostonian-of-the-year/" rel="nofollow">http://www.mainjustice.com/2012/01/03/massachusetts-u-s-atto...</a><p>Out of the 94 U.S. DA offices, her office alone collected ~67% of the total criminal and civil fines in 2012, mostly owing to the successful prosecution of drug companies. Her success led to speculation that she would run for higher office:
<a href="http://www.mainjustice.com/2013/01/07/mass-u-s-attorney-carmen-ortiz-says-no-to-run-for-higher-office/" rel="nofollow">http://www.mainjustice.com/2013/01/07/mass-u-s-attorney-carm...</a><p>She is no stranger to being part of a disenfranchised group, as she was the first Hispanic and first woman to hold the position of U.S. attorney in Boston. Her first internship was with the DOJ's public integrity unit, created after Watergate:
<a href="http://www.boston.com/news/local/massachusetts/articles/2011/12/30/bostonian_of_the_year_carmen_ortiz_2011/" rel="nofollow">http://www.boston.com/news/local/massachusetts/articles/2011...</a><p>She's not of the "evil prosecutor" mold as is commonly thought and her background, particularly her history of fighting white-collar crime and corporations, doesn't strike me as someone who is intent on screwing the little guy over. That said, the seemingly-excessive charges could stem from a result of misconception and, let's face it, technological ignorance (hacking sounds bad, period). But in solving the overall problem in the justice system, let's not attribute to malice what can be attributed to other issues just yet.<p>--
One edit: a link to a piece by Aaron on yelling at the machine, rather than the person:
<a href="http://www.aaronsw.com/weblog/nummi" rel="nofollow">http://www.aaronsw.com/weblog/nummi</a><p>My intent is not to say that the petition is wrong, but to argue that if people are going to call for action, call it for the right and <i>productive</i> reasons, rather than simplifying cause and effect to just one main person (even if the buck technically stops with her).</text></item></parent_chain></comment><story><title>Petition the Whitehouse to remove Carmen Ortiz from office</title><url>https://petitions.whitehouse.gov/petition/remove-united-states-district-attorney-carmen-ortiz-office-overreach-case-aaron-swartz/RQNrG1Ck</url></story> |
21,966,212 | 21,964,305 | 1 | 2 | 21,960,475 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>nwallin</author><text>The EGA color situation isn&#x27;t as bad as the author described.<p>CGA had a 16 color palette. In text mode, every character could be rendered with the background and foreground of any of the 16 colors. In graphics mode, you had to select one of two horrible combinations of 3 colors, and could pick any color to be the fourth color. It was awful for games, being mostly oriented around having brightly colored text on a black background.<p>TGA&#x27;s graphics mode had 4 bit color, which gave it the complete 16 colors of CGA. It was less terrible, but still pretty garish as you can see from the screenshots in the article. It inherited the overly bright colors designed for differentiating text on a black background.<p>I believe that both CGA and TGA used the a digital connection to the monitor, and they were compatible with each other. There were on&#x2F;off RGB lines and a half bright line that made stuff half as bright, with additional logic for another independent grey instead of duplicating another black.<p>EGA had 4 bit indexed color into a 6 bit palette. I honestly think its 6 bit palette is passable for the darker, moodier environment of Another World, unlike the CGA palette. But relatively few games used it. Most games (including, apparently, Another World) used the CGA palette, because then you would still be compatible with CGA monitors. IMHO the developers would have done their users a favor by making a third EGA only palette.<p>I don&#x27;t recall how EGA&#x27;s cable worked, whether it was analog like VGA or used a six bit digital scheme not unlike CGA.</text><parent_chain></parent_chain></comment><story><title>The Polygons of Another World: IBM PC</title><url>http://fabiensanglard.net/another_world_polygons_PC_DOS/index.html</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>jmccorm</author><text>As someone who played it on the PC back in the day, the visuals were nothing short of amazing. Why? The whole experience was both <i>different</i> and <i>beyond</i> what other titles delivered. What made it so memorable for me? Consistently smooth animation even with large sections of the screen being updated from frame to frame. Its polygon graphics which were solid-fill and not wireframe, which was a big leap. They&#x27;re right. Ordinarily, the early PC was a real turd when handling full-screen animation.<p>The sound wasn&#x27;t ahead of its day, but it was still quite good, even with the PC speaker rendering music, alien language, and effects in a better-than-average rendition. Nobody had high expectations for PC-speaker output.<p>Only a few years after its release, it was sad to look back and not find that any new action games using similar methods. Did I miss any good knock-offs over the next few years of its PC release, or was it just as much ahead of the curve for years to follow?</text><parent_chain></parent_chain></comment><story><title>The Polygons of Another World: IBM PC</title><url>http://fabiensanglard.net/another_world_polygons_PC_DOS/index.html</url></story> |
23,843,920 | 23,843,307 | 1 | 2 | 23,842,179 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>Al-Khwarizmi</author><text>Whatsapp can be an extremely confusing name for non-native English speakers. I&#x27;m from Spain and I think 90% of the time I see it written in Spain, it&#x27;s written wrong (wassap, whasapp, wuatsapp, whatsap, watsap, wuassap, wuassapp, whatsup, watsup, etc.). Sometimes a phonetically &quot;transliterated&quot; version is used instead, like &quot;guasap&quot;, which I find more tolerable because at least then it becomes a genuine Spanish word, rather than a botched attempt at writing an English word.<p>Also, many people don&#x27;t get the meaning&#x2F;pun in the name at all (which probably is one of the reasons for writing it wrong). Even to me, with a good English level, it wasn&#x27;t immediate because &quot;what&#x27;s up&quot; is a very idiomatic greeting and not one that non-natives (or at least, Spanish people) tend to use in a natural way. It took some time to click in my mind.<p>That said, Whatsapp absolutely dominates chat apps in Spain... so I guess these issues are not that important after all. Or at least, not if you are at the right place at the right time.</text><parent_chain><item><author>badrabbit</author><text>No!!! Of all the names in the world why this. &quot;Hey bro, let&#x27;s chat on Element&quot; ,not quite a ring to it.<p>The hardest problem in computer science strikes again!<p>Matrix,Riot and Libolm are epic projects, I wish them all the success but man, even Riot was a hard sell as a brand. I would seriously be dissapointed if it loses popularity over this. I don&#x27;t think the project maintainers understand that their core users&#x2F;fans are waiting for a product they can sell to friends,family and coworkers.<p>People who don&#x27;t know tech rely on branding&#x2F;brand reputation and word of mouth reputation to decide if they are intetested in even trying out a product to begin with.<p>Which of these is unlike the others?<p>1) Signal<p>2) Telegram<p>3) Element<p>4) Whatsapp<p>Hint: The theme is messaging and communication.</text></item></parent_chain></comment><story><title>Riot is now Element</title><url>https://element.io/blog/welcome-to-element/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>simias</author><text>I actually don&#x27;t like &quot;Signal&quot; either, because it&#x27;s such a common word that it makes it hard to search for it online. &quot;Telegram&quot; is marginally better, since original telegrams are not very relevant today.<p>But yeah Element is arguably even worse, it&#x27;s a super common noun <i>and</i> it doesn&#x27;t seem to have anything to do with communication.<p>But in the end these naming discussions are always going to end up as bikeshedding. If the tech is good it&#x27;ll probably manage to be successful despite its mediocre name.</text><parent_chain><item><author>badrabbit</author><text>No!!! Of all the names in the world why this. &quot;Hey bro, let&#x27;s chat on Element&quot; ,not quite a ring to it.<p>The hardest problem in computer science strikes again!<p>Matrix,Riot and Libolm are epic projects, I wish them all the success but man, even Riot was a hard sell as a brand. I would seriously be dissapointed if it loses popularity over this. I don&#x27;t think the project maintainers understand that their core users&#x2F;fans are waiting for a product they can sell to friends,family and coworkers.<p>People who don&#x27;t know tech rely on branding&#x2F;brand reputation and word of mouth reputation to decide if they are intetested in even trying out a product to begin with.<p>Which of these is unlike the others?<p>1) Signal<p>2) Telegram<p>3) Element<p>4) Whatsapp<p>Hint: The theme is messaging and communication.</text></item></parent_chain></comment><story><title>Riot is now Element</title><url>https://element.io/blog/welcome-to-element/</url></story> |
32,257,502 | 32,257,420 | 1 | 3 | 32,254,318 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>kmitz</author><text>Speaking of adapting the product, the article explicitely states :
&quot;Is it possible to set the Google Analytics tool so that personal data is not transferred outside the European Union?&quot;<p>&quot;No.&quot;<p>So right now it is practically impossible to use Google Analytics in a legal way in France.</text><parent_chain><item><author>rlpb</author><text>&quot;makes Google Analytics almost illegal&quot; is an editorialized (biased) title and that&#x27;s not what the linked article says. Just because use of a product is determined to contravene a country&#x27;s law doesn&#x27;t mean that the product itself is made illegal; it can be adapted to be compliant instead.</text></item></parent_chain></comment><story><title>CNIL makes Google Analytics almost illegal in France</title><url>https://www.cnil.fr/en/qa-cnils-formal-notices-concerning-use-google-analytics</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>kmeisthax</author><text>The product cannot be adapted as the concern is specifically that Google can be legally compelled to violate GDPR. Schrems II is <i>very explicit</i> that EU companies cannot send data to the US for as long as the US CLOUD Act is on the books.<p>&quot;Banning Google Analytics&quot; actually downplays it. Even Google <i>Fonts</i> is actually illegal now; and it will continue to be illegal until the US does the smart thing and copypastes GDPR into local law.</text><parent_chain><item><author>rlpb</author><text>&quot;makes Google Analytics almost illegal&quot; is an editorialized (biased) title and that&#x27;s not what the linked article says. Just because use of a product is determined to contravene a country&#x27;s law doesn&#x27;t mean that the product itself is made illegal; it can be adapted to be compliant instead.</text></item></parent_chain></comment><story><title>CNIL makes Google Analytics almost illegal in France</title><url>https://www.cnil.fr/en/qa-cnils-formal-notices-concerning-use-google-analytics</url></story> |
6,334,435 | 6,334,055 | 1 | 3 | 6,333,453 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>wallawe</author><text>I was worried this type of misinformation would be extrapolated from the article. The game the computer plays, is <i>limit</i> hold-em. This game is much more mathematical since bluffs are limited to a big blind.<p>Although Super System was written for all different types of poker, he is referring to no-limit holdem which still involves playing the player, with heavy math elements as well, but still much more psychology involved. Hence the name, you can bet any amount at any time changing the dynamic entirely. There is still no computer that is efficient at winning no-limit hold-em.</text><parent_chain><item><author>scotch_drinker</author><text>In his book Super System, Doyle Brunson wrote that a computer would never be able to play elite poker because you played the man, not the cards or the game. He greatly underestimated the power of modern computing it appears.<p>Personally, I&#x27;d rather see resources go into a robot that can cook for me but development follows the money I suppose.</text></item></parent_chain></comment><story><title>The Steely, Headless King of Texas Hold ’Em</title><url>http://www.nytimes.com/2013/09/08/magazine/poker-computer.html?hp&_r=0&pagewanted=all</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>TomGullen</author><text>&quot;Playing the man&quot; is merely an abstract reference to maths in Poker that a lot of old timers in these (slightly out of date) books couldn&#x27;t quite put their finger on. Super System was a good book for its time, but I think there&#x27;s a lot of better books out there now (Harrington on Holdem for example).<p>A simple example, common stats software for poker will record what % of hands an opponent raises on the button if it&#x27;s folded to him. If this figure is 80% you know his hand range is extremely wide. &quot;Playing the man&quot; simply is recognising that in this situation your opponents hand range is very wide so you can often raise the bet and take the pot without further resistance.</text><parent_chain><item><author>scotch_drinker</author><text>In his book Super System, Doyle Brunson wrote that a computer would never be able to play elite poker because you played the man, not the cards or the game. He greatly underestimated the power of modern computing it appears.<p>Personally, I&#x27;d rather see resources go into a robot that can cook for me but development follows the money I suppose.</text></item></parent_chain></comment><story><title>The Steely, Headless King of Texas Hold ’Em</title><url>http://www.nytimes.com/2013/09/08/magazine/poker-computer.html?hp&_r=0&pagewanted=all</url></story> |
19,634,886 | 19,634,569 | 1 | 2 | 19,633,935 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>gipsies</author><text>If we look at the paper then these remarks are all discussed:<p>- Defending against downgrade attack: &quot;A client should remember if a network supports WPA3-SAE. That is, after successfully connecting using SAE [..] the client must never connect to this network using a weaker handshake&quot;. The Google Pixel 3 is thankfully already doing this, but others aren&#x27;t. So perfectly preventable, and something the Wi-Fi Alliance could have included in their WPA3 specification.<p>- Side-channel leaks: &quot;A backwards-compatible countermeasure is to replace the two vulnerable branches with a constant-time select utility, and use constant time Legendre symbol computation as defined in [73]&quot;. The WPA3 standard already contained certain side-channel defenses, but it was still vulnerable. They could&#x27;ve also included these new defenses in the WPA3 standard.<p>- Denial-of-Service attack: &quot;... our attack is more efficient than a straightforward DoS where an attacker simply jams the channel.&quot; We only needed to inject 10 commit frames every second to overload a professional AP..<p>- Modern crypto standards should be written so the chance of implementation bugs is low. For example, the new hash-to-curve algorithms being standardized include side-channel defenses in the specification itself. See their usage of the CMOV instruction that provides a &quot;Common software implementations of constant-time selects&quot; <a href="https:&#x2F;&#x2F;tools.ietf.org&#x2F;html&#x2F;draft-irtf-cfrg-hash-to-curve-03" rel="nofollow">https:&#x2F;&#x2F;tools.ietf.org&#x2F;html&#x2F;draft-irtf-cfrg-hash-to-curve-03</a></text><parent_chain><item><author>zamadatix</author><text>Downgrade attacks:<p>WPA3 has a transitional mode which allows legacy WPA2 clients to connect. In this mode legacy WPA2 security issues are still present. Is this really a discovery or a given? How is WPA3 supposed to protect against it without requiring either WPA2 clients to be upgraded to support WPA3 security fixes (in which case you don&#x27;t need WPA2 support anymore anyways) or without dropping support for transitional mode? 802.11w fixes much of this but WPA2 didn&#x27;t mandate support for this which is one of the big reasons WPA3 is so much better.<p>Dragonfly downgrade:<p>&quot;The hack can force the access point to use a different curve, presumably one that’s weaker.&quot; note: not &quot;The hack can force the access point to use a different curve, one that’s weak.&quot;.<p>Side channel leaks:<p>Are failures in implementations not WPA3. If you&#x27;re allowing local timing attacks while generating your keys it doesn&#x27;t really matter what protocol you&#x27;re using you&#x27;ve just failed. A real discovery of things in the wild that need to be fixed but nothing to do with the security of the specification.<p>Denial of service:<p>It&#x27;s far more effective and simple to DoS the air than to DoS the APs CPU anyways. Always has been always will be. Besides, would you rather it be faster and have the AP expose side channel attacks instead?<p>&quot;dragonblood&quot;:<p>Makes me think some researchers were out for their 5 minutes of fame with a cool sounding &quot;vulnerability&quot;. To be a little less critical the researches discovered in-the-wild side channel attacks on popular client implementations of the crypto (but that doesn&#x27;t sound as cool as &quot;serious flaws leave WPA3 vulnerable&quot;.</text></item></parent_chain></comment><story><title>Serious flaws leave WPA3 vulnerable to hacks that steal Wi-Fi passwords</title><url>https://arstechnica.com/information-technology/2019/04/serious-flaws-leave-wpa3-vulnerable-to-hacks-that-steal-wi-fi-passwords/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>entropy_</author><text>The downgrade attack works even if both the AP and the device connecting to it are WPA3 capable, that part is not a given</text><parent_chain><item><author>zamadatix</author><text>Downgrade attacks:<p>WPA3 has a transitional mode which allows legacy WPA2 clients to connect. In this mode legacy WPA2 security issues are still present. Is this really a discovery or a given? How is WPA3 supposed to protect against it without requiring either WPA2 clients to be upgraded to support WPA3 security fixes (in which case you don&#x27;t need WPA2 support anymore anyways) or without dropping support for transitional mode? 802.11w fixes much of this but WPA2 didn&#x27;t mandate support for this which is one of the big reasons WPA3 is so much better.<p>Dragonfly downgrade:<p>&quot;The hack can force the access point to use a different curve, presumably one that’s weaker.&quot; note: not &quot;The hack can force the access point to use a different curve, one that’s weak.&quot;.<p>Side channel leaks:<p>Are failures in implementations not WPA3. If you&#x27;re allowing local timing attacks while generating your keys it doesn&#x27;t really matter what protocol you&#x27;re using you&#x27;ve just failed. A real discovery of things in the wild that need to be fixed but nothing to do with the security of the specification.<p>Denial of service:<p>It&#x27;s far more effective and simple to DoS the air than to DoS the APs CPU anyways. Always has been always will be. Besides, would you rather it be faster and have the AP expose side channel attacks instead?<p>&quot;dragonblood&quot;:<p>Makes me think some researchers were out for their 5 minutes of fame with a cool sounding &quot;vulnerability&quot;. To be a little less critical the researches discovered in-the-wild side channel attacks on popular client implementations of the crypto (but that doesn&#x27;t sound as cool as &quot;serious flaws leave WPA3 vulnerable&quot;.</text></item></parent_chain></comment><story><title>Serious flaws leave WPA3 vulnerable to hacks that steal Wi-Fi passwords</title><url>https://arstechnica.com/information-technology/2019/04/serious-flaws-leave-wpa3-vulnerable-to-hacks-that-steal-wi-fi-passwords/</url></story> |
5,195,599 | 5,195,519 | 1 | 3 | 5,195,257 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>graue</author><text>These points are all very true, and I admit I haven't done more with Go yet than play around. But there are a few reasons I feel I <i>don't</i> like Go, or at least, there are warts that will probably limit how much I'm going to like it.<p>Nil pointers are #1 on that list. Tony Hoare called them a "billion dollar mistake"[1]. In Go, as in C, C++, or Java, any pointer can be `nil` (similar to `NULL`) at any point in time. You essentially always have to check; you're constantly just one pointer dereference away from blowing up the program. Since ways of solving this problem are known, I find this hard to swallow in a new language.<p>Compare Rust where, unless you have explicitly used the unsafe features of the language, all pointers are guaranteed non-nil and valid. Instead of a function returning a nil pointer, it returns an `Option` type which is either `Some ptr` or `None`. The type system guarantees you have considered both possibilities so there's no such thing as a runtime null pointer dereference. Scala has a similar `Option` type, as does Haskell, calling it `Maybe`. In 2013 I don't want to still constantly check for a nil pointer, or have my program blow up at runtime if I forget.<p>The second disappointment is that when I looked into it, it seemed there are ways to call C functions from Go code, but no working way to call Go from C code. Maybe that wasn't a goal at Google, but it seems like a missed opportunity. As a result, you can't use Go to write an Nginx module, or an audio plugin for a C/C++ host app, or a library that can be used from multiple languages.<p>I think there is a real unmet need for a higher-level, safer language you can use to write libraries. Imagine if zlib, or libpng, or the reference implementations of codecs (Vorbis, Opus, VP8) could be written in something like Go. Or spelling correction libraries. Currently we have two tiers of libraries: those written in C/C++, which can be used from any language under the sun (Python bindings, Ruby bindings, Perl bindings, PHP bindings...), and those written in high-level dynamic languages (Python, Ruby, Perl, PHP, ...) which can <i>only</i> be used by the same language. We need a middle ground. C isn't expressive or safe enough to deserve to be the lingua franca like this. And Go is tantalizingly close to replacing it, but not quite.<p>[1]: <a href="http://qconlondon.com/london-2009/presentation/Null+References:+The+Billion+Dollar+Mistake" rel="nofollow">http://qconlondon.com/london-2009/presentation/Null+Referenc...</a></text><parent_chain></parent_chain></comment><story><title>Why I Like Go</title><url>https://gist.github.com/freeformz/4746274</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>rogerbinns</author><text>I'm still of the opinion go messed up the error handling badly. As a simple example note how every tutorial doesn't bother looking for the error return of println calls and hence would silently ignore errors.<p>IMHO the ideal solution is that if you make no effort to look at the error return of a function, it is automatically returned to your parent. This is somewhat analogous to exceptions, but they require a lot more syntax. (Yes I know about panic/recover.)</text><parent_chain></parent_chain></comment><story><title>Why I Like Go</title><url>https://gist.github.com/freeformz/4746274</url></story> |
19,372,615 | 19,372,692 | 1 | 2 | 19,367,149 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>roebk</author><text>This is not simply about modals. Using VoiceOver and Chrome I cannot access the pop up menu to navigate the site. These CSS tricks are cool but they shouldn&#x27;t be used in a production environment without basic usability testing.<p>More specifically, no you cannot add keyboard shortcuts &quot;with 0 rework&quot;. How are you returning the users focus to the active element before they opened the modal? The key is not to use an &quot;arbitrary JS library for modal popups&quot; and to use or create a modal library that has superior usability baked in. Sure, maybe there&#x27;s a superior workflow than to use a modal.<p>For anyone that is interested MicroModal (<a href="https:&#x2F;&#x2F;micromodal.now.sh&#x2F;" rel="nofollow">https:&#x2F;&#x2F;micromodal.now.sh&#x2F;</a>) ticked a lot of boxes last time I checked.</text><parent_chain><item><author>gambler</author><text>You can trivially add keyboard shortcuts to this solution after it&#x27;s implemented - with 0 rework. Moreover, the is absolutely no guarantee that an arbitrary JS library for modal popups will have better usability. And I have yet to see one that will not fail if I block JavaScript, creating horrible user experience for everyone who does so. Funny how usability concerns go out of the window when NoScript&#x2F;uBlock users are involved.<p>Personally, I try to avoid modal popups altogether. There is almost always better ways to structure things. The whole concept of &quot;modal&quot; UI doesn&#x27;t map well to the &quot;document&quot; nature of web elements.</text></item><item><author>roebk</author><text>It&#x27;s perfectly possible to do some nifty tricks with CSS alone. The one thing this author has omitted is the impact this has on accessibility. Sure, I can open a modal without the need of JavaScript, but my focus isn&#x27;t trapped within the modal and with no standard keyboard shortcut (ESC) to dismiss the modal, it provides a sub-standard experience for all users.<p>Be sensible and use JavaScript when it&#x27;s appropriate. Please don&#x27;t think it&#x27;s cool to create some fancy JS-less widgets and forget about accessibility.</text></item></parent_chain></comment><story><title>A JavaScript-Free Front End</title><url>https://dev.to/winduptoy/a-javascript-free-frontend-2d3e</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>Wowfunhappy</author><text>While I recognize a lot of the HN crowd blocks Javascript, the overall percentage of people doing this is absolutely tiny.<p>What is the case for making Javascript-blocking users a priority?</text><parent_chain><item><author>gambler</author><text>You can trivially add keyboard shortcuts to this solution after it&#x27;s implemented - with 0 rework. Moreover, the is absolutely no guarantee that an arbitrary JS library for modal popups will have better usability. And I have yet to see one that will not fail if I block JavaScript, creating horrible user experience for everyone who does so. Funny how usability concerns go out of the window when NoScript&#x2F;uBlock users are involved.<p>Personally, I try to avoid modal popups altogether. There is almost always better ways to structure things. The whole concept of &quot;modal&quot; UI doesn&#x27;t map well to the &quot;document&quot; nature of web elements.</text></item><item><author>roebk</author><text>It&#x27;s perfectly possible to do some nifty tricks with CSS alone. The one thing this author has omitted is the impact this has on accessibility. Sure, I can open a modal without the need of JavaScript, but my focus isn&#x27;t trapped within the modal and with no standard keyboard shortcut (ESC) to dismiss the modal, it provides a sub-standard experience for all users.<p>Be sensible and use JavaScript when it&#x27;s appropriate. Please don&#x27;t think it&#x27;s cool to create some fancy JS-less widgets and forget about accessibility.</text></item></parent_chain></comment><story><title>A JavaScript-Free Front End</title><url>https://dev.to/winduptoy/a-javascript-free-frontend-2d3e</url></story> |
34,578,520 | 34,577,426 | 1 | 2 | 34,568,011 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>miniwark</author><text>For other great french mustard, not from Dijon you have :<p>&quot;Moutarde de Meaux&quot; (or &quot;Moutarde à l&#x27;ancienne&quot;), a mustard done the old way. One of the best producer is Pommery:<p><a href="https:&#x2F;&#x2F;www.moutarde-de-meaux.com&#x2F;pommery" rel="nofollow">https:&#x2F;&#x2F;www.moutarde-de-meaux.com&#x2F;pommery</a><p>&quot;Moutarde de Normandie&quot;, the same than the above but with cider vinegar:<p><a href="https:&#x2F;&#x2F;toustain-barville.com&#x2F;3-moutardes" rel="nofollow">https:&#x2F;&#x2F;toustain-barville.com&#x2F;3-moutardes</a><p>&quot;Moutarde violette de Brive&quot;, yep! it&#x27;s purple:<p><a href="https:&#x2F;&#x2F;www.denoix.com&#x2F;moutarde-violette" rel="nofollow">https:&#x2F;&#x2F;www.denoix.com&#x2F;moutarde-violette</a><p>&quot;Moutarde à la Violette&quot;, this one is not purple, but do include extract of violet flower:<p><a href="https:&#x2F;&#x2F;www.lamaisondelaviolette.com&#x2F;fr&#x2F;epicerie-salee&#x2F;101-moutarde-a-l-ancienne-200g.html" rel="nofollow">https:&#x2F;&#x2F;www.lamaisondelaviolette.com&#x2F;fr&#x2F;epicerie-salee&#x2F;101-m...</a></text><parent_chain></parent_chain></comment><story><title>The Last Mustard Maker in Dijon</title><url>https://www.atlasobscura.com/articles/dijon-mustard</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>michpoch</author><text>It really pleases me to see that one can create such a business nowadays and make it thrive.<p>It is in such opposition to megacorp scaling and efficiency.</text><parent_chain></parent_chain></comment><story><title>The Last Mustard Maker in Dijon</title><url>https://www.atlasobscura.com/articles/dijon-mustard</url></story> |
28,658,890 | 28,658,863 | 1 | 2 | 28,649,377 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>sali0</author><text>I used to be a very hard headed atheist until I read the book &quot;The Secrets of our Success&quot; by Joseph Heinlein. That book speaks of how culture evolved along with genetics, and it made me realize how important tradition and religion really are to society. I am still atheist, but now very much encourage religious people to stay with their faith and continue their worship. There are definitely downsides to religion, but ultimately they encourage strong communal and familial values, which I think are very lacking in my generation.</text><parent_chain><item><author>lalaland1125</author><text>It&#x27;s interesting to think of religion as a societal tool that has co-evolved along with humanity.<p>Societies with more beneficial religions would prosper and societies with less beneficial religious would die out.<p>It&#x27;s thus no surprise that the religions that survived until the present day promote human survival. For example, it&#x27;s no accident that most major religions heavily encourage their followers to have a lot of kids.</text></item></parent_chain></comment><story><title>The Science of the Benefits of Religion</title><url>https://www.wired.com/story/psychologists-religion-how-god-works/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>klipt</author><text>&gt; For example, it&#x27;s no accident that most major religions heavily encourage their followers to have a lot of kids.<p>I noticed looking at my family tree, that basically all the secular branches have below replacement fertility, while the more religious branches have above replacement.<p>Ironically it seems secularism is the ultimate proselytizing ideology, it seems it can&#x27;t grow its own base through reproduction, it can only tempt the religious to abandon their religion and enjoy secular freedoms with fewer responsibilities (like fewer kids) - but it has to repeat this process at every generation to survive.<p>Also ironic that secular society holds up the theory of evolution as a reason we no longer need religion, yet it seems evolution itself favors the religious with more descendents!</text><parent_chain><item><author>lalaland1125</author><text>It&#x27;s interesting to think of religion as a societal tool that has co-evolved along with humanity.<p>Societies with more beneficial religions would prosper and societies with less beneficial religious would die out.<p>It&#x27;s thus no surprise that the religions that survived until the present day promote human survival. For example, it&#x27;s no accident that most major religions heavily encourage their followers to have a lot of kids.</text></item></parent_chain></comment><story><title>The Science of the Benefits of Religion</title><url>https://www.wired.com/story/psychologists-religion-how-god-works/</url></story> |
18,744,734 | 18,744,723 | 1 | 3 | 18,744,464 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>jchw</author><text>&gt;with implications that bigly threaten online privacy and security<p>Well, it never hurts to start researching post-quantum crypto even if large quantum computers were to prove impractical. I recall Google ran an experiment with a post-quantum key exchange algorithm [1], though I have no clue what came of said experiment.<p>[1] <a href="https:&#x2F;&#x2F;security.googleblog.com&#x2F;2016&#x2F;07&#x2F;experimenting-with-post-quantum.html?m=1" rel="nofollow">https:&#x2F;&#x2F;security.googleblog.com&#x2F;2016&#x2F;07&#x2F;experimenting-with-p...</a></text><parent_chain><item><author>jMyles</author><text>Link to the actual legislation: <a href="https:&#x2F;&#x2F;www.congress.gov&#x2F;bill&#x2F;115th-congress&#x2F;house-bill&#x2F;6227" rel="nofollow">https:&#x2F;&#x2F;www.congress.gov&#x2F;bill&#x2F;115th-congress&#x2F;house-bill&#x2F;6227</a><p>So, whoa - I hadn&#x27;t even heard of this. Had y&#x27;all?<p>$1.2B on an exotic tech field - with implications that bigly threaten online privacy and security - seems like an incredible thing to get through both houses and signed into law without it being a story in these parts.<p>Amash unsurprisingly voted no (joining only 10 others in the house, while 348 voted aye). A quick perusal of his twitter doesn&#x27;t show me any of his thoughts on it. I&#x27;d like to hear them.</text></item></parent_chain></comment><story><title>A $1.2B law to boost US quantum tech</title><url>https://www.technologyreview.com/the-download/612679/president-trump-has-signed-a-12-billon-law-to-boost-us-quantum-tech/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>meritt</author><text>There was a bit of discussion back when this bill was introduced: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=17524928" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=17524928</a></text><parent_chain><item><author>jMyles</author><text>Link to the actual legislation: <a href="https:&#x2F;&#x2F;www.congress.gov&#x2F;bill&#x2F;115th-congress&#x2F;house-bill&#x2F;6227" rel="nofollow">https:&#x2F;&#x2F;www.congress.gov&#x2F;bill&#x2F;115th-congress&#x2F;house-bill&#x2F;6227</a><p>So, whoa - I hadn&#x27;t even heard of this. Had y&#x27;all?<p>$1.2B on an exotic tech field - with implications that bigly threaten online privacy and security - seems like an incredible thing to get through both houses and signed into law without it being a story in these parts.<p>Amash unsurprisingly voted no (joining only 10 others in the house, while 348 voted aye). A quick perusal of his twitter doesn&#x27;t show me any of his thoughts on it. I&#x27;d like to hear them.</text></item></parent_chain></comment><story><title>A $1.2B law to boost US quantum tech</title><url>https://www.technologyreview.com/the-download/612679/president-trump-has-signed-a-12-billon-law-to-boost-us-quantum-tech/</url></story> |
12,043,277 | 12,043,145 | 1 | 3 | 12,043,045 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>traverseda</author><text>Funny story, this is a direct result of my (small) city spending something like half a million on new branding.<p><a href="http:&#x2F;&#x2F;www.halifax.ca&#x2F;home&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.halifax.ca&#x2F;home&#x2F;</a></text><parent_chain></parent_chain></comment><story><title>Is it possible to apply CSS to half of a character?</title><url>http://stackoverflow.com/questions/23569441/is-it-possible-to-apply-css-to-half-of-a-character</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>sdegutis</author><text><i>Your scientists were so preoccupied with whether or not they could, they didn’t stop to think if they should.</i></text><parent_chain></parent_chain></comment><story><title>Is it possible to apply CSS to half of a character?</title><url>http://stackoverflow.com/questions/23569441/is-it-possible-to-apply-css-to-half-of-a-character</url></story> |
7,422,702 | 7,422,711 | 1 | 3 | 7,420,389 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>uniclaude</author><text>Among other things that Angular, Ember &amp; others bring, what you should understand here is that JQuery does not help you to structure your code. Those frameworks offer the type of structure that makes it easier to reason about how an app should be built, and it helps a lot when you&#x27;re working in a team.<p>JQuery and JS were certainly not dumped, it is just that people writing single page apps moved on and are now using tools that help them.</text><parent_chain><item><author>AznHisoka</author><text>I never understood how JQuery and JS were just dumped the past 3-4 years in favor of all thse complex frameworks like AngularJS, Ember, etc... is there something these frameworks can do that JQuery can&#x27;t? Can they make fancy single page apps and JQuery can&#x27;t? I need to be enlightened.<p>Or is it simply ppl need to exercise their mental creativity?</text></item><item><author>stuaxo</author><text>This is true. AngularJS is much better than what we had before, it is kind of large and monolithic.<p>The cycle probably goes thusly:<p>Large monolithic framework comes and shows everyone a new way of doing things (Angular&#x2F;Django).<p>People think it is too large and monolithic, so make microframeworks (Flask&#x2F;Whatever comes after Angular).<p>The next step will be a kind of happy medium.</text></item><item><author>jeswin</author><text>AngularJS has a J2EE mindset. Where libraries grow to become as hard to learn as programming languages themselves. It does not make semantic sense to me anymore.<p>Here is an example from the site:<p><pre><code> &lt;div&gt;
Length (float):
&lt;input type=&quot;text&quot; ng-model=&quot;length&quot; name=&quot;length&quot; smart-float &#x2F;&gt;
{{length}}&lt;br &#x2F;&gt;
&lt;span ng-show=&quot;form.length.$error.float&quot;&gt;
This is not a valid float number!&lt;&#x2F;span&gt;
&lt;&#x2F;div&gt;
</code></pre>
How semantic is ng-show=&quot;form.length.$error.float? smart-float sounds like C++. If programming languages worked like this, we wouldn&#x27;t have built many apps. The problem is that some frameworks assume that everything should be done with using configuration. What ends up happening is that the configuration (and conventions) becomes its own language. This is a waste of time in the long term; library conventions are not a portable skill set.<p>Some things are just better off with plain JS and simple HTML. FB&#x2F;Instagram&#x27;s React is a much better approach to building HTML UIs; you get readable JS and HTML instead of configuration mess.</text></item></parent_chain></comment><story><title>Angular 2.0</title><url>http://blog.angularjs.org/2014/03/angular-20.html</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>atrk</author><text>Personally, the two big draws to me of Angular were &quot;free&quot; (as in, I don&#x27;t have to write much code) DOM&lt;-&gt;data binding, and the explicit goal of testability.<p>As a learning exercise, I wrote a page using just jquery, rewrote it in backbone, and then rewrote it in angular. Backbone helped me separate concerns; Angular helped me do that while writing _way_ less code, since I didn&#x27;t have to manage keeping the DOM and the JS model in sync.</text><parent_chain><item><author>AznHisoka</author><text>I never understood how JQuery and JS were just dumped the past 3-4 years in favor of all thse complex frameworks like AngularJS, Ember, etc... is there something these frameworks can do that JQuery can&#x27;t? Can they make fancy single page apps and JQuery can&#x27;t? I need to be enlightened.<p>Or is it simply ppl need to exercise their mental creativity?</text></item><item><author>stuaxo</author><text>This is true. AngularJS is much better than what we had before, it is kind of large and monolithic.<p>The cycle probably goes thusly:<p>Large monolithic framework comes and shows everyone a new way of doing things (Angular&#x2F;Django).<p>People think it is too large and monolithic, so make microframeworks (Flask&#x2F;Whatever comes after Angular).<p>The next step will be a kind of happy medium.</text></item><item><author>jeswin</author><text>AngularJS has a J2EE mindset. Where libraries grow to become as hard to learn as programming languages themselves. It does not make semantic sense to me anymore.<p>Here is an example from the site:<p><pre><code> &lt;div&gt;
Length (float):
&lt;input type=&quot;text&quot; ng-model=&quot;length&quot; name=&quot;length&quot; smart-float &#x2F;&gt;
{{length}}&lt;br &#x2F;&gt;
&lt;span ng-show=&quot;form.length.$error.float&quot;&gt;
This is not a valid float number!&lt;&#x2F;span&gt;
&lt;&#x2F;div&gt;
</code></pre>
How semantic is ng-show=&quot;form.length.$error.float? smart-float sounds like C++. If programming languages worked like this, we wouldn&#x27;t have built many apps. The problem is that some frameworks assume that everything should be done with using configuration. What ends up happening is that the configuration (and conventions) becomes its own language. This is a waste of time in the long term; library conventions are not a portable skill set.<p>Some things are just better off with plain JS and simple HTML. FB&#x2F;Instagram&#x27;s React is a much better approach to building HTML UIs; you get readable JS and HTML instead of configuration mess.</text></item></parent_chain></comment><story><title>Angular 2.0</title><url>http://blog.angularjs.org/2014/03/angular-20.html</url></story> |
32,335,209 | 32,335,133 | 1 | 3 | 32,334,552 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>jacobolus</author><text>The books were worth tens of thousands of dollars (sold individually on the second-hand book market, after being carefully catalogued etc.), but nobody interested in buying books happened to be at the auction and the auctioneer set a $1 minimum bid because he didn’t know anything about books and was more interested in disposing of the books than making money from the sale. The auction house could surely get significantly more for their books if they knew the right venue to sell them (somewhere frequented by used booksellers), but I guess it wasn’t worth their trouble to figure out where that might be.<p>This is sort of like the time I went to a car auction as a kid and some college students bought a lightly used stretch limo in perfect working order for (the minimum bid of) $100.</text><parent_chain><item><author>spywaregorilla</author><text>&gt; He looked around at the faces in the crowd and said, “I’m opening the bidding at one dollar.” I about shit myself. I bid the $1 immediately to get things rolling. Well, after I bid, he looked around and said, “Once, twice, sold that man there for $1.” I just laughed… and wondered how the Hell I was going to get this pallet home and what I was going to do with all those books.<p>&gt; When I asked the auctioneer afterwards why he’d let it go so cheaply, he said, “Did you see anyone trampling you to get in a bid?” I said no, I didn’t. His reply, with a smirk on his face, was, “Gotta’ know your audience in this job.”<p>&gt; Well, needless to say, I got the books home and spent a few years going through them and selling some, giving some away, etc. However, that’s not the point of this story. The point was finding things in books. So, with that in mind…<p>Dude goes to an auction and finds books. Nobody bids on the books. Dude is amazed that the auctioneer is willing to sell him something nobody wants for a low price. Dude spends years going through those books.<p>I&#x27;m happy for this guy.</text></item></parent_chain></comment><story><title>What’s the strangest thing you ever found in a book?</title><url>https://noctslackv2.wordpress.com/2022/08/02/whats-the-strangest-thing-you-ever-found-in-a-book/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>motoboi</author><text>Dude found friend.</text><parent_chain><item><author>spywaregorilla</author><text>&gt; He looked around at the faces in the crowd and said, “I’m opening the bidding at one dollar.” I about shit myself. I bid the $1 immediately to get things rolling. Well, after I bid, he looked around and said, “Once, twice, sold that man there for $1.” I just laughed… and wondered how the Hell I was going to get this pallet home and what I was going to do with all those books.<p>&gt; When I asked the auctioneer afterwards why he’d let it go so cheaply, he said, “Did you see anyone trampling you to get in a bid?” I said no, I didn’t. His reply, with a smirk on his face, was, “Gotta’ know your audience in this job.”<p>&gt; Well, needless to say, I got the books home and spent a few years going through them and selling some, giving some away, etc. However, that’s not the point of this story. The point was finding things in books. So, with that in mind…<p>Dude goes to an auction and finds books. Nobody bids on the books. Dude is amazed that the auctioneer is willing to sell him something nobody wants for a low price. Dude spends years going through those books.<p>I&#x27;m happy for this guy.</text></item></parent_chain></comment><story><title>What’s the strangest thing you ever found in a book?</title><url>https://noctslackv2.wordpress.com/2022/08/02/whats-the-strangest-thing-you-ever-found-in-a-book/</url></story> |
20,155,071 | 20,154,621 | 1 | 3 | 20,132,777 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>abalos</author><text>This is similar to a realization I had the other day: for many people collecting things is less about the objects and more about the memories and nostalgia and associated with those objects.<p>I have been having a lot of &quot;identity&quot; problems lately, and it occurred to me that very little of what I own has any substantial story about it nor does it say much about who I am as a person.<p>The objects we collect exist as affirmations of the identity we&#x27;ve chosen for ourselves.</text><parent_chain><item><author>mark_l_watson</author><text>I have thought about this lately because my wife and I moved to Illinois so I could accept a job managing a machine learning team. I retired and now we are just now moving back to Arizona. I spent five hours yesterday watching our stuff being wrapped and put on a truck. Lots of possessions.<p>The thing is, I have some stuff that I really like. A teak bookcase I bought in the 1970s when I got my first real job after finishing school. A huge teak desk my wife bought me 20 years ago. My wife has some furniture her grandmother had and that she grew up with. We also have art and things we have bought while traveling around the world.<p>I see the advantages of not being encumbered by ‘stuff’ but some possessions help define our personal history and are simply a pleasure to own.</text></item></parent_chain></comment><story><title>Owning nothing is now a luxury, thanks to a number of subscription startups</title><url>https://www.nytimes.com/2019/06/08/style/rent-subscription-clothing-furniture.html</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>grecy</author><text>Keep it if it brings you happiness, after all, that&#x27;s the point.<p>It&#x27;s the rest of the stuff that can go. I helped a friend move last month. After we&#x27;d been to the 5 places she kept her stuff, we discovered she had 5 coffee machines, 5 cutting boards, 5 juicers, etc. etc.<p>The things you describe make you happier and are not stuff. The things I described are just stuff.</text><parent_chain><item><author>mark_l_watson</author><text>I have thought about this lately because my wife and I moved to Illinois so I could accept a job managing a machine learning team. I retired and now we are just now moving back to Arizona. I spent five hours yesterday watching our stuff being wrapped and put on a truck. Lots of possessions.<p>The thing is, I have some stuff that I really like. A teak bookcase I bought in the 1970s when I got my first real job after finishing school. A huge teak desk my wife bought me 20 years ago. My wife has some furniture her grandmother had and that she grew up with. We also have art and things we have bought while traveling around the world.<p>I see the advantages of not being encumbered by ‘stuff’ but some possessions help define our personal history and are simply a pleasure to own.</text></item></parent_chain></comment><story><title>Owning nothing is now a luxury, thanks to a number of subscription startups</title><url>https://www.nytimes.com/2019/06/08/style/rent-subscription-clothing-furniture.html</url></story> |
36,893,593 | 36,894,012 | 1 | 3 | 36,892,451 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>exceptione</author><text>The bad thing: Teams would never have gotten any success without malpractice. The product is an incredible horror show, all competition easily crushed Teams. They are smart and counted on lazy admins.<p>How are you going to compensate competitors? The problem is that over and over again, companies like MS have already accounted for the fine in their planning.<p>If we want to end this practice, regulators need to deal a crippling blow to MS. Forbid for the next 15 years to provide any solution in the realm of messaging. Hand out a fine so high that it breaks the company and will lead to executives being sued by shareholders.</text><parent_chain></parent_chain></comment><story><title>EU opens Microsoft antitrust investigation into Teams bundling</title><url>https://www.theverge.com/2023/7/27/23797305/microsoft-teams-eu-antitrust-investigation-office-bundling-slack</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>delecti</author><text>I&#x27;m curious what people are using that makes Teams look so bad in comparison to the commenters complaining about it. It&#x27;s the second most seamless video chat I&#x27;ve ever used, just behind Google Duo, which is only seamless because it&#x27;s so light on features. Zoom isn&#x27;t too far behind, but the UI still doesn&#x27;t manage to work as well.<p>And to be clear, this isn&#x27;t commenting on the merits of an antitrust investigation; I understand the rationale behind anti-bundling regulations. I&#x27;m just talking about the complaints about Teams itself. Are people prejudiced against it because Lync was so bad?</text><parent_chain></parent_chain></comment><story><title>EU opens Microsoft antitrust investigation into Teams bundling</title><url>https://www.theverge.com/2023/7/27/23797305/microsoft-teams-eu-antitrust-investigation-office-bundling-slack</url></story> |
41,391,217 | 41,390,795 | 1 | 3 | 41,388,326 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>rocqua</author><text>I have heard, and like, the theory that &#x27;waveform collapse&#x27; due to &#x27;observation&#x27; is due to entaglement. Specifically, the idea is that most of the world is quantum entangled, &#x27;observation&#x27; then has the effect of entangling the observed particle with &#x27;most of the world&#x27;. The &#x27;waveform collapse&#x27; is then the result of this entaglement with everything causing the waveform to concentrate heavily.<p>Is this concept debunked by this paper, or could it be that &#x27;destroys entanglement&#x27; actually means &#x27;becomes entangled with almost everything else&#x27;?</text><parent_chain></parent_chain></comment><story><title>Computer scientists prove that heat destroys quantum entanglement</title><url>https://www.quantamagazine.org/computer-scientists-prove-that-heat-destroys-entanglement-20240828/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>misja111</author><text>Isn&#x27;t heat transmitted by photons? In that case, isn&#x27;t it inevitable that heat destroys entanglement? Because the transmission of heat means some photon has to interact with one of the entangled particles.</text><parent_chain></parent_chain></comment><story><title>Computer scientists prove that heat destroys quantum entanglement</title><url>https://www.quantamagazine.org/computer-scientists-prove-that-heat-destroys-entanglement-20240828/</url></story> |
35,281,318 | 35,280,839 | 1 | 2 | 35,279,656 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>rishsriv</author><text>This looks fantastic. Will try replacing our current fine-tuned FLAN-UL2 model with this.<p>I wonder how the devtooling around this will evolve. Seems like a matter of days until someone creates a GUI wrapper around this, and obviates the need to use programmer time for fine-tuning</text><parent_chain></parent_chain></comment><story><title>How to use Alpaca-LoRA to fine-tune a model like ChatGPT</title><url>https://replicate.com/blog/fine-tune-alpaca-with-lora</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>isoprophlex</author><text><i>Low-rank adaptation (LoRA) ... has some advantages over previous methods:</i><p>- <i>It is faster and uses less memory, which means it can run on consumer hardware.</i><p>- <i>The output is much smaller (megabytes, not gigabytes).</i><p>- <i>You can combine multiple fine-tuned models together at runtime.</i><p>This is great news for my dream of building a fine-tuned interactive messenger, that can deliver a message on my behalf by training it on my personality &amp; the information I want to convey.<p>Now just add text to speech and a talking head, as discussed in that other submission about cloning yourself with AI... <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=35280418" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=35280418</a></text><parent_chain></parent_chain></comment><story><title>How to use Alpaca-LoRA to fine-tune a model like ChatGPT</title><url>https://replicate.com/blog/fine-tune-alpaca-with-lora</url></story> |
34,133,681 | 34,132,705 | 1 | 2 | 34,132,484 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>linsomniac</author><text>Populous is a game I&#x27;d love to play again! I had high hopes for Godus, but in the end Godus was pretty much everything I hate about modern games.</text><parent_chain></parent_chain></comment><story><title>Source Code for Populous for Windows CE / Dreamcast Released</title><url>https://github.com/LemonHaze420/DCPopulous</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>TheAceOfHearts</author><text>It would be beneficial to add a readme explaining what this is.</text><parent_chain></parent_chain></comment><story><title>Source Code for Populous for Windows CE / Dreamcast Released</title><url>https://github.com/LemonHaze420/DCPopulous</url></story> |
10,633,786 | 10,633,780 | 1 | 2 | 10,632,809 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>benbreen</author><text>Just wanted to say that I totally agree with your third paragraph and (as an educator) have a suggestion - the current grade management tools like Canvas feel like they&#x27;re about 10-15 years old. Making a better one that&#x27;s open source would not only cut down on the ballooning administrative costs that are contributing to the problems with education right now, but could also contribute to making classes more hands on (by allowing the teacher to branch out beyond tests into more creative forms of assessment).</text><parent_chain><item><author>davisr</author><text>I currently work at an ad agency (we call ourselves a &quot;boutique data-driven marketing company&quot;) in Milwaukee. My official title is Developer, but I do a lot of things: I manage servers, code applications (HTML&#x2F;CSS&#x2F;Javascript, but also C, R, and loads of shell scripting), research new concepts, automate existing workflows, and so much more.<p>Before I did this, I worked as a freelancer doing one-off website jobs for small businesses. Finding clients was easy, but I started dreading the same work everyday. I&#x27;m much happier doing what I do now, but in a while I want to start a non-profit with some co-worker friends.<p>I&#x27;d want that non-profit to be education-related. Education is a really important space to improve, but adding &quot;technology&quot; to an already-bloated space is useless. I feel too many organizations try to add tech for tech&#x27;s sake, when it&#x27;s already impossible to get a class into a computer lab and make effective use of that time. Educational software needs to be thought of differently. Another crap webapp that tests students is a detriment to every student that has to suffer through it. Educational software needs to allow students to explore nature and the world around them.</text></item></parent_chain></comment><story><title>Ask HN: What is your job? Do you like it? What was your favorite job?</title></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>germinalphrase</author><text>I teach in k12 in the Madison area. If you&#x27;re developing concepts and want &#x27;end-user&#x27; feedback I would enjoy taking part.</text><parent_chain><item><author>davisr</author><text>I currently work at an ad agency (we call ourselves a &quot;boutique data-driven marketing company&quot;) in Milwaukee. My official title is Developer, but I do a lot of things: I manage servers, code applications (HTML&#x2F;CSS&#x2F;Javascript, but also C, R, and loads of shell scripting), research new concepts, automate existing workflows, and so much more.<p>Before I did this, I worked as a freelancer doing one-off website jobs for small businesses. Finding clients was easy, but I started dreading the same work everyday. I&#x27;m much happier doing what I do now, but in a while I want to start a non-profit with some co-worker friends.<p>I&#x27;d want that non-profit to be education-related. Education is a really important space to improve, but adding &quot;technology&quot; to an already-bloated space is useless. I feel too many organizations try to add tech for tech&#x27;s sake, when it&#x27;s already impossible to get a class into a computer lab and make effective use of that time. Educational software needs to be thought of differently. Another crap webapp that tests students is a detriment to every student that has to suffer through it. Educational software needs to allow students to explore nature and the world around them.</text></item></parent_chain></comment><story><title>Ask HN: What is your job? Do you like it? What was your favorite job?</title></story> |
29,858,938 | 29,859,132 | 1 | 2 | 29,857,879 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>contravariant</author><text>That&#x27;s why in these discussions it&#x27;s usually better to talk about specific statistics like &#x27;the chance of a wildfire has gone up by 20%&#x27;, or perhaps more clearly &#x27;the average time between extreme floods has gone down from once every 100 years to once every 60&#x27; (which I find communicates the point a bit more clearly).<p>That said personally I think that should be as far as the discussion goes, talking about a <i>specific</i> event and asking whether it&#x27;s because of climate change is silly and leads to counter intuitive results because by nature extreme weather events are <i>mostly</i> caused by bad luck.<p>Climate changes the <i>frequency</i> of extreme events, but talking about the frequency of a singular specific event is impossible. And talking about just 1 or 2 of them isn&#x27;t quite enough either, events will occur at a rate <i>far</i> above or below that predicted by the best weather models simply because of (bad) luck.<p>I sometimes get the feeling that people try to attribute extreme weather to climate change because it improves the narrative, or as proof that climate change has happened. But personally I find this a bit silly since the fact that the global average temperature has increased and the effects this has on weather <i>shouldn&#x27;t</i> be all that controversial.</text><parent_chain><item><author>timmg</author><text>One of the things about &quot;extreme weather attribution&quot; that makes me uncomfortable is the asymmetry of it. To be clear: I&#x27;m in no way an expert (or even educated) in the area.<p>To give an example. Let&#x27;s say there&#x27;s a 1% chance every year that there will be a catastrophic wildfire in some particular area. Now let&#x27;s say climate change increases a chance of drought in that area. Then we get a wildfire one year and the attribution is (say) &quot;20% due to climate change&quot; -- which I guess means there is now a 1.2% annual chance of a catastrophic fire.<p>But what if climate change causes more rain in the area? And, for the sake of argument, that causes the change of catastrophic fire to go <i>down</i> to say 0.8%. Then, in a given year, there is <i>no</i> fire. No one is going to bother doing an attribution study to say, &quot;Climate change is 20% responsible for the fact that we <i>didn&#x27;t</i> have a fire this year.&quot;</text></item></parent_chain></comment><story><title>Do climate models predict extreme weather?</title><url>http://backreaction.blogspot.com/2022/01/do-climate-models-predict-extreme.html</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>vkou</author><text>This year, the pacific north west got hit with the four Fs. Fires, floods, and fucking freezing weather.<p>In the summer, we had an unprecedented heat wave which killed thousands of people. Seattle hit 108°F&#x2F;42°C. The town of Lytton, BC, hit 118°F&#x2F;48°C[0], <i>and then completely burnt down in a 30 minute firestorm</i>. More rain would have been great.<p>We didn&#x27;t get it.<p>We got it in the winter, and it was absolutely devastating. [1] To cap the year off, we ended with a record-setting freeze (With, thankfully, comparatively moderate snowfalls).<p>So, yes, more rain, less rain, more heat, less heat, we got all that. Unfortunately, weather is not a bank account, and having your town burn down to the ground in the summer, followed by a flood in the winter doesn&#x27;t tend to cancel things out.<p>[0] An all-time heat record for Canada.<p>[1] <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;November_2021_Pacific_Northwest_floods" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;November_2021_Pacific_Northwes...</a></text><parent_chain><item><author>timmg</author><text>One of the things about &quot;extreme weather attribution&quot; that makes me uncomfortable is the asymmetry of it. To be clear: I&#x27;m in no way an expert (or even educated) in the area.<p>To give an example. Let&#x27;s say there&#x27;s a 1% chance every year that there will be a catastrophic wildfire in some particular area. Now let&#x27;s say climate change increases a chance of drought in that area. Then we get a wildfire one year and the attribution is (say) &quot;20% due to climate change&quot; -- which I guess means there is now a 1.2% annual chance of a catastrophic fire.<p>But what if climate change causes more rain in the area? And, for the sake of argument, that causes the change of catastrophic fire to go <i>down</i> to say 0.8%. Then, in a given year, there is <i>no</i> fire. No one is going to bother doing an attribution study to say, &quot;Climate change is 20% responsible for the fact that we <i>didn&#x27;t</i> have a fire this year.&quot;</text></item></parent_chain></comment><story><title>Do climate models predict extreme weather?</title><url>http://backreaction.blogspot.com/2022/01/do-climate-models-predict-extreme.html</url></story> |
37,972,052 | 37,970,009 | 1 | 3 | 37,967,126 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>p1esk</author><text><i>Going through a formal CS program will give you an intimate understanding of CPUs</i><p>Please tell me you forgot the &#x2F;s.<p>I have a PhD in computer engineering from a top-20 school in US. Took a bunch of grad level classes, passed the quals (my specialty was ML accelerators).<p>I do NOT have an “intimate understanding of CPUs”. I probably know a little bit more about CPUs than an average programmer. Which is very little.<p>Modern CPUs are extremely complex. Almost as much of impenetrable black boxes as modern neural networks.</text><parent_chain><item><author>anonporridge</author><text>Definitely not true about most programmers, but maybe the author meant CS educated engineers. Going through a formal CS program will give you an intimate understanding of CPUs, especially when compared to the very light coverage of GPUs.</text></item><item><author>permo-w</author><text>&gt;Most programmers have an intimate understanding of CPUs<p>maybe this article is brilliant, but when the first line is something so blatantly untrue it really makes it hard to take the rest seriously</text></item></parent_chain></comment><story><title>What every developer should know about GPU computing</title><url>https://codeconfessions.substack.com/p/gpu-computing</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>usea</author><text>&gt; Going through a formal CS program will give you an intimate understanding of CPUs<p>I did an undergrad in CS, where I did well. I don&#x27;t feel like I understand CPUs very well. Certainly not anywhere in the realm of &quot;intimate.&quot;</text><parent_chain><item><author>anonporridge</author><text>Definitely not true about most programmers, but maybe the author meant CS educated engineers. Going through a formal CS program will give you an intimate understanding of CPUs, especially when compared to the very light coverage of GPUs.</text></item><item><author>permo-w</author><text>&gt;Most programmers have an intimate understanding of CPUs<p>maybe this article is brilliant, but when the first line is something so blatantly untrue it really makes it hard to take the rest seriously</text></item></parent_chain></comment><story><title>What every developer should know about GPU computing</title><url>https://codeconfessions.substack.com/p/gpu-computing</url></story> |
41,469,925 | 41,468,406 | 1 | 3 | 41,465,900 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>lessname</author><text>I really like the server side routing part of Inertia and that you can pass data to the frontend directly in the first request without needing to do an additional http request (altough this might be a bit problematic for sensitive information in case the sites are cached).<p>However, there are also things that make it feel gimmicky:<p>- The resolve function createInertiaApp runs more than once (mainly) on the first page load causing a re-render and it seems like there is no plan to fix that in near feature <a href="https:&#x2F;&#x2F;github.com&#x2F;inertiajs&#x2F;inertia&#x2F;issues&#x2F;1595">https:&#x2F;&#x2F;github.com&#x2F;inertiajs&#x2F;inertia&#x2F;issues&#x2F;1595</a> &#x2F; <a href="https:&#x2F;&#x2F;github.com&#x2F;inertiajs&#x2F;inertia&#x2F;issues&#x2F;1091">https:&#x2F;&#x2F;github.com&#x2F;inertiajs&#x2F;inertia&#x2F;issues&#x2F;1091</a><p>- There are issues like this where they could at least merge the PR to improve the documentation as there seem to be many people to misunderstand the usage the function but it did not happen <a href="https:&#x2F;&#x2F;github.com&#x2F;inertiajs&#x2F;inertia&#x2F;issues&#x2F;1631">https:&#x2F;&#x2F;github.com&#x2F;inertiajs&#x2F;inertia&#x2F;issues&#x2F;1631</a></text><parent_chain></parent_chain></comment><story><title>Inertia.js – Build React, Vue, or Svelte apps with server-side routing</title><url>https://inertiajs.com/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>calexanderaz</author><text>Inertia is pretty interesting! Recently, Elixir &#x2F; Phoenix started supporting it:<p><a href="https:&#x2F;&#x2F;youtu.be&#x2F;uyfyFRvng3c" rel="nofollow">https:&#x2F;&#x2F;youtu.be&#x2F;uyfyFRvng3c</a></text><parent_chain></parent_chain></comment><story><title>Inertia.js – Build React, Vue, or Svelte apps with server-side routing</title><url>https://inertiajs.com/</url></story> |
41,338,016 | 41,336,687 | 1 | 3 | 41,333,064 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>_nalply</author><text>One story of incaccessibility:<p>An online bank does video verification. Being deaf, I couldn&#x27;t complete the verification because I didn&#x27;t understand the instructions. I asked someone for help, but the bank said, I need to do the verification alone.<p>What went wrong: The application didn&#x27;t offer the possibility to send written instructions. The fallback of having support by someone else was declined. I offered to call a professional interpreter but that was declined, too.</text><parent_chain></parent_chain></comment><story><title>How people with disabilities use the web</title><url>https://www.w3.org/WAI/people-use-web/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>stared</author><text>In this topic, there is a wonderful summary of concrete examples of dos and don&#x27;ts:<p><a href="https:&#x2F;&#x2F;accessibility.blog.gov.uk&#x2F;2016&#x2F;09&#x2F;02&#x2F;dos-and-donts-on-designing-for-accessibility&#x2F;" rel="nofollow">https:&#x2F;&#x2F;accessibility.blog.gov.uk&#x2F;2016&#x2F;09&#x2F;02&#x2F;dos-and-donts-o...</a></text><parent_chain></parent_chain></comment><story><title>How people with disabilities use the web</title><url>https://www.w3.org/WAI/people-use-web/</url></story> |
16,146,172 | 16,145,925 | 1 | 2 | 16,145,670 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>maxander</author><text>So a system that requires <i>all</i> vehicles on the road to have flawless sensor and communications systems can achieve some improvement over current-day technology (from the paper, approximately a &quot;doubling of capacity&quot; for intersections with this implemented.)<p>This is a <i>profoundly uninteresting result,</i> given the current-day technology in question is &quot;a dozen lights attached to a timer.&quot; Add devices that are several orders of magnitude more expensive and <i>yeah</i> you&#x27;ll get something better- that they only achieve a factor of two improvement (in theory!) reads as a stunning failure of autonomous vehicle technology to pull their weight in this regard. (Granted, more clever schemes might be produced that might get better results from this scenario- it&#x27;s hard to prove that they <i>can&#x27;t</i> be effective.)<p>Better idea- instead of having the world pay for sensor&#x2F;communication systems on <i>every car</i>, have the same sensor packages installed <i>on the traffic lights</i> so that they can operate in a smarter fashion. Orders of magnitude less expensive, and quite possibly as effective in reducing traffic backup.</text><parent_chain></parent_chain></comment><story><title>Light Traffic</title><url>http://senseable.mit.edu/light-traffic/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>rcarmo</author><text>There&#x27;s been a marked tendency to replace intersections with roundabouts and shared spaces (<a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Shared_space" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Shared_space</a>) in many places, including the outskirts of Lisbon (as well as a few legendary mazes in Britain).<p>There was even a BBC report on the latter (which I can&#x27;t find right now, as usual, only a follow-up: <a href="http:&#x2F;&#x2F;www.bbc.com&#x2F;news&#x2F;uk-33303031" rel="nofollow">http:&#x2F;&#x2F;www.bbc.com&#x2F;news&#x2F;uk-33303031</a>).<p>Drawing a (admittedly inaccurate) parallel with shared spaces (which are harder to navigate by sensory deprived humans than standard intersections), I&#x27;d say roundabouts (which preserve crossings) would be a more sensible short-term approach overall -- especially considering the remaining human drivers.<p>Full disclosure: I don&#x27;t drive anymore. Gave it up decades ago because I prefer to do something useful with my commute times, and resort to public transportation or Uber whenever possible, which (ironically) allows me to arrive earlier to meetings than most of my colleagues (who need to hunt down a parking space).</text><parent_chain></parent_chain></comment><story><title>Light Traffic</title><url>http://senseable.mit.edu/light-traffic/</url></story> |
11,785,548 | 11,785,525 | 1 | 2 | 11,785,097 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>jcater</author><text>In the article:<p>&quot;I also suggested we’d try to work with :&#x2F;&#x2F; (colon slash slash) somehow as a symbol, since after all the :&#x2F;&#x2F; letter sequence is commonly used in all the URL formats that curl supports. And it is sort of a global symbol for URLs when you start to think about it. Made sense to me.&quot;<p>They seem to grok it perfectly well, but recognize the modern association people have with :&#x2F;&#x2F; and urls.</text><parent_chain><item><author>efaref</author><text>For something that claims to &quot;grok&quot; URLs, using &quot;:&#x2F;&#x2F;&quot; as part of the logo seems to be misunderstanding how URLs (are supposed to) work.<p>According to RFC3986, URIs (the proper name; URLs are a kind of URI) are correctly of the form:<p><pre><code> &lt;scheme&gt;:&lt;scheme-specific-part&gt;
</code></pre>
For <i>some</i> schemes, the &lt;scheme-specific-part&gt; may contain a &lt;hierarchical-part&gt;, the format for which is:<p><pre><code> &#x2F;&#x2F;&lt;authority&gt;[&#x2F;&lt;path&gt;] | &lt;path&gt;
</code></pre>
So it&#x27;s only hierarchical URIs with a defined authority that have the (admittedly iconic) &quot;:&#x2F;&#x2F;&quot; in them.<p>I know most people identity URIs as having that sequence in them, but these are all valid URIs:<p><pre><code> mailto:[email protected]
sip:[email protected]
tel:+18005550123
file:&#x2F;path&#x2F;to&#x2F;file
</code></pre>
I&#x27;m not saying I expect everyone to understand these subtleties, but people who claim to grok URLs ought to.</text></item></parent_chain></comment><story><title>A new Curl logo</title><url>https://daniel.haxx.se/blog/2016/05/27/a-new-curl-logo/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>dbalan</author><text>This might shed some light - Curl Developer on URLs<p><a href="https:&#x2F;&#x2F;webcache.googleusercontent.com&#x2F;search?q=cache:hGPFWPPOv-8J:https:&#x2F;&#x2F;daniel.haxx.se&#x2F;blog&#x2F;2016&#x2F;05&#x2F;11&#x2F;my-url-isnt-your-url&#x2F;+&amp;cd=2&amp;hl=en&amp;ct=clnk&amp;gl=in" rel="nofollow">https:&#x2F;&#x2F;webcache.googleusercontent.com&#x2F;search?q=cache:hGPFWP...</a></text><parent_chain><item><author>efaref</author><text>For something that claims to &quot;grok&quot; URLs, using &quot;:&#x2F;&#x2F;&quot; as part of the logo seems to be misunderstanding how URLs (are supposed to) work.<p>According to RFC3986, URIs (the proper name; URLs are a kind of URI) are correctly of the form:<p><pre><code> &lt;scheme&gt;:&lt;scheme-specific-part&gt;
</code></pre>
For <i>some</i> schemes, the &lt;scheme-specific-part&gt; may contain a &lt;hierarchical-part&gt;, the format for which is:<p><pre><code> &#x2F;&#x2F;&lt;authority&gt;[&#x2F;&lt;path&gt;] | &lt;path&gt;
</code></pre>
So it&#x27;s only hierarchical URIs with a defined authority that have the (admittedly iconic) &quot;:&#x2F;&#x2F;&quot; in them.<p>I know most people identity URIs as having that sequence in them, but these are all valid URIs:<p><pre><code> mailto:[email protected]
sip:[email protected]
tel:+18005550123
file:&#x2F;path&#x2F;to&#x2F;file
</code></pre>
I&#x27;m not saying I expect everyone to understand these subtleties, but people who claim to grok URLs ought to.</text></item></parent_chain></comment><story><title>A new Curl logo</title><url>https://daniel.haxx.se/blog/2016/05/27/a-new-curl-logo/</url></story> |
27,487,674 | 27,486,648 | 1 | 2 | 27,485,270 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>georgeecollins</author><text>There is a lot of reporting about companies in two areas I am familiar with: video games and entertainment. Both industries are aware that there are a lot of young people really desperate to break into them. Not all companies take advantage of that, but many do.<p>Some game companies that have only really young workers below senior management and explain this by saying older people don&#x27;t get what they are doing. They say it quietly, and indirectly because it opens them up to discrimination lawsuits. But what it really means is experienced people aren&#x27;t putting up with something about the company.. the hours, the management, something. And unfortunately this does not really seem to be an impediment to their success.</text><parent_chain><item><author>bradleyjg</author><text>Companies that use the: recruit a lot of people, burn out most, rinse and repeat strategy are fairly easy to identify.<p>As an employee you should have your eyes open about this but it’s not necessarily the case that they should be avoided at all costs. Properly used, time at one of these companies can change the trajectory of your career. Depending on where you are in life that can be worth it.<p>Having a time boxed plan makes it more likely you can survive the experience with your health and sanity intact.</text></item><item><author>w0mbat</author><text>The article actually doesn’t tell the true horror of the situation which is this:
Companies burn out employees and then deal with the consequences by firing them or bullying them into quitting. Employees lie about how their last job ended and limp into the next one, using the unemployment gap to recover as best they can.</text></item></parent_chain></comment><story><title>Burnout from an Organizational Perspective</title><url>https://ssir.org/articles/entry/burnout_from_an_organizational_perspective</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>hinkley</author><text>I was working at such a place when the 2008 recession happened. That was brutal. I still have health issues from that experience.<p>The road to Hell is paved with good intentions. Your plans to get out quick may run into economic epicycles and then your clever plan ain’t so clever.</text><parent_chain><item><author>bradleyjg</author><text>Companies that use the: recruit a lot of people, burn out most, rinse and repeat strategy are fairly easy to identify.<p>As an employee you should have your eyes open about this but it’s not necessarily the case that they should be avoided at all costs. Properly used, time at one of these companies can change the trajectory of your career. Depending on where you are in life that can be worth it.<p>Having a time boxed plan makes it more likely you can survive the experience with your health and sanity intact.</text></item><item><author>w0mbat</author><text>The article actually doesn’t tell the true horror of the situation which is this:
Companies burn out employees and then deal with the consequences by firing them or bullying them into quitting. Employees lie about how their last job ended and limp into the next one, using the unemployment gap to recover as best they can.</text></item></parent_chain></comment><story><title>Burnout from an Organizational Perspective</title><url>https://ssir.org/articles/entry/burnout_from_an_organizational_perspective</url></story> |
36,332,614 | 36,332,459 | 1 | 3 | 36,330,972 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>jonplackett</author><text>It was already quite easy to get GPT-4 to output json. You just append ‘reply in json with this format’ and it does a really good job.<p>GPT-3.5 was very haphazard though and needs extensive babysitting and reminding, so if this makes gpt3 better then it’s useful - it does have an annoying disclaimer though that ‘it may not reply with valid json’ so we’ll still have to do some sense checks into he output.<p>I have been using this to make a few ‘choose your own adventure’ type games and I can see there’s a TONNE of potential useful things.</text><parent_chain><item><author>swyx</author><text>i think people are underestimating the potential here for agents building - it is now a lot easier for GPT4 to call other models, or itself. while i was taking notes for our emergency pod yesterday (<a href="https:&#x2F;&#x2F;www.latent.space&#x2F;p&#x2F;function-agents" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.latent.space&#x2F;p&#x2F;function-agents</a>) we had this interesting debate with Simon Willison on just how many functions will be supplied to this API. Simon thinks it will be &quot;deep&quot; rather than &quot;wide&quot; - eg a few functions that do many things, rather than many functions that do few things. I think i agree.<p>you can now trivially make GPT4 decide whether to call itself again, or to proceed to the next stage. it feels like the first XOR circuit from which we can compose a &quot;transistor&quot;, from which we can compose a new kind of CPU.</text></item></parent_chain></comment><story><title>Native JSON Output from GPT-4</title><url>https://yonom.substack.com/p/native-json-output-from-gpt-4</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>lbeurerkellner</author><text>It&#x27;s interesting to think about this form of computation (LLM + function call) in terms of circuitry. It is still unclear to me however, if the sequential form of reasoning imposed by a sequence of chat messages is the right model here. LLM decoding and also more high-level &quot;reasoning algorithms&quot; like tree of thought are not that linear.<p>Ever since we started working on LMQL, the overarching vision all along was to get to a form of language model programming, where LLM calls are just the smallest primitive of the &quot;text computer&quot; you are running on. It will be interesting to see what kind of patterns emerge, now that the smallest primitive becomes more robust and reliable, at least in terms of the interface.</text><parent_chain><item><author>swyx</author><text>i think people are underestimating the potential here for agents building - it is now a lot easier for GPT4 to call other models, or itself. while i was taking notes for our emergency pod yesterday (<a href="https:&#x2F;&#x2F;www.latent.space&#x2F;p&#x2F;function-agents" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.latent.space&#x2F;p&#x2F;function-agents</a>) we had this interesting debate with Simon Willison on just how many functions will be supplied to this API. Simon thinks it will be &quot;deep&quot; rather than &quot;wide&quot; - eg a few functions that do many things, rather than many functions that do few things. I think i agree.<p>you can now trivially make GPT4 decide whether to call itself again, or to proceed to the next stage. it feels like the first XOR circuit from which we can compose a &quot;transistor&quot;, from which we can compose a new kind of CPU.</text></item></parent_chain></comment><story><title>Native JSON Output from GPT-4</title><url>https://yonom.substack.com/p/native-json-output-from-gpt-4</url></story> |
16,669,016 | 16,668,823 | 1 | 2 | 16,668,267 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>mindslight</author><text>&gt; <i>me wonder whether we’re on — or at least near — a slippery slope.</i><p>What&#x27;s with the reservation?<p>Feel that wind in your hair? <i>We are currently flying down the slope</i>, cheered on by the pantheon of gleeful authoritarians each with their cute idea of how individuals are best controlled.<p>The <i>only</i> question is whether we&#x27;ll have a chance to stop after the centralized surveillance industry has been fully coopted for their goals, or whether the momentum will carry us all the way to oppressing the refuge of Free p2p communications.</text><parent_chain><item><author>gnicholas</author><text>Seeing this and simultaneously hearing about what YouTube is doing with certain firearm-related content makes me wonder whether we’re on — or at least near — a slippery slope.<p>I can certainly see limiting videos that are illegal (child porn) or that describe things that are illegal throughout the US (converting semiautomatic weapons into automatic).<p>But banning videos of adult pornography and showing legal firearm-related content is a different beast. A private company surely has the right to decide not to host such content, but consumers can likewise consider whether they want to do business with (including giving unfettered access to email and search queries) a company that proceeds down this slippery slope.<p>To be clear, I’m not saying we’ve slid down the slope at this point, just that we appear to be perched on&#x2F;near it.</text></item></parent_chain></comment><story><title>Sex Workers Say Porn on Google Drive Is Suddenly Disappearing</title><url>https://motherboard.vice.com/en_us/article/9kgwnp/porn-on-google-drive-error</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>scarface74</author><text>I am not pro gun by any stretch of the imagination, but when I heard YouTube was banning firearm related content it made me real uneasy. I didn&#x27;t have as much of a problem with a crack down on hate speech.<p>I know a lot of people who I would consider gun enthusiasts that wouldn&#x27;t hurt anyone unless they weren&#x27;t given a choice.</text><parent_chain><item><author>gnicholas</author><text>Seeing this and simultaneously hearing about what YouTube is doing with certain firearm-related content makes me wonder whether we’re on — or at least near — a slippery slope.<p>I can certainly see limiting videos that are illegal (child porn) or that describe things that are illegal throughout the US (converting semiautomatic weapons into automatic).<p>But banning videos of adult pornography and showing legal firearm-related content is a different beast. A private company surely has the right to decide not to host such content, but consumers can likewise consider whether they want to do business with (including giving unfettered access to email and search queries) a company that proceeds down this slippery slope.<p>To be clear, I’m not saying we’ve slid down the slope at this point, just that we appear to be perched on&#x2F;near it.</text></item></parent_chain></comment><story><title>Sex Workers Say Porn on Google Drive Is Suddenly Disappearing</title><url>https://motherboard.vice.com/en_us/article/9kgwnp/porn-on-google-drive-error</url></story> |
32,463,363 | 32,462,112 | 1 | 2 | 32,435,635 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>bastawhiz</author><text>It looks like this project has been abandoned for over a year. There&#x27;s quite a few rough edges that stand out pretty distinctly: some buttons have a pressed state, others don&#x27;t. Some controls have transitions or animations, while others which I&#x27;d expect to have transitions do not. Spacing and margins seem off (even the tiles on the Examples page). Some of the styles on the Layout documentation are broken due to specificity issues. Sizing is mixed: select boxes are very small compared to text inputs, while the switch control is absolutely massive. Most of the text is very large, but the mobile tabs&#x27; text is almost unreadably small. But this is a small personal project, it seems, and nobody is expecting high-end results.<p>But here&#x27;s the thing: the project is sponsored. Moreover, the website of the company that sponsors the project is down. Which, for a mostly-abandoned project, isn&#x27;t surprising. But if you look up Fractal Technologies online, the two employees other than the CEO have been working there for under two years. Moreover, Fractal has been a sponsor since March 2021 [0]: there have been only a handful of commits since the sponsorship began. It&#x27;s curious that an &quot;IT Services and IT Consulting&quot; company specializing in blockchain, AI, and IoT which doesn&#x27;t seem to have a website would sponsor a project which is mostly unmaintained. The more I read about the business and the employees, the more questions I have.<p>[0] <a href="https:&#x2F;&#x2F;github.com&#x2F;codedgar&#x2F;Puppertino&#x2F;commit&#x2F;e8426d11646c4b11f2371a542ce3e7df3185ee91" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;codedgar&#x2F;Puppertino&#x2F;commit&#x2F;e8426d11646c4b...</a></text><parent_chain></parent_chain></comment><story><title>Puppertino: A CSS framework based on Human Guidelines from Apple</title><url>https://github.com/codedgar/Puppertino</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>jiggywiggy</author><text>It&#x27;s a bit messy and all over the place, it&#x27;s mixing old ios and new ios. Apple in most of their own apps use filled icons in tabs and such, not the outline style. Also less of the blue gradients and more on the new trend of modern &quot;sunset&quot; type of gradients and focus on translucent backgrounds, like the dialog you added.</text><parent_chain></parent_chain></comment><story><title>Puppertino: A CSS framework based on Human Guidelines from Apple</title><url>https://github.com/codedgar/Puppertino</url></story> |
21,500,600 | 21,500,611 | 1 | 3 | 21,498,994 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>keithnz</author><text>Fax is odd, it was a fantastic thing when it first came about, and it has some desirable properties.<p>- It&#x27;s direct point to point communication (over a network)<p>- The transport network is dedicated and not open to anyone and covered by quite strong laws in many countries<p>- It&#x27;s easy to see the history of communications<p>- It&#x27;s easy to see if the other end successfully received something<p>- It&#x27;s relatively standardized and ubiquitous ( in health )<p>Email would be the closest thing, but it doesn&#x27;t have all the advantages, and the extra add ons that would make it better (like encryption, delivery receipt, digital signatures) are not standardized and&#x2F;or ubiquitous ( and often hotly argued about )<p>So fax is the lowest common denominator, that, if it was proposed today, would not be accepted for many of its disadvantages, but it&#x27;s now hard to find a way to replace it.</text><parent_chain><item><author>rubatuga</author><text>People need to stop hating on fax. Hospitals still use fax because it is a much more punishable crime to tap phone lines which requires physical access, as opposed to a server that could be infected from a hacker halfway across the world.</text></item><item><author>burnte</author><text>Healthcare CIO here. This is true. Healthcare is still using paper fax. It has a 30 year old data interchange format that no one really supports because it&#x27;s more profitable to lock in customers to your EMR. Healthcare is HORRIBLE about upgrading anything, at changing processes, and technological progress in general. Healthcare is VERY backwards from a tech standpoint.<p>Another problem is that EVERYTHING is custom, we use very, very few off the shelf solutions. Need an EMR? Let&#x27;s build it in MUMPS, a 51 year old language that originated on the PDP7 and call it a state of the art system like Epic or GE Healthcare. Don&#x27;t like the terminal interface? Let&#x27;s slap a GUI on the front that still interacts via TTY on the back end. SQL? Nah. C, C++, or any more modern language with more robust features and way more programmers? Nope.<p>Now, there are some EMRs and other healthcare-centric apps that are better written, but they&#x27;re also terrible. Healthcare is a relatively small market, you&#x27;ll never sell a million units of your app, so you charge out the wazoo for it, get a few health systems on it, and allow they to go crazy with customization to help lock them in. And then you try to add on modern security features on to a system that&#x27;s been growing for 50 years and it&#x27;s a nightmare. It&#x27;s INCREDIBLY common for nurses and doctors to need to have administrator access on their Windows desktops for various apps.<p>I was about to leave IT in general when a healthcare gig landed on me, and I&#x27;m glad it did. I find it very refreshing to be in an industry where it&#x27;s so far behind that there are mountains of problems to tackle, even if half of them are so stupid it makes me want to cry.</text></item></parent_chain></comment><story><title>Hospitals are a weak spot in U.S. cybersecurity</title><url>https://www.axios.com/hospitals-cybersecurity-medical-information-hacking-076cb826-fc69-4ba6-b3fd-57ce19ab00c6.html</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>pabs3</author><text>Fax machines are just as insecure as that server. Last year taking over a network using just a fax number was demonstrated:<p><a href="https:&#x2F;&#x2F;research.checkpoint.com&#x2F;sending-fax-back-to-the-dark-ages&#x2F;" rel="nofollow">https:&#x2F;&#x2F;research.checkpoint.com&#x2F;sending-fax-back-to-the-dark...</a></text><parent_chain><item><author>rubatuga</author><text>People need to stop hating on fax. Hospitals still use fax because it is a much more punishable crime to tap phone lines which requires physical access, as opposed to a server that could be infected from a hacker halfway across the world.</text></item><item><author>burnte</author><text>Healthcare CIO here. This is true. Healthcare is still using paper fax. It has a 30 year old data interchange format that no one really supports because it&#x27;s more profitable to lock in customers to your EMR. Healthcare is HORRIBLE about upgrading anything, at changing processes, and technological progress in general. Healthcare is VERY backwards from a tech standpoint.<p>Another problem is that EVERYTHING is custom, we use very, very few off the shelf solutions. Need an EMR? Let&#x27;s build it in MUMPS, a 51 year old language that originated on the PDP7 and call it a state of the art system like Epic or GE Healthcare. Don&#x27;t like the terminal interface? Let&#x27;s slap a GUI on the front that still interacts via TTY on the back end. SQL? Nah. C, C++, or any more modern language with more robust features and way more programmers? Nope.<p>Now, there are some EMRs and other healthcare-centric apps that are better written, but they&#x27;re also terrible. Healthcare is a relatively small market, you&#x27;ll never sell a million units of your app, so you charge out the wazoo for it, get a few health systems on it, and allow they to go crazy with customization to help lock them in. And then you try to add on modern security features on to a system that&#x27;s been growing for 50 years and it&#x27;s a nightmare. It&#x27;s INCREDIBLY common for nurses and doctors to need to have administrator access on their Windows desktops for various apps.<p>I was about to leave IT in general when a healthcare gig landed on me, and I&#x27;m glad it did. I find it very refreshing to be in an industry where it&#x27;s so far behind that there are mountains of problems to tackle, even if half of them are so stupid it makes me want to cry.</text></item></parent_chain></comment><story><title>Hospitals are a weak spot in U.S. cybersecurity</title><url>https://www.axios.com/hospitals-cybersecurity-medical-information-hacking-076cb826-fc69-4ba6-b3fd-57ce19ab00c6.html</url></story> |
715,290 | 715,331 | 1 | 2 | 715,265 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>chime</author><text>Submitter here. My cousin has not been doing too well for the past few months and so I put this project aside for now. However, a friend suggested that there might be many others who could benefit from such a tool or its derivatives.<p>This isn't a startup and I honestly don't want to treat it like a business. However, I do think it qualifies as a hack because of how it works. It uses Google Suggest in addition to a dictionary to try to guess the next word that the user is going to type. If you type WHERE, the next word is most probably going to be IS, THE, or DID. If you then select IS, the next word after WHERE IS will probably be THE or MY. KType uses this and a few such principles to make smarter, better guesses. It is not perfect but I intended to make it extremely smart and customized per user. When I was actively working on this, I had 100 ideas per day on how it could basically read the user's mind and suggest words and phrases most effectively.<p>My family and I looked at many existing systems for making typing easier but there wasn't anything out there so I decided to roll our own. As of right now, I don't know where to go with this because of my cousin's uncertain health condition. I would love to hear from medical and text hackers about developing this further.<p>Note: Currently I use Google Suggest localized for India so many of the suggestions may seem weird to non-Indian users. However, it's a simple change in URL to get localized suggestions for any country thanks to Google. Also, I wrote it for 1280x1024 resolution but it can be resized for most screen sizes.</text><parent_chain></parent_chain></comment><story><title>Share HN: I wrote an app to help my paralyzed cousin type significantly faster.</title><url>http://chir.ag/projects/ktype/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>Sam_Odio</author><text>Very cool. Feature requests:<p>- Accept keyboard input. Some users might find it easier to press a key rather than use a mouse or even a touch screen. It would enable support for stuff like this: <a href="http://www.usm.edu/ids/tlc/images/hw-ikeys.jpg" rel="nofollow">http://www.usm.edu/ids/tlc/images/hw-ikeys.jpg</a><p>- Feature a big "copy text" button so that the user might be able to use your service and paste said text somewhere else on the web.</text><parent_chain></parent_chain></comment><story><title>Share HN: I wrote an app to help my paralyzed cousin type significantly faster.</title><url>http://chir.ag/projects/ktype/</url></story> |
20,789,818 | 20,789,563 | 1 | 2 | 20,789,187 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>userbinator</author><text><i>We found that the capacitors were all in good shape with the proper capacitances. This is in contrast to modern capacitors, which often leak or fail after a few years. NASA used expensive aerospace-grade capacitors and X-rayed each one to test for faults, and this made a large difference.</i><p>That&#x27;s also because these are hermetically sealed <i>wet tantalum</i> caps, not the dry type that&#x27;s notorious for shorting out and catching fire. &quot;Wet tants&quot; are <i>very</i> expensive and you can still buy them today:<p><a href="https:&#x2F;&#x2F;www.mouser.com&#x2F;Vishay&#x2F;Passive-Components&#x2F;Capacitors&#x2F;Tantalum-Capacitors&#x2F;Tantalum-Capacitors-Wet&#x2F;HE3-Series&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.mouser.com&#x2F;Vishay&#x2F;Passive-Components&#x2F;Capacitors&#x2F;...</a><p><i>We were somewhat surprised that both power supplies worked flawlessly after 50 years.</i><p>I&#x27;m not all that surprised, actually --- but perhaps that&#x27;s because I&#x27;ve seen plenty of videos on YouTube of more mundane equipment, like vehicles and appliances, coming back to life after several decades of storage or exposure to the elements with minimal repairs, so for a clearly high-reliability component like this AGC PSU to work is almost expected.</text><parent_chain></parent_chain></comment><story><title>Apollo Guidance Computer switching power supply works after 50 years</title><url>http://www.righto.com/2019/08/reliable-after-50-years-apollo-guidance.html</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>jacquesm</author><text>That is beautiful work, the <i>welded</i> connections are really impressive. Obviously they had to take into account massive forces, vibration and possibly impact damage, but still, to see components welded in place is something I&#x27;ve never seen before, not even in very high end HF power electronics.<p>&gt; The AGC that we&#x27;re restoring belongs to a private owner who picked it up at a scrapyard in the 1970s after NASA scrapped it.<p>That is one lucky find. Imagine that it had <i>not</i> been found and scrapped for its metal value. The mind boggles at the potential destruction of such a historical artifact.<p>&gt; the cordwood components are mounted differently from the other cordwood modules.<p>For those from cities who have never seen cordwood:<p>Cordwood is a stack of wood of short length seen from the endgrain, typically used when referring to firewood but also sometimes used in construction.</text><parent_chain></parent_chain></comment><story><title>Apollo Guidance Computer switching power supply works after 50 years</title><url>http://www.righto.com/2019/08/reliable-after-50-years-apollo-guidance.html</url></story> |
21,966,128 | 21,962,228 | 1 | 3 | 21,961,562 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>doodliego</author><text>This guy is putting customers first, which is the exact opposite of most UX design philosophies I&#x27;ve been on the receiving end of. The entire discipline prioritizes minimalism, copying Apple, and making random changes to the interface just so they have &quot;accomplished&quot; something, which is how you get randomly broken messes like Youtube.<p>If UX designers made a gas pump, it would be a featureless white pillar with a single button and a hose and it wouldn&#x27;t work.</text><parent_chain><item><author>dmix</author><text>&gt; Even the handles on the gas pumps get buffed down regularly so that “the customer does not put his hand on something dirty,” he says<p>This is what most UX designers do for a living. They think about the small details which get overlooked while everyone is in a rush to build out x feature&#x2F;functionality.<p>It&#x27;s what creates emotional connections to products and services which builds strong customer loyalty and helps word of mouth.<p>Just like how they used to know your name at your local small grocery store, those intimate details go a long way. And in commoditized situations people are willing to spend more time&#x2F;money or go out of their way to use your product.<p>Dan Norman talks a lot about this in his &quot;Emotional Design&quot; book. It&#x27;s the design stuff that goes beyond merely functionality and most efficient problem solving (ie, obsessing about fewest clicks to do x, instead of the wider experience where adding a communication step might improve the emotional experience).<p>But often it is a luxury for many smaller firms struggling to just get the functionality part right, which is why this person buying up gas stations, providing time and capital, and giving them the attention they needed is working so well.</text></item></parent_chain></comment><story><title>A former Egyptian engineer found the secret to building a big gas-station chain</title><url>https://www.seattletimes.com/business/local-business/station-master-how-an-engineer-from-egypt-built-one-of-the-biggest-gas-station-chains-in-the-northwest/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>cushychicken</author><text>&gt;Just like how they used to know your name at your local small grocery store, those intimate details go a long way. And in commoditized situations people are willing to spend more time&#x2F;money or go out of their way to use your product.<p>Additionally - it also shows how there are things that you never expect that have a positive impact. Suggests to me that there are <i>so many</i> factors that affect people&#x27;s product choices, and that many of the factors that drive a certain choice are not fully understood by either the buyer or the seller.</text><parent_chain><item><author>dmix</author><text>&gt; Even the handles on the gas pumps get buffed down regularly so that “the customer does not put his hand on something dirty,” he says<p>This is what most UX designers do for a living. They think about the small details which get overlooked while everyone is in a rush to build out x feature&#x2F;functionality.<p>It&#x27;s what creates emotional connections to products and services which builds strong customer loyalty and helps word of mouth.<p>Just like how they used to know your name at your local small grocery store, those intimate details go a long way. And in commoditized situations people are willing to spend more time&#x2F;money or go out of their way to use your product.<p>Dan Norman talks a lot about this in his &quot;Emotional Design&quot; book. It&#x27;s the design stuff that goes beyond merely functionality and most efficient problem solving (ie, obsessing about fewest clicks to do x, instead of the wider experience where adding a communication step might improve the emotional experience).<p>But often it is a luxury for many smaller firms struggling to just get the functionality part right, which is why this person buying up gas stations, providing time and capital, and giving them the attention they needed is working so well.</text></item></parent_chain></comment><story><title>A former Egyptian engineer found the secret to building a big gas-station chain</title><url>https://www.seattletimes.com/business/local-business/station-master-how-an-engineer-from-egypt-built-one-of-the-biggest-gas-station-chains-in-the-northwest/</url></story> |
22,758,268 | 22,758,443 | 1 | 2 | 22,758,227 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>stupandaus</author><text>Building on my analysis from last week:<p>1. This week&#x27;s 6.6M new jobless claims represents ~4% of the estimated ~160-165M US Workforce.<p>2. This is incremental to the 3.3M new jobless claims filed week ending 3&#x2F;21, totaling ~10M total jobless claims in the past 2 weeks.<p>3. The US unemployment rate was ~3.5% as of EOM February [1], so cumulatively that means we&#x27;ve hit ~10% unemployment as of EOW 3&#x2F;28 (~10M incremental jobless claims = ~6%). That number is likely low and continuing to increase, as new jobless claims do not account for gig workers and many state unemployment sites have been inundated by these claims resulting in site crashes and people unable to file claims. In addition, layoffs have almost certainly continued between 3&#x2F;28 and today.<p>4. The consensus estimate for this week&#x27;s jobless claims was ~3.76M jobless claims, and the 6.6M actual claims blow the consensus estimate out of the water. That said, some analysts such as Goldman Sachs had estimated ~5.5M joblesss claims. Goldman Sachs estimates that unemployment will peak at ~15%. [2]<p>[1] <a href="https:&#x2F;&#x2F;data.bls.gov&#x2F;timeseries&#x2F;LNS14000000" rel="nofollow">https:&#x2F;&#x2F;data.bls.gov&#x2F;timeseries&#x2F;LNS14000000</a><p>[2] <a href="https:&#x2F;&#x2F;www.cnbc.com&#x2F;2020&#x2F;03&#x2F;31&#x2F;coronavirus-update-goldman-sees-15percent-jobless-rate-followed-by-record-rebound.html" rel="nofollow">https:&#x2F;&#x2F;www.cnbc.com&#x2F;2020&#x2F;03&#x2F;31&#x2F;coronavirus-update-goldman-s...</a></text><parent_chain></parent_chain></comment><story><title>Additional 6.6M File for Initial Unemployment Benefits [pdf]</title><url>https://www.dol.gov/ui/data.pdf</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>PragmaticPulp</author><text>Unemployment benefits have been significantly expanded under the Coronavirus aid bill. The benefit amounts will sound small if you&#x27;re living in an expensive city like SF or Seattle, but $600&#x2F;week from the federal government and a similar amount from state unemployment insurance means that unemployment benefits can pay up to an equivalent of $50-60K&#x2F;year right now. That goes a long way in most parts of the country, especially when you&#x27;re stuck at home. Of course companies are going to opt to shift people to unemployment benefits while they&#x27;re forced into downtime.<p>In some situations, people can actually earn <i>more</i> from unemployment benefits by being laid off due to some hasty oversights in the aid package (Reference: <a href="https:&#x2F;&#x2F;www.cnbc.com&#x2F;2020&#x2F;03&#x2F;27&#x2F;how-unemployed-workers-could-get-more-than-100percent-of-their-paycheck.html" rel="nofollow">https:&#x2F;&#x2F;www.cnbc.com&#x2F;2020&#x2F;03&#x2F;27&#x2F;how-unemployed-workers-could...</a> ). This doesn&#x27;t account for lost benefits or the risk involved in losing a job, but it could disincentivize people returning to work if it means their income will go down.<p>Of the many people I know who have been “laid off”, all of them have been told they’ll be first in line to be re-hired the moment quarantine ends.<p>If a business can’t make money, it makes more sense for them to let employees collect unemployment during the downtime than to overextend the business’s balance sheet. During normal times, this is a common tactic for seasonal businesses. I have friends in seasonal tourism industries who received training on applying for unemployment benefits during their annual off-season layoffs each year. They even have an explicit system for tracking seniority in the re-hires.<p>Of course, the longer this quarantine lasts, the more likely their businesses are to disappear before they can re-open. Unfortunately we won’t know this number for many months. For now, the initial unemployment claims number can&#x27;t discriminate between jobs that have been temporarily paused and jobs that have been eliminated.</text><parent_chain></parent_chain></comment><story><title>Additional 6.6M File for Initial Unemployment Benefits [pdf]</title><url>https://www.dol.gov/ui/data.pdf</url></story> |
16,919,298 | 16,918,762 | 1 | 3 | 16,918,003 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>joostdevries</author><text>We&#x27;ve been using mobx-state-tree too. What I like is that it&#x27;s easier to gain an understanding of the moving parts of my application; how actions, derived data and data work together. On the other hand the support for Typescript is a bit clunky and leads to slow compilation. Mitigating the compile time leads to a bit of boiler plate.</text><parent_chain><item><author>ralusek</author><text>I&#x27;ve been using mobx-state-tree for the latest couple of projects after Redux. I like them both, but I prefer mobx-state-tree for a handful of reasons.<p>1.) There is an immutable data store with action-driven changelog, just like Redux.<p>2.) The immutability of the data store is baked in and enforced. The necessity to provide changes to the data store within an action is baked in and enforced.<p>3.) Having actions baked in as methods rather than having to create &quot;action creators which in turn dispatch actions&quot; is a nice reduction in boilerplate.<p>4.) Being able to add action listeners AND state listeners are baked in, and can be done at any level of the state&#x27;s depth. To watch state changes in redux, for global changes not related to a particular component, I had to write:
<a href="https:&#x2F;&#x2F;github.com&#x2F;ralusek&#x2F;redux-store-watch" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;ralusek&#x2F;redux-store-watch</a><p>5.) Mobx&#x27;s observers on react render methods makes the renders far more efficient than what could be achieved with react-redux easily, without really ensuring that the props being passed in are as granular as necessary or shouldComponentUpdate is correctly identifying state changes. In mobx, the most granular access of the lowest level state can be detected within a render method, and only when that very specific value is replaced is the component rendered.<p>6.) Computed values on mobx-state-tree are baked in without the need for something like reselect<p>I like Redux, I enjoy working on projects that use it, but I think that I think I&#x27;d have to admit that I prefer mobx-state-tree.</text></item></parent_chain></comment><story><title>Redux – Not Dead Yet</title><url>http://blog.isquaredsoftware.com/2018/03/redux-not-dead-yet/</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>johnwheeler</author><text>React ecosystem noob here. To point #5, I remember reading that MST has some overhead over Mobx, does it come into play with these renders?</text><parent_chain><item><author>ralusek</author><text>I&#x27;ve been using mobx-state-tree for the latest couple of projects after Redux. I like them both, but I prefer mobx-state-tree for a handful of reasons.<p>1.) There is an immutable data store with action-driven changelog, just like Redux.<p>2.) The immutability of the data store is baked in and enforced. The necessity to provide changes to the data store within an action is baked in and enforced.<p>3.) Having actions baked in as methods rather than having to create &quot;action creators which in turn dispatch actions&quot; is a nice reduction in boilerplate.<p>4.) Being able to add action listeners AND state listeners are baked in, and can be done at any level of the state&#x27;s depth. To watch state changes in redux, for global changes not related to a particular component, I had to write:
<a href="https:&#x2F;&#x2F;github.com&#x2F;ralusek&#x2F;redux-store-watch" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;ralusek&#x2F;redux-store-watch</a><p>5.) Mobx&#x27;s observers on react render methods makes the renders far more efficient than what could be achieved with react-redux easily, without really ensuring that the props being passed in are as granular as necessary or shouldComponentUpdate is correctly identifying state changes. In mobx, the most granular access of the lowest level state can be detected within a render method, and only when that very specific value is replaced is the component rendered.<p>6.) Computed values on mobx-state-tree are baked in without the need for something like reselect<p>I like Redux, I enjoy working on projects that use it, but I think that I think I&#x27;d have to admit that I prefer mobx-state-tree.</text></item></parent_chain></comment><story><title>Redux – Not Dead Yet</title><url>http://blog.isquaredsoftware.com/2018/03/redux-not-dead-yet/</url></story> |
15,301,952 | 15,299,877 | 1 | 3 | 15,299,165 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>coldtea</author><text>&gt;<i>Which is unhelpful for the cases where the developers no longer have any interest in their apps or even exist (bankrupt, disbanded, in some cases deceased)</i><p>If they are &quot;bankrupt, disbanded, in some cases deceased&quot; then maybe insisting on using those apps are not the best course for the user either...</text><parent_chain><item><author>0x0</author><text>Nope, so this is going to be interesting to watch. Personally I was hoping that they would offer an optional download of 32bit support libraries to let iOS11 users run important existing legacy apps and access their documents, but they seem to push hard on making developers get in line and update their apps. Which is unhelpful for the cases where the developers no longer have any interest in their apps or even exist (bankrupt, disbanded, in some cases deceased)</text></item><item><author>walterbell</author><text>Have they previously had an app transition like 32-bit &#x2F; 64-bit, where some users cannot upgrade?</text></item><item><author>0x0</author><text>Highly unlikely, I don&#x27;t think Apple has ever released multiple branches of updates for any device. The closest is perhaps iOS 6.1.6, a fix for the fatal &quot;gotofail&quot; SSL vulnerability, which was pushed out to devices stuck on iOS 6.x, but if your device was eligible for iOS7 then iOS7(.0.6) was what you would get.<p>That&#x27;s also the only time I can remember security updates being pushed after a device model being end-of-life&#x27;d.</text></item><item><author>walterbell</author><text>Is this going to be fixed in iOS 10? Some users have apps which will not work with iOS 11, so cannot immediately upgrade.</text></item></parent_chain></comment><story><title>Apple: Heap Overflow in AppleBCMWLANCore Driver</title><url>https://bugs.chromium.org/p/project-zero/issues/detail?id=1302</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>scarface74</author><text>What legacy apps worth keeping “documents” for - I’m assuming non game apps — would be worth supporting? The chances are even if they did provide support for 32 bit abandoned apps, they would break sooner or later with a future OS upgrade.<p>Besides are you planning on keeping the same IOS device forever? The newest processors are 64 bit only. I doubt that Apple will ever release a new device that will support 32 bit devices - except for maybe a new iPod Touch or iPhone SE.</text><parent_chain><item><author>0x0</author><text>Nope, so this is going to be interesting to watch. Personally I was hoping that they would offer an optional download of 32bit support libraries to let iOS11 users run important existing legacy apps and access their documents, but they seem to push hard on making developers get in line and update their apps. Which is unhelpful for the cases where the developers no longer have any interest in their apps or even exist (bankrupt, disbanded, in some cases deceased)</text></item><item><author>walterbell</author><text>Have they previously had an app transition like 32-bit &#x2F; 64-bit, where some users cannot upgrade?</text></item><item><author>0x0</author><text>Highly unlikely, I don&#x27;t think Apple has ever released multiple branches of updates for any device. The closest is perhaps iOS 6.1.6, a fix for the fatal &quot;gotofail&quot; SSL vulnerability, which was pushed out to devices stuck on iOS 6.x, but if your device was eligible for iOS7 then iOS7(.0.6) was what you would get.<p>That&#x27;s also the only time I can remember security updates being pushed after a device model being end-of-life&#x27;d.</text></item><item><author>walterbell</author><text>Is this going to be fixed in iOS 10? Some users have apps which will not work with iOS 11, so cannot immediately upgrade.</text></item></parent_chain></comment><story><title>Apple: Heap Overflow in AppleBCMWLANCore Driver</title><url>https://bugs.chromium.org/p/project-zero/issues/detail?id=1302</url></story> |
19,142,204 | 19,141,166 | 1 | 2 | 19,140,360 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>trulyrandom</author><text>It&#x27;s kind of ridiculous that my Google Nexus 5X, which was released just over 3 years ago, will not receive updates to patch vulnerabilities like this anymore.</text><parent_chain></parent_chain></comment><story><title>Android Phones Can Be Hacked Remotely by Viewing Malicious PNG Image</title><url>https://source.android.com/security/bulletin/2019-02-01.html</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>fulafel</author><text>If you follow the monthly Android Security Bulletin, there has been a long stream fixes for remote-code-execution vulnerablities in codec implementations. It got big in 2015 when the Stagefright branded vulnerability got some publicity, and they continued testing &amp; have continued to fix an endless stream of codec vulns ever since.<p>There was also a Bluetooth RCE in this month&#x27;s bulletin. And in November there was yet another round of WiFi pwnage, this time in Qualcomm WiFi (CVE-2018-11905). It&#x27;s all quite bad.</text><parent_chain></parent_chain></comment><story><title>Android Phones Can Be Hacked Remotely by Viewing Malicious PNG Image</title><url>https://source.android.com/security/bulletin/2019-02-01.html</url></story> |
26,072,235 | 26,072,472 | 1 | 2 | 26,070,262 | train | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>ac29</author><text>In a perfect world, maybe there would be unlimited budgets for small rural water districts to have 24&#x2F;7 onsite staff and run highly secured networks.<p>I regularly work with these sorts of water districts (larger, better funded ones as well). In reality, some of these small districts may only have 2 or 3 SCADA operators on staff. Sending them home with a pager, a tablet, a VPN password, and some overtime pay is a lot easier to get past the city council then taking on another two employees to cover the night shift for those rare events that need to be handled ASAP.<p>I could share some real horror stories, but it wouldnt be professionally appropriate. Suffice to say, this story did not surprise me at all.</text><parent_chain><item><author>rsync</author><text>&quot;Internet-accessble industrial control systems have been a problem for many years now ...&quot;<p>They are a problem the way drunk driving is a problem.<p>You just don&#x27;t ever do it. Ever.<p>No cyber security products are needed. No budget required.<p>These &quot;startups in the ICS space&quot; are like turbotax&#x2F;HRBlock: only continued idiocy allows their business model to exist.</text></item><item><author>achillean</author><text>Internet-accessble industrial control systems have been a problem for many years now. It&#x27;s a documented issue but it&#x27;s difficult to fix for a variety of reasons:<p>1. Difficult to identify the owner: a lot of the devices are on mobile networks that don&#x27;t point to an obvious owner.<p>2. Unknown criticality: is it a demo system or something used in production?<p>3. Security budget: lots of smaller utilities don&#x27;t have a budget for buying cyber security products.<p>4. Uneducated vendor: sometimes the vendors of the device give very bad advice (<a href="https:&#x2F;&#x2F;blog.shodan.io&#x2F;why-control-systems-are-on-the-internet&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.shodan.io&#x2F;why-control-systems-are-on-the-intern...</a>)<p>That being said, based on the numbers in Shodan the situation has improved over the past decade. And there&#x27;s been a large resurgence of startups in the ICS space (ex <a href="https:&#x2F;&#x2F;www.dragos.com" rel="nofollow">https:&#x2F;&#x2F;www.dragos.com</a>, <a href="https:&#x2F;&#x2F;www.gravwell.io" rel="nofollow">https:&#x2F;&#x2F;www.gravwell.io</a>). Here&#x27;s a current view of exposed industrial devices on the Internet:<p><a href="https:&#x2F;&#x2F;beta.shodan.io&#x2F;search&#x2F;report?query=tag%3Aics&amp;title=Industrial%20Control%20Systems%20Overview" rel="nofollow">https:&#x2F;&#x2F;beta.shodan.io&#x2F;search&#x2F;report?query=tag%3Aics&amp;title=I...</a><p>I&#x27;ve written&#x2F; presented on the issue a few times:<p><a href="https:&#x2F;&#x2F;blog.shodan.io&#x2F;taking-things-offline-is-hard&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.shodan.io&#x2F;taking-things-offline-is-hard&#x2F;</a><p><a href="https:&#x2F;&#x2F;blog.shodan.io&#x2F;trends-in-internet-exposure&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.shodan.io&#x2F;trends-in-internet-exposure&#x2F;</a><p><a href="https:&#x2F;&#x2F;exposure.shodan.io&#x2F;#&#x2F;" rel="nofollow">https:&#x2F;&#x2F;exposure.shodan.io&#x2F;#&#x2F;</a></text></item></parent_chain></comment><story><title>Hacker increased chemical level at Oldsmar's city water system, sheriff says</title><url>https://www.wtsp.com/article/news/local/pinellascounty/pinellas-oldsmar-water-system-computer-intrustion/67-512b2bab-9f94-44d7-841e-5169fdb0a0bd</url></story> | <instructions>Your goal is to analyze the following comment and estimate how highly it will be upvoted by the Hacker News community.</instructions><comment><author>crystalmeph</author><text>I work in industrial automation, and I agree. There’s constant rhetoric about buzzwords like “Industry 4.0,” which, if it means anything specifically, means “connect all the things.”<p>There doesn’t seem to be a whole lot of thought around “is it even necessary for this three-ton industrial robot to be dynamically reprogrammed from a service center in Stockholm,” and it seems like everyone just assumes that everyone else will do a perfect job implementing and configuring security. I fear the tune will only change after the first multi-million dollar lawsuit, and I hope all that costs is the money.</text><parent_chain><item><author>rsync</author><text>&quot;Internet-accessble industrial control systems have been a problem for many years now ...&quot;<p>They are a problem the way drunk driving is a problem.<p>You just don&#x27;t ever do it. Ever.<p>No cyber security products are needed. No budget required.<p>These &quot;startups in the ICS space&quot; are like turbotax&#x2F;HRBlock: only continued idiocy allows their business model to exist.</text></item><item><author>achillean</author><text>Internet-accessble industrial control systems have been a problem for many years now. It&#x27;s a documented issue but it&#x27;s difficult to fix for a variety of reasons:<p>1. Difficult to identify the owner: a lot of the devices are on mobile networks that don&#x27;t point to an obvious owner.<p>2. Unknown criticality: is it a demo system or something used in production?<p>3. Security budget: lots of smaller utilities don&#x27;t have a budget for buying cyber security products.<p>4. Uneducated vendor: sometimes the vendors of the device give very bad advice (<a href="https:&#x2F;&#x2F;blog.shodan.io&#x2F;why-control-systems-are-on-the-internet&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.shodan.io&#x2F;why-control-systems-are-on-the-intern...</a>)<p>That being said, based on the numbers in Shodan the situation has improved over the past decade. And there&#x27;s been a large resurgence of startups in the ICS space (ex <a href="https:&#x2F;&#x2F;www.dragos.com" rel="nofollow">https:&#x2F;&#x2F;www.dragos.com</a>, <a href="https:&#x2F;&#x2F;www.gravwell.io" rel="nofollow">https:&#x2F;&#x2F;www.gravwell.io</a>). Here&#x27;s a current view of exposed industrial devices on the Internet:<p><a href="https:&#x2F;&#x2F;beta.shodan.io&#x2F;search&#x2F;report?query=tag%3Aics&amp;title=Industrial%20Control%20Systems%20Overview" rel="nofollow">https:&#x2F;&#x2F;beta.shodan.io&#x2F;search&#x2F;report?query=tag%3Aics&amp;title=I...</a><p>I&#x27;ve written&#x2F; presented on the issue a few times:<p><a href="https:&#x2F;&#x2F;blog.shodan.io&#x2F;taking-things-offline-is-hard&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.shodan.io&#x2F;taking-things-offline-is-hard&#x2F;</a><p><a href="https:&#x2F;&#x2F;blog.shodan.io&#x2F;trends-in-internet-exposure&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.shodan.io&#x2F;trends-in-internet-exposure&#x2F;</a><p><a href="https:&#x2F;&#x2F;exposure.shodan.io&#x2F;#&#x2F;" rel="nofollow">https:&#x2F;&#x2F;exposure.shodan.io&#x2F;#&#x2F;</a></text></item></parent_chain></comment><story><title>Hacker increased chemical level at Oldsmar's city water system, sheriff says</title><url>https://www.wtsp.com/article/news/local/pinellascounty/pinellas-oldsmar-water-system-computer-intrustion/67-512b2bab-9f94-44d7-841e-5169fdb0a0bd</url></story> |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.