What are the most upvoted users of Hacker News commenting on? Powered by the /leaders top 50 and updated every thirty minutes. Made by @jamespotterdev.
Pity that the phones, tablets and major OSes are basically owned by foreign powers.
One way to complain, https://european-union.europa.eu/contact-eu/write-us_en
No smartphnone and dependent on two US companies, is there an official complaint form?
EDIT: A possible way, https://european-union.europa.eu/contact-eu/write-us_en
Obvious reminder that anybody can publish an Internet-Draft.
and a rare Motorola SC02SH007DK04 graphics chip. As far as I know, no datasheet or detailed documentation for that chip has survived, so its exact features are still unknown
The "SC" prefix indicates a custom chip that Motorola made for someone else - in this case Compaq. A quick search of the Internet shows that it's an SVGA-class card with a blitter and hardware cursor. Here's some register-level docs:
https://flint.cs.yale.edu/cs422/readings/hardware/vgadoc/COM...
BK's page is also completely unusable without JS. It's an "appsite", not a website.
McD's is readable with JS off, because the "meat" of the content is plain HTML. I also like how the other links here are to URLs of the form "/en/products/nnnn", which further reinforces the fact that the pages are server-side.
The 90s were so glorious. You could plug SRAM chips into sockets on the motherboard! Today, we're sheeple content with our soldered-down RAM and cricket flour cookies.
I can say I have seen a lot of cases where someone who was flagrantly guilty of abuse complained loudly that their account at some big tech company was unfairly canceled. I cannot say that's what is going on here, and I can also say I've seen plenty of cases where it was unfair and there was no due process.
There is a very fine line between dumb and provacative.
I'm kind of curious how long it will be before people start publishing copyrighted works on the TrumpCoin block chain. :-)
Just give them computers already...
What is with this BS idea of medieval jail conditions...
ROFL because there is no danger that I'm going to spend any time watching shorts. If they put some limit on other videos now that might be relevant... but shorts are just taking up real estate on the screen which could be filled with content I might engagement. I want to say it is like picking their shareholder's pockets except nobody profits from the existence of shorts in any way.
I, too, mark all positives and negatives obsessively, but still get the same obvious spam in my inbox too often for my liking. Still, though, I love Fastmail.
> and in the end it looks so similar to the other one:
Maybe if you are looking at it in a monospaced environment like the HN edit window; rendered in a proportional font, hyphens, en-dashes, and em-dashes are quite distinct from eachother.
> It's no surprise humans barely use them. Then why did it get picked up so much by AIs?
It got picked up by AIs because their training corpus includes plenty of professionally published work, not just informal, off-the-cuff communication, and professionally published work uses typographic dashes (em-dashes, en-dashes, and even 2-em- and 3-em-dashes) extensively. (3-em less so in newer works, it having, e.g., dropped out of the recommendations of the Chicago Manual of Style as of 2024.)
I'm very curious about this.
Google knows users care about their privacy, and it made the promise in its terms precisely for that reason. People pay attention to this stuff, as the popularity of this story shows.
Therefore, it's generally not going to be in Google's interest to break its own terms.
So what's going on? Did a Google employee simply mess up? Is the reporting not accurate or missing key details, e.g. Google truly is legally prohibited? Or is there some evidence that the Trump administration was putting pressure on Google, e.g. threatening to withhold some contract if this particular person were notified, or if Google continued notifying users belonging to some particular category of subpoenas?
Because Google isn't breaking its own terms just for funsies. There's more to this story, but unfortunately it's not clear what.
How is it picking the comments?
If it's all comments, including flagged/dead/downvoted/etc., then it's not reflective of the actual filtering HN does.
But if it's weighting comments by their likelihood of being read -- e.g. mostly top comments on popular stories -- then I'd be a lot more curious.
I'm not surprised AI spam has increased substantially. But I'd be surprised if it's affected the comments most people actually read to anywhere close to the degree shown in this graph.
Some of them, it seems like it could be to show the sauce more clearly:
https://www.mcdonalds.co.jp/en/products/4530/
But others, it's just inexplicable:
https://www.mcdonalds.co.jp/en/products/1010/
Burger King isn't doing this though (close the two popups to see the menu):
https://www.burgerking.co.jp/menu
Is it some kind of trendy style? It does feel kinda... cute.
This doesn't change things much, besides making domain name registration more difficult, but I continue to think this Spotify thing was a really dumb move on the part of Anna's Archive.
AA is providing a valuable service to tons of people who don't have access to these books otherwise. There's a strong argument to be made for the moral goodness of that -- that even if it's illegal, it's at least in the spirit of a public library. And they want to potentially jeopardize that to... release a bunch of music tracks, that are just entertainment and mostly widely available on YouTube already anyways? Major misstep.
Like, even if the same people are proud of scraping all these tracks and want to release them... at least do it under the name of a totally separate project? A separate domain, or just describe it and post the torrents somewhere else? Don't tie it to the AA site or identity. Don't tie things together when it creates no more benefit but does create more risk.
Is an external range extender feasible? Especially for a tuck, a tank and generator running on the flatbed would seem cheaper and more efficient than an integrated unit.
Not to mention an attacker motivated by financial gain doesn't even need a particular targer defender. One/any found available will do.
Give each brand a quota. 100,000 cars a year, or something. Enough to give Americans a taste of the competition. But not enough to suffocate domestic manufacturers.
If stolen via a crypto rugpull, it wasn't his to give to begin with.
> If you're trading, like, oil futures or wheat futures or whatever, you are likely doing so specifically because you have inside information about your business needs
Insider trading, in the U.S., is not legally about fairness but about theft. A firm hedging its own positions is using its information for its own purposes. A federal employee trading on what they heard is abusing the trust placed in them by the American people.
> A respectable software provider should warn you about this kind of behaviour at install time, and give you the opportunity to opt out
They honestly only need to disclose. Requiring contribution as part of the social contract is perfectly okay—if someone disagrees, they don’t get to use Gas Town.
Range extenders are not new. The BMW i3 could be equipped with one (which was loud and didn’t do much).
What influence does Vanguard or Blackrock have in corporate governance? They’re just vehicles for old peoples’ retirement funds. They’re not polling strings in corporate mergers.
Consolidation over the last 30 years is the fault of folks here on HN. Information technology moves the equilibrium point between economies of scale and diseconomies of scale. It enables huge companies to operate efficiently. That enables them to leverage their scale to deliver better services and cheaper prices.
Consider Amazon. Everyone loves to hate on Amazon, but they’re doing it while adding stuff to the delivery they already have coming tomorrow. Why can Amazon ship me stuff overnight, whereas it used to take a week back in the 1990s? It’s not the internet per se. You could call in or fax orders back in the day—it still took a week. And delivery is being done using the same planes and trucks we have been using for decades. Amazon happened because technology enabled it to completely restructure the entire warehousing and delivery vertical, rendering a huge swath of the economy obsolete.
That’s happening all over the place. Most of these mom and pop businesses suck. They have shitty service, high prices, limited selection, etc. The big companies are better and IT enables them to scale in ways that were impossible before.
> Requiring remote attestation on all internet-connected devices
Is that what this bill requires? If it’s just remote attenuation for social media, done by the OS, I think that’s fine.
A fact is a statement about past. A bet is contingent on the future.
Insiders can change the facts.
I've said for decades that, in principle, cybersecurity is advantage defender. The defender has to leave a hole. The attackers have to find it. We just live in a world with so many holes that dedicated attackers rarely end up bottlenecked on finding holes, so in practice it ends up advantage attacker.
There is at least a possibility that a code base can be secured by a (practically) finite number of tokens until there is no more holes in it, for reasonable amounts of money.
This also reminds me of what I wrote here: https://jerf.org/iri/post/2026/what_value_code_in_ai_era/ There's still value in code tested by the real world, and in an era of "free code" that may become even more true than it is now, rather than the initially-intuitive less valuable. There is no amount of testing you can do that will be equivalent to being in the real world, AI-empowered attackers and all.
I've seen quite a few artists opposed to it.
Quick example: https://www.instagram.com/p/DWWlQS-Dhj7/
It looks like it, but it isn't. It's the work itself that's valued in software security, not the amount of it you managed to do. The economics are fundamentally different.
Put more simply: to keep your system secure, you need to be fixing vulnerabilities faster than they're being discovered. The token count is irrelevant.
Moreover: this shift is happening because the automated work is outpacing humans for the same outcome. If you could get the same results by hand, they'd count! A sev:crit is a sev:crit is a sev:crit.
"I am giving every cent of that crypto money to charity" - https://twitter.com/Steve_Yegge/status/2044114434348724351
This assumes that the relationship between "LLM tokens spent" and "vulnerabilities found" doesn't plateau, though.
Relevant Tony Hoare quote: “There are two approaches to software design: make it so simple there are obviously no deficiencies, or make it so complex there are no obvious deficiencies”.
Oh no, I remember those browser games, I will stay well away from them because they're the kind of thing that I will play for a month straight otherwise.
It's fine. We can't have it both ways. I prefer bad grammar to Claude blandness, so I think the author should just write how they write.
Is the datacenter going ahead? Who is building it and who is principally using it?
Has the state AG commented on this?
There's no mechanism for pressing politicians except threatening not to vote for them again, and politicians are exceptionally cowardly and avoid picking up hot potatoes that could incur criticism. I'm in a district with one of the safest seats in the country, and getting my representative to state a position on many issues is like getting blood out of a stone.
There's no formal mechanism of accountability for members of Congress. Representatives hold a few town halls a year where they might be subject to social shaming by their constituents, but there's no legal obligation to do so and even when they're publicly embarrassed they often dismiss public opposition as 'a few paid agitators' or the like.
This is doubly and triply true for complex policy issues which require a lot of explaining, making it virtually impossible to build grassroots support. So you just end up with a nonprofit industrial complex that needs to constantly raise funds for lobbying and publishes slates of endorsements at election time that relatively few people have the time or inclination to read.
So does talking to uninformed people. The size of the group is inversely correlated with deviation from the mean (of IQ, productivity, or whatever proxy for cognitive capability you care to specify).
I'm not sure why this is at the top of the page; it's not that it's wrong, it's just a sequence of truisms.
I get that people like this guy's blog but seeing every single article posted here daily smacks of astroturfing.
Also public employees.
Although there are many trends of Dunwoody PD officers and staff monitoring the live view cameras on the JCC’s fitness studios, gyms, and pools [...]
I doubt this aligns with any guidelines on effective crime prevention.
Make sure that all your wall outlets in the area are actually grounded. Get an outlet tester at a hardware store and check. They cost about $10. Good first step. There are sometimes 3-prong outlets where the ground connection is not connected, especially in older buildings. This is an electrical code violation, so if there's a landlord involved, get them to fix it.
Laptop plus external monitor is an interesting case. The monitor should be grounded via its power plug, but the laptop's ground may be floating. Not sure about the grounding path for Apple laptops. Attempts to find info on laptop grounding online are returning AI slop. If everything is running off 2-prong plug external power supplies, there may not be any grounding.
Get the room humidity above 40% and most static effects will disappear. The water in the air grounds them out. That's often the easiest solution.
There are electrostatic field meters. Halfway decent ones start around US$150. I used to have a surplus store field detector on my desk when assembling electronics. It would squawk if the field level got high. Wearing a wrist strap would shut it up. With a meter, you stop guessing. This isn't mysterious, just something that needs instrumentation to chase down.
The chair chain is good, but make sure that the shiny enameled chain and the floors are actually conductive.
I use the "Windows App" on iPad to remote desktop into my Windows computer. Works fine despite my computer being on the wrong side of an ADSL connection, it's great for my work computer which has a much faster connection.
For extended use a $5 plastic clip from AMZN and any bluetooth mouse and keyboard works great, as good as a laptop and sleeker too if I am working on a desk. I can do simple things with just touch while riding the bus, sitting at the beach, etc.
What they meant is "freedom to say slurs", not "freedom of LGBT books in school libraries"
It probably is done in hardware; I expect you'll end up with the TX side of the Mac/phy powered down but all the receive running. Miliamps at most.
If I want to release a native app ASAP, I would chose .NET, Delphi, C++ Builder, Qt,...
If it has to be Web stack, it would be hosted somewhere and delivered as a proper Web application.
It was a product of its time I guess, much better ones from similar vintage,
The Tiger book (with C, Standard ML, and Java variants)
https://www.cs.princeton.edu/~appel/modern/
Compiler Design in C (freely available nowadays, beware this is between K&R C and C89)
lcc, A Retargetable Compiler for ANSI C
Or if one wants to go with more clever stuff,
Compiling with Continuations
Lisp in Small Pieces
Homes might be an exception, I don't know, but I'm of the impression it's routine for police to get physical search warrants with nondisclosure orders attached.
You have managed to conjure a definition of "gambling" that excludes casino blackjack.
All you have to do is prompt your AI with a writing sample. I generally give it something I wrote from my blog. It still doesn't write like I do and it seems to take more than that to get rid of the emdashes, but it at least kicks it out of "default LLM" and is generally an improvement.
The one that gets me a lot, which is similar in practice to your point, is when I need server redundancy, even if one server is otherwise plenty for my task. As soon as I'm not running in one place, you need network data storage, and that kicks pretty hard in the direction of a network-accessible database. S3 works sometimes and the recent work on being able to atomically claim files has helped with some of the worst rough edges but it still doesn't take a lot to disqualify it, at least as the only store.
I simply assume that everything that travels out of my home through a wire gets tracked and stored by the government.
Everywhere you go, if your phone is in your pocket, you are being tracked and stored, and available to the government.
Everywhere your car goes, is tracked and stored and available to the government.
BTW, the J6 protesters were all tracked and identified by their cell phone data.
Note that there was a major press cycle about this in October / November of last year - a quick Google showed stories in the Guardian, The Intercept, and the Cornell Sun, as well as commentary on Reddit. Not inconceivable that they found about it last October and had six months to leave and de-Googlify.
I wish the page were just the prompt they used to generate the article. I like LLMs as much as the next person, but we don't really need two intermediate LLM layers (expand and summarise) between your brain and mine.
Edit: the author's comment below is dead, so I'll reply here: The tape and general effort is great, it's the overused LLM-style intro above that that grates. LLM writing is now like the Bootstrap of old, it's so overused that it's tedious to read.
That's more useful. A big question is how much is really turned off in a computer waiting for the wake-up packet. "The power to the Ethernet controller must be maintained at all times, allowing the Ethernet controller to scan all incoming packets for the Magic Packet frame". So the full network controller is still alive. There's not some tiny Magic Packet detector hardware running off a rechargable coin cell or something, with the main power supply turned off. At least not in the original design.
A lot of sleep modes leave more running than you'd expect.
Όχι από μέρους μου, και επίσης δεν γνωρίζω τη νέα συμφωνία για την ορθογραφία της πορτογαλικής γλώσσας.
It's funny but... Sometimes I play a lot of Beat Saber which has a thin multiplayer mode where you get in a a room of randos and get put into a really structured kind of environment where you can't hassle people but you can friend people and then invite them into a room where you are in a voice conference.
A lot of the people I've met are retirees who enjoy social VR and like to post pano videos they take on cruise ships -- it is good clean fun but it must drive Mark Zuckerburg up the wall since he's looking for a younger and more impressionable audience.
Are you saying that has failed? It isn't obvious to me from that page that anything in particular is going wrong. I don't think anyone is daft enough to claim that AI solves the "Iowa remains unplantable due to winter conditions" problem.
It also ignores the fact that your backpack needs change.
At various points in my life I've needed:
- A huge backpack, then a small one
- Water bottle holders weren't important, then they were
- Straps I could tighten to hold a yoga mat weren't important, then they were
- A laptop slot wasn't important, then it was critical
Plus my preference in color has changed, as well as my aesthetic preferences.
Paying $200 for a backpack would be insane when I'll have different needs in a few years anyways. I buy cheap-ish backpacks, I've never had a zipper or seam fail on me before I needed to buy a new one for a different reason anyways. Or it was just stolen/lost.
My general life philosophy is to buy the cheapest thing that meets my needs generally, replace as necessary (since I often need to replace/upgrade for functional reasons anyways), and buy a very few expensive high-quality items that I know are actually worth it. Like a mid-tier espresso machine, a good leather jacket, quality boots, a decent home speaker, and... I'm honestly struggling to think of anything else.
Note that the judge is bound by precedent and law as to what "unreasonable" means, they can't just make it up as they go along unless there is no precedent. Otherwise the case can be reversed on appeal.
I was on a jury recently where we had to swap out judges in the last couple days of the trial. The reason was because the judge had been assigned another case where the defendant had not waived his right to a speedy trial. The judge wanted to finish his existing case first, the defense lawyers said "You can't do that", the judge looked it up and found out that indeed they were right, so off he went to start the new case and handed off the existing one to a colleague. In my experience judges really do take the law seriously - that's how they get to be judges.
As one of the cities I spend part of my life, the new metro experience is great, and how they integrated the stations into old Greek infrastructure.
I only morn the loss of jobs that could have been part of the metro, if the wagons weren't robots.
Same, I was gifted a Sandqvist backpack ten years ago. I travel with it as my sole piece of luggage (you can imagine the overstuffing). It has outlived three laptop backpacks that don't go through half as much as it has.
If you have a large pile of spare cash and want your own gem museum, there's one closing down: https://www.bbc.co.uk/news/articles/c937d7p0gzpo
What taught me how to write a compiler was the BYTE magazine 1978-08 .. 09 issues which had a listing for a Tiny Pascal compiler. Reading the listing was magical.
What taught me how to write an optimizer was a Stanford summer course taught by Ullman and Hennessy.
The code generator was my own concoction, and is apparently quite unlike any other one out there!
I have the Dragon Book, but have never actually read it. So sue me.
You're not seriously trying to help.
One thing that may help resolve your issue is that while I do agree with the Sam Vimes theory, it is also not guaranteed. There are also scenarios where the $50 boots will last forever, or you can buy $2 boots that will only last five years... but across your entire lifetime will still be cheaper. Or you can account for the fact that you take better care of your stuff than most people and the cheap thing may in fact be fine for a long time. Or you buy the cheap thing twice and maybe in 15 years when you have more disposable income buy the thing that lasts. Or buy the cheap thing and hit the occasional estate sale and eventually find a thing that lasts, but for dirt cheap prices, because you weren't in a hurry because your immediate needs were met and you had the time to wait for a deal.
The meta-lesson of the Vimes theory is really more that you need to think about these things, but it's not guaranteed that the expensive thing will be better in the longterm on a bang-for-the-buck basis. For furniture, there is something to be said for the technique beloved by the just-starting-out set of buying "whatever I scrounged together from garage sales", and there's something to be said for "I outfitted my apartment from Ikea". Yeah, it's cheap and one way or another you're going to pay for that cheapness, but it's so much cheaper than the alternative that as long as you aren't practicing your wrestling moves on the Ikea end tables, you can get a long way with them even if you're replacing them every 10 years.
And, per your last point... at least when you buy cheap, you know you bought cheap. I found myself in need of a dining room table light a few years back. We went to a lighting store and I stood there staring at all the bespoke LEDs that I knew would die and couldn't be replaced, and the multi-thousand dollar lamps that looked nice but I simply couldn't know if they were quality... and ended up buying a $15 dollar extension cord with 5 light sockets on it, bought some light bulbs to put in it, and wrapped the cord around the remains of the previous what-turned-out-to-be-proprietary track lighting. We decorate it for the season with various ribbon things to hide the cords. Because damn it, if it's all just going to fail anyhow, at least I knew I could replace the lights with whatever I wanted, and it cost me less than $100 all in. We've had that for, gosh, I think at least 10 years now, and I've probably cycled the lights at least twice now, but that's probably still under $100 total... all because I simply can't trust the expensive stuff.
Are you at all worried that the message you are spreading here is "We are no longer confident in our own ability to secure your data?"
That's like saying machine guns didn't change warfare because we had guns before that.
The law has a concept of a "carrier" [1], and has the ability to judge whether or not the carrier in question is responsible for what it is carrying.
I'm not making a blanket statement that that means everything is a carrier, because a good chunk of the page I linked is devoted to endless legal nuances and I defer the details of the concept to those who know better. I'm just saying that the law has a well-established concept for this sort of situation, such that it is not the case that just because a third party is involved instantly all protections dissolve. If you really want to dig into the details, that's something an AI that hits the web and digests things would be pretty good at, as long as you're not planning on legal action based on that. Sometimes the hardest part of learning about something is just finding the term for it that lets you dig in.
Discussion: https://news.ycombinator.com/item?id=47779730
Loved that section about "meat shields". LLMs cannot be held accountable. Someone needs to be involved in decision making, with real stakes if those decisions are bad.
Re-reading Discworld books today demonstrates how timeless they are. Stories Terry wrote in the 1980s still feel like biting satire against the modern world today.
The books also get better as I get older - I read them first as a teenager and many of the deeper ideas about the human condition went straight over my head.
The way the cult leader in Guards! Guards! manipulates his followers, to give just one example.
If you don't know someone high up at Facebook, chances are you're stuck. Facebook has no real support staff left outside of things like ads that bring in actual revenue.
> All that said, in most orgs I've worked with, they were following agile processes over agile principles - effectively a waterfall with a scrum-master and dailies.
In my experience, they're all waterfall in scrum skin, except they also lose the one thing that was a strength of the old-school method: building up a large, well thought out, thoroughly checked spec up front.
So in the end, "business process MBA grinder" reshapes any idea to adapt to leadership needs - and so here, Agile became all about the things that make software people predictable cogs in the larger corporate planning machine. They got what they need anyway, but we threw away the bits that were useful to us.
It may well be in reduced AC bill as well due to increased reflectivity.
So, this is slightly off topic, but out of curiousity, what are NPUs good for right this very second? What software uses them? What would this NPU be able to run if it was in fact accessible?
This is an honest, neutral question, and it's specifically about what can concretely be done with them right now. Their theoretical use is clear to me. I'm explicitly asking only about their practical use, in the present time.
(One of the reasons I am asking is I am wondering if this is a classic case of the hardware running too far ahead of the actual needs and the result is hardware that badly mismatches the actual needs, e.g., an "NPU" that blazingly accelerates a 100 million parameter model because that was "large" when someone wrote the specs down, but is uselessly small in practice. Sometimes this sort of thing happens. However I'm still honestly interested just in what can be done with them right now.)
> Desktop UI culture shifted from “look at this crazy skin” to “work reliably and get out of my way.”
I miss the wobbly windows I had in Linux when we started playing with Compiz.
Or neko on my Sun machines.
As for weird-shaped windows, I think it is about ergonomics. A different shape requires more thinking to operate. Form should follow function, not the other way around - if the odd shape serves a purpose, then it makes sense. If it's just to show off, or to make the app look different, then it becomes a usability issue.
I remember in the late 1990s Windows applications, particularly the little weird ones like the app you would use to work a (flatbed) scanner, often tried hard to have unique themed appearances. The industry seemed to lose interest by 2005 or so. I got a job as a Silverlight programmer not long after that which got me to learn WPF and WPF had facilities for theming that seemed capable and well thought out (would be easy, for instance, to turn pill buttons diagonal) but these hardly ever got used, I think the industry had moved on.
Lately I have had to run Office '98 which tries to take over your desktop with Clippy and other things and it still tries to do it to Windows 11. The borderless windows from Office '98 don't quite look right now but it all works.
That used to be true, but no, nowadays they print perfectly out of the box.
https://www.amazon.com/Visibility-Eco-Friendly-15-Minute-Saf...
>Specified and approved by the Bureau of Explosives and Underwriters Laboratories. No expiration date on road flares, the date shown on the flare is manufactured date. Orion flares will burn in all weather conditions, waxed Flare w/Plastic Cap. 15 Minute Burn Time — Non Perchlorate Formula
Thessaloniki had the same issue, and now there's a stop where you have walkways above the ruins.
Some photos of the "before" here:
https://www.thessalonikiguide.gr/metro-thessalonikis-mia-arx...
That's very interesting, thanks!
I absolutely love your project and I hope it will become a breakout success. It has all the right components for a computing environment that is not controlled.
Have you thought about RISC-V implementations of the kernel as well (iirc you're on ARM and on x64)?
> On February 28, 1974, Shafrazi spray-painted Picasso's 1937 painting Guernica with the words "KILL LIES ALL" in foot-high letters.
> Tony Shafrazian was born in Abadan, Iran, to Iranian Armenian parents
> In 2020, Shafrazi publicly supported Donald Trump for president.
If nothing else, the universe has a sense of humor.
I don't know, I don't use those. It is for Signal, I don't think so for Instagram, since I don't think that encrypts end to end.
Kind of similar story, eventually I ended up on GNOME, as I favoured Gtkmm over how KDE was at the time, but then GNOME 3.0 happened, and my travel netbook got migrated into Unity, and when it went away, XFCE.
Due to similar realisation, my main working devices became Window 7 with Virtual Box/VMWare Worstation, nowadays WSL.
If I don't want surprises!?!
I had to throw away, literally, a Gigabyte BRIX, because its firmware did not recognised any distro I throwed at it from internal drives, only if connected externally over USB.
The experiements with various kinds of SSD modules, Linux distros, and UEFI booting partitions, end up killing the motherboard in someway due to me manipulating it all the time, whatever.
Raspberry PIs are the only NUCs I can buy in something like Conrad Electronic, and be assured it actually works without me going through it as if I had just bough Linux Unleashed in 1995's Summer.
> because we were sure we needed drop shadows and geometry transforms for windows
As screens get larger, the amount of pixels you need to push to composite windows gets larger-squared. It makes sense to move the pixel pushing away from the CPU and more importantly away from CPU-RAM and on to a separate RAM bus.
The "single buffer with invalidation" model of Win16 (I cannot remember how it works in X) saves memory at the cost of more redraws. The composition model allows you to do things like drag window A over window B without forcing a repaint of window B every frame.
It also allows for better process isolation. I think in both Win16 and X11 you could just get a handle to the "root window" and draw wherever you wanted?
For spammers.
They don't have one for regular people who want to do regular end-user computation.
It is OK. I actually love looking around other people’s work. Perhaps, I will never follow exactly but one a while, I get the gotchas where I can steal and adapt to mine. Let it be, let people express. If not for the veterans with years of experience, people coming in recently should find these things something to read up and learn.
I just hope they're the Responsible Cybermen.
Aren't they widely believed to be Russian? They've been running for long enough that they're almost certainly in a non-extradition jurisdiction and know to stay there.
Reminds me of repl.it, which perma-blocked my newly created account before I even had a chance to type in e-mail verification code; in fact the notice about account block came before the one-time e-mail verification code.
I still wonder what did I do wrong (support isn't responsive). But it's true that we're both safe from having a user/vendor relationship now.
No. It's code for the thickest, densest book on the subject that you're ever gonna not read, as it actually assumes you're experienced in the subject and goes into everything except intro level topics.
See e.g. Petzold, et al.
It's been amazingly linear since 2014.
amazon.com needs to get with the program. Still IPv4 only.