Hacker Newsnew | past | comments | ask | show | jobs | submit | akovaski's commentslogin

I think that Gemini regularly generates inane metaphors like the above. As an example, here's a message that it sent me when I was attempting to get it to generate a somewhat natural conversation:

----

Look, if you aren't putting salt on your watermelon, you’re basically eating flavored water. It’s the only way to actually wake up the sweetness. People who think it’s "weird" are the same ones who still buy 2-in-1 shampoo.

Anyway, I saw a guy at the park today trying to teach a cat to walk on a leash. The cat looked like it was being interrogated by the FBI, just dead-weighting it across the grass while he whispered "encouragement."

Physical books are vastly superior to Kindles solely for the ability to judge a stranger's taste from across a coffee shop. You can’t get that hit of elitism from a matte gray plastic slab.

----

This was with a prompt telling it to skip Reddit-style analogies.


I buy 3-in-1 shampoo, conditioner and body wash.


This could possibly make a good base for a system recovery USB drive. One 18-headed hammer for all your needs.

I haven't looked deep into it, but my impression is that most system recovery images target just x86_64 and maybe 32-bit x86 if they're cheeky.


I'm not sure what that would solve. You would still need some central entity to sign the DNS TXT record, to ensure that the HTTPS client does not use a tampered DNS TXT record.


If someone can tamper with your DNS TXT records now they can get a certificate for your domain.


Not tamper with the record directly, but MitM it on the way to a target.


That should be prevented by dnssec no?


Depends on who your adversary is. If it's your ISP: no, DNSSEC doesn't prevent that (in every mainstream deployment scenario, your upstream DNS recursive server is the only thing really doing DNSSEC validation).


That's what DNSSEC is for.


Yes, but that's just PKI again, which is what the OP was trying to avoid.


That's already the case with dns-01 verification, no?

Besides, if someone has access to your TXT records then chances are they can also change A records, and you've lost already.


I'd like to add that tom7 used AI to generate an upperercase and lowerercase font in 2021. https://tom7.org/lowercase/


While we're at it: my own work 2 years ago in creating an entire workflow for turning Midjourney or DALL-E dropcaps into attractive, lightweight, easy-to-create dropcaps for web pages: https://gwern.net/dropcap We use it for the cat, Gene Wolfe, and holiday pages.


The partitioning algorithm to find two missing/duplicate numbers is clever, I wouldn't have thought of that. It should also work if you have a list with 1 missing and 1 duplicate, yeah? You'd probably have to do an extra step to actually find out which number is missing and which is a duplicate after you find the two numbers.

> If more than two elements are missing (or duplicated), then analyzing the individual bits fails because there are several combinations possible for both 0 and 1 as results. The problem then seems to require more complex solutions, which are not based on XOR anymore.

If you consider XOR to be a little bit more general, I think you can still use something like the partitioning algorithm. That is to say, considering XOR on a bit level behaves like XOR_bit(a,b)=a+b%2, you might consider a generalized XOR_bit(a,b,k)=a+b%k. With this I think you can decide partitions with up to k missing numbers, but I'm too tired to verify/implement this right now.



The ability to push a verified artifact is an anti-feature in most contexts? How so?


It is fine if you are just working by yourself on non-prod things and you’re happy with that.

But if you are working with others on things that matter, then you’ll find you want your images to have been published from a central, documented location, where it is verified what tests they passed, the version of the CI pipeline, the environment itself, and what revision they were built on. And the image will be tagged with this information, and your coworkers and you will know exactly where to look to get this info when needed.

This is incompatible with pushing an image from your local dev environment.


With that sort of setup you'd run `docker pussh` from your build server, not your local machine (really though you'd probably want a non-ephemeral registry, so wouldn't use unregistry at all).

Other than "it's convenient and my use case is low-stakes enough for me to not care", I can't think of any reason why one would want to build images on their production servers.


Agreed.


> I can't reproduce this in Python (including my local 2.7 build), only using sh directly.

Same for me. It looks like the POSIX folks accepted the author's suggestion in 2022 and system() in glibc was updated in 2023.

https://sourceware.org/git/?p=glibc.git;a=blobdiff;f=sysdeps...

  #include <stdlib.h>
  int main(void) {
      system("-x");
      return 0;
  }
...

> [pid 172293] execve("/bin/sh", ["sh", "-c", "--", "-x"], 0x7ffe221d2f58 /* 76 vars */) = 0


I recently had a few nights where I stayed up way too late watching YouTube shorts, which are about 1 minute each, on my desktop. I'd notice that an hour had passed, tune back into YouTube, then another hour had passed.

Now that I've recognized the pattern, I've decided to stop scrolling through shorts; watching a short without scrolling is fine. I also setup a systemd service to pause media and lock my screen every 30 minutes after bedtime. The screen lock may be overkill, but I have a bad record of digging too deep into subjects at night, so I think it will still be beneficial.


In a few weeks you may find you've turned yourself into a systemd hater by your own hand ;)


IBM rebranded AS/400 to iSeries in 2000, which is after the iMac came out.

https://en.wikipedia.org/wiki/IBM_eServer

https://en.wikipedia.org/wiki/IMac


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: