Hacker Newsnew | past | comments | ask | show | jobs | submit | alex-g's commentslogin

Why not? The point is to be able to distinguish the cases.


Just as a breadcrumb for readers who are curious about the generating function stuff: https://en.wikipedia.org/wiki/Combinatorial_species (see also https://www.cis.upenn.edu/~byorgey/pub/species-pearl.pdf for a nice FP-flavoured tutorial)


Systemic biases complicate the assessment of merit.


Seamus Heaney began his translation of Beowulf with "So", rendering the Old English "Hwaet" in a more natural way than the usual archaic "Listen!", "Lo!", "Hark!" kind of thing. In the introductory note, he explains: "'so' operates as an expression that obliterates all previous discourse and narrative, and at the same time functions as an exclamation calling for immediate attention." Far from being a chatty colloquialism, it is a solemn, weighty kind of "so" for Heaney.


Maybe part of the explanation for this specific attack is incompetence - miscommunication, comparatively junior people exceeding their authority, subordinates afraid to object, and everyone doubling down rather than admitting defeat. I could definitely imagine that the people who devised and built out the capability being furious at it being deployed like this.


If it has lasted a couple hours I could see that. But as long as that attack continued, no way.


Well, once it started, terminating it requires someone to lose face. So, yeah, I can see it continuing.


> BGP announcements, themselves unencrypted, aren't protected with DNSSEC.

This is true, but only because BGP announcements don't involve DNS, and so all the DNS security in the world won't help. Agreed that there is a lot of scope for doing better on BGP security, though - and indeed DNS security.


The fact that "all the DNS security in the world won't help" is part of my point. There aren't really any places where "all the DNS security in the world" will help.


> Agreed that there is a lot of scope for doing better on BGP security, though

Yes... and there we go down the path toward BPGSEC, RPKI and other tools that people are developing to help secure the routing infrastructure.


Is your work at all based on Rydeheard and Burstall's "Computational Category Theory"? They also do category theory in ML.


I wonder if this even needs to be something in the home. Wouldn't it also make sense to install these things, in bulk, in a place where they could service several homes? Say, at the block level. If it is part of power distribution infrastructure as opposed to a consumer product, then that simplifies some of the safety and maintenance issues; concerns like weight or volume are even less important if they are housed in a dedicated structure.


This is being done. Power companies have shipping containers full of batteries hooked up to their grids. I have read better stories but the first thing I found googling just now is this http://www.abc.net.au/news/2015-01-07/ausnet-trialling-new-s...


That's still a pilot program, though. The Wikipedia article has a good summary of various tech and installed systems: http://en.wikipedia.org/wiki/Grid_energy_storage#Batteries




This reminded me of Chiang's 2008 story "Exhalation" (http://www.lightspeedmagazine.com/fiction/exhalation/), which explores cognition and entropy through the idea of minds which are built as pneumatic engines.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: