Hacker Newsnew | past | comments | ask | show | jobs | submit | e12e's commentslogin

> Our proprietary AI systems have never seen the original source code.

For this to be plausible satire, they need to show how they've trained their models to code, without mit, apache, bsd or GPL/agpl code being in the training set...


Adonis is nice, but still young and lacking features. And in my experience very verbose compared to rails.

That said, absolutely worth a look.


I'd say that if you're first encounter with rails is version 8+ -- it's a lot easier to use than previous versions.

Partly because the handling of JavaScript is much less bespoke and complex.


Javascript handling in Rails was easy in the early versions, then became messy with the asset pipeline and webpacker, and is becoming simple again with the latest versions

Current racket is running on top of chez scheme - which is maintained by Cisco - and reportedly extensively used in commercial products (router firmware/os etc).

https://cisco.github.io/ChezScheme


It was brought into Cisco to do that but the project was eventually shelved, which was a shame because the prototypes delivered some really interesting reliability features. Most Cisco hardware products run firmware written in C. Management systems are often Java and (increasingly) Go. Clojure is used for one of the security product lines, but that was developed as a startup that was later purchased by Cisco. One of the management systems, NSO, is written in Erlang (brought in through the tail-f acquisition). There are certainly a lot of people in Cisco that understand the power of Lisp (I was one), but they are spread out and surrounded by people that just want to push whatever the latest thing is (now Go). C.f. the blub paradox and “worse is better.” They have a lot of legacy code that was written over the last 30 years that powers their devices, and that’s all in C.

I think when you've realized that you don't particularly enjoy being alone - the best cure is to avoid it; and try to get more friends.

Friends are made by doing something together, regularly, over time.

I wouldn't call this "get a hobby" - I'd call it "find something to do".

My best suggestion is start doing some kind of organized training like martial arts, or some team sport. Find somewhere to volunteer: food bank, volunteer programs teaching kids to code, anything in your area that you can relate to.

I'm not suggesting that it easy or trivial - but I also believe it is the only way.


If this is a concern, why not compress at the filesystem level?

> the watch has a publicly reachable IPv4 address

Attacker reachable, presumably? Like from a hacked cable modem or wifi router?


I guess I managed to mention everything but what I was actually, specifically fishing for: I wanted to confirm this claim and claims like it:

> The watch had an insecure network service that anyone could access via the internet.


It's nice to be able to authenticate sudo via biometric id with the help of Pam, or unlock your password manager like bitwarden.

I don't think an apple watch would help there?


> I don't think an apple watch would help there?

You can authorize via Apple Watch everything you can authorize via Touch ID. You get the notification on the Watch, and you need to press the button twice to auth.

I don't remember if it works every time, or only when MacBook is closed and connected to external display/keyboard.


I've got this functionality in linux with the framework laptop, and it really isn't much faster than typing in a password.

either you have killer typing speed or your password isnt long enough or your fingerprint scanner is slow

It can be, if your typing is impaired.

Wait, one can wire up sudo to touch ID? I don't know how I never learned that before


It's been possible since Big Sur at least, the method for enabling it just changed woth Sonoma


Interestingly enough, even ChatGPT has this to say about how the Trump administration might side-step the language about fully autonomous weapons:

https://chatgpt.com/share/69a439b3-dfe4-800d-926e-39db221fba...

AI;DR

> So in summary: a future administration could attempt to sidestep those guardrails by altering the underlying legal/policy framework they’re tied to, redefining oversight requirements, or asserting emergency powers — effectively opening a path for more autonomous weapon deployments without facially violating the letter of the current contract text.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: