Hacker Newsnew | past | comments | ask | show | jobs | submit | rnicholson's commentslogin

git commit -v gives you the diffs provided you don't also use -m. Personally, I find -m to be a dangerous flag for commit for exactly the reasons you described not mention its hard to really do detailed multi-line commit messages with -m.


They did. It was in the article.

> ... dotCloud the startup pivoted to focus on Docker and changed its name to Docker as well. Then, in August 2014, Docker sold dotCloud to cloudControl.


Yep ... but I wouldn't say it's a YC graduate shutting down. A company that bought a "product line" from them is shutting down.


What is the reason for saving then moving for existing files? This an optimization specific to certain file systems?


Moving a file (within the same file system) is an atomic operation on most file systems, but writing data is not.

If you don't do this and you're overwriting a file directly and the write fails for some reason, the data from the old file will be gone and you'll only have a partially-written new file in its place.

This also helps with systems that continuously poll files and watch for changes. If you have, say, a compiler watching your file, you don't want it to start compiling a partially-written version of your file and give you some strange error just because it happened to poll before the write finished.


So if there's a write failure the user won't lose his file.


>Both Applied Cryptography and the Handbook of Applied Cryptography are great resources, although they're a little dated now. ... Step one is to read Cryptography Engineering. This is not optional. Read it. It is a fantastic book that details how to use cryptographic primitives.

It seems kinda superfluous to mention Applied Crypto when the real reco is to read Cryptography Engineering. I'd almost wonder if it would be better to direct people away from Applied Crypto...

Personally, I found Applied Cryptography to be so-so at best. Practical Cryptography was a breath of fresh air in comparison.


Yes. Recommending Applied Cryptography is usually a warning sign that the person doesn't know what they are talking about. In this case the rest of the advice is reasonably sound for an engineer that wants to start learning the fundamentals of modern cryptography.


>I see he's excluding the 100 most popular addresses. Is there any justification for that?

Probably because most of the top 100 are things like SatoshiDICE.


See also - http://www.daemonology.net/hn-daily/ - I find its a better "best".


If were talking about graphics card rigs, well I guess could attempt to re-sell them to gamers and the like to attempt to get some money back out of them (although, in the end probably still a loss unless you covered the purchase+power/cooling+maint costs in mining with them)

ASIC BTC mining hardware, I don't think can be re-purposed.


got a source? Or just wildly speculating?


They killed calDAV. IMAP is a bit of a jump, but mark my words, cardDAV will be next.


Oh yeah. Low points (for me) were when it seemed like every site had <bgsound>.


eh, its kind of always been a meritocracy...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: