recentpopularlog in

mcherm : via:hackernews   3324

« earlier  
Why const Doesn't Make C Code Faster — The Art of Machinery
Someone could cast away const, so the compiler can only optimize const variables in cases where it sees all uses and could have optimized anyway. As proof, sqlite runs equally fast with and without const.
programming  optimization  via:HackerNews 
yesterday by mcherm
J can look like APL or English
A case is made that the concise difficult to read format of J (or APL) actually works better then English language keywords.
programming  languagedesign  via:HackerNews 
2 days ago by mcherm
Episode 931: The IT Guy Vs. The Con Artist : Planet Money : NPR
He signed up as the IT guy in a major scamming operation in order to get them arrested.
police  story  npr  via:HackerNews 
4 days ago by mcherm
The Order of the JSON – Dion Almaer
The mainframe guys said the keys to the JSON maps were in the wrong order and it would take vast development effort to address the problem. Actually, they just needed to stop requiring the order within the testing tool.
bug  via:HackerNews  programming 
4 days ago by mcherm
Less than Half of Google Searches Now Result in a Click | SparkToro
Google doesn't exist to send people to other sites. 50% of "searches" do NOT result in any next click. (And many others lead or other Google-owned sites.)
google  search  internet  via:HackerNews 
7 days ago by mcherm
Clever Vanity License Plate Backfires On Man, Winds Up With Tons Of Tickets | Talk Radio 105.9 - KNRS
He put "null" as his license plate, and then got all the tickets for cars that couldn't be identified.
bug  bureaucracy  law  via:HackerNews 
8 days ago by mcherm
The worst sales promotion in history: Hoover's free flight fiasco
Don't offer a prize or rebate worth several times the gross sales price of your produce because people will utilize your offer and it will cost.
history  marketing  via:HackerNews 
8 days ago by mcherm
Black Hat: GDPR privacy law exploited to reveal personal data - BBC News
He tested and found that LOTS of companies gave away information on someone else when it was asked for via GDPR channels.
security  law  via:HackerNews 
11 days ago by mcherm
Safe Deposit Boxes Aren’t Safe - The New York Times
Safe deposit boxes are mostly unregulated and cases of loss caused by the bank abound.
banking  via:HackerNews  nytimes 
23 days ago by mcherm
Meet Alex, the Russian Casino Hacker Who Makes Millions Targeting Slot Machines | WIRED
Wired claims this man can reverse engineer the PRNGs in slot machines and make a profit. It's illegal in the US, but not everywhere.
hacking  via:HackerNews  random  math 
24 days ago by mcherm
Do-nothing scripting: the key to gradual automation – Dan Slimmon
A good idea: build a script that prints out instructions for the manual steps of a task. Then it becomes easy to automate one step at a time.
29 days ago by mcherm
If this type of dark matter existed, people would be dying of unexplained ‘gunshot’ wounds | Science | AAAS
We can rule out dark matter being made of particles that interact with normal matter and have about the same energy as a bullet from a 22. Because if it existed, it would be frequent enough to show up in death statistics.
science  physics  via:HackerNews  ScientificMethod 
4 weeks ago by mcherm
The boy was dying. Zebrafish helped save his life - STAT
Quick research replicated the child's unique mutation in an animal model, allowing researchers to test numerous drugs and find one that was effective in time to save the child's life.
medicine  via:HackerNews  science 
4 weeks ago by mcherm
"Digital gangsters" Facebook are frantically trying to find out who leaked thousands of internal documents
Facebook isn't happy that some journalists got internal documents. They want to make a court help them find and stop the leak.
journalism  law  facebook  via:HackerNews 
4 weeks ago by mcherm
Latacora - The PGP Problem
Don't use PGP -- it was designed before the modern era in encryption and it's security sucks while it's usability is famously horrible.
cryptography  via:HackerNews  programming 
5 weeks ago by mcherm
King -Man +Woman = King ? - Netherlands eScience Center
The examples they give for how awesome word2vec is are mostly lies.
NaturalLanguageProcessing  ai  via:HackerNews 
5 weeks ago by mcherm
Zoom Zero Day: 4+ Million Webcams & maybe an RCE? Just get them to visit your website!
A serious security issue in zoom (on Mac it installs a web server locally which does things like launching the zoom client). Also a very clear example of responsible disclosure by a professional.
security  zoom  via:HackerNews 
5 weeks ago by mcherm
How I Made $8,000 per Month Podcasting, and Why You Probably Don’t Want To
He had a niche podcast. He found sponsors which was hard but lucrative. He found sponsors for other podcasts. Then he took a new job and quit selling ads. Podcasting was good for his career and his skills.
podcasting  marketing  via:HackerNews 
5 weeks ago by mcherm
New Approach Could Sink Floating Point Computation
There is ACTUALLY a credible alternative to IEEE 754 for floating point.
floatingpoint  programming  computerscience  via:HackerNews 
6 weeks ago by mcherm
The Coming Boeing Bailout?
A rant about how Boeing changed from an engineer-led company to one led by bean-counters.
business  via:HackerNews 
6 weeks ago by mcherm
One Program Written in Python, Go, and Rust – Nicolas Hahn
He compares a real (but simple) program in Python, Go, and Rust. Rust has more bare-metal speed. Python is more readable and faster to code (also it uses a library, but he considers that typical and thus fair).
languagedesign  programming  programminglanguages  golang  rust  python  via:HackerNews 
7 weeks ago by mcherm
Everything Everywhere Is Securities Fraud - Bloomberg
Not informing the public about something bad is a securities crime, so doing anything bad is necessarily a securities crime. Even for a non-US company, if someone else sells things based on your stock price you are committing US securities fraud (so says SCOTUS by rejecting an appeal).
law  finance  via:HackerNews 
7 weeks ago by mcherm
When Pepsi Had a Navy | Hidden History
They wanted to sell in the USSR but the ruble was worthless. So they bartered Pepsi for vodka, then later for obsolete naval ships. That's how Pepsi became owner of the sixth largest navy in the world.
history  via:HackerNews 
7 weeks ago by mcherm
How Discount Brokerages Make Money | Kalzumeus Software
Mostly by paying only a low rate of interest on cash. Also, they sell "order flow" (the right to be the counterparty for their customers' orders) which is worth something because market makers know discount broker customers aren't ultra-savvy investors.
finance  investing  via:HackerNews 
8 weeks ago by mcherm
Revolut doesn't care about you - Stavros' Stuff
Some online-only bank in the UK did a horrible job of handling fraud, blamed the victim, and now that victim is griping about how bad banks are.
banking  via:HackerNews 
8 weeks ago by mcherm
We tried to publish a replication of a Science paper in Science. The journal refused.
No one has a "right" for their work to be considered influential enough to be published in a key journal such as "Science". But I think these authors make an excellent case that theirs should have been.
science  ScientificMethod  via:HackerNews  slate 
8 weeks ago by mcherm
How a janitor at Frito-Lay invented Flamin' Hot Cheetos
Yeah, I realize it is partly a manufactured story. But the tale of the janitor who took "everyone is an owner" too heart and called the CEO with a product idea which then became the company's most successful product -- it's quite inspiring.
business  via:HackerNews  diversity 
8 weeks ago by mcherm
Elegant error handling with the JavaScript Either Monad
A really nice example of using a wrapper to handle exceptions (an "either monad" in the fancy language) within JavaScript.
programming  via:HackerNews  javascript 
8 weeks ago by mcherm
Comparing the Same Project in Rust, Haskell, C++, Python, Scala and OCaml - Tristan Hume
A *really* good case study: for a course, several competent teams wrote the same program is various languages. Afterward, the code size was compared. Slight advantage to Python and Scala, but mostly it depended on the design decisions, not the language.
programming  programminglanguages  rust  scala  python  haskell  C++  ocaml  via:HackerNews 
9 weeks ago by mcherm
RFC 7282 - On Consensus and Humming in the IETF
An actual standard on how to come to consensus and what that means.
leadership  standards  via:HackerNews 
9 weeks ago by mcherm
The mysterious crystal that melts at two different temperatures
One double-bond can face 2 ways. Solid is all Z orientation; liquid is 2/3 Z, 1/3 W. Two possible melting processes: @ 90°C all melts then afterward some Z's rotate or @60°C incredibly tiny impurities catalyse Z->W and it melts directly to a mix of Z&W.
chemistry  physics  science  via:HackerNews  materialsscience 
10 weeks ago by mcherm
How does Apple (privately) find your offline devices? – A Few Thoughts on Cryptographic Engineering
Wild speculation about what protocol COULD protect privacy while continuously reporting on the location of RFID tags.
algorithms  security  privacy  via:HackerNews  apple 
10 weeks ago by mcherm
Bing is (unexpectedly) aging well – FutureSin – Medium
Apparently Microsoft's Bing search engine isn't a failure and is actually making lots and lots of money. And has >5% of US searches.
search  google  microsoft  via:HackerNews 
11 weeks ago by mcherm
The microhydro plant
The breadth of knowledge required to do this project is incredible.
via:HackerNews  diy  engineering 
11 weeks ago by mcherm
Storm ditches Clojure in favor of Java in its core | Hacker News
Immutability and lisp-like aren't what I would expect for super-high performance, so I agree with the comment stating that this is a story of a success for closure as a high-quality prototyping language. Also, number of developers matters.
languages  clojure  java  via:HackerNews 
11 weeks ago by mcherm
Does the news reflect what we die from? - Our World in Data
The answer to the headline is obvious but the article includes a useful graph.
datavisualization  journalism  via:HackerNews 
11 weeks ago by mcherm
Delisted Overnight: A Cautionary Tale for Indie iOS Developers | Hacker News
In the discussion it appears that suddenly use of the word "tracker" in the subtitle of the app gives a major penalty. Or something like that.
appstore  apple  via:HackerNews 
11 weeks ago by mcherm
In 2019 Everyone on Earth has a Mobile Phone
The number of humans age 15+ and the number of people owning a mobile phone are nearly the same. 4/5 of those are smartphones. Half of the smartphones are iOS the other half are Android.
mobile  datavisualization  via:HackerNews 
12 weeks ago by mcherm
I can see your local web servers
Yipes! Local stuff accessable via http (but ONLY on your local machine) is vulnerable to probing by malicious web pages.
security  web  internet  via:HackerNews 
12 weeks ago by mcherm
What I Learned Trying To Secure Congressional Campaigns (Idle Words)
A really good description of the author's experience and learnings from trying to help political campaigns with their security.
security  politics  via:HackerNews 
12 weeks ago by mcherm
The Universe of Discourse : The shittiest project I ever worked on
Software development gone wrong: the project turned out to be not needed at all.
agile  softwaredevelopment  via:HackerNews 
12 weeks ago by mcherm
Virtual DOM is pure overhead
React has a "virtual DOM" -- updates are made to a data model of the DOM kept in memory in the browser and diffs are found and applied to the real DOM. This is overhead, but allows code to be organized in terms of "how to render the whole thing" instead of "what changes are needed from current state".
webdevelopment  via:HackerNews  react  javascript 
may 2019 by mcherm
Python Software Foundation News: Amber Brown: Batteries Included, But They're Leaking
A debate over the balance between including functionality in the standard library versus making it available in a language-standard library repository.
python  languagedesign  via:HackerNews 
may 2019 by mcherm
The search for the kryptonite that can stop CRISPR - MIT Technology Review
CRISPR can do a lot of harm. Can we build something that STOPS it from editing genes? Several labs are trying.
security  biology  via:HackerNews  science 
may 2019 by mcherm
How we optimized Magic Pocket for cold storage | Dropbox Tech Blog
Dropbox writes how they made their cold storage be backed up in multiple data centers while using less than 2x storage space. It is also faster (for some definitions of "faster").
via:HackerNews  dropbox  algorithms  programming 
may 2019 by mcherm
How My Husband Became a Poster Child of the Post-Antibiotic, Superbug Era
He caught an infection which was immune to almost every known antibiotic. His wife (a bacterial researcher) treated him with a custom bacteriophage (virus that plays on bacteria).
medicine  science  via:HackerNews 
may 2019 by mcherm
How Twisted Graphene Became the Big Thing in Physics | Quanta Magazine
Put two sheets of graphene together twisted by a very precise angle to form a morie pattern, and you get unusual behavior. Like superconductivity.
science  physics  materialsscience  via:HackerNews  ScientificMethod 
may 2019 by mcherm
Re-approaching Color – Lyft Design
The folks at Lyft came up with a set of color names.
color  via:HackerNews 
may 2019 by mcherm
Tax dialysis - Bloomberg
The "Tax dialysis" subsection of the linked article is a shorter and clearer summary of the tax dodge that allows EFTs to avoid annual taxes the way mutual funds do. And Vanguard is now using the same dodge on their mutual fund. They've patented the idea (which is a horrible misuse of the patent system in my opinion).
law  taxes  investing  ip-law  patent  patentabuse  via:HackerNews 
may 2019 by mcherm
A Conspiracy To Kill IE6
How a couple of Google programmers working on YouTube decided on their own (without permission) to deprecate IE6 for the good of web developers around the world.
history  easteregg  browsers  web  via:HackerNews  security  google 
may 2019 by mcherm
How many ways are there to sort GUIDs? How much time do you have? | The Old New Thing
There are several standards for sorting GUIDs, mostly differing because of endianness issues.
programming  via:HackerNews 
april 2019 by mcherm
'Looping' Created an Underground Insulin-Pump Market - The Atlantic
Our society is failing insulin users - first insanely high prices, then this!
medicine  healthcare  via:HackerNews 
april 2019 by mcherm
The inception bar: a new phishing method
Chrome hides the nav bar once you scroll. A malicious website can show a fake nav bar.
security  phishing  browsers  via:HackerNews 
april 2019 by mcherm
« earlier      
per page:    204080120160

Copy this bookmark:

to read