Hacker Newsnew | past | comments | ask | show | jobs | submit | 2014-09-29login
Stories from September 29, 2014
Go back a day, month, or year. Go forward a day, month, or year.
31.Template Metaprogramming with Modern C++: templates in depth (biicode.com)
81 points by signa11 on Sept 29, 2014 | 48 comments
32.Future Smartphones Won’t Need Cell Towers to Connect (technologyreview.com)
78 points by cjdulberger on Sept 29, 2014 | 22 comments
33.Shellshock in the Wild (fireeye.com)
73 points by jonbaer on Sept 29, 2014 | 28 comments
34.The manager and the moron (1967) (mckinsey.com)
67 points by lxm on Sept 29, 2014 | 22 comments
35.Circle opens doors to global audience (circle.com)
73 points by epaga on Sept 29, 2014 | 58 comments
📚. The World’s Most Common Surgery (asimov.press)
25 min read | by Asimov Press | saved 155 days ago | 24% read | archive
36.Planet Emacsen (emacsen.org)
67 points by of on Sept 29, 2014 | 5 comments
37.iOS8 MAC Address Randomization Update (airtightnetworks.com)
63 points by 0x0 on Sept 29, 2014 | 25 comments
38.Tinholes – performant, strongly typed lenses in Clojure (podsnap.com)
60 points by luu on Sept 29, 2014 | 21 comments
39.SWI-Prolog for the semantic web (swi-prolog.org)
64 points by amkk on Sept 29, 2014 | 31 comments

It's interesting and probably not surprising that the most popular drug on the Silk Road 2.0 (and probably other darknet marketplaces) is MDMA. MDMA is difficult to find in pure forms and impurities can kill you. If you buy MDMA from a vendor with a 4.9/5 rating, you can be reasonably certain you're getting quality product (comparable to old pressed pills you can hear aging ravers wax nostalgic about) at a fair price.

I expect marijuana legalization will eat away at darknet marketplace weed sales, leaving MDMA and LSD as the top two. Which is exactly how it should be. They can be made in large quantities by moderately-skilled chemists to a high degree of purity and safety, and the Silk Road allows them to be distributed without any violence. It'd be impossible to bulk-search the mail for them. MDMA could be packaged as any white powder and LSD is literally paper.

I hope that this safe availability of MDMA and LSD quenches the misinformation campaigns that have so horribly marred their reputation for the public. Both of them have incredible potential for therapeutic and recreational use.

📚. Tariffs Are For Emergencies - Bloomberg (archive.ph)
18 min read | by Matt Levine | saved 323 days ago | archive
41.Apple: Dark Value and Degrees of Monopoly in Global Commodity Chains [pdf] (jwsr.org)
60 points by scarmig on Sept 29, 2014 | 6 comments
42.Butterfly Labs mined Bitcoins on customers’ boxes before shipping (arstechnica.com)
59 points by suprgeek on Sept 29, 2014 | 41 comments
43.Making Hybrid Images (jeremykun.com)
57 points by jcurbo on Sept 29, 2014 | 3 comments
44.What is gained and lost with 63-bit integers? (janestreet.com)
56 points by lelf on Sept 29, 2014 | 58 comments

I think the public educational IT system should not be outsourced to the private sector, where schools completely lose control of the data and depend more or less on the good will of the company. University courses should not be organized by Facebook and pupils should not be forced to use IT systems of non-trustworthy companies like Google, which earn money by profiling their customers. Maybe my view is too German, but I think of education as an sovereign function of the state, where everything (theoretically) can be controlled by the citizens (yes, I know that this is some kind of optimistic). We should teach kids to think critical about centralization of data and knowledge and show them how to manage their digital lives with free and open tools which respect the users rights.
📚. Does the Bitter Lesson Have Limits? (dbreunig.com)
8 min read | by Drew Breunig | saved 216 days ago | archive

> this completely destroys the premise of HTTPS that you have an encrypted connection to the website you are visiting

It does nothing of the kind, it has always been the case that seeing the SSL padlock only informed you that the connection to whichever server you are communicating with is encrypted and nothing more.

Do you not recall the age of customer feedback pages hosted behind SSL that actually just sent plain text emails over the internet to the customer service email? SSL was never a guarantee that end-to-end communication was encrypted, and usually it was barely that.

What CF have done is to say that the jump to their servers can now be secured by SSL and that this works even for those who would not configure SSL (for either cost or complexity reasons). It's nothing more than that, it remains the case with SSL that you are trusting the site to support end-to-end encryption for sensitive data.

But what it does allow CF to do is partner with companies like Linode, Digital Ocean and so on, so that in effect when a user connects to CF via an SSL connection the entirety of the communication could occur within the trusted CF+Partner network and none of the traffic would be plain text over the internet. It's a foundation to build upon.

47.Why Loggly Chose AWS Route 53 Over Elastic Load Balancing (loggly.com)
77 points by TwilightPoetry on Sept 29, 2014 | 48 comments
48.Eskimo – Node Boilerplate Framework for Rapid MVPs (niftylettuce.com)
65 points by menzoic on Sept 29, 2014 | 20 comments
49.Show HN: Moo.do – Simple, Powerful Organizational Tool (moo.do)
84 points by gwatters on Sept 29, 2014 | 47 comments
50.Benchmarking Tableau's S-1: How Key SaaS Metrics Stack Up (tomtunguz.com)
57 points by kareemm on Sept 29, 2014 | 1 comment
📚. Learning Persian with Anki, ChatGPT and YouTube (cjauvin.github.io)
3 min read | by Christian Jauvin | saved 163 days ago | archive
51.Our Invisible Rich (nytimes.com)
54 points by smacktoward on Sept 29, 2014 | 87 comments

> If Facebook scans my chat logs, […] their TOS permits them to scan my chat logs.

Your language betrays your cognitive dissonance. It it not your chat log. It was never your chat log. You typed characters into Facebook’s chat log, and the chat log is Facebook’s. There is no “permitting” needed. When you use Facebook (or Google, or whatever), you live in a glass house, an aquarium, with overseers who do not consider you a person with integrity, but more as a kind of pet to be inspected and analyzed at will. Facebook distracts you with “privacy settings”, but those apply to other pets in the aquarium, not its overseers. It might be discomforting to think of yourself as a pet in an aquarium, but you have chosen this yourself, by using Facebook.

The question if Facebook is permitted to scan your chat logs is therefore meaningless; there is no such concept. Facebook “scans” all its chat logs, all the time. (That’s why they have their chat logs.) The “privacy settings” have nothing to do with actual privacy from Facebook — like Monopoly money, it has no validity outside the tiny world of its own. Like “deleting” things, it appears to you to delete things, but does not actually delete them as far as Facebook is concerned — it is all logged and saved, forever. I could go on, but I’d better not.

(The same goes for Google and all the other cloud and social services.)


While it's certainly good enough for english bodies, its half-assed support for compounds is a problem for bodies in languages that use compounds (German for example).

There is sorta-support for compounds, but only really for ispell dictionaries and the ispell format isn't very good at dealing with compounds (you have to declare all permutations and manually flag them as compoundable) plus the world overall has moved over to hunspell, so even just getting an ispell dictionary is tricky.

As a reminder: This is about finding the "wurst" in "weisswürste" for example.

Furthermore, another problem is that the decision whether the output of a dictionary module should be chained into the next module specified or not is up to the C code of the module itself, not part of the FTS config.

This bit me for example when I wanted to have a thesaurus match for common misspellings and colloquial terms which I then further wanted to feed into the dictionary, again for compound matching.

Unfortunately, the thesaurus module is configured as a non-chainable one, so once there's a thesaurus match, that's what's ending up in the index. No chance to ever also looking it up in the dictionary.

Changing this requires changing the C code and subsequently deploying your custom module, all of which is certainly doable but also additional work you might not want to have to do.

And finally: If you use a dictionary, keep in mind that it's by default not shared between connections. That means that you have to pay the price of loading that dictionary whenever you use the text search engine the first time over a connection.

For smaller dictionaries, this isn't significant, but due to the compound handling in ispell, you'll have huge-ass(tm) dictionaries. Case in point is ours which is about 25 Megs in size and costs 0.5 seconds of load time on an 8 drive 15K RAID10 array.

In practice (i.e. whenever you want to respond to a search in less than 0.5 secs, which is, I would argue, always), this forces you to either use some kind of connection pooling (which can have other side-effects for your application), or you use the shared_ispell extension (http://pgxn.org/dist/shared_ispell), though I've seen crashes in production when using that which led me to go back to pgbouncer.

Aside of these limitations (neither of which will apply to you if you have an english body, because searching these works without a dictionary to begin with), yes, it works great.

(edited: Added a note about chaining dictionary modules)

54.Datacoup – Unlock the Value of Your Personal Data (datacoup.com)
58 points by potench on Sept 29, 2014 | 30 comments
55.Apple boycotts German newspaper after Bentgate Video – open letter to Tim Cook (computerbild.de)
58 points by jpdus on Sept 29, 2014 | 48 comments
📚. Where do These People Get Their (Unoriginal) Ideas? (joelonsoftware.com)
5 min read | by Joel Spolsky | saved 158 days ago | archive
56.Why Microsoft's engineering changes will be the real Windows Threshold story (zdnet.com)
54 points by radmuzom on Sept 29, 2014 | 53 comments

Wow, what an incredibly dense thing to presuppose and advice others that the idea of data normalisation is antiquated because the primary purpose, when it was "thought of", was to save disk space!

Data normalisation is all about correctness - mathematical correctness. It's about reducing inconsistencies in your abstracted domain model so that you do not suffer side effects when using your data (such as in your programs). It is not optional.

This is poor advice to others. Especially if "the adviced" are uninformed, new or finding the subject hard.

58.Protect yourself from the hidden dangers of `curl – sh` (djm.org.uk)
52 points by stevejalim on Sept 29, 2014 | 33 comments
59.NYU Eats World: An alumna laments the rise of an imperial university (chronicle.com)
44 points by benbreen on Sept 29, 2014 | 23 comments
60.Hacker News Leaderboard (news.ycombinator.com)
45 points by deepakjc on Sept 29, 2014 | 57 comments
📚. The Law of Leaky Abstractions (joelonsoftware.com)
9 min read | by Joel Spolsky | saved 158 days ago | archive

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: