Lawfare Podcast: Content Moderation and the First Amendment for Dummies (2021)
13 by mustache_kimono | 1 comments on Hacker News.
Saturday, December 31, 2022
Friday, December 30, 2022
New top story on Hacker News: Text layout is a loose hierarchy of segmentation (2020)
Text layout is a loose hierarchy of segmentation (2020)
5 by lylejantzi3rd | 0 comments on Hacker News.
5 by lylejantzi3rd | 0 comments on Hacker News.
Thursday, December 29, 2022
New top story on Hacker News: Ask HN: The ISP has a competing product so has decided to block my domain
Ask HN: The ISP has a competing product so has decided to block my domain
35 by qerim | 19 comments on Hacker News.
The ISP in my hometown (Albania + Kosovo) has decided to block my whole domain to my free legal streaming website because they also happen to offer IPTV services. I only found out after trying to access my site from Albania today, it just comes up with a “bad URL” request. The streams I serve on my site are public freely available TV channels, combined into a single page. Since EU laws do not apply to neither of these countries, is there any course of action I can take to prevent this sort of monopoly going on?
35 by qerim | 19 comments on Hacker News.
The ISP in my hometown (Albania + Kosovo) has decided to block my whole domain to my free legal streaming website because they also happen to offer IPTV services. I only found out after trying to access my site from Albania today, it just comes up with a “bad URL” request. The streams I serve on my site are public freely available TV channels, combined into a single page. Since EU laws do not apply to neither of these countries, is there any course of action I can take to prevent this sort of monopoly going on?
Wednesday, December 28, 2022
Tuesday, December 27, 2022
Monday, December 26, 2022
Sunday, December 25, 2022
Saturday, December 24, 2022
Friday, December 23, 2022
Thursday, December 22, 2022
Wednesday, December 21, 2022
New top story on Hacker News: Ask HN: How to build F-You Skills
Ask HN: How to build F-You Skills
25 by lakevieew | 18 comments on Hacker News.
The past few months have been stressful for most people in the tech industry owing to mass layoffs everywhere. Luckily, I survived the layoffs at my company. But I was very anxious during the period it was announced and it affected my mental health quite a bit. However, on talking to a few other engineers at my company, I realized not everyone was as stressed. They are confident in their skills to get a new equivalent job which would easily support their current lifestyle, even in the current market. They have what I would call, "F-You Skills - Enough skills to know that you would never have to worry about money in your life", a spin on the more commonly known term "F-You Money" [1]. I was wondering if HN users ever think of their own skills in this context. If yes, how should one go about building these skills. To be clear, I am not talking about interviewing skills, which are also equally important. But I am more interested in technical skills that people believe will easily fetch them "decent money" [2] in any scenario in the short term future. [1] F-You Money means "Enough money to leave one's job, etc. and enjoy the lifestyle of one's choice" https://ift.tt/FxrQLRf [2] not insane money to retire early, but good enough to support their current lifestyle.
25 by lakevieew | 18 comments on Hacker News.
The past few months have been stressful for most people in the tech industry owing to mass layoffs everywhere. Luckily, I survived the layoffs at my company. But I was very anxious during the period it was announced and it affected my mental health quite a bit. However, on talking to a few other engineers at my company, I realized not everyone was as stressed. They are confident in their skills to get a new equivalent job which would easily support their current lifestyle, even in the current market. They have what I would call, "F-You Skills - Enough skills to know that you would never have to worry about money in your life", a spin on the more commonly known term "F-You Money" [1]. I was wondering if HN users ever think of their own skills in this context. If yes, how should one go about building these skills. To be clear, I am not talking about interviewing skills, which are also equally important. But I am more interested in technical skills that people believe will easily fetch them "decent money" [2] in any scenario in the short term future. [1] F-You Money means "Enough money to leave one's job, etc. and enjoy the lifestyle of one's choice" https://ift.tt/FxrQLRf [2] not insane money to retire early, but good enough to support their current lifestyle.
New top story on Hacker News: Bike frame stiffness: Why it matters and all you need to know
Bike frame stiffness: Why it matters and all you need to know
24 by giuliomagnifico | 15 comments on Hacker News.
24 by giuliomagnifico | 15 comments on Hacker News.
Tuesday, December 20, 2022
Monday, December 19, 2022
New top story on Hacker News: Ask HN: What is the cheapest, easiest way to host a cronjob in 2022?
Ask HN: What is the cheapest, easiest way to host a cronjob in 2022?
55 by heywhatupboys | 68 comments on Hacker News.
I thought this could start a good debate on the subject. Myself I have had to make a short running web-scraping job that, given a change in the site, sends a notifying email. This running once an hour. It is 2022, so I had thought it would be tremendously easy and cheap, but it seems no solution is easily implemented.
55 by heywhatupboys | 68 comments on Hacker News.
I thought this could start a good debate on the subject. Myself I have had to make a short running web-scraping job that, given a change in the site, sends a notifying email. This running once an hour. It is 2022, so I had thought it would be tremendously easy and cheap, but it seems no solution is easily implemented.
Sunday, December 18, 2022
New top story on Hacker News: Apple 'created decoy labor group' to derail unionization
Apple 'created decoy labor group' to derail unionization
46 by LinuxBender | 1 comments on Hacker News.
46 by LinuxBender | 1 comments on Hacker News.
Saturday, December 17, 2022
New top story on Hacker News: Show HN: Factual AI Q&A – Answers based on Huberman Lab transcripts
Show HN: Factual AI Q&A – Answers based on Huberman Lab transcripts
7 by rileyt | 2 comments on Hacker News.
This is a quick prototype I built for semantic search and factual question answering using embeddings and GPT-3. It tries to solve the LLM hallucination issue by guiding it only to answer questions from the given context instead of making things up. If you ask something not covered in an episode, it should say that it doesn't know rather than providing a plausible, but potentially incorrect response. It uses Whisper to transcribe, text-embedding-ada-002 to embed, Pinecone.io to search, and text-davinci-003 to generate the answer. More examples and explanations here: https://twitter.com/rileytomasek/status/1603854647575384067
7 by rileyt | 2 comments on Hacker News.
This is a quick prototype I built for semantic search and factual question answering using embeddings and GPT-3. It tries to solve the LLM hallucination issue by guiding it only to answer questions from the given context instead of making things up. If you ask something not covered in an episode, it should say that it doesn't know rather than providing a plausible, but potentially incorrect response. It uses Whisper to transcribe, text-embedding-ada-002 to embed, Pinecone.io to search, and text-davinci-003 to generate the answer. More examples and explanations here: https://twitter.com/rileytomasek/status/1603854647575384067
Friday, December 16, 2022
New top story on Hacker News: Show HN: I made a Slack bot that qualifies your sign-ups using GPT-3
Show HN: I made a Slack bot that qualifies your sign-ups using GPT-3
6 by 0xferruccio | 4 comments on Hacker News.
OP here, this was super fun to build. It all started from playing around with Nat Friedman's GPT browser https://twitter.com/0xferruccio/status/1599014988693180417 Then after having this running for our product for a couple of days or so we decided to give 10 customers access and they loved it! So expanding access now feels great :)
6 by 0xferruccio | 4 comments on Hacker News.
OP here, this was super fun to build. It all started from playing around with Nat Friedman's GPT browser https://twitter.com/0xferruccio/status/1599014988693180417 Then after having this running for our product for a couple of days or so we decided to give 10 customers access and they loved it! So expanding access now feels great :)
Thursday, December 15, 2022
Wednesday, December 14, 2022
New top story on Hacker News: Making the GOV.UK Front end typography scale more accessible
Making the GOV.UK Front end typography scale more accessible
4 by open-source-ux | 0 comments on Hacker News.
4 by open-source-ux | 0 comments on Hacker News.
Tuesday, December 13, 2022
Monday, December 12, 2022
New top story on Hacker News: Ghosn’s daring escape cost his extraction crew their freedom
Ghosn’s daring escape cost his extraction crew their freedom
44 by JumpCrisscross | 13 comments on Hacker News.
44 by JumpCrisscross | 13 comments on Hacker News.
Sunday, December 11, 2022
Saturday, December 10, 2022
Friday, December 9, 2022
New top story on Hacker News: Why does the Commodore C128 perform poorly when running CP/M?
Why does the Commodore C128 perform poorly when running CP/M?
17 by xeeeeeeeeeeenu | 1 comments on Hacker News.
17 by xeeeeeeeeeeenu | 1 comments on Hacker News.
Thursday, December 8, 2022
New top story on Hacker News: Show HN: Web search using a ChatGPT-like model that can cite its sources
Show HN: Web search using a ChatGPT-like model that can cite its sources
41 by rushingcreek | 30 comments on Hacker News.
We’ve trained a generative AI model to browse the web and answer questions/retrieve code snippets directly. Unlike ChatGPT, it has access to primary sources and is able to cite them when you hover over an answer (click on the text to go to the source being cited). We also show regular Bing results side-by-side with our AI answer. The model is an 11-billion parameter T5-derivative that has been fine-tuned on feedback given on hundreds of thousands of searches done (anonymously) on our platform. Giving the model web access lessens its burden to need to store a snapshot of human knowledge within its parameters. Rather, it knows how to piece together primary sources in a natural and informative way. Using our own model is also an order of magnitude cheaper than relying on GPT. A drawback to aligning models to web results is that they are less inclined to generate complete solutions/answers to questions where good primary sources don’t exist. Answers generated without underlying citable sources can be more creative but are prone to errors. In the future, we will show both types of answers. Examples: https://ift.tt/7d4VSqI https://ift.tt/sgzuxtA... https://ift.tt/kOsVovU... https://ift.tt/Atck3UE... Would love to hear your thoughts.
41 by rushingcreek | 30 comments on Hacker News.
We’ve trained a generative AI model to browse the web and answer questions/retrieve code snippets directly. Unlike ChatGPT, it has access to primary sources and is able to cite them when you hover over an answer (click on the text to go to the source being cited). We also show regular Bing results side-by-side with our AI answer. The model is an 11-billion parameter T5-derivative that has been fine-tuned on feedback given on hundreds of thousands of searches done (anonymously) on our platform. Giving the model web access lessens its burden to need to store a snapshot of human knowledge within its parameters. Rather, it knows how to piece together primary sources in a natural and informative way. Using our own model is also an order of magnitude cheaper than relying on GPT. A drawback to aligning models to web results is that they are less inclined to generate complete solutions/answers to questions where good primary sources don’t exist. Answers generated without underlying citable sources can be more creative but are prone to errors. In the future, we will show both types of answers. Examples: https://ift.tt/7d4VSqI https://ift.tt/sgzuxtA... https://ift.tt/kOsVovU... https://ift.tt/Atck3UE... Would love to hear your thoughts.
Wednesday, December 7, 2022
Tuesday, December 6, 2022
New top story on Hacker News: Show HN: Publish from GitHub Actions using multi-factor authentication
Show HN: Publish from GitHub Actions using multi-factor authentication
10 by varunsharma07 | 1 comments on Hacker News.
The backstory about this GitHub Action: I discussed with an open-source maintainer why they publish npm packages from their local machine and do not use CI/CD pipelines. They said publishing should require human intervention and want to continue using multi-factor authentication to publish to the npm registry. This led to building the wait-for-secrets GitHub Action. It prints a URL in the build log and waits for secrets to be entered using a browser. Once entered, the workflow continues, and secrets can be used in future steps. The latest release of "eslint-plugin-react" to the npm registry used a one-time password (OTP) from a GitHub Actions workflow! https://ift.tt/X27Sgbx...
10 by varunsharma07 | 1 comments on Hacker News.
The backstory about this GitHub Action: I discussed with an open-source maintainer why they publish npm packages from their local machine and do not use CI/CD pipelines. They said publishing should require human intervention and want to continue using multi-factor authentication to publish to the npm registry. This led to building the wait-for-secrets GitHub Action. It prints a URL in the build log and waits for secrets to be entered using a browser. Once entered, the workflow continues, and secrets can be used in future steps. The latest release of "eslint-plugin-react" to the npm registry used a one-time password (OTP) from a GitHub Actions workflow! https://ift.tt/X27Sgbx...
Monday, December 5, 2022
Sunday, December 4, 2022
Saturday, December 3, 2022
New top story on Hacker News: The Truth Matters and Secular Humanists Should Defend It
The Truth Matters and Secular Humanists Should Defend It
27 by peanutcrisis | 8 comments on Hacker News.
27 by peanutcrisis | 8 comments on Hacker News.
Friday, December 2, 2022
Thursday, December 1, 2022
New top story on Hacker News: Ask HN: Was I pwned?
Ask HN: Was I pwned?
62 by wasipwned | 56 comments on Hacker News.
A few days ago, I noticed that my home network performance would degrade substantially to the point of being unusable. I would just power-cycle all my switches, and the issue would resolve for a while. It happened again this morning, so I decided to try to look closer at what could be causing the issue. That's when I noticed that my Linux desktop was doing a lot of traffic, and here's what I observed: - My desktop has a private IP address, let's say 10.0.0.2. - Running `iftop`, I saw all the traffic coming from a different source IP address, 10.0.0.3. It was transferring ~300Mbps. - Running `tcpdump`, I saw that all of this traffic was going to a public IP address (AT&T). All of the source port/dest were ipsec-nat-t. - I saw that `10.0.0.3` showed up as a client on my switch with a randomized MAC address (presumably, since I couldn't find the MAC prefix in a vendor list). - I could not find any references to `10.0.0.3` or the random MAC address on my desktop (looking at kernel logs, system logs, ip a, ifconfig). - During this period, my network was degraded (high packet loss across my switches). It was at this point that I decided to try blocking the MAC address from my switch, and performance immediately returned to normal. I tried unblocking the MAC a few minutes later, but it has yet to return. That plus the fact that the issue happens at seemingly random times (especially the middle of the night) makes me think that it's not automatically connecting and instead being triggered remotely. I've since disconnected my desktop from the network and am in the process of rotating keys. I'm especially perplexed at the traffic showing up from a different source IP on my desktop, but I did not see any interface that matched. I tried to look and see if it was potentially a VM running, but I didn't see anything in virsh. I did have Docker containers running, but I assume I would have seen the IP address show up on one of my interfaces. I'm at a bit of a loss and was wondering if anyone has ever seen anything like this before, and if there is any suggestions for things I should check.
62 by wasipwned | 56 comments on Hacker News.
A few days ago, I noticed that my home network performance would degrade substantially to the point of being unusable. I would just power-cycle all my switches, and the issue would resolve for a while. It happened again this morning, so I decided to try to look closer at what could be causing the issue. That's when I noticed that my Linux desktop was doing a lot of traffic, and here's what I observed: - My desktop has a private IP address, let's say 10.0.0.2. - Running `iftop`, I saw all the traffic coming from a different source IP address, 10.0.0.3. It was transferring ~300Mbps. - Running `tcpdump`, I saw that all of this traffic was going to a public IP address (AT&T). All of the source port/dest were ipsec-nat-t. - I saw that `10.0.0.3` showed up as a client on my switch with a randomized MAC address (presumably, since I couldn't find the MAC prefix in a vendor list). - I could not find any references to `10.0.0.3` or the random MAC address on my desktop (looking at kernel logs, system logs, ip a, ifconfig). - During this period, my network was degraded (high packet loss across my switches). It was at this point that I decided to try blocking the MAC address from my switch, and performance immediately returned to normal. I tried unblocking the MAC a few minutes later, but it has yet to return. That plus the fact that the issue happens at seemingly random times (especially the middle of the night) makes me think that it's not automatically connecting and instead being triggered remotely. I've since disconnected my desktop from the network and am in the process of rotating keys. I'm especially perplexed at the traffic showing up from a different source IP on my desktop, but I did not see any interface that matched. I tried to look and see if it was potentially a VM running, but I didn't see anything in virsh. I did have Docker containers running, but I assume I would have seen the IP address show up on one of my interfaces. I'm at a bit of a loss and was wondering if anyone has ever seen anything like this before, and if there is any suggestions for things I should check.
Subscribe to:
Posts (Atom)