Preferences

CodeWriter23
Joined 3,739 karma

  1. The Jobs I and Jobs II eras at Apple prove it is constructive.
  2. The Bozo Explosion is in full force at Apple now. They should bring Forstall back. Engineers need to be be humiliated for making stupid decisions.
  3. Why would one want to do that instead of using claude-zai -c from the start? All this is pretty new to me, kick a n00b a clue please.
  4. LDIR? We used DMA for that.

    I was referring to LODSB/W (x86) which is quite useful for processing arrays.

  5. "Oddball string instructions", as an assembler coder bitd, they were a welcome feature as opposed to running out of registers and/or crashing the stack with a Z-80.
  6. I seem to recall Musk saying something about OpenAI being over-valued/under-funded earlier this year. Of course he was summarily booed off the stage by the startup crowd.
  7. Costco. Go to a supervisor in a red vest and ask what other Costco has the item that has stocked out and you'll see. No idea what the backend is but the app they use is a terminal emulator that looks straight out of the late 80's.
  8. It was probably pretty loud
  9. > The fact that they didn't do enough research doesn't mean it's okay to scam them, though.

    True, if one does not mind risking the Orange Jumpsuit scenario

  10. First OpenAI, then WordPress and now this. I think we are learning there is a point where VCs using open source become allergic to it. My only suggested solution at this point is to be honest about it. Because only then can solutions emerge.
  11. The author does not dispute devices were found. Author expresses a belief it was controlled by a criminal enterprise. Author then claims to understand the intent of said enterprise.

    The pattern: 1. Corroborate fact. 2. Pose plausible cause of fact. 3. Present unsubstantiated claim as fact.

    Sounds like propaganda to me.

  12. If there's a known vulnerability (which is the case to the best of my knowledge) that can be exploited by an enemy to bring harm to American forces, that would be the very nature of protected National Security Information.
  13. Heh, back in my day we used character sequences like >*< and <*> to animate and ran the whole game on an 80x24 ASCII terminal.
  14. Best practical application of glue stick ever!
  15. > The way they can afford to make it cheap for people who can't pay is by charging high prices for insured Americans

    Well, fuck that. I'm already paying $24K annually for my health care that covers about half of anything short of a catastrophe.

  16. Thanks, appreciated.
  17. > You can find more info and the launch video at the listed URL.

    Maybe I'm a complete dumbass but I could not find a video at any of the URLs on this post using Chrome under Sonoma.

  18. Maybe they should simply stop fighting against survival.
  19. I don't get it. Even in the late 80's we had these devices called "speaker phones" that facilitated remote meetings.
  20. FatBits was life altering for me.
  21. There's plenty of other public information. The FBI was searching his house for undisclosed reasons, so most definitely they have some kind of investigation open on him. And his degrees were issued by universities in Nanjing and Shanghai, China, strongly suggesting he is a Chinese National, perhaps naturalized to the United States.

    That was known at the time of my post.

    We now also know now at the time of his escape, Indiana University had terminated his Professorship. And has continued to disavow he and his wife.

    I did not misuse Occam's razor, my knowledge of public facts simply exceeded yours.

  22. Occam’s Razor suggest he was exfiltrated.
  23. Nah, that’s a malfunction of your reading comprehension.
  24. That's the thing about exigency, it is temporary.
  25. Acts in public are not protected. This, however is:

    "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

  26. "primary", I hope as a commenter out here you understand what that means.
  27. > This spreadsheet was the primary data file

    >> - as crappy as that is, thats pretty common.

    No. This is not a common practice. An Accounting / ERP system with full audit trails and data entry compliance is. Exporting data from such a system into Excel for analysis is. But Excel as the [re-reads] Primary data file is not a practice at all.

This user hasn’t submitted anything.

Keyboard Shortcuts

Story Lists

j
Next story
k
Previous story
Shift+j
Last story
Shift+k
First story
o Enter
Go to story URL
c
Go to comments
u
Go to author

Navigation

Shift+t
Go to top stories
Shift+n
Go to new stories
Shift+b
Go to best stories
Shift+a
Go to Ask HN
Shift+s
Go to Show HN

Miscellaneous

?
Show this modal