Preferences

kyrra
Joined 9,800 karma
I do payment things. Feel free to contact me at <username>@<username>.net.

The opinions stated here are my own, not necessarily those of my employer.


  1. This was well talked about in Hyrums Law, which came from a Googler as well.

    https://www.hyrumslaw.com/

    > With a sufficient number of users of an API, it does not matter what you promise in the contract: all observable behaviors of your system will be depended on by somebody.

  2. Prepaid credit cards tend to be a very common fraud vector (very similar to gift card scams).

    For chargebacks, the merchant has to pay at least a $15 fee on every chargeback, regardless of the outcome of the result. It's why many merchants prefer for you to contact them and ask for a refund rather than going through the chargeback process. For small purchases, merchants tend to just refund rather than dealing with an angry customer that's going to charge back.

  3. You're assuming the deal was anti-competitive. A lot of the time, the process is the punishment.
  4. Chargebacks or disputes will lock your account, so definitely stay away from that path.

    But just closing the bank account will stop auto billing (it's considered a decline). So if you closed the account, it would just stop paying for whatever it is, and then cloud may lock the gcp account until it's paid. (I'm not 100% sure what cloud does with unpaid invoices).

  5. You've never tried to free-range raise your kids then. Some friends in our neighborhood had the police called on them for riding their bikes around the block, and the cops followed the kids back to their front door and then talked with the parents.
  6. Side projects that aren't a conflict of interest when working at Google is rather limiting. Likely less so for small companies.
  7. The problem is that proper legislation is a balance of interests and working through the details of the policy. If you put "abortion" on the ballot, what would that mean? There are a ton of different possible policies on what is or is not permissible.
  8. This. You can disable all smart features (which includes things like mail categories, AI auto-complete, and most things that look at your emails).

    Gear -> All Settings -> General tab (default) -> Smart features: Turn on smart features in Gmail, Chat, and Meet

    Linked help page: https://support.google.com/mail/answer/15604322

  9. They have around at least 3000 commits, assuming this search is right?

    https://github.com/search?q=repo%3AFFmpeg%2FFFmpeg+%40google...

    And they have done large pushes in the past: https://security.googleblog.com/2014/01/ffmpeg-and-thousand-...

  10. The biggest for me: merge-conflict as first-class state within JJ.

    I regularly have multiple commits being worked on at a time across different parts of the codebase. If I have to sync to head (or any rebase) and one of my side branches that I'm not actively working on hits a merge conflict, I don't have to deal with it in that moment and get distracted from my work at hand (ie: I don't need to context switch). This is a big productivity win for me.

    If you want some other points, check out: https://fallthrough.transistor.fm/43#t=0h31m5s

    Some points from the episode:

    * With no separate index vs commit, (everything is just a commit), you don't need different commands and flags to deal with the different concepts, they are all just marked together. In JJ, if you want to stack/stage something, it's just a normal commit (no reason to have different concepts here).

    * You don't have to name/commit a change at all. Every time you run any JJ command (like `jj log`, or `jj status`), it will snapshot the changes you have. This means that if you want to go work on some other branch, you don't have to go and commit your changes (they auto-commit, and you don't have to write a description immediately), then update to master branch and start working again.

    * Or you can just `jj split` (https://jj-vcs.github.io/jj/latest/cli-reference/#jj-split), and split a working changeset into 2 separate commits.

  11. This talk is focused on JJ within Google.

    This is a Google-internal only GA. JJ is available externally just fine. Google is mainly a linux-dev shop, with all other platforms being second-class citizens.

  12. The "dig" command can get them for you

    $ dig ycombinator.com mx

      ;; ANSWER SECTION:
      ycombinator.com. 300 IN MX 20 alt1.aspmx.l.google.com.
      ycombinator.com. 300 IN MX 10 aspmx.l.google.com.
      ycombinator.com. 300 IN MX 20 alt2.aspmx.l.google.com.
      ycombinator.com. 300 IN MX 30 aspmx4.googlemail.com.
  13. The original port was slower because it was a near straight transpile impl of the original C compiler. It didn't do anything to try to speed things up, they went for correctness first. Then in subsequent releases they worked on speed improvements.
  14. Semi related: there is an active proposal of having a go OS Target of "none" (or noos (No-OS)).

    https://github.com/golang/go/issues/73608

    Sounds like they want to maybe include https://github.com/usbarmory/tamago in the compiler.

  15. But there is a lot of C, C++, and Java in the world.

    It also helps in a mono-repo to help control access to packages. BAZEL makes it so you can't import packages that aren't visible to your package.

  16. Copy/paste:

    7 things all kids need to hear

    1 I love you

    2 I'm proud of you

    3 I'm sorry

    4 I forgive you

    5 I'm listening

    6 RAID is not backup. Make offsite backups. Verify backup. Find out restore time. Otherwise, you got what we call Schrödinger backup

    7 You've got what it takes

  17. But if that request is going to a large provider (GCP, AWS, CloudFlare), without the hostname, the request is going to be close to meaningless for the snoop.
  18. My point was replying to the OP who said:

    > I dont get how you US guys can live in an environment were your next door neighbor, the person beside you in the supermarket etc can carry a lethal weapon that can end your life.

    Knife killing can happen for the every-day citizen that doesn't have a security detail. The OP is scared about the neighbor having a weapon to kill them with... and every household already has one in the kitchen.

    If you are scared about being killed in a given society, it's more likely a cultural problem rather than a tool problem. Yes, guns make it easier to do. The question is, why are more people doing it now adays? What changed?

    Go back a few decades, and you can find plenty of kids in highschool in the US that would keep rifles in the back of their truck in the school parking lot. They would use those guns to go hunting after school. They weren't being used to shoot eachother.

  19. Has there been a case where a single person killed hundreds with a gun? The worst I know of is the Vegas shooting, which was 60. There have been mass-stabbings that have reached ~30 people killed (https://en.wikipedia.org/wiki/Mass_stabbing#Examples_of_mass...).
  20. This is a pipe dream. Advertising always has existed and always will. It comes and goes in different forms, but people like selling things they make or services they provide. Without a way of getting those things in front of people, nothing new could come to light.

    I agree that some sites make advertisements a massive eyesore, but that's a problem that can be solved in other ways.

  21. One example: Merge conflicts can be submitted as a proper entry and dealt with later: https://jj-vcs.github.io/jj/latest/conflicts/
  22. Try `jj`, as others have mentioned. It's being built by the team that built/maintains fig, and the are porting all their learnings into that.
  23. They did a interview 2 weeks ago about this on the changelog podcast with Sugu Sougoumarane, the co-creator of Vitess, who is at Supabase now. Watching the competition year will be interesting

    https://youtu.be/y1aq8RsnJeI

  24. Protobuf has a text and binary format. https://protobuf.dev/reference/protobuf/textformat-spec/

    Google uses it a lot for data dumps for tests or config that can be put into source control.

  25. Microservices don't make it any better. They tend to have a lot of implicit contracts that people don't necessarily express well through the API. All it does is give you a boundary that is fuzzy depending on the protocol used to communicate between the services.
  26. From the source: https://cloud.google.com/blog/topics/threat-intelligence/voi...

    > The instance was used to store contact information and related notes for small and medium businesses. Analysis revealed that data was retrieved by the threat actor during a small window of time before the access was cut off. The data retrieved by the threat actor was confined to basic and largely publicly available business information, such as business names and contact details.

This user hasn’t submitted anything.

Keyboard Shortcuts

Story Lists

j
Next story
k
Previous story
Shift+j
Last story
Shift+k
First story
o Enter
Go to story URL
c
Go to comments
u
Go to author

Navigation

Shift+t
Go to top stories
Shift+n
Go to new stories
Shift+b
Go to best stories
Shift+a
Go to Ask HN
Shift+s
Go to Show HN

Miscellaneous

?
Show this modal