Hacker Newsnew | past | comments | ask | show | jobs | submit | russellbeattie's commentslogin

We Californians are still a few hours away from Christmas, but hope you people living in the future are having a merry holiday!

Here's a really big one: TREE(3).

Linus van Pelt has entered the chat.

Fun tidbit: The Charlie Brown Christmas animators had Linus drop his security blanket when he said, "fear not".

(I'm an atheist, but as an official GenXer™, I could almost recite this speech from memory.)


There's a third option: Ambivalence.

Any major documents/files have been removed all together. Then the rest was farmed out to anyone they could find with basic instructions to redact anything embarrassing.

Since there's absolutely zero chance anyone in the administration will ever be held accountable for what's left, they're not overly concerned.

The thing that I've been waiting to see for years is the actual video recordings. There were supposedly cameras everywhere, for years. I'm not even talking about the disgusting stuff, I'm talking security for entrances, hallways, etc.

The FBI definitely has them, where are they?

What about Maxwell's media files? There was nothing found there? Did they subpoena security companies and cloud providers?

The documents are all deniable. Yes video evidence can now be easily faked, but real video will have details that are hard to invent. Regardless, videos are worth millions of words.


> "Software architect Grady Booch is the Chief Scientist for Software Engineering at IBM Research Almaden and a trustee of the Computer History Museum. He offers the following observations about the Photoshop source code."

OMG. Booch?? The father of UML is still around? Given that UML is a true crime against humanity, it just goes to show there is no justice in the world. (I want a lifespan refund for the amount of time I spent learning UML and Design Patterns back in the bad old Enterprise Java days. Oof)


I completed a CS degree just a year ago, and they absolutely wrecked us with UML. I’m still recovering mentally.

UML used to be a staple of job interviews.

It was going to be the future of Software Engineering in the 2000s, Software Architects laying out boxes for Software Bricklayers to implement as dictated, code generation tools were going to make programming trivial.

For trivial CRUD apps, and maintaining modified versions of the generated code was a nightmare.


I was drawing UML before Christmas vacations, when one works at scale, drawing boxes to discuss implemenations works much better than throw away code.

It is also a great way to document existing architectures.


This AI hype cycle reminds me of that era.

On the contrary, UML is quite useful in enterprise architecture, and I am yet to find an alternative that isn't much worse.

It is like the YAML junk that gets pushed nowadays in detriment of proper schemas, and validation tools we have in XML.


Hard disagree. The code is the spec. The code is the spec. The code is the spec.

Yeah, that is why the code always meets user expectations.

User expectations are not the spec, they are what the spec aspires to.

Yeah, if only developers had bothered to validate the spec before diving straight into coding.

HN being down makes you start wondering about the differences between routine, addiction, compulsion, and habit.

I want to preface this by noting that as an adult, I totally understand the intent behind LOGO, its use as an educational tool, and understand its historic place in computer history.

But as a pre-teen kid in the early 80s? I hated LOGO! I thought it was a baby language and I wanted to get back to doing cool stuff in BASIC. Ten year old Me thought LOGO was soooo dumb - you couldn't make a video game, so what use was it?

It seemed every year we'd have a grade school class using LOGO - for a math lesson, or an art project, or an "intro to computing", etc. I was always a classic 80s young computer nerd snob about it.


We did LOGO then some sort of watered down BASIC. Both were incredibly useless to my education because at no point was any serious attempt ever made to teach that these were the tip of any sort of computer programming iceberg. We were simply given lessons and assignments and told to things and we just did them without understanding what we were doing. At least with math they had some example applications for everything they taught us.

I have less than zero nostalgia for either.


You could peek and poke with LOGO... At least the one I used.


I'm now completely torn! I always return carts just out of habit as a nice thing to do, but I totally see this as a legitimate reason not to return them! I never worked at a grocery, but I have worked at other jobs where there was that one task that got you out of sight of management so you could take your time and mentally relax for a while. Taking the trash to the dumpster way out back, restocking the walk-in fridge from the basement, etc. It was less about not working, as it was about the freedom.

Then again, they still have to go out to the cart return areas to collect them which takes time, so in that sense leaving carts around just makes their job a bit harder. Hmm. Not sure now!


Leave the carts wherever you will and pull the fire alarm as you leave; free break for everyone!

I assume the issue is apparent.


> "Opinions on his coding style are divided, though general consensus seems to be that it's incomprehensible."

I wholeheartedly concur with popular opinion. It's like writing a program in obfuscated code.

Hmmm... his way of basically making C work like APL made me wonder: Is there a programming language out there that defines its own syntax in some sort of header and then uses that syntax for the actual code?


In racket, you can say something like "#lang X", which can modify the reader and let you create your own arbitrary syntax


forth and lisp?


This shouldn't be a product, but a licensed patented technology like Dolby or CDMA, sold to OEMs and directly integrated into cameras and phones.

It should be an industry standard system for guaranteeing authenticity by coordinating hardware and software to be as tamper proof as possible and saved in a cryptographically verifiable way.

No system like this would be perfect, but that's the enemy of the good.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: