Hacker News new | past | comments | ask | show | jobs | submit | EddieCPU's comments login

@mathiasrw: "This is no surprise if you follow the wave of evidence for the electrical universe model .."

I disagree but can offer no opposing evidence, therefore I'm going to mod your post into oblivion :]


What does this mean for the long term evolution of galaxies, no need for dark matter?


No. The forces on stars from galactic magnetic fields are insignificantly small.


"Underestimating the dangers of designing a protection system"

https://www.youtube.com/watch?v=PlaMQBEg-9M

“In the course of the investigation, a new type of flight assistance system known as the Maneuvering Characteristics Augmentation System (MCAS) came to light. It was intended to bring the flight characteristics of the latest (and fourth) generation of Boeing's best-selling 737 airliner, the "MAX", in line with certification criteria. The issue that the system was designed to address was relatively mild. A little software routine was added to an existing computer to add nose-down trim in situations of higher angles of attack, to counteract the nose-up aerodynamic moment of the new, much larger, and forward-mounted engine nacelles.”

“Apparently the risk assessment for this system was not commensurate with its possible effects on aircraft behaviour and subsequently a very odd (to a safety engineer's eyes) system design was chosen, using a single non-redundant sensor input to initiate movement of the horizontal stabiliser, the largest and most powerful flight control surface. At extreme deflections, the effects of this flight control surface cannot be overcome by the primary flight controls (elevators) or the manual actuation of the trim system. In consequence, the aircraft enters an accelerated nose-down dive, which further increases the control forces required to overcome its effects.”


That sure is one hell of a privacy policy:

Information we may collect automatically includes information about:

access code , advertising IDs , apps and features you use , app usage information , clickstream data , connections to certain Services , connections to other devices , current software version , device model , device settings , Google Ad ID , hardware model , IMEI number , IP address , log information , MAC address , MNC , mobile network operator , non-persistent device identifiers , Personalized Service ID , referrer pages , sales code , search terms , serial number , subscription information , use of third-party websites , web browser characteristics , web pages you visit


Practically, a Smart TV is an oversize mobile phone that you use in landscape mode.

In that respect, all ad-supported revenue for a phone is extended to the smart TVs.


https://tech-insider.org/software/research/acrobat/8308.pdf

“The promise is that the existing machines could do the job much better-more easily, more efficiently - if software were better designed.”

'Vista 8'


Invoicing large companies can also be very lucrative.

https://www.cnbc.com/2019/03/27/phishing-email-scam-stole-10...

or

Running a long company, that's where you set up a company and legitimately trade with other companies, all the while raising your credit line. Then place a massive final order and disappear.


This is better to do with identity fraud. Nobody will tell you if you have additional bank accounts open or business accounts opened under your name. (Its easy for the business to not be created under your name, but its bank account is easier and cheaper to get with the ultimate owner not being a nominee)

Thats the real value of all these Equifax dumps, nobody cares about messing up your credit and freezing it is useless.

The person in the invoicing scheme got caught because they invoiced under accounts opened under the own name with the bank, that investigation took two seconds after the subpoenas went out. Between a network of formatted identities for sale and pre-breached windows computers in the same zip code, you can process anything under anyone’s identity and never raise flags with the payment processor, login alerts, or credit reports.


I would have thought a scripting language would have been a better choice than unit files. The script engine would take care of verifying the script and starting the processes in the correct order and allowing/restricting access to other components. Thereby negating the need for such directives as After= or PrivateTmp=.


Unit files are one of the things systemd got right.

A scripting language isn't well suited for process management, which is a very well specified task.

Now, if you mentioned https://ammonite.io/ you might have got my attention...


> Joyeux Noël :D

Seeing as I was born on Christmas Day, I got only the one present, which I figured as cheating. My parents said the one present would have to do :]


Joyeux Noël et joyeux anniversaire :)

My son was born on the 26th and he is not happy either.


Well DOH!


“An intruder could also access live camera footage from all active Ring cameras associated with an account, as well as a 30- to 60-day video history, depending on the user’s cloud storage plan.”

If its stored in the Cloud, then it ain't private.


Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: