Hacker News new | past | comments | ask | show | jobs | submit | gnoack's comments login

It is not the Debian package maintainer stepping down here, but the project maintainer.


This is the project that maintains the user-facing documentation for Linux itself.

Anyone who does system administration on Linux, who uses the command line, or who programs in C is relying on this documentation.

Also, it is not the Debian package maintainer stepping down, but the project maintainer.


I think this is a big misinterpretation of that Alan Kay quote, which was in response to https://news.ycombinator.com/item?id=11941656 - the author of that comment aims to create a programming language with a focus on "data processing".

Alan Kay has long wanted to "get rid of data" in programming, as described at http://userpage.fu-berlin.de/~ram/pub/pub_jf47ht81Ht/doc_kay...

The entire discussion that this Alan Kay quote is from has always been about the prominence of "data" as a central concept in programming, not about other aspects like privacy or "big data".


How about this quote instead, then?

>"Big data" is a way that a lot of people are trying to make money today, and it's a favorite of marketing people because it's in the wind. ... But in fact, the interesting future is not about data at all, but about meaning, and Stephen[ Wolfram]'s demos showed you a thought which most people in the computing world haven't had, which is "What if my programming language actually knew something". And, in fact, what if my user interface actually knew something? Not like Siri, which "knows" things, but what if it actually knew about me, and what if it actually knew about the contexts in which I'm trying to do things? That's an example of a leap. That set of ideas is actually old, and it was funded back when a lot of leap ideas were funded, and when the funding went away many of those ideas that weren't realized by about 1980 just haven't been worked on since, and that's something that'd be interesting to talk about.

"The Future Doesn't Have To Be Incremental": https://www.youtube.com/watch?v=gTAghAJcO1o

Not that I necessarily agree with the article's concludions, but if the thesis is supposed to be that Kay disagrees with how we use big data today as a jumping-off point for reexamination, then this and the reference to Likleider's communicating with aliens problem work just fine for me.


I've read the article and the original thread, and I don't see at all how the author is "misinterpreting" Kay.

Maybe there is some confusion in terms of, which of the ideas in the article are the author's and which are Kay's. But the author does appear to understand that Kay's original discussion had a very different context, and does make statements of this nature:

> Kay was likely gesturing to a different reason data might be a bad idea. I’ll address that in a moment.

And overall I'm struggling to see anywhere I think Kay's original meaning is being misinterpreted or misrepresented. Can you point to a passage?


In "UNIX - A History and a Memoir", Brian Kernighan is telling the story of doing that in 1972 (chapter 4.5, about "Grep")

    grep '^[behilos]*$' /usr/dict/web2


This does not necessarily deserve to be imitated, but it is an experience that definitely stood out in my memory in how unusual it was: the dsmc backup utility. The tool boggled me enough at the time that I wrote about it on my weblog:

https://www.unix-ag.uni-kl.de/~guenther/unix-tools-for-real-...


The things you can make a startup from these days... I just use a one-liner in my ~/.XCompose file...

    <Multi_key> <e> <m> : "My Complicated Name <my.complicated.email@gmail.com>"
(Yes, this works on Wayland too)


Bash aliases for specific ssh hosts are seldomly needed, you can just as well configure hostname aliases in your .ssh/config file


Helpfully modern ssh, at least 7.x IIRC, can handle Include statements in the main config. You need to put includes before any host configs you have in the main config file lest it think the include is part of a host's configuration. But this makes managing cloud host configs for instance much easier.


In the mid-2000ds, there eventually came a time when the xlock (Ex-lock) screen locker disappeared from the last university workstations that still had it. People routinely got puzzled when they could not run it. It was a fun prank to tell them that Ex-Cee-lock was the replacement for it (which would, of course, run the clock application). :)


Xlocking workstations became a problem at our university. People would claim a workstation, lock it, go do something else (lunch, lecture) and then come back to their reserved workstation. So the admins added a button that you could log someone out if the screen had been locked for more than half an hour.

They didn't want to ban xlock because they cared about security.


> So the admins added a button that you could log someone out if the screen had been locked for more than half an hour.

In our CS labs the PCs re-imaged themselves on boot⁰, from a choice of OS images¹, so you didn't have to worry about causing corruption of the machine by just power-cycling it to get around the locked status. This meant that locking a workstation to reserve it didn't work.

My workaround to that² was to set the wallpaper which displayed behind the unlock prompt to an image of a bluescreen indicating a hardware error and move the window containing the lock prompt to the for bottom right of the screen, so it was just a single pixel and not easily noticed. Hey presto: a locked machine that no one wanted to claim by restarting because it looked faulty. Obviously anyone with half a brain watching me unlock the machine a short while later would immediately work out the trick, so the knowledge spread soon enough and the ruse stopped being as effective. It was very effective for a while.

--

[0] from the same shared network drive, which was initially a problem (this was the first year that lab had been in operation) if several machines re-imaged at the same time as head thrashing caused IO throughout to fall through the floor. Later revisions of the setup helped by tweaking cache settings, and giving the server more RAM, so that the second and subsequent read of an image in a given period would come from cache, also the images were compressed for the same reason and also to reduce the second bottleneck: the glut of traffic through the server's single 100mbit NIC.

[1] usually just Windows NT and the local Linux build, but sometimes other options were present

[2] which I used very occasionally, partly to not be a dick but mainly so as to not give the game away to quickly


Windows NT could always remotely log out the current user when part of a domain. We had tools in place for our lab administrators to logout users if they found locked workstations. With Windows 2000 you could automate this through group policy


In high school I'd reserve workstations for my friends by unplugging the keyboard. The PC would fail to boot with "Keyboard not found, press F1 to continue" which was enough to get it designated broken and avoided.


I did this unintentionally in college once by switching the keyboard layout to Dvorak, which for some reason persisted across logins. I came back later that day to the same lab and the station I had been using was marked "Out of Order". Huh, that's weird. Sat down at the station next to it. Next day both of them were marked "Out of Order". Oh, huh. Is there something weird with the keyboard? I might know what happened...


> Keyboard not found, press F1 to continue

I don't know why this is so funny. Probably because it's a catch-22 since you need a keyboard anyway in order to press F1.


It's a poorly worded message, but the idea is that you press F1 after plugging in (or otherwise fixing) the keyboard.


I'm puzzled.

It is a good thing that this works with empty makefiles, and it has probably worked from quite early on. :)


Subscribed. I like this explorative approach.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: