Hacker News new | past | comments | ask | show | jobs | submit | more teepo's comments login

That’s a good analogy. They are both platforms. The accelerators for things like Java, MQ, databases, are built in to the platform.


Yep, cloud is really just an infinitely scalable mainframe.


Combine low ARPU with perceived risk (in the wake of the Vegas hacks last year) and a termination for convenience clause and this is a no brained for Caesars. There’s just not enough upside for Caesars to host in their marquee properties.


im really sure you have found the answer, it’s most likely more of a perceived thing than any of us wants to admit. DEFCON attendees can be walking stereotypes at times anyways, but the combination of drunk, low yielding hacker(wo)men(tm) roaming your hotel probably just made the juice not worth the squeeze.


> termination for convenience clause

I never heard of this. Can you tell us more?


an good example from an us gov standard contract is here https://www.acquisition.gov/far/52.249-2

It's basically "a no harm, no faul" termination of an existing contract, and is fairly common in competitive markets where there is no long term strategic partnership to develop an unique product.

If it's the buyer terminating it's either because the product is either no longer needed or an cheaper supplier was found, and if it's the seller it's caused by all sorts of resource optimization reasons(aka someone being willing to pay more for the same limited resources, or an increase in cost making unprofitable).


I think the point was that the application includes the source attribute of the data.


so crediting prior work is the novel thing done by the AI?


This is a great idea. Hopefully this gets more attention and resources. You're really well positioned to fill a gap in the ecosystem.


The virtue signaling put me off as well. Although I'm not sure it's specific to America.

The data is the data, and the way it's phrased with "kept out" and "lifted out" both to say the same thing which as I understand the data is that each of these groups were either over or under the poverty line as a result of the incentives. Adding extra weight and flower to the movement is a distraction with the intent of persuasion.


It’s virtue signaling to say that policy shifts brought a million+ kids back under the poverty line? Seems like pedantry. If the data is the data, then the statements in the article are either correct, misleading or false.


Time to leverage IBM Cloud KYOK model. You need level 4 especially if you're using 3rd party: FIPS 140-2 Level 4 certified HSM

https://cloud.ibm.com/docs/hs-crypto?topic=hs-crypto-faq-bas...


That's not quite accurate based on the filings. Rather it should read that ARM has existing agreements with a number of companies, Amazon, Apple, Samsung, even Nvidia.

The ARM architecture is so ubiquitous that everyone wants a piece. I kind of think of ARM as a DMZ: The business model of licensing IP to a broad range of clients means that a lot of companies have a vested interest in ARM remaining a neutral party. We've seen with Nvidia and others that ARM isn't a clean acquisition target, so now everyone gets a place at the table, and thus license security for the long term. It's a bit similar to OpenAI, and how I think that in today's market, no regulator would allow a major tech company to acquire them.


I'd never heard of the term DMZ used in a computing context. For those like me who didn't know, it does mean De-Militarised Zone


It has been used in the context of firewalls forever.

https://en.m.wikipedia.org/wiki/DMZ_(computing)


And by "forever" it is meant ~1994; see Cheswick and Bellovin (§3.1):

> Up to this point, we have used the words “firewall” and “gateway” rather casually. We will now be more precise. A firewall, in general, consists of several different components (Figure 3.1). The “filters” (sometimes called “screens”) block transmission of certain classes of traffic. A gateway is a machine or a set of machines that provides relay services to compensate for the effects of the filter. The network inhabited by the gateway is often called the demilitarized zone (DMZ). A gateway in the DMZ is sometimes assisted by an internal gateway. Typically, the two gateways will have more open communication through the inside filter than the outside gateway has to other internal hosts. Either filter, or for that matter the gateway itself, may be omitted; the details will vary from firewall to firewall. In general, the outside filter can be used to protect the gateway from attack, while the inside filter is used to guard against the consequences of a compromised gateway. Either or both filters can protect the internal network from assaults. An exposed gateway machine is often called a bastion host.

* https://en.wikipedia.org/wiki/Firewalls_and_Internet_Securit...

* https://archive.org/details/firewallsinterne00ches

Ingham and Forrest wrote a good history of firewalls:

* https://www.cs.unm.edu/~treport/tr/02-12/firewall.pdf


Are there any historical examples of such a company - ubiquitous yet still a small fish, slightly troubled corporate history, but too important to be acquired by someone else?


Great find! I really dig these circular stories that shape the electronics history. The story behind ARM has always fascinated me. The search for low power with efficiency kind of seems like the holy grail of the time. The Acorn story reminds me a lot of the Po Bronson novel "The First $20 Million Is Always the Hardest: [1] 1. https://www.goodreads.com/book/show/306422.The_First_20_Mill...


have you considered that maybe the hyperscalers and other massive cloud storage solutions (apple, comcast, AT&T) leverage tapes in this manner? I suspect if you're using something like AWS Glacier, you're using "someone else's robotic tape library"


Multi cluster management that separates the control plane from the worker plane. So it's like a RYO managed K8s service. Now you just need to get a full time SRE team to take care of what Red Hat, GCP, AWS, IBM Cloud SRE teams do for you today in any of the managed container platforms.


Sounds similiar to Karmada, which we use at EdgeNode.com

https://karmada.io/


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: