Hacker Newsnew | past | comments | ask | show | jobs | submit | 2014-05-29login
Stories from May 29, 2014
Go back a day, month, or year. Go forward a day, month, or year.
31.Poll: Unban TempleOS?
100 points by jacquesm on May 29, 2014 | 87 comments
32.We picked the wrong lawyers for our first startup (gymsurfing.com)
96 points by kevinbracken on May 29, 2014 | 84 comments

Not only can you get a good idea of age from a name you can generate names that match age and sex. I have a niece who recently did a science fair project where she used Markov chains seeded with U.S. census data over the last hundred years to create new names. With about 90% accuracy people could tell if a fake name was from 100, 50, or <10 years ago and the sex.

An interesting side note was that she put in a simple profanity filter but in all of her trial runs it never picked up any "fuq" or variant names.

Edit: Here are sample boy names: Shill Flay Roshard Per Coll Milius Madfrego Derry Fer Fordy Carlel Marler Rommyronance Jord Felwooke Rott Luper Bent Zekin Othen Nolanterry Jerarton

Here are some girl names Esalessie Rine Nolenn Alynna Myrtinet Faybeciline Aline Orassabenda Phina Dorgia Lideleaste Beara Sonilinn Judelia Monangeora Jarnina Geleene Emozellyn Maudra Verta Lortis Fret Kathoph


The thing that leapt out at me the most strongly from this article is how none of the laundry startups appear to actually do any laundry. They all outsource that work to other companies, like the one mentioned in the article, Wash Then Fold -- companies that tilt heavily towards being run and staffed by immigrants, who do the actual work involved with cleaning clothes while the white-kid startups grab the headlines.

That seems like a really precarious position for those startups to be in. First there's quality-control: the #1 thing that's going to wreck your relationship with a laundry customer is if you mess up their clothes, and if all the clothes-handling is outsourced, how much can you do to prevent that from happening?

And second, if all the value you bring to the table is a thin layer of code over someone else's service, at some point that someone else will just write their own app and cut out the middleman. "Climbing the value chain," the MBAs call it -- start off as a provider of outsourced services to companies whose executives' noses are too high in the air to do their dirty work themselves anymore, and then slowly shoulder those companies out of the way by establishing direct relationships with their customers at a lower cost. It's a strategy Asian hardware OEMs have been pursuing with success for decades -- there's no shortage of people who used to be IBM and Dell customers who are Lenovo and Asus customers now.

35.What the Head of Hiring at Google Doesn’t Understand About Skills (chronicle.com)
89 points by ilamont on May 29, 2014 | 125 comments
36.Emulating a 6502 with cycle-perfect timing (xania.org)
84 points by mattgodbolt on May 29, 2014 | 20 comments
37.Bayesian A/B Testing (lyst.com)
81 points by Peroni on May 29, 2014 | 20 comments

What gets me is that Google employees like JohnMu (in the following thread) are actually telling authors to hide large portions of their sites from Google's indexer, in order to prevent all their pages from receiving penalties for "low-quality" content:

https://productforums.google.com/forum/m/?hl=en#!mydiscussio...

That feels like a step back from Google's stated mission to "to organize the world’s information and make it universally accessible and useful":

http://www.google.com/about/company/

Apparently, only the information that maximizes search advertising revenue is worth organizing and making accessible. I understand that fighting SEO spam is an important part of keeping search usable, but there must be a way to do it that doesn't lead to completely cutting out large parts of the "indie" web (e.g. posts in discussion forums, and other sites that host user-generated content).

39.Wait-free queueing and ultra-low latency logging (mortoray.com)
81 points by mortoray on May 29, 2014 | 55 comments

As painful as it may be to acknowledge, Node is clearly here to stay.
41.Skylon ‘spaceplane economics stack up’ (bbc.co.uk)
75 points by timthorn on May 29, 2014 | 52 comments
42.APL Demonstration From 1975 [video] (youtube.com)
71 points by colinprince on May 29, 2014 | 7 comments
43.World War II in the Pacific, narrated by my grandpa (soundcloud.com)
74 points by upwardbound on May 29, 2014 | 44 comments
44.The Soylent Revolution Will Not Be Pleasurable (nytimes.com)
79 points by adriand on May 29, 2014 | 173 comments
45.Mojolicious 5.0 released: Perl real-time web framework (kraih.com)
71 points by kraih on May 29, 2014 | 22 comments

Your niece is cool.

Actually, the reverse happens far more often. If a company manages to insert themselves between you and your users, they can then work their way down the value chain and replace you as a supplier. It works both ways and typically the company with the direct consumer relationship has the advantage.
48.Applying Artificial Intelligence to Nintendo Tetris (meatfighter.com)
67 points by jackhammer2022 on May 29, 2014 | 6 comments
49.Bye Bye Passwords (shopittome.com)
67 points by tylerg on May 29, 2014 | 59 comments
50.Typography in 16 bits: System fonts (2011) (damieng.com)
56 points by maaarghk on May 29, 2014 | 2 comments

One of the built-in models in the Wolfram Language does precisely this:

   In[1]:= Predict["NameAge", "Gertrude"]
   Out[1]= 84

   In[2]:= Quartiles @ Predict["NameAge", "Gertrude", "Distribution"]
   Out[2]= {62.8975, 74.7389, 84.8247}
More info about Predict and Classify here:

http://reference.wolfram.com/language/ref/Predict.html

http://reference.wolfram.com/language/ref/Classify.html


They are doing it. If you have a slow connection and the video start to buffer a lot, there is a banner that appear right under the video linking to the video quality report. I saw it yesterday
53.The GHC Runtime System [pdf] (stanford.edu)
63 points by mmastrac on May 29, 2014 | 9 comments

I'm not rich or single so I am really not the target market here. But something about this feels really gross. I can't figure out how this was allowed. I've lost all sense of what is and isn't acceptable these days. It seems to change daily. It feels like not too long ago a couple guys lost their job for making a joke about dongles and forking. I fail to see how that was worse than this.

Note that this concerns the subset of security research that involves actively talking to computer systems owned by other people, presumably in production, on the public Internet.

Most security research does not in fact work this way. Consider, for instance, virtually any memory corruption vulnerability; while it was once straightforward (in the 90s) to work out an exploit "blind", today, researchers virtually always have their targets "up on blocks", connected to specialized debugging tools.

I am a little surprised that we are only now hearing about high-profile researchers getting dinged for actively scanning for actual vulnerabilities in other people's deployed systems. It has pretty much always been unlawful to do that.†

(These are descriptive comments, not normative ones. My take on unauthorized testing of systems in production is complicated, but does not mirror that of the CFAA).

It's for this reason that you should be especially appreciative of firms, like Google and Facebook, that post public bug bounties and research pages --- those firms are essentially granting permission for anonymous researchers to test their systems. They don't have to do that. Without those notices, they have the force of law available to prevent people from conducting those tests.

(Background, for what it's worth: full time vulnerability researcher, started in '94.)

Caveat: it does depend on the vulnerability you're testing for. There are a number of flaws you could test for that would be very difficult to make a case out of. But testing deployed systems without authorization is always risky.


So women make up 18% of new CS degrees and Google's staffed at 17%. Blacks and hispanics make up under 5% of CS degrees and at Google they make up 3%. Close the ticket, it's an upstream problem.

I barely made it through this article. After the 10th minute of pushing through my tears to read, I had to resolve that nothing would stop me.

On HN we dream big. And we all agree that we can dream big and maybe hit it big. Imagine what it feels like to realize at a young age that you DONT get to go after your dreams because you are missing the tools. Imagine what it feels like to believe something is wrong with you because you talk to yourself sometimes. Now get back to starting your company.

And yet, you can be happy to commute, to have co workers, to have some freedom from our parents.

58.Interview with TrueCrypt developer (2005) (wolfmanzbytes.com)
56 points by quasque on May 29, 2014 | 1 comment

“you’re a chick, leave this crap to REAL developers”.

I really don't understand guys who say (or think) shit like this. Honestly, it annoys me not so much because it's sexist, or misogynistic, or bigoted or whatever, but rather because it's fucking stupid.

I've been doing this stuff professional for around 20 years now, and I've worked with oodles of female programmers over the years, and I've never seen any reason to believe that female programmers are in any way less competent than their male counterparts. None. Zero. Zilch. Nada.

It really boggles the imagination... where do these guys come up with this shit? Making crude jokes, sexually charged statements, some of these other things I can understand (that doesn't make them right mind you, I'm just saying I can understand the place some of it comes from), but I can't even begin to understand a mindset of insinuating that women are less capable as developers/hackers/programmers/whatever.

To anybody who believes that women are somehow inherently inferior at coding, let me just say that you're wrong. Absolutely, totally, completely wrong. Maybe you haven't worked with enough women, or maybe you had the bad fortune to work with the wrong women, or maybe you just weren't paying attention, but it's just not true.

60.What I’ve learned in my first year as a college dropout (jessepollak.me)
54 points by aruss on May 29, 2014 | 15 comments

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: