Hacker Newsnew | past | comments | ask | show | jobs | submit | deepsun's commentslogin

AFAIK, in Google it was the other way around -- their main blob storage (BigTable) is built on top of GFS (distributed filesystem).

You have that backwards. GFS was replaced by Colossus ca. 2010, and largely functions as blob storage with append-only semantics for modification. BigTable is a KV store, and the row size limits (256MB) make it unsuitable for blob storage. GCS is built on top of Spanner (metadata, small files) and Colossus (bulk data storage).

But that's besides the point. When people say "RDBMS" or "filesystem" they mean the full suite of SQL queries and POSIX semantics-- neither of which you get with KV stores like BigTable or distributed storage like Colossus.

The simplest example of POSIX semantics that are rapidly discarded is the "fast folder move" operation. This is difficult to impossible to achieve when you have keys representing the full path of the file, and is generally easier to implement with hierarchical directory entries. However, many applications are absolutely fine with the semantics of "write entire file, read file, delete file", which enables huge simplifications and optimizations!


"Politics is an art of distraction" (c)

All the fuss and constant bombardment of tweets is to distract from the Epstein files. And it works very well!


Interesting, manfrotto's website has a cookie notice with two buttons: ALLOW ALL and ALLOW SELECTION.

However, there's no selections -- there's only a description of hundreds of cookies they store (e.g. 73 in Marketing section), but there's nothing to select, it's only text.


There seems to be grey deny button at top-right on first view but it disappears if you select the details. You need hide the details first if you want to click it.

Thank you. ALLOW SELECTION is still a mystery though.

> The resource from “https://drajmarsh.bitbucket.io/earthsun.min.js?vpd-10161” was blocked due to MIME type (“text/plain”) mismatch (X-Content-Type-Options: nosniff)

> A word of explanation. I’m building tmplr for 4 platforms:

   > Linux ARM
   > macOS ARM
   > Linux x86_64
   > macOS x86_64
Oh, here we go again. Java was invented to solve that, "Write once run everywhere" :] I.e. `int` means `i32` on all platforms, no `usize`.

Java has numerous problems, it's not as simple as use Java not Rust. To be honest I actively avoid any tooling written in Java.

jAvA BaD!!1

Radio spectrum is licensed, and licenses are very expensive.

There are several bands for Amateur radio in US/EU/AU, but it is explicitly forbidden to use any kind of encryption on them. So no one can sell devices that use encryption on those bands.

And I doubt Iran was friendly to amateur radio in the first place. E.g. in USSR it was crazy to think of any non-approved radio.


I mean who can stop you from transmitting anything you want at any frequency? Licenses etc only matter when the rule of law is a thing.

It's trivially easy to watch the entire radio frequency range at once and triangulate the location of any transmission. If someone more powerful than you wants to stop you, they can.

Just curious what if the transmitter hops freq around? What is the tech to track these?

It's (scarily) available in the commercial sector[1][2] from space if you have the need to purchase their services.

Suffice to say, military and intelligence agencies are probably a few generations ahead of this and you won't find them commenting on strategic capabilities on HN.

1. https://www.he360.com/ 2. https://spire.com/space-reconnaissance


Thanks! Technically, what do you think is the biggest obstacle to achieve military grade hopping? Is it just cost, or something you simply cannot buy from open market AND cannot make one if you have the knowledge?

Military frequency hopping / spread spectrum isn’t really about preventing being noticed, it’s more about making it harder to jam. If you don’t have physical safety from the people “more powerful” than you who want to stop you, then they will still locate you easily and stop you using physical force.

Parent was asking about jamming protection (frequency-hopping, encryption) devices.

Once you transmitted, you’re exposed so the authority can find you sooner or later

Well yes but you could of course choose not to stay at the location you transmit from.

Yea, my far relative lived in China for several years. Showed me his Tiktok feed -- amount of "how bad it is in US" content is astounding.

Try to comply to an infosec standard. Typically one of many compliance controls are "every change must be reviewed and approved by another person". So no one can push on their own.

I know folks tend to frown on security compliances, but if you honestly implement and maintain most of the controls in there, not just to get a certificate -- it really make a lot of sense and improves security/clarity/risks.


Conversely -- declining countries usually have a lot of deep-pocketed customers, and mind less of whether their crimes go public. They also tend to care less of spending money in wasteful ways, as those money were easily earned.

Kafka is a distributed log system. Yes, people use Kafka as a message queue, but it's often a wrong tool for the job, it wasn't designed for that.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: