Hacker Newsnew | past | comments | ask | show | jobs | submit | scjody's commentslogin

I've suffered this several times over my now 25-year career, and the best answer I've found is therapy. Find a good[*] therapist and work with them, preferably every week, until you feel better.

[*] I like this definition of "a good therapist", from a book I read many years ago:

> Here’s what you should look for in a good therapist.

> Some good signs are:

> * Someone you know says this therapist has helped them with a similar problem in concrete ways.

> * The therapist offers a plan that focuses on helping you reach the goals you’ve set, and it’s clear to you how what the therapist does will help you reach your goals.

> * This therapist uses a variety of methods depending on your problem and who you are.

> * You have an ongoing sense that this therapist is more often than not helping you feel better in your life and helping your life work better.

> Some bad signs are:

> * There’s no change in your life or how you feel or what you do after four sessions, or things actually get worse.

> * The therapist seems uninterested in the concrete realities of your current life.

> * The therapist is focused exclusively on ways you’ve been damaged, instead of on your needs or strengths.

> * The therapist seems to have one all-purpose theory or “answer” that explains everything.

I hope this helps! Burnout is real, you're not alone, and I'm glad you're taking some steps towards recovery!


This dude named a Python data analysis library after a retrocomputing (Commodore era) tape drive. He _definitely_ should stop trying to name things.


If you want to get good at something you have to do it a whole lot!

I only have one regret from the name Datasette: it's awkward to say "you should open that dataset in Datasette", and it means I don't have a great noun for a bunch-of-data-in-Datasette because calling that a "dataset" is too confusing.


Spatial reasoning.

(But we're working on it.)


How would you test this? Claude will play Battleship with an understanding of ship geometry.


Are they really open weights? Ministral 3B is "Mistral Commercial License".


Yeah the 3B are NOT open. The 8B are as they can be used under commercial license.


"commercial license != open", by most standards


too late to edit now. I was completely wrong about open-weights.

The meme at the bottom made me jump to that conclusion. Well, not that exciting of a release then. :(


Even the anthropomorphism argument doesn't hold up under close scrutiny. When I was in high school I was asked to memorize several poems, including a few that are under copyright today. If I regurgitate one of these poems and present it as my own, this clearly infringes copyright, even if I no longer recall where the poem came from or who wrote it.

How is what OpenAI is doing with NYT stories any different, other than the architecture and substrate of the neural network?


Was your memorizing it infringement?

I'm all for policing the outputs of generative models and enforcing copyright on their usage.

I am very much against ruling that their training is infringement.

A model which uses old NYT articles to learn the relationship between words and concepts which turns around and is used to identify potentially falsified research papers for review should not be prevented from existing.

If the model is used to reproduce copyrighted material - by all means the person running it should be liable.

This would create a ML industry around copyright identification as a pre filter before outputting (ironically requiring training on copyrighted material to enforce).


Does anyone have experience with a competitor that they like? Ledgy?


Pulley is mentioned a few times in the thread; seems legit but again I'm curious if anyone here has used any of these alternatives.


We have a lot of clients who happily use Pulley. I believe they are a YC company themselves. I don't have a dog in this fight. But there are plusses and minuses to these various solutions. Carta is not the be all and end all.



As well as the hurdles pointed out in the article, their Article 15 process (starting here: https://digitalerantrag.ksv.at/Dip/?request=auskunft-nach-ar... ) requires an Austrian mobile phone number. Personally I'd like to exercise my rights under Article 15 (since I am an EU citizen) but I don't have an Austrian phone number.


Time to request my data by email! I got ChatGPT to write me this, and submitted it using https://www.ksv.at/en/company/contact

Subject: Request for Personal Data Access Under GDPR Article 15

Dear KSV1870 Data Protection Officer,

I hope this message finds you well. I am writing to formally request access to all personal data that KSV1870 holds about me, in accordance with my rights under Article 15 of the General Data Protection Regulation (GDPR).

Please note that I am an EU citizen residing in Ireland and have recently encountered difficulties in accessing your web services due to the requirement of an Austrian mobile phone number, which I do not possess. This limitation has prompted me to directly reach out via email to exercise my rights under the GDPR.

To assist you in locating my data, I am providing the following personal details:

    Full Name: [Your Full Name]
    Date of Birth: [Your Date of Birth]
    Address: [Your Address in Ireland]
    Email Address: [Your Email Address]
    Any other relevant identifying information: [Any Other Relevant Information]
Under GDPR Article 15, I am entitled to receive a copy of all personal data that you hold about me, as well as additional information about how my data is processed. My request includes any data collected, stored, or processed by KSV1870, in both electronic and physical formats.

I would appreciate if you could acknowledge the receipt of this request and provide an estimated timeline for a response. According to GDPR guidelines, you are required to respond within one month of receiving this request.

If you require any further information from my end to facilitate this request, please do not hesitate to contact me at [Your Contact Information].

Thank you for your attention to this matter. I look forward to your prompt response.

Sincerely,

[Your Full Name] [Your Contact Information]


Yes, this is happening to me too. Last time I successfully edited a Google Sheet was this morning around 8 AM, and now (6 PM) it's broken. My "storage" page shows 18.86 GB of 28 GB used, and I have no idea what's going on.

Sorry I don't have a solution here, but at least we're not alone.


I deleted about 400 MB of files using the "Storage" page in the left sidebar of my Google Drive ( https://drive.google.com/drive/u/0/quota ) and now I can edit my Sheet again. My "storage" page in settings (https://drive.google.com/settings/storage) still shows 18.86 GB of 28 GB used.

Honestly, I regret ever signing up for the product that is now "legacy G Suite". It's been a rough experience over the years and there doesn't seem to be an easy way to migrate from this product to a regular Google account. (I looked into this back when they were threatening to discontinue the product.)


Just don't call it a war dog! Boston Dynamics might get upset.

https://www.bbc.com/news/technology-56182268


> [Boston Dynamics] warned that if the "spectacle" goes ahead, Spot's warranty might be voided, meaning it could not be updated.

Wait, so they reserve the right to void your warranty if you use their product to make art?

I remember there was a case where a company bricked someone's device because they left a bad review[0], but having companies judge the artistic merit of their customers' use cases seems somehow even more dystopian.

[0] https://www.techrepublic.com/article/iot-company-bricks-cust...


We've been shipping a Docker-based app to customers for years, and every now and then one of them runs a security scanner on our images. I have yet to see a scan that isn't a disaster of false positives (for the reasons outlined in the article and more!)

One of the craziest recent examples was a scan using a tool called Twistlock. Many of our images are built from an upstream image that may have outdated apt dependencies, so one of the first things we do is upgrade them. Twistlock flagged _every instance_ of this because "Package binaries should not be altered" (in other words, between subsequent layers in an image). I am baffled how anyone at Twistlock decided that this was a useful thing for their product to detect, or why any Twistlock customer trusts it given issues like this.


> I am baffled how anyone at Twistlock decided that this was a useful thing for their product to detect, or why any Twistlock customer trusts it given issues like this.

If I was injecting something malicious into your containers via updates, this is exactly how I would go about doing it and exactly what would catch it.

What I'm seeing here is that Twistlock and other tools don't reliably do a good job of explaining why something is flagged in a way that's understandable and accessible to developers. Though honestly I've yet to find any approach to informing developers that actually works.

My favorite was giving them a clear link in the error message about why the build was failing and how to fix it.


It flags that because it could indicate someone got onto your system and injected their own code or changed machine instructions at the binary level, which is a pretty common way to get a remote shell.

It is annoying to have to mark false positives, but that's just the nature of the beast when it comes to being thorough about security. More annoying with this check than when you update packages in a container image instead of starting clean is that this same technique is often used to compare hashes of packages managed by an installer versus what is actually on disk, and thus flags every single package in a JIT-compiled language that caches byte code on disk as altered.


It’s because they’re implementing the feature so they can show a CISO a big scary report and say “good thing you paid us - otherwise you wouldn’t have known!”

If they were serious about build errors they could use the built-in features of APT, YUM, etc. to only report binaries which don’t match the canonical distribution’s hashes, as has been standard sysadmin practice for aeons.


I have used Prisma Cloud / twistlock. The tampering detection is only useful for detecting changes to running containers, not for changes to binaries between layers. The latter is just dumb and causes anti-productive false positives like above.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: