Hacker Newsnew | past | comments | ask | show | jobs | submit | otohp's commentslogin

This is a great idea. My problem is one of discipline ... to do it every day. And I dont know if that is a problem that can be solved by technology.


If you know you're not able to do something every day, design a process that does not require that you do it every day. "Discipline" is overrated: a way of people blaming themselves for their inability to solve anticipated problems with in-the-moment, resource-intensive strategies that nearly everyone is instinctively averse to, and thereby validating their disinclination to pursue structural solutions.


That's why I like https://www.timely.com/ since it records my activities automatically


I wrote a kafka connect single message transform (SMT) to remove PII fields embedded in json messages:

https://github.com/ferozed/mask-json-field-transform


I dont understand why you would want to run k8s on an embedded device on the edge? What problem is this solving?


I am an indian. I dont have any problems with filling out forms, or providing documents. As long as the process is well documented. But in india it doesnt work that way.

Even in the age of computers, some departments are printing forms using ink from the middle ages on paper from the egyptians. You require a prime lens attached to your eyes to decipher the 7point font on the form.


Claiming that we were colonised by muslims is not correct. Unlike the british, they did not rob india of it's treasure and take it away. You may not like it that it happened, but claiming that it was colonization is ridiculous.


> 1) the primary object of his invasion was to plunder India's wealth. India, at that time, was known for its wealth, particularly its gold and precious diamonds.

https://en.wikipedia.org/wiki/Indian_campaign_of_Ahmad_Shah_...


I think this might be because of the right wing of the Republican party that thinks that Google/Facebook etc are unfairly censoring their point of view. This action might be designed to cut them down to size.


Me - a graduate student in a university. Looking around on all servers on the network and found a program called "crack". it was designed to reverse-engineer passwords given a unix passwd file. I thought, what the heck, let me see if I can get some gems. SO I used yppasswd to download all password hashes, and ran crack on it. Needless to say, sysadmin found out in a couple of days, and suspended my account for 2 weeks :(


Good idea! I am a complete sucker for tracking down CS textbooks from my courses 20 plus years ago. And I like the hard copy versions. My outlook is, an engineer is known by the books he keeps.


My best career decision was to leave microsoft for a smaller company. Back then, there was a toxic culture at microsoft due to the dog eat dog review system they had in place. I was spending 60-80 hrs at work with a lot of stress. Ever since I left, I have been happy and have a good work life balance.


Matthew Green had a good post on what is wrong with PGP:

https://blog.cryptographyengineering.com/2014/08/13/whats-ma...


GnuPGP can be used for a lot more than encrypted emails (the subject of that post).

Is there anything wrong with notaries being able to use GnuPGP?


No idea.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: