For the best experience on desktop, install the Chrome extension to track your reading on news.ycombinator.com
Hacker Newsnew | past | comments | ask | show | jobs | submit | history | aeonik's commentsregister

Well damn, I didn't know about this until now, and I could actually use one.

Is there any alternative?


I've had reasonable luck with microsoft's windows media center remote receivers and lirc. Although they don't all work the same. The first one I got was easier to use than later ones...

And frustation with atsc 3 and the media landscape led to me abandoning my htpcs.


I've used Flirc

eBay

I think those people are around, they are just not rewarded by this kind of system. They can propose plans and fixes, they just don't get implemented.

“Simplicity is a great virtue but it requires hard work to achieve it and education to appreciate it. And to make matters worse: complexity sells better.” - Edsger Wybe Dijkstra

Great resource. I'm building a basic version of this in my basement DIY style. Not going to get to industrial levels, but I think some fun experiments are to be had.

That article is making a narrower claim than you're implying. It argues that NAT is not a security mechanism by design and that some forms of NAT provide no protection, which is true.

It also explicitly acknowledges that NAT has side effects that resemble security mechanisms.

In typical deployments, those side effects mean internal hosts are not directly addressable from the public internet unless a mapping already exists. That reduces externally reachable attack surface.

So, the disagreement here is mostly semantic. NAT is not a security control in the design sense, but it does have security-relevant effects in practice.

I personally do consider NAT as part of a security strategy. It's sometimes nice to have.


Both of those articles are actually wrong. They say "if an unknown packet arrives from the outside interface, it’s dropped" and "While it is true that stateful ingress IPv4 NAT will reject externally initiated TCP traffic" respectively, but this is in fact not true for NAT, which you can see for yourself just by testing it. (It's true for a firewall, but not for NAT.)

The biggest security-relevant effects of NAT are negative. It makes people think they're protected when they aren't, and when used with port forwarding rules it reduces the search space needed to find accessible servers.

I agree it can be a useful tool in your toolbox sometimes, but a security tool it is not.


Does the terse notation of Iversonian languages lend itself well to algebraic manipulation or rewriting (like beta reduction)?

Is there a way to play previous puzzles?

I am planning on adding that feature as well in the near future, thanks for trying it out

No problem.

Advice. Make the scoring more like http://enclose.horse/

Score should be correct out of incorrect but medals for perfect, almost perfect, and some cutoff above.

I missed one fold on the hard one (but 3 points due to this), and only 1 star feels a little harsh to me.


you are right, and that has been bugging me from the start and never got to fixing it. I tweaked it a bit to make it hopefully make much more sense now. Also I didn't know enclose.horse, and loved playing it, so thanks for pointing it out and for the nice feedback.

I added the archive feature, would love to hear your feedback on it as well

Works great very seamless.

These puzzles are great! Simple and effective.

I wonder if the engine could be adapted for origami. :)


I thought fascist was the literal opposite of this. Where the population is indoctrinated and is more embedded into war machine. They kinda become one.

Vanilla authoritarianism, or other forms of government don't need approval from citizens. Oligarchy, monarch, etc... but at the end of the day, even a dictator needs to keep some critical level of people happy.

Classic CGPGray series on this:

https://youtu.be/rStL7niR7gs?si=3LmAGcWjeVWumxsz


North Korea is protected and bordered by China. Big difference with Iran.


Only slightly more than Cuba is "protected" by the United states.

It's more of a "don't F around in my back yard" statement directed at anyone who might than it is a protection deal.


I am not sure what your point is?

My point is the US at one point had taken the entire Korean Peninsula, and was pushed out by an initial push of hundreds of thousands, then over a million Chinese troops.

The reason tht US hasn't invaded North Korea since is because China won't allow it.


I disagree, the language itself is one of the more elegant parts of the system, and enables a lot of the rest of the elegance.

From a purely programming language theory, it's pretty unique.

I once tried to find a language that had all the same properties, and I failed. The Factor language is probably the closest. But they are still pretty different.


The relevant programming paradigm is string/term rewriting, which is featured in other programming languages such as Pure. It seems to have few direct applications outside of symbolic computing itself, compilers and related fields such as PL theory. (Formal calculi and languages are often specified in PL theory as rewrite rules, even though the practical implementation may ultimately differ.)


Indeed, I think I messed up the language name too.

It was Kernel that was most similar with the fexpr capability.

Pure is a good example too.

https://web.cs.wpi.edu/~jshutt/kernel.html


Google mission statement is “to organize the world’s information and make it universally accessible and useful.”


Mission statements are only there to resonate with people, so that part is working. If the mission doesn't make money, they aren't gonna do it just because it matches a statement


Which Street View as it is, currently does. And is a phenomenal human achivement.

Adding a bonus 3D renderer on top is just a nice-to-have.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search:

HN For You