Hacker News new | past | comments | ask | show | jobs | submit | fatdog's comments login

This talk is a rare example of what I would call beautiful thinking.

If I interpreted that correctly, implementing a turing machine in CGoL that runs CGoL was delightful.


There could be a diversity effect in their data, given demographic changes as a consequence of immigration patterns, relationship to authority, and cultural attitudes toward alcohol.


Gladwell has written a predictable hatchet job of a perceived libertarian hero. Surprised that it was him, not surprised it was done in the NY-anything.

More interesting question is: if one were going to orchestrate a pseudo-intellectual takedown of the forces of popular discontent, who would one go after next?


Can't say for what/where, but, yes. Use it to super-scale work of human analysts who evaluate the quality of some stuff.


Work in software, key problem in my industry is a lack of leadership.


We started StartupCTO.io as a way to address this. We saw the same lack of support for CS grads thrust into leadership, so we're doing something about it.


decision :: ([slides], hope, naivety, GSachsClient) -> greaterFool

naivety = foldl hope slides

map naivety GSachsClient

ah who am I kidding, I could never get the hang of monads anyway.


Fascinating. Just reading about probabilistic data structures in general, and would like to know if there is an efficient general method for generating statistics about the FN rates. Are they related to ROC curves?


I haven't looked into the relationship with ROC curves.

I'm not sure of an efficient general method for generating statistics. I know empirically testing the structures is the easy way. For Bloom Filters which evict old data, you can calculate the probability of FN by calculating the probability that a given element is a duplicate but reported as distinct.


Bloom and cuckoo filters are designed to have zero FN rate, at least classic ones. Caches and these filters are basically inversely related. One has no false negatives, the other no false positives.

In the vast majority of situations where false negatives are okay you're much better off just caching a hash of each object traditionally


Can we train up a sentiment analyzer on the delta between the stories and comments this week vs. all others, and then apply it to discovering "political discussion?"


What is hilarious about "general problem solving skills," is that when you actually master something with instruction, the person who teaches it to you tends to tell you the reason something works in a specific way is because of the general principle at work. Actually doing things gives you general problem solving skills.

A lot of people believe, "everything happens for a reason," but people with practical experience don't need to believe that because they know everything happens for a reason: it's called "the cause."

Apprenticeships are the most valuable education anyone can get, but the practical aspects fly in the face of pseudo-intellectualism that passes for modern non-STEM scholarship.


>A lot of people believe, "everything happens for a reason," but people with practical experience don't need to believe that because they know everything happens for a reason: it's called "the cause."

Yes. It's all in the formulation. It's not for a reason, but because of a reason.

Using "for" is misleading and puts the horse before the cart: If you went to a café and met the love of your life, it's not "you went to that café for you to meet the love of your life", it's more "you met the love of your life because you went to that café".

I don't exclude the existence of things beyond the limits of my knowledge, though.


What kind of mobile filesystem wipers and SIM wipers are available?

I use Signal for txts, and while I believe it does not store plaintext txts on the SIM card (haven't analyzed it), SSDs strew cleartext data all over the place. Border guards using a disk imager like EnCase or something similar would get significant fragments of browser and communications history.

Key thing is if you have an iPhone, don't use TouchID, or as I call it, "Apple Bad Touch," because they can just hold you down and run your finger over it.

It's best to travel with a burner. Maybe we need a cyanogenmod image that includes a "duress key" like TC had, and old RSA tokens, but if there is anything on your phone that could be used against people you know, don't take it across borders.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: