Hacker News new | past | comments | ask | show | jobs | submit | ganis's comments login

What cloud are you using? My VMs in the cloud are being backed up by a service called snapshooter since I am using DO.


Why presume they are using a "cloud"?


Intel dominated the CPU market for decades, so it's surprising to see them in their current position after being outpaced by AMD in just last several years. How did this happen?


The CHIPS act is about fabs. AMD has none.

In principle, Intel Foundry is open to customers - so AMD could make processors using Intel fabs now. It seems Nvidia will to an extent.


OP here, if you have any comment or suggestion please deliver it to me. Thanks a lot!


Hi everyone, I'm co-founder / CEO of Joyvite. Joyvite is basically referral program as a service.

I’m happy to have any feedback you may have! Thank you!


Hey Ganis. I reckon there must be a typo in your header "Customers" as opposed to "Costomers"


Hi tixocloud, thanks for the correction. I have fixed it!


Great points, but I think you misunderstood it. The way HN rank them is the exactly same. The different is in presentation, points in comments are hidden while in stories aren't.

Can you elaborate why comments and stories are 2 different things? I think stories are just like comments but presented in different websites.

Maybe HN should allow users to downvote stories as well? Since some are complaining about their quality.


Comments are usually written off the cuff, and take place within the context given by the story.

Stories are usually more considered (yes, I know people link to tweets sometimes, personally I find that tiresome). They make their own context and are often (mostly?) written by people who haven't heard of HN.

Also, I think you misunderstand my usage of a "ranking system" --- it includes not only the method of crunching the numbers, but also the way the votes are solicited.


I think it's impossible to have deduplication (a system to prevent duplication) in encrypted data with different key for each user (the same file from different user will be encrypted differently) without dropbox storing the key (to decrypt back). Which means they have access to the files. We should know this from the very beginning. If it wasn't, how to check the files for deduplication? Enlighten me please.


Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: