One year ago, my girlfriend was using Evernote (on my suggestion) to write her travel journal on our trip to Southeast Asia. I saw her note sync a bunch of times (the iOS app shows a little blue arrow when it's uploading). But one day she opened it and the note was gone. I contacted support but they couldn't do anything. (They offered her a year of free Premium service and "apologized for the inconvenience".)
Since then, I've stopped recommending it to people because I don't want to feel personally responsible if they lose notes too. I also have a tinge of doubt every time I record important information. My biggest worry is Evernote quietly losing a note, because once I record something in Evernote I typically push it from my internal memory.
On top of that, their iOS app is incredibly slow. When I want to quickly jot an idea down, it's very inconvenient.
I've started using SimpleNote lately, which is far faster, but I don't know to what extent I should trust it to keep my data safely.
I was able to get the note back by driving back to my hotel, retrieving my laptop where the note was cached, and opening Evernote while offline to ensure it wouldn't sync and wipe out that copy. Pretty frustrating. I've learned some tough lessons about cloud services and free stuff.
The iOS app is slow and clunky. I hate using it. It crashes all the time, especially when I'm trying to take snapshots of a document with many pages (and all previous snapshots simply disappear).
The desktop app is better, but they really could improve the writing experience. Pasting HTML blobs is impossible, and so is formatting my notes the way I want (I use TextExpander for sanity).
Evernote is great when it works, but they really need to fix their stability and bug problems.
But even putting aside these syncing issues, it's a really terribly-designed piece of software There are so many issues with it, UI-wise, that is just bugs the hell out of me. (See note below for an example of a feature designed badly).
Still, Evernote fills a need I have that unfortunately there is no other solution for. And while it's taking a long time, it is gradually improving. So I'm still hoping that, one day, Evernote fulfils its destiny and becomes as amazing as it could be.
Note: Example of a badly deigned feature: tagging support is crazy-bad - you can tag things, and you can even organise tags into a tag hierarchy - except, no you can't, because it's only supported on some platforms. And the "support" for it is purely visual - selecting a "parent" tag doesn't auto-select the child tags, so it is basically no help. So let's go to solution 2, which is to tag things with a prefix, like "History\Middle Ages" and "History\US". But now, their generally awesome tag-completer will be annoying, since it will force you to type "History\" before getting to the point. So lets reverse tag it, like "US (History)". No, that wont' work, since you can search tags by prefix (e.g. search for anything with a tag starting with "History") but not by tag suffix. Even though, through the UI, you can do this, you can't do it with an actual search, so you can't select these tags.
Since 2008, I am making my yearly Evernote migration attempts. So far, Evernote is not any close to the paper notebook + smartphone camera duo. On every account excluding possibly search, it is inconvenient, complex, slow and less reliable.
If core HWR functions of Evernote will be available as an one-button app in my phone (like Camera), that will be a really strong value proposition to me.
Otherwise, the value of notes depends on being within immediate reach (ideal: on the wall, open on the table). Every additional tap, click or wait-one-second halves the value of it.
Navigating a complex unreliable app, paying for it and worrying about privacy/reliability/bugs altogether makes it less than helpful for me, hence a no-go.
Their web clipper is great, the best around IMO (especially since Clipboard folded), however there's no way to exclude those clipped pages from search, so after using the clipper for a while, searching for just about any phrase is mostly irrelevant results. Ideally it'd be possible to filter by source or have default searches to exclude certain types of content.
Another example of this is that I have a well-curated and geotagged Travel Notebook (this was actually much harder than it should have been since their geocoder is picky and you can't really massage it). I'd love to be able to see these notes on a map, but the "Atlas" map view that Evernote provides doesn't let you filter by notebook (or anything really).
Evernote does a great job of making it fairly painless to capture notes and despite the author's problems, has generally worked well on syncing everything. It's never done a good job for triaging/filing/finding or organizing notes though, and it seems to simply get worse as you use it more (and with each redesign). Evernote seems to want to encourage you to put "everything" into it, but as you do, it becomes harder and harder to get what you need out of it. Honestly, I'm baffled at how the Evernote devs/designers use it.
One stop-gap they might be able to implement quickly would be a scale-up of their version control. They could throw money (storage space and bandwidth) at the problem, increasing the number and frequency of revisions stored. Certainly not as good as preventing loss in the first place, but reliable versioning would help minimize catastrophic loss in the meantime, and would still continue to be valuable once things are more stable.
"Update: Evernote CEO Phil Libin contacted me and we spoke about the issues described. He apologized, saying the post rings true and that there is a lot of work to be done both on the application and service fronts and that he hopes my impression will be reversed a few months from now."
It truly is in the face of the "do one thing and do it well" mindset that many other companies subscribe to. It's a shame too, because I love Evernote. I truly do live in it... true to Phil's vision, my mind is thoroughly mapped out throughout my Evernote account.
And yes, the OS X client is quite slow and bulky. And I really don't appreciate not being able to resize the window to half of my screen (1440x900) size.
Hopefully there's an OS X client overhaul on its way?
Has something in Evernote drastically changed over time, or did it just got more users? (= more testing under unenvisioned circumstances)
The latter aspect is the most intriguing because if Evernote is in fact evolving and not designing, they are vulnerable to being out executed by someone with good design principles. I sometimes wish I could look inside their system and see how it is put together, and sometimes I worry about what I mind find there if I did.
I no longer trust that they will always have all of my notes, so I started to back them up to Dropbox via the HTML export. But I'm lazy, haven't done it for a while.
Perhaps this is an opportunity for a new company to do what Evernote is doing, better. Automatic backups to Dropbox, lighting fast no matter how many notes stored, reliable and instant syncing, etc.
All developers know that feeling when using an app: you're dealing with something a little half-assed. Evernote has always had that feel for me. Switching over to something else, preferably based on flat files using something like Markdown, is on my to-do list.
Maybe that's why it takes so long to fix some of these issues?
The app is definitely getting better, and Skitch has come along leaps and bounds in the last 3-6 months.
Buggy sure, will they become the leviathan force if they fix the bugs, most likely.
Any good alternatives to Evernote?
I know this is no excuse for Evernote's app being at fault, but if something matters this much to you, you should not be trusting anyone or anything and the only way to stay safe is to have backups in multiple places. Might seem like a PITA but it is worth the effort.
Spurred by this post (nicely done, btw) I went and gave a look at what was inside my old Evernote account. Nothing. Everything's gone except the myriad folders and tags I'd added to help keep everything organized. It's a ghost town now.
I guess I don't really care the stuff is gone since I'd given up on the app long, long ago. Still, I can't help wondering what I'm missing, if there was anything truly important that marched in line & jumped off a cliff along with millions of other users' data.
 Mid-2009 according to my Evernote Account Summary page.
Though I can't find a reasonable substitute on Android. Most apps in this category focus on getting notes easily or on some to-do/calendar side, and very few has a good set of features to organize and navigate through a vast db of notes. Springpad has the same notebook/tags system and pays a good deal of attention to the organization part, but alas it is a web app with no option for private local notes.
What are some good Evernote alternatives?
Oh and most importantly, you host the data yourself - no verbose plaintext logs containing your sensitive data and no support calls. Org can also encrypt your Org files on-the-fly:
So I ditched it after that huge security incident by using cloudHQ to migrate to something else:
My fear with the desktop app is that a Evernote is killing it. It's a great app, though. Never let me down, not once. Never crashes, never lost a note. And it has more features, more flexibility in formatting, and the ability to have deep nesting of what Evernote calls notebooks. But the UI look & feel is very outdated.
Check it out. It's called Info Select from miclog.com.
is there a good alternative to skitch yet?
See companies like Samsung and Toshiba have "certified" stores that "take guarantees" but they are not tied by their parent company, they are privately owned stores that just negotiated with the parent company to use their "sticker".
I bought a Phillips shaver and under warranty, the Phillips station wanted me to pay 70% of the cost of a new one, despite being a DoA device.
So while the sticker works as it should in the US and Europe, South America has a god damn wild west scenario. Anything goes, and if you don't like it, buy something else. Yep.
(Source: I live in Bolivia)
That'd be a mistake across warranty docs between 1 and 5 years. Also some other products:
Seems a little odd though that support would go with an excuse like that. Is there more to the story?
Make a nice polite blog post with all of your documentation (including your sales receipt) and then send the link to him.
(Edit: by the way, most recent one was one of these - nice dev machine if you like Linux! http://www.dell.com/us/business/p/xps-13-linux/pd )
This is using the s/n in the image: http://bandyt.site44.com/toshiba/garantia2.jpg
Results of the s/n search: (from site: http://support.toshiba.com/warranty)
Model Name:SATELLITE C850DProduct Category:PortableModel-Part Number:PSCBQU-00200FSerial Number:YC307409QRegistration Number:827633Purchase Date:Nov 26, 2012Country Purchased:United StatesComplimentary Phone Support Through:Feb 24, 2013Warranty:Warranty expired! +++Warranty Expiration Date:Nov 26, 2013Primary Service Option:Out of Warranty Service ++http://toshibarepairservices.com
My work laptop (supplied by employer) was a Toshiba and had a 1-year warranty. After about 10-11 months of using it, the DVD drive stopped working. Toshiba's warranty support was typical ship-to-depot, so IT pulled the drive and sent the laptop off for repairs. I wouldn't ordinarily care about a laptop our for repair, but IT supplied me with a temporary machine that was at least a generation back (ie: slow and heavy).
IT got a message that except that my machine had been received at the depot but heard nothing else for weeks and weeks after. By the time I'd bugged a tech at my company enough to contact them the warranty had lapsed ... and Toshiba refused to service the machine.
Toshiba refused to service it for several more weeks. I finally took over contacting support from the IT tech, and got the machine serviced after a half-dozen (long hold-time) calls. But for the amount of time the IT dept & me spent getting an optical drive fixed our company could have paid for two new machines.
> In 1987, Tocibai Machine, a subsidiary of Toshiba, was accused of illegally selling CNC milling machines used to produce very quiet submarine propellers to the Soviet Union in violation of the CoCom agreement, an international embargo on certain countries to COMECON countries. The Toshiba-Kongsberg scandal involved a subsidiary of Toshiba and the Norwegian company Kongsberg Vaapenfabrikk. The incident strained relations between the United States and Japan, and resulted in the arrest and prosecution of two senior executives, as well as the imposition of sanctions on the company by both countries. Senator John Heinz of Pennsylvania said "What Toshiba and Kongsberg did was ransom the security of the United States for $517 million."
P.S. Consider yourself lucky to have such a bank. Here in the U.S., our major banks do not take security seriously by any stretch of the imagination (they have little incentive to).
To fix the bug you mention -- root access from phone -- perhaps you could use something like Yubikey Neo loaded with ykneo-oath. I was searching the code for ykneo-oath (it's a java applet for the small key) to see where the timestamp was used for the dates, but it appears to be part of the YubiOATH app: https://play.google.com/store/apps/details?id=com.yubico.yub... So you'd have to modify the app source (it's on github). The advantage, however, is that your secret isn't stored on your phone and vulnerable to root apps. Instead, your secret is on a mostly-offline key inaccessible from your phone. There's a YouTube video on how it uses NFC to get that OTP from the Yubikey when you need it. In case you're somewhat extremely paranoid, this might interest you. :) For the truly paranoid, you've found a way to disable account recovery methods while mixing time-based and counter authentication mechanisms ;-)
(To do that, you would have to install a new client on the victim's device that will increment its counter and tell you the counter when you ask.)
Some years ago I stumbled with something similar on a webpage, posted it on reddit, and the next day the IT manager of the company called me... it was one of the most embarrassing days of my life.
Lesson: don't mess with other peoples work just because you can...
> Theoretically, there is not much wrong with that.
Understatement in the finest tradition of man pages and RFCs.
(Disclaimer, I work with the guy behind it)
Personally these sorts of libraries just strengthen my opinion that golang really needs proper generics. However, if you're already gonna use Go they're pretty neat.
While personally I don't think I've ever used the LINQ monad syntax, and wish it had been implemented as a generic feature, not every language with support for anonymous functions or closures or function pointers is "LINQ".
To begin with, lawyers tend to see these clauses as essential protections and they are sometimes right. But, right or wrong, they tend to insist upon them, especially in the employment context. This explains their prevalence but, of course, does not necessarily justify their use.
Just to illustrate the cases where they truly are an essential protection, you and a competitor have been fighting for years in court over ugly and untrue things that someone has said about you or your company - non-trivial things that have really hurt you. When it comes time to settle that case, a continuing non-disparagement obligation will be not only helpful but essential to the resolution. The same is true in many other legal fights. When emotions have run high, and parties have antipathy toward one another, it is good practice to help ensure the peace after their fight has been settled to require that they not speak badly of one another and to give a simple mechanism such as binding arbitration to help resolve any follow-on dispute over whether they have done so or not. In such cases, there are excellent reasons to bind parties contractually to restraints on their ability to speak where they would normally be free to do so.
The employment context gets trickier because the antecedent acrimony that characterizes a legal fight may well not be present at the time of a termination and the question then arises: why am I being artificially muzzled? And there is a point to this: why be barred from speaking truthfully about a former situation even if it might be negative? why be at risk of a harassing lawsuit over what it means that something "may" reflect "negatively" about someone? why, in an age of easy communication through social media, be made to feel you cannot even speak about something that may have been a major part of your life, perhaps for many years? What may be seen as a throwaway item by some can be felt to be suffocating by others, and all the more so because it is tacked onto a token severance that gives you very little in exchange.
That said, I would say that the overwhelming number of employers and employees alike see these simply as throwaway items. They figure no one will care about such clauses except the lawyers. And, in most cases, they are probably right. The question then becomes whether one should not sign as a matter of principle or whether to just sign and take the money. Most employees take the money.
Of course, employees can push back if they have leverage. No one is obligated by law to sign a separation agreement. If the terms aren't right, and can be made right, then push back. Insist that the token severance be made more substantial. Or that non-disparagement, if it is to be included at all, be made mutual (it can be quite a head-ache for a large employer to keep control of its many people to ensure that none speak badly of you). Or insist that it be narrowed or clarified so as to reduce or eliminate vagueness about what may or may not be deemed disparaging. Or insist that it be coupled with other considerations that give you benefits apart from your normal final pay, etc. This sort of negotiation can make these clauses a big nuisance from the employer standpoint and may cause the employer simply to drop the clause. However, all of this assumes employee leverage, which doesn't often exist in the routine case, and so, as noted above, most employees simply take the money, accept the restriction, and don't bother to look back.
And so it all depends. For the author of this piece, this was a critical issue. For many others, it is not. Context is critical. And for all but trivial cases, do check with a good lawyer to understand the implications of what you are signing. If the risks are real, there is nothing worse that a harassing lawsuit from a former employer angry with you over some statement you made out of emotion. This is what gives these clauses a bad name and it is also what can make them dangerous. In such cases, be cautious about exposing yourself to such risks in exchange for some token severance. It is probably not worth it.
Whoop whoop whoop! This sets off giant alarm bells in my head.
It might be totally normal. That doesn't mean you should sign it.
It's also an older-than-dirt salesman tactic to say that something you just made up is "totally common."
Of course, the company can attach whatever clauses it wants to a separation agreement. You aren't entitled to a severance payment. I'll tell other engineers that two weeks' salary is a piddly amount for the company for you to surrender such rights. You can just walk away. They are the ones who want you to sign that.
(It's kind of ironic, but after you have been given notice you are fired, you have power. They want you to do certain things, and what are they going to do? Fire you? Already did that. Withhold pay? Illegal.)
I read a while back about a law firm that had evidently done something very dodgy - representing an inventor and the firm purchasing the invention at the same time. The engineers were eventually paid a settlement, but part of the settlement was a gag order - nobody was allowed to talk about what had happened or the amount of money paid. This included, of course, the press.
Now, what do you want to bet that well connected lawyers, upper managers, and so forth, are able to access the terms of this deal - even if they weren't involved? What are the odds that an inventor who approaches a law firm will know what transpired and why? The imbalance of information will put the inventor at an overwhelming disadvantage.
My gut feeling is that there is a third party in all of this - me. Well, me, and all the little people. I understand the need to enforce contracts within reason, but I'm having a tough time seeing my own personal interest, or the general public interest, in enforcing these "stay quiet" contracts.
I'd also point out that this isn't really a situation where we are prying into a private transaction and forcing people to talk. Our courts are actually enforcing the gag rule that keeps most of us in the dark about what is really going on out there. My misgivings about regulating private transactions aren't as strong when all we'd need to do is stop enforcing contracts that are clearly against the public interest .
 I am still thinking this through. I'm not absolutely sure this is against the public interest, or, even if it is, if we the courts should refuse to enforce the provision. It's how I'm leaning, but I have a sense that there may be more to this. I am generally glad that courts won't enforce certain terms of contracts, such as very long non-compete clauses and the like...
I want the right to do those things, but I don't actually want to do them.
Now of course, they always say, "Yeah, maybe not you, but somebody." To which I say, "That's why you took so long to check my references before hiring me. I'm no longer somebody. And if it mattered that much, you should have put it in the employment agreement so that I could have declined the job before taking it."
The only people who should feel morally compelled to sign no-disparagement clauses before accepting severance are people who are being fired for leaking confidential information on the job.
"This is a reminder not to let a digital world full of others moments deceive you into devaluing your own. Their moments are infinite yours are finite and precious."
For some time now, I've been spending the majority of my day jumping between Reddit, HN, and YouTube. Any time that I'm not on the computer, from the time I wake up to the time I go to bed (with a few exceptions), I'm listening to podcasts. Basically never idle, and rarely truly living my life - just endlessly consuming information in an attempt to fill the void.
I used to be a builder, living the high described in the post almost every day, but I've lost it somewhere along the way.
Something I hope to change. This post was a big kick in the pants for me.
And were slowly and deviously being trained to forget this.
Good article, yet the author seems to be making the same mistake so many make - to assume that our present generations are being eroded away and forgetting how to be productive because the masses are hypnotized by social media and news on demand.
If you stop for a minute and look at what's being spread via social media and TV/Internet news, you quickly realize it's the exact same things that hunter-gatherers probably spend 99% of their downtime gossiping about too: this person said that thing; this guy slept with that girl; this guy has so many resources and isn't that so unfair to the rest of us; the guys in charge of tribal society have secretly been spying on all of us, isn't that scary... social media and online news isn't changing anything more than the mediums we gossip through and making said gossip more permanent and apparent and less ephemeral and transitory than it's previously been. But just because it's still there doesn't mean people are spending much time obsessing over the gossips of yesterday; just like those in tribal societies, the news of yesterday is quickly forgotten, and soon supplanted by the urgent, pressing news of TODAY.
I'm pretty sure in Archimedes's or Newton's days most people weren't sitting around removed from society on their parents' farms inventing calculus, or holed up in towers devising calculating machines and giant ship incendiary weapons... rather, they were going to the county dance, swilling home-brewed beer with the neighbors, and gossiping about the same things we gossip about today: wasn't it scandalous how Ellyn was behaving with the men at the dance? Isn't it a crime how much the poor are taxed by the local lord, while he lives in luxury? How unfair it is that the law applies so unevenly between peasant and lord! Can you believe that Brom and Beatrix are fighting again?
Despite the very long period of leisure that medieval peasants had during wintertime, not a whole lot of scientific or technological progress came out of the peasantry. While I agree there's little more satisfying than building something yourself, I'd differ with the article in suggesting that the masses of people today are in fact no different than the masses of people of times past - a minority produces new things, while the majority handles the day-to-day of maintaining what we've already got, and spends its leisure time consuming the output of those producers who've successfully managed to produce things others want and/or things useful to those others.
Decided to write a bot at 8pm. Had it done by 3am (scraping, posting, scheduling, and all). https://twitter.com/NEWS_XX14
I know that high well. For me, especially for short projects (a day or a week), it's a giddiness, a literal shaking with excitement. Now I wish I could maintain that for a year long project.
Just built a side table out of white oak.
I suspect (like myself) many, many people are interested in the idea of setting aside time in their lives to spend creating, whether it's writing, cooking, building, crafting, photography, whatever.
I also think that (like myself) many people, especially in the age of the internet, blogs, twitter, facebook, etc, are essentially stopped in their tracks before they start, by a fear of (for lack of a better word) "publishing".
I wonder if we would be freed from our fear if we agree with ourselves to create, but without publishing. Write 500 or 1000 words per day, but don't publish it to your blog. Take a photo every day but don't post it to instagram.
The enemy of creativity is the inner censor ... and I wonder how many of us just need to be reminded that it's ok (indeed, arguably better) to create for nobody but ourselves.
(at least for the first 10,000 hours)
I'd like to change that this year. When he posed the question "What was the last thing you built that gave you that Builder's High?", I sure as hell couldn't remember much that I've built recently that gave me that feeling.
Not those kinds of "systems". It is funny, it seems initially it was meant to be those kind of "systems", and then it pivoted as we like to say, to become a "distributed-server-network-backend systems" not "hardware-kernel-OS" kind of systems. And then creators kinds of winged it and remarked how "well, that's what we meant when we said systems".
As for Rust, yeah, there are already a few projects trying to build a kernel or drivers in Rust. Here is one for example:
> lack of any intrinsic support for concurrency
An important part of an OS is that it implements support for concurrency - it builds processes and threads out of the raw materials such as page tables and timer interrupts. A kernel also builds its own spinlocks and higher-level waiting primitives. If you are relying on some high level language runtime to do the heavy lifting, is that really learning about how an operating system works?
For a kernel I actually see a lack of language support for concurrency as a plus. You need something to sit below the higher level stuff.
http://cm.bell-labs.com/who/dmr/chist.html also published in HOPL-II)History of Programming Languages II, Transcript of C Presentation, p692
(Nice to see Rust trying to bring progress to the C niche, BTW.)
The other thing is that I did an OS course in C, where we got dirty playing around in the depths of the Linux kernel, replacing the scheduler, writing a filesystem, and so on. It was damn hard, but probably one of the only courses in Uni that really pushed me as a programmer generally (everything else I found easy). I think that it really helps to have experience in unsafe languages like C, just like you really need to do at least a bit of assembly when you teach computer organisation.
If you are writing the operating system kernel, who is going to give you concurrency support? Does rust running on the bare metal still have "spawn" and the other concurrency primitives?
Also, I might like to add, PS4 toolchain fully supports LLVM- Clang. It might be wonderful if rustc starts running on it too...
I'd recommend having a look at Erlang, it allows you to start lightweight pseudo processes for concurrency and provides a robust data sharing model.
Not so sure about low level access, we used C for those parts in the OS course I took.
Lol what? Unless tasks cannot communicate at all, or they are scheduled entirely deterministically, how can the compiler eliminate race conditions? How can a compiler even determine what is a race conditions and what is intended non-determinstic behaviour.
So far I've made a career out of being a generalist. In my experience, companies of any size love having people like that. Specialists are valuable of course, but most of the time managers end up with a broad spectrum of problems and if they can throw problems to you without wondering if you can handle it, and feel confident it's going to get done, they probably don't care that you're only 70% as efficient as the specialist.
I'm not discussing any particular company here, but be aware that this has been known to happen before, and it will probably happen again. I hate to make age a factor [+], but in particular, if one is in one's mid-twenties, one identifies with this guy, one works for a company with enterprise software ambitions, and one's company has recently taken investment and hired the requisite team of industry veteran executives/VPs... well, I hope you're a founder. If you're not, consolation prizes are a) you're in the best hiring market for your skillset in the history of ever and b) you've probably got what it takes to me a founder next time.
[+] i.e. This is a description of the world, not the world I would like to be living in.
Also, I'm a little skeptical. It's very rare that people get fired while doing a really great job and being well liked. It's not impossible, but it definite smells a little unusual to my bs detector.
You joined before money was raised, and possibly got an oversized equity stake that is being clawed back. If you were supposed to have more than 1%, I'd consider it possible. If you were supposed to have 5%, I'd consider it a certainty.
If my guess is correct, you should talk to a lawyer. You may have options.
I have to commend you on the brutal honesty. I thought you weren't going to revisit what they said, but you did.
You also mentioned you were fired from another job but didn't provide details... just make sure you examine what happened in each case and there's not a pattern. All I mean is I've seen people have to leave a job for certain behavior, exhibit the same behavior in the next job, and remain in denial about it when confronted.
I disagree. I theory this might be true, but in practice, it's not. I'm often not the best X for a particular job/role/etc, but I'm the best they're going to find.
Perhaps especially in software, THE BEST in their field are already turning down work and forging their own paths. THE BEST developer in tech XYZ is not going to close down their startup or leave MS or Google or Amazon to come work for your company's 'agile' team.
I feel pretty strong that generalists have the edge in most cases, because they generally have a broader background and can see bigger picture stuff, often can see patterns of how different areas connect (code areas, business areas, etc). You certainly need specialists at some point, but rarely are those specialists the best in their field.
I've had a few phone calls with potential clients (and earlier, job negotiations) where people pulled this "we only look for the best XYZ people". At one point during a conversation I told someone (politely, I think) that I happened to know some of 'the best' people in the field they were looking for, and there was no way they were going to move across the country, take an 80% pay cut, and uproot their entire family to come work in some mid-level corporate dev team. On the other hand, I happened to be pretty good and would be interested in stopping by the next day in person to see if I could help solve their problem.
Actually, I've used that 'line' (not always the same words, but the same gist) on a few occasions, and in one case got me a foot in the door. It's more about delivery with a bit of humor, catches people off guard I think.
Which brings me to the point that you're telling you've built a successful new website, which boosted revenue.Now that the website is built and launched 2 days before, they are letting you go 14 days before Christmas.
I for one would be pretty upset and demand an explanation other than "a generalist". It seems like a rather rude and insensible act. To do that probably means they did not see anything in your skill set that you would be able to add more value to the company, and so they replaced you with a marketeer...
I must therefor conclude that your website was a one-page infograph with a sign-up button.
Sorry but the missing bits of information are frustrating, and given that I don't see why you shouldn't be pissed off.I would most likely lawyer up.There are some important bits of information missing to be able to make sense of your blog.
I also agree that the generalist/specialist saying from the CEO was in poor form and should not be taken too literally.
The important thing is not that what was said, or the firing, the important thing is that he's turning down offers.
Offers are what matter and give you leverage through every employment related negotiation.
I'm curious how the "you pick the rate" method is working out for you? The calendar on your site  still shows early December - does that mean you're no longer accepting clients this way?
I'd also love to know more about "Free Dev Time" (5 hrs/night). That seems like an interesting way to explore some new projects and technology without the hassle of estimates and contracts. And because you want to convert these people into paying clients, you've got some motivation to actually finish the projects you start for them, as opposed to personal projects that seem to fall by the wayside (for me, at least).
Great work, I'm inspired! And good luck with that plane flight. Looks like you'll have plenty of new work opportunities.
Hell - while you're in Chattanooga stop in at http://colab.co/. Their office is close to downtown. Find a project based out of Chattanooga and see if they'll pay for you to fly out every couple months!
Shoot me an email.
To the OP: Good luck to you. I hope you not only find business and get your ticket but also do a great job for those who hire you. I sincerely wish you happiness and success in your relationship and your work.
I then read this link given in the article and I think I understand better http://www.cs.cmu.edu/afs/cs/project/gendergap/www/geekmyth....
My takeaway is this: a lot of us feel impostor syndrome, feel that we'll never be a true hacker. The difference is it appears easier for men, for whatever reason, to ignore or move beyond those feelings. And you know maybe that's a problem we should take seriously.
>Despite these feelings of difference, we find that male students report less distress, are less affected by the perceived difference between themselves and their peers, and leave the major in smaller proportion; and despite resistance to total absorption in computing, they do not feel like frauds. The 36% of male CS majors who say they feel different from their CS peers, regardless of experience level or obsession level, do not question their ability to become computer scientists if they choose to do so.
I know the feeling, and (though I'm male) I recognize many of the waypoints described. And I, too, don't feel like a real hacker. But of course, the word means wildly different things to different people. Even though I love programming very much and I'm doing it all the time, and especially doing it for fun, it was only after joining HN that it dawned on me I could be considered a hacker in some circles.
Still, my primary definition of being a hacker is someone who is insanely active in hacker and cracker culture, someone very interested in systems security, someone who knows to debug a defunct DSL modem given only an oscilloscope and a bit of tinfoil. That's not me.
If I were to apply for a VC program that looks for hackers, I'd probably feel like a bad fit or a complete fraud. Nevertheless, I probably am a hacker. Labels are always an imperfect solution.
One other thing about getting people to program: Male or female, I wouldn't know where to start either. In school I was literally the only kid into actual programming, out of about 500 students. It was only much later in life that I made my first actual programmer friend, and I also recruited an unhappy English major into programming, but most people just aren't interested. And of those who can, and by necessity must, program most would never do it in their spare time for fun.
Sure, today hacking is "cool" .. because money, fame and power are cool and many hackers have achieved that. But until very very recently (last couple years), the only reasons a kid would start hacking were curiosity and having little else to do because they couldn't (or didn't want to) fit in.
With that in mind, this article disturbs me in a way I can't easily explain. Particularly when she describes feeling like an imposter "in the face of the desirable hacker stereotype" and even claims the nerdy clothes that hackers wear are in and of themselves exclusionary simply because one might choose to be more fashionable.
This is no different from her stereotypical "hacker" complaining about having to wear different attire to fit in at a school dance (or should he/she later choose to go into banking, law or any profession other than programming at a startup).
I went to a top high school, where academic excellence (grades, SATs, AP tests, what college you got into, etc) was definitely cool and admired. Even then, if you saw a kid hacking in the hallway (or painting or otherwise working on things completely of their own choosing) you knew that he/she was likely at the bottom of the social totem pole.
These very people are who pg was speaking to in many of his early essays like http://paulgraham.com/nerds.html
The fact of the matter is that a disproportionate number of the best hackers come from that population. Those who were the "cool kids" in high school may want in now, but they'll have to earn their place at the table. If that means working ungodly hours, having to change the way they speak or dress to "fit in" .. when in Rome ..
(please do not misinterpret anything I wrote as condoning sexism, which is despicable in any setting)
I wanted to use internet so bad but I was not allowed a computer so I always hung out at the public library and I wished more than anything to use the internet as much as possible.
I thought by asking how does the computer know when the 30 minute is up? There must be a timer! Can I prevent the timer?
Sure enough, for half a second there's a dos terminal in windows 95 that is displayed when I restart the computer. It took a few tries but I managed to close it. 30 minutes passed and I was still on it. then an hour, another hour passes and I'm still not logged out!
I used the internet all the day from morning to dark. I let my sister use it too when I wanted to take a 'break'. I would see people check the wait list look over at me and leave very annoyed.
The next week, the librarian who remembered me told me they would need my library card as collateral, and that they will be keeping tabs on the time. the jig was up.
This was my hacker moment. not exactly sophisticated but I wanted something so bad and I got it.
Anyway, Paul was really talking about the fact that he can't make someone into a hacker in three months. Never did he say that people can't become a hacker at the advanced age of 22.
There's a crucial distinction between my experience and hers, though. I had the support of a core group of computer nerds, egging each other on and making simple games and the like. This group was almost entirely male, and were mostly interested in other stereotypical geeky hobbies like video games, anime, and tabletop role-playing games. We weren't consciously exclusionary, but anyone who didn't match the profile was probably going to feel very out of place.
I remember in my CS course, there were two girls in the class, and they were most definitely not part of the clique, even though they were brilliant by most objective definitions. One of them was definitely in the "gifted" category, and while the rest of the class was concerned with making video games, she was writing an equation plotter. We didn't talk to her all that much.
My point with all this rambling is that there's a lot of bundling of interests that goes on, all of them male-dominated, and if you aren't into those things, you don't get the same peer education as somebody who is. I think this explains a lot of the gender disparity we see in CS education today, and I don't know what to do about it. Education should not be tied to social cliques, but in reality, it often is.
I miss those days, being a youngster and programming: doing without totally understanding but still learning. I still do stuff on my own, though, but no one will look at it or care.
But now all I do is fix bugs. I got one job after school, where I created something new. Looking back on it now, it was garbage but it was my garbage. That was the last time, though. Now I do 'sustaining' work. I don't mind but it feels like the industry as a whole has turned their back on me. I'm considering doing a startup sooner or later.
To me, the label 'hacker' isn't claimed, it's earned. I call myself a hacker, though I didn't until someone else did. I've never broken into secure systems armed only with a 28.8 bps modem and active matrix screen, though -- I use it entirely in the 'problem-solver' sense of the word, and proudly.
Having programmed since childhood doesn't make me a hacker. I owe far more to years of Latin study, an unhealthy interest in logic problems and strategy games, and being trained via school that there is always a solution to every problem if you apply yourself hard enough.
But on the other hand, if I were just learning to program now, how much of the 'hacker' mindset would come along with it? Very little, in and of itself; I tutor beginning students and I'm always trying to teach them how to solve problems and look for answers, how to be creative and elegant, and how to reuse other people's work -- it wasn't until I started mentoring that I realised how little of this some people do naturally, and I still don't know the reasons why that is.
On a side note, and having just re-read Little Women, I have a thought about hacking and poverty. When you are poor, you have to be creative. How much of that mindset overlaps with what makes a good hacker? How many hackers grew up in disadvantaged circumstances and learned to make the most of the resources they had? How many hackers hung out in libraries, absorbing information like sponges, because it was free and warm and both their parents were at work?
I was about 9/10, not sure exactly, I came across some article that taught you how to create a virus using the windows notepad (lame, I know), turns out the "virus" was just a fork bomb written in ms-batch.
I quickly got into the hacker culture, I went into some underground forum where there was a big "ms-batch scene", I have no idea why, but this guys were implementing games in ascii, trojans, interpreters... all in Batch.
And so I started learning, Batch is a horrible language, yet pretty simple to learn, in the meantime I heard about this mythical developers who wrote code in C or Python, languages I thought inaccessible and extremely complex.
I remember my first "big" project, I wrote some kind of graphical adventure where you were a "hacker" trying to "hack" into someone's PC by using commands such as "ping" and "telnet" (I had no idea about system administration or pentesting at the time).
Thinking about that horrid code, take in mind this was Batch, so no private variables, no functions, no structs... just an endless pile of GOTOs.
I am now 16, I still have a lot to learn yet I've also learnt a lot. I do consider myself a hacker, just because I write code for fun and like reinventing the wheel when possible. But the definition of "hacker" is very wide, for me, a "hacker" is everyone who enjoys writing code, maybe they work 8-17 writing Java in the Enterprise, but, if you enjoy what you do, if you come back home and keep writing code, if you want to improve: then you are a hacker.
I was vaguely aware of programming as a child, but had no education (unless you count mailmerge and a broken floor-turtle) and certainly no encouragement at school (in the UK if my spelling hasn't given it away). I basically forgot all about it until the middle of my degree (physics) when C was mandatory. It took until two years after a PhD to work out that a career in programming was what I really wanted.
Do I regret the way I got here? Nope. I learnt a lot of cool stuff along the way. But had it not been for that C course I may never have worked out what I wanted. I got lucky, and luck should not be a factor.
Yet, I am arguably successful. I got a job offer from Amazon at the start of my senior year and took it, and of course, I eventually want to start my own company that's why I'm on this site. I understand the stigma because I personally have never told anyone I only started programming in college. I've never been asked either. I love playing around with new languages and learning all I can about software, but I don't feel I'm that far behind people who started programming early if even behind at all.
We need to stop acting like people who have been programming since kids have a huge advantage. It is much more about what you constantly put in, and there are numerous other ways to be a hacker then just programming. Most people who didn't program might already have the "hacker" in them and just need to attach the programming element of it.
I dont remember that being the stereotype for hackers. I would be interested to hear from other people about what they think? But to me it has been someone who is intensely interested in computers and is very good at it. What they wear (wow really shallow much) hasnt really ever factored into it.
1) Regarding physical traits leading to culture, the same development can be seen to have given rise to Deaf culture, and also in the very concepts of men and women, which are more cultural in nature than most people think.
The stereotype of prodigies in sports is also hurting everyone like Michael Jordan and Tiger Woods, why should other sports people be disadvantaged by not starting at an early age. Really?
"Hacker" doesn't equate to the best software engineer, the best founder, or much of anything other than having benefited from a longer period of time to gain experienceextra time that may or may not have been used effectively to gain additional knowledge
This hasnt been my experience, seems like a lot of what ifs.
I think the issue is that the word hacker has too many meanings, and some of them contradictory. A hacker can be a prankster, a skilled programmer, a creative programmer, a skilled/creative programmer with some vague ideology that supports freedom of information, a computer security breacher, a person who tinkers with electronics, a person who subverts any type of system or authority (reality hacker/culture jammer), any sort of whimsical and creative fellow who applies unorthodox solutions to his everyday life, etc.
In addition, a hack can mean: an unskilled or untalented person, a charlatan, an inelegant but efficient solution to a problem (a kludge), an inelegant and inefficient solution to a problem (cruft), an elegant but unconventional solution to a problem, a skilled application of marketing (growth hack), a culture jam (reality hack), hacking off a limb, a prank, a computer security exploit or breach, a program to cheat at video games and so forth.
As far as I know, the "hacker" stereotype is that of the skilled but evil and socially isolated computer criminal.
One example of this is what I will generically call the "Google Interview". I know brilliant engineers how have done massive non-trivial projects that have generated millions of dollars in revenue who could not pass such an interview.
The other aspect is the constant exposure to the language-of-the-day and framework-of-the-day club. I can see a young aspiring developer becoming utterly disappointed when realizing it is nearly impossible to keep up with it all. Where do you start? How do you learn this stuff? Someone could very easily think they are not up to par if they can't walk in these mythical shoes.
The truth is very different from that. There's a huge world out there for software engineers. There are real problems to be solved. And, no, not everything in software engineering lives and dies on a web browser or a smart phone.
Is the OP saying that she needed to feel like a hacker to feel legitimate? That would be sad.
What the hell is a hacker anyway? Definitions abound. In many ways it is more about how someone might approach hardware and software problems than anything else. You don't have to be YC material to be a legitimate software engineer. One could very easily argue there are tons of software engineers out there doing far more important work than almost any YC developer has done to date. Most of them are invisible. Think about the people writing code for MRI machines, aircraft avionics or even your car's ABS system.
If you are young and love software engineering please don't think that building websites is the only way you are going to become somebody in this business. Explore what's out there and dare to learn about other interesting problems you might be able to solve.
Obviously the scale is a little different, but hey, give it a century...
They switched to a new (outsourced) billing system recently that was supposed to "dramatically improve" billing statements.
At our house, we had two accounts for PSE - one for the house power and a separate account number for a streetlight-like fixture on our property. The reason for the two account numbers was that they were billed differently: house power as normal, streetlight at a fixed rate paid once every other month.
To add to the complexity, we were enrolled in an estimated payments plan. Our costs stayed they same, month to month, with adjustments twice a year to update our average payment amount up/down.
Before the new billing system, we received bills once a month - with the amount fluctuating every other month by the cost of the outdoor light.
Under the new system, we had the "estimated payments" check marked, the reps could see it in the system, they claimed we were enrolled - but our bills that arrived acted as though we weren't in that payment plan.
They couldn't explain it. We were told "Oh, well, it's probably due to the cutover to the new system. Next month's bill should be normal." But it wasn't.
"Oh, it's probably just hiccups - I just changed something here so next month will work for you." Nope.
"It shows you're enrolled. Maybe it's in your spam email?" We get the emails fine. It's the wrong damned payment plan.
Our friends and family didn't have these problems. I figured it was because their idiotic new system couldn't handle monthly estimates plus a bimonthly secondary meter.
So we said "to heck with this" and dropped the outdoor light (installed our own floodlights instead).
MAGICALLY estimated payment bills started working for our account.
Kudos on going farther the Hard Way.
You can take one of my bills -- I receive two Ecobills and a paper bill!
The end of the blog post have me a good laugh.
When doing this, do you run the latest unit tests on the source as well? Do they pass?
Important: If you're targeting developers, and those devs use Docker, they might contribute to Docker. If they do, they'd need the tests to pass.
Currently, on DO, the tests do _not_ pass.
Where to get it? Please update the documentation include instructions for this. Also, hopefully `brew install docker` will be available soon :)
You just can code nice and quick in a language much nicer than Java, but easily access all that code from our_stalled_corporate_crap.jar, and package/deploy it the way they do it in their Java EE world.
Clojure outside Java ecosystem makes no sense.
I would really like to see a Clojure on LLVM project though. Maybe speed won't be better, but memory usage and boot times might.
I saw the Xcode requirement but I had hopes it would work on Linux.
Of course, he's the same roommate who later got arrested for wire fraud and grand theft.
I did verify experimentally that the Eurion constellation alone doesn't trigger photoshop's image rejection algorithm. I think it would be fun to distribute a bunch of images that false-positive the digimarc algorithms, just to mess with people.
Unfortunately, they're printed all the time.
Slippery slope, this one.
Could it be that each image generated from Adobe Software also tags the image with unique identifying computer, timestamp information?
Something like: If you can see this: Call 1-800-FED
What ever happened to just paying $40 for a game and getting to use it forever? (This killed Candy Crush for me. I love the gameplay dynamic and the graphics, but the constant upselling just makes me want me smash my phone into a fine paste and then feed the paste to the game's developers.)
If phones with IR were common, you could just download an Assassin app or any of a variety of other apps for impromptu game playing.
Custom made IR toys clearly are a step backward in any case.
As with kids with toy guns in the past. Just google for "officer shot 13 year old with toy gun"
Why not just an app that lets you play spy vs spy or zombie vs human based on proximity? Shaking your phone at another player within 3m counts as a kill.
That said, considering the negative attention received by the latter, which is remarkably benign, I don't know how Dustcloud will fair with authorities.
Full disclosure: I wrote such a library for Ruby, called HyperResource.https://github.com/gamache/hyperresource
Overall, I'm not sure that the time savings is as big as it first appears, but I think it's great for quick projects.
There is also an RFC for "JSON Hyper Schema" which is intended to describe REST APIs. It doesn't have much library support in much of everything, but I am surprised that it hasn't taken off!
I like that this library is fairly opinionated (options for how to authenticate, supported formats, etc.) Though I worry that that creates a bit of inflexibility - for what exactly does "oauth" actually mean, there are always vagaries.
Please ask if you have any questions. Thanks
This is actually pretty similar to a side project I've been working on called Gargl (Generic API Recorder and Generator Lite) (https://github.com/jodoglevy/gargl). Haven't gotten around to doing a Show HN post yet, but would love any feedback or to combine efforts. Basically it lets you generate an API for websites that don't have APIs publically available, by looking at how a web page / form submission of that web site interacts with the web server. You record web requests you make while normally browsing a website via a chrome extension, parameterize them as needed, and then output your "API" to a template file. Then this template file can be converted to a client library in a programming language of your choosing.
Having said that, this tool does look interesting. I hope that a goal is to always make sure that the generated code is as readable, and maintainable, as possible. Also, as mentioned by others, adding generated tests to the generated client libraries is extremely important.
> Guaranteed reply within a day.
That seems difficult to achieve--wonder how they're doing that? (Also, why??)
Know what I think would be really neat? If it could be pointed at an instance of Swagger-UI, or use the same discoverUrl that Swagger-UI would use, and spit out the libraries from that.
If you're not familiar.. https://github.com/wordnik/swagger-ui
Edit : If you don't make oauth consumption simpler, you don't really solve the problem
It lacks documentation, a bunch of features, and parts smell pretty bad, but since the topic came up I thought maybe someone would find it interesting, if only vaguely.
Record video, extract frames, simulate burst mode. Not that difficult really.
Conclusion: Cheap, poorly engineered and poorly tested.
I've been exclusively using Samsung and Intel SSD for production machines- however I'm not too worried about the power cutting out. With dual power supplies and several diesel generators in my datacenter, I'll be okay.
The gods confound the man who first found out how to distinguish hours! Confound him, too, who in this place set up a sundial, to cut and hack my days so wretchedly into small portions! When I was a boy, my belly was my sundial one surer, truer, and more exact than any of them. This dial told me when twas proper time to go to dinner, when I had aught to eat; But nowadays, why even when I have, I cant fall-to unless the sun gives leave. The towns so full of these confounded dials the greatest part of the inhabitants, shrunk up with hunger, crawl along the street.
 - http://feelspace.cogsci.uni-osnabrueck.de/
The only "hard" part would be fitting a battery in this form factor.
Go to your local hackerspace during some open hours, and tell the hackers you want to build one of these. I bet they'll do it with you!
(Hell: I'LL do it with you if you come down to heatsync labs [in Phoenix])
Seriously, an electronic gadget made to disrupt your day every 5 minutes. I think this requires a better explanation of the purpose before I take it seriously. Right now all the marketing speak combined with the banality of this device makes me think it's the perfect april fools but a few months too soon.
Let's assume it's for real, why would you want to get reminded that 5 minutes have passed when you've lost yourself in a fun life moment? Or when you're waiting for something a long time, that would be even worse.
Water resistance just seems to be a requirement these days - even my Pebble which I'd never wear in the shower is water resistant so when I am forced to react to a bath incident, I don't worry about the watch, and my kids instead.
Sounds like a pet project - maybe they should hire a real watch designer who can get them from hobby to actual product at some point.
I've been using it to establish habits, remind myself to be mindful and focus on task.
Interesting concept. Though I'm sure there's an app for that... or will be.
My morning routine is about 15 minutes. So is going to the coffee cart on the corner for coffee and a doughnut. However, I often perceive and think about the latter as taking much longer.
I'm downloading a interval timer app to test it out. My guess is that it will drive me nuts soon.
Edit: I didn't find any good options free for ios yet."Wake me up" works well, but not in the background.
From TFA:> how time flies by when you enjoy yourself, and drags along when you wait in line at the post office
I suspect my experience at the post office be made worse by the fact that there's something vibrating on my wrist reminding me of how long I've been waiting?
It. Is. A. Mind. Game.
When your brain "idles" you lose track of time. Time in the mind only exists as a comparison of one moment in the past and another moment in the present. So when you're daydreaming (mostly brain idling) time appears to fly by because there's less datapoints for your mind to use to compare. But when you're checking the time constantly time appears to go by very very slowly.
It can become mentally exhausting when you do it too much though because it speeds up the mind. You become aware of every little moment. It can make you extremely productive but you really do have to take "brain idling" breaks every now and then. Also when you first start off, time will appear to fly by, it'll feel like "5 min" are flying by every 30 seconds. But after about 30 minutes your brain will stop idling so much, you'll become aware of more time points, and it'll feel like time is slowing down and you're thinking "faster".
Give it a try. It's really fascinating.
Lesson: integration and playing friendly with others is huge for B2B.
Love it. We've had a few moments like this at Paydirt (http://paydirtapp.com/). As engineers, we tend to have hangups about little details like this that customers genuinely don't give a second thought to, and they can be a means to massive (and multiplicative!) business wins.
Kudos, keep it coming!
edit: http://snag.gy/FNBUs.jpg (using chrome)
> Its also possible to compress updates to the bloom filter. The server just needs to calculate the XOR of the version the client has and the updated version, then run that through LZMA (the input will be mostly zeros), and transmit the compressed diff to the client.
> Unfortunately, for a reasonably large user base, this strategy doesnt work because the bloom filters themselves are too large to transmit to mobile clients. For 10 million TextSecure users, a bloom filter like this would be ~40MB, requested from the server 116 times a second if every client refreshes it once a day.
Wait, the LZMA-compressed daily diffs would be still be ~40MB? If the 40MB is just the initial bloom filter download, that's not so bad. If 40MB is the daily diff, I'd be interested in seeing the calculation for that.
The only field that might be fairly consistent is email address and even that is no guarantee. Sure, it's possible to clean up a contact before hashing, but when you consider the fact that the typical phone contains >500 contacts it's not something that can be done in a reasonable amount of time on a modern smartphone. For the last two years I've been working on a product that involves cleaning/organizing contacts and making them searchable, when I started I had no idea what a massive undertaking it would be.
So, hash till your hearts content, but if you have 10 different people with the same contact in their address book I would be willing to bet that you will get 10 different hashes because humans are not good at data entry.
You'd need to look at real data and tune the parameters to make this effective.
Is it reasonable to trust for me to trust you to you run some arbitrary binary on my phone that does some magical black box computation on my contact list and then phone home to your service, but not trust to that you will just not be a dick with the raw data?
Stated more simply, if I am paranoid about my privacy, then why am I running your apps and letting you read my contact list at all?
I install millions of copies of the app, all with a different contact list. I do this signed query process for every possible phone number. I now have the complete list of users.
1) I upload the hashes of my contacts which enqueues a request to those that match the hashes
2) The target of the request dequeues those requests and is given the option to expose themselves to the other user
3) If approved, the original uploader gets access to that user on the service
This would stop the massive discovery issue and would only put a medium amount of friction into the growth engine. It obviously doesn't cover the issue that the service itself has access to the contacts which means they could potentially be exposed. However, if the service discards hashes without matching queues and removes matches when dequeued, the risk to the user is much reduced from the full address book storage case.
This was written off the top of my head, so forgive me if I have left a big hole somewhere.
Assuming you can map phone numbers onto the integers from 0 to ten billion, trivial compression of the is-a-user/is-not-a-user bit sequence should easily fit in ~14MiB .
See also: succinct data structures  for accessing data without decompressing it.
(This is obviously a short term solution. Growth will overcome the savings.)
1) Client uploads a bloom filter with all contacts on phone
2) Server responds with a bloom filter with all registered contacts that match the client's bloom filter
3) Client displays contacts that match server's bloom filter
You can optionally trade contacts back and forth again with a larger bits/contact ratio to decrease false positives.
I think it works out so that in exchange for 7 bits of information about each contact from the client, you can reduce the server's response by a factor of 128.
Still doesn't stop someone from attacking a single number though.
Of course, this can only be part of the full solution.
Disclaimer: just throwing a wild idea out there. don't know anything about the field.
Value is relative. For stakeholders, value is indeed given by the networks size. For users (participants), its very debatable whether size equals value. The author seems to be mistaking the two perspectives for a single one. No paradox here.
Fundamentally there is more value for the network operator to grow the network than for users to disclose their details. Email works perfectly fine without having to disclose your address book because no one owns the network and therefore do not care how many people are using email.
Alternatively one could just allow users to choose whether to make their info public and then the client can just search a directory.
Additionally you could use captchas (or other humanity tests, such as SMS verification) to limit hackers creating automated accounts (in order to fight automated bots spamming and polluting the network).
Carrots, lettuce, spinach and water are ridiculously cheap.
If it's over-priced, branded, luxury convenience product in tiny quantities, then it's obviously going to cost more.
The other cheap way to eat: freegan.
While it's interesting as a concept, I don't really get the feeling there is much to see here. It's also not clear to me how these very few access providers would actually federate without real backbone connectivity.
Anyway, seems like a neat idea.
On a somewhat tangential note, I've always been curious about sentences like this: "Contact me at ross underscore rosen at revelision dot com"
Are sentences like the one above an effective way to prevent spam? Or are most spambots sophisticated enough to account for slightly obscured spellings of email addresses?
While I'm still active in software development, I haven't done web development in 10+ years. I'm currently working on a side-project which is also teaching me "the works" when it comes to web development and deployment. Of course, I will still be a n00b by the time I'm done, but I'll soon have written and deployed my own RoR, data-driven website.
My side-project also shares a similar motivation as yours: First, it's my belief that most data isn't taken advantage of because most people suck at data. I wanted to see if I could take an existing, well-picked-through data set and extract value, just by sucking less. This could also describe my side project, which is in the sports domain.
You reaching this point is extremely inspiring. Thank you for sharing!
Also, you need to drop in a full post with commentary, analogous to what you did with your "learning python" post. More feedback about tools, resources, learning sites, etc.
While you might have forgotten some programming, and quite a bit has changed over the last couple of decades, what is quite interesting to me is the efficacy of the result. Although I don't know what your word looked like 20 years ago, this probably shows that over the last couple of decades your sense of how to do something useful and present it has developed.
I would have guessed that a "what I did to catch up after 20 years of non-programming" project would have had a lousy UI (presentation), which yours does not. And while the presentation tools are better, the decision of what to present and how are still up the programmer.
So the 20 years weren't wasted :-).
(that said, you probably could've gotten away with just HTML, CSS, JS, jQuery, D3, and Bootstrap, as the site could probably run off of flat static files...but even sussing out that architecture is its own skill)
The data on sunshine seems off to me. Surely San Antonio, TX has more sunshine than Lexington, KY.