Hacker Newsnew | past | comments | ask | show | jobs | submit | WhyCause's commentslogin

Also, MS Word auto-corrects <space>-<space> into an em-dash just like it fixes quotes. Depending on which software was used to write it, it's very likely that's what happened.

I'm never suspicious of only one em-dash, as they are a perfectly valid, if infrequent punctuation. Three or more in an article this length would make start looking at the rest of it more closely, though.


I'm just picturing me watching their stupid ad, then opening the door and permanently disabling the locking mechanism, with a sawz-all, if necessary.


By that point, they'll have passed an enhanced DMCA law that makes it a crime to tamper with or modify corporate property... see, you can only "license" the object but never own it.


I tried to disable my washing machine lock. Bricked it. Bought a Speed Queen.


Where do the quarters go? (I've only seen SQs in laundromats.)


> ...you can't control what others send you.

Of course not. You can, however, control what you then do with said data.

If a courier accidentally dropped a folder full of nuclear secrets in your mailbox, I promise you that if you do anything with it other than call the FBI (in the US), you will be in trouble.


Except in this case it's unclear whether any intentional decision went on at meta. A better analogy would be if someone sent you a bunch of CSAM, it went to your spam folder, but then because you have backups enabled the CSAM got replicated to 3 different servers across state lines, and the FBI is charging you with "distributing" CSAM.


PyInstaller-made executables also used to have a habit of getting flagged by security software as malicious (maybe that's why you couldn't run it?) -- apparently, so many malware writers used it that it ruined the party for everyone.

Fortunately, that was only the 32-bit version of Python 2.7. Using 64-bit versions or Python 3 was enough to not get flagged as malicious. I figured that out when I decided I didn't want to teach myself Go just then to deploy something that had worked the day before.


> The most successful exception I've seen are books by Joe Klassen (of I Want My Hat fame)...

If you haven't read it The Dark[1] (his collaboration with Lemony Snicket) is also great; my kids absolutely love the voices I do for the animals in I Want My Hat Back and for the titular Dark.

[1] https://www.amazon.com/Dark-Bccb-Ribbon-Picture-Awards/dp/03...


In the article, they mention that they are working with the crawling company to be reimbursed for the download costs.

Naming and shaming the company while you're trying to work with them is a real good way to not get what you want.


Seinfeld was "a show about nothing."


I would argue that the fast part isn't optional for web apps (where "transpiling"), but it can be in many other instances.

I write a lot of data-pipeline code in Python that mostly runs once a day. Does it matter if it takes an hour to run instead of five minutes? Not really, as long as it's ready to go for the next run.


It's not necessarily wealth that governs price changes, but access. Anyone with a car and 'enough' money for gas can go to the store across town if it's cheaper, but if a store is isolated enough by geography or neighborhood income level, you'll likely see higher prices.

Case in point: the Kroger in Oxford Ohio (where Miami of Ohio's campus is located) has had remarkably higher prices than other Krogers in the area for as long as I've known. Oxford is 'close' to Cincinnati, but there's enough corn and soybean fields between the two to make the trip a pain.


And that’s why dollar store and similar shops are huge in rural poor America


I think it's more that once you get rich, the political machine becomes obsessed with you and your donations. That attention can be kind of addictive.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: