Hacker Newsnew | past | comments | ask | show | jobs | submit | temp51723's commentslogin

Real names seems like it'd make people - in general - feel the need to save face more than a pseudonym.


So they're supposed to let themselves into your house, walk to your bedroom and hand it to you there?


> It's because they didn't do anything. NDA = Not Doing Anything.

No, it's because it's my employers code, not mine.

God knows what trying to exfiltrate it opens me up to criminally or civilly.


It's your prerogative. Nobody said anything about "exfiltrating." Showing someone X doesn't mean that X isn't owned by its owner anymore. These aren't semantic arguments.

You're going to have a hard time expressing what exactly is the violation when everyone has signed the same NDAs and CIIAs! Like if you work for Google, and I work for Google, you can fathom, well I can look at code you've written for Google.

Okay, now if I only "work" for Google, which like 200,000 people do, and they've signed the same exact agreements as you... It's your prerogative!

> criminally or civilly

It's your prerogative! You can leetcode instead!

I am not saying this is you. But there are many developers, arguably the majority, who complain tirelessly about the status quo of interviewing. And given one opportunity after another to change that status quo - doing the stuff Simon says, doing the stuff I am saying - they make no effort! They vamp about how it's impossible.

They think their social local mobile trip planning startup website code is sensitive. They think their 15 layers of Dagger dependency injections is sensitive. It's not. If you want to change the status quo from leetcoding, you're going to have to screen share a "diff" here or there, and show people concretely what the hell you've been doing for a year at BigCo or UnicornCo. I cannot predict the future and I cannot generalize, but in my experience, the likelihood of criminal, civil or even the far more realistic reputational and cultural repurcussion is extremely small.

All I am saying is, the reason this hasn't happened yet is because most people spend a year at BigCo and UnicornCo doing nothing of any substance. I mean maybe that's going to change. But it's really tough, nobody is being honest with how truly tremendously mismanaged and ZIRP-fueled large employers are. It hasn't been this way forever, but it has for at least 10 years, and it means some crazy things have happened in the job market that made no sense.


> Nobody said anything about "exfiltrating."

Copying work code to a non-work device to show during an interview is exfiltrating code. Well staffed security orgs at large companies have insider threat teams that look for this type of thing, in addition to monitoring for exfiltration of company documents and other materials to personal devices.


> Like if you work for Google, and I work for Google, you can fathom, well I can look at code you've written for Google.

wait how does that work in the context of an interview though? You're by definition interviewing somewhere where you don't currently work

> you're going to have to screen share a "diff" here or there, and show people concretely what the hell you've been doing for a year at BigCo or UnicornCo. I cannot predict the future and I cannot generalize, but in my experience, the likelihood of criminal, civil or even the far more realistic reputational and cultural repurcussion is extremely small

Ah, nvm

No thanks, I'm not gonna do that


It is more common than you think. I've had candidates submit code samples with proprietary code from their current employer during interviews. One example: some files from a telco billing system. Right or wrong, there is essentially zero risk for this sort of thing.


There's certainly more than 0 risk.

I do hiring at my company. If a candidate showed me non-public code during an interview, they're an immediate no hire. Interview is immediately over. This isn't my personal preference or anything either. It's specifically in our interview training.

It demonstrates a clear inability to protect company IP. That's a big deal. Especially if you're a publicly traded company.


It's near zero. Did you report the candidate for this? Actually, have you ever had it happen in any interview you've done?


Yeah this reads like satire. I hope it is, anyway.


> If everyone is allowed to steal books

Nothing was stolen- just copied.


> Nothing was stolen- just copied.

This typical semantic-pedantry line from piracy apologists misses the point - piracy is theft-adjacent even if you get to pick your use of "theft". Incidentally, my definition of "theft", and that of most content creators, includes the act of consuming something without compensating the creator on their terms - which includes piracy.


A fundamental property of theft is that the action deprives someone of something they had. Piracy is not theft-adjacent. It has nothing do to with theft. It's a completely different concept.


No, a fundamental property of theft is that it is the taking of that which does not belong to you - which clearly includes piracy.


That's an interesting thought. So when I overhear a conversation which was not aimed at me I am stealing. Quite an interesting definition with widereaching implication


[flagged]


"Pretty wild" - standard emotional manipulation. Not appropriate on HN.


As a book author, I can say that, "Yes, something was stolen. My opportunity to earn a living taking care of readers."

Now you may believe the incredibly self-serving baloney from big companies like Google. You may want to pretend that infringement isn't theft. To you, I hope that some homeless kid breaks into your home, starts squatting, and says that, "Hey, this isn't theft. Nothing has been destroyed."


squatting monopolizes space, only one person can own it at a time

cool thing about information is when you make a copy, you've doubled the information - plenty for everyone! if only housing worked the same way


As a book author, what's your feeling on libraries, out of curiosity?


Actually very much the revenue for each purchase that didn't happen this way was stolen. I'm not a pitacy Hardliner and don't see an issue with someone in a bad financial spot pirating things but this is bullshit.


[flagged]


That's not really the same, you could have a copy of my credit card, but you using it to make purchases would become an issue. Regardless, that quickly steps out of the domain of intellectual property.


If I use your copied credit card to buy software, all that happens is (a) some bits get written to my computer's hard disk and (b) some bits get written to a Visa or Mastercard server's hard disk. Why would you get upset about that?

EDIT: ok, it's fun playing obtuse, but more seriously it is also very obtuse to pretend that intellectual property is not property. I think you have to be pretty stupid to not understand why an author who spends a decade painstakingly creating a work of literature is entitled to ownership of reproductions of that work.


It is not playing obtuse to think "I also have a copy of an ebook" is different from "I have literally stolen your property".


Unless the contents of the ebook are my property, in which case you have stolen my property.


Legacy Update doesn't support Windows 95, Windows NT 4.0 SP3+ Windows 98 First and Second Edition, Windows Millenium Edition.

Windows Update Restored (purportedly) does.


Thanks, this answers my question.


You pick a version of the compiler and stick with it until you're ready to try a newer version?


That ignores any other libraries you use which may not make the same choice as you.


It doesn't. You stick to the version of those libraries at work with that version of the compiler- like every other language.


The difference is that most other language are backwards compatible to a fault (it's hard to have the stability cake and eat improvements)


That's fine in a vacuum, but I feel like you'd very quickly run into the need for a security update, or some external API that changes, etc. You can't ignore all externalities, usually.


Then you risk missing the deprecation warnings and head straight into errors.


The type of person that buys an instant pot is definitely the type of person to buy an air purifier. Probably a gamble on brand loyalty/recognition.


Though probably not the type of person who buys an air purifier from the instant pot brand lol.


> what benefits do people find with these viewers?

I stop and think about the issue instead of just googling for an answer.

Also, I removed the wifi card from my laptop so I can work from a room without ethernet letting myself get distracted by the internet.


That book was used in my "intro to higher math" class my freshman year. A very humbling experience, seeing that cover again gave me a bit of a knot in my stomach.


=(

typing this from my ~12 year old lenovo x201.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: