Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 16 of 348

The super-slow conversion of the U.S. to metric (2025)

Number bases and divisibility

  • Some argue metric’s “worst flaw” is base‑10, claiming base‑12 (or even 60) is mathematically superior because it divides cleanly by more factors (2,3,4,6).
  • Others counter that as long as people count and write numbers in base‑10, base‑10 units are simpler: shifting decimal points is trivial, while base‑12 would require rewriting all numbers or messy conversions.
  • Finger‑counting schemes for 12 (knuckles, joints) and binary/hex counting on fingers are discussed, but most see them as curiosities rather than practical reform paths.

Customary vs metric in practice

  • Thread notes the distinction between U.S. customary and British imperial (e.g., different gallons, pints, cups), and the UK’s own hybrid system (miles and pints, but liters and metric engines).
  • In the U.S., science and most advanced engineering are described as almost entirely metric; consumer‑facing domains (construction, domestic measurements, road signs, weather) remain heavily customary.
  • Many industries are already mixed: metric components with imperial interfaces, metric plywood thicknesses, metric car parts, but imperial‑sized fasteners, pipes, and lumber.

Perceived “naturalness” of units

  • Several people say feet/inches and Fahrenheit feel more intuitive for “human‑scale” tasks, especially construction and weather.
  • Others insist that “naturalness” is just familiarity; metric users find centimeters, meters, and Celsius equally or more intuitive.
  • Arguments that imperial fractions (1/2, 1/4, 1/8, etc.) are convenient are met with counter‑arguments that decimal whole millimeters avoid fraction arithmetic altogether.

Temperature scales debate

  • Fahrenheit defenders like a ~0–100 °F “everyday outdoor range” and finer whole‑degree granularity.
  • Celsius defenders like 0 °C as freezing and 100 °C as boiling; for everyday weather they think in rough 5 °C steps and don’t care about decimals.
  • Both sides concede that habit and climate shape intuition more than any inherent superiority.

Engineering, construction, and tooling

  • Mixed‑unit specs (mm bores, inch depths, metric threads, imperial set screws) are common and widely hated.
  • Fasteners, gauges, drill sizes, pipe “nominal” sizes, and multiple ounce/pound definitions are cited as especially chaotic.
  • Some note that many tolerances and “nominal” dimensions make the underlying unit system less critical internally, but crucially confusing at interfaces.

Cooking, groceries, and daily life

  • Packaging in North America often carries both systems; some categories (liquor, many sodas) are effectively metric already.
  • Several strongly prefer grams and scales for baking; others insist cups/spoons are faster and “accurate enough.”
  • Everyday U.S. users report a pragmatic hybrid: metric for small/precise quantities, customary for body weight, height, room sizes, and driving.

Cultural, political, and historical factors

  • The 1970s metric push, associated optimism, and later rollback (including abolition of the U.S. Metric Board) are recalled with mixed nostalgia and blame.
  • Resistance is seen as cultural identity and inertia rather than rational evaluation; some explicitly value imperial as “warm,” idiosyncratic, and historically rich.
  • Opinions on change split: some think a federal mandate could force a rapid transition; others think there’s no compelling benefit for current adults, so only slow, market‑driven convergence is likely.

EU–INC – A new pan-European legal entity

National bureaucracy and incorporation experiences

  • Many describe Germany as exceptionally hostile to small companies: mandatory in‑person notaries, weeks to get a bank account and registration, repeated notarization for any change, high accounting fees, and difficulty closing companies.
  • Some argue it’s manageable if you pay well‑connected lawyers and advisors, but founders complain total setup often costs ~€2–3k+ and ~6–8 weeks before limited liability fully applies.
  • Others contrast this with smoother processes in Sweden, Denmark, the UK, Estonia, the Netherlands (post‑reform BV), and Spain (for freelancers, not SLs), where online formation is fast and cheap.
  • Several say the real killer is cumulative friction: multiple registries, paper mail, language barriers, and varying quality of local tax offices and consultants.

What EU–INC is supposed to be

  • Proposal: an optional “28th regime” EU‑level company form with:
    • No minimum capital (unlike SE’s €120k).
    • Fully online formation within 48 hours.
    • A single EU registry and standardized governance / investment documents.
    • Still subject to local tax and employment law where the business is based.
  • Supporters see this as:
    • A “Stripe Atlas for the EU”, reducing need to incorporate in Delaware/UK/Estonia.
    • A way to make cross‑border hiring, option plans, and VC structures predictable across member states.
  • Skeptics question:
    • Whether EU law even allows a supranational entity without a national “sponsor”.
    • If it will be a regulation (uniform) or a directive (27 variants, GDPR‑style).
    • Resistance from entrenched lobbies (e.g. notaries) and tax‑sovereignty worries.

Cross‑border operation, tax, and investment

  • Founders report that:
    • Investing across borders is legally and tax‑wise painful; many funds stick to domestic deals.
    • Hiring employees in another EU country often requires local entities, EOR intermediaries, or “fake contractor” setups that are legally fragile.
    • CFC rules and “centre of management” tests can cause double reporting or surprise taxation when founders move countries.
    • VAT for digital services across 27 regimes is seen as an early, stressful hurdle, even with OSS/MOSS.
  • Many hope EU–INC plus deeper capital‑market harmonization will:
    • Make it easier for pension funds and cross‑border VCs to back EU startups.
    • Encourage founders to stay in Europe instead of defaulting to US structures.

Taxes, labour law, and culture

  • Some insist high European taxes and strong worker protections are core features (healthcare, pensions, social stability) and not what EU–INC should touch.
  • Others argue rigid firing rules, mandatory social contributions, and complex payroll make founders risk‑averse and favor agency chains and “consultant” pyramids.
  • There’s debate whether Europe’s startup gap vs the US is mainly:
    • Cultural (risk aversion, love of stability, bureaucratic mindset), or
    • Structural (fragmented legal systems, banking, and capital markets).

EU capacity and political skepticism

  • Optimists see EU–INC as a concrete step toward a true single market, alongside capital‑markets and energy integration.
  • Pessimists doubt the EU can simplify anything, expecting:
    • A new layer on top of existing bureaucracy instead of replacement.
    • Years of committees, national delays, and a watered‑down result.
  • Some worry about loss of national “diversity” in company law; others reply that diversity in culture, not legal fragmentation, is the real strength.

Meta: site, messaging, and existing forms

  • Commenters note eu-inc.org is an unofficial lobbying site (with merch), not an EU asset, and criticize its Notion‑style docs and vague landing page.
  • Several point out existing EU‑level forms:
    • SE (Societas Europaea) and SCE, but these are seen as too capital‑intensive and complex for startups.
  • Thread repeatedly asks for clear comparisons between SE, EU–INC, and national forms, and for hard guarantees on UX metrics: time, pages, and cost to incorporate and dissolve.

SETI@home is in hiberation

Project status and scientific outcome

  • Commenters note SETI@home has technically been in “hiberation” since 2020; the news hook now is that final analysis and papers have just been published.
  • The distributed search processed billions of candidate signals and did not find any confirmed extraterrestrial signal, though a small set of high-priority candidates is being followed up with additional telescope time (e.g., FAST).
  • Several people stress that a null result is still scientifically valuable: it constrains optimistic “they’re everywhere” assumptions about intelligent life.

Was the effort worthwhile?

  • Some dismiss it as “mostly for nothing.”
  • Others counter that negative results matter, and emphasize that SETI@home produced peer‑reviewed papers and a well-characterized search of a large parameter space.
  • Many argue the main legacy is methodological and infrastructural rather than a discovery of aliens.

Distributed computing legacy and other @home projects

  • SETI@home is credited with inspiring BOINC and, more broadly, popularizing distributed volunteer computing.
  • BOINC-based projects (e.g., Rosetta@home, climateprediction.net, Einstein@home, World Community Grid) are cited, with specific mention that some have generated hundreds of papers.
  • Folding@home is still active; there’s discussion of its complementarity with AlphaFold and its role in protein/medical research, including during COVID.
  • Some users recall BOINC being harder to use than the old screensaver, which may have cost participation.

Radio detectability, Fermi paradox, and communication

  • One side claims Earth-like radio leakage would be detectable tens of light-years away, making the silence striking.
  • Others push back with links arguing ordinary broadcast emissions fade into noise beyond a few light-years; only very powerful, well-aimed beacons might be visible ~1000 ly away.
  • There’s debate over the Great Filter vs. probabilistic “Dissolving the Fermi Paradox” arguments.
  • A subthread explores whether meaningful two-way communication is only practical within ~20 light-years and what bandwidth/contents such an exchange could have.

Nostalgia and cultural impact

  • Many reminisce about running the screensaver on Pentium-era machines, checking hopefully for “you found aliens” messages.
  • Strong association with 1990s–2000s UFO culture and X‑Files; some lament that conspiracies used to feel more playful.
  • People recall offices and labs filled with SETI@home on idle machines, feeling like participants in a grand sci‑fi project.

Energy, cost, and practicality today

  • Several note that in the early 2000s, extra CPU load barely changed power draw or noise, making donation “feel free.”
  • Modern CPUs/GPUs draw hundreds of watts and spin up loud fans, so running @home projects is more noticeable and costly.
  • Some repurpose compute-heavy workloads as space heaters in winter, or discuss “compute-for-heat” cryptominer heaters.

Humor, pranks, and miscellany

  • A famous prank client faking an “Alien Life Found!” dialog is recalled.
  • Multiple jokes about the persistent “hiberation” typo.
  • People mention early grid-computing experiments and internships where SETI code was used as a compiler/performance benchmark.

Can you slim macOS down?

Asahi Linux and alternatives to macOS

  • Asahi Linux is suggested as the “no‑restrictions” option for Apple Silicon owners, but missing/immature features (Thunderbolt, DisplayPort over USB‑C, battery life) keep many from switching.
  • Some see the project as stalled; others think it’s fine for desktop/server use and are optimistic features like DP over USB‑C will land.

Why “power users” pick macOS vs Linux

  • Pro‑macOS points:
    • Excellent laptop hardware (screen, trackpad, speakers), battery life, suspend/resume, and thermals.
    • Reliable drivers and “it just works” behavior, especially valued by people who don’t want to sysadmin their own machine after doing that at work.
    • Access to commercial/pro apps (Adobe, Office, pro audio/video tools, photography/colour workflows) and Apple ecosystem features (Continuity, iCloud, Find My).
    • Unix‑like terminal, full dev stack, package managers, and container/VM tooling while retaining consumer polish.
  • Pro‑Linux points:
    • Full control, ability to build from a minimal base (Arch, NixOS, etc.) instead of trying to rip out unwanted macOS components.
    • Better fit for users who enjoy configuring everything and dislike macOS UI decisions (window management, multi‑monitor behavior, Dock/Finder quirks).
    • Avoidance of Apple’s increasing lock‑down and “death by a thousand cuts” (notifications, nags, opaque services).

Lockdown, SSV/SIP, and user control

  • The article’s claim that SSV prevents disabling daemons is challenged: SSV and SIP can be turned off, and virtually all system protections can be removed, at the cost of security and update fragility.
  • Some argue the piece is incomplete for not exploring this; others say widely advertising “turn off SSV” to a mostly non‑expert macOS audience would create support and security disasters.
  • A recurring theme: many users want fewer intrusive features and more toggles rather than maximum performance gains.

Is macOS “Unix”?

  • Long subthread on Unix certification: macOS 15 is officially UNIX® 03, but certification requires temporarily weakening protections (e.g., disabling SIP, altering mount options).
  • One camp says this makes the author’s “macOS isn’t, and never has been, Unix” technically wrong; another reads it as a cultural point: macOS is a consumer OS with a Unix‑like core, not a traditional Unix in ethos.

Minimal/headless macOS and CI use

  • Several people want a trimmed‑down or headless macOS for Mac mini servers and CI VMs; historical macOS Server is cited as insufficient and buggy.
  • Current workarounds include small VMs, Tart/Apple’s virtualization tools, and a new Docker‑like system for macOS guests; existing Intel‑focused solutions (e.g., Dockur) are considered obsolete for Apple Silicon.

Processes, performance, and energy use

  • Some argue hundreds of mostly idle processes are fine: bursty use on efficiency cores, aggressive idle, and VM/compression mean little real RAM/CPU cost.
  • Others report bugs where indexing or filesystem daemons (Spotlight, mds_stores, mediaanalysisd, fseventsd) spin CPU, heat machines, and potentially stress SSDs, pushing them to disable or tame these with tools like App Tamer.
  • There’s concern about aggregate wasted energy across millions of Macs, even if each daemon does little individually.

Broader OS comparisons and article reception

  • Compared to Windows, macOS is widely seen as less obnoxious (ads, Edge nags) and more coherent, though some feel recent macOS releases are drifting toward Windows‑style bloat and user‑hostility.
  • Linux is praised on desktops but many still find laptop support (sleep, docks, HIDPI/HDR, audio) and DE stability lacking.
  • Some readers call the article a “misleading” or lazy “you can’t” answer; others defend the author’s long track record on macOS internals while conceding this piece is weaker and overreaches on claims about Unix-ness.

EU Parliament freezes US trade deal ratification

Role of career diplomats and institutional expertise

  • One line of discussion questions the value of professional diplomats and large bureaucracies if political leaders can undo years of relationship‑building in a moment.
  • Others respond that many affairs of state cannot be run by short‑term appointees: states need people with decades of institutional memory, language skills, and long‑standing personal relationships (e.g., with Tehran, intelligence agencies, public health).
  • Argument: top leaders cannot personally hold deep expertise in all domains; dismantling the professional apparatus would make policy both shallower and more fragile.

Trade realignments and Mercosur/EU deals

  • Commenters note that recent geopolitical shocks are accelerating already‑long negotiations (e.g., EU–Mercosur, started in 1999) and pushing countries to seek “like‑minded” alliances.
  • Mercosur is cited as an example of a painfully slow process that only gained urgency once US politics became more erratic.
  • However, optimism about ratification is tempered: the EU Parliament is sharply split, and later news in the thread shows the deal being frozen and sent to the EU Court of Justice.
  • Canada’s new deals (including with China) are cited as part of a broader diversification away from US dependence.

EU agriculture, regulation, and food sovereignty

  • Strong disagreement over whether EU farmers are “special interests” or essential strategic assets.
  • One side: EU devotes ~25% of its budget to agriculture; farmers are too politically powerful; regulations are excessively bureaucratic and hurt domestic producers.
  • Other side: strict regulations protect against slave labor and harmful chemicals; offshoring food production repeats past mistakes in energy and manufacturing and creates dangerous dependencies.
  • Tension highlighted between high EU standards, competitive pressure from imports with lower standards, and anger at both EU-level rules and local enforcement.

Tariffs and incidence of costs

  • Clarification that, formally, importers pay tariffs, but in practice the cost is shared among foreign producers, domestic consumers, and firms.
  • Debate over who really bears the burden: some argue exporters often eat part of the cost to stay competitive; others contend broad tariffs mostly flow through to higher consumer prices.

Trump, Greenland, and billionaire influence

  • Many see the EU–US trade clash as a product of one leader’s erratic behavior, with frustration that an “angry geriatric man” can cause long‑term damage he won’t live through.
  • Counterpoint: even if that leader disappeared, others (e.g., his chosen successors) or the wider movement would continue similar policies; he is a symptom, not the core cause.
  • Several comments argue that oligarchs and major donors, including tech billionaires, shape these moves from behind the scenes; Trump is described as “ideal” for their purposes, not an aberration.
  • One subthread cites reporting that the Greenland idea was seeded by a specific billionaire, prompting suggestions that concentrated wealth and dynastic fortunes should be constrained (e.g., via strong estate taxes).

Structural flaws in US politics

  • Contributors repeatedly stress structural issues: money in politics, lobbying, first‑past‑the‑post elections, gerrymandering, weak constraints on presidential abuse of the Justice Department, and a “tribalized” media ecosystem.
  • Some argue that gridlock in Congress is an intentional feature meant to prevent tyranny; others say this has been weaponized into a “destructionist” strategy that blocks any reform and pushes power into agencies and courts.
  • Extended debate over electoral systems:
    • Critics of first‑past‑the‑post say it forces everything into two parties, so extremists capture one of them (e.g., Trump capturing the Republicans), leaving no outlet for “venting” via small parties.
    • Proportional representation is presented as offering “pressure valves,” allowing fringe or protest parties to gain some representation rather than blowing up the main parties.
    • Examples from Europe (both successful coalition politics and chronic fragmentation) are used to show trade‑offs; consensus is that the US system is unusually bad at channeling discontent constructively.
  • Several insist that, ultimately, only the public can force systemic reform, but others reply that entrenched structures and decades of manipulation make this extremely difficult in practice.

EU–US rift, alliances, and escalation

  • The trade freeze is widely seen as deepening a long‑term rift; some say the situation is becoming “irreversible.”
  • There is anger at US rhetoric dismissing smaller allies as “irrelevant,” with reminders that small states (e.g., in Europe) can hold huge reserves and influence; this is used to justify the EU’s design as a bloc that restrains great‑power arrogance.
  • Some Europeans advocate a hard line: “escalate to de‑escalate” and support politicians with an uncompromising stance toward US pressure, even at significant economic cost.
  • Others worry economic retaliation is risky for Europe but note that US leaders also cannot afford a major downturn in an election year, which may limit escalation.
  • A few light‑hearted comments speculate about Canada joining the EU or an “Arctic Union,” illustrating a broader yearning to rebalance away from US dominance.
  • Individual responses include personal boycotts (“time to buy European”) as symbolic resistance.

The percentage of Show HN posts is increasing, but their scores are decreasing

Perceived flood of AI-generated “slop”

  • Many commenters feel Show HN is being swamped by AI or AI-adjacent projects (“agentic X”, AI skills, AI calculators), often quickly vibecoded with LLMs.
  • This is seen as lowering average quality and burying interesting non‑AI projects under a “sea of AI slop.”
  • Some fear a broader industry trend: as it becomes easier to build things, mediocre output floods attention channels and devalues careful, deep work.

Experiences posting to Show HN

  • Several people report recent Show HN posts getting almost no clicks or comments, even when re-submitted.
  • There’s frustration that strong ideas can be overlooked amid AI fatigue and volume.
  • Others say this “hit or miss” pattern has always existed: title, timing, and luck matter; repeated iteration is needed.

Show HN mechanics and value

  • Confusion exists about whether Show HN posts are disadvantaged versus regular links; clarifications say they appear in both /new and /shownew, with promotion depending on votes and filters.
  • Advocates argue Show HN brings a different kind of engagement: more feedback on idea and implementation, less generic debate.
  • Critics see Show HN (and Product Hunt) as increasingly self-referential, with creators mostly talking to other creators.

Moderation and “substance”

  • Moderators stress that Show HN is not Product Hunt: it’s for substantial, curiosity-worthy projects, not quick landing pages or lead-gen tools.
  • “Substance” is defined as real thought and effort, a genuine problem, a meaningful “a‑ha” insight, and something that actually works, even if unpolished.
  • Shallow AI-driven projects are explicitly called out as things that will not be promoted; there’s a second‑chance pool for good projects that were initially missed.

Attention, bots, and incentives

  • Attention is framed as scarce; with ~1 new submission per minute and hundreds of Show HNs per day, almost no one can evaluate more than titles.
  • Some suspect voting bots and organized rings, especially around AI topics; others cite analyses showing more posts and lower scores without clear proof of quality decline.
  • There’s concern about a “race to the bottom”: hustling, spammy promotion, SEO-style posting, and influencer effects crowding genuine Show‑and‑Tell culture.

The Agentic AI Handbook: Production-Ready Patterns

Perceived Value of the Handbook

  • Some see it as a useful consolidation of emerging “agentic” techniques and terminology, helping teams share a common vocabulary.
  • Others find it unreadable, fluffy, or outright incorrect in places, and liken it to design-patterns/Agile-style buzzword cargo culting for AI.
  • Several suspect it’s AI‑generated and intended more as FOMO marketing and lead capture than as a serious engineering resource.

Cognitive Overhead and Limitations of Agents

  • Multiple commenters report high “cognitive cost”: more time babysitting, debugging, and cleaning up agents than just solving problems directly.
  • The “issue → PR → resolve” dream is widely doubted; people describe downstream regressions and hairball architectures from over‑trusted agents.
  • Debate over whether current problems are a temporary learning curve or intrinsic model limitations; no consensus.

Tooling, Workflows, and UX

  • GitHub Copilot’s agent mode is frequently called out as confusing and unreliable; alternatives like Claude Code, Cursor, OpenCode, and CLI tools are praised.
  • Effective workflows described: project‑level rules, agents with repo access, “plan → apply changes → human review” loops, multiple concurrent coding sessions.
  • Many struggle with poor UX: conflicting change stacks, mysterious edits, unreliable context injection, and lack of “contained mode” (restricting where agents can edit).

Prompting vs. Formal “Agentic Patterns”

  • Some argue you can get “80% there” with simple, direct prompts (“act as a senior engineer…”) instead of elaborate agent frameworks.
  • Others emphasize that detailed, project‑specific instructions and sub‑agents/skills are needed to push from 80% to production quality, especially to manage context and style.
  • A few note that as models internalize patterns (planning, TODO management), higher‑level abstractions can become redundant or counterproductive.

Reliability, Quality, and Maintainability

  • Strong concern about agents producing unstructured “slop” that becomes harder to change as projects grow; several report being hired to rewrite LLM‑built systems from scratch.
  • Tests are cited as a weak spot: agents often generate shallow or misguided tests unless given very precise specifications.
  • Suggested safeguards include requiring agents to explain confidence before irreversible actions, human‑in‑the‑loop interruption points, and clear goals plus verification criteria.

Experiences from Heavy Users

  • Some report dramatic productivity gains (e.g., multi‑language libraries, complex bug fixes in minutes) and foresee a major shift in how we use computers and program.
  • Others remain cautious: tools are powerful but immature, highly domain‑ and tool‑dependent, and easy to misapply under hype and management pressure.

Meta: AI Content and Community Norms

  • Friction over constant “this is AI‑written slop” accusations: some want public shaming to deter low‑effort content, others say it’s overused and erodes signal.
  • There’s interest in reading prompts instead of polished AI‑generated prose, and skepticism about “AI growth” influencers vs practitioners with production experience.

cURL removes bug bounties

Scale and Nature of the “AI Slop” Problem

  • Many reports to cURL’s bounty were obviously LLM-generated: generic language, wrong project names, imaginary vulnerabilities, and copy‑pasted “chat” output.
  • Reviewers found it exhausting: polite attempts to engage were met with incoherent replies, suggesting low English proficiency plus overreliance on AI.
  • Some commenters note this started already in 2023, before “AI slop” became widely recognized, making it harder to detect in mixed-quality queues.

Entry Fees, Friction, and Game-Theoretic Fixes

  • Several propose a submission fee refunded for valid or good‑faith reports to deter spam; likened to adding “trivial inconveniences” that dramatically reduce low‑effort behavior.
  • Others warn this would:
    • Deter serious but uncertain reporters and those with little money.
    • Create admin, payment, and escrow complexity for maintainers.
    • Incentivize companies to reject valid reports to keep the fee.
  • Variants suggested: platform‑level fees (e.g. pay to join HackerOne, then rate‑limit bad actors), or tiered “double down” fees that escalate to senior reviewers.

Structural Problems with Bug Bounties

  • People on the receiving side describe huge volumes of low‑quality, copy‑pasted scanner output even before AI.
  • From the submitter side, common complaints: unclear scope, misinformed triagers, “works as intended” rationalizations, severity downgrades, and outright nonpayment.
  • There’s disagreement on whether bounties realistically deter selling exploits to offensive buyers; some see that as mostly a myth outside high‑end zero‑day markets.

Using AI to Fight AI

  • One camp suggests LLMs could pre‑triage reports: given a “presume it’s wrong and explain why” prompt, models do surprisingly well at calling out slop on sample curl reports.
  • Critics respond that:
    • LLM judgments are non‑deterministic and easy to steer with leading prompts.
    • False negatives/positives on security reports are unacceptable without human review.
    • Overtrusting AI here repeats the original problem, just on the maintainer’s side.

Open Source, Incentives, and AI

  • Many see open source as uniquely harmed: its code trains models, which then:
    • Generate spam issues/PRs and bogus bug reports.
    • Help competitors build proprietary services that undercut FOSS‑based business models.
  • Others counter that:
    • FOSS licenses explicitly permit learning from code; some argue training is “fair use.”
    • LLMs can meaningfully assist real contributors when used as tools, not as generators of unchecked output.
  • There’s concern that AI‑driven spam erodes maintainers’ will to accept outside contributions at all.

Alternatives and Reputation-Based Controls

  • Suggestions include:
    • Invite‑only or private bounty programs based on platform reputation.
    • GitHub‑style “strike” or community tagging systems for repeat slop submitters.
    • CTF‑style “flags” for some vulnerability classes to make validity unambiguous.
  • Critics note these can raise barriers for new researchers and don’t fully address non‑malicious but misguided AI‑assisted reports.

Disaster planning for regular folks (2015)

Mundane Risks vs. Apocalypse

  • Commenters like the article’s focus on likely, everyday disasters (power outages, unemployment, illness) over “zombie apocalypse” scenarios.
  • Financial preparedness (savings, insurance) is framed as higher‑value than exotic edge cases; some note over-optimization (e.g., extreme early-retirement frugality) can be its own risk.
  • Examples: stored food rations proved most useful during unemployment, not catastrophe.

Lessons from War Zones (Ukraine)

  • A Canadian commenter relays a Ukrainian friend’s “prep list”: generator, fuel storage, medical kits, solar + batteries, long ethernet runs, pumps, rifle, and even drone-based improvised weapons.
  • Others question whether offensive tools (e.g., drone-triggered Molotovs) belong in civilian prep lists and why such long network cables matter; replies stress remote mounting of comms gear (e.g., Starlink) and multipurpose use of cable (power, alarms, comms).
  • Debate over leaving versus staying to defend one’s country: some argue nothing is worth dying for; others counter that unopposed aggression just spreads and that atrocities make resistance morally necessary.

Gear, Energy, and Water

  • Multiple detailed discussions on generators: sizing above expected load, using them to charge batteries efficiently, and fuel aging. Propane/dual-fuel setups seen as more stable than diesel/gasoline.
  • Suggestions include two weeks or more of food, water storage and purification (tablets, filters, reverse osmosis), and considering iodine pills mainly for nuclear scenarios.
  • Meal prepping and having backup cooking/power is framed as “stealth prepping” that pays off in daily life.

Violence, Weapons, and “Warlord” Scenarios

  • Strong disagreement over how realistic roving warlord gangs are. Some see them as overstated fantasies; others note historical and current warlordism.
  • Consensus that lone “prepper caves” are vulnerable; groups, fortifications, and numbers matter more than sheer weapon count.
  • Guns are discussed as tools for hunting, deterrence, and last-resort defense, with advice to train or prefer simpler shotguns. Skeptics doubt one household can resist organized raiders.

Community, Social Capital, and Stable Societies

  • Many emphasize relationships, trust with neighbors, and mutual aid as the most important preparation.
  • Examples include neighborhood disaster planning, island communities coordinating trucks and boats, and historical cooperatives and monasteries as resilient micro-societies.
  • Some argue social destabilization is driven by deeper energy/complexity limits rather than just “bad leaders.”

Psychological & Administrative Readiness

  • Resources like Finland’s “72 hours” guide and Kiwix (offline Wikipedia) are cited.
  • Psychological resilience advice overlaps with coping strategies for mental health crises.
  • A “when I die” booklet with accounts, passwords, and practical instructions is recommended as a non-doomsday but essential form of disaster planning.

Anthropic's original take home assignment open sourced

Assignment clarity and scope

  • Several people initially found the repo confusing: the README is mostly about performance numbers, while the real instructions are buried in perf_takehome.py.
  • The core task: modify KernelBuilder.build_kernel to produce a faster instruction sequence for a simulated machine, with performance measured by test_kernel_cycles.
  • Some argue the “cryptic” setup is intentional and realistic: quickly pulling a clear problem statement out of partial code and comments is itself part of the test. Others think this is too much reverse‑engineering for an interview.

Technical nature of the problem

  • The “machine” is a simulated VLIW + SIMD architecture, conceptually closer to a GPU/TPU or DSP than a CPU, with instruction slots, vector ALU, and memory/scratch operations.
  • The kernel is a synthetic tree‑like/random walk hashing problem chosen largely for its optimization hooks, not for real‑world utility.
  • Multiple commenters compare it to demoscene/code golf: packing operations into minimal cycles, exploiting instruction‑level and data‑level parallelism.

Time limits, compensation, and candidate burden

  • Confusion over the “2 hours” wording: is that a candidate limit, or just the time Claude used? Some say candidates had 4 hours; others thought longer was allowed.
  • Many feel this is too large a task for an unpaid take‑home, especially given low odds of offer and the need to juggle multiple applications and life commitments.
  • Some adopt a policy of refusing or asking to be paid for lengthy take‑homes; others note this effectively self‑excludes you from elite labs that have many willing applicants.

Hiring signal vs LeetCode

  • Supporters like that this is tightly aligned with a performance‑engineering role, unlike generic LeetCode questions or CRUD apps.
  • Critics note it selects for a narrow “optimizer” profile and doesn’t test system design, product sense, or teamwork, though defenders reply that’s fine for this specific role.

AI vs humans on the benchmark

  • Multiple users ran various LLM agents against the task. Some models achieved large speedups and got near or below human‑reported numbers, though not always beating Anthropic’s published Opus result.
  • There’s concern about whether models might “cheat” by exploiting knowledge of expected outputs; others assume Anthropic manually inspected solutions and used cycle counts from the simulator.

Tone and perception of Anthropic

  • The line “so we can be appropriately impressed and perhaps discuss interviewing” is widely debated. Some read it as playful and non‑committal; many find it condescending or elitist.
  • A few see the whole setup as marketing for Claude’s performance rather than a genuinely candidate‑friendly exercise.

Reflections on difficulty and expertise

  • Several experienced engineers say the task humblingly highlights how specialized low‑level performance work is.
  • Others push back against treating this as a universal bar: it’s one niche “game” among many in software, and being bad at this doesn’t make you a bad engineer.

Verizon starts requiring 365 days of paid service before it will unlock phones

Verizon’s New 1-Year Lock Policy & Regulatory Context

  • Verizon previously had a 60-day automatic unlock requirement tied to spectrum/merger conditions; commenters note this was easy for iPhones and often trivial to trigger (“for travel”).
  • New TracFone policy extends locking to 365 days and requires a user-initiated request, seen as a step back for consumer rights.
  • Several see the long lock as a stealth switching cost and anti-competitive behavior rather than fraud prevention.
  • Commenters highlight that the current FCC is moving toward laxer standards, with some blaming the administration and expressing cynicism about regulators “looking out for the little guy.”

Locking Mechanics & “Flex” Policies

  • Older phones used modem-level locks via NCK codes; if not locked at manufacture, carriers couldn’t easily add a lock remotely.
  • Modern smartphones (especially iPhones) often rely on software-level “activation policies,” which can lock to the first carrier they see (e.g., US Reseller / Flex Lock).
  • Some dispute whether “unattached” phones can lock themselves; others link to Flex Lock explanations and advise verifying you aren’t buying such stock.
  • There’s discussion of root access on Android and whether it can bypass modem locks; this is contested and unresolved in the thread.

Consumer Strategies: BYOD, MVNOs, and Travel

  • Strong sentiment: buy phones outright (Apple Store, direct from OEMs, used) and avoid carrier financing/locks.
  • Many advocate MVNOs (Mint, Visible, US Mobile, T-Mobile Connect, etc.) as dramatically cheaper than major carriers, though some note deprioritization or coverage tradeoffs.
  • Some recount past hassles bringing unlocked phones to Verizon or dealing with store employees; advice is to avoid authorized retailers.
  • Travelers emphasize the pain of locked phones abroad (blocked from cheap local eSIMs, forced into expensive roaming).

Economics, Affordability, and International Contrast

  • Debate over whether “free” or financed phones truly cost more overall; some say carriers just spread normal phone prices over time, others argue the lock-in to expensive plans is where the cost hides.
  • Several note that many Americans can’t easily pay $600–$1,000 upfront, while others counter that cheaper usable phones exist.
  • International commenters describe countries where installment plans don’t inflate plan prices, locking is rare or illegal, and strong consumer protection laws limit contract terms.

Normative Views & Policy Ideas

  • Numerous calls for legislation banning or tightly limiting SIM locks and long lock periods.
  • One detailed dissenting view argues SIM locking is a useful “repossession” tool to manage credit risk and combat identity-fraud resale, though even that commenter concedes current SIM locks are a blunt, easily abused mechanism.

Claude Chill: Fix Claude Code's flickering in terminal

Community reaction to Claude Chill

  • Many commenters are relieved and grateful; some call it the most useful contribution to Claude Code in months.
  • Several describe the flicker as literally headache‑inducing or hypnotic, making the tool unpleasant or unusable.
  • A few note side effects: the PTY proxy approach can break native terminal scrollback (e.g., in Ghostty), forcing a trade‑off between smoothness and scrollback.

Frustration with Claude Code flickering

  • Numerous users are incredulous the bug has persisted for months in a flagship “agentic coding” product.
  • Some say they would be embarrassed to ship a TUI that repeatedly clears and redraws the screen and scrollback.
  • Comparisons are made to other tools (Codex, opencode, Neovim, etc.) that “just work” without flicker, though a few note flickering in other React-based CLIs too.

Speculation on Anthropic’s engineering and process

  • Commenters mock the disconnect between lofty AI claims (“90% of code written by AI”) and failure to fix a basic terminal bug.
  • There’s speculation that Claude Code is partially or heavily AI-written and that dogfooding it may be slowing real fixes.
  • Some blame management/under‑resourcing rather than individual engineers; others say a commercial product at this scale no longer deserves “leeway.”

Technical causes and approaches

  • Original implementation used Ink (React TUI renderer) which clears and redraws on each update; later they replaced it with a custom React-based renderer.
  • Core issue: Claude Code uses scrollback rather than the alternate screen buffer, so it must clear and redraw scrollback, causing tearing/flicker.
  • A Claude Code engineer explains they shipped a new differential renderer, reducing flicker and adding support for synchronized output (DEC mode 2026) via patches to VS Code’s terminal and tmux.
  • They describe the TUI as “small game engine”-like, with a React scene graph → layout → rasterization → diff → ANSI pipeline, heavily optimized to avoid GC pauses.

Workarounds, alternatives, and feature wishes

  • Users mention Ghostty (with DEC 2026), tmux, zellij, and other tools; some still see bad flicker in tmux even on the latest version.
  • Alternatives like Rust/Go TUIs (ratatui, Bubbletea) are praised as smoother than the JS/React stack.
  • Requests include a toggle to keep input pinned to the bottom and clearer decoupling of the UI so other front‑ends can be built.

California is free of drought for the first time in 25 years

Long-term climate cycles and memory

  • Several comments reference California’s historic rhythm of multi‑year wet and dry periods, echoing Steinbeck’s description of decades-long cycles.
  • People note that residents “forget” the previous phase: in drought they forget floods, and in wet years they forget drought — likened to economic boom/bust cycles and even addiction dynamics.
  • Some warn that ARkStorm‑type mega‑flood scenarios are also part of California’s risk profile and often overlooked.

Dams, reservoirs, and water infrastructure

  • One view: modern California underbuilt storage relative to population; any shortage is framed as a policy failure to build enough dams/reservoirs.
  • Others push back: suitable dam sites are largely used; new dams face diminishing returns, heavy sedimentation, ecosystem damage (e.g., salmon), coastal erosion, and high cost.
  • Examples are given of dams silting up far faster than planned, and of flood‑control dams not meant as storage.
  • Commenters note active projects (Sites, San Luis expansions) and that storage rights are tied to specific districts, not a unified statewide system.

Snowpack, rainfall, and regional variability

  • Multiple posts stress that “drought‑free” based on reservoirs can hide poor snowpack; current snow is below or near average depending on region and metric.
  • Snowmelt is described as crucial “natural storage”; warm, rainy winters replenish reservoirs but weaken summer supply.
  • Experiences differ widely across the state: some areas report the wettest, most damaging storms in decades; others say recent years were far wetter.

Water pricing, behavior, and policy

  • High water bills are attributed mostly to fixed infrastructure costs, not short‑term rainfall.
  • Drought policies like not automatically serving restaurant water are debated: some see them as useful awareness tools; others see them as patronizing, symbolic, and trust‑eroding.
  • There’s tension between market‑pricing water (letting scarcity raise prices) versus protecting politically favored large users.

Agriculture, groundwater, and rights

  • Several argue the real problem is western water law and cheap water for thirsty crops in arid areas, not storage capacity.
  • Almonds and similar crops are cited as economically lucrative but nonessential from a survival standpoint; critics say they’re effectively subsidized by underpriced water.
  • Groundwater in parts of the Central Valley is described as severely depleted and, in places, permanently lost due to subsidence.

Desalination and cloud seeding

  • Desalination is discussed as technically feasible but constrained by cost, energy use, marine impacts, and California Coastal Commission decisions; some plants exist or are planned, others were blocked.
  • Cloud seeding programs and grants are mentioned; there’s disagreement over their significance and potential liability, but no consensus that they materially explain current conditions.

Wildfire risk and climate change

  • Commenters highlight that swings from very wet to very dry increase wildfire risk by growing fuel and then rapidly drying it.
  • There’s discussion of how historic fire‑adapted ecosystems plus decades of aggressive fire suppression have set up modern megafires, many now started by human activity.
  • Some see celebrating “no drought” as fine; others argue it’s misleading comfort given ongoing snowpack, groundwater, and climate‑driven extremes.

Definitions, metrics, and media framing

  • Several posts examine how “drought” is defined (relative to historical averages vs. absolute scarcity) and note that California was nearly drought‑free as recently as 2024.
  • The difference between 0% and “almost 0%” drought area is called largely cartographic; some accuse headlines of overselling novelty.

The challenges of soft delete

Approaches to implementing soft delete

  • Move deleted rows to a separate collection/table (popular in Mongo and RDBMS via triggers or CDC), keeping “live” tables slim and fast.
  • Use table partitioning (e.g., by a deleted flag or time) so “deleted” partitions can be placed on cheaper storage and excluded transparently.
  • Use views (or RLS) to hide soft-deleted rows; the app queries the view as if it were the table. Some dislike views due to past bad experiences; others see them as exactly what’s needed.
  • Maintain separate archive/history tables via triggers or CDC (append-only), treating updates as new versions or “soft deletes” of old state.
  • For offline/replicated systems, treat deletion as just another update, then run a garbage collector to hard-delete after a retention window.

Soft delete vs audit/history

  • Several argue soft delete is a poor fit for true audit/compliance; event sourcing or dedicated audit tables/history logs are more reliable and expressive.
  • Others use “immutable rows + new row per change” patterns to preserve full history and make “as-of” queries possible.
  • Some domains (banking, insurance) already extensively use append-only or bitemporal patterns (valid_from/valid_to) rather than ad-hoc soft delete.

Performance, complexity, and schema drift

  • Query complexity is a recurring concern: missing a “deleted” filter in one of many joins leads to “ghost data.”
  • When deleted rows reach 50–70% of a table, performance can degrade; partitioning, warehousing, or archival is then recommended.
  • Schema drift in archived/soft-deleted records is tricky; many report that large-scale restores are rare and often fail, so the cost of keeping old schemas in sync may not be worth it.

Regulatory and risk considerations

  • Privacy laws (GDPR, CCPA, anti-retention rules) often require hard deletion or strict retention limits; soft delete alone is insufficient and may be risky.
  • Other regulations and business rules require long-term retention, pushing towards soft delete or archives; many systems end up needing both soft delete and true erasure mechanisms.

Product semantics and usage patterns

  • “Soft delete” is seen as an implementation detail; product language should be “delete,” “archive,” “hide,” “close,” “undo,” etc., each with clear semantics.
  • Some teams conclude that backups + point-in-time restore plus hard deletes are simpler, because actual “undelete” needs are infrequent.

Our approach to age prediction

Initial reactions & “creepy” factor

  • Several commenters say the framing feels invasive—like OpenAI is trying to infer their age personally, not just enforce a policy.
  • Some liken the vibe to “Minority Report” or general “creepy people doing creepy things” with behavioral prediction.

Privacy, surveillance, and biometric concerns

  • Strong resistance to selfie/ID verification via Persona; anecdotes of it being slow, intrusive, and demanding multiple documents.
  • Many see this as a “data grab” that will end up with downstream brokers, leaks, or later repurposing (e.g., for other products or border/security use).
  • Others note that every click, keystroke, mouse movement, and chat—typed or even deleted—is likely logged and can be linked to ID, making it highly deanonymizing.

Advertising and demographic profiling motives

  • Widespread belief this is primarily about building accurate demographic profiles (age, gender, income, etc.) to optimize ad targeting and comply with ad laws on minors.
  • Commenters tie this to OpenAI’s recent ad announcements and predict that misclassifying adults as minors conveniently pushes more users into “verification.”
  • Some argue that LLM conversations are essentially becoming the new ad-targeting corpus, like social media profiles.

Effectiveness and unintended consequences of age prediction

  • Skepticism that behavioral age prediction actually works; multiple users report being misclassified as teens despite being in their 30s–50s.
  • Concern that kids will simply “act adult” (ask mature questions) to evade filters, possibly increasing exposure to adult content.
  • Comparisons to crude legacy “age checks” (e.g., trivia questions in games) that were easily bypassed.

Child safety, responsibility, and censorship debates

  • A minority defends the effort, arguing ChatGPT is now de facto “safety-critical” after suicide-related cases and that companies must try to protect vulnerable users.
  • Others reject framing AI as safety‑critical, seeing this as overreach and creeping authoritarianism under “protect the children” rhetoric.
  • Debate over whether focusing on under‑18s makes sense when adults can be just as vulnerable or easily influenced.

Regulation, normalization, and trust

  • Discussion of laws pushing age‑gating globally and EFF’s warnings that such rules inherently drive more surveillance.
  • Some worry this normalizes “prove you’re an adult for full functionality” and identity‑linked internet use by 2030.
  • Several users say they will cancel or switch to competitors rather than provide biometric or ID data, citing a growing trust gap with OpenAI.

Instabridge has acquired Nova Launcher

Privacy, Tracking, and Trust

  • Many commenters see the acquisition and the recent update adding Facebook/Google trackers as a clear red flag, contradicting claims of “minimal, purpose‑driven data collection” and “we do not sell personal data.”
  • Several note that companies often treat “anonymized” or third‑party‑collected data as “not personal,” so statements about not “selling personal data” are viewed as largely meaningless.
  • The prior owner (Branch/Branch Metrics) is described as an analytics/cohort‑tracking company; that history reinforces expectations of aggressive data collection rather than user‑centric development.
  • Instabridge’s existing Wi‑Fi app is criticized for dark patterns: incentivized 5‑star reviews, broken ToS/privacy links, attempts to change default launcher/browser, aggressive ads, and prompts to share home Wi‑Fi passwords.

Ads, Business Model, and “Here to Stay”

  • Nova’s own FAQ about “evaluating ad‑based options” for the free version, while keeping Prime ad‑free, is interpreted by many as confirmation that ad monetization is coming.
  • Phrases like “here to stay,” “immediate focus,” and vague future open‑source talk are widely read as corporate boilerplate preceding either enshittification or shutdown.
  • Timeline shared: acquisition by Branch (2022), mass layoffs leaving only the original dev (2024), then the dev leaving after being told to stop open‑sourcing (2025). This reinforces a narrative of a once‑beloved app being stripped for value.

Open Source vs Proprietary and Sustainability

  • Many argue this is another example that proprietary apps inevitably degrade once investors/metrics companies get involved; open source is framed as the only durable protection.
  • Others counter that open source still struggles with funding and burnout; there is no solved model that reliably sustains quality without monetization pressures.

Alternative Launchers and Use Cases

  • Popular replacements mentioned: Lawnchair, KISS, Kvaesitso, Niagara, Octopi, Smart Launcher, Olauncher, Microsoft Launcher, Square Home, Pear, Pie, and various OEM/Lineage launchers.
  • People value: removing the forced Google search bar/news feed, consistent behavior across phones, search‑centric UIs, tabbed app drawers, minimalist black/white designs, and fewer trackers.
  • Some report glitches with third‑party launchers on certain devices (e.g., Pixel 6, OnePlus 15), though others say these are now mostly resolved.

Do Launchers Still Matter?

  • A subset feels modern stock launchers are “good enough”; others say OEM launchers remain inflexible, push their ecosystems, and often include telemetry, making custom launchers still important.
  • Impact on related products like Sesame is raised but remains unclear.

IPv6 is not insecure because it lacks a NAT

What NAT Actually Is (IPv4 vs IPv6)

  • Many distinguish classic IPv4 NAPT (address+port overloading, many‑to‑one) from 1:1 prefix translation.
  • In IPv6, NAT66/NPTv6 exist and are used mainly for prefix translation (e.g. renumbering, ULA↔global prefix), not for address+port overloading, since address scarcity isn’t a problem.
  • Some note you can emulate IPv4‑style many‑to‑one NAT with IPv6 + port rewrites, but it rarely makes sense.

NAT vs Firewall: Where Security Actually Comes From

  • Repeated clarification: NAT’s core function is address translation; it doesn’t inherently decide to drop packets.
  • On most consumer gear, NAT is bundled with a stateful firewall that defaults to “deny inbound, allow outbound”. That firewall behavior, not NAT itself, blocks unsolicited inbound traffic.
  • Several point out that without firewall rules, a NAT device will happily route packets to internal addresses if they somehow arrive on the WAN side.

“NAT Is Security in Practice” View

  • Others argue that in real deployments NAT does provide material security: it makes internal addresses unroutable from the wider Internet and forces explicit configuration (port forwarding/DMZ) for exposure.
  • They frame this as defense‑in‑depth and “safety by default”: with IPv4+NAT, many home users accidentally end up with a reasonably safe posture even if they never touch firewall settings.
  • Historical anecdotes: early broadband and PIX appliances were sold and perceived as security products; NAT reduced successful opportunistic attacks on home users.

IPv6 Security and Misconfiguration Risk

  • Consensus: IPv6 can be just as safe as IPv4+NAT if the gateway has a default‑deny stateful firewall, which most modern CPEs do.
  • Concern: misconfigured or disabled IPv6 firewalls, “passthrough” modes, or dual‑stack setups where IPv6 is left open while IPv4 is locked down. Several share real incidents of devices compromised over IPv6 because only IPv4 posture was considered.
  • Some auditors and admins still distrust IPv6 because globally routable addresses feel inherently riskier than RFC1918+NAT.

Obscurity, Addressability, and Privacy

  • One camp stresses that non‑routable RFC1918 space and NAT give a useful “namespacing” and leak less information when internal addresses appear in logs/config dumps.
  • Others call this security‑by‑obscurity: attackers can’t route RFC1918 from the global Internet anyway, and IPv6 privacy extensions plus firewalls are the right tools for privacy and exposure control.
  • Scanning full IPv6 spaces is infeasible, but harvesting addresses (e.g. via NTP or other outbound traffic) is acknowledged as a realistic technique.

NAT Downsides and Architectural Trade‑offs

  • Multiple comments highlight NAT’s technical costs: protocol ossification, broken end‑to‑end assumptions, extra complexity for P2P, SIP/FTP hacks, UPnP attack surface, and CGNAT pain.
  • Some see IPv6’s main value in removing these hacks; others value NAT’s accidental safety and clear “inside vs outside” boundary, especially for non‑experts.

Ask HN: Burned out from tech, what else is there?

Clarifying the Burnout and Yourself

  • Several comments ask what specifically is burning you out: tech culture, screen time, bureaucracy, lack of meaning, or pure exhaustion.
  • A recurring theme: do an inventory of what you value and what parts of your current “micro-tasks” you enjoy or dread, and let that guide next steps.
  • Some argue the core quest is internal: learning to find meaning where you are, rather than expecting a different job to solve malaise.

Sabbaticals, Travel, and “Resets”

  • Many recommend a sabbatical if finances and mental health allow: hiking long trails, travel, physical hobbies, temp jobs, or structured experiences (e.g., a pilgrimage).
  • Others warn that unstructured time off can worsen depression and lead to aimless spiraling; they favor bounded breaks, unpaid leave, or specific projects.
  • Long-distance hiking stories recur as transformative: reducing needs, resetting priorities, and returning to simpler, slower-paced tech roles.

Staying in Tech, But Changing the Context

  • Suggestions include: moving from startups to universities, government, Fortune 500, SMBs, or research support, where pace and stakes feel saner and work more “real.”
  • Some shift to management, consulting, or starting their own (often smaller, slower) software businesses.
  • Others advocate applying tech skills to more meaningful domains (healthcare, science, STEM orgs) rather than abandoning the field.

Switching Fields and Working With Your Hands

  • Strong interest in trades and physical/outdoor work: carpenter, park ranger, paramedic, nurse, civil construction, restaurant line cook, gym trainer, van/truck driver, off-grid living.
  • These are described as more tangible and often more fulfilling, but typically pay less and can be physically and emotionally brutal (firefighting, nursing, etc.).
  • Claims of very high trade incomes (e.g., plumbers at $800/hr) are disputed and heavily caveated.

Small Businesses and Hybrid Paths

  • Multiple accounts of side or second careers: coffee carts, t‑shirt shops, kayak/manatee tours, drone piloting, event production, carpentry-like work, teaching.
  • Common pattern: financial cushion from tech → experimentation → landing in a simpler, lower-paid but more satisfying role, or returning to tech with healthier boundaries.

Meta: Advice Sources and Expectations

  • Debate over asking strangers vs. friends; some value anonymous, experience-based input from similar professionals.
  • Several caution against expecting work to provide happiness; “work to live, don’t live to work,” and focus on crafting a broader life that supports your version of happiness.

Google co-founder reveals that "many" of the new hires do not have a degree

Not Really News / Historical Context

  • Many commenters say Google hiring people without degrees is old news, citing reports and personal experience from the 2000s and 2010s.
  • Early Google is described as heavily academic (PhDs, elite schools, “university-like” culture), but even then there were some exceptions.
  • Several note that Microsoft and others have long had “degree or equivalent experience” language, so “dropping degree requirements” is framed as more branding than a real turning point.

How True Is “Many”?

  • Some ex‑Googlers report knowing only one or two colleagues without degrees and never seeing such candidates pass hiring committees, so they doubt the word “many” reflects a significant percentage.
  • Others share the opposite: multiple non‑degree or unrelated‑degree engineers at Google and other big tech firms, often entering via strong portfolios, referrals, or previous experience.
  • Several people checked current Google job postings and saw explicit degree requirements, reinforcing skepticism that a non‑degree applicant can get through without a special signal.

Degrees vs Skills / Credentialism

  • Broad agreement that real skills, projects, and experience matter more after the first few years; degrees are mainly useful as an early‑career filter.
  • Multiple anecdotes: some of the best engineers had no CS degree (or no degree at all), while some degree‑holders underperform.
  • Others counter that this is selection bias: highly motivated self‑taught people are rare; statistically, a random CS grad is more likely to be productive than a random non‑CS grad.
  • Several see degrees as class or status markers rather than intelligence, and worry about gatekeeping and loss of mobility for non‑credentialed but capable people.

Hiring Mechanics and Geography

  • People argue that applicant tracking systems and HR still use degrees (and school prestige) to cull resumes, making “skills-based hiring” hard to access without referrals.
  • Location and address can further limit remote opportunities; some suggest omitting address to avoid automated filters.

Article Quality and AI Speculation

  • The Yahoo piece is criticized as a low‑effort paraphrase of a Fortune article, with awkward segues into AI and power grids.
  • Several suspect AI authorship or at least “AI-level” editing, pointing to clumsy topic shifts and near-verbatim paraphrasing.

A 26,000-year astronomical monument hidden in plain sight (2019)

Encoding time in the sky

  • Many found the Hoover Dam “star map” a compelling attempt to encode a specific date for far‑future readers using precession of the equinoxes and pole star shifts.
  • Some referenced popular fringe authors as an entry point to this topic, with others dismissing them as pseudo‑scientific.

Ancient vs modern architecture and attention to the sky

  • Commenters praised ancient and early‑20th‑century architecture for embedding astronomical and symbolic meaning, contrasting it with today’s construction optimized for cost and speed.
  • Several noted that pre‑industrial peoples, lacking light pollution and modern media, naturally paid more attention to the night sky for calendars and survival, whereas contemporary society relies on apps.
  • There was appreciation that some modern works (like this monument) still aim for long‑term, thoughtful design.

Astronomy, precession, and navigation

  • Discussion covered precession, pole stars, and Milankovitch cycles, with links explaining how the celestial pole drifts and how current Polaris is a temporary north star.
  • One correction: celestial navigation does not strictly depend on Polaris; it uses observations of multiple bright stars.
  • People mused about using other celestial cycles to encode absolute time (e.g., planetary configurations, galaxy evolution).

The Long Now date format (“01931”)

  • The “01931” notation sparked debate:
    • Supporters see it as an artistic device to nudge thinking toward 10,000‑year timescales, aligned with Long Now’s 10k‑year clock.
    • Critics call it arbitrary, confusing, or “nonsense formatting,” arguing leading zeros don’t solve ambiguity for future archaeologists.
    • Others counter that any future reader would rely on broader cultural/contextual clues, not just the digits.

Preservation and restoration of the star map

  • A linked campaign claimed the terrazzo star map had been broken up during drainage work, upsetting readers who saw this as undermining its long‑term intent.
  • Follow‑up links and first‑hand visitor reports indicate it has been or is being reconstructed; someone associated with the preservation site stated the restoration finished in late 2025.

How long will Hoover Dam last?

  • The article’s suggestion that major parts may last hundreds of thousands of years drew skepticism.
  • Critics point to siltation of the reservoir, erosion once water overtops the dam, and Portland cement’s limitations, arguing functional and structural failure will come far sooner.

Related long‑term/astronomical projects

  • Commenters shared analogous ideas: star‑map posters, a wedding pendant encoding planetary and moon positions (with technical discussion of calculating and inverting such configurations), and commercial services that plot the sky for given dates.
  • The Long Now Foundation itself got praise; some use “how would you build a 10k‑year clock?” as a way to provoke creative, long‑term thinking.