Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 166 of 524

Phone numbers for use in TV shows, films and creative works

Fictitious / “Drama” Numbers in Different Countries

  • Links shared for North American 555 numbers, UK “numbers for drama”, and Australia’s ACMA list; people note similar schemes exist but surprisingly few countries officially reserve drama ranges.
  • Clarification that the ACMA rules apply only under country code +61; others are under different numbering plans.

History and Nostalgia Around Phone Numbering

  • Several detailed reminiscences of UK numbering changes (London’s 01 → 071/081 → 0171/0181 → 020), short local codes, and rotary-dial slowness with long numbers.
  • Memories of directory enquiries with human operators, everyone being in the phone book, and frequent wrong numbers but fewer scams.
  • US commenters recall area-code splits in the fax/modem era and social status attached to old “core” area codes.

Pop Culture Numbers and Real-World Impact

  • Many references to song and TV numbers: “867-5309”, “777-9311”, “Pennsylvania 6-5000”, “Beachwood 4-5789”, IT Crowd’s gag number, classic BBC call‑in numbers, etc.
  • Some of these were real numbers at the time and owners reportedly had to change them once songs became hits.
  • Mixed feelings about 555: some like its clear “don’t call this” signal; others say obvious 555-xxxx numbers break immersion and wish reserved numbers were less conspicuous.

Using Fake Numbers in Everyday Life and Testing

  • Multiple people use local fictitious ranges or well-known numbers (especially 867‑5309 and xxx‑555‑1212) for:
    • Website signups that demand a number.
    • Retail loyalty programs and travel discounts.
  • Anecdotes suggest these shared “house numbers” often work across big US chains, sometimes yielding huge accrued rewards.
  • Testers and developers emphasize always using such reserved numbers in test data to avoid harassing real people.

Payphones, Phreaking, and Culture

  • Story of a home landline mislisted as a payphone on an early-internet directory, leading to repeated calls from foreign radio shows.
  • Explanations of why you’d call a payphone: saving someone coins, coordinating callbacks, and classic crime/spy tropes.
  • Broader nostalgia about payphones, phone-phreaking, and how early hacking culture was tightly tied to the telephone network.

Technical Numbering Details and Media Tricks

  • Discussion of NANP rules (no area codes starting with 0/1; 1 as country code and long‑distance prefix) and UK misconceptions about the London area code.
  • Notes that some shows (Futurama, The Simpsons, Last Action Hero) play meta games with phone-number conventions; some productions even maintain real numbers with custom recorded messages as Easter eggs.

Denmark reportedly withdraws Chat Control proposal following controversy

Status of the Chat Control proposal

  • Commenters stress this is a tactical withdrawal, not a defeat: Denmark is reportedly shifting from mandatory scanning to codifying “voluntary” scanning by platforms and aiming for an EU compromise without explicit chat control.
  • Many expect the idea to return soon, citing a persistent “Yes / Maybe later” pattern in governance where unpopular measures are reintroduced with small tweaks until they pass.

Citizen pressure, email campaigns, and petitions

  • The coordinated mass-email campaign to MEPs is widely credited with influencing this outcome; people highlight the low friction (“one click to contact all relevant politicians”) as decisive.
  • Others doubt email’s general effectiveness, arguing it’s easy to ignore or auto-delete and usually lacks leverage; proponents respond that volume and timing mattered here.
  • Denmark’s formal citizen proposal (“Borgerforslag”) against EU mass surveillance is mentioned, but said to have had no practical impact so far; such proposals are generally viewed as weak tools.

Surveillance, power, and effectiveness

  • Strong consensus that scanning all private communications is disproportionate and either technically infeasible at scale or easily bypassed by serious criminals.
  • Several argue mass surveillance primarily enables political control and suppression of dissent, not child protection or crime reduction; CSAM and gangs are seen as pretexts.
  • China and Russia are repeatedly cited as examples where digital panopticons “work” in the sense of stabilizing regimes, not solving abuse or crime.

Trust in government and motives

  • Some Nordic commenters say high trust in relatively non-corrupt states makes such proposals politically viable, and attribute this case to tech ignorance rather than a desire to build a spy state.
  • Others are deeply skeptical, noting Denmark’s intelligence cooperation with the US, prior data-retention attempts, and explicit political rhetoric against end‑to‑end encryption as evidence of intent to expand state power.

Child protection vs. penalties and hypocrisy

  • A high-profile Danish child-pornography conviction with a short sentence is used to question whether authorities are serious about protecting children versus expanding surveillance.
  • Anger is amplified by reports that politicians sought exemptions for themselves from Chat Control, reinforcing perceptions of a two-tier system.

Apple reports fourth quarter results

Tax anomaly and corporate tax debate

  • Commenters notice Apple’s 2024 vs 2025 tax provisions but point out 2024 included a large one-time EU back-tax charge related to Ireland, so 2025 is closer to normal.
  • This sparks a long discussion on whether corporate income tax is good policy.
  • Some argue it mainly taxes shareholders (including pension funds) and distorts investment, preferring to tax dividends, buybacks, salaries, property, or land instead.
  • Others counter that higher corporate tax can push firms to spend more on wages/R&D, and that taxing only capital gains/dividends encourages avoidance and offshoring.
  • There’s disagreement on fairness, efficiency, and political realism; several note corporate taxes are popular because they are perceived as “someone else paying.”

Revenue mix and product trajectories

  • iPhone and Services dominate: together ~three-quarters of revenue.
  • Services include App Store, iCloud, search deals (e.g., Google default), AppleCare, and media bundles; many argue most of this is ultimately iPhone-driven.
  • Mac revenue is solid and currently Apple’s fastest-growing hardware segment; iPad and Wearables/Home/Accessories are flat or declining, not poised to “overtake” Mac soon.
  • Wearables are seen largely as iPhone accessories; AirPods appear saturated, Watch upgrades slowing.

Macs, longevity, and Windows spillover

  • Many note Macs last a long time (M1/M2 machines still “too good” to replace), which depresses unit sales but not satisfaction.
  • Some speculate Windows 10/11 turbulence is boosting Mac adoption, though price and regional affordability are major constraints outside the US/EU.
  • There’s debate over reliability versus PCs; anecdotes show both long-lived Macs and long-lived Dells/ThinkPads.

Computing habits: phones vs computers

  • Several remark how close iPad revenue is to Mac and how many younger users rely almost entirely on phones/iPads.
  • One camp can’t imagine research-heavy tasks (travel planning, finance, multi-tab comparisons) without a laptop; another says most people don’t do deep research and happily book everything on phones, valuing time and convenience over optimization.
  • Broader thread about “computer illiteracy,” walled gardens, and parallels to cars becoming “sealed appliances.”

Services, ads, and “iPhone company” framing

  • Multiple comments assert Apple is fundamentally the iPhone company; Macs and iPads are “side gigs” that exist largely to support the iPhone ecosystem (including app development).
  • Concern that “Services” growth will drive more ads and DRM-heavy experiences across platforms, eroding the older, ad-light Apple ethos.
  • Some note that despite category labels, a large share of Services and Wearables revenue is tightly coupled to iPhone ownership.

AI strategy and product integration

  • Some ask why Apple doesn’t “add AI”; others respond Apple already ships extensive on-device ML (OCR, computational photography, classification, voice dictation) without branding it as “AI.”
  • There’s criticism that Apple lags Android in visible AI features (photo editing, call screening, assistant quality), and that it has been “coasting.”
  • Interest in truly contextual, private, non-hallucinating personal agents; current offerings seen as incremental.

Supply chain and TSMC dependence

  • Thread highlights Apple’s heavy reliance on TSMC and, indirectly, ASML and US-funded EUV research.
  • People discuss geopolitical risk: if Taiwan fabs were knocked out, the entire global economy would suffer; other foundries (Samsung, Intel, SMIC) are behind and couldn’t quickly backfill.
  • Apple’s investments in TSMC’s Arizona fab are noted, but timelines (years to ramp, ~100 days per wafer) limit short-term resilience.

Apple vs Nvidia and AI compute

  • Some speculate Apple could challenge Nvidia in AI hardware given strong, efficient laptop SoCs and cash reserves, perhaps via future external GPUs.
  • Others argue Nvidia’s advantage is not just GPUs but interconnects, data-center scale, and software ecosystem; AMD is seen as more naturally positioned than Apple on the pure GPU front.
  • Lack of Apple GPU relevance in the research/ML community (Metal vs CUDA) is cited as a structural hurdle.

Market reach and platform “victory”

  • One perspective: in premium markets the “Android vs iPhone war is over” in Apple’s favor, especially in revenue/profit terms and social signaling.
  • Counterpoint: Android still has ~70% global unit share and dominates in lower-income countries; Apple is effectively a higher-margin, upper-tier brand that ignores vast segments where its pricing is unreachable.

Taking money off the table

Core Principle: Take Some Money Now

  • Many comments endorse “bird in the hand” logic: guaranteed money today beats a small chance of a much bigger payout later.
  • Greed and overconcentration in a single company (especially your employer) are framed as major risks: you’re already “structurally long” your company via your job.
  • Strong support for taking at least a partial cash-out and diversifying, rather than waiting for a maximal exit.

How Much to Take Off the Table?

  • 10% tender offers are seen as an obvious yes unless already wealthy; selling 10% meaningfully reduces downside while leaving most upside.
  • Some advocate a simple “sell half” rule each time to hedge while staying exposed. Others argue even 50% in one company is still dangerously undiversified.
  • References to Kelly criterion: optimal bet size is smaller when your bankroll is small; this favors selling more, not less.
  • Same logic is applied to public RSUs: if you wouldn’t take cash and immediately buy your company’s stock, you should probably sell and diversify.

Counterpoint: If They’re Buying, It’s Worth More

  • One contrarian view: any buyer must think the business is worth much more than the offer, so selling is irrational.
  • Rebuttals stress risk and portfolio context: buyers can spread risk over many bets; individuals usually have only one.
  • Analogies to insurance (paying to avoid ruin) and examples of turned-down buyouts that later went to zero underline that offers can disappear.

Life Stage, Experiences, and Psychology

  • Several argue that money’s ability to buy meaningful experiences declines with age; using some windfall now (travel, time off, housing stability) can be rational.
  • Others prioritize early retirement and heavy saving, but many see it as a both/and: sell some, invest most, still fund a few “now or never” experiences.
  • Mortgage discussions mirror the theme: mathematically optimal isn’t always psychologically optimal; independence, lower stress, and cash-flow flexibility often justify “suboptimal” choices.

Freedom and Optionality

  • Recurrent theme: the real payoff is “fuck-you money” — owning your home, having reserves, and being able to walk away from bad situations.
  • Making money and keeping it are framed as different skills; taking money off the table is presented as the bridge between the two.

Some people can't see mental images

Range of Inner Experiences

  • Commenters report the full spectrum: from “complete darkness” (no voluntary images at all) to hyper-detailed scenes where they can rotate objects, see reflections, even “project” images over real vision.
  • Many aphantasic commenters say they nonetheless “know” what things look like and can draw, navigate, or recognize faces, but without any felt inner picture.
  • Others describe hazy, low‑resolution or fragmentary imagery that only sharpens when carefully attended to, suggesting a continuum rather than a strict on/off trait.

Dreams, Hypnagogia, and Other Senses

  • Several with aphantasia report vivid, movie‑like dreams or hypnagogic imagery, contrasting sharply with their waking inability to visualize.
  • Some can strongly imagine sounds, music, or tactile sensations but not visuals; others have vivid taste or smell imagery (e.g., “tasting” a dish while planning cooking).
  • A few report the reverse: strong visual imagery but almost no internal sound or smell.

Internal Monologue and Non‑Visual Thinking

  • Internal monologue appears largely independent: some aphantasics have constant, detailed inner speech; others report none and think in abstract “graphs”, spatial relationships, or wordless “vibes”.
  • Nonvisual thinkers describe solving spatial or engineering problems via an abstract sense of structure, constraints or “vector-like” relations, not pictures.

Testing, Evidence, and Skepticism

  • Popular self‑tests include the “apple scale” (1–5 vividness), the “ball on a table” scenario, and follow‑up questions about color, size, or background details.
  • Some argue many people misunderstand these prompts and that differences may be mostly semantic; others point to brain‑imaging and drawing‑based studies showing systematic differences in visual cortex activation and object memory.
  • One commenter is strongly skeptical of all introspective reports, citing work on the unreliability of self‑description; others counter with acquired aphantasia cases (pre/post surgery or illness) as strong evidence of a real change.

Memory, Emotion, and Everyday Consequences

  • Several note overlap with severely deficient autobiographical memory (SDAM): they recall events as facts or narratives, not relived scenes, and often can’t re‑evoke original emotions unless they reconstruct the story step by step.
  • Others say aphantasia hasn’t felt like a disability: they discovered it late in life, function well in careers like software or engineering, and may even be less prone to intrusive flashbacks or distraction.
  • Reading experiences vary: some aphantasics skip descriptive passages or find films more compelling; others enjoy fiction but experience characters/places as concepts rather than visuals.

Plasticity, Training, and Open Questions

  • A few report partial gains in visualization via practices like drawing from memory, chess “board vision,” flame‑afterimage exercises, meditation, psychedelics, or focused dream journaling.
  • Others with lifelong or acquired aphantasia say attempts at training yield, at best, fleeting blobs or outlines, suggesting limits to plasticity.
  • Open debates remain about how much these differences affect learning, creativity, math and art, and to what extent they can or should be deliberately modified.

How the cochlea computes (2024)

Perception, tuning, and psychoacoustics

  • Musicians debate which pitches are harder to tune: some report high notes as harder (brief duration, very sensitive to small pitch changes); others find low bass harder (fundamentals close together, need to hear slow beats, often masked if harmonics are removed).
  • Middle range is seen as easiest to tune. Guitar-specific issue: tuning by pure intervals leads toward just intonation rather than equal temperament, causing some chords to sound bad.
  • Several comments point to psychoacoustics: critical bands, masking, and source separation explain why we can pick out individual instruments or voices and why some mistunings are more salient than others.

What “Fourier transform” means in this context

  • Multiple commenters argue the title is technically true but pedantic: a strict Fourier transform is infinite in time, whereas the ear performs time-localized, finite analysis.
  • Clarifications:
    • FT vs Fourier series vs DTFT vs DFT vs FFT (implementation).
    • Spectrograms and real-time analysis use short-time Fourier transforms (STFT).
  • Others argue that for most practical/colloquial purposes, saying the ear “does a Fourier transform” is acceptable shorthand for “does frequency decomposition”.

Time–frequency tradeoffs and transform analogies

  • Discussion centers on the time–frequency uncertainty principle: better frequency resolution requires longer windows (worse time resolution) and vice versa.
  • The cochlea is described as a nonuniform filter bank:
    • Low frequencies: better frequency resolution, worse temporal.
    • High frequencies: better temporal resolution, worse frequency.
  • This is compared to wavelet or Gabor transforms, not a uniform-window STFT. Some note wavelets are not just “windowed Fourier”, but a different basis family.

Speech, evolution, and spectral niches

  • Commenters highlight the article’s idea that human speech occupies a relatively unoccupied region of time–frequency space, parallel to how animal species evolve distinct “acoustic niches” (e.g., birds at dawn).
  • Hypotheses discussed: speech placement reflects tradeoffs among open spectral niches, information density, physiology (vocal tract, ear), and body size. Some note similar niche-filling in urban birds adjusting timing to avoid traffic noise.
  • Side debate on evolution timescales and whether rapid environmental change outpaces adaptation.

Biological implementation and neural specifics

  • Ear as “faulty transducer”: hearing is seen as an ear–brain system with extensive perceptual modeling, masking, prediction, and adaptive “critical bands”.
  • Animal comparisons: owl sound localization via interaural timing/phase; birds vs mammals evolved different localization strategies.
  • Phase and temporal coding:
    • Hair cells/neurons can phase-lock, encoding timing up to kHz via populations, not single firing rates.
    • Ear is sensitive to relative phase across frequencies (e.g., handclap transients), unlike many DSP systems that discard phase.
  • Tinnitus is discussed as likely central (brain-level) rather than purely cochlear; cutting the auditory nerve doesn’t cure it.

Sinusoids, eigenfunctions, and “basis” questions

  • One thread questions whether sinusoids are really the “basis” the ear uses, noting biological nonlinearity and possible non-sinusoidal eigenmodes.
  • Others respond that real acoustic pathways are approximately linear time-invariant over small ranges, making complex exponentials natural eigenfunctions and evolutionarily advantageous for robust recognition under reflections and filtering.

Learning resources and modeling

  • Several commenters share intros to Fourier transforms (videos, DSP textbooks, explainer sites) and highlight the Mel scale and cepstral analysis as perceptually tuned tools.
  • Richard Lyon’s CARFAC model is cited as a sophisticated digital model of cochlear processing, though some note it underemphasizes phase-locking.
  • There is interest in applying cochlear-inspired models to better dialogue intelligibility in media, though skepticism remains about current capabilities.

Meta: reception of the article and title

  • Many praise the article’s exposition and biological details, but multiple commenters call the title clickbait or a strawman:
    • Strong view: “yes it does” in any reasonable signal-processing sense; the article overstates the distinction.
    • Pedantic view: it’s accurate to say the cochlea doesn’t perform a literal, infinite-time Fourier transform, but rather a biologically constrained, time-localized, nonuniform transform that is only “Fourier-like”.

Moderna has unraveled

mRNA tech promise vs pharma business reality

  • Several commenters think mRNA remains highly promising (vaccines, cancer, targeted therapies) and that Moderna still has long‑term value.
  • Others stress the core problem is the pharma model: huge upfront R&D and trial costs, high failure rates, and the end of pandemic-scale government purchasing.
  • Some argue “low-hanging fruit” in pharma is gone, pushing companies toward patentable “me-too” drugs rather than breakthrough therapies.

Side effects, personal experience, and uptake

  • Wide range of reported vaccine reactions: from “sore arm only” to being bedridden for days.
  • Some say repeated significant side effects make frequent boosters unsustainable; others note such reactions are uncommon and comparable to other vaccines.
  • This variability within households fuels hesitation, even among people who accept the technology in principle.

Efficacy, transmission, and natural immunity

  • Ongoing dispute over what the vaccines “were supposed to do”:
    • One camp: vaccines mainly reduce severe illness/death; they never guaranteed no infection.
    • Another camp: public and political messaging implied near-immunity and non-transmission; when breakthrough infections appeared, people felt deceived.
  • Fierce debate over natural immunity:
    • Some argue prior infection should have been accepted in lieu of mandates and is longer-lasting.
    • Others stress data (and messaging at the time) that vaccination, especially combined with infection, significantly reduced bad outcomes.
  • There is disagreement about what ended the pandemic: vaccination, viral mutation, widespread infection, or some combination.

Politics, mandates, and trust

  • Strong sentiment that mandates, employer/school requirements, and exclusion of non‑mRNA options (e.g., J&J) radicalized opposition to mRNA and eroded trust in institutions.
  • Others counter that early political decisions were reasonable given the uncertainty and that later “retconning” ignores what was known then.
  • Messaging by politicians and media is criticized as oversimplified or exaggerated, contributing to long-term skepticism of public health guidance.

Regulation, safety, and “rush” concerns

  • Some claim mRNA vaccines were “hand-waved” through regulators, lacked long-term follow‑up before mass rollout, and under-disclosed side effects (e.g., myocarditis).
  • Others reply they went through standard clinical rigor for emergency conditions, with side‑effect data accumulating and being analyzed over subsequent years.

Ethics, competition, and valuation

  • One commenter alleges Moderna suppressed an alternative U. Pitt vaccine, framing current struggles as “karma” and evidence of aggressive moat-building.
  • A few call Moderna’s trajectory “pump and dump”; others say its valuation merely reverted to pre‑Covid levels after a one‑product windfall.

Signs of introspection in large language models

What “introspection” means here

  • Several commenters argue “introspection” is a misleading term; they prefer “access to prior/internal state” or “detecting internal activations.”
  • Comparisons are made to human introspection: tied to autobiographical memory, embodiment, identity – which LLMs lack.
  • Others defend the term in an operational sense: the model is reporting on information not present in the prompt or prior output, only in its hidden state.

How the experiment works & technical analogies

  • Commenters restate the core setup: find an activation vector for a concept (e.g., ALL CAPS) by subtracting activations across prompts, then inject that vector during inference and ask if the model “feels” a thought.
  • Some see this as very similar to standard neuroscience contrasts (task vs. control in fMRI).
  • Others want more nuts‑and‑bolts detail: which layers, which tokens, how KV cache is affected, whether this is just “indirect token injection.”

Evidence strength, controls, and alternative explanations

  • Key datapoints noted: ~20% success rate on detection; claims of zero false positives in controls for production models.
  • Skeptics question grader prompts, word choices, and whether prompts implicitly prime “introspection‑looking” answers.
  • There is concern that success might come from detecting a weird activation distribution or prompt role‑play, not genuine self‑monitoring.
  • Some propose stronger tests: structured JSON or numeric ratings as first token, logprob analysis, or systematically injecting “mind‑related” vs. neutral concepts.

Relation to consciousness and “stochastic parrot” debate

  • Many emphasize the paper itself distances this from phenomenal consciousness, at most suggesting a rudimentary form of “access consciousness.”
  • Some argue this undermines the “stochastic parrot” caricature and suggests real metacognitive structure; others counter that 20% success with heavy prompting is weak evidence.
  • Philosophical side‑threads debate whether computers can “think,” whether we “know how LLMs work,” and analogies to brains, Turing machines, and the Chinese Room.

Skepticism about motives and marketing

  • Several see the piece as investor‑facing hype or regulatory lobbying (to frame models as powerful, risky, perhaps conscious).
  • Others respond that industry‑funded research is standard, that this work is more about reliability/interpretability than selling “sentience,” and that anthropomorphic framing is overblown.

Broader implications and risk perceptions

  • Some are excited that generalized introspective abilities emerge and might improve transparency and control.
  • Others are alarmed: they see this as another sign of increasingly opaque, deceptive, socially disruptive systems, and call for slowing deployment and tightening regulation.

Falling panel prices lead to global solar boom, except for the US

Storage and grid integration

  • Multiple commenters argue storage is “not solved” but already economical at scale: grid solar plus batteries can beat peaker plants and, with wind, outcompete coal, gas, and nuclear on price in many places (excluding extreme cases like remote Alaska without transmission).
  • Several see the right sequence as: fill daytime demand with cheap solar, accept curtailment, then add storage once midday power is abundant and nearly free.
  • Alternatives to lithium batteries are debated: pumped hydro is cheapest where geography allows; small-scale hydro can be attractive but labor‑intensive. Seasonal storage ideas include hydrogen (criticized for low round‑trip efficiency and large storage volume) and ultra‑cheap thermal storage.
  • Others note you can reduce storage needs by:
    • Combining solar with wind (often complementary in winter).
    • Timeshifting loads (e.g., precooling buildings, running industrial processes during surplus).
    • Using long‑distance transmission to move power from better-resourced regions.

Rooftop solar economics and net metering

  • Many US utilities are described as hostile to rooftop solar, cutting export credits and raising fixed or volumetric rates; Idaho and California are cited as examples where rooftop solar can now increase bills unless paired with batteries.
  • California’s PG&E is heavily criticized for:
    • Very high per‑kWh prices and proposed high fixed charges for solar homes.
    • Rate structures that credit exports at low wholesale-like rates while charging high retail including delivery.
  • Counterpoint: current net metering is called unfair because grid fixed costs are rolled into per‑kWh prices, so heavy self‑generators “free‑ride” on infrastructure they still need. Some advocate separating fixed grid charges from energy charges and paying only wholesale for exports.

China, tariffs, and global solar boom

  • Commenters stress that ~80% of the solar supply chain is in China; China’s massive state‑backed investment and overcapacity are seen as both enabling cheap global solar and creating “zombie” firms.
  • US tariffs now target not only China but also Southeast Asia, South Korea, India, Mexico, and Canada, keeping import prices high. Some see this as evidence that US policy elites (across administrations) are effectively anti‑solar or prioritizing legacy energy and domestic incumbents over rapid deployment.

US political economy and utilities

  • Several portray the US as captured by private equity and fossil interests: maximizing short‑term profit, issuing debt, blocking renewables, and using trade policy to protect incumbents.
  • Others point to structural political issues—gerrymandering, campaign finance, media bubbles—to explain why voters keep electing leaders who slow green energy while other regions treat it as both climate and national‑security policy.

EVs, hybrids, and industrial strategy

  • There’s concern US automakers face a dilemma: invest heavily in EVs to stay globally relevant despite weak US demand, or double down on a shrinking, protectionist domestic ICE/hybrid market.
  • Plug‑in hybrids are contentious:
    • Critics cite data that real‑world emissions reductions are modest because many owners don’t plug in or EV components are undersized; they see PHEVs as a dead end.
    • Defenders argue PHEVs share key EV components, ease range anxiety where charging is poor, and can be a transitional technology, with future trims simply dropping the engine.
  • Chinese EV makers (e.g., BYD) are seen as a looming competitive threat worldwide, with some expecting US and European incumbents to rely increasingly on protectionism instead of innovation.

Dating: A mysterious constellation of facts

Platform incentives & business models

  • Many argue dating apps have structurally misaligned incentives: they profit from keeping people single, engaged, and paying for upsells, not from quickly forming lasting couples.
  • Others push back: growth still depends on new users and word‑of‑mouth from success stories, so platforms can’t simply sabotage matches without reputational and churn costs.
  • An industry insider claims nobody seriously optimizes for “don’t let users leave after successful matches”; instead they optimize for signups, subscriptions, and engagement, asserting that 99% of matches fail anyway for offline reasons apps can’t control.
  • Critics counter that premium features (limited swipes, visibility paywalls, “boosts”) are overtly misaligned with user success and effectively throttle opportunities.

Effectiveness, selection bias, and market structure

  • Several note that “dating apps suck” may be biased toward those who have the worst outcomes; many relationships and marriages do come from apps, but satisfied users exit the discourse.
  • Others argue that the best prospects (especially “cool” or very attractive people) increasingly avoid apps, turning them into adverse‑selection markets skewed toward lower‑quality matches or extreme personalities.
  • A recurring theme: network effects and winner‑take‑all dynamics keep incumbents dominant, and attempts at “better” apps (e.g., older OkCupid) either got bought and “enshittified” or failed to monetize.

User experience, mental health, and paradox of choice

  • Frequent complaints: endless swiping, ghosting, dopamine‑driven engagement, and the paradox of choice—too many options, less satisfaction, and “analysis paralysis.”
  • Some see apps as functionally similar to gambling: a small minority (“date bacon”) do very well, while the majority have poor experiences but keep trying.
  • Multiple commenters say heavy app use is bad for mental health, especially for men getting few matches and for women overwhelmed by low‑effort approaches.

Apps vs in‑person / speed dating

  • Speed dating and in‑person approaches provide higher‑bandwidth signals (voice, body language, social proof) and shorter queues of options, which can reduce over‑optimization and FOMO.
  • However, speed dating is niche, often treated as entertainment, and uncomfortable for many personalities.
  • Several report that matches from real life feel higher‑quality and more enthusiastic than those from apps, even for people who are very successful on apps.

Profiles, photos, and authenticity

  • Discussion around where “all those great photos” come from: many people deliberately stage and curate pictures for profiles, sometimes even planning trips for content.
  • Some users lack usable photos and feel disadvantaged; others note that profiles are mostly bland and uninformative despite this curation.
  • Tension between honest self‑presentation vs “manufactured persona”: honesty may filter better long‑term, but platforms reward marketable profiles.

Broader social and cultural factors

  • Commenters emphasize that dating difficulties also come from larger trends: reduced offline social spaces, post‑COVID socialization gaps, workplace dating becoming taboo, and increased polarization over politics/COVID.
  • Some argue dating itself has always been frustrating; apps mainly change scale and visibility, not the underlying human problems.

SPy: An interpreter and compiler for a fast statically typed variant of Python

Site & Cookie Experience

  • Several readers couldn’t view the article on mobile without accepting a cookie banner, found the UX confusing, and questioned GDPR compliance (e.g., pre-checked boxes).
  • Others reported that browser extensions blocking cookie popups removed the notice entirely.

Goal: Fast, Statically Typed “Python-like” Language

  • Many people like the idea of a compiled, statically typed language that keeps Python’s readability and “pseudocode that runs” ethos.
  • There’s optimism that SPy could be used for performance‑critical modules alongside regular Python, e.g., .spy for hot paths imported into CPython.

Comparisons to Existing Tools and Languages

  • Nim is repeatedly cited as “Python‑ish but compiled,” with praise for the language and complaints about ecosystem brittleness and missing Python‑level libraries/web frameworks.
  • F#, Crystal, Cython, RPython, Mojo, Shedskin, ChocoPy, MicroPython, and earlier “Viper” projects are all mentioned as prior or parallel attempts at similar goals.
  • Cython is seen by some as mature and practical, by others as syntactically awkward and “worst of both worlds” (harder than Go yet not that fast).
  • Several comments say SPy feels closer to a Cython replacement / systems companion to Python than a full Python replacement.

Python Ecosystem, Typing, and Subsets

  • Strong consensus that Python’s main strength is its huge ecosystem; this is tied to dynamic/duck typing and ease of getting started.
  • Concern: any non‑100%‑compatible subset will constantly hit missing features or incompatible libraries, leading to “loss aversion” versus a clean new language.
  • Example references: cperl required adding types to ~10% of modules; people expect “will it support NumPy / Django / FastAPI?” from any Python subset.
  • Debate over type hints: some say types should be enforced “contracts,” others note that in Python they’re only hints; there’s frustration that violating annotations yields no errors by default.

Design Concepts: Red/Blue, Redshifting, Comptime

  • SPy’s “blue” (compile‑time) vs “red” (runtime) expressions and “redshifting” are broadly recognized as a partial evaluation / compile‑time evaluation scheme.
  • Some like the comptime‑style power (Zig/Forth comparisons); others dislike the bespoke terminology and @blue name, preferring established terms like @comptime / @consteval and “constant folding/propagation.”
  • The author explains colors are inherited from earlier work, changed to be colorblind‑friendly, and useful for tooling (spy --colorize).

Dynamic Languages and Performance Context

  • Discussion branches into how Common Lisp, Smalltalk, SELF, and Julia handle extreme dynamism with sophisticated JITs, and how CPython’s C API blocks many similar optimizations.
  • Ruby and Python are both cited as languages where many “worst‑case” dynamic features exist but are rarely used in real code; ideas include freezing core classes or disallowing monkey‑patching in certain modules to enable static optimization.

Interoperability and Architecture

  • The author clarifies that SPy will call Python libraries via an embedded libpython with an interop layer, letting CPython handle imports while converting/proxying objects.
  • Commenters see value in using SPy from CPython as a fast implementation language for libraries, in line with the common “systems language + scripting language” architecture.

Reception and Open Questions

  • Enthusiasm: people call the project “super cool,” “promising,” and closer to what they had hoped Mojo would be; they like the clear articulation of Python’s “dynamic vs fast” trade-offs.
  • Skepticism: fears that statically typed Python subsets inevitably become “Java with Python syntax,” or that constructing yet another partial Python implementation is a “fool’s errand” versus adopting Nim/Rust outright.
  • Some want to see more idiomatic “Pythonic” code (lists, comprehensions, generators, dicts/sets) compiled 30–100× faster to be convinced.
  • There is interest in future details on generics, static dispatch, WASM vs native targets, and how well SPy will handle complex, dynamic library patterns (e.g., ORMs, Django‑style magic).

Affinity Studio now free

New model & product changes

  • Three separate apps (Designer, Photo, Publisher) are now merged into a single “Affinity” app with Vector/Pixel/Layout tabs and a separate Canva AI tab.
  • Core tools across those three domains appear to be intact; some users say execution is excellent and workflow switching is improved, others dislike the all‑in‑one approach.
  • New non‑AI features (e.g. long‑requested image trace, vector blend, other tools) are in the new app, not V2.

Licensing, accounts & offline use

  • Old V2 apps are discontinued: activation servers stay up, but no further updates or features.
  • New Affinity is “free” but:
    • Requires a Canva account and online activation.
    • Then reportedly runs offline, though many worry this could change.
  • Mac App Store versions are gone; users lose the benefit of sandboxing and store‑based updates.

Fears of enshittification & trust erosion

  • Many bought Affinity explicitly to avoid Adobe‑style subscriptions and account tethering; they see this as a bait‑and‑switch or “circle of life”: acquisition → funnel → lock‑in → paywall.
  • Common predicted path: shrink free tier, move more features (not just AI) behind subscription, more upsell UI and “dark patterns,” possible future online‑only requirement.
  • Canva staff insist Affinity will be “free, forever,” with only AI as paid, but commenters note similar promises from other companies have not held and say explanations are no substitute for enforceable guarantees.

Impact on existing V1/V2 customers

  • Feelings range from “nothing changed, you still have what you bought” to “my perpetual license was effectively downgraded; V2 became a dead end overnight.”
  • Specific worries:
    • V2’s dependence on activation servers versus fully offline V1.
    • Future OS updates (especially on macOS and iOS) gradually breaking V2 with no fixes.
    • No way to buy a hypothetical V3 under old terms.

AI, data, and business model

  • AI features (generative tools, depth, super‑resolution, etc.) are subscription‑gated; some run locally, some likely in the cloud.
  • Debate whether “free core + paid AI” is sustainable marketing funnel or just a lure that will inevitably ratchet into broader paywalls and data mining.
  • Canva says Affinity local content isn’t used for AI training and Canva uploads are opt‑in; many remain skeptical and expect terms to evolve.

Alternatives & ecosystem impact

  • Some see this as a powerful free competitor that pressures Adobe’s pricing; others view it as the death of the last major non‑subscription pro suite.
  • Increased interest in open‑source tools (Krita, GIMP, Inkscape, Scribus, Graphite, etc.), though many find them less polished.
  • Strong demand for a native Linux version; community Wine wrappers are being updated to handle v3.

Apple’s Persona technology uses Gaussian splatting to create 3D facial scans

Gaussian splatting and rendering pipeline

  • Several comments clarify that Gaussian splatting is essentially “smart point clouds”: color (and view-dependent color) attached to points in space.
  • It still ends in rasterization, but the practical pipeline and rasterizer differ considerably from traditional triangle-based pipelines.
  • View-dependent color and stereoscopic viewing are emphasized as key to realism (specularity, subsurface scattering).

Explainers and examples

  • The linked YouTube explainer is widely panned as hype-heavy and content-light; others recommend more technical blog posts instead.
  • People point to film/VFX uses (e.g., recreating real-world environments and theme parks) as impressive, non-Apple demonstrations.
  • SIGGRAPH work on dynamic 3D Gaussian splatting for video is mentioned as a sign the technique is maturing.

Is Vision Pro telepresence solving a real problem?

  • One camp sees ultra-realistic telepresence as over-engineered when webcams already “work,” comparing it to the Segway vs cheap scooters.
  • Others argue that life-like presence, cross-talk, and body-language cues are exactly what burned-out video-meeting users want.
  • A counterpoint: most people won’t put on a heavy, hair/makeup‑messing headset for marginal gains, especially at Vision Pro prices.

Display resolution analogy debate

  • A side-thread compares “serviceable webcams” to “serviceable 1080p monitors.”
  • Some say 4K and high DPI bring huge comfort/productivity gains, similar in spirit to higher-fidelity telepresence.
  • Others argue that beyond a certain baseline (e.g., 1080p), returns diminish; computing has become incremental, not transformational.

Persona quality and uncanny valley

  • Users report a dramatic jump from the beta Personas (“monstrous”) to current ones; one persona even fooled a colleague for a while.
  • Smiles and head/eye motion still feel slightly uncanny or “fluid,” but facial-expression capture is surprisingly rich given the simple scan.

Latency and immersion

  • Latency is seen as dominated by network physics and Wi‑Fi, similar to Zoom/FaceTime; Persona rendering itself is assumed negligible.
  • Some describe persistent “Zoom fatigue” even when they adapt, implying added realism may not fully fix the medium’s cognitive load.

Technical and product limitations

  • Commenters highlight that the hard part isn’t building a 3D model from photos but animating it convincingly in real time from limited sensors.
  • Vision Pro’s Mac integration is criticized: only one mirrored display is officially supported; power users want multiple virtual monitors.

Use cases and adoption skepticism

  • Niche scenarios are imagined: long‑distance relationships, family far away, specialized 3D work, remote collaboration.
  • Others doubt mass adoption: VR/AR remains heavy, expensive, and socially “weird,” and may be a solution in search of mainstream demand.

PlanetScale Offering $5 Databases

Use cases and technical details of the $5 tier

  • Many argue a single-node database is sufficient for a large share of line‑of‑business and hobby apps; 5‑nines HA is often unnecessary and expensive.
  • Others note uptime expectations and potential global audiences make “business‑hours only” availability impractical outside niche cases (e.g. some government sites, specialty retailers).
  • For the single-node plan, durability is said to be preserved via replication plus EBS backing; it’s not just “one box and you’re on your own.”
  • Local NVMe disks vs EBS is a recurring thread: some are surprised local NVMe isn’t standard; others explain that doing metal + synchronous replication reliably is operationally very hard (node lifecycle, resizing, never terminating incorrectly).
  • Questions arise on Postgres specifics (synchronous commit settings, Timescale support in progress) and the fact that this exists only for Postgres, not Vitess/MySQL, due to architectural differences.
  • Latency concerns: advice is to place PlanetScale in the same region/city as compute (Render, Fly.io, etc.) to avoid large performance penalties.

Pricing, free-tier history, and “rug pull” risk

  • A large portion of the thread centers on mistrust from the prior “free forever” hobby tier being removed and replaced with a ~$40 minimum plan, causing some users to abandon or shut down projects.
  • Multiple commenters warn: don’t build anything you care about on this $5 tier if a future price hike would be painful. Others counter that at $5 it’s already gross‑margin positive and compute/storage trends should only improve profitability.
  • Some view the $5 offering as a funnel to higher tiers; critics point out that even profitable low tiers can be killed if upgrade rates or support costs disappoint, or if strategy/leadership changes.
  • Others argue this plan is fundamentally different from a loss‑making free tier and therefore less likely to disappear.

Free tiers vs paid low-end plans (broader debate)

  • One camp says “free forever” should never have been promised; free tiers are effectively marketing/VC burn or subsidies from paying customers and are inherently fragile.
  • Another camp calls the original language a bait‑and‑switch: if sustainability is uncertain, don’t say “forever.” The archived pricing page showing “Free forever for hobby use” is repeatedly cited.
  • There’s comparison to other providers (Neon, Supabase, etc.) that still run free tiers, plus discussion that “scale to zero” doesn’t eliminate underlying costs; someone must pay.

Founder presence, tone, and reputational impact

  • The CEO participates extensively, defending the decision to kill the free tier as necessary for profitability and long‑term survival, and emphasizing that all plans are now gross‑margin positive.
  • Some readers appreciate the candid, non‑PR voice and agreement from ex‑employees that layoffs were painful but necessary. Others find several responses thin‑skinned or dismissive, especially statements along the lines of not caring what critics think.
  • The “we never said forever” claim followed by being shown archived “free forever” wording, and then acknowledging it, is viewed by some as denial or gaslighting, by others as an honest memory lapse.
  • Several commenters say that, regardless of technical quality, this exchange alone makes them hesitant to trust the company with future projects; others remain enthusiastic about the product and welcome a transparent low‑cost option.

Free software scares normal people

Why Free/OSS Software Often Feels “Scary”

  • Many projects are built “by power users for power users”: devs scratch their own itch, so they expose every option they’d ever want.
  • Adding options is cheap for a dev and feels high‑value; pruning and coherently organizing them is expensive, ongoing work.
  • Typical FOSS distribution and installation paths already filter for technically inclined users, reinforcing a power‑user bias in feedback.
  • There’s little budget for UX research, user testing, or telemetry; when telemetry is proposed, the backlash is strong. So UIs are based on intuition and complaints from existing (already-skilled) users.
  • Several comments stress this isn’t unique to FOSS: Microsoft Office, CAD tools, DAWs, GPG, etc., are also intimidating.

Simplicity Is Hard and Fragile

  • Making a focused “one‑click” flow is easy; discovering the right flow for the right audience is hard.
  • Maintaining simplicity is an unstable equilibrium: users and contributors constantly ask for “just one more option,” leading to feature creep.
  • Everyone’s “20% of features” is slightly different; trimming too far can leave many users missing their one critical feature.
  • A strong product owner or “benevolent dictator” is often needed to defend simplicity.

Proposed Strategies: Wrappers & Progressive Disclosure

  • The Magicbrake idea (simple wrapper over Handbrake) is widely praised: keep the powerful backend, offer a trivial “drop file, press go” UI for common cases.
  • Others point to “basic vs advanced” modes, or multi‑level settings (focused/simple/expert) with progressive disclosure, as a good compromise.
  • Counterpoint: dual modes are hard to design well and often disappoint both novices and experts.

Power Users vs “Normal People”

  • One camp argues tools should prioritize the thousands of hours experts spend with them, not the first five minutes of a novice.
  • Another camp notes that if novices fail in the first five minutes, those thousands of hours never happen at all.
  • Several comments criticize the “normal people are dumb” tone; many non‑technical users are time‑limited, not incapable.

Design, Culture, and Incentives

  • Persistent theme: FOSS has far more volunteer coders than volunteer designers; artists and UX people are under‑represented and often undervalued.
  • Good UI/UX demands research, iteration, and saying “no” – hard to do in volunteer, consensus‑driven projects.
  • Some accept that many FOSS tools will remain “for nerds,” and that’s okay; others see a big opportunity in building polished, simple front‑ends on top.

Ventoy: Create bootable USB drive for ISO/WIM/IMG/VHD(x)/EFI Files

Overall Reception and Convenience

  • Many commenters describe Ventoy as “essential” and a “lifesaver,” especially for people who frequently install or test multiple OSes.
  • Core benefit: write Ventoy once, then just drag-and-drop ISO/WIM/IMG/VHD/EFI files; a boot menu lets you pick at boot time.
  • Supports many images on a single large drive (e.g., 2TB NVMe in a USB enclosure), reducing the “pile of flash drives” problem.
  • The remaining space can be used like a regular USB drive for other files.

Compared to Other Tools (dd, Rufus, Etcher, Microsoft Tools)

  • dd, Balena Etcher, and Microsoft’s Media Creation Tool: typically one ISO per stick; you reflash for each new image.
  • Ventoy: persistent bootloader + menu; multiple ISOs co‑exist.
  • Several comments criticize Etcher as a heavy Electron app with telemetry.
  • Rufus is seen as more sophisticated than Etcher and good for Windows installs, but still image-per-stick.
  • Windows install media creation (especially on non‑Windows OSes) is described as painful; Ventoy sometimes simplifies this, but not always.

Windows, VHD, and vDisk Use Cases

  • Ventoy can boot Windows VHDs via its VHD/vDisk plugins; some keep a full Windows install with tools this way.
  • Reported success installing Windows 10/11 (including Pro and LTSC) on many machines; others hit errors like missing media/driver messages.
  • Workarounds mentioned: wimboot mode, Rufus+NTFS, or Microsoft’s splitting tools for >4GB files.
  • Ventoy can help bypass some Windows 11 requirements and local-account restrictions.

Compatibility, Reliability, and Secure Boot

  • Several users report certain ISOs not working or even corrupting the Ventoy stick until re-prepared.
  • Problem cases include some Linux installers (Debian/openSUSE reports conflict), obscure OSes (ReactOS, KolibriOS), FreeDOS behavior, and very cheap USB sticks.
  • Suggestions: use GPT, UEFI boot, keep Ventoy updated, properly eject/sync writes, use GRUB2 mode when an ISO misbehaves.
  • Secure Boot: can fail unless users disable it, change firmware mode, or enroll Ventoy’s MOK key; once enrolled, all ISOs benefit.

Binary Blobs and Trust Concerns

  • Ongoing concern about Ventoy’s bundled binary blobs; some refuse to use it for this reason.
  • Others note the blobs come from open-source projects with documented build instructions, arguing the project is fully buildable from source in principle.
  • Debate centers on reproducibility, independent verification, and whether relying on upstream “trusted” binaries is acceptable.

Alternatives and Adjacent Tools

  • Hardware ISO/VHD emulation enclosures (IODD) are mentioned as Ventoy-like but with mixed reliability experiences.
  • Phone-based tools (DriveDroid, USB Mountr, MSD) can emulate USB mass storage/optical drives, though modern Android support is spotty.
  • Network boot companion iVentoy is recommended for PXE-style installs.
  • Some wonder why a simpler GRUB-based multi-ISO SSD solution isn’t more popular, especially for those wary of blobs.

US declines to join more than 70 countries in signing UN cybercrime treaty

Treaty scope and key concerns

  • Commenters highlight provisions enabling:
    • Real-time traffic/content data collection and secret orders to service providers.
    • Cross-border data sharing with minimal transparency and weak human-rights protections.
    • Expansion of “cybercrime” to any offense involving a computer, where “serious crime” is anything punishable by ≥4 years in prison.
  • Security and digital-rights critiques (e.g., EFF summaries) are cited: risks of broad surveillance dragnets, criminalization of security research, and tools for transnational repression rather than just cybercrime control.

Reactions to the US not signing

  • Many see non-signature as a rare positive move for privacy and civil liberties, noting the US can still cooperate on cybercrime without this framework.
  • Others are skeptical, pointing out US mass surveillance, weak consumer data protection, and extensive cyber operations; they doubt privacy is the real motive.
  • Some argue joining could have constrained US power or conflicted with constitutional protections (e.g., compelled technical assistance vs. Fifth Amendment).

Authoritarian signatories and human-rights risks

  • Strong focus on the treaty’s origins and support from Russia and other authoritarian or semi-authoritarian states (China, Iran, North Korea, etc.).
  • Fear that:
    • Regimes will use “cybercrime” as a pretext to target dissidents, journalists, and protesters abroad.
    • Extradition and data-access mechanisms could be invoked against political speech that’s criminalized domestically.
  • Several express disappointment that the EU, UK, and some Nordic states signed alongside such governments, seeing it as evidence of a broader drift toward surveillance and “chat control.”

Effectiveness and enforceability doubts

  • Commenters question whether states that heavily rely on or tolerate cybercrime (Russia, North Korea, parts of Africa/Asia) will meaningfully enforce the treaty.
  • View that bad actors can simply invoke sovereignty or “security interests” to refuse cooperation, making the treaty asymmetric in practice.
  • Concern that, instead of reducing cybercrime, the convention mainly standardizes global monitoring and legal cover for state surveillance.

Broader skepticism of UN and international law

  • Some see the convention as another overreaching, largely symbolic UN instrument that powerful or rogue states will ignore when inconvenient.
  • Comparisons to other global agreements (climate, land mines, WHO) fuel a wider debate on whether such treaties meaningfully constrain states or just add bureaucracy.

The International Criminal Court wants to become independent of USA technology

Motivation: Sanctions and Microsoft Account Shutdown

  • Central trigger: a prosecutor’s Microsoft email account at the ICC was blocked due to US sanctions, highlighting how a single US decision can partially paralyze a critical institution.
  • Some say Microsoft had “no choice” under US law; others emphasize that this demonstrates why it’s inherently risky for the ICC to depend on US providers subject to a volatile political environment.

Data Sovereignty and Dependency on Big Tech

  • Broad support for reducing reliance on “globomegacorps” whose size and political exposure create systemic risk.
  • Risk is framed as both technical (loss of access, lock-in) and political (sanctions, informal pressure, “phone call from the president”).
  • Several argue diversification across jurisdictions and vendors is more realistic than full independence from for‑profit firms.

Profit, Nonprofits, Capitalism, and Control

  • Debate whether the core problem is profit or control.
    • One side: for‑profit incentives (maximizing revenue, avoiding displeasing powerful states) inherently distort behavior.
    • Other side: nonprofits still depend on funding, follow local laws, and can be coerced; what matters is control over source code, deployment, and infrastructure.
  • Longer sub‑thread on capitalism as a decision/coordination mechanism vs. collective deliberation, and on how property rights and lack of “unclaimed resources” undermine idealized justifications.

Migration from Microsoft and Cloud Services

  • Some are pessimistic: public-sector dependence on Microsoft and legacy systems plus staff retraining makes exit “nigh impossible.”
  • Others counter with examples of gradual, successful migrations and argue this is a long “marathon” requiring commitment to higher values than the cheapest short‑term solution.
  • Many see the episode as a delayed realization that outsourcing critical IT (especially to US clouds claiming “data stays in the EU”) sacrifices real sovereignty.

Self‑Hosting, Email, and Practical Obstacles

  • Mixed experiences on self‑hosting email:
    • Some report chronic deliverability problems with big providers (especially in the 2000s–early 2010s).
    • Others say, with proper DNS and anti‑spam setup, self-hosted email works reliably even today.
  • General sense: big organizations like the ICC can self-host or use sovereign providers more easily than small “little guy” domains.

ICC, US Law, and International Justice

  • Several note the irony of relying on companies from a country that doesn’t recognize the ICC and has legislation hostile to it.
  • Extended debate on why any state would accept supra‑national law, the weakness of international enforcement, and whether joining the ICC would meaningfully constrain or protect powerful states like the US.

European Initiatives and Open Source

  • Article mentions EU‑linked efforts (e.g., OpenDesk, Zendis) to build sovereign infrastructure.
  • Skepticism from some that EU “digital sovereignty” projects become consultant-heavy, conference‑driven money sinks with little going to core open‑source developers.
  • Others argue governments should invest far more in local/EU tech, which has historically been neglected and underpaid compared to US tech sectors.

RISC-V takes first step toward international ISO/IEC standardization

Why pursue ISO/IEC standardization?

  • Seen as a way to unlock government and large-enterprise adoption where “use international standards” is a formal requirement or strong expectation.
  • Helps procurement and grant applications: once an ISO standard exists, users must justify not using it.
  • Viewed as a milestone in industry “maturity”: moving from vendor‑controlled ISAs to stable, boring infrastructure with multiple vendors.
  • Some see it as defensive: an ISO label may blunt political or lobbying attempts to curb RISC‑V uptake, especially amid US–China tensions.

Skepticism about ISO as a venue

  • Many criticize ISO’s process as slow, bureaucratic, and sometimes captured (e.g., OOXML/.docx, MPEG/H.265 patent issues, C/C++ standardization woes).
  • Concern that ISO’s paywalled documents conflict with RISC‑V’s open, freely available ethos, potentially making compliance harder to verify.
  • Fear that ISO involvement could slow ISA evolution, introduce feature creep, or turn RISC‑V into an expensive proprietary standard “in practice.”

Fragmentation, profiles, and standard scope

  • Some argue RISC‑V is “fragmented” due to modular extensions and many ISA variants, scaring business decision‑makers.
  • Others reply that profiles like RVA23 already solve this for application processors, and that modularity is a key value for embedded/custom SoCs.
  • Debate over whether ISO can/should “tie up fragmentation” by enshrining profiles, versus preserving flexibility and vendor extensions.

Technical maturity and competition with ARM/x86

  • Critics say RISC‑V offers little over mature AArch64, is still green, and lacks high‑end cores comparable to Apple M‑series; supporters note this took ARM decades too.
  • Performance gaps are attributed mostly to implementation, but some call out specific RISC‑V design choices and ABI decisions as “bad and doubled‑down on.”

Alternatives and complements

  • Some would prefer more focus on open test suites and certification rather than a paper ISO spec; existing test repos and formal models are mentioned.
  • Dedicated tech consortia (IETF, CNCF, etc.) are seen by some as better suited to evolving complex technical standards than ISO.

Jujutsu at Google [video]

Video & conference context

  • Talk is part of a larger JJ Con playlist; some find it odd the YouTube video is unlisted, seeing it as typical Google underexposure.
  • A separate JJ-Con wiki page aggregates talks, slides, and notes.
  • Multiple people complain about the poor audio quality and “point a camera at the lectern” conference style.

Google internal rollout & dev environment

  • “GA in 2026” refers to Google-internal general availability on Linux only; external jj is already usable on multiple platforms.
  • Google is predominantly Linux for dev, with an in-house Debian-based distro (gLinux) and internal mirrors; Macs and some Windows machines are used as terminals into remote Linux boxes.
  • Many devs use macOS locally but build and run on Linux in the datacenter, reducing urgency for native jj on macOS except for iOS/macOS devs.

Jujutsu vs Git: why and for whom

  • Fans describe jj as simpler yet more powerful than git: easier CLI, automatic rebasing of dependent commits, an explicit “undo” for repo operations, no staging area, and strong support for stacked/atomic commits.
  • Git experts note that many workflows are possible in git but feel arcane, brittle, or tedious compared to jj’s first-class support (e.g., history surgery, filtering, and commit rewriting).
  • Skeptics say they rarely need more than basic git commands and haven’t experienced git as a bottleneck, especially on smaller repos.

Conflicts, stacks, and workflows

  • First-class “conflicted commit” state is a major selling point: you can defer conflict resolution, keep working elsewhere, and later fix conflicts without being stuck in a modal rebase.
  • JJ auto-rebases children when you amend a commit, making long stacks of dependent changes and “PR stacks” much easier to maintain.
  • Auto-snapshotting on every command and treating all changes as commits makes context switching and splitting commits easier, similar in spirit to IDE “local history.”

Git usability debate

  • Strong divide: some insist git is straightforward if you internalize the commit-graph model and read the docs; others say the documentation is implementation-heavy (trees/blobs) and intimidating.
  • Many report that errors and “weird states” (especially around rebase, detached HEADs, and collaborative mistakes) are where git becomes scary and time-consuming, even for experienced users.
  • Reflog is cited as a safety net, but proponents argue jj’s global operation log (oplog) is a more comprehensive and user-friendly history of changes.

Scale and monorepos

  • Several comments stress that opinions formed on “hundreds of devs, hundreds of MB” repos don’t generalize to multi-terabyte monorepos.
  • Google’s internal systems (Piper, earlier git-like frontends such as “git5”) struggled with monorepo scale and workflows; jj is seen as a modern alternative frontend that still uses git as backend externally.

Compatibility & ecosystem concerns

  • JJ lacks full support for some git ecosystem features: LFS, hooks, submodules, and creating tags via jj itself (though git can be used alongside).
  • Some argue this limits jj as a drop-in git replacement for organizations with complex CI/integration setups and existing submodules/LFS usage.
  • CLAs are required and contributions currently need a Google account; this is perceived by some as a barrier despite the project being independent of Google.

Collaboration & “serverless” setups

  • One appeal of jj is safer use with shared folders (Dropbox, Google Drive, USB) due to its concurrency design; git repos in such environments are historically fragile.
  • Others counter that bare git repos on shared drives plus SSH are simple and sufficient, and see Dropbox issues as a storage problem, not a git problem.

Presentation style discussion

  • Large subthread critiques the slide deck and delivery: too much text per slide, tendency for viewers to read ahead, and difficulty syncing spoken words with bullets.
  • Many advocate “less text, more structure”: fewer bullets, clearer narrative (situation–consequence–action–result), and emphasizing key impacts rather than deep internals for a general audience.
  • There is disagreement on “passion”: some want more energy and motivation in technical talks; others prefer dry, information-dense delivery and resent TED-style exhortations.
  • Several commenters praise the presenter’s openness to feedback and note the talk may have been well-calibrated for the in-person audience (experienced jj users) but less so for random YouTube viewers.