Hacker News, Distilled

AI powered summaries for selected HN discussions.

Page 338 of 363

CERN releases report on the feasibility of a possible Future Circular Collider

LHC Track Record and Expectations

  • One camp sees the LHC as underwhelming post‑Higgs: no SUSY, no clear “new physics,” and questions whether a bigger machine is just “hoping something shakes out.”
  • Others argue the LHC produced many important results: precise measurements, many hadrons, and statistically significant hints of Standard Model deviations.
  • The absence of expected SUSY or other particles is itself viewed as a meaningful (if negative) discovery that killed dominant BSM scenarios, though some call this “weak” progress given the cost.

Purpose and Design of the FCC

  • Clarification that the flagship near‑term project is an electron–positron collider (FCC‑ee) for precision Higgs and electroweak measurements; only later (around 2070) would the tunnel host a 100 TeV proton collider (FCC‑hh).
  • Supporters emphasize:
    • e⁺e⁻ collisions at high energy give much cleaner measurements than proton–proton.
    • The main aim is to nail down anomalies and parameters in the Standard Model, not blindly hunt for unknown particles.
  • Critics point out that official FCC documents do still talk about possible discoveries of dark matter candidates, axions, SUSY partners, etc., and see that as speculative padding.

Theory vs Experiment

  • Debate over whether “theory should precede experiment.”
    • Some argue building a huge machine without a tight set of target theories is bad science and bad value.
    • Others note historically experiment has often led theory (e.g., anomalies prompting new particles), and that precision tests of an incomplete theory are valid science.

Cost, Funding Priorities, and Opportunity Cost

  • Concern that a multi‑tens‑of‑billion project will “strangle” other areas of physics and neighboring fields for decades; suggestions to prioritize theory, novel accelerator R&D, or other sciences (materials, cancer research).
  • Counter‑argument: spread over ~12 years, ~1–1.3B/year is modest versus national budgets and various political boondoggles; if we can waste that on less productive things, why not on core physics?
  • Some former insiders now question whether such distant-from-application science is the best use of constrained university and research budgets.

Media, Public Perception, and HN Culture

  • A popular YouTube critic of particle physics is heavily cited; several comments accuse her of algorithm‑driven contrarianism and oversimplification, while others defend her long‑standing skepticism.
  • A linked Nature piece is used to show that doubts about the FCC are mainstream, not just YouTube drama.
  • Meta‑thread laments perceived “anti‑intellectualism” and clickbait‑driven understanding of complex scientific policy.

The chroot Technique – a Swiss army multitool for Linux systems

Linux installers and everyday use of chroot

  • Many distros rely on chroot internally or expose helpers:

    • Arch: arch-chroot (plus pacstrap) used for installs and recovery; Manjaro inherits similar behavior.
    • Gentoo: classic stage3 and handbook use chroot; people compile on a powerful machine in a chroot, then copy the result to weaker/remote machines.
    • Debian: debootstrap installs a minimal system into a directory (setup-time), then chroot is used for configuration; similar approach used for cross-arch image building.
    • NixOS: nixos-enter provides a chroot-like entry into NixOS roots.
    • Void, Linux From Scratch, and others also teach or rely on this approach.
  • Common real-world uses:

    • Unbricking laptops, fixing failed boots, installing missing drivers, and general “rescue partition”/live-USB workflows.
    • Remote or mass provisioning by preparing disks in another machine via chroot.

Cross-architecture and advanced tools

  • Using qemu-user + binfmt, users routinely chroot into foreign architectures (ARM phones, Raspberry Pi, Nvidia Orin BSPs, router/IoT firmware).
  • This avoids cross-compiler complexity at the cost of runtime overhead; often “fast enough” on modern hardware.
  • systemd-nspawn is frequently suggested as a “nicer chroot”:
    • Handles many mounts automatically and can --boot into a rescue target.
  • Other tools mentioned: LXC, Bubblewrap, machroot, proot-docker, junest, container-shell.

Desire for a “better chroot” vs containers

  • Some wish Linux had evolved chroot into a simple, first-class sandbox primitive instead of the Docker/cgroups/OCI stack.
  • Others argue that Docker/Podman add important extras: images, overlayfs, networking, user namespaces, resource control.
  • Comparisons to:
    • FreeBSD jails, DragonFly vkernels, Solaris/illumos Zones as “chroot++”.
    • Plan 9’s capability-style “mount what you need” model.
  • Discussion of Linux namespaces:
    • Complaints that sandboxing is subtractive (start with everything, then drop) rather than additive.
    • unshare, mount namespaces, pivot_root suggested as safer/more controlled than raw chroot.

Limitations, gotchas, and best practices

  • Correctly binding /proc, /sys, /dev, /dev/pts, /run is a common stumbling block; wrappers like arch-chroot exist mainly to automate this.
  • Tools that accept a root-path (-R in Solaris-style tools) are seen as more robust than requiring a chroot when the target filesystem is broken or missing libraries.
  • Chroot is not a strong security boundary; modern containment typically layers namespaces, cgroups, or full VMs.
  • For remote reimaging of a root disk, people point to VM-based approaches or specialized tooling like nixos-anywhere.

Google will let companies run Gemini models in their own data centers

Security, Model Theft, and Black-Box Concerns

  • Many wonder if deployments will rely on confidential VMs and encrypted GPUs (SEV-SNP, TDX) to protect model weights; some speculate these could be eventually broken.
  • Opinions split on leak risk: some say only large enterprises can run models this big and won’t risk lawsuits; others note it only takes one hacked org or state actor for weights to escape.
  • Ideas floated: watermarking weights and heavy contractual liability to deter leaks.
  • For air-gapped government-style deployments, insiders with SSH access are seen as a key exfiltration vector.

Privacy, Trust, and Government Access

  • Strong skepticism toward a “black box in your DC” from a US advertising company, with fears of phoning home or covert access by intelligence agencies.
  • Others respond that big customers can and will strictly monitor or block traffic, and that Google has incentives and contracts not to sabotage or spy on Fortune 50s.
  • Debate over US government surveillance (FISA, PRISM, NSA tapping) leads some to argue that if it’s network-connected and run by Google, you shouldn’t treat it as fully private.
  • Air-gapped Google Distributed Cloud offerings for Secret/Top Secret missions are cited as evidence this can be made offline.

Hardware Choices and TPUs vs Nvidia

  • Notable that on-prem boxes use Nvidia Blackwell GPUs, not TPUs.
  • Explanations offered: CUDA familiarity/portability for customers, limited TPU supply, and desire to keep TPU advantages (cost, efficiency, long context) inside Google’s own cloud.
  • Gemini is said to be implemented in JAX/XLA, so it can target both TPUs and GPUs, though performance and cost differ.

Target Customers and Regulatory Drivers

  • Seen as aimed at governments, defense, intelligence, banking, healthcare, and large financial firms with strict data rules or entrenched on-prem estates.
  • Some argue true “must-be-on-prem” requirements mostly exist in government/adjacent sectors; others highlight broad corporate fear of data leaving the network, especially in the EU.
  • A bank employee notes they’re currently banned from AI over privacy, suggesting strong demand.

Data, Training, and “LLM Slop”

  • Discussion of Google’s proprietary data (Search, YouTube, Books) vs Common Crawl and LibGen: some see a moat, others emphasize that data quality, not human vs synthetic origin, matters.
  • Concerns about Common Crawl being increasingly contaminated by LLM output; counter-argument is that filtering LLM output is just another quality-filtering problem, though some point to model collapse when training on LLM-generated data.

Business Strategy and Comparisons

  • Some call this “government contract baiting” and a way to push Google Distributed Cloud, not just GCP.
  • Debate over whether using Google Cloud is effectively supporting an “ad company,” versus a now-profitable, separate cloud org.
  • Parallels drawn to the old Google Search Appliance: a mysterious but often better-than-alternatives yellow box, raising questions about opacity and logging.

Alternatives and Competition

  • DeepSeek is mentioned as a contrasting model-you-can-self-host; however, it’s seen as not in the same capability class as top Gemini models and lacks enterprise support contracts.
  • Microsoft’s Copilot and Azure’s earlier government approvals are noted as key competitive pressure.

SpacetimeDB

Licensing and Pricing Model

  • Uses a BSL-style license with limits (e.g., effectively one instance per service; broader features in the hosted offering).
  • Some are wary of the delayed-open license and would prefer more permissive alternatives.
  • “Maincloud” / “Energy” credit billing feels crypto-ish or needlessly abstract to several; comparisons made to Snowflake/Vercel units.
  • Bandwidth pricing (~$0.28/GB) is called out as high, especially at scale; request for flat-rate options and fear of accidental large bills.
  • Team says prices are conservative and intended to be lowered later.

Core Architecture and Goals

  • In-memory relational DB with WASM “reducers” (stored procedures) meant to host all game/server logic.
  • Promises: automatic client–server sync, elimination of server–DB sync layer, and simple deployment (upload WASM to the DB).
  • Compared to “server in the DB” systems like Convex, and to in-memory SQLite plus a networking layer.
  • Seen as a “universe brain reorg”: powerful if you fully buy into the new mental model, but requires rethinking architecture.

Scalability and Clustering Concerns

  • Marketing claims very low latency and high throughput; commenters ask for concrete benchmarks and cluster design details.
  • Internally, they say each DB is an actor in an Erlang/Elixir-style distributed system with inter-module communication; that piece isn’t yet public.
  • Some argue that real MMO scaling is more about sharding, geography, and what you trust the client with than about raw DB speed.

Fit for Game Development and Netcode

  • Many multiplayer devs say main challenges are lag masking, prediction, rollback, and cheat resistance, not CRUD or persistence.
  • Current product doesn’t natively solve those; team plans future automatic client-side prediction by re-running server WASM on clients and reconciling.
  • Skeptics note this is still a “TODO” without shipped examples; optimists see value even if lag masking remains app-specific.
  • Several worry you’d need to significantly restructure servers, and possibly reimplement physics/pathfinding/animation outside Unity/Unreal, to fit the model.

Physics and Simulation in the DB

  • Docs show very naive collision checks and assert “DB is fast” without numbers; physics/netcode specialists are unconvinced.
  • Community experiments embed a Rust physics engine (Rapier) into WASM, then write results back into tables; interesting but early.
  • Open question whether serious networked physics and engine integration are practical within this paradigm.

Developer Experience and Adoption

  • Mixed feelings on tying schema directly to language structs/annotations (ORM-style) vs explicit SQL.
  • Some report building small MMOs quickly and like the live query / push-based model.
  • Others see significant risk in adopting a young, unconventional stack from a team whose flagship MMO isn’t yet released, citing past MMO backend hype that fizzled.

Man pages are great, man readers are the problem

Formats: roff/mdoc vs HTML/Markdown

  • Several comments argue roff/mdoc is already a “modern” semantic format compared to HTML, which is easy to parse but unpleasant to write, and Markdown, which is familiar but largely semantics‑free.
  • Advocates of mdoc emphasize its explicit markup for flags, arguments, env vars, etc., which powers apropos/whatis queries, smart search, and hyperlinking. Converting to Markdown or plain HTML often discards this information.
  • Others prefer authoring in Markdown/RST/AsciiDoc and generating man pages via tools (pandoc, Sphinx, Asciidoc, scdoc), but there is concern about:
    • Many incompatible Markdown dialects.
    • Loss of semantics and links.
    • Needing increasingly complex “markdown schema” and tooling that just re‑creates roff’s complexity.
  • GNU info/texinfo is mentioned as an earlier attempt at richer, linked docs; technically good but hampered by poor standalone viewers and unfamiliar UI.

Readers and UX: terminals, editors, and GUIs

  • Many suggestions to fix the reader, not the format:
    • Use man --html or web manpage mirrors; OpenBSD’s mandoc HTML is praised.
    • Emacs (man/info/woman), Vim/Neovim as MANPAGER, KDE Help Center, Dash/Zeal, pinfo, xman, and bat‑based pagers add links, search, highlighting, or nicer layout.
    • mandoc on BSD preserves semantics into less (ctags‑style jumps) and into HTML, including links directly to option definitions.
  • Pain points with traditional man | less:
    • Line wrapping destroys indentation; no semantic “jump to flag” (people rely on regex searches like ^\s+-p).
    • Long pages (e.g., bash, tar) are hard to navigate; some print to PostScript/PDF (man -t) to see intended structure.
  • Some highlight a skills gap: job control, less navigation, and info usage are not widely understood by newer users.

Content quality and examples

  • Strong split:
    • Some praise manpages (especially BSD) as cohesive, dense, and sufficient when well‑written.
    • Others say manpages “suck”: too much dry option listing, too few examples and workflows, leading to tldr/cheat/bro pages, Stack Overflow, and now LLM wrappers.
  • There is broad agreement that:
    • The framework is fine; the art of writing good documentation is the real bottleneck.
    • More examples, single‑page versions, and good printability would make man‑style docs much more useful.

Conventions and ecosystem

  • Debate over relying on --help vs man:
    • --help is convenient but inconsistent, may require running the program, and often misuses stdout/stderr.
    • Manpages are more standardized across Unix systems, especially under distro policies.
  • Underlying theme: the Unix/GNU/Linux documentation ecosystem is powerful but fragmented; attempts to “modernize” risk throwing away existing semantics unless they carefully preserve them.

How much do you think it costs to make a pair of Nike shoes in Asia?

Manufacturing Cost, Markups, and Nike Example

  • The thread accepts that factory cost of a $100 retail Nike is relatively low (≈$20–25 landed), but stresses most of the price is downstream: brand, design, marketing, retail overhead, and risk.
  • Retailers often work on percentage markups (commonly near 100% on wholesale), not fixed dollar margins, because many costs (inventory financing, insurance, shrink, returns, customer service) scale with ticket price and time-in-inventory.
  • Some argue this “percentage logic” is not inevitable and partly reflects investor expectations and capital costs, not physical necessity.

Tariffs and Consumer Impact

  • A key point: a 100% tariff at the border is magnified by percentage markups, so a $23 duty can push a $100 shoe toward $150, not $123.
  • Several commenters liken tariffs to a hidden federal sales tax that consumers ultimately pay, with little net benefit beyond higher prices and reduced demand.
  • Others say if tariffs were applied as a retail sales tax instead of an import duty, the final price increase could be smaller for the same tax revenue.

Onshoring vs. Self‑Sufficiency

  • One side: bringing shoe manufacturing back to the US is economically “a fool’s errand” in a high-wage, low‑interest, automation-driven environment; tariffs won’t create many good jobs and will likely be rolled back under voter pressure.
  • The other side: some degree of domestic production in critical sectors (chips, energy, defense, medical supplies, sometimes food) is strategically valuable, even if it’s costlier. Sneakers themselves are viewed by many as non‑strategic.

Automation, Jobs, and “Bullshit Work”

  • Manufacturing that stayed in rich countries is already highly automated or very high value-add; new factories will be robot-heavy and employ far fewer people.
  • Some argue “bringing back manufacturing jobs” is nostalgia; the real future work is designing, maintaining, and reconfiguring automated systems.
  • A long subthread debates whether society should keep organizing around “jobs” at all versus some form of basic support or publicly funded creative work.

China, Global Trade, and Geopolitics

  • Multiple comments stress that “Asia = cheap shoe labor” is outdated: China in particular is now competitive or leading in EVs, batteries, robotics, and other advanced tech, and rapidly automating factories.
  • There’s disagreement over how much China’s demographic decline and political risks offset its strengths.
  • Some see deep trade ties as stabilizing (“mutually assured economic destruction”), others as dangerous dependence that can be weaponized in a crisis (e.g., Taiwan).

Retail Concentration and Margins

  • Several note that modern retail and cinema chains replaced small shops, increasing pricing power once local monopolies were established.
  • Others counter that net profit margins for big retailers remain single digits once rent, wages, and logistics are included; high per‑item markups shouldn’t be confused with windfall profits.

Fake job seekers are flooding US companies that are hiring for remote positions

Reality of “AI / Fake” Candidates

  • Several commenters argue fully AI-generated recruits are implausible; the real problem predates AI: offshore consultancies and bait‑and‑switch staffing.
  • Others say they have seen clear fraud: multiple identities for the same person, AI-written resumes, candidates using live AI tools to answer questions, or people who don’t exist at their claimed location.
  • One detailed account describes complex staged interviews with “actors” for video, separate experts feeding answers over audio, and different people doing the actual work afterward.

Economics & Offshore Consultancies

  • A recurring theme: one US salary can fund a whole low‑wage team overseas, making elaborate schemes financially viable and shareable across many client jobs.
  • Some say work “is being delivered” but often low quality or net‑negative; others note there are very strong offshore developers, just not at rock‑bottom rates.
  • Similar bait‑and‑switch behavior is noted in Western consultancies (e.g., selling an A‑team, staffing a B‑team).

Interview Quality & Detection

  • Many see bad interviewing as the core vulnerability: overconfident, poorly trained interviewers; adversarial “bully” interviews; fetishizing LeetCode.
  • Suggested mitigations:
    • Conversational, deep‑dive interviews into past projects.
    • Candidate‑chosen technical talks with live Q&A.
    • Varying questions, probing specifics to expose memorized or AI-fed answers.
  • Some report catching deepfakes via facial/voice desync or stressing CPU/GPU during coding tests.

Remote Work, RTO, and Security Narratives

  • Strong suspicion the “fake remote worker” narrative is being amplified to justify return‑to‑office and broader surveillance.
  • Others counter that remote fraud and even nation‑state threats are real enough that some extra verification is warranted.

Overemployment Debate

  • Large subthread on people secretly holding multiple full‑time remote jobs:
    • One camp calls it fraud/“stealing” if you promise full‑time attention and knowingly don’t provide it.
    • Another sees it as justified pushback against wage suppression and mass layoffs, especially if output meets expectations.
    • Consensus: companies’ inability to measure performance beyond “hours online” both enables and inflames this issue.

Proposed Structural Fixes

  • Reintroduce in‑person or flown‑in final interviews, even for remote roles.
  • Restrict hiring to referrals or candidates who can be met physically.
  • More extreme ideas: device‑based location verification; charging applicants a small fee; job fairs and paper resumes.
  • Many push back on tracking and fees as dystopian or unfair to honest candidates.

The Agent2Agent Protocol (A2A)

Understanding A2A vs MCP

  • Many commenters struggle to see how A2A materially differs from MCP and standard APIs; several ask for concrete end‑to‑end JSON examples “over the wire.”
  • Rough emerging consensus (including from people working on A2A/MCP):
    • MCP: “agent ↔ environment” — exposing tools, prompts, resources to a model in a standardized way.
    • A2A: “agent ↔ agent” — capability discovery, tasks, collaboration, long‑lived workflows, and messaging between otherwise isolated agents.
  • A2A adds notions like tasks, readiness, asynchronous completion, push notifications, and agent discovery via .well-known/agent.json cards.

Comparison to REST/RPC and Prior Standards

  • Multiple participants argue MCP/A2A are “just RPC over HTTP/JSON” and question why not simply use REST/OpenAPI/GraphQL with conventions like /capabilities and /task_status.
  • Others counter that:
    • Standardizing schemas and flows reduces LLM hallucination around tool use.
    • Action‑oriented RPC semantics fit better than forcing everything into pseudo‑REST.
  • Several draw parallels to SOAP/WSDL, CORBA, FIPA, KQML, Agent Tcl/D’Agents, seeing this as another cycle of over‑engineered interop standards.

Security, Prompt Injection & “Agent Worms”

  • MCP itself is seen as protocol‑sound but dangerous in practice: exposing tools that act on behalf of users while ingesting untrusted text is highly prompt‑injection‑prone.
  • Key points:
    • Any toolset an agent can access must be considered one security boundary; you must be comfortable with any combination of tool use, not just intended workflows.
    • Human‑in‑the‑loop is recommended in MCP, but not mandated; “vibe coding” patterns actively try to remove humans.
    • Several argue that arbitrary third‑party content + privileged tools is fundamentally unsafe; sandboxing helps but doesn’t solve core social‑engineering‑like risks.
  • A2A raises additional concern about “agentic worms” propagating across agents in loosely supervised networks.

Motivations, Strategy & Ecosystem Control

  • Many interpret A2A as a strategic land‑grab: owning the “agent interop” layer, enabling agent marketplaces, billing, and SaaS for agents on top of Google Cloud.
  • The long list of big consultancies and enterprise vendors as “partners” is widely seen as a red flag: more about selling billable‑hours ecosystems and agent registries than solving core technical problems.
  • Others push back that A2A is Apache‑licensed, open, and could be used in air‑gapped environments, so any “moat” would be more ecosystem/social than legal.

Perceived Usefulness & Real-World Agents

  • There’s skepticism about the value of LLM‑to‑LLM/agent‑to‑agent chains vs. having one agent call deterministic APIs:
    • Agents are often just rebranded workflows; many question real production use beyond demos.
    • Some see genuine need in complex enterprise setups: a company “main agent” coordinating with external HR, travel, tax, or facilities agents that own private data and workflows.
  • Others argue existing MCP tool servers could already wrap such “agents” without A2A.

Spec Quality, Developer Experience & Protocol Fatigue

  • Some early readers find the A2A spec promising—a “sane superset” that addresses MCP pain points (auth, discovery, out‑of‑band data, state).
  • Others call it underspecified (timestamps, session IDs, field limits, auth extensibility) and warn of fragmentation, incompatible “extensions,” and enterprise complexity.
  • Strong desire across the thread for:
    • Concrete, prettified JSON traces and message examples.
    • Clear examples of how LLM outputs trigger tool/agent calls.
  • Many express exhaustion with rapidly proliferating, overlapping protocols and acronyms (MCP, A2A, vendor‑specific agent SDKs), seeing “architecture astronaut” behavior instead of focusing on robust solutions.

American Disruption

Uber, Disruption, and Tech vs Reality

  • Some see Tesla as a better manufacturing analog to the “high-end first, then mass-market” disruption story; the Uber comparison is viewed as strained, especially for tariffs/manufacturing.
  • Uber’s growth is debated: one side stresses heavy subsidy (billions burned, underpaid gig workers, tips, regulatory arbitrage); another notes per-ride losses were under $1 and claims the core service is simply better than taxis.
  • Prices and value are reported as highly regional: in some cities taxis are cheaper, in others Uber is; users trade off cost vs time, safety, predictability, and app convenience.
  • Several argue Uber’s tech is not that hard and its edge is brand, reach, and “default provider” status rather than deep technical moats.

Reshoring, Tariffs, and Trade Strategy

  • A “rational reshoring playbook” is outlined: subsidize domestic industry, protect critical inputs from tariffs, tighten on finished goods later, streamline exports; current policy is seen as doing this backwards.
  • Others argue broad reshoring is economically harmful, except for carefully chosen strategic sectors (e.g., chips), ideally across alliances, not just nationally.
  • There’s skepticism that complex products like phones can be fully localized before overseas suppliers out-innovate; reshoring is expected to be more expensive and constrained by US full employment.
  • Automation and 3D printing are mentioned as partial answers, but not a jobs panacea; the US is seen as having a job-quality problem, not a pure job-quantity problem.

Motivations Behind Tariffs

  • Many commenters reject the idea of a coherent economic strategy and see tariffs as driven by ego, dominance, and “make others beg for exemptions,” not manufacturing competitiveness.
  • Others point to ideological architects (e.g., anti–free trade, “reindustrialize America,” decouple from China) but note contradictions like tariffs on allies and inputs.
  • A strong thread views tariffs as a regressive tax shift: away from income taxes, toward consumption via tariffs, effectively hitting lower and middle classes while cutting rich people’s taxes.
  • Some frame this as authoritarian power-building: seizing de facto taxing authority from Congress, rewarding loyalty via exemptions, and undermining the rule of law.

Economic and Geopolitical Fallout

  • Commenters worry about investor flight, higher bond yields, and erosion of trust in US institutions; attempts to interpret tariffs as a clever bond-market strategy are mostly shot down as confused.
  • Tariffs targeted by bilateral trade imbalance are criticized as “legitimately stupid” metrics; they ignore multilateral trade patterns and supply chains.
  • Several see parallels with Brexit: policies sold as striking at elites but likely to hurt the broader population and allies, potentially undermining US–Europe ties and indirectly benefiting Russia.
  • From abroad, the move is perceived less as US-vs-China and more as US-vs-everyone, incentivizing other countries to seek alternatives to US-led systems.

Assessment of the Article and the Disruption Analogy

  • Multiple commenters think the essay overextends Christensen-style “disruption” to historical manufacturing shifts that look more like standard low-cost competition than true disruptive innovation.
  • The “ratchet” idea—that moving up-market makes it hard to go back down—is acknowledged as important, but many reject using it to justify chaotic, blanket tariffs (“dynamite in the workshop”).
  • The piece is criticized as verbose, over-quoting, and under-summarizing, with some feeling it tries to retrofit a complex, rational narrative onto what is largely incoherent or purely political policy.

Ironwood: The first Google TPU for the age of inference

Benchmarking and Marketing Claims

  • Many commenters criticize the blog for “silly games” with benchmarks:
    • Comparing Ironwood’s FP8 flops to architectures without FP8 hardware support.
    • Claiming >24× El Capitan performance by comparing FP8 flops vs FP64 flops, which are not comparable; some argue El Capitan may actually be faster on like-for-like FP8.
    • Using the entire El Capitan machine as a comparison point and talking about an “El Capitan pod,” which doesn’t exist.
  • Others defend focusing on FP8 since that’s what end users want for ML, but several people say the choices feel designed to impress non-technical executives rather than serious buyers.
  • Some note Google also omits clear comparisons to Nvidia GPUs or recent TPU generations, which makes the messaging look defensive rather than confident.

Software, Ecosystem, and Lock-In

  • Multiple people argue the bigger issue than raw flops is the TPU software and developer experience:
    • Today it heavily revolves around XLA/JAX/TensorFlow and out-of-tree drivers.
    • Without serious improvements, usage is expected to remain limited to Google and a handful of large partners.
  • There is concern about cloud-only access and vendor lock-in: TPU is tightly bound to Google Cloud, unlike Nvidia GPUs that are widely available.
  • A minority respond that for big buyers TCO (performance-per-dollar including power and operations) dominates, and “walled garden” concerns matter less than cost.

TPUs vs GPUs and Other ASICs

  • TPUs and other AI ASICs (Cerebras, Groq, AWS Inferentia/Trainium, AMD MI series, Microsoft MAIA) are seen as part of a specialization trend as Moore’s law slows.
  • Several comments distinguish:
    • GPUs: very strong for training, less efficient for large-scale inference due to off‑chip memory.
    • TPUs/other ASICs: aim to optimize inference via low-precision math, high bandwidth, and tightly integrated fabrics.
  • Debate over whether inference will dominate long-term compute vs continuous retraining/fine‑tuning remains unresolved.

“First for Inference” and TPU History

  • People point out that the original TPU was inference-only and later there was a v4i (“i” for inference), so calling Ironwood “the first TPU for inference” is seen as factually wrong or marketing spin.
  • Former insiders clarify early TPUs were more like co-processors and were rethought multiple times as CNNs, RNNs, and transformers rose; Ironwood is framed as tuned for modern inference plus embeddings.

Access, Pricing, and Who Benefits

  • Ironwood will be available only via Google Cloud; individuals cannot buy the chips.
  • Some see this as a teaser for investors and large cloud customers rather than something for ordinary developers.
  • A few argue that even if one never uses TPUs, competition should pressure Nvidia GPU cloud pricing down.
  • Others are cynical: unless it translates into noticeably cheaper Gemini/API prices, it feels like internal self-congratulation.

Architecture, Efficiency, and Specialization

  • Discussion touches on:
    • FP8 vs FP64 complexity and why ML can tolerate very low precision.
    • 3D torus networking and liquid cooling in Google AI data centers; claimed to improve efficiency but details of “AI data centers” remain fuzzy.
    • High HBM bandwidth numbers, but still behind Nvidia GB200 on paper.
  • Specialized TPUs are said to be poor fits for non-matrix workloads; Google already uses separate ASICs for video transcoding.

Coral, Edge, and Consumer Hopes

  • Some hoped this would lead to updated, cheap edge TPUs (like Coral) for homelabs and local ML, but those products are widely perceived as abandoned.
  • Overall sentiment: Ironwood is impressive technically, but its relevance is mostly at hyperscale, not personal computing.

Photographs of 19th Century Japan

Personal and Architectural Connections

  • Several commenters work or live in old Kyoto machiya and note how few remain, with many replaced by generic apartments.
  • Traditional houses are praised as beautiful but criticized as expensive, labor-intensive, and poorly insulated; people discuss mixing modern construction with traditional aesthetics.

Life Then vs Now

  • Photos provoke “what did we do to our world?” reactions; some see modernity as morally similar or worse (war, nationalism, racism, shallow information, low statistical literacy).
  • Others strongly prefer today’s comforts: insulation, climate control, easy transport, and better life prospects for ordinary people.
  • There’s an expectation that in 150 years, people will nostalgically view our own era’s images the same way.

How Representative Are These Photos?

  • Multiple comments stress these are staged, idealized scenes made for foreign buyers—more like tourist images than documentary street life.
  • The “letter carrier” is identified as a reconstruction of a courier type that had already disappeared, designed to satisfy Western demand for “authentic” Japan.
  • One thread debates whether these show “regular people” or mostly picturesque exceptions, noting that photography then was too costly for everyday snapshots.

Coloring, Quality, and Archival Projects

  • It’s clarified these are black-and-white photos hand-colored (or dyed) by artists; some colors (e.g., monks’ robes) may be inaccurate given conflicting colorized versions.
  • Commenters are impressed by the resolution and tonal detail of large-format film compared to later cheap 35mm.
  • Links are shared to other 19th–early 20th c. photo collections and a new object-detection–based site for Japanese photos, along with frustrations about access and UX of institutional archives.

Culture, Globalization, and Authenticity

  • Debate over whether globalization is destroying or enriching cultures:
    • One camp laments loss of local traditions and “authenticity,” blaming multinationals and cultural homogenization.
    • Others argue cultures have always mixed (via empires, religions, trade) and that remixing creates new diversity.
  • Discussion veers into how to “defend” local cultures, the role of immigrants, and whether Japan’s cultural conservatism and language barrier limit outside influence.

What Remains & Sense of Time

  • Many note specific locations (Nikkō, Kamakura’s Great Buddha, parts of Kyoto, Osaka Castle’s exterior, sumo) that still visually resemble the photos, while most historic towns are gone.
  • Firebombing and atomic bombing are cited for the complete transformation of some cities; Kyoto became a concrete city except for a few preserved, now-touristy districts.
  • Commenters are struck by the mortality of everyone pictured and by the continuity of human hopes; others compare living through the PC–smartphone–LLM era to people who spanned feudal Japan to mid-20th-century modernity.

China raises tariffs on US goods to 84% as rift escalates

Why tariffs are happening / how expected they were

  • Several argue there is “no reason” in an economic sense; tariffs are driven by Trump’s personal fixation on trade deficits, not coherent policy.
  • Disagreement on whether voters “should have known”: some say he openly campaigned on tariffs; others say he made many contradictory promises and most supporters expected lower prices, not higher.
  • Debate over whether “smart” business and finance people should have predicted this; some say it was obvious from his behavior, others say markets clearly did not price it in.

Domestic US politics and voter behavior

  • Long subthread on how people vote: policy vs vibes, “it’s the economy, stupid,” anger over inflation, and the structural limits of a two‑party system.
  • Some emphasize you don’t win by shaming voters; others say they feel no obligation to stay civil toward Trump supporters.
  • Criticism that both major US parties are unserious, with Democrats trying to outflank Trump on the right instead of offering a positive program.

US–China dependence and industrial capacity

  • One camp: tariffs are a crude but necessary shock to rebuild US industrial and military capacity, reduce dependence on China, and respond to a more conflict‑prone world.
  • Another camp: real re‑industrialization needs targeted tariffs plus subsidies, education, and planning; broad tariffs are “hooliganism” and inflationary.

Chinese perspectives and political systems

  • A Chinese commenter says many in China understand censorship but broadly value stability and see government responsiveness improving; they reject the “high‑pressure dictatorship” caricature.
  • Others challenge claims that “Chinese seem happy” given heavy information control, and contrast Taiwan’s prosperity and democracy.

National security, Taiwan, and ideology

  • Some frame de‑risking from China as national security, especially around semiconductors, drones, and a possible Taiwan conflict.
  • Others see “national security” as cover for declining US hegemony and ideological power politics, noting US history of regime change.
  • Long exchange on Taiwan’s status, history (ROC vs PRC), national pride vs security, and whether China’s claim is practical or primarily ideological.

Globalization, inequality, and collapse narratives

  • One analysis traces policy from 1980s neoliberalism: outsourcing industry, concentrating wealth in service/tech hubs, brain drain, and resentment in deindustrialized regions.
  • Suggestion that Trump’s tariffs are seen by his camp as a last‑ditch attempt to reverse globalism before the US “dissolves”; others think this is overstated or just greed long ignored.

Diplomatic fallout and global perception

  • Commenters outside the US describe rapidly deteriorating goodwill toward America and talk of informal boycotts, even in historically pro‑US countries.
  • Concern that blanket tariffs on allies push them toward closer ties with China instead of reducing dependency.

Effectiveness, workarounds, and escalation

  • Note that firms will relabel or reroute goods to dodge tariffs; one linked example describes explicitly planning around Trump‑era tariffs.
  • Some call for jumping straight to extreme tariffs or embargo to “get it over with”; others ask why reciprocal Chinese measures are framed as “escalation” rather than symmetric response.

A guide to reduce screen time

App- and OS-Based Controls

  • Many rely on built‑in tools: HN’s noprocrast/maxvisit/minaway, iOS Focus Modes, Screen Time (though some say it’s inaccurate), Android Digital Wellbeing (not available on all ROMs).
  • Popular third‑party blockers and trackers mentioned: ScreenZen, SpeedBump, Forest, Block, Cold Turkey, TimeLimit (F-Droid), NextDNS schedules, Leechblock, Brick, LookAway (desktop breaks), EvoCat (gamified focus), TRMNL (info e‑ink), and various Chrome extensions.
  • Some prefer “feedback” over “blocking”: apps that just show live screen‑time stats (e.g., a notification) can create a powerful feedback loop. Others want hard blocks, timers, and forced delays to break the “hypnosis.”
  • Privacy is a concern: users ask for open‑source / offline / no-network apps; others describe using firewalls or ROMs (GrapheneOS) to cut Internet access for trackers.

Hardware, Configuration, and Friction Hacks

  • Several swap smartphones for basic phones or e‑ink / “Daylight” tablets, reporting more intentional use and less FOMO.
  • Common tactics: uninstall browsers, delete all social/“feed” apps, disable JavaScript, go grayscale, remove home‑screen icons so every app must be searched, and aggressively prune notifications.
  • Some schedule enforced offline time: “internet Sabbaths” (24h with no TCP/IP), offline mornings, or router/phone automations that cut connectivity on a schedule.

Replacing Screen Time with Alternatives

  • Strong theme: reducing screen time only works if replaced with other activities—kids, drawing, exercise, learning languages, chess, piano, reading books, audiobooks, offline RSS, real‑world events.
  • One commenter warns that removing screens without alternatives can just mean staring at walls or sleeping, especially with depression.

Mental Health and Root Causes

  • Multiple comments tie doomscrolling to anxiety, depression, C‑PTSD, and loneliness; apps are seen as “life hacks” that don’t fix underlying pain.
  • People report benefits from therapy, mindfulness/meditation, breathing practices, and even psychedelic experiences in reducing the internal drive to seek screens.

Social Media, News, and “Feeds”

  • Debate over whether quitting social media is “unrealistic”; some live fine with almost none (often just HN/Signal).
  • Doomscrolling is often news‑based rather than TikTok‑style content. Feeds and push‑based recommendations are singled out as the core problem.
  • One user questions generic “2h/day” guidelines for adults already spending many hours on work screens, feeling the article doesn’t address their situation.

How to lock down your phone if you're traveling to the U.S.

Border search powers and constitutional limits

  • Multiple comments note that at the U.S. border Fourth Amendment protections are heavily weakened; CBP claims broad authority to search devices without a warrant.
  • ACLU guidance is cited: citizens can’t be denied entry for refusing to unlock, but can face delays and device seizure; non‑citizens can simply be refused entry.
  • There’s confusion and debate about whether Fifth Amendment (self‑incrimination) protects passcodes; consensus in the thread is that asserting rights can still lead to a very bad experience in practice.
  • Data from “advanced searches” may be stored in CBP databases for 15 years and searchable without a warrant, which many find especially troubling.

Locking, wiping, and burner strategies

  • Several argue “locking down” (refusing passwords on a normal phone) is the worst option: you have little leverage, and it invites detention, interrogation, or seizure.
  • Popular advice: travel with a wiped phone and restore from backup after crossing, ideally seeded with some benign activity so it doesn’t look freshly erased.
  • Others warn agents could demand you restore from known cloud backups, or may infer their existence from major providers.
  • Many recommend burner devices (cheap phone / laptop, or older “n‑1” phone) with minimal, non‑sensitive data. Some companies already issue dedicated hardware for travel to the U.S. and a few other countries.
  • A minority say they’d rather have devices seized than unlock them, on principle.

Technical obstacles: backups and device design

  • Several travelers are afraid of imperfect restores: TOTP, banking apps, secure‑enclave keys, WhatsApp/Signal states, national e‑ID apps, and obscure/proprietary apps may not survive a wipe.
  • People lament that iOS and Android don’t support reliable, user‑controlled full‑image backups; rooting/custom ROMs can help but increase other risks (e.g., forensic tools).
  • Suggestions include: test backups on a second device; keep critical secrets off phones; treat the phone as disposable.

Duress, “honeypot” setups, and device features

  • Interest in duress or “honeypot” passcodes that unlock a limited, innocuous profile. GrapheneOS’s duress feature and Android multi‑user/work profiles are mentioned; TrueCrypt/Veracrypt hidden OS is discussed for laptops.
  • Others point out: if agents know these features exist, they may suspect hidden data anyway. Any device that leaves your sight is considered compromised by more paranoid commenters.

Travel choices and broader reactions

  • Many non‑Americans say they now avoid U.S. travel altogether, comparing current practice to authoritarian states or 1980s Soviet travel guides. Some countries reportedly issue U.S. travel warnings.
  • Others counter that many countries (including Canada, UK, parts of EU, Gulf states) have similar or harsher border powers; the U.S. is not uniquely bad, though still objectionable.
  • There’s extensive unease about political‑speech–based visa revocations and device searches, and concern that “just don’t bring incriminating data” effectively chills normal political expression.

Justice Dept. scales back crypto cases in line with Trump administration memo

Presidential Power, DOJ, and Separation of Powers

  • Multiple comments argue the president effectively controls federal prosecution and can choose broad non‑enforcement (e.g., financial or crypto crimes), constrained in practice only by impeachment and political backlash.
  • Others emphasize the Constitution’s “take Care” clause: the executive is supposed to faithfully enforce laws; courts have allowed prioritization but not blanket nullification—though norms around this are seen as breaking down.
  • Several note the Supreme Court’s recent immunity decision: presidents can’t be criminally liable for “official acts”, with commenters disputing how broad that is and how it interacts with Trump’s behavior.
  • There’s repeated pessimism about Congress’s willingness or capacity to check the executive, tied to polarization, party sorting, and weakened incentives for compromise.

What the DOJ Crypto Memo Actually Does

  • A significant subthread argues the “no longer prosecute crypto fraud” framing is misleading. The memo:
    • Tells prosecutors to prioritize cases where individuals harm investors or use digital assets for other crimes (terrorism, drugs, cartels, hacking, trafficking).
    • De‑emphasizes “regulation by prosecution” against platforms for complex or technical regulatory violations.
  • Critics respond that:
    • Many major frauds are perpetrated by platform operators, so shifting focus away from entities invites “fall guys” and slows meaningful accountability.
    • If other regulators (SEC, CFPB, etc.) are being weakened simultaneously, “let regulators handle it” becomes hollow.
  • Supporters/steelmen say this aligns with a broader anti‑“lawfare” and deregulatory agenda and avoids applying old financial rules awkwardly to crypto.

KYC, Financial Surveillance, and Enforcement Tools

  • Some expect this enforcement shift to be paired with relaxed KYC, especially for stablecoins; others argue KYC is crucial for detecting criminal use and won’t be reduced.
  • Side discussion on cash reporting thresholds, civil forfeiture, and bank compliance:
    • Critics see current regimes as intrusive, inflation‑eroded, and prone to abuse by police.
    • Others defend them as necessary tools against money laundering and organized crime, while acknowledging overreach.

Crypto, Markets, and Consumer Protection

  • Several commenters worry that if fraud can be laundered through crypto with reduced platform liability, all fraudsters will pivot there, undermining trust in both markets and crypto itself.
  • One view: this is “good for Bitcoin” and part of treating crypto more like gambling—buyer beware.
  • Counter‑view: allowing rampant fraud and collapses still harms real people and the broader economy, and absence of proactive oversight simply means more victims before any prosecutions occur.

Broader Politics, Media, and Trump

  • Many see this memo as part of a pattern: pausing foreign bribery enforcement, Trump’s own meme coins, and a general move toward kleptocracy and impunity for allies and donors.
  • Others try to “steelman” it as consistent with a laissez‑faire approach to a niche asset class.
  • Long subthreads tie Trump’s support to media ecosystems, low civic knowledge, and disillusionment with both parties, versus critics who stress his long public reputation for fraud and his role in eroding norms and checks.

Bond rout starting to sound market alarm bells

Corporate Value, Tariffs, and Who Pays

  • Some argue aggressive tariffs and policy intervention make it harder to bound the value of U.S. companies, since future earnings can be partially “redirected” to the state via tariffs and regulation.
  • Others counter that large firms (e.g., Apple) will primarily pass tariffs on as higher prices, preserving margins; the real losers are middle-class consumers through higher living costs.
  • Debate over whether tariffs are a coherent long‑term strategy or just political theater, with some seeing them as part of an authoritarian, “government-picks-winners” model.

U.S. Debt, Bonds, and Default Risk

  • One camp sees U.S. Treasuries as increasingly unsound: debt too high, no serious effort to shrink it, and eventual real default (via inflation or explicit nonpayment) viewed as likely.
  • Others emphasize:
    • Debt sustainability is about debt/GDP and interest burden, not just nominal level.
    • Indefinite rollover is normal sovereign practice; actual nominal default is seen as unlikely.
  • Disagreement on why foreigners buy Treasuries:
    • “Tribute” and geopolitical leverage vs.
    • Rational search for the safest, most liquid asset, though confidence in that safety is now eroding.

Tariffs, Rates, and Market Mechanics

  • Multiple commenters note: tariffs raise prices → raise inflation expectations → push up long-term yields and hurt bond prices, contrary to claims that tariffs are “4D chess” to lower rates.
  • Clarifications:
    • The Fed directly sets only very short-term rates; longer maturities are market-priced.
    • Rising yields signal both inflation fears and concern over fiscal/strategic risk.
    • The steepening 2s–10s curve is read by some as markets pricing in recession risk and policy confusion.

US–China Power Balance and Strategy

  • Extended debate over who “holds more cards” in a trade confrontation:
    • One side: China can better endure pain, is less import‑dependent, and wins reputationally if the U.S. behaves erratically.
    • Other side: U.S. still has major strengths (market size, tech, finance), and rebalancing away from China was always going to hurt.
  • National-security angle: some suggest de‑coupling to reduce vulnerability and war risk; others see no evidence of a coherent grand strategy.

Domestic Politics, Inequality, and Information

  • Several threads link bond/tariff chaos to deeper issues:
    • “Character politics” around Trump and a partisan information ecosystem that rewards spectacle over policy.
    • Long‑term anger from deindustrialization and weak retraining, now amplified by automation.
    • Claims that “small government” rhetoric masks a push for more centralized executive power.

Proposed Alternatives

  • One vision: a tightly integrated “Super West” (US+EU+allies) with shared rules, industrial policy, anti‑monopoly action, and stronger worker protections to rebuild the middle class and manage China through coordinated, targeted measures rather than unilateral tariff shocks.

The best programmers I know

Guessing, hypotheses, and time trade‑offs

  • Many disagree with a blanket “don’t guess”: in most non‑safety‑critical work, making educated guesses and quickly testing them is seen as essential to avoid paralysis.
  • Several distinguish “blind guessing” from forming hypotheses based on mental models, then validating with tests, logs, debuggers, etc.
  • A recurring idea: the real skill is knowing where on the “analysis ↔ speed” slider to sit for a given decision, and when guesses are reversible and low‑risk.

Reading docs, source, and error messages

  • Strong support for “read the reference” and “read the error message”; many note that beginners often speculate or ask others instead of checking straightforward diagnostics.
  • Others say documentation quality varies greatly; for many tools, examples, blog posts, or source code are more effective than dry references.
  • Some advocate browsing documentation and release notes for tools used daily, to discover capabilities you wouldn’t know to ask about.

LLMs, Stack Overflow, and learning

  • Thread is split on “don’t ask the LLM / Stack Overflow”:
    • Supporters say over‑reliance produces shallow, fragmented understanding and discourages exploration.
    • Critics use LLMs as “semantic search” for terminology, pointing to official docs, summarizing large, messy sources, or as a way to debug cryptic errors.
  • Several emphasize that how you use AI matters: precise questions + skepticism can accelerate learning; copy‑paste “vibe coding” is seen as harmful.

Collaboration, status, and communication

  • Praised: talking to both juniors and seniors, valuing fresh perspectives, and questioning entrenched practices and unexplained rules.
  • On “status doesn’t matter”: some argue low ego often reflects already‑recognized excellence; those obsessed with status are likened to “silver medalists” anxious about their place.
  • Writing (docs, blog posts, teaching) is framed as both a learning tool and a hallmark of strong engineers.

Business/domain impact vs pure craft

  • Multiple comments note the article focuses on “best programmers,” not “people best at having business impact.”
  • Some argue that understanding the business domain and aligning technology to it is what gets people promoted to senior/staff/lead roles; others defend treating software purely as a craft done for intrinsic satisfaction.

Tools, frameworks, and blame

  • “Never blame the computer” is mostly read as “don’t stop at complaining; dig to root causes,” though some warn that a culture that dismisses tool criticism as “whining” can entrench bad tech.
  • There’s an extended debate on avoiding fragile libraries/frameworks versus the cost and risk of “roll your own,” especially for non‑critical CRUD systems.

Focus, mindset, and mastery vs “good enough”

  • Beyond technical habits, commenters highlight focus, emotional regulation, and avoiding distraction as key differentiators between similarly skilled developers.
  • Some stress that not everyone is aiming for “mastery”; for founders or generalists, “good enough to ship and solve problems” can be a more appropriate goal.

Meta: hosting and irony

  • The article repeatedly hit Cloudflare Worker rate limits, spawning discussion about over‑engineering static blogs with compute‑bound infrastructure and the trade‑off between personal tinkering and robustness.

Mississippi libraries ordered to delete research in response to state laws

Free speech, authoritarianism, and hypocrisy

  • Several commenters see the move as a clear authoritarian step: banning words and blocking access to research is likened to classic censorship and “book burning.”
  • There is frustration that many self-described “free speech” advocates appear silent, or only defend speech that aligns with their own politics.
  • Others note that principled free-speech absolutists are not surprised; they see this as a predictable outcome of earlier culture-war censorship from multiple sides.

Comparisons to Iran, Afghanistan, and human-rights trajectories

  • Some compare Mississippi (and parts of the US) to theocracies like Iran or Taliban Afghanistan, arguing the differences are shrinking.
  • Pushback emphasizes current differences in severity (e.g., criminalizing vs executing LGBTQ people) but others warn that if due process and rule of law erode, the “trajectory” can converge.
  • Data on maternal and infant mortality rates are used to argue that Mississippi outcomes are comparable to, or worse than, Iran’s.
  • A long subthread debates Islam and Christianity, with conflicting claims about whether Islam “started” as an imperialist death cult versus being similar to other expansionist systems of its era, and about historical due process under Sharia vs European law.

Status and value of gender/race studies and sociology

  • Some defend the research fields, arguing that censorship is driven by political dislike of their findings, not scientific quality.
  • Others call much gender/race studies “pseudo-science” or grievance-based, comparing it to historically harmful “race science,” but still question whether suppressing it via libraries is justified.
  • There’s a broader argument over whether sociology is meaningfully “scientific,” touching on the reproducibility crisis and difficulty of controlled experiments in human systems.

Cancel culture vs state censorship

  • One thread sees a swing from left-leaning “cancel culture” to right-wing state suppression of research as part of the same intolerance dynamic.
  • Others argue the phrase “cancel culture” was itself a right-wing branding effort to delegitimize criticism, though critics respond that some people did in fact lose livelihoods over speech.
  • Both sides note that whether by social mobbing or state action, the effect can be to chill disfavored speech.

European worries about propaganda and US politics

  • A European commenter describes young Europeans repeating pro-Trump social-media slogans and sees this as evidence of large-scale propaganda and psy-ops.
  • Suggestions for countering it include: better personal education, cultivating judgment, earning trust in one’s social circle, cutting ties with openly racist acquaintances, and volunteering/acting generously as a long-term cultural counterweight.

What is actually happening with Mississippi libraries

  • Multiple commenters say the headline is misleading: the state library agency is not “deleting” research from existence.
  • The state runs a tool (MAGNOLIA) that gives public libraries and schools access to commercial scholarly databases (like EBSCOhost). They are now using vendor settings to exclude certain collections (e.g., gender/race studies) from that interface.
  • Larger universities retain independent access; the underlying research remains available via other subscriptions or channels.
  • Critics still consider this a digital analogue of book banning: removing indexed access for ordinary users and students is seen as effective censorship, even if the originals persist elsewhere.
  • Others downplay it as “just” turning off access in one tool, arguing that calling it “deleting research” is inflammatory and obscures the specific policy mechanism.

Role of libraries and curation

  • One commenter wrestles with whether a library removing content is always a free-speech violation, noting that libraries must curate for quality and cannot hold everything.
  • The counterargument is that libraries should largely rely on external scholarly quality controls (peer review, journal reputation) and that this case appears driven by ideology and state law rather than neutral quality assessment.

Blue Prince is a roguelike puzzle masterpiece

Gameplay experience & note‑taking

  • Many players strongly recommend pen and paper; some say it feels effectively required for “meta” and overarching puzzles.
  • Several wish the game had an in‑game notebook; others argue physical notes are more expressive for complex deduction (timelines, diagrams, arrows).
  • A few note that generic digital tools (Steam overlay notes, dual‑monitor notepad) partly fill the gap, though Steam’s notes feature is reported buggy and Game Pass integration is awkward.
  • One commenter suggests that building a rich note system is a big ask for a small indie team.

RNG, repetition, and puzzle structure

  • Some players call it a top‑tier or even favorite puzzle game of the year, praising the mystery, atmosphere, and layered metapuzzles.
  • Others report bouncing off after 8–10+ hours, describing runs dominated by repeated rooms, resource puzzles, and long stretches where progress is locked behind multiple layers of randomness.
  • There’s disagreement on whether the random room drafting is well‑designed strategy (once you learn its rules and juggle multiple simultaneous goals) or a time‑wasting gate that can make discoveries feel like gambling.
  • Critics of the design complain that certain multi‑step puzzles require rare item/room combinations with poor rewards, while supporters say the game drip‑feeds meaningful clues each run if you don’t tunnel on a single objective.

Roguelike vs roguelite and meta‑progression

  • Thread branches into a broader debate on roguelikes vs roguelites, meta‑progression, and how much a run should depend on RNG versus player skill.
  • Classic roguelike fans argue that persistent upgrades undermine the “from scratch” arcade spirit; others say meta‑progression and unlocks are now standard and can be used to gate complexity rather than just power.

Reception, trust, and “advertising” concerns

  • Some commenters view the glowing review and self‑submission as indistinguishable from unpaid advertising, especially contrasted with mixed player reactions and RNG complaints.
  • Others defend the review as genuine criticism in line with the author’s past writing, and note the game’s strong critical reception elsewhere.
  • There’s discussion of a potential critic–player disconnect: reviewers allegedly focus on early/midgame engagement, while some players feel the game runs out of steam or becomes a Skinner box.

Platform & accessibility notes

  • The game is on Game Pass and PS Plus Extra/Premium; players mention it runs “Playable” on Steam Deck and works on Linux/SteamOS, though small text can be an issue.
  • One PS player reports motion sickness from the first‑person movement.
  • Tone is described as mildly eerie but not gory, and possibly suitable as a “bedtime story”–style game to watch with kids.

Obituary for Cyc

Cyc’s legacy and availability

  • A partial version (OpenCyc) with KB and inference engine exists on GitHub but is old Java and hard to run.
  • Cycorp’s site still markets Cyc for enterprise AI and healthcare/insurance; externally it’s unclear what real capabilities remain or whether the full KB will ever be released.
  • Several commenters recall isolated “whopping success” deployments, but overall evidence of broad usefulness is thin and often proprietary.

Symbolic AI vs LLMs

  • Many argue Cyc showed that hand‑encoding common sense at scale is infeasible: 30M assertions, ~$200M, 2,000 person‑years, no AGI.
  • Others counter that symbolic AI did succeed in narrower areas: SAT solving, theorem proving, model checking, planning/scheduling, verification—so “symbolic AI failed” is an overstatement.
  • By contrast, language models delivered incremental value (spellcheck, MT, IR, etc.) for decades and scale predictably with more data/compute.

Hybrid / neurosymbolic approaches

  • Strong interest in combining LLMs with ontologies: Cyc‑like KB as a “common sense RAG” layer to prevent absurd outputs and provide auditable reasoning.
  • Proposals include: LLMs generating symbolic facts/rules, using symbolic systems as external tools (Prolog, constraint solvers, Z3, MiniZinc), and platforms explicitly marketed as neurosymbolic.
  • Concerns: if LLMs generate the KB, you inherit their garbage‑in/garbage‑out issues; and translating natural language to logic may not beat just making models better.

Concepts, fuzziness, and ontologies (“chair” debate)

  • Long subthread debates whether concepts like “chair” can be captured by rules/facts:
    • One side: human categories are fuzzy and context‑dependent; deterministic symbolic logic “fundamentally misunderstands cognition.”
    • Others note probabilistic/fuzzy logics and non‑monotonic logics exist, and symbolic formalisms can model defeasible, uncertain reasoning.
  • The difficulty of even agreeing on a definition of “chair” is used both as evidence against fully symbolic cognition and as evidence that language ≠ internal representation.

Assessment of Cyc and the obituary

  • Some see Cyc as a heroic but failed AGI attempt; others think it’s wrong to treat one secretive project as an indictment of all symbolic‑logical AGI.
  • Several criticize the article’s tone as a “hostile assessment” and overly sweeping in declaring symbolic AGI a dead end.
  • Others emphasize secrecy as a major lost opportunity: negative results and internal lessons could have strongly informed the field if more had been published.

Costs, scaling, and “bitter lessons”

  • Comparison: Cyc’s lifetime cost is now tiny relative to current LLM burn rates; some argue similar investment in symbolic methods was never tried.
  • “Bitter Lesson” discussion: methods that exploit massive compute and data tend to win; that doesn’t strictly exclude symbolic methods, but anything human‑curated struggles to scale.
  • There’s broad agreement that future systems will likely combine statistical learning (for perception/fuzzy judgment) with structured reasoning/ontologies (for reliability and auditing).