Hacker News
Tech-vexed: how digital life threatens our capacity for awe
Article URL: https://aeon.co/essays/tech-vexed-how-digital-life-threatens-our-capacity-for-awe
Comments URL: https://news.ycombinator.com/item?id=42086353
Points: 1
# Comments: 0
Cisco Puts Big AI Infrastructure into Small Packages
Article URL: https://www.nextplatform.com/2024/11/07/cisco-puts-big-ai-infrastructure-into-small-packages/
Comments URL: https://news.ycombinator.com/item?id=42086342
Points: 1
# Comments: 0
What's so great about the Atari ST? – by Paul Lefebvre
Article URL: https://www.goto10retro.com/p/whats-so-great-about-the-atari-st
Comments URL: https://news.ycombinator.com/item?id=42086315
Points: 3
# Comments: 0
Air fryer could be listening to you and sending the data to China
Pierceable Abstractions
Article URL: https://lethain.com/pierceable-abstractions/
Comments URL: https://news.ycombinator.com/item?id=42086294
Points: 1
# Comments: 0
Choose Boring Technology and LLMs
Article URL: https://www.maragu.dev/blog/choose-boring-technology-and-llms
Comments URL: https://news.ycombinator.com/item?id=42086289
Points: 3
# Comments: 0
The Wall: Geostationary satellites near-real-time animations
Article URL: https://earth2day.com/TheWall/Movies/The5/THELIVINGPLANETHELIO.html
Comments URL: https://news.ycombinator.com/item?id=42086286
Points: 2
# Comments: 1
New NanoGPT speedrun record: 3.28 FineWeb val loss in 8.2 minutes on 8xH100
Article URL: https://twitter.com/kellerjordan0/status/1854296101303800108
Comments URL: https://news.ycombinator.com/item?id=42086275
Points: 1
# Comments: 0
Watchdog: AI tools can be used unlawfully to filter candidates by race, gender
Article URL: https://www.theregister.com/2024/11/08/ico_finds_ai_tools_can/
Comments URL: https://news.ycombinator.com/item?id=42086259
Points: 1
# Comments: 0
How to Self-Assess as an Engineering Manager
Article URL: https://blog.em-tools.io/p/how-to-self-assess-as-an-engineering-manager
Comments URL: https://news.ycombinator.com/item?id=42086239
Points: 2
# Comments: 0
Amazon CEO addresses worries about a controversial office policy
Article URL: https://www.thestreet.com/employment/amazon-ceo-addresses-worries-about-a-controversial-office-policy
Comments URL: https://news.ycombinator.com/item?id=42086087
Points: 1
# Comments: 0
Ask HN: AI innovation outside big tech is over. Debate me
Alright, I know, the title is on the "click bait" side. But hear me out.
Researchers in the UK rely on High Performance Computing systems to do their work. If you combine the top 8 HPCs in the country, they amount to 1,000 GPUs altogether. For context Meta alone used 24,000 just to train one of its models (LLaMa). To make things worse, those HPCs are geting to the end of their life without plans for renewal.
With the growing size of AI models (both in vision and language) and the slow pace of hardware improvement, this is only going to get worse. Meta, xAI, OpenAI know this and they are hoarding resources (hundreds of thousands).
How are researchers, independent developers and AI/MML hobbyists going to compete in the space? Do we just submit to our techno-feudal lords and pay rent to access crumbs? Is it over?
Does anyone else care about this?
I'd love to hear people's views on this. Disclaimer: I am working on a solution and I am reaching out to the community to learn more. Check it out if you are interested: https://github.com/kalavai-net/kalavai-client
Comments URL: https://news.ycombinator.com/item?id=42086073
Points: 1
# Comments: 0
Torvalds patch improves Linux performance by 2.6%
Article URL: https://www.theregister.com/2024/11/06/torvalds_patch_linux_performance/
Comments URL: https://news.ycombinator.com/item?id=42086057
Points: 2
# Comments: 0
Kubernetes as Cloud Development Environment
There are numerous technologies/projects under CNCF which developed around or exclusively for k8s. Eg: Kata containers, i see introducing kata into kubernetes changed the perspective of looking k8s as the tech that can only run production workloads. Gitpod flex(https://www.gitpod.io/blog/introducing-gitpod-flex) claims to be more relevant with CDE. How do OSS see cloud development verticals?
Comments URL: https://news.ycombinator.com/item?id=42086049
Points: 1
# Comments: 0
Chernobyl frogs exposed to radiation show no signs of stress or increased ageing
Article URL: https://phys.org/news/2024-11-chernobyl-frogs-exposed-aging-stress.html
Comments URL: https://news.ycombinator.com/item?id=42086035
Points: 1
# Comments: 0
ByteDance X-Portrait 2: transform static images into animated performances
Article URL: https://byteaigc.github.io/X-Portrait2/
Comments URL: https://news.ycombinator.com/item?id=42086014
Points: 2
# Comments: 0
Ask HN: Database threat detection and response – will it fly?
Having spent the last few years working with RDBMS, I recently started exploring an idea for a database-centric cybersecurity solution. Together with two friends, we’ve spent the past three months researching this space. We've conducted dozens of in-person interviews (following The Mom Test guidelines) with CISOs from various scale-ups and enterprises across Eastern Europe and India, zeroing in on insider access threats.
A recurring theme emerged: while organizations with sensitive or high-value databases are generally well-protected on the perimeter, most lack effective ways to monitor and respond to suspicious activity by already authorized users. The solutions that actually work (eg. DSBMs) are typically bundled, expensive, cause slow-downs, and drain resources. Among those we interviewed, only about 5% felt that they have this issue solved.
Based on these insights, we developed a PoC that, through a database gateway proxy, can already perform full packet inspection. For now, the behavioral analysis is mocked up, but once fully implemented, the tool will be able to detect anomalies in baseline database traffic and respond to incidents effectively and with no trade-offs. We’ve demoed it to a few companies, and initial traction has been promising. However, we worry that this positive feedback could be a fluke—perhaps due to our small sample size or a bias toward regions with maturing cybersecurity markets. To be candid, we’ve also had trouble reaching US CISOs, even with warm intros, which is concerning.
So, before moving forward, we figured we’d try to broaden this research, and we’d appreciate any input from CISOs out there:
1. Do you consider insider data access a risk to your organization’s databases?
2. Have you already tried addressing this risk (if so, how), or is it a high priority on your to-do list (if not, why)?
3. Which solutions are you familiar with, and what budget would you consider for tackling this issue?
Comments URL: https://news.ycombinator.com/item?id=42086007
Points: 2
# Comments: 0
Open Source Governance: Using Code to Monitor Finance and Protect Rights
Article URL: https://github.com/tritongp/OpenSourceGovernance
Comments URL: https://news.ycombinator.com/item?id=42086005
Points: 1
# Comments: 1
MyDuck: MySQL with DuckDB
Article URL: https://github.com/apecloud/myduckserver
Comments URL: https://news.ycombinator.com/item?id=42086000
Points: 1
# Comments: 0
Show HN: Claude created an "unsolvable" puzzle, but you can solve it
I had Claude (Sonnet 3.5 New) create a sliding puzzle, and I noticed it added code to make sure it is solvable. I asked about it and it explained that without it, the puzzle would be unsolvable. Its explanation didn't make too much sense for me so next I had Claude create an unsolvable version. I was able to solve it, so I changed it to include a congratulations message.
Go ahead and try to solve this "unsolvable" puzzle. You should be able to succeed!
https://claude.site/artifacts/2bbdfb89-da23-4de0-a047-e6c8b1...
Comments URL: https://news.ycombinator.com/item?id=42085996
Points: 1
# Comments: 0