Hacker News new | past | comments | ask | show | jobs | submit | brb3's comments login

He's implying here that Radon used source code from replit. That's a pretty big claim to make, I'm curious if that's the case.


The post is ambiguous, as "copying it" could also mean "copying the feature after seeing our code".


> As a matter of principle, when someone goes into your home and steals from you, even if it's not material, you have to respond.

That sounds like a a disingenuous way of admitting that he knows he’s lying.


What if you invite them into your home and then 2 years later, you see that they have decorated their house with obvious inspiration from your own home decor?


You have to also factor in the difference in size:

What if you invite them into your home and then 2 years later you see they have decorated their dogs house with obvious inspiration from your own home decor.


If that's what it means, well, seeing the code two years ago is a total non-issue where the setup is so basic and the majority of languages are new ones.

But your interpretation seems way too generous when he compares it to going into your house and stealing from you.


  Location: Georgia, USA
  Remote: Yes
  Willing to relocate: No
  Technologies: C#/.NET Core, PHP, Ruby
  Résumé/CV: https://brb3.org/resume.html
  Email: bobby at brb3 dot org

I'm a Software Engineer with 10+ years of experience (the past 4 100% remote). I have a strong ecommerce and logistics background.


A marketing page at the number one spot on Hacker News, and only 35 minutes old. Hmm.


How is this any different than what happens after every Apple product launch?


Well for starters a lot of HN users actually use the products Apple launches.


And a lot of those product launches have Samsung displays in them .


Samsung is one of the largest (the largest?) display manufacturers in the world that makes, among other things, displays for Apple.


Every television in my house is a Samsung and all of my Android phones are too.


I have no hesitation in saying that you will never own, nor be in the market for this product.


Even in cases where that might be true - would you still allow me the enjoyment of reading about it?

Gee golly, I mean I don't live anywhere near The Boring Company tunnel projects but I still like reading about those...

What's your problem?


I'm on a Samsung device right now you dullard.


Is the difference that Apple product launches are (not exclusively) intended for consumers whereas the Wall is aimed almost exclusively at large business's lobbies?


... and for luxury living. Luxury car launches are covered on the hn frontpage as well, e.g. that weird car whose windows Elon broke... probably increasing its value in the process.


The website shows two uses "for business" and "for luxury living". So it is intended for home!


Two wrongs don't make a right.


What's "wrong" about this? No one has provided any evidence of manipulation other than speculation. Maybe people are interested in Samsung's display technology?


I don't know how to provide evidence of manipulation as an outside observer. I was pointing out that it does seem strange. But maybe this is the course of HN nowadays.


Agreed, sorry -- I was commenting on the logic of the argument rather than the apparent facts of the situation.


This site has a bay area bias.


Please don't break the site guidelines by insinuating astroturfing or shillage and whatnot. It's nearly always just imagination, and it poisons discussion here.

https://news.ycombinator.com/newsguidelines.html

https://hn.algolia.com/?sort=byDate&dateRange=all&type=comme...


So? It's a cool product, it's tech related and potentially useful to a decent amount of people.


Why is this flagged? It seems like a very legitimate thought. And now this post is at #63 (on page 3).


Turns out, you can't mention that things might be astroturfing on HN because that's against the rules. So _pointing out_ something fishy is against the rules here. That seems very strange to me.


"In comments... Please don't post insinuations about astroturfing, shilling, brigading, foreign agents and the like. It degrades discussion and is usually mistaken. If you're worried about abuse, email us and we'll look at the data. "

It's not that you can't make a post discussing astroturfing on HN or that you can't point out astroturfing to someone that can actually do something about it it's that you aren't supposed to just respond to an article that you think it's astroturfing as that helps nobody even if it is or isn't actually astroturfing.


I'm paying $100/mo for gigabit fiber through Ringgold Telephone Company. I'm in Ringgold, GA (right on the Tennessee border, south of Chattanooga).


> Essentially just requiring an at-mark between two other bits of text.

I've been using this regex to make sure there actually is text before and after the @

    /.+@.+/


Can there be more than one @ or whitespace? If not you could use:

    /^[^@\s]+@[^@\s]+$/
Filtering out emails with multiple @'s and whitespace seems like an obvious win to help prevent typos and copy-paste errors.


Whitespace in front of the @ is only allowed within quotes, and any quoted part must be seperated by dots from unqoted parts. "my address"@example.com is allowed, as is my." ".address@example.com, but not my"address"@example.com.

Once you get that into a regex format, remember that a quoted dot is different from an unqoted dot, and don't forget that you handle comments within email addesses correctly.

There are plenty of reasons why people say not to use regex to validate email addresses.


Yes, the are valid e-mail addresses that contain whitespace or multiple @s.

Wikipedia <https://en.wikipedia.org/wiki/Email_address#Valid_email_addr... > gives the following example:

    "very.(),:;<>[]\".VERY.\"very@\\ \"very\".unusual"@strange.example.com


Exactly. It is very much our nature as programmers to attempt to capture this seemingly trivial bit of structured text into seemingly innocuous programming rules, but the rewards of the added complexity are just too meager. Even if an email address validates, it still doesn't mean that you have a working email address. Sending an email is the only way to be sure, and if you are already doing that, then why risk excluding valid email addresses with a decidedly non-trivial regex?

There are regexes out there that capture all the complexity of valid email addresses today (but who knows if they'll work with, say, next year's additions to the top-level domains?), and you can copy them from StackOverflow if you really want them; but why bother?


It is safe in almost all applications to assume that quoted-string local-parts do not constitute a valid email address (ditto for domain literals).


Oh my.

Nevermind. `/.+@.+/` it is.


You are right of course. A typo on my end (fixed).


26 inches (+1 inch for the thickness of the desk surface).


I bought one of these desks as well. I also use it at just about 41 inches when standing.

I think the desk sways a bit more than the article says. That said, I would imagine using a sturdier monitor stand (or an arm clamped to the desk) would counteract that enough to make it more comfortable.

For less than ~$250, I couldn't find a comparable sit/stand desk.


For those wondering about `rootless`, it is implemented as an extended attribute on files/directories.

$ xattr /usr

com.apple.FinderInfo

com.apple.rootless

Running `sudo rm -rf /usr` fails.

$ sudo rm -rf /usr

rm: /usr: Operation not permitted

Here is a list of all of the `rootless` files and directories on my system. It appears to be mostly kext files, and Apple applications.

https://gist.github.com/bobbyburden/4ce5c42044e5a9967b25


I'm pretty sure that rootless is a good thing. I've seen Macs bricked by seemingly harmless operations like changing important permission settings, or by damaged installer packages.

Locking the system down will make it a bit harder to shoot yourself in the foot. Besides the obvious advantage of reducing the attack surface of vulnerabilities.


That won't brick your OS X installation. Just boot from external drive and fix the permissions. It's not really that hard, and there is even a recovery partition exactly for problems like that.


Yep, the recovery partition is also a pretty great feature. But it's even better if you never need it!


Seeing `sudo rm -rf /usr` makes me cringe.

A more harmless way to check: `sudo touch -a /usr`.


I did it in a VM. :)


So how does the installer deal with files that are installed in say /usr/bin that should not be there? Does it leave them there or does it move them? Does it put "rootless" attribute on them?

Can you turn off rootless during installation or is this post installation thing only?

Does rsync backup continue to work with rootless? I have a feeling that booting from external partition and restoring from backup won't work for system files with rootless attribute on them.


I'm a developer at a company called PriceWaiter[1] that provides a similar “Make an Offer” service to existing eCommerce stores. Our API allows retailers to add a button to any product on their site to get offers from customers.

We welcome Amazon into this space, and are really glad to see this idea catching on.

Check out our developer docs and integration plugins[2], or feel free to ask any questions you have here.

[1] https://www.pricewaiter.com/

[2] https://docs.pricewaiter.com/


It's been years since I've used StumpWM, but I believe you can accomplish a similar setup using SLIME (http://www.emacswiki.org/emacs/StumpWM).


Oh, cool. It just takes a little bit more Elisp for a full SLIME environment. Thanks!

I liked StumpWM when I used it, but as a Schemer, I'm inclined to use/hack guile-wm.


Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: