Hacker News new | past | comments | ask | show | jobs | submit login

Shift workers deserve more hazard pay and or health care coverage.

This is what I mean when I was saying you all have gotten mighty entitled about this.

The data is public by default. You know this when you sign up and use the service. This should inform your expectations of how the data will be used.

I didn't bother to watch, but I did skip ahead several times and it sounded like a sales pitch. Only one video at Ed's youtube. "Build companies that matter to customers that solve real problems."

If you need more Ed, you can try

Ed Zitron's Where's Your Ed At The Words of Ed Zitron, a PR person and writer.

https://www.wheresyoured.at/


The only evidence we have is a single anecdote on Mastodon sparse on details.

For all we know, the failure was in his employer's proxy server and the corrupt file was cached.

Let's not wait for facts though, proceed immediately to the crucifixion of Dell.


I also left the page early. I enjoy reading, and wasn't able to do that as effectively on this website.

Risk factor doesn't mean causative, only that there's enough signal to use it in considering what interventions to pursue. Made-up example, maybe slightly elevated blood lipids by itself wouldn't merit lipid lowering agents, but in combination with other risk factors like high blood pressure or poor sleep regularity, they are merited.

The field of medicine in general understands the concept of a condition being secondary to another, underlying cause and might treat it as a comfort thing but doesn't consider that with fixing the underlying.


This site can’t provide a secure connection www.lukasmoro.com uses an unsupported protocol. ERR_SSL_VERSION_OR_CIPHER_MISMATCH

As someone reading this while taking a shower, I'm questioning how this could be redesigned to work today. How are you supposed to use your phone if your head is sticking out?

In the "Covariates" section it mentions they're controlling for "self-reported sleep problems" such as insomnia. I imagine a relationship between stress and sleep regularity would most likely be mediated by insomnia?

Don't make it public then.

Value engineering does not mean making products unsafe.

> Poor people could always purchase used appliances.

The reality in mid 20th century US demonstrates this isn't the case. Most went without the modern appliances that are commonplace today.


And him saying NBC could lose it's license for giving airtime to Trump's opponents...? Where does that land?

Experimentation is _ALWAYS_ at the "oh look, something funny happens if i do this" stage, otherwise it isn't experimentation/research but rather research/development. If we know what to expect, why experiment? Why waste resources?

> One monday morning last fall, at Spring Valley High School in Columbia, South Carolina, a 16-year-old girl refused to hand over her cellphone to her algebra teacher.

I was never a fan of teachers confiscating things, but there is a long history of certain items being prohibited in class.

Perhaps there could be more collaborative development of rules and enforcement policies, with participation from teachers, students, and parents.


Thanks, I think that helps me understand the 'why' a lot more! That's kind of cool, and I do hope they can keep making progress in that effort!

You're right. A headline of "Dell's website is serving up unsigned updates" would be correct. But to garner more clicks and hype that's not how they've worded their tweet, instead it's worded to make it sound like Dell are doing this on purpose.

The same applies to tests, maybe docs too.

For x in tests, type annotations, and documentation*:

If you write your x first then you have to decide what your API is. This is great if you want to think about your API. Sometimes though you just want to get down to it and play around with a new idea. Either way is fine.

As soon as you start sharing code or patching production code or patching someone else’s production code, one must insist on seeing some kind of x. Having x around the outside of a system — rather than requiring x be added throughout the entire system — is often good enough.

*The useful, architecture kind.


Most of the ones I've seen do, but via an rca to 3.5mm dongle. The main issue is that the scaler built into most modern TVs does a worse job than even a cheap external one.

One approach I didn't see discussed here is storing the UUID across 2 columns as 2 64 bit integers and forming a composite primary key. There's still tradeoffs with this as with all the methods but depending on use case it's viable way to do it.


> guaranteed

I used to design airplane parts and systems. A guarantee isn't worth squat. Being able to positively verify it is what works.

You're right that I don't use a laptop for videoconferencing. I wouldn't use the builtin mike and camera anyway, as a 5 cent microphone can make it hard for the other party to understand you. I use a semi pro mike. If you're in business, I recommend such a setup.


Yes! Bluesky themselves don't train on my data which is a major factor for choosing that platform because that is the way I want to share my content; and what do y'all do, immediately grab and train on it with no hesitation whatsoever.

Vista was the worst in my book. And Vista was actually the real turning point when C# started to infect Windows.

Is there speech to speech? I have been hoping for a model I can use to do voice acting with inflection

Companies will definitely do an accurate and exhaustive job of that.

Dell is a large player in storage integrity for servers for exactly this purpose.

This raises a different but related question. In what world should a victim of a crime be extorted for doing innocent things in their home. If a peeping tom took a photo though a window, could that be used to extort someone?

When people are extorted for these kinds of things it's usually catfishing that leads to sexual acts being recorded. That's not related to cybersecurity.


Apple definitely knows their audience, unfortunately they've been straying a little bit from the mission lately on software reliability.

I was inspired by your use of the idea evaluator:

> I want to scrape reddit and twitter, and then sell access to the content by posting lead-gen on hacker news

## SUMMARY

This business idea presents significant flaws in terms of legality, market viability, and competitive landscape. Additionally, it lacks clear differentiation and poses high operational and financial risks.

[analysis.marketProfitability]

## MARKETSIZE

The market for data scraping and analysis is highly competitive, with an estimated size of $1 billion globally, but it is heavily regulated and saturated with similar services.

## REVENUESTREAMS

Potential revenue streams include subscription fees for access to data, one-time sales of datasets, and consulting services for data analysis.

## PROFITMARGINS

Profit margins can be thin due to high competition and potential legal fees; profitability is uncertain.

[analysis.uniquenessFactor]

## KEYDIFFERENTIATORS

The uniqueness of the product is questionable; many established tools already scrape social media data and provide insights.

## COMPETITIVEADVANTAGE

There is no strong competitive advantage evident, particularly since numerous companies offer similar scraping services with established user bases.

[analysis.realWorldSuccess]

## BARRIERSTOENTRY

Barriers to entry are low in terms of technology but high in legal compliance; obtaining permission to scrape data from platforms like Reddit and Twitter is a significant hurdle.

## SCALABILITY

While the technology may be scalable, the ethical and legal challenges associated with scaling operations could hinder growth.

## MARKETTRENDS

Market trends indicate a growing focus on data privacy; many platforms are tightening their policies on scraping, which could severely affect viability.

[analysis.existingCompetition]

## DIRECTCOMPETITORS

Direct competitors include data scraping companies such as ParseHub, Octoparse, and various data analytics firms.

## INDIRECTCOMPETITORS

Indirect competitors include social media analytics tools like Hootsuite and Sprout Social, which offer insights without scraping.

[analysis.riskFactors]

## MARKETRISKS

Changing regulations regarding data privacy and scraping could render the business model unviable overnight.

## OPERATIONALRISKS

Operational risks include potential bans from platforms, legal challenges, and the need for continuous technology updates to avoid detection.

## FINANCIALRISKS

Financial risks are substantial, considering the potential for fines and legal fees if the business is found to be in violation of terms of service.

[analysis.overallAssessment]

## STRENGTHS

The concept of leveraging social media data for lead generation is appealing, and there is a market for data insights in marketing.

## WEAKNESSES

The lack of uniqueness and high legal risks overshadow the potential strengths; ethical concerns surrounding scraping are significant.

## OPPORTUNITIES

There is an opportunity to pivot towards legitimate data analysis and consulting services that comply with legal standards.

## THREATS

Legal action from social media platforms, rapid changes in data privacy laws, and strong competition from established players present significant threats.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: