Hacker Newsnew | past | comments | ask | show | jobs | submit | madduci's commentslogin

CEL is used a lot in FHIR as Path Expressions

I did not know that. Path expressions for access control?

Mostly for validating the FHIR Resources themselves

But we have still the power of choice: moving consumers away from such closed platforms would affect their business.

First you have to convince consumers to give up on systems that work with support to development kits that are build it yourself with (lots of) caveats, which is why the year of the Linux desktop still hasn’t arrived.

Not really true. There are platforms and systems that are stable and open.

Love this project, although I would never personally trust YT as Storage, since they can delete your channel/files whenever they want

Upload to other video sharing sites for redundancy. RAIVS!

Stop ruining the internet end exploiting free resources

It was a tongue-in-cheek / silly suggestion outright. I don't think many people are actually using the tool for its off-ToS purpose though, there is also a lot of prior art across multiple sharing services. It's still interesting to think about the inner workings of it.

What is alpha school?

https://alpha.school/austin/

this is the OG, a few others are springing up. Not sure if i'm just drinking the kool aid, but this type of education just makes complete sense to me.


Never used one in over 15 years. I write a short post it only if I don't finish a certain task between days and it is really complex or maybe as a to-do list before leaving for holidays.

But I never felt the urgency to start a proper notebook. All the important decisions are documented in form of git commits for code or decision records for systems


I've put everything behind a Wireguard Server, so if I need something, I can access to it through VPN and AI can't do anything

But why?

It's just a silly experiment; the real endgame is to make a bootloader that is customisable using HTML/CSS/JS

Since PDFs can contain JS, presumably that should be the preferred way of modifying your boot loader.

Yeah that's the natural next step, I'll work on that next

Why not?

Because this can end very badly. It is a new surface to attack

Why is it a new surface? Either you can run UEFI code, or you can't. Attacking the JS interpreter itself is unrealistic IMHO, it's the poorly written JavaScript running on top of this that might open new surfaces of attack. But other UEFI code is mostly written in C or C++, so let's call that a wash?

Exactly! It's actually great! More ways to jailbreak stuff.

Maybe? What's your threat model?

Coincidentally, if you switch to use Windows Server 2025 (which is W11), you end up with a much better experience. No forced updates, no ads or messed up things with account

In Italy (and EU perhaps?) is every year from 70 onwards

No but I find this line interesting:

The Linux kernel drops i486 support in 6.15 (released May 2025), so 6.14 (released March 2025) is the latest version with full compatibility.


Any chance of backporting changes to be able to run on older hardware?


https://kernel.org/ says 6.12 is still a supported LTS, so you could just run that.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: