Hacker News new | past | comments | ask | show | jobs | submit | pingsl's comments login

This is horrible -_-!!! But I wonder what would happen to GitHub Discussions in this situation?

I now 100% feel necessary to build a Discord channel for OSS projects.


Please don't use discord, use gitter or something else which itself is open source


Confused for a second till I saw "Write-Only storage".

Obviously, they should include "Trash bin" in the pricing comparison table.


Hover over the image under the "S4:" header :)


From an app dev perspective, sysplex is very similar to a single system image, especially when they are using the Db2 database.


You were very likely not the only one who found this security issue. But you were probably the only one who disclosed this issue to the bank.

This is ironic, but it is how business people deal with issues.


I am very excited to see the RISC-V devices come to the end users.

Then I am thinking how this device could fit into my daily life. I am wondering what are the typical scanrios for portable computers these days?


A portable computer people tend to fit into their daily life is their smartphone.

Android RISC-V port was demonstrated over a year ago. I fully expect some RISC-V smartphones will hit the market as soon as chips with high performance cores are ready.

Realistically, that means RVA22 (TBA in spring) + 6 month (assuming best case scenario immediate tapeout) + whatever time it takes to validate such a device built around the new chip.

I would say 2023H1, if I had to guess.


I use a small laptop for pretty much all my daily life stuff. I do have a phone that I use for occasional mobile web access, navigation, etc. but my main computer is a laptop. I rarely browse or surf with the phone. I'd like to have a small linux tablet that I can use familiar dev tools on, but the inkplate 10 looks more attractive to me than this weird slab-like thing. The slab thing inherits too much from gaming devices, imho. Nothing wrong with gaming if that's what you're into, but the TRS-100 of yore was revered as a writing device and its keyboard was better suited for that purpos.


I have accounts on Medium and Substack.

In the beginning, I posted blogs on Medium, and I sent out newsletters on Substack.

Then Medium started to provide email subscriptions.

Now Substack has a mobile app.

I need to rethink my content strategy going forward...


Me neither. That's why I posted here to see if someone could give some insights on this.


I am afraid data audit is not just about data changes. The real challenge is how to audit the data read which people should not do.

Since there is no redo logs generated for data read, CDC could not help in this case. It will reply on the audit traces, the SQL capture and cache, etc. But it's costly.


That should be captured in security, right? I.e. if someone has access to data the assumption is they are able to read it. Security audit can be done without the grain of select statements but rather the grain of changes to provisioning. Fundamentally, you have an issue even if someone did not actually read what they should not but could. Select audit can be useful for performance tuning but I would not classify it as “audit”, rather monitoring.


> if someone has access to data the assumption is they are able to read it.

This is not the case in most production for two major reasons:

1. Row-level security is expensive and hard to manage, so in most cases, users are granted the select privilege on table level. But indeed, it doesn't mean they should have access to all the rows in that table.

2. Power users should not have production accounts all the time. The production accounts should only be activated when power users have to perform the changes during the production change window.

So financial institutes usually generate two kinds of reports for audit/regulation purposes.

1. Report on the privileges and roles, which tells if a user should have those privileges and roles. This is a periodically static report.

2. Report on the actions a user has performed to see if these actions are part of the changes. This is a dynamic report in which we have to capture the select statements.


I can see the point around expensive row level security. Cannot see how it is harder to manage than to monitor though. Designing around risk acceptance of manual detective rather than preventative controls does not make this approach generally applicable or best practice, just a feasible one with conditions.


People die some day because of some disease. This is natural.

Give people a heart from other species, this is unnatural.

I'd rather transform my brain and thoughts into a robot.


Computers are unnatural too pa


I am using logi K580.

It can connect 2 devices and support both Bluetooth and Unifying.

Most important it has numpad with a compact size.


Consider applying for YC's Summer 2025 batch! Applications are open till May 13

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: