article thumbnail

How short can Git abbreviate? (2013)

Hacker News

How short can a Git hash be abbreviated? A full SHA-1 hash is 160 bits, 40 hex characters, which is a bit long to talk about and retype when you're not just copy-pasting. Therefore most people will use just the first few characters to refer to commits, but how safe is this? I know of…

144
144
article thumbnail

Ancient astronaut theorists faked a Hindu nuclear explosion (2013)

Hacker News

Jason Colavito 2011/2013

126
126
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A moment of financial clarification (2013)

Hacker News

Every once in a while someone in the comments here says, usually as an aside to something else, that no one becomes a writer to get rich. So as a point of clarification, and to give everyone else who is slightly exasperated by this sort of comment something to point at: Hey, I became a…

139
139
article thumbnail

Typesetting the LaTeX Way (2013)

Hacker News

Full time geek and re­search stu­dent with a pas­sion for de­vel­op­ing great soft­ware, of­ten late at night.

126
126
article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

Humane AI – Pico Laser Projection – $230M AI Twist on an Old Scam (2023)

Hacker News

Humane AI (Humane, hereafter) combines the mid-2010s failed concept of using a laser projector to project on the body with the early 2000s failed projector phone (something I wrote about in 2013), …

AI 168
article thumbnail

The Linux Backdoor Attempt of 2003 (2013)

Hacker News

Josh wrote recently about a serious security bug that appeared in Debian Linux back in 2006, and whether it was really a backdoor inserted by the NSA. (He

168
168
article thumbnail

New Study: 2018 State of Embedded Analytics Report

Why do some embedded analytics projects succeed while others fail? We surveyed 500+ application teams embedding analytics to find out which analytics features actually move the needle. Read the 6th annual State of Embedded Analytics Report to discover new best practices. Brought to you by Logi Analytics.