Hacker Newsnew | past | comments | ask | show | jobs | submit | Anagmate's commentslogin

Haskell indirectly solves this by separating `trace` (a form of logging) from IO (trace is a procedure that logs function call while all other IO must be contained in an IO monad).


Had an awesome experience with german Amazon support - he was very friendly and helpful, sent an e-mail afterwards where he explained how the problem occured in more detail and got in touch with their tech team, which fixed the problem in few hours and then send me a handwritten e-mail (not automated) apologizing for the problem.


> "buy only from us or never from us"

And? Seems like a valid move (from both moral and corporate perspective) to me.


If there are lots of people to buy from, that's a fair offer. If there's only one person to buy from (Google, in this case), that's not a fair offer, it's abusing your monopoly.


Interfering in your customers' dealings that have nothing to do with you sounds morally awful to me.


if the practices used by the company were so bad and abusive, shouldn't the customers just move to another company? Voila, problem solved, the company no longer has monopoly.


> to allow the source page to carve out

How would that help? If I have malicious site, I just wouldn't use that feature.


I feel like YouTube uses its monopoly to create a walled garden focused on (in their own words) advertiser-friendly content.

The thing is, it makes perfect sense from their side - they will make people angry, but why would they bother if those people can't go anywhere else?

I'm starting to feel that a competitor providing the same quality of service while allowing all kinds of videos has a chance to succeed. It's OK to have both child videos, porn and Syrian documentation, as long as you can filter - maybe have some sort of a "curiosity" slider that filters child content on one side, YouTube content in the middle and all content to the other side. Also some category toggles,... If you're unhappy with the current selection, just take a few minutes of your time and change your preferences.


This would probably be too hard & expensive to implement, but it seems as the most user-friendly solution: create connection protocol where both ends send all possible protocols they can work with (standard codes could probably be established) and the cable would include small chip & LED diode in both connectors - when you connect two devices, it would either light up green (both ends share at least one protocol) or red (incompatible).

For example, I plug one end into my phone and the other one into my sound card - it the phone doesn't support external sound cards, the cable would light up red - otherwise, it would flash green for few seconds, then turn the light off.

Another (maybe more practical solution) would be to implement this in both ports, but some vendors may not comply with the specification. (in the cable, you could only buy those cables that support the negotiation protocol - it would be your choice if you decide to pay a bit more for a better cable)


for me, it throws several false alerts (Twitter, Flickr and few others). Is it possible that it's caused by my browser extensions (uBlock Origin, Disconnect)?


wedding photos keep you on facebook, which means more time spent on facebook -> more ads server & more behavior tracked. If you click the news, it will take you away from facebook.


my approach to this consists of 4 security "levels": 1. I have one "throw away" password for services I don't give a fuck about 2. 2 passwords for ordinary services (breach cannot cause any serious harm and I can reset the password over my e-mail) 3. 2 other passwords (pretty easy to memorise but almost impossible to guess) that I use for my school mail, IDE, other mail accounts 4. a unique password coupled with two factor auth I only use for my primary gmail - as long as I have ownership of that, I can restore access to basically any other account I use.

ad. 1: I find it a pretty good idea to also have a secondary junk mail for signing up to these services - just in case they give my e-mail to someone for spamming or get breached.


> as long as I have ownership of that, I can restore access to basically any other account I use

And therein lies the rub. Single point of failure for your whole intricate security setup.

I have the same problem.


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: