<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: gregw2</title><link>https://news.ycombinator.com/user?id=gregw2</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sun, 24 May 2026 09:18:57 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=gregw2" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by gregw2 in "The IBM-ification of Google?"]]></title><description><![CDATA[
<p>I can confirm. Redshift support is mediocre even for a F100 firm with TAM support if the workload is large and complex and you have some needle in the haystack causing problems like you allude to.<p>Practically speaking keeping an eye on locks and transactions is a good idea, as is watching out for your statistics on key core columns going bad when they shouldn't. (analyze and vacuum sometimes don't actually do anything when you need them to...)</p>
]]></description><pubDate>Fri, 22 May 2026 23:12:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=48242767</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=48242767</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48242767</guid></item><item><title><![CDATA[New comment by gregw2 in "How Mark Klein told the EFF about Room 641A [book excerpt]"]]></title><description><![CDATA[
<p>You raise an excellent point. I'd only counter that a number of the factors I raised are manipulated to retain mass surveillance even in the presence of mass encryption. Let's start with manipulating random number generators or controlling elliptic curve constants...</p>
]]></description><pubDate>Thu, 14 May 2026 17:51:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=48138779</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=48138779</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48138779</guid></item><item><title><![CDATA[New comment by gregw2 in "Princeton mandates proctoring for in-person exams, upending 133 year precedent"]]></title><description><![CDATA[
<p>It would also be interesting to understand how much "imposter syndrome" seen at Ivy institutions stems from just the inevitable "little fish big pond" dynamic and how much stems from cheating.<p>(And how much that "imposter syndrome", from either source, then drives later hard-work/success and how much doesn't.)</p>
]]></description><pubDate>Thu, 14 May 2026 17:07:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=48138131</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=48138131</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48138131</guid></item><item><title><![CDATA[New comment by gregw2 in "Princeton mandates proctoring for in-person exams, upending 133 year precedent"]]></title><description><![CDATA[
<p>That's a very interesting call out, the connection between gaming academics and (gaming) finance.<p>They both do have very concrete point systems with a parallel set of less-measured but very real externalities, don't they?<p>This brings me to a bit of a related story.<p>A family member of mine who attended Princeton and was an undergraduate Residential Advisor (RA) in the dorms responsible for care of freshmen recalled hearing a presentation in the early 2000s to parents of students from an academic dean or faculty member.  The dean boasted to the parents how great their kids were, describing how each year in the last decade they kept adding more work to the students and the students kept rising to the challenge. My family member RA, very aware of the resulting stress the students were under was horrified.  This family member thrived at Princeton and loved it, but is quite wary of trying to put their own children on a track to get there or go there.<p>This event correlates with the increasing fraction of students at Princeton going into finance which began in the early 1990s and which peaked in 2006 with 46% of students at Princeton going into Finance. I had not considered a correlation between student psychological stress and psychology of "gaming"/cheating and the psychological going into finance until your comment.<p>At that time, there was some sense that perhaps many Princetonians went into Finance because they had to pay of the huge loans from the price tag.  After a couple decades on working on financial aid improvements, now that Princeton (tuition) is free for people with family incomes under $250k/year and has been for a while, and still large numbers (admittedly not quite as large) are still going into finance, I'm not sure some of the psychological factors around taboo topics like gaming/cheating and/or more prosaic related factors like reducing cheating while properly sizing the expected workload for the non-cheating population have been explored.</p>
]]></description><pubDate>Thu, 14 May 2026 16:50:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=48137934</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=48137934</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=48137934</guid></item><item><title><![CDATA[New comment by gregw2 in "How Semiconductors Were Made in America"]]></title><description><![CDATA[
<p>The light source tech was pivotal, but the supply chain mastery of 100,000 parts and patience to invest "200 billion dollars" in development over decades is deserves massive respect for the Europeans, no? This effort did not start in 2013.</p>
]]></description><pubDate>Fri, 01 May 2026 16:32:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=47976713</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=47976713</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47976713</guid></item><item><title><![CDATA[New comment by gregw2 in "How Mark Klein told the EFF about Room 641A [book excerpt]"]]></title><description><![CDATA[
<p>This does not work if your communication enpoint is the same as your encryption endpoint.<p>Or you don't control your key material.<p>Or your tech supply chain.<p>Or leave your device unattended.<p>Or aren't susceptible to the same "five dollar wrench" attacks used by certain in-person Bitcoin wallet thievestgat are also available to state actors.<p>I could go on...</p>
]]></description><pubDate>Fri, 01 May 2026 03:17:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=47970980</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=47970980</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47970980</guid></item><item><title><![CDATA[New comment by gregw2 in "Postgres's lateral joins allow for quite the good eDSL"]]></title><description><![CDATA[
<p>You raise a good point.<p>Skimming the original article, I didn't really understand why the author didn't discuss "WITH" CTEs (for SQL newbies, common table expressions, see <a href="https://modern-sql.com/feature/with" rel="nofollow">https://modern-sql.com/feature/with</a> ) as alternative composition mechanisms.<p>Or even SQL views. But your ergonomics comment makes sense to me.</p>
]]></description><pubDate>Wed, 29 Apr 2026 22:53:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=47955769</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=47955769</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47955769</guid></item><item><title><![CDATA[New comment by gregw2 in "Don't Stop Me from Pasting Passwords"]]></title><description><![CDATA[
<p>The hidden problem many password managers gloss over is how unbelievably insecure the Windows  copy-n-paste is in Windows for decades.<p>IIRC (corrections welcome) Windows's window manager broadcasts the contents of the "copy" operation to any application that requests to receive the ? WM_CLIPBOARDUPDATE event... so any windows malware or even legit application with legal fineprint basically gets a plaintext message with the contents even before the "paste" occurs. All running apps are trusted.<p>Here's an example blog entry from "grumpy-sec"(?) laying this out (2018):
<a href="https://share.google/0til1YzbF4xFRY7ls" rel="nofollow">https://share.google/0til1YzbF4xFRY7ls</a><p>Not to mention newer Microsoft conveniences like logging your clipboard history to your disk so it doesn't go away when your computer reboots, and/or syncing it to the cloud.</p>
]]></description><pubDate>Tue, 28 Apr 2026 13:34:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=47934372</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=47934372</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47934372</guid></item><item><title><![CDATA[New comment by gregw2 in "Show HN: Agent Vault – Open-source credential proxy and vault for agents"]]></title><description><![CDATA[
<p>I have a related question, is anyone developing standards on how agents can proxy the requestor identity to backend database or application layers? (short lived oauth tokens perhaps, not long lived credentials like the ShowHN seems to focus on?)</p>
]]></description><pubDate>Fri, 24 Apr 2026 00:01:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=47883826</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=47883826</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47883826</guid></item><item><title><![CDATA[New comment by gregw2 in "What if database branching was easy?"]]></title><description><![CDATA[
<p>I heard about this feature first from Snowflake  but there are similar options around in other ecosystems which may be of interest to someone here and one thing to keep in mind with even Snowflake's implementation...<p>Snowflake's implementation only works within a single Snowflake account, not cross-account, which implies if you want to clone across dev/qa/prod you must manage those environments within a single Snowflake account.<p>BigQuery has a very similar "table clone" feature. It works across GCP projects (accounts) but not across organizations.<p>Redshift and Azure Synapse do not really have this feature at all.<p>Databricks, Microsoft Fabric and  the Iceberg Nessie-only catalog do support something similar, often called shallow cloning.<p>(Nobody really supports cross-region cloning... which makes sense if you think about it.)</p>
]]></description><pubDate>Wed, 22 Apr 2026 12:27:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=47862601</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=47862601</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47862601</guid></item><item><title><![CDATA[New comment by gregw2 in "Who is Satoshi Nakamoto? My quest to unmask Bitcoin's creator"]]></title><description><![CDATA[
<p>Who says it started in 2011? I find that hard to believe.<p>Gates was having interviews with John Brockman's edge.org in 1996:
<a href="https://www.edge.org/conversation/bill_gates-digerati-chapter-10" rel="nofollow">https://www.edge.org/conversation/bill_gates-digerati-chapte...</a><p>Gates was at The Edge dinners in 2010:
<a href="https://michaelshermer.com/articles/my-dinner-with-bill-gates-that-is/" rel="nofollow">https://michaelshermer.com/articles/my-dinner-with-bill-gate...</a><p>Jeffrey Epstein funded The Edge in the late 90s early 2000s, then not around 2008/9 during his first trial and prison, then again after he got out:<p><a href="https://www.buzzfeednews.com/article/peteraldhous/jeffrey-epstein-john-brockman-edge-foundation" rel="nofollow">https://www.buzzfeednews.com/article/peteraldhous/jeffrey-ep...</a><p><a href="https://epsteinweb.org/john-brockman/" rel="nofollow">https://epsteinweb.org/john-brockman/</a></p>
]]></description><pubDate>Tue, 14 Apr 2026 11:29:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=47764193</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=47764193</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47764193</guid></item><item><title><![CDATA[New comment by gregw2 in "The Intelligence Failure in Iran"]]></title><description><![CDATA[
<p>I throw out this observation more to be provactive than persuasive, but I haven't seen it elsewhere..<p>People before me have observed how Trump's moves all are ego driven, or self serving or serve Putin or Israel or gas companies, and I'm here to add to the mix a different conjecture.<p>Trump's moves all tend to increase inflation in a plausibly deniable way. Tarrifs, fed-fighting, wars, etc.<p>And that is a deeply unpopular but elite-viewed necessity for handling America's national debt.<p>Inflation allows the wealthy class to get away with extending government spending without admitting/pursuing austerity which was political suicide under Carter.<p>The wealthy shelter in their land and stock portfolios which keep growing unlike cash and also benefit from said spending, while ordinary people pay the extra regressive tax that is inflation. The elite can then turn around and blame the little guy for supporting Trump and their hands are clean.</p>
]]></description><pubDate>Mon, 06 Apr 2026 13:00:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47660351</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=47660351</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47660351</guid></item><item><title><![CDATA[New comment by gregw2 in "What category theory teaches us about dataframes"]]></title><description><![CDATA[
<p>You articulate your case well, thank you!<p>I always warn people (particularly junior people) though that blindly dropping duplicates is a dangerous habit because it helps you and others in your organization ignore the causes of bad data quickly without getting them fixed at the source. Over time, that breeds a lot of complexity and inefficiency. And it can easily mask flaws in one's own logic or understanding of the data and its properties.</p>
]]></description><pubDate>Fri, 03 Apr 2026 14:01:57 +0000</pubDate><link>https://news.ycombinator.com/item?id=47626757</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=47626757</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47626757</guid></item><item><title><![CDATA[New comment by gregw2 in "Oracle slashes 30k jobs"]]></title><description><![CDATA[
<p>MS SQL Server was a cheaper, friendlier plugin replacement for Sybase in the early 2000s.<p>I built apps in an active-active bidirectional replication telecom Sybase environment and was deeply involved in migrating it to MS SQL server in the early 2000s. I remember a fair amount of paranoia and effort around the transition as our entire business and customers' phone calls depended on it (for "reasons") but in hindsight it went quite smoothly and there were no regrets afterwards.<p>The Microsoft went and added a nice BI stack to the whole thing which added a new dimension of value creation at a new low price point.</p>
]]></description><pubDate>Fri, 03 Apr 2026 13:18:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=47626371</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=47626371</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47626371</guid></item><item><title><![CDATA[New comment by gregw2 in "Jack Bogle would hate what Vanguard has become"]]></title><description><![CDATA[
<p>You aren't wrong that Vanguard seems more active friendly these days.<p>But Vanguard under Bogle always played both sides of the fence at least to some extent. They have always had that actively managed Windsor fund, right? And Wellington?<p>I think your article headline shows you have a fair bit more to learn about Bogle. Or at least you haven't made your case on that front. Bogle was at least as much about low cost and aligning interests of the investment client as he was about passive indexing, though he is known more for the latter.<p>Here's a writeup with a couple pointers to more on the topic from Bogle:
<a href="https://www.bogleheads.org/forum/viewtopic.php?t=388377" rel="nofollow">https://www.bogleheads.org/forum/viewtopic.php?t=388377</a></p>
]]></description><pubDate>Thu, 19 Mar 2026 13:13:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=47438841</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=47438841</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47438841</guid></item><item><title><![CDATA[New comment by gregw2 in "Jack Bogle would hate what Vanguard has become"]]></title><description><![CDATA[
<p>Rather than switch completely, consider putting your eggs in two baskets?</p>
]]></description><pubDate>Thu, 19 Mar 2026 13:09:29 +0000</pubDate><link>https://news.ycombinator.com/item?id=47438774</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=47438774</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47438774</guid></item><item><title><![CDATA[New comment by gregw2 in "Denmark was reportedly preparing for full-scale war with the US over Greenland"]]></title><description><![CDATA[
<p>Not the parent poster but, while I acknowledge your point on Canada and Europe entering the conflict (and I'd add that the highly motivated Dutch punch well above their weight in intelligence and economic spheres and this whole scenario of US invasion is a Putin dream), when you ask "why do you think it could win...", the 50k population of Greenland is smaller than Granada (100k) and three orders of magnitude smaller than Vietnam/Afghanistan/Iraq (~40m). So I find its insurgency potential hard to compare to those examples you give.</p>
]]></description><pubDate>Thu, 19 Mar 2026 12:55:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=47438584</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=47438584</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47438584</guid></item><item><title><![CDATA[New comment by gregw2 in "Rob Pike's 5 Rules of Programming"]]></title><description><![CDATA[
<p>Thanks for the pointer to this 2016 dialog!<p>One part of it has interesting new resonance in the era of agentic LLMs:<p><i>alankay on June 21, 2016 | root | parent | next [–]<p>This is why "the objects of the future" have to be ambassadors that can negotiate with other objects they've never seen.
Think about this as one of the consequences of massive scaling ...
</i><p>Nowdays rather than the methods associated with data objects, we are dealing with "context" and "prompts".</p>
]]></description><pubDate>Wed, 18 Mar 2026 13:22:30 +0000</pubDate><link>https://news.ycombinator.com/item?id=47425490</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=47425490</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47425490</guid></item><item><title><![CDATA[New comment by gregw2 in "Workers who love ‘synergizing paradigms’ might be bad at their jobs"]]></title><description><![CDATA[
<p>A bit of "hacker history"... at the dawn of the web 1993 was birthed the first app (that I know of) along these lines: "Buzzword Bingo".<p>It got mentioned in WSJ of all places as news of it spread.<p>For the history+app from its creator, see:<p><a href="https://lurkertech.com/buzzword-bingo/" rel="nofollow">https://lurkertech.com/buzzword-bingo/</a><p>(Wikipedia page:  <a href="https://en.wikipedia.org/wiki/Buzzword_bingo" rel="nofollow">https://en.wikipedia.org/wiki/Buzzword_bingo</a> )<p>I'm glad to see, 25-30 years later, the hackers/cynical-tech-workers who birthed it getting justified by actual social science research.</p>
]]></description><pubDate>Fri, 06 Mar 2026 18:00:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=47278616</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=47278616</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47278616</guid></item><item><title><![CDATA[New comment by gregw2 in "Cameras built to police Iranians became the regime's Achilles' heel"]]></title><description><![CDATA[
<p>It's never been clear to me how effective IAEA can be at keeping out state spies from their midst if the world's best intel agencies want "in".<p>Going back pre-Iraq-war, back when there were "inspections" and "sanctions" on Iraq, you can dig up "page 19" articles in NYTimes where -- if I recall correctly -- the US was caught putting spy equipment on the IAEA monitoring equipment in Iraq.  This is (according to Iraq) what in large part triggered Iraq to kick out US inspectors. Then the Iraq (2) war started because they wouldn't let in inspectors.<p>Iran's theory, glossed over at the time but also reported in the rare western press articles was that the US intentionally got caught.  (So that the Saddam would have explicit pressure to get the US kicked out, so that then they (US/Israel) could have a pretext to take out Iraq.)  I don't know if Iran had any actual evidence to that effect or it was a bit of a conspiracy theory; I never actually read Iranian news sources whcih might have had details (or might have revealed just empty posturing.)</p>
]]></description><pubDate>Fri, 06 Mar 2026 17:45:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=47278404</link><dc:creator>gregw2</dc:creator><comments>https://news.ycombinator.com/item?id=47278404</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47278404</guid></item></channel></rss>