<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: mechanicalpulse</title><link>https://news.ycombinator.com/user?id=mechanicalpulse</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Sat, 11 Apr 2026 11:06:01 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=mechanicalpulse" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by mechanicalpulse in "Antimatter has been transported for the first time"]]></title><description><![CDATA[
<p>None of it matters if the controls aren’t responding.  You’ll know, too, because they make that sad static beepy noise like some sort of Tactile Control Panel ACKnowledgement failure.</p>
]]></description><pubDate>Thu, 26 Mar 2026 02:15:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=47525941</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=47525941</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47525941</guid></item><item><title><![CDATA[New comment by mechanicalpulse in "New imagery suggests U.S. responsible for Iran school strike"]]></title><description><![CDATA[
<p>I can’t argue with you there.  The Pentagon’s silence is deafening; I only want to caution myself as much as anyone against jumping to conclusions.  It may be AI, it may be bad intelligence, it may be Russian counterintelligence, it may be an IRGC false flag, it may be a little bit of all of the above.</p>
]]></description><pubDate>Fri, 06 Mar 2026 20:52:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=47280904</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=47280904</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47280904</guid></item><item><title><![CDATA[New comment by mechanicalpulse in "Good software knows when to stop"]]></title><description><![CDATA[
<p>> I think Blizzard could have also made the player base just as happy by [...] understanding the underlying problem.<p>I'm reminded of the 1995 interview in which Steve Jobs elucidated the fundamental reasons that Xerox missed its golden opportunity to own the computer industry and why former PepsiCo CEO John Sculley later ultimately failed at the helm of Apple.<p>It's fundamentally the same issue with a number of gaming conglomerates nowadays.  These companies are more interested in increasing the sales of sugar water than making great games.  Perhaps, then, it's not surprising in the least to learn that former Activision Blizzard boss Bobby Kotick was on the board of Coca-Cola for a decade.</p>
]]></description><pubDate>Fri, 06 Mar 2026 01:43:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=47269758</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=47269758</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47269758</guid></item><item><title><![CDATA[New comment by mechanicalpulse in "AirSnitch: Demystifying and breaking client isolation in Wi-Fi networks [pdf]"]]></title><description><![CDATA[
<p>Modern 802.11 implementations are wildly complex.  The output from `iw list` on a Linux system with a modern WiFi radio, a trip through the example configuration that ships with `hostapd`, or perusing the lengthy list of standards, amendments, and extensions on Wikipedia will reveal it, too.<p>Given the complexity of modern 802.11 protocols and the prevalence of WiFi radios in devices of all kinds, I find it well within the realm of possibilities for anyone to observe 802.11 traffic that is sufficiently ambiguous to create the confidence necessary to be a mentally workable substitute for evidence of a targeted attack.  There may be a lot of evidence that could be found to refute that very same premise, though, if one knows what to look for.</p>
]]></description><pubDate>Wed, 04 Mar 2026 20:13:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=47253142</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=47253142</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47253142</guid></item><item><title><![CDATA[New comment by mechanicalpulse in "“Microslop” filtered in the official Microsoft Copilot Discord server"]]></title><description><![CDATA[
<p>“Life imitates art far more than art imitates life.” — Oscar Wilde, <i>The Decay of Lying</i> (1889)</p>
]]></description><pubDate>Tue, 03 Mar 2026 11:55:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47231120</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=47231120</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47231120</guid></item><item><title><![CDATA[New comment by mechanicalpulse in "What does " 2>&1 " mean?"]]></title><description><![CDATA[
<p>I do and it does.<p><pre><code>    $ ls -al /dev/std*
    lr-xr-xr-x  1 root  wheel  0 Feb 24 15:08 /dev/stderr -> fd/2
    lr-xr-xr-x  1 root  wheel  0 Feb 24 15:08 /dev/stdin -> fd/0
    lr-xr-xr-x  1 root  wheel  0 Feb 24 15:08 /dev/stdout -> fd/1
    $ ls -n /dev/fd/[012]
    crw--w----  1 501  4  0x10000000 Feb 27 13:38 /dev/fd/0
    crw--w----  1 501  4  0x10000000 Feb 27 13:38 /dev/fd/1
    crw--w----  1 501  4  0x10000000 Feb 27 13:38 /dev/fd/2
    $ uname -v
    Darwin Kernel Version 24.6.0: Mon Jan 19 22:00:55 PST 2026; root:xnu-11417.140.69.708.3~1/RELEASE_ARM64_T6000
    $ sw_vers
    ProductName:  macOS
    ProductVersion:  15.7.4
    BuildVersion:  24G517
</code></pre>
Lest you think it's some bashism that's wrapping ls, they exist regardless of shell:<p><pre><code>    $ zsh -c 'ls -al /dev/std*'
    lr-xr-xr-x  1 root  wheel  0 Feb 24 15:08 /dev/stderr -> fd/2
    lr-xr-xr-x  1 root  wheel  0 Feb 24 15:08 /dev/stdin -> fd/0
    lr-xr-xr-x  1 root  wheel  0 Feb 24 15:08 /dev/stdout -> fd/1
    $ csh -c 'ls -al /dev/std*'
    lr-xr-xr-x  1 root  wheel  0 Feb 24 15:08 /dev/stderr -> fd/2
    lr-xr-xr-x  1 root  wheel  0 Feb 24 15:08 /dev/stdin -> fd/0
    lr-xr-xr-x  1 root  wheel  0 Feb 24 15:08 /dev/stdout -> fd/1
    $ tcsh -c 'ls -al /dev/std*'
    lr-xr-xr-x  1 root  wheel  0 Feb 24 15:08 /dev/stderr -> fd/2
    lr-xr-xr-x  1 root  wheel  0 Feb 24 15:08 /dev/stdin -> fd/0
    lr-xr-xr-x  1 root  wheel  0 Feb 24 15:08 /dev/stdout -> fd/1
    $ ksh -c 'ls -al /dev/std*'
    lr-xr-xr-x  1 root  wheel  0 Feb 24 15:08 /dev/stderr -> fd/2
    lr-xr-xr-x  1 root  wheel  0 Feb 24 15:08 /dev/stdin -> fd/0
    lr-xr-xr-x  1 root  wheel  0 Feb 24 15:08 /dev/stdout -> fd/1
</code></pre>
I tried the install example that you provided and it worked on macOS as well as Linux.</p>
]]></description><pubDate>Fri, 27 Feb 2026 19:37:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=47184574</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=47184574</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47184574</guid></item><item><title><![CDATA[New comment by mechanicalpulse in "AirSnitch: Demystifying and breaking client isolation in Wi-Fi networks [pdf]"]]></title><description><![CDATA[
<p>It's possible that he's taking "hope for the best, prepare for the worst" to its logical if unhealthy extreme by interpreting every ambiguous 802.11 frame as one with ill intent.  However, just because he's paranoid doesn't mean there aren't misaligned people, devices, and applications out there probing networks.<p>It's probably a good idea for anyone to check themselves every now and then by playing Angel's Advocate just as much as they might play Devil's Advocate, but I don't think rejecting his premises out of hand with a drive-by diagnosis is all that helpful.</p>
]]></description><pubDate>Fri, 27 Feb 2026 18:38:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=47183914</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=47183914</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47183914</guid></item><item><title><![CDATA[New comment by mechanicalpulse in "Carrier Landing in Top Gun for the NES"]]></title><description><![CDATA[
<p>Oh my...  This is how the code could look indeed.  Which LLM did you use to generate this?</p>
]]></description><pubDate>Mon, 15 Dec 2025 18:44:19 +0000</pubDate><link>https://news.ycombinator.com/item?id=46278562</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=46278562</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46278562</guid></item><item><title><![CDATA[New comment by mechanicalpulse in "Influential study on glyphosate safety retracted 25 years after publication"]]></title><description><![CDATA[
<p>Yes!  I also used glyphosate to kill things growing in and around my sidewalk, driveway, steps, and curb.  I've also used a propane torch for the same purposes, but it requires more effort and cannot be applied quite so selectively.  It works, though, and is a good choice for anyone who would rather use a petroleum product than an herbicide.<p>I looked up the product you mentioned and you're right -- it does look like deodorant!  It's a gel that contains glyphosate and isopropylamine salt.  Neat!</p>
]]></description><pubDate>Fri, 05 Dec 2025 23:31:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=46168824</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=46168824</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46168824</guid></item><item><title><![CDATA[New comment by mechanicalpulse in "Influential study on glyphosate safety retracted 25 years after publication"]]></title><description><![CDATA[
<p>> As I'm sure you're aware, glyphosate is usually only appropriate as a weed killer on your property if you're looking to kill all vegetation in/around where you spray it.<p>> It's a non-selective herbicide in this context, it kills everything.<p>It is a non-selective herbicide, but it's not a systemic herbicide.  It functions by interfering with photosynthesis, but since it is minimally absorbed via root systems, it must be applied directly to the foilage.  You can spray it on the ground around a plant and that plant will happily ignore it.  This is why the instructions are explicit about applying directly to the foilage during sunny days when the wind is light.<p>As a homeowner, I loved glyphosate.  It was cheap, simple, effective, and could be applied in a selective manner.  It's not the best choice for getting rid of broadleaf weeds in a lawn, but I used it all the time in my gardens to kill weeds and keep the bermudagrasses out.</p>
]]></description><pubDate>Fri, 05 Dec 2025 23:06:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=46168587</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=46168587</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46168587</guid></item><item><title><![CDATA[New comment by mechanicalpulse in "NoLongerEvil-Thermostat – Nest Generation 1 and 2 Firmware"]]></title><description><![CDATA[
<p>Nest is hardly the only thermostat out there using solid-state relays.  Have you considered the possibility that they did take it into account and they deliberately chose to use SSRs instead of electromechanical relays?  Have you considered the possibility that they were concerned about the impact that mechanical relays may have on the RF, especially if "there is higher current than you think running through those terminals"?  Have you considered the possibility that they were worried about making the first one fatter than it already was?<p>In my heat pump, none of the thermostat wires directly control the contactors.  They all run into a logic board that applies logic like time delays, temperature-controlled defrost cycling, and active protection lockouts for the compressor.  I mean, there's a seven-segment LCD on the logic board for system troubleshooting.  The air handler has a variable speed blower as well.<p>I understand that HVAC equipment varies wildly, but if you try to solve every possible problem or scenario and target every possible customer, you'll never make it to market.<p>I also understand that I am the target demographic.</p>
]]></description><pubDate>Wed, 05 Nov 2025 17:59:12 +0000</pubDate><link>https://news.ycombinator.com/item?id=45825839</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=45825839</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45825839</guid></item><item><title><![CDATA[New comment by mechanicalpulse in "NoLongerEvil-Thermostat – Nest Generation 1 and 2 Firmware"]]></title><description><![CDATA[
<p>Well that's certainly a take.  Solid state relays using optoisolated MOSFETs have been around for fifty years.  Mechanical relays are overkill for signal switching as in HVAC thermostats, IMHO, but you do you.<p>Anecdotally, I have a first generation Nest and haven't had a problem.  Maybe some of the earlier hardware had fewer protection against misuse (e.g., with non-24VAC systems or otherwise incorrect installation), but that's generally the case with most new things.</p>
]]></description><pubDate>Wed, 05 Nov 2025 05:33:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=45819558</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=45819558</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45819558</guid></item><item><title><![CDATA[New comment by mechanicalpulse in "987654321 / 123456789"]]></title><description><![CDATA[
<p>I also went about looking at the difference rather than the order.  In the hexadecimal case, the difference is 15 (0xEF vs 0x12).  I thought, then, that for any base B with ascending digits A and descending digits D, (D-(B-1))/A=B-2.<p>For binary, it looks like (1-(b-1))/1=b-10 or (1-(2-1))/1=2-2=0 in decimal.<p>For trinary, it looks like (21-(b-1))/12=b-2 or (7-(3-1))/5=5/5=1 in decimal.<p>For quaternary, it looks like (321-(b-1))/123=b-2 or (57-(4-1))/27=54/27=2 in decimal.<p>Essentially and perhaps unsurprisingly, the size of the slices in the number pie get smaller the bigger the pie gets.  In binary, the slice is the pie, which is why the division comes out to zero there.</p>
]]></description><pubDate>Fri, 31 Oct 2025 22:42:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=45777514</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=45777514</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45777514</guid></item><item><title><![CDATA[New comment by mechanicalpulse in "What we talk about when we talk about sideloading"]]></title><description><![CDATA[
<p>> Did you live at a time where Internet was not a thing?<p>You must be relatively young.  Software existed before the widespread adoption of the Internet.<p>> I remember very clearly buying software on physical media and never, ever "receiving" a single patch.<p>You had to take action to receive them.  They weren’t automatic updates like they are today.<p>> I don't even know how that would have looked... "buy this floppy disk, it's a patch for a bug in the other floppy disk you bought recently"?<p>That’s exactly what it looked like.  That’s still the process today for some systems —- avionics updates for Boeing 747s are provided on 3.5” floppies.</p>
]]></description><pubDate>Wed, 29 Oct 2025 12:08:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=45745730</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=45745730</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45745730</guid></item><item><title><![CDATA[New comment by mechanicalpulse in "First convex polyhedron found that can't pass through itself"]]></title><description><![CDATA[
<p>At infinity, the shape becomes a sphere and all orientations of it are identical.  It is no longer a convex polyhedron and, thus, not subject to consideration.</p>
]]></description><pubDate>Sat, 25 Oct 2025 07:40:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=45702032</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=45702032</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45702032</guid></item><item><title><![CDATA[New comment by mechanicalpulse in "I ditched Docker for Podman"]]></title><description><![CDATA[
<p>Podman is daemonless while docker is a client/server pair.  Podman also shipped with support for rootless containers, though Docker now has that capability as well.<p>The podman CLI is nearly a drop-in replacement for docker such that `alias docker=podman` works for many of the most common use cases.<p>If you don't care about the security implications of running containers as root via a client/server protocol, then by all means keep using Docker.  I've switched to podman and I'm happy with my decision, but to each their own.</p>
]]></description><pubDate>Sat, 06 Sep 2025 15:15:20 +0000</pubDate><link>https://news.ycombinator.com/item?id=45150017</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=45150017</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45150017</guid></item><item><title><![CDATA[New comment by mechanicalpulse in "API Blueprint"]]></title><description><![CDATA[
<p>I've experienced the mind-numbing frustration of API specs that don't match the implementation, which is why I have embraced the concept of requiring the spec to be part of the implementation.  For example, the express-openapi package for Node.js expects the specification to be supplied as a property of the very function implementing the operation.  This permits middleware to access the OpenAPI specification directly and utilize it for coercion and validation of requests and responses, so you get several birds with one stone.<p>I've also experienced enterprise OpenAPI deployments where the API specifications were owned by a separate enterprise API architecture team and were fed into some central consumer-facing documentation portal along with whatever unbeknownst infrastructure sat between the application and the Internet.  Developers had access to the spec repository, but API architects reviewed PRs and made any recommendations for normalizing interfaces or using existing or canonical types.<p>Either way works, IMNSHO.<p>Edit: I should also say that I have likely misrepresented the deficiencies I experienced with API Blueprint.  Take it with a grain of salt; I literally do not remember because it's been ... checks code ... nearly five years since I touched that project.  The issue I ran into may have been as simple a problem as providing two example POST requests with slightly different payloads or two example HTTP 200 responses with slightly different response bodies.  This is something that API documentation might often include to show multiple common use cases.  It may have not have even been part of the actual spec or it may have been only a limitation of the specific UI renderer I was using.</p>
]]></description><pubDate>Sat, 06 Sep 2025 02:59:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=45146245</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=45146245</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45146245</guid></item><item><title><![CDATA[New comment by mechanicalpulse in "API Blueprint"]]></title><description><![CDATA[
<p>Mostly the fact that it's based on Markdown, which makes the raw specification far easier to read with a text editor than OpenAPI/Swagger.  Markdown also permits styling in the various descriptive portions, which makes for superior documentation.<p>I ran into some deficiencies, though, at least with the parser I was using with Node/TS -- IIRC (and it's been a few years), I wasn't able to specify a wide variety of disparate responses (e.g., an HTTP 200 with an application/json Content-Type header, an HTTP 200 with a text/plain Content-Type header, and an HTTP 400 response with an X-Error-Code header).  Since API Blueprint was introduced, the tooling around OpenAPI has improved dramatically and it's become a de facto standard, so I'd probably avoid API Blueprint for anything serious.<p>It's unfortunate, though, because I really liked the idea.</p>
]]></description><pubDate>Fri, 05 Sep 2025 23:08:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=45144772</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=45144772</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45144772</guid></item><item><title><![CDATA[New comment by mechanicalpulse in "Some users have noticed settings that let Meta analyze and retain phone photos"]]></title><description><![CDATA[
<p>Others have already mentioned that this is possible with iOS.  iOS 14 introduced a bunch of privacy improvements including the PHPickerViewController, but some apps may not yet be using it.  [0]<p>I will say that in the event that an app is not using PHPickerViewController, sometimes it's still possible to emulate it by exiting the app, going into the photos app, selecting the photo, selecting the little "send" arrow in the bottom left, and then picking the app to send it to.  I do this all the time with the Slack app.  Copy-and-paste may be another route.  Sure, it's a silly workaround for a feature that should have been there from day one, but c'est la vie.<p>[0] <a href="https://developer.apple.com/documentation/photokit/delivering-an-enhanced-privacy-experience-in-your-photos-app" rel="nofollow">https://developer.apple.com/documentation/photokit/deliverin...</a></p>
]]></description><pubDate>Fri, 29 Aug 2025 21:19:45 +0000</pubDate><link>https://news.ycombinator.com/item?id=45069518</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=45069518</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45069518</guid></item><item><title><![CDATA[New comment by mechanicalpulse in "Async Queue – One of my favorite programming interview questions"]]></title><description><![CDATA[
<p>Yup.  I've even found myself in situations where the owner of the third-party service is another team or department within the organization I'm working for or partnering with.  Oftentimes, the product/project people on our team tries to make it a business issue with the partner only to find that they don't have the leverage to effect a fix, they get told that the service doesn't offer the SLA you require, or you hear back from the team some hilarious quote like six weeks of development that can't begin until the next quarter.  Meanwhile, your feature or product has to launch by the end of the current sprint or quarter.<p>What happens when the unstoppable force meets the immovable object?  The unstoppable force works over the weekend to implement a store-and-forward solution.</p>
]]></description><pubDate>Mon, 07 Jul 2025 16:50:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=44492199</link><dc:creator>mechanicalpulse</dc:creator><comments>https://news.ycombinator.com/item?id=44492199</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=44492199</guid></item></channel></rss>