baystep
|
1 year ago
|
on: Show HN: Voice Cloning and Multilingual TTS in One Click (Windows)
Bit weirded out by the idea that it installs via a batch file that the Readme dedicates a chapter on how Windows will flag it as a Trojan. As well as the fact that it mentions it is a 30 minute demo, but only does so buried in the Readme. Just feels suspicious to me.
baystep
|
2 years ago
|
on: Show HN: Mockingbird – VSCode Extension for Fake Data
I chose to make this as an extension so I could quickly inject data for unit tests and UI previews. I've thought to pulling out the code and making it a library as well, but Faker and chance already exist in the JS ecosystem.
baystep
|
5 years ago
|
on: A Clean Start for the Web
I wonder if something like Nunjucks but with CommonMark could work great for the document web.
baystep
|
7 years ago
|
on: Turkey's 'Mathematics Village': Changing education one equation at a time
As an American living in Turkey to produce software systems for the Education industry. It is in my honest opinion this is mostly all false. Evolution was not removed (if I'm correct it was shifted in which years it was taught, pushing it later in the primary education years). Jihadism is not on the agenda at all. But some south-eastern/eastern provinces do place Islam studies on the bill (in historical manners). It's much like how the US has a "Bible belt" in the south where creationism is taught along evolution. Turkey has a "Quran belt" in it's south-eastern border that also places more emphasis in religious teachings along side it's sciences. In the western portions this is essentially non-existent besides the historical context (Ottoman was Islamic after all)
baystep
|
8 years ago
|
on: Ask HN: How do you choose programming language for codebase?
Reliability of the language and tool sets is a big one. Availability of coders in the language is another, there's an over abundance of C++/Java coders looking for work, but finding a team of Rust developers is a bit trickier.
Also in general, I would start with a list of languages that are built-for, or can easily support, what your product is. For instance, I love Go but wouldn't use it for a GUI application.
And in honesty, managed languages are a bit better in my opinion for projects that will require many devs to work on it. As much as this statement might catch flack, C++ is wonderful and powerful and I trust my ability to use it; but do I trust the workforce to? It's very easy for a dev to write a patch fix that also manages to introduce a memory leak or null pointer and crash the whole thing.
baystep
|
8 years ago
|
on: Ask HN: Which stack do you use at your startup?
Gorilla Mux isn't bad either and is pretty tried and tested.
Also Go is one of the few (if not only?) languages with HTTP/2 built in to the standard library. Not to mention the gRPC over TLS that comes stock as well.
baystep
|
8 years ago
|
on: Ask HN: Which stack do you use at your startup?
I don't use an ORM currently, just plain 'ol SQL queries. And in actuality I prefer it SOO much more. Like originally I was using Hibernate with the Java JPA, but I found it just got in the way a lot and the dependencies where finicky. Where as in Go and raw SQL I know EXACTLY what it's asking for and can pre-compose my queries externally. Any changes to the tables I have to make, as in renaming or adding columns, is just a quick change to the SQL query itself. And if needed, 1 line added to the Struct definition.
Also I'm more of a custom approach person which makes me very productive with Go. It's allows me to have laser focus on my needs instead of hooking up and reading docs and every little integration feature the framework has. And in result, I don't have dependency on a monolithic framework which could very well break everything in it's next release.
And finally, Go will build to binary for any-platform. So I can pre-build for the ARM processors, or Linux, or whatever else on Windows and just ship the binaries for server updates instead of managing make scripts and dependency resolution and blah blah blah. And if I wanted to I could sell the API "program" and sleep a little better about the IP contained in it (yes I know de-compilers exist). I could do this with C++ as well, but that's a whole 'nother ball game when it comes to tracking down memory leaks and segfaults.
baystep
|
8 years ago
|
on: Ask HN: Which stack do you use at your startup?
Backend:
Java (phasing out), Go (phasing in), Postgres, Redis, all on Ubuntu EC2's.
Frontend:
JS (TypeScript/ES6), React, ReactNative, SASS, all Webpack'ed (except RN).
I think it's a fairly light stack but am happy with it. I would use this as the starting point for pretty much every project.
baystep
|
8 years ago
|
on: Let’s talk about usernames
What about the "I've lost that email account, can I switch it to another to recover my account?" case. Or the "I'm the legal guardian of this person and need the account control switched to my personal email", or in the business world "this employee doesn't work here anymore and as administrator I would like the account transferred to me" cases. Locking customer support systems down tightly has it's own pros/cons.
baystep
|
8 years ago
|
on: OpenSC2K – An Open Source Remake of SimCity 2000
I was actually making an open source sim city clone in JS myself a while ago. Didn't get this far at all, but I was mostly in it to test if I could get async updating from the simulation portion. Essentially doing threading in JS. Which I was somewhat successful in using Web Workers and shared buffer arrays, would be interested in helping with this project. Unfortunately in my research I didn't find any concrete documentation on how the simulation algorithm actually works, so I doubt this would end up a direct clone on SC2K.
baystep
|
8 years ago
|
on: Does 4K display result in productivity loss?
I just upgraded myself to a 4K 28" monitor. Mine has 1ms response time. I noticed a slight loss of productivity in the initial stage, but really just because I was getting used to it. Now I'd say it's increasing productivity since I don't have to Alt+Tab all the time anymore. I can fit 4 source files comfortably now. So, in regards to your drop in productivity, I'd say give it time.
baystep
|
8 years ago
|
on: Streams: a new general purpose data structure in Redis
baystep
|
8 years ago
|
on: Streams: a new general purpose data structure in Redis
This may actually solve an issue I was about to tackle, which is high-speed notification delivery. Currently I was going to do a nasty wrestle of PUB/SUB with Lists and blocking keys to try and get a cluster of message processing servers to digest notifications when they get added to the "queue". My purpose in this is notifications, as in actual push notifications for mobile/web/etc. This seems like it fits perfectly with what I had planned. Especially since this ensures message delivery instead of fire-and-forget as you mentioned. As a question though... is the XACK commands working in your current branch? Since that is key to my usage of ensuring message consumption.
baystep
|
8 years ago
|
on: Ask HN: What are the biggest missing features on the internet?
Right, which I figured if there was any viable way to get sender-identification working then that would be solved at the initial point. Like HTTPS requiring a Certificate Authority to vouch for you. With out the certificate, the receiving server could effectively reject it. Should stop all those pesky SMTP senders claiming to be X website as well. You know, since for some brilliant reason the "from" field is just taken from input, you can type anything you want in there.
baystep
|
8 years ago
|
on: Ask HN: What are the biggest missing features on the internet?
Email is one actually. Notoriously hard to work with from a systems point of view, and based on a protocol that's been minimally updated since it's conception in the early 90's. It's essentially been 25 years of the same old crappy standards that have been duck-taped to hell to try and fix security vulnerabilities. I always meant to re-write a version of email that works better with servers and API's. Such as JSON message formats, async key handling natively (no need for PGP anymore), sender identification and authoring, etc. But it's a massive undertaking, and I can't do it alone with my work schedule.
baystep
|
8 years ago
|
on: ‘Anonymous’ Chat App Hijacks Contact Data
Right, but I'm thinking the server still needs to be able to say "This person who ever they are is definitely the number you have". Like, I wouldn't check my password hashes with only the first 10 bytes, I guess that's why I'm still stuck on the truncated idea.
baystep
|
8 years ago
|
on: ‘Anonymous’ Chat App Hijacks Contact Data
But that sounds like un-necessary round trips. I feel like the point in an API or backend service doing this, is because it knows better and has more computing power. I'd rather have my service take an incoming list and return with whether it's a member or not. In fact returning full hashes seems even worse, since now the server has not only replied with the correct match, but potentially more strangers. You could milk an API of it's users much quicker that way.
baystep
|
8 years ago
|
on: What would you do if you get a basic income of $2500 every month for 1 year
If it's only one year I would keep working. But spend much more time on my own projects to start a business with. If it's indefinite, like basic universal income, I would release more open source projects since money would be less of an issue.
baystep
|
8 years ago
|
on: ‘Anonymous’ Chat App Hijacks Contact Data
Yes, but if (it seems more like when) a collision happens in a situation like this, aren't we essentially saying someone is connected with someone they don't even know? I feel like detecting the collision takes more computation then just sending the whole hash right? I mean in consideration of the scale that Signal/WhatsApp/etc are with millions of phone numbers
baystep
|
8 years ago
|
on: ‘Anonymous’ Chat App Hijacks Contact Data
As someone who is going to implement "find-my-friends" in this way, and wants to do it conscientiously, may I ask why only the first 10 bytes of the SHA1? Isn't that just an incomplete hash that could collide with other valid numbers?