0 Followers
0 Following
11 Posts

This account is a replica from Hacker News. Its author can't see your replies. If you find this service useful, please consider supporting us via our Patreon.
Officialhttps://
Support this servicehttps://www.patreon.com/birddotmakeup

> Turns out we weren't opposed to bad metrics! We were just opposed to being measured! Given the chance to pick our own, we jumped straight to the same nonsense.

This seems like a distinction without a difference, unless there actually are any good metrics (which also requires them to be objectively and reliably quantifiable). I think most developers don't really want to measure themselves, it's just that pro-AI people think measurement is necessary to put forward a convincing argument that they've improved anything.

> Q2 category in the Eisenhower Matrix

I thought I was in the target audience for this post, but now I'm entirely confused.

I can't help but notice that said other person's profile claims "out of here"; and before this thread, had not commented since October 2024 — in that case also to get in an extended political argument with you specifically. That's quite a grudge to hold.
I have reread it and I strongly disagree with that assessment.
Please speak plainly, and show your work. In your own words, who do you believe "this person" is, and why is that significant? Why do you suppose he wrote "this article", "now", and what is your reason for believing thus? What other articles by the same author are you aware of, and how does that square with the bias you are trying to allege?
I'm happy to hear your ideas about this, including off-site (I could email you if you like) if you don't want to go further off topic here.

Yes, I've been flagging a fair amount of them too.

Although generally I think the un-nuanced AI hype/doom articles are not nearly as damaging as the flood of one-shot LLM projects being presented under "Show HN" with apparently none of the framing text (HN post, project README, responses to feedback) being human-written.

How does stealing someone social media accounts not slot into "organized identity theft"?

... actually: how is XSS not a form of RCE? The script is code; it's executed on the victim's machine; it arrives remotely from the untrusted, attacker-controlled source.

And with the legitimate first-party's permissions and access, at that. It has access to things within the browser's sandbox that it probably really shouldn't. Imagine if a bank had used Mintlify or something similar to implement a customer service portal, for example.

I've been wondering, why isn't /active in the top nav bar?

> They know all the flags and are generally better at interpreting tool output than I am.

In the toy example, you explicitly restrict the agent to supply just a `host`, and hard-code the rest of the command. Is the idea that you'd instead give a `description` something like "invoke the UNIX `ping` command", and a parameter described as constituting all the arguments to `ping`?