Hacker Newsnew | past | comments | ask | show | jobs | submit | quenstionsasked's commentslogin

Where do you work?


I don't work there anymore.


Anyone knows what is meant by:

"(Again, hate to belabor a point, but Wealthfront charges 25 bps all-in (on top of the underlying ETFs) and every customer knows it"?


Wealthfront charges 25 basis points, or 0.25%, of the value of your portfolio annually for their robo-advisor service. You also pay the fees for any ETFs or mutual funds held in your account, just as you would if you held them at a discount brokerage instead of a robo-advisor.


Where were you going that you didn't have GPS coverage for 30 miles?

GPS coverage works even without Network/WiFi coverage. I find it very, very unlikely inertial tracking using iPhone inertial sensors would be accurate up to 30 miles.

Could you provide a source please on the fact that iPhones use inertial navigation for predicting location (either public or private apis)


Sauce: https://www.idownloadblog.com/2014/03/05/iphone-5s-m7-tracki...

I was driving through rural Kentucky shortly after the 2017 eclipse.


It doesn't really matter how rural the area is - GPS works pretty well outside of the polar circles. AGPS does use data connection to accelerate first fix time, but will be accurate after that without data.


This link just says that the M7 is still active after main phone has shut down. Nothing about inertial navigation.


This doesn't hold. The timing of the VPN code widget is not a random variable, but rather fixed. Thus, sampling a random inspection time of the widget has equal probability of being in the 0-30s bucket as it does in the 30-60s bucket.

For a bus, the intuitive explanation is that if you were viewing a timeline, the biggest parts of the timeline would be the "late" buses, and thus you're more likely to "inspect" (arrive at the bus stop) during one of these longer stretches.


Cool. KGE methods are becoming more and more useful as companies are trying to find ways to interface some internal knowledge graph with machine learning techniques. I expect this space to grow substantially!


Indeed. Here in Accenture Labs we use it in quite a lot of diverse applicative scenarios. Besides, KG embeddings can be used for other tasks beyond link prediction (e.g. link-based clustering).


MCAS issues nose-down, speed increases and nose pitches down. Nose never pitches back up. Plane crashes.

Sure, maybe some complex combination of maneuvers could have helped them out of this but there's really everything pointing the blame at this one system. Pilots did what the boeing manual suggested (even included at the end of this report).


Haven't given it a lot of thought, but isn't his vector field idea somewhat similar of an approach to neural ordinary differential equations?


Reported an iphone lock screen bug and received nothing. Thanks apple.


If it's a serious bug, talk to a zero day broker.


I thought Zerodium (as an example) was only interested in RCE type vulnerabilities, although I could see others being of value as well.


Zerodium might generally traffic in RCE because they're typically of the highest value. They would likely judge that to be of comparable value to some RCEs, if for no other reason because of the number of devices affected. Zerodium also isn't the only one out there.


Where did you report it, was it acknowledged, and was it ultimately fixed?

Having ran a large bug bounty program before, I can tell you a few things could have happened here...

* Issue was mis-triaged, or deemed to be very low impact - Maybe it depended on a very specific set of circumstances that was not expected to commonly occur. Usually these get silently routed to QA to investigate.

* Issue was completely overlooked - Unlikely, but security@ is a ticket queue too. Sometimes a misclick happens, or a spam filter picks it up. For every valid report, you can get 100-1000 unrelated messages.

* Issue was already known - Not good to silently ignore, but if it was already reported and in the pipeline, it probably got closed as a duplicate. Companies don't like to discuss vulnerabilities that are being actively fixed.


It was a long time ago (2013). Issue was fixed in the next iOS milestone release, but they gave no recognition at the time and no follow up besides a "thank you for reporting this" email.


Not PR worthy. They took a look at your social media and determined that you were too outspoken.


Next time you need to scream louder.

Lessons learned.


Haven't taken the time to read through this properly so forgive the question - but is this any different from the above problem?

And if so - if someone solves this programming task on leetcode have they not then also solved the permutation problem from OP?


It is different because a safe combination may contain the same digit more than once, so the intended solution is a de Bruijn sequence: https://en.wikipedia.org/wiki/De_Bruijn_sequence


I remember being in a Spotify hackathon with Johan many years ago. Fantastic problem solver. Happy to see his work here.

You wrote on my blog post on the hackathon at the time (2011) that I had "some promise for algorithmic problem solving". Really inspired me to dive into CS.


I trying to find a the blog link.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: