Hacker Newsnew | past | comments | ask | show | jobs | submit | wsh's commentslogin

You forgot SMPTE 170M, which is probably the definitive standard at this point:

https://pub.smpte.org/doc/st170/20041130-pub/st0170-2004_sta...


RJ45S and RJ45M are ordering codes for so-called “registered jack” configurations for terminal connections to the U.S. telephone network. These codes were defined until 2000 in the FCC Rules (47 CFR § 68.502(e)) and later in the TIA/EIA-IS-968 standard, and they refer to single and multiple arrangements of two wires and a programming resistor on a miniature eight-position keyed jack.

https://www.govinfo.gov/content/pkg/CFR-2000-title47-vol3/pd...

Unfortunately, the “RJ45” part of these codes has become a metonym for the unkeyed version of the miniature eight-position jack and plug, now widely used for Ethernet and other purposes, but strictly speaking, RJ45 refers to a different connector with totally incompatible wiring.


Symbol Sourcebook would’ve been my first guess, too, but I just glanced through my copy (7th printing, 1977) and didn’t see the ⌘ symbol. The closest thing in the Graphic Form Section is a symbol for “Atomic d orbital,” but it’s clearly not the same one that inspired Susan Kare.


Around 15:30 in this video she talks about it, and there’s a slide showing other symbols that may or may not be from the same book.

https://vimeo.com/151277875


Interesting. The left side of the slide at 15:43 in the video is definitely from page 27 of Symbol Sourcebook, but the detail of the ⌘ symbol doesn’t seem to be: not only could I not find the symbol, but also its caption (“FEATURE”) is set in Helvetica rather than Univers as used in the book.


I have a suspicion that she may no longer possess or even remember the book in question. Heaven knows I wouldn’t were I her, but my memory is atrocious.


The treaty returning sovereignty over the Chagos Archipelago to Mauritius, disestablishing the British Indian Ocean Territory, seems to be on track for ratification:

https://commonslibrary.parliament.uk/research-briefings/cbp-...

The consequences for the .IO ccTLD are still unclear and ultimately will depend on how the United Nations, the ISO 3166 Maintenance Agency, and ICANN respond. I’m not aware of anything more definitive than ICANN’s blog posting from November 2024, which emphasizes that “much of the discussion about .io is simply speculation” but also acknowledges the possibility that “a five-year time window will commence during which time usage of the domain will need to be phased out.”

https://www.icann.org/en/blogs/details/the-chagos-archipelag...

I wouldn’t use a .IO domain name for anything important.


My two biggest clients are exclusively running on .io domains and have hundreds of subdomains each - I really hope they don't end up doing something dumb here, I know two companies that don't want to deal with this.


I’ve always thought of Kerberos as a centralized authentication system, to establish users’ identities.

Authorization, in the sense of deciding to allow or deny a requested action by a known user on a specific object, remains distributed, even with Kerberos. For example, a Windows file server, having received a Kerberos ticket showing a user’s identity and security group memberships, consults its own access control lists to determine what operations to allow on files and directories.

The article here argues that those authorization decisions should also be centralized, presumably using the sponsor’s “cloud-native authorization platform,” instead of being made within each service or application.


Kerberos does support authorization. Windows supports this at the Windows group level.[1] Finer grained control requires something else.

Outsourcing "authorization" to an external service comes across as a really bad idea with huge "backdoor" potential.

[1] https://security.stackexchange.com/questions/36072/what-is-i...


The manufacturer’s product page, with a link to the MSDS:

https://www.teraokatape.co.jp/english/products/class/class00...

Data sheet describing the “rat prevention effect”:

https://www.teraokatape.co.jp/english/products/Rat_Preventio...


Those links are dead.

Correct link to "Rodent-proof vinyl adhesive tape No. 347":

https://www.teraokatape.co.jp/english/products/rodent-proof-...


Both links worked earlier, but they don’t work for me now, either.

Anyway, the data sheet explains how the manufacturer tested the tape’s effectiveness with rats. The Wayback Machine has a copy:

https://web.archive.org/web/20201017204509/https://www.terao...


DFSMS: Data Facility Storage Management Subsystem

DFSMSdfp: Data Facility Product

DFSMSdss: Data Set Services

DFSMSrmm: Removable Media Manager

DFSMShsm: Hierarchical Storage Manager

DFSMStvs: Transactional VSAM Services

DFSMSopt: Optimizer

See ABCs of z/OS System Programming Volume 3 (SG24-6983), https://www.redbooks.ibm.com/redbooks/pdfs/sg246983.pdf.


I agree with the advice to ask a lawyer, but it’s sensible to be concerned with license agreements even in early-stage ventures that couldn’t enforce them.

By establishing the company as licensor, an agreement might help the founders avoid personal liability if a customer sues. Later on, it may be desirable to show potential acquirers that, from the company’s inception, its customer contracts included terms to confirm ownership of intellectual property, limit liability, satisfy privacy laws, and so on.


If someone sues, you’ll need a lawyer.

A fictitious person (e.g. an LLC or corporation) is how founders avoid personal liability. Your lawyer can explain this. They will also explain that anyone can sue anyone (at least in the US).

If you can’t afford a lawyer, don’t do business that requires one.


Yes. “Freight collect” means the recipient pays the carrier for transportation; it implies nothing about payment for the goods.

“COD” (collect on delivery) means the carrier collects a specified amount of money—typically, the price of the goods plus transportation—from the recipient, on behalf of the seller, as a condition of delivery.


I have the now-discontinued Sony DPT-RP1, which I use with Jan-Gerd Tenberge’s software (https://github.com/janten/dpt-rp1-py). It works well for reading PDF documents without the need for frequent zooming or scaling.

If I had to replace it today, I’d buy a Fujitsu Quaderno A4 (FMVDP41), which I understand has a design very similar to that of the Sony product.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: