Hacker Newsnew | past | comments | ask | show | jobs | submit | svenhof's commentslogin

Thank you for making this great tool.


We've been using mkdocs material for ages and it's been absolutely awesome: https://squidfunk.github.io/mkdocs-material/


This reply resonates the most with me. I absolutely agree.

The difference in how the day-to-day activities 'feel' between company A and company B just isn't as big anymore now with full remote.


You make it sound like Cloudflare would be OK serving all Wikipedia or pypi traffic for free. Reality would be a little different.



Fastly currently serves all of PyPI's CDN traffic for free. Cloudflare probably would as well.


There is nothing wrong with you.


there is, he admits it and wants to fix. He is not going to be happier if we tell him that he should just be happy with what he have. He wants to have a healthy/happy romantic relationship with someone and he deserves it, and it is not a problem to have to work to fix it.

I had the same problem in the past and as a hacker I made a plan to fix it. I can tell you that it worked really well and I barely recognize myself from 5 years ago. But this change wasn't easy and was related to lots of areas in my life: friends, family, fitness, nutrition, work, interests in life. More than wanting to date someone, I invested in becoming someone people want to date.


I really love this: "I invested in becoming someone people want to date." Very wise words.

Although this sentence (about the kind of people people want to date) from La Bruyere's Characters flashed cynically into my mind a moment later. :-)

A man who is vain, indiscreet, a great talker and a mischievous wag, who speaks arrogantly of himself and contemptuously of others, who is boisterous, haughty, forward, without morality, honesty, or commonsense, and who draws for facts on his imagination, wants nothing else, to be adored by many women, but handsome features and a good shape.

Also it reminded me of George Clooney writing somewhere that he started getting acting work after he totally changed his mindset in auditions–from asking, pleading give me something I want, to seeing himself as offering his talents, contributing something unique to the production–he had something they wanted, or should.


Also love the fact that some of the code samples are unit tested to make sure they are functional.


Nice observation!

Yes, most of the tests come directly from the docs, that way, by having full test coverage, means that at least a big part of the functionality is not only tested but also documented somewhere.


Unfortunately, by averaging the averages you skew the results. Average of averages does not produce the same result as averaging the whole list.


Average of equal size chunks' averages does. (mathematically)


Ah my bad. Thanks for that correction


It does if you weight the chunks correctly. Combine pairs of numbers and keep a weight of the remaining odd number. Either cut the weight in half of the odd number every time or use it in the average if an iteration has an even number of numbers.


Thanks for that, didn't know.


\left( \sum_{i=1}^m x_i/m + \sum_{i=m+1}^{2m} x_i/m \right) / 2 = \sum_{i=1}^{2m} x_i /(2m)


Looks good and loads fine from ireland :) Might want to reduce the size of the profile picture. jules.jpg is 1.6mb


>Might want to reduce the size of the profile picture. jules.jpg is 1.6mb

Yeah it's on the list!


I felt actual discomfort reading your anecdote.


Facebook has a trusted devices feature where logins from that device will not require 2FA login. Maybe the hacker is using such a device. Could be an sold smartphone/laptop or maybe a public computer.

You can remove these in your Facebook settings


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: