Hacker Newsnew | past | comments | ask | show | jobs | submit | hcs's commentslogin

Or grade accounts by the logarithm of how many accounts were registered before them, like Slashdot. (This is tongue in cheek as I assume yours was.)

> The "inability to act" which, as Forrester points out, "provided the incentive" to augment or replace the low-internal-speed human organizations with computers, might in some other historical situation have been an incentive for modifying the task to be accomplished, perhaps doing away with it altogether, or for restructuring the human organizations whose inherent limitations were, after all, seen as the root of the trouble. [...]

> Yes, the computer did arrive "just in time." But in time for what? In time to save--and save very nearly intact, indeed, to entrench and stabilize--social and political structures that might have been either radically renovated or allowed to totter under the demands that were sure to be made on them.

- Joseph Weizenbaum, Computer Power and Human Reason (1976) pp 29-30


I imagine it's a case where you hire a dozen or so test attendants.


A Seymour


Maybe this is too obvious to say but it doesn't matter what they're selling the access for, it's the unwanted installation of the proxy that's malware. If you're buying access from a service that gets its residential network access that way you're contributing to the problem.


Seems much more likely it's just going through a list of all games, collated from databases that humans have painstakingly curated.


Do you need assistance?


Surely you've been on HN long enough to know people just read the headline. Not that it would stop all sniping, but that headline doesn't even include "program" (or "compute").


> that headline doesn't even include "program" (or "compute").

Neither does Scott's article titled "Who Can Name the Bigger Number?" [1]

The title is just a way to invite the reader to find out why the answer isn't simply 2^64-1.

[1] https://news.ycombinator.com/item?id=9058986


On Switch 2 there are also pure license dongles in the form of the Game-Key Card. https://en.wikipedia.org/wiki/Nintendo_Game_Card#Game-Key_Ca...


After decompression, with the performance characteristics you'd expect. If it has to come off disk it's still a win or at least usually breaks even in their measurements. https://cedardb.com/blog/string_compression/#query-runtime

The paper suggests that you could rework string matching to work on the compressed data but they haven't done it.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: