Hacker News

72 results back to index


pages: 315 words: 85,791

Technical Blogging: Turn Your Expertise Into a Remarkable Online Presence by Antonio Cangiano

23andMe, Albert Einstein, anti-pattern, bitcoin, bounce rate, cloud computing, content marketing, en.wikipedia.org, Hacker News, John Gruber, Kickstarter, Lean Startup, lolcat, Network effects, Paradox of Choice, revision control, Ruby on Rails, search engine result page, slashdot, software as a service, web application

For WordPress, you can also enable the sharing feature that’s available in the JetPack plugin. Reddit and Hacker News For technical blogs, there are two large communities for which it may be worth having sharing buttons. They are Reddit, with its extensive list of subcommunities known as subreddits, and Hacker News. In the previous section I mentioned how less than two hundred visits to one of my recent articles came from Facebook, Twitter, and Google+ combined. What I didn’t tell you though, was that more than seven thousand people showed up from Reddit, specifically the Programming subreddit. Likewise, Hacker News brought close to one thousand visitors to the article, despite the fact that my post didn’t get particularly popular on that site or make it to the home page as a popular story.

For an in-depth look at Reddit voting patterns and stories that made it big, check out Reddit’s own analysis at http://blog.reddit.com/2011/07/nerd-talk-tale-of-life-of-link-on.html. Hacker News Hacker News (HN) is currently my favorite community. It’s smaller than Reddit, but it’s growing quickly and tends to be much more friendly than communities such as /r/programming. If you hit its front page, you’ll still receive several thousand visitors (and quality ones at that). On Hacker News, you can submit any story that’s relevant to programming, technology, business, and the world of startups. War stories about your entrepreneurship or development experiences are particularly loved by this community.

Likewise, Hacker News brought close to one thousand visitors to the article, despite the fact that my post didn’t get particularly popular on that site or make it to the home page as a popular story. If your site is about programming, you should consider both Reddit and Hacker News buttons. If it’s more business or startup oriented, then Hacker News alone may be more appropriate. Just find a fine line (between too few and too many icons), and focus on the buttons that you care the most about. Don’t try to include too many, or their CTR (click-through rate) will quickly approach zero. 4.5 Win Over Subscribers When your blog is starting out, your sole goal should be to attract new subscribers.


pages: 332 words: 97,325

The Launch Pad: Inside Y Combinator, Silicon Valley's Most Exclusive School for Startups by Randall Stross

affirmative action, Airbnb, AltaVista, always be closing, Amazon Mechanical Turk, Amazon Web Services, barriers to entry, Ben Horowitz, Benchmark Capital, Burning Man, business cycle, California gold rush, call centre, cloud computing, crowdsourcing, don't be evil, Elon Musk, Hacker News, high net worth, hockey-stick growth, index fund, inventory management, John Markoff, Justin.tv, Lean Startup, Marc Andreessen, Mark Zuckerberg, Max Levchin, medical residency, Menlo Park, Minecraft, minimum viable product, Morris worm, Paul Buchheit, Paul Graham, Peter Thiel, QR code, Richard Feynman, Richard Florida, ride hailing / ride sharing, Salesforce, Sam Altman, Sand Hill Road, selling pickaxes during a gold rush, side project, Silicon Valley, Silicon Valley startup, Skype, social graph, software is eating the world, South of Market, San Francisco, speech recognition, Stanford marshmallow experiment, Startup school, stealth mode startup, Steve Jobs, Steve Wozniak, Steven Levy, TaskRabbit, transaction costs, Y Combinator

If you want to get it done immediately, then you need to be in person.” What about other options? Shah asks Altman. “Craigslist for this kind of thing actually works. The problem is you get a huge amount of junk. Have you guys posted on Hacker News?” “No.” “That’d be my first choice. We had great results posting on Hacker News. You get really high-quality people.” Campbell is surprised. “Nontech?” “Yeah. There are so many startup junkies that read Hacker News that just desperately want to be involved with a YC startup and aren’t technical, and there aren’t a lot of opportunities for them.” “What are some specific things we should look for or ask?”

They have cobbled together only a single course, an introduction to JavaScript with eight micro-lessons. It’s painfully rudimentary and might fall short of even a low bar for minimum viable product. Before releasing it, however, they need to get some feedback without launching. Hacker News seems like a good place to quietly invite hackers to pay a visit to the site and critique what Codecademy has so far. Midmorning, Sims posts a notice on Hacker News, “Show HN: Code cademy.com—The Easiest Way to Learn to Code,” and he and Bubinski head out to get bagels for lunch.2 In the car, they decide it would be a wonderful thing if they manage to get fifty concurrent users on the site.

Hackers are curious to know how things work and fix them when they don’t. Hackers desire the company of fellow hackers.4 Graham is a self-described hacker, and when he launched his own startup about fifteen years ago, the other cofounder was also a hacker. Graham personally wrote the code for Hacker News, an area on the Y Combinator Web site that aggregates links to news stories from around the Web suggested by users who are most interested in programming and software startups and who comment on the stories. Hackers are, by nature, unruly, says Graham. This sometimes leads to their poking around inside technology where they are not supposed to go.


pages: 232 words: 63,846

Traction: How Any Startup Can Achieve Explosive Customer Growth by Gabriel Weinberg, Justin Mares

Airbnb, content marketing, Firefox, Hacker News, if you build it, they will come, jimmy wales, Justin.tv, Lean Startup, Marc Andreessen, Mark Zuckerberg, Network effects, Paul Graham, Peter Thiel, Salesforce, side project, Skype, Snapchat, social bookmarking, social graph, software as a service, TechCrunch disrupt, the long tail, the payments system, Uber for X, Virgin Galactic, web application, working poor, Y Combinator

Sharing links is at the heart of many large communities on the Web (e.g., reddit, Product Hunt, Hacker News, Inbound.org). In addition, there are hundreds of niche communities and forums that encourage and reward the sharing of links. Dropbox, the file storage startup, targeted these communities for their initial traction. By sharing a video on Hacker News, Dropbox received more than ten thousand signups. Soon, it was trending on Digg (significantly bigger at the time), which drove even more signups. Quora, Codecademy, and Gumroad saw similar success from initial postings on Hacker News because their products were a good fit for users of that site.

Everyone I talked to about my search engine project thought I was nuts. You’re doing what? Competing against Google? Why? How? Another year later, in the fall of 2008, I flipped the switch, unveiling my search engine to the public. DuckDuckGo had a rather uneventful launch, if you can even call it a launch. I posted it to a niche tech site called Hacker News and that was the long and short of it. The post was entitled “What do you think of my new search engine?” Like many entrepreneurs, I’m motivated by being on the cusp of something big, and I was at the point where I needed some validation. I can survive on little, but I needed something. I got it.

Blogs compete to get stories first, newspapers compete to “confirm” it, and then pundits compete for airtime to opine on it. The smaller sites legitimize the newsworthiness of the story for the sites with bigger audiences. Tech startups frequently get exposure this way. Sites like TechCrunch and Lifehacker often pick up stories from smaller forums like Hacker News and subreddits. In turn, The New York Times often picks up content from TechCrunch and wraps it into a larger narrative they’re telling. The story of DonorsChoose.org is an example of the modern-day media chain in action. DonorsChoose is a site that allows teachers to raise money for classroom projects, such as buying a digital microscope for a science class.


pages: 282 words: 81,873

Live Work Work Work Die: A Journey Into the Savage Heart of Silicon Valley by Corey Pein

"World Economic Forum" Davos, 23andMe, 4chan, affirmative action, Affordable Care Act / Obamacare, Airbnb, Amazon Mechanical Turk, Anne Wojcicki, artificial general intelligence, bank run, barriers to entry, Benevolent Dictator For Life (BDFL), Bernie Sanders, Big Tech, bitcoin, Bitcoin Ponzi scheme, Build a better mousetrap, California gold rush, cashless society, colonial rule, computer age, cryptocurrency, data is the new oil, deep learning, digital nomad, disruptive innovation, Donald Trump, Douglas Hofstadter, driverless car, Elon Musk, Evgeny Morozov, Extropian, fail fast, fake it until you make it, fake news, gamification, gentrification, gig economy, Google bus, Google Glasses, Google X / Alphabet X, Greyball, growth hacking, hacker house, Hacker News, hive mind, illegal immigration, immigration reform, independent contractor, intentional community, Internet of things, invisible hand, Isaac Newton, Jeff Bezos, job automation, Kevin Kelly, Khan Academy, Larry Ellison, Law of Accelerating Returns, Lean Startup, life extension, Lyft, Mahatma Gandhi, Marc Andreessen, Mark Zuckerberg, Menlo Park, minimum viable product, move fast and break things, mutually assured destruction, Neal Stephenson, obamacare, Parker Conrad, passive income, patent troll, Patri Friedman, Paul Graham, peer-to-peer lending, Peter H. Diamandis: Planetary Resources, Peter Thiel, platform as a service, plutocrats, Ponzi scheme, post-work, public intellectual, Ray Kurzweil, regulatory arbitrage, rent control, RFID, Robert Mercer, rolodex, Ronald Reagan, Ross Ulbricht, Ruby on Rails, Sam Altman, Sand Hill Road, Scientific racism, self-driving car, selling pickaxes during a gold rush, sharing economy, side project, Silicon Valley, Silicon Valley billionaire, Silicon Valley startup, Singularitarianism, Skype, Snapchat, Social Justice Warrior, social software, software as a service, source of truth, South of Market, San Francisco, Startup school, stealth mode startup, Steve Bannon, Steve Jobs, Steve Wozniak, TaskRabbit, tech billionaire, tech bro, tech worker, TechCrunch disrupt, technological singularity, technoutopianism, telepresence, too big to fail, Travis Kalanick, tulip mania, Tyler Cowen, Uber for X, uber lyft, ubercab, unit 8200, upwardly mobile, Vernor Vinge, vertical integration, Virgin Galactic, X Prize, Y Combinator, Zenefits

But they soon became a habit, and in a misguided effort to become more “productive,” I devoured page after page of the self-help and motivational material these websites featured, most of it directed at startup wannabes like me. Lying awake in bed, arm stiff from holding my smartphone aloft, I sought solace in the sanguine stream of updates on Hacker News, a techie discussion forum run by a venture capital fund and startup “incubator” called Y Combinator. This outfit seemed vaguely prestigious, the commenters knowledgeable. The titles of the inspirational homilies on Hacker News reassured me that I was not alone: “Fail Fast, Fail Often, and Fail by Design,” “Failing Fast Means … Failing a Lot,” and, most succinctly, “Success Through Failure.” I took it all to heart.

Somehow it still seemed they had the best deal going. I found that most startup founders told the truth about their sorry circumstances only while drunk or from behind the cover of anonymity. It was easy to find cracks in the veneer of enthusiasm even on the relentlessly enthusiastic news and discussion website Hacker News. A sample of some questions submitted by different users to the “Ask HN” feature of the site gives the flavor of the stress and anxiety plaguing those who struck out on their own seeking treasure in Silicon Valley: Should I pretend that my startup is already successful? What should I do if I feel burnt out?

To hawk get-rich-quick manuals to all those eager Fiverrers, however, was to join the exalted ranks of the shovel merchants. My Airbnb landlord, I realized, was a shovel merchant. As was the company that rented me server space for website hosting. As were the “startup community organizers” selling tickets to conferences and networking parties. As were the startup awards shows and Hacker News and the whole Silicon Valley economic apparatus promoting the ideal of individual achievement. We startup wannabes were not entrepreneurs. We were suckers for the shovel merchants, who were much cleverer than the thick-skulled “innovators” who did all the work while trading away the rewards. Selling shovels wasn’t the only way to make money in tech, but it was … the Silicon Valley way.


pages: 579 words: 76,657

Data Science from Scratch: First Principles with Python by Joel Grus

backpropagation, confounding variable, correlation does not imply causation, data science, deep learning, Hacker News, higher-order functions, natural language processing, Netflix Prize, p-value, Paul Graham, recommendation engine, SpamAssassin, statistical model

Do Data Science Looking through data catalogs is fine, but the best projects (and products) are ones that tickle some sort of itch. Here are a few that I’ve done. Hacker News Hacker News is a news aggregation and discussion site for technology-related news. It collects lots and lots of articles, many of which aren’t interesting to me. Accordingly, several years ago, I set out to build a Hacker News story classifier to predict whether I would or would not be interested in any given story. This did not go over so well with the users of Hacker News, who resented the idea that someone might not be interested in every story on the site. This involved hand-labeling a lot of stories (in order to have a training set), choosing story features (for example, words in the title, and domains of the links), and training a Naive Bayes classifier not unlike our spam filter.

entropy, Entropy entropy of a partition, The Entropy of a Partition hiring tree implementation (example), Putting It All Together random forests, Random Forests degree centrality, Finding Key Connectors, Betweenness Centrality DELETE statement (SQL), DELETE delimited files, Delimited Files dependence, Dependence and Independence derivatives, approximating with difference quotients, Estimating the Gradient dictionaries (Python), Dictionariesdefaultdict, defaultdict items and iteritems methods, Generators and Iterators dimensionality reduction, Dimensionality Reduction-Dimensionality Reductionusing principal component analysis, Dimensionality Reduction dimensionality, curse of, The Curse of Dimensionality-The Curse of Dimensionality, User-Based Collaborative Filtering discrete distribution, Continuous Distributions dispersion, Dispersionrange, Dispersion standard deviation, Dispersion variance, Dispersion distance, The Model(see also nearest neighbors classification) between clusters, Bottom-up Hierarchical Clustering distance function, Rescaling, The Model distributionbernoulli, The Central Limit Theorem, Example: Flipping a Coin beta, Bayesian Inference binomial, The Central Limit Theorem, Example: Flipping a Coin continuous, Continuous Distributions normal, The Normal Distribution dot product, Vectors, Matrix Multiplication dummy variables, Multiple Regression E edges, Network Analysis eigenshirts project, T-shirts eigenvector centrality, Eigenvector Centrality-Centrality ensemble learning, Random Forests entropy, Entropyof a partition, The Entropy of a Partition enumerate function (Python), enumerate errorsin clustering, Choosing k in multiple linear regression model, Further Assumptions of the Least Squares Model in simple linear regression model, The Model, Maximum Likelihood Estimation minimizing in models, Gradient Descent-For Further Exploration standard errors of regression coefficients, Standard Errors of Regression Coefficients-Standard Errors of Regression Coefficients Euclidean distance function, Rescaling exceptions in Python, Exceptions experience optimization, Example: Running an A/B Test F F1 score, Correctness false positives, Example: Flipping a Coin farness, Betweenness Centrality features, Feature Extraction and Selectionchoosing, Feature Extraction and Selection extracting, Feature Extraction and Selection feed-forward neural networks, Feed-Forward Neural Networks files, reading, Reading Filesdelimited files, Delimited Files text files, The Basics of Text Files filter function (Python), Functional Tools fire trucks project, Fire Trucks for comprehensions (Python), Generators and Iterators for loops (Python), Control Flowin list comprehensions, List Comprehensions full outer joins, JOIN functions (Python), Functions G generators (Python), Generators and Iterators getting data (see data, getting) Gibbs sampling, An Aside: Gibbs Sampling-An Aside: Gibbs Sampling Github's API, Using an Unauthenticated API gradient, The Idea Behind Gradient Descent gradient descent, Gradient Descent-For Further Explorationchoosing the right step size, Choosing the Right Step Size estimating the gradient, Estimating the Gradient example, minimize_batch function, Putting It All Together stochastic, Stochastic Gradient Descent using for multiple regression model, Fitting the Model using in simple linear regression, Using Gradient Descent grammars, Grammars-Grammars greedy algorithms, Creating a Decision Tree GROUP BY statement (SQL), GROUP BY-GROUP BY H Hacker News, Hacker News harmonic mean, Correctness hierarchical clustering, Bottom-up Hierarchical Clustering-Bottom-up Hierarchical Clustering histogramsof friend counts (example), Describing a Single Set of Data plotting using bar charts, Bar Charts HTML, parsing, HTML and the Parsing Thereofexample, O'Reilly books about data, Example: O’Reilly Books About Data-Example: O’Reilly Books About Data using Beautiful Soup library, HTML and the Parsing Thereof hypotheses, Hypothesis and Inference hypothesis testing, Statistical Hypothesis Testingexample, an A/B test, Example: Running an A/B Test example, flipping a coin, Example: Flipping a Coin-Example: Flipping a Coin p-hacking, P-hacking regression coefficients, Standard Errors of Regression Coefficients-Standard Errors of Regression Coefficients using confidence intervals, Confidence Intervals using p-values, Example: Flipping a Coin I if statements (Python), Control Flow if-then-else statements (Python), Control Flow in operator (Python), Lists, Dictionariesin for loops, Control Flow using on sets, Sets independence, Dependence and Independence indexes (database tables), Indexes inferenceBayesian Inference, Bayesian Inference statistical, in A/B test, Example: Running an A/B Test inner joins, JOIN INSERT statement (SQL), CREATE TABLE and INSERT interactive visualizations, Visualization inverse normal cumulative distribution function, The Normal Distribution IPython, Getting Python, IPython item-based collaborative filtering, Item-Based Collaborative Filtering-For Further Exploration J JavaScript, D3.js library, Visualization JOIN statement (SQL), JOIN JSON (JavaScript Object Notation), JSON (and XML) K k-means clustering, The Modelchoosing k, Choosing k k-nearest neighbors classification (see nearest neighbors classification) kernel trick, Support Vector Machines key/value pairs (in Python dictionaries), Dictionaries kwargs (Python), args and kwargs L Lasso regression, Regularization Latent Dirichlet Analysis (LDA), Topic Modeling layers (neural network), Feed-Forward Neural Networks least squares modelassumptions, Further Assumptions of the Least Squares Model in simple linear regression, The Model left joins, JOIN likelihood, Maximum Likelihood Estimation, The Logistic Function line chartscreating with matplotlib, matplotlib showing trends, Line Charts linear algebra, Linear Algebra-For Further Exploration, Mathematicsmatrices, Matrices-Matrices vectors, Vectors-Vectors linear regressionmultiple, Multiple Regression-For Further Explorationassumptions of least squares model, Further Assumptions of the Least Squares Model bootstrapping new data sets, Digression: The Bootstrap goodness of fit, Goodness of Fit interpreting the model, Interpreting the Model model, The Model regularization, Regularization standard errors of regression coefficients, Standard Errors of Regression Coefficients-Standard Errors of Regression Coefficients simple, Simple Linear Regression-For Further Explorationmaximum likelihood estimation, Maximum Likelihood Estimation model, The Model using gradient descent, Using Gradient Descent using to predict paid accounts, The Problem list comprehensions (Python), List Comprehensions lists (in Python), Listsrepresenting matrices as, Matrices sort method, Sorting using to represent vectors, Vectors zipping and unzipping, zip and Argument Unpacking log likelihood, The Logistic Function logistic regression, Logistic Regression-For Further Investigationapplying the model, Applying the Model goodness of fit, Goodness of Fit logistic function, The Logistic Function problem, predicting paid user accounts, The Problem M machine learning, Machine Learning-For Further Explorationbias-variance trade-off, The Bias-Variance Trade-off correctness, Correctness defined, What Is Machine Learning?

MapReduce Example: Word Count Why MapReduce? MapReduce More Generally Example: Analyzing Status Updates Example: Matrix Multiplication An Aside: Combiners For Further Exploration 25. Go Forth and Do Data Science IPython Mathematics Not from Scratch NumPy pandas scikit-learn Visualization R Find Data Do Data Science Hacker News Fire Trucks T-shirts And You? Index


pages: 52 words: 14,333

Growth Hacker Marketing: A Primer on the Future of PR, Marketing, and Advertising by Ryan Holiday

Aaron Swartz, Airbnb, data science, growth hacking, Hacker News, iterative process, Kickstarter, Lean Startup, Marc Andreessen, market design, minimum viable product, Multics, Paul Graham, pets.com, post-work, Silicon Valley, slashdot, Steve Wozniak, Travis Kalanick

With a mind for data and a scrappy disregard for the “rules,” they have pioneered a new model of marketing designed to utilize the many new tools that the Internet has made available: E-mail. Data. Social media. Lean methodology. Almost overnight, this breed has become the new rock stars of the Silicon Valley. You see them on the pages of TechCrunch, Fast Company, Mashable, Entrepreneur, and countless other publications. LinkedIn and Hacker News abound with job postings: Growth Hacker Needed. Their job isn’t to “do” marketing as I had always known it; it’s to grow companies really fast—to take something from nothing and make it something enormous within an incredibly tight window. And it says something about what marketing has become that these are no longer considered synonymous tasks.

They got to mass market by ignoring the urge to appeal to the mass market, at least to start with. This means that our outward-facing marketing and PR efforts are needed simply to reach out to and capture, at the beginning, a group of highly interested, loyal, and fanatical users. Then we grow with and because of them. If they are geeks, they are at TechCrunch or Hacker News or Reddit or attending a handful of conferences every year. If they are fashionistas, they are regularly checking a handful of fashion blogs like Lookbook.nu or Hypebeast. If they are _______________, like you and your founders are, they are reading and doing the same things you do every day.

Period.) To kick off and reach your first group of users, you have many options: 1. You can reach out to the sites you know your potential customers read with a pitch e-mail: “This is who we are, this is what we’re doing, and this is why you should write about us.”* 2. You can upload a post to Hacker News, Quora, or Reddit yourself. 3. You can start writing blog posts about popular topics that get traffic and indirectly pimp your product. 4. You can use the Kickstarter platform for exposure and bribe your first users with cool prizes (and get some online chatter at the same time). 5.


pages: 270 words: 64,235

Effective Programming: More Than Writing Code by Jeff Atwood

AltaVista, Amazon Web Services, barriers to entry, cloud computing, endowment effect, fail fast, Firefox, fizzbuzz, Ford Model T, future of work, game design, gamification, Google Chrome, gravity well, Hacker News, job satisfaction, Khan Academy, Kickstarter, loss aversion, Marc Andreessen, Mark Zuckerberg, Merlin Mann, Minecraft, Paul Buchheit, Paul Graham, price anchoring, race to the bottom, recommendation engine, science of happiness, Skype, social software, Steve Jobs, systems thinking, TED Talk, Tragedy of the Commons, web application, Y Combinator, zero-sum game

Heck, it’s a huge win if we read one hundred posts and learn one new valuable thing. If you’re looking for good programming blogs to sharpen your saw (or at least pique your intellectual curiosity), I know of two excellent programming specific link aggregation sites that can help you find them. The first is Hacker News, which I recommend highly. Hacker News is the brainchild of Paul Graham, so it partially reflects his interests in Y Combinator and entrepreneurial stuff like startups. Paul is serious about moderation on the site, so in addition to the typical Digg-style voting, there’s a secret cabal (I like to think of it as The Octagon, “no one will admit they still exist!”)

Obsessions are one of the greatest telltale signs of success. Understand a person’s obsessions and you will understand her natural motivation. The thing for which she would walk to the end of the earth. It’s OK to be a little obsessed with sharpening your saw, if it means actively submitting and discussing programming articles on, say, Hacker News. What do you recommend for sharpening your saw as a programmer? Go That Way, Really Fast When it comes to running Stack Overflow, the company, I take all my business advice from one person, and one person alone: Curtis Armstrong. More specifically, Curtis Armstrong as Charles De Mar from the 1985 absurdist teen comedy classic, Better Off Dead.

No matter what the documentation says, the source code is the ultimate truth, the best and most definitive and up-to-date documentation you’re likely to find. This will be true forever, so the sooner you come to terms with this, the better off you’ll be as a software developer. I had a whole entry I was going to write about this, and then I discovered Brandon Bloom’s brilliant post on the topic at Hacker News. Read closely, because he explains the virtue of reading source, and in what context you need to read the source, far better than I could: I started working with Microsoft platforms professionally at age 15 or so. I worked for Microsoft as a software developer doing integration work on Visual Studio.


pages: 1,136 words: 73,489

Working in Public: The Making and Maintenance of Open Source Software by Nadia Eghbal

Amazon Web Services, Apollo 11, barriers to entry, Benevolent Dictator For Life (BDFL), Big Tech, bitcoin, Clayton Christensen, cloud computing, commoditize, commons-based peer production, context collapse, continuous integration, crowdsourcing, cryptocurrency, David Heinemeier Hansson, death of newspapers, Debian, disruptive innovation, Dunbar number, en.wikipedia.org, eternal september, Ethereum, Firefox, Free Software Foundation, Guido van Rossum, Hacker Ethic, Hacker News, Induced demand, informal economy, information security, Jane Jacobs, Jean Tirole, Kevin Kelly, Kickstarter, Kubernetes, leftpad, Mark Zuckerberg, Menlo Park, Neal Stephenson, Network effects, node package manager, Norbert Wiener, pirate software, pull request, RFC: Request For Comment, Richard Stallman, Ronald Coase, Ruby on Rails, side project, Silicon Valley, Snapchat, social graph, software as a service, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, tacit knowledge, the Cathedral and the Bazaar, The Death and Life of Great American Cities, The Nature of the Firm, TikTok, Tragedy of the Commons, transaction costs, two-sided market, urban planning, web application, wikimedia commons, Yochai Benkler, Zimmermann PGP

In a club or federation, an active contributor cohort might display prosocial attitudes that lend themselves to making decisions collectively. But that attitude doesn’t necessarily port over to the stadium model, where contributors act more like users, and only the maintainer makes decisions on behalf of a project. (One maintainer, rolling his eyes, showed me a Hacker News thread in which a developer espousing strong opinions claimed to be a “contributor” to his project. That contribution turned out to be a single pull request, from several years ago, which removed a bit of white space.) The difficulty of distinguishing contributors from users also applies to distinguishing between contributors and maintainers.

The team behind Homebrew, a macOS package manager, uses analytics to help maintainers make better decisions about the project’s development needs, explaining that “anonymous aggregate user analytics allow us to prioritise fixes and features based on how, where and when people use Homebrew.”172 Their decision to add tracking, announced in 2016, received mixed reviews among users. One commenter on Hacker News complained, “Why are you even collecting this information? Homebrew isn’t some for-profit product trying to optimize its funnel. Keep doing what you were doing. You were doing a great job. There is no benefit to you or us to silently spy on us.”173 Nonetheless, most users don’t opt out of Homebrew’s tracking.

When Richard Stallman first described free software as “free as in speech, not free as in beer,” the distinction he wished to make is that the term “free” referred to what one could do with the software, rather than to its price.195 At a conference many years later, Jacob Thornton, the developer who cocreated Bootstrap, suggested that open source is, instead, “free as in puppy”: Open-sourcing something is kind of like adopting a cute puppy. You write this project with your friends, it’s really great, and you’re like, “OK, like I’ll open-source it, it’ll be fun! Like, whatever, we’ll get on the front page of Hacker News.” . . . And it is! It’s super fun, it’s a great thing. But what happens is, puppies grow and get old, and pretty soon . . . your puppy’s kinda like a mature dog . . . . and you’re like, “Oh my god, so much time is required for me to take care of this thing!” . . . . If someone had told me a month before I open-sourced Bootstrap that I would have 40,000 stars and that I would quit fucking Twitter and I would still be spending hours a night looking at issues, I would’ve been like, “LOL, yeah right, no way, this little thing?”


pages: 229 words: 67,869

So You've Been Publicly Shamed by Jon Ronson

4chan, Adam Curtis, AltaVista, Berlin Wall, Broken windows theory, Burning Man, Clive Stafford Smith, cognitive dissonance, Desert Island Discs, different worldview, don't be evil, Donald Trump, drone strike, gentrification, Google Hangouts, Hacker News, illegal immigration, Jon Ronson, Menlo Park, PageRank, Ralph Nader, Rosa Parks, Silicon Valley, Skype, Stanford prison experiment, Steve Jobs, tech billionaire, urban planning, WikiLeaks

If he had Downs Syndrome and he accidently pushed someone off a subway that would be different … I’ve seen things where people are like, “Adria didn’t know what she was doing by tweeting it.” Yes, I did.’ * The evening Hank posted his statement on Hacker News, outsiders began to involve themselves in his and Adria’s story. Hank started to receive messages of support from men’s-rights bloggers. He didn’t respond to any of them. Later a Gucci Little Piggy blogger wrote that Hank’s Hacker News message had revealed him to be a man with: a complete lack of backbone … by apologizing you are just saying, ‘I am a weak enemy - do with me what you will.’ [In publicly shaming Hank, Adria had] complete and utter power over his children.

‘When I got in the car with my wife I just … I’ve got three kids. Getting fired was terrifying.’ That night Hank made his only public statement (like Justine and Jonah, he had never spoken to a journalist about what had happened before he spoke to me). He posted a short message on the discussion board Hacker News: Hi, I’m the guy who made a comment about big dongles. First of all I’d like to say I’m sorry. I really did not mean to offend anyone and I really do regret the comment and how it made Adria feel. She had every right to report me to staff, and I defend her position. [But] as a result of the picture she took I was let go from my job today.

I was so taken aback by this suggestion I didn’t say anything in defence of Hank at the time. But later I felt bad that I hadn’t stuck up for him. So I emailed her. I told her what he had told me - how he’d refused to engage with any of the bloggers or trolls who sent him messages of support. I added that I felt Hank was within his rights to post the message on Hacker News revealing he’d been fired. Adria replied that she was happy to hear that Hank ‘wasn’t active in driving their interests to mount the raid attack’, but she held him responsible for it anyway. It was ‘his own actions that resulted in his own firing, yet he framed it in a way to blame me … If I had a spouse and two kids to support I certainly would not be telling “jokes” like he was doing at a conference.


pages: 290 words: 90,057

Billion Dollar Brand Club: How Dollar Shave Club, Warby Parker, and Other Disruptors Are Remaking What We Buy by Lawrence Ingrassia

air freight, Airbnb, airport security, Amazon Robotics, augmented reality, barriers to entry, call centre, commoditize, computer vision, data science, fake news, fulfillment center, global supply chain, Hacker News, industrial robot, Jeff Bezos, Kickstarter, Kiva Systems, Lyft, Mark Zuckerberg, minimum viable product, natural language processing, Netflix Prize, rolodex, San Francisco homelessness, side project, Silicon Valley, Silicon Valley startup, Snapchat, Steve Jobs, supply-chain management, Uber and Lyft, uber lyft, warehouse automation, warehouse robotics, WeWork

Meanwhile, Tuft & Needle, operating in relative obscurity in Phoenix, was growing steadily—sales rose to $9 million in 2014, its second full year, from $1 million the year before—as it replaced its original five-inch mattress with an improved ten-inch version. Not only was it thicker, but Marino found scientists who formulated a better foam for a more comfortable mattress. Though the company was far from the media spotlight in New York, it finally started to get attention: a Hacker News post online in December 2013 was followed by a story in Fortune magazine in January 2014 headlined—that’s right—“Meet the Warby Parker of Mattresses.” Marino and Park, who still hadn’t raised any outside money, got calls from venture capitalists asking to invest, but the two turned them all down.

Mattress Firm gobbled up rivals: Jef Feeley, Matthew appearing on Townsend, and Laurel Brubaker Calkins, “How a Frenzied Expansion Brought Down America’s No. 1 Mattress Seller,” Bloomberg News, November 28, 2018, https://www.bloomberg.com/news/articles/2018-11-28/how-a-breakneck-buildout-brought-down-america-s-mattress-leader. A shop vacuum cleaner sucked air: Marino, appearing on “The Start-up That Launched the Horse Race of Online Mattress Companies.” “We had to do quite a few returns”: Hacker News online conversation, December 13, 2013, https://news.ycombinator.com/item?id=6900625. “The mattress industry is rotten”: “We Need a Warby Parker for Mattresses,” Priceonomics, September 14, 2012, https://priceonomics.com/mattresses/. reaching $15 million in 2017: “Sleeper Cell” mattress industry report for Lerer Hippeau venture capital firm, May 2, 2013.

the number of articles about Casper: “Casper Sleep Inc.: Marketing the ‘One Perfect Mattress for Everyone,’” Harvard Business School case study, November 15, 2017, https://www.hbs.edu/faculty/Pages/item.aspx?num=51747. sales rose to $9 million in 2014: Tuft & Needle, “Company Info,” https://press.tn.com/company-info/timeline/. A Hacker News post online: Miguel Helft, “Meet the Warby Parker of Mattresses,” Fortune, January 22, 2014, http://fortune.com/2014/01/22/meet-the-warby-parker-of-mattresses/. “Don’t worry about them”: Author interview with Michael Traub, former chief executive of Serta Simmons Bedding, June 29, 2018. There’s a machine that uses: Testing equipment explained by Chris Chunglo, Serta Simmons Bedding head of R&D, during a tour on June 29, 2018.


pages: 246 words: 68,392

Gigged: The End of the Job and the Future of Work by Sarah Kessler

"Susan Fowler" uber, Affordable Care Act / Obamacare, Airbnb, Amazon Mechanical Turk, basic income, bitcoin, blockchain, business cycle, call centre, cognitive dissonance, collective bargaining, crowdsourcing, data science, David Attenborough, do what you love, Donald Trump, East Village, Elon Musk, financial independence, future of work, game design, gig economy, Hacker News, income inequality, independent contractor, information asymmetry, Jeff Bezos, job automation, law of one price, Lyft, Mark Zuckerberg, market clearing, minimum wage unemployment, new economy, opioid epidemic / opioid crisis, payday loans, post-work, profit maximization, QR code, race to the bottom, ride hailing / ride sharing, Salesforce, Second Machine Age, self-driving car, shareholder value, sharing economy, Silicon Valley, Snapchat, TaskRabbit, TechCrunch disrupt, Travis Kalanick, Uber and Lyft, Uber for X, uber lyft, union organizing, universal basic income, working-age population, Works Progress Administration, Y Combinator

His company wanted him present in the office but didn’t provide enough work to fill the time. At first, he proposed additional work projects. But it would take days for teams and supervisors to sign off on them, and even then, they’d usually be rejected. So he resorted to spending most of the hours between lunch and five o’clock reading every article on the tech forum Hacker News and watching Twitch, a website that broadcasts live feeds of other people playing video games. Less than two years into his professional career, Curtis was bored out of his mind and wasting a large part of his waking time. One freezing January night, on his walk home, he decided he’d had enough of corporate employment.

He hated selling, marketing, and advertising, which was part of what had made coding attractive in the first place. By building Crontent, he hoped to demonstrate to startups that he had serious skills. After his morning Starbucks stop, he went to his day job. There, after finishing his work for the day, he scanned TechCrunch and Hacker News for startups that might have use for his abilities. This became his daily routine. Weeks later, during this daily scan, a different kind of startup caught his eye. “Help build the world’s engineering department,” it advertised on its website. He looked more closely. It seemed the site, called Gigster, wasn’t looking for employees to help build the world’s biggest engineering department.

See also Upwork Employee Benefits Security Administration (US Department of Labor) employees alternatives to current classification of independent contractors versus at Instagram Managed by Q and misclassification of retention rights of social safety nets and Uber and unionizing and Etsy (ecommerce website) Even (income management app) Facebook employee benefits versus contract workers Instagram purchased by minimum wage Uber Drivers Network NYC page Uber Freedom page Fairmondo (digital cooperative) family leave Farr, Christina Fast Company (magazine) Fidler, Devin Fissured Workplace, The (Weil) Fiverr (freelance marketplace) flexibility employees and gender and gig economy and Mechanical Turk and millennial generation and traditional schedules versus Uber and Fortune (magazine) Fortune 500 Foster, Gary (Samaschool student) Fowler, Susan (Uber employee) freelance work earnings health insurance and history of online freelancing iCEO and internet freelance marketplaces statistics temporary employees versus traditional model unionization of See also Gigster; Upwork Freelancers Union Friedman, Thomas “future of work” “Future of Work” initiative (Aspen Institute) Getty Images Gibbon, Kevin gig economy automation and bonus structure capital investment and continued relevance of cooperatives decline of earnings employee model and flexibility and freedom and future of healthcare and history of independence and independent contractors and insecurity and instability and jury duty and lawsuits and Medicare politics and portable benefits and ratings systems retirement security and as safety net socioeconomics and startup valuations as stop-gap technology unionization and unit economics worker classification worker demographics worker retention worker training and motivation Gigster (software development website) interview and screening process Karma score remote talent workers worker earnings See also Larson, Curtis Global Entrepreneurship Summit Global Information Network (GIN) Goldman Sachs Gompers, Samuel Gonzalez, Maria Good Jobs Strategy Good Jobs Strategy (Ton) Google Google Images Google Scholar Google Ventures Great Recession Great Risk Shift, The (Hacker) Green, Shakira (Samaschool student) Griswold, Alison GroupMe (messaging app) Grubhub (food delivery service) Guardian, The (newspaper) Gumora, Michael Hacker, Jacob Hacker News (tech forum) Hanauer, Nick Handy (cleaning service) customer complaints lawsuits ratings scale worker rates and benefits worker retention worker training Hanley, Dervala Hanrahan, Oisin Harris, Seth Hayek, Friedrich healthcare Affordable Care Act in Canada COBRA independent contractors and Medicare Hermes UK (delivery service) Highlight (social networking app) Holmberg, Susan Homejoy (home-cleaning service) household income H.U.G.


pages: 559 words: 155,372

Chaos Monkeys: Obscene Fortune and Random Failure in Silicon Valley by Antonio Garcia Martinez

Airbnb, airport security, always be closing, Amazon Web Services, Big Tech, Burning Man, business logic, Celtic Tiger, centralized clearinghouse, cognitive dissonance, collective bargaining, content marketing, corporate governance, Credit Default Swap, crowdsourcing, data science, deal flow, death of newspapers, disruptive innovation, Dr. Strangelove, drone strike, drop ship, El Camino Real, Elon Musk, Emanuel Derman, Fairchild Semiconductor, fake it until you make it, financial engineering, financial independence, Gary Kildall, global supply chain, Goldman Sachs: Vampire Squid, Hacker News, hive mind, How many piano tuners are there in Chicago?, income inequality, industrial research laboratory, information asymmetry, information security, interest rate swap, intermodal, Jeff Bezos, Kickstarter, Malcom McLean invented shipping containers, Marc Andreessen, Mark Zuckerberg, Maui Hawaii, means of production, Menlo Park, messenger bag, minimum viable product, MITM: man-in-the-middle, move fast and break things, Neal Stephenson, Network effects, orbital mechanics / astrodynamics, Paul Graham, performance metric, Peter Thiel, Ponzi scheme, pre–internet, public intellectual, Ralph Waldo Emerson, random walk, Reminiscences of a Stock Operator, Ruby on Rails, Salesforce, Sam Altman, Sand Hill Road, Scientific racism, second-price auction, self-driving car, Sheryl Sandberg, Silicon Valley, Silicon Valley startup, Skype, Snapchat, social graph, Social Justice Warrior, social web, Socratic dialogue, source of truth, Steve Jobs, tech worker, telemarketer, the long tail, undersea cable, urban renewal, Y Combinator, zero-sum game, éminence grise

We would post on Tuesday, which left the most time for a PR blowup to echo across the Internet, and across all levels of Internet connectedness, from the assimilated Internet cyborg to the grandmother in Kansas. Around nine a.m. Pacific Standard Time I navigated to that venerable if niche corner of the Internet: Hacker News. A Reddit-like message board hosted by Y Combinator itself, it’s a weird mix of supertechnical geeks, hustling YC founders, and that species of simultaneously frustrated and sanctimonious poseur called a “wantrapreneur.” I posted the piece, while asking a few friends to upvote the article to give it some initial traction. Within minutes, it was the number one post on Hacker News, seen by every serious (and not serious) young techie in the world. Then Scoble tweeted it, and the shit really hit the fan.

By Monday, the hive mind would be on to its next amusing post, and we’d need to rekindle interest. This post would be the first in a series of hyperviral blog posts that would put AdGrok on the startup map (if not quite the customer one). Every three to four weeks, another gaseous emanation from the latrine of human thought (a.k.a. me) would appear and rocket us to the top of Hacker News (the tech geek’s Cosmo), and make another stir in the evanescent tech buzz-o-sphere. Until AdGrok’s very end, search terms like “goldman sachs” and “fuck you” (I had written a post about the ever-elusive goal of “fuck-you money”) would be the most popular terms that led to clicks to our site.* It irritated MRM to no end.

His official AdGrok nickname was “Manson Lamps,” after Tony Soprano’s psychotic rival, who possessed an intense and unsettling stare. This was a flip and admittedly unfair comparison; Sam never proved himself anything other than a capable operator and loyal friend to YC companies. I’m high-strung, fast-talking, and wired on a combination of caffeine, fear, and greed at all times. But “Sama,” as he is known on Hacker News and Twitter, really takes the cake. After an hour with him, I was looking for the closest beer bar. Standing maybe five-seven, lean and wiry, with perpetually hunched shoulders, he has clear blue eyes of an unusual intensity. A typical meeting would involve him conducting a conversation about A, with a side tangent on topic B, while considering C, and simultaneously texting on his phone and scanning his laptop screen.


pages: 443 words: 116,832

The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics by Ben Buchanan

active measures, air gap, Bernie Sanders, bitcoin, blockchain, borderless world, Brian Krebs, British Empire, Cass Sunstein, citizen journalism, Citizen Lab, credit crunch, cryptocurrency, cuban missile crisis, data acquisition, disinformation, Donald Trump, drone strike, Edward Snowden, fake news, family office, Hacker News, hive mind, information security, Internet Archive, Jacob Appelbaum, John Markoff, John von Neumann, Julian Assange, Kevin Roose, Kickstarter, kremlinology, Laura Poitras, MITM: man-in-the-middle, Nate Silver, operational security, post-truth, profit motive, RAND corporation, ransomware, risk tolerance, Robert Hanssen: Double agent, rolodex, Ronald Reagan, Russian election interference, seminal paper, Silicon Valley, South China Sea, Steve Jobs, Stuxnet, subscription business, technoutopianism, undersea cable, uranium enrichment, Vladimir Vetrov: Farewell Dossier, Wargames Reagan, WikiLeaks, zero day

The conclusion seems inescapable: because of cyber operations’ possibility for automation and rapid propagation, disruption can scale. A Wolf in Weasel’s Clothing in Sheep’s Clothing The message is familiar: apply software updates. Sometimes the appeal comes from a security professional, someone who knows security patches are essential to defending against hackers’ new tricks. Often it comes in the form of an annoying dialog box, too often minimized again and again, indicating that some new version of Microsoft Office, Windows, or some other software is ready to install. Sometimes, code patches itself in the background without bothering the user. Whatever the mechanism, updating software makes sense, as it usually does improve security.2 Hackers working for the GRU, Russia’s military intelligence agency, turned that notion on its head in 2017.

The reference to Moscow comes from Zetter, “Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid.” 11. Dragos, “CRASHOVERRIDE: Analysis of the Threat to Electric Grid Operations,” Dragos report, June 13, 2017, 10. 12. Andy Greenberg, Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers (New York: Doubleday, 2019), 130. 13. For more on the notion of sophistication in cyber operations, see Ben Buchanan, “The Legend of Sophistication in Cyber Operations,” Belfer Center for Science and International Affairs, January 2017. 14. Rebecca Smith, “Cyberattacks Raise Alarm for U.S. Power Grid,” Wall Street Journal, December 30, 2016. 15.

., Cyber War in Perspective: Russian Aggression against Ukraine (Tallinn, Estonia: NATO Cooperative Cyber Defence Center of Excellence, 2015), ch. 6; Ben Buchanan and Michael Sulmeyer, “Hacking Chads: The Motivations, Threats, and Effects of Electoral Insecurity,” paper, Cyber Security Project, Belfer Center for Science and International Affairs, October 2016; Mark Clayton, “Ukraine Election Narrowly Avoided ‘Wanton Destruction’ from Hackers,” Christian Science Monitor, June 17, 2014; Andy Greenberg, Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers (New York: Doubleday, 2019): 46–47. 4. Ryan Naraine, “Obama, McCain Campaigns Hacked by ‘Foreign Entity’,” Newsweek, November 5, 2008. 5. Mark Halperin and John Heilemann, “The Hunt for Pufferfish: A Double Down Excerpt,” Time, November 2, 2013. 6. Jens Gluesing, Laura Poitras, Marcel Rosenbach, and Holger Stark, “Fresh Leak on US Spying: NSA Accessed Mexican President’s Email,” Der Spiegel, October 20, 2013.


System Error by Rob Reich

"Friedman doctrine" OR "shareholder theory", "World Economic Forum" Davos, 2021 United States Capitol attack, A Declaration of the Independence of Cyberspace, Aaron Swartz, AI winter, Airbnb, airport security, Alan Greenspan, Albert Einstein, algorithmic bias, AlphaGo, AltaVista, artificial general intelligence, Automated Insights, autonomous vehicles, basic income, Ben Horowitz, Berlin Wall, Bernie Madoff, Big Tech, bitcoin, Blitzscaling, Cambridge Analytica, Cass Sunstein, clean water, cloud computing, computer vision, contact tracing, contact tracing app, coronavirus, corporate governance, COVID-19, creative destruction, CRISPR, crowdsourcing, data is the new oil, data science, decentralized internet, deep learning, deepfake, DeepMind, deplatforming, digital rights, disinformation, disruptive innovation, Donald Knuth, Donald Trump, driverless car, dual-use technology, Edward Snowden, Elon Musk, en.wikipedia.org, end-to-end encryption, Fairchild Semiconductor, fake news, Fall of the Berlin Wall, Filter Bubble, financial engineering, financial innovation, fulfillment center, future of work, gentrification, Geoffrey Hinton, George Floyd, gig economy, Goodhart's law, GPT-3, Hacker News, hockey-stick growth, income inequality, independent contractor, informal economy, information security, Jaron Lanier, Jeff Bezos, Jim Simons, jimmy wales, job automation, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, John Perry Barlow, Lean Startup, linear programming, Lyft, Marc Andreessen, Mark Zuckerberg, meta-analysis, minimum wage unemployment, Monkeys Reject Unequal Pay, move fast and break things, Myron Scholes, Network effects, Nick Bostrom, Northpointe / Correctional Offender Management Profiling for Alternative Sanctions, NP-complete, Oculus Rift, OpenAI, Panopticon Jeremy Bentham, Parler "social media", pattern recognition, personalized medicine, Peter Thiel, Philippa Foot, premature optimization, profit motive, quantitative hedge fund, race to the bottom, randomized controlled trial, recommendation engine, Renaissance Technologies, Richard Thaler, ride hailing / ride sharing, Ronald Reagan, Sam Altman, Sand Hill Road, scientific management, self-driving car, shareholder value, Sheryl Sandberg, Shoshana Zuboff, side project, Silicon Valley, Snapchat, social distancing, Social Responsibility of Business Is to Increase Its Profits, software is eating the world, spectrum auction, speech recognition, stem cell, Steve Jobs, Steven Levy, strong AI, superintelligent machines, surveillance capitalism, Susan Wojcicki, tech billionaire, tech worker, techlash, technoutopianism, Telecommunications Act of 1996, telemarketer, The Future of Employment, TikTok, Tim Cook: Apple, traveling salesman, Triangle Shirtwaist Factory, trolley problem, Turing test, two-sided market, Uber and Lyft, uber lyft, ultimatum game, union organizing, universal basic income, washing machines reduced drudgery, Watson beat the top human players on Jeopardy!, When a measure becomes a target, winner-take-all economy, Y Combinator, you are the product

., 15, 17 protecting celebrities from stalkers, 111–12 women and dark-skinned people, 113 factory farming as a success disaster, 20–21 Factory Investigating Commission, New York, 55 fairness, xxxiii, 20, 73, 88–94, 97, 99, 101, 103, 104, 106–8, 166, 237 Family Educational Rights and Privacy Act (FERPA), 140 famines as man-made political disasters, 74 Federal Bureau of Investigation (FBI), 128–29, 134–35 Federal Communications Commission (FCC), 58, 228 Federal Constitutional Court of Germany, 143 Federal Trade Commission (FTC), 118, 150–51, 228, 253 financial sector, 163–64, 254–55 First Amendment of the Constitution of the United States, 189, 191–92, 214, 216, 217 Flexner, Abraham, 244–45 Floyd, George, murder of, 69 Foot, Philippa, 155 Ford Pinto’s design flaw, 36–37 Foster, Bill, 52 Foucault, Michel, 122–23 free speech and the internet, 187–230 overview, 187–91 beyond self-regulation, 216–21 Christchurch, New Zealand, terrorist attack livestreamed, 189 collision of free speech with democracy and dignity, 198–202 creating a more competitive marketplace, 227–30 exceptions to free speech, 217 foreign interests with election-related advertising as an exception, 225 the future of platform immunity, 221–26 hate speech, 187–91, 200–201, 218 online efforts to regulate speech, 219–21 speech and its consequences, 191–97 Twitter’s suspension of Trump, xi-xii, 187–88 See also creating an alternative future freedom of expression, 198–99 Furman, Jason, 184 Galetti, Beth, 79–80, 99 Gates, Bill, 183 Gebru, Timnit, 112–13, 250 gender bias in recruiting system, 81–82, 83, 100–1 General Data Protection Regulation (GDPR), 142–45, 147, 149, 238, 241, 255 Germany, 143, 217–18 Gibbons, Jack, 258 gig economy workers, 47–49 Gillibrand, Kirsten, 151 Gingrich, Newt, 259 Glickman, Aaron, 243 Go, AI playing, 157 goals, of algorithmic models, 15–16, 18–21, 34–37 “Goals Gone Wild” (Ordóñez), 34–37 Gonzalez, Lorena, 48, 95 Goodhart’s Law, 19 Goodrow, Cristos, 33–34 Google AI ethics board dissolved, 166 data mining, 117 differential privacy technology used by, 131–32 employees protest sale of AI tech, 17 engineers actively unionizing, 180 European Commission lawsuit against, 136 Founders’ Award, 28 Gebru, firing of, 250 Google Buzz launch, 120 management by OKRs, 32–33 market dominance of, 227, 228 OpenSocial specification, 256 partnership with Apple, 113, 141 Pichai appears before House committee, 64–65 state attorneys general filing suit against, 253 Google Buzz, 120 Gore, Al, 59–60 governance, 66–68, 69–72, 105–7, 263–64 government AI-related taxes on businesses, 182–84 Clipper Chip technology, 115–16 companies helping to manage consequences of AI, 184 creating an agency responsible for citizen privacy rights, 150–51 data collection by public institutions, 140–42, 151 developing a new relationship with tech sector, 241 legitimacy of, 68 reasons for involvement in free speech on the internet, 221–26 tax-related subsidies for businesses, 179 See also regulations GPT-2 and GPT-3, OpenAI’s language models, 233–37 greedy algorithms, 12–13 Greenspan, Alan, 61 gross domestic product (GDP), 173 Group Insurance Commission (GIC) of Massachusetts, 130 Grove, Andy, 51 “Guerrilla Open Access Manifesto,” xxii–xxiii Hacker News website, 8 hackers computer scientists as, 21–22 Hacker News, 8 influencing political arena, 46 iPhones’ back door as a challenge to, 135 life hacking website, 14 marriage of capitalists and, 28, 52, 68 Hall, Margeret, 250 happiness in life, importance of, 167, 168 Harvard University Data Privacy Lab, 130–31 Hashemi, Madhi, 250 Hastings, Reed, 5–6 hate speech, 187–91, 200–201, 218, 224–25 Hawley, Josh, 223 Health Insurance Portability and Accountability Act of 1996 (HIPAA), 129, 140, 246 hedge funds using AI, 163–64 Hertzberg, Robert, 95 High Bar for Talent, Amazon’s, 79–80 High Performance Computing and Communications Act (1991), 59–60 Hinton, Geoff, 164 Hoffman, Reid, xxviii, 39, 51–52 Holmes, Elizabeth, xxx Holt, Rush, 52 Hong Kong protests in 2019, 125 Hooked on Phonics, 150 Horowitz, Ben, 42 Houghton, Amo, 259 Human Development Index (HDI), 173 human intelligence compared to machine intelligence, 158–59.

The wafer is revealed in the final scenes to be produced from human flesh, and the dystopia of overpopulation turns out to be an even greater horror in which cannibalism is the only way to survive. Rhinehart never claimed to be a branding genius. Despite this, his blog post attracted attention. It was especially popular on a site called Hacker News, a place for the tech community to learn about clever inventions and gizmos to make life better and save time. Rhinehart saw an entrepreneurial opportunity, and he posted about Soylent on a crowdfunding site, promising to deliver a week’s worth of Soylent in return for a modest donation of $65.

Software Engineering Code of Ethics: Don Gotterbarn, Keith Miller, and Simon Rogerson, “Software Engineering Code of Ethics,” Communications of the ACM 40, no. 11 (November 1, 1997): 110–18, https://doi.org/10.1145/265684.265699. As Jack Dorsey lamented: Lauren Jackson and Desiree Ibekwe, “Jack Dorsey on Twitter’s Mistakes,” New York Times, August 19, 2020, https://www.nytimes.com/2020/08/07/podcasts/the-daily/Jack-dorsey-twitter-trump.html. “Suppose somebody like Hitler”: Michael Specter, “The Gene Hackers,” New Yorker, November 8, 2015, https://www.newyorker.com/magazine/2015/11/16/the-gene-hackers. called for responsible publication guidelines: Rebecca Crootof, “Artificial Intelligence Research Needs Responsible Publication Norms,” Lawfare, October 24, 2019, https://www.lawfareblog.com/artificial-intelligence-research-needs-responsible-publication-norms; Miles Brundage et al., The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation (Oxford: Future of Humanity Institute, 2018), https://maliciousaireport.com/.


pages: 444 words: 127,259

Super Pumped: The Battle for Uber by Mike Isaac

"Susan Fowler" uber, "World Economic Forum" Davos, activist fund / activist shareholder / activist investor, Airbnb, Albert Einstein, always be closing, Amazon Web Services, Andy Kessler, autonomous vehicles, Ayatollah Khomeini, barriers to entry, Bay Area Rapid Transit, Benchmark Capital, Big Tech, Burning Man, call centre, Cambridge Analytica, Chris Urmson, Chuck Templeton: OpenTable:, citizen journalism, Clayton Christensen, cloud computing, corporate governance, creative destruction, data science, Didi Chuxing, don't be evil, Donald Trump, driverless car, Elon Musk, end-to-end encryption, fake news, family office, gig economy, Google Glasses, Google X / Alphabet X, Greyball, Hacker News, high net worth, hockey-stick growth, hustle culture, impact investing, information security, Jeff Bezos, John Markoff, John Zimmer (Lyft cofounder), Kevin Roose, Kickstarter, Larry Ellison, lolcat, Lyft, Marc Andreessen, Marc Benioff, Mark Zuckerberg, Masayoshi Son, mass immigration, Menlo Park, Mitch Kapor, money market fund, moral hazard, move fast and break things, Network effects, new economy, off grid, peer-to-peer, pets.com, Richard Florida, ride hailing / ride sharing, Salesforce, Sand Hill Road, self-driving car, selling pickaxes during a gold rush, shareholder value, Shenzhen special economic zone , Sheryl Sandberg, side hustle, side project, Silicon Valley, Silicon Valley startup, skunkworks, Snapchat, SoftBank, software as a service, software is eating the world, South China Sea, South of Market, San Francisco, sovereign wealth fund, special economic zone, Steve Bannon, Steve Jobs, stock buybacks, super pumped, TaskRabbit, tech bro, tech worker, the payments system, Tim Cook: Apple, Travis Kalanick, Uber and Lyft, Uber for X, uber lyft, ubercab, union organizing, upwardly mobile, Vision Fund, WeWork, Y Combinator

Why would a ride-hailing app need access to their customers’ text messages or camera? It was seen as a broad overreach into users’ privacy. Not only was Uber willing to go after journalists, but the company also wanted to know everything about you and your phone. The blog post blew up. After circulating across security forums and other internet sites, it landed on Hacker News, a message forum widely read by engineers and the Silicon Valley elite. What those readers didn’t know was that the armchair hacker had stumbled upon the secret InAuth code library, written inside of the Uber app as part of their secret deal. In order to fingerprint devices, InAuth required far more data than the average smartphone app, which meant asking for all sort of extended permissions.

Hackers being hackers, the App Store moderators saw all sorts of little tricks and shortcuts inside the code of apps in the store, some worse than others. Uber’s constant sleight of hand was a pain, but relying on the App Store team to police them was worth the resources. But things went downhill fast at the end of 2014. App Store leaders had seen the Hacker News post where Uber’s Android app had been decompiled and exposed for the data-sucking beast that it was. Sure enough, Uber’s iOS app was asking for the same types of permissions as well. Uber’s “fingerprinting” solution wasn’t going to fly. As the holidays approached and engineers rushed to get their code approved before everyone took off for vacation, Apple began rejecting Uber’s attempts to push the fingerprinting techniques inside the iOS app.

Chapter 16: THE APPLE PROBLEM 156 BuzzFeed ran its story: Ben Smith, “Uber Executive Suggests Digging Up Dirt on Journalists,” BuzzFeedNews, November 17, 2014, https://www.buzzfeednews.com/article/bensmith/uber-executive-suggests-digging-up-dirt-on-journalists. 156 an enterprising young hacker: Average Joe, “What the Hell Uber? Uncool Bro.,” Gironsec (blog), November 25, 2014, https://www.gironsec.com/blog/2014/11/what-the-hell-uber-uncool-bro/. 156 it landed on Hacker News: “Permissions Asked for by Uber Android App,” Y Combinator, November 25, 2014, https://news.ycombinator.com/item?id=8660336. Chapter 17: “THE BEST DEFENSE . . .” 165 Kalanick also held court over “Hell”: Amir Efrati, “Uber’s Top Secret ‘Hell’ Program Exploited Lyft’s Vulnerability,” The Information, April 12, 2017, https://www.theinformation.com/articles/ubers-top-secret-hell-program-exploited-lyfts-vulnerability. 166 Those programs fell under: Kate Conger, “Uber’s Massive Scraping Program Collected Data About Competitors Around The World.”


From Satori to Silicon Valley: San Francisco and the American Counterculture by Theodore Roszak

Buckminster Fuller, germ theory of disease, global village, Hacker News, Haight Ashbury, Internet Archive, Marshall McLuhan, megastructure, Menlo Park, Murray Bookchin, Norbert Wiener, Silicon Valley, Steven Levy, Stewart Brand, upwardly mobile, Whole Earth Catalog

The connections between these two seemingly contradictory aspects of the movement 15 are fascinating to draw out and ponder - especially since both wings of came the conterculture Bay Area than any place here in the San Francisco else. This found is ter) its where the Zen-Taoist impulse arose and example, (for be more fully unfolded to San Francisco Zen Cen- in the most studied expression America; in where the mendicant-communitarian urban and rural, found is where the announced its cal energies. hackers new its ecological this is who would both main public examples; presence and And this is lifestyle, first sensibility organized this first its politi- where the inspired young revolutionize Silicon Valley gathered in their greatest numbers. The truth is, if one probes just beneath the surface of the bucolic hippy image, one finds this puzzling infatuation with certain forms of outre technology reaching well back into the early I first became aware of its when I realized knew during that presence that the countercultural students period were almost exclusively, readers of science fiction.


pages: 216 words: 61,061

Without Their Permission: How the 21st Century Will Be Made, Not Managed by Alexis Ohanian

Airbnb, barriers to entry, carbon-based life, cloud computing, crowdsourcing, digital divide, en.wikipedia.org, Hacker News, Hans Rosling, hiring and firing, hockey-stick growth, independent contractor, Internet Archive, Justin.tv, Kickstarter, Marc Andreessen, Mark Zuckerberg, means of production, Menlo Park, minimum viable product, Occupy movement, Paul Graham, Silicon Valley, Skype, slashdot, social web, software is eating the world, Startup school, TED Talk, Tony Hsieh, unpaid internship, Wayback Machine, Y Combinator, Yochai Benkler

These days, there are so many more of us connected and sharing that it’s nearly impossible for something with any degree of novelty or usefulness to go unnoticed. I’ll break it all down in chapter 5, but the media are everywhere. Incidentally, reddit is a big part of that and was quite a boon for launching hipmunk (’twas all part of the very, very long-term plan!). I asked one of the inbound press requesters how she had heard about us—Hacker News (News.YCombinator.com —a reddit for startup news). Journalists are getting story ideas from us. And why not? The zeitgeist has never been more evident, so it makes sense to write about what we’re already starting to buzz about. This successful launch story is rather typical. Build something people want, launch it to the world, try not to vomit, and see what happens.

Networks like this don’t have to exist within a tech accelerator, but if you can find one that suits both you and your project, you’ll likely find many peers there to learn from and share with. Particularly in the Internet industry, there is a strong desire to distribute knowledge, not lock it up. Reputations are built by those who dish out experience and insight. The knowledge sharing happens online—these days within communities like/r/entrepreneur, /r/startups, and Hacker News as well as on Quora and even Twitter. But don’t get hung up on the particular platforms of the moment; you can find the discussions wherever they’re happening online. And when they’re not happening online, they’re happening off-line, at cafés, bars, and work spaces. Even in an increasingly digital world, there’s still no replacement for quality face time (never turn down cannoli!).


Likewar: The Weaponization of Social Media by Peter Warren Singer, Emerson T. Brooking

4chan, active measures, Airbnb, augmented reality, barriers to entry, battle of ideas, Bellingcat, Bernie Sanders, Black Lives Matter, British Empire, Cambridge Analytica, Cass Sunstein, citizen journalism, Citizen Lab, Comet Ping Pong, content marketing, crony capitalism, crowdsourcing, data science, deep learning, digital rights, disinformation, disintermediation, Donald Trump, drone strike, Edward Snowden, en.wikipedia.org, Erik Brynjolfsson, Evgeny Morozov, fake news, false flag, Filter Bubble, global reserve currency, Google Glasses, Hacker Conference 1984, Hacker News, illegal immigration, information security, Internet Archive, Internet of things, invention of movable type, it is difficult to get a man to understand something, when his salary depends on his not understanding it, Jacob Silverman, John Gilmore, John Markoff, Kevin Roose, Kickstarter, lateral thinking, lolcat, Mark Zuckerberg, megacity, Menlo Park, meta-analysis, MITM: man-in-the-middle, Mohammed Bouazizi, Moneyball by Michael Lewis explains big data, moral panic, new economy, offshore financial centre, packet switching, Panopticon Jeremy Bentham, Parag Khanna, pattern recognition, Plato's cave, post-materialism, Potemkin village, power law, pre–internet, profit motive, RAND corporation, reserve currency, sentiment analysis, side project, Silicon Valley, Silicon Valley startup, Snapchat, social web, South China Sea, Steve Bannon, Steve Jobs, Steven Levy, Stewart Brand, systems thinking, too big to fail, trade route, Twitter Arab Spring, UNCLOS, UNCLOS, Upton Sinclair, Valery Gerasimov, We are Anonymous. We are Legion, We are as Gods, Whole Earth Catalog, WikiLeaks, Y Combinator, yellow journalism, Yochai Benkler

This ethos was on clear display at Hacker News, a popular Silicon Valley forum board, when “Political Detox Week” was announced shortly after the 2016 U.S. presidential election. As the rest of the country struggled to come to terms with the election results, an administrator declared: Political stories are off-topic. Please flag them. Please also flag political threads on non-political stories. For our part, we’ll kill such stories and threads when we see them. Then we’ll watch together to see what happens. Why? Political conflicts cause harm here. The values of Hacker News are intellectual curiosity and thoughtful conversation.

nytmobile=0&_r=0. 222 “You’re so focused”: Deepa Seetharaman, Robert McMillan, and Georgia Wells, “Tone-Deaf: How Facebook Misread America’s Mood on Russia,” Wall Street Journal, March 2, 2018, https://www.wsj.com/articles/tone-deaf-how-facebook-misread-americas-mood-on-russia-1520006034. 222 “Political stories”: “Tell HN: Political Detox Week,” Hacker News, Y Combinator, accessed March 20, 2018, https://news.ycombinator.com/item?id=13108404. This is a fascinating discussion thread that digs deep into the Silicon Valley zeitgeist. 222 “If we could use code”: Authors’ interview with senior social media company official, Washington, DC, July 14, 2016. 223 pleas from Ukrainian activists: Volodymyr Scherbachenko, “We Support Ukraine on Facebook!

. § 230 (1996), 224–25 4 Ds, 107 4chan, 173–74, 187 France, 7–8 Franceschi-Bicchierai, Lorenzo, 268 Franklin, Benjamin, 29 free speech, 145, 228–30, 238, 239, 266–67 Freedom Flotilla, 199 Freedom’s Secret Weapon, 192 #FreeMosul, 10–11 #FreeTibet, 141 Friendster, 45 Fuentes Rubio, María del Rosario, 69–70 fundraising, 9, 65, 128, 178 Furie, Matt, 187 future dangerous speech, 266–67 military training for, 258–60 recommendations for, 261–66 responsibility for, 267–73 of social media, 248–57 G Galloway, Scott, 248 Gamergate, 229–30 Gangster Disciples, 12 Garza, Alicia, 163 gaslighting, 116 Gaza City, 193–200 #GazaUnderAttack, 197 #GazaUnderFire, 195 Gen Next, 172 generative adversarial networks, 256–57 generative networks, 254–55 geographical data, 58–59 Gerasimov, Valery, 106 Gerasimov Doctrine, 106–7 Germany Center of Defense Against Disinformation, 211 communication in World War I, 181 cybersecurity, 241 propaganda in World War II, 7–8 refugees and, 206–7 Ghonim, Wael, 85 Giesea, Jeff, 192 Gilmore, John, 83 Gingrich, Newt, 142 Goebbels, Joseph, 32–33, 192 Golden Shield Project, 96–97 Google ISIS and, 152, 236–37 laws governing, 225 origin of, 40, 219 profits, 119 regulation, 228 searches, 45 transparency reports, 232 See also YouTube Google Brain project, 249 Google Maps, 63, 72 Google Play Store, 48 Google Translate, 8 Gore, Al, 39 Gorka, Sebastian, 112 Great Firewall, 96, 102, 184, 253 growth Facebook users, 46 hours spent online, 137 internet use, 39, 44, 51–52, 95 smartphone use, 48 Twitter use, 48–49 Gumbel, Bryant, 24 Gurría, José Ángel, 40–41 Gutenberg, Johannes, 28 GVA Dictator Alert, 75–76 H Haberman, Maggie, 169 Hacker News (forum), 222 hacktivists, 212–13 Hammami, Omar, 160 harassment, online, 227–28, 235, 250–51 harmony, in China, 96, 98, 101 Harper, Stephen, 60 Harrman, John, 134 hasbara, 198, 199–200 Hassan, Ruqia, 70 hate crimes, 238–39 Hayes, Rutherford B., 31 Hearst, William Randolph, 31, 46 Heider, Fritz, 157 Hero with a Thousand Faces, The (Campbell), 159 Herrman, John, 221 Hezbollah, 65 Higgins, Eliot, 72, 75, 109 hijacking hashtags, 141, 152, 195, 231 memes, 191, 192–93 Russia and, 111 Hills, The (TV show), 155, 158 Hitler, Adolf, 33, 76, 186, 259 Hoefflinger, Mike, 222 homophily confirmation bias and, 125–26, 130 consequences, 124–25, 208 definition, 123 during elections, 132–33 Russia and Ukraine, 201–2 of social media companies, 145–46 validation vs. information, 134 honeypot, 115 Howdy Doody Show, The (TV show), 33 Hrabove plane crash, 71 Hu Jintao, 96, 98 Huffman, Steve, 241 Hughes, Seamus, 170 human intelligence (HUMINT), 78 Hurley, Chad, 218 Hussain, Junaid, 148–49, 150, 158, 167–68, 195 hyperlinks, 38 hypertext, 38 hypertext markup language (HTML), 38, 44 hypertext transfer protocol (HTTP), 38 I identity masking technology, 89–90 India, 62–67, 89, 136 Indonesia, 213 influence botnets, 144–45 campaign ads, 178 confirmation bias, 121, 125, 130, 132–33, 137, 208 elections.


pages: 524 words: 120,182

Complexity: A Guided Tour by Melanie Mitchell

Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Albert Einstein, Albert Michelson, Alfred Russel Wallace, algorithmic management, anti-communist, Arthur Eddington, Benoit Mandelbrot, bioinformatics, cellular automata, Claude Shannon: information theory, clockwork universe, complexity theory, computer age, conceptual framework, Conway's Game of Life, dark matter, discrete time, double helix, Douglas Hofstadter, Eddington experiment, en.wikipedia.org, epigenetics, From Mathematics to the Technologies of Life and Death, Garrett Hardin, Geoffrey West, Santa Fe Institute, Gregor Mendel, Gödel, Escher, Bach, Hacker News, Hans Moravec, Henri Poincaré, invisible hand, Isaac Newton, John Conway, John von Neumann, Long Term Capital Management, mandelbrot fractal, market bubble, Menlo Park, Murray Gell-Mann, Network effects, Norbert Wiener, Norman Macrae, Paul Erdős, peer-to-peer, phenotype, Pierre-Simon Laplace, power law, Ray Kurzweil, reversible computing, scientific worldview, stem cell, Stuart Kauffman, synthetic biology, The Wealth of Nations by Adam Smith, Thomas Malthus, Tragedy of the Commons, Turing machine

ConsumerAffairs.com, August 13, 2007, [http://www.consumeraffairs.com/news04/ 2007/08/lax_computers.html]; and Schwartz, J., “Who Needs Hackers?” New York Times, September 12, 2007. “Long-Term Capital Management”: see, e.g., Government Accounting Office, Long-Term Capital Management: Regulators Need to Focus Greater Attention on Systemic Risk. Report to Congressional Request, 1999, [http://www.gao.gov/cgi-bin/getrpt?GGD-00-3]; and Coy, P., Woolley, S., Spiro, L. N., and Glasgall, W., Failed wizards of Wall Street. Business Week, September 21, 1998. “The threat is complexity itself”: Andreas Antonopoulos, quoted in Schwartz, J., “Who Needs Hackers?” New York Times, September 12, 2007. “Self-Organized Criticality”: for an introduction to SOC, see Bak, P., How Nature Works: The Science of Self-Organized Criticality.

., Ferguson, N. M., Nyamukapa, C. A., Anderson, R. M., Johnson, A. M., and Garnett, G. P. Scale-free networks and sexually transmitted diseases: A description of observed patterns of sexual contacts in Britain and Zimbabwe. Sexually Transmitted Diseases, 31(6), 2004, pp. 380–387. Schwartz, J. Who needs hackers? New York Times, September 12, 2007. Selvam, A. M. The dynamics of deterministic chaos in numerical weather prediction models. Proceedings of the American Meteorological Society, 8th Conference on Numerical Weather Prediction, Baltimore, MD, 1988. Shalizi, C. Networks and Netwars, 2005. Essay at [http://www.cscs.umich.edu/~crshalizi/weblog/347.html].


pages: 226 words: 65,516

Kings of Crypto: One Startup's Quest to Take Cryptocurrency Out of Silicon Valley and Onto Wall Street by Jeff John Roberts

4chan, Airbnb, Alan Greenspan, altcoin, Apple II, Bernie Sanders, Bertram Gilfoyle, Big Tech, bitcoin, blockchain, Blythe Masters, Bonfire of the Vanities, Burning Man, buttonwood tree, cloud computing, coronavirus, COVID-19, creative destruction, Credit Default Swap, cryptocurrency, democratizing finance, Dogecoin, Donald Trump, double helix, driverless car, Elliott wave, Elon Musk, Ethereum, ethereum blockchain, family office, financial engineering, Flash crash, forensic accounting, hacker house, Hacker News, hockey-stick growth, index fund, information security, initial coin offering, Jeff Bezos, John Gilmore, Joseph Schumpeter, litecoin, Marc Andreessen, Mark Zuckerberg, Masayoshi Son, Menlo Park, move fast and break things, Multics, Network effects, offshore financial centre, open borders, Paul Graham, Peter Thiel, Ponzi scheme, prediction markets, proprietary trading, radical decentralization, ransomware, regulatory arbitrage, reserve currency, ride hailing / ride sharing, Robert Shiller, rolodex, Ross Ulbricht, Sam Altman, Sand Hill Road, Satoshi Nakamoto, sharing economy, side hustle, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, smart contracts, SoftBank, software is eating the world, Startup school, Steve Ballmer, Steve Jobs, Steve Wozniak, transaction costs, Vitalik Buterin, WeWork, work culture , Y Combinator, zero-sum game

Mow’s criticism was civil, if barely. Brian faced far cruder criticisms on social media and on Reddit, a site he read religiously. Unlike most of Silicon Valley, he did not keep up with Techmeme or TechCrunch, two websites that served up industry news and gossip. Brian preferred the hurly-burly of Reddit and Hacker News, sites that encouraged vis-itors to share headlines and yammer on about their favorite topics, including cryptocurrency. Since the start of Coinbase, Brian and Fred had been eager participants in these debates—explaining and defending the company’s decisions and chatting with fans and critics alike.

See Zhao, Changpeng DAO (Decentralized Autonomous Organization), 90–93, 145–146, 169–170 dApps, 188 Davenport, Ben, 57 decentralized finance (DeFi), 217–218 Dentacoin, 138 Dewitt, Dorothy, 224 Digital Asset, 104, 105 Digital Gold (Popper), 23 Dimon, Jamie, 103, 138, 211–213 diversity, 225 Dixon, Chris, 69, 93, 124, 157, 216 Dogecoin, 54, 181–182 Dorman, Jeff, 105–106 Draper, Tim, 167 Dread Pirate Roberts, 31, 59, 122 Earn.com, 186–187 Ehrsam, Fred, 10–14 on Ethereum and smart contracts, 93–95 on the future, 220, 225–226 the hedger and, 174 Olaf hired by, 28–29 Electronic Frontier Foundation, 100 electronic market makers, 192 Elliott Wave Theory, 151 enterprise blockchain, 73 ether, 92–93 Ethereum, 84, 87–97 Binance and, 182 blockchain issues in, 202 flash crash of, 139–141 hard fork at, 91–93 market caps of, 203 popularity of, 134–139 value of, 152 Ethereum Classic, 196 Facebook, 63, 64 Project Libra, 205–207 Winklevoss twins and, 114–115 Farmer, David, 159, 175 Federal Bureau of Investigation, 59–60, 126–127 Federal Reserve, 12, 53, 212 Federal Reserve Bank of New York, 102 Fidelity, 209–210 Financial Crimes Enforcement Network, 126 Financial Times, 136–137 Finney, Hal, 23 flash crashes, 139–141 Forbes magazine, 148 Force, Carl Mark, IV, 59–60 Fortune magazine, 206 Founder’s Fund, 166–167 Freeman, Kristian, 153 Galaxy Digital, 172 Garlinghouse, Brad, 224 GDAX (Global Digital Asset Exchange), 96–97, 101–103 flash crash in, 139–141 professional traders and, 113–117 Gemini, 97, 105, 116–117 Gemini Dollar, 205 geo-fencing, 40 Gilmore, John, 100 Give Crypto, 175 Goldman Sachs, 11–12, 37, 104, 171, 212 on bitcoin, 225 Elliott Wave Theory at, 151 Google, 40, 64, 157, 195–196 Google Ventures, 204 Graham, Paul, 36 Grayscale, 54 Grayscale Bitcoin Trust, 208 Hacker News, 78 Hacking Team, 197 Hammell, Craig, 38, 64 on adding currencies, 181–182 on Hirji, 191 on infrastructure, 155–156 Hanyecz, Laszlo, 22 hard forks, 92, 147 Haun, Katie, 17–18, 20, 155, 225 as Coinbase ally, 49 cryptocurrency expertise of, 59–60 on prosecuting bitcoin, 24, 31 at Stanford, 107, 218 Hearn, Mike, 76 hedge funds, 96, 172 Heroku, 156 hijackers, 142–143 Hilton, Paris, 144–145 Hirji, Asiff, 157–158, 173–175, 209 on Binance, 183 departure of, 198–199 on Earn.com, 187 on the future of crypto, 216–217 Srinivasan and, 193–200 style and personality of, 190–193 Hirschman, Albert, 48, 185 “hockey stick growth,” 51–52 hodlers, 83–84 HoweyCoin, 168–169 IBM, 90, 216 ICOs (initial coin offerings), 135–138 Binance and, 179 HoweyCoin and, 168–170 SEC on, 145–146, 168–170 swindles around, 141–145 impulse wave pattern, 151 infrastructure, 75–84, 155–159, 209–210 insider trading, 160 Internal Revenue Service, 121–126, 173 Jobs, Steve, 7, 99, 109, 111 JPM Coin, 212 JPMorgan Chase, 103, 104, 138, 211 Karpelès, Mark, 55–58 Knight, Phil, 39 KodakCoin, 167 Kraken, 96–97, 114 Lamborghinis, 146–147, 167 Langschaedel, Julian, 39 Lawsky, Benjamin, 127 Lee, Bobby, 82 Lee, Charlie, 39–40, 54, 80–81, 88 in Beijing, 81–83 departure of from Coinbase, 117–118 on infrastructure, 156 Litecoin and, 223 on Mt.


pages: 56 words: 16,788

The New Kingmakers by Stephen O'Grady

AltaVista, Amazon Web Services, barriers to entry, cloud computing, correlation does not imply causation, crowdsourcing, David Heinemeier Hansson, DevOps, Hacker News, Jeff Bezos, Khan Academy, Kickstarter, Marc Andreessen, Mark Zuckerberg, Netflix Prize, Paul Graham, Ruby on Rails, Silicon Valley, Skype, software as a service, software is eating the world, Steve Ballmer, Steve Jobs, The future is already here, Tim Cook: Apple, Y Combinator

Businesses that wish to engage developers need to reach out to the developers rather than wait for the developers to approach them of their own accord. Understand where the conversations are happening: in many communities it’s Internet Relay Chat (IRC), in others it might be listservs. Broader, less community-centric conversations are happening every minute at developer-centric destinations like Hacker News and Reddit Programming. Part of your developer marketing effort must be listening to channels like these, either directly or through third parties, be they human or algorithm. From an outbound perspective, marketing materials should consist primarily of either code or documentation. MindTouch, for example, argues that documentation represents potential profit, rather than a cost, because it’s not a finely crafted mess of marketing jargon—documentation is legitimately useful from a developer’s perspective.


pages: 252 words: 78,780

Lab Rats: How Silicon Valley Made Work Miserable for the Rest of Us by Dan Lyons

"Friedman doctrine" OR "shareholder theory", "Susan Fowler" uber, "World Economic Forum" Davos, Airbnb, Amazon Robotics, Amazon Web Services, antiwork, Apple II, augmented reality, autonomous vehicles, basic income, Big Tech, bitcoin, blockchain, Blue Ocean Strategy, business process, call centre, Cambridge Analytica, Clayton Christensen, clean water, collective bargaining, corporate governance, corporate social responsibility, creative destruction, cryptocurrency, data science, David Heinemeier Hansson, digital rights, Donald Trump, Elon Musk, Ethereum, ethereum blockchain, fake news, full employment, future of work, gig economy, Gordon Gekko, greed is good, Hacker News, hiring and firing, holacracy, housing crisis, impact investing, income inequality, informal economy, initial coin offering, Jeff Bezos, job automation, job satisfaction, job-hopping, John Gruber, John Perry Barlow, Joseph Schumpeter, junk bonds, Kanban, Kevin Kelly, knowledge worker, Larry Ellison, Lean Startup, loose coupling, Lyft, Marc Andreessen, Mark Zuckerberg, McMansion, Menlo Park, Milgram experiment, minimum viable product, Mitch Kapor, move fast and break things, new economy, Panopticon Jeremy Bentham, Parker Conrad, Paul Graham, paypal mafia, Peter Thiel, plutocrats, precariat, prosperity theology / prosperity gospel / gospel of success, public intellectual, RAND corporation, remote working, RFID, ride hailing / ride sharing, Ronald Reagan, Rubik’s Cube, Ruby on Rails, Sam Altman, San Francisco homelessness, Sand Hill Road, scientific management, self-driving car, shareholder value, Sheryl Sandberg, Silicon Valley, Silicon Valley startup, six sigma, Skinner box, Skype, Social Responsibility of Business Is to Increase Its Profits, SoftBank, software is eating the world, Stanford prison experiment, stem cell, Steve Jobs, Steve Wozniak, Stewart Brand, stock buybacks, super pumped, TaskRabbit, tech bro, tech worker, TechCrunch disrupt, TED Talk, telemarketer, Tesla Model S, Thomas Davenport, Tony Hsieh, Toyota Production System, traveling salesman, Travis Kalanick, tulip mania, Uber and Lyft, Uber for X, uber lyft, universal basic income, web application, WeWork, Whole Earth Catalog, work culture , workplace surveillance , Y Combinator, young professional, Zenefits

Some manager reads a book about Agile and decides to give it a shot—he’s the mad scientist, and you, the people who work for him, are his lab rats. Imagine your next-door neighbor doing an emergency appendectomy on you, using a Swiss Army knife and reading the instructions from a website, and you get the idea. Cries for help abound on Internet forums, like this one posted in 2013 on Hacker News, a website popular among coders: “I can’t take this Agile crap any longer. It’s lunacy. It has all the hall marks [sic] of a religion. A lot of literature, a lot of disciples, hoards [sic] of money grabbing snake oil selling evangelists, and no evidence at all that it works. In fact, as far as I can see, there’s more evidence that it doesn’t work.”

Fortune, February 22, 2018. http://fortune.com/2018/02/22/lean-startup-eric-ries. Lepore, Jill. “Not So Fast: Scientific Management Started as a Way to Work. How Did It Become a Way of Life?” New Yorker, October 12, 2009. https://www.newyorker.com/magazine/2009/10/12/not-so-fast. “Poor Man’s Agile: Scrum in 5 Simple Steps.” Hacker News. Last modified March 22, 2013. https://news.ycombinator.com/item?id=5406384. “Who Should the Scrum Master Report To?” Illustrated Agile. Last modified May 8, 2014. http://illustratedagile.com/2014/05/08/scrum-master-report. Wieczner, Jen. “GE CEO Jeff Immelt’s Retirement Pay May Be a Lot More than You Think.”


pages: 317 words: 84,400

Automate This: How Algorithms Came to Rule Our World by Christopher Steiner

23andMe, Ada Lovelace, airport security, Al Roth, algorithmic trading, Apollo 13, backtesting, Bear Stearns, big-box store, Black Monday: stock market crash in 1987, Black-Scholes formula, call centre, Charles Babbage, cloud computing, collateralized debt obligation, commoditize, Credit Default Swap, credit default swaps / collateralized debt obligations, delta neutral, Donald Trump, Douglas Hofstadter, dumpster diving, financial engineering, Flash crash, G4S, Gödel, Escher, Bach, Hacker News, High speed trading, Howard Rheingold, index fund, Isaac Newton, Jim Simons, John Markoff, John Maynard Keynes: technological unemployment, knowledge economy, late fees, machine translation, Marc Andreessen, Mark Zuckerberg, market bubble, Max Levchin, medical residency, money market fund, Myron Scholes, Narrative Science, PageRank, pattern recognition, Paul Graham, Pierre-Simon Laplace, prediction markets, proprietary trading, quantitative hedge fund, Renaissance Technologies, ride hailing / ride sharing, risk tolerance, Robert Mercer, Sergey Aleynikov, side project, Silicon Valley, Skype, speech recognition, Spread Networks laid a new fibre optics cable between New York and Chicago, transaction costs, upwardly mobile, Watson beat the top human players on Jeopardy!, Y Combinator

The bot saga on Wall Street offers clues to what’s in store for much of our future world. 2 A BRIEF HISTORY OF MAN AND ALGORITHMS THE HIGH MATH BEHIND THE most brilliant algorithms is currently enjoying a renaissance. There have never been more people who understand it, and there have never been more people working to spread their understanding through discussion and investigation. To see this in action, all one needs to do is head to Y Combinator’s Hacker News message board,1 which has grown into one of the more influential Web sites in the world. Here, hackers, math folk, entrepreneurs, Wall Street programmers, and people who are generally in tune with the waves of the Web come to discuss almost everything. Much of the discussion is about programming, startups, and Silicon Valley.

., 140, 190 Washington, University of, 10, 144 Waterloo, battle of, 121–22 Watson (computer): on Jeopardy, 127, 162 medical diagnoses by, 161–62 weather patterns, 70, 130 Web browsers, 116 Web sites, publishing, 201 Weiland, Ed, 143 WellPoint, 162 Wert, Robert, 181 Western Union, 123 Westminster Abbey, 68 wheat, 157 “While My Guitar Gently Weeps,” 103 Wilson, Fred, 210 Winestein (algorithm), 100 wireless microwave networks, 124–25 World Congress of the Game Theory Society, 147–49 World Health Organization, 158 World Live Music & Distribution, 87 World Poker Tour, 128 World Series, 141 World Series of Poker: 2009, 128 2011, 128 World Trade Center, 11, 39, 42, 43, 44 World War II, 18, 136 writing, by algorithm, 218 Xerox, 189 X-rays, 152, 154 Yahoo!, 188, 213 chats on, 104–5 Yale University, 208 Y Combinator, 9–10, 207 Hacker News message board of, 53 Yelp!, 188 Yorktown Heights, N.Y., 127 You’re Nobody ‘Til Somebody Kills You, 87 YouTube, 188, 199 Zimbra, 200 Zuckerberg, Mark, 198–99, 203, 205, 208 Zuckerman, Gregory, 202 Zynga, 199, 206


pages: 290 words: 87,549

The Airbnb Story: How Three Ordinary Guys Disrupted an Industry, Made Billions...and Created Plenty of Controversy by Leigh Gallagher

Abraham Maslow, Airbnb, Amazon Web Services, barriers to entry, Ben Horowitz, Bernie Sanders, Blitzscaling, cloud computing, crowdsourcing, data science, don't be evil, Donald Trump, East Village, Elon Musk, fixed-gear, gentrification, geopolitical risk, growth hacking, Hacker News, hockey-stick growth, housing crisis, iterative process, Jeff Bezos, John Zimmer (Lyft cofounder), Jony Ive, Justin.tv, Lyft, Marc Andreessen, Marc Benioff, Mark Zuckerberg, medical residency, Menlo Park, Network effects, Paul Buchheit, Paul Graham, performance metric, Peter Thiel, RFID, Salesforce, Sam Altman, Sand Hill Road, Saturday Night Live, sharing economy, Sheryl Sandberg, side project, Silicon Valley, Silicon Valley startup, South of Market, San Francisco, Startup school, Steve Jobs, TaskRabbit, TED Talk, the payments system, Tony Hsieh, traumatic brain injury, Travis Kalanick, uber lyft, Y Combinator, yield management

Living in Los Angeles during graduate school, Zadeh had taken an interest in architecture and in Wright, and now this odd website he’d logged on to from this strange company he’d been hearing so much about was offering the chance to stay in one of Wright’s homes. The next day, when he happened upon a posting on Hacker News by Blecharczyk saying Airbnb was looking for engineers, he e-mailed him. “There was basically a neon sign that said, ‘You have to join this company,’” Zadeh says. By the summer of 2010, there were twenty-five people, give or take, working out of the Rausch Street apartment. The bedrooms had become meeting rooms, and the founders had taken to doing interviews in stairwells, in the bathroom, and on the roof.

They have called often, expressing empathy, support, and genuine concern for my welfare. They have offered to help me recover emotionally and financially, and are working with SFPD to track down these criminals.” Few people knew about the story for almost a month. But then EJ’s post was picked up by Hacker News, and it went viral. Internally, Airbnb was reeling. It had never been through a crisis like this before, and it wasn’t prepared for it. Chesky, Gebbia, and Blecharczyk, the executive team, and the company’s entire customer-service department, including a dozen or so who had flown in from remote posts, were there almost 24/7 in the coming weeks—they pulled in air mattresses, but no one laughed at the irony—and the founders had their entire team of advisers weighing in, too.


pages: 420 words: 94,064

The Revolution That Wasn't: GameStop, Reddit, and the Fleecing of Small Investors by Spencer Jakab

4chan, activist fund / activist shareholder / activist investor, barriers to entry, behavioural economics, Bernie Madoff, Bernie Sanders, Big Tech, bitcoin, Black Swan, book value, buy and hold, classic study, cloud computing, coronavirus, COVID-19, crowdsourcing, cryptocurrency, data science, deal flow, democratizing finance, diversified portfolio, Dogecoin, Donald Trump, Elon Musk, Everybody Ought to Be Rich, fake news, family office, financial innovation, gamification, global macro, global pandemic, Google Glasses, Google Hangouts, Gordon Gekko, Hacker News, income inequality, index fund, invisible hand, Jeff Bezos, Jim Simons, John Bogle, lockdown, Long Term Capital Management, loss aversion, Marc Andreessen, margin call, Mark Zuckerberg, market bubble, Masayoshi Son, meme stock, Menlo Park, move fast and break things, Myron Scholes, PalmPilot, passive investing, payment for order flow, Pershing Square Capital Management, pets.com, plutocrats, profit maximization, profit motive, race to the bottom, random walk, Reminiscences of a Stock Operator, Renaissance Technologies, Richard Thaler, ride hailing / ride sharing, risk tolerance, road to serfdom, Robinhood: mobile stock trading app, Saturday Night Live, short selling, short squeeze, Silicon Valley, Silicon Valley billionaire, SoftBank, Steve Jobs, TikTok, Tony Hsieh, trickle-down economics, Vanguard fund, Vision Fund, WeWork, zero-sum game

Before it had actually finished writing the software, the fledgling company put up a web page inviting people to sign up by leaving their email addresses. Even the list itself became something of a game with people able to see where they were in line to get access to the snazzy new app.[5] Going viral on social media helped make Robinhood a literal overnight success. The influential computer science forum Hacker News, not Reddit, was where a story about Robinhood’s plan to offer smartphone-based, commission-free trading received enough “upvotes” to become number one on the page. The company had fifty thousand potential customers sign up that week. By the time Tenev and Bhatt had an actual app in March 2015, Robinhood already had almost a million customers waiting for it.

., 46–47 commissions, 48–50, 234, 251 zero-dollar, 47, 48–51, 54, 59, 70, 101, 102, 139, 166, 218, 241, 247, 259 Commonstock, 47 Condé Nast, 38 Congress, 206, 230–31 see also House Committee on Financial Services hearing Consumer Federation of America, 29, 241 Consumer Financial Protection Bureau, 42 control, illusion of, 27 Cooperman, Leon, 191 COVID-19 pandemic, ix–xii, xv, 1, 23, 31, 42, 45, 47, 52, 55–57, 62, 68–72, 83, 88, 89, 92, 93, 105, 156, 179, 214, 219, 224, 255, 256 stimulus checks during, 56, 62, 71, 72, 255 Cox, Christopher, 83 Cramer, Jim, 128, 254 Crash of 1929, 42, 150, 233 Crawford, Cindy, 111 Credit Suisse, 60, 128 Crockett, Molly, 39 Cruz, Ted, 197 Cuban, Mark, 191–92 cryptocurrencies, 58, 154, 179 Dogecoin, 19, 152, 154 CXO Advisory Group, 254 D Daily Journal Corporation, 183 Dalio, Ray, 160–61 Damodaran, Aswath, 18, 82, 177–78 Dark Knight, The, 138 DARTs (daily average revenue trades), 59 DeepFuckingValue, see Gill, Keith deep-value investors, 17, 52 demands for goods, 51 democratization of finance, 4, 5, 10, 173, 178, 182, 198, 207, 240, 242–43, 251, 262 dentists, 237, 251 Depression, Great, 48 derivatives, xi, xii, 5, 36, 101 see also options Dian Fossey Gorilla Fund, 135 Dimon, Jamie, 160 Discord, 190 Discover Brokerage, 28 Dogecoin, 19, 152, 154 Doji, 47 dot-com era, 4, 21, 24, 25, 28, 42, 63, 65, 70, 90, 106, 118, 155, 179, 186 Dow Jones Industrial Average, 52, 53, 61, 70, 151, 234, 243 DraftKings, 26, 30 Drew, Daniel, 74 Dunning, David, 28 Dusaniwsky, Ihor, 76, 81, 130, 132, 170 E economic theory, 51 behavioral, 51, 62, 255 Edelman, 143 Egan, Dan, 54, 60, 65, 183 Einhorn, David, 152–53, 158, 166, 253 El-Erian, Mohamed, 199, 205 Elm Partners, 260 Enron, 42, 84–85, 117, 119, 125, 129, 186, 242, 261 Epsilon Theory, 165 eToro, 47, 200 E*Trade, 24, 28, 55, 189, 219 Gill’s account with, 15, 19, 87, 88, 90, 100, 112, 130–31, 136, 141, 147, 171, 212, 230, 232 Eurekahedge, 119 exchange-traded funds, 159, 234 Express, 188 F Facebook, 37–38, 98, 162, 166, 202 Factiva, 127 FactSet, 177 FanDuel, 26 Fannie Mae, 216 Fast Company, 26 FBI, 122 Federal Reserve, 10, 58, 67, 69, 71, 98 Survey of Consumer Finances, 252 Federal Reserve Bank of New York, 83 Fidelity Investments, 8, 25, 27, 221–22, 245 fiduciaries, 13–14, 258 financial advisers, 27, 253–55, 258 see also robo-advisers financial crisis, xi, 6, 8, 10, 21, 28, 58, 63, 69, 70, 78, 83, 143, 199, 204, 215 Financial Industry Regulatory Authority (FINRA), 34–35, 101, 103, 120, 131, 193, 202, 239 Financial Times, 78, 81, 85 FOMO (fear of missing out), 63, 151, 172, 177, 178 Forbes, 9, 234 Ford Motor Company, 82 Forrest Gump, 212 Fortune, 85 4chan, 39, 125 Fox News, 156, 189 Freddie Mac, 216 French, Sally, 45 Fuld, Dick, 80 Futu, 236 G Gallagher, Dan, 240 Galvin, William, 29 gambling, 30–31, 55, 57 lotteries, 62, 239, 241, 242 sports, 26, 30–31, 57 Gamergate, 125 GameStop (GME), GameStop short squeeze, x–xiv, 2, 10, 12, 16, 21, 22, 26, 30, 31, 36, 54, 56, 60, 61, 67, 72, 76, 80, 83, 85, 86, 88, 93–95, 97, 102, 107, 108, 111–15, 122, 125, 127–34, 128–32, 137, 138, 141–49, 152–55, 157, 158, 160, 161, 164, 169–70, 174–78, 180, 185, 188, 189–92, 200, 204, 211–14, 215–17, 221–22, 227–31, 234, 235, 237–40, 242, 249, 252, 262 board members and, 222–23 CEOs and, 224 congressional hearing on, see House Committee on Financial Services hearing Gill and, 14, 15–19, 43–45, 68–69, 90–92, 94, 95, 100–101, 112–14, 130–33, 143–44, 147–48, 154–55, 260 Gill’s Forrest Gump Twitter post on, 212 margin debt and, 58 poll on, 13 Reddit and, 37; see also WallStreetBets thousand-dollar price predicted for, 172–73, 176, 177 Volkswagen squeeze compared to, 77, 78 gamification, 29–31 gamma squeeze, 108, 109, 132, 141, 216, 227–28 General Motors, 151 Generation Z, 21, 26, 56, 88, 143, 162, 236, 246, 255 Gensler, Gary, 207 Gill, Elaine, 171 Gill, Keith (DeepFuckingValue), 1–3, 14, 15–20, 47, 48–49, 52, 73, 87–88, 116, 126, 129, 136, 141–42, 171, 175, 183, 191, 211–14, 218, 219, 222, 227, 230–32, 250 at congressional hearing, 1–3, 14 E*Trade account of, 15, 19, 87, 88, 90, 100, 112, 130–31, 136, 141, 147, 171, 212, 230, 232 Forrest Gump Twitter post of, 212 GameStop and, 14, 15–19, 43–45, 68–69, 90–92, 94, 95, 100–101, 112–14, 130–33, 143–44, 147–48, 154–55, 260 net worth of, 19, 94, 114, 131, 133, 148, 155, 171, 191, 212 YouTube videos of, as Roaring Kitty, 2, 18, 45, 48–49, 92, 130, 133, 144, 171, 174–75, 191, 211, 213 global financial crisis, xi, 6, 8, 10, 21, 28, 58, 63, 69, 70, 78, 83, 143, 199, 204, 215 GME, see GameStop, GameStop short squeeze Goepfert, Jason, 227 Golden State Warriors, 158 Goldman Sachs, 9, 55, 63, 76, 132, 170–71, 178, 219–20, 254 Google, 46, 162, 243 Google Glass, 24 Google Play, 195 gorillas, 135, 225 Graham, Benjamin, 174, 177 Grand Theft Auto V, 97 Great Crash of 1929, 42, 150, 233 Great Depression, 48 Greenfield, Rich, 39, 180 Griffin, Ken, 8, 14, 41, 65, 67, 146, 189, 206–8, 218, 234, 240 at congressional hearing, 9–11, 14, 65 Gross, Bill, 216, 217, 220, 228 Grube, Jim, 114 Grujic, Al, 208–9 H Hacker News, 25 Haghani, Victor, 260–61 Harvard Law School, 220 Harvard University, 80 Hawley, Josh, 198 Hearst, William Randolph, 9 hedge funds, xi, xv, 4, 6–8, 12, 13, 22–24, 56, 67, 68, 73, 75–77, 96, 109, 110–11, 115, 119, 121, 126, 129, 130, 133, 135, 138–39, 141, 143, 146, 157, 170–71, 173, 176, 179–80, 189, 197, 199, 202, 213, 217, 220, 228, 229, 234, 239, 245, 249, 260 and locating a borrow, 72–73 Robinhood’s trading restriction and, 197–99, 206 Volkswagen and, 77–78 WallStreetBets as, 139 hedonic products, 51 Hemingway, Ernest, xiii Hempton, John, 181 herding events, 238 Hertz, 60–61, 255 Hestia Partners, 222–23 Hickey, Mike, 44, 128 high-frequency traders, 236, 238, 243, 247, 258 Robinhood and, 193, 202, 207, 236 Hirst, Damien, 7 HODL-ing, 140, 255–56 homeownership, 71 House Committee on Financial Services hearing, 1–14, 76, 80, 183, 206, 238–40 Gill and, 1–3, 14 Griffin and, 9–11, 14, 65 Huffman and, 11–13, 40, 165–66 Plotkin and, 6–11 Tenev and, 3–6, 11, 14, 32, 40, 65, 206 Washington establishment and, 13–14 Waters’s chairing of, 3, 13 Hsieh, Tony, 89–90 Huffman, Steve, 37–38, 40 at congressional hearing, 11–13, 40, 165–66 Hunt, Ben, 165 I illusion of control, 27 index funds, xv, 4, 6, 125, 191, 235, 242, 244, 245, 251, 254, 256, 257, 259, 260 influencers, 150–68, 170, 210, 246, 249 In Good Company, 87, 171 initial public offerings (IPOs), 63–65, 155 insider trading, 42 Instagram, 162, 166 Intel, 46 Interactive Brokers, 188 interest, 63 compound, 242 short, 76, 92, 93, 106, 108, 113, 121, 132, 133, 140, 164, 169 zero, 58, 72 internet, 22, 163, 258 see also social media Invisibly Realtime Research, 13 iShares, 259 J Jacob, Mary K., 172 Japan, 81 Ja Rule, 197 Jay-Z, 64 JMP Securities, 70, 199 JOBS (Jumpstart Our Business Startups) Act, 13, 246 Jordan, Michael, 8, 111 J.P.


pages: 125 words: 28,222

Growth Hacking Techniques, Disruptive Technology - How 40 Companies Made It BIG – Online Growth Hacker Marketing Strategy by Robert Peters

Airbnb, bounce rate, business climate, citizen journalism, content marketing, crowdsourcing, digital map, fake it until you make it, Google Glasses, growth hacking, Hacker News, Jeff Bezos, Lean Startup, Menlo Park, Network effects, new economy, pull request, revision control, ride hailing / ride sharing, search engine result page, sharing economy, Skype, social bookmarking, TaskRabbit, turn-by-turn navigation, Twitter Arab Spring, ubercab

The site’s programmers engineered the interface so that within 5 minutes of a new user signing on, they were looking at a full graphical picture of the current state of their finances, with advice on how to build their money — all for free. The site was, and is, clean and simple with an easy, short domain name. The early marketing emphasis was on winning the approval of tech savvy reviewers from Tech Crunch and Hacker News who would tout the site’s security and utility, which helped Mint to “go viral.” In conjunction with the main site, Mint dispenses valuable information on personal finance through a companion blog. Instead of dry, boring text, the data is presented in eye-catching and easily understood info graphics that are actually instructional and helped, in the beginning, to spread the word about Mint as both a product and a learning tool.


pages: 371 words: 107,141

You've Been Played: How Corporations, Governments, and Schools Use Games to Control Us All by Adrian Hon

"hyperreality Baudrillard"~20 OR "Baudrillard hyperreality", 4chan, Adam Curtis, Adrian Hon, Airbnb, Amazon Mechanical Turk, Amazon Web Services, Astronomia nova, augmented reality, barriers to entry, Bellingcat, Big Tech, bitcoin, bread and circuses, British Empire, buy and hold, call centre, computer vision, conceptual framework, contact tracing, coronavirus, corporate governance, COVID-19, crowdsourcing, cryptocurrency, David Graeber, David Sedaris, deep learning, delayed gratification, democratizing finance, deplatforming, disinformation, disintermediation, Dogecoin, electronic logging device, Elon Musk, en.wikipedia.org, Ethereum, fake news, fiat currency, Filter Bubble, Frederick Winslow Taylor, fulfillment center, Galaxy Zoo, game design, gamification, George Floyd, gig economy, GitHub removed activity streaks, Google Glasses, Hacker News, Hans Moravec, Ian Bogost, independent contractor, index fund, informal economy, Jeff Bezos, job automation, jobs below the API, Johannes Kepler, Kevin Kelly, Kevin Roose, Kickstarter, Kiva Systems, knowledge worker, Lewis Mumford, lifelogging, linked data, lockdown, longitudinal study, loss aversion, LuLaRoe, Lyft, Marshall McLuhan, megaproject, meme stock, meta-analysis, Minecraft, moral panic, multilevel marketing, non-fungible token, Ocado, Oculus Rift, One Laptop per Child (OLPC), orbital mechanics / astrodynamics, Parler "social media", passive income, payment for order flow, prisoner's dilemma, QAnon, QR code, quantitative trading / quantitative finance, r/findbostonbombers, replication crisis, ride hailing / ride sharing, Robinhood: mobile stock trading app, Ronald Coase, Rubik’s Cube, Salesforce, Satoshi Nakamoto, scientific management, shareholder value, sharing economy, short selling, short squeeze, Silicon Valley, SimCity, Skinner box, spinning jenny, Stanford marshmallow experiment, Steve Jobs, Stewart Brand, TED Talk, The Nature of the Firm, the scientific method, TikTok, Tragedy of the Commons, transaction costs, Twitter Arab Spring, Tyler Cowen, Uber and Lyft, uber lyft, urban planning, warehouse robotics, Whole Earth Catalog, why are manhole covers round?, workplace surveillance

“The Scalar Fallacy,” West Coast Stat Views (on Observational Epidemiology and More), January 5, 2011, http://observationalepidemiology.blogspot.com/2011/01/scalar-fallacy.html; Randall Lucas, August 4, 2014, “It’s the ‘Scalar Fallacy,’” comment on “Hotel Fines $500 for Every Bad Review Posted Online,” Hacker News, https://news.ycombinator.com/item?id=8132525. 73. Rachel Monroe, “How Natural Wine Became a Symbol of Virtuous Consumption,” New Yorker, November 18, 2019, www.newyorker.com/magazine/2019/11/25/how-natural-wine-became-a-symbol-of-virtuous-consumption. 74. Gretchen Reynolds, “Do We Really Need to Take 10,000 Steps a Day for Our Health?”

“Zendesk Support Suite Reviews 2021,” G2, accessed November 28, 2021, www.g2.com/products/zendesk-support-suite/reviews; Christoph Auer-Welsbach, “How Gamification Is Leveling Up Customer Service,” Zendesk Blog, Zendesk, updated September 21, 2021, www.zendesk.com/blog/gamification-leveling-up-customer-service. 92. “Helpdesk Gamification,” Freshdesk, Freshworks, accessed November 28, 2021, https://freshdesk.com/scaling-support/gamification-support-help-desk. 93. @asangha, “The Dystopian World of Software Engineering Interviews,” Hacker News, February 15, 2020, https://news.ycombinator.com/item?id=22331804; Jared Nelsen, “The Horrifically Dystopian World of Software Engineering Interviews,” Blog by Jared Nelsen, February 15, 2020, https://web.archive.org/web/20211123161943/https://www.jarednelsen.dev/posts/The-horrifically-dystopian-world-of-software-engineering-interviews. 94.


pages: 373 words: 112,822

The Upstarts: How Uber, Airbnb, and the Killer Companies of the New Silicon Valley Are Changing the World by Brad Stone

Affordable Care Act / Obamacare, Airbnb, Amazon Web Services, Andy Kessler, autonomous vehicles, Ben Horowitz, Benchmark Capital, Boris Johnson, Burning Man, call centre, Chuck Templeton: OpenTable:, collaborative consumption, data science, Didi Chuxing, Dr. Strangelove, driverless car, East Village, fake it until you make it, fixed income, gentrification, Google X / Alphabet X, growth hacking, Hacker News, hockey-stick growth, housing crisis, inflight wifi, Jeff Bezos, John Zimmer (Lyft cofounder), Justin.tv, Kickstarter, Lyft, Marc Andreessen, Marc Benioff, Mark Zuckerberg, Menlo Park, Mitch Kapor, Necker cube, obamacare, PalmPilot, Paul Graham, peer-to-peer, Peter Thiel, power law, race to the bottom, rent control, ride hailing / ride sharing, Ruby on Rails, San Francisco homelessness, Sand Hill Road, self-driving car, semantic web, sharing economy, side project, Silicon Valley, Silicon Valley startup, Skype, SoftBank, South of Market, San Francisco, Startup school, Steve Jobs, TaskRabbit, tech bro, TechCrunch disrupt, Tony Hsieh, transportation-network company, Travis Kalanick, Uber and Lyft, Uber for X, uber lyft, ubercab, Y Combinator, Y2K, Zipcar

She faintly praised the company for eventually responding to her entreaties, writing that the customer-service team had been “wonderful, giving this crime their full attention.” But she would soon change her tune. EJ’s blog post remained largely unnoticed for a month. Then, in late July, after the financing from Andreessen Horowitz had been made public, the incident became a hot topic of discussion on Hacker News, a popular online bulletin-board site run by Airbnb’s first benefactor, Y Combinator. The site’s users offered their own thoughts about the incident and began a lengthy debate over the honesty of the common man.14 Then, Michael Arrington, the imperious founder and chief blogger of TechCrunch, noticed the thread and wrote an article about the incident titled “The Moment of Truth for Airbnb As User’s Home Is Utterly Trashed.”15 Arrington spoke with Chesky for the article, and Chesky told him that the company knew about the incident and had offered to financially assist EJ, help her find new housing, and do “anything else she can think of to make her life easier.”

EJ, “Violated: A Traveler’s Lost Faith, a Difficult Lesson Learned,” Around the World and Back Again, June 29, 2011, http://ejroundtheworld.blogspot.com/2011/06/violated-travelers-lost-faith-difficult.html. 13. Ibid. 14. Foxit, “Violated: A Traveler’s Lost Faith, a Difficult Lesson Learned,” Hacker News, https://news.ycombinator.com/item?id=2811080. 15. Michael Arrington, “The Moment of Truth for Airbnb As User’s Home Is Utterly Trashed,” TechCrunch, July 27, 2011, http://techcrunch.com/2011/07/27/the-moment-of-truth-for-airbnb-as-users-home-is-utterly-trashed/. 16. EJ, “Airbnb Nightmare: No End in Sight,” Around the World and Back Again, July 28, 2011, http://ejroundtheworld.blogspot.com/2011/07/airbnb-nightmare-no-end-in-sight.html. 17.


pages: 677 words: 206,548

Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It by Marc Goodman

23andMe, 3D printing, active measures, additive manufacturing, Affordable Care Act / Obamacare, Airbnb, airport security, Albert Einstein, algorithmic trading, Alvin Toffler, Apollo 11, Apollo 13, artificial general intelligence, Asilomar, Asilomar Conference on Recombinant DNA, augmented reality, autonomous vehicles, Baxter: Rethink Robotics, Bill Joy: nanobots, bitcoin, Black Swan, blockchain, borderless world, Boston Dynamics, Brian Krebs, business process, butterfly effect, call centre, Charles Lindbergh, Chelsea Manning, Citizen Lab, cloud computing, Cody Wilson, cognitive dissonance, computer vision, connected car, corporate governance, crowdsourcing, cryptocurrency, data acquisition, data is the new oil, data science, Dean Kamen, deep learning, DeepMind, digital rights, disinformation, disintermediation, Dogecoin, don't be evil, double helix, Downton Abbey, driverless car, drone strike, Edward Snowden, Elon Musk, Erik Brynjolfsson, Evgeny Morozov, Filter Bubble, Firefox, Flash crash, Free Software Foundation, future of work, game design, gamification, global pandemic, Google Chrome, Google Earth, Google Glasses, Gordon Gekko, Hacker News, high net worth, High speed trading, hive mind, Howard Rheingold, hypertext link, illegal immigration, impulse control, industrial robot, information security, Intergovernmental Panel on Climate Change (IPCC), Internet of things, Jaron Lanier, Jeff Bezos, job automation, John Harrison: Longitude, John Markoff, Joi Ito, Jony Ive, Julian Assange, Kevin Kelly, Khan Academy, Kickstarter, Kiva Systems, knowledge worker, Kuwabatake Sanjuro: assassination market, Large Hadron Collider, Larry Ellison, Laura Poitras, Law of Accelerating Returns, Lean Startup, license plate recognition, lifelogging, litecoin, low earth orbit, M-Pesa, machine translation, Mark Zuckerberg, Marshall McLuhan, Menlo Park, Metcalfe’s law, MITM: man-in-the-middle, mobile money, more computing power than Apollo, move fast and break things, Nate Silver, national security letter, natural language processing, Nick Bostrom, obamacare, Occupy movement, Oculus Rift, off grid, off-the-grid, offshore financial centre, operational security, optical character recognition, Parag Khanna, pattern recognition, peer-to-peer, personalized medicine, Peter H. Diamandis: Planetary Resources, Peter Thiel, pre–internet, printed gun, RAND corporation, ransomware, Ray Kurzweil, Recombinant DNA, refrigerator car, RFID, ride hailing / ride sharing, Rodney Brooks, Ross Ulbricht, Russell Brand, Salesforce, Satoshi Nakamoto, Second Machine Age, security theater, self-driving car, shareholder value, Sheryl Sandberg, Silicon Valley, Silicon Valley startup, SimCity, Skype, smart cities, smart grid, smart meter, Snapchat, social graph, SoftBank, software as a service, speech recognition, stealth mode startup, Stephen Hawking, Steve Jobs, Steve Wozniak, strong AI, Stuxnet, subscription business, supply-chain management, synthetic biology, tech worker, technological singularity, TED Talk, telepresence, telepresence robot, Tesla Model S, The future is already here, The Future of Employment, the long tail, The Wisdom of Crowds, Tim Cook: Apple, trade route, uranium enrichment, Virgin Galactic, Wall-E, warehouse robotics, Watson beat the top human players on Jeopardy!, Wave and Pay, We are Anonymous. We are Legion, web application, Westphalian system, WikiLeaks, Y Combinator, you are the product, zero day

For the criminal angle, see David Shamah, “Hack Attacks on Infrastructure on the Rise, Experts Say,” Times of Israel, Jan. 30, 2014. 18 President Obama when he noted: Barack Obama, “Remarks by the President on Securing Our Nation’s Cyber Infrastructure,” The White House Office of the Press Secretary, May 29, 2009. 19 Each plays its role: “War in the Fifth Domain,” Economist, July 5, 2010. 20 Let’s not forget two hackers: Phil Lapsley, “The Definitive Story of Steve Wozniak, Steve Jobs, and Phone Phreaking,” Atlantic, Feb. 20, 2013. 21 As time passed, other notable hackers: Kevin D. Mitnick and William L Simon, Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker (New York: Little, Brown, 2012). 22 Poulsen’s ingenious 1990 hack: Jonathan Littman, “The Last Hacker,” Los Angeles Times, Sept. 12, 1993. 23 For example, in October 2013: “Adobe Hack: At Least 38 Million Accounts Breached,” BBC, Oct. 30, 2013. 24 But what changed in that attack: Brian Krebs, “Adobe to Announce Source Code, Customer Data Breach,” Krebs on Security, Oct. 3, 2013. 25 Yep, the company that is selling: Darlene Storm, “AntiSec Leaks Symantec pcAnywhere Source Code After $50K Extortion Not Paid,” Computerworld, Feb. 7, 2012. 26 Traditional organized crime groups: The Hague, Threat Assessment: Italian Organized Crime, Europol Public Information, June 2013; Nir Kshetri, The Global Cybercrime Industry: Economic, Institutional, and Strategic Perspectives (London: Springer, 2010), 1; Chuck Easttom, Computer Crime, Investigation, and the Law (Boston: Cengage Learning, 2010), 206. 27 These newly emerging: Mark Milian, “Top Ten Hacking Countries,” Bloomberg, April 23, 2013. 28 New syndicates: Brian Krebs, “Shadowy Russian Firm Seen as Conduit for Cybercrime,” Washington Post, Oct. 13, 2007; Verisign iDefense, The Russian Business Network: Survey of a Criminal ISP, June 27, 2007. 29 RBN famously provides: Trend Micro, The Business of Cybercrime: A Complex Business Model, Jan. 2010. 30 ShadowCrew operated the now-defunct Web site: Kevin Poulsen, “One Hacker’s Audacious Plan to Rule the Black Market in Stolen Credit Cards,” Wired, Dec. 22, 2008. 31 Founded by the notorious criminal hacker: James Verini, “The Great Cyberheist,” New York Times Magazine, Nov. 10, 2010. 32 The number and reach: John E.

v=mdoD7X8n46Q. 54 Hundreds of victims: Richard Burnett, “Scammers Use Social Networking Info to Target Vacationers’ Relatives: Scams Using Social-Networking Vacation,” Orlando Sentinel, June 22, 2013. 55 In September 2011: Robert Beckhusen, “Mexican Cartels Hang, Disembowel ‘Internet Snitches,’ ” Danger Room (blog), Wired, Sept. 15, 2011. 56 These cartels are equally savvy: Ibid. 57 For example, when two Maricopa County: Mike Levine, “Officials Warn Facebook and Twitter Increase Police Vulnerability,” FoxNews.​com, May 10, 2011. 58 “the on-going investigations”: Josh Halliday and Charles Arthur, “Anonymous’s Release of Met and FBI Call Puts Hacker Group Back Centre Stage,” The Guardian, Feb. 2, 2012. 59 The call was even recorded: Bob Christie, “Ariz. Police Confirm 2nd Hack on Officers’ Email,” MSNBC.​com, June 29, 2011; Mohit Kumar, “77 Law Enforcement Websites Hit in Mass Attack by #Antisec Anonymous,” The Hacker News, July 30, 2011. 60 For instance, in late 2010: “CyberCriminals Use Facebook to Steal Identity of Interpol Chief,” Daily Mail, Sept. 20, 2010. 61 Industrial espionage too has found: Geoff Nairn, “Your Wall Has Ears,” Wall Street Journal, Oct. 19, 2011. 62 we learned about the Massachusetts windturbine: Michael Riley and Ashlee Vance, “Inside the Chinese Boom in Corporate Espionage,” BusinessWeek, Mar. 15, 2012. 63 Armed with all of this information: Joan Lappin, “American Superconductor and Its Rogue Employee Both Duped by Sinovel,” Forbes, Sept. 27, 2011. 64 In one note Karabasevic: Carl Sears and Michael Isikoff, “Chinese Firm Paid Insider ‘to Kill My Company,’ American CEO Says,” NBCNews.​com, Aug. 6, 2013.

You, Too, Can Hack Google Wallet,” Bloomberg Businessweek, Feb. 13, 2012. 32 In another instance: Gabrielle Taylor, “Have an NFC-Enable Phone? This Hack Could Hijack It,” WonderHowTo, accessed July 11, 2014. 33 NFC apps on mobile phones: Lisa Vaas, “Android NFC Hack Lets Subway Riders Evade Fares,” Naked Security, Sept. 24, 2012. 34 They can also intercept data: Kate Murphy, “Protecting a Cellphone Against Hackers,” New York Times, Jan. 25, 2012; Tu C. Neim, “Bluetooth and Its Inherent Security Issues,” SANS Institute InfoSec Reading Room, Nov. 4, 2002. 35 As a result, more of what happens: Catherine Crump and Matthew Harwood, “Invasion of the Data Snatchers: Big Data and the Internet of Things Means the Surveillance of Everything,” Blog of Rights, March 25, 2014. 36 All drivers need to do: “Snapshot Common Questions,” Progressive Web site, http://​www.​progressive.​com/​auto/​snapshot-​common-​questions/. 37 “we and other companies”: Rolfe Winkler, “Google Predicts Ads in Odd Spots Like Thermostats,” Digits (blog), Wall Street Journal, May 21, 2014. 38 In some countries: Brian Brady, “Prisoners ‘to Be Chipped like Dogs,’ ” Independent, Jan. 13, 2008. 39 “3,000 labor hours”: David Rosen, “Big Brother Invades Our Classrooms,” Salon, Oct. 8, 2012. 40 “Students who do not wish”: David Kravets, “Student Suspended for Refusing to Wear a School-Issued RFID Tracker,” Wired, Nov. 21, 2012. 41 Based on nothing more: Aaron Katersky and Josh Haskell, “NY Mom Accused of Growing $3M Marijuana Business,” Good Morning America, June 6, 2013; Glenn Smith, “Marijuana Bust Shines Light on Utilities,” Post and Courier, Jan. 29, 2012. 42 “transformational for clandestine”: Spencer Ackerman, “CIA Chief: We’ll Spy on You Through Your Dishwasher,” Wired, March 15, 2012. 43 The mere plugging in: Neil J.


pages: 482 words: 121,173

Tools and Weapons: The Promise and the Peril of the Digital Age by Brad Smith, Carol Ann Browne

"World Economic Forum" Davos, Affordable Care Act / Obamacare, AI winter, air gap, airport security, Alan Greenspan, Albert Einstein, algorithmic bias, augmented reality, autonomous vehicles, barriers to entry, Berlin Wall, Big Tech, Bletchley Park, Blitzscaling, Boeing 737 MAX, business process, call centre, Cambridge Analytica, Celtic Tiger, Charlie Hebdo massacre, chief data officer, cloud computing, computer vision, corporate social responsibility, data science, deep learning, digital divide, disinformation, Donald Trump, Eben Moglen, Edward Snowden, en.wikipedia.org, Hacker News, immigration reform, income inequality, Internet of things, invention of movable type, invention of the telephone, Jeff Bezos, Kevin Roose, Laura Poitras, machine readable, Mark Zuckerberg, minimum viable product, national security letter, natural language processing, Network effects, new economy, Nick Bostrom, off-the-grid, operational security, opioid epidemic / opioid crisis, pattern recognition, precision agriculture, race to the bottom, ransomware, Ronald Reagan, Rubik’s Cube, Salesforce, school vouchers, self-driving car, Sheryl Sandberg, Shoshana Zuboff, Silicon Valley, Skype, speech recognition, Steve Ballmer, Steve Jobs, surveillance capitalism, tech worker, The Rise and Fall of American Growth, Tim Cook: Apple, Wargames Reagan, WikiLeaks, women in the workforce

Alex Hern, “Macron Hackers Linked to Russian-Affiliated Group Behind US Attack,” Guardian, May 8, 2017, https://www.theguardian.com/world/2017/may/08/macron-hackers-linked-to-russian-affiliated-group-behind-us-attack. Back to note reference 5. Kevin Poulsen and Andrew Desiderio, “Russian Hackers’ New Target: A Vulnerable Democratic Senator,” Daily Beast, July 26, 2018, https://www.thedailybeast.com/russian-hackers-new-target-a-vulnerable-democratic-senator?ref=scroll. Back to note reference 6. Griffin Connolly, “Claire McCaskill Hackers Left Behind Clumsy Evidence That They Were Russian,” Roll Call, August 23, 2018, https://www.rollcall.com/news/politics/mccaskill-hackers-evidence-russian.


pages: 457 words: 128,838

The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the Global Economic Order by Paul Vigna, Michael J. Casey

Airbnb, Alan Greenspan, altcoin, Apple Newton, bank run, banking crisis, bitcoin, Bitcoin Ponzi scheme, blockchain, Bretton Woods, buy and hold, California gold rush, capital controls, carbon footprint, clean water, Cody Wilson, collaborative economy, collapse of Lehman Brothers, Columbine, Credit Default Swap, cross-border payments, cryptocurrency, David Graeber, decentralized internet, disinformation, disintermediation, Dogecoin, driverless car, Edward Snowden, Elon Musk, Ethereum, ethereum blockchain, fiat currency, financial engineering, financial innovation, Firefox, Flash crash, Ford Model T, Fractional reserve banking, Glass-Steagall Act, hacker house, Hacker News, Hernando de Soto, high net worth, informal economy, intangible asset, Internet of things, inventory management, Joi Ito, Julian Assange, Kickstarter, Kuwabatake Sanjuro: assassination market, litecoin, Long Term Capital Management, Lyft, M-Pesa, Marc Andreessen, Mark Zuckerberg, McMansion, means of production, Menlo Park, mobile money, Money creation, money: store of value / unit of account / medium of exchange, Nelson Mandela, Network effects, new economy, new new economy, Nixon shock, Nixon triggered the end of the Bretton Woods system, off-the-grid, offshore financial centre, payday loans, Pearl River Delta, peer-to-peer, peer-to-peer lending, pets.com, Ponzi scheme, prediction markets, price stability, printed gun, profit motive, QR code, RAND corporation, regulatory arbitrage, rent-seeking, reserve currency, Robert Shiller, Ross Ulbricht, Satoshi Nakamoto, seigniorage, shareholder value, sharing economy, short selling, Silicon Valley, Silicon Valley startup, Skype, smart contracts, special drawing rights, Spread Networks laid a new fibre optics cable between New York and Chicago, Steve Jobs, supply-chain management, Ted Nelson, The Great Moderation, the market place, the payments system, The Wealth of Nations by Adam Smith, too big to fail, transaction costs, tulip mania, Turing complete, Tyler Cowen, Tyler Cowen: Great Stagnation, Uber and Lyft, uber lyft, underbanked, Vitalik Buterin, WikiLeaks, Y Combinator, Y2K, zero-sum game, Zimmermann PGP

Either way, the “wallet,” much like an account at a traditional bank, is little more than lines of code, and because of that, online security is an issue. In theory, so long as one of the most important components of that code—the all-important private key that unlocks a bitcoin address’s ability to send money—resides somewhere online, it is vulnerable to hackers. New encryption-security solutions introduced in 2014, especially the multi-sig system that requires the coordination of multiple keys to access an address, should make such attacks virtually impossible outside of extortion or extreme negligence from two parties. Still, if you want to keep your bitcoins 100 percent safe, you can’t leave the code online anywhere.

a hacker hijacked an Internet service provider’s computers: Swati Khandelwal, “Hacker Hijacks ISP Networks to Steal $83,000 from Bitcoin Mining Pools,” http://thehackernews.com/2014/08/hacker-hijacks-isp-networks-to-steal_7.html. a Greece-based botnet used Facebook to infect 250,000 computers: Mohit Kumar, “Facebook Takes Down Bitcoin-Stealing Botnet That Infected 250,000 Computers,” Hacker News, July 9, 2014. the $148 million attack on Target in December 2013: Tom Gara, “An Expensive Hack Attack: Target’s $148 Million Breach,” August 5, 2014, http://blogs.wsj.com/corporate-intelligence/2014/08/05/an-expensive-hack-attack-targets-148-million-breach/. Let’s compare the average U.S. price of a gallon of gasoline: Weekly average U.S.


pages: 524 words: 130,909

The Contrarian: Peter Thiel and Silicon Valley's Pursuit of Power by Max Chafkin

3D printing, affirmative action, Airbnb, anti-communist, bank run, Bernie Sanders, Big Tech, bitcoin, Black Lives Matter, Black Monday: stock market crash in 1987, Blitzscaling, Boeing 747, borderless world, Cambridge Analytica, charter city, cloud computing, cognitive dissonance, Cornelius Vanderbilt, coronavirus, COVID-19, Credit Default Swap, cryptocurrency, David Brooks, David Graeber, DeepMind, digital capitalism, disinformation, don't be evil, Donald Trump, driverless car, Electric Kool-Aid Acid Test, Elon Musk, Ethereum, Extropian, facts on the ground, Fairchild Semiconductor, fake news, Ferguson, Missouri, Frank Gehry, Gavin Belson, global macro, Gordon Gekko, Greyball, growth hacking, guest worker program, Hacker News, Haight Ashbury, helicopter parent, hockey-stick growth, illegal immigration, immigration reform, Internet Archive, Jeff Bezos, John Markoff, Kevin Roose, Kickstarter, Larry Ellison, life extension, lockdown, low interest rates, Lyft, Marc Andreessen, Mark Zuckerberg, Maui Hawaii, Max Levchin, Menlo Park, military-industrial complex, moral panic, move fast and break things, Neal Stephenson, Nelson Mandela, Network effects, off grid, offshore financial centre, oil shale / tar sands, open borders, operational security, PalmPilot, Paris climate accords, Patri Friedman, paypal mafia, Peter Gregory, Peter Thiel, pets.com, plutocrats, Ponzi scheme, prosperity theology / prosperity gospel / gospel of success, public intellectual, QAnon, quantitative hedge fund, quantitative trading / quantitative finance, randomized controlled trial, regulatory arbitrage, Renaissance Technologies, reserve currency, ride hailing / ride sharing, risk tolerance, Robinhood: mobile stock trading app, Ronald Reagan, Sam Altman, Sand Hill Road, self-driving car, sharing economy, Sheryl Sandberg, Silicon Valley, Silicon Valley billionaire, Silicon Valley ideology, Silicon Valley startup, skunkworks, social distancing, software is eating the world, sovereign wealth fund, Steve Bannon, Steve Jobs, Steven Levy, Stewart Brand, surveillance capitalism, TaskRabbit, tech billionaire, tech worker, TechCrunch disrupt, techlash, technology bubble, technoutopianism, Ted Kaczynski, TED Talk, the new new thing, the scientific method, Tim Cook: Apple, transaction costs, Travis Kalanick, Tyler Cowen, Uber and Lyft, uber lyft, Upton Sinclair, Vitalik Buterin, We wanted flying cars, instead we got 140 characters, Whole Earth Catalog, WikiLeaks, William Shockley: the traitorous eight, Y Combinator, Y2K, yellow journalism, Zenefits

Masters, like Thiel, was a member of the campus Federalist Society and a gym rat. Starting that spring, though, he became Thiel’s Boswell, posting detailed prose versions of each class, complete with charts and graphs supplied by Thiel. The notes went viral almost immediately, showing up on the front page of Hacker News, a widely read tech and entrepreneurship forum, nearly every week, as well as on Facebook, Twitter, Reddit, and everywhere else ambitious young people came to connect with each other. Thiel’s delivery could be uncertain—his prepared speeches tend to be crisp on the page but full of circuitous digressions when delivered—and the structure of the lectures was a bit scattered, especially early on.

., 1–2, 6–7, 10 Founders Fund, 119–21, 126, 138, 160, 162–64, 167, 168, 170, 173, 180, 189, 211, 214, 234, 248, 249, 269, 282, 285, 293, 297, 309, 310, 319, 330 Founder’s Paradox, The (Denny), 305–6 Fountainhead, The (Rand), 176 Fox News, x, 179, 247–48, 286, 289, 332 Free Forever PAC, 315 Frieden, Tom, 311 Friedman, Milton, 137 Friedman, Patri, 136–37, 169, 174, 176 Friedman, Thomas, 189 Friendster, 105 Frisson, 97–99, 108, 210 From Poop to Gold (Jones), 180 FTC, 249, 281 FWD.us, 263 Gaetz, Matt, 302 gambling, 81–83 Gamergate, 204 GameStop, 330 Garner, Eric, 187 Gates, Bill, 68 Gausebeck, David, 78 Gawker Media, xiv–xvi, xviii, 122, 123–24, 126–30, 133, 134, 137, 153, 184, 189, 193–98, 200–202, 228–33, 239, 277, 279, 287, 326, 334 Hogan’s suit against, xv, 195–97, 201, 227–34 Valleywag, 121, 123, 124, 126–29, 134, 140–42, 189 gay community, 34, 40–42, 125, 177 AIDS and, 32, 34, 40 conservatives in, 177 gay marriage, 177, 179, 199, 240 gay rights, 40–41, 177, 184, 186, 259, 314 homophobia and, 32–35, 40, 126, 128 outing and, 128, 129 Thiel’s sexual orientation, xviii, 41, 98, 104, 125–29, 134, 138, 239, 241, 243 Gelernter, David, 252–53 Genentech, 163 General Society of Mechanics and Tradesmen, 192 Genius Grants for Geeks, 160 Germany, 3 Gettings, Nathan, 113, 114 Ghostnet, 146, 153 Gibney, Bruce, 163 Gibson, Michael, 164, 165, 169, 174 Giesea, Jeff, 43, 200–201, 204, 255, 278, 288 gig workers, 189, 190 Gingrich, Newt, 213 Gionet, Tim, 255 Girard, René, 19–20, 42, 111 GitHub, 286 Gizmodo, viii Glitch, 230 globalization, 112, 131, 189, 209, 225, 259, 298 Goliath (Stoller), 329–30 Goldin, David, 227 Goldman Sachs, 185 Goldwater, Barry, 15, 60–61, 287 Google, xii, xiv, xvi, 55, 57, 98, 123, 133, 136, 137, 145, 169, 180, 188, 190, 191, 234, 245, 259, 261, 263, 274–81, 288–90, 295, 300, 318, 328 artificial intelligence project of, xiii, 280, 288 China and, 288–89, 321 conservatives at, 277–79 Damore at, 277–79, 281, 295–96 Defense Department and, 288 Hawley’s antitrust investigation of, 279–80 indexing of websites by, 297 monopoly of, 274–77 Palantir and, 289, 290 Places, 274 Trump and, 276 Gopnik, Adam, 124 GOProud, 177 Gore, Al, 63, 94 Gorka, Sebastian, 332 Gorshkov, Vasiliy, 80 Gorsuch, Neil, 314 Gotham, 116 GotNews, 199 Government Accountability Office, 213 Gowalla, 164 Graeber, David, 192 Greatest Trade Ever, The (Zuckerman), 132 Great Recession, 104, 132, 157, 178 Greenwald, Glenn, 150 Grigoriadis, Vanessa, 124 growth hacking, 61, 78, 271 Gruender, Raymond, 82 Guardian, 154, 230 guns, 184 Habermas, Jürgen, 115 Hacker News, 170–71 Hagel, Chuck, 271 Haines, Avril, 333 Halcyon Molecular, 138, 167–68 Haley, Nikki, 182 Hamerton-Kelly, Robert, 19–20, 111 Hamilton College, 334–36 Happer, William, 251–52 Harder, Charles, 195–97, 228, 229 Harmon, Jeffrey, 180 Harper’s, 176 Harrington, Kevin, 101, 255, 256, 283 Harris, Andy, 265 Harris, Kamala, 300, 304 Harry Potter and the Methods of Rationality, 174–75 Harvard Business School, 192 Harvard Crimson, 108 Harvard University, 107–8, 191, 308 Hastings, Reed, 295, 296, 298 Hawley, Josh, 279–80, 288, 301, 321–23, 331–33 Hayek, Friedrich, 68 HBGary, 150–51 Health and Human Services (HHS) Department, 311, 318, 320 Hellman, Martin, 50–51, 54, 172 Hello, 167 Heritage Foundation, viii Hewlett-Packard (HP), 223–24 Heyer, Heather, 272 Hillbilly Elegy (Vance), 288, 332 Hitler, Adolf, 251–52, 255, 270 Hitler Youth, 30 Ho, Ralph, 101 Hoffman, Reid, 23–24, 42, 65, 67, 71, 76, 85, 107, 108, 171, 280, 333 Hogan, Hulk (Terry Bollea), xv, 182, 195–97, 201, 227–34 Holiday, Ryan, 193, 297–98 Holocaust, 203, 251–52, 255 Hoover, Herbert, 14, 33 Hoover Institution, 14, 15, 316 Houston, Drew, 298 Howery, Ken, 53, 101, 119 How Google Works (Schmidt), 54 HP, 144 HuffPost, 204 Hughes, Chris, 135 Hume, Hamish, 234, 258 Hunter, Duncan, 149, 216, 217 Hunter, Duncan, Sr., 149 Hurley, Chad, 105 Hurley, Doug, 310 Hurricane Katrina, 209 Hurston, Zora Neale, 25, 26 Hyde, Marina, 230 IBM, 257 Iger, Bob, 264 Igor, 79, 112–14 Illiberal Education (D’Souza), 31, 35, 42 Immelt, Jeff, 264 immigration, 112, 139–40, 185, 225, 259, 261, 263, 271, 298, 313, 315 Customs and Border Protection, 267, 285–86 Palantir and, 266–68, 285–87, 290, 318 and separation of families at border, 285–86 Trump and, xii, xiii, 226, 244, 247, 260–68, 272, 285–86, 309, 314 visas and, see visas Immigration and Customs Enforcement (ICE), 267, 268, 286, 287, 290, 318 Inc., xv, 157 incels, 41 Inception, 118–19, 215 Independent Institute, 42, 82 indeterminate optimism, 171 Ingraham, Laura, 31 initial public offerings (IPOs), 46 In-Q-Tel, 116 Instagram, 296, 300–301 Intel, 144, 163, 249, 257 Intellectual Dark Web, 278, 282, 319 Intelligence Advisory Board, 271–72 intelligence work, 114, 117, 148–49, 217 Intercollegiate Studies Institute, 25, 42 International Space Station, 310 Iran, 116 Iraq War, 135, 146, 148, 178, 199, 216, 247, 284, 303 IRAs, 212–13, 313 IRS, viii, 213, 214 ISIS, 311 Islam, see Muslims, Islam Ivanov, Alexey, 80 Jackson, Candice, 243 Jackson, Eric, 53, 121 Jackson, Jesse, 31–32, 47 Jackson, Michael, 26–27, 35 Japanese Americans, 266 Jews, 252, 255, 270, 321 Holocaust and, 203, 251–52, 255 Jobs, Steve, 8, 75–77, 124, 144, 262, 331, 334, 335 Stanford University address of, 334 John M.


We Are the Nerds: The Birth and Tumultuous Life of Reddit, the Internet's Culture Laboratory by Christine Lagorio-Chafkin

"Friedman doctrine" OR "shareholder theory", 4chan, Aaron Swartz, Airbnb, Amazon Web Services, Bernie Sanders, big-box store, bitcoin, blockchain, Brewster Kahle, Burning Man, compensation consultant, crowdsourcing, cryptocurrency, data science, David Heinemeier Hansson, digital rights, disinformation, Donald Trump, East Village, eternal september, fake news, game design, Golden Gate Park, growth hacking, Hacker News, hiring and firing, independent contractor, Internet Archive, Jacob Appelbaum, Jeff Bezos, jimmy wales, Joi Ito, Justin.tv, Kickstarter, Large Hadron Collider, Lean Startup, lolcat, Lyft, Marc Andreessen, Mark Zuckerberg, medical residency, minimum viable product, natural language processing, Palm Treo, Paul Buchheit, Paul Graham, paypal mafia, Peter Thiel, plutocrats, QR code, r/findbostonbombers, recommendation engine, RFID, rolodex, Ruby on Rails, Sam Altman, Sand Hill Road, Saturday Night Live, self-driving car, semantic web, Sheryl Sandberg, side project, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, slashdot, Snapchat, Social Justice Warrior, social web, South of Market, San Francisco, Startup school, Stephen Hawking, Steve Bannon, Steve Jobs, Steve Wozniak, Streisand effect, technoutopianism, uber lyft, Wayback Machine, web application, WeWork, WikiLeaks, Y Combinator

Ohanian credited Rose for helping start a movement online of community-shared content, but then unleashed this kicker: “It’s a damned shame to see digg just re-implementing features from other websites.” “Guy Who Copied Digg Slams Digg for Copying Twitter,” blared the resulting TechCrunch headline. In response to the article, Paul Graham posted the article link to Hacker News and retold the story of Reddit’s founding, specifically noting that Huffman and Ohanian hadn’t known of Digg’s existence until weeks into building their own site. Ohanian then posted a follow-up on his blog with details to support Graham’s account, noting that he’d sent Huffman an email on July 11, 2005, at 11:48 p.m., alerting him that a competitor site named Digg had launched.

Graham, in a separate video interview, says that nine were, and one of the companies “imploded before the summer started.” Their memories on this are now unclear. Front Page of the Internet owned by a domain squatter: Comment by Paul Graham (username: pg), “Guy Who Copied Digg Slams Digg for Copying Twitter,” Hacker News, May 30, 2010. “If you’re attached to the little bug guy”: Ohanian, Without Their Permission, 60. It’s Online “Hollaback Girl”: Ohanian, Without Their Permission, 61. He even designed stickers: Alexis Ohanian, “Time Machine,” Reddit’s blog, December 5, 2006. Their lives, home and work: Paul Graham, “Jessica Livingston,” paulgraham.com, November 2015.


pages: 523 words: 154,042

Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks by Scott J. Shapiro

3D printing, 4chan, active measures, address space layout randomization, air gap, Airbnb, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, availability heuristic, Bernie Sanders, bitcoin, blockchain, borderless world, Brian Krebs, business logic, call centre, carbon tax, Cass Sunstein, cellular automata, cloud computing, cognitive dissonance, commoditize, Compatible Time-Sharing System, Computing Machinery and Intelligence, coronavirus, COVID-19, CRISPR, cryptocurrency, cyber-physical system, Daniel Kahneman / Amos Tversky, Debian, Dennis Ritchie, disinformation, Donald Trump, double helix, Dr. Strangelove, dumpster diving, Edward Snowden, en.wikipedia.org, Evgeny Morozov, evil maid attack, facts on the ground, false flag, feminist movement, Gabriella Coleman, gig economy, Hacker News, independent contractor, information security, Internet Archive, Internet of things, invisible hand, John Markoff, John von Neumann, Julian Assange, Ken Thompson, Larry Ellison, Laura Poitras, Linda problem, loss aversion, macro virus, Marc Andreessen, Mark Zuckerberg, Menlo Park, meta-analysis, Minecraft, Morris worm, Multics, PalmPilot, Paul Graham, pirate software, pre–internet, QWERTY keyboard, Ralph Nader, RAND corporation, ransomware, Reflections on Trusting Trust, Richard Stallman, Richard Thaler, Ronald Reagan, Satoshi Nakamoto, security theater, Shoshana Zuboff, side hustle, Silicon Valley, Skype, SoftBank, SQL injection, Steve Ballmer, Steve Jobs, Steven Levy, Stuxnet, supply-chain attack, surveillance capitalism, systems thinking, TaskRabbit, tech billionaire, tech worker, technological solutionism, the Cathedral and the Bazaar, the new new thing, the payments system, Turing machine, Turing test, Unsafe at Any Speed, vertical integration, Von Neumann architecture, Wargames Reagan, WarGames: Global Thermonuclear War, Wayback Machine, web application, WikiLeaks, winner-take-all economy, young professional, zero day, éminence grise

., STUXNET, in Kim Zetter, Countdown to Zero Day: STUXNET and the Launch of the World’s First Digital Weapon (New York: Crown, 2014); Conficker, in Mark Bowden, Worm: The First Digital World War (New York: Grove Press, 2012); Dark Energy, in Andy Greenberg, Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers (New York: Doubleday, 2019). 1. The Great Worm “There is not one”: John Markoff, “‘Virus’ in Military Computers Disrupts Systems Nationwide,” The New York Times, November 4, 1988. Andy sent out: Email, The “Security Digest” Archives, https://web.archive.org/web/20041124203457/securitydigest.org/ tcp-ip/archive/1988/11.

s=20&t=EF2RadOIKuBH5Gdb8x5DUw. 1.2 terabits: Octave Klaba (@olesovhcom), “@Dominik28111 we got 2 huge multi DDoS,” Twitter, September 19, 2016, https://twitter.com/olesovhcom/status/778019962036314112. personal video recorders: Swati Khandelwal, “World’s Largest 1 Tbps DDoS Attack Launched from 152,000 Hacked Smart Devices,” Hacker News, September 28, 2016, thehackernews.com/2016/09/DDoS-attack-iot.html. any of its rivals: One prominent rival, the vDOS botnet, advertised their rate as “up to 50 gigabits per second”: Brian Krebs, “Israeli Online Attack Service ‘vDOS’ Earned $600,000 in Two Years,” Krebs on Security, September 8, 2016, https://krebsonsecurity.com/2016/09/israeli-online-attack-service-vdos-earned-600000-in-two-years/.


pages: 262 words: 60,248

Python Tricks: The Book by Dan Bader

anti-pattern, business logic, data science, domain-specific language, don't repeat yourself, functional programming, Hacker News, higher-order functions, linked data, off-by-one error, pattern recognition, performance metric

Twitter is like a virtual water cooler and great for “hanging out” but it’s limited to 140 characters at a time—not great for discussing anything substantial. Also, if you’re not constantly online, you’ll miss out on most of the conversations. And if you are constantly online, your productivity takes a hit from the never-ending stream of interruptions and notifications. Slack chat groups suffer from the same flaws. Hacker News is for discussing and commenting on tech news. It doesn’t foster long-term relationships between commenters. It’s also one of the most aggressive communities in tech right now with little moderation and a borderline toxic culture. Reddit takes a broader stance and encourages more “human” discussions than Stack Overflow’s one-off Q&A format.


pages: 223 words: 60,909

Technically Wrong: Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech by Sara Wachter-Boettcher

"Susan Fowler" uber, Abraham Maslow, Airbnb, airport security, algorithmic bias, AltaVista, big data - Walmart - Pop Tarts, Big Tech, Black Lives Matter, data science, deep learning, Donald Trump, fake news, false flag, Ferguson, Missouri, Firefox, Grace Hopper, Greyball, Hacker News, hockey-stick growth, independent contractor, job automation, Kickstarter, lifelogging, lolcat, Marc Benioff, Mark Zuckerberg, Max Levchin, Menlo Park, meritocracy, microaggression, move fast and break things, natural language processing, Northpointe / Correctional Offender Management Profiling for Alternative Sanctions, off-the-grid, pattern recognition, Peter Thiel, real-name policy, recommendation engine, ride hailing / ride sharing, Salesforce, self-driving car, Sheryl Sandberg, Silicon Valley, Silicon Valley startup, Snapchat, Steve Jobs, Tactical Technology Collective, TED Talk, Tim Cook: Apple, Travis Kalanick, upwardly mobile, Wayback Machine, women in the workforce, work culture , zero-sum game

All kinds of problems plague digital products, from tiny design details to massively flawed features. But they share a common foundation: a tech culture that’s built on white, male values—while insisting it’s brilliant enough to serve all of us. Or, as they call it in Silicon Valley, “meritocracy.” It’s a term you’ll hear constantly in tech, whether in a Hacker News forum or on Twitter or in line for coffee in San Francisco. The argument is simple: the tech industry is based purely on merit, and the people who are at the top got there because they were smarter, more innovative, and more ambitious than everyone else. If a company doesn’t employ many women or people of color—well, it’s just because no good ones applied.


pages: 254 words: 61,387

This Could Be Our Future: A Manifesto for a More Generous World by Yancey Strickler

"Friedman doctrine" OR "shareholder theory", "World Economic Forum" Davos, Abraham Maslow, accelerated depreciation, Adam Curtis, basic income, benefit corporation, Big Tech, big-box store, business logic, Capital in the Twenty-First Century by Thomas Piketty, Cass Sunstein, cognitive dissonance, corporate governance, Daniel Kahneman / Amos Tversky, data science, David Graeber, Donald Trump, Doomsday Clock, Dutch auction, effective altruism, Elon Musk, financial independence, gender pay gap, gentrification, global supply chain, Hacker News, housing crisis, Ignaz Semmelweis: hand washing, invention of the printing press, invisible hand, Jeff Bezos, job automation, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Nash: game theory, Joi Ito, Joseph Schumpeter, Kickstarter, Kōnosuke Matsushita, Larry Ellison, Louis Pasteur, Mark Zuckerberg, medical bankruptcy, Mr. Money Mustache, new economy, Oculus Rift, off grid, offshore financial centre, Parker Conrad, Ralph Nader, RAND corporation, Richard Thaler, Ronald Reagan, Rutger Bregman, self-driving car, shareholder value, Silicon Valley, Simon Kuznets, Snapchat, Social Responsibility of Business Is to Increase Its Profits, Solyndra, stem cell, Steve Jobs, stock buybacks, TechCrunch disrupt, TED Talk, The Wealth of Nations by Adam Smith, Thomas Kuhn: the structure of scientific revolutions, Travis Kalanick, Tyler Cowen, universal basic income, white flight, Zenefits

To Daniel Arnold, thanks for always being such a rad human and for taking my author photo on the morning of my fortieth birthday. To John Sundman, thanks for your fact-checking help and second pair of eyes on the book’s thornier topics, and thanks to John Biggs for introducing us. To Zack Sears, thanks for riffing on cover designs. To James Miao, thank you for posting the talk on Hacker News and helping to spread early ideas. To Maris Kreizman and Shea Serrano, thank you for your book industry know-how and people recommendations. To Robin Sloan, thanks for recommending Age of Fracture, which ultimately led to Bentoism. To Katinka Barysch, thanks for your wisdom and for staring at me intently when the professor said the development of medicine redefined what it meant to be healthy.


pages: 700 words: 160,604

The Code Breaker: Jennifer Doudna, Gene Editing, and the Future of the Human Race by Walter Isaacson

"World Economic Forum" Davos, 23andMe, Albert Einstein, Alfred Russel Wallace, Anne Wojcicki, Apollo 13, Apple II, Asilomar, Asilomar Conference on Recombinant DNA, Bernie Sanders, Colonization of Mars, contact tracing, coronavirus, COVID-19, CRISPR, crowdsourcing, Dean Kamen, discovery of DNA, discovery of penicillin, double helix, Edward Jenner, Gregor Mendel, Hacker News, Henri Poincaré, iterative process, Joan Didion, linear model of innovation, Louis Pasteur, Mark Zuckerberg, microbiome, mouse model, Nick Bostrom, public intellectual, Recombinant DNA, seminal paper, Silicon Valley, Skype, stealth mode startup, stem cell, Steve Jobs, Steve Wozniak, Steven Levy, Steven Pinker, synthetic biology, the scientific method, Thomas Malthus, wikimedia commons

., “The Perverse Effects of Competition on Scientists’ Work and Relationships,” Science Engineering Ethics, Dec. 2007; Matt Ridley, “Two Cheers for Scientific Backbiting,” Wall Street Journal, July 27, 2012. 3. Author’s interview with Emmanuelle Charpentier. Chapter 22: Feng Zhang 1. Author’s interviews with Feng Zhang. This section also draws from Eric Topol, podcast interview with Feng Zhang, Medscape, Mar. 31, 2017; Michael Specter, “The Gene Hackers,” New Yorker, Nov. 8, 2015; Sharon Begley, “Meet One of the World’s Most Groundbreaking Scientists,” Stat, Nov. 6, 2015. 2. Galen Johnson, “Gifted and Talented Education Grades K–12 Program Evaluation,” Des Moines Public Schools, September 1996. 3. Edward Boyden, Feng Zhang, Ernst Bamberg, Georg Nagel, and Karl Deisseroth, “Millisecond-Timescale, Genetically Targeted Optical Control of Neural Activity,” Nature Neuroscience, Aug. 14, 2005; Alexander Aravanis, Li-Ping Wang, Feng Zhang… and Karl Deisseroth, “An Optical Neural Interface: In vivo Control of Rodent Motor Cortex with Integrated Fiberoptic and Optogenetic Technology,” Journal of Neural Engineering, Sept. 2007. 4.

Magadán, and Sylvain Moineau, “The CRISPR/Cas Bacterial Immune System Cleaves Bacteriophage and Plasmid DNA,” Nature, Nov. 3, 2010. 2. Davies, Editing Humanity, 80; author’s interview with Le Cong. 3. Author’s interviews with Eric Lander, Feng Zhang; Begley, “George Church Has a Wild Idea…”; Michael Specter, “The Gene Hackers,” New Yorker, Nov. 8, 2015; Davies, Editing Humanity, 82. 4. Feng Zhang, “Confidential Memorandum of Invention,” Feb. 13, 2013. 5. David Altshuler, Chad Cowan, Feng Zhang, et al., Grant application 1R01DK097758-01, “Isogenic Human Pluripotent Stem Cell-Based Models of Human Disease Mutations,” National Institutes of Health, Jan. 12, 2012. 6.


pages: 233 words: 66,446

Bitcoin: The Future of Money? by Dominic Frisby

3D printing, Alan Greenspan, altcoin, bank run, banking crisis, banks create money, barriers to entry, bitcoin, Bitcoin Ponzi scheme, blockchain, capital controls, Chelsea Manning, cloud computing, computer age, cryptocurrency, disintermediation, Dogecoin, Ethereum, ethereum blockchain, fiat currency, financial engineering, fixed income, friendly fire, game design, Hacker News, hype cycle, Isaac Newton, John Gilmore, Julian Assange, land value tax, litecoin, low interest rates, M-Pesa, mobile money, Money creation, money: store of value / unit of account / medium of exchange, Occupy movement, Peter Thiel, Ponzi scheme, prediction markets, price stability, printed gun, QR code, quantitative easing, railway mania, Ronald Reagan, Ross Ulbricht, Satoshi Nakamoto, Silicon Valley, Skype, slashdot, smart contracts, Snapchat, Stephen Hawking, Steve Jobs, Ted Nelson, too big to fail, transaction costs, Turing complete, Twitter Arab Spring, Virgin Galactic, Vitalik Buterin, War on Poverty, web application, WikiLeaks

In the fast-developing spirit of crypto coin humour, three 100 trillion Zimbabwe dollar notes were traded for four bitcoins each. A put option (a bet on the price to fall) was written and sold. By February 2011, 5.25 million bitcoins – a quarter of the eventual total Bitcoin supply – had been mined. The price had reached parity with the US dollar. There was more publicity at Slashdot and Hacker News, and a buzz on Twitter. The Bitcoin website was struggling to cope with the new traffic. And a new website had opened up by which you could buy and sell drugs, using Bitcoin as a means of payment – the Silk Road. As is often the case when a security gets a surge in publicity, Bitcoin reached a fleeting high.


pages: 279 words: 71,542

Digital Minimalism: Choosing a Focused Life in a Noisy World by Cal Newport

Black Lives Matter, Burning Man, Cal Newport, data science, Donald Trump, Dunbar number, financial independence, game design, Hacker News, index fund, Jaron Lanier, Kevin Kelly, Kickstarter, lifelogging, longitudinal study, Mark Zuckerberg, Mr. Money Mustache, Pepto Bismol, pre–internet, price discrimination, race to the bottom, ride hailing / ride sharing, Silicon Valley, Skype, Snapchat, Steve Jobs, TED Talk

Many people now consume news by cycling through a set sequence of websites and social media feeds. If you’re interested in politics, for example, and lean toward the left side of the political spectrum, this sequence might go from CNN.com, to the New York Times homepage, to Politico, to the Atlantic, to your Twitter feed, and finally to your Facebook timeline. If you’re into technology, Hacker News and Reddit might be in that list. If you’re into sports, you’ll include ESPN.com and team-specific fan pages, and so on. Crucial to this news consumption habit is the ritualistic nature of the sequence. You don’t make a conscious decision about each of the sites and feeds you end up visiting; instead, once the sequence is activated, it unfolds on autopilot.


pages: 239 words: 64,812

Geek Sublime: The Beauty of Code, the Code of Beauty by Vikram Chandra

Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, Apple II, barriers to entry, Berlin Wall, Big Tech, British Empire, business process, Californian Ideology, Charles Babbage, conceptual framework, create, read, update, delete, crowdsourcing, don't repeat yourself, Donald Knuth, East Village, European colonialism, finite state, Firefox, Flash crash, functional programming, glass ceiling, Grace Hopper, Hacker News, haute couture, hype cycle, iterative process, Jaron Lanier, John von Neumann, land reform, London Whale, Norman Mailer, Paul Graham, pink-collar, revision control, Silicon Valley, Silicon Valley ideology, Skype, Steve Jobs, Steve Wozniak, supercomputer in your pocket, synthetic biology, tech worker, the Cathedral and the Bazaar, theory of mind, Therac-25, Turing machine, wikimedia commons, women in the workforce

Add another dozen software libraries and frameworks that you may use internally in your programs—again, each one comes bristling with its own eccentricities, bugs, and books—and weariness sets in. Each tool and preconstructed library solves a problem that you must otherwise solve yourself, but each solution is a separate body of knowledge you must maintain. A user named jdietrich wrote in a discussion on Hacker News: My biggest gripe with modern programming is the sheer volume of arbitrary stuff I need to know. My current project has so far required me to know about Python, Django, Google App Engine and its datastore, XHTML, CSS, JQuery, Javascript, JSON, and a clutch of XML schema, APIs and the like … Back in ye olden days, most programming tasks I performed felt quite natural and painless, just a quiet little chat between me and the compiler.


Smart Cities, Digital Nations by Caspar Herzberg

Asian financial crisis, barriers to entry, business climate, business cycle, business process, carbon footprint, clean tech, clean water, cloud computing, corporate social responsibility, Dean Kamen, demographic dividend, Edward Glaeser, Edward Snowden, Hacker News, high-speed rail, hive mind, Internet of things, knowledge economy, Masdar, megacity, New Urbanism, operational security, packet switching, QR code, remote working, RFID, rising living standards, risk tolerance, Ronald Reagan, shareholder value, Silicon Valley, Silicon Valley startup, smart cities, Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia, smart meter, social software, special economic zone, Stephen Hawking, telepresence, too big to fail, trade route, transcontinental railway, upwardly mobile, urban planning, urban sprawl, women in the workforce, working poor, X Prize

Although it was designed to help U.S. veterans who had been injured in combat, the prototype lost support and has not been manufactured since 2013. 6 Quoted from “The Adventure of the Copper Beeches,” Arthur Conan Doyle, 1893. 7 Independent researchers have demonstrated how devices such as smart meters and traffic sensors are vulnerable in the event of improper programming and encryption, human error, or taking advantage of the sheer number of devices that must be protected throughout a network. See Nicole Perlroth, “Smart Technology May Be Vulnerable to Hackers,” New York Times, April 21, 2015, http://bits.blogs.nytimes.com/2015/04/21/smartcity-technology-may-be-vulnerable-to-hackers/. Dan Kaplan, “Black Hat: Assessing Smart Meters for Hacker Footprints, Vulnerabilities,” SC Magazine, July 25, 2012, http://www.scmagazine.com/black-hat-assessing-smartmeters-for-hacker-footprints-vulnerabilities/article/251947/. 8 In addition to Cisco’s dedicated focus on security, there are many independent groups highlighting the vulnerabilities of devices and how consumers can protect themselves, e.g.


pages: 651 words: 186,130

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth

4chan, active measures, activist lawyer, air gap, Airbnb, Albert Einstein, Apollo 11, barriers to entry, Benchmark Capital, Bernie Sanders, Big Tech, bitcoin, Black Lives Matter, blood diamond, Boeing 737 MAX, Brexit referendum, Brian Krebs, Citizen Lab, cloud computing, commoditize, company town, coronavirus, COVID-19, crony capitalism, crowdsourcing, cryptocurrency, dark matter, David Vincenzetti, defense in depth, digital rights, disinformation, don't be evil, Donald Trump, driverless car, drone strike, dual-use technology, Edward Snowden, end-to-end encryption, failed state, fake news, false flag, Ferguson, Missouri, Firefox, gender pay gap, George Floyd, global pandemic, global supply chain, Hacker News, index card, information security, Internet of things, invisible hand, Jacob Appelbaum, Jeff Bezos, John Markoff, Ken Thompson, Kevin Roose, Laura Poitras, lockdown, Marc Andreessen, Mark Zuckerberg, mass immigration, Menlo Park, MITM: man-in-the-middle, moral hazard, Morris worm, move fast and break things, mutually assured destruction, natural language processing, NSO Group, off-the-grid, offshore financial centre, open borders, operational security, Parler "social media", pirate software, purchasing power parity, race to the bottom, RAND corporation, ransomware, Reflections on Trusting Trust, rolodex, Rubik’s Cube, Russian election interference, Sand Hill Road, Seymour Hersh, Sheryl Sandberg, side project, Silicon Valley, Skype, smart cities, smart grid, South China Sea, Steve Ballmer, Steve Bannon, Steve Jobs, Steven Levy, Stuxnet, supply-chain attack, TED Talk, the long tail, the scientific method, TikTok, Tim Cook: Apple, undersea cable, unit 8200, uranium enrichment, web application, WikiLeaks, zero day, Zimmermann PGP

Targets,” New York Times, May 20, 2013; Perlroth, “China Is Tied To Spying On European Diplomats,” New York Times, Dec 10, 2013; Perlroth, “China Is Said to Use Powerful New Weapon to Censor Internet,” New York Times, April 10, 2015; Helene Cooper, “Chinese Hackers Steal Naval Warfare Information,” New York Times, June 9, 2018; David E. Sanger, Nicole Perlroth, Glenn Thrush, and Alan Rappeport, “Marriott Data Breach Traced to Chinese Hackers,” New York Times, December 12, 2018; and Nicole Perlroth, Kate Conger, and Paul Mozur, “China Sharpens Hacking to Hound Its Minorities,” New York Times, October 25, 2019. I found the most comprehensive contemporary account of Google’s struggles with Chinese censorship to be Clive Thompson’s 2006 account for the New York Times Magazine, “Google’s China Problem (And China’s Google Problem),” April 23, 2006.

Lost in the maelstrom was subsequent reporting that year which showed that the New York Times Moscow bureau was also the attempted target of a Russian cyberattack. There was no evidence that Russia’s hackers were successful. See Nicole Perlroth and David E. Sanger, “New York Times’s Moscow Bureau Was Targeted by Hackers,” New York Times, August 23, 2016. For the most definitive press accounts of Russia’s social media influence efforts, see Scott Shane and Mark Mazzetti, “Inside a 3-Year Russian Campaign to Influence U.S. Voters,” New York Times, February 16, 2018. I also relied on the United States indictment of Russia’s Internet Research Agency.


pages: 302 words: 73,581

Platform Scale: How an Emerging Business Model Helps Startups Build Large Empires With Minimum Investment by Sangeet Paul Choudary

3D printing, Airbnb, Amazon Web Services, barriers to entry, bitcoin, blockchain, business logic, business process, Chuck Templeton: OpenTable:, Clayton Christensen, collaborative economy, commoditize, crowdsourcing, cryptocurrency, data acquisition, data science, fake it until you make it, frictionless, game design, gamification, growth hacking, Hacker News, hive mind, hockey-stick growth, Internet of things, invisible hand, Kickstarter, Lean Startup, Lyft, M-Pesa, Marc Andreessen, Mark Zuckerberg, means of production, multi-sided market, Network effects, new economy, Paul Graham, recommendation engine, ride hailing / ride sharing, Salesforce, search costs, shareholder value, sharing economy, Silicon Valley, Skype, Snapchat, social bookmarking, social graph, social software, software as a service, software is eating the world, Spread Networks laid a new fibre optics cable between New York and Chicago, TaskRabbit, the long tail, the payments system, too big to fail, transport as a service, two-sided market, Uber and Lyft, Uber for X, uber lyft, vertical integration, Wave and Pay

This problem is compounded because of a platform’s need for governance. If certain forms of behavior are encouraged during the early days and certain others are discouraged, the platform runs the risk of creating a hive mind. With scale, certain behaviors get reinforced and established as desirable behaviors. The governance on Reddit and Hacker News is so stringent that it overtly favors existing users (who have earned their karma) over new ones. These communities are often criticized for developing a hive mind. #5: CROWD-AS-A-HERD On platforms, reputation and influence are often conferred by the community. The best answer to a question on Quora is decided by the community through upvotes and downvotes.


Deep Work: Rules for Focused Success in a Distracted World by Cal Newport

8-hour work day, Albert Einstein, barriers to entry, behavioural economics, Bluma Zeigarnik, business climate, Cal Newport, Capital in the Twenty-First Century by Thomas Piketty, Clayton Christensen, David Brooks, David Heinemeier Hansson, deliberate practice, digital divide, disruptive innovation, do what you love, Donald Knuth, Donald Trump, Downton Abbey, en.wikipedia.org, Erik Brynjolfsson, Evgeny Morozov, experimental subject, follow your passion, Frank Gehry, Hacker News, Higgs boson, informal economy, information retrieval, Internet Archive, Jaron Lanier, knowledge worker, Mark Zuckerberg, Marshall McLuhan, Merlin Mann, Nate Silver, Neal Stephenson, new economy, Nicholas Carr, popular electronics, power law, remote working, Richard Feynman, Ruby on Rails, seminal paper, Silicon Valley, Silicon Valley startup, Snapchat, statistical model, the medium is the message, Tyler Cowen, Watson beat the top human players on Jeopardy!, web application, winner-take-all economy, work culture , zero-sum game

A newfound devotee of deep work, he rented an apartment across the street from his office, allowing him to show up early in the morning before anyone else arrived and work without distraction. “On good days, I can get in four hours of focus before the first meeting,” he told me. “Then maybe another three to four hours in the afternoon. And I do mean ‘focus’: no e-mail, no Hacker News [a website popular among tech types], just programming.” For someone who admitted to sometimes spending up to 98 percent of his day in his old job surfing the Web, Jason Benn’s transformation is nothing short of astonishing. Jason Benn’s story highlights a crucial lesson: Deep work is not some nostalgic affectation of writers and early-twentieth-century philosophers.


pages: 276 words: 78,094

Design for Hackers: Reverse Engineering Beauty by David Kadavy

Airbnb, complexity theory, en.wikipedia.org, Firefox, Hacker News, Isaac Newton, John Gruber, Paul Graham, Ruby on Rails, semantic web, Silicon Valley, Silicon Valley startup, Steve Jobs, TaskRabbit, web application, wikimedia commons, Y Combinator

In today’s world, that often means learning at least a little coding, but the hacker attitude can be applied to problem solving of all kinds. People who live by the hacker attitude are curious. They do whatever it takes to achieve their visions. They’re entrepreneurial. They value skills and knowledge over titles and experience. At the forefront of the hacker movement is the Hacker News community (http://news.ycombinator.com), a news aggregation site contributed to by followers of Paul Graham’s Y Combinator entrepreneurial incubator program. The program tends to fund small teams of hackers who have used their skills and hacker attitude to build cool products that solve problems: UserVoice (www.uservoice.com) democratizes customer support; Reddit (www.reddit.com) democratizes news; Dropbox (www.dropbox.com) provides an easy, automatic backup solution; and AirBNB (www.airbnb.com) turns extra bedrooms into places for travelers to stay.


pages: 322 words: 84,752

Pax Technica: How the Internet of Things May Set Us Free or Lock Us Up by Philip N. Howard

Aaron Swartz, Affordable Care Act / Obamacare, Berlin Wall, bitcoin, blood diamond, Bretton Woods, Brian Krebs, British Empire, butter production in bangladesh, call centre, Chelsea Manning, citizen journalism, Citizen Lab, clean water, cloud computing, corporate social responsibility, creative destruction, crowdsourcing, digital map, Edward Snowden, en.wikipedia.org, Evgeny Morozov, failed state, Fall of the Berlin Wall, feminist movement, Filter Bubble, Firefox, Francis Fukuyama: the end of history, Google Earth, Hacker News, Howard Rheingold, income inequality, informal economy, information security, Internet of things, John Perry Barlow, Julian Assange, Kibera, Kickstarter, land reform, M-Pesa, Marshall McLuhan, megacity, Mikhail Gorbachev, mobile money, Mohammed Bouazizi, national security letter, Nelson Mandela, Network effects, obamacare, Occupy movement, off-the-grid, packet switching, pension reform, prediction markets, sentiment analysis, Silicon Valley, Skype, spectrum auction, statistical model, Stuxnet, Tactical Technology Collective, technological determinism, trade route, Twitter Arab Spring, undersea cable, uranium enrichment, WikiLeaks, zero day

Xeni Jardin, “Pro-Assad ‘Syrian Electronic Army’ Boasts of Attacks on NYT, Twitter, Huffington Post,” Boing Boing, August 27, 2013, accessed September 30, 2014, http://boingboing.net/2013/08/27/syrian-electronic-army-boa.html; Christine Haughney and Nicole Perlroth, “Times Site Is Disrupted in Attack by Hackers,” New York Times, August 27, 2013, accessed September 30, 2014, http://www.nytimes.com/2013/08/28/business/media/hacking-attack-is-suspected-on-times-web-site.html. 16. Karen Deyoung and Claudia Duque, “U.S. Aid Implicated in Abuses of Power in Colombia,” Washington Post, August 20, 2011, accessed September 30, 2014, http://www.washingtonpost.com/pb/national/national-security/us-aid-implicated-in-abuses-of-power-in-colombia/2011/06/21/gIQABrZpSJ_story.html. 17.


pages: 294 words: 81,292

Our Final Invention: Artificial Intelligence and the End of the Human Era by James Barrat

AI winter, air gap, AltaVista, Amazon Web Services, artificial general intelligence, Asilomar, Automated Insights, Bayesian statistics, Bernie Madoff, Bill Joy: nanobots, Bletchley Park, brain emulation, California energy crisis, cellular automata, Chuck Templeton: OpenTable:, cloud computing, cognitive bias, commoditize, computer vision, Computing Machinery and Intelligence, cuban missile crisis, Daniel Kahneman / Amos Tversky, Danny Hillis, data acquisition, don't be evil, drone strike, dual-use technology, Extropian, finite state, Flash crash, friendly AI, friendly fire, Google Glasses, Google X / Alphabet X, Hacker News, Hans Moravec, Isaac Newton, Jaron Lanier, Jeff Hawkins, John Markoff, John von Neumann, Kevin Kelly, Law of Accelerating Returns, life extension, Loebner Prize, lone genius, machine translation, mutually assured destruction, natural language processing, Neil Armstrong, Nicholas Carr, Nick Bostrom, optical character recognition, PageRank, PalmPilot, paperclip maximiser, pattern recognition, Peter Thiel, precautionary principle, prisoner's dilemma, Ray Kurzweil, Recombinant DNA, Rodney Brooks, rolling blackouts, Search for Extraterrestrial Intelligence, self-driving car, semantic web, Silicon Valley, Singularitarianism, Skype, smart grid, speech recognition, statistical model, stealth mode startup, stem cell, Stephen Hawking, Steve Jobs, Steve Jurvetson, Steve Wozniak, strong AI, Stuxnet, subprime mortgage crisis, superintelligent machines, technological singularity, The Coming Technological Singularity, Thomas Bayes, traveling salesman, Turing machine, Turing test, Vernor Vinge, Watson beat the top human players on Jeopardy!, zero day

I am selling a private zeus: PHPSeller, OpenSC.ws, “Malware Samples and Information Forum,” last modified August 2009, http://www.opensc.ws/malware-samples-information/7862-sale-zeus-1-2-5-1-clean.html (accessed October 10, 2011). the Internet’s immune system: Kopytoff, Verne, “Deploying New Tools to Stop the Hackers,” New York Times, sec. technology, June 17, 2011, http://www.nytimes.com/2011/06/18/technology/18security.html?pagewanted=all (accessed October 10, 2011). malware passed good software: Ibid. Anonymous has attacked the Vatican: Reuters, “Hackers group Anonymous takes down Vatican website,” Huffington Post, July 7, 2012, http://www.huffingtonpost.com/2012/03/07/anonymous-hacks-vatican-website_n_1327297.html (accessed July 11, 2012).


pages: 282 words: 85,658

Ask Your Developer: How to Harness the Power of Software Developers and Win in the 21st Century by Jeff Lawson

Airbnb, AltaVista, Amazon Web Services, barriers to entry, big data - Walmart - Pop Tarts, Big Tech, big-box store, bitcoin, business process, call centre, Chuck Templeton: OpenTable:, cloud computing, coronavirus, COVID-19, create, read, update, delete, cryptocurrency, data science, David Heinemeier Hansson, deep learning, DevOps, Elon Musk, financial independence, global pandemic, global supply chain, Hacker News, Internet of things, Jeff Bezos, Kanban, Lean Startup, loose coupling, Lyft, Marc Andreessen, Marc Benioff, Mark Zuckerberg, microservices, minimum viable product, Mitch Kapor, move fast and break things, Paul Graham, peer-to-peer, ride hailing / ride sharing, risk tolerance, Ruby on Rails, Salesforce, side project, Silicon Valley, Silicon Valley startup, Skype, social distancing, software as a service, software is eating the world, sorting algorithm, Startup school, Steve Ballmer, Steve Jobs, Telecommunications Act of 1996, Toyota Production System, transaction costs, transfer pricing, two-pizza team, Uber and Lyft, uber lyft, ubercab, web application, Y Combinator

Not just freedom in working hours or what to wear, but freedom in terms of creativity. When you think of software developers, instead of Urkel, Sheldon, or Dennis Nedry, think of Patrick McKenzie, Ryan Leslie, Leah Culver, and Chad Etzel. Patrick McKenzie works at Stripe and is better known on the Internet as “Patio11,” the screen name he uses on Hacker News (the most popular website for developers to discuss the trade), where he has long been one of the highest-rated commenters—for good reason. On his website Kalzumeus.com, he’s penned some of the most insightful and entertaining essays ever written about being a software programmer. Patrick lives in Japan, where he once worked as a corporate programmer before striking out on his own, creating two simple online businesses—a bingo card generator app for teachers, and an appointment reminder app—that made him financially independent.


pages: 407 words: 90,238

Stealing Fire: How Silicon Valley, the Navy SEALs, and Maverick Scientists Are Revolutionizing the Way We Live and Work by Steven Kotler, Jamie Wheal

"World Economic Forum" Davos, 3D printing, Abraham Maslow, Alexander Shulgin, Alvin Toffler, augmented reality, Berlin Wall, Bernie Sanders, bitcoin, blockchain, Burning Man, Colonization of Mars, crowdsourcing, David Brooks, delayed gratification, disruptive innovation, driverless car, Electric Kool-Aid Acid Test, Elon Musk, en.wikipedia.org, Future Shock, Hacker News, high batting average, hive mind, How many piano tuners are there in Chicago?, hype cycle, Hyperloop, impulse control, independent contractor, informal economy, Jaron Lanier, John Markoff, John Perry Barlow, Kevin Kelly, Larry Ellison, lateral thinking, Mason jar, Maui Hawaii, McMansion, means of production, Menlo Park, meta-analysis, microdosing, military-industrial complex, mirror neurons, music of the spheres, off-the-grid, pattern recognition, Peter Thiel, PIHKAL and TIHKAL, prosperity theology / prosperity gospel / gospel of success, Ray Kurzweil, ride hailing / ride sharing, risk tolerance, science of happiness, selective serotonin reuptake inhibitor (SSRI), Silicon Valley, Silicon Valley billionaire, Silicon Valley startup, Skype, Steve Jobs, synthetic biology, TED Talk, time dilation, Tony Hsieh, urban planning, Virgin Galactic

Consciousness Itself,” Huffington Post, March 3, 2015. 23. ’Transformative Technology Conference: Siegel cofounded this conference with Dr. Jeffery Martin and Nicole Bradford. See: http://www.ttconf.org. Also Angela Swartz, ”Meet the Transformative Technology Companies That Want to Help You Relax,” Bizjournals.com, October 5, 2015. 24. A feature in The New Yorker: Nellie Bowles, “An evening with the Consciousness Hackers,” New Yorker, June 23, 2015. 25. The Flow Dojo: For an overview: http://www.flowgenomeproject.com/train/flow-dojo/. 26. A prototype of the Dojo to Google’s: If you want to see what all this looks like, see https://vimeo.com/153320792. Chapter Eight: Catch A Fire 1. Burning Man aggressively extends the tradition of hedonic ecstasy: Lee Gilmore and Mark Van Proyen, ed., AfterBurn: Reflections on Burning Man (Albuquerque: University of New Mexico Press, 2005). 2.


pages: 350 words: 103,988

Reinventing the Bazaar: A Natural History of Markets by John McMillan

accounting loophole / creative accounting, Albert Einstein, Alvin Roth, Andrei Shleifer, Anton Chekhov, Asian financial crisis, classic study, congestion charging, corporate governance, corporate raider, crony capitalism, Dava Sobel, decentralized internet, Deng Xiaoping, Dutch auction, electricity market, experimental economics, experimental subject, fear of failure, first-price auction, frictionless, frictionless market, George Akerlof, George Gilder, global village, Great Leap Forward, Hacker News, Hernando de Soto, I think there is a world market for maybe five computers, income inequality, income per capita, independent contractor, informal economy, information asymmetry, invisible hand, Isaac Newton, job-hopping, John Harrison: Longitude, John Perry Barlow, John von Neumann, Kenneth Arrow, land reform, lone genius, manufacturing employment, market clearing, market design, market friction, market microstructure, means of production, Network effects, new economy, offshore financial centre, ought to be enough for anybody, pez dispenser, pre–internet, price mechanism, profit maximization, profit motive, proxy bid, purchasing power parity, Robert Solow, Ronald Coase, Ronald Reagan, sealed-bid auction, search costs, second-price auction, Silicon Valley, spectrum auction, Stewart Brand, The Market for Lemons, The Nature of the Firm, The Wealth of Nations by Adam Smith, trade liberalization, transaction costs, War on Poverty, world market for maybe five computers, Xiaogang Anhui farmers, yield management

European Journal of Political Economy 16, 113–132. Levine, Ross. 1997. “Financial Development and Economic Growth.” Journal of Economic Literature 35, 688–726. Levine, Ross, and Renelt, David. 1992. “A Sensitivity Analysis of Cross-Country Growth Regressions.” American Economic Review 82, 942–963. Levy, Steven. 1994. Hackers. New York, Delta. Lockhart, Robert Bruce. 1996. Scotch, 7th ed. Glasgow, Neil Wilson Publishing. Lucas, Robert E. 1998. “On the Mechanics of Economic Development.” Journal of Monetary Economics 22, 3–42. Lucking-Reiley, David. 2000. “Auctions on the Internet: What’s Being Auctioned, and How?”


pages: 299 words: 97,378

Home Sweet Anywhere: How We Sold Our House, Created a New Life, and Saw the World by Lynne Martin

connected car, Downton Abbey, East Village, Hacker News, haute cuisine, McMansion, pink-collar, Skype

Lynne’s popular blog, www.homefreeadventures.com, chronicles their nomadic life, which was the cover article of the Wall Street Journal’s “Next” section in October 2012. It was the most commented-upon WSJ article of the month, was featured on the front page of Yahoo.com, and was picked up by the Huffington Post, Fodor’s Travel Intelligence, Hacker News, and others. Her work has also appeared in Mark Chimsky’s book, 65 Things to Do When You Retire, International Living, the Huffington Post, and others. Born in Texas and raised in Chicago, Lynne studied journalism in college and worked in radio and television for a number of years. She founded Maynor and Associates, a public relations firm in Hollywood, specializing in publicity for actors, television, and movies.


pages: 407 words: 103,501

The Digital Divide: Arguments for and Against Facebook, Google, Texting, and the Age of Social Netwo Rking by Mark Bauerlein

Alvin Toffler, Amazon Mechanical Turk, Andrew Keen, business cycle, centre right, citizen journalism, collaborative editing, computer age, computer vision, corporate governance, crowdsourcing, David Brooks, digital divide, disintermediation, folksonomy, Frederick Winslow Taylor, Future Shock, Hacker News, Herbert Marcuse, Howard Rheingold, invention of movable type, invention of the steam engine, invention of the telephone, Jaron Lanier, Jeff Bezos, jimmy wales, Kevin Kelly, knowledge worker, late fees, Lewis Mumford, Mark Zuckerberg, Marshall McLuhan, means of production, meta-analysis, moral panic, Network effects, new economy, Nicholas Carr, PageRank, PalmPilot, peer-to-peer, pets.com, radical decentralization, Results Only Work Environment, Saturday Night Live, scientific management, search engine result page, semantic web, Silicon Valley, slashdot, social graph, social web, software as a service, speech recognition, Steve Jobs, Stewart Brand, technology bubble, Ted Nelson, the long tail, the strength of weak ties, The Wisdom of Crowds, Thorstein Veblen, web application, Yochai Benkler

Alan Lightman, Daniel Sarewitz, and Christine Dresser (Island Press, 2003), pp. 287 and 292. 29 Joshua Rubenstein, David Meyer, and Jeffrey Evans, “Executive Control of Cognitive Processes in Task-Switching,” Journal of Experimental Psychology, Human Perception and Performance 27, no. 4 (2001), pp. 763–97. 30 Clive Thompson, “Meet the Life Hackers,” New York Times Magazine , October 16, 2005, pp. 40–45. 31 Gloria Mark, Victor Gonzalez, and Justin Harris, “No Task Left Behind? Examining the Nature of Fragmented Work,” proceedings of the Conference on Human Factors in Computer Systems (Portland, Oregon, 2005), pp. 321–30. Also interview with Gloria Mark, July 2006. 32 Ibid. 33 Thompson, “Meet the Life Hackers,” p. 42. 34 Tony Gillie and Donald Broadbent, “What Makes Interruptions Disruptive?


pages: 324 words: 96,491

Messing With the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News by Clint Watts

4chan, active measures, Affordable Care Act / Obamacare, barriers to entry, behavioural economics, Bellingcat, Berlin Wall, Bernie Sanders, Black Lives Matter, Cambridge Analytica, Chelsea Manning, Climatic Research Unit, crowdsourcing, Daniel Kahneman / Amos Tversky, disinformation, Donald Trump, drone strike, Edward Snowden, en.wikipedia.org, Erik Brynjolfsson, failed state, fake news, Fall of the Berlin Wall, false flag, Filter Bubble, global pandemic, Google Earth, Hacker News, illegal immigration, information security, Internet of things, Jacob Silverman, Julian Assange, loss aversion, Mark Zuckerberg, Mikhail Gorbachev, mobile money, mutually assured destruction, obamacare, Occupy movement, offshore financial centre, operational security, pre–internet, Russian election interference, Sheryl Sandberg, side project, Silicon Valley, Snapchat, Steve Bannon, the long tail, The Wisdom of Crowds, Turing test, University of East Anglia, Valery Gerasimov, WikiLeaks, Yochai Benkler, zero day

Ibid. 6. https://www.volkskrant.nl/wetenschap/dutch-agencies-provide-crucial-intel-about-russia-s-interference-in-us-elections~b4f8111b/. 7. http://fm.cnbc.com/applications/cnbc.com/resources/editorialfiles/2018/10/19/document-5.pdf. 8. https://www.cnbc.com/2018/10/19/woman-linked-to-russian-troll-farm-charged-with-interference-in-2018-midterms.html. 9. https://www.intelligence.senate.gov/press/new-reports-shed-light-internet-research-agency’s-social-media-tactics. 10. https://www.washingtonpost.com/politics/russians-interacted-with-at-least-14-trump-associates-during-the-campaign-and-transition/2018/12/09/71773192-fb13–11e8–8c9a-860ce2a8148f_story.html. 11. https://www.nytimes.com/2018/11/29/us/politics/fact-check-cohen-trump-.html. 12. https://www.thedailybeast.com/russian-hackers-new-target-a-vulnerable-democratic-senator. 13. https://www.npr.org/2018/08/01/634696302/sen-jeanne-shaheen-says-she-was-a-target-of-a-hacking-attempt. 14. https://www.washingtonpost.com/technology/2018/08/04/several-groups-banned-by-facebook-had-strong-similarities-twitter-accounts-linked-russia-six-weeks-ago/?


Data and the City by Rob Kitchin,Tracey P. Lauriault,Gavin McArdle

A Declaration of the Independence of Cyberspace, algorithmic management, bike sharing, bitcoin, blockchain, Bretton Woods, Chelsea Manning, citizen journalism, Claude Shannon: information theory, clean water, cloud computing, complexity theory, conceptual framework, corporate governance, correlation does not imply causation, create, read, update, delete, crowdsourcing, cryptocurrency, data science, dematerialisation, digital divide, digital map, digital rights, distributed ledger, Evgeny Morozov, fault tolerance, fiat currency, Filter Bubble, floating exchange rates, folksonomy, functional programming, global value chain, Google Earth, Hacker News, hive mind, information security, Internet of things, Kickstarter, knowledge economy, Lewis Mumford, lifelogging, linked data, loose coupling, machine readable, new economy, New Urbanism, Nicholas Carr, nowcasting, open economy, openstreetmap, OSI model, packet switching, pattern recognition, performance metric, place-making, power law, quantum entanglement, RAND corporation, RFID, Richard Florida, ride hailing / ride sharing, semantic web, sentiment analysis, sharing economy, Silicon Valley, Skype, smart cities, Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia, smart contracts, smart grid, smart meter, social graph, software studies, statistical model, tacit knowledge, TaskRabbit, technological determinism, technological solutionism, text mining, The Chicago School, The Death and Life of Great American Cities, the long tail, the market place, the medium is the message, the scientific method, Toyota Production System, urban planning, urban sprawl, web application

Mims, C. (2013) ‘Coming soon: the cybercrime of things’, The Atlantic, 6 August, available from: www.theatlantic.com/technology/archive/2013/08/coming-soon-the-cybercrimeof-things/278409/ [accessed 7 August 2013]. Morozov, E. (2013) To Save Everything, Click Here: Technology, Solutionism, and the Urge to Fix Problems That Don’t Exist. New York: Allen Lane. Paganini, P. (2013) ‘Israeli road control system hacked, causes traffic jam on Haifa highway’, The Hacker News, 28 October, available from: http://thehackernews. com/2013/10/israeli-roadcontrol-system-hacked.html [accessed 13 November 2013]. Parsons, W. (2004) ‘Not just steering but weaving: Relevant knowledge and the craft of building policy capacity and coherence’, Australian Journal of Public Administration 63(1): 43–57.


pages: 377 words: 110,427

The Boy Who Could Change the World: The Writings of Aaron Swartz by Aaron Swartz, Lawrence Lessig

Aaron Swartz, affirmative action, Alfred Russel Wallace, American Legislative Exchange Council, Benjamin Mako Hill, bitcoin, Bonfire of the Vanities, Brewster Kahle, Cass Sunstein, deliberate practice, do what you love, Donald Knuth, Donald Trump, failed state, fear of failure, Firefox, Free Software Foundation, full employment, functional programming, Hacker News, Howard Zinn, index card, invisible hand, Joan Didion, John Gruber, Lean Startup, low interest rates, More Guns, Less Crime, peer-to-peer, post scarcity, power law, Richard Feynman, Richard Stallman, Ronald Reagan, school vouchers, semantic web, single-payer health, SpamAssassin, SPARQL, telemarketer, The Bell Curve by Richard Herrnstein and Charles Murray, the scientific method, Toyota Production System, unbiased observer, wage slave, Washington Consensus, web application, WikiLeaks, working poor, zero-sum game

But that’s kind of the point. We won this fight because everyone made themselves the hero of their own story. Everyone took it as their job to save this crucial freedom. They threw themselves into it. They did whatever they could think of to do. They didn’t stop to ask anyone for permission. You remember how Hacker News readers spontaneously organized this boycott of GoDaddy over their support of SOPA? Nobody told them they could do that. A few people even thought it was a bad idea. It didn’t matter. The senators were right: The Internet really is out of control. But if we forget that, if we let Hollywood rewrite the story so it was just big company Google who stopped the bill, if we let them persuade us we didn’t actually make a difference, if we start seeing it as someone else’s responsibility to do this work and it’s our job just to go home and pop some popcorn and curl up on the couch to watch Transformers, well, then next time they might just win.


pages: 353 words: 104,146

European Founders at Work by Pedro Gairifo Santos

business intelligence, clean tech, cloud computing, crowdsourcing, deal flow, do what you love, fail fast, fear of failure, full text search, Hacker News, hockey-stick growth, information retrieval, inventory management, iterative process, Jeff Bezos, Joi Ito, Lean Startup, Mark Zuckerberg, Multics, natural language processing, pattern recognition, pre–internet, recommendation engine, Richard Stallman, Salesforce, Silicon Valley, Skype, slashdot, SoftBank, Steve Jobs, Steve Wozniak, subscription business, technology bubble, TED Talk, web application, Y Combinator

I think, in the end, that’s the competitive advantage of any company. Santos: The fact that you want to keep the team small is also good in terms of flexibility. Guilizzoni: Right, exactly. We have to stay as nimble as we can possibly be and keep our ears open. That’s a big part of my job is to read Hacker News and see what’s going on and learn about new technologies and try to get a sense of where the market is going. Those are things that I’ve had to learn how to do and I am still learning. The smaller and nimbler we are, the more we can be on our feet and adapt to things that will inevitably change.


pages: 398 words: 107,788

Coding Freedom: The Ethics and Aesthetics of Hacking by E. Gabriella Coleman

activist lawyer, Benjamin Mako Hill, commoditize, Computer Lib, crowdsourcing, Debian, disinformation, Donald Knuth, dumpster diving, Eben Moglen, en.wikipedia.org, financial independence, Free Software Foundation, Gabriella Coleman, ghettoisation, GnuPG, Hacker Conference 1984, Hacker Ethic, Hacker News, Herbert Marcuse, informal economy, information security, Jacob Appelbaum, Jaron Lanier, Jason Scott: textfiles.com, Jean Tirole, knowledge economy, laissez-faire capitalism, Larry Wall, Louis Pasteur, machine readable, means of production, Multics, Neal Stephenson, Paul Graham, peer-to-peer, pirate software, popular electronics, RFC: Request For Comment, Richard Stallman, rolodex, Ronald Reagan, Silicon Valley, Silicon Valley startup, slashdot, software patent, software studies, Steve Ballmer, Steven Levy, tacit knowledge, technological determinism, Ted Nelson, the Cathedral and the Bazaar, The Hackers Conference, the scientific method, The Soul of a New Machine, The Structural Transformation of the Public Sphere, web application, web of trust, Yochai Benkler

PhD diss., Simon Fraser University. Mill, John Stuart. (1857) 1991. On Liberty. Edited by H.B. Acton. London: Dent. Miller, Daniel, and Don Slater. 2000. The Internet: An Ethnographic Approach. London: Berg. Mitnick, Kevin D. 2011. Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker. New York: Little, Brown and Company. Monfort, Nick. 2008. Obfuscated Code. In Software Studies: A Lexicon, ed. Matthew Fuller, 193–99. Cambridge, MA: MIT Press. Moody, Glyn. 1997 The Greatest OS that (N)ever Was. Wired August. Available at http://www.wired.com/wired/archive/5.08/linux.html, accessed July 20, 2011. 2001.


pages: 334 words: 104,382

Brotopia: Breaking Up the Boys' Club of Silicon Valley by Emily Chang

"Margaret Hamilton" Apollo, "Susan Fowler" uber, "World Economic Forum" Davos, 23andMe, 4chan, Ada Lovelace, affirmative action, Airbnb, Alan Greenspan, Andy Rubin, Apollo 11, Apple II, augmented reality, autism spectrum disorder, autonomous vehicles, barriers to entry, Benchmark Capital, Bernie Sanders, Big Tech, Burning Man, California gold rush, Chuck Templeton: OpenTable:, clean tech, company town, data science, David Brooks, deal flow, Donald Trump, Dr. Strangelove, driverless car, Elon Musk, emotional labour, equal pay for equal work, fail fast, Fairchild Semiconductor, fake news, Ferguson, Missouri, game design, gender pay gap, Google Glasses, Google X / Alphabet X, Grace Hopper, Hacker News, high net worth, Hyperloop, imposter syndrome, Jeff Bezos, job satisfaction, Khan Academy, Lyft, Marc Andreessen, Mark Zuckerberg, Mary Meeker, Maui Hawaii, Max Levchin, Menlo Park, meritocracy, meta-analysis, microservices, Parker Conrad, paypal mafia, Peter Thiel, post-work, pull request, reality distortion field, Richard Hendricks, ride hailing / ride sharing, rolodex, Salesforce, Saturday Night Live, shareholder value, Sheryl Sandberg, side project, Silicon Valley, Silicon Valley startup, Skype, Snapchat, Steve Jobs, Steve Jurvetson, Steve Wozniak, Steven Levy, subscription business, Susan Wojcicki, tech billionaire, tech bro, tech worker, TED Talk, Tim Cook: Apple, Travis Kalanick, uber lyft, women in the workforce, Zenefits

I’ve developed the requisite thick skin, and I use a common tactic for dealing with trolls: ignoring them. I quickly scroll past the vitriolic direct replies to my Twitter account, and I never, ever use Reddit. Once an interview I conducted with Apple’s co-founder Steve Wozniak ended up on Reddit, and the response was worse than unnerving. (For the same reason, many women in tech avoid using Hacker News, the prominent start-up incubator YCombinator’s official bulletin board that has since become one of the industry’s leading message boards; the trolls are there too.) Most important, I don’t respond to the haters. This is accepted wisdom among many female users: the worst way to deal with a troll is to poke it.


pages: 363 words: 105,039

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers by Andy Greenberg

"World Economic Forum" Davos, air freight, air gap, Airbnb, Bellingcat, Bernie Sanders, bitcoin, blockchain, call centre, Citizen Lab, clean water, data acquisition, disinformation, Donald Trump, Edward Snowden, false flag, global supply chain, Hacker News, hive mind, information security, Julian Assange, Just-in-time delivery, Kickstarter, machine readable, Mikhail Gorbachev, no-fly zone, open borders, pirate software, pre–internet, profit motive, ransomware, RFID, speech recognition, Steven Levy, Stuxnet, supply-chain attack, tech worker, undersea cable, unit 8200, uranium enrichment, Valery Gerasimov, WikiLeaks, zero day

In the case of the Finance Ministry, the logic bomb deleted terabytes of data, destroying the contents of 80 percent of the agency’s computers, deleting its draft of the national budget for the next year, and leaving its network entirely off-line for the next two weeks. In other words, the hackers’ new winter onslaught matched and exceeded the previous year’s in both its scale and the calculated pain of its targeting. But as security researchers delved into the companies’ logs in those first weeks of December, they could see their tormentors were trying out new forms of deception, too. In one round of attacks, for instance, the hackers had altered their KillDisk code to not merely cripple victims’ machines but also to display a haunting image on their screens.


pages: 444 words: 118,393

The Nature of Software Development: Keep It Simple, Make It Valuable, Build It Piece by Piece by Ron Jeffries

Amazon Web Services, anti-pattern, bitcoin, business cycle, business intelligence, business logic, business process, c2.com, call centre, cloud computing, continuous integration, Conway's law, creative destruction, dark matter, data science, database schema, deep learning, DevOps, disinformation, duck typing, en.wikipedia.org, fail fast, fault tolerance, Firefox, Hacker News, industrial robot, information security, Infrastructure as a Service, Internet of things, Jeff Bezos, Kanban, Kubernetes, load shedding, loose coupling, machine readable, Mars Rover, microservices, Minecraft, minimum viable product, MITM: man-in-the-middle, Morris worm, move fast and break things, OSI model, peer-to-peer lending, platform as a service, power law, ransomware, revision control, Ruby on Rails, Schrödinger's Cat, Silicon Valley, six sigma, software is eating the world, source of truth, SQL injection, systems thinking, text mining, time value of money, transaction costs, Turing machine, two-pizza team, web application, zero day

The net result is that GUIs make terrible administrative interfaces for long-term production operation. The best interface for long-term operation is the command line. Given a command line, operators can easily build a scaffolding of scripts, logging, and automated actions to keep your software happy. Remember This It’s easy to get excited about control plane software. Blog posts and Hacker News will always egg you on to build more. But always keep the operating costs in mind. Anything you build must either be maintained or torn down. Choose the options that are appropriate for your team size and the scale of your workload. Start with visibility. Use logging, tracing, and metrics to create transparency.


pages: 392 words: 114,189

The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World From Cybercrime by Renee Dudley, Daniel Golden

2021 United States Capitol attack, Amazon Web Services, Bellingcat, Berlin Wall, bitcoin, Black Lives Matter, blockchain, Brian Krebs, call centre, centralized clearinghouse, company town, coronavirus, corporate governance, COVID-19, cryptocurrency, data science, disinformation, Donald Trump, fake it until you make it, Hacker News, heat death of the universe, information security, late fees, lockdown, Menlo Park, Minecraft, moral hazard, offshore financial centre, Oklahoma City bombing, operational security, opioid epidemic / opioid crisis, Picturephone, pirate software, publish or perish, ransomware, Richard Feynman, Ross Ulbricht, seminal paper, smart meter, social distancing, strikebreaker, subprime mortgage crisis, tech worker, Timothy McVeigh, union organizing, War on Poverty, Y2K, zero day

on Thanksgiving Day: Details of the construction-engineering firm’s interactions with MonsterCloud come from an author interview with Kurtis Minder, GroupSense CEO, August 27, 2021, and from Federal Trade Commission complaint, December 14, 2020. negotiating with REvil: Rachel Monroe, “How to Negotiate with Ransomware Hackers,” New Yorker, May 31, 2021. “After those kinds of tricks”: Dmitry Smilyanets, “‘I Scrounged Through the Trash Heaps … Now I’m a Millionaire:’ An Interview with REvil’s Unknown,” The Record by Recorded Future, March 16, 2021, therecord.media/i-scrounged-through-the -trash-heaps-now-im-a-millionaire-an-interview-with-revils-unknown/.


pages: 457 words: 126,996

Hacker, Hoaxer, Whistleblower, Spy: The Story of Anonymous by Gabriella Coleman

1960s counterculture, 4chan, Aaron Swartz, Amazon Web Services, Bay Area Rapid Transit, bitcoin, Chelsea Manning, citizen journalism, cloud computing, collective bargaining, corporate governance, creative destruction, crowdsourcing, data science, David Graeber, Debian, digital rights, disinformation, do-ocracy, East Village, Eben Moglen, Edward Snowden, false flag, feminist movement, Free Software Foundation, Gabriella Coleman, gentrification, George Santayana, Hacker News, hive mind, impulse control, information security, Jacob Appelbaum, jimmy wales, John Perry Barlow, Julian Assange, Laura Poitras, lolcat, low cost airline, mandatory minimum, Mohammed Bouazizi, Network effects, Occupy movement, Oklahoma City bombing, operational security, pirate software, power law, Richard Stallman, SETI@home, side project, Silicon Valley, Skype, SQL injection, Steven Levy, Streisand effect, TED Talk, Twitter Arab Spring, WikiLeaks, zero day

“Chinga La Migra Bulleting #1,” June 6 23, 2011, last accessed July 9, 2104, available at http://thepiratebay.se/torrent/6490796/Chinga_La_Migra. 12. “50 Days of Lulz,” June 25, 2011, last accessed June 25, 2014, available at http://pastebin.com/1znEGmHa. 13. Samantha Murphy, “Exclusive First Interview with Key Lulzsec Hacker,” New Scientist, no. 2820 (July 9, 2011). Available at http://www.newscientist.com/article/dn20649-exclusive-first-interview-with-key-lulzsec-hacker.html#.U6bPdB_7Gi0. (Last accessed June 26, 2014.) 14. Aldous Huxley, Complete Essays, (Chicago: Dee, 2000 [1934]), 526. 15. Topiary, Twitter post, July 21, 2011, 9:02 pm, https://twitter.com/atopiary/status/94225773896015872. 16.


pages: 428 words: 121,717

Warnings by Richard A. Clarke

"Hurricane Katrina" Superdome, active measures, Albert Einstein, algorithmic trading, anti-communist, artificial general intelligence, Asilomar, Asilomar Conference on Recombinant DNA, Bear Stearns, behavioural economics, Bernie Madoff, Black Monday: stock market crash in 1987, carbon tax, cognitive bias, collateralized debt obligation, complexity theory, corporate governance, CRISPR, cuban missile crisis, data acquisition, deep learning, DeepMind, discovery of penicillin, double helix, Elon Musk, failed state, financial thriller, fixed income, Flash crash, forensic accounting, friendly AI, Hacker News, Intergovernmental Panel on Climate Change (IPCC), Internet of things, James Watt: steam engine, Jeff Bezos, John Maynard Keynes: Economic Possibilities for our Grandchildren, knowledge worker, Maui Hawaii, megacity, Mikhail Gorbachev, money market fund, mouse model, Nate Silver, new economy, Nicholas Carr, Nick Bostrom, nuclear winter, OpenAI, pattern recognition, personalized medicine, phenotype, Ponzi scheme, Ray Kurzweil, Recombinant DNA, Richard Feynman, Richard Feynman: Challenger O-ring, risk tolerance, Ronald Reagan, Sam Altman, Search for Extraterrestrial Intelligence, self-driving car, Silicon Valley, smart grid, statistical model, Stephen Hawking, Stuxnet, subprime mortgage crisis, tacit knowledge, technological singularity, The Future of Employment, the scientific method, The Signal and the Noise by Nate Silver, Tunguska event, uranium enrichment, Vernor Vinge, WarGames: Global Thermonuclear War, Watson beat the top human players on Jeopardy!, women in the workforce, Y2K

David Cyranoski and Sara Reardon, “Chinese Scientists Genetically Modify Human Embryos,” Nature, Apr. 22, 2015, doi:10.1038/nature.2015.17378. 21. Sarah Zhang, “CRISPR Is Getting Better. Now It’s Time to Ask the Hard Ethical Questions,” Wired, Dec. 1, 2015, www.wired.com/2015/12/stop-dancing-around-real-ethical-problem-crispr (accessed Oct. 11, 2016). 22. Michael Specter, “The Gene Hackers,” New Yorker, Nov. 16, 2015, www.newyorker.com/magazine/2015/11/16/the-gene-hackers (accessed Oct. 11, 2016.) 23. Gregory Stock, Redesigning Humans: Choosing Our Genes, Changing Our Future (New York: Houghton Mifflin, 2003). 24. Stephen D. H. Hsu, “On the Genetic Architecture of Intelligence and Other Quantitative Traits,” arXiv, Aug. 30, 2014, arXiv:1408.3421v2 (accessed Oct. 11, 2016). 25.


pages: 540 words: 119,731

Samsung Rising: The Inside Story of the South Korean Giant That Set Out to Beat Apple and Conquer Tech by Geoffrey Cain

Andy Rubin, Apple's 1984 Super Bowl advert, Asian financial crisis, autonomous vehicles, Berlin Wall, business intelligence, cloud computing, corporate governance, creative destruction, don't be evil, Donald Trump, double helix, Dynabook, Elon Musk, Fairchild Semiconductor, fake news, fear of failure, Hacker News, independent contractor, Internet of things, John Markoff, Jony Ive, Kickstarter, Mahatma Gandhi, Mark Zuckerberg, megacity, Mikhail Gorbachev, Nelson Mandela, patent troll, Pepsi Challenge, rolodex, Russell Brand, shareholder value, Sheryl Sandberg, Silicon Valley, Silicon Valley startup, Skype, Steve Jobs, Superbowl ad, Tim Cook: Apple, Tony Fadell, too big to fail, WikiLeaks, wikimedia commons

“Hey @sprint, what if”: Sapna Maheshwari, “Samsung’s Response to Galaxy Note 7 Crisis Draws Criticism,” The New York Times, October 11, 2016, https://www.nytimes.com/​2016/​10/​12/​business/​media/​samsungs-passive-response-to-note-7s-overheating-problem-draws-criticism.html. “I’m sitting in front of”: Hacker News (web discussion forum), “Samsung Blocks Exploding Note 7 Parody Videos,” October 21, 2016. The user “netsharc” posted the message on October 21, 2016. More sarcastic comments can be found on social media posts on Samsung’s official Facebook and Twitter pages, as well as Samsung product reviews on Best Buy’s website, from September 2016 to December 2017.


Producing Open Source Software: How to Run a Successful Free Software Project by Karl Fogel

active measures, AGPL, barriers to entry, Benjamin Mako Hill, collaborative editing, continuous integration, Contributor License Agreement, corporate governance, Debian, Donald Knuth, en.wikipedia.org, experimental subject, Firefox, Free Software Foundation, GnuPG, Hacker Ethic, Hacker News, intentional community, Internet Archive, iterative process, Kickstarter, natural language processing, off-by-one error, patent troll, peer-to-peer, pull request, revision control, Richard Stallman, selection bias, slashdot, software as a service, software patent, SpamAssassin, the Cathedral and the Bazaar, Wayback Machine, web application, zero-sum game

Publicity In free software, there is a fairly smooth continuum between purely internal discussions and public relations statements. This is partly because the target audience is always ill-defined: given that most or all posts are publicly accessible, the project doesn't have full control over the impression the world gets. Someone—say, a Hacker News poster or slashdot.org editor—may draw millions of readers' attention to a post that no one ever expected to be seen outside the project. This is a fact of life that all open source projects live with, but in practice, the risk is usually small. In general, the announcements that the project most wants publicized are the ones that will be most publicized, assuming you use the right mechanisms to indicate relative newsworthiness to the outside world.


pages: 515 words: 126,820

Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World by Don Tapscott, Alex Tapscott

"World Economic Forum" Davos, Airbnb, altcoin, Alvin Toffler, asset-backed security, autonomous vehicles, barriers to entry, behavioural economics, bitcoin, Bitcoin Ponzi scheme, blockchain, Blythe Masters, Bretton Woods, business logic, business process, buy and hold, Capital in the Twenty-First Century by Thomas Piketty, carbon credits, carbon footprint, clean water, cloud computing, cognitive dissonance, commoditize, commons-based peer production, corporate governance, corporate social responsibility, creative destruction, Credit Default Swap, crowdsourcing, cryptocurrency, currency risk, decentralized internet, digital capitalism, disintermediation, disruptive innovation, distributed ledger, do well by doing good, Donald Trump, double entry bookkeeping, driverless car, Edward Snowden, Elon Musk, Erik Brynjolfsson, Ethereum, ethereum blockchain, failed state, fiat currency, financial innovation, Firefox, first square of the chessboard, first square of the chessboard / second half of the chessboard, future of work, Future Shock, Galaxy Zoo, general purpose technology, George Gilder, glass ceiling, Google bus, GPS: selective availability, Hacker News, Hernando de Soto, Higgs boson, holacracy, income inequality, independent contractor, informal economy, information asymmetry, information security, intangible asset, interest rate swap, Internet of things, Jeff Bezos, jimmy wales, Kickstarter, knowledge worker, Kodak vs Instagram, Lean Startup, litecoin, Lyft, M-Pesa, Marc Andreessen, Mark Zuckerberg, Marshall McLuhan, means of production, microcredit, mobile money, money market fund, Neal Stephenson, Network effects, new economy, Oculus Rift, off grid, pattern recognition, peer-to-peer, peer-to-peer lending, peer-to-peer model, performance metric, Peter Thiel, planetary scale, Ponzi scheme, prediction markets, price mechanism, Productivity paradox, QR code, quantitative easing, radical decentralization, ransomware, Ray Kurzweil, renewable energy credits, rent-seeking, ride hailing / ride sharing, Ronald Coase, Ronald Reagan, Salesforce, Satoshi Nakamoto, search costs, Second Machine Age, seigniorage, self-driving car, sharing economy, Silicon Valley, Skype, smart contracts, smart grid, Snow Crash, social graph, social intelligence, social software, standardized shipping container, Stephen Hawking, Steve Jobs, Steve Wozniak, Stewart Brand, supply-chain management, systems thinking, TaskRabbit, TED Talk, The Fortune at the Bottom of the Pyramid, The Nature of the Firm, The Soul of a New Machine, The Wisdom of Crowds, transaction costs, Turing complete, Turing test, Tyler Cowen, Uber and Lyft, uber lyft, unbanked and underbanked, underbanked, unorthodox policies, vertical integration, Vitalik Buterin, wealth creators, X Prize, Y2K, Yochai Benkler, Zipcar

Now with blockchain technology and open source code repositories, every company could provide venues to geeks and other business builders for problem solving, innovating, and creation of new business value. Blockchains and blockchain-based software repositories will fuel such activity. Companies can now use powerful new programming languages like the Ethereum blockchain with built-in payment systems. An excerpt from a conversation on Hacker News: “Imagine how cool it would be if I could share a guid for my repo—and then your bit client (let’s call it gitcoin, or maybe just bit) can fetch new commits from a distributed block chain (essentially the git log). Github is no longer an intermediary or a single point of failure. Private repo? Don’t share the guid.”36 How cool indeed!


pages: 509 words: 132,327

Rise of the Machines: A Cybernetic History by Thomas Rid

1960s counterculture, A Declaration of the Independence of Cyberspace, agricultural Revolution, Albert Einstein, Alistair Cooke, Alvin Toffler, Apple II, Apple's 1984 Super Bowl advert, back-to-the-land, Berlin Wall, Bletchley Park, British Empire, Brownian motion, Buckminster Fuller, business intelligence, Charles Babbage, Charles Lindbergh, Claude Shannon: information theory, conceptual framework, connected car, domain-specific language, Douglas Engelbart, Douglas Engelbart, Dr. Strangelove, dumpster diving, Extropian, full employment, game design, global village, Hacker News, Haight Ashbury, Herman Kahn, Howard Rheingold, Ivan Sutherland, Jaron Lanier, job automation, John Gilmore, John Markoff, John Perry Barlow, John von Neumann, Kevin Kelly, Kubernetes, Marshall McLuhan, Menlo Park, military-industrial complex, Mitch Kapor, Mondo 2000, Morris worm, Mother of all demos, Neal Stephenson, new economy, New Journalism, Norbert Wiener, offshore financial centre, oil shale / tar sands, Oklahoma City bombing, operational security, pattern recognition, public intellectual, RAND corporation, Silicon Valley, Simon Singh, Snow Crash, speech recognition, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, systems thinking, technoutopianism, Telecommunications Act of 1996, telepresence, The Hackers Conference, Timothy McVeigh, Vernor Vinge, We are as Gods, Whole Earth Catalog, Whole Earth Review, Y2K, Yom Kippur War, Zimmermann PGP

., 68. 34.Winn Schwartau, interview by the author, March 31, 2015. 35.Winn Schwartau, “Fighting Terminal Terrorism,” Computerworld, January 28, 1991, 23. 36.Computer Security: Hearing before the Subcommittee on Technology and Competitiveness of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Second Congress, First Session, June 27, 1991, no. 42 (Washington, DC: Government Printing Office, 1991), 10. 37.Winn Schwartau, Terminal Compromise (Old Hickory, TN: Interpact Press, 1991). 38.Steven Levy, Hackers (New York: Doubleday, 1984). 39.Clifford Stoll, The Cuckoo’s Egg (New York: Doubleday, 1989). 40.Alvin Toffler and Heidi Toffler, War and Anti-war: Survival at the Dawn of the 21st Century (Boston: Little, Brown, 1993). 41.Bob Brewin and Elizabeth Sikorovsky, “Information Warfare: DISA Stings Uncover Computer Security Flaws,” Federal Computer Week 9, no. 3 (1995): 1, 45. 42.Neil Munro, “The Pentagon’s New Nightmare: An Electronic Pearl Harbor,” Washington Post, July 16, 1995, C03. 43.Roger C.


pages: 458 words: 135,206

CTOs at Work by Scott Donaldson, Stanley Siegel, Gary Donaldson

Amazon Web Services, Andy Carvin, bioinformatics, business intelligence, business process, call centre, centre right, cloud computing, computer vision, connected car, crowdsourcing, data acquisition, distributed generation, do what you love, domain-specific language, functional programming, glass ceiling, Hacker News, hype cycle, Neil Armstrong, orbital mechanics / astrodynamics, pattern recognition, Pluto: dwarf planet, QR code, Richard Feynman, Ruby on Rails, Salesforce, shareholder value, Silicon Valley, Skype, smart grid, smart meter, software patent, systems thinking, thinkpad, web application, zero day, zero-sum game

Part of the adoption is due to the startup movement. Part of the adoption is the collapse of the dominance of Microsoft and Sun and IBM on the developer mindshare. I think that's going to give us things that I can't tell you what they're going to be, because there's a new thing every week. You go read Hacker News, and there's a new library or a new programming language or some new tool, but it's almost like a Cambrian explosion of new ideas. Staying on top of that and being aware of those things as they come along, and picking the ones that work for you—there are a whole lot of choices—and that to me has been the biggest technology impact and change.


pages: 452 words: 134,502

Hacking Politics: How Geeks, Progressives, the Tea Party, Gamers, Anarchists and Suits Teamed Up to Defeat SOPA and Save the Internet by David Moon, Patrick Ruffini, David Segal, Aaron Swartz, Lawrence Lessig, Cory Doctorow, Zoe Lofgren, Jamie Laurie, Ron Paul, Mike Masnick, Kim Dotcom, Tiffiniy Cheng, Alexis Ohanian, Nicole Powers, Josh Levy

4chan, Aaron Swartz, Adam Curtis, Affordable Care Act / Obamacare, Airbnb, Bernie Sanders, Big Tech, Burning Man, call centre, Cass Sunstein, Chelsea Manning, collective bargaining, creative destruction, crony capitalism, crowdsourcing, digital rights, disinformation, don't be evil, dual-use technology, facts on the ground, Firefox, Free Software Foundation, Hacker News, hive mind, hockey-stick growth, immigration reform, informal economy, jimmy wales, John Perry Barlow, Julian Assange, Kickstarter, liquidity trap, lolcat, machine readable, Mark Zuckerberg, obamacare, Occupy movement, offshore financial centre, Overton Window, peer-to-peer, plutocrats, power law, prisoner's dilemma, radical decentralization, rent-seeking, Silicon Valley, Skype, Streisand effect, technoutopianism, The future is already here, WikiLeaks, Y Combinator, Yochai Benkler

But mostly, it’s a personal story because I haven’t had the time to research anyone else’s. We won this fight because everyone made themselves the hero of their own story. Everyone took it as their job to save this crucial freedom. They threw themselves into it, did whatever they could think of to do, didn’t stop to ask anyone for permission. Did you hear how Hacker News users spontaneously organized a boycott of GoDaddy over their support of SOPA? Nobody told them they could do that. A lot of people even thought it was a bad idea. It didn’t matter. The senators were right. The Internet really is out of control. But if we forget that. If we let Hollywood rewrite the story so that is was just Big Company Google who stopped the bill.


Machine Learning Design Patterns: Solutions to Common Challenges in Data Preparation, Model Building, and MLOps by Valliappa Lakshmanan, Sara Robinson, Michael Munn

A Pattern Language, Airbnb, algorithmic trading, automated trading system, business intelligence, business logic, business process, combinatorial explosion, computer vision, continuous integration, COVID-19, data science, deep learning, DevOps, discrete time, en.wikipedia.org, Hacker News, industrial research laboratory, iterative process, Kubernetes, machine translation, microservices, mobile money, natural language processing, Netflix Prize, optical character recognition, pattern recognition, performance metric, recommendation engine, ride hailing / ride sharing, selection bias, self-driving car, sentiment analysis, speech recognition, statistical model, the payments system, web application

In the next chapter, we’ll focus on model output by diving into different approaches for representing our prediction task. 1 Here, the learned data representation consists of baby weight as the input variable, the less than operator, and the threshold of 3 kg. 2 If twins, the plurality is 2. If triplets, the plurality is 3. 3 This dataset is available in BigQuery: bigquery-public-data.samples.natality. 4 This dataset is available in BigQuery: bigquery-public-data.hacker_news.stories. 5 The feature_cross.ipynb notebook in the book’s repository of this book will help you follow the discussion better. 6 Full code is in 02_data_representation/feature_cross.ipynb in the code repository of this book. 7 We use the term “tabular data” to refer to numerical and categorical inputs, but not free-form text.


pages: 439 words: 131,081

The Chaos Machine: The Inside Story of How Social Media Rewired Our Minds and Our World by Max Fisher

2021 United States Capitol attack, 4chan, A Declaration of the Independence of Cyberspace, Airbnb, Bellingcat, Ben Horowitz, Bernie Sanders, Big Tech, Bill Gates: Altair 8800, bitcoin, Black Lives Matter, call centre, centre right, cloud computing, Comet Ping Pong, Computer Lib, coronavirus, COVID-19, crisis actor, crowdsourcing, dark pattern, data science, deep learning, deliberate practice, desegregation, disinformation, domesticated silver fox, Donald Trump, Douglas Engelbart, Douglas Engelbart, end-to-end encryption, fake news, Filter Bubble, Future Shock, game design, gamification, George Floyd, growth hacking, Hacker Conference 1984, Hacker News, hive mind, illegal immigration, Jeff Bezos, John Perry Barlow, Jon Ronson, Joseph Schumpeter, Julian Assange, Kevin Roose, lockdown, Lyft, Marc Andreessen, Mark Zuckerberg, Max Levchin, military-industrial complex, Oklahoma City bombing, Parler "social media", pattern recognition, Paul Graham, Peter Thiel, profit maximization, public intellectual, QAnon, recommendation engine, ride hailing / ride sharing, Rutger Bregman, Saturday Night Live, Sheryl Sandberg, side project, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, Snapchat, social distancing, Social Justice Warrior, social web, Startup school, Stephen Hawking, Steve Bannon, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Susan Wojcicki, tech billionaire, tech worker, Ted Nelson, TED Talk, TikTok, Uber and Lyft, uber lyft, Whole Earth Catalog, WikiLeaks, Y Combinator

Now, in early 2013, social media enabled her to reach a wider audience. Twitter and Facebook lit up with angry posts in reaction to her tweet. The conference organizers, as well as the employers of the two men, were suddenly infamous, even hated, and on a national scale. One of the men was quickly fired. He posted an apology for his comment to Hacker News, Silicon Valley’s unofficial web forum, writing that he was sorry to Richards especially. But he added, “I have 3 kids and I really liked that job. She gave me no warning, she smiled while she snapped the pic and sealed my fate. Let this serve as a message to everyone, our actions and words, big or small, can have a serious impact.”


pages: 1,737 words: 491,616

Rationality: From AI to Zombies by Eliezer Yudkowsky

Albert Einstein, Alfred Russel Wallace, anthropic principle, anti-pattern, anti-work, antiwork, Arthur Eddington, artificial general intelligence, availability heuristic, backpropagation, Bayesian statistics, behavioural economics, Berlin Wall, Boeing 747, Build a better mousetrap, Cass Sunstein, cellular automata, Charles Babbage, cognitive bias, cognitive dissonance, correlation does not imply causation, cosmological constant, creative destruction, Daniel Kahneman / Amos Tversky, dematerialisation, different worldview, discovery of DNA, disinformation, Douglas Hofstadter, Drosophila, Eddington experiment, effective altruism, experimental subject, Extropian, friendly AI, fundamental attribution error, Great Leap Forward, Gödel, Escher, Bach, Hacker News, hindsight bias, index card, index fund, Isaac Newton, John Conway, John von Neumann, Large Hadron Collider, Long Term Capital Management, Louis Pasteur, mental accounting, meta-analysis, mirror neurons, money market fund, Monty Hall problem, Nash equilibrium, Necker cube, Nick Bostrom, NP-complete, One Laptop per Child (OLPC), P = NP, paperclip maximiser, pattern recognition, Paul Graham, peak-end rule, Peter Thiel, Pierre-Simon Laplace, placebo effect, planetary scale, prediction markets, random walk, Ray Kurzweil, reversible computing, Richard Feynman, risk tolerance, Rubik’s Cube, Saturday Night Live, Schrödinger's Cat, scientific mainstream, scientific worldview, sensible shoes, Silicon Valley, Silicon Valley startup, Singularitarianism, SpaceShipOne, speech recognition, statistical model, Steve Jurvetson, Steven Pinker, strong AI, sunk-cost fallacy, technological singularity, The Bell Curve by Richard Herrnstein and Charles Murray, the map is not the territory, the scientific method, Turing complete, Turing machine, Tyler Cowen, ultimatum game, X Prize, Y Combinator, zero-sum game

If you can think of ways to pull the rope sideways, you are justified in expending your limited resources on relatively less common issues where marginal discussion offers relatively higher marginal payoffs. But then the responsibilities that you deprioritize are a matter of your limited resources. Not a matter of floating high above, serene and Wise. My reply to Paul Graham’s comment on Hacker News seems like a summary worth repeating: There’s a difference between: Passing neutral judgment; Declining to invest marginal resources; Pretending that either of the above is a mark of deep wisdom, maturity, and a superior vantage point; with the corresponding implication that the original sides occupy lower vantage points that are not importantly different from up there

Though it does take a mature understanding to appreciate this impossibility, so it’s not surprising that people go around proposing clever shortcuts. On the AI-Box Experiment, so far I’ve only been convinced to divulge a single piece of information on how I did it—when someone noticed that I was reading Y Combinator’s Hacker News, and posted a topic called “Ask Eliezer Yudkowsky” that got voted to the front page. To which I replied: Oh, dear. Now I feel obliged to say something, but all the original reasons against discussing the AI-Box experiment are still in force . . . All right, this much of a hint: There’s no super-clever special trick to it.

Being part of a large collective of other inactives; no one will single out you to blame. Not hearing a voiced plea for help. Et cetera. I don’t have a brilliant solution to this problem. But it’s the sort of thing that I would wish for potential dot-com cofounders to ponder explicitly, rather than wondering how to throw sheep on Facebook. (Yes, I’m looking at you, Hacker News.) There are online activism web apps, but they tend to be along the lines of sign this petition! yay, you signed something! rather than how can we counteract the bystander effect, restore motivation, and work with native group-coordination instincts, over the Internet? Some of the things that come to mind: Put a video of someone asking for help online.


Data Wrangling With Python: Tips and Tools to Make Your Life Easier by Jacqueline Kazil

Amazon Web Services, bash_history, business logic, cloud computing, correlation coefficient, crowdsourcing, data acquisition, data science, database schema, Debian, en.wikipedia.org, Fairphone, Firefox, Global Witness, Google Chrome, Hacker News, job automation, machine readable, Nate Silver, natural language processing, pull request, Ronald Reagan, Ruby on Rails, selection bias, social web, statistical model, web application, WikiLeaks

Large-Scale Automation | 397 We’ve chosen to highlight some of the tools we’ve used in this section, but they are not the only tools for larger-scale automation using Python. Given the field’s popular‐ ity and necessity, we recommend following discussions of larger-scale automation on your favorite technology and discussion sites, such as Hacker News. Celery: Queue-Based Automation Celery is a Python library used to create a distributed queue system. With Celery, your tasks are managed using a scheduler or via events and messaging. Celery is the complete solution if you’re looking for something scalable, that can handle longrunning event-driven tasks.


pages: 506 words: 151,753

The Cryptopians: Idealism, Greed, Lies, and the Making of the First Big Cryptocurrency Craze by Laura Shin

"World Economic Forum" Davos, 4chan, Airbnb, altcoin, bike sharing, bitcoin, blockchain, Burning Man, cloud computing, complexity theory, Credit Default Swap, cryptocurrency, DevOps, digital nomad, distributed ledger, Dogecoin, Donald Trump, Dutch auction, Edward Snowden, emotional labour, en.wikipedia.org, Ethereum, ethereum blockchain, fake news, family office, fiat currency, financial independence, Firefox, general-purpose programming language, gravity well, hacker house, Hacker News, holacracy, independent contractor, initial coin offering, Internet of things, invisible hand, Johann Wolfgang von Goethe, Julian Assange, Kickstarter, litecoin, low interest rates, Mark Zuckerberg, minimum viable product, off-the-grid, performance metric, Potemkin village, prediction markets, QR code, ride hailing / ride sharing, risk tolerance, risk/return, Satoshi Nakamoto, sharing economy, side project, Silicon Valley, Skype, smart contracts, social distancing, software as a service, Steve Jobs, Turing complete, Vitalik Buterin, Wayback Machine, WikiLeaks

Headlines read, “Winklevoss twin predicts multitrillion-dollar value for bitcoin,” “Analyst who predicted bitcoin’s rise now sees it hitting $300,000–$400,000,” and “Trader who called bitcoin rally says cryptocurrency will surge above $100,000 in 2018.”28 News about Bitcoin and Ethereum proliferated: about teens who’d become millionaires off Bitcoin, ETH traders who turned $8,500 into $7.5 million in six months with leveraged crypto trades, and WikiLeaks’ founder Julian Assange thanking the US government, because the site was now enjoying 50,000 percent returns since it had been forced to use Bitcoin after being blocked by credit cards and PayPal.29 Now that Bitcoin had gone “to the moon,” a company named Moonlambos made it possible for anyone wanting to buy a Lamborghini to do so with BTC or ETH.30 It also planned an ILO—initial Lambo offering.31 On December 13, PineappleFund, an anonymous early Bitcoiner, posted on Reddit, announcing that he or she had “far more money than I can ever spend” and so was going to give away 5,057 Bitcoins—$86 million—to what he or she had christened The Pineapple Fund.32 (A software engineer who, by email, helped “Pine” distribute the money got a strong sense, from Pine’s mannerisms and use of emojis, that Pine was a woman and, from Pine’s references to things like Hacker News, perhaps an engineer familiar with Silicon Valley.) MEW, which in the late summer/early fall had been seeing about 3.5 million visitors a month, in November got 4.6 million. In December that reached 7.7 million. In twelve months, the tiny website started by two best friends as a side project had grown to seventy-seven times its original size.


pages: 739 words: 174,990

The TypeScript Workshop: A Practical Guide to Confident, Effective TypeScript Programming by Ben Grynhaus, Jordan Hudgens, Rayon Hunte, Matthew Thomas Morgan, Wekoslav Stefanovski

Ada Lovelace, Albert Einstein, business logic, Charles Babbage, create, read, update, delete, don't repeat yourself, Donald Knuth, fault tolerance, Firefox, full stack developer, functional programming, Google Chrome, Hacker News, higher-order functions, inventory management, Kickstarter, loose coupling, node package manager, performance metric, QR code, Ruby on Rails, SQL injection, type inference, web application, WebSocket

TypeScript and React Overview In this chapter, we'll cover the React library and how to build user interfaces enhanced with TypeScript. We'll look at state management solutions for React applications and styling solutions. Then, we will use Firebase, a serverless backend, to build a Hacker News-style application. By the end of this chapter, you will be able to bootstrap React applications using the Create React App command-line interface. Introduction React is a dominant force in web and mobile user interface development. Although it bills itself as "A JavaScript library for building user interfaces," what we often think of as React goes well beyond the core library and includes a wide ecosystem of plugins, components, and other tools.


pages: 741 words: 164,057

Editing Humanity: The CRISPR Revolution and the New Era of Genome Editing by Kevin Davies

23andMe, Airbnb, Anne Wojcicki, Apple's 1984 Super Bowl advert, Asilomar, bioinformatics, California gold rush, clean water, coronavirus, COVID-19, CRISPR, crowdsourcing, discovery of DNA, disinformation, Doomsday Clock, double helix, Downton Abbey, Drosophila, Edward Jenner, Elon Musk, epigenetics, fake news, Gregor Mendel, Hacker News, high-speed rail, hype cycle, imposter syndrome, Isaac Newton, John von Neumann, Kickstarter, life extension, Mark Zuckerberg, microbiome, Mikhail Gorbachev, mouse model, Neil Armstrong, New Journalism, ocean acidification, off-the-grid, personalized medicine, Peter Thiel, phenotype, QWERTY keyboard, radical life extension, RAND corporation, Recombinant DNA, rolodex, scientific mainstream, Scientific racism, seminal paper, Shenzhen was a fishing village, side project, Silicon Valley, Silicon Valley billionaire, Skype, social distancing, stem cell, Stephen Hawking, Steve Jobs, Steven Pinker, Stewart Brand, synthetic biology, TED Talk, the long tail, Thomas Kuhn: the structure of scientific revolutions, Thomas Malthus, traumatic brain injury, warehouse automation

Hannah Osborne, “China’s He Jiankui told Nobel winner Craig Mello about gene-edited babies months before birth,” Newsweek, January 30, 2019, https://www.newsweek.com/craig-mello-he-jiankui-gene-editing-experiment-babies-nobel-prize-1311524. 24. N. Wade, “In new way to edit DNA, hope for treating disease,” New York Times, December 28, 2009, https://www.nytimes.com/2009/12/29/health/research/29zinc.html. 25. Michael Specter, “The Gene Hackers,” New Yorker, November 9, 2015, https://www.newyorker.com/magazine/2015/11/16/the-gene-hackers. 26. Ibid. 27. D. Baltimore et al., “A prudent path forward for genomic engineering and germline gene modification,” Science 348, (2015): 36–38, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4394183/. 28.


The Code: Silicon Valley and the Remaking of America by Margaret O'Mara

A Declaration of the Independence of Cyberspace, accounting loophole / creative accounting, affirmative action, Airbnb, Alan Greenspan, AltaVista, Alvin Toffler, Amazon Web Services, An Inconvenient Truth, AOL-Time Warner, Apple II, Apple's 1984 Super Bowl advert, autonomous vehicles, back-to-the-land, barriers to entry, Ben Horowitz, Berlin Wall, Big Tech, Black Lives Matter, Bob Noyce, Buckminster Fuller, Burning Man, business climate, Byte Shop, California gold rush, Californian Ideology, carried interest, clean tech, clean water, cloud computing, cognitive dissonance, commoditize, company town, Compatible Time-Sharing System, computer age, Computer Lib, continuous integration, cuban missile crisis, Danny Hillis, DARPA: Urban Challenge, deindustrialization, different worldview, digital divide, Do you want to sell sugared water for the rest of your life?, don't be evil, Donald Trump, Doomsday Clock, Douglas Engelbart, driverless car, Dynabook, Edward Snowden, El Camino Real, Elon Musk, en.wikipedia.org, Erik Brynjolfsson, Fairchild Semiconductor, Frank Gehry, Future Shock, Gary Kildall, General Magic , George Gilder, gig economy, Googley, Hacker Ethic, Hacker News, high net worth, hockey-stick growth, Hush-A-Phone, immigration reform, income inequality, industrial research laboratory, informal economy, information retrieval, invention of movable type, invisible hand, Isaac Newton, It's morning again in America, Jeff Bezos, Joan Didion, job automation, job-hopping, John Gilmore, John Markoff, John Perry Barlow, Julian Assange, Kitchen Debate, knowledge economy, knowledge worker, Larry Ellison, Laura Poitras, Lyft, Marc Andreessen, Mark Zuckerberg, market bubble, Mary Meeker, mass immigration, means of production, mega-rich, Menlo Park, Mikhail Gorbachev, military-industrial complex, millennium bug, Mitch Kapor, Mother of all demos, move fast and break things, mutually assured destruction, Neil Armstrong, new economy, Norbert Wiener, old-boy network, Palm Treo, pattern recognition, Paul Graham, Paul Terrell, paypal mafia, Peter Thiel, pets.com, pirate software, popular electronics, pre–internet, prudent man rule, Ralph Nader, RAND corporation, Richard Florida, ride hailing / ride sharing, risk tolerance, Robert Metcalfe, ROLM, Ronald Reagan, Salesforce, Sand Hill Road, Second Machine Age, self-driving car, shareholder value, Sheryl Sandberg, side hustle, side project, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, skunkworks, Snapchat, social graph, software is eating the world, Solyndra, speech recognition, Steve Ballmer, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Strategic Defense Initiative, supercomputer in your pocket, Susan Wojcicki, tacit knowledge, tech billionaire, tech worker, technoutopianism, Ted Nelson, TED Talk, the Cathedral and the Bazaar, the market place, the new new thing, The Soul of a New Machine, There's no reason for any individual to have a computer in his home - Ken Olsen, Thomas L Friedman, Tim Cook: Apple, Timothy McVeigh, transcontinental railway, Twitter Arab Spring, Uber and Lyft, uber lyft, Unsafe at Any Speed, upwardly mobile, Vannevar Bush, War on Poverty, Wargames Reagan, WarGames: Global Thermonuclear War, We wanted flying cars, instead we got 140 characters, Whole Earth Catalog, WikiLeaks, William Shockley: the traitorous eight, work culture , Y Combinator, Y2K

Kara Swisher, AOL.com: How Steve Case Beat Bill Gates, Nailed the Netheads, and Made Millions in the War for the Web (New York: Crown Business, 1998), xvii; Manes and Andrews, Gates, 403. 31. Brenton R. Schlender, “Computer Maker Aims to Transform Industry and Become a Giant,” The Wall Street Journal, March 18, 1988, 1. 32. “April Fool Pranks in Sun Microsystems Over the Years,” Hacker News, February 14, 2006, last updated January 26, 2014, https://news.ycombinator.com/item?id=7121224, archived at https://perma.cc/G5GH-FN6F. 33. Nancy Householder Hauge, “Misogyny in the Valley,” and “Life in the Boy’s Dorm: My Career at Sun Microsystems,” Consulting Adult, January 29, 2010, http://consultingadultblog.blogspot.com/2010/01/life-in-boys-dorm-my-career-at-sun.html, archived at https://perma.cc/26WB-KTV9. 34.


pages: 708 words: 223,211

The Friendly Orange Glow: The Untold Story of the PLATO System and the Dawn of Cyberculture by Brian Dear

air traffic controllers' union, AltaVista, Alvin Toffler, Apple II, Apple Newton, Buckminster Fuller, Charles Babbage, cloud computing, complexity theory, computer age, Computer Lib, conceptual framework, corporate social responsibility, disruptive innovation, Douglas Engelbart, Douglas Engelbart, Dynabook, Elon Musk, en.wikipedia.org, Fairchild Semiconductor, finite state, Future Shock, game design, Hacker News, Howard Rheingold, Ivan Sutherland, John Markoff, lateral thinking, linear programming, machine readable, Marc Andreessen, Marshall McLuhan, Menlo Park, Metcalfe’s law, Mitch Kapor, Mother of all demos, natural language processing, Neal Stephenson, Palm Treo, Plato's cave, pre–internet, publish or perish, Ralph Nader, Robert Metcalfe, Ronald Reagan, Silicon Valley, Silicon Valley startup, Skinner box, Skype, software is eating the world, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Ted Nelson, the medium is the message, The Soul of a New Machine, three-martini lunch, Watson beat the top human players on Jeopardy!, Whole Earth Catalog

Jones, Steve, and Guillaume Latzko-Toth. 2017. “Out from the PLATO Cave: Uncovering the Pre-Internet History of Social Computing.” Internet Histories 1, nos. 1-2 (2017). Retrieved 2017-05-17 from https://protect-us.mimecast.com/​s/​mmYrB6c7KDzwhY?domain=tandfonline.com Kay, Alan. 2016-06-21. “Alan Kay Has Agreed to Do an AMA Today.” Hacker News. Retrieved 2016-06-21 from https://news.ycombinator.com/​item?id=11939851. ———. 2012-07-10. “Interview with Alan Kay,” Dr. Dobbs Journal, by A. L. Binstock. Retrieved 2015-05-26 from http://www.drdobbs.com/​architecture-and-design/​interview-with-alan-kay/​240003442. ———. 2013. “An Interview with Computing Pioneer Alan Kay,” D.


Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems by Martin Kleppmann

active measures, Amazon Web Services, billion-dollar mistake, bitcoin, blockchain, business intelligence, business logic, business process, c2.com, cloud computing, collaborative editing, commoditize, conceptual framework, cryptocurrency, data science, database schema, deep learning, DevOps, distributed ledger, Donald Knuth, Edward Snowden, end-to-end encryption, Ethereum, ethereum blockchain, exponential backoff, fake news, fault tolerance, finite state, Flash crash, Free Software Foundation, full text search, functional programming, general-purpose programming language, Hacker News, informal economy, information retrieval, Internet of things, iterative process, John von Neumann, Ken Thompson, Kubernetes, Large Hadron Collider, level 1 cache, loose coupling, machine readable, machine translation, Marc Andreessen, microservices, natural language processing, Network effects, no silver bullet, operational security, packet switching, peer-to-peer, performance metric, place-making, premature optimization, recommendation engine, Richard Feynman, self-driving car, semantic web, Shoshana Zuboff, social graph, social web, software as a service, software is eating the world, sorting algorithm, source of truth, SPARQL, speech recognition, SQL injection, statistical model, surveillance capitalism, systematic bias, systems thinking, Tragedy of the Commons, undersea cable, web application, WebSocket, wikimedia commons

ISBN: 978-0-262-57122-7 [51] Timothy Griffin and Leonid Libkin: “Incremental Maintenance of Views with Duplicates,” at ACM International Conference on Management of Data (SIGMOD), May 1995. doi:10.1145/223784.223849 [52] Pat Helland: “Immutability Changes Everything,” at 7th Biennial Conference on Innovative Data Systems Research (CIDR), January 2015. [53] Martin Kleppmann: “Accounting for Computer Scientists,” martin.klepp‐ mann.com, March 7, 2011. [54] Pat Helland: “Accountants Don’t Use Erasers,” blogs.msdn.com, June 14, 2007. [55] Fangjin Yang: “Dogfooding with Druid, Samza, and Kafka: Metametrics at Met‐ amarkets,” metamarkets.com, June 3, 2015. [56] Gavin Li, Jianqiu Lv, and Hang Qi: “Pistachio: Co-Locate the Data and Compute for Fastest Cloud Compute,” yahoohadoop.tumblr.com, April 13, 2015. [57] Kartik Paramasivam: “Stream Processing Hard Problems – Part 1: Killing Lambda,” engineering.linkedin.com, June 27, 2016. [58] Martin Fowler: “CQRS,” martinfowler.com, July 14, 2011. [59] Greg Young: “CQRS Documents,” cqrs.files.wordpress.com, November 2010. [60] Baron Schwartz: “Immutability, MVCC, and Garbage Collection,” xaprb.com, December 28, 2013. 484 | Chapter 11: Stream Processing [61] Daniel Eloff, Slava Akhmechet, Jay Kreps, et al.: “Re: Turning the Database Inside-out with Apache Samza,” Hacker News discussion, news.ycombinator.com, March 4, 2015. [62] “Datomic Development Resources: Excision,” Cognitect, Inc., docs.datomic.com. [63] “Fossil Documentation: Deleting Content from Fossil,” fossil-scm.org, 2016. [64] Jay Kreps: “The irony of distributed systems is that data loss is really easy but deleting data is surprisingly hard,” twitter.com, March 30, 2015. [65] David C.


pages: 1,237 words: 227,370

Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems by Martin Kleppmann

active measures, Amazon Web Services, billion-dollar mistake, bitcoin, blockchain, business intelligence, business logic, business process, c2.com, cloud computing, collaborative editing, commoditize, conceptual framework, cryptocurrency, data science, database schema, deep learning, DevOps, distributed ledger, Donald Knuth, Edward Snowden, end-to-end encryption, Ethereum, ethereum blockchain, exponential backoff, fake news, fault tolerance, finite state, Flash crash, Free Software Foundation, full text search, functional programming, general-purpose programming language, Hacker News, informal economy, information retrieval, Infrastructure as a Service, Internet of things, iterative process, John von Neumann, Ken Thompson, Kubernetes, Large Hadron Collider, level 1 cache, loose coupling, machine readable, machine translation, Marc Andreessen, microservices, natural language processing, Network effects, no silver bullet, operational security, packet switching, peer-to-peer, performance metric, place-making, premature optimization, recommendation engine, Richard Feynman, self-driving car, semantic web, Shoshana Zuboff, social graph, social web, software as a service, software is eating the world, sorting algorithm, source of truth, SPARQL, speech recognition, SQL injection, statistical model, surveillance capitalism, systematic bias, systems thinking, Tragedy of the Commons, undersea cable, web application, WebSocket, wikimedia commons

[58] Martin Fowler: “CQRS,” martinfowler.com, July 14, 2011. [59] Greg Young: “CQRS Documents,” cqrs.files.wordpress.com, November 2010. [60] Baron Schwartz: “Immutability, MVCC, and Garbage Collection,” xaprb.com, December 28, 2013. [61] Daniel Eloff, Slava Akhmechet, Jay Kreps, et al.: “Re: Turning the Database Inside-out with Apache Samza,” Hacker News discussion, news.ycombinator.com, March 4, 2015. [62] “Datomic Development Resources: Excision,” Cognitect, Inc., docs.datomic.com. [63] “Fossil Documentation: Deleting Content from Fossil,” fossil-scm.org, 2016. [64] Jay Kreps: “The irony of distributed systems is that data loss is really easy but deleting data is surprisingly hard,” twitter.com, March 30, 2015


pages: 468 words: 233,091

Founders at Work: Stories of Startups' Early Days by Jessica Livingston

"World Economic Forum" Davos, 8-hour work day, Aaron Swartz, affirmative action, AltaVista, Apple II, Apple Newton, Bear Stearns, Boeing 747, Brewster Kahle, business cycle, business process, Byte Shop, Compatible Time-Sharing System, Danny Hillis, David Heinemeier Hansson, digital rights, don't be evil, eat what you kill, fake news, fear of failure, financial independence, Firefox, full text search, game design, General Magic , Googley, Hacker News, HyperCard, illegal immigration, Internet Archive, Jeff Bezos, Joi Ito, Justin.tv, Larry Wall, Maui Hawaii, Max Levchin, Menlo Park, Mitch Kapor, Multics, nuclear winter, PalmPilot, Paul Buchheit, Paul Graham, Peter Thiel, proprietary trading, Richard Feynman, Robert Metcalfe, Ruby on Rails, Sam Altman, Sand Hill Road, side project, Silicon Valley, slashdot, social software, software patent, South of Market, San Francisco, Startup school, stealth mode startup, Steve Ballmer, Steve Jobs, Steve Jurvetson, Steve Wozniak, The Soul of a New Machine, web application, Y Combinator

That would be a good thing. Paul Graham Cofounder, Viaweb Preface It’s been more than a year since Founders at Work was first published. What have I learned since? The biggest surprise has been the sheer number of people interested in startups. I know about the ones who apply to Y Combinator, read Hacker News, or attend Startup School, but I could never be sure how many people were interested in startups beyond that core of would-be founders. A lot, it turns out. I get emails and see blog posts about Founders at Work on an almost daily basis. Some people finally took the plunge and started a startup, some learned that it was all right to change their idea, some were able to face a new day even though their company seemed doomed.


pages: 961 words: 302,613

The First American: The Life and Times of Benjamin Franklin by H. W. Brands

always be closing, British Empire, business intelligence, colonial rule, complexity theory, Copley Medal, disinformation, experimental subject, Fellow of the Royal Society, Hacker News, Isaac Newton, joint-stock company, music of the spheres, Republic of Letters, scientific mainstream, South Sea Bubble, Thomas Malthus, trade route

., 2:641–43. 690 “Done in Convention”: ibid. 691 “Whilst the last”: ibid., 2:648. 30. TO SLEEP: 1787–90 692 “It is now”: Washington to Lafayette, Sept. 18, 1787, Papers of Washington. 693 “As I enter …fruits of it”: Jackson Turner Main, The Anti-Federalists (New York, 1974), 122, 129, 132–34. 694 “The smaller”: The Federalist Papers, ed. Andrew Hacker (New York, 1964), 22–23. 694 “very great satisfaction”: The Documentary History of the Ratification of the Constitution, ed. Merrill Jensen (Madison, Wis., 1976–), 2:60. 695 “highly reverenced … old age”: Independent Gazetteer, Oct. 5, 1787, and Freeman’s Journal, Oct. 17, 1787; in The Documentary History, 2:160, 185. 695 “Doctor Franklin’s”: Madison to Washington, Dec. 20, 1787, Papers of Washington. 695 “Three and twenty”: Richard Miller, “The Federal City, 1783–1800,” in Philadelphia, ed.


Engineering Security by Peter Gutmann

active measures, address space layout randomization, air gap, algorithmic trading, Amazon Web Services, Asperger Syndrome, bank run, barriers to entry, bitcoin, Brian Krebs, business process, call centre, card file, cloud computing, cognitive bias, cognitive dissonance, cognitive load, combinatorial explosion, Credit Default Swap, crowdsourcing, cryptocurrency, Daniel Kahneman / Amos Tversky, Debian, domain-specific language, Donald Davies, Donald Knuth, double helix, Dr. Strangelove, Dunning–Kruger effect, en.wikipedia.org, endowment effect, false flag, fault tolerance, Firefox, fundamental attribution error, George Akerlof, glass ceiling, GnuPG, Google Chrome, Hacker News, information security, iterative process, Jacob Appelbaum, Jane Jacobs, Jeff Bezos, John Conway, John Gilmore, John Markoff, John von Neumann, Ken Thompson, Kickstarter, lake wobegon effect, Laplace demon, linear programming, litecoin, load shedding, MITM: man-in-the-middle, Multics, Network effects, nocebo, operational security, Paradox of Choice, Parkinson's law, pattern recognition, peer-to-peer, Pierre-Simon Laplace, place-making, post-materialism, QR code, quantum cryptography, race to the bottom, random walk, recommendation engine, RFID, risk tolerance, Robert Metcalfe, rolling blackouts, Ruby on Rails, Sapir-Whorf hypothesis, Satoshi Nakamoto, security theater, semantic web, seminal paper, Skype, slashdot, smart meter, social intelligence, speech recognition, SQL injection, statistical model, Steve Jobs, Steven Pinker, Stuxnet, sunk-cost fallacy, supply-chain attack, telemarketer, text mining, the built environment, The Death and Life of Great American Cities, The Market for Lemons, the payments system, Therac-25, too big to fail, Tragedy of the Commons, Turing complete, Turing machine, Turing test, Wayback Machine, web application, web of trust, x509 certificate, Y2K, zero day, Zimmermann PGP

This is a rather shorter version of the Black Hat Europe paper. [426] “‘Padding Oracle’ Crypto Attack Affects Millions of ASP.NET Apps”, Dennis Fischer, 13 September 2010, http://threatpost.com/en_us/blogs/newcrypto-attack-affects-millions-aspnet-apps-091310. [427] “Vulnerability in ASP.NET Could Allow Information Disclosure”, Microsoft Security Advisory 2416728, 17 September 2010, http://www.microsoft.com/technet/security/advisory/2416728.mspx. [428] “Padding Oracles Everywhere”, Thai Duong and Juliano Rizzo, presentation at Ekoparty 2010 Security Conference, September 2010, http://netifera.com/research/poet/PaddingOraclesEverywhereEkoparty2010.pdf. [429] “Amazon WS Crypto Sigs v2 Broken (Even Amazon Can’t Get Crypto Right)”, Nate Lawson, posting to Hacker News web site, May 2009, http://news.ycombinator.com/item?id=621227. [430] “Attacking and Repairing the WinZip Encryption Scheme”, Tadayoshi Kohno, Proceedings of the 11th Conference on Computer and Communications Security (CCS’04), October 2004, p.72. [431] “JAR File Specification”, Sun Microsystems/Oracle Corporation, 2008, http://docs.oracle.com/javase/6/docs/technotes/guides/jar/jar.html