Hacker Newsnew | past | comments | ask | show | jobs | submit | ffsoftboiled's commentslogin

I know of a couple people. It was a pretty miserable experience.

Impossible for a Vocational Tech teacher in the networking field. How can I teach computers without computers?

(Maybe use some of those skills to figure out a way to read more than the headline.)

I recommend reading at least the closing line:

This means introducing digital technology at later ages after basic reading and other skills have been achieved.


Which shifts things from "before high school" to "in primary school and then gradual introduce aspects on it".

Open Ritual 1.0 is a gender-neutral, open source initiation framework with mutual aid obligation built into the protocol at the moment of initiation — not bolted on afterward. The distribution model is GitHub. The license is CC BY-SA. Fork it, run it, publish your version. The one thing that cannot be forked away: the candidate must never know what comes next. Everything else is open.


This guy does an excellent breakdown. But the TLDW: possibly a Saudi superfan,

https://www.youtube.com/watch?v=6ob0f1kCtOM


"Arthur Miller interview on "The Death of a Salesman" (1999)"

This what you meant to post?


perhaps they meant to post this video (which is excellent): https://www.youtube.com/watch?v=vJ_pEP3fRvM


My apologies. My copies got messed up. Thanks for the help.


If the intent is to collect foreign IPs attempting login - you could block it down the chain. Lots of intelligence reasons to do this.


“As we enjoy great advantages from the inventions of others, we should be glad of an opportunity to serve others by any invention of ours; and this we should do freely and generously,”


Who are you quoting?



oh right, archive.ph, I dont know how I forgot about that, thanks!


As an Information Tech Instructor I have my students use ChatGPT all the time - but it never occurred to me to make them share the link. Will do it now.


1. If rolled out right, you select a few influencers and taste makersn generate buzz and then release.

2. Retina scanning.

3. The Human Network.


And if real-life meetings are an option then users could verify each other's credentials https://en.wikipedia.org/wiki/Key_signing_party



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: