Hacker Newsnew | past | comments | ask | show | jobs | submit | dorafmon's commentslogin

God I always thought this is because I am not a native English speaker, although I have been living in UK for more than 10 years I thought it is just becasue my English is not good enough.


They have RSU which can be sold, or hold for even more money later.


Why this report is 50B while a recent BBG report said 100?

https://www.bloomberg.com/news/articles/2020-05-20/tiktok-ow...


I believe the article originally posted is referring to TikTok’s valuation as a standalone product, should it be spun off. Whereas the link you posted is about the valuation of parent company ByteDance.


Bytedance is the parent company. It has apps other than TikTok. Douyin, basically the Chinese version of TikTok is one. Toutiao, a news aggregator, is another.


Hi, I have been working on an alternative to `toml` and `tomlkit`. One thing I have found in my day job is that these libs are slow when parsing toml files, and I think the reason behind it is that they are pure-python implementations. I have made a wrapper for a high-quality C++ toml parser (tomlplusplus) and think this wrapper can provide better performance if your app parses a large number of toml files like mine do.

The repo is here: https://github.com/bobfang1992/pytomlpp

Please let me know your thoughts!

Bob


If they developed an alternative version of OpenSSH with backdoor how can they distribute it so that people will actually use it?


Crowbar attack versus the distribution maintainer.

Physical access to the target's system.

Control the network upstream of the target so that the modified checksum and package can be delivered during package upgrades.

Compromise the mirror used by the target to provide the modified checksum and package.

Hide the code changes in a series of semi-related ostensibly legitimate pull requests. Legitimise your pull requests by developing corner cases which expose "bugs" in the software you wish to attack.

Crowbar attack against the upstream maintainer.

"USB key in the carpark" attack.

Those are some ideas. I don't claim to be an expert in the area.


I bet the backend service is developed by the Evi Technologies group in Cambirdge.


Can anyone explain why the lawyer is so keen on making Bill Gates to confirm that he thought that Java is a competitive threat?


At the time, Microsoft's licensing disagreement with Sun over Java frameworks and integration with native code had some overlap with the DoJ's case: Was Microsoft attempting to eliminate a threat to their Windows monopoly with "embrace, extend & extinguish"?

I think the government ultimately dropped that angle.


IANAL but I suppose it is to paint a certain picture of BG's intentions regarding Java which would be then used to motivate the decision of the judge/jurors [0].

[0] Your legal system may varies but it's often about judging the intention and then the consequences.


So it can be used against him? How?


http://en.wikipedia.org/wiki/Intention_in_English_law

If the lawyer can prove or make BG admits JAVA is a threat then BG's actions against JAVA can be seen as deliberate rather than accidental or unfortunate.

Because the "Oops I didn't think tweaking JAVA API so it works only on Windows would hurt SUN that is trying to sell a JAVA thingie that works everywhere" card wouldn't work that well and it would established deliberate questionable practice.

In this case it might or might not be something like that.


Aha so you find this today? What's the point you want to make?


test


The best sorting algorithm ever.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: