Hacker Newsnew | past | comments | ask | show | jobs | submit | iwalton3's commentslogin

I'm still experimenting with it and finding out what works and what doesn't, but I have made some side projects with Claude including a web framework that doesn't require a build step/npm dependencies (great for my personal website so I don't have to depend on npm supply chain nightmares), a fully featured music player server, and also a tool that lets the agent review it's past conversations and update documentation based on patterns such as frequent mistakes, re-explored code, etc.

Web framework (includes basic component library, optional bundler/optimizer, tutorial/docs, e2e tests, and demos): https://github.com/iwalton3/vdx-web Music player web app (supports large music libraries, pwa offline sync, parametric eq, crossfade, crossfeed, semantic feature-based music search/radio, milkdrop integration, and other interesting features): https://github.com/iwalton3/mrepo-web Documentation update script (also allows exporting Claude conversations to markdown): https://github.com/iwalton3/cl-pprint

Regarding QC these are side projects so I validate them based on code review of key components, e2e testing, and manual testing where applicable. I find having the agent be able to check its work is the single biggest factor to reducing rework, but I make no promises about these projects being completely free of bugs.


The amount of medical advice on those LLM content farms is very concerning, someone is going to get hurt eventually. I recently made a user script that tries to highlight LLM generated text and sometimes when I search things more than half the results are garbage and the entire articles (including the bios of the supposed professionals who write the articles!) get highlighted purple. One way to avoid them in a pinch when the content isn't time sensitive is to filter out anything from after November 1st 2021, but it's not ideal. I hope duck duck go finds a way to filter the AI pages out.


> I recently made a user script that tries to highlight LLM generated text

How does that work?


It uses one of Mozilla's models: https://huggingface.co/fakespot-ai/roberta-base-ai-text-dete...

It has a pretty high false positive rate though, but it reliably highlights AI generated spam websites and saves me from having to read them.


Random number generator and vibes probably.


This bash config allows you to cd directly to the most commonly used directory with a specific name. It also has tab autocomplete. It does require logging all used directories though.

  tabChar=$'\t'
  function prompt_command {
      echo "$(date +%Y-%m-%d--%H-%M-%S)$tabChar$(hostname)$tabChar$PWD$tabChar$(history 1)" >> ~/.full_history
  }
  export PROMPT_COMMAND=prompt_command
  
  function c {
      while read -r _ dir
      do
          if [[ -e "$dir" ]]
          then
              echo "$dir"
              cd "$dir"
              break
          fi
      done < <(cat ~/.full_history | tail -n 10000 \
          | cut -f 3 | sort | uniq -dc | sort -hr | grep "/$1$")
  }
  
  function _c {
      local IFS=$'\n'
      COMPREPLY=( $(cat ~/.full_history | tail -n 10000 \
          | cut -f 3 | sort | uniq -dc | sort -hr \
          | sed 's/.*\///g' | grep "^$2") )
  }
  complete -F _c c



+1 for z. one of the best timesavers available.


There is a driver and firmware for sigrok for using the PI Pico that was posted to Hackaday a while back. It hasn't been merged upstream yet but I got it up and running today just fine building it from source. https://github.com/pico-coder/sigrok-pico


I have found that a useful way to evade antivirus issues with PyInstaller is to build my own copy of the bootloader and encourage use of the 64 bit version over the 32 bit version (since most malware will use the 32 bit version to infect the most computers).

I have a GitHub CI job which is able to automate the process for each release. https://github.com/jellyfin/jellyfin-mpv-shim/blob/master/.g...


I have been using this "magic cd" alias for a while. You just type c and then the name of a folder, and it will find the most commonly visited folder with that name from your history and send you to it. It also supports tab completion.

https://gist.github.com/iwalton3/3f9bfce510f959782404be25cab...


I would say that YouTube is a notable exception here. There is a lot of music to be discovered and I personally rarely watch videos there without sound.


Youtube is great for music but I wouldn't call it a social network.


Not being a social network (according to the currently popular^W successful model) is a feature if you ask me.


Plex uses a combination of wildcard certificates and a custom DNS resolver to offer HTTPS on local networks, but it does require a working internet connection to work. [1]

You can also get a certificate through the Let's Encrypt DNS challenge without having to expose a server to the Internet, but you'll still need ownership of a domain name and either an internet connection or a local DNS server to support HTTPS using that certificate.

There is always the option of creating a local certificate authority for your devices, but this is kind of a pain. There are some new applications that aim to make this easier [2], but there is no easy way around having to install the root certificate on each device.

[1] https://blog.filippo.io/how-plex-is-doing-https-for-all-its-... [2] https://github.com/smallstep/certificates


I bought a bunch of Micro USB cables for the same reason. Most of the ones I had on hand didn't have data lines as they were only for charging, which can be fun to troubleshoot as devices connected to the cables just don't show up.


Those are a special kind of evil. I always made sure to properly mark them to not spend time debugging non-working USB connections.


Some of them will let you trick the phone into charging with a full 2/3 amps, even though you've plugged it into a laptop or something that would normally show "charging slowly".

Obviously you're relying on the laptop circuitry to not burn out, but laptops are typically designed with very robust USB circuitry because people often short them out by putting in broken cables.


You might want to keep them around, because sometimes you want to ONLY charge a device, without allowing the possibility of a data connection.


Sure but I always flag them with red electrical tape so their true nature becomes obvious


I always tell users to Mark the file as trusted before running it, which is easier to do and less subject to difficult to navigate dialogs. I use a message like this:

> To avoid getting security warnings each time you launch the application, right click and select "Properties". Click "Unblock" towards the bottom of the page, and click "OK".


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: