1. -6

    If you look at the permalink, “A Tale of Two –” is not there. The article may have been written long ago, but the title was definitely changed recently (this morning, right after I posted mine).

    1. 4

      Here’s a screenshot of an email I sent discussing this blog and a talk based on it I plan to give:

      http://imgur.com/OuX9f2l

      The date is 22nd March. I cannot take credit for the title however, that belongs to Charles Dickens.

    1. -4

      I’m not going to even bother mentioning that this post is just an obscene, poorly written advertisement for someone’s company!

      1. 2

        I think dopatraman needs a hug.

        1. 3

          I’d go for a ban for trolling, myself, but hugs could work too.

      1. -8

        Seriously? “A Tale of Two —-” right after I publish my post “A Tale of Two Programmers”?

        1. [Comment removed by author]

          1. 10

            May I suggest a few other Dickensian names instead to alleviate this embarrassing collision:

            • DevOps Copperfield
            • Great Expectations (of 100% uptime)
            • Bleak House Deployment
            • The Old Curiosity DevshOps
            1. 8

              Two Tales Considered Harmful.

              1. 2

                A Tale of Two Hard Problems Considered Harmful

          2. 5

            Do we have a limit like that? Sorry, I didn’t know.

            1. 2

              This seems to have been sorted out, but for the record, no, there’s no such rule. The thing about cliches is that they get used a lot; things like this are going to happen.

              1. 1

                Thank you. I will keep that in mind.

                1. -2

                  I wouldn’t say this has been sorted out. Its disturbing when an entire community casually disregards flagrant disrespect for another person’s hard work. Let alone the troubling lack of creativity that compels a person to copy the title of another post and then downvote the original.

              2. 2

                Hello. I wrote the article, and @szalansky posted it on my behalf. I actually chose the title and wrote the article long before I discovered lobste.rs, so it was just a coincidence.

                1. -8

                  It seems highly suspicious.

                  1. 5

                    FYI you are wrong, and on the internet of all places!

                    1. -8

                      The odds of you publishing a post with the same title scheme as mine on the same day that i did a few hours after i did is HIGHLY unlikely. Thanks for copying my name you shill.

                      1. 4

                        If you have 23 people in the same room, there’s a 50% probability that they will share the same birthday. Sufficient numbers and basic statistics cause all kinds of “suspicious” behavior.

                        The internet is a big place. Collisions occur. Also, no one cares that your articles are titled similarly, and perhaps more importantly, the title “scheme” is neither new, original or overly creative.

                        1. -2

                          Uh.. your analogy doesn’t quite hold up. If 23 people are in a room and asked in sequence to say the first word on their minds, there is a good chance they will be influenced by the person who speaks before them. I posted my article a few hours (if that) before this one. The article (the only one, might I add) had a title extremely similar to mine. That, if nothing else, is highly suspicious.

                          1. 2

                            My point was that, given enough people/items/ocurrences/events/whatever, you’re bound to have “suspicious” behavior which is attributable to random chance. It’s just statistics.

                            Besides, if you want to get defensive about naming, “A Tale of Two Programmers”, by Jacques Mattheij predates your article by a good five years. I think you should apologize to Jacques for using his title.

                            Edit: Or any of these “A Tale of Two Programmers” for that matter:

                            (Which is obviously silly. Because no one cares about titles. Just like no one cares about your title, or the OP’s title. Why am I still responding? I don’t know.)

                    2. 4

                      It is, however I genuinely enjoyed this article and thought others might enjoy it too.

                1. -5

                  No one is going to watch an hour long video…

                  1. 2

                    They are. But I do wish this sort of thing was in a blog post with code examples and an embedded/linked video.

                    1. 1

                      I watched it.

                    1. 2

                      https://en.wikipedia.org/wiki/Scytale (The author got the name wrong, and I took me a bit to find what they meant)

                      1. 1

                        Corrected! Thanks for pointing that out :D.

                      1. 2

                        the thrust of this article is difficult to grasp… what exactly happened? CMU found criminals and reported to the FBI? Or the FBI detected an “attack” and pursued CMU?

                        1. 5

                          CMU found criminals and reported to the FBI? Or the FBI detected an “attack” and pursued CMU?

                          Neither. The FBI said to CMU, “We need you to hack Tor for us please.”

                          CMU said, “OK!”

                          1. 5

                            Do you have any support for that order of events? I know the Tor Project alleged the FBI had paid them a million dollars, but I haven’t seen any evidence. Even in this article I don’t see support for the idea that the FBI directed CMU’s research.

                            What I’ve read on this story has the big open question of how the FBI learned of the unpublished research to subpoena it. There’s a bunch of possibilities here: the FBI requested CMU do this work (even paying for it) and then subpoena’d it to mask that fact; CMU told the FBI it has this information; the NSA told the FBI the CMU had this information; etc. I’d be very interested in support for any of the possible scenarios.

                            1. 3

                              But if that was the case why would the FBI send CMU a subpoena? Wouldn’t they be “partners in crime” at that point?

                              1. 6

                                Putting on my tinfoil hat because I haven’t yet seen evidence of anything…

                                The FBI might fear that the deanonymization work wouldn’t pass judicial review and any evidence would be thrown out as fruit of the poisonous tree. Keeping CMU at arm’s length would mean the FBI didn’t take any improper action, they just used perfectly legal means to get information out of someone who had it.

                          1. 3

                            no mention of Scala or Haskell… or any functional language…

                            1. 12

                              What a freaking blowhard.

                              1. -4

                                this should be the top comment

                              1. 3

                                Mapping out my new side project, a functional, composable, web framework.

                                1. 3

                                  I’m thinking more and more about a different kind of social networking service. An open-source, contribution-driven service that’s direction is not defined by the maintainer, but the contributors. More info here.

                                  1. 1

                                    made any progress? id be interested in working on something like this.

                                    1. 1

                                      Beyond that document, I haven’t made any significant progress. If you want to help out, just be on the lookout for changes to the GitHub repo.

                                  1. -1

                                    as soon as someone starts talking about fp in Java is stop listening.

                                    1. 1

                                      For those (aka myself) who want a deeper understanding of deferred execution:

                                      http://blogs.msdn.com/b/charlie/archive/2007/12/09/deferred-execution.aspx