Hacker Newsnew | past | comments | ask | show | jobs | submit | zakki's commentslogin

But when things evolve they don't think if they will have enough heart capacity to pump the blood. They just evolve and by chance they got it right.

So why whale didn't get the chance to be bigger yet?


Because the cost to things that allow the whale to survive is greater than the benefit of being larger, on the whole. If they get bigger, they die and are survived by slightly smaller versions, and over a long period of time, you get a range of slightly bigger and slightly larger whales, centered around whatever average size best fits the niche for that particular time span.

It's usually a whole suite of interrelated reasons that are affecting any given feature - size would include hearts, nervous system performance, food intake, protection from predation, and so on, with dozens of factors playing a part.


Is it 1mm/sec?


no, what? µ is the dimensionless number 10^-6, just like k is the dimensionless number 10^3.


And you are doing what with that dimensionless number? Multiplying?


is 0.0052 good or bad?


I guess because our freedom is not unlimited.


Can I virtualize Windows 7 and PostgreSQL in it?


Any recommended global brand with humidity sensor?


I have some Panasonic microwave that was in the apartment when I got it, and I know LG has it on at least some of their microwaves. Keyword to look for is something along the lines of "Sensor reheat" (which uses the same sensor for reheating food).


Is Corning glass the one used in smartphone?


Neither. Push your car.

*didn't read the article


When I clicked one of the game, the initial position is wrong. I clicked another game and it was wrong as well. Am i wrong?


>Chess960, also known as Fischer Random Chess, is a chess variant that randomizes the starting position of the pieces on the back rank to eliminate memorized opening theory and emphasize creativity from move one.


Indeed. This is Chess 960.


doest it have identity-aware proxy built-in?


Yes, every resource that needs to be protected is represented by a "Service" that's implemented as a L7-aware identity-aware proxy in the Octelium Cluster, which is a distributed system that's running on top of a k8s cluster. Users simply access the protected resource/upstream through the Cluster, namely the Service, from a data-plane perspective, and the Service/identity-aware proxy does authentication/authorization/routing/visibility on a per-request basis. This upstream could be an internal resource directly accessible by the Cluster, or remotely behind NAT, or simply publicly protected SaaS resource (e.g. API protected by an access token, SaaS database protected by a password, etc.). You can read more about how Octelium works here https://octelium.com/docs/octelium/latest/overview/how-octel...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: