Hacker Newsnew | past | comments | ask | show | jobs | submit | rodionos's commentslogin

Once the Fed funds rate gets closer to 5%, you'll see more pushback from politicians and media. What does the Fed do in this situation if it needs to keep tightening? It may choose to switch to smaller rate changes, or even go flat, and at the same time embark on Treasury sales, or at least, rebalancing along the curve. So either way, not a good time to be in bonds.


Here's what's weird. Believe it or not, the Fed Funds Rate lags 10Y Treasuries and rarely goes above it [0]. I would even go as far to argue that's it's mainly a potemkin policy tool at this point, since our economy is so exposed to 10Y Treasuries, which have completely unrelated pricing dynamics.

So in practical terms, if there is political pressure to lower the 10Y, The Fed will probably cut Fed Funds (doing nothing, hopefully dropping it as a policy tool going forward) and then everyone will kind of realize QE is the only current policy tool that actually works.

But then what, people will be calling for more QE to make mortgage rates drop? I mean fine, but it does speed up the 'when does the market question the concept of the Fed owning the Treasury's debt' problem.

[0] https://fred.stlouisfed.org/graph/fredgraph.png?g=TXsO


> The Drovorub-server uses a MySQL database to manage the connecting Drovorub-client(s) and Drovorub-agent(s).

This assumes the NSA was able to infiltrate the Drovorub C2 server, I guess.


They have the server software. There's a couple ways they could get it. 1.) They could have hacked the C2 server or a development network, like you are talking about. 2.) The server could be forward deployed to a cloud provider or other infrastructure and law enforcement served a subpoena for a copy of the cloud server. The second seems just as likely as the first.


Or they could have just bought a copy from a compromised developer. Real world spying happens a lot too.


Yeah, there's a lot of other ways they could have gotten it.


Not necessarily. You could probably infer it from a MySQL client in the malware itself and the queries its making to tables and such.


They know specific commands and configurations for the "drobovur-server" which is the "Command and Control (C2) Server." This makes me think they have the actual server software and probably some sort of operational deployment.


That sounds reaaally unlikely. If the malware shipped a mysql client the NSA would definitely be able to pop the mysql server it connects to.


the point wasnt whether or not they could or did. the point was that it could be inferred based on what sql client the malware client was using without ever touching the sever.


It is extraordinarily unlikely that the malware would ship with a mysql client or talk mysql with the C2

If it does, that's an easy claim to prove.


Read the document. They have the server software. They have configuration files for the server, they know how it processes communication, they know how it generates UUID's. They have the server software.


Why RTFA when I can make baseless speculations? :D



link is broken now.



For an alternative approach, if you treat this function as a time series where x is time, you can get a reasonably good approximation by performing SVD of the trajectory matrix and building the forecast from the principal components (eigen vectors) using a recurrent formula.

Here's an example:

https://apps.axibase.com/chartlab/9922f98f

* Chart 1. Function value for x in [0, 1).

* Chart 2. Function value for x in [0, 2).

* Chart 3. Function value for x in [0, 1) and extrapolated values for x in [1, 2).


We removed all tracking scripts from the front-end framework we use (vuepress) and are only checking nginx logs with geoip and org extensions enabled. This is more than enough for us as we're in the non-consumer software business with a relatively low volume of page views by human visitors. We see the org, the country, the city, and the page flow. Good enough.


Not having a nose is ok compared to having a half of the head attached from another sculpture. This was the case in imperial Rome when the sculptors had to quickly retrofit works in progress to fit the new emperor. In some periods you had three emperors succeed each other, most certainly involuntarily, within a period of three years.


You don't need to go that far back in time, changing statues heads was a thing in USSR.



This could be some banal snapchat filters and automated photoshop transformations, but it could also be the dawn of new '-ism'.


The dataset is here https://physionet.org/physiobank/database/mitdb/. Only a handful of files...


In Java `x` is reserved for time zone offset: https://axibase.com/docs/atsd/shared/time-pattern.html#patte...


I thought you’re supposed to use Z for that? What’s the difference then?


There's an example column on the link, it has to do with the exact formatting of the offset.


Z is just shorthand for for offset +0.


This would put the last year's Nobel prize at risk.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: