For the best experience on desktop, install the Chrome extension to track your reading on news.ycombinator.com
Hacker Newsnew | past | comments | ask | show | jobs | submit | history | guenthert's commentsregister

" until you have proven it works, it is broken!"

immediately followed by

"Time to run some tests!"

Prompted a grin. Then however "If we wanted to test this using directed testing we would need to test for all 2^32 input combinations, which sounds like a terrible idea …

… and exactly what I am going to do "

Wait, exhaustively testing float number space ... I read about that before. Might have been https://randomascii.wordpress.com/2014/01/27/theres-only-fou... covered also here https://news.ycombinator.com/item?id=34726919


Interesting project and well written. That only made me miss some links to prior art more though.

iirc, there was a superoptimizer (I belief the term was coined and motivated in that article) in the early nineties for M68k. https://dl.acm.org/doi/pdf/10.1145/36206.36194 might have been that.


Particularly when simultaneously "We are currently in YC Startup School as Geddy at geddy.io and we plan to launch soon."

"While some may see this as a dick move and I wasn’t exactly proud of it, but I actually waited for Daniel’s wife, Katie, to go into labor before bringing all of this up with his management."

Holy cow! Now I've unfortunately witnessed some ugly office behavior too, but this is quite another level.


You don't read much about IBM here, but this is the wrong site to look for them. A big chunk of IBM's business comes from other businesses outside the IT industry. You're more likely to read about IBM in the Wall Street Journal; Google finds "IBM" at wsj.com about 48000 times (it finds "oracle" there about 30000 times).

IBM is known as a toxic tech along with Palantir and Oracle. We talk about IBM on HN, but mostly in negative contexts.

"As Zig has evolved, it has become a target to avoid calling Win32 APIs from kernel32.dll etc., instead using lower-level ones in ntdll.dll."

If we needed an example of why we should avoid using passive voice, this is it.


This sentence doesn't include examples of the passive voice.

Ha, you're absolutely right. The "has become a target" got me there. So glad, Zig wasn't targeted there.

Isn't it more plausible that she mentioned there were radioactive clouds flying in from Chernobyl, because there were radioactive clouds flying in from Chernobyl? After all, it were the even further away Swedes who discovered the fall out from Chernobyl first and alarmed the world.

strtok() happily punches those holes in. Now you could argue, the resulting strings, while null-terminated, aren't true substrings (as the origin string is now corrupted), but in the context of parsing (particularly here using white-space as delimiter), that wouldn't be much an issue.

While this is an interesting project, I found following grating:

"Permissions without root

You don’t need root. Grant capabilities to SBCL:

sudo setcap cap_bpf,cap_perfmon+ep /usr/bin/sbcl

Now sbcl --load my-bpf-program.lisp works as your regular user. Tracepoint format files need chmod a+r to allow non-root compilation with deftracepoint."

That's obviously not ideal. Better might be to create a purpose-built image. Unlike perl, sbcl doesn't even pretend to care about security. Taint mode extension for sbcl, anybody?


> Unlike perl, sbcl doesn't even pretend to care about security.

Mind expanding? What particular stuff does Perl have in terms of security here?


A lot, to the point where there's an entire security page in perldoc: <https://perldoc.perl.org/perlsec>

I wonder if a taint mode for SBCL would mean ignoring SBCL_HOME... that'd be a bit annoying for running more up-to-date SBCL versions on distros shipping with older versions.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search:

HN For You