Preferences

jnwatson
Joined 6,897 karma
Google Sr. Staff security engineer

  1. UVA triggers the release of nitric oxide from the skin into the bloodstream. This causes blood vessels to dilate, lowering blood pressure and improving circulation.
  2. If you disassemble a modern GPU, that's what you'll find. 95% by weight of a GPU card is cooling related.
  3. The subtle bit of humor was the reposting of the algodrill LeetCode practice site.

    It is depressing that I'll be almost 60 years old and still drilling Aho-Corasick.

  4. I committed the project I maintain to GitHub Actions when Actions first came out, and I'm really starting to regret it.

    The main problem, which this article touches, is that GHA adds a whole new dimension of dependency treadmill. You now have a new set of upstreams that you have to keep up to date along with your actual deployment upstreams.

  5. I caught it on the airplane a few days ago. I would have loved a little more technical depth, but I guess that's pretty much standard for a puff piece.

    It is interesting that Hassabis has had the same goal for almost 20 years now. He has a decent chance of hitting it too.

  6. Exactly. I shorted Sears in 2005 when Lampert took over. I knew he was going to drive that company into the ground.

    Sears went bankrupt in 2018. It took a long time for the market to catch on.

  7. If you're going to go through the effort of learning a new language, it makes sense to consider another language altogether, one without 30 years of accumulated cruft.
  8. Like the Linux kernel?

    Macros are simply a fact of life in any decent-sized C codebase. The Linux kernel has some good guidance to try to keep it from getting out of hand but it is just something you have to learn to deal with.

  9. There's a big gap of knowledge between infosec researchers and ML security researchers. Anthropic has a bunch of column B but not enough column A.

    This was discussed in some detail in the recently published Attacker Moves Second paper*. ML researchers like using Attack Success Rate (ASR) as a metric for model resistance to attack, while for infosec, any successful attack (ASR > 0) is considered significant. ML researchers generally use a static set of tests, while infosec researchers assume an adaptive, resourceful attacker.

    https://arxiv.org/abs/2510.09023

  10. While I didn't disagree with his general politics, he is absolutely right that the US has largely pulled up the ladder behind them. The average age of a first time home buyer is now 40.

    The American dream of having a home and a family is now out of reach for millions of Americans and politicians on both sides of the aisle.

  11. Beer is typically only 2-3 percent ethanol. Its freezing point is only slightly below 0 C.
  12. Smart kids can be a distraction as well. It certainly would have benefitted me to enter G&T at Kindergarten instead of 3rd grade. Much of my first grade was spent separate from the other kids doing 5th grade workbooks.
  13. While I think this is Rust's biggest flaw, this doesn't stem from any particular hatred of C/C++. This is related to memory safety, as it is very difficult to reason about memory lifetimes of object graphs with cycles.
  14. I've started to use agents on some very low-level code, and have middling results. For pure algorithmic stuff, it works great. But I asked it to write me some arm64 assembly and it failed miserably. It couldn't keep track of which registers were which.
  15. Em dashes are widely used. The diaeresis is only used in The New Yorker and those that copied their style.
  16. > "SE is a low class low power field"

    This is the difference with FAANGs. Software engineering is king. The inmates are running the asylum.

    Google is at least 4x as efficient as other large companies I've worked for. Nearly every internal process that can possibly be automated is.

  17. As the article mentions, why not just delegate it to a library dedicated to the solution? c-ares is a solid, well-maintained library.
  18. ASN.1 implements message versioning in an extremely precise way. Implementing a linter would be trivial.
  19. Enterprise Chrome is just regular Chrome with remote policy enforcement. It isn't a different browser.
  20. It is amazing that big endian is almost dead.

    It will be relegated to the computing dustbin like non-8-bit bytes and EBCDIC.

    Main-core computing is vastly more homogenous than when I was born almost 50 years ago. I guess that's a natural progression for technology.

This user hasn’t submitted anything.

Keyboard Shortcuts

Story Lists

j
Next story
k
Previous story
Shift+j
Last story
Shift+k
First story
o Enter
Go to story URL
c
Go to comments
u
Go to author

Navigation

Shift+t
Go to top stories
Shift+n
Go to new stories
Shift+b
Go to best stories
Shift+a
Go to Ask HN
Shift+s
Go to Show HN

Miscellaneous

?
Show this modal