Preferences

josefx
Joined 4,911 karma

  1. At the application layer you would not see the reordered bytes. However on the network you have IP beneath both UDP and TCP and network hardware is normally free to slice and reorder those IP packages however it wants.
  2. I think you could try to add the flat MSG_MORE to every send command and then do a last send without it to indirectly do a flush.
  3. > If nobody is maintaining them, do we really need them?

    Given how often issues can be traced back to open source projects barely scraping along? Yes and they are probably doing something important. Hell, if you create enough pointless busywork you can probably get a few more "helpfull" hackers into projects like xz.

  4. > It's a class of problem that raster image formats basically don't have.

    That took way too long to be this way. Some old browsers couldn't even get the colors of PNGs correct, let alone the transparency.

  5. > That looks like a struct offset dereference from a nil pointer, for what it's worth.

    The 42 is an explicit value in the example code. From what I understand the code repeatedly changes the value assigned to an interface variable from an object containing a pointer to an object containing an integer. Since interface variables store the type of the assigned value, but do not update both type and value atomically a different thread can interpret whatever integer you put into it as a valid pointer. Putting a large enough value into the integer should avoid the protected memory page around 0 and allow for some old fashioned memory corruption.

  6. You can blame whoever invented the word "if", as soon as you can branch based on data you can just write an interpreter that turns data into instructions, no matter the architecture.
  7. > and another that wanted to create the platform on which Microsoft Word could be built.

    Apparently they failed. The web version of Word is still far from having feature parity. Of course doc is one of those everything and the kitchen sink formats, so implementing it on top of a platform that was originally intended to share static documents is kind of a tall order.

  8. > maintain a feature that no one can actually use;

    If only there was a way to detect which features a browser supports. Something maybe in the html, the css, javascript or the user agent. If only there was a way to do that, we would not be stuck in a world pretending that everything runs on IE6. /s

  9. Not everyone is using their browser to mine dogecoin.
  10. > It's a clown car format

    As is the destiny of any document format in wide spread use, PDF had flash, doc had ActiveX.

    Also this text is formatted using a mark down language fully capable of embedding entire applications.

  11. > The problem with player hosted servers is that it was very hard to get a fair and balanced competitive match

    Playing against overwhelming odds has its own kind of charm. I once spend days just sabotaging the top players on some gun game servers, only wining myself once or twice. Games against friends with various fun handicaps and flat out abuse of any knowledge you could gain from playing against the same people repeatedly - what good is a hidding spot when everyone knows you will be there 50% of the time.

    "Fair and balanced" games against completely random people are just missing something for me.

  12. > but without quoting which made the command hunt for the word match ending space which was regrettably, the D:\ component of the name

    Except the folder name did not start with a space. In an unquoted D:\Hello World, the command would match D:\Hello, not D:\ and D:\Hello would not delete the entire drive. How does AI even handle filepaths? Does it have a way to keep track of data that doesn't match a token or is it splitting the path into tokens and throwing everything unknown away?

  13. > But then LLVM showed up and showed it is no longer imperative to have a viral license

    I am not sure I remember everything right, but as far as I remember Apple originally maintained a fork of gcc for its objective-c language and didn't provide clean patches upstream, instead it threw its weight behind LLVM the moment it became even remotely viable so it could avoid the issue entirely.

    Also gcc didn't provide APIs for IDE integration early on, causing significant issues with attempts to implement features like refactoring support on top of it. People had the choice of either using llvm, half ass it with ctags or stick with plain text search and replace like RMS intended.

  14. I think it is more a matter of convenience. There are countless string implementations for C, some tiny projects, others part of larger frameworks like Glib. At the end of the day a C developer has to decide if they are going to pull in half of gnome to handle a few lines of IO or if they are just going to use the functions the C standard conveniently ships with. Most people are going to do the later.
  15. Very good track record there, native clients, floc, manifest v2, ...
  16. > The first requirement for safe hashtable implementations is a secret key,

    Some languages use different approaches. The buckets in a Java HashMap turn into a sorted tree if they grow too large. Then there are trivial solutions like adding an input limit for untrusted users. Either way works, is secure and doesn't depend on a secret key.

  17. Sys exit does not crash. It raises a SystemExit exception, which can be caught on any layer above it. Given that python uses exceptions for trivial things like loop termination this can be considered normal flow control.

This user hasn’t submitted anything.

Keyboard Shortcuts

Story Lists

j
Next story
k
Previous story
Shift+j
Last story
Shift+k
First story
o Enter
Go to story URL
c
Go to comments
u
Go to author

Navigation

Shift+t
Go to top stories
Shift+n
Go to new stories
Shift+b
Go to best stories
Shift+a
Go to Ask HN
Shift+s
Go to Show HN

Miscellaneous

?
Show this modal