Hacker Newsnew | past | comments | ask | show | jobs | submit | sshb's commentslogin

In the same vein: https://typespec.io/


Might be worth checking out: https://quantum.country/


This unconventional computing magazine came to my mind: http://links-series.com/links-series-special-edition-1-uncon...

Compute with mushrooms, compute near black holes, etc.


Postponing any of my e-reader purchases until the Daylight Computer tech would reshape the market

https://daylightcomputer.com/


Only 190 DPI, and contrast and viewing angles are quite bad: https://youtu.be/iHeIw9rXzUQ?t=570


Wow. Not a great look. Thanks for sharing


$729?

Well, I don't think I am rich enough to throw my money at that...


Eh, for all their bluster there’s nothing exceedingly groundbreaking about Daylight’s tech; it’s just using a bog-standard transflective LCD.

By their logic, my Casio digital watch is “e-paper”.


Same, no blue light or eyestrain is a plus. I agree with the other child comment though, the price is too steep for now. FPS and it being Android and therefore extendable is great. I want one.


Reminded me of the circles in the sky method that might help studying the topological structure of the universe.

https://mphitchman.com/geometry/section8-3.html

(I think I read about it first in “The shape of space” book)


From what I can see, Openllmetry asks you to manually call tracer for non-default OpenAI libraries (i.e. not Python/Node.js) [1]

OpenLIT might be easier to integrate with any language that supports OTEL for HTTP clients — you just trace your HTTP calls to OpenAI.

[1] https://www.traceloop.com/docs/openllmetry/getting-started-r...


How does it do that for ruby for example? (which is in the link you provided). OTEL instrumentation for HTTP doesn’t instrument the body so you won’t be able to see token usage, prompts and completions. Or am I missing something?


You might want to check out https://dchest.com/authbook/


I was always wondering if it’s possible to figure pledges in compile-time for Go, e.g., declare in your module “I will never access network” and make compiler verify that. (Wouldn’t work for assembly for sure, but probably is okay for most of the modules)


You might be interested in Capslock, which attempts to do that through static analysis. https://security.googleblog.com/2023/09/capslock-what-is-you...


I recently saw a post about Cackle [1] coming out of the rust ecosystem which looks pretty cool. Similar to what others have said, there's always a chance that a C lib or shell script is leveraged to bypass compile time guarantees. I think that's why it's important to do both. Do what you can to keep your supply chain safe and limit your runtime as much as possible.

[1] https://davidlattimore.github.io/making-supply-chain-attacks...


Go lets you run arbitrary shell commands. Even if you couldn't, you can do virtually anything with IO. Even if it had some way to guess the file you're trying to open is a socket, you don't necessarily need a socket. You can be writing to a named pipe or even a tty that serves as the input to ncat which keeps an active tcp session with some C&C server always running as a system daemon. That might sound ridiculous, but real-world malware often works in pairs like that where one process will simply see if another exists, do bad stuff if so, and forget about it if not. They're attacking millions if not billions of hosts, so don't need them all to join the botnet. Only the kernel at runtime knows what you're doing at the level of detail needed to prevent something like this.


/proc would like a word with you

But yes technically such a setup is possible (not with any mainstream OS though). It would have to be very restrictive w.r.t mounts and virtual file systems.


[[[FFR]]]FFRFFRFFCFFFFFFFFFFFFFFFCCCCCCC[[[FFR]]][[[FFR]]]FFCFFFFFFFFFFFFFFFFFFFFFFFFFFFCCCCCCCRR[[[[[FFFFFF]]R]]]FFFFFFFFFFFFFFFFFFFRRCCCCCCCCCFFFFFFFFFFFFFFFFFFFFFFFFFCCCCCCCRRRRRRFFRFFFRFFFFFFFFFFFFFFFFFRFFRFF


Stratospheric aerosol injection is one of the proposed approaches https://www.euronews.com/green/2023/07/05/sun-blockers-us-sc...


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: