Hacker Newsnew | past | comments | ask | show | jobs | submit | jasomill's commentslogin

For that matter, you could amend the Constitution to change the process for amending the Constitution, even to eliminate the possibility of future amendments altogether.

But wait, there's more!

As of the fourth Beta, DECnet support has been re-enabled. To make LAT or CTERM connections you must have a licensed copy of Pathworks32 installed.

SSH is now supported on 32bit ARM devices (Windows RT) for the first time

REXX support has been extended to x86 systems running Windows XP or newer. This was previously an OS/2-only feature.

No legacy telnet encryption (no longer useful, but may return in a future release anyway)

For context:

The first new Kermit release for Windows in TWENTY-TWO YEARS

Yes, it's called Kermit 95 once again! K95 for short. 2025 is its 40th anniversary.


IBM z/Architecture, i (OS/400), and AIX aren't primarily used for "hobby stuff".

Not at all.

Most programs only use one or a few hash functions, so grouping each family into a separate crate reduces compliation time for the majority of users. Could also help when auditing the removal of vulnerable hash functions.

As for ripgrep, the organization is quite sensible:

1. one crate to define an interface for regex matchers

2. one crate to implement the native matcher

3. one crate to implement the PCRE2 matcher

4. one crate to define a safe interface to the underlying PCRE2 library

Depending on the application, any one of 1+2+3+4, 1+2, 1+3+4, or 4 alone could be useful.


Yes I perfectly understand the reasoning and technically it is sound.

It becomes insane once you start thinking of real life implications, specifically supply chain attacks.

Although it's only marginally more insane than the other ecosystems.


While I have no personal experience with the 3B2 series, its documentation[1] clearly illustrates the GP's complaint: starting from the most significant binary digit, bit numbers decrease while byte addresses increase.

As for networking, Ethernet is particularly fun: least significant bit first, most significant byte first for multi-byte fields, with a 32-bit CRC calculated for a frame of length k by treating bit n of the frame as the coefficient of the (k - 1 - n)th order term of a (k - 1)th order polynomial, and sending the coefficients of the resulting 31st order polynomial highest-order coefficient first.

[1] https://vtda.org/docs/computing/AT&T/3B2/3b2_Assembly_Lang_P...


While I have a strong personal preference for little endian, one thing I've always appreciated about IBM System/360 and its successors is that it at least has consistent notational conventions: most significant byte first, most significant bit zero[1][2].

[1] https://bitsavers.trailing-edge.com/pdf/ibm/360/princOps/A22...

[2] https://www.ibm.com/docs/en/SSQ2R2_15.0.0/com.ibm.tpf.toolki...


You say this like a system of international law has ever existed that effectively restrains the most powerful nations in the world, democracies or otherwise.

I said "semblance of international law"

The Fulton recovery system[1] using a self-inflating balloon was used in production.

Though if Iranian air defenses are capable of shooting down an F-15, mounting a rescue operation with a C-130 may not be the brightest idea.

Anyone know the minimum speed of a B-2?

[1] https://en.wikipedia.org/wiki/Fulton_surface-to-air_recovery...


>Lifted off the ground, the pig began to spin as it flew through the air at 125 miles per hour (200 km/h). It arrived on board uninjured, but in a disoriented state. When it recovered, it attacked the crew.

Understandable


Iranian Air defense getting lucky is different to it being impenetrable.

This is not a binary situation, and a lucky F-15 kill would not make it a good idea to concentrate more assets in an area where the US will now focus more resources.


I've used Alfred[1] for many years on macOS, and more recently the PowerToys Command Palette[2] on Windows.

Both are easily extensible, so you could certainly wire either up to the local (or hosted) LLM of your choice.

Side note: I just noticed the extension example in the Command Palette demo reel searches HN.

[1] https://www.alfredapp.com/

[2] https://learn.microsoft.com/en-us/windows/powertoys/command-...


If every device is directly connected to every other one of n devices with Thunderbolt cables, each with its own dedicated set of PCIe lanes, you'd be limited to 1/n of the theoretical maximum bandwidth between any two devices.

What you really want is for every device to be connected through a massive PCIe switch that allows PCIe lanes to be connected arbitrarily, so, e.g., a pair of EPYCs could communicate over 96 lanes with 32 lanes free to connect to peripheral devices.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: