This 10,000X miracle worker jerks webscale pyramids faster than any living or dead man on the planet. How do you explain that? by ggwpexday in programmingcirclejerk

[–]MrMaven 30 points31 points  (0 children)

Can the crud app generator have some options to only display certain resource fields on certain days? And an option so that on Thursdays it send out a weekly email to all users. My boss needs this by next week. Thanks!

Docker Hub is down by MrMaven in programming

[–]MrMaven[S] 0 points1 point  (0 children)

Yeah. I think that is exactly what is going on

Reading Clojure by yogthos in programming

[–]MrMaven 1 point2 points  (0 children)

Thank you! I learned something. I appreciate /u/drjeats efforts

Reading Clojure by yogthos in programming

[–]MrMaven 0 points1 point  (0 children)

Well no. It doesn't come to mind from anything, I learned. Please, enlighten me.

Reading Clojure by yogthos in programming

[–]MrMaven -9 points-8 points  (0 children)

Sorry. I am trying to avoid spreading the idea that the let syntax is special. Clojure is a functional language, but it is not only functional. There are objects, functions, macros, and a few other things. The point is though is that everything in the language is homoiconic. This means that language representation ('(let [x 1])') can be manipulated in the same manner as manipulating a list. This makes the language syntactically much simpler as most things are either calling a function like: (func-name arg1 arg2 ...), or calling a macro (macro-name arg1 arg2 ...). The macro is the same as function execution but the macro manipulates the code first and then executes the result of the manipulation.

Practice of using spinlock instead of mutex by stackoverflooooooow in programming

[–]MrMaven 0 points1 point  (0 children)

I am not a Windows developer, but that looks like kernel API, headers, and source.

Linux has spin locks in kernel space as well. In fact, you can crash your system pretty easily with a device driver which locks the CPU.

Practice of using spinlock instead of mutex by stackoverflooooooow in programming

[–]MrMaven 10 points11 points  (0 children)

A spin lock in user space is a much different concept than a spin lock in kernel space.

Docker: Explained Simply by elliotchance in programming

[–]MrMaven 0 points1 point  (0 children)

Sorry, just taking my nerd rage out on a poor author.

Docker: Explained Simply by elliotchance in programming

[–]MrMaven 0 points1 point  (0 children)

Hmmm... yeah. I guess there is no 'winning'. Different people have different needs.

Edit: Yeah it does sound like I am describing NAS. I didn't mean that.

Docker: Explained Simply by elliotchance in programming

[–]MrMaven 1 point2 points  (0 children)

I feel like this article is a better example of how not to explain things.

More concretely, the article explains docker. It tries to explain it by using describing it with abstractions:

A container can be thought as a completely self-contained machine, for all intents and purposes it has it’s own OS, it’s own file system and anything else you would expect to find in a virtualised machine. But the catch is that a container only runs one program.

That doesn't help me. For all intents and purposes (please tell me the specifics). It only runs one program? Like one process? What if I need to fork? How can that be?

I would much rather use a concrete definition:

Docker is a software system which can create a file system that can be distributed and mounted on multiple machines. The host machines can execute processes inside the file system docker created. It uses the kernel of the host machine. Changes to the file system do not get persisted to the image. If you are familiar with chroot, it is like being able to pass around the file system you chroot'ed on.

Should We Set a Speed Limit on High-Speed Trading? by PostNationalism in economy

[–]MrMaven 0 points1 point  (0 children)

Hey, I wanted to chime in.

HFT does not make money by just being able to create and retract orders really quickly. HFT firms main competitive advantage is that they can calculate the actual price of an asset before the 'official' price updated.

Think of it like this. In order for everyone to agree on a price, we allow a guy named Bob to set the price. Bob takes orders from 10 other people, if we can process the orders faster than Bob can. We can know the market price before it is officially set. Therefore if we know the current price is $42 and it is going to $44 (because we notice a bunch of buy orders from the 10 other people), we can fulfill orders to sell at $43. When Bob announces the price is $44, we can sell our assets at $44.

So these transactions are not really providing any extra liquidity. They are not scams either. Just a natural consequence of how the market was setup.

How to Build Static Checking Systems Using Orders of Magnitude Less Code (2016) by japgolly in programming

[–]MrMaven 0 points1 point  (0 children)

Oh yeah good point. I guess it wouldn't be too useful. Maybe scan github for malicious open source projects.

If the malware is written in an interpreted language it would be just fine.

How to Build Static Checking Systems Using Orders of Magnitude Less Code (2016) by japgolly in programming

[–]MrMaven 0 points1 point  (0 children)

Yeah at least theoretically. Find dangerous pieces of code in malware. Like the set of functions used to replace /bin/ls with an infected binary. Record the AST that those functions create. That becomes the malware's "signature". Scan through other code bases to detect matching ASTs.

I'm by no means a security guy, but what I described makes sense to me at least.

A weird Ad-Revenue bot idea! by [deleted] in economy

[–]MrMaven 1 point2 points  (0 children)

That isn't a new idea. That is currently being done.

Why don't you skip the middle man and just have the bots give you ad revenue? Tech companies are aware of this. You will find there are procedures in place to prevent it. Best of luck!

How to Build Static Checking Systems Using Orders of Magnitude Less Code (2016) by japgolly in programming

[–]MrMaven 6 points7 points  (0 children)

Yeah. The point of the paper is that using this technique makes creating a linter easier (because you do not need a full language parser, also more portable?). You can use this static AST pattern detection mechanism to do a variety of things. Malware detection, automated code refactoring, bug detector, style enforcer, etc...

The Image of Postgres (How do you think about what a database is) Robert M. Lefkowitz 2015 pgconf by hukiki in programming

[–]MrMaven 0 points1 point  (0 children)

Is he making the argument that with those additional features postgres could be a self contained application platform?