• shalabh

    shalabh

    2 years ago
    Is there any 'intro to writing papers' for industry folk?
    shalabh
    Mariano Guerra
    +1
    6 replies
    Copy to Clipboard
  • Kartik Agaram

    Kartik Agaram

    2 years ago
    I just wrote https://lobste.rs/s/6gzmym/static_types_are_dangerously#c_9lzbuq A couple of crazy ideas on types: 1. The Right Way is for product types to be nominative and sum types to be structural. 2. Maybe we need tags for product types as well? Then unify types on the names not of types but of their constituent tags, whether sums or products. e.g.
    Foo
    and
    Bar
    can be automatically coerced in:
    type Foo = A int * B boolean
    type Bar = A int * B boolean
    Kartik Agaram
    shalabh
    +2
    7 replies
    Copy to Clipboard
  • shalabh

    shalabh

    2 years ago
    Isn't @Ivan Reese in charge now?
    shalabh
    i
    +1
    3 replies
    Copy to Clipboard
  • i

    Ivan Reese

    2 years ago

    https://www.youtube.com/watch?v=K4DlqsxdOfY&t=4212

    There's a new glitch that was discovered in Legend of Zelda: Ocarina of Time a few months ago, which was exhibited live as part of the Games Done Quick speedrunning charity marathon last week. This glitch is an incredible feat of both reverse engineering and virtuosic game input, and the commentators do a good job of explaining what happens. For those who aren't gamers this might not carry much significance, but for anyone who plays games in general or Ocarina of Time in particular this should be a real head trip. This category of speedrun is "100% no source requirement", which means the runner needs to acquire every single item in the game, but that item doesn't need to be acquired from its original source. This glitch is the skeleton key that unlocks every item in the game. All the below is explained better by the video, so if you're interested you should watch that instead of reading this. In summary, the glitch works by abusing the boomerang, a chest, and water. There's a deku scrub that gives Link a heart. ZFG (the player) collects that heart with the boomerang. The boomerang "moves" the heart by copying the boomerang's position to the heart's position every frame. Through a series of very careful inputs, ZFG causes the game to unload the heart from memory while it's being boomeranged, and load something else (Zelda's Letter) in its place, causing the boomerang to write position values on that object instead. ZFG then causes a room with a chest to load exactly when the boomerang is in a very precise position, so that the chest ends up containing the item being carried by the boomerang. This item is normally never found inside a chest, so when Link collects this item from the chest, the game actually ends up giving Link a different item — and which item Link receives is determined by the angle (in 256th increments) Link is facing. By repeatedly going out bounds, dying, and being revived by a fairy, ZFG tricks the game into thinking Link is underwater when he's not, and is able to collect multiple specific items from the chest. No way in hell would I post this to #general 😛
    i
    g
    +1
    8 replies
    Copy to Clipboard
  • Duncan Cragg

    Duncan Cragg

    2 years ago
    ↑ Wow didn't know I had The Power to do that!
    Duncan Cragg
    i
    +1
    3 replies
    Copy to Clipboard
  • Pere

    Pere

    2 years ago
    Hi everyone. I'm currently working on permissions for our saas product and this led me to a lot of thinking about FOC topics. The way I see it, permission is a topic that can get quite complex, but really does not add a lot of value to the end users. As a PM, I really don't want to spend a lot of time on it, I just expect it to get done. And I think that any person that is trying to hack something for the real world eventually reaches a point where they need to think about this, but they would rather spend the time solving the problems they really care about, and not about the tables for a RBAC permission model. So it seemed to me quite obvious that this was a ' solved' problem in programming. I can just use an API in the code to define what is fenced with acces control, I automatically get a GUI to manage that, and voilà, I can handle role-based permissions without worrying too much about it. I have not found such thing, which makes me think that I'm not looking right (hopefully). Anyone has any experience with these things?
    Pere
    Mariano Guerra
    +1
    4 replies
    Copy to Clipboard
  • noahtren

    noahtren

    2 years ago
    this is a little out there, but has anyone considered using deep neural networks to try representing programs visually? for example I could image a setup like an autoencoder that inputs and outputs the AST of a program, but the latent space is an image vector. given a large enough dataset, this would be a way to see if it's possible to come up with a universal graphical representation of all programs. I did something like this for representing unique letters/binary strings and am curious if I could extend it to "programs": https://github.com/noahtren/GlyphNet
    noahtren
    Konrad Hinsen
    3 replies
    Copy to Clipboard
  • gman

    gman

    2 years ago
    TIL: There are coding fonts with ligatures to make things like === and => look like other symbols
    gman
    2 replies
    Copy to Clipboard
  • gman

    gman

    2 years ago
    Curious if anyone has any actually interesting uses for a more graphical command line. I know lots of people here want the command lines to die 😅 but, I saw "Hyper" which is a terminal written in Electron (yes, I can hear you screaming already 🤣) But of course the fact that Hyper is in Electron means that any hyper aware command could output more than text directly to the terminal like spit out an jpeg or png inline as output, an SVG file, an actual
    <table>
    , a responsive css grid or flexbox, even an interactive app that lingers. I didn't see any good examples on the front page though sadly except fireworks coming out of your cursor 🙄 https://hyper.is/
    gman
    s
    +6
    13 replies
    Copy to Clipboard
  • Cole

    Cole

    2 years ago
    Anyone here know if Glamorous Toolkit is built directly on Pharo, or if GT will get benefits of the Pharo 8.0 release?http://pharo.org/news/pharo8.0-released @Tudor Girba
    Cole
    1 replies
    Copy to Clipboard