Hacker News new | past | comments | ask | show | jobs | submit | abhinavk's comments login

Try fish or xonsh.

> sudo systemctl

Make an alias like sctl. Takes 5 seconds.

Or an abbr if you are using fish. They are more like text-expanders than aliases.


> the fab process equipment itself come from?

Isn't there only one for this kind of scale: ASML?


ASML for those who don't know is a Dutch company, and supplies the EUV machines for both TSMC and Intel (It is not clear to me if Samsung uses EUV in its current process nodes). I believe they are the only EUV supplier in the world. There are certainly other suppliers other that ASML, since there is a lot of other equipment other than lithography, but that's a critical one for modern process nodes.


Besides lithography there are also several US suppliers for semiconductor manufacturing, Applied Materials, Lam Research, KLA.

Zed team also being the creators of Electron should have been the best people for this. They themselves opted to write a new immediate mode UI library.

Yeah,atom too back in atom, they tried really hard to improve speed of atom by rendering in GPU as texture but before that properly implemented MS took over.

Microsoft thought the same for naming their 2nd Xbox the Xbox 360.

So revolutionary. They took the Xbox strategy, totally flipped it on its head. Then they flipped it again.

Currently XBox seems to have inherited some folks responsible for Windows developer frameworks strategy.

In college, I used to run bleeding edge. But now...I will only run a bleeding edge system as an immutable distro or on a filesystem with quick rollbacks.

Yeah ... had I had an immutable system or something where rolling back was easy I would have ... I dunno Fedora/Linux + AMD hardware had been so rock solid I took it for granted.


More context:

> The vulnerability report doesn’t mention it directly, but the discussion thread about it on Fedi gives some more context on that deadline: the reporter has had several previous vulnerability reports completely ignored by the Nix development team, including one open since February and still untriaged. The Nix development team received and acknowledged this new Nix 2.24 vulnerability on August 30th (so, > 9 days ago) and they seem to have mostly sat on it until today (the reporter received no further comms), to the extent that a new point release of Nix was released a few days after the vuln was reported and did not contain a fix.

Source: https://lobste.rs/s/ixb3v7/nix_2_24_is_vulnerable_remote_pri...

The first one from Feb: https://matrix-client.matrix.org/_matrix/media/v3/download/p...

It's a community project run by volunteers but I don't think such response ("Impact: blabla") to a vulnerability gives a good impression to your users.


In reality, you will have to ask the owner anyway if the AI got it right.

I don't know if title is edited or just pulled from URL slug. The article itself is titled: DNS "propagation" is actually caches expiring.

If I remember correctly, it’s the original title. Both the title and text seem to have been revised. If memory serves, the original received a fair amount of energetic feedback.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: