Hacker Newsnew | past | comments | ask | show | jobs | submit | simeonmiteff's commentslogin

There is a reasonable explanation for the "foregone conclusion" flavour of the RFD that doesn't cast aspersions (quite as much as you are) on the authors:

It is simultaneously an assertion of the culturally determined preferences of a group of people steeped in Sun Microsystems engineering culture (and Joyent trauma?), and a clinical assessment of the technology. The key is that technology options are evaluated against values of that culture (hence the outcome seems predictable).

For example, if you value safety over performance, you'll prioritise the safety of the DTrace interpreter over "performance at all costs" JIT of eBPF. This and many other value judgements form the "meat" of the document.

The ultimate judge is the market. Does open firmware written in Rust result in higher CSAT? This is one of the many bets Oxide is making.

Frankly, I don't think Oxide would capture so much interest among technical folks if it was just the combination of bcantrill fandom + radically open engineering. The constant stream of non-conformist/NIH technology bets is why everyone is gripping their popcorn. I get to shout "Ooooooh, nooo! Tofino is a mistake!" into my podcast app, while I'm feeding the dog, and that makes my life just a little bit richer.


i'm not sure if Dtrace interpreter was safer than EBPF. I guess in theory it should be because a JIT is just extra surface area but I'm not sure in practice. Both EBPF and DTrace had bugs. Also, I always thought EBPF JIT was just a translation to machine code and it didn't do any kind of optimization pass so should be very similar to how DTrace works. They both ship byte code to the kernel. But I guess the big difference is EBPF relies more on a verification pass while I think most of DTrace safety verification was performed while executing the bytecode. I remember there was a lot of stuff in EBPF where the verifier was meant to be able statically determine you were only accessing memory you were able to. I think there was a lot of bugs around this because the verifier would assume slightly different behaviour than what the runtime was producing. But this is also not necessarily a JIT problem you could have an interpreter that relied on a static safety pass as well.


After my year-long quest to debug a mysterious and faulty TCP connection, I created go-tcpinfo. It's a Go library for safely getting TCP_INFO metrics from the Linux kernel, built to provide the deep observability needed to solve such issues.


This reporting is somewhat dishonest it fails to disclose ACS's vested interests...

ACS has a nice government-granted monopoly on assessing the qualifications of work visa applicants (at significant cost) so anyone reducing the demand for IT worker visas (by off-shoring those jobs) is going to hurt ACS directly.


Exactly.

ACS had a hand in blowing up Aussie jobs.


itym "assessing"

that is also approximately all ACS does as far as I remember, they seem to never lobby for anything useful or go against the government for the exact same reason.


Thanks, corrected :-)


This is very cool. Nice work! At my day job, I have been using a Go library[1] to build tools that require seekable zstd, but felt a bit uncomfortable with the lack of broader support for the format.

Why zeek, BTW? Is it a play on "zstd" and "seek"? My employer is also the custodian of the zeek project (https://zeek.org), so I was confused for a second.

[1] https://github.com/SaveTheRbtz/zstd-seekable-format-go


Thanks! I was also surprised that there are very few tools to work with the seekable format. I could imagine that at least some people have a use-case for it.

Yes, the name is a combination of zstd and seek. Funnily enough, I wanted to name it just zeek first before I knew that it already exists, so I switched to zeekstd. You're not the first person asking me if there is any relation to zeek and I understand how that is misleading. In hindsight the name is a little unfortunate.


Zeek is well known in "security" spaces, but not as much in "developer" spaces. It did get me a bit excited to see Zeek here until I realized it was unrelated, though :)


This analysis follows the development of ssh-auth-cmd, a tool that allows chaining multiple SSH authentication sources. Written primarily by Claude AI under human guidance, the project serves as a fascinating case study in AI-assisted development. The article documents the complete conversation history, including breakthrough moments like discovering how to constrain AI for clean refactoring, handling licensing questions for AI-generated code, and the iterative feedback process that led to production-ready software. The project demonstrates how AI can handle substantial code generation while humans provide critical architectural oversight and quality control.


No, the nomenclature is not consistent at each layer.

Another layer down, IEEE 802.3 names the complete message (i.e., including preamble, SFD and FC) that an Ethernet PHY sends to an Ethernet MAC (which processes "frames")... a packet!

"TCP packet" is correct.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: