| News Nug |
|---|
|
Resolving Names Once and for All Published: 2025-12-27 | Origin: /r/programming This post is part of a series focused on implementing a programming language in Rust, specifically addressing the topic of name resolution. After the process of desugaring, the program is left with an abstract syntax tree (AST) represented as `Ast<String>`, which is not yet suitable for type inference. Name resolution will transform this into `Ast<Var>`, preparing it for type checking by clarifying what the names in the program represent. The importance of naming in programming is emphasized, as names help |
|
What I Learned Building a Storage Engine That Outperforms RocksDB Published: 2025-12-27 | Origin: /r/programming Alex Gaetano Padula reflects on the development of TidesDB, an embeddable key-value storage engine in C, which has evolved through multiple revisions to its current version, 7.0. His journey involved extensive experimentation and learning about storage engines, LSM-trees, and system failures. Rather than imitating existing technologies, he aims to understand storage systems from the ground up, focusing on optimization for modern hardware. The development process emphasizes obsessive curiosity, resulting in innovations like primarily lock-free |
|
How we lost communication to entertainment Published: 2025-12-27 | Origin: Hacker News In a recent blog post, Ploum discussed the controversy surrounding Pixelfed's practices, particularly its decision to deliberately drop messages, which he argues undermines trust in the Fediverse communication network. He reflects on the differing perspectives that emerged from his post, noting a divide between two groups: those who view ActivityPub as a communication protocol focused on message integrity (often older users who prefer traditional communication methods) and those, like Pixelfed creator Dansup, who see it as a content consumption protocol |
|
Rainbow Six Siege hacked as players get billions of credits and random bans Published: 2025-12-27 | Origin: Hacker News Rainbow Six Siege is currently experiencing severe issues due to a possible large-scale hack or exploit, despite Ubisoft referring to it as a server incident. Players on various platforms (PC, PS4, PS5, Xbox One, and Xbox Series X|S) are facing service outages, including problems with authentication, in-game store access, and matchmaking. Reports indicate that some accounts are receiving an abnormal influx of in-game currency, rare items, and random bans. The community is advising players to stay offline as |
|
The production bug that made me care about undefined behavior Published: 2025-12-27 | Origin: /r/programming The article recounts the author's experience maintaining a large C++ codebase for an online payment system processing billions of euros annually. Despite acknowledging limited expertise in C++, the author reflects on a significant bug report involving an HTTP endpoint that should return either a success or error status, but ended up showing both fields as true—a scenario that shouldn't be possible due to the code's design. The author dives into the code, which is structured in a single function with clearly defined setting points for each response field. The |
|
Gpg.fail Published: 2025-12-27 | Origin: Hacker News The author forgot the site’s source code at home while leaving, leading to the need to rewrite everything. They apologize for the inconvenience and assure that a better version of the site will be ready by tomorrow, as they are currently making updates. The message also points to "crackticker" as a source of blame. |
|
Eertree - an interactive guide Published: 2025-12-27 | Origin: /r/programming The eertree, or palindrome tree, is a data structure created in 2015 by Mikhail Rubinchik and Arseny M. Shur for efficiently searching palindromes within a string. Its name is a palindrome derived from "tree." The structure simplifies the process of understanding and constructing palindromes step by step. Palindromes are classified into three types: single characters, pairs of identical characters (like "aa"), and pairs of identical characters surrounding another palindrome. Nodes in |
|
Python JSON serialization: handling nested objects, dataclasses, and type safety without boilerplate Published: 2025-12-27 | Origin: /r/programming Failed to fetch content - HTTP Status - 403 |
|
Floor796 Published: 2025-12-27 | Origin: Hacker News Sure, I can help with that! Please provide the content you would like me to summarize. |
|
SDSL : a new/old shader programming language Published: 2025-12-27 | Origin: /r/programming The content discusses updates related to the Stride game engine, highlighting several key blog posts from different authors. Key topics include: 1. **SDSL Parser Implementation**: Youness KAFIA explains the implementation of a new SDSL parser, focusing on performance and memory efficiency, with a prototype expression parser as an example. 2. **Stride 4.3 Release**: Vaclav Elias announces Stride 4.3, which includes support for .NET 10 and C# |
|
Understanding Database transactions and Isolation Levels Published: 2025-12-27 | Origin: /r/programming In a post dated December 26, 2025, Shubham Raizada shares insights on database transaction isolation levels and their relevance in application development. He emphasizes the importance of understanding how concurrent transactions interact to build effective and reliable applications. Raizada defines key concepts: - **Transaction**: A sequence of database operations (such as reads and writes) treated as a single unit of work, where either all operations succeed or none do. - **ACID**: A set of properties |
|
How Search Engines Explore the Entire Internet? EP: 2 Behind The Screen Published: 2025-12-27 | Origin: /r/programming In the second episode of the "Behind The Screen" series, the focus is on web crawlers, essential software that underpins search engines by systematically browsing the internet to gather and index content. The episode outlines the fundamental workings of web crawlers without tying the discussion to specific implementations from companies like Google or Yahoo. The key functions of a web crawler include verifying links, downloading webpage HTML, parsing that HTML for meaningful information, and storing the collected data in a database. The process is managed by |
|
Concurrent Hash Map Designs: Synchronized, Sharding, and ConcurrentHashMap Published: 2025-12-27 | Origin: /r/programming The next goal is to create a fully thread-safe hash map, shifting focus from single-threaded performance to efficient and correct behavior under concurrent access. Real-world applications often involve multiple threads, making it essential to study existing thread-safe hash map implementations that prioritize simplicity, scalability, memory usage, and read/write performance. The simplest method for achieving thread safety is using a single global lock, ensuring that all operations—mutating or not—acquire the same lock to access the hash map's internal state. |
|
QNX Self-Hosted Developer Desktop Published: 2025-12-27 | Origin: Hacker News The QNX team has launched the initial release of the QNX Developer Desktop, a self-hosted development environment for QNX 8.0 that eliminates the need for cross-compilation. This desktop environment simplifies the development process for new QNX developers and facilitates the porting of Linux applications to QNX. Pre-loaded with numerous ports from the QNX Open-source Dashboard, this release features essential tools like windowing, terminal, IDEs, browser, file management, and sample applications. To try |
|
Publishing your work increases your luck Published: 2025-12-27 | Origin: Hacker News The content emphasizes the importance of feedback and the positive impact of sharing work publicly in the open-source community. It acknowledges the presence of negativity, but reassures that the majority of people appreciate good work. The piece discusses luck, defining it as unexpected positive events, and how to increase its occurrence by creating more opportunities through visibility and public engagement. By sharing projects and accomplishments, individuals can build a reputation and a body of work that can lead to new opportunities, such as job offers, speaking engagements, and |
|
Exe.dev Published: 2025-12-26 | Origin: Hacker News Sure! Please provide the content that you would like me to summarize. |
|
Always bet on text (2014) Published: 2025-12-26 | Origin: Hacker News You've been randomly chosen to complete a CAPTCHA to verify your requests. Please fill it out and click the button to proceed. © 2009-2025 Dreamwidth Studios, LLC. All rights reserved. |
|
Gibberish - A new style of parser-combinator with robust error handling built in Published: 2025-12-26 | Origin: /r/programming Gibberish is a parser combinator language and compiler designed to generate lossless syntax trees (LSTs) and offer robust error recovery. It aims to support tooling like IDEs and linters by meaningfully parsing incomplete or erroneous source code, unlike traditional libraries that discard structure on encountering errors. Gibberish requires a C library and must have a C compiler (like `cc` or `CL` for Windows) available on the PATH, although there may be configuration challenges. Users can |
|
T-Ruby is Ruby with syntax for types Published: 2025-12-26 | Origin: Hacker News T-Ruby is an extension of Ruby that introduces type annotations, allowing developers to write typed Ruby code and compile it into standard Ruby (.rb) and RBS (.rbs) files, similar to TypeScript. This tool enhances static type checking, ensuring type safety for Ruby applications, especially in large-scale projects. Developed by Stripe, T-Ruby features sig blocks for method type declarations and uses inline types without adding runtime dependencies. It generates standard RBS files and integrates well within the Ruby ecosystem. |
|
RoboCop – Breaking The Law. H0ffman Cracks RoboCop Arcade from DataEast Published: 2025-12-26 | Origin: /r/programming The author is exploring the copy protection mechanism in the RoboCop arcade game, which utilizes a separate HuC6280 CPU for this purpose. This CPU, a variant of the 6502, is less common and was likely chosen to complicate the creation of unauthorized copies. The author has identified several components of the protection system, such as wait loops and functions that handle data communication between the HuC6280 and the main CPU, a 68000. They analyze the shared RAM used by both |