Hacker Newsnew | past | comments | ask | show | jobs | submit | flaghacker's commentslogin

Using this sampling-based approach you get correct covariance modeling for free. You have to only sample leaf values that are used in multiple places once per evaluation, but it looks like they do just that: https://github.com/mattt/Uncertain/blob/962d4cc802a2b179685d...


Yes, the `regex` crate is also the regex engine used by ripgrep, both were developed by https://github.com/burntsushi.


Out of curiosity, why are you still using 32-bit architectures?


Dunno if this is where you're coming from, but working in 32-bit isn't that wacky. For example a very popular microcontroller [0] is 32-bit.

EDIT: definitely not "maybe the most" popular

[0]: https://en.wikipedia.org/wiki/ESP32


Memory efficiency just for one. For most programs, and especially in the embedded space, 64b systems carry around (and process) a lot more zeros than 32b systems do. You can still do 64b math when you need it, but you don’t have to pay for it when you don’t.

Given that software is always too big, this can often be a product-making distinction.


32 bit is still very common for smaller CPUs that aren't in the "application processor" class.

They are cheaper because they use less area, and they're also more memory efficient because pointers are all half as big. On these CPUs you don't have 4GB of RAM so you don't need a big address space.


It's good enough for the majority of use cases and systems; even an eight bit MCU is sufficient for many cases. If you design a product, saving power and cost makes the difference.


As far as I know, webassembly only supports a 32 bit address space on all platforms at the moment. There’s a memory64 proposal, but it doesn’t look to be widely adopted yet.


That switch-case gets optimized and compiled down to logic gates by the synthesis tools. It'll be a different set of gates from the original netlist (which might also have used a more regular grid structure for this), but it won't be _that_ different. It's not somehow running this switch-case in software emulation on a different CPU instantiated in this design.


Matlab is one language that chooses the second. Every assignment a=b where b is a matrix creates a distinct copy of the matrix.

The interpreter is slightly more clever and instead implements this as a copy-on-writr mechanism, but that's just an implementation detail .


Look like this was generated by an LLM.


Indeed. The user made no comments in first 6 months of the account, then starting 4 hours ago has been somewhat prolific.


It means that instead of (only) doing convolution in spatial dimensions, it also(/instead) happens in the temporal dimension.

A good resource for the "instead" case: https://unit8.com/resources/temporal-convolutional-networks-...

The "also" case is an example of 3D convolution, an example of a paper that uses it: https://www.cv-foundation.org/openaccess/content_iccv_2015/p...


Could you share the paper(s) about "backdoors" in physical constants? That doesn't make much sense at first sight.



For all emails sent to/from any Seattle owned email address in 2017, please provide the following information:

1. From address 2. To address 3. bcc addresses 4. cc addresses 5. Time 6. Date

Is this really a reasonable request that the government is expected to answer? Doesn't this expose a bunch of private information about government employees and the people they interact with? I understand this post (and apparently the law) takes this as completely normal thing, but it seems really weird to me.

Some examples:

* exact times people are getting in/out the office (eg. the time in the morning when a person first answers an email from their boss)

* full information about holidays taken by all employees (eg. days/weeks during which no emails are sent)

* friendships or relationships (eg. any communication between employees that doesn't follow from the hierarchy or from team delineations)

* information from criminal investigations (eg. an investigator sending an email to the parking fine department probably means one of the cases they're working on is related to parking fines)

This all seems a huge privacy leak? Should this stuff even be called "metadata" if so much can be derived from it?


These are all things performed by employees of the government, as they run the government, why shouldn’t they be public?


None of your examples can be derived from the metadata, but at *best* inferred.


Sure, it's all slightly fuzzy. I don't think that detracts much from the my point though.


Interesting, what could power companies use this for? Checking for overgrown power lines? Checking for roofs to place solar panels one?


He’s probably referring to the wildfires started in California by power lines. There was a very damaging one in the last several years.

EDIT: here’s one link https://www.cbsnews.com/news/pge-55-million-dollars-old-powe...

Imagine dying because the power company didn’t update old power lines. What a waste of life.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: