Hacker Newsnew | past | comments | ask | show | jobs | submit | elcritch's commentslogin

For more complex projects I find this pattern very helpful. The last two gens of SOTA models have become rather good at following existing code patterns.

If you have a solid architecture they can be almost prescient in their ability to modify things. However they're a bit like Taylor series expansions. They only accurate out so far from the known basis. Hmm, or control theory where you have stable and unstable regimes.


Well for some. Google has been using liquid cooling to racks for decades.

Followed by 5 ads and a link to use copilot! ;)

Nim compiles fast.

Apple chose the colors well. For whatever reason the shade of green they chose just gives a bit of ick.

That's the great thing about LLMs.

Especially with Nim it's so easy to make quality libraries with a Codex/ClaudeCode and a couple hours as a hobby.

Especially when they run fast. I just made Metal bindings and got 120 FPS demos with SDF bitmaps running yesterday while eating Saturday brunch.


I don't really get the idea that LLMs lower the level of familiarity one needs to have with a language.

A standup comedian from Australia should not assume that the audience in the Himalayas is laughing because the LLM the comedian used 20 minutes before was really good at translating the comedian's routine.

But I suppose it is normal for developers to assume that a compiler translated their Haskell into x86_64 instructions perfectly, then turned around and did the same for three different flavors of Arm instructions. So why shouldn't an LLM turn piles of oral descriptions into perfectly architected Nim?

For some reason I don't feel the same urgency to double-check the details of the Arm instructions as I feel about inspecting the Nim or Haskell or whatever the LLM generated.


I don’t trust them. I run tests and I review the code generated by the LLMs. About 1/5 times I’ll just git reset the changes and try again.

You have to push for them to add tests. It also helps if you can have the LLM just translate from C++ to Nim.

We’re certainly not at the age of LLMs generating code on the fly each time.


Nice subtle twisting of words.

There’s an enormous difference between driving slowly through a crowd of protestors with no injuries versus running over protesters with a tank.


I didn't twist anything. If anything, I would argue YOU are twisting words of the original comment to which I responded:

>> the United States government rolling through protesters in armored vehicles

> I'm sorry, did I miss something? Is this something that's happened (ever)?


No I was referring to the original comment twisting words. They intentionally invoke the horrors of dictators running over protesters to disperse them.

Your comment showed the actual event, thanks. It showed an armored vehicle slowly pushing through protesters to gain access to something.

Not remotely comparable scenes, so I must assume intentional twisting of words. My comment was written sloppily.


It's the first three lines of the Narcissists Prayer[1]

    That didn't happen.
    And if it did, it wasn't that bad.
    And if it was, that's not a big deal...
1: https://www.thelifedoctor.org/the-narcissist-s-prayer


I honestly don't understand why you posted the Narcissist's Prayer; however, to clarify: the original comment I responded to referred to another comment that said, "the United States government rolling through protesters in armored vehicles," to which I replied, in part, "it's a video of a WCCO news (local MSP TV station) segment which shows an armored vehicle pushing protesters out of the way."

The person who said I was twisting words said (emphasis mine), "There’s an enormous difference between driving slowly through a crowd of protestors with no injuries versus running over protesters with a tank."

At no point did I nor the comment I responded to use the words, 'running over protesters with a tank'.


No, no, no--you're the one who's right. The others are running with the "prayer."

"United States government rolling through protesters in armored vehicles"

"Did this really happen?"

You: Video of it actually happening.

Response: Yea, but that video didn't show them "running over protesters with a tank"


Got it; thank you for the clarification.


show me any photo or video showing the tank man of Tiananmen actually got run over by the tank.

you got brainwashed.


I don't think anyone is claiming that the specific famous tank man of Tiananmen got run over by the tank. However, there is plenty of evidence that people got "mowed down by tanks" at Tiananmen Square: https://www.theglobeandmail.com/world/article-why-is-the-arm...


you intentionally omitted the most important context here - those sad deaths happened after many army APCs and Tanks were attacked & destroyed.

https://www.reddit.com/r/TankPorn/comments/1k2ungn/pla_armor...

too bad that China didn't embrace its Beijing Spring back in 1989.


Secure boot and attestation both generally require a form of DRM. It’s a boon for security, but also for control.


> Secure boot and attestation both generally require a form of DRM.

They literally don't.

For a decade, I worked on secure boot & attestation for a device that was both:

- firmware updatable - had zero concept or hardware that connected it to anything that could remotely be called a network


Interesting. So what did the attestation say once I (random Internet user) updated the firmware to something I wrote or compiled from another source?


> Interesting. So what did the attestation say once I (random Internet user) updated the firmware to something I wrote or compiled from another source?

The update is predicated on a valid signature.


So your device had no user freedom. You're not doing much to refute the notion that these technologies are only useful to severely restrict user freedom for money.


> So your device had no user freedom. You're not doing much to refute the notion that these technologies are only useful to severely restrict user freedom for money.

Would love to hear more of your thoughts on how the users of the device I worked on had their freedom restricted!

I guess my company, the user of the device that I worked on, was being harmed by my company, the creator of the device that I worked on. It's too bad that my company chose to restrict the user's freedom in this way.

Who cares if the application of the device was an industrial control scenario where errors are practically guaranteed to result in the loss of human life, and as a result are incredibly high value targets ala Stuxnet.

No, the users rights to run any code trumps everything! Commercial device or not, ever sold outside of the company or not, terrorist firmware update or not - this right shall not be infringed.

I now recognize I have committed a great sin, and hope you will forgive me.


It’s slower but generally spits out more reliable code, IMHO.


Not in my experience recently. Are you using it via Cursor, or how?


Excellent, get ready for more large outages at AWS and a proliferation of bugs across the rest of Amazon’s empire.

For the last few months I still randomly get errors opening audible. You know, to buy more books.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: