Hacker Newsnew | past | comments | ask | show | jobs | submit | mappu's commentslogin

This is not true - it's actually all the same VM if you check hcsdiag.

WSL2 distros only use Linux namespaces, same as docker, and the WSL2 --system distro can see PIDs from all running WSL2 distros.


A few release cycles back, Swiss Maps became popular (i think, particular thanks to CockroachDB) as a replacement for standard Go map[K]V.

Later, Go's stdlib map implementation was updated to use Swiss Maps internally and everyone benefited.

Do you think the xsync.Map could be considered for upstreaming? Especially if it outperforms sync.Map at all the same use cases.


There are multiple GH issues around better sync.Map. Among other alternatives, xsync.Map is also mentioned. But Golang core team doesn't seem interested in sync.Map (or a generic variant of it) improvements.


Gaseous form is a problem, but have you seen the Fraunhofer POWERPASTE? I was optimistic when the news was first announced, but that was a decade ago and of course it's not widely used.


At that point you're just building a weird battery storage system again though.


Go can create C ABI shared libraries, I think OpenSSL-compatible C bindings to Go's crypto/tls would be a really interesting option.


Do you want garbage collection in your SSL?


Clearing of the secrets is a separate issue from memory allocation mechanism. It must be done all the way from the encryption layer to the program to avoid the leaks.

This is typically not done, only certain parts such as handling of the crypto keys. That's because it's pervasive and requires reworking everything with that in mind (TLS library, web framework, application).

On the other hand the centralization and global usage of GC in the process allows to modify it to always zero out the memory that it deallocated and to do GC at regular intervals so it can have advantage here (it's very easy to inadvertly leak the secrets to some string).


Where do you see the problems? Because of memory that was not cleaned up and leaks secrets?

There the new runtime/secret could help.


Better than no memory safety, sure. Also a kernel should be memory safe, so garbage collected.


Garbage collection is not required for memory safety.

Languages that have garbage collection are not all memory safe.


You can see the spirit of what they're going for also with the MIT binaries - that's also like saying the whole project is AGPL, but a loosening for using it as-is.

Given their goals seem to be

- Permissive use without modification, even in combined works ("MIT binaries"); but

- Copyleft with modification, including for the Affero "network hole", or commercial terms

could you suggest a clearer license option? AGPL triggers copyleft across combined works, LGPL doesn't cover the network hole, GPL has both problems. Their goals seem really reasonable, honestly, there should be a simple answer. It seems messy but I like it more than the SSPL/BSL/other neo-licenses.


I don't know anything more reasonable, but I would argue that this (isn't) reasonable precisely because it causes so much confusion due to the ambiguity and their refusal to clarify exactly what the terms really are.


Fun!

    126 Intel N5105, gcc -O2 (Debian)
     98 Neoverse N1, gcc -O2 (Debian) - Oracle Cloud
     63 Snapdragon 8gen3, clang -O2 (Termux) - Xiaomi 14
     59 Ryzen 7600, clang -O2 (MSYS2 / Windows 11)
     48 Ryzen 7600, clang -O2 (Debian)
     45 Ryzen 7600, gcc -O2 (Debian)


Interesting username


Deep-ish cut


Dokku user for a decade here, congrats on shipping, love to see more self-hosted PaaS options like this.

Why are binaries checked into the bin/ directory in the repo?

Compared to Dokku, I like how your LE support is builtin instead of a plugin. Is your main www ingress server an nginx that gets externally configured (like Dokku) or are you using net/http or libcaddy directly?

Dokku has a history of trying to compete with Heroku buildpacks - as a non Heroku/non Ruby developer this never resonated with me and there are a lot of vestigal parts (e.g. .web.1) that i would just put in my own Dockerfile directly. So focusing solely on Dockerfiles i personally feel is a good move.

One issue i faced with Dokku is eventually the build process for my Dockerized app was too memory-intensive to run on the VPS. I switched to running docker build locally, sending the container via `docker export | ssh | docker import`, and having a single `FROM myapp` dockerfile in Dokku. This was not particularly ergonomic to set up. Is it possible you can improve the UX of client-side built containers, or will you focus solely on the GitOps deploy?


Thank you so much for your feedback.

The binaries are for local testing for now, the actual binaries are built on the server/VPS on installation, we are planning to distribute single binaries in future.

The reverse proxy + TLS is Handled by traefik running in a docker container itself, we chose traefik because of the automatic docker label based dynamic routing, I hope we don't need to switch to something else anytime soon .

We have plans for remote/local builds using a small docker registry instance on the server/VPS to eliminate the need of any external registry


Cool project!

I would hope "native" means at least either CPU-native code (i.e. not Typescript) or OS-native UI (i.e. not Electron) - what did you mean by it here?


Looking at https://github.com/stepandel/chroma-explorer/blob/master/pac... it looks like it's using Electron.


it's an Electron app that's built to look like native. you're right, the language is a bit misleading -- will update



ZLUDA implements CUDA on top of AMD ROCm - they are explicitly targetting vLLM as their PyTorch compatibility test: https://vosen.github.io/ZLUDA/blog/zluda-update-q4-2025/#pyt...

(PyTorch does also support ROCm generally, it shows up as a CUDA device.)


I feel like these technologies are named by the Polish at the companies. "CUDA" means "WONDERS" and "ZŁUDA" would be an "ILLUSION".


ZLUDA was definitely intentional: https://github.com/vosen/ZLUDA/discussions/192



There are a bunch of reddit users leaving reddit comments but I'm not seeing any info from reputable sources. As of now no public commentators seem to know what these keys are truly for - I'm sure whoever extracted them knows so we'll have to wait to find out...


indeed very good discussion. I also personally think that PS5 floodgates are now open.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: