Rules
Method / PrincipleHow?-
+2| URL powered computer : Installing software is so 1990s-2000s. Let's configure and install software by giving URLs or taking them away. Everything is a URL0| Can A* be used to generate algorithm sourcecode? : I thought of an idea to use a* algorithm to "walk" toward a solution that solves a programming problem. Each neighbour can be a weighted list of programming tasks such as if statement, for each, assignment, recursive call. How do you map example data structures transformations to code that fulfils the changes to the data structure? You need a cost function that decreases when the output gets nearer to the solution. What does the cost function for code solving a problem look similar to?0| Stack pattern match : Imagine you have a reference implementation of a btree and a reference implementation of a locking manager and a security manager and you want to tie them together. You could add code calls from one to the other but what if there is a better way? The better way for extensibility is to match stack function calldepths to code snippets that run whenever the pattern is matched. For example when a btree is split you might want to acquire locks or release locks in a certain order. We can do pattern matching around the callsite of a btree split and return values and do the right locking and security behaviours without needing to change the API of either. Essentially you have parallel multiple return values. see more..
+ Rules
Work / ActivityWhat?[Results]"Here's what I did, and will do next..."
see more..People had been concerned about the preservation of authenticity, and proof of time of existence of their ideas, before the time when an insecure browser and the web could peep into.
Proof-posting works with most of the known blockchains, and you can even enter a custom blockchain of your own.
-24.0000 ħ (10.0 HOUR) (+0.0)Improved the feeds summary a bit.
-1.0000 ħ (1.0 HUR) (+0.0)To increase the signal-to-noise ratio for first-time visitors of the home page, I have hidden menus, and compacted operations, so as to let the eyes focus on content.
However, apparently, some people didn't like it, because it is not clear what to do, so, I mostly reverted the change.
-10.0000 ħ (10.0 HUR) (+0.0)It is now possible to lock targets, create teasers for investment, and share them with potential interested parties.
-24.0000 ħ (10.0 HOUR) (+0.0)I implemented a hash that takes previous data and current column and the previous hash to produce a hash of the entire database.
This allows us to synchronize with the minimum of data transmissions when I write the synchronizer part which shall rehash all its own data, then retrieve the hash of a binary search of the sorted data.
-3.0000 ħ (3.0 HUR) (+0.0)35 dweeks 4 days ago @ Benefitting everybody as much as possible
How can we benefit everybody as much as possible? I really don't … (expand)36 dweeks 4 dhours ago @ Partial Space Elevator
Two points: We can start rolling out the lightest part of it … (expand)58 dweeks 2 days ago @ Benefitting everybody as much as possible
I think this might be a bad aim for individuals. For example, … (expand)58 dweeks 3 days ago @ Personalized Diet
I think this might be more complicated than keeping a diary or … (expand)62 dweeks 9 dhours ago @ HiveCell
When I realize that the incessant cleaning of surfaces in Japan is … (expand)
[Results]"I found a way this could work..."