<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: aray</title><link>https://news.ycombinator.com/user?id=aray</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 10 Apr 2026 12:48:00 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=aray" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by aray in "Computer scientists prove why bigger neural networks do better"]]></title><description><![CDATA[
<p>> Double descent with overparameterization is exhibited in "classical settings" too and mentioned in older books.<p>I’m curious for references or citations to this.  When I was going over double descent I tried to find citations like this (just in a couple places like ML/stats textbooks).</p>
]]></description><pubDate>Thu, 10 Feb 2022 17:49:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=30289903</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=30289903</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=30289903</guid></item><item><title><![CDATA[Evaluating Large Language Models Trained on Code]]></title><description><![CDATA[
<p>Article URL: <a href="https://arxiv.org/abs/2107.03374">https://arxiv.org/abs/2107.03374</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=27767328">https://news.ycombinator.com/item?id=27767328</a></p>
<p>Points: 11</p>
<p># Comments: 1</p>
]]></description><pubDate>Thu, 08 Jul 2021 00:36:26 +0000</pubDate><link>https://arxiv.org/abs/2107.03374</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=27767328</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=27767328</guid></item><item><title><![CDATA[New comment by aray in "Is Ghislaine Maxwell secretly one of the most powerful Redditors of all time?"]]></title><description><![CDATA[
<p>Extraordinary claims require extraordinary evidence.<p>This evidence seems weak at best.<p>I want to be charitable, but hard to imagine this is anything other than an incredible stretching to make a topic to generate lots of clicks/views.</p>
]]></description><pubDate>Thu, 09 Jul 2020 19:04:23 +0000</pubDate><link>https://news.ycombinator.com/item?id=23783794</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=23783794</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=23783794</guid></item><item><title><![CDATA[New comment by aray in "Tell HN: C Experts Panel – Ask us anything about C"]]></title><description><![CDATA[
<p>When do you think we will get an update to C11 or more recent version of C to MISRA?  Do you all have any influence on "Safety Critical C" standards?</p>
]]></description><pubDate>Tue, 14 Apr 2020 16:12:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=22867712</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=22867712</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22867712</guid></item><item><title><![CDATA[New Twitter Rules for Synthetic and Manipulated Media]]></title><description><![CDATA[
<p>Article URL: <a href="https://blog.twitter.com/en_us/topics/company/2020/new-approach-to-synthetic-and-manipulated-media.html">https://blog.twitter.com/en_us/topics/company/2020/new-approach-to-synthetic-and-manipulated-media.html</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=22242001">https://news.ycombinator.com/item?id=22242001</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Tue, 04 Feb 2020 22:54:20 +0000</pubDate><link>https://blog.twitter.com/en_us/topics/company/2020/new-approach-to-synthetic-and-manipulated-media.html</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=22242001</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22242001</guid></item><item><title><![CDATA[New comment by aray in "Captcha.nsa.gov"]]></title><description><![CDATA[
<p>I'm curious if this is a (temporary, unsecure) way to use google if you're in a place that google is currently blocked.<p>Small chance, but in case anyone on HN is in a place google is blocked, would be an interesting test to run.</p>
]]></description><pubDate>Mon, 03 Feb 2020 19:31:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=22228003</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=22228003</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22228003</guid></item><item><title><![CDATA[How to Personally Fight Climate Change]]></title><description><![CDATA[
<p>Article URL: <a href="https://erikareinhardt.com/personal-climate-action">https://erikareinhardt.com/personal-climate-action</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=22221899">https://news.ycombinator.com/item?id=22221899</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Mon, 03 Feb 2020 06:27:37 +0000</pubDate><link>https://erikareinhardt.com/personal-climate-action</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=22221899</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22221899</guid></item><item><title><![CDATA[New comment by aray in "Artificial intelligence will do what we ask, and that's a problem"]]></title><description><![CDATA[
<p>> Because threads are so sensitive to initial conditions, it ends up skewing an entire discussion.<p>I haven't thought about this before on HN, but it makes a lot of sense.  I'm curious if you or others have written about this intuition and your experience with it -- I'd like to understand it more.</p>
]]></description><pubDate>Fri, 31 Jan 2020 18:52:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=22204365</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=22204365</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=22204365</guid></item><item><title><![CDATA[New comment by aray in "Emergent Tool Use from Multi-Agent Interaction"]]></title><description><![CDATA[
<p>At the top of the article are two open source repo links:<p>Environment Generation:  <a href="https://github.com/openai/multi-agent-emergence-environments" rel="nofollow">https://github.com/openai/multi-agent-emergence-environments</a><p>Worldgen:  <a href="https://github.com/openai/mujoco-worldgen" rel="nofollow">https://github.com/openai/mujoco-worldgen</a><p>Is this what you were looking for?</p>
]]></description><pubDate>Wed, 18 Sep 2019 18:45:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=21008609</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=21008609</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=21008609</guid></item><item><title><![CDATA[New comment by aray in "Tattoo Ink Nanoparticles Persist in Lymph Nodes (2017)"]]></title><description><![CDATA[
<p>What other pigments show up in lymph nodes?  Hair dyes?</p>
]]></description><pubDate>Sun, 22 Jul 2018 15:03:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=17587091</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=17587091</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=17587091</guid></item><item><title><![CDATA[New comment by aray in "Intercepting and Emulating Linux System Calls with Ptrace"]]></title><description><![CDATA[
<p>Cool!  I did this a while ago for some CPU-bound stuff, and ran into a bunch of performance bottlenecks.<p>Some things that helped me scale ptrace-interception up:<p>- SECCOMP_BPF filter (getting these right matters a lot)<p>- moving all of your intercept work to a single side (enter or exit)<p>- ensure affinity between the traced and tracing processes<p>- nuke vdso<p>- remove vdso from the aux vector (otherwise good libc's will find it again)<p>At the end of the day unfortunately the better solution would have been to write kernel support for what I wanted to do, but it's a fun exercise in learning about system calls.</p>
]]></description><pubDate>Tue, 26 Jun 2018 01:07:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=17397192</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=17397192</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=17397192</guid></item><item><title><![CDATA[New comment by aray in "Tensor Comprehensions"]]></title><description><![CDATA[
<p>Is this paper published yet?  The `Article` link doesn't go anywhere, and Google Scholar doesn't know where to find a copy.</p>
]]></description><pubDate>Sat, 17 Feb 2018 17:45:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=16401725</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=16401725</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=16401725</guid></item><item><title><![CDATA[New comment by aray in "Why things might have taken so long"]]></title><description><![CDATA[
<p>Also recommend this as a follow-on.  I think it's an important point, and also well presented.  The anecdotes make it memorable but it's concise where it matters.<p>After I read this last year it changed the way I interacted and observed things around me for a while.  Poking/prodding more, and asking more "what/how" questions.</p>
]]></description><pubDate>Thu, 04 Jan 2018 19:00:58 +0000</pubDate><link>https://news.ycombinator.com/item?id=16073035</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=16073035</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=16073035</guid></item><item><title><![CDATA[New comment by aray in "Cray and Microsoft Bring Supercomputing to Azure"]]></title><description><![CDATA[
<p>That article is about the FDA and a melanoma drug.  I don't think it has anything to do with Cray or patents.<p>Possibly mis-copied link?</p>
]]></description><pubDate>Mon, 23 Oct 2017 20:06:01 +0000</pubDate><link>https://news.ycombinator.com/item?id=15536510</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=15536510</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15536510</guid></item><item><title><![CDATA[New comment by aray in "Show HN: PlaidML, open source deep learning for any GPU"]]></title><description><![CDATA[
<p>Congrats!  Is there a short summary about how your approach is different from existing stacks (like tensorflow, or nnvm)?</p>
]]></description><pubDate>Fri, 20 Oct 2017 21:21:03 +0000</pubDate><link>https://news.ycombinator.com/item?id=15519187</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=15519187</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15519187</guid></item><item><title><![CDATA[New comment by aray in "Nonlinear Computation in Deep Linear Networks"]]></title><description><![CDATA[
<p>It looks like nvidia GPUs treat denormals as zeros for single-precision floating point math: <a href="http://developer.download.nvidia.com/assets/cuda/files/NVIDIA-CUDA-Floating-Point.pdf" rel="nofollow">http://developer.download.nvidia.com/assets/cuda/files/NVIDI...</a>  (sections 4.1 and 4.2)</p>
]]></description><pubDate>Fri, 29 Sep 2017 18:20:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=15367708</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=15367708</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=15367708</guid></item><item><title><![CDATA[New comment by aray in "Show HN: TARDIS – Warp a process's perspective of time by hooking syscalls"]]></title><description><![CDATA[
<p>Syscall interception works for _every_ program, it's just a matter of doing it correctly.<p>VDSO is a small set of (3) calls which are not syscalls but direct calls (for speed/efficiency).  Our goal is to remove this functionality to force libs to call through the (slower) syscall route instead.<p>I mention in another comment how EHDR censoring is needed for robust VDSO removal.<p>I've not run into a libc where censoring EHDR breaks time calls (i.e. it doesn't fallback to syscalls) but possibly golang has this.<p>In this case it's straightforward to setup a fake VDSO and then instead of EHDR censoring you just replace it with your fake VDSO address and you're golden!</p>
]]></description><pubDate>Wed, 26 Apr 2017 07:54:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=14201244</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=14201244</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14201244</guid></item><item><title><![CDATA[New comment by aray in "Show HN: TARDIS – Warp a process's perspective of time by hooking syscalls"]]></title><description><![CDATA[
<p>This depends on the virtual machine or container!<p>Ironically, because the folks working on containers/VMs are _really_ good at what they do, time access calls in particular  have been really optimized (they get called a lot).  This makes it very hard to intercept time calls at this layer!  e.g. KVM and LXC both essentially hand time calls straight to the host.<p>This means time intercepts at the VM/container layer need fundamental support (I mentioned affine time transformation in the linux kernel in another comment) which doesn't work for people who need to deploy on current hosted container.</p>
]]></description><pubDate>Wed, 26 Apr 2017 07:49:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=14201228</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=14201228</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14201228</guid></item><item><title><![CDATA[New comment by aray in "Show HN: TARDIS – Warp a process's perspective of time by hooking syscalls"]]></title><description><![CDATA[
<p>Libfaketime is great, especially if you have a good idea what time calls your target process is using.<p>If they're inspecting EHDR and calling VDSO directly, though, or they've statically compiled in their libc, then it won't help though.<p>I've also had a lot of issues getting it into tightly sandboxed contexts (e.g. the flash runtime in chrome).</p>
]]></description><pubDate>Wed, 26 Apr 2017 07:38:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=14201184</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=14201184</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14201184</guid></item><item><title><![CDATA[New comment by aray in "Show HN: TARDIS – Warp a process's perspective of time by hooking syscalls"]]></title><description><![CDATA[
<p>Nice Implementation!  I built something similar a while ago to warp time in video games (for training reinforcement learning agents).<p>Some issues off the top of my head (that I ran into):
VDSO censoring is a lot harder than just symbol overriding, it has to actually be removed from the aux vector (third thing on the process stack when the process launches after arguments and environment variables.  The EHDR entry is what you need to remove.<p>Gist for censoring EHDR: <a href="https://gist.github.com/machinaut/a08b581c921775263cf0e20ccc974cbd" rel="nofollow">https://gist.github.com/machinaut/a08b581c921775263cf0e20ccc...</a><p>Some libc's (notably glibc) are really good at finding/using EHDR even if you do that symbol overriding, so dumping EHDR is the most assured way of making sure it's gone.<p>ptrace overhead is HUGE -- because you're debugging a userspace program with another program every time call now results in 4 context switches (to/from your debugging program at every time call entry/exit), even pinning both to the same CPU this is not fast.<p>This is where my least favorite part of the linux kernel comes in handy: SECCOMP-BPF.  Instead of firing _every_ syscall, you can write a syscall packet filter rules list that only matches certain time-based syscalls with certain arguments.  This greatly improves the performance (but for me, still not fast enough to play video games live).<p>At the end of the day I ended up reviving a >10 year old patch someone sent to the linux kernel to add these parameters (time offset and time warp) to thread structs and do the warping in the kernel (much faster -- dont pay the context overhead, etc).  Sadly even this didn't work because our end application needed to run on multiple clouds in docker, and we'd need to have access to the host kernel to do these operations.<p>I'd like to have an affine time warp as part of the cgroups, and then maybe extend it through runc so anyone can run time-warped docker containers, but maybe that's wishful thinking.<p>Overall I think this is great work, and super happy you posted it.  I'd love to chat about it sometime.<p>(P.S. most ironic to me was my version of this was called 'timelord' :)</p>
]]></description><pubDate>Wed, 26 Apr 2017 06:23:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=14200889</link><dc:creator>aray</dc:creator><comments>https://news.ycombinator.com/item?id=14200889</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=14200889</guid></item></channel></rss>