<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: hackermailman</title><link>https://news.ycombinator.com/user?id=hackermailman</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Fri, 10 Apr 2026 12:49:27 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=hackermailman" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by hackermailman in "Ask HN: Are we going to see more job postings asking for only agentic coding?"]]></title><description><![CDATA[
<p>This is how you get to 10x with a LLM in my limited agentic experience for doing all the scratchwork of architecting a program before you generate it:<p>The user facing part of your program can be planned out using conceptual design <a href="https://essenceofsoftware.com/tutorials/" rel="nofollow">https://essenceofsoftware.com/tutorials/</a> the author of that book teaches it in MITs old software studio course <a href="https://61040-fa25.github.io/schedule" rel="nofollow">https://61040-fa25.github.io/schedule</a> the point is to plan out modularity and the prof does enjoy using overly complex language to describe this method but once you read through the slides and tutorials you will understand why he describes it that way because he's trying to differentiate between features and concepts. For example HN has an upvoting concept who's purpose is to establish rank then a seperate concept karma which allows you to downvote but placing both functions inside the upvoting concept breaks modularity and conceptual design makes this obvious once you practice with it. Once everything is planned out this way then generating code is trivial again in my limited experience as I'm no expert on agentic coding but I've had success doing this.<p>All the code the user won't see can be modeled using one of the 'lightweight' formal methods out there like forge or alloy <a href="https://forge-fm.github.io/book/2026/" rel="nofollow">https://forge-fm.github.io/book/2026/</a> where a complex protocol you write or entire system can be tested first to find illicit states. Imagine you are designing some company app where there needs to be multiple logins of different security abilities this is how you would model your security plan first and make sure a combination of states doesn't produce an unexpected breach or that you missed a state. A custom network protocol that does kernel bypass is another example. The rules of a game you build is another you don't want the system to reach a state like winner unless they actually won. I now use Forge to plan css too because I don't want to show broken css states since I have limited design experience.<p>Now generate the whole system as modules and never look at the code. The same property tests I used for the Forge model I make into an Oracle and then blast the agent code with random inputs.<p>I built several gigantic prototypes this way mostly of papers I read in database designs and screwing around with graphical interfaces for them.</p>
]]></description><pubDate>Tue, 10 Mar 2026 13:36:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=47323082</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=47323082</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47323082</guid></item><item><title><![CDATA[New comment by hackermailman in "Tell HN: We have not yet discovered the rules of vibe coding"]]></title><description><![CDATA[
<p>I still write anything critical by hand. For example some app that accepts uploads of PDFs to change format I'm going to escape and prep that data by hand so the vibe coded  microservices only ever see cleaned/safe data.</p>
]]></description><pubDate>Fri, 23 Jan 2026 18:55:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=46736276</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=46736276</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46736276</guid></item><item><title><![CDATA[New comment by hackermailman in "Ask HN: Do you think college is/was worth it?"]]></title><description><![CDATA[
<p>If you can skip some or all electives and instead receive credits for joining research on campus as an undergraduate then it's worth it. There were a few TAs at my school who joined some professors project and only did that their last two years of undergrad where they had to produce a research paper for credit but they all ended up graduating with their name on multiple papers, going to invite only graduate summer schools, getting employment or grad school offers none of the rest of us were offered. Otherwise the cost seems too high now for a 4yr undergrad unless you scheme for a cheap bachelors (Europe? UoPeople?) and invest in a masters instead</p>
]]></description><pubDate>Mon, 19 Jan 2026 21:42:42 +0000</pubDate><link>https://news.ycombinator.com/item?id=46684895</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=46684895</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46684895</guid></item><item><title><![CDATA[New comment by hackermailman in "Ask HN: COBOL devs, how are AI coding affecting your work?"]]></title><description><![CDATA[
<p>AI copilots and prompts give me massive lines of imperative OCaml and the interface for that code always requires changing to properly describe the data it will receive when I can write it myself in a few minutes. I can however write a simulation of some hardware quickly with Java or C using claude code and then run my hand written programs in there for testing. An example is mimicking the runtime environment of some controller</p>
]]></description><pubDate>Mon, 19 Jan 2026 19:03:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=46683025</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=46683025</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46683025</guid></item><item><title><![CDATA[New comment by hackermailman in "Ask HN: How did you learn to code?"]]></title><description><![CDATA[
<p>Had to modify some program so just read the code and guessed mimicking what I read. It mostly just worked so continued doing that and reading enough docs I could write my own. Did that hacking for years until I finally read a real book on programming languages I think it was SICP but could have been something else before that like a  SML compiler book</p>
]]></description><pubDate>Sun, 04 Jan 2026 23:38:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=46493590</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=46493590</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46493590</guid></item><item><title><![CDATA[New comment by hackermailman in "Ask HN: What's the future of software testing and QA?"]]></title><description><![CDATA[
<p>"Lightweight formal methods" meaning you build a model of some program logic and test it's properties hold. <a href="https://forge-fm.github.io/book/" rel="nofollow">https://forge-fm.github.io/book/</a><p>Beyond that is dependent types</p>
]]></description><pubDate>Sun, 04 Jan 2026 23:07:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=46493345</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=46493345</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46493345</guid></item><item><title><![CDATA[New comment by hackermailman in "U.S. cybersecurity experts plead guilty for ransomware attacks"]]></title><description><![CDATA[
<p>I assume this works where the ransomware authors, who likely are in some untouchable nation and the son of some major politician, provide a binary/kit with their own addresses to take the ransom then pay the person who planted it out minus their cut. Those wallets used for paying crime commissions are probably reused often or otherwise identified as they don't care if you get caught and you need to either sit on those coins for years until the limitations runs out or have enough knowledge to (correctly) wash them and anyone doing this is already making bad life decisions so likely greedy and cashed those in a traceable way like driving to work in his new Ferrari.</p>
]]></description><pubDate>Tue, 30 Dec 2025 22:46:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=46439014</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=46439014</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46439014</guid></item><item><title><![CDATA[New comment by hackermailman in "Memory Safety"]]></title><description><![CDATA[
<p>Sometimes except I learned the hard way that if you write everyday Python math code it's actually variable-time arithmetic and totally unsuitable for applied cryptography, oops</p>
]]></description><pubDate>Fri, 26 Dec 2025 02:19:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=46388615</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=46388615</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46388615</guid></item><item><title><![CDATA[New comment by hackermailman in "Show HN: Exploring Mathematics with Python"]]></title><description><![CDATA[
<p>You could always have a theme then publish the rest as "online extras" many books do that recently</p>
]]></description><pubDate>Fri, 26 Dec 2025 02:03:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=46388555</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=46388555</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46388555</guid></item><item><title><![CDATA[New comment by hackermailman in "Show HN: Exploring Mathematics with Python"]]></title><description><![CDATA[
<p>Math was always the stumbling block for me then I realized through work how easy it is with pure rational or reals except when you need to translate it to an algorithm now you are throwing out all the elegant linear algebra for a numerical representation and using obscure characteristic polynomial constructs just to run a program and now math sucks again I went back to the beginning.<p>A nice course for this is of course TAOCP volume 2 old testament or MITs math github <a href="https://github.com/mitmath/18335/tree/spring22" rel="nofollow">https://github.com/mitmath/18335/tree/spring22</a> (change the yr to suit)  like we can't even have nice things like gradient descent anymore because it zigzags and is too inefficient</p>
]]></description><pubDate>Fri, 26 Dec 2025 01:54:47 +0000</pubDate><link>https://news.ycombinator.com/item?id=46388514</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=46388514</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46388514</guid></item><item><title><![CDATA[New comment by hackermailman in "Synadia and TigerBeetle Pledge $512k to the Zig Software Foundation"]]></title><description><![CDATA[
<p>Brown PLT group has a lot of Rust resources like a debugger for traits <a href="https://cel.cs.brown.edu/blog/an-interactive-debugger-for-rust-trait-errors/" rel="nofollow">https://cel.cs.brown.edu/blog/an-interactive-debugger-for-ru...</a> a model of ownership types <a href="https://blog.brownplt.org/2023/09/17/rust-ownership.html" rel="nofollow">https://blog.brownplt.org/2023/09/17/rust-ownership.html</a> and an experimental rewrite of the Rust book <a href="https://rust-book.cs.brown.edu/" rel="nofollow">https://rust-book.cs.brown.edu/</a><p>Systems programming can be done in ocaml or any language really where there is some documentation on the runtime how not to trigger the GC or flags that can be passed to custom set GC policy</p>
]]></description><pubDate>Fri, 05 Dec 2025 21:05:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=46167297</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=46167297</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=46167297</guid></item><item><title><![CDATA[New comment by hackermailman in "An exploration of the foundations of logic and philosophy"]]></title><description><![CDATA[
<p>Wildberger has videos about this on his YouTube channels. He came up with 'universal geometry' to get around the parallel assumption in Euclidean geometry if foundations interest you. He at least will enumerate all the cases needed for foundations to work if you're screwing around with your own for fun. Here's one example <a href="https://youtu.be/EvP8VtyhzXs" rel="nofollow">https://youtu.be/EvP8VtyhzXs</a></p>
]]></description><pubDate>Tue, 27 Aug 2024 14:58:51 +0000</pubDate><link>https://news.ycombinator.com/item?id=41368282</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=41368282</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41368282</guid></item><item><title><![CDATA[New comment by hackermailman in "Things I Learned from Doing Triathlon in My 70s (2023)"]]></title><description><![CDATA[
<p>There's a guy in his 50s doing ultra marathons named Kerry Ward who films some of his runs, he came in 11th during the Moab 240 miler which is 2-3 days of running <a href="https://youtube.com/@fulltiltward" rel="nofollow">https://youtube.com/@fulltiltward</a></p>
]]></description><pubDate>Mon, 26 Aug 2024 13:33:46 +0000</pubDate><link>https://news.ycombinator.com/item?id=41356956</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=41356956</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41356956</guid></item><item><title><![CDATA[New comment by hackermailman in "Ask HN: Learning Linux from Scratch"]]></title><description><![CDATA[
<p>There's some good lectures from CMU if you search for 15-213 on YouTube. The lectures explain how x86-64 works and enough about operating systems you know how virtual memory and signals work. Then any OS resource listed here or try MITs it has YouTube lectures 
<a href="https://pdos.csail.mit.edu/6.828/2021/schedule.html" rel="nofollow">https://pdos.csail.mit.edu/6.828/2021/schedule.html</a></p>
]]></description><pubDate>Mon, 26 Aug 2024 13:21:56 +0000</pubDate><link>https://news.ycombinator.com/item?id=41356864</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=41356864</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41356864</guid></item><item><title><![CDATA[New comment by hackermailman in "Ask HN: What Happened to Web3/Crypto?"]]></title><description><![CDATA[
<p>It was a big con <a href="https://davegebler.com/post/musings/web-3-0-the-great-con" rel="nofollow">https://davegebler.com/post/musings/web-3-0-the-great-con</a><p>I liked the idea of bounties being paid in crypto but now bounties have problems too, someone needs to figure out a decent bounty site/scheme to avoid hundreds of people trying to claim then then wasting time producing nothing</p>
]]></description><pubDate>Mon, 26 Aug 2024 13:05:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=41356739</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=41356739</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41356739</guid></item><item><title><![CDATA[New comment by hackermailman in "Writing a Rust compiler in C"]]></title><description><![CDATA[
<p>We all know why the Lovelace myth still persists
<a href="http://projects.exeter.ac.uk/babbage/ada.html" rel="nofollow">http://projects.exeter.ac.uk/babbage/ada.html</a>
"It is often suggested that Ada was the world's first programmer. This is nonsense: Babbage was, if programmer is the right term. After Babbage came a mathematical assistant of his, Babbage's eldest son, Herschel, and possibly Babbage's two younger sons. Ada was probably the fourth, fifth or six person to write the programmes. Moreover all she did was rework some calculations Babbage had carried out years earlier. Ada's calculations were student exercises. Ada Lovelace figures in the history of the Calculating Engines as Babbage's interpretress"</p>
]]></description><pubDate>Mon, 26 Aug 2024 12:23:05 +0000</pubDate><link>https://news.ycombinator.com/item?id=41356438</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=41356438</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41356438</guid></item><item><title><![CDATA[New comment by hackermailman in "Ask HN: Fast data structures for disjoint intervals?"]]></title><description><![CDATA[
<p>Erik Demaine's DS class has a bunch of range trees and cascading method to speed up queries <a href="https://courses.csail.mit.edu/6.851/spring21/lectures/" rel="nofollow">https://courses.csail.mit.edu/6.851/spring21/lectures/</a></p>
]]></description><pubDate>Tue, 23 Jul 2024 14:53:08 +0000</pubDate><link>https://news.ycombinator.com/item?id=41046598</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=41046598</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=41046598</guid></item><item><title><![CDATA[New comment by hackermailman in "AI copilots are changing how coding is taught"]]></title><description><![CDATA[
<p>Yep Knuth learned by reading an IBM manual with source code while sitting on a beach during summer vacation. Decades later systems hackers learned by reading illicit copies of Lions' Commentary on Unix w/Source</p>
]]></description><pubDate>Sat, 04 May 2024 20:41:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=40260130</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=40260130</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=40260130</guid></item><item><title><![CDATA[New comment by hackermailman in "Sam Bankman-Fried sentenced to 25 years in prison"]]></title><description><![CDATA[
<p>There is many other ways to get written up and lose time credits like sharing commissary, having too many books, and sometimes fighting is not optional if your cellmates are into stupid things and drag you with them.<p>It depends if he is sent to a USP like regular federal convicts or club fed minimum because of his connections. Typically club fed you can only get through a plea bargain like Madoff or through years of good time credits.</p>
]]></description><pubDate>Thu, 28 Mar 2024 18:36:36 +0000</pubDate><link>https://news.ycombinator.com/item?id=39855677</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=39855677</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39855677</guid></item><item><title><![CDATA[New comment by hackermailman in "Things I learned from teaching"]]></title><description><![CDATA[
<p>Flipped classroom style maybe.
Lectures are prerecorded then you as a group struggle with the problem sets in class. A few schools have entire courses for learning the struggle like MITs freshman problem solving course for figuring out Puerto Rico's power grid problems you are given some small area to research yourself and bring that to your student meetings and struggle to a solution.<p><a href="https://terrascope.mit.edu/nextyear/" rel="nofollow noreferrer">https://terrascope.mit.edu/nextyear/</a></p>
]]></description><pubDate>Sun, 10 Dec 2023 17:41:44 +0000</pubDate><link>https://news.ycombinator.com/item?id=38593253</link><dc:creator>hackermailman</dc:creator><comments>https://news.ycombinator.com/item?id=38593253</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=38593253</guid></item></channel></rss>