<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: moring</title><link>https://news.ycombinator.com/user?id=moring</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Mon, 13 Apr 2026 17:22:07 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=moring" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by moring in "John Deere to pay $99M in right-to-repair settlement"]]></title><description><![CDATA[
<p>I think there is: It is the line between "not spending extra money to make sure it works" and "spending extra money to make sure it won't work".<p>There is a related problem with warranty: an inferior third-party replacement part may cause damage to higher-quality original parts. There is a line here between "making sure you don't have to deal with follow-up damage caused by inferior parts" and "preventing the use of inferior parts". This is a bit more blurry because most cases won't be clear-cut, and dealing with them will be a burden on the original manufacturer.<p>I think it is important that we reward the nice players as much as we punish the bad ones. A blanket "all companies bad" just means that no company has an incentive to be anything less than bad.</p>
]]></description><pubDate>Thu, 09 Apr 2026 07:31:35 +0000</pubDate><link>https://news.ycombinator.com/item?id=47700410</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47700410</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47700410</guid></item><item><title><![CDATA[New comment by moring in "Second Revision of 6502 Laptop"]]></title><description><![CDATA[
<p>This may sound absurd, but it was a mental breakthrough for me to realize that all these "what-ifs" (multicore 6502 computers or whatever) are really simple to simulate in software only, with a bespoke simulator, WAY above register transfer level. There is really no need to deal with the peculiarities of FPGAs or Verilog; just write an instruction-level simulator for the ISA you choose (that's really simple for the 6502), make it run several instances for multicore architectures, and there you go for your custom computer.<p>I mean this as a hint for people who are similarly stuck with RTL tinkering when they actually want to tinker with system architecture.</p>
]]></description><pubDate>Wed, 08 Apr 2026 08:39:55 +0000</pubDate><link>https://news.ycombinator.com/item?id=47687165</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47687165</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47687165</guid></item><item><title><![CDATA[New comment by moring in "I won't download your app. The web version is a-ok"]]></title><description><![CDATA[
<p>By that logic, operating system developers struggle to understand that putting two files with the same name into the same folder(1) is very much possible in the physical world.<p>(1) or referencing them from the same directory, which was the earlier metaphor.</p>
]]></description><pubDate>Mon, 06 Apr 2026 16:22:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47662949</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47662949</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47662949</guid></item><item><title><![CDATA[New comment by moring in "A tail-call interpreter in (nightly) Rust"]]></title><description><![CDATA[
<p>Questioning standard nomenclature is useful too, as long as it provides insight and is not just bike-shedding. "optimization" (in the context of an optimizing compiler) is generally expected not to alter the semantics of a program.</p>
]]></description><pubDate>Mon, 06 Apr 2026 08:05:17 +0000</pubDate><link>https://news.ycombinator.com/item?id=47658157</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47658157</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47658157</guid></item><item><title><![CDATA[New comment by moring in "Do architects still need to draw? (2020)"]]></title><description><![CDATA[
<p>Your comment seems to miss that the author is speaking about technical drawings, not sketches, in particular this part:<p>> And I would argue also that this scarcity of ability was already a problem for the last 100 years. The whole iterative process of ideation (ie. designing, sketching) gets so much less intuitive, if one has to pull out a ruler first, or boot up his machine.<p>You mention sketching explicitly, which is exlcuded by the author. And making technical drawings without a ruler seems insane to me.<p>> In dev-speak, removing hand-drawing from the skill set of architects entirely is as if you were deliberately removing HMR from your local web dev-setup.<p>That would be true if you removed sketching, but removing hand-drawn technical drawings is more like replacing hand-crafted optimized assembler code with an optimizing compiler.</p>
]]></description><pubDate>Thu, 26 Mar 2026 07:34:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47527630</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47527630</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47527630</guid></item><item><title><![CDATA[New comment by moring in "Wine 11 rewrites how Linux runs Windows games at kernel with massive speed gains"]]></title><description><![CDATA[
<p>Paysafe cards. A store near me has them.</p>
]]></description><pubDate>Thu, 26 Mar 2026 07:10:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47527463</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47527463</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47527463</guid></item><item><title><![CDATA[New comment by moring in "Wine 11 rewrites how Linux runs Windows games at kernel with massive speed gains"]]></title><description><![CDATA[
<p>Yes, I do. It just means that you have to manually "recharge" your Steam wallet when it runs low. That's some effort, but it limits the possible damage if something goes wrong.</p>
]]></description><pubDate>Wed, 25 Mar 2026 16:45:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=47519839</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47519839</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47519839</guid></item><item><title><![CDATA[New comment by moring in "Wine 11 rewrites how Linux runs Windows games at kernel with massive speed gains"]]></title><description><![CDATA[
<p>IMHO this supports the original point that payment via Steam would be an upgrade:<p>Sending cash to a postal address isn't low-effort nor low-risk.<p>Payment by cheque is something I have never done, nor would I know how to do it. I'd have to ask at my bank -- not low effort. I don't know if I'm an outlier here but I have never heard from any of my peers who ever did such a thing.<p>The same or even worse is true for international money orders. The whole concept of making a money transfer to a postal address is something I have never heard of. Where's the IBAN?<p>The Wine team is right to put even PayPal before all of these.</p>
]]></description><pubDate>Wed, 25 Mar 2026 16:42:21 +0000</pubDate><link>https://news.ycombinator.com/item?id=47519783</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47519783</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47519783</guid></item><item><title><![CDATA[New comment by moring in "Wine 11 rewrites how Linux runs Windows games at kernel with massive speed gains"]]></title><description><![CDATA[
<p>Requires PayPal or credit card. The suggestion was to pay with your Steam Wallet or whatever payment method already used when you buy a Proton-based game on Steam.</p>
]]></description><pubDate>Wed, 25 Mar 2026 08:35:32 +0000</pubDate><link>https://news.ycombinator.com/item?id=47514778</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47514778</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47514778</guid></item><item><title><![CDATA[New comment by moring in "4Chan mocks £520k fine for UK online safety breaches"]]></title><description><![CDATA[
<p>That is only historic influence, though. Britain does not control the English language and cannot exert any further influence through it.</p>
]]></description><pubDate>Fri, 20 Mar 2026 06:47:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=47451291</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47451291</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47451291</guid></item><item><title><![CDATA[New comment by moring in "Write up of my homebrew CPU build"]]></title><description><![CDATA[
<p>Actual application code was hardwired, entered manually with switches and lights, or with punch cards. Later, when ICs were sufficiently advanced, mask-programmed ROMs/PLAs.</p>
]]></description><pubDate>Wed, 18 Mar 2026 09:43:13 +0000</pubDate><link>https://news.ycombinator.com/item?id=47423545</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47423545</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47423545</guid></item><item><title><![CDATA[New comment by moring in "Write up of my homebrew CPU build"]]></title><description><![CDATA[
<p>My advice would be to consider the possibility, not necessarily to stay out of the physical world. For some, those physical details may be the fun part. Some hate verilog. Some want to put it on an FPGA, some don't. I, personally, moved away from FPGAs due to bad documentation (looking at you, Lattice).<p>An alternative to Verilog is RTl simulation in a higher-level Language, or even higher-level Simulation.<p>Just remember that you can't define what is "fun".</p>
]]></description><pubDate>Wed, 18 Mar 2026 08:32:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47423134</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47423134</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47423134</guid></item><item><title><![CDATA[New comment by moring in "What I Always Wanted to Know about Second Class Values"]]></title><description><![CDATA[
<p>> Obviously it is true in a single threaded system.<p>But only if you disable interrupts, right? Of course, if you are working that close to the hardware, it makes sense to include "no interrupts" in your definition of "single threaded".<p>> Note that garbage collection itself can have a switch, not involving disabling interrupts.<p>I don't understand this. If you get thrashed with interrupts then no switch will remove the overhead of the interrupt handler, so you'd need an upper bound on the time for that handler AND the frequency of hardware interrupts to achieve hard real-time.</p>
]]></description><pubDate>Tue, 10 Mar 2026 05:54:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=47319502</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47319502</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47319502</guid></item><item><title><![CDATA[New comment by moring in "What I Always Wanted to Know about Second Class Values"]]></title><description><![CDATA[
<p>Sorry for being ignorant of the basics, but how does the following work?<p>> However, seg-ments of code that are provably free of garbage collection
> have deterministic timing and can satisfy hard timing con-straints, as they
> are certainly not interrupted by garbage collection.<p>You are only ever "certainly not interrupted" if you turn off interrupts, which requires a high level of privileges. And not being interrupted still does not mean you have uncontended access to main memory or shared caches, which is a relevant factor for hard real-time. Nor do you have uncontended access to execution facilities (e.g. multipliers or floating-point ALUs), but at least for those you might be able to find an upper bound even for contended access.</p>
]]></description><pubDate>Mon, 09 Mar 2026 19:02:04 +0000</pubDate><link>https://news.ycombinator.com/item?id=47313759</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47313759</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47313759</guid></item><item><title><![CDATA[New comment by moring in "Ask HN: What Are You Working On? (March 2026)"]]></title><description><![CDATA[
<p><a href="https://janitza-mage.github.io/spot-problems-4" rel="nofollow">https://janitza-mage.github.io/spot-problems-4</a></p>
]]></description><pubDate>Mon, 09 Mar 2026 13:37:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=47308913</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47308913</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47308913</guid></item><item><title><![CDATA[New comment by moring in "Ask HN: What Are You Working On? (March 2026)"]]></title><description><![CDATA[
<p>I'm working on a similar thing, but due to various problems I encountered (auto-grading, scheduling, guidance, ...) I have, for now, concentrated on making a curated collection of problems / exercises. It's not yet a generator but rather "one of each kind of problem".<p>The idea is that _any_ user-facing tool, whether an app, worksheet generator or whatever, will need something like this for content, so I'm making this available for free and hoping for others to build on top of it.<p>I'm sticking to university-level stuff because I feel that school-level, especially math, is over-saturated already.<p>Technically, it is currently built as a React app, but that is mostly me sticking to tools that get out of my way. Generating PDFs or Anki files should be relatively straightforward.<p><a href="https://github.com/janitza-mage/spot-problems-4" rel="nofollow">https://github.com/janitza-mage/spot-problems-4</a></p>
]]></description><pubDate>Mon, 09 Mar 2026 09:46:14 +0000</pubDate><link>https://news.ycombinator.com/item?id=47306817</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47306817</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47306817</guid></item><item><title><![CDATA[New comment by moring in "First Website (1992)"]]></title><description><![CDATA[
<p>> Somehow everyone accepts<p>Everyone <i>did</i> accept that because when you needed information from a page that pulls that shit, you don't have a choice, and when you did have a choice, all the others did it too.<p>Nowadays people just ask ChatGPT for the information they need so they don't have to visit those awful sites anymore.</p>
]]></description><pubDate>Thu, 26 Feb 2026 09:34:09 +0000</pubDate><link>https://news.ycombinator.com/item?id=47163878</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47163878</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47163878</guid></item><item><title><![CDATA[New comment by moring in "Pi – A minimal terminal coding harness"]]></title><description><![CDATA[
<p>> That's just because corporations got greedy and made their apps suck.<p>It is true for me with Linux. I code for a living and I can't change anything because I can't even build most software -- the usual configure/make/make install runs into tons of compiler errors most of the time.<p>Loss of control <i>is</i> an issue. I'm curious if AI tools will change that though.</p>
]]></description><pubDate>Wed, 25 Feb 2026 08:17:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=47148795</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47148795</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47148795</guid></item><item><title><![CDATA[New comment by moring in "Zero-day CSS: CVE-2026-2441 exists in the wild"]]></title><description><![CDATA[
<p>> HN, and firefox users, can never decide where the money should go or what the goals should be.<p>Without ever having dealt with this problem, it sounds like an embarrassingly solved problem, in the sense of: He who gives the money, decides where it goes.<p>The other half is to provide features that are actually detrimental if you don't want them as plug-ins / extensions / whatever. Pocket is an example for this. Firefox OS is not because it's not force-bundled with Firefox to begin with.<p>> They're switching to Chrome because they just don't care about being fucked up the ass, or worse, they secretly want to be.<p>The point where you stop trying to understand your users is the point where you start losing them.</p>
]]></description><pubDate>Thu, 19 Feb 2026 06:20:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=47070514</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47070514</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47070514</guid></item><item><title><![CDATA[New comment by moring in "Zero-day CSS: CVE-2026-2441 exists in the wild"]]></title><description><![CDATA[
<p>> Even revealing enough details, but not everything, about the flaw to convince a potential buyer would be detrimental to the seller, as the level of details required to convince would likely massively simplify the work of the buyer should they decide to try and find the flaw themselves instead of buying.<p>Is conning a seller really worth it for a potential buyer? Details will help an expert find the flaw, but it still takes lots of work, and there is the risk of not finding it (and the seller will be careful next time).<p>> And I imagine much of those potential buyers would be state actors or organized criminal groups, both of which do have researchers in house.<p>They also have the money to just buy an exploit.<p>> The real money to be made as a criminal alternative, I think, would be to exploit the flaw yourself on real life targets. For example to drop ransomware payloads; these days ransomware groups even offer franchises - they'll take, say, 15% of the ransom cut and provide assistance with laundering/exploiting the target/etc; and claim your infection in the name of their group.<p>I'd imagine the skills needed to get paid from ransomware victims without getting caught to be <i>very</i> different from the skills needed to find a vulnerability.</p>
]]></description><pubDate>Wed, 18 Feb 2026 17:59:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=47063998</link><dc:creator>moring</dc:creator><comments>https://news.ycombinator.com/item?id=47063998</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=47063998</guid></item></channel></rss>