Hacker Newsnew | past | comments | ask | show | jobs | submit | glram's commentslogin

I'd like a language that allows me to explicitly annotate my code for vectorization/SIMD. Too often compilers aren't able to vectorize efficiently because the heuristics don't detect the opportunity.


I had a thought on this but it's alot of work for one person and IDK if anyone would use my language for that.

I agree tho. I been learning SIMD and the operations it supports are pretty neat


Doesn’t GCC have annotations for that?


Professor Strang’s lectures helped me greatly during my linear algebra class. I thoroughly appreciated his clear, coherent lecture style.

On another note, he is such a nice guy. 10/10.


For a very introductory perspective, the following sites are really useful:

[1]: http://web.mit.edu/6.031/www/sp20/classes/05-version-control...

[2]: https://try.github.io/


Definitely. If you're going for something integrated, Intel/AMD (and maybe x86 in general) are out of the question.

For a PC, though, using ARM can be tough if you're trying to use Windows. I'm not sure how many Windows programs have ARM binaries.


I really like the certificates for SSH idea... I've never thought about this and have always used vanilla keys.

Does anyone have experience using this? Besides giving auditing information, does this have any other benefits?


Author here. I mentioned a couple of other benefits in the post, namely TTL (time to live) and the ability to have fine-grained role-based access control. Your servers should use certificate-based auth too, to join a production environment. Then you won't have the trust-on-first-use issue, because server authentication simply compares the CA of a client & server and you don't have the dreadful "are you sure [y/N]" question when connecting to a box for the first time.

Basically, certificates rule the world everywhere, but due to rough UX, they haven't seen broad adoption for SSH. That's until now, hopefully :)

[1] https://en.wikipedia.org/wiki/Trust_on_first_use


Thanks for the follow-up! I've always thought the TOFU thing was a huge issue: it's hard to verify the first time and rotating server certs is a nightmare.

Are there any products/tools that make this easier? I've noticed that this isn't common even within companies with robust security infrastructure.


> Are there any products/tools that make this easier

You just read an article by Gravitational, authors of Teleport. Check them out.

The opensource product is pretty full featured, the commercial version has a few features companies usually need (I believe SSO is one of them). Now instead of having people submit a ticket, send the keys, yada yada, you can just point someone to the portal and they can just use teleport credentials (or if you have the feature, the corp credentials). And the session is recorded. You can also use the command line – and it still gets recorded.

Disclaimer: We use Teleport in our company. I pitched after finding out about them here in HN. We still have bastion hosts, which now automation automatically deploys teleport and they show up in a single place.


My own solution to this is to store the server key fingerprints in a public Git repository, which can then be pulled from on all devices that need to be able to connect.

This works nicely for my own personal setup with a few servers. It may be possible to scale this to a larger environment with multiple users too.

Then main benefit is that whenever a server is rebuilt (which can be quite regularly when using infra-as-code/infra automation), I don't have to go and manually update every single client that needs to be able to connect.

https://www.jamieweb.net/blog/managing-your-ssh-known_hosts-...


I'm one of the maintainers of https://github.com/gravitational/teleport

Another one to look at is https://github.com/Netflix/bless

Also, if you want to stick with what you have (most likely OpenSSH), we wrote an OpenSSH guide: https://gravitational.com/blog/how-to-ssh-properly/


Some netflix engineers have given some pretty good talks about SSH certs.

There are a few floating around, I think this is one of the good ones: https://www.youtube.com/watch?v=JwLGsWYVjqU


I think this is another sign that iOS/iPad OS and Mac OS are converging. If I had to guess, once Apple adopts ARM processors for the Mac, there won't be much of a distinction between the two.


This is really nice. Even with code review secrets still slip through the cracks. I imagine this will be quite pricey tho.


Ah I was hoping based on the headline that this would be some sort of analysis of the actual code -- aka a pie graph of the different language features each team member uses. Kinda like an aggregated `blame` :D


This is quite a disappointment indeed. Turns out that compilers only use like 10% of the instructions in x86. While there are some efforts to fix this (at least for SIMD) with better heuristics, I fear that the best way to solve this might be to go with simpler ISAs and drive up the clock speed.


Absolutely. I feel that all the ~7.7k opcodes for x86_64 aren't helping things at all.

I had high hopes for RISC-V but I already heard the usual BS about "extensions that vendors may choose to implement or not" and I kind of lost hope. :(


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: