applicative parsing in #OCaml http://jobjo.github.io/2019/05/19/applicative-parsing.html -- interesting to read, but isn't there prior art, e.g. in https://github.com/mirleft/ocaml-asn1-combinators/ (surely that's not a general parser combinator library)? (re-posted without typos)
I just noticed that the book I'm reading atm (published 1972 in Germany) by Hans Magnus Enzensberger got published last year in English. You should read it, highly recommended #anarchism #spain #early1900 "Anarchy’s Brief Summer: The Life and Death of Buenaventura Durruti" (or in German "Der kurze Sommer der Anarchie. Buenaventura Durrutis Leben und Tod") #cnt
@stsp bist du zufaellig gerade im 4. OG U 90 in ottawa?
Wow! Good stuff. “On the Road to Irmin v2” Tarides blog #ocaml https://tarides.com/blog/2019-05-13-on-the-road-to-irmin-v2.html
for-mal Show more
Formal verification in a nutshell:
- when you try to encode the properties as they're written in the textbook, it's infeasible to prove almost anything
- when you encode it in a more elegant fashion, there is almost nothing to prove, everything holds by reflexivity…
Therefore, the point of it is not the assurance as such, but gaining new insights.
This year, we published a #formalmethods paper "Engineering with Logic: Rigorous Test-Oracle Specification
and Validation for TCP/IP and the Sockets API" https://www.cl.cam.ac.uk/~pes20/Netsem/paper3.pdf in the Journal of the ACM! :) https://www.cl.cam.ac.uk/~pes20/rems/ #hol4 #tcpip #network so glad that this is finally out :D (happy to hear your thoughts on that, still working on a TCP/IP stack based on that work)
This is a very nice read https://discuss.ocaml.org/t/modules-that-extend-modules-from-third-party-packages/3777/2 about extensibility of #OCaml modules. It's worth reading even if you're not into OCaml (but other programming languages)!
oh maybe https://grafana.com/docs/features/panels/heatmap/#histograms-and-buckets is what I should read :)
I've some basic metric analytics questions, anyone can enlighten me? So, I use grafana. Counters are straightforward, but now I've this issue that I'd like to graph:
- (a) bucketing (i.e. length of received network packets)
- (b) more bucketing (i.e. the used TLS cipher suite, DNS resource record types, ..)
I've seen in some SNMP specs pre-defined bucket tables - is that the way? Or is there more dynamic? I could put a tag cipher=FOO into influx, but no clue how to visualize that in grafana.
I'm making some progress with influx/grafana monitoring over at https://nqsb.io :D
Every time I see the Hacker Ethic praised without critically challenging its shortcomings, I have to think of "Programming is Forgetting: Toward a New Hacker Ethic" by Allison Parrish and wish it was more popular. You can read the transcript here http://opentranscripts.org/transcript/programming-forgetting-new-hacker-ethic/
so I barely understand computers, anyone can explain me where my memory is?
top shows "204M Active, 126M Inact, 309M Laundry, 6935M Wired, 267M Free", now if I sum up the RES numbers of the processes, I get to maybe 2GB, ARC is 1.3GB. Is my kernel that hungry? is there any tool I can use to investigate further?
This is a #FreeBSD system... and I've been using sleep and resume a lot... (which I have not in the last decade) - may that be related?
maybe I should find a Unix 101 class to attend...
Server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!