Hacker Newsnew | past | comments | ask | show | jobs | submit | tester756's commentslogin

and other hilarious jokes we can tell ourselves :P

>China taking Taiwan will likely not result in the CCP getting any technology, certainly Taiwanese have "contingency plans" to vaporize all tech in the event they are invaded.

He didn't suggest anything like that, did he?


>Ultra 5-135H is fine

Well, to be frank - it's not even LNL, let alone PTL.

>and we haven't seen an indication that Intel has anything to leapfrog AMD chips any time soon.

PTL is such indication


They're good for exceptional situations where foundamental, core assumptions are broken for some reason.

In such scenario there's no error recovery, software is expected to shutdown and raise loud error.


If you're planning on shutting down, what's the fundamental difference between throwing an exception, vs simply complaining loudly and calling exit() ..?

Sometimes it’s useful to handle the exception somewhere near its origin so you can close related resources, lockfiles, etc. without needing a VB6 style “On Error GoTo X” global error handler that has to account for all different contexts under which the exceptional situation might have occurred.

Your process can crash or be killed at any moment anyway. Depending on in-band cleanup is not reliable.

Sure, but there are many cases where you don't have to halt because you can cleanup and carry on.

> a VB6 style “On Error GoTo X” global error handler that has to account for all different contexts under which the exceptional situation might have occurred

... That seems like a pretty accurate description of how exception handling mechanisms are implemented under the hood. :)


The code that's throwing an exception typically does not know that the exception catcher will shut anything down.

And - very often, you would _not_ shut down. Examples:

* Failure/error in an individual operation or action does not invalidate all others in the set of stuff to be done.

* Failure/error regarding the interaction with one user does not mean the interaction with other users also has to fail.

* Some things can be retried after failing, and may succeed later: I/O; things involving resource use, etc.

* Some actions have more than one way to perform them, with the calling code not being able to know apriori whether all of them are appropriate. So, it tries one of them, if it fails tries another etc.


> They're good for exceptional situations where foundamental, core assumptions are broken for some reason.

No, that's what assertions or contracts are for.

Most exceptions are supposed to be handled. The alternative to exceptions in C++ are error codes and `std::expected::. They are used for errors that are expected to happen (even if they may be exceptional). You just shouldn't use exceptions for control flow. (I'm looking at you, Python :)


Yet, if you can only explain an exception using the word ‘exception’ you’re not making any head way.

I like the idea of an exception as a way to blow out of the current context in order for something else to catch it and handle in a generic manner. I don’t like the idea of an exception to hide errors or for conditional logic because you have to know what is handling it all. Much easier to handle it there and then, or use a type safe equivalent (like a maybe or either monad) or just blow that shit up as soon as you can’t recover from the unexpected.


I use asserts for this purpose.

>Unless we live on another planet Russia can barely fight a war against Ukraine*

*Ukraine with very significant support from various countries


>Exceptions are cheap on the happy path and super expensive on the error path.

Depends on the software, huh.


.NET Core and Visual Studio (both standard and Code) are good also

c'mon folks, stop being naive - this is bullshit test :D

"Windows 11 is running on unsupported hardware"

I've been using W10 and W11 Pro versions daily and I don't feel any difference except task bar search menu performance (especially this on corpo laptop, on PC this is fine)


Why not just make screenshoot of every PDF page?


It could still be identifiable, for example if the document has been prepared such that the intended recipient's identity is encoded into subtle modulation of the widths of spaces.


That's outside this threat model? The idea here is trying to foil outside analysis, not limit the document authors (which are allowed to add/update and even write openly 'the intended recipient's identity').


Print and re-scan wouldn’t fix that though.


That was my point. If you want to erase its origin you need to semantically extract the contents and reduce them to their most basic representation.


Sure, but all those not-essential information hidden in PDFs format are removed


In PDF file format?


That's the figure that Microsoft and Google found in their code bases.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: