Hacker Newsnew | past | comments | ask | show | jobs | submit | spc476's commentslogin

I did this at a previous job for running a complicated regression test (that couldn't be fully automated for reasons). I initially did this for myself as the regression test wasn't run that often. I also made sure that anyone new to the department would have to run the regression test and report/update with any missing steps.

The author very much did allow others to give input. The original protocol had single digit status codes, I was arguing for three digit codes, he compromised with two digit codes. It was my idea to include the full URL for requests, and for redirections. It's just that it wasn't easy, but he could be reasoned with. The only two hard lines Solderpunk had for the protocol was TLS, and single level lists (why, I don't know).


You could store the address of the offending instruction/code sequence that generated the NaN (think software-only implementation).


So maybe you can answer the following question I have: what is a "protected abstract virtual base pure virtual private destructor," and when was the last time you needed one?" At least with C, I understand the feature set and how they interact.


Just because a feature is there doesn't mean you have to use it.

Additionally the example isn't even possible, at least make ridiculous examples that compile.


Don't use inheritance and you won't have to find out.


This is just silly. C++ gives you a smorgasbord of multi-paradigm features. Everything has its place and you can mix and match your needed featureset based on project needs, team skillset etc. You don't have to know or learn everything.


IEEE does define x/0 to be infinity and -x/0 as -infinity. But what about 0/0? Or sqrt(-1)?


It only briefly goes into what it does, this article goes into how it's done for a particular implementation.


Learning the accordion didn't hurt Weird Al's career, nor did using the flute hurt Ian Anderson (lead vocalist and flutist of Jethro Tull).


These are edge cases. Way to miss the point.


But then the interviewer will be launched into the Pit of Eternal Peril.


Wait! I thought President Trump was getting ride of the Department of Education. How is there still an Education Secretary?


The Motorola 68000, introduced in 1979, had 24 address lines. The Intel 80286, introduced in 1982, also had 24 address lines.


Well, the VAX was there before any of these, but I wouldn't call that a "personal machine."

I suppose the argument could be made that the 68000 was first, as both it and MIPS ended up in gaming consoles (Sega Genesis vs. Sony PS2 and Nintendo 64).

However, MIPS eventually scaled to 64-bit, was well-known and heavily exploited in supercomputing applications, and was used to produce the film Jurassic Park. The 68000 had a far dimmer future.

Yes, the x86 line did supplant them all, but only with AMD's help. Had Itanium been Intel's final answer, MIPS might be much stronger today.


Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: