How to use these tihngs.
Like most people, I have had success with splitting things into a planning stage followed by an implementation stage. The implementation phase can be kind of synchronous/interactive, or can be a fully auto Ralph loop.
Author of design brief: Nick Gerakines (CTO, Graze Social; founder, Smoke Signal & Lexicon Garden; author, AIP OAuth server; AT Protocol Community Fund member).
Target home: tangled.org/ngerakines.me/atproto-crates, as a new crate atproto-pds.
Date: May 1, 2026 (revision 2).
Architectural North Star: A low-latency, highly-performant Rust PDS that is fully conformant to the existing reference implementations and is architected from day zero to support permissioned data spaces as a first-class concern, grounded in the concrete design laid out in bluesky-social/atproto/docs/superpowers/specs/2026-04-22-permissioned-data-pds-design.md (Daniel Holmgren's PDS implementation design, hereafter "the Spaces Design Spec"). The Spaces Design Spec supersedes the earlier Permissioned Data Diary blog posts as the authoritative source for protocol mechanics; the diary is retained only as conceptual backgr
| """ | |
| The most atomic way to train and run inference for a GPT in pure, dependency-free Python. | |
| This file is the complete algorithm. | |
| Everything else is just efficiency. | |
| @karpathy | |
| """ | |
| import os # os.path.exists | |
| import math # math.log, math.exp |
This error is notoriously fickle to reproduce or resolve. It can always be fixed by adding an export type for a name TS needs to compile your types. Here's how to find where the change needs to be made:
reportLikelyUnsafeImportRequiredError to see all references to it if needed. Add a breakpoint in at that position:if (!attributes) {
// ADD BREAKPOINT HERE ⬇️
context.encounteredError = truehi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.
3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.
I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:
By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k
| #!/bin/bash | |
| set -e | |
| s3_key=$BACKUP_S3_KEY | |
| s3_secret=$BACKUP_S3_SECRET | |
| bucket=$BACKUP_S3_BUCKET | |
| backup_db_passphrase=$BACKUP_S3_DB_PASSPHRASE | |
| data_directory=$SQLITE_DATABASE_DIRECTORY | |
| # ensure each backup has the same date key | |
| date_key=$(date '+%Y-%m-%d-%H-%M-%S') |
| use std::{cell::RefCell, marker::PhantomData, mem, rc::Rc}; | |
| use thiserror::Error; | |
| #[derive(Debug, Copy, Clone, Eq, PartialEq, Error)] | |
| pub enum AccessError { | |
| #[error("frozen value accessed outside of enclosing scope")] | |
| Expired, | |
| #[error("already borrowed incompatibly")] | |
| BadBorrow, |
I won't go too far into the nitty details (lol), but this is generally how I've structured my WIP mostly-text-based, turn-based adventure game.
I emphasize that because I suspect this approach doesn't work all that well for other styles of games.
Specifically, because practically everything in my game happens on-click; there's very little running in the background.
Nah, I strained my eyes for this.
In this article, I'll explain why implementing numbers with just algebraic datatypes is desirable. I'll then talk about common implementations of FFT (Fast Fourier Transform) and why they hide inherent inefficiencies. I'll then show how to implement integers and complex numbers with just algebraic datatypes, in a way that is extremely simple and elegant. I'll conclude by deriving a pure functional implementation of complex FFT with just datatypes, no floats.