As an Iranian in Iran who is now connected, I have a request: Please tell google make colab available behind the safe browsing IP. Google's safe browsing IP is usually the #1 whitelisted IP in internet blackouts. Having colab on this IP allows tech people to ssh into their servers, and bootstrap connections based on the available protocols at the time.
In the absence of a perfect solution, we should do nothing? The entire scenario is a cat and mouse whack-a-mole arms race. I'd support doing something to give the citizens a leg up.
You can run a Google Colab proxy on your website. Predictably, they will block your website because preventing access to wrongthink is more important than ensuring access to rightthink.
One key feature of Liquid is that you can safely run customer-written code on your servers without worrying about security. It's a very underpowered language by design. This means that it's rather easy to be confident that its sandbox isn't leaky.
Looks like this does compile time templating. There are reasons to explore using those over runtime templating but they don't cover all of the use cases.
Wow! rustyline has intensive support for a lot of the actions and things the user can do. Though I wanted to provide a more restrictive yet powerful abstraction that’s my I chose a trait based approach. It provides the exact control needed on certain aspects of the shell while providing ample control because of the shared state.
Initially, I was planning to make the functions async, but I rather choose to pass the async runtime instead. It solves for 2 cool use-cases; 1 we can call block_on and manage an async task in the flow, or 2 queue in the action and consider pooling it when needed.
> iOS Simulator or the Android Simulator, which based on experience, neither are made for anything resembling "quickly".
It's not adb / avd or some device emulator. It's an app that you install on your device, and then it can load your app from your development device using a link. I was able to run it in 5 minutes without having android studio or any other android development kits on my laptop.
> In the framekernel OS architecture, the entire OS resides in the same address space (like a monolithic kernel) and is required to be written in Rust. However, there's a twist---the kernel is partitioned in two halves ... the unprivileged Services must be written exclusively in safe Rust.
Unprivileged services can exploit known compiler bugs and do anything they want in safe Rust. How this affects their security model?
I think it's not so much intended as a "you can allow arbitrary untrusted code to run as an unprivileged service" and more "a buggy unprivileged service won't compromise the whole system".
Zngur allows you to write functions operating over Rust types, adding methods to Rust types and implementing Rust traits for C++ and Rust types inside C++. So you can write a rusty wrapper for the C++ library inside C++.
If you want to immediately use a C++ library in Rust with minimal manual effort, check out autocxx [0]. Its generated api isn't very idiomatic Rust, and it uses Pin, moveit, ... but it covers a good percent of C++ apis and you can also make an idiomatic wrapper for it in Rust.
It does pass this information to LLVM, in the form of the `readonly` attribute. This seems to be a bug in LLVM that does not optimize the function propely, I don't know why.
Open AI knows every text that is generated by ChatGPT, so it can run a simple search algorithm instead of an AI model and achieve way higher true positive rate?
Sadly lvariant did not get into C++ language. The library supports pattern matching against std::variant/std::any and class inheritance as a replacement.