frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Coordinating tasks between humans and Claude Code Agents using Leantime

https://leantime.io/hybrid-teams-ai-developers-leantime-mcp/
1•mfolaron•34s ago•0 comments

Collatz's Tape

https://gbragafibra.github.io/2025/07/12/collatz_ant8.html
1•Fibra•4m ago•0 comments

Microsoft enables opt-out telemetry in Go 1.25

https://devblogs.microsoft.com/go/microsoft-go-telemetry/
1•orphea•11m ago•0 comments

Killer whales appear to craft their own tools

https://www.economist.com/science-and-technology/2025/06/23/killer-whales-appear-to-craft-their-own-tools
2•bookofjoe•12m ago•1 comments

The Streaming Wars Come Down to 2: YouTube vs. Netflix

https://www.nytimes.com/2025/07/12/business/media/youtube-netflix-streaming.html
1•ripe•12m ago•0 comments

'Starter packs' have played a central role in Bluesky's rapid growth

https://www.tu-darmstadt.de/universitaet/aktuelles_meldungen/einzelansicht_512064.en.jsp
1•FinnKuhn•13m ago•0 comments

What Is Vibe Coding?

https://cloud.google.com/discover/what-is-vibe-coding
1•taubek•13m ago•1 comments

I Messed Up My Google PM Vibe Coding Interview

https://old.reddit.com/r/ProductManagement/comments/1lw9r9h/i_messed_up_my_google_pm_vibe_coding_interview/
1•taubek•15m ago•0 comments

Trump, Epstein and the Deep State

https://chrishedges.substack.com/p/trump-epstein-and-the-deep-state
4•chmaynard•22m ago•0 comments

How to Detect Text Truncation in SwiftUI?

https://fatbobman.com/en/posts/how-to-detect-text-truncation-in-swiftui/
1•prognu•26m ago•0 comments

Bypassing Google's big anti-adblock update

https://0x44.xyz/blog/web-request-blocking/
4•deryilz•29m ago•0 comments

Uncertainty Is an Evocative State

https://www.startingfromnix.com/p/uncertainty-is-an-evocative-state
1•jger15•33m ago•1 comments

Outer Joining with ANSI SQL-89 and SQL-92

https://www.salvis.com/blog/2025/07/12/outer-joining-with-ansi-sql-89-and-sql-92/
1•tanelpoder•36m ago•0 comments

How Living in San Francisco Made Me More Present

https://aginfer.bearblog.dev/sanfrancisco-present/
1•agcat•41m ago•0 comments

Ultrastable optical frequency transfer and attosecond timing in multicore fiber

https://opg.optica.org/optica/fulltext.cfm?uri=optica-12-6-894&id=573120
1•PaulHoule•43m ago•0 comments

India's richest man wants to turn every TV into a PC

https://techcrunch.com/2025/07/11/indias-richest-man-wants-to-turn-every-tv-into-a-pc/
1•rntn•44m ago•2 comments

Mark Zuckerberg on rebranding Facebook (2018)

https://twitter.com/TechEmails/status/1944105758297403604
1•mfiguiere•44m ago•0 comments

The Myth of the Papal Toilet Chair

https://daily.jstor.org/the-myth-of-the-papal-toilet-chair/
2•Anon84•44m ago•0 comments

Lstarks

1•lstarks•46m ago•0 comments

Show HN: An educational Local Qwen3 LLM Inference project written in Rust

https://github.com/reinterpretcat/qwen3-rs
3•eiskalt•50m ago•1 comments

Tissue-integrated bionic knee restores versatile legged movement post amputation

https://www.science.org/doi/10.1126/science.adv3223
2•gnabgib•54m ago•0 comments

Deepest Infrared Image of Universe Yet

https://www.nasa.gov/image-article/nasas-webb-delivers-deepest-infrared-image-of-universe-yet/
1•busymom0•54m ago•1 comments

Federal Employees and Contractors Oral History Project

https://www.oah.org/2025/03/04/federal-employees-oral-history-project/
3•ohjeez•58m ago•0 comments

Claude Opus Analysis of Twitter's 2023 ML Algorithm

https://github.com/twitter/the-algorithm-ml/pull/493
1•Olshansky•59m ago•0 comments

Show HN: BorgLLM, Zero-config LangChain Client, key rotation and rate limit mgmt

https://borgllm.com
1•omneity•59m ago•1 comments

Tuva or Bust!

https://en.wikipedia.org/wiki/Tuva_or_Bust!
1•layer8•59m ago•0 comments

What Fred Smith Did

https://www.marclevinson.net/?p=2477
2•ajd555•1h ago•1 comments

DHH: Future of Programming, AI, Ruby on Rails, Productivity and Parenting [video]

https://www.youtube.com/watch?v=vagyIcmIGOQ
3•tosh•1h ago•0 comments

A.I. Might Take Your Job. Here Are 22 New Ones It Could Give You

https://www.nytimes.com/2025/06/17/magazine/ai-new-jobs.html
5•labrador•1h ago•3 comments

Ask HN: Is Launch HN only for YC backed companies?

1•growbell_social•1h ago•1 comments
Open in hackernews

Show HN: BinaryRPC – Lightweight WebSocket-based RPC framework in modern C++

https://github.com/efecan0/binaryrpc-framework
37•efecan0•3h ago
Hi HN,

I’m a recent CS graduate. During the past few months I wrote BinaryRPC, an open-source RPC framework in modern C++20 focused on low-latency, binary WebSocket messaging.

Why I built it * Wanted first-class session support, pluggable QoS levels and a simple middleware chain (global, specific, multi handler) without extra JSON/XML parsing. * Easy developer experience

A quick feature list * Binary WebSocket frames – minimal overhead * Built-in session layer (login / reconnect / heartbeat) * QoS1 / QoS2 with automatic ACK & retry * Plugin system – rooms, msgpack, etc. can be added in one line * Thread-safe core: RAII + folly

Still early (solo project), so any feedback on design, concurrency model or missing must-have features would help a lot.

Thanks for reading!

also see "Chat Server in 5 Minutes with BinaryRPC": https://medium.com/@efecanerdem0907/building-a-chat-server-i...

Comments

jayd16•2h ago
My immediate reaction is why websocket based design and TCP (?) over gRPC with http/3 and UDP and multiplexing and such?
efecan0•2h ago
I started with WebSocket over TCP for practical reasons:

* Works everywhere today (browsers, LB, PaaS) with zero extra setup. * One upgrade -> binary frames; no gRPC/proto toolchain or HTTP/3 infra needed. * Simple reliability: TCP handles ordering; I add optional QoS2 on top. * Lets me focus on session/room/middleware features first; transport is swappable later.

QUIC / gRPC-HTTP/3 is on the roadmap once the higher-level API stabilises.

inetknght•2h ago
I'm not the author but off the top of my head:

- gRPC is not a library I would trust with safety or privacy. It's used a lot but isn't a great product. I have personally found several fuckups in gRPC and protobuf code resulting in application crashes or risks of remote code execution. Their release tagging is dogshit, their implementation makes you think the standard library and boost libraries are easy to read and understand, and neither takes SDLC lifecycles seriously since there aren't sanitizer builds nor fuzzing regime nor static analysis running against new commits last time I checked.

- http/3 using UDP sends performance into the crater, generally requiring _every_ packet to reach the CPU in userspace instead of being handled in the kernel or even directly by the network interface hardware

- multiplexing isn't needed by most websocket applications

efecan0•2h ago
Thank you for the extra information!

I am a recent CS graduate and I work on this project alone. I chose WebSocket over TCP because it is small, easy to read, and works everywhere without extra tools. gRPC + HTTP/3 is powerful but adds many libraries and more code to learn.

When real users need QUIC or multiplexing, I can change the transport later. Your feedback helps me a lot.

reactordev•1h ago
The point people are beating around the bush at here is that a binary RPC framework has no such need for HTTP handling, even for handshaking, when a more terse protocol of your own design would/could/might? be better.

I totally understand your reasoning behind leaning on websockets. You can test with a data channel in a browser app. But if we are talking low-latency, Superman fast, modern C++, RPC and forgeddaboutit. Look into handling an initial payload with credential negotiation outside of HTTP 1.1.

efecan0•1h ago
You’re right: HTTP adds an extra RTT and headers we don’t strictly need.

My current roadmap is:

1. Keep WebSocket as the “zero-config / browser-friendly” default. 2. Add a raw-TCP transport with a single-frame handshake: [auth-token | caps] → ACK → binary stream starts. 3. Later, test a QUIC version for mobile / lossy networks.

So users can choose: * plug-and-play (WebSocket) * ultra-low-latency (raw TCP)

Thanks for the nudge this will go on the transport roadmap.

tgma•41m ago
> I have personally found several fuckups in gRPC and protobuf code resulting in application crashes or risks of remote code execution.

Would be great if you report such remote code executions to the authors/Google. I am sure they handle CVEs etc. There has been a security audit like https://github.com/grpc/grpc/tree/master/doc/grpc_security_a...

> there aren't sanitizer builds nor fuzzing regime nor static analysis running against new commits last time I checked.

Are you making shit up as you go? I randomly picked a recently merged commit and this is the list of test suites ran on the pull request. As far as I recall, this has been the practice for at least 8 years+ (note the MSAN, ASAN, TSAN etc.)

I can see various fuzzers in the code base so that claim is also unsubstantiated https://github.com/grpc/grpc/tree/f5c26aec2904fddffb70471cbc...

  Android (Internal CI) Kokoro build finished
  Basic Tests C Windows Kokoro build finished
  Basic Tests C# Linux Kokoro build finished
  Basic Tests C# MacOS Kokoro build finished
  Basic Tests C# Windows Kokoro build finished
  Basic Tests C++ iOS Kokoro build finished
  Basic Tests C/C++ Linux [Build Only] Kokoro build finished
  Basic Tests ObjC Examples Kokoro build finished
  Basic Tests ObjC iOS Kokoro build finished
  Basic Tests PHP Linux Kokoro build finished
  Basic Tests PHP MacOS Kokoro build finished
  Basic Tests Python Linux Kokoro build finished
  Basic Tests Python MacOS Kokoro build finished
  Bazel Basic Tests for Python (Local) Kokoro build finished
  Bazel Basic build for C/C++ Kokoro build finished
  Bazel C/C++ Opt MacOS Kokoro build finished
  Bazel RBE ASAN C/C++ Kokoro build finished
  Bazel RBE Build Tests Kokoro build finished
  Bazel RBE Debug C/C++ Kokoro build finished
  Bazel RBE MSAN C/C++ Kokoro build finished
  Bazel RBE Opt C/C++ Kokoro build finished
  Bazel RBE TSAN C/C++ Kokoro build finished
  Bazel RBE Thready-TSAN C/C++ Kokoro build finished
  Bazel RBE UBSAN C/C++ Kokoro build finished
  Bazel RBE Windows Opt C/C++ Kokoro build finished
  Bloat Diff Kokoro build finished
  Bloat Difference Bloat Difference
  Clang Tidy (internal CI) Kokoro build finished
  Distribution Tests C# Linux Kokoro build finished
  Distribution Tests C# MacOS Kokoro build finished
  Distribution Tests C# Windows Kokoro build finished
  Distribution Tests Linux (standalone subset) Kokoro build finished
  Distribution Tests PHP Linux Kokoro build finished
  Distribution Tests PHP MacOS Kokoro build finished
  Distribution Tests Python Linux Arm64 Kokoro build finished
  Distribution Tests Ruby MacOS Kokoro build finished
  Distribution Tests Windows (standalone subset) Kokoro build finished
  EasyCLA EasyCLA check passed. You are authorized to contribute.
  Grpc Examples Tests CPP Kokoro build finished
  Memory Difference Memory Difference
  Memory Usage Diff Kokoro build finished
  Mergeable Mergeable Run has been Completed!
  Migration Test MacOS Sonoma Kokoro build finished
  ObjC Bazel Test Kokoro build finished
  Portability Tests Linux [Build Only] (internal CI) Kokoro build finished
  Portability Tests Windows [Build Only] (internal CI) Kokoro build finished
  Sanity Checks (internal CI) Kokoro build finished
  Tooling Tests Python Linux Kokoro build finished
  Windows clang-cl with strict warnings [Build Only] Kokoro build finished
efecan0•36m ago
Interesting discussion. My current goal isn’t to replace gRPC but to offer a lighter option for simple real-time apps. I’ll keep following the thread; the security links are useful, thanks.
cherryteastain•2h ago
gRPC's C++ interfaces have horrible design if you want async behaviour. Tons of unsafe and bad practices like the need to call delete this [1]

[1] https://grpc.io/docs/languages/cpp/callback/

jeffbee•2h ago
Ironically this library is much closer to what Google uses internally than grpc is.
efecan0•2h ago
Interesting point, thanks!
efecan0•2h ago
Hi everyone, thanks for checking out BinaryRPC!

I built this project because I needed a simple but fast WebSocket-based RPC layer for my own real-time side projects. Existing options felt heavy or JSON-only, so I wrote something binary-focused and plugin-friendly.

I’d really appreciate any feedback on:

• Overall architecture / design smells • Concurrency model (thread-pool vs async IO) • “Must-have” features before this is production-ready

Design notes and a 5-minute chat-server demo are in this short post: https://medium.com/@efecanerdem0907/building-a-chat-server-i...

Any comments, suggestions or PRs are welcome. Thanks again!

jeffbee•2h ago
Breezy claims of "exactly once" are a red flag for me. Aside from that I think this framework looks fairly promising.
efecan0•1h ago
Good catch—let me clarify what QoS 2 in BinaryRPC really does.

It follows the MQTT-style 2-step handshake:

1. Sender → `PUBLISH(id, data)` 2. Receiver → `PUBREC(id)` // stored as “seen but not completed” 3. Sender → `PUBREL(id)` 4. Receiver → `PUBCOMP(id)` // marks id as done, then passes data to the app layer

While an id is in “seen” state the receiver drops duplicates, so the message is delivered to user code exactly once per session even if the socket retries.

If the client reconnects with the same session-key, the server reloads the in-flight id table, so duplicates are still filtered. If the session is lost (no session-key) we fall back to at-least-once because there is no common store.

So: “exactly once within a persisted session; effectively once” as long as the application is idempotent. I’ll update the docs to state this more precisely. Thanks for pointing it out!

denizdoktur•1h ago
Lightweight, well-designed, and solves a real need. Impressive.
efecan0•1h ago
Thanks!
sahinemirhan•1h ago
Very good
dailker•1h ago
nice I loved it dude. I hope you get succesful on this.
MuffinFlavored•1h ago
> None, AtLeastOnce, ExactlyOnce with retries, ACKs & two‑phase commit, plus pluggable back‑off strategies & per‑session TTL.

Sounds like RabbitMQ/AMQP/similar over WebSocket?

efecan0•1h ago
It looks similar on the surface, but scope and goals are different:

* BinaryRPC = direct request/response calls with optional QoS (per session). – No exchanges/queues, no routing keys. – One logical stream, messages mapped to handlers.

* RabbitMQ / AMQP = full message-broker with persistent queues, fan-out, topic routing, etc.

So you could say BinaryRPC covers the transport/QoS part of AMQP, but stays lightweight and broker-less. If an app later needs full queueing we can still bridge to AMQP, but the core idea here is “RPC first, minimal deps”.