frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Internet voting is insecure and should not be used in public elections

https://blog.citp.princeton.edu/2026/01/16/internet-voting-is-insecure-and-should-not-be-used-in-...
129•WaitWaitWha•1h ago•86 comments

Significant US Farm Losses Persist, Despite Federal Assistance

https://www.fb.org/market-intel/significant-farm-losses-persist-despite-federal-assistance
63•toomuchtodo•1h ago•44 comments

Take potentially dangerous PDFs, and convert them to safe PDFs

https://github.com/freedomofpress/dangerzone
81•dp-hackernews•3h ago•29 comments

Binary Fuse Filters: Fast and Smaller Than XOR Filters

https://arxiv.org/abs/2201.01174
33•redbell•4d ago•0 comments

Show HN: ChartGPU – WebGPU-powered charting library (1M points at 60fps)

https://github.com/ChartGPU/ChartGPU
509•huntergemmer•11h ago•148 comments

Claude's new constitution

https://www.anthropic.com/news/claude-new-constitution
321•meetpateltech•10h ago•317 comments

Skip is now free and open source

https://skip.dev/blog/skip-is-free/
289•dayanruben•10h ago•130 comments

Threat Actors Expand Abuse of Microsoft Visual Studio Code

https://www.jamf.com/blog/threat-actors-expand-abuse-of-visual-studio-code/
8•vinnyglennon•2h ago•0 comments

Golfing APL/K in 90 Lines of Python

https://aljamal.substack.com/p/golfing-aplk-in-90-lines-of-python
53•aburjg•5d ago•9 comments

Letting Claude play text adventures

https://borretti.me/article/letting-claude-play-text-adventures
76•varjag•5d ago•28 comments

Show HN: RatatuiRuby wraps Rust Ratatui as a RubyGem – TUIs with the joy of Ruby

https://www.ratatui-ruby.dev/
72•Kerrick•4d ago•6 comments

Show HN: Rails UI

https://railsui.com/
109•justalever•7h ago•75 comments

I'll pass on your zoom call.

https://operand.online/chronicle/pass.zoom
9•c4lliope•1h ago•5 comments

Show HN: TerabyteDeals – Compare storage prices by $/TB

https://terabytedeals.com
74•vektor888•5h ago•53 comments

The WebRacket language is a subset of Racket that compiles to WebAssembly

https://github.com/soegaard/webracket
100•mfru•4d ago•20 comments

Jerry (YC S17) Is Hiring

https://www.ycombinator.com/companies/jerry-inc/jobs/QaoK3rw-software-engineer-core-automation-ma...
1•linaz•4h ago

Challenges in join optimization

https://www.starrocks.io/blog/inside-starrocks-why-joins-are-faster-than-youd-expect
46•HermitX•9h ago•12 comments

TrustTunnel: AdGuard VPN protocol goes open-source

https://adguard-vpn.com/en/blog/adguard-vpn-protocol-goes-open-source-meet-trusttunnel.html
67•kumrayu•8h ago•15 comments

Three types of LLM workloads and how to serve them

https://modal.com/llm-almanac/workloads
46•charles_irl•10h ago•1 comments

Waiting for dawn in search: Search index, Google rulings and impact on Kagi

https://blog.kagi.com/waiting-dawn-search
226•josephwegner•8h ago•143 comments

Tell HN: 2 years building a kids audio app as a solo dev – lessons learned

45•oliverjanssen•12h ago•28 comments

Setting Up a Cluster of Tiny PCs for Parallel Computing

https://www.kenkoonwong.com/blog/parallel-computing/
32•speckx•7h ago•17 comments

SIMD programming in pure Rust

https://kerkour.com/introduction-rust-simd
55•randomint64•2d ago•20 comments

Mystery of the Head Activator

https://www.asimov.press/p/head-activator
18•mailyk•3d ago•3 comments

Can you slim macOS down?

https://eclecticlight.co/2026/01/21/can-you-slim-macos-down/
179•ingve•18h ago•221 comments

A verification layer for browser agents: Amazon case study

https://www.sentienceapi.com/blog/verification-layer-amazon-case-study
15•tonyww•11h ago•4 comments

Show HN: Yashiki – A tiling window manager for macOS in Rust, inspired by River

https://github.com/typester/yashiki
7•typester•2d ago•2 comments

Nested code fences in Markdown

https://susam.net/nested-code-fences.html
188•todsacerdoti•13h ago•63 comments

Stevey's Birthday Blog

https://steve-yegge.medium.com/steveys-birthday-blog-34f437139cb5
32•throwawayHMM19•1d ago•13 comments

Slouching Towards Bethlehem – Joan Didion (1967)

https://www.saturdayeveningpost.com/2017/06/didion/
65•jxmorris12•8h ago•8 comments
Open in hackernews

Garbage collection of object storage at scale

https://www.warpstream.com/blog/taking-out-the-trash-garbage-collection-of-object-storage-at-massive-scale
96•ko_pivot•8mo ago

Comments

juancn•8mo ago
Another possible mechanism for doing GC at scale (a variation on Asynchronous Reconciliation in the article) in some file/object store, is doing a probabilistic mark and sweep using bloom filters.

The mark phase can be done in parallel building many bloom filters for the files/objects found.

Then the bloom filters are merged (or'ed together essentially) and then a parallel sweep phase can use the bloom filter to answer the question: is this file/object live?

The bloom filter then answers either "No" with 100% certainty or "Maybe" with some probability p that depends on the parameters used for the bitset and the hash function family.

cogman10•8mo ago
What does the bloom filter solve?

The expensive portion of the mark and sweep for the object store is the mark phase, not the storage of what's been marked. 100s, 1000s, or even millions of live objects wouldn't hardly take any space to keep in a remembered set.

On the other hand, querying the S3 bucket to list those 1M objects would be expensive no matter how you store the results.

But this does tickle my brain. Perhaps something akin to the generational hypotheses can be applied? Maybe it's the case that very old, very young, or very untouched objects are more likely to be garbage than not. If there's some way to divide the objects up and only look at objects whose are in "probably need to be collected" regions, then you could do minor fast sweeps semi frequently and schedule more expensive "really delete untracked stuff" infrequently.

Cicero22•8mo ago
I was thinking they could use something like cloudwatch events, or something, to trigger sweeps and significantly reduce scheduled sweeps.

They could even use cost allocation tags to predict if a bucket or group of buckets should be scanned if it's growing unexpectedly. Cost isn't a perfect metric but there's definitely signal there.

juancn•8mo ago
Building the set of used files or objects (which is what mark does in a mark/sweep).

Sometimes it's too expensive to mark in place, even if it's a bit that you need to write to disk and keeping a set of references may be prohibitive (or the structure holding the references is mostly/effectively immutable).

If it's all memory and mutable it doesn't (normally) really matter, but when it's not, you ideally would have some mechanism to move the code to where the data is, rather than stream the data to where the compute is (it is really wasteful for large scale data processing).

In any case, you would not be moving/scanning the files themselves, but the metadata is what you want to read for the mark phase.

The article if I understood correctly implies that the files and the metadata of the files (Kafka queues and so on) are separate, so presumably, the metadata is much much smaller than the data itself, but still potentially large.

For example if you had a large scale content addressed store (think a massive version of git's blob storage), you typically add to something like that and keep a few mutable root references to start your GC from to seed a mark/sweep.

Following the git example, the roots would be the branches, tags and reflogs, and the metadata you scan the transitive closur of the trees that are reachable from those (simplifying a bit) but not the file blobs themselves.

I use git as an example because a a CAS lends itself very well to large scale distributed systems because you can reason about it as an immutable data structure, but you can still change it effectively with sane semantics.

donavanm•8mo ago
If you like big beautiful storage and probabilistic structures check out https://www.usenix.org/conference/osdi14/technical-sessions/.... The coho data folks ended up in AWS S3 a few years later.
juancn•8mo ago
Thanks! I hadn't seen it and it may come handy!
deathanatos•8mo ago
> Why Not Just Use a Bucket Policy?

I've heard these words so many times, it's refreshing to see someone dig into why bucket policies aren't a cure-all.

As for "Why not use synchronous deletion?" — regarding the pitfall there, what about a WAL? I.e., you WAL the deletions you want to perform into an object in the object store, perform the deletions, and then delete the WAL. If you crash and find a WAL file, you repeat the delete commands contained in the WAL.

(I've used this to handle this problem where some of the deletions are mixed: i.e., some in an object store, some in a SQL DB, etc. The object store is essentially being used as strongly consistent storage.)

(Perhaps this is essentially the same as your "delayed queue"? All I've got is an object store though, not a queue, and it's pretty useful hammer.)

telotortium•8mo ago
> HN Disclaimer: WarpStream sells a drop-in replacement for Apache Kafka built directly on-top of object storage.

First time I’ve seen one of these. That’s actually a better way to advertise your product than putting it at the end.

hencq•8mo ago
Yes, though I think they meant to say disclosure instead of disclaimer.
siscia•8mo ago
What I see working extremely well, arguably in a setting where cost was not really an issue was a much simpler approach.

Keep compacting files at some regular cadence `t` and keep a bucket policy to delete files older than `t+delta+buffer`.

Then have an alarm for files older than `t+buffer`