notes icon indicating copy to clipboard operation
notes copied to clipboard

Notes, Questions, Ideas

Results 85 notes issues
Sort by recently updated
recently updated
newest added

Given a fully deterministic language with fully serializable runtimes, hash the snapshot of every (Nths) execution step, construct a merkle tree of this hashed list. This allows for efficient (even...

Consider a language in which program code, data and runtime state could be represented as a Directed Acyclic Graph (DAG). If that language was required to be deterministic, unique DAG...

http://de.metamath.org/index.html http://paperscape.org/ https://d3js.org/ Excerpt from a conversation with Norman Megill: > 1. Would an interactive visualization, possibly similar to > http://paperscape.org/ make sense? Off and on I've tried to imagine...

https://www.authorea.com/ http://hplgit.github.io/doconce/doc/pub/slides/scientific_writing-1.html http://amacfie.github.io/2015/09/22/github-publishing/

Looking at the [Nock spec](https://github.com/cgyarvin/urbit/blob/master/doc/book/1-nock.markdown) there might be some interesting changes to be made: - tree addressing (Nock uses infix numbering) - infix [a [0 b]] to prefix [0 [a...

Fundamentals to protocols machine organisation/cooperation/competition device politics physical/virtual social/economic networks scalability online vs offline vertically integrated monopolies transaction costs economies of scale inner vs outer relations resource sharing incentivization subnetworks...

### Objective #### Abstract Using peer to peer networks instead of a single provider as intermediary, develop new means for web service registration, search, payment and certification. #### Specific This...

https://news.ycombinator.com/item?id=13578256 - mouse vs keyboard focus (see acme editor) **> audunw 28 days ago [-]** > > As soon as you want to move to useful, common tree-structures, you have...

The consensus layer provides risk takers with certainty about time ordering and validity of transactions and state. To achieve this in open, mostly untrusted environments, different consensus algorithms are used:...