Hacker Newsnew | past | comments | ask | show | jobs | submit | jasonmc's commentslogin

The Transit app is pretty close to what you want; I use it all the time. It includes live times on lines that support it. https://play.google.com/store/apps/details?id=com.thetransit...


I second every one of those Manhattan shops. Everyman is usually outstanding. Also recommend Gimme coffee.

In Brooklyn there's a few more gems: Budin, Strangeways, Parlor.


Gary's guide is probably the best source of tech events in NYC (apart from meetup). I used to go to quite a few of the events here before I got my current programming job.


It is possible to perform a MITM attack on HTTPS when you can install any certificates you want in the web browser.


"You realize that Java requires a nontrivial bytecode verifier too, right? IIRC the bytecode verifier, and certainly the compiler, require abstract interpretation to convert the stack-oriented bytecode to a virtual register-based one."

It seems like you are talking about Dalvik VM (Android). Java class files (stack bytecode) are actually converted to Dakvik's register bytecode ahead of time. (Before installation on the mobile device.) I'm unsure if Dalvik bytecode is verified or not.


No, I'm talking about the verifier [1]. In particular: "There are no operand stack overflows or underflows." That requires abstract interpretation.

And every performant Java interpreter is required to convert the stack machine to vregs in order to perform register allocation. That requires abstract interpretation too.

[1]: http://java.sun.com/docs/white/langenv/Security.doc3.html


Sure, but I'd be willing to bet that performance impact of the the verifier is insignificant for all but the most trivial of programs.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: