00:00:00 --- log: started forth/16.10.20 00:01:48 What is weird is that to penetrate certain coding markets I need to interface with other people's code 00:02:05 which means there will always be new hurdless to jump over 00:09:07 --- join: true-grue (~true-grue@176.14.222.10) joined #forth 00:22:39 --- join: proteusguy (~proteusgu@183.89.208.20) joined #forth 00:22:40 --- mode: ChanServ set +v proteusguy 01:05:49 life built by hurdles you need to jump 01:05:55 that's how it works 01:25:10 --- quit: mark4 (Ping timeout: 252 seconds) 01:30:38 --- join: dys (~dys@x4d02b6a3.dyn.telefonica.de) joined #forth 01:49:22 --- quit: mnemnion (Remote host closed the connection) 01:50:38 --- join: Keshl___ (~Purple@24.115.181.94.res-cmts.gld.ptd.net) joined #forth 01:51:41 --- quit: Keshl__ (Read error: Connection reset by peer) 02:04:02 --- join: mnemnion (~mnemnion@2601:410:300:8d11:14eb:1c60:6a82:198f) joined #forth 02:24:00 --- quit: nighty (Quit: Disappears in a puff of smoke) 02:53:20 --- join: Indecipherable (~Howl@41.162.59.11) joined #forth 02:55:58 I am thinking maybe I should be a whitehat hacker 02:56:12 I don't even have to apply for some of the jobs I just have to report vulnerabilities 02:56:27 In a sense I can just write myself a check 02:58:01 --- quit: proteusguy (Quit: Leaving) 03:12:29 Just found that Sea Wolf II (1978) arcade game was written in Forth :) 03:22:49 --- join: nighty (~nighty@s229123.ppp.asahi-net.or.jp) joined #forth 03:55:23 --- quit: DGASAU (Ping timeout: 248 seconds) 04:16:38 --- quit: mnemnion (Remote host closed the connection) 05:12:00 --- quit: novavis (Ping timeout: 244 seconds) 05:43:02 --- join: novavis (~user@host43-3-dynamic.53-79-r.retail.telecomitalia.it) joined #forth 07:09:55 --- quit: novavis (Remote host closed the connection) 07:09:59 --- join: mnemnion (~mnemnion@2601:410:300:8d11:c9d4:57c2:4da0:8f7) joined #forth 07:14:10 --- quit: mnemnion (Ping timeout: 245 seconds) 07:16:33 --- join: mark4 (~mark4@99-164-75-34.lightspeed.rcsntx.sbcglobal.net) joined #forth 07:40:00 --- quit: mark4 (Ping timeout: 245 seconds) 08:16:56 --- join: neceve (~ncv@86.125.241.206) joined #forth 08:16:57 --- quit: neceve (Changing host) 08:16:57 --- join: neceve (~ncv@unaffiliated/neceve) joined #forth 08:39:42 --- join: mark4 (~mark4@99-164-75-34.lightspeed.rcsntx.sbcglobal.net) joined #forth 09:02:07 --- quit: X-Scale (Quit: HydraIRC -> http://www.hydrairc.com <- The alternative IRC client) 09:08:27 --- join: mnemnion (~mnemnion@2601:410:300:8d11:c487:6609:ee15:1f06) joined #forth 09:12:43 --- quit: mnemnion (Ping timeout: 256 seconds) 10:37:39 --- join: nal (~nal@adsl-64-237-237-52.prtc.net) joined #forth 10:48:24 --- quit: neceve (Quit: Konversation terminated!) 11:01:17 --- join: Zarutian (~zarutian@168-110-22-46.fiber.hringdu.is) joined #forth 11:14:59 --- quit: Indecipherable (Quit: http://i.imgur.com/rWAnqP3.jpg) 11:22:15 --- join: proteusguy (~proteusgu@180.183.140.191) joined #forth 11:22:15 --- mode: ChanServ set +v proteusguy 12:40:14 --- part: zy]x[yz left #forth 12:54:57 --- join: impomatic (~impomatic@host86-191-55-210.range86-191.btcentralplus.com) joined #forth 13:03:30 --- quit: nal (Ping timeout: 260 seconds) 13:10:53 --- join: nal (~nal@adsl-64-237-237-52.prtc.net) joined #forth 13:47:12 --- join: X-Scale (~ARM@2001:0:53aa:64c:0:fbf5:b176:2199) joined #forth 14:08:48 --- join: karswell (~user@83.208.208.46.dyn.plus.net) joined #forth 14:18:35 --- join: mnemnion (~mnemnion@c-68-34-69-223.hsd1.mi.comcast.net) joined #forth 14:21:16 --- quit: mnemnion (Remote host closed the connection) 15:04:07 --- join: vsg1990 (~vsg1990@pool-96-243-28-165.bflony.fios.verizon.net) joined #forth 15:04:27 --- quit: vsg1990 (Read error: Connection reset by peer) 15:05:03 --- join: vsg1990 (~vsg1990@pool-96-243-28-165.bflony.fios.verizon.net) joined #forth 15:21:46 --- join: mnemnion (~mnemnion@2601:410:300:8d11:c487:6609:ee15:1f06) joined #forth 15:26:20 --- join: ASau (~user@netbsd/developers/asau) joined #forth 15:27:05 --- quit: mnemnion (Ping timeout: 245 seconds) 16:10:49 --- quit: impomatic (Quit: http://corewar.co.uk) 16:22:30 --- quit: vsg1990 (Quit: Leaving) 16:24:10 --- join: mnemnion (~mnemnion@2601:410:300:8d11:c487:6609:ee15:1f06) joined #forth 16:28:20 --- quit: nighty (Remote host closed the connection) 16:29:03 --- quit: mnemnion (Ping timeout: 256 seconds) 16:29:30 --- quit: karswell (Read error: Connection reset by peer) 16:30:16 --- join: karswell` (~user@83.208.208.46.dyn.plus.net) joined #forth 16:31:46 --- quit: true-grue (Read error: Connection reset by peer) 16:48:05 Is it ever a good idea to use a variable stack effect? 16:52:16 --- quit: groovy2shoes (Quit: Leaving) 16:54:24 --- join: vsg1990 (~vsg1990@pool-96-243-28-165.bflony.fios.verizon.net) joined #forth 16:55:08 reepca: like the word ?KEY does? 16:56:12 I can't find that word in the gforth word index... 16:57:38 well it is in figForth and eForth iirc 16:58:27 it is like this ?KEY ( -- keynr T | F ) implementation-spefic-code ; 17:01:56 --- join: groovy2shoes (~groovy2sh@unaffiliated/groovebot) joined #forth 17:14:39 --- join: nighty (~nighty@d246113.ppp.asahi-net.or.jp) joined #forth 17:15:55 Well my specific problem is that I am writing some code to insert nodes into a linked list, but I only want the node to be created and inserted if a node with that key doesn't already exist. The problem is I want to be able to use that same code for nodes with different contents. I've considered deferring new-node, and I've also considered just having whatever uses it give a variable number of arguments to be put into the new node. I 17:15:56 think what I'm going to do though is to just have whatever uses it be able to just append contents to the node, since it'll be dictionary-allocated. 17:17:55 --- join: nighty-- (~nighty@d246113.ppp.asahi-net.or.jp) joined #forth 17:21:04 --- join: mykespb (~myke@213.141.133.133) joined #forth 17:26:35 --- join: saml_ (~saml@cpe-24-102-97-97.nyc.res.rr.com) joined #forth 18:21:28 --- join: neceve (~ncv@unaffiliated/neceve) joined #forth 18:25:39 --- join: mnemnion (~mnemnion@2601:410:300:8d11:c487:6609:ee15:1f06) joined #forth 18:28:30 reepca, let me know if you have any objections to me possibly screenshotting your comment here https://www.reddit.com/r/Forth/comments/587dfh/high_stack_finegrain_concurrency/d8ybgi0/ for my Forth day talk (if the approach works out for the gelFORTH HDL) 18:29:26 That's what I'm going to re-factor my gelFORTH HDL to look like: looks like Forth, but secretly parallel. No more arcane Boolean algebra look. 18:29:47 DUP makes two parameters parallel with an initially identical source. SWAP commutes the two continuing output paths. 18:30:17 go for it! 18:30:19 --- quit: mnemnion (Ping timeout: 256 seconds) 18:32:38 Great! It inspired my new direction. Thanks! 18:42:13 --- quit: rpcope (Ping timeout: 256 seconds) 18:58:33 --- join: mnemnion (~mnemnion@2601:410:300:8d11:c487:6609:ee15:1f06) joined #forth 19:13:38 --- join: rpcope (~rpcope@162.245.217.4) joined #forth 19:20:02 --- quit: mykespb (Quit: Leaving) 19:26:38 --- quit: groovy2shoes (Quit: Leaving) 19:26:42 I think I really want to make a botnet out of people's phones and have them press agree on a license that says I can do it. 19:29:28 --- quit: saml_ (Quit: Leaving) 19:29:41 John[Lisbeth]: an EULA that allows for botneting? I am not sure of the legalities there. Where I live EULAs have no meaning or enforcability but TOSes do. 19:31:35 Well first of all I could put things in the license to be better 19:31:40 for example I am not using it for domain hijacking 19:32:15 most people use botnets to get user's data. I will put in the license that if a user can find a pace where I am able to steal customer personal data I will pay them a whitehat hacker fee 19:32:33 All I really want is the compute and a little storage 19:33:34 I can advertise in the app "the way we pay for it is to have an ad and to use a tiny bit of processing power on your phone. We put it in the license that we are not allowed to steal your data and we'll even pay you if you can find a way to steal someone's data with our app" 19:33:35 oh, that. Just make an ad module for apps and you get the compute and little storage with out much fuss 19:34:11 ad pays for it but to use it as a botnet I have to cover my ass and make sure I am being lawful 19:34:12 John[Lisbeth]: say have you heard the term "agorics" or "agoric computing"? 19:34:17 no 19:34:46 because it looks like what you want to do is basically that 19:35:51 this http://www.cap-lore.com/Agorics/library.html might be of intrest to you then. 19:38:20 and with that I am off to bed 19:38:24 --- quit: Zarutian (Quit: Zarutian) 19:42:39 The way I see it I could make a botnet 19:43:07 I just say hey this is an app where you slow down your phone a tiny bit to pay for it. 19:43:20 And you don't do anything that could be considered malicious to the user. 19:47:56 ~ 19:54:43 --- quit: ASau (Quit: away.) 20:05:42 --- quit: vsg1990 (Quit: Leaving) 20:25:14 --- join: groovy2shoes (~groovy2sh@unaffiliated/groovebot) joined #forth 21:05:47 --- quit: neceve (Quit: Konversation terminated!) 21:54:50 --- quit: dys (Ping timeout: 250 seconds) 22:09:18 --- quit: karswell` (Read error: Connection reset by peer) 22:27:31 --- quit: nal (Quit: WeeChat 1.4) 23:02:21 --- quit: Keshl___ (Read error: Connection reset by peer) 23:03:12 --- join: Keshl___ (~Purple@24.115.181.94.res-cmts.gld.ptd.net) joined #forth 23:15:29 how many bites is 999999999999999999 23:15:37 *bytes 23:19:05 oh my word it defies logic 23:19:11 in a good way 23:35:48 --- join: Keshl (~Purple@24.115.181.94.res-cmts.gld.ptd.net) joined #forth 23:35:49 --- quit: Keshl___ (Read error: Connection reset by peer) 23:59:59 --- log: ended forth/16.10.20