You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Another encoding of `Traverse` in terms of `mapAccumulate`
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Rough draft of v3 of Unison distributed programming APIs
Unison computations can hop between nodes, can fail, can be forked to execute asynchronously, and can be supervised:
-- Promote a pure value to `Remote`Remote.pure:∀ a . a ->Remote a
-- Sequencing of remote computationsRemote.bind :∀ a b . (a ->Remote b) ->Remote a ->Remote b
-- The current node where the computation is executing
map reduce on as many nodes as you want in 10 lines of Unison code
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
FS2: Functional Streams for Scala 0.9 Official Release Announcement
Hi all!
After a very lengthy period of development and testing, FS2 (formerly scalaz-stream) version 0.9 is finally out! Here's how to get it.
For this release, the library has undergone a major redesign. Check out the migration guide for more info, and also the shiny new user guide. Going forward, we expect the API of the library will be quite stable and hope it becomes one of the bedrock libraries of the Scala ecosystem. The 0.9 series has already seen production use as well as a huge amount of testing during the development process; we feel very good about recommending people upgrade.
Schooling on message authentication codes in ##crypto
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<pchiusano> Paul Chiusano hi, I have a question about stream ciphers - how do people usually go about adding tamper resistence? With a stream cipher used naively, the ciphertext could be truncated or otherwise tampered with, and this would not necessarily be detected, right? My first thought was to split plaintext into packets of some length and add a hash to each packet (seems like
3:40 PM R<Riastradh> Unknown pchiusano: Secret-key authenticators are also called message authentication codes, MACs. Typical examples are polynomial evaluation one-time authenticators such as Poly1305, and hash-based constructions such as HMAC, or prefix-MAC with modern `hash functions' like BLAKE2 and SHA-3.
Effectful stream type supporting constant time append and bind
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
These are some questions to give a sense of what you know about FP. This is more of a gauge of what you know, it's not necessarily expected that a single person will breeze through all questions. For each question, give your answer if you know it, say how long it took you, and say whether it was 'trivial', 'easy', 'medium', 'hard', or 'I don't know'. Give your answers in Haskell for the questions that involve code.
Please be honest, as the interviewer may do some spot checking with similar questions. It's not going to look good if you report a question as being 'trivial' but a similar question completely stumps you.
Here's a bit more guidance on how to use these labels: