TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Infinite loops and doomed machines

38 pointsby r4umover 6 years ago

2 comments

jpitzover 6 years ago
&quot;The system should not allow a loop to be introduced. Obviously. But, it happened, and it&#x27;ll happen again given enough time, so what else?&quot;<p>The algorithm to detect a cycle is pretty simple. Why not prevent them?<p><a href="https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Cycle_detection" rel="nofollow">https:&#x2F;&#x2F;en.m.wikipedia.org&#x2F;wiki&#x2F;Cycle_detection</a>
评论 #19173734 未加载
评论 #19173128 未加载
mntmossover 6 years ago
On a physical level, unbounded deadlines and unlimited resource constraints don&#x27;t exist, so I&#x27;ve learned to distrust anything that assumes &quot;it scales forever&quot;.<p>It&#x27;s just a lot simpler to plan a static capacity target for each system resource, test and enforce around it, then review it when it falls over. Otherwise you get scenarios like this one, where the bug permeates the whole system and you get &quot;dead allocations&quot; that float in the ethereal void of the system&#x27;s plumbing, where they are hardest to trace. Leaks can happen in all sorts of environments as soon as you start putting in some layers of indirection, whether it&#x27;s UI listeners, memory allocations, processes, or whole computers in a network. The indirection is usually done with the intent of optimizing a near-term development goal, but it burdens every future goal with a thing to design for or design around.
评论 #19180780 未加载