Hacker Newsnew | past | comments | ask | show | jobs | submit | krazykringle's commentslogin

Consider ‘sc’ - dates from 1981, still actively maintained.

https://github.com/n-t-roff/sc (active fork)

https://en.wikipedia.org/wiki/Sc_(spreadsheet_calculator)

https://manpages.ubuntu.com/manpages/resolute/en/man1/sc-im....

Installable on mac and unix as ‘sc-im’


Does it run a Linux? Will I be able to ssh to it?


With 512KB RAM and 16MB flash[1] I assume it's a microcontroller and doesn't run Linux.

[1] https://wyze.com/wyze-watch.html#pageDetails


Slightly off topic, but are there microcontrollers that run Linux?


One could argue that the difference between an MCU and an MPU is whether or not it can reasonably run Linux...


It's possible, but my impression is that no MMU makes it difficult. Here is an example [1] of Linux on a Cortex M4 (a very boring STM32F4XX)

[1] https://elinux.org/STM32


Linux required an MMU at inception[1] and currently requires an MMU. Instead you have μClinux[2] which although it is integrated with the mainline kernel since 2.x, it lacks some important features, like it has neither fork() nor autogrow stacks[3].

[1] https://www.cs.cmu.edu/~awb/linux.history.html

[2] https://en.wikipedia.org/wiki/ΜClinux

[3] https://www.eetimes.com/how-uclinux-provides-mmu-less-proces...


Would it matter, as long as you can build and flash it yourself ?


Plumbum (above) matches this need in Python. It overloads | to make pipes! It makes it relatively trivial to express shell idioms in Python.


Zerotier (mentioned below) is perfect for this!

To expand a little bit: it provides an (almost) zero-configuration way to set up a private 'layer 2' network that you can connect your home server to, and any other machines that you want to be able to connect to it or to each other. It handles NAT traversal completely transparently.

In practice, it means that if I have a (say) NFS server connected to a Zerotier network I control, I can connect to it transparently from anywhere from another machine on that network, no matter what NATs / firewalls either machine is behind, even if they change. Perfect for phones, roving laptops, etc. I've gone to a model where I do most of my development (over mosh/tmux) on my home machine, from wherever I happen to be.

No home firewall configuration needed at all.


+1 for Zerotier. I really like wireguard, but Zerotier is so much easier and quicker to set up from scratch. If wireguard had ACLs and ipam built-in, it probably would probably win me over.


Maybe because it's not open source, only free for personal use?


It's open source (https://github.com/zerotier) but not Free Software.


According to their pricing page,

> ZeroTier’s software is open source and free to use for most purposes including personal use, internal use within a business or academic institution, and evaluation for uses that require commercial licensing.

I was able to find this: https://github.com/zerotier/ZeroTierOne


That sentence is an contradiction, it's either open source or requires a commercial license, cannot be both.


I've long been confused about Wireguard getting all the attention over ZeroTier. ZT is so good at finding a communications path that I had to figure out how to block it from traversing one of my IPSec tunnels.


Does it need to suck the entire database into memory to answer a query?



JSON-patch might also serve: http://tools.ietf.org/html/rfc6902

Here's a Python implementation: https://github.com/stefankoegl/python-json-patch



From the site: 1L7LgaRtr3WSw5g1MaJQWj19T6RByssz41


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: