Difference between revisions of "Silmaril"

From Predictive Chemistry
Jump to: navigation, search
m
Line 16: Line 16:
 
<source lang="bash">
 
<source lang="bash">
 
gpg --gen-key # just create an RSA signing key with 2048 bits
 
gpg --gen-key # just create an RSA signing key with 2048 bits
gpg --export --armor your.email@org.edu >key.asc
+
gpg --export --armor your.email@org.edu >pubkey.asc
gpg --export-secret-keys --armor your.email@org.edu >key-sec.asc
+
gpg --export-secret-keys --armor your.email@org.edu >privkey.asc
 
</source>
 
</source>
 
More details on the client/server code are [[HowTo:PGP|here]]. Send your public key to me via email, so that I can sign your key to allow access. Once this is done, you can run the sil client using:
 
More details on the client/server code are [[HowTo:PGP|here]]. Send your public key to me via email, so that I can sign your key to allow access. Once this is done, you can run the sil client using:

Revision as of 15:42, 21 October 2014

The Silmaril programming language is built from the ground up for bleeding edge HPC. It has the following, fully automatic, killer features:

  • Git-like source code versioning
  • Cryptographically secure, distributed filesystem storage
  • First-class objects
    • functions
    • types
    • modules (aka. tables / record types / directories / structs / ML "Functors")
    • parsing constructs (for extensible case analysis)
  • Extensible primitive operations (JIT C-compilation)
  • Extensible binary object types (i.e. opaque pointers)

This documentation explains how to get up and running with the latest distribution.

To interact with the server, you'll need a gpg key. The process for creating one is easy: <source lang="bash"> gpg --gen-key # just create an RSA signing key with 2048 bits gpg --export --armor your.email@org.edu >pubkey.asc gpg --export-secret-keys --armor your.email@org.edu >privkey.asc </source> More details on the client/server code are here. Send your public key to me via email, so that I can sign your key to allow access. Once this is done, you can run the sil client using:

sil -a tcp\!rcslurm.usf.edu\!5050 -p pubkey.asc privkey.asc

(the backslashes are for bash's benefit) where pubkey and privkey are the ascii-armored, exported keys you created above. You can now read all saved objects and create your own commits.

You can get started by loading the standard library (Stdlib) and following along with the tutorial.