In the Beginning Was the Command Line

The author argues that Microsoft's dominance in the operating system market is unsustainable and that the company's focus on proprietary operating systems is a relic of the past, as free and open-source operating systems like Linux are becoming increasingly popular. The author also suggests that Microsoft's attempts to integrate new features into its operating systems, such as web browsers, ...

The Linux Kernel Module Programming Guide

https://sysprog21.github.io/lkmpg/assets/cover-with-names.png
The Linux Kernel Module Programming Guide provides an introduction to writing kernel modules, including creating, compiling, and loading modules, as well as handling errors and debugging. The guide covers topics such as module initialization and cleanup, command-line argument passing, and system calls, and provides examples of how to write kernel modules to perform various tasks.

Windows recovery environment and bootable USB creator in 200kb

https://raw.githubusercontent.com/joshuacline/documentation/main/windick/png/01.png
Windows Deployment Image Customization Kit. Contribute to joshuacline/windick development by creating an account on GitHub.

Paper cuttings made by 17th-century schoolgirls discovered beneath floorboards

https://th-thumbnailer.cdn-si-edu.com/OYhXEqZVQ4jfAhDwCqxM2lt8KkY=/1000x750/filters:no_upscale():focal(3025x2045:3026x2046)/https://tf-cmsv2-smithsonianmag-media.s3.amazonaws.com/filer_public/cc/4a/cc4a033a-02c5-43cb-bfe7-92457f64dcf9/1_credit_national_trust_images-james_dobson.jpg
Girls at a 17th-century London boarding school learned paper cutting, a skill described in domestic manuals, and some of their creations survived for 350 years beneath the floorboards of Sutton House. The paper cuttings, featuring personal touches, will be publicly displayed for the first time at Sutton House in London from July 19 to December.

Reverse-engineering my speakers' API to get reasonable volume control

https://jamesbvaughan.com/images/jamesbvaughan.jpg
The user upgraded to new powered speakers with streaming service integrations, but found the volume range too loud and difficult to adjust precisely. They built a custom volume knob using a web API and a small server to control the volume within their preferred range.

Mastering Ruby Code Navigation: Ruby LSP Enhancements in the First Half of 2024

https://railsatscale.com/2024-07-18-mastering-ruby-code-navigation-major-enhancements-in-ruby-lsp-2024/a2f9e900af34594777a022302a1f2011b1bad7d5.png
Ruby LSP has seen significant enhancements in code navigation, particularly in singleton methods, local variables, and inheritance, making it easier for developers to navigate and understand Ruby code. Experimental features like the ancestors hierarchy request and guessed types are also being developed to further improve code navigation and completion.

Linux Network Performance Ultimate Guide

http://web.archive.org/web/20170905131225if_/https://wiki.linuxfoundation.org/images/1/1c/Network_data_flow_through_kernel.png
The text discusses various aspects of network performance tuning, including packet reception and transmission, interrupt handling, and load balancing. It covers topics such as NIC ring buffer, hard interrupt, soft interrupt, NAPI, RSS, RPS, and aRFS, as well as advanced topics like DPDK, PF_RING, and eBPF, and their applications in high-performance networking.

Twenty (YC S23) Is Hiring a Software Engineer in Paris

https://bookface-images.s3.amazonaws.com/logos/0e510b2de63076f281f71001d8d6776475badec6.png
The company Twenty is seeking a full-stack engineer with 5+ years of experience to join their team in Paris, France, with a salary range of €75k + 0.25% equity and benefits. The ideal candidate will have expertise in either frontend or backend development, a passion for Open Source, and an entrepreneurial mindset to work on building an open platform for CRM solutions.

Introduction to Machine Learning Interviews Book

The book provides an overview of the machine learning interview process, including types of roles, required skills, and common questions, as well as over 200 knowledge questions to test understanding of machine learning concepts. The book aims to help candidates prepare for machine learning interviews and identify areas for improvement, while also providing resources to strengthen knowledge ...

Zen 5's 2-ahead branch predictor: how a 30 year old idea allows for new tricks

https://i0.wp.com/chipsandcheese.com/wp-content/uploads/2024/07/image-5-1.jpg?resize=688%2C330&ssl=1
AMD's Zen 5 architecture features a new 2-Ahead Branch Predictor, which allows the processor to predict branch instructions more accurately and efficiently, enabling better performance and reduced power consumption. The 2-Ahead Branch Predictor is a major shift for the Zen family of CPU architectures, providing new branch prediction capabilities that will benefit future developments of the Zen core.

Bayesian Statistics: The three cultures

The user discusses different approaches to Bayesian inference, including subjective, objective, and pragmatic Bayes, and argues that the choice of prior is no more or less subjective than the choice of likelihood. They also highlight the distinction between modeling a generative process explicitly and using a flexible model, and wonder if Andrew Gelman considers decision forests and neural ...

Better Firmware with LLVM/Clang

https://interrupt.memfault.com/img/llvm/example_llvm_scanbuild_report.png
The article discusses the benefits of using the LLVM/Clang compiler toolchain for embedded systems development, including its ability to perform static analysis and catch bugs such as memory leaks and mutex deadlocks at compile-time. The article provides a step-by-step guide on how to update a GCC-based project to compile with Clang, including configuring the build system, enabling compiler ...

The New Internet

https://tailscale.com/api/og-image?title=The%20New%20Internet
Avery Pennarun, CEO of Tailscale, discusses the company's vision for a new internet that is decentralized, secure, and easy to use, and how it can enable a new era of innovation and productivity. He argues that the current internet is centralized and complex, and that Tailscale's technology can help to simplify and democratize connectivity, making it possible for anyone to build and use ...

Why does the chromaticity diagram look like that?

https://static.jlongster.com/20240103/CIE1931xy_blank.svg
The author explores the concept of color theory, specifically the CIE 1931 color space, and how it is used to represent colors in a device-independent way. The author also delves into the chromaticity diagram, which is a 2D representation of the colors that can be perceived by the human eye, and how it is derived from the XYZ color matching functions that were experimentally determined by ...

How to Preserve Physical Photos

https://ente.io/static/54c26600dcbeceb0cd0139700a70502c/c1d72/revisiting-family-photos.png
Preserving physical family photos is crucial to keeping memories safe for future generations, and proper storage, digitization, and display can help ensure their longevity. Ente offers expertise in digital preservation, but also acknowledges the importance of physical photos and provides guidance on how to care for and protect them.

Monumental proof settles geometric Langlands conjecture

https://d2r55xnwy6nx47.cloudfront.net/uploads/2024/07/GeometricLanglands-crNanCao-Lede-scaled.webp
Mathematicians have finally proved the geometric Langlands conjecture, a key component of the Langlands program, after decades of effort. The proof, which involves over 800 pages of work, settles the conjecture in the geometric column of the Rosetta stone and is expected to have far-reaching implications for number theory and other areas of mathematics.

TOTP tokens on my wrist with the smartest dumb watch

https://blog.singleton.io/static/imgs-dumbwatch/watch.png
The user replaced the logic board of their Casio F-91W watch with a programmable ARM Cortex M0+ board from Sensor Watch, allowing them to add custom watchfaces and features. They created a watchface that generates time-based one-time passwords (TOTP) for two-factor authentication and a ratemeter watchface for tracking rowing stroke rate or cadence.

Crooks Bypassed Google's Email Verification to Create Workspace Accounts, Acces

https://krebsonsecurity.com/wp-content/uploads/2024/07/signinwithgoogle.png
Google fixed a weakness that allowed attackers to bypass email verification and create malicious Workspace accounts, which could be used to impersonate domain holders at third-party services. The vulnerability was fixed within 72 hours and additional detection was added to prevent similar attacks, with no evidence of abuse on Google services.

How large language models will disrupt data management [pdf]

Large Language Models (LLMs) are revolutionizing data management by enabling users to interact with data using natural language, but they also introduce new challenges such as ensuring the quality of generated output and addressing ethical and legal concerns. The paper discusses the potential impact of LLMs on data management, including both worst-case and best-case scenarios, and highlights ...

Taking a Radio Camping

https://ewpratten.com/images/posts/camping-radio/spkr-wire-efhw-lengths.png
I built a HF antenna for a camping trip, using 24ft lamp wire and paracord insulators, and tested it with my radio gear, achieving good results and making several contacts. The antenna setup, which wrapped around the campsite, allowed me to operate FT4, FT8, and CW modes and set a new distance record, with excellent signal reports.

Driving Compilers

The user learned programming in C and C++ through various books, but found the process of turning programs into executable files to be slow and unpleasant due to lack of literature on the topic. This series aims to fill that gap by explaining the core concepts of creating an executable, using bintools and driver verbose mode, and providing a mental map for readers to explore beyond the ...

Repulsive Shells [video]

Courts Close the Loophole Letting the Feds Search Your Phone at the Border

https://d2eehagpk5cl65.cloudfront.net/img/c800x450-w800-q80/uploads/2024/07/ibpremiumthree310514-800x450.jpg
A US judge ruled that cellphone searches at the border require both probable cause and a warrant, citing the heavy privacy impact of reviewing a person's phone data. The ruling is a victory for journalists and civil libertarians, who argued that warrantless phone searches pose a grave threat to the Fourth Amendment right to privacy and First Amendment freedoms.

A simple procedural animation technique [video]

Seam Carving (2018)

https://andrewdcampbell.github.io/images/blog/seam-carving/castle.jpg
Seam carving is an algorithm for content-aware image resizing that removes or inserts seams to reduce or extend image dimensions, while preserving important regions. The algorithm uses an energy function to determine which pixels to remove, and can be refined with forward energy to produce better results.

IRS collects milestone $1B in back taxes from high-wealth taxpayers

https://dims.apnews.com/dims4/default/9eb65ce/2147483647/strip/true/crop/5000x3331+0+1/resize/599x399!/quality/90/?url=https%3A%2F%2Fassets.apnews.com%2F%5B9%2F4%2C%2F%20-113%2C%20-118%2C%2097%2C%2080%2C%20-32%2C%20-113%2C%20-88%2C%20-82%2C%2012%2C%20-26%2C%20124%2C%2071%2C%20-17%2C%20-82%2C%20-15%2C%209%2C%20111%2C%20108%2C%2062%2C%2059%2C%20-4%2C%2058%2C%20-45%2C%20-6%2C%2094%2C%20118%2C%2073%5D%2F678f860bad4b449c8c9f097c1bcc1247
The IRS has collected $1 billion in back taxes from high-wealth individuals, a milestone aimed at showcasing its efforts and potentially gaining public support amid concerns over future budget cuts. The agency is focusing on taxpayers with over $1 million in income and $250,000 in recognized tax debt, and is also targeting improper deductions and delinquent millionaires.

Bril: An Intermediate Language for Teaching Compilers

https://www.cs.cornell.edu/~asampson/media/bril/ecosystem.svg
Bril is a custom-designed intermediate language for teaching compilers, prioritizing ease of use, flexibility, and simplicity over traditional compiler engineering goals. It is a JSON-based, typed, ANF language that allows students to write and share code in a variety of programming languages, with a focus on hands-on implementation and collaboration.

Apex Surplus – A movie industry props and parts source

https://d1muf25xaso8hp.cloudfront.net/https%3A%2F%2F0e88d9c95c80a4a8be6847bb904b8b08.cdn.bubble.io%2Ff1718649553171x629714445261410300%2F20201130_DRN_0007.png?w=1536&h=1151&auto=compress&dpr=1&fit=max
Apex has been a leading non-ferrous scrap metal recycler and liquidator in LA County since 1958, offering sustainable solutions and affordable products. They specialize in aviation surplus, consumer industrial goods, and set decor/prop rentals, with a vast inventory accumulated over 60 years.

Show HN: Patchwork – Open-source framework to automate development gruntwork

https://repository-images.githubusercontent.com/782544882/a9743f35-5e1c-43ed-a0e0-536322056d38
Patchwork is a self-hosted CLI agent that automates development tasks using LLMs, with customizable prompts and patchflows for tasks like PR reviews, code fixing, and documentation. It comes with a set of predefined patchflows and allows users to create their own, with options for overriding default attributes and using custom prompt templates.

Counting bytes faster than you'd think possible

The user describes their solution to a HighLoad challenge, counting uint8s in a 250MB stream of bytes, and shares a surprising memory read pattern that achieves up to 30% higher transfer rates on fully memory-bound workloads. The pattern involves interleaving the processing of successive 4K pages to utilize the "Streamer" hardware prefetcher, resulting in a 15% improvement in score on HighLoad.