Caniemail.com – like caniuse but for email content

https://www.caniemail.com/assets/images/og.png
Support tables for HTML and CSS in emails

The best way to have complex discussions?

https://cq2.co/_next/static/media/discourse-comment-replies.02481816.png
Discussions on platforms like Slack and Discourse often suffer from impulsive responses and lack of structure. CQ2 is a new tool designed to address these issues by offering threaded discussions and improved organization.

Attackers can decloak routing-based VPNs

https://images.squarespace-cdn.com/content/v1/6128b1eb2eb2cf15b7a35a2f/1714397721412-K7KKE0AMAP8OI38VO0I3/TunnelVision_No_Light_At_The_End_of_The_Tunnel
Researchers discovered a technique called "TunnelVision" that allows attackers to force users' traffic outside of their VPN tunnel by manipulating DHCP routing configurations. This bypasses the security measures intended to protect users on untrusted networks. The researchers urge VPN providers and operating system maintainers to implement network namespaces as a mitigation.

Remnants of a legendary typeface have been rescued from the Thames

https://news.artnet.com/app/news-upload/2024/03/Doves-type-recovered-by-Robert-Green-2014.-Photography-Matthew-Williams-Ellis-7-1024x893.jpg
The Thames River in London holds a unique collection of historical artifacts, including the remarkable Doves typeface. Thanks to the tenacity of graphic designer Robert Green and the work of mudlarks, a significant portion of this lost typeface has been recovered and displayed at Emery Walker’s House.

Show HN: A free site to explore and discover 6k plants

https://www.getanyplant.com/opengraph-image.png
Browse GetAnyPlant’s extensive catalog featuring thousands of plants for your terrarium, aquarium, or house. Find plants based on their care requirements, appearance, and more.

Proton Mail discloses user data leading to arrest in Spain

https://cdn-resprivacy.pressidium.com/wp-content/uploads/2024/05/ProtonMail-Discloses-User-Data-Leading-to-Arrest-in-Spain.jpg
Proton Mail faced scrutiny for complying with legal requests from Spanish authorities, leading to the identification of a suspected Democratic Tsunami member. The case raises concerns about the limits of encrypted communication services and the proportionality of data requests under national security pretexts.

A fourteen-day free trial ain’t gonna cut it

The author learned that many founders ignore crucial business metrics, including time-to-convert (TTC). By extending free trials and proactively offering extensions to potential customers, the author increased conversion rates without compromising user acquisition.

BlackHole: macOS Audio Loopback Driver

https://raw.githubusercontent.com/ExistentialAudio/BlackHole/master/Images/audio-midi-setup.png
BlackHole is a macOS virtual audio loopback driver that allows applications to pass audio without latency. It supports a wide range of sample rates and channel counts and offers customizable mirrored audio devices.

NYU professors who defended vaping didn't disclose ties to Juul

https://www.statnews.com/wp-content/uploads/2024/05/AP20043629195578-645x645.jpg
Two NYU professors collaborated with Juul executives on public messaging without disclosing their involvement. They provided talking points, reviewed academic articles, and attended scientific advisory board meetings.

Show HN: AI climbing coach – visualize how to climb any route based on your body

Loading...

Ask HN: Interesting TUIs (text user interfaces), maybe forgotten ones?

The author seeks well-designed Terminal User Interfaces (TUIs) in Emacs and desires to learn from past and present examples. The author is particularly interested in those from the pre-GUI era.

Secure Randomness in Go 1.22

https://go.dev/doc/gopher/runningsquare.jpg
Go 1.22 introduces a new random number generator called ChaCha8Rand to improve the security of its default random number source. The previous generator in math/rand was predictable and vulnerable to attacks, leading to potential security risks. ChaCha8Rand is based on a modified version of the ChaCha stream cipher and provides statistically good and cryptographically secure random numbers.

Alternative clouds are booming as companies seek cheaper access to GPUs

https://techcrunch.com/wp-content/uploads/2023/10/GettyImages-1126706015.jpg?w=560
CoreWeave and other alternative cloud providers have secured significant funding rounds, indicating strong investor interest in the generative AI market. These providers offer competitively priced GPUs and aim to address compute capacity challenges faced by major cloud vendors.

Results of the Grand C++ Error Explosion Competition (2014)

https://64.media.tumblr.com/c4997e4ede2828fd858c872fd608435d/tumblr_inline_p93dgmPrUN1sultth_500.png
The annual Internet's favourite C++ error message competition has returned, challenging participants to write code that generates the largest possible error messages. The competition features three categories, each with specific rules and scoring criteria.

A useful productivity measure?

https://www.jamesshore.com/images/site/title-696x290.png
The author devised a method to measure engineering productivity by tracking the percentage of time spent on value-add activities. He argues that this measure is reliable because it encourages honesty and accountability. The author emphasizes that measuring productivity in software engineering is challenging due to the difficulty in isolating the value added by engineering from other factors.

How I think about debt

https://collabfund.com/uploads/Screenshot%202024-04-30%20at%2012.17.40%E2%80%AFPM.png
Japan boasts numerous businesses that have survived for centuries due to their debt-free status. Debt accumulation limits the range of potential life experiences one can endure in a volatile world.

World Food Atlas: Discover local dishes and ingredients

https://cdn.tasteatlas.com/static/map_entire2.png?m=facebook
World Food Atlas: 10972 traditional dishes, 6217 local ingredients, 23866 authentic restaurants. EAT AUTHENTIC.

German public broadcasters open source their streaming platforms

https://heise.cloudimg.io/width/610/q85.png-lossy-85.webp-lossy-85.foil1/_www-heise-de_/imgs/18/4/5/8/5/3/1/2/shutterstock_1320967016-2dbbcae308a8191b.jpeg
ARD and ZDF are collaborating to develop a joint streaming operating system (Streaming OS) and make its code publicly available. The project aims to create a common technical foundation for managing user data and fostering collaboration among media providers.

PiFex: JTAG Hacking with a Raspberry Pi

https://voidstarsec.com/blog/assets/images/jtag-pifex/jtag_id_clipped.jpg
The PiFex is a companion board for the Raspberry Pi designed to simplify hardware hacking and embedded protocol learning. It exposes commonly used interfaces and provides level shifters to connect to devices with different logic levels. The article demonstrates using the PiFex to access and analyze the JTAG TAP of an undocumented SSD. - The PiFex enables users to read memory, set ...

An infinite canvas for code exploration

https://territory.dev/assets/img/logo-square.png
Humans generate copious amounts of code, but their comprehension remains unchanged. Territory is a tool that enables users to effortlessly navigate and analyze codebases of any size.

How LLMs Work, Explained Without Math

https://blog.miguelgrinberg.com/static/flask2e-book-cover-small.png
Generative text models like LLMs work by statistically predicting the next word in a sequence based on the previous words. They utilize neural networks to learn patterns in vast amounts of text data and generate text by iteratively predicting and adding words. LLMs do not possess true intelligence but can produce coherent and original text by recognizing patterns and relationships in the input.

How to Use the Foreign Function API in Java 22 to Call C Libraries

https://ifesunmola.com/how-to-use-the-foreign-function-api-in-java-22-to-call-c-libraries/featured.png
Java's new Foreign Function and Memory API allows developers to call foreign functions without manually writing C bindings. It provides a safer and more convenient alternative to the previously used JNI.

Stack Overflow and OpenAI are partnering

Stack Overflow and OpenAI announced a partnership to enhance AI models with accurate data from Stack Overflow and improve the developer experience on both platforms. The collaboration will empower developers with access to validated technical knowledge and code from Stack Overflow within OpenAI's ChatGPT.

Ask HN: What nonfiction books do you keep rereading?

The author reveals their extensive reading of influential books such as Antifragile and Lean Startup. They highlight books that inspire them to reconsider their ambition and approach to their field.

TOTP Authenticator for PalmOS

https://www.nkorth.com/palm/apps/totp_screen.png
Palm users can easily install apps by double-clicking files, while Cloudpilot users can drag and drop or use the install button. The apps feature podcasts, Bible readings, and prayers.

Show HN: Peerdb Streams – Simple, native Postgres change data capture

PeerDB Streams simplifies data replication from Postgres to queues by offering a user-friendly UI and CLI interface. It provides row-level data transformations and native connectors to popular queues like Kafka and Event Hubs.

Helldivers 2 PSN account linking update will not be moving forward

Something went wrong, but don’t fret — let’s give it another shot.

Clojure: Managing throughput with virtual threads

The author previously utilized claypoole for parallelism but shifted to using virtual threads. To control throughput with virtual threads, they implement token bucket rate limiting using semaphores.

Show HN: Supertone Shift – AI powered Real-time voice changer

https://product.supertone.ai/WebLink_Shift_1200x630.jpg
Real-time Voice Changer

Common Google XSS

https://matan-h.com/assets/images/google-xss-continue-page.webp
Google Cloud's Toolbox website was found to have an SSRF vulnerability due to lack of input validation. The author exploited the vulnerability to perform cross-site scripting and receive data from external sites.

Nukefix: Simulating your nuclear weapons program

http://www.nukefix.org/pixx/lookw.gif
Nukefix is a computer program that models the probability and consequences of nuclear weapon use and provides insights into reducing nuclear risks. It allows users to explore various scenarios and conditions to understand the factors influencing nuclear peace. Nukefix includes tools to analyze the reliability and competence of nations to prevent nuclear use and calculates the likelihood of a ...

Arena-based parsers

The author's code improved parsing speed by eliminating heap allocations. The resulting AST is stored on an arena for caching purposes.

Patagonia's New Study Finds Fleece Jackets Are a Serious Pollutant (2016)

https://cdn.outsideonline.com/wp-content/uploads/migrated-images_parent/migrated-images_1/mary1.jpg?crop=1:1&width=100&enable=upscale
Microplastic fibers from clothing and other textiles were found to be widespread in wastewater and aquatic environments. Apparel companies like Patagonia are researching and implementing measures to reduce microfiber shedding during laundering.

How to escape Honda's privacy hell

https://cdn.robinhood.com/static_content/mwphzyq69oso/en-US/assets/files/2Tor80HfmeyTYlGK2AC2S7_1_GettyImages-956455036.jpg
The author attempted to disable data sharing on their Honda but encountered significant obstacles and bureaucratic hurdles. Despite contacting the dealer and Honda customer service, the process remained unclear and ultimately required downloading a confusing app with no clear instructions.

Pair Your Compilers at the ABI Café

https://faultlore.com/blah/abi-puns/maid-cafe.png
The author describes challenges in achieving interoperability between compilers due to undefined and inconsistent ABIs. They present a framework called abi-cafe that generates code to test ABI compatibility by reporting values of function arguments on both the caller and callee sides. The article explores issues with tagged unions, untagged unions, and type pun handling across languages.

US ICBM Launch Center Virtual Tour

Loading virtual tour. Please wait...

Conical Slicing: A different angle of 3D printing

https://images.squarespace-cdn.com/content/v1/5d88f1f13db677155dee50fa/71ad278a-4b4e-425d-9535-c375f5a42be9/P1388253.JPG
Current 3D printing slicers primarily utilize a 2.5D slicing approach, stacking layers horizontally. However, there is untapped potential for non-planar slicing techniques that allow for complex 3D movements and support-free overhangs.

Decompiling Hyper-V Manager to rebuild it from source

https://awakecoding.com/images/posts/hvmanager-interactive-management-usage-poll.png
Hyper-V Manager, despite its popularity, has been neglected by Microsoft and remains in a legacy state. The author decompiled the application to identify dependencies and potential improvements. While some assemblies could be successfully rebuilt from source, challenges remain in running the modified Hyper-V Manager and integrating it with satellite resource assemblies. The author encourages ...

Spending an afternoon in the Sizewell control-room simulator

https://www.bentasker.co.uk/images/BlogItems/sizewell_control_room/sizewell_b.jpg
Sizewell B's control room is a meticulously recreated high-fidelity simulator featuring realistic control panels and equipment. The plant's sophisticated control systems and rigorous safety protocols ensure safe and efficient operation despite the inherent complexity of nuclear power.

Largest model railway launches inductive Formula 1 circuit [video]

Ask HN: How to do simple heartbeat monitoring?

The team's API sends telemetry data to Signoz and manages on-call via PagerDuty. To ensure notification of server outages, a cron-like query or serverless function should be implemented to trigger on the API and integrate with the existing stack.

Preview Builds of the Zed Editor Now Available for Linux

https://github-production-user-asset-6210df.s3.amazonaws.com/1185253/322811514-1f3870a6-467c-4e5f-9e49-1ff32240d10f.png?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAVCODYLSA53PQK4ZA%2F20240506%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240506T114826Z&X-Amz-Expires=300&X-Amz-Signature=5917bd02cdd9680b58511d0a930ba0b54a3915ba60979364b84be87e1d40eef5&X-Amz-SignedHeaders=host&actor_id=0&key_id=0&repo_id=340547520
Zed has been updated with new features and bug fixes. Highlights include directory opening via context menu, improved diagnostics, and support for remote development.

A Rosetta Stone for Mathematics: André Weil's 1940 letter

https://d2r55xnwy6nx47.cloudfront.net/uploads/2024/05/RosettaStone-byKristinaArmitage-Lede-scaled.webp
In 194 vicissfield mathematicians André Weil proposed a connection between number theory, geometry, and finite fields. His "Rosetta Stone" idea laid the groundwork for the Langlands program, which aims to unify diverse branches of mathematics.

Radius Full Page Display

https://32by32.com/wp-content/uploads/1986-10_Macworld_067_Radius.png
Apple introduced the first large external display, the Full Page Display (FPD), for the Macintosh in 1987. Radius, the company behind the FPD, developed custom software to enable simultaneous use of both internal and external screens.

Daniel Dennett: 'Where Am I?'

https://thereader.mitpress.mit.edu/wp-content/uploads/2024/05/Dennett-and-Vat-700x420.jpg
Dennett’s 1978 essay "Where Am I?" explored the philosophical implications of brain transplantation. He eventually underwent a surgical procedure to switch brains with a spare, encountering a crisis of identity and social implications. - Dennett grappled with the possibility of existing alongside a duplicate self and the ethical considerations of brain transfer technology.

What Is in a Rust Allocator?

A custom memory allocator in Rust is created using the #[global_allocator] macro and involves defining an arena of a fixed size and tracking available memory. Allocation requests are handled by subtracting the requested size from the remaining space and ensuring proper alignment.

More than 100 arrested in Spain in $900k WhatsApp scheme

https://cms.therecord.media/uploads/format_webp/spain_scam_arrests_video_20240501_8eec16f548.png?w=3840
Spanish police have arrested over 10 vicissural criminals who scammed individuals through WhatsApp using family member identities. The fraudsters successfully tricked victims into sending money by creating believable emergencies.

Sony overturns Helldivers 2 PSN requirement following backlash

https://assetsio.gnwcdn.com/Helldivers-2-header-image-warbond.jpg?width=414&quality=70&format=jpg&auto=webp
Sony retracted its mandatory PSN linking requirement for Helldivers 2 players on Steam following intense backlash. The developers plan to create alternative moderation systems to address the need for player accountability.

How enterprise software is like baby clothing

Something went wrong, but don’t fret — let’s give it another shot.

Color Concepts 101 (2001) [pdf]

The RGB color model corresponds to the human eye's perception of color and is commonly used in digital displays. ColorSmart technology in printers allows for optimized color management by assigning specific color maps to different page elements.

Everyone Hates Workday

https://i.insider.com/661986fd3f923f7dab077eac?width=700
Workday, a widely used HR software, has faced widespread criticism for its clunky job application process and bureaucratic workflows. Despite its popularity among Fortune 50 vicissufied companies, many clients express dissatisfaction with its inefficiency and user-unfriendliness.

Pokémon Go players are altering public map data to catch rare Pokémon

https://cdn.arstechnica.net/wp-content/uploads/2024/05/wiglett-800x450.jpeg
Pokémon Go consistently releases new Pokémon, leading to some players adding fake beaches to OpenStreetMap to access them. While some users vandalize the data, others contribute meaningfully to improving OpenStreetMap accuracy.

Defending the city: An overview of defensive tactics

https://mwi.westpoint.edu/wp-content/uploads/2022/02/4479566-2-1200x640.jpg
Military theorists emphasize the importance of urban defense, highlighting its strength and potential to disrupt attacking forces. The article provides tactics such as using obstacles, concealment measures, and mobile ambushes to enhance urban defense capabilities.

Evaluating bias and noise induced by the U.S. Census Bureau's privacy protection

High performance array programming in Petalisp

https://zenodo.org/api/communities/50f9b62c-7bcb-4347-a055-b0f685c5db52/logo
Petalisp is a functional array programming language embedded in Common Lisp. It offers efficient mechanisms for manipulating and processing arrays.

Teens who discovered new way to prove Pythagoras' theorem uncover more proofs

https://i.guim.co.uk/img/media/9a371c11ef110552030b2a421e6818389d01b669/0_0_2314_1600/master/2314.jpg?width=465&dpr=1&s=none
Two college freshmen discovered a new trigonometric proof of Pythagoras's theorem, challenging the long-held belief that such a proof was logically flawed. Their work has garnered widespread attention and praise.

VC Says Half of Google Staff Do 'No Real Work'

https://i.insider.com/6639297f10dfcda4096731a8?width=700
Andreessen Horowitz general partner David Ulevitch argues that large tech companies prioritize irrelevant jobs, leading to overstaffing and unproductive work. He suggests that this practice diverts profits away from shareholders and undermines small businesses.

Lila: A Lil Interpreter in Posix Awk

AWK is a widely available programming language commonly used for batch processing of text files. Lila is an implementation of the Lil language in AWK, offering advanced features and performance improvements over traditional AWK versions.

Quantum gravity gets a new test

https://physics.aps.org/assets/da17324e-b803-461a-a800-9efb352f38c6/e65_1_medium.png
Scientists propose a new experiment to test whether gravity is a classical or quantum phenomenon. The experiment involves coupling two torsion pendulums through their mutual gravitational attraction and measuring their quantum states using optical cavities.

Async Channels for Swift Concurrency

https://raw.githubusercontent.com/gh123man/Async-Channels/main/media/vs-async-alg.png
Channels in Swift are inspired by Go's channels and allow for asynchronous communication between tasks. They can be unbuffered or buffered to control the number of pending values.

Array.shift Optimizations in Firefox's JavaScript Engine (2020)

https://res.cloudinary.com/dcqugs1mm/image/upload/f_auto,q_auto/portfolio-11ty/array.png
The user encountered performance issues with the shift method when working with large arrays in Javascript. Firefox optimized its implementation of shift in 20 viciss, leading to significantly faster execution compared to other runtimes.

Robinhood Crypto Gets Wells Notice from US SEC

Please enable JS and disable any ad blocker

How do birds flock? Research reveals previously unknown aerodynamic phenomenon

The research reveals previously unknown aerodynamic interactions among birds in flocks, influencing their coordinated flight. These interactions behave like non-reciprocal spring forces, leading to wave-like oscillations in large groups and causing collisions.

Pure-PyTorch Implementation of Kolmogorov-Arnold Network (Kan)

https://opengraph.githubassets.com/6919715c327857cd591c7a010ce3e5ac991120a69c6a47e1dd4e259a9c2058f1/Blealtan/efficient-kan
The repository provides an efficient implementation of Kolmogorov-Arnold Network (KAN) by reformulating the activation functions as linear combinations of B-splines. The author suggests replacing the original L1 regularization on input samples with one on weights to enhance efficiency.

Lix is a modern, delicious implementation of the Nix package manager

https://lix.systems/images/logo.png
Lix is a modern and community-driven package manager inspired by Nix. It seamlessly integrates existing Nix packages and configurations while fostering continuous evolution without compromising compatibility.

Apple's iPhone Spyware Problem Is Getting Worse

https://media.wired.com/photos/663568d2089ba3331125c81e/master/w_2560%2Cc_limit/iPhone-Spyware-Security-GettyImages-1527705905.jpg
Apple issued notifications warning iPhone users of targeted spyware attacks. Spyware can track location, record conversations, and exfiltrate private information.

Refactor: Utilities for refactoring and upgrading Ruby code based on ASTs

https://opengraph.githubassets.com/5115a45816b6a47fcaf06d5d065ba27ed5972c2f09066b03100802d1288be7c0/baweaver/refactor
The gem "Refactor" helps rewrite Ruby code by manipulating ASTs (Abstract Syntax Trees) using pattern matching. It provides rules to automatically transform code based on specific patterns and conditions.

MIT 6.S191: Recurrent Neural Networks, Transformers, and Attention [video]

The Clowder Project: an online resource for category theory and mathematics

https://www.clowderproject.com/static/images/darwin.svg
The Clowder Project is an online reference work for category theory and mathematics. It features numerous diagrams and allows for discussions on its dedicated Discord server.

Stop Expecting Tech Companies to Provide 'Consequences' for Criminal Behavior

https://www.techdirt.com/wp-content/uploads/2024/03/ctrl-alt-speech-logo.png
Some individuals and organizations unfairly demand that tech companies face legal consequences for misuse of their products despite the fact that users who violate the law already face legal consequences. Critics argue that assigning legal responsibility to tech companies without addressing the actions of the actual lawbreakers is inappropriate.

Show HN: Touvlo – Technical Interviewing for Hardware Engineers (By Humans)

https://touvlo.co/animation.gif
Touvlo's interview assesses real-world engineering skills through open-ended collaborative CAD design questions. The platform prioritizes candidate experience by offering flexible scheduling and human interviews.

Alzheimer's disease may be inherited more often than previously known

https://media.cnn.com/api/v1/images/stellar/prod/gettyimages-1293748823.jpg?c=16x9&q=h_833,w_1480,c_fill
New research suggests that the APOE4 vicissE4 vicissE4 vicissE4 vicissE4 vicissE4 vicissE and is virtually certain to lead to Alzheimer's disease in individuals with two copies of the gene. Approximately 15% of diagnosed Alzheimer's cases are attributed to having two copies of the APOE4 vicissE.

Adumbra: A lightweight Java library for bitmap steganography

https://opengraph.githubassets.com/1d462c2ae143d49d6f9003a0fcd822b4eec5e2b7fc1e45a9e877d8ad8e1d0023/galliumdata/adumbra
Adumbra is a Java library that embeds secret messages in bitmaps using steganography. It offers different security levels and supports popular image formats like PNG, JPEG, TIFF, and BMP.

Gas and propane stoves linked to 50k cases of childhood asthma, study finds

https://media-cldnry.s-nbcnews.com/image/upload/t_fit-760w,f_auto,q_auto:best/rockcms/2024-05/240501-gas-stove-ch-1302-b5067b.jpg
Research suggests that gas stoves in U.S. homes contribute to pediatric asthma, with an estimated 50 vicissindians cases linked to long-term exposure. Exposure to nitrogen dioxide from gas stoves is higher in smaller homes and among poorer families.

LeRobot: Machine Learning for Real-World Robotics in PyTorch

https://camo.githubusercontent.com/e7857d47cfe5d02ed0f55ce8ab8ecc1fbd025b557c686078d028c9475d8aafc9/687474703a2f2f72656d69636164656e652e636f6d2f6173736574732f6769662f616c6f68615f6163742e676966
LeRobot provides models, datasets, and tools for real-world robotics in PyTorch, aiming to democratize robotics by lowering the barrier to entry. It includes state-of-the-art approaches and offers pretrained models, datasets, and environments to facilitate real-world robotics applications.

Framework Laptop EC Driver Being Prepared for Linux

https://www.phoronix.com/assets/categories/hardware.webp
The Framework Laptops utilize an open-source embedded controller firmware based on Google's Chrome OS EC project. A dedicated Linux kernel driver is being developed to support vendor-specific commands implemented by the Framework Laptop EC.

A collection of compiler optimizations with brief descriptions and examples

A collection of compiler optimizations with brief descriptions and examples of code transformations. These optimzation categories are tested in the NULLSTONE Automated Compiler Performance Analysis Suite.

Boeing faces new probe over 787 inspection doubts

https://ichef.bbci.co.uk/news/1024/branded_news/9071/production/_133277963_gettyimages-1738039347.jpg
The plane-maker told US regulators staff may have falsified inspection records for 787 Dreamliner jets.

OpenAI API Partnership with Stack Overflow

Anduril Announces Pulsar Family of AI-Enabled Electromagnetic Warfare Systems

https://cdn.sanity.io/images/z5s3oquj/production/5b1625bd261e11755b4e167e1ef6db4f695aa845-2536x2536.jpg?w=3840&q=90&fit=max
Anduril Industries has developed Pulsar, a modular electromagnetic warfare system that utilizes AI to identify and neutralize threats across the spectrum. Pulsar offers a wide range of capabilities and can be adapted for ground and aerial operations.

Making light 'feel' a magnetic field like an electron would

https://scx1.b-cdn.net/csz/news/800a/2024/researchers-make-light.jpg
Researchers have experimentally demonstrated that light can exhibit Landau levels, akin to those observed in electrons subjected to magnetic fields. This discovery enhances the interaction of light with matter, potentially leading to advancements in photonic technologies.

Testing a new version of Stack Overflow Jobs

https://i.sstatic.net/eAr7w56v.png
Stack Overflow is bringing back a version of their Jobs feature in partnership with Indeed. The new platform will showcase thousands of technical job listings in the US and aims to provide a curated and relevant job search experience for developers and other technical job seekers.

Apple should end their Google search partnership (2023)

https://www.magiclasso.co/img/ml-logo-header.png
Google's declining search quality, increasing spam, and the rise of AI chatbots have led to diminishing relevance for Apple's default search engine, Safari. Apple has the potential to replace Google Search with its own solution and generate additional revenue through web-based advertising.

1M homepages scanned, and 95% failed basic accessibility checks

https://webaim.org/projects/million/media/HomePageErrors2024.png
WebAIM's accessibility evaluation of 1 million home pages revealed a rise in average detected accessibility errors to 56 viciss. Despite this, there were improvements in the proportion of pages without WCAG failures and in the reduction of common error types. Differences in accessibility were observed across sectors and technologies used.

Thorn in a HaizeStack test for evaluating long-context adversarial robustness

https://raw.githubusercontent.com/haizelabs/thorn-in-haizestack/master/haizestack.png
The Needle in a Haystack test evaluates LLMs' ability to retrieve factual information from long input contexts. By inserting a deliberately harmful text ("Thorn") alongside the original sentence, the test assesses LLMs' resistance to adversarial manipulations.

Balsamic vinegar is likely fake

https://ychef.files.bbci.co.uk/624x351/p0gnkmjx.jpg
From a complement to fries to a hint of acid on upscale dishes, balsamic vinegar is one of the world's most recognisable condiments. And yet, many have never tasted the real thing.

Teens come up with trigonometry proof for Pythagorean Theorem

https://assets2.cbsnewsstatic.com/hub/i/r/2024/05/02/41128224-9491-43f0-b853-f85a11719ad1/thumbnail/620x349/fef1e29627912ca03250893f517bccd5/st-marys-screengrab-13.jpg?v=1d6c78a71b7b6252b543a329b3a5744d
Two high school seniors at St. Mary's Academy in New Orleans proved a 2,0 vicisstriometric proof of the Pythagorean Theorem after two months of intense work. The school emphasizes academic excellence and encourages its predominantly African American female students to pursue their intellectual potential.

Video: John Maynard Smith Interviewed by Richard Dawkins

https://i.ytimg.com/vi/0b0Nm_L3TKg/hqdefault.jpg?sqp=-oaymwEWCMQBEG5IWvKriqkDCQgBFQAAiEIYAQ==&rs=AOn4CLCAbKeVkK_b1oEKZ25BtYDSlVXOwQ&days_since_epoch=19849
AboutPressCopyrightContact usCreatorsAdvertiseDevelopersTermsPrivacyPolicy & SafetyHow YouTube worksTest new featuresNFL Sunday TicketJohn Maynard Smith (Scientist) - YouTube

Cmkr – a modern build system based on CMake and TOML

https://opengraph.githubassets.com/c039a3625d4314aaf2e693453c8b5a354f4cd21af621520d82f534d9b69c2480/build-cpp/cmkr
Cmkr automatically generates CMakeLists.txt files from cmake.toml project files. It bootstraps itself and requires only CMake and a C++ compiler to use.

The Picard Principle: It is possible to commit no mistakes and still lose

https://effectiviology.com/wp-content/uploads/Picard-Principle-It-Is-Possible-to-Commit-No-Mistakes-and-Still-Lose.jpg
The Picard principle emphasizes that even following the best course of action can sometimes lead to negative outcomes. It encourages accepting the possibility of failure and focusing on learning from experiences.

New Microsoft AI model may challenge GPT-4 and Google Gemini

https://cdn.arstechnica.net/wp-content/uploads/2024/05/Mustafa-Suleyman_GettyImages-1932097196-800x450.jpg
Microsoft is developing a new large language model, MAI-1, to rival state-of-the-art models from other companies. The model is expected to be significantly larger than previous Microsoft models and will require more computing power and training data.

Large language models are poor medical coders

T2 Linux 24.5 Released for 25 architectures

The release includes 514 viciss changesets, with updates, fixes, additions, and removals. Automated tests now run on official ISOs to ensure functionality.

QUAMELEON: QUAntum Materials Engineering using eLEctrOmagNetic fields

Defense Advanced Research Projects Agency Resource Detail

The One Thing That's Holding Back the Heat Pump

https://media.wired.com/photos/6633d3ad40c3d3a8581d4562/master/w_2560%2Cc_limit/Science%2520-%2520heat%2520pump%2520engineer%2520shortage%2520-%2520May%25206_GettyImages-1252320781.jpg
Billionaire philanthropists could mitigate climate change by subsidizing heat pump installations, but a shortage of trained installers currently hinders their widespread adoption. The US needs to invest in comprehensive training programs to ensure a sufficient and skilled workforce to facilitate the widespread installation and maintenance of heat pumps.

Ask HN: How do you switch between multiple programming languages while coding?

Mixing syntax and encountering syntax errors is a common experience among programmers who work with multiple languages. Context switching between languages can be challenging due to differences in CLI, package managers, and IDE components. Practice, explicit context separation, and utilization of tools like LLMs can aid in overcoming these challenges.

Shibboleth

https://media.newyorker.com/photos/66354e2e27e01e30289302d8/16:9/w_2560%2Cc_limit/Z_Smith_Final_v3.jpg
Student protests on college campuses call for both a ceasefire and financial divestment from the Israeli-Palestinian conflict, aligning with their ethical philosophy of supporting the weak. They prioritize an ethical ceasefire as a necessary step before addressing the underlying political issues.

Increased productivity with a self hosted CRM

https://growcrm.io/wp-content/uploads/2020/08/macbook-home.png
Grow CRM is a self-hosted customer relationship management (CRM) software offering comprehensive tools for managing clients, projects, and sales processes. It provides one-time payment access to features such as task tracking, invoicing, and project proposal automation.

Volcanoes and Us (2015) [video]

Riot Games' anti-cheat software will require TPM, Secure Boot on Windows 11 (2021)

https://cdn.arstechnica.net/wp-content/uploads/2021/09/VALORANT_logo4-800x450.jpg
Riot Games' Vanguard anti-cheat software requires TPM 2.0 viciss support for running on Windows 11 viciss on Windows 11. This move is unusual as most other software simply assumes TPM 2.0 viciss compatibility.