Is My Blue Your Blue?

https://ismy.blue/card.png
Google detected unusual traffic from the user's computer network, possibly due to malicious software or automated requests. The user is asked to solve a CAPTCHA to continue using Google services, which will expire once the unusual traffic stops.

Greppability is an underrated code metric

https://morizbuesing.com/_astro/scott-blake-bGmx6NxEVAU-unsplash.U-9YLhUu_6GxiV.webp
When working on an unfamiliar codebase, it's essential to keep the code greppable by avoiding dynamic construction of table names, column names, and method names. This can be achieved by using consistent naming schemes and avoiding namespace nesting, making it easier to find specific code elements through searching.

EUCLEAK Side-Channel Attack on the YubiKey 5 Series

https://ninjalab.io/wp-content/uploads/2024/09/20240830_eucleak_illu_from_romain_light.jpg
A side-channel vulnerability was found in Infineon's ECDSA implementation, allowing attackers with physical access to extract the ECDSA secret key, impacting YubiKey 5 Series and other Infineon security microcontrollers. The vulnerability, which went unnoticed for 14 years, can be exploited to create a clone of the FIDO device, but a firmware update and a patch from Infineon have mitigated the issue.

The Engineering of Landfills

https://images.squarespace-cdn.com/content/55ac34e4e4b0170ef54be632/1725377350329-BAKCJ7WID123M1NYF4VG/Landfills+Thumbnail+2.jpg?format=1500w&content-type=image%2Fjpeg
The Puente Hills Landfill in California was one of the largest landfills in the country, accepting over 4 million tons of trash annually, and its closure in 2013 created a time capsule of waste management practices over 56 years. Landfills are complex systems that require careful engineering and management to minimize environmental impacts and ensure public health and safety.

Synchronizing Pong to music with constrained optimization

https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6b8f138e-464c-4dbe-ad6e-205a514faeeb_616x400.png
The user explores music visualizers, specifically a pong-inspired game where paddles dance to the beat, and uses constrained optimization to maximize screen utilization while respecting physics and the song's beat. The user formulates the problem as a linear programming problem, solves it using CVXPY, and animates the result to create a smooth and appealing visualization.

IPMI

The author is moving their enterprise cloud to a new location in New Mexico and is purchasing a new server, reflecting on the history and features of servers, including out-of-band management, IPMI, and Intel ME. The author discusses the differences between servers and clients, highlighting the unique features of servers such as multiple processor sockets, complex storage controllers, and ...

Steve Ballmer's incorrect binary search interview question

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiElRkalAf71qPuh9a1t0yhsoAO5ZPQ-mR3NpSBwwuYpdsbkASynXT_JOwyrOkzWUNJ1ZWGnArmU4tKHEQpsMVxe9s5h7qdXgZRaMprV8dV2X_0-dXG195Dsi7S3hnJknshVyiRIgKUXCRcy4RZcDv0tI_bWQd6OwzkdEfNavHTm8HV4NH4ZP4itg/w640-h250/bs-1.png
Steve Ballmer presents a puzzle question where he thinks of a number between 1 and 100, and the interviewer must guess it with each guess earning a decreasing amount of money. The expected value of the game is actually $0.20, not negative, as Ballmer initially claimed.

Why bother with argv[0]?

https://www.wietzebeukema.nl/assets/2024-09-03-windows-task-manager.png
The concept of argv[0] in command lines is flawed, allowing for manipulation and deception, which can lead to security issues and bypassing of detection logic. The operating system should be responsible for populating argv[0], rather than relying on the calling program, to prevent these issues and improve security.

Chromatone – Visual Music Language

Chromatone is an open-source project developing a visual music language, combining colors and notes to enhance music perception. The project offers a study, web-apps, and a community to learn and explore visual music, with a sticker shop and membership options.

Mondragon as the new city-state

https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ee071ad-b810-4c0c-ad57-940cc2830f6f_2464x1856.png
Mondragon Corporation, a network of cooperatives in the Basque Country, has created a successful model of democratic ownership and profit-sharing, where workers own and manage their companies, and profits are distributed fairly among employees. The corporation's success has led to a self-sustaining economy, with no unemployment, poverty, or inequality, and has inspired a new vision for a more ...

Mapping 20k ships that sank during WW II

https://cdn.arcgis.com/sharing/rest/content/items/41d4bd6029044afbb1b9ad805a4731d8/resources/FUQYFwdlM4j2OUyXeRvme.png?w=400
The Kinugawa Maru, a Japanese transport ship, sank in Iron Bottom Sound during the Battle of Guadalcanal in 1942, one of 50 ships destroyed in the battle. A dataset of over 14,500 mapped records of sunken ships from World War II, created by Paul Heersink, provides insights into the war's naval theater and has practical applications for environmental assessments and research.

Show HN: Repaint – a WebGL based website builder

https://s3.us-east-2.amazonaws.com/prod-repaint-public-site-files/d12a06e4-a523-417c-aa25-9494806295a7/0974a029-88e5-4953-bfa5-8c351bd2db51
Repaint is a design tool that allows users to create real websites with code, eliminating the need to duplicate work and learn multiple tools. It's designed for semi-technical users, including designers, developers, and founders, who want to create responsive websites without needing to be full-time web developers.

Diffusion Is Spectral Autoregression

https://sander.ai/images/plot_image_spectra.png
The author argues that diffusion models can be viewed as a form of approximate autoregression in the frequency domain, where the corruption process in diffusion models corresponds to a frequency decomposition of the input image, and the model's task is to predict the next higher frequency component given the preceding ones. This perspective provides a new understanding of why diffusion models ...

Show HN: Hestus – AI Copilot for CAD

https://framerusercontent.com/images/4WwCw4bLT2FbHTZktlvw9ftA.png
Our AI-powered CAD automates mundane tasks, speeding up design execution and freeing engineers to focus on creativity. Currently supporting Autodesk Fusion 360, with plans to expand to other CAD platforms.

Microsoft's 'Recall' feature can't be uninstalled after all

https://mashable.com/images/mashable-games-mobile.png
Microsoft's "Recall" feature, which takes constant screenshots of user behavior, cannot be uninstalled on Windows 11 despite a recent update suggesting otherwise. The feature, which was initially set to launch in June, will now be released in October to Windows Insiders testers after being delayed to address security concerns.

Llms.txt

https://llmstxt.org/logo.png
The proposal suggests adding a /llms.txt file to websites to provide concise information in a structured format for large language models, which can be used to enhance development environments, provide research information, and more. The file should follow a specific format, including a project name, summary, and links to further information, and can be used in various domains such as ...

How the Higgs field gives mass to elementary particles

https://www.quantamagazine.org/wp-content/uploads/2024/08/Higgs_Explainer-crMarkBelan-Desktop-v1-01.svg
The Higgs field is not a substance that slows down particles to give them mass, but rather a field that creates a restoring effect on other fields, causing their particles to vibrate at higher frequencies and acquire mass. This concept is supported by the Standard Model of particle physics and confirmed by experiments at the Large Hadron Collider, which show that the Higgs field stiffens ...

Wizardry Co-Creator Andrew Greenberg Has Passed Away

https://images.timeextension.com/f3705a0086f83/wizardry-co-creator-andrew-greenberg-has-passed-away-1.900x.jpg
Andrew Greenberg, co-creator of the influential RPG Wizardry, has passed away. He was a pioneer in the genre and his work continues to be celebrated, with Wizardry remaining a beloved series in Japan.

Howm: Personal Wiki for Emacs

https://raw.githubusercontent.com/Emacs101/howm-manual/main/cover_howm.png
Note-taking in Emacs with howm package. Contribute to Emacs101/howm-manual development by creating an account on GitHub.

Economist Eugene Fama: 'Efficient markets is a hypothesis. It's not reality

Economist Eugene Fama disputes efficient markets hypothesis. The Financial Times offers digital access to quality journalism with various subscription options.

Your Name in Landsat

https://landsat.gsfc.nasa.gov/apps/YourNameInLandsat-main/public/titles/CampLandsat.png
Type in your name to see it spelled out in Landsat imagery of Earth!

The Elements of APIs (2021)

This is still a rough draft, but I wanted to share it while it's in progress. Please give it a look and let me know what you think. Thanks! Would you like the design a web API that is reliable and pleasant to use? I have some ideas for you.

A photographer captures life in America's last remaining old-growth forests

https://npr.brightspotcdn.com/dims3/default/strip/false/crop/4000x2667+0+0/resize/1100/quality/85/format/jpeg/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2F27%2F6b%2F7a337f2443e8afcaf8b7334c1f27%2F2-mountain-lion-david-herasimtschuk-hires.jpg
David Herasimtschuk, a documentary photographer, documents old-growth forests in the Pacific Northwest, highlighting their importance in mitigating climate change and preserving biodiversity. His project aims to educate people about the value of these ecosystems and the connections between species, encouraging conservation and stewardship.

Keeping CALM: When distributed consistency is easy (2019)

https://arxiv.org/static/browse/0.3.4/images/arxiv-logo-fb.png
The CALM Theorem answers when coordination is required in distributed systems by considering program properties, showing that consistent, coordination-free implementations can be expressed in monotonic logic. This result has practical implications for developers, providing a constructive approach to distributed systems design and new programming language designs.

Apache Zeppelin

https://zeppelin.apache.org/assets/themes/zeppelin/img/notebook.png
Apache Zeppelin is an open-source web-based notebook that supports various interpreters, including Apache Spark, Python, and R, allowing users to write and execute code in a collaborative environment. The platform provides built-in Spark integration, visualization capabilities, and real-time collaboration features, and is licensed under Apache2 with an active development community.

Writing a book in the age of open source

https://substackcdn.com/image/fetch/w_120,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb30315e-304b-4228-8931-61989bdd0616_1024x1024.jpeg
The authors, aspiring Engineering Managers, share their journey of writing a book and their discovery of Asciidoc as the ideal tool for writing and publishing. They also discuss their setup, including their preferred writing tools, and share their open-source project, Letterpress, to help others write and publish their own books.

OpenAI Pleads It Can't Make Money Without Using Copyrighted Materials for Free

https://futurism.com/_next/image?url=https%3A%2F%2Fwordpress-assets.futurism.com%2F2024%2F01%2Fopenai-copyrighted-material-parliament.jpg&w=2048&q=75
OpenAI is asking the British Parliament to allow it to use copyrighted materials to train its AI models, claiming it's impossible to do so without them. However, this request has been met with opposition from parties such as the New York Times and the Authors Guild, who claim OpenAI is engaging in massive copyright infringement and threatening the livelihood of writers.

LSP: The Good, the Bad, and the Ugly

The author, a maintainer of the Haskell Language Server, provides a critical review of the Language Server Protocol (LSP), highlighting its strengths and weaknesses, including its presentation-first approach, backwards compatibility, and inconsistent state synchronization. The author suggests that the LSP could be improved by adopting a more open and collaborative development process, ...

Graph Language Models

https://aclanthology.org/thumb/2024.acl-long.245.jpg
The paper introduces Graph Language Models (GLMs) that integrate strengths of Language Models (LMs) and Graph Neural Networks (GNNs) to process structured knowledge graphs and text inputs. Empirical evaluations show that GLM embeddings surpass LM- and GNN-based baselines in supervised and zero-shot setting, demonstrating their versatility.

Feds killed 2014 plan to curb Medicare Advantage overbilling

https://kffhealthnews.org/wp-content/uploads/sites/2/2024/08/GettyImages-1236378567-resized.jpg?w=1270
In 2014, the Centers for Medicare & Medicaid Services (CMS) drafted a plan to require Medicare Advantage health insurers to identify and refund overpayments to the government, but the plan was abruptly dropped due to industry pressure. The decision is now at the center of a multibillion-dollar fraud case against UnitedHealth Group, which allegedly cheated Medicare out of over $2 billion by ...

Solar will get too cheap to connect to the power grid

https://climate.benjames.io/content/images/2024/08/Solar-overbuild--3-.png
Solar panels are becoming increasingly cost-effective, leading to a surge in installations and a potential flood of cheap electricity into the grid. As the grid reaches its limits, solar energy will be used off-grid, either stored in batteries or used immediately, paving the way for new applications such as synthetic fuels and industrial processes.

The Fourier Uncertainty Principles [pdf] (2021)

The paper discusses the Fourier uncertainty principle, which states that a nonzero function and its Fourier transform cannot be localized to arbitrary precision, and explores its implications in quantum mechanics. The authors prove the Heisenberg uncertainty principle, which shows that there is a fundamental trade-off between the precision of position and momentum measurements in quantum systems.

For those who hear voices, the ‘broken brain’ explanation is harmful

https://images.aeonmedia.co/images/34f5ced5-c92a-4cd2-b560-bf0693414c32/essay-par306983.jpg?width=3840&quality=75&format=auto
Luca, a 20-year-old musician, experiences voices and beliefs that he believes are a result of a malicious experiment, leading him to identify as a Targeted Individual (TI). The article explores the limitations of the medical narrative in understanding Luca's experiences and the need for alternative frameworks, including psychological, social, and spiritual approaches.

QWERTY-Flip: The better keyboard layout your fingers already know

https://nick-gravgaard.com/qwerty-flip/images/qwerty-flip_small.gif
QWERTY-Flip is a keyboard layout that rearranges the top and middle rows to prioritize frequent letters, making it easy to learn and use. It scores similarly to the Dvorak layout but is more practical and easier to learn, with the added benefit of being easy to switch back to QWERTY.

Vue 3.5 released

https://blog.vuejs.org/assets/props-destructure-inlay-hint.s6REBWmB.png
Vue 3.5, code-named "Tengen Toppa Gurren Lagann", is a minor release with no breaking changes, featuring improved performance, memory usage, and new features like reactive props destructuring and async component hydration. The release also includes fixes for long-standing issues and new capabilities for authoring custom elements, as well as improvements to the Teleport component and useId API.

Solar will get too cheap to connect to the power grid

https://climate.benjames.io/content/images/2024/08/Solar-overbuild--3-.png
Solar panels are becoming increasingly cost-effective, leading to a surge in installations and a potential flood of cheap electricity into the grid. As the grid reaches its limits, solar energy will be used off-grid, either stored in batteries or used immediately, paving the way for new applications such as synthetic fuels and industrial processes.

Show HN: PlasCAD: Open-source plasmid editor

https://raw.githubusercontent.com/David-OConnor/plascad/main/screenshots/primers_aug_24.png
PlasCAD is a bioinformatics tool for designing primers, cloning, and analyzing DNA sequences, with features like primer tuning, restriction enzyme site identification, and protein analysis. It supports various file formats, including FASTA, GenBank, and its own compact binary format, and offers tools for calculating PCR parameters, primer melting temperature, and protein properties.

Show HN: I'm making an AI scraper called FetchFox

https://fetchfoxai.com/logo.png
FetchFox is a Chrome Extension that uses AI to extract data from websites by describing the desired data in plain English. It can scrape data from complex HTML structures and circumvent anti-scraping measures, allowing users to quickly gather data for research, market analysis, or lead generation.

I was asked to leave an event for female founders because I had my baby with me

https://i.insider.com/66cdfe711aa2ac29ee349cf4?width=700
The author, a female founder, was asked to leave a conference for female founders because she brought her 3-week-old baby, highlighting the need for more inclusive and supportive environments for mothers in business. The author argues that babies and business should not be separate and suggests that offering on-site childcare would be a meaningful step towards creating a more inclusive and ...

The origins of the steam engine (2023)

https://blog.rootsofprogress.org/img/steam-origins-fludd-1617.jpg
The development of the steam engine did not begin with the steam engine, but rather with ancient experiments that exploited the principles of heating and cooling air and water vapor, such as those described by Philo of Byzantium and Hero of Alexandria. These early experiments laid the foundation for later innovations, including the development of thermometers, barometers, and steam-powered ...

IBM 305 RAMAC and the 1960 Winter Olympics

https://pncnmnp.github.io/blogs/pics/ibm-ramac/punch-cards.jpeg
Wesley Dickinson and James Porter discuss IBM's RAMAC and the creation of the world's first disk drive, highlighting the importance of Don Johnson's plastic shield in preventing injuries during a demonstration. The IBM 305 RAMAC was used at the 1960 Winter Olympics to calculate scores and provide up-to-the-second results, revolutionizing the way events were scored and managed.

Clearview AI faces $45.6M fine in the Netherlands for 'illegal database of faces

https://i.cbc.ca/1.7311648.1725369643!/fileImage/httpImage/image.jpg_gen/derivatives/16x9_780/clearview-facial-recognition.jpg
The Dutch data protection watchdog fined Clearview AI 30.5 million euros for creating an "illegal database" of billions of photos of faces, calling facial recognition a "highly invasive technology". Clearview's chief legal officer disputed the decision, calling it "unlawful" and "unenforceable", while the agency warned Dutch companies against using the startup's services.

Getting price-gouged by private equity in the UK's happiest resort (2023)

https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3d237dc3-22c1-4cd2-a8a6-d3aa5b5099e4_366x322.png
Andrew Lynch, a small business CFO, discusses the private equity deal of Center Parcs UK, a leisure and hospitality company that operates six sites in the UK and Ireland, and its potential sale for £5bn. The company's financial performance has improved since the pandemic, with revenue expected to reach £600m in the current financial year, but its high debt levels and interest costs may impact ...

The Memory Wall: Past, Present, and Future of DRAM

https://substackcdn.com/image/fetch/w_720,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ed35062-121f-412e-aea9-0439fcc5a83f_1132x1318.png
The DRAM industry has hit a wall, with scaling slowing down significantly, leading to a lack of innovation and high costs. New ideas and technologies, such as Compute-in-Memory (CIM), Universal Chiplet Interconnect (UCIe), and 3D DRAM, are emerging to address these challenges and potentially revolutionize the industry.

GitHub disabled adguard filters repository

https://abs.twimg.com/responsive-web/client-web/icon-ios.77d25eba.png
Dear , could you please explain why AdGuard filters repository was just disabled? Whichever ad blocker your people are using, there is a high probability that you have one of the filter lists from this repo making your Internet better.

Ask HN: Where are the part-time remote coding jobs?

You're a writer who used to supplement your income with part-time coding jobs, but after a decade, you couldn't find a matching opportunity and had to take a full-time job, leaving little time for writing. You're wondering if part-time remote coding positions have disappeared and if so, what alternatives exist.

Software Rasterizing Hair

https://www.sctheblog.com/static/402e405d42e2e7801c1fcfb3be88bf7a/fbb82/frostbitten-hair-static-img.jpg
The article discusses software rasterization for hair rendering, explaining the process of turning connected points into pixel coordinates and providing code examples from the author's "Frostbitten hair WebGPU" project. The article covers topics such as 3D transformations, triangle rasterization, and barycentric coordinates, and provides insights into the author's approach to software ...

Unveiling Mac Security: Comprehensive Exploration of Sandboxing and AppData TCC

https://imlzq.com/images/2024-08-24-Unveiling-Mac-Security-A-Comprehensive-Exploration-of-TCC-Sandboxing-and-App-Data-TCC/WX20240819-172541.png
The speaker presented a talk on exploiting vulnerabilities on macOS, focusing on arbitrary folder creation and quarantine flags, and demonstrated how to achieve sandbox escape and local privilege escalation. They also discussed the importance of not ignoring seemingly insignificant vulnerabilities and the potential for exploiting macOS to compromise iOS devices.

Show HN: Epistolary – Respond to your emails in handwriting

https://opengraph.githubassets.com/152c68ef5be8076c9ac8e7c01395da2d57e2cdfdf77a8301daab8262762bcf01/j6k4m8/epistolary
The Epistolary tool allows you to respond to emails by handwriting on an e-ink tablet, such as the reMarkable, and sends an OCR'd version of your writing to the recipient. The tool uses OCR and email management classes to manage your mailbox and send replies, with optional support for OpenAI OCR and reMarkable document management.

Amazon is trying to trick me into signing up for Prime services

https://i.guim.co.uk/img/media/f423e10f703656ed0b46f637a913b71a448e2e96/244_338_4011_2407/master/4011.jpg?width=465&dpr=1&s=none
Amazon Prime subscribers are being pressured to sign up again after cancelling, with a full-screen display and pre-ticked box to use gift card balance. The company claims transparency and simplicity, but critics argue it's using aggressive sales tactics and pre-ticked opt-in boxes, which may be illegal.

Canva Hikes Pices by 300pc as It Readies for IPO

https://ia.acs.org.au/content/dam/ia/article/images/2024/canva%20triples%20prices.jpg
Canva is increasing its subscription fee for Canva Teams by 300% due to the introduction of new AI-powered features and a planned public listing in the US. The price hike will affect existing customers, with the cost per user increasing from $39.99 to $40.50, and a minimum of three users required.

gRPC: 5 Years Later, Is It Still Worth It?

https://miro.medium.com/v2/resize:fit:700/1*kls3FL45YzJTegDxfQxXCw.png
The author reflects on their experience with Torq, a company that chose gRPC as its primary communication protocol, citing advantages such as standardized authentication and observability. They also discuss the challenges of using gRPC-web in frontend code, including debugging difficulties and security concerns, and highlight the benefits of using buf.build's connectrpc alternative.

Make Your Own CDN with NetBSD

https://it-notes.dragas.net/featured/embedded.jpg
NetBSD is a lightweight and secure OS for a caching reverse proxy, supporting a wide range of hardware. This article guides you through setting up a self-hosted CDN using NetBSD, Varnish, nginx, and acme.sh or lego for SSL certificate management.

A picture of the sun, taken with a neutrino detector, at night through the Earth

https://newhumanist.org.uk/images/CCWEB-Sun-at-Night1.jpg
The Super-K detector in Japan's Kamioka mine took a picture of the Sun at night by detecting neutrinos, ghostly particles that pass through solid matter, revealing the Sun's core "now". Neutrinos travel from the Sun's core to Earth in just 8 minutes, providing real-time information about the Sun's nuclear fires, unlike sunlight which takes 30,000 years to reach the surface.

Oya, I've heard of mega-ROMs

https://www.leadedsolder.com/assets/oyanami-v1-pcb-view.png
The author built a functional MSX cartridge that can play Konami's Knightmare II: The Maze of Galious, overcoming the challenge of understanding the unique mapper used by Konami. The project involved debugging and tweaking the cartridge's PCB, adding pull-down resistors and fixing mounting holes, and ultimately resulted in a working cartridge that can play the game.

Smaller, Weaker, yet Better: Training LLM Reasoners via Compute-Optimal Sampling

https://arxiv.org/static/browse/0.3.4/images/icons/smileybones-infinity-large.png
Training language models on synthetic data from weaker but cheaper models may be more compute-optimal than using stronger but more expensive models. Finetuning models on weaker-generated data consistently outperforms those trained on stronger-generated data across multiple benchmarks and model choices.

FB partner admits phone microphones listen to people talk to serve better ads

https://inshort.geartape.com/wp-content/uploads/2024/09/photo-1423784346385-c1d4dac9893a.jpeg
Cox Media Group allegedly uses AI-powered "Active Listening" software to listen to users' conversations and target ads based on their discussions, raising privacy concerns. Major tech companies, including Facebook and Google, have responded with varying degrees of caution, with some distancing themselves from the practice and others initiating reviews to determine potential violations of ...

OpenAI and Anthropic agree to send models to US Government for safety evaluation

https://venturebeat.com/wp-content/uploads/2024/02/DALL%C2%B7E-2024-02-08-12.46.39-An-illustration-of-the-White-House-in-a-16_9-aspect-ratio-surrounded-by-symbols-related-to-AI-safety.-Include-visual-elements-like-digital-circuit-pa.webp?w=750
OpenAI and Anthropic signed an agreement with the US AI Safety Institute to collaborate on AI model safety research, testing, and evaluation, providing pre-released models for testing and receiving feedback on potential safety improvements. The agreement aims to advance the science of AI safety and define responsible AI rules in the US, with some experts expressing concerns about the ...

Anthropic Quickstarts

https://opengraph.githubassets.com/ef6f41b4259868d117ddde7bfcd4ee8a65f1af94a024d0bdc8cfb17be2721ccc/anthropics/anthropic-quickstarts
Anthropic Quickstarts are projects that help developers build deployable applications using the Anthropic API, requiring an API key to use. Each quickstart provides a foundation to customize for specific needs, with resources available to deepen understanding of working with Claude and the API.

Mobile phones not linked to brain cancer, biggest study to date finds

https://i.guim.co.uk/img/media/883f90e83ae6c3f4bcbd8f7c564fe96519090fb1/119_0_4996_2999/master/4996.jpg?width=465&dpr=1&s=none
A comprehensive review of 5,000 studies by the World Health Organization found no link between mobile phone use and brain or head cancers. The review's lead author, Ken Karipidis, concluded that the evidence does not show a link between mobile phones and cancer, and that brain tumour rates have remained stable despite increased mobile phone use.

Hot Temperature and High Stakes Performance [pdf]

Hot Temperature and High-Stakes Performance R. Jisung ParkJournal of Human Resources, Volume 57, Number 2, March 2022, pp.400-434 (Article)Published by University of Wisconsin PressFor additional information about this articlehttps://muse.jhu.edu/article/848531 e m a D e r t o N

Show HN: Icebreaking AI. A free tool to help you find close friends

https://www.icebreakinglab.com/_next/image?url=https%3A%2F%2Fimages.unsplash.com%2Fphoto-1444210971048-6130cf0c46cf%3Fq%3D80%26w%3D2073%26auto%3Dformat%26fit%3Dcrop%26ixlib%3Drb-4.0.3%26ixid%3DM3wxMjA3fDB8MHxwaG90by1wYWdlfHx8fGVufDB8fHx8fA%253D%253D%26auto%3Dformat%26fit%3Dcrop%26w%3D3540%26q%3D80&w=3840&q=75
Discover the best online ice breaking questions with AI to easily make new friends and enhance your social connections. Perfect for parties, home gatherings, and office events. Engage and connect with friends, family, and colleagues effortlessly!

Sextortion scams now include photos of your home

https://krebsonsecurity.com/wp-content/uploads/2024/09/sextortion-maps.png
Sextortion emails are being sent with personalized threats and photos of the target's home, claiming to have captured webcam footage and demanding a Bitcoin ransom. The FBI advises against sending compromising images, not opening attachments from unknown senders, and turning off web cameras when not in use to avoid becoming a victim of sextortion.

Microsoft Says Apple's 30% Fee Makes Xbox Cloud Gaming iOS App 'Impossible'

https://images.macrumors.com/t/RxIen9ClBB5Xy0DsHzc-5tgZH2U=/400x0/article-new/2020/09/App-Store-and-XCloud.jpg?lossy
Microsoft claims Apple's App Store rules are too restrictive for cloud gaming, citing issues with in-app purchases and a 30% commission fee. The company also complains about Apple's lack of support for alternative app stores and limitations of web apps, making it "impossible" to monetize its cloud gaming service.

"Hire People Smarter Than You" is bad advice (2018)

https://www.benkophone.com/assets/images/small-businesses-1080x558.jpg
Building a high-performance culture of accountability and initiative is key to small business success, rather than relying on hiring the most skilled and experienced employees. By creating a culture where people feel comfortable making decisions within clear boundaries, small businesses can attract and retain staff, and focus on hiring good communicators who can learn and grow with the company.

Posting a 5x5 crossword every day

https://www.crucig.com/thumb.png
× Wrist crosswords are small 5x5 letter crosswords Touch the ACROSS and DOWN buttons to change the direction of writing:

The Yubikey Is the Digital Seatbelt We Need

https://www.zagaja.com/images/fb_image.jpg
The user argues that hardware security keys are a proven and effective way to protect accounts from phishing and hacking, and that the Massachusetts Attorney General's office should investigate and require companies in critical sectors to use them. The user also suggests codifying the requirement for hardware security keys in Massachusetts law and imposing penalties for breaches that could ...

Extremist settlers rapidly seizing West Bank land

https://ichef.bbci.co.uk/news/480/cpsprodpb/bd4e/live/7df2fd20-662e-11ef-8c32-f3c2bc7494c6.jpg.webp
Palestinian grandmother Ayesha Shtayyeh was threatened at gunpoint by an Israeli settler, Moshe Sharvit, who had established an illegal outpost near her home in the occupied West Bank, as part of a growing trend of violence and harassment against Palestinian communities. The BBC investigation found that extremist settlers are receiving money and land from powerful groups with ties to the ...

Microsoft's Recall Feature on Windows 11 Not Removable After All

https://digitalmarketreports.com/wp-content/uploads/2024/09/Microsoft-Recall-JASON-REDMONDAFP-via-Getty-Images.jpg
Microsoft confirms that Windows 11 users cannot uninstall the "Recall" feature, despite earlier reports suggesting otherwise. Recall, which captures screenshots of user activity, is designed to be integrated into Windows 11's core functionality, but critics argue it poses significant cybersecurity risks.

Why Britain Drives on the Left

The British drive on the left due to historical reasons, including the Romans' practice of carrying swords on their left sides and the need to defend oneself while riding horses. Many countries drive on the left, including Australia, New Zealand, and Japan, while others drive on the right, with the majority of the world's population driving on one side or the other.

Handling complexity without abstraction: Algebraic Bricklaying C

https://opengraph.githubassets.com/af312665d79f989cfebe59d0a7e60e10dc68f8681e0c5119d03d08e663081536/gritzko/librdx
ABC is an experimental C dialect focused on handling complexity by maximizing good combinatorics and minimizing bad, with a goal of durability and composable code. It discourages encapsulation, pointer arithmetic, and manual memory management, instead promoting well-specified formats, behavior, and orthogonal, composable constructs.

Rise of the Pint-Size Startup Is Reshaping the U.S. Economy

Please enable JS and disable any ad blocker

Oakland Police Are Towing Teslas for Crime Scene Footage

https://www.carscoops.com/wp-content/uploads/2024/09/Tesla-Car-Witness-1024x576.jpg
Police in Oakland have been towing Tesla vehicles with warrants to obtain footage from Sentry Mode, which can provide crucial evidence in solving crimes. The footage is automatically recorded when suspicious motion is detected and can be accessed with the owner's permission or through a search warrant if the owner cannot be found.

Rust All Hands 2025

https://www.rust-lang.org/static/images/rust-social-wide.jpg
Rust All Hands 2025 will take place in Utrecht, Netherlands, as part of Rust Week 2025, celebrating 10 years of Rust. Interested individuals can register their interest here, specifying their affiliation with the Rust project.

No screens before age of two, Swedish health authority tells parents

https://i.guim.co.uk/img/media/c1881365a89d952122498618d6bd0284cd0d2a0f/0_0_2448_1469/master/2448.jpg?width=465&dpr=1&s=none
Sweden's public health authority recommends limiting screen time for children, with no screens for under-2s, one hour for 2-5 year olds, two hours for 6-12 year olds, and three hours for 13-18 year olds. The guidelines aim to reduce screen time and promote healthy digital media use, with parents encouraged to set examples and have conversations with their children about screen use.

Zig's Memcpy, CopyForwards and CopyBackwards

The @memcpy function in Zig copies bytes from one region of memory to another, but can cause runtime panics if the source and destination overlap. To avoid this, use std.mem.copyForwards or std.mem.copyBackwards, and consider the possibility of aliasing when copying into existing memory.

American Radio Relay League paid $1M ransom payment

https://databreaches.net/wp-content/uploads/cropped-whatsyourexcuse333.jpg
The American Radio Relay League (ARRL) paid a $1 million ransom to restore its systems after a May ransomware attack, which was a unique and sophisticated attack that affected most of its cloud-based systems. The organization worked closely with experts and its insurance carrier to negotiate the payment and restore its systems, and it is now working to simplify its infrastructure and complete ...

New forms of steel for stronger, lighter cars

https://knowablemagazine.org/images/magazine/placeholder_img.jpg
Automakers are developing new steels with specific properties to improve safety and fuel efficiency, using advanced techniques like electric arc furnaces and quenching processes. These new materials, combined with lightweight polymers and carbon fiber, can reduce vehicle weight by hundreds of pounds, saving fuel costs and improving safety.

AI worse than humans in every way at summarising information, trial finds

https://www.crikey.com.au/wp-content/uploads/2024/09/AdobeStock_205110625.jpeg?quality=70&w=740&h=400&crop=1
A government trial in Australia found that AI technology is worse than humans at summarizing documents and may create additional work, as AI summaries often missed important information and lacked nuance. Human summaries outperformed AI on every criteria, with reviewers noting that AI summaries may be counterproductive and require fact-checking, suggesting that AI should be used to augment ...

Joining the Open Source Pledge

https://blog.val.town/_astro/opensourcepledge-logo-horiz-mono-dark@2x.DxBm_WkF_1cDhEN.svg
Val Town supports open source software by contributing patches and releasing modules, and has donated $9,600 so far in 2024. The company aims to donate at least $2,000 per full-time employee per year to sustain open-source projects and show appreciation to maintainers.

Will open science change chemistry?

https://d2cbg94ubxgsnp.cloudfront.net/Pictures/480x270/2/0/9/536209_locks_644639.jpg
Chemists are realizing that open science goes beyond just making research papers accessible, and that sharing data and collaborating is crucial for innovation. However, there are still significant barriers to overcome, including the dominance of large publishers, intellectual property concerns, and a lack of incentives for open collaboration.

Europeans fail to understand how much they were fucked by the 2008 crisis

https://abs.twimg.com/responsive-web/client-web/icon-ios.77d25eba.png
Western Europeans, including France, failed to recover from the 2008 subprime crisis, with GDP per capita still lower than in 2008. The US, on the other hand, has more than doubled its GDP per capita, widening the gap to 100% difference in just 15 years.

Setting up a cache server for apt packages

https://qmacro.org/images/2024/09/proxmox.png
The author sets up an apt-cacher-ng cache server to reduce bandwidth consumption by caching Debian apt packages, and successfully configures it to cache Docker package resources by modifying the Docker repository URL to use HTTP instead of HTTPS. The cache server is used to install Docker engine in multiple test containers, resulting in significant speed improvements and reduced Internet traffic.

Why did Windows 95 use blue screen error messages instead of hard error messages

https://devblogs.microsoft.com/oldnewthing/wp-content/uploads/sites/38/2019/02/ShowCover.jpg
Windows 95's blue screen messages were used instead of hard error messages due to the complexity of handling low-level I/O errors asynchronously with respect to the virtual machines running Windows and MS-DOS. The virtual machine manager needed to report problems to the user without changing ownership of the video card, requiring a special text mode display capability to show blue screen messages.

Analysing 10 years of 'who is hiring' HN data

https://i.ritzastatic.com/images/a311cabe015a4124850b11462d61c2d9/who-is-hiring.png
The "Who is Hiring" and "Who wants to be hired" threads on Hacker News have been tracking job postings and job seekers for ten years, with a recent trend showing a decline in job postings and an increase in job seekers.

Hugging Face tackles speech-to-speech

https://raw.githubusercontent.com/huggingface/speech-to-speech/main/logo.png
The pipeline is designed to be modular, using models from the Transformers library and allowing for customization of each component, including STT, LM, and TTS. The pipeline can be run on a server with client-side audio input/output, and various parameters can be set for each component, including model selection, device, and generation settings.

Shift Networks

https://www.jeremykun.com/wp-content/uploads/2024/09/vos-vos-erkin-example-conflict.png
The author discusses packing strategies for arithmetic homomorphic encryption schemes, focusing on the "Cheapest Shift Network" problem, where the goal is to minimize the number of rotations and multiplications required to align data elements. The author presents various approaches, including a greedy heuristic and a graph coloring algorithm, and seeks to improve the solution using more ...

IANA's List of Domain Name System (DNS) Parameters

Multicast DNS can only carry DNS records with classes in the range 0-32767, and classes in the range 32768-65535 are incompatible. The IANA registry for DNS classes and types must be updated according to specific rules, including expert review and Standards Action, to ensure compatibility and consistency.

Show HN: AppFlowy – An Open-Source Notion Alternative Built with Flutter

https://user-images.githubusercontent.com/12026239/236664610-fc209a97-815e-4716-af07-d94a859d1907.png
AppFlowy aims to create a collaborative tool that offers Notion's functionality, data security, and cross-platform experience, while giving users 100% control over their data. The project's mission is to democratize the creation of complex workplace management tools by providing a versatile toolbox of building blocks and enabling users to create apps that suit their needs.

Quick guide to web typography for developers

https://sinja.io/_next/image?url=%2Fthumbnails%2Fweb-typography-quick-guide.jpg&w=1920&q=100
The article discusses the importance of typography in web development, providing guidelines on how to make text on websites and apps look good by default, including font selection, line height, and tracking. It also covers advanced topics such as variable fonts, subsetting, and font smoothing, and provides resources for further learning and exploration.

Dungeon Dash – A super fun command-line RPG game

https://opengraph.githubassets.com/21faec111788e3c86ebadee920d44f7393bae7fd6a183b2d3e629ee7ea2f770b/Faizan711/dungeon-dash
DungeonDash is a command-line RPG game where players explore dungeons, battle enemies, collect items, and level up to become the ultimate hero. The goal is to retrieve the pieces of a legendary artifact by defeating mini-bosses and collecting items, and level up to increase stats and take on more challenging dungeons.

How to Take Home "Garbage Bags Full of $20s"

https://www.hollywoodreporter.com/wp-content/uploads/2016/09/biz_managers_main-_h_-_2016_0.jpg?w=1296&h=730&crop=1
Fan conventions have become a lucrative business, with stars earning hundreds of thousands of dollars for a few hours of time, often more than they make from their TV shows and movies. The demand is so high that agencies have added "personal appearance" agents to book talent and earn a 10% commission, with some stars earning over $500,000 per weekend.

Transparency is often lacking in datasets used to train large language models

https://news.mit.edu/sites/default/files/styles/news_article__download/public/download/202408/MIT-Dataset-Transparency-01-press.jpg?itok=WH0iPSXe
Researchers developed a tool to improve data transparency by automatically generating summaries of a dataset's creators, sources, licenses, and allowable uses, which can help AI practitioners build more effective models and reduce bias. The tool, called the Data Provenance Explorer, can help regulators and practitioners make informed decisions about AI deployment and improve the accuracy of ...

Typewriter Interview with Elisa Gabbert

https://substackcdn.com/image/fetch/w_120,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe1b1b8b5-61d7-448b-8cf9-decdfd92490c_800x1004.jpeg
Author Austin Kleon interviews writer Elisa Gabbert, discussing her poetry, essays, and reading habits, including her notes on finished books and her thoughts on free will in writing. The interview also touches on Gabbert's interests, including her love of music and her recent move to Providence, Rhode Island.

Hacking sales as an introvert

https://images.spr.so/cdn-cgi/imagedelivery/j42No7y-dcokJuNgXeA0ig/561b13be-6a76-4574-b392-d15ffab53bf1/image/w=750,quality=90,fit=scale-down
The user increased their sales from 30% to 80% by implementing three key discoveries: boosting signal-to-noise ratio through high-information outreach, conveying charisma through non-verbal communication, and using story-hacking to build rapport and convey desired messages. These changes led to a significant increase in close rate and lifetime bookings, resulting in ~$700k in sales before the ...

Engineering over AI

The hype around LLM agents has led to a focus on flashy demos and interfaces, but true innovation requires engineering over AI, solving real problems and using AI as an enabling layer. To build functional code generation agents, it's necessary to understand the structural relationships within codebases, which current approaches using embeddings fail to capture.

The await event horizon in JavaScript (2023)

https://frontside.com/img/2023-12-11-await-event-horizon/leak-zone.png
The "await event horizon" in JavaScript Promises is a boundary that once crossed, control cannot return until the Promise settles, potentially leading to resource leaks. Generator functions, which can be used to implement structured concurrency, offer a way to escape this horizon and ensure timely resource release.

Tell HN: GitHub locked me out for not using 2FA

GitHub is requiring 2-factor authentication (2FA) for all accounts, which some users dislike due to the added hassle and potential for 2FA device loss or compromise. However, proponents of 2FA argue that it provides an additional layer of security against phishing and other attacks, and that users can use alternative methods such as TOTP code generators or password managers to store and ...

The Fundamental Law of Software Dependencies

Software source code should include checksums of all dependencies, including libraries, compilers, and their versions, to ensure reproducibility and trustworthiness. A lockfile with checksums should be included, and compiler distribution should provide a manifest with platform-specific hashes, allowing downstream consumers to verify specific binaries.

Some Advice for How to Make Emacs Tetris Harder (2019)

https://nickdrozd.github.io/assets/2019-01-14-tetris/tetris-normal.png
Emacs has a Tetris game that can be modified using advice to make it harder, such as removing the next-block preview or making pieces stop mid-air. The user also wants to modify the game to flash a message, change the piece-rotation mechanics, and make the interval between pieces stopping mid-air random.

Firefox will consider a Rust implementation of JPEG-XL

https://opengraph.githubassets.com/da09ba390ccd0562ad81cdd014986dff46965a4c642af19c44130f313ad7d324/mozilla/standards-positions/pull/1064
The suggestion cannot be applied because no changes were made to the code and it's not supported for deleted lines or multi-line comments. The suggestion cannot be applied now and should be checked back later due to various restrictions.

Yubikey 5 are vulnerable to side channel cloning attacks

https://cdn.arstechnica.net/wp-content/uploads/2024/09/yubikeys-800x534.jpg
The YubiKey 5, a widely used hardware token for two-factor authentication, contains a cryptographic flaw that makes it vulnerable to cloning when an attacker gains temporary physical access. The flaw, known as a side channel, resides in a microcontroller used in other authentication devices, and all YubiKey 5 series models prior to firmware version 5.7 are permanently vulnerable.

Apache's odd behavior for requests with a domain with a dot at the end

Apache responds with a "400 Bad Request" error when accessing "utcc.utoronto.ca." with a trailing dot, but the error varies depending on the tool or browser used. Some tools, like GNU Wget2, get a TLS certificate validation failure, while others, like lynx and Safari on iOS, successfully reach the blog and generate a redirect to the canonical hostname.