The website is temporarily blocked due to security reasons after a suspicious action was detected. Please email the site owner with the Cloudflare Ray ID and details of the action that triggered the block.
David Bessis wrote a book called Mathematica, arguing that everyone is secretly doing math and can improve their mathematical thinking through practice and self-reflection. He claims that math is a dialogue between reason and instinct, and that it can be a powerful self-help technique for creativity and problem-solving.
This project aims to improve the interpretability of large language models (LLMs) by using sparse autoencoders (SAEs) to untangle superimposed representations into separate, clearly interpretable features. The project provides a full pipeline for capturing training data, training SAEs, analyzing learned features, and verifying results, and it has successfully applied this approach to the ...
HTTP cookies are a small piece of data used for maintaining state on the World Wide Web, but their specification is ambiguous and causes issues with browsers and programming languages. The problem lies in the differing behavior between browsers and languages when handling non-ASCII characters in cookies.
The user investigated why gpt-3.5-turbo-instruct can play chess well while other large language models (LLMs) struggle, and found that recent chat models can also play chess well with the right prompts and examples. The user proposed a theory that OpenAI's base models are good at chess, but the chat interface and instruction tuning used in chat models hinder their performance, and suggested ...
PHP 8.4 introduces new features such as property hooks, a new DOM API, and a RoundingMode enum. It also includes improvements like the ability to access object properties without parentheses and a new #[\Deprecated] attribute for deprecation warnings.
The "Demon Core" is a plutonium core involved in two criticality accidents that killed scientists Louis Slotin and Harry Daghlian, and its story has become a meme with kawaii anime-style drawings and dark humor. The meme's origins and spread are unclear, but it appears to have originated in Japan and has since become a popular internet meme among geeky boys and others who recognize the ...
The Dutch intersection design features a raised table, split main street, and refuge islands to reduce conflicts between motor traffic, cycling, and walking. It prioritizes cycling and walking, with clear design features and no traffic signals.
Hyrum's Law states that any observable behavior in a system will eventually be relied upon by someone. Changing code that others depend on can cause unintended issues, making it a good practice to design systems that minimize quirky behaviors.
ChipWits, a 1984 game, is being released as open source with its original Mac and Commodore 64 FORTH source code. The game's legacy is being preserved and a modernized version is also being developed to inspire a new generation of programmers.
This guide uses a Raspberry Pi to extend the Monty Home BLE device's functionality, retrieving temperature, humidity, and other data. Three projects automate actions based on this data, including controlling an LED, displaying data on an OLED screen, and sending notifications via IFTTT.
Researchers have developed a model called The Matrix, which generates high-quality, interactive videos with AAA game quality and real-time control. The Matrix can create an infinite-horizon world with diverse environments, including cities, deserts, and natural landscapes.
The WebGPU working group discussed progress on Milestone 0 and prioritized new features such as subgroups, texel buffers, and bindless resources. The group aims to finalize issues and reach candidate recommendation status for the W3C.
Data centers consume 1-2% of global power, set to rise to 3-4% by the end of the decade, with a doubling in carbon dioxide emissions. Oxide's Cloud Computer achieves unprecedented power efficiency by treating the entire rack as a single, unified computer with integrated hardware and software.
The author presents novel timing attack concepts that can be used to detect server secrets, including misconfigurations, blind data-structure injection, and hidden routes to forbidden areas, and shares tools and techniques to help automate and improve these attacks. By leveraging timing attacks, researchers can uncover hidden parameters, detect server-side injection vulnerabilities, and ...
The Barning-Hall tree and the Stern-Brocot tree are used to enumerate Pythagorean triples and rational points on a circle, with the Stern-Brocot tree providing a hierarchical ordering of the points by turn angle. The Stern-Brocot tree can be used to compute best approximations of trigonometric functions by stereographically projecting rational numbers onto the circle and using the turn angle ...
Personality basins are mental models that describe how our environment and experiences shape our personalities, and we can change our basins by changing our environment and increasing our learning rate. By understanding personality basins, we can model mental illnesses and develop new approaches to curing them, and we can also use this concept to improve our own lives by trying new things and ...
The author explores various paintings on Art UK, including rectangular cows, and discovers that cows were a popular subject due to their ubiquity in the British countryside. The author finds that famous artists like Andy Warhol and Franz Marc created cow paintings, but the rectangular shape of cows in some paintings may be due to the emphasis on size and status in the early 1800s.
ESET researchers identified Linux backdoors WolfsBane and FireWood, attributing WolfsBane to Gelsemium APT group with high confidence. FireWood's connection to Gelsemium is uncertain, possibly shared among multiple China-aligned APT groups.
The author discusses how a large language model can transform a linear narrative into an immersive adventure, citing the example of a game based on their book "The Infernal Machine" that allows players to explore the Soho loft mystery of 1911. The author argues that the key to this capability is the model's increased context window, which enables it to understand and recall complex ...
Multiple state attorneys general signed a document, likely a court filing, with various attorneys listed from Florida, Texas, California, and other states.
WhisperNER is a novel model that integrates NER and ASR for enhanced transcription accuracy and informativeness. It outperforms natural baselines on open-type NER and supervised finetuning tasks.
Apple urged a federal judge to dismiss the DOJ's antitrust case, saying the government's complaint is speculative and lacks monopoly power evidence. The judge will decide by January whether the case can proceed to trial or some claims should be thrown out.
The Code Conversion Language (CCL) is a byte-code interpreter in Emacs that can be used for text processing and arithmetic operations, but its I/O facilities and memory access are limited, making it unclear whether it is Turing-complete. Despite some examples of CCL programs being faster than their Emacs Lisp counterparts, the language is hard to debug and maintain, and its use may be ...
Developers are often conditioned to treat databases as black boxes, but recent trends and projects like Apache DataFusion make it possible for developers to build custom databases and innovate around the developer experience. This tutorial walks through extending DataFusion to add a custom window operator for stream processing applications, demonstrating how to build a custom database and ...
Paul Dirac, a 25-year-old British physicist, developed a groundbreaking theory in 1928 that combined quantum mechanics and special relativity. His equation led to the discovery of antimatter and earned him the 1933 Nobel Prize in Physics.
The author used to manually check units in calculations but now uses the dimensional Haskell package to ensure correctness. The package enforces type-safe dimensions at compile-time.
Yami is a lightweight, open-source music player built in Python with a simple UI. It supports local files and online sources like Spotify and YouTube Music.
Arvind and Akhil from Fresco AI are building a tool to help construction superintendents manage documentation with AI. Fresco uses generative AI to create reports and punch lists from short videos or photos taken during site walks.
Linux distributions have implemented measures like reproducible builds to counter malware, but active scanning is rare. Current open-source malware scanners are ineffective at detecting malicious Linux packages with high false positive rates.
NCSC-NL sent a 'lousy' t-shirt and thank you letter for reporting a vulnerability. The gesture is seen as a positive approach to engaging with ethical hackers, but some question its effectiveness as a reward.
Hackers breached Andrew Tate's online course, The Real World, revealing 325,000 users' email addresses and exposing the platform's security vulnerabilities. The breach was attributed to "hacktivism" and exposed Tate's platform, which focuses on financial investment and masculinity, to criticism and scrutiny.
The concept of autopoiesis is simulated using a cellular automaton with binary state attribution and a scaling rule, aiming to generate self-rebuilding systems. The simulation involves logic gates, neighbor interactions, and a Φ value that mimics closure, with the goal of achieving autopoietic behavior.
lean-smt is a Lean tactic that discharges goals into SMT solvers, currently supporting Uninterpreted Functions, Linear Arithmetic, and Bitvectors. It uses cvc5 and replays its proof in Lean, filling holes as Lean goals.
Azeem discusses how energy forecasters consistently underestimate solar power uptake, with experts unwilling to bet on its growth. He attributes this to forecasters relying on short-term empirical data rather than long-term projections that consider underlying systemic factors.
Substack wants to control your content and audience for profit, limiting your freedom and potentially exposing you to hate speech. You can break free by exporting your subscribers and using alternatives like Ghost, Beehiiv, or Medium.
Talking to oneself is a common habit that can be beneficial for problem-solving, motivation, and emotional regulation. It can also help people feel more calm and confident by verbalizing their thoughts and ideas.
P3 hat Daten von 7.000 Elektroautos analysiert und festgestellt, dass die Batterielebensdauer besser ist als befürchtet. Die Batterien verlieren an Leistungsfähigkeit, aber nach 200.000 Kilometern ist die Degradation nahezu horizontal.
The Casper Wind Farm, a 14-year-old project, has been idle for years and is now considered an eyesore by some residents. Chevron, the owner, claims it will resume operations by the end of the year due to transmission constraints.
I got hooked on Qubes OS due to its emphasis on security and privacy, allowing me to compartmentalize tasks and separate contexts with ease. The system's unique offer and tools make it ideal for niche users who value high security, but it requires a specific mindset and discipline to use efficiently.
An ad tech giant, The Trade Desk, is launching a new TV OS called Ventura in 2025 to help advertisers reach more people. Ventura prioritizes ad sales and tracking, offering features like ad targeting and improved user experience, but may limit options for an ad-free TV viewing experience.
Spirit Airlines' bankruptcy is not a result of antitrust enforcement but rather poor management and a flawed business strategy. The airline's executives misled the court and shareholders, and the CEO received a $3.8 million bonus before the bankruptcy, highlighting the need for stronger regulation in the airline industry.
OpenZFS is a file system and volume manager maintained by the OpenZFS community, available for Linux, FreeBSD, and Windows in beta. It's released under CDDL license with documentation on the Getting Started Page.
Nile is a PostgreSQL re-engineered for multi-tenant applications that provides isolation and flexibility while preserving a single database developer experience. It uses a distributed transaction architecture with a PostgreSQL extension, transaction coordinator, and metadata store to handle DDLs across tenants and physical databases, ensuring robustness and reliability.
Google and the DOJ will return to DC federal court in April for a remedies trial after the DOJ proposed Google divest Chrome and possibly Android to restore competition. The DOJ also wants to restrict Google's agreements and break up the company if necessary.
AMD dominates Amazon's best-selling CPU list with 9 out of 10 spots, led by the Ryzen 7 5700X. Intel's Core i5 13600KF is the only top 12 entry, struggling to compete with AMD's price/performance offerings.
Microsoft is sending full-screen reminders to Windows 10 users about the end of free security updates in October 2025. Users can upgrade to Windows 11, buy a new PC, or pay $30 for an Extended Security Update to continue receiving security updates.
Quantum computing faces significant technical challenges, including controlling millions of continuous parameters, which may be insurmountable. Despite billions spent, useful quantum computers remain unlikely in the foreseeable future, with many experts predicting 20-30 years or more.
NASA's commercial space efforts are showing cracks due to unsustainable fixed-price contracts and overloading contractors with requirements. The agency must adapt to the challenges faced by its new generation of contractors to avoid failure and achieve its ambitious space exploration plans.
A new study by iSeeCars found Tesla vehicles have the highest rate of fatal accidents among US car brands, with a rate of 5.6 per billion miles driven. Tesla's Model Y SUV had a fatal accident rate of 10.6, more than double the average for SUVs.
Hibernation is a natural state of suspended animation found in various animals, characterized by a controlled reduction in metabolism and physiological processes, and scientists are exploring its potential applications in humans for survival and therapeutic purposes. Despite decades of research, human hibernation remains a mystery, and understanding its relationship with sleep, brain ...
Using refresh tokens with short-lived access tokens simplifies revocation, limits the impact of token leaks, and provides incremental improvements to client security and flexibility in future access grants. However, it also increases client complexity and introduces a single point-of-failure in the authorization server, which can be mitigated with proper design and redundancy.