ICC issues warrants for Netanyahu, Gallant, and Hamas officials

The website is temporarily blocked due to security reasons after a suspicious action was detected. Please email the site owner with the Cloudflare Ray ID and details of the action that triggered the block.

Everyone is capable of, and can benefit from, mathematical thinking

https://www.quantamagazine.org/wp-content/uploads/2024/11/QADavidBessis-crLaurenceGeai-Lede-scaled.webp
David Bessis wrote a book called Mathematica, arguing that everyone is secretly doing math and can improve their mathematical thinking through practice and self-reflection. He claims that math is a dialogue between reason and instinct, and that it can be a powerful self-help technique for creativity and problem-solving.

Show HN: Llama 3.2 Interpretability with Sparse Autoencoders

https://raw.githubusercontent.com/PaulPauls/llama3_interpretability_sae/main/.documentation/sparse-autoencoder_light.webp
This project aims to improve the interpretability of large language models (LLMs) by using sparse autoencoders (SAEs) to untangle superimposed representations into separate, clearly interpretable features. The project provides a full pipeline for capturing training data, training SAEs, analyzing learned features, and verifying results, and it has successfully applied this approach to the ...

Handling cookies is a minefield

https://grayduck.mn/2024/11/21/handling-cookies-is-a-minefield/facebook.jpg
HTTP cookies are a small piece of data used for maintaining state on the World Wide Web, but their specification is ambiguous and causes issues with browsers and programming languages. The problem lies in the differing behavior between browsers and languages when handling non-ASCII characters in cookies.

OK, I can partly explain the LLM chess weirdness now

https://dynomight.net/small/img/chess/chess2.jpg
The user investigated why gpt-3.5-turbo-instruct can play chess well while other large language models (LLMs) struggle, and found that recent chat models can also play chess well with the right prompts and examples. The user proposed a theory that OpenAI's base models are good at chess, but the chat interface and instruction tuning used in chat models hinder their performance, and suggested ...

PHP 8.4

https://www.php.net/images/php8/php_8_4_released.png
PHP 8.4 introduces new features such as property hooks, a new DOM API, and a RoundingMode enum. It also includes improvements like the ability to access object properties without parentheses and a new #[\Deprecated] attribute for deprecation warnings.

The meme-ification of the “Demon Core”

https://substackcdn.com/image/fetch/w_520,h_272,c_fill,f_auto,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F538c4903-d36d-428d-a5d5-45ae6cc12519_3000x3600.jpeg
The "Demon Core" is a plutonium core involved in two criticality accidents that killed scientists Louis Slotin and Harry Daghlian, and its story has become a meme with kawaii anime-style drawings and dark humor. The meme's origins and spread are unclear, but it appears to have originated in Japan and has since become a popular internet meme among geeky boys and others who recognize the ...

A common urban intersection in the Netherlands (2018)

https://bicycledutch.wordpress.com/wp-content/uploads/2018/02/intersection-2018-10.jpg?w=800&h=467&crop=1
The Dutch intersection design features a raised table, split main street, and refuge islands to reduce conflicts between motor traffic, cycling, and walking. It prioritizes cycling and walking, with clear design features and no traffic signals.

Hyrum’s Law in Golang

https://abenezer.org/trees.png
Hyrum's Law states that any observable behavior in a system will eventually be relied upon by someone. Changing code that others depend on can cause unintended issues, making it a good practice to design systems that minimize quirky behaviors.

The FORTH code for Chipwits is released in the game's 40th anniversary

https://i0.wp.com/chipwits.com/wp-content/uploads/2024/10/40-anniversary-announcement-1.png?resize=512%2C288&ssl=1
ChipWits, a 1984 game, is being released as open source with its original Mac and Commodore 64 FORTH source code. The game's legacy is being preserved and a modernized version is also being developed to inspire a new generation of programmers.

Show HN: We open-sourced our compost monitoring tech

https://opengraph.githubassets.com/e074eebaae8dcaf0072e70ba2595f576c7cc5a7b3dec2efa759fecef35fcc230/gtls64/MontyHome-Hackers-Guide
This guide uses a Raspberry Pi to extend the Monty Home BLE device's functionality, retrieving temperature, humidity, and other data. Three projects automate actions based on this data, including controlling an LED, displaying data on an OLED screen, and sending notifications via IFTTT.

The Matrix: Infinite-Horizon World Generation with Real-Time Interaction

https://thematrix1999.github.io/img/thematrix.png
Researchers have developed a model called The Matrix, which generates high-quality, interactive videos with AAA game quality and real-time control. The Matrix can create an infinite-horizon world with diverse environments, including cities, deserts, and natural landscapes.

What's Next for WebGPU

https://developer.chrome.com/static/blog/next-for-webgpu/image/whiteboard.jpg
The WebGPU working group discussed progress on Milestone 0 and prioritized new features such as subgroups, texel buffers, and bindless resources. The group aims to finalize issues and reach candidate recommendation status for the W3C.

How oxide cuts data center power consumption in half

https://oxide.computer/img/blog/power-consumption/goldman-datacenter-chart.svg
Data centers consume 1-2% of global power, set to rise to 3-4% by the end of the decade, with a doubling in carbon dioxide emissions. Oxide's Cloud Computer achieves unprecedented power efficiency by treating the entire rack as a single, unified computer with integrated hardware and software.

Listen to the whispers: web timing attacks that work

https://portswigger.net/content/images/profiles/callout_james_kettle_112px.png
The author presents novel timing attack concepts that can be used to detect server secrets, including misconfigurations, blind data-structure injection, and hidden routes to forbidden areas, and shares tools and techniques to help automate and improve these attacks. By leveraging timing attacks, researchers can uncover hidden parameters, detect server-side injection vulnerabilities, and ...

A binary tree of all Pythagorean triples

https://richardt.io/stereo_stern/trig_diag.png
The Barning-Hall tree and the Stern-Brocot tree are used to enumerate Pythagorean triples and rational points on a circle, with the Stern-Brocot tree providing a hierarchical ordering of the points by turn angle. The Stern-Brocot tree can be used to compute best approximations of trigonometric functions by stereographically projecting rational numbers onto the circle and using the turn angle ...

Personality Basins

https://near.blog/wp-content/uploads/2024/06/rl-1024x655.png
Personality basins are mental models that describe how our environment and experiences shape our personalities, and we can change our basins by changing our environment and increasing our learning rate. By understanding personality basins, we can model mental illnesses and develop new approaches to curing them, and we can also use this concept to improve our own lives by trying new things and ...

Boeing overcharged the U.S. Air Force 8,000% above market for soap dispensers

Please enable JS and disable any ad blocker

The rectangular cows of Art UK (2018)

https://d3d00swyhr67nd.cloudfront.net/w800h800/collection/LAN/TOWN/LAN_TOWN_BURGM_paoil234_2-001.jpg
The author explores various paintings on Art UK, including rectangular cows, and discovers that cows were a popular subject due to their ubiquity in the British countryside. The author finds that famous artists like Andy Warhol and Franz Marc created cow paintings, but the rectangular shape of cows in some paintings may be due to the emphasis on size and status in the early 1800s.

Security researchers identify new malware targeting Linux

https://web-assets.esetstatic.com/tn/-x700/wls/2024/11-2024/wolfsbane/wolfsbane-gelsemium-gelsevirine-linux.jpeg
ESET researchers identified Linux backdoors WolfsBane and FireWood, attributing WolfsBane to Gelsemium APT group with high confidence. FireWood's connection to Gelsemium is uncertain, possibly shared among multiple China-aligned APT groups.

You Exist in the Long Context

https://thelongcontext.com/og.png
The author discusses how a large language model can transform a linear narrative into an immersive adventure, citing the example of a game based on their book "The Infernal Machine" that allows players to explore the Soho loft mystery of 1911. The author argues that the key to this capability is the model's increased context window, which enables it to understand and recall complex ...

DOJ filed paperwork to US District Court to force Google to spin off Chrome [pdf]

Multiple state attorneys general signed a document, likely a court filing, with various attorneys listed from Florida, Texas, California, and other states.

WhisperNER: Unified Open Named Entity and Speech Recognition

https://arxiv.org/static/browse/0.3.4/images/arxiv-logo-fb.png
WhisperNER is a novel model that integrates NER and ASR for enhanced transcription accuracy and informativeness. It outperforms natural baselines on open-type NER and supervised finetuning tasks.

Apple fights to keep DOJ antitrust suit from reaching trial

https://duet-cdn.vox-cdn.com/thumbor/0x0:2040x1360/2400x1600/filters:focal(1020x680:1021x681):format(webp)/cdn.vox-cdn.com/uploads/chorus_asset/file/25345073/STK468_APPLE_ANTITRUST_CVIRGINIA_H.jpg
Apple urged a federal judge to dismiss the DOJ's antitrust case, saying the government's complaint is speculative and lacks monopoly power evidence. The judge will decide by January whether the case can proceed to trial or some claims should be thrown out.

Code Conversion Language (2019)

The Code Conversion Language (CCL) is a byte-code interpreter in Emacs that can be used for text processing and arithmetic operations, but its I/O facilities and memory access are limited, making it unclear whether it is Turing-complete. Despite some examples of CCL programs being faster than their Emacs Lisp counterparts, the language is hard to debug and maintain, and its use may be ...

Building Databases over a Weekend

https://miro.medium.com/v2/resize:fit:1400/0*jjrNhgIlapa-Ih2P.png
Developers are often conditioned to treat databases as black boxes, but recent trends and projects like Apache DataFusion make it possible for developers to build custom databases and innovate around the developer experience. This tutorial walks through extending DataFusion to add a custom window operator for stream processing applications, demonstrating how to build a custom database and ...

January 1928: Dirac equation unifies quantum mechanics and special relativity

Paul Dirac, a 25-year-old British physicist, developed a groundbreaking theory in 1928 that combined quantum mechanics and special relativity. His equation led to the discovery of antimatter and earned him the 1933 Nobel Prize in Physics.

Scientific computing with confidence using typed dimensions

The author used to manually check units in calculations but now uses the dimensional Haskell package to ensure correctness. The package enforces type-safe dimensions at compile-time.

Show HN: Yami – An Open Source Music Player with Spotdl Integration

https://raw.githubusercontent.com/DevER-M/yami/main/.assets/pic.png
Yami is a lightweight, open-source music player built in Python with a simple UI. It supports local files and online sources like Spotify and YouTube Music.

Launch HN: Fresco (YC F24) – AI Copilot for Construction Superintendents

Arvind and Akhil from Fresco AI are building a tool to help construction superintendents manage documentation with AI. Fresco uses generative AI to create reports and punch lists from short videos or photos taken during site walks.

A Study of Malware Prevention in Linux Distributions

https://arxiv.org/static/browse/0.3.4/images/arxiv-logo-fb.png
Linux distributions have implemented measures like reproducible builds to counter malware, but active scanning is rare. Current open-source malware scanners are ineffective at detecting malicious Linux packages with high false positive rates.

I hacked the Dutch government and all I got was this t-shirt

https://jacobriggs.io/blog/app/web/upload/misc/ncsc-nl-letter.png
NCSC-NL sent a 'lousy' t-shirt and thank you letter for reporting a vulnerability. The gesture is seen as a positive approach to engaging with ethical hackers, but some question its effectiveness as a reward.

Andrew Tate's online university hacked – Chat logs, data on 800k users leaked

https://uploads.dailydot.com/2024/11/image-10.png?auto=compress&fm=png
Hackers breached Andrew Tate's online course, The Real World, revealing 325,000 users' email addresses and exposing the platform's security vulnerabilities. The breach was attributed to "hacktivism" and exposed Tate's platform, which focuses on financial investment and masculinity, to criticism and scrutiny.

Autopoietic Networks

https://gbragafibra.github.io/gifs/c1.gif
The concept of autopoiesis is simulated using a cellular automaton with binary state attribution and a scaling rule, aiming to generate self-rebuilding systems. The simulation involves logic gates, neighbor interactions, and a Φ value that mimics closure, with the goal of achieving autopoietic behavior.

Discharging Lean goals into SMT solvers

https://opengraph.githubassets.com/01d1520451280eff1d5edef8f01de6f0557feb7591e15f933436b0e07962b8bc/ufmg-smite/lean-smt
lean-smt is a Lean tactic that discharges goals into SMT solvers, currently supporting Uninterpreted Functions, Linear Arithmetic, and Bitvectors. It uses cvc5 and replays its proof in Lean, filling holes as Lean goals.

Linux connection tracking and (Slow) DNS

We're sorry, but an unexpected error occurred. Our team has been notified, and we are actively working to resolve the issue.

Why everyone missed solar's exponential growth

https://substackcdn.com/image/fetch/w_520,h_272,c_fill,f_auto,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbe5ac61f-e6fa-4df2-8c90-8a52cce74cbe_1146x1234.png
Azeem discusses how energy forecasters consistently underestimate solar power uptake, with experts unwilling to bet on its growth. He attributes this to forecasters relying on short-term empirical data rather than long-term projections that consider underlying systemic factors.

Don't Call It a Substack.

https://cdn.glitch.global/34934a9e-03cb-409c-b529-b489bc6e5d0a/parchment.jpg?v=1732054196424
Substack wants to control your content and audience for profit, limiting your freedom and potentially exposing you to hate speech. You can break free by exporting your subscribers and using alternatives like Ghost, Beehiiv, or Medium.

The Surprising Benefits of Talking Out Loud to Yourself

https://api.time.com/wp-content/uploads/2024/11/TalkingOutloudToYourself.gif?w=2400&quality=85
Talking to oneself is a common habit that can be beneficial for problem-solving, motivation, and emotional regulation. It can also help people feel more calm and confident by verbalizing their thoughts and ideas.

Electric car batteries last longer than expected (study) – ecomento.de

https://ecomento.de/wp-content/uploads/2024/11/Opel-Corsa-e-Batterie.jpg
P3 hat Daten von 7.000 Elektroautos analysiert und festgestellt, dass die Batterielebensdauer besser ist als befürchtet. Die Batterien verlieren an Leistungsfähigkeit, aber nach 200.000 Kilometern ist die Degradation nahezu horizontal.

14-Year-Old Casper Wind Farm Has Not Turned a Blade in at Least 3 Years

https://cowboystatedaily.imgix.net/Casper-Chevron-wind-farm-Dead-wind-2-11.20.24.JPG?ixlib=js-3.8.0&q=75&auto=format%2Ccompress
The Casper Wind Farm, a 14-year-old project, has been idle for years and is now considered an eyesore by some residents. Chevron, the owner, claims it will resume operations by the end of the year due to transmission constraints.

Why one would use Qubes OS? (2023)

https://dataswamp.org/~solene/static/solene-qubesos.png
I got hooked on Qubes OS due to its emphasis on security and privacy, allowing me to compartmentalize tasks and separate contexts with ease. The system's unique offer and tools make it ideal for niche users who value high security, but it requires a specific mindset and discipline to use efficiently.

An ad giant wants to control your next TV's OS

https://cdn.arstechnica.net/wp-content/uploads/2024/11/GettyImages-1301753219-640x421.jpg
An ad tech giant, The Trade Desk, is launching a new TV OS called Ventura in 2025 to help advertisers reach more people. Ventura prioritizes ad sales and tracking, offering features like ad targeting and improved user experience, but may limit options for an ad-free TV viewing experience.

Spirit Airlines CEO Got a $3.8M Bonus a Week Before Its Bankruptcy

https://substackcdn.com/image/fetch/w_520,h_272,c_fill,f_auto,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F443b0de2-a06a-4bd6-8697-1fc6d1949d8c_646x365.png
Spirit Airlines' bankruptcy is not a result of antitrust enforcement but rather poor management and a flawed business strategy. The airline's executives misled the court and shareholders, and the CEO received a $3.8 million bonus before the bankruptcy, highlighting the need for stronger regulation in the airline industry.

OpenZFS Driver for Windows

https://opengraph.githubassets.com/cf988770f855770718dbee88a350125c4ef0e72d7d85adde66f64242d1aa6ad1/openzfsonwindows/openzfs
OpenZFS is a file system and volume manager maintained by the OpenZFS community, available for Linux, FreeBSD, and Windows in beta. It's released under CDDL license with documentation on the Getting Started Page.

Pg_karnak: Transactional schema migration across tenant databases

https://www.thenile.dev/_next/image?url=%2Fblog%2F2024-11-19-distributed-ddl%2Fcover4.png&w=3840&q=75&dpl=dpl_5H4H7KTiC7QzfEeTyZXCSZgMsiey
Nile is a PostgreSQL re-engineered for multi-tenant applications that provides isolation and flexibility while preserving a single database developer experience. It uses a distributed transaction architecture with a PostgreSQL extension, transaction coordinator, and metadata store to handle DDLs across tenants and physical databases, ensuring robustness and reliability.

DOJ says Google must sell Chrome to crack open its search monopoly

https://duet-cdn.vox-cdn.com/thumbor/0x0:2040x1360/2400x1600/filters:focal(1020x680:1021x681):format(webp)/cdn.vox-cdn.com/uploads/chorus_asset/file/23951561/VRG_Illo_STK179_L_Normand_SundarPichai_Neutral.jpg
Google and the DOJ will return to DC federal court in April for a remedies trial after the DOJ proposed Google divest Chrome and possibly Android to restore competition. The DOJ also wants to restrict Google's agreements and break up the company if necessary.

Ten best selling CPUs on Amazon are all AMD chips

https://cdn.mos.cms.futurecdn.net/tKcj33a2fo4Su2UdhJdiMK-320-80.jpg
AMD dominates Amazon's best-selling CPU list with 9 out of 10 spots, led by the Ryzen 7 5700X. Intel's Core i5 13600KF is the only top 12 entry, struggling to compete with AMD's price/performance offerings.

Microsoft pushes full-screen ads for Copilot+ PCs on Windows 10 users

https://cdn.arstechnica.net/wp-content/uploads/2024/11/win10-update-message.jpeg
Microsoft is sending full-screen reminders to Windows 10 users about the end of free security updates in October 2025. Users can upgrade to Windows 11, buy a new PC, or pay $30 for an Extended Security Update to continue receiving security updates.

My Dream Thermostat

https://leontrolski.github.io/pic.png
⇦ My dream thermostat Is this too much to ask?

The Case Against Quantum Computing (2018)

https://spectrum.ieee.org/media-library/illustration-christian-gralingen.jpg?id=25586771&width=1200&height=919
Quantum computing faces significant technical challenges, including controlling millions of continuous parameters, which may be insurmountable. Despite billions spent, useful quantum computers remain unlikely in the foreseeable future, with many experts predicting 20-30 years or more.

As NASA increasingly relies on commercial space, there are some troubling signs

https://cdn.arstechnica.net/wp-content/uploads/2024/04/ltv-2022-closeup-final-1.webp
NASA's commercial space efforts are showing cracks due to unsustainable fixed-price contracts and overloading contractors with requirements. The agency must adapt to the challenges faced by its new generation of contractors to avoid failure and achieve its ambitious space exploration plans.

Tesla has the highest rate of fatal accidents among all car brands, report shows

https://sherwoodnews.imgix.net/mwphzyq69oso/en-US/assets/files/2160947144_shanghai-china-tesla-model-y-is-on-display-during-the-2024-world-ai-conference-high-level.jpg?auto=compress%2Cformat&cs=srgb
A new study by iSeeCars found Tesla vehicles have the highest rate of fatal accidents among US car brands, with a rate of 5.6 per billion miles driven. Tesla's Model Y SUV had a fatal accident rate of 10.6, more than double the average for SUVs.

Could Humans Hibernate?

https://images.aeonmedia.co/images/511b71b7-d68f-4fd5-abf2-106ab3668a2a/essay-hi-w7ry2p.jpg?width=3840&quality=75&format=auto
Hibernation is a natural state of suspended animation found in various animals, characterized by a controlled reduction in metabolism and physiological processes, and scientists are exploring its potential applications in humans for survival and therapeutic purposes. Despite decades of research, human hibernation remains a mystery, and understanding its relationship with sleep, brain ...

Refresh vs. Long-lived Access Tokens (2023)

https://grayduck.mn/2023/04/17/refresh-vs-long-lived-access-tokens/long-lived-token.jpg
Using refresh tokens with short-lived access tokens simplifies revocation, limits the impact of token leaks, and provides incremental improvements to client security and flexibility in future access grants. However, it also increases client complexity and introduces a single point-of-failure in the authorization server, which can be mitigated with proper design and redundancy.