You share fond memories of using QModem and ZModem, reflecting on the progress in computing and communications. You express sympathy for a loss, likely related to someone involved in these technologies.
Diaspora* web infrastructure experienced 11.3 million requests in 60 days, with 2.78 million coming from a GPTBot. This represents 24.6% of all traffic, causing infrastructure concerns.
The author created a takeout app using Glide to support local restaurants, reduce dish load, and mix up their orders. They used a spreadsheet to create a shared list that can be easily edited and searched.
Researchers discovered a new class of virus-like objects called Obelisks in human microbiomes, which may not be viruses but a new group of entities. Obelisks are diverse RNAs that code for a new class of protein called Oblins and may help bridge the gap between simple genetic molecules and complex viruses.
curl-impersonate is a modified curl that impersonates Chrome, Edge, Safari, and Firefox browsers. It performs TLS and HTTP handshakes like real browsers to avoid fingerprinting and restrictions.
SQLite is the most used database engine with over one trillion active databases, originating from a US warship in the 2000s as a solution to server downtime issues. It's open-source in the public domain, with a unique business model and test suite, and is known for its speed, flexibility, and backwards compatibility.
The talk explores the evolution of iOS spyware from Pegasus in 2016 to 2024, discussing changes in exploits, detection methods, and commercial spyware. It concludes with research topics and suggestions to improve detection.
Passkeys, a password alternative, have failed to provide a seamless user experience due to inconsistent implementations across browsers and operating systems. For now, passwords and multi-factor authentication remain essential, and users should consider using password managers and security keys for added security.
The author made a game for the Game Boy Advance using the Zig language, which they found suitable for embedded programming due to its features such as code generation and compile-time evaluation.
This eBook is a mathematics textbook that explains various mathematical concepts, including rational and irrational numbers. The book is designed for first-year university students and covers topics such as the representation of rational numbers by points on a line, the existence of irrational numbers, and the construction of sections of positive rational numbers.
An attacker can bypass BitLocker encryption on Windows 11 by abruptly restarting the computer and dumping RAM to extract full volume encryption keys. The keys can be found in memory pools, specifically under the dFVE or None tags, and used to unlock the encrypted partition.
A German YouTuber, Dominik Neumayer, successfully defended his channel against fake Nintendo copyright takedowns. He exposed the troll by investigating and eventually got Nintendo to confirm the fake lawyer's email was not legitimate.
The author argues that most people don't notice or care about technical flaws in design, photography, or entertainment, and instead prioritize convenience and ease of consumption. They suggest that the rise of streaming platforms like Netflix has led to a focus on creating content that is accessible and enjoyable for the masses, rather than striving for perfection or artistic merit.
A Linux developer created a 12-character commit SHA collision to demonstrate the issue with the "Fixes" tag, breaking tools that didn't account for collisions. This test commit can help fix tools before actual collisions occur.
KAG is a framework that uses large language models to build logical reasoning and Q&A solutions for vertical domain knowledge bases. It integrates logical and factual characteristics of knowledge graphs and supports multi-hop fact Q&A.
211
bj-rn
2024-12-30 08:38:38 UTC
66
github.com/kreitinnsoftware
Full
Share
MiceWine is a project that aims to run Windows applications and games on Android smartphones. It uses a customized build of Wine compiled for Android and Box64 to run in the best possible way. Vulkan 1.3 is Recommended for better performance and graphical precision. 1.1 works with DXVK-Stripped-Requirements, but displays various graphical issues.
Researchers are using artificial intelligence to decipher ancient texts, including those from the Herculaneum scrolls, and making significant progress in reading inaccessible sources. AI tools are helping scholars to explore ancient sources in new ways, transforming the field of papyrology and potentially leading to major discoveries.
Little Snitch is a network monitor and personal firewall for Mac that alerts you to app internet connections. It provides features like connection alerts, blocklists, and DNS encryption to keep your browsing private and secure.
ts_zip compresses text files using a Large Language Model, requiring a GPU and 4 GB RAM, with a high compression ratio but slow speed. It supports English and other languages, including source code, with deterministic and reproducible results.
Testing against a real database uncovers hidden pitfalls and issues that may surface as the application matures. Real database tests ensure data integrity, handle default values, and catch errors sparked by schema changes or new validations.
Insurance companies have been criticized for denying mental health coverage, with judges finding that some doctors working for these companies engage in "selective readings" of medical evidence and ignore opposing opinions.
RWKV is a parallelizable RNN with great LLM performance, combining the best of RNN and transformer. It offers linear time, constant space, and fast training with infinite context length.
Apple criticizes Meta for making 15 interoperability requests under EU's Digital Markets Act, claiming they could compromise user privacy and security. Meta responds by accusing Apple of using privacy concerns as an excuse to block access.
Evolv, a company providing AI-powered weapons scanners, has been involved in public failures and misleading claims about its technology. The Federal Trade Commission has entered a settlement with Evolv, forcing the company to stop making false claims about its effectiveness in detecting weapons.
China plans to build a 10-megawatt thorium-based molten-salt reactor in the Gobi Desert by 2030. The reactor will use thorium-232, which is more abundant than uranium-235, to generate electricity and reduce dependence on uranium.
The author is building a cross-platform game engine with a mix of C and Ruby, and aims to pre-compile Ruby code into machine code for faster performance. By using MLIR and targeting C instead of machine code, the author was able to build a functional compiler in a few thousand lines of code and achieved a 30% speedup in benchmarks.
144
Luc
2024-12-30 09:26:21 UTC
133
twitter.com/alex_avoigt
Llama
Share
Volkswagen Group collects movement data from hundreds of thousands of vehicles, including owners' information, and stores it online without protection. This data reveals private lives and sensitive information, including intelligence and military activities, due to poor protection and long-term storage.
The author tested LLMs on Advent of Code 2024 and surprisingly found they didn't perform as well as expected. The models struggled with unseen problems and had issues with timeouts and exceptions.
panel-graphic-walker is a Python library that integrates interactive data exploration into notebooks and Panel applications with a Tableau-like interface. It allows effortless creation of dynamic visualizations, analysis of datasets, and building of dashboards within a Pythonic and intuitive interface.
The article discusses the limitations of Linux as a desktop operating system, citing issues with software compatibility, hardware support, and community engagement. Linux distributions are often incompatible with older software and hardware, and the community is not welcoming to new users.
The fly scene in Once Upon a Time in the West is a 100-second set-piece where Jack Elam's character Snakey captures a fly in his gun barrel, allowing the actor to perform facial gestures in prolonged close-ups. The scene is an homage to and send-up of Elam's screen presence, celebrating and parodying his evil look.
The PowerPoint presentation style often reduces the analytical quality of presentations by promoting a presenter-oriented, hierarchical, and low-resolution format that can lead to over-generalizations, imprecise statements, and a lack of context. To improve presentations, it is recommended to use high-resolution handouts, annotated diagrams, and other visual aids that allow for ...
Ming-chi Kuo predicts Apple's M5 series will be fabbed on TSMC's N3P node with improved packaging and separate CPU and GPU designs. The M5 series is expected to enter production in 2025 and 2026 with potential performance gains and improved AI inferencing.
The Homa transport protocol is a new alternative to TCP and UDP, designed for data-center applications with low latency and high throughput. It removes overhead from TCP and takes advantage of current data-center networking hardware, with a focus on minimizing latency between requests and responses.
Researchers reverse engineered TI's SimpleLink MCU RF hardware, creating an unofficial reference manual to unlock its full potential. They also decoded the DSP Modem cores and developed firmware patches to control and modify the RF subsystem.
Employer.com acquired Bench, a payroll and accounting platform, and will revive its platform with customer data access. Customers can choose to port their data or stay with the new ownership, with some employees being called back to work for continuity.
A Florida appeals court ruled against a clean water measure in Titusville, citing a 2020 state law that prevents local governments from giving rights to bodies of water. The law was spearheaded by Republican Sen Blaise Ingoglia in 2020.
A single integer subtraction instruction can approximate 1/x to 3 bits using 0x7effffff, which adjusts exponent and mantissa. This method is less useful due to more accurate reciprocal approximations in modern CPUs.
The user is re-implementing the World3 computer model as a web application to better understand its inner structure. The model is a toy and should not be used for serious investigation, but it allows users to adjust parameters such as resource depletion and consumption.
86Box is a low-level x86 emulator for older IBM PC systems and software, supporting various operating systems and peripherals. It's open-source and can be used with a manager application or command line for easier handling.
We introduce Gradient Agreement Filtering (GAF) to improve distributed deep learning optimization by reducing gradient variance and memorization. GAF improves validation accuracy by up to 18.2% and reduces computation nearly an order of magnitude.
The University of Chicago's Regenstein Library houses over 800,000 volumes related to South Asia, a treasure trove acquired through the US PL-480 programme which exchanged grain for books from India. The programme, launched in 1954, had unexpected consequences, enriching collections at US universities but also creating knowledge gaps in South Asia due to the removal of literary resources.
To get promoted to staff engineer, you must be known and valued by your organization for successfully leading projects that the company prioritizes. Your manager must also be switched on and fully on board, and you need to have shipped projects that the company cares about.
User is trying to stay productive after losing job, focusing on morning routine including exercise, journaling, and work. User recommends starting day with activities that bring happiness and skill development.
The Linux kernel represents processes using two main data structures: task_struct, which tracks execution state, and mm_struct, which manages memory state, including page tables and memory segments. Understanding these data structures is crucial for context switching operations, and the kernel uses them to safely switch between different execution contexts, including user-to-kernel mode transitions.
A Lua script defines a rectangle shape with width 10 and height 20, then prints its width using a switch statement. The switch statement uses a table to map shape types to their respective functions.
81
zdw
2024-12-30 03:47:29 UTC
3
abuseofnotation.github.io
Llama
Share
A book called "Category Theory Illustrated" offers a beginner-friendly introduction to category theory through clear explanations, diagrams, and examples. It's recommended for programmers, managers, and anyone who values clear thinking and explanations.
Researchers created MultiCodeBench, a 2,400 task benchmark covering 12 domains and 15 languages, to evaluate AI-driven programming assistants. The benchmark reveals performance differences across domains and provides insights for developers and model developers to improve code generation capabilities.
You're a versatile professional with diverse skills, but your non-traditional career path makes it hard to find a job. You need to find companies that value adaptability and continuous learning.
Onramp is a virtual machine that can compile Doom from scratch on any platform with a kernel and coreutils. It's a tool for xenocomputing, allowing us to preserve and share our culture and computing history with future civilizations.
ProPublica investigates abuses of power and holds the powerful accountable. Their reporting on homelessness reveals ineffective and inhumane policies that worsen health outcomes and erode public compassion.
David Chalmers argues that consciousness may be present in simple systems like thermostats, with each information state corresponding to a phenomenal state. He suggests that consciousness is a fundamental property that should be widespread, occurring even in simple systems and throughout the universe.
Providers marked as "Beta" are still being tested and may have limited functionality or occasional issues. For production use, we recommend using the stable providers (AWS S3, Google Cloud Storage, or Cloudflare R2).
Prof Archibald Montgomery Low predicted some accurate technological advancements a century ago, including radio alarm clocks, personal radios, and moving pavements. His other predictions, such as synthetic felt suits and women growing beards, were less accurate.
Debuggers can step into uninteresting function calls, causing time-consuming and distracting debugging. Various debuggers and IDEs provide features to skip or step over system and non-user code, improving debugging efficiency.
The user aimed to create the smallest possible binary for a 'Hello World' program, initially in Rust but eventually in assembly, to understand the minimal binary size and optimize it. Through various steps, including using a 32-bit architecture, removing symbols, and creating an ELF header, the user was able to reduce the binary size from over 4,500 bytes to 167 bytes.
54
arunc
2024-12-30 09:21:15 UTC
47
github.com/partialvolume
Llama
Share
ShredOS is a USB bootable Linux distribution designed for securely erasing entire disk contents using the nwipe program, supporting both 32-bit and 64-bit processors and various wiping methods. It can be downloaded as pre-built .img or .iso images, or built from source, and can be used on headless systems or systems with faulty display hardware via a telnet server.
The author is building a computer with his daughter, comparing the simplicity of old computers to the complexity of modern ones. He worries that kids today won't be able to learn computing on their own like he did.
curl now supports assigning variables to hold partial file contents using byte ranges. This is done by appending ;[n-M] to the filename, where N and M are byte offsets.
You are building a digital computer from basic logic gates and chips, starting with NAND gate truth tables and progressing to more complex components like DMUX and MUX. Your goal is to build a full PC and then write an Assembler in C.
Magnus Carlsen quit a chess tournament after being told to change his jeans, but FIDE has now relaxed its dress code to allow 'elegant minor deviations'. Carlsen will return to the championships after FIDE rewrote the rules.
A developer rebuilt Mono from source to remove prebuilt binaries and improve bootstrappability, sharing their experiences and lessons learned. The project involved overcoming various challenges, including library incompatibilities and security concerns, to create a self-hosting compiler.
Smokers can lose up to 10 years of life if they don't quit, with each cigarette shortening life expectancy by 20 minutes. Quitting smoking can boost life expectancy by a week if stopped by February 5 and a month if stopped by August 5.
Rite Aid filed for bankruptcy and closed 470 locations in 2023, shrinking its footprint by 20%. The company's struggles are due to fierce competition from Walmart and Amazon, combined with massive debt and ongoing legal battles.
A new scientific study predicts human civilization is on the brink of a 'giant leap' in evolution due to emerging clean energy and technologies. However, rising authoritarianism and far-right politics threaten to derail this progress.
The author transitioned from entrepreneurship to employment after 7 years, seeking financial stability and new learning opportunities. They found the corporate environment challenging but rewarding, learning to adapt and channel their skills into areas of greater impact.
Canadian developer Wes Winder fired his team for AI tools but later needed web developers, sparking derision. Critics argue AI can aid engineers but not replace them, highlighting the need for human experience in tech.
The user optimized ruby/json performance by reducing setup cost, reusing a JSON::State object, and using stack allocations. They also improved performance by inlining functions and using Ruby's Variable Width Allocation to reduce malloc calls.
The paper discusses the problems of dealing with time in computers, including the lack of precision and context in time notations, and proposes a solution called the LOCAL-TIME concept that uses a standardized notation to represent time. The LOCAL-TIME concept includes features such as support for multiple time zones, daylight saving time, and relative times, and uses a compact and efficient ...
DOTS is a low-cost, environmentally-friendly data storage method that can be stored in normal office environments. It's a stable and recoverable method for preserving legal, cultural, and historical data for 100+ years.
A new QR-style code is being introduced to replace traditional barcodes, containing more information such as sell-by dates and prices. The global standard for barcodes, GS1, aims to have all retailers worldwide able to read the new codes by 2027.
A small satellite called Beesat-1 was launched in 2009 by TU Berlin and was repaired by a hacker named PistonMiner in 2023 after being inactive for 10 years. PistonMiner restored Beesat-1 to its factory state and made it fully functional again for the next 20 years.
You need to process client code in the background but they hate storing it unencrypted on your database, and you're looking for a solution that allows client access and control while still allowing you to process the data via APIs. You've considered options like customer-managed keys, self-hosting, and confidential computing, but are unsure which approach to take and how to address client ...
Bench has been acquired by Employer.com, a talent acquisition and workforce management solutions company. Employer's plans for the Bench team and data export are unclear, pending further information.
Nicholas Carlini is letting a different language model rewrite his website homepage each day for 12 days. He's testing the models' ability to generate factual knowledge and visually appealing webpages.