Category: Tech

Capital Letters Make Smaller QR Codes: A URL Encoding Mystery

2025-02-25
Capital Letters Make Smaller QR Codes: A URL Encoding Mystery

Two QR codes pointing to the same URL, one larger than the other. Why? The answer isn't error correction, but encoding mode. A URL in all capital letters uses the more compact alphanumeric mode, while lowercase uses byte mode, leading to data redundancy and a larger QR code. This highlights the impact of character set choices in URL encoding on QR code size. For the smallest QR code, use uppercase letters.

Bald Eagle's Triumphant Return: A Conservation Success Story

2025-02-25
Bald Eagle's Triumphant Return: A Conservation Success Story

The American bald eagle, once on the brink of extinction, has staged a remarkable comeback. Its resurgence is a testament to successful conservation efforts, including the ban on DDT, habitat preservation, and innovative techniques like artificial incubation. From a single nesting pair in New Jersey in the 1980s, the population has soared to nearly 300 active nests in the state alone. While threats like habitat loss, pollution, and avian flu remain, the bald eagle's recovery serves as an inspiring example of environmental conservation.

Illinois Supreme Court Rules Against Public Access to Database Schemas

2025-02-25

A battle over public access to government databases reached the Illinois Supreme Court. Civic hacker Matt Chapman sought the schema of Chicago's CANVAS parking ticket database via a Freedom of Information Act (FOIA) request. The city argued releasing the schema would jeopardize security. The court sided with the city, ruling that database schemas are exempt under FOIA. This decision raises concerns about government transparency and access to public data in the digital age, prompting calls for legislative changes.

Amazon S3: Lessons Learned from 17 Years of Building a Massive Storage System

2025-02-25
Amazon S3: Lessons Learned from 17 Years of Building a Massive Storage System

This post summarizes Andy Warfield's keynote address at USENIX FAST ‘23, where he discussed the three perspectives on scale involved in building and operating a storage system the size of Amazon S3. Warfield shares his six-year experience at S3, covering everything from hard disk mechanics to customer experience. He details technical challenges like managing millions of hard drives, addressing hotspots, and leveraging replication and erasure coding for durability and performance. The article also highlights the importance of 'ownership', empowering teams to make decisions and foster innovation. A valuable read for anyone interested in large-scale distributed storage systems.

Tech

Senator Urges FTC to Enforce Transparency in Digital Goods Sales

2025-02-25
Senator Urges FTC to Enforce Transparency in Digital Goods Sales

Oregon Senator Ron Wyden has written to FTC Chair Andrew Ferguson, urging the commission to mandate that companies clarify whether consumers truly own digital goods like ebooks or video games. Wyden argues consumers deserve to know license durations, conditions for expiration or revocation, and transferability or resale rights. He calls for clear disclosure before and at the point of sale, ensuring consumers understand what they're purchasing and the guarantees involved. This follows common practices where consumers only license access, not ownership, leading to potential loss of access due to account bans or platform changes. California already prohibits using words like "buy" without disclosing licensing details, a change that prompted Valve to update its Steam checkout. Wyden emphasizes the need for FTC guidance to protect consumers and ensure fair practices.

ChatGPT Becomes Default Safari Search Engine via New Extension

2025-02-25
ChatGPT Becomes Default Safari Search Engine via New Extension

OpenAI updated its ChatGPT app with a new Safari extension, enabling users to set ChatGPT Search as their default search engine in Safari. After updating the app, users can enable the extension in Safari settings. All searches typed into the Safari search bar will then be directed to ChatGPT Search instead of Google or their current default. While there's no option to directly set ChatGPT as a preferred search engine, the extension offers a workaround.

Cutting Science Funding: A Costly Mistake

2025-02-25

The Trump administration's "Department of Government Efficiency" has frozen funding for the National Science Foundation and the National Institutes of Health, raising concerns about cuts to federally funded scientific research. The article uses the example of massage therapy for premature infants to demonstrate how seemingly odd basic science research can yield enormous social and economic benefits. It argues for the importance of long-term government investment in basic science and the need for reforms to research funding mechanisms. While short-term returns are unpredictable, history shows that investments in basic science offer high returns and are a worthwhile long-term strategy.

The Chaotic Dance of Black Hole Singularities: The Return of the Mixmaster Universe

2025-02-25
The Chaotic Dance of Black Hole Singularities: The Return of the Mixmaster Universe

This article recounts the journey of physicists exploring the chaotic phenomena near black hole singularities. In the 1960s, Misner's "Mixmaster universe" model described the chaotic changes of space and time around singularities, but was shelved due to computational limitations. Recently, with new mathematical tools and increased computational power, scientists have revisited this model, attempting to unify general relativity and quantum mechanics by studying the extreme environment of singularities to ultimately reveal the nature of spacetime. Researchers utilize Maldacena's AdS/CFT correspondence to explore chaotic behavior near singularities in simplified models, hoping to prove that previous simplifying assumptions are valid and ultimately construct a theory of quantum gravity.

Self-Domestication: How Wolves May Have Tamed Themselves

2025-02-25
Self-Domestication: How Wolves May Have Tamed Themselves

A new study suggests that dog domestication may not have been entirely human-driven. Using a statistical model, researchers found that over 15,000 years, wolves could have self-domesticated by choosing to live near humans for consistent food scraps and selectively mating with similarly docile partners. This 'food-driven' strategy allowed wolves to adapt to human life, eventually evolving into domestic dogs. The research offers new insights into animal domestication mechanisms and sheds light on the long-term co-existence between humans and animals.

Apple Exec Initially Opposed 27% App Store Commission, Court Testimony Reveals

2025-02-25
Apple Exec Initially Opposed 27% App Store Commission, Court Testimony Reveals

Apple Fellow Phil Schiller testified in court that he initially raised concerns about Apple's plan to charge a 27% commission on app purchases made outside the App Store. He argued this presented compliance risks, could create an antagonistic relationship with developers, and required Apple to audit developers. While Apple claims compliance with a 2021 court ruling allowing alternative payment methods, they only reduced the commission by 3%, prompting Epic Games to accuse Apple of “bad-faith” compliance. The case is back in court to determine if Apple violated the original order. Schiller's testimony revealed internal Apple debates on the commission, including analyses of the impact on developers using external links, considering user experience, developer adoption, and financial implications. Ultimately, Apple CEO Tim Cook and other executives decided to proceed with the commission, though with additional discounts for smaller developers.

Tech

ChatGPT Sent Me to the ER: A Life-Saving AI Interaction

2025-02-25
ChatGPT Sent Me to the ER: A Life-Saving AI Interaction

The author experienced unsettling symptoms and, despite seeing a doctor, their condition worsened. Using ChatGPT to analyze their symptoms and lab results, the AI identified critically low platelet counts, urging immediate medical attention. Initially hesitant, the author followed ChatGPT's advice, going to the ER where tests revealed a platelet count of zero. Doctors credited ChatGPT with enabling timely intervention, potentially preventing a severe outcome. The article explores AI's role in healthcare, highlighting its potential as a bridge between patients and doctors, aiding in crucial medical decisions.

Michael Larabel: 20 Years of Linux Hardware Benchmarking

2025-02-25

Michael Larabel, the principal author of Phoronix.com, founded the site in 2004 focusing on enhancing the Linux hardware experience. He's penned over 20,000 articles covering Linux hardware support, performance, graphics drivers, and more. He's also the lead developer of automated benchmarking software like the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org.

AO3: A Fan-Driven Fanfiction Archive with Brilliant Architecture

2025-02-25
AO3: A Fan-Driven Fanfiction Archive with Brilliant Architecture

Among this year's Hugo Award nominees is an unusual contender: Archive of Our Own (AO3), a fanfiction archive containing nearly 5 million fanworks—a size comparable to the English Wikipedia. But AO3's value lies not just in its massive content, but in its clever website architecture. In a time when the internet strives for human-centered sustainability, AO3 offers a lesson for the tech industry: how it elegantly solves the problem of tag proliferation, avoiding both the chaos of a completely laissez-faire approach and the inflexibility of rigid tagging systems. AO3 strikes a balance, allowing flexible tagging while using clever algorithms and community mechanisms to manage and organize tags, providing a more efficient and precise search experience for users.

Massive Data Breach at DISA Exposes 3.3M+ Individuals

2025-02-25
Massive Data Breach at DISA Exposes 3.3M+ Individuals

DISA Global Solutions, a U.S.-based employee screening company, suffered a data breach affecting over 3.3 million individuals. The breach, discovered on April 22nd, 2024, but originating from a February 9th, 2024, intrusion, exposed sensitive data including Social Security numbers, financial information, and government IDs. While DISA claims it can't definitively identify all stolen data, the incident highlights significant security vulnerabilities and raises concerns about the company's response time. The breach impacts over 55,000 businesses and a third of Fortune 500 companies.

Mysterious Illness Kills Over 50 in Northwest Congo

2025-02-25
Mysterious Illness Kills Over 50 in Northwest Congo

A mysterious illness has claimed the lives of over 50 people in northwestern Congo. The outbreak, which began on January 21st, has seen 419 cases reported with 53 deaths. The rapid progression of the illness, with most patients dying within 48 hours of symptom onset, is alarming health officials. Initial investigations suggest a possible link to children consuming bats. Samples have been sent for testing to rule out Ebola and other hemorrhagic fevers; some tested positive for malaria. The incident highlights concerns about zoonotic diseases, particularly in areas where wild animal consumption is common.

Sweden Wants Signal to Install Backdoors: A Security Nightmare?

2025-02-25
Sweden Wants Signal to Install Backdoors: A Security Nightmare?

A proposed Swedish bill would force encrypted messaging app Signal to install backdoors, allowing police and security services to access message history retrospectively. Signal's CEO vehemently opposes this, citing the creation of vulnerabilities exploitable by third parties. Even the Swedish Armed Forces have voiced concerns, stating the proposal is unrealizable without introducing significant security risks. This highlights the ongoing tension between government surveillance needs and individual privacy.

Tech

Tesla's European Sales Plummet 45%, Outpaced by Chinese Automakers

2025-02-25
Tesla's European Sales Plummet 45%, Outpaced by Chinese Automakers

Tesla's European sales plunged 45% in January, reaching only 9,945 vehicles and a market share of 1%, significantly lower than last year's 1.8%. This contrasts sharply with a 34% increase in overall European EV sales. Chinese automakers like SAIC Motor (sales up 37%, market share at 2.3%) and BYD (outsold Tesla in the UK for the first time) are outperforming Tesla. Tesla's Berlin factory is undergoing a Model Y production line revamp, which might contribute to the sales decline. Elon Musk's recent involvement in European politics, endorsing Germany's far-right AfD party, may also have negatively impacted the brand, sparking public backlash and protests.

The Rise of Independent Research: Escaping Academia's Walls

2025-02-25

This article explores the resurgence of independent research, focusing on the concept of the "gentleman scientist." Historically, many prominent scientists relied on personal wealth or family funding for their work, such as Darwin and Joule. Today, academia is often seen as the sole path to research, but this isn't necessary. The article uses Norman Borlaug as an example, showing how a lack of formal training can sometimes lead to more surprising results. While independent research lacks institutional backing and makes validation harder, it also offers greater freedom and risk-taking. The author encourages more people to pursue independent research, sharing their findings publicly to contribute to society.

Fighting Canvas Fingerprint Forgery: Detection Methods and the Arms Race

2025-02-25
Fighting Canvas Fingerprint Forgery: Detection Methods and the Arms Race

Canvas fingerprinting is commonly used for anti-fraud, but fraudsters have developed techniques to bypass detection. This post delves into how fraudsters utilize techniques from platforms like Zenrows and browser extensions such as Canvas Blocker to modify canvas fingerprints. Two detection methods are analyzed: pixel value verification and function consistency checks to identify forgery. These methods verify preset pixel colors and check native function prototypes or error stack traces to determine if a canvas fingerprint has been tampered with.

Tuta Mail Launches TutaCrypt: World's First Quantum-Resistant Email Provider

2025-02-25
Tuta Mail Launches TutaCrypt: World's First Quantum-Resistant Email Provider

Celebrating its 10th anniversary, Tuta Mail launched a major security upgrade, TutaCrypt, making it the world's first email provider with post-quantum encryption. TutaCrypt combines cutting-edge quantum-safe algorithms with traditional ones (AES/ECC), protecting emails from quantum computer attacks. All new accounts now default to this quantum-safe encryption, with a gradual rollout for existing users. Tuta Mail continues its pioneering work in secure communication, future-proofing its service for years to come.

Free Access to the History of CAD: The Engineering Design Revolution

2025-02-25

Shapr3D blog has released David E. Weisberg's "The Engineering Design Revolution," a comprehensive 650+ page history of CAD, covering key figures, companies, and systems from the 1950s to the early 2000s. Available for free online reading or download, readers are encouraged to donate to cancer research. The book details the origins and evolution of CAD technology, including the impact of companies like Applicon, Autodesk, and Computervision, providing an in-depth look at the history of CAD.

LEGO Interferometers Bring Quantum Physics to Life

2025-02-25

Researchers at the University of Nottingham have developed LEGO-based interferometer kits to make quantum science more accessible. These hands-on kits, designed for secondary school students and beyond, replicate professional optical equipment, allowing students to build and experiment with lasers, mirrors, and beamsplitters to observe interference patterns. The project, 'Photon Bricks,' has been a hit at exhibitions, with participants praising its engaging approach to complex concepts. The kits are designed to inspire the next generation of scientists and are currently being rolled out to schools in Nottingham and Cardiff.

DigiCert Attempts to Silence Open Discussion of WebPKI Security Issues

2025-02-25

Following comments by Sectigo's Chief Compliance Officer, Tim Callan, on the Bugzilla forum regarding DigiCert's certificate practices, DigiCert's lawyers attempted to suppress the discussion through the threat of legal action. Sectigo's General Counsel, Brian Holland, responded that Callan's statements were protected under the First Amendment and aimed at fostering open debate on important WebPKI issues. Holland argues DigiCert's actions damage the WebPKI's self-regulatory system and calls for industry attention to prevent similar incidents. The incident highlights WebPKI security and transparency, and the responsibilities and rights of companies in public discourse.

French Copyright Holders Push VPNs to Block Pirate Sites, Threatening Exodus

2025-02-25

In France, copyright holders are legally pressuring major VPN providers to assist in blocking pirate websites. While aiming to strengthen existing measures, VPN providers view this as a dangerous precedent, citing potential security risks and overblocking. Some are even considering withdrawing from the French market entirely. This action raises concerns about net neutrality and digital freedom, highlighting the tension between combating piracy and protecting user privacy.

Tech

Court Halts Access to Sensitive Data After Unions Sue Over Privacy Breach

2025-02-25
Court Halts Access to Sensitive Data After Unions Sue Over Privacy Breach

A US judge has ordered a halt to access of sensitive personal data after unions representing millions of teachers and nurses sued the government. The lawsuit alleges that six Department of Education (and Office of Personnel Management) employees with ties to a group called DOGE had unauthorized access to highly sensitive information, including Social Security numbers, addresses, and financial details. The judge ruled that the government failed to demonstrate a legitimate 'need-to-know' for such broad access, citing a lack of precedent and violation of data privacy regulations. This highlights significant vulnerabilities in government data security and raises concerns about the protection of personal information.

Tech

Foldable Wireless Multimodal Microneedle Drug Delivery System (fMMD): Design and Application

2025-02-25
Foldable Wireless Multimodal Microneedle Drug Delivery System (fMMD): Design and Application

Researchers have developed a foldable wireless multimodal microneedle drug delivery system (fMMD) integrating electrocardiography (ECG), photoplethysmography (PPG), and drug delivery functionalities. The fMMD features a serpentine interconnect island-bridge design for flexibility and stretchability, enabling conformal skin contact. Wireless data transmission is achieved via Bluetooth Low Energy (BLE), allowing for closed-loop feedback control by triggering drug release based on physiological signals such as heart rate. The system demonstrates promising performance in multimodal monitoring and drug delivery, holding potential for cardiovascular disease diagnosis and treatment.

Verizon and AT&T Achieve Satellite Video Call Milestones

2025-02-24
Verizon and AT&T Achieve Satellite Video Call Milestones

Verizon and AT&T have each announced breakthroughs in cellphone-to-satellite video calling, partnering with AST SpaceMobile. Verizon completed its first video call from a phone to a satellite, while AT&T achieved the same using satellites destined for its commercial network. This sets up a competitive landscape against T-Mobile's SpaceX/Starlink satellite-to-cell service, which began public beta testing for satellite messaging earlier this month. AT&T and Verizon claim T-Mobile and SpaceX's offering will harm their networks. Both companies used AST's five BlueBird satellites launched last September for their tests.

Lazarus Group Steals $1.4B from Bybit in Largest Crypto Hack Ever

2025-02-24
Lazarus Group Steals $1.4B from Bybit in Largest Crypto Hack Ever

North Korea's state-sponsored Lazarus Group orchestrated the largest cryptocurrency heist in history, stealing approximately $1.4 billion from Bybit. The sophisticated attack didn't involve traditional hacking of keys or passwords; instead, attackers exploited a vulnerability in Bybit's multi-signature Safe smart contract wallets. By subtly altering a single transaction parameter, they gained control without employees realizing the malicious intent. This highlights significant operational risks in the crypto industry, emphasizing the need for layered security and rapid incident response. Bybit is working to recover funds and collaborating with law enforcement and blockchain analytics firms.

How Math Lit Up America: The Landscape Function and the LED Energy Revolution

2025-02-24
How Math Lit Up America: The Landscape Function and the LED Energy Revolution

US residential electricity consumption has slightly decreased in recent years, primarily due to improvements in lighting efficiency, specifically the widespread adoption of LED light bulbs. Behind this energy revolution is an unexpected driver: a breakthrough in pure mathematics—the landscape function. Initially a purely mathematical discovery, this function is now central to efficient LED design. Through numerical simulations, the landscape function has helped researchers overcome the "green gap" (the lack of efficient green LEDs), accelerating LED R&D and saving US consumers billions of dollars in energy costs.

Tech

Microsoft's Secret Free Office: Ads for Access

2025-02-24
Microsoft's Secret Free Office: Ads for Access

Microsoft has quietly released a free version of Microsoft Office for Windows, allowing document editing without a Microsoft 365 subscription or license key. This free version, based on the full desktop apps, locks most features behind a Microsoft 365 paywall. It includes persistent in-document ads in Word, PowerPoint, and Excel, and only saves files to OneDrive. To access it, skip the sign-in prompt. While you can open, view, and edit documents, advanced features like add-ins, dictation, and advanced formatting are unavailable. This free Office appears to be in limited testing.

1 2 138 139 140 142 144 145 146 194 195