Natron Energy's Collapse: $1.4B NC Factory Project Scrapped, 1000+ Jobs Lost

2025-09-06
Natron Energy's Collapse: $1.4B NC Factory Project Scrapped, 1000+ Jobs Lost

California battery maker Natron Energy, which last year announced a $1.4 billion factory in North Carolina, has ceased operations, resulting in the loss of over 95 jobs and scuttling plans for 1,000+ jobs in Edgecombe County. The company's failure to secure sufficient funding or sales led to the closure of its facilities in Michigan and California. This setback is a blow to North Carolina's economic development efforts, highlighting the inherent risks in large-scale industrial projects.

Read more

Running Linux Containers on Apple Silicon: Introducing Containerization

2025-06-09
Running Linux Containers on Apple Silicon: Introducing Containerization

Containerization is a Swift-based project enabling Linux container usage on Apple Silicon. Leveraging virtualization, it offers comprehensive APIs for managing OCI images, interacting with remote registries, creating filesystems, configuring networking, managing lightweight VMs, and running containerized processes. A miniature init system, vminitd, manages in-VM processes. Building requires an Apple Silicon Mac, macOS 15+, and Xcode 26 Beta+. An optimized Linux kernel configuration ensures fast boot times. Version 0.1.0 is released, with community contributions welcomed.

Read more
Development

Recreating Photoshop: A Developer's Summer Project from 2006

2025-03-16
Recreating Photoshop: A Developer's Summer Project from 2006

In the summer of 2006, a developer, aiming to improve his manga reading experience, created a manga reader named Fiew using C++ and the Windows API. Driven by ambition, he then tackled the formidable task of recreating core Photoshop functionality, resulting in the image editor, Fedit. Fedit adhered to principles of zero installation and a single executable file, and meticulously replicated Photoshop's interface and features, including floating tool windows, a color picker, and layer management. Months of development, overcoming numerous technical hurdles, culminated in a successful thesis, a software engineering job, and the open-sourcing of Fedit's code and documentation.

Read more
Development Image Editor

1978 NOVA Documentary: AI's Boom, Bust, and Uncertain Future

2025-06-04
1978 NOVA Documentary: AI's Boom, Bust, and Uncertain Future

The 1978 NOVA documentary "Mind Machines" features interviews with AI pioneers like John McCarthy and Marvin Minsky, exploring AI's potential and challenges. Arthur C. Clarke predicts a reshaped society if AI surpasses human intelligence, prompting reflection on life's purpose. The documentary showcases early AI technologies like computer chess and simulated therapists, envisioning future AI's learning abilities, and highlighting AI's cyclical boom-and-bust history.

Read more

Animations Without Keyframes: A New CSS Trick

2025-01-12
Animations Without Keyframes: A New CSS Trick

CSS's new `@starting-style` allows creating animations without `@keyframes`. This isn't a replacement for traditional animation, but a useful CSS trick in certain situations. The article demonstrates two examples: an infinitely rotating square, and a more complex animation manipulating background color, translation, and rotation via an animated variable `--i`. While not always superior, it offers a fresh way to express animations, expanding CSS animation possibilities.

Read more

Critical Security Flaw in Jitsi's Public Instance: Unauthorized Mic and Camera Access

2025-07-24
Critical Security Flaw in Jitsi's Public Instance: Unauthorized Mic and Camera Access

A critical security vulnerability has been discovered in Jitsi's public instance, an open-source video conferencing application. Attackers can silently initiate a Jitsi meeting in the background by tricking users into visiting a malicious link, gaining unauthorized access to their microphones and cameras. Jitsi claims this is a 'feature' and refuses to fix it. The vulnerability exploits previously granted permissions, allowing attackers to capture audio and video even without the user's knowledge or interaction. The author urges Jitsi to at least remove this 'feature' from the public instance to mitigate the significant security risk.

Read more
Tech

Indian Court Orders Block of Encrypted Email Provider ProtonMail

2025-04-29
Indian Court Orders Block of Encrypted Email Provider ProtonMail

An Indian court has ordered a nationwide block of the encrypted email service ProtonMail following a complaint from a design firm alleging obscene emails were sent via the platform. The firm claims ProtonMail refused to cooperate in identifying the sender. This is not the first attempt to block ProtonMail in India; last year, a similar attempt was thwarted by Swiss authorities. ProtonMail argues that blocking the service doesn't stop cybercrime but harms legitimate users' ability to communicate securely.

Read more
Tech

Unlocking Google Search: The Secret Power of the `udm` Parameter

2025-06-21
Unlocking Google Search: The Secret Power of the `udm` Parameter

Tired of cluttered Google search results filled with Knowledge Graphs, Local Results, and Related Questions? This article unveils the lesser-known `udm` parameter in Google search URLs, allowing you to precisely control the type of results returned. Learn how to filter for web results (udm=14), images (udm=2), news (udm=12), and much more. A comprehensive list detailing country codes and their corresponding `udm` values is provided, empowering you to explore the hidden depths of Google Search.

Read more

Go Runtime: Proposal for OS-Free Execution

2025-05-07
Go Runtime: Proposal for OS-Free Execution

This proposal suggests adding a new GOOS target (e.g., GOOS=none) to the Go runtime, enabling Go programs to execute under application-defined exit functions instead of relying on arbitrary OS syscalls. This allows freestanding execution without direct OS support, a capability already implemented in the TamaGo project. The proposal advocates for upstream inclusion. Go applications built with GOOS=none would run on bare metal; all necessary support comes from the Go runtime and external Go driver packages. Key functions like CPU initialization, hardware initialization, standard output, random number generation, and system time retrieval must be defined. This significantly expands Go's applicability to environments like embedded systems, virtual machines, and UEFI.

Read more

Cybersecurity Vendor Under Attack: SentinelOne's Real-World Fight

2025-04-30
Cybersecurity Vendor Under Attack: SentinelOne's Real-World Fight

SentinelOne, a cybersecurity firm, publicly disclosed a series of attacks targeting its infrastructure and those of its partners. These attacks came from various sources, including North Korean IT workers posing as job applicants, ransomware operators probing for vulnerabilities, and Chinese state-sponsored actors. SentinelOne highlights the vulnerability of security vendors themselves and shares its experiences in combating these threats, emphasizing internal collaboration, intelligence-driven defense, and the need for increased industry cooperation to strengthen overall security.

Read more

From Report Page to SQL Injection as a Service: A Decade of Code Decay

2025-07-23
From Report Page to SQL Injection as a Service: A Decade of Code Decay

A website managing logs for millions of devices worldwide evolved from a standard reporting page to a wide-open SQL injection service over a decade. Initially, simple reporting functionality sufficed, but incremental changes accumulated technical debt, culminating in an unmaintainable 'SQL Injection as a Service'. A new engineer attempted a fix, causing a system crash by deleting data, resulting in their dismissal. The story serves as a cautionary tale: the accumulation of technical debt and security vulnerabilities can lead to catastrophic consequences.

Read more
Development code evolution

Escaping Digital Feudalism: Self-Hosting, and the Future of the Cloud

2025-07-26
Escaping Digital Feudalism: Self-Hosting, and the Future of the Cloud

The author details their journey into self-hosting, prompted by Amazon's decision to remove local backups for Kindle books. They describe their hardware setup (Lenovo P520, Proxmox, Docker, etc.) and software choices (Immich, Calibre-web, Audiobookshelf, Jellyfin), ultimately concluding that while self-hosting offers control, its complexity and limitations make it impractical for most. The article advocates for a shift towards publicly accessible, cost-based cloud services, akin to libraries providing books and media, offering everyone data storage, collaboration tools, and streaming – a vision for escaping 'digital feudalism' and achieving true digital freedom.

Read more

Drone-Based Cloud Seeding Sparks Safety Debate

2025-09-13
Drone-Based Cloud Seeding Sparks Safety Debate

Rainmaker Technology's plan to use small drones for cloud seeding faces opposition from the Air Line Pilots Association (ALPA), who argue its safety measures are insufficient and pose a significant risk. ALPA urges the FAA to reject Rainmaker's request for an exemption to carry hazardous materials on drones. Rainmaker's drones could operate near commercial airliners, raising concerns about collisions and fire hazards. The FAA's decision will set a precedent for future drone-based weather modification. While cloud seeding itself is established, the use of drones introduces new challenges and safety concerns requiring rigorous standards and testing.

Read more

Gene Drives: Should We Eradicate Mosquitoes?

2025-06-08
Gene Drives: Should We Eradicate Mosquitoes?

Scientists have developed powerful gene drive technology with the potential to eradicate mosquitoes and other pests, preventing immense suffering from diseases like malaria. Target Malaria aims to use gene editing to render Anopheles gambiae mosquitoes infertile, controlling malaria transmission. However, this raises profound ethical questions: Do we have the right to intentionally drive a species to extinction? Experts warn that while mosquitoes are annoying, their role in ecosystems is unclear, and eradication could have unpredictable consequences. The article explores the potential and risks of gene drive technology, balancing human welfare with species conservation, particularly in malaria-ravaged Africa. Ultimately, it suggests prioritizing targeting the malaria parasite itself, rather than the mosquito, to minimize risks and achieve more effective results.

Read more

NIH Speeds Up Public Access to Research Findings

2025-05-01

NIH Director Jay Bhattacharya announced the acceleration of the 2024 Public Access Policy, making all NIH-funded research findings immediately available to the public starting July 1, 2025. This move aims to increase public trust in science and ensure that taxpayer investments yield replicable, reproducible, and generalizable results benefiting all Americans. The earlier implementation will break down barriers to accessing research, fostering broader application and translation of scientific discoveries.

Read more

Kezurou-kai #39: A Deep Dive into Ultra-Thin Planing

2025-04-14
Kezurou-kai #39: A Deep Dive into Ultra-Thin Planing

I attended the 39th annual Kezurou-kai in Itoigawa, Niigata, Japan – a competition focused on creating the thinnest possible wood shavings using hand planes. Using 70mm kanna on hinoki wood, competitors aimed for sub-10 micron shavings. My team achieved decent results, but mastering sub-10 micron planing proved challenging, highlighting the crucial role of wood quality and moisture content. Beyond the competition, the event showcased various woodworking skills, tool sharpening techniques, and a passionate community. A truly inspiring experience!

Read more

WebR: Run R in Your Browser

2025-08-23

WebR compiles the statistical language R to WebAssembly, enabling it to run directly in browsers and Node.js without needing an R server. This allows users to execute R code locally, with support for several ported R packages. While the API is under active development and mobile browsers may impose memory limitations, WebR offers a convenient way to perform data analysis directly within the browser.

Read more
Development

Turning Google Sheets into Handy Web Apps: A Programmer's Tale

2024-12-31
Turning Google Sheets into Handy Web Apps: A Programmer's Tale

An Ars Technica reporter shares his journey of transforming simple Google Sheets into phone-friendly web apps using Glide. Initially created to streamline takeout ordering, the app manages local restaurant information with efficient search and filtering. He expanded his approach to create apps for recipes and pantry items, improving daily life. The article showcases the power of no-code tools and how simple solutions can solve real-world problems, highlighting ingenuity and a quest for better living.

Read more
Development

Who Needs a $120 Raspberry Pi 5?

2025-01-09

The Raspberry Pi 5 with 16GB of RAM, priced at $120, raises the question: who would buy it? While a compelling option for some, the author argues that the 2GB or 4GB versions offer better value for most users. However, the 16GB model shines for demanding applications like large language models and running multiple VMs or containers. Performance gains are also noted thanks to the new chip revision and SDRAM tuning. Ultimately, the 16GB Pi 5 targets users needing high memory and performance for specific tasks.

Read more
Hardware 16GB RAM

Lidar Can Fry Your Phone's Camera

2025-05-23
Lidar Can Fry Your Phone's Camera

A Reddit user recently discovered that car-mounted lidar sensors can permanently damage a phone's camera under certain conditions. While filming a Volvo EX90 with an iPhone 16 Pro Max, the lidar's near-infrared light fried pixels in the camera lens. Volvo has warned against pointing cameras directly at lidar sensors, highlighting the potential risks of increasingly prevalent lidar technology in autonomous vehicles. The incident underscores the growing concerns about the interaction between lidar and consumer electronics.

Read more

DoorDash Bids $3.6B to Acquire Deliveroo

2025-04-25
DoorDash Bids $3.6B to Acquire Deliveroo

British food delivery company Deliveroo announced that it has received a $3.6 billion all-stock acquisition offer from its US counterpart, DoorDash. Yahoo Finance's market analysis show, Market Domination Overtime, featured experts discussing the implications of this news for both companies and the broader food delivery market.

Read more
Startup Food Delivery

Stop AI-Shaming Em Dashes!

2025-09-15
Stop AI-Shaming Em Dashes!

This article vehemently refutes the notion that frequent use of em dashes signifies AI-generated text. The author argues that em dashes are an elegant and flexible punctuation mark reflecting the fluidity and complexity of human thought. Equating em dashes with AI writing not only misinterprets their function but also stifles the diversity and creativity of human writing. The author points out that the presence of em dashes in AI-generated text highlights AI's reliance on human writing. Protecting the use of em dashes is also about protecting the unique charm of human writing.

Read more
Misc

Deep Dive into JVM Startup

2025-01-09

Billy Korando from Oracle's Java team published an in-depth article on January 9, 2025, exploring the intricacies of JVM startup. The article provides a detailed look into the internal mechanisms of JVM initialization, offering valuable insights for Java developers. Readers are encouraged to check the video description for further information.

Read more
Development

The End of Moore's Law and the Growing Heat Problem in Chips

2025-04-16
The End of Moore's Law and the Growing Heat Problem in Chips

The slowdown of Moore's Law has led to increasing power density in chips, making heat dissipation a critical bottleneck affecting performance and lifespan. Traditional cooling methods are insufficient for future high-performance chips, such as the upcoming CFET transistors. Researchers have developed a new simulation framework to predict how new semiconductor technologies affect heat dissipation and explored advanced cooling techniques, including microfluidic cooling, jet impingement cooling, and immersion cooling. System-level solutions, such as dynamically adjusting voltage and frequency, and thermal sprinting, also aim to balance performance and heat. Future backside functionalization technologies (CMOS 2.0) like backside power delivery networks, backside capacitors, and backside integrated voltage regulators, promise to reduce heat by lowering voltage but may introduce new thermal challenges. Ultimately, solving the chip heat problem requires a multidisciplinary effort, with system technology co-optimization (STCO) aiming to integrate systems, physical design, and process technology for optimal performance and cooling.

Read more

Universal Logo's Untold Story: A Six-Month Masterpiece of Light and Shadow

2025-07-31
Universal Logo's Untold Story: A Six-Month Masterpiece of Light and Shadow

The creation of Universal Pictures' iconic logo is a tale of ingenuity and painstaking effort. Art director Alexander Golitzen, using plexiglass, phosphorescent coatings, and multiple exposures, spent six months crafting the mesmerizing rotating globe and stars. Thin plexiglass stars, coated with silver-activated zinc sulfide for high reflectivity, were individually rotated with multiple lights and filmed with a narrow aperture. The globe, painted black with an interior phosphorescent coating, had the title added in a separate pass. Multiple projections and exposures, along with a second, larger globe, were used to create the final effect. The logo's design even inspired the 'Interociter' device in the 1955 film 'This Island Earth'.

Read more

Multiple Discoveries: The Case of Prolly Trees

2025-07-01
Multiple Discoveries: The Case of Prolly Trees

Prolly trees, a novel data structure crucial to Dolt, weren't invented once, but at least four times independently. From Avery Pennarun's 2009 bup project (which predates even Noms), to Noms' 2015 coining of the term, to Inria's 2019 'Merkle Search Trees,' and DePaul University's 2020 'Content-Defined Merkle Trees,' the same fundamental data structure emerged repeatedly in different contexts. This highlights the common phenomenon of multiple discovery in science and underscores the role of demand in technological innovation. The authors, from DoltHub, discuss this phenomenon and its implications for future technology, using their own experience with prolly trees as a case study.

Read more
Development Multiple Discovery

German UBI Experiment: Full-Time Work Continues, Happiness Increases

2025-04-12
German UBI Experiment: Full-Time Work Continues, Happiness Increases

A three-year German experiment provided 122 participants with a monthly unconditional basic income of €1,200. Surprisingly, participants didn't reduce their working hours; instead, job satisfaction increased, and they were more likely to change jobs or pursue further education. The study showed that unconditional basic income didn't decrease economic activity but improved participants' mental and physical health, particularly for women, who experienced a greater sense of autonomy. This experiment challenges the conventional wisdom that basic income discourages work and offers valuable insights for future policy decisions.

Read more
Misc

Asteroid 2024 YR4: Lunar Impact Possible, Meteor Shower Likely

2025-07-26
Asteroid 2024 YR4: Lunar Impact Possible, Meteor Shower Likely

Asteroid 2024 YR4, initially feared to be on a collision course with Earth, is now projected to potentially impact the Moon in late 2032. The impact could create a visible flash and a 1-kilometer-wide crater, showering Earth with lunar material in a spectacular meteor shower. While posing no direct threat to Earth itself, the event could endanger astronauts and infrastructure on the Moon, as well as orbiting satellites. This has prompted scientists to reassess planetary defense strategies, considering the Moon's inclusion in protective measures.

Read more

DeepSeek Infrastructure Profiling Data Released

2025-02-27
DeepSeek Infrastructure Profiling Data Released

DeepSeek is publicly sharing profiling data from its training and inference framework to help the community understand its communication-computation overlap strategies and low-level implementation details. The data, captured using the PyTorch Profiler, can be visualized directly in Chrome or Edge browsers. The analysis simulates a perfectly balanced MoE routing strategy and covers training, prefilling, and decoding phases. Different configurations (e.g., EP64/TP1, EP32/TP1, EP128/TP1) and micro-batching strategies are optimized for computation and communication overlap to improve efficiency.

Read more
Development Profiling
1 2 121 122 123 125 127 128 129 596 597