FTC Warns Big Tech: Don't Sacrifice Data Security for Foreign Governments

2025-08-26
FTC Warns Big Tech: Don't Sacrifice Data Security for Foreign Governments

The FTC chairman, Andrew N. Ferguson, sent a letter to major US tech companies, including Google, Apple, and Microsoft, warning against complying with foreign government demands that weaken data security, compromise encryption, or censor content. Ferguson stressed that weakening security at a foreign government's request, especially without user notification, violates the FTC Act and exposes companies to legal action. He specifically cited the EU's Digital Services Act and the UK's Online Safety Act as examples. The FTC warns these laws undermine American users' freedom and data security, reminding companies of their obligations under the FTC Act regarding data security and privacy. The letter follows recent events like Apple's temporary removal of iCloud end-to-end encryption in the UK, which was later reversed.

Read more
Tech

Walmart's Tech Division Fires 1200 Contractors Amidst Corruption Scandal

2025-08-25
Walmart's Tech Division Fires 1200 Contractors Amidst Corruption Scandal

A major corruption scandal at Walmart's Global Tech division resulted in the sudden termination of 1200 technology contractors. A vice president was found to have orchestrated a years-long kickback scheme involving millions of dollars in payments from contracting agencies seeking preferential treatment. This incident exposes systemic corruption within the technology industry's outsourcing ecosystem, with layered subcontracting creating opaque accountability and fostering corruption. The Department of Justice has increased prosecutions of visa fraud and kickback schemes within IT consulting firms, while tighter regulations on H-1B visas aim to curb the abuses.

Read more

Sewage: From Waste to Resource

2025-08-27
Sewage: From Waste to Resource

This article traces the history of sewage treatment, from ancient civilizations using human waste as fertilizer and fuel to the rise of modern sewage treatment and the resurgence of interest in sewage as a resource. It explores the various resources found in sewage, including energy, water, minerals, and information, and the potential of using sewage for disease surveillance and public health management. From the sophisticated drainage systems of ancient Rome to modern wastewater treatment plants and the potential of sewage as a valuable data source, this article showcases humanity's ongoing exploration and innovation in sewage treatment technology.

Read more

Reverse-Engineered: High-Res Raspberry Pi Internal Scans Released

2025-08-26

Following Jonathan Clark's and TubeTime's reverse engineering efforts on the Raspberry Pi Zero 2 W and Compute Module 5 respectively, and their subsequent release of schematics and processes, the author discovered they possessed high-resolution Lumafield scans of most modern Raspberry Pi models (excluding the larger keyboard form factor Pis). These scans, offering detailed internal views, are now publicly available for community exploration and analysis.

Read more
Hardware 3D Scans

Areal: Are.na's Custom Typeface – A Revival of Arial

2025-08-27
Areal: Are.na's Custom Typeface – A Revival of Arial

Are.na, in collaboration with design studio Dinamo, unveils Areal, a custom typeface. Instead of a simple copy, Areal is a meticulously redrawn and rebuilt "revival" of Arial, based on its earliest internet version. This collaboration stems from a shared design philosophy and a deep exploration of Arial's history and cultural significance. Areal boasts technical improvements and dark mode optimization, enhancing user experience. The update acts as a refresh for Are.na, retaining its original style while incorporating modern design principles.

Read more
Design

macOS CLI Tools: Stop Using ~/Library/Application Support!

2025-08-26
macOS CLI Tools:  Stop Using ~/Library/Application Support!

Many macOS command-line tools incorrectly store configuration files in ~/Library/Application Support, contradicting user expectations and the XDG standard. The article argues that popular libraries and dotfile managers adhere to the XDG standard, placing config files in ~/.config. The author contends that CLI tools should follow this convention for improved user experience and consistency; only GUI applications should utilize ~/Library/Application Support.

Read more

Nuclear Batteries: A Comeback for Long-Lasting Power?

2025-08-25
Nuclear Batteries: A Comeback for Long-Lasting Power?

In the 1970s, nuclear-powered pacemakers were implanted, but their use ceased due to radioactive waste disposal issues. Now, advancements are reviving nuclear battery research, targeting robots, drones, and sensors. New designs boast decades- or even centuries-long lifespans and higher energy density. However, commercialization faces cost, safety, and regulatory hurdles. The key lies in finding suitable markets that balance the advantages with the complexities of radioactive waste management.

Read more
Tech

German ISP Changes DNS After Website Exposes Copyright Blocking Organization

2025-08-24

A major German ISP altered its DNS settings after the exposure of the CUII, a private organization deciding website blocks without transparency or judicial oversight. The author built cuiiliste.de to track blocked domains, as the CUII refuses to publish its list. The CUII previously mistakenly blocked defunct websites. ISPs initially used notice.cuii.info to indicate blocked sites, but later stopped, making blocked sites appear nonexistent. However, Telefonica (parent of o2, Germany's fourth-largest ISP) continued this method. After Telefonica checked its own test domain, blau-sicherheit.info, on the author's site, they changed their DNS to stop using notice.cuii.info, making tracking CUII blocks harder. This raises suspicions of the CUII trying to bury its mistakes.

Read more
Tech

decode-kit: A Lightweight TypeScript Runtime Data Validation Library

2025-08-25
decode-kit: A Lightweight TypeScript Runtime Data Validation Library

decode-kit is a lightweight, zero-dependency TypeScript library for validating arbitrary runtime data. It uses assertion-based validation that refines your types in-place—no cloning, no transformations, and minimal runtime overhead. decode-kit validates your data and narrows its type directly; your original values remain unchanged. It employs a fail-fast approach, throwing a detailed error on the first validation failure, including the location and expected schema. Supporting various data types (strings, numbers, booleans, arrays, objects) with configurable rules, decode-kit outperforms libraries like Zod due to its in-place type assertion, making it ideal for performance-critical applications.

Read more
Development

Calculating Credit Card Debt with Code: Is Math Essential for Programmers?

2025-08-24
Calculating Credit Card Debt with Code: Is Math Essential for Programmers?

This article explores whether math is essential background knowledge for programmers. By building an Elixir program simulating credit card repayment, the author demonstrates how simple formulas and programming can solve real-world problems, such as calculating compound interest and repayment schedules. The program's simulation shows that slightly increasing the minimum payment percentage or adding a small extra monthly payment significantly reduces repayment time and saves substantial money, highlighting the importance of understanding compound interest and financial planning. Even without advanced math, practical application is shown.

Read more
Development

Global Exchanges Warn of Risks Posed by Tokenized Stocks

2025-08-26
Global Exchanges Warn of Risks Posed by Tokenized Stocks

The World Federation of Exchanges (WFE), representing the world's largest stock exchanges, has warned regulators about the risks of so-called tokenized stocks. These blockchain-based tokens mimic equities but lack the same rights and safeguards, potentially harming market integrity. The WFE, in a letter to the SEC, ESMA, and IOSCO, highlighted platforms like Coinbase and Robinhood's foray into this nascent sector, emphasizing that these 'tokenized stocks' are not equivalent to actual shares. The WFE urged regulators to apply securities rules to these assets, clarify legal frameworks, and prevent misleading marketing, citing potential investor losses and reputational damage to issuing companies.

Read more

Python 2025: Data Science Dominates, Async & Rust Rise

2025-08-25
Python 2025: Data Science Dominates, Async & Rust Rise

The 2025 Python Developers Survey reveals data science now comprises over half of Python development, with Pandas and NumPy leading the way. Despite many using older Python versions, significant performance gains (up to 42%) are available in newer releases. Web development shows resurgence, with FastAPI framework surging in popularity. Rust is increasingly integrated for performance boosts. Async programming and multithreading are gaining traction, with Python 3.14 fully supporting GIL-free threading. Documentation is the top learning resource, and AI tools are rapidly gaining adoption.

Read more
Development

Cornell's Microwave Brain: An Analog Chip Revolutionizing AI

2025-08-25
Cornell's Microwave Brain: An Analog Chip Revolutionizing AI

Researchers at Cornell University have unveiled a groundbreaking analog chip, dubbed the "microwave brain," capable of simultaneously processing ultrafast data and wireless communication signals. Unlike traditional digital computers, this chip leverages the physics of microwaves to mimic the human brain's neuronal pattern recognition and learning, achieving higher efficiency with lower power consumption. Operating at tens of gigahertz with a mere 200 milliwatts, it boasts 88% accuracy in classifying wireless signals. Its compact size allows integration into smartwatches and phones, enabling AI capabilities without cloud connectivity. Further applications include enhanced hardware security, anomaly detection in wireless communication, and improved radar and radio signal processing.

Read more

Juno's Jupiter Revelation: Challenging Our Understanding of Solar System Formation

2025-08-25
Juno's Jupiter Revelation: Challenging Our Understanding of Solar System Formation

NASA's Juno probe, defying expectations, continues to unravel Jupiter's mysteries. Far beyond its planned lifespan, Juno has revealed a Jupiter unlike any previously imagined: bizarre geometric storms, a surprisingly light and fluffy core, and an unusual ammonia distribution in its atmosphere. Juno's discoveries not only reshape our understanding of Jupiter but also challenge existing theories of solar system formation. Key findings include a core that's neither solid nor gaseous, but a diffuse mix of both, and the discovery of "ammonia ice rain" in Jupiter's atmosphere. While its mission is nearing its end, Juno's legacy is indelible.

Read more
Tech Juno

PEP: A New Ultra-Efficient Compression Format for Pixel Art

2025-08-25
PEP: A New Ultra-Efficient Compression Format for Pixel Art

PEP is a novel image compression format specifically designed for low-color pixel art (≤16 colors is optimal, up to 256 colors are supported). It uses "Prediction by Partial Matching, Order-2" compression, which is 2-10x slower than GIF, PNG, and QOI, but often compresses images 20-50% smaller than GIF/PNG (and multiple times smaller than QOI). If compressed image size matters, PEP is for you. It sits somewhere between GIF and WEBP in terms of speed/compression tradeoff. This is currently experimental, but a C header is provided for use.

Read more
Development

Korean Air's $50B Boeing Deal: A Giant Leap for Growth

2025-08-27
Korean Air's $50B Boeing Deal: A Giant Leap for Growth

Korean Air announced a massive $50 billion deal with Boeing, its largest-ever investment, to purchase 103 next-generation aircraft, spare engines, and long-term engine maintenance contracts. The agreement, signed during President Lee Jae Myung's visit to Washington, includes various Boeing models (777-9, 787-10, 737-10, and 777-8F freighters) and strengthens ties with the US aviation industry. This strategic move aims to fuel post-Asiana Airlines merger growth, streamline its fleet for improved efficiency and lower emissions, and enhance customer experience.

Read more

Mob Programming: How Collaborative Coding Solves Persistent Development Problems

2025-08-24

This article explores how mob programming effectively addresses persistent issues in software development. The author observes that many problems, such as communication bottlenecks, decision-making paralysis, and technical debt, simply fade away with this approach. Mob programming encourages Agile methodologies, fostering face-to-face collaboration and a continuous focus on code quality and simplicity. This leads to rapid problem-solving, reduced wait times, and increased efficiency. It minimizes reliance on email and extensive documentation, promoting close teamwork and knowledge sharing, ultimately improving overall software development efficiency and quality.

Read more

Monodraw: System Requirements and FAQs

2025-08-27

Monodraw requires macOS 11 Big Sur or later. Older macOS versions can use v1.3 (macOS 10.10 Yosemite) or v1.5 (macOS 10.14 Mojave). The command-line tool is only included in versions downloaded directly from our website and purchased from our store due to App Store sandbox restrictions. Feedback can be sent via email or tweet @Monodraw. Your email address will not be shared with third parties; it's only used for important updates and product news. A press kit is available for download, and educational pricing is offered. Monodraw does not collect any user data.

Read more
Development

AI Coding Subscriptions vs. Top-Tier CPUs: A Productivity Showdown

2025-08-24

While AI coding subscriptions like Cursor are all the rage, costing upwards of $500 annually, the author argues that investing in a high-performance CPU offers a superior return. A top-end CPU like the AMD Ryzen 9 9950X costs roughly the same but provides a dramatic performance boost, often exceeding a 10x improvement in compile times. Benchmarks comparing CPUs across generations highlight the significant productivity gains from superior hardware. The author concludes that businesses should prioritize high-performance hardware over solely relying on AI tools for productivity improvements.

Read more
Development

From Ruby to Python: A Programmer's Evolving Preferences

2025-08-26

A seasoned Ruby programmer shares their journey of evolving programming language preferences. Initially, they cherished Ruby's elegance and conciseness, but over time, Python's improvements, especially the introduction of type hints and pattern matching, shifted their perspective. They found Python's strengths in team collaboration and ultimately chose it as their primary language, highlighting the importance of practicality and team dynamics in a programmer's language choice.

Read more
Development

The Busy Beaver Game: A Race to the Universe's Edge

2025-08-25
The Busy Beaver Game: A Race to the Universe's Edge

Mathematician Tibor Radó's Busy Beaver game challenges finding the longest-running Turing machine for a given number of rules. Recent years have seen a thrilling competition between Shawn Ligocki and Pavel Kropitz in the BB(6) challenge, pushing the boundaries of computation. Their discoveries resulted in runtimes exceeding the number of atoms in the universe, showcasing both the incredible advancements in computing power and the ingenuity of algorithms.

Read more

F-35 Crash: 50-Minute Airborne Conference Call Couldn't Save $200M Fighter Jet

2025-08-27
F-35 Crash: 50-Minute Airborne Conference Call Couldn't Save $200M Fighter Jet

An F-35 fighter jet crashed in Alaska due to ice in the landing gear preventing proper deployment. The pilot spent 50 minutes on a conference call with Lockheed Martin engineers trying to troubleshoot the issue before ejecting. The investigation revealed significant water contamination in the aircraft's hydraulic system and a failure to heed warnings about sensor issues in extreme cold, leading to flawed decision-making and the loss of the $200 million aircraft.

Read more

1700-Year-Old Roman Wine Bottle Found Intact

2025-08-24
1700-Year-Old Roman Wine Bottle Found Intact

A remarkably preserved Roman wine bottle, dating back to between 325 and 359 AD, has been unearthed in Speyer, Germany. Discovered in the tomb of a 4th-century Roman nobleman, this 1.5-liter vessel, nicknamed Römerwein, is the oldest known unopened wine bottle. While the wine's alcohol content is likely diminished, it remains sealed, its contents diluted with various herbs. The article also highlights a team of scientists in Catania, Sicily, who recreated ancient winemaking techniques, producing a modern equivalent to this ancient beverage.

Read more

C++-style OOP in C: Kernel Services via Function Pointers

2025-08-27
C++-style OOP in C: Kernel Services via Function Pointers

This article details how the author implemented a virtual table (vtable) mechanism in their operating system kernel using C's function pointers and structs, mimicking object-oriented programming. This approach enables unified management of kernel services like starting, stopping, and restarting, and allows for flexible scheduling policy changes without extensive code modification. The author explains the implementation and application of vtables with examples of device drivers and service management, discussing the advantages and disadvantages. While the C syntax leads to slightly verbose code, this method enhances readability and maintainability, improving kernel flexibility and extensibility.

Read more
Development

SmallJS: An Elegant Smalltalk-80 Compiler for JavaScript

2025-08-25

SmallJS is a free and open-source implementation of the elegant Smalltalk-80 language, compiling to JavaScript that runs in modern browsers or Node.js. Its file-based architecture allows development in your favorite IDE, with default support for Visual Studio Code, including syntax highlighting and debugging. Fully object-oriented and highly customizable, SmallJS maintains familiar JS counterparts for class and method names. It boasts built-in libraries for both browser (DOM manipulation, events, CSS) and Node.js (HTTP server, Express, databases, file system, multi-threading) environments. Several example projects are provided to get you started quickly.

Read more
Development

Provider-Agnostic CAS Cache with Pluggable Codecs and Generation Store

2025-08-25
Provider-Agnostic CAS Cache with Pluggable Codecs and Generation Store

cascache is a provider-agnostic Compare-And-Set (CAS) cache featuring pluggable codecs and a generation store. It offers safe single-key reads (no stale values), optional bulk caching with read-side validation, and an opt-in distributed mode for multi-replica deployments. Cascache ensures CAS safety using generation snapshots, supports various underlying stores (Ristretto, BigCache, Redis) and codecs (JSON, Msgpack, CBOR, Proto), and provides both local and distributed generation storage modes for high performance and availability.

Read more
Development

The AI Adoption Gap: Why 95% of Enterprise Pilots Fail

2025-08-19
The AI Adoption Gap: Why 95% of Enterprise Pilots Fail

A new MIT report reveals a stark reality: while generative AI holds immense promise, most enterprise initiatives aimed at rapid revenue growth are failing. Only about 5% of AI pilot programs achieve significant revenue acceleration; the vast majority stall, yielding minimal impact. The research highlights that the problem isn't the AI models themselves, but rather a 'learning gap' in enterprise integration. Successful AI deployments hinge on strategic tool selection (purchasing from specialized vendors and building partnerships boasts a 67% success rate), empowering line managers to drive adoption, and choosing tools that deeply integrate and adapt over time. The report also underscores the prevalence of 'shadow AI' and the ongoing challenge of measuring AI's impact on productivity and profit.

Read more

OAuth 2.0: Securely Authorizing Third-Party App Access to Your Data

2025-08-25
OAuth 2.0: Securely Authorizing Third-Party App Access to Your Data

OAuth 2.0 is an authorization protocol allowing users to grant third-party apps access to their account data without sharing passwords. This article details the OAuth 2.0 workflow, including user authorization, authorization code retrieval, access token exchange, and emphasizes security measures like avoiding direct access token transmission in URLs. Key OAuth 2.0 terminology is explained, such as resource owner, OAuth client, authorization server, and resource server, along with front-channel and back-channel concepts. The article also covers PKCE for backend-less applications.

Read more
Development

Annotated Transformer: A Line-by-Line Implementation

2025-08-26

This document presents an annotated, line-by-line PyTorch implementation of the Transformer paper. It reorders and removes some sections from the original paper and adds comments throughout. The notebook provides a complete, runnable implementation, explaining the Transformer architecture (encoder, decoder, attention, positional encoding, etc.), training process, and a real-world example (Multi30k German-English translation).

Read more
Development

The AI Hype Bubble: Expectations vs. Reality

2025-08-25
The AI Hype Bubble: Expectations vs. Reality

Current expectations for AI are overblown, with many companies finding that AI's ROI is far lower than anticipated. A MIT report reveals that 95% of companies that have adopted AI haven't seen any meaningful return on their investment. While AI tools are widely used, they're primarily employed for simple tasks like drafting emails and basic analysis, with complex tasks still dominated by humans. Some companies are even pulling back on AI investments; for example, the Commonwealth Bank of Australia is bringing back call center employees previously replaced by AI. AI valuations are overinflated, echoing the dot-com bubble of the 1990s, and the market is already showing signs of correction. While AI is important, for most companies, it's failing to deliver on its gold-plated promises.

Read more
Tech
1 2 19 20 21 23 25 26 27 565 566