DIY 3.5" Floppy Disk: A Remarkable Feat of Engineering

2025-08-23
DIY 3.5

Polymatt, a maker extraordinaire, successfully built a 3.5" floppy disk from scratch. The challenge wasn't just creating the casing, but replicating the incredibly thin magnetic media inside, requiring specialized PET film and chemicals. The project also involved building a custom drag knife for his CNC machine, a tool normally costing over $150. This DIY endeavor is a testament to ingenuity and persistence.

Read more
Hardware Floppy Disk

My Adventures with LLM Coding Agents: Level Up Your AI-Assisted Development

2025-08-23
My Adventures with LLM Coding Agents:  Level Up Your AI-Assisted Development

This post details a hobbyist's journey using Large Language Model (LLM) coding agents to build software beyond their skill level. The author shares hard-won tips for maximizing efficiency, including effective context management (providing relevant information without overwhelming the model), meticulous design documentation, detailed planning and task breakdown, comprehensive logging for debugging, and defensive Git strategies. The author emphasizes the importance of using tools to extract information from large files, compacting context to avoid losing the big picture, and treating the agent as a tool rather than a collaborator. By following these strategies, the author successfully completed a complex project.

Read more
Development

Voil: Edit Your Filesystem Like a Text Buffer

2025-07-15
Voil: Edit Your Filesystem Like a Text Buffer

Voil is a VS Code extension that lets you manage your filesystem like a text buffer. Say goodbye to clicking and memorizing keybindings; create, rename, and move files and directories directly in the editor with the efficiency of text editing. Voil uses hidden IDs to track files and offers a rich set of commands and customization options, including recursive listing, sorting, filtering, and running custom shell commands. It's compatible with the Vim extension and provides detailed configuration instructions and examples. Check out the demo video to see it in action!

Read more

Developer's Block: Practical Strategies to Overcome Coding Impasse

2025-08-23

Developers often experience 'developer's block,' a frustrating inability to code. This article explores two common scenarios: the paralysis of starting a new project perfectly and the stagnation of working on existing projects. Perfectionism in new projects leads to over-engineering, while existing projects can suffer from a lack of understanding, burnout, or demotivation. The article offers practical solutions such as incremental learning, recognizing fatigue and taking breaks, incremental development, prototyping, drafting documentation first, avoiding premature optimization, and releasing early and often. These strategies help developers overcome coding blocks and boost productivity.

Read more
Development

Google's Honest (and Uncommon) Take on Pixel's Water Resistance

2025-08-22
Google's Honest (and Uncommon) Take on Pixel's Water Resistance

Google's advertising materials surprisingly admit that no phone is truly waterproof or dustproof. While Pixel phones may boast an IP68 rating upon leaving the factory, this protection degrades over time due to wear, damage, or drops; liquid damage voids the warranty. This unusual transparency highlights the often-blurred line between marketing and reality in the mobile industry.

Read more

Microsoft Copilot Vulnerability: Audit Logs are Broken

2025-08-20
Microsoft Copilot Vulnerability: Audit Logs are Broken

A security researcher discovered a critical vulnerability in Microsoft Copilot: it sometimes accesses files and returns information without logging the action in audit logs. Worse, users can instruct Copilot to access files without leaving a trace. While Microsoft has fixed the vulnerability, their decision not to notify customers raises serious concerns about transparency and customer responsibility. This flaw poses a significant threat to organizations relying on audit logs for security and compliance, particularly in highly regulated industries like healthcare and finance.

Read more
Tech Audit Logs

The Curious Case of Emoji Length in JavaScript: UTF-8, UTF-16, UTF-32, and Grapheme Clusters

2025-08-22

This article delves into the discrepancies in emoji string length across different programming languages. For example, in JavaScript "🤦🏼‍♂️".length is 7, while in Python it's 5 and in Rust, 17. This stems from variations in how languages handle string encoding (UTF-16, UTF-8, etc.) and character units (Unicode scalar values, extended grapheme clusters, etc.). The author argues that remembering the length in the native encoding is reasonable, but other lengths (like extended grapheme clusters) should be computed on demand to avoid unnecessary storage overhead and synchronization issues. The article further analyzes the pros and cons of different encoding schemes, highlighting UTF-8's advantages in storage and interchange. Finally, it tackles the issue of fair length quotas, demonstrating that there's no simple way to fairly measure information density across languages, illustrating this with translations of the Universal Declaration of Human Rights.

Read more
Development String Encoding

Top Secret: A Novel Text Filtering Tool for Protecting Sensitive Information

2025-08-23
Top Secret: A Novel Text Filtering Tool for Protecting Sensitive Information

Protecting sensitive information is crucial when interacting with chatbots and LLMs. Top Secret is a new tool that combines regular expressions and Named Entity Recognition (NER) to effectively filter sensitive information, such as PII and locations, from free text. Beyond filtering, Top Secret generates a mapping to restore filtered values in responses, ensuring conversational integrity without compromising sensitive data. It also functions as a database validation tool, preventing sensitive information from being stored. Top Secret offers flexible configuration, allowing filters to be enabled or disabled as needed.

Read more

Microsoft Curbs Vulnerability Info Access for Chinese Firms

2025-08-23
Microsoft Curbs Vulnerability Info Access for Chinese Firms

Following July's SharePoint zero-day attacks, seemingly linked to a leak in Microsoft's early-bug-notification program (MAPP), Microsoft has reportedly stopped providing Chinese companies with proof-of-concept exploit code for upcoming vulnerabilities. MAPP typically gives vendors two weeks' advance notice before Patch Tuesday, but now access is restricted for companies in countries required to report vulnerabilities to their governments, including China. These companies will receive general written descriptions instead of PoC code. Security experts see this as a positive step to prevent future leaks.

Read more
Tech

Kernel Community Debates AI-Generated Patches

2025-08-23

The Linux kernel community is grappling with the rise of AI-assisted coding tools. Submissions using LLMs to generate patches have sparked debate, with proposals to add tags identifying LLM usage. However, concerns about patch quality, copyright issues, and increased maintainer burden are prevalent, leading some to suggest banning LLM-generated contributions. A consensus remains elusive, but discussions are expanding to encompass a broader AI policy, slated for further discussion at the December Maintainers Summit.

Read more
Development Code Patches

OS Yamato: A Zen-Inspired Ephemeral Digital Space

2025-08-20
OS Yamato: A Zen-Inspired Ephemeral Digital Space

OS Yamato, a newly launched operating system, challenges the conventional notion of infinite digital storage. It embraces a philosophy of impermanence, where data (notes, photos, messages) gently fades and eventually disappears, encouraging mindful presence and appreciation for fleeting moments. Built with Vue 3 and AWS Amplify, it poetically integrates weather into the user experience, making digital memories more evocative.

Read more
Development Zen Design Ephemeral

WebR: Run R in Your Browser

2025-08-23

WebR compiles the statistical language R to WebAssembly, enabling it to run directly in browsers and Node.js without needing an R server. This allows users to execute R code locally, with support for several ported R packages. While the API is under active development and mobile browsers may impose memory limitations, WebR offers a convenient way to perform data analysis directly within the browser.

Read more
Development

Making a JavaScript-Optional Online Board Game: A Case Study in Progressive Enhancement

2025-08-23

This article details how an online board game website achieved fully optional JavaScript functionality using server-side rendering, standard HTML elements, and URL parameters. The author replaced real-time updates with page auto-refresh, and used native HTML elements for dropdown menus and modals. While increasing server load and code complexity, this approach improved initial page load speed and site robustness, yielding unexpected benefits like more semantically correct HTML. However, the author concludes the extra effort isn't worthwhile unless targeting a very JavaScript-averse audience, and plans to eventually remove the extra code.

Read more
Development JavaScript-Optional

eVisa Scam: $79 Lesson in Canada

2025-08-20

The author mistakenly used a fake eVisa website, evisatravel.org, to apply for a Canadian eTA, paying $79 instead of the official $5 fee. The certificate received from the fake site had many suspicious aspects. After a chargeback, the author received a threatening email warning about a government blacklist. Despite this, the author successfully entered Canada, proving the threat was a bluff. This experience serves as a cautionary tale about fraudulent eVisa websites.

Read more

Linux Gaming Anti-Cheat: Why It's So Difficult

2025-08-23
Linux Gaming Anti-Cheat: Why It's So Difficult

The Steam Hardware Survey shows a slow but steady increase in Linux users playing games, but many popular multiplayer titles (like Valorant and League of Legends) remain unplayable due to anti-cheat limitations. This article delves into how modern anti-cheat solutions work, particularly how kernel-level drivers prevent processes from accessing game memory. The author explains why this approach is ineffective on the open Linux system and suggests alternatives for mitigating cheating on Linux, such as improved networking code and code obfuscation. While Linux gamers hope to see wider game support, the technical challenges make this unlikely in the near future.

Read more
Game

The Artist Behind TWA's Iconic Posters: David Klein

2025-08-23
The Artist Behind TWA's Iconic Posters: David Klein

David Klein, an illustrator and artist best known for his stunning posters for Trans World Airlines (TWA) in the 1950s and 60s, left a lasting legacy. TWA, one of the world's most admired airlines at the time, was a pioneer – the first to hire an African-American stewardess, introduce in-flight movies, and utilize the Boeing 747. After illustrating army manuals during WWII and working as an art director for Broadway, Klein's TWA posters became his most celebrated work, capturing the excitement of post-war air travel with a timeless style that continues to resonate today.

Read more
Design

FSF40 Photo Contest: Celebrating 40 Years of Free Software

2025-08-24

To celebrate its 40th anniversary, the Free Software Foundation (FSF) is holding a photo contest, inviting global free software supporters to share how they use free software daily. Prizes include a grand prize FSF40 T-shirt, a second-place "Fight for your user rights" bag, and a third-place free software sticker pack. Entries close August 31, 2025, with winning photos displayed at the 40th-anniversary celebration in Boston, MA on October 4, 2025. This is more than a contest—it's a tribute to the free software community.

Read more
Development photo contest

Zedless: A Privacy-Friendly, Local-First Fork of Zed

2025-08-21
Zedless: A Privacy-Friendly, Local-First Fork of Zed

Zedless is a work-in-progress fork of Zed designed to prioritize privacy and local-first principles. It removes reliance on proprietary cloud services, telemetry, and automatic crash reporting. It emphasizes bring-your-own-infrastructure, allowing users to configure providers for network services (with no defaults and disabled by default). Importantly, it avoids contributor license agreements and ensures proper licensing for all third-party dependencies.

Read more
Development

Three Tips to Conquer Difficult Problems in Software Development

2025-08-23
Three Tips to Conquer Difficult Problems in Software Development

Conquering tough problems in software development isn't easy. This article suggests three practical tips: First, actively listen to your teammates' difficulties and directly ask, "Why is this hard?" Second, encourage deep exploration of seemingly impossible solutions, investigating their feasibility under specific conditions. Even if not ultimately adopted, this process sparks new ideas. Finally, design multiple solutions; even if seemingly time-consuming, a deeper understanding of the problem provides more leverage for the final implementation. Ultimately, collective understanding is far more important than the code itself.

Read more
Development

uv 0.8.13 Experimentally Adds Code Formatting: uv format

2025-08-22
uv 0.8.13 Experimentally Adds Code Formatting: uv format

uv 0.8.13 experimentally introduces the highly anticipated `uv format` command for Python developers. This integrates code formatting directly into uv, streamlining Python workflows and eliminating the need to juggle multiple tools. Under the hood, `uv format` uses Ruff to automatically style code consistently. After upgrading to 0.8.13 or later, use `uv format` – it works similarly to `ruff format` and allows custom formatting via arguments after `--`. Note: this is experimental; future versions may change.

Read more
Development

Google Pixel 10's Mandatory Battery Health Assistance: A Controversial Move

2025-08-24
Google Pixel 10's Mandatory Battery Health Assistance: A Controversial Move

Google has confirmed that the Battery Health Assistance feature on the Pixel 10 series is mandatory and cannot be disabled. This feature gradually reduces charging speed and battery voltage to prolong battery life, a decision met with user criticism, especially following battery issues with previous Pixel A series phones. While Google argues this stabilizes battery performance and aging, the lack of user choice contrasts with competitors like Samsung and OnePlus offering longer battery lifespans. The move raises questions about whether this is a proactive measure or a reaction to potential issues within the Pixel 10's battery.

Read more

Shipping Regulations Halved Lightning Strikes Over Busy Singapore Strait

2025-08-23
Shipping Regulations Halved Lightning Strikes Over Busy Singapore Strait

A new study reveals that the International Maritime Organization's 2020 regulations reducing sulfur emissions from ships led to a nearly 50% decrease in lightning strikes over the busiest shipping lane near Singapore. Researchers believe ship emissions influence ice crystal formation and collisions within clouds, impacting lightning generation. This unplanned experiment highlights the significant, previously underestimated impact of human activity on thunderstorms and offers crucial insights into the effects of human emissions on climate change.

Read more

Japanese City Proposes Smartphone Usage Limit: Two Hours a Day

2025-08-23
Japanese City Proposes Smartphone Usage Limit: Two Hours a Day

Toyoake City in Aichi Prefecture, Japan, is drafting an ordinance recommending residents limit their smartphone use to two hours daily outside of work and school. This would be Japan's first such municipal regulation, aiming to address concerns about excessive technology use impacting health and family life. The proposed ordinance, effective October 1st, urges children to stop using smartphones by 9 p.m. (elementary school) and 10 p.m. (junior high and older). While penalties aren't included, the city hopes to encourage reflection on smartphone habits and will collaborate with schools and parents to promote healthy device use.

Read more

Librebox: An Open-Source Roblox-Compatible Game Engine Emerges

2025-08-23
Librebox: An Open-Source Roblox-Compatible Game Engine Emerges

Librebox is a new open-source game engine running Luau, aiming to replicate the Roblox Public API for seamless code compatibility. Developers gain complete control, building immersive games with a familiar interface while owning their platform. Currently in a demo stage, it boasts basic scene rendering, lighting, and shadows, with future plans including physics, networking, and a full feature set. Librebox is completely free and open-source, independent of Roblox's code or assets, offering a compelling alternative for game developers seeking freedom and ownership.

Read more
Game

Type-Safe PubSub and Registry for Gleam Actors

2025-08-23
Type-Safe PubSub and Registry for Gleam Actors

Glyn is a library providing a type-safe PubSub and registry for Gleam actors, with support for distributed clustering. Built on the Erlang syn library, it offers two complementary actor communication systems: PubSub for broadcasting events and a registry for direct command routing. Glyn seamlessly integrates with Gleam's actor model using selector composition patterns. Explicit decoders are required for type safety when sending messages between nodes in a cluster. The code examples demonstrate defining message types, creating decoders, and using PubSub and the registry for actor communication. Multi-channel actor integration is also showcased, enabling more complex communication scenarios.

Read more
Development

From Chaos to Collaboration: Using Claude Code for Enhanced Software Design

2025-08-24

Initially, the author used Claude Code with a naive, direct-instruction approach, leading to inefficiencies and errors. As tasks grew complex, limitations emerged: conversations lost crucial information, and context limits impacted code quality. The author switched to a plan-driven approach, using Claude Code to create a plan document serving as the single source of truth. Each development phase starts with a fresh conversation, the plan document providing all necessary context. This 'living document' approach enables Claude Code to update the plan during implementation, solving context limitations and improving code reliability. The result is increased efficiency and improved design skills for the author.

Read more

Running a Full Linux Desktop Inside a Docker Container: A Challenging Experiment

2025-08-23
Running a Full Linux Desktop Inside a Docker Container: A Challenging Experiment

The author attempts to run a full-fledged Linux desktop environment inside a Docker container, challenging the conventional use of Docker. After an initial failed attempt to build a custom image from scratch, the author switches to a pre-built image from Docker Hub and successfully runs an XFCE desktop environment. While encountering issues such as GPU rendering problems and Flatpak compatibility, the author ultimately achieves running a complete Linux desktop in a browser. Furthermore, the author explores solutions like Webtop and Kasm Workspaces, discovering unexpected advantages such as remote desktop access, enabling access to a high-performance desktop from a low-powered device.

Read more
Development

Ex-Dev Imprisoned for Sabotaging Ex-Employer's Network with Kill Switch

2025-08-22
Ex-Dev Imprisoned for Sabotaging Ex-Employer's Network with Kill Switch

Davis Lu, 55, was sentenced to four years in prison for sabotaging his former employer's Windows network. After being terminated, Lu activated malicious code he'd secretly embedded, causing system crashes and locking out thousands of users via a kill switch. He also deleted encrypted data from his company laptop. The act resulted in significant financial losses for the Ohio-based company. He was found guilty of intentionally damaging protected computers and will serve three years of supervised release following his prison sentence.

Read more
Development

Apple Shifts More iPhone 17 Production to India

2025-08-20
Apple Shifts More iPhone 17 Production to India

Bloomberg reports that Apple is increasingly shifting iPhone 17 production for the US market from China to India. For the first time, the entire iPhone 17 lineup will ship from India at launch. Apple is also working on an Indian-made successor to the iPhone 16E. This move aims to reduce reliance on Chinese manufacturing, though current exports to the US from India are tariff-exempt. However, iPhone sub-assemblies are largely still produced in China. Despite this, Apple announced a massive investment in US manufacturing. Conversely, the US administration plans to raise tariffs on India due to its purchase and sale of Russian oil.

Read more
Tech
1 2 23 24 25 27 29 30 31 564 565