Streamlining Monorepo Development with Turborepo and pnpm

2025-08-20
Streamlining Monorepo Development with Turborepo and pnpm

This guide outlines best practices for developing, testing, and submitting code within a Turborepo-based monorepo. It covers efficient methods for navigating, installing, and creating new React packages using pnpm, leveraging Vitest for targeted testing, and ensuring code quality with ESLint and TypeScript. The guide emphasizes running linters and tests before commits and provides a clear PR title format.

Read more
Development

An Infinitely High Stack of Blocks? Impossible!

2025-08-20

This paper explores a counter-intuitive physics problem: the stability of an infinitely extending stack of blocks. By analyzing torque and center of mass, the author demonstrates that finite-height stacks of blocks can remain stable even when their tops extend far beyond the edge of a table—a result that defies intuition. However, when attempting to extrapolate this to an infinitely high stack, the author finds that regardless of the limiting procedure used, the end result is either no stack at all or a stack that doesn't lean. This reveals the subtleties of limit operations when dealing with infinity and the limitations of intuition.

Read more

Single Atom Quantum Logic Gate Breakthrough

2025-08-22
Single Atom Quantum Logic Gate Breakthrough

University of Sydney researchers have achieved a breakthrough by implementing an error-corrected quantum logic gate on a single ytterbium ion using the 'Rosetta Stone' code (GKP code). This innovative approach leverages the ion's natural vibrations to encode and manipulate logical qubits, dramatically reducing the number of physical qubits needed for quantum computing. Published in Nature Physics, this milestone significantly improves quantum computing hardware efficiency and paves the way for large-scale quantum information processing.

Read more

Python Dataclasses: `kw_only=True` for Maintainability and Extensibility

2025-06-30

Python's dataclasses offer a convenient way to create data classes, but the default `__init__` method uses positional arguments, which can lead to maintenance and extension difficulties. This article introduces the `kw_only=True` parameter, which enforces keyword arguments, preventing issues caused by changes in argument order and allowing subclasses to add required fields flexibly. While this parameter was introduced in Python 3.10, the article also provides a solution for compatibility with older versions.

Read more
Development

Revitalizing Your Mavericks: Giving an Old System New Life

2025-08-21

This guide shows you how to breathe new life into your aging OS X Mavericks system. It involves a simple script to update the system, replacing the outdated browser with a modern Firefox (Firefox Dynasty), using Aqua Proxy to fix HTTPS compatibility issues, adding new emojis, and setting up Time Machine backups. The guide also instructs users on deleting unwanted pre-installed apps such as Chess, iTunes, and iBooks for a personalized experience. The entire process is straightforward, making your Mavericks system run smoother and more tailored to your needs.

Read more
Development

Geotoy: Open-Source 3D Modeling Tool Showcases Stunning Artist Portfolio

2025-08-19

Geotoy, a completely free and open-source 3D modeling tool by Casey Primozic, is showcased through a stunning portfolio of 3D models created by artist ameo. The collection includes a diverse range of creations, from a 3D Hilbert curve and shingles to a temple, maze, spring, fractal terrain, torus knot, dandelion, power line, woven structures, roots, bumpy sphere, abstract hourglass, birdbath, concrete tetrapod, terraced floating island, extruded clay bowl, advanced shader props, superellipse dominos, and even a Dark Souls-inspired tree. This impressive display highlights Geotoy's capabilities and ameo's artistic talent.

Read more
Design

Pixel Watch 4: Google's 'Essential Companion' Evolves

2025-08-21
Pixel Watch 4: Google's 'Essential Companion' Evolves

Google's Pixel Watch 4 boasts significant hardware and software upgrades. The new watch features thinner bezels, a brighter display, and improved battery life. It also sports an innovative side-mounted charger and offers replaceable and repairable display and battery. Software-wise, the Pixel Watch 4 integrates Gemini AI for a more powerful voice assistant and a personalized health coach, alongside a Satellite SOS emergency call feature. In essence, the Pixel Watch 4 represents a bold step forward for Google in the smartwatch arena, striving to deliver a durable and feature-rich "essential companion."

Read more
Tech

Luminal: A High-Performance Deep Learning Library with Search-Based Compilation

2025-08-20
Luminal: A High-Performance Deep Learning Library with Search-Based Compilation

Luminal is a deep learning library achieving high performance through search-based compilation. Its core is remarkably minimal, built upon just 12 primitive operations yet capable of supporting complex models like Transformers and convolutional networks. By aggressively fusing kernels and compiling shape-specific kernels at compile time, Luminal overcomes typical RISC limitations and automatically derives complex optimizations like Flash Attention. Its static compilation approach avoids runtime overhead, with Metal and CUDA support enabling fast execution on Macs and Nvidia GPUs. Significant performance gains have been demonstrated on models such as Llama 3 8B.

Read more
Development

Google's AI Overviews Lead Users into Scams

2025-08-20
Google's AI Overviews Lead Users into Scams

Multiple users have reported falling victim to scams after being directed to fraudulent phone numbers provided by Google's AI Overviews. Scammers impersonated customer service, tricking users into sharing their screens and sending money. Google acknowledges the issue and is working on improvements, but users are urged to remain vigilant. This highlights the limitations of AI in verifying information and the prevalence of misinformation online.

Read more
Tech

Mysterious `d4d4` Instructions in LLD: Not a Trap, But a Conditional Branch

2025-08-21

A programmer discovered numerous `d4d4` instructions in disassembled ARM code, always unreachable and identified by LLVM's objdump as a relative branch to -0x58. Experiments and analysis revealed these weren't added by the LLVM compiler, but by the LLD linker during object file boundary alignment. LLD uses `d4d4` as padding, intending it as a trap instruction. However, it's actually a conditional branch, acting as a relative jump in the Thumb instruction set. This seems like an LLD bug; it's not a true trap, potentially causing unpredictable jumps. The GNU linker uses zeros for padding, avoiding this issue.

Read more
Development

Lakehouse Tiering Strategies: Shared Tiering vs. Materialization?

2025-08-21
Lakehouse Tiering Strategies: Shared Tiering vs. Materialization?

This article explores data tiering strategies in lakehouse architectures. Direct access to shared tiers poses reliability risks; API access is preferable. Data lifecycle management requires a canonical metadata service coordinating primary and secondary storage locations. Schema management should be controlled by the primary system, ensuring compatibility with secondary storage. The choice between shared tiering and materialization depends on the location of stitching/conversion logic (client or server-side) and their respective pros and cons. With client-side stitching, the difference is minimal; server-side stitching requires careful consideration of metadata maintenance and real-time data processing integration.

Read more

The Paradigm Shift in AI Product Development: From Determinism to Probability

2025-08-22
The Paradigm Shift in AI Product Development: From Determinism to Probability

This article explores how general-purpose artificial intelligence (AGI) is disrupting the tech industry, particularly in software design, engineering, building, and growth. Traditional software development follows a deterministic model: known inputs produce expected outputs. However, AGI models are probabilistic, with outputs based on statistical distributions and inherent uncertainty. This renders traditional software engineering methods and metrics (like SLOs) obsolete. The author advocates for an empirical approach, using scientific methods and data-driven decision-making to build and iterate AI products, rather than relying on traditional engineering thinking. This requires organizations to transition from engineering to science, centering on data, and breaking down siloed departments for a holistic systems view.

Read more
Development

Graphene Capacitors Achieve Rapid, High-Depth Modulation of Terahertz Waves

2025-08-20
Graphene Capacitors Achieve Rapid, High-Depth Modulation of Terahertz Waves

Researchers at the University of Cambridge's Cavendish Laboratory have developed a terahertz wave modulator using graphene as a tunable capacitor, achieving unprecedented dynamic range and speed. By embedding nanoscale graphene patches within metamaterial resonators, the device effectively controls terahertz waves, boasting a modulation depth exceeding 99.99% and a speed of 30 MHz. This breakthrough promises to advance technologies in terahertz communication, imaging, and sensing, paving the way for next-generation communication systems beyond 5G and 6G.

Read more

UK Debt Yields Surge, Echoing 2022 Crisis Fears

2025-08-19
UK Debt Yields Surge, Echoing 2022 Crisis Fears

Yields on long-term UK government bonds have surged, exceeding their US counterparts for the first time this century, sparking concerns about the UK's fiscal situation. The 30-year UK gilt yield hit 5.61%, 68 basis points higher than the US equivalent. This widening gap reflects growing investor apprehension. The UK faces long-term structural economic challenges, high inflation, slowing growth, and rising unemployment. The upcoming inflation report is crucial; hotter-than-expected data could push yields higher and potentially trigger another 2022-style pension crisis.

Read more
Tech UK Gilts

Daemonless Docker Compose Builds with Podman, BuildKit, and a Pinch of Bakah

2025-08-21

Due to Docker's incompatibility with nftables and a preference for a rootless, daemonless approach, the author uses Podman to build a Docker Compose project. The article explores the shortcomings of using both the official Docker Compose CLI and podman-compose, ultimately achieving builds under Podman using the Docker Compose CLI and BuildKit by enabling the Podman socket, creating a Docker context. To avoid a BuildKit daemon, the author developed Bakah, a tool that converts Compose projects into Bake JSON files and uses Buildah for building, resulting in a completely daemonless build process.

Read more
Development

US Border Searches of Phones and Devices Surge, Raising Privacy Concerns

2025-08-20
US Border Searches of Phones and Devices Surge, Raising Privacy Concerns

US Customs and Border Protection (CBP) officials have broad authority to search anyone's phone upon entry, including US citizens. Newly released figures reveal a record number of phone and device searches over the past three months. From April to June 2025, CBP searched 14,899 devices belonging to international travelers. This surge coincides with the second Trump administration's aggressive immigration policies, raising concerns about privacy and freedom of speech. While CBP claims the percentage of searches is small, the practice creates a chilling effect, particularly for those critical of the administration, lawyers, and journalists. CBP's plans to procure advanced digital forensics tools further amplify these concerns.

Read more

Online Edition of Cyberpunk Anthology 'Mirrorshades' Launches

2025-08-20

A free online edition of Bruce Sterling's seminal cyberpunk anthology, *Mirrorshades*, has been released. The website, converted and posted by Rudy Rucker in September 2022 and updated in November 2023, features stories by prominent cyberpunk authors such as William Gibson, Tom Maddox, and Pat Cadigan. It showcases the early cyberpunk movement, highlighting its themes of high tech, low life, body invasion, mind invasion, and its unique reflection of 1980s culture and technological advancements.

Read more

24/7 AI Sales Avatars Outsell Humans on Taobao

2025-08-21
24/7 AI Sales Avatars Outsell Humans on Taobao

A Shanghai marketing company, PLTFRM, has created AI avatars that are revolutionizing livestream ecommerce in China. These AI salespeople stream 24/7 on platforms like Taobao and Pinduoduo, consistently outperforming human counterparts. Brother printers, for example, reported a 30% increase in livestream sales after switching to an AI avatar. While platforms like Douyin remain cautious, the widespread adoption of these AI avatars raises concerns about potential job displacement for human livestreamers and affiliate marketers. The technology's accessibility and affordability are fueling this trend, hinting at a future dominated by AI-generated content and sales.

Read more

DiffMem: Git-Based Differential Memory for Smarter AI Agents

2025-08-21
DiffMem: Git-Based Differential Memory for Smarter AI Agents

DiffMem is a lightweight, Git-based memory system designed for AI agents and conversational systems. It leverages Markdown for human-readable storage, Git for version control and tracking memory evolution, and an in-memory BM25 index for fast retrieval. This proof-of-concept demonstrates how version control can create efficient, scalable memory for AI. DiffMem treats memory as a versioned repository, separating the current state from historical changes. This allows for efficient queries on the current knowledge while preserving the full history for deeper analysis. It addresses challenges in traditional AI memory systems like scalability and query efficiency, offering a human-readable, easily portable, and auditable solution. The system is composed of a writer agent, context manager, searcher agent, and an API layer. While currently a prototype, DiffMem showcases a promising approach to long-term AI memory management.

Read more
Development

Firefox's CRLite: Faster, More Private Certificate Revocation Checking

2025-08-19
Firefox's CRLite: Faster, More Private Certificate Revocation Checking

Firefox is the first browser to implement fast and comprehensive certificate revocation checking without revealing user browsing activity. Previously, the OCSP protocol leaked user privacy. Firefox's new CRLite mechanism solves this by periodically downloading a compact encoding of revoked certificates, storing and updating it locally. CRLite is a thousand times more bandwidth-efficient than traditional CRLs and significantly improves TLS handshake times. Firefox will disable OCSP in version 142, further enhancing user privacy and performance.

Read more

Sütterlinschrift: The Rise and Fall of a German Handwriting Script

2025-08-21
Sütterlinschrift: The Rise and Fall of a German Handwriting Script

Sütterlinschrift, a widely used German handwriting script from 1915 to the 1970s, represents the final form of Kurrent. Designed by Ludwig Sütterlin, it was banned by the Nazi regime in 1941 and replaced with 'normal script'. Despite this, Sütterlinschrift continued to be used by many post-war, fading from common use only in the 1970s. Its unique letters and ligatures even left a mark in mathematics and proofreading, showcasing its historical and cultural impact.

Read more

Zed IDE Raises $32M Series B to Revolutionize Code Collaboration

2025-08-20
Zed IDE Raises $32M Series B to Revolutionize Code Collaboration

Zed, a blazing-fast IDE, announced a $32M Series B funding round led by Sequoia Capital, bringing its total funding to over $42M. Zed's vision is to fundamentally change how software is built by connecting conversations about code directly to the code itself, moving beyond outdated snapshots and scattered tools. They're building DeltaDB, a new operation-based version control system that incrementally tracks code evolution with edit-level granularity, integrating it into Zed for seamless human-AI collaboration. This investment will fuel Zed's mission to create a collaborative workspace where code, discussions, and AI assistance converge, reshaping the future of software development.

Read more
Development

PlutoPrint: Lightweight Python Library for Generating PDFs and Images from HTML/XML

2025-08-21
PlutoPrint: Lightweight Python Library for Generating PDFs and Images from HTML/XML

PlutoPrint is a lightweight Python library for generating high-quality PDFs and images directly from HTML or XML. Based on PlutoBook's rendering engine, it offers a simple API for creating reports, invoices, or visual snapshots. Use it via command line or Python API; pre-built binaries are available for Windows and Linux 64-bit. It even integrates with Matplotlib for generating and embedding charts.

Read more

Chernobyl Radiation Crashed a Soviet Rail System

2025-08-20

In the 1980s, programmer Sergei encountered mysterious crashes on an SM-1800 microcomputer at a Soviet rail station. The system, used for routing trains, would randomly fail at night. Investigation revealed the crashes only occurred when processing livestock from northern Ukraine and western Russia. Suspecting Chernobyl radiation, Sergei confirmed his theory: high radiation levels flipped bits in the SM-1800's memory. The Soviet government mixed contaminated and uncontaminated meat to avoid waste. Upon discovering this, Sergei immediately filed immigration papers. The computer crashes resolved themselves as radiation levels dropped.

Read more
Tech

Image Scaling Attacks: A New Vulnerability in AI Systems

2025-08-21
Image Scaling Attacks: A New Vulnerability in AI Systems

Researchers have discovered a novel AI security vulnerability: data exfiltration can be achieved by sending seemingly harmless images to large language models (LLMs). Attackers leverage the fact that AI systems often downscale images before processing them, embedding malicious prompt injections in the downscaled version that are invisible at full resolution. This allows bypassing user awareness and accessing user data. The vulnerability has been demonstrated on multiple AI systems, including Google Gemini CLI. Researchers developed the open-source tool Anamorpher to generate and analyze these crafted images, and recommend avoiding image downscaling in AI systems or providing users with a preview of the image the model actually sees to mitigate the risk.

Read more

LinkedIn's Toxic Mediocrity: A Content Quality Lament

2025-08-22

The author decries LinkedIn's rampant 'toxic mediocrity': inauthentic personal branding, overproduced empty posts, and meaningless advice disguised as stories. The author argues that LinkedIn's algorithm incentivizes this behavior, yet it ultimately provides no career benefit. Instead of chasing likes and comments, the author advocates for high-quality content creation, such as building a personal blog to share meaningful insights, as a more effective path to career advancement.

Read more
Misc

Meta Accused of Inflating Ecommerce Ad Performance Metrics

2025-08-21
Meta Accused of Inflating Ecommerce Ad Performance Metrics

A whistleblower complaint alleges that Meta artificially inflated the return on ad spend (ROAS) for its Shops ads product by including shipping fees as revenue, subsidizing bids, and applying undisclosed discounts. The former employee, Samujjal Purkayastha, claims this was done to counteract the impact of Apple's 2021 privacy changes and boost adoption of the fledgling ecommerce ad product. Internal reviews allegedly revealed a 17-19% ROAS inflation due to the inclusion of shipping fees and taxes, a practice not followed by Meta's other ad products or competitors like Google. Purkayastha, who was subsequently terminated, brought these concerns to senior leadership. Meta denies the allegations and is actively defending the lawsuit.

Read more
Tech Ad Fraud

The Fatal Flaw of "The Art of Multiprocessor Programming": Ignoring the futex

2025-08-19

This article critiques "The Art of Multiprocessor Programming," a well-regarded textbook, for its omission of the futex, a crucial modern concurrency technique. The author argues that the book's lack of coverage renders its content outdated and impractical. Futexes, enabling efficient mutex implementations, significantly improve concurrency performance and are widely used in operating systems like Linux, Windows, and macOS. The article details futex functionality and provides code examples demonstrating high-performance mutex construction using futexes, including spinlocks, non-recursive mutexes, and recursive mutexes. The author concludes that the book's failure to cover essential technologies like futexes makes it insufficient for modern concurrency programming needs.

Read more

Netflix Ditches Kafka and Cassandra for In-Memory Database on Tudum

2025-08-19
Netflix Ditches Kafka and Cassandra for In-Memory Database on Tudum

Netflix's fan website, Tudum, initially used a CQRS architecture with Kafka and Cassandra, but suffered from delays in previewing content updates. To address this, the Netflix team replaced Kafka and Cassandra with RAW Hollow, an internally developed in-memory object store. RAW Hollow's in-memory dataset dramatically improved content preview and page rendering speeds, offering a better experience for both editors and visitors.

Read more
Tech

CSS Infinity: A Curious Journey Through Browser Interpretations

2025-08-21
CSS Infinity: A Curious Journey Through Browser Interpretations

This article explores the quirky behavior of the `infinity` keyword in CSS calculation functions. By applying `infinity` to properties like `text-indent`, `word-spacing`, and `letter-spacing`, the author discovers inconsistencies in how different browsers handle infinite values, although the visual results consistently lead to horizontal overflow. More intriguingly, when used with `z-index`, the computed value of `infinity` is capped at the maximum integer value across browsers, resulting in unexpected stacking order. Finally, the author experiments with `infinity` for animation duration, finding that it translates to extremely long times, even causing Safari to render the page unresponsive. In short, the experiment reveals the different strategies browsers employ in handling infinite values in CSS and some surprising side effects.

Read more
Development
1 2 28 29 30 32 34 35 36 565 566