Open Source DMR Modem Implementation with GNU Radio and Codec2

2025-04-19

This article details an open-source Digital Mobile Radio (DMR) modem implementation using Software Defined Radio (SDR), GNU Radio, and Codec2. This proof-of-concept modem, capable of voice calls, uses GNU Radio for the physical layer, MMDVMHost for the data link and partial call control layers, and Codec2 as the vocoder. Future development aims to incorporate more DMR standard features, including data messaging, Tier III functionality, and IPv4 transport. Tested with a LimeSDR-mini, the project faces challenges such as latency and precise TDMA timing.

Read more
Development

Arm's Neural Super Sampling (NSS): Real-time AI Upscaling for Mobile

2025-09-24
Arm's Neural Super Sampling (NSS): Real-time AI Upscaling for Mobile

Arm introduces Neural Super Sampling (NSS), a next-generation AI-powered upscaling solution replacing traditional heuristic-based Temporal Anti-Aliasing (TAA). NSS leverages a trained neural network to learn from image data, adapting to various scenes and content, effectively addressing ghosting and instability issues common in older methods. Trained using recurrent learning and a spatiotemporal loss function, optimized with PyTorch and Slang, NSS boasts a four-level UNet architecture. Its output parameters drive post-processing for efficient real-time upscaling. Performance tests show NSS outperforming existing technologies in image quality and speed, promising real-time performance on mobile hardware.

Read more
Tech Mobile

Reverse Engineering a Children's Learning Device

2025-04-06
Reverse Engineering a Children's Learning Device

This blog post details the author's first reverse engineering project: a children's learning device (LeapFrog LeapStart/VTech MagiBook). The journey begins with acquiring the firmware from the VTech software's cache files. Key files identified include 'System' and 'FileSys'. 'FileSys' is a FAT32 filesystem image containing app, audio, and book data. 'System' appears to be an ARM binary, containing C++ information, logs, and kernel information (uC/OS-II). Future steps involve deeper analysis of these files, aiming to understand the dot-recognition and audio playback code, and potentially adding custom audio.

Read more
Development firmware analysis

XChat's End-to-End Encryption: The Juicebox Security Flaw

2025-06-09
XChat's End-to-End Encryption: The Juicebox Security Flaw

Matthew Garrett exposes security vulnerabilities in X's (formerly Twitter) new end-to-end encrypted messaging protocol, XChat. XChat uses the Juicebox protocol to store user private keys, distributing them across three servers. However, these servers are all controlled by X, meaning X can access all user keys, undermining end-to-end encryption. The article delves into Juicebox's mechanics and potential risks, highlighting critical flaws in XChat's deployment. User private keys are vulnerable to arbitrary access by X, leading to the recommendation to avoid using XChat.

Read more
Tech

Synology Locks Down NAS to Proprietary Drives: A User-Unfriendly Move?

2025-04-22
Synology Locks Down NAS to Proprietary Drives: A User-Unfriendly Move?

Synology's upcoming 2025 Plus series NAS devices will reportedly lock users to their own branded hard drives, sparking controversy. This move limits user choice, increases costs, and potentially makes drive replacements difficult. Compared to competitors like QNAP and TrueNAS, Synology's hardware feels outdated, and this drive-locking strategy further weakens its competitiveness. The author argues that this is a profit-driven decision sacrificing user experience, ultimately harming Synology's brand and market share.

Read more

Secret Service's National Security Threat Hoax: A Tale of Lies and Propaganda

2025-09-24
Secret Service's National Security Threat Hoax: A Tale of Lies and Propaganda

The Secret Service announced they thwarted a major national security threat, a claim echoed by major news outlets without critical examination. However, the reality is far less dramatic. The alleged threat was a typical criminal enterprise: a SIM farm using thousands of SIM cards to send spam and international calls. The Secret Service, investigating threats sent to politicians via SMS, traced the messages back to this farm. They then dramatically exaggerated the situation, portraying it as an unprecedented national security threat capable of crippling cell towers. An anonymous hacker exposes this as a common criminal activity, achievable by anyone with technical skills. The New York Times, citing so-called experts, further propagated this narrative, revealing government propaganda at play. The article exposes the false narrative crafted by media and government agencies, explaining the functioning of SIM farms and their negligible actual threat to national security.

Read more

Portable Recorder Mic Input Noise Shootout

2025-04-09

Manufacturers of portable audio recorders often use inconsistent specifications, making objective comparisons difficult, especially for recording quiet animal sounds. This benchmark compares the microphone input noise of various recorders. Data includes Equivalent Input Noise (EIN), input clipping level, and dynamic range at maximum gain, presented in both A-weighted and unweighted measurements across the 20Hz-20kHz range. Results reveal significant differences in noise performance between models, helping users choose the best recorder for their needs.

Read more
Hardware recorder microphone

Trump's Economic Policies: Demolition or Renovation?

2025-04-09
Trump's Economic Policies: Demolition or Renovation?

This article uses a clever analogy, comparing Trump's economic policies to a group of construction workers who are demolishing a house instead of rebuilding it. The author argues that the Trump administration's protectionist trade policies, intended to revive American manufacturing, are actually harming the US economy. High tariffs have disrupted supply chains, increased business costs, and created market chaos, failing to stimulate American manufacturing. The article criticizes the chaotic and unplanned nature of Trump's policies and points out their potential threat to the stability of the US economy.

Read more

CSV: The Underrated Data Serialization Workhorse

2025-03-26
CSV: The Underrated Data Serialization Workhorse

This blog post sings the praises of the CSV format, refuting claims that it's becoming obsolete. It highlights CSV's simplicity and ease of use, readability and editability without specialized software. Its open nature, appendability, and dynamic typing make it advantageous in many scenarios, especially when dealing with large datasets. CSV's row-by-row reading capability and low memory footprint make it shine. Furthermore, its reverse-readability makes it ideal for efficiently resuming interrupted processes.

Read more

Strudel: Code Your Music

2025-06-19
Strudel: Code Your Music

Strudel is a JavaScript-based music programming environment that brings the Tidal Cycles pattern language to JavaScript. Even without prior knowledge of JavaScript or Tidal Cycles, you can easily create dynamic music pieces. Strudel supports live coding music, algorithmic composition, and integration with your existing music setup. Tutorials and example code get you started quickly, allowing you to create stunning musical works.

Read more
Development music programming

Strong Links vs. Weak Links: The Plight of Science

2025-02-08
Strong Links vs. Weak Links: The Plight of Science

This article explores the concepts of 'strong-link problems' and 'weak-link problems'. Weak-link problems, such as food safety, depend on the quality of the worst link; strong-link problems, like scientific progress, depend on the quality of the best link. Many mistakenly treat science as a weak-link problem, focusing excessively on preventing poor research, thereby stifling groundbreaking work. The author argues that this stems from the intense competition and status concerns within academia, ultimately leading to stagnation in scientific progress.

Read more

Locating RFI Sources Using Near-Field Corrections: A Study for 21cm Cosmology During the Epoch of Reionization

2025-02-27

Researchers have developed a novel method to locate radio frequency interference (RFI) sources, particularly those from near-field objects like airplanes, using near-field corrections. This method combines far-field phasing, near-field corrections, and beamforming to precisely pinpoint the 3D location of RFI emitters by maximizing the coherence of curved near-field signals. This is more efficient than traditional flagging, preserving more usable data and enhancing the chances of detecting the 21cm signal during the Epoch of Reionization. Results demonstrate effective altitude estimation of RFI emitters, revealing performance differences under varying observational conditions, laying the groundwork for more precise RFI removal in the future.

Read more

Frontend DDD Misconceptions: It's Not About Doing DDD *in* Angular

2025-05-16
Frontend DDD Misconceptions: It's Not About Doing DDD *in* Angular

This article debunks common misconceptions about Domain-Driven Design (DDD) among frontend developers. Many confuse DDD with Angular's modularity or tooling, overlooking DDD's core: understanding the business and designing the system from business needs. The author argues that DDD is a product-wide discipline, not just frontend-specific; the frontend is merely a part of it. The article distinguishes between strategic and tactical DDD, emphasizes the importance of strategic DDD, explains key concepts like bounded contexts and domain events, and concludes that DDD's value lies in complex business scenarios, while blindly applying it can be detrimental.

Read more
Development

Ratomic: Mutable Data Structures for Ruby Ractors

2025-03-26
Ratomic: Mutable Data Structures for Ruby Ractors

Ratomic provides mutable data structures for Ruby's Ractors, allowing Ruby code to scale beyond the Global VM Lock (GVL). This early-stage project seeks contributors with Rust and Ruby C extension experience. Ratomic offers Ractor-safe structures like counters, object pools, maps, and queues, designed as class-level constants for sharing among multiple Ractors. The project is licensed under MIT.

Read more
Development

Floating-Point Hell: Why Your R Multivariate Normal Sampling Isn't Reproducible

2025-05-22
Floating-Point Hell: Why Your R Multivariate Normal Sampling Isn't Reproducible

This post details the author's debugging journey helping colleagues resolve a reproducibility issue in their R code involving multivariate normal distribution sampling. The problem stemmed not from bugs in R or the MASS package, but from the inherent quirks of floating-point arithmetic. Despite using `set.seed()` to control the random number generator (RNG), the same code produced different results on different machines due to floating-point rounding errors in `MASS::mvrnorm()`. A deep dive revealed that `MASS::mvrnorm()`, using eigendecomposition, is highly sensitive to tiny input perturbations, potentially flipping eigenvector signs and breaking reproducibility. `mvtnorm::rmvnorm()`, employing Cholesky decomposition, proves more robust. The author recommends using `mvtnorm::rmvnorm()` with `method = "chol"` for improved reproducibility.

Read more
Development

David Hilbert's Radio Address: A Manifesto on Mathematical Problems

2025-05-14

In 1930, renowned mathematician David Hilbert delivered a powerful speech in Königsberg, asserting that every mathematical problem is solvable, challenging a prevalent and controversial opposing view. This article explores the context of Hilbert's radio address, including his earlier work and the prevailing philosophical and mathematical cultural trends. The speech's audio recording, along with the German original and an English translation, will be provided for readers to delve into the thoughts of this mathematical giant and his lasting impact on mathematical research.

Read more

Overwatch 2 Developers Unionize at Blizzard

2025-05-11
Overwatch 2 Developers Unionize at Blizzard

Nearly 200 developers at Blizzard Entertainment, working on Overwatch 2, have successfully unionized, joining the Communications Workers of America (CWA). This follows the World of Warcraft team's unionization last year, marking Blizzard's second company-wide union. The union, encompassing artists, testers, engineers, and designers, formed in response to Microsoft's 2024 layoffs and concerns over pay disparities, work-from-home restrictions, crunch, time off, and severance. The Overwatch Gamemakers Guild aims to improve working conditions and ultimately contribute to better game development, setting a potential precedent for other studios.

Read more

OpenJDK JDK 24 GA Released

2025-03-18

OpenJDK JDK 24 is now generally available! This release is an open-source implementation of the Java SE 24 Platform, licensed under the GNU General Public License, version 2, with the Classpath Exception. Oracle also offers commercial builds under a separate license. Users can submit feedback and bug reports through the usual Java SE channels, ensuring inclusion of complete version information from `java --version`. Note that due to intellectual property limitations, source code distribution is restricted to authorized countries.

Read more
Development

GCC 15: Six Major Improvements to Compiler Diagnostics

2025-04-10
GCC 15: Six Major Improvements to Compiler Diagnostics

A Red Hat engineer details six significant improvements to compiler diagnostics in GCC 15, aimed at enhancing usability. These include: prettier visualizations of execution paths using ASCII art and warning emojis; improved presentation of C++ template errors with nested structures for better readability; simultaneous output of text and SARIF diagnostic formats; a smoother transition to C23 with improved error messages highlighting C23 compatibility issues; a revamped color scheme using color to highlight differences in the source code; and the introduction of libgdiagnostics, a shared library making GCC's diagnostic functionality accessible to other projects. These improvements promise a significant boost to the developer experience with GCC.

Read more
Development Diagnostics

The Perils of Pseudo-Randomness: Why You Need True Random Numbers for Security

2025-05-31
The Perils of Pseudo-Randomness: Why You Need True Random Numbers for Security

RFC 4086 details the critical need for true randomness in security systems. Relying on pseudo-random numbers leaves vulnerabilities exploitable by sophisticated attackers who can recreate the environment to easily crack them. The document highlights the pitfalls of using low-entropy sources or traditional pseudo-random number generation techniques, advocating for true hardware random techniques such as leveraging sound cards, hard disk drives, or ring oscillators. It also provides mitigation strategies when hardware solutions are unavailable and illustrates the required size of random numbers for various applications.

Read more

Deep Dive into GPU Mipmap Level Selection

2025-05-14

This post delves into the intricate details of mipmap level selection during texture sampling on the GPU. Starting with texture aliasing, the author explains mipmapping and the role of pixel derivatives (ddx()/ddy()). By analyzing the GLES3.0 and DirectX 11.3 specifications and experimental results, the author reveals the complexities of the relationship between mipmap level selection and pixel derivatives, as well as the differences in implementation across various GPU vendors. The article further explores the impact of elliptical transformations and anisotropic filtering on mipmap level selection, providing corresponding software implementations and comparing them to hardware implementations.

Read more
Development Texture Mipmapping

Life in Another Light: 2024 Infrared Photography Contest Winners Announced

2025-01-22
Life in Another Light: 2024 Infrared Photography Contest Winners Announced

The Atlantic features the winners of the 'Life in Another Light' biannual infrared photography competition. Over 3,000 entries from photographers worldwide were judged across 11 categories. The winning images, showcasing the unique perspectives of infrared photography, offer a captivating glimpse into nature and humanity. The winning photographs span landscapes, portraits, and astrophotography, highlighting the versatility of the medium.

Read more

UK Human Rights Groups Oppose Mandatory Digital ID

2025-09-24
UK Human Rights Groups Oppose Mandatory Digital ID

Several UK human rights organizations have written to the Prime Minister urging him to abandon plans for a mandatory digital ID. They argue that such a system would fundamentally alter the citizen-state relationship, irrevocably harming civil liberties, and failing to deter illegal immigration. Concerns are raised about frequent identity checks in daily life and the potential expansion of its use to access various public and private services.

Read more
Misc

My ed(1) Toolbox: A Deep Dive into the World of ed(1) Implementations

2025-09-24

Artyom Bologov, a self-proclaimed ed(1) enthusiast, shares his collection of ed(1) implementations and scripts. He uses ed(1) extensively as a Git editor, sudo editor, and even a static site generator. His toolbox includes GNU ed, OpenBSD ed (oed), a modernized version called wed(1), a more user-friendly aed(1), and xed(1) for scripting. These tools address ed(1)'s limitations, such as a lack of scripting support and user-unfriendliness, while maintaining portability across various systems. He even created ed(1) implementations in Brainfuck, BASIC, and Modal—a testament to his dedication. Bologov concludes by urging readers to embrace and love ed(1).

Read more
Development

The Mensa Reading List: A Challenge to Comfort

2025-04-06
The Mensa Reading List: A Challenge to Comfort

This article explores the Mensa Excellence in Reading List for grades 9-12, a collection of challenging classics like *The Divine Comedy* and *The Magic Mountain*. The author argues that these books aren't meant for simple knowledge acquisition, but to challenge preconceived notions and comfort zones. The discomfort these books evoke forces deeper thinking and promotes critical analysis. The ultimate point isn't to become well-read, but to cultivate a continuous learning process fueled by self-reflection and intellectual growth. The journey of reading these works is about confronting ambiguity and embracing the uncomfortable.

Read more

AutoGenLib: The Python Library That Generates Code On-Demand

2025-05-15
AutoGenLib: The Python Library That Generates Code On-Demand

AutoGenLib is a Python library that leverages OpenAI's API to dynamically generate code. Import a non-existent module or function, and AutoGenLib creates it based on your high-level description. It's context-aware, progressively enhances existing modules, analyzes calling code for better context, and even handles exceptions with suggestions. Quickly generate functions like TOTP generators and data processors, but remember: it requires internet access and relies on the OpenAI API; generated code needs review before production use.

Read more
Development

Ex-OpenAI Employees Oppose For-Profit Conversion: A Battle Over Mission and Profit

2025-04-12
Ex-OpenAI Employees Oppose For-Profit Conversion: A Battle Over Mission and Profit

A group of former OpenAI employees filed an amicus brief supporting Elon Musk's lawsuit against OpenAI, opposing its planned conversion from a non-profit to a for-profit corporation. They argue this violates OpenAI's original mission to ensure AI benefits all of humanity. Several ex-staffers previously criticized OpenAI's lack of transparency and accountability, warning of a reckless pursuit of AI dominance. OpenAI responded that its non-profit arm remains, but it's transitioning to a Public Benefit Corporation (PBC). The lawsuit centers on OpenAI's structure and its impact on AI development, highlighting the complex interplay between commercialization and social responsibility in the AI field.

Read more

Open-Sourcing DolphinGemma: A New Tool for Cetacean Research

2025-04-14
Open-Sourcing DolphinGemma: A New Tool for Cetacean Research

This summer, the Wild Dolphin Project, Georgia Tech, and Google are open-sourcing DolphinGemma, an acoustic model trained on Atlantic spotted dolphin sounds. Its potential extends to studying other cetaceans; researchers can fine-tune it for different species' vocalizations. By providing this tool, researchers can analyze their acoustic datasets, accelerating pattern discovery and deepening our understanding of these intelligent mammals. This collaboration combines field research, engineering expertise, and cutting-edge technology, opening exciting possibilities for bridging the communication gap between humans and dolphins.

Read more
AI

ProtonMail: Top Features of a Privacy-Focused Email Service

2025-03-14
ProtonMail: Top Features of a Privacy-Focused Email Service

ProtonMail prioritizes user privacy with its core features: end-to-end encryption ensuring only the recipient can read emails; zero-access encryption, preventing even ProtonMail servers from accessing messages; open-source and audited code for transparency and security confidence; and anti-phishing tools to protect against cyber threats. These features combine to create a robust privacy shield.

Read more
Tech

GPT-4: Multimodal Mayhem Ushers in a New Era of AI

2025-01-17

OpenAI has unveiled GPT-4, its latest large language model. More than just a text processing upgrade, GPT-4 boasts powerful multimodal capabilities, processing image inputs and generating text outputs. This means AI can understand and generate richer information, expanding applications beyond text to encompass images, videos, and more. GPT-4's exceptional performance across various benchmarks showcases its impressive comprehension and generation abilities, signaling a significant leap forward in AI technology. This release will undoubtedly have a profound impact on the AI field, accelerating the adoption of AI across various industries.

Read more
AI
1 2 30 31 32 34 36 37 38 596 597