Stop Asking 'Can I?', Start Saying 'I Will': A Bias for Action

2025-02-23

Instead of constantly seeking approval, take initiative and inform your boss of your plans with a deadline. This article uses the author's experience in small companies (<200 employees) to illustrate a 'proactive' strategy: for tasks within your scope, act first, give your boss veto power, and set a clear deadline. This increases efficiency and avoids delays caused by waiting for approvals. This method ensures progress while keeping the boss informed and allowing for feedback.

Read more
Development proactiveness

Booting 5000 Erlang VMs on a 192-Core Ampere One Server

2025-08-10
Booting 5000 Erlang VMs on a 192-Core Ampere One Server

Underjord, a consultancy specializing in Elixir and Nerves, successfully ran 5000 Erlang virtual machines on a 192-core Ampere One server. Each VM runs a Linux IoT device using the Nerves framework. This was achieved using a new bootloader, little_loader, streamlining ARM64 QEMU VM booting and leveraging KVM acceleration. Challenges included compilation issues and memory optimization, but these were overcome by adjusting BEAM VM allocators, Erlang release modes, and Linux kernel parameters. Over 5000 VMs were successfully run, opening new possibilities for testing and development of the Nerves framework and potentially integrating into future Nerves tooling.

Read more
Development

Exbody2: High-Fidelity Whole-Body Motion Mimicry in Humanoid Robots

2024-12-18

Researchers have developed Exbody2, a generalized whole-body tracking framework enabling humanoid robots to perform expressive motions with human-like stability. Trained in simulation using Reinforcement Learning and then transferred to the real world, Exbody2 decouples keypoint tracking from velocity control. It leverages a privileged teacher policy to distill precise mimicry skills, achieving high-fidelity replication of dynamic movements such as running, crouching, and dancing. Experiments on two humanoid platforms demonstrate superior performance compared to state-of-the-art methods, providing practical guidelines for advanced whole-body control in humanoid robotics.

Read more

Vibe Coding: Build Apps Without Writing Code

2025-03-01
Vibe Coding: Build Apps Without Writing Code

Say goodbye to complex programming languages! This article explores 'vibe coding,' a revolutionary approach to software development powered by AI. Creators with minimal technical skills can build functional apps, websites, and tools in hours, not months. By simply describing the desired app, AI tools generate the code, debug issues, and iterate based on feedback. The article compares traditional coding, low-code platforms, and vibe coding, detailing the process and showcasing successful examples. Several AI-powered platforms are reviewed, along with limitations and strategies to overcome them. The article concludes by emphasizing the potential for creators to transform their businesses by building and selling tools directly to their audience.

Read more
Development no-code development

The AI Job Apocalypse is Here (and it's not what you think)

2025-05-11
The AI Job Apocalypse is Here (and it's not what you think)

Duolingo's recent layoffs, framed as an "AI-first" strategy, expose a hidden truth: AI-driven job displacement is already widespread. Hundreds of writers and translators have been replaced by AI, a trend echoed across creative industries, journalism, and even government. This isn't a robot uprising, but a calculated move by corporations using AI to cut costs and consolidate power. The resulting job crisis is particularly acute for recent college graduates, with unemployment rates reaching historic highs. While the full economic impact remains unclear, the crisis reveals a deeper issue: the erosion of valuable jobs and the potential for AI to exacerbate existing inequalities. We're facing a critical juncture, needing to define what kind of work we value and how to protect it before the AI-driven job apocalypse consumes us.

Read more

SparkCat: Crypto-Stealing Malware Lurking in App Stores

2025-02-05
SparkCat: Crypto-Stealing Malware Lurking in App Stores

ESET researchers uncovered a cross-platform malware dubbed "SparkCat" hidden within Google Play and the App Store, affecting over 242,000 downloads. The malware embeds a malicious SDK, using OCR to identify images of cryptocurrency wallet recovery phrases in users' photo galleries and sending them to a C2 server. Attackers employed a custom C2 communication protocol written in Rust, increasing analysis difficulty. The malware aims to steal cryptocurrency and utilizes multiple techniques to evade security measures.

Read more

Mysterious Metal Ring Falls to Earth in Kenya: Space Junk or Something Else?

2025-01-10
Mysterious Metal Ring Falls to Earth in Kenya: Space Junk or Something Else?

A large, glowing metal ring fell from the sky in Kenya, sparking global intrigue. While the Kenyan Space Agency initially identified it as rocket debris, space trackers have struggled to find supporting evidence. Leading experts like Jonathan McDowell of the Harvard-Smithsonian Center for Astrophysics and Marco Langbroek have explored various possibilities, but a definitive answer remains elusive. The half-ton ring's origin is a mystery, raising concerns about untracked space debris and the limitations of current tracking capabilities.

Read more

TeaVM 0.11.0 Released: New WebAssembly Backend

2024-12-15

TeaVM 0.11.0 has been released, featuring a brand new WebAssembly backend. The old WebAssembly backend, while functional, lacked adoption due to insignificant performance gains and a poor developer experience. The new backend, leveraging the WebAssembly GC proposal, addresses these issues, improving interaction with browser JS APIs and reducing binary file size. While currently slightly less feature-rich than the JS backend, it already supports JSO (Java-to-JS interaction API), aiming for parity in the next release. This release also includes bug fixes in BitSet implementation and adds support for various JS APIs, such as file reading, touch events, the Popover API, and Navigator.sendBeacon.

Read more
Development

Hypershell Exoskeleton: Boosting Leg Power, But Not a Medical Device

2025-03-11
Hypershell Exoskeleton: Boosting Leg Power, But Not a Medical Device

Hypershell has launched a power exoskeleton that claims to boost peak biological torques at the hip joint by up to 40%, reduce them by 30%, and provide a 30kg offset (at max assistance, adjusted to body weight). The carbon fiber version (without battery) weighs 1.8kg. The range is 17.5km at 4km/h in 30% Eco mode. Charging time is based on lab tests and may vary. Disclaimer: This product is not intended for medical use; users assume all risks.

Read more

Siddhartha: A Spiritual Journey of Self-Discovery

2025-02-20
Siddhartha: A Spiritual Journey of Self-Discovery

Hermann Hesse's *Siddhartha* follows the spiritual journey of a man named Siddhartha in ancient India. Leaving his home to seek enlightenment, he becomes an ascetic, practices intense meditation, and eventually journeys alone after parting ways with his friend Govinda. Experiencing both the lavish life and the depths of despair, he ultimately finds enlightenment by a river, guided by an old ferryman. The novel emphasizes the importance of lived experience in achieving understanding, rather than intellectual pursuits alone.

Read more

eli: A 15-Year Odyssey of Embedded Lisp Interpretation

2025-03-15
eli: A 15-Year Odyssey of Embedded Lisp Interpretation

eli is the culmination of over 15 years of designing and implementing embedded Lisp interpreters in various languages. Born from a need for an embedded Lisp for personal projects, it's become one of the author's most significant endeavors. Primarily implemented in Java, with ongoing efforts to integrate it with Common Lisp, eli demonstrates comparable performance to Python in certain benchmarks. The project boasts a unique type system encompassing bits, callables, comparables, countables, characters, floating-point numbers, integers, iterators, iterables, libraries, lists, maps, types, methods, missing values, numerics, pairs, strings, identifiers, durations, and points in time. It offers a rich feature set, including conditionals, loops, macros, variable binding, type checking, method definition, overloading, lambdas, and namespace/module management.

Read more
Development

Lisp Interpreter in 99 Lines of C

2025-08-17
Lisp Interpreter in 99 Lines of C

This article presents Tinylisp, a Lisp interpreter implemented in a mere 99 lines of C code. Leveraging NaN boxing and clever C programming techniques, it boasts 21 built-in Lisp primitives, simple garbage collection, and a REPL. The author details its design, implementation, and extension possibilities, even providing examples of running it on a vintage Sharp PC-G850 pocket computer. Tinylisp's concise code is readily understandable and extensible, making it an excellent learning resource for both Lisp and C.

Read more
Development

Mozilla's Betrayal: Firefox Users Revolt Over Data Privacy Changes

2025-03-02
Mozilla's Betrayal: Firefox Users Revolt Over Data Privacy Changes

Mozilla's recent update to Firefox's Terms of Use has ignited a firestorm of outrage among users. The update grants Mozilla broad permission to use user data, a stark contrast to previous promises to never sell user data—promises now scrubbed from the Firefox FAQ. While Mozilla claims the data will only be used as described in its Privacy Notice, concerns remain about the potential use of this data for AI development. The vague wording and the removal of previous guarantees have shaken user trust, leading some to migrate to alternative, Firefox-based open-source browsers. This incident highlights the growing importance of data privacy and the repercussions of companies contradicting their past assurances.

Read more
Tech

Server CPU Utilization: Don't Be Fooled by the Numbers!

2025-09-03
Server CPU Utilization: Don't Be Fooled by the Numbers!

Do you rely on server CPU utilization to assess server performance? This author ran a series of stress tests and discovered that CPU utilization isn't linearly correlated with actual work efficiency. Especially above 50% utilization, hyperthreading and Turbo Boost significantly skew the relationship, leading to much higher actual throughput than the reported utilization suggests. Instead of relying on CPU utilization, the author recommends benchmarking to measure actual work completed for a more accurate assessment of server performance.

Read more

Google Wins Partial Victory in Antitrust Case: DOJ Relents on AI Divestiture

2025-03-10
Google Wins Partial Victory in Antitrust Case: DOJ Relents on AI Divestiture

Google has scored a significant victory in its ongoing antitrust battle with the Department of Justice. While the DOJ still seeks significant regulatory changes to Google's search and Android operations, it has dropped its demand for Google to divest from its AI investments. Instead, Google will now be required to notify the government of future AI acquisitions. This is a substantial win for Google, which argued that restricting its AI investments would harm US leadership in the field. The government's revised proposal still includes extensive oversight of Google's search and Android businesses.

Read more
Tech

UN Security Council Debates Commercial Spyware Regulation for the First Time

2025-01-16
UN Security Council Debates Commercial Spyware Regulation for the First Time

The UN Security Council held its first-ever meeting on the dangers of commercial spyware, with the US and 15 other countries calling for regulation. While no concrete proposals emerged, most nations agreed on the need for action to control its proliferation and misuse. Citizen Lab highlighted a secretive global ecosystem of spyware developers, citing Europe as a hotspot for abuse. Russia and China criticized the meeting; Russia blamed the US, while China argued that government-developed cyberweapons pose a greater threat.

Read more

How I Use LLMs to Supercharge My Engineering Workflow

2025-02-04

A senior software engineer shares his practical applications of large language models (LLMs) in his daily workflow. He leverages LLMs for code completion, writing throwaway code, learning new domains, last-resort debugging, and proofreading documents. He stresses LLMs are not a replacement for core logic or formal writing but a powerful aid, particularly effective for tackling unfamiliar codebases or learning new technologies. The key is using them strategically, not expecting miracles.

Read more
Development

Groundbreaking Study: Myocardial Infarction May Be Infectious

2025-09-14
Groundbreaking Study: Myocardial Infarction May Be Infectious

A groundbreaking study from Finland and the UK reveals that myocardial infarction (heart attack) may be an infectious disease. Researchers discovered that bacterial biofilms within atherosclerotic plaques can be activated by viral infections or other triggers, leading to inflammation, plaque rupture, and ultimately, a heart attack. This challenges the conventional understanding of heart attack pathogenesis and opens doors for new treatments, diagnostics, and even vaccines. The study found bacterial DNA in plaques and developed antibodies confirming bacterial involvement. The findings offer novel diagnostic and therapeutic strategies and the potential for preventing heart attacks through vaccination.

Read more

Extreme Server-Side Rendering (XSSR): A Flappy Bird Case Study

2025-02-23
Extreme Server-Side Rendering (XSSR): A Flappy Bird Case Study

This article introduces Extreme Server-Side Rendering (XSSR), a technique that renders dynamic web pages without JavaScript by dynamically generating HTML on the server and continuously streaming updates to the client. The author demonstrates XSSR using a Flappy Bird game, discussing its performance, bandwidth implications, and potential for Denial-of-Service (DoS) attacks. XSSR performs well in low-latency environments but suffers from lag in high-latency scenarios. The technology holds promise for running modern web pages on older devices or browsers without JavaScript support.

Read more
Development No JavaScript

California Orders Uber to Fingerprint Drivers for Teen Rides

2024-12-20
California Orders Uber to Fingerprint Drivers for Teen Rides

The California Public Utilities Commission (CPUC) ruled that Uber must fingerprint drivers for its teen ride-hailing service, Uber for Teens, to continue operating in the state. This decision stems from safety concerns regarding unaccompanied minors. While Uber has historically resisted fingerprint-based background checks, the CPUC cited the importance of protecting children from potential sexual offenders. The ruling significantly impacts Uber's operations, while competitor HopSkipDrive, which already employs stricter safety measures including fingerprinting, supports the decision. The added cost of fingerprinting may lead to higher prices for Uber's teen ride service.

Read more

DeepSeek's R1-Zero: A Human-Free Path to AGI?

2025-01-29
DeepSeek's R1-Zero: A Human-Free Path to AGI?

DeepSeek released R1-Zero and R1, reasoning systems achieving scores comparable to OpenAI's o1 (15-20%) on the ARC-AGI-1 benchmark, significantly outperforming GPT-4o's 5% relying solely on LLM scaling. R1-Zero is particularly notable for its reliance on reinforcement learning alone, eliminating the need for supervised fine-tuning (SFT). While R1-Zero shows some challenges in readability and language mixing, its strong performance in math and coding domains demonstrates accurate chain-of-thought reasoning without SFT. This opens new avenues in AGI research, hinting at a future where AGI training might completely bypass human annotation.

Read more

Building Stuff with Claude Code: From Hacker News Ranker to Poster Maker

2025-08-11

The author built several projects using Anthropic's Claude Code, including a Hacker News comment ranker plugin and a minimal Canva replacement – a poster maker. The former aims to filter out irrelevant comments, while the latter provides a simple interface to combine images and text to generate A4 PDFs. The author also leveraged Claude Code for file management and data processing, such as renaming bank statement files and merging them into a CSV. Despite encountering challenges, such as Claude Code's limitations in handling complex UIs and PDF export, the author remains impressed by Claude Code's potential for rapid prototyping and productivity gains.

Read more
Development

Massive Supply Chain Attack: Malware Delivered via Abandoned Amazon S3 Buckets

2025-02-12

Researchers registered roughly 150 abandoned Amazon S3 buckets for around $400, finding they contained software libraries still in use. These buckets received eight million requests in two months, highlighting a massive vulnerability. An attacker could easily inject malware into these libraries, spreading it widely through software updates – a SolarWinds-style attack on a much larger scale. The abandonment of these buckets leaves developers unable to automatically patch vulnerabilities, giving attackers control over updates and hindering vendor identification of affected software. This underscores the critical flaws in software supply chain security; fixing it will be both difficult and expensive.

Read more

Mastercard's Five-Year-Old DNS Error

2025-01-22

A security researcher, Philippe Caturegli, uncovered a nearly five-year-old error in Mastercard's domain name server settings. This misconfiguration could have allowed anyone to intercept or divert internet traffic for the company by registering an unused domain name. Caturegli spent $300 to register the domain 'akam.ne' to prevent its exploitation by cybercriminals. Mastercard acknowledged the mistake but claimed no real security risk existed. The incident highlights the potential for significant vulnerabilities in even large organizations' DNS configurations.

Read more

Venezuela Fines TikTok $10 Million Over Deadly Challenges

2025-01-01
Venezuela Fines TikTok $10 Million Over Deadly Challenges

Venezuela's Supreme Court fined TikTok $10 million for failing to prevent viral video challenges that allegedly led to the deaths of three Venezuelan children. The court cited negligence and ordered TikTok to establish a local office to oversee content and comply with Venezuelan laws. This highlights Venezuela's strict online content regulations and growing concerns over social media platform accountability.

Read more

Six Months on Alpine: The Musl Trade-off

2025-09-04
Six Months on Alpine: The Musl Trade-off

The author spent six months using Alpine Linux as their daily driver. Alpine is praised for its speed, excellent package management, and lightweight nature. However, the author encountered compatibility issues due to Alpine's use of the musl libc instead of glibc, particularly with experimental software requiring glibc. While workarounds like gcompat, self-compilation, or Flatpak exist, they add friction. Ultimately, the author decided to explore other distributions like Void Linux or Debian for better compatibility and stability.

Read more
Development

US Fusion Firm Eyes Japan Deployment in the 2030s

2025-09-07
US Fusion Firm Eyes Japan Deployment in the 2030s

Commonwealth Fusion Systems, a US-based nuclear fusion developer, aims to deploy a reactor in Japan in the late 2030s or early 2040s, aligning with Japan's broader plans for this low-carbon energy source. The company, which recently secured $863 million in funding, is collaborating with a consortium of 12 Japanese companies, including Mitsui & Co. and Mitsubishi Corp., to facilitate technology transfer and knowledge sharing. Commonwealth is also developing a 400-megawatt commercial power plant in Virginia, targeting operation in the early 2030s, with Google committed to purchasing half its output.

Read more
Tech

Slack Overflow: How Railway Scaled Slack Support for Thousands of Developers

2025-01-28
Slack Overflow: How Railway Scaled Slack Support for Thousands of Developers

Railway, a software infrastructure provider, dramatically improved customer support by leveraging Slack. Initially, manual Slack channel creation proved unsustainable. They built 'Help Station,' an internal support tool, and integrated it with Slack, automating channel creation, message syncing, and issue categorization (sales or support). This involved overcoming technical hurdles like switching between Slack Bolt SDK's Socket and HTTP modes and implementing a message queue (Temporal). The result? A 50x increase in customer engagement and an 8x improvement in response times, significantly boosting customer satisfaction and revenue.

Read more

Extracting an AI Model from Microsoft's Seeing AI App

2025-01-05
Extracting an AI Model from Microsoft's Seeing AI App

Security researcher Altay Akkus successfully extracted the currency recognition AI model from Microsoft's Seeing AI app. The app uses the TensorFlow Lite framework, and the model is stored encrypted within the APK file. Using the Frida framework, Altay dynamically injected code to hook the TensorFlow Lite model loading function, successfully dumping the decrypted model file. This demonstrates the vulnerability of even seemingly secure apps to AI model extraction, highlighting the importance of mobile AI model security.

Read more
1 2 469 470 471 473 475 476 477 596 597