mt32-pi Project Halted Due to Online Abuse

2025-02-05
mt32-pi Project Halted Due to Online Abuse

The mt32-pi project, a baremetal MIDI synthesizer for the Raspberry Pi, has been discontinued due to sustained online harassment of its developer. The developer cited a campaign of abuse, including personal attacks, code theft, and stolen 3D print designs, as reasons for abandoning the project. Despite community support, the negative experiences significantly impacted the developer's mental health. mt32-pi supported various Raspberry Pi models and offered features such as I²S Hi-Fi DAC support and network MIDI.

Read more
Development MIDI Synthesizer

Programming Lewis Carroll's *Memoria Technica*

2024-12-27

This article explores Lewis Carroll's *Memoria Technica*, a cipher he devised to aid in remembering numbers. The cipher maps consonants to digits, ignoring vowels and punctuation. The article describes the cipher's mechanics, presents online tools for encoding and decoding, and discusses its potential use in steganography. The authors detail their TypeScript implementation, highlighting optimizations for efficiency. Examples illustrate encoding and decoding, and the article analyzes the cipher's strengths and weaknesses as a steganographic technique, including a potential vulnerability related to letter and digit frequency discrepancies.

Read more
Development Steganography

Approximating Float Multiplication with Bit Manipulation: A Neat Trick

2025-02-13
Approximating Float Multiplication with Bit Manipulation: A Neat Trick

This article explores a clever method for approximating float multiplication using bit manipulation. The approach involves casting floats to integers, adding them, adjusting the exponent, and casting back to a float. While this method fails catastrophically with exponent overflow or underflow, its accuracy is surprisingly good for most cases, staying within 7.5% of the correct result. The author delves into the underlying principles, explaining why simple addition can approximate multiplication. Although likely less efficient than native float multiplication in practice, its simplicity and potential for power savings in specific scenarios make it an interesting exploration.

Read more

Real-Time Chess: A Physical Board That Eliminates Turns

2025-03-29
Real-Time Chess: A Physical Board That Eliminates Turns

Tired of the long waits in turn-based chess? A developer has created a real-time physical chessboard that eliminates turns entirely. Each piece has an individual cooldown, enforced by electronics and electromagnets, preventing cheating. The project's PCB designs and firmware are open-source, but the author notes issues like inadequate power distribution and tight tolerances.

Read more
Hardware

London Police Storm Quaker Meeting House, Arresting Climate Activists

2025-03-30
London Police Storm Quaker Meeting House, Arresting Climate Activists

Over 20 Metropolitan Police officers forcibly entered a Quaker meeting house, arresting six women who were discussing climate change and Gaza. This is believed to be the first time in the history of the pacifist Quakers that police have breached one of their places of worship. The women, attending a welcome meeting for a non-violent protest group, were handcuffed, their belongings confiscated, and their student accommodation subsequently raided. The police action has drawn widespread criticism.

Read more

Mozilla's Broken Trust: Firefox's New Terms of Service and Privacy Policy Spark Outrage

2025-02-28
Mozilla's Broken Trust: Firefox's New Terms of Service and Privacy Policy Spark Outrage

Mozilla's recent update to Firefox's Terms of Service and Privacy Policy has sparked user concern over data security and privacy. The new policy includes a "non-exclusive, royalty-free, worldwide license" clause, allowing Mozilla to use user browsing data, contradicting Firefox's long-standing commitment to privacy. The author criticizes Mozilla's move as a "massive unforced error," shifting Firefox from a trusted browser to a data collection service. They urge Mozilla to revoke overly broad policies, applying them only to features requiring them, and to preserve Firefox's image as a champion of the open web.

Read more
Development

Inko: A New Language for Building Reliable Concurrent Software

2025-03-27
Inko: A New Language for Building Reliable Concurrent Software

Inko is a new programming language designed for building concurrent software with confidence. It simplifies concurrent software development by offering deterministic automatic memory management, move semantics, static typing, type-safe concurrency, and efficient error handling, eliminating unpredictable performance, runtime errors, and race conditions. Inko compiles to LLVM machine code. Examples showcase a simple "Hello, world!" and a concurrent factorial calculation. Visit the Inko website for more information and installation instructions.

Read more
Development

Bambu Connect's X.509 Certificate and Private Key Extracted

2025-01-20
Bambu Connect's X.509 Certificate and Private Key Extracted

Following Bambu Lab's announcement of locking down network access to its X1-series 3D printers with new firmware, the X.509 certificate and private key from the Bambu Connect application have been extracted by hWuxH. This application was intended to be the sole method for third-party software to send print jobs to Bambu Lab hardware. The Bambu Connect app, a relatively simple Electron application, employed obfuscation and encryption, but not enough to deter determined users. The de-obfuscated main.js file reveals the certificate and private key used to encrypt HTTP traffic with the printer, the only obstacle preventing tools like OrcaSlicer from communicating with authentication-enabled Bambu Lab printers. Bambu Lab's next steps are unclear, highlighting the ineffectiveness of security through obfuscation alone.

Read more

Goodbye RSI: My Journey with the Svalboard Keyboard

2025-08-02

Years of computer use led to RSI, prompting a quest for the perfect ergonomic keyboard. From Microsoft Ergonomic to Kinesis Advantage and Ergodox EZ, my search culminated in the Svalboard Lightly. Its infrared optical keys and magnetic feedback, coupled with QMK firmware and Keybard software, allowed unparalleled customization. While pricey and with a steep learning curve, the Svalboard's superior ergonomics and customizability dramatically improved my typing comfort and efficiency, making it a worthwhile investment for the discerning user.

Read more

Small Docs: The Secret to Streamlined Tech Writing

2025-03-04

Just like small code commits are preferred in software development, small, focused documentation improves clarity, accessibility, and review efficiency. This article advocates for writing concise docs addressing a single idea, providing complete context, and avoiding oversimplification. Larger documents should be broken into smaller, self-contained parts. Effective organization, cross-linking, and regular maintenance are crucial to prevent information fragmentation. The ultimate goal is faster reviews, clearer communication, and less stress for everyone involved.

Read more

SourceHut Updates Terms of Service and Privacy Policy

2025-06-24

SourceHut has updated its Terms of Service and Privacy Policy, primarily improving the descriptions of how user data is stored, used, and shared with third parties. The update clarifies account security and adds detail on user access and control over their data. It also introduces restrictions on the use of automated tools to prevent abuse.

Read more
Development

NOMARS: The Unmanned Surface Vessel Revolution

2025-03-10

The No Manning Required Ship (NOMARS) program has successfully completed construction of the USX-1 Defiant, a 180-foot, 240-metric-ton unmanned surface vessel (USV). Designed from the keel up without any human crew considerations, Defiant aims to revolutionize naval architecture. By eliminating the human element, NOMARS anticipates significant advantages in size, cost, reliability, hydrodynamic efficiency, sea-state survivability, and adversary resistance through stealth and tamper-proofing. Scheduled for sea trials in Spring 2025, Defiant promises a cost-effective path to a distributed USV fleet.

Read more

Styrolite: A Secure and Efficient Low-Level Container Runtime

2025-03-26
Styrolite: A Secure and Efficient Low-Level Container Runtime

Styrolite is a new low-level container runtime offering a clean Rust API for container creation and management, addressing the complexity and error-proneness of existing tools like Bubblewrap's CLI. Acknowledging the inherent limitations of Linux namespaces, Styrolite incorporates careful defaults and explicit security controls for a more robust foundation. Used within the Edera Protect platform for secure microservices, application sandboxing, and custom CI/CD environments, Styrolite boasts container initialization times comparable to or faster than traditional CLI approaches.

Read more
Development container runtime

A Glimpse into OS/2's Built-in Virtualization

2024-12-17

This blog post explores the surprisingly advanced built-in virtualization capabilities of OS/2 2.1 from 1993. The author demonstrates OS/2's ability to load and execute disk images, much like modern hypervisors, by creating a simple VGA mode program and running it in DOSBox, QEMU, and OS/2's own virtual environment. OS/2 can even run images that aren't true bootable DOS floppies, using VMDISK to create an image file and running it in fullscreen or windowed mode within OS/2. This functionality, remarkable for 1993, is essentially a built-in QEMU, prompting the author to consider the further potential of OS/2's virtualization features.

Read more

FTC Probes Microsoft-OpenAI Deal Over Antitrust Concerns

2025-01-18
FTC Probes Microsoft-OpenAI Deal Over Antitrust Concerns

The Federal Trade Commission (FTC) has expressed concerns about Microsoft's $13 billion investment in OpenAI, fearing it could extend Microsoft's cloud computing dominance into the burgeoning AI market and potentially lead to the full acquisition of AI companies by tech giants in the future. The FTC is also investigating Amazon and Google's partnerships with other AI companies, citing potential antitrust risks.

Read more

Adaptive Hashing in SBCL: Making Hash Tables Faster and More Robust

2025-05-11

A talk at the 2024 ELS focused on adaptive hashing, aiming to make general-purpose hash tables faster and more robust. Traditional hash table theory primarily concerns itself with asymptotic worst-case costs, neglecting the impact of constant factors on real-world performance. This research introduces an online adaptive approach, adjusting the hash function based on the actual key distribution to reduce collisions and improve cache utilization. Experiments demonstrate significant improvements in reducing expected comparisons and speeding up PUT operations, particularly with specific key distributions. SBCL's built-in hash tables now employ this technique, dynamically switching hash functions (including linear search, bit-shifting hash, and MurmurHash) based on collision counts and hash table size. For composite keys like strings and lists, a truncation strategy is used, dynamically adjusting the truncation length when too many collisions occur. This improvement enhances SBCL hash table speed in common cases and robustness in others.

Read more
Development adaptive hashing lisp

Website Anti-Scraping Mechanism: Anubis v1.21.3

2025-08-17

This website utilizes Anubis, a countermeasure against aggressive web scraping by AI companies. Anubis employs a Proof-of-Work (PoW) system similar to Hashcash, making large-scale scraping significantly more expensive while having minimal impact on individual users. This temporary solution buys time for developing more sophisticated anti-scraping techniques, such as identifying headless browsers through font rendering analysis, ultimately aiming to protect legitimate users while deterring malicious scraping.

Read more
Misc

Nintendo's Virtual Game Cards: Sharing Digital Switch Games Made Easy

2025-03-27
Nintendo's Virtual Game Cards: Sharing Digital Switch Games Made Easy

Nintendo unveiled Virtual Game Cards for the Nintendo Switch, launching late April. This new feature allows sharing digital games across multiple Switch consoles. Purchased digital games are stored as Virtual Game Cards, virtually loaded and ejected like physical cartridges. A single game can be played on up to two Switches simultaneously, and family sharing is enabled via local wireless, with a two-week lending period. This enhances digital game flexibility and convenience.

Read more

Running Windows NT 4 Server in Proxmox: A Retro Guide

2025-05-25
Running Windows NT 4 Server in Proxmox: A Retro Guide

This blog post provides a comprehensive guide on installing Windows NT 4 Server within a Proxmox virtual environment. It details crucial VM settings, including the correct CPU type, memory allocation, SCSI controller selection, and network adapter configuration. The author addresses common installation hurdles such as installing SCSI drivers, configuring mouse drivers, and enabling high-resolution display support. The step-by-step instructions, accompanied by screenshots, simplify the process. The end result is a fully functional Windows NT 4 Server virtual machine, allowing users to experience this classic OS.

Read more
Development

Quantum Teleportation Achieved Over Busy Internet Cables for the First Time

2024-12-27
Quantum Teleportation Achieved Over Busy Internet Cables for the First Time

Northwestern University engineers have achieved a breakthrough by successfully demonstrating quantum teleportation over a fiber optic cable already carrying internet traffic. This discovery, published in Optica, opens the door to integrating quantum communication with existing internet infrastructure, significantly simplifying the requirements for advanced sensing and quantum computing applications. The team cleverly navigated the challenge of entangled photons interfering with dense internet traffic by selecting an optimal wavelength and employing special filters. This successful transmission paves the way for next-generation quantum and classical networks sharing a unified fiber optic infrastructure, promising a future of more accessible quantum technologies.

Read more

Banksy's Trademark Battle: A Street Artist's Fight for His Name

2025-02-13
Banksy's Trademark Battle: A Street Artist's Fight for His Name

Anonymous graffiti artist Banksy is facing a legal battle over his trademark. Greeting card company Full Colour Black claims Banksy hasn't properly used his trademark, seeking its cancellation. Banksy denies this, stating he's used the trademark for merchandise sales. The April trial at the Intellectual Property Office marks a potential first public appearance for Banksy and his team. The case highlights the conflict between Banksy's artistic ethos and commercialization, questioning the limits of trademark rights in art.

Read more

OrioleDB: A High-Performance PostgreSQL Storage Extension

2025-07-19
OrioleDB: A High-Performance PostgreSQL Storage Extension

OrioleDB is a PostgreSQL storage extension that replaces the default Heap storage engine, dramatically improving performance. By redesigning core components like MVCC, page caching, and checkpoints, OrioleDB enhances throughput and predictability for transactional workloads while maintaining the familiar PostgreSQL user experience. Recent releases add support for non-B-tree index types, tablespaces, and fillfactor, along with query and index performance optimizations. Benchmarks using TPC-C and sysbench show significant throughput improvements over PostgreSQL's default Heap engine, with go-tpc tests demonstrating multiple times the tpmC.

Read more
Development

Fujitsu's Monaka CPU: An ARMv9 Datacenter Beast with SVE2 and 3D Stacking

2024-12-14
Fujitsu's Monaka CPU: An ARMv9 Datacenter Beast with SVE2 and 3D Stacking

Fujitsu is set to launch Monaka, a new datacenter CPU slated for a 2027 release. This ARMv9-based processor boasts SVE2 extensions and utilizes 3D stacking, resembling AMD's EPYC architecture with a central IO die and disaggregated SRAM and compute units. Each Monaka CPU will pack up to 144 cores across four 36-core chiplets, all built on a 2nm process. The IO boasts 12 channels of DDR5 (potentially exceeding 600GB/s bandwidth), PCIe 6.0 with CXL 3.0 support, and air-cooling capability. Unlike its predecessor, A64FX, Monaka omits HBM support and targets the general datacenter market.

Read more
Hardware 3D Stacking

TubePen: Streamlining Video Highlighting and Annotation

2025-01-10

Tired of hunting for key information in lengthy videos? TubePen simplifies the process! This tool lets you easily highlight and annotate important segments of videos and share them with others. Think of it as a dedicated notepad for your videos, streamlining your learning, work, or entertainment. No more struggling with screenshots or timestamp notes; TubePen offers a clean interface and powerful features, letting you focus on the video content itself.

Read more
Development

Native Windows Todo App in Pure C

2025-05-11
Native Windows Todo App in Pure C

A modern, native Windows todo application built with C and the Win32 API. It allows users to create, edit, delete, and mark todo items as complete, with persistent storage in AppData. Features include system tray integration and a native Windows look and feel. The application supports up to 100 todo items. The source code is open-source and includes build instructions.

Read more
Development Todo App

Open Source Android Apps: Privacy, Security, and Customization

2025-03-10

Tired of intrusive ads and privacy concerns in closed-source apps? Open-source Android apps offer a refreshing alternative. Publicly available source code ensures transparency and security, allowing users and developers to examine the code for vulnerabilities and malicious elements. Open-source apps often prioritize user privacy, collecting less data and providing clear documentation on data usage. Furthermore, you can customize the app to fit your needs, and a strong community supports ongoing development and improvements.

Read more
Development open source apps

Tesla Insurance Costs Skyrocket Amidst Wave of Vandalism and Backlash

2025-03-18
Tesla Insurance Costs Skyrocket Amidst Wave of Vandalism and Backlash

Tesla insurance premiums are surging due to the company's declining reputation and a rise in vandalism targeting its vehicles. Insurers, relying on actuarial models, are predicting higher claim payouts for Tesla EVs. Elon Musk's personal brand is inextricably linked to the cars, fueling public anger and leading to protests and acts of vandalism, including arson, graffiti, and theft. This has prompted insurers to increase rates significantly, especially for models like the Model X and Model S Plaid. A similar situation unfolded in 2023 with Kia and Hyundai vehicles, whose easy theft led to soaring insurance costs. Adding fuel to the fire, a website called "DOGEQUEST" allegedly publishes personal information of Tesla owners, exacerbating the crisis.

Read more
Tech vandalism

Topological Sort Algorithm Variant: Efficiently Handling Dependencies

2025-04-03
Topological Sort Algorithm Variant: Efficiently Handling Dependencies

This article presents an improved topological sorting algorithm based on Kahn's algorithm, but it treats nodes as sets instead of individual nodes. The algorithm iteratively finds the root sets of the graph, removes them, and repeats until the graph is empty. The order of the removed root sets forms a topological order, and nodes within the same root set are independent and can be processed in parallel. The algorithm can also detect cycles and return a partial topological ordering instead of completely aborting.

Read more

LLM Performance on Advent of Code 2024: A Surprise

2024-12-30
LLM Performance on Advent of Code 2024: A Surprise

This post details an experiment testing several leading Large Language Models (LLMs) on the 2024 Advent of Code challenge. Surprisingly, the LLMs performed worse than expected, even underperforming the author. A simple framework was used, providing the models with the complete problem description and requiring executable Python code. Results showed frequent timeouts and exceptions, suggesting LLMs excel at solving familiar problems but struggle with novel ones. This limitation might stem from reliance on program templates, insufficient computational resources, or suboptimal prompting. The experiment highlights Advent of Code as a potential benchmark for evaluating coding agents.

Read more

Metamorphic Rocks: Messengers from Earth's Depths

2024-12-27
Metamorphic Rocks: Messengers from Earth's Depths

This essay explores the incredible journeys of metamorphic rocks. Starting as humble seabed sediments, these rocks are buried deep within the Earth's crust, undergoing intense heat and pressure that transforms them into new mineral forms. Their eventual return to the surface provides invaluable insights into the planet's deep interior. The author vividly describes this transformation as an epic journey, highlighting the importance of metamorphism in plate tectonics and the crucial role of water in the process. The story also contrasts the ease of exploring space with the challenges of accessing Earth's subsurface.

Read more
1 2 506 507 508 510 512 513 514 596 597