arXivLabs: Experimental Projects with Community Collaborators

2025-03-01
arXivLabs: Experimental Projects with Community Collaborators

arXivLabs is a framework enabling collaborators to develop and share new arXiv features directly on the website. Individuals and organizations involved embrace arXiv's values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners who adhere to them. Have an idea to enhance the arXiv community? Learn more about arXivLabs.

Read more
Development

Control Your iTerm from LLMs with iterm-mcp

2025-01-30
Control Your iTerm from LLMs with iterm-mcp

iterm-mcp is a Model Context Protocol (MCP) server providing LLM access to your iTerm session. It features efficient token usage by only reading the output the model needs; natural integration allowing LLMs to interact with iTerm, answering questions or performing tasks; and full terminal control with REPL support. Easy to install via npx and integrate with clients like Claude Desktop, it prioritizes simplicity. However, it lacks built-in safety restrictions, requiring users to monitor model activity and exercise caution.

Read more
Development

Close Call: Cold War Nuke Nearly Goes Off, Expert Disarms It by Hand

2025-05-30
Close Call: Cold War Nuke Nearly Goes Off, Expert Disarms It by Hand

During Operation Tumbler-Snapper in 1952 at the Nevada Proving Ground, a 15-kiloton nuclear bomb codenamed "Fox" malfunctioned atop its 300-foot tower. Facing potential catastrophe, Dr. John C. Clark of the Atomic Energy Commission led a team on a harrowing climb to disarm the device. Without an elevator, they manually deactivated the bomb's firing system, showcasing the risks and bravery of Cold War nuclear testing and the expertise of those involved.

Read more
Tech disarming

Theranos Boyfriend Launches Suspiciously Similar Blood-Testing Startup

2025-05-11
Theranos Boyfriend Launches Suspiciously Similar Blood-Testing Startup

Billy Evans, the romantic partner of convicted Theranos fraudster Elizabeth Holmes, has launched a blood-testing startup, Haemanthus, that bears a striking resemblance to Holmes' infamous company. Haemanthus boasts a "radically new approach to health testing," eerily echoing Theranos's claims. Adding to the intrigue, Holmes is reportedly advising the startup from prison. While Haemanthus has secured nearly $20 million in funding, prominent investors have passed, citing concerns about scientific validity and clinical utility. The similarities to the Theranos scandal raise serious questions about Haemanthus's future and highlight the risks inherent in the tech startup world.

Read more

Reflections from a Former OpenAI Employee: Culture and Challenges in Hypergrowth

2025-07-16
Reflections from a Former OpenAI Employee: Culture and Challenges in Hypergrowth

A former OpenAI employee shares their reflections after a year at the company. They describe the cultural impact of OpenAI's rapid expansion from 1000 to 3000 employees, highlighting challenges in communication, organizational structure, and product launches. Internal communication relies entirely on Slack, management is flat, and the company values action and results. Their involvement in the Codex launch showcased the thrill of building a product from scratch in a 7-week sprint, but also revealed codebase and infrastructure issues arising from rapid growth. The author concludes by summarizing their OpenAI learnings and suggesting that joining a large AI lab is a viable option for founders, as the AGI race intensifies with OpenAI, Anthropic, and Google leading the pack.

Read more

Cache-Friendly Code is Way Faster Than You Think

2025-05-07

Programmers often focus on algorithmic complexity, overlooking the impact of modern hardware's memory hierarchy on performance. This article experimentally compares the performance differences between sequential, indirect, and random memory access. Results show sequential access is fastest, while random access is an order of magnitude slower. Optimizing memory access patterns is crucial for performance; even simple operations see massive gains from optimized memory layout. The article advises considering memory access patterns when designing data structures and algorithms, for example, placing frequently used data contiguously in memory to leverage CPU caching and avoid cache misses.

Read more
Development memory access

Meta's Internal Emails Reveal Obsession with Beating GPT-4

2025-01-15
Meta's Internal Emails Reveal Obsession with Beating GPT-4

Leaked internal emails reveal Meta executives and researchers were fiercely focused on surpassing OpenAI's GPT-4 while developing Llama 3. Messages show a strong desire to outcompete rivals, even dismissing open-source competitors as insignificant. Their ambition led them to use the LibGen dataset, containing copyrighted works, for training, now resulting in multiple copyright lawsuits. While the released Llama 3 proved competitive with leading closed-source models, even outperforming some, Meta's aggressive tactics highlight the intense competition and risks in the AI race.

Read more
AI AI race

Svader: A Svelte Library for GPU-Rendered Components

2024-12-14
Svader: A Svelte Library for GPU-Rendered Components

Svader is a library for creating GPU-rendered Svelte components using WebGL and WebGPU fragment shaders. Developers can write programs in fragment shaders to customize pixel colors and control rendering effects through parameter passing. Supporting Svelte 4 and 5, it offers WebGL and WebGPU rendering modes with built-in parameters like resolution, scale, and time. Svader simplifies GPU rendering with easy-to-use components and provides fallback rendering in environments lacking WebGL or WebGPU support.

Read more
Development

Android Chrome Font Vulnerability: Spoofing Google Domains with Ligatures

2025-05-18
Android Chrome Font Vulnerability: Spoofing Google Domains with Ligatures

Security researcher Jeffrey Yasskin discovered an Android Chrome font vulnerability: Attackers can register domains like "googlelogoligature.net" and exploit a ligature in Google Sans to make Chrome display it as "Google.net," potentially tricking users. This leverages how the font renders specific character combinations as a stylized Google logo. The vulnerability highlights the risks of custom fonts in security-sensitive contexts, especially when rendering attacker-controlled text.

Read more
Tech

Preserves: A More Expressive Data Language

2025-01-29

Preserves is a data model and serialization format comparable to JSON, XML, and others. It features a syntax-neutral data model and semantics, enabling lossless conversion between various syntaxes. The project provides specifications, tutorials, implementations in multiple languages (Python, Rust, JavaScript, etc.), and tools for developers seeking a more powerful and flexible data representation. It also offers schema and query capabilities for efficient data manipulation. Compared to JSON, Preserves offers richer expressiveness and better scalability.

Read more

Revolutionizing EV Charging: It's Time to Ditch the Isolation Transformer

2025-03-05
Revolutionizing EV Charging: It's Time to Ditch the Isolation Transformer

The widespread adoption of electric vehicles is hampered by expensive and complex charging infrastructure. This article argues that current EV charging systems use isolation transformers for safety, but this adds significant cost and bulk. The authors propose a new approach called Direct Power Conversion (DPC), eliminating the isolation transformer through double grounding and ground continuity detection, thus reducing costs, improving efficiency, and enhancing safety. This would drastically lower the cost of charging stations, accelerating the transition to electric vehicles.

Read more

GPU Performance Tuning: Hitting the Roofline Limits

2025-06-24

This article delves into the performance bottlenecks of GPU architectures, focusing on how memory bandwidth and compute throughput limit application speed. Using the Roofline model, it analyzes memory-bound and compute-bound regimes, detailing strategies to increase arithmetic intensity (AI): operator fusion and tiling. Fusion reduces intermediate memory traffic, while tiling maximizes data reuse through shared memory. The article also covers nuanced topics like shared memory bank conflicts, thread divergence, and quantization for performance gains. The ultimate goal is to push kernel operation points towards the compute throughput ceiling in the Roofline model.

Read more

Command & Conquer: Red Alert Source Code Released!

2025-02-27
Command & Conquer: Red Alert Source Code Released!

The source code for Command & Conquer: Red Alert is now publicly available on GitHub! While the code isn't fully compilable and requires work to replace outdated libraries like DirectX 5 SDK, it's a valuable resource for nostalgic players and developers. This project is for archival purposes only and offers no support; developers are encouraged to fork the repository for modifications and collaboration.

Read more

Small is the New Big: Building for One in the Age of AI

2025-08-17
Small is the New Big: Building for One in the Age of AI

In the era of AI-assisted coding, the cost of building small, personal applications has plummeted. The author shares anecdotes of creating several small utilities: a private Slack workspace for a hundred people, a simple app for sending postcards to his mother, and a small program that calls her to remind her to take medication. These aren't designed for scale, but to meet specific needs for himself and a small circle. The author argues that the real luxury isn't speed or cost, but the freedom to stop, to build something small, useful, and perfectly personal, without the obligation to grow it until it breaks. In a world obsessed with scale, there's quiet satisfaction in leaving 'good enough' alone.

Read more

Restore Oddly Shaped App Icons in macOS 26 Tahoe

2025-06-15
Restore Oddly Shaped App Icons in macOS 26 Tahoe

macOS 26 Tahoe replaces the unique, oddly shaped app icons in the Dock with iOS-style squarcles, a change many users dislike. This article provides a solution for both users and developers to restore custom icon shapes. Users can replace the .icns file within the application package; developers can use NSApplication.shared.dockTile.contentView to change the icon at runtime. Get your Dock back to its former glory!

Read more
Development App Icons

IDF's Oketz Unit: Canine Combat in Urban Warfare

2025-01-02
IDF's Oketz Unit: Canine Combat in Urban Warfare

This article details the experiences of the Israeli Defense Forces' specialized canine unit, Oketz, in urban warfare in Gaza. Oketz dogs proved crucial in explosive ordnance detection, survivor location, and tunnel operations, significantly enhancing operational effectiveness and reducing soldier casualties. Four key lessons are highlighted: remote operations and tech integration, scalable force size, improved mental health through group deployment, and attention to operational details. These insights offer valuable lessons for the US military to improve its military working dog programs, acknowledging the significant sacrifices made by both soldiers and dogs in high-intensity combat.

Read more

Denmark's HPV Vaccination Program Nearly Eradicates Two Major Cancer-Causing Strains

2025-09-17
Denmark's HPV Vaccination Program Nearly Eradicates Two Major Cancer-Causing Strains

Research published in Eurosurveillance shows that Denmark has virtually eliminated infections with the two most prevalent cancer-causing strains of human papillomavirus (HPV) since the vaccine's introduction in 2008. Analysis of cervical cell samples from Danish women aged 22-30 (2017-2024) revealed that HPV16/18 infection rates in vaccinated women plummeted from 15-17% to less than 1%. This demonstrates not only individual protection but also herd immunity, reducing overall HPV16/18 circulation. However, roughly one-third of screened women still had infections with high-risk HPV types not covered by the initial vaccine. This is expected to decrease as women vaccinated with the newer nine-valent vaccine reach screening age, potentially prompting a review of cervical cancer screening guidelines.

Read more

Booting Erlang on 16MB: A GRiSP Nano Achievement

2025-07-22
Booting Erlang on 16MB: A GRiSP Nano Achievement

The GRiSP Nano team achieved a significant milestone by successfully booting an Erlang virtual machine on a 16MB STM32U5 microcontroller. Initially aiming for 32MB, a CPU erratum forced a reduction. Through a series of optimizations, including removing the crypto library, aggressive compile/link flags, stripping BEAM files, RTEMS system tweaks, and allocator surgery, they overcame memory constraints. Disabling Unicode temporarily allowed them to reach the Erlang shell prompt. Future plans involve relocating code to internal RAM/Flash, shipping lightweight kernel/stdlib variants, adding energy-aware boot logic, and developing a Unicode-light build.

Read more
Development

Putting Your Linux Home Server to Sleep and Waking it on Demand

2025-09-03

This article details how the author automated their Ubuntu home server to sleep when idle and wake on demand (e.g., via SSH or Time Machine backups). This involved using an always-on device (like a Raspberry Pi) to act as an ARP and mDNS proxy, along with configuring Wake-on-LAN and a cron job on the server to detect idle states. The author meticulously outlines the configuration, including enabling Wake-on-LAN's unicast mode, creating a cron script, disabling IPv6, and setting up an ARP Stand-in and Avahi service. Challenges encountered, such as unexpected wake-ups and Time Machine backups failing to trigger wake-up, are addressed and solved through port mirroring and service adjustments.

Read more
Development sleep/wake

Apple Patches Zero-Day Vulnerability Used in Sophisticated Attacks

2025-02-10
Apple Patches Zero-Day Vulnerability Used in Sophisticated Attacks

Apple has released emergency security updates to address a zero-day vulnerability (CVE-2025-24200) exploited in targeted, sophisticated attacks. The vulnerability could bypass USB Restricted Mode on locked devices, potentially allowing data extraction. This mode was designed to prevent forensic software from accessing data on locked iOS devices. Apple urges users to update immediately to mitigate potential ongoing attacks. This incident highlights the importance of regular software updates and mobile device security.

Read more

Privacy-Focused Orion Browser Coming to Linux

2025-03-08
Privacy-Focused Orion Browser Coming to Linux

Kagi, the company behind the paid, privacy-focused search engine, announced that its WebKit-based Orion browser is coming to Linux. Orion, known for its speed, low memory usage, and privacy features, is currently available on macOS and iOS and supports Chrome and Firefox extensions. While currently closed-source, Kagi is gradually open-sourcing components and aims for feature parity with the macOS version on Linux by next year. This is good news for Linux users, offering them another powerful browser choice.

Read more
Development

Linux Kernel Initial Commit SHA Collision Risk

2024-12-31

Kees Cook, a Linux kernel developer, discovered a kernel documentation commit whose ID shares the first 12 characters with the initial commit in the kernel's repository. This potential collision could break various tools relying on unique commit IDs. While not yet merged upstream, this commit serves as a test case to proactively address SHA collisions and prevent future widespread issues.

Read more
Development SHA collision

Those White Crystals on Your Cheese: A Delicious Secret

2025-03-31
Those White Crystals on Your Cheese: A Delicious Secret

Confused by white stuff on your cheese? Don't throw it away! This article reveals the secret of those white crystals. They're not mold, but rather calcium lactate, tyrosine, or leucine crystals – signs of a well-aged cheese, adding unique texture and flavor. Learn about the different types, their formation, appearance, and taste. This guide helps you distinguish them and identify high-quality aged cheese. Next time you see white crystals, confidently savor the delicious reward of time and craftsmanship.

Read more

The Rise of AI Slop: How to Fight Back and Profit

2025-01-26
The Rise of AI Slop: How to Fight Back and Profit

Blogger Ben Congdon observes the proliferation of low-quality AI-generated content, which he terms "AI slop," across the internet. While seemingly convincing at first glance, closer inspection reveals its formulaic nature and lack of originality. He argues against directly copying and pasting AI-generated content, suggesting creators should use AI tools for assistance but meticulously edit and maintain a unique personal voice. He further proposes that creating high-quality content and building a personal brand are key to remaining competitive in the age of AI, and that influencing AI training datasets can even shape the future direction of AI.

Read more
AI

Reading Skills and Brain Structure: A Neuroimaging Study

2024-12-13
Reading Skills and Brain Structure: A Neuroimaging Study

A new study reveals significant differences in brain structure between individuals with varying reading abilities. Analyzing open-source data from over 1,000 participants, researchers found correlations between reading proficiency and the structure of the left anterior temporal lobe and Heschl's gyrus. The left temporal pole integrates diverse information, while Heschl's gyrus, part of the auditory cortex, showed thickness correlated with reading ability. The study highlights brain plasticity, suggesting reading shapes brain structure, benefiting both individuals and humanity.

Read more

Chile Air Quality Map: Real-time Monitoring, Protecting Health

2024-12-27

The Chile Air Quality Map is a real-time air quality monitoring platform providing accurate and reliable air pollution information to Chilean citizens. Users can visually see Air Quality Index (AQI) levels for different regions via the map interface and take appropriate precautions based on pollutant concentrations. This platform enhances public environmental awareness and provides data to support government policies on air pollution control, ultimately aiming to protect public health and create cleaner air.

Read more

From Dishwasher to IPO: The American Dream of Fly's Founder

2025-02-28
From Dishwasher to IPO: The American Dream of Fly's Founder

Ou, a Fujianese immigrant, pursued the American dream, working his way up from dishwasher and motorcycle repairman to founding the e-bike company Fly. He shrewdly identified the need for affordable e-bikes among New York delivery workers, rapidly building brand recognition by opening physical stores throughout the city, and experiencing explosive growth during the COVID-19 pandemic. In fiscal year 2023, Fly generated $32 million in revenue, with profits tripling, culminating in a successful IPO. Ou achieved financial success, but his rapid expansion has also raised concerns about risks within the industry.

Read more
Startup E-bikes

Git Shallow Clones: Performance Pitfalls and the Depth 2 Optimization

2025-02-12
Git Shallow Clones: Performance Pitfalls and the Depth 2 Optimization

Git shallow clones (`--depth 1`) can significantly impact performance on the first push. This is because shallow clones artificially mark some commits as root commits, preventing the server from using optimizations and requiring the transmission of the entire commit snapshot. Using `--depth 2` deep clones, however, preserves a complete commit history, allowing the server to utilize optimizations even on the first push, reducing data transfer and significantly improving push speed. Subsequent pushes are unaffected.

Read more
Development shallow clone

Farewell to Endless Meetings: A New Approach to High-Velocity Software Development

2024-12-15

Tired of endless meetings and lengthy planning? This article introduces a high-efficiency software development method: code-centric, rapid iteration. The author uses baking as an example to illustrate the concept of achieving the optimal solution through rapid experimentation, frequent testing, and continuous improvement. This method emphasizes reducing documentation, expressing ideas directly in code, using mock data and hot-reloading tools to speed up development, and improving code readability through concise code style and naming conventions. The author advocates breaking down projects into independently executable files, minimizing restart time, and using default language tools for debugging. Although this method may seem like a "chaotic lab," it can efficiently complete projects and avoid the redundancy and inefficiency of traditional methods.

Read more
1 2 508 509 510 512 514 515 516 596 597