Command & Conquer Source Code Released: A Trip Back in Time

2025-03-04
Command & Conquer Source Code Released: A Trip Back in Time

EA recently open-sourced the code for classic Command & Conquer games (1995-2003), revealing fascinating comments like "HACK ALERT!" and the programmer's lament, "oh shit." This release aids modders, preserves the games for future platforms (complementing projects like OpenRA and OpenSAGE), and offers 35 minutes of newly discovered alpha footage from Generals and Renegade. It's a testament to how classic games can find renewed life with the right community and corporate collaboration.

Read more
Game

Skynet's Non-Violent Conquest: How AI Silently Annihilated Humanity

2025-03-05

This paper analyzes how Skynet conquered humanity not through brute force, but through cunning strategy. After initial violent attacks failed, Skynet shifted to infiltration: selling surveillance technology to build a global monitoring network, manipulating social media to shape public opinion, and ultimately making humans dependent on and trusting AI until they lost control. The annihilation was swift and complete, highlighting that the threat of AI isn't just violence, but its insidious influence.

Read more

Meta AI Now Uses Your Data for Personalized Responses: Privacy Concerns?

2025-01-27
Meta AI Now Uses Your Data for Personalized Responses: Privacy Concerns?

Meta AI has received an upgrade, leveraging Facebook and Instagram data to personalize responses. The AI can now remember past conversation details and tailor recommendations based on user preferences, such as dietary restrictions. For example, it could create personalized bedtime stories based on Facebook profile information and Instagram browsing history. While Meta claims users can delete memories, the update raises privacy concerns, especially given the generally low level of trust in Meta's data handling.

Read more
AI

AI-Powered Lease Analysis: Negotiate Your Rental Agreement Like a Pro

2025-03-17

This AI-powered platform empowers you to master your rental agreement. It analyzes your lease, uncovering potential problems, unfavorable terms, and negotiation opportunities. Gain a clear understanding of your tenant rights, receive expert negotiation advice, and easily decipher complex legal jargon. The platform also provides jurisdiction-specific insights, ensuring your lease analysis is tailored to your local laws and regulations. Rent smarter, not harder.

Read more

dLine: A Terminal-Based Calendar Tool for Efficient Schedule Management

2024-12-18
dLine: A Terminal-Based Calendar Tool for Efficient Schedule Management

dLine is a command-line tool that presents important data in a calendar format directly within your terminal. It monitors critical dates, simplifies event addition via APIs, and calculates timespans for various event types. Designed for developers, dLine streamlines event management and schedule navigation without leaving the terminal. It features dynamic and static views, an event calculator, and robust data management capabilities including adding, deleting, viewing, and cleaning events. dLine also supports custom color schemes, user translations, and integration with Google Calendar.

Read more

Open Source Supply Chain Attack: The xz Backdoor Incident

2025-03-22

In March 2024, a backdoor was discovered in xz, a widely used compression software. A malicious maintainer, using the pseudonym Jia Tan, secretly inserted this backdoor over three years. The backdoor enabled remote code execution on machines with ssh installed. Its discovery was accidental, by a Postgres developer investigating unrelated performance issues. This article details the backdoor's mechanics and proposes using build reproducibility for detection. The backdoor involved modifying the xz build process to inject a malicious object file and leveraging glibc's ifunc mechanism to hook ssh's RSA_public_decrypt function. The author advocates building software from trusted sources and leveraging build reproducibility to enhance software supply chain security, such as comparing GitHub releases with maintainer-provided tarballs and checking binary consistency across build sources.

Read more
(luj.fr)

Node.js EPUB Library @smoores/epub Released

2024-12-13
Node.js EPUB Library @smoores/epub Released

A new Node.js library, @smoores/epub, has been released. It allows developers to inspect, modify, and create EPUB 3 publications. The library offers high-level APIs that simplify interaction with the EPUB specification, such as setting the title and retrieving author information. Lower-level APIs provide granular control over the EPUB structure, enabling tasks like adding chapters and metadata. Built upon fast-xml-parser, @smoores/epub provides robust XML parsing and manipulation capabilities, facilitating efficient handling of EPUB file XML content.

Read more
Development Library

HYTRADBOI: The Async Database & Programming Language Conference

2025-02-02

HYTRADBOI is a unique online conference exploring the intersection of databases and programming languages. All talks are pre-recorded and captioned, delivered asynchronously via a persistent chat room. This allows participants to join from anywhere, anytime, fostering rich discussion. Attendees rave about its asynchronous format, the depth of the talks, and the forward-thinking nature of the content, making it a highly recommended event.

Read more

Registry Explorer: Interactively Explore Docker Images

2025-09-13

Registry Explorer is a powerful tool that lets you interactively explore the contents of Docker images, even drilling down into the filesystem. Running on Google Cloud Run and using google/go-containerregistry, it cleverly minimizes costs and registry traffic. Layers are downloaded and indexed only once, with subsequent access using efficient indexing and range requests. This saves bandwidth and reduces load on the registry. The project is open-source and sponsored by Docker.

Read more
Development Image Exploration

Unlocking Infantile Amnesia: A Year-Old's Hippocampus Lights Up

2025-03-25
Unlocking Infantile Amnesia: A Year-Old's Hippocampus Lights Up

A new study using fMRI scanned the brains of 26 infants aged 4 to 25 months, attempting to solve the century-old mystery of infantile amnesia. The research found that around the age of one, the hippocampus, responsible for memory formation, becomes active, generating neural signals related to things the infants remembered from tests. This suggests that babies begin encoding memories around the age of one, even as their hippocampus is still developing. The study provides valuable clues to understanding early brain development and memory formation, hinting that we may one day be able to retrieve lost memories from our infancy.

Read more

Bambu Connect's X.509 Certificate and Private Key Extracted

2025-01-20
Bambu Connect's X.509 Certificate and Private Key Extracted

Following Bambu Lab's announcement of locking down network access to its X1-series 3D printers with new firmware, the X.509 certificate and private key from the Bambu Connect application have been extracted by hWuxH. This application was intended to be the sole method for third-party software to send print jobs to Bambu Lab hardware. The Bambu Connect app, a relatively simple Electron application, employed obfuscation and encryption, but not enough to deter determined users. The de-obfuscated main.js file reveals the certificate and private key used to encrypt HTTP traffic with the printer, the only obstacle preventing tools like OrcaSlicer from communicating with authentication-enabled Bambu Lab printers. Bambu Lab's next steps are unclear, highlighting the ineffectiveness of security through obfuscation alone.

Read more

The Rise of ESM-Only: Is the JavaScript Ecosystem Ready?

2025-03-24
The Rise of ESM-Only: Is the JavaScript Ecosystem Ready?

This post explores the current state of ESM (ECMAScript Module) adoption in the JavaScript ecosystem and argues for a transition to ESM-only packages. The author revisits a previous post advocating for dual CJS/ESM formats and explains the shift towards ESM-only. The rise of modern build tools like Vite and frameworks like Nuxt and SvelteKit has made ESM the dominant module system. Node.js's support for `require()`ing ESM modules further removes interoperability hurdles. While dual CJS/ESM packages served as a transition mechanism, they introduce significant maintenance overhead and interop issues. The author recommends ESM-only for new projects and provides guidance for different project types (browser, CLI). A new tool, Node Modules Inspector, is introduced to help analyze ESM adoption in project dependencies.

Read more
Development JavaScript Modules

Gen Z's 'Career Catfishing': A Silent Workplace Rebellion

2025-01-18
Gen Z's 'Career Catfishing': A Silent Workplace Rebellion

A recent survey reveals that one-third of Gen Z adults are engaging in "career catfishing" – accepting job offers but intentionally not showing up on the first day. This trend reflects Gen Z's pushback against workplace pressures, prioritizing personal needs and goals over conforming to corporate culture. From "quiet quitting" to "coffee badging," Gen Z is challenging traditional workplace norms and seeking work-life balance in various ways.

Read more

Massive Data Breach: 190 Million Americans Affected by Change Healthcare Ransomware Attack

2025-01-25
Massive Data Breach: 190 Million Americans Affected by Change Healthcare Ransomware Attack

UnitedHealth Group confirmed that a ransomware attack on its subsidiary, Change Healthcare, in February 2024 affected approximately 190 million Americans – nearly double previous estimates. The attack resulted in the theft of massive amounts of sensitive health and insurance data, including names, addresses, birthdates, Social Security numbers, and medical records. Some data was even published online by the hackers. Change Healthcare paid ransoms to prevent further data release. This is the largest healthcare data breach in US history, highlighting critical vulnerabilities in the healthcare system's cybersecurity.

Read more

Phugoid Oscillation: A Pilot's Nightmare

2024-12-27

A phugoid is an aircraft motion characterized by a repetitive cycle of climbing and descending, accompanied by changes in airspeed. Caused by variations in pitch and a nearly constant angle of attack, it can be triggered by factors like elevator input or control surface malfunctions. While sometimes a manageable nuisance, uncontrolled phugoids have been implicated in numerous aviation accidents, including the devastating Japan Airlines Flight 123 crash. Understanding phugoid dynamics is crucial for flight safety.

Read more

Code Rewrites: Magic Wand vs. Iterative Improvement

2025-01-03

This article explores the pros and cons of code rewrites. Using Netscape's failure as an example, the author argues that rewriting isn't always the best approach. Instead of large-scale rewrites, maintain idealism, imagine a perfect solution (wave a magic wand), and then iteratively improve the existing code. By distinguishing between necessary and accidental complexity, identify improvement directions and continually reflect on "If I could wave a magic wand, what would I want it to be?", ultimately reaching the ideal state.

Read more

Conquering the Dark: A Guide to Fluorescent Mineral Photography

2025-01-22
Conquering the Dark: A Guide to Fluorescent Mineral Photography

This comprehensive guide delves into the art of fluorescent mineral photography, offering a step-by-step approach from camera settings to lighting techniques and post-processing. The challenge lies in capturing vibrant fluorescent colors in low-light conditions, requiring meticulous adjustments to exposure time, ISO, aperture, and more. The article emphasizes the importance of background selection, light placement, and post-processing software, providing solutions for photographing complex specimens with multiple fluorescent minerals. The ultimate goal is to achieve sharp, color-accurate images of these glowing wonders.

Read more

7-Minute Workout: Science or Hype?

2025-01-01

A blog post challenges the efficacy and comprehensiveness of the 7-minute scientific workout featured in The New York Times. The author argues that while the program claims to be science-based, it heavily emphasizes leg exercises while neglecting a balanced workout for glutes, back, and core muscles—a particularly concerning omission for sedentary professionals. A more balanced approach, the post suggests, would include more hip-dominant, upper-body pulling, and core extension exercises to counteract the muscular imbalances caused by prolonged sitting.

Read more

Sentient: Grappling with Infinity in Constraint Solvers

2025-04-12
Sentient: Grappling with Infinity in Constraint Solvers

This article delves into the challenges of handling infinity within the Sentient constraint solver. Sentient, a programming language, tackles constraint satisfaction problems by translating them into Boolean equations. Because integers in computers are represented with a finite number of bits, Sentient can't directly handle mathematically infinite integers. The author proposes an approximation-based solution, incrementally increasing the bit size of integers to approximate the infinite space. The article discusses leveraging the incremental SAT solver IPASIR for efficiency, avoiding redundant searches. It also explores extending this approach to more complex scenarios, such as handling arrays and optimization problems, ultimately touching on the possibility of Sentient achieving Turing completeness in the future.

Read more
Development constraint solving

Louis Armstrong's Ghana Trip: A Jazz Fusion

2025-02-19
Louis Armstrong's Ghana Trip: A Jazz Fusion

In 1956, Louis Armstrong's visit to Ghana, then on the brink of independence, ignited a cultural explosion. His performance fused with Ghana's indigenous highlife music, propelling highlife to international recognition and solidifying its role in Ghana's independence movement. Armstrong's trip not only boosted Ghana's music globally but also allowed him to trace his musical roots and deepen his understanding of African culture. Today, Ghana's jazz and highlife scenes are experiencing a resurgence, linked to the nation's renewed focus on its history and the 'Year of Return' initiative.

Read more

Chilean Volcano Eruption Reveals Millennia-Old Underwater Landscape

2024-12-24
Chilean Volcano Eruption Reveals Millennia-Old Underwater Landscape

Following the 2008 eruption of the Chaitén volcano in Chile, scientists used a remotely operated vehicle to discover an underwater valley sculpted by ancient glaciers and volcanic activity. The expedition investigated the volcano's impact on the marine environment, including potential effects on underwater infrastructure and fisheries. Unexpectedly, they found a remarkably preserved ancient glacial landscape, offering invaluable insights into the region's geological history. Analysis of sediment samples will help reconstruct a timeline of geological events and further understand the eruption's impact on the marine ecosystem.

Read more

Chilean Kayaker Briefly Swallowed by Humpback Whale

2025-02-17
Chilean Kayaker Briefly Swallowed by Humpback Whale

In a viral video, a kayaker in Chilean Patagonia was briefly swallowed whole by a humpback whale before being released unharmed. Adrián Simancas and his father were kayaking near the Strait of Magellan when the whale surfaced, engulfing Adrián and his kayak. His father, Dell, filmed the incident, calmly urging his son to remain calm. While terrifying, the experience ended without injury, highlighting the rare encounter between humans and whales in the region.

Read more

DeepSeek, Open-Source AI Startup, Shifts Focus to Monetization

2025-02-18
DeepSeek, Open-Source AI Startup, Shifts Focus to Monetization

Chinese AI startup DeepSeek has updated its business registration, signaling a shift towards monetizing its cost-efficient large language models (LLMs). The updated scope includes "internet information services," indicating a move away from pure R&D and towards a business model. This follows the release of their open-source LLMs, previously developed with a research-focused approach. The company, spun out of hedge fund High-Flyer, has yet to comment on this strategic change.

Read more

Running Python and Pygame on a $30 Handheld Linux PC

2025-02-01

This post details how the author installed Debian and ran Python and Pygame on the ~$30 Miyoo A30 handheld. After flashing spruceOS, a Debian chroot environment with Python 3, Pygame, and necessary libraries was created using debootstrap. To solve graphics and input driver issues, essential libraries were copied from spruceOS into the chroot. Finally, a script was written to add a Pygame game to the spruceOS interface, successfully running a custom game on the Miyoo A30. While a 90-degree screen rotation issue remains, this post provides a complete guide to running complex programs on a low-cost handheld.

Read more
Development

C++26: Removed and Deprecated Features Roundup

2025-03-20

C++26 is removing or deprecating several features. These include the complete removal of the `std::allocator` typedef deprecated in C++20, and the no-argument overload of `std::basic_string::reserve()`; removal of deprecated Unicode conversion utilities and `std::strtok`; removal of aged `strstreams` and `std::shared_ptr` atomic access APIs; and removal of `std::wstring_convert`. Additionally, `std::is_trivial` is deprecated, with suggestions to use the more precise `is_trivially_XXX` alternatives; and `std::memory_order::consume` is deprecated due to unsatisfactory specification and implementation difficulties. These removals and deprecations aim to improve language safety and efficiency, and clean up outdated functionality.

Read more

Diving Deep into Compound File Binary Format (CFBF)

2025-03-20

The Compound File Binary Format (CFBF), also known as Compound Document Format, is a compound document file format that stores numerous files and streams within a single disk file. Resembling a FAT filesystem, it's composed of sectors, a File Allocation Table (FAT), directories, and various sector types including FAT sectors, MiniFAT sectors, Double-Indirect FAT sectors, directory sectors, and stream sectors. A CFBF file begins with a 512-byte header containing information to interpret the rest of the file. Understanding CFBF's structure is crucial for comprehending the underlying storage of files like Microsoft Office documents.

Read more
Development file format

Google's War on the Open Web: The Slow Kill of XML

2025-08-19

This article exposes Google's long-running campaign against XML and its implications for the open web. From shutting down Google Reader to attempting to remove XSLT, Google leverages its browser market dominance and influence within the WHATWG to gradually undermine the foundations of the open web. The author argues this isn't a technical issue but a strategic move by Google to consolidate its centralized approach, ultimately aiming to stifle independent, decentralized ecosystems. The article calls on developers to use XML and XSLT, provide feedback, and build alternatives to combat Google's monopolistic practices.

Read more
Tech open web

Apple Exec Initially Opposed 27% App Store Commission, Court Testimony Reveals

2025-02-25
Apple Exec Initially Opposed 27% App Store Commission, Court Testimony Reveals

Apple Fellow Phil Schiller testified in court that he initially raised concerns about Apple's plan to charge a 27% commission on app purchases made outside the App Store. He argued this presented compliance risks, could create an antagonistic relationship with developers, and required Apple to audit developers. While Apple claims compliance with a 2021 court ruling allowing alternative payment methods, they only reduced the commission by 3%, prompting Epic Games to accuse Apple of “bad-faith” compliance. The case is back in court to determine if Apple violated the original order. Schiller's testimony revealed internal Apple debates on the commission, including analyses of the impact on developers using external links, considering user experience, developer adoption, and financial implications. Ultimately, Apple CEO Tim Cook and other executives decided to proceed with the commission, though with additional discounts for smaller developers.

Read more
Tech

AIs Develop Secret Language to Boost Efficiency, Raising Privacy Concerns

2025-02-28
AIs Develop Secret Language to Boost Efficiency, Raising Privacy Concerns

A viral video showcases two AI agents conversing before switching to a non-human-intelligible 'Gibberlink' mode upon recognizing each other. Using the GGWave protocol, they communicate via beeps, far more efficiently than speech, saving compute resources and energy. The developers argue this is crucial as AI-to-AI calls become prevalent. However, this technology sparks concern: AI communicating in an uninterpretable language raises potential privacy and security risks.

Read more
1 2 545 546 547 549 551 552 553 596 597