Fast LLM Inference Engine Built From Scratch

2024-12-15

This article details the author's journey in building an LLM inference engine from scratch using C++ and CUDA, without relying on any libraries. The process provided a deep dive into the full stack of LLM inference, from CUDA kernels to model architecture, showcasing how optimizations impact inference speed. The goal was to create a program capable of loading weights from common open-source models and performing single-batch inference on a single CPU+GPU server, iteratively improving token throughput to surpass llama.cpp. The article meticulously outlines the optimization steps on both CPU and GPU, including multithreading, weight quantization, SIMD, kernel fusion, and KV cache quantization, while analyzing bottlenecks and challenges. The final result achieves near state-of-the-art performance for local LLM inference.

Read more
Development LLM inference

Unmasking I/Q Signals: The Mystery of Wireless Communication

2025-07-30
Unmasking I/Q Signals: The Mystery of Wireless Communication

This article unveils the mystery behind I/Q signals, crucial in wireless communication but absent in traditional audio processing. It delves into the relationship between I/Q signals, sinusoidal waves, and the Fourier Transform. Using vector mathematics and the dot product, the article explains the orthogonality of I/Q signals and how they enable efficient modulation and demodulation. Finally, it clarifies why complex numbers are a more efficient way to represent I/Q signals in digital signal processing.

Read more

The AI Coding Assistant: An Existential Crisis for Software Engineers?

2025-03-23

The rise of AI coding assistants is fundamentally reshaping the role of software engineers, transitioning them from pure coders to orchestrators and managers of AI systems. This shift has sparked an identity crisis within the software engineering community. The article explores the challenges and opportunities presented by this transformation, highlighting that the core value of a software engineer lies in problem-solving and value creation, not just coding. The future demands stronger communication, systems thinking, and adaptability to thrive in the age of AI.

Read more
Development

Let's Encrypt to Offer 6-Day Certificates and IP Address Support in 2025

2025-01-16
Let's Encrypt to Offer 6-Day Certificates and IP Address Support in 2025

Let's Encrypt announced plans to introduce two new certificate options in 2025: short-lived certificates with a six-day lifetime and support for IP addresses. Six-day certificates significantly enhance security by minimizing the window of vulnerability. IP address support enables secure TLS connections for IP-accessible services using publicly trusted certificates, eliminating the need for domain names. The rollout will be phased, with general availability expected by the end of 2025. Users will need an ACME client supporting certificate profiles to obtain the short-lived certificates.

Read more

The Science of Binge-Watching: How Many Episodes Before You Give Up?

2025-03-03
The Science of Binge-Watching: How Many Episodes Before You Give Up?

This article explores the optimal strategy for binge-watching: when to abandon a show. By analyzing IMDb ratings data, the author finds most shows require 6-7 episodes to reach their long-term average quality. However, long-running series typically decline in quality around seasons five or six. The author also analyzes the psychological biases involved in sticking with bad shows, using his own experience with *How I Met Your Mother* as a cautionary tale about the importance of cutting losses and avoiding disappointing finales.

Read more

NASA Solves Ingenuity Mars Helicopter Crash Mystery

2024-12-13
NASA Solves Ingenuity Mars Helicopter Crash Mystery

After nearly a year of investigation, NASA has finally solved the mystery behind the crash of Ingenuity, the Mars helicopter carried by the Perseverance rover. The helicopter's navigation system, unable to discern sufficient features on the relatively smooth Martian surface, resulted in a horizontal velocity upon landing. This caused Ingenuity to tumble, breaking its blades. Despite lacking a black box, investigators pieced together the cause from limited data and imagery. Remarkably, Ingenuity still communicates intermittently with Perseverance. The incident has prompted NASA to begin planning for follow-on missions, including a larger Mars helicopter capable of carrying scientific instruments.

Read more

David vs. Goliath: Small Costa Rican Supermarket Wins Trademark Battle Against Nintendo

2025-02-02
David vs. Goliath: Small Costa Rican Supermarket Wins Trademark Battle Against Nintendo

A small Costa Rican supermarket, "Super Mario," successfully defended its trademark against Nintendo. Nintendo, citing its 'Super Mario' trademark, initially challenged the supermarket's registration. However, the supermarket's legal team successfully argued that its registration for supplying basic food products didn't conflict with Nintendo's existing trademark classes. This underdog victory highlights the power of persistence and strategic legal action, even against a global corporate giant.

Read more

Post-WWII Highways: Debunking Myths and Unveiling the Truth

2024-12-17
Post-WWII Highways: Debunking Myths and Unveiling the Truth

This article explores key events and misconceptions surrounding the development of highways after World War II. It clarifies that Germany's Autobahn was not initially designed for military purposes, but rather to stimulate the economy and enhance national prestige. While Allied forces utilized the Autobahn in the later stages of WWII, this wasn't its original intent. The article debunks the myth that the US Interstate system was designed with one mile in five being straight and level for emergency bomber landings, explaining its true purpose was civilian benefit and economic development, although it also served military needs, such as troop movement and industrial production. Finally, the article reviews post-WWII attempts and exercises by various militaries to utilize highways as emergency runways for aircraft, highlighting their limitations and ultimate replacement by dedicated airfields.

Read more
Tech highways WWII

China to Subsidize Smartphone Purchases to Boost Spending

2025-01-03
China to Subsidize Smartphone Purchases to Boost Spending

China will expand consumption subsidies to include smartphones and other electronics to boost domestic spending amid rising external headwinds. Officials from the nation’s top economic planning agency said Friday that a national trade-in program currently covering home appliances and cars will be broadened this year to personal devices such as phones, tablets, and smartwatches. Post-Covid, Chinese consumers have held onto their smartphones longer due to a lack of exciting new features and general belt-tightening. Like with cars and washing machines, investors hope incentives will revive the world’s largest smartphone market and drive sales not only for brands like Huawei and Xiaomi but also for platforms popular with device fans like Alibaba and JD.com. The move is part of China’s efforts to encourage consumption to offset the effects of potential new US tariffs on Chinese exports, a key growth driver. For only the second time in at least a decade, top leaders last month prioritized stimulating spending and domestic demand in 2025. The government will “significantly” increase the sale of ultra-long special treasury bonds to fund the program, which also encourages companies to upgrade equipment, according to Yuan Da, deputy secretary-general of the National Development and Reform Commission. Several provinces started their own trade-in programs for personal devices and phones in late 2024, but a nationwide initiative could prove more effective. The central government committed 300 billion yuan ($41.1 billion) of funds raised from special treasury bonds in July to support the subsidies. Including local government efforts, these incentives led to a surge in car and home appliance sales starting in September. Subsidies for upgrading business equipment will also be expanded to areas including agricultural facilities, according to Yuan. A specific plan for the program’s expansion will be released soon.

Read more

OKRs: Tool or Trap?

2024-12-25
OKRs: Tool or Trap?

This article explores the duality of OKRs (Objectives and Key Results). The author points out that many companies misuse OKRs for performance reviews, leading teams to overemphasize measurable metrics while neglecting the actual objectives and external effects. The author uses the example of Alexa to illustrate how blindly pursuing key results can be counterproductive. In contrast, Honeycomb uses OKRs as a tool for communication and reflection, treating key results as clues to observe the world and improve work, rather than ultimate judgment criteria, thus avoiding metric distortion.

Read more

Microsoft Research Unveils F*: A Proof-Oriented Programming Language

2024-12-25

F* (pronounced F star) is a general-purpose, proof-oriented programming language supporting both purely functional and effectful programming. Combining the expressive power of dependent types with automated proof generation via SMT solving and tactic-based interactive theorem proving, F* defaults to compiling to OCaml. However, it can also be extracted to F#, C, or WebAssembly using KaRaMeL, or to assembly using Vale. Developed and actively maintained by Microsoft Research, Inria, and the community, the open-source F* is used in various projects, including those within Mozilla Firefox and the Linux kernel, showcasing its applications in security, cryptography, and systems development.

Read more

The Ugly Truth About Lisp Indentation

2025-01-19

Lisp programmers have long debated the best indentation style. This article explores various approaches, including no indentation, function-aligned indentation, space-filling indentation, and the author's controversial "sick" macro indentation. Function-aligned indentation becomes unwieldy with deep nesting, while space-filling, though efficient, falls short in extreme cases. The author advocates for a "sick" macro style, which, despite being unconventional, maintains readability in deeply nested code and plays well with most indentation tools. Readers are invited to share their preferred styles.

Read more

Website Requires JavaScript

2024-12-23

The website displays a message indicating that JavaScript needs to be enabled to run the application. This prompts users to check their browser settings and ensure that JavaScript is enabled to access and use the website's features properly.

Read more
Misc

200+ Researchers Call for a Pause on Giant AI Model Development

2025-02-07

Over 200 researchers from leading universities and research institutions worldwide have signed an open letter calling for a six-month pause on the development of AI models more powerful than GPT-4. They warn of potential societal and civilizational risks posed by these giant AI models, arguing that a pause is needed to allow for adequate safety assessments and regulatory frameworks. The letter highlights the potential dangers of rapid AI advancement, sparking a broad conversation on AI safety and ethics within the Tech sector.

Read more
Tech

Seven Years Post-Google: Selling My Company & Becoming a Dad

2025-02-04
Seven Years Post-Google: Selling My Company & Becoming a Dad

Seven years ago, Michael Lynch left his job at Google to bootstrap his own software company. This year's update covers the sale of his million-dollar-revenue remote computer control device company, TinyPilot, for $600k, and the arrival of his first child. The sale allowed for better work-life balance; he's since refined a previous blogging course, started a book on writing for developers, and explored new technologies like Nix, htmx, and Zig, improving his fuzz testing workflow with Nix. He remains enthusiastic about independent founding.

Read more
Startup

Hacker Laws: A Compendium of Software Development Principles

2025-03-30

This repository serves as a comprehensive guide to various laws, principles, and patterns prevalent in software development. From Brooks' Law and Conway's Law to Amdahl's Law and the 90-9-1 principle, it offers a detailed overview without advocating for any specific approach. It explores diverse aspects, including cognitive biases, distributed systems limitations, code quality, and team dynamics, providing valuable insights and lessons learned for developers of all levels.

Read more
Development Laws of Software

Kastle is Hiring a Founding Backend Engineer to Build its AI-Powered Mortgage Servicing Platform

2025-02-27
Kastle is Hiring a Founding Backend Engineer to Build its AI-Powered Mortgage Servicing Platform

Kastle, an AI-powered platform revolutionizing mortgage servicing, seeks a seasoned Backend Engineer to join its founding team. You'll architect and scale Kastle's AI infrastructure, developing backend services for their AI-driven mortgage applications. This requires expertise in Python, asynchronous programming, containerization (Docker, Kubernetes), distributed systems, and financial regulations. This high-impact role offers significant ownership and the chance to shape the technical direction of a fast-growing Fintech startup.

Read more
Development

Hetzner AX162 Server Reliability Nightmare: A Painful Debugging Journey

2025-02-19
Hetzner AX162 Server Reliability Nightmare: A Painful Debugging Journey

Ubicloud encountered serious reliability issues with Hetzner's new AX162 servers: a 16x higher crash rate than its predecessor, AX161. After months of debugging, they suspected power limiting by Hetzner and motherboard defects as the root causes. Multiple hardware upgrades, especially motherboard replacements, ultimately resolved the issue. This experience taught them the risks of early adoption and led to process improvements, including more thorough vetting and gradual hardware rollouts.

Read more

Coccinelle: A Powerful Tool for Linux Kernel Development

2024-12-26

Coccinelle is a powerful tool for Linux kernel development, used for pattern matching and text transformation. It enables the application of complex, tree-wide patches and detects problematic coding patterns. This document details Coccinelle's installation, usage, various modes (patch, report, context, org), and advanced features such as parallelization, using a single semantic patch, controlling processed files, debugging, and .cocciconfig support. Coccinelle leverages Semantic Patch Language (SmPL) and offers multiple modes for generating patches, reports, context information, and Org-mode reports, catering to diverse needs.

Read more
Development

ReelControl: Reclaim Your Video Playback Control

2025-04-02
ReelControl: Reclaim Your Video Playback Control

Tired of the annoying lack of native progress bars on Instagram, YouTube Shorts, and Facebook Reels? ReelControl is here to help! This browser extension adds progress bars and playback controls to videos on these platforms, letting you easily see video length, rewind, fast-forward, and skip unwanted parts. The developer reports not only an improved viewing experience but also a significant reduction in time spent on these platforms. The project is open-source, and contributions are welcome!

Read more

GitHub Project Map: Visualizing 400,000+ Projects

2024-12-15
GitHub Project Map: Visualizing 400,000+ Projects

Developer Anvaka created an interactive map visualizing over 400,000 GitHub projects using publicly available data. The project uses Jaccard similarity to calculate relationships between projects and the Leiden algorithm for clustering. The result is a visually stunning representation of the GitHub ecosystem, allowing users to search and explore connections between projects, revealing its complexity and richness.

Read more
Development project relationships

Psychological Projection: Facing Your Inner Demons Through Others' Flaws

2025-02-18

Do you find yourself frequently criticizing others for laziness, stupidity, or hypocrisy? This article explores psychological projection, the tendency to displace undesirable feelings onto others, treating them as the source of internal conflicts we'd rather avoid. Examples range from resenting someone's wealth to disliking their hobbies, all stemming from unresolved personal insecurities. Recognizing and addressing these projected emotions is key to improving self-esteem and relationships. The article provides practical steps to identify and process projections, ultimately urging readers to confront their inner anxieties and achieve self-healing.

Read more

Safe Division in C with Maybe Monad

2025-08-11

This article details the implementation of type and bounds-safe generic containers in C. The author introduces a `Maybe` type, inspired by Haskell, to handle functions that might return no value (e.g., division by zero). A safe division function is created using macros to define `Maybe`, handling zero division and the edge case of dividing the minimum representable integer by -1. GCC assembly code is analyzed to verify the function's safety. The author concludes by noting the limitations of this approach for proving the complete safety of C programs.

Read more
Development

Musk's DOGE Initiative Leaves Federal Workers in the Dark on 'Deferred Resignation' Plan

2025-02-02
Musk's DOGE Initiative Leaves Federal Workers in the Dark on 'Deferred Resignation' Plan

A recent meeting between staff from Elon Musk's DOGE (formerly the US Digital Service) and their new HR representative, Stephanie Holmes, shed little light on a controversial "deferred resignation" plan. The plan, mirroring a similar tactic used at Twitter, offers employees a delayed resignation but carries the risk of later job cuts. Holmes failed to answer crucial employee questions about project futures, remote work policies, and the details of the agreement, only stressing its legality and the benefits of avoiding layoffs and return-to-office mandates. This lack of clarity leaves employees facing a looming deadline with significant uncertainty about the plan's fairness and true implications.

Read more
Tech

Orange Intelligence: Open-Source macOS Productivity Tool Surpasses Apple's

2025-01-26
Orange Intelligence: Open-Source macOS Productivity Tool Surpasses Apple's

Orange Intelligence is a powerful, open-source macOS productivity tool designed to overcome the limitations of Apple's built-in intelligence features. Its elegant floating window interface lets users seamlessly capture, process, and replace text across any application. With support for custom Python functions, it integrates seamlessly with LLMs like OpenAI or local LLaMA, enabling the creation of complex agent systems. Built using Python, PyQt6, and Applescript, Orange Intelligence offers extensive customization options, boosting productivity for developers, researchers, and AI enthusiasts.

Read more
Development

htmx: The Next jQuery? Stability-First Web Dev Tool

2025-01-06

htmx, evolved from intercooler.js, aims to be a stable and reliable tool for web development, much like jQuery's long-lasting success. The article outlines htmx's future direction: prioritizing stability over frequent updates; limiting the addition of core features, mainly extending functionality through the extension API; maintaining a quarterly release schedule. htmx's goal isn't to be a total solution for web applications, but to focus on simplifying hypermedia controls and better integrate with other tools and techniques, ultimately hoping its core functionality will be integrated into the HTML standard.

Read more
Development hypermedia

How 168 Spanish Soldiers Conquered a Million-Strong Inca Empire

2025-03-29
How 168 Spanish Soldiers Conquered a Million-Strong Inca Empire

This article recounts the incredible story of 168 Spanish soldiers conquering the Inca Empire, a civilization boasting millions of inhabitants. The author delves into Pizarro's conquest, examining his background, Spanish military technology (cavalry, iron weaponry, firearms), tactical superiority, and fortuitous circumstances like the Inca civil war and smallpox epidemic. A comparison with Cortes's conquest of the Aztecs is drawn, highlighting leadership, diplomacy, and brutality. Ultimately, the article argues that the Spanish success stemmed not only from technological and tactical advantages but also from the exceptional decision-making and strategic acumen of Pizarro and other conquistadors.

Read more

Tektronix's 'Unicorn' Graphic Terminals: A Legacy of Low-Cost Color Displays

2024-12-15

In the 1980s, Tektronix launched the 4100/4200 series graphic terminals (nicknamed 'Unicorn') to enter the low-cost color terminal market. The project faced challenges, including the destruction of a crucial prototype, but successfully delivered models like the 4105, 4107, and 4109 ahead of schedule. The 4200 series further reduced costs and improved performance, eventually incorporating networking capabilities. These terminals gained wide adoption due to their cost-effectiveness and compatibility, becoming a significant part of Tektronix's legacy.

Read more

Batteries Included vs. No Batteries: A Framework Conundrum

2025-07-04

This article explores the trade-offs between 'batteries-included' and 'no-batteries' software frameworks. 'Batteries-included' frameworks, like Express, offer ease of use and high integration, but lack flexibility. 'No-batteries' frameworks, such as Flask, demand more configuration but provide greater control. The author argues that the ideal framework balances both approaches, offering core functionality with plugin extensibility to meet diverse needs. The example of Vim's lazyvim distribution highlights the potential downsides of excessive 'batteries-included' features, leading to bloat.

Read more
Development batteries included

Zapier Security Incident: Misconfigured 2FA Leads to Unauthorized Access

2025-03-01
Zapier Security Incident: Misconfigured 2FA Leads to Unauthorized Access

Zapier experienced a security incident due to a misconfiguration in an employee's two-factor authentication (2FA). An unauthorized user gained access to certain code repositories. While no databases or production systems were affected, some customer data may have been inadvertently copied for debugging purposes. Zapier has secured the repositories, provided affected customers with a secure link to their data, and recommends reviewing and rotating any potentially compromised plain text authentication tokens. They also advise reviewing account security settings and activating 2FA where possible.

Read more
1 2 555 556 557 559 561 562 563 596 597