GENIUS Act Passed: Crypto Enters the Mainstream

2025-07-18
GENIUS Act Passed: Crypto Enters the Mainstream

The US House of Representatives passed the landmark GENIUS Act, establishing federal regulations for stablecoins. This marks a major shift, bringing cryptocurrencies out of the regulatory gray area and into the mainstream financial system. The act requires stablecoin issuers to hold one-to-one reserves in cash or US Treasury bills, mandates monthly disclosures, prioritizes consumer protection in case of issuer bankruptcy, and provides a framework for both federal and state oversight. This not only regulates the crypto market but also positions the US for leadership in the global digital currency race, paving the way for stablecoin-based instant global payments and everyday applications.

Read more
Tech GENIUS Act

Ancient Wonder Resurrected: 22 Massive Blocks of the Lighthouse of Alexandria Recovered

2025-07-18
Ancient Wonder Resurrected: 22 Massive Blocks of the Lighthouse of Alexandria Recovered

Twenty-two massive stone blocks from the ancient Lighthouse of Alexandria, one of the Seven Wonders of the Ancient World, have been recovered from the Mediterranean seabed after centuries underwater. This breakthrough is part of the PHAROS project, using advanced technology to virtually reconstruct the structure. The recovered blocks, including monumental entrance lintels and foundation stones, show a blend of Egyptian and Greek styles, reflecting Alexandria's multicultural past. These blocks will be digitally scanned and reassembled by engineers, creating a virtual twin of the lighthouse to reveal its original glory and the cause of its collapse.

Read more

Quantifying Political Lies: A Case Study of RFK Jr. and Buttigieg Speeches

2025-07-18

This article quantifies the percentage of lies in speeches by RFK Jr. and Pete Buttigieg through sentence-by-sentence fact-checking. The author found that RFK Jr.'s speeches contained a staggering 60% false claims, averaging over eight lies every five minutes, while Buttigieg's rate was significantly lower. This methodology tackles "Brandolini's Law" (the energy needed to refute bullshit is an order of magnitude bigger than to produce it) by exhaustively fact-checking a sample speech to establish a lie rate, eliminating the need for constant verification. While time-consuming, this approach offers a novel way to assess the credibility of political figures.

Read more

Kite-Powered Electricity: A Game Changer in Wind Energy?

2025-07-18
Kite-Powered Electricity: A Game Changer in Wind Energy?

A project in Co Mayo, Ireland, is generating renewable electricity using kites, touted as a potential game-changer in wind energy. Kitepower, a spin-off from Delft University, employs 60 sq/m kites flown up to 425m, generating electricity through a yo-yo-like system. The kites, controlled by kitesurfing professionals and a GPS system, produce up to 30 kW per hour, stored in a battery. The entire system is mobile and easily deployable, operating even in cloudy, rainy, or nighttime conditions. This technology aims to provide clean energy to remote areas and eventually integrate with the electricity grid.

Read more

Anthropic's Claude Code Hit by Unexpected Usage Limits

2025-07-18
Anthropic's Claude Code Hit by Unexpected Usage Limits

Users of Anthropic's Claude Code have been encountering unexpectedly strict usage limits since Monday, particularly impacting heavy users on the $200/month Max plan. Users receive only a vague "usage limit reached" message without explanation or prior notice, leading to suspicions of downgraded subscriptions or inaccurate usage tracking. Anthropic acknowledged the issue but offered no details. The incident highlights flaws in Anthropic's tiered pricing, which lacks clear usage guarantees, making planning difficult for users. The high value proposition of the Max plan, allowing some users to generate over $1000 in API calls daily, is also a central point of concern, raising questions about its long-term sustainability. The lack of transparency is eroding user confidence.

Read more
Development

Far Cry's Water Reflection Bug Fixed: A Battle with D3D9

2025-07-18
Far Cry's Water Reflection Bug Fixed: A Battle with D3D9

Far Cry, once a visual benchmark, suffered from a long-standing water reflection bug on systems beyond Windows XP. While WineD3D offered a fix, it came at a significant performance cost. Using PIX, the developer discovered a regression in D3D9's handling of clipping planes, possibly introduced by the shift from XPDM to WDDM. The solution involved saving and reapplying clipping planes, resulting in a performance-neutral patch.

Read more
Game game fix

Arva AI: Revolutionizing Financial Crime Intelligence with AI

2025-07-18
Arva AI: Revolutionizing Financial Crime Intelligence with AI

Arva AI is revolutionizing financial crime intelligence with its cutting-edge AI Agents. By automating manual tasks, they boost operational efficiency and help financial institutions handle AML reviews, reducing operational costs by 80%. They're hiring an AI Research Engineer to build and iterate on LLM-based and agentic features of their AI-powered compliance platform, including document fraud detection and web due diligence. The role requires 3+ years of experience in AI research or engineering, with expertise in prompt engineering, fine-tuning pre-trained models, and training custom models. Arva AI's culture emphasizes speed, transparency, and a customer-first approach.

Read more
Tech

American CS Grads Face Job Crisis: Cheaper Labor Undermines Dreams

2025-07-18
American CS Grads Face Job Crisis: Cheaper Labor Undermines Dreams

American computer science graduates are facing a severe job crisis. While salaries have increased nominally, real wages have stagnated since 2015. A flood of foreign workers with work permits has drastically reduced employment rates for US graduates, even below 50% for some specializations. This isn't simple competition; it's systematic displacement. Policies like the H-1B visa program import cheaper, more compliant workers who undercut American graduates, suppressing wages and opportunities. The author calls for drastic reductions in H-1B visas and prioritization of American workers, arguing that the current system sacrifices a generation of CS graduates.

Read more

OpenBSD's chflags: Achieving ISO 27001 Compliant Immutable Logs

2025-07-18
OpenBSD's chflags: Achieving ISO 27001 Compliant Immutable Logs

This article details how to leverage OpenBSD's `chflags` command with `sappnd` and `schg` flags to achieve immutable logging, fulfilling ISO 27001's log integrity requirements. While ISO 27001 doesn't explicitly demand immutability, its log protection stipulations effectively necessitate it. The author disables the `newsyslog` cron job, creates a log archive directory, and uses `chflags` to set append-only and immutable flags on log files, ensuring log integrity even if root access is compromised. A `/etc/rc.securelevel` script automates log rotation and flag management during boot, providing a robust and automated logging solution.

Read more
Development Log Security

Imminent River Capture: A Geological Spectacle in the Making

2025-07-18

Near Canton, North Carolina, the headwaters of Hominy Creek (a tributary of the French Broad River) are poised to 'capture' the Pigeon River. A 400-foot elevation difference between the valleys, and a mere 1500 feet separating Hominy Creek's headwaters from the Pigeon River with minimal dividing ridge, sets the stage for this geological event known as stream capture. The resulting spectacle will be impressive waterfalls and gorge formation. While the exact timing is unpredictable, this is geologically imminent, with future floods potentially accelerating the process.

Read more

Sony RX1R III: Small Size, Big Compromise?

2025-07-18
Sony RX1R III: Small Size, Big Compromise?

Sony's highly anticipated RX1R III full-frame compact camera arrives with a hefty $5,100 price tag. While boasting features like the A7R V's high-resolution sensor, Sony's latest autofocus system, a longer-lasting battery, and an electronic viewfinder, it surprisingly omits the tilting screen of its predecessor. This is a significant drawback for street photographers and those who rely on flexible shooting angles. Sony's dedication to maintaining a small form factor resulted in compromises, including the lack of in-body image stabilization. This decision contrasts with Leica's addition of a tilting screen to the Q3, demonstrating a willingness to prioritize user needs over unwavering adherence to a specific design. Although Sony has improved ergonomics in its A9 III and A1 II, the RX1R III's small size might still lead to discomfort during extended shooting sessions. Ultimately, the RX1R III offers powerful features, but with regrettable compromises.

Read more

UK Universities Face Crushing Debt

2025-07-18
UK Universities Face Crushing Debt

British universities are facing a severe financial crisis as the academic year ends. A regulator estimates that 40% of universities are operating at a deficit, with half having closed courses to cut costs. Several universities have already laid off hundreds of staff, and one is reportedly planning to cut nearly a fifth of its academic positions, signaling a potential major upheaval in higher education.

Read more

Robinhood's Secret Weapon: 50% AI-Generated Code

2025-07-18
Robinhood's Secret Weapon: 50% AI-Generated Code

Robinhood CEO Vlad Tenev revealed that nearly all of the company's engineers are essentially 'vibe coders,' relying heavily on AI code editors. He estimates that around 50% of Robinhood's new code is AI-generated, surpassing Microsoft and Google's previously reported 30%. The increasing sophistication of AI code editors makes distinguishing between human and AI-written code difficult. This AI adoption has significantly improved Robinhood's efficiency and cost control, impacting teams across the board, from software engineering to customer support. Robinhood's stock price is up over 177% this year, fueled by its expanding crypto ventures, new product launches, and active retail investor base.

Read more
Tech

Paywall Bypass Site 12ft.io Shut Down by News/Media Alliance

2025-07-18
Paywall Bypass Site 12ft.io Shut Down by News/Media Alliance

The News/Media Alliance successfully pressured the web host to take down 12ft.io, a website that allowed users to bypass online paywalls. The alliance argued that 12ft.io offered illegal circumvention technology, harming the business model of news publishers. This action sparks debate on paywalls, internet openness, and the impact of AI search on the news industry, highlighting the struggles of news publishers to find sustainable models in the digital age. The site's creator initially built it to counter paywalled research results, ironically later implementing a subscription model himself.

Read more
Tech

Hackers Exploit End-of-Life SonicWall Appliances to Steal Sensitive Data

2025-07-18
Hackers Exploit End-of-Life SonicWall Appliances to Steal Sensitive Data

Google's Threat Intelligence Group (GTIG) and Mandiant have uncovered an ongoing campaign leveraging vulnerabilities in end-of-life SonicWall Secure Mobile Access (SMA) 100 series appliances to steal sensitive data. The threat actor, UNC6148, uses previously stolen credentials and OTP seeds to regain access even after security updates. A backdoor called OVERSTEP modifies the boot process for persistent access, credential theft, and malware concealment. While potentially linked to the Abyss ransomware gang, the attackers' motives and victim count remain unclear. SonicWall has released an update advising users to reset OTP bindings.

Read more
Tech

Ukrainian Hackers Take Down Major Russian Drone Supplier, Wipe 47TB of Data

2025-07-18
Ukrainian Hackers Take Down Major Russian Drone Supplier, Wipe 47TB of Data

Ukrainian hacking collective BO Team claims to have successfully infiltrated the IT infrastructure of Gaskar Integration, one of Russia's largest drone suppliers, destroying 47TB of technical data related to drone production, along with 10TB of backups. The operation, they say, was carried out with the assistance of the Ukrainian Cyber Alliance and another unnamed prominent organization. The hackers also revealed that China is assisting Gaskar Group in production and specialist training. The attack reportedly crippled Gaskar's network, even affecting physical building access.

Read more
Tech

Dictionary.com Deletes User Accounts, Leaving Logophiles Devastated

2025-07-18
Dictionary.com Deletes User Accounts, Leaving Logophiles Devastated

Dictionary.com abruptly deleted all user accounts and their associated data, including years' worth of saved words, sparking outrage among users. The company, which previously offered a paid ad-free version with extra features like offline dictionaries, removed these features and rendered saved data inaccessible. While Dictionary.com claims the change was for app improvement, they offered no adequate explanation or compensation for lost data, leading to widespread criticism and unanswered questions.

Read more

JWST and ALMA Detect Earliest Stages of Planet Formation Around Sun-like Star

2025-07-18
JWST and ALMA Detect Earliest Stages of Planet Formation Around Sun-like Star

Astronomers using the JWST and ALMA telescopes have discovered evidence of the earliest stages of planet formation around a Sun-like star, HOPS-315, located 1300 light-years away. They detected concentrations of hot minerals, the building blocks of planetesimals – the seeds from which planets grow. This discovery offers invaluable data for studying the initial stages of planet formation and may hold clues to how our own Solar System formed. The HOPS-315 system's similarity to our early Solar System allows for unprecedented insights into its origin and evolution.

Read more
Tech

Apple Sues YouTuber for Leaking iOS 26 Secrets

2025-07-18
Apple Sues YouTuber for Leaking iOS 26 Secrets

Apple is suing YouTuber Jon Prosser for allegedly leaking confidential information about iOS 26. Apple claims Prosser and Michael Ramacciotti conspired to access a development iPhone belonging to Apple employee Ethan Lipnik, obtaining iOS 26 trade secrets and creating videos. Lipnik was fired for violating company policy. Apple is seeking an injunction to prevent further disclosures and damages. Prosser denies the conspiracy, claiming unawareness of the situation.

Read more
Tech Leak

SES Acquires Intelsat, Creating a Leading Multi-Orbit Satellite Network

2025-07-18

SES, a leading space solutions company, has completed its acquisition of Intelsat, creating a stronger global satellite operator with a fleet of 120 satellites across GEO and MEO orbits, and access to LEO constellations. This acquisition allows SES to better serve its global customers, with ~60% of revenue coming from high-growth segments. The combined company will offer integrated multi-orbit, multi-band satellite and connectivity solutions and expects to realize significant synergies in the coming years, further strengthening its financial position and shareholder returns.

Read more

Louisiana Cancels $3 Billion Coastal Restoration Project

2025-07-18
Louisiana Cancels $3 Billion Coastal Restoration Project

Louisiana has canceled a $3 billion project to repair its eroding Gulf Coast, funded by the 2010 Deepwater Horizon oil spill settlement. Governor Jeff Landry deemed the project a threat to the state's way of life, while conservationists viewed it as a crucial response to climate change. The cancellation could result in Louisiana losing over $1.5 billion in unspent funds and potentially repaying the $618 million already invested. The project, aimed at rebuilding wetlands by diverting sediment-laden Mississippi River water, was halted due to escalating costs and concerns about its impact on local fisheries. The state plans a smaller, cheaper alternative, but environmental groups strongly oppose this, arguing it's insufficient to address coastal erosion.

Read more

tsx: Streamlining TypeScript Development in Node.js

2025-07-18
tsx: Streamlining TypeScript Development in Node.js

tsx is a Node.js enhancement that lets you run TypeScript code directly without complex configurations. It solves the compatibility issues between CommonJS and ESM modules in the Node.js ecosystem, allowing seamless switching and featuring a watch mode for increased developer productivity. Born from the challenges of Node.js's module system evolution, tsx aims to simplify the TypeScript experience. Currently relying on user donations, it seeks sponsorship to ensure continued maintenance and development.

Read more
(tsx.is)
Development

Meta's AI Talent Raid on Apple Continues: Apple's Foundation Models Team in Turmoil

2025-07-18
Meta's AI Talent Raid on Apple Continues:  Apple's Foundation Models Team in Turmoil

Meta has poached two more key artificial intelligence executives from Apple, following the earlier high-profile recruitment of a top AI leader with a massive compensation package. The latest hires come from Apple's foundational models team, responsible for features like email summaries and Priority Notifications. This latest talent drain suggests significant internal challenges within Apple's AI division, potentially leading to a shift towards using external models from companies like OpenAI to power Siri and other features.

Read more
AI

Apple Unveils New Generation of Multilingual, Multimodal Foundation Models

2025-07-18
Apple Unveils New Generation of Multilingual, Multimodal Foundation Models

Apple introduced two new multilingual, multimodal foundation language models powering its on-device and server-side intelligence features. A ~3B parameter on-device model, optimized for Apple silicon, and a scalable server model built on a novel Parallel-Track Mixture-of-Experts (PT-MoE) transformer. Both are trained on massive multilingual and multimodal datasets, refined with supervised fine-tuning and reinforcement learning. They support more languages, image understanding, and tool calls, matching or exceeding comparable open-source baselines. A new Swift-centric framework simplifies integration for developers.

Read more
AI

Rust Extensible Data Types with CGP: Modular Interpreters and Extensible Visitors

2025-07-18
Rust Extensible Data Types with CGP: Modular Interpreters and Extensible Visitors

This blog post is part two of a series on programming extensible data types in Rust using CGP. It explores building modular interpreters using extensible variants and the extensible visitor pattern to solve the expression problem. A toy math expression language demonstrates how to decouple variant implementations from enum definitions, creating open-ended, modular visitors that avoid runtime errors or rigid interfaces. CGP enables building extensible, modular interpreter components that compose to create complex interpreter functionality.

Read more
Development Extensible Data Types

The Great USB-C Hub Scam: A Teardown Tale

2025-07-18
The Great USB-C Hub Scam: A Teardown Tale

The author bought three USB-C hubs from different brands, only to discover they all used nearly identical hardware, including the problematic Realtek RTL8153 network chip, leading to macOS compatibility issues. Despite huge price differences, the actual cost was low, highlighting massive brand markups. One hub even overheated dangerously. Teardowns revealed these brands rebranded low-cost products, prompting a call for consumer awareness and rejection of marketing hype.

Read more

The Platonic Representation Hypothesis: Towards Universal Embedding Inversion and Whale Communication

2025-07-18
The Platonic Representation Hypothesis: Towards Universal Embedding Inversion and Whale Communication

Researchers have discovered that large language models converge towards a shared underlying representation space as they grow larger, a phenomenon termed the 'Platonic Representation Hypothesis'. This suggests that different models learn the same features, regardless of architecture. The paper uses the 'Mussolini or Bread' game as an analogy to explain this shared representation, and further supports it with compression theory and model generalization. Critically, based on this hypothesis, researchers developed vec2vec, a method for unsupervised conversion between embedding spaces of different models, achieving high-accuracy text embedding inversion. Future applications could involve decoding ancient texts (like Linear A) or translating whale speech, opening new possibilities for cross-lingual understanding and AI advancement.

Read more

RisingWave: Simplifying Stream Data Processing

2025-07-18
RisingWave: Simplifying Stream Data Processing

RisingWave is a stream processing and management platform offering a simple and cost-effective way to process, analyze, and manage real-time event data. It boasts built-in support for the Apache Iceberg™ open table format and provides both a Postgres-compatible SQL interface and a DataFrame-style Python interface. Ingesting millions of events per second, RisingWave continuously joins and analyzes live streams with historical data, serves ad-hoc queries at low latency, and persists fresh, consistent results to Apache Iceberg™ or any downstream system. Its integrated storage engine ensures high performance, fast recovery, and dynamic scaling. Easy to use and cost-efficient, RisingWave excels in streaming analytics, event-driven applications, real-time data enrichment, and feature engineering.

Read more
Development

AI: The New Executive Buzzword

2025-07-18
AI: The New Executive Buzzword

Executives are increasingly touting the transformative power of AI in their businesses. JPMorgan Chase boasts 450 AI use cases, while Yum! Brands sees AI as the future operating system for restaurants. Booking.com highlights AI's role in enhancing the traveler experience. The prevalence of AI discussion is striking, with 44% of S&P 500 companies mentioning it on earnings calls in Q1 of this year. This suggests a widespread adoption of AI across various industries.

Read more

Bypassing Middleboxes Blocking MPTCP with eBPF

2025-07-18

The MPTCP protocol can be blocked by middleboxes (like NATs, firewalls) in certain network environments. This article introduces an eBPF-based TCP-in-UDP solution that cleverly bypasses these limitations by encapsulating TCP packets within UDP packets. This solution requires no extra data layers or VPNs, simply reordering the TCP header and using eBPF to efficiently handle checksums, ultimately solving challenges posed by network stack optimizations and hardware offloading. While some minor issues remain, such as the loss of the URG flag and MTU/MSS adjustments, this approach offers an effective way to improve MPTCP performance in complex network environments.

Read more
Development Network Optimization
1 2 107 108 109 111 113 114 115 596 597