Condor's Cuzco: A High-Performance RISC-V Core with a Twist

2025-08-30
Condor's Cuzco: A High-Performance RISC-V Core with a Twist

Condor Computing, an Andes Technology subsidiary, unveiled its high-performance RISC-V core, Cuzco, at Hot Chips 2025. Cuzco boasts an 8-wide out-of-order execution engine, a modern branch predictor, and a novel time-based scheduling scheme, putting it in the same league as SiFive's P870 and Veyron's V1. Its unique approach uses mostly static scheduling in the backend for power efficiency and reduced complexity, requiring no ISA changes or compiler adjustments for optimal performance. Cuzco is highly configurable, allowing for customization to meet diverse customer needs, and supports multi-core clusters.

Read more
Hardware

Improving Algorithms for Simplifying Geographic Polygons

2025-08-30

This article explores algorithms for simplifying geographic polygons, specifically their convex hulls. The current approach combines the Douglas-Peucker algorithm with polygon offsetting: the polygon is first offset outwards to eliminate details, then simplified using Douglas-Peucker, and finally offset inwards. However, this method isn't optimal for convex features. The author seeks more efficient algorithms to achieve higher-quality geometry at the same size or further reduce size without compromising quality.

Read more

Towards an AI Model Virtual Machine: A Secure and Interoperable Future for AI Applications

2025-08-30
Towards an AI Model Virtual Machine: A Secure and Interoperable Future for AI Applications

The increasing capabilities of LLMs and extension mechanisms like MCP have significantly heightened the complexity of building secure and reliable AI applications. This paper proposes an AI Model Virtual Machine (MVM), analogous to the Java Virtual Machine (JVM), to provide AI models with security, isolation, extensibility, and portability. The MVM decouples model development from integration logic, allowing for plug-and-play model interchangeability and incorporating built-in security and access controls to safeguard AI application security and privacy. Further benefits include transparent performance and resource tracking, and potential for verifiable model outputs. This innovation promises to address significant challenges in AI application development, paving the way for a more secure, reliable, and efficient AI ecosystem.

Read more

Cognitive Load: The Silent Killer in Software Development

2025-08-30
Cognitive Load: The Silent Killer in Software Development

This article explores the critical role of cognitive load in software development. High cognitive load leads to decreased efficiency and increased bugs. It analyzes common causes of high cognitive load, such as complex code logic, excessive inheritance, too many shallow modules and microservices, and unnecessary abstraction layers. The author advocates for minimizing cognitive load by using meaningful variable names, early returns, composition over inheritance, and creating fewer but deeper modules to simplify code, thus improving readability and maintainability. The article also critiques the drawbacks of over-emphasizing design patterns and architectures, stressing that simpler, straightforward solutions are often more effective.

Read more
Development

London Underground Launches 'Headphones On' Campaign

2025-08-30
London Underground Launches 'Headphones On' Campaign

Transport for London (TfL) has launched a new 'Headphones On' campaign urging passengers to use headphones on public transport to avoid disturbing others. The campaign follows research showing 70% of surveyed commuters are disrupted by loud music and calls. Posters will be displayed across the Elizabeth line now, and expanded to buses, the DLR, Overground, Underground, and trams from October.

Read more

dlclose Failure: A Weird Interplay Between Rust and C++ Libraries

2025-08-30

This post recounts a perplexing debugging story: when using `dlclose` to unload a dynamic library, libA was successfully unloaded, but its dependency, libB, unexpectedly remained in memory. Investigation revealed the root cause was thread local storage (TLS) destructors registered in libB. Because the threads didn't exit, these destructors weren't executed, preventing libB from unloading. Enabling logging resolved the issue because the logging library also used TLS, preventing libA from unloading and thus maintaining consistent shared state between libA and libB. This case highlights the importance of understanding `dlclose` behavior and the impact of TLS destructors, recommending the use of the `LD_DEBUG` environment variable for debugging dynamic link libraries.

Read more
Development dynamic linking

F-Stack: A High-Performance Open-Source Network Framework Based on DPDK

2025-08-30

The rapid advancement of Network Interface Cards (NICs) has exposed the performance bottleneck of Linux kernel data packet processing. To meet the internet's demand for high-performance network processing, kernel bypass technologies like DPDK, NETMAP, and PF_RING have gained prominence. F-Stack is a high-performance open-source network framework built on DPDK. It utilizes the Linux kernel only for control flow, processing all data streams in user space. This avoids performance bottlenecks caused by kernel packet copying, thread scheduling, system calls, and interrupts. F-Stack includes a user-space TCP/IP stack (based on FreeBSD 11.0 stable), POSIX APIs (Socket, Epoll, Kqueue), a programming SDK (Coroutine), and interfaces for applications like Nginx and Redis, aiming for superior network processing performance.

Read more
Development Kernel Bypass

Nokia Sans as a UI Font: A Surprisingly Good Choice

2025-08-30

A nostalgic journey into the world of Nokia's iconic Nokia Sans font. The author, driven by sentimentality, experimented with using it as a user interface font. Despite the difficulty in finding a complete font set, they managed to install various variants and discovered Nokia Sans Wide to be surprisingly legible and charming. The post shares a personal experience and touches upon the font's performance across different systems and DPI settings, as well as legal considerations.

Read more
Design

Google's Android Sideloading Restrictions: A Pragmatic Balancing Act?

2025-08-30
Google's Android Sideloading Restrictions: A Pragmatic Balancing Act?

Google's upcoming restrictions on Android sideloading, requiring developer registration, spark a debate between security and freedom. The author argues that while banks and game developers have legitimate reasons to restrict app usage on rooted devices, Google's move might stifle open-source and small developers, questioning its effectiveness in combating fraudulent apps. The piece concludes by posing several questions, pondering the balance between user safety and software freedom.

Read more

My Failed Promotion: 3 Onboarding Mistakes That Cost Me a Year

2025-08-30
My Failed Promotion: 3 Onboarding Mistakes That Cost Me a Year

In 2021, the author switched from NCR to Splunk, aiming for a promotion. However, three years later, they remained in the same position. The article details three key mistakes: 1. Defining success based on hearsay rather than concrete facts and company metrics; 2. A rushed onboarding approach that disregarded the company culture, creating conflict with team members; and 3. Failure to effectively communicate progress and align with senior leadership. The author learned to focus on fundamental onboarding rather than immediate promotion. This provides valuable insight into navigating career transitions and building success in a new environment.

Read more
Startup onboarding

Ditching Website Analytics: Reclaiming Our Digital Humanity

2025-08-30
Ditching Website Analytics: Reclaiming Our Digital Humanity

This article argues that website analytics, a tool born from military and surveillance technologies, strips away the human element of online interaction. The author recounts their experience abandoning analytics on their personal blog, concluding that the data provided offered little practical value while simultaneously surveilling readers. Instead, the author advocates for a return to more intentional and less automated communication, fostering smaller, closed communities where genuine connection trumps data-driven optimization.

Read more

Automating Bug Bounty Enumeration with n8n and a Discord Bot

2025-08-30
Automating Bug Bounty Enumeration with n8n and a Discord Bot

This article details automating three bug bounty enumeration steps—subdomain enumeration, directory enumeration, and screenshot capture—using the open-source automation platform n8n and a Discord bot. The author sets up an n8n server and a working server, creates an n8n workflow, writes bash scripts, and configures a Discord bot. The entire process is triggered via the Discord bot, with results output to a designated Discord channel, enabling automation and collaboration.

Read more
Development

Writing Mathematical Papers: Avoiding Common Pitfalls in Definitions and Expressions

2025-08-30

This guide offers practical advice on writing clear and concise mathematical papers, focusing on common errors in definitions and expressions. It emphasizes avoiding extra commas in definitions, preventing double-duty definitions where notation is introduced and used simultaneously, and treating expressions as units to avoid ambiguity. The guide provides numerous examples and alternative phrasing to enhance readability and precision.

Read more

Did God Create the Real Numbers? A Re-examination of Kronecker's Famous Quote

2025-08-30

This essay delves into the meaning of Kronecker's famous quote, "God made the integers; all else is the work of man." The author argues that the simplicity of integers stems from human abstraction, while the complexity of real numbers reflects the chaotic nature of the natural world. A 'hierarchy of weirdness' is proposed, suggesting that things closer to the natural origins are weirder from a human perspective. This leads to a discussion on science vs. art, divine creation vs. human invention, and Cantor's theory of infinite sets and its theological implications. The essay concludes with the author's questioning of Kronecker's viewpoint and a reflection on the nature of mathematics, making it a philosophically insightful piece.

Read more

Laravel's Taylor Otwell: 14 Years of Building a Web Framework Legend

2025-08-30

Laravel creator Taylor Otwell reflects on his 14-year journey building and maintaining one of the world's most popular web frameworks. From humble PHP 5.3 beginnings to a thriving 70-person company, he shares insights on code maintainability, developer experience, and evolving without overcomplication. He emphasizes simplicity in design, the long-term benefits of sticking to conventions, and navigating the challenges of scaling an open-source project. The interview also touches on Laravel's funding round and the evolution of its team and culture.

Read more
Development

WhatsApp Patches Zero-Click Vulnerability Exploited in Sophisticated Spyware Campaign

2025-08-30
WhatsApp Patches Zero-Click Vulnerability Exploited in Sophisticated Spyware Campaign

WhatsApp has patched a critical security vulnerability (CVE-2025-55177) in its iOS and Mac apps that was exploited in a sophisticated spyware campaign targeting nearly 200 users. The vulnerability, used in conjunction with another flaw fixed by Apple (CVE-2025-43300), allowed attackers to steal data via a zero-click exploit, requiring no user interaction. Amnesty International's Security Lab confirmed the attack, which lasted over 90 days. While Meta hasn't identified the attacker, this isn't the first time WhatsApp has faced government-backed spyware attacks, having previously sued and won damages against NSO Group for its Pegasus spyware.

Read more

Amazon CTO Werner Vogels: AI is Not Magic, Clarity is King

2025-08-30
Amazon CTO Werner Vogels: AI is Not Magic, Clarity is King

At Startup Summit 2025, I had a fireside chat with Werner Vogels, Amazon's CTO. He shared two decades of lessons learned building critical internet infrastructure. Key takeaways: focus on problems, not hype; prioritize problem-solving over chasing new tech; distinguish between reversible and irreversible decisions (move fast on the former, slow down on the latter); prioritize security, then operations, then cost; AI is a tool for efficiency, not magic; build only when you can't buy, but own the critical parts; embrace DevOps, engineers are responsible for what they build; manage costs aggressively and make it a product discussion; ultimately, your most valuable asset is time. Clarity of thought is key to success.

Read more

The Simplest Thing That Could Possibly Work: A Software Design Philosophy

2025-08-30

This article champions the principle of 'doing the simplest thing that could possibly work' in software design. Instead of striving for an idealized, over-engineered system, the author advocates for a deep understanding of the current system and choosing the simplest solution. This approach, while seemingly underwhelming, yields surprisingly effective results, exemplified by the designs of Unix and Rails. While challenges like system inflexibility and defining 'simplicity' exist, the author argues that focusing on current needs and iterative improvement is superior to over-engineering for distant future requirements. Ultimately, a simple, stable system often surpasses an over-engineered, hard-to-maintain one.

Read more
Development simplicity

Game Console Prices: A Historic Anomaly

2025-08-30
Game Console Prices: A Historic Anomaly

Modern game consoles are defying historical price trends. Data shows that pre-2016 consoles typically halved in price after three years. However, today's consoles maintain around 90% of their launch price even five years later. While past consoles, like the Atari 2600 and 3DO, launched at exorbitant prices (over $1000 in 2025 dollars), they quickly dropped in price to levels comparable to current consoles within a few years. This indicates a significant deviation from historical pricing patterns in the modern gaming market.

Read more

Microsoft Denies Link Between Windows Update and SSD/HDD Failures

2025-08-30
Microsoft Denies Link Between Windows Update and SSD/HDD Failures

Users reported SSD and HDD failures and data corruption after installing August's Windows 11 24H2 security update. Microsoft investigated and found no connection between the update and the reported issues. However, they advise users with drives over 60% full to avoid writing large files. Microsoft is collaborating with storage device partners to investigate further. Affected drives reportedly include those from Corsair, SanDisk, and Kioxia, with issues primarily occurring during heavy write operations. While some drives recovered after restarting, others remained inaccessible.

Read more

Gmail Accused of Partisan Spam Filtering: GOP Claims Bias

2025-08-30
Gmail Accused of Partisan Spam Filtering: GOP Claims Bias

FTC Chairman Andrew Ferguson accused Google of using partisan spam filters in Gmail, allegedly sending Republican fundraising emails to spam while delivering Democratic emails to inboxes. Ferguson's letter to Alphabet CEO Sundar Pichai alleges potential FTC Act violations. Google denies the accusations, stating its spam filters are based on objective user signals and apply equally to all senders, regardless of political affiliation. This reignites long-standing Republican complaints previously dismissed by a federal judge and the Federal Election Commission.

Read more
Tech

FCC Rejects Regulatory Fee Proposals Targeting Big Tech

2025-08-30
FCC Rejects Regulatory Fee Proposals Targeting Big Tech

The Federal Communications Commission (FCC) has rejected proposals to impose cable-style regulatory fees on streaming services, tech companies, and broadband providers. Groups like the NAB argued that these companies benefit from FCC resources and should contribute financially. However, the FCC cited administrative difficulties and a lack of evidence showing increased regulatory burdens imposed by tech firms. Telecommunications and tech trade groups opposed the proposals, arguing fees should only cover directly regulated industries. The FCC's decision maintains the existing fee structure, with broadcasters, satellite operators, and licensees bearing the burden through fiscal year 2025.

Read more

Michael Larabel: 20 Years of Linux Hardware Benchmarking

2025-08-30

Michael Larabel, founder and principal author of Phoronix.com, has been enriching the Linux hardware experience since 2004. He's penned over 20,000 articles covering Linux hardware support, performance, graphics drivers, and more. Larabel is also the lead developer behind the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software, significantly contributing to the Linux ecosystem.

Read more
Tech

Battlefield 6's Secure Boot Requirement Sparks Controversy

2025-08-30
Battlefield 6's Secure Boot Requirement Sparks Controversy

EA's decision to require Secure Boot for the Battlefield 6 PC open beta ignited a debate among players. Many were unable to enable it or unwilling to grant kernel-level access to EA's anti-cheat, preventing them from playing. Technical director Christian Buhl defended the decision as a necessary evil to combat cheating, though admitting it wouldn't eliminate it entirely. While Secure Boot enhances anti-cheat capabilities, it also excludes some players.

Read more

Decentralized Mastodon Defies Mississippi's Age Verification Law

2025-08-30
Decentralized Mastodon Defies Mississippi's Age Verification Law

Decentralized social network Mastodon announced its inability to comply with Mississippi's age verification law, the same law that prompted rival Bluesky to leave the state. Mastodon cites its user-tracking limitations and reluctance to employ IP-based blocks as reasons for non-compliance. Founder Eugen Rochko highlighted the importance of true decentralization, stating that no one can unilaterally decide to block Mississippi from the Fediverse. While Mastodon's own servers specify a minimum signup age, its software doesn't support age verification across all servers. Individual server owners must decide on age verification implementation. Mastodon claims it can't directly assist other server operators, suggesting they consult online resources and comply with local laws.

Read more
Tech

China Unveils World's Most Sensitive Neutrino Detector

2025-08-30
China Unveils World's Most Sensitive Neutrino Detector

After over a decade of construction, China has launched the Jiangmen Underground Neutrino Observatory (JUNO), claimed to be the world's most sensitive neutrino detector. Located 700 meters underground, JUNO boasts a 20,000-tonne liquid scintillator detector and over 45,000 photomultiplier tubes. It detects neutrinos from nearby nuclear power plants by capturing the light produced when neutrinos interact with hydrogen atoms in the scintillator. JUNO's success will significantly advance our understanding of neutrino mass hierarchy and types, with international collaboration from scientists across the globe signifying a major leap in China's fundamental science research.

Read more
Tech Detector

XSLT 3.0: A Major Upgrade for XML Transformations

2025-08-30

XSLT 3.0 isn't just an incremental update; it elevates XSLT from an XML transformation tool to a general-purpose transformation language for common data formats like JSON and XML. It introduces JSON support with `json-to-xml()` and `xml-to-json()` functions for seamless conversion. Further improvements include simplified syntax with text value templates (TVTs), dynamic XPath expression evaluation, functions, typed variables, function packages, and exception handling, boosting code readability and maintainability. XSLT 3.0 also supports streaming and performance optimizations, making it ideal for large-scale data streams.

Read more
Development

SQLite Durability: Documentation vs. Reality

2025-08-30

SQLite's durability settings are confusing. The documentation and statements from creator Richard Hipp contradict each other regarding the default durability. This stems from the complex interaction between the `journal_mode` and `synchronous` configuration options, and the differing requirements in different modes. The article analyzes durability requirements in DELETE and WAL modes, concluding that explicitly setting the `synchronous` option is crucial to ensure data persistence, avoiding ambiguity and future changes in defaults. It also cautions about potential issues introduced by third-party libraries and macOS specifics.

Read more
Development

Rust Error Handling: A Hybrid Approach with Snafu

2025-08-30
Rust Error Handling: A Hybrid Approach with Snafu

Error handling in Rust is a hotly debated topic. `anyhow` offers a generic error type for easy debugging, while `thiserror` provides precise enum types for better API design. This article details Iroh's hybrid approach using Snafu, which combines the precision of `thiserror` with the ease of use of `anyhow`, while overcoming Rust's backtrace limitations. It cleverly preserves detailed context and backtraces in error chains. The `n0-snafu` crate further simplifies Snafu usage, particularly in tests. Iroh's choice of Snafu balances precision and usability for efficient error handling.

Read more
Development

Nginx-CGI: Bringing CGI Support to Nginx and Angie

2025-08-30
Nginx-CGI: Bringing CGI Support to Nginx and Angie

The Nginx-CGI plugin adds CGI support to Nginx and Angie web servers, making it easier to build low-frequency applications, resource-constrained systems, and prototypes. It supports various operating systems including Linux, macOS, and BSD. The article details installation, configuration, and usage, showcasing multiple ways to run CGI scripts: chroot, Docker, and FreeBSD jails. It also covers CGI script writing conventions and handling HTTP requests and responses.

Read more
Development
1 2 4 6 7 8 9 554 555