SCCS: The Source Code Motel After 50 Years

2024-12-13

This article retrospectively examines the influence of the Source Code Control System (SCCS) over the past 50 years. Author Larry McVoy details SCCS's unique weave format, which allows for merging by reference, avoiding the inefficiencies of patch-based copying found in other systems. He explains how SCCS leverages this weave to retrieve any file version in constant time and preserves authorship across versions. While acknowledging shortcomings like long-term locks and file-orientation, McVoy highlights the efficiency of the weave format and its preservation of authorship as groundbreaking, laying the groundwork for later systems like BitKeeper.

Read more

NASA Solves Ingenuity Mars Helicopter Crash Mystery

2024-12-13
NASA Solves Ingenuity Mars Helicopter Crash Mystery

After nearly a year of investigation, NASA has finally solved the mystery behind the crash of Ingenuity, the Mars helicopter carried by the Perseverance rover. The helicopter's navigation system, unable to discern sufficient features on the relatively smooth Martian surface, resulted in a horizontal velocity upon landing. This caused Ingenuity to tumble, breaking its blades. Despite lacking a black box, investigators pieced together the cause from limited data and imagery. Remarkably, Ingenuity still communicates intermittently with Perseverance. The incident has prompted NASA to begin planning for follow-on missions, including a larger Mars helicopter capable of carrying scientific instruments.

Read more

Hexagonal Architecture in Rails: A Path to Decoupling

2024-12-13
Hexagonal Architecture in Rails: A Path to Decoupling

This article explores implementing Hexagonal Architecture (Ports and Adapters pattern) in Rails applications. The author initially struggled with the pattern until realizing that 'adapter' directly refers to the Gang of Four Adapter Pattern. The article details inbound and outbound ports, and how adapters decouple application logic from external services (databases, logging, email, etc.). Rails controllers can serve as HTTP adapters, but the author stresses avoiding direct ActiveRecord usage. Instead, custom repositories access data, improving decoupling and maintainability. The article concludes by encouraging Rails developers to adopt Hexagonal Architecture for more robust and maintainable applications.

Read more

Repurposing Old Smartphones as Kubernetes Cluster Nodes with postmarketOS

2024-12-13
Repurposing Old Smartphones as Kubernetes Cluster Nodes with postmarketOS

The author built a functional Kubernetes cluster using discarded smartphones and the postmarketOS operating system. The article details the process, including the reasons for choosing old smartphones (substantial computing power, built-in batteries), the advantages of postmarketOS (Alpine Linux-based, uses the mainline Linux kernel), and challenges encountered during setup (kernel modules, network configuration). Solutions to these challenges are thoroughly explained. The author successfully repurposed old smartphones as Kubernetes nodes, efficiently utilizing resources and promoting sustainability.

Read more

CIA's Animal Spies: From Pigeons to Rats, Declassified Secrets of Nature's Arsenal

2024-12-13

The CIA's history of using animals in espionage is filled with creativity and challenges. From pigeons carrying miniature cameras, to the attempted use of a cat for eavesdropping in the 'Acoustikitty' program (ultimately failing due to the cat's independent nature), to robotic catfish 'Charlie' for underwater reconnaissance, and the dragonfly-mimicking miniature drone 'Insectothopter', the CIA showcased its imagination, leveraging animal characteristics for intelligence gathering. Additionally, they used animal remains as camouflaged dead drops, even employing rats soaked in cat repellent to deliver messages. These imaginative attempts highlight the CIA's innovative spirit in technology and intelligence, and also reflect the unique value of animals in special environments.

Read more

HP 9845C: A Colorful Pioneer of 80s Computer Graphics

2024-12-13

In 1981, the HP 9845C, the top-of-the-line model in the 9845 series, emerged as the first HP computer to support color, stunning the world with its powerful graphics capabilities. Featuring hardware-accelerated vector drawing and polygon fill, and supporting fast matrix operations for 3D model rendering, this machine initially designed for scientific and engineering use quickly became a multipurpose system, even contributing to the graphic scenes in the 1983 film "WarGames." Its demo program was remarkable, boasting over 4000 lines of code and showcasing cutting-edge concepts like 3D shading, ordered dithering, wireframe rendering, interactive light pen control, and color infographics at a high resolution of up to 4913 colors.

Read more

Bypassing Windows Kernel Mitigations: A Deep Dive into Violet Phosphorus

2024-12-13

This post delves into bypassing modern Windows 10 and 11 kernel mitigations like SMEP and VBS. The author details Violet Phosphorus, a universal VBS/SMEP bypass technique, providing PoC code and a ROP chain. It explains SMEP and VBS, demonstrating how to exploit a vulnerability in the HackSysExtremeVulnerableDriver to use ROP gadgets and the MiGetPteAddress function to modify page table entries for kernel code execution. The author also shows how to use Kristal-G's SYSRET shellcode to return to user mode. This is a valuable resource for kernel exploit development and security researchers, categorized as Development.

Read more

Major Breakthrough in Nuclear Clock Technology Promises Ultraprecise Timekeeping

2024-12-13
Major Breakthrough in Nuclear Clock Technology Promises Ultraprecise Timekeeping

An international research team led by scientists at JILA, a joint institute of the National Institute of Standards and Technology (NIST) and the University of Colorado Boulder, has made a significant advance in developing a novel nuclear clock. Nuclear clocks use energy transitions within an atom's nucleus to measure time, promising greater accuracy and resistance to external disturbances compared to atomic clocks. The team used a specially designed ultraviolet laser to precisely measure the frequency of an energy jump in thorium nuclei and an optical frequency comb to count the cycles. This breakthrough paves the way for more precise navigation, faster internet speeds, and advancements in fundamental physics research, potentially even aiding in the detection of dark matter or verifying the constancy of nature's constants.

Read more

Blogger Resurfaces 2004 MIT Spam Conference Talk Intro Video

2024-12-13

Blogger John Graham-Cumming recently shared on his blog the intro video from his 2004 MIT Spam Conference talk. The video cleverly uses the "All your base are belong to us" meme, adapting it to discuss spam and machine learning, and paying homage to Paul Graham. It showcases early machine learning applications in anti-spam and the blogger's creative and humorous approach to tech communication.

Read more

Italian Town Solves Winter Darkness with Giant Mirror

2024-12-13
Italian Town Solves Winter Darkness with Giant Mirror

Nestled in a valley between Italy and Switzerland, the town of Viganella suffers from three months of winter darkness each year. To combat this, in 2006, residents ingeniously installed a massive mirror on a nearby mountain peak. This mirror reflects sunlight into the town square, providing much-needed light and warmth during the long winter. The project, a testament to human ingenuity and community spirit, has since inspired similar initiatives worldwide.

Read more

Exotic New Superconductors Delight and Confound

2024-12-13
Exotic New Superconductors Delight and Confound

Three new types of superconductors were discovered this year, challenging our understanding of this phenomenon. These two-dimensional materials, like graphene, exhibit unprecedented flexibility, switching between insulating, conducting, and superconducting states with simple adjustments. One even defies expectations by strengthening in a magnetic field. These discoveries deepen the mystery of superconductivity while offering hope for room-temperature superconductors, potentially revolutionizing energy and transportation.

Read more

Node.js EPUB Library @smoores/epub Released

2024-12-13
Node.js EPUB Library @smoores/epub Released

A new Node.js library, @smoores/epub, has been released. It allows developers to inspect, modify, and create EPUB 3 publications. The library offers high-level APIs that simplify interaction with the EPUB specification, such as setting the title and retrieving author information. Lower-level APIs provide granular control over the EPUB structure, enabling tasks like adding chapters and metadata. Built upon fast-xml-parser, @smoores/epub provides robust XML parsing and manipulation capabilities, facilitating efficient handling of EPUB file XML content.

Read more
Development Library

NASA Visualizes Global Internal Ocean Tides

2024-12-13
NASA Visualizes Global Internal Ocean Tides

NASA's Goddard Space Flight Center has released a stunning visualization of global internal ocean tides, created using satellite altimetry data and simulations. The animation showcases how internal tidal waves, generated by the interaction of underwater topography, such as the Hawaiian Ridge, and tidal energy, propagate across the ocean. While these waves have a subtle surface expression, they play a significant role in ocean mixing and circulation. The visualization also highlights other regions with strong internal tidal activity, including Tahiti, the Southwest Indian Ocean, and the Luzon Strait, offering new insights into ocean dynamics.

Read more

Kowloon Walled City: A Cross-Section of Density and Decay

2024-12-13
Kowloon Walled City: A Cross-Section of Density and Decay

In the 1990s, Kowloon Walled City in Hong Kong was the world's most densely populated place, cramming roughly 50,000 people into just 2.6 hectares. After WWII, it became a refuge for refugees, its buildings growing organically into a labyrinthine structure. Crime and poor living conditions led to its demolition in 1994. Artist Hitomi Terasawa's cross-section illustration vividly captures this unique and ultimately tragic urban phenomenon, preserving its memory as a 'living organism'.

Read more

Hardware-Level Network Time Security: Netnod's FPGA Implementation of NTS

2024-12-13
Hardware-Level Network Time Security: Netnod's FPGA Implementation of NTS

Following a 2019 software implementation of Network Time Security (NTS), Netnod has deployed NTS at the hardware level using FPGAs for their NTP and NTS protocols. This hardware implementation offers enhanced security, mitigating side-channel attacks and improving efficiency and scalability. While challenges existed in processing complex NTS packets, Netnod overcame them with a multi-engine parallel processing solution. Their NTS service is now in production.

Read more

Scheduled Reboots: A Preventative Approach

2024-12-13

A university research team faced a challenging sysadmin problem: their servers had been running for too long and needed rebooting, but frequent reboots disrupt user experience. Their default was to avoid reboots, but a recent large-scale reboot due to prolonged uptime forced a change. To prevent similar issues, they've decided on a yearly reboot schedule—at least three times a year, aligning with the university's teaching schedule—balancing preventative maintenance with user experience.

Read more

Microsoft Open-Sources MarkItDown: A File-to-Markdown Conversion Tool

2024-12-13
Microsoft Open-Sources MarkItDown: A File-to-Markdown Conversion Tool

Microsoft has open-sourced MarkItDown, a Python tool that converts various files (including PDF, PowerPoint, Word, Excel, images, audio, and HTML) into Markdown format. The tool boasts a simple API, supports a wide range of file types, and incorporates OCR and speech transcription for enhanced functionality, making it ideal for text analysis or indexing. Contributions are welcome, and the project adheres to the Microsoft Open Source Code of Conduct.

Read more

Reading Skills and Brain Structure: A Neuroimaging Study

2024-12-13
Reading Skills and Brain Structure: A Neuroimaging Study

A new study reveals significant differences in brain structure between individuals with varying reading abilities. Analyzing open-source data from over 1,000 participants, researchers found correlations between reading proficiency and the structure of the left anterior temporal lobe and Heschl's gyrus. The left temporal pole integrates diverse information, while Heschl's gyrus, part of the auditory cortex, showed thickness correlated with reading ability. The study highlights brain plasticity, suggesting reading shapes brain structure, benefiting both individuals and humanity.

Read more

Concurrent Cycle Collection: Garbage-Collected Smart Pointers in Rust for Scheme

2024-12-13

This article details the implementation of a concurrent cycle collector in Rust for garbage-collected smart pointers (Gc) within a Scheme interpreter. Gc functions similarly to Arc>, supporting interior mutability, cloning, and sending across threads. The article thoroughly explains the implementation of Gc, including thread-safe interior mutability using semaphores and read/write locks, and the implementation details of concurrent cycle collection based on the Bacon and Rajan algorithm. This includes the Trace trait, cycle detection, and mechanisms for handling concurrent modifications.

Read more

Open Source Pen Plotter Robot Project

2024-12-13
Open Source Pen Plotter Robot Project

Robertleoj has open-sourced a project on GitHub called Pen Plotter Robot, a pen plotting robot. The project includes the robot's design, construction, and control program, aiming to help makers and enthusiasts learn about robotics and mechanical design. The code and documentation are publicly available for learning and improvement.

Read more
Hardware pen plotter

Maker Builds Laser Shooting Game: From Legoland Ride to ESP32-Powered Halloween Fun

2024-12-13
Maker Builds Laser Shooting Game: From Legoland Ride to ESP32-Powered Halloween Fun

Inspired by a Legoland Egyptian adventure ride, the author decided to create a similar shooting game. Using inexpensive ESP32 microprocessors, infrared laser guns, and homemade targets, he successfully built a Halloween-themed shooting game. Along the way, he learned Arduino and MicroPython programming, overcoming challenges in hardware connections, power supply, and communication. The game was a hit at school and home events. Future plans include improving target design, lighting effects, and circuit boards to enhance the gaming experience.

Read more
Development Maker

Caves of Qud's Gigantic World Map: A 13.8 Gigapixel Adventure

2024-12-13
Caves of Qud's Gigantic World Map: A 13.8 Gigapixel Adventure

The upcoming sci-fi roguelike Caves of Qud, launching December 5th, boasts a massive world map totaling an astounding 13.8 gigapixels! This immense map consists of 240 x 75 zones, each zone containing 25 x 80 tiles, with each tile being 16 x 24 pixels. A web viewer allows exploration of the surface and even the first underground level (the remaining 2 billion+ levels are omitted due to data size). This breathtaking scale promises an epic, fantastical adventure, ripe with exploration possibilities.

Read more

New Hash Functions Rain Hashes: Speed and Security Combined

2024-12-13
New Hash Functions Rain Hashes: Speed and Security Combined

DOSAYGO Research has released Rain Hashes, a new family of hash functions featuring Rainbow and Rainstorm algorithms. Rainbow boasts exceptional speed, making it ideal for general-purpose hashing. Its C++ implementation has passed all SMHasher3 tests and is characterized by its concise and efficient code. Rainstorm prioritizes security; while not formally audited, its design incorporates elements from cryptographic hash functions and offers output sizes from 64 to 512 bits. The project provides C++, WASM, and Node.js implementations, along with a command-line tool and benchmark tests for easy evaluation and usage.

Read more
Development hash function

Web Origami: A New Programming Language for Simplified Website Building

2024-12-13

Web Origami is a new programming language designed to simplify the creation of small- to medium-sized websites. Using a concise syntax that complements HTML and CSS, users can describe website structure using formulas similar to spreadsheets, transforming data and files into HTML and other website resources through simple programs. Even without JavaScript knowledge, features like full-text search and RSS feeds can be created. Origami provides a command-line interface, built-in functions, and an async-tree library, with support for JavaScript extensions. Its core concept is to abstract website building as data transformation, making site creation and deployment efficient, low-cost, and easy to understand.

Read more

Demonic Possession Predicted the Fall of the Carolingian Empire

2024-12-13
Demonic Possession Predicted the Fall of the Carolingian Empire

In the early 9th century, a Frankish courtier recorded a tale of demonic possession. The demon, Wiggo, confessed to destroying crops, livestock, and spreading plagues, blaming the Franks' sins and their rulers' many crimes. Wiggo described rampant greed, mutual suspicion among rulers, and lack of piety. This story mirrored the crisis of the Carolingian Empire: internal strife, economic instability, and famine. The courtier, Einhard, used this tale to subtly criticize the rulers' corruption and foreshadow the empire's decline.

Read more

In Memoriam: Donald Bitzer, Pioneer of Computing

2024-12-13
In Memoriam: Donald Bitzer, Pioneer of Computing

The Computer History Museum mourns the passing of Donald L. Bitzer (1934-2024), a pioneering computer scientist. Co-inventor of the flat-panel plasma display and creator of the PLATO system—the world's earliest time-shared computer-based education system and a groundbreaking online community—Bitzer's innovations presaged many modern online features. PLATO included forums, message boards, online testing, email, chat rooms, instant messaging, and multiplayer games, laying the groundwork for the interconnected digital world we know today.

Read more

Security Vulnerabilities Stemming from Dart/Flutter's Weak PRNG

2024-12-13
Security Vulnerabilities Stemming from Dart/Flutter's Weak PRNG

Zellic's research uncovered multiple security vulnerabilities caused by a weak pseudorandom number generator (PRNG) in Dart/Flutter. A flaw in the initialization of the `Random()` function within the Dart SDK resulted in insufficient entropy in generated keys, making them susceptible to brute-force attacks. This allowed attackers to easily gain access to the Dart Tooling Daemon, enabling them to read or write workspace files and even execute arbitrary code. Furthermore, Proton Wallet and SelfPrivacy projects were also affected by this weak PRNG, experiencing encryption vulnerabilities and predictable password issues, respectively. While the vulnerability has been patched, developers are urged to exercise caution when using the `Random()` function and utilize `Random.secure()` when cryptographically secure random numbers are required.

Read more
1 2 589 590 591 593 595 596 597