The Night Keeper and the Genetically Modified Mouse

2025-04-17
The Night Keeper and the Genetically Modified Mouse

A university lab animal keeper stumbles upon an extraordinary secret: a genetically modified mouse, subjected to cruel experiments, has miraculously survived and seems to possess an exceptional lifespan. He secretly rescues the mouse and keeps it at home. This secret not only concerns the fate of a single mouse but also reflects the ethical dilemmas in scientific research and the relationship between humans and animals.

Read more

Trellis: AI-Powered Healthcare Acceleration

2025-08-11
Trellis: AI-Powered Healthcare Acceleration

Trellis, a Stanford AI Lab spin-off, uses AI to automate document intake, prior authorizations, and appeals in healthcare, enabling providers to treat more patients faster. Working directly with healthcare providers, pharma companies, and labs, Trellis tackles challenges like reducing prior authorization denials and streamlining drug enrollment. They've helped clients reduce treatment time by over 90% and improve approval and reimbursement rates. Backed by leading investors including YC and General Catalyst, Trellis is at the forefront of AI in healthcare.

Read more

ISEVIC: Breathing New Life into Your C64

2025-07-07
ISEVIC: Breathing New Life into Your C64

ISEVIC is an FPGA core that lets your vintage Commodore 64 output digital video via HDMI! It works by reading the bus signals on the cartridge port and translating them into a displayable image. It supports multiple FPGA platforms, including the Tang Nano 20K. The project includes Gerber files and bitstreams for a C64 cartridge slot carrier board, with automatic PAL/NTSC detection. While most cartridges work, some (like the EasyFlash 3) may have compatibility issues. Experimental SID emulation for sound is also included. Ready to relive the classics?

Read more
Hardware

Hidden Tax Bomb: How a 2017 Tax Code Tweak Triggered Tech Layoffs

2025-06-06
Hidden Tax Bomb: How a 2017 Tax Code Tweak Triggered Tech Layoffs

A little-noticed change to Section 174 of the 2017 US tax code, effective in 2022, unexpectedly triggered a massive wave of layoffs in the tech industry. The amendment changed the immediate expensing of R&D costs to amortization over five or fifteen years, significantly increasing the tax burden for tech companies. This led to widespread layoffs, impacting companies of all sizes, resulting in the loss of hundreds of thousands of high-paying jobs. While over-hiring during the pandemic and the rise of AI are cited as causes, the Section 174 change acted as a hidden accelerant. A bipartisan effort is underway to repeal the change, but the damage is done, impacting far beyond the tech sector, and a reversal may be too late.

Read more
(qz.com)

Google Mandates App Developer Verification for Enhanced Android Security

2025-08-25
Google Mandates App Developer Verification for Enhanced Android Security

To combat malware and financial scams, Google announced that starting in 2026, only apps from verified developers will be installable on certified Android devices. This impacts all installation methods, including sideloading. The move aims to curb the proliferation of fake apps and malicious actors. A phased rollout begins in 2026 in select countries heavily impacted by fraudulent apps, with global implementation in 2027. Developers will have access to a verification process, with separate workflows for students and hobbyists.

Read more

PyTorch Model with Metal Acceleration: Performance and Correctness

2025-09-04
PyTorch Model with Metal Acceleration: Performance and Correctness

This article presents a PyTorch-based model that attempts to leverage Metal for accelerated computation while providing pure PyTorch fallbacks to guarantee correctness. The model's core involves complex calculations including matrix multiplications, cumulative sums, and exponentiation. To enhance performance, the authors attempt to use Metal for custom kernels, but fall back to a pure PyTorch implementation if the Metal extension isn't available. This design ensures compatibility and reliability across different hardware platforms, offering developers a solution that balances performance and correctness.

Read more
Development Model Acceleration

Musk's xAI Employee Leaks API Key, Raising Security Concerns

2025-07-15

A 25-year-old employee at Elon Musk's Department of Government Efficiency (DOGE), Marko Elez, inadvertently leaked a private API key granting access to over 50 of xAI's large language models (LLMs). This raises serious concerns about government data security, especially given Elez's history: previously fired for racist posts and security breaches, he was later reinstated and granted access to sensitive databases across multiple government agencies. The leak highlights systemic security flaws and negligence within DOGE, exposing a pattern of irresponsible handling of government data.

Read more

Stop Thinking About Parallel Programming: Just Do It (Transparently)!

2025-06-25
Stop Thinking About Parallel Programming: Just Do It (Transparently)!

Guy L. Steele Jr. argues that programmers shouldn't need to worry about the specifics of parallel programming. Languages should provide transparent ways to run tasks in parallel. This requires a new approach to language design, supporting algorithms based on independence and divide-and-conquer principles, rather than linear problem decomposition. His presentation was given at the Strange Loop conference.

Read more
Development parallel programming

AI Surveillance in Schools: A Privacy Tightrope Walk

2025-03-12
AI Surveillance in Schools: A Privacy Tightrope Walk

Numerous US schools employ AI-powered surveillance software to monitor student online activity, aiming to prevent school violence and student suicide. However, this practice raises serious privacy concerns. Unredacted student data obtained by news organizations reveals the software captures not only potential threats but also vast amounts of sensitive personal information, including struggles with depression, heartbreak, family issues, and even outing LGBTQ+ students. While the software helps schools intervene in crises, its high false-positive rate, privacy violations, and uncertain long-term effectiveness fuel ethical debates about student privacy, safety, and mental health.

Read more

Embracer Games Archive: Preserving Gaming History

2025-05-10
Embracer Games Archive: Preserving Gaming History

Embracer Games Archive aims to preserve video game history. Inspired by Embracer Group CEO Lars Wingefors's personal collection, the archive has grown alongside the company. Its goal is to collaborate with institutions, grassroots movements, journalists, researchers, publishers, and studios to preserve and document gaming history, ultimately benefiting the entire industry.

Read more
Game

Internet Archive Livestreams Microfiche Digitization

2025-05-22
Internet Archive Livestreams Microfiche Digitization

The Internet Archive is livestreaming its microfiche digitization process on YouTube, offering a behind-the-scenes look at the work involved in its Democracy's Library initiative. This project aims to digitize and share millions of government records. The livestream shows operators transforming fragile microfiche cards into searchable public documents using high-resolution cameras, image stitching software, and OCR. Live scanning happens Monday-Friday, 7:30 AM to 3:30 PM PT (excluding holidays), with a second shift planned.

Read more

Guix Successfully Builds a Fully Bootstrapped Mono: A Long and Winding Road

2024-12-31

The Guix system has successfully built a fully bootstrapped Mono environment, overcoming numerous challenges in the process. The author details their journey to support C# 12.0 features, encountering issues with older Mono versions relying on pre-built binaries. Through a series of patches, a fully bootstrapped chain from Mono 1.2.6 to 6.12.0 was created. Along the way, bugs in Mono and xbuild were fixed, and runpath support in Mono was enhanced. This not only solved the author's C# compatibility problem but also highlighted the importance of fully bootstrapped, reproducible builds and their impact on software security.

Read more
Development Bootstrapped Build

Accidental Discovery: Unexpected Stability of Whole-Genome Duplication Reveals New Evolutionary Mechanism

2025-04-02
Accidental Discovery: Unexpected Stability of Whole-Genome Duplication Reveals New Evolutionary Mechanism

Scientists at Georgia Tech unexpectedly discovered in a long-term evolution experiment that whole-genome duplication (WGD) in yeast not only occurs but can remain stable for thousands of generations. Published in *Nature*, this study, initially aimed at exploring the evolution of multicellularity, unexpectedly revealed the crucial role of WGD. The research found that WGD gave yeast a larger size and stronger multicellular cluster formation ability, allowing it to survive and thrive under selective pressure, ultimately becoming a key factor driving the evolution of multicellularity. This discovery challenges the traditional understanding of WGD's instability and provides a new perspective on the role of genome duplication in evolution, highlighting the importance of long-term evolution experiments in exploring the mysteries of life.

Read more

GTA Online's 8-Year-Old Bug: A 13-Line Fix Exposes Systemic Issues in Big Tech

2025-04-08
GTA Online's 8-Year-Old Bug: A 13-Line Fix Exposes Systemic Issues in Big Tech

Programmer t0st famously fixed an eight-year-old GTA Online bug causing excruciatingly long load times, achieving a 70% reduction with just 13 lines of code. This sparked a debate about the development processes of large game companies. The article argues that the core problem isn't lazy developers, but a chaotic prioritization system, shifting code ownership, and a focus on short-term profits, leading to a massive backlog of bugs. While a PR win for Rockstar, t0st's fix didn't address the underlying systemic issues within large corporations.

Read more
Game

Retro Computing: Raising Digitally Literate Kids with Windows 3.1 and DOS Games

2025-04-23
Retro Computing: Raising Digitally Literate Kids with Windows 3.1 and DOS Games

Concerned about online risks for their children, the author turned to Windows 3.1 and DOS era software, using retro games to cultivate their learning abilities and keyboard skills. For example, the 1985 educational game '1st Math' helps children learn math while improving hand-eye coordination and cognitive skills. The author plans to set up an old computer loaded with classic educational software, protecting children while preserving digital heritage.

Read more

Challenging the 'Immunity Debt' Theory: Is COVID-19 Subtly Altering Our Immune Systems?

2025-09-13
Challenging the 'Immunity Debt' Theory: Is COVID-19 Subtly Altering Our Immune Systems?

The theory of 'immunity debt,' explaining the post-pandemic surge in non-COVID infections, is facing increasing scrutiny. While initially popular, the idea that pandemic restrictions suppressed exposure to pathogens, leaving individuals vulnerable, is challenged by rising infection rates even after restrictions lifted. Emerging research suggests SARS-CoV-2 may subtly alter immune systems, potentially impairing their response to other pathogens. This could involve a 'reset' of the immune system, reactivating dormant viruses. This hypothesis could reshape our understanding of various diseases, from RSV to shingles and sepsis. While some dispute this, evidence points towards lasting immune system impacts from even mild COVID-19 cases, causing immune dysfunction. The implications remain a topic of debate and further research.

Read more

The IRB Nightmare: Navigating the Absurdity of US Human Subjects Research

2025-02-13
The IRB Nightmare: Navigating the Absurdity of US Human Subjects Research

The author recounts, in a lighthearted yet insightful manner, the complexities of Institutional Review Board (IRB) approval in US human subjects research. Using the analogy of an absurdly steep driveway, he illustrates the difficulty in comprehending the often illogical rules. The article debunks common misconceptions about IRB applicability, delving into the origins and intricacies of the Common Rule, and the added layer of FDA regulations. The author highlights the convoluted nature of current regulations, emphasizing that practical enforcement depends on selective application by regulatory bodies rather than strict adherence to written law. Ultimately, the author advocates for streamlining IRB processes, particularly for low-risk research, suggesting a post-hoc penalty system rather than pre-approval.

Read more

Stricter Memory Safety Rules: Introducing Child Groups

2025-08-28

This article introduces a stricter memory safety rule by introducing the concept of "child groups." The old rule was too lenient; the new rule more precisely defines which references need to be invalidated when an object is mutated. Using the `Entity` struct as an example, the article explains how to distinguish between the object itself and its "child groups" (e.g., elements in a list, objects pointed to by pointers). The new rule states that when an object might be modified, references to the object itself remain valid, but references to child groups become invalid. Through code examples, the article clearly demonstrates how the new rule enhances memory safety and avoids dangling pointers.

Read more
Development references

UUID Equality Logic Cracker: Brute-forcing AES-256-CBC

2025-04-15
UUID Equality Logic Cracker: Brute-forcing AES-256-CBC

A compact field-logical decryption toolkit brute-forces UUID-encrypted AES-256-CBC files using an equality-based initialization: xy = x / y. This demonstrates deterministic search within defined entropy spaces. A demo generates a UUID-encrypted file with a structured suffix. `uuid_demobreaker.py` then linearly scans UUID space, leveraging the equality as a logical 'ignition' – not a heuristic – to guide the search. The cracker doesn't guess, filter, or use probabilistic shortcuts; it defines and explores the search space directly.

Read more
Development

Broadcom's VMware Audits Spark Controversy: Customers Question Aggressive Tactics

2025-06-27
Broadcom's VMware Audits Spark Controversy: Customers Question Aggressive Tactics

Following its $69 billion acquisition of VMware, Broadcom's aggressive license compliance reviews are sparking controversy. Broadcom has sent cease-and-desist letters and audit notices to numerous companies, but several firms deny wrongdoing, claiming they only installed security patches or no longer use VMware at all. This has led to potential financial repercussions for some companies, including possible layoffs. Broadcom's strong-arm tactics have damaged its image and prompted calls for regulation of its business practices.

Read more

Microplastics Found in Human Brains: A Spoonful of Worry

2025-02-06
Microplastics Found in Human Brains: A Spoonful of Worry

A groundbreaking study published in Nature Medicine reveals alarming levels of microplastics and nanoplastics in human brains—up to seven grams, roughly the weight of a teaspoon. The concentration increased by about 50% between 2016 and 2024, with higher levels found in individuals with dementia. While a causal link to dementia isn't established, the sheer presence of these particles deep within the brain is concerning. Researchers hypothesize that microplastics may travel to the brain via the bloodstream, binding to fats. This discovery underscores the urgent need for reducing microplastic exposure and further research into the long-term health impacts.

Read more
Tech

AI-Generated Bug Reports Flood HackerOne: Security Researcher Calls for Action

2025-05-07
AI-Generated Bug Reports Flood HackerOne: Security Researcher Calls for Action

Security researchers have discovered a surge in AI-generated, false vulnerability reports flooding bug bounty platform HackerOne. These reports, often perfectly worded and formatted, lack actual security value, wasting security researchers' time and potentially obscuring real vulnerabilities. Researchers are calling on HackerOne to strengthen its review mechanisms and crack down on this behavior, suggesting solutions like bond systems or leveraging existing network infrastructure for review. This is a worrying trend potentially impacting open-source projects on a large scale.

Read more
Development

SvarDOS: DR-DOS Reborn as an Open Source OS

2025-01-02
SvarDOS: DR-DOS Reborn as an Open Source OS

SvarDOS, an open-source operating system based on DR-DOS, recently transitioned from being a FreeDOS distribution to having its own EDRDOS kernel. It can run on 8086 or 8088 PCs and boasts a network-capable package manager. While the default install is incredibly small, its robust repository contains over 400 packages, including network drivers, editors, and games. SvarDOS requires more manual configuration than FreeDOS, but its powerful features and online update mechanism make it a noteworthy retro OS.

Read more
Development open source OS

Unlocking ZX Spectrum Graphics: A Deep Dive into Memory Addressing

2025-06-17
Unlocking ZX Spectrum Graphics: A Deep Dive into Memory Addressing

This article delves into the intricacies of graphics programming on the ZX Spectrum. It explains how the Spectrum's video memory isn't a simple pixel grid, but rather a combination of pixel and attribute areas, with each attribute block controlling 8x8 pixels' color and effects, leading to the famous 'attribute clash'. The author details pixel address calculation methods, including direct formula calculation, incremental methods, and highly efficient table lookups, providing JavaScript and Z80 assembly code examples to draw points and 8x8 graphics. Mastering these techniques is crucial for efficient graphics programming on the Spectrum.

Read more
Development

macOS CoreAudio Zero-Day Exploited in the Wild: A Deep Dive

2025-06-02
macOS CoreAudio Zero-Day Exploited in the Wild: A Deep Dive

In April 2025, Apple patched a CoreAudio bug actively exploited in the wild: CVE-2025-31200, a memory corruption vulnerability. A security researcher meticulously analyzed the bug by comparing old and new binary versions, pinpointing the culprit: apac::hoa::CodecConfig::Deserialize. The vulnerability stemmed from flawed array size handling during audio data parsing. Attackers could exploit this for out-of-bounds read/write, leading to a crash. Through reverse engineering and dynamic analysis, the researcher replicated the vulnerability, revealing its exploitation. It leverages the Apple Positional Audio Codec (APAC), using a crafted audio file to manipulate array sizes and achieve out-of-bounds memory access. While resulting in a crash, this vulnerability’s potential for more sophisticated attacks is significant.

Read more
Development

Zig for GPU Programming: A Modern Approach

2025-04-18

GPU programming used to be synonymous with wrestling C++ compilers, bloated SDKs, and vendor-specific toolchains. That's changing. Now you can write GPU code in modern languages like Rust and Zig with fewer layers of abstraction. This post explores the current state of Zig's GPU backends and how they perform across Vulkan, OpenCL, and native ISAs. Zig supports SPIR-V, PTX, and AMDGCN, allowing the generation of native binaries loadable at runtime, eliminating the need for CUDA, HIP, or HLSL. While Vulkan and OpenCL are the major SPIR-V environments, differences between them impact Zig's SPIR-V backend's behavior test pass rates. Future plans include maturing the SPIR-V backend, providing CUDA/HIP runtime bindings, and adding more GPU algorithms to the standard library.

Read more
Development

Five Years of tachy0n: A Retrospective on an iOS 13.5 0day Exploit

2025-05-24

This post reflects on tachy0n, an iOS 13.5 0day exploit released in 2020, leveraging the Lightspeed vulnerability (CVE-2020-9859) discovered by Synacktiv. Author Siguza details the exploit's discovery and its use in jailbreaking, highlighting the race condition in the `lio_listio` syscall. The article also discusses significant security improvements introduced in iOS 14 that effectively mitigated such attacks, shifting Apple's security strategy from patching individual bugs to addressing entire exploitation strategies. This is a technical news report focusing on iOS system security and exploit development.

Read more

CERN's Portable Antimatter Shipping Container: A New Era of Precision Measurement

2025-05-20
CERN's Portable Antimatter Shipping Container: A New Era of Precision Measurement

CERN has developed a portable antimatter shipping container, solving a long-standing problem in antimatter research. The interference from existing antimatter trapping equipment limits measurement precision. This two-meter-long container allows antimatter to be moved from its production point to other labs for more precise study. Equipped with superconducting magnets and batteries, it ensures antimatter stability and uninterrupted power, opening a new chapter in the in-depth study of antimatter properties.

Read more
Tech

Record Heat: A Global Workplace Crisis

2025-08-23
Record Heat: A Global Workplace Crisis

A new report from the WHO and WMO warns that record-breaking temperatures are transforming workplaces globally, impacting over 2.4 billion workers through heat stress. High temperatures are causing increased workplace injuries, decreased productivity, and even fatalities. The report calls for bold, coordinated action, including improved heatwave warning systems, adjusted work schedules, redesigned uniforms and workplaces, and emergency preparedness plans. Ultimately, reducing fossil fuel emissions to combat global warming is crucial to addressing this growing challenge.

Read more

AI Revolutionizes Physics: From LIGO to Novel Quantum Entanglement Experiments

2025-07-22
AI Revolutionizes Physics: From LIGO to Novel Quantum Entanglement Experiments

Artificial intelligence is revolutionizing physics research. This article details AI's application in enhancing LIGO's sensitivity, discovering symmetries in Einstein's relativity from Large Hadron Collider data, and even finding a new equation for dark matter clumping. Most impressively, AI-designed quantum entanglement experiments, surpassing previous designs in simplicity and efficiency, have been successfully validated in China, showcasing AI's immense potential in experimental design and data analysis.

Read more
Tech
1 2 196 197 198 200 202 203 204 596 597