AMD Q4 2024 Earnings: Datacenter Dominance, but Gaming Slumps

2025-02-06
AMD Q4 2024 Earnings: Datacenter Dominance, but Gaming Slumps

AMD reported impressive Q4 2024 and full-year results, with total revenue reaching $7.658 billion, a 24% year-over-year increase. The datacenter business was a standout performer, achieving record revenue of $3.86 billion, surpassing Intel for the first time and establishing AMD as the leading datacenter CPU vendor. However, sales of Instinct MI300-series GPUs fell slightly short of expectations. The client business saw strong growth, with revenue up 58% year-over-year. Conversely, the gaming segment experienced a significant downturn, with revenue plummeting 59% year-over-year. The embedded segment also saw a moderate decline. Overall, 2024 was a record year for AMD, but the weakness in the gaming sector is a concern.

Read more

Xata's Efficient MCP Server: OpenAPI, Kubb, and a Pinch of Next.js

2025-05-27
Xata's Efficient MCP Server: OpenAPI, Kubb, and a Pinch of Next.js

Xata built an MCP server enabling secure real-time interaction between AI models and tools/APIs. Instead of hand-coding each tool, they leveraged their existing OpenAPI specification and Kubb, a code generation tool, to automate the process. This approach uses the OpenAPI spec as a single source of truth, ensuring rapid development and consistency. The post details migrating to Kubb, creating custom generators, and building the MCP server with Next.js, resulting in an efficient AI integration.

Read more
Development

Printing Digital Data to Paper: An Extreme Storage Method

2025-06-03

This article explores various methods of storing digital data on paper, ranging from simple character encoding (like Base16, Base32, Base64) to more complex dot encodings (like QR codes, Optar), and even color encodings. The author experimentally compares the information density and reliability of different methods and discusses key issues such as OCR, error correction codes, and long-term storage. Results show that dot encoding methods (like stacked QR codes and Optar) can store up to 100KB of data on an A4 page, while character encoding methods are limited by OCR accuracy, resulting in relatively small storage capacity. The article also explores the possibility of handwriting data encoding and paper data transmission, offering new ideas for preserving digital data under extreme conditions.

Read more

Programmer's Nostalgia: A $30 Custom Voice Recording from the AOL Voice

2025-01-15
Programmer's Nostalgia: A $30 Custom Voice Recording from the AOL Voice

Blogger John Graham-Cumming recounts his 2002 experience commissioning custom voice recordings from Elwood Edwards, the iconic voice of AOL. For $30, he ordered two phrases, "Mail classified by POPFile" and "Use the source, Luke!" for his machine learning email filtering program, POPFile. Edwards even included a bonus "You've got mail, John!" This charming anecdote reveals a personalized touch of the early internet and the humor of tech pioneers.

Read more
Development personalized service

EndBOX: A Retro-Inspired Minimalist Programming Computer

2025-06-12
EndBOX: A Retro-Inspired Minimalist Programming Computer

ReadyRUN has unveiled EndBOX prototypes, a miniature computer designed to recapture the essence of programming. Booting instantly into a retro-styled EndBASIC environment, it offers a bare-bones, command-line experience with no bloat. Targeted at developers and educators, EndBOX prioritizes hardware accessibility and learning. Two prototypes exist: a standard model with a 7-inch touchscreen, and a micro model with a 128x128 LCD. Both feature Wi-Fi and Bluetooth, running a NetBSD-based OS. The author is seeking community support to guide EndBOX's future, including hardware configurations and software features.

Read more

JPMorgan Chase CEO Slams Remote Work: Inefficient, Damages Young Workers

2025-02-15
JPMorgan Chase CEO Slams Remote Work: Inefficient, Damages Young Workers

JPMorgan Chase CEO Jamie Dimon recently slammed remote work, claiming it reduces efficiency and harms the development of young employees. He stated that remote work leads to distractions, a lack of face-to-face interaction, and hinders creativity and decision-making. Despite JPMorgan Chase's recent record-breaking performance, Dimon insists that all hybrid workers return to the office full-time by March. This move prompted a petition signed by approximately 950 employees, but Dimon remains firm, asserting the company's right to set its own standards, and employees are free to leave if they disagree.

Read more

Danish Citizens Petition to Buy California

2025-02-11
Danish Citizens Petition to Buy California

In response to President Trump's repeated suggestions of the U.S. acquiring Greenland, Danish citizens have launched a satirical petition to purchase California. The online petition, aiming for the 'Denmarkification' of California, has garnered nearly 200,000 signatures. The humorous proposal highlights California's sunshine, tech industry dominance, and Disneyland (to be renamed after Hans Christian Andersen) as enticements. This lighthearted counter-move underscores the tension between California and the Trump administration, mirroring Trump's pursuit of Greenland.

Read more

Laptop Mag Shuts Down After 35 Years

2025-07-02
Laptop Mag Shuts Down After 35 Years

Laptop Mag, a long-standing laptop and technology review website, has ceased operations after nearly 35 years. Its parent company, Future PLC, cited a strategic review as the reason for the closure. Starting as a print publication in 1991, Laptop Mag transitioned to a digital-only format in 2013. The shutdown follows the recent closure of AnandTech, also owned by Future PLC, raising concerns about the future of tech journalism and leaving the fate of Laptop Mag's archives uncertain.

Read more
Tech

Remotely Unlocking macOS FileVault via SSH

2025-09-19

With FileVault enabled in macOS, the data volume is locked and inaccessible during and after boot until password authentication. Since OpenSSH configuration files reside on the data volume, standard SSH authentication is unavailable. However, with Remote Login enabled, SSH password authentication can unlock the data volume remotely. After unlocking, macOS briefly disconnects SSH to mount the volume and start dependent services, then SSH resumes fully. This capability appeared in macOS 26 Tahoe.

Read more
Development

Massive Industry Ties Revealed Among DSM-5-TR Panel Members

2025-08-27
Massive Industry Ties Revealed Among DSM-5-TR Panel Members

A study investigating financial ties between the American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorders, fifth edition, text revision (DSM-5-TR), panel members and industry found that nearly 60% (55 out of 92) received substantial payments totaling over $14.2 million. These payments encompassed consulting fees, travel expenses, speaking engagements, and more. The research highlights the potential for conflicts of interest influencing the DSM-5-TR's objectivity and calls for stricter regulations to prevent such conflicts and ensure the independence and reliability of mental health diagnostic standards.

Read more
Misc

WireGuard Setup Complexity: A Guide from Simple to Advanced

2025-01-05

This blog post explores various WireGuard setup complexities, ranging from the simplest, with completely isolated internal IP address spaces, to the most challenging 'VPN' setup where some endpoints are accessible both inside and outside the WireGuard tunnel. The author details the difficulty and potential issues of each setup, such as routing conflicts and recursive routing. The article stresses the importance of upfront planning and suggests opting for simpler configurations to avoid complex routing when designing a WireGuard environment.

Read more
Development Network Configuration

NASA's Existential Crisis: China's Lunar Landing in 1637 Days

2025-06-12
NASA's Existential Crisis: China's Lunar Landing in 1637 Days

This article argues that NASA is a shadow of its former self, facing an existential crisis. With China poised to land on the Moon in 1637 days, the author criticizes NASA's massively over-budget and ineffective SLS program, contrasting it with SpaceX's success. The author calls for drastic NASA reform, including streamlining bureaucracy, improving efficiency, prioritizing talent, and refocusing its mission to compete with China and maintain US leadership in space.

Read more
Tech

Fetii: Senior Ops Manager Needed – Join a Rocket-Ship Startup

2025-05-15
Fetii: Senior Ops Manager Needed – Join a Rocket-Ship Startup

Fetii, a Y Combinator and Mark Cuban-backed startup disrupting group transportation, seeks a Senior Operations Manager. This isn't a 9-to-5; it's a high-stakes role demanding someone ruthlessly organized and entrepreneurial to oversee driver operations, fleet compliance, quality assurance, and event logistics. Expect long hours and weekends, but also significant stock options and the chance to build a massive company. Located in Austin, TX (hybrid or remote).

Read more

arXivLabs: Experimenting with Community-Driven Features

2025-02-01
arXivLabs: Experimenting with Community-Driven Features

arXivLabs is a framework enabling collaborators to build and share new arXiv features directly on the website. Participants, both individuals and organizations, embrace arXiv's values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only partners with those who share them. Got an idea for a project that will benefit the arXiv community? Learn more about arXivLabs.

Read more

Accidental Discovery: Unexpected Stability of Whole-Genome Duplication Reveals New Evolutionary Mechanism

2025-04-02
Accidental Discovery: Unexpected Stability of Whole-Genome Duplication Reveals New Evolutionary Mechanism

Scientists at Georgia Tech unexpectedly discovered in a long-term evolution experiment that whole-genome duplication (WGD) in yeast not only occurs but can remain stable for thousands of generations. Published in *Nature*, this study, initially aimed at exploring the evolution of multicellularity, unexpectedly revealed the crucial role of WGD. The research found that WGD gave yeast a larger size and stronger multicellular cluster formation ability, allowing it to survive and thrive under selective pressure, ultimately becoming a key factor driving the evolution of multicellularity. This discovery challenges the traditional understanding of WGD's instability and provides a new perspective on the role of genome duplication in evolution, highlighting the importance of long-term evolution experiments in exploring the mysteries of life.

Read more

Cold War Emergency: Two F-14s Diverted to the USS Midway

2025-01-26
Cold War Emergency: Two F-14s Diverted to the USS Midway

In 1982, two F-14 Tomcats from the USS Enterprise, facing heavy fog and dwindling fuel after a Soviet flight alert, made an emergency landing on the USS Midway—a carrier not designed to handle their size and weight. Despite the Midway's unsuitable infrastructure, both jets successfully landed and later launched. This incredible feat highlights the skill of the pilots, the bravery of a tanker crew, and the extraordinary teamwork of the Midway's personnel, becoming a legendary Cold War tale.

Read more

Cisco Firewall and TLS 1.3 Compatibility Issues

2025-05-22

A company encountered a problem with their Cisco firewall: due to TLS 1.3 encrypting server certificates, the firewall couldn't enforce URL or application access rules based on certificate content. To solve this, Cisco introduced TLS Server Identity Discovery, using an additional TLS 1.2 handshake to retrieve the certificate in plaintext. However, this clashed with expected Postgres database behavior. The actual issue wasn't TLS 1.3 incompatibility, but rather the firewall wasn't configured to block unknown applications; it attempted to learn the certificate for 3 seconds before giving up and allowing the connection.

Read more
Tech

Tokasaurus: A New LLM Inference Engine for High Throughput

2025-06-05
Tokasaurus: A New LLM Inference Engine for High Throughput

Stanford researchers released Tokasaurus, a novel LLM inference engine optimized for throughput-intensive workloads. For smaller models, Tokasaurus leverages extremely low CPU overhead and dynamic Hydragen grouping to exploit shared prefixes. For larger models, it supports async tensor parallelism for NVLink-equipped GPUs and a fast pipeline parallelism implementation for those without. On throughput benchmarks, Tokasaurus outperforms vLLM and SGLang by up to 3x. This engine is designed for efficient handling of both large and small models, offering significant performance advantages.

Read more

Zig for GPU Programming: A Modern Approach

2025-04-18

GPU programming used to be synonymous with wrestling C++ compilers, bloated SDKs, and vendor-specific toolchains. That's changing. Now you can write GPU code in modern languages like Rust and Zig with fewer layers of abstraction. This post explores the current state of Zig's GPU backends and how they perform across Vulkan, OpenCL, and native ISAs. Zig supports SPIR-V, PTX, and AMDGCN, allowing the generation of native binaries loadable at runtime, eliminating the need for CUDA, HIP, or HLSL. While Vulkan and OpenCL are the major SPIR-V environments, differences between them impact Zig's SPIR-V backend's behavior test pass rates. Future plans include maturing the SPIR-V backend, providing CUDA/HIP runtime bindings, and adding more GPU algorithms to the standard library.

Read more
Development

Amazon's Book Sale Clash with Independent Bookstore Day: A David vs. Goliath Story

2025-04-27
Amazon's Book Sale Clash with Independent Bookstore Day: A David vs. Goliath Story

Amazon's annual book sale overlaps with Independent Bookstore Day, sparking outrage from independent bookstore owners who accuse Amazon of deliberately scheduling the sale to undercut them. While Amazon claims the overlap was unintentional, many see it as a continuation of Amazon's long history of aggressive tactics against competitors. Indie bookstores, however, have persevered by fostering community bonds and offering a unique shopping experience that Amazon can't replicate.

Read more

Pixel 9a: A Kid-Friendly Phone with Robust Parental Controls

2025-03-19
Pixel 9a: A Kid-Friendly Phone with Robust Parental Controls

The Google Pixel 9a is designed with kids in mind, offering a suite of safety and parental control features. Parents can manage their child's account and device using Google Family Link, controlling screen time, monitoring app usage, approving downloads, setting privacy options, and sharing location. A new 'School Time' feature restricts functionality and silences notifications during school hours. Additionally, Google Wallet for kids is rolling out on the Pixel 9a, enabling safer payments with Google Pay and allowing kids to add passes like movie tickets and library cards. Parents maintain control over payment cards and passes through Family Link.

Read more

A Calculational Approach to Type Checker Design

2025-03-18

This paper presents a calculational approach to designing type checkers, deriving them from behavioral specifications using equational reasoning. The authors simplify calculations using an algebraic approach based on fold fusion and further improve it with a constraint-based approach to solving and composing fusion preconditions. The methodology is illustrated with three examples of increasing complexity: a simple expression language, one with exceptions, and a version of the lambda calculus.

Read more
Development

Nvidia's NV1: A Deep Dive into its Groundbreaking Architecture

2025-05-20
Nvidia's NV1: A Deep Dive into its Groundbreaking Architecture

This article delves into the architectural innovations behind Nvidia's early graphics chip, NV1. Author David S. H. Rosenthal recounts his experiences at Sun Microsystems and early Nvidia, revealing the secrets to NV1's success. Two key innovations stood out: a novel imaging model and I/O architecture. The imaging model used quadric patches instead of triangles, significantly reducing data transfer, enabling smooth gameplay of titles like Virtua Fighter on the then-bandwidth-constrained PCI bus. The I/O architecture featured a virtualized object system with a software resource manager, allowing flexible emulation of hardware features, dramatically accelerating development and reducing risk. The author argues that NV1 wasn't just a minimal viable product, but a forward-thinking architecture built upon a deep understanding of future operating system and graphics needs, laying the foundation for Nvidia's subsequent triumphs.

Read more
Hardware Graphics Chip

Google's Device-Bound Session Credentials: The End of Session Hijacking?

2025-08-28

Session hijacking has long been a major threat to online security. Traditional cookie-based session management is vulnerable, leaving systems open to attack. To combat this, Google has introduced Device-Bound Session Credentials (DBSC), leveraging public-key cryptography. DBSC generates a key pair for each session, securely stored on the device (e.g., using TPM on Windows). This renders session identifiers useless on other devices, effectively preventing hijacking. Currently in beta for Google Workspace Chrome users (Windows), widespread adoption by other browser vendors could finally make session hijacking a relic of the past.

Read more

Manually Building a Nix Derivation: A Deep Dive into Hash Generation

2025-04-09
Manually Building a Nix Derivation: A Deep Dive into Hash Generation

This blog post details the author's journey in manually building a simple Nix derivation. By dissecting Farid's blog post step-by-step, the author delves into the inner workings of Nix derivations, specifically the hash generation process. The journey involved overcoming challenges such as understanding ATerm representation, SHA256 hashing, and Nix's unique base32 encoding. Ultimately, the author successfully generated the same hash value as in Farid's blog post and successfully built a simple "hello world" derivation.

Read more
Development Hash Generation

The End of Hand-Coding? A Developer's Perspective from Amazon to a Startup

2025-09-09

After leaving Amazon's AI coding assistant team, the author joined Icon, witnessing firsthand the AI revolution in software development. Amazon's slow processes and KPI-driven decisions hampered efficiency, unlike Icon's AI-powered approach where developers focus on design and user needs, automating much of the coding. The author predicts that pure coding skills will be less crucial, while user understanding, product strategy, and marketing will become paramount. Developers need to adapt, enhancing their skills in these areas to remain competitive in the age of AI.

Read more
Development

Plex Security Breach: User Passwords Compromised, Reset Now!

2025-09-09
Plex Security Breach: User Passwords Compromised, Reset Now!

Streaming server Plex experienced a security incident where hackers accessed a database, exposing some user emails, usernames, and hashed passwords. While passwords were encrypted, Plex is requiring all users to reset their passwords and log out of all connected devices as a precaution. The company has patched the vulnerability and implemented further security measures, urging users to enable two-factor authentication.

Read more
Tech

MemoTTL: A Thread-Safe Memoization Gem for Ruby with TTL and LRU

2025-04-22
MemoTTL: A Thread-Safe Memoization Gem for Ruby with TTL and LRU

MemoTTL is a thread-safe memoization utility for Ruby offering TTL (Time-To-Live) and LRU (Least Recently Used) eviction. It's perfect for caching method results, preventing redundant computations, and managing memory usage. The gem easily integrates via `include MemoTTL` and `memoize`, providing methods to clear the cache. Examples demonstrate its use in a Rails controller, significantly improving performance by avoiding repeated calls to expensive methods.

Read more
Development

Mathematician Cracks Algebra's Oldest Problem with Novel Number Sequences

2025-05-02
Mathematician Cracks Algebra's Oldest Problem with Novel Number Sequences

UNSW Sydney's Honorary Professor Norman Wildberger, in collaboration with computer scientist Dr. Dean Rubine, has unveiled a new method for solving higher-order polynomial equations, published in *The American Mathematical Monthly*. Rejecting the irrational numbers used in classical approaches, the method utilizes novel number sequences called the "Geode," a multi-dimensional extension of Catalan numbers. This breakthrough solves a centuries-old problem and promises improved algorithms for computer programs.

Read more

Apple and ZFS: A Missed Opportunity

2025-04-27

This article recounts the complex history between Apple and the ZFS filesystem. From Apple's 2006 decision to develop Time Machine independently instead of adopting ZFS, to the brief appearance and subsequent shelving of ZFS in 2007, and finally to Apple's launch of its own APFS filesystem, the author details the technical, commercial, and interpersonal factors involved. The article laments the advanced technology of ZFS, reflects on Apple's internal decision-making process, and reveals little-known behind-the-scenes stories, such as Sun's CEO's indiscretion and the complex relationship between Apple and Oracle's CEO. Ultimately, Apple chose to develop its own system, abandoning the industry-leading ZFS, leaving behind a regrettable chapter in technological development.

Read more
Tech
1 2 209 210 211 213 215 216 217 596 597