Sorbet's Ugly Syntax: A Necessary Evil for Ruby Type Checking?

2025-05-09

Sorbet, Stripe's Ruby static type checker, has a famously clunky syntax. In this talk, Jake explains the trade-offs behind Sorbet's design choices. While the syntax isn't pretty, semantics (what the types mean) are arguably ten times more important. Sorbet wasn't built to force static typing, but rather to address Stripe engineers' needs for improved productivity and code maintainability. The talk traces Sorbet's history, exploring various design approaches before settling on a DSL extension of existing Ruby. Future improvements are discussed, including refinements to the current syntax and integration with Ruby's RBS standard, aiming for greater ease of use and power.

Read more
Development Static Type Checking

Mycoria: An Open and Secure Overlay Network

2025-05-08

Mycoria is an open and secure overlay network connecting all participants. Valuing freedom of connectivity, it aims to emulate the early internet's adventurous spirit: everyone is equal with easy connection; everyone is welcome on its open, bureaucracy-free network; no surveillance with end-to-end encryption and private addresses; and no barriers, connecting via the internet or extending Mycoria with your own mesh network. Design goals include simplicity, compatibility with existing infrastructure (like DNS), default security, and default privacy (WIP). Features include automatic end-to-end encryption, modern cryptography, smart and scalable routing, a dashboard, .myco DNS resolution (OS configuration required), simple service discovery, auto-optimization/healing (for internet overlay, WIP), and rotating private addresses (WIP).

Read more

Interpol Drops 'Pig Butchering' Term

2024-12-18
Interpol Drops 'Pig Butchering' Term

Interpol announced it will no longer use the term "pig butchering" to describe online scams, citing its potential to shame and discourage victims from reporting. The organization believes the term dehumanizes victims and prefers "romance baiting," a term it believes is more sensitive and respectful. This change highlights a shift towards prioritizing victim support and emphasizes the need for more considerate language when discussing sensitive crimes. However, many US law enforcement agencies continue to use the original term.

Read more

Open-Source Wi-Fi MAC Layer for ESP32 Takes Flight

2025-03-09

An ambitious open-source project is underway to create a fully open-source Wi-Fi MAC layer for the popular low-cost ESP32 microcontroller. Currently, the ESP32's Wi-Fi MAC layer is closed-source, limiting security audits, feature enhancements, and interoperability. This project reverse-engineers the hardware registers and software, resulting in two open-source MAC layer implementations in C and Rust. One utilizes FreeRTOS tasks, while the other is a pure async Rust implementation built on Embassy. The goal is to enhance ESP32's security, functionality, and research accessibility, paving the way for features like standards-compliant mesh networking.

Read more
Hardware

Shocking Study: Half of College English Majors Can't Understand Dickens

2025-05-23
Shocking Study: Half of College English Majors Can't Understand Dickens

A study of English majors at two Kansas public universities reveals a startling truth: 58% struggled to comprehend even the opening paragraphs of Dickens' *Bleak House*, failing to distinguish between literal and figurative language. Even with dictionaries and phones, many students were overwhelmed by complex sentences and unfamiliar vocabulary. While scoring well on standardized reading tests, they lacked the skills to tackle complex literary texts—a significant problem considering many were training to be high school English teachers. Researchers expressed alarm at the findings, emphasizing the need for universities to address students' actual reading levels to avoid awarding degrees to those lacking proficiency in reading complex texts.

Read more
Misc

Coinbase Tightens Security Amid Growing North Korean Hacking Threat

2025-08-24
Coinbase Tightens Security Amid Growing North Korean Hacking Threat

Coinbase CEO Brian Armstrong revealed that the company has been forced to tighten its remote-first work policy to combat a growing threat from North Korean hackers. North Korean IT workers have been exploiting Coinbase's remote work policy to infiltrate the company's systems and steal sensitive information. In response, Coinbase is requiring all employees to attend in-person onboarding in the US and is implementing stricter background checks, including US citizenship requirements and fingerprinting, for those with access to sensitive systems. The company has also strengthened internal security measures to mitigate insider threats and bribery attempts.

Read more
Tech

BYD: The Chinese EV Giant Surpassing Tesla

2025-03-30
BYD: The Chinese EV Giant Surpassing Tesla

BYD, a Shenzhen-based company, has overtaken Tesla to become the world's top-selling electric vehicle maker. Its continuous innovation, such as a revolutionary 5-minute charging technology adding 250 miles of range and its advanced driver-assistance system, "God's Eye," rivaling Tesla's Full Self-Driving, showcases its formidable technological prowess. Leveraging price advantages and dominance in the Chinese market, BYD is aggressively expanding globally, challenging Tesla's global leadership. However, its overseas expansion isn't without hurdles.

Read more
Tech

Forward-Swept Wings: A Cold War Technological Dead End

2025-06-19
Forward-Swept Wings: A Cold War Technological Dead End

During the Cold War, both the US and USSR pursued the development of forward-swept wing fighter jets, hoping to gain a technological edge. While offering superior maneuverability, the design presented significant structural challenges. The US's Grumman X-29 and the USSR's Sukhoi Su-47, both employing advanced carbon fiber composites and fly-by-wire systems, ultimately fell victim to 'aeroelastic divergence'. The high cost and emergence of alternative technologies like thrust vectoring rendered the advantages of forward-swept wings insufficient, leading to the abandonment of both programs. Today, the X-29 serves as a museum piece, a testament to this Cold War technological pursuit.

Read more

Bringing SerenityOS to Real Hardware: A Chromebook Reverse Engineering Odyssey

2025-01-08

To run SerenityOS on real hardware, the author bought a cheap Chromebook. However, the Chromebook's Cr50 debugging functionality failed, forcing the author to manually solder a Raspberry Pi Pico to the motherboard for serial debugging. This involved bypassing the Cr50 security chip's write protection and writing a custom SPI flash program. The author successfully booted SerenityOS on the Chromebook, but debugging the eMMC driver proved challenging, requiring a deep dive into MMC and SD card protocols and meticulous adjustments to the hardware power control.

Read more
Development

CISA Releases Open-Source Malware Analysis Platform: Thorium

2025-08-01
CISA Releases Open-Source Malware Analysis Platform: Thorium

The Cybersecurity and Infrastructure Security Agency (CISA) has released Thorium, an open-source platform for malware and forensic analysis. Developed in partnership with Sandia National Labs, Thorium automates many tasks in cyberattack investigations, boasting impressive scalability (over 1700 jobs/second, 10 million files/hour per group). It integrates commercial, open-source, and custom tools, supporting software analysis, digital forensics, and incident response. This release follows CISA's previous initiatives, including the Eviction Strategies Tool and Malware Next-Gen analysis system, all aimed at bolstering cybersecurity defenses.

Read more

Microsoft Edge Launches Copilot Mode: AI-Powered Browsing Reimagined

2025-07-29
Microsoft Edge Launches Copilot Mode: AI-Powered Browsing Reimagined

Microsoft has released Copilot Mode for its Edge browser, an experimental feature leveraging AI to redefine web browsing. Copilot Mode integrates search, chat, and navigation into a single input box, understanding user intent for faster browsing. It analyzes context across open tabs, aiding in comparison, decision-making, and task completion. Copilot supports voice navigation and advanced actions (with user permission) accessing browser history and credentials for enhanced efficiency. Future improvements and features are planned, with the option to disable Copilot Mode in settings.

Read more
Tech

pg_test_fsync: Benchmarking Disk Write Performance for Databases

2025-05-28

This article introduces `pg_test_fsync`, a tool for quickly benchmarking disk or cloud storage write performance, particularly useful for database WAL logs and other low-latency write workloads. The author tests a consumer-grade Samsung 990 Pro SSD and an enterprise-grade Micron 7400 SSD, revealing significantly faster synchronous write speeds on the enterprise SSD due to its controller DRAM cache and power-loss protection. `fdatasync` proves faster than `fsync` or `O_SYNC`, but even `fdatasync` takes 1.6 milliseconds for a single 8kB write. The article notes that multiple small writes degrade performance, suggesting batching writes for efficiency.

Read more
Development

Microsoft's Quiet Breakup with OpenAI: An AI Power Struggle

2025-03-10
Microsoft's Quiet Breakup with OpenAI: An AI Power Struggle

Microsoft is quietly distancing itself from OpenAI, developing its own in-house reasoning model, MAI, and testing models from xAI, Meta, and DeepSeek as potential ChatGPT replacements in Copilot. Driven by concerns over ChatGPT's cost and speed, and hampered by OpenAI's reluctance to share documentation on its o1 model, Microsoft's massive investment and initial partnership seem to be dissolving into a fierce AI competition. Both companies are vying for market share, promising an exciting future for the AI landscape.

Read more
Tech

The Folly of Natural Language Programming

2025-04-03

This article critiques the notion of natural language programming. The author argues that while using natural language as a programming interface seems to simplify human-computer interaction, it drastically increases machine complexity and potentially leads to more undetectable errors. Historical experience shows that the precision and rigor of formal languages (like mathematical notation) are key to efficient information processing. The ambiguity and vagueness of natural language, conversely, would hinder the advancement of computer science. Instead of pursuing the convenience of natural language programming, the author advocates for appreciating the precision and efficiency offered by formal languages as the correct path for the advancement of computer science.

Read more
Development

Pinterest Improves Embedding-Based Retrieval for Homefeed Recommendations

2025-02-14
Pinterest Improves Embedding-Based Retrieval for Homefeed Recommendations

Pinterest's engineering team significantly improved its embedding-based retrieval system for personalized and diverse content recommendations on the Homefeed. They achieved this through advanced feature crossing techniques (MaskNet and DHEN frameworks), pre-trained ID embeddings, and a revamped serving corpus with time-decayed summation. Furthermore, they explored cutting-edge methods like multi-embedding retrieval and conditional retrieval to cater to diverse user intents, resulting in increased user engagement and saves.

Read more

YuE: Open Foundation Model for Long-Form Music Generation

2025-08-08

Researchers introduce YuE, a family of open foundation models based on LLaMA2, tackling the challenging lyrics-to-song problem in long-form music generation. YuE generates up to five minutes of music, maintaining lyrical alignment, coherent structure, and engaging melodies with accompaniment. This is achieved through track-decoupled next-token prediction, structural progressive conditioning, and a multitask, multiphase pre-training recipe. Improved in-context learning enables versatile style transfer (e.g., Japanese city pop to English rap) and bidirectional generation. Evaluations show YuE matching or exceeding proprietary systems in musicality and vocal agility. Fine-tuning adds controls and tail language support. YuE's representations also excel in music understanding tasks, achieving state-of-the-art results on the MARBLE benchmark.

Read more

Troubleshooting ZFS: From Checksum Errors to Key Re-Parenting

2025-09-07
Troubleshooting ZFS: From Checksum Errors to Key Re-Parenting

This article serves as a troubleshooting guide for ZFS, covering common issues such as checksum errors, disk failures, snapshot recovery, and encrypted dataset manipulation. It details how to use `zpool status`, `smartctl`, and `zfs scrub` to detect and repair checksum errors; `zpool offline` and `zpool replace` to replace failed disks; `zfs rollback`, `cp`, and `zfs clone` for data recovery; and `zfs change-key` to change encryption keys, including explanations of encrypted dataset replication and key re-parenting. This guide empowers users to better understand and handle common ZFS problems, ensuring data safety and system stability.

Read more
Development

The USPS's E-Mail Gamble: The Rise and Fall of E-COM

2025-05-14
The USPS's E-Mail Gamble: The Rise and Fall of E-COM

Facing the threat of email, the US Postal Service launched E-COM in 1982, a service that printed emails and delivered them via mail carriers. Initially successful, E-COM ultimately failed in 1985 due to high costs, cumbersome processes, and lack of flexibility, resulting in over $40 million in losses. However, E-COM inadvertently popularized the term "email" and highlighted the USPS's attempts to adapt to technological change.

Read more
Tech

Maximizing GPU Utilization: From Allocation to FLOP/s

2025-05-07
Maximizing GPU Utilization: From Allocation to FLOP/s

This article delves into three levels of GPU utilization: GPU Allocation Utilization, GPU Kernel Utilization, and Model FLOP/s Utilization. The authors highlight the importance of maximizing GPU utilization given their high cost and performance sensitivity. The article analyzes factors affecting utilization at each level, such as economic limitations, DevOps limitations, and host overhead, and proposes optimization strategies like using the Modal platform for improved GPU allocation efficiency, optimizing kernel code, and increasing arithmetic intensity. Finally, the article shares the current state of GPU utilization in the industry and best practices, providing valuable experience and guidance for developers.

Read more
Development

Payment Processors Weaponized: A Threat to Online Free Speech

2025-07-25
Payment Processors Weaponized: A Threat to Online Free Speech

This blog post discusses the growing threat of payment processors being used as tools for online censorship. Using the recent removal of games from Steam and itch.io due to NSFW content as a case study, the author highlights how organizations like Collective Shout leverage payment processors to enforce their ideologies. The post analyzes the motives and methods of groups such as Collective Shout and Exodus Cry, exploring potential political and technological solutions, including advocating for more open payment systems and stronger legislation to protect free speech online. The author calls for technologists, gamers, and LGBTQ+ activists to unite against this form of censorship, while cautioning against repeating the mistakes of GamerGate.

Read more
Tech

Nix: Demonstrably Secure Software Supply Chains

2025-05-12
Nix:  Demonstrably Secure Software Supply Chains

Meeting stringent software supply chain security regulations often involves costly air-gapped environments and extensive vetting. This article introduces Nix, a powerful package manager, as a solution. Nix enables verifiable supply chain integrity without sacrificing development speed. It tracks the exact origin and integrity of software, producing auditable offline source packages. A bootable NixOS image example demonstrates how Nix extracts verifiable Fixed-Output Derivations (FODs) from the dependency tree, allowing for offline rebuilds to ensure complete traceability and integrity. This transforms compliance from a roadblock into a manageable post-development verification step, significantly reducing costs and enhancing developer efficiency.

Read more
Development Verifiability

Cheap Dirt Piles Power 24/7 Solar

2025-08-25

Standard Thermal aims to make solar PV energy available 24/7/365 at a price competitive with US natural gas. Their technology stores energy as heat in inexpensive dirt piles, using co-located solar arrays. Electric heaters convert electricity to heat, stored at 600°C or higher. This low-cost thermal storage system, significantly cheaper than batteries, targets solar developers with excess summer energy, isolated users relying on expensive fuels, and eventually, repowering coal plants by generating steam on demand.

Read more

Boom Supersonic: Revolutionizing Aerospace Design with Software Engineering

2025-08-12
Boom Supersonic: Revolutionizing Aerospace Design with Software Engineering

Boom Supersonic built the world's first independently developed supersonic jet, XB-1, with a team of just 50 people and a fraction of the traditional budget. They developed mkBoom, an in-house aircraft design software, embedding software engineers within hardware teams to automate design workflows and enable rapid iteration. mkBoom allows for comprehensive aircraft performance analysis and simulates flight tests of various design options. This approach optimized the design of the Overture supersonic airliner, significantly improving the passenger experience and enabling "boomless cruise."

Read more

Pixel Watch 4: Google's 'Essential Companion' Evolves

2025-08-21
Pixel Watch 4: Google's 'Essential Companion' Evolves

Google's Pixel Watch 4 boasts significant hardware and software upgrades. The new watch features thinner bezels, a brighter display, and improved battery life. It also sports an innovative side-mounted charger and offers replaceable and repairable display and battery. Software-wise, the Pixel Watch 4 integrates Gemini AI for a more powerful voice assistant and a personalized health coach, alongside a Satellite SOS emergency call feature. In essence, the Pixel Watch 4 represents a bold step forward for Google in the smartwatch arena, striving to deliver a durable and feature-rich "essential companion."

Read more
Tech

Lenovo ThinkBook Plus Gen 6: A Review of the Rollable Laptop

2025-08-04
Lenovo ThinkBook Plus Gen 6: A Review of the Rollable Laptop

Lenovo's ThinkBook Plus Gen 6 is a $3,300 laptop with a groundbreaking rollable screen that expands from 14 inches to 16.7 inches. While pricey, its vibrant OLED display, impressive performance, and excellent battery life make it a compelling option. However, its weight, limited hinge tilt, and minor quirks like screen wobble and creaks are drawbacks. Overall, it's an innovative machine for productivity-focused users willing to pay a premium for cutting-edge tech.

Read more
Hardware

Lunar Photography Guide: From Beginner to Stunning Shots

2025-06-13
Lunar Photography Guide: From Beginner to Stunning Shots

This comprehensive guide covers everything you need to know about photographing the moon, from equipment selection to shooting techniques and post-processing. It walks you through choosing the right camera, lens, and tripod, as well as setting the correct parameters, composition tips, and post-processing techniques. Whether you're a beginner or an experienced photographer, this guide will help you capture stunning lunar images.

Read more

The End of Hand-Coding? A Developer's Perspective from Amazon to a Startup

2025-09-09

After leaving Amazon's AI coding assistant team, the author joined Icon, witnessing firsthand the AI revolution in software development. Amazon's slow processes and KPI-driven decisions hampered efficiency, unlike Icon's AI-powered approach where developers focus on design and user needs, automating much of the coding. The author predicts that pure coding skills will be less crucial, while user understanding, product strategy, and marketing will become paramount. Developers need to adapt, enhancing their skills in these areas to remain competitive in the age of AI.

Read more
Development

Mermaid.js: Diagram Creation Made Easy with Markdown

2025-05-24
Mermaid.js: Diagram Creation Made Easy with Markdown

Mermaid.js is a JavaScript-based diagramming and charting tool that uses Markdown-like text definitions to create and modify diagrams. It solves the problem of documentation falling behind development by allowing easy creation and modification of various charts including flowcharts, Gantt charts, and sequence diagrams. Even non-programmers can easily use the live editor to create complex visuals. Mermaid integrates with popular applications like GitHub and includes a sandboxed iframe for enhanced security.

Read more
Development Diagramming

Rails Security Audit Reveals Improvements, Highlights Future Work

2025-06-15

The Open Source Technology Improvement Fund (OSTIF) released a security audit of Ruby on Rails, conducted by X41 D-Sec with support from GitLab and the Sovereign Tech Agency. The four-month audit uncovered 7 security findings and provided 6 recommendations for improvement. The report highlights the maturation of Rails' security over recent years while also outlining areas for future enhancement. OSTIF also celebrated its 10th anniversary and invited participation in upcoming meetups.

Read more
Development
1 2 236 237 238 240 242 243 244 596 597