Phantom Time: When Centuries Vanish

2025-02-03

From questioning Shakespeare's authorship to doubting the existence of entire historical periods, conspiracy theories about history abound. 17th-century French priest Jean Hardouin took this to an extreme, claiming nearly all books before 1300 AD were forgeries, including the Gospels and most Greco-Roman literature. This sparked ongoing debates about historical truth, with some scholars even proposing entire centuries, such as 614-911 AD, were fabricated. The article explores the roots of these 'phantom time' theories and their potential dangers to historical research and societal understanding.

Read more

Groundbreaking Discovery: First Organometallic Molecule Containing Berkelium Synthesized

2025-03-27
Groundbreaking Discovery: First Organometallic Molecule Containing Berkelium Synthesized

A team at the Department of Energy’s Lawrence Berkeley National Laboratory has successfully synthesized "berkelocene," the first characterized organometallic molecule containing the heavy element berkelium. This breakthrough challenges long-held theories about the chemistry of elements following uranium in the periodic table. The synthesis was incredibly challenging due to berkelium's high radioactivity and air sensitivity. The researchers overcame these hurdles using specialized equipment and a mere 0.3 milligrams of berkelium-249. This discovery provides new insights into the chemical behavior of berkelium and other actinides, opening doors for future research.

Read more

Escaping AWS: How a Danish Firm Slashed Cloud Costs by 90% While Maintaining ISO 27001

2025-06-21
Escaping AWS: How a Danish Firm Slashed Cloud Costs by 90% While Maintaining ISO 27001

A Danish workforce management company successfully migrated away from AWS, reducing its cloud costs by 90%. Facing compliance concerns and high expenses with US cloud providers, they switched to European providers like Hetzner and OVHcloud. By leveraging infrastructure-as-code with Ansible, Prometheus/Grafana/Loki for monitoring, and a security-by-design approach, they not only cut costs but also enhanced data sovereignty and security compliance. They also used their European hosting as a sales tool, strengthening brand trust.

Read more
Tech

LegoGPT: Building Stable LEGO Models from Text Prompts

2025-05-09

Researchers have developed LegoGPT, an AI model that generates physically stable LEGO brick models from text prompts. Trained on a massive dataset of over 47,000 LEGO structures encompassing over 28,000 unique 3D objects and detailed captions, LegoGPT predicts the next brick to add using next-token prediction. To ensure stability, it incorporates an efficient validity check and physics-aware rollback during inference. Experiments show LegoGPT produces stable, diverse, and aesthetically pleasing LEGO designs closely aligned with the input text. A text-based texturing method generates colored and textured designs. The models can be assembled manually or by robotic arms. The dataset, code, and models are publicly released.

Read more

US Sanctions Funnull, a CDN Powering Pig Butchering Scams

2025-05-30

The US Treasury Department sanctioned Funnull Technology Inc., a Philippines-based company providing infrastructure for hundreds of thousands of websites involved in “pig butchering” cryptocurrency scams. These scams lure victims into fraudulent investment platforms, resulting in over $200 million in US losses. Funnull routed traffic through US cloud providers, masking its criminal activity. The sanctions highlight the ongoing fight against transnational cybercrime and the challenges in combating sophisticated scams. The article also mentions EU sanctions against Stark Industries Solutions, another company facilitating Russian cyberattacks, underscoring the global nature of this problem.

Read more
Tech

Will This Linux Server Security Guide Protect You From Hackers?

2025-08-01
Will This Linux Server Security Guide Protect You From Hackers?

This comprehensive guide details how to secure your Linux server against malicious attacks. It covers everything from choosing a secure Linux distribution to configuring firewalls and intrusion detection/prevention systems (like Fail2Ban and CrowdSec), and provides Ansible playbooks to automate many security steps. The guide also touches on advanced topics like using SSH keys, two-factor authentication, and kernel sysctl hardening, while cautioning readers about the risks involved in these steps. It's a living document intended to be a comprehensive resource for Linux server security.

Read more
Development Server Security

Vortex M: A Modern Remix of the Iconic Model M Keyboard

2025-08-04
Vortex M: A Modern Remix of the Iconic Model M Keyboard

The Vortex M keyboard pays homage to the legendary IBM Model M, boasting a retro aesthetic with PBT double-shot keycaps and a textured plastic case, replicating the classic 1980s design. However, under the hood lies a modern mechanical keyboard: customizable Cherry MX switches, hot-swappable sockets, Bluetooth/2.4GHz/USB-C connectivity, and multi-device support. It blends retro aesthetics with modern functionality, offering a comfortable and relatively quiet typing experience, all at a competitive price. A great option for those seeking a retro look with modern performance.

Read more
Hardware modern

Blast from the Past: A Catalog of 80s BASIC Games

2025-04-22
Blast from the Past: A Catalog of 80s BASIC Games

This article presents a fascinating list of BASIC games from the 1980s, spanning various computer systems like BASIC-PLUS, EduSystem, DECsystem 10, and HP. From simple number guessing games (Acey-Ducey, Bagles) to complex strategy games (Gomoko, Civil War) and simulations (HMRABI, KING), the variety showcases the creativity and ingenuity of programming during that era. These games, simple yet engaging, are sure to evoke nostalgia in many.

Read more

High-Performance Dynamic Dispatch with GLIBC hwcaps

2025-07-16

This article demonstrates how to leverage GLIBC 2.33+ hwcaps for simple dynamic dispatch in amd64 and POWER shared libraries. By creating library files for different CPU instruction sets (e.g., x86-64-v4, x86-64-v3, etc.) under `/usr/lib/glibc-hwcaps/`, the dynamic linker automatically loads the corresponding library based on the highest instruction set supported by the CPU, optimizing performance. This solves the challenge of maintaining consistent library performance across different CPU architectures, as demonstrated in the Debian packaging of the ggml library used by llama.cpp and whisper.cpp.

Read more
Development dynamic dispatch

pipask: Secure Python Package Installation

2025-05-03
pipask: Secure Python Package Installation

pipask is a safer alternative to pip, adding security checks before installing Python packages. It prioritizes using PyPI metadata, avoiding downloading and executing code whenever possible. If third-party code execution is necessary, pipask asks for user consent. After performing checks, including repository popularity, package age, known vulnerabilities, PyPI download counts, and metadata verification, it presents a formatted report and requests approval. Upon approval, it hands off installation to standard pip.

Read more
Development

Comet: The Curiosity-Powered Browser That Reimagines the Web

2025-07-12
Comet: The Curiosity-Powered Browser That Reimagines the Web

Comet is a revolutionary browser designed to fuel curiosity. It consolidates all your tabs and tasks into a streamlined workspace, empowering you to explore the web like never before. More than just a browser, Comet acts as a thinking partner, connecting ideas, boosting productivity, and turning wonder into action. It learns your thinking style, collaborates on research, and keeps your digital life organized, ensuring you stay focused and never lose track of your work. Comet allows you to quickly understand any webpage, in any language, anytime, maximizing the potential of your curiosity.

Read more
Tech

Elon Musk's Former Friend Calls Him a 'Miserable Self-Loathing Poser'

2025-01-29
Elon Musk's Former Friend Calls Him a 'Miserable Self-Loathing Poser'

Philip Low, a neuroscientist and former collaborator of Elon Musk, penned a scathing open letter accusing Musk of calculated political maneuvering and personal vendettas. Low alleges Musk's two Nazi salutes at Trump's inauguration were intentional power plays, fueled by a desire to control the far-right and potentially stemming from jealousy over his ex-wife's interactions with Low. The letter details a fractured relationship, claims of Musk attempting to manipulate NeuroVigil's stock (Low's company), and suggests Musk's creation of Neuralink was partly motivated by competition with NeuroVigil. Musk has yet to publicly respond to these serious accusations.

Read more
Tech

Kindle Comic Converter: Optimize Comics for eInk Readers

2025-05-07
Kindle Comic Converter: Optimize Comics for eInk Readers

Kindle Comic Converter (KCC) is a powerful tool for optimizing comics and manga for eInk readers like Kindle, Kobo, and Remarkable. It removes margins, supports fixed layouts, and employs various image processing steps to ensure optimal viewing on eInk screens. KCC supports multiple input (folders/CBZ/CBR/PDF, etc.) and output (MOBI/AZW3/EPUB/KEPUB/CBZ, etc.) formats and optimizes file size based on device resolution for improved performance on less powerful ereaders. The software offers a range of options and customization for both casual and advanced users.

Read more
Development comics

AppGoblin Uncovers Mystery Ad Domains: A Deep Dive into Mobile Game Advertising

2025-08-28

AppGoblin analyzed over 40,000 apps, tracking millions of API calls and thousands of advertising domains. Many domains lacked landing pages, leaving their owners a mystery. Through IP address analysis, API keys, and SDKs, AppGoblin identified the companies behind these domains, including Bigo Ads, BidMachine, and Unity. `lazybumblebee.com` likely belongs to BidMachine for app mediation; `news-cdn.site`, `kickoffo.site`, `onegg.site`, and `acobt.tech` are linked to Bigo Ads. This research sheds light on the complex domain network and data tracking mechanisms in the mobile game advertising ecosystem.

Read more

PIN AI: Your Personal AI, Under Your Control

2025-02-15
PIN AI: Your Personal AI, Under Your Control

PIN AI is a decentralized personal AI app that runs directly on your smartphone, challenging big tech's dominance over user data. Unlike cloud-based AI, PIN AI keeps your AI model on your device, ensuring privacy and customization. You own your data and control how your AI learns. Boasting over 2 million alpha users and backed by investors like a16z Crypto, PIN AI aims to create a user-centric AI ecosystem, empowering individuals to own and control their AI assistants, much like Iron Man's J.A.R.V.I.S.

Read more

Static Site Generators: Time Travel for Your Website

2025-09-02
Static Site Generators: Time Travel for Your Website

While revisiting old blog posts, the author discovered the power of using a static site generator (Eleventy) with Git for effortless time travel through their website's history. Eleventy's approach of fetching posts from a CMS and including them in each commit creates a full snapshot of the website at every commit. This contrasts with websites using databases (like WordPress), which make accessing past versions more difficult. While the author previously implemented a GitHub Action to take monthly screenshots, the combination of Eleventy and Git makes this less crucial.

Read more
Development

UnitedHealth Buried Change Healthcare's Data Breach Notice for Months

2025-01-15
UnitedHealth Buried Change Healthcare's Data Breach Notice for Months

Change Healthcare, a UnitedHealth-owned health tech company, suffered a ransomware attack last year exposing the sensitive health data of over 100 million individuals. The company delayed notifying affected individuals for months and, shockingly, used “noindex” code to hide the data breach notice from search engines. This secrecy has drawn criticism and prompted investigations and lawsuits from several states. The incident highlights Change Healthcare's significant security flaws and the lack of transparency and slow response from large healthcare organizations in dealing with data breaches.

Read more

Async: AI-Powered Collaborative Coding Workflow

2025-08-27
Async: AI-Powered Collaborative Coding Workflow

Async is an open-source developer tool that combines AI coding, task management, and code review into one streamlined workflow. Integrating Claude Code, Linear, and GitHub PRs, it automatically researches coding tasks, executes code changes in the cloud, and breaks work into reviewable subtasks, handling the entire workflow from GitHub issue to merged PR. Async excels with mature codebases, enforcing upfront planning, eliminating context switching, simplifying task tracking, and providing built-in code review. Built with FastAPI, Claude Code, and Google Cloud Platform, it supports desktop and mobile.

Read more
Development

SGS-1: A Groundbreaking AI Model for Generating Manufacturable 3D CAD Geometry

2025-09-21
SGS-1: A Groundbreaking AI Model for Generating Manufacturable 3D CAD Geometry

Introducing SGS-1, a revolutionary AI model capable of generating fully manufacturable and parametric 3D geometry from images or 3D meshes. Unlike previous generative models, SGS-1 outputs accurate CAD models (STEP format) easily editable in traditional CAD software. It excels at handling medium to high complexity parametric geometries, even designing engineering parts like brackets for roller assemblies based on partial context and text descriptions. Benchmarked against state-of-the-art models, SGS-1 demonstrates superior performance in generating usable and accurate 3D models, promising a transformative impact on engineering design.

Read more
AI

4x 4090 GPUs: Training Your Own LLMs Locally

2024-12-28
4x 4090 GPUs: Training Your Own LLMs Locally

An AI enthusiast built a local rig for training Large Language Models (LLMs) using four NVIDIA 4090 GPUs, costing around $12,000. This setup can train models up to 1 billion parameters, though it performs optimally with around 500 million. The article details the hardware selection (motherboard, CPU, RAM, GPUs, storage, PSU, case, cooling), assembly process, software configuration (OS, drivers, frameworks, custom kernel), model training, optimization, and maintenance. Tips include using George Hotz's kernel patch for P2P communication on 4xxx GPUs. While highlighting the benefits of on-premise training, the author acknowledges the cost-effectiveness of cloud solutions for some tasks.

Read more

The Untold Story of the Mac OS X Dock

2025-01-14
The Untold Story of the Mac OS X Dock

On January 5th, 2000, Steve Jobs unveiled Mac OS X's Aqua interface, prominently featuring the Dock. This article recounts the story behind its creation. James Thomson, a programmer, reveals how he translated designer Bas Ording's Macromind Director prototypes into functional code. Thomson's prior work on a similar application, DragThing, landed him the Apple job. He recounts being secretly recruited in Ireland for project 'Überbar' (the Dock), ultimately 'killing off' his own DragThing. This inside look reveals details of Mac OS X's early development and the power of individual contributions in technological progress.

Read more
Development

Non-Cryptographic Hash Functions: Design and Evaluation

2025-02-15

This article delves into the design and evaluation of non-cryptographic hash functions. By analyzing the performance of common functions like FNV-1a, FNV-1, Murmur2, and DJBX33A on diverse datasets (including names, words, IP addresses, and a deliberately biased dataset), the authors reveal key characteristics such as uniformity, collision rate, and avalanche effect. Experiments show Murmur2 excels in the avalanche effect but isn't always optimal for uniformity. The article stresses the importance of dataset characteristics in choosing appropriate hash functions and questions existing evaluation criteria, arguing that a single metric (like the avalanche effect) is insufficient for comprehensively assessing non-cryptographic hash function performance.

Read more
Development hash functions

Polymarket's Jesus Return Market: A Time Value of Money Play?

2025-05-29
Polymarket's Jesus Return Market: A Time Value of Money Play?

A Polymarket prediction market on whether Jesus Christ will return in 2025 has traders wagering over $100,000. The 'yes' option currently sits at 3%, defying simple explanations like religious belief or market error. The author posits a more sophisticated strategy: bettors anticipate that later in the year, with other markets (e.g., US elections, papal succession) heating up, those betting 'no' will need cash for new bets and sell their positions at a premium, yielding profits for 'yes' bettors. This highlights the time value of money in financial markets, a strategy successfully employed in past elections. The market's existence itself reflects the differing expectations of Polymarket cash's future value.

Read more

Austria to Monitor Encrypted Messaging to Thwart Terror Attacks

2025-06-18
Austria to Monitor Encrypted Messaging to Thwart Terror Attacks

Austria's government approved a plan allowing police to monitor suspects' encrypted messaging, addressing a critical security gap. Previously reliant on allies for intelligence, Austria will now have a legal framework for monitoring services like WhatsApp. The system requires approval from a three-judge panel and is projected to monitor only 25-30 individuals annually. This measure aims to enhance national security and is slated for implementation in 2027.

Read more

arXivLabs: Community Collaboration on New arXiv Features

2025-06-29
arXivLabs: Community Collaboration on New arXiv Features

arXivLabs is an experimental framework enabling collaborators to develop and share new arXiv features directly on the arXiv website. Individuals and organizations involved share arXiv's values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners who adhere to them. Got an idea for a project that will benefit the arXiv community? Learn more about arXivLabs!

Read more
Development

The Rise and Fall of the Sharp X68000: A Japanese Home Computer Legend

2025-05-27
The Rise and Fall of the Sharp X68000: A Japanese Home Computer Legend

The Sharp X68000, released in 1987, was a highly capable home computer popular in Japan, renowned for its advanced graphics and sound capabilities. Powered by a Motorola 68000 CPU and featuring custom coprocessors for superior graphics, it became a favorite among gamers. However, its limited market reach and lack of international presence ultimately led to its decline in the 1990s, leaving it a nostalgic relic for many.

Read more

Rust Async Programming: Mastering Pin and Pin-Project

2025-05-22

This article delves into the intricacies of using Pin and the pin-project crate in Rust's async programming paradigm. Starting with associated types and type inference in Futures, the author builds up to the necessity of Pin to address memory safety issues arising from mutable borrows and moves within the state machine implementation of async functions. The article thoroughly explains Pin's function, usage, and how pin-project simplifies code, ultimately resulting in a safe and robust asynchronous state machine. It also highlights subtle considerations when employing pin-project.

Read more
Development

Stone-Wales Transformations: Topological Twists in Fullerene and Graphene

2025-07-12
Stone-Wales Transformations: Topological Twists in Fullerene and Graphene

This post explores the Stone-Wales transformation, a 90° rotation of a π bond between carbon atoms, in both fullerene and graphene. This simple topological transformation, akin to Pachner moves, changes two hexagons and two pentagons into two pentagons and two hexagons in fullerene, and four hexagons into two pentagons and two heptagons in graphene. The post also discusses the Arrhenius equation and its application in predicting the rate of Stone-Wales transformations, highlighting the need for a more complete theory to describe the random occurrence of such topological transformations.

Read more

Intel Xe3 Architecture Deep Dive: Significant Improvements Target High-End Market

2025-03-19
Intel Xe3 Architecture Deep Dive:  Significant Improvements Target High-End Market

Details of Intel's Xe3 GPU architecture have emerged, with software development visible across several open-source repositories. Xe3 boasts a potential maximum of 256 Xe Cores, significantly more than its predecessor, supporting up to 32,768 FP32 lanes. Improvements include 10 concurrent threads per XVE, flexible register allocation, increased scoreboard tokens, and a new gather-send instruction. Additionally, Xe3 introduces Sub-Triangle Opacity Culling (STOC), which subdivides triangles to reduce wasted shader work, enhancing ray tracing performance. These advancements bring Intel's architecture closer to AMD and Nvidia's in terms of performance and efficiency, signaling Intel's ambition in the high-end GPU market.

Read more
Hardware GPU Architecture
1 2 237 238 239 241 243 244 245 596 597