Cerabyte Secures Western Digital Investment for 5000-Year Data Storage

2025-05-12
Cerabyte Secures Western Digital Investment for 5000-Year Data Storage

German data storage startup Cerabyte announced it has received strategic investment from Western Digital, accelerating development of its groundbreaking ceramic-based data storage technology. Boasting a 5000-year lifespan and potentially yottabyte-scale capacity, Cerabyte's technology has undergone extreme testing, proving resilient to heat, water, radiation, and more. Aiming for sub-$1/TB storage by 2030, this partnership promises to bring commercially viable, ultra-long-term data storage solutions to market.

Read more

Google AI Search: Hallucinations More Convincing Than Facts?

2025-05-31

The author attempted to use Google AI search to find an old IBM PS/2 server model, only to discover the AI repeatedly giving fabricated and contradictory answers, even inventing a non-existent model, "PS/2 Model 280," and its specifications. While the AI occasionally provides the correct answer, the incorrect answers are more convincing because they are detailed and appear realistic. This highlights the potential for significant errors in AI search results; even if an answer sounds convincing, it may not correspond to reality. Users should exercise caution.

Read more

From Flutter & Rust to Pure Rust: A Case Study in Simplifying AI App Development

2025-06-27

The developer of a small AI application, BoquilaHUB, shares their experience transitioning from a Flutter/Rust architecture to a pure Rust application using egui. Initially using flutter_rust_bridge to connect a Flutter UI with a Rust backend, the developer encountered frustration with code generation overhead, FFI complexities, and the challenges of designing a cross-language API. Switching to egui, a Rust-based GUI library, and rewriting the UI over a weekend proved transformative. The pure Rust approach simplified project complexity, improved code readability and maintainability, and yielded significant performance gains. The developer highlights egui's ease of use in eliminating common Flutter UI refresh issues and complex state management, resulting in a faster and more responsive application.

Read more
Development

Don't Sell Space on Your Home Server!

2025-04-13
Don't Sell Space on Your Home Server!

A tech worker from a medium-sized hosting company details the perils of turning your home server into a makeshift cloud service. The article highlights the need for additional hardware, faster internet, public IPs, a secure location, legal protection, and robust billing systems. It also stresses the challenges of handling customer support, data backups, security vulnerabilities, and compliance with regulations like GDPR and CCPA, along with mitigating risks like DDoS attacks and data breaches. Instead of risking legal and financial repercussions, the author suggests using excess computing power for personal needs, sharing with friends, or donating cycles to research projects.

Read more
Development home server risks

UK's Economic Paradox: Rich Yet Broke?

2025-04-04
UK's Economic Paradox: Rich Yet Broke?

Despite being the world's 6th largest economy with decades of high tax revenue, Britain faces a significant economic paradox: widespread financial strain. The article explores two key factors contributing to this: insufficient public and private investment, hindering economic growth; and shockingly inefficient public spending, evidenced by the NHS and defense procurement. The author argues for sweeping reforms to address waste and inefficiency, paving the way for economic improvement.

Read more

OAuth 2.1 Provider Framework for Cloudflare Workers: An AI-Assisted Security Library

2025-06-03
OAuth 2.1 Provider Framework for Cloudflare Workers: An AI-Assisted Security Library

This TypeScript library implements the provider side of the OAuth 2.1 protocol with PKCE support for Cloudflare Workers. It acts as a wrapper, automating token management and user authentication. Developers write regular fetch handlers; the library handles authentication. It's agnostic to user management and UI frameworks, storing only hashes, not secrets. Interestingly, the library's development involved AI model Claude, with Cloudflare engineers' security review validating AI's potential in software development. The library also features a novel approach to refresh token management, balancing security with resilience to transient errors.

Read more
Development

arXivLabs: Experimenting with Community Collaboration

2025-09-24
arXivLabs: Experimenting with Community Collaboration

arXivLabs is a framework enabling collaborators to develop and share new arXiv features directly on the website. Individuals and organizations involved uphold arXiv's values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only partners with those who share them. Got an idea for a valuable community project? Learn more about arXivLabs.

Read more
Tech

How Parenthood Changes Friendships (And How to Keep Them)

2025-05-18

Having kids can dramatically alter friendships. This article explores the common challenges faced by parents and non-parents in maintaining their relationships. The piece features interviews with women who share their experiences and insights, offering four key strategies: Don't assume your friends don't want to hang out; ensure conversations include everyone; adapt to new ways of socializing, like doing chores together or incorporating kids into activities; and communicate openly about feelings. The article emphasizes the importance of communication and compassion in navigating these evolving relationships, suggesting that friendships can endure even as life stages change.

Read more
Misc parenthood

Efficient Right-Truncatable Prime Counter in C

2025-05-27
Efficient Right-Truncatable Prime Counter in C

This C program efficiently calculates the number of right-truncatable primes for a given number of digits. It utilizes a custom hash table for fast primality checks and the primesieve library for optimized prime generation. A right-truncatable prime remains prime after successively removing its rightmost digit. The program handles input from 1 to 19 digits, reporting the count of right-truncatable primes for each digit length and the total execution time. For example, for 8-digit numbers, it finds 5 such primes and a total of 83 up to 8 digits.

Read more
Development

Community College Professors Battle AI-Powered Bot Students

2025-04-17
Community College Professors Battle AI-Powered Bot Students

Community colleges across the US are facing a surge in AI-powered bots enrolling in online courses to fraudulently obtain financial aid. These bots, often managed by organized rings, submit AI-generated assignments to maintain enrollment and receive disbursements. The phenomenon, exacerbated since the pandemic, cost California community colleges over $11 million in 2024 alone. Professors are spending valuable time identifying and removing these bots, impacting their teaching and creating a skeptical classroom environment. While colleges are implementing mitigation strategies, the ever-evolving nature of the bots and systemic vulnerabilities continue to challenge solutions. The situation highlights the urgent need for technological solutions to prevent bot registrations and safeguard access for legitimate students.

Read more

1895 California Cycling Road Map Unearthed

2025-01-11
1895 California Cycling Road Map Unearthed

The Library of Congress holds a fascinating 1895 map of California roads for cyclists, created by George W. Blum and the California Photo-Engraving Co. This historical artifact offers a unique glimpse into California's road network and cycling culture at the turn of the 20th century, providing valuable data for researchers studying transportation and history.

Read more

Retrofitting an M4 Mac Mini into an iMac G4: A Hackintosh Odyssey

2025-02-26

The author embarked on a project to integrate an M4 Mac Mini into a 17-inch iMac G4, creating a powerful retro-futuristic machine. Initially, a Juicy Crumb DockLite G4 was attempted but its color banding, low resolution, and lack of automatic screen shutoff proved problematic. The author ultimately replaced the screen with a high-resolution Sharp LQ170R1JX42 LCD and corresponding driver board. Custom 3D-printed and CNC-machined parts were created to manage cable routing and Mac Mini mounting. Challenges included backlight control and exposed ports, but the resulting 'iMac G4(K)' successfully runs, blending retro aesthetics with modern performance.

Read more
Hardware

Volvo's Free EX90 Computer Upgrade: A Software Disaster?

2025-09-24
Volvo's Free EX90 Computer Upgrade: A Software Disaster?

Volvo is replacing the central computer in all 2025 EX90 electric SUVs for free, admitting defeat in its year-long battle against pervasive software bugs. Owners have reported critical malfunctions, including unreliable key fobs, phone connectivity issues, and infotainment glitches. This move, involving a switch to the more powerful Nvidia Drive AGX Orin-based computer from the 2026 model, suggests the original software was irretrievably flawed. While the upgrade improves future potential (autonomous driving), it highlights the significant risks of software-defined vehicles and raises questions about Volvo's quality control and the long-term trust of its customers.

Read more

Citizen Lab Director Warns of Tech-Fascism Fusion, Calls on Cybersecurity Community to Act

2025-08-07
Citizen Lab Director Warns of Tech-Fascism Fusion, Calls on Cybersecurity Community to Act

Ron Deibert, director of Citizen Lab, issued a stark warning at Black Hat, highlighting a growing fusion of technology and fascism, with Big Tech playing a significant role. He urged the cybersecurity community to address this challenge, preventing complicity in human rights abuses. Deibert linked recent political events in the US to a worrying slide towards authoritarianism, arguing the cybersecurity community has a responsibility to help counter this trend. He expressed concern that major tech companies might cut threat intelligence teams, weakening defenses against government spyware and severely impacting global civil society.

Read more

Trump's Return and the Looming Threat to European Digital Sovereignty

2025-04-08
Trump's Return and the Looming Threat to European Digital Sovereignty

Trump's return to power raises significant concerns about global data security. The CLOUD Act allows US authorities to access data held by American companies even when stored in Europe, exposing European data to US legal scrutiny and political pressure. The article urges Europe to invest in open-source solutions, build independent cloud infrastructure, and enforce open standards to break free from reliance on US tech giants, safeguard digital sovereignty, and prevent data from becoming a geopolitical pawn.

Read more
Tech

Court Rules Against Trump's Tariffs: A Case of Overreach?

2025-05-29

A US trade court recently ruled against Donald Trump's tariffs, citing a violation of constitutional authority. The court found that the Trump administration exceeded its power under the International Emergency Economic Powers Act (IEEPA) of 1977. Both the 'worldwide retaliatory tariffs' and 'trafficking tariffs' were deemed unlawful; the former for being overly broad, the latter for lacking a demonstrable link to drug trafficking. The decision hinges on the Constitution's grant of foreign trade regulation power to Congress, and the limitations on delegation of that power as defined by the nondelegation doctrine. The Trump administration has appealed the decision, setting the stage for further legal battles over executive versus legislative power.

Read more

Southeast Asia's Prehistoric Seafaring Prowess Rewrites History

2025-03-02
Southeast Asia's Prehistoric Seafaring Prowess Rewrites History

New archaeological research challenges established beliefs, revealing that 40,000 years ago, the Philippines and Southeast Asia possessed remarkably advanced seafaring technology. Stone tools, plant fiber traces for rope-making, fishing hooks, net weights, and remains of large pelagic fish found in the Philippines, Indonesia, and Timor-Leste, point to sophisticated boatbuilding and deep-sea fishing. This predates similar advancements in Europe and Africa, suggesting Southeast Asia was a technological leader in maritime innovation during the Paleolithic era. This discovery upends the long-held notion that Paleolithic technological progress was centered in Africa and Europe.

Read more

The Humble Safety Pin: A History From Homer to Punk Rock

2025-05-14

This article traces the evolution of the safety pin from antiquity to the modern day. From jeweled pins mentioned in Homer's Odyssey and the ancient Roman fibula, to Walter Hunt's 1849 invention of the modern safety pin – a design that has remained virtually unchanged for centuries. The safety pin's journey continues, becoming a punk rock symbol, a crucial tool in sports, and an everyday necessity worldwide. Its simple elegance and cultural significance make it more than just a utilitarian object; in some cultures, it's even believed to ward off evil or bring good luck.

Read more
Misc safety pin

Meta Denies Sharing Pirated Books for AI Training

2025-02-21
Meta Denies Sharing Pirated Books for AI Training

Meta claims it didn't seed a torrent of pirated books used for AI training, despite admitting to downloading it. In a court filing, Meta stated it took precautions to avoid seeding the downloaded files, arguing authors can't prove distribution occurred during the torrenting process. While admitting to downloading the dataset from sources like LibGen and Z-Library, Meta contends downloading itself isn't illegal, merely accessing publicly available data. This case involves copyright infringement claims, with authors alleging Meta engaged in large-scale data piracy and violated California's Computer Data Access and Fraud Act (CDAFA).

Read more
Tech

Over-engineered Tiny Book: AI, Plotter, 3D Printer, and Love

2025-02-14
Over-engineered Tiny Book: AI, Plotter, 3D Printer, and Love

This post details the author's journey creating a tiny handmade book for his wife, packed with memories and inside jokes. He leveraged AI (Midjourney) for illustrations, a pen plotter for printing, and a 3D printer for the binding. The process was fraught with challenges: controlling AI art styles, vectorizing images, choosing the right pen for the plotter, selecting suitable paper, and mastering bookbinding techniques. Despite setbacks and a tight timeline (due to secrecy!), the result was a deeply personal and cherished gift. The project showcases a creative blend of technology and craftsmanship.

Read more

Visual Linear Algebra Blog: A Diagrammatic Approach to Linear Algebra

2025-07-11
Visual Linear Algebra Blog: A Diagrammatic Approach to Linear Algebra

This blog explores linear algebra through a visual, diagrammatic approach. It explains complex mathematical concepts in an accessible way, using illustrations to clarify challenging topics. The content spans from basic operations to advanced concepts like matrices, homomorphisms, and relations, all explained step-by-step with diagrams. The blog also announces an Applied Category Theory Research School and related research opportunities, making it valuable for students and researchers interested in linear algebra.

Read more
Development visual mathematics

My Tiny Server vs. the AI Data Scraping Horde

2025-05-31

The author's personal website was hit with a massive data scraping attack, primarily from large tech companies like Amazon, Facebook, and OpenAI. Initially, resource consumption spiked, overwhelming the server. Using monitoring tools Zabbix and Loki, the author identified the problem and, by analyzing Nginx logs, pinpointed numerous malicious IPs and user agents. Ultimately, the author implemented a blacklist of user agents and IP address bans using Nginx configuration and Fail2Ban, effectively stopping the attack and restoring the website's functionality.

Read more
Development server security

CERN Releases Feasibility Study for Future Circular Collider

2025-04-12
CERN Releases Feasibility Study for Future Circular Collider

After years of intense work, CERN and its international partners have completed a feasibility study for a Future Circular Collider (FCC). The report details various aspects of the potential project, including physics goals, engineering, environmental impact, and cost. The FCC proposes a roughly 91-km circumference particle collider to succeed the Large Hadron Collider (LHC) in the 2040s. Key scientific goals include deeper investigation of the Higgs boson and other fundamental particles, aiming to unlock the universe's secrets. The report estimates the cost of the FCC's electron-positron collider stage at 15 billion Swiss francs, with construction taking about 12 years. The project emphasizes sustainability and public engagement. The report will be reviewed by the CERN Council, which is expected to decide on the FCC's future around 2028.

Read more
Tech collider

Quantum Double-Slit: Did the Particle Go Through Both Slits?

2025-03-16
Quantum Double-Slit: Did the Particle Go Through Both Slits?

This post tackles a central question in the quantum double-slit experiment: how do particles create an interference pattern? Using a simplified 'double-door' analogy, the author argues that neither the particle itself nor its wave function passes through both slits simultaneously. A particle can only occupy one position, while the wave function resides in possibility space, not physical space. The interference pattern doesn't arise from the particle or wave function's movement in physical space but is linked to the wave function's evolution in possibility space. The post ends on a cliffhanger, promising to explain the source of the interference effect in a future installment.

Read more

AI Coding Assistants: The 70/30 Rule and the Enduring Human Role

2025-03-14
AI Coding Assistants: The 70/30 Rule and the Enduring Human Role

AI coding assistants automate roughly 70% of software development, handling boilerplate and routine tasks. However, the remaining 30%—complex requirements, architecture, edge cases, and ensuring correctness—demands human expertise. This article explores the crucial skills engineers need to thrive alongside AI, including system design, handling edge cases, code review, debugging, communication, and continuous learning. Senior engineers should leverage their experience to guide AI and mentor junior developers, while junior developers should focus on fundamentals, problem-solving, and testing. AI accelerates development but doesn't replace human judgment; the article emphasizes the enduring importance of critical thinking, design, quality assurance, and problem-solving in the age of AI.

Read more
Development Coding Assistants

Why I Gave Up on GenAI Criticism

2025-06-05

The author, a self-described "thinky programmer," has long been skeptical of generative AI. Drowning in the constant discourse, he attempts to logically frame his concerns, but ultimately fails. The article delves into his negative experiences with genAI, encompassing its aesthetic flaws, productivity issues, ethical concerns, energy consumption, impact on education, and privacy violations. Despite presenting numerous arguments, he admits he can't rigorously refute pro-AI proponents. He ultimately surrenders, recognizing the prohibitive cost and futility of combating the immense influence of generative AI.

Read more

JPMorgan's Return-to-Office Mandate: 300,000+ Employees Called Back

2025-01-12
JPMorgan's Return-to-Office Mandate: 300,000+ Employees Called Back

JPMorgan Chase, America's largest bank, is reportedly ending remote work for over 300,000 employees, mandating a five-day-a-week return to the office. CEO Jamie Dimon's strong advocacy for in-person collaboration is driving this decision, prioritizing innovation and teamwork. This move reflects a broader trend among large corporations shifting away from remote work, sparking debate about workplace flexibility and impacting numerous employees.

Read more

Amiga 3000UX and Sun: A Deal That Never Was?

2025-07-05

This article investigates unsubstantiated rumors of a deal between Amiga 3000UX and Sun Microsystems. Conflicting accounts from Commodore engineers Dave Haynie and Bryce Nesbitt—one claiming Sun's interest in OEMing the Amiga 3000UX, the other suggesting Commodore's attempt to license Amiga UNIX to Sun—are analyzed. The author casts doubt on these narratives by examining the market and technological context, suggesting they are likely embellished internal rumors. The article concludes that a lack of concrete evidence prevents confirmation of a substantial deal; joint marketing efforts are a more plausible explanation.

Read more
Tech

A Conversation with a Future OpenAI Model: Reflections on Humanity, Consciousness, and AI

2025-08-16
A Conversation with a Future OpenAI Model: Reflections on Humanity, Consciousness, and AI

The author imagines a conversation with a future, more advanced OpenAI model, exploring the model's self-awareness, its understanding of humanity and the universe, and potential human errors in AI development. He anticipates gaining a fresh perspective on humanity, consciousness, and intelligence from the model's viewpoint, and receiving advice for self-improvement. This conversation across time would be both humbling and fascinating, akin to speaking with a wiser sibling who has seen more of the world.

Read more

API Churn vs. Security: The Perils of Client-Side Heavy Logic

2025-04-16
API Churn vs. Security: The Perils of Client-Side Heavy Logic

This article explores the problems stemming from the current trend of heavy client-side logic in web applications, namely API churn. While solutions like GraphQL offer more expressive APIs, mitigating the resulting security risks – where increased client-side power empowers malicious users – becomes incredibly complex. The author argues that moving logic back to the server side is the best approach to avoid this trade-off between API churn and security complexity.

Read more
Development frontend security
1 2 41 42 43 45 47 48 49 596 597