Humanoid Robot Steals the Show at Shanghai Fashion Week

2025-03-30
Humanoid Robot Steals the Show at Shanghai Fashion Week

Unitree Robotics' humanoid robot, Unitree G1, made a stunning debut at Shanghai Fashion Week, walking the runway alongside human models. The 127cm tall, 35kg robot, boasting 23-43 joint motors, showcased impressive flexibility and seamless interaction. The show wasn't just about the G1; Unitree's quadruped robot also appeared, adding an unexpected twist by standing on two legs and 'walking hand-in-hand' with the G1. This innovative collaboration between technology and fashion redefines artistic expression and hints at a future where intelligent machines play a significant role in creative storytelling.

Read more

Clay: A Robust UI Layout Library

2024-12-19

Clay is a lightweight UI layout library for building responsive and accessible user interfaces. Its clean and intuitive API allows developers to easily create complex layouts while maintaining code maintainability and readability. Clay prioritizes performance and accessibility, ensuring fast loading times and user-friendliness through streamlined code and a well-architected design. Whether building simple page layouts or complex interactive applications, Clay empowers developers to build high-quality UIs efficiently.

Read more

AMD MI300X vs. Nvidia H100/H200 Benchmark: CUDA Moat Remains

2024-12-22
AMD MI300X vs. Nvidia H100/H200 Benchmark: CUDA Moat Remains

SemiAnalysis conducted a five-month independent benchmark of AMD's MI300X against Nvidia's H100 and H200. While the MI300X boasts theoretical advantages in performance and TCO, real-world results fell significantly short due to flaws in AMD's public software stack and insufficient testing. AMD's software proved problematic, hindering usability and resulting in performance trailing Nvidia's offerings across most benchmarks. Despite improvements from AMD engineers, the software stack remains underdeveloped, leaving the CUDA moat intact. This in-depth analysis offers concrete recommendations for AMD to enhance its software and competitiveness.

Read more

NZ Service Provider Pwned: A Responsible Disclosure Story

2025-03-27

A security researcher discovered a critical database vulnerability in a New Zealand app, KiwiServices, during a penetration test. By manipulating a simple HTTP request, they bypassed authentication and accessed the entire user database, exposing sensitive information like names, emails, and phone numbers. The researcher responsibly disclosed the vulnerability, and KiwiServices fixed it within 30 days. This highlights the importance of security testing and prompt patching.

Read more
Development

2025 TV Market: Lower Prices, More Ads, and an OS War

2024-12-16
2025 TV Market: Lower Prices, More Ads, and an OS War

The 2025 TV market will see significant changes: Walmart's acquisition of Vizio transforms TVs into tools for giant retailers' ad businesses, potentially lowering prices but increasing ad volume. Competition between TV operating systems (OSes) will intensify, with companies like Roku facing acquisition risks. Consumer data becomes crucial, requiring users to balance privacy concerns with cost savings. While hardware innovation slows, price wars and OS competition may benefit consumers.

Read more

Transhumanism: A Cult for Our Times?

2025-03-24
Transhumanism: A Cult for Our Times?

This article explores whether the transhumanist movement exhibits cult-like characteristics. Using Robert J. Lifton's eight criteria for identifying cults, the author analyzes transhumanism's information control, mystical manipulation, purity demands, confession culture, sacred science, loaded language, doctrine over person, and dispensing of existence. The author argues that transhumanism displays similarities to cults in its closed-mindedness, exclusionary practices, and apocalyptic salvation narrative. While not geographically centralized, transhumanism's online communities foster strong group identity and suppress dissent, showcasing blind optimism towards future technologies and devaluation of non-believers. The article concludes that the future trajectory of transhumanism will depend on whether its technological predictions materialize and how its adherents react to reality.

Read more

Arctic Sea Ice Extent Hits Record Low Maximum

2025-03-28
Arctic Sea Ice Extent Hits Record Low Maximum

Arctic sea ice extent reached its annual maximum on March 22, 2025, at 14.33 million square kilometers, the lowest in 47 years of satellite record. This is 1.31 million square kilometers below the 1981-2010 average and 80,000 square kilometers below the previous record low in 2017. While subject to revision, the preliminary data highlights the accelerating impact of climate change on the Arctic.

Read more

100x Speedup: Garbage Collection and GPUs in Python

2025-03-25
100x Speedup: Garbage Collection and GPUs in Python

This post details how the author achieved a 100x speedup of a Python program through simple code optimizations. The initial program used NumPy for parallel computation but was slow and memory-intensive due to poor memory management. By implementing a simple garbage collection mechanism to release unused intermediate variables, the author reduced runtime from 40 seconds to 10 seconds, significantly decreasing memory usage. Subsequently, using CuPy to offload computation to the GPU further reduced runtime to 1.5 seconds, demonstrating a dramatic performance improvement.

Read more
Development Python Optimization

Alpine Linux Needs Your Help After Equinix Metal Sunset

2025-02-06

Alpine Linux's core infrastructure relies on Equinix Metal, which is being discontinued. This impacts their download mirrors, continuous integration, and development environment. To ensure service continuity, Alpine Linux is seeking community help, including colocation space in the Netherlands, bare-metal servers (for mirrors and CI) or VMs, and financial contributions. They highlight the importance of sustainable funding and encourage donations via Open Collective.

Read more
Development community support

US Restricts Swiss Access to AI Chips: A Tech Cold War?

2025-01-27
US Restricts Swiss Access to AI Chips: A Tech Cold War?

The US has excluded Switzerland from unrestricted access to AI computer chips, prompting criticism from Swiss Economics Minister Guy Parmelin. This move limits Swiss academic and corporate access to these vital components, placing Switzerland in a category with restricted imports. Parmelin stated this is incomprehensible, as the ETH Zurich utilizes these chips for innovation crucial to the US, making this a potential “own goal” for America. Negotiations are underway to secure unrestricted access. The US aims to prevent rivals, particularly China, from obtaining this technology and circumventing export restrictions. Separately, President Trump's announcement to forgo the global minimum tax will have consequences for Switzerland, impacting the federal government, cantons, and businesses. The Swiss government will consider reciprocal measures.

Read more

My 2024 Reading List: A Journey Through Philosophy, Science, and Literature

2025-01-01
My 2024 Reading List: A Journey Through Philosophy, Science, and Literature

Waqas Younas shares his 2024 reading list, a diverse collection spanning philosophy, logic, literature, history, and biography. From Cicero's letters to Nietzsche's Human, All Too Human, and from quantum mechanics to Tagore's poetry, the books reflect a journey of intellectual exploration. The engaging review interweaves insightful excerpts and personal reflections, making it a captivating read for anyone interested in a broad spectrum of subjects.

Read more

Scheduled Reboots: A Preventative Approach

2024-12-13

A university research team faced a challenging sysadmin problem: their servers had been running for too long and needed rebooting, but frequent reboots disrupt user experience. Their default was to avoid reboots, but a recent large-scale reboot due to prolonged uptime forced a change. To prevent similar issues, they've decided on a yearly reboot schedule—at least three times a year, aligning with the university's teaching schedule—balancing preventative maintenance with user experience.

Read more

Adversarial Policies Defeat Superhuman Go AIs

2024-12-24
Adversarial Policies Defeat Superhuman Go AIs

Researchers achieved a >97% win rate against the state-of-the-art Go AI, KataGo, by training adversarial policies. These adversaries didn't win by playing Go well, but by tricking KataGo into making critical blunders. The attack transferred zero-shot to other superhuman Go AIs and was simple enough for human experts to replicate without algorithmic assistance. The vulnerability persisted even after KataGo was adversarially trained to defend against it, highlighting surprising failure modes in even superhuman AI systems.

Read more

Massive Supply Chain Attack: Malware Delivered via Abandoned Amazon S3 Buckets

2025-02-12

Researchers registered roughly 150 abandoned Amazon S3 buckets for around $400, finding they contained software libraries still in use. These buckets received eight million requests in two months, highlighting a massive vulnerability. An attacker could easily inject malware into these libraries, spreading it widely through software updates – a SolarWinds-style attack on a much larger scale. The abandonment of these buckets leaves developers unable to automatically patch vulnerabilities, giving attackers control over updates and hindering vendor identification of affected software. This underscores the critical flaws in software supply chain security; fixing it will be both difficult and expensive.

Read more

TMSU: A Tag-Based Virtual Filesystem for Escaping the Hierarchical Filesystem Nightmare

2025-01-23

TMSU is a tool for tagging your files, offering a simple command-line interface for applying tags and a virtual filesystem providing a tag-based view of your files from any program. It doesn't modify your files; instead, it maintains its own database and mounts a tag-based view. You can tag files, query them using logical operators (and, or, not), and mount a virtual filesystem for access from other applications. This VFS allows for tag management by creating and deleting directories.

Read more
Development virtual filesystem tags

Physics Uncovers Critical Tipping Points in Chess Matches

2025-01-24
Physics Uncovers Critical Tipping Points in Chess Matches

Physicist Marc Barthelemy analyzed over 20,000 top-level chess games using interaction graphs to reveal crucial tipping points. Treating chess as a complex system, he measured the 'betweenness centrality' and 'fragility scores' of chess pieces to predict game outcomes. The fragility score of key pieces rises about eight moves before a critical turning point and remains high for approximately 15 moves afterward, revealing a universal pattern across players and openings. This research offers fresh insights into the complex dynamics of chess and provides new avenues for AI and machine learning.

Read more
AI

Lenovo Legion Go S: SteamOS Edition Crushes Windows 11?

2025-07-14

The Lenovo Legion Go S handheld PC comes in two versions: SteamOS and Windows 11. Benchmarks reveal the SteamOS version consistently outperforms the Windows 11 version in AAA games, boasting significantly higher frame rates and better battery life. While the Windows 11 version might be cheaper in some regions, its inferior performance and battery life make the SteamOS version the clear winner in terms of value. Ironically, the SteamOS version is surprisingly difficult to find on Lenovo's official website, raising questions about their marketing strategy.

Read more

Tariffs Hammer the Bike Industry: Price Hikes and the Onshoring Struggle

2025-04-03
Tariffs Hammer the Bike Industry: Price Hikes and the Onshoring Struggle

Newly imposed US tariffs are dramatically impacting the bicycle industry. The article analyzes the effects on bikes and parts from various countries (China, Vietnam, Cambodia, Thailand, Taiwan, Japan, EU, etc.), predicting significant price increases, especially for high-end products. While the US encourages onshoring, the lack of infrastructure and specialized expertise presents massive challenges for domestic production of performance bike components. The conclusion notes that bike prices will rise and selection will shrink, but cycling enthusiasts will continue to enjoy the ride.

Read more

Programmers Craft a Whimsical Programming Game: Droste's Lair

2024-12-17
Programmers Craft a Whimsical Programming Game: Droste's Lair

Two programmers spent two weeks developing Droste's Lair, a whimsical programming environment game. Players build and count mathematical structures through intuitive drag-and-drop interactions, using an "amb" mechanism for branching execution and recursion. The game, themed around swords and sorcery, presents challenges such as reversing list elements, generating all face card combinations, and counting ways to cover a checkerboard with dominoes. Droste's Lair cleverly blends programming and game elements, offering a novel and engaging way to learn programming and mathematical concepts.

Read more

YouTube Experiment: DRM-Only Videos on TV?

2025-03-10
YouTube Experiment: DRM-Only Videos on TV?

Reports indicate YouTube is experimenting with a limited rollout where normal videos only offer DRM-protected formats on the TV (TVHTML5) Innertube client. This affects not only yt-dlp, but also official YouTube TV clients (PS3, web browser, Apple TV), which also only provide DRM formats. Tests show accounts involved can only access DRM-protected versions. This suggests a potential shift in YouTube's copyright protection strategy, potentially impacting how users watch and download videos.

Read more

The Naivete of Tech Geeks: Why Big Tech Lies and How to Fight Back

2025-03-29
The Naivete of Tech Geeks: Why Big Tech Lies and How to Fight Back

This article criticizes the naive trust many tech geeks place in large tech companies like Amazon and Apple. The author argues that claims of 'privacy protection' are largely marketing ploys, masking the core goal of data collection. Using examples like Alexa, Apple's privacy policies, and spam email, the article exposes how big tech exploits user naivety and reliance on marketing. The author calls on tech geeks to shed their naivete, avoid being misled by marketing, choose companies and open-source projects that genuinely prioritize privacy, and actively participate in building commons beyond the control of large tech corporations.

Read more
Tech

OpenAI Partners with US National Labs to Supercharge Scientific Research with AI

2025-01-30
OpenAI Partners with US National Labs to Supercharge Scientific Research with AI

OpenAI announced a partnership with US National Labs, leveraging AI to advance scientific research and serve national security and public good. Over 15,000 scientists will gain access to OpenAI's latest reasoning models, potentially leading to breakthroughs in materials science, renewable energy, astrophysics, and more. Key areas of focus include bolstering US global tech leadership, disease treatment and prevention, cybersecurity, power grid protection, threat detection, and furthering our understanding of the universe. The partnership aims to unlock the potential of natural resources and revolutionize the nation's energy infrastructure, while also significantly enhancing national security research.

Read more

Amnesty's Mobile Verification Toolkit: A Forensic Tool for Spyware Detection

2025-03-17
Amnesty's Mobile Verification Toolkit: A Forensic Tool for Spyware Detection

Amnesty International's Security Lab released the Mobile Verification Toolkit (MVT) in July 2021. This tool helps simplify and automate the process of gathering forensic evidence to identify potential compromises on Android and iOS devices. MVT uses publicly available Indicators of Compromise (IOCs) to scan for traces of known spyware campaigns, but it's crucial to remember that this is not a guarantee of complete device security. Intended for technologists and investigators familiar with digital forensics and command-line tools, MVT is not for general self-assessment.

Read more

Lake Names vs. Actual Color: A Fun Data Analysis Using Satellite Imagery

2025-02-14
Lake Names vs. Actual Color: A Fun Data Analysis Using Satellite Imagery

The author conducted a quirky data analysis: They collected the ten most common lake names in France, Italy, Russia, and Belarus and analyzed their average colors using satellite imagery data. This was to verify how well lake names matched their actual colors. The results show that while some lake names correlate with color (e.g., 'Black Lake'), the actual color differences were not significant; the average lake color was typically a light blue-gray. The study presented the fun side of data analysis in a lighthearted tone, also prompting reflection on the accuracy of geographical names.

Read more

Real-time App Architectures: A Comparison of Poke/Pull, Push State, Push Ops, and Event Sourcing

2025-02-10

This article explores four main patterns for building real-time applications: Poke/Pull, Push State, Push Ops, and Event Sourcing. Poke/Pull is easy to integrate but suffers from fan-out issues; Push State directly pushes state but struggles with large-scale state updates; Push Ops push operations instead of the entire state, which is more efficient; Event Sourcing pushes events, requiring client-side logic. The article also compares different transport methods (WebSockets, SSE, etc.) and their challenges in horizontally scaled systems, highlighting the role of Pub/Sub.

Read more

Ambsheets: Exploring Spreadsheet Uncertainty

2025-02-05
Ambsheets: Exploring Spreadsheet Uncertainty

Imagine a spreadsheet where a single cell can hold multiple values simultaneously. That's the core idea behind Ambsheets, a project extending traditional spreadsheets to handle 'amb values'—values representing multiple possibilities. This allows users to easily explore various scenarios, like budgeting for different car and apartment prices, without tedious restructuring. Unlike Excel's What-If Analysis, Ambsheets offers a cleaner interface and powerful automatic combination capabilities, efficiently managing multi-dimensional possibility spaces. Researchers are currently exploring Ambsheets' applications in filtering, visualization, and continuous distributions, aiming to develop it into a more powerful scenario exploration tool.

Read more
Development uncertainty

BEAD's Tech-Neutral Shift Sparks Controversy: Starlink Could Reap Billions

2025-03-06
BEAD's Tech-Neutral Shift Sparks Controversy: Starlink Could Reap Billions

The Broadband Equity, Access, and Deployment (BEAD) program's shift to a technology-neutral approach is sparking controversy. Critics argue this change, abandoning the initial preference for fiber optics, will leave millions with slower, less reliable, and more expensive broadband. The shift could funnel billions in subsidies towards satellite internet providers like Starlink, potentially at the expense of fiber infrastructure development. Republicans are also pushing for legislative changes to remove what they see as burdensome regulations imposed by the Biden administration. Ultimately, state governments will distribute funds to ISPs, although the exact allocation remains uncertain.

Read more

Capital Letters Make Smaller QR Codes: A URL Encoding Mystery

2025-02-25
Capital Letters Make Smaller QR Codes: A URL Encoding Mystery

Two QR codes pointing to the same URL, one larger than the other. Why? The answer isn't error correction, but encoding mode. A URL in all capital letters uses the more compact alphanumeric mode, while lowercase uses byte mode, leading to data redundancy and a larger QR code. This highlights the impact of character set choices in URL encoding on QR code size. For the smallest QR code, use uppercase letters.

Read more

Microsoft Claims First Topological Qubit: Breakthrough or Hype?

2025-02-20
Microsoft Claims First Topological Qubit: Breakthrough or Hype?

Microsoft announced the creation of the first topological qubit, sparking significant interest in the tech world. Topological qubits, based on non-Abelian anyons, are theoretically more resistant to errors than traditional qubits. While Microsoft retracted a similar claim in 2018, they now assert a fully functional topological qubit. Though currently not practically useful, this marks a milestone in topological quantum computing, with the future success of this approach compared to traditional qubits still uncertain.

Read more
Tech
1 2 507 508 509 511 513 514 515 596 597