Apple Rejects Critical Alerts API Access for Medication Reminder App

2025-05-08
Apple Rejects Critical Alerts API Access for Medication Reminder App

Jay Han's iOS medication reminder app, SuperDose, was rejected by Apple for access to the Critical Alerts API. This API allows notifications to bypass silent mode and Do Not Disturb, crucial for users taking life-saving medications. Apple's reasoning was that the app couldn't guarantee compliant usage, but Han argues that user consent addresses abuse, and Apple's own Health app uses the API. Han questions Apple's approval of other general-purpose reminder apps while rejecting his, potentially leading users to miss critical medication reminders, posing a safety risk.

Read more
Development API Access Apple Review

Apple's 'Liquid Glass' UI Redesign: Form Over Function?

2025-07-02
Apple's 'Liquid Glass' UI Redesign: Form Over Function?

Apple's new user interface design, "Liquid Glass," has sparked controversy. The author dissects Apple's developer documentation, revealing inconsistencies. The guidelines advocate blurring the lines between content and navigation while simultaneously advising clear separation. Unnecessary whitespace reduces screen density, and overly simplistic icon design requirements lead to bland, indistinguishable icons. The author argues that Apple prioritizes form over function, sacrificing user experience and developer freedom, resulting in homogenized third-party app icons. The focus on a "liquid glass" effect overshadows the importance of the elements it distorts.

Read more

Deep Dive into Cloud Virtualization: Red Hat, AWS Firecracker, and Ubicloud Internals

2025-01-24
Deep Dive into Cloud Virtualization: Red Hat, AWS Firecracker, and Ubicloud Internals

This blog post delves into the core architectures of cloud virtualization, using Red Hat, AWS Firecracker, and Ubicloud as case studies to compare their differences in virtual machine monitors (VMMs), kernel virtualization, and resource isolation. It explains the roles of key components like KVM, QEMU, and libvirt, and analyzes the use of technologies such as cgroups, nftables, and seccomp-bpf in achieving resource and security isolation. The author also contrasts the AWS Nitro system, summarizing the evolution of cloud virtualization technology and the importance of open-source technology in this field.

Read more

Safe and Efficient printf in Idris: No Macros Required

2025-02-14

This article demonstrates how to implement a safe and efficient printf function in Idris without resorting to unsafe macros or variadics. By cleverly using type-level programming, the author parses the format string into a data structure and dynamically generates the function type signature based on it. This achieves the functionality of C's printf while maintaining memory and type safety. The article also explores handling runtime format strings and points out shortcomings of the implementation, such as unclear error messages, hinting at future improvements.

Read more

Boeing's Starliner Program: Over $2 Billion in Losses

2025-02-07
Boeing's Starliner Program: Over $2 Billion in Losses

Boeing reported a $523 million loss on its CST-100 Starliner program in 2024, bringing the total losses to over $2 billion. The losses are attributed to schedule delays, increased testing and certification costs, and higher post-certification mission costs. While NASA reported progress on resolving issues from a previous test flight, key problems, including thruster malfunctions, remain unresolved. The timeline for Starliner's next flight, whether crewed or uncrewed, remains uncertain.

Read more
Tech

KubeVPN: Seamlessly Connect Your Local Dev Environment to Kubernetes Clusters

2025-02-20
KubeVPN: Seamlessly Connect Your Local Dev Environment to Kubernetes Clusters

KubeVPN provides a Cloud-Native Dev Environment that effortlessly connects to your Kubernetes cluster network. Access the cluster network using service names or Pod IP/Service IP. Intercept inbound traffic from remote Kubernetes cluster services to your local PC via a service mesh. Run your Kubernetes pods within a local Docker container for an identical environment, volume, and network setup. Develop applications entirely on your local PC with KubeVPN! Installation is straightforward via brew, scoop, krew, or GitHub releases. Supports multiple cluster connections and proxy modes (full and lite).

Read more

Mistral Saba: A Lightweight AI Model for the Middle East and South Asia

2025-02-17
Mistral Saba: A Lightweight AI Model for the Middle East and South Asia

Mistral AI has launched Mistral Saba, a 24B parameter AI model trained specifically for languages in the Middle East and South Asia, including Arabic and numerous Indian languages with a particular strength in South Indian languages. This lightweight model runs on a single GPU, is fast, cost-effective, and deployable locally for enhanced security. Mistral Saba demonstrates strong capabilities across various applications, including Arabic conversational support, domain-specific expertise, and culturally relevant content creation, providing businesses with more accurate and culturally appropriate services.

Read more

Bottlefire: Container Images to Zero-Dependency Linux Executables

2025-09-10

Bottlefire transforms container images into standalone, zero-dependency Linux executables that bundle Firecracker and automatically launch microVMs. Users can run these executables on any modern amd64/arm64 Linux platform with KVM support without needing root privileges or complex system-level setups. Bottlefire microVMs feature zero-config userspace networking, port mapping, and host-to-VM directory sharing, offering the ease of use of containers. Simply download and run with a curl command for a surprisingly streamlined experience.

Read more
Development microvm

Linux Desktop: Great; Linux Server: A Mess? FreeBSD's Elegant Response

2025-03-31
Linux Desktop: Great; Linux Server: A Mess? FreeBSD's Elegant Response

The author contrasts the desktop and server experiences of Linux, finding the desktop remarkably user-friendly. However, the server side suffers from excessive complexity due to systemd and abstraction layers like Docker and Kubernetes, making troubleshooting difficult. FreeBSD, conversely, shines with its simplicity, stability, and ease of maintenance, even in disaster recovery scenarios. However, a growing trend of open-source software relying heavily on Docker deployment, lacking native installation methods, poses a challenge for FreeBSD users. The author highlights deployment difficulties with Immich and BunkerWeb as examples.

Read more
Development Server Administration

200+ Researchers Call for a Pause on Giant AI Model Development

2025-02-07

Over 200 researchers from leading universities and research institutions worldwide have signed an open letter calling for a six-month pause on the development of AI models more powerful than GPT-4. They warn of potential societal and civilizational risks posed by these giant AI models, arguing that a pause is needed to allow for adequate safety assessments and regulatory frameworks. The letter highlights the potential dangers of rapid AI advancement, sparking a broad conversation on AI safety and ethics within the Tech sector.

Read more
Tech

K: A Concise, Fast, and Vector-Oriented Programming Language

2025-02-10

The k language family is a series of concise, fast, vector-oriented languages designed by Arthur Whitney. It's not a single version, but rather an evolving sequence of slightly incompatible iterations. This book focuses on open-source k implementations and the community around them, including ngn/k (k6) and oK (k5/6). It explores k's characteristics, learning curve, and relationship to APL and J. While known for conciseness and speed, k has a steep learning curve requiring dedicated practice.

Read more

Australia Enacts World's Strictest Social Media Ban for Under-16s

2025-01-31
Australia Enacts World's Strictest Social Media Ban for Under-16s

Australia has implemented one of the world's strictest internet crackdowns, prohibiting children under 16 from using social media or creating new accounts. The law, effective in a year, holds social media companies accountable for verifying users' ages, with penalties reaching nearly $50 million for non-compliance. Facing opposition from tech companies citing free speech concerns and the potential for driving kids to unregulated online spaces, Australia's eSafety Commissioner, Julie Inman Grant, is tasked with enforcement. The approach, drawing global attention, aims to shift responsibility for online child safety from parents to platforms, similar to past automotive safety regulations.

Read more

Windows BitLocker Vulnerability: Bypassing Encryption Without a Screwdriver

2025-01-18
Windows BitLocker Vulnerability: Bypassing Encryption Without a Screwdriver

A critical vulnerability in Windows BitLocker allows attackers to extract the disk encryption key without physical access, merely requiring a network connection and keyboard. The vulnerability exploits a flaw in the Windows Boot Manager, enabling attackers to downgrade to a vulnerable version and bypass Secure Boot. While patched in late 2022, a design flaw in the Secure Boot standard allows exploitation to persist. The article details the exploit, including a PXE boot into a downgraded bootloader, manipulation of the Boot Configuration Data (BCD) to trigger a soft reboot, and memory scanning for the VMK using a Linux exploit. Mitigation strategies, such as enabling a pre-boot PIN or applying KB5025885, are outlined.

Read more

Alcohol-Free Booze: A Booming Business

2025-01-07
Alcohol-Free Booze: A Booming Business

Dry January is driving growth in the alcohol-free beverage market. More people are choosing to abstain from alcohol or reduce their consumption, leading to increased demand for non-alcoholic beers, spirits, and other alternatives. These drinks cater to health-conscious consumers while offering a taste profile similar to their alcoholic counterparts. While improvements in taste remain a goal, the market shows significant potential for future expansion.

Read more

The Clockwise/Spiral Rule: Mastering Complex C Declarations

2025-01-01

This article introduces the 'Clockwise/Spiral Rule,' a clever technique for parsing complex C declarations. By spiraling clockwise through the declaration, replacing elements like arrays, pointers, and functions with their English equivalents, even the most intricate declarations become understandable. The author demonstrates the technique with several examples, from simple pointer arrays to nested function pointers, and shows how to handle `const` and `volatile` keywords. This method offers a practical and intuitive way to decipher confusing C code.

Read more
Development code parsing

Machine Learning Textbook: Patterns, Predictions, and Actions

2025-09-06

Moritz Hardt and Benjamin Recht's "Patterns, Predictions, and Actions: Foundations of Machine Learning" is now available from Princeton University Press. This comprehensive textbook covers a wide range of machine learning topics, from foundational prediction to deep learning, causal inference, and reinforcement learning. Supplementary problem sets and a PDF preprint are also available. The book is licensed under Creative Commons BY-NC-ND 4.0.

Read more
AI

ESA's iicon: A Corporate-Focused Gaming Event Replacing E3?

2025-02-06
ESA's iicon: A Corporate-Focused Gaming Event Replacing E3?

The Entertainment Software Association (ESA) is launching iicon, the "interactive innovation conference," aiming to fill the void left by E3's demise. While lacking E3's catchy name, major players like Sony, Nintendo, and Microsoft are onboard. However, marketing focuses on "visionaries" and "innovators," suggesting a corporate-centric event prioritizing partnerships and brand synergy over consumer-focused game reveals. This contrasts sharply with E3's heyday of major announcements. The inaugural iicon will be in April 2026, while consumer-facing events like Geoff Keighley's Summer Game Fest and The Game Awards continue to dominate.

Read more

The Naivete of Tech Geeks: Why Big Tech Lies and How to Fight Back

2025-03-29
The Naivete of Tech Geeks: Why Big Tech Lies and How to Fight Back

This article criticizes the naive trust many tech geeks place in large tech companies like Amazon and Apple. The author argues that claims of 'privacy protection' are largely marketing ploys, masking the core goal of data collection. Using examples like Alexa, Apple's privacy policies, and spam email, the article exposes how big tech exploits user naivety and reliance on marketing. The author calls on tech geeks to shed their naivete, avoid being misled by marketing, choose companies and open-source projects that genuinely prioritize privacy, and actively participate in building commons beyond the control of large tech corporations.

Read more
Tech

Real-time App Architectures: A Comparison of Poke/Pull, Push State, Push Ops, and Event Sourcing

2025-02-10

This article explores four main patterns for building real-time applications: Poke/Pull, Push State, Push Ops, and Event Sourcing. Poke/Pull is easy to integrate but suffers from fan-out issues; Push State directly pushes state but struggles with large-scale state updates; Push Ops push operations instead of the entire state, which is more efficient; Event Sourcing pushes events, requiring client-side logic. The article also compares different transport methods (WebSockets, SSE, etc.) and their challenges in horizontally scaled systems, highlighting the role of Pub/Sub.

Read more

Web Origami: A New Programming Language for Simplified Website Building

2024-12-13

Web Origami is a new programming language designed to simplify the creation of small- to medium-sized websites. Using a concise syntax that complements HTML and CSS, users can describe website structure using formulas similar to spreadsheets, transforming data and files into HTML and other website resources through simple programs. Even without JavaScript knowledge, features like full-text search and RSS feeds can be created. Origami provides a command-line interface, built-in functions, and an async-tree library, with support for JavaScript extensions. Its core concept is to abstract website building as data transformation, making site creation and deployment efficient, low-cost, and easy to understand.

Read more

Farallon Islands: A Crucial Wildlife Refuge

2025-03-04
Farallon Islands: A Crucial Wildlife Refuge

Located nearly 30 miles off the coast of San Francisco, the Farallon Islands National Wildlife Refuge is home to hundreds of thousands of seabirds and thousands of seals and sea lions. Since 1968, Point Blue Conservation Science has partnered with the U.S. Fish and Wildlife Service to conduct research and train the next generation of scientists on the islands, working to conserve and restore this complex ecosystem in the face of climate change and other threats. Due to the sensitive seabird and mammal breeding grounds, the islands are closed to the public, accessible only to a small number of wildlife biologists and resource managers.

Read more
Misc ecosystem

Surfer Protocol: Open-Source Framework for Personal Data Control

2024-12-17
Surfer Protocol: Open-Source Framework for Personal Data Control

Surfer Protocol is an open-source framework that empowers users to export and build applications based on their personal data. Addressing the issue of data siloed across numerous platforms, Surfer Protocol offers a solution. It comprises a desktop application for exporting data from various apps and services, and a Python SDK for building applications using this data. Users can leverage Surfer Protocol to create personalized AI models, reclaim control of their data from big tech, or leave a digital legacy.

Read more

Decoding the Telephony Signals in Pink Floyd's 'The Wall'

2024-12-22

A telecom hardware engineer decoded the telephony signals in a scene from Pink Floyd's 'The Wall'. The audio clip, featuring dial tones, rapid tone combinations, and an answer tone, was analyzed using spectrograms. By comparing the frequencies to known standards (DTMF, CAS R2, SS5), the engineer identified the signaling as SS5 and decoded the number as 044 1831. This analysis not only showcases the engineer's expertise but also reveals insights into the film's sound design and suggests a possible connection to a real-life London number.

Read more

DRM-Free Ebooks, Comics & More: A Curated List of Indie Publishers

2025-02-18
DRM-Free Ebooks, Comics & More: A Curated List of Indie Publishers

This article showcases a diverse collection of websites offering DRM-free ebooks, comics, magazines, and RPGs. The list features award-winning publications like Clarkesworld science fiction magazine, publishers specializing in translated East Asian literature (Honford Star), and independent comic creators (Roman Labs). The article also highlights University of Wales Press, providing open-access academic research. It's a valuable resource for readers seeking diverse and accessible digital content, spanning various genres and formats.

Read more

Roku OS Update Causes Washed-Out HDR Colors

2025-05-05
Roku OS Update Causes Washed-Out HDR Colors

A recent Roku OS update has caused washed-out colors in HDR content on several Roku apps, including Disney+. Complaints started appearing a week ago, affecting apps like Apple TV+ and Netflix as well. Roku is investigating, asking users to report their experiences and devices. Affected TVs include multiple TCL, Hisense, and Sharp models, while Roku streaming sticks seem unaffected. One user reported that plugging a streaming stick into a Roku TV solved the issue. Users report the problem impacting both movies and shows across various apps, causing significant viewing disruption.

Read more
Hardware Color Distortion

10 Essential Django Tools for Enhanced Performance, Security, and Productivity

2024-12-29

This article explores ten indispensable tools for your next Django project, covering dependency management, performance profiling, and more to boost development efficiency, security, and performance. From Poetry for dependency management to Silk for performance profiling, each tool—including Django Extensions, Django REST Framework, djangorestframework-camel-case, Django Storages, django-simple-history, django-otp, Celery, and Gunicorn with Uvicorn Workers—is explained with comparisons to alternatives like Pipenv, FastAPI, and django-reversion. These tools help build faster, more secure, and efficient Django applications.

Read more
Development Tools

Backblaze's 1TB File Backup Nightmare: A 100,000 Chunk Limit?

2025-02-04

A user reports Backblaze continuously re-uploading a 1TB+ file, with log errors suggesting a 100,000 chunk limit (10MB each). This contradicts Backblaze's advertised unlimited storage. The user suspects a newly implemented limit, possibly even leading to deletion of existing backups. Support's response has been unhelpful, offering only standard troubleshooting steps.

Read more

SQLFlow: Stream Processing with DuckDB and SQL

2025-01-03
SQLFlow: Stream Processing with DuckDB and SQL

SQLFlow is a stream processing engine powered by DuckDB, enabling SQL-based operations on real-time data from sources like Kafka and webhooks. It supports data transformations, enrichment, aggregation, tumbling window aggregations, and outputs to destinations such as Kafka, databases, or local files. SQLFlow boasts high throughput, handling tens of thousands of messages per second, and supports custom serialization and encoding. Docker deployment is readily available for easy setup.

Read more
Development stream processing

Introduction to Digital Filters with Audio Applications

2025-07-12

This comprehensive textbook provides a thorough introduction to digital filters and their applications in audio processing. Starting with the simplest lowpass filter, it progressively covers the theoretical foundations, design methods, and implementation techniques of various filter types, including linear time-invariant (LTI) filters, finite impulse response (FIR) filters, infinite impulse response (IIR) filters, and diverse filter structures and implementations. The book includes numerous Matlab and Faust code examples, along with rich audio application case studies, making it ideal for students and researchers in digital signal processing and audio engineering.

Read more
Development digital filters

SNL's 50th Season: A Designer's Untold Story

2025-01-07
SNL's 50th Season: A Designer's Untold Story

PRINT magazine interviewed Marlene Weisman, a designer who worked for seven seasons on Saturday Night Live (SNL) in the 1980s. She recounts her incredible journey creating graphics for iconic sketches in a pre-computer era, relying on hand-lettering, Letraset, phototypesetting, and paste-up. Weisman details collaborations with stars like Mike Myers and the frenetic pace of SNL production. The article offers a behind-the-scenes look at SNL and a fascinating glimpse into a designer's creative journey amidst technological shifts.

Read more
1 2 532 533 534 536 538 539 540 596 597