arXivLabs: Experimental Projects with Community Collaborators

2025-02-22
arXivLabs: Experimental Projects with Community Collaborators

arXivLabs is a framework enabling collaborators to develop and share new arXiv features directly on our website. Individuals and organizations working with arXivLabs embrace our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only partners with those who share them. Have an idea to improve the arXiv community? Learn more about arXivLabs.

Read more
Development

YouTube Experiment: DRM-Only Videos on TV?

2025-03-10
YouTube Experiment: DRM-Only Videos on TV?

Reports indicate YouTube is experimenting with a limited rollout where normal videos only offer DRM-protected formats on the TV (TVHTML5) Innertube client. This affects not only yt-dlp, but also official YouTube TV clients (PS3, web browser, Apple TV), which also only provide DRM formats. Tests show accounts involved can only access DRM-protected versions. This suggests a potential shift in YouTube's copyright protection strategy, potentially impacting how users watch and download videos.

Read more

My Two-Year Noise-Cancelling Odyssey: From Self-Delusion to 'Ah-ha!' Moment

2025-03-12
My Two-Year Noise-Cancelling Odyssey: From Self-Delusion to 'Ah-ha!' Moment

Driven mad by noisy upstairs neighbors and a perpetually loud park, the author spent two years experimenting with bizarre noise-reduction methods: from industrial-strength earmuffs and silicone earplugs to researching earwax genes and the physics of sound, even attempting to build a soundproof chamber. All failed miserably. The ultimate solution? A simple pair of noise-canceling headphones. This article reflects on how over-reliance on theoretical analysis, neglecting simple solutions, and a fixation on cleverness led to wasted time and suffering.

Read more

Severance Season 2: Corporate Perks as a Tool for Control

2025-03-06
Severance Season 2: Corporate Perks as a Tool for Control

Apple TV+'s *Severance* season 2 highlights how seemingly beneficial corporate perks—finger traps, waffle parties, family visits—are used to manipulate employees. These perks, while appearing to boost morale, subtly blur the lines between freedom and control, ultimately reinforcing the company's power. The article draws parallels to real-world scenarios where 'wellness perks' are used to collect employee data, violating privacy and undermining worker rights. It contrasts these tactics with the proven benefits of unionization for improving worker conditions and pay.

Read more

Critical Azure API Connection Vulnerability Allows Privilege Escalation and Secret Exfiltration

2025-03-12

Binary Security researchers discovered undocumented APIs in Azure API Connections, enabling privilege escalation and secret exfiltration from backend resources like Key Vaults, Storage Blobs, Defender ATP, and even enterprise Jira and Salesforce servers. The vulnerability stems from the ability of any user with read access to an API connection to invoke any defined GET request, bypassing security controls and accessing sensitive data. Microsoft has acknowledged and patched the vulnerability.

Read more

From Nero's Poison to Turkish Jam: The Deadly Double Life of Cherry Laurel

2025-03-11

The author discovers a cherry laurel tree in their backyard, a plant whose fruits and leaves contain the deadly poison cyanide. Historically, it was used by Locusta, Nero's poisoner, to assassinate enemies. However, cherry laurel has also been used as a food flavoring; 19th-century British cooks used its leaves in puddings, resulting in child poisonings. Today, in Turkey, ripe cherry laurel fruits are made into jams and other foods. The article engagingly recounts the plant's transformation from ancient poison to modern food, warning against confusing cherry laurel with bay leaves to prevent accidental poisoning.

Read more
Misc plant poison

Running LLMs Locally: Privacy, Cost, and Experimentation

2025-03-11
Running LLMs Locally: Privacy, Cost, and Experimentation

This article explores the advantages and methods of running large language models (LLMs) locally. While acknowledging that local LLMs won't match cloud services in performance, the author highlights their benefits for privacy, cost control, and experimental development. Three tools are presented: Ollama (user-friendly, extensive model library), Llama.cpp (cross-platform, powerful), and Llamafiles (single executable, easy sharing). The article also covers crucial aspects like model selection, parameters, quantization, and model capabilities, while cautioning about model file sizes and security. Ultimately, running LLMs locally offers developers a flexible and controllable approach to AI development.

Read more

A Labyrinthine HTML Structure: Diving into a Deeply Nested Code

2025-03-14
A Labyrinthine HTML Structure: Diving into a Deeply Nested Code

This code snippet reveals an unusually complex, deeply nested HTML structure. Like a maze, layers upon layers of div elements make it difficult to discern the underlying logic. This brings to mind the intricate architectures of complex programs or websites, their internal complexities often exceeding imagination. While the code itself contains no actual content, the sheer complexity of its structure invites discussion. Is this a deliberate design choice? Or the result of a programming error?

Read more
Development HTML structure

Building a Personalized Calendar with Org-mode

2025-03-14
Building a Personalized Calendar with Org-mode

The author initially used Org Roam for daily planning but found it too complex. Discovering calendar.txt's simple elegance, they decided to recreate its functionality within Org-mode. Using the `org-clone-subtree-with-time-shift` command, a year-long template was quickly generated, with each day containing sections for morning, work, and evening activities. While not as concise as calendar.txt, Org-mode's flexibility allows for richer entries, including images and tables. Ultimately, the author leveraged Org-mode's filtering and hiding features to boost efficiency.

Read more

Ballista Botnet Exploits TP-Link Router Flaw, Infecting 6,000+ Devices

2025-03-11
Ballista Botnet Exploits TP-Link Router Flaw, Infecting 6,000+ Devices

A new botnet, Ballista, is exploiting a high-severity vulnerability (CVE-2023-1389) in unpatched TP-Link Archer AX-21 routers, infecting over 6,000 devices. The vulnerability allows remote code execution, enabling Ballista to spread automatically via command injection. The botnet targets manufacturing, medical, services, and technology organizations, predominantly in Brazil, Poland, the UK, Bulgaria, and Turkey, but also impacting the US, Australia, China, and Mexico. Ballista uses a malware dropper and shell script to execute its main binary, establishing a C2 channel to control infected devices and perform DoS attacks and sensitive file reading. Researchers suspect an Italian origin, but the use of Tor networks suggests ongoing development and active evasion techniques.

Read more
Tech botnet

Mars' Middle Atmosphere: Gravity Waves Reign Supreme

2025-03-11
Mars' Middle Atmosphere: Gravity Waves Reign Supreme

A groundbreaking study reveals that unlike Earth, Mars's middle and upper atmosphere circulation is primarily driven by gravity waves (GWs), not Rossby waves. Analysis of long-term atmospheric data shows GWs facilitate rapid vertical transfer of angular momentum, significantly influencing north-south circulation. This contrasts with Earth's stratosphere, resembling the mesosphere instead. This finding necessitates refining existing Martian atmospheric models for improved climate and weather simulations, crucial for future missions. Future research will explore the impact of Martian dust storms on this dynamic, promising more accurate Martian weather forecasting.

Read more

The Layoff Lie: Why Companies Keep Doing It Despite the Evidence

2025-03-09
The Layoff Lie: Why Companies Keep Doing It Despite the Evidence

From the airline industry's post-9/11 layoffs to the 2023 tech sector bloodbath, corporate downsizing has become commonplace. Yet, research consistently shows layoffs damage company culture, morale, and productivity, often failing to deliver promised financial gains and even increasing bankruptcy risk. This article traces the roots of this practice back to the 1980s, when shareholder value maximization became paramount, and aggressive CEO strategies popularized mass layoffs. The long-term consequences are overwhelmingly negative, highlighting the need for alternatives such as delaying purchases, reducing hours, or implementing furloughs.

Read more

A Gentle History of Math: Strengths and Weaknesses

2025-03-13
A Gentle History of Math: Strengths and Weaknesses

This review examines Berlinghoff and Gouvêa's "Math Through the Ages: A Gentle History for Teachers and Others." Instead of a chronological narrative, the book uses 30 independent topical sketches, supplemented by a rich bibliography to facilitate further exploration. While the book contains some inaccuracies, particularly concerning the origins of zero and the history of computing, overall it serves as a reasonably priced and informative introduction to the history of mathematics. It's a good starting point for those developing an interest in the subject, though readers should be aware of potential historical oversimplifications.

Read more
Development

NZ Health System Runs on Excel Spreadsheet, Blows $16B Budget

2025-03-11
NZ Health System Runs on Excel Spreadsheet, Blows $16B Budget

Health New Zealand (HNZ), managing a $16 billion budget, relies primarily on a single Excel spreadsheet for financial management. This led to budget overruns, and a Deloitte report revealed critical flaws: untraceable data, high error rates, and slow analysis. Despite possessing 6,000 applications and 100 digital networks, HNZ's senior leadership lacks coordination, holding only weekly in-person meetings. The Health Minister lacks a concrete improvement plan, raising serious concerns.

Read more

Serverless P2P Browser File Transfer: FilePizza v2 Arrives

2025-03-12
Serverless P2P Browser File Transfer: FilePizza v2 Arrives

FilePizza v2 is a WebRTC-based peer-to-peer file transfer tool for browsers. It eliminates the need for intermediary servers, transferring files directly between browsers for speed, privacy, and security. New features include a modern UI, dark mode, mobile support, multi-file uploads (zipped), upload progress monitoring, password protection, and Redis-based server state storage. End-to-end encryption ensures secure transfers. Conceived while eating pizza at UC Berkeley, it's now open-source and available at file.pizza.

Read more
Development File Transfer

Rethinking Bug Trackers: A Separation of Concerns

2025-03-10

After years of using various bug trackers, the author identifies a fundamental flaw in their data representation, leading to recurring frustrations. Three key issues are highlighted: a unified 'Fix Version' field conflating facts and plans; a two-tiered Status and Resolution system blurring the lines between code reality and future intentions; and the conflation of bug lists with to-do lists, creating awkwardness for non-bug tasks. The author proposes a 'separation of concerns' principle, suggesting a split into 'facts' and 'plans' tables. The facts table records objective bug information (existence, version, severity), while the plans table tracks intentions, timelines, and subjective priorities. This separation streamlines bug tracking, better accommodates different project types, and even allows for the complete omission of the plans table for projects focused solely on bug resolution.

Read more

The Startup CTO Handbook: Practical Guide for High-Performing Engineering Teams

2025-03-12
The Startup CTO Handbook: Practical Guide for High-Performing Engineering Teams

Zach Goldberg's 'The Startup CTO Handbook' offers a compelling daily resource for engineering leaders. Drawing on years of startup experience, Goldberg provides practical frameworks and insightful perspectives to tackle complex challenges in building high-performing engineering teams. The book emphasizes continuous learning, offering actionable advice on topics such as effective 1:1s, skip-level meetings, technical debt management, and navigating the CTO-CEO relationship. Whether you're a fledgling engineering leader or a seasoned CTO, this handbook is an invaluable guide.

Read more
Development Engineering Culture

Early Pirate Bay Backer Dies in Plane Crash

2025-03-13
Early Pirate Bay Backer Dies in Plane Crash

Carl Lundstrom, co-founder and early financial backer of The Pirate Bay, died in a plane crash in the Slovenian mountains. Lundstrom, also a member of the far-right Alternative for Sweden party, was flying from Zagreb to Zurich when his plane crashed. The 64-year-old's Piper Mooney Ovation M20R split in two upon impact. Bad weather hampered rescue efforts. He was previously convicted in 2012 for assisting in copyright infringement. Lundstrom also had ties to other Swedish political parties and unsuccessfully ran for office in 2021.

Read more

Supercomputer Maps Molecular Blueprint for Repairing Damaged DNA

2025-03-13
Supercomputer Maps Molecular Blueprint for Repairing Damaged DNA

Scientists used the Summit supercomputer to simulate the pre-incision complex (PInC), a critical component in the nucleotide excision repair (NER) pathway. NER is a complex molecular mechanism that repairs damaged DNA in three stages: recognition, verification, and repair. Each stage involves different protein complexes. Researchers built a 3D model of PInC using various biophysical techniques and AlphaFold2 for structure prediction, and then used molecular dynamics simulations to reveal its dynamic properties and functional mechanisms. This research sheds light on genetic disorders related to NER, such as xeroderma pigmentosum and Cockayne syndrome, and provides crucial insights for developing novel treatments.

Read more

World's Longest Immersed Tunnel: Linking Denmark and Germany

2025-03-10
World's Longest Immersed Tunnel: Linking Denmark and Germany

Denmark and Germany are building the world's longest immersed tunnel, the Fehmarnbelt Fixed Link, set to open in 2029. This 18-kilometer tunnel will more than halve travel times between the two countries and become the world's longest combined road and rail tunnel. The €7 billion+ project uses 89 massive prefabricated concrete sections, each weighing 73,000 tons. Despite some environmental concerns, the project is expected to bring significant economic and environmental benefits, boosting freight and passenger traffic, and reducing carbon emissions.

Read more

Agentic AI: Convenience at the Cost of Privacy?

2025-03-08
Agentic AI: Convenience at the Cost of Privacy?

Signal President Meredith Whittaker warned at SXSW that the burgeoning field of agentic AI, while offering convenience, poses significant privacy risks. AI agents, designed to handle tasks like booking tickets and sending messages, require access to a user's browser, credit card information, calendar, and messaging apps—essentially granting them root-level permissions. This exposes user data to cloud servers, blurring the lines between application and OS layers. Whittaker argued this "putting your brain in a jar" approach undermines security and privacy, even threatening privacy-focused apps like Signal. She urged the industry to address the potential dangers of agentic AI, cautioning against sacrificing privacy for convenience.

Read more
Tech agentic AI

Slushies: A Warning for Parents of Young Children

2025-03-12
Slushies: A Warning for Parents of Young Children

New research suggests children under eight should avoid slushies due to the potential for glycerol intoxication syndrome. The brightly colored icy drinks contain high levels of glycerol, a sugar substitute that prevents freezing. This can lead to symptoms including loss of consciousness, low blood sugar, lactic acidosis, and hypokalaemia. While glycerol is present in some foods, the concentration in slushies is significantly higher. A study examined 21 children (ages 2-7) who experienced symptoms like those described above after consuming slushies, requiring emergency treatment. Although all recovered, researchers urge caution, particularly as there's a lack of transparency regarding glycerol levels in slushies, making it difficult to determine a safe dose. The Food Standards Agency already advises against slushies for children under four and limits consumption for those aged five to ten. This new research reinforces the need for parents to avoid giving slushies to children under eight.

Read more

The Year-Long Cover-Up of the H5N1 Dairy Outbreak

2025-03-11
The Year-Long Cover-Up of the H5N1 Dairy Outbreak

A year ago, the USDA and the dairy and cattle industries were in damage control mode regarding the H5N1 2.3.4.4b B3.13 outbreak. Initially, the virus was believed to spread exclusively through milk from lactating cows, leading to simplified control strategies. However, a new study reveals a different story: widespread transmission among both lactating and non-lactating cows, with respiratory spread likely the primary route. For a year, serological test results were suppressed, only recently being released. This exposes opacity in decision-making and a prioritization of economic interests over scientific truth. The study highlights the complexity and potential risks of H5N1, calling for more comprehensive control measures.

Read more

Writing C Code in Prolog: The C Plus Prolog Project

2025-03-13
Writing C Code in Prolog: The C Plus Prolog Project

The C Plus Prolog project attempts to merge Prolog and C. It leverages non-standard features of SWI-Prolog to translate Prolog code into C. The project uses Prolog's metaprogramming capabilities to implement advanced features like macros and generics. While verbose and error-prone, it explores the possibilities of macros in a systems programming language and demonstrates Prolog's potential for code generation. Despite its quirks, it offers a unique approach to cross-platform C development leveraging Prolog's capabilities.

Read more
Development

Oberwolfach Snapshots: Making Modern Mathematics Accessible

2025-03-11

The Mathematisches Forschungsinstitut Oberwolfach presents "Snapshots of modern mathematics," short texts on various aspects of the field written by visiting researchers and edited for clarity. Aimed at promoting understanding and appreciation of modern mathematics globally, the project was previously funded by the Klaus Tschira Foundation and the Oberwolfach Foundation. High school math is recommended as prerequisite.

Read more

The Vanishing Web and the Promise of LLMs

2025-03-16

The internet is slowly forgetting: every year, a significant portion of web pages disappears forever. The Internet Archive (IA) stands as a crucial guardian of this digital memory, yet its survival faces increasing challenges. The author argues that while preserving everything is economically infeasible, the powerful information compression capabilities of Large Language Models (LLMs), despite inaccuracies, are better than complete loss. Models like DeepSeek V3 already offer a compressed view of the internet. We should support institutions like IA and ensure that publicly released LLM weights are not lost, and that IA is included in LLM pre-training datasets.

Read more

PicoLisp Documentation: A Comprehensive Guide

2025-03-16

This document aims to guide you through mastering the PicoLisp programming language. It gathers scattered PicoLisp code and knowledge from the internet, providing tutorials, examples, and explanations of important concepts from beginner to advanced levels. The documentation covers efficient editing, different versions of PicoLisp (including the 64-bit version and ErsatzLisp in Java), online books, source code, and numerous useful libraries and frameworks such as Web.l, Macropis, and Pl-web. You'll learn how to build projects and share your creations with the community.

Read more
Development

UK Cloud Services Market: Oligopoly Concerns

2025-01-28
UK Cloud Services Market: Oligopoly Concerns

The Competition and Markets Authority (CMA) has released provisional findings from its investigation into the UK cloud services market. AWS and Microsoft hold a dominant 30-40% market share each, dwarfing Google's presence. High capital investment and technical barriers create significant entry hurdles, hindering customer switching. Microsoft leverages its software strength to further limit competition. The CMA proposes using new digital market powers to consider designating AWS and Microsoft with strategic market status (SMS), potentially implementing interventions like regulating egress fees, lowering technical barriers, and addressing Microsoft's licensing practices. This aims to boost competition, leading to better prices, service quality, and choice for UK businesses.

Read more

DeepEP: A High-Performance Communication Library for Mixture-of-Experts

2025-02-25
DeepEP: A High-Performance Communication Library for Mixture-of-Experts

DeepEP is a communication library designed for Mixture-of-Experts (MoE) and expert parallelism (EP), offering high-throughput and low-latency all-to-all GPU kernels (MoE dispatch and combine). It supports low-precision operations, including FP8. Optimized for the group-limited gating algorithm in DeepSeek-V3, DeepEP provides kernels for asymmetric-domain bandwidth forwarding (e.g., NVLink to RDMA). These kernels achieve high throughput, suitable for training and inference prefilling. SM (Streaming Multiprocessors) number control is also supported. For latency-sensitive inference decoding, low-latency kernels using pure RDMA minimize delays. A hook-based communication-computation overlap method is included, requiring no SM resources. The library is tested with InfiniBand and is theoretically compatible with RoCE.

Read more
Development GPU Communication

Cursor AI Hits a Wall: 800 Lines of Code Too Much?

2025-03-13
Cursor AI Hits a Wall: 800 Lines of Code Too Much?

A user encountered an issue with the Cursor AI coding assistant: it stopped working after exceeding 750-800 lines of code. The user's Hacker News post sparked a discussion about code organization and AI-assisted programming. Other users suggested splitting large files into smaller, modular components, leveraging Cursor's 'Agent' feature, and applying the Single Responsibility Principle to improve code maintainability and AI processing efficiency.

Read more
Development
1 2 52 53 54 56 58 59 60 260 261