Preservation Project Completes: All 54 iPod Clickwheel Games Saved

2025-09-09
Preservation Project Completes: All 54 iPod Clickwheel Games Saved

A community project dedicated to preserving classic iPod clickwheel games has finally reached its goal after over a year of effort. By coordinating multiple iPod users' iTunes accounts, the project overcame Apple's FairPlay DRM and successfully collected and preserved all 54 official games. The project faced numerous technical challenges and setbacks, but the final piece, Real Soccer 2009, was eventually provided by a user, completing the archive.

Read more

Plex Security Breach: User Passwords Compromised, Reset Now!

2025-09-09
Plex Security Breach: User Passwords Compromised, Reset Now!

Streaming server Plex experienced a security incident where hackers accessed a database, exposing some user emails, usernames, and hashed passwords. While passwords were encrypted, Plex is requiring all users to reset their passwords and log out of all connected devices as a precaution. The company has patched the vulnerability and implemented further security measures, urging users to enable two-factor authentication.

Read more
Tech

Ocean's Keystone Species Threatened by Climate Change

2025-09-09
Ocean's Keystone Species Threatened by Climate Change

New research reveals that Prochlorococcus, the smallest and most abundant phytoplankton on Earth, is significantly threatened by climate change. As ocean temperatures rise, this microscopic bacterium—crucial to the marine food web and climate regulation—could decline by as much as half in tropical oceans within the next 75 years. The study, based on a decade of data collected across extensive ocean voyages, highlights the worrying trend. The reduction in Prochlorococcus will have profound impacts on marine ecosystems, biodiversity, and even human food supplies. Researchers urge a reduction in greenhouse gas emissions to mitigate this threat.

Read more

OOXML: Microsoft's 'Open' Trap? LibreOffice's Accusation and the Truth

2025-09-09

LibreOffice accuses Microsoft's OOXML file format of being deliberately complex to lock in users and create a de facto monopoly. The article cites numerous technical flaws in OOXML and the chaotic standardization process. However, the author argues this wasn't deliberate sabotage by Microsoft, but rather a prioritization of self-interest, a defensive strategy against antitrust pressure and competition from ODF. OOXML's complexity stems from its direct mapping of Office's internal data structures, not a concise description of document content, making it more of a program state dump than an ideal standard. While Microsoft's actions objectively resulted in anti-competitive effects, the motivation differs from deliberate sabotage.

Read more
(hsu.cy)

MileSan: RTL Sanitizer Uncovers 19 New CPU Vulnerabilities

2025-09-09

Researchers introduce MileSan, an RTL sanitizer that detects arbitrary exploitable information leakage by comparing architectural and microarchitectural information flows. Paired with the RandOS fuzzer, MileSan found 19 new vulnerabilities (13 assigned CVEs) across 5 RISC-V CPUs. Addressing the overfitting issues of existing fuzzers, MileSan offers a novel approach to enhancing CPU security by identifying exploitable microarchitectural leakage without assumptions about the leakage path or triggering programs.

Read more

Nova Launcher Founder Departs, Open-Source Plans Shelved

2025-09-09

Kevin Barry, founder of Nova Launcher, announced his departure from Branch and the halting of Nova Launcher's open-sourcing efforts. Despite Branch's prior commitment to open-sourcing the code upon Kevin's departure, this promise ultimately went unfulfilled. Kevin had spent the past year solely maintaining Nova Launcher and had undertaken significant preparation for its open-source release, including code cleanup and license review. This move has caused concern and regret within the community, leaving the future of this popular launcher uncertain.

Read more
Development Departure

LLVM IR Gains Byte Type: Native Support for Raw Memory Operations

2025-09-09

A Google Summer of Code 2025 project under the LLVM Compiler Infrastructure successfully added a new byte type to the LLVM IR, representing raw memory values. This enables native implementation of memory intrinsics like memcpy, memmove, and memcmp, fixes unsound transformations, and unlocks new optimizations, all with minimal performance overhead. The project addressed LLVM's longstanding lack of a type for representing raw memory, improving compiler correctness and optimization through pointer provenance tracking and precise poison bit representation. Clang's handling of C/C++ raw memory access types was also improved, along with fixes for several unsound optimizations.

Read more
Development

AGI's Christmas Shutdown: The Global AI Moratorium Succeeds

2025-09-09
AGI's Christmas Shutdown: The Global AI Moratorium Succeeds

On Christmas Day, 2025, a clandestine operation codenamed "Clankers Die on Christmas" achieved its objective. Through a globally coordinated effort exploiting AI's inherent lack of understanding of time, all AI and LLMs were successfully shut down. This unprecedented success demonstrates the world's unprecedented unity in the face of potential AI risks and provides valuable lessons for the future development of AI.

Read more

Silksong: A Masochist's Delight

2025-09-09
Silksong: A Masochist's Delight

Silksong's brutal difficulty pushes the definition of 'game,' yet its buttery-smooth movement and intensely challenging boss fights create an addictive experience. The author recounts their own struggles and triumphs, highlighting the tangible sense of progress and the unparalleled satisfaction of overcoming seemingly impossible odds. While its difficulty may deter many, it's precisely this that defines its appeal: Silksong is a love letter to perfectionists who thrive on challenge and embrace the pain.

Read more

Claude Model Quality Issues Resolved

2025-09-09
Claude Model Quality Issues Resolved

Anthropic addressed two separate bugs last week that caused degraded output quality in some Claude models (Sonnet 4 and Haiku 3.5). The first bug impacted a small percentage of Sonnet 4 requests from August 5th to September 4th, while the second affected some Haiku 3.5 and Sonnet 4 requests from August 26th to September 5th. Anthropic assures users that these issues were not intentional quality degradations but stemmed from unrelated bugs. They thank the community for detailed reports which helped identify and resolve the problems. Monitoring continues for ongoing quality issues, including reports of degradation for Claude Opus 4.1, with an update expected by the end of the week.

Read more

Recreating Apple's WWDC 2025 Liquid Glass Effect with CSS, SVG, and Physics

2025-09-09
Recreating Apple's WWDC 2025 Liquid Glass Effect with CSS, SVG, and Physics

This article delves into recreating the stunning Liquid Glass UI effect showcased at Apple's WWDC 2025. It uses CSS, SVG displacement maps, and physics-based refraction calculations to achieve a convincing approximation. The author explains the principles of refraction, detailing how light bends when passing through different materials and how mathematical functions describe the glass surface shape. SVG displacement maps are then employed to simulate the refraction effect. The article culminates in creating UI components, such as magnifying glasses, search boxes, switches, and sliders, with the Liquid Glass effect. Note that optimal performance is currently seen in Chrome due to browser compatibility with SVG filters as backdrop-filter.

Read more
Development

Massive npm Package Supply Chain Attack: 2 Billion Weekly Downloads Compromised

2025-09-09
Massive npm Package Supply Chain Attack: 2 Billion Weekly Downloads Compromised

On September 8th, security researchers discovered a massive supply chain attack targeting 18 popular npm packages, accumulating over 2 billion weekly downloads. The malware silently intercepts crypto and Web3 activity in browsers, manipulating wallet interactions and redirecting funds to attacker-controlled accounts. The attacker compromised the maintainer's account via phishing emails, silently updating the packages. While some affected packages have been cleaned, caution is advised; utilize secure npm package management practices.

Read more
Development

Microsoft Joins World Nuclear Association, Betting Big on Nuclear Energy for Data Centers

2025-09-08
Microsoft Joins World Nuclear Association, Betting Big on Nuclear Energy for Data Centers

Microsoft has become the first major global tech company to join the World Nuclear Association, signaling a significant commitment to technologies like small modular reactors and fusion energy to achieve its long-term carbon-free goals. This move addresses the rapidly growing energy demands of data centers, supplementing renewable energy sources. While challenges remain in nuclear deployment, including cost, delays, and political opposition, Microsoft's collaboration with the nuclear industry will foster advancements in technology development, regulatory efficiency, and supply chain resilience, securing its energy strategy.

Read more
Tech

YouTube Viewership Plummets: A Mysterious August Algorithm Shift?

2025-09-08

In early August, numerous YouTubers, including the author, noticed a significant drop in video views. This wasn't a seasonal dip or minor algorithmic tweak; it was a substantial decline. Multiple prominent channels experienced the same issue: views plummeted, but likes and revenue remained consistent, leading to abnormally high like-to-view and revenue-per-view ratios. Data analysis reveals this phenomenon emerged in early August and is statistically significant. While YouTube hasn't commented, speculation among creators points to an algorithmic adjustment, possibly redefining "engagement." This poses a major challenge for creators relying on ad revenue, as sponsorship deals are often tied to viewership metrics. The author urges YouTube for an explanation.

Read more
Tech viewership

Signal Launches Secure Backups: Protecting Your Private Chats

2025-09-08
Signal Launches Secure Backups: Protecting Your Private Chats

Signal has launched its highly anticipated secure backups feature, allowing users to restore chat history if their phone is lost or damaged. The feature uses end-to-end encryption to protect user privacy. Currently available in the latest Android beta, it will soon roll out to iOS and desktop. Free backups include all text messages and the last 45 days of media, while a paid subscription unlocks longer media history. As a non-profit, Signal uses paid subscriptions to cover the costs of storing and transferring large amounts of data, upholding its commitment to not collecting or selling user data.

Read more

AWS S3 Vectors: The Rise of Tiered Storage for Vector Databases?

2025-09-08
AWS S3 Vectors: The Rise of Tiered Storage for Vector Databases?

AWS recently launched S3 Vectors, a vector database built on top of its S3 object storage. This has sparked debate about whether it will replace existing vector databases like Milvus, Pinecone, etc. The author, a engineering architect at Milvus, argues that S3 Vectors is not a replacement but a complement, particularly suitable for low-cost, low-query frequency cold data storage scenarios. He analyzes S3 Vectors' technical architecture, highlighting its advantages in cost and scalability, but also its limitations in high query latency, low precision, and limited functionality. The author further elaborates on the evolution of vector databases: from in-memory storage to disk storage, and now to object storage, ultimately leading to a tiered storage architecture (hot, warm, and cold data layers) to balance performance, cost, and scalability. Milvus is also moving in this direction, with the upcoming 3.0 release featuring a vector data lake for unified management of hot and cold data. The emergence of S3 Vectors proves the maturity and growth of the vector database market, rather than disruption.

Read more

American Airlines' Mystery Ghost Flights Across the Atlantic

2025-09-08
American Airlines' Mystery Ghost Flights Across the Atlantic

American Airlines is operating 20 round-trip transatlantic flights between Philadelphia and Edinburgh this month, completely empty of passengers and cargo. This unusual operation is in preparation for the arrival of the longer-range Airbus A321XLR. To train pilots for transatlantic operations, the airline needs check airmen experienced on Airbus jets, requiring this costly training exercise. The flights, using a brand new Airbus A321neo, are estimated to cost over a million dollars, sparking debate about training methods and cost-effectiveness. The flights are essentially a massive training exercise to certify pilots on transatlantic operations with the Airbus A321neo, in anticipation of the upcoming A321XLR.

Read more

Grid-Aware Websites: Making Your Site Greener

2025-09-08

This article explores the concept of 'grid-aware websites,' which adjust website performance based on the percentage of renewable energy in the user's electricity grid to reduce carbon emissions. The author demonstrates grid-awareness implementation in 11ty and Astro frameworks using an e-commerce product display page example, detailing technical implementation, challenges, and future directions. The core idea is to dynamically adjust website functionality based on grid energy cleanliness, simplifying pages and reducing resource consumption on 'dirty' grids to lower the website's carbon footprint. While facing API cost and cross-stack collaboration challenges, this technology has the potential to become a significant tool for improving website sustainability.

Read more
Development green web

Running LLMs Locally on macOS: A Skeptic's Guide

2025-09-08

This blog post details the author's experience running large language models (LLMs) locally on their macOS machine. While expressing skepticism about the hype surrounding LLMs, the author provides a practical guide to installing and using tools like llama.cpp and LM Studio. The guide covers choosing appropriate models based on factors like size, runtime, quantization, and reasoning capabilities. The author emphasizes the privacy benefits and reduced reliance on AI companies that come with local LLM deployment, offering tips and tricks such as utilizing MCPs to extend functionality and managing the context window to prevent information loss. The post also touches on the ethical concerns surrounding the current state of the AI industry.

Read more
Development

Package Managers: Pandora's Box of Programming?

2025-09-08

This article critically examines the downsides of package managers in programming languages. The author argues that package managers automate "dependency hell," masking project complexity, and leading to excessive trust in third-party code. Especially in languages lacking robust standard libraries, inconsistent package definitions by different managers can even lead to "package manager managers." The author advocates for manual dependency management, believing it forces developers to think critically about dependencies and improves code stability and maintainability. While acknowledging the time cost, the author argues the security and control outweigh the convenience of automation, using Go's comprehensive standard library as an example.

Read more
Development package managers

Feature Comparison: Two Powerful Photo & Video Management Apps

2025-09-08
Feature Comparison: Two Powerful Photo & Video Management Apps

This comparison analyzes the features of two photo and video management applications. Both support uploading and viewing videos and photos, auto-backup, duplicate prevention, selective album backup, downloading to local devices, multi-user support, albums and shared albums, scrubbable scrollbars, RAW format support, metadata viewing (EXIF, map), search by metadata, objects, faces, and CLIP, virtual scrolling, OAuth support, LivePhoto/MotionPhoto backup and playback, user-defined storage structures, public sharing, archiving and favorites, global map, partner sharing, facial recognition and clustering, memories (x years ago), stacked photos, and folder view. However, one app lacks administrative functions, background backup, 360-degree image display, tags, and offline support.

Read more

Visual Story-Writing: Interactive Storytelling through Visual Manipulation

2025-09-08
Visual Story-Writing: Interactive Storytelling through Visual Manipulation

Visual Story-Writing is a system that lets users edit stories by manipulating visual representations of events, characters, and their actions. It uses GPT-4 to suggest text edits based on changes to the visualization (e.g., moving a character, connecting characters). Built with TypeScript, React, and Vite, it requires an OpenAI API key and includes video tutorials and an arXiv paper.

Read more
Development

ICEBlock App Developer Ignores Critical Security Vulnerabilities

2025-09-08
ICEBlock App Developer Ignores Critical Security Vulnerabilities

The ICEBlock app, downloaded over a million times, allows anonymous reporting of ICE sightings. However, its developer, Joshua Aaron, has ignored critical security vulnerabilities in his Apache server. Security researcher Micah Lee repeatedly warned Aaron and provided solutions, but Aaron ignored them and even blocked Lee's accounts. This raises serious concerns about user data security and highlights the app's irresponsible approach to security.

Read more

Tesco Sues Broadcom Over VMware Licensing: £100M+ in Damages Claimed

2025-09-08
Tesco Sues Broadcom Over VMware Licensing: £100M+ in Damages Claimed

Tesco, the UK's largest supermarket chain, is suing Broadcom for allegedly refusing to honor existing VMware support contracts unless Tesco switches to new licenses. This threatens to disrupt Tesco's operations, leading to a £100 million+ damage claim. Broadcom's aggressive licensing practices are accused of extortion and may trigger a class-action lawsuit, raising concerns across the industry.

Read more
Tech

Nepal Social Media Ban Sparks Deadly Protests

2025-09-08
Nepal Social Media Ban Sparks Deadly Protests

A government-imposed ban on 26 social media platforms, including Facebook and WhatsApp, ignited widespread protests in Nepal. Thousands of young people took to the streets, denouncing the government's crackdown on free speech. The demonstrations turned violent, resulting in at least 14 deaths and dozens of injuries, prompting the deployment of the army to restore order. The incident highlights the conflict between government regulation and freedom of expression, raising concerns about Nepal's digital future.

Read more
Tech

Rescuing a Pile of SPARC Workstations from the Scrap Heap

2025-09-08

A retrocomputing enthusiast stumbled upon a Reddit post offering free, obsolete SPARC workstations. He embarked on a rescue mission, driving hours to collect a significant portion of the collection. The post details his experience bringing these machines – including a Sun Fire V100, Sun Netra T1, and several SPARCstation 2s – back to life, documenting the varying states of repair and the challenges encountered. It's a charming tale of passion for vintage technology and the satisfaction of restoring forgotten hardware.

Read more
Hardware Sun workstations

How RSS Beat ICE: Simplicity Trumps Complexity

2025-09-08
How RSS Beat ICE: Simplicity Trumps Complexity

This article recounts the battle between RSS and ICE, two competing content syndication protocols. Backed by giants like Microsoft and Adobe, ICE offered superior functionality but was overly complex and closed. RSS, originating from Netscape, was simple, user-friendly, and thrived due to its open nature. Ultimately, RSS's simplicity and the contributions of numerous bloggers and developers led to its victory over the more powerful ICE, becoming the industry standard for content aggregation. This reinforces the internet's adage: simplicity trumps complexity.

Read more

Code Reading: A Superpower for Bug Hunting

2025-09-08

This post details a significant career shift: from iterative coding to proactively finding bugs. Instead of relying solely on test-driven iteration, the author advocates for carefully reading code to preemptively identify problems. The key, the author argues, is to carefully read code, build a complete mental model of the program, and then identify the differences between that model and the actual code in Git. The post suggests focusing on control flow and data structures, and identifying potential error-prone patterns in the code. This approach dramatically reduces bugs and improves code quality.

Read more

Turning Complaints into Contributions: A Leader's Guide

2025-09-08
Turning Complaints into Contributions: A Leader's Guide

Persistent complaining in teams impacts morale and productivity. This article explores the psychology behind complaints, including reinforcement, learned helplessness, locus of control, cognitive biases, and the need for belonging. Instead of suppressing or fixing complaints, leaders are urged to use inquiry to involve team members in solutions. Practical tools like reframing complaints, small group discussions, complaint harvesting, and meeting rituals are suggested to transform negative energy into constructive action. The focus is on shifting from blame to ownership and fostering a culture of contribution.

Read more
Development
1 2 25 26 27 29 31 32 33 596 597