Apple Hit with $162M Fine in France Over App Tracking Transparency

2025-03-31
Apple Hit with $162M Fine in France Over App Tracking Transparency

France's antitrust authority fined Apple €150 million ($162 million) for abusing its dominant position in the mobile app market. The fine targets Apple's App Tracking Transparency (ATT) feature, introduced in April 2021, which requires apps to ask users for permission before tracking their data. While the feature aims to enhance privacy, the regulator ruled that its implementation was excessively complex and disproportionately harmed smaller app developers who rely on data collection. Apple maintains that ATT offers improved user control and has received widespread support, but the fine stands.

Read more
Tech

Linux Desktop: Great; Linux Server: A Mess? FreeBSD's Elegant Response

2025-03-31
Linux Desktop: Great; Linux Server: A Mess? FreeBSD's Elegant Response

The author contrasts the desktop and server experiences of Linux, finding the desktop remarkably user-friendly. However, the server side suffers from excessive complexity due to systemd and abstraction layers like Docker and Kubernetes, making troubleshooting difficult. FreeBSD, conversely, shines with its simplicity, stability, and ease of maintenance, even in disaster recovery scenarios. However, a growing trend of open-source software relying heavily on Docker deployment, lacking native installation methods, poses a challenge for FreeBSD users. The author highlights deployment difficulties with Immich and BunkerWeb as examples.

Read more
Development Server Administration

Oracle Security Incident: Hacker Claims Breach and Data Leak

2025-03-31
Oracle Security Incident: Hacker Claims Breach and Data Leak

A hacker, claiming to be rose87168, has allegedly breached Oracle's internal systems and leaked sensitive information, including customer data. The hacker provided evidence including credentials to access Oracle Access Manager, recordings of internal meetings, and internal Oracle configuration files. While Oracle denies a cloud breach, multiple security firms and media outlets have confirmed the data leak, including employee email addresses and customer data. The hacker remains active, releasing more data and threatening further disclosures.

Read more
Tech

1995's Predictions for 2025: Hits and Misses

2025-03-31
1995's Predictions for 2025: Hits and Misses

This article revisits predictions made in 1995 about life in 2025. Some predictions, such as the widespread adoption of the internet and mobile devices, were surprisingly accurate. Others, like supersonic passenger planes and a Mars colony, completely missed the mark. The article explores the relationship between prediction accuracy and the context of the time, noting that technological advancements don't always translate to increased leisure time.

Read more

Turso Offline Sync Public Beta: Always-On Apps, Even Offline

2025-03-31
Turso Offline Sync Public Beta: Always-On Apps, Even Offline

Turso is thrilled to announce the public beta of Turso Offline Sync! Your applications can now function seamlessly, even without internet connectivity. Local database operations continue normally, automatically syncing upon reconnection. Leveraging embedded replicas, your local database (on-device or server) stays in sync with your Turso Cloud database, with changes propagated to all replicas. This beta addresses previous limitations of unidirectional sync, enabling fast local writes, offline capabilities, and later syncing to the Turso Cloud. This simplifies development for local-first apps, mobile apps, POS systems, field data collection, and IoT applications. The beta currently supports TypeScript and Rust, and includes features like bi-directional sync, remote write support, WAL sync checkpointing, and conflict detection (resolution coming soon).

Read more
Development offline sync

Yankees' 'Torpedo Bat' Shakes Up MLB: Physics-Defying Slugger or Fair Game?

2025-03-31
Yankees' 'Torpedo Bat' Shakes Up MLB: Physics-Defying Slugger or Fair Game?

The New York Yankees unveiled a revolutionary bat designed by an MIT physicist, dubbed the 'Torpedo bat'. Its unique design, featuring a thicker barrel closer to the handle, significantly improves hitters' contact and power, leading to a franchise-record 9 home runs in a single game. While currently legal under MLB rules, the bat's effectiveness has sparked debate about the future of baseball, with some calling for rule changes.

Read more
Game

Bangkok Basin's Long-Period Ground Motion: A Love Wave Story

2025-03-31
Bangkok Basin's Long-Period Ground Motion: A Love Wave Story

This study analyzes horizontal elastic response spectra of earthquake ground motion in the Bangkok basin. It finds significant amplification of spectral energy at long periods (0.5-2s) within the basin, linked to surface wave arrivals. Analysis of different parts of accelerograms confirms that long-period energy is associated with surface wave propagation, not source effects. HVSR analysis reveals predominant frequencies between 5.1-5.5s for basin stations, consistent with elastic spectra. Analysis of the 2008 Mw 7.9 event shows that low-frequency ground motion (0.1-0.3Hz) in the basin is influenced by locally generated surface waves, particularly Love waves. Further research is recommended, including large-array observations with reliable low-frequency seismometers and 2D/3D basin-structure ground motion modeling.

Read more

Transatlantic 1-2-3 Debugging: A Zeroth Law Story

2025-03-31
Transatlantic 1-2-3 Debugging: A Zeroth Law Story

Around 1990, the author debugged a client's Lotus 1-2-3 setup via fax due to expensive transatlantic phone calls. By guiding the client through commands like `/ppomr` and `/ppoml` to obtain printer margin information, the issue was resolved. This highlights the 'Zeroth Law of Debugging': use the smallest, fastest test case for rapid iteration and efficient problem-solving.

Read more
Development remote debugging

Run Unmodified Minecraft in Your Browser with Browsercraft

2025-03-31

Browsercraft lets you play an unmodified version of Minecraft (1.2.5) directly in your browser using CheerpJ, a Java runtime for modern browsers built on WebAssembly. CheerpJ runs any Java application without modification, making this a unique feat. While still a work in progress (audio is currently unsupported), the project is open-source and welcomes contributions.

Read more
Game

Windows 11's Blue Screen of Death Gets a Makeover

2025-03-31
Windows 11's Blue Screen of Death Gets a Makeover

Microsoft is revamping the Blue Screen of Death (BSOD) in Windows 11. The new design ditches the classic blue screen, sad face, and QR code for a simpler, black screen reminiscent of Windows update screens. Currently appearing as green in test builds, the final color remains unclear. Microsoft aims for faster user recovery while retaining technical details. This is the first major redesign since the sad face addition in Windows 8. The new BSOD simply states, "Your device ran into a problem and needs to restart."

Read more
Development BSOD UI redesign

Nova Act SDK: A Crucial Step Towards Reliable Agents

2025-03-31
Nova Act SDK: A Crucial Step Towards Reliable Agents

The Nova Act SDK simplifies the development of intelligent agents by allowing developers to break down complex workflows into atomic commands (like search, checkout, answering on-screen questions), add more detailed instructions to these commands (e.g., "don't accept the insurance upsell"), and call APIs, thus improving reliability. As intelligent agents are still in their early stages, the Nova Act SDK represents a crucial advancement.

Read more

Those White Crystals on Your Cheese: A Delicious Secret

2025-03-31
Those White Crystals on Your Cheese: A Delicious Secret

Confused by white stuff on your cheese? Don't throw it away! This article reveals the secret of those white crystals. They're not mold, but rather calcium lactate, tyrosine, or leucine crystals – signs of a well-aged cheese, adding unique texture and flavor. Learn about the different types, their formation, appearance, and taste. This guide helps you distinguish them and identify high-quality aged cheese. Next time you see white crystals, confidently savor the delicious reward of time and craftsmanship.

Read more

Unexpectedly Large Isospin Symmetry Violation Found at CERN

2025-03-31
Unexpectedly Large Isospin Symmetry Violation Found at CERN

Analysis of data from CERN's NA61/SHINE collaboration revealed a surprising anomaly: a significant imbalance between charged and neutral kaons produced in argon-scandium collisions. Charged kaons were produced 18.4% more frequently than neutral kaons, suggesting a much larger violation of isospin symmetry than predicted by existing models. This challenges our understanding of the strong interaction and quantum chromodynamics (QCD), opening avenues for further research into the role of electromagnetic interactions and quark behavior. The 4.7σ significance of the result demands further investigation and theoretical explanations.

Read more

Nvidia's GTC Reveal: Will DGX Spark and Station Disrupt the PC Market?

2025-03-31
Nvidia's GTC Reveal: Will DGX Spark and Station Disrupt the PC Market?

Nvidia unveiled two new workstations at its GTC event, the DGX Spark and DGX Station, aimed at AI developers. DGX Spark is a compact desktop, while DGX Station is a more powerful workstation-class machine, both offering significant AI compute power. While analysts believe Nvidia is attempting to expand its enterprise footprint, the high price point and niche market focus raise questions about their potential to truly "disrupt" the broader PC market. Nvidia's strategy appears more focused on empowering developers with powerful AI tools than targeting the general consumer market. Concurrently, Nvidia is aggressively expanding into software and networking infrastructure, aiming to build a complete enterprise-grade AI ecosystem.

Read more
Tech

Tracking Login Failures: A Key to Better User Experience

2025-03-31
Tracking Login Failures: A Key to Better User Experience

Do you only focus on login success rates while ignoring login failure rates? This article highlights the importance of tracking login failure rates, which helps you identify and resolve user login issues and improve user experience. It details how to define and measure login failure rates and analyzes common causes of login failures, such as system performance, poor user experience, and security measures. By tracking login failure rates, you can understand user behavior, improve login processes, and ultimately improve user retention and business value.

Read more
Development login failures

Chrome 135: Fully Customizable `<select>` Elements with CSS

2025-03-31
Chrome 135:  Fully Customizable `<select>` Elements with CSS

Chrome 135 brings a major update: full CSS customization of the `` element. Years in the making, this delivers a standardized, accessible, and stylable ``. Developers can now use the new `appearance: base-select` property to unlock rich customization features, including adding rich HTML content (like images and SVGs) to `` elements, without breaking older browsers. While parser changes exist, Chrome mitigates the risk of breaking existing websites with a Finch experiment. This update opens doors to create far more engaging and meaningful `` experiences.

Read more
Development

Attack Hidden in Plain Sight: Tenant-Level Security Analysis Unmasks Malicious Activity

2025-03-31
Attack Hidden in Plain Sight: Tenant-Level Security Analysis Unmasks Malicious Activity

A security team uncovered a seemingly ordinary user login that masked a sophisticated attack targeting 24 users. The attacker used the Microsoft Azure CLI, attempting logins from a Mexican data center with no more than two attempts per user to avoid brute-force detection. They also utilized IPs from the 2001:0470:c8e0::/48 range to evade IOC-based detection. By analyzing login activity at the tenant level, rather than focusing on individual users, the team successfully identified the attack. This highlights the importance of tenant-wide log analysis to uncover malicious activities hidden within seemingly normal user behavior.

Read more

Microrobot Takes Flight: Tiny, Untethered Flying Robot Achieves New Milestone

2025-03-31
Microrobot Takes Flight: Tiny, Untethered Flying Robot Achieves New Milestone

Researchers at UC Berkeley have developed a tiny, untethered flying robot with a wingspan of less than a centimeter. Powered wirelessly by external magnetic fields, its current range is limited, but the team suggests improvements could extend its capabilities. This breakthrough opens possibilities for search and rescue, industrial inspection, and even pollination, setting a new record for the smallest flying robot.

Read more

Gemini 2.5 Pro: The New King of Code Generation?

2025-03-31
Gemini 2.5 Pro: The New King of Code Generation?

Google's Gemini 2.5 Pro, launched on March 26th, claims coding, reasoning, and overall superiority. This article focuses on a head-to-head comparison with Claude 3.7 Sonnet, another top coding model. Through four coding challenges, Gemini 2.5 Pro demonstrated significant advantages in accuracy and efficiency, especially with its million-token context window enabling complex task handling. While Claude 3.7 Sonnet performed well, it paled in direct comparison. Gemini 2.5 Pro's free access further enhances its appeal.

Read more
AI

Vietnamese Banking Apps Caught Using Private iOS APIs to Spy on Users

2025-03-31
Vietnamese Banking Apps Caught Using Private iOS APIs to Spy on Users

Two popular Vietnamese banking apps, BIDV SmartBanking and Agribank Plus, have been found to use hidden private iOS APIs to detect other apps installed on users' iPhones. Security researchers discovered that the apps, developed by VNPay, leverage commercial mobile app protection software and custom code called "VNPay Runtime Protection." This code exploits a side-channel vulnerability in a private iOS API to identify apps and uses weak XOR encryption to hide API strings. This violates Apple's App Store policies and risks app removal, impacting millions of users. The incident is unrelated to a mobile security solution, BShield.

Read more

California Surpasses Gas Stations in EV Chargers

2025-03-31
California Surpasses Gas Stations in EV Chargers

California has reached a major milestone: 178,549 public and shared private EV chargers, exceeding the number of gas nozzles by 48%. Governor Newsom highlighted this achievement, contrasting California's pro-EV stance with federal policies. The California Energy Commission estimates over 162,000 Level 2 and nearly 17,000 DC fast chargers, plus an estimated 700,000+ Level 2 home chargers. A $1.4 billion investment plan is expanding zero-emission infrastructure, including projects like the Fast Charge California Project installing DC fast chargers in public spaces.

Read more
Tech

Bell Labs Holmdel: From Research Hub to Thriving Tech Community

2025-03-31
Bell Labs Holmdel: From Research Hub to Thriving Tech Community

The Bell Labs Holmdel Complex in New Jersey, a former research and development facility for Bell System and Bell Labs, underwent a remarkable transformation. This iconic Eero Saarinen–designed building, once home to thousands of engineers and researchers and the site of Nobel Prize-winning work, was repurposed into Bell Works, a vibrant mixed-use development. Now a thriving community, it houses tech startups, residential spaces, retail, and entertainment, seamlessly blending its mid-century modern architecture with contemporary design.

Read more

The Eco Cycle: How Tech Turns from Miracle to Burden

2025-03-31

This article explores the 'Eco Cycle,' where technology initially offers convenience and innovation but eventually becomes a burden as it becomes mainstream. Using examples like fax machines, email, cars, and smartphones, the author illustrates how technology shifts from an empowering tool to a source of disruption. It argues that traffic jams aren't a technological problem, but rather a consequence of humanity's endless pursuit of convenience. Ultimately, the author calls for a rejection of constant connection and a liberation from technological dependence to achieve true freedom.

Read more

Compiler Options Hardening Guide for C and C++: A Security Deep Dive

2025-03-31

This OpenSSF guide details compiler and linker options to enhance the security and reliability of C/C++ code. It recommends flags for compile-time vulnerability detection and runtime protection against buffer overflows and control-flow hijacking. The guide analyzes performance trade-offs and use cases for each option, stressing the importance of secure coding practices.

Read more

NoteUX: A Beautifully Designed Note-Taking App

2025-03-31

NoteUX is a beautifully designed note-taking app that helps you quickly capture, organize, and optimize your thoughts effortlessly. Its clean interface features multiple scratch pads, dark mode, fullscreen mode, auto-save, word count, and the ability to download notes as .txt files. Perfect for writers, students, and professionals alike, NoteUX enhances productivity and creativity.

Read more
Development

Sweden Designates Demoscne as UNESCO Heritage

2025-03-31
Sweden Designates Demoscne as UNESCO Heritage

Sweden has designated the demoscene as a national UNESCO intangible cultural heritage. The demoscene, arguably the oldest creative digital subculture, has maintained its values and traditions amidst technological and economic shifts. While core to it is the competition to push hardware limits, the demoscene encompasses diverse activities: creating quirky works, maintaining online communities, organizing parties, and more. The author emphasizes the scene's diversity and inclusivity, appealing to both nostalgic programmers and unconventional artists.

Read more

Nvidia's AI Power Play: Moore's Law is Dead, Long Live the 600kW Rack

2025-03-31
Nvidia's AI Power Play: Moore's Law is Dead, Long Live the 600kW Rack

At Nvidia's GTC, Jensen Huang unveiled Nvidia's next three generations of GPUs, including the Blackwell and Rubin processors, and a massive 600kW rack-scale system. This reveals Nvidia's strategy to pursue massive compute power expansion by stacking more silicon, increasing memory bandwidth, and lowering precision, post-Moore's Law. However, this brings immense power consumption and cooling challenges, necessitating the construction of specialized "AI factories." Nvidia's move also paves the way for competitors, signaling a new era of ultra-dense computing in data centers.

Read more
Tech AI Compute

Downloading Games from the Radio in the 1980s: A Forgotten Chapter of Computing History

2025-03-31
Downloading Games from the Radio in the 1980s: A Forgotten Chapter of Computing History

In the 1980s UK, amidst economic recession, the BBC launched a public education initiative: The Computer Literacy Project. Beyond the famous BBC Micro and TV programs, a lesser-known Radio 4 series, 'The Chip Shop Takeaway,' utilized BASICODE, a system allowing software to run on various home computers. This involved broadcasting programs, including simple text-based games, that listeners could record and play. Though largely forgotten, this unique software distribution method highlights the ingenuity and limitations of early home computing.

Read more
Tech

Control WhatsApp with Claude: A WhatsApp MCP Server

2025-03-31
Control WhatsApp with Claude: A WhatsApp MCP Server

This project integrates WhatsApp with the Claude large language model (LLM). A Go bridge connects to the WhatsApp Web multi-device API, storing messages locally in a SQLite database. A Python server implements the Model Context Protocol (MCP), enabling Claude to search messages, contacts, and send messages via a set of tools. All processing is local, prioritizing user privacy.

Read more
Development
1 2 339 340 341 343 345 346 347 596 597