MRubyD: A C#-based mruby VM for Seamless Game Engine Integration

2025-03-24
MRubyD: A C#-based mruby VM for Seamless Game Engine Integration

MRubyD is a new mruby virtual machine implemented in pure C#, designed for seamless integration with C#-based game engines. Leveraging modern C# features, it boasts high performance and extensibility, prioritizing Ruby API compatibility. Currently in preview, some features like built-in types and methods, as well as private/protected visibility, are under development. Install via `dotnet add package MRubyD` and explore its capabilities through the provided examples. It requires the native mruby compiler for compiling .rb source code into .mrb bytecode.

Read more
Development

ARC-AGI-2: The AGI Benchmark That's Easier for Humans, Harder for AI

2025-03-24
ARC-AGI-2: The AGI Benchmark That's Easier for Humans, Harder for AI

The ARC Prize 2025 competition returns with ARC-AGI-2, a significantly harder AGI benchmark for AI while remaining relatively easy for humans. Focusing on tasks simple for humans but difficult for AI, ARC-AGI-2 highlights capability gaps not addressed by simply scaling up existing models. With a $1 million prize pool, the competition encourages open-source innovation towards efficient, general AI systems, aiming to bridge the human-AI gap and achieve true AGI.

Read more
AI

Flexible Authorization Library: RBAC, ABAC, and ReBAC Combined

2025-03-24
Flexible Authorization Library: RBAC, ABAC, and ReBAC Combined

A flexible authorization library combining role-based (RBAC), attribute-based (ABAC), and relationship-based (ReBAC) access control policies. It supports policy composition (AND, OR, NOT), detailed evaluation tracing, and a fluent builder API, with type safety and async support. Easily add multiple policies like RBAC and ABAC, and create custom policies using PolicyBuilder. Examples demonstrate RBAC, ReBAC, and policy combinators.

Read more
Development authorization

MIT Researchers Discover the Tipping Point of Pedestrian Flow

2025-03-24
MIT Researchers Discover the Tipping Point of Pedestrian Flow

MIT researchers have discovered a critical parameter determining the transition from ordered to disordered pedestrian flow: "angular spread." When pedestrians deviate from straight paths by more than 13 degrees, the crowd flow becomes chaotic and inefficient. This research, combining mathematical modeling and experiments, offers valuable insights for public space design, promoting safer and more efficient pedestrian traffic. The findings, validated through experiments tracking volunteers navigating a simulated crosswalk, provide a quantifiable metric for predicting lane formation and potential congestion.

Read more

FaunaDB Shuts Down, Going Open Source After $27M in Funding

2025-03-24
FaunaDB Shuts Down, Going Open Source After $27M in Funding

FaunaDB, a database startup that raised $27 million in funding, announced it will shut down its service at the end of May, transitioning to an open-source model. The company, boasting 25,000 developers using its serverless database which combined relational power and document flexibility, cited the capital-intensive nature of scaling a global database service and the current market environment as reasons for the shutdown. Existing customers will be transitioned off the service over the coming months. The open-source release will include the core database technology, supporting JSON documents with relational features like joins, foreign keys, and schema enforcement, along with its FQL query language. Some observers suggest that an open-source approach from the beginning might have led to greater success.

Read more
Development

My Bosch Dishwasher Demands a Cloud Connection: A Lament

2025-03-24

The author bought a Bosch 500 series dishwasher, praising its easy installation. However, key features like delayed start and eco mode require a Home Connect app and Wi-Fi connection. This sparked a reflection on manufacturers' over-reliance on cloud control, potentially contributing to planned obsolescence and data harvesting. The author argues that appliances should prioritize local control, with cloud features as add-ons, not replacements for core functionality. This creates unnecessary obstacles and dependence on internet access for basic operations.

Read more

Intel Pentium: The FDIV Bug and the Rise of the Pentium Pro

2025-03-24
Intel Pentium: The FDIV Bug and the Rise of the Pentium Pro

By 1994, Intel's Pentium processor, based on the x86 architecture, dominated the PC market with a 75% share. However, a significant flaw, the FDIV bug, surfaced, causing inaccurate results in certain floating-point calculations. This led to a costly recall and replacement program. Despite this setback, the Pentium's success fueled Intel's growth. In 1995, Intel launched the groundbreaking Pentium Pro, featuring the innovative P6 architecture. Outperforming competitors, the Pentium Pro successfully penetrated the workstation and server markets, laying the foundation for Intel's future dominance.

Read more
Tech

OpenAI Pleads with Trump: Loosen Copyright Restrictions or the US Loses the AI Race

2025-03-24
OpenAI Pleads with Trump: Loosen Copyright Restrictions or the US Loses the AI Race

OpenAI warns that the US will lose the AI race to China if it can't access copyrighted material for AI training. They're urging the Trump administration to create more lenient "fair use" rules, allowing AI models to utilize copyrighted data for training. OpenAI argues that China's rapid AI advancements, coupled with restrictive US data access for AI models, will result in American defeat. This move has sparked outrage from copyright holders and publishers, who fear unauthorized use of their works for AI training and increased plagiarism. OpenAI counters that using copyrighted data is crucial for developing more powerful AI, vital for US national security and competitiveness.

Read more
Tech

Planet's Daily Global Aircraft Detection from Satellite Imagery

2025-03-24

Planet has developed a daily global aircraft detection analytic feed using PlanetScope and SkySat imagery combined with machine learning. The system identifies aircraft ≥25 meters in length or wingspan, leveraging high-resolution SkySat imagery for improved accuracy. This technology offers valuable insights for defense, intelligence, and commercial sectors, enabling analysis of global air traffic patterns, economic trend prediction, and anomaly detection.

Read more

GM Forces Dealer to Halt Aftermarket CarPlay/Android Auto Kit for Ultium EVs

2025-03-24
GM Forces Dealer to Halt Aftermarket CarPlay/Android Auto Kit for Ultium EVs

General Motors (GM) forced a dealer to discontinue an aftermarket kit that restored Apple CarPlay and Android Auto phone mirroring in its Ultium electric vehicles. This follows GM's decision in December 2023 to remove CarPlay and Android Auto support from Ultium EVs, opting for its own in-vehicle infotainment systems in future models. While the kit's manufacturer, WAMS, claims rigorous testing, GM's action sparked industry criticism, as a study showed nearly half of car buyers wouldn't purchase vehicles lacking CarPlay or Android Auto. GM is effectively pushing dealers towards its built-in systems, leaving little alternative.

Read more
Tech

Critical Vulnerability in Kubernetes Ingress-Nginx: Arbitrary Code Execution

2025-03-24

Multiple critical vulnerabilities have been discovered in Kubernetes Ingress-Nginx, the most severe (CVE-2025-1974) with a CVSS score of 9.8, allowing for arbitrary code execution and potential cluster-wide Secret leakage. All versions prior to v1.11.5 and v1.12.1 are affected. Immediate upgrade to the latest version or temporary disabling of the Validating Admission Controller is strongly recommended.

Read more
Development

Remote Radioactive Material Detection: A 10-Meter Breakthrough

2025-03-24
Remote Radioactive Material Detection: A 10-Meter Breakthrough

Researchers at the University of Maryland have developed a novel method for remotely detecting radioactive materials using short-pulse CO2 lasers, achieving detection at a distance of 10 meters—over ten times farther than previous methods. The technique leverages the ionization of surrounding air by radioactive materials. By accelerating these ions with a laser, a cascade of ionization creates microplasmas that scatter laser light, enabling remote detection. This technology holds promise for nuclear disaster response and nuclear security, but challenges remain, including the size of the laser system and environmental noise.

Read more

The Programmer's Pastoral Dream: Escaping Code, Embracing the Soil?

2025-03-24

Many programmers dream of putting down their keyboards and taking up manual labor, such as carpentry or farming. This article explores the reasons behind this phenomenon, suggesting it stems from burnout in modern software work practices and a re-examination of the "self-made man" ideal in American culture. The author, drawing on personal experience, analyzes the complexities of this longing, acknowledging both the romantic idealization of rural life and its harsh realities. Ultimately, the author argues that finding meaning in work lies not solely in economic output but also in community building and a spirit of service.

Read more
Development programmers rural life

Half-Life and Steam's DRM Journey: It Started with a Nephew's CD Burner

2025-03-24
Half-Life and Steam's DRM Journey: It Started with a Nephew's CD Burner

In 1998, Valve co-founder Monica Harrington's nephew used money intended for school supplies to buy a CD burner, then copied and shared games, prompting her to realize the threat of game piracy enabled by this technology. This led Valve to implement a simple CD key verification system in Half-Life. While initially met with complaints, it effectively combated piracy and laid the groundwork for the eventual rise of Steam as a dominant DRM platform.

Read more
Game

The Prospero Challenge: Rendering Implicit Surfaces with Extreme Performance

2025-03-24
The Prospero Challenge: Rendering Implicit Surfaces with Extreme Performance

The Prospero Challenge invites developers to render an implicit surface defined by 7866 mathematical expressions as quickly as possible. Participants explore various optimization techniques, including expression pre-parsing, Numba acceleration, GPU computation, and LLVM compilation, using tools like Python, Numpy, CUDA, and JIT compilers. Solutions have achieved millisecond rendering times and significantly reduced memory consumption. The challenge encourages experimentation and the sharing of results to advance the state of the art in implicit surface rendering.

Read more
Development implicit surface

Building an Idempotent Email API with River

2025-03-24

This article demonstrates building an idempotent-safe email API using River. Many email services lack APIs guaranteeing idempotency, leading to duplicate or missing emails. By leveraging River's features and combining unique account IDs with idempotency keys, the author achieves idempotent email sending. Even with network errors causing retries, the email is guaranteed to be sent only once. The article details the implementation, covering job argument definition, worker creation, handling duplicate requests, and parameter matching safety. The resulting API is concise, efficient, and production-ready, avoiding many common email sending pitfalls.

Read more
Development idempotency email API

Peano Axioms: An Elegant Approach to Defining Natural Numbers

2025-03-24
Peano Axioms: An Elegant Approach to Defining Natural Numbers

This article delves into the Peano axioms, a system that rigorously defines natural numbers through nine axioms. Starting with intuitive understanding, it builds a formal axiomatic definition, covering the properties of equality, the existence of 0, the successor function, and mathematical induction. Each axiom's significance and role are explained in detail, including discussions of different forms of mathematical induction. The article culminates in demonstrating how the Peano axioms uniquely determine the set of natural numbers, laying a solid foundation for subsequent mathematical reasoning.

Read more

Qwen2.5-VL-32B: A 32B Parameter Visual-Language Model That's More Human-Friendly

2025-03-24
Qwen2.5-VL-32B: A 32B Parameter Visual-Language Model That's More Human-Friendly

Following the widespread acclaim of the Qwen2.5-VL series, we've open-sourced the new 32-billion parameter visual-language model, Qwen2.5-VL-32B-Instruct. This model boasts significant improvements in mathematical reasoning, fine-grained image understanding, and alignment with human preferences. Benchmarking reveals its superiority over comparable models in multimodal tasks (like MMMU, MMMU-Pro, and MathVista), even outperforming the larger 72-billion parameter Qwen2-VL-72B-Instruct. It also achieves top-tier performance in pure text capabilities at its scale.

Read more

Pentagon Axes $280M AI Project, Prioritizes 'Lethal' AI Over 'Equitable' AI

2025-03-24
Pentagon Axes $280M AI Project, Prioritizes 'Lethal' AI Over 'Equitable' AI

The Pentagon has canceled its troubled Defense Civilian Human Resources Management System (DCHRMS) project, which ran eight years over budget at $280 million. Along with DCHRMS, over $360 million in grants focused on DEI, climate change, and social programs were also cut. Secretary of Defense Pete Hegseth explained that the department needs "lethal" AI, not "equitable" AI, and will replan the HR system modernization. This is part of the Pentagon's Department of Government Efficiency initiative to eliminate wasteful spending.

Read more

600 Million Years of Shared Stress Response in Algae and Plants

2025-03-24
600 Million Years of Shared Stress Response in Algae and Plants

A University of Göttingen-led study reveals a surprising shared stress response network between algae and plants dating back 600 million years. Researchers compared gene expression and compound production in moss and two types of algae under environmental stress, identifying a common gene regulatory network. This discovery sheds light on key mechanisms of plant adaptation to land and offers new insights into plant evolution.

Read more

Google Maps Timeline Data Lost: Technical Glitch Leaves Users with No Recovery Options

2025-03-24
Google Maps Timeline Data Lost: Technical Glitch Leaves Users with No Recovery Options

A technical issue with Google Maps has resulted in the loss of Timeline data for numerous users. Google recently transitioned Timeline data storage from the cloud to local devices to improve privacy. However, a technical glitch during this transition led to the accidental deletion of location history for many. Google has confirmed the issue; only users who proactively created encrypted cloud backups can recover their data.

Read more
Tech Data Loss

Lilly: A Streamlined Vim/Neovim Alternative

2025-03-24
Lilly: A Streamlined Vim/Neovim Alternative

Lilly is a text editor under development, aiming to be a lightweight alternative to Vim and Neovim. It focuses on core functionality, eliminating the complex Lua plugin ecosystem for a simpler, more accessible user experience. A pre-alpha release is available, and testing shows zero memory leaks. Contributions and feedback are welcome.

Read more
Development Vim alternative

Mastering Delphi 5: A 25-Year Retrospective

2025-03-24

Marco Cantu has released a free, annotated 2025 edition of his classic 'Mastering Delphi 5'. The 1139-page book features 475 footnotes and dozens of new screenshots comparing the old and new IDE and application UIs. While some code doesn't compile, most programs still run, a testament to Delphi's enduring legacy. This gift to the community celebrates Delphi's 30th anniversary and offers a nostalgic journey through its history.

Read more
Development Retrospective

China Unveils Deep-Sea Cable Cutter, Raising Global Concerns

2025-03-24
China Unveils Deep-Sea Cable Cutter, Raising Global Concerns

China has unveiled a new deep-sea cable-cutting device capable of severing the world's most fortified underwater communication or power lines, with a maximum operating depth of 4,000 meters – twice the range of existing subsea infrastructure. Developed by the China Ship Scientific Research Centre, the device is intended for civilian salvage and seabed mining, but its dual-use potential, especially near strategic chokepoints like Guam, raises concerns about its potential to disrupt global communications and escalate geopolitical tensions.

Read more

China Tightens Facial Recognition Rules, Taiwan Infrastructure Targeted in Cyberattacks

2025-03-24
China Tightens Facial Recognition Rules, Taiwan Infrastructure Targeted in Cyberattacks

China has issued new regulations prohibiting the use of facial recognition technology without consent and restricting its use in public places. Simultaneously, critical infrastructure in Taiwan has been targeted by a suspected China-backed hacking group. Elsewhere, Zoho won India's government-backed web browser competition, while X is suing the Indian government over content takedown laws. Japan's new cybersecurity bill, which allows for offensive cyber operations, is facing privacy concerns. Finally, the Australian Strategic Policy Institute reports being targeted by Chinese online harassment.

Read more
Tech

PicoRuby: A Lightweight Ruby Implementation for Microcontrollers

2025-03-24
PicoRuby: A Lightweight Ruby Implementation for Microcontrollers

PicoRuby is a lightweight mruby implementation with a small footprint: 256KB ROM and under 128KB RAM (32-bit architecture). Highly portable, it depends only on standard C libraries and supports microcontrollers like the Raspberry Pi Pico. Still under development, it provides API documentation, demo videos, and build tools. The `rake` command builds three executables: `picorbc` (compiles Ruby to mruby VM code), `picoruby` (executes Ruby code directly), and `r2p2` (for specific use). Developed by HASUMI Hitoshi and Monstarlab with funding from the Ruby Association.

Read more
Development embedded Ruby

Solar Power's Explosive Growth: Deregulation as the Key?

2025-03-24
Solar Power's Explosive Growth: Deregulation as the Key?

Solar power has become the cheapest new electricity source in many US regions, but adoption hinges on market structure. Deregulated markets, where entrepreneurs can readily pursue profits, have rapidly embraced solar. Conversely, regulated utilities lag due to legacy investments and bureaucracy. To accelerate the renewable energy transition, the US needs greater deregulation, enabling private capital to build a cleaner, larger grid. This is crucial to meet surging energy demands from emerging technologies and maintain global competitiveness. The article highlights the dramatic cost reduction of solar and contrasts the rapid adoption in deregulated states like Texas with the slower progress in regulated ones like Tennessee.

Read more

Mistral CEO: Nations Must Build Their Own AI Infrastructure to Avoid Economic Dependence

2025-03-24
Mistral CEO: Nations Must Build Their Own AI Infrastructure to Avoid Economic Dependence

Mistral CEO Arthur Mensch argues that AI will have a double-digit impact on every country's GDP in the coming years. He urges nations to build independent AI systems to avoid economic dependence on others, likening it to the importance of building electricity factories a century ago. He sees AI not just as technology, but as a vehicle for cultural and societal values, requiring greater involvement. Mistral, a rapidly growing European AI company, is focused on developing open-source large language models, competing with companies like OpenAI, and boasts faster model speeds. Mensch is a strong advocate for open-source, believing it accelerates AI development, a principle that guided Mistral's creation.

Read more

Nostalgic Colored Bar Paper: Web Simulation and History

2025-03-24

This article revisits the colored bar paper popular until the late 1990s, which used colored horizontal bars to aid reading. The author simulates various colors (including green, blue, yellow, and more) of bar paper effects on a webpage and explains how to mimic this style in modern software and web design. The article also touches upon the historical context and the different approaches to simulating this effect in different software and web environments.

Read more

Magic Todo: AI-Powered Smart To-Do List

2025-03-24

Magic Todo is a smart to-do list app that not only lets you record tasks like a regular to-do list but also automatically breaks down tasks into steps based on a spiciness level (🌶️) you set. The spicier, the more detailed the breakdown. It auto-categorizes top-level tasks with emojis and offers filtering by category or completion status. Each item provides edit, delete, add subtask, and estimation features, with drag-and-drop reordering. Additional features include device synchronization, export options, undo/redo, and bulk actions.

Read more
1 2 357 358 359 361 363 364 365 596 597