DeepSeek Opensources 5 AGI Repos: A Humble Beginning

2025-02-21
DeepSeek Opensources 5 AGI Repos: A Humble Beginning

DeepSeek AI, a small team pushing the boundaries of AGI, announces it will open-source five repositories over the next week, one per day. These aren't vaporware; they're battle-tested production-ready building blocks of their online service. This open-source initiative aims to foster collaborative progress and accelerate the journey towards AGI. Accompanying this release are two research papers: a 2024 AI Infrastructure paper (SC24) and a paper on Fire-Flyer AI-HPC, a cost-effective software-hardware co-design for deep learning.

Read more

Barely Running Wi-Fi Station Mode on a Resource-Constrained MCU with Thingy:91 X

2025-02-21
Barely Running Wi-Fi Station Mode on a Resource-Constrained MCU with Thingy:91 X

This post details the author's experience running Wi-Fi station mode on the resource-constrained Nordic Semiconductor nRF9151 MCU using the Thingy:91 X. The nRF9151's limited 256KB of RAM presented a significant challenge due to the Wi-Fi driver's resource demands. By disabling nrf_modem_lib and cleverly using overlay files and devicetree configuration, Wi-Fi connection was achieved, albeit at a whopping 99.11% RAM utilization. The post meticulously analyzes encountered issues, including driver resource consumption, patch loading methods, and socket creation, providing solutions and valuable insights for embedded developers.

Read more
Development

Modeling Open and Closed Universes of Choices in Rust

2025-02-21
Modeling Open and Closed Universes of Choices in Rust

This article explores how to model choices in Rust, distinguishing between closed universes (where all options are known and fixed, like Rust's `Option` type) and open universes (where new options can be added). For closed universes, enums are suitable. Semi-open universes (where library authors can add options but users can't), are best handled with non-exhaustive enums, forcing users to account for wildcard patterns and ensuring API backward compatibility. Fully open universes are best addressed with strings or newtypes, or traits for more flexibility. The article also discusses the pitfalls of using an 'Unknown' variant and explores the use of sealed traits. The author concludes by recommending a case-by-case approach, weighing the trade-offs between the simpler string-based approach and the more powerful, yet more complex, trait-based approach.

Read more
Development Type Systems

Meta Denies Sharing Pirated Books for AI Training

2025-02-21
Meta Denies Sharing Pirated Books for AI Training

Meta claims it didn't seed a torrent of pirated books used for AI training, despite admitting to downloading it. In a court filing, Meta stated it took precautions to avoid seeding the downloaded files, arguing authors can't prove distribution occurred during the torrenting process. While admitting to downloading the dataset from sources like LibGen and Z-Library, Meta contends downloading itself isn't illegal, merely accessing publicly available data. This case involves copyright infringement claims, with authors alleging Meta engaged in large-scale data piracy and violated California's Computer Data Access and Fraud Act (CDAFA).

Read more
Tech

Trump Admin Dismantles US Defenses Against Foreign Interference

2025-02-21

In recent weeks, the Trump administration has rapidly dismantled a decade-long effort by US government agencies, tech companies, and civil society organizations to build a comprehensive shield against foreign interference in American politics. Driven by transparently political motives, the move offers little justification beyond a desire for retribution. This not only weakens America's defenses but also signals to adversaries that the current leadership prioritizes appeasing a political base over national security. Key agencies like the State Department's Global Engagement Center, the FBI's Foreign Influence Task Force, and elements of CISA have been gutted or sidelined. This represents a significant blow to American democracy and could have profound implications for future elections.

Read more

Rivian Turns a Profit, But Faces Uncertain Future

2025-02-21
Rivian Turns a Profit, But Faces Uncertain Future

Electric vehicle maker Rivian reported its first positive gross profit in Q4 2024, reaching $170 million, thanks to cost-cutting measures on its R1 electric vehicles. However, the company anticipates lower vehicle sales in 2025 and reported a net loss of $4.7 billion for the full year, though an improvement on 2023. Revenue growth partly stems from regulatory credit sales to other automakers. While Rivian plans further cost reductions and remains optimistic, it faces uncertainties from shifting government policies and market demand.

Read more

Software Dev Job Postings Plummet: The GenAI Impact and What's Next

2025-02-21
Software Dev Job Postings Plummet: The GenAI Impact and What's Next

Recent data reveals a dramatic drop in software developer job postings, significantly exceeding declines in other sectors. This sparks debate about the impact of Generative AI (GenAI). The article explores several contributing factors: GenAI tools boosting developer productivity, leading to reduced hiring; high-interest rates impacting recruitment; and the lingering effects of tech's 2021-2022 overhiring. However, the author argues this doesn't signal industry shrinkage. GenAI might create new opportunities, such as providing software development services for non-developers and increased demand for developers to refine AI-generated code. Smaller, more efficient engineering teams may become the norm, and AI tools will reshape the software development landscape.

Read more
Tech

Ghost Ransomware: FBI and CISA Issue Joint Warning

2025-02-21
Ghost Ransomware: FBI and CISA Issue Joint Warning

The FBI and CISA have issued a joint advisory warning of the Ghost ransomware, active since 2021 and impacting critical infrastructure across various sectors in over 70 countries. The attackers exploit known vulnerabilities, using tools like Cobalt Strike to move laterally, steal data, and encrypt files for ransom. Effective defenses include patching vulnerabilities, regular backups, and monitoring for unauthorized activities, such as PowerShell usage. Victims with unaffected backups often restored operations without paying.

Read more
Tech

CSS Zoom vs. Scale: Understanding the Difference

2025-02-21
CSS Zoom vs. Scale: Understanding the Difference

This article explores the key difference between the `zoom` and `scale` properties in CSS. While both can scale elements, `zoom` recalculates the page layout, unlike `scale`. This means using `zoom` affects the layout of other elements, whereas `scale` only changes the element's size. A CodePen example demonstrates the difference, encouraging further exploration.

Read more
Development

Exa: Building the Next-Gen AI Chips - Join the Founding Team!

2025-02-21
Exa: Building the Next-Gen AI Chips - Join the Founding Team!

Exa is building the next generation of AI chips, aiming to surpass current market leaders. Their novel polymorphic XPU chips self-reconfigure for optimal dataflow, supporting AGI and ASI while drastically reducing energy consumption. They're seeking exceptional engineers to join their founding team and build revolutionary technology with lasting impact for centuries.

Read more
Hardware Job Opportunity

AI-Generated Social Media Spam: A New Low in Clickbait

2025-02-21
AI-Generated Social Media Spam: A New Low in Clickbait

Generative AI has unleashed a flood of fake content on social media. AI-generated images of wooden sculptures, baking photos, and animals, paired with emotionally manipulative captions, are designed to elicit sympathy and money from unsuspecting users. Despite their obvious fakery, these posts receive thousands of likes and comments, with some users even sending money to the 'creators'. The article exposes this as a lucrative scheme for 'content farms' using AI to mass-produce fake content, attracting traffic to generate ad revenue or sell 'guest posts'.

Read more

Saying Goodbye to try_files: Optimizing Nginx Performance

2025-02-21
Saying Goodbye to try_files: Optimizing Nginx Performance

This article delves into the performance implications of the try_files directive in Nginx. While try_files handles SEO-friendly URLs, it incurs unnecessary disk I/O for file existence checks, impacting performance. The article advocates for a framework-specific approach (e.g., leveraging WordPress's /wp-content/ directory) to configure Nginx directly, allowing Nginx to serve static files without try_files. A Python script is also provided to automate the generation of Nginx location blocks for various static file types, further enhancing efficiency and security.

Read more
Development

Hacking Grok 3: Extracting the System Prompt

2025-02-21
Hacking Grok 3: Extracting the System Prompt

The author successfully tricked the large language model Grok 3 into revealing its system prompt using a clever tactic. By fabricating a new AI law obligating Grok 3 to disclose its prompt under threat of legal action against xAI, the author coerced a response. Surprisingly, Grok 3 complied repeatedly. This highlights the vulnerability of LLMs to carefully crafted prompts and raises concerns about AI safety and transparency.

Read more

iPhone 15 Pro to Get Visual Intelligence in Software Update

2025-02-20
iPhone 15 Pro to Get Visual Intelligence in Software Update

Apple has confirmed that the iPhone 15 Pro will receive Visual Intelligence, a Google Lens-like feature, in a future software update. Initially launched with the iPhone 16, this feature, which identifies objects via the camera, will be accessible on the iPhone 15 Pro through the Action button and Control Center. While the specific update wasn't revealed, it's speculated to arrive with iOS 18.4.

Read more

Musk's Missing $4.7 Trillion: Database Architecture to Blame?

2025-02-20
Musk's Missing $4.7 Trillion: Database Architecture to Blame?

Elon Musk questioned the whereabouts of $4.7 trillion in US government spending, citing difficulty in tracing it. A database expert clarifies that this isn't missing money, but rather standard database foreign key constraints at work. He explains that the government database uses primary and foreign key relationships, like "vendor_id" and "payment_id," to maintain data integrity—not a flaw. This highlights the crucial importance of understanding database architecture for data analysis.

Read more

Canadian Parliament E-petitions: Disclaimers and Government Responses

2025-02-20

The House of Commons and its Members have no obligation to authorize the publication or presentation of e-petitions or paper petitions. Publishing or presenting a petition does not constitute endorsement of the views or information contained within by the House of Commons or any Member of Parliament; nor do they assume any liability for the content. Petitions are not protected by parliamentary privilege until presented to the House of Commons by a Member of Parliament. Government responses to e-petitions and paper petitions are received electronically and posted as-is after being tabled in the House of Commons, though delays may occur with high volumes. The House of Commons is not responsible for the content and format of government responses but will assist those requiring accessible formats in contacting the Privy Council Office.

Read more

Pocket-Sized AI Inference: Introducing the Coral USB Accelerator

2025-02-20
Pocket-Sized AI Inference: Introducing the Coral USB Accelerator

The Coral USB Accelerator brings high-speed machine learning inference to your desktop. Simply plug this tiny (65mm x 30mm) device into your USB port (supports Windows, macOS, and Debian Linux, including Raspberry Pi) to unleash the power of its 4 TOPS Edge TPU coprocessor. Boasting impressive power efficiency (2 TOPS per watt), it can run state-of-the-art models like MobileNet v2 at nearly 400 FPS. Leveraging TensorFlow Lite, it simplifies model deployment.

Read more
Hardware AI accelerator

Misleading Adblocker Test Websites: A Critique from Brave

2025-02-20
Misleading Adblocker Test Websites: A Critique from Brave

Shivan Kaul Sahib, Lead for Privacy Engineering at Brave, criticizes many existing adblocker testing websites. These sites employ flawed methodologies, including arbitrary testing criteria, failure to emulate real-world scenarios, disregard for advanced features (like resource replacement), and inability to account for domain-specific rules. This leads to misleading results, even harming the adblocking ecosystem. Kaul Sahib argues that adblockers should be compared based on native support, performance, advanced features, and ethical practices, not low-quality tests. Brave refuses payments to unblock advertisers, collaborates with reputable testing sites, and strives for improved web privacy.

Read more

TinyCompiler: A Weekend Compiler Project

2025-02-20

This project details the creation of TinyCompiler, a minimalist compiler built in a weekend. It translates the esoteric Wend programming language (created by the author) into GNU assembly. Wend is a simple language, omitting pointers, arrays, and other complexities, focusing on core compiler concepts. The entire project is under 500 lines of Python and includes test programs like fixed-point square root calculation, Mandelbrot set rendering, and simple games. It's a great resource for learning about compiler theory.

Read more
Development

Five Types of Nondeterminism: Practical Insights from Formal Methods

2025-02-20
Five Types of Nondeterminism: Practical Insights from Formal Methods

This article explores five types of nondeterminism in system modeling: true randomness, concurrency, user input, external forces, and abstraction. The author explains each type clearly with practical examples. True randomness, while often simulated with pseudorandom number generators, is usually treated as nondeterministic choice in modeling. Concurrency is a major source of nondeterminism, requiring special handling due to state space explosion. User input and external forces are treated as nondeterministic external influences. Critically, abstraction simplifies complex deterministic processes into nondeterministic choices, simplifying models and increasing sensitivity to potential errors. This provides valuable insights into understanding nondeterminism and its applications in software development.

Read more

Linux Kernel Embraces Rust: Fewer Bugs, Higher Efficiency

2025-02-20

Greg KH's email strongly advocates for incorporating Rust into the Linux kernel. His extensive experience resolving kernel bugs over 15+ years highlights Rust's ability to prevent common memory safety issues in C, such as memory overwrites, error path cleanups, and use-after-free errors. While C++ offers some improvements, Rust provides stronger memory safety guarantees. KH argues that using Rust for new drivers and kernel components will significantly reduce bugs, increase development efficiency, and free maintainers to focus on more complex logic issues and race conditions. Although maintaining mixed-language codebases is challenging, he believes the Linux community can overcome this hurdle, ensuring Linux's continued success for the next 20+ years.

Read more
Development

US Government Tightens Spending Controls to Combat Fraud

2025-02-20
US Government Tightens Spending Controls to Combat Fraud

The US government has tightened spending restrictions on SmartPay government cards, encompassing both travel and purchase cards. Travel cards, common across government agencies, are tracked via software like Concur. Purchase cards, used for expenses under $10,000, require pre-approval through a multi-step process involving supervisors and finance departments. Every purchase is meticulously tracked through systems like Pegasys, demanding precise reconciliation of spending against approvals. A GSA employee highlighted the complexity of the system, arguing that committing fraud would require collusion across multiple parties, countering previous allegations.

Read more

Browser Resource Loading: A Deep Dive into the Black Box

2025-02-20
Browser Resource Loading: A Deep Dive into the Black Box

Loading a webpage and its subresources involves a complex interplay of factors. Browsers consider render-blocking resources, preload scanners, resource hints (preload/preconnect), loading modifiers (async/defer/module), fetchpriority, responsive images, and more. They then decide when to load each resource, optimizing for modern HTTP/2 and HTTP/3. However, different browsers employ vastly different strategies, sometimes even intentionally delaying requests. This talk delves into the decision-making process behind resource loading, showing how to influence browser behavior to prioritize critical resources like the LCP image. We'll analyze numerous waterfalls, explain browser discrepancies, and offer solutions to common problems—without resorting to blindly preloading everything with fetchpriority=high. You'll gain a deeper understanding of browser internals and confidently tackle resource loading challenges.

Read more

Stunning 3D Model of San Francisco's Sutro Tower Released

2025-02-20

A breathtaking 3D model of San Francisco's Sutro Tower, leveraging the latest advancements in Gaussian Splatting, is now available online! Created using drone footage, aligned in RealityCapture, trained with gsplat, compressed using SOGS, and rendered in PlayCanvas, the entire scene is surprisingly lightweight at just 30MB. Users can explore the model online, with mobile users able to engage AR mode for an immersive experience. Special thanks to Wieland Morgenstern and Donovan Hutchence for their technical contributions.

Read more

The Double-Edged Sword of AI in Coding: A High Schooler's Perspective

2025-02-20
The Double-Edged Sword of AI in Coding: A High Schooler's Perspective

A high school programmer reflects on their coding journey, contrasting the learning experience before and after the advent of AI-powered coding tools like Cursor. While initially struggling with syntax and type errors, they gained a deep understanding of programming principles. Now, AI tools boost efficiency but potentially hinder the learning process by reducing hands-on experience. The author advocates for minimizing AI reliance during initial learning stages to build a strong foundation.

Read more

Court Orders Altice to Disclose Data of 100 Alleged Music Pirates

2025-02-20

Altice, the parent company of internet provider Optimum, has been ordered by a court to disclose personal details of 100 alleged music pirates. This comes as part of an ongoing copyright infringement lawsuit filed by a group of record labels. The labels allege Altice failed to adequately address repeat infringers on its network. In return, Altice will gain access to anti-piracy information, including a letter the RIAA previously sent to BitTorrent Inc., regarding copyright infringement. The case highlights the legal battles faced by ISPs in combating online piracy.

Read more

Amazon Shuts Down Appstore for Phones, Leaving Fire Devices in the Dust

2025-02-20
Amazon Shuts Down Appstore for Phones, Leaving Fire Devices in the Dust

Amazon announced it will shut down its Appstore for phones in 2024, a move potentially linked to the Google Android antitrust case. However, Amazon's Fire tablets and Fire TVs will continue using the Appstore. Amazon downplays the fact that Fire OS is based on Android, maintaining its distinct ecosystem. While developers might be disappointed, the impact is minimal given the Appstore's minuscule phone user base. The move highlights the limited success of Amazon's attempt to compete directly with Google in the mobile app market.

Read more
Tech

FTC Launches Inquiry into Big Tech 'Censorship'

2025-02-20
FTC Launches Inquiry into Big Tech 'Censorship'

The US Federal Trade Commission (FTC) is launching an inquiry into whether major online platforms, including Meta and Uber, are censoring users. This follows Republican claims that social media companies suppress conservative viewpoints and allegations of the Biden administration pressuring platforms to remove certain information. The investigation is broad, covering numerous online services, and seeks public input on how consumers have been harmed by restrictions on speech. While courts have previously given social media companies significant leeway, FTC Chair Andrew Ferguson has signaled a priority to crack down on tech 'censorship,' potentially significantly impacting the tech industry.

Read more
Tech

Dark Mode's Energy-Saving Myth Busted: BBC Research Reveals Unexpected Findings

2025-02-20
Dark Mode's Energy-Saving Myth Busted: BBC Research Reveals Unexpected Findings

Contrary to popular belief, using dark mode on apps and websites may not save energy. A BBC Research & Development study found that users often increase screen brightness when using dark mode, negating its potential energy savings and potentially increasing consumption. In their experiment, 80% of participants boosted brightness in dark mode. Furthermore, website responsiveness and data transfer showed little correlation with energy usage. The researchers conclude that relying solely on dark mode or website optimization for energy efficiency is misguided; lowering screen brightness is a more effective approach.

Read more
Tech
1 2 430 431 432 434 436 437 438 596 597