Okta Security Incident: Exploiting Bcrypt's Length Limitation

2025-02-05
Okta Security Incident: Exploiting Bcrypt's Length Limitation

The Okta security incident stemmed from how its Bcrypt implementation handled input length. Bcrypt's 72-character limit caused truncation, allowing authentication with only partial usernames and cached keys. The article analyzes Bcrypt libraries in Go, Java, JavaScript, Python, and Rust, revealing many lack input length validation, creating security risks. The author advocates for improved API design, explicitly rejecting invalid input to prevent such vulnerabilities.

Read more
Development API design

Conway's Law: Software Architecture Mirrors Organizational Structure

2025-02-05
Conway's Law: Software Architecture Mirrors Organizational Structure

A prevailing consensus among software architects is the significance of Conway's Law: any organization that designs a system will produce a design whose structure is a copy of the organization's communication structure. This means software architecture often reflects the development team's organization. Ignoring this leads to conflicts between system architecture and organizational structure, increasing development complexity. The article explores three strategies for addressing Conway's Law: ignoring, accepting, and the Inverse Conway Maneuver (adjusting the organizational structure to guide software architecture). The author emphasizes that system architecture and organizational structure evolution should be synchronized throughout software development, and suggests using methods like Domain-Driven Design to aid organizational design.

Read more
Development Conway's Law

The Sudoku Affair: Two Approaches to Software Design

2025-02-05
The Sudoku Affair: Two Approaches to Software Design

This article recounts the experiences of Ron Jeffries and Peter Norvig in building Sudoku solvers. Jeffries, employing an incremental design approach, started with a simple List[Option[Int]] representation, iteratively refining it until completion. However, the resulting code was verbose and lacked elegance. Norvig, leveraging his expertise in search algorithms, used a Map[Coord, Set[Int]] representation, resulting in concise and efficient code that showcased constraint propagation. The article contrasts these design philosophies, highlighting the impact of domain knowledge on coding style and prompting reflection on software design methodologies.

Read more

Java 8 Collection Utilities: A RingBuffer Implementation

2025-02-05
Java 8 Collection Utilities: A RingBuffer Implementation

j8cu is a Java 8 collection utility library featuring a high-performance RingBuffer implementation. This RingBuffer supports ordered and unordered read modes; the ordered mode is FIFO, ideal for maintaining a buffer of the most recent N objects. Additional features include event listeners, bulk copying, and clearing/resetting capabilities, simplifying RingBuffer usage in Java 8.

Read more

Modern C++: Key to Performance, Type Safety, and Flexibility

2025-02-05

This article explores key concepts in modern C++ (C++20 and beyond) for achieving performance, type safety, and flexibility, including resource management, lifetime management, error handling, modularity, and generic programming. The author highlights that many developers still use outdated C++ techniques, leading to less expressive, slower, less reliable, and harder-to-maintain code. The article introduces modern C++ mechanisms and proposes guidelines and profiles to ensure code modernity, aiming to help developers write cleaner, more efficient, and safer C++ code.

Read more
Development Modernization

Zig 0.13.0 Released: A General-Purpose Language Focused on Robustness and Optimization

2025-02-05
Zig 0.13.0 Released: A General-Purpose Language Focused on Robustness and Optimization

Zig 0.13.0 has been released, a general-purpose programming language and toolchain designed for building robust, optimal, and reusable software. While currently unstable, Zig's focus on low-level programming concepts makes it an attractive option for experienced programmers. Prior experience with languages like C, C++, Rust, or Go will be helpful.

Read more
Development low-level programming

NYT vs. OpenAI: A $10M Copyright Battle and the Future of AI

2025-02-05
NYT vs. OpenAI: A $10M Copyright Battle and the Future of AI

While many publishers, like Dotdash Meredith ($16 million annual licensing fee), struck deals with OpenAI to compensate for the use of their content in training AI models, the New York Times chose a different path. Spending $10.8 million on legal fees in 2024, the NYT sued OpenAI and Microsoft for copyright infringement. This high-stakes legal battle highlights the clash between news organizations and tech giants over copyright and business models in the age of AI, showcasing the NYT's willingness to fight for its rights against powerful tech companies.

Read more

Running ArchiveTeam Warrior on Kubernetes

2025-02-05

The author initially ran the ArchiveTeam Warrior project on a Proxmox VM, but to improve efficiency and leverage their Kubernetes cluster, they migrated it to a containerized environment. The article details how the author wrote Kubernetes manifests, configured using environment variables, and used an in-memory emptyDir to solve disk space issues. Additionally, the author developed a Python script to monitor the Warrior's status. A later update mentions switching to lighter `*-grab` images after discussing with other developers and plans to build a management UI.

Read more
Development Containerization

Commodities Market Volatility: Oil Dips, Gold Gains

2025-02-05

The commodities market experienced significant volatility today. Crude oil prices fell by over 2%, with both Brent and WTI crude showing substantial declines. Gasoline and heating oil prices also dipped. However, gold prices bucked the trend, rising over 1%, with silver and copper also posting gains. Soybean, wheat, and coal prices all fell, while natural gas and lumber prices saw slight increases. Iron ore prices edged higher. Steel prices saw a modest decline. TTF natural gas prices rose by over 2%.

Read more

OpenWISP: Connecting Communities Globally with Open-Source Networking

2025-02-05
OpenWISP: Connecting Communities Globally with Open-Source Networking

OpenWISP, a trusted open-source networking solution, boasts deployments in over 195 countries, exceeding 20,000 installations and serving 40+ commercial clients. It plays a vital role in connecting communities, fostering digital inclusion, and providing efficient solutions for thousands of active hotspots and daily users. Network administrators, municipalities, and universities worldwide rely on OpenWISP for its simplicity, adaptability, and enhanced connectivity.

Read more

Gemini 2.0 Family Gets a Major Update: Enhanced Performance and Multimodal Capabilities

2025-02-05
Gemini 2.0 Family Gets a Major Update: Enhanced Performance and Multimodal Capabilities

Google has significantly updated its Gemini 2.0 family of models! The 2.0 Flash model is now generally available via API, enabling developers to build production applications. An experimental version of 2.0 Pro, boasting superior coding performance and complex prompt handling with a 2 million token context window, has also been released. A cost-effective 2.0 Flash-Lite model is now in public preview. All models currently feature multimodal input with text output, with more modalities coming in the following months. This update significantly boosts performance and expands applicability, marking a major step forward for Gemini in the AI landscape.

Read more
AI

The Netflix Prize: A Milestone and a Bitter Lesson in Machine Learning

2025-02-05
The Netflix Prize: A Milestone and a Bitter Lesson in Machine Learning

In 2006, Netflix launched a million-dollar competition to improve its recommendation system. This competition attracted thousands of teams and significantly advanced the field of machine learning. Results showed that simple algorithms could surprisingly perform well, larger models yielded better scores, and overfitting wasn't always a concern. However, the competition also left a bitter lesson: data privacy concerns led Netflix to cancel future competitions, limiting open research on recommendation system algorithms, and tech companies' control over data reached an unprecedented level.

Read more
AI

The Rise of Personal Software: AI-Powered App Creation for Everyone

2025-02-05
The Rise of Personal Software: AI-Powered App Creation for Everyone

Personal computers arrived in the 90s, but software remained impersonal and bloated. AI is changing that. Now, anyone can build custom applications to solve their specific needs, without needing coding skills. This isn't about replacing professional developers, but empowering individuals to create their own solutions, fostering appreciation for well-designed software and driving innovation.

Read more
Development Personalization

Servo's Resurgence: A Year of Explosive Growth and Development

2025-02-05
Servo's Resurgence: A Year of Explosive Growth and Development

Two years after a period of reduced activity, the Servo project is back with a bang! 2024 saw a 143% surge in unique contributors (reaching 129), and a staggering 163% increase in merged pull requests (1771). This resurgence is fueled by significant contributions from organizations like Igalia and a thriving community. Servo boasts major performance improvements, including upgraded core dependencies and added support for floats, tables, Flexbox, and more, achieving a 79% pass rate on WPT tests. Furthermore, Servo now supports Android and OpenHarmony, with successful integration tests with applications like Tauri. A roadmap for 2025 has been published, promising continued growth and innovation.

Read more
Development

Warner Bros. Discovery's YouTube Movie Dump: Genius or Just Weird?

2025-02-05
Warner Bros. Discovery's YouTube Movie Dump: Genius or Just Weird?

Warner Bros. Discovery has quietly uploaded over 30 movies to YouTube, completely free and without DRM. The collection ranges from cult classics like *Waiting for Guffman* to infamous flops such as *Pluto Nash*. This bizarre move has sparked debate: is it a desperate attempt to clear out underperforming content, a surprisingly effective marketing ploy, or something else entirely? The strategy is unconventional, but it raises questions about the changing landscape of film distribution and the value of streaming services in the age of YouTube.

Read more

Catgrad: A Category-Theoretic Deep Learning Compiler

2025-02-05

Catgrad is a deep learning framework that leverages category theory to statically compile models into their forward and backward passes. This allows your training loop to run without needing any deep learning framework (not even catgrad itself!). Built upon research papers exploring categorical approaches to deep learning, it enables features like data-parallel algorithms and differentiable polynomial circuits. Installation is straightforward via `pip install catgrad`.

Read more
Development

Outrage Fatigue: How Constant Anger Numbs Us and What We Can Do About It

2025-02-05
Outrage Fatigue: How Constant Anger Numbs Us and What We Can Do About It

A recent episode of the science podcast 'Science Quickly' explores the phenomenon of 'outrage fatigue.' Guest Tanya Lewis explains how constant exposure to outrage can lead to apathy and desensitization to important social issues. Research shows outrage amplifies misinformation online. To combat this, Lewis suggests limiting media consumption, focusing on local issues, and engaging in community activities to foster more effective responses to societal problems, avoiding the negative impacts of anger overload.

Read more

China Investigates Apple's App Store: Tech Giant Faces New Scrutiny

2025-02-05
China Investigates Apple's App Store: Tech Giant Faces New Scrutiny

China's market regulator is investigating Apple's App Store policies and fees, potentially adding fuel to the US-China trade war. The probe focuses on Apple's up to 30% commission on in-app purchases and its restriction of external payment services and app stores. This stems from long-standing disputes between Apple and developers like Tencent and ByteDance over iOS App Store policies. While not yet a formal investigation, further action could be taken if Apple fails to address concerns. Apple faces intense competition from domestic rivals like Huawei in China, adding pressure amid this regulatory scrutiny.

Read more

Ubuntu's Snap Nightmare: Why I Switched to Fedora

2025-02-05
Ubuntu's Snap Nightmare: Why I Switched to Fedora

For a long time, Ubuntu was my go-to Linux distro. However, starting around 2016, every upgrade brought its share of problems, ranging from minor icon glitches to complete system crashes. The worst upgrade even resulted in my mother's laptop needing a Windows reinstall.

Canonical's aggressive push of Snaps only exacerbated the issues. Snaps' automatic updates and conflicts with traditional Debian packages led to numerous compatibility problems and functional failures, significantly impacting productivity. I even witnessed a colleague lose an entire workday due to GNOME desktop environment Snap issues.

In contrast, Flatpak's implementation is far more reasonable. I eventually switched to Fedora, which, while not perfect, has proven stable and reliable, and my experience so far has been positive. Hopefully, Canonical will reconsider its approach to building a Linux distro.

Read more
Development

Mystery of Simultaneous Transients in 1950 Palomar Sky Survey Image

2025-02-05
Mystery of Simultaneous Transients in 1950 Palomar Sky Survey Image

A study investigates nine simultaneous star-like transient objects detected in the 1950 Palomar Sky Survey (POSS-I) images. The paper systematically rules out various possibilities, including cosmic rays, meteorite fragments, and airplane strobe lights. The researchers suggest radioactive contamination of the photographic plates from atomic bomb tests as a likely culprit, although the lack of official tests between 1949 and 1951 raises questions. An alternative explanation proposes that these transients are glints from small, reflective objects in geosynchronous orbit, potentially satellite debris. Ultimately, the lack of access to the original plates for microscopic examination leaves both contamination and satellite glints as plausible explanations. The study highlights the importance of anomalies detected in citizen science projects.

Read more

Fiwix: A Lightweight, POSIX-Compliant Open-Source OS Kernel

2025-02-05

Fiwix is a lightweight, open-source operating system kernel based on the UNIX architecture and fully POSIX-compliant. With under 50K lines of code, it's designed for educational purposes and hobbyists. Built as a monolithic kernel in ANSI C for the i386 architecture, it boasts compatibility with a large base of existing GNU applications. FiwixOS, a distribution based on the Fiwix kernel, includes a GNU toolchain, libraries, and other open-source software. It uses Newlib as its standard C library and Ext2 as its primary filesystem. The developers encourage users to test, provide feedback, and contribute to improve Fiwix and FiwixOS.

Read more
Development OS Kernel

Thailand Cuts Power, Fuel, and Internet to Myanmar Border Areas to Combat Scam Syndicates

2025-02-05
Thailand Cuts Power, Fuel, and Internet to Myanmar Border Areas to Combat Scam Syndicates

Thailand cut power, fuel, and internet access to some border areas with Myanmar on Wednesday in an attempt to cripple scam syndicates operating there. These syndicates, according to a 2023 UN report, are suspected of entrapping hundreds of thousands in illegal online and telecom operations, generating billions annually. The move, overseen by Thai Interior Minister Anutin Charnvirakul, aims to protect Thailand's tourism sector and address safety concerns, particularly after the recent abduction and rescue of Chinese actor Wang Xing in Myanmar. However, reports indicate some scam centers continue operating using generators, raising questions about the effectiveness of the strategy.

Read more

The Michael Scott Theory of Social Class: The Higher You Climb, The More You Become Michael Scott

2025-02-05
The Michael Scott Theory of Social Class: The Higher You Climb, The More You Become Michael Scott

This essay proposes the 'Michael Scott Theory of Social Class,' arguing that the higher one ascends the 'Educated Gentry' class in North America, the more their behavior resembles that of Michael Scott, the bumbling, yet comedically oblivious manager from *The Office*. Drawing from the three-tiered social structure depicted in *The Office* (losers, clueless, and sociopaths) and applying it to a model of American social class, the author posits that the Educated Gentry pursue unique, often performative lifestyles to gain status, ultimately becoming detached from reality and trapped in self-constructed realities, mirroring Michael Scott's obliviousness and performative behavior. The use of language, specifically 'Posturetalk' and 'Babytalk,' reinforces this detachment.

Read more

F-Droid Secures Major Funding to Ensure Long-Term Sustainability

2025-02-05
F-Droid Secures Major Funding to Ensure Long-Term Sustainability

F-Droid, a platform providing free and open-source Android apps, has received a $396,044 grant from the Open Technology Fund. This funding will address critical challenges to F-Droid's long-term sustainability, including code refactoring, improving legal strategies for handling government takedown requests, streamlining localization workflows, strengthening donation infrastructure, and enhancing hosting and infrastructure. This ensures F-Droid can continue delivering privacy-focused, open-source apps to users worldwide, even in areas with limited internet access.

Read more
Development Funding

Apitally API Analytics: Lightweight Metadata Collection, Protecting Your Sensitive Data

2025-02-05
Apitally API Analytics: Lightweight Metadata Collection, Protecting Your Sensitive Data

Apitally's API analytics and monitoring client libraries collect only non-sensitive metadata about your endpoints, requests, and responses. This includes HTTP methods, paths, response status codes, timing, and the size of request and response bodies. Data is aggregated client-side before being sent to Apitally servers. For API request logging, the libraries allow you to configure logging details and easily mask sensitive fields, ensuring data security.

Read more

Easily Calculate the Number of Language Model Tokens for a String

2025-02-05
Easily Calculate the Number of Language Model Tokens for a String

This article presents a simple method to calculate the number of language model tokens in a string. This is crucial for estimating application running costs, checking if text fits within the language model's context window, and determining if chunking is necessary. While a rough estimate can be obtained by dividing the character count by 4, a more accurate method involves using the specific language model (Hugging Face or OpenAI model) you're using. The author provides a Jupyter Notebook to calculate the token count for strings, files, or all files in a folder, eliminating reliance on external services, ensuring security and free usage.

Read more
Development token counting

Microsoft Quietly Removes Windows 11 Upgrade Workaround

2025-02-05
Microsoft Quietly Removes Windows 11 Upgrade Workaround

When Windows 11 launched in 2021, Microsoft offered a registry tweak allowing upgrades on PCs that didn't meet system requirements. However, Microsoft recently removed the official support documentation for this method. This means Microsoft no longer officially supports this workaround, recommending users buy new, compatible PCs for Windows 11 upgrades. This move is likely tied to the upcoming end of Windows 10 support and collaborations with hardware manufacturers.

Read more
Tech Registry

$6 AI Model Shakes Up the LLM Landscape: Introducing S1

2025-02-05
$6 AI Model Shakes Up the LLM Landscape: Introducing S1

A new paper unveils S1, an AI model trained for a mere $6, achieving near state-of-the-art performance while running on a standard laptop. The secret lies in its ingenious 'inference time scaling' method: by inserting 'Wait' commands during the LLM's thinking process, it controls thinking time and optimizes performance. This echoes the Entropix technique, both manipulating internal model states for improvement. S1's extreme data frugality, using only 1000 carefully selected examples, yields surprisingly good results, opening up new avenues for AI research and sparking discussion on model distillation and intellectual property. S1's low cost and high efficiency signal a faster pace of AI development.

Read more

Toma: Building an AI Workforce for the $1.5T Automotive Industry

2025-02-05
Toma: Building an AI Workforce for the $1.5T Automotive Industry

Toma is building an end-to-end AI workforce for the $1.5 trillion automotive industry. Their largest customers spend over $1.5 billion annually on processes readily automatable with AI, including customer service, repair order management, warranty processing, and sales. Toma's team boasts a track record of building and selling successful AI applications, a best-in-class voice AI product, and deep, first-hand experience from working directly with and studying automotive dealerships. They operate with a team-oriented, accountable approach, emphasizing data-driven decisions and providing significant autonomy. Located in San Francisco's Dogpatch neighborhood, Toma offers a fast-paced, no-BS environment where exceptional people can make a substantial impact. They work in-office five days a week.

Read more
AI
1 2 467 468 469 471 473 474 475 596 597