Desperate Biotech Firms Turn to Crypto: A Hail Mary Pass?

2025-08-26
Desperate Biotech Firms Turn to Crypto: A Hail Mary Pass?

Facing a sluggish stock market and funding difficulties, several small biotech companies are adopting a desperate strategy: investing heavily in cryptocurrencies. Companies like 180 Life Sciences Corp. (now ETHZilla) saw their stock prices skyrocket after accumulating significant Ethereum holdings, only to see those gains evaporate shortly after. While this tactic can provide a short-term stock price boost, it carries substantial long-term risks, potentially harming core operations and alienating investors. Analysts view this as a last-ditch effort for companies struggling with slow R&D progress and dwindling funds, but the odds of success remain questionable.

Read more
Tech

Linux Turns 34: From Hobby Project to Global Domination

2025-08-26
Linux Turns 34: From Hobby Project to Global Domination

Thirty-four years ago, an unknown Finnish computer science student, Linus Torvalds, announced a free operating system project, initially intended as a hobby. Today, Linux powers a vast array of devices, a testament to its success. This article recounts Linux's humble beginnings: Torvalds sought feedback on a newsgroup before releasing version 0.01. Interestingly, the name 'Linux' wasn't Torvalds' choice; a colleague named it at the last minute. From its initial 'Freax' moniker to its current global prominence, Linux's journey showcases the triumph of open-source software and its remarkable portability and adaptability.

Read more
Tech

Russia's New Soyuz-5 Rocket: Breaking Free from Ukraine, Targeting Commercial Launches

2025-08-26
Russia's New Soyuz-5 Rocket: Breaking Free from Ukraine, Targeting Commercial Launches

Following the breakdown of space cooperation with Ukraine due to the conflict, Russia is accelerating development of its new Soyuz-5 rocket. Powered by the powerful RD-171MV engine, which avoids Ukrainian components and boasts over three times the thrust of a NASA Space Shuttle Main Engine, the Soyuz-5 aims to replace the Zenit and Proton-M rockets. Russia hopes to gain a stronger foothold in the commercial launch market. However, even more significant is the Soyuz-7 (Amur) rocket, designed with a reusable first stage and new liquid oxygen-methane engines, intended to eventually replace the Soyuz-2. Its debut, however, has been pushed back to no earlier than 2030.

Read more

Small EVs Reign Supreme: Lowest Lifecycle Carbon Emissions

2025-08-26
Small EVs Reign Supreme: Lowest Lifecycle Carbon Emissions

A University of Michigan study reveals that compact electric vehicles boast the lowest lifecycle carbon emissions, considering factors like vehicle type, usage patterns, and location. Comparing gasoline, hybrid, and electric vehicles, the study found that a compact electric sedan with a 200-mile battery has just 17% the lifecycle emissions of a gas-powered pickup truck. Even a short-range electric pickup only produces 25% of the emissions. Hybrids offered modest improvements, while among EVs, smaller battery packs consistently resulted in lower environmental impact.

Read more

timep: A blazing-fast Bash profiler with built-in flamegraphs

2025-08-26
timep: A blazing-fast Bash profiler with built-in flamegraphs

timep is a state-of-the-art trap-based profiler for bash code. It generates per-command execution time profiles, hierarchically logging command runtimes and metadata based on function and subshell nesting. The latest release (v1.3) is fully self-contained, including a compressed binary and a flamegraph generator. Major refactorings have dramatically improved performance; a test with ~67,000 commands now runs in 5 minutes (down from 20!). timep offers detailed and summarized profiles, plus visually insightful flamegraphs, simplifying the analysis and optimization of Bash code.

Read more

Bluesky's Decentralized Success Story: Blacksky's Two Million Users

2025-08-26
Bluesky's Decentralized Success Story: Blacksky's Two Million Users

Blacksky, a decentralized social network built on Bluesky's AT Protocol, has rapidly grown to two million users organically, showcasing the potential of decentralized platforms. Prioritizing Black voices and community safety, Blacksky uses its custom-built, open-source tools and a community-based moderation system to maintain its unique identity, independent from Bluesky. Its success highlights the power of decentralized infrastructure in fostering inclusive and self-governed online spaces.

Read more
Tech

Fenster: A Minimal Cross-Platform 2D Canvas Library

2025-08-26
Fenster: A Minimal Cross-Platform 2D Canvas Library

Fenster is a minimalistic cross-platform 2D canvas library reminiscent of Borland BGI or QBASIC graphics. It offers a single application window, a 24-bit RGB framebuffer, cross-platform keyboard/mouse input, and audio playback—all with minimal code. A simple polling API avoids callbacks or multithreading. It boasts C99, Go, Zig, and Lua bindings, and yes, it can even run Doom!

Read more
Development 2D graphics

Turning an Old iPhone into a UniFi Protect Camera with Docker

2025-08-26

The author successfully integrated an old iPhone's camera into their UniFi Protect system using a Docker container. Lacking an iOS app with native ONVIF support, they cleverly used an RTSP app (IP Camera Lite) and an ONVIF proxy Docker container. ffmpeg was used to verify the RTSP stream, and after some configuration adjustments (including specifying the correct width/height), the DIY camera was successfully added to UniFi Protect, replacing their previous Surveillance Station and Scrypted setups.

Read more

RubyGems.org's Multi-Layered Defense Against Malicious Gems

2025-08-26

RubyGems.org recently thwarted an attack involving malicious gems designed to steal social media credentials. Their success stems from a multi-layered security approach: automated detection (static and dynamic code analysis), risk scoring, retroactive scanning, and external intelligence. Upon detection, suspicious gems undergo manual review; confirmed malicious gems are removed and documented. In a recent incident, RubyGems.org removed most malicious packages before Socket.dev's report and actively collaborated on the investigation, demonstrating effective security response. The article encourages community participation in security maintenance and calls for corporate support of RubyGems.org's security efforts.

Read more
Development Malicious Gems

Reverse-Engineered: High-Res Raspberry Pi Internal Scans Released

2025-08-26

Following Jonathan Clark's and TubeTime's reverse engineering efforts on the Raspberry Pi Zero 2 W and Compute Module 5 respectively, and their subsequent release of schematics and processes, the author discovered they possessed high-resolution Lumafield scans of most modern Raspberry Pi models (excluding the larger keyboard form factor Pis). These scans, offering detailed internal views, are now publicly available for community exploration and analysis.

Read more
Hardware 3D Scans

DeepWiki: Your AI Coding Powerhouse

2025-08-26
DeepWiki: Your AI Coding Powerhouse

DeepWiki instantly transforms any GitHub repository into a navigable wiki, dramatically boosting AI-assisted coding efficiency. It offers fast and deep search modes, providing precise answers with source code links. The DeepWiki MCP server integrates seamlessly with AI IDEs like Claude and Cursor for real-time context querying. DeepWiki helps understand codebases, generate code snippets, evaluate open-source library security and licenses, and even assists with code reviews. Whether you're a beginner or an expert, DeepWiki is a powerful tool for efficient coding.

Read more
Development

Real-time 3D Human Motion Detection and Visualization using WiFi CSI

2025-08-26
Real-time 3D Human Motion Detection and Visualization using WiFi CSI

WiFi-3D-Fusion is an open-source project that leverages Channel State Information (CSI) from local Wi-Fi to perform real-time human motion detection and 3D visualization. Supporting both ESP32-CSI and Nexmon data acquisition, it employs advanced CNNs for person detection and tracking, including multi-person identification and re-identification. A continuous learning pipeline allows the model to automatically improve during operation. Visualization is offered through both a web interface and a terminal-based pipeline. Optional integrations with Person-in-WiFi-3D, NeRF², and 3D Wi-Fi Scanner are also provided.

Read more

Annotated Transformer: A Line-by-Line Implementation

2025-08-26

This document presents an annotated, line-by-line PyTorch implementation of the Transformer paper. It reorders and removes some sections from the original paper and adds comments throughout. The notebook provides a complete, runnable implementation, explaining the Transformer architecture (encoder, decoder, attention, positional encoding, etc.), training process, and a real-world example (Multi30k German-English translation).

Read more
Development

Scala Capture Checking: The Tech Behind a Failed Talk

2025-08-26

This article recounts the author's failed presentation on capture checking at Scala Days 2025 and the subsequent deep dive into the technology. Capture checking aims to solve the problem of values escaping their intended scope, such as premature closure of resources in try-with-resource patterns. Scala implements capture checking by introducing 'capture sets', a type system feature that allows marking a type and all values it captures. The article details capture sets, subtyping, syntactic sugar, and the mechanisms for capturing functions and classes, exploring capture set behavior in type parameters. Ultimately, the author argues that while capture checking involves many details, it's a largely invisible feature for most developers, improving Scala's safety and enabling wider capabilities usage.

Read more
Development Capture Checking

Unexpected CPU Performance Boost from Data Structure Optimization

2025-08-26

A program processing a large dataset encountered memory and CPU performance bottlenecks. Initially using a single array to store data resulted in up to 1GB of memory consumption. By employing data-oriented programming, splitting the data into multiple arrays saved approximately 200MB of memory. Further optimization involved replacing a string array with byte array indices for field names, further reducing memory usage. Surprisingly, this change also significantly decreased CPU usage. The reason lies in the garbage collection mechanism: processing a string array requires the GC to traverse all string objects, while processing a byte array doesn't, thus drastically reducing GC overhead.

Read more

xv6-riscv-net: Bringing TCP/IP Networking to RISC-V xv6

2025-08-26
xv6-riscv-net: Bringing TCP/IP Networking to RISC-V xv6

This project integrates a TCP/IP stack into the RISC-V version of the xv6 operating system, enabling network functionality. It includes a kernel-space port of the microps user-space TCP/IP stack, a virtio-net driver for network emulation in QEMU, a standard socket API, and a simple ifconfig command. A few commands build and launch QEMU, configure IP addresses, and allow pinging the xv6 guest from the host, along with testing TCP/UDP echo applications.

Read more
Development

Pushing the Limits of Time Synchronization on Linux: A 500ns Accuracy Challenge

2025-08-26
Pushing the Limits of Time Synchronization on Linux: A 500ns Accuracy Challenge

This post details an author's month-long quest to achieve high-precision time synchronization across multiple Linux systems on a local network. The goal was sub-microsecond accuracy for distributed tracing. Despite using GPS and Chrony, the author found achieving ideal precision challenging. GPS receiver jitter, network latency, and asymmetry introduced hundreds of nanoseconds of error. Ultimately, around 500ns synchronization accuracy was achieved on most systems—not quite the target, but sufficient for distributed tracing.

Read more
Development

Will Smith Concert Video Sparks AI Controversy: Real Crowds, AI-Enhanced Footage

2025-08-26
Will Smith Concert Video Sparks AI Controversy: Real Crowds, AI-Enhanced Footage

A short clip of a Will Smith concert went viral, sparking accusations of AI-generated fake crowds and signs. The reality is more nuanced. The video uses real footage of actual concertgoers from Smith's European tour. However, Smith's team used AI image-to-video models to create short animated clips from professionally shot audience photos for a concert montage. YouTube's subsequent post-processing added blurring and distortions, exacerbating the perception of AI-generated content. The 'AI artifacts' aren't entirely AI-generated but a result of AI application and YouTube's post-processing.

Read more

A Bug That Saved a Company

2025-08-26
A Bug That Saved a Company

In 2002, Rogue Amoeba released the first version of Audio Hijack with a 15-day unlimited trial, hoping to attract customers. Sales were disappointing. However, a bug in version 1.6 accidentally limited the trial to 15 minutes of recording. Surprisingly, this stricter limitation dramatically increased sales, transforming Rogue Amoeba from a side project into a company employing over a dozen people. This fortunate mistake saved both Audio Hijack and the company itself.

Read more
Startup

macOS CLI Tools: Stop Using ~/Library/Application Support!

2025-08-26
macOS CLI Tools:  Stop Using ~/Library/Application Support!

Many macOS command-line tools incorrectly store configuration files in ~/Library/Application Support, contradicting user expectations and the XDG standard. The article argues that popular libraries and dotfile managers adhere to the XDG standard, placing config files in ~/.config. The author contends that CLI tools should follow this convention for improved user experience and consistency; only GUI applications should utilize ~/Library/Application Support.

Read more

macOS Tahoe's Utility App Icons: Dead Canaries

2025-08-26
macOS Tahoe's Utility App Icons: Dead Canaries

The new utility app icons in macOS 26 Tahoe Beta 7 are drawing heavy criticism. The author argues the new icons, all using a lazy wrench motif, are objectively terrible. Only a small portion of the icon represents the app's function, the rest being dominated by a poorly designed wrench and bolt. The design is criticized for its lack of detail and poor execution, exemplified by the Disk Utility icon being simply an Apple logo. This is seen as a canary in the coal mine, indicating deeper problems with Apple's design sensibilities.

Read more
Design icon design

Google's Datacenter-Scale Liquid Cooling: A Revolution for AI

2025-08-26
Google's Datacenter-Scale Liquid Cooling: A Revolution for AI

The rise of AI has created a significant heat challenge for datacenters. At Hot Chips 2025, Google showcased its massive liquid cooling system designed for its TPUs. This system uses CDUs (Coolant Distribution Units) for rack-level cooling, significantly reducing power consumption compared to air cooling and ensuring system stability through redundancy. Google also employs a bare-die design, similar to PC enthusiast 'de-lidding', to improve the heat transfer efficiency of its TPUv4. This solution not only tackles the immense cooling demands of AI but also points towards a new direction for future datacenter cooling solutions.

Read more
Tech

The MiniPC Revolution: Modular Computing for the Homelab

2025-08-26

MiniPCs are revolutionizing personal computing with their affordability, compact size, energy efficiency, and versatility. The author details how MiniPCs excel in homelab setups, network storage, and personal cloud solutions, highlighting their modular design's advantages in avoiding single points of failure and simplifying maintenance. Instead of a single powerful machine, MiniPCs offer a scalable and flexible approach to building a customized computing environment.

Read more

Global Exchanges Warn of Risks Posed by Tokenized Stocks

2025-08-26
Global Exchanges Warn of Risks Posed by Tokenized Stocks

The World Federation of Exchanges (WFE), representing the world's largest stock exchanges, has warned regulators about the risks of so-called tokenized stocks. These blockchain-based tokens mimic equities but lack the same rights and safeguards, potentially harming market integrity. The WFE, in a letter to the SEC, ESMA, and IOSCO, highlighted platforms like Coinbase and Robinhood's foray into this nascent sector, emphasizing that these 'tokenized stocks' are not equivalent to actual shares. The WFE urged regulators to apply securities rules to these assets, clarify legal frameworks, and prevent misleading marketing, citing potential investor losses and reputational damage to issuing companies.

Read more

Indoor Air Purification Tech: Effectiveness Questioned, Real-World Studies Needed

2025-08-26
Indoor Air Purification Tech: Effectiveness Questioned, Real-World Studies Needed

A new study reveals that many technologies claiming to purify indoor air and prevent virus spread lack human testing, and their potential risks remain unclear. The research analyzed nearly 700 studies on technologies like HEPA filters, UV lights, ionizers, and advanced ventilation systems. Only 9% examined their impact on human health. Researchers call for more real-world studies evaluating effectiveness and potential risks, standardized health outcome measures, and independent funding to inform public health policy.

Read more

Google Mandates App Developer Verification for Enhanced Android Security

2025-08-25
Google Mandates App Developer Verification for Enhanced Android Security

To combat malware and financial scams, Google announced that starting in 2026, only apps from verified developers will be installable on certified Android devices. This impacts all installation methods, including sideloading. The move aims to curb the proliferation of fake apps and malicious actors. A phased rollout begins in 2026 in select countries heavily impacted by fraudulent apps, with global implementation in 2027. Developers will have access to a verification process, with separate workflows for students and hobbyists.

Read more

Understanding Big O Notation: A Practical Guide

2025-08-25
Understanding Big O Notation: A Practical Guide

This article provides a clear and concise explanation of Big O notation, a method for describing algorithm performance. Using JavaScript's `sum` function as an example, it compares the differences between O(1) constant time, O(log n) logarithmic time, O(n) linear time, and O(n^2) quadratic time complexities. Visualizations and code examples illustrate the time complexities of various algorithms, including bubble sort and binary search. The article also explores techniques for improving code performance, such as avoiding `indexOf` within loops and leveraging caching to reduce redundant computations. Finally, it emphasizes the importance of empirical testing, cautioning against blindly trusting theoretical results.

Read more
Development time complexity

Hacking My Logitech MX Ergo: USB-C, Silent Clicks, and Better Software

2025-08-25

The author loves their Logitech MX Ergo mouse, but it has flaws: a micro-USB charging port, loud clicks, and bloated software. After eight years of waiting for an update, they decided to take matters into their own hands. This involved a challenging but rewarding USB-C port replacement, detailed soldering instructions, swapping out noisy switches for silent Huano alternatives, and finally ditching Logitech's software for the leaner SteerMouse. It's a compelling story of DIY customization and a deep dive into the process.

Read more
Hardware Mouse Mod

Chinese Solar Giants Post Massive Losses Amidst Price War

2025-08-25
Chinese Solar Giants Post Massive Losses Amidst Price War

Major Chinese solar panel manufacturers reported significant losses in the first half of the year due to overcapacity and U.S. trade restrictions. The industry faces pressure to reduce output, with the Chinese government urging the closure of outdated facilities. A supply glut and the U.S. crackdown exacerbated price wars, leading to substantial losses for many companies.

Read more
Tech

Taming the Synchronized Demand Spike: A Principled Approach

2025-08-25
Taming the Synchronized Demand Spike: A Principled Approach

Synchronized demand, where a large number of clients request service almost simultaneously, can overwhelm even well-resourced systems. This article presents a principled approach to mitigate this using randomized jitter to spread requests over time. By calculating a safe window size (W), requests are uniformly distributed, thus reducing peak arrival rate. The article further discusses leveraging server-side hints (like Retry-After headers) and rate limiting to refine the strategy, balancing system stability and fairness. The approach is framed as a control problem, emphasizing the need for telemetry-driven decision-making and verification.

Read more
Development
1 2 49 50 51 53 55 56 57 596 597