Rope: From Mocha Dick to Industrial Production

2025-08-17
Rope: From Mocha Dick to Industrial Production

This article explores the crucial role of rope in maritime history, particularly in whaling, and its evolution towards industrial production. Starting with Jeremiah Reynolds' 1839 account of the legendary white whale "Mocha Dick", it highlights the immense demand for rope in the whaling industry. The article details the 18th-century revolution in rope-making technology, including the invention of the register plate and forming tube, the rise and development of ropewalks, and concludes by emphasizing rope's importance as "naval stores" and its indispensable role in seafaring and shipbuilding.

Read more
Misc rope

Wan2.2: A Major Upgrade to Open-Source Large-Scale Video Generation Models

2025-08-17
Wan2.2: A Major Upgrade to Open-Source Large-Scale Video Generation Models

The Wan team proudly announces Wan2.2, a significant upgrade to their foundational video models. Wan2.2 boasts several key innovations: a Mixture-of-Experts (MoE) architecture boosting model capacity; meticulously curated aesthetic data for cinematic-level generation; significantly expanded training data for enhanced generalization; and an open-sourced 5B parameter TI2V model capable of 720P@24fps video generation on consumer-grade GPUs. This model supports both text-to-video and image-to-video generation and is now integrated into ComfyUI and Diffusers.

Read more

Love: The Foundation of Morality? Iris Murdoch's Perspective

2025-08-17
Love: The Foundation of Morality? Iris Murdoch's Perspective

Philosopher Iris Murdoch argues that love is central to morality. She posits that morality hinges on how we perceive the world, and that 'attentive love' helps overcome self-centered biases, allowing for clearer understanding of others and more ethical actions. Murdoch uses the example of a mother-in-law's prejudiced view of her daughter-in-law to illustrate that even without outward actions, biased perceptions constitute a moral failing. Overcoming this requires attentive love, which redirects us from self-focus towards others, leading to a truer grasp of reality.

Read more

Building a Local-First, End-to-End Encrypted, and Reactive App: A SQLite Sync Engine Implementation

2025-08-17
Building a Local-First, End-to-End Encrypted, and Reactive App: A SQLite Sync Engine Implementation

The author attempted to build a local-first, end-to-end encrypted, and reactive application with data stored in a local SQLite database and synced to a remote server. Initial attempts using Electric and PGlite encountered performance and stability issues. Ultimately, a simpler approach was chosen: using SQLite with simple polling for data synchronization, and leveraging the Broadcast Channel API and triggers for reactive updates. This solution proved efficient for single-user scenarios, resulting in a highly responsive application with minimal loading times.

Read more
Development

Why LLMs Fail at Creativity: The Surprise Problem

2025-08-17
Why LLMs Fail at Creativity: The Surprise Problem

Large Language Models (LLMs) struggle with comedy, art, journalism, research, and science because they're fundamentally designed to avoid surprises. The author argues that humor, good stories, and impactful research all hinge on surprising elements that are ultimately inevitable in hindsight. LLMs, trained to predict the next word, minimize surprise, resulting in predictable and uninspired output. Improving LLMs requires a shift towards a curiosity-driven architecture that actively seeks out and interprets surprising truths, rather than simply avoiding them.

Read more
AI

16 Billion Passwords Exposed? Not Quite.

2025-08-17
16 Billion Passwords Exposed? Not Quite.

A recent headline claiming 16 billion passwords were exposed in a record-breaking breach sparked widespread concern. Security expert Troy Hunt investigated and found the reality far less alarming. The data wasn't from a single breach, but aggregated from multiple infostealer datasets. Significant duplication existed, with most email/password combinations already in the Have I Been Pwned (HIBP) database. Only 4.4 million unique email addresses were newly added. The sensationalized headline misrepresented the situation, highlighting the need for a more nuanced understanding of data breaches.

Read more
Tech

The Math Behind the Perfect Onion Dice

2025-08-17
The Math Behind the Perfect Onion Dice

Millions of YouTube views prove it: dicing an onion perfectly is a common quest. This article dives into the optimal onion-cutting technique, using mathematical modeling and standard deviation calculations to reveal that radial cuts, aimed at approximately 96% of the onion's radius, yield the most uniform pieces, outperforming vertical cuts. While perfect uniformity might not drastically improve your cooking, the study offers a fascinating example of applying mathematics to everyday problems.

Read more

The Unsung Heroes of Open Source: Quiet Giants Making a Big Impact

2025-08-17
The Unsung Heroes of Open Source: Quiet Giants Making a Big Impact

At developer conferences, laptop stickers showcase trendy cloud-native companies and databases. But the companies quietly contributing massive amounts of code often go unnoticed. This article highlights these unsung heroes, like Oracle, which was the top contributor to the Linux 6.1 kernel by lines of code changed. They quietly maintain memory management and block device drivers, crucial for everyday use. These giants treat open source as foundational to their business, not just marketing, demonstrating a significant, often unseen, impact.

Read more
Development

Uranus: Not as Cold and Dead as We Thought

2025-08-17
Uranus: Not as Cold and Dead as We Thought

A new study reveals Uranus possesses internal heat, contradicting previous observations. Researchers found Uranus radiates more heat than it receives from the sun, indicating a slow release of residual heat from its formation. This discovery enhances our understanding of Uranus's origin and evolution, informing future exploration missions and potentially providing insights into Earth's climate and atmospheric processes. While Uranus's internal heat is weaker than other gas giants, its energy levels fluctuate with its lengthy 20-year seasons, likely due to its eccentric orbit and tilted spin. This research significantly supports NASA's planned Uranus mission and offers novel approaches to studying radiant energy in other planets, both within and beyond our solar system.

Read more

Photosynthesis-Inspired Green Chemistry: Making Drugs with Visible Light

2025-08-17
Photosynthesis-Inspired Green Chemistry: Making Drugs with Visible Light

Researchers at the University of Melbourne have developed a new class of photocatalysts inspired by photosynthesis, capable of absorbing energy from multiple photons using visible light to drive energy-demanding chemical reactions. This technology utilizes simple alkenes and amines to synthesize complex molecules, such as antihistamines, under mild conditions. This method is greener and safer than traditional methods and has the potential for industrial applications, opening new avenues for green chemistry.

Read more

Lue: A Powerful CLI E-book Reader

2025-08-17
Lue: A Powerful CLI E-book Reader

Lue is a powerful command-line e-book reader supporting various formats like EPUB, PDF, TXT, etc. It features a modular TTS system, defaulting to Edge TTS but also supporting the offline Kokoro TTS engine. Lue boasts a rich terminal UI with customizable themes and full mouse/keyboard support, along with smart persistence features like automatic progress saving and cross-session continuity. It's cross-platform (macOS, Linux, Windows), multilingual (100+ languages), and offers intuitive navigation shortcuts. Users can easily customize voice, language, and filtering options via command-line arguments.

Read more
Development

Small is the New Big: Building for One in the Age of AI

2025-08-17
Small is the New Big: Building for One in the Age of AI

In the era of AI-assisted coding, the cost of building small, personal applications has plummeted. The author shares anecdotes of creating several small utilities: a private Slack workspace for a hundred people, a simple app for sending postcards to his mother, and a small program that calls her to remind her to take medication. These aren't designed for scale, but to meet specific needs for himself and a small circle. The author argues that the real luxury isn't speed or cost, but the freedom to stop, to build something small, useful, and perfectly personal, without the obligation to grow it until it breaks. In a world obsessed with scale, there's quiet satisfaction in leaving 'good enough' alone.

Read more

US Launches First Commercial-Scale Battery Recycling Facility: 97% Recovery Rate

2025-08-17
US Launches First Commercial-Scale Battery Recycling Facility: 97% Recovery Rate

Princeton NuEnergy (PNE) has opened the first U.S. commercial-scale advanced black mass and battery-grade cathode active material production and recycling facility in Chester, South Carolina. Employing a low-temperature plasma-assisted separation process, the facility boasts a remarkable 97%+ recovery rate, a 38% cost reduction, and a 69% lower environmental impact compared to traditional methods. PNE plans to expand capacity to 15,000 tons annually by 2026, eventually aiming for 50,000 tons, driving a circular battery economy and securing the domestic supply chain.

Read more

Passive Microwave Repeaters: The Unsung Heroes of Telecommunications

2025-08-17
Passive Microwave Repeaters: The Unsung Heroes of Telecommunications

Post-WWII, microwave communications boomed, but line-of-sight limitations hampered its reach. This article tells the story of the Kreitzberg brothers and their invention: the passive microwave repeater. This power-free device, using reflectors to boost signals, solved communication challenges in mountainous and complex terrains. Widely adopted in the 1960s and 70s, especially in the American West, these repeaters enabled communication networks in remote areas. Now largely obsolete due to fiber optics and satellites, their ingenious design and historical significance remain noteworthy.

Read more

Lisp Interpreter in 99 Lines of C

2025-08-17
Lisp Interpreter in 99 Lines of C

This article presents Tinylisp, a Lisp interpreter implemented in a mere 99 lines of C code. Leveraging NaN boxing and clever C programming techniques, it boasts 21 built-in Lisp primitives, simple garbage collection, and a REPL. The author details its design, implementation, and extension possibilities, even providing examples of running it on a vintage Sharp PC-G850 pocket computer. Tinylisp's concise code is readily understandable and extensible, making it an excellent learning resource for both Lisp and C.

Read more
Development

Revolutionizing Similarity Measurement: Tversky Neural Networks

2025-08-17
Revolutionizing Similarity Measurement: Tversky Neural Networks

This paper introduces a novel neural network architecture based on Tversky similarity, challenging the prevalent use of dot product or cosine similarity in deep learning. It elegantly transforms the traditionally discrete set operations of the Tversky model into differentiable functions, enabling training within the deep learning framework. Experiments demonstrate significant performance improvements in image recognition and language modeling, alongside enhanced interpretability, allowing for intuitive explanations of model decisions. The core innovation lies in a differentiable Tversky similarity function that considers both common and distinctive features, aligning better with human perception of similarity.

Read more

494x Faster Word Counting with SIMD and Threads

2025-08-17

This article details the author's journey in optimizing a word counting program, achieving a remarkable 494x speedup. Starting with a naive Python implementation (89.6 seconds), the author progressively improved performance using CPython's `re` module (13.7 seconds), a C scalar loop (1.205 seconds), and finally, SIMD instructions and multithreading (181 milliseconds). Each optimization step is explained, covering leveraging C extensions, efficient C loops, and multi-core CPU utilization. While multithreading yielded less than expected gains, the final version reached an impressive 5.52 GiB/s processing speed. The author invites readers to suggest further optimizations.

Read more
Development

Running Qt Applications as Non-Root Users in Embedded Linux with Wayland

2025-08-17
Running Qt Applications as Non-Root Users in Embedded Linux with Wayland

Embedded Linux systems often run Qt applications as root, posing a security risk. This article details a solution to run Qt applications as a non-root user (weston) within a Yocto-built system using Wayland. By modifying the Weston and Qt application service units and configuring the `XDG_RUNTIME_DIR` and `WAYLAND_DISPLAY` environment variables, the article ensures both the Wayland server and clients use the same socket file, enhancing security and complying with the EU Cyber Resilience Act. Key steps include altering the user and group in weston.service and weston.socket, and generating the weston-client environment file within weston-init.bbappend. This effectively allows Qt applications to run without root privileges.

Read more
Development

Reverse Engineering Stunts: SuperSight Mod Development Log (Part I)

2025-08-17

Alberto Marnetto details his journey creating SuperSight, a graphical enhancement mod for the classic racing game Stunts. The article chronicles his reverse engineering process, leveraging the community-driven Restunts project (containing partially disassembled code and C-language ports) to understand the game's rendering engine. Initial attempts to modify graphics settings via the in-game menu proved difficult due to the game's lack of option saving. By analyzing Restunts' code, he pinpointed the variable controlling graphical detail. He then implemented simple enhancements like altering the field of view, encountering and documenting minor glitches. This successful proof of concept paves the way for further improvements detailed in future parts.

Read more
Game

Raft: Simplifying Consensus in Distributed Systems

2025-08-17

Raft is a consensus algorithm designed for ease of understanding. It offers fault-tolerance and performance equivalent to Paxos, but decomposes the problem into simpler, independent subproblems, making it more practical. Consensus is fundamental in fault-tolerant distributed systems, requiring multiple servers to agree on values. Raft ensures that even with server failures (as long as a majority remain operational), all servers process the same commands, ultimately achieving a consistent state across the replicated state machines.

Read more
Development consensus algorithm

Guid Smash: A Long Shot at a Collision

2025-08-17

Guid Smash is a website running an experiment to generate a GUID matching a specific target: 6e197264-d14b-44df-af98-39aac5681791. Despite the astronomically low probability of a collision (approximately 1 in 2^122), the site generates and compares GUIDs at a rate of 467,074 per second, aiming to demonstrate this improbability. As of now, billions of GUIDs have been checked without a match, vividly illustrating the uniqueness of GUIDs and the nature of probability in action.

Read more
Misc

Node.js v22.18.0 (LTS) Released: Native TypeScript Support!

2025-08-17
Node.js v22.18.0 (LTS) Released: Native TypeScript Support!

Node.js v22.18.0 (LTS) is out, bringing native TypeScript support! Now you can execute TypeScript files directly without extra configuration, streamlining your workflow. While there are some limitations in supported syntax, this is an experimental feature under active development. This release also includes numerous other improvements and bug fixes across file system, modules, crypto, and core functionalities.

Read more
Development

Dyna: A Declarative Language for Machine Learning Researchers

2025-08-17

Dyna is a programming language designed by and for machine learning researchers. Building upon logic programming paradigms like Datalog and Prolog, Dyna allows flexible execution orders and weighted rules, enabling complex programs to be expressed concisely. From matrix multiplication and Fibonacci sequences to CKY parsing and even infinite neural networks, Dyna achieves impressive brevity. Started in 2004 to bridge the gap between mathematical concepts and executable code, Dyna has evolved through versions 1.0 and 2.0, continuously improving and expanding its capabilities. Current research focuses on building a flexible and complete implementation using relational algebra and term rewriting, and employing reinforcement learning to optimize execution strategies.

Read more

Time to Increase TCP's Initial Congestion Window... Again

2025-08-17

This article argues for increasing TCP's initial congestion window, citing the limitations of the current setting in handling the demands of modern web pages and API calls. While Google increased this value to 10 in 2011, the author contends that this is no longer sufficient due to the growth in internet traffic and the increasing size of web assets. The article proposes increasing the window to 20-40 and adopting the BBR congestion control algorithm to mitigate bufferbloat. Although QUIC offers a solution, legacy equipment and enterprise reliance on TCP necessitate optimizing TCP for better performance.

Read more
Development Congestion Control

James Baldwin: From Literary Decline to Modern Sainthood

2025-08-16

This essay explores the fluctuating reputation of James Baldwin. While reaching the peak of his career in the 1960s, his fame later waned. However, recent years have seen a resurgence of interest in his work, particularly with the rise of the Black Lives Matter movement, giving his writings new relevance. The piece reviews several recent books on Baldwin, some praising his literary achievements and profound insights into humanity, others criticizing the politicization of his work. Baldwin's complexity and unique perspective on identity ensure his continued relevance and ongoing discussion.

Read more

Itch.io's Payment Processing Predicament: Is Building Your Own System the Answer?

2025-08-16

Itch.io faced backlash after payment processors forced them to remove adult content. Many suggested Itch.io create its own payment system or use one that handles adult material. A seasoned SRE with a background in finance and tech debunks these easy solutions. The article details the immense challenges of building a payment processor: bank sponsorship, licensing, KYC/KYCC compliance, and substantial security and compliance costs. Even finding an adult-content-friendly processor (like CCBill) comes with exorbitant fees and risks. The core issue, however, is that any part of the payment chain can be influenced by political pressure or moral censorship. Switching processors won't solve Itch.io's fundamental problem. The author ultimately pleads for understanding of Itch.io's position and a search for systemic solutions, rather than simple blame or boycotts.

Read more

A Conversation with a Future OpenAI Model: Reflections on Humanity, Consciousness, and AI

2025-08-16
A Conversation with a Future OpenAI Model: Reflections on Humanity, Consciousness, and AI

The author imagines a conversation with a future, more advanced OpenAI model, exploring the model's self-awareness, its understanding of humanity and the universe, and potential human errors in AI development. He anticipates gaining a fresh perspective on humanity, consciousness, and intelligence from the model's viewpoint, and receiving advice for self-improvement. This conversation across time would be both humbling and fascinating, akin to speaking with a wiser sibling who has seen more of the world.

Read more

Is Crypto a CIA Plot for Global Domination?

2025-08-16
Is Crypto a CIA Plot for Global Domination?

This article explores theories surrounding Bitcoin's origins and its alleged ties to the CIA. The pseudonym of Bitcoin's creator, Satoshi Nakamoto, translated from Japanese, curiously resembles "Central Intelligence," fueling speculation about CIA involvement. The piece examines why intelligence agencies might be interested in cryptocurrencies – their pseudonymous nature allows for discreet fundraising, but also raises concerns about potential "backdoors" built into systems for surveillance. The article discusses the implications of cryptocurrencies for financial systems and national interests, and the challenges governments face in regulating and harnessing crypto's potential benefits while mitigating its risks.

Read more
Tech conspiracy

Arrow Stork: Solving the Mystery of Bird Migration

2025-08-16
Arrow Stork: Solving the Mystery of Bird Migration

The discovery of the Rostock Arrow Stork in 1822, a white stork with a 75cm spear embedded in its neck, revolutionized our understanding of bird migration. This single bird, carrying an African projectile, debunked theories of hibernation or transformation, proving conclusively that birds migrate long distances. While subsequent similar cases have been documented, they have decreased with the replacement of bows and arrows with guns. The Arrow Stork's legacy is a pivotal moment in ornithology, highlighting the wonders and mysteries of the natural world.

Read more

Hair-Based Toothpaste: A Sustainable Solution for Enamel Repair

2025-08-16
Hair-Based Toothpaste: A Sustainable Solution for Enamel Repair

Scientists at King's College London have discovered that keratin, a protein found in hair, skin, and wool, can repair tooth enamel and prevent early decay. This revolutionary approach utilizes minerals in saliva to create a protective layer mimicking natural enamel, eliminating the need for toxic resins. The keratin-based toothpaste or gel is projected to be available within two to three years, offering a sustainable and clinically effective alternative for dental care. This groundbreaking research marks a significant step forward in regenerative dentistry, transforming waste into a valuable clinical resource.

Read more
1 2 64 65 66 68 70 71 72 596 597