Huey
October 22, 2024

Hacker News

Show HN: I made a tool for curating and sharing links as lists

Curate, share and never forget your favorite linksSave sites, recipes, inspiration—whatever you want, just save it and snack later.Share lists with friendsSee which links are trendingHow it worksEvery feature you need for seamless list creationChoose the emoji, title, and description for your listType or paste any link, and rearrange them in any orderAdd to your lists over time and share it anywhere onlineInternet ShareablesEvery feature you need for seamless list creationUse CasesPerfect for any creative scenarioFor DesignersDesign inspiration, portfolios, etc.For...

about 2 hours ago

Hacker News

A Report from the 2024 Image-Based Linux Summit

The following subscription-only content has been made available to you by an LWN subscriber. Thousands of subscribers depend on LWN for the best news from the Linux and free software communities. If you enjoy this article, please consider subscribing to LWN. Thank you for visiting LWN.net! The Image-Based Linux Summit has by now established itself as a yearly event. Following on from last year's edition, the third edition was held in Berlin on September 24, the day before All Systems Go! 2024...

about 2 hours ago

Hacker News

Elderly dementia patients are unwittingly fueling political campaigns

(CNN) — The 80-year-old communications engineer from Texas had saved for decades, driving around in an old car and buying clothes from thrift stores so he’d have enough money to enjoy his retirement years. But as dementia robbed him of his reasoning abilities, he began making online political donations over and over again — eventually telling his son he believed he was part of a network of political operatives communicating with key Republican leaders. In less than two years, the...

about 2 hours ago

Hacker News

StabilityAI releases Stable Diffusion 3.5

(Image credit: StabilityAI) StabilityAI is today releasing its new Stable Diffusion 3.5 family of AI image models. It comes with improved realism, prompt adherence and text rendering compared to SD3.Like the first incarnation of SD3, Stable Diffusion 3.5 comes in three sizes — Large (8B), Large Turbo (8B), and Medium (2.6B). These are all customizable and tuned to run on consumer hardware, while also being available to use under the Stability AI Community License.In short, this is a big step...

about 2 hours ago

Hacker News

IBM's new SWE agents for developers

IBM SWE-Agent 1.0 from IBM Research is the first set of software engineering (SWE) agents of its kind powered by open LLMs that can autonomously resolve GitHub issues efficiently.For most software developers, every day starts with where the last one left off. Trawling through the backlog of issues on GitHub you didn’t deal with the day before, you're triaging which ones you can fix quickly, which will take more time, and which ones you really don’t know what to do...

about 3 hours ago

Hacker News

Show HN: I built a tool that helps people scan and clean any repo for secrets

Scan your codebase, logs, build environments, repos, and CI pipelines for leaked secrets and API tokens.

about 4 hours ago

Hacker News

The Tragedy of Google Books (2017)

meshaphoto / Getty / Konstantin Orlov / Shutterstock / Katie Martin / The Atlantic“Somewhere at Google there is a database containing 25 million books and nobody is allowed to read them.”You were going to get one-click access to the full text of nearly every book that’s ever been published. Books still in print you’d have to pay for, but everything else—a collection slated to grow larger than the holdings at the Library of Congress, Harvard, the University of Michigan, at...

about 4 hours ago

Hacker News

RunwayML releases Act One: obsoleting traditional motion capture

At Runway, our mission is to build expressive and controllable tools for artists that can open new avenues for creative expression. Today, we're excited to release Act-One, a new state-of-the-art tool for generating expressive character performances inside Gen-3 Alpha. Act-One can create compelling animations using video and voice performances as inputs. It represents a significant step forward in using generative models for expressive live action and animated content. Animating a generated character using nothing more than a simple video of...

about 4 hours ago

Hacker News

Nearly 40% of software engineers will only work remotely (2023)

SearchSAP SearchOracle Business Analytics Content Management Sustainability and ESG

about 5 hours ago

Hacker News

Mining Bitcoin with pencil and paper: 0.67 hashes per day

I decided to see how practical it would be to mine Bitcoin with pencil and paper. It turns out that the SHA-256 algorithm used for mining is pretty simple and can in fact be done by hand. Not surprisingly, the process is extremely slow compared to hardware mining and is entirely impractical. But performing the algorithm manually is a good way to understand exactly how it works. A pencil-and-paper round of SHA-256 The mining process Bitcoin mining is a key...

about 5 hours ago

Hacker News

USGS uses machine learning to show large lithium potential in Arkansas

Skip to main content Official websites use .gov A .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

about 5 hours ago

Hacker News

Requiem for Raghavan

Last week, Prabhakar Raghavan was relieved of duty as Senior Vice President of Search, becoming Google's "Chief Technologist." An important rule to follow with somebody's title in Silicon Valley is that if you can't tell what it means, it probably doesn't mean anything. The most notorious example of this is when AOL employed "Shingy," a Digital Prophet, and if you have any information about what he did at AOL, please email me at ed@ezpr.com immediately.Anyway, back to Prabhakar. Although ostensibly less...

about 6 hours ago

Hacker News

Show HN: Open-source Counter-Strike-like game

Competitive multiplayer FPS game where two football fan teams fight with the goal of winning more rounds than the opponent team. Teams are Attackers and Defenders. The Defenders team has a goal of protecting their fan base sanctuary every round from desecrating by attackers using their graffiti bomb ball. Defenders win round by: eliminated all attackers players before bomb planted (touchdown) defusing bomb before it blows (graffiti fireworks) at least one player survive round time and no bomb is planted...

about 6 hours ago

Hacker News

The PlanetScale vectors public beta

Skip to contentYou can now use the vector data type for vector search and storage in your PlanetScale MySQL database.We're excited to announce that PlanetScale vector search and storage is now available in open beta! With PlanetScale vector support, you can store your vector data alongside your application's relational MySQL data — eliminating the need for a separate specialized vector database.What sets PlanetScale vector search and storage apart?When we decided to add vector support to PlanetScale's MySQL fork, we knew...

about 6 hours ago

Hacker News

The Human Cost of Our AI-Driven Future

A blurred screen flashes before our eyes, accompanied by a deceptively innocuous “sensitive content” message with a crossed-out eye emoji. The warning’s soft design and playful icon belie the gravity of what lies beneath. With a casual flick of our fingers, we scroll past, our feeds refreshing with cat videos and vacation photos. But in the shadows of our digital utopia, a different reality unfolds.In cramped, poorly lit warehouses around the world, an army of invisible workers hunches over flickering...

about 7 hours ago

Hacker News

Computer use, a new Claude 3.5 Sonnet, and Claude 3.5 Haiku

Today, we’re announcing an upgraded Claude 3.5 Sonnet, and a new model, Claude 3.5 Haiku. The upgraded Claude 3.5 Sonnet delivers across-the-board improvements over its predecessor, with particularly significant gains in coding—an area where it already led the field. Claude 3.5 Haiku matches the performance of Claude 3 Opus, our prior largest model, on many evaluations for the same cost and similar speed to the previous generation of Haiku.We’re also introducing a groundbreaking new capability in public beta: computer use....

about 7 hours ago

Hacker News

We built a new powerful JSON data type for ClickHouse

JSON has become the lingua franca for handling semi-structured and unstructured data in modern data systems. Whether it’s in logging and observability scenarios, real-time data streaming, mobile app storage, or machine learning pipelines, JSON’s flexible structure makes it the go-to format for capturing and transmitting data across distributed systems. At ClickHouse, we’ve long recognized the importance of seamless JSON support. But as simple as JSON seems, leveraging it effectively at scale presents unique challenges, which we briefly describe below. ClickHouse...

about 8 hours ago

Hacker News

Show HN: Rust Web Framework

You can’t perform that action at this time.

about 8 hours ago

Hacker News

Rustls Outperforms OpenSSL and BoringSSL

Josh Aas, Joe Birr-Pixton, and Daniel McCarneyOct 22, 2024ISRG has been investing heavily in the Rustls TLS library over the past few years. Our goal is to create a library that is both memory safe and a leader in performance.Back in January of this year we published a post about the start of our performance journey. We've come a long way since then and we're excited to share an update on Rustls performance today.What is Rustls?Rustls is a memory safe...

about 9 hours ago

Hacker News

World-First Starlink Service on Boeing 777 Launched by Qatar Airways

Qatar Airways has just made aviation history by launching the world's first Starlink-equipped Boeing 777 flight. This groundbreaking development promises to revolutionize how we stay connected at 35,000 feet. Let's dive into what this means for travellers! The Big News Qatar Airways operated its first Starlink-equipped Boeing 777 flight from Doha to London on October 22, 2024, marking several industry firsts: World's first Starlink-equipped Boeing 777 widebody First Starlink implementation in the MENA region Largest passenger aircraft equipped with Starlink...

about 9 hours ago

Hacker News

Ghostty 1.0 Is Coming

After nearly two years of development and private beta testing1, I’m excited to share that Ghostty 1.0 will be publicly released in December 2024 as an open-source project under the MIT license. In this blog post, I want to restate the broader goals of the Ghostty project and outline the specific goals for the 1.0 release. I have ambitious plans for Ghostty, but I also want to set clear expectations for what to expect on day one versus what will...

about 9 hours ago

Hacker News

Malcolm Gladwell Holds His Ideas Loosely. He Thinks You Should, Too

Malcolm Gladwell, the best-selling author, has an office on a quiet street in Hudson, N.Y., where he sits at a desk under a poster of Mao Zedong, the former communist leader of China. Why? Maybe to signal how ideas can be dangerous? Nope, no particular reason. There are two other Chinese communist posters on the wall, too. “I found them online for like $10,” said Mr. Gladwell, 61. “I just think it’s funny.”Mr. Gladwell, who has spent his career steeped...

about 10 hours ago

Hacker News

Show HN: AI Image Upscaler and Photo Enhancer with up to 10x resolution boost

imageUpscaler.io: Where AI Meets Image PerfectionUpscale Your Image NowTired of blurry or grainy photos? Our app uses the latest AI technology to sharpen and improve the quality of your images. Get professional-looking photos with just a few clicks.Want to print your photos in a larger size without them looking fuzzy? Our resolution booster can increase the pixel count while keeping your images clear and crisp. Works great for social media, websites, and more.How it worksUpscale your images with AI in...

about 10 hours ago

Hacker News

Against /tmp

I commented on Lobsters that /tmp is usually a bad idea, which caused some surprise. I suppose /tmp security bugs were common in the 1990s when I was learning Unix, but they are pretty rare now so I can see why less grizzled hackers might not be familiar with the problems. I guess that’s some kind of success, but sadly the fixes have left behind a lot of scar tissue because they didn’t address the underlying problem: /tmp should not...

about 10 hours ago

Hacker News

Tog's Paradox

Tog’s Paradox (also known as The Complexity Paradox or Tog’s Complexity Paradox) is an observation that products aiming to make a task more efficient tend to inspire new, more complex use cases. It’s one of the key reasons for the symptom of requirements changing after delivery in enterprise software products, and for feature creep in consumer products. Tog’s Paradox also explains why it’s futile to try to completely nail down requirements for a software product, as the product itself will...

about 10 hours ago

Hacker News

MixRank (YC S11) Is Hiring Software Engineers and Ex-Founders Globally

Work should be fun. At MixRank, we get to work with distributed systems, databases, data science, and big data. No meetings, no bureaucracy, no office, no time tracking— just challenging problems you can devote your full attention to.MixRank processes petabytes of data every month from web crawling. We have hundreds of customers using our data products including Google, Amazon, Facebook, Intel, and Adobe, across industries including Finance, Recruiting, Sales, Marketing, and Security. The company was founded in 2011 and received...

about 10 hours ago

Hacker News

Colorful cars are becoming a thing of the past

It feels like a distant memory, but once upon a time America's carmakers produced vehicles in a veritable rainbow of colors. As recently as 2005, more than half of all automobiles on the road were painted a color other than black, white, silver, or gray. Some of the tints even sported names straight out of a Hot Wheels collection: Tangerine Scream, Go Green, Plum Crazy. Explore the United States of Automobiles• See where in America your vehicle is most popular•...

about 11 hours ago

Hacker News

The Journal of Open Source Software

Committed to publishing quality research software with zero article processing charges or subscription fees. Submit a paper to JOSS 🎉 Volunteer to review

about 11 hours ago

Hacker News

Mercedes-Benz battery recycling plant recovers '96%' of materials

Mercedes-Benz just opened Europe’s first battery recycling plant using an innovative process that the automaker says enables recycling rate to more than 96%, all in-house and ready to be used in future Mercedes EVs. Opening in Kuppenheim, in southern Germany, the plant uses an integrated mechanical-hydrometallurgical process that can also process the so-called black mass, which Mercedes says makes it the first carmaker to close the battery recycling loop with its own in-house facility. The plant, which has been testing...

about 12 hours ago

Hacker News

MQTT turns 25

It’s October 2024 and I’m sitting here in my creative maker studio, wearing a bright t-shirt that excitedly bellows “MQTT 25”! To my left is a top-end Bambu Lab X1C 3D printer, that uses MQTT internally for communication. On my wall are a variety of connected gadgets that display data or that light up in response to MQTT notifications. Node-RED is sitting quietly on a Raspberry Pi in the corner, processing MQTT messages as they come and go. Today is...

about 12 hours ago

Hacker News

Undecided Hobbit Torn Between Dark Lord of Chaos and Elf Queen He Barely Knows

I’m a well-informed Hobbit—a Boffin from Overhill, thank you very much—who is in a kerfuffle about whom to throw my Hobbit-sized support behind. For some, the choice is clear, but for a little guy like me, I’m feeling awfully torn up, like a tear-and-share cheese bread during Winter Solstice! I simply can’t seem to decide between the Dark Lord determined to return to power and stay there until shadows drown all of Arda, or the Elf Galadriel, who seems to...

about 13 hours ago

Hacker News

RISC-V Announces Ratification of the RVA23 Profile

Vector and Hypervisor extensions are key mandatory components of the RVA23 Profile, addressing math-intensive workloads including AI/ML & cryptography, and enterprise hardware, operating systems and software workloads Santa Clara, Calif. – Oct. 21, 2024 – RISC-V International, the global standards organization, today announced that the RVA23 Profile is now ratified. RVA Profiles align implementations of RISC-V 64-bit application processors that will run rich operating systems (OS) stacks from standard binary OS distributions. RVA Profiles are essential to software portability across...

about 13 hours ago

Hacker News

Don't Publish with IEEE

D. J. Bernstein Notes on writing papers Before you read this page, you should understand (1) authors putting papers online to benefit readers, (2) commercial publishers using copyright to limit #1, and (3) authors dedicating papers to the public domain as one way to stop #2. I have a separate page discussing these issues. It turns out that, in response to #3, IEEE is overriding its scientific referees and flat-out refusing to accept public-domain papers. I learned about this from...

about 13 hours ago

Hacker News

A Lisp compiler to ARM written in Lisp

21st August 2024 This is a simple experimental Lisp compiler, written in uLisp, that will compile a Lisp function into ARM machine code. My aim was to make the compiler simple enough so that its listing will fit on a single sheet of A4 paper. Updates 21st August 2024: This article describes Version 2 of the compiler which has the following improvements over the original, while keeping the size of the program unchanged: It compiles expressions to leave the result...

about 14 hours ago

Hacker News

Grok TiddlyWiki 2.0 is live

Showcase Hi everyone, I’m happy to announce that major revisions to my Grok TiddlyWiki learning resource are done, on schedule and under budget. Changes These revisions bring GTW up to date with many of the newest features in TiddlyWiki: procedures, functions, <% conditional expressions %>, custom widgets, parameterized field transclusions, and so on. Macros and similar older ways to achieve the same things are de-emphasized but still discussed. I’ve also read through the entire book and gotten a fresh set...

about 14 hours ago

Hacker News

One Plus One Equals Two (2006)

1+1=2 Whitehead and Russell's Principia Mathematica is famous for taking a thousand pages to prove that 1+1=2. Of course, it proves a lot of other stuff, too. If they had wanted to prove only that 1+1=2, it would probably have taken only half as much space. Principia Mathematica is an odd book, worth looking into from a historical point of view as well as a mathematical one. It was written around 1910, and mathematical logic was still then in its...

about 14 hours ago

Hacker News

Understanding Gaussians

The Gaussian distribution, or normal distribution is a key subject in statistics, machine learning, physics, and pretty much any other field that deals with data and probability. It’s one of those subjects, like $\pi$ or Bayes’ rule, that is so fundamental that people treat it like an icon. To start at the beginning: the normal distribution is a probability distribution: a mathematical object that describes a process by which you can sample data. Here is an example. If I measure...

about 15 hours ago

Hacker News

Singapore OKs 4,300km subsea cable for importing electricity from Australia

The Energy Market Authority (EMA) has granted Sun Cable Conditional Approval to supply electricity from Australia to Singapore via subsea cables spanning over 4,300 km. Approval was granted to import 1.75 gigawatts (GW) of low-carbon electricity from Northern Australia into Singapore, announced Second Minister for Trade and Industry Tan See Leng on Oct. 22 at the Asia Clean Energy Summit during the Singapore International Energy Week (SIEW) 2024. This will account for approximately nine per cent of Singapore's total electricity...

about 15 hours ago

Hacker News

Tesla delays Cybertruck's range extender, reduces its range

Tesla has further delayed production of Cybertruck’s range extender and reduced the range that it will add to the electric pickup truck. When Tesla unveiled the production version of the Cybertruck last year, there were two main disappointments: the price and the range. Tesla has missed on pricing with new vehicle programs before, and inflation has been exceptionally high in the few years between the original unveiling and pricing of the Cybertruck in 2019 and its start of production last...

about 16 hours ago

Hacker News

Guide to Fine-Tuning LLMs

Skip to main content View PDF HTML (experimental) Abstract:This report examines the fine-tuning of Large Language Models (LLMs), integrating theoretical insights with practical applications. It outlines the historical evolution of LLMs from traditional Natural Language Processing (NLP) models to their pivotal role in AI. A comparison of fine-tuning methodologies, including supervised, unsupervised, and instruction-based approaches, highlights their applicability to different tasks. The report introduces a structured seven-stage pipeline for fine-tuning LLMs, spanning data preparation, model initialization, hyperparameter tuning, and model...

about 18 hours ago

Hacker News

Brazil Arrests 'USDoD' Hacker in FBI Infragard Breach

Brazilian authorities reportedly have arrested a 33-year-old man on suspicion of being “USDoD,” a prolific cybercriminal who rose to infamy in 2022 after infiltrating the FBI’s InfraGard program and leaking contact information for 80,000 members. More recently, USDoD was behind a breach at the consumer data broker National Public Data that led to the leak of Social Security numbers and other personal information for a significant portion of the U.S. population. USDoD’s InfraGard sales thread on Breached. The Brazilian news...

about 18 hours ago

Hacker News

Firefox-Passwords-Decryptor: Extracts and decrypts passwords saved in Firefox

You can’t perform that action at this time.

about 18 hours ago

Hacker News

A Controversial Rare-Book Dealer Tries to Rewrite His Own Ending

Horowitz remembers the Merwin transaction as a vital moment in his growth, but Merwin and his wife always believed, without any proof, that Horowitz had cherry-picked his library for his own benefit. A leading appraiser told me that Merwin repeatedly complained that Horowitz had shorted him on the payment for his archive. (Horowitz denied this, and said that he had bought at least fifty of Merwin’s books without incident.) Twenty years after the sale, M. G. Lord, who by then...

about 19 hours ago

Hacker News

Good money, no team tactics and cute dogs: the rise of pro cycling freelancers

For decades, professional cycling has been dominated by European World Tour teams. But in the last decade, American gravel privateers have disrupted that paradigm.“The World Tour is like being in the NFL or NBA,” says Peter Stetina, who rode for three different teams on the tour, the highest tier of professional road cycling, from 2010 to 2019. “You get drafted and signed. You have a salary and your job is just to pedal, nothing else. Racing is cutthroat, resigning is...

about 20 hours ago

Hacker News

How to secure your new VPS: a step-by-step guide

No trespassing allowedSo, your $5 VPS just arrived. All you've got is an IP address, a username, and a password. Now what?In this guide, I'll walk you through fortifying your VPS from zero to hero—covering essential security measures and then going beyond the basics to create a secure environment. We'll tackle everything from user management and SSH configuration to setting up a firewall and implementing a couple handy automations to keep your server in top shape.Note: This guide is tailored...

about 22 hours ago

Hacker News

Study offers clues into when and why mosquitoes bite

As mosquitoes and mosquito-borne illnesses like dengue fever spread across the world, researchers say that a key strategy to prevent these illnesses may be dissuading the insects from biting their victims in the first place. But while scientists have uncovered the ways that odor and heat help mosquitoes find humans, little is known about the role of taste once they’ve landed.  In a new study, Yale researchers have now shown how different tastes are encoded by neurons in mosquitoes and...

about 22 hours ago

Hacker News

LTESniffer: An Open-Source LTE Downlink/Uplink Eavesdropper

LTESniffer is An Open-source LTE Downlink/Uplink Eavesdropper It first decodes the Physical Downlink Control Channel (PDCCH) to obtain the Downlink Control Informations (DCIs) and Radio Network Temporary Identifiers (RNTIs) of all active users. Using decoded DCIs and RNTIs, LTESniffer further decodes the Physical Downlink Shared Channel (PDSCH) and Physical Uplink Shared Channel (PUSCH) to retrieve uplink and downlink data traffic. LTESniffer supports an API with three functions for security applications and research. Many LTE security research assumes a passive sniffer...

about 22 hours ago

Hacker News

Apple's AirPods Pro hearing health features

Apple announced a trio of major new hearing health features for the AirPods Pro 2 in September, including clinical-grade hearing aid functionality, a hearing test, and more robust hearing protection. All three will roll out next week with the release of iOS 18.1, and they could mark a watershed moment for hearing health awareness. Apple is about to instantly turn the world’s most popular earbuds into an over-the-counter hearing aid.That also means we’re about to enter an era where we’ll...

about 22 hours ago

Hacker News

Wired's Attack on Privacy

The Wired article by David Gilbert focusing on neo-Nazis moving to SimpleX Chat following the Telegram's changes in privacy policy is biased and misleading. By cherry-picking information from the report by the Institute for Strategic Dialogue (ISD), Wired fails to mention that SimpleX network design prioritizes privacy in order to protect human rights defenders, journalists, and everyday users who value their privacy — many people feel safer using SimpleX than non-private apps, being protected from strangers contacting them. Yes, privacy-focused...

about 22 hours ago

Hacker News

Transformers Utilization in Chart Understanding: A Review of Advances and Future

Skip to main content View PDF HTML (experimental) Abstract:In recent years, interest in vision-language tasks has grown, especially those involving chart interactions. These tasks are inherently multimodal, requiring models to process chart images, accompanying text, underlying data tables, and often user queries. Traditionally, Chart Understanding (CU) relied on heuristics and rule-based systems. However, recent advancements that have integrated transformer architectures significantly improved performance. This paper reviews prominent research in CU, focusing on State-of-The-Art (SoTA) frameworks that employ transformers within End-to-End...

about 22 hours ago

Hacker News

Learning to Learn

In the past 3 years, I’ve run over 300 interviews. On average, I meet someone new every 3-4 days to understand if they’re the right fit for an early-stage startup. I especially like capping interviews with an open-ended question that really lets great candidates shine. One of my favorite now-retired questions is, in Thielian fashion: “What’s something you’ve learned that you believe gives you an edge - something that you’re almost surprised more people don’t know about?” One of the...

about 22 hours ago

Hacker News

Math is still catching up to the genius of Ramanujan

One afternoon in January 2011, Hussein Mourtada leapt onto his desk and started dancing. He wasn’t alone: Some of the graduate students who shared his Paris office were there, too. But he didn’t care. The mathematician realized that he could finally confirm a sneaking suspicion he’d first had while writing his doctoral dissertation, which he’d finished a few months earlier. He’d been studying special points, called singularities, where curves cross themselves or come to sharp turns. Now he had unexpectedly...

about 23 hours ago

Hacker News

Baidu CEO: AI 'bubble' will burst 99 percent of players

Asia In Brief Baidu CEO Robin Li has proclaimed that hallucinations produced by large language models are no longer a problem, and predicted a massive wipeout of AI startups when the "bubble" bursts. "The most significant change we're seeing over the past 18 to 20 months is the accuracy of those answers from the large language models," gushed the CEO at last week's Harvard Business Review Future of Business Conference. "I think over the past 18 months, that problem has...

about 23 hours ago

Hacker News

Disney Plus and Hulu won't let you sign up through Apple anymore

If you want to subscribe to Disney Plus or Hulu on your iPhone, you can’t do that anymore. Support documents for Disney Plus and Hulu now say that new and returning subscribers to those streaming services can’t sign up through Apple, as reported by MacRumors.I’m not currently paying for Disney Plus, so out of curiosity, I tried logging into my account through the iOS app to see what would happen. After entering my email and password, I was greeted by...

about 23 hours ago

Hacker News

Transitioning the Use of Cryptographic Algorithms and Key Lengths

Official websites use .govA .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPSA lock ( Locked padlock icon ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

about 24 hours ago

Hacker News

Vimium – The Hacker's Browser

Vimium is a browser extension that provides keyboard-based navigation and control of the web in the spirit of the Vim editor. Installation instructions: Chrome: Chrome web store Edge: Edge Add-ons Firefox: Firefox Add-ons To install from source, see here. Vimium's Options page can be reached via a link on the help dialog (type ?) or via the button next to Vimium on the extension pages of Chrome and Edge (chrome://extensions), or Firefox (about:addons). Modifier keys are specified as <c-x>, <m-x>,...

1 day ago

Hacker News

__init__.py files are optional. Here's why you should still use them

If you’ve ever googled the question “Why do Python packages have empty __init__.py files?”, you could get the idea that Python packages wouldn’t work without them. This is a common misconception—they’ve been optional since Python 3.3! Why then, do most Python projects still have them? What are these files again? __init__.py files are often used to mark directories as Python packages. For example, a file structure like this: my_package/ __init__.py some_module.py will allow you to run: import my_package.some_module # or...

1 day ago

Hacker News

Philip Zimbardo, psychologist behind the 'Stanford Prison Experiment' dies at 91

Skip to content cookie policy."},"navigation":{"major":[{"asset_name":"University News","asset_url":"https://news.stanford.edu/university-news","asset_assetid":"141464","children":[{"asset_name":"Distinguished Visitors","asset_assetid":"141581","asset_url":"https://news.stanford.edu/university-news/topic/distinguished-visitors"},{"asset_name":"Leadership & Governance","asset_assetid":"141573","asset_url":"https://news.stanford.edu/university-news/topic/leadership-and-governance"},{"asset_name":"Institutional News","asset_assetid":"141572","asset_url":"https://news.stanford.edu/university-news/topic/institutional-news"},{"asset_name":"Campus & Facilities","asset_assetid":"141566","asset_url":"https://news.stanford.edu/university-news/topic/campus-and-facilities"},{"asset_name":"Awards, Honors & Appointments","asset_assetid":"141545","asset_url":"https://news.stanford.edu/university-news/topic/awards-honors-and-appointments"}]},{"asset_name":"Research & Scholarship","asset_url":"https://news.stanford.edu/research-and-scholarship","asset_assetid":"141465","children":[{"asset_name":"Social Sciences","asset_assetid":"141698","asset_url":"https://news.stanford.edu/research-and-scholarship/topic/social-sciences"},{"asset_name":"Science & Engineering","asset_assetid":"141681","asset_url":"https://news.stanford.edu/research-and-scholarship/topic/science-and-engineering"},{"asset_name":"Law","asset_assetid":"141667","asset_url":"https://news.stanford.edu/research-and-scholarship/topic/law"},{"asset_name":"Health & Medicine","asset_assetid":"141634","asset_url":"https://news.stanford.edu/research-and-scholarship/topic/health-and-medicine"},{"asset_name":"Education","asset_assetid":"141611","asset_url":"https://news.stanford.edu/research-and-scholarship/topic/education"},{"asset_name":"Economics","asset_assetid":"141605","asset_url":"https://news.stanford.edu/research-and-scholarship/topic/economics"},{"asset_name":"Earth & Climate","asset_assetid":"141594","asset_url":"https://news.stanford.edu/research-and-scholarship/topic/earth-and-climate"},{"asset_name":"Business","asset_assetid":"141582","asset_url":"https://news.stanford.edu/research-and-scholarship/topic/business"},{"asset_name":"Arts & Humanities","asset_assetid":"141531","asset_url":"https://news.stanford.edu/research-and-scholarship/topic/arts-and-humanities"}]},{"asset_name":"On Campus","asset_url":"https://news.stanford.edu/on-campus","asset_assetid":"141466","children":[{"asset_name":"Campus Safety","asset_assetid":"141744","asset_url":"https://news.stanford.edu/on-campus/topic/campus-safety"},{"asset_name":"Community & Culture","asset_assetid":"141735","asset_url":"https://news.stanford.edu/on-campus/topic/community-and-culture"},{"asset_name":"Events","asset_assetid":"141723","asset_url":"https://news.stanford.edu/on-campus/topic/events"},{"asset_name":"Athletics","asset_assetid":"141716","asset_url":"https://news.stanford.edu/on-campus/topic/athletics"},{"asset_name":"Arts","asset_assetid":"141708","asset_url":"https://news.stanford.edu/on-campus/topic/arts"}]},{"asset_name":"Student Experience","asset_url":"https://news.stanford.edu/student-experience","asset_assetid":"141467","children":[{"asset_name":"Academics","asset_assetid":"141753","asset_url":"https://news.stanford.edu/student-experience/topic/academics"},{"asset_name":"Volunteer & Service","asset_assetid":"141749","asset_url":"https://news.stanford.edu/student-experience/topic/volunteer-and-service"},{"asset_name":"Mental Health","asset_assetid":"141747","asset_url":"https://news.stanford.edu/student-experience/topic/mental-health"}]}],"minor":[{"asset_name":"Videos","asset_url":"https://news.stanford.edu/video","asset_assetid":"141798"},{"asset_name":"Community Profiles","asset_url":"https://news.stanford.edu/profile","asset_assetid":"141811"},{"asset_name":"In the News","asset_url":"https://news.stanford.edu/in-the-news","asset_assetid":"141789"},{"asset_name":"University Updates","asset_url":"https://news.stanford.edu/university-updates","asset_assetid":"141804"},{"asset_name":"Announcements","asset_url":"https://news.stanford.edu/announcement","asset_assetid":"141795"},{"asset_name":"Recent Stories","asset_url":"https://news.stanford.edu/news-archive","asset_assetid":"125944"}],"contacts":[{"asset_name":"Contact","asset_url":"https://news.stanford.edu/contact","asset_assetid":"125954"},{"asset_name":"Subscribe","asset_url":"https://news.stanford.edu/subscribe","asset_assetid":"125958"},{"asset_name":"Media Contacts","asset_url":"https://news.stanford.edu/media-contacts","asset_assetid":"125962"},{"asset_name":"Press Center","asset_url":"https://news.stanford.edu/press-center","asset_assetid":"141816"}],"contactsStudent":[{"asset_name":"Contact","asset_url":"https://news.stanford.edu/contact","asset_assetid":"125954"},{"asset_name":"Press Center","asset_url":"https://news.stanford.edu/press-center","asset_assetid":"141816"}],"contactsStaff":[{"asset_name":"Contact","asset_url":"https://news.stanford.edu/contact","asset_assetid":"125954"},{"asset_name":"Press Center","asset_url":"https://news.stanford.edu/press-center","asset_assetid":"141816"}],"external":{"anonymous":[{"asset_name":"Community Engagement","asset_attribute_redirect_url":"https://community.stanford.edu/","asset_assetid":"128891"},{"asset_name":"Admissions","asset_attribute_redirect_url":"https://admission.stanford.edu/","asset_assetid":"128892"},{"asset_name":"Giving","asset_attribute_redirect_url":"https://giving.stanford.edu/","asset_assetid":"128893"},{"asset_name":"Events","asset_attribute_redirect_url":"https://events.stanford.edu/","asset_assetid":"128894"}],"student":[{"asset_name":"VPSA","asset_attribute_redirect_url":"https://studentaffairs.stanford.edu/","asset_assetid":"128895"},{"asset_name":"VPUE","asset_attribute_redirect_url":"https://undergrad.stanford.edu/about-vpue","asset_assetid":"128896"},{"asset_name":"VPGE","asset_attribute_redirect_url":"https://vpge.stanford.edu/","asset_assetid":"128897"},{"asset_name":"R&DE","asset_attribute_redirect_url":"https://rde.stanford.edu/","asset_assetid":"128898"}],"staff":[{"asset_name":"Cardinal at Work","asset_attribute_redirect_url":"https://cardinalatwork.stanford.edu/","asset_assetid":"128899"},{"asset_name":"University IT","asset_attribute_redirect_url":"https://uit.stanford.edu/","asset_assetid":"128900"},{"asset_name":"Department of Public Safety","asset_attribute_redirect_url":"https://police.stanford.edu/","asset_assetid":"128901"},{"asset_name":"Stanford Transportation","asset_attribute_redirect_url":"https://transportation.stanford.edu/","asset_assetid":"128902"}]},"footerPrimary":[{"asset_name":"Stanford Home","asset_attribute_redirect_url":"https://www.stanford.edu/","asset_assetid":"129634"},{"asset_name":"Maps & Directions","asset_attribute_redirect_url":"https://visit.stanford.edu/plan/","asset_assetid":"129635"},{"asset_name":"Search Stanford","asset_attribute_redirect_url":"https://www.stanford.edu/search/","asset_assetid":"129636"},{"asset_name":"Emergency Info","asset_attribute_redirect_url":"https://emergency.stanford.edu/","asset_assetid":"129637"}],"footerSecondary":[{"asset_name":"Terms of Use","asset_attribute_redirect_url":"https://www.stanford.edu/site/terms/","asset_assetid":"129638"},{"asset_name":"Privacy","asset_attribute_redirect_url":"https://www.stanford.edu/site/privacy","asset_assetid":"129639"},{"asset_name":"Copyright","asset_attribute_redirect_url":"https://uit.stanford.edu/security/copyright-infringement","asset_assetid":"129640"},{"asset_name":"Trademarks","asset_attribute_redirect_url":"https://adminguide.stanford.edu/chapters/guiding-policies-and-principles/conflict-interest/ownership-and-use-stanford-trademarks","asset_assetid":"129641"},{"asset_name":"Non-Discrimination","asset_attribute_redirect_url":"https://bulletin.stanford.edu/academic-polices/student-conduct-rights/nondiscrimination","asset_assetid":"129642"},{"asset_name":"Accessibility","asset_attribute_redirect_url":"https://www.stanford.edu/site/accessibility/","asset_assetid":"129643"}]},"search":{"endpoint":"https://news.stanford.edu/_api/fb/query","collection":"sug~sp-stanford-report-search","profile":"stanford-report-push-search","resultPage":"https://news.stanford.edu/search"}}> Philip Zimbardo, the Stanford psychologist whose research examined how social situations shape people’s behavior, died Oct. 14."}> Philip G. Zimbardo, one of...

1 day ago

Hacker News

Rope ROM of the Wang 720C desktop computer

Vor zwei Wochen habe ich einen WANG 720C bekommen. Dabei handelt es sich um einen programmierbaren Tischrechner in DTL-/TTL-Logik mit 2-zeiliger Nixie-Röhrenanzeige, Kernspeicher und handgefädeltem Microcode-ROM. Programme und Daten konnten auf Kassetten gespeichert werden. Diese Geräte wurden von 1970 bis ca. 1973 hergestellt und kosteten damals je nach Ausstattung zwischen 23.000 und 36.000 DM.  Da auf dem Markt zur Zeit der Entwicklung ab 1968 noch keine Speicherbausteine zur Verfügung standen, baute WANG den Microcode für den Tischrechner mit einem Fädel-ROM...

1 day ago

Hacker News

A near impossible literacy test Louisiana used to suppress the black vote

In William Faulkner’s 1938 nov­el The Unvan­quished, the implaca­ble Colonel Sar­toris takes dras­tic action to stop the elec­tion of a black Repub­li­can can­di­date to office after the Civ­il War, destroy­ing the bal­lots of black vot­ers and shoot­ing two North­ern car­pet­bag­gers. While such dra­mat­ic means of vot­er sup­pres­sion occurred often enough in the Recon­struc­tion South, tac­tics of elec­toral exclu­sion refined over time, such that by the mid-twen­ti­eth cen­tu­ry the Jim Crow South relied large­ly on near­ly impos­si­ble-to-pass lit­er­a­cy tests to impede...

1 day ago

Hacker News

Sam's Club CTO to Exit Due to Walmart Relocation Policy

To continue, please click the box below to let us know you're not a robot.

1 day ago

Hacker News

Meta's Israel Policy Chief Tried to Suppress Pro-Palestine Instagram Posts

Support Us © THE INTERCEPT ALL RIGHTS RESERVED Photo illustration: Fei Liu/The Intercept / Photo: Joy Malone/Getty Images A former senior Israeli government official now working as Meta’s Israel policy chief personally pushed for the censorship of Instagram accounts belonging to Students for Justice in Palestine — a group that has played a leading role in organizing campus protests against Israel’s ongoing war in Gaza. Internal policy discussions reviewed by The Intercept show Jordana Cutler, Meta’s Israel & the Jewish Diaspora policy chief, used the...

1 day ago

Hacker News

The Internet Archive is back, in read-only mode

In recovering from recent cyberattacks on October 8, the Internet Archive has resumed the Wayback Machine (starting October 13) and Archive-It (October 17), and as of today (October 21), has begun offering provisional availability of archive.org in a read-only manner. Features like uploading, borrowing, reviewing items, interlibrary loan, and other services are not yet available.  Please note that these services will have limited availability as we continue maintenance.  Hackers disclosed archive.org email and encrypted passwords to a transparency website, and...

1 day ago

Hacker News

T-Mobile, AT oppose unlocking rule, claim locked phones are good for users

AT&T enables unlocking of paid-off phones after 60 days for postpaid users and after six months for prepaid users. AT&T lodged similar complaints as T-Mobile, saying in an October 7 filing that the FCC's proposed rules would "mak[e] handsets less affordable for consumers, especially those in low-income households," and "exacerbate handset arbitrage, fraud, and trafficking. " AT&T told the FCC that "requiring providers to unlock handsets before they are paid-off would ultimately harm consumers by creating upward pressure on handset...

1 day ago

Hacker News

Show HN: Data Formulator – AI-powered data visualization from Microsoft Research

      Transform data and create rich visualizations iteratively with AI 🪄. Try Data Formulator now in GitHub Codespaces! [10-11-2024] Data Formulator python package released! You can now install Data Formulator using Python and run it locally, easily. [check it out]. Our Codespace configuration is also updated for fast start up ⚡️. [try it now!] New exprimental feature: load an image or a messy text, and ask AI parsing and cleaning it for you(!). [demo] [10-01-2024] Initial release of...

1 day ago

Hacker News

Overengineering a way to know if people are in my university's CS lab

For almost as long as the Undergraduate Projects Lab at the University of Wisconsin has existed, there’s been a camera of some sort peering at the room. There’s evidence of a system existing even as far back as the 1990s, with a prehistoric revision of the site mentioning that an old iteration was: …a $15 video camera attached to the wall with duct tape, connected to a VCR, connected to a video spigot in a Mac IIcx, running Timed Video...

1 day ago

Hacker News

U.S. retailers list AMD Ryzen 7 9800X3D CPUs – prices range from $484 to $525

(Image credit: AMD) Listings and corresponding price points for the AMD Ryzen 7 9800X3D processor have begun popping up on retailers around the web. This probably signals the Ryzen 9000 X3D Series' imminent release and should help solidify expectations of a general pricing range. The highest price we've seen so far, and the first we saw through @harukaze5719 on Twitter, is a Shotblt.com listing for the Ryzen 7 9800X3D priced at $524.62.https://t.co/UTKMcS2qqt pic.twitter.com/4Jf31ivLFvOctober 21, 2024The cheapest listing we've been able...

1 day ago

Hacker News

Please do not write below the line

I've had a letter from TV Licencing and I'm interested in the statement at the bottom of the page. It says: 'Please do not write below this line'. I would like to know why the letter requests this. The line referred to is about half an inch from the bottom edge of the letter. What will happen if I write there? How would you know? I am not asked to return the letter, so why the request? Seven weeks later,...

1 day ago

Hacker News

ByteDance intern fired for planting malicious code in AI models

But recruiting AI experts for that expansion may be challenging for ByteDance, which saw an "exodus" of top AI experts in May, as startups lure talent to attract investors seeking to prop up the next OpenAI, the South China Morning Post reported. ByteDance also competes for talent with top rivals Tencent and Alibaba, which have also been investing heavily in AI. And seemingly any AI setback could disrupt ByteDance's ability to compete in the AI race globally, as tech giants...

1 day ago

Hacker News

Perplexity AI's new tool for researching the stock market

Yuichiro Chino/Getty ImagesI'm no day trader. Back in the 1990s, I dabbled with Cocoa futures trading on the Chicago Mercantile Exchange using Globex. However, you may have noticed I'm not a commodity millionaire. Still, I know a thing or two about the stock market, and I think Perplexity AI, the rapidly growing AI company's new finance-centric platform, Perplexity Finance, may be helpful to neophyte stock traders. Also: Want a free year of Perplexity Pro? Here's how to claim itWhat is Perplexity Finance?Perplexity...

1 day ago

Hacker News

Machine Learning to Computational Plasma Physics Reduced-Order Plasma Modeling

Skip to main content View PDF Abstract:Machine learning (ML) provides a broad spectrum of tools and architectures that enable the transformation of data from simulations and experiments into useful and explainable science, thereby augmenting domain knowledge. Furthermore, ML-enhanced numerical modelling can revamp scientific computing for real-world complex engineering systems, creating unique opportunities to examine the operation of the technologies in detail and automate their optimization and control. In recent years, ML applications have seen significant growth across various scientific domains,...

1 day ago

Hacker News

Once You Try a Four-Day Workweek, It's Hard to Go Back

To continue, please click the box below to let us know you're not a robot.

1 day ago

Hacker News

Red Hat Reveals Major Enhancements to Red Hat Enterprise Linux AI

Red HatWell, that was fast. It was only back in early September that Red Hat released Red Hat Enterprise Linux AI (RHEL AI) 1.0. Now, Red Hat has followed up by announcing the general availability of RHEL AI 1.2. This latest release introduces several key improvements aimed at streamlining the development, testing, and deployment of large language models (LLMs).Before jumping into what's new and improved, here's a bit about what RHEL AI brings. It's designed to streamline generative AI (gen AI)...

1 day ago

Hacker News

Robot vacuum cleaners hacked to spy on, insult owners

Multiple robot vacuum cleaners in the US were hacked to yell obscenities and insults through the onboard speakers. ABC news was able to confirm reports of this hack in robot vacuum cleaners of the type Ecovacs Deebot X2, which are manufactured in China. Ecovacs is considered the leading service robotics brand, and is a market leader in robot vacuums. One of the victims, Minnesota lawyer Daniel Swenson, said he heard sound snippets that seemed similar to a voice coming from...

1 day ago

Hacker News

Ask HN: Alternatives to Bitwarden?

I've been using (and paying for) Bitwarden for years now, but it appears they have recently chosen to abandon open source[1].I'm not all too happy with having the rug pulled from under me. Is there an alternative that you would recommend? Preferably something that is open source, audited and has an Android client. Happy to pay a reasonable subscription.[1] https://github.com/bitwarden/clients/issues/11611

1 day ago

Hacker News

The United States of Abortion Mazes

Skip to main content In 1973, Roe v. Wade granted a nationwide right to abortion and helped create a path to access. But, abortion access has rarely been a straight line — it’s full of twists, turns, and roadblocks. And these barriers have only gotten more complicated since the US Supreme Court gave states the power to ban abortion in 2022’s Dobbs ruling. While 13 states completely outlawed abortion, with many additional states dismantling access in other ways… …other states...

1 day ago

Hacker News

Solar power from space? it might happen in a couple of years

That approach starts in low-Earth orbit rather than 36,000 km away from the surface of the Earth. Aetherflux plans to begin with a single satellite, launching into an orbit about 500 km above the planet on a SpaceX transporter mission about 12 to 15 months from now. This initial satellite will be based on a commercially available bus from Apex, which will produce, on average, about 1 kilowatt of power. It's a modest amount, enough electricity to power a dishwasher....

1 day ago

Hacker News

U.S. border surveillance towers have always been broken

A new bombshell scoop from NBC News revealed an internal U.S. Border Patrol memo claiming that 30 percent of camera towers that compose the agency's "Remote Video Surveillance System" (RVSS) program are broken. According to the report, the memo describes "several technical problems" affecting approximately 150 towers. Except, this isn't a bombshell. What should actually be shocking is that Congressional leaders are acting shocked, like those who recently sent a letter about the towers to Department of Homeland Security (DHS)...

1 day ago

Hacker News

India's airline industry in chaos after 90 hoax bomb threats in a week

A reported 90 hoax bomb threats have been made against Indian airlines in the past week, provoking international travel chaos as planes were grounded, diverted and flown to safety by fighter jet escorts.The unprecedented surge in fake bomb threats against multiple Indian and international airlines has caused severe disruption to India’s aviation industry and created a growing sense of panic among air passengers.Last week, there were a reported 90 bomb threats made against airlines flying domestically and to international destinations...

1 day ago

Hacker News

Welcome to the Era of the $20k Family Car Insurance Bill

If you’re 16 years old, live in California and just passed your driver’s license test, the first thing you should do is drive your family to In-N-Out Burger for a milkshake and some animal-style fries.The first thing a parent should do is call the insurance company to update the policy. That part, however, will probably give you indigestion.Last month, when Debbie Mukamal called her insurer as she and her daughter rolled away from an In-N-Out drive-through in their 2018 Subaru,...

1 day ago

Hacker News

A Media Player Without Peers – The Unreasonable Effectiveness of VLC

Now, this is the bit that’s going to sound like a David and Goliath story. With the approval of the headmaster of École Centrale Paris, VLC was released under the GNU General Public License in 2001. That’s right — it was given to the world for free. But it wasn’t charity. It was a defiance, a rebellious stand against proprietary plugins and exorbitant price tags. Born free and open-source, VLC media player wasn’t just an underdog; it was a pioneer....

1 day ago