Structuring Arrays with Algebraic Shapes [video]
No Content Available
Stay updated with the latest in technology, AI, cybersecurity, and more
No Content Available
Published on July 09, 2025 Ever wondered how cartoons create that hand-drawn “jitter” effect? I recently watched an ARTE documentary about Neapolitan pizza and was fascinated by the animated illustrations (drawn in simple shapes and plain colors) that accompanied the segment where the recipe and its ingredients were presented. The illustrations were static, but they had a subtle animation effect that made them look like they were moving slightly. See for example in this short clip, where you c
AMD RDNA 4 architecture GPUs AMD RDNA™ 4 architecture GPUs, which have 3rd-generation Matrix Cores, improved the performance of Generalized Matrix Multiplication (GEMM) operations. The table below compares theoretical FLOPS/clock/CU (floating point operations per clock, per compute unit) to previous generations. However, we changed the VGPR layout for the arguments of Wave Matrix Multiply Accumulate (WMMA) operations compared to the previous RDNA 3 generation [1]. Therefore, it does not have ba
Many engineers have a strained relationship with Bash. I love it though, but I’m very aware of it’s limitations when it comes to error handling and data structures (or lack thereof). As a result of these limitations I often see Bash scripts written very defensively that define something like: set -euxo pipefail These are bash builtin options that do more or less sensible things. e: Exit immediately when a non-zero exit status is encountered u: Undefined variables throws an error and exits t
This spring, we had a simple and, to my knowledge, novel idea that turned out to dramatically boost the performance of our vulnerability detection agents at XBOW. On fixed benchmarks and with a constrained number of iterations, we saw success rates rise from 25% to 40%, and then soon after to 55%. The principles behind this idea are not limited to cybersecurity. They apply to a large class of agentic AI setups. Let me share. XBOW’s Challenge XBOW is an autonomous pentester. You point it at yo
Log by Time, not by Count July 20, 2025 "How to Log" is a surprisingly deep topic in software engineering with many different viewpoints, and they're almost all valid in different situations. I'm going to argue that when processing lots of events, it's best to log every X seconds, rather than every X messages. This is a simple concept, but I've never seen it written down before. Let's quickly look at some pseudocode to understand what I mean. Count-based logging num_events_processed = 0 whi
Everyone knows Daikin make some of the best air conditioners out there, mechanically speaking. Sadly their WiFi control modules are not so good, especially the latest models which are all cloud based, require an internet connection to even work, and are slow. This code/module provides local control via web interface, MQTT, and HomeAssistant integration, all with no cloud crap. There is also a new Faikin Remote Control available, BLE linked to the Faikin, with environmental sensors, available o
connmap connmap is an X11 desktop widget that shows location of your current network peers on a world map. (Works on Wayland as well!) Installation Clone the repository git clone https://github.com/h2337/connmap --depth 1 , install the dependencies (see below), run make install , then run the resulting executable ./connmap.elf . If you want to run it without attaching it to the terminal then add ampersand at the end of the command: ./connmal.elf & . You can also add it to your i3wm config t
Have you wondered what a medieval king did on a typical day? Thanks to Christine de Pizan, we have an account of what daily life was like for King Charles V of France. Around the year 1404, Christine de Pizan completed her work, Livre des faits et bonnes mœurs du sage roy Charles V. It was both a biography of the French king who reigned from 1364 to 1380 and a guide to how an ideal monarch should live and rule. Christine had a good vantage point to tell this story. Her father, Tommaso di Pizan
When seeing the phrase “dynamic programming” in an algorithms class or leetcode study guide, the first question people ask is “what does ‘dynamic’ mean in this context?”. The key question is instead “what does ‘programming’ mean in this context?”, because it does not mean “computer programming”. Instead it refers to, as the Oxford English Dictionary puts it, programming. n. 4. Planning carried out for purposes of control, management, or administration. So really, it’s closer to “TV programmi
To see all available qualifiers, see our documentation . Saved searches Use saved searches to filter your results more quickly We read every piece of feedback, and take your input very seriously. You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert
Now that the first trailer for Mortal Kombat II dropped earlier this week, director Simon McQuoid’s free to talk about how this follow-up builds on the 2021 reboot. Talking to IGN, McQuoid opened up on ensuring the second movie delivered on the promise of the first movie, namely having the real fighting tournament that features franchise characters beating the hell out of each other. Said characters include the returning Sonya Blade, Raiden, and Liu Kang, and the newly introduced Kitana, Shao K
Credit: 20th Century Studios There's much to love about this film, including plenty of memorable standout scenes; seven of our favorites are featured below. It's got stellar casting, snappy dialogue, and breaks up the action with quieter character moment that advance the story without slowing the pace. X-Men also takes pains to establish key relationships: Charles and Magneto, Rogue and Wolverine, and the romantic triangle of Jean, Cyclops, and Wolverine. We care about these characters: their i
On Thursday night, I toggled endlessly between a TikTok Live stream and a shopping app in anticipation of 9:30PM. For 30 minutes, I hunted for an available listing; many expletives were uttered. I exhibited bot behavior and got iced out of the app multiple times. I tapped so many times my thumbs got sore. This is Labubu drop night. Something that’s lost in the Labubu mania is that actually buying one from the source is, in one word, maddening. There are, of course, countless fake options (“Lafu
In the last 30 years or so, cybersecurity has gone from being a niche specialty within the larger field of computer science, to an industry estimated to be worth more than $170 billion made of a globe-spanning community of hackers. In turn, the industry’s growth, and high-profile hacks such as the 2015 Sony breach, the 2016 U.S. election hack and leak operations, the Colonial Pipeline ransomware attack, and a seemingly endless list of Chinese government hacks, have made cybersecurity and hacking
Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now AI represents the greatest cognitive offloading in the history of humanity. We once offloaded memory to writing, arithmetic to calculators and navigation to GPS. Now we are beginning to offload judgment, synthesis and even meaning-making to systems that speak our language, learn our habits and tailor our truths. AI systems are growing incr
At WWDC25, Apple introduced a few new capabilities to the Photos app for iOS 26. Most notably, it reintroduces a tab bar layout after last year’s controversial single-page redesign. It also allows you to create spatial scenes from existing photos. On top of those headlining features, there’s another underlying feature in the Photos app for iOS 26 that a lot of users might appreciate, and thats event details. Let’s explain. With iOS 26, if you’ve gone to a concert, sporting event, or some sort
Laminar Flow is the smooth, uninterrupted flow of air over the contour of the wings, fuselage, or other parts of an aircraft in flight. Laminar flow is most often found at the front of a streamlined body and is an important factor in flight. If the smooth flow of air is interrupted over a wing section, turbulence is created which results in a loss of lift and a high degree of drag. An airfoil designed for minimum drag and uninterrupted flow of the boundary layer is called a laminar airfoil. The
Java Criminally Underhyped? Not Back in 1997. Earlier today, a fun little moment of Twitter serendipity alerted me to an article by Jackson Roberts, a computer science student at the University of Colorado, entitled “Java is criminally underhyped”. It’s a really interesting article, and Jackson’s observations correlate with a lot of my own thinking about languages and platforms, although I am squarely in the .NET / CLR camp on that particular front. But Jackson ends his article: I am curious
...and the Script Kiddie A stranger from the land of Woot came to Master Foo as he was eating the morning meal with his students. “I hear y00 are very l33t,” he said. “Pl33z teach m3 all y00 know.” Master Foo's students looked at each other, confused by the stranger's barbarous language. Master Foo just smiled and replied: “You wish to learn the Way of Unix?” “I want to b3 a wizard hax0r,” the stranger replied, “and 0wn ever3one's b0xen.” “I do not teach that Way,” replied Master Foo. The
“The Bitter Lesson” is wrong. Well… sort of. Assaf Pinhasi 3 min read · 1 hour ago 1 hour ago -- Listen Share TL;DR There is no dichotomy between domain knowledge vs. “general purpose methods that leverage data+compute”. They are both powerful tools that compensate for each other and need to be balanced and traded off during the model building process. “The bitter lesson” in 30 seconds “The bitter lesson” is one of the most popular opinion pieces about AI research and it’s future. In his w
A round the beginning of last year, Matthew Prince started receiving worried calls from the bosses of big media companies. They told Mr Prince, whose firm, Cloudflare, provides security infrastructure to about a fifth of the web, that they faced a grave new online threat. “I said, ‘What, is it the North Koreans?’,” he recalls. “And they said, ‘No. It’s AI ’.”
Transform your notch into a beautiful music visualizer. Watch as your favorite tracks come alive with stunning audio oscillations and dynamic animations. Perfect integration with Apple Music brings your music experience to a whole new level. Customize every aspect of QuakeNotch to match your style and workflow. From themes and colors to keyboard shortcuts and behavior, create the perfect notch experience tailored just for you. Instant and robust access from notch Access a full-featured termin
JOVE (Jonathan's Own Version of Emacs)[1] is an open-source, Emacs-like text editor, primarily intended for Unix-like operating systems. It also supports MS-DOS and Microsoft Windows. JOVE was inspired by Gosling Emacs but is much smaller and simpler, lacking Mocklisp. It was originally created in 1983 by Jonathan Payne while at Lincoln-Sudbury Regional High School in Massachusetts, United States on a PDP-11 minicomputer.[2] JOVE was distributed with several releases of BSD Unix, including 2.9BS
Hack all the things - Toniebox 17. Jun 2025 Continuing my Hack all the things series, I’m doing something slightly different today. So far I’ve hacked my PS Vita and Nintendo 3DS, but this time I want to talk about my Toniebox. Or rather…my kids’ Toniebox. If you’re unfamiliar with the thing, it’s a little music box with a built-in speaker, two little “ears” to raise or lower the volume and an NFC reader at the top. Instead of putting in cassettes or CDs (yes, I’m old!), you instead put litt
Industrial Designer Erik and Electrical Engineer Jonathan, two of the creative forces behind the new MYND Bluetooth speaker sat down with us for an interview to give fascinating insights into its development. They tell us how the MYND brings together durability and Open-Source philosophy in a way that allows consumers to let their imaginations run wild with customization ideas. The Longer a Speaker is Used, the Lower its Environmental Impact. Teufel Blog: Erik & Jonathan, please introduce your
We did not visit Poland often. Only when someone died. I have not been able to bring part of my mother’s ashes to Poland yet because of the pandemic. They sit in my living room, waiting to join my other dead relatives in her village of Bedoń. I live in California, 3,000 miles away from where I grew up, and when my mother couldn’t sleep she’d call me. I always picked up. “I think I know how I got sick,” she said once. My mother had an aversion to being sick and to anyone knowing about it. Her
Super quick one I want to document here! I got myself on a side quest, again! No biggie, my ZSH shell was taking ages to load. When I say ages, more like 5+ seconds every time I opened a new terminal, that sort of thing can add up. This is just something I’ve lived with over the years, nothing has prompted this other than me wondering why it’s slow, then searching for how to profile it. So, what’s actually slowing things down? Zsh comes with this super handy profiling tool called zprof . Here’s
To see all available qualifiers, see our documentation . Saved searches Use saved searches to filter your results more quickly We read every piece of feedback, and take your input very seriously. You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert
The developers behind the FFmpeg project are again claiming major performance uplifts delivered by wielding the art of handwritten assembly code. With the latest patch applied, users should see a “100x speedup” in the cross-platform open-source media transcoding application. However, the developers were soon to clarify that the 100x claim applies to just a single function, “not the whole of FFmpeg.” BREAKING: FFmpeg 100x speedup from handwritten assembly13:55:30 <•haasn> rangedetect8_avx512: 12