Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: self Clear Filter

Zuckerberg Says Meta Is Now Seeing Signs of Advanced AI Improving Itself

Meta CEO Mark Zuckerberg is making some very grandiose statements amid his ludicrously expensive quest to gain a lead in the AI industry. It's easy to get caught up in the human drama of his talent hunt. But in the very first lines of a new public letter about his so-called Superintelligence Lab, the tech founder made a claim that's either a staight-up fib, a very generous reading of a situation, or a clue that he's closer to enacting profound change in the world than almost anyone realizes. S

Apple accused of inflating Self Service Repair prices to push new iPad purchases

Over the past few years, Apple has made some progress on self-service repairability, following years of criticism over how tightly it locks down its devices. Now, a new report questions how much Apple really is complying with right-to-repair regulations. Too expensive to be worth it In a 404 Media post out this week, independent repair professionals say Apple’s newly available iPad parts are so expensive, that they make repairs economically unviable. Their thesis is that Apple effectively wan

Tesla found partially liable for a deadly 2019 crash

A jury in Florida has found Tesla partially liable for a 2019 crash involving the company's Autopilot self-driving feature, The Washington Post reports. As a result, the company will have to pay $200 million in damages. Autopilot comes pre-installed on Tesla's cars and handles things like collision detection and emergency braking. Tesla has mostly avoided taking responsibility for crashes involving cars with the Autopilot enabled, but the Florida case played out differently. The jury ultimately

Design patterns you should unlearn in Python

Search for “design patterns in Python” and you’ll be rewarded with a parade of tutorials showing off how to faithfully re-implement Gang of Four patterns — complete with class diagrams, factory hierarchies, and enough boilerplate to heat a small village. They’ll make you feel like you’re writing “serious” code. Smart. Professional. Enterprise-ready. But here’s the problem: most of these patterns solve problems Python doesn’t have. They were designed for languages like Java and C++, where you ha

6 reasons why I prefer self hosted apps — and why you should too

Dhruv Bhutani / Android Authority Lately, there’s a lot of hype around self-hosting and running your own apps on a home lab or NAS. But you might be wondering what you stand to gain from it? After all, Google, Apple, and many others offer perfectly competent app suites. That’s what I thought too. But for the last few years, I’ve dived deep into the world of open source and self-hosting. And if you’re curious why, saddle up — I’ve got some thoughts to share. When I first dived into self-hosting

Topics: apps hosting open self ve

Uber’s Drive to Become the Kleenex of Robotaxis

“To them, it doesn’t really matter who ultimately succeeds,” says Sam Abuelsamid, who writes about the self-driving-vehicle industry and is the vice president of marketing at Telemetry, a Michigan research firm. “If you’ve got a car that works and can drive safely, you’re welcome to come onto Uber and provide rides.” Still, it’s too early to say whether the Kleenex gambit will work. Plenty has changed since 2015. Kalanick is no longer at Uber, deposed by a hostile board in 2017. The company ma

Advanced Rust macros with derive-deftly

derive-deftly is a Rust package that you can use to define your own derive macros without having to write low-level procedural macros. The syntax is easy to learn, but powerful enough to implement macros of significant complexity. Just below is a simple example, to help you get a feel for the system. There is also comprehensive and rigorous reference material: Suppose you want to add accessor functions for the fields in your struct . You could do it by hand, like this: #![allow(unused)] fn

A Python dict that can report which keys you did not use

This can come in handy if you're working with large Python objects and you want to be certain that you're either unit testing everything you retrieve or certain that all the data you draw from a database is actually used in a report. For example, you might have a SELECT fieldX, fieldY, fieldZ FROM ... SQL query, but in the report you only use fieldX, fieldY in your CSV export. class TrackingDict ( dict ): def __init__ ( self, *args, **kwargs ): super ().__init__(*args, **kwargs) self ._accesse

Placing Functions

placing functions — 2025-07-08 What are placing functions? About a year ago I observed that in-place construction seems surprisingly simple. By separating the creating of the place in memory from writing the value to memory, it’s not that hard to see how we can turn that into a language feature. So about six months ago, that’s what I went ahead and did and created the placing crate: a proc-macro-based prototype for “placing functions”. Placing functions are functions whose return type is con

Ask HN: How will the OSA affect small Mastodon instances?

I am not currently a user of Mastodon, but I have some interest in the project. I was looking at some stuff that seemed to indicate to me that the OSA could make it difficult to self host Mastodon without providing age verification. I was then reading the provisions and realsised that it didn't really affect you unless you have at least 3 million monthly users, so in theory would not affect self hosters with only a few users. But then I thought that if you are federated with a very large instanc

Tea app leak worsens with second database exposing user chats

The Tea app data breach has grown into an even larger leak, with the stolen data now shared on hacking forums and a second database discovered that allegedly contains 1.1 million private messages exchanged between the app's members. The Tea app is a women-only dating safety platform where members can share reviews about men, with access to the platform only granted after providing a selfie and government ID verification. On Friday, an anonymous user posted on 4chan that Tea used an unsecured F

Tea app leak worsens with second database exposing user chats

The Tea app data breach has grown into an even larger leak, with the stolen data now shared on hacking forums and a second database discovered that allegedly contains 1.1 million private messages exchanged between the app's members. The Tea app is a women-only dating safety platform where members can share reviews about men, with access to the platform only granted after providing a selfie and government ID verification. On Friday, an anonymous user posted on 4chan that Tea used an unsecured F

UK starts enforcing online age-check rules

In Brief A U.K. law requiring that pornography websites verify the age of their users took effect Friday. The BBC reports that around 6,000 porn sites have said they will start verifying users’ ages to comply with the Online Safety Act, although at least one major site was not requiring age checks as of Friday morning. The law also requires that online platforms prevent children from being exposed to harmful content, which is why sites like Reddit, Bluesky, X, and Grindr have also begun askin

U.K. starts enforcing online age check rules

In Brief A U.K. law requiring that pornography websites verify the age of their users took effect Friday. The BBC reports that around 6,000 porn sites have said they will start verifying users’ ages to comply with the Online Safety Act, although at least one major site was not requiring age checks as of Friday morning. The law also requires that online platforms prevent children from being exposed to harmful content, which is why sites like Reddit, Bluesky, X, and Grindr have also begun askin

Rust running on every GPU

I've built a demo of a single shared Rust codebase that runs on every major GPU platform: CUDA for NVIDIA GPUs for NVIDIA GPUs SPIR-V for Vulkan-compatible GPUs from AMD, Intel, NVIDIA, and Android devices for Vulkan-compatible GPUs from AMD, Intel, NVIDIA, and Android devices Metal for Apple devices for Apple devices DirectX 12 for Windows for Windows WebGPU for browsers for browsers CPU fallback for non-GPU systems The same compute logic runs on all targets, written entirely in regular

Topics: code cpu gpu rust self

Keep Pydantic out of your Domain Layer

Keep Pydantic out of your Domain Layer Jul 22 2025 You’re probably reading this because you’re using Pydantic yourself. Maybe you’re building a FastAPI application and hit a point where it started getting too big to manage, and you realized you need better separation of concerns. Perhaps you’ve started adopting a clean architecture or onion architecture kind of layering to keep business logic separate from application logic, aiming for better maintainability and testability. But Pydantic is st

Rust on Every GPU

I've built a demo of a single shared Rust codebase that runs on every major GPU platform: CUDA for NVIDIA GPUs for NVIDIA GPUs SPIR-V for Vulkan-compatible GPUs from AMD, Intel, NVIDIA, and Android devices for Vulkan-compatible GPUs from AMD, Intel, NVIDIA, and Android devices Metal for Apple devices for Apple devices DirectX 12 for Windows for Windows WebGPU for browsers for browsers CPU fallback for non-GPU systems The same compute logic runs on all targets, written entirely in regular

Topics: code cpu gpu rust self

The future is not self-hosted

Hey friends 👋, A few months ago, Amazon announced that Kindle users would no longer be able to download and back up their book libraries to their computers. Thankfully, I still have access to my library because I saw this video by Jared Henderson warning of the change and downloaded all ~400 of my books immediately. But for those that didn't, the only way for them to view the books they own is through a Kindle or the Kindle app. Which raises the question: do they even own those books? If you

California DMV Seeking 30-Day Tesla Sale Suspension for Unrealistic 'Autopilot,' 'Full Self-Driving' Claims

The California Department of Motor Vehicles has brought suit against electric car manufacturer Tesla, alleging false advertising and misleading customers with its "Autopilot" and "Full Self-Driving" features. The DMV is angling for a 30-day suspension of the automaker's license to sell EVs in California for at least 30 days while the courts hash out whether fines or retribution should come next. Tesla is, of course, looking to fight the allegations. What does this mean for you? If the CA DMV's

“Bypassing” specialization in Rust

"Bypassing" specialization in Rust or How I Learned to Stop Worrying and Love Function Pointers I've spent nearly a year developing and refining my own FAT driver in Rust. For much of the last six months, I had to put the project on hold due to school commitments. However, I'm back now, especially since this project has become my most-starred repository on GitHub. During that journey, I (almost) learned how FAT and filesystems in general work behind-the-scenes and in my attempts to navigate the

"Bypassing" Specialization in Rust or How I Learned to Stop Worrying and Love F

"Bypassing" specialization in Rust or How I Learned to Stop Worrying and Love Function Pointers I've spent nearly a year developing and refining my own FAT driver in Rust. For much of the last six months, I had to put the project on hold due to school commitments. However, I'm back now, especially since this project has become my most-starred repository on GitHub. During that journey, I (almost) learned how FAT and filesystems in general work behind-the-scenes and in my attempts to navigate the

Zig Interface Revisited

Achieving polymorphism via dynamic dispatch in Zig Unlike many languages that offer interface or virtual constructs, Zig has no built-in notion of interfaces. This reflects Zig’s commitment to simplicity and performance. That doesn’t mean polymorphism is off the table. In fact Zig has the tools to build interface-like behavior, making dynamic dispatch possible. Polymorphism in Zig: The Options Let’s backtrack a bit. There are ways to achieve polymorphism in Zig, depending on the use case: Ge

M.2 SSD Can Self-Destruct by Giving Itself a Burst of Voltage

Worried your data could fall into the wrong hands? A company has developed an M.2 SSD storage drive that can self-destruct by frying its own memory. The product, the P250Q Self-Destruct SSD, is engineered to instantly wipe its memory at the push of a button —either through a software-based erasure or a hardware method that's supposed to physically destroy the flash chip. The product comes from the Taiwanese memory vendor Team Group, which is marketing the SSD to customers working in sensitive

Topics: based group self ssd team

BYD will accept liability if one of its self-parking cars crashes

is a news writer who covers the streaming wars, consumer tech, crypto, social media, and much more. Previously, she was a writer and editor at MUO. The Chinese EV-maker BYD says it will pay for any damage caused by its upgraded self-parking system, as reported earlier by Fast Company. A translated version of BYD’s announcement on Weibo says the company “will fully cover the safety and losses” of vehicles damaged by its God’s Eye self-parking system, which it claims has reached Level 4 autonomy.

Launch HN: Leaping (YC W25) – Self-Improving Voice AI

Hey HN, I'm Arkadiy from Leaping AI ( https://leapingai.com ). Leaping lets you build voice AI agents in a multi-stage, graph-like format that makes testing and improvement much easier. By evaluating each stage of a call, we can trace errors and regressions to a particular stage. Then we autonomously vary the prompt for that stage and A/B test it, allowing agents to self-improve over time. You can talk to one of our bots directly at https://leapingai.com, and there’s a demo video at https://www

Topics: ai self stage use voice

Man of Glass: Boccaccio: A Biography

In early June 1363, Giovanni Boccaccio received a letter that stung him deeply. Just a few days shy of his fiftieth birthday, he was then at the height of his creative powers. He had already penned at least a dozen major works, including the Decameron, any one of which would have assured him a place alongside Dante and Petrarch in the firmament of Italian literature. Although recent political upheavals had forced him to leave his native Florence, he was still writing feverishly. Yet to his frien

Uncommon Uses of Python in Commonly Used Libraries (2022)

To learn how to build more maintainable and usable Python libraries, I’ve been reading some of the most widely used Python packages. Along the way, I learned some things about Python that are off the beaten path. Here are a few things I didn’t know before. Using super() in base classes Python’s super() lets us inherit base classes (aka super or parent classes) without having to explicitly refer to the base class. It’s usually used in the __init__ method. While this might be simply a nice-to-ha

On latency, measurement, and optimization in algorithmic trading systems

"The speed of light sucks." - John Carmack ‍ Software engineers within the world of low-latency automated trading (colloquially known as "high-frequency trading" or HFT) obsess over speed. From purchasing private bandwidth between microwave towers to analyzing x86 instructions from different compiler versions, those with experience in this industry have seen colossal time and expense committed to the problem of optimizing code and network paths for minimal execution times. But how does one

Alternative Blanket Implementations for a Single Rust Trait

July 01, 2025 #rust #traits #patterns Serhii PotapovJuly 01, 2025 Rust's trait system is famously powerful - and famously strict about avoiding ambiguity. One such rule is that you can't have multiple blanket implementations of the same trait that could potentially apply to the same type. What Is a Blanket Implementation? A blanket implementation is a trait implementation that applies to any type meeting certain constraints, typically via generics. A classic example from the standard librar

Parallelizing SHA256 Calculation on FPGA

A few weeks ago, I wrote an article where I developed a hash calculator on an FPGA. Specifically, I implemented an SHA-256 calculator. This module computes the hash of a string (up to 25 bytes) in 68 clock cycles. The design leverages the parallelism of FPGAs to compute the W matrix and the recursive rounds concurrently. However, it produces only one hash every 68 clock cycles, leaving most of the FPGA underutilized during that time. In this article we are going to elevate the performance of t

Topics: 31 hash input self wire