Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: code Clear Filter

Look Out for Bugs

Look Out For Bugs One of my biggest mid-career shifts in how I write code was internalizing the idea from this post: Don’t Write Bugs Historically, I approached coding with an iteration-focused mindset — you write a draft version of a program, you set up some kind of a test to verify that it does what you want it to do, and then you just quickly iterate on your draft until the result passes all the checks. This was a great approach when I was only learning to code, as it allowed me to iterate

SQLite's Use of Tcl (2017)

SQLite's Use Of Tcl D. Richard Hipp 24th Annual Tcl/Tk Conference Houston, TX 2017-10-19 1.0 Introduction SQLite is a TCL extension that has escaped into the wild. The design of SQLite was inspired by the design of TCL, both in the way it handles datatypes and in the formatting of its source code. The index use case for SQLite was in a Tcl/Tk application for an industrial company. From its inception, SQLite has always depended heavily on TCL. These days, SQLite no longer uses TCL internal

Hungry Hungry Hippos Autoplay (2017)

CONTENTS YouTube BlueSky GitHub LinkedIn Hungry Hungry Hippos Autoplay Posted: June 10, 2017 Introduction A group of my coworkers play board games during lunch time on Fridays and at one point invited me to play. Unfortunately all they play is a bunch of modern hipster games when I wanted to play Hungry Hungry Hippos. No one wanted to play with me so I decided to build circuitry that would take their place. Pushing the plastic lever eventually got really tiring so

Forty-Four Esolangs: The Art of Esoteric Code

Have you ever tried programming with a language that uses musical notation? What about a language that never runs programs the same way? What about a language where you write code with photographs? All exist, among many others, in the world of esoteric programming languages, and Daniel Temkin has written a forthcoming book covering 44 of them, some of which exist and are usable to some interpretation of the word “usable.” The book, Forty-Four Esolangs: The Art of Esoteric Code, is out on 23 Sep

Formatting code should be unnecessary

Formatting code should be unnecessary and we knew this back in the 80s I had a (maybe slightly overqualified) computer science teacher back in highschool, Mr. Paige. He worked on the Ada compiler and has been programming since the early 80s. One day I complained about linter tooling that was driving me nuts. I said something to the effect of, "it's 2016, how are we still dealing with this sort of thing?" Turns out, that problem was solved four decades ago (well, three at that point). Back wh

SQLite's Use of Tcl

SQLite's Use Of Tcl D. Richard Hipp 24th Annual Tcl/Tk Conference Houston, TX 2017-10-19 1.0 Introduction SQLite is a TCL extension that has escaped into the wild. The design of SQLite was inspired by the design of TCL, both in the way it handles datatypes and in the formatting of its source code. The index use case for SQLite was in a Tcl/Tk application for an industrial company. From its inception, SQLite has always depended heavily on TCL. These days, SQLite no longer uses TCL internal

Show HN: Semantic grep for Claude Code (RUST) (local embeddings)

ck - Semantic Grep by Embedding ck (seek) finds code by meaning, not just keywords. It's a drop-in replacement for grep that understands what you're looking for — search for "error handling" and find try/catch blocks, error returns, and exception handling code even when those exact words aren't present. Quick start cargo install ck-search # Find error handling patterns (finds try/catch, Result types, etc.) ck --sem " error handling " src/ # Traditional grep-compatible search still works ck -

Topics: ck code search sem src

The Ivalice Chronicles team had to remake the original Final Fantasy Tactics' source code from scratch

The Square Enix team behind Final Fantasy Tactics — The Ivalice Chronicles didn't just remaster the iconic strategy RPG, they had to go through the trouble of remaking the source code from scratch, according to Bloomberg. In an interview with Bloomberg's Jason Schreier, the game's director Kazutoyo Maehiro explained the arduous process of designing The Ivalice Chronicles, which is set to release at the end of the month. When getting to work on the remake, Maehiro and his team discovered they ha

VirusTotal finds hidden malware phishing campaign in SVG files

VirusTotal has discovered a phishing campaign hidden in SVG files that create convincing portals impersonating Colombia's judicial system that deliver malware. VirusTotal detected this campaign after it added support for SVGs to its AI Code Insight platform. VirusTotal's AI Code Insight feature analyzes uploaded file samples using machine learning to generate summaries of suspicious or malicious behavior found in the files. After adding support for SVGs, VirusTotal found an SVG file that had

A Software Development Methodology for Disciplined LLM Collaboration

Disciplined AI Software Development - Collaborative A structured approach for working with AI on development projects. This methodology addresses common issues like code bloat, architectural drift, and context dilution through systematic constraints. The Context Problem AI systems work on Question → Answer patterns. When you ask for broad, multi-faceted implementations, you typically get: Functions that work but lack structure Repeated code across components Architectural inconsistency ove

Let us git rid of it, angry GitHub users say of forced Copilot features

Among the software developers who use Microsoft's GitHub, the most popular community discussion in the past 12 months has been a request for a way to block Copilot, the company's AI service, from generating issues and pull requests in code repositories. The second most popular discussion – where popularity is measured in upvotes – is a bug report that seeks a fix for the inability of users to disable Copilot code reviews. Both of these questions, the first opened in May and the second opened a

Should we revisit Extreme Programming in the age of AI?

The pace of software output has never been faster. AI tooling and decades of platform innovation have dramatically lowered the barrier to code creation. With just a few prompts or API calls, it is now possible to generate entire products, features, infrastructure, and functionality in hours rather than weeks. And yet, despite all this acceleration, delivery outcomes remain stubbornly poor. Too many initiatives underdeliver, budgets continue to overrun, and users are left underserved. If cheaper

Relace (YC W23) Is Hiring for Code LLMs (SF)

Hey, we're a highly technical team building code generation models, and growing fast. We're looking for people who are down to scrap and love to build -- on both technical and GTM/Devrel roles. If you have a Physics, Math, CS degree; and training fast codegen models is something that piques your interest, please email me directly at [email protected].

Morse Code Translator

Translate Morse to English & English to Morse code Instantly Perfect for amateur radio and emergency communications Practice with repeat mode for skill development Toggle slash separators for different formatting styles Use the copy button for quick text sharing Morse Code Creator: use the green morse code generator button to create random phrases Access advanced audio settings to customize frequency (200-1000 Hz), playback speed, and WPM for professional training standards. Download your

Does anyone still use Morse code?

Translate Morse to English & English to Morse code Instantly Perfect for amateur radio and emergency communications Practice with repeat mode for skill development Toggle slash separators for different formatting styles Use the copy button for quick text sharing Morse Code Creator: use the green morse code generator button to create random phrases Access advanced audio settings to customize frequency (200-1000 Hz), playback speed, and WPM for professional training standards. Download your

Don’t let outdated IGA hold back your security, compliance, and growth

If organizations want to have any chance of protecting their data from unauthorized access in 2025 and beyond, there is no way around Identity Governance & Administration. But conventional IGA solutions are the wrong option for most businesses. For companies trying to keep their data secure while maintaining a competitive edge, the stakes could not be higher. Faced with an onslaught of identity-based attacks, they need a way to efficiently manage their increasingly complex IT environments while

Why Browser Company at $610M is cheap

first, what does this price mean for the browser company? their last round valued them at $550m, so this is basically giving the previous investors their money back. in other words, bare minimum price they could sell for without somebody taking a loss. pretty bad for them: the market sees no future value, josh’s “vision” for browsers couldn’t get better than buzzwords. second, what does this price mean for atlassian? they have $3b cash, so this is 20% of their piggy bank. and with $1.2b q3 prof

Critical SAP S/4HANA vulnerability now exploited in attacks

A critical SAP S/4HANA code injection vulnerability is being leveraged in attacks in the wild to breach exposed servers, researchers warn. The flaw, tracked as CVE-2025-42957, is an ABAP code injection problem in an RFC-exposed function module of SAP S/4HANA, allowing low-privileged authentication users to inject arbitrary code, bypass authorization, and fully take over SAP. The vendor fixed the vulnerability on August 11, 2025, rating it critical (CVSS score: 9.9). However, several systems h

The Anatomy of a Mach-O: Structure, Code Signing, and Pac

Table of Contents The Mach Object (Mach-O) is the binary format used on Apple’s operating systems for executables, libraries, and object code. It was created for the Mach kernel (hence the name) and introduced in NeXTSTEP, the predecessor to macOS, as a replacement for the a.out format. Mach-O’s design supports multiple architectures (via universal binaries), and contains metadata via load commands. In this post, we’ll explore Mach-O’s layout and history. Then, we will examine how macs use Ma

Relace (YC W23) Is Hiring for Code LLM's (SF)

Hey, we're a highly technical team building code generation models, and growing fast. We're looking for people who are down to scrap and love to build -- on both technical and GTM/Devrel roles. If you have a Physics, Math, CS degree; and training fast codegen models is something that piques your interest, please email me directly at [email protected].

Microsoft Goes Back to BASIC, Open-Sources Bill Gates’ Code

In the era of vibe coding, when even professionals are pawning off their programming work on AI tools, Microsoft is throwing it all the way back to the language that launched a billion devices. On Wednesday, the company announced that it would make the source code for Microsoft BASIC for the 6502 Version 1.1 publicly available and open-source. The code is now uploaded to GitHub under an MIT license (with a cheeky commit time stamp of “48 years ago”). Microsoft called the code—written by the com

3D QR Codes

3D QR Codes Erik Demaine & Martin Demaine, 2025 In this exhibit, we're experimenting with the limits of QR (Quick Response) codes, in particular new ways to construct QR codes from physical material. Most of our QR codes are built from several layers of material (wood, paper, or acrylic), where each layer is a single color. Building in this way has an interesting constraint: each layer must be a connected piece of material. We use a greedy algorithm to find the most white pixels that can appea

Topics: 11 2025 codes paper qr

Microsoft open-sources Bill Gates’ 6502 BASIC from 1978

On Wednesday, Microsoft released the complete source code for Microsoft BASIC for 6502 Version 1.1, the 1978 interpreter that powered the Commodore PET, VIC-20, Commodore 64, and Apple II through custom adaptations. The company posted 6,955 lines of assembly language code to GitHub under an MIT license, allowing anyone to freely use, modify, and distribute the code that helped launch the personal computer revolution. "Rick Weiland and I (Bill Gates) wrote the 6502 BASIC," Gates commented on the

Cache

Finds the Cache entry whose key is the request, returning a Promise that resolves to true if a matching Cache entry is found and deleted. If no Cache entry is found, the promise resolves to false . Takes both a request and its response and adds it to the given cache. Takes an array of URLs, retrieves them, and adds the resulting response objects to the given cache. Takes a URL, retrieves it and adds the resulting response object to the given cache. This is functionally equivalent to calling f

Inverting the Xorshift128 random number generator

CVE-2025-7783 is a very recent vulnerability affecting a lot of applications in the Node.js ecosystem including those which use axios or the deprecated request library. In all honesty, this vulnerability is really an edge case that is extremely unlikely to be exploited: it is dependent upon a number of events that are not normally present. One of those events is the attacker having access to five consecutive outputs of JavaScript Math.random( ) , which allows the attacker to predict future outpu

Another YC company was acquihired today by OpenAI

I'm excited to announce that we're joining OpenAI’s Codex team! When we started out, Xcode had no AI. Building a "Cursor for Xcode" sounded crazy, but we managed to do it anyway. And, over time, we built the best coding agent for iOS & MacOS apps. I'm extremely proud of what we accomplished with Alex. Seeing people build software with our work was surreal. It is an honor to continue that work at a much bigger scale at OpenAI, along with the incredibly talented Codex team. Our mission is to hel

Microsoft BASIC for 6502 Microprocessor – Version 1.1

Microsoft BASIC for 6502 Microprocessor - Version 1.1 Historical Significance This assembly language source code represents one of the most historically significant pieces of software from the early personal computer era. It is the complete source code for Microsoft BASIC Version 1.1 for the 6502 microprocessor, originally developed and copyrighted by Microsoft in 1976-1978. Why This Document is Historically Important 1. Foundation of the Personal Computer Revolution This BASIC interpreter

Writing a C compiler in 500 lines of Python (2023)

Writing a C compiler in 500 lines of Python Posted August 30, 2023 A few months ago, I set myself the challenge of writing a C compiler in 500 lines of Python , after writing my SDF donut post. How hard could it be? The answer was, pretty hard, even when dropping quite a few features. But it was also pretty interesting, and the result is surprisingly functional and not too hard to understand! There's too much code for me to comprehensively cover in a single blog post , so I'll just give an ove

Topics: code emit i32 lexer type