| News Nug |
|---|
|
The most mysterious bug I solved at work Published: 2025-07-03 | Origin: /r/programming The author worked on a team that developed an e-referrals application used in Australia to streamline the process of referring patients from general practitioners (GPs) to secondary health services, such as hospitals or specialists. Traditionally, referrals were sent via fax, which often resulted in rejections due to incomplete information. The e-referrals system enhances this process by automatically extracting relevant patient information from the existing patient management software (PMS) and providing a structured referral form with specific fields and prompts. This ensures that all |
|
Porting tmux from C to Rust Published: 2025-07-03 | Origin: /r/programming Collin Richards has been working on porting the tmux terminal multiplexer from C to Rust for about six months, achieving a significant milestone: the codebase is now entirely written in (unsafe) Rust. The original C code, approximately 67,000 lines, has expanded to about 81,000 lines in Rust, excluding comments and empty lines. Richards began this project mainly as a hobby and a way to experiment with C2Rust, a C to Rust transpiler. Although the transp |
|
Flounder Mode – Kevin Kelly on a different way to do great work Published: 2025-07-03 | Origin: Hacker News Kevin Kelly is a multifaceted creative and thinker, known for his diverse contributions rather than a singular breakthrough. He was an early editor of the Whole Earth Catalog, a co-founder of WELL, and helped launch WIRED magazine. Over the years, he has authored numerous books and essays on a wide range of topics including art, creativity, and AI. Additionally, he has unique experiences, such as serving as a futurist advisor for the film Minority Report and inspiring elements of the show Futurama. |
|
How We Refactored 10,000+ i18n Call Sites Without Breaking Production Published: 2025-07-03 | Origin: /r/programming Failed to fetch content - HTTP Status - 403 |
|
A Higgs-bugson in the Linux Kernel Published: 2025-07-03 | Origin: /r/programming The content discusses various technical topics related to Jane Street, focusing on their internship program and experiences with debugging a complex issue in a system called Gord, which handles trading activity data. The key problem involved sporadic permission errors (-EACCES) during large file copies, despite correct filesystem permissions. The post highlights the NFSv3 protocol's inherent lack of security on untrusted networks and the alternative of using Kerberos for authentication. A notable insight was that disabling Kerberos in the development environment eliminated the |
|
Privilege escalation over notepad++ installer Published: 2025-07-03 | Origin: /r/programming The content discusses the high-severity local privilege escalation vulnerability (CVE-2025-49144) discovered in Notepad++ versions 8.8.1 and earlier. This vulnerability allows local attackers to gain SYSTEM-level privileges by exploiting an uncontrolled executable search path during installation. It explains that the Notepad++ installer incorrectly calls regsvr32.exe without a full path, leading Windows to search for the executable in various directories, allowing a malicious regsvr32.exe to take precedence if placed |
|
Rust Case Studies Published: 2025-07-03 | Origin: /r/programming The content discusses the experiences of teams at various companies that have transitioned to using the Rust programming language, targeting technical decision-makers who are interested in understanding the motivations behind adopting Rust. The article outlines several case studies showcasing both small and large companies, emphasizing the benefits and challenges encountered during their migration. Key points include: 1. **Performance Improvements**: In one case, after switching from Kotlin to Rust, a system's transactions per second (TPS) drastically improved from 6,000 TPS to |
|
Ever wondered how AWS S3 scales to handle 1 PB/s bandwidth? I broke down their key design decisions in a deep-dive article Published: 2025-07-03 | Origin: /r/programming Amazon S3 processes an immense volume of requests, handling hundreds of millions per second and moving data at several hundred terabits per second. It serves as a crucial foundation for various applications, storing everything from media to analytics logs and enabling scalable, durable storage globally. Currently, S3 accommodates around 400 trillion objects across 31 regions and 99 availability zones, ensuring impressive availability and an unmatched durability rate of 99.999999999%. Data is meticulously replicated across multiple facilities to maintain service continuity |
|
Baba Is Eval Published: 2025-07-03 | Origin: Hacker News "Baba is You" is a sokoban puzzle game where players manipulate the rules to solve increasingly complex levels, making it a challenging reasoning benchmark. It is turn-based, allowing for a metric of efficiency based on the number of moves required to complete each level. Although similar to the upcoming ARC-AGI-3 benchmark set for 2026, the availability of solutions online poses a challenge for its use as a serious benchmark. However, numerous player-created levels without published solutions provide an alternative. In |
|
Finished my deep dive into Bloom Filters (Classic, Counting, Cuckoo), and why they’re IMO a solid "pre-cache" tool you're probably not using Published: 2025-07-03 | Origin: /r/programming Bloom filters are a type of probabilistic data structure that significantly reduce memory usage—by up to 90%—while allowing for instant checks of data existence within a set. They work by combining hash functions and bit arrays to provide quick answers to whether an element is definitely absent from the set or possibly present, accepting that sometimes they may incorrectly indicate that an element is present (a false positive). This makes Bloom filters particularly useful in scenarios where it is crucial to avoid false negatives. Although they aren't commonly |
|
Ruby 3.4's Happy Eyeballs v2: Solving Rails API Timeout Hell Published: 2025-07-03 | Origin: /r/ruby Ruby 3.4 introduces Happy Eyeballs Version 2, which addresses the issue of long timeouts in Rails apps when making API calls to payment gateways. Traditionally, if a server's IPv6 is misconfigured, the app would wait 30 seconds for a timeout before attempting to connect over IPv4. Happy Eyeballs v2 changes this by allowing the app to try IPv6 and IPv4 simultaneously, reducing the wait to just 250ms if the IPv6 connection fails. This |
|
Third Interstellar Object Discovered Published: 2025-07-03 | Origin: Hacker News The content provides a form for accessing any MPEC (Minor Planet Electronic Circular) by entering an MPEC number. |
|
Trans-Taiga Road (2004) Published: 2025-07-03 | Origin: Hacker News The Trans-Taiga Road is a remote 666 km gravel road in Canada, extending east from the James Bay Road to access dams along the La Grande River. It features no settlements except for Hydro Quebec work camps, making it the farthest point from a town on a public road in North America. The road is notably rougher from Brisay to Caniapiscau, and while four-wheel drive is recommended due to large rocks, some have driven it in regular cars with caution. Travelers should |
|
Whole-genome ancestry of an Old Kingdom Egyptian Published: 2025-07-03 | Origin: Hacker News The article discusses the genetic analysis of an adult male Egyptian from Nuwayrat, dated to 2855–2570 BCE, who lived during the Early Dynastic to Old Kingdom periods. This individual was buried in a ceramic pot, which may have aided DNA preservation. Genome sequencing revealed that his ancestry is primarily from North African Neolithic origins, but about 20% is linked to the eastern Fertile Crescent, including Mesopotamia. This genetic connection suggests that interactions between Egypt and the eastern Fert |
|
How cybercriminals make money with cryptojacking Published: 2025-07-02 | Origin: /r/programming The article discusses how cybercriminals utilize cryptojacking to mine cryptocurrency without the victim's consent. Cryptojacking malware removes competing malware from the system before using the xmrig miner to connect to the c3pool mining pool for Monero (XMR) mining. The analysis is conducted using Beelzebub, a low-code honeypot framework. Key details include the source IP (64.23.235.100) and login credentials (validator/qwerty) used by the |
|
The History of Electronic Music in 476 Tracks (1937–2001) Published: 2025-07-02 | Origin: Hacker News Ubuweb has released a significant compilation titled "History of Electronic/Electroacoustic Music," which includes 476 tracks originally part of a 62-CD set, covering music from 1937 to 2001. This collection is particularly aimed at those interested in avant-garde and musicology, featuring works by notable composers like Karlheinz Stockhausen, Pierre Henry, and François Bayle. The original uploader, Caio Barros, created this archive in 2009 during his studies in |
|
Lisp and Prolog appear in the European Commission's eGovernment Benchmark 2025 Published: 2025-07-02 | Origin: /r/programming The content expresses appreciation for user feedback and stresses its importance. It mentions that the European Commission has released the eGovernment Benchmark 2025, highlighting the Grants4Companies initiative as a key example of good practice due to its extensive use of Scryer Prolog. The report includes a link to the System Description of the application. The message concludes with gratitude and well wishes from Markus, while also noting that there were several loading errors on the page. |
|
Show HN: a community for collaborating on sideprojects Published: 2025-07-02 | Origin: Hacker News Of course! Please provide the content you'd like me to summarize. |
|
Burn It With Fire: How to Eliminate an Industry-Wide Supply Chain Vulnerability Published: 2025-07-02 | Origin: /r/programming The content discusses a significant vulnerability discovered in the Java ecosystem related to dependency resolution over insecure HTTP connections instead of HTTPS. The author encountered this issue while debugging a personal project in 2019, realizing that many builds across major tools, including JetBrains, Apache, and others, were susceptible to man-in-the-middle attacks that could inject malicious code. The realization, stemming from a simple typo, sparked a multi-year effort to address this industry-wide supply chain vulnerability. The story highlights the importance of secure dependency |
|
Automatic RuboCop Formatting with Claude Code Hooks Published: 2025-07-02 | Origin: /r/ruby Justin Dell sent a message titled "Sent to the world with HEY" on July 2, 2025. |