News Nug
Tencent's 'Hunyuan-T1'–The First Mamba-Powered Ultra-Large Model

Published: 2025-03-22 | Origin: Hacker News

Failed to fetch content - HTTP Error - SSL_connect returned=1 errno=0 peeraddr=120.232.65.193:443 state=error: certificate verify failed (unable to get local issuer certificate)

Ratomic: Ractor-safe mutable data structures for Ruby

Published: 2025-03-22 | Origin: /r/ruby

Ratomic is a newly introduced project that offers mutable data structures designed specifically for Ruby's Ractors, which enables Ruby code to function beyond the Global VM Lock (GVL). The project seeks assistance from those familiar with Rust and Ruby C-extensions, while also encouraging learners to take on this challenge. Users are invited to explore ongoing issues for interesting tasks. Although the gem has not yet been released, it aims to provide Ractor-safe structures, including an object pool, a map/hash structure, and

PyTorch Internals: Ezyang's Blog

Published: 2025-03-22 | Origin: Hacker News

The essay discusses the internals of the PyTorch library, aimed at users interested in contributing to the project but intimidated by its complex C++ codebase. It serves as a roadmap to understanding PyTorch's structure, particularly its tensor library that supports automatic differentiation. The talk is divided into two parts: 1. **Conceptual Overview**: It begins by exploring the tensor data type, including its functionalities and implementation. It highlights the "trinity" of extension points—layout, device, and

Landrun: Sandbox any Linux process using Landlock, no root or containers

Published: 2025-03-22 | Origin: Hacker News

The content describes a tool called "landrun" that utilizes Linux's Landlock LSM (Linux Security Module) to create a lightweight and secure sandbox environment for running Linux processes. It emphasizes its user-friendly design and kernel-level security, likening it to firejail but with minimal overhead. Key features include: - Ability to restrict processes and their child processes using fine-grained access controls for files, directories, and networks. - Support for specific network rights, requiring Linux 6.8+

Understanding Faults and Fault Tolerance in Distributed Systems

Published: 2025-03-22 | Origin: /r/programming

Software applications utilize distributed systems for tasks like data storage, computation, and real-time processing, distributing workloads across multiple nodes to enhance scalability and availability. However, these systems are prone to faults due to their complexity, which can disrupt operations. Fault tolerance is vital, allowing a system to function correctly even when some components fail. Faults can be classified into several types: 1. **Hardware Faults**: Physical failures (e.g., a server losing connectivity due to a faulty router). 2. **

Ever wanted a “go back” button when debugging JavaScript in Chrome Developer Tools?

Published: 2025-03-22 | Origin: /r/programming

Of course! Please provide the content you'd like me to summarize.

Build, Use, and Improve Tools

Published: 2025-03-22 | Origin: /r/programming

The essay argues that developers should create or modify tools to suit their needs for both repetitive tasks and one-off problems. Inspired by Shawn Wang's "Three Strikes Rule for Blogging," it suggests that if a developer finds themselves performing a task multiple times, they should consider building a tool for it. Additionally, quick and improvised solutions can also be valuable. Large language models (LLMs) excel at creating simple, focused utilities, making them effective for task automation, although they struggle with complex projects.

Running interactive sessions with Kamal

Published: 2025-03-22 | Origin: /r/ruby

To connect to a container on a server managed by Kamal and run an interactive session, you can use the `kamal server exec` command with the `-i` option to maintain the connection. Similarly, Docker uses the `docker exec` command with the `-it` options for an interactive session. By combining these commands, you can interactively run commands within a specific container. For example, using `kamal-proxy`, you can enter the container to manage the proxy without executing

Scallop – A Language for Neurosymbolic Programming

Published: 2025-03-22 | Origin: Hacker News

Scallop is a declarative language designed for enhancing symbolic reasoning in AI applications, built on Datalog, a rule-based query language for databases. It features a scalable Datalog solver that supports various reasoning modes, including discrete, probabilistic, and differentiable, which can be tailored for different AI needs. Scallop also integrates seamlessly with Python, allowing it to work within existing PyTorch machine learning pipelines. This makes it suitable for developing diverse applications in vision and natural language processing that require symbolic

George Foreman, Boxer Turned Foreman Grill Infomercial Star, Dies at 76

Published: 2025-03-22 | Origin: Hacker News

George Foreman, the former Heavyweight Champion of the World, infomercial star, and creator of the popular Foreman Grill, passed away at the age of 76. Born on January 10, 1949, in Marshall, Texas, Foreman first gained recognition by winning an Olympic gold medal in boxing in 1968. He became a prominent figure in the boxing world during the 1970s, notably engaging with legends like Muhammad Ali. After a near-fatal incident in

The CRPG Renaissance, Part 5: Fallout 2 and Baldur's Gate

Published: 2025-03-22 | Origin: Hacker News

In December 1997, Interplay celebrated the release of two CRPGs: the well-received post-apocalyptic game Fallout and the poorly received Dungeons & Dragons title Descent to Undermountain. The company planned to replicate this pattern in 1998 with a new Fallout and another Dungeons & Dragons game, but the public's reaction would be vastly different. Fallout 2, lacking an engaging subtitle, was rushed into development after the first game's success, primarily due to Interplay's

Monster Cables picked the wrong guy to threaten (2008)

Published: 2025-03-22 | Origin: Hacker News

Monster Cables has issued a cease-and-desist letter to Blue Jeans Cable, accusing them of various infringements. In response, Blue Jeans Cable's president, Kurt Denke, a former litigator, has firmly addressed the claims, stating that he will review the evidence provided by Monster within 14 days. If Monster fails to substantiate their claims or provide the requested information, Denke will assume the claims are abandoned. He emphasizes that Monster is responsible for proving their allegations and recalls past instances where

CO2 laser enables long-range detection of radioactive material

Published: 2025-03-21 | Origin: Hacker News

To access digital issues of Physics World, you need to sign in or create a separate Physics World account from any IOP accounts you may have. After registering, a verification email should arrive immediately, but it may take longer in some cases; check your spam folder if you don't see it. If you don't receive it within 24 hours, contact customer services. Additionally, researchers at the University of Maryland have successfully developed a method to remotely detect radioactive material from 10 meters away using short-pulse

France rejects backdoor mandate

Published: 2025-03-21 | Origin: Hacker News

The French National Assembly recently rejected a proposal that would have compromised end-to-end encryption in messaging apps like Signal and WhatsApp, despite pressure from the Interior Ministry. This decision is seen as a win for digital rights, privacy, and common sense, as the proposed law was criticized for being a surveillance measure disguised as anti-drug legislation. It included a controversial "ghost" participant model that would allow law enforcement to access encrypted conversations covertly, raising concerns about trust and security. Lawmakers acknowledged the value

The little book about OS development

Published: 2025-03-21 | Origin: Hacker News

This text serves as a practical guide for writing your own x86 operating system, offering technical insights without excessive code samples. It compiles various resources and personal experiences, aiming to facilitate the coding process rather than delve into operating system theory, which is suggested to be explored in Andrew Tanenbaum's "Modern Operating Systems." The guide begins with detailed chapters that help readers set up a development environment and boot an OS kernel in a virtual machine, using the C programming language. As the book progresses, it

Pen and Paper Exercises in Machine Learning (2022)

Published: 2025-03-21 | Origin: Hacker News

arXivLabs is a platform for collaborators to create and share new features for the arXiv website, guided by values of openness, community, excellence, and user data privacy. The platform invites individuals and organizations to contribute ideas that benefit the arXiv community. Additionally, users can receive email or Slack notifications regarding the operational status of arXiv.

How NixOS and reproducible builds could have detected the xz backdoor for the benefit of all

Published: 2025-03-21 | Origin: /r/programming

In March 2024, a serious security breach was uncovered in the xz compression software, widely used in Linux distributions for unpacking software packages. The backdoor was secretly introduced by a malicious maintainer known as Jia Tan over three years, allowing remote code execution on affected machines with SSH installed. This discovery shocked the open-source community due to its profound implications and the stealth of the attack. The backdoor was identified by Andres Freund, a developer at Microsoft, while he was investigating a performance issue

Deciphering language processing in the human brain through LLM representations

Published: 2025-03-21 | Origin: Hacker News

The content describes the commitment to fostering a diverse research environment that encompasses various research types and risk levels. Researchers at Google advance computer science through fundamental and applied research, often collaborating with the broader research community by open-sourcing projects and contributing to Google products. They emphasize sharing knowledge through publications and providing tools and datasets to promote collaboration. Engagement with the academic community and participation in events are also highlighted as crucial for research progress. Additionally, a study conducted by Google researchers investigates how large language models (LLMs)

FOSS Universal 2D Graphics Editor made in C# with Vulkan and Skia - PixiEditor 2.0 is finally feature complete.

Published: 2025-03-21 | Origin: /r/programming

PixiEditor 2.0 is now feature complete, transforming from a pixel-art program into a universal 2D graphics editor. Its goal is to address a wide range of 2D editing needs, similar to Blender in the 3D space, and it remains free and open-source. The major new feature is the Node Graph, which allows users to create complex effects by connecting nodes, giving the capability to produce effects previously achievable only with specialized software like game engines. PixiEditor

Rio is an easy-to-use, open-source framework for creating websites and apps, built entirely with Python.

Published: 2025-03-21 | Origin: /r/programming

Rio is a user-friendly framework for creating websites and applications using pure Python, eliminating the need for HTML, CSS, or JavaScript. It features React-style components, allowing users to build custom components and entire apps that can run locally or on the web. Installation is straightforward via PyPI with pip, and a command-line utility helps create new projects quickly using built-in templates. Users are encouraged to contribute to the project, with a Contributing Guide available for submitting pull requests. Contributions are licensed under the