News Nug
Mlx-community/OLMo-2-0325-32B-Instruct-4bit

Published: 2025-03-16 | Origin: Hacker News

The OLMo 2 32B model claims to be the first fully open AI model, with all data, code, and weights publicly available, that outperforms GPT-3.5 Turbo and GPT-4o mini. A user shared a successful method to install and run it on a Mac using the llm-mlx plugin, which downloads 17GB of files. Users can start an interactive chat or run prompts with the model, and modifying the output token limit allows for longer

Introducing Eventure: A Powerful Event-Driven Framework for Python

Published: 2025-03-16 | Origin: /r/programming

Eventure is a robust event-driven framework designed for simulations, games, and complex systems. It features comprehensive capabilities for event sourcing, querying, and analysis. Key characteristics include: - **Event-Driven Architecture**: Implements a publish-subscribe model, facilitating event dissemination. - **Event Sourcing**: Treats events as the primary source of truth, allowing for clear implementation and practical benefits. - **Tick-Based System**: Enhances deterministic execution, discrete time steps, performance optimization, and flexible

"Gunyah Hypervisor Software - Supporting Protected VMs in Android Virtualization Framework" by Elliot Berman and "Co-written with Prakruthi Deepak Heragu" (January 28, 2024)

Published: 2025-03-16 | Origin: /r/programming

Sure! Please provide the content you would like summarized.

Popular GitHub Action `tj-actions/changed-files` has been compromised with a payload that appears to attempt to dump secrets

Published: 2025-03-16 | Origin: /r/programming

Semgrep has announced $100 million in Series D funding, led by Menlo Ventures. The company focuses on enhancing code security through various tools, including static application security testing (SAST), software composition analysis (SCA), and semantic analysis for hardcoded secrets. Semgrep provides AI-driven triage and code fix recommendations, and aims to automate and enforce security across organizations while minimizing false positives. The platform enables users to write and share custom rules, stay updated on developments, and mitigate software supply chain

Generate impressive-looking terminal output, look busy when stakeholders walk by

Published: 2025-03-16 | Origin: Hacker News

The content introduces "rust-stakeholder," a CLI tool designed to generate impressive but meaningless terminal output, allowing users to appear productive and knowledgeable without actually coding. It highlights the benefits of looking busy, suggesting that visual complexity in the terminal can impress stakeholders, even leading to promotions and reduced queries about deadlines. User testimonials emphasize the tool's effectiveness in creating an illusion of expertise and importance in the workplace, while humorously noting the lack of actual test coverage and the theoretical nature of its functionalities. The overall

Just monitoring is not enough

Published: 2025-03-16 | Origin: /r/programming

Late at night, the author's phone alerts them to a high error rate in their system, which had been functioning well until then. Upon investigating, they discovered a single bug had caused a significant service failure, leading to a flood of user complaints. After lengthy debugging, they resolved the issue and restored service. This incident highlighted a critical lack of observability in their system. Many engineers believe they have adequate monitoring, but when issues arise, they often struggle to diagnose problems effectively. The author argues that software

Apple's long-lost hidden recovery partition from 1994 has been found

Published: 2025-03-16 | Origin: Hacker News

The author shares a personal journey of rescuing a piece of obscure Apple software history from an old 160 MB Conner hard drive that had malfunctioned. The story begins with an intriguing blog post by Pierre Dandumont, which discussed a hidden feature in the Macintosh Performa 550. This feature involves a secret partition on the hard drive containing a miniature, invisible System Folder designed to assist users in case of system failures. When issues arise, users are prompted to either fix the problem themselves or reinstall

Career Advice in 2025

Published: 2025-03-15 | Origin: Hacker News

The tj-actions repository, a widely used tool in GitHub Actions, was recently compromised, prompting a notable response from the infrastructure and security teams at Carta. This incident underscored the limitations of LLMs in fully replacing essential software roles. Additionally, Jennifer Palkha's "Recoding America" emphasizes that decision-makers can act irrationally longer than professionals can remain employed, resonating with recent discussions about the challenging job market in 2025. Many individuals who entered senior roles between 201

Mandelbrot Set Explorer

Published: 2025-03-15 | Origin: Hacker News

Sure! Please provide the content you'd like me to summarize.

TracePerf: TypeScript-Powered Node.js Logger That Actually Shows You What's Happening

Published: 2025-03-15 | Origin: /r/programming

TracePerf is a tool designed for advanced console logging and performance tracking in Node.js applications. It allows users to visualize execution flows using ASCII art, identify bottlenecks, and receive optimization suggestions. The tool includes features like structured logs, conditional modes, and memory tracking to enhance debugging efficiency. Additionally, TracePerf offers a browser-compatible version for frontend applications. Feedback from users is valued and taken seriously, with available documentation for further details. The tool is released under the MIT license.

Extracting DNA from the air – DNA evidence of human occupancy in indoor premises

Published: 2025-03-15 | Origin: Hacker News

The study published in *Scientific Reports* explores the potential use of human DNA found in air and dust as evidence in criminal investigations, particularly in situations where visible traces are absent, such as in a vacated drug factory. Samples were taken from various indoor settings with differing occupancy and cleaning practices, and DNA profiles were analyzed against those of 55 known individuals. Results indicated that indoor dust is a rich source of DNA, providing a historical record of past occupants. Notably, DNA was also detected in ultra

A Practical Guide to Postgres Isolation Anomalies and How To Tame Them

Published: 2025-03-15 | Origin: /r/ruby

The content discusses the use of Postgres as a versatile database management system, particularly in web applications where it handles multiple users simultaneously. It highlights the challenges of maintaining data consistency while serving concurrent clients and introduces a rudimentary booking platform for event reservations written primarily in SQL, with minimal Ruby code. The article promises to explore transaction-related issues and the isolation property of transactions, starting with the creation of a bookings table that includes customer identification and reserved seats. It emphasizes the importance of atomicity, ensuring that multiple

Were multiple return values Go's biggest mistake?

Published: 2025-03-15 | Origin: /r/programming

The article critiques Go's error handling and its use of multiple return values, suggesting that these features complicate the language unnecessarily. The author highlights several common criticisms of Go, including the lack of sum types, enums, null safety, const correctness, and generics. They argue that multiple return values, while seemingly harmless, negatively influence the language's design and create complexity, as Go does not have true tuples like some other languages. Instead, to achieve similar functionality, developers must define structs. Overall,

Fired “Kill Switch” Programmer Faces 10 Years In Jail: What Went Wrong?

Published: 2025-03-15 | Origin: /r/programming

Davis Lu, a 55-year-old former Senior Software Developer at EATON Corporation, has been sentenced to 10 years in prison for deploying a “kill switch” that disrupted his employer's systems after he was laid off in September 2019. Lu created apps that would trigger chaos in the company's systems when his account was disabled in Active Directory. His hidden server in Kentucky managed these destructive apps, named "Hakai" (Japanese for "destruction") and "Hūnshu

Milk Kanban

Published: 2025-03-15 | Origin: Hacker News

The concept of Kanban is often reduced to specific practices like using whiteboards and sticky notes, which can oversimplify its broader principle. Originally, Kanban referred to a visual signal indicating various needs or requests. In typical Kanban systems, a sticky note symbolizes work, conveying information about tasks based on its context, such as color or placement. The author advocates for moving beyond the standard Kanban board design to recognize that Kanban’s essence lies in visual signals. An example provided is an index

Distributed Locking: A Practical Guide

Published: 2025-03-15 | Origin: /r/programming

The content highlights the challenges of managing data consistency in distributed systems, where multiple processes or services can simultaneously read and write to the same data. It emphasizes the issue of data corruption, race conditions, and unwanted duplicates that can arise from such concurrent updates. To mitigate these risks, distributed locks are introduced as a solution, allowing only one process to modify a resource at a time. The discussion outlines the need for distributed locking, explores its implementation in popular tools and systems like Redis, ZooKeeper, databases,

How to Streamline Data Access With Valet Key Pattern?

Published: 2025-03-15 | Origin: /r/programming

Software applications typically use intermediaries, like servers, to handle data streaming, sharing, and storage. When a client requests data, the service retrieves it and forwards it, which can lead to increased latency, resource consumption, and scalability issues as demands grow. The Valet Key pattern offers a solution by allowing clients direct access to data without intermediaries. It involves a process where clients request access, the intermediary service authorizes them, generates a short-lived security token (valet key) that specifies data

Programming’s Sacred Cows: How Best Practices Became the Industry’s Most Dangerous Religion

Published: 2025-03-15 | Origin: /r/programming

Mr. Plan ₿ Publication is a platform welcoming both novice and seasoned writers to share and promote their articles. The author, Terrance Craddock, reflects on his experience of deleting a large Java project and reprogramming it in PHP4, despite his colleagues' concerns about deviating from established "best practices." He argues that the tech industry has turned these guidelines into rigid dogma, stifling creativity. Craddock suggests that many of the most innovative software solutions have emerged from breaking

I built a high-performance, dependency-free key-value store in Go from first principlesn(115K ops/sec on an M2 Air)

Published: 2025-03-15 | Origin: /r/programming

The content emphasizes the serious consideration given to user feedback and provides an overview of "nubmq," a high-performance key-value (KV) storage engine built in pure Golang. Designed for high-frequency, contention-heavy workloads, nubmq features native pub-sub support and operates without dependencies. Key functionalities include the ability to dynamically scale, immediate key expiration and removal, polling-free notifications, and non-blocking I/O with dedicated read and write buffers for each connection. The system has been benchmarked on an M

Experts warn about the 'crumbling infrastructure' of federal government data

Published: 2025-03-15 | Origin: Hacker News

Failed to fetch content - HTTP Error - Net::ReadTimeout with #<TCPSocket:(closed)>