| News Nug |
|---|
|
Developers use AI more, but they trust it much less Published: 2025-08-28 | Origin: /r/programming In the latest issue of The Trends, key developments in software development and AI adoption are highlighted. A Stack Overflow survey reveals that while 84% of developers are using AI—up from 76% in 2024—trust in AI has declined, with only 33% believing in its accuracy, down from 43%. This paradox is linked to productivity issues caused by AI-generated code that is "almost right," which can be more detrimental than broken code. In another finding, large language models |
|
Ask HN: The government of my country blocked VPN access. What should I use? Published: 2025-08-28 | Origin: Hacker News To successfully use a VPN in regions with censorship, it's essential to obtain reliable VPN software and configurations. Specialized providers often distribute their VPNs through unconventional methods to avoid blocking. Popular options include S3, and some partner with local organizations to ensure effective delivery in censored areas. Using an obfuscation layer, like Obfs4proxy or Shapeshifter, can help disguise VPN traffic. These tools can effectively mask the VPN handshake and make the traffic appear benign, although they are not foolproof |
|
The Koka programming language Published: 2025-08-28 | Origin: /r/programming The article discusses Koka, an experimental functional programming language developed by Microsoft Research, which enhances traditional type systems with an effect system to monitor the side effects of programs. This feature aims to prevent mismatches between intended and actual program behavior. Although Koka has been under development since 2012 and has reached reasonable stability with the recent release of version 3.0 in January 2024, it currently lacks significant programs written in it. The language has inspired research papers focused on implementing its functionalities efficiently |
|
Anything can be a message queue if you use it wrongly enough Published: 2025-08-28 | Origin: /r/programming The article, published on June 4, 2023, is satirical and presents a humorous critique of "Managed NAT Gateway," a cloud service that incurs significant costs for startups due to egress traffic fees. The author argues that, while many businesses accept these costs as part of doing business, they don't realize the potential for significantly reducing their cloud spending. The piece suggests using a Tailscale exit node with a public IP address as an alternative that could lower egress costs by up to |
|
Is MCP a Security Nightmare? A look into MCP Authorization Published: 2025-08-28 | Origin: /r/programming The content discusses the security aspects of the Model Context Protocol (MCP) and its use of modern OAuth2 workflows to enhance security and authorization for AI applications. MCP allows Large Language Models (LLMs) to act on behalf of users, potentially accessing sensitive resources. It emphasizes a "human in the loop" principle, though it cautions that users often overlook the details of the agreements they accept. Vulnerabilities exist, such as prompt injections that could lead to unauthorized access or malicious actions if exploited by |
|
What brain surgery taught me about the fragile gift of consciousness Published: 2025-08-28 | Origin: Hacker News The author reflects on a profound silence experienced with his wife the night before his brain surgery, highlighting the deep connection and awareness of the moment. Faced with the possibility of terminal illness following the discovery of a cerebellar lesion, the author feels an unexpected absence of fear, instead experiencing heightened consciousness and appreciation for life. As he sits in their living room, he savors the details around him and the presence of his wife and their sleeping daughter. This stillness allows him to fully embrace the present |
|
Thoughts on Vibe Coding from a 40-year veteran Published: 2025-08-28 | Origin: /r/programming The article discusses the concept of "vibe coding," where developers use AI assistants to handle the writing, refactoring, and debugging of code. The author, a seasoned developer with 40 years of experience, explores this idea by spending two weeks co-developing a Python software project with the aid of AI coding tools. The project involves implementing AI search algorithms and serves as a hands-on test to evaluate the effectiveness of AI in coding. The author reflects on their experiences, insights, and feelings about |
|
Group Borrowing: Zero-Cost Memory Safety with Fewer Restrictions Published: 2025-08-28 | Origin: /r/programming The blog discusses the ongoing challenges in achieving memory safety, highlighting the limitations of current popular memory-safe languages, which tend to prioritize either speed or flexibility but not both. The author expresses excitement about emerging approaches in the field, particularly the work of Nick Smith from the Mojo community. Smith is exploring a method to implement zero-overhead mutable aliasing in a borrow checker without relying on traditional memory management techniques like reference counting or garbage collection. The author believes this could be a significant advancement and aims to explain Smith |
|
Chebyshev Kolmogorov Arnold Networks Beat MLPs on Nonlinear functions Published: 2025-08-28 | Origin: /r/programming The content outlines a series of research paper implementations focused on advanced machine learning techniques, particularly regarding diffusion models and Chebyshev KANs (Kolmogorov-Arnold Networks). 1. **Implementation Series**: It invites readers to transition from merely reading academic papers to coding implementations, with a series divided into parts. 2. **Chebyshev KANs**: The current focus is on Chebyshev KANs, revealing that they outperform traditional MLPs (Multi-L |
|
Sci-Hub has been blocked in India Published: 2025-08-28 | Origin: Hacker News Three major publishing corporations—Elsevier, Wiley, and the American Chemical Society—have banded together to block access to Sci-Hub and Sci-Net for users in India. A New Delhi court has complied with their request, ordering telecom companies to block these sites within three days, which means that Indian students and researchers will now have to use tools to circumvent this censorship to access original academic content. This coalition has been targeting free access to scientific literature in India since 2020, when they first took |
|
The Deletion of Docker.io/Bitnami Published: 2025-08-28 | Origin: Hacker News The Bitnami team has postponed the deletion of the Bitnami public catalog on Docker Hub until September 29th to provide users more time to adjust to the changes. In the lead-up to the deletion, they will conduct a series of brownouts where 10 container images will be temporarily unavailable for 24 hours. Affected applications will be announced on the day of each brownout. Since August 28th, no new Bitnami container images or Helm charts have been published in OCI |
|
Canaries in the Coal Mine? Recent Employment Effects of AI [pdf] Published: 2025-08-28 | Origin: Hacker News The provided content appears to be a fragment of a PDF file, specifically the file structure detailing the objects and stream used within the PDF. This excerpt includes information such as the identification of various objects, their types, lengths, and references, along with a compressed data stream. The content suggests that it is part of a larger PDF document since it references other objects and contains encoded data. However, the actual readable content from the PDF is not present in this fragment and is truncated. Therefore, a meaningful summary |
|
Bookmarks.txt is a concept of keeping URLs in plain text files Published: 2025-08-28 | Origin: Hacker News The content discusses the concept of "bookmarks.txt," which is a method for storing URLs in plain text files, with each URL on a separate line and optional titles separated by a space. It highlights the flexibility of using any program for managing these URLs and mentions a script in the repository that can list or add new URLs. The project is open to contributions for bug fixes only, as new features are currently not accepted due to potential long-term maintenance concerns. Users are encouraged to submit any feature requests as |
|
Altered states of consciousness induced by breathwork accompanied by music Published: 2025-08-28 | Origin: Hacker News PLOS ONE offers a straightforward and efficient route to publish research in a high-quality journal, ensuring a fair peer review process and a wide readership suitable for diverse topics. The platform encourages researchers to submit their work and provides access to articles within various PLOS Subject Areas. The content also highlights contributions from multiple authors affiliated with institutions in the UK, Japan, the Netherlands, and the USA, detailing their specific roles in the research process. |
|
Token Ruby #4 | Weekly curated newsletter for all things AI and Ruby Published: 2025-08-27 | Origin: /r/ruby The latest issue of Token Ruby, launched at SF Ruby's recent meetup, includes a blog recap. The author discusses using Cursor's BugBot, highlighting its effectiveness in aiding the first round of pull request reviews, particularly enjoying the interaction between AI and human developers on GitHub. Additionally, they praise Copilot Money for its clean design and simplicity in budget management. A humorous note concludes with a pun about RSpec failing a test due to "high expectations." The newsletter aims to support the Ruby and AI |
|
Yamanot.es: A music box of train station melodies from the JR Yamanote Line Published: 2025-08-27 | Origin: Hacker News Sure, please provide the content you would like me to summarize. |
|
We Built It, Then We Freed It: Telemetry Harbor Goes Open Source Published: 2025-08-27 | Origin: /r/programming Telemetry Harbor is being open-sourced as a high-performance, self-hostable ingest stack built on Go, TimescaleDB, Redis, and Grafana. It is production-ready and allows users to manage their own data. The decision to open-source the platform comes after a successful transition from Python to Go, which improved performance by tenfold and eliminated system crashes. The developers aim to build trust through transparency, enable organizations to comply with data sensitivity requirements, and foster a stronger community in the fragmented telemetry space |
|
shared_ptr<T>: the (not always) atomic reference counted smart pointer Published: 2025-08-27 | Origin: /r/programming The write-up discusses the "behavioral analysis" of `shared_ptr<T>` in GNU's libstdc++, a smart pointer that manages shared references to a single underlying pointer by tracking the reference count. This ensures the pointer is only freed when the last reference is destructed, making it particularly useful in multi-threaded applications due to its atomic reference count tracking. The author contrasts the performance of a Rust implementation of an immutable Red-Black tree insertion with that of C++, noting that the Rust version |
|
State of the art for reducing executable size with heavily optimized program Published: 2025-08-27 | Origin: /r/programming The author is seeking advice on reducing the size of an ARM64 executable without lowering optimization levels due to performance constraints. They are already using techniques like Profile-Guided Optimization (PGO) and Inter-Procedural Call (IPC) to minimize executable size. They inquire about features such as machine outlining and machine splitting to further optimize size and whether these are enabled by default. The text details the author's findings from profiling tools like bloaty, which indicate that the text section is the largest part of |
|
Malicious versions of Nx and some supporting plugins were published Published: 2025-08-27 | Origin: /r/programming The document discusses a serious security incident involving malicious versions of the nx package and related plugins that were published to npm. These versions contained harmful code that could scan users' file systems, collect credentials, and upload them to GitHub under the users' accounts. The problematic versions were removed from npm at multiple times (10:44 PM EDT and 6:20 AM EDT). The vulnerability originated from an insecure workflow that allowed for the injection of executable code. Although the workflow was reverted shortly after the team |