id
int64
2
42.1M
by
large_stringlengths
2
15
time
timestamp[us]
title
large_stringlengths
0
198
text
large_stringlengths
0
27.4k
url
large_stringlengths
0
6.6k
score
int64
-1
6.02k
descendants
int64
-1
7.29k
kids
large list
deleted
large list
dead
bool
1 class
scraping_error
large_stringclasses
25 values
scraped_title
large_stringlengths
1
59.3k
scraped_published_at
large_stringlengths
4
66
scraped_byline
large_stringlengths
1
757
scraped_body
large_stringlengths
1
50k
scraped_at
timestamp[us]
scraped_language
large_stringclasses
58 values
split
large_stringclasses
1 value
42,055,130
melezhik
2024-11-05T21:01:54
Show HN: Go Pipelines with Raku Interfaces
null
https://github.com/melezhik/Sparrow6/blob/master/posts/Go_pipelines_with_Raku_interfaces.md
4
0
null
null
null
null
null
null
null
null
null
null
train
42,055,131
NN88
2024-11-05T21:02:05
Americans, your calls and texts can be monitored by Chinese spies
null
https://www.washingtonpost.com/opinions/2024/11/02/china-spying-telecom-trump-harris-fbi-cell-phone/
14
1
[ 42055283 ]
null
null
missing_parsing
Americans, your calls and texts can be monitored by Chinese spies
2024-11-02T10:00:13.465Z
Josh Rogin
Last week, the Chinese hacking and spying operation known as “Salt Typhoon” was revealed to have targeted former president Donald Trump and his running mate, Sen. JD Vance of Ohio, as well as staffers for Vice President Kamala Harris’s campaign and for Congress. The Post has reported that the hackers were able to collect audio and text messages from their targets in a wide-ranging espionage operation, which likely began several months ago.
2024-11-08T07:27:12
null
train
42,055,132
todsacerdoti
2024-11-05T21:02:10
ShareMyScreen – see how J experts write a program
null
https://code.jsoftware.com/wiki/ShareMyScreen
3
0
null
null
null
null
null
null
null
null
null
null
train
42,055,134
wglb
2024-11-05T21:02:21
Honeybee gene specifies collective behavior, research shows
null
https://phys.org/news/2024-11-honeybee-gene-behavior.html
2
0
null
null
null
null
null
null
null
null
null
null
train
42,055,141
null
2024-11-05T21:03:23
null
null
null
null
null
null
[ "true" ]
null
null
null
null
null
null
null
null
train
42,055,146
PaulHoule
2024-11-05T21:04:26
You could have invented denotational semantics
null
https://langdev.stackexchange.com/questions/2019/what-are-denotational-semantics-and-what-are-they-useful-for
1
0
null
null
null
no_error
What are denotational semantics, and what are they useful for?
null
kaya3kaya3 20.5k4343 silver badges123123 bronze badges
You could have invented denotational semantics! Suppose you want to know if some property about a program or a programming language holds. For example, you might wish to know whether a static analysis you’ve come up with provides a runtime guarantee. You could just write some tests to verify it empirically, but you can’t exhaustively test all possible cases, so this isn’t enough to say for certain there aren’t corner cases where it fails. The only way to be completely certain is to prove your property, and this necessarily means you are entering the realm of mathematical reasoning. Proofs can be done to varying degrees of formality, but even an informal proof requires some structured plan of attack. Broadly speaking, there are two routes you might take: You could choose to phrase your property entirely syntactically. You can define the syntax of your language and define syntactic rules (like typechecking judgments and reduction rules) for analyzing and transforming its terms. Then you can perform proofs about what invariants these syntactic manipulations preserve. One example of this technique is proving type soundness via progress and preservation. You can prove that it’s always possible to reduce a well-typed term until it reaches some value (progress) and that this reduction doesn’t change the expression’s type (preservation). These are mathematical statements about the language’s symbol-manipulation rules, but they refrain from assigning any particular meaning to the symbols. They just prove properties about what the typechecker and evaluator happen to do. This syntactic approach is known as operational semantics because the analysis is performed on a model of the language’s actual operational mechanisms: typechecking judgments correspond to a typechecker, and reduction rules correspond to an evaluator. A second approach would be to phrase your property semantically. You could say that numbers in your programming language mean (correspond to) mathematical numbers, and a lambda term means a mathematical function. That is, for each term in your language, you can map its syntax onto some mathematical concept that reflects its structure. An immediate advantage of doing this is that we already know lots of properties about mathematical structures. If your mapping from syntactic terms to mathematical objects is an adequate model for your language—that is, equivalences in your denotational model imply equivalences in an operational model and vice versa—you can now reason about your programs entirely in terms of the realm of mathematical objects! This lets you get away from worrying about nitty-gritty syntactic details that are otherwise uninteresting bookkeeping. For example, in purely a syntactic approach, (x + y) + z is a different term from x + (y + z), and you cannot simply treat them as interchangeable. However, if numbers in your language really do work just like mathematical numbers, then you can work in the language of mathematics, and the distinction ceases to exist. Since this approach chooses to interpret the syntactic terms of the programming language by giving them some mathematical meaning, or denotation, we call this approach denotational semantics. One way to think about denotational semantics is that it does some work up front to translate terms of a programming language into a domain-specific language for doing reasoning: mathematics. In this sense, it’s not entirely unlike the way a compiler desugars a source language into a simpler IR that is easier to work with. However, instead of simply mapping terms into a smaller, simpler grammar, we’re mapping them into a mathematical domain. A brief illustration Suppose we want to provide a denotational semantics for the following extremely simple arithmetic language: $$\begin{array}{rcl} \mathit{expr} \hskip{-10mu}&::=&\hskip{-10mu} \mathsf{zero}\\ &|&\hskip{-10mu} \mathsf{succ}(\mathit{expr})\\ &|&\hskip{-10mu} \mathsf{add}(\mathit{expr}, \mathit{expr})\\ &|&\hskip{-10mu} \mathsf{mul}(\mathit{expr}, \mathit{expr}) \end{array} $$ (Here, $\mathsf{succ}$ is the successor function.) First, we need to pick a mathematical domain to map these syntactic terms into. Since this language represents arithmetic on natural numbers, we’ll choose ℕ, the set of natural numbers, as our mathematical domain. Next, we need to actually define the mapping from syntactic terms to our domain. To do this, we traditionally use the notation $⟦x⟧$ to mean “the denotation of $x$”. (The $⟦\,⟧$ brackets themselves are usually called “double square brackets” or “white brackets”.) For our language, we could therefore define our semantics this way: $$\begin{aligned} ⟦\,\mathsf{zero}\,⟧ &:= 0 \\ ⟦\,\mathsf{succ}(x)\,⟧ &:= ⟦\,x\,⟧ + 1 \\ ⟦\,\mathsf{add}(x,y)\,⟧ &:= ⟦\,x\,⟧ + ⟦\,y\,⟧ \\ ⟦\,\mathsf{mul}(x,y)\,⟧ &:= ⟦\,x\,⟧ × ⟦\,y\,⟧ \end{aligned} $$ Assuming this is, in fact, an adequate model for our language, we can now prove things about programs by taking advantage of facts we already know about mathematics. For example, we can prove that $$ \mathsf{add}(x,y) ≡ \mathsf{add}(y,x) $$ via the argument $$\begin{aligned} ⟦\,\mathsf{add}(x,y)\,⟧ &= ⟦\,x\,⟧ + ⟦\,y\,⟧\\ &= ⟦\,y\,⟧ + ⟦\,x\,⟧ \\ &= ⟦\,\mathsf{add}(y,x)\,⟧ \end{aligned}$$ which uses the commutativity of addition on natural numbers. If we were to prove the same property using operational semantics, we’d need to make an inductive argument about the language’s evaluator, which would be significantly more involved! Denotational semantics of real programming languages is, of course, significantly more involved, but a full discussion is well outside the scope of this answer. However, the essential process is the same: select a domain, map each of the terms of your language onto that domain, and then write proofs that take advantage of the structure of the domain. The choice of domain For many languages, the interpretation of its terms may seem “obvious”. For example, it might seem like numbers in the programming language “ought” to be mapped onto mathematical numbers, and functions “ought” to be mapped onto mathematical functions. However, in practice, this is often not the most useful approach, for a few reasons: Programming language concepts often do not correspond precisely to the mathematical concepts we informally think of them as. For example, mathematical natural numbers satisfy the following property: $$ \forall\, n ∈ ℕ.\: n + 1 > 0 $$ However, fixed-size unsigned integers in programming languages do not! Therefore, natural numbers are not a semantically valid interpretation for fixed-size unsigned integers. Instead, the more complicated domain of integers modulo $2^n$ must be used. Some expressions in a programming language might not correspond to any value in the mathematical sense, such as exit(-1). In these cases, it may be useful to map expressions of this sort onto some token value in the target domain, often notated as $⊥$ or $↯$. Imperative features like mutable state require some additional structure to model mathematically. There are often many different ways to represent that structure, and which one is the most useful may depend on what properties you’re trying to prove. Capturing recursive functions or other potentially-unbounded structures can be mathematically challenging, so much so that we have an entirely separate question dedicated to it: How can we define a denotational semantics for recursive functions? In some cases, there may be structure in your language you explicitly don’t want to preserve. For example, there may be expressions that are distinguishable within your language, but they are interchangeable from the perspective of the property you’re trying to prove. Therefore, you may choose to map several different values in your source language onto the same object in your mathematical domain, which is a form of abstract interpretation. Sometimes, finding the most useful domain to interpret your syntax in is actually the hardest part of proving something using denotational semantics! Indeed, this reflects the idea that denotational semantics is about “getting into the right language” to be able to prove something.
2024-11-08T04:15:58
en
train
42,055,148
null
2024-11-05T21:04:48
null
null
null
null
null
null
[ "true" ]
null
null
null
null
null
null
null
null
train
42,055,150
null
2024-11-05T21:04:49
null
null
null
null
null
null
[ "true" ]
null
null
null
null
null
null
null
null
train
42,055,152
talyssonoc
2024-11-05T21:05:17
Welcome to the Worst Form
null
https://blog.codeminer42.com/welcome-to-the-worst-form-ever/
2
0
null
null
null
missing_parsing
Welcome to the worst form ever! How Cognitive Biases Can Ruin or Improve User Experience - The Miners
2024-11-05T16:52:31+00:00
Luiza Carvalho View all posts by Luiza Carvalho →
I am sure you have seen some bad forms around the internet. Sometimes the inputs are disabled at the wrong moment, sometimes the navigation is not very intuitive, and the buttons don’t work! But here, we’re not discussing those forms. I want to open your eyes to those perfectly functioning forms, where the inputs are beautiful, buttons work, and everything looks fine, but the user experience is bad despite the code working perfectly.As a web developer, I often receive requests to implement certain features, such as creating a form. However, if we dive into coding without careful consideration, we might produce a solution that works but isn’t the best fit for our application. That’s why it’s important to be mindful of cognitive biases.First of all, I will explain what a Cognitive Bias is, long story short it is a pattern of distortion of judgment in specific situations, a line of thought that can alter an individual’s decision-making on certain occasions. Those biases can help us implement better application behaviors to avoid a bad UX.This post could be a lecture about the concept of these biases, which isn’t the best way to link this subject with programming. So, to make this more intuitive, let’s illustrate how bad a form can be if we ignore those cognitive biases.Status QuoLike the first of Newton’s laws, a user will not (hardly will) change its decision unless a force acts on it. In the Status Quo cognitive bias, we tend to maintain the decisions already made for us.Warner Bros / Via youtu.beImagine building a form for your application with three checkbox multiple-choice fields. Still, only one is advantageous for you, but you chose to leave the first option in that list as checked by default. The most likely scenario is that the user won’t change the default selection, especially if the form is too long and tiring. The above scenario is not bad for the user, but it’s bad for the project’s owner, showing that sometimes planning how to build a good application is beyond the user experience.Ok, you got it! With a better option let’s check it by default. What if there was no difference between the options on that form? Any of them would be equally advantageous. This can lead to another poor decision a developer can make: Checking no option at all. This way, a time-consuming decision is completely in the user’s hands.In this case, leaving the user to choose freely isn’t the best decision. Part of a good UX is making the interaction between application and user fluid and as effortless as it can be. An easy way out of this is to use the most popular choice already checked to make the user’s life easier.Goal Gradient EffectImagine there is the need to collect a large amount of information in this application. In other words, a monumental form must be implemented. In our worst form ever of course we’re going to create a long page with one input after another, making it very boring to fill out. As a result, the chances of users abandoning this task are quite high.Well, you may be thinking that it is so bad that even the worst forms no longer follow this approach. Everybody knows the solution: Break this long task into smaller steps. Okay, that’s fair. With that in mind implement several form pages, each containing a limited number of inputs. Once the user completes a page, they can click a button to go to the next form page, and that’s it.Are you sure that’s all you can do? The problem seems solved, but something important is missing in this solution: Feedback.Not giving any feedback to the user on how much is left for him to finish the task makes us lose the benefits of the Goal Gradient Effect.In this bias, the motivation to finish a task increases as the user gets close to the finish line, making it easier to induce someone to fill a form to the end when it has clear feedback on its progress. I bet that adding that progress bar doesn’t seem so useless now.Loss AversionLosing something affects us more when we dedicate time and effort to it.Take, for example, a long, tedious, and confusing form. Users often leave it incomplete before finishing. Although there is a progress bar to track their completion, it may not be very effective in encouraging them to continue.To improve the user experience, we can develop a feature that saves progress, allowing users to fill out the form later. When they click the button to leave the form, a modal appears, reassuring them that their information won’t be lost. This sounds promising, right?The chances of the user simply forgetting about the form are massive, and even more, the delay in gathering all the data that the application needs is a big red flag here.The issue is not with the leave button; rather, it’s important to address the user’s fear of losing the time and effort spent filling out the form. To tackle this problem and prevent users from leaving before completing their task, we should modify the modal message and the form’s behavior.It must be explicitly communicated to the user that if they leave, their information will be lost. Additionally, the form should reset after this decision. This strategy will invoke Loss Aversion, where the fear of wasting time on the form outweighs the desire to leave that tedious task.Wrapping UpAs you can see, ignoring cognitive biases can lead us to well-functioning forms with significant UX challenges.To conclude, as web developers, we must go beyond simply writing code that works and take the time to consider how users think, behave, and make decisions. Whether it’s leveraging the Status Quo bias to pre-select user-friendly options, using the Goal Gradient Effect to motivate users with clear progress indicators, or invoking Loss Aversion to encourage task completion, understanding these psychological patterns can help us design forms that truly enhance the UX. We want to work with you. Check out our "What We Do" section!
2024-11-08T17:32:12
null
train
42,055,169
cachecrab
2024-11-05T21:07:30
Bredt's rule, a 100-year-old chemistry concept, proven false
null
https://www.earth.com/news/100-year-old-chemistry-rule-bredts-rule-proven-false-updating-textbooks-comes-next/
3
0
null
null
null
null
null
null
null
null
null
null
train
42,055,174
croes
2024-11-05T21:08:10
210d after Nintendo server shutdown last player signs off after console crashes
null
https://www.gamesradar.com/games/racing/210-days-after-nintendo-shut-down-the-3ds-and-wii-u-online-servers-the-last-connected-player-finally-signs-off-after-his-console-crashes-its-over/
2
0
null
null
null
null
null
null
null
null
null
null
train
42,055,175
wumeow
2024-11-05T21:08:20
null
null
null
5
null
null
null
true
null
null
null
null
null
null
null
train
42,055,199
mgh2
2024-11-05T21:11:42
Nvidia passes Apple as most valuable company
null
https://www.cnbc.com/2024/11/05/nvidia-passes-apple-as-worlds-most-valuable-company-.html
27
18
[ 42057058, 42056758, 42056444 ]
null
null
null
null
null
null
null
null
null
train
42,055,211
wglb
2024-11-05T21:13:04
Experiments show exact delivery of nanoparticles to lung via caveolae pumping
null
https://phys.org/news/2024-10-precise-delivery-nanoparticles-lung-caveolae.html
1
0
null
null
null
http_other_error
Just a moment...
null
null
Please complete security verificationThis request seems a bit unusual, so we need to confirm that you're human. Please press and hold the button until it turns completely green. Thank you for your cooperation!Press and hold the buttonIf you believe this is an error, please contact our support team.88.216.233.107 : 2e3c5bde-0f39-42ae-bca4-049afa37
2024-11-08T04:09:28
null
train
42,055,221
wglb
2024-11-05T21:14:18
Study shows bats have acoustic cognitive maps
null
https://phys.org/news/2024-10-echolocating-acoustic-cognitive.html
2
0
null
null
null
null
null
null
null
null
null
null
train
42,055,230
paulrobello
2024-11-05T21:15:00
null
null
null
1
null
[ 42055231 ]
null
true
null
null
null
null
null
null
null
train
42,055,235
sakedev
2024-11-05T21:15:31
null
null
null
1
null
null
null
true
null
null
null
null
null
null
null
train
42,055,242
mfiguiere
2024-11-05T21:16:22
Apple to Face First EU Fine Under Bloc's Digital Markets Act
null
https://www.bloomberg.com/news/articles/2024-11-05/apple-to-face-first-eu-fine-under-bloc-s-digital-markets-act
61
47
[ 42055806, 42057437, 42057266, 42056635, 42055681 ]
null
null
null
null
null
null
null
null
null
train
42,055,250
anigbrowl
2024-11-05T21:18:05
Musk to spend election night with Trump
null
https://www.nytimes.com/2024/11/05/us/politics/elon-musk-trump-election-night.html
9
0
null
null
null
null
null
null
null
null
null
null
train
42,055,259
c420
2024-11-05T21:19:11
Meta to let US national security agencies and defense contractors use Llama AI
null
https://www.theguardian.com/technology/2024/nov/05/meta-allows-national-security-defense-contractors-use-llama-ai
5
0
null
null
null
null
null
null
null
null
null
null
train
42,055,266
geox
2024-11-05T21:20:06
Observation tower functions like a massive sundial
null
https://newatlas.com/architecture/sun-tower-completed-open/
3
0
null
null
null
null
null
null
null
null
null
null
train
42,055,282
olayhabercomtr
2024-11-05T21:22:40
null
null
null
1
null
null
null
true
null
null
null
null
null
null
null
train
42,055,293
shalotelli
2024-11-05T21:24:27
Companies Review Job Applications: The ATS System and How You Can Beat It
null
https://www.resumaipro.com/blog/how-companies-review-job-applications-the-ats-system-and-how-you-can-beat-it
2
1
[ 42055294 ]
null
null
null
null
null
null
null
null
null
train
42,055,302
rohandualite231
2024-11-05T21:25:36
null
null
null
1
null
[ 42055303 ]
null
true
null
null
null
null
null
null
null
train
42,055,312
Jimmc414
2024-11-05T21:26:45
The US Navy Put Cameras on Dolphins and the Results Were Wild
null
https://www.sciencealert.com/the-us-navy-put-cameras-on-dolphins-and-the-results-were-wild
92
31
[ 42055910, 42055523, 42055816, 42055474, 42055996, 42055324, 42056371, 42056311 ]
null
null
no_error
The US Navy Put Cameras on Dolphins And The Results Were Wild
2024-11-05T11:00:23+00:00
Tessa Koumoundouros
A buzz of clicks and gleeful victory squeals compose the soundtrack in the first footage ever recorded from the perspective of dolphins freely hunting off the coast of North America. For a scientific study published in 2022, the US Navy strapped cameras to dolphins, which are trained to help identify undersea mines and protect some of America's nuclear stockpile, then gave them free rein to hunt in San Diego Bay. The clever marine mammals did not disappoint, offering up exciting chases and even targeting venomous sea snakes to the surprise of the researchers. For such popular, well-known animals, there are still so many basic things we don't yet know about these highly social and often gross cetaceans, like precisely how they typically feed. Researchers broadly know of at least two techniques: slurping up prey like noodles from a bowl, and ramming them down like a hot dog between rides at a state fair. But the footage revealed a whole lot more. The cameras, strapped to six bottlenose dolphins (Tursiops truncatus) from the US National Marine Mammal Foundation (NMMF), recorded six months of footage and audio – providing us with a new level of insight into these mammals' hunting strategies and communications. The recording equipment was placed on their backs or sides, displaying disturbingly odd angles of their eyes and mouths. While these dolphins aren't wild, they are provided with regular opportunities to hunt in the open ocean, complementing their usual diet of frozen fish. So it is likely these animals use similar methods to their wild brethren, as NMMF marine mammal veterinarian Sam Ridgway and colleagues explained in 2022. "As dolphins hunted, they clicked almost constantly at intervals of 20 to 50 milliseconds," they report in their paper. "On approaching prey, click intervals shorten into a terminal buzz and then a squeal. On contact with fish, buzzing and squealing was almost constant until after the fish was swallowed." frameborder="0″ allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen>The camera-strapped dolphins caught more than 200 fish, including bass, croakers, halibut, smelt and pipefish. The smelt often flung themselves into the air in desperate attempts to escape the skilful predators. But the dolphins tracked their every move, swimming upside down to give their swiveling eyes a clear view – a technique also observed previously in wild dolphins. "These dolphins appeared to use both sight and sound to find prey," Ridgway and colleagues explained. "At distance, the dolphins always used echolocation to find fish. Up close, vision and echolocation appeared to be used together." The cameras also recorded the sound of the animals' hearts as they pumped hard to keep up with the strenuous activities, and revealed that rather than ramming their victims down, the dolphins instead used suction to help gulp down their still struggling prey with impressively strong throat muscles. The dolphins mostly sucked fish in from the sides of their open mouths, throat muscles expanded and tongue withdrawn out of the way. The expanded inner mouth space helps create negative pressure that their sucking muscles add to.The camera set-up and dolphins in action. (Ridgway et al., PLOS ONE, 2022)While dolphins have been caught messing around with snakes before, including river dolphins playing with an absurdly large anaconda, the footage confirmed for the first time that they may also eat these reptiles too. One dolphin consumed eight highly venomous yellow-bellied sea snakes (Hydrophis platurus). "Our dolphin displayed no signs of illness after consuming the small snakes," the researchers explained, but they acknowledged this could also be unusual behavior since the dolphins are captive animals. "Perhaps the dolphin's lack of experience in feeding with dolphin groups in the wild led to the consumption of this outlier prey." The lead author of the study, Sam Ridgway, passed away at age 86, shortly before the study was published, leaving behind a rich legacy of research. "His creative approach to partnering with Navy dolphins to better understand the species' behavior, anatomy, health, sonar, and communication will continue to educate and inspire future scientists for generations," NMMF ethologist Brittany Jones told The Guardian. As for the Navy-trained dolphins, they "work in open water almost every day", NMMF explains on their website. "They can swim away if they choose, and over the years a few have. But almost all stay." This research was published in PLOS ONE.An earlier version of this article was published in August 2022.
2024-11-08T12:21:45
en
train
42,055,332
mooreds
2024-11-05T21:29:19
When should I use String vs. andstr?
null
https://steveklabnik.com/writing/when-should-i-use-string-vs-str/
1
0
null
null
null
null
null
null
null
null
null
null
train
42,055,384
n1b0m
2024-11-05T21:36:06
First wooden satellite launched into space
null
https://www.theguardian.com/science/2024/nov/05/worlds-first-wooden-satellite-launched-into-space
2
1
[ 42055542 ]
null
null
null
null
null
null
null
null
null
train
42,055,421
handfuloflight
2024-11-05T21:41:22
Cofounder
null
https://github.com/raidendotai/cofounder
2
0
null
null
null
no_error
GitHub - raidendotai/cofounder: ai-generated apps , full stack + generative UI
null
raidendotai
Cofounder | Early alpha release project - cofounder.openinterface.ai 👋 @n_raidenai cofounder full stack generative web apps ; backend + db + stateful web apps gen ui rooted in app architecture, with ai-guided mockup designer & modular design systems Early Alpha : Unstable The following points are very emphasized : This is an EARLY, UNSTABLE, PREVIEW RELEASE of the project. ⚠️ Until v1 is released, it is expected to break often. It consumes a lot of tokens. If you are on a tokens budget, wait until v1 is released. Again, this is an early, unstable release. A first test run. An early preview of the project's ideas. Far from completion. Open-source iterative development. Work in progress. Unstable early alpha release. [etc] If any of these might be issues for you, even in the slightest way, wait until v1 is released ! cofounder_project_demo.mp4 cofounder_dashboard_demo.mp4 Important Early alpha release ; earlier than expected by 5/6 weeks Still not merged with key target features of the project, notably : project iteration modules for all dimensions of generated projects admin interface for event streams and (deeper) project iterations integrate the full genUI plugin : generative design systems deploy finetuned models & serve from api.cofounder local, browser-based dev env for the entire project scope add { react-native , flutter , other web frameworks } validations & swarm code review and autofix code optimization [...] be patient :) Usage Install & Init Open your terminal and run npx @openinterface/cofounder Follow the instructions. The installer will ask you for your keys setup dirs & start installs will start the local cofounder/api builder and server will open the web dashboard where you can create new projects (at http://localhost:4200 ) 🎉 note : you will be asked for a cofounder.openinterface.ai key it is recommended to use one as it enables the designer/layoutv1 and swarm/external-apis features and can be used without limits during the current early alpha period the full index will be available for local download on v1 release currently using node v22 for the whole project. # alternatively, you can make a new project without going through the dashboard # by runing : npx @openinterface/cofounder -p "YourAppProjectName" -d "describe your app here" -a "(optional) design instructions" Run Generated Apps Your backend & vite+react web app will incrementally generate inside ./apps/{YourApp} Open your terminal in ./apps/{YourApp} and run It will start both the backend and vite+react, concurrently, after installing their dependencies Go to http://localhost:5173/ to open the web app 🎉 From within the generated apps , you can use ⌘+K / Ctrl+K to iterate on UI components [more details later] Notes Dashboard & Local API If you resume later and would like to iterate on your generated apps, the local ./cofounder/api server needs to be running to receive queries You can (re)start the local cofounder API running the following command from ./cofounder/api The dashboard will open in http://localhost:4200 note: You can also generate new apps from the same env, without the the dashboard, by running, from ./cofounder/api, one of these commands npm run start -- -p "ProjectName" -f "some app description" -a "minimalist and spacious , light theme" npm run start -- -p "ProjectName" -f "./example_description.txt" -a "minimalist and spacious , light theme" Concurrency [the architecture will be further detailed and documented later] Every "node" in the cofounder architecture has a defined configuration under ./cofounder/api/system/structure/nodes/{category}/{name}.yaml to handle things like concurrency, retries and limits per time interval For example, if you want multiple LLM generations to run in parallel (when possible - sequences and parallels are defined in DAGS under ./cofounder/api/system/structure/sequences/{definition}.yaml ), go to #./cofounder/api/system/structure/nodes/op/llm.yaml nodes: op:LLM::GEN: desc: "..." in: [model, messages, preparser, parser, query, stream] out: [generated, usage] queue: concurrency: 1 # <------------------------------- here op:LLM::VECTORIZE: desc: "{texts} -> {vectors}" in: [texts] out: [vectors, usage] mapreduce: true op:LLM::VECTORIZE:CHUNK: desc: "{texts} -> {vectors}" in: [texts] out: [vectors, usage] queue: concurrency: 50 and change the op:LLM::GEN parameter concurrency to a higher value The default LLM concurrency is set to 2 so you can see what's happening in your console streams step by step - but you can increment it depending on your api keys limits Docs, Design Systems, ... [WIP] Architecture [more details later] archi/v1 is as follows : Credits Demo design systems built using Figma renders / UI kits from: blocks.pm by Hexa Plugin (see cofounder/api/system/presets) google material figma core shadcn Dashboard node-based ui powered by react flow
2024-11-08T14:22:43
en
train
42,055,427
fanf2
2024-11-05T21:42:02
What your web framework never told you about SQL injection protection
null
https://tech.codeyellow.nl/blog/identifier-sqli/
2
0
null
null
null
null
null
null
null
null
null
null
train
42,055,430
throwaway2562
2024-11-05T21:42:53
null
null
null
4
null
[ 42055540 ]
null
true
null
null
null
null
null
null
null
train
42,055,434
stuartmemo
2024-11-05T21:43:13
We've increased pricing for Claude Haiku to reflect its increase in intelligence
null
https://twitter.com/AnthropicAI/status/1853498270724542658
2
1
[ 42055533 ]
null
null
null
null
null
null
null
null
null
train
42,055,456
rbanffy
2024-11-05T21:46:01
Django Girls Blog – It's our 10th birthday
null
https://blog.djangogirls.org/post/764500535249436672/its-our-10th-birthday
2
0
null
null
null
no_error
It's our 10th birthday!
2024-10-16T13:15:25+00:00
null
Django Girls has turned 10!  We’re so proud to reach this momentous milestone, and of everything the community has achieved!During the past decade, 2467 volunteers in 109 countries have run 1137 free workshops.  More than 24500 women in 593 cities have attended our events and, for many of them, Django Girls was their first step towards a career in tech.See them on a map.How it startedOla Sitarska and Ola Sendecka founded Django Girls.  It all began with a single workshop in Berlin in 2014, and a tutorial written by Ola and Ola.  It was (and still is) aimed at complete beginners who have never written any code in their life.  45 women attended the first event, to learn how to build the Internet using HTML, CSS, Python and Django.  Between them, they deployed 40 brand-new apps and opened 30 pull requests against the tutorial.Within a year, more than 70 Django Girls workshops had been held in 34 countries on six continents.  To support the huge growth, Ola and Ola then obtained charitable status for the Django Girls Foundation, and ran the organisation for another four years.Listen to Ola and Ola go down memory lane on the Django Girls podcast.How it’s goingToday, Django Girls is still thriving, and we currently have 20 workshops, and counting, in the pipeline.  There is always room for more!  Visit our website to find out how to organise a workshop, or coach at one.  84.9% of respondents to our 10th birthday survey said organising or coaching at our workshops deepened their understanding of Django.We also caught up with some of our past attendees.  After coming to one of our events, 71.2% continued learning to code and 44.7% started working in tech.  Here are some of their Django Girls stories…“I was a stay at home mom.  I was learning how to code and had a great experience at the Django Girls workshop.  After completing training with an intensive bootcamp, I came back to the workshop as a coach.  I am now a data engineer at Xbox.”- a workshop attendee in 2016 who was also a workshop coach in 2017“After Django Girls, I improved my grades and graduated.  Then I got a job.  After completing the senior software engineering position, I was promoted to team leader.  That’s how Django Girls motivated me so much.”- a 2016 workshop organiser“I started working in tech after attending a Django Girls workshop.  I am a software engineer in the space industry.  When I discovered Django Girls, I was close to the end of my studies in Geomatics engineering and was expecting to start working as a Surveying Engineer or pursue further studies in that field of engineering. The openness and supportive atmosphere of the first Django Girls workshop I attended made me consider tech as an alternative, as I was getting more and more interested in programming. I transitioned to tech after that event and I have been working in this field since then.”- a 2017 workshop attendee“I started learning web development and that launched my tech journey.” - workshop attendee in 2016, workshop coach in 2018“I previously worked in the hospitality industry, as a bartender.  I am now a software engineer!”- a 2017 workshop attendeeHow you can get involvedAttend or coach at a workshop - see the list of forthcoming workshopsApply to organise a workshop in your cityBuy your exclusive “1010 Years Of Django Girls” t-shirtMake a donation
2024-11-08T08:40:04
en
train
42,055,461
zdw
2024-11-05T21:46:17
The Argonaut Octopus Has Mastered the Free Ride
null
https://defector.com/the-argonaut-octopus-has-mastered-the-free-ride
2
0
null
null
null
null
null
null
null
null
null
null
train
42,055,472
zdw
2024-11-05T21:48:31
A rough equivalent to "return to last power state" for libvirt virtual machines
null
https://utcc.utoronto.ca/~cks/space/blog/linux/LibvirtVMsReturnToLastState
1
0
null
null
null
null
null
null
null
null
null
null
train
42,055,475
janandonly
2024-11-05T21:48:37
What are the best private browsers in 2024?
null
https://privacytests.org/
2
0
null
null
null
body_too_long
null
null
null
null
2024-11-08T21:05:02
null
train
42,055,485
zdw
2024-11-05T21:50:08
RFC 9669: BPF Instruction Set Architecture (ISA)
null
https://www.rfc-editor.org/rfc/rfc9669.html
5
0
null
null
null
null
null
null
null
null
null
null
train
42,055,491
mikeckennedy
2024-11-05T21:50:48
null
null
null
1
null
[ 42055492 ]
null
true
null
null
null
null
null
null
null
train
42,055,498
handfuloflight
2024-11-05T21:51:26
Cline
null
https://github.com/cline/cline
2
0
null
null
null
null
null
null
null
null
null
null
train
42,055,502
zdw
2024-11-05T21:51:35
Toward a Practical Perceptual Video Quality Metric
null
https://netflixtechblog.com/toward-a-practical-perceptual-video-quality-metric-653f208b9652
2
0
null
null
null
null
null
null
null
null
null
null
train
42,055,503
nfriedly
2024-11-05T21:51:50
Success in the DMCA Triennial
null
https://sfconservancy.org/news/2024/oct/31/success-in-2024-dmca-exemptions/
2
2
[ 42055717, 42055517 ]
null
null
null
null
null
null
null
null
null
train
42,055,510
PaulHoule
2024-11-05T21:52:44
Revealing the superconducting limit of twisted bilayer graphene
null
https://phys.org/news/2024-11-revealing-superconducting-limit-bilayer-graphene.html
6
0
null
null
null
null
null
null
null
null
null
null
train
42,055,543
null
2024-11-05T21:57:58
null
null
null
null
null
null
[ "true" ]
true
null
null
null
null
null
null
null
train
42,055,555
ctoth
2024-11-05T21:59:51
We should start worrying about bird flu
null
https://www.washingtonpost.com/opinions/2024/11/05/bird-flu-human-cases-cdc/
7
1
[ 42055591 ]
null
null
null
null
null
null
null
null
null
train
42,055,556
w3ll_w3ll_w3ll
2024-11-05T22:00:05
The Eternal Mainframe (2013)
null
https://www.winestockwebdesign.com/Essays/Eternal_Mainframe.html
71
12
[ 42056842, 42059677, 42061861, 42056148 ]
null
null
Failed after 3 attempts. Last error: Quota exceeded for quota metric 'Generate Content API requests per minute' and limit 'GenerateContent request limit per minute for a region' of service 'generativelanguage.googleapis.com' for consumer 'project_number:854396441450'.
The Eternal Mainframe
null
Rudolf Winestock - [email protected]
“Revolution” has many definitions. From the looks of this, I'd say “going around in circles” comes closest to applying... -Richard M. Hartman A funny thing happened on the way to the future. The mainframe outlasted its replacements. Minicomputers Minicomputers were supposed to kill the mainframe. They are gone. Digital Equipment Corporation and Data General are dead. The last minicomputers were IBM's AS/400 line, renamed to System i, then merged with the Power Systems. IBM's victory over the minicomputer is so total that people seldom even use the word “minicomputer,” anymore. Nowadays, the preferred word is “midrange computer,” a term coined by the mainframe maker, IBM. Microcomputers Microcomputers were supposed to kill the mainframe. They came close in the 1990s (Stewart Alsop famously predicted that the last mainframe would be shut down in 1996) but they, too, failed. Instead, microcomputers are being superseded by tablets and smartphones. Of course, we don't call them microcomputers, anymore. We call them personal computers; a term coined by the mainframe maker, IBM. Workstations The microcomputer's bigger cousin, the workstation, fared even worse. Apollo, Symbolics, and LMI are dead. Xerox and Texas Instruments gave up. Sun got bought. SGI isn't what it used to be. The importance of the present Xeon- and Opteron-based workstation market does not compare to what the workstation market was in the 1990s. Ironically, one of the last of the “classic” workstations, the RS/6000, was, like the AS/400, renamed and then assimilated into the Power Systems line of the mainframe maker, IBM. An Objection Someone may counter the above by pointing to servers. Take a pile of PCs and adapt them for serving files, or a network connection, or any other service. Hook them up together and the result is competitive with a mainframe. Does that disprove my thesis? No. Look at the result. Before looking at the result, look at the etymology of the word “mainframe.” In the stone age of computing, computers were made up of refrigerator-sized modules housing the vacuum tubes. Those modules were attached to steel frames holding them up off of the floor in order to fit the cabling and to better enable maintenance. The frame holding the central processing module was the “main” frame. Nowadays, we speak of “racks” instead of steel frames. The Result The result is that the modern server farm looks like those first computer rooms. Row after row of metal frames (excuse me—racks) bearing computer modules in a room that's packed with cables and extra ventilation ducts. Just like mainframes. Server farms have multiple redundant CPUs, memory, disks, and network connections. Just like mainframes. The rooms that house these server farms are typically not open even to many people in the same organization, but only to dedicated operations teams. Just like mainframes. In short, not only do server farms physically resemble mainframes, and perform many of the same functions as mainframes; operationally, they are treated in much the same way as mainframes. Server farms have Greenspunned mainframes. This is the Wheel of Reincarnation in its biggest possible cycle. The movement to replace the mainframe has re-invented the mainframe. The Return of Time-Sharing Thanks to open standards, servers can be made from commodity components, lowering the barrier to entry into this pseudo-mainframe market. In fact, any company that has built large server farms for their own purposes could sell spare crunch to others. Think of it! Companies like Microsoft, Amazon, and Google could handle the computer janitor end of the job, leaving the core part of development and deployment to interested customers. Wait a minute. They already do. The Internet and web applications have been enablers for these server farms, for these mainracks, if you will. People use these web apps on smartphones, on notebooks, on tablets, and on the fading desktop. The client paints pixels while the server farm — the mainrack — does the backend work. More than a dozen iterations of Moore's Law later, and the Wheel of Reincarnation has returned us to terminals connected to Big Iron. And there's the rub. The movement to replace the mainframe has re-invented not only the mainframe, but also the reason why people wanted to get rid of mainframes in the first place. Fight the Man! Histories of the early days of the IT industry are a digital version of Whig history. Only large institutions could afford computers. Access was strictly limited; none but a select priesthood could enter the machine room. Those without privilege were excluded. Users had to surrender their punch cards and wait patiently for the output to be returned only to find out, three days later, that a bug had made the output useless. But thanks to progress and the struggle for software freedom, we are all empowered to use computers to organize and share with our communities and warglgarglthbtbtbtbtbt All Hail the Narrative! Ever notice how often writers use the word “priesthood” to describe the operations teams in charge of mainframes? Neither the Spanish, nor the Roman, nor any other national or ecclesiastical Inquisition was anywhere in sight of the development of mainframes, yet people keep resurrecting anti-clerical tropes from the Black Legends in order to impugn them. For example, in Accidental Empires, Robert X. Cringely described IBM's PS/2 line as an attempt to make the computer industry “return to Holy Mother Church.” Anyway. The point is that people moved away from mainframes because they wanted to be free. They didn't want to be shackled by IBM's by-the-minute CPU charges and other restrictions. They didn't want their destiny altered by anything other than their own free choices. So the revolutionary vanguard moved to minicomputers. Then they moved to workstations. When Linux was ready, they moved to the PC. When Eternal September began, the revolutionary vanguard fought Microsoft FUD and did an end run around the Microsoft Monopoly. And here we are. All of that computing power and free software is — quite literally — in the hands of The People™. And, by their own free choices, we find ourselves back — in Robert X. Cringely's words — in the arms of Holy Mother Church. Freedom Has Failed Users love the web apps coded by rebellious hackers who'd never have fit in during the Stone Age of computing. Without any compulsion, those users volunteered their data to web apps running on mainracks that are owned — in all senses of that word — by publicly-traded companies. Those companies must meet investor targets set by the kind of Wall Street analysts who light votive candles in front of first-edition copies of Liar's Poker. Others have pointed out the potential for abuse in having one's private data locked into such platforms. Demanding the ability to export our data and permanently delete our accounts wouldn't help even if we could do it. The data is most valuable when it is in the mainrack. Your Facebook data isn't nearly as useful without the ability to post to the pages of your friends. Your Google Docs files aren't as useful without the ability to collaborate with others. Dynamic state matters; it's the whole point of having computers because it allows automation and communication. This is why “free” and open source software (FOSS) will not help us. A software license touches on the software, not on the human relationships which the software mediates. It is those relationships that lock us into positions where Zuckerberg's foot is on our necks. In fact, it's FOSS that has enabled the web companies to bootstrap their start-ups so quickly and cheaply. It's FOSS that gave those web companies the flexibility to insinuate themselves as gatekeepers over our personal data. The open standards that liberated the personal computer from IBM have enabled the new web companies to cheaply build their own mainframe substitutes — the mainracks. Like their mid-century ancestors, they are large, centralized, and contain personal data at the mercy of organizations that only answer to shareholders and government bureaucrats. Open standards and open source were supposed to liberate us from authority and the need for authority. Instead, they have made it attractive for millions of people to fall over themselves to make the prodigal son's return back to Holy Mother Church. Meet the New Boss; Worse Than the Old Boss You either die a hero or live long enough to see yourself become the villain. -The Dark Knight, Frank Miller We can beg and plead to have those companies respect our privacy, but they need money to run those mainracks. They need money to pay themselves enough to justify those 100+ hours per week. More pressing than that, they need money to satisfy the investors in search of the hundred-bagger. Pleading will not help because the interests of those companies and their users are misaligned. One reason why they are misaligned is because one side has all of the crunch; terabytes of data, sitting in the servers, begging to be monetized. Rather than giving idealistic hackers the means to liberate the users from authority, the democratization of computing has only made it easier for idealistic hackers to get into this conflict of interest. That means that more of them will actually do so and in more than one company. You see, in the past, the computer industry was dominated by single corporations; first IBM, then Microsoft. Being lone entities, their dominance invited opposition. Anti-trust suits of varying (lack of) effectiveness were filed against them. In the present, we don't even have that thin reed. Thanks to progress, we now have an entire social class of people who have an incentive to be rent-seekers sitting on our data. Being members of the same social class, they will have interests in common, whatever their rivalries. Those common interests will lead to cooperation in matters that conflict with the interests of their users. For example, the Cyber Intelligence Sharing and Protection Act (CISPA) is backed by Microsoft, Facebook, Yahoo, and, yes, Google, too. Never forget that this social class is made up of computer nerds who spent their adolescence griping about Micro$oft. The computer nerds at the latter, in their time, laughed at the suits at IBM. This is progress. The Microsoft Tax was paid in ordinary money. Google and Facebook levy their rent in a different coin: your privacy. The Inevitability of the Mainframe The step after ubiquity is invisibility. -Al Mandel The microcomputer revolution is over. Home computers are not unusual, anymore; the novelty is gone. Furthermore, even many professionals do not enjoy playing the part of computer janitor on their home rigs, to say nothing of grandma. Aside from games, the demoscene, and other creative coding pursuits, computers are a means to an end; they are tools. Most people have greater interest in the goal than the route to the goal. Therefore, it makes sense from both an economic and user experience perspective to delegate the boring parts of computing whenever practical. The fact that minicomputers, microcomputers, and workstations were ever successful indicates that the computer and telecommunications industries were still immature. It may also indicate that Big Blue and the Death Star were price gouging, but that's another story. This outcome was foreseen more than half a century ago. Multics is the best-known example of computing as a service but the concept goes back almost a decade earlier. John McCarthy, of Lisp fame, predicted in 1961: If computers of the kind I have advocated become the computers of the future, then computing may someday be organized as a public utility just as the telephone system is a public utility… The computer utility could become the basis of a new and important industry. -Architects of the Information Society, Garfinkel & Abelson Ultimately, there are only two natural kinds of computers: embedded systems and mainframes. I'm not using the word “natural” in the modern sense (viz., “that which is observed to occur”) but in the ancient and medieval sense. In other words, those ways are congruent with the definition of computers and of computation. Those ways are most fitting with the typical uses of computers. By extending the capabilities of computers to their technological and logical limits, we get computers controlling mundane gadgets and doing major calculations. Good user experience demands that the computer interface should get out of the way, that it be invisible. Thus, it makes sense to present only as much computing power as the user needs. The mainframe is the eternal computing platform. The Endgame Janie Crane: “An off switch?” Metrocop: “She'll get years for that. Off switches are illegal!” -Max Headroom, season 1, episode 6, “The Blanks” The desktop computer won't completely disappear. Instead, the outward form of the personal computer will be retained, but the function — and the design — will change to a terminal connected to the cloud (which is another word for server farm, which is another word for mainrack, which converges on mainframes, as previously prophesied). True standalone personal computers may return to their roots: toys for hobbyists. Those who continue to do significant work offline will become the exception; meaning they will be an electoral minority. With so much effort being put into web apps, they may even be seen as eccentrics; meaning there may not be much sympathy for their needs in the halls of power. So much personal data in the hands of a small number of corporations presents a tempting target for governments. We've seen many pieces of legislation meant to facilitate cooperation between Big Business and Big Government for the sake of user surveillance. Some of this legislation has even been defeated. We will see more. Where legislation fails, we will see court precedents. Where the courts fail, we will see treaties. When all of those fail, the bureaucrats will hand down new sets of rules by fiat. Big Business will be on their side; whether as masters, lessers, or partners does not make much difference. Offline computer use frustrates the march of progress. If offline use becomes uncommon, then the great and the good will ask: “What are you hiding? Are you making kiddie porn? Laundering money? Spreading hate? Do you want the terrorists to win?” What Must be Done If only there were evil people somewhere insidiously committing evil deeds and it were necessary only to separate them from the rest of us and destroy them. But the line dividing good and evil cuts through the heart of every human being. And who is willing to destroy a piece of his own heart? -Alexander Solzhenitsyn We must establish as many precedents as we can to preserve the right to buy, build, use, sell, donate, and keep fully functional, general purpose, standalone computers. Plenty of activists are already doing that. This is good. What I have not heard those activists say — what I advise — is that we should second-guess ourselves as well as our masters. The point of this essay is that it's not only advancing technology that has recreated the mainframe and the abuses to which it is prone; the very desire for absolute freedom has done its part, as well. The good intentions of our fellow nerds who promised to not be evil has brought us to this. This is not a fight between Good Guys and Bad Guys. This is a balancing act. Some rule; others are ruled. This is a harsh truth. We can't change that. We can soften the edges. This will require a conversation to which we must invite philosophers, ethicists, theologians; people who have thought deeply on what it takes to make a just society. Otherwise, we will — yet again — find ourselves back where we started. Die Revolution ist wie Saturn, sie frißt ihre eignen Kinder. The Revolution is like Saturn, it eats its own children. -Danton's DeathAct I, Georg Büchner
2024-11-08T00:38:16
null
train
42,055,557
bookofjoe
2024-11-05T22:00:15
Firewall Vendor's 5-Year War with Chinese Hackers Hijacking Its Devices
null
https://www.wired.com/story/sophos-chengdu-china-five-year-hacker-war/
3
1
[ 42055561 ]
null
null
missing_parsing
Inside Sophos' 5-Year War With the Chinese Hackers Hijacking Its Devices
2024-10-31T08:45:00.000-04:00
Andy Greenberg
For years, it's been an inconvenient truth within the cybersecurity industry that the network security devices sold to protect customers from spies and cybercriminals are, themselves, often the machines those intruders hack to gain access to their targets. Again and again, vulnerabilities in “perimeter” devices like firewalls and VPN appliances have become footholds for sophisticated hackers trying to break into the very systems those appliances were designed to safeguard.Now one cybersecurity vendor is revealing how intensely—and for how long—it has battled with one group of hackers that have sought to exploit its products to their own advantage. For more than five years, the UK cybersecurity firm Sophos engaged in a cat-and-mouse game with one loosely connected team of adversaries who targeted its firewalls. The company went so far as to track down and monitor the specific devices on which the hackers were testing their intrusion techniques, surveil the hackers at work, and ultimately trace that focused, years-long exploitation effort to a single network of vulnerability researchers in Chengdu, China.On Thursday, Sophos chronicled that half-decade-long war with those Chinese hackers in a report that details its escalating tit-for-tat. The company went as far as discreetly installing its own “implants” on the Chinese hackers' Sophos devices to monitor and preempt their attempts at exploiting its firewalls. Sophos researchers even eventually obtained from the hackers' test machines a specimen of “bootkit” malware designed to hide undetectably in the firewalls' low-level code used to boot up the devices, a trick that has never been seen in the wild.In the process, Sophos analysts identified a series of hacking campaigns that had started with indiscriminate mass exploitation of its products but eventually became more stealthy and targeted, hitting nuclear energy suppliers and regulators, military targets including a military hospital, telecoms, government and intelligence agencies, and the airport of one national capital. While most of the targets—which Sophos declined to identify in greater detail—were in South and Southeast Asia, a smaller number were in Europe, the Middle East, and the United States.Sophos' report ties those multiple hacking campaigns—with varying levels of confidence—to Chinese state-sponsored hacking groups including those known as APT41, APT31, and Volt Typhoon, the latter of which is a particularly aggressive team that has sought the ability to disrupt critical infrastructure in the US, including power grids. But the common thread throughout those efforts to hack Sophos' devices, the company says, is not one of those previously identified hackers groups but instead a broader network of researchers that appears to have developed hacking techniques and supplied them to the Chinese government. Sophos' analysts tie that exploit development to an academic institute and a contractor, both around Chengdu: Sichuan Silence Information Technology—a firm previously tied by Meta to Chinese state-run disinformation efforts—and the University of Electronic Science and Technology of China.Sophos says it’s telling that story now not just to share a glimpse of China's pipeline of hacking research and development, but also to break the cybersecurity industry's awkward silence around the larger issue of vulnerabilities in security appliances serving as entry points for hackers. In just the past year, for instance, flaws in security products from other vendors including Ivanti, Fortinet, Cisco, and Palo Alto have all been exploited in mass hacking or targeted intrusion campaigns. “This is becoming a bit of an open secret. People understand this is happening, but unfortunately everyone is zip,” says Sophos chief information security officer Ross McKerchar, miming pulling a zipper across his lips. “We're taking a different approach, trying to be very transparent, to address this head-on and meet our adversary on the battlefield.”From One Hacked Display to Waves of Mass IntrusionAs Sophos tells it, the company's long-running battle with the Chinese hackers began in 2018 with a breach of Sophos itself. The company discovered a malware infection on a computer running a display screen in the Ahmedabad office of its India-based subsidiary Cyberoam. The malware had gotten Sophos' attention due to its noisy scanning of the network. But when the company's analysts looked more closely, they found that the hackers behind it had already compromised other machines on the Cyberoam network with a more sophisticated rootkit they identified as CloudSnooper. In retrospect, the company believes that initial intrusion was designed to gain intelligence about Sophos products that would enable follow-on attacks on its customers.Then in the spring of 2020, Sophos began to learn about a broad campaign of indiscriminate infections of tens of thousands of firewalls around the world in an apparent attempt to install a trojan called Asnarök and create what it calls “operational relay boxes” or ORBs—essentially a botnet of compromised machines the hackers could use as launching points for other operations. The campaign was surprisingly well resourced, exploiting multiple zero-day vulnerabilities the hackers appeared to have discovered in Sophos appliances. Only a bug in the malware's cleanup attempts on a small fraction of the affected machines allowed Sophos to analyze the intrusions and begin to study the hackers targeting its products.
2024-11-08T20:27:26
null
train
42,055,558
zdw
2024-11-05T22:00:19
Tracking down a mysterious skateboarder from 1979
null
https://www.ncrabbithole.com/p/tony-hawk-fayetteville-nc-girl-skateboarder-1979
182
35
[ 42055666, 42055854, 42055673, 42055849, 42055875, 42055676 ]
null
null
null
null
null
null
null
null
null
train
42,055,560
scarface_74
2024-11-05T22:00:37
What if cities legalized adult dorms?
null
https://www.vox.com/housing/378928/housing-affordable-sro-apartments-office-conversions-homeless-microunits-coliving-rent-tenant
2
4
[ 42056716, 42056547, 42055821 ]
null
null
null
null
null
null
null
null
null
train
42,055,566
blacksolvent
2024-11-05T22:01:28
null
null
null
1
null
[ 42055567 ]
null
true
null
null
null
null
null
null
null
train
42,055,570
defly
2024-11-05T22:01:40
Which Elections Results Page Fastest?
null
https://lightest.app/c/L-CruXAwkO
1
2
[ 42055633 ]
null
null
null
null
null
null
null
null
null
train
42,055,573
zdw
2024-11-05T22:02:05
First wooden satellite, developed in Japan, heads to space
null
https://www.cnn.com/2024/11/05/style/japan-wooden-satellite-hnk-intl/index.html
1
1
[ 42055646 ]
null
null
null
null
null
null
null
null
null
train
42,055,587
lux
2024-11-05T22:03:54
null
null
null
1
null
null
null
true
null
null
null
null
null
null
null
train
42,055,598
matek075
2024-11-05T22:05:21
null
null
null
1
null
null
null
true
null
null
null
null
null
null
null
train
42,055,616
skidrow
2024-11-05T22:08:24
What Shapes Do Matrix Multiplications Like?
null
https://www.thonking.ai/p/what-shapes-do-matrix-multiplications
153
10
[ 42060156, 42057240, 42058824 ]
null
null
null
null
null
null
null
null
null
train
42,055,617
bentocorp
2024-11-05T22:08:41
Amazon CEO denies full in-office mandate is 'backdoor layoff'
null
https://www.reuters.com/technology/amazon-ceo-denies-full-in-office-mandate-is-backdoor-layoff-2024-11-05/
12
10
[ 42056856, 42056130, 42055989, 42055964, 42055928, 42056239 ]
null
null
null
null
null
null
null
null
null
train
42,055,618
jnord
2024-11-05T22:08:47
27.6% of the Top 10 Million Sites Are Dead
null
https://medium.com/@tonywangcn/27-6-of-the-top-10-million-sites-are-dead-6bc7805efa85
5
0
[ 42055675 ]
null
null
null
null
null
null
null
null
null
train
42,055,622
flyingsky
2024-11-05T22:09:15
Show HN: Im Building LimeJourney-Yet Another Open Source Customer.io Alternative
Hello HN - I’m Tobi and I am building LimeJourney. LimeJourney is an open source customer engagement platform, a Customer.io &#x2F;braze etc alternative.<p>- For the past few weeks I have been hacking on LimeJourney during my free time and I’m inviting you to check it out and give your feedback. You can try out the demo with email and password [email protected]&#x2F;[email protected]<p>- My Grand thesis for building LimeJourney is that the channels through which we currently receive notifications will not be changing anytime soon but with the increase in data - now more than ever - businesses that will catch the attention of customers are the ones who in some shape or form are intelligently sending notifications(possibly with AI).<p>- LimeJourney in its current form is very far off from what I hope for it to be but still solves a couple of issues I experienced when working on another project. LimeJourney is relatively cheap($50) - single base plan compared to the other big guys in the market(&gt;$100). It is also open source and I’lld love to see folks who are able to, adopt and self host limeJourney. LimeJourney aims to play real nice with whatever you current email sending stack is and we already have integrations with Resend, AWS and are building more.<p>The codebase is on Github =&gt; <a href="https:&#x2F;&#x2F;github.com&#x2F;LimeJourney&#x2F;limeJourney">https:&#x2F;&#x2F;github.com&#x2F;LimeJourney&#x2F;limeJourney</a><p>Thank you for checking this out. You can reach me at [email protected]
https://www.limejourney.com/
1
0
null
null
null
no_error
Say The Right Thing,At The Right Time
null
null
Your customers are waiting to hear from you — LimeJourney is a customer engagement platform that intelligently delivers notifications, nudging your users at the perfect moment. Built for marketing teams, loved by developersModern teams of all sizes use LimeJourney to talk to their customers:TealTev AISplit TechnolgiesSee LimeJourney in ActionWatch our product demo to discover how LimeJourney can revolutionize your marketing strategy.Target Smarter. Connect Deeper. Convert Quicker.Audience SegmentationTarget With PrecisionLimeJourney allows you to segment your audience based on their preferences, behavior, and other criteria. This helps you to deliver more relevant content and offers to the right people at the right time.Create custom segments based on user behaviorTarget specific groups with personalized contentAnalyze and improve your campaigns with dataVisual Workflow BuilderDesign Your Customer JourneyCreate complex, multi-step customer journeys with our intuitive drag-and-drop interface. Visualize your entire marketing funnel and optimize each touchpoint for maximum engagement and conversion.Create custom segments based on user behaviorTarget specific groups with personalized contentAnalyze and improve your campaigns with dataTemplate EditorCraft with ClarityDesign and customize your message templates with our intuitive editor. Preview your creations in real-time, insert dynamic placeholders, and ensure your communication is always on-brand and personalized for each recipient.Create custom segments based on user behaviorTarget specific groups with personalized contentAnalyze and improve your campaigns with dataAI Insights & AnalyticsAnalyze with IntelligenceHarness the power of AI to gain deep insights into your data. Our intuitive dashboard provides real-time event overviews, quick stats, and allows you to query your data using natural language. Uncover trends, track user behavior, and make data-driven decisions with ease.Create custom segments based on user behaviorTarget specific groups with personalized contentAnalyze and improve your campaigns with dataGet StartedCustomer Engagement for Modern Teams
2024-11-08T11:59:39
en
train
42,055,629
XCSme
2024-11-05T22:10:21
LLM Text-to-Chart Demo for MySQL
null
https://twitter.com/XCSme/status/1853916571002917156
3
1
[ 42055630 ]
null
null
null
null
null
null
null
null
null
train
42,055,636
yuppiepuppie
2024-11-05T22:11:25
Groupthink in Engineering Teams
null
https://andrew.grahamyooll.com/blog/Groupthink%20In%20Engineering%20Teams/
2
0
null
null
null
null
null
null
null
null
null
null
train
42,055,644
rbanffy
2024-11-05T22:12:02
Unix Programmer's Manual Third Edition [pdf] (1973)
null
https://dspinellis.github.io/unix-v3man/v3man.pdf
178
32
[ 42056485, 42057559, 42058529, 42063551, 42060509, 42056968, 42056456, 42057112, 42056721, 42056588, 42057101 ]
null
null
null
null
null
null
null
null
null
train
42,055,654
n1b0m
2024-11-05T22:12:50
What are you Haydn? The hoaxers who fooled the classical music world
null
https://www.theguardian.com/music/2024/nov/05/what-are-you-haydn-the-hoaxers-who-fooled-the-classical-music-world
2
0
null
null
null
no_error
What are you Haydn? The hoaxers who fooled the classical music world
2024-11-05T15:40:31.000Z
Phil Hebblethwaite
In 1993, completely out of the blue, the Austrian pianist Paul Badura-Skoda was sent a photocopy of a manuscript purporting to be six lost Haydn keyboard sonatas. It came with a letter from a little-known flautist from Münster, Germany called Winfried Michel, who told Badura-Skoda that he’d been given it by an elderly lady whose identity he could not reveal.Badura-Skoda was suspicious, but once he played the music, he became sure that the works were real. He asked his wife Eva, a musicologist, to examine the manuscript. Although the music wasn’t in Haydn’s hand, she believed it to be an authentic copyist’s score dating from around 1805 and originating in Italy. They checked with the Haydn scholar, HC Robbins Landon, and he too was convinced. He penned an article for BBC Music Magazine, headlined Haydn Scoop of the Century, tipped off the Times, and called a press conference for 14 December 1993.Easily mistaken? Joseph Haydn. Photograph: Stock Montage/Getty ImagesWithin hours, the Joseph Haydn Institute in Cologne declared the manuscript to be a fake. An expert from Sotheby’s in London agreed. The Badura-Skodas had been hoaxed, or so it seemed. The following February, Eva gave a talk in California titled: The Haydn Sonatas: A Clever Forgery. Paul played a selection of the works – in a confused state of mind. Eva told the music scholar Michael Beckerman, reporting for the New York Times, “My husband still thinks they’re genuine,” raising difficult questions about truth and art. What did Paul believe he was playing? What was the audience hearing? And did it matter?In his article, Beckerman wrote: “Knowing that a work is by Haydn or Mozart allows us to see ‘inevitable’ connections. Take away the certainty of authorship, and it’s devilishly difficult to read the musical images within.” He noted, too, that it was the inauthenticity of the manuscript that had exposed Michel and not the fidelity of the music. And so, Beckerman dared to ask: “If someone can write pieces that can be mistaken for Haydn, what is so special about Haydn?”Does Beckerman think there’s much to draw from the story of the lost Haydn sonatas if we consider it today? “I think it pushes us to question what it is that we know,” he says. “How do we come to know it? And then how do we express it to others? And, in particular, how do we express it to others who might not agree with us? I think those questions are still completely apropos, and this kind of forgery pushes us to keep asking those questions and not pretend to know stuff that we really don’t know.”If it hadn’t been for her career as a pianist the hoax would never have been believable … Joyce Hatto (centre) in 1954. Photograph: Fred Ramage/Getty ImagesWhat makes something a fact? In the catalogue of their works, the Milan-based music publisher Ricordi lists the well-known Adagio in G Minor – a staple of film scores, including Gallipoli, Rollerball and Manchester by the Sea – as being by the Italian baroque composer Tomaso Albinoni, but elaborated upon by a musicologist called Remo Giazotto. Giazotto claimed that he completed the work in the late 1940s from a fragment of Albinoni’s actual music – a bassline and two short melody parts. But as the Albinoni expert Michael Talbot tells me: “Giazotto never provided any satisfactory explanation or description of the source from which he took the fragment. My view is that it’s an original composition.”Ricordi first published the work in 1958. I asked why they continue to list it as being at least partially composed by Albinoni when the connection can’t be proved and they didn’t respond. But the problem for any sleuth that examines the case of Adagio in G Minor is that its connection with Albinoni can’t be comprehensively disproved. Unlike with the Haydn sonatas, there is no original manuscript for specialists to discredit, only evidence collected by the likes of Talbot pointing to the likelihood that it never existed.Giazotto, who died in 1998, never owned up to his suspected hoax. After his manuscript was rubbished, Winfried Michel called the Haydn sonatas “completions”, without explaining what he meant. It would take until 2022, three years after Paul Badura-Skoda died, for him finally to disclose to a newspaper in Münster that he had composed the works, inspired by the incipits – their genuine opening four bars, which had survived in a catalogue of Haydn’s works. There was a bed of truth on which to sow the seeds of a very tall tale, as there was in the strange case of Joyce Hatto, the English pianist who enjoyed a late-life detonation of success in the early 2000s. Her husband, a record producer called William Barrington-Coupe, palmed off more than 100 CDs of other pianist’s performances as her own while she was ill with cancer, fooling critics. If Hatto hadn’t had an actual career between the 1950s and 1970s, the hoax would never have been believable. She died in 2006, a year before the ruse was uncovered, resulting in many Hatto obituaries remaining online – including on this website – that are a discombobulating mix of truth and nonsense.Mamoru Samuragochi at a press conference apologising for his ghostwriting scandal in 2014. Photograph: Aflo Co. Ltd./AlamyMusical hoaxes force us to question not just authenticity and ways of knowing, but also how we define words. In 2014, the supposedly deaf composer Mamoru Samuragochi stunned Japan when he confessed to using a ghostwriter for the 18 years in which he’d become famous for writing video-game scores and traditional classical music, including a symphony dedicated to the victims of the bombing of Hiroshima, his home city. He also wasn’t legally deaf. The ghostwriter, Takashi Niigaki, worked to Samuragochi’s briefs. How do we define a composer in that equation? And who was the artist? The story is rich with irony; after the hoax was exposed, Samuragochi became a recluse, Niigaki a public figure. “It was like Samuragochi had the temperament of an artist, but lacked the tools to actually create art,” wrote Christopher Beam in The New Republic. “The closest he came to a masterpiece was the performance itself: the mass duping of a nation that exposed its own dreams and vulnerabilities.”In a 2013 book, Forged: Why Fakes are the Great Art of Our Age, Jonathon Keats wrote, “Art forgery provokes anxiety.” He was referring to fine-art, but perhaps his views apply here. “Because art is a rare refuge from the mass-produced inauthenticity of the industrialised world, we are hypersensitive to any threat to the authenticity of art.” As such, he added, “No authentic modern masterpiece is as provocative as a great forgery. Forgers are the foremost artists of our age.”Let them also act as admonishers. A forger makes mincemeat of established narratives and gnaws at the rootstock of belief systems that shouldn’t be taken for granted. There’s art in the con, but also a warning.
2024-11-08T03:04:27
en
train
42,055,682
productprof
2024-11-05T22:18:57
Secretary of the Doge
null
https://www.poormark.com/p/doge
3
0
null
null
null
null
null
null
null
null
null
null
train
42,055,686
mixeden
2024-11-05T22:19:44
Are Language Models Replacing Programmers?
null
https://synthical.com/article/dd70d3fd-b3af-4d0f-ac70-17c3d66cb936?is_dark=false
2
0
null
null
null
null
null
null
null
null
null
null
train
42,055,702
next_xibalba
2024-11-05T22:22:07
null
null
null
5
null
[ 42055858, 42055886 ]
null
true
null
null
null
null
null
null
null
train
42,055,710
decryptlol
2024-11-05T22:23:26
null
null
null
1
null
null
null
true
null
null
null
null
null
null
null
train
42,055,715
edward
2024-11-05T22:24:22
Pocuter Spectra is a hackable, repairable smartwatch with OLED display
null
https://liliputing.com/pocuter-spectra-is-a-hackable-repairable-smartwatch-with-expandable-storage-and-oled-display-crowdfunding/
1
0
null
null
null
null
null
null
null
null
null
null
train
42,055,733
felchang
2024-11-05T22:26:58
A collaborative rich text editor built with Supabase and Y-Sweet
null
https://github.com/jamsocket/y-sweet-supabase-demo
3
0
null
null
null
null
null
null
null
null
null
null
train
42,055,751
edward
2024-11-05T22:29:29
IPv6 in Your Home
null
https://dorotac.eu/posts/ipv6_homenet/
3
0
null
null
null
no_error
IPv6 in your home
null
null
IPv4, IPv6, who cares? As long as it works, right? ## The death of IPv4 is greatly exaggerated We ran out of IPv4 addresses, and so what? I can still watch Youtube videos, have calls over Zoom, buy things on Amazon. The Internet works due to the magic of NAT! Channeling Oprah, you get an address, you also get an address, and you too get the same address! Except this all works because of lots of money and effort. Effort because you can't just make a call to your friend over IPv4. You're both likely behind a one-to-many NAT, meaning you can't receive connections. So who will initiate one? STUN offers some painful, costly, partial, and annoying solutions involving having a dedicated address anyway. An IPv4 address costs money, too. A single IPv4 address costs 26 USD in bulk as of 2024-11-05, and I'm paying for a 3EUR per month for a cheap VPS just for the sake of having one address for myself. Why bother? Because if you want a little place for yourself on the internet to serve stuff from, you need an address. Manage your own game server? Expose a quirky service? Have an actual, direct call? Seed torrents of your favorite classic art? Connect to your home network while away? I want to do all those things, so I bought myself an address. Of course, taking an address from the limited pool makes me part of the problem. But I want to connect to the plant watering system that I left at home! But I want to download stuff from the off-site backup that's at my friend's place, behind NAT! Yes, I could buy a server in a data center and install Wireguard there. I did it, it sucks. High pings, slow transfers. Help! Let me have direct connections. ## IPv6 IPv6 comes to the rescue! The address pool is about 420^π bazillions addresses, so every address is really cheap. If you want to apply for a subnet, a random 500 EUR package gives you 2¹²⁸⁻⁴⁸=2⁸⁰ addresses, which is 2417851639229258137600 addresses per EUR yearly. Global IPv6 addresses are effectively free. If you have a decent Internet provider, they will assign you a /60 subnet and let all your LAN devices grab a /64. Now anyone can connect to you, so enjoy! And put up your firewall. ## That /64 thing What's that about a /64 subnet? A subnet for every device? Well, that's how IPv6's DHCP equivalent works. You can't normally get anything smaller than that through autoconfiguration. Which is not a problem if you have a decent Internet provider. But if you've got only a half-decent provider, they might only offer you a /64. That typically happens on mobile connections, but not only. (Also, this can happen if you like subdividing networks like Russian dolls. IPv4 you could just chain NATs, IPv6 has no NAT.) So what do you do? ## OpenWRT I don't believe I have to introduce OpenWRT to any of my readers. Newcomers, this is **the** Open Source operating system for routers. It can extend IPv6 connections to connected computers *even if there's only a /64 available*! And it has this nifty Web interface called LuCi. While there are multiple guides for the command-line, there are no guides for configuring IPv6 forwarding for the Web interface. So here's mine. ## IPv6 relay mode in Luci First, set up an IPv4 WAN network (if you care). I'll call it *wwa*n. Remember to set up a LAN interface if you don't have one. Ready? Then set up a WAN network for IPv6. I'l call it *relay6*, set it to DHCP client and select "Alias Interface: @wwan" as the device. Once you have it, navigate to "DHCP server" and set one up. Yes, I know, it's weird. We don't want to provide addresses on this interface. That's why the next step is checking the "Ignore interface" box. Once that's done, go to DHCP IPv6 settings. Make this interface a designated master and change 3 dropdowns (RA-Service, DHCPv6-Service, NDP-Proxy) to "relay mode". We're done with the WAN interface, but the LAN needs to be adjusted. Here, it's just a static address on a bridge device. Go to DHCP Server → IPv6 Settings and change all the dropdowns to "relay mode". Save all the changes and apply them. For me, the router immediately received an address. My laptop also got an address immediately, but I had to reconnect to get the default route populated (otherwise you can't connect to the Internet). Check a device connected to that router, it should get the address, too. ### Default route One snag, though. The default route was not set for my laptop. I had to modify the connection manually and add one. The result looks like this: ``` [me@foobar ~]$ ip -6 r default via fe80::abcd:ef12:fecd:6573 dev wlp2s0 proto ra metric 600 pref high ``` ## Bonus: ULA ULA is something that doesn't exist in IPv4. ULA is the closest counterpart to an IPv4 local address. I use it to have stable addresses within my network. Even if the upstream changes their prefix (effectively your network address) and all previous addresses become invalid at 6:00 every morning, breaking all connections (thanks Telekom), and even if the upstream goes down at all, ULA will keep your network internally connected. I put the names of all hosts on my network in /etc/hosts, like a troglodyte on the early Internet before DNS. It sounds complicated if you come from IPv4. There, every computer knows its own address. 192.168.1.77. Great. That's it. What's my public address? No idea. In IPv6, every computer can easily have multiple addresses. A global one, some ULA addresses. It doesn't become a mess because those addresses are completely independent (link-local ones are a bit special, though). ULA networks are dropped on the edge of the public Internet, so they can't even be used for Internet access. OpenWRT supports using ULA in Network → Global network options. For me, it doesn't always get picked up, but it's there on some "Static address" interfaces. I don't really know what controls it, but I have one on the same interface as my LAN: ## The end Now I have IPv6 in my local network! I can seed the world with torrents! I can host a quirky server for 10 minutes (remember to open firewall)! I can connect to the servers I manage at a friend's place! Oh wait, that server is behind its own firewall and I never enabled IPv6 on that one -_-. I guess I'm not done blogging about IPv6 yet. Comments
2024-11-08T15:37:39
en
train
42,055,772
goodereader
2024-11-05T22:33:50
null
null
null
1
null
null
null
true
null
null
null
null
null
null
null
train
42,055,788
voisin
2024-11-05T22:35:39
Ottawa draft rules cap emissions from oil and gas sector to 35% below 2019 level
null
https://www.theglobeandmail.com/business/article-ottawa-to-release-draft-rules-to-cap-greenhouse-gas-emissions-from/
1
0
null
null
null
null
null
null
null
null
null
null
train
42,055,817
rodrigo975
2024-11-05T22:39:21
SmolBSD: Un système Unix de 7 mégaoctets qui démarre en moins d'une seconde
null
https://connect.ed-diamond.com/gnu-linux-magazine/glmf-265/smolbsd-un-systeme-unix-de-7-megaoctets-qui-demarre-en-moins-d-une-seconde
4
0
null
null
null
null
null
null
null
null
null
null
train
42,055,827
elsewhen
2024-11-05T22:41:04
First wood-panelled satellite launched into space
null
https://www.bbc.com/news/articles/c5y3qzd5ql9o
1
1
[ 42055855 ]
null
null
null
null
null
null
null
null
null
train
42,055,828
DtNZNkLN
2024-11-05T22:41:05
I profiled 80 companies for Indie Hackers. Here's what I learned
null
https://foundersconfidential418.substack.com/p/i-profiled-80-companies-for-indie
2
0
null
null
null
null
null
null
null
null
null
null
train
42,055,830
bookofjoe
2024-11-05T22:41:16
China Hack Enabled Spying on US Officials, Ensnaring Thousands of Contacts
null
https://www.wsj.com/politics/national-security/china-hack-enabled-vast-spying-on-u-s-officials-likely-ensnaring-thousands-of-contacts-1340ba4a
8
2
[ 42055896, 42055831 ]
null
null
null
null
null
null
null
null
null
train
42,055,840
mnk47
2024-11-05T22:42:11
Leveraging Large Language Models for Advanced Multilingual Text-to-Speech
null
https://arxiv.org/abs/2411.01156
1
1
[ 42055847 ]
null
null
null
null
null
null
null
null
null
train
42,055,846
PaulHoule
2024-11-05T22:43:03
Computer-assisted wagering became horse racing's insider trading
null
https://www.theguardian.com/sport/2024/nov/01/computer-assisted-wagering-horse-racing-controversy
2
0
null
null
null
null
null
null
null
null
null
null
train
42,055,851
wh162263
2024-11-05T22:44:28
null
null
null
1
null
null
null
true
null
null
null
null
null
null
null
train
42,055,927
syspec
2024-11-05T22:56:16
US brothers arrested for stealing $25M in crypto in just 12 seconds
null
https://www.bbc.com/news/world-us-canada-69018575
2
1
[ 42055945 ]
null
null
null
null
null
null
null
null
null
train
42,055,939
kp1197
2024-11-05T22:57:22
null
null
null
1
null
null
null
true
null
null
null
null
null
null
null
train
42,055,946
felixbraun
2024-11-05T22:58:21
Pm-AMM: A Uniform Automated Market Maker for Prediction Markets
null
https://www.paradigm.xyz/2024/11/pm-amm
56
0
null
null
null
null
null
null
null
null
null
null
train
42,055,953
basilgohar
2024-11-05T23:00:29
Google CEO forbids political talk after firing 28 over Israeli contract protest
null
https://finance.yahoo.com/news/sundar-pichai-tells-google-staff-104845522.html
27
10
[ 42056116, 42055956, 42056256, 42056848, 42056752 ]
null
null
null
null
null
null
null
null
null
train
42,055,975
luismedel
2024-11-05T23:03:56
Terra: A low-level counterpart to Lua
null
https://terralang.org/
3
0
null
null
null
null
null
null
null
null
null
null
train
42,055,979
doener
2024-11-05T23:04:45
Mozilla is eliminating its advocacy division
null
https://www.theverge.com/2024/11/5/24289124/mozilla-foundation-layoffs-advocacy-global-programs
219
120
[ 42056189, 42057351, 42056197, 42057888, 42056192, 42068230, 42057480, 42056338, 42056317, 42056816, 42057635, 42056573, 42056345 ]
null
null
null
null
null
null
null
null
null
train
42,055,995
qb7
2024-11-05T23:07:54
null
null
null
1
null
null
null
true
null
null
null
null
null
null
null
train
42,056,000
tymzap
2024-11-05T23:09:19
Clean code in React. The magic of keeping one level of abstraction per function
null
https://www.tymzap.com/blog/the-magic-of-keeping-one-abstraction-level-per-function
3
0
null
null
null
null
null
null
null
null
null
null
train
42,056,056
skeptrune
2024-11-05T23:18:38
Show HN: Firecrawl-Simple – Stable fork of Firecrawl optimized for self-hosting
Firecrawl Simple is a stripped down and stable version of firecrawl optimized for self-hosting and ease of contribution.<p>The upstream firecrawl repo contains the following blurb:<p>&gt;This repository is in development, and we&#x27;re still integrating custom modules into the mono repo. It&#x27;s not fully ready for self-hosted deployment yet, but you can run it locally.<p>Firecrawl&#x27;s API surface and general functionality were ideal for our Trieve sitesearch product, but we needed a version ready for self-hosting that was easy to contribute to and scale on Kubernetes. Therefore, we decided to fork and begin maintaining a stripped down, stable version.<p>Fire-engine, Firecrawl&#x27;s solution for anti-bot pages, being closed source is the biggest deal breaker requiring us to maintain this fork. Further, our purposes not requiring the SaaS and AI dependencies also pushes our use-case far enough away from Firecrawl&#x27;s current mission that it doesn&#x27;t seem like merging into the upstream is viable at this time.
https://github.com/devflowinc/firecrawl-simple
31
5
[ 42056925, 42056970 ]
null
null
null
null
null
null
null
null
null
train
42,056,061
ushakov
2024-11-05T23:19:49
Defense Llama: The LLM Purpose-Built for American National Security
null
https://scale.com/blog/defense-llama
7
0
null
null
null
null
null
null
null
null
null
null
train
42,056,071
whothatcodeguy
2024-11-05T23:21:22
Show HN: Codehackerz" – Elite hackers must hack a meteor to save humanity [video]
I made this movie with some friends back in college and love it to this day. Original description -<p>What does the world need most? Heroes? No. Hackers. Codehackerz. In &quot;Codehackerz&quot; we follow the chronicles of the most super advanced computer geniuses of our age as they use their unparalleled skills to hack into a meteor that jeopardizes humanity&#x27;s future.
https://www.youtube.com/watch?v=kA1jfr-o-Xc
1
0
null
null
null
null
null
null
null
null
null
null
train
42,056,079
codeguppy
2024-11-05T23:22:56
Giveaway: Illustrated JavaScript Coding Course (For Families)
Dear Parents,<p>I’ve created a JavaScript coding course designed for the whole family!<p>This course is ideal for parents eager to teach their kids the basics of coding. It covers JavaScript in the browser, using the codeguppy.com platform, which is built on the widely used p5.js library—popular in both academia and creative coding.<p>With nearly 700 slides of beautifully illustrated content, this course is part of my mission to support coding education. As a special offer, I’m sharing 100 copies of this course in PDF format for FREE. Don’t miss out—download it while supplies last!<p>Download the course in PDF format<p>https:&#x2F;&#x2F;codeguppy.gumroad.com&#x2F;l&#x2F;js&#x2F; Discount code: GIVEAWAY (Enter the code, and the price will update to $0.00)<p>Printeed edition ================<p>Preview the printed edition on YouTube: https:&#x2F;&#x2F;www.youtube.com&#x2F;shorts&#x2F;uJmS-s4DKAM<p>Order your copy from Lulu: https:&#x2F;&#x2F;www.lulu.com&#x2F;shop&#x2F;marian-veteanu&#x2F;illustrated-javascript-coding-course&#x2F;paperback&#x2F;product-kv8yky2.html?page=1&amp;pageSize=4<p>Your Support Matters ====================<p>I’d love for as many people as possible to discover this course and the codeguppy.com platform. I don’t have a marketing budget, so if you enjoy the course, please consider sharing it on social media. Your support would mean the world!
null
3
1
[ 42056688, 42056136 ]
null
null
null
null
null
null
null
null
null
train
42,056,088
geox
2024-11-05T23:23:50
Voters could make recreational weed legal in a majority of U.S. states
null
https://www.npr.org/2024/11/05/nx-s1-5179832/recreational-weed-legal-election-states
3
0
null
null
null
null
null
null
null
null
null
null
train
42,056,090
xerox13ster
2024-11-05T23:24:20
Ask HN: Can all of 32bit computing fit within a single 16GB permutation of 2^32?
And am I correct in intuiting that computing over the permutation would be NP-Complete?<p>The idea is that since technically all 32 bit opcodes, data representations, and encoding instructions(Unicode text, 24 bit color&#x2F;audio) for computers come down to byte-sized combinations of bits (yes, there&#x27;s nibbles and words and half-words too)--and these are necessarily limited to &lt;2^32--, that any combination of bits used to represent an opcode or data are stored within the permutation, eliminating the need to store data beyond the 16GB partition.<p>Every bit pattern needed to move to another bit pattern is contained within the permutation.<p>This horrible Hello World bit bang I did on an 8bit CPU I made up is contained within the permutation, and could conceivably run against a virtualization of the CPU which would also be contained within the permutation if it were virtualized on a 32bit system.<p>0b00000011 0b10000110 0b00100000 0b10000010 0b00101000 0b10000001 0b01000100 0b10011100 0b10100110 0b00100101 0b10000001 0b01000100 0b10011001 0b01000100 0b10011100 0b10100110 0b00100110 0b10000001 0b01000110 0b10011001 0b01000100 0b10011100 0b10100110 0b10100110 0b00101111 0b10000001 0b01000100 0b10011001 0b01000100 0b10011100 0b10100110 0b00100000 0b10000100 0b10100110 0b00010111 0b10000001 0b01000100 0b10011001 0b01000100 0b10011100 0b10100110 0b00101111 0b10000001 0b01000100 0b10011001 0b01000100 0b10011100 0b10100110 0b00110010 0b10000001 0b01000100 0b10011001 0b01000100 0b10011100 0b10100110 0b00100110 0b10000001 0b01000110 0b10011001 0b01000100 0b10011100 0b10100110 0b00100100 0b10000001 0b01000100 0b10011001 0b01000100 0b10011100 0b10100110 0b00100001 0b10000100 0b10100110<p>The permutation, being a tape of 1s and 0s could then be acted upon by a multi-state machine to reproduce the actions necessary to play an audio file or execute a program without any additional data storage.<p>Has this been theorized before? Is it the sort of thing that is so obvious that it&#x27;s taken for granted and not worth discussion? Is the NP-hardness of it so astronomical only the insane could and would conceive of such a folly?<p>Not the Turing Machine bit, obviously, but that all representations of data and program execution for any 32 bit system are necessarily contained within a permutation of the 32bit space?<p>My intuition about it being NP-hard or NP-Complete is that it seems, thinking briefly about it, that you would need to know ahead of time which pattern jumps to the next pattern which reprents your data or instruction and also jumps to the next next pattern so on such that to derive the starting pattern you need to follow all possible patterns from the destination pattern back to the starting pattern for all possible actions taken. At that point we&#x27;re just solving the halting problem the hard way, aren&#x27;t we?
null
3
1
[ 42056604 ]
null
null
null
null
null
null
null
null
null
train
42,056,108
transpute
2024-11-05T23:27:46
Intel's future laptops will have memory sticks again
null
https://www.theverge.com/2024/11/1/24285513/intel-ceo-lunar-lake-one-off-memory-package-discrete-gpu
8
2
[ 42057220, 42057408 ]
null
null
null
null
null
null
null
null
null
train
42,056,117
teleforce
2024-11-05T23:29:28
Apache JMeter: open-source performance testing for static and dynamic resources
null
https://jmeter.apache.org/
3
0
null
null
null
null
null
null
null
null
null
null
train
42,056,121
privatdozent
2024-11-05T23:30:03
Nash's Invention of Non-Cooperative Game Theory (1949-50)
null
https://www.privatdozent.co/p/nashs-invention-of-non-cooperative
4
0
null
null
null
null
null
null
null
null
null
null
train
42,056,143
todsacerdoti
2024-11-05T23:32:05
That Okta LDAP Bug
null
https://matt.blwt.io/post/on-that-okta-ldap-bug/
2
0
null
null
null
null
null
null
null
null
null
null
train
42,056,161
mikece
2024-11-05T23:34:41
Gimp 3.0 RC1 Released for Testing
null
https://www.phoronix.com/news/GIMP-3.0-RC1
7
2
[ 42067633, 42058120 ]
null
null
null
null
null
null
null
null
null
train
42,056,178
angellamae
2024-11-05T23:38:49
null
null
null
1
null
null
null
true
null
null
null
null
null
null
null
train
42,056,179
philippemnoel
2024-11-05T23:39:08
ParadeDB: Search and analytics for Postgres with zero ETL
null
https://www.paradedb.com/
3
1
[ 42057176 ]
null
null
no_error
ParadeDB
null
null
Announcing our partnership with UbicloudSearch and analytics for Postgres with zero ETLParadeDB is a modern Elasticsearch alternative built on Postgres. Built for real-time, update-heavy workloads.docker run --name paradedb -e POSTGRES_PASSWORD=password paradedb/paradedb docker exec -it paradedb psql -U postgresTrusted by enterprises, loved by developersProductMake Postgres aspowerful as ElasticBy transforming Postgres into a performant search and analytics engine, ParadeDB frees your team from the pain of scaling and syncing Elasticsearch.SearchSupercharge Postgres' search capabilities with BM25 scoring, custom tokenizers, hybrid search, and more. AnalyticsEnrich your search results with support for fast analytics and faceting.BenefitsSimplify and strengthen your data stackReduced overheadEliminate complex sync tools like ETL, Kafka, and Debezium. With ParadeDB, you can just use Postgres.Zero data lossNever lose data again because of a broken sync with Elastic. ParadeDB uses native Postgres indexes that always stay up to date.ACID guaranteesPostgres ACID transactions guarantee that data is searchable immediately after a successful write.Automatic cleanupNever worry about cleaning up stale Elastic indexes. ParadeDB search indexes integrate with Postgres' vacuum process.Reliable data storeFirst class support for backups, high availability and disaster recovery through Postgres.Postgres dialectWrite queries using Postgres SQL. No need to wrangle with an unfamiliar query language.Zero ETLIntegrates with yourexisting infraParadeDB integrates with managed Postgres services and data lakes using native Postgres replication and APIs. Zero ETL required.RDS CompatibleParadeDB uses logical replication to consume data from Amazon RDS, Azure Postgres and Google Cloud SQL.S3 CompatibleParadeDB can directly query and ingest data from S3, GCS, and Azure Blob Storage.Open SourceTrusted by the communityParadeDB has been deployed across thousands of production environments on multi-TB clusters.50K+Docker deploymentsOur Docker image is the easiest way to test or self-manage ParadeDB.15K+Postgres extension installsAll our features are shipped as Postgres extensions, which means that ParadeDB can drop into any self-managed Postgres.5K+Stargazers on GithubParadeDB is one of the fastest-growing open source database projects.Ready to get started?Start testing right away with our docs or book a demo with our sales team.Have a question? Email us
2024-11-07T13:47:56
en
train
42,056,187
AnhTho_FR
2024-11-05T23:40:23
Perplexity bets big on AI search during the election
null
https://fortune.com/2024/11/05/search-ai-election-perplexity-openai-chatgpt-gamble-will-it-pay-off/
2
0
null
null
null
no_error
Perplexity bets big on AI search during the election while Google and OpenAI say they can't help
null
Sharon Goldman
With today’s election and its aftermath, AI search faces a major test. Given the huge stakes, along with fears of misinformation and AI-produced “hallucinations,” the pressure is on these emerging and still largely untested services to deliver trustworthy and authoritative insights. AI search, powered by large language models (LLMs) that generate answers by synthesizing information from various sources in response to queries, has been sizzling with activity lately. Last week, AI giant OpenAI debuted its long-awaited search engine, ChatGPT Search. It joins a market in which relative veteran Perplexity AI, founded in 2022, has already carved out a small niche and is gaining steam. Meanwhile, in 2023, Google started tweaking its existing search engine with AI Overviews, or AI-generated summaries that appear at the top of search results. A year later, Google rolled out AI Overviews across the U.S., offering users the option of getting quick answers while doing a typical Google search, or using its Gemini chatbot interface for a ChatGPT-like experience. When it comes to the election, the AI search leaders are taking different approaches. Google, for its part, is very cautious about the election, restricting responses for election-related queries on its Gemini website and apps, as well as in its AI Overviews in Google Search. If you query Gemini about the topic, you’ll get a friendly but unproductive response: “I can’t help with responses on elections and political figures right now. I’m trained to be as accurate as possible but I can make mistakes sometimes. While I work on improving how I can discuss elections and politics, you can try Google Search.”  OpenAI’s ChatGPT Search is also playing it safe today when it comes to real-time updates, with a blunt response when asked about recent polling results: “I might not have the latest updates. For the most complete and up-to-date information about the U.S. Election, please visit news sources like The Associated Press and Reuters or check with your state or local election authority.”  But it also may depend on how your query is worded. When I asked ChatGPT Search “How are polls doing in US swing states around the election?” I received an overview of polling data as of November 5, with Business Insider listed as the single source for specific information, but a variety of other secondary sources available to click on.  It is Perplexity, however, that is taking the biggest gamble, with an AI election hub that features live updates featuring data from The Associated Press and a partnership with the nonprofit voter guidance site Democracy Works. The site has an attractive, intuitive user experience in an area it calls “Your Ballot.” Type in your zip code and you’ll get detailed information about candidates, ballot measures, and related questions in your area. I typed in a variety of zip codes and double-checked the results, which seemed on point. In my New Jersey area, for example, I found no errors (though I must say I did not know that someone named Fahad Akhtar of the Common Sense Independent Party was running for Congress in my district). But Perplexity is going much farther, answering seemingly any type of election-related query that its search engine users enter. While I was impressed with Perplexity’s clear source citations, I was surprised, though, at some of the source quality. For example, when I clicked on a “related” link that asked: “What role do battleground states play in the final outcome?” Perplexity listed a variety of sources—the first one being the Hindustan Times, an Indian English-language daily newspaper based in Delhi, followed by ABC News, and Fortune (which has a partnership with Perplexity) The results included a list of where the current polls stand in battleground states, and one of them gave the unlikely answer that in Arizona, Kamala Harris was leading Donald Trump 49% to 45%. Most polls, however, show a much closer race with Harris slightly behind Trump in Arizona. So I discussed the discrepancy with Perplexity, which responded with more results, including from the Hindustan Times once again. I finally asked: “why are you using Hindustan Times as a source for US election info?” The response, in part, said: “You’ve raised an important point about critically evaluating sources. The Hindustan Times is an Indian newspaper that may not have the most up-to-date or accurate information about the U.S. election. In the future, I’ll be more careful about evaluating and selecting sources when discussing U.S. elections or other major political events.”  I asked a Perplexity spokesperson about these responses. She said that for all election-related queries, regardless of whether it’s in the “Your Ballot” or general answer engine experience, “we’re prioritizing a curated set of sources to respond to user questions that are fact-checked and non-partisan (like Democracy Works and news organizations).”  In my example, she said that “while the Hindustan Times is not a US-based news outlet, it is considered an authority on this specific query as a news outlet.” In fact, she said, “ if you took this question to Google, it would also be one of the top articles listed” and added a screenshot of a similar Google query. She added that Perplexity aims for a “minimum of 7-8 sources per election-related query so we can cross check information and better verify that details are consistent and accurate across multiple trusted domains.”  But not every part of Perplexity’s answers relies on multiple sources. For example, a list of battleground states and their total number of electoral votes listed one source, the Hindustan Times. There’s no doubt that Perplexity’s detailed, transparent source citations go beyond what you’ll see in ChatGPT Search (which comes close), Google’s Gemini, Google’s AI Overviews, or Anthropic’s Claude (which does not yet offer source citations). But it remains to be seen how its live coverage plays out over the next 24 to 48 hours. If Perplexity gains the trust of its users, it could be a game-changer for easy-to-access election information and bring its competitors like OpenAI and Google off the sidelines. But it’s also a big risk with high stakes: Any major error could be costly to any company, in more ways than one. A newsletter for the boldest, brightest leaders: CEO Daily is your weekday morning dossier on the news, trends, and chatter business leaders need to know. Sign up here.
2024-11-07T08:13:30
en
train
42,056,188
teleforce
2024-11-05T23:40:23
AliveCor Isn't Backing Down from Apple, Its 'Bully'
null
https://medcitynews.com/2024/03/apple-watch-alivecor-technology-cardiology/
3
0
null
null
null
no_error
AliveCor Isn’t Backing Down from Apple, Its ‘Bully’
2024-03-31T10:14:45-04:00
Katie Adams
Throughout its storied history, Apple has been no stranger to litigation. While many articles about the Cupertino, California-based tech giant’s legal woes are currently being published given the antitrust lawsuit that the Department of Justice filed over Apple’s alleged monopolization of the smartphone market, this story focuses on its legal wrangling with a smaller rival in the medical device space. The Apple Watch, which first hit consumer shelves in 2015, is currently one of Apple’s best-selling products. The company sold nearly 50 million in 2022. The wrist-worn device has an array of heart monitoring features, such as electrocardiogram (ECG) functionality and irregular heart rhythm detection, enabling users to conveniently track their heart health. Despite its smashing commercial success, the Apple Watch has faced years of legal challenges.  Priya Abani — CEO of AliveCor, a company that currently has several lawsuits pending against Apple — thinks that the tech juggernaut has made a habit of taking intellectual property from smaller medical device firms in order to improve the functionalities of the Apple Watch. She also believes that Apple has avoided being held accountable because it “bombards” smaller companies with litigation it knows they won’t be able to afford. In an unattributable statement emailed to MedCity News, Apple denied all charges that it uses aggressive litigation tactics to intimidate smaller companies making patent infringement claims against it. The tech company also said that it values innovation and respects intellectual property. Meanwhile, Abani said AliveCor plans to stand its ground and continue to fight back against Apple any way that it can — with hopes that it can be the David that finally beats Goliath. Litigation history Founded in 2011 and based in Silicon Valley, AliveCor is a medical device company that sells remote and connected cardiac care services. Its founder — David Albert, who currently serves as the company’s chief medical officer — has been a pioneering figure in the field of mobile health technology for decades. He created AliveCor because he recognized the potential of utilizing smartphone technology to create portable, accessible electrocardiogram (ECG) devices. In 2016, the company launched its KardiaBand product, which is an FDA-cleared wearable wristband that integrates with the Apple Watch to provide continuous heart rate monitoring and ECG readings to detect atrial fibrillation. Two years later, Apple launched its own software and hardware to provide immediate ECG readings to Apple Watch users. AliveCor discontinued the KardiaBand product in 2019 — this was announced about eight months after Apple launched its own ECG functionalities, according to news reports. Apple’s new native ECG capabilities had apparently made AliveCor’s product unnecessary. That led to AliveCor suing Apple in December 2020. AliveCor filed its case in the U.S. District Court for the Western District of Texas, claiming that Apple had infringed on three of its patents — all of which focus on monitoring cardiac arrhythmia. These patents covered AliveCor’s technology and methods for detecting and analyzing heart rhythms using portable devices. AliveCor charges that the Apple Watch utilized similar technology for monitoring heart rhythms without proper authorization or licensing from AliveCor, thereby infringing on its intellectual property rights. In April 2021, AliveCor ratcheted up the legal battle by filing another complaint against Apple with the International Trade Commission over the same three alleged patent infringements. This time, AliveCor sought to ban the import of the Apple Watch in the U.S. This would basically prevent Apple Watches from being sold in the U.S., as they are assembled overseas. The ITC launched an investigation in May 2021. That same month, AliveCor filed an antitrust lawsuit against Apple in California federal court, which accused Apple of monopolistic behavior.  The complaint alleged that Apple had violated the Sherman Antitrust Law and California’s unfair competition law by way of its decision to bar third-party vendors from providing heart rate monitoring apps for the Apple Watch. In June 2022, the ITC issued an initial determination in favor of AliveCor.  But then in December 2022, the U.S. Patent and Trademark Office’s Patent Trial and Appeal Board (PTAB) invalidated AliveCor’s patents at the request of Apple. The PTAB ruling said that AliveCor’s patents were unpatentable because they were too obvious considering the state of cardiac research and technology advancements.  AliveCor is battling the PTAB ruling — in a recent interview, Abani described these patent invalidations as Apple’s “desperate last-ditch effort” to “bully” her company out of pushing forward with its patent infringement lawsuits. Apple denied this characterization. When it came time for the ITC’s final determination, which was also in December 2022, the agency sided with AliveCor. In this decision, the ITC declared that imports for all Apple Watches with ECG technology should be banned — but that it would not enforce such a ban until an appeal tied to the PTAB dispute was resolved. The case is currently on appeal. “The ITC order and the PTAB case are now being decided at the federal circuit courts, so we’re looking at a summer timeframe in which more things will happen,” Abani said.  As for the antitrust case AliveCor filed against Apple, it was dismissed by a federal judge in February of this year. The reasoning for the dismissal is being kept under seal temporarily. Abani said her company plans to appeal the dismissal, remarking that she is “deeply disappointed and strongly disagree[s] with the court’s decision.” “Standard playbook” In Abani’s view, it is Apple’s “standard playbook” to intimidate smaller companies until they back out of fighting for their intellectual property.  “Apple’s vast resources allow them to squash small innovators,” she said. “They have more lobbyists and lawyers on their payroll than we have employees.” Her medical device company is far from the only one that has fallen victim to Apple’s aggressive refusal to settle lawsuits and penchant for dragging out legal battles, Abani added. For instance, pulse oximetry company Masimo also sued Apple in 2020 on the basis of patent infringement. In the lawsuit, the medical devicemaker accused Apple of poaching its staff in order to steal trade secrets. Masimo also accused Apple of infringing on 10 of its patents, including technology to track users’ heart rates and blood oxygen levels. In December, the ITC banned the Series 9 and Ultra 2 models of the Apple Watch. This was the result of an ITC ruling that said Apple’s blood oxygen sensors did in fact infringe upon patents owned by Masimo and its subsidiary Cercacor Laboratories. The ITC paused this ban the next day, allowing the watches to be sold temporarily. But then in January of this year, the court reinstated the ban. In response to the ban, Apple redesigned the Series 9 and Ultra 2 versions of its watches so they would no longer have blood oxygen monitoring features. These redesigned versions of the Apple Watch are currently being sold in the U.S. Neither Masimo nor its lawyers responded to requests for comment on the litigation. A lawyer engaged in another patent infringement lawsuit against Apple also believes that Apple goes after the little guy. Andrew Bochner, managing partner at Bochner PLLC, currently represents NYU Langone cardiologist Joseph Wiesel in a federal court case accusing Apple of using his patented atrial fibrillation monitoring tool in its Apple Watch without permission. “Apple has fought back with various patent proceedings. They filed an inter partes review, and they lost that. Then they filed an ex parte re-exam, which is now working its way through the system. So they’ve done everything they can to avoid defensively litigating and have tried to go on the offensive against an individual doctor,” Bochner declared of the lawsuit between his client and Apple.  He asserted that the tech giant “just fights back against who challenges them without ever being accountable.” He also said that Apple is known among the legal community to have a certain modus operandi: they do “not entertain any sort of real settlement discussions” and instead battle “tooth and nail” in order to wear out their rivals with fewer resources. During the case’s post-grant proceeding in the U.S. Patent and Trademark Office, Apple said that it filed “roughly 10%” of the office’s total post grant proceedings, Bochner noted. A post-grant proceeding refers to the legal process conducted after a patent has been granted, often involving challenges to the patent’s validity or enforceability. These proceedings often arise due to challenges mounted by third parties or competitors who assert that a patent is invalid, either because it is overly broad or not novel.  “They’re using the courts as a tool because they know it’s expensive — for companies large and small — to litigate,” he remarked. Stealing IP can “actually be cheaper” Another medical IP lawyer — Bethany Corbin, who currently serves as CEO of women’s health innovation platform FemInnovation — agreed that it’s not uncommon for large companies to take advantage of smaller opponents that don’t necessarily have the means to go through an expensive legal process.  She looked at this issue from the perspective of a larger company infringing on the patents of a smaller one. If a smaller company takes its patent infringement grievance to court and wins, this could cause a large tech company to have to pay millions of dollars. But millions of dollars “is a small drop in the bucket” for tech giants, Corbin pointed out. Apple garnered $383 billion in total revenue last year and more than $173 billion in profits.  “In some instances, it can actually be cheaper for a large tech company to steal the IP from smaller tech companies than to try to enter into a legal licensing arrangement,” Corbin said.  Big tech companies may try to “game” the patent system and challenge smaller firms’ patents in two different venues — the courts and the PTAB. When the PTAB was established in 2012, it gave big companies a whole new way to fight patent infringement litigation, Corbin explained. Huge companies like Google, Apple and Samsung were responsible “for over 80%” of PTAB petitions in 2021, she added. “The small tech company sues the larger tech company in court. The large tech company then petitions the PTAB to strike down the patents that the large tech company is accused of infringing. This leads to parallel litigation with double the cost for small tech companies that have very limited budgets,” Corbin stated. The litigation fees alone could sink a small startup, she declared. She said the fees typically total hundreds of thousands of dollars, particularly as litigation drags on for years and through the appellate process.  In Corbin’s view, if a large tech company draws out litigation and refuses to settle, it is “essentially waiting for the smaller tech company to run out of money and fold.” But in the case of AliveCor, Apple may have misjudged the startup’s tenacity. Abani said that her company’s claims “go well beyond AliveCor,” representing every small company and future innovation that is “at risk of being squashed by Goliaths like Apple.” In Abani’s eyes, the fight against Apple is paramount to preserving fair competition in the medical device space. “Defending our rights is expensive, but the alternative is to give in to those who would continue to copy, monopolize and otherwise suppress the progression of life-saving technologies,” Abani wrote Thursday in an emailed statement. “We are fortunate to be in a position to go toe-to-toe with Apple, for the benefit of our customers and other similarly impacted companies, while still running a successful business.” On the appeal for its antitrust case against Apple, AliveCor will need to argue that the distinct court erred in dismissing the lawsuit. If the appellate court agrees with AliveCor, then the case will go back to the district court and progress into the next stages — discovery, summary judgment motions and eventually a trial.  After all of that occurs, the losing party can still appeal the judgment up to the appellate court and Supreme Court.  “This entire process can take several years, so the dismissal of the case is definitely not the end of the story. In some ways, it’s actually just the beginning,” Corbin remarked. AliveCor did not disclose its appeals strategy, but Abani said her company will do whatever it takes to stand up for itself. “We are committed to protecting our IP and ability to compete fairly in the marketplace, to ensure that consumers always have the option to choose the best products and services,” she declared. Photo: AndreyPopov, Getty Images
2024-11-08T11:02:26
en
train
42,056,190
bitsadventures
2024-11-05T23:40:55
null
null
null
1
null
null
null
true
null
null
null
null
null
null
null
train