Recent bookmarks

How to Change Your Meta Settings

A comprehensive guide details step-by-step instructions for enhancing privacy settings on Meta platforms, specifically targeting ad preferences and data collection. The guide walks users through disabling targeted advertising, preventing cross-platform data sharing, and unlinking third-party data collection on Facebook and Instagram accounts. Additional privacy recommendations include using Firefox browser and Privacy Badger extension.

GitHub - deepseek-ai/DeepEP: DeepEP: an efficient expert-parallel communication library

DeepEP is a communication library optimized for Mixture-of-Experts (MoE) and expert parallelism, providing high-throughput GPU kernels and low-latency operations. The library supports both intranode and internode communication, offering specialized kernels for asymmetric-domain bandwidth forwarding and low-latency inference decoding, with comprehensive support for FP8 and RDMA networks.

1950144 - DigiCert: Threat of legal action to stifle Bugzilla discourse

DigiCert's legal team sent a threatening letter to Sectigo regarding critical comments made in a Bugzilla discussion about PKI security practices. Sectigo's General Counsel responded by defending their right to open discourse, emphasizing that legal threats to silence criticism could damage WebPKI's transparency and self-regulatory system.

The Wrongs of Thomas More (Wrong 5)

An exploration of Thomas More's 1529 'Dyaloge' reveals his complex stance on religious authority and heresy, leading to his role in executing Protestant reformers. The text shows More's transformation from a humanist intellectual to an authoritarian figure, highlighting his struggle between rational thought and absolute religious submission. The analysis connects More's public submission to authority with broader patterns of authoritarian behavior across history.

Launch HN: SubImage (YC W25) – See your infra from an attacker's perspective

SubImage, built on the open-source Cartography security graph, helps security teams identify and fix infrastructure vulnerabilities before attackers find them. The platform maps infrastructure, emulates adversary behavior, and provides actionable recommendations through a hosted solution that allows deep customization and integration with various data sources.

Student refines 100-year-old math problem, expanding wind energy possibilities | Penn State University

Penn State engineering student Divya Tyagi refined a century-old mathematical problem in wind turbine design, creating a simpler solution to Glauert's original work. Her addendum expands the analysis to include total force and moment coefficients acting on wind turbine rotors, enabling more efficient turbine designs. The breakthrough could significantly improve wind energy production, with even a 1% efficiency increase potentially powering an entire neighborhood.

Google Co-Scientist AI cracks superbug problem in two days! — because it had been fed the team’s previous paper with the answer in it

Google's Co-Scientist AI tool, powered by Gemini LLM, made headlines for supposedly solving a superbug problem in 48 hours, but it was later revealed that the solution was derived from previously published research. Similar patterns of overstated achievements were found in Google's other AI research claims, including drug discovery and materials synthesis.

The Best Way to Use Text Embeddings Portably is With Parquet and Polars

A deep dive into efficient storage and retrieval of text embeddings using Parquet files and polars library, demonstrated through Magic: The Gathering card analysis. The article explores alternatives to vector databases for smaller datasets, highlighting how combining Parquet files with polars offers zero-copy operations and fast similarity searches.

James Pae

An analytical study investigates the correlation between kebab restaurant quality and proximity to train stations in Paris using Google Places API and geospatial analysis. Despite thorough data collection of 400 establishments and complex spatial analysis, results showed only a weak correlation (0.091 Pearson coefficient), leaving the hypothesis largely unconfirmed.

aposd-vs-clean-code/README.md at main · johnousterhout/aposd-vs-clean-code

A detailed discussion between Robert Martin and John Ousterhout explores their differing views on software design principles, focusing on method length, comments, and Test-Driven Development (TDD). While they agree on fundamental goals like code readability and maintainability, they disagree significantly on implementation approaches and best practices.

Bookmarklets (and Custom URL Schemes) Are Criminally Underrated

A detailed exploration of bookmarklets and custom URL schemes reveals their underutilized potential for enhancing browser functionality through JavaScript-enabled bookmarks and custom protocol handlers. The functionality allows users to create custom buttons that can interact with both web content and local applications, enabling powerful browser-to-application workflows. The technology demonstrates the possibility of more extensible and powerful GUIs, though implementation currently requires some technical expertise.

Laravel Cloud

Laravel Cloud offers a comprehensive platform for deploying and managing Laravel applications with features like automatic scaling, edge caching, and integrated databases. The platform eliminates configuration complexity while providing enterprise-grade security, performance monitoring, and team collaboration capabilities. Developers can deploy applications quickly through git integration and manage multiple environments with ease.

ARPA Is Quietly Funding Cheap ($50-$65 A Month) Community-Owned Gigabit Fiber Access To Long Neglected Neighborhoods

ARPA funds are enabling the deployment of affordable community-owned gigabit fiber networks in underserved areas, with prices ranging from $50-65 monthly for high-speed internet access. States like New York and Minnesota are leveraging these funds to build open-access infrastructure, challenging traditional telecom monopolies and treating broadband as an essential utility.

Breaking into dozens of apartment buildings in five minutes on my phone

A security researcher discovered widespread vulnerabilities in MESH by Viscount access control systems, affecting numerous apartment buildings primarily in Canada. The investigation revealed that 43% of recently exposed systems use default credentials, allowing unauthorized access to resident data and building entry control. Despite notification, the vendor Hirsch has not adequately addressed the security concerns.

Claude 3.7 Sonnet and Claude Code

Anthropic introduces Claude 3.7 Sonnet, a groundbreaking hybrid reasoning model featuring instant responses and extended thinking capabilities, alongside Claude Code for agentic coding tasks. The model demonstrates superior performance in coding and web development, with significant improvements in handling complex codebases and advanced tool usage. Available across multiple platforms, it maintains the same pricing while offering enhanced reasoning capabilities and GitHub integration.

Right to Repair Laws Have Now Been Introduced in All 50 US States

Right to Repair legislation has been introduced in all 50 US states, with five states already passing electronics repair laws covering one-fifth of Americans. The movement, supported by organizations like iFixit, PIRG, and Repair.org, has grown from a small advocacy effort to a nationwide campaign with increasing support from major tech companies like Google and Apple.