A comprehensive technical guide explaining the internal mechanisms and subsystems of PostgreSQL database system, covering versions 17 and earlier. The document serves as an educational resource detailing process architecture, query processing, concurrency control, and other crucial database management aspects, authored by Hironobu SUZUKI.
Recent bookmarks
Banish bots from your Waiting Room and improve wait times for real users
Cloudflare introduces two major Waiting Room enhancements: Turnstile integration to detect and manage bot traffic through an Infinite Queue system, and Session Revocation for optimizing user throughput. These features work together to reduce wait times, protect against automated threats, and ensure fairer access during high-demand events while maintaining a seamless user experience.
introducing tangled
Tangled introduces a decentralized Git collaboration platform built on the AT Protocol, featuring lightweight 'knots' for repository hosting and seamless network-wide access. The platform emphasizes data ownership, accessibility, and user experience while maintaining a social coding environment.
Mozilla lost touch with reality; how becoming rich through failure stunts mental & emotional growth
San Francisco-based startup Rewind has launched an AI-powered iOS app that lets users search through recordings of their daily conversations. The app continuously captures voice conversations, securely stores encrypted audio locally, and allows users to search through transcripts with advanced privacy features.
Civic Hax
After a 5-year legal battle, an Illinois FOIA lawsuit seeking database schemas from Chicago's parking ticket system ended in a unanimous Supreme Court loss, significantly broadening agencies' ability to withhold records. The case highlighted ongoing challenges in accessing public data through FOIA requests and revealed inconsistencies in how Chicago handles sensitive data disclosure.
Generative AI with Stochastic Differential Equations - IAP 2025
A comprehensive MIT course on flow matching and diffusion models in generative AI, covering mathematical frameworks and practical implementations across various data modalities. Students learn to build image diffusion models from scratch while gaining expertise in stochastic differential equations, with hands-on experience through three practical labs.
This Linux laptop maker called me a Zombie
A Linux laptop manufacturer MALIBAL exhibits concerning behavior patterns, including calling customers 'zombies', banning entire countries, and having restrictive website access policies. Their interactions with multiple Coreboot developers and contractors reveal aggressive communication, unrealistic expectations, and unprofessional conduct, particularly when faced with criticism or technical challenges.
About Google Chrome's "This extension may soon no longer be supported"
Google Chrome 127 will display warnings for uBlock Origin due to Manifest v2 deprecation in favor of Manifest v3. While uBlock Origin Lite (uBOL) exists as a Manifest v3 alternative, it offers reduced functionality compared to the original extension. Users will need to explicitly choose their preferred ad-blocking solution moving forward.
The Top 10% - A Wealth of Common Sense
Wealth concentration in the US continues to intensify, with the top 10% now owning 87% of stocks and controlling 50% of consumer spending. High-income households have increased their spending by 12% in 2023-2024, while working and middle-class spending declined, highlighting growing economic disparities.
Matt's Script Archive, Inc. :: Free Perl CGI Scripts
Matt's Script Archive offers a collection of free Perl and C++ CGI scripts for web development, including the popular FormMail script downloaded over 2 million times since 1997. The archive features essential web tools like guestbooks, counters, discussion forums, and search functionality, with most scripts being developed between 1995-2000.
Scroll Buddy
Scroll Buddy is an innovative website feature that replaces traditional scrollbars with animated characters that move as users scroll. Future versions will include skateboarders, rock climbers, and squirrels, with accessibility considerations for users with vestibular motion disorders.
SMAGIN
A detailed exploration of web security mechanisms explains the relationship between CSRF protection and CORS, highlighting how browsers handle cross-origin requests. The article discusses the evolution of SameSite cookie attributes and their role in preventing CSRF attacks, while examining how CORS enables controlled cross-origin resource sharing.
Hallucinations in code are the least dangerous form of LLM mistakes
Large Language Models (LLMs) producing hallucinated code methods is considered a minor issue since compiler errors immediately expose these mistakes, unlike prose hallucinations which require careful fact-checking. The author emphasizes that manual testing and code review remain essential skills, as LLM-generated code's professional appearance can create false confidence.
olduse.net - usenet archive nntp replay
A chronological overview of olduse.net, an interactive art installation that replays historical Usenet posts with varying time delays. The service now offers multiple NNTP ports allowing users to access Usenet archives with delays ranging from 40 to 45 years, providing an interactive way to experience early internet discussions.
Gödel's theorem debunks the most important AI myth. AI will not be conscious | Roger Penrose (Nobel)
Roger Penrose argues that AI systems are computational tools lacking true consciousness, which he believes requires non-computable physics beyond current quantum mechanics. He emphasizes that intelligence inherently involves consciousness, making the term 'artificial intelligence' misleading, and suggests that current AI systems process data without genuine understanding.
Pentagon guts national security program that harnessed social science
The Department of Defense is terminating numerous grants under the Minerva Research Initiative, which funds social science research for national security. Dozens of researchers studying topics like violent extremism, disinformation, and climate change threats have had their funding cut, signaling a possible end to the 15-year-old program. The initiative's $46.8 million funding supported crucial research on security challenges, from AI applications to drug cartels.
The lost boys: how a generation of young men fell behind women on pay
Young women aged 16-24 are earning approximately 10% more than their male peers across both white and blue-collar jobs, marking a historic shift in wage dynamics. The Centre for Social Justice report reveals a concerning trend where young men are significantly underperforming compared to women in education and other key metrics.
Geothermal Power Is a Climate Moon Shot Beneath Our Feet
Scientists and companies are exploring geothermal energy as a potential clean, unlimited power source that could meet global energy needs. The FORGE project in Utah is developing techniques to harvest underground heat through enhanced geothermal systems, while companies like Quaise and GA Drilling are pursuing deeper drilling technologies. Despite technical challenges and seismic risks, recent successes have attracted investment from major tech companies and utilities.