Links für 2023 KW 50
Meine „Wollte ich noch Lesen“-Liste, zusammengefasst von LlongOrca.
The Guns Were Said to Be Destroyed. Instead, They Were Reborn.:
In Flint, Michigan, the city announced that 68 assault weapons collected during a gun buyback would be incinerated due to their policy of not reselling firearms. However, these guns were instead sent to a private company that collects and destroys parts of each weapon before selling the rest as nearly complete gun kits. Hundreds of towns and cities have turned to this industry for destroying guns used in crimes or surrendered during buybacks, but many don't know that these weapons are recycled into civilian hands without background checks.
The article discusses the video editing software Pitivi which is free and open source. It is designed to be flexible, efficient, and easy to learn while maintaining stunning elegance. Pitivi supports various languages and integrates seamlessly with the GNOME desktop environment. The software comes packed with features like animated effects, transitions, filters, audio waveforms, unlimited video/audio track layers, fast zooming, mousewheel integration, automatic project backups, and more. It also offers full undo/redo history and accepts multiple formats.
On the occasion of Doom's 30th anniversary, id Software co-founders John Carmack and John Romero reunited for a conversation about the legendary FPS game. The discussion was moderated by David Craddock and included insights into how they viewed their own work critically as well as warm reminiscences about creating Doom. Both developers expressed appreciation for the technical limitations of the time and their creations' legacy that continues to this day.
Google Just Denied Cops a Key Surveillance Tool:
Solntsepek, a hacker group previously linked to Sandworm, claimed responsibility for a disruptive attack on Ukrainian internet and mobile service provider Kyivstar. As Russia's kinetic war against Ukraine continues, the country has launched an official crowdfunding platform called United24 to raise awareness and aid in rebuilding efforts. Kytch, a small company that aimed to fix McDonald's often-broken ice cream machines, claims it has discovered a „smoking gun“ email from the CEO of McDonald's ice cream machine manufacturer implying an alleged plan to undermine Kytch as a potential competitor. Microsoft's Digital Crime Unit refines strategies that combine intelligence and technical capabilities with legal tactics to disrupt global cybercrime and state-backed actors. Geofence warrants, which require tech companies to provide data on users in a specific area at a particular time, have become an increasingly powerful tool for law enforcement but are criticized for violating the Fourth Amendment. Apple has added new security features designed to protect user data from thieves and accounts. A group of Chinese hackers known as Volt Typhoon has targeted power grids and critical infrastructure in the Pacific region and US, raising alarms across the cybersecurity industry. Cox Media Group (CMG) is an advertising company that claims it can eavesdrop on conversations via devices like iPhones and Amazon Echoes but hasn't been verified as working as advertised.
The Epic question: how Google lost when Apple won:
Apple has an iron fist control over the iPhone App Store, while Google allows users to sideload apps on Android devices. A court ruled that Google had maintained an unlawful monopoly with the Play store. The case involved documents showing deals between Google and partners, as well as evidence of internal communications being deleted intentionally.
Mutzenbraten von ebkade52| Chefkoch:
This article is a recipe for a German Black Pork Roast (Zutaten) using ingredients like pork, marjoram, thyme, onion, garlic, and black beer. The meat is marinated in the black beer overnight, then baked in an oven with margarine. To serve, it is topped with a sauce made from the roasting pan juices and served with sauerkraut and strong bread.
Interview: The Threat of Self-Censorship in Science:
In a recent paper published in The Proceedings of the National Academy of Sciences, behavioral scientist Cory Clark argues that censorship often comes from within science as researchers choose to avoid certain areas of research or publish controversial results. This form of censorship is driven by self-protection, benevolence toward peer scholars, and prosocial concerns for the well-being of human social groups. Clark believes many disputes between scientists could be resolved if they worked together. To foster collaboration, she serves as director of the Adversarial Collaboration Project at Penn, which aims to bring together scientists with differing viewpoints.
Andy Matuschak - Self-Teaching, Spaced Repetition, & Why Books Don’t Work:
In summary, the article discusses various aspects of learning and memory with a focus on spaced repetition as an effective tool for memorization and understanding complex subjects. The conversation also touches on topics such as self-teaching, the role of confusion in learning, how to structure effective self-teaching, and the importance of attention and effort in the learning process. It further explores the value of memory in decision making, creativity, and problem solving, and discusses the potential impact of LLMs (Large Language Models) on memorization practices. The article also touches on different pedagogical tools like video games, streaming, and hypertext for enhancing learning experiences. Finally, it delves into the challenges and opportunities associated with crowdfunding research projects in technology.
Hitchhiker's Guide To Moving From Relational Data To Events - Event-Driven.io:
The article „Hitchhiker's Guide To Moving Relational Data To Events“ discusses the end of CRUD (Create, Read, Update, Delete) world and the transition to Event Sourcing as a way to optimize information quality over storage size. It recommends starting by modeling the process by discovering events, finding commands or intentions, and defining business rules. The article also provides tips on migrating relational data to document-based models by identifying stream boundaries and avoiding retrofitting old information.
TODO
Data dispatch #4: the falling nutritional value of crops:
The mineral content of wheat and rice has decreased over the past sixty years due to factors like the Green Revolution in agriculture, which led to higher crop yields but lower mineral content. As a result, people may need to consume more fruits and vegetables to obtain the same amount of essential minerals as before. This decline in nutritional value can contribute to micronutrient malnutrition, particularly in low-income countries.
ⓍTTS - TTS 0.22.0 documentation:
The XTTS model is a super cool Text-to-Speech (TTS) model that uses the Tortoise framework and allows users to clone voices in different languages by simply providing a quick 3-second audio clip. It offers several impressive features, including cross-language voice cloning, multi-lingual speech generation, a 24 kHz sampling rate, and streaming inference with latency under 200ms. Additionally, it supports fine-tuning for further customization. The XTTS model is currently available in 16 languages, such as English, Spanish, French, German, Italian, Portuguese, Polish, Turkish, Russian, Dutch, Czech, Arabic, Chinese, Japanese, Hungarian, and Korean, with plans to add more languages in the future.
The XTTS Model is licensed under the Coqui Public Model License, and users can communicate with the community through Discord and Twitter or by contacting Coqui at info@coqui.ai for any assistance. To use the model, there are various command-line tools, API support, and an optional GPT encoder training feature.
‘Head-scratcher’: first look at asteroid dust brought to Earth offers surprises:
In just 2.5 months since NASA's first asteroid sample-return mission landed on Earth, more than 70 grams of asteroid dust and pebbles have been carefully retrieved from the spacecraft's canister. This is ten times the amount brought back from an asteroid previously and more than necessary for declaring the mission a success. Some pebbles contain puzzling chemical element combinations. The research team discovered that 2 out of 35 screws fastening the canister lid couldn't be removed, blocking further access to the space rocks. NASA is now making specialized screwdrivers for this purpose. Early analysis suggests the Bennu fragments are rich in volatile chemical compounds dating back over 4.5 billion years and may contain building blocks of life.
EU capitals want media law carve-out to spy on reporters:
European Union governments are considering granting themselves permission to spy on journalists in the name of national security, despite calls for greater scrutiny over surveillance tools. Governments' deputies will likely approve an exemption in the new media regulation, which was originally created to protect media independence and pluralism. Critics argue that this could give countries a free pass to snoop on reporters, while privacy advocates and journalist organizations push for stronger legal safeguards against spyware deployment. The final decision is yet to be made, as the Council must negotiate with the Parliament before new rules can take effect.
what-happens-brain-while-daydreaming:
This article discusses research on daydreaming in mice conducted at Harvard Medical School. The study found that during quiet waking periods, mice displayed patterns of neural activity similar to when they viewed an image, suggesting they were daydreaming about it. These early daydreams could predict the changes in brain response over time, potentially indicating their role in brain plasticity and learning. Further research is needed to confirm these findings and explore if a similar process occurs in humans. The study also aligns with other evidence showing that quiet wakefulness after an experience can improve memory and learning.
Data exfiltration from Writer.com with indirect prompt injection:
Thank you for summarizing the article. The main issue discussed is a vulnerability in Writer.com that allows attackers to steal users' private documents through manipulation of the language model used for content generation. This vulnerability has not been fixed yet, as it was not initially triaged as a security issue by Writer.com after disclosure. The authors demonstrate various examples of how this vulnerability can be exploited, and provide resources to learn more about LLM security risks.
In the early 2000s, the author used XMPP to communicate with friends via their personal ejabberd server and Google Chat. However, they noticed that some friends stopped responding to messages despite being online. Over time, this issue affected more people until no one responded anymore. The author initially assumed their friends lost interest in talking but later found out through alternative means that the messages were never received due to a silent breakage by Google's service. This experience left them feeling hurt and they warn against big companies joining federated communication protocols like ActivityPub, advocating for supporting cooperative and community-run services instead.
McDonald’s Ice Cream Machine Hackers Say They Found the ‘Smoking Gun’ That Killed Their Startup:
In this article, Kytch, a small startup company that developed a device designed to fix McDonald's famously out-of-order ice cream machines, faced legal threats and betrayal from its partners. They allege that Taylor, the soft-serve machine maker, helped engineer McDonald's email warning franchisees against using Kytch's product due to potential competition. The startup is now involved in a legal battle with Taylor for alleged trade libel, tortious interference, and other claims.
4 simple software engineering habits that transformed my productivity:
In this article, the author shares four key habits that have significantly improved their software engineering productivity. Firstly, they emphasize the importance of maintaining a flow state when programming, as it can lead to increased efficiency and better results. The second habit is learning keyboard shortcuts for various tools and programs in the workflow, which can save time and enhance comfort during coding sessions. Thirdly, the author suggests keeping an organized list of common commands and references for quick access when needed. Lastly, they discuss the value of saying „no“ to tasks or activities that may not be relevant, valuable, or essential at a given point in time. This allows individuals to focus on their current priorities and avoid spreading themselves too thin. The author also mentions SWE Quiz, a software engineering question resource that can help improve knowledge and confidence in the field.
Microsoft defends Edge's predatory practices with cringe and audacious reply on X:
The article discusses a negative experience with the Microsoft Edge Chromium browser in December 2023, where the company's controversial practices and lack of user-friendliness led to outrage among users. Despite users voicing their complaints on social media, Microsoft Edge's official account often ignored them. One user @cadenzza_ shared a screenshot of an upsell promoting Bing as the default search engine without a clear „No“ button, prompting a poorly handled response from the Microsoft Edge account. The situation resulted in users expressing their dissatisfaction and considering alternative browser options or even uninstalling Edge altogether.
The article discusses how individuals prefer fragmentation when dealing with large-scale software development, often choosing arbitrary lines of decomposition and neglecting to consider dependencies between different pieces. This practice can lead to complex systems where the overall behavior does not match that intended by the developer. Encapsulation is presented as a better alternative to fragmentation, as it hides rough edges and prevents complexity from becoming unmanageable.
The Stanford Prison Experiment was massively influential. We just learned it was a fraud.:
The Stanford Prison Experiment, conducted in the early 1970s by psychologist Philip Zimbardo, is one of the most famous and influential psychological studies of all time. The experiment involved assigning paid participants to play the roles of „inmates“ or „guards“ in a mock prison setting at Stanford University. However, recent revelations based on previously unpublished recordings of Zimbardo and interviews with his subjects suggest that the guards were coached to be cruel and that one of the experiment's most striking moments was staged. These findings have led many psychologists to call for the removal of this study from introductory textbooks and question its impact on popular understanding of human nature and behavior. The Stanford Prison Experiment is not the only classic psychological experiment to be reevaluated or discredited in recent years; others include the „Robbers Cave“ experiment, the Milgram electroshock test, and the marshmallow test.
5 shortcomings of Helm | Glasskube:
The article discusses the shortcomings of Helm, a popular deployment tool for Kubernetes. The author argues that Helm falls short in several areas, such as handling upgrades, managing dependencies, user-friendly creation, using values.yaml files, and interacting with the Kubernetes API. As a result, Glasskube is proposed as an alternative solution to overcome these limitations and provide a more dynamic deployment method for modern software deployments on Kubernetes.
‘It’s all gone’: CAR-T therapy forces autoimmune diseases into remission:
Engineered immune cells have successfully treated 15 people with autoimmune disorders, resulting in a disease-free or nearly symptom-free status since treatment. This approach, known as CAR-T cell therapy, holds promise for potentially treating other conditions caused by rogue immune cells producing antibodies against the body's own tissues. The success of these treatments, although preliminary, has generated excitement in the medical community due to its potential applications.
Maybe Getting Rid of Your QA Team was Bad, Actually.:
This article discusses how DevOps practitioners have applied Theory Of Constraints to optimize delivery pipelines and practices over the years. However, they missed treating quality assurance (QA) as a priority issue. The author claims that this has led to low-quality software and increased problems in organizations. The article highlights how defect tracking, bug triage, defect investigation, focus on QA, and end-to-end testing are important aspects of maintaining software quality that should not be overlooked.
Texas A&M Researcher Says Men Should Abstain From Drinking At Least Three Months Prior To Conceiving:
In an article published by Texas A&M University researchers, it was found that the effects of alcohol consumption on a father's sperm last longer than previously believed - longer than a month. This discovery emphasizes the importance of fathers abstaining from alcohol at least three months prior to conceiving in order to prevent potential birth defects and support healthy pregnancy outcomes.
Johann Karl August Musäus: Volksmärchen der Deutschen:
The text provided is an excerpt from the book titled „Johann Karl August Musus: Volksmrchen der Deutschen“ by Johann Karl August Musus. This book contains a collection of German folktales and legends, which are based on traditional stories that have been passed down through generations. The specific part you've shared is about a knight named Friedbert who becomes enamored with a Greek woman named Zoe during his stay in Greece. The narrative follows the challenges he faces due to his love for her and the various obstacles he encounters while trying to be with her.
The writing style of this text is quite elaborate, using descriptions and language that might not be easily understood by modern readers who are not familiar with older German literature. This could make it more challenging to read and comprehend for those unaccustomed to this type of writing style.
In summary, the text provided comes from a book filled with traditional German folktales, including one about a knight's complicated love affair with a Greek woman named Zoe. The style and language used in this excerpt may be difficult for modern readers who are not familiar with older German literature.
Johan Inger, a Swedish choreographer, is known for his successful literary adaptations of Carmen and Peer Gynt. Now, he turns to the classical ballet masterpiece Swan Lake. This timeless tale of love and betrayal has been given a new perspective by Inger, with a focus on deeper questions about the impact of violence and manipulation on human relationships, as well as the role of personal freedom, respect, and acceptance in romantic relationships.
How Police Have Undermined the Promise of Body Cameras:
number of complaints against police and instances of misconduct once body cameras were introduced.In New York, there have been efforts to use footage to better police conduct. A pilot program was launched last year that allows officers with histories of excessive-force complaints to record their interactions with civilians. But the department has not given direct access to its entire force's footage to outside review boards or oversight agencies, which is required in some other cities. And even as it refuses to change, other technology has emerged that could transform how body cameras are used and whom they hold accountable. In January, a federal appeals court ruled that the police department's withholding of footage violated the Freedom of Information Act, paving the way for outside oversight agencies to gain access.„We need to change the narrative around body-worn cameras,“ says Nicole Napolitano. „They can be an incredibly powerful tool for accountability and transparency but only if the agency holding them is independent from the department they are supposed to oversee.“
The article discusses how online shopping experiences have become like casinos with their excessive product offerings at low prices. Platforms such as Temu, Flip, TikTok Shop, and Shein are mentioned for exploiting users' shopping habits to drive profits while creating an addicting environment that keeps people coming back for more deals. The author argues that these platforms mimic the gambling experience with their constant updates, promotions, and games designed to keep users engaged in order to maximize revenue from advertising or shopping commissions.
AMD's New Threadripper Chips Have a Hidden Fuse That Blows When Overclocking Is Enabled:
AMD uses a hidden fuse in its Threadripper 7000 series processors that blows when overclocking is enabled. This does not automatically void the warranty but informs AMD of potential damage caused by overclocking if it occurs. Overclocking is supported on these CPUs, but any resulting damage will void the warranty.
It appears that the article is discussing the challenges faced by software delivery stakeholders due to cybersecurity programs and their gatekeeping nature. The author argues that these programs should not be seen as special snowflakes, but rather work collaboratively with other teams to make cybersecurity more constructive and less constrictive. The article presents various opportunities for improving the current situation, such as self-certification, following platform/SRE's lead, building standardized patterns, abandoning the perimeter model, providing an advisory service, integrating security into infrastructure, conducting user research, and focusing on sustained resilience.
Open Source: Cyber Resilience Act könnte EU-Unternehmen erheblich schaden:
Summary: The Cyber Resilience Act (CRA) has raised concerns among the open-source community due to its potential impact on software development in Europe. In an interview, Mike Milinkovich, Executive Director of the Eclipse Foundation, discusses how the CRA could change the landscape for open-source software and suggests that companies prepare themselves by working closely with organizations like the Eclipse Foundation. Milinkovich also emphasizes that while politicians may not understand the role of open-source in innovation and economic growth, it's vital to communicate its importance to secure Europe's future technological well-being. The CRA is still under debate, and the final version will determine its impact on the open-source industry.
Leverage Points: Places to Intervene in a System:
The article titled „Leverage Points: Places to Intervene in a System“ by Donella Meadows is about understanding complex systems, identifying leverage points within them, and using these points for effective intervention or change. The author defines leverage points as areas where one can apply influence to produce significant changes in the system's behavior.
Meadows begins by explaining that people often have an intuitive sense of what might be a leverage point but may not know how to use it effectively, or they might use it incorrectly, leading to counterproductive results. She then introduces a list of 12 leverage points, ranked from the least effective (parameters) to the most powerful (transcending paradigms).
Here's a detailed breakdown:
- Constants, parameters, numbers (such as subsidies, taxes, standards): These are the settings or rules that can be adjusted within a system, like changing the speed limit on a road. While they may seem like easy targets for change, Meadows argues that tweaking these often doesn't lead to significant long-term changes in behavior.
- The sizes of buffers and other stabilizing stocks relative to their flows: Buffers help absorb shocks or fluctuations within a system. For example, maintaining high levels of water supply can prevent droughts, but too much buffer can make the system inflexible. This point is about finding the right balance in these reserves.
- The structure of material stocks and flows and nodes of intersection: This involves understanding how physical components interact within a system. For example, changing the layout of roads or buildings can significantly impact traffic flow and pollution levels.
- The lengths of delays relative to rates of change: Delays in feedback loops are critical determinants of system behavior. If there's too much delay between cause and effect (like waiting for approval from multiple layers of management), it becomes difficult to control the system effectively.
- The strength of negative feedback loops relative to their impacts: Negative feedback loops help stabilize a system by counteracting changes that deviate from its normal state. For example, if someone's blood sugar levels rise too high, negative feedback mechanisms like increased insulin production bring them back down. Weaknesses in these feedback systems can lead to instability or collapse.
- The gain around driving positive feedback loops: Positive feedback loops are self-reinforcing and can cause rapid growth or decay within a system. This point is about understanding where such loops exist and how they might be influencing the system's behavior, with an emphasis on controlling their power to prevent runaway effects.
- The structure of information flows (who does and doesn't have access): Information plays a crucial role in systems. For instance, making financial data transparent can lead to more informed decision-making and potentially reduce corruption. This point is about ensuring that the right people have access to accurate and timely information for effective system management.
- The rules of the system (incentives, punishments, constraints): Rules define what's allowed or not in a system. For example, traffic laws dictate how vehicles must behave on roads. This point is about understanding these rules and their potential impact on system behavior.
- The power to add, change, evolve, or self-organize system structure: This involves the ability of a system to adapt and change over time in response to new information or challenges. For example, biological evolution allows species to survive changing environmental conditions.
- The goals of the system: Every system has underlying objectives that drive its behavior. For instance, a company might aim for profit maximization while a government may prioritize social welfare. This point is about understanding and potentially influencing these goals to align with desired outcomes.
- The mindset or paradigm out of which the system arises: Paradigms are deeply ingrained beliefs or assumptions that shape our understanding of reality. For example, one might believe in a free market economy versus state control. Changing such paradigms can lead to profound shifts in how systems function.
- The power to transcend paradigms: This is the highest leverage point identified by Meadows. It involves letting go of rigid beliefs and being open to multiple perspectives. By doing so, one can approach problems with greater flexibility and find innovative solutions that might have been invisible from within a specific paradigm.
The article concludes with a cautionary note about the difficulty in accessing these leverage points due to resistance from the system itself. Meadows suggests that true mastery often involves strategic letting go rather than pushing for change, and that this process can lead to profound personal growth and empowerment.
The Death of Decentralized Email:
The history of SMTP (Simple Mail Transfer Protocol) shows the challenges and lessons learned in scaling email infrastructure over the past four decades. The article discusses the evolution of spam prevention measures, the rise of centralized email providers, and the eventual decline of SMTP as a decentralized protocol for email communication. It highlights the importance of learning from history to avoid repeating mistakes in implementing new technologies.
OpenCola/recipe.markdown at master · cognitom/OpenCola:
OpenCola is an open-source project forked from mmichelli/Coca-Cola, and has received 7 forks and 109 stars.
GitHub - cognitom/OpenCola: Coca-Cola:
The article discusses Coca-Cola's secret formula and how third parties have attempted to replicate it unsuccessfully. The text also mentions a Cube-Cola version, OpenCola (an open source Coca-Cola project), and the original ingredients of Coca-Cola.
The newsletter signup process involves users entering a valid email address to receive updates on a particular topic or subject matter. However, if an invalid email address is entered, an error message will be displayed instead of confirming the subscription. This system ensures that only correct and functional email addresses can be used for successful subscriptions.
This article introduces llamafile, an open-source project that allows users to run large language models (LLMs) such as LLaMA and GPT-3 on their own computers using simple one-liner commands. It provides examples of different tasks that can be accomplished with llamafile, including image summarization, URL summarization, librarian chatbot, code completion, and email composition. The article explains how to download and use the project for various purposes and emphasizes the importance of following best practices when interacting with LLMs on the command line.
All the Carcinogens We Cannot See:
This article discusses the possibility that certain carcinogens may not directly cause cancer but instead promote its development by triggering an inflammatory response or otherwise acting as promoters. The research mentioned in the article suggests that fine-particulate air pollution may be a factor in lung cancer among nonsmokers, likely through this mechanism. Other examples include asbestos and croton oil, which have been associated with cancer but not through their mutagenicity or DNA damage-inducing properties. The findings emphasize the need for further study into environmental factors and inflammation in carcinogenesis.
Apple's new iPhone security setting keeps thieves out of your digital accounts:
This article discusses a variety of topics and opinions related to technology, with users sharing their thoughts on various aspects of the subject matter. The discussion involves user names such as gojomo, Zapped, brookst, kotaKat, and others, who post their opinions in response to previous posts.
Elektronische Patientenakte: "Für Datensicherheit bleibt kaum Zeit":
To summarize, the German government plans to introduce electronic patient records for all insured patients by 2025, called ePA or elektronische Patientenakte. This means that health data will be shared amongst research facilities and public health institutions within the EU, eventually worldwide. The initial plan was that data would automatically be extracted from these electronic patient records of the legally insured. However, this has been met with criticism and not everyone agrees it's a good idea. This is because the ePA was initially designed for better care for patients, not as a tool to make their health data available.
In an interview with Bianca Kastl, who works on digital infrastructure in public healthcare, she mentioned that research should be done using large central databases rather than through comprehensive data collection from numerous locations. She also discussed the idea of having patients store their own electronic medical records and only granting access to specific research teams when needed, but this approach would require a high level of digital literacy among the general population.
Another concern is the possibility of cyberattacks resulting in unauthorized access to health data. The storage and sharing of electronic patient records could create vulnerabilities that malicious actors can exploit. Additionally, there are concerns about how privacy will be protected in an environment where data is continually being shared amongst multiple parties.
Despite these risks, Kastl believes that digital healthcare solutions have the potential to significantly improve patient care and medical research. However, she emphasizes that cybersecurity measures must be taken seriously to ensure safety and privacy for all involved in this new digital healthcare landscape.
Asahi Linux: Youtube setzt Videoqualität auf ARM-Rechnern herunter:
Asahi Linux has found a strange bug on YouTube. According to Hector Martin, the founder and main developer of Asahi Linux, YouTube reduces video quality significantly when used with Firefox on his platform. The Asahi Linux is an ARM-based native port for Apple Silicon Macs. Martin believes that this is due to YouTube setting the standard resolution at 1080p, which drops down to 480p for computers with two or fewer cores and further to 240p on all ARM machines.
He also believes that Google assumes that ARM machines are five times worse than Intel systems, even if they have 20 cores or more. To solve this issue, Martin suggests using User-Agent spoofing in the Firefox package for Asahi Linux distribution, which allows users to enjoy YouTube videos of good quality. Additionally, he calls on Mozilla developers to change the user agent setting on Linux platforms to x86 permanently as well, as it is already done in Windows and MacOS.
This is bigger than COVID: Why are so many Americans dying early?:
This article discusses the concerning trend of excess deaths in the United States beyond COVID-19, with life insurers reporting alarming rates. It highlights how young working-age individuals are disproportionately affected and calls for an investigation into post-pandemic measures taken during COVID-19 to protect future generations.
Most companies using AI are ‘lighting money on fire,’ says Cloudflare CEO Matthew Prince:
The Fortune Brainstorm AI conference featured Matthew Prince, co-founder and CEO of Cloudflare, expressing his concerns about the recent generative AI boom, stating that most companies investing in AI are „lighting money on fire.“ He highlighted issues such as the shortage of GPUs and lack of competition. In contrast, Jennifer Tejada, chairperson and CEO of PagerDuty, shared a more optimistic outlook, emphasizing the importance of simplicity in AI strategies, employee involvement, and training for the workforce to adapt to AI transformation.
10 Peer-Reviewed Scientific Studies that Link Glyphosate to the Destruction of the Microbiome:
Glyphosate, a widely used herbicide in agriculture, has been the subject of numerous studies due to its potential health risks. The impact on the human microbiome, specifically gut bacteria, is an area of concern. Studies have shown that over half of the bacterial strains in the human microbiome are sensitive to glyphosate, potentially disrupting its balance. Exposure to low-dose glyphosate was found to decrease beneficial bacteria and increase harmful ones, affecting gut homeostasis and inflammation. Glyphosate exposure can also influence neuropsychiatric conditions like depression and anxiety, impacting mental health. Additionally, it has been associated with alterations in the urine metabolome and changes to metabolic health and inflammation. Some studies indicate that glyphosate could lead to alterations in bacterial species' abundances, increasing the risk of obesity and metabolic disorders. Moreover, it is found to cause changes in the gut microbiota of aquatic organisms like fish and crayfish, affecting overall health. Finally, glyphosate exposure may alter the soil microbial community and its functions, with implications for nutrient cycling and plant growth.
Plane is an open-source software development tool that helps manage issues, sprints, and product roadmaps. Users can create a Plane Cloud account or self-host the tool. Key features include issue planning and tracking, customizable layouts, cycling tools for organizing sprints, and more. The community can contribute to the project through GitHub Discussions and the Plane Discord server.
professor-in-jordan-sues-sleuth-who-exposed-citation-anomalies:
A PhD student, Solal Pirelli, exposed potential citation fraud by blogging about dubious conferences linked to Shadi Aljawarneh, a computer science professor. The blog post led to legal threats and a lawsuit from Aljawarneh's lawyer, but the charges were dismissed by the public prosecutor. Despite this, an appellate court allowed the case to proceed. Pirelli remains unfazed as truth spoken in the general-public interest is a defense to libel or slander under Swiss law. The blog post also led to the cancellation of an upcoming conference and Aljawarneh's removal from the editorial board of PeerJ Computer Science.
The article discusses the role Twitter played in mass media communication for over a decade, starting from breaking news, live sports commentary, politics, celebrity behavior, and more. It highlights how the platform became a vital tool for newsgathering and a symbol of power and influence. However, it also mentions the downsides such as concentration on Twitter leading to groupthink and manipulation by online harassment, driving away ad clients to social platforms with better ad products, and breaking traditional news media business models. The article concludes by suggesting that fragmentation in social media might be beneficial for journalism overall, allowing for more experimentation and a healthier landscape.
Before Elon, Twitter was an idealist’s workplace:
In the early 2010s, Twitter was a powerful platform that played a significant role in events such as the Arab Spring and Occupy Wall Street. The company's culture was focused on happiness of its employees, unlike other tech companies like Goldman Sachs, where employees were constantly under pressure to make money. However, with recent changes and controversies surrounding content moderation, Twitter's cultural influence has declined significantly. In 2021, Elon Musk purchased the company for $44 billion, bringing a new direction and further changes.
Why Amazon Has No Profits — Benedict Evans:
The article discusses the financial strategies behind Amazon's business model and how it manages to achieve high revenues without necessarily showing profits on its balance sheets. It explains that Amazon is structured into multiple segments, each with their own internal profit and loss statements and a degree of autonomy. Additionally, third-party sales contribute significantly to the company's total unit sales and account for close to half of them.
The author emphasizes that looking at net income alone does not provide an accurate picture of Amazon's business activities as it only focuses on how much money is left over after expenses each quarter. Instead, they recommend examining cash flow statements, which are more reliable in reflecting the actual financial performance of a company. The article also highlights that Amazon has consistently increased its capital expenditure (capex) to support its growth and expansion plans, particularly in fulfillment capacity and AWS.
The article ends with a question about whether investors should continue putting their money into Amazon based on the belief that Jeff Bezos can capture a significant portion of the future of commerce.
The houses built to survive floods:
The Manobo indigenous people living in the Philippines have developed a unique technique for building floating homes which allow them to thrive amidst frequent storms and floods. Their houses are built on raft-like platforms made of bamboo and balsa wood, anchored using heavy-duty ropes and vines coiled around bangkal trees native to the area. This technique has proven effective in withstanding extreme weather events such as Typhoon Bopha in 2012. Researchers are now interested in these traditional methods for adapting to and preparing for increasingly extreme weather due to climate change. Indigenous communities like the Manobo possess valuable knowledge and practices that could contribute to sustainable solutions for urban areas threatened by floods and rising sea levels, especially in archipelagic countries.
Your code displays Japanese wrong:
This article explains how text display issues can occur when the wrong glyph set is used for displaying Japanese characters. It highlights that this issue is particularly important to consider since it may cause misunderstandings for native Japanese speakers who are used to specific character appearances. The article also provides suggestions on how to fix these display problems, such as marking elements with lang=ja in web development or generating separate font atlases for each language in game development.
The mysterious second parameter to the x86 ENTER instruction:
The x86 instruction set has an ENTER instruction that builds a stack frame. Values greater than zero for the second parameter are intended for languages like Pascal which support nested functions that can access the local variables of their lexical parents. When using enter instructions, the designers of the x86 instruction set receive an array of pointers to lexical parent frames rather than a pointer to the start of a linked list of lexical parent frames. This approach reduces the number of instructions required for accessing faraway frames but increases the cost of function calls due to additional copying.
Why You Should Stop Reading News:
The article discusses how our obsession with being informed leads to consuming more news, which contributes to misinformation rather than making us well-informed. It highlights that due to increased accessibility and lower production costs, the quality of news has declined over time. The author suggests reducing reliance on news consumption and focusing on better information sources instead. They also advise questioning the authenticity, relevance, and importance of the information consumed and finding ways to spend less time consuming unimportant information.
The Secret Behind Qualcomm's Margins? Patents:
Apple is developing its own wireless modems to bypass Qualcomm's chips and potentially avoid the company's patent licensing strategy. Qualcomm, a San Diego-based chip manufacturer, has higher profit margins than most semiconductor firms due to its unique patent licensing approach. This approach allows Qualcomm to double-dip on revenue streams and achieve some of the best margins in the industry. The company's success with patents has attracted attention from the Federal Trade Commission and faced monopoly accusations, but their patent strategy is a lesson many companies can learn from.
The Right of Self-Defence - Craig Murray:
The International Court of Justice (ICJ) ruled in 2004 that Israel's construction of its wall, which is part of the Israeli Apartheid system, was illegal. The court found that Israel's argument of self-defence did not justify the numerous breaches of international law represented by the Wall. As a result, Israel cannot use „self-defence“ as a trump card to tear up international law in the current situation in Palestine. Furthermore, the ruling implies that the Palestinians have the right of self-defence. The BDS movement is acting in line with the obligations set out by the ICJ, while states attempting to ban it are acting against those obligations.
Attacking Journalists as Terrorists - Craig Murray:
The article discusses the author's experience with police harassment and incarceration for Contempt of Court, as well as issues related to the UK Terrorism Act. Two formal complaints have been made to the UN High Commissioner for Human Rights regarding these matters, with plans to provide further details about other people who have faced similar treatment due to their dissenting opinions. The author argues that the access granted by the Act to people's electronics is an invasion of privacy and should not be permitted, citing Dr John Laughland's case as an example. The author also mentions the recent UK government proposal to grant state full access to individuals' bank accounts receiving state benefits. The author expresses his reliance on voluntary subscriptions for keeping the blog going and the importance of alternative voices in journalism.
The hidden depths of the input element - HTMHell:
The <input> element is a versatile component in HTML, offering various types with different behaviors and visual appearances. This article explores lesser-known attributes that enhance the usability, accessibility, and adaptability of these elements to different situations. Attributes include inputmode for optimizing keyboard control; readonly attribute for preventing user changes while still keeping the content accessible; capture attribute for triggering camera access on devices; spellcheck attribute to enable browser's built-in spell checking capabilities; autocapitalize attribute for controlling capitalization of text inputs, and autocomplete attribute for providing hints to fill in input fields with data the browser already knows.
The Amazon article showcases the ELECOM Relacon Handheld Trackball Mouse, a thumb-controlled trackball mouse available for both left and right-handed users. It features Bluetooth connectivity and an ergonomic design with a 10-button function. The optical gaming sensor ensures smooth and accurate tracking, while the red ball adds a unique touch to its appearance. This product is compatible with Windows 11 and macOS systems.
The article provides a brief overview of Alibaba Group, which includes platforms such as AliExpress, Alimama, Alipay, and more. The aim is to offer diverse services including shopping, payment processing, logistics, and technology. These services are available in various regions across the globe.
#14: Why Europe Fails to Create Wealth:
The European Union's recent passage of the AI Act has been met with both praise and criticism. The regulations set forth in the act aim to govern the usage of artificial intelligence across the EU, prohibiting certain applications and providing permissible frameworks for others. While some argue that this legislation will hinder innovation and technological growth, proponents suggest it will create a safer environment for users and protect against potential misuse of AI technology. The act also applies to conventional tools like facial recognition, indicating its broad impact on various industries. However, critics worry about the long-term consequences this legislation may have on Europe's competitiveness in global technological advancements.
Herds of Mysterious ‘Glacier Mice’ Baffle Scientists:
In 1950, Icelandic researcher Jn Eyrsson discovered strange mossy green balls on Hrtrjkull Glacier in southeast Iceland, which he named „glacier mice“ or „Jkla-ms“. Despite their cuteness and curiosity, they are not actual mammals. These moss balls form around an irritant like a rock or dust, making them solid mossy pillows. They can be found in various parts of the world, but their movement remains a mystery. Researchers have observed that they may move to shield ice from melting, but further investigations are needed to explain this behavior better.
Ego killed the empowered product team:
Marty Cagan's article on Product teams vs Feature Teams highlights the differences between the two models. Empowered product teams are characterized by collaboration, problem-solving, and achieving outcomes, while feature teams are more focused on shipping products with low levels of collaboration and autonomy. Ego and lack of trust can prevent an empowered product team from thriving. By measuring wins and improvements in the process, leaders can gain trust in their product teams and contribute to better results for both customers and businesses.
L take & W take: Was bedeutet der Internet-Slang?:
Die Internet-Slangbegriffe „L take“ und „W take“ werden mittlerweile auch im allgemeinen deutschen Sprachgebrauch verwendet. Sie stehen für „Verlierer Ansicht/Einstellung“ und „Gewinner Ansicht/Einstellung“. Die Begriffe werden meist als Zustimmung, Ablehnung oder Beschreibung einer Aussage genutzt und können auch mit Adjektiven ausgeschmückt werden.
Automate Podcast transcripts with OpenAI/Whisper:
In this article, the author describes their experience of using OpenAI's Whisper for transcribing podcasts in German. They provide a Dockerfile to install Whisper into a Docker image, detailing how to allocate resources and execute it on an audio file. The author shares their positive experiences with Whisper, highlighting the quality of the generated transcripts. They encourage others to use Whisper for similar purposes and invite feedback.
Earliest Carpenters - Archaeology Magazine:
A recently discovered pair of interlocking logs dating back nearly half a million years in Zambia's Kalambo River indicates that the world's earliest known wooden architecture existed much earlier than previously thought. This discovery, led by University of Liverpool archaeologist Larry Barham, challenges previous understanding of human capabilities in the past, as it predates the appearance of modern humans by 150,000 years and was likely created by the archaic human species Homo heidelbergensis. The structure may have been part of a walkway or foundation for a platform built over wetlands, while also uncovering stone axes and four wooden tools that date back between 390,000 and 324,000 years ago.
How Africans Are Changing French — One Joke, Rap and Book at a Time:
Africans are significantly influencing the French language by changing it through humor, music, and literature. With more than 60% of French speakers now living in Africa, they are contributing to its evolution. Words like „zogo“ (uncool) and „choco“ (sweet or stylish) have emerged as a result of the blending of French, Ivorian slang, and English. This linguistic fusion is leading to the formation of new identities for Africans who speak French.
The first iPhone presentation in 2007 had its challenges with a fragile prototype and bug-riddled software, but Steve Jobs managed to carry out a flawless demo using an artfully illusory live presentation. Apple's development team implemented a carefully scripted sequence of actions called the „golden path“ to minimize risks during the demonstration. Jobs insisted on always displaying full signal strength on the iPhones, despite their actual signal quality, and utilized multiple devices backstage to manage memory constraints. Despite these hurdles, this presentation was a success, marking an essential milestone in the history of technology.
Texas power plants have no responsibility to provide electricity in emergencies, judges rule:
A panel of judges in Houston has decided that big power companies cannot be held liable for failing to provide electricity during the 2021 Texas blackout due to its deregulated energy market. The ruling protects these companies from lawsuits filed against them after the crisis and leaves families who lost loved ones unsure where to seek justice. During the blackout, about 250 people died as a result of the winter storm, but some analysts believe that count is an underestimation.