Links für 2024 KW 23
Zusammengefasst von LlongOrca.
The article discusses HN-text, a fast, easy-to-use, and distraction-free Hacker News terminal client. It focuses on easy navigation, distraction-free reading, and fast loading times. The client supports navigation through the HN Frontpage, Comments Page, and Article's Text. Installation methods include using Homebrew, downloading binaries, or installing through GO.
Psychological tricks rich people use to look generous (without actually spending more money):
This blog post discusses the concept of narrative value in shopping and how it can be used to show off personality traits without overspending. It suggests various ways to spend money more consciously by borrowing items, repairing them, improving existing ones, getting them secondhand or not buying them at all. The article emphasizes that people value the effort and love behind the gifts and decisions rather than the objects themselves. Ultimately, it promotes a focus on genuine connections with friends and family instead of material possessions.
The Intellectual Obesity Crisis:
The article discusses how an overabundance of information in the digital age has led to an epidemic of intellectual obesity, or „junk info.“ This junk info, which is low-quality and often false but not harmful just because it's false, fills people's minds with useless information that distracts from more meaningful content. It compares this issue to overeating sugar in the past; our bodies evolved to crave sweet things for energy, but when they became abundant, they became detrimental. The author suggests developing meta-awareness and rearranging lifestyles to limit exposure to junk info and improve one's information diet.
Twitch removes every member of its Safety Advisory Council:
Twitch has terminated its Safety Advisory Council, which was formed in 2020 to help draft new policies and develop products that improve safety. The council included experts such as Dr. Sameer Hinduja and Dr. T.L. Taylor. In a meeting on May 6th, Twitch informed the nine members that their contracts would end on May 31st, and they would not be getting paid for the second half of 2024. The streaming website plans to replace them with individuals who serve as „Twitch Ambassadors,“ who are said to positively contribute to the Twitch community. The reason behind this change remains unclear, but it could potentially be a cost-cutting measure since the terminated members were paid between $10,000 and $20,000 per year.
The Weird Nerd comes with trade-offs:
The article discusses the backlash faced by Katalin Karikó, co-inventor of the mRNA technology used in COVID-19 vaccines and 2023 Nobel Prize winner. Her comments about academia requiring political games and people pleasing led to anger among some individuals. The author argues that many „Weird Nerds“ are being driven out of academia due to a preference for the „Failed Corporatist phenotype.“ They believe that institutions should be more explicit in supporting these unique individuals, as they can contribute greatly to creative intellectual endeavors. The article also discusses the challenges faced by Karikó during her career and how the academic world might be selecting against people like her.
The article discusses the release of termux-app v0.120 on Google PlayStore by @fornwall for Android >= 11 devices. This release differs from the termux/termux-app master branch on GitHub and is an unofficial/forked release source. The article also highlights that users should install Termux only from F-Droid and GitHub, as the PlayStore releases are deprecated. Additionally, the article mentions that there are still issues related to system_linker_exec solution and the solution may violate PlayStore policies, so users should install the PlayStore release at their own risk.
The Wall Street Journal reported on a case where Margaret Sjostedt might inherit her ex-boyfriend Jeffrey Rolison's $1 million retirement account from 1987. Rolison listed Sjostestdt as the sole beneficiary but never updated it before his death in 2015, leading to a dispute between Rolison's brothers and Procter & Gamble (P&G), his former employer. This case highlights the importance of updating beneficiary forms for retirement accounts, life insurance policies, and bank accounts, which can override wills even if filled out years ago. The number of households aged 55 and older with workplace retirement accounts has significantly increased, leading to more disputes over these funds due to lost or incomplete beneficiary forms.
Dagen H, also known as „Högertrafikomläggningen“, was the day on 3 September 1967 when Sweden switched from driving on the left side to right side of the road. The Swedish Commission for the Introduction of Right-Hand Driving (HTK) oversaw this change, which was aimed at aligning with neighboring countries and reducing head-on collisions due to vehicles being predominantly left-hand drive. The switchover involved a temporary ban on non-essential traffic, reconfiguring intersections, replacing traffic signals, and repainting roads. Initially, the change resulted in fewer accidents; however, this improvement did not last long, as accident rates returned to normal within six weeks following the switch.
Tell HN: Domain migrated from Google to Squarespace went down after 1 month:
The article discusses the importance of decoupling services, particularly for small teams. It suggests using separate domain registrars and hosting DNS elsewhere, such as Cloudflare. For email hosting, Google Workspace is recommended but alternatives exist. Websites should be hosted by reputable providers with backup plans in place. Apps should also be decoupled from the main website and hosted by another reliable provider.
‘Enshittification’ is coming for absolutely everything:
Last year, I coined the term „enshittification“ to describe the way that platforms decay. That obscene little word did big numbers; it really hit the zeitgeist. The American Dialect Society made it its Word of the Year for 2023 (which, I suppose, means that now I'm definitely getting a poop emoji on my tombstone). So what's enshittification and why did it catch fire? It's my theory explaining how the internet was colonised by platforms, why all those platforms are degrading so quickly and thoroughly, why it matters and what we can do about it. We're all living through a great enshittening, in which the services that matter to us, that we rely on, are turning into giant piles of shit. It's frustrating. It's demoralising. It's even terrifying. I think that the enshittification framework goes a long way to explaining it, moving us out of the mysterious realm of the „great forces of history“, and into the material world of specific decisions made by real people; decisions we can reverse and people whose names and pitchfork sizes we can learn. Enshittification names the problem and proposes a solution. It's not just a way to say „things are getting worse“, though, of course, it's fine with me if you want to use it that way. (It's an English word. We don't have ein Rat für englische Rechtschreibung. English is a free-for-all. Go nuts, meine Kerle.) But in case you want to be more precise, let's examine how enshittification works. It's a three-stage process: first, platforms are good to their users. Then they abuse their users to make things better for their business customers. Finally, they abuse those business customers to claw back all the value for themselves.
Paper: Garbage Collect Your Technical Debt:
The paper discusses tech debt in software development, comparing it to the garbage collection process in computer memory. It suggests that viewing software development processes as algorithms can help minimize tech debt. The article explores the use of four different algorithms for tech debt management: none, reactive, proactive, and balanced. It suggests that choosing the appropriate algorithm depends on the circumstances, such as the team's and project's size, domain knowledge, design experience, technology experience, and schedule pressure. The paper also discusses the differences between finite and infinite games in tech debt management, and emphasizes the importance of re-evaluating your tech debt algorithm when switching between the two types of games.
This article provides instructions on how to enable JavaScript in various web browsers, including Internet Explorer, Firefox, and Safari. To do so, users should access their browser's settings menu and navigate to the appropriate options for enabling JavaScript.
Sildenafil (‘Viagra’) improves brain blood flow and could help to prevent dementia:
A new study published in Circulation Research suggests that sildenafil, more commonly known as Viagra, has the potential to improve brain blood flow and prevent dementia. The research, conducted by Dr. Alastair Webb at Oxford University, is the first trial to demonstrate that sildenafil can enter the blood vessels in the brain, improving blood flow and responsiveness of these blood vessels. This could be significant as vascular dementia currently lacks specific treatments and chronic damage to small blood vessels in the brain causes 30% of strokes and 80% of brain bleeds. The researchers are now planning larger-scale trials to confirm their findings and explore sildenafil's potential for preventing vascular dementia on a wider scale.
Brain Drain: The Mere Presence of One’s Own Smartphone Reduces Available Cognitive Capacity:
This paper discusses the cognitive impact of smartphones on users. The research conducted shows that the mere presence of a smartphone can reduce cognitive capacity, even when the device is not in use or consciously thought about. The study also suggests that individual differences in dependence on smartphones can influence the degree to which cognitive capacity is affected. The implications of this research are discussed in the context of consumer choice, advertising effectiveness, and education.
Brisante Funktion: Microsoft Recall ausprobiert:
The article discusses Microsoft's Recall feature, which aims to search user activities on Copilot+-PCs using AI. While the feature requires an NPU, it has been enabled on older ARM-PCs using a special version of Windows 11 and a system with ARM-CPU, such as the 2023 dev-kit or Microsoft's Azure Cloud. Recall searches for user activities through text and image recognition on screenshots. The article highlights concerns about the security and privacy implications of Recall, as the data generated can be accessed by any user with administrative rights, potentially exposing personal information to malicious actors.
This article discusses the significant decline in global maternal mortality rates from 2000 to 2017, with a reduction of 38%. In low-income countries, the rate fell by 46% due to factors such as improved nutrition, access to clean water, better sanitation, midwifery care, and antibiotic treatment. The article highlights that while maternal mortality rates have declined significantly worldwide, there remains a large gap between high-income countries and the rest of the world. It emphasizes the importance of effective family planning, access to contraceptives, and skilled healthcare professionals in reducing maternal mortality rates.
South Pole Water Infrastructure – brr:
This article discusses water infrastructure at the South Pole station, focusing on how fresh water is produced and wastewater disposed of in such a harsh environment. The majority of Antarctic research stations are located near the coast, but the South Pole is an exception due to being hundreds of miles from the coast and high up on an inland plateau. Water at the station begins with a Rodwell, which melts snow for fresh water production, while wastewater is stored underground until it can be disposed of using outdated methods. The article also highlights challenges such as extreme cold, wind, accumulating snow, and long supply chains for engineering expertise and spare parts that make maintaining infrastructure at the South Pole difficult yet crucial for human life in the region.
How Replit used legal threats to kill my open-source project:
The article discusses how Replit, a company that encourages open-source development and contributes to the community, threatened legal action against one of its former interns for creating an open-source project with similarities to their webapp. The author, Radon Rosborough, was told to take down his project due to potential copyright infringement, even though it had no commercial aspects or intention to compete with Replit. Amjad, the CEO of Replit, apologized and agreed to disagree on the situation, promising to allow Rosborough to put the project back up.
The Italian Streets That Don't Exist on Any Map:
In Italy, there are numerous „invisible“ or „fictitious“ streets, such as Via Mariano Tuccella in Bologna, that do not exist physically but serve as addresses for people who do not have a fixed residence. This system dates back to the post-war era and was initially used for circus performers and other traveling professionals who struggled to access local services without a permanent address. Today, these streets are often used for homeless or precariously housed individuals, as they provide an official address that can be placed on their ID cards. This allows them to claim their rights and be counted in the community where they live. While Italy's invisible street system has its flaws, it remains a unique solution that helps homeless people maintain their legal identity and access vital services.
Adobe Photoshop's New Terms of Service Demands the Right to Access Your Work | Lifehacker:
Adobe has faced backlash from creators after introducing new pop-ups in Photoshop informing users of changes to its Terms of Service (TOS). The updated TOS claims that Adobe now has the right to access any work generated using their software for various purposes, including training AI. This includes accessing content through both automated and manual methods. Creators have criticized the update, with some calling it a violation of privacy and others claiming it interferes with their work. Adobe's TOS currently reflect these changes.
The article discusses the importance of providing explanations for technical matters that are comprehensible even to those who are capable of understanding them, known as Feynman's Razor. It highlights an example of a nonsensical error message and provides an alternative explanation. The author emphasizes the need to avoid dumbing down information and instead provide accurate and understandable explanations for users with varying levels of technical knowledge or interest.
What is PID 0? · blog.dave.tf:
This article explains that Unix Process ID (PID) 0 actually exists and serves as the bootstrap CPU core's idle task, responsible for scheduling and power management in early kernel stages. However, PID 0 has no involvement in memory management processes. The confusion surrounding PID 0 arises from a misinterpretation on Wikipedia that spread across the web over time. The article also highlights the importance of conducting primary research to verify information.
Setting Up and Switching Between an NVIDIA eGPU on Ubuntu 22.04: A Step-by-Step Guide:
This guide provides a step-by-step process to set up an NVIDIA eGPU on Ubuntu 22.04, ensuring seamless switching between the eGPU and integrated graphics. The steps involve initializing the device, installing appropriate drivers, installing egpu-switcher software, rebooting and checking settings, and configuring the egpu-switcher for smooth operation.
The article discusses various topics including Google working on a feature similar to Microsoft Recall for Chromebooks, vulnerabilities in Azure, Apple not issuing a bug bounty to Russian cybersecurity company Kaspersky Lab after it disclosed four zero-day vulnerabilities in iPhone software, Adobe needing more training data, PwC and Aleph Alpha founding a joint venture for AI solutions in legal consulting, and Checkpoint's advisory on the dangerous flaw exploited by threat actors.
Google Leak Reveals Thousands of Privacy Incidents:
Google has accidentally collected children's voice data, leaked carpool users' trips and home addresses, made YouTube recommendations based on deleted watch history, among other privacy incidents, according to an internal database tracking six years worth of potential privacy and security issues obtained by 404 Media. These incidents, individually minor, have shown how the company handles a massive amount of sensitive personal data. The data includes privacy and security issues reported internally by Google's employees between 2013 and 2018.
Cancel Adobe if you are a creative under NDA with your clients:
The summary of the article is that Adobe has updated its terms and conditions to include a new clause that grants them access to any content created or edited using their software, including Photoshop. This includes both cloud-stored files and local ones. The reason behind this change is not specified, but it could potentially be related to training AI models with user data. Users who rely on Adobe for their work may find it difficult to switch to alternative software due to the convenience and features provided by the company's suite of products. However, there are alternatives available such as Krita, GIMP, and Affinity Designer/Photo. The article also discusses how to avoid cancellation fees when discontinuing an Adobe subscription.
Shu-Ha-Ri is a concept originating from Japanese martial arts (particularly Aikido) that Alistair Cockburn introduced for software development. The idea represents three stages of gaining knowledge: Shu - imitating and focusing on the master's way; Ha - understanding principles and learning from multiple masters; Ri - self-directed innovation and creating one's own approach. This concept emphasizes tailoring teaching styles to learners' understanding levels, with a focus on concrete steps, principles, and eventually self-directed innovation. The Dreyfus model provides a more nuanced version of this concept, which can be expressed as Imitate, Assimilate, Innovate.
The Problem with Lying is Keeping Track of All the Lies:
The article discusses the challenges and complexity of working with databases that provide weak isolation, which can lead to inconsistencies and „anomalies.“ Weak isolation models require developers to spend more time reasoning about architecture diagrams, potential errors, and interactions between different clients accessing the database. In contrast, strong isolation models offer local reasoning and enable programmers to reason about a single query in isolation without worrying about inconsistencies or other users' transactions. The article emphasizes that while weak isolation is not something to be entirely excluded, it should be used with caution as it can lead to significant waste of resources and time for developers trying to maintain consistency across their systems.
How to keep using adblockers on chrome and chromium:
Google's Manifest V3 has caused concerns among adblockers due to its lack of a webRequestBlocking API equivalent. Starting in Chrome version 127, the transition to MV3 will prevent the use of MV2 extensions entirely. To address enterprise complaints, an ExtensionManifestV2Availability key was added and is likely to remain indefinitely. For regular users, they can continue using their MV2 extensions by following specific instructions involving terminal commands and enabling developer mode. This allows them to keep MV2 extensions even after they're supposed to stop working.
The “full-stack framework” fallacy:
The article discusses the importance of having an opinionated backend ecosystem that interoperates seamlessly with frontends for full-stack developers to easily build apps that can scale. This includes features such as schema definition, database access, argument validation, authentication, scheduled jobs, real-time subscriptions, caching, security, text search, vector search, file storage, and automatic scaling. Having a backend platform with these features in a consistent package reduces fragmentation and makes it easier for developers to work on frontend and backend components simultaneously. The author also mentions Convex as an example of such a backend ecosystem that works with various frontend frameworks and languages while providing strong abstractions for end-to-end types, real-time reactivity, and data consistency.
Developer posts secret key on GitHub, loses $40K in 2 minutes:
The article is about a Web3 developer, Brian Guan, who accidentally shared his secret keys on GitHub, resulting in the loss of $40,000 in just two minutes. The incident sparked a mixed reaction within the crypto community, with some showing sympathy and offering support, while others criticized Guan's previous comments about developers using ChatGPT to write code. Additionally, a memecoin coded using ChatGPT has found success within the crypto space, reaching a market capitalization of $600 million.
Remote Machine Learning | Immich:
This article discusses performance issues on low-memory systems like the Raspberry Pi when hosting Immich's machine-learning container. It suggests using a more powerful system, such as a laptop or desktop computer, to alleviate these issues. To enable hardware acceleration, add one of -[armnn, cuda, openvino] to the image tag. The example image is provided with the tag: ${IMMICH_VERSION:-release}-cuda. Updates should always be performed together on both hosts to avoid instabilities and bugs.
This article discusses VDO.Ninja, a platform for group-chat and video management. The platform allows users to create rooms with tools for managing multiple guests. Guests can see the director but not other guests' videos. The director will be performing in group scenes as well. Advanced settings are available to customize rooms, and it is recommended to use headphones/earphones for the best experience. The „Recording“ option is experimental, and only trusted guests should be invited into the room.
How bad OEM firmware ruins TPM security:
This article demonstrates a software attack that allows an operating system to set PCRs (Platform Configuration Register) values on a discrete TPM device and unseal any secret using a PCR-based sealing policy such as disk encryption keys in unattended FDE schemes. The attack does not require physical access to the pins on the device but instead relies on software abusing Intel's PCH (Platform Controller Hub) buses to reset TPM devices. This can be used to attack TPM FDE schemes, such as BitLocker, in multiple ways, allowing an attacker brief physical access or running malware within another operating system to extract encryption keys and secrets stored on disk. To mitigate this attack, boot firmware updates are required, but the author suggests that Intel's BootGuard may need further enhancements for better protection against PCR reset attacks.
The Distinctiveness of Human Aggression:
The „self-domestication hypothesis“ suggests that early human communities eliminated individuals prone to aggression, leading us to become relatively peaceful apes. Humans tamed one another by removing particularly aggressive individuals. While humans are far nicer to members of their own group than chimps, there is still a significant amount of violence among us today. The ability to cooperate and coordinate actions, especially in the context of outgroups, has shaped human nature and evolution. This double-edged sword has contributed to both our kindness and cruelty, as well as our unique capacity for organized violence.
The article is about a group of people who are trying to save Team Fortress 2 from being destroyed by malicious bots. They are planning to do this by spreading awareness of the issue on social media and by signing a petition to Valve, the game's developer, to fix the problem. The group believes that Valve is not doing enough to address the issue and that the game is in a state of crisis. They are asking Valve to take action and fix the issue, and are planning to use social media to spread awareness of the issue and to pressure Valve to take action.
Automated check for corrupted image files with Python and ImageMagick | Davide Barranca:
The article describes a Python script and ImageMagick utility to check if image files (tiff, psd, psb) are corrupted without opening them or looking at their thumbnails with Bridge or Photoshop. This is useful for large data migration tasks where opening the images in Photoshop is not an option. The script can be used by changing the folderToCheck variable and fileExtension to match the user's specific files and then running it on a terminal using python3 command.
Pigweed Eng Blog #2: Feature flags in Bazel builds:
The article discusses three approaches for configuring build systems with Bazel, focusing on code relying heavily on preprocessor defines to configure its code. These methods include:
1. Easy but limited: bazelrc config with copts - This approach involves adding compiler options in the .bazelrc configuration file and applying them when building the same code for different final product configurations. However, this method has downsides such as dangerous typos and no multi-platform build support.
2. More power with no code changes: Platform-based Skylib flags - This approach represents build features as Skylib flags grouped through platform-based flags. While this solution is more powerful and does not involve code changes, it has downsides like limited multirepo support and typos remaining dangerous.
3. Error-preventing approach: Chromium-style build flag pattern - This method builds on the Platform-based Skylib flags by adding a macro helper for retrieving flag values that guards against typos. It involves users of flags accessing them in C++ files via BUILDFLAG(SOME_NAME). However, this approach is still under development and not available in older Bazel versions.
Microsoft Recall should make you consider Linux:
This article discusses Microsoft's latest product announcement, „Recall,“ which takes snapshots of a user's on-screen activity every few seconds and stores it locally on the computer in plaintext. This has raised security concerns as it leaves users vulnerable to hackers who can steal their private information with just two lines of code. Despite this issue, Microsoft is unlikely to recall the feature as it increases the amount of surveillance data available for the company. The article suggests that users should switch to Linux, a free and open-source operating system without opaque surveillance code, in order to protect their privacy from Big Tech companies.
Professor by Day. Porn Star by Night. Can He Be Both?:
University of Wisconsin La Crosse professor Joe Gow, 63, and his wife Carmen Wilson, 56, have been videotaping their sexual escapades for nearly ten years. The couple has gained over 10,000 followers since joining OnlyFans under the username „Sexy Happy Couple.“ However, Gow's employment at the university may be in jeopardy after a university lawyer discovered he was selling adult films online.
Photoshop ToS grants Adobe access to user projects for 'content moderation':
This article discusses various Adobe Photoshop alternatives that users can consider using instead. Affinity Photo by Serif and Pixelmator Pro are mentioned as good, light, quick, and easy-to-use tools with reasonable pricing. Additionally, DxO PhotoLab is suggested for those looking for an alternative to Adobe Lightroom. The author also mentions their preference for Skylum software, which integrates well with macOS Photos.
Kreativsoftware für Profis | Wir sind Affinity:
The article announces the release of version 2.5 for a software known for image editing, graphic designing, and page layout, which works on Mac, Windows & iPad. It is fast, efficient, and free from unnecessary features while also providing seamless workflow with common file formats. Developed using advanced technology for latest technology compatibility, it offers full functionality across all platforms without a subscription or additional costs.
Photoshop Terms of Service grants Adobe access to user projects for ‘content moderation’:
Photoshop's new terms of service allow Adobe access to users' active projects for content moderation purposes and other reasons. This has raised concerns among professionals as it could compromise NDA-protected projects such as logos for unannounced games or media projects. Tech companies, including Microsoft, are increasingly interested in monitoring user activities and using user-generated content to improve their services.
How Online Privacy Is Like Fishing:
Microsoft recently caught state-backed hackers using its generative AI tools to help with their attacks, leading to questions about how the company figured it out. The issue is not about how hackers are utilizing the tools, but whether Microsoft was spying on AI users. This situation exemplifies „shifting baseline syndrome,“ where each generation's privacy expectations are lower than the previous one due to advancements in technology. To address this issue, a holistic ecosystem-wide perspective is required for both privacy rights and services provided by companies. A scientifically informed and democratic regulatory process needs to be implemented for preserving heritage and ensuring sustainability in the digital landscape.
Online Privacy and Overfishing - Schneier on Security:
Microsoft recently detected state-backed hackers using their AI tools for malicious purposes. The main question was how Microsoft figured it out, leading some to believe that the company was spying on its users. However, cloud service providers regularly monitor user activity, and it would be unfair to call this „spying.“ This situation highlights our shifting collective expectations of privacy. Similar to overfishing in oceans, where each generation has a different baseline for acceptable catch size, the security community's understanding of privacy is subject to change as technology advances. AI chatbots are an example of this phenomenon, with cloud-based systems tracking user input. To address privacy concerns, we need to take a holistic and ecosystem-wide perspective, considering what a healthy technological environment should look like. This requires a scientifically informed regulatory process to preserve privacy rights for future generations.
Report: E.U. censorship laws mostly suppress legal speech:
This article discusses Europe's regulation on online speech, particularly the Digital Services Act (DSA), and its potential impact on freedom of expression. The Future of Free Speech, a think tank based at Vanderbilt University, found that legal online speech made up most of the removed content from posts on Facebook and YouTube in France, Germany, and Sweden. The report suggests that social media companies may over-remove content to avoid fines under legislation such as NetzDG in Germany. It also highlights how high-profile current events are a prominent subject in suppressed content and that enforcement of speech regulation is more common in cultures less tolerant of free expression. The article concludes that the DSA undermines freedom of expression based on shallow empirical evidence, with governments giving social media giants the key to steer digital discourse.
268% higher failure rates for Agile software projects:
A study commissioned by consultancy Engprax found that software projects using Agile practices were 268 percent more likely to fail than those not adopting Agile methods. The research, which surveyed 600 software engineers in the UK and US, discovered that projects with clear requirements documented before development started were 97% more likely to succeed. According to Dr Junade Ali, author of Impact Engineering, robust requirements engineering processes are crucial for delivering high-quality software on time and within budget. The research highlights a need to find a balance between Agile practices and other methodologies like Waterfall.
Stable Audio Open — Stability AI:
Stable Audio Open is an open source text-to-audio model that allows users to generate up to 47 seconds of high-quality audio data, such as drum beats, instrument riffs, ambient sounds, foley recordings and production elements. This release marks a key milestone for making portions of generative audio capabilities accessible for sound designers, musicians, and creative communities. Unlike the commercial Stable Audio product, which generates full tracks with coherent musical structures up to three minutes in length, this open source model is designed specifically for creating audio samples, sound effects, and production elements. Users can fine-tune the model on their own custom audio data and explore its capabilities by downloading the model weights from Hugging Face. This release is part of an ongoing effort to develop open and responsible AI audio generation capabilities in collaboration with creative communities.
In an effort to influence global public opinion regarding the war in Gaza, the Israeli government conducted a PR campaign using fake social media accounts and websites that spread pro-Israel and Islamophobic content. This operation was orchestrated by Israel's Diaspora Affairs Ministry and executed through a political campaigning firm.
Is Microsoft trying to commit suicide?:
This article discusses Microsoft's announcement of CoPilot+, an AI-based add-on for Windows, as well as the new Recall feature that takes snapshots of all open windows on a computer and saves them locally. The author argues that these features pose privacy risks and potentially breach data protection laws. Additionally, the article highlights Apple's approach to integrating AI into its products and services without causing significant concerns for user privacy.
Meta is fixing three of the Quest 3’s biggest lingering annoyances:
The Meta Quest 3 is getting a new v66 update, which addresses two major issues - distortion in the real-world view and the confusing menu access gesture. With the update, users can now tap a button on their wrist to open the menu, reducing distortion and making it easier to interact with virtual objects. Additionally, there is now proper background audio for multitasking, allowing users to play music or videos without pausing them automatically when switching apps. The passthrough fixes are exclusive to Quest 3 at present, but the wrist buttons and background audio will be coming to Quest 2 and Quest Pro as well. Other features include support for „high-resolution“ Netflix on the web browser and improved realism in mixed reality (MR) games and apps.
This Hacker Tool Extracts All the Data Collected by Windows’ New Recall AI:
Microsoft's new Windows AI tool, Recall, was revealed by CEO Satya Nadella and can answer questions about users' web browsing and laptop use. However, security researchers have demonstrated that preview versions of the tool store screenshots of activity in an unencrypted database. Alex Hagenah, a cybersecurity strategist, has developed a demo tool called TotalRecall that extracts all information Recall saves on a Windows laptop. The database is unencrypted and can be easily accessed by attackers. Microsoft has faced criticisms as hacks of its systems have led to US government data breaches, with Nadella stating security should be the company's „top priority.“
Study shows most doctors endorsing drugs on X are paid to do so:
A study by U.S. medical researchers found that a significant number of doctors who posted endorsements for drugs on social media site X had been paid to do so by the drug manufacturers. The researchers used Open Payments, a website run by the Centers for Medicare and Medicaid Services, to identify which doctors received payments for their endorsements. In the United States, it is legal for pharmaceutical companies to advertise drugs, including on social media sites, and for doctors to receive payment for endorsing them. The study found that 26 of the 28 doctors they examined had received payments from drug manufacturers, with most payments categorized as „speaking“ or „consulting.“ While this practice may be seen as unethical, it is not illegal and does not affect a doctor's license.
You'll regret using natural keys:
The article discusses the issue of using natural keys in database designs and shares a personal experience where a chassis number was wrongly changed, causing concern about car ownership. The author explains that while natural keys may seem like an easy solution for uniquely identifying entities, they are not without their problems. These issues include ensuring the uniqueness of the key, potential clerical errors, and difficulties in correcting data errors. The article concludes with a recommendation to always use synthetic keys for database tables instead of natural ones due to these challenges.
RealPage Rent Price-Fixing Probe Escalates With FBI Raid | Entrepreneur:
The Federal Bureau of Investigation (FBI) conducted an unannounced raid on Cortland Management as part of a criminal antitrust investigation into RealPage, a software company that recommends rent increases on millions of housing units across the US. The investigation is looking into an alleged rental price-fixing conspiracy impacting millions of Americans. Lawsuits filed against RealPage claim its algorithm raises rental prices based on data collected from landlords, not demand. Over 16 million rental units in the US used RealPage's algorithm as of 2020, with the company playing a significant role in rising apartment rents.
This study investigated excess mortality in 47 Western countries from January 2020 until December 2022, finding that a total of 3,098,456 excess deaths were recorded during this period. Excess mortality was documented in 87% of countries in 2020, 89% of countries in 2021, and 91% of countries in 2022. The highest number of excess deaths was reported during the year in which both containment measures and COVID-19 vaccines were used to address virus spread and infection. This raises concerns about the underlying causes of persistent excess mortality, prompting government leaders and policymakers to thoroughly investigate these issues.
Microsoft blocks Windows 11 workaround that enabled local accounts:
This article is about Laura, a passionate gamer and film/series fan who studied communications science and started her career in media immediately after graduation. She has been writing about PCs and technology topics since May 2024 and currently works as a permanent editor for PC-Welt.
Linux Printing with Kyocera Print Panel:
This article provides a step-by-step guide on how to install Kyocera Linux 9.2 driver (Dec-2022) under Ubuntu 22.04 using the command line to meet dependencies prior to installation and ensure correct driver/PPD integration for Print Panel. The process involves downloading the Linux driver package, installing necessary dependencies, installing the printer, selecting the correct device port type as LPD/LPR, and running the Kyocera Print Panel application for setting up printer settings and profiles.
Why Ruby’s Timeout is dangerous (and Thread.raise is terrifying):
This article discusses the Timeout API in Ruby, which allows users to auto-terminate long-running operations after a certain amount of time has passed. The author shares an experience where they encountered difficulties due to the unintended consequences of using Timeout and raises concerns about its implementation, as well as comparing it to other languages' approaches. The article suggests that there might be better ways to handle timeouts in Ruby than relying on Timeout's potentially dangerous methods.
Linux Mint Disabling Unverified Flatpaks By Default:
The Linux Mint project has released its May newsletter, detailing recent progress made on the Ubuntu-derived desktop-focused Linux distribution. Enhancements to their software manager include faster loading and default disabling of unverified Flatpaks with a warning for security risks. Additionally, they are testing the Fastly CDN for faster and more reliable repository access and utilizing Datadog for data monitoring around their repository.
MeshMap - Meshtastic Node Map:
TODO
The article describes the author's experience homeschooling their son, Milo. After reading Seth Godin's Stop Stealing Dreams, which questions traditional schooling methods, the author decided to pull Milo out of public school for two years. Initially, they found some homeschooling books and online classes but quickly discovered that self-driven learning was much more effective. The concept of „unschooling“ resonated with the family; allowing Milo near-complete control over his education led to a significant shift in his attitude towards learning. By the end of their experiment, Milo had developed strong interests in various subjects and even excelled academically when he returned to public school.
Here comes the Muybridge camera moment but for text. Photoshop too:
This article discusses the potential for measuring the velocity of concepts over a piece of text using AI-adjacent techniques like embeddings. The author gives examples of how embeddings can be used to create search engines and visualizations, as well as mentioning real-time hermeneutics, manipulating text based on hidden features, and comparing this to the development of photography and its impact on society. The article ultimately suggests that AI techniques will continue to evolve, leading to new user interfaces and potentially unpredictable cultural implications.
Putins Russland: Zurück zur Sowjetunion? | DW Nachrichten (Video):
The video discusses the parallels between modern Russia and the Soviet Union, focusing on various aspects such as ideology, economy, geopolitical power, and political control. Some key points include:
1. Ideological similarities: The speaker mentions that ideologies of the past are resurfacing in modern Russian youth organizations, promoting a nostalgia for Soviet times.
2. Economic parallels: There is an increase in investments into military-industrial complex and a subvention of state-owned industries. This is similar to how the Soviet Union controlled production and resources during its time.
3. Geopolitical power: The speaker argues that Russia, like the USSR, sees itself as a world power and is trying to regain its position in international politics.
4. Political control: In both eras, private businesses face pressure from the state, with an increasing presence of secret services in corporations and a heavy influence on economic decisions.
5. Consumer culture: The speaker mentions that there are similarities in consumer culture between present-day Russia and the Soviet Union, where scarcity leads to higher prices for products in rural areas while cities have access to imported goods from around the world.
6. Investment in future industries: Both eras have neglected investments in pharmaceutical industry, IT sector, and other future-oriented sectors. The speaker believes that this could be a potential long-term threat for Russia's economic stability.
7. Comparison with other regimes: Despite the parallels with the Soviet Union, the video does not predict an imminent collapse of Putin's regime due to its ability to maintain stability through various factors like controlled media and strong internal security forces.
Why Russia Might Invade Georgia (Again) (Video):
The Transcript eines Youtube Videos discusses the complex geopolitical situation in Georgia, a country located at the crossroads of Eastern Europe and Western Asia. The main topics include the new foreign influence law, tensions between Georgia and Russia, the impact of the war in Ukraine, and the strategic importance of Georgia's geography for trade routes and energy pipelines.
1. New Foreign Influence Law: In May 2024, the Georgian government passed a controversial law known as the Transparency of Foreign Influence Bill. This law requires NGOs and media companies receiving more than 20% of their funding from abroad to register themselves as pursuing foreign interests in a public registry. Critics argue that this is similar to a Russian law passed in 2012, which has been used to suppress opposition media outlets and NGOs. The passing of the bill could jeopardize Georgia's prospects of joining the European Union (EU) and NATO.
Key Points:
- The Transparency of Foreign Influence Bill is similar to a Russian law that allows for suppression of opposition.
- Critics have labeled it as the „Russian Law“ due to its similarities with the 2012 Russian legislation.
- The bill's passing could prevent Georgia from joining the EU and NATO, which has been a long-standing aspiration of most Georgians.
2. Tensions between Georgia and Russia: Relations between Georgia and Russia have been strained since the 2008 war, in which Russia intervened to support separatist movements in South Ossetia and Abkhazia. The conflict resulted in Russian recognition of these regions' independence from Georgia and their effective military occupation. This has led to a severance of diplomatic relations between the two countries.
Key Points:
- The 2008 war was a significant turning point in Georgia-Russia relations, with Russia recognizing the independence of South Ossetia and Abkhazia.
- Russian military forces are stationed within close proximity to Tbilisi, creating a strategic threat to Georgia.
- The capture of these regions by Russia has extended its control over key transportation routes and energy pipelines.
3. Impact of the War in Ukraine: The ongoing war in Ukraine has created ripple effects across Europe and Asia. It has led to an increase in trade volume between Russia and Georgia, with Georgian exports to Russia rising by nearly 7% in 2022 and imports skyrocketing by 79% over the same period. This has caused tensions with the Ukrainian government, which has accused Georgia of assisting Russia in evading sanctions.
Key Points:
- The war in Ukraine has increased trade between Russia and Georgia, leading to criticism from Ukraine.
- Tensions between Georgia and Ukraine have escalated due to these economic ties and allegations of supporting Russian interests.
4. Strategic Importance of Georgia's Geography: Georgia's location at the crossroads of Eastern Europe and Western Asia makes it a critical space for both Russia and the West. It controls several key transportation routes, including the Baku-Tbilisi-Seyhan oil pipeline and the Southern Gas Corridor. The development of the Anakhlyia deep-water port could significantly enhance trade with China and other Asian countries, making Georgia an essential part of the Middle Corridor Trade Route.
Key Points:
- Georgia's geography makes it a strategic location for overland travel routes and energy pipelines.
- The development of Anakhlyia as a deep-water port could further enhance its geopolitical importance.
- The country is at the center of several trade routes, including the Middle Corridor between China and Europe.
Executive Summary: The Transcript eines Youtube Videos delves into the complex political landscape in Georgia, highlighting the new foreign influence law, tensions with Russia following the 2008 war, the impact of the war in Ukraine, and the strategic importance of its geography for trade routes and energy pipelines. These factors create a delicate balance between East and West, with significant implications for global geopolitics and trade dynamics.
Taste the Plastic - How Coca Cola is Poisoning the Planet for Profit | Greenwashing | FD Finance (Video):
The video focuses on the problem of plastic pollution, particularly its impact on marine life and the environment. It highlights the issue of plastic ingestion by fish and other marine species. Coca-Cola is mentioned as an example of a company that has not been fully transparent about its recycling efforts and has even lobbied against increased collection and recycling targets in Europe. The video also shows images of Tanzania, where the Coca-Cola group's transition from glass to plastic bottles created a mountain of waste and a recycling business that primarily benefits poverty-stricken individuals. It concludes with a statistic on the number of plastic bottles sold by the Coca-Cola Group during the length of the video, emphasizing the enormous scale of the problem.
Marker: This Open-Source Tool will make your PDFs LLM Ready (Video):
The video discusses the challenges of using PDFs for LLM applications due to their complex structure and lack of standard layout. It introduces Marker, an open-source tool that converts complex PDF files into well-structured markdowns for easier processing by LLM models. The speaker compares Marker's performance with Nougat, another open-source project, finding that Marker is faster and more accurate in converting PDFs to markdowns. The video also mentions the limitations of these tools in handling equations and tables in PDF files, but overall, it presents Marker as a useful resource for working with PDF data for LLM applications.
Solar und Wind haben ein riesiges Problem (Video):
In this YouTube video, the speaker discusses Germany's exit from nuclear energy and coal power at the same time while increasing the use of renewables. They highlight that Germany is becoming more reliant on wind and solar power, which can cause issues with fluctuations in supply due to varying weather conditions. The speaker also mentions Germany's plans for future electricity production, such as the construction of new gas-powered plants that will eventually switch to hydrogen fuel by 2035 or 2040.
Another topic covered is Germany's energy storage strategy, which involves increasing battery storage capacity and investing in pumped storage power plants. The speaker emphasizes the importance of adjusting electricity production based on demand and utilizing smart grid technology to optimize energy consumption. They also mention that electric vehicles (EVs) can help balance the electricity grid by charging during off-peak times and discharging during peak hours.
Lastly, the speaker addresses the controversy surrounding Germany's exit from nuclear power and whether it was a mistake. The video explains that only around 2% of Germany's electricity comes from abroad, and that France is also experiencing challenges with its nuclear power plants due to high costs and maintenance issues. The speaker concludes by stating that Germany has managed the energy transition without relying on nuclear energy and should continue investing in renewable sources like solar and wind power alongside battery storage and smart grid technology.
Von Salzkonsum bis Halotherapie – Was Salz mit unserem Körper macht | Puls | SRF (Video):
The transcript discusses various aspects of salt mining, health implications of salt intake, and alternative therapies using salty environments such as Halotherapy. Key points include:
1. Salt mining has been present for over 350 years in the Alps, with workers experiencing fewer respiratory problems compared to those working above ground.
2. Halotherapy is an interesting treatment for lung-related health issues, wherein patients breathe in air containing salt particles. It has shown positive effects on reducing inflammation and improving breathing.
3. The recommended daily intake of salt is 5g per day, but many people can tolerate higher amounts without adverse effects. However, excessive salt consumption can lead to negative outcomes for some individuals, particularly those with hypertension or kidney issues.
4. Salzgarten is a salty environment created by Christina Matlag for people suffering from respiratory problems or skin diseases such as psoriasis and eczema. The therapy involves breathing in salt particles for an hour, which helps reduce inflammation and improve lung function.
5. Jodiertes Salz is crucial for maintaining proper thyroid function, but only 30% of pregnant women in Switzerland are receiving sufficient iodine intake due to the changing dietary habits.
Insider Infos: So beschummelt Aldi dich bei den Preisen (Video):
The video discusses the strategies and tactics used by Aldi to offer low prices on products. Key points include:
1. Tie-in prices: Aldi offers certain items at deep discounts, attracting customers and encouraging them to buy more. However, these tie-in products might not be the best deals compared to other products in the store.
2. Deep discounts on selected items: Aldi focuses on a few specific products as „Eckartikeln“ or corner items, which are always available at low prices due to high demand and frequent purchases.
3. Limited product range: Aldi deliberately offers fewer products than its competitors to simplify the shopping experience for customers and reduce the time required for decision-making. This also allows them to negotiate better prices with suppliers.
4. Printed promotional materials: Aldi uses printed flyers, brochures, and weekly highlights of discounted products to entice customers and showcase their low prices. However, there have been allegations that the company misleads customers by using „Streichpreise“ (discounted prices) from the past 30 days instead of current market prices as a basis for calculating percentage-based discounts.
5. Kassierleistung: Aldi is known for its efficient checkout processes, with an emphasis on speed and efficiency to save costs and maintain customer satisfaction. The company utilizes digital monitoring systems to track employee performance and identify areas for improvement.
6. Pressure on employees: Employees at Aldi face high pressure to meet sales targets and maintain the company's image of low prices. This may lead to consequences such as job loss or disciplinary action if they fail to perform adequately.
Europawahlen: EU kämpft gegen russische Desinformation | DW Nachrichten (Video):
The transcript discusses the involvement of Russia in European elections and their use of fake accounts on social media platforms to manipulate public opinion. They are accused of supporting far-right members and employees of the European Parliament, financing propaganda networks like Voice of Europe through illicit financial transactions. Despite sanctions and expulsion from the country, Voice of Europe retained its Prague address. Veronika Vyshova, an anti-disinformation activist, expresses concern about this issue and highlights how European politicians are also guilty of spreading disinformation within their own continent. The Covid-19 conspiracy theories have been revived due to the ongoing war between Russia and Ukraine. Tommaso Canetta, coordinator of the European Observatory for Digital Media, emphasizes the importance of a balanced approach between skepticism and trust in information sources, as well as being vigilant against deepfakes and other forms of disinformation. The upcoming European elections will be a crucial test to determine how effective fact-checkers are in preserving the integrity of the elections.
Wenn die Eltern zum Pflegefall werden | Politik & wir | Twitch-Talk (Video):
In the Transcript eines YouTube Videos titled „Pflegenotstand - Wie geht es weiter?“, several topics related to the current state of eldercare in Germany were discussed. The video featured interviews with Dr. Tina Rudolf, a politician and medical doctor; Eva Ohlert, a former care worker with 20 years of experience; Kim Juncker-Mogale, who has been caring for her mother at home since 2018; Jochen Springborn, another home carer; and others.
The main topics discussed were:
1. The Current State of Elderly Care in Germany
- A shortage of caregivers due to the aging population and high turnover rate among staff was highlighted.
- Pflegeheime (care homes) are facing a critical situation, with some having waiting lists for over six months.
- There is also an issue with the quality of care, as seen in stories like that of Diana's mother who had to wait hours for help after pressing her emergency button and was later found in a state of disarray by her daughter.
2. The Impact on Families
- Many viewers shared their experiences or concerns about what would happen when their parents become elderly and need care.
- Caring for an elderly family member at home can be challenging, both physically and mentally. It often leads to burnout and stress, as well as the feeling of being isolated from normal life activities.
3. The Role of Private Investment in Care Homes
- Despite claims that there is no money available for eldercare, private investors are making a lot of profit from care homes. This was explored by Aurora Lee, a researcher at Finanzwende Recherche. She explained how these investors use financial tricks to extract maximum profit, such as selling off the assets like land or buildings and then leasing them back to the care home at a higher cost.
- There were calls for regulations to prevent profit-making in the field of health and eldercare, with suggestions including a ban on profits (Gewinn-Ernahme-Verbot) or a requirement that any profits be reinvested back into the care facilities (Reinvestitionsgebot).
4. Alternative Models of Care
- The video also presented an example from England where a multi-generational housing model is being used successfully, integrating children's daycare with eldercare in one location. This approach promotes intergenerational interaction and learning, providing benefits for both young and old alike.
5. Optimism for the Future of Elderly Care
- Despite the many challenges discussed, there was a sense of optimism among the participants about the potential for change and improvement in the future. They highlighted the increased awareness and interest in these issues brought on by events like the COVID-19 pandemic, as well as ongoing efforts to address them through policy changes and grassroots movements.
In conclusion, this video provided a comprehensive look at the current state of elderly care in Germany, highlighting both its challenges and potential solutions. It featured insights from experts and individuals with personal experience in caring for loved ones, offering viewers a multifaceted understanding of the issue. The discussion also underscored the importance of community support and innovative models of care in addressing the needs of an aging population.