TL;DR summary of stories on the internet
AI was once considered a solution to reduce tech debt, but it has actually increased costs for companies with messy legacy codebases. Generative AI tools like Cursor or Aider can dramatically speed up coding in clean environments, but struggle in complex, legacy code. The key is for human experts to refactor code until AI tools […]
Read more »
PyPI package maintainers can now publish signed digital attestations to increase trust in their projects’ supply-chain security. Over 20,000 attestations have already been published, marking PyPI’s support for PEP 740. Rather than using PGP signatures, attestations are signed by an identity, providing a link to the upstream source repository and ensuring verifiability upon upload. PyPI […]
This study delves into the concerning trend of “ghost hiring” in which employers post job openings they have no intention of filling. Through analysis of Glassdoor data and LLM-BERT techniques, it is revealed that roughly 21% of job ads could be considered ghost jobs, especially prevalent in certain industries and larger companies. The practice may […]
The barriers to AI engineering are rapidly disappearing as tools improve. Building an AI application boils down to models, prompts, knowledge, integrations, tests, and deployment. By leveraging existing DevOps tools like Git and CI/CD pipelines, developers can create production-ready AI applications. The use of open-source models ensures data privacy and compliance with regulations such as […]
After digging deeper into indexes beyond their basic structure, I explored how data is structured, algorithms involved, and how indexes are stored in a database management system like SQLite. I experimented with SQLite as it’s widely used, easier to debug, and open-source. The indexes are stored in a B-Tree structure with fixed page sizes. I […]
Little Snitch Network Extension consuming gigabytes of memory is not normal. This issue is a memory leak in Apple’s framework, affecting macOS 15.0 Sequoia. Running the leaks command in Terminal can determine if you are affected. While macOS 14 Sonoma may have a few kilobytes leaked, macOS 15 Sequoia can reach hundreds of megabytes. Apple […]
Earlier this year, while working on a client’s source-assisted application and architecture assessment, my colleague Ema and I took a closer look at Keycloak, a solution for Open Source Identity and Access Management. Surprisingly, we discovered a security issue that allowed an attacker to bypass two-factor authentication with just a username and password. We reported […]
Author dedicates four years to solving why lawyers don’t use git for version control, essential for legal system functioning. Current process of manual version control results in errors, takes hours, and is inefficient. Lawyers’ work involves similar collaboration challenges as coders. Redlining in Word is cumbersome and error-prone, and existing solutions fail to handle legal […]
On November 12, 2024, the author reflects on setting up an e-ink display for their mom with amnesia two years prior. The device allows her grown children to send messages that remain visible until replaced. With unique design goals in mind, the author chose the BOOX Note Air2 Series for its functionality and sleek appearance. […]
In August, mathematicians discovered an exotic, record-breaking elliptic curve, unlocking major questions about these fundamental equations. Considered crucial in various studies and cryptography, elliptic curves continue to mystify mathematicians with unanswered queries regarding their patterns of “rational points.” Noam Elkies & Zev Klagsbrun recently shattered an 18-year-old record by finding a curve with the most […]