TL;DR summary of stories on the internet
Mpv is a free, command line media player that supports a wide range of formats and codecs. It offers powerful scripting capabilities, a minimalistic on-screen controller, and high-quality video output with advanced features like GPU video decoding and HDR support. Its embeddable C API allows easy integration into other applications. Mpv is actively developed, with […]
Read more »
The author discusses missing features in Go compared to other languages, such as the lack of ordered maps in the standard library, default arguments for functions like Python offers, and nullability options for variables. Highlighted is the unique aspect of Go randomly ordering map instances due to seed generation, which while intended to avoid dependency […]
The author documents their process of running NixOS on Proxmox’s LXC environment, focusing on Intel machines to replace a heavier NixOS VM. They obtain the container image from Hydra and manually create the container due to Proxmox’s lack of compatibility with NixOS tarball. After adjusting resource sizes and network settings, they configure the container by […]
The Xapian project offers an Open Source Search Engine Library, available under the GPL v2+. Written in C++, with bindings for a variety of languages, Xapian is a versatile toolkit for developers to enhance indexing and search capabilities in their applications. With built-in support for different weighting models and boolean query operators, Xapian stands out […]
Tech interviews can be intense, with candidates feeling scrutinized, but remember, companies hold the power. They can manipulate their culture during interviews, so dig deep to uncover the truth. Ask open-ended questions to gain insights into the company’s inner workings. Explore flaws and how they’re handled, how employees are supported, and how success is celebrated. […]
Former Google CEO Eric Schmidt recently made controversial comments during a talk at Stanford, suggesting that successful AI startups can steal intellectual property and then hire lawyers to clean up any resulting legal issues. He also discussed the rise of ChatGPT and the importance of employees working from home. Schmidt’s remarks were taken offline after […]
In this article, the author discusses using PDF files as an attack vector, showcasing various techniques such as PDF Injection, XSS, Stealing Credentials, Opening Malicious Links, and Remote Code Execution (RCE). The author dives deep into injecting JavaScript code in PDF files, stealing credentials through phishing attacks, embedding malicious links, and exploiting vulnerabilities in PDF […]
Lidar point clouds are powerful for creating high-resolution, 3D views of environments. However, one drawback is that they lack color information, making object identification challenging. To tackle this, lidar points can be colored by mapping them onto synchronized camera images. By projecting points onto images using extrinsic and intrinsic matrices, lidar sensor fusion can create […]
The author delves into their newfound love for analog rhythm machines, exploring the Panasonic RD-9844, a lesser-known alternative to the iconic Roland TR-808. They highlight the simplicity of the RD-9844’s circuitry and its quirky design choices, like battery power and a “rock” preset heavy on noise drums. The breakdown of the machine’s bass drum, cymbal, […]
The blog post delves into Energy-Based Models (EBMs) for generative modeling, emphasizing their unique approach of framing the problem in terms of an energy function. EBMs assign low energy to likely data and high energy to unlikely data, guiding the generation of new samples. The post explains the training of EBMs through approaches like Contrastive […]