TL;DR summary of stories on the internet
In a groundbreaking project at Cambridge University Library, fragments of a rare Merlin manuscript from c. 1300 were discovered and digitized after being hidden for centuries as the binding of a 16th-century archival register. The medieval manuscript contains rare stories of Merlin and King Arthur and is part of the Suite Vulgate du Merlin, a […]
Read more »
In January of 2025, a potential supply chain attack on GitHub CodeQL was uncovered by exploiting a publicly exposed secret that lasted for just 1.022 seconds at a time. This attack allowed an attacker to execute code in GitHub Actions workflows in most repositories using CodeQL, impacting both public GitHub and GitHub Enterprise. The attacker […]
TLDR: The author uses uv to create self-contained Python scripts with dependencies embedded in the shebang line, making it easy to run without managing virtual environments or cluttering system Python. It’s particularly useful for testing endpoints and interacting with PostgreSQL databases. The author initially had doubts about using special script tags in Python scripts but […]
Today, we will discuss the concepts of functors, applicatives, and monads in functional programming with examples in Haskell. Functors allow mapping functions over values inside a context without altering the context, like a box that doesn’t change with the value inside. Applicatives extend functors by allowing the application of functions inside contexts to values in […]
Isar Aerospace, a German company, recently attempted to launch its Spectrum rocket from Norway, but unfortunately, the mission was unsuccessful as the vehicle lost control shortly after takeoff. Isar Aerospace’s Spectrum rocket aims to serve the small to medium-sized satellite market and emphasizes Europe’s space sovereignty. The rocket, made mostly of carbon composites, is designed […]
During WWII, American pilot Charlie Brown’s B-17 was severely damaged over Germany, caught in an air battle with German fighter planes. Surprisingly, Luftwaffe pilot Franz Stigler, instead of shooting it down, escorted Brown’s bomber to safety, risking his own safety to protect the enemy. The two pilots met 50 years later and formed a lasting […]
TL;DR – The author has created Software Counters mode rr, a modified version of the rr debugger that allows record and replay systems to run without needing access to CPU Hardware Performance counters. This opens up the possibility of using rr in environments like cloud VMs and containers where access to these counters is usually […]
In this post, the author explores the issue of array comparison performance in .NET, focusing on improvements in .NET and the use of Span for enhanced performance and portability. A popular stackoverflow answer involving the use of msvcrt.dll for comparing byte arrays is discussed. The post includes an in-depth analysis comparing different implementations of array […]
Summary: Until Android 11, apps could view all other apps on your device. Now, under new rules, apps must declare if they need access. Some Indian apps like Swiggy and Zepto have extensive lists of apps to check, possibly for user profiling. Additionally, personal loan apps like KreditBee and Moneyview have alarming numbers of apps […]
The article discusses tail call optimization in Java using byte code manipulation with ASM. Tail recursion refers to recursive calls where the last operation is the recursive call, allowing for faster execution. The author demonstrates how to optimize tail recursive methods by reusing the current frame instead of creating a new one. Using ASM library’s […]