TL;DR summary of stories on the internet
The official website of Nand to Tetris courses and the book The Elements of Computing Systems provides all the necessary materials for building a computer system and software hierarchy from scratch. The materials are available for free to students, instructors, and self-learners in a non-profit, educational setting. The website also offers support for two online […]
Read more »
NLP research has experienced a paradigm shift with the rise of large language models (LLMs), proving the effectiveness of scale. However, the high cost and limited accessibility of these models pose a challenge for researchers without significant resources. Nevertheless, there are still important research directions that can be pursued with limited compute. These include improving […]
Moddio Game Engine 2 is a multiplayer-first game engine that offers a range of features. It includes a built-in server-authoritative netcode with snapshot interpolation and client-side reconciliation. Impressively, it can handle 50+ concurrent players or 300+ moving entities on a $5/month VM. The engine comes with a variety of tools such as a Box2D Physics […]
Did you know that JavaScript now has a native way to do deep copies of objects? Thanks to the structuredClone function built into the JavaScript runtime, we can easily copy objects, nested arrays, and even Date objects. This function can clone infinitely nested objects and arrays, handle circular references, and clone various JavaScript types like […]
snk is a GitHub action that allows users to generate a snake game from their GitHub contributions graph. It creates a snake path where the cells representing contributions are eaten in a specific order. The output can be either a gif or SVG image. This action can automatically generate a new image each day, which […]
In collaboration with the SEC Consult Vulnerability Lab, Timo Longin discovered a new technique for email spoofing using the SMTP (Simple Mail Transfer Protocol). This technique, known as SMTP smuggling, allows threat actors to send malicious emails from arbitrary email addresses, enabling targeted phishing attacks. Multiple vulnerabilities were discovered and reported to vendors in 2023. […]
PenX is a note-taking app created with privacy as the top priority. The app aims to provide an elegant tool for managing personal digital assets such as notes, tasks, ideas, passwords, and documents. One unique feature of PenX is its “Local-First” approach, ensuring that users have complete ownership of their data instead of relying on […]
The Marginalia Crawler has undergone improvements to address a long-standing issue with the design. Previously, if the crawler shut down, it had to restart from scratch, which was time-consuming and inconvenient for server admins. To solve this problem, the author modified the crawler to create a log using the WARC format, which is well-suited for […]
Casibase is an open-source AI-driven vector and knowledge database that features a visually appealing web user interface. It is comparable to LangChain’s Online Demo Chat Demo. The platform consists of two main components: a JavaScript and React-based frontend for the user interface, and a Golang, Beego, Python, Flask, and MySQL-powered backend that handles the server-side […]
The Acer Aspire 1, powered by Qualcomm Snapdragon and running on an ARM processor, is gaining support from the Linux kernel. Although it is an older device, it still holds potential for those seeking a low-power and long-battery-life laptop. Recent patches have been submitted to create an embedded controller driver for the Acer Aspire 1, […]