TL;DR summary of stories on the internet
Mullvad VPN has announced that it will no longer support port forwarding due to frequent abuse of the feature. While port forwarding adds value for users who need to allow friends or family access to services behind the VPN, it has also been used to host malicious content, resulting in law enforcement contacting the company, […]
Read more »
The coreboot firmware framework has recently gained popularity and is used as default boot firmware for Google Chromebooks. This course focuses on the design principles and boot process of coreboot, as well as creating a development environment that will lead to successful building and running of QEMU emulated targets. The course requires a comfort level […]
Northeastern University Professor Denise Khor has uncovered a rare Japanese-American 1914 silent film after extensive research to locate the lost reels. ‘The Oath of the Sword’ was believed to have been lost until Khor discovered the decaying reels safely stored in a vault. After restoration, the film will premiere in Los Angeles on Sunday.
In a blog post-like entry, the author discusses the limitations of AI in the field of radiology, highlighting the complexity of the job that requires a decade of training. Technologists often make the mistake of reducing activities to a handful of tasks, failing to consider the long tail of rare conditions that radiologists have to […]
During the 1980s, arcade games featured high score tables where game designers would hide signatures in place of direct credit for the games. By doing so, game designers could signal themselves to game players, and it became a subculture. The phenomenon largely took place during the Golden Age of Arcade Video Games, from 1980 to […]
Donut is a new method of document understanding that uses an OCR-free end-to-end Transformer model, demonstrating state-of-the-art performances on various visual document understanding tasks. It doesn’t require the use of off-the-shelf OCR engines/APIs, providing flexibility on various languages and domains. The method is described in detail and provides full experimental results and analyses in an […]
Drupal is a popular CMS that powers well-known websites such as the European Union, NASA, and Tesla. However, vulnerabilities are discovered in Drupal or in the underlying PHP components over time, and in many cases, the necessary updates are not promptly implemented. WebAssembly provides a capabilities-based security model that can protect against a wide range […]
Software updates are costly, resulting in increasingly complex and untrustworthy software that slows down over time. The author suggests using software with fewer users, easy to modify, open source, and with fewer updates. The simplicity and niche nature of the software makes it easier for forks to keep up with and modify, as opposed to […]
Deus Ex: Mankind Divided has a unique approach to terrain rendering that includes using a translucent material and soft blending with objects. This surprising technique is achieved by rendering the terrain after all opaque objects and in the depth buffer. The article explores potential problems with the approach, including sorting issues and potentially rendering opaque […]
In this article, Duncan Lock expresses his appreciation and admiration for David Peter, an unsung hero in the open source software world, whose software Lock uses on a daily basis. Lock highlights three projects by Peter that he personally loves and uses frequently: bat, fd, and hyperfine. Bat is a cat clone with syntax highlighting […]