---
blogpost: true
date: 1.1.2023
author: Tobias
location: Stuttgart
category: links, 2023
tags: links, 2023
language: Deutsch
---

# Links für 2023 KW 50

Meine \"Wollte ich noch Lesen\"-Liste, zusammengefasst von
[LlongOrca](https://huggingface.co/TheBloke/LlongOrca-13B-16K-GGUF).

**[The Guns Were Said to Be Destroyed. Instead, They Were
Reborn.](https://www.nytimes.com/2023/12/10/us/guns-disposal-recycling.html)**:

In Flint, Michigan, the city announced that 68 assault weapons collected
during a gun buyback would be incinerated due to their policy of not
reselling firearms. However, these guns were instead sent to a private
company that collects and destroys parts of each weapon before selling
the rest as nearly complete gun kits. Hundreds of towns and cities have
turned to this industry for destroying guns used in crimes or
surrendered during buybacks, but many don\'t know that these weapons are
recycled into civilian hands without background checks.

------------------------------------------------------------------------

**[Pitivi --- Tour](https://www.pitivi.org/tour/)**:

The article discusses the video editing software Pitivi which is free
and open source. It is designed to be flexible, efficient, and easy to
learn while maintaining stunning elegance. Pitivi supports various
languages and integrates seamlessly with the GNOME desktop environment.
The software comes packed with features like animated effects,
transitions, filters, audio waveforms, unlimited video/audio track
layers, fast zooming, mousewheel integration, automatic project backups,
and more. It also offers full undo/redo history and accepts multiple
formats.

------------------------------------------------------------------------

**[For Doom\'s 30th anniversary, the Johns Romero and Carmack reunited
to celebrate the FPS that changed everything: \'I want to thank
everybody in the Doom community for keeping this game
alive\'](https://www.pcgamer.com/for-dooms-30th-anniversary-the-johns-romero-and-carmack-reunited-to-celebrate-the-fps-that-changed-everything-i-want-to-thank-everybody-in-the-doom-community-for-keeping-this-game-alive/)**:

On the occasion of Doom\'s 30th anniversary, id Software co-founders
John Carmack and John Romero reunited for a conversation about the
legendary FPS game. The discussion was moderated by David Craddock and
included insights into how they viewed their own work critically as well
as warm reminiscences about creating Doom. Both developers expressed
appreciation for the technical limitations of the time and their
creations\' legacy that continues to this day.

------------------------------------------------------------------------

**[Google Just Denied Cops a Key Surveillance
Tool](https://www.wired.com/story/google-geofence-warrants-security-roundup/)**:

Solntsepek, a hacker group previously linked to Sandworm, claimed
responsibility for a disruptive attack on Ukrainian internet and mobile
service provider Kyivstar. As Russia\'s kinetic war against Ukraine
continues, the country has launched an official crowdfunding platform
called United24 to raise awareness and aid in rebuilding efforts. Kytch,
a small company that aimed to fix McDonald\'s often-broken ice cream
machines, claims it has discovered a \"smoking gun\" email from the CEO
of McDonald\'s ice cream machine manufacturer implying an alleged plan
to undermine Kytch as a potential competitor. Microsoft\'s Digital Crime
Unit refines strategies that combine intelligence and technical
capabilities with legal tactics to disrupt global cybercrime and
state-backed actors. Geofence warrants, which require tech companies to
provide data on users in a specific area at a particular time, have
become an increasingly powerful tool for law enforcement but are
criticized for violating the Fourth Amendment. Apple has added new
security features designed to protect user data from thieves and
accounts. A group of Chinese hackers known as Volt Typhoon has targeted
power grids and critical infrastructure in the Pacific region and US,
raising alarms across the cybersecurity industry. Cox Media Group (CMG)
is an advertising company that claims it can eavesdrop on conversations
via devices like iPhones and Amazon Echoes but hasn\'t been verified as
working as advertised.

------------------------------------------------------------------------

**[The Epic question: how Google lost when Apple
won](https://www.theverge.com/24003500/epic-v-google-loss-apple-win-fortnite-trial-monopoly)**:

Apple has an iron fist control over the iPhone App Store, while Google
allows users to sideload apps on Android devices. A court ruled that
Google had maintained an unlawful monopoly with the Play store. The case
involved documents showing deals between Google and partners, as well as
evidence of internal communications being deleted intentionally.

------------------------------------------------------------------------

**[Mutzenbraten von ebkade52\|
Chefkoch](https://www.chefkoch.de/rezepte/758451178614199/Mutzenbraten.html)**:

This article is a recipe for a German Black Pork Roast (Zutaten) using
ingredients like pork, marjoram, thyme, onion, garlic, and black beer.
The meat is marinated in the black beer overnight, then baked in an oven
with margarine. To serve, it is topped with a sauce made from the
roasting pan juices and served with sauerkraut and strong bread.

------------------------------------------------------------------------

**[Interview: The Threat of Self-Censorship in
Science](https://undark.org/2023/12/15/interview-self-censorship/)**:

In a recent paper published in The Proceedings of the National Academy
of Sciences, behavioral scientist Cory Clark argues that censorship
often comes from within science as researchers choose to avoid certain
areas of research or publish controversial results. This form of
censorship is driven by self-protection, benevolence toward peer
scholars, and prosocial concerns for the well-being of human social
groups. Clark believes many disputes between scientists could be
resolved if they worked together. To foster collaboration, she serves as
director of the Adversarial Collaboration Project at Penn, which aims to
bring together scientists with differing viewpoints.

------------------------------------------------------------------------

**[Andy Matuschak - Self-Teaching, Spaced Repetition, & Why Books Don't
Work](https://www.dwarkeshpatel.com/p/andy-matuschak)**:

In summary, the article discusses various aspects of learning and memory
with a focus on spaced repetition as an effective tool for memorization
and understanding complex subjects. The conversation also touches on
topics such as self-teaching, the role of confusion in learning, how to
structure effective self-teaching, and the importance of attention and
effort in the learning process. It further explores the value of memory
in decision making, creativity, and problem solving, and discusses the
potential impact of LLMs (Large Language Models) on memorization
practices. The article also touches on different pedagogical tools like
video games, streaming, and hypertext for enhancing learning
experiences. Finally, it delves into the challenges and opportunities
associated with crowdfunding research projects in technology.

------------------------------------------------------------------------

**[Hitchhiker\'s Guide To Moving From Relational Data To Events -
Event-Driven.io](https://event-driven.io/en/the_end_is_near_for_crud_data/)**:

The article \"Hitchhiker\'s Guide To Moving Relational Data To Events\"
discusses the end of CRUD (Create, Read, Update, Delete) world and the
transition to Event Sourcing as a way to optimize information quality
over storage size. It recommends starting by modeling the process by
discovering events, finding commands or intentions, and defining
business rules. The article also provides tips on migrating relational
data to document-based models by identifying stream boundaries and
avoiding retrofitting old information.

------------------------------------------------------------------------

**[svgl.vercel.app](https://svgl.vercel.app/)**:

**TODO**

------------------------------------------------------------------------

**[Data dispatch #4: the falling nutritional value of
crops](https://jeroenvanbaar.substack.com/p/data-dispatch-4-the-falling-nutritional)**:

The mineral content of wheat and rice has decreased over the past sixty
years due to factors like the Green Revolution in agriculture, which led
to higher crop yields but lower mineral content. As a result, people may
need to consume more fruits and vegetables to obtain the same amount of
essential minerals as before. This decline in nutritional value can
contribute to micronutrient malnutrition, particularly in low-income
countries.

------------------------------------------------------------------------

**[ⓍTTS - TTS 0.22.0
documentation](https://docs.coqui.ai/en/latest/models/xtts.html)**:

The XTTS model is a super cool Text-to-Speech (TTS) model that uses the
Tortoise framework and allows users to clone voices in different
languages by simply providing a quick 3-second audio clip. It offers
several impressive features, including cross-language voice cloning,
multi-lingual speech generation, a 24 kHz sampling rate, and streaming
inference with latency under 200ms. Additionally, it supports
fine-tuning for further customization. The XTTS model is currently
available in 16 languages, such as English, Spanish, French, German,
Italian, Portuguese, Polish, Turkish, Russian, Dutch, Czech, Arabic,
Chinese, Japanese, Hungarian, and Korean, with plans to add more
languages in the future.

The XTTS Model is licensed under the Coqui Public Model License, and
users can communicate with the community through Discord and Twitter or
by contacting Coqui at info@coqui.ai for any assistance. To use the
model, there are various command-line tools, API support, and an
optional GPT encoder training feature.

------------------------------------------------------------------------

**['Head-scratcher': first look at asteroid dust brought to Earth offers
surprises](https://www.nature.com/articles/d41586-023-03978-4?error=cookies_not_supported&code=1936f9eb-19ae-4f80-8927-b768e5d73cdd)**:

In just 2.5 months since NASA\'s first asteroid sample-return mission
landed on Earth, more than 70 grams of asteroid dust and pebbles have
been carefully retrieved from the spacecraft\'s canister. This is ten
times the amount brought back from an asteroid previously and more than
necessary for declaring the mission a success. Some pebbles contain
puzzling chemical element combinations. The research team discovered
that 2 out of 35 screws fastening the canister lid couldn\'t be removed,
blocking further access to the space rocks. NASA is now making
specialized screwdrivers for this purpose. Early analysis suggests the
Bennu fragments are rich in volatile chemical compounds dating back over
4.5 billion years and may contain building blocks of life.

------------------------------------------------------------------------

**[EU capitals want media law carve-out to spy on
reporters](https://www.politico.eu/article/eu-capitals-want-media-law-carve-out-to-spy-on-reporters/)**:

European Union governments are considering granting themselves
permission to spy on journalists in the name of national security,
despite calls for greater scrutiny over surveillance tools.
Governments\' deputies will likely approve an exemption in the new media
regulation, which was originally created to protect media independence
and pluralism. Critics argue that this could give countries a free pass
to snoop on reporters, while privacy advocates and journalist
organizations push for stronger legal safeguards against spyware
deployment. The final decision is yet to be made, as the Council must
negotiate with the Parliament before new rules can take effect.

------------------------------------------------------------------------

**[what-happens-brain-while-daydreaming](https://hms.harvard.edu/news/what-happens-brain-while-daydreaming)**:

This article discusses research on daydreaming in mice conducted at
Harvard Medical School. The study found that during quiet waking
periods, mice displayed patterns of neural activity similar to when they
viewed an image, suggesting they were daydreaming about it. These early
daydreams could predict the changes in brain response over time,
potentially indicating their role in brain plasticity and learning.
Further research is needed to confirm these findings and explore if a
similar process occurs in humans. The study also aligns with other
evidence showing that quiet wakefulness after an experience can improve
memory and learning.

------------------------------------------------------------------------

**[Data exfiltration from Writer.com with indirect prompt
injection](https://promptarmor.substack.com/p/data-exfiltration-from-writercom)**:

Thank you for summarizing the article. The main issue discussed is a
vulnerability in Writer.com that allows attackers to steal users\'
private documents through manipulation of the language model used for
content generation. This vulnerability has not been fixed yet, as it was
not initially triaged as a security issue by Writer.com after
disclosure. The authors demonstrate various examples of how this
vulnerability can be exploited, and provide resources to learn more
about LLM security risks.

------------------------------------------------------------------------

**[Toot by
Michael](https://cloudisland.nz/@fincham/111581381415456989)**:

In the early 2000s, the author used XMPP to communicate with friends via
their personal ejabberd server and Google Chat. However, they noticed
that some friends stopped responding to messages despite being online.
Over time, this issue affected more people until no one responded
anymore. The author initially assumed their friends lost interest in
talking but later found out through alternative means that the messages
were never received due to a silent breakage by Google\'s service. This
experience left them feeling hurt and they warn against big companies
joining federated communication protocols like ActivityPub, advocating
for supporting cooperative and community-run services instead.

------------------------------------------------------------------------

**[McDonald's Ice Cream Machine Hackers Say They Found the 'Smoking Gun'
That Killed Their
Startup](https://www.wired.com/story/kytch-taylor-mcdonalds-ice-cream-machine-smoking-gun/)**:

In this article, Kytch, a small startup company that developed a device
designed to fix McDonald\'s famously out-of-order ice cream machines,
faced legal threats and betrayal from its partners. They allege that
Taylor, the soft-serve machine maker, helped engineer McDonald\'s email
warning franchisees against using Kytch\'s product due to potential
competition. The startup is now involved in a legal battle with Taylor
for alleged trade libel, tortious interference, and other claims.

------------------------------------------------------------------------

**[4 simple software engineering habits that transformed my
productivity](https://read.engineerscodex.com/p/simple-software-engineering-habits)**:

In this article, the author shares four key habits that have
significantly improved their software engineering productivity. Firstly,
they emphasize the importance of maintaining a flow state when
programming, as it can lead to increased efficiency and better results.
The second habit is learning keyboard shortcuts for various tools and
programs in the workflow, which can save time and enhance comfort during
coding sessions. Thirdly, the author suggests keeping an organized list
of common commands and references for quick access when needed. Lastly,
they discuss the value of saying \"no\" to tasks or activities that may
not be relevant, valuable, or essential at a given point in time. This
allows individuals to focus on their current priorities and avoid
spreading themselves too thin. The author also mentions SWE Quiz, a
software engineering question resource that can help improve knowledge
and confidence in the field.

------------------------------------------------------------------------

**[Microsoft defends Edge\'s predatory practices with cringe and
audacious reply on
X](https://www.neowin.net/news/microsoft-defends-edges-predatory-practices-with-cringe-and-audacious-reply-on-x/)**:

The article discusses a negative experience with the Microsoft Edge
Chromium browser in December 2023, where the company\'s controversial
practices and lack of user-friendliness led to outrage among users.
Despite users voicing their complaints on social media, Microsoft
Edge\'s official account often ignored them. One user \@cadenzza\_
shared a screenshot of an upsell promoting Bing as the default search
engine without a clear \"No\" button, prompting a poorly handled
response from the Microsoft Edge account. The situation resulted in
users expressing their dissatisfaction and considering alternative
browser options or even uninstalling Edge altogether.

------------------------------------------------------------------------

**[Fragmentation](http://theprogrammersparadox.blogspot.com/2023/12/fragmentation.html?m=1)**:

The article discusses how individuals prefer fragmentation when dealing
with large-scale software development, often choosing arbitrary lines of
decomposition and neglecting to consider dependencies between different
pieces. This practice can lead to complex systems where the overall
behavior does not match that intended by the developer. Encapsulation is
presented as a better alternative to fragmentation, as it hides rough
edges and prevents complexity from becoming unmanageable.

------------------------------------------------------------------------

**[The Stanford Prison Experiment was massively influential. We just
learned it was a
fraud.](https://www.vox.com/2018/6/13/17449118/stanford-prison-experiment-fraud-psychology-replication)**:

The Stanford Prison Experiment, conducted in the early 1970s by
psychologist Philip Zimbardo, is one of the most famous and influential
psychological studies of all time. The experiment involved assigning
paid participants to play the roles of \"inmates\" or \"guards\" in a
mock prison setting at Stanford University. However, recent revelations
based on previously unpublished recordings of Zimbardo and interviews
with his subjects suggest that the guards were coached to be cruel and
that one of the experiment\'s most striking moments was staged. These
findings have led many psychologists to call for the removal of this
study from introductory textbooks and question its impact on popular
understanding of human nature and behavior. The Stanford Prison
Experiment is not the only classic psychological experiment to be
reevaluated or discredited in recent years; others include the \"Robbers
Cave\" experiment, the Milgram electroshock test, and the marshmallow
test.

------------------------------------------------------------------------

**[5 shortcomings of Helm \|
Glasskube](https://glasskube.eu/en/r/knowledge/5-helm-shortcomings/)**:

The article discusses the shortcomings of Helm, a popular deployment
tool for Kubernetes. The author argues that Helm falls short in several
areas, such as handling upgrades, managing dependencies, user-friendly
creation, using values.yaml files, and interacting with the Kubernetes
API. As a result, Glasskube is proposed as an alternative solution to
overcome these limitations and provide a more dynamic deployment method
for modern software deployments on Kubernetes.

------------------------------------------------------------------------

**['It's all gone': CAR-T therapy forces autoimmune diseases into
remission](https://www.nature.com/articles/d41586-023-03968-6?error=cookies_not_supported&code=cf890f49-2a56-4f83-ab8d-1b025359d1a5)**:

Engineered immune cells have successfully treated 15 people with
autoimmune disorders, resulting in a disease-free or nearly symptom-free
status since treatment. This approach, known as CAR-T cell therapy,
holds promise for potentially treating other conditions caused by rogue
immune cells producing antibodies against the body\'s own tissues. The
success of these treatments, although preliminary, has generated
excitement in the medical community due to its potential applications.

------------------------------------------------------------------------

**[Maybe Getting Rid of Your QA Team was Bad,
Actually.](https://davidkcaudill.medium.com/maybe-getting-rid-of-your-qa-team-was-bad-actually-52c408bd048b)**:

This article discusses how DevOps practitioners have applied Theory Of
Constraints to optimize delivery pipelines and practices over the years.
However, they missed treating quality assurance (QA) as a priority
issue. The author claims that this has led to low-quality software and
increased problems in organizations. The article highlights how defect
tracking, bug triage, defect investigation, focus on QA, and end-to-end
testing are important aspects of maintaining software quality that
should not be overlooked.

------------------------------------------------------------------------

**[Texas A&M Researcher Says Men Should Abstain From Drinking At Least
Three Months Prior To
Conceiving](https://today.tamu.edu/2023/12/13/drinking-prior-to-conceiving/)**:

In an article published by Texas A&M University researchers, it was
found that the effects of alcohol consumption on a father\'s sperm last
longer than previously believed - longer than a month. This discovery
emphasizes the importance of fathers abstaining from alcohol at least
three months prior to conceiving in order to prevent potential birth
defects and support healthy pregnancy outcomes.

------------------------------------------------------------------------

**[Johann Karl August Musäus: Volksmärchen der
Deutschen](https://www.projekt-gutenberg.org/musaeus/vmd/vmd07.html)**:

The text provided is an excerpt from the book titled \"Johann Karl
August Musus: Volksmrchen der Deutschen\" by Johann Karl August Musus.
This book contains a collection of German folktales and legends, which
are based on traditional stories that have been passed down through
generations. The specific part you\'ve shared is about a knight named
Friedbert who becomes enamored with a Greek woman named Zoe during his
stay in Greece. The narrative follows the challenges he faces due to his
love for her and the various obstacles he encounters while trying to be
with her.

The writing style of this text is quite elaborate, using descriptions
and language that might not be easily understood by modern readers who
are not familiar with older German literature. This could make it more
challenging to read and comprehend for those unaccustomed to this type
of writing style.

In summary, the text provided comes from a book filled with traditional
German folktales, including one about a knight\'s complicated love
affair with a Greek woman named Zoe. The style and language used in this
excerpt may be difficult for modern readers who are not familiar with
older German literature.

------------------------------------------------------------------------

**[Schwanensee](https://www.semperoper.de/spielplan/stuecke/stid/schwanensee/62280.html#a_30289)**:

Johan Inger, a Swedish choreographer, is known for his successful
literary adaptations of Carmen and Peer Gynt. Now, he turns to the
classical ballet masterpiece Swan Lake. This timeless tale of love and
betrayal has been given a new perspective by Inger, with a focus on
deeper questions about the impact of violence and manipulation on human
relationships, as well as the role of personal freedom, respect, and
acceptance in romantic relationships.

------------------------------------------------------------------------

**[How Police Have Undermined the Promise of Body
Cameras](https://www.propublica.org/article/how-police-undermined-promise-body-cameras)**:

number of complaints against police and instances of misconduct once
body cameras were introduced.In New York, there have been efforts to use
footage to better police conduct. A pilot program was launched last year
that allows officers with histories of excessive-force complaints to
record their interactions with civilians. But the department has not
given direct access to its entire force\'s footage to outside review
boards or oversight agencies, which is required in some other cities.
And even as it refuses to change, other technology has emerged that
could transform how body cameras are used and whom they hold
accountable. In January, a federal appeals court ruled that the police
department\'s withholding of footage violated the Freedom of Information
Act, paving the way for outside oversight agencies to gain access.\"We
need to change the narrative around body-worn cameras,\" says Nicole
Napolitano. \"They can be an incredibly powerful tool for accountability
and transparency but only if the agency holding them is independent from
the department they are supposed to oversee.\"

------------------------------------------------------------------------

**[Fast Fashion
Casino](https://dirt.fyi/article/2023/11/fast-fashion-casino)**:

The article discusses how online shopping experiences have become like
casinos with their excessive product offerings at low prices. Platforms
such as Temu, Flip, TikTok Shop, and Shein are mentioned for exploiting
users\' shopping habits to drive profits while creating an addicting
environment that keeps people coming back for more deals. The author
argues that these platforms mimic the gambling experience with their
constant updates, promotions, and games designed to keep users engaged
in order to maximize revenue from advertising or shopping commissions.

------------------------------------------------------------------------

**[AMD\'s New Threadripper Chips Have a Hidden Fuse That Blows When
Overclocking Is
Enabled](https://www.extremetech.com/computing/amds-new-threadripper-chips-have-a-hidden-fuse-that-blows-when-overclocking)**:

AMD uses a hidden fuse in its Threadripper 7000 series processors that
blows when overclocking is enabled. This does not automatically void the
warranty but informs AMD of potential damage caused by overclocking if
it occurs. Overclocking is supported on these CPUs, but any resulting
damage will void the warranty.

------------------------------------------------------------------------

**[Cybersecurity Isn\'t
Special](https://kellyshortridge.com/blog/posts/cybersecurity-isnt-special/)**:

It appears that the article is discussing the challenges faced by
software delivery stakeholders due to cybersecurity programs and their
gatekeeping nature. The author argues that these programs should not be
seen as special snowflakes, but rather work collaboratively with other
teams to make cybersecurity more constructive and less constrictive. The
article presents various opportunities for improving the current
situation, such as self-certification, following platform/SRE\'s lead,
building standardized patterns, abandoning the perimeter model,
providing an advisory service, integrating security into infrastructure,
conducting user research, and focusing on sustained resilience.

------------------------------------------------------------------------

**[Open Source: Cyber Resilience Act könnte EU-Unternehmen erheblich
schaden](https://www.heise.de/hintergrund/Open-Source-Cyber-Resilience-Act-koennte-EU-Unternehmen-erheblich-schaden-9541929.html?view=print)**:

Summary: The Cyber Resilience Act (CRA) has raised concerns among the
open-source community due to its potential impact on software
development in Europe. In an interview, Mike Milinkovich, Executive
Director of the Eclipse Foundation, discusses how the CRA could change
the landscape for open-source software and suggests that companies
prepare themselves by working closely with organizations like the
Eclipse Foundation. Milinkovich also emphasizes that while politicians
may not understand the role of open-source in innovation and economic
growth, it\'s vital to communicate its importance to secure Europe\'s
future technological well-being. The CRA is still under debate, and the
final version will determine its impact on the open-source industry.

------------------------------------------------------------------------

**[Leverage Points: Places to Intervene in a
System](https://donellameadows.org/archives/leverage-points-places-to-intervene-in-a-system/)**:

The article titled \"Leverage Points: Places to Intervene in a System\"
by Donella Meadows is about understanding complex systems, identifying
leverage points within them, and using these points for effective
intervention or change. The author defines leverage points as areas
where one can apply influence to produce significant changes in the
system\'s behavior.

Meadows begins by explaining that people often have an intuitive sense
of what might be a leverage point but may not know how to use it
effectively, or they might use it incorrectly, leading to
counterproductive results. She then introduces a list of 12 leverage
points, ranked from the least effective (parameters) to the most
powerful (transcending paradigms).

Here\'s a detailed breakdown:

-   Constants, parameters, numbers (such as subsidies, taxes,
    standards): These are the settings or rules that can be adjusted
    within a system, like changing the speed limit on a road. While they
    may seem like easy targets for change, Meadows argues that tweaking
    these often doesn\'t lead to significant long-term changes in
    behavior.


-   The sizes of buffers and other stabilizing stocks relative to their
    flows: Buffers help absorb shocks or fluctuations within a system.
    For example, maintaining high levels of water supply can prevent
    droughts, but too much buffer can make the system inflexible. This
    point is about finding the right balance in these reserves.


-   The structure of material stocks and flows and nodes of
    intersection: This involves understanding how physical components
    interact within a system. For example, changing the layout of roads
    or buildings can significantly impact traffic flow and pollution
    levels.


-   The lengths of delays relative to rates of change: Delays in
    feedback loops are critical determinants of system behavior. If
    there\'s too much delay between cause and effect (like waiting for
    approval from multiple layers of management), it becomes difficult
    to control the system effectively.


-   The strength of negative feedback loops relative to their impacts:
    Negative feedback loops help stabilize a system by counteracting
    changes that deviate from its normal state. For example, if
    someone\'s blood sugar levels rise too high, negative feedback
    mechanisms like increased insulin production bring them back down.
    Weaknesses in these feedback systems can lead to instability or
    collapse.


-   The gain around driving positive feedback loops: Positive feedback
    loops are self-reinforcing and can cause rapid growth or decay
    within a system. This point is about understanding where such loops
    exist and how they might be influencing the system\'s behavior, with
    an emphasis on controlling their power to prevent runaway effects.


-   The structure of information flows (who does and doesn\'t have
    access): Information plays a crucial role in systems. For instance,
    making financial data transparent can lead to more informed
    decision-making and potentially reduce corruption. This point is
    about ensuring that the right people have access to accurate and
    timely information for effective system management.


-   The rules of the system (incentives, punishments, constraints):
    Rules define what\'s allowed or not in a system. For example,
    traffic laws dictate how vehicles must behave on roads. This point
    is about understanding these rules and their potential impact on
    system behavior.


-   The power to add, change, evolve, or self-organize system structure:
    This involves the ability of a system to adapt and change over time
    in response to new information or challenges. For example,
    biological evolution allows species to survive changing
    environmental conditions.


-   The goals of the system: Every system has underlying objectives that
    drive its behavior. For instance, a company might aim for profit
    maximization while a government may prioritize social welfare. This
    point is about understanding and potentially influencing these goals
    to align with desired outcomes.


-   The mindset or paradigm out of which the system arises: Paradigms
    are deeply ingrained beliefs or assumptions that shape our
    understanding of reality. For example, one might believe in a free
    market economy versus state control. Changing such paradigms can
    lead to profound shifts in how systems function.


-   The power to transcend paradigms: This is the highest leverage point
    identified by Meadows. It involves letting go of rigid beliefs and
    being open to multiple perspectives. By doing so, one can approach
    problems with greater flexibility and find innovative solutions that
    might have been invisible from within a specific paradigm.

The article concludes with a cautionary note about the difficulty in
accessing these leverage points due to resistance from the system
itself. Meadows suggests that true mastery often involves strategic
letting go rather than pushing for change, and that this process can
lead to profound personal growth and empowerment.

------------------------------------------------------------------------

**[The Death of Decentralized
Email](https://blog.lopp.net/death-of-decentralized-email/)**:

The history of SMTP (Simple Mail Transfer Protocol) shows the challenges
and lessons learned in scaling email infrastructure over the past four
decades. The article discusses the evolution of spam prevention
measures, the rise of centralized email providers, and the eventual
decline of SMTP as a decentralized protocol for email communication. It
highlights the importance of learning from history to avoid repeating
mistakes in implementing new technologies.

------------------------------------------------------------------------

**[OpenCola/recipe.markdown at master ·
cognitom/OpenCola](https://github.com/cognitom/OpenCola/blob/master/recipe.markdown)**:

OpenCola is an open-source project forked from mmichelli/Coca-Cola, and
has received 7 forks and 109 stars.

------------------------------------------------------------------------

**[GitHub - cognitom/OpenCola:
Coca-Cola](https://github.com/cognitom/OpenCola)**:

The article discusses Coca-Cola\'s secret formula and how third parties
have attempted to replicate it unsuccessfully. The text also mentions a
Cube-Cola version, OpenCola (an open source Coca-Cola project), and the
original ingredients of Coca-Cola.

------------------------------------------------------------------------

**[Polish Hackers Repaired Trains the Manufacturer Artificially Bricked.
Now The Train Company Is Threatening
Them](https://www.404media.co/polish-hackers-repaired-trains-the-manufacturer-artificially-bricked-now-the-train-company-is-threatening-them/)**:

The newsletter signup process involves users entering a valid email
address to receive updates on a particular topic or subject matter.
However, if an invalid email address is entered, an error message will
be displayed instead of confirming the subscription. This system ensures
that only correct and functional email addresses can be used for
successful subscriptions.

------------------------------------------------------------------------

**[Bash One-Liners for LLMs](https://justine.lol/oneliners/)**:

This article introduces llamafile, an open-source project that allows
users to run large language models (LLMs) such as LLaMA and GPT-3 on
their own computers using simple one-liner commands. It provides
examples of different tasks that can be accomplished with llamafile,
including image summarization, URL summarization, librarian chatbot,
code completion, and email composition. The article explains how to
download and use the project for various purposes and emphasizes the
importance of following best practices when interacting with LLMs on the
command line.

------------------------------------------------------------------------

**[All the Carcinogens We Cannot
See](https://www.newyorker.com/magazine/2023/12/18/all-the-carcinogens-we-cannot-see)**:

This article discusses the possibility that certain carcinogens may not
directly cause cancer but instead promote its development by triggering
an inflammatory response or otherwise acting as promoters. The research
mentioned in the article suggests that fine-particulate air pollution
may be a factor in lung cancer among nonsmokers, likely through this
mechanism. Other examples include asbestos and croton oil, which have
been associated with cancer but not through their mutagenicity or DNA
damage-inducing properties. The findings emphasize the need for further
study into environmental factors and inflammation in carcinogenesis.

------------------------------------------------------------------------

**[Apple\'s new iPhone security setting keeps thieves out of your
digital accounts](https://news.ycombinator.com/item?id=38622248)**:

This article discusses a variety of topics and opinions related to
technology, with users sharing their thoughts on various aspects of the
subject matter. The discussion involves user names such as gojomo,
Zapped, brookst, kotaKat, and others, who post their opinions in
response to previous posts.

------------------------------------------------------------------------

**[Elektronische Patientenakte: \"Für Datensicherheit bleibt kaum
Zeit\"](https://www.heise.de/hintergrund/Interview-zur-E-Patientenakte-Fuer-Datensicherheit-bleibt-kaum-Zeit-9570491.html?view=print)**:

To summarize, the German government plans to introduce electronic
patient records for all insured patients by 2025, called ePA or
elektronische Patientenakte. This means that health data will be shared
amongst research facilities and public health institutions within the
EU, eventually worldwide. The initial plan was that data would
automatically be extracted from these electronic patient records of the
legally insured. However, this has been met with criticism and not
everyone agrees it\'s a good idea. This is because the ePA was initially
designed for better care for patients, not as a tool to make their
health data available.

In an interview with Bianca Kastl, who works on digital infrastructure
in public healthcare, she mentioned that research should be done using
large central databases rather than through comprehensive data
collection from numerous locations. She also discussed the idea of
having patients store their own electronic medical records and only
granting access to specific research teams when needed, but this
approach would require a high level of digital literacy among the
general population.

Another concern is the possibility of cyberattacks resulting in
unauthorized access to health data. The storage and sharing of
electronic patient records could create vulnerabilities that malicious
actors can exploit. Additionally, there are concerns about how privacy
will be protected in an environment where data is continually being
shared amongst multiple parties.

Despite these risks, Kastl believes that digital healthcare solutions
have the potential to significantly improve patient care and medical
research. However, she emphasizes that cybersecurity measures must be
taken seriously to ensure safety and privacy for all involved in this
new digital healthcare landscape.

------------------------------------------------------------------------

**[Asahi Linux: Youtube setzt Videoqualität auf ARM-Rechnern
herunter](https://www.golem.de/news/asahi-linux-youtube-setzt-videoqualitaet-auf-arm-rechnern-herunter-2312-180265.html)**:

Asahi Linux has found a strange bug on YouTube. According to Hector
Martin, the founder and main developer of Asahi Linux, YouTube reduces
video quality significantly when used with Firefox on his platform. The
Asahi Linux is an ARM-based native port for Apple Silicon Macs. Martin
believes that this is due to YouTube setting the standard resolution at
1080p, which drops down to 480p for computers with two or fewer cores
and further to 240p on all ARM machines.

He also believes that Google assumes that ARM machines are five times
worse than Intel systems, even if they have 20 cores or more. To solve
this issue, Martin suggests using User-Agent spoofing in the Firefox
package for Asahi Linux distribution, which allows users to enjoy
YouTube videos of good quality. Additionally, he calls on Mozilla
developers to change the user agent setting on Linux platforms to x86
permanently as well, as it is already done in Windows and MacOS.

------------------------------------------------------------------------

**[This is bigger than COVID: Why are so many Americans dying
early?](https://thehill.com/opinion/healthcare/4354004-this-is-bigger-than-covid-why-are-so-many-americans-dying-early/)**:

This article discusses the concerning trend of excess deaths in the
United States beyond COVID-19, with life insurers reporting alarming
rates. It highlights how young working-age individuals are
disproportionately affected and calls for an investigation into
post-pandemic measures taken during COVID-19 to protect future
generations.

------------------------------------------------------------------------

**[Most companies using AI are 'lighting money on fire,' says Cloudflare
CEO Matthew
Prince](https://fortune.com/2023/12/12/cloudflare-ceo-matthew-prince-companies-lighting-money-fire-with-ai/)**:

The Fortune Brainstorm AI conference featured Matthew Prince, co-founder
and CEO of Cloudflare, expressing his concerns about the recent
generative AI boom, stating that most companies investing in AI are
\"lighting money on fire.\" He highlighted issues such as the shortage
of GPUs and lack of competition. In contrast, Jennifer Tejada,
chairperson and CEO of PagerDuty, shared a more optimistic outlook,
emphasizing the importance of simplicity in AI strategies, employee
involvement, and training for the workforce to adapt to AI
transformation.

------------------------------------------------------------------------

**[10 Peer-Reviewed Scientific Studies that Link Glyphosate to the
Destruction of the
Microbiome](https://medium.com/collapsenews/10-peer-reviewed-scientific-studies-that-link-glyphosate-to-the-destruction-of-the-microbiome-019898798851)**:

Glyphosate, a widely used herbicide in agriculture, has been the subject
of numerous studies due to its potential health risks. The impact on the
human microbiome, specifically gut bacteria, is an area of concern.
Studies have shown that over half of the bacterial strains in the human
microbiome are sensitive to glyphosate, potentially disrupting its
balance. Exposure to low-dose glyphosate was found to decrease
beneficial bacteria and increase harmful ones, affecting gut homeostasis
and inflammation. Glyphosate exposure can also influence
neuropsychiatric conditions like depression and anxiety, impacting
mental health. Additionally, it has been associated with alterations in
the urine metabolome and changes to metabolic health and inflammation.
Some studies indicate that glyphosate could lead to alterations in
bacterial species\' abundances, increasing the risk of obesity and
metabolic disorders. Moreover, it is found to cause changes in the gut
microbiota of aquatic organisms like fish and crayfish, affecting
overall health. Finally, glyphosate exposure may alter the soil
microbial community and its functions, with implications for nutrient
cycling and plant growth.

------------------------------------------------------------------------

**[GitHub - makeplane/plane: 🔥 🔥 🔥 Open Source JIRA, Linear and
Height Alternative. Plane helps you track your issues, epics, and
product roadmaps in the simplest way
possible.](https://github.com/makeplane/plane)**:

Plane is an open-source software development tool that helps manage
issues, sprints, and product roadmaps. Users can create a Plane Cloud
account or self-host the tool. Key features include issue planning and
tracking, customizable layouts, cycling tools for organizing sprints,
and more. The community can contribute to the project through GitHub
Discussions and the Plane Discord server.

------------------------------------------------------------------------

**[professor-in-jordan-sues-sleuth-who-exposed-citation-anomalies](https://retractionwatch.com/2023/11/29/professor-in-jordan-sues-sleuth-who-exposed-citation-anomalies/)**:

A PhD student, Solal Pirelli, exposed potential citation fraud by
blogging about dubious conferences linked to Shadi Aljawarneh, a
computer science professor. The blog post led to legal threats and a
lawsuit from Aljawarneh\'s lawyer, but the charges were dismissed by the
public prosecutor. Despite this, an appellate court allowed the case to
proceed. Pirelli remains unfazed as truth spoken in the general-public
interest is a defense to libel or slander under Swiss law. The blog post
also led to the cancellation of an upcoming conference and Aljawarneh\'s
removal from the editorial board of PeerJ Computer Science.

------------------------------------------------------------------------

**[How Twitter broke the
news](https://www.theverge.com/c/features/23993135/twitter-breaking-news-history)**:

The article discusses the role Twitter played in mass media
communication for over a decade, starting from breaking news, live
sports commentary, politics, celebrity behavior, and more. It highlights
how the platform became a vital tool for newsgathering and a symbol of
power and influence. However, it also mentions the downsides such as
concentration on Twitter leading to groupthink and manipulation by
online harassment, driving away ad clients to social platforms with
better ad products, and breaking traditional news media business models.
The article concludes by suggesting that fragmentation in social media
might be beneficial for journalism overall, allowing for more
experimentation and a healthier landscape.

------------------------------------------------------------------------

**[Before Elon, Twitter was an idealist's
workplace](https://www.theverge.com/c/features/23997510/twitter-jack-dorsey-workplace-extremely-softcore)**:

In the early 2010s, Twitter was a powerful platform that played a
significant role in events such as the Arab Spring and Occupy Wall
Street. The company\'s culture was focused on happiness of its
employees, unlike other tech companies like Goldman Sachs, where
employees were constantly under pressure to make money. However, with
recent changes and controversies surrounding content moderation,
Twitter\'s cultural influence has declined significantly. In 2021, Elon
Musk purchased the company for \$44 billion, bringing a new direction
and further changes.

------------------------------------------------------------------------

**[Why Amazon Has No Profits --- Benedict
Evans](https://www.ben-evans.com/benedictevans/2014/9/4/why-amazon-has-no-profits-and-why-it-works)**:

The article discusses the financial strategies behind Amazon\'s business
model and how it manages to achieve high revenues without necessarily
showing profits on its balance sheets. It explains that Amazon is
structured into multiple segments, each with their own internal profit
and loss statements and a degree of autonomy. Additionally, third-party
sales contribute significantly to the company\'s total unit sales and
account for close to half of them.

The author emphasizes that looking at net income alone does not provide
an accurate picture of Amazon\'s business activities as it only focuses
on how much money is left over after expenses each quarter. Instead,
they recommend examining cash flow statements, which are more reliable
in reflecting the actual financial performance of a company. The article
also highlights that Amazon has consistently increased its capital
expenditure (capex) to support its growth and expansion plans,
particularly in fulfillment capacity and AWS.

The article ends with a question about whether investors should continue
putting their money into Amazon based on the belief that Jeff Bezos can
capture a significant portion of the future of commerce.

------------------------------------------------------------------------

**[The houses built to survive
floods](https://www.bbc.com/future/article/20231130-the-floating-homes-built-for-floods)**:

The Manobo indigenous people living in the Philippines have developed a
unique technique for building floating homes which allow them to thrive
amidst frequent storms and floods. Their houses are built on raft-like
platforms made of bamboo and balsa wood, anchored using heavy-duty ropes
and vines coiled around bangkal trees native to the area. This technique
has proven effective in withstanding extreme weather events such as
Typhoon Bopha in 2012. Researchers are now interested in these
traditional methods for adapting to and preparing for increasingly
extreme weather due to climate change. Indigenous communities like the
Manobo possess valuable knowledge and practices that could contribute to
sustainable solutions for urban areas threatened by floods and rising
sea levels, especially in archipelagic countries.

------------------------------------------------------------------------

**[Your code displays Japanese
wrong](https://heistak.github.io/your-code-displays-japanese-wrong/)**:

This article explains how text display issues can occur when the wrong
glyph set is used for displaying Japanese characters. It highlights that
this issue is particularly important to consider since it may cause
misunderstandings for native Japanese speakers who are used to specific
character appearances. The article also provides suggestions on how to
fix these display problems, such as marking elements with lang=ja in web
development or generating separate font atlases for each language in
game development.

------------------------------------------------------------------------

**[The mysterious second parameter to the x86 ENTER
instruction](https://devblogs.microsoft.com/oldnewthing/20231211-00/?p=109126)**:

The x86 instruction set has an ENTER instruction that builds a stack
frame. Values greater than zero for the second parameter are intended
for languages like Pascal which support nested functions that can access
the local variables of their lexical parents. When using enter
instructions, the designers of the x86 instruction set receive an array
of pointers to lexical parent frames rather than a pointer to the start
of a linked list of lexical parent frames. This approach reduces the
number of instructions required for accessing faraway frames but
increases the cost of function calls due to additional copying.

------------------------------------------------------------------------

**[Why You Should Stop Reading
News](https://fs.blog/stop-reading-news/)**:

The article discusses how our obsession with being informed leads to
consuming more news, which contributes to misinformation rather than
making us well-informed. It highlights that due to increased
accessibility and lower production costs, the quality of news has
declined over time. The author suggests reducing reliance on news
consumption and focusing on better information sources instead. They
also advise questioning the authenticity, relevance, and importance of
the information consumed and finding ways to spend less time consuming
unimportant information.

------------------------------------------------------------------------

**[The Secret Behind Qualcomm\'s Margins?
Patents](https://blog.withedge.com/p/the-secret-behind-qualcomms-margins)**:

Apple is developing its own wireless modems to bypass Qualcomm\'s chips
and potentially avoid the company\'s patent licensing strategy.
Qualcomm, a San Diego-based chip manufacturer, has higher profit margins
than most semiconductor firms due to its unique patent licensing
approach. This approach allows Qualcomm to double-dip on revenue streams
and achieve some of the best margins in the industry. The company\'s
success with patents has attracted attention from the Federal Trade
Commission and faced monopoly accusations, but their patent strategy is
a lesson many companies can learn from.

------------------------------------------------------------------------

**[The Right of Self-Defence - Craig
Murray](https://www.craigmurray.org.uk/archives/2023/11/the-right-of-self-defence/)**:

The International Court of Justice (ICJ) ruled in 2004 that Israel\'s
construction of its wall, which is part of the Israeli Apartheid system,
was illegal. The court found that Israel\'s argument of self-defence did
not justify the numerous breaches of international law represented by
the Wall. As a result, Israel cannot use \"self-defence\" as a trump
card to tear up international law in the current situation in Palestine.
Furthermore, the ruling implies that the Palestinians have the right of
self-defence. The BDS movement is acting in line with the obligations
set out by the ICJ, while states attempting to ban it are acting against
those obligations.

------------------------------------------------------------------------

**[Attacking Journalists as Terrorists - Craig
Murray](https://www.craigmurray.org.uk/archives/2023/12/attacking-journalists-as-terrorists/)**:

The article discusses the author\'s experience with police harassment
and incarceration for Contempt of Court, as well as issues related to
the UK Terrorism Act. Two formal complaints have been made to the UN
High Commissioner for Human Rights regarding these matters, with plans
to provide further details about other people who have faced similar
treatment due to their dissenting opinions. The author argues that the
access granted by the Act to people\'s electronics is an invasion of
privacy and should not be permitted, citing Dr John Laughland\'s case as
an example. The author also mentions the recent UK government proposal
to grant state full access to individuals\' bank accounts receiving
state benefits. The author expresses his reliance on voluntary
subscriptions for keeping the blog going and the importance of
alternative voices in journalism.

------------------------------------------------------------------------

**[The hidden depths of the input element -
HTMHell](https://www.htmhell.dev/adventcalendar/2023/8/)**:

The \<input\> element is a versatile component in HTML, offering various
types with different behaviors and visual appearances. This article
explores lesser-known attributes that enhance the usability,
accessibility, and adaptability of these elements to different
situations. Attributes include inputmode for optimizing keyboard
control; readonly attribute for preventing user changes while still
keeping the content accessible; capture attribute for triggering camera
access on devices; spellcheck attribute to enable browser\'s built-in
spell checking capabilities; autocapitalize attribute for controlling
capitalization of text inputs, and autocomplete attribute for providing
hints to fill in input fields with data the browser already knows.

------------------------------------------------------------------------

**[Amazon.com: ELECOM Relacon Handheld Trackball Mouse, Thumb Control,
Left Right Handed Mice, Bluetooth, 10-Button Function, Ergonomic Design,
Optical Gaming Sensor, Smooth Red Ball, Windows11, macOS (M-RT1BRXBK) :
Industrial &
Scientific](https://www.amazon.com/ELECOM-Bluetooth-Thumb-operated-Trackball-M-RT1BRXBK/dp/B08GSCC8RX)**:

The Amazon article showcases the ELECOM Relacon Handheld Trackball
Mouse, a thumb-controlled trackball mouse available for both left and
right-handed users. It features Bluetooth connectivity and an ergonomic
design with a 10-button function. The optical gaming sensor ensures
smooth and accurate tracking, while the red ball adds a unique touch to
its appearance. This product is compatible with Windows 11 and macOS
systems.

------------------------------------------------------------------------

**[18.1€ 52% OFF\|USB C zu C Konverter, Typ C Adapter für Thunderbird
Air Plus, Huawei Vision Glass, XREAL Nreal Power Conversion\| \| -
AliExpress](https://de.aliexpress.com/item/1005005799191653.html?pdp_npi=4@dis!USD!US%20$33.83!US%20$20.64!!!242.00!147.62!@2103835c17023344143906530edbf6!12000034394793821!sh01!US!0!&spm=a2g0n.store_m_home.undefined_undefined.1005005799191653&gatewayAdapt=glo2deu4itemAdapt)**:

The article provides a brief overview of Alibaba Group, which includes
platforms such as AliExpress, Alimama, Alipay, and more. The aim is to
offer diverse services including shopping, payment processing,
logistics, and technology. These services are available in various
regions across the globe.

------------------------------------------------------------------------

**[#14: Why Europe Fails to Create
Wealth](https://loeber.substack.com/p/14-why-europe-fails-to-create-wealth)**:

The European Union\'s recent passage of the AI Act has been met with
both praise and criticism. The regulations set forth in the act aim to
govern the usage of artificial intelligence across the EU, prohibiting
certain applications and providing permissible frameworks for others.
While some argue that this legislation will hinder innovation and
technological growth, proponents suggest it will create a safer
environment for users and protect against potential misuse of AI
technology. The act also applies to conventional tools like facial
recognition, indicating its broad impact on various industries. However,
critics worry about the long-term consequences this legislation may have
on Europe\'s competitiveness in global technological advancements.

------------------------------------------------------------------------

**[Herds of Mysterious 'Glacier Mice' Baffle
Scientists](https://www.atlasobscura.com/articles/herds-of-glacier-mice-baffle-scientists)**:

In 1950, Icelandic researcher Jn Eyrsson discovered strange mossy green
balls on Hrtrjkull Glacier in southeast Iceland, which he named
\"glacier mice\" or \"Jkla-ms\". Despite their cuteness and curiosity,
they are not actual mammals. These moss balls form around an irritant
like a rock or dust, making them solid mossy pillows. They can be found
in various parts of the world, but their movement remains a mystery.
Researchers have observed that they may move to shield ice from melting,
but further investigations are needed to explain this behavior better.

------------------------------------------------------------------------

**[Ego killed the empowered product
team](https://jeffgothelf.com/blog/ego-killed-the-empowered-product-team/)**:

Marty Cagan\'s article on Product teams vs Feature Teams highlights the
differences between the two models. Empowered product teams are
characterized by collaboration, problem-solving, and achieving outcomes,
while feature teams are more focused on shipping products with low
levels of collaboration and autonomy. Ego and lack of trust can prevent
an empowered product team from thriving. By measuring wins and
improvements in the process, leaders can gain trust in their product
teams and contribute to better results for both customers and
businesses.

------------------------------------------------------------------------

**[L take & W take: Was bedeutet der
Internet-Slang?](https://www.giga.de/artikel/l-take-w-take-was-bedeutet-der-internet-slang/)**:

Die Internet-Slangbegriffe \"L take\" und \"W take\" werden mittlerweile
auch im allgemeinen deutschen Sprachgebrauch verwendet. Sie stehen für
\"Verlierer Ansicht/Einstellung\" und \"Gewinner Ansicht/Einstellung\".
Die Begriffe werden meist als Zustimmung, Ablehnung oder Beschreibung
einer Aussage genutzt und können auch mit Adjektiven ausgeschmückt
werden.

------------------------------------------------------------------------

**[Automate Podcast transcripts with
OpenAI/Whisper](https://sandstorm.de/de/blog/post/automate-podcast-transcripts-with-openai-whisper.html)**:

In this article, the author describes their experience of using
OpenAI\'s Whisper for transcribing podcasts in German. They provide a
Dockerfile to install Whisper into a Docker image, detailing how to
allocate resources and execute it on an audio file. The author shares
their positive experiences with Whisper, highlighting the quality of the
generated transcripts. They encourage others to use Whisper for similar
purposes and invite feedback.

------------------------------------------------------------------------

**[Earliest Carpenters - Archaeology
Magazine](https://www.archaeology.org/issues/537-features/top10/11937-zambia-kalambo-river-earliest-woodworking)**:

A recently discovered pair of interlocking logs dating back nearly half
a million years in Zambia\'s Kalambo River indicates that the world\'s
earliest known wooden architecture existed much earlier than previously
thought. This discovery, led by University of Liverpool archaeologist
Larry Barham, challenges previous understanding of human capabilities in
the past, as it predates the appearance of modern humans by 150,000
years and was likely created by the archaic human species Homo
heidelbergensis. The structure may have been part of a walkway or
foundation for a platform built over wetlands, while also uncovering
stone axes and four wooden tools that date back between 390,000 and
324,000 years ago.

------------------------------------------------------------------------

**[How Africans Are Changing French --- One Joke, Rap and Book at a
Time](https://www.nytimes.com/2023/12/12/world/africa/africa-french-language.html)**:

Africans are significantly influencing the French language by changing
it through humor, music, and literature. With more than 60% of French
speakers now living in Africa, they are contributing to its evolution.
Words like \"zogo\" (uncool) and \"choco\" (sweet or stylish) have
emerged as a result of the blending of French, Ivorian slang, and
English. This linguistic fusion is leading to the formation of new
identities for Africans who speak French.

------------------------------------------------------------------------

**[Steve Jobs Rigged The First iPhone Demo By Faking Full Signal
Strength And Secretly Swapping Devices Because Of Fragile Prototypes And
Bug-Riddled Software --- The Engineers Were So Nervous They Got Drunk
During Presentation To Calm Their
Nerves](https://finance.yahoo.com/news/steve-jobs-rigged-first-iphone-152527272.html)**:

The first iPhone presentation in 2007 had its challenges with a fragile
prototype and bug-riddled software, but Steve Jobs managed to carry out
a flawless demo using an artfully illusory live presentation. Apple\'s
development team implemented a carefully scripted sequence of actions
called the \"golden path\" to minimize risks during the demonstration.
Jobs insisted on always displaying full signal strength on the iPhones,
despite their actual signal quality, and utilized multiple devices
backstage to manage memory constraints. Despite these hurdles, this
presentation was a success, marking an essential milestone in the
history of technology.

------------------------------------------------------------------------

**[Texas power plants have no responsibility to provide electricity in
emergencies, judges
rule](https://www.kut.org/energy-environment/2023-12-15/texas-power-plants-have-no-responsibility-to-provide-electricity-in-emergencies-judges-rule)**:

A panel of judges in Houston has decided that big power companies cannot
be held liable for failing to provide electricity during the 2021 Texas
blackout due to its deregulated energy market. The ruling protects these
companies from lawsuits filed against them after the crisis and leaves
families who lost loved ones unsure where to seek justice. During the
blackout, about 250 people died as a result of the winter storm, but
some analysts believe that count is an underestimation.

------------------------------------------------------------------------




