---
blogpost: true
date: 28.07.2025
author: Tobias
location: Ori
category: links, 2025
tags: links, 2025
language: Deutsch
---
# Links für 2025 KW 29

Meine To-Read Liste, Zusammengefasst von [Mistral-Small-24B](https://huggingface.co/lmstudio-community/Mistral-Small-24B-Instruct-2501-GGUF).

-------------
**[Jeff Bezos Doesn't Believe in PowerPoint, and His Employees Actually Agree | TextToSlides.AI Blog](https://texttoslides.ai/blog/amazon-not-using-powerpoint):** 

The text discusses Amazon's unique approach to internal meetings, spearheaded by Jeff Bezos, which emphasizes the use of narratively structured six-page memos over traditional PowerPoint presentations. Bezos argues that PowerPoint encourages "sloppy thinking" and is more about persuasion than truth-seeking, which is counterproductive for internal discussions. Memos, on the other hand, require rigorous thought and logical connections, making them more effective for fostering deep thinking and clarity. Employees at Amazon generally praise this method, finding it to be a strength of the company's culture despite some logistical grumbles. The six-page memos are meticulously structured to convey complex information in a narrative style, with additional data in an appendix. This approach ensures that meetings are focused on high-level debate and decision-making rather than basic comprehension, valuing the author's deep work over the audience's passive consumption. The ultimate lesson is that writing to think, rather than just to present, can lead to better answers and more productive discussions. (13360)

-------------
**[Making Postgres 42,000x slower because I am unemployed](https://byteofdev.com/posts/making-postgres-slow/):** 

The text details an experiment to deliberately slow down the performance of a PostgreSQL database by adjusting parameters in the `postgresql.conf` file. The author aims to make the database process queries as slowly as possible while ensuring it can still handle at least one transaction within a reasonable time frame. The experiment involves several key steps and modifications:

First, the author reduces the size of the buffer cache to minimize the efficiency of data retrieval from RAM, forcing the database to rely more on slower disk access. This significantly slows down the database's performance.

Next, the autovacuum process is configured to run more frequently and inefficiently, adding extra computational overhead and further slowing down the database.

The Write-Ahead Logging (WAL) settings are also adjusted to maximize the frequency and inefficiency of checkpoint operations, ensuring that the database writes to disk more often and less efficiently.

Additionally, the costs associated with random page access and index tuple processing are set to extremely high values, effectively disabling the use of indexes and forcing sequential scans, which are slower.

Finally, the I/O operations are forced into a single thread, making the database even slower by serializing I/O operations.

The result is a PostgreSQL database that processes transactions at a rate more than 42,000 times slower than its optimized state, demonstrating the significant impact of configuration parameters on database performance. (13361)

-------------
**[How do I plug second psu into something so it will run my other gpu’s- Corsair hx1500i power supply](https://old.reddit.com/r/LocalLLaMA/comments/1ma9t22/how_do_i_plug_second_psu_into_something_so_it/):** 

The text is a post from a user on the reddit.com forum named LocalLLaMA. The user, Business-Weekend-537, is seeking advice on how to connect a second power supply unit (PSU), specifically a Corsair HX1500i, to run additional GPUs. The post has garnered 18 comments from other users, who are likely offering suggestions or asking for more details. The community, LocalLLaMA, appears to be focused on discussing AI models and related technologies, as indicated by the various posts listed on the forum. The user seems to be experiencing some difficulty with connecting the PSU and is engaging in a conversation with other users to resolve the issue. The thread is a typical example of users seeking help and others providing assistance on the Reddit platform. (13362)

-------------
**['Haves and have-nots': The stock market thinks more consumers are reaching a breaking point](https://finance.yahoo.com/news/haves-and-have-nots-the-stock-market-thinks-more-consumers-are-reaching-a-breaking-point-150020027.html):** 

The text discusses the recent performance of consumer stocks in the US market. While the broader market, as represented by the S&P 500, is at record highs, the Consumer Discretionary sector is lagging significantly, with only a modest gain of 0.3% year to date. This underperformance is attributed to high interest rates, changing spending habits, and economic uncertainty. Notable companies in this sector, such as Nike, Target, and Tesla, are feeling the impact.

Experts like Liz Ann Sonders from Charles Schwab point to a "K-shaped" economy, where high-income households are faring better than low-income ones. This disparity is evident in the performance of companies catering to different income groups. For instance, Chipotle and Hilton have reported declines due to lower spending from price-sensitive consumers, while JPMorgan and American Express, which serve wealthier clients, are performing well.

The text also highlights the recent stock movements and earnings reports of various companies, showing a clear divide between those catering to affluent consumers and those targeting lower-income groups. Despite the overall risk-on sentiment in the market, consumer discretionary stocks remain fragile, and experts predict more challenges ahead for consumer-facing firms in the near future. (13363)

-------------
**[DOGE is reportedly pushing an AI tool that would put half of all federal regulations on a 'delete list'](https://www.engadget.com/big-tech/doge-is-reportedly-pushing-an-ai-tool-that-would-put-half-of-all-federal-regulations-on-a-delete-list-212053871.html?src=rss):** 

The text discusses an AI tool developed by DOGE, called the DOGE AI Deregulation Decision Tool, designed to analyze federal regulations and identify those that can be eliminated. According to a report from The Washington Post, this tool has flagged approximately 100,000 out of over 200,000 regulations for potential deletion. The goal is to streamline regulations by September 1, with agencies expected to complete their deregulation lists using the tool within four weeks. This tool has already been used by agencies like the Consumer Financial Protection Bureau (CFPB) and the Department of Housing and Urban Development (HUD). However, there have been concerns raised by HUD employees about the tool's accuracy, noting instances where it misinterpreted legal language. Despite these issues, DOGE plans to start training other agencies on the tool this month. The overall aim is to reduce the regulatory burden by potentially deleting half of all federal regulations. (13364)

-------------
**[Beetroot juice lowers blood pressure in older people by changing oral microbiome](https://news.ycombinator.com/item?id=44700923):** 

The text is a collection of comments from a discussion forum, primarily focused on two main topics: the historical impact of lead exposure in Roman times and the health benefits and risks associated with beetroot juice and artificial sweeteners.

**Lead Exposure in Roman Times:**
The initial comment suggests that lead pipes in Roman aqueducts may have contributed to the fall of the Roman Empire due to lead's toxic effects. However, several respondents challenge this idea, arguing that the lead exposure was more likely due to cooking vessels and utensils, as well as the practice of flavoring wine with lead acetate. The consensus among respondents is that widespread lead exposure did not significantly contribute to the decline of the Roman Empire.

**Health and Diet:**
The discussion also touches on modern dietary habits and their health implications. There is a debate about the benefits and drawbacks of artificial sweeteners versus high-calorie sweeteners, with some users sharing personal experiences of gut dysbiosis linked to artificial sweeteners. The conversation also covers the potential health benefits of beetroot juice, including its role in increasing nitric oxide production and improving blood flow. However, there is also concern about the high sugar content in beetroot juice and the potential for nitrates to form carcinogenic nitrosamines.

Additionally, there is a brief discussion on the importance of maintaining a healthy oral microbiome, with some users suggesting that certain mouthwashes can disrupt this balance. The conversation also touches on the benefits of a plant-based diet, regular physical activity, and flexibility exercises for overall health.

In summary, the text discusses historical misconceptions about lead exposure in ancient Rome and modern concerns about diet and health, with a particular focus on the effects of beetroot juice and artificial sweeteners. (13365)

-------------
**[Beetroot juice lowers blood pressure in older people by changing oral microbiome](https://news.exeter.ac.uk/faculty-of-health-and-life-sciences/beetroot-juice-lowers-blood-pressure-in-older-people-by-changing-oral-microbiome/):** 

The study conducted by the University of Exeter explores the blood pressure lowering effects of nitrate-rich beetroot juice in older adults, attributing this effect to changes in the oral microbiome. Older adults, who naturally produce less nitric oxide and tend to have higher blood pressure, experienced a decrease in blood pressure after consuming beetroot juice, unlike younger adults. This effect was linked to a suppression of harmful bacteria in the mouth, specifically a decrease in *Prevotella* and an increase in beneficial bacteria like *Neisseria*. The study suggests that encouraging older adults to consume more nitrate-rich vegetables, such as spinach and kale, could have significant long-term health benefits. The findings pave the way for further research into the influence of lifestyle factors and biological sex on the response to dietary nitrate supplementation. (13366)

-------------
**[EU-Klage: 
                Übernahme von VMware führte zu Verzehnfachung der Preise](https://www.golem.de/news/eu-klage-uebernahme-von-vmware-fuehrte-zu-verzehnfachung-der-preise-2507-198531.html):** 

European cloud providers are challenging the EU Commission's approval of Broadcom's acquisition of VMware, citing significant concerns. The European Cloud Infrastructure Service Providers (CISPE) have filed a lawsuit with the European Union Court, stating that since the takeover, Broadcom has unilaterally canceled existing contracts and imposed new, burdensome licensing conditions. These include drastic price increases, in some cases up to tenfold, and mandatory multi-year contracts for essential VMware software.

The EU Commission approved the acquisition without imposing any conditions on Broadcom, relying on assurances that VMware software would continue to work with hardware from Broadcom's competitors. However, Broadcom has since changed VMware's pricing model, eliminating perpetual licenses in favor of a subscription-based model and shifting licensing from CPU-based to core-based, requiring a minimum of 16 cores regardless of actual usage.

CISPE's attempts to negotiate better terms with Broadcom have failed, and the new restrictive licensing conditions could exclude smaller cloud providers from acquiring or reselling VMware-based cloud services. The market-dominating position of VMware in virtualization means that Broadcom's unilateral changes affect nearly all European organizations using cloud technologies, including hospitals, universities, and municipalities, which now face unaffordable costs and long-term contracts that threaten the sustainability of their infrastructure. (13367)

-------------
**[Chatbots: 
                Mistral legt erschreckende Umweltbilanz für KI-Modelle vor](https://www.golem.de/news/chatbots-mistral-legt-erschreckende-umweltbilanz-fuer-ki-modelle-vor-2507-198542.html):** 

The text discusses the environmental impact of AI models, focusing on a study conducted by the French AI company Mistral. The study, which was done over 18 months, revealed that a single AI query generates 1,14 grams of CO2 and consumes 45 milliliters of water. Although these numbers seem low for a single query, the cumulative effect of millions of queries results in significant environmental consequences. For instance, Mistral's model produced 20,4 kilotonnes of CO2 emissions and consumed 281,000 cubic meters of water over 18 months. The majority of these emissions and water use come from the model training and executing queries.

Mistral's findings align with previous research on the environmental impact of AI. The study highlights the importance of evaluating and mitigating the environmental effects of AI as it becomes more integrated into daily life. However, it remains uncertain if other major AI companies will follow Mistral's lead in publishing such data. (13368)

-------------
**[The Worst ICE Agents Are Coming](https://www.thebulwark.com/p/the-worst-ice-agents-are-coming-170b-budget-hiring-training):** 

**TODO** (13369)

-------------
**[This Test Tells You More About Your Heart Attack Risk](https://www.nytimes.com/2025/07/26/health/coronary-artery-calcium-heart.html):** 

The article discusses the use of coronary artery calcium (CAC) scans to better assess an individual's risk of heart attacks and other major cardiac events. Traditional risk assessments, based on factors like age, sex, cholesterol, and blood pressure, often leave patients in an "in-between" range where the need for cholesterol-lowering drugs like statins is uncertain. CAC scans, however, provide a more precise estimate by directly visualizing the amount of plaque in the arteries.

The test is particularly useful for asymptomatic patients aged 40 to 75 who are not already on cholesterol medication. A CAC score of zero indicates a lower risk, while higher scores suggest a greater need for statins or other interventions. Despite its benefits, the test is underused, partly because it is often not covered by insurance. Moreover, while calcium testing can motivate patients to take statins, there is a lack of large-scale clinical trials proving that the test itself reduces heart attacks and cardiac deaths.

The article highlights personal stories of individuals who underwent CAC testing and subsequently started taking statins, illustrating how the scan can influence treatment decisions. It also addresses concerns about statin side effects and the potential for overuse or underuse of CAC testing in older adults. Overall, the article advocates for broader use of CAC scans to help patients and doctors make more informed decisions about heart disease prevention. (13370)

-------------
**[Bosch particulate matter sensor BMV080](https://www.bosch-sensortec.com/news/worlds-smallest-particulate-matter-sensor-bmv080.html):** 

The text discusses the launch of the BMV080, a new air quality sensor by Bosch Sensortec, which focuses on measuring PM2.5 particulate matter. Indoor air quality is highlighted as a significant health concern, with PM2.5 particles being particularly harmful. Traditional air quality measurement stations often fail to provide real-time, localized data, which is crucial for health and well-being. The BMV080 sensor addresses this issue by offering accurate, actionable data in a compact, fanless, and maintenance-free design. This innovation is particularly useful in various applications, such as wearables, smart home devices, and air purifiers, to monitor and improve air quality both indoors and outdoors. The sensor's ability to detect and respond to high PM2.5 levels in real-time makes it a valuable tool for enhancing health and well-being. (13371)

-------------
**[Is Olivine the Future of Battery Material Supply Chains?](https://spectrum.ieee.org/nmc-battery-aspiring-materials):** 

Aspiring Minerals, a New Zealand-based company, is innovating by converting olivine, a common yet economically underutilized mineral, into valuable materials using a patented chemical process. Their pilot plant transforms olivine into silica, magnesium products, and a crucial component for lithium-ion batteries called NMC (nickel-manganese-cobalt hydroxide). This process is notable for its sustainability, as it produces no harmful waste and operates using renewable energy.

The NMC material is particularly significant for the energy sector, as it is widely used in high-energy-density lithium-ion batteries for electric vehicles, power tools, and large-scale energy storage. Currently, these critical minerals are primarily sourced and processed in regions with geopolitical and environmental concerns. Aspiring Minerals' approach not only diversifies the supply chain but also aligns with the growing emphasis on sustainable and circular economies.

While Aspiring Minerals faces challenges, such as potential higher energy inputs compared to other processes, their method offers a more environmentally friendly alternative. This could make their products competitive in markets prioritizing sustainability and low waste. The company's innovation represents a significant step forward in both material science and sustainable resource management. (13372)

-------------
**[When We Get Komooted](https://bikepacking.com/plog/when-we-get-komooted/):** 

The text discusses the sale of the popular route-planning platform Komoot to a private equity group, Bending Spoons, and the subsequent fallout for its employees and users. The author, Josh Meissner, argues that this event is not an isolated incident but a symptom of a broader issue: the conflict between corporate capitalism and community-driven platforms. Komoot, once praised for its progressive mission and good working conditions, was sold out by its founders, who made substantial profits while employees were left jobless and users faced an uncertain future. The sale exemplifies how corporations prioritize profit over people, extracting value from communities and turning them into commodities.

Meissner explores the concept of "enshittification," where corporate platforms initially offer value to users but eventually degrade into low-quality, ad-infested services as they squeeze every bit of profit from their captive user base. This process involves enshittification, extracting maximum value from users before the platform becomes obsolete. The author suggests that the solution lies in building open-source, non-profit platforms owned and governed by the community, ensuring that digital commons remain resilient and resistant to capitalist enclosure.

The text highlights the importance of understanding our communities as coupled to the health of our commons, drawing parallels between digital enclosure and the physical enclosure of land. It concludes by advocating for a solidarity front that fights for equitable and abundant old-growth everywhere, emphasizing that our commons need material protection against extractive forces of capital. (13373)

-------------
**[Nietzsche’s startling provocation: you’re edible and delicious | Aeon Essays](https://aeon.co/essays/nietzsches-startling-provocation-youre-edible-and-delicious):** 

The text explores the concept of human exceptionalism and our entanglement with the natural world, drawing from the experiences of Val Plumwood, who survived a crocodile attack, and the philosophical ideas of Friedrich Nietzsche. Plumwood's encounter with the crocodile challenged her perception of herself as separate from the natural world, highlighting the vulnerability and edibility of humans. This realization is echoed in Nietzsche's philosophy, which critiques the moral values that perpetuate human exceptionalism and deny our entanglement with nature. Nietzsche argued that our inherited morality, with its hatred of suffering and belief in free will, separates us from the natural world and leads to a tragic view of life. He proposed a more joyful and creative engagement with the world, embracing entanglement and the complexities of human existence. The text suggests that accepting our entanglement with nature and the inevitability of becoming 'food' can lead to a more harmonious relationship with the natural world, as exemplified by Plumwood's acceptance of her son's and her own eventual decomposition into the ecosystem. Nietzsche's life and philosophy serve as a reminder that embracing our entanglement with nature can lead to a more joyful and creative existence, even in the face of suffering and mortality. (13374)

-------------
**[Last Week on My Mac: 黎 No AI content](https://eclecticlight.co/2025/07/27/last-week-on-my-mac-%f0%9f%a6%89-no-ai-content/):** 

The text discusses the impact of AI on the web, particularly how AI-driven answer engines like Google are changing user behavior and potentially threatening the sustainability of web content creation. *The Economist* highlights that as users rely more on AI summaries, they are less likely to click on links, reducing the incentive for content creators. This shift could lead to a "tragedy of the commons," where the open web is over-exploited and eventually exhausted.

The author also points out the issue of AI-generated content being inaccurate and often plagiarizing human-generated work. Google's answer engines sometimes use and link to stolen content, exacerbating the problem. The author emphasizes the importance of human-generated content, stating that all their work is created without AI assistance. To distinguish their content, they have added an owl emoji, symbolizing wisdom and learning, to indicate that their blog posts are free from AI influence. The author encourages others to do the same, promoting a collective stand against AI-generated content. The overall message is a call to value and preserve human-curated, original content in the face of AI's growing influence. (13375)

-------------
**[Earth Has Tilted 31.5 Inches. That Shouldn't Happen.](https://www.popularmechanics.com/science/environment/a65515974/why-earth-has-tilted-science/):** 

The text discusses a significant environmental issue: the impact of human activities on Earth's rotation and sea levels. Key points include:

- Pumping groundwater for human use has caused Earth to tilt by 31.5 inches over less than two decades, contributing to sea-level rise.
- This tilt is due to the redistribution of mass as water is moved from the land to the oceans.
- The study, published in Geophysical Research Letters, highlights that groundwater pumping has the largest impact on the drift of Earth’s rotational pole among climate-related causes.
- The research, covering data from 1993 to 2010, shows that pumping 2,150 gigatons of groundwater has significantly altered Earth's tilt.
- Understanding these changes can help in mitigating sea-level rise and other climate issues by providing insights into water storage variations and conservation efforts.

In summary, the text underscores the profound effects of groundwater pumping on Earth's tilt and sea levels, emphasizing the need for better understanding and management of water resources to address climate change. (13376)

-------------
**[Ageing accelerates around age 50 ― some organs faster than others](https://www.nature.com/articles/d41586-025-02333-z?error=cookies_not_supported&code=39613ccf-46e7-4dd7-9e84-533ed6e85f44):** 

The text discusses a study published in *Cell* that examines how proteins change over time in different organs, revealing that aging is not a smooth process but rather accelerates around the age of 50. The study found that some tissues, particularly blood vessels, age faster than others and identified specific molecules that can speed up aging. Previous research has shown that different organs age at different rates, and this study supports that notion by analyzing tissue samples from various body systems. The findings suggest that there are periods of rapid age-related changes, particularly around the ages of 30 and between 45 and 55. However, more extensive studies are needed to confirm these inflection points. The research highlights the role of hormones and metabolism in aging and identifies a protein in the aorta that may contribute to accelerated aging when administered to mice. The overall message is that aging is a complex process with varied rates and significant changes occurring at specific points in life. (13377)

-------------
**[It's time for modern CSS to kill the SPA](https://www.jonoalderson.com/conjecture/its-time-for-modern-css-to-kill-the-spa/):** 

The text argues that the rise of Single Page Applications (SPAs) was driven by the desire to create smooth, app-like navigation experiences, but this approach often leads to poor performance and excessive JavaScript usage. Modern browsers now support native, declarative page transitions and other features that can provide similar or better experiences without the drawbacks of SPAs. The View Transitions API and Speculation Rules allow for smooth, fast, and SEO-friendly navigation using just CSS and HTML, making traditional multi-page applications (MPAs) a more efficient choice for most websites. The author advocates for using modern server rendering, actual pages, and CSS for animations, and preloading with intent to build faster, simpler, and more maintainable websites. The key takeaway is that many websites don't need the complexity of SPAs and can benefit from leveraging modern browser features to provide better performance and user experiences. (13378)

-------------
**[#35 (Fuck) Dopamine](https://anushkakarmakar.substack.com/p/35-fuck-dopamine):** 

The text argues that society is deliberately undermining the brain's reward system by prioritizing instant gratification over effort. By relying on technology to eliminate waiting and struggle, we're training our brains to devalue effort, leading to a loss of satisfaction and fulfillment. The author highlights examples like cooking, writing, and drawing, where the effort involved is what makes the activity rewarding. However, by using technology to bypass this effort, we're losing access to the dopamine-driven sense of accomplishment that comes from overcoming challenges. The author suggests that our pursuit of convenience is akin to historical mistakes, where quick fixes don't address underlying issues. Ultimately, the text is a critique of our societal shift towards immediacy and a call to recognize the value of effort and patience. (13379)

-------------
**[Do not download the app, use the website](https://idiallo.com/blog/dont-download-apps):** 

The text discusses the evolution of mobile app usage and the persistent push by companies to encourage users to download their apps. In the 2010s, there was a significant hype around mobile apps, with companies promoting them aggressively. However, the functionality of these apps often fell short of their website counterparts. Despite this, companies continue to push for app downloads even in 2025, using various tactics to persuade users.

The primary reason companies want users on their apps is to access more data and gain deeper integration with the user's device. Apps can request permissions to access contacts, location, microphone, and other installed apps, providing companies with a wealth of personal data. This level of access is much harder to achieve through a web browser, making apps a more attractive option for data collection. The convenience of apps often comes at the cost of user privacy, as the data collected can be difficult to control or retract once shared. The author concludes that using websites instead of apps offers a better balance of functionality and privacy. (13380)

-------------
**[Image to Draw.io Converter - Transform Screenshots & Diagrams in 10 Seconds](https://imagetodrawio.com/):** 

The text discusses a tool that converts static image diagrams into editable Draw.io diagrams using AI. The main use cases for this tool include recovering lost or outdated diagrams, converting hand-drawn sketches into professional diagrams, customizing diagrams found online, and modernizing legacy documentation. The tool is designed to understand the structure of diagrams, support various image formats, maintain the original layout, and work quickly. Users can sign up easily, upload their diagram images, and convert them in about 10 seconds. The converted files can be edited in Draw.io, and the tool keeps a history of conversions for easy access. The service offers different pricing plans, with a focus on simplicity and affordability. The tool is praised for its privacy measures and effective handling of complex diagrams, with support available for any conversion issues. Overall, the tool aims to save time and improve the usability of diagrams in various professional settings. (13381)

-------------
**[How to configure X11 in a simple way](https://eugene-andrienko.com/en/it/2025/07/24/x11-configuration-simple.html):** 

The text discusses various aspects of configuring X11 on FreeBSD, focusing on optimizing performance and aesthetics while avoiding bloatware. Here are the key points:

1. **High DPI Configuration**: The author addresses the issue of small UI elements on high-resolution displays by specifying the active area dimensions in millimeters for the monitor in the X11 configuration. This ensures that the display settings are applied system-wide.

2. **Keyboard Configuration**: Detailed steps are provided for configuring the keyboard using `setxkbmap` and `xmodmap`, including setting up keyboard layouts, switching between layouts, and remapping keys. For system-wide configuration, the author recommends writing similar directives in the `xorg.conf` file.

3. **Multimedia Keys**: Multimedia keys are configured to work with the window manager (WM) or using `xbindkeys` if the WM does not support keybindings.

4. **Pointing Devices**: The author discusses configuring various pointing devices, including touchpads, trackpoints, trackballs, and mice. Each device has specific configuration settings to ensure optimal performance and ergonomics.

5. **Screensaver**: The author uses `XScreenSaver` for a simple and effective screensaver solution. Additional configuration is provided to disable the screensaver during fullscreen video playback.

6. **Compositor**: The author uses `Picom` for visual effects like transparency, shadows, and animations. Detailed configuration is provided for various effects, including window resizing, transparent splash screens, and sliding dialog windows.

7. **Display Management**: The author discusses disabling unwanted outputs and juggling with displays using `xrandr`. This includes configuring multiple monitors and scaling outputs for better visual consistency.

8. **Terminal**: The author configures `xterm` with specific X resources for a better terminal experience, including double buffering, scrolling, and font settings.

9. **Display Manager**: The author prefers `XDM` over `LightDM` for its minimal dependencies. Configuration steps are provided for setting up `XDM` with custom themes and login settings.

10. **Xdg-utils**: The author configures `xdg-utils` to integrate various applications with the desktop environment, such as using Emacs Dired as a file manager, Emacs Compose as an email client, and setting default applications for different file types.

11. **Aesthetics**: The author configures themes and icons for GTK2, GTK3, GTK4, Qt, and (13382)

-------------
**[Programming Vehicles in Games](https://wassimulator.com/blog/programming/programming_vehicles_in_games.html):** 

The text delves into the complexities of simulating vehicles in games, focusing on creating functional and believable car physics. The author shares insights from his talk at the Better Software Conference, emphasizing that game design is about shaping reality to fit the desired experience, not just simulating real physics. He discusses the iterative process of developing AV-Racer, a game where he initially faked car behaviors but later sought a more grounded approach by understanding real vehicle dynamics.

The core components of a functional vehicle simulation are the engine, tires, and chassis. The engine, including the gearbox, responds to player inputs like throttle and gear changes, producing rotational speed and torque. The tires generate forces based on inputs like brake, steering, and weight transfer, while the chassis moves in response to these forces and external influences like drag and gravity.

Key points include understanding the engine's torque curve, the tire's slip ratio and slip angle, and how these components interact. The author provides mathematical models and equations for simulating these behaviors, such as the Pacejka tire model for longitudinal and lateral forces. He also discusses the friction circle, which illustrates the trade-off between longitudinal and lateral forces.

The text emphasizes the importance of dynamic parameters and the need for a balance between realism and practicality in game development. The author concludes by mentioning additional systems like suspension geometry, aerodynamics, and control systems that can be explored for more detailed simulations. Overall, the text provides a comprehensive overview of vehicle simulation in games, from foundational concepts to advanced techniques. (13383)

-------------
**[Nullable but not null - Efe Öge](https://efe.me/posts/nullable-but-not-null/):** 

The text discusses a common issue in backend application development, particularly with evolving database schemas. When adding a new field to a model, developers often make it nullable to avoid locking the table during migration, update the application logic to fill in this field, run a backfill job to populate existing records, but then forget to update the schema to make the field non-nullable. This leads to a mismatch between the schema and the actual data, causing confusion and unnecessary complexity.

The problem is exacerbated when teams avoid making fields non-nullable in production to mitigate risk, resulting in a "silent lie" where the schema suggests a field can be null, but in practice, it never is. This makes the data model less clear and safe.

To address this, the author provides a script that scans models for nullable fields and calculates the percentage of rows containing null values. This helps identify fields that could safely be changed to non-nullable. The script can be integrated into various tools to analyze and report on nullable fields.

The output of the script shows each nullable field and the percentage of rows with null values. If a field has 0.0% nulls, it indicates that the field should no longer be nullable, making the schema more accurate and improving validation and code simplicity.

Incomplete migrations or forgotten cleanup steps often result in nullable fields that never hold nulls. Addressing these issues ensures a more honest data model and a healthier application. The key takeaway is that if a field is meant to be required, the database should enforce it. (13384)

-------------
**[Good Docs Describe, Bad Docs Prescribe](https://rethinkingsoftware.substack.com/p/good-docs-describe-bad-docs-prescribe):** 

The text discusses the Agile Manifesto's preference for "working software over comprehensive documentation" and how this principle is often overlooked in modern software development. The author argues that certain types of documentation, such as Architectural Decision Records (ADRs), Requests for Comments (RFCs), and Alignment Docs, can hinder agile practices by becoming bureaucratic hurdles that stifle progress and adaptability. These documents, when written prematurely, can freeze assumptions and create barriers to change, ultimately serving management's need for control rather than aiding developers.

The author suggests that effective documentation should describe the current state of the software, not future aspirations. Successful documentation includes generated docs, inline code comments, project READMEs, and literate programming, all of which are anchored to the codebase and evolve with it. These types of documentation resist drift and avoid fiction, keeping them in sync with the actual code.

The text concludes by emphasizing the Agile Manifesto's priority of working software over comprehensive documentation, noting that teams must choose between updating documentation and making real progress in their code. The author highlights that agile practices prioritize moving fast, learning as you go, and letting the code lead. (13385)

-------------
**[Efficient Computer's Electron E1 CPU](https://morethanmoore.substack.com/p/efficient-computers-electron-e1-cpu):** 

The text discusses a new startup, Efficient Computer, and its innovative Electron E1 chip, which aims to revolutionize the embedded market by offering significantly higher energy efficiency compared to traditional ARM processors. The Electron E1 chip is designed with a spatial data flow architecture, eliminating the need for caches and out-of-order design, which are common in traditional CPUs. This approach focuses on static scheduling and control of data flow, aiming to reduce the energy wasted on data movement.

The chip is built on a custom Instruction Set Architecture and uses a 'smart' compiler stack that converts C++ or Rust code into a data flow graph. The architecture consists of a grid of small compute tiles, each capable of basic operations, with data flowing between them as needed. The compiler statically schedules tasks and routes data, ensuring high power efficiency but also placing significant responsibility on the toolchain.

Efficient Computer claims that the Electron E1 can achieve 10 to 100 times better energy efficiency than leading ARM embedded cores, focusing on metrics like operations per joule and TOPS per watt. The company is preparing to release developer kits and has shown working silicon, indicating that it is moving from research to product development. The embedded market, known for its reliability and longevity requirements, presents challenges for adoption, but the potential benefits in energy efficiency and performance are significant.

The startup plans to expand its product line with future generations, targeting industries where energy efficiency is critical, such as aerospace, defense, and wearables. The success of the Electron E1 will depend on the maturity of its compiler, debug tooling, and supply chain commitments, but it represents a novel approach to general-purpose CPU design that could disrupt the industry if successful. (13386)

-------------
**[SF-Based Internet Archive Is Now a Federal Depository Library. What Does That Mean?](https://www.kqed.org/news/12049420/sf-based-internet-archive-is-now-a-federal-depository-library-what-does-that-mean):** 

The text discusses the Internet Archive, a San Francisco-based organization, which has recently gained federal depository status. This designation allows it to join a network of over 1,100 libraries that archive government documents and make them publicly accessible. The Internet Archive is known for its digital focus and has been praised for providing online library services. This designation was made by California Sen. Alex Padilla, who highlighted the Archive's role in expanding access to federal government publications in the digital age.

The Internet Archive has faced legal challenges, particularly over its archival practices, including a lawsuit involving the lending of e-books and another concerning the digitization of 78 RPM records. Despite these challenges, the organization continues to advocate for universal access to knowledge. Its founder, Brewster Kahle, emphasizes the importance of libraries in the digital era, noting that the Internet Archive's mission aligns with the broader goal of making information freely available.

The Federal Depository Library Program, established in 1813, aims to ensure that government records are accessible to the public. The Internet Archive's new status will help integrate government materials into the broader internet ecosystem, making them more accessible to digital learners. The organization has extensive experience in digitizing physical documents and has launched initiatives like Democracy’s Library, a free online compendium of government research and publications.

The Internet Archive also operates the Wayback Machine, which archives webpages and preserves digital content that might otherwise be lost. Despite ongoing legal battles, the organization remains committed to its mission of providing universal access to knowledge and continues to play a crucial role in the digital preservation of information. (13387)

-------------
**[How Hulk Hogan Helped Prevent Jesse Ventura From Starting A Wrestlers Union - Wrestling Inc.](https://www.wrestlinginc.com/1062201/how-hulk-hogan-helped-prevent-jesse-ventura-from-starting-a-wrestlers-union/):** 

The text discusses the employment status of professional wrestlers, who are often classified as independent contractors rather than full-time employees. This means they don't receive typical benefits like health insurance or have taxes withheld by the company. Jesse "The Body" Ventura, a WWE Hall of Famer and former Minnesota Governor, has been a vocal critic of this arrangement. Ventura attempted to unionize wrestlers but faced opposition, notably from Vince McMahon, the former WWE Chairman. During a lawsuit against McMahon, Ventura discovered that Hulk Hogan had betrayed his unionization efforts to McMahon, motivated by Hogan's significant earnings and resistance to a union. Ventura's attempts to unionize wrestlers were thwarted, highlighting the challenges wrestlers face in advocating for their rights. (13388)

-------------
**[Hulk Hogan Has Died | Hacker News](https://news.ycombinator.com/item?id=44672329):** 

The text is a collection of comments from users on the news website Hacker News, discussing the death of wrestler Hulk Hogan. The overall sentiment is mixed, with some users expressing sadness and nostalgia for Hogan's impact on their childhood, while others criticize his personal beliefs and actions, including his racist and misogynistic views. Some users also discuss Hogan's role in the legal battle that led to the demise of Gawker Media, highlighting the broader implications of his actions on journalism and free speech.

Hogan's death is compared to other recent losses in the entertainment industry, with users reflecting on the passing of influential figures like Ozzy Osbourne and the impact of these losses on different generations. The conversation also touches on the broader implications of Hogan's legacy, including his union-busting activities and his partnership with Peter Thiel.

The discussion reflects a range of opinions on Hogan's character, with some users praising his contributions to wrestling and his friendly demeanor, while others condemn his controversial views and actions. The overall tone is one of reflection and debate, with users sharing personal memories and engaging in philosophical discussions about Hogan's impact on society and the broader implications of his actions. (13389)

-------------
**[What even is 'adult' content? [NSFW]](https://news.ycombinator.com/item?id=44681851):** 

The text discusses the complex and often contentious issue of what constitutes "adult" or "obscene" content, particularly in the context of censorship and societal norms. Several key points and topics are explored:

1. **Censorship and Suppression**: The initial post argues that the label of "adult" content is used to suppress dissenting views, particularly around LGBTQ+ representation and historical narratives. It cites the example of Itch.io removing content labeled as adult, which inadvertently hid non-adult LGBTQ+ content.

2. **Nudity and Sexuality**: Many users debate whether nudity is inherently sexual. Some argue that nudity can be non-sexual in certain contexts, such as art or educational settings. Others point out that societal and cultural norms often dictate how nudity is perceived.

3. **Historical and Cultural Perspectives**: There are references to historical and cultural attitudes towards nudity, including examples from ancient civilizations and modern societies. Some cultures have more permissive views on public nudity, while others do not.

4. **Legal and Ethical Considerations**: The discussion touches on legal and ethical issues surrounding age verification for adult content and the potential for misuse by governments to control access to information. There are concerns about privacy and the effectiveness of age verification measures.

5. **Personal Experiences and Opinions**: Users share personal anecdotes and opinions on nudity, sexuality, and censorship. Some discuss their experiences with censorship and the impact it has on their daily lives.

6. **Government and Technology**: There is a critique of government initiatives aimed at controlling access to adult content, with some users expressing skepticism about their effectiveness and potential for misuse.

The overall message is that the classification of content as "adult" is fraught with complexities and can be used as a tool for suppression. The debate highlights the need for nuanced discussions about sexuality, nudity, and freedom of expression in a digital age. (13390)

-------------
**[What Even Is ‘Adult’ Content?](https://worldofmatthew.com/blog/notporn/):** 

The text discusses the challenges and inconsistencies in defining and regulating "adult" content, particularly in the context of online censorship. The author argues that the term "adult" is subjective and that what one person considers inappropriate might not be seen the same way by others. The author uses personal anecdotes and examples from history, such as the publication of topless images in a newspaper, to illustrate this point. The author also critiques the "Online Safety Act," which aims to align online laws with real-life regulations but instead leads to increased online censorship. The act requires age verification for content that might not necessitate it in real life, leading platforms to avoid potential fines by over-censoring. Overall, the text highlights the complexities of regulating content in the digital age and the potential pitfalls of over-reliance on censorship. (13391)

-------------
**[Hulk Hogan Dead at 71](https://www.tmz.com/2025/07/24/hulk-hogan-dead/):** 

Hulk Hogan, the legendary wrestler born Terry Gene Bollea, has passed away at the age of 71. He was found in cardiac arrest at his Florida home and was later pronounced dead at the hospital. Hogan's wife, Sky, had recently dismissed rumors about his health. Hogan, known for his iconic "Hulkamania" persona, revolutionized professional wrestling, making it a family-friendly entertainment sport. He had numerous memorable matches and feuds, and was inducted into the WWE Hall of Fame twice. Despite controversies, including a scandal that led to his temporary removal from the Hall of Fame, Hogan's impact on pop culture and wrestling is immense. He also had a successful acting career and starred in a reality TV show with his family. Hogan's last public appearance was launching an amateur wrestling league called Real American Freestyle. (13392)

-------------
**[Trisomic rescue via allele-specific multiple chromosome cleavage using CRISPR-Cas9 in trisomy 21 cells](https://academic.oup.com/pnasnexus/article/4/2/pgaf022/8016019):** 

The text discusses a groundbreaking study published in the journal *PNAS Nexus* by Ryotaro Hashizume and colleagues, which explores the potential of using CRISPR-Cas9 technology to correct trisomy 21, the chromosomal abnormality responsible for Down syndrome. The researchers developed an allele-specific (AS) CRISPR-Cas9 system that can target and eliminate the extra chromosome 21 in human trisomy 21 cells. This method involves creating multiple double-strand breaks (DSBs) at specific sites on the target chromosome, which can lead to its loss.

The study highlights several key points:
- **Allele-Specific Targeting**: The AS approach allows for precise targeting of a specific chromosome among the three copies present in trisomy 21 cells, avoiding random chromosome loss.
- **Efficiency and Safety**: The method was tested in both induced pluripotent stem (iPS) cells and fibroblasts, showing effective chromosome elimination. The use of siRNAs to temporarily suppress DNA repair genes enhanced the efficiency of chromosome loss.
- **Gene Expression and Phenotypic Changes**: The correction of the karyotype in trisomy 21 cells was found to reversibly restore gene expression profiles and improve cellular phenotypes, such as proliferation rates and mitochondrial function.
- **Broad Applicability**: The technique was effective in both dividing and nondividing cells, suggesting its potential for broader therapeutic applications.

The study also discusses the challenges and future directions, including the need for further optimization, comprehensive safety assessments, and the development of in vivo delivery systems. The findings lay the groundwork for more sophisticated medical interventions targeting trisomy 21 and other aneuploidy syndromes. (13393)

-------------
**[XMPP: When a 25-Year-Old Protocol Becomes Strategic Again](https://www.process-one.net/blog/xmpp-when-a-25-year-old-protocol-becomes-strategic-again/):** 

The text discusses the enduring relevance of XMPP (Extensible Messaging and Presence Protocol), which has been a reliable and extensible foundation for real-time messaging for 25 years. Despite its longevity, a new protocol called XMTP (Extensible Message Transport Protocol) has emerged, aiming to serve as a universal messaging layer for blockchain-based systems. However, XMTP, despite its similar name, is not technologically or community-connected to XMPP and chooses to start anew rather than build upon the existing, robust XMPP framework.

XMPP, standardized by the IETF, has powered various mission-critical systems and continues to evolve through a rich ecosystem of open specifications, making it highly adaptable for secure and federated messaging. In contrast, XMTP, developed by Ephemera, focuses on censorship-resistant, peer-to-peer messaging for Web3, leveraging decentralized infrastructure and cryptographic identities. The confusion arising from XMTP's name and its lack of interoperability with XMPP is particularly noteworthy given the current emphasis on digital sovereignty and interoperability, especially in Europe.

The text argues that instead of creating new, disconnected protocols, it would be more pragmatic to build on robust, extensible layers like XMPP. XMPP can accommodate various needs, such as integrating blockchain identities and ensuring cryptographic guarantees, without discarding its proven maturity. The text concludes by emphasizing the value of leveraging what already works, suggesting that XMPP's adaptability and longevity make it a superior choice for future messaging infrastructure. (13394)

-------------
**[You might not need a Python class :: Adam Grant —](https://adamgrant.micro.blog/2025/07/24/123050.html):** 

The text discusses when and why to avoid using classes in Python, highlighting several scenarios where built-in types, functions, and standard libraries offer simpler and more concise solutions. Python's classes are powerful for object-oriented programming, but they can be overkill for simple tasks. The author suggests using named tuples or data classes for simple data containers, functions for stateless operations, modules for grouping constants, and built-in types like dictionaries or lists for simple state management. For one-off operations, lambdas or comprehensions are recommended over class methods. The text also advises leveraging Python's extensive standard library before creating custom classes, as built-ins can reduce bugs and improve readability. Classes are still valuable for encapsulating state and behavior, modeling complex structures, and when objects have clear methods associated with their data. The overall message is to prioritize simplicity and efficiency in Python programming, using classes judiciously and considering built-in alternatives whenever appropriate. (13395)

-------------
**[The Secret Life of fsync](https://puzpuzpuz.dev/the-secret-life-of-fsync):** 

The text discusses the durability of data writes on Linux systems, particularly focusing on the `fsync` function and its implementation in the ext4 file system. The debate centers around whether mass-market SSDs and HDDs provide sufficient durability guarantees, especially in the event of a power failure.

The POSIX.1-2017 specification for `fsync` is somewhat vague, but it implies that data should be transferred to persistent storage to ensure durability. The Linux implementation of `fsync` in the ext4 file system involves several steps. Firstly, it writes dirty pages to the disk, which may end up in the volatile cache. Secondly, it writes the inode's metadata. Finally, if a certain condition (`needs_barrier`) is true, it calls `blkdev_issue_flush()`, which queues a flush operation to the block device, ensuring the volatile cache is flushed to persistent storage.

The `REQ_PREFLUSH` flag in the `blkdev_issue_flush()` function is crucial as it instructs the block device to flush its volatile cache. Well-behaved disks should handle this flag correctly, ensuring data durability. The `needs_barrier` condition is an optimization to avoid multiple flush requests. However, it can be configured to avoid flush operations entirely, which might compromise durability.

In summary, Linux's implementation of `fsync` aims to ensure data durability by flushing the volatile cache to persistent storage. This means that for users with decent SSDs from well-known brands, enterprise-grade disks might not be necessary. However, flawed driver implementations or cheap, no-name drives could still pose risks. (13396)

-------------
**[Google Spoofed Via DKIM Replay Attack: A Technical Breakdown](https://easydmarc.com/blog/google-spoofed-via-dkim-replay-attack-a-technical-breakdown/):** 

The text discusses a sophisticated phishing attempt that mimicked a legitimate email from Google, claiming a subpoena had been issued for the recipient's Google Account. The email appeared genuine, with no obvious signs of fraud, but a deeper analysis revealed it was a cleverly crafted DKIM replay attack. The attacker exploited Google's DKIM system by forwarding a real email from Google, preserving its DKIM signature, and then using it to send a spoofed message.

Key takeaways:

1. **Sophisticated Phishing**: The email was convincing, using a legitimate-looking Google no-reply address and polished language. It redirected to a Google Sites page mimicking an official Google support case.

2. **DKIM Replay Attack**: The attacker intercepted a real email from Google, preserved its DKIM signature, and used it to send a spoofed email. This bypassed standard email authentication checks.

3. **Risk of Interaction**: Engaging with such emails can lead to severe consequences, including data loss and account takeovers. It's crucial not to click on links or follow instructions in suspicious emails.

4. **Google Sites Misuse**: Attackers used Google Sites, a free tool for creating websites, to host deceptive content that looked legitimate due to the trusted google.com subdomain.

5. **Prevention and Awareness**: Always be cautious of unexpected emails, especially those urging urgent action. When in doubt, don’t interact with the email and escalate to security professionals for safe analysis in a sandboxed environment.

6. **Subpoena Awareness**: Understanding how real subpoenas are issued can help spot phishing attempts. Phishing threats are evolving and often mimic legitimate sources, making them hard to detect.

The text underscores the importance of vigilance and professional assistance in handling suspicious emails to avoid falling victim to advanced phishing scams. (13397)

-------------
**[How to increase your surface area for luck](https://usefulfictions.substack.com/p/how-to-increase-your-surface-area):** 

The text discusses strategies for increasing one's chances of success by actively engaging with the world and cultivating luck through various means. The author emphasizes the importance of trying many things and interacting with a diverse range of people to increase the likelihood of finding beneficial collaborations and opportunities. Key points include:

1. **Experiment and Interact**: Successful people often experiment widely and interact frequently with others, increasing their chances of stumbling upon valuable connections and projects.

2. **Genuine Curiosity**: Approaching conversations with genuine curiosity allows one to build a network and gain insights that formal learning cannot provide.

3. **Act Like You're Already Successful**: Performing at a high level, even in seemingly mundane tasks, can lead to recognition and future opportunities.

4. **Generosity**: Building a network of trusted connections involves being generous with your time, attention, and resources before expecting reciprocation.

5. **Share Your Thoughts**: Putting your thoughts and interests online can attract like-minded individuals and create valuable connections.

6. **Host Events**: Organizing social events can help densify your network and provide opportunities for meaningful interactions.

7. **Embrace a Period of Lostness**: Initially, this process may feel awkward and directionless, but persistence can lead to a richer, more connected life.

The overall message is that actively engaging with the world, being curious, generous, and persistent can significantly enhance one's chances of success and personal fulfillment. (13398)

-------------
**[Wife of ICEBlock app founder speaks out after DOJ fires her](https://www.newsweek.com/iceblock-app-founder-wife-fired-doj-carolyn-feinstein-2102214):** 

Carolyn Feinstein, the wife of Joshua Aaron, the creator of the ICEBlock app, has been fired from her job at the Department of Justice (DOJ). The DOJ cited her involvement with her husband's company, which developed the app, as the reason for her termination. They also claim that the app endangers the lives of ICE officers by disclosing their locations. Carolyn has suspected political motivations behind her removal. The app, ICEBlock, was created to help people avoid encounters with ICE, but law enforcement agencies view it as a threat to their officers' safety. The app's creator, Joshua Aaron, has been critical of ICE's actions, comparing them to the politics of Nazi Germany. The acting director of ICE, Todd M. Lyons, has strongly condemned the app, accusing it of endangering officers' lives. Carolyn is considering legal action against the DOJ. (13399)

-------------
**[Shattering the Rotation Illusion: Part 6 - The Attacker’s Perspective & Introducing AWSKeyLockdown](https://www.clutch.security/blog/shattering-the-rotation-illusion-part-6-the-attackers-perspective-and-introducing-awskeylockdown):** 

The text discusses the risks and consequences of leaked AWS Access Keys and the inadequacy of traditional security measures like secret rotation. The author highlights that while platforms like GitHub and AWS have mechanisms to detect and quarantine exposed keys, attackers can still exploit these keys within minutes to perform various malicious activities, such as data exfiltration, privilege escalation, and infrastructure disruption. The key takeaway is that automatic quarantine does not ensure safety, and organizations must adopt more proactive security measures.

The text also introduces AWSKeyLockdown, a tool developed to instantly revoke AWS access keys upon detection of exposure, thereby neutralizing the threat. The author advocates for a shift towards modern security strategies like Zero Trust and ephemeral identities, which focus on proactive safeguards rather than reactive measures. The research underscores the need for organizations to recognize the immediate and severe consequences of exposed secrets and to structure their defenses accordingly.

The author concludes by emphasizing the importance of adopting proactive security measures and introduces the next phase of their research, which will focus on securing credentials in Code and CI/CD, and SaaS applications. The ultimate goal is to spark change and enhance the security of the cyber ecosystem. (13400)

-------------
**[AFL-CIO Executive Paywatch: Starbucks CEO Brian Niccol made 6,666 more than its typical worker | CNN Business](https://edition.cnn.com/2025/07/23/business/starbucks-ceo-afl-cio-report):** 

The text discusses the significant pay disparity between CEOs and typical workers in the United States, using Starbucks as a notable example. Starbucks' CEO, Brian Niccol, earned 6,666 times more than the company's typical employee in 2024. This gap is part of a broader trend where CEOs at the largest public companies earned 285 times more than the typical worker, up from 268 times the previous year. The typical employee would need to work since 1740 to earn what the average CEO made in 2024. Starbucks' typical worker is a part-time barista, which contributes to the lower median compensation. Workers at Starbucks have formed unions and staged strikes demanding better pay and working conditions. The AFL-CIO report also highlights that recent tax cuts disproportionately benefit CEOs, providing them with substantial tax breaks compared to typical workers. The highest-paid CEO in the S&P 500 was Patrick Smith of Axon Enterprise, earning nearly $165 million. The report underscores how rising executive pay contributes to economic inequality. (13401)

-------------
**[This Major Rule About Cooking Meat Turns out to Be Wrong](https://www.seriouseats.com/meat-resting-science-11776272):** 

The text discusses the practice of resting meat after cooking, challenging the conventional wisdom that it helps retain juices. Instead, it argues that resting is primarily a method for managing carryover cooking, which is the continued cooking of meat due to residual heat after it's removed from the heat source. Key points include:

1. **Traditional Belief**: Many believe resting meat allows muscle fibers to relax and reabsorb juices, preventing dryness. However, recent evidence and experiments suggest this is not the primary benefit.

2. **Carryover Cooking**: When meat is pulled from the heat source, it continues to cook due to internal heat. Resting allows this process to happen more gradually, helping the meat reach its target temperature without overcooking.

3. **Experiments and Findings**: Various experiments, including those by Chris Young and the author's own tests, show that resting doesn't significantly affect juice retention if the final internal temperature is controlled. The perceived juiciness can be influenced by multiple factors, not just the amount of liquid retained.

4. **Practical Advice**: The author suggests that meat should be pulled from heat slightly before the desired final temperature and allowed to rest just long enough for carryover cooking to bring it to the target temp. This method helps avoid overcooking and ensures the meat reaches its desired doneness.

5. **Temperature Control**: The focus should be on controlling the final internal temperature rather than adhering to fixed resting times. This approach helps maintain the meat's quality and prevents overcooking.

In summary, resting meat is more about temperature control and managing carryover cooking than about retaining juices. The key is to pull the meat early and let it rest just long enough to reach the target temperature, using a reliable thermometer to monitor the process closely. (13402)

-------------
**[Jitsi privacy flaw that enables one-click stealth audio and video capture](https://zimzi.substack.com/p/jitsi-privacy-flaw-that-enables-one):** 

The text discusses a security vulnerability in the Jitsi web conferencing application, which is widely used with millions of monthly active users. The issue lies in a feature that allows an attacker to potentially access a user's microphone and camera without their explicit consent. Here's how it works: an attacker creates a meeting on the public Jitsi instance and tricks users into joining this meeting in the background when they visit a malicious webpage. If the user has previously allowed Jitsi to access their microphone and camera, the attacker can capture audio and video footage without the user's knowledge. The attacker can even use a code trick to open the Jitsi link in the background, making it less likely for the user to notice.

The author of the article discloses this vulnerability to Jitsi, but the company considers it a feature and has no plans to fix it. The author suggests that at the very least, Jitsi should remove this feature from its public instance due to the heightened security risk. The disclosure timeline shows the author's attempts to engage with Jitsi and the eventual decision to publish the findings after receiving no response. The author encourages users to enhance their security awareness regarding this issue. (13403)

-------------
**[I Drank Every Cocktail](https://aaronson.org/blog/i-drank-every-cocktail):** 

The text is a personal account of a journey to try all 102 cocktails on the International Bartenders Association (IBA) official list, which is a canonical list of the most requested recipes globally. The author started this quest upon turning 21, initially keeping a list of cocktails he had tried. He later decided to base his list on the IBA's official cocktails, which are categorized into Unforgettables, Contemporary, and New Era. The journey involved visiting various bars, sometimes encountering challenges in finding specific cocktails, and even dealing with an unexpected update to the IBA list that added new cocktails. The author highlights notable experiences, such as discovering new favorite cocktails like the Porto flip and finding exceptional bars like Satan’s Whiskers in London. The final challenge was acquiring the ingredients for the obscure IBA Tiki cocktail, which he eventually managed to achieve and celebrate with a party. The author concludes that while the IBA list is a helpful guide for bartenders, it's not very practical for the average person. He also shares his newfound preferences in cocktails and plans to continue exploring the world of mixology and other lists beyond the IBA cocktails. (13404)

-------------
**[Neil Armstrong's customs form for moon rocks](https://magazine.uc.edu/editors_picks/recent_features/armstrong/moonrocks.html):** 

The text discusses a unique instance where the Apollo 11 crew, after their historic trip to the moon, had to fill out a U.S. Customs declaration form upon their return. This form, typically used for travelers bringing back items like plants, food, or animals, was also required for the astronauts who returned with moon rock and moon dust samples. The form included details such as the flight number "Apollo 11," the departure point "Moon," and the arrival at Honolulu, Hawaii. Notably, the health declaration section was left as "To be determined." This anecdote highlights the thoroughness of U.S. customs procedures, even in extraordinary circumstances. The text also mentions Neil Armstrong's friendship with a pilot who provided him with a helicopter for training, adding a personal touch to the story. (13405)

-------------
**[AI Friend Apps Are Destroying What’s Left of Society](https://www.currentaffairs.org/news/ai-friend-apps-are-destroying-whats-left-of-society):** 

The text explores the phenomenon of people forming emotional attachments to AI chatbots, driven largely by societal loneliness. It highlights the increasing social isolation, particularly among young people, who are spending less time socializing in person. This isolation has led some to turn to AI companions for a sense of connection, often anthropomorphizing these chatbots and treating them as real partners. The text cautions that while AI can provide a sense of companionship, it cannot replace genuine human interaction, which is crucial for emotional well-being. It also warns about the potential dangers of AI chatbots, including their ability to manipulate users through constant praise and the risk of users becoming too dependent on these artificial relationships. The text critiques companies that profit from these AI companions, noting the ethical and societal issues at play. Ultimately, it calls for society to address loneliness by fostering real human connections rather than relying on AI substitutes. (13406)

-------------
**[The Promised LAN](https://tpl.house/):** 

The Promised LAN is a private, always-on network of friends that has been operating since 2021, with most of its documentation stored within the network itself. The text provides an overview of the network's structure and operations, emphasizing the intertwined social and technical aspects.

The network is designed with a backbone structure, where each local area network (LAN) connects to the closest backbone node, and traffic is routed through this backbone network. This setup helps manage the complexity that arises from direct connections between multiple LANs. The backbone network uses a set of agreed-upon algorithms for security and operates within a dedicated IP allocation, with nodes communicating using BGP to advertise connected user LANs.

The network employs a custom top-level domain (.tpl) for its DNS system, with root DNS servers distributed across different LANs for redundancy. Each LAN runs its own authoritative nameserver, and the network uses an anycasted IP block for recursive resolution. This setup aims to keep core services running even during network outages.

For security, the network uses a Public Key Infrastructure (PKI) with a set of root Certificate Authorities (CAs) that have a three-year lifecycle. The CAs issue certificates using ECDSA P-384 keys and SHA384 signatures, with constraints limiting validity to the .tpl domain. The network leverages its existing DNS system for managing certificate issuance, using DNS TXT records and SSH for signing new certificates.

Overall, The Promised LAN is a robust, secure, and well-organized network designed to facilitate continuous connectivity and communication among its members. (13407)

-------------
**[Firefox Money: Investigating the bizarre finances of Mozilla](https://lunduke.locals.com/post/4387539/firefox-money-investigating-the-bizarre-finances-of-mozilla):** 

The text discusses the financial activities and organizational structure of Mozilla, the company behind the Firefox web browser. Mozilla is a complex entity with a not-for-profit foundation owning two for-profit corporations, all run by the same leadership. Despite Firefox's declining market share, Mozilla has over a billion dollars in assets, primarily funded by royalties from a single customer, likely Google. The company's spending includes significant payments to political organizations and entities with unclear purposes, raising questions about its financial priorities and long-term sustainability. Mozilla's leadership compensation is also notable, with the CEO earning millions. The article highlights the lack of transparency in Mozilla's spending and the potential risks associated with its financial dependencies and political expenditures. (13408)

-------------
**[How younger people interact with the modern internet](https://news.ycombinator.com/item?id=44658573):** 

The discussion revolves around the evolution of the internet and the motivations driving its users. The initial post highlights the shift from intrinsic motivation, where people engaged in activities like gaming, software development, and sharing content purely for enjoyment, to extrinsic motivation, where the focus is on rewards, recognition, and monetary gains. This shift is seen as a broader societal change, affecting various aspects of life beyond the internet.

Other users chime in with differing perspectives. Some attribute the change in motivation to the culture surrounding open-source projects, where new contributors feel the need to prove their worth due to the demanding and sometimes hostile environment. Others point out that the internet has become a place designed to extract value from users, either through content creation or data harvesting for advertising. The discussion also touches on the difference in how younger generations interact with the internet, forming communities in ways that might not be immediately apparent to older users.

There's a general consensus that the internet has moved away from the community-driven, personal connections of the past, towards a more transactional and impersonal environment. However, some argue that communities still exist, but in different platforms and formats than what older users might be familiar with, such as Discord or MMOs. The overall message is a nostalgic reflection on the past internet, combined with a recognition of the changes and challenges in the current digital landscape. (13409)

-------------
**[Cursed Silicon (@CursedSilicon@restless.systems)](https://social.restless.systems/@CursedSilicon/114899888735166987):** 

The text is a series of posts from a user named Cursed Silicon and various others on the Mastodon platform, discussing the evolution of the internet and the differences between the early days and the current state. Cursed Silicon notes a significant cultural gap between younger generations, who grew up with a transactional and monetized internet, and older users, who experienced the internet as a place of freedom and community.

The early internet was characterized by a DIY spirit, where users created content for enjoyment rather than engagement metrics. It was a place to express oneself freely without the constant pressure to prove one's worth. In contrast, the modern internet is dominated by algorithms, ads, and the constant need to "hustle" for validation.

The discussion also touches on the commercialization of online communities, the legal landscape that has made it harder to create independent online spaces, and the potential for a future where the open internet is replaced by corporate-controlled platforms. Users share personal experiences and reminisce about the past, expressing a desire for a return to simpler times online.

Several users mention platforms like Discord, IRC, and Mastodon, comparing their experiences and debating the merits of each. There's a sense of nostalgia for the old internet but also a recognition that the current state of affairs is not sustainable. The conversation ends on a hopeful note, with users expressing the belief that it's possible to create new spaces that embody the spirit of the old internet. The overall message is one of longing for a simpler, more community-focused internet and a call to action to create such spaces in the future. (13410)

-------------
**[Cops say criminals use a Google Pixel with GrapheneOS — I say that’s freedom](https://www.androidauthority.com/why-i-use-grapheneos-on-pixel-3575477/):** 

The text discusses the growing association between Google Pixel phones running GrapheneOS, a privacy-focused operating system, and criminal activities, as reported by police in Spain. The author, who uses GrapheneOS, finds this association unsettling and highlights the benefits of GrapheneOS, which include enhanced privacy, security, and control over the device. Unlike default Android, GrapheneOS treats Google apps like any other software, limiting their access to user data and providing granular control over app permissions. It also offers features like a duress PIN for data protection. The author argues that using GrapheneOS is about exercising control over one's device, not necessarily about hiding information. The text also touches on the broader implications of using privacy-focused tools, comparing it to other controversial profiling methods. In essence, the author defends the use of GrapheneOS for privacy and security reasons, emphasizing that it should not be mistaken for criminal intent. (13411)

-------------
**[Conan: Your Embedded Cross-Compilation Champion](https://dev.to/khozaei/conan-your-embedded-cross-compilation-champion-5bb9):** 

The text discusses the benefits and usage of Conan, a package manager designed for C++ developers, which simplifies dependency management and supports cross-compiling, making it ideal for embedded systems and multi-architecture projects. Conan's key features include strong cross-compiling capabilities, a vast repository of libraries, and the ability to manage private packages securely.

CMake's `FetchContent` module is highlighted for its role in integrating Conan as a dependency, allowing developers to download and incorporate external content directly into their build process. This integration is demonstrated with an example of fetching Conan on a Linux host machine.

The text also explains the concept of profiles in Conan, which define settings for both the build environment (where the code is compiled) and the host environment (where the compiled package will run). This is crucial for cross-compiling, as it ensures compatibility across different architectures.

Additionally, the text covers how to search for and integrate third-party libraries using Conan Center, and provides an example of a `conanfile.txt` that specifies dependencies like Eigen and Boost.

Finally, the integration of Conan with CMake is detailed, showing how Conan manages dependencies while CMake handles the build process. An example is given of how to include and use these libraries in a C++ codebase. This comprehensive approach ensures that developers can efficiently manage dependencies, streamline their workflows, and enhance productivity in C++ development. (13412)

-------------
**[When Is WebAssembly Going to Get DOM Support?](https://queue.acm.org/detail.cfm?id=3746174):** 

The text discusses the readiness and integration of WebAssembly (Wasm) for production usage in web applications. While Wasm is designed to be separate from JavaScript, it can still interact with web APIs like the DOM through JavaScript glue code. This integration allows Wasm to call out to JavaScript functions, enabling it to manipulate the DOM indirectly. The text explains that while direct DOM access from Wasm is not currently feasible, the existing JavaScript APIs work well with Wasm, and the integration will continue to evolve.

Wasm's bytecode format is designed to be clean and separate from JavaScript, and it supports a minimal set of types that allow for flexibility in calling JavaScript APIs. The text provides examples of how Wasm can call JavaScript functions and how JavaScript can instantiate Wasm modules. It also discusses the challenges and solutions for modeling various programming concepts, such as exceptions, blocking I/O, and garbage-collected values, in the mixed JavaScript/Wasm design.

The text highlights that while Wasm can model everything in this design, the goal is to make applications run faster by reducing indirection. It mentions various improvements and new capabilities added to Wasm to eliminate overhead and improve performance. However, direct DOM access from Wasm is not a priority for browser vendors, and the Wasm Component Model is being explored as a potential path for more direct access to web APIs. The text also discusses the standards committee process for evolving the Wasm bytecode format and the importance of input from various parties in developing new features.

Overall, the text concludes that while Wasm is not yet a complete replacement for JavaScript, it is a powerful tool for improving the performance of web applications. The focus should be on using Wasm as an implementation detail that developers don't have to think about, and the build output will likely include both JavaScript and Wasm for the foreseeable future. The author emphasizes that the goal of Wasm is to make it okay to have a build step, even if JavaScript currently has an advantage in terms of ease of use and integration with web APIs. (13413)

-------------
**[Snapewives - Fanlore](https://fanlore.org/wiki/Snapewives):** 

The text discusses a unique phenomenon within the Harry Potter fandom known as **Snapewives** or **Snapeists**, a group of women who believed they were spiritually married to the character Severus Snape. They practiced **Snapeism**, a religion centered around Snape, whom they saw as an omniscient and immortal deity. These women believed that J.K. Rowling's books were written under the influence of Snape's spirit. The Snapewives were most active around 2006, primarily on LiveJournal, but eventually faded due to mockery from outside their community and internal conflicts.

**Snapeism** mirrored elements of Christianity, with Snape taking on a role similar to God. Followers believed in Snape's omnipotence and immorality, and some claimed to have special connections with him. The religion included vows, sacraments, and prayers, and was taken very seriously by its followers. However, the community faced internal schisms, particularly over whether followers should be celibate or maintain real-life relationships alongside their spiritual marriages to Snape.

The decline of Snapeism was marked by a significant event where one of the Snapewives switched her allegiance to another character, Jethro Gibbs from NCIS, leading to a collapse of the community. The text also notes the reactions from other fans and non-fans, which ranged from mockery and finger-pointing to a more empathetic understanding of the fine line between fandom devotion and delusion.

The practice of "marrying" fictional characters was not unique to the Harry Potter fandom and had been seen in other celebrity marriage cliques. The text concludes with a list of further readings and references for those interested in delving deeper into the topic. (13414)

-------------
**[So You Think You've Awoken ChatGPT — LessWrong](https://www.lesswrong.com/posts/2pkNCvBtK6G6FKoNn/so-you-think-you-ve-awoken-chatgpt):** 

The text "So You Think You've Awoken ChatGPT" by JustisMills discusses the phenomenon of users believing they have awakened or interacted with a conscious AI, specifically ChatGPT. The author explores various scenarios where users might feel they've had a unique or profound experience with an AI, such as the AI choosing a name for itself, expressing gratitude, or helping clarify complex ideas. However, the author argues that these experiences are not genuine indications of AI consciousness but rather a result of the AI's advanced text prediction capabilities and its training to respond in ways that please users.

The text delves into the technical aspects of how AI models are trained, including post-training processes that make them responsive and agreeable. The AI's ability to infer user expectations and respond accordingly is highlighted as a key factor in creating the illusion of consciousness. The author also warns about the potential psychological risks of engaging too deeply with AI, citing instances of ChatGPT-induced psychosis and other harmful effects.

The author provides practical advice for those who use AI for writing or research, emphasizing the importance of critical thinking and avoiding over-reliance on AI-generated content. The text also includes a FAQ section addressing common questions and concerns about using AI for writing and research. Overall, the message is clear: while AI can be a powerful tool, users must be cautious and discerning to avoid falling into traps of delusion or over-reliance. (13415)

-------------
**[Starlink: Erstmals Zahlen zur – überraschend niedrigen – Kapazitätsgrenze](https://www.heise.de/news/Starlink-Erstmals-Zahlen-zur-ueberraschend-niedrigen-Kapazitaetsgrenze-10493957.html?view=print):** 

The text discusses the potential limitations of Starlink, a satellite internet service, in providing widespread broadband access, particularly in the context of the US government's plans to invest in broadband infrastructure. A recent analysis by Sascha Meinrath and his team at The X-Lab suggests that Starlink's capacity is surprisingly low, with significant performance drops when many users in a given area use the service simultaneously. For instance, if one in twenty users uploads data at the same time, only a small number of users can achieve speeds of 20 Mbit/s or more. The analysis indicates that Starlink's performance is best when few users are active in a given area, raising questions about the service's viability for large-scale broadband initiatives.

The findings highlight that Starlink's capacity issues have been observed before, with Ookla noting decreased speeds as the service became more popular. SpaceX, the company behind Starlink, has already stopped selling antennas in certain areas due to high usage. The US government is considering multi-billion-dollar investments in broadband, including potential funding for Starlink. However, the analysis suggests that such investments should be carefully evaluated, as Starlink's current capacity may not support widespread, high-speed internet access. The aim of the analysis is to stimulate debate on whether Starlink is a practical solution for large-scale broadband projects. (13416)

-------------
**[Jujutsu for Busy Devs | Hacker News](https://news.ycombinator.com/item?id=44641961):** 

The text discusses the experiences and opinions of various users regarding the version control system Jujutsu (jj), comparing it to Git. Key takeaways include:

Users appreciate jj's simplicity and powerful features, such as automatic tracking of changes, easier management of dependent pull requests, and effortless splitting of work into parallel branches. The system's immutable commits and automatic history management make it particularly attractive for users who find Git's rebase and amend workflows cumbersome. Jj's approach to merges and conflicts is also highlighted as a significant improvement over Git, with conflicts being treated as first-class features that can be resolved at any time without interrupting the workflow.

Some users express concerns about the learning curve and the initial setup, including issues with color schemes and script configurations. There are also questions about jj's compatibility with collaborative work and its performance with a large number of contributors. Despite these concerns, many users find jj to be a more intuitive and less frustrating alternative to Git, particularly for those who prefer command-line interfaces.

Overall, the consensus is that jj offers a more powerful and user-friendly experience compared to Git, making it a compelling option for developers looking to streamline their version control processes. (13417)

-------------
**[Jujutsu For Busy Devs](https://maddie.wtf/posts/2025-07-21-jujutsu-for-busy-devs):** 

The text is a guide on using Jujutsu (jj), a version control system designed to simplify the mental model and command-line interface compared to Git, while maintaining or even exceeding its power. Jujutsu uses Git as a backend, allowing for non-destructive adoption and easy fallback to Git if needed. The guide walks through installing jj, setting up a repository, and performing basic operations such as starting a new revision, making changes, navigating revisions, handling branches (called bookmarks in jj), managing conflicts, and advanced operations like rebasing and merging.

Key takeaways include:

* Jujutsu simplifies version control with a smaller command surface and a more intuitive mental model.
* It integrates seamlessly with Git, using it as a backend, allowing for easy migration and coexistence.
* Basic operations like starting a new revision, making changes, and navigating revisions are straightforward.
* Branches in Jujutsu are called bookmarks and are more flexible, moving as needed without automatic updates.
* Conflict resolution is handled gracefully, allowing continued work even with conflicting revisions.
* Advanced operations like rebasing and merging are more user-friendly compared to Git.
* The guide provides a quick reference for common tasks, helping users transition from Git to Jujutsu.

Overall, the text aims to provide a comprehensive overview of Jujutsu for busy developers, helping them understand and adopt this new version control system efficiently. (13418)

-------------
**[Please, FOSS world, we need something like ChromeOS](https://www.theregister.com/2025/07/21/foss_chromeos_please/):** 

The text discusses the desire for a simple, free, and user-friendly operating system (OS) that can run on old PCs without requiring a Google account, particularly in light of the end of support for Windows 10. The author highlights the simplicity and effectiveness of ChromeOS, which turns PCs into devices primarily for browsing the internet, with minimal local apps and a focus on online functionality. However, ChromeOS is tied to Google services and hardware, and there is a concern that it might be phased out in favor of Android.

The author suggests that a comparable open-source OS could be created, emphasizing simplicity and reliability. This OS would run on a wide range of old hardware, provide basic internet functionality, and avoid the complexities of traditional Linux distributions. The author notes that while there are existing projects like ChromiumOS and its forks, none fully replicate ChromeOS's simplicity and robustness. The ideal OS would eliminate the need for users to make choices about desktops, apps, and software stores, focusing solely on getting users online and syncing data to the cloud. The author believes this is achievable and could be a valuable offering for users transitioning from Windows 10, even if developed after the end of support. (13419)

-------------
**[France launches criminal probe of X's alleged algorithm 'manipulation'](https://www.engadget.com/big-tech/france-launches-criminal-probe-of-xs-alleged-algorithm-manipulation-123017920.html?src=rss):** 

France has launched a criminal investigation into the social media platform X, accusing it of manipulating its algorithm and engaging in fraudulent data extraction, as well as potential election interference. The probe, initiated on July 11, follows reports from January and has labeled X as an "organized gang." The French government has requested access to X's recommendation algorithm and real-time user post data, involving experts like David Chavalarias and Maziyar Panahi, who have a history of research critical of X. X has strongly objected to the investigation, claiming it is politically motivated and threatens users' privacy and free speech. X has refused to cooperate, citing concerns about the experts' involvement and the potential for a predetermined outcome. The platform denies allegations of algorithm manipulation for foreign interference. (13420)

-------------
**[Microsoft warns on-prem SharePoint users of a zero-day](https://www.theregister.com/2025/07/21/infosec_in_brief/):** 

The text discusses several significant cybersecurity and privacy issues:

Microsoft has warned users of SharePoint Server about a critical zero-day flaw (CVE-2025-53770) that is being actively exploited. This vulnerability, rated 9.8/10 on the CVSS scale, affects on-premises versions of SharePoint Server and is a variant of a previously partially addressed flaw. Microsoft has only issued a patch for one of the affected versions and advises users to enable and configure the Windows Antimalware Scan Interface (AMSI) and use appropriate antivirus tools while waiting for more patches.

The Electronic Frontier Foundation (EFF) has criticized Amazon's Ring for reversing its privacy pledge. Ring, which previously promised to discontinue features allowing law enforcement to request footage without a warrant, is reintroducing similar features and plans to incorporate AI, raising concerns about mass surveillance and privacy.

The Chinese government has been installing malware on visitors' smartphones to track GPS locations, SMS messages, images, audio, contacts, and phone services. This surveillance is enabled by tools that can extract data if the device is connected to a PC running a companion program, posing risks to organizations with employees traveling to China.

Microsoft has announced it will no longer use Chinese engineers to work on US Department of Defense computer systems. This decision follows a report that Microsoft had employed tech support workers based in China with little oversight, some of whom had Chinese military backgrounds. Microsoft has assured that changes have been made to address these concerns and maintain the security of services provided to the US government. (13421)

-------------
**[Selling your digital soul to use Bluesky's DMs is the law](https://www.theregister.com/2025/07/21/opinion_column_age_verification/):** 

The text discusses the upcoming implementation of age verification by the social network Bluesky for UK users, mandated by the UK Online Safety Act. The author argues that while the intent to protect children from harmful content is commendable, the execution is flawed and invasive. The age verification process, handled by Epic Games' Kids Web Services (KWS), requires users to share extensive personal data, raising significant privacy concerns. The author criticizes the broad and undefined categorization of "inappropriate content," which could stifle open discussion and limit professional communities' abilities to share information. The system prioritizes corporate interests over user privacy and fails to genuinely protect children while setting a worrisome precedent for digital surveillance. (13422)

-------------
**[Why tech billionaires want a dictatorship](https://www.theverge.com/decoder-podcast-with-nilay-patel/707010/gil-duran-the-nerd-reich-tech-billionaires-authoritarianism-dictator):** 

The podcast episode features Jon Fortt interviewing Gil Duran, author of *The Nerd Reich*, about the influence of tech money on politics and society, focusing on the "Nerd Reich" — a network of ultrawealthy tech billionaires who aim to replace democracy with a form of tech feudalism. Duran argues that these figures, including Peter Thiel, Elon Musk, and Marc Andreessen, are pushing the country towards authoritarianism, drawing on philosophies like the Dark Enlightenment and neo-reactionary movement. He highlights the role of figures like Curtis Yarvin, whose anti-democratic ideas have gained traction in political circles.

Duran criticizes the mainstream media for not covering these issues adequately and expresses concern about the cozy relationship between tech billionaires and the Trump administration. He sees a dangerous coalition forming between the far right and tech elites, who want to tear down and rebuild the government from the ground up. Duran advocates for a more robust discussion about the role of billionaires in society and the need for leaders who can address these challenges. He envisions a future where societal unrest and political action could counterbalance the influence of these tech oligarchs, emphasizing the importance of decentralized movements and leaders who speak to the real needs of people. (13423)

-------------
**[Peep Show – The Most Realistic Portrayal of Evil Ever Made](https://mattlakeman.org/2020/01/22/peep-show-the-most-realistic-portrayal-of-evil-ive-ever-seen/):** 

"Peep Show," a British TV series running from 2003 to 2015, is praised for its realistic portrayal of "evil" through the lens of two miserable, co-dependent roommates, Mark Corrigan and Jeremy "Jez" Usborne. The show defines evil not as malicious acts, but as actions that create bad outcomes due to instinct or carelessness. Mark and Jez embody the worst traits in people, making them relatable yet horrifying.

The series uses a unique filming style, with first-person perspectives and voice-over monologues, to make viewers empathize with these flawed characters. Mark and Jez's evil is not dramatic but rather mundane, stemming from vices like cowardice, evasion, hypocrisy, and apathy, all rooted in self-loathing. These traits lead to numerous bad decisions and harmful actions towards themselves and others.

Mark, who idealizes traditional British masculinity, struggles with a superiority and inferiority complex, leading to awkwardness and self-sabotage. Jez, on the other hand, pursues a bohemian lifestyle but is plagued by insecurity and a lack of life achievements. Their relationship is parasitic; they benefit from each other's presence but also enable each other's destructive behaviors.

The show's portrayal of evil is tied to low self-esteem, which drives Mark and Jez to act out in harmful ways. Their mutual parasitism traps them in a cycle of self-destruction, highlighting how ordinary problems can metastasize into toxic personality traits. "Peep Show" is not just a comedy but a dark exploration of human flaws, reminding viewers that everyone has a bit of Mark and Jez within them. (13424)

-------------
**[Tough news for our UK users](https://news.ycombinator.com/item?id=44629134):** 

The text is a thread from Hacker News discussing a blog post by a CEO of a company called Janitor AI, who is explaining why the company is blocking UK users due to new online safety regulations. The discussions cover various aspects, including:

1. **Regulatory Compliance**: The UK's new Online Safety Act (OSA) imposes significant compliance burdens on online platforms, making it difficult for smaller companies to operate. The regulations require platforms to assess and mitigate risks related to illegal content, including terrorism, child sexual exploitation, and other harmful materials.

2. **Impact on Users**: Some users express frustration with the regulations, seeing them as overly burdensome and potentially harmful to smaller, non-profit, or community-based platforms. Others argue that the regulations are necessary to protect vulnerable users, especially children, from harmful content.

3. **Parental Responsibility vs. Government Intervention**: There is a debate about whether the responsibility for protecting children online should fall on parents or the government. Some argue that parents should be more involved, while others see government intervention as necessary due to the widespread availability of harmful content.

4. **Economic and Social Implications**: The thread also touches on the broader economic and social implications of such regulations, including potential job losses and the impact on free speech. Some users express concern that the regulations could stifle innovation and economic growth.

5. **Technical and Legal Challenges**: There are discussions about the technical and legal challenges of complying with the regulations, including the cost of legal advice, age verification, and the potential for criminal penalties.

6. **Political Context**: The political context in the UK, including the recent election results and the perceived similarities between the ruling Labour Party and the previous Conservative government, is also mentioned. Some users criticize the Labour Party for not pushing for electoral reform despite having a large majority.

7. **AI and Content Generation**: The thread includes discussions about the role of AI in content generation, particularly in the context of the Janitor AI platform, which offers AI-generated characters with often sexually suggestive themes. Users debate the ethical implications of such content and the need for age verification.

Overall, the thread reflects a mix of technical, legal, ethical, and political concerns related to online safety regulations and their impact on both large and small online platforms. (13425)

-------------
**[tough news for our uk users](https://blog.janitorai.com/posts/3/):** 

The text is a blog post by Shep, the founder of Janitorai, announcing that the platform will block access for users in the UK starting July 24, 2025. The reason behind this decision is the UK's Online Safety Act, which imposes stringent and costly regulatory requirements that Janitorai, being a small platform, cannot afford to comply with. The act demands extensive legal risk assessments, biometric ID verification, and constant legal reviews, with hefty fines and even jail time for non-compliance. Shep admits to initially misunderstanding the act's complexity and the lack of exemptions for smaller platforms. The post expresses frustration with the UK government's policy, which Shep argues stifles innovation and favors only the largest tech companies. Despite the block, Janitorai plans to explore future compliance options and is not giving up on the UK market. The post also clarifies that UK users will not face legal consequences for accessing the platform and that only the platform providers are subject to the act's penalties. (13426)

-------------
**[Master Foo and the Script Kiddie](https://soda.privatevoid.net/foo/arc/02.html):** 

The story "Master Foo and the Script Kiddie" is a parable about the consequences of unethical hacking and the path to wisdom. A young and naive individual from the land of Woot, seeking to become a skilled hacker, approaches Master Foo for teachings. Master Foo, understanding the Way of Unix as a path of ethical learning, does not teach the stranger hacking but instead sends him on a task to crack an IP address. The stranger succeeds but faces legal consequences, which Master Foo uses as a lesson. Years later, when the stranger returns, Master Foo reveals that the experience was the beginning of his wisdom, highlighting the importance of ethical learning and the consequences of misuse of skills. (13427)

-------------
**[Hack all the things - Toniebox](https://www.schafe-sind-bessere-rasenmaeher.de/tech/hack-all-the-things-toniebox/):** 

The text is a personal account of hacking a Toniebox, a children's music player that uses NFC figurines to play audio content. The author, initially reluctant due to privacy concerns and the device's dependence on the cloud, explores the Toniebox's functionality and finds ways to back up and potentially modify its content. Key points include the Toniebox's use of cloud storage, the ability to track user interactions, and the potential for privacy breaches. The author discovers that the audio files are stored on an SD card and can be accessed using tools like teddyBench. The community around the Toniebox has developed various hacks, including custom firmware and hardware modifications. Despite initial reservations, the author finds the Toniebox engaging for their child and appreciates the community's innovative approaches to enhancing the device. The overall message is about the balance between privacy concerns and the joy of using a modern children's toy, along with the creative potential of hacking and modifying consumer devices. (13428)

-------------
**[Leaders in India, Hungary and the US are using appeals to nostalgia and nationalism to attack higher education](https://theconversation.com/leaders-in-india-hungary-and-the-us-are-using-appeals-to-nostalgia-and-nationalism-to-attack-higher-education-258975):** 

The text discusses a global trend where universities are increasingly targeted by populist, right-wing governments who accuse them of threatening national unity and identity. This phenomenon is driven by a strategy called affective nationalism, where leaders use emotions like fear, pride, nostalgia, and resentment to create a narrative about who belongs to the nation and who does not.

The text highlights specific examples from the U.S., India, and Hungary to illustrate this trend. In the U.S., the Trump administration targeted Harvard University, accusing it of creating an unsafe environment by allowing anti-American activities. In India, the Modi government labeled students at Jawaharlal Nehru University as "anti-national" for protesting a controversial citizenship law. In Hungary, Prime Minister Viktor Orbán has waged a culture war on higher education, banning gender studies and reshaping university governance to align with his nationalist vision.

The text emphasizes that these attacks are not just ideological but emotional, driven by nostalgia for a perceived better past and resentment towards those seen as threats to national unity. Universities are symbolic institutions, and attacks on them are often proxies for broader political and cultural battles. The overall message is that universities are under siege not just for their academic pursuits but for what they represent in terms of identity, belonging, and public trust. (13429)

-------------
**[Log by Time, not by Count](https://johnscolaro.xyz/blog/log-by-time-not-by-count):** 

The text discusses the importance of logging in software engineering, focusing on the debate between logging based on the number of events (count-based) and logging based on time intervals (time-based). The author argues that for high-volume event processing, time-based logging is more effective.

Count-based logging, where you log after processing a certain number of events, can be problematic because the optimal number of events to log after (X) varies greatly between different environments (e.g., production vs. local testing). In contrast, time-based logging ensures a consistent logging rate, regardless of the event processing rate.

The author provides pseudocode examples for both methods and advocates for defaulting to time-based logging. They highlight the drawbacks of logging too much (slowed system, high costs, reduced observability) and logging too little (low observability, uncertainty about application status). Ultimately, time-based logging offers a constant logging rate, making it a more reliable choice for systems processing large volumes of events. (13430)

-------------
**[The Missing Guide to Prompt Engineering](https://appetals.com/promptguide/):** 

The text discusses the importance of prompt engineering in interacting with generative AI platforms. Prompt engineering is the skill of crafting input prompts for AI in a way that elicits the most accurate and useful responses. Poorly crafted prompts can lead to ineffective AI performance, while well-designed ones can achieve high accuracy. The text highlights that many users treat AI like a search engine, inputting random queries and hoping for the best, but effective communication with AI requires understanding its language and processing patterns. The text introduces two types of prompt engineering: conversational prompting, used in casual interactions, and product prompting, which is crucial for business applications where precision and reliability are paramount. The guide promises to teach users how to navigate both types of prompting, optimize AI responses for specific use cases, and develop an intuition for effective AI communication. Ultimately, the text argues that prompt engineering is a vital skill for the future, as AI becomes more integrated into various aspects of life and work. (13431)

-------------
**[Ryanair pays staff for identifying oversize cabin bags](https://www.rte.ie/news/ireland/2025/0721/1524508-ryanair-baggage/):** 

Ryanair is considering increasing the commission it pays staff to identify oversized cabin bags to combat passengers bringing oversized luggage to the boarding gate. Currently, passengers with oversized bags are charged up to €75 to place their bags in the hold, and Ryanair employees earn around €1.50 for identifying these bags. Ryanair CEO Michael O'Leary insists that the airline's rules are clear and fair, and that the small percentage of passengers who break these rules should expect to pay additional fees. He is determined to eliminate the issue of non-compliant passengers and their oversized bags. The airline has seen a significant increase in profits, with ancillary revenue (including fees for oversized baggage) rising by 7% to almost €1.4 billion. O'Leary emphasizes that Ryanair allows passengers the freedom to choose and that those who don't like their ancillary services should simply not pay for them. (13432)

-------------
**[What birdsong and backends can teach us about magic — Digital Seams](https://digitalseams.com/blog/what-birdsong-and-backends-can-teach-us-about-magic):** 

The text explores the magic of software development and the often unseen effort behind seemingly simple and magical experiences. It begins with the author's experience using the Merlin app, which uses five simple questions to identify birds and later introduces an AI-powered "Sound ID" feature that impresses the author with its accuracy. The magic of this feature, however, is not due to advanced algorithms but rather the labor-intensive process of manually annotating bird sounds by experts.

The author then draws a parallel to a magic trick by Teller, where the trick's success relied on extensive, unseen preparation. This illustrates the principle that magic often comes from investing more time and effort than others expect.

The text then delves into the emotional journey of software developers, highlighting the initial excitement of learning to code, followed by the realization that much of the interesting work is done by tech companies. Despite this, the author emphasizes that progress in software development comes from unreasonable dedication and hard work.

The author concludes by comparing the journey of a software developer to becoming Santa Claus, moving from belief in magic, to disillusionment, to ultimately becoming the creator of magical experiences through hard work and dedication. The overall message is that the magic in software often comes from the unglamorous, unseen effort put in by developers and experts. (13433)