hngrok
Top Archive
Login
  1. Beginning January 2026, all ACM publications will be made open access from dl.acm.org
    339 by Kerrick 1h ago | | |

    Article:

    The Association for Computing Machinery (ACM) will transition to open access publishing on January 1, 2026, offering two editions of the Digital Library: Basic and Premium.

    Enhanced accessibility to academic research, promoting collaboration and innovation within the scientific community.

    Discussion (29): 4 min

    The comment thread discusses the ACM's open access initiative, with opinions on its necessity and financial implications. There is a debate about incentives in publishing and concerns over Brazil's exclusion from APC waivers. The conversation also touches on AI-generated papers and their impact on academic publishing.

    • ACM's open access initiative is long overdue and necessary
    • Financials of open access are interesting, with APC charges for authors
    Counterarguments:
    • Old publications will not become open access, only new ones
    • Brazil is off the 'List of Countries Qualifying for APC Waivers'
    Academic Publishing
  2. Classical statues were not painted horribly from worksinprogress.co
    289 by bensouthwood 4h ago | | |

    Article: 24 min

    The article discusses the discrepancy between modern reconstructions of ancient Greek and Roman sculptures with original colors and how these reconstructions often appear ugly or garish compared to their depictions in ancient artworks.

    • Ancient Greek and Roman art tends to look good today.
    • Reconstructions by Vinzenz Brinkmann are widely known but appear awful to modern viewers.
    • The article questions the explanation that modern taste differs from ancient tastes in color appreciation.
    Quality:
    The article presents a well-researched argument with balanced viewpoints and avoids sensationalism.

    Discussion (157): 47 min

    This comment thread discusses the limitations and potential biases in archaeological reconstructions of ancient statues, particularly regarding their coloration. The main argument is that these reconstructions may not accurately represent how the statues originally looked due to a lack of evidence supporting a full range of colors and potential for bias in their presentation.

    Counterarguments:
    • Reconstructions are based on the best available evidence and aim to provide insight into ancient practices, not necessarily an exact replica.
    Art Ancient Art, Classical Art, Sculpture Restoration
  3. Your job is to deliver code you have proven to work from simonwillison.net
    199 by simonw 2h ago | | |

    Article: 8 min

    The article emphasizes the importance of delivering tested and proven code in software development, particularly in the context of AI-assisted tools like LLMs. It advocates for manual testing, automated testing, and using coding agents to ensure code quality.

    Encourages accountability and quality assurance in software development, potentially reducing the burden on code reviewers.
    • The responsibility of software developers to deliver code that has been proven to work.
    • The two-step process for proving a piece of code works: manual testing and automated testing.
    • The use of coding agents like Claude Code or Codex CLI to execute code and check its functionality.

    Discussion (167): 45 min

    The comment thread discusses the importance of manual testing and human oversight in software development, particularly in relation to AI-generated code. There is a consensus on the necessity of tests for verifying code quality, but opinions differ on the sufficiency of automated testing alone. The conversation also touches on the role of developers in ensuring code meets business requirements and the ethical implications of relying on AI tools.

    • Manual testing is essential for verifying the correctness of code in real-world scenarios.
    • Automated tests may not cover all edge cases or ensure alignment with business needs.
    • AI-generated code requires thorough review to ensure quality and adherence to best practices.
    Counterarguments:
    • Some argue that manual testing is time-consuming and can be replaced by more efficient methods, such as automated outside-in testing.
    • Others suggest that the focus should be on learning how to write great tests rather than manually testing code.
    • There are differing opinions on the role of AI in software development, with some seeing it as a tool for efficiency and others as a potential source of quality issues.
    Software Development Programming/Code Quality
  4. Virtualizing Nvidia HGX B200 GPUs with Open Source from ubicloud.com
    59 by ben_s 2h ago | | |

    Article: 31 min

    This article discusses the process of enabling GPU VMs on NVIDIA's B200 HGX machines, focusing on overcoming challenges and documenting findings for virtualization. It covers hardware overview, three virtualization models, preparing the host for passthrough, switching drivers, permanently binding GPUs to vfio-pci, matching versions between host and VM, host configuration, boot image requirements, PCI topology issues, large-BAR stall problem solutions, fabric manager and partition management, and provisioning flow.

    Open-source implementation of GPU virtualization on the B200 platform could lead to more accessible high-performance computing resources and foster innovation in cloud platforms, AI research, and education.
    • NVIDIA B200 HGX hardware architecture
    • Three virtualization models (Full Passthrough, Shared NVSwitch Multitenancy, vGPU-based Multitenancy)
    • Preparing the host for GPU passthrough using vfio-pci driver
    • Solving PCI topology issues with QEMU
    • Addressing large-BAR stall problem in QEMU versions
    • Using Fabric Manager to manage partitions and isolate VMs
    Quality:
    The article provides detailed technical information and is well-researched, making it a reliable resource for professionals.

    Discussion (15): 4 min

    The comment thread discusses various aspects of GPU virtualization, focusing on NVLink and MIG technologies. Participants inquire about compatibility with different virtualization platforms, security concerns, and the applicability of the discussed concepts in general GPU virtualization scenarios under Linux.

    • MIG provides better isolation than vGPU
    Advanced Materials Computer Science, Hardware
  5. Valve Is Running Apple's Playbook in Reverse from garbagecollected.dev
    37 by ee64a4a 1h ago | | |

    Article: 50 min

    The article discusses Valve's strategy in gaming, comparing it to Apple's approach. It highlights how Valve has learned from its previous failure with the Steam Machine (Steam Machine 1.0) by improving their software ecosystem, targeting a clear consumer base, and focusing on making everything 'just work'. The text also delves into the parallels between Valve and Apple in terms of philosophy towards piracy, creating cult-like fanbases, and maintaining competitive advantages through unique company cultures.

    Quality:
    The article provides a detailed analysis of Valve's strategy and its comparison with Apple, supported by relevant data and quotes from industry experts.

    Discussion (29):

    The comment discusses Valve's strategic positioning against major tech companies, specifically Google, Microsoft, and Apple, suggesting that these firms might need to adjust their strategies or margins to avoid potential consequences.

    • Valve is strategically positioned against major tech companies.
    Gaming Console Gaming, PC Gaming, Hardware
  6. Using TypeScript to Obtain One of the Rarest License Plates from jack.bio
    79 by lafond 1h ago | | |

    Article: 15 min

    The article discusses the author's journey in obtaining a rare license plate using TypeScript to automate the process of checking availability through Florida's vanity plate checker website.

    The article highlights the ease of automation and the potential for individuals to acquire rare items, which could lead to increased competition in obtaining such items.
    • The rarity of license plates and the difficulty in obtaining them
    • Using PlateRadar to find mass information on license plate availability
    • Automating the process using Burp Suite and a script for scraping data from Florida's vanity plate checker website

    Discussion (58): 15 min

    The comment thread discusses the ethics of using prisoner labor in the production of vanity license plates, with opinions divided on whether it constitutes slave labor and how prisoners should be compensated. There is also a focus on alternative methods for obtaining vanity plates, such as exploiting public APIs or government data leaks. The conversation touches on legal interpretations, privacy concerns, and the challenges posed by special characters in license plates.

    • The use of prisoner labor for license plates is morally questionable
    • Vanity plates can be obtained through various methods
    Counterarguments:
    • Some states allow prisoners to opt-in for work voluntarily
    • The system is legal under current laws
    Automotive License Plates
  7. Are Apple gift cards safe to redeem? from daringfireball.net
    215 by tosh 2h ago | | |

    Article: 7 min

    The article discusses concerns over the safety of redeeming tampered Apple Gift Cards after an incident involving Paris Buttfield-Addison's lost iCloud account and library of iTunes and App Store media purchases. It suggests avoiding purchasing or giving Apple Gift Cards due to potential risks.

    • Tampering with a $500 gift card led to account loss
    • Potential risks associated with gift card purchases
    Quality:
    The article presents factual information and opinions without sensationalism.

    Discussion (166): 44 min

    The comment thread discusses various issues related to tech companies, particularly Apple and Google, including account closures, customer support, gift card fraud, and the control of essential utilities by large corporations. There is a consensus on the need for regulation and improvements in customer service, but opinions vary on how much fraud tech companies should be allowed to handle.

    • Tech companies should be required to accept some level of fraud
    Counterarguments:
    • Fraud is a cost of doing business for tech companies
    • Regulation could limit the usability and convenience of online services
    Technology Security, Consumer Electronics
  8. Jonathan Blow has spent the past decade designing 1,400 puzzles for you from arstechnica.com
    201 by furcyd 6d ago | | |

    Article: 12 min

    Jonathan Blow, the creator of The Witness, is nearing completion on his next game, Order of the Sinking Star, which features over 1,400 puzzles. After six-and-a-half years working on The Witness and a nine-year development cycle for this new project, Blow has created an expansive puzzle-adventure game with four distinct puzzle worlds that intersect later in the story.

    The extended development cycle and high puzzle count may inspire other developers to push the boundaries of complexity in their games, potentially leading to more engaging and challenging experiences for players.
    • 9-year development cycle
    • 1,400 puzzles

    Discussion (257): 1 hr 2 min

    The discussion revolves around Jonathan Blow and his new puzzle game, focusing on its potential complexity, the quality of its trailer, and controversies surrounding Blow's political views. Opinions are mixed, with some praising his innovative approach to game design while others criticize his controversial statements.

    • Blow's games are innovative and technically impressive
    • The Witness is considered one of the best puzzle games ever made, but it can be monotonous for some players
    • Blow's political views are controversial and may turn off potential fans
    • The trailer for the new game does not accurately represent the quality of the game itself
    Counterarguments:
    • Arguments defending Blow, highlighting his contributions to puzzle design and software development.
    • Support for the idea that simplicity is overvalued and complexity can lead to better solutions in certain contexts.
    • Defenses of the new game's potential quality based on Jonathan Blow and Casey Muratori's past work.
    Games Video Games, Game Development
  9. Please Just Try Htmx from pleasejusttryhtmx.com
    159 by iNic 2h ago | | |

    Article: 12 min

    The article is an opinionated plea for developers to try HTMX, a library that allows any HTML element to make HTTP requests without needing JavaScript or complex frameworks like React. It highlights the benefits of using HTMX over raw HTML and JavaScript frameworks, such as simplicity, speed, and reduced codebase.

    HTMX could lead to more efficient web development practices, potentially reducing the complexity of projects and improving developer productivity.
    • It offers a middle path between raw HTML and complex frameworks like React.
    • HTMX reduces codebase, dependency load, build times, and bundle size.
    Quality:
    The article presents a strong opinion but provides clear examples and data to support its claims.

    Discussion (153): 50 min

    The comment thread discusses the use and limitations of HTMX in web development. Opinions vary on its suitability for different scenarios, with some praising its simplicity and others noting its limitations in complex applications. The conversation also touches on comparisons with other frameworks like React and Vue, as well as emerging trends such as AI-generated content.

    • HTMX is suitable for simple interactivity
    • Frameworks like React are preferred due to maturity and ecosystem
    Counterarguments:
    • Complex interfaces and dynamic scenarios may require more robust solutions like React or Vue
    • HTMX introduces implicit coupling between frontend and backend
    • Lack of ecosystem support can be a drawback compared to larger frameworks
    Web Development Frontend Libraries
  10. Creating apps like Signal could be 'hostile activity' claims UK watchdog from techradar.com
    284 by donohoe 5h ago | | |

    Article: 8 min

    UK watchdog warns that developers of encrypted messaging apps like Signal and WhatsApp could be considered 'hostile actors' under national security laws due to their ability to make it more difficult for authorities to monitor communications.

    • The Counter-Terrorism and Border Security Act and National Security Act have incredibly broad powers
    • Journalists carrying confidential information or embarrassing material to the Prime Minister may face similar scrutiny
    Quality:
    The article presents factual information without a clear bias, though it leans towards the perspective of digital rights experts.

    Discussion (196): 52 min

    The comment thread discusses concerns about the UK's surveillance state, focusing on government policies that infringe upon privacy rights and freedom of speech. Participants argue for encryption tools as a means to protect personal communications from potential abuse by intelligence agencies. The discussion also touches on comparisons with other countries' declines in democracy and the role of technology companies in facilitating or resisting government policies.

    • The UK is becoming an oversurveilled state with policies that infringe on privacy and freedom of speech.
    • Encryption tools are necessary for protecting personal communications from government surveillance.
    Counterarguments:
    • Some argue that encryption tools can be used by criminals, thus justifying government actions against developers.
    • There is concern about the potential for abuse of power and lack of transparency in government surveillance practices.
    Legal Regulations, Cybersecurity
More

In the past 13d 23h 54m, we processed 2391 new articles and 103723 comments with an estimated reading time savings of 48d 20h 36m

About | FAQ | Privacy Policy | Feature Requests | Contact