Front-page articles summarized hourly.
Untended Fire argues Scouting's crisis is decades of neglect, not marketing. BSA now holds ~1.25% of youth and has shown no multi-year recovery in 25 years. A culture of administration over leadership, misaligned age-design, and a bureaucratic patrol method erode development. Eagle and leadership are reduced to velocity or titles, not real influence. After rebranding to Scouting America, debt and policy shifts reveal governance issues. The piece calls for candor at Dallas: restore the patrol method, train real leadership, create age-appropriate programs, and abandon unsound practices for bold reform.
Mid-cycle update: Reproducibility is now enforced—migration blocks new or testing packages that aren’t reproducible. BinNMUs are being tested with autopkgtests, as with source uploads. loong64 has been added as a new architecture, requiring many rebuilds across arches and swelling the CI queue—patience requested. Post-upload follow-up: the source uploader must ensure migration; if blocked by autopkgtest regressions in reverse test-dependencies, file appropriate RC bugs.
Labbé & Selinger present a Markov-partition construction of the Hat tilings, the aperiodic monotile discovered by Smith, Myers, Kaplan and Goodman-Strauss. The work provides a dynamical-systems framework for generating Hat tilings from local matching rules, clarifying the structure behind the non-periodic tiling.
A 403 Forbidden error means access to the page is blocked.
Emerich Juettner, an impoverished New York immigrant, secretly printed crude counterfeit one-dollar bills from 1938 for about a decade, exploiting that people seldom scrutinize small denominations. He operated solo, releasing only a few notes at a time. The Secret Service’s case 880 became the longest, costliest counterfeiting chase in U.S. history until a 1948 tip led to his arrest after engraving plates were found. He admitted making notes for 9–10 years, receiving a light sentence of one year and a day (paroled after 4 months) and a $1 fine. Hollywood later made Mister 880; he died in 1955.
Gemini API File Search is now multimodal, adding image support, custom metadata tagging, and page-level citations to ground results. It enables retrieval-augmented generation over text and images via the Gemini Embedding 2 model. Custom metadata lets you filter data (e.g., department: Legal), while page citations show exact source pages for verification. Aimed at prototyping to large-scale apps, it helps organize unstructured data and provide a verifiable source trail. Developers can upload files and consult the Gemini API docs to build with File Search.
ymawky is a MacOS web server written in ARM64 assembly with a fork-per-connection model. For Apple Silicon, built with Xcode CLT; run as ./ymawky [port]. It serves static files from www/ and uses err/ for custom error pages; default file is index.html for GET /. PUT supports uploads up to 1 GiB; supports GET/PUT/DELETE/OPTIONS/HEAD and range requests; MIME types auto-detected; directory listing enabled. Security: path normalization, confinement to www/, no symlinks, PUT to temp for atomic writes, and timeouts to mitigate slowloris. Config in config.S; default docroot www/ and index.html. MacOS syscalls; not Linux portable without adaptation; vulnerabilities noted.
Derives the elimination tree for the right-looking sparse Cholesky algorithm A=LL^T, showing it encodes where fill-in occurs and the task dependency graph. From the dense algorithm, sparsity yields a pruned DAG, whose compressed form is the column elimination tree. The parent array represents dependencies; a linear-time procedure computes the tree from the starting nonzeros A_row. With this tree, symbolic factorization uses L_col to specify nonzero positions, and numeric factorization then follows, exploiting the precomputed pattern. The approach grounds sparse factorization even when symmetry/definiteness may not hold.
ymawky is a macOS-only static HTTP server written in aarch64 assembly, using raw Darwin syscalls with no libc wrappers. It serves static files over GET, HEAD, PUT, OPTIONS, DELETE and supports byte ranges, directory listings, and custom error pages. It abandons abstractions, parsing HTTP by hand, decoding paths, preventing traversal, and using NOFOLLOW for symlinks; uploads write to temp files and are renamed on success. It forks on each request, weighing memory and concurrency. It guards against slowloris with header and body timeouts and content-length based limits, protecting the docroot. The goal is to reveal low-level web-server behavior.
EvilGeniusLabs.ca launches Chapter 1 of a long-form Visual Basic history: Origins (1964–1992). Six articles trace the BASIC lineage from Dartmouth through the Microsoft BASIC dynasty to Visual Basic 1.0 (MS-DOS), with the May 1991 VB/Windows launch in the middle. It covers Alan Cooper and Tripod, Project Thunder, and the 1989–1991 marketing, plus the dual VB/Windows and VB/DOS paths. The author aims to focus on the people behind VB, not just executives, and frames the Book as canonical with blog companions. Chapter 2 will cover version-by-version detail; later chapters cover Notable Characters.
Jure Triglav explores real-time surfel-based global illumination in the browser using WebGPU. The pipeline converts geometry into surfels (surfelization), builds a grid-based accelerator for surfels, uses a BVH-based ray-intersection for surfels, and a ray-traced integration to accumulate indirect lighting. A guiding system biases sampling toward bright directions, with temporal stability via MSME. A radial depth atlas helps prevent light leaks, and a resolve pass transfers surfel irradiance to pixels. The setup involves 13+ compute passes and demonstrates real-time performance on web, but faces Chrome storage-buffer limits, no hardware ray tracing, and limitations to static diffuse scenes.
Ken Shirriff reviews the Arma Micro Computer (1962), a 20-pound transistorized, 22-bit serial computer built for spacecraft navigation. Not a true microcomputer by modern standards, it used unusual components (transfluxors) and non-destructive readout ferrite-core memory, storing up to 7,808 program words and 256 data words. It ran at 1 MHz but delivered ~36,000 operations/sec due to serial design, with 120 I/O lines. Built from waferized discrete components for rugged space use, it influenced later Arma machines (Micro C/D) and inertial navigation systems (LTN-51) before Arma's 1982 closure. The term 'microcomputer' is historically fluid.
France’s parliamentary intelligence delegation endorsed weakening end-to-end encryption to enable targeted access to messages on WhatsApp, Signal, and Telegram, arguing it would aid justice and security. They acknowledge limited existing tools (RDI) but deem them inadequate and floated ideas like a “ghost participant” to secretly add a state recipient. Critics warn backdoors are unsafe and keys reside on user devices. While some lawmakers seek to protect encryption, others push for legal changes granting broader investigative access, raising concerns about scope creep and civil liberties.
The piece argues that bare USB‑TTL serial pins are dangerous and unreliable for hobbyists, due to loose Dupont wires and back‑feeding. It proposes replacing them with Julet (M6/M8) connectors, commonly used in e‑bikes, as a robust, ready‑made TTL interface. The author describes 20 cm Julet pigtails, color‑coded RX/TX/GND, cross‑wired RX/TX with ground on a separate Dupont, and optional 5/6‑pin variants for expansion. He notes 3.3V logic (with 5V off‑shoots) and mentions Micro Q for lower voltages. A cleaner standard, he argues.
rlisp is a transparent s-expression frontend that compiles to Rust with no runtime or GC. It expresses Rust semantics—ownership, borrowing, lifetimes, generics, traits, pattern matching—in Lisp syntax. A Lisp macro system and s-expr mapping translate to Rust constructs (functions, structs, enums, impls, modules, imports). It transpiles Lisp to Rust (.rs) and then to a binary, via commands to compile/build/run. The README provides Lisp-to-Rust examples, explains macros and code generation, and notes MIT license.
403 Forbidden error; access denied. Timestamp: Sat, 09 May 2026 23:16:39 UTC.
The piece argues the 90-day disclosure window is dead in an AI-enhanced world. AI-enabled researchers and promptable LLMs let multiple reporters uncover bugs fast, and patches can become exploits within minutes. Examples include Copy Fail (CVE-2026-31431) and Dirty Frag (CVE-2026-43284/43500)—exploited before patches, leaving Linux distros unpatched. Monthly patch cycles can’t keep up. The author urges treating every critical issue as P0 and patching instantly, with defenders using AI in CI/CD: real-time vulnerability management, patch analysis, and dependency scanning.
let-go is Almost Clojure written in Go: a Clojure-like language and VM that compiles to bytecode or WASM and can run as a standalone binary or embedded in Go. It ships ~10MB with ~7ms cold start, offers Go interop, core.async-like channels, HTTP/JSON/Transit, an nREPL, and Babashka pod support. It aims for broad Clojure compatibility (macros, destructuring, transducers, persistent data), but has gaps: refs/STM, some specs, partial BigInt/BigDecimal, and certain range queries. Benchmarks show small footprint and fast startup. Install via Homebrew, prebuilt binaries, or from source; includes examples and a browser REPL.
Made by Johno Whitaker using FastHTML