Front-page articles summarized hourly.
Cooking the Hashish Cookbook, by Panama Rose (Rosalind Schwartz), was first published in 1966 by Ira Cohen. A countercultural collection of international recipes and illustrations designed by Rose; Cohen released the first edition in Morocco, with Gnaoua Press in the USA a year later, turning it into an underground bestseller. It features Tangier’s Majoon and White Cooky, Indian ghee and bhang, Andalusian candy, and Brion Gysin’s hash fudge. Note: 'Cut into tiny squares. Nibble with caution.'
Gen Z’s view of AI is growing wary as adoption stalls. A Gallup survey for the Walton Family Foundation and GSV Ventures finds 51% of Gen Z use AI weekly, but growth is flat (+4), while excitement and hope drop and anger rises to 31% (from 22%). In the workplace, 48% say AI’s risks outweigh benefits, though 56% say AI speeds work; 80% fear faster AI use will hurt learning long-term. In schools, AI policies rose to 74%, yet 41% doubt peers’ integrity. Fewer than 20% want AI for human services; humans preferred.
The author suspects ADHD-like traits and describes task paralysis—hesitation to start despite a plan—and contrasts it with transient analysis paralysis. They crave novelty, switch roles every 2–3 years, lack deep expertise, and struggle with execution. AI is a double-edged tool: it helps overcome task paralysis by implementing ideas quickly, but risks addiction and concerns about job loss and art piracy. They’ve spent on Claude Pro for coding projects, hit token limits, and use tricks to conserve credits, aiming to use AI mainly to get started rather than replace effort.
Idempotency is about effect, not just replaying requests. A durable idempotency record must answer: who owns the key, what the first command meant, and what outcome can be replayed. Hash the validated command (not raw bytes) and scope the key to the caller/operation. Same key with a different canonical command should be a hard error, not silently reinterpreted. Use atomic ownership and an explicit state machine (IN_PROGRESS, COMPLETED, FAILED_REPLAYABLE, UNKNOWN_REQUIRES_RECOVERY) plus a recovery path for downstream effects. Include expiry, store enough response data, coordinate with queues/outbox, and test edge cases across regions and failures.
Access to theparisreview.org is blocked by Cloudflare, which protects the site with a security service and requires cookies. It states certain actions or inputs can trigger the block. To resolve, email the site owner with what you were doing and include the Cloudflare Ray ID and your IP.
Untended Fire argues Scouting's crisis is decades of neglect, not marketing. BSA now holds ~1.25% of youth and has shown no multi-year recovery in 25 years. A culture of administration over leadership, misaligned age-design, and a bureaucratic patrol method erode development. Eagle and leadership are reduced to velocity or titles, not real influence. After rebranding to Scouting America, debt and policy shifts reveal governance issues. The piece calls for candor at Dallas: restore the patrol method, train real leadership, create age-appropriate programs, and abandon unsound practices for bold reform.
Mid-cycle update: Reproducibility is now enforced—migration blocks new or testing packages that aren’t reproducible. BinNMUs are being tested with autopkgtests, as with source uploads. loong64 has been added as a new architecture, requiring many rebuilds across arches and swelling the CI queue—patience requested. Post-upload follow-up: the source uploader must ensure migration; if blocked by autopkgtest regressions in reverse test-dependencies, file appropriate RC bugs.
Labbé & Selinger present a Markov-partition construction of the Hat tilings, the aperiodic monotile discovered by Smith, Myers, Kaplan and Goodman-Strauss. The work provides a dynamical-systems framework for generating Hat tilings from local matching rules, clarifying the structure behind the non-periodic tiling.
A 403 Forbidden error means access to the page is blocked.
Emerich Juettner, an impoverished New York immigrant, secretly printed crude counterfeit one-dollar bills from 1938 for about a decade, exploiting that people seldom scrutinize small denominations. He operated solo, releasing only a few notes at a time. The Secret Service’s case 880 became the longest, costliest counterfeiting chase in U.S. history until a 1948 tip led to his arrest after engraving plates were found. He admitted making notes for 9–10 years, receiving a light sentence of one year and a day (paroled after 4 months) and a $1 fine. Hollywood later made Mister 880; he died in 1955.
Gemini API File Search is now multimodal, adding image support, custom metadata tagging, and page-level citations to ground results. It enables retrieval-augmented generation over text and images via the Gemini Embedding 2 model. Custom metadata lets you filter data (e.g., department: Legal), while page citations show exact source pages for verification. Aimed at prototyping to large-scale apps, it helps organize unstructured data and provide a verifiable source trail. Developers can upload files and consult the Gemini API docs to build with File Search.
ymawky is a MacOS web server written in ARM64 assembly with a fork-per-connection model. For Apple Silicon, built with Xcode CLT; run as ./ymawky [port]. It serves static files from www/ and uses err/ for custom error pages; default file is index.html for GET /. PUT supports uploads up to 1 GiB; supports GET/PUT/DELETE/OPTIONS/HEAD and range requests; MIME types auto-detected; directory listing enabled. Security: path normalization, confinement to www/, no symlinks, PUT to temp for atomic writes, and timeouts to mitigate slowloris. Config in config.S; default docroot www/ and index.html. MacOS syscalls; not Linux portable without adaptation; vulnerabilities noted.
Derives the elimination tree for the right-looking sparse Cholesky algorithm A=LL^T, showing it encodes where fill-in occurs and the task dependency graph. From the dense algorithm, sparsity yields a pruned DAG, whose compressed form is the column elimination tree. The parent array represents dependencies; a linear-time procedure computes the tree from the starting nonzeros A_row. With this tree, symbolic factorization uses L_col to specify nonzero positions, and numeric factorization then follows, exploiting the precomputed pattern. The approach grounds sparse factorization even when symmetry/definiteness may not hold.
ymawky is a macOS-only static HTTP server written in aarch64 assembly, using raw Darwin syscalls with no libc wrappers. It serves static files over GET, HEAD, PUT, OPTIONS, DELETE and supports byte ranges, directory listings, and custom error pages. It abandons abstractions, parsing HTTP by hand, decoding paths, preventing traversal, and using NOFOLLOW for symlinks; uploads write to temp files and are renamed on success. It forks on each request, weighing memory and concurrency. It guards against slowloris with header and body timeouts and content-length based limits, protecting the docroot. The goal is to reveal low-level web-server behavior.
EvilGeniusLabs.ca launches Chapter 1 of a long-form Visual Basic history: Origins (1964–1992). Six articles trace the BASIC lineage from Dartmouth through the Microsoft BASIC dynasty to Visual Basic 1.0 (MS-DOS), with the May 1991 VB/Windows launch in the middle. It covers Alan Cooper and Tripod, Project Thunder, and the 1989–1991 marketing, plus the dual VB/Windows and VB/DOS paths. The author aims to focus on the people behind VB, not just executives, and frames the Book as canonical with blog companions. Chapter 2 will cover version-by-version detail; later chapters cover Notable Characters.
Jure Triglav explores real-time surfel-based global illumination in the browser using WebGPU. The pipeline converts geometry into surfels (surfelization), builds a grid-based accelerator for surfels, uses a BVH-based ray-intersection for surfels, and a ray-traced integration to accumulate indirect lighting. A guiding system biases sampling toward bright directions, with temporal stability via MSME. A radial depth atlas helps prevent light leaks, and a resolve pass transfers surfel irradiance to pixels. The setup involves 13+ compute passes and demonstrates real-time performance on web, but faces Chrome storage-buffer limits, no hardware ray tracing, and limitations to static diffuse scenes.
Ken Shirriff reviews the Arma Micro Computer (1962), a 20-pound transistorized, 22-bit serial computer built for spacecraft navigation. Not a true microcomputer by modern standards, it used unusual components (transfluxors) and non-destructive readout ferrite-core memory, storing up to 7,808 program words and 256 data words. It ran at 1 MHz but delivered ~36,000 operations/sec due to serial design, with 120 I/O lines. Built from waferized discrete components for rugged space use, it influenced later Arma machines (Micro C/D) and inertial navigation systems (LTN-51) before Arma's 1982 closure. The term 'microcomputer' is historically fluid.
Made by Johno Whitaker using FastHTML