Ransomware attacks surged to record highs in 2025 despite payments declining, driven by smaller groups exploiting vulnerabilities. In the UK, 50 GW of datacenter demand awaits grid connection, straining infrastructure amid AI growth initiatives. Microsoft’s HoloLens, initially rejected for battlefield use, is now aiding remote cargo inspections. Elsewhere, Sopra Steria is suing the UK government over a £958M outsourcing contract awarded to Capita, alleging improper procurement practices. Finally, a UK police officer was dismissed for faking keystrokes with photo frames to falsely portray productivity.
🚀 Space & Science
Fujitsu taps Broadcom’s 3D chip tech for 144-core Monaka CPU
Fujitsu is developing the Monaka CPU, a 144-core processor for datacenters, utilizing 3D chip-stacking technology from Broadcom’s new XDSiP platform. The design will stack four 2nm Armv9 compute dies with SRAM chiplets, resembling AMD’s cache-stacked X-chips. Broadcom has begun shipping samples to Fujitsu and expects other customers to adopt the technology.
- Fujitsu taps Broadcom’s 3D chip tech for 144-core Monaka CPU — go.theregister.com
Bitflipped: Your computer is a cosmic ray detector (2018)
Cosmic rays can randomly flip bits in computer memory, potentially causing data corruption. A tool called “bitflip” allows users to detect these bit flips by monitoring memory for changes. The tool is most effective with larger RAM capacities and at higher altitudes where cosmic ray exposure is greater.
Tao on AI & Math: “Cheap Wins” and New Workflows
Mathematician Terence Tao has observed advancements in generative AI’s ability to solve mathematical problems, including some Erdős Problems. While AI has achieved “cheap wins,” Tao believes the technology is now capable of collaborating with human mathematicians and opening up new approaches to mathematical research. He cautions against overhyping AI’s potential to solve the most challenging problems, but acknowledges its growing role in the field.
- Tao on AI & Math: “Cheap Wins” and New Workflows — theatlantic.com
Rydberg atoms detect clear signals from a handheld radio
NIST researchers have successfully used Rydberg atoms to detect and recover audio signals from a handheld radio, marking the first time this technique has been demonstrated. The team’s method demodulates radio frequencies, extracting coherent speech and monitoring multiple channels simultaneously. This breakthrough could potentially simplify the design of consumer electronics by eliminating traditional radio receiver components.
Experts sound alarm after ChatGPT Health fails to recognise medical emergencies
A recent study published in Nature Medicine found that ChatGPT Health frequently fails to recognize urgent medical situations and suicidal ideation, under-triaging over half of the patient scenarios tested. Experts warn that these failures, which include advising against immediate care in emergencies like asthma attacks, could create a dangerous false sense of security. The findings highlight potential life-threatening consequences for users relying on the AI for health advice.
Generative AI Use and Depressive Symptoms Among US Adults
A recent surge in generative AI use, such as ChatGPT, is raising concerns about potential mental health impacts, with some studies linking prolonged use to dependence and depressive symptoms. These concerns echo previous observations regarding social media, although a definitive causal link remains unproven. A large-scale survey of US adults is now underway to further investigate the relationship between AI usage and mood, while also considering demographic factors and social media habits.
- Generative AI Use and Depressive Symptoms Among US Adults — jamanetwork.com
Parakeet.cpp – Parakeet ASR inference in pure C++ with Metal GPU acceleration
The parakeet.cpp project enables fast, dependency-free speech recognition in C++ using NVIDIA’s Parakeet models. It utilizes the axiom tensor library for GPU acceleration, significantly outperforming PyTorch MPS and supporting various ASR models, including speaker diarization. The library allows for integration into applications requiring transcription of audio files or streams with customizable latency and decoder options.
More Americans Under 55 Are Dying of Heart Attacks
A recent study found a 57% increase in the proportion of adults aged 18-54 who died in hospitals from severe first heart attacks between 2011 and 2022. The research, published in the Journal of the American Heart Association, highlights a concerning trend of heart attacks affecting younger adults. This finding suggests a need for increased awareness and preventative measures among this age group.
💻 Engineering & Infrastructure
AI PCB Platform Flux Raises $37M
Flux, an AI-powered platform for designing printed circuit boards (PCBs), has raised $37 million in funding, including a $27 million Series B led by 8VC and a $10 million Series A. The startup, founded by Matthias Wagner, aims to modernize electronics design software, which has lagged behind other industries. Flux has already reached over one million sign-ups, indicating a growing market for its innovative approach.
- AI PCB Platform Flux Raises $37M — fortune.com
South Korea lifts data export ban, aiding Google Maps.
South Korea has approved Google’s request to export detailed map data, ending a long-standing restriction that limited the functionality of Google Maps within the country. This decision, prompted by trade talks with the U.S., will allow Google to offer full navigation features and detailed business listings. While the move is expected to boost tourism and challenge domestic mapping services, sensitive data will still be subject to government inspection.
- South Korea lifts data export ban, aiding Google Maps. — nytimes.com
🛡️ Security & Governance
Microsoft HoloLens finds second home in the military after failing battlefield tests
Following unsuccessful battlefield testing by the US Army, Microsoft’s HoloLens headsets are now being used for remote cargo inspection support. Air Force personnel in Italy are guiding Army soldiers through augmented reality, improving efficiency and accuracy in equipment loading. This collaborative project marks a significant improvement over the Army’s initial attempt to integrate HoloLens into a battlefield display system.
- Microsoft HoloLens finds second home in the military after failing battlefield tests — go.theregister.com
Ransomware payments cratered in 2025, but attacks surged to record highs
Ransomware attacks reached record highs in 2025, impacting more organizations than ever before despite a decrease in reported payments. This surge is fueled by smaller, opportunistic groups exploiting vulnerabilities and a growing market for stolen network access. While overall payments declined, ransom demands increased significantly and the number of publicly claimed victims dramatically rose.
- Ransomware payments cratered in 2025, but attacks surged to record highs — go.theregister.com
Claude Code Vulnerability Lets Hackers Issue Commands Via AI
A critical vulnerability has been discovered in Anthropic’s Claude Code, an AI coding assistant. The flaw allowed hackers to execute commands simply by the user opening a malicious project, requiring JavaScript and cookies to exploit. Anthropic is addressing the issue and advising users to enable JavaScript and cookies to continue using the tool.
- Claude Code Vulnerability Lets Hackers Issue Commands Via AI — cybernews.com
FIPS: Free Internetworking Peering System
This article announces FIPS, a Free Internetworking Peering System. The project developers state they value user feedback and encourage review of available documentation. Further details regarding the system’s functionality are not provided.
- FIPS: Free Internetworking Peering System — github.com
Jails for NetBSD
This article details a workflow for managing jails on NetBSD using jailmgr and jailctl, enabling resource-constrained environments. The process includes jail bootstrapping, creation with defined limits, ephemeral provisioning, and a supervision model for process management. Runtime statistics and Prometheus-compatible metrics are also provided for monitoring jail resource usage.
- Jails for NetBSD — netbsd-jails.petermann-digital.de
Protecting code compiled just in time (2024)
The article discusses protecting code compiled just in time. However, the content is inaccessible without JavaScript enabled in a web browser. Users are instructed to enable JavaScript and refresh the page to view the full article.
- Protecting code compiled just in time (2024) — developer.apple.com
Meta Docs Reveal Teen Safety vs. Growth Conflict
Court documents reveal internal conflicts at Meta regarding teen safety on Instagram, showing that prioritizing user growth and engagement often outweighed efforts to protect children. Employees expressed concerns about the platform’s vulnerability to predators and highlighted instances where safety features were delayed or scaled back due to potential impacts on user numbers. These findings contradict public statements from Mark Zuckerberg emphasizing the company’s commitment to child safety.
- Meta Docs Reveal Teen Safety vs. Growth Conflict — theatlantic.com
Your device identity is probably a liability
Many organizations have a false sense of security regarding device identity, often relying on certificates which are easily compromised. True device identity requires credentials uniquely bound to a device, preventing unauthorized access and lateral movement. This critical gap undermines Zero Trust security models and renders typical security audits ineffective.
- Your device identity is probably a liability — smallstep.com
Tech people keep falling for the same scam
Tech writers are enthusiastically praising new AI development tools, but experts warn this overlooks a recurring pattern in the tech industry. Initial accessibility and liberation are likely to be curtailed as investors seek returns, ultimately leading to monetization through data mining and advertising. This trend historically limits widespread access and diminishes the transformative potential of these tools.
- Tech people keep falling for the same scam — explodingcomma.com
Tenth Circuit: 4th Amendment doesn’t support broad search of protesters’ devices
A Tenth Circuit Court ruling overturned a lower court’s dismissal of a lawsuit challenging overly broad warrants used to search a protester’s devices and a nonprofit’s social media data. The court found the warrants lacked the required specificity and violated Fourth Amendment protections, denying officers qualified immunity. This decision limits police power regarding digital searches and represents a victory for protesters’ rights.
Lawmakers say US Military used laser to take down Border Protection drone in TX
The U.S. military mistakenly shot down a Customs and Border Protection drone near the Texas-Mexico border using a laser, prompting a temporary airspace closure. This incident, the second laser-related event in the area this month, has drawn criticism from lawmakers who cite a lack of coordination between agencies. The administration defends the action as part of efforts to counter drone threats, while investigations are being demanded.
The normalization of corruption in organizations (2003) [pdf]
A 2003 study examined how corruption becomes normalized within organizations, detailing a gradual process where unethical behavior is gradually accepted as standard practice. The research identifies factors like rationalization, denial, and a lack of accountability that contribute to this normalization. Ultimately, the study highlights the importance of strong ethical frameworks and oversight to prevent corruption from taking root.
Hong Kong jailed my dad to stop me speaking out, says activist
A Hong Kong court sentenced pro-democracy activist Anna Kwok’s father to eight months in prison for attempting to access funds belonging to his daughter, who is wanted by Hong Kong authorities. Kwok claims the prosecution is a tactic to silence her activism and pressure Hong Kong democracy advocates. This case reflects a growing trend of Hong Kong authorities targeting the families of activists living abroad.
Pentagon Laser Shoots Down Customs Border Patrol Drone in Texas
The Pentagon mistakenly shot down a US Customs and Border Protection drone in Texas using a laser system due to a lack of coordination with the FAA. This incident, similar to a previous one, underscores communication breakdowns between US agencies. The Defense Department did not realize the drone was operated by CBP at the time of the targeting.
- Pentagon Laser Shoots Down Customs Border Patrol Drone in Texas — bloomberg.com
💼 Business & Finance
50 GW of datacenter demand queues up for UK grid access
Approximately 50 GW of electricity demand from 140 datacenters is currently awaiting connection to the UK’s power grid, exceeding the nation’s peak electricity usage. Energy regulator Ofgem is seeking reforms to expedite the connection process and prioritize strategically important projects like datacenters, addressing a growing backlog. This situation highlights a strain on the UK’s energy infrastructure, spurred by government initiatives to foster AI growth zones.
- 50 GW of datacenter demand queues up for UK grid access — go.theregister.com
Sopra Steria sues UK government over £958M Capita outsourcing award
Sopra Steria is suing the UK government over a £958 million outsourcing contract awarded to Capita. The French firm alleges the Department for Work and Pensions improperly awarded the contract, failing to recognize Capita’s bid as “abnormally low” and violating procurement rules. The contract involves handling payroll for 250,000 civil servants as part of a government modernization program.
- Sopra Steria sues UK government over £958M Capita outsourcing award — go.theregister.com
Mondelēz picks Celonis as process backbone for SAP overhaul
Mondelēz has chosen Celonis’s process mining platform over SAP’s Signavio to analyze and optimize its business processes during its migration to SAP S/4HANA. The company intends to create a “digital twin” of its operations using Celonis to improve efficiency and prepare for future AI adoption, initially focusing on source-to-pay and order-to-cash functions. This vendor-neutral approach allows Mondelēz to connect various systems beyond just SAP.
- Mondelēz picks Celonis as process backbone for SAP overhaul — go.theregister.com
Suno Music Hits 2M Paid Subscribers, $300M ARR
AI music startup Suno has reached 2 million paid subscribers and $300 million in annual recurring revenue, demonstrating rapid growth in the AI music generation space. The company emphasizes user creativity and participation in music creation as a shift away from passive consumption. This milestone comes amidst increasing activity and some criticism within the broader AI music industry.
- Suno Music Hits 2M Paid Subscribers, $300M ARR — billboard.com
Ultrahuman Launches Ring Pro (Excluding US)
Ultrahuman has launched the Ring Pro, a new smart ring with a 15-day battery life, to circumvent a patent dispute with Oura that previously blocked sales in the U.S. The ring is available for pre-order globally, excluding the United States, and ships in March. Alongside the Ring Pro, Ultrahuman introduced “Jade,” a real-time biointelligence system designed to provide personalized health recommendations.
- Ultrahuman Launches Ring Pro (Excluding US) — techcrunch.com
TMTG May Spin Off Truth Social After Merger
Trump Media & Technology Group (TMTG) is exploring a plan to spin off its Truth Social platform into a separate publicly traded company. This potential move would occur after TMTG’s merger with nuclear fusion startup TAE Technologies is finalized, creating two distinct companies with focused strategies. The merger, expected in mid-2026, would also mark the first public market test for fusion technology.
- TMTG May Spin Off Truth Social After Merger — axios.com
Tether Freezes $4.2B Crypto Amid “Illicit Activity” Links
Tether, the issuer of the USDT stablecoin, has frozen approximately $4.2 billion in tokens linked to illicit activities, including fraud and terrorism. The company can remotely freeze these tokens at the request of law enforcement, with $3.5 billion frozen since 2023. This action highlights growing concerns and efforts to combat illicit finance within the cryptocurrency market.
Cards Against Humanity Statement and Form for Tariff Refunds
Following a Supreme Court ruling against illegal tariffs imposed by Donald Trump, Cards Against Humanity is offering refunds to customers who overpaid for their games. The company absorbed the tariff costs and didn’t raise prices, and will distribute 100% of any government refunds they receive back to customers. Consumers can fill out a form on the company’s website to request a refund, with priority given to those providing proof of overpayment.
- Cards Against Humanity Statement and Form for Tariff Refunds — getyourfuckingmoneyback.com
Don’t Cite Unsold eBay Listing Prices
Recent news reports have incorrectly cited inflated prices for items like NYC MetroCards and Trader Joe’s totes based on unsold eBay listings. These listings, where sellers set arbitrary prices, do not represent actual sales data, which indicates significantly lower market values. Journalists are advised to use eBay’s product research tools for accurate pricing information.
- Don’t Cite Unsold eBay Listing Prices — blog.danlew.net
Dyson settles forced labour suit in landmark UK case
Dyson has settled a lawsuit filed by 24 migrant workers alleging forced labor and abusive conditions in a Malaysian factory. The settlement establishes a legal precedent allowing UK courts to hear allegations against foreign suppliers of British manufacturers, despite Dyson’s denial of liability. Details of the compensation awarded to the workers have not been disclosed.
Palantir’s AI Is Playing a Major Role in Tracking Gaza Aid Deliveries
Palantir Technologies is utilizing AI-powered data analytics to track aid deliveries in Gaza through its involvement with the U.S.-led Civil Military Coordination Center. The system monitors aid convoys using drone surveillance and integrates data into Palantir’s platforms, raising concerns about prioritizing corporate interests and AI development over established humanitarian infrastructure. Critics argue this profit-driven approach bypasses existing UN aid systems and could compromise humanitarian principles.
- Palantir’s AI Is Playing a Major Role in Tracking Gaza Aid Deliveries — dropsitenews.com
⚙️ Development & Systems
Half of German-speaking SAP users set to blow past 2027 ECC support deadline
A survey of German-speaking SAP users reveals that nearly half plan to delay migrating from the legacy ECC system beyond SAP’s 2027 support deadline, with some willing to pay for extended support until 2030. These delays are driven by complex systems, skills shortages, and budget constraints. Furthermore, SAP’s rebranding of “Business Suite” is failing to gain traction due to a lack of clarity regarding its value and integration.
- Half of German-speaking SAP users set to blow past 2027 ECC support deadline — go.theregister.com
UK copper fired after faking keyboard taps using photo frame
A former UK police officer was dismissed for gross misconduct after she faked keyboard activity by weighing down her laptop keys with photo frames to appear productive. The officer’s keystroke recordings were significantly higher than her colleagues over several months in 2024 and 2025, attempting to conceal her actions. This incident reflects a concerning trend of employees deceiving productivity tracking systems.
- UK copper fired after faking keyboard taps using photo frame — go.theregister.com
Engineer held hostage by client who asked for the wrong fix
A field engineer was detained by a client after successfully completing a server hardware repair, due to a misunderstanding about a separate software issue. The client held the engineer hostage for nearly two hours until the misunderstanding was resolved, resulting in a tense standoff. Following the incident, the engineer was subsequently banned from the client’s site.
- Engineer held hostage by client who asked for the wrong fix — go.theregister.com
NUC, NUC! Who’s there? ASUS with a client device for Microsoft’s cloudy PCs
Microsoft is expanding its Windows 365 cloud PC ecosystem through partnerships with ASUS and Dell. ASUS will offer the NUC 16 and Dell the Pro Desktop, both designed to boot directly into the cloud-based operating system. These new client devices aim to provide secure, manageable virtual desktop solutions for businesses.
- NUC, NUC! Who’s there? ASUS with a client device for Microsoft’s cloudy PCs — go.theregister.com
Instant LLM Updates with Doc-to-LoRA and Text-to-LoRA
New research introduces a method for efficiently updating large language models (LLMs) without extensive retraining. This approach utilizes “update generators,” or hypernetworks, to create compact LoRA adapters that rapidly incorporate new knowledge and adapt models to specific tasks. The technique significantly reduces update costs and speeds up the process of improving LLM performance.
- Instant LLM Updates with Doc-to-LoRA and Text-to-LoRA — pub.sakana.ai
TinyP2P
TinyP2P is a 15-line Python program demonstrating the basic principles of peer-to-peer file sharing. It allows users to create small, password-protected networks for file exchange using standard protocols like HTTP and XML-RPC, functioning as either a server or client. The program serves as a proof of concept and is not intended for practical or secure file sharing.
- TinyP2P — web.archive.org
An update on SVG in GTK
GTK 4.22, slated for release soon, will include a new SVG renderer (GtkSvg) that supports animation and passes a significant portion of SVG tests. Performance optimizations have largely recovered initial slowdowns, making it suitable for icon rendering, and developers are seeking user feedback to improve adoption and address remaining rendering gaps. The new renderer will initially be used for some icons, with a full transition planned for a future development cycle.
- An update on SVG in GTK — blogs.gnome.org
JavaScript Streams API Improvement Needed
A proposal for a new JavaScript Streams API is gaining traction due to significant performance improvements over the existing standard. The current Streams API was designed before modern JavaScript features like async iteration, resulting in usability and performance limitations. This alternative leverages newer language primitives and aims to facilitate a discussion around a more efficient and user-friendly data streaming API.
- We deserve a better streams API for JavaScript — blog.cloudflare.com
Stack Memory Allocation
Go developers are enhancing performance by allocating memory on the stack instead of the heap, a faster method that bypasses garbage collection. The compiler can now directly allocate constant-sized slices on the stack when the size is known during compilation, effectively eliminating some allocations. This optimization utilizes the make function to pre-allocate memory, but requires the slice size to be predetermined and remain stack-bound.
- Allocating on the Stack — go.dev
Optimal Caverna Gameplay via Formal Methods
A board game enthusiast used formal verification methods to mathematically prove the optimal strategy for the game Caverna. Their analysis, conducted using the Lean 4 programming language, revealed a “furnishing rush” strategy as the uniquely dominant approach across all possible game configurations. The project involved creating a comprehensive formal model of the game and verifying it through 176 machine-checked proofs.
- Optimal Caverna Gameplay via Formal Methods — stephendiehl.com
Browser-based Windows emulation
RetroTick is a novel open-source tool enabling users to run classic Windows applications, such as FreeCell and Minesweeper, directly within a web browser. The project emulates an x86 CPU and parses Windows executables using technologies like Preact and TypeScript. It’s currently available for demonstration and its source code is accessible on GitHub.
- RetroTick – Run classic Windows EXEs in the browser — retrotick.com
A tale of two Wayland desktops
A user circumvented corporate IT restrictions by remotely displaying individual work applications on their personal computer using Waypipe. They also developed custom tools to forward and archive notifications between devices, enabling a consolidated workflow. This solution allows them to maintain personal computing freedom while accessing necessary work applications.
- A tale of two Wayland desktops — troubles.noblogs.org
misfin (is) mail (for the) small web [2023]
Smolnet is implementing a “Smolnet Captcha” to prevent automated bots from utilizing their proxy services. The captcha requires users to click a button to proceed and saves a non-tracking cookie in their browser. Developers can bypass the captcha by including a custom User-Agent header with their email address for contact purposes.
- misfin (is) mail (for the) small web [2023] — portal.mozz.us
JavaScript DRMs are Stupid and Useless
A new Digital Rights Management (DRM) system implemented on the HotAudio platform for ASMR content is ineffective due to its reliance on JavaScript, which makes the decryption logic easily accessible to users. The author argues that this approach is fundamentally flawed and echoes a long history of DRM failures. More robust, hardware-backed DRM solutions exist but are impractical for smaller platforms to implement.
- JavaScript DRMs are Stupid and Useless — the-ranty-dev.vercel.app
Understanding alignment - from source to object file
Alignment is a technique used to position data and code at memory addresses that are multiples of a specific value, often dictated by hardware or programming language requirements. C++ allows developers to control alignment using the alignas specifier, which impacts how data is handled during compilation and in LLVM IR. While explicit alignment specifications can be enforced, optimizers may adjust them based on the target architecture.
- Understanding alignment - from source to object file — maskray.me
Linux ID: Linux explores new way of authenticating developers and their code
The Linux kernel is replacing its current PGP-based developer authentication system with a new approach called Linux ID. This system will utilize decentralized identifiers and verifiable credentials to provide a more flexible, privacy-preserving, and issuer-agnostic method for verifying developer identity and code authenticity. Deployment of Linux ID is expected within a year.
Mothlamp Problems
A “mothlamp problem” is a challenging engineering project, often involving complex software development, that demands significant time and effort despite limited practical application. These endeavors are driven by a desire for creative problem-solving and realizing ambitious visions, and while frequently abandoned, contribute to learning and refining creative abilities. The author acknowledges engaging in such projects and views them as valuable for exercising the ability to dream and innovate.
- Mothlamp Problems — unfoldingdiagrams.leaflet.pub
Accidentally disabling SSH access via scp
An SSH connection failure occurred because a server’s home directory permissions were accidentally set to 777. This was caused by an SCP command transferring a directory with overly permissive settings, which OpenSSH then rejected. Reverting the home directory permissions to 700 resolved the issue and restored SSH access.
Exploring Static Website Publishing with Org Publish
The author is exploring using Emacs’ org-publish system to generate static websites as a backup and fully Emacs-native alternative to existing tools like ox-hugo. This involves splitting a large Org file into smaller, date-prefixed files and defining a custom publishing pipeline within Emacs. The project aims to reduce reliance on external packages and enhance Emacs’ functionality.
- Exploring Static Website Publishing with Org Publish — emacs.dyerdwelling.family
Thinking Machines Founders Join Meta
Two founding members of AI startup Thinking Machines Lab, Christian Gibson and Noah Shpak, have recently joined Meta. Their departure is part of a larger trend of talent leaving the company, which is valued at $12 billion. Neither Meta nor Thinking Machines Lab commented on the moves.
- Thinking Machines Founders Join Meta — businessinsider.com
Writing a Guide to SDF Fonts
An author created a comprehensive guide to signed distance field (SDF) fonts after their incomplete notes unexpectedly ranked high in search results. The resource focuses on the msdfgen library and explains SDF concepts to help users achieve specific visual effects. It separates conceptual explanations from implementation details previously included in earlier versions.
- Writing a Guide to SDF Fonts — redblobgames.com
Setting up OpenClaw on a cloud VM
OpenClaw is a powerful AI agent gaining popularity for its ability to automate tasks and integrate with messaging platforms. Due to its extensive system access, which poses significant security risks like prompt injection and data exposure, experts advise against running it on personal computers. Instead, they recommend deploying OpenClaw in isolated cloud environments for safer operation.
- Setting up OpenClaw on a cloud VM — blog.skypilot.co
Theory of Constraints: “Blue Light” creating capacity for nothing (2007)
A manufacturing plant believed it was operating at 93% efficiency despite a significant bottleneck in its welding department. A consultant identified that welders were losing time due to inefficient material handling, a problem masked by the initial efficiency assessment. By focusing on a visual cue – the “blue light” from the welding torch – the consultant was able to reveal a simpler solution and improve capacity.
- Theory of Constraints: “Blue Light” creating capacity for nothing (2007) — theoryofconstraints.blogspot.com
We Built Secure, Scalable Agent Sandbox Infrastructure
Browser Use has transitioned from using AWS Lambda to a more secure and scalable architecture employing Unikraft micro-VMs to isolate web agents. This new system, dubbed “Pattern 2,” restricts agent access to sensitive infrastructure and secrets through bytecode-only execution and a centralized control plane. The unified container image allows for consistent deployment across all environments, from development to production.
- We Built Secure, Scalable Agent Sandbox Infrastructure — browser-use.com
MitID, Denmarks sole digital ID, has been down for over an hour and counting
Denmark’s digital ID system, MitID, experienced an outage preventing logins for citizens and organizations. The issue has now been resolved, and MitID is operational again. MitID’s provider worked to restore the service and apologized for the inconvenience.
F-Droid Board of Directors nominations 2026
Nominations are now being accepted for up to four volunteer positions on the F-Droid Board of Directors, with two-year terms available. Candidates should be dedicated to promoting user freedoms and diverse backgrounds are encouraged to apply. The nomination deadline is March 16th.
- F-Droid Board of Directors nominations 2026 — f-droid.org
Working on Pharo Smalltalk: BPatterns: Rewrite Engine with Smalltalk Style
BPatterns is a new tool for Pharo Smalltalk that simplifies the use of the rewrite engine, a powerful code manipulation tool. It introduces a more approachable, fluent API using standard Smalltalk blocks as patterns, eliminating the need to remember the engine’s complex syntax. This allows developers to leverage the rewrite engine’s capabilities with improved code completion and refactoring support.
- Working on Pharo Smalltalk: BPatterns: Rewrite Engine with Smalltalk Style — dionisiydk.blogspot.com
Drivers reeling after passengers caught out by AI-powered safety cameras
AI-powered safety cameras in Western Australia have issued over 31,000 fines since late 2025 for seatbelt and mobile phone offenses. Some drivers are expressing frustration over being penalized for passenger infractions they couldn’t immediately control. A review of the penalty system is now underway to assess its impact on driver behavior.
📰 Culture & History
Harvard boffins finally crack the mystery of squeaky sneakers
Harvard researchers have determined that squeaky sneakers are caused by wave-like patterns on the rubber surface interacting with the floor, not the previously believed “stick-slip” phenomenon. These waves travel at roughly 300 kilometers per hour and are influenced by surface ridges, as revealed through experiments with rubber and glass. The findings offer a new explanation for the common sound and could inform future sneaker design.
- Harvard boffins finally crack the mystery of squeaky sneakers — go.theregister.com
Beyond explanation – top 10 UFO sightings captured in witness artwork
Due to technical limitations, the provided content is incomplete and prevents a factual summary. The article title suggests it discusses artwork depicting UFO sightings. Without the actual content, a proper summary cannot be generated.
History of the Graphical User Interface: The Rise (and Fall?) of WIMP Design
The Graphical User Interface (GUI) has evolved over sixty years, with the widely adopted WIMP design (Windows, Icons, Menus, Pointer) significantly improving usability through direct manipulation and real-time feedback. While initially revolutionary, the GUI is now undergoing a shift towards generative AI and “world models,” potentially rendering the traditional WIMP design obsolete. This evolution began with early innovations like the game Spacewar!, which demonstrated the importance of immediate user feedback.
ZSA: Andrew Smith
Andrew Smith, a network security engineer and Army National Guard member, designed a highly customizable desk using T-slot aluminum extrusions for his work-from-home setup. The workspace incorporates ergonomic and technological features, including a treadmill and smart lighting, reflecting his interest in adaptable hardware and unique solutions. Smith’s creation highlights a personalized and functional approach to remote work and hobbies.
- ZSA: Andrew Smith — people.zsa.io
What are you doing this weekend?
This article encourages readers to share their weekend plans and solicit feedback. It also acknowledges that it’s perfectly acceptable to have a relaxed weekend with no activities. The piece serves as a casual invitation for community engagement.
“Our programs are fun to use.”
Beagle Bros was a fondly remembered 1980s software company known for creating engaging and playful programs for the Apple II computer. They combined useful tools with humorous utilities and interactive demos, prioritizing user enjoyment and fostering a positive learning experience. The company’s unique approach to software development continues to resonate decades later.
- “Our programs are fun to use.” — unsung.aresluna.org
Rob Grant, creator of Red Dwarf, has died
Rob Grant, the British comedy writer best known for co-creating the sitcom Red Dwarf, has died at age 70. He collaborated extensively with Doug Naylor on numerous television projects, including Spitting Image, and leaves behind a significant legacy of humor and creativity. Tributes have been shared by colleagues and fans, recognizing his impact on the world of comedy.
- Rob Grant, creator of Red Dwarf, has died — beyondthejoke.co.uk
Dan Simmons, author of Hyperion, has died
Acclaimed American author Dan Simmons, best known for his science fiction novel Hyperion, has died at the age of 75. Prior to his writing career, Simmons was a dedicated elementary school teacher, developing innovative educational programs and inspiring his students. He leaves behind a prolific body of work spanning multiple genres and earning him numerous literary awards.
- Dan Simmons, author of Hyperion, has died — dignitymemorial.com
Daniel Joseph Simmons Passed Away
Prolific American author Dan Simmons, known for works like the Hyperion series and Song of Kali, has passed away at the age of 75. Before becoming a full-time writer, Simmons was an innovative elementary school teacher recognized for his creative teaching methods and a gifted program. His career spanned 31 novels and short story collections across multiple genres, earning him numerous awards and international recognition.
- Daniel Joseph Simmons Passed Away — dignitymemorial.com
US Customs destroys rare floppy disk
A collector’s rare copy of the Japanese game Tsukihime arrived damaged after being processed by US Customs, with the game’s floppy disk destroyed. The collector is unsure if DHL or Customs and Border Protection was responsible for the damage and plans to file a report. This is one of only 50 copies of the limited-edition game in existence.
- US Customs destroys rare floppy disk — twitter.com
Breaking Free
A new report by the Norwegian Consumer Council, “Breaking Free,” examines the issue of “enshittification” and its impact on consumers and society. The report suggests it’s possible to counteract this trend, and advocates are urging policymakers in the EU, UK, and US to take action. The report was released in conjunction with a letter signed by over 70 consumer groups.
- Breaking Free — forbrukerradet.no
The complete Manic Miner disassembly
A comprehensive disassembly of the classic 1984 video game Manic Miner has been released, providing detailed access to its code and data. The extensive resource includes memory maps, routines, graphics, sound, and other technical details. This allows for in-depth analysis and potential modification of the game.
- The complete Manic Miner disassembly — skoolkit.ca
The Hunt for Dark Breakfast
Inspired by the idea that breakfast possibilities are vast and unexplored, an author attempted to map all known breakfast combinations. Their research categorized breakfasts into three groups and ultimately identified a potential “dark breakfast” – an IHOP omelette incorporating pancake batter. This discovery suggests a much larger and undiscovered range of breakfast options exists.
- The Hunt for Dark Breakfast — moultano.wordpress.com
Compact disc story (1998)
This article appears to be a security alert, not a news report. It indicates unusual network activity and prompts the user to complete a security check. The message includes technical identifiers like a Ray ID, client IP address, and repeated notification of detected activity.
- Compact disc story (1998) — researchgate.net