GCC SC approves inclusion of Algol 68 Front End
Algol 68 Front End David Edelsohn [email protected] Sat Nov 22 20:38:25 GMT 2025 The GCC Steering Committee has agreed to include the Algol 68 Front End in trunk designated as experimental with stipulations: 1. Algol 68 is not part of all languages built by default. 2. Algol 68 is not part of the GCC release […]
An Economy of AI Agents

Abstract:In the coming decade, artificially intelligent agents with the ability to plan and execute complex tasks over long time horizons with little direct oversight from humans may be deployed across the economy. This chapter surveys recent developments and highlights open questions for economists around how AI agents might interact with humans and with each other, […]
Three Years from GPT-3 to Gemini 3

I’ve been testing Google’s new Gemini 3 model. It is very good. But rather than give you benchmark numbers, I’m going to show you how far AI has come in three years by asking the AI to demonstrate it. It has been slightly less than three years since the release of ChatGPT. A few days […]
A monopoly ISP refuses to fix upstream infrastructure

A documented case of infrastructure failure, failed escalation, and a company that refuses to investigate. Here’s the situation: I have outages. My neighbor has the same outages. Xfinity won’t fix it. I bought Xfinity internet in June 2024. Immediately, my connection started dropping. Multiple times a day. Every single day. After troubleshooting every piece of […]
NTSB report: Decryption of images from the Titan submersible camera [pdf]
Download PDF
How to Spot a Counterfeit Lithium-Ion Battery

5 min read Andrew Moseman is the online communications editor at Caltech and a freelance contributor to IEEE Spectrum. Cylindrical lithium-ion batteries for small, inexpensive devices are increasingly turning up counterfeit. As an auditor of battery manufacturers around the world, University of Maryland mechanical engineer Michael Pecht frequently finds himself touring spotless production floors. They’re […]
Windows ARM64 Internals: Deconstructing Pointer Authentication

Pointer Authentication Code, or PAC, is an anti-exploit/memory-corruption feature that signs pointers so their use (as code or data) can be validated at runtime. PAC is available on Armv8.3-A and Armv9.0-A (and later) ARM architectures and leverages virtual addressing in order to store a small cryptographic signature alongside the pointer value. On a typical 64-bit […]
A Reverse Engineer’s Anatomy of the macOS Boot Chain and Security Architecture
1.0 The Silicon Root of Trust: Pre-Boot & Hardware Primitives The security of the macOS platform on Apple Silicon is not defined by the kernel; it is defined by the physics of the die. Before the first instruction of kernelcache is fetched, a complex, cryptographic ballet has already concluded within the Application Processor (AP). This […]
Show HN: Build the habit of writing meaningful commit messages

smartcommit is an intelligent, AI-powered CLI tool that helps you write semantic, Conventional Commits messages effortlessly. It analyzes your staged changes, asks clarifying questions to understand the “why” behind your code, and generates a structured commit message for you. Future you will thank you for deciding to use smartcommit! AI-Powered Analysis: Automatically analyzes your staged […]
The Mozilla Cycle, Part III: Mozilla Dies in Ignominy

I owe Mozilla a thank-you. Really, I do. Maybe an Edible Arrangement? People like those. Some lil pineapples cut into stars on sticks and chocolate strawberries might brighten their day. For the note, I’m thinking something like: Thank you for proving me exactly right. XOXO MT Eight months ago, in the fallout of Mozilla’s fumbling […]