Third Sunday of Easter

Reading 1 Acts 5:27-32, 40b-41

When the captain and the court officers had brought the apostles in
and made them stand before the Sanhedrin,
the high priest questioned them,
"We gave you strict orders, did we not,
to stop teaching in that name?
Yet you have filled Jerusalem with your teaching
and want to bring this man's blood upon us."
But Peter and the apostles said in reply,
"We must obey God rather than men.
The God of our ancestors raised Jesus,
though you had him killed by hanging him on a tree.
God exalted him at his right hand as leader and savior
to grant Israel repentance and forgiveness of sins.
We are witnesses of these things,
as is the Holy Spirit whom God has given to those who obey him."

The Sanhedrin ordered the apostles
to stop speaking in the name of Jesus, and dismissed them.
So they left the presence of the Sanhedrin,
rejoicing that they had been found worthy
to suffer dishonor for the sake of the name.

Responsorial Psalm Psalm 30:2, 4, 5-6, 11-12, 13

R. (2a) I will praise you, Lord, for you have rescued me.
or:
R. Alleluia.
I will extol you, O LORD, for you drew me clear
and did not let my enemies rejoice over me.
O LORD, you brought me up from the netherworld;
you preserved me from among those going down into the pit.
R. I will praise you, Lord, for you have rescued me.
or:
R. Alleluia.
Sing praise to the LORD, you his faithful ones,
and give thanks to his holy name.
For his anger lasts but a moment;
a lifetime, his good will.
At nightfall, weeping enters in,
 but with the dawn, rejoicing.
R. I will praise you, Lord, for you have rescued me.
or:
R. Alleluia.
Hear, O LORD, and have pity on me;
O LORD, be my helper.
You changed my mourning into dancing;
O LORD, my God, forever will I give you thanks.
R. I will praise you, Lord, for you have rescued me.
or:
R. Alleluia.

Reading 2 Revelation 5:11-14

I, John, looked and heard the voices of many angels
who surrounded the throne
and the living creatures and the elders.
They were countless in number, and they cried out in a loud voice:
"Worthy is the Lamb that was slain
to receive power and riches, wisdom and strength,
honor and glory and blessing."
Then I heard every creature in heaven and on earth
and under the earth and in the sea,
everything in the universe, cry out:
"To the one who sits on the throne and to the Lamb
be blessing and honor, glory and might,
forever and ever."
The four living creatures answered, "Amen, "
and the elders fell down and worshiped.

Alleluia

R. Alleluia, alleluia.
Christ is risen, creator of all;
he has shown pity on all people.
R. Alleluia, alleluia.

Gospel John 21:1-19 

At that time, Jesus revealed himself again to his disciples at the Sea of Tiberias.
He revealed himself in this way.
Together were Simon Peter, Thomas called Didymus,
Nathanael from Cana in Galilee,
Zebedee's sons, and two others of his disciples.
Simon Peter said to them, "I am going fishing."
They said to him, "We also will come with you."
So they went out and got into the boat,
but that night they caught nothing.
When it was already dawn, Jesus was standing on the shore;
but the disciples did not realize that it was Jesus.
Jesus said to them, "Children, have you caught anything to eat?"
They answered him, "No."
So he said to them, "Cast the net over the right side of the boat
and you will find something."
So they cast it, and were not able to pull it in
because of the number of fish.
So the disciple whom Jesus loved said to Peter, "It is the Lord."
When Simon Peter heard that it was the Lord,
he tucked in his garment, for he was lightly clad,
and jumped into the sea.
The other disciples came in the boat,
for they were not far from shore, only about a hundred yards,
dragging the net with the fish.
When they climbed out on shore,
they saw a charcoal fire with fish on it and bread.
Jesus said to them, "Bring some of the fish you just caught."
So Simon Peter went over and dragged the net ashore
full of one hundred fifty-three large fish.
Even though there were so many, the net was not torn.
Jesus said to them, "Come, have breakfast."
And none of the disciples dared to ask him, "Who are you?"
because they realized it was the Lord.
Jesus came over and took the bread and gave it to them,
and in like manner the fish.
This was now the third time Jesus was revealed to his disciples
after being raised from the dead.


When they had finished breakfast, Jesus said to Simon Peter,
"Simon, son of John, do you love me more than these?"
Simon Peter answered him, "Yes, Lord, you know that I love you."
Jesus said to him, "Feed my lambs."
He then said to Simon Peter a second time,
"Simon, son of John, do you love me?"
Simon Peter answered him, "Yes, Lord, you know that I love you."
Jesus said to him, "Tend my sheep."
Jesus said to him the third time,
"Simon, son of John, do you love me?"
Peter was distressed that Jesus had said to him a third time,
"Do you love me?" and he said to him,
"Lord, you know everything; you know that I love you."
Jesus said to him, "Feed my sheep.
Amen, amen, I say to you, when you were younger,
you used to dress yourself and go where you wanted;
but when you grow old, you will stretch out your hands,
and someone else will dress you
and lead you where you do not want to go."
He said this signifying by what kind of death he would glorify God.
And when he had said this, he said to him, "Follow me."

or John 21:1-14

At that time, Jesus revealed himself to his disciples at the Sea of Tiberias.
He revealed himself in this way.
Together were Simon Peter, Thomas called Didymus,
Nathanael from Cana in Galilee,
Zebedee's sons, and two others of his disciples.
Simon Peter said to them, ""I am going fishing.""
They said to him, ""We also will come with you.""
So they went out and got into the boat,
but that night they caught nothing.
When it was already dawn, Jesus was standing on the shore;
but the disciples did not realize that it was Jesus.
Jesus said to them, ""Children, have you caught anything to eat?""
They answered him, ""No.""
So he said to them, ""Cast the net over the right side of the boat
and you will find something.""
So they cast it, and were not able to pull it in
because of the number of fish.
So the disciple whom Jesus loved said to Peter, ""It is the Lord.""
When Simon Peter heard that it was the Lord,
he tucked in his garment, for he was lightly clad,
and jumped into the sea.
The other disciples came in the boat,
for they were not far from shore, only about a hundred yards,
dragging the net with the fish.
When they climbed out on shore,
they saw a charcoal fire with fish on it and bread.
Jesus said to them, ""Bring some of the fish you just caught.""
So Simon Peter went over and dragged the net ashore
full of one hundred fifty-three large fish.
Even though there were so many, the net was not torn.
Jesus said to them, ""Come, have breakfast.""
And none of the disciples dared to ask him, ""Who are you?""
because they realized it was the Lord.
Jesus came over and took the bread and gave it to them,
and in like manner the fish.
This was now the third time Jesus was revealed to his disciples
after being raised from the dead.


 

- - -

Lectionary for Mass for Use in the Dioceses of the United States, second typical edition, Copyright © 2001, 1998, 1997, 1986, 1970 Confraternity of Christian Doctrine; Psalm refrain © 1968, 1981, 1997, International Committee on English in the Liturgy, Inc. All rights reserved. Neither this work nor any part of it may be reproduced, distributed, performed or displayed in any medium, including electronic or digital, without permission in writing from the copyright owner.

Read more Summarize
Frnisi DMC-100: A Clamp Meter Worth Cracking Open

Pried open clamp meter on blue desk

Not all clamp meters are the same, and this video shows just that. In a recent teardown by [Kerry Wong], the new Fnirsi DMC-100 proves that affordable doesn’t mean boring. This 10,000-count clamp meter strays from the classic rotary dial in favour of a fully button-based interface – a choice that’s got sparks flying in the comments. And yes, it even auto-resumes its last function after reboot, like it knows you’re busy frying other fish.

What sets this meter apart isn’t just its snappy interface or surprisingly nice gold-tipped probes. It’s the layered UX – a hackable interface where short- and long-presses unlock hidden menus, memory functions, and even a graphing mode. A proper “hold-my-beer” moment comes when you discover it can split-display voltage and current and calculate real-time power (albeit with a minor asterisk: apparent power only, no power factor). Despite a few quirks, like accidentally triggering the flashlight when squeezing the jaw, it holds up well in accuracy tests. Even at higher currents where budget meters usually wobble.

Read more Summarize
Did Peking U. Just Make the World's Fastest Transistor - Without Using Silicon?

"It is the fastest, most efficient transistor ever," proclaims an announcment from Peking University. "And most important of all, there's no trace of silicon involved," adds ZME Science. From the South China Morning Post: A team of researchers at Peking University claims to have shattered chip performance limits and proven that China can use new materials to "change lanes" in the semiconductor race by circumventing silicon-based roadblocks entirely. The researchers, led by physical chemistry professor Peng Hailin, said their self-engineered 2D transistor could operate 40 per cent faster than Intel and TSMC's cutting-edge 3-nanometre silicon chips, while consuming 10 per cent less energy.... "While this path is born out of necessity due to current sanctions, it also forces researchers to find solutions from fresh perspectives," [Hailin] added. "Peking's major innovation comes from the two-dimensional nature of their transistors, facilitated by using an element other than silicon," writes Tom's Hardware: BiâOâSe, or bismuth oxyselenide, is a semiconductor material studied for its use in sub-1nm process nodes for years, largely thanks to its ability to be a 2D semiconductor. Two-dimensional semiconductors, like 2D BiâOâSe, are more flexible and sturdy at a small scale than silicon, which runs into reduced carrier mobility at even the 10nm node. Such breakthroughs into stacked 2D transistors and the move from silicon to bismuth are exciting for the future of semiconductors and are necessary for the Chinese industry to compete on the leading edge of semiconductors. ZME Science adds this note of skepticism. "Turning laboratory breakthroughs into commercial chips typically takes years — sometimes decades..." Thanks to Slashdot reader schwit1 for sharing the article.

Read more of this story at Slashdot.

Read more Summarize
The latest AI scaling graph – and why it hardly makes sense
Read more Summarize
Switch bouncing reference traces for a variety of different switches
Read more Summarize
Brian Eno's Theory of Democracy
Read more Summarize
Jewels linked to Buddha remains go to auction, sparking ethical debate
Read more Summarize
3D Printed Cable-Driven Mechanisms – Some Strings Attached

A human hand is shown in the bottom right corner of the picture, holding one end of a pencil. A white, segmented, mechanical tentacle extends from the bottom left corner of the image and wraps around the other end of the pencil.

One of the most basic problems with robotic arms and similar systems is keeping the weight down, as more weight requires a more rigid frame and stronger actuators. Cable-driven systems are a classic solution, and a team of researchers from MIT and Zhejiang University recently shared some techniques for designing fully 3D printed cable-driven mechanisms.

The researchers developed a set of four primitive motion components: a bending component, a coil, screw-like, and a compressive component. These components can work together in series or parallel to make much more complicated structures. To demonstrate, the researchers designed a gripping tentacle, a bird’s claw, and a lizard-like walking robot, but much more complicated structures are certainly possible. Additionally, since the cable itself is printed, it can have extra features, such as a one-way ratcheting mechanism or bumps for haptic feedback.

These printed cables are the most novel aspect of the project, and required significant fine-tuning to work properly. To have an advantage over manually-assembled cable-driven systems, they needed to be print-in-place. This required special printer settings to avoid delamination between layers of the cable, cables sticking to other components, or cables getting stuck in the mechanism’s joints. After some experiments, the researchers found that nylon filament gives the best balance between cable strength and flexibility, while not adhering tightly to the PLA structure.

We’ve seen cable-driven systems here a few times before. If you’re interested in a deeper dive, we’ve covered that too.

Thanks to [Madeinoz67] for the tip!

Read more Summarize
How Badly Did ChatGPT and Copilot Fail to Predict the Winners of the Kentucky Derby?

In 2016, an online "swarm intelligence" platform stunned horse-racing fans by making a correct prediction for the Kentucky Derby — naming all four top finishers in order. (But the next year its predictions weren't even close, with TechRepublic suggesting 2016's race just had an unusual cluster of obvious picks.) Since then it's become almost a tradition — asking AI to predict the winning horses each year, then see how close it came. So before today's race, a horse named "Journalism" was given the best odds of winning by professional bookmakers — but could AI make a better prediction? USA Today reports: The USA TODAY Network asked Microsoft Copilot AI to simulate the order of finish for the 2025 Kentucky Derby field based on the latest, odds, predictions and race factors on Thursday, May 1. Journalism came out on top in its projection. The AI-generated response cited Journalism's favorable post position (No. 8), which has produced the second-most Kentucky Derby winners and a four-race winning streak that includes last month's Santa Anita Derby. ChatGPT also picked the exact same horse, according to FanDuel. But in fact, the winning horse turned out to be "Sovereignty" (a horse Copilot predicted would finish second). Meanwhile Copilot's pick for first place ("Journalism") finished in second. But after that Copilot's picks were way off... Copilot's pick for third place was a horse named Rodriguez — which hours later was scratched from the race altogether. (And the next day Copilot's pick for 10th place was also scratched.) Copilot's pick for fourth place was "Sandman" — who finished in 18th place. Copilot's pick for fifth place was "Burnham Square" — who finished in 11th place. Copilot's pick for sixth place was "Luxor Cafe" — who finished in 10th place Copilot's pick for seventh place was "Render Judgment" — who finished in 16th place... An online racing publication also asked "a trained AI LLM tool" for their predictions, and received a wildly uneven prediction: Burnham Square (finished 11th) Journalism (finished 2nd) Sandman (finished 18th) Tiztastic (finished 15th) Baeza (finished 3rd)

Read more of this story at Slashdot.

Read more Summarize
Any headline that ends in a question mark can be answered by the word no
Read more Summarize
A Survey of AI Agent Protocols
Read more Summarize
ChatGPT as Economics Tutor: Capabilities and Limitations
Read more Summarize
Programmers Guide to the AMIBIOS (1993) [pdf]
Read more Summarize
What went wrong with wireless USB
Read more Summarize
Testing a Cheap Bench Power Supply Sold on Amazon

We’ve all seen those cheap bench power supply units (PSUs) for sale online, promising specifications that would cost at least a hundred dollars or more if it were a name brand model. Just how much of a compromise are these (usually rebranded) PSUs, and should you trust them with your electronics? Recently [Denki Otaku] purchased a cheap unit off Amazon Japan for a closer look, and found it to be rather lacking.

Internals of the cheap bench PSU reviewed by Denki Otaku on YouTube.
Internals of the cheap bench PSU reviewed by Denki Otaku on YouTube.

Major compromises include the lack of an output power switch, no way to check the set current limit without shorting the output, very slow drop in output voltage while adjusting due to the lack of a discharge circuit, and other usability concerns. That’s when the electrical performance of the PSU got tested.

Right off the bat a major issue in this cheap switching mode PSU is clear, as it has 200 mV peak-to-peak noise on its output, meaning very little output filtering. The maximum power output rating was also far too optimistic, with a large voltage drop observed. Despite this, it generally worked well, and the internals – with a big aluminium plate as heatsink – look pretty clean with an interesting architecture.

The general advice is to get a bench PSU that has features like an output power button and an easy way to set the voltage and current limits. Also do not connect it to anything that cares about noise and ripple unless you know that it produces clean, filtered output voltages.

Read more Summarize
Dying Satellites Can Drive Climate Change and Ozone Depletion, Study Finds

There's 9,000 satellites circling the earth, the Guardian points out, with projections over over 60,000 by 2040. But "A new study shows that the emissions from expired satellites, as they fall to Earth and burn up, will be significant in future years, with implications for ozone hole recovery and climate." Most old satellites are disposed of by reducing their altitude and letting them burn up as they fall, releasing pollution into Earth's atmosphere such as aerosolised aluminium. To understand the impact of these growing emissions from expired satellites, researchers simulated the effects associated with an annual release of 10,000 tonnes of aluminium oxide by 2040 (the amount estimated to be released from disposal of 3,000 satellites a year, assuming a fleet of 60,000 satellites). The results, which are published in Journal of Geophysical Research Atmospheres, show that the re-entry material will accumulate at high latitudes and could result in temperature anomalies of up to 1.5C in the middle to upper atmosphere, reduction of wind speeds and ozone depletion, which could jeopardise ozone hole recovery. "At present, impacts on the middle and the upper atmosphere are small," the researchers write, "but have the potential to increase." They argue that "to shed light upon the potential climate impacts of increased satellite reentry," an "expanded effort, including observations and modeling is needed." Thanks to long-time Slashdot reader AmiMoJo for sharing the article.

Read more of this story at Slashdot.

Read more Summarize
Pascal for Small Machines
Read more Summarize
A PostgreSQL planner semi-join gotcha with CTE, LIMIT, and RETURNING
Read more Summarize
Vygotsky's Zone of Proximal Development
Read more Summarize
NEA Cancels Grants After Proposed Elimination of Agency
Read more Summarize
LLM Ported To The C64, Kinda

“If there’s one thing the Commodore 64 is missing, it’s a large language model,” is a phrase nobody has uttered on this Earth. Yet, you could run one, if you so desired, thanks to [ytm] and the Llama2.c64 project!

[ytm] did the hard work of porting the Llama 2 model to the most popular computer ever made. Of course, as you might expect, the ancient 8-bit machine doesn’t really have the stones to run an LLM on its own. You will need one rather significant upgrade, in the form of 2 MB additional RAM via a C64 REU.

Now, don’t get ahead of things—this is no wide-ranging ChatGPT clone. It’s not going to do your homework, counsel you on your failed marriage, or solve the geopolitical crisis in your local region. Instead, you’re getting the 260 K tinystories model, which is a tad more limited. In [ytm]’s words… “Imagine prompting a 3-year-old child with the beginning of a story — they will continue it to the best of their vocabulary and abilities.”

It might not be supremely capable, but there’s something fun about seeing such a model talking back on an old-school C64 display. If you’ve been hacking away at your own C64 projects, don’t hesitate to let us know. We certainly can’t get enough of them!

Thanks to [ytm] for the tip!

Read more Summarize
Gorgeous-GRUB: collection of decent community-made GRUB themes
Read more Summarize
AI-Driven Robot Installs Nearly 10,000 Solar Modules in Australia

Long-time Slashdot reader AmiMoJo shares an article from Renewables Now: Chinese tech company Leapting has successfully completed its first commercial deployment of photovoltaic (PV) modules with an AI-driven solar module mounting robot in Australia. The Chinese company was tasked with supporting the installation of French Neoen's (EPA:NEOEN) 350-MW/440-MWp Culcairn Solar Farm in New South Wales' Riverina region. Shanghai-based Leapting said this week that its intelligent robot has installed almost 10,000 modules at an "efficient, safe, and stable" pace that has "significantly" reduced the original construction timeline. Litian Intelligent was deployed at the Australian project site in early February. The machine has a 2.5-metre-high robotic arm sitting on a self-guided, self-propelled crawler. Equipped with a navigation system, and visual recognition technology, it can lift and mount PV panels weighing up to 30 kilograms. By replacing labour-intensive manual operations, the robot shortens the module installation cycle by 25%, while the installation efficiency increases three to five times as compared to manual labour and is easily adapted to complex environments, Leapting says. Or, as Clean Technica puts it, "Meet the robot replacing four workers at a time on solar projects." This is part of a broader industrial trend. In the United States, Rosendin Electric demonstrated its own semi-autonomous system in Texas that allowed a two-person team to install 350 to 400 modules per day, a clear step-change from traditional methods. AES Corporation has been developing a robot called Maximo that combines placement and fastening with computer vision. Trina Solar's Trinabot in China operates in a similar space, with prototype systems demonstrating 50-plus modules per hour... In an industry where time-to-energy is critical, shaving weeks off the construction schedule directly reduces costs and increases net revenue... [T]he direction is clear. The future of solar construction will be faster, safer, and more precise — not because of human brawn, but because of robotic repetition. There will still be humans on-site, but their role shifts from lifting panels to managing throughput. Just as cranes and excavators changed civil construction, so too will robots like Leapting's define the next era of solar deployment.

Read more of this story at Slashdot.

Read more Summarize
FAA offering more incentives as air traffic controller shortage worsens
Read more Summarize
Google Gemini has the worst LLM API
Read more Summarize
Why I Am Not Going to Buy a Computer (1987) [pdf]
Read more Summarize
Scientists Simulate First-Ever 'Black Hole Bomb' Laboratory Analog

"Researchers have created the first laboratory analog of the 'black hole bomb'," reports ScienceAlert, "a theoretical concept developed by physicists in the 1970s..." There's no black hole involved; their experiment just simulates the "electromagnetic analogue" of the theoretical concept — the "exponential runaway amplification of spontaneously generated electromagnetic modes." Or, as ScienceAlert puts it, "It doesn't, just to set your mind at ease, pose any danger. It consists of a rotating aluminum cylinder, placed inside layers of coils that generate magnetic fields that rotate around it, at controllable speeds." As Roger Penrose proposed in 1971, the powerful rotational energy of a spinning black hole could be used to amplify the energy of nearby particles. Then, physicist Yakov Zel'Dovich figured out that you didn't need a black hole to see this phenomenon in action. An axially symmetrical body rotating in a resonance chamber, he figured, could produce the same energy transfer and amplification, albeit on a much smaller scale. Later work by other physicists found that, if you enclose the entire apparatus in a mirror, a positive feedback loop is generated, amplifying the energy until it explodes from the system. This concept was named the black hole bomb, and a team of physicists led by Marion Cromb of the University of Southampton in the UK now claim to have brought it to life. A paper describing their experiment has been uploaded to preprint server arXiv... [W]hat the team's experiment does is simulate it, using magnetic fields as a proxy for the particles, with the coils around the system acting as the reflector to produce the feedback loop. When they ran the experiment, they found that, when the cylinder is rotating faster than, and in the same direction as, the magnetic field, the magnetic field is amplified, compared to when there is no cylinder. When the cylinder rotates more slowly than the magnetic field, however, the magnetic field is dampened. This is a really interesting result, because it demonstrates a very clear amplification effect, based on the theories described decades ago... Because we can't probe black holes directly, analogs such as this are an excellent way to understand their properties... [T]he experiment could represent a significant step towards better understanding the physics of the most gravitationally extreme objects in the Universe. "The exponential amplification from noise supports theoretical investigations into black hole instabilities," the researchers write, "and is promising for the development of future experiments to observe quantum friction in the form of the Zeldovich effect seeded by the quantum vacuum..."

Read more of this story at Slashdot.

Read more Summarize
Numerical Linear Algebra Class in Julia TUM
Read more Summarize
The Unreasonable Effectiveness of Multiple Dispatch in Julia (2019)
Read more Summarize
Why do econ journalists keep making this basic mistake?
Read more Summarize
Rust Use Within The QEMU Emulator Shaping Up Well

The QEMU processor emulator that plays an important role in the open-source Linux virtualization stack has been seeing experimental support for the Rust programming language developing within its codebase. There continues to be good progress being made on this Rust support as more QEMU components get ported over to this programming language for memory safety and other security benefits...

Read more Summarize
When Flat Rate Movers Won't Answer Your Calls
Read more Summarize
'Unparalleled' Snake Antivenom Made With Antibodies From a Man Bitten 200 Times

Long-time Slashdot reader piojo writes: Tim Friede, Wisconsin man, has been injecting himself with snake venom for 18 years to gain protection from his pet snakes. The antibodies he developed have formed two components of a three-part antivenom, which gives partial or total protection against 18 of 19 species of venomous snakes that were tested. Notably, the antivenom is ineffective against vipers. From Australia's public broadcaster ABC: The team's results have been published today in the journal Cell... The new antivenom described in the study is very different to traditional antivenoms, according to Peter Kwong, a biochemist at Columbia University and one of the study's authors. The scientists call their new antivenom "unparallel," according to the BBC, though the snake enthusiast (a former truck mechanic) had "initially wanted to build up his immunity to protect himself when handling snakes, documenting his exploits on YouTube." The team is trying to refine the antibodies further and see if adding a fourth component could lead to total protection against elapid snake venom... "Tim's antibodies are really quite extraordinary — he taught his immune system to get this very, very broad recognition," said Professor Peter Kwong [one of the researchers at Columbia University]. In a video interview, CNN shows footage of the man inducing snake bites (calling it "a classic do-not-try-this-at-home moment"). "I have a lot of notes in Excel files," he tells CNN, "where I hit these particular windows to where I know I can boost up before a bite." "I don't just take the bite, because that can kill you. I properly boost up, and methodically take notes, and weigh the venomes out very specifically..."

Read more of this story at Slashdot.

Read more Summarize
Understanding-j: An introduction to the J programming language that gets to the
Read more Summarize
Tell HN: TIL about Not By AI, A Badge you can add if your work is "human made"
Read more Summarize
You Sent the Message. But Did You Write It?
Read more Summarize
Tablet Suspension System Avoids Fatigue at Bedtime

You know how it is. You’re all cozy in bed but not quite ready to doze off. You’re reading Hackaday (Hackaday is your go-to bedtime reading material, right?) or you’re binge-watching your latest reality TV obsession on your tablet. You feel the tablet growing heavier and heavier as your arms fatigue from holding it inches above your face. You consider the embarrassment you’ll endure from explaining how you injured your nose as the danger of dropping the tablet gradually increases. The struggle is real.

[Will Dana] has been engineering his way out of this predicament for a few years now, and with the recent upgrade to his iPad suspension system he is maximizing his laziness, but not without putting in a fair amount of hard work first.

The first iteration of the device worked on a manual pulley system whereby an iPad was suspended from the ceiling over his bed on three cords. Pulling on a cord beside the bed would raise the bracket used for holding the iPad out of the way while not in use. This new iteration takes that pesky cord pulling out of the user’s hands, replacing it with a motorized winch. A spot of dark ink on one of the cords in combination with a light sensor helps to calibrate the system so that the ESP32 which controls it always knows the proper limits of operation.

Of course, if, like [Will], you’re using an ESP32, and your room is already fully controlled by a voice interface, you may as well integrate the two. After all, there is no sense in wasting precious energy by pressing buttons. Utter a simple command to Alexa once you’re tucked in, and it’s time for hands-free entertainment.

We’ve covered several of [Will]’s previous creations, such as his Motorized Relay Computer and Harry Potter-inspired Sorting Hat.

Read more Summarize
The Atlantic Warns Combining US Government Databases Could Create a 'Panopticon'

America's federal government "is a veritable cosmos of information, made up of constellations of databases," warns the Atlantic. The FBI "has a facial-recognition apparatus capable of matching people against more than 640 million photos — a database made up of driver's license and passport photos, as well as mug shots. The Homeland Security department holds data "about the movements of every person who travels by air commercially". America's Drug Enforcement Administration "tracks license plates scanned on American roads." And there's also every taxpayer's finance and employment history..." Government agencies including the IRS, the FBI, DHS, and the Department of Defense have all purchased cellphone-location data, and possibly collected them too, via secretive groups such as the National Geospatial-Intelligence Agency. That means the government has at least some ability to map or re-create the past everyday movements of some American citizens. But now the information at individual agencies "is being pooled together. The question is Why? And what does the administration intend to do with it?" A White House spokesperson confirmed to the Atlantic that data collected by different agencies is now being combined. (They said that "Through data sharing between agencies, departments are collaborating to identify fraud and prevent criminals from exploiting hardworking American taxpayers.") But a March executive explicitly stated an aim "to eliminate the data silos that keep everything separate." The article accuses the administration officials of "not just undoing decades of privacy measures. They appear to be ignoring that they were ever written." The Atlantic spoke with former government officials "who have spent time in these systems," reporting that "to a person, these experts are alarmed about the possibilities for harm, graft, and abuse... Collecting and then assembling data in the industrial way — just to have them in case they might be useful — would represent a huge and disturbing shift for the government..." "A fragile combination of decades-old laws, norms, and jungly bureaucracy has so far prevented repositories such as these from assembling into a centralized American surveillance state. But that appears to be changing... DOGE has systematically gained access to sensitive data across the federal government "in ways that people in several agencies have described to us as both dangerous and disturbing."

Read more of this story at Slashdot.

Read more Summarize
DuckDB is probably the most important geospatial software of the last decade
Read more Summarize
Ask HN: Anyone else roll eyes at startups that went from "X" to "AI-powered X"?
Read more Summarize
Federal Court Halts Dismantling of Federal Library Agency in ALA Lawsuit
Read more Summarize
Spain-Portugal blackouts: what happened
Read more Summarize
Threads Jumps to 350 Million, Adding 30 Million Users in Three Months

Threads has now grown to over 350 million monthly active users, reports TechCrunch, citing Mark Zuckerberg's comments on a company earnings call. That means Threads grew by 9.4% in roughly 90 days: That's an increase of 30 million users since the prior quarter, where Meta reported that Threads had 320 million users. The new figure represents increased growth, as Threads added 30 million in the first quarter of this year, compared with 20 million in Q4 2024. It's also worth noting that in a single quarter, Threads added nearly the same number of users to its network as one of its newer competitors, Bluesky. The latter, a decentralized social app, today has roughly 35 million users. Zuckerberg also said there's been a 35% increase in time spent on Threads, according to the article, as a result of improvements to its recommendations systems.

Read more of this story at Slashdot.

Read more Summarize
Deadly Screwworm Parasite's Comeback Threatens Texas Cattle, US Beef Supply
Read more Summarize
We Fell Out of Love with Next.js and Back in Love with Ruby on Rails
Read more Summarize
Warren Buffett to Step Down from Berkshire Hathaway at Year-End
Read more Summarize
Show HN: Free, 100% in browser PDF editor
Read more Summarize
RethinkDNS Resolver That Deploys to CF Workers, Deno Deploy, Fastly, Fly.io
Read more Summarize
Understanding transaction visibility in PostgreSQL clusters with read replicas
Read more Summarize
May is 'Maintainer Month'. Open Source Initiative Joins GitHub to Celebrate Open Source Security

May is Maintainer Month: Celebrating those who secure Open Source @@@@@@@@@@@@@@@@@@@@@@@@@@@@ The Open Source Initiative is joining "a global community of contributors" for GitHub's annual event "honoring the individuals who steward and sustain Open Source projects." And the theme of the 4th Annual "Maintainer Month" will be: securing Open Source: Throughout the month, OSI and our affiliates will be highlighting maintainers who prioritize security in their projects, sharing their stories, and providing a platform for collaboration and learning... Maintainer Month is a time to gather, share knowledge, and express appreciation for the people who keep Open Source projects running. These maintainers not only review issues and merge pull requests — they also navigate community dynamics, mentor new contributors, and increasingly, adopt security best practices to protect their code and users.... - OSI will publish a series of articles on Opensource.net highlighting maintainers whose work centers around security... - As part of our programming for May, OSI will host a virtual Town Hall [May 21st] with our affiliate organizations and invite the broader Open Source community to join.... - Maintainer Month is also a time to tell the stories of those who often work behind the scenes. OSI will be amplifying voices from across our affiliate network and encouraging communities to recognize the people whose efforts are often invisible, yet essential. "These efforts are not just celebrations — they are opportunities to recognize the essential role maintainers play in safeguarding the Open Source infrastructure that underpins so much of our digital world," according to the OSI's announcement. And this year they're focusing on three key areas of open source security: Adopting security best practices in projects and communities Recognizing contributors who improve project security Collaborating to strengthen the ecosystem as a whole

Read more of this story at Slashdot.

Read more Summarize
Burning Mao
Read more Summarize
MathML with Pandoc
Read more Summarize
Hacking Different Sized Nozzles For AnyCubic Printers

If you’ve got a popular 3D printer that has been on the market a good long while, you can probably get any old nozzles you want right off the shelf. If you happen to have an AnyCubic printer, though, you might find it a bit tougher. [Startup Chuck] wanted some specific sized nozzles for his rig, so set about whipping up a solution himself.

[Chuck]’s first experiments were simple enough. He wanted larger nozzles than those on sale, so he did the obvious. He took existing 0.4 mm nozzles and drilled them out with carbide PCB drills to make 0.6 mm and 0.8 mm nozzles. It’s pretty straightforward stuff, and it was a useful hack to really make the best use of the large print area on the AnyCubic Kobra 3.

But what about going the other way? [Chuck] figured out a solution for that, too. He started by punching out the 0.4 mm insert in an existing nozzle. He then figured out how to drive 0.2 mm nozzles from another printer into the nozzle body so he had a viable 0.2 mm nozzle that suited his AnyCubic machine.

The result? [Chuck] can now print tiny little things on his big AnyCubic printer without having to wait for the OEM to come out with the right nozzles. If you want to learn more about nozzles, we can help you there, too.

Read more Summarize
Facebook's Content Takedowns Take So Long They 'Don't Matter Much', Researchers Find

An anonymous reader shared this report from the Washington Post: Facebook's loosening of its content moderation standards early this year got lots of attention and criticism. But a new study suggests that it might matter less what is taken down than when. The research finds that Facebook posts removed for violating standards or other reasons have already been seen by at least three-quarters of the people who would be predicted to ever see them. "Content takedowns on Facebook just don't matter all that much, because of how long they take to happen," said Laura Edelson, an assistant professor of computer science at Northeastern University and the lead author of the paper in the Journal of Online Trust and Safety. Social media platforms generally measure how many bad posts they have taken down as an indication of their efforts to suppress harmful or illegal material. The researchers advocate a new metric: How many people were prevented from seeing a bad post by Facebook taking it down...? "Removed content we saw was mostly garden-variety spam — ads for financial scams, [multilevel marketing] schemes, that kind of thing," Edelson said... The new research is a reminder that platforms inadvertently host lots of posts that everyone agrees are bad.

Read more of this story at Slashdot.

Read more Summarize
How LWN is faring in 2025
Read more Summarize
Where Do Scientists Think This Is All Going?
Read more Summarize
Bethesda Thinks Fan Remaster of Oblivion Is 'Very Special' and Supports It
Read more Summarize
New Gold-Creating Phenomenon Confirmed in Space Using 2004 Neutron Star Flare Readings

Slashdot reader sciencehabit shares this excerpt from a new article in Science magazine: At first, astronomers knew of only one cosmic scenario that fit the bill for the violent formation of "jewelry shop" elements [gold and sliver]: the collision of two ultra-dense stellar corpses called neutron stars. Now, a second has stepped onto the scene. As they report this week in The Astrophysical Journal Letters, researchers have discovered signatures of this heavy element formation — called the r-process — in a giant flare first detected from a highly magnetic neutron star in 2004. The flare, which released more energy than our Sun does in a million years as it spewed electrically charged material, has remained shrouded in mystery since its discovery 20 years ago. Researchers quickly traced the outburst to a nearby magnetar, a special breed of neutron star whose magnetic fields are trillions times stronger than Earth's. But ten minutes after the massive flare, a second, fainter signal inexplicably came from the same star. More r-process sources may still be looming in the dark. The new study accounts for about 10% of the Milky Way's heavy elements, suggesting that astronomers will have to scour the cosmos for even more places where the r-process is hiding. One potential spot is a rare type of supernova that births rapidly rotating neutron stars, says says Anirudh Patel, the new study's lead author and an astronomer at Columbia University. He hopes that with more observations, astronomers will be able to sharpen that picture.... "It's humbling to realize that these were made in such extreme astrophysical environments."

Read more of this story at Slashdot.

Read more Summarize
QModem 4.51 Source Code
Read more Summarize
Run LLMs on Apple Neural Engine (ANE)
Read more Summarize
Censorship concerns rise over Texas book bill; Abilene bookstore pushes back
Read more Summarize
A memory of the nineteen nineties (1997)
Read more Summarize
US National Security Official Caught Using 'Less-Secure Signal App Knockoff'

Remember when U.S. National Security Adviser Mike Waltz mistakenly included a journalist in an encrypted chatroom to discuss looming U.S. military action against Yemen's Houthis? A recent photo of a high-level cabinet meeting caught Waltz using a "less-secure Signal app knockoff," reports the Guardian: The chat app Waltz was using appears to be a modified version of Signal called TM SGNL, made by a company that copies messaging apps but adds an ability to retain messages and archive them. The White House officials may be using the modified Signal in order to comply with the legal requirement that presidential records be preserved... That function suggests the end-to-end encryption that makes Signal trusted for sharing private communications is possibly "not maintained, because the messages can be later retrieved after being stored somewhere else", according to 404 Media. Thursday the national security adviser was removed from his position, the article points out. He was instead named America's ambassador to the United Nations.

Read more of this story at Slashdot.

Read more Summarize
The US has approved CRISPR pigs for food
Read more Summarize
N8n – Flexible AI workflow automation for technical teams
Read more Summarize
Google Can Train Search AI with Web Content Even with Opt-Out
Read more Summarize
Why I ever wrote Clojure
Read more Summarize
Knowing What’s Possible

Dan Maloney and I were talking on the podcast about his memories of the old electronics magazines, and how they had some gonzo projects in them. One, a DIY picture phone from the 1980s, was a monster build of a hundred ICs that also required you to own a TV camera. At that time, the idea of being able to see someone while talking to them on the phone was pure science fiction, and here was a version of that which you could build yourself.

Still, we have to wonder how many of these were ever built. The project itself was difficult and expensive, but you actually have to multiply that by two if you want to talk with someone else. And then you have to turn your respective living rooms into TV studios. It wasn’t the most practical of projects.

But amazing projects did something in the old magazines that we take a little bit for granted today: they showed what was possible. And if you want to create something new, you’re not necessarily going to know how to do it, but just the idea that it’s possible at all is often enough to give a motivated hacker the drive to make it real. As skateboard hero Rodney Mullen put it, “the biggest obstacle to creativity is breaking through the barrier of disbelief”.

In the skating world, it’s seeing someone else do a trick in a video that lets you know that it’s possible, and then you can make it your own. In our world, in prehistoric times, it was these electronics magazines that showed you what was possible. In the present, it’s all over the Internet, and all over Hackaday. So when you see someone’s amazing project, even if you aren’t necessarily into it, or maybe don’t even fully understand it, your horizons of what’s possible are nonetheless expanded, and that helps us all be more creative.

Keep on pushing!

Read more Summarize
Show HN: Pipask – safer pip without compromising convenience
Read more Summarize
Vibe Coding Is Overrated
Read more Summarize
Why I stopped angel investing after 15 years (and what I'm doing instead)
Read more Summarize
Computational Limit of Life May Be Billion Times Higher Than Assumed
Read more Summarize
Time saved by AI offset by new work created, study suggests
Read more Summarize
Closures in Tcl
Read more Summarize
Google Plans To Roll Out Its AI Chatbot To Children Under 13

An anonymous reader quotes a report from the New York Times: Google plans to roll out its Gemini artificial intelligence chatbot next week for children under 13 (source paywalled; alternative source) who have parent-managed Google accounts, as tech companies vie to attract young users with A.I. products. "Gemini Apps will soon be available for your child," the company said in an email this week to the parent of an 8-year-old. "That means your child will be able to use Gemini" to ask questions, get homework help and make up stories. The chatbot will be available to children whose parents useFamily Link, a Google service that enables families to set up Gmail and opt into services like YouTube for their child. To sign up for a child account, parents provide the tech company with personal data like their child's name and birth date. Gemini has specific guardrails for younger users to hinder the chatbot from producing certain unsafe content, said Karl Ryan, a Google spokesman. When a child with a Family Link account uses Gemini, he added, the company will not use that data to train its A.I. Introducing Gemini for children could accelerate the use of chatbots among a vulnerable population as schools, colleges, companies and others grapple with the effects of popular generative A.I. technologies. Trained on huge amounts of data, these systems can produce humanlike text and realistic-looking images and videos. [...] Google acknowledged some risks in its email to families this week, alerting parents that "Gemini can make mistakes" and suggesting they "help your child think critically" about the chatbot. The email also recommended parents teach their child how to fact-check Gemini's answers. And the company suggested parents remind their child that "Gemini isn't human" and "not to enter sensitive or personal info in Gemini." Despite the company's efforts to filter inappropriate material, the email added, children "may encounter content you don't want them to see."

Read more of this story at Slashdot.

Read more Summarize
Seeking an Answer: Why can't HTML alone do includes?
Read more Summarize
Vuntra City
Read more Summarize
Labwc 0.8.4 Ships More Usability Improvements For This Wayland Compositor

Labwc 0.8.4 is out as the newest stable update to this wlroots-based, window-stacking Wayland compositor...

Read more Summarize
Show HN: Use Third Party LLM API in JetBrains AI Assistant
Read more Summarize
In his first 100 days, Trump launched an “all-out assault” on the environment

This article originally appeared on Inside Climate News, a nonprofit, non-partisan news organization that covers climate, energy, and the environment. Sign up for their newsletter here.

One hundred days into the second Trump administration, many environmentalists’ worst fears about the new presidency have been realized—and surpassed.

Facing a spate of orders, pronouncements, and actions that target America’s most cherished natural resources and most vulnerable communities, advocates fear the Trump agenda, unchecked, will set the country back decades.

Read full article

Comments

Read more Summarize
Getting Stated with ATtiny Configurable Custom Logic (CCL)

Configurable Custom Logic (CCL) Block Diagram.

In the Microchip tinyAVR 0-series, 1-series, and 2-series we see Configurable Custom Logic (CCL) among the Core Independent Peripherals (CIP) available on the chip. In this YouTube video [Grug Huhler] shows us how to make your own digital logic in hardware using the ATtiny CCL peripheral.

If you have spare pins on your tinyAVR micro you can use them with the CCL for “glue logic” and save on your bill of materials (BOM) cost. The CCL can do simple to moderately complex logic, and it does it without the need for support from the processor core, which is why it’s called a core independent peripheral. A good place to learn about the CCL capabilities in these tinyAVR series is Microchip Technical Brief TB3218: Getting Started with Configurable Custom Logic (CCL) or if you need more information see a datasheet, such as the ATtiny3226 datasheet mentioned in the video.

A tinyAVR micro will have one or two CCL peripherals depending on the series. The heart of the CCL hardware are two Lookup Tables (LUTs). Each LUT can map any three binary inputs into one binary output. This allows each LUT to be programmed with one byte as simple 2-input or 3-input logic, such as NOT, AND, OR, XOR, etc. Each LUT output can optionally be piped through a Filter/Sync function, an Edge Detector, and a Sequencer (always from the lower numbered LUT in the pair). It is also possible to mask-out LUT inputs.

In the source code that accompanies the video [Grug] includes a demonstration of a three input AND gate, an SR Latch using the sequencer, an SR Latch using feedback, and a filter/sync and edge detection circuit. The Arduino library [Grug] uses is Logic.h from megaTinyCore.

We have covered CIP and CCL technology here on Hackaday before, such as back when we showed you how to use an AVR microcontroller to make a switching regulator.

Read more Summarize
Getting Started with ATtiny Configurable Custom Logic (CCL)

Configurable Custom Logic (CCL) Block Diagram.

In the Microchip tinyAVR 0-series, 1-series, and 2-series we see Configurable Custom Logic (CCL) among the Core Independent Peripherals (CIP) available on the chip. In this YouTube video [Grug Huhler] shows us how to make your own digital logic in hardware using the ATtiny CCL peripheral.

If you have spare pins on your tinyAVR micro you can use them with the CCL for “glue logic” and save on your bill of materials (BOM) cost. The CCL can do simple to moderately complex logic, and it does it without the need for support from the processor core, which is why it’s called a core independent peripheral. A good place to learn about the CCL capabilities in these tinyAVR series is Microchip Technical Brief TB3218: Getting Started with Configurable Custom Logic (CCL) or if you need more information see a datasheet, such as the ATtiny3226 datasheet mentioned in the video.

A tinyAVR micro will have one or two CCL peripherals depending on the series. The heart of the CCL hardware are two Lookup Tables (LUTs). Each LUT can map any three binary inputs into one binary output. This allows each LUT to be programmed with one byte as simple 2-input or 3-input logic, such as NOT, AND, OR, XOR, etc. Each LUT output can optionally be piped through a Filter/Sync function, an Edge Detector, and a Sequencer (always from the lower numbered LUT in the pair). It is also possible to mask-out LUT inputs.

In the source code that accompanies the video [Grug] includes a demonstration of a three input AND gate, an SR Latch using the sequencer, an SR Latch using feedback, and a filter/sync and edge detection circuit. The Arduino library [Grug] uses is Logic.h from megaTinyCore.

We have covered CIP and CCL technology here on Hackaday before, such as back when we showed you how to use an AVR microcontroller to make a switching regulator.

Read more Summarize
Speedrunning and Modding the Incredibles: Rise of the Underminer
Read more Summarize
GNOME's Blueprint Markup Language Making Progress For GTK4 UIs

Blueprint is a currently-experimental markup language and compiler for crafting GTK4 user interfaces. Blueprint allows declaratively creating GTK UIs and aims to be a very easy and nice developer experience...

Read more Summarize
NVIDIA Encouraging CUDA Users To Upgrade From Maxwell / Pascal / Volta

NVIDIA CUDA 12.9 is now available as the newest minor feature update to NVIDIA's GPU compute stack. CUDA 12.9 adds compiler targetr support for SM 10.3 and 12.1, compiler support for "family-specific architectures", new NVML counters being exposed, and other minor feature improvements. The NVIDIA CUDA 12.9 documentation is also now more verbose in encouraging anyone still relying on Maxwell, Pascal, and Volta hardware to upgrade...

Read more Summarize
FreeBSD 14.3 Beta Released Ahead Of FreeBSD 15.0 Later This Year

The first beta release of FreeBSD 14.3 was released on Friday night for testing. FreeBSD 14.3 will become the newest stable release this summer while later in 2025 we can look forward to the big FreeBSD 15.0 release...

Read more Summarize
Man Pleads Guilty To Stealing 1.1 Terabytes of Disney's Slack Data

A 25-year-old from Santa Clarita has pleaded guilty to hacking a Disney employee's computer using malware disguised as an AI art tool, stealing over 1 terabyte of confidential Disney data and threatening to leak it under the guise of a fake Russian hacktivist group. Variety reports: Santa Clarita resident Ryan Mitchell Kramer, 25, pleaded guilty to two felony charges, including one count of accessing a computer and obtaining information and one count of threatening to damage a protected computer. Each charge carries a maximum sentence of five years in federal prison. According to the plea agreement, in early 2024 Kramer posted a computer program on various online platforms that appeared to be used to create AI-generated art, when it really contained a malicious file to gain access to victims' computers. Between April and May 2024, a Disney employee downloaded the program, and Kramer gained access to the victim's personal and work accounts, including a non-public Disney Slack channel. Kramer dowloaded approximately 1.1 terabytes of confidential data from thousands of Disney Slack channels. In July, Kramer contacted the victim by pretending to be a member of a fake Russian hacktivist group called "Nullbulge" and threatened to leak their personal information and Disney Slack data. On July 12, Kramer publicly released the data, including the victim's bank, medical, and personal information on multiple online platforms.

Read more of this story at Slashdot.

Read more Summarize
KDE Plasma 6.4 Tackles An 18 Year Old Feature Request, More Wayland Protocols Added

The KDE Plasma developer sprint in Graz wrapped up just days ago but there's still been no shortage of new feature work landing into Plasma 6.4 this week. It was another exciting week of feature development as the soft feature freeze approaches for Plasma 6.4...

Read more Summarize
We know a little more about Amazon's super-secret satellites
Read more Summarize

We would like to send you notifications.

Accept