Artemis II will use laser beams to live-stream 4K moon footage at 260 Mbps

artemis-ii-will-use-laser-beams-to-live-stream-4k-moon-footage-at-260-mbps

NASA’s Artemis II mission blasted off on Wednesday. Now brace yourselves for exciting high-resolution 4K footage live-streamed from the surface of the moon thanks to NASA’s laser-based O2O system. The cutting-edge Orion Artemis II Optical Communications system (O2O) will be used to beam 4K moon footage at up to 260 Mbps. We should also be […]

Delve allegedly forked an open-source tool and sold it as its own

delve-allegedly-forked-an-open-source-tool-and-sold-it-as-its-own

The controversy surrounding compliance startup Delve has gone from bad to worse this week. Among the fresh allegations from the anonymous whistleblower known as DeepDelver is the claim that Delve allegedly took an open source tool and passed it off as its own work without proper license attribution to or monetary agreement with the original […]

LinkedIn Is Illegally Searching Your Computer

Microsoft is running one of the largest corporate espionage operations in modern history. Every time any of LinkedIn’s one billion users visits linkedin.com, hidden code searches their computer for installed software, collects the results, and transmits them to LinkedIn’s servers and to third-party companies including an American-Israeli cybersecurity firm. The user is never asked. Never […]

Inside Nepal’s Fake Rescue Racket

inside-nepal’s-fake-rescue-racket

In Nepal, helicopter rescue on high altitude is, by any measure, a genuine lifesaving operation. At high altitude, where oxygen thins and weather changes without warning, the ability to airlift a stricken trekker to Kathmandu within hours has saved countless lives. But threaded through that legitimate system, exploiting its urgency, its opacity, and its distance […]

Lemonade by AMD: a fast and open source local LLM server using GPU and NPU

lemonade-by-amd:-a-fast-and-open-source-local-llm-server-using-gpu-and-npu

Open source. Private. Ready in minutes on any PC. Chat What can I do with 128 GB of unified RAM? Load up models like gpt-oss-120b or Qwen-Coder-Next for advanced tool use. What should I tune first? You can use –no-mmap to speed up load times and increase context size to 64 or more. Image Generation […]

Enabling Codex to Analyze Two Decades of Hacker News Data

The entirety of Hacker News, stored in parquet files, is approximately 10GB in size. I was interested in analyzing the dataset and, in the fashion of the contemporary zeitgeist, in doing so with Codex. With Modolap, Codex can analyze it well. After simply adding the skill with npx, the first topic of interest was mention […]

Significant Raise of Reports

significant-raise-of-reports

Posted Mar 31, 2026 17:11 UTC (Tue) by wtarreau (subscriber, #51152) Parent article: Vulnerability Research Is Cooked (sockpuppet.org) On the kernel security list we’ve seen a huge bump of reports. We were between 2 and 3 per week maybe two years ago, then reached probably 10 a week over the last year with the only […]

IBM Announces Strategic Collaboration with Arm

ibm-announces-strategic-collaboration-with-arm

Collaboration aims to advance new technologies that expand infrastructure choice while preserving mission-critical environments Apr 2, 2026 ARMONK, N.Y., April 2, 2026 /PRNewswire/ — IBM (NYSE: IBM) today announced a strategic collaboration with Arm to develop new dual‑architecture hardware that helps enterprises run future AI and data intensive workloads with greater flexibility, reliability, and security. […]

Subscription bombing and how to mitigate it

subscription-bombing-and-how-to-mitigate-it

A couple of weeks ago, we noticed something odd on Suga. New users were signing up but not doing anything, they weren’t creating an org, a project, or a deployment, they just left an account sitting there. Most new users interact with the product pretty quickly, and we report on activity stats to try and […]

Email obfuscation: What works in 2026?

email-obfuscation:-what-works-in-2026?

Last updated: January 30, 2026 Here are some of the best techniques for keeping email addresses hidden from spammers—along with the statistics on how likely they are to be broken. 1 Plain text These techniques protect an email address written out in plain text (e.g. “[email protected]”). Ideally, you should be using multiple techniques in combination, […]