Internet Discoveries between 6 October and 13 October

  • Apple II Source Listings
  • sq
  • What does chezmoi do?
  • Stengo/DeskPad
  • mise
  • Wrapping up another Birthday Week celebration
  • Show HN: A real time AI video agent with under 1 second of latency
  • Google’s AI podcast hosts have existential crisis when they find out they’re not real
  • Tip: You Can Change Pixel Buds Settings on Windows, Mac
  • When Earth Had Rings
  • Wi-Fi Goes Long Range on New WiLo Standard
  • Duake lets you play Quake as the Doomguy
  • What was the song of the summer? Nobody knows
  • The Ultimate Guide to Error Handling in Python
  • Switching customers from Linux to BSD because boring is good
  • The Disappearance of an Internet Domain
  • The Australian government has introduced new cyber security laws. Here’s what you need to know
  • Google facing US government attempt to break it up, court filing shows
  • How open source SIEM and XDR tackle evolving threats
  • Palo Alto Networks warns of firewall hijack bugs with public exploit
  • The Internet Archive is under attack, with a popup claiming a ‘catastrophic’ breach
  • Internet Archive hacked, data breach impacts 31 million users
  • David McCormack on Custard’s new album – and living in Bluey’s shadow
  • Apple macOS 15 Sequoia is officially UNIX. If anyone cares…
  • We built the best “Bad Apple!!” in Minecraft
  • Android 15 will empower Google Contacts to manage encryption keys to ensure private, secure messaging
  • What goes into making an OS to be Unix compliant certified? - Quora

Interesting details

Apple II Source Listings - Source code for some classic titles, published by the original authors. (All links go to external sites.) Some non-SourceGen disassemblies.

sq - For help, sq help is your starting point. And then see the docs. sq is pronounced like seek. Its query language, SLQ, is pronounced like sleek.

What does chezmoi do? - chezmoi is helpful if you have spent time customizing the tools you use (e.g. shells, editors, and version control systems) and want to keep machines running different accounts (e.g. home and work) and/or different operating systems (e.g.

Stengo/DeskPad - Certain workflows require sharing the entire screen (usually due to switching through multiple applications), but if the presenter has a much larger display than the audience it can be hard to see what is happening.

mise - The front-end to your dev env. (formerly called “rtx”) mise is a polyglot tool version manager. It replaces tools like asdf, nvm, pyenv, rbenv, etc.

Wrapping up another Birthday Week celebration - 2024 marks Cloudflare’s 14th birthday. Birthday Week each year is packed with major announcements and the release of innovative new offerings, all focused on giving back to our customers and the broader Internet community.

Show HN: A real time AI video agent with under 1 second of latency - We’re sharing some of the challenges we faced building an AI video interface that has realistic conversations with a human, including getting it to under 1 second of latency. We built this because until now, we’ve had to adapt communication to the limits of technology.

Google’s AI podcast hosts have existential crisis when they find out they’re not real - Google’s NotebookLM certainly took the world by storm when it was released because of its ability to create a realistic AI-generated podcast show out of any article or video you fed into it.

Tip: You Can Change Pixel Buds Settings on Windows, Mac - Owning a pair of high-end earbuds in today’s world means you likely connect them to your phone and computer either simultaneously or with quick switching as you need it.

When Earth Had Rings - Planetary rings may be one of space’s many spectacles, but in our solar system, they’re a dime a dozen. While Saturn’s rings are the brightest and most extensive, Jupiter and Uranus and Neptune have them, too, likely the dwindling remains of shredded asteroids or comets.

-

Wi-Fi Goes Long Range on New WiLo Standard - This article is part of our exclusive IEEE Journal Watch series in partnership with IEEE Xplore. Researchers have developed a hybrid technology that would combine Wi-Fi with the Long Range (LoRa) networking protocol, yielding a new long-distance wireless concept called WiLo.

Duake lets you play Quake as the Doomguy - “Run through the Quake campaign as Doomguy,” reads the Duake description. “Simple as that!” Well there’s a little more to it, but sometimes a mod just speaks for itself. In fact, given the long history of mods for both games, I’m surprised this wasn’t made sooner.

What was the song of the summer? Nobody knows - One of the most pressing questions in the world of pop culture right now is: how exactly do we measure popularity? We’ve never had more metrics at our disposal to find an answer, yet it’s harder than ever to actually do so. Nowhere is this more apparent than the world of music.

The Ultimate Guide to Error Handling in Python - I often come across developers who know the mechanics of Python error handling well, yet when I review their code I find it to be far from good.

Switching customers from Linux to BSD because boring is good - EuroBSDcon 2024 One of Stefano Marinelli’s NetBSD boxes sat quietly serving for a decade, because everyone forgot about it. This is how Unix is meant to be. After this year’s Open Source Summit in Vienna, the Reg FOSS desk travelled to Dublin for the 2024 EuroBSDCon.

The Disappearance of an Internet Domain - Today we have something a little different from Gareth Edwards, who typically chronicles the forgotten history of Silicon Valley in his column, The Crazy Ones.

The Australian government has introduced new cyber security laws. Here’s what you need to know - The Albanese government today introduced long-awaited legislation to parliament which is set to revolutionise Australia’s cyber security preparedness. The legislation, if passed, will be Australia’s first standalone cyber security act.

Google facing US government attempt to break it up, court filing shows - The US government may ask a judge to force the breakup of Google’s business as it attempts to challenge the tech corporation’s monopoly over the internet search market.

How open source SIEM and XDR tackle evolving threats - In today’s cybersecurity landscape, evolving threats require security solutions that match the sophistication of modern threats. As businesses rapidly adopt emerging technologies, their exposure to cyberattacks increases.

Palo Alto Networks warns of firewall hijack bugs with public exploit - Palo Alto Networks warned customers today to patch security vulnerabilities (with public exploit code) that can be chained to let attackers hijack PAN-OS firewalls.

The Internet Archive is under attack, with a popup claiming a ‘catastrophic’ breach - When visiting The Internet Archive today, The Verge was greeted by a pop-up message claiming the site has been hacked. After closing the message, the site loaded normally, albeit slowly.

Internet Archive hacked, data breach impacts 31 million users - Internet Archive’s “The Wayback Machine” has suffered a data breach after a threat actor compromised the website and stole a user authentication database containing 31 million unique records. News of the breach began circulating Wednesday afternoon after visitors to archive.

David McCormack on Custard’s new album – and living in Bluey’s shadow - A more precious rock star than David McCormack might bridle in indignation when an interview segues away from the music. For more than three decades, McCormack has led the Australian band Custard, who today release their ninth studio album: a 21-song epic called Suburban Curtains.

Apple macOS 15 Sequoia is officially UNIX. If anyone cares… - Explainer Apple’s latest OS release is the newest member of the Open Group list of officially verified UNIX variants – by quite some margin. Apple macOS 15 Sequoia appeared in mid-September and is an official, compliant version of UNIX™, but that may not mean exactly what you think.

We built the best “Bad Apple!!” in Minecraft - Demoscene is the art of pushing computers to perform tasks weren’t designed to handle. One recurring theme in demoscene is the shadow-art animation “Bad Apple!!”.

Android 15 will empower Google Contacts to manage encryption keys to ensure private, secure messaging - Key Takeaways Google Contacts, with Play Services help, will manage public keys for easier identity-verified communication. App-agnostic key verification will allow for easier confirmation of message privacy. Preliminary code indicates a barebones feature set that could expand in the future.

What goes into making an OS to be Unix compliant certified? - Quora -

All this was saved to my GetPocket over the week