10 interesting stories served every morning and every evening.
Tell me more about Bun
Bun is a modern JavaScript runtime like Node or Deno. It was built from scratch to focus on three main things:
Start fast (it has the edge in mind).New levels of performance (extending JavaScriptCore, the engine).
Bun is designed as a drop-in replacement for your current JavaScript & TypeScript apps or scripts — on your local computer, server or on the edge. Bun natively implements hundreds of Node.js and Web APIs, including ~90% of Node-API functions (native modules), fs, path, Buffer and more.
The goal of Bun is to run most of the worlds JavaScript outside of browsers, bringing performance and complexity enhancements to your future infrastructure, as well as developer productivity through better, simpler tooling.
Web APIs like fetch, WebSocket, and ReadableStream are builtin bun implements Node.js’ module resolution algorithm, so you can use npm packages in bun.js. ESM and CommonJS are supported, but Bun internally uses ESM. In bun.js, every file is transpiled. & just work. bun’s JSX & TypeScript transpiler is available as an API in Bun.jsuse the fastest system calls available with to write, copy, pipe, send and clone files.bun.js automatically loads environment variables from files. No more require(“dotenv”).load()Node-API bun.js implements most ofNode-API (N-API). Many Node.js native modules just work. bun.js natively supports a growing list of Node.js core modules along with globals like Buffer and process.
Bun.js uses the JavaScriptCore engine, which tends to start and perform a little faster than more traditional choices like V8. Bun is written in , a low-level programming language with manual memory management.
Most of Bun is written from scratch including the JSX/TypeScript transpiler, npm client, bundler, SQLite client, HTTP client, WebSocket client and more.
An enourmous amount of time spent profiling, benchmarking and optimizing things. The answer is different for every part of Bun, but one general theme: ’s low-level control over memory and lack of hidden control flow makes it much simpler to write fast software. Sponsor the Zig Software Foundation
To install bun, run this install script in your terminal. It downloads Bun from GitHub.
Bun’s HTTP server is built on web standards like Request and Response
Then open http://localhost:3000 in your browser
See more examples and check out the docs. If you have any questions or want help, join Bun’s Discord
The same command for running JavaScript & TypeScript files with bun’s JavaScript runtime also runs package.json “scripts”.
bun install is an npm-compatible package manager. You probably will be surprised by how much faster copying files can get.
What is the license?
MIT License, excluding dependencies which have various licenses.
How do I see the source code?
...
The collaboration has observed a new kind of “pentaquark” and the first-ever pair of “tetraquarks”
The collaboration has observed a new kind of “pentaquark” and the first-ever pair of “tetraquarks”
The international LHCb collaboration at the Large Hadron Collider (LHC) has observed three never-before-seen particles: a new kind of “pentaquark” and the first-ever pair of “tetraquarks”, which includes a new type of tetraquark. The findings, presented today at a CERN seminar, add three new exotic members to the growing list of new hadrons found at the LHC. They will help physicists better understand how quarks bind together into these composite particles.
Quarks are elementary particles and come in six flavours: up, down, charm, strange, top and bottom. They usually combine together in groups of twos and threes to form hadrons such as the protons and neutrons that make up atomic nuclei. More rarely, however, they can also combine into four-quark and five-quark particles, or “tetraquarks” and “pentaquarks”. These exotic hadrons were predicted by theorists at the same time as conventional hadrons, about six decades ago, but only relatively recently, in the past 20 years, have they been observed by LHCb and other experiments.
Most of the exotic hadrons discovered in the past two decades are tetraquarks or pentaquarks containing a charm quark and a charm antiquark, with the remaining two or three quarks being an up, down or strange quark or their antiquarks. But in the past two years, LHCb has discovered different kinds of exotic hadrons. Two years ago, the collaboration discovered a tetraquark made up of two charm quarks and two charm antiquarks, and two “open-charm” tetraquarks consisting of a charm antiquark, an up quark, a down quark and a strange antiquark. And last year it found the first-ever instance of a “double open-charm” tetraquark with two charm quarks and an up and a down antiquark. Open charm means that the particle contains a charm quark without an equivalent antiquark.
The discoveries announced today by the LHCb collaboration include new kinds of exotic hadrons. The first kind, observed in an analysis of “decays” of negatively charged B mesons, is a pentaquark made up of a charm quark and a charm antiquark and an up, a down and a strange quark. It is the first pentaquark found to contain a strange quark. The finding has a whopping statistical significance of 15 standard deviations, far beyond the 5 standard deviations that are required to claim the observation of a particle in particle physics.
The second kind is a doubly electrically charged tetraquark. It is an open-charm tetraquark composed of a charm quark, a strange antiquark, and an up quark and a down antiquark, and it was spotted together with its neutral counterpart in a joint analysis of decays of positively charged and neutral B mesons. The new tetraquarks, observed with a statistical significance of 6.5 (doubly charged particle) and 8 (neutral particle) standard deviations, represent the first time a pair of tetraquarks has been observed.
“The more analyses we perform, the more kinds of exotic hadrons we find,” says LHCb physics coordinator Niels Tuning. “We’re witnessing a period of discovery similar to the 1950s, when a ‘particle zoo’ of hadrons started being discovered and ultimately led to the quark model of conventional hadrons in the 1960s. We’re creating ‘particle zoo 2.0’.”
“Finding new kinds of tetraquarks and pentaquarks and measuring their properties will help theorists develop a unified model of exotic hadrons, the exact nature of which is largely unknown,” says LHCb spokesperson Chris Parkes. “It will also help to better understand conventional hadrons.”
While some theoretical models describe exotic hadrons as single units of tightly bound quarks, other models envisage them as pairs of standard hadrons loosely bound in a molecule-like structure. Only time and more studies of exotic hadrons will tell if these particles are one, the other or both.
Read more on the LHCb website.
...
Read the original on home.cern »
European Union lawmakers have approved landmark legislation to heavily regulate Apple, Google, Meta, and other big tech firms.
The Digital Markets Act (DMA) and Digital Services Act (DSA) were proposed by the European Commission in December 2020. Now, collected in a “Digital Services Package,” the legislation has been formally adopted by the European Parliament and seeks to address “gatekeeper” big tech companies.
Apple is almost certain to be classified as a “gatekeeper” due to the size of its annual turnover in the EU, its ownership and operation of platforms with a large number of active users, and its “entrenched and durable position” due to how long it has met these criteria, and will therefore be subject to the rules set out in the DMA. Under the DMA, gatekeepers will have to:
* Allow users to install apps from third-party app stores and sideload directly from the internet.
* Allow developers to offer third-party payment systems in apps and promote offers outside the gatekeeper’s platforms.
* Allow developers to integrate their apps and digital services directly with those belonging to a gatekeeper. This includes making messaging, voice-calling, and video-calling services interoperable with third-party services upon request.
* Give developers access to any hardware feature, such as “near-field communication technology, secure elements and processors, authentication mechanisms, and the software used to control those technologies.”
* Ensure that all apps are uninstallable and give users the ability to unsubscribe from core platform services under similar conditions to subscription.
* Give users the option to change the default voice assistant to a third-party option.
* Share data and metrics with developers and competitors, including marketing and advertising performance data.
* Set up an independent “compliance function” group to monitor its compliance with EU legislation with an independent senior manager and sufficient authority, resources, and access to management.
* Inform the European Commission of their mergers and acquisitions.
The DMA also seeks to ensure that gatekeepers can no longer:
* Pre-install certain software applications and require users to use any important default software services such as web browsers.
* Require app developers to use certain services or frameworks, including browser engines, payment systems, and identity providers, to be listed in app stores.
* Give their own their own products, apps, or services preferential treatment or rank them higher than those of others.
* Reuse private data collected during a service for the purposes of another service.
The Digital Services Act (DSA), which requires platforms to do more to police the internet for illegal content, has also been approved by the European Parliament.
The DMA says that gatekeepers who ignore the rules will face fines of up to 10 percent of the company’s total worldwide annual turnover, or 20 percent in the event of repeated infringements, as well as periodic penalties of up to 5 percent of the company’s total worldwide annual turnover. Where gatekeepers perpetrate “systematic infringements,” the European Commission will be able to impose additional sanctions, such as obliging a gatekeeper to sell a business or parts of it, including units, assets, intellectual property rights, or brands, or banning a gatekeeper from acquiring any company that provides services in the digital sector.
So far, Apple has heavily resisted attempts by governments to enforce changes to its operating systems and services. For example, Apple simply chose to pay a $5.5 million fine every week for months in the Netherlands instead of obey orders from the Authority for Consumers and Markets (ACM) to allow third-party payment systems in Dutch dating apps.
EU antitrust chief Margrethe Vestager has set up a DMA taskforce, with about 80 officials expected to join, but some lawmakers have called for an even bigger taskforce to counter the power of big tech companies. The Digital Services Package now simply needs to be adopted by the European Council before coming into force in the fall.
Beyond the European Union, Apple’s ecosystem is increasingly coming under intense scrutiny by governments around the world, including in the United States, the United Kingdom, Japan, South Korea, and more, with a clear appetite from global regulators to explore requirements around app sideloading and interoperability. Further cooperation is expected between governments around the world on the issue and experts are anticipating a “brutal battle” between Apple and global regulators.
Note: Due to the political or social nature of the discussion regarding this topic, the discussion thread is located in our Political News forum. All forum members and site visitors are welcome to read and follow the thread, but posting is limited to forum members with at least 100 posts.
...
Read the original on www.macrumors.com »
On iPhone and iPad this experience only works in the Safari browser.
Apple doesn’t allow other browsers to access the camera.
Access to your camera is necessary, but no personal data is collected.
On iPhone and iPad this experience only works in the Safari browser.
Apple doesn’t allow other browsers to access the camera.
Access to your camera is necessary, but no personal data is collected.
Wow, you deciced to read the terms and conditions first. You rock!!
This is an art project by Tijmen Schep that shows how face detection algoritms are increasingly used to judge you. It was made as part of the European Union’s Sherpa research program.
No personal data is sent to our server in any way. Nothing. Zilch. Nada. All the face detection algorithms will run on your own computer, in the browser.
In this ‘test’ your face is compared with that of all the other people who came before you. At the end of the show you can, if you want to, share some anonimized data. That will then be used to re-calculate the new average. That anonymous data is not shared any further.
You can also read more about the sources and source code that this project is based on, or read the press release.
...
Read the original on www.hownormalami.eu »
A threat actor has taken to a forum for news and discussion of data breaches with an offer to sell what they assert is a database containing records of over a billion Chinese civilians — allegedly stolen from the Shanghai Police.
Over the weekend, reports started to surface of a post to a forum at Breached.to. The post makes the following claim:
HackerDan offered to sell the lot for 10 Bitcoin — about $200,000. We’ve saved HackerDan’s post as a PDF in case it vanishes.
HackerDan released sample datasets: one containing delivery addresses and often instructions for drivers; another with police records; and the last with personal identification information like name, national ID number address, height, and gender.
China has a national police force, and that presumably has a Shanghai office. But an entity called the “Shanghai National Police” is hard to find.
Media outlets were nonetheless able to verify that the contents of the sample - whatever the source - describe actual people.
Gigantic civilian data leak if confirmed: A hacker is selling an alleged Shanghai police data leak containing 1 billion Chinese nationals’ names, home addresses, ID #, phone #, criminal records, etc. Hacker says it’s from an Aliyun (Alibaba) private cloud server. pic.twitter.com/IRPG35SWYI
— Zeyi Yang (@ZeyiYang) July 3, 2022
“Five people confirmed all of the data, including case details that would be difficult to obtain from any source other than the police. Four more people confirmed basic information such as their names before hanging up,” reported the Wall Street Journal.
The WSJ’s reporter Karen Hao described the experience on Twitter:
I was truly stunned when the first person picked up—I really believed the whole thing to be fake. By the third, I was shaking—both from the nerves of trying to explain why I had their extremely private information and the weight of realizing what this leak could mean for so many.
— Karen Hao 郝珂灵 (@_KarenHao) July 4, 2022
While the Shanghai government and police department have largely been silent over the leak, social media platforms Weibo and WeChat were not — at least until Sunday afternoon when users on Weibo began experiencing data leak-related blocked hashtags.
On Monday, an unusual voice joined in the analysis of the event: Changpeng Zhao, the CEO of cryptocurrency exchange Binance.
“CZ” — as he’s known — took to Twitter with the following:
Our threat intelligence detected 1 billion resident records for sell in the dark web, including name, address, national id, mobile, police and medical records from one asian country. Likely due to a bug in an Elastic Search deployment by a gov agency. This has impact on …
— CZ 🔶 Binance (@cz_binance) July 3, 2022
CZ’s post came four days after HackerDan’s so, while some facts matched, it was unclear if the CEO was referring to a different event.
He later tweeted again, this time alleging “this exploit happened because the gov developer wrote a tech blog on CSDN and accidentally included the credentials.”
Whatever the source of the leak, it will mightily annoy China. The nation’s government has recently prioritized personal data protection and critical infrastructure security. If the People’s Police have mucked up on both counts, that will not go down well. ®
...
Read the original on www.theregister.com »
Huh discovered that this kind of mathematics could give him what poetry could not: the ability to search for beauty outside himself, to try to grasp something external, objective and true, in a way that opened him up more than writing ever had. “You don’t think about your small self,” he said. “There’s no place for ego.” He found that unlike when he was a poet, he was never motivated by the desire for recognition. He just wanted to do math.
Hironaka, perhaps recognizing this, took him under his wing. After Huh graduated and started a master’s program at Seoul National University — where he also met Nayoung Kim, now his wife — he spent a lot of time with Hironaka. During breaks, he followed the professor back to Japan, staying with him in Tokyo and Kyoto, carrying his bags, sharing meals, and of course continuing to discuss math.
Huh applied to about a dozen doctoral programs in the U. S. But because of his undistinguished undergraduate experience, he was rejected by all of them save one. In 2009, he began his studies at the University of Illinois, Urbana-Champaign, before transferring to the University of Michigan in 2011 to complete his doctorate.
Despite the challenges — living in a new country, spending time apart from Kim (she stayed at Seoul National University for her doctorate in mathematics) — Huh cherished his experiences in graduate school. He was able to dedicate himself wholly to math, and he relished the freedom of exploration that had drawn him to the subject in the first place.
He immediately stood out. As a beginning graduate student in Illinois, he proved a conjecture in graph theory that had been open for 40 years. In its simplest form, the problem, known as Read’s conjecture, concerned polynomials — equations like n4 + 5n3 + 6n2 + 3n + 1 — attached to graphs, which are collections of vertices (points) connected by edges (lines). In particular, let’s say you want to color the vertices of a graph so that no two adjacent vertices have the same color. Given a certain number of colors at your disposal, there are many ways to color the graph. It turns out that the total number of possibilities can be calculated using an equation called the chromatic polynomial (which is written in terms of the number of colors being used).
Mathematicians observed that the coefficients of chromatic polynomials, no matter the graph, always seem to obey certain patterns. First, they are unimodal, meaning they increase and then decrease. Take the previous example of a polynomial. The absolute values of its coefficients — 1, 5, 6, 3, 1 — form a unimodal sequence. Moreover, that sequence is also “log concave.” For any three consecutive numbers in the sequence, the square of the middle number is at least as large as the product of the terms on either side of it. (In the above polynomial, for instance, 62 ≥ 5 × 3.)
Still, mathematicians struggled to prove these properties. And then, seemingly out of nowhere, along came Huh.
As a master’s student, he had studied algebraic geometry and singularity theory with Hironaka. The main objects of study in that field are called algebraic varieties, which can be thought of as shapes defined by certain equations. Intriguingly, associated to certain kinds of algebraic varieties are numbers that are known to be log concave — something Huh only knew because of the serendipitous direction his studies had taken him in. Huh’s key idea was to find a way to construct an algebraic variety such that those associated numbers were precisely the coefficients of the chromatic polynomial of the graph from the original question.
His solution stunned the math community. It was at that point that the University of Michigan, having rejected his initial application, recruited him to their graduate program.
Huh’s achievement was impressive not just because he had solved Read’s conjecture when it had seemed completely intractable for so long. He had shown that something much deeper — and geometric — was lurking beneath combinatorial properties of graphs.
Mathematicians were also impressed by his demeanor. His talks at conferences were always accessible and concrete; in speaking with him, it was clear that he was thinking both deeply and broadly about the concepts he was working with. “He was ridiculously mature for a graduate student,” said Matthew Baker, a mathematician at the Georgia Institute of Technology. After Baker met him for the first time, “I was just like, who is this guy?”
According to Mircea Mustaţă, Huh’s adviser at the University of Michigan, he required almost no supervision or guidance. Unlike most graduate students, he already had a program in mind, and ideas about how to pursue it. “He was more like a colleague,” Mustaţă said. “He already had his own way of looking at things.”
Many of his collaborators note that he’s incredibly humble and down-to-earth. When he learned he’d won the Fields Medal, “it didn’t really feel that good,” Huh said. “Of course you are happy, but deep down, you’re a little bit worried that they might eventually figure out that you’re not actually that good. I am a reasonably good mathematician, but am I Fields Medal-worthy?”
Graphs are actually just one type of object that can define more general structures called matroids. Consider, for example, points on a two-dimensional plane. If more than two points lie on a line in this plane, you can say that those points are “dependent.” Matroids are abstract objects that capture notions like dependence and independence in all sorts of different contexts — from graphs to vector spaces to algebraic fields.
Just as graphs have chromatic polynomials associated with them, there are equations called characteristic polynomials attached to matroids. It was conjectured that the polynomials for these more general objects should also have coefficients that are log concave. But the techniques Huh used to prove Read’s conjecture only worked for showing log concavity for a very narrow class of matroids, such as the matroids that arise from graphs.
With the mathematician Eric Katz, Huh broadened the class of matroids such a proof could apply to. They followed a recipe of sorts. As before, the strategy was to start with the object of interest — here, a matroid — and use it to construct an algebraic variety. From there, they could extract an object called a cohomology ring and use some of its properties to prove log concavity.
There was just one problem. Most matroids don’t have any sort of geometric foundation, which means there’s not actually an algebraic variety to associate to them. Instead, Huh, Katz and the mathematician Karim Adiprasito figured out a way to write down the right cohomology ring straight from the matroid, essentially from scratch. They then showed, using a new set of techniques, that it behaved as if it had come from an actual algebraic variety, even though it hadn’t. In doing so, they proved log concavity for all matroids, resolving the problem known as Rota’s conjecture once and for all. “It’s pretty remarkable that it works,” Baker said.
The work showed that “you don’t need space to do geometry,” Huh said. “That made me really fundamentally rethink what geometry is.” It would also guide him toward a host of other problems, where he continued to push that idea further, allowing him to develop an even broader range of methods.
But for all the specificity the work requires, building the right cohomology ring requires massive amounts of guesswork and groping around in the dark. It was an aspect of the work that Huh particularly enjoyed. “There is no guiding principle … no clearly defined goal,” he said. “You just have to make a guess.”
...
Read the original on www.quantamagazine.org »
Ä1 - All In One Advanced Search
To get the best results, search on a specific site using advanced filters.
...
Read the original on xn--1-zfa.com »
...
Read the original on neal.fun »
Sign up
A statically-typed functional language with generics, typeclasses, sum types, pattern-matching, first-class functions, currying, algebraic effects, associated types, good diagnostics, etc.
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Permalink
Added support for multi-effect handlers (changes still required!)
Added support for multi-effect handlers (changes still required!)
Allow implied members to specify a real member
Allow implied members to specify a real member
Allow implied members to specify a real member
A statically-typed functional language with generics, typeclasses, sum types, pattern-matching, first-class functions, currying, algebraic effects, associated types, good diagnostics, etc.
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.
...
Read the original on github.com »
Amazon has been working on a Lord of the Rings TV show for years, and they seem determined that it eclipse anything ever attempted on TV before. The company spent $250 million on the rights alone, and that’s before an actor was cast or a camera turned on. Now, Deadline confirms that the first season of the show will cost $465 million to produce.
For comparison’s sake, Peter Jackson’s whole Lord of the Rings trilogy cost $281 million to make. For something more recent, Game of Thrones was spending around $100 million per season after it really blew up — this would be around season 6 — and spent far less in its early days.
The $465 million number came out when New Zealand, where the show is shooting, revealed that it would be rebating the production around 25% of its costs, or $116 million. “There is considerable economic and tourism potential in the Lord of the Rings Project,” said Stuart Nash, the country’s Economic and Regional Development Minister. “Not only does it bolster our global reputation as a desirable place to make screen productions, it will further strengthen our tourism appeal to visitors with the ‘Middle-earth’ theme. Under the [memorandum of understanding], the Government’s investment will enable significant economic, cultural and industry development benefits to New Zealand over many years.”
New Zealand already gets tourism dollars thanks to Jackson’s LOTR and Hobbit movies, which were also filmed the country. Clearly they want to keep the association going.
There is no premiere date as of yet for Amazon’s new show. Filming is ongoing after some setbacks due to the pandemic. I’m going to go ahead and guess we’re looking at a 2022 premiere.
As with Peter Jackson and his original trilogy, Amazon is shooting the first two seasons back to back, and will be filled with elaborate sets and expensive costumes. The series is set during the Second Age of Middle-earth, thousands of years before The Hobbit and The Lord of the Rings. As little as we know about it, the enormous has us excited.
But not all is peachy keen in Lord of the Rings land. Amazon recently told Bloomberg that it had cancelled a planned massively multiplayer online game to be set in Middle-earth, saying it was “unable to secure terms” to continue development. Chinese company Leyou was in charge of the project, and the cancellation may have something to do with a contract dispute that arose after Leyou was bought by giant multi-national corporation Tencent.
I guess the $500 million Lord of the Rings TV show will have to be enough.
To stay up to date on everything fantasy, science fiction, and WiC, follow our all-encompassing Facebook page and sign up for our exclusive newsletter.
Get HBO, Starz, Showtime, and MORE for FREE with a no-risk, 7-day free trial of Amazon Channels
...
Read the original on winteriscoming.net »
To add this web app to your iOS home screen tap the share button and select "Add to the Home Screen".
10HN is also available as an iOS App
If you visit 10HN only rarely, check out the the best articles from the past week.
If you like 10HN please leave feedback and share
Visit pancik.com for more.