Wine Developers Concerned with Ubuntu Dropping 32-Bit Support

Wine Developers Concerned with Ubuntu Dropping 32-Bit Support

The news that Ubuntu will drop support for the 32-bit x86 architecture was discussed recently by the Wine developers, on the Wine-devel mailing list. It’s also worth noting that Jens Reyer, the Debian Wine maintainer (Ubuntu gets its Wine package from Debian) has said that Debian has no plans to retire the 32-bit x86 architecture for now, adding that ”
I don’t see us (Debian maintainers) changing anything in or for Ubuntu about i386″. The discussion about Ubuntu dropping the 32-bit x86 architecture and the plans for Wine regarding this can be found on the wine-devel mailing list (Click “Next message” to read the replies to the initial message).

Source: www.linuxuprising.com

Why brilliant people lose their touch

Why brilliant people lose their touch

It hasn’t been a great couple of years for Neil Woodford — and it has been just as miserable for the people who have entrusted money to his investment funds. Mr Blastland’s opening example is the marmorkrebs, a kind of crayfish that reproduces parthenogenetically — that is, marmorkrebs lay eggs without mating and those eggs develop into clones of their mothers. Few people make the cover of Sports Illustrated after a run of mediocre luck.

Source: timharford.com

An Asteroid Could Destroy the World Before Impact

An Asteroid Could Destroy the World Before Impact

NASA, Department of Defense (DOD), State Department, the European Space Agency, the newly formed International Asteroid Warning Network (IAWN), and the international Space Missions Planning Advisory Group (SMPAG)—they all trade information on the asteroid deflection capabilities and methods of various nations. For months the planners at NASA and DoD and other agencies have been arguing over whether to use a nuclear warhead or kinetic impactors to deflect the asteroid. At that point in its orbit the asteroid is not visible from Earth, and again, there wasn’t time to send up an observation space vehicle to monitor the effect of the kinetic impacts.

Source: lithub.com

Show HN: Timeline of Slack’s Tech Stack Evolution

Show HN: Timeline of Slack’s Tech Stack Evolution

This story-line ponders upon their tech decisions that changed over the years in the journey to IPO. Entrepreneurs, developers, strategists, growth hackers, and all startup enthusiasts can take a leaf out of Slack’s interesting book of tech stack decisions. StackShare illuminates the ethos and thoughts behind these Stack Decisions with interesting information stretching from Slack’s origin to the present.

Source: stackshare.io

Show HN: I wrote a maze traversal program in Clojure

Show HN: I wrote a maze traversal program in Clojure

Checks the maze matrix and gets the vector which contains the start position marker(*). ; We can go right if our position does not exceed the boundaries of the maze AND we cannot step on an “x”. ; We can go down if our floor does not exceed the boundaries of the maze AND we cannot step on an “x”.

Source: github.com

SSH gets protection against side-channel attacks

SSH gets protection against side-channel attacks

Add protection for private keys at rest in RAM against speculation and memory sidechannel attacks like Spectre, Meltdown, Rowhammer and Rambleed. This change encrypts private keys when they are not in use with a symmetic key that is derived from a relatively large “prekey” consisting of random data (currently 16KB). Attackers must recover the entire prekey with high accuracy before they can attempt to decrypt the shielded private key, but the current generation of attacks have bit error rates that, when applied cumulatively to the entire prekey, make this keys are encrypted “shielded” when loaded and then automatically and transparently unshielded when used for signatures or when being saved/serialised.

Source: www.undeadly.org

A New Bytecode Format for JavaScriptCore

A New Bytecode Format for JavaScriptCore

In the old format, instructions could be in one of two forms: unlinked, which is compact and optimized for storage and linked, which is inflated and optimized for execution, containing memory addresses of runtime objects directly in the instruction stream. The opcode was replaced by the actual pointer to the implementation of the instruction and the profiling-related metadata replaced with the memory address of the newly allocated profiling data structures. The linked bytecode had the actual pointer to the offlineasm implementation of the instruction in place of the opcode, which made executing the next instruction as simple as advancing the program counter (PC) by the size of the current instruction and making an indirect jump.

Source: webkit.org

Ask HN: How to handle code reviews with a visually impaired coworker?

Ask HN: How to handle code reviews with a visually impaired coworker?

My dev team has switched to a workflow using merge requests and code reviews (mostly by commenting the merge request). I needed to embed a visually impaired co-worker in my team but I face some difficulties:

– Gitlab accessibility seems to be really bad and my co-worker is unable to use the interface to create Merge Request (he uses accessibility tools, of course). Furthermore, it’s very difficult for my co-worker to handle all the remarks in one session for any Merge Request with a significant amount of code.

Source: news.ycombinator.com

An entrepreneur wants to track the residents of a high-crime American community

An entrepreneur wants to track the residents of a high-crime American community

McNutt, who runs Persistent Surveillance Systems, was inspired by his stint in the Air Force tracking Iraqi insurgents. And now a billionaire donor wants to help Persistent Surveillance Systems to monitor the residents of an entire high-crime municipality for an extended period of time––McNutt told KMOX that it may be Baltimore, St. Louis, or Chicago. McNutt’s technology is straightforward: A fixed-wing plane outfitted with high-resolution video cameras circles for hours on end, recording everything in large swaths of a city.

Source: www.theatlantic.com