pluja launches experimental ‘AI-driven’ weekly Monero podcast
pluja1 has announced2 the launch of XMR.FAN 3, an AI-driven experimental weekly podcast that aims to deliver the latest insights and news from the world of Monero and privacy:
I’ve been experimenting with Google’s NotebookLM, voice generation (elevenlabs/piper), and other AI tools (SD, flux…). I discovered that these are really useful to produce very decent weekly news overviews, so I made this websi … ⌘ Read more
Apple’s Next New iPhone to Debut in the Spring: What to Expect
Apple’s budget-friendly iPhone SE is set for a major overhaul with a fourth generation model expected to launch in spring 2025. The upcoming model will mark a significant departure from its predecessors, adopting several features from higher-end iPhones while maintaining its position as the most affordable new model in Apple’s lineup.
According to [ … ⌘ Read more
@prologic@twtxt.net I think printf is a more portable option than echo -e for interpreting \t as tab. E.g. printf ‘%s\t%s\t%s’ “$url” “$time” “$text”. In general I always prefer printf over echo for anything non-trivial in unix shell scripts. See last paragraph of https://en.wikipedia.org/wiki/Echo_(command)#History
Code referencing now generally available in GitHub Copilot and with Microsoft Azure AI
Announcing the general availability of code referencing in GitHub Copilot and Microsoft Azure AI, allowing developers to permit code suggestions containing public code matches while receiving detailed information about the match.
The post [Code referencing now generally available in GitHub Copilot and with Microsoft Azure AI](https://github.blog/ne … ⌘ Read more
@prologic@twtxt.net Regarding the new way of generating twt-hashes, to me it makes more sense to use tabs as separator instead of spaces, since the you can just copy/past a line directly from a twtxt-file that already go a tab between timestamp and message. But tabs might be hard to “type” when you are in a terminal, since it will activate autocomplete…🤔
Another thing, it seems that you sugget we only use the domain in the hash-creation and not the full path to the twtxt.txt
$ echo -e "https://example.com 2024-09-29T13:30:00Z Hello World!" | sha256sum - | awk '{ print $1 }' | base64 | head -c 12
Good writeup, @anth@a.9srv.net! I agree to most of your points.
3.2 Timestamps: I feel no need to mandate UTC. Timezones are fine with me. But I could also live with this new restriction. I fail to see, though, how this change would make things any easier compared to the original format.
3.4 Multi-Line Twts: What exactly do you think are bad things with multi-lines?
4.1 Hash Generation: I do like the idea with with a new uuid metadata field! Any thoughts on two feeds selecting the same UUID for whatever reason? Well, the same could happen today with url.
5.1 Reply to last & 5.2 More work to backtrack: I do not understand anything you’re saying. Can you rephrase that?
8.1 Metadata should be collected up front: I generally agree, but if the uuid metadata field were a feed URL and no real UUID, there should be probably an exception to change the feed URL mid-file after relocation.
Some more arguments for a local-based treading model over a content-based one:
The format:
(#<DATE URL>)or(@<DATE URL>)both makes sense: # as prefix is for a hashtag like we allredy got with the(#twthash)and @ as prefix denotes that this is mention of a specific post in a feed, and not just the feed in general. Using either can make implementation easier, since most clients already got this kind of filtering.Having something like
(#<DATE URL>)will also make mentions via webmetions for twtxt easier to implement, since there is no need for looking up the#twthash. This will also make it possible to make 3th part twt-mentions services.Supporting twt/webmentions will also increase discoverability as a way to know about both replies and feed mentions from feeds that you don’t follow.
@prologic@twtxt.net Thanks for writing that up!
I hope it can remain a living document (or sequence of draft revisions) for a good long time while we figure out how this stuff works in practice.
I am not sure how I feel about all this being done at once, vs. letting conventions arise.
For example, even today I could reply to twt abc1234 with “(#abc1234) Edit: …” and I think all you humans would understand it as an edit to (#abc1234). Maybe eventually it would become a common enough convention that clients would start to support it explicitly.
Similarly we could just start using 11-digit hashes. We should iron out whether it’s sha256 or whatever but there’s no need get all the other stuff right at the same time.
I have similar thoughts about how some users could try out location-based replies in a backward-compatible way (append the replyto: stuff after the legacy (#hash) style).
However I recognize that I’m not the one implementing this stuff, and it’s less work to just have everything determined up front.
Misc comments (I haven’t read the whole thing):
Did you mean to make hashes hexadecimal? You lose 11 bits that way compared to base32. I’d suggest gaining 11 bits with base64 instead.
“Clients MUST preserve the original hash” — do you mean they MUST preserve the original twt?
Thanks for phrasing the bit about deletions so neutrally.
I don’t like the MUST in “Clients MUST follow the chain of reply-to references…”. If someone writes a client as a 40-line shell script that requires the user to piece together the threading themselves, IMO we shouldn’t declare the client non-conforming just because they didn’t get to all the bells and whistles.
Similarly I don’t like the MUST for user agents. For one thing, you might want to fetch a feed without revealing your identty. Also, it raises the bar for a minimal implementation (I’m again thinking again of the 40-line shell script).
For “who follows” lists: why must the long, random tokens be only valid for a limited time? Do you have a scenario in mind where they could leak?
Why can’t feeds be served over HTTP/1.0? Again, thinking about simple software. I recently tried implementing HTTP/1.1 and it wasn’t too bad, but 1.0 would have been slightly simpler.
Why get into the nitty-gritty about caching headers? This seems like generic advice for HTTP servers and clients.
I’m a little sad about other protocols being not recommended.
I don’t know how I feel about including markdown. I don’t mind too much that yarn users emit twts full of markdown, but I’m more of a plain text kind of person. Also it adds to the length. I wonder if putting a separate document would make more sense; that would also help with the length.
Apple Begins Selling Refurbished AirPods Pro 2 With USB-C Case in U.S.
Apple today began selling refurbished second-generation AirPods Pro with a USB-C charging case on its online store in the U.S. for $209, compared to $249 brand new.
Apple updated the AirPods Pro with a USB-C cha … ⌘ Read more
Kuo: iPhone 17 to Use 3nm Chip Tech, Some iPhone 18 Models to Use 2nm
Next year’s iPhone 17 series will feature processors made using TSMC’s 3-nonometer chip technology, but only some iPhone 18 models in 2026 are anticipated to use the Taiwanese chipmaker’s next-generation 2nm processor technology because of cost concerns, according to Apple analyst Ming-Chi Kuo. … ⌘ Read more
There’s a simple reason all the current hashes end in a or q: the hash is 256 bits, the base32 encoding chops that into groups of 5 bits, and 256 isn’t divisible by 5. The last character of the base32 encoding just has that left-over single bit (256 mod 5 = 1).
So I agree with #3 below, but do you have a source for #1, #2 or #4? I would expect any lack of variability in any part of a hash function’s output would make it more vulnerable to attacks, so designers of hash functions would want to make the whole output vary as much as possible.
Other than the divisible-by-5 thing, my current intuition is it doesn’t matter what part you take.
Hash Structure: Hashes are typically designed so that their outputs have specific statistical properties. The first few characters often have more entropy or variability, meaning they are less likely to have patterns. The last characters may not maintain this randomness, especially if the encoding method has a tendency to produce less varied endings.
Collision Resistance: When using hashes, the goal is to minimize the risk of collisions (different inputs producing the same output). By using the first few characters, you leverage the full distribution of the hash. The last characters may not distribute in the same way, potentially increasing the likelihood of collisions.
Encoding Characteristics: Base32 encoding has a specific structure and padding that might influence the last characters more than the first. If the data being hashed is similar, the last characters may be more similar across different hashes.
Use Cases: In many applications (like generating unique identifiers), the beginning of the hash is often the most informative and varied. Relying on the end might reduce the uniqueness of generated identifiers, especially if a prefix has a specific context or meaning.
Taking the last n characters of a base32 encoded hash instead of the first n can be problematic for several reasons:
Hash Structure: Hashes are typically designed so that their outputs have specific statistical properties. The first few characters often have more entropy or variability, meaning they are less likely to have patterns. The last characters may not maintain this randomness, especially if the encoding method has a tendency to produce less varied endings.
Collision Resistance: When using hashes, the goal is to minimize the risk of collisions (different inputs producing the same output). By using the first few characters, you leverage the full distribution of the hash. The last characters may not distribute in the same way, potentially increasing the likelihood of collisions.
Encoding Characteristics: Base32 encoding has a specific structure and padding that might influence the last characters more than the first. If the data being hashed is similar, the last characters may be more similar across different hashes.
Use Cases: In many applications (like generating unique identifiers), the beginning of the hash is often the most informative and varied. Relying on the end might reduce the uniqueness of generated identifiers, especially if a prefix has a specific context or meaning.
In summary, using the first n characters generally preserves the intended randomness and collision resistance of the hash, making it a safer choice in most cases.
AirPods 4 vs. Previous Generations Buyer’s Guide: All Upgrades Compared
Apple’s new AirPods are now available for pre-order. With the release of the AirPods 4 and AirPods 4 with ANC, Apple has made some significant improvements that could make a difference in your daily listening experience.
Key upgrades in the AirPods 4 include a more comfortable fit, improved sou … ⌘ Read more
@aelaraji@aelaraji.com I just added support for passing a custom template file via -T/--template in case you need a custom template 👌
prologic@JamessMacStudio
Wed Sep 18 01:27:29
~/Projects/yarnsocial/twtxt2html
(main) 130
$ ./twtxt2html --help
Usage: twtxt2html [options] FILE|URL
twtxt2html converts a twtxt feed to a static HTML page
-d, --debug enable debug logging
-l, --limit int limit number ot twts (default all) (default -1)
-n, --noreldate do now show twt relative dates
-r, --reverse reverse the order of twts (oldest first)
-T, --template string path to template file
-t, --title string title of generated page (default "Twtxt Feed")
-v, --version display version information
pflag: help requested
Amazon Takes Up to $119 Off iPad Mini and 10th Gen iPad With All-Time Low Prices
Amazon today has a few all-time low prices on the 10th generation iPad and 6th generation iPad mini. Both of these discounts represent all-time low prices on each tablet, and prices start at $299.00 for the 64GB Wi-Fi iPad, down from $349.00.
domain as base for generating the hashed together with the message date and content.
If we omit the protocol prefix from the way we do things now will that not solve most of the problems? In the case of gemini://gemini.ctrl-c.club/~nristen/twtxt.txt they also have a working twtxt.txt at https://ctrl-c.club/~nristen/twtxt.txt … damn I just notice the gemini. subdomain.
Okay what about defining a prefers protocol as part of the hash schema? so 1: https , 2: http 3: gemini 4: gopher ?
AirPods 4 Have Hidden Capacitive Button for Pairing
With the fourth-generation AirPods, Apple has eliminated the Setup Button located on the back of the Charging Case in other AirPods models. Rather than using a physical button, Apple has instead opted for a hidden capacitive button.
The hidden button for pairing and resetting the AirPods 4 is located at the front of the Charging Case, a … ⌘ Read more
Apple Shares Full List of Over 250 New Features and Changes Coming With iOS 18 Next Week
Following its iPhone 16 event on Monday, Apple shared a PDF on its website with a list of all new features and changes coming with iOS 18.
The list includes many features that were already announced, including Apple Intelligence, new … ⌘ Read more
@sorenpeter@darch.dk There was a client that would generate a unique hash for each twt. It didn’t get wide adoption.
@sorenpeter@darch.dk There was a client that would generate a unique hash for each twt. It didn’t get wide adoption.
Mozilla Bets the Future of the Web is A.I. Generated Content
A.I. website builders, A.I. award banquets, A.I. investments. And Firefox pushed aside. ⌘ Read more
@prologic@twtxt.net do that mean that for every new post (not replies) the client will have to generate a UUID or similar when posting and add that to to the twt?
Apple unveils its AI-enabled iPhone 16 with new camera controls, longer battery life
Apple’s new phones are slightly less expensive and more powerful and will arrive in a matter of weeks, though its generative AI features won’t be there at launch. ⌘ Read more
Apple unveils its AI-enabled iPhone 16 with new camera controls, longer battery life
Apple’s new phones are slightly less expensive and more powerful and will arrive in a matter of weeks, though its generative AI features won’t be there at launch. ⌘ Read more
url field in the feed to define the URL for hashing. It should have been the last encountered one. Then, assuming append-style feeds, you could override the old URL with a new one from a certain point on:
how little data is needed for generating the hashes? Instead of the full URL, can we makedo with just the domain (example.net) so we avoid the conflicts with gemini://, https:// and only http:// (like in my own twtxt.txt) or construct something like like a webfinger id nick@domain (also used by mastodon etc.) from the domain and nick if there, else use domain as nick as well
Erlang Solutions: How Generative AI is Transforming Healthcare
Generative AI (Gen AI) has emerged as a transformative technology across the healthcare industry. It has the potential to vastly transform the clinical decision-making process and ultimately improve patient health outcomes.
The adoption of generative AI is now valued at over [$1.6 billion](https://www.gminsights.com/industry-analysis/generative-ai-in-healthcare-market#:~:text=Generative%20Artificial%20Intelligence%20(AI)% … ⌘ Read more
On the Subject of Feed Identities; I propose the following:
- Generate a Private/Public ED25519 key pair
- Use this key pair to sign your Twtxt feed
- Use it as your feed’s identity in place of
# url =as# key = ...
For example:
$ ssh-keygen -f prologic@twtxt.net
$ ssh-keygen -Y sign -n prologic@twtxt.net -f prologic@twtxt.net twtxt.txt
And your feed would looke like:
# nick = prologic
# key = SHA256:23OiSfuPC4zT0lVh1Y+XKh+KjP59brhZfxFHIYZkbZs
# sig = twtxt.txt.sig
# prev = j6bmlgq twtxt.txt/1
# avatar = https://twtxt.net/user/prologic/avatar#gdoicerjkh3nynyxnxawwwkearr4qllkoevtwb3req4hojx5z43q
# description = "Problems are Solved by Method" 🇦🇺👨💻👨🦯🏹♔ 🏓⚯ 👨👩👧👧🛥 -- James Mills (operator of twtxt.net / creator of Yarn.social 🧶)
2024-06-14T18:22:17Z (#nef6byq) @<bender https://twtxt.net/user/bender/twtxt.txt> Hehe thanks! 😅 Still gotta sort out some other bugs, but that's tomorrows job 🤞
...
Twt Hash extension would change of course to use a feed’s ED25519 public key fingerprint.
Google’s folding phone perfects the design Samsung innovated
The Galaxy Z Fold has improved every generation, but Google just leapfrogged it with the Pixel 9 Pro Fold. ⌘ Read more
Scientists Discuss Epigenetics & Generational Trauma ⌘ Read more
Best Apple Deals of the Week: 9th and 10th Gen iPads Get Lowest Prices Ever, Plus First Deals on Anker’s New MagGo Accessories
This week’s best Apple deals focused on iPad models, including the 9th generation and 10th generation tablets, which both hit record low prices in the last few days. You’ll also find steep discounts on Anker’s latest MagSafe-compatible accessories, Sonos headphones and speakers, and Bluetooth trackers in the deals below.
. There’s so little going on in general, it hardly matters. 😅
And I just realized: Mutt’s layout helps a lot. Skimming over new twts is really easy and it’s not a big loss if there are a couple of shitposts™ in my “timeline”. This is very different from Mastodon (both the default web UI and all clients I’ve tried), where the timeline is always huge. Posts take up a lot of space on screen. Makes me think twice if I want to follow someone or not. 😅
(I mostly only follow Hashtags on Mastodon anyway. It’s more interesting that way.)
New Docker Desktop Enterprise Admin Features: MSI Installer and Login Enforcement Alternative
We’re excited to launch the general availability for two significant updates: the Docker Desktop MSI installer and a new sign-in enforcement alternative. These updates aim to streamline administration, improve security, and ensure users can take full advantage of Docker Business subscription features. ⌘ Read more
iPhone SE 4 to Complete Apple’s Switch to OLED Across iPhone Lineup
Apple is expected to launch a fourth-generation iPhone SE early next year with an OLED display for the first time, marking the completion of Apple’s adoption of OLED technology across all iPhone models.
According to Nikkei Asia, the m … ⌘ Read more
A Helping Hand for LLMs (Retrieval Augmented Generation) - Computerphile ⌘ Read more
iPhone 17 Models to Feature 12GB RAM, Up From 8GB in the iPhone 16
Next year’s iPhone 17 models will come with 12GB of RAM, up from the 8GB of RAM expected across Apple’s upcoming iPhone 16 models, a reputable source of accurate predictions about Apple’s plans has claimed.
Onboard memory in the existing iPhone 15 lineup is different between non-Pro and Pro models: The iPhone 1 … ⌘ Read more
iOS 18 is Compatible with These iPhone Models
iOS 18 for iPhone includes a variety of new features that many users are excited about, from all new Dark Mode icons and widgets, to color hued icons/widgets, customizable Control Center, Apple Intelligence AI features that will write emails and texts for you and summarize data or generate images, a confusing Photos redesign, Game Mode … Read More ⌘ Read more
vim cursor at the end of the first line on replies, and forks. I have tried adding to this to jenny's configuration:
@quark@ferengi.one @movq@www.uninformativ.de A general workaround in these cases is to wrap the command in a shell script and reference said script instead.
When to Expect the iPhone SE 4 to Launch
Over two and a half years have passed since Apple released the current iPhone SE, so the device is due for an update. Below, we recap the latest rumors about the next-generation iPhone SE, including potential features and launch timing.
The latest word [comes from Bloomberg’s Mark Gurman](https://www.bloomberg.com/news/newsletters/2024-08-25/apple-plans-tabletop-robot-whi … ⌘ Read more
Apple to Debut iPhone 16, Apple Watch 10, and AirPods 4 on September 10
Apple plans to hold an event to introduce the iPhone 16 models, the next-generation Apple Watch models, and new AirPods on Tuesday, September 10, according to Bloomberg’s Mark Gurman.
 developed by Meta (yes, the same Meta that is Facebook), that is able to process and generate human-like text. It’s quite similar to ChatGPT, but what is unique about Llama is that you can run it locally, directly on your computer. With a little effort, you’ll be … Read More ⌘ Read more
Google’s Pixel 9 Pro approaches AI overload, but it’s still a fantastic phone
As well as providing brilliant hardware, the best version of Android and fantastic cameras, the latest Pixel introduces a raft of generative AI. ⌘ Read more
Survey: The AI wave continues to grow on software development teams
We surveyed 2,000 people on software development teams at enterprises in the U.S., Brazil, India, and Germany about the use, experience, and expectations around generative AI tools in software development.
The post Survey: The AI wave continues to grow on software development teams appeared first on The GitHub Blog. ⌘ Read more
Procreate Dev: “I really BEEPing hate generative AI”
Maker of graphic design software for iPad declares “No AI Features” policy. ⌘ Read more
It seems silly to me that we humans create thermal energy with coal, convert the thermal energy to mechanical energy with steam turbines, convert the mechanical energy to electrical energy with generators, and convert the electrical energy back into thermal energy with glass-top stoves and electric heaters.
What are AI agents and why do they matter?
Learn how AI agents and agentic AI systems use generative AI models and large language models to autonomously perform tasks on behalf of end users.
The post What are AI agents and why do they matter? appeared first on The GitHub Blog. ⌘ Read more
4th Public Beta of iOS 18, iPadOS 18, macOS Sequoia, Available for Testing
The fourth public beta version of iOS 18, iPadOS 18, and MacOS Sequoia, is now available to beta testers. The 4th public beta builds match the 6th developer beta builds. Beta system software is intended for advanced users and is generally a buggier experience with less than optimal performance, but anyone can install iOS 18 … [Read More](https://osxdaily.com/2024/08/13/4th-public-beta-of … ⌘ Read more
Opera One Browser Launches on iOS With Aria AI Integration, Voice Input, Image Generation, and More
Opera has released its artificial intelligence-powered Opera One browser for iOS, following several weeks in beta testing.
The iPhone app mimics the minimalist aesthetic of the [company’s desktop browser](https://www.m … ⌘ Read more
通過 Go 示例理解函數式編程思維
一個孩子要嘗試 10 次、20 次才肯接受一種新的食物,我們接受一種新的範式,大概不會比這個簡單。– 郭曉剛 《函數式編程思維》譯者函數式編程 (Functional Programming, 簡稱 fp) 是一種編程範式,與命令式編程(Imperative Programming)、面向對象編程(OOP)、泛型編程(Generics Programming)、邏輯編程 (logic Pro ⌘ Read more
@falsifian@www.falsifian.org by the way, on the last Saturday of every month, we generally hold a online video call/social meet up, where we just get together and talk about stuff if, you’re interested in joining us this month.
Apple Seeds Fifth Betas of iOS 18 and iPadOS 18 to Developers
Apple today seeded the fifth betas of upcoming iOS 18 and iPadOS 18 updates to developers for testing purposes, with the software coming nearly two weeks after the release of the fourth betas.
.
.
Apple is now part of the a … ⌘ Read more
@prologic@twtxt.net I did that, and it returns no error.
`user@server:~/backup/yarn$ make deps
user@server:~/backup/yarn$ make server
/bin/sh: 4: minify: not found
/bin/sh: 5: minify: not found
/bin/sh: 6: minify: not found
make: *** [Makefile:84: generate] Error 127
`
Rivian CEO Explains Why Apple CarPlay Won’t Come to Its Vehicles
Electric automaker Rivian has no plans to introduce support for Apple CarPlay in its vehicles, founder and CEO RJ Scaringe says.
The company’s stance was explained in a recent interview with [The Verge](https://www.theverge.com/2024/7/22/24203609/rivian-apple-carplay-support-rj-sc … ⌘ Read more
Tenstorrent Unveils Next Generation Wormhole-based Developer Kits and Workstations
Tenstorrent Unveils Next Generation Wormhole-based Developer Kits and Workstations
Tenstorrent has announced the launch of its next-generation Wormhole chip, now featured in PCIe cards and workstations designed for scalable multi-chip development. ⌘ Read more
Apple Intelligence Not Trained on YouTube Content, Says Apple
Apple on Thursday addressed concerns about its use of AI training data, following an investigation that revealed Apple, along with other major tech companies, had used YouTube subtitles to train their artificial intelligence models.
The investigation by _[Wired](https://www.wired.com/story/youtube-training-data-apple-nvidia-anthropic/ … ⌘ Read more
How researchers are using GitHub Innovation Graph data to estimate the impact of ChatGPT
An interview with economic researchers who are applying causal inference techniques to analyze the effect of generative AI tools on software development activity.
The post [How researchers are using GitHub Innovation Graph data to estimate the impact of ChatGPT](https://github.blog/2024-07-17-how-researchers-are-using-github-innovation-graph-data-to-estimate-t … ⌘ Read more
Mali-G610 Achieves OpenGL ES 3.1 Conformance
Collabora recently announced a significant milestone: the Panthor kernel driver and Mesa Panfrost driver have achieved official conformance for OpenGL ES 3.1 on the Mali-G610 chip, part of the 10th generation of Mali GPUs, known as “Valhall”. According to Collabora’s latest news, achieving conformance involved passing tens of thousands of test cases, providing assurance to […] ⌘ Read more
I feel like complexity is measured differently at different levels of a project..
- at the function level you use cyclomatic complexity or how many branches internally and how much you need to keep in mind as it calls out to other functions.
- at a file/module level is a balance of the module doing too much against being so granular that you have cross dependency across modules. I have trouble with keeping things dry at this level because it can lead to parts being so abstract or generalized that it adds complexity.
- at a project level i suppose its a matter of how coupled things are across sub-modules.
I feel like complexity is measured differently at different levels of a project..
- at the function level you use cyclomatic complexity or how many branches internally and how much you need to keep in mind as it calls out to other functions.
- at a file/module level is a balance of the module doing too much against being so granular that you have cross dependency across modules. I have trouble with keeping things dry at this level because it can lead to parts being so abstract or generalized that it adds complexity.
- at a project level i suppose its a matter of how coupled things are across sub-modules.
Next Year’s iPhone 17 Unlikely to Feature TSMC’s First 2nm Chip
Reports that next year’s iPhone 17 will adopt TSMC’s next-generation 2nm process are “fake news,” a reputable source of accurate predictions about Apple’s plans claimed on Monday.
According to a post by Weibo user “Phone Chip Expert,” the 2nm process won’t go into mass production until the end of 2025. The account holder, who claims to have 25 … ⌘ Read more
Apple Seeds Revised Third Betas of iOS 18 and iPadOS 18 to Developers
Apple today seeded updated third betas iOS 18 and iPadOS 18 to developers for testing purposes, with the software coming a week after Apple initially released the third betas.
 be defined as delimiters by
the generic syntax, by each scheme-specific syntax, or by the
implementation-specific syntax of a URI's dereferencing algorithm.
If data for a URI component would conflict with a reserved
character's purpose as a delimiter, then the conflicting data must be
percent-encoded before the URI is formed.
reserved = gen-delims / sub-delims
gen-delims = ":" / "/" / "?" / "#" / "[" / "]" / "@"
sub-delims = "!" / "$" / "&" / "'" / "(" / ")"
/ "*" / "+" / "," / ";" / "="
it works fine if you properly escape your urls!
URIs include components and subcomponents that are delimited by
characters in the "reserved" set. These characters are called
"reserved" because they may (or may not) be defined as delimiters by
the generic syntax, by each scheme-specific syntax, or by the
implementation-specific syntax of a URI's dereferencing algorithm.
If data for a URI component would conflict with a reserved
character's purpose as a delimiter, then the conflicting data must be
percent-encoded before the URI is formed.
reserved = gen-delims / sub-delims
gen-delims = ":" / "/" / "?" / "#" / "[" / "]" / "@"
sub-delims = "!" / "$" / "&" / "'" / "(" / ")"
/ "*" / "+" / "," / ";" / "="
Apple Boosts A18 Chip Orders in Anticipation of High iPhone 16 Demand
Apple is said to have upped its order of next-generation chips from TSMC to between 90 million and 100 million units, following heightened demand expectations for its iPhone 16 series.
Last year’s initial chip order volume for the iPhone 15 series launch is believed to have been in the region of 80-90 million units, suggesting Ap … ⌘ Read more
Beta 2 of iOS 17.6, iPadOS 17.6, & macOS Sonoma 14.6 Released for Testing
The second beta versions of iOS 17.6, macOS Sonoma 14.6, and iPadOS 17.6 are available to users who are enrolled in beta testing programs for current generation system software of Apple devices. While many beta testers have likely proceeded ahead with installing the iOS 18 beta, iPadOS 18 beta, and MacOS Sequoia beta, undoubtedly there … [Read More](https://osxdaily.com/2024/07/01/beta- … ⌘ Read more
Using Generative AI to Create Runnable Markdown
Explore the innovative realm of AI developer tools with Docker’s GenAI Docker Labs series. Join us as we dive deep into the potential of AI. Discover how generative AI can assist with documentation, project-specific tasks, and more throughout the software lifecycle. Stay updated and get involved with Docker’s latest projects and tools. ⌘ Read more
Inside the AI ‘deepnude’ apps infiltrating Australian schools
The websites are currently legal in Australia, but many do not have adequate controls preventing them from generating images of children. ⌘ Read more
ReadMeAI: An AI-powered README Generator for Developers
The ReadMeAI tool allows users to upload a code file and describe their project. The tool generates documentation in Markdown code for immediate preview and editing. ⌘ Read more
Vitess 20 is now Generally Available
Project post by the Vitess Maintainer Team We’re delighted to announce the release of Vitess 20 along with version 2.13.0 of the Vitess Kubernetes Operator. Version 20 focuses on usability and maturity of existing features, and continues to… ⌘ Read more
Minisforum UM890 Pro Taps AMD Ryzen 9 8945HS Processor
Minisforum has recently announced the pre-sale of a new Mini-PC, which is built around the latest generation AMD Ryzen 9 8945HS processor, featuring the advanced Zen 4 architecture. This device supports DDR5 dual-channel memory and utilizes M.2 2280 slots for SSD storage. The Minisforum UM890 Pro is equipped with the AMD Ryzen 9 8945HS processor […] ⌘ Read more
macOS 15 No Longer Needs Twice the Free Space for App Store Installs
Starting with macOS Sequoia, app downloads and installations from the Mac App Store will no longer require double the amount of local storage space available. Instead, the free space requirement now matches the final install size of the app, plus a small buffer, according to Apple.
The new space requirement in macOS 15 should … ⌘ Read more
Palmshell PuER N1: Upcoming Networking Compact PC with 4x 2.5GbE Ports
The Palmshell PuER N1 is an upcoming compact networking PC built around the Intel Celeron J6412 Quad-core processor from the 10th generation lineup. This device features multiple 2.5GbE ports and offers a range of storage options designed for users who demand both high-speed network connectivity and substantial data storage capabilities. Unlike the Palmshell Slim X2L, […] ⌘ Read more
ASUS Chromebox 5a with 13th Gen Intel processors start at $294.00
The ASUS Chromebox 5a is a versatile mini-PC equipped with 13th Generation Intel Core or Celeron processors. These devices support multiple 4K@60Hz displays and include an M.2 2280 PCIe slot for storage expansion. According to the ASUS product page, the new ASUS Chromebox 5a is compatible with the following Intel 13th Generation processors: i7-1355U — […] ⌘ Read more
Amazon Could Charge Up to $10/Month for Alexa
Apple competitor Amazon is working on a revamp of its Alexa assistant, and the new version could cost up $10 per month, according to a report from Reuters. The upcoming version of Alexa will support conversational generative AI, and Amazon is planning for two tiers of service.
的泛型實踐。事實上 Go 泛型很容易學,本文希望能幫助讀者更好的理解 Go 泛型。 👉注:本文不會將 ⌘ Read more
Sipeed Lichee Book 4A: Affordable RISC-V Laptop with Upgradeable Computer Module
The Sipeed Lichee Book 4A is a cost-effective laptop utilizing RISC-V architecture, designed primarily for developers interested in exploring this platform. It merges standard laptop features with functionalities tailored to RISC-V, offering a practical tool for both software development and general use. According to recent updates on the company’s social media, the Sipeed Lichee Book … ⌘ Read more
GitHub Enterprise Server 3.13 is now generally available
With this version, customers can choose how to best scale their security strategy, gain more control over deployments, and so much more.
The post GitHub Enterprise Server 3.13 is now generally available appeared first on The GitHub Blog. ⌘ Read more
Luckfox Pico Ultra RV1106 is a Linux Micro Development Board with PoE Support
The Luckfox Pico Ultra RV1106 is a compact, Linux-based micro development board powered by Rockchip RV1106, tailored for embedded applications. It features a single-core ARM Cortex-A7 32-bit processor with NEON and Floating Point Unit enhancements. Embedded in the Luckfox Pico Ultra is Rockchip’s fourth-generation Neural Processing Unit, which supports int4, int8, and int16 hybrid quantiza … ⌘ Read more
Unlocking the power of unstructured data with RAG
Unstructured data holds valuable information about codebases, organizational best practices, and customer feedback. Here are some ways you can leverage it with RAG , or retrieval-augmented generation.
The post Unlocking the power of unstructured data with RAG appeared first on The GitHub Blog. ⌘ Read more
‘Apple Intelligence’ Generative Personal AI Unveiled for iPhone, iPad, and Mac
Apple at WWDC today announced Apple Intelligence, a deeply integrated, personalized AI experience for Apple devices that uses cutting-edge generative artificial intelligence to enhance user experiences across iPhone, iPad, and Mac.
.
Civilian deaths from killer drones are this generation’s ‘Oppenheimer moment’
The geopolitical tensions and challenges faced by physicists and other scientists 70 years ago in their search for nuclear arms control is now being replicated in the 21st century. ⌘ Read more