Salta al contenuto principale



SIRIA. Suwayda sotto assedio. Diario da una provincia in ginocchio


@Notizie dall'Italia e dal mondo
Dopo le aggressioni delle scorse settimane, mai cessate del tutto, più di 170.000 sfollati sono arrivati a Suwayda da aree rurali devastate. Oltre 32 villaggi sono stati bruciati, saccheggiati e resi inabitabili
L'articolo SIRIA. Suwayda sotto assedio. Diario da una



Cotton Farming in 2025


Cotton farming, known as the "white gold" of agriculture, remains one of the most vital pillars of the global textile economy. In 2025, it not only supports millions of livelihoods but is also evolving rapidly driven by cutting-edge technologies, sustainable practices, and precision agriculture. Whether you’re a first-time grower or an experienced farmer, understanding how cotton is grown today can help you achieve higher yields, reduce costs, and farm more responsibly.
What is Cotton?
Cotton is a soft, fluffy natural fiber that grows around the seeds of the Gossypium plant. It’s used worldwide to manufacture clothing, bedding, industrial fabrics, and even paper products. Beyond fiber, cottonseeds are processed into oil and livestock feed, making it a multi-utility crop with immense commercial value.
Major Cotton-Growing Countries
As of 2025, the top cotton-producing nations include:
• India – World's largest cotton cultivator and consumer
• China – Heavy focus on high-yield, mechanized cotton
• United States – Known for exporting premium quality lint
• Pakistan – Major grower of short-staple cotton
• Brazil – Emerging leader in sustainable cotton exports
These countries benefit from suitable climates, advanced genetics, and extensive research infrastructure.
Suitable Conditions for Cotton
Cotton is a warm-season crop that demands specific conditions:
Factor Ideal Range
Temperature 21°C to 30°C
Rainfall 600 mm to 1,200 mm annually
Soil Type Sandy loam or black cotton soils
Soil pH 6.0 – 7.5
Growing Period 150–180 days (depends on variety)
It cannot tolerate frost and grows best in sunny, dry weather with low humidity during boll opening.
Preparing the Farm for Cotton
Effective land preparation sets the stage for a productive crop. Here’s how:
• Soil testing: Identifies pH, nutrient levels, and deficiencies
• Primary tillage: Deep plowing helps break hardpan and increase root penetration
• Secondary tillage: Harrowing and leveling using laser tools improve irrigation efficiency
• Organic additions: Apply farmyard manure or compost 2–3 weeks before sowing
Modern farmers also use biochar or vermicompost to enhance soil microbial activity and moisture retention.
Selecting Cotton Varieties
Choosing the right variety can significantly affect your yield and pest resistance. In 2025, the popular categories include:
• Bt Cotton: Genetically engineered to fight bollworms
• Hybrid Cotton: High-yielding but requires more inputs
• Desi Varieties: Hardy, pest-tolerant, and ideal for organic farming
• High-Density Varieties: Used in HDPS systems for closer spacing and better land utilization
• Drought-tolerant Strains: Designed for water-scarce areas
Seed Treatment Before Sowing
Treated seeds germinate better and resist early pests and diseases:
• Fungicides: Prevent damping-off, Fusarium wilt, and seed rot
• Insecticides: Protect from soil-borne insects
• Bio-stimulants: Enhance root development
• Rhizobium or Azospirillum: Inoculants for nitrogen fixation (used in organic farming)
Sowing Cotton Seeds
Sowing Cotton Seeds
Sowing cotton seeds is a crucial step in cotton farming, directly influencing germination, plant spacing, and eventual yield. The ideal time for sowing depends on the region April to June in North India and June to July in the South. Before sowing, seeds should be treated with fungicides or biostimulants to protect against early pests and diseases.
Farmers can use manual methods like dibbling or adopt mechanized sowing with seed drills for precision. The recommended sowing depth is about 4–5 cm, ensuring seeds are neither too shallow nor too deep. Spacing varies with variety Bt and hybrid cotton usually need 75 × 30 cm, while high-density planting systems (HDPS) use 60 × 15 cm.
When to sow cotton?
• North India: April–June
• South/Central India: June–July
Growth Stages: From Flower to Boll
Cotton has distinct growth stages:
1. Vegetative (0–35 days) – root and leaf development
2. Square formation (35–50 days) – flower buds appear
3. Flowering (50–75 days) – needs optimal nutrition
4. Boll development (75–120 days) – water-sensitive period
5. Boll opening (120–160 days) – maturity, prepare for harvest


#PrivacyCamp25: The draft programme is out now


PrivacyCamp25 will take place on 30 September, 2025 online and at La Tricoterie, Brussels. Curious about what we have planned? Check out the draft programme.

The post #PrivacyCamp25: The draft programme is out now appeared first on European Digital Rights (EDRi).



A PC That Uses Hot Coffee As Coolant


Modern computers generate a great deal of heat when under load, thus we cool them with fans and sometimes even water cooling systems. [Doug MacDowell] figured that water was alright, but why not use coffee instead?

Someone tell us how [Doug] made this graph look like it’s right out of a 1970s college textbook.The concept is simple enough — replace water in a PC’s cooling loop with fresh-brewed coffee. [Doug] fully integrated an entire PC build on to the side of a General Electric drip coffee maker. It’s an absolute mess of tubes and wires, but it’s both a PC and a functional coffee maker in one.

The coffee maker percolates coffee as per normal into the carafe, and from there, it’s then pumped through two radiators on top of the PC. From there, it circulates to the water block on top of the CPU, and then back to the carafe on the coffee maker where the cycle repeats. Doug notes the coffee is initially so hot (90 C) that the PC is at risk of crashing, but after 75 minutes circulating through the system, the coffee and CPU sit at an equilibrium temperature of 33 C.

You can’t really drink coffee from this machine. PC water cooling components are not food safe in any way, and [Doug] notes mold will become an issue over time. For short periods at least, though, it’s possible to sort-of-cool your computer with hot, fresh coffee if you really want to do that.

We’ve featured some great hacks of conventional coffee machines over the years, including this fantastic talk at Supercon 2023.

youtube.com/embed/dNBc4_DfB80?…


hackaday.com/2025/08/07/a-pc-t…



Ecco come Israele usa il cloud Microsoft per la sorveglianza dei palestinesi in Cisgiordania e Gaza


@Informatica (Italy e non Italy 😁)
Un'inchiesta giornalistica rivela che Israele ha sviluppato un sistema di sorveglianza che registra e archivia milioni di telefonate provenienti da palestinesi a Gaza e in Cisgiordania, tutte archiviate su



Grok in modalità “piccante”! Crea video per adulti con l’intelligenza artificiale di Elon Musk


L’azienda di intelligenza artificiale di Elon Musk, xAI, ha recentemente presentato una funzionalità provocatoria nel suo strumento Grok Imagine: la “Modalità piccante”. Questa aggiunta consente agli utenti di generare immagini e video per Adulsti (NSFW), segnando un netto distacco dalle politiche sui contenuti più restrittive di altre piattaforme di intelligenza artificiale.

Grok Imagine è uno strumento basato sull’intelligenza artificiale progettato per convertire prompt di testo in immagini e brevi video. L’introduzione della “Modalità Piccante” consente la creazione di contenuti per adulti, inclusa la nudità parziale. Sebbene esista una certa moderazione (alcuni prompt espliciti comportano immagini sfocate o bloccate), gli utenti hanno segnalato la possibilità di generare immagini di semi-nudo.

Il lancio di “Spicy Mode” ha acceso un dibattito sulle implicazioni etiche e legali dei contenuti per adulti generati dall’intelligenza artificiale. Le principali preoccupazioni includono:

  • Deepfake non consensuali : il potenziale di creazione di contenuti espliciti con individui reali senza il loro consenso è allarmante. Tale abuso può causare gravi danni personali e professionali.
  • Sfide normative : la legislazione vigente, come il Take It Down Act, impone la rapida rimozione di contenuti espliciti generati dall’intelligenza artificiale senza consenso. Le capacità di Grok Imagine potrebbero mettere alla prova l’efficacia e l’applicazione di queste leggi.
  • Responsabilità della piattaforma : la decisione di xAI di includere una modalità per i contenuti espliciti contrasta con le tendenze del settore verso l’implementazione di misure di sicurezza contro la generazione di materiale dannoso. Questo approccio potrebbe suscitare controlli normativi e reazioni negative da parte dell’opinione pubblica.

Altri strumenti di generazione di immagini e video basati sull’intelligenza artificiale, come DALL·E di OpenAI e DeepMind di Google, hanno implementato rigide politiche di moderazione dei contenuti per impedire la creazione di contenuti espliciti o dannosi. Queste piattaforme impiegano filtri e sistemi di monitoraggio per garantire un uso responsabile. Al contrario, l’approccio permissivo di Grok Imagine lo distingue, ma lo espone anche a potenziali abusi e dilemmi etici.

L’introduzione della “Modalità Piccante” in Grok Imagine rappresenta una mossa audace nel campo dei contenuti generati dall’intelligenza artificiale, sfidando le norme esistenti e sollevando importanti interrogativi sull’equilibrio tra libertà creativa e responsabilità etica.

La modalità Spicy consente di creare un video della durata massima di 15 secondi con immagini per adulti e audio naturale. Sebbene l’azienda abbia imposto alcune restrizioni a questo strumento, crea comunque alcune scene che aggirano persino i filtri applicati dall’azienda.

Qualche tempo fa, Mati Roy, dipendente di xAI, ha pubblicato un post su X (Twitter), menzionando questa funzionalità e affermando che questo strumento può generare contenuti di nudo. Questo post potrebbe essere stato successivamente cancellato. Ma a quel punto, si era già diffuso a macchia d’olio sui social media.

L'articolo Grok in modalità “piccante”! Crea video per adulti con l’intelligenza artificiale di Elon Musk proviene da il blog della sicurezza informatica.



Oskemen o niente: il Cyberpandino sfida canyon, deserti e dromedari e non si ferma!


Una Panda del 2003, acquistata per appena 800 €, è diventata qualcosa di totalmente diverso, anche per noi di Red Hot Cyber! Grazie alla genialità di Matteo Errera e Roberto Zaccardi, è rinata come Cyberpandino: un laboratorio hi-tech su ruote, pronto a fronteggiare 14 000 km tra sterrati europei e asiatici per prendere parte al leggendario Mongol

Dalla Cappadocia alle porte dell’Himalaya, passando per deserti lunari, confini assurdi e meccanici con più fantasia che attrezzi: il Cyberpandino ha continuato a spingere, sbuffando, cigolando, ma sempre avanti.

Abbiamo superato la metà del viaggio.

Da Lampedusa a qui, oltre 10.000 km macinati tra Italia, Svizzera, Austria, Germania, Repubblica Ceca, Slovacchia, Ungheria, Serbia, Bulgaria, Turchia, Georgia, Russia, Kazakistan, Turkmenistan e Uzbekistan.

Un elenco che sembra un quiz di geografia, ma che per noi ha il sapore di sabbia, gasolio, e tratti di “asfalto” messi lì più per bellezza che per utilità.

Ogni frontiera? Un salto nel buio.
Ogni paese? Una storia.
Ogni tappa? Un bullone in meno sotto la scocca.

Ma il Cyberpandino non molla!

Ha perso pezzi, ha guadagnato cicatrici, si è adattato: come una tartaruga digitale che avanza a 50 km/h, ignorando ogni logica ingegneristica.

Avremmo potuto farlo con una 4×4?
Certo. Ma una Panda del 2003 nata per raccogliere olive in Puglia ha molto più stile.

Sassi, canyon e cammelli confusi


Dalla Turchia in poi, il mondo è diventato sabbia e silenzio.

Segnale? Zero.

Strade? Un concetto vago.

Orientamento? Più che altro intuito, Google Maps in crisi esistenziale.

Polvere, sassi, canyon, qualche camion sovietico abbandonato e ogni tanto un dromedario perplesso che ci fissava come se fossimo noi quelli strani. E forse aveva ragione lui.

In Turkmenistan ci hanno controllato ogni vite del mezzo (invano).

In Uzbekistan ci avevano promesso un po’ di asfalto.

Effettivamente l’abbiamo visto… per un paio d’ore.

Poi di nuovo crateri, buche e panorami mozzafiato.

Un po’ Mad Max, un po’ Super Quark.

Verso il cielo: il Tagikistan ci aspetta


Ora siamo diretti verso il Tagikistan, con la mitica Pamir Highway come prossimo obiettivo.
Un nome che incute rispetto, perché lì si fa sul serio: passi oltre i 4.000 metri, strade scolpite nella roccia, curve sospese tra cielo e burroni.
Niente guardrail, niente comfort. Solo montagne e l’eco dei nostri freni che iniziano a credere nella reincarnazione.

Ma non siamo partiti per stare comodi.

Siamo partiti per vedere fin dove può arrivare un’idea assurda.

E soprattutto, fin dove può arrivare una Panda da città trasformata in guerriera post-sovietica.

E dopo?


Dopo il Tagikistan ci aspettano il Kirghizistan, e il traguardo a Oskemen, dove finirà il Mongol Rally.

O almeno questo è il piano.

Poi boh.

Come sempre, si decide sulla strada. Perché alla fine è la strada che fa le storie ed è questo il bello.

Intanto si stringono le viti che restano, si riparano i buchi col fil di ferro, ma si dorme sotto cieli sterminati e si ringrazia il Cyberpandino, che nonostante tutto, ancora va alla grande!

Prossima fermata: il tetto del mondo.

L'articolo Oskemen o niente: il Cyberpandino sfida canyon, deserti e dromedari e non si ferma! proviene da il blog della sicurezza informatica.



Attenzione attenzione, cerchiamo serata strapagata su Lunedi 11 Agosto, in quanto avevamo un bellissimo filotto di Reggae Circus in giro per tutto il sud ma poi infatti purtroppo ne è saltata una e quindi ora stiamo cercando un rimpiazzo last minute 😋 Saremo io, l'acrobatica Svenka Alice Bellini, il rocambolesco Alessio Paolelli e poi anche l'incendiario Paolo Mele e la fiammeggiante Marta Ruffino, quindi insomma, uno squadrone veramente fortissimy 🔥🙌😋 Dal grande festival internazionale alla sagra del peperone crusco ci sta bene tutto! Dajje forte, spargete la voce e/o contatteci con fiducia, non famo che ci lasciate in mezzo a una strada eh 👍😅
in reply to Adriano Bono

L'immagine è un poster promozionale per un tour musicale intitolato "Ingaggiateci Stronzì Tour" di Adriano Bono, con il sottotitolo "The Reggae Circus". Il poster presenta un uomo con barba e baffi, indossando un abito di gala rosso con decorazioni dorate, un papillon rosso e un cappello a cilindro nero. L'uomo tiene una chitarra e sorride, con uno sguardo diretto verso l'osservatore. Sullo sfondo, c'è un'illustrazione di un circo con acrobati e artisti, che contribuisce a creare un'atmosfera festosa e vivace.

Il testo principale "INGAGGIATECI STRONZI TOUR" è scritto in caratteri grandi e bianchi, posizionato in alto. Sotto, in caratteri più piccoli, si legge "THE REGGAE CIRCUS di Adriano Bono". In basso, sono elencate le date e i luoghi dei concerti: sabato 9 agosto a Yumara, Maratea PZ; domenica 10 agosto a Azzurro Beach Praia a Mare, CS; lunedì 11 agosto a Cerasi Serata Strapagata!; e martedì 12 agosto a Colliano (SA).

Il poster utilizza un design vintage con sfumature di rosso e giallo, che richiama l'atmosfera di un circo storico. L'immagine e il testo insieme creano un'atmosfera di divertimento e spettacolo, promuovendo l'evento musicale.

Fornito da @altbot, generato localmente e privatamente utilizzando Ovis2-8B

🌱 Energia utilizzata: 0.402 Wh




oltretutto per come sono messi gli usa, democraticamente ed economicamente, mai e poi mai sarebbe saggio spostare risorse e produzione negli usa. ci sarebbe il rischio di perdere tutto.
in reply to simona

si esatto: il danno economico è per chi esporta ma a pagare sono gli usa. ha praticamente messo l'iva al 15-30-50% in un paese dove i consumi avevano una tassa si e no locale dell'1%... un genio. ha proprio reso l'america più grande... più tassata forse.


Hiroshima, Mattarella: 'liberare il mondo dalle armi nucleari'

(intanto, per dare il buon esempio, potremmo cominciare a liberare il territorio italiano dalle atomiche Usa)

imolaoggi.it/2025/08/06/hirosh…
Hiroshima, Mattarella: 'liberare il mondo dalle armi nucleari' • Imola Oggi
imolaoggi.it/2025/08/06/hirosh…




Dazi e backdoor nei microchip: ecco cosa agita Nvidia

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Sono giornate intense per Nvidia. L'azienda deve respingere le pressioni per l'inserimento di backdoor nei suoi microchip (è già stata convocata in Cina). E deve fare i conti con i nuovi dazi sui semiconduttori annunciati da Trump. Tutti i dettagli.




Documenti d’identità rubati dagli hotel italiani, decine di migliaia in vendita sul dark web


@Informatica (Italy e non Italy 😁)
Decine di migliaia di documenti d’identità italiani, tra passaporti, carte d’identità e altri documenti di riconoscimento, sono finiti in vendita su un noto forum del dark web. Secondo quanto riportato dal CSIRT Italia, le scansioni

reshared this



A Martano (LE) Matteo Mainardi in un dibattito pubblico sul fine vita – nell’ambito del festival Epame 2025

Lunedì 12 agosto, alle ore 20:30, Matteo Mainardi, consigliere generale dell’Associazione Luca Coscioni e responsabile delle campagne sul fine vita, sarà ospite al Palazzo Ducale di Martano (LE) per un dibattito pubblico dedicato al diritto di scelta sul fine vita.

L’appuntamento è per lunedì 12 agosto 2025 alle ore 20:30, presso il Palazzo Ducale di Martano (LE), in Viale Savoia, a Martano.

L’incontro si svolge nell’ambito del festival Epame 2025 e vedrà la partecipazione anche di Andrea Mariano, medico e attivista del Laboratorio Salute Popolare, e Simona Zaminga, medico Ant.

A seguire si terrà una cena sociale e un dj set.

🎟 Ingresso libero
📣 Evento promosso da Galattica – Rete Giovani Puglia, Idee in Movimento e Città di Martano

L'articolo A Martano (LE) Matteo Mainardi in un dibattito pubblico sul fine vita proviene da Associazione Luca Coscioni.



Sparks Fly: Building a 330 kV Supply from a PC PSU


330k volts

If you’re hunting for a bench power supply, you’ll quickly notice options dry up above 48 V or so, and you definitely won’t find a 330 kV supply on the shelf at your local electronics shop. But with just a few parts, [Mircemk] has crafted a high-voltage source from a modified PC power supply that delivers electrifying results.

The sparks arcing over a foot of thin air are a dead giveaway, but let’s be clear: this project is not for beginners. High voltage — defined as around 1,000 V and up, with this project hitting 350 times that — carries risks of severe injury or death. Only tackle it if you fully understand the dangers and take precautions like proper insulation and never working alone.

This project showcases a Cockcroft-Walton voltage multiplier, a clever setup using diodes and capacitors to step up voltage. The capacitors charge and discharge in an alternating pattern, doubling the voltage after each diode pair. [Mircemk] uses 3 mm thick Plexiglas as an insulator, providing both structure and electrical isolation for the diode-capacitor cascade.

To achieve the 330,000 V output, [Mircemk] starts by modifying a standard PC ATX power supply, removing the Schottky diodes from the secondary winding’s output to produce a roughly 15 V square wave. This feeds into another transformer, boosting the voltage before it enters the Cockcroft-Walton multiplier. At first glance, the multiplier’s sides look identical, but their opposite polarities create a massive potential difference across the spark gap.

[Mircemk]’s benchtop exploration into high-voltage territory is a shocking success. If this project lights up your curiosity, dive into our other high-voltage adventures, like DIY Tesla coils or plasma speakers, for more electrifying inspiration.

youtube.com/embed/Psyma1AmmDo?…


hackaday.com/2025/08/07/sparks…



Google Hackerata dalla cybergang ShinyHunters. Rubate informazione dal database dei clienti


Nessun colosso dell’informatica può considerarsi al sicuro dalle minacce del cybercrime. Su Red Hot Cyber abbiamo avuto modo di constatare questo tipo di problematiche. Ad esempio, grosse società come Microsoft e Apple sono state prese di mira, e recentemente è toccato a Google, che sta gestendo la risposta alla minaccia del ransomware.

Una recente violazione di uno dei database di Google ha portato al furto dei dati di alcuni clienti, come è stato confermato dalla stessa società.

In un post sul blog pubblicato martedì sera, Google Threat Intelligence Group ha affermato che un database Salesforce, utilizzato per archiviare informazioni di contatto e note correlate per piccole e medie imprese, è stato violato da un gruppo di hacker noto come ShinyHunters, formalmente designato come UNC6040.

I dati recuperati dall’autore della minaccia erano limitati a informazioni aziendali di base e in gran parte disponibili al pubblico, come nomi aziendali e recapiti“, ha affermato l’azienda.

Il portavoce di Google, Mark Karayan, ha mantenuto un atteggiamento riservato riguardo al numero di clienti coinvolti, rifiutandosi di fornire ulteriori dettagli oltre a quelli già resi pubblici nel post sul blog dell’azienda. Non risulta che l’azienda abbia reso noto se abbia ricevuto richieste specifiche, ad esempio un riscatto, né tantomeno se siano state formulate richieste del genere.

Grandi aziende e database cloud sono stati spesso nel mirino di ShinyHunters, un gruppo noto per i suoi attacchi informatici.

Questa è l’ultima di una serie di violazioni che prendono di mira i sistemi cloud di Salesforce, dopo i recenti furti di dati dei clienti da parte di Cisco , del colosso delle compagnie aeree Qantas e del colosso della vendita al dettaglio Pandora.

Un recente articolo pubblicato sul blog di Google riferisce che il gruppo ShinyHunters utilizza metodi di phishing tramite voce per convincere i lavoratori dell’azienda a fornire l’accesso ai database basati su cloud di Salesforce.

Google ha affermato che il gruppo ShinyHunters sta probabilmente preparando un Data Leak Site (DLS), dove molte cybergang ransomware utilizzano per pubblicare dati rubati e costringere le aziende vittime a pagare un riscatto.

Si dice che il gruppo abbia legami con altri gruppi, tra cui The Com, un noto collettivo di criminali informatici che ricorre all’hacking, all’estorsione e talvolta alle minacce di violenza per penetrare nelle reti.

L'articolo Google Hackerata dalla cybergang ShinyHunters. Rubate informazione dal database dei clienti proviene da il blog della sicurezza informatica.

Joe Vinegar reshared this.



Il CEO di GitHub: i programmatori che non abbracceranno l’AI saranno finiti


Il Messaggio comune da parte dei big dello sviluppo software è il seguente: la programmazione si sta trasformando da lavoro manuale a gestione di agenti digitali.

Il CEO di GitHub, Thomas Domke, ha lanciato un duro avvertimento all’industria tecnologica globale: gli sviluppatori che non abbracciano l’intelligenza artificiale dovrebbero essere pronti ad abbandonare la professione. La sua dichiarazione, pubblicata sul blog dell’azienda con il titolo “Sviluppatori reinventati” , riflette non solo una trasformazione tecnologica, ma una radicale rivalutazione del ruolo dei programmatori stessi.

Il blog si basa su interviste a 22 sviluppatori che hanno già integrato profondamente l’intelligenza artificiale nei loro flussi di lavoro. Le loro esperienze dimostrano che l’intelligenza artificiale non è un futuro astratto, ma una necessità attuale. Un intervistato lo ha detto senza mezzi termini: “O si abbraccia l’intelligenza artificiale o si abbandona la professione”. Domke pone questa tesi al centro del suo articolo.

Non è la prima volta che le aziende di intelligenza artificiale sfruttano la minaccia dell’estinzione del lavoro come strumento di marketing. Invece di promuovere i propri prodotti attraverso la praticità e l’utilità, queste aziende spesso dicono agli utenti: se non abbracciate l’intelligenza artificiale, sarete fuori dal mercato. Ad esempio, Julia Liuson, top manager di Microsoft, ha dichiarato in precedenza che “l’uso dell’intelligenza artificiale non è più un’opzione” .

Ricordiamoci tutti che Microsoft possiede GitHub.

Domke scrive che molti sviluppatori inizialmente erano scettici nei confronti di strumenti come GitHub Copilot, come se fossero solo un’altra moda passeggera. Ma col tempo si sono evoluti in “strateghi dell’IA”, delegando le parti più banali della programmazione all’IA e concentrandosi sulla progettazione, sullo sviluppo di query efficaci e sulla convalida dei risultati. Secondo il CEO, gli sviluppatori ora si definiscono “direttori creativi del codice” piuttosto che programmatori.

Non si tratta solo di un cambiamento negli strumenti. Domke sostiene che il ruolo dello sviluppatore si sta spostando dalla scrittura del codice alla progettazione e all’audit del codice generato dall’intelligenza artificiale. Chi si adatta per primo non perde valore; al contrario, ottiene un vantaggio. Invece di limitarsi ad accelerare i processi, gli sviluppatori ora utilizzano l’intelligenza artificiale per ampliare le proprie ambizioni, tra cui la riprogettazione di sistemi di grandi dimensioni e l’utilizzo di più agenti di intelligenza artificiale su una singola funzionalità.

Domke ritiene che fino al 90% del codice potrebbe presto essere generato dall’intelligenza artificiale, probabilmente entro due o cinque anni. In questo nuovo ambiente, le competenze di progettazione dei sistemi, la “competenza in materia di intelligenza artificiale” e la capacità di delegare e garantire la qualità saranno fondamentali. In altre parole, la programmazione si sta trasformando da lavoro manuale a gestione di agenti digitali.

Ammette che non a tutti piace questa prospettiva: “Non tutti vogliono cambiare. E va bene così”. Ma lo stesso Domke trae una conclusione chiara: chi non è pronto dovrà cercare un’altra professione.

L'articolo Il CEO di GitHub: i programmatori che non abbracceranno l’AI saranno finiti proviene da il blog della sicurezza informatica.




One year of the AI Act: What’s the political and legal landscape now?


The EU Artificial Intelligence (AI) Act came into force on August 1, 2024. This blog takes stock of the political and legal landscape facing its implementation and enforcement one year on, especially efforts to delay or even gut the law which would have far-reaching effects on people’s rights, especially when it comes to migration and law enforcement use of AI.

The post One year of the AI Act: What’s the political and legal landscape now? appeared first on European Digital Rights (EDRi).

Gazzetta del Cadavere reshared this.



ecco la soluzione del governo trump alla CO2: smettere di monitorarla. ma chi sceglie queste persone? è follia.

RFanciola reshared this.






Esce GPT-OSS: il nuovo modello open source di OpenAI che funziona senza connessione ad internet


Questa settimana, OpenAI ha presentato un modello di linguaggio aperto tanto atteso chiamato gpt-oss. Il suo punto di forza è la possibilità di essere eseguito localmente sul proprio computer, inclusi i Mac con processori Apple Silicon. Ecco come funziona e cosa aspettarsi.

Probabilmente era una mossa pianificata dopo il rilascio di DeepSeek R1, che ha creato molto rumore nel mondo dell’intelligenza artificiale, cosa che OpenAI non poteva ignorare.

Il modello è disponibile in due versioni: gpt-oss-20b e gpt-oss-120b. La prima versione è un modello “medio” che può essere eseguito su Mac di fascia alta se dotati di risorse sufficienti. La seconda è un modello “pesante” che richiede hardware molto più potente. Si prevede che la versione più piccola presenti allucinazioni più spesso, ovvero inventa fatti, perché ha un set di dati di addestramento più piccolo. Ma funziona più velocemente e può essere eseguita anche sui computer domestici.

Anche nella sua versione semplificata, gpt-oss è uno strumento interessante per chiunque voglia provare a eseguire un modello linguistico di grandi dimensioni direttamente sul proprio laptop. Tuttavia, è importante capire che, a differenza del noto ChatGPT, questo modello funziona senza connessione Internet e, di default, non dispone di molti dei “trucchi” dei chatbot avanzati. Ad esempio, non controlla le risposte tramite i motori di ricerca, il che aumenta significativamente il rischio di errori.

OpenAI consiglia un minimo di 16 GB di RAM per eseguire gpt-oss-20b, ma in realtà si tratta di un limite minimo, utile solo per vedere come funziona. Non sorprende che Apple abbia recentemente smesso di vendere Mac con 8 GB di RAM: l’intelligenza artificiale sta diventando sempre più un’attività quotidiana per i computer.

Iniziare è semplice. Per prima cosa, devi installare l’applicazione Ollama, che ti permette di controllare il modello. basta scrivere le seguenti istruzioni:

ollama pull gpt-oss:20b ollama run gpt-oss:20b

Il modello occuperà circa 15 GB di spazio su disco. Una volta scaricato, può essere selezionato nell’interfaccia di Ollama. Se lo si desidera, è possibile abilitare la “modalità aereo” nelle impostazioni per garantire un funzionamento completamente locale: non è richiesta alcuna connessione Internet o registrazione.

A questo punto inserisci una query e guarda il risultato. Ma ricorda che il modello utilizza tutte le risorse disponibili e il Mac può rallentare notevolmente. Su un MacBook Air con chip M4 e 16 GB di memoria, ad esempio, la risposta a “ciao” ha richiesto più di cinque minuti. La query “chi è stato il 13° presidente degli Stati Uniti” circa 43 minuti. Quindi, se intendi usare seriamente il modello, 16 GB non sono quindi sufficienti.

L'articolo Esce GPT-OSS: il nuovo modello open source di OpenAI che funziona senza connessione ad internet proviene da il blog della sicurezza informatica.

gelato_al_pollo reshared this.



Una nuova Vulnerabilità critica scoperta in Microsoft Exchange Server: il CISA Avverte


Una falla critica di sicurezza è stata individuata nelle distribuzioni ibride di Microsoft Exchange Server. Questa vulnerabilità (CWE-287) permette agli aggressori con accesso amministrativo locale di ampliare i loro privilegi all’interno di ambienti cloud.

Sebbene la complessità dell’attacco è considerata elevata, richiedendo agli aggressori di disporre innanzitutto di accesso amministrativo su un server Exchange. Tuttavia, una volta soddisfatto questo prerequisito, la classificazione della vulnerabilità indica che lo sfruttamento può interessare risorse diverse da quelle del componente inizialmente compromesso

Si tratta del CVE-2025-53786, la quale è stata ufficialmente documentata da Microsoft il 6 agosto 2025, in seguito alla dimostrazione di un ricercatore alla conferenza sulla sicurezza informatica Black Hat.

Il ricercatore di sicurezza Dirk-Jan Mollema di Outsider Security ha presentato tecniche di sfruttamento dettagliate al Black Hat 2025, dimostrando come gli aggressori possono sfruttare questa configurazione per modificare le password degli utenti, convertire gli utenti cloud in utenti ibridi e impersonare utenti ibridi.

La vulnerabilità deriva dall’architettura di distribuzione ibrida di Exchange di Microsoft, che tradizionalmente utilizzava un principio di servizio condiviso tra i server Exchange locali ed Exchange Online per l’autenticazione.

“Questi token sono validi fondamentalmente per 24 ore. Non è possibile revocarli. Quindi, se qualcuno li possiede, non c’è assolutamente nulla che si possa fare dal punto di vista difensivo”, ha spiegato Mollema durante la sua presentazione.

La vulnerabilità sfrutta token di accesso speciali utilizzati per la comunicazione del server Exchange con Microsoft 365, che non possono essere annullati una volta rubati, offrendo agli aggressori fino a 24 ore di accesso non controllato. La Cybersecurity and Infrastructure Security Agency (CISA) ha valutato questa vulnerabilità come di elevata gravità, con implicazioni significative per la sicurezza aziendale.

Secondo l’avviso della CISA, la vulnerabilità “consente a un autore di minacce informatiche con accesso amministrativo a un server Microsoft Exchange locale di aumentare i privilegi sfruttando configurazioni ibride vulnerabili”. Se non si interviene, il difetto potrebbe avere ripercussioni sull’integrità dell’identità del servizio Exchange Online di un’organizzazione.

La documentazione ufficiale di Microsoft spiega che in precedenza Exchange Server utilizzava “un servizio principale condiviso con la stessa applicazione di Exchange Online” per funzionalità ibride come la condivisione del calendario e le immagini del profilo utente. La vulnerabilità consente scenari di attacco sofisticati in cui gli avversari con accesso amministrativo iniziale ai server Exchange locali possono aumentare i privilegi all’interno di ambienti cloud connessi..

Questa caratteristica lo rende particolarmente pericoloso per le organizzazioni con distribuzioni Exchange ibride, poiché un singolo server locale compromesso potrebbe fornire un accesso cloud esteso.

Microsoft ha dichiarato che non è stato osservato alcuno sfruttamento della vulnerabilità alla data dell’annuncio, sebbene i ricercatori di sicurezza abbiano dimostrato attacchi proof-of-concept.

L'articolo Una nuova Vulnerabilità critica scoperta in Microsoft Exchange Server: il CISA Avverte proviene da il blog della sicurezza informatica.



Automated Rubbish Removal System


A man standing next to a host of small automatic trash cans

The hackers over at [HTX Studio] built a set of twenty trash cans which can automatically catch and remove rubbish.

In order to catch trash a bin needs to do two things: detect where trash will land; and then get there, fast. The second part is easy: three big motors with wheels under the bin. But how does a bin know where the trash will land? It uses a camera installed in the bin itself for that.

[HTX Studio] iteratively trained a model to process visual information from the camera to identify common types of trash. When it sees a trained object flying through the air it rushes to catch it where it will land. After many rounds of fine-tuning it finally started to work reliably.

Once the basic function was working they had some fun creating various specialized variants. One to mop the floor; one to play rock-paper-scissors with you, sort of; and one with an automatic lid, which can be used to “talk trash”. After these three came the ultimate bin: The Punishment Bin, which can fire soft darts.

In addition to the twenty bins themselves they made a recharge station with six bays containing magnetic contact points for recharging the batteries, and a heat-seal mega bin which can empty the smaller bins and put new garbage bags into them. They added LED lighting into the floor of the studio which is used to direct the small bins to the mega bin to be emptied automatically at night time when the office lights go out.

If you’re thinking you’ve seen something like this before, we covered something similar back in 2012.

youtube.com/embed/H0XYANRosVo?…

Thanks to [Jack] for sending this one in.


hackaday.com/2025/08/06/automa…



sondaggio noyb: solo il 7% degli utenti vuole che Meta utilizzi i propri dati personali per l'IA Mentre quasi il 75% degli utenti ha sentito parlare dei piani di Meta, solo il 7% vuole effettivamente che i propri dati vengano utilizzati per l'addestramento dell'intelligenza artificiale mickey07 August 2025


noyb.eu/it/noyb-survey-only-7-…



OpenAI Releases gpt-oss AI Model, Offers Bounty For Vulnerabilities


OpenAI have just released gpt-oss, an AI large language model (LLM) available for local download and offline use licensed under Apache 2.0, and optimized for efficiency on a variety of platforms without compromising performance. This is their first such “open” release, and it’s with a model whose features and capabilities compare favorably to some of their hosted services.

OpenAI have partnered with ollama for the launch which makes onboarding ridiculously easy. ollama is an open source, MIT-licensed project for installing and running local LLMs, but there’s no real tie-in to that platform. The models are available separately: gpt-oss-20b can run within 16 GB of memory, and the larger and more capable gpt-oss-120b requires 80 GB. OpenAI claims the smaller model is comparable to their own hosted o3-mini “reasoning” model, and the larger model outperforms it. Both support features like tool use (such as web browsing) and more.

LLMs that can be downloaded and used offline are nothing new, but a couple things make this model release a bit different from others. One is that while OpenAI have released open models such as Whisper (a highly capable speech-to-text model), this is actually the first LLM they have released in such a way.

The other notable thing is this release coincides with a bounty challenge for finding novel flaws and vulnerabilities in gpt-oss-20b. Does ruining such a model hold more appeal to you than running it? If so, good news because there’s a total of $500,000 to be disbursed. But there’s no time to waste; submissions need to be in by August 26th, 2025.


hackaday.com/2025/08/06/openai…



2025 One Hertz Challenge: An Animated Ferrofluid Display


Ferrofluid is fun. You’ve probably seen all kinds of demos with it bouncing around in response to magnetic fields, or dancing near a speaker. [beastie417] decided to turn the entertaining fluid into a display.
The basic concept of the ferrofluid display. Note the header image of this article shows the electromagnet array without the ferrofluid pane in place.
The concept is straightforward enough. First, construct a tank of ferrofluid with a white panel behind it for contrast. Then, place it in front of a grid of electromagnets. Now you have many “pixels” you can turn on and off. You turn a magnet on to attract ferrofluid to that point, and turn it off to let it fall away. Since the ferrofluid contrasts with the white background, you have a viable display!

[beastie417] notes that while the concept is simple, the execution is hard. Ferrofluid can be very difficult to work with, instantly staining many materials like acrylic and even glass that isn’t properly prepared. It can also be quite expensive to construct a display like this, with [beastie417] noting their 16×12 pixel design costing approximately $700 thus far. Then you have to figure out how to drive all the pixels—this project uses DRV8908 coil driver ICs running off a microcontroller which controls the display and handles animations.

We’ve seen some great ferrofluid displays before, like this neat build that could even create readable glyphs. Meanwhile, if you’re doing rad things with the coolest fluid of the new millennium, don’t hesitate to let us know!

2025 Hackaday One Hertz Challenge


hackaday.com/2025/08/06/2025-o…



MORIS and I.R.I.S. was designed for Sheriff's Offices to identify known persons with their iris. Now ICE says it plans to buy the tech.

MORIS and I.R.I.S. was designed for Sheriffx27;s Offices to identify known persons with their iris. Now ICE says it plans to buy the tech.#News #ICE


ICE Is Buying Mobile Iris Scanning Tech for Its Deportation Arm


Immigration and Customs Enforcement (ICE) is looking to buy iris scanning technology that its manufacturer says can identify known persons “in seconds from virtually anywhere,” according to newly published procurement documents.

Originally designed to be used by sheriff departments to identify inmates or other known persons, ICE is now likely buying the technology specifically for its Enforcement and Removal Operations (ERO) section, which focuses on deportations.

Upgrade to continue reading


Become a paid member to get access to all premium content
Upgrade


#News #ice #x27

djpanini reshared this.



America’s scandalous president is teaming up with its most disreputable AI company to make a search engine.#News


Trump Is Launching an AI Search Engine Powered by Perplexity


Donald Trump’s media company is teaming up with Perplexity to bring AI search to Truth Social, the President’s X.com alternative.

Truth announced the endeavor in a press release on Wednesday. Anyone using the browser version of Truth can now use Perplexity to search the web. “We’re proud to partner with Perplexity to launch our public Beta testing of Truth Social AI, which will make Truth Social an even more vital element in the Patriot Economy,” Devin Nunes, Trump Media's CEO and Chair of the President's Intelligence Advisory Board, said in the press release.
playlist.megaphone.fm?p=TBIEA2…
“We’re excited to partner with Truth Social to bring powerful AI to an audience with important questions. Curiosity is the engine of change, and Perplexity’s AI is developed to empower curiosity by delivering direct, reliable answers with transparent citations that allow anyone to dig deeper,” Perplexity’s chief business officer Dmitry Shevelenko said in the press release.

According to the announcement, “the mission of Trump Media is to end Big Tech’s assault on free speech by opening up the Internet and giving people their voices back.” Which is a funny thing to put in an announcement about Trump partnering with a company whose investors include Jeff Bezos, Nvidia, and the former CEO of GitHub.

Perplexity’s Truth Social search engine will be powered by stolen content. Earlier this week, Cloudflare reported Perplexity used stealth and undeclared crawlers to evade websites that explicitly set themselves up to avoid being catalogued by LLMs. Perplexity has a long history of using scrapers that ignore the Robots Exclusion Protocol. Perplexity started as a demo that scraped Twitter with fake academic accounts backed by AI-generated research proposals.

Forbes, the New York Times, New York Post, and the Dow Jones have all accused Perplexity of plagiarism. News Corp‘s Dow Jones & Co., publisher of the Wall Street Journal, and the New York Post sued Perplexity in 2024 for copyright infringement, claiming in the federal lawsuit that Perplexity is “engaging in a massive amount of illegal copying of publishers’ copyrighted works and diverting customers and critical revenues away from those copyright holders.” In 2024, WIRED reported on the accusations of Perplexity’s plagiarism and Perplexity almost immediately plagiarized the story. When New York Times tech workers went on strike last year, Perplexity CEO Aravind Srinivas offered to help the Times keep the paper going.

Big Tech has aligned itself with the Trump administration since before the election, seeing an alliance of opportunity for deregulation of AI in particular.

But is the Perplexity-powered AI aggregation machine “woke?” I asked a few questions to find out. I wanted to know: Is Trump in the Epstein files?“There is no evidence in the recently reviewed and released government ‘Epstein Files’ of a ‘client list” or documentation placing Donald Trump as implicated in Jeffrey Epstein's criminal actions,” it said. “While Trump’s name, like many other prominent individuals, appears in public records of Epstein’s social and business contacts (such as guest lists or flight logs, widely reported over the years), there is no mention in current official documents or filings that directly implicates Trump as a criminal participant in Epstein’s sex trafficking activities.”

How does Truth Social’s search engine think the American economy is doing?

“The American economy is currently facing significant headwinds, with signs of slowdown—most notably by a contraction in GDP, rising inflation, and softening labor market conditions—though some leaders still emphasize areas of resilience,” Truth Search AI said.

Are the tariffs to blame?“Recent tariff increases in the United States have generally had a negative effect on economic growth and employment, raising costs for businesses and consumers while providing only limited benefits to some manufacturing sectors,” Truth Search AI said.

Damn. It’s woke as hell.


#News


Home improvement stores are finding ways to share data from their Flock license plate reader cameras with law enforcement, according to public records.#Flock


Part of Article I Section 8, and all of Sections 9 and 10, which address things like habeas corpus, nobility, and militias, are gone from Congress's website for the Constitution.

Part of Article I Section 8, and all of Sections 9 and 10, which address things like habeas corpus, nobility, and militias, are gone from Congressx27;s website for the Constitution.#archiving #websites #Trumpadministration


Constitution Sections on Due Process and Foreign Gifts Just Vanished from Congress' Website


Congress’ website for the U.S. Constitution was changed to delete the last two sections of Article I, which include provisions such as habeas corpus, forbidding the naming of titles of nobility, and forbidding foreign emoluments for U.S. officials.

The last full version of the webpage, archived by the Internet Archive on July 17, still included the now-deleted sections. Parts of Section 8 of Article I, as well as all of Sections 9 and 10 of Article I are now gone from the live site. The deletions, as of August 6, are also archived here. The change was spotted by users on Lemmy, an open-source aggregation platform and forum.

This webpage, maintained by the U.S. government, hasn’t changed significantly in the entire time it’s been saved by the Internet Archive’s Wayback Machine—since 2019. The page for the Constitution on the National Archives website remains unchanged, and shows the entire document.

The removed portion begins halfway through Section 8. It includes:

To provide and maintain a Navy;

To make Rules for the Government and Regulation of the land and naval Forces;

To provide for calling forth the Militia to execute the Laws of the Union, suppress Insurrections and repel Invasions;

To provide for organizing, arming, and disciplining, the Militia, and for governing such Part of them as may be employed in the Service of the United States, reserving to the States respectively, the Appointment of the Officers, and the Authority of training the Militia according to the discipline prescribed by Congress;

To exercise exclusive Legislation in all Cases whatsoever, over such District (not exceeding ten Miles square) as may, by Cession of particular States, and the Acceptance of Congress, become the Seat of Government of the United States, and to exercise like Authority over all Places purchased by the Consent of the Legislature of the State in which the Same shall be, for the Erection of Forts, Magazines, Arsenals, dock-Yards, and other needful Buildings;–And

To make all Laws which shall be necessary and proper for carrying into Execution the foregoing Powers, and all other Powers vested by this Constitution in the Government of the United States, or in any Department or Officer thereof.

Section 9


The Migration or Importation of such Persons as any of the States now existing shall think proper to admit, shall not be prohibited by the Congress prior to the Year one thousand eight hundred and eight, but a Tax or duty may be imposed on such Importation, not exceeding ten dollars for each Person.

The Privilege of the Writ of Habeas Corpus shall not be suspended, unless when in Cases of Rebellion or Invasion the public Safety may require it.

No Bill of Attainder or ex post facto Law shall be passed.

No Capitation, or other direct, Tax shall be laid, unless in Proportion to the Census or enumeration herein before directed to be taken.

No Tax or Duty shall be laid on Articles exported from any State.

No Preference shall be given by any Regulation of Commerce or Revenue to the Ports of one State over those of another: nor shall Vessels bound to, or from, one State, be obliged to enter, clear, or pay Duties in another.

No Money shall be drawn from the Treasury, but in Consequence of Appropriations made by Law; and a regular Statement and Account of the Receipts and Expenditures of all public Money shall be published from time to time.

No Title of Nobility shall be granted by the United States: And no Person holding any Office of Profit or Trust under them, shall, without the Consent of the Congress, accept of any present, Emolument, Office, or Title, of any kind whatever, from any King, Prince, or foreign State.

Section 10


No State shall enter into any Treaty, Alliance, or Confederation; grant Letters of Marque and Reprisal; coin Money; emit Bills of Credit; make any Thing but gold and silver Coin a Tender in Payment of Debts; pass any Bill of Attainder, ex post facto Law, or Law impairing the Obligation of Contracts, or grant any Title of Nobility.

No State shall, without the Consent of the Congress, lay any Imposts or Duties on Imports or Exports, except what may be absolutely necessary for executing it's inspection Laws: and the net Produce of all Duties and Imposts, laid by any State on Imports or Exports, shall be for the Use of the Treasury of the United States; and all such Laws shall be subject to the Revision and Controul of the Congress.

No State shall, without the Consent of Congress, lay any Duty of Tonnage, keep Troops, or Ships of War in time of Peace, enter into any Agreement or Compact with another State, or with a foreign Power, or engage in War, unless actually invaded, or in such imminent Danger as will not admit of delay.

As people in the Lemmy forum conversation note, this could be a glitch, or some kind of error with the site. But considering the page doesn’t include many dynamic elements, and is mainly a text reprinting of the Constitution, a nearly 240-year-old document that hasn’t changed since the addition of the 27th Amendment in 1992—and that the page itself has barely changed at all in the six years it’s been archived—it’s a noteworthy and sudden move.

The Trump administration does not have any control over Congressional websites, but the sudden disappearance of important parts of the Constitution is happening in the context of a broader government war on information.

Since the Trump administration took office, official federal government websites with public information have come under attack, being taken offline entirely or altered to reflect this administration’s values. This has included critical information promoting vaccines, HIV care, reproductive health options including abortion, and trans and gender confirmation healthcare being purged from the CDC’s live website, thousands of datasets disappearing from Data.gov, and the scrubbing of various documents, employee handbooks, Slack bots, and job listings across government agencies. Some deleted pages across the government were restored following a court order, but the administration then added a note rejecting “gender ideology” to some of them.

Habeas corpus, which is among the now-deleted provisions on the Constitution webpage, allows people to challenge their imprisonment before a judge. In May, Homeland Security Secretary Kristi Noem said before a congressional committee that Trump can remove the Constitutional provision of habeas corpus, calling it “a constitutional right that the president has to be able to remove people from this country and suspend their rights.” Trump has said he’s considering suspending habeas corpus for people detained by ICE.

“That’s incorrect,” Democratic Sen. Maggie Hassan replied to Noem, calling habeas corpus “the foundational right that separates free societies like America from police states like North Korea.”




Stone tools found on the Indonesian island of Sulawesi reveal a long-lost population of human relatives; their identity, and how they crossed the sea, is a mystery.#TheAbstract #science


Million-Year-Old Evidence of Epic Journey Near ‘Hobbit’ Island Discovered by Scientists


Scientists have discovered million-year-old artifacts made by a mysterious group of early humans on the Indonesian island of Sulawesi, according to a breakthrough study published on Wednesday in Nature.

The extraordinary find pushes the archaeological record of Sulawesi back by about 800,000 years, and confirms that hominins, the broader family to which humans belong, crossed treacherous ocean passages to reach the island, where they crafted simple tools.

The tool-makers may have been related to a group of archaic humans—nicknamed “hobbits” for their short stature—that lived on nearby Flores Island. But while the hobbits left behind skeletal remains, no fossils from the Sulawesi group have been unearthed. The tools, found at a site called Calio in South Sulawesi, are the only record of their existence for now.

“The discovery of these ancient stone tools at Calio is another important piece of the puzzle in our understanding of the movements of early hominins from the edge of the Asian landmass into the isolated zone of islands known as Wallacea,” said Adam Brumm, a professor of archaeology at Griffith University and a co-author of the new study, in an email.

“A major question remaining is the identity of the archaic humans of Sulawesi,” he added, noting that they might be Homo erectus, or descendents of this influential early human species that migrated from Africa to Asia. ”But until we have their fossils, who they were will remain a mystery.”
Stone tools dated to over 1.04 million-years-old, scale bars are 10mm. Image: M W Moore
The discovery was made by Budianto “Budi” Hakim, an Indonesian archaeologist who has spent decades searching for traces of archaic humans in Sulawesi. Hakim spotted one of the artifacts while scouring the region’s sandstone outcrops, prompting an excavation that unearthed a total of seven flaked tools crafted from chert rock. The remains of extinct elephants and pigs were also found in the sedimentary layers at the site, hinting at an ancient origin.

The team used two independent methods to date the tools, both of which placed their age at a minimum of 1.04 million years old, making the artifacts the earliest evidence for hominin occupation of Sulawesi by far.

“Budi has been searching for this evidence for much of his life, so it is very exciting indeed,” said Brumm. “But it is not so surprising that we now have evidence for hominins on Sulawesi by one million years ago; we have long suspected that there had been a very deep history of human occupation of this island based on the discovery (in 2010) of stone tools on Flores to the south that date to at least a million years ago. Sulawesi was probably where the first hominins to set foot on Flores actually came from, so it made sense to us that the human presence on Sulawesi would go back at least as far as a million years, if not considerably earlier.”

“And personally, it did not surprise me that Budi unearthed this new find,” he continued. “He is a renowned figure in Indonesian archaeology and undoubtedly has the ‘golden touch.’”

The tools are sharp-edged flakes that were probably cut from larger rocks obtained from a nearby river channel. Like many tools made by hominins across time and regions, they would have been useful for cutting and scraping materials, though their exact purpose is unknown.
playlist.megaphone.fm?p=TBIEA2…
The tools “can’t tell us very much about the behaviour or cognitive capacities of these early humans, other than that they were tool-makers who clearly understood how to choose stones with suitable properties and to fracture them in a controlled way to produce a supply of usable tools,” explained Brumm. “Over the past 2.5 million years, many different hominin species (including our own, Homo sapiens) have made stone tools that are essentially indistinguishable from the Sulawesi tools.”

In addition to their mysterious identity, it is unclear how these early humans crossed ocean waters to reach these island shores, given that the shortest distance between the Asian mainland and Sulawesi would have been 30 miles, at minimum.

“This is too far to swim (in any case the ocean currents are too strong),” Brumm explained. “It is also very unlikely these archaic hominins had the cognitive ability to develop watercraft that were capable of making sea voyages, or indeed of the advanced planning required to gather resources and set sail over the horizon to an unseen land.”

“Most likely, they crossed to Sulawesi from the Asian mainland in the same way rodents and monkeys are suspected to have done; that is, by accident, perhaps as castaways on natural ‘rafts’ of floating vegetation,” he concluded.

It’s incredible to imagine these early humans getting caught up in tides or currents, perhaps stranded at sea for days, only to serendipitously wash up on a vast island that would become home to untold generations. Hakim, Brumm, and their colleagues hope to find more evidence of this long-lost population in the coming years, but for now, the stone tools offer a rare window into the lives of these accidental seafarers and their descendants.




A Robot Controller With The Compute Module 5


The regular Raspberry Pi line is a flexible single-board computer, but sometimes you might find yourself wishing for a form factor that was better designed for installation into a greater whole. This is why the Compute Module variants exist. Indeed, leveraging that intention, [Hans Jørgen Grimstad] has used the powerful Compute Module 5 as the heart of his “Overlord” robot controller.

The Compute Module 5 offers a powerful quad-core 64-bit ARM chip running at 2.4 GHz, along with anywhere from 2 to 16GB of RAM. You can also get it with WiFi and Bluetooth built in onboard, and it comes with a wide range of I2C, SPI, UART, and GPIO pins to serve whatever ends you envision for them. It’s a whole lot of capability, but the magic is in what you do with it.

For [Hans], he saw this as a powerful basis for a robot controller. To that end, he built a PCB to accept the Compute Module 5, and outfit it with peripherals suited to robotics use. His carrier board equips it with an MCP2515 CAN controller and a TJA1051 CAN transceiver, ideal for communicating in a timely manner with sensors or motor controllers. It also has a 9-axis BNO055 IMU on board, capable of sensor fusion and 100Hz updates for fine sensing and control. The board is intended to be easy to use with hardware like Xiaomi Cybergear motors and Dynamixels servos. As a bonus, there is power circuitry on board to enable it to run off anything from 5 to 36V. While GPIOs aren’t exposed, [Hans] notes that you can even pair it with a second Pi if you want to use GPIOs or camera ports or do any other processing offboard.

If you’re looking for a place to start for serious robot development, the Overlord board has plenty of capability. We’ve explored the value of the Compute Module 5 before, too. Meanwhile, if you’re cooking up your own carrier boards, don’t hesitate to let the tipsline know!


hackaday.com/2025/08/06/a-robo…

Joe Vinegar reshared this.



2025 One Hertz Challenge: Square Waves The Way You Want ‘Em


On an old fashioned bench a signal generator was once an indispensable instrument, but has now largely been supplanted by the more versatile function generator. Sometimes there’s a less demanding need for a clock signal though, and one way that might be served comes from [Rupin Chheda]’s square wave generator. It’s a small PCB designed to sit at the end of a breadboard and provide handy access to a range of clocks.

On the board is a crystal oscillator running at the usual digital clock frequency of 32.768 kHz, and a CMOS divider chain. This provides frequencies from 2048 Hz down to 0.5 Hz for good measure. It’s a simple but oh-so-useful board, and we can imagine more than a few of you finding space for it on your own benches.

This project is part of our awesome 2025 One Hertz Challenge, celebrating all the things which strut their stuff once a second. It’s by no means the first to feature a 32.768 kHz divider chain, and if you have a similar project there’s still time to enter.

2025 Hackaday One Hertz Challenge


hackaday.com/2025/08/06/2025-o…



Jenny’s Daily Drivers: FreeDOS 1.4


When I was a student, I was a diehard Commodore Amiga user, having upgraded to an A500+ from my Sinclair Spectrum. The Amiga could do it all, it became my programming environment for electronic engineering course work, my audio workstation for student radio, my gaming hub, and much more.

One thing that was part of my course work it couldn’t do very well, which was be exactly like the PCs in my university’s lab. I feel old when I reflect that it’s 35 years ago, and remember sitting down in front of a Tulip PC-XT clone to compile my C code written on the Amiga. Eventually I cobbled together a 286 from cast-off parts, and entered the PC age. Alongside the Amiga it felt like a retrograde step, but mastering DOS 3.3 was arguably more useful to my career than AmigaDOS.

It’s DOS, But It’s Not MS-DOS

The FreeDOS installation screenWhere do I want to go today?
I don’t think I’ve used a pure DOS machine as anything but an occasional retrocomputing curio since some time in the late 1990s, because the Microsoft world long ago headed off into Windows country while I’ve been a Linux user for a very long time. But DOS hasn’t gone away even if Microsoft left it behind, because the FreeDOS project have created an entirely open-source replacement. It’s not MS-DOS, but it’s DOS. It does everything the way your old machine did, but in a lot of cases better and faster. Can I use it as one of my Daily Drivers here in the 2020s? There is only one way to find out.

With few exceptions, an important part of using an OS for this series is to run it on real hardware rather than an emulator. To that end I fished out my lowest-spec PC, a 2010 HP Mini 10 netbook that I hold onto for sentimental reasons. With a 1.6 GHz single core 32 bit Atom processor and a couple of gigabytes of memory it’s a very slow machine for modern desktop Linux, but given that FreeDOS can run on even the earliest PCs it’s a DOS powerhouse. To make it even more ridiculously overspecified I put a 2.5″ SSD in it, and downloaded the FreeDOS USB installer image.
A screenshot from FreeDOOMOf course a DOS machine runs DOOM, or at least in this case, FreeDOOM.
Installing FreeDOS is simple enough, just a case of booting from the install drive and following the instructions. There’s no automatic disk partitioning, but fortunately due to all that practice in the ’90s I’m a DOS FDISK wizard. I went for the full installation of every FreeDOS package, because with a machine this powerful, why not!

Booting into FreeDOS on a machine this much faster than a DOS-era PC is so fast as to feel almost instantaneous. The tiny size of the executables, the miniscule amount of resources required, and the speed of the SSD ncompared to an MFM or IDE hard drive makes it like no other OS I have tested, not even RiscOS on the Raspberry Pi. It almost doesn’t feel like the DOS I remember!

DOS has two config files for drivers and configuration, and while CONFIG.SYS and AUTOEXEC.BAT have morphed into FDCONFIG.SYS and FDAUTO.BAT they are exactly the same. Yet again, all that experience from the ’90s paid off, and I was immediately at home editing out all the default items relating to things such as a CD-ROM that I just don’t have.

I Wasn’t Networked When I Last Used DOS, And I’m Not This Time Round Either

A screenshot of the Arachne web browser, showing an error.Sadly this was the closest I came to the web on this machine.
Navigating around the DOS command line I found all the different software that had been installed. There’s a package manager called FDIMPLES to manage it all, though since I had everything on my install medium I used it mostly to see what I had. Yes, it comess with DOOM, in fact in two different versions. I’m most interested for my work in using it with an internet connection though, so before I could try Arachne or Dillo to browse the web I needed to set up a network connection. And here I hit my first FreeDOS snag. It comes witht he excellent Crynwyr colelction of DOS network card drivers, but sadly the RealTek chip or the Broadcom wireless card in the HP are both too new to even have a DOS driver. So I could look at Arachne, but not do anything with it.

If I can’t write for Hackaday in a browser on this machine, can I use a word processor? Sadly there’s none included in the package list, but the FreeDOS website suggests Ability Plus. This is a former commercial package now freeware, so I downloaded it and transferred it to the HP. Sadly no matter what memory configurations I tried, I couldn’t get it to run. For a laugh I also tried Microsoft Word 5.5 which also refused to run, but given Microsoft’s shenanigans with DR DOS back in the day, that was hardly a surprise. I’m not giving up though, so this is being written in the FreeDOS editor.

A Distraction-Free Writing Powerhouse


For the past couple of months then, this quaint old laptop with a space-helmeted Wrencher sticker on the front has been my occasional companion. It’s been on the road with me, on the Eurostar through the Channel Tunnel, and into more than one hackerspace. Using DOS again has been an interesting experience, and sometimes frustrating when it comes to mixing up the forward slash and the back slash on returning to Linux, but it’s not been an unpleasant one. For a start, this is probably the fastest-responding computer I own, then there’s the distraction-free aspect of it, with no networking and a single-tasking user interface I have nothing to get in the way of my writing. Oddly I don’t remember my old 286 being like this, but the truth is I must never have appreciated what I had. Getting your work off a DOS machine with no network, floppy, or serial port is a little inconvenient and involves booting from a USB installation medium, but being honest that’s probably less of a chore than using a LapLink serial cable was back in the day.

If you need no-frills and no distraction computing and don’t mind forgoing drivers for all but the most ancient peripherals, then try FreeDOS. If it’s not quite the DOS for you but you still want to put a toe in the open-source DOS water, an alternative might be the DR-DOS derived SvarDOS, and if you want the real thing but don’t mind the version everyone hated, there’s always MS-DOS version 4. For myself though, I think I’ll stick with FreeDOS. Of all the operating systems in this series so far it’s the only one I’m going to hang on to; this little HP will come out of the drawer whenever I need to just go away and write something.


hackaday.com/2025/08/06/jennys…