Posts
2734
Following
681
Followers
1505
"I'm interested in all kinds of astronomy."
@bert_hubert ...and there is someone to blame if an accepted advice turns out to be wrong
0
0
0
repeated

bert hubert πŸ‡ΊπŸ‡¦πŸ‡ͺπŸ‡ΊπŸ‡ΊπŸ‡¦

Things aren't looking well with the world, but treat yourself to this AWESOME list of accepted talks over at @why2025camp - just SO much goodness! (and two talks from me, which I will be doing my utmost to also make awesome). This will also be streamed live for the world: https://vote.why2025.org/why2025

1
5
0
repeated

My Unix Archive mirror was slaughtered by LLMs overnight, it is on a 10G link, they were taking over 1Gbps in requests to the same files over and over again.

I have Geo-blocked the whole of the US to stop them (with PF).

This is ridiculous.

2
5
0
repeated

watt-hours per memory corruption bug

2
7
0
repeated
repeated

Spotted a reverse engineering boutique at Zurich main station

2
9
0
repeated
repeated

In programming the hard part isn't solving problems, but deciding what problems to solve.

β€” Paul Graham

0
1
0
repeated

bert hubert πŸ‡ΊπŸ‡¦πŸ‡ͺπŸ‡ΊπŸ‡ΊπŸ‡¦

The attempts by law enforcement & governments to subvert end-to-end encryption are ongoing. The European Commission is going to spend a year thinking about their new "Roadmap for law enforcement access to data", and they are (genuinely) asking for people to join their expert group to help. Here I urge you to join that group (also because I can't): https://berthub.eu/articles/posts/possible-end-to-end-to-end-come-help/

3
16
0
repeated

this year is, again, fabulous. Highly recommended to attend.

1
3
0
repeated

Are we bleeding out? Enjoy our analysis of CitrixBleed 2, aka CVE-2025-5777 - the "new" Citrix NetScaler Memory Leak vulnerability.

We've been using this mechanism to identify vulnerable systems, and hope it helps the teams that need it.. enjoy!

https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777

0
5
0
repeated

Misroute materials.

0
1
0
repeated

Hello you fine Internet folks,

Today's article is on Nvidia's RTX PRO 6000 Blackwell and diving into the Blackwell architecture generally and more specifically into the GB202 GPU die in the RTX PRO 6000.

Hope y'all enjoy!

https://chipsandcheese.com/p/blackwell-nvidias-massive-gpu

https://old.chipsandcheese.com/2025/06/28/blackwell-nvidias-massive-gpu/

0
2
0
repeated

First, solve the problem. Then, write the code.

β€” John Johnson

0
3
0
repeated

Funny FPU trick I discovered yesterday to detect arm64 or x86_64 architecture at runtime

5
7
0
repeated

There was recently an article about using salvaged Sun Ray thin clients with a modern server. @bcantrill's response to that article on Hacker News mentioned his story about using DTrace to debug a performance problem on a Sun Ray server. He linked to a paper he wrote for Usenix, but I prefer his extended telling in this 2007 talk: https://www.youtube.com/watch?v=TgmA48fILq8&t=35m6s

1
5
0
repeated

bert hubert πŸ‡ΊπŸ‡¦πŸ‡ͺπŸ‡ΊπŸ‡ΊπŸ‡¦

If you like that kind of thing, my presentation "Save the world, write more efficient code" from @joyofcoding is online now! https://youtu.be/XntLynSlYjI?t=203

1
6
0
repeated

a blog post by my friend eevee which is, y’know, preaching to the choir about exactly what you think, but. yeah. https://eev.ee/blog/2025/07/03/the-rise-of-whatever/

7
11
0
Show older