With the release of new AI models that are better at coding, developers are increasingly using AI to generate code. One of the newest examples is the current batch coming out of Y Combinator, the storied Silicon Valley startup accelerator. A quarter of the W25 startup batch have 95% of their codebases generated by AI, … Continue reading A quarter of startups in YC’s current cohort have codebases that are almost entirely AI-generated
Computing
Hugging Face’s chief science officer worries AI is becoming ‘yes-men on servers’
AI company founders have a reputation for making bold claims about the technology’s potential to reshape fields, particularly the sciences. But Thomas Wolf, Hugging Face’s co-founder and chief science officer, has a more measured take. In an essay published to X on Thursday, Wolf said that he feared AI becoming “yes-men on servers” absent a … Continue reading Hugging Face’s chief science officer worries AI is becoming ‘yes-men on servers’
Meta thinks it’s a good idea for students to wear Quest headsets in class
Meta continues to face scrutiny regarding its handling of younger users on its platforms, but the company is also gearing up to introduce new products targeting this demographic. In a recent blog post, Meta announced plans to launch an education-focused product for its Quest VR headset later this year, positioning the device as an essential … Continue reading Meta thinks it’s a good idea for students to wear Quest headsets in class
Investors are growing increasingly weary of AI
The AI sector, once awash in easy capital, now faces a sobering reality check. According to a recent report from Stanford’s Institute for Human-Centered Artificial Intelligence (HAI), which closely monitors AI trends, global investment in AI experienced a decline for the second consecutive year in 2023. The report highlights a downturn in both private investment—such … Continue reading Investors are growing increasingly weary of AI
Z shell and Bash shell on MacOS
The Z shell (Zsh) is a Unix shell that can be used as an interactive login shell and as a command interpreter for shell scripting. Zsh is an extended Bourne shell with many improvements, including some features of Bash, ksh, and tcsh. In June 2019, Apple announced that the forthcoming macOS Catalina (10.15) would adopt … Continue reading Z shell and Bash shell on MacOS
Data persistence in Docker container
Containers are supposed to be light-weighted. Adding unnecessary data will make it heavy to create and run. Docker provides several ways to mount storage from the host machine to containers. Volumes are the most commonly used one. It can be used to persist application data, and also share data between multiple containers as well. (local … Continue reading Data persistence in Docker container
The renaissance of silicon will create industry giants
Every time we binge on Netflix or install a new internet-connected doorbell to our home, we’re adding to a tidal wave of data. In just 10 years, bandwidth consumption has increased 100 fold, and it will only grow as we layer on the demands of artificial intelligence, virtual reality, robotics and self-driving cars. According to … Continue reading The renaissance of silicon will create industry giants
Apple is suing Corellium
Apple is suing virtualization software company Corellium, according to documents filed today in Florida. Corellium allows customers to create and interact with virtual iOS devices — a software iPhone, for example, running actual iOS firmware, all within the browser. Apple says this is copyright infringement, and is demanding Corellium stops “all uses of” its iOS … Continue reading Apple is suing Corellium
With the acquisition closed, IBM goes all in on Red Hat
IBM’s massive $34 billion acquisition of Red Hat closed a few weeks ago and today, the two companies are now announcing the first fruits of this process. For the most part, today’s announcement further IBM’s ambitions to bring its products to any public and private cloud. That was very much the reason why IBM acquired … Continue reading With the acquisition closed, IBM goes all in on Red Hat
How to Setup Reverse SSH Tunnel on Linux
Reverse SSH is a technique that can be used to access systems (that are behind a firewall) from the outside world. As you already know SSH is a network protocol that supports cryptographic communication between network nodes. Using this protocol, you can do a secure remote login, secure copy from/to a remote machine etc. You’ll … Continue reading How to Setup Reverse SSH Tunnel on Linux