Connect with us
DAPA Banner

Tech

Build This Open-Source Graphics Calculator

Published

on

Graphics calculators are one of those strange technological cul-de-sacs. They rely on outdated technology and should not be nearly as expensive as they are, but market effects somehow keep prices well over $100 to this day. Given that fact, you might like to check out an open-source solution instead.

NumOS comes to us from [El-EnderJ]. It’s a scientific and graphic calculator system built to run on the ESP32-S3 with an ILI9341 screen. It’s intended to rival calculators like the Casio fx-991EX ClassWiz and the TI-84 Plus CE in terms of functionality. To that end, it has a full computer algebra system and a custom math engine to do all the heavy lifting a graphic calculator is expected to do, like symbolic differentiation and integration. It also has a Natural V.P.A.M-like display—if you’re unfamiliar with Casio’s terminology, it basically means things like fractions and integrals are rendered as you’d write them on paper rather than in uglier simplified symbology.

If you’ve ever wanted a graphics calculator that you could really tinker with down to the nuts and bolts, this is probably a great place to start. With that said, don’t expect your local school or university to let you take this thing into an exam hall. They’re pretty strict on that kind of thing these days.

Advertisement

We’ve seen some neat hacks on graphics calculators before, like this TI-83 running CircuitPython. If you’re doing your own magic with these mathematical machines, don’t hesitate to notify the tips line.

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Tech

Marathon review: Bungie’s extraction shooter lacks compelling reasons to play it

Published

on

Why you can trust TechRadar


We spend hours testing every product or service we review, so you can be sure you’re buying the best. Find out more about how we test.

With its incredibly expressive and vibrant art direction, there’s a lot to like about extraction shooter Marathon from an aesthetic standpoint. Its own brand of brightly colored science fiction is a sight to behold, and there’s a real sense of wonder in the first few hours as you explore each of the three early maps, soaking it all in.

Review info

Platform reviewed: PC
Available on: PS5, Xbox Series X|S, PC
Release date: March 5, 2026

Advertisement

Source link

Continue Reading

Tech

Claude Code and Cowork can now use your computer

Published

on

Anthropic announced today that its Claude Code and Claude Cowork tools are being updated to accomplish tasks using your computer. The latest update will see these AI resources become capable of opening files, using the browser and running dev tools.

When enabled, the Claude AI chatbot will first prioritize connectors to supported services such as the Google workplace suite or Slack, but if a connector isn’t available, it will be able to still execute an assigned task. Claude should ask for permission before taking these actions, but Anthropic still recommended not using this feature to handle sensitive information as a precaution.

Claude computer use will initially be available to Claude Pro and Claude Max subscribers on macOS. This feature is still in a research preview, so will continue to be adjusted based on Anthropic’s user feedback. It will also support use with Anthropic’s Dispatch feature, which allows a person to message the chatbot in a single continuous conversation across phone and desktop.

Claude Cowork was introduced in January. It’s an iteration of the Claude Code AI agent for programmers that is designed for more casual users.

Advertisement

Source link

Continue Reading

Tech

Television giants team up against dominant streaming OS & Apple TV

Published

on

The Association of Commercial Television and Video on Demand Services called on the EU antitrust chief to bring DMA-style regulation to set-top boxes — Apple TV also mentioned for some reason.

Apple TV set-top box under a monitor, back lit, with the Siri Remote in front of it
Apple TV targeted by TV group

The Apple TV set-top box is likely the best way to access and stream media, but that performance comes at a price. So, like other markets Apple is involved in, consumers trend toward cheaper options.
However, because of Apple’s control over its ecosystem, it is often grouped in with other market leaders regardless of reported market share estimates. According to a report from Reuters, the Association of Commercial Television and Video on Demand Services in Europe (ACT) has asked EU antitrust chief Teresa Ribera to have set-top boxes and smart TVs under the DMA as gatekeepers.
Continue Reading on AppleInsider | Discuss on our Forums

Source link

Continue Reading

Tech

Mazda discloses security breach exposing employee and partner data

Published

on

Mazda discloses security breach exposing employee and partner data

Mazda Motor Corporation (Mazda) announced that information belonging to its employees and business partners had been exposed in a security incident detected last December.

Mazda is one of Japan’s largest automotive manufacturers, with an annual production of 1.2 million vehicles and revenue of nearly $24 billion.

The company said the attackers exploited a vulnerability in a system related to warehouse management for parts procured from Thailand. The system did not contain any customer data. Also, the breach is limited to 692 records.

“Mazda Motor Corporation has identified traces of unauthorized external access to a management system used for warehouse operations related to parts procured from Thailand,” reads Mazda’s announcement.

Advertisement

“Following this discovery, the Company promptly reported the matter to the Personal Information Protection Commission – an external bureau of the Japanese Cabinet Office – and implemented appropriate security measures and conducted an investigation in cooperation with an external specialist organization.”

The investigation revealed that the potentially exposed information includes the following data types:

  • User IDs
  • Full names
  • Email addresses
  • Company names
  • Business partner IDs

Although Mazda says it has detected no misuse of that information, the company recommends that impacted individuals remain vigilant because the risk of phishing attacks and scams targeting them is significant.

Apart from notifying the authorities, Mazda also implemented additional security measures on its IT systems, including reducing internet exposure, applying security patches, increasing monitoring for suspicious activity, and introducing stricter access policies.

At the time of writing, no ransomware group has publicly claimed the attack on the Japanese company.

Advertisement

BleepingComputer has contacted Mazda to learn more about the incident, and we will update this post with an official response as soon as it reaches us.

Although a data breach was never officially confirmed by Mazda, the Clop ransomware group in November 2025 posted Mazda.com and MazdaUSA.com on its data leaks site, claiming it compromised both the Japanese automaker and its U.S. subsidiary.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

Source link

Advertisement
Continue Reading

Tech

Linux Fu: UPNP A Port Mapping Odyssey

Published

on

If you’ve ever run a game server or used BitTorrent, you probably know that life is easier if your router supports UPnP (Universal Plug and Play). This is a fairly old tech — created by a standards group in 1999 — that allows a program to open an incoming port into your home network. Of course, most routers let you do this manually, but outside of the Hackaday universe, most people don’t know how to log into their routers, much less how to configure an open UDP port.

I recently found myself using a temporary setup where I could not access the router directly, but I needed some open ports. That got me thinking: if a program can open a port using UPnP, why can’t I? Turns out, of course, you can. Maybe.

Caveats

The first thing, of course, is that you need your firewall open, but that’s true no matter how you open up the router. If the firewall is in the router, then you are at the mercy of the router firmware to realize that if UPnP opens something up, it needs to open the firewall, too.

You might think, “Of course it will do that.” However, I’ve found there is a lot of variation in the firmware from different vendors, and if you aren’t in control of the router, it is more likely to have buggy firmware.

Advertisement

The other caveat is that the router needs UPnP enabled; if it isn’t and you have to get into it anyway, you might as well set up port forwarding in the usual way. I was in luck. The router I was behind had UPnP turned on.

In Theory

There are several libraries aimed at working with UPnP and many of them come with simple test clients. I decided to install miniupnpd, which has the upnpc utility. You don’t have to be root to run it. In theory, it should be very simple to use. You can use -l to list all the router’s current UPnP ports. The -a option adds a port, and -d deletes it. There are a few other options, but that covers most of the common use cases.

So, to open external port 2222 to port 22 on 192.168.1.133 you should be able to say:

upnpc -e 'HaD Test' -a 192.168.1.133 22 2222 tcp 3600

The -e option lets us make up a creative title for the mapping. The 3600 is the number of seconds you need the port open. Easy, right? Well, of course not.

Advertisement

Under the Hood

UPnP covers several different areas, including IP assignment and streaming media. However, the part of it we are using is for NAT traversal. Your router identifies as an Internet Gateway Device that other UPnP-aware programs can locate.

Unfortunately, there are two versions of the gateway device specification, and there are many compatibility problems. You are also at the mercy of the vendor’s correct interpretation of the spec.

UPNP has been known to be a security risk. In 2011, a tool appeared that let some UPnP devices map ports when asked from outside your network. Easy to imagine how that could be a bad thing.

UPNP devices advertise services that others can use, and, hopefully, your router advertises that it is a gateway. The advertisement itself doesn’t tell you much. But it does let you fetch an XML document that describes the device.

Advertisement

For example, part of my XML file looks like this:

11urn:schemas-upnp-org:device:InternetGatewayDevice:1OpenWRT routerOpenWRT
http://www.openwrt.org/OpenWRT routerOpenWRT router1
http://www.openwrt.org/00000000uuid:00000000-0000-0000-0000-000000000000
urn:schemas-upnp-org:service:Layer3Forwarding:
1urn:upnp-org:serviceId:L3Forwarding1/L3F.xml/ctl/L3F/evt/L3Furn:
schemas-upnp-org:device:WANDevice:1WANDeviceMiniUPnPhttp://miniupnp.free.fr/WAN DeviceWAN Device20260105
...

In Practice

There are a few strange things about the way upnpc works. First, when you do a list, you’ll get an error at the end. Apparently, that’s normal. The program simply asks for entry zero, one, two… until it gets an error (a 713 error).

However, when I tried to add an open port to this particular router, it always failed, giving me an error that implied that the port was already in use. Of course, it wasn’t.

Through experimentation, I figured out that the UPnP service on the router (the one I can’t get into) isn’t running as root. So any port number less than 1,024 is unmappable in either direction. Of course, this may not be a problem for you if you have a sane router. You could argue whether this is a bug or not, but it certainly didn’t give a good error message.

Advertisement

Testing, One, Two…

Just to do a simple test, I issued the following command. (with my firewall off, just for testing):

upnpc -e HADTEST -a 192.168.1.133 8022 8023 tcp 3600

I verified the port opening using the -l option. Then I stood up a really dumb telnet-style server on the local port (8022):

socat readline TCP-LISTEN:8022,reuseaddr,fork

From a machine on another network, I issued a telnet command to my public IP (198.37.197.21):

Advertisement
telnet 198.37.197.21 8023

Of course, I could have used 8022 for both ports, but I wanted it to be clear which argument was which. At this point, typing some things on the remote machine should show right up on the local machine, punching through the firewall.

In case you forgot, you can escape out of Telnet using Control-] and then a “q” will close the program. You can also just terminate the socat program on the local side.

More Than One Way

It is a bummer I couldn’t open up an ssh port using this method, although you can run sshd on a high port and get there that way. But it is better than nothing. Better still would have been to replace the router, but that wasn’t an option in this case.

There are other tools out there if you are interested. NAT-PMP is easy to use from Python, for example. There’s also something called PCP (not the performance co-pilot, which is something else). Many routers don’t support either of these, and we hear that implementations are often buggy, just like UPnP.

Advertisement

For the record, NAT-PMP didn’t give me a better error message, either. So the moral is this: if you can, just punch a hole in your router the old-fashioned way. But if you can’t. Linux almost always gives you another option.

Source link

Advertisement
Continue Reading

Tech

United States FCC bans import of all new foreign-made consumer routers

Published

on

After pressure from regulatory committees about fears of Chinese spies and botnets, the FCC has placed a ban on all new foreign-made consumer routers.

Three tri-band routers side-by-side, white cylinders with the number 7 engraved in the surface
TP-Link may be affected by latest US ban

Regulators have become increasingly interested in routers after Chinese brands took more than 65% market share during the pandemic. US router makers like Netgear pushed back with lawsuits and lobbying, and it seems to have borne some fruit, though the result may cause problems for everyone.
According to a report from Reuters, the FCC has deemed all foreign-made routers a national security concern. This seems to imply that the United States wants all routers manufactured in the country via “secure supply chains.”
Continue Reading on AppleInsider | Discuss on our Forums

Source link

Continue Reading

Tech

Delve halts demos, Insight Partners scrubs investment post amid ‘fake compliance’ allegations

Published

on

Delve, a Y Combinator-backed compliance startup accused of fabricating certifications for its customers, has disabled the “book a demo” feature on its website.

The controversy, detailed last week in a Substack post by an anonymous whistleblower known as “DeepDelver,” has also apparently led Insight Partners to scrub an article explaining its $32 million investment in the startup. DeepDelver, who claims to be a former client, alleged that Delve, which was valued at $300 million during its Series A funding round last year, fabricated compliance data for its customers.

The original text of the article, written by Insight Partners managing directors Teddie Wardi and Praveen Akkiraju, among others, and titled, “Scaling AI-native compliance: How Delve is saving companies time and money on compliance busywork,” remains viewable here via the Wayback Machine, an internet archive that preserves snapshots of web pages.

Delve’s co-founders Karun Kaushik and Selin Kocalar, as well as Insight Partners, did not immediately respond to TechCrunch’s request for comment.

Advertisement

On its website, Delve claims to have helped customers such as Microsoft, Chase, PayPal, American Express, and the AI search company Perplexity cut “hundreds of hours” of compliance busywork. However, it remains unclear how many of these companies are still active users of the platform.

Founded in 2023, Delve says it leverages AI to automate the process of obtaining security and regulatory certifications, including SOC 2, HIPAA, and GDPR — standards that govern data security, health information privacy, and European data protection, respectively.

In their Substack post, DeepDelver alleged that Delve “fabricated evidence of board meetings, tests, and processes that never happened,” then forced customers to “choose between adopting fake evidence or performing mostly manual work with little real automation or AI.”

Techcrunch event

Advertisement

San Francisco, CA
|
October 13-15, 2026

The post further alleges that Delve’s platform rubber-stamps its own reports rather than undergoing a second layer of independent auditing.

Advertisement

Delve responded to the accusations by saying it does not issue compliance reports at all, and that instead it is an “automation platform” that ingests information about compliance and then provides auditors with access to that information.

Delve also said that its customers “can opt to work with an auditor of their choosing or opt to work with one from Delve’s network of independent, accredited third-party audit firms.” Those auditors, the startup said, are “established firms used broadly across the industry, including by other compliance platforms.”

In response to the accusation that it’s providing customers with “fake evidence,” Delve countered that it’s simply offering “templates to help teams document their processes in accordance with compliance requirements, as do other compliance platforms.”

While the company is denying DeepDelver’s allegations, the disabling of the “book a demo” function and the scrubbing of Insight Partners’ investment thesis article suggest that the startup is in damage control, and that investors may be distancing themselves from the company.

Advertisement

Source link

Continue Reading

Tech

Trucker Caught Free Wheeling Over 60 Miles Without A Tire

Published

on





Ask most truckers about their must-haves in a good semi-truck, and you might get answers like quality seats, a reliable power supply, and practical storage space. Having tires on the wheels might seem like too obvious an answer, although it seems one trucker in Canada didn’t have “make sure all the tires are still there” on their checklist. The Ontario Provincial Police recently issued a warning on social media to remind drivers that they should always check their tires before traveling after pulling over a truck on Highway 17. According to the post, the truck had driven more than 60 miles with one tire missing.

The driver of the vehicle is now facing multiple charges of unsafe operation of a vehicle as a result. According to CTV News, the unnamed 41-year-old driver was from Calgary, while the tractor and trailer were operated by a company in Steinbach. The company was also hit with charges due to the vehicle’s unsafe condition. Police took the vehicle off the road after the stop, with repairs required before it could resume service.

Advertisement

U.S. truckers can remove one tire in certain situations

Road rules can vary between the U.S. and Canada, and there are plenty of common U.S. driving habits that can get you a ticket north of the border. According to the Federal Motor Carrier Safety Administration, U.S. truckers are allowed to remove one defective tire from a set of dual tires as long as the weight on the remaining tires does not exceed the legal limit.

However, that is assuming they have four tires on an axle to begin with. Images provided by the Ontario Provincial Police show the stopped truck did not have dual tires, leaving one rim in contact with the road. As such, it would have quickly attracted the attention of local law enforcement on either side of the border.

Advertisement

Even drivers who meticulously keep track of the condition of their tires will eventually have to replace them, and changing a truck tire is harder than you’d think. Attempting to change a semi-truck tire without knowing what you’re doing can result in injury, and so it’s best left to the professionals.



Advertisement

Source link

Continue Reading

Tech

Venus Flytrap Takes Ride Through A Particle Accelerator

Published

on

In the blue corner, we have the VENUS FLYTRAP! In the red corner, we have the underdog of the century, AN ENTIRE PARTICLE ACCELERATOR. Yes, you read that right. When you have a particle accelerator, it’s only second nature to throw anything you can into it. That’s why [Electron Impressions] put a poor fly-eating trap into their accelerator.

Chloride and potassium ions leaving cause osmotic pressure in neighboring cells

The match-up isn’t quite as arbitrary as it might seem at first. The flytrap’s main mechanism of trapping and digesting insects relies heavily on intracellular ion movement. Many cells along the inside of the trap have hair-activated calcium channels that respond to a fly landing on its surface. This ion movement then creates an action potential, which propagates along the entire surface, triggering closing. As the potential moves across different cells, other ions leave and create osmotic pressure. This pressure is what creates the mechanical movement.

Of course, this makes it no surprise when the plant finds itself under the ionizing radiation that every single head closes at once. While this is a cool demonstration, there is a slight side effect of killing every single cell by ripping apart the trap’s DNA.

Well, who would have guessed that the underdog accelerator would have won… Anyways, the DNA being ripped apart is far from ideal for repeatability. If you want to learn more about genetic features that SHOULD be repeated, then make sure to check out the development of open-source insulin!

Advertisement

Source link

Advertisement
Continue Reading

Tech

Bluesky reveals it quietly raised $100m Series B back in April 2025

Published

on

Only revealed publicly last week, X rival Bluesky has confirmed it raised a $100m Series B round in April last year under Jay Graber, led by Bain Capital Crypto.

The April 2025 funding round was led by Bain Capital Crypto, with participation from Alumni Ventures, Anthos Capital, Bloomberg Beta, Knight Foundation and True Ventures.

“In the months since, we’ve focused on scaling our team to meet the rapid growth of both the AT Protocol (atproto) and Bluesky app,” Bluesky said in a statement revealing the funding. “We’re excited to share more as we move into a new era of leadership and further growth.”

Bluesky confirmed the raise was led by Jay Graber, who recently announced she was stepping aside as CEO to become chief innovation officer and to focus on “building the future of open social infrastructure”.

Advertisement

It said the funding has given the social media platform “the foundation upon which to build the future of the open social web without compromising our mission and values”.

Bluesky raised its Series A round in October 2024, and has since grown from 13m users to more than 43m. Bluesky says the “Atmosphere” – the ecosystem of builders, apps and users on atproto – has also been expanding.

“Every week, people use over a thousand apps built on atproto,” the statement said. “Every month, we see over 400,000 SDK downloads. The Atmosphere currently contains about 20bn public records – the posts, likes, comments and other interactions that bring the ecosystem to life.”

Bluesky was first announced in 2019 as a Twitter-funded project that aimed to create an “open and decentralised standard for social media”. It began as an invite-only app and had more than 3m sign-ups before it went open access.

Advertisement

Graber had led the decentralised social media platform since 2021, having worked on it when it was a research project.

On March 9 she said Bluesky needed “a seasoned operator focused on scaling and execution”, while she returns to what she does best – “building new things”.

“As part of this transition, Toni Schneider, former CEO of Automattic [the company behind WordPress] and partner at True Ventures, will join our team as interim CEO, while our board runs a search for a permanent chief executive,” said Graber.

When Elon Musk’s ownership of X led to the removal of moderators and previously banned extreme voices were allowed back onto the platform, many flocked to Bluesky as a more palatable social network, and it saw rapid growth in users. However, in recent times its growth has slowed somewhat, although it has a considerable user base of 43m.

Advertisement

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

Source link

Advertisement
Continue Reading

Trending

Copyright © 2025