Feed aggregator

Qt 6.9 Released

Hacker News - Wed, 04/02/2025 - 7:38pm
Categories: Hacker News

Cordic Is All You Need

Hacker News - Wed, 04/02/2025 - 7:36pm

Article URL: https://arxiv.org/abs/2503.11685

Comments URL: https://news.ycombinator.com/item?id=43563070

Points: 1

# Comments: 0

Categories: Hacker News

Elevenlabs: Text-to-Bark

Hacker News - Wed, 04/02/2025 - 7:35pm

Article URL: https://elevenlabs.io/text-to-bark

Comments URL: https://news.ycombinator.com/item?id=43563053

Points: 1

# Comments: 0

Categories: Hacker News

Ask HN: Lambda Labs 390x bill

Hacker News - Wed, 04/02/2025 - 7:34pm

Hi HN,

I signed up to lamda labs because I wanted to try their GH200 instance which I couldn't in Google Colab.

I started the instance, went inside Jupyter and played with it, forgot about it.

Now they hit me with a $583 bill:

,,your account had a running 1xGH200 instance attached to it from 3/9/2025 through to 3/25/2025, for a total of 391.32 hours of usage totaling $583.06. Lambda does not distinguish between idle and in use instance states, so any time that a running instance is attached to a customer's account will be billed for.''

I told them that it was a mistake and I didn't even log into the instance, just tried some models from Huggingface for 1 hour, but it seems like they genualy don't care of 390x overbilling me.

I asked them whether other people who just tried them had this problem and suggested them to auto-stop instances and limit them by default, but the support person hasn't answered this.

They seem like a very shady company for this amount of overbilling. I can of course tell this to my bank and issue a charge back, but is there some other way to handle this? I wouldn't have had problem paying a few hours more than my usage, but this bill looks outrageous to me for the amount of compute I used.

Comments URL: https://news.ycombinator.com/item?id=43563049

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: OC Maker

Hacker News - Wed, 04/02/2025 - 7:28pm

I just made the cutest AI-powered OC maker! Feel free to design your original characters and use them in your storytelling or animation!

Comments URL: https://news.ycombinator.com/item?id=43562993

Points: 2

# Comments: 0

Categories: Hacker News

Ask HN: How do these tariffs affect Apple iPhone?

Hacker News - Wed, 04/02/2025 - 7:24pm

In the case where Apple is avoiding the US tax man by registering the company in Ireland and claiming that all its intellectual property is owned by its Irish subsidiary, how do these new tariffs affect Apple? Will Apple have to raise the iPhone price in US price by 10% to pay the taxman? Because now technically it is an Irish product being imported into the US. In that case, can I just buy a new iPhone on my next visit to …say, Dubai duty free lounge?

Comments URL: https://news.ycombinator.com/item?id=43562972

Points: 1

# Comments: 0

Categories: Hacker News

Show HN: PythonECG – A minimal real-time ECG visualization tool

Hacker News - Wed, 04/02/2025 - 7:23pm

I built a lightweight Python application that visualizes audio input as an ECG-like display. It's a simplified, open-source tool designed for educational purposes, signal visualization experiments, and prototyping. No commercial restrictions, just a clean interface with a single button to start/stop tracing. Built with PyAudio, Matplotlib, and Tkinter. Looking for feedback and contributions!

Comments URL: https://news.ycombinator.com/item?id=43562963

Points: 2

# Comments: 0

Categories: Hacker News

Which Nintendo Switch Accessories Will Work With the Nintendo Switch 2?

CNET Feed - Wed, 04/02/2025 - 7:02pm
The next-gen Switch console has many physical changes, but that doesn't mean you'll have to get rid of all your gear for the original Switch.
Categories: CNET

Smashing Security podcast #411: The fall of Troy, and whisky barrel scammers

Graham Cluely Security Blog - Wed, 04/02/2025 - 7:00pm
Renowned cybersecurity expert Troy Hunt falls victim to a phishing attack, resulting in the exposure of thousands of subscriber details, and don't lose your life savings in a whisky scam... All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault. Plus! Don't miss our featured interview with Alastair Paterson, CEO and co-founder of Harmonic Security, discussing how companies can adopt Generative AI without putting their sensitive data at risk.
Categories: Graham Cluely

Cisco Enterprise Chat and Email Denial of Service Vulnerability

Cisco Security Advisories - Wed, 04/02/2025 - 7:00pm
A vulnerability in chat messaging features of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.<br><br> This vulnerability is due to improper validation of user-supplied input to chat entry points. An attacker could exploit this vulnerability by sending malicious requests to a messaging chat entry point in the affected application. A successful exploit could allow the attacker to cause the application to stop responding, resulting in a DoS condition. The application may not recover on its own and may need an administrator to manually restart services to recover.<br><br> Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.<br><br> This advisory is available at the following link:<br><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-tC6m9GZ8">https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-tC6m9GZ8</a><br><br> <br/>Security Impact Rating: High <br/>CVE: CVE-2025-20139
Categories: Cisco

Cisco Meraki MX and Z Series AnyConnect VPN Denial of Service Vulnerability

Cisco Security Advisories - Wed, 04/02/2025 - 7:00pm
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z Series devices could allow an authenticated, remote attacker to cause a denial of service (DoS) condition in the Cisco AnyConnect service on an affected device. To exploit this vulnerability, the attacker must have valid VPN user credentials on the affected device.<br><br> This vulnerability exists because a variable is not initialized when an SSL VPN session is established. An attacker could exploit this vulnerability by supplying crafted attributes while establishing an SSL VPN session with an affected device. A successful exploit could allow the attacker to cause the Cisco AnyConnect VPN server to restart, resulting in the failure of the established SSL VPN sessions and forcing remote users to initiate a new VPN connection and reauthenticate. A sustained attack could prevent new SSL VPN connections from being established.<br><br> <strong>Note:</strong> When the attack traffic stops, the Cisco AnyConnect VPN server recovers without manual intervention.<br><br> Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.<br><br> This advisory is available at the following link:<br><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-vNRpDvfb">https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-meraki-mx-vpn-dos-vNRpDvfb</a><br><br> <br/>Security Impact Rating: High <br/>CVE: CVE-2025-20212
Categories: Cisco

Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerabilities

Cisco Security Advisories - Wed, 04/02/2025 - 7:00pm
Multiple vulnerabilities in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow a remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected system.<br><br> For more information about these vulnerabilities, see the <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnmpi-sxss-GSScPGY4?vs_f=Cisco Security Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerabilities%26vs_k=1#details">Details</a> section of this advisory.<br><br> Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.<br><br> This advisory is available at the following link:<br><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnmpi-sxss-GSScPGY4">https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnmpi-sxss-GSScPGY4</a><br><br> <br/>Security Impact Rating: Medium <br/>CVE: CVE-2025-20120,CVE-2025-20203
Categories: Cisco

Pages