Hi, This is Enson’s personal blog

I’m currently working at Tencent.

2025-05-14 Hacker News Top Articles and Its Summaries

1. Bus stops here: Shanghai lets riders design their own routes Total comment counts : 33 Summary Shanghai has launched a new public bus system called “DZ” (dingzhi or “customized”), allowing residents to propose and vote for routes based on their commuting needs. With over 220 routes already approved, the system requires 15-20 passengers to initiate a service. Users can submit travel details, with potential routes developed through community input and on-site research....

May 14, 2025 · 12 min

2025-05-13 Hacker News Top Articles and Its Summaries

1. Mozilla Firefox – Official GitHub repo Total comment counts : 39 Summary The article emphasizes the importance of user feedback, stating that all input is seriously considered. It directs readers to the documentation for a complete list of available qualifiers and notes that it is the official repository for Mozilla’s Firefox web browser. Top 1 Comment Summary Mozilla has transitioned the Firefox code repository from Mercurial to GitHub, while Bugzilla remains for issue tracking and Phabricator for code review....

May 13, 2025 · 11 min

2025-05-12 Hacker News Top Articles and Its Summaries

1. I ruined my vacation by reverse engineering WSC Total comment counts : 20 Summary The author shares their experience implementing “defendnot,” a tool to disable Windows Defender via the Windows Security Center (WSC) API. Reflecting on their journey, they highlight challenges faced due to their unique environment while developing this project, following the previous tool “no-defender.” After a DMCA takedown of “no-defender,” the author, now in Seoul, explored the potential for a cleaner version....

May 12, 2025 · 11 min

2025-05-11 Hacker News Top Articles and Its Summaries

1. Observations from people-watching Total comment counts : 44 Summary The author reflects on their experience observing interpersonal dynamics, particularly at weddings. They describe perceiving people’s “internal architecture,” which reveals their emotions and attention levels. Key distinctions are made between genuine happiness and polite interactions, with the former being unpredictable and open while the latter is calculated. The author also notes the importance of pauses in conversation, indicating receptiveness. Self-acceptance is connected to how individuals treat others, and a person’s ability to connect emotionally often correlates with their presence and self-acceptance, affecting their interactions with the world....

May 11, 2025 · 11 min

2025-05-10 Hacker News Top Articles and Its Summaries

1. Vision Now Available in Llama.cpp Total comment counts : 23 Summary The article emphasizes the importance of customer feedback, stating that it is carefully considered. For more information on available qualifiers, it directs readers to the documentation. Top 1 Comment Summary On an M1 MacBook Pro with 64GB RAM, using the gemma-3-4b-it-GGUF model results in prompt processing of 25 tokens/s and token generation of 63 tokens/s, with an overall processing time of about 15 seconds per image....

May 10, 2025 · 9 min

2025-05-09 Hacker News Top Articles and Its Summaries

1. LegoGPT: Generating Physically Stable and Buildable Lego Total comment counts : 34 Summary LegoGPT is an innovative system that generates stable LEGO structures based on user text prompts. It utilizes a large-scale dataset of over 47,000 LEGO designs linked to captions, training a language model to predict brick placements while ensuring physical stability through validity checks and rollback methods. The designs are aesthetically diverse and feasible for human or robotic assembly....

May 9, 2025 · 11 min

2025-05-08 Hacker News Top Articles and Its Summaries

1. How linear regression works intuitively and how it leads to gradient descent Total comment counts : 20 Summary The article explains how linear regression predicts house prices based on size, establishing a relationship between the explanatory variable (size) and the predicted price through a formula characterized by a slope and intercept. It emphasizes the importance of finding the best-fitting line by minimizing errors between predicted and actual prices. The method of absolute error is discussed as a means to measure these discrepancies, with the goal of finding the line that yields the smallest total error, thus refining guesses to achieve optimal pricing for homes....

May 8, 2025 · 10 min

2025-05-07 Hacker News Top Articles and Its Summaries

1. Unity’s Open-Source Double Standard: the ban of VLC Total comment counts : 28 Summary VideoLAN began offering binaries for VLC integration with Unity in 2019, creating a bridge between the Unity engine and VLC multimedia. However, in late 2023, Unity banned their publisher account, despite many other assets using LGPL dependencies being available. In response, VideoLAN established the Videolabs Store to sell VLC for Unity binaries and provide consulting services for LibVLC and FFmpeg....

May 7, 2025 · 10 min

2025-05-06 Hacker News Top Articles and Its Summaries

1. The curse of knowing how, or; fixing everything Total comment counts : 116 Summary The article discusses the gradual transformation of a software user into a developer, sparked by solving small problems. As familiarity with programming grows, frustrations with software flaws intensify, leading to a compulsive drive to create better tools and systems. However, this pursuit becomes a never-ending cycle, as solutions age and break over time, forcing constant maintenance and updates....

May 6, 2025 · 10 min

2025-05-05 Hacker News Top Articles and Its Summaries

1. Technical analysis of the Signal clone used by Trump officials Total comment counts : 24 Summary A Reuters photo shows ousted National Security Advisor Mike Waltz using an unofficial version of the messaging app Signal, called TM SGNL, during a Trump cabinet meeting. This app archives messages, potentially compromising their security. TM SGNL, created by TeleMessage and linked to e-discovery software, allows for end-to-end encrypted communication while storing plaintext versions elsewhere....

May 5, 2025 · 12 min