Distill Hiatus

Over the past five years, Distill has supported authors in publishing artifacts that push beyond the traditional expectations of scientific papers. From Gabriel Goh’s interactive exposition of momentum, to an ongoing collaboration exploring self-organizing systems, to a community discussion of a highly debated paper, Distill has been a venue for authors to experiment in scientific […]

15 mins read

Why did Stripe build Sorbet? (~2017).

Many hypergrowth companies of the 2010s battled increasing complexity in their codebase by decomposing their monoliths. Stripe was somewhat of an exception, largely delaying decomposition until it had grown beyond three thousand engineers and had accumulated a decade of development in its core Ruby monolith. Even now, significant portions of their product are maintained in […]

11 mins read

What you should play on Apple Arcade

It’s been nearly six years since Apple Arcade launched, and while the service hasn’t fully delivered on Apple’s promise back in 2019, it can still be worth paying for. Of course, that’s provided you’re willing to hunt through the 200-ish games currently available on the service. I’ve been playing Apple Arcade games since it launched […]

24 mins read

The State Department office countering foreign disinformation is being eliminated, officials say

The Counter Foreign Information Manipulation and Interference (R/FIMI) Hub is a small office in the State Department’s Office of Public Diplomacy that tracks and counters foreign disinformation campaigns.  In shutting R/FIMI, the department’s controversial acting undersecretary, Darren Beattie, is delivering a major win to conservative critics who have alleged that it censors conservative voices. Created […]

3 mins read

Experts Uncover Four New Privilege Escalation Flaws in Windows Task Scheduler

Apr 16, 2025Ravie LakshmananEndpoint Security / Vulnerability Cybersecurity researchers have detailed four different vulnerabilities in a core component of the Windows task scheduling service that could be exploited by local attackers to achieve privilege escalation and erase logs to cover up evidence of malicious activities. The issues have been uncovered in a binary named “schtasks.exe,” […]

3 mins read