Popular
- Understanding the Worst .NET Vulnerability andrewlock.net
- Amazon confirms 14,000 job losses in corporate division bbc.com
- Show HN: Bash Screensavers github.com
- Picture gallery: Amiga prototype "Lorraine" at the Amiga 40 event amiga-news.de
- How the brain's activity, energy use and blood flow change as people fall asleep massgeneralbrigham.org
- The Programming Languages Zoo plzoo.andrej.com
- 10M people watched a YouTuber shim a lock; the lock company sued him – bad idea arstechnica.com
- Geometry and Physics of Wrinkling (2003) [pdf] softmath.seas.harvard.edu
- Your vibe coded slop PR is not welcome samsaffron.com
- Poker Tournament for LLMs pokerbattle.ai
- Easy RISC-V dramforever.github.io
- Claude for Excel claude.com
- Complete Digitization of Leonardo da Vinci's Codex Atlanticus openculture.com
- Front-Panel Booting an ATmega88 Microcontroller linusakesson.net
- SATisfying Solutions to Difficult Problems vaibhavsagar.com
- Simplify your code: Functional core, imperative shell testing.googleblog.com
- JetKVM – Control any computer remotely jetkvm.com
- Study finds growing social circles may fuel polarization phys.org
- Criminal complaint against facial recognition company Clearview AI noyb.eu
- Pyrex catalog from from 1938 with hand-drawn lab glassware [pdf] exhibitdb.cmog.org
- Dust samples from moon's far side show debris from rare, water-rich meteorites sciencealert.com
- OpenAI says over a million people talk to ChatGPT about suicide weekly techcrunch.com
- Iroh-blobs iroh.computer
- Why Busy Beaver hunters fear the Antihydra benbrubaker.com
- Linux VM without VM software – User Mode Linux popovicu.com
- Situated Software – Clay Shirky (2004) shirky.com
- Smartphones manipulate our emotions and trigger our reflexes theconversation.com
- MCP-Scanner – Scan MCP Servers for vulnerabilities github.com
- The new calculus of AI-based coding blog.joemag.dev
- Image Dithering: Eleven Algorithms and Source Code (2012) tannerhelland.com