A few thoughts on how the modern economy has stopped rewarding people who know
what they are doing, and started rewarding people who know how to look
like they do....
6 HOURS AGO
AZUREWRAITH
Show HN: Statewright – Visual state machines that make AI agents reliable
4 DAYS AGO
JXMORRIS12
The Moth Story Map
8 HOURS AGO
SCOTTFR
Text Blaze (YC W21) Is Hiring for a No-AI Summer Internship
19 HOURS AGO
TOKENBURNER
They Live (1988) inspired Adblocker
A DAY AGO
SURPRISETALK
The Surprisingly Long Life of the Vacuum Tube
A DAY AGO
BOOKOFJOE
UCLA discovers first stroke rehabilitation drug to repair brain damage (2025)
9 HOURS AGO
THM
EU to crack down on TikTok, Instagram's 'addictive design' targeting kids
4 HOURS AGO
BENDER
Amazon employees are "tokenmaxxing" due to pressure to use AI tools
19 HOURS AGO
MATRIXHELIX
Claude Platform on AWS
3 DAYS AGO
THEANONYMOUSONE
Docker images are hundreds of MB; a full game engine compiles to 35MB WASM
2 HOURS AGO
DEVHOUSE
Reimagining the mouse pointer for the AI era
A DAY AGO
SHOWMYPOST
I let AI build a tool to help me figure out what was waking me up at night
3 DAYS AGO
THEANONYMOUSONE
Docker images are hundreds of MB; a full game engine compiles to 35MB WASM
5 DAYS AGO
JAMES72689
I hate soldering
2 HOURS AGO
DEVHOUSE
Reimagining the mouse pointer for the AI era
tambourine_man
2 hours ago
Googlebook
Meet Googlebook: A new kind of laptop designed for Gemini Intelligence. Built with heavyweight power and perfectly in sync with your Android Phone. Sign up for updates and stay in the know.
ibobev
7 hours ago
Rendering the Sky, Sunsets, and Planets
This article explores how to render realistic skies and atmospheres in real time in the browser with shaders, from simple sky domes, to entire planets using shaders, raymarching, Rayleigh an...
fedek_
2 hours ago
Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim
XBOW discovered CVE-2026-45185, a critical unauthenticated RCE in Exim, and used the disclosure window to test how far human and autonomous exploit development could go....
Cider9986
17 hours ago
Instructure pays ransom to Canvas hackers
Although the monetary value of the deal is unknown, Instructure says the cybercriminals have returned the hacked personal data and offered assurance “that no Instructure customers will be ex...
xz18r
4 hours ago
The Future of Obsidian Plugins
Introducing the new Obsidian Community site and developer dashboard....
aduffy
2 hours ago
Quack: The DuckDB Client-Server Protocol
DuckDB instances can now talk to each other using the Quack remote protocol. This lets you run DuckDB in a client-server setup with multiple concurrent writers. In DuckDB's spirit, Quack is ...
rubenbe
5 hours ago
Bambu Lab is abusing the open source social contract
Last year I said I'd probably never recommend another Bambu Lab printer again.
I still use my P1S, but after Bambu Lab started pushing their always-connected cloud solution as the new defaul...
HenryNdubuaku
2 hours ago
Show HN: Needle: We Distilled Gemini Tool Calling into a 26M Model
26m function call model that runs on incredibly small devices - cactus-compute/needle...
https://github.com/cactus-compute/needle
varunsharma07
a day ago
Postmortem: TanStack NPM supply-chain compromise
On 2026-05-11, an attacker chained a pull_request_target Pwn Request, GitHub Actions cache poisoning across the fork↔base trust boundary, and OIDC token extraction from runner memory to publ...
Brajeshwar
2 hours ago
Canada’s Bill C-22 Is a Repackaged Version of Last Year’s Surveillance Nightmare
Last year, the Canadian government pushed Bill C-2, which would erode Canadian digital rights in the name of “border security.” The bill was so bad it didn’t even make it to committee becaus...
cemsakarya
3 days ago
The Real Story of Troy
In 1873 Heinrich Schliemann found a hoard of gold under a hill in western Anatolia, hid it from the Ottoman official assigned to watch him, packed it into his wife's luggage, and crossed the...
Nrbelex
2 hours ago
Unauthorized Anthropic stock sales and investment scams
djoldman
2 days ago
Profiling.sampling – Statistical Profiler
Source code: Lib/profiling/sampling/ Tachyon logo The profiling.sampling module, named Tachyon, provides statistical profiling of Python programs through periodic stack sampling. Tachyon can...
NaOH
3 days ago
Chasing Chicago's movable bridges (2014)
Chasing Chicago’s movable bridges...
jxmorris12
a day ago
Through the looking glass of benchmark hacking
Outlining some of the reward hacks we’ve encountered and what strategies we are exploring to resolve them. ...
PaulHoule
2 hours ago
FairyFuse: Multiplication-Free LLM Inference on CPUs via Fused Ternary Kernels
Large language models are increasingly deployed on CPU-only platforms where memory bandwidth is the primary bottleneck for autoregressive generation. Weight quantization to four bits or belo...