-
Show HN: Strange Attractors
-
How I stopped worrying and started loving the Assembly
-
S.A.R.C.A.S.M: Slightly Annoying Rubik's Cube Automatic Solving Machine
-
Futurelock: A subtle risk in async Rust
-
Leaker reveals which Pixels are vulnerable to Cellebrite phone hacking
-
Addiction Markets
-
Myths Programmers Believe about CPU Caches
-
Introducing architecture variants
-
Nisus Writer: Schrödinger's Word Processor
-
Beyond Smoothed Analysis: Analyzing the Simplex Method by the Book
-
A theoretical way to circumvent Android developer verification
-
The Impossible Optimization, and the Metaprogramming to Achieve It
-
Active listening: the Swiss Army Knife of communication
-
The profitable startup
-
Viagrid – PCB template for rapid PCB prototyping with factory-made vias [video]
-
Use DuckDB-WASM to query TB of data in browser
-
Hacking India's largest automaker: Tata Motors
-
My Impressions of the MacBook Pro M4
-
How We Found 7 TiB of Memory Just Sitting Around
-
Show HN: Settling the Score – a point-and-click adventure rhythm game
-
Perfetto: Swiss army knife for Linux client tracing
-
Kerkship St. Jozef, Antwerp – WWII German Concrete Tanker
-
Nix Derivation Madness
-
The cryptography behind electronic passports
-
AI scrapers request commented scripts
-
Show HN: Pipelex – Declarative language for repeatable AI workflows
-
Sustainable memristors from shiitake mycelium for high-frequency bioelectronics
-
Signs of introspection in large language models
-
Photographing the rare brown hyena stalking a diamond mining ghost town
-
Apple reports fourth quarter results