-
Show HN: Edka – Deploy Kubernetes on your own Hetzner account in minutes
-
Occult books digitized and put online by Amsterdam’s Ritman Library
-
Launch HN: Embedder (YC S25) – Claude Code for Embedded Software
-
Do Things That Don't Scale (2013)
-
Letting inmates run the asylum: Using AI to secure AI
-
Show HN: JMAP MCP – Email for your agents
-
The Electric Fence Stopped Working Years Ago
-
Imagen 4 is now generally available
-
EasyPost (YC S13) Is Hiring
-
Compiler Bug Causes Compiler Bug: How a 12-Year-Old G++ Bug Took Down Solidity
-
ARM adds neural accelerators to GPUs
-
I let LLMs write an Elixir NIF in C; it mostly worked
-
Vaultwarden commit introduces SSO using OpenID Connect
-
Open hardware desktop 3D printing is dead?
-
Bullfrog in the Dungeon
-
An interactive guide to sensor fusion with quaternions
-
Blurry rendering of games on Mac
-
Simulating and Visualising the Central Limit Theorem
-
In-depth analysis on Valorant's Guarded Regions
-
We rewrote the Ghostty GTK application
-
The Timmy Trap
-
Recto – A Truly 2D Language
-
Rain: Transiently Leaking Data from Public Clouds Using Old Vulnerabilities
-
The Lifecycle of a Pull Request
-
Fairness is what the powerful 'can get away with' study shows
-
I used to know how to write in Japanese
-
Non-invasive vagus nerve stimulation and exercise capacity in healthy volunteers
-
I made a real-time C/C++/Rust build visualizer
-
Steam can't escape the fallout from its censorship controversy
-
The beauty of a text only webpage