-
Occult books digitized and put online by Amsterdam’s Ritman Library
-
Show HN: Edka – Deploy Kubernetes on your own Hetzner account in minutes
-
Do Things That Don't Scale (2013)
-
Launch HN: Embedder (YC S25) – Claude Code for Embedded Software
-
Are We Creating Entrepreneurs or Just Privileged Risk-Takers?
-
Letting inmates run the asylum: Using AI to secure AI
-
The Electric Fence Stopped Working Years Ago
-
EasyPost (YC S13) Is Hiring
-
I let LLMs write an Elixir NIF in C; it mostly worked
-
Vaultwarden commit introduces SSO using OpenID Connect
-
Compiler Bug Causes Compiler Bug: How a 12-Year-Old G++ Bug Took Down Solidity
-
Open hardware desktop 3D printing is dead?
-
ARM adds neural accelerators to GPUs
-
Bullfrog in the Dungeon
-
Is Air Travel Getting Worse? More delays, fewer accidents, and lower prices
-
Imagen 4 is now generally available
-
They're Killing the Humanities on Purpose
-
Simulating and Visualising the Central Limit Theorem
-
The beauty of a text only webpage
-
An interactive guide to sensor fusion with quaternions
-
Rain: Transiently Leaking Data from Public Clouds Using Old Vulnerabilities
-
Blurry rendering of games on Mac
-
We rewrote the Ghostty GTK application
-
Steam can't escape the fallout from its censorship controversy
-
The Timmy Trap
-
Recto – A Truly 2D Language
-
The Lifecycle of a Pull Request
-
Fairness is what the powerful 'can get away with' study shows
-
I used to know how to write in Japanese
-
Court Records Reveal Sig Sauer Knew of Pistol Risks for Years