Unexpected things that are people

https://substackcdn.com/image/fetch/$s_!TbQI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F664681dc-505b-4e0f-b4f3-53b92496fe8e_960x540.jpeg
Ships, rivers, and Hindu deities have been granted limited legal person rights, allowing them to be defendants and have rights constrained to due process. This concept is applied in various cases, including the Whanganui River's personhood and a Hindu deity's right to property.

Vibe Code Warning – A personal casestudy

https://opengraph.githubassets.com/30d3c77ac72ce991b3dae99719f965224076df94ad865a94d778871a3fcf6450/jackdoe/pico2-swd-riscv
A stateful swd protocol implementation for debugging rp2350 risc-v cores (hazard3) from any raspberry pi pico2 (target) using gpio's on another pico (probe) the readme is almost completely generated; the code is vibe coded. the protocol operates over two signals: turnaround cycles (host releases swdio, target can drive) occur between requestack

The lazy Git UI you didn't know you need

https://www.bwplotka.dev/2025/lazygit/lazygit-discoverability.png
The user discovered lazygit, a terminal-based Git UI, by accident while trying to use neovim and found it to be incredibly fast, portable, and visually consistent, making it their main Git tool. They praise lazygit's UX, which is well-organized, visually consistent, and interactive, allowing users to easily discover and use Git workflows without memorizing complex commands.

Launch HN: Hypercubic (YC F25) – AI for COBOL and Mainframes

https://www.hypercubic.ai/logos/hyc_black_transparent_logo.png
Hypercubic uses AI to understand and preserve mainframe systems, capturing human expertise and legacy code. It creates digital twins, documentation, and retains critical knowledge to prevent system failure and downtime.

Benchmarking leading AI agents against Google reCAPTCHA v2

https://research.roundtable.ai/captcha-benchmarking/results.png
Researchers tested three AI models on Google reCAPTCHA v2 challenges and found significant differences in performance, with Claude Sonnet 4.5 performing best at 60% success rate. The results suggest that excessive reasoning and poor planning can hinder AI performance, and that timely and adaptive action is crucial for real-world intelligence.

Asus Ascent GX10

https://dlcdnwebimgs.asus.com/files/media/202506/5c0fb57c-4e48-4e96-8c97-04bf8df2677c/v1/img/kv.jpg
The ASUS Ascent GX10 AI Supercomputer features a NVIDIA GB10 Grace Blackwell Superchip with a robust Blackwell GPU and fifth-generation Tensor Cores for exceptional AI computing capabilities. It integrates NVIDIA ConnectX-7 for ultra-high-speed networking and supports various AI frameworks for fast deployment.

European Commission plans “digital omnibus” package to simplify its tech laws

https://www.politico.eu/cdn-cgi/image/width=1160,height=799,quality=80,onerror=redirect,format=auto/wp-content/uploads/2025/11/08/GettyImages-976876300-scaled.jpg
Europol deputy chief tells POLITICO that police want the agency to build out tech capabilities. The European Commission recognizes the “worrying conclusions” of the media outlets’ investigation. Complaint filed Tuesday asked EU to investigate former tech lobbyist’s appointment to key privacy role following POLITICO report.

Omnilingual ASR: Advancing automatic speech recognition for 1600 languages

Sorry, something went wrong. We're working on getting this fixed as soon as we can.

Rewilding the Internet

https://www.protein.xyz/content/images/2025/10/PS-logo.png
The internet has become an entanglement of AI algorithms, commercial content, and information overload, leaving digital inhabitants struggling to process and contribute meaningfully. To regenerate these ecosystems, communities must reclaim agency, decentralise themselves, and nurture environments where genuine creativity can flourish.

Synesthesia helps me find four-leaf clovers (2023)

https://cdn.matthewjamestaylor.com/titles/four-leaf-clovers-standing-out-small.png
You have a large collection of clovers, including rare four and five-leaf varieties, and notice their shapes due to synesthesia, perceiving them as different colors or movements. This allows you to easily spot them in clover patches.

Interesting SPI Routing with iCE40 FPGAs

https://danielmangum.com/static/ice40_spi_routing_1.png
The Fomu FPGA development board's unique design allows it to fit in a USB port, but its USB core is implemented in RTL, requiring a bootloader to configure the FPGA and SPI flash. To program the flash directly via test points, the iCE40 must be held in reset, and the flash IC's HOLD pin can be driven low to ignore SPI traffic while configuring the iCE40 directly.

Writing your own BEAM

I was always fascinated with BEAM, how it allowed easy spawning of processes that didn’t share state, allowed for sending and selectively receiving messages, and linking to each other thus enabling creation of supervision trees. It’s an interesting set of primitives that interact in a nice way, and are in my view responsible for much of the appeal of BEAM languages. I wanted to see how much ...

Head in the Zed Cloud

For the past five months I've been leading the efforts to rebuild Zed's cloud infrastructure. Our current backend—known as Collab—has been chugging along since basically the beginning of the company. We use Collab every day to work together on Zed in Zed. However, as Zed continues to grow and attracts more users, we knew that we needed a full reboot of our backend infrastructure to ...

Pose Animator – An open source tool to bring SVG characters to life (2020)

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtZ6VXz_hF6aLYS-494KnbiPg-rStHJujKJ4V7uzxZ7AsuMCFwilkLlA3jMM7ZPHYY3lbqtX8Dwm_5Jr3cuf4y6nQogc0_vvsTpwsjFayukU5yjJg6TrmibQLZqjBlCuD4gY7Rcu908gs/s1600/movementgif.gif
Pose Animator is an open-source web animation tool that uses machine learning models to bring 2D vector illustrations to life with real-time body detection from webcam. It uses Linear Blend Skinning to deform the character's curves based on the recognition results from PoseNet and FaceMesh.

Cops Can Get Your Private Online Data

https://www.eff.org/files/banner_library/police-surveillance-hat.jpg
US law enforcement can access online data through various means, but service providers and users can take steps to protect privacy by pushing back on improper demands and using encryption. Users should assess risks, limit services, improve settings, and use tools like EFF's Privacy Badger to prevent data sharing.

LLMs are steroids for your Dunning-Kruger

https://bytesauna.com/dunning-kruger.webp
The user is concerned that ChatGPT and other LLMs can misinform users with conviction, potentially leading to negative effects in the long run. They see LLMs as confidence engines rather than knowledge engines, highlighting the potential for psychological manipulation.

Redmond, WA, turns off Flock Safety cameras after ICE arrests

https://images.seattletimes.com/wp-content/uploads/2025/11/11072025_1_180232.jpg?d=780x501
Redmond police turned off Flock Safety cameras after ICE agents arrested people near them. Police Chief Darrell Lowe suspended officers' access to the system until the city discusses ending its contract with Flock Safety.

Steven Heller's Font of the Month: Archive Matrix

https://ilovetypography.com/img/2025/11/archive-matrix-use-2.svg
The author is fascinated by futuristic art and design despite pessimistic views of the future. They praise Pieter van Rosmalen's Archive Matrix design for its nostalgic yet modern feel and potential for adding movement to text.

Time to start de-Appling

https://heatherburns.tech/wp-content/uploads/2021/07/20210514_105906-2-1194x896.jpg
Apple is withdrawing its Advanced Data Protection feature from the UK due to the Home Office's TCN under the Investigatory Powers Act. Users must manually switch off ADP or lose their iCloud account, but can still use end-to-end encrypted services like iMessage and FaceTime.

Error ABI

This argument is not entirely correct. Naively composing errors out of ADTs does pessimize the happy path. Error objects recursively composed out of enums tend to be big, which inflates size_of<Result<T, E>>, which pushes functions throughout the call stack to “return large structs through memory” ABI. Error virality is key here — just a single large error on however rare code ...

Building a high-performance ticketing system with TigerBeetle

https://renerocks.ai/demo.gif
The author built a high-performance ticketing system using TigerBeetle, a financial transactions database, and optimized it to achieve 977 ticket reservations per second. The system's architecture was refined through iterative testing and measurement, ultimately revealing the importance of batching and minimizing Python's event loop overhead.

Memory Safety for Skeptics

November 6, 2025 Memory safety—the property that makes software devoid of weaknesses such as buffer overflows, double-frees, and similar issues—has been a popular topic in software communities over the past decade and has gained special prominence alongside the rise of the Rust programming language. Rust did not invent the idea of memory safety, nor was it the first memory-safe language, but ...

Reminder to passengers ahead of move to 100% digital boarding passes

https://corporate.ryanair.com/wp-content/uploads/2021/05/Family-3.jpg
Ryanair will stop printing physical boarding passes from November 12, requiring passengers to use the digital boarding pass in their "myRyanair" app. This change aims to provide a faster, smarter, and greener travel experience for passengers.

Context engineering can save your company from AI vibe code overload

Beets: The music geek’s media organizer

Beets is a music cataloging tool that organizes your collection and provides various tools for manipulation and access. It can fetch metadata from MusicBrainz, Discogs, or Beatport, or guess it using filenames or acoustic fingerprints.

Installing and using HP-UX 9

https://thejpster.org.uk/processed_images/Model340.279cbd7fee625835.jpg
The user obtained an HP 9000 Model 340, a 68030-based UNIX workstation, and set it up with HP-UX 9, a version that supports mixed 68K and PA-RISC clusters. The user discovered that HP-UX 9 uses a Context Dependent Filesystem, which makes files context-dependent and can be accessed differently depending on the machine's architecture.

Using the expand and contract pattern for schema changes

https://www.prisma.io/dataguide/static/ed90b791f9455d80aa2682e968edab8b/663f3/header-image.png
The expand and contract pattern is a multi-step process that allows database administrators to safely transition data from an old data structure to a new one without affecting uptime. This process involves designing a new schema, deploying it alongside the original schema, migrating data to the new structure, testing the new interface, and finally transitioning production traffic to the new ...

Zig and the design choices within

https://blueberrywren.dev/wren_glasses.png
The user criticizes Zig for lacking memory safety features, cumbersome casting, and a slow compiler, and believes that modern programming languages should prioritize memory safety and correctness. They also express frustration with the Zig community's resistance to change and lack of features, which they think makes the language less appealing to users.

Canadian military will rely on public servants to boost its ranks by 300k

https://smartcdn.gprod.postmedia.digital/ottawacitizen/wp-content/uploads/2025/05/140476_288635428.jpg?quality=90&strip=all&w=288&h=216&sig=saWfkmOLP7ZDUa6tlB9EKg
The Canadian Forces is recruiting public servants to join the Supplementary Reserve, aiming for 300,000 personnel in an emergency. They will receive one-week training annually, but it won't count towards their pensions.

Modular monolith and microservices: Modularity is what matters

Modularity is crucial in software design, allowing for independent, logical modules with clear boundaries and public interfaces, which brings benefits such as organization, comprehension, resource utilization, reusability, and testability. The choice of modularization strategy depends on the level of ambiguity and unknowns in the system, with simpler approaches like modular monoliths suitable ...