On The <dl>

https://benmyers.dev/images/on-the-dl/product-details.png
The HTML &lt;dl&gt; element represents a list of name-value pairs, which is a common UI pattern. It consists of &lt;dt&gt; for names and &lt;dd&gt; for values, allowing for semantic markup and improved accessibility.

Oura says it gets government demands for user data

https://storage.ghost.io/c/ed/a2/eda2c6f7-faef-48b4-9ed4-86a4fa4dca68/content/images/size/w960/2026/05/ring-oura-zw-hero.jpeg
The author, a security and privacy reporter, investigated Oura's data handling practices after a deal with the Department of Defense and Palantir sparked customer concerns. Oura's security design choices allow governments to access user data, and the company has a responsibility to ensure user data is secure despite its large valuation.

80386 Microcode Disassembled

The user and others extracted microcode from a high-resolution image of the 80386 CPU die, disassembled it, and found 215 entry points with new instructions and shared code. The microcode has a hidden security bug in IO permission bitmap handling and may have undocumented features or opcodes, but the exact nature of these is unclear.

z386: An Open-Source 80386 Built Around Original Microcode

https://nand2mario.github.io/posts/2026/z386/z386_doom2_game.jpg
z386 is a 386-class CPU built around original Intel microcode, recreating enough of the original machine for the recovered 386 control ROM to drive it. It runs real protected-mode DOS software, including DOS 6 and 7, and games like Doom, with a focus on educational reconstruction and usability.

PHP's Oddities

https://flowtwo.io/media/6a0cc116fa53c20f7a54e04a/banner.jpg
The author reflects on their experience with PHP, a language they initially didn't expect to use, but has grown to appreciate despite its quirks. PHP's array data structure is flexible but complex, and its type system has unintuitive features like uninitialized properties.

Making Deep Learning Go Brrrr from First Principles

https://horace.io/img/perf_intro/gpus_go_brrr.webp
To improve deep learning model performance, first identify the bottleneck in your model, which can be compute, memory bandwidth, or overhead. Then, optimize accordingly, such as increasing compute intensity, reducing memory bandwidth costs, or minimizing overhead.

Lisp in Vim (2019)

The article discusses two Vim plugins, Slimv and Vlime, which provide Lisp development environments for Vim, and compares their features and installation procedures. The plugins use a client-server architecture and rely on the Swank server to evaluate Lisp expressions, and both support interactive programming and debugging.

The Art of Money Getting

https://kk.org/cooltools/files/2026/05/TheArtOfMoneyGetting.jpg
P.T. Barnum's book "The Art of Money Getting" offers 20 rules for success, emphasizing finding one's natural abilities and avoiding debt. Key principles include being the best at one's work, keeping income above expenses, and maintaining a good reputation.

Reverse engineering circuitry in a Spacelab computer from 1980

https://static.righto.com/images/cimsa/cimsa-diagram2-w500.jpg
Spacelab was a reusable laboratory that could be carried in the cargo bay of the Space Shuttle, providing lab space for astronauts and experiments. Spacelab was controlled by a French-built minicomputer, called the Mitra 125 MS. Unlike modern computers, this computer didn't contain a microprocessor chip. Instead, its 16-bit processor was constructed from several boards of chips. In this ...

Highest Random Weight in Elixir

https://jola.dev/images/og/posts/highest-random-weight-in-elixir.png
The user discusses two distributed hashing algorithms, ExHashRing and Rendezvous Hashing (HRW), comparing their performance, complexity, and suitability for different use cases. HRW is simpler and more general than ExHashRing but has a linear time complexity, which can be improved to logarithmic with a skeleton implementation.

Solving the “Zork” Mystery

https://www.dpolakovic.space/blogs/pics/zork122.jpeg
The author investigated the origin of the word "zork" in the game Zork, initially believing it was a jargon term for unfinished programs.

The FBI Wants 'Near Real-Time' Access to US License Plate Readers

https://media.wired.com/photos/6a079053cb9f32a0753bcf6d/16:9/w_640%2Cc_limit/undefined
US lawmakers proposed a ban on automated license plate readers, but the FBI plans to buy nationwide access to the cameras for law enforcement. A crackdown on deepfake sexual abuse images is underway, with the FTC warning companies to remove nonconsensual intimate images and the Department of Justice arresting two men for sharing AI-created explicit content.

Shipping a laptop to a refugee camp in Uganda

https://notesbylex.com/_media/shipping-laptop-uganda-burned-motherboard-1.jpg
A MacBook was sent from Australia to Uganda via multiple freight services and customs clearances, facing various delays and challenges, but finally arrived safely after 42 days and 36,000 km. The laptop's journey involved failed attempts, unexpected detours, and a surprising delivery to a hardware shop, where it was stored on a shelf before being collected by the sender.

Why Japanese companies do so many different things

https://substackcdn.com/image/fetch/$s_!q5kh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff42a7b2-6c27-4773-a0b0-561081c55da1_1605x2000.jpeg
Japanese companies are highly diversified due to their unique corporate structure, which prioritizes employee loyalty and long-term survival over shareholder profits. This structure, known as the "J-firm" bundle, allows Japanese companies to adapt and change quickly in response to changing market conditions.

Improving C# Memory Safety

https://devblogs.microsoft.com/dotnet/wp-content/uploads/sites/10/2026/05/improving-csharp-memory-safety.webp
C# is improving memory safety with a redesigned unsafe keyword that marks obligations for developers to discharge. The new model is opt-in and will be released in .NET 11 as a preview and in .NET 12 as a production release.

I Miss Terry Pratchett

https://cdn.lorepanic.com/animations/rincewind_spell_room.gif
The author reminisces about reading Terry Pratchett's books as a teenager, particularly Rincewind's adventures, which resonated with their own experiences. They miss the impact Pratchett's writing had on them and worry that no one is currently reaching teenagers with similar stories.

BambuStudio has been violating PrusaSlicer AGPL license since their fork

https://pbs.twimg.com/media/HINlpHeWAAAdv7R.jpg?name=small&format=webp
BambuStudio is violating the PrusaSlicer AGPL license by using a closed-source networking binary. This is likely due to China's five-law framework, which forces companies to cooperate with intelligence work and maintain secrecy, making it difficult for them to comply with open-source licenses.

Rubish: A Unix shell written in pure Ruby

https://opengraph.githubassets.com/1aaab547000380b311ad0fa9611aa2d145df708342d77a0cc44ebb783a6024c8/amatsuda/rubish
Rubish is a Ruby-based shell that supports bash syntax and integrates Ruby features. It allows seamless mixing of shell commands and Ruby code.

A 1955 Los Alamos computer experiment changed our understanding of chaos

Mary Tsingou's 1955 experiment on MANIAC revealed a paradox in nonlinear systems, showing they can behave in stable and structured ways despite initial expectations. This discovery reshaped how scientists think about systems and led to the development of new technologies, including the internet.

The quadratic sandwich

If (mu) is 0, the quadratic lower bound from the sandwich degenerates into the tangent hyperplane. a well-conditioned problem has abundant and trustworthy local information, says daniel saunders. the idea is beautifully simple: instead of reasoning about f in its full n-dimensional glory, we restrict our attention to the straight line connecting x and y

Italy Cancels Boeing Pegasus Order, Shifting to Airbus A330 MRTT

https://images.euronews.com/articles/stories/09/76/64/52/1536x864_cmsv2_6886fa64-cf51-57a6-859f-6991f60d99c4-9766452.jpg
The tanker deal is not just a competition won; it is a decision that shifts the balance. Behind the purchase of the new Airbus A330 MRTT lies a shift in the centre of gravity of Italy’s air defence, which is now looking increasingly to Europe within the NATO framework, leaving behind the US option linked to the Boeing KC-46. In this context, Italy has formalised the acquisition of six Airbus ...

Microsoft starts canceling Claude Code licenses

https://platform.theverge.com/wp-content/uploads/sites/2/2025/01/Tom_BLURPLE.jpg?quality=90&strip=all&crop=0%2C0%2C100%2C100&w=2400
Microsoft is removing most of its Claude Code licenses and pushing developers to use Copilot CLI instead due to financial and product convergence reasons. The company will invest more in Copilot CLI and encourage developers to file bug reports and feedback.

US tech firms share Dutch regulator officials' names with Senate

https://www.dutchnews.nl/wpcms/wp-content/uploads/2025/05/Depositphotos_784849166_XL.jpg
Dutch cabinet is extremely worried about US tech companies sharing civil servants' names with senate committee investigating tech censorship. This could lead to travel bans or sanctions for the officials.

- -dangerously-skip-reading-code

https://olano.dev/assets/img/bird.png
Assuming LLMs will fix code issues is irresponsible, but if organizational leadership mandates leveraging LLMs, we can adapt and move rigor elsewhere. This could involve standardized specifications and tests, checked into project repositories, to ensure accountability and understanding.

Project Glasswing: An Initial Update

https://www.anthropic.com/_next/image?url=https%3A%2F%2Fwww-cdn.anthropic.com%2Fimages%2F4zrzovbb%2Fwebsite%2F7af1880d305b982764cfefc7dce87c677f1b0254-1634x1008.png&w=3840&q=75
Anthropic's Project Glasswing uses AI to find thousands of software vulnerabilities, but fixing them is a major challenge. The project aims to help cyber defenders adapt to this challenge and make software safer by releasing tools and resources to support vulnerability scanning and patching.

ArcBrush – Node-based 2D image editor

https://arcbrush.com/images/hero_bg.jpg
ArcBrush is a free, non-destructive 2D image production tool with a node-based system. It supports various formats, colors, and assets, and offers AI generation, undo stack, and customizable UI.

Ebola Outbreak Now Third Largest Recorded and "Spreading Rapidly"

https://cdn.arstechnica.net/wp-content/uploads/2026/05/GettyImages-2277132506-640x426.jpg
The Ebola outbreak erupting from the Ituri province of the Democratic Republic of the Congo continues to escalate wildly, with cases nearing 750, deaths reported at 177, and around 1,400 contacts now being traced, the World Health Organization reported in a press briefing Friday. The latest numbers already place the outbreak as the third largest on record, though it was only first reported a ...

Fast Factorial Algorithms

http://www.luschny.de/math/factorial/swing62.png
Several algorithms compute n! efficiently, including SplitRecursive, PrimeSwing, and ParallelPrimeSwing. A simple recursive algorithm is also provided, but it is slow and not recommended for use.

Yeunjoo Choi from Igalia on Chromium

Yeunjoo, a developer at Igalia, shares her 15-year experience working on web browsers, particularly Chromium, and her work on enterprise browsers, branding, and rebase strategies. She also discusses her journey from contributing to open-source projects, learning from the Chromium ecosystem, and her thoughts on AI tools and their potential impact on the Chromium community.

CISA tries to contain data leak

https://krebsonsecurity.com/wp-content/uploads/2026/05/HassanCISAletter.png
CISA contractor leaked AWS GovCloud keys and agency secrets on a public GitHub account, prompting lawmakers to demand answers. CISA is still struggling to contain the breach and invalidate the leaked credentials, raising concerns about internal policies and procedures.