Googlebook

https://www.gstatic.com/marketing-cms/assets/images/27/26/efcc236844ccb833b92620413427/magic-cursor-band-assets.webp=n-w353-h285-fcrop64=1,000009fbfffff605-rw
Meet Googlebook: A new kind of laptop designed for Gemini Intelligence. Built with heavyweight power and perfectly in sync with your Android Phone. Sign up for updates and stay in the know.

Restore full BambuNetwork support for Bambu Lab printers

https://raw.githubusercontent.com/FULU-Foundation/OrcaSlicer-bambulab/main/resources/images/OrcaSlicer.png
Contribute to FULU-Foundation/OrcaSlicer-bambulab development by creating an account on GitHub.

How to make your text look futuristic (2016)

https://typesetinthefuture.com/wp-content/uploads/2016/06/futuristic_logo_1.png?w=560&h=315
The article discusses six rules to create a futuristic movie title, including adding an italic slant, curvy and angular shapes, consummate Vs, combined letters, removing text segments, and adding noise textures. These rules are demonstrated in various movie titles such as Blade Runner, Battlestar Galactica, and Star Wars.

Kraftwerk's radical 1976 track

https://ichef.bbci.co.uk/images/ic/480xn/p0nklthc.jpg.webp
Kraftwerk's 1975 album Radio-Activity is a groundbreaking electronic album that has mutated over decades into a protest song and party anthem. The album's 50th anniversary reissue still crackles with Kraftwerk's creative power and has influenced countless artists across various genres.

CERT is releasing six CVEs for serious security vulnerabilities in dnsmasq

CERT is releasing six CVEs for serious dnsmasq security vulnerabilities. Patches are available and a new stable release, dnsmasq-2.92rel2, has been made with the fixes applied.

Show HN: Needle: We Distilled Gemini Tool Calling into a 26M Model

https://raw.githubusercontent.com/cactus-compute/needle/main/assets/banner.png
Gemini 3.1 was distilled into a 26m Simple Attention Network, Needle, for consumer devices. Needle outperforms other models in single-shot function calls but may be finicky and less effective in conversational settings.

Why senior developers fail to communicate their expertise

https://www.nair.sh/_next/image?url=%2Fimages%2Fwsdftc%2Fwsdftc_cover.png&w=3840&q=75&dpl=dpl_EJNiu3FBjkX8yJSwwGtmqoePQNU6
Senior developers worry about complexity, while others want to reduce uncertainty. They should communicate solutions in terms of uncertainty reduction, not complexity management.

Quack: The DuckDB Client-Server Protocol

https://duckdb.org/images/blog/quack/quack-bulk-light.svg
DuckDB instances can now communicate with each other using the Quack protocol, enabling client-server setups and concurrent writers. Quack is built on HTTP and optimized for low overhead and fast bulk data transfer.

The Future of Obsidian Plugins

https://obsidian.md/images/blog/2026-community-search.png
Obsidian Community is launched with a new directory and developer dashboard for plugins and themes. Automated reviews ensure safety and security of the Obsidian ecosystem.

Rendering the Sky, Sunsets, and Planets

https://assets.maximeheckel.com/images/blog/shuttle.webp?w=3840&q=100
The user implemented an atmospheric scattering shader post-processing effect to render a realistic sky and atmosphere in real-time, using raymarching, Rayleigh and Mie scattering, and ozone absorption to achieve a natural color for any altitude. The user also explored a more performant approach using Look Up Tables (LUTs) to store precomputed scattering calculations, resulting in a ...

Reimagining the mouse pointer for the AI era

https://lh3.googleusercontent.com/wWMpunJ0UQ5yomIfjIYxftmiZzTdZqvze2_g9HtVShA2jqPxqu8v9KFimrYSHs22fvjkfjJY0XGLwvbyXE_GRUQSK3CPjcJY-fqRASGrNbLltuHGDpc=w1440-h810-n-nu
Google is developing an AI-enabled pointer called Gemini to simplify interactions with computers by understanding context and intent. The pointer will work across all apps, allowing users to point and speak to get information without needing to write complex prompts.

Lanzaboote – NixOS Secure Boot

https://x86.lol/assets/2022-11-oceansprint.webp
NixOS users developed lanzaboote, a UEFI application, to enable Secure Boot without embedding kernel and initrd into the UKI. The project aims to integrate Secure Boot into NixOS, but still requires user-generated keys and enrollment in firmware.

Learning Software Architecture

To learn software design skills as a researcher physicist, it's essential to understand that software design is best learned by doing and adapting to the social context of the project, rather than following formal rules or guidelines. Key recommendations include practicing, paying attention to boundaries, testing, and Conway's Law, and considering resources such as the Boundaries talk by Gary ...

Beyond Semantic Similarity

https://arxiv.org/static/browse/0.3.4/images/arxiv-logo-fb.png
Researchers found that direct corpus interaction outperforms conventional retrieval systems in agentic search tasks by allowing agents to interact with the raw corpus directly. This approach adapts to evolving corpora and achieves strong accuracy without relying on semantic retrievers.

Is this why science advances one funeral at a time?

https://lede-admin.nautil.us/wp-content/uploads/sites/70/2026/04/Grant_HERO_f5ad9e.png?resize=2880%2C1920
Researchers found that scientists increase their ability to combine existing ideas as they age, but decrease in their ability to create groundbreaking innovations. This pattern suggests that scientists become more attached to established ideas and less likely to disrupt their field with new concepts.

Bambu Lab is abusing the open source social contract

Bambu Lab is threatening an open source developer with legal action for using their code in a fork of OrcaSlicer. They claim the developer is impersonating their client and creating a security risk, but the developer says they're just using upstream code verbatim.

Riding the D in Los Angeles: city hopes new subway stations will be game changer

https://i.guim.co.uk/img/media/75d073c982eacc88c4629002003fef3083f17d89/0_0_8192_5464/master/8192.jpg?width=445&dpr=1&s=none&crop=none
LA Metro unveiled its first new subway stations in 25 years, marking a "game changer" for car-clogged LA. The D line extension allows for a 21-minute ride from Union Station to Beverly Hills, a major milestone in reshaping LA's transportation ecosystem.

Show HN: Statewright – Visual state machines that make AI agents reliable

https://raw.githubusercontent.com/statewright/statewright/main/docs/images/workflow-editor.png
Statewright is a tool that enforces workflow constraints on AI agents to prevent overfitting and improve performance. It uses state machines to limit tool access and provide clear instructions to the model at each phase.

Launch HN: Voker (YC S24) – Analytics for AI Agents

https://cdn.prod.website-files.com/69d57891b4f6c4aff88c95ff/69eb2618ec2c1cafb08e32be_Voker%20Icon%20Set_Usage%20Data%201.svg
Voker provides analytics for AI agents, offering insights into performance and outcomes. It helps teams track agent interactions, identify knowledge gaps, and measure improvement over time.

Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim

https://cdn.prod.website-files.com/686c11d5bee0151a3f8021d6/6a03271477c3b2aa1e7eaaec_BLOG-Dead-Letter-CVE-2026-45185-01.png
A vulnerability in Exim's TLS connection handling was discovered and reported, allowing for remote code execution with almost no special server configuration. The vulnerability was exploited using a large language model (LLM) in a contest, with the LLM producing a working solution for the first stage of the exploit.

Foucault's Order of Things Explained with Trading Cards [video]

When life gives you lemons, write better error messages

https://miro.medium.com/v2/resize:fit:813/1*TpQzPue3oTK6J6oYZyQTtA.png
Wix revamped its error messages to be clear, concise, and user-friendly. They defined what makes a good error message and worked together to replace thousands of generic and unclear messages.

Show HN: Agentic interface for mainframes and COBOL

https://www.hypercubic.ai/_next/image?url=%2Fassets%2Fhopper%2Fhopper_hero_img.jpg&w=3840&q=75
Hopper uses AI agents to navigate and operate inside z/OS from a modern development environment. It drives ISPF, writes JCL, and queries VSAM with SQL-like functionality.

Show HN: Gigacatalyst – Extend your SaaS with an embedded AI builder

Namanyay from Gigacatalyst offers an AI customization layer for SaaS platforms, allowing non-technical users to build custom workflows via natural language. This helps businesses save time and increase revenue by reducing custom requests and engineering roadmaps.

Canada’s Bill C-22 Is a Repackaged Version of Last Year’s Surveillance Nightmare

https://www.eff.org/files/banner_library/encryption-poc-chelsea-saunders.png
Canadian government's Bill C-22, the Lawful Access Act, erodes digital rights by forcing companies to record and retain metadata and create backdoors for law enforcement. This bill expands surveillance and data sharing with foreign governments, threatening Canadians' privacy and digital security.

Snowflake Postgres, Lakebase, HorizonDB: Picking the Lock-In You Want

https://thebuild.com/media/media/79875ce29f9f49efab713b13dc31f0a2_f2kg0IJ.png
Three major data-platform companies have released Postgres-flavored databases with custom storage layers and scale-out architectures, but they are not true Postgres and each has its own limitations. The choice between Snowflake Postgres, Databricks Lakebase, and Azure HorizonDB depends on your existing data platform and workload, and running actual Postgres on actual instances is still a ...

EFF to 4th Circuit: Electronic Device Searches at the Border Require a Warrant

https://www.eff.org/files/styles/teaser/public/banner_library/border-agents-blue_0.png?itok=Zw2dxfPo
EFF and ACLU urge the Fourth Circuit to require a warrant for border searches of electronic devices under the Fourth Amendment. They argue that a warrant standard is necessary to protect travelers' privacy interests in their personal data.

Instructure pays ransom to Canvas hackers

https://www.insidehighered.com/sites/default/files/styles/max_650x650/public/2026-05/hacking_lock.jpg?itok=mGymN76y
Instructure paid a ransom to hackers who breached its learning management system Canvas, returning data of 275 million users. The company claims hackers have destroyed the data and will not extort customers, but the deal's value remains undisclosed.

Text Blaze (YC W21) Is Hiring for a No-AI Summer Internship

https://bookface-images.s3.amazonaws.com/small_logos/3155ba3b687741c19a97719f6f226e3e148c98f5.png
We're offering a "No AI Summer" internship for junior developers to learn full-stack engineering without AI tools, focusing on JavaScript, React, and GCP. The internship aims to develop critical thinking and problem-solving skills in a challenging environment with a small team.

SQL: Incorrect by Construction

The original TSQL money-transfer procedure has critical concurrency bugs including partial transfers and TOCTOU bugs due to lack of transactions and row-level locks. To fix these bugs, transactions should be atomic by default, row-level locks should be acquired upfront, and deadlocks should be detected through static analysis.