Asynchrony is not concurrency

https://kristoff.it/logo.png
The author proposes new definitions for concurrency and parallelism, and introduces the term asynchrony to describe a system's ability to execute tasks without blocking. This distinction allows for more precise code descriptions and avoids the need for code duplication and viral async code propagation.

How to write Rust in the Linux kernel: part 3

The article discusses Rust bindings in the Linux kernel, including memory allocation, pinning, and locks. It provides an overview of the kernel Rust APIs and how to use them to write safer and more efficient kernel drivers.

Ccusage: A CLI tool for analyzing Claude Code usage from local JSONL files

https://camo.githubusercontent.com/937e6ada811a505a33071e405af9e58093fa05dc6cfff368442780d12162adf9/68747470733a2f2f63646e2e6a7364656c6976722e6e65742f67682f72796f7070697070692f63637573616765406d61696e2f646f63732f7075626c69632f73637265656e73686f742e706e67
ccusage analyzes Claude Code token usage and costs from local JSONL files, providing fast and informative results. It offers various usage options, including daily, monthly, and live monitoring reports.

Shutting Down Clear Linux OS

https://global.discourse-cdn.com/clearlinux/original/1X/6768a8baca76f0527fd8335a67035c662d0f00cb.png
Intel is ending support for Clear Linux OS, and users are advised to migrate to another Linux distribution for security and stability. Clear Linux OS GitHub repository will be archived in read-only mode.

Silence Is a Commons by Ivan Illich (1983)

Ivan Illich warns that computers are degrading human communication by forcing people to behave like machines and filter out non-machine-like behavior. He proposes a new politics of self-limitation to preserve human dignity and autonomy.

Broadcom to discontinue free Bitnami Helm charts

https://private-user-images.githubusercontent.com/13216600/467647497-7955df63-96fc-4d77-8003-7ca04bd9ea4b.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.9sFLQjp-oMrAqH7Mi--7LiwQbkqEb_kNxKLCB-CLRuU
Bitnami is moving its container images to a more secure and hardened set, with older images moved to a legacy repository that will no longer receive updates. Users can continue to receive support and updates by subscribing to Bitnami Secure Images or by using the same Helm chart version with the legacy repository.

Wii U SDBoot1 Exploit “paid the beak”

A group of developers, including Rairii and Kelly, discovered a Wii U exploit called "paid the beak" that allows code to be run from the SD Card upon boot. The exploit uses a vulnerability in the SDBoot1 function and can be triggered using a custom jig or a microcontroller like the Pi Pico or PICAXE 08M2.

EPA says it will eliminate its scientific reseach arm

Please enable JS and disable any ad blocker

Multiplatform Matrix Multiplication Kernels

https://burn.dev/_astro/banner.BviNA-iT_Z16UH5r.webp
Matrix multiplication is a core algorithm for modern computing. it is often used to solve problems with large numbers of dot products involving vectors of length k - m n 'outer products' modern hardware can often fuse these operations into single instructions if they are sufficiently independent of each other – this is called double buffering, which is the simplest trait in the matrix matrix ...

lsr: ls with io_uring

https://rockorager.dev/log/lsr-ls-but-with-io-uring/screenshot.webp
The user created lsr, a faster and more efficient version of ls, using their IO library ourio and io_uring to reduce syscalls by an order of magnitude. lsr spends 30% of its runtime sorting and the rest on IO, outperforming alternatives like uutils ls and GNU ls.

Valve confirms credit card companies pressured it to delist certain adult games

https://cdn.mos.cms.futurecdn.net/SnLuegaXTcdghqyvxG2ua8.jpg
Valve removed adult games from Steam due to payment processors' rules, citing loss of payment methods as a reason. This move suggests Steam is under pressure from companies like Visa and Mastercard.

Meta says it wont sign Europe AI agreement, calling it growth stunting overreach

https://image.cnbcfm.com/api/v1/image/108171965-17525777211752577719-40729805494-1080pnbcnews.jpg?v=1752577720&w=750&h=422&vtcrop=y
Meta Platforms declined to sign the European Union's AI code of practice, citing overreach that will stunt growth. Global affairs chief Joel Kaplan said Europe is heading down the wrong path on AI.

Trying Guix: A Nixer's impressions

The user, familiar with Nix, tried Guix and found it has a different layering model, slower performance, and a more focused community with better documentation, but also requires Scheme knowledge and has a more complex onboarding process. The user is intrigued by Guix but needs to overcome its technical challenges, such as slower performance and difficulty in iterating, to determine if it can ...

Replication of Quantum Factorisation Records with a VIC-20, an Abacus, and a Dog

https://eprint.iacr.org/img/iacrlogo_small.png
Researchers Peter Gutmann and Stephan Neuhaus replicated quantum factorisation records using a VIC-20 computer, an abacus, and a dog. Their work aims to inspire future record-breaking efforts in quantum factorisation.

AI capex is so big that it's affecting economic statistics

https://paulkedrosky.com/content/images/2025/07/2025-07-16_13-51-16-3.png
The US is experiencing a massive private sector stimulus through AI datacenter spending, which is realigning capital and masking underlying economic weakness. This surge has unintended consequences, including mass job losses and starving other sectors of investment.

Show HN: Molab, a cloud-hosted Marimo notebook workspace

https://marimo.io/og/molab.png
molab is a cloud-hosted marimo notebook workspace that lets you rapidly experiment on data with Python and SQL

Mango Health (YC W24) Is Hiring

https://bookface-images.s3.amazonaws.com/small_logos/e7bf41149065e310ebb8e2e20ade6302ae5d9a50.png
We're hiring for an AI Guide developer to help individuals with OCD using AI and therapeutic modalities. The ideal candidate has experience with React, Python, and LLMs, and is willing to learn about Context Engineering and therapeutic concepts.

CP/M creator Gary Kildall's memoirs released as free download

https://spectrum.ieee.org/media-library/cp-m-operating-system-inventor-gary-kildall-and-his-memoir.jpg?id=25581228&width=1200&height=900
Gary Kildall's memoir "Computer Connections" was released by the Computer History Museum, detailing his life and industry impact. The memoir highlights Kildall's definition of success, prioritizing inventions and life over profits.

The year of peak might and magic

https://www.filfre.net/wp-content/uploads/2025/07/4887974-heroes-of-might-and-magic-iii-the-restoration-of-erathia-windows-247x300.jpg
New world was oddly nervous about spending too much money on a sequel. heroes iii may have been the first game ever to utilize newfangled audio-compression format known as mp3, says john mccarthy jr. he says many reviewers complained that the game looked essentially the same as the previous game in the series - but that's no less welcome for it if you want to play crpgs like might and

Sage: An atomic bomb kicked off the biggest computing project in history

https://assets.ibm.com/is/image/ibm/1950s_sage_operating-console?ts=1711715983268&dpr=off
The US government commissioned MIT and IBM to create SAGE, a real-time air defense system, in 1949, which became the world's largest computer project at the time. SAGE led to numerous technological innovations and IBM's rise as a leader in online computing, remaining in service until 1984.

Show HN: I built library management app for those who outgrew spreadsheets

https://www.librari.io/_next/image?url=%2Fscreenshots%2Fdashboard-dark.png&w=3840&q=75
Manage your library with ease. librari.io is a platform that provides a wide range of tools and services to help you stay on top of your library. Generate reports, manage books and everything else that you need to get your library off the ground.

A New Geometry for Einstein's Theory of Relativity

https://www.quantamagazine.org/wp-content/uploads/2025/07/NewGRGeometry-crHarolBustos-Lede.webp
Clemens Sämann and Michael Kunzinger developed a new method to estimate curvature in non-smooth space-time settings. Their approach uses triangle comparisons to provide good curvature estimates, allowing them to prove singularity theorems without assuming smooth space-time.

Cancer DNA is detectable in blood years before diagnosis

https://i0.wp.com/www.sciencenews.org/wp-content/uploads/2025/06/061325_MR_cancer.jpg?fit=1030%2C580&ssl=1
Researchers found cancer DNA in people's blood up to three years before diagnosis, suggesting early cancer screening is possible. This could lead to earlier treatment options and improved patient outcomes.

Show HN: Simulating autonomous drone formations

https://raw.githubusercontent.com/sushrut141/ketu/main/images/formation.png
Ketu provides a sandbox for simulating autonomous drones and testing formation techniques without a large setup. It uses a simplistic approach with scenarios, nodes, and clients for sensing and communication.

How I keep up with AI progress

https://nilenso.com/images/people/atharva.webp
The author recommends a list of sources for understanding AI, including official announcements from labs, trustworthy individuals, and technical write-ups. They emphasize the importance of staying close to the source and assuming all reporting is wrong by default.

Benben: An audio player for the terminal, written in Common Lisp

https://chiselapp.com/user/MistressRemilia/repository/benben/uv/benben-0.6.0.gif
Benben is a command line audio player and converter for Linux and Unix-like systems with an oldschool interface. It supports multiple formats and is maintained by Remilia Scarlet, who accepts donations on Ko-Fi and Liberapay.

Making a StringBuffer in C, and questioning my sanity

https://briandouglas.ie/images/og-images/string-buffer-c.png
You're questioning your sanity due to the challenges of writing C, but you enjoy the process despite its difficulty. You've implemented a string buffer with replace and remove functions, which were particularly tricky to get right.

Hundred Rabbits – Low-tech living while sailing the world

https://100r.co/media/content/about/galley.png
They have been busy with various projects including sailing, boat maintenance, and game development, and have also been reading books and participating in community events. They have released new games, updated their website, and shared their experiences and knowledge with others through blog posts and social media.

How to Get Foreign Keys Horribly Wrong

https://hakibenita.com/images/01-django-foreign-keys-catalog-erd.png
A drop index acquires an access exclusive lock on the table, blocking other accesses until the index drop can be completed. to avoid that, we need to change the way django applies the migration - using separate database and state instead of migrations based on state 'state' if you want to drop an index, you can use select_related to fetch both the product and the

When root meets immutable: OpenBSD chflags vs. log tampering

https://rsadowski.de/posts/2025/openbsd-immutable-system-logs/featured.jpg
The author discusses how ISO 27001 requires logs to be protected against tampering and unauthorized access, but doesn't specify how to achieve this. They found a solution using OpenBSD's immutable flags, which can be set using chflags.