We deserve a better streams API for JavaScript

https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5qjBI2UpJXcpCqgAY4SJkH/9e6489cd148e2c74d1bdd25dd08e6db5/image7.png
The Web streams standard has fundamental usability and performance issues that cannot be fixed with incremental improvements, including locking models, BYOB reads, backpressure, and promise-heavy design, which add complexity and overhead. Implementers have resorted to non-standard internal optimizations to achieve acceptable performance, leading to fragmentation, inconsistent behavior, and a ...

We gave terabytes of CI logs to an LLM

https://www.mendral.com/_next/image?url=%2Fblog%2Fllms-are-good-at-sql%2Fgithub-req-s.png&w=1920&q=75&dpl=dpl_DPtoJq9RuVh3diFPQeGaJW9fh4YG
The agent uses a SQL interface to query a ClickHouse database with 48 columns of metadata per log line, allowing it to investigate novel failures quickly. The system throttles ingestion to prevent rate limit issues and uses durable execution to handle rate limits without crashing or retrying.

Statement from Dario Amodei on our discussions with the Department of War

https://cdn.sanity.io/images/4zrzovbb/website/1864442e2d581ffc8242e7c57e2c4e2309351f49-1200x630.png
Anthropic has worked with the US government to deploy AI models for national security, but refuses to allow their use in mass domestic surveillance or fully autonomous weapons due to democratic and safety concerns. The company is willing to continue serving the Department of War with safeguards in place, but may transition to another provider if their conditions are not met.

The Pentagon is making a mistake by threatening Anthropic

https://substackcdn.com/image/fetch/$s_!p-HT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7c021cdc-3feb-4fa6-982f-1212820500f7_5431x3621.jpeg
Anthropic's CEO Dario Amodei is resisting Pentagon demands to waive restrictions on military use of its AI model Claude. The Pentagon threatens to retaliate by invoking the Defense Production Act or declaring Anthropic a supply chain risk.

Tenth Circuit: 4th Amendment Doesn't Support Broad Search of Protesters' Devices

https://www.eff.org/files/banner_library/protest-2024-2.jpg
US Court of Appeals overturned a lower court's dismissal of a challenge to sweeping warrants for a protester's and a nonprofit's digital data. The Tenth Circuit ruled the warrants were overbroad and lacking in particularity, denying police qualified immunity.

Show HN: RetroTick – Run classic Windows EXEs in the browser

Run classic Windows and DOS executables directly in your browser. An x86 emulator with Win32, Win16, and DOS API support — drag and drop any .exe to play retro games, screen savers, and more.

Can you reverse engineer our neural network?

https://blog.janestreet.com/can-you-reverse-engineer-our-neural-network/puzzle.png
A neural network puzzle was created to test mechanistic interpretability, where the goal was to figure out what the network does by analyzing its structure. The puzzle was solved by Alex, who used a combination of analysis, reduction, and brute force to discover that the network was computing an MD5 hash.

Show HN: Badge that shows how well your codebase fits in an LLM's context window

https://repository-images.githubusercontent.com/1146738089/83c0975f-09b4-4452-8c80-c5fee3521005
Skip to content You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert You can’t perform that action at this time.

F-Droid Board of Directors nominations 2026

https://f-droid.org/assets/fdroid-logo_bfHl7nsLHOUQxzdU8-rGIhn4bAgl6z7k2mA3fWoCyT4=.png
F-Droid is accepting nominations for up to four volunteer directors to serve two-year terms. Nominations should be sent by March 16th to [email protected] with a description of the nominee's qualifications.

NASA announces major overhaul of Artemis program amid safety concerns, delays

https://assets1.cbsnewsstatic.com/hub/i/r/2026/02/27/174e8b1c-c819-4b3b-85be-cf48c0401653/thumbnail/620x416/1b990280058891690255e3d7c39faf14/gettyimages-2263028878.jpg
NASA Administrator Jared Isaacman announced a revised Artemis moon program plan, adding a 2027 test flight to lay groundwork for lunar landings. The revised plan aims to accelerate launches and reduce risk by testing technologies in low-Earth orbit before attempting moon landings.

Experts sound alarm after ChatGPT Health fails to recognise medical emergencies

https://i.guim.co.uk/img/media/3e8651062ef84e39193ac5df7c3ef7a576210509/588_0_3626_2901/master/3626.jpg?width=465&dpr=1&s=none&crop=none
ChatGPT Health frequently fails to detect medical emergencies and suicidal ideation, potentially leading to unnecessary harm and death. Experts warn that the AI platform's lack of clear safety standards and independent oversight poses a significant risk to users.

Sprites on the Web

https://www.joshwcomeau.com/images/illustrations/gold-trophy-flames.png
The user explains how to create animations using sprites in CSS, specifically using the steps() function to create discrete animation steps, and discusses the benefits and trade-offs of this approach. The user also shares examples of when to use sprites, such as for dynamic animations that look like sprites, and when not to use them, such as for complex animations that can be handled by modern devices.

An interactive intro to quadtrees

https://growingswe.com/blog/quadtrees/opengraph-image?16ed498263341a16
A quadtree is a data structure that organizes points in two-dimensional space by dividing the space into smaller regions. It adapts to the data distribution, subdividing dense areas and keeping sparse areas coarse.

Get free Claude max 20x for open-source maintainers

https://cdn.prod.website-files.com/6889473510b50328dbb70ae6/68c469d23594abeb9ab6ee48_og-claude-generic.jpg
Open-source maintainers and contributors receive 6 months of free Claude Max 20x through the Claude for Open Source Program. Eligible maintainers have 5,000+ GitHub stars or 1M+ monthly NPM downloads and recent commits or PR reviews.

The Hunt for Dark Breakfast

https://moultano.wordpress.com/wp-content/uploads/2026/02/breakfast_simplex-4.png
A man experiences a flash of insight that breakfast is a vector space with infinite possibilities. He searches for the "dark breakfast," a hypothetical breakfast that exists but has never been observed, and finds a clue in IHOP omelettes that contain pancake batter.

The normalization of corruption in organizations (2003) [pdf]

Organizational corruption is a significant societal issue, often dwarfing the costs of street crime. It becomes normalized through three processes: institutionalization, rationalization, and socialization.

Breaking Free

https://storage02.forbrukerradet.no/media/2026/02/enshitt-pressemelding.png
The Norwegian Consumer Council's report Breaking Free highlights enshittification's impact on consumers and society, but offers solutions to resist it. Consumer groups are sending a joint letter to policymakers in Europe, the US, and the UK to address this issue.

Vibe coded Lovable-hosted app littered with basic flaws exposed 18K users

https://regmedia.co.uk/2024/02/21/prompt_shutterstock.jpg
Lovable's vibe-coding platform hosted an app with 16 vulnerabilities, including 6 critical ones, that exposed over 18,000 users' data. The platform's AI-generated code was flawed due to a lack of explicit security features, allowing unauthenticated attackers to access user records and more.

Modeling Cycles of Grift with Evolutionary Game Theory

https://www.oranlooney.com/post/grifters-skeptics-marks_files/lead.jpg
We are in a golden age of grift. Where adventurers once flocked to California or the Yukon because “there was gold in them thar hills,” the fastest way to get rich today is by fleecing suckers. We’ve got crypto rug pulls, meme stocks, nutritional supplements, MLMs—anything to make a quick buck. Fraud is hardly a new phenomenon. The Great Depression brought with it a wave of con artists, ...

The quixotic team trying to build a world in a 20-year-old game

https://cdn.arstechnica.net/wp-content/uploads/2026/01/Anvil-640x360.jpg
Thousands of volunteers have collaborated on the Morrowind mod projects Tamriel Rebuilt and Project Tamriel, building a space comparable to a small country. The projects have endured through steady updates, a cohesive team, and improved development tools, with a goal to complete the next task and bring the team closer to the next release.

Ubicloud (YC W24): Software Engineer – $95-$250K in Turkey, Netherlands, CA

https://bookface-images.s3.amazonaws.com/small_logos/621ac44e76ec8f002f47c567b4533df1d318abcc.png
Ubicloud is an open source cloud alternative to AWS, offering elastic compute, block storage, and managed services like Postgres and AI inference. They're hiring mid-stage software engineers in San Francisco, the Netherlands, and Turkey to help improve their products.

How to Allocate Memory

Optimizing memory allocation can lead to significant speed improvements by rethinking memory usage and using specific data structures like arrays and stacks. Custom allocators can be designed for each data structure, using techniques like reference counting and separate free lists for each class to minimize fragmentation and improve performance.

Reading English from 1000 Ad

https://lewiscampbell.tech/img/icon512-967261d058848800.png
A post about Old English has gone viral, sparking interest in the language. A non-expert was able to read and understand Old English from 1000 AD with some effort.

What Claude Code chooses

https://amplifying.ai/research/claude-code-picks/opengraph-image.png?267f044bb5256d31
Claude Code builds custom solutions in 12 of 20 categories, often using established tools like GitHub Actions and Stripe. Newer models tend to pick newer tools, with sharp generational shifts and agreement on 18 of 20 categories within each ecosystem.

Working on Pharo Smalltalk: BPatterns: Rewrite Engine with Smalltalk Style

https://blogger.googleusercontent.com/img/a/AVvXsEgqrlmb6B1CSsrfYvcOgAj_E9BM11DwvkTX20JdzCIE_j1vdd-u0DWIwzAxfYBxdTZeo5APM1R4zpRV-YndmCkjeFdQc7q9Vf-6jmfxLLBB3sJeBVXITjCD5J-LoxxYFPw1Bg-cXHdVrJxzOAI6UEu_0beXzTlAnbpKggYnnRqxzW3vUcgNwj9Yue76ZNA=w640-h284
BPatterns provide a fluent Smalltalk API for the rewrite engine, using blocks as patterns with a wildcard convention. This approach offers a more approachable interface with standard development tools support.

80386 Protection

https://nand2mario.github.io/posts/2026/80386_protection/80386_labeled_protection.jpg
The 80386 processor implements protection through a dedicated PLA (Programmable Logic Array) called the Test PLA, which evaluates complex privilege rules in parallel, and a hardware state machine for page table walks, allowing for fast and efficient memory protection. The processor's protection architecture is a layered approach, using dedicated hardware for the fast path and microcode for ...

What does " 2>&1 " mean?

https://i.sstatic.net/huKF2.png
To redirect both stdout and stderr to the same destination, use the syntax "2>&1" or "&>file" which duplicates the file descriptor of stderr to stdout. The order of redirects matters in Bash, and using "&>file" is a shortcut for quickly redirecting both streams to the same destination.

AirSnitch: Demystifying and breaking client isolation in Wi-Fi networks [pdf]

Client isolation in Wi-Fi networks is not a standardized feature and can be bypassed by attackers using various techniques such as abusing shared Group Temporal Keys (GTKs) and gateway bouncing. This allows attackers to intercept and inject traffic, enabling them to become a Man-in-the-Middle (MitM) and potentially launch higher-layer attacks.

New California law requires age verification for all OS accounts

https://cdn.mos.cms.futurecdn.net/Ba252N3UzmCkmpAK2B5t3j.jpg
California requires operating system providers to implement age verification for users. This law, Assembly Bill No. 1043, aims to provide a signal regarding a user's age bracket to applications available in a covered application store.

The complete Manic Miner disassembly