On The <dl> (2021)

https://benmyers.dev/images/on-the-dl/product-details.png
The HTML &lt;dl&gt; element represents a list of name-value pairs, which is a common UI pattern. It consists of &lt;dt&gt; for names and &lt;dd&gt; for values, allowing for semantic markup and improved accessibility.

Reverse engineering circuitry in a Spacelab computer from 1980

https://static.righto.com/images/cimsa/cimsa-diagram2-w500.jpg
The Spacelab computer was a 16-bit minicomputer built by CIMSA, using a French-built Mitra 125 MS processor. It had a 32-bit ALU and supported up to 128 KB of magnetic core memory.

My two-part desk setup

https://storage.ghost.io/c/ce/27/ce27a3ef-1519-4f17-a161-c8cdf7793306/content/images/size/w1920/2025/11/L1000757-1.jpeg
The user changed their desk setup to face the room instead of the wall, creating a more open and comfortable space. They also split their desk into a digital and analog side, allowing for a clear separation of work and personal activities.

z386: An Open-Source 80386 Built Around Original Microcode

https://nand2mario.github.io/posts/2026/z386/z386_doom2_game.jpg
z386 is a 386-class CPU built around original Intel microcode, recreating enough of the original machine for the recovered 386 control ROM to drive it. It runs real protected-mode DOS software, including DOS 6 and 7, and games like Doom, with a focus on educational reconstruction and usability.

Hengefinder: Finding When the Sun Aligns with Your Street

https://victoriaritvo.com/blog/hengefinder/manhattanhenge_photo.jpg
The author built a tool called Hengefinder to find henge moments, where the sun aligns with a street, by calculating road bearings and sun azimuths. The tool uses a combination of astronomical data and binary search to find these rare geometric alignments.

80386 Microcode Disassembled

The user and others extracted microcode from a high-resolution image of the 80386 CPU die, disassembled it, and found 215 entry points with new instructions and shared code. The microcode has a hidden security bug in IO permission bitmap handling and may have undocumented features or opcodes, but the exact nature of these is unclear.

The Art of Money Getting

https://kk.org/cooltools/files/2026/05/TheArtOfMoneyGetting.jpg
P.T. Barnum's book "The Art of Money Getting" offers 20 rules for success, emphasizing finding one's natural abilities and avoiding debt. Key principles include being the best at one's work, keeping income above expenses, and maintaining a good reputation.

Italy Cancels Boeing Pegasus Order, Shifting to Airbus A330 MRTT

https://images.euronews.com/articles/stories/09/76/64/52/1536x864_cmsv2_6886fa64-cf51-57a6-859f-6991f60d99c4-9766452.jpg
Italy has acquired six Airbus A330 MRTT tanker aircraft worth 1.39 billion euros, shifting its air defence focus to Europe within NATO. This decision strengthens Europe's military capabilities and reduces Italy's dependence on US solutions.

Making Deep Learning Go Brrrr from First Principles

https://horace.io/img/perf_intro/gpus_go_brrr.webp
To improve deep learning model performance, first identify the bottleneck in your model, which can be compute, memory bandwidth, or overhead. Then, optimize accordingly, such as increasing compute intensity, reducing memory bandwidth costs, or minimizing overhead.

AI Engineering from Scratch

https://aiengineeringfromscratch.com/og-image.png?v=2
The curriculum is a comprehensive AI learning system with 20 phases and 435 lessons in four languages, covering linear algebra to autonomous swarms. It teaches raw math first, then code, with a focus on understanding AI concepts under the hood.

JWT is a scam and your app doesn't need it

JWT is an overcomplicated authentication method that creates more problems than it solves, especially for web apps. A simple session cookie or opaque bearer token is a more secure and efficient alternative.

Oura says it gets government demands for user data

https://storage.ghost.io/c/ed/a2/eda2c6f7-faef-48b4-9ed4-86a4fa4dca68/content/images/size/w960/2026/05/ring-oura-zw-hero.jpeg
The author, a security and privacy reporter, investigated Oura's data handling practices after a deal with the Department of Defense and Palantir sparked customer concerns. Oura's security design choices allow governments to access user data, and the company has a responsibility to ensure user data is secure despite its large valuation.

Highest Random Weight in Elixir

https://jola.dev/images/og/posts/highest-random-weight-in-elixir.png
The user discusses two distributed hashing algorithms, ExHashRing and Rendezvous Hashing (HRW), comparing their performance, complexity, and suitability for different use cases. HRW is simpler and more general than ExHashRing but has a linear time complexity, which can be improved to logarithmic with a skeleton implementation.

Evaluating Spec CPU2026

https://substackcdn.com/image/fetch/$s_!WNLg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F738726d8-dd8c-42cf-b223-177886323bd7_914x458.png
SPEC’s CPU benchmark suite has been a long established industry standard, and is almost impossible to miss when reading through various publications. Intel used SPEC CPU2000 to showcase Pentium 4’s improvements over Pentium III. Samsung used SPEC CPU2000 and SPEC CPU2006 traces to tune their Mongoose cores. SPEC CPU2017 formed part of Intel’s performance projections for Lion Cove. Now, SPEC ...

Why Japanese companies do so many different things

https://substackcdn.com/image/fetch/$s_!q5kh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff42a7b2-6c27-4773-a0b0-561081c55da1_1605x2000.jpeg
Japanese companies are highly diversified due to their unique corporate structure, which prioritizes employee loyalty and long-term survival over shareholder profits. This structure, known as the "J-firm" bundle, allows Japanese companies to adapt and change quickly in response to changing market conditions.

Shipping a laptop to a refugee camp in Uganda

https://notesbylex.com/_media/shipping-laptop-uganda-burned-motherboard-1.jpg
A MacBook was sent from Australia to Uganda via multiple freight services and customs clearances, facing various delays and challenges, but finally arrived safely after 42 days and 36,000 km. The laptop's journey involved failed attempts, unexpected detours, and a surprising delivery to a hardware shop, where it was stored on a shelf before being collected by the sender.

Electrobun 2.0 will be decoupled from Bun due to the Rust rewrite

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

The FBI Wants 'Near Real-Time' Access to US License Plate Readers

https://media.wired.com/photos/6a079053cb9f32a0753bcf6d/16:9/w_640%2Cc_limit/undefined
US lawmakers proposed a ban on automated license plate readers, but the FBI plans to buy nationwide access to the cameras for law enforcement. A crackdown on deepfake sexual abuse images is underway, with the FTC warning companies to remove nonconsensual intimate images and the Department of Justice arresting two men for sharing AI-created explicit content.

Lisp in Vim (2019)

The article discusses two Vim plugins, Slimv and Vlime, which provide Lisp development environments for Vim, and compares their features and installation procedures. The plugins use a client-server architecture and rely on the Swank server to evaluate Lisp expressions, and both support interactive programming and debugging.

Rubish: A Unix shell written in pure Ruby

https://opengraph.githubassets.com/1aaab547000380b311ad0fa9611aa2d145df708342d77a0cc44ebb783a6024c8/amatsuda/rubish
Rubish is a Ruby-based shell that supports bash syntax and integrates Ruby features. It allows seamless mixing of shell commands and Ruby code.

Solving the “Zork” Mystery

https://www.dpolakovic.space/blogs/pics/zork122.jpeg
The author investigated the origin of the word "zork" in the game Zork, initially believing it was a jargon term for unfinished programs.

Improving C# Memory Safety

https://devblogs.microsoft.com/dotnet/wp-content/uploads/sites/10/2026/05/improving-csharp-memory-safety.webp
C# is improving memory safety with a redesigned unsafe keyword that marks obligations for developers to discharge. The new model is opt-in and will be released in .NET 11 as a preview and in .NET 12 as a production release.

Texas woman arrested for Facebook post about town water quality

Jennifer Combs was arrested for a Facebook post about Trinidad's water supply, claiming residents were hospitalized due to bacteria. She filed a federal lawsuit alleging the arrest was an act of political retaliation for speaking out about the city's water problem.

PHP's Oddities

https://flowtwo.io/media/6a0cc116fa53c20f7a54e04a/banner.jpg
The author reflects on their experience with PHP, a language they initially didn't expect to use, but has grown to appreciate despite its quirks. PHP's array data structure is flexible but complex, and its type system has unintuitive features like uninitialized properties.

A 1955 Los Alamos computer experiment changed our understanding of chaos

Mary Tsingou's 1955 experiment on MANIAC revealed a paradox in nonlinear systems, showing they can behave in stable and structured ways despite initial expectations. This discovery reshaped how scientists think about systems and led to the development of new technologies, including the internet.

Microsoft starts canceling Claude Code licenses

https://platform.theverge.com/wp-content/uploads/sites/2/2025/01/Tom_BLURPLE.jpg?quality=90&strip=all&crop=0%2C0%2C100%2C100&w=2400
Microsoft is removing most of its Claude Code licenses and pushing developers to use Copilot CLI instead due to financial and product convergence reasons. The company will invest more in Copilot CLI and encourage developers to file bug reports and feedback.

BambuStudio has been violating PrusaSlicer AGPL license since their fork

https://pbs.twimg.com/media/HINlpHeWAAAdv7R.jpg?name=small&format=webp
BambuStudio is violating the PrusaSlicer AGPL license by using a closed-source networking binary. This is likely due to China's five-law framework, which forces companies to cooperate with intelligence work and maintain secrecy, making it difficult for them to comply with open-source licenses.

The quadratic sandwich

If (mu) is 0, the quadratic lower bound from the sandwich degenerates into the tangent hyperplane. a well-conditioned problem has abundant and trustworthy local information, says daniel saunders. the idea is beautifully simple: instead of reasoning about f in its full n-dimensional glory, we restrict our attention to the straight line connecting x and y

Ebola Outbreak Now Third Largest Recorded and "Spreading Rapidly"

https://cdn.arstechnica.net/wp-content/uploads/2026/05/GettyImages-2277132506-640x426.jpg
The Ebola outbreak in the Democratic Republic of Congo has reached 750 cases and 177 deaths, with the World Health Organization classifying the risk level as "very high" at the national level. The US has been criticized for its withdrawal from global health efforts, which has hindered the response to the outbreak.

Project Glasswing: An Initial Update

https://www.anthropic.com/_next/image?url=https%3A%2F%2Fwww-cdn.anthropic.com%2Fimages%2F4zrzovbb%2Fwebsite%2F7af1880d305b982764cfefc7dce87c677f1b0254-1634x1008.png&w=3840&q=75
Anthropic's Project Glasswing uses AI to find thousands of software vulnerabilities, but fixing them is a major challenge. The project aims to help cyber defenders adapt to this challenge and make software safer by releasing tools and resources to support vulnerability scanning and patching.