The Waymo World Model: A New Frontier for Autonomous Driving Simulation

https://images.ctfassets.net/7ijaobx36mtm/2S3Bfbzy16Vo5uHU5kQkFC/05bc9c945a8908eae6d69cb7ead4093e/preview.png?w=420&
Waymo introduces the Waymo World Model, a generative model for hyper-realistic autonomous driving simulation. It leverages Google DeepMind's Genie 3 to simulate rare events and enhance road safety.

Microsoft open-sources LiteBox, a security-focused library OS

https://raw.githubusercontent.com/microsoft/litebox/main/.figures/litebox.svg
LiteBox is a sandboxing library OS that reduces attack surface by cutting down the interface to the host. It provides a flexible interface for various use-cases and platforms.

Sheldon Brown's Bicycle Technical Info

If you would like to make a link or bookmark to this page, the URL is: https://www.sheldonbrown.com/index.html Last Updated: by John Allen

Understanding Neural Network, Visually

https://visualrambling.space/neural-network/2f09e8566b1497158907.png
User is learning about neural networks from basics, focusing on visualization to understand how they work. They explain a simple use case of recognizing handwritten numbers using neural networks with input, processing, and output.

Learning from context is harder than we thought

https://hy-model-ap-prod-1258344703.cos.ap-guangzhou.myqcloud.com/llm-blog/default/68558e8d/2026020317325150_35d45a7b64f8fdc190e182f83a22d697.png?q-sign-algorithm=sha1&q-ak=AKIDRl074nOsGdJ9zjMsCRWP3ShmgS3VtX4S&q-sign-time=1770111173;2085471173&q-key-time=1770111173;2085471173&q-header-list=&q-url-param-list=&q-signature=5991c589114c85f95eed08b68a0e4315d7b90590
Language models are not yet reliable context learners, failing on most tasks despite having access to all required information. Current models rely on parametric knowledge and struggle with inductive reasoning, context length, and complexity.

I now assume that all ads on Apple news are scams

https://i0.wp.com/kirkville.com/wp-content/uploads/2026/02/IMG_0349.jpeg?resize=834%2C615&ssl=1
Apple partnered with Taboola to serve ads in Apple News, but users are seeing scam ads that look like they were generated by AI. The ads are often from recently registered domains, raising concerns about Apple's and Taboola's ad vetting process.

Hackers (1995) Animated Experience

Invention of DNA "Page Numbers" Opens Up Possibilities for the Bioeconomy

https://caltech-prod.resources.caltech.edu/main/images/Wang_Kaihang-Synthesizing-DN.2e16d0ba.fill-1600x810-c100.jpg
Caltech researchers invented Sidewinder, a technology to write long DNA sequences with high accuracy. This innovation clears a major bottleneck for bioengineering and could have applications in agriculture and therapeutics.

The Monad Called Free

The user discusses implementing the Free monad as a higher-order monad in the category of endofunctors, showing that it is equivalent to lists in this category. They define the HMonad class and make Free an instance of it, demonstrating that Free monads are also free monoids in the category of endofunctors.

A new bill in New York would require disclaimers on AI-generated news content

https://www.niemanlab.org/images/Politico-Newsbox-315x177.jpeg
New York lawmakers introduced the NY FAIR News Act requiring news organizations to label AI-generated content and have humans review it before publication. The bill aims to preserve journalism and protect workers by promoting AI transparency and safeguarding confidential material.

My AI Adoption Journey

The user shares their personal journey of adopting AI tooling, starting with a period of inefficiency, then adequacy, and finally workflow and life-altering discovery, highlighting the importance of using agents with external behavior capabilities. They outline their approach to harnessing AI, including breaking down tasks, verifying agent work, and "harness engineering" to prevent mistakes, ...

Things Unix can do atomically (2010)

UNIX-like/POSIX-compliant operating systems provide atomic operations for thread-safe and multi-process-safe programs without mutexes or locks. These operations include mv -T, link, symlink, open, mkdir, and fcntl, which can be used for file and directory locking, creating new files and directories, and synchronizing access to files.

Animated Engines

https://animatedengines.com/img/507movementsad.png
Click an engine to see how it works.

TikTok's 'Addictive Design' Found to Be Illegal in Europe

Please enable JS and disable any ad blocker

DNS Explained – How Domain Names Get Resolved

https://cdn.bhusalmanish.com.np/Article%20Images/dns-explained/dns-hiererchy.png
The user learned about DNS propagation and TTL after experiencing issues with their domain not updating, and they now understand how DNS works as a chain of referrals from root servers to TLD servers to authoritative nameservers. They also learned about DNS record types such as A, AAAA, CNAME, MX, and TXT records, and how to use them for subdomains, email delivery, and domain verification.

Systems Thinking

There are two main software development approaches: gradual evolution of complexity over time and big up-front design with a detailed specification.

We tasked Opus 4.6 using agent teams to build a C Compiler

https://www-cdn.anthropic.com/images/4zrzovbb/website/7e2e39544a35760367049072406377a54f2b58c0-2554x2554.svg
The user experimented with a new approach called "agent teams" where multiple Claude instances work in parallel on a shared codebase without human intervention, successfully producing a 100,000-line Rust-based C compiler that can build Linux 6.9 on x86, ARM, and RISC-V. The user learned how to design harnesses for long-running autonomous agent teams, including writing tests, structuring work, ...

Stay Away from My Trash

https://framerusercontent.com/images/kLy3CM3CxsVKMHOzdmvQ385veE0.png?width=1600&height=900
The author of tldraw is considering shutting down external contributions due to an influx of low-quality AI-generated pull requests. They argue that code is now easy to write with AI tools, making external contributions less valuable.

The overlooked evolution of the humble car door handle

https://assets.newatlas.com/dims4/default/21a16a2/2147483647/strip/true/crop/3378x2252+622+0/resize/1200x800!/format/webp/quality/90/?url=https%3A%2F%2Fnewatlas-brightspot.s3.amazonaws.com%2F6f%2Fee%2Fb38c3526431f9f975faa3d1c6992%2Fg-wagen-handle.jpg
Automotive door handles have evolved over five decades, from simple bars to modern flush handles that improve aerodynamics. Modern handles often use rods or cables to transfer human motion to the latch, with some using actuators or springs for safety and convenience.

Claude Opus 4.6

https://www.anthropic.com/_next/image?url=https%3A%2F%2Fcdn.sanity.io%2Fimages%2F4zrzovbb%2Fwebsite%2F5ac72c2c6509b4b6c41ac8f742636fe123b0ba1a-1920x1080.png&w=3840&q=75
Claude Opus 4.6 is a significant improvement over its predecessor, offering better coding skills, reliability, and safety. It excels in everyday work tasks, including financial analysis, research, and document creation.

Nixie-clock using neon lamps as logic elements (2007)

https://www.pa3fwm.nl/projects/neonclock/dance.jpg
The author built a digital clock using Nixie-tubes and neon lamps for driving logic, without transistors or ICs. The clock uses ring counters to divide the mains power frequency and drive the Nixie tubes.

Recreating Epstein PDFs from raw encoded attachments

https://neosmart.net/blog/wp-content/uploads/2026/02/EFTA00400459-Sample.webp
The DoJ's latest Epstein archive release has several issues, including censored names, corrupted files, and poor OCR results due to the use of Courier New font and low-quality JPEG scans.

Solving Shrinkwrap: New Experimental Technique

https://kizu.dev/shrinkwrap-solution/examples/image-example.jpg
The user discusses a CSS technique called "shrinkwrap" that allows an element to shrink to fit its content while maintaining its layout, and explains how to implement it using scroll-driven animations and anchor positioning. The technique involves creating a nested structure with a "shrinkwrap-content" element that determines how the text content wraps, and a "shrinkwrap-probe" element that ...

Bits About Money: Fraud Investigation Is Believing Your Lying Eyes

https://www.bitsaboutmoney.com/content/images/size/w2000/2026/02/order-and-chaos-in-focus.png
A Minnesota social program has been plagued by industrial-scale fraud, with some childcare centers having no children present despite reimbursement paperwork, and the state's own investigators believe over 50% of reimbursements were fraudulent. The financial industry has a better understanding of fraud and its prevention, and the government could benefit from adopting similar strategies, such ...

Plasma Effect (2016)

The plasma effect is a procedural graphics technique creating organic patterns through sinusoidal wave interference and color mapping. It combines sine and cosine functions with different frequencies and phases to produce a flowing, pulsing appearance.

The time I didn't meet Jeffrey Epstein

https://s0.wp.com/_si/?t=eyJpbWciOiJodHRwczpcL1wvc2NvdHRhYXJvbnNvbi5ibG9nXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDIxXC8xMFwvY3JvcHBlZC1KYWNrZXQuZ2lmIiwidHh0IjoiU2h0ZXRsLU9wdGltaXplZCIsInRlbXBsYXRlIjoiZWRnZSIsImZvbnQiOiIiLCJibG9nX2lkIjoxMjk1MjA1ODB9.siOtN7gHw4tefA_rZickBw4GfI6tPxGgOQ1AXr2ZoOQMQ
Scott Aaronson discovered his name in the Epstein Files, showing Epstein's attempts to fund a research project with him in 2010, which he largely blew off after his mom's advice to be cautious. Aaronson reflects on how he was not alone in being approached by Epstein, but notes that many scientists who interacted with him were either charmed by him or prioritized his funding over their reservations.

Show HN: Artifact Keeper – Open-Source Artifactory/Nexus Alternative in Rust

https://raw.githubusercontent.com/artifact-keeper/.github/main/profile/feature-graphic.png
Artifact Keeper is an open-source artifact registry that can be self-hosted in minutes, offering a drop-in replacement for JFrog Artifactory and Sonatype Nexus with zero feature gates. It supports 45+ package formats and has features like security scanning, SSO, replication, and a WASM plugin system.

Show HN: Daily-updated database of malicious browser extensions

https://opengraph.githubassets.com/87153f49646b780453edc902a0ab1b71988fd5bfcecf51daf5068671e2dad699/toborrm9/malicious_extension_sentry
This repository maintains a current list of Chrome extensions that have been removed for malware, security violations, or malicious behavior. Since no regularly-updated public database exists for this purpose, this project automates the collection and aggregation of extension removals from multiple sources. I created this project after searching for an updated list of malicious Chrome ...

Animated Knots

https://www.animatedknots.com/wp-content/uploads/2019/03/Knot-Group-v2-1.jpg
A disclaimer is provided for rope-related activities, warning of potential hazards and risks to life. It disclaims responsibility for incidents arising from the use of this material.

The RCE that AMD won't fix

User found a Remote Code Execution vulnerability in AMD's AutoUpdate software due to lack of certificate validation and HTTP download URLs. AMD considered it "out of scope" and did not consider it a vulnerability.