Gaussian Splatting – A$AP Rocky "Helicopter" music video

https://framerusercontent.com/images/9Ahi72p6nVLPpyHfH8SseN8zB0.jpg
A$AP Rocky's music video Helicopter features volumetrically captured human performances rendered as dynamic splats. The team used a 56 camera RGB-D array and Evercoast's system to record over 10 terabytes of raw data, allowing for radical freedom in post-production.

Flux 2 Klein pure C inference

https://raw.githubusercontent.com/antirez/flux2.c/main/images/woman_with_sunglasses.png
This C library generates images from text prompts using the FLUX.2-klein-4B model, with optional BLAS acceleration and no external dependencies. It can be used for image generation and transformation, with a simple API and automatic memory management.

A Social Filesystem

https://overreacted.io/a-social-filesystem/1.png
The AT protocol is a system that allows social apps to store and manage user data as files in a decentralized filesystem, enabling users to switch between apps and maintain control over their data. The protocol uses a combination of domain names, decentralized identifiers, and a registry to create permanent links to user data that survive hosting and handle changes.

Fil-Qt: A Qt Base build with Fil-C experience

https://git.qt.io/assets/twitter_card-570ddb06edf56a2312253c5872489847a0f385112ddbcd71ccfa1570febab5d2.jpg
GitLab Community Edition

Gas Town Decoded

Steve Yegge published "Welcome to Gas Town," an introduction to his AI agent orchestration tool, which was met with mixed reactions due to its scale and new language. A decoder was created to explain the tool's terms, including project, inbox, mayor, worker, fixer, maintenance, and persistent worker agents.

Using proxies to hide secrets from Claude Code

https://formal1.wpenginepowered.com/wp-content/uploads/2026/01/image-300x169.png
Claude Code uses sandbox-exec for OS X users and supports network isolation and proxies to limit access to host. It can perform actions with network access and data, but using proxies and fine-grained permissions can prevent API key exposure.

Dead Internet Theory

https://kudmitry.com/articles/dead-internet-theory/cover.png
The author of an open-source project on HackerNews was accused of using AI-generated code and comments, but their responses seemed suspiciously AI-generated as well. This incident led the author to question the authenticity of online interactions and the prevalence of AI-generated content on the internet.

Police Invested Millions in Shadowy Phone-Tracking Software Won't Say How Used

https://www.texasobserver.org/wp-content/uploads/2026/01/Tangles-Vid.gif
Goliad County sheriff Roy Boyd used a discarded receipt and AI-powered surveillance tool Tangles to track a human smuggling suspect, but critics say the tool poses major risks to civil liberties. Tangles allows warrantless device tracking, raising concerns about police abuse and erosion of constitutionally protected rights.

Poking holes into bytecode with peephole optimisations

Purple-garden's peephole optimisations merge operators, rewrite redundant operations, and remove instructions to reduce startup time. This single-pass optimisation is a fallback for the previous optimisation pipeline and handles constant binary operations and overflow silently.

Sins of the Children

https://asteriskmag.com/media/pages/issues/07/sins-of-the-children/6bcb54fe49-1718900298/carl_burton_1.png
A human team on Chelicer 14d discovers giant, mechanical "death-fleas" that destroy their weather station and kill a team member. The team recommends eradicating the creatures, which are threatening their agricultural operations, and their bosses agree, deploying drones to wipe them out.

The Space and Motion of Communicating Agents (2008) [pdf]

2.1 Bigraphs and their assembly . . . . . . . 2.2 Mathematical framework . . . . . . . 2.3 Bigraphical categories 6.1 Place sorting and CCS . . . . . . 6.2 Link sorting, arithmetic nets and Petri nets . . . . . . . 6.3 The impact of sorting . . . 8 Bigraphical reactive systems 8.1 Dynamics for a BRS . . . . . . 8.2 Dynamics for a nice BRS . . . . . . . A.1 Support translation . . . . . . . . ...

Command-line Tools can be 235x Faster than your Hadoop Cluster (2014)

https://adamdrake.com/static/images/adam_drake_240.jpg
The author compared Hadoop processing to shell commands for data analysis and found shell commands to be significantly faster. Shell commands achieved a speedup of 235 times over Hadoop.

Show HN: Dock – Slack minus the bloat, tax, and 90-day memory loss

This platform offers real-time chat with a focus on deep work, decision tracking, and data security. It provides a simple, ad-free chat experience without AI features, with a free plan available for team history.

Wine 11.0

Wine 11.0 is released with over 6,300 changes and 600 bug fixes, featuring improved WoW64 architecture and NTSYNC support.

Prediction: Microsoft will eventually ship a Windows-themed Linux distro

https://gamesbymason.com/blog/2026/microsoft/ms-danger.jpg
The author predicts Microsoft will discontinue Windows in favor of a Windows-themed Linux distribution within 15 years due to declining Windows quality and expertise. This move would allow Microsoft to maintain compatibility with Windows executables using Wine.

The Cathedral, the Megachurch, and the Bazaar

https://opensourcesecurity.io/images/wide-cathedral.jpg
The original open source "bazaar" has evolved into "Megachurch Open Source" with structured organizations and rules, but the true bazaar still exists with many small, individual projects. The bazaar's chaos and lack of rules can be beneficial, but it's hard to fund and support these projects.

Show HN: Lume 0.2 – Build and Run macOS VMs with unattended setup

https://cua.ai/docs/_next/image?url=%2Fdocs%2F_next%2Fstatic%2Fmedia%2Flume-architecture.f28fc4a4.png&w=3840&q=75
Lume is an open-source VM runtime for macOS and Linux on Apple Silicon, allowing for automation and CI/CD pipelines. It provides a thin layer over Apple's Virtualization Framework for near-native speed and hardware-accelerated virtualization.

Don't waste your back pressure

https://banay.me/ox-hugo/plot_0.png
You might notice a pattern in the most successful applications of agents over the last year. Projects that are able to setup structure around the agent itself, to provide it with automated feedback on quality and correctness, have been able to push them to work on longer horizon tasks. This back pressure helps the agent identify mistakes as it progresses and models are now good enough that ...

Predicting OpenAI's ad strategy

https://ossa-ma.github.io/images/theworldisads.png
The author disputes an NYT analyst's claim that OpenAI is going bust, citing $1.4T in commitments and a $260B valuation. They predict OpenAI will hit $1B in ad revenue by 2026 and $25B by 2029.

Breaking the Zimmermann Telegram (2018)

https://miro.medium.com/v2/resize:fit:458/1*wT42WmKN8FEcbrSutK3qQA.jpeg
In 1917, British codebreakers De Grey and Dilly decrypted a German telegram, the Zimmermann Telegram, which incited Mexico to declare war on the US. The British used this intelligence to inform the US, but had to disguise the source to avoid revealing their method of intercepting US diplomatic traffic.

Show HN: Beats, a web-based drum machine

https://beats.lasagna.pizza/social.png
A web-based drum machine inspired by Teenage Engineering Pocket Operators. Create, save, and share beats with 16-step sequencing and multiple instruments.

Cardputer uLisp Machine (2024)

http://www.ulisp.com/pictures/3j/cardputer.jpg
The M5Stack Cardputer is a £30/$30 handheld Lisp computer with a 240x135 color display, 56-key keyboard, and SD card socket. It runs uLisp and can be programmed using the Arduino IDE or the Cardputer's keyboard.

Stirling Cycle Machine Analysis

https://ohioopen.library.ohio.edu/assets/md5images/4eb414284ea0ff08afdd22a2b7082c87.png
This web resource is a self-contained learning tool for Stirling cycle machine analysis and development. It includes MATLAB modules for thermodynamic, heat transfer, and fluid flow analysis.

A free and open-source rootkit for Linux

A researcher created an open-source rootkit called Singularity for Linux systems to help security researchers investigate new detection and evasion techniques. The rootkit hides its presence, processes, files, and network connections, but can be detected by monitoring system calls and kernel activity.

Prediction markets are ushering in a world in which news becomes about gambling

Overlapping Markup

Overlap in markup languages occurs when a document has multiple non-hierarchical structures that interact in a non-hierarchical manner. Various approaches, including standoff XML and graph-based formalisms, have been developed to represent overlapping markup in a non-overlapping language.

ASCII characters are not pixels: a deep dive into ASCII rendering

https://alexharri.com/images/posts/ascii-rendering/cube-logo-zoomed-in.png
The user built an image-to-ASCII renderer that utilizes shape to achieve sharp, high-quality ASCII rendering by picking characters based on their shape and applying contrast enhancement effects. The renderer uses a 6D shape vector to capture the shape of ASCII characters and a directional contrast enhancement technique to eliminate staircasing effects and improve readability.

More sustainable epoxy thanks to phosphorus

https://www.empa.ch/documents/56164/33636011/eq90-sustainable-epoxy-stopper-870x335.jpg/337d3479-8856-79fb-cdd0-9ae7b0c096e3?t=1765378335231
Empa researchers developed a recyclable, flame-retardant epoxy resin that can be scaled up for industrial production. It has potential applications in coatings, wind turbine construction, and other areas due to its improved fire safety and maintenance features.

ThinkNext Design

https://thinknextdesign.com/img/results.png
ThinkNext Design creates innovative products that blend form and function, delivering value visually, physically, and experientially. Their designs, such as the ThinkPad, have revolutionized the industry with sleek, purposeful, and emotionally resonant designs.

jQuery 4

https://blog.jquery.com/wp-content/uploads/2026/01/jquery-reunion-group-edited.jpeg
The jQuery team has released jQuery 4.0.0 after a long development cycle, bringing many improvements and modernizations, including breaking changes and a size reduction of over 3k bytes gzipped. The new version drops support for IE 10 and older, adds support for Trusted Types, and removes deprecated APIs and internal-only parameters.