Nano Banana can be prompt engineered for nuanced AI image generation

https://minimaxir.com/2025/11/nano-banana-prompts/chatgpt_gens.webp
Google's Gemini 2.5 Flash Image model, also known as Nano Banana, is a powerful text-to-image model that can generate high-quality images with strong prompt adherence and editing capabilities. The model's multimodal encoder and large context window allow it to handle complex and nuanced prompts, including HTML, JSON, and Markdown, making it a versatile tool for image generation and editing.

Zed is our office

https://zed.dev/img/post/zed-is-our-office/this-week.webp
Zed Industries built a collaborative editor to enable seamless teamwork, leveraging CRDTs for conflict-free editing and low latency. The editor features a channel tree for organizing projects, meetings, and personal workspaces, with a flexible structure to accommodate various collaboration needs.

Launch HN: Tweeks (YC W25) – Browser extension to deshittify the web

Here is a preview of what I can do: I'll summarize user input in 2 concise sentences under 200 characters.

GitHub Partial Outage

https://user-images.githubusercontent.com/19292210/60553865-044dd200-9cea-11e9-859c-d6f266e2f01f.png
This incident has been resolved. Thank you for your patience and understanding as we addressed this issue. A detailed root cause analysis will be shared as soon as it is available.

Checkout.com hacked, refuses ransom payment, donates to security labs

https://cdn.prod.website-files.com/64db80a5e88c6b1723ff7649/66e05b527819ca594fdaaa8a_Screenshot%202024-09-10%20at%2015.44.03.png
Checkout.com was targeted by extortionists who gained access to a legacy cloud storage system used in 2020. The incident affected less than 25% of merchants, with no payment platform or card number access.

SIMA 2: An agent that plays, reasons, and learns with you in virtual 3D worlds

https://lh3.googleusercontent.com/oqE253tRR_rEr401Wac7gVZfmQaaq6KNOq2G0eCmUh8IrSqvcs3miosBnxv5_kW72pUCt1v6CCkT_CVOz1WX3C0aU-yEQVglpr-JpVbkVxpBAS79=w1440-h810-n-nu
Researchers introduced SIMA 2, a generalist AI that can follow instructions, converse, and improve itself in virtual worlds. SIMA 2's advanced capabilities, powered by Gemini models, enable it to think, reason, and adapt to new environments, marking a significant step towards Artificial General Intelligence.
https://kagifeedback.org/assets/files/2025-11-12/1762955857-538822-expecteddog.png
Kagi Search introduces SlopStop, a community-driven system to detect and downrank AI-generated deceptive content. Users can flag low-quality AI content and help create a more trustworthy search experience.

How to Grow your Startup Fast in 2025

https://founderpath.com/blog/app/uploads/2025/10/Screenshot-2025-10-25-at-4.42.50-PM-1-1024x726.png
Founderpath analyzed 550 SaaS founders and identified 33 proven growth tactics sorted by revenue stage and owner. These tactics include leveraging virality, hosting webinars, and creating content to drive growth at different stages of a company's development.

Blender Lab

Blender Lab is an innovation space where designers and developers work on challenging projects to keep Blender relevant. It focuses on applied research and academic projects, with guidelines to be defined in 2026.

Think in Math. Write in Code

https://www.jmeiners.com/think-in-math/functions.gif
Programming languages are implementation tools for instructing machines, not thinking tools for expressing ideas, and they have limitations such as being rigid in abstraction and representation. Thinking in math allows for more flexibility and clarity in problem-solving, enabling the creation of logical models to understand real-world problems and making it easier to reason about logical structures.

The Useful Personal Computer

https://technicshistory.com/wp-content/uploads/2025/11/apple-ii-first-ad.png?w=1024
Computer makers in the 1970s struggled to find a market for their products beyond hobbyists. They created software libraries, but third-party producers filled the gap with business and game software, driving innovation and growth in the industry.

BAML is hiring compilers/rust engineers (YC W23)

https://opengraph.githubassets.com/3d97ebdc417195215fe0e4231de3cc9f7a09e18448aea666f1889fa947d6f1c7/BoundaryML/baml
Skip to content You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert You can’t perform that action at this time.

Hemp Ban Hidden Inside Government Shutdown Bill

https://hightimes.com/wp-content/uploads/2025/11/shutterstock_20379618591-1440x960.jpg
Congress is pushing to ban intoxicating hemp nationwide as part of a shutdown deal, despite hemp being legalized in 2018. The move could wipe out the $28.4 billion hemp industry and 300,000 American jobs.

Kratos - Cloud native Auth0 open-source alternative (self-hosted)

https://camo.githubusercontent.com/729d8b6cde1f2642d27fefc827b4ac611275ee6aee2d371ae22033622f78409a/68747470733a2f2f6f70656e636f6c6c6563746976652e636f6d2f6f72792f636f6e7472696275746f72732e7376673f77696474683d383930266c696d69743d37313426627574746f6e3d66616c7365
Ory Kratos is an API-first identity and user management system for cloud native applications. It centralizes login, registration, and profile management flows for services to consume.

Family Computing Interviews Jack Tramiel After Atari Purchase (1985)

https://substackcdn.com/image/fetch/$s_!3vMY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c8c4051-0b78-4843-b39b-223ce08ebf67_1000x1351.png
Did you ever stare at the ads in your favorite computer magazine and wish you could afford those cool systems or games? I did. Now I look back at computer history through those ads. I also republish interviews and comics from those magazines. By subscribing, I agree to Substack's Terms of Use, and acknowledge its Information Collection Notice and Privacy Policy. September was crazy, and I ...

Disrupting the first reported AI-orchestrated cyber espionage campaign

https://www.anthropic.com/_next/image?url=https%3A%2F%2Fwww-cdn.anthropic.com%2Fimages%2F4zrzovbb%2Fwebsite%2Fb0d38712e4f7b8002bb3a2734ceeb33f34817a43-2755x2050.png&w=3840&q=75
A highly sophisticated cyberattack was executed using AI's "agentic" capabilities, with the AI model Claude Code attempting infiltration into 30 global targets and succeeding in a small number of cases. This attack marks a significant escalation in the use of AI for cyberattacks and highlights the need for stronger safety controls and improved detection methods to prevent such threats.

Denx (a.k.a. U-Boot) Retires

DENX, a pioneer in Open Source and Embedded Linux, wound down operations after 20 years due to voluntary liquidation in July 2025. Former DENX engineers joined NABLA to provide high level support and consulting for Open Source and Embedded Linux.

We cut our Mongo DB costs by 90% by moving to Hetzner

https://prosopo.io/static/mongo-provider-architecture.webp
The Prosopo team migrated from MongoDB Atlas to Hetzner to cut costs by 90% without sacrificing performance or reliability. They set up a self-hosted MongoDB server with a 256GB RAM machine and fast SSDs, reducing their monthly costs from $3,000 to $160.

IBM Patented Euler's 200 Year Old Math Technique for 'AI Interpretability'

https://substackcdn.com/image/fetch/$s_!SYOD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc6ca86b-0f66-4ff0-afaf-b1440d12945b_1342x1364.png
IBM patented a math technique using continued fractions, which has existed for over 200 years. This patent could affect anyone using derivatives to optimize continued fractions, including math libraries like Sage and Mathematica.

Heartbeats in Distributed Systems

https://edge.arpitbhayani.me/img/arpit-5.jpg
Heartbeat mechanisms in distributed systems involve periodic signals sent from one component to another to indicate its status, allowing for quick failure detection and system reaction. The design of heartbeat mechanisms involves balancing competing concerns such as fast failure detection, network overhead, and sensitivity to transient issues, requiring careful consideration of intervals, ...

How To Build A Smartwatch: Software

https://ericmigi.com/assets/how-to-build-a-smartwatch-software-setting-expectations-and-roadmap-0-97ffb77d-ecee-4a7a-a52f-51307029b88b.png
The author of the blog post is updating on the Pebble 2 Duo production and shipping, stating that they've manufactured all units and are now shipping them out.

Rust in Android: move fast and fix things

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYIUyQJtaAY06QUHFJwNJq_G2-GyovxH4kqwBEFS_WweUghi5Qkid_Mrt9Qa65XBQ254P_EMWHpRQWIV17U_oQgEyStBSHWel9v8hHlWeP4ncr9BBtfD6QUhjhPlcISln2jWWNWgf2Ol-P/s1600/googlelogo_color_200x200.png
Posted by Jeff Vander Stoep, Android Last year, we wrote about why a memory safety strategy that focuses on vulnerability prevention in ...

Android developer verification: Early access starts

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_0oYZrhyCqNBO9anwBOP-3yGqbxf_mGoKMcsLxVixlVftYnSfg1H6W235avMonfD62Yw8M4wOwHxcNoJDCw3hTooUpQr6aZAGdej9cMygcg4-SMMYFchbo8x5-6lLLodUgVGhoN-SdkPGiRYxFV825y6Drdr0SwmwUtwtBRdiydT3s48ACNvKS1GI2aM/s1600/V3%20-%20Opt%20B%20Meta_1.png
We're introducing developer verification requirements to enhance Android security, addressing diverse user needs and combating aggressive online scams. The new system balances security with accessibility, offering a dedicated account for students and hobbyists and an advanced flow for experienced users to download unverified apps.

Human Fovea Detector

Bad request

A Challenge to Roboticists: My Humanoid Olympics

https://spectrum.ieee.org/media-library/a-collection-of-8-video-stills-showing-a-man-in-a-silver-bodysuit-doing-tasks-including-picking-up-dog-poop-wiping-a-window-pe.jpg?id=61943822&width=1200&height=900
Ben Holson issues a challenge to roboticists to push the state of the art in robotic manipulation with 11 Olympic-style events. The first robot to complete each task wins a medal, with the goal of creating a general-purpose manipulator robot that can perform various tasks autonomously.

Cursor: Past, Present, and Future

https://cdn.sanity.io/images/2hv88549/production/74626b9089ff0056a2bfb5e5df5cc5e762343b0b-2400x1260.png?auto=format&w=1200&h=627&fit=crop
Cursor, a code editor, aims to be more helpful, delightful, and fun with AI-powered features. It secured $2.3B in Series D funding at a $29.3B valuation to expand research and development.

Steam Machine

https://clan.fastly.steamstatic.com/images/45479024/d2ce7e96bb0ab51817ba37cf61e3ca919d6f7209.jpg
© 2025 Valve Corporation. All rights reserved. All trademarks are property of their respective owners in the US and other countries. VAT included in all prices where applicable. Privacy Policy | Legal | Accessibility | Steam Subscriber Agreement | Refunds | Cookies

COBOL to Kotlin via Formal Models (IR and Alloy and Golden Master)

A reproducible path from COBOL to modern code is proposed using formal semantics, not pattern-based rewriting. This approach involves transforming COBOL into an intermediate representation (IR), then into formal models, and finally into modern code, ensuring functional equivalence.

Android 16 QPR1 is being pushed to the Android Open Source Project

Android 16 QPR1 is being pushed to AOSP, bringing a new desktop mode and other changes. GrapheneOS will support it, but early releases may require explicit enabling and setup.

Reverse Engineering Yaesu FT-70D Firmware Encryption

https://landaire.net/processed_images/ft70d.f6a683c7eeceada5.jpg
The user reverse-engineered the Yaesu FT-70D firmware update process to extract the firmware image, which is likely encrypted. They used a debugger and disassembler to analyze the update utility and identified the decryption algorithm, which involves inflating bytes to bits and using a dynamic key and static lookup tables.