Lessons from 14 years at Google

https://addyosmani.com/assets/images/21-lessons.jpg
To succeed in engineering, focus on understanding user problems, navigating people and politics, and creating clarity in your work. Prioritize learning, humility, and relationships over technical expertise and personal gain.

The unbearable joy of sitting alone in a café

The author sat alone in a café without distractions, enjoying time with their dog and observing people's lives. This experience showed them the beauty of slowing down and the futility of trying to control others' thoughts and feelings.

Neural Networks: Zero to Hero

The user is watching a series of videos explaining neural networks and deep learning concepts such as backpropagation, Torch.Tensor, and language modeling. The videos cover topics like multilayer perceptrons, batch normalization, and generative pretrained transformers, and also delve into the importance of tokenization in large language models.

Claude Code On-the-Go

User runs 6 Claude Code agents in parallel from their phone using Termius and a cloud VM, enabling async development from anywhere. The setup includes Tailscale, mosh, and fail2ban for secure and seamless remote access and development.

Web development is fun again

https://ma.ttias.be//social-share-images/web-development-is-fun-again.png
The author reminisces about simpler web development days with PHP 4, jQuery, and Dreamweaver, but now uses AI to boost productivity and manage complexity. AI has given the author confidence to tackle entire projects again, freeing time for experimentation and quality-of-life improvements.

Street Fighter II, the World Warrier (2021)

https://fabiensanglard.net/sf2_warrier/sf2_title_warrier.webp
Akiman discovered a typo in Street Fighter II's subtitle "World Warrier" just before shipping. He fixed it by layering sprites and using a "pencil-tile" to create a line that made the typo look like an "o".

Anti-aging injection regrows knee cartilage and prevents arthritis

https://scitechdaily.com/images/Osteoarthritis-Knee-777x518.jpg
Researchers at Stanford Medicine found a treatment that blocks a protein linked to aging, restoring cartilage in aging and injured joints by reprogramming existing cells. The treatment, which targets a protein called 15-PGDH, has shown promise in restoring cartilage in mice and human knee tissue, potentially eliminating the need for knee or hip replacement surgery.

Show HN: Terminal UI for AWS

https://raw.githubusercontent.com/huseyinbabal/taws/master/assets/taws-logo.png
taws is a terminal UI for AWS resources, providing easier navigation and management. It requires IAM permissions and can be launched with a default or specific profile and region.

Can I start using Wayland in 2026?

https://michael.stapelberg.ch/posts/2026-01-04-wayland-sway-in-2026/2026-01-03-chrome-wayland-x11_hu_8822a57b2d4633df.png
The user has been trying to switch to Wayland for 18 years but has been hindered by poor driver support, graphics glitches, and other issues, but has finally made progress with the latest nVidia driver and Sway 1.11. Despite this progress, the user still encounters many issues, including graphical glitches, input latency, and bugs, and will likely continue to use X11/i3 for now due to lack of ...

Why does a least squares fit appear to have a bias when applied to simple data?

https://i.sstatic.net/TpWbC16J.png
The user observed a biased linear least-squares fit in their data and found that the eigenvector with the maximum corresponding eigenvalue (PCA) gave a more expected result. This is due to the difference between ordinary least squares (OLS) and total least squares (TLS), where OLS treats the dependent and independent variables asymmetrically.

Show HN: An interactive guide to how browsers work

A guide to how browsers work is available, using interactive examples to help build an intuition of the technical details, omitting some critical details like HTTP protocol versions and DNS nuances. The guide explains how browsers transform URLs into HTTP requests, establish TCP connections, parse HTML, and render web pages using the DOM, CSS, and rendering pipeline.

How will the miracle happen today?

https://kk.org/wp-content/themes/kkdotorg/inc/images/og_default_1200.png
The author recounts experiences of receiving kindness from strangers while hitchhiking and traveling, developing a theory that kindness is like a breath that can be drawn in or squeezed out.

Six-decade math puzzle solved by Korean mathematician

https://wimg.heraldcorp.com/news/cms/2026/01/04/news-p.v1.20260104.cc157fc8964441db8c703d1e6ef52a15_P1.png
Korean mathematician Baek Jin-eon solved the 59-year-old moving sofa problem, proving a shape's upper limit for passing a right-angled corner. His 119-page paper is under review at Annals of Mathematics after seven years of research.

Jeffgeerling.com has been migrated to Hugo

https://www.jeffgeerling.com/blog/2026/migrated-to-hugo/jeffgeerling-old-drupal.png
The user has been maintaining a personal blog on Drupal since 2009, but has grown tired of its complexity and maintenance requirements. They are migrating to Hugo, a static site generator, to simplify their workflow and focus on writing.

Quake Brutalist Jam III

https://slipseer.fra1.cdn.digitaloceanspaces.com/data/attachments/7/7087-ddf4163d6841375e6e2d95fe415eec03.jpg?hash=MV1IZOTAzJ
Quake Brutalist Jam III is a community-created mod for Quake with new content and visuals. It was created by a team of contributors and map authors over a year, with a goal to make something uniquely ambitious for the community.

The Gentle Seduction (1989)

She lived a long life, 95 years old, and then stabilized her appearance at 32. She used a headband to connect her mind with computers, which helped her in various ways, but also made her realize the Mountain was getting more dangerous due to climate change. She used the headband to see patterns of slippage in the ice and to spot crevasses from a distance. She became increasingly dependent on ...

Eurostar AI vulnerability: When a chatbot goes off the rails

https://www.pentestpartners.com/wp-content/uploads/2025/12/image-12.png
A security researcher found four issues in Eurostar's AI chatbot, including guardrail bypass and HTML injection, and disclosed them through the company's vulnerability disclosure programme. Despite initial silence, Eurostar eventually fixed some of the issues, but the researcher notes that the fixes are not exotic and should be applied consistently across the whole lifecycle of AI features.

Hacking a Casio F-91W digital watch (2023)

https://miro.medium.com/v2/resize:fit:700/1*K_H2djaEI9qFkFHp5qwbXA.jpeg
The user modified a CASIO F-91W watch to enable contactless payments by adding an NFC antenna and a microchip, using various tools and devices such as the NanoVNA and Proxmark3. The user successfully tested the modified watch and plans to add features such as security enhancements and a second coil, while emphasizing the importance of responsible usage and ethical considerations.

Maybe comments should explain 'what' (2017)

The author argues that comments should explain both 'what' and 'why' in code, as looking up information elsewhere can be frustrating and lead to assumptions. They propose that comments can be useful in certain cases, even if code is clean and descriptive.

JavaScript engines zoo – Compare every JavaScript engine

I changed my personality in six weeks

https://ichef.bbci.co.uk/images/ic/480xn/p0mrsdfm.jpg.webp
A woman tried to change her personality traits, specifically neuroticism, extraversion, and agreeableness, using online tests and interventions. After six weeks, she reported improvements in extraversion and agreeableness, but not in conscientiousness or openness.

Understanding the bin, sbin, usr/bin, usr/sbin split (2010)

The /bin vs /usr/bin split originated from a 1970s implementation detail on Unix, where the OS grew too big for a single disk pack. This split no longer makes sense and has been carried forward by bureaucrats without understanding its original purpose.

Moiré Explorer

About/Manual L.S.D.

KDE onboarding is good now

User contributed to KDE documentation, starting in 2021, and became its maintainer. They improved onboarding docs, fixed tutorials, and added content, making KDE's developer platform more accessible.

How Samba Was Written (2003)

Request forbidden by administrative rules.

Agentic Patterns

https://raw.githubusercontent.com/nibzard/awesome-agentic-patterns/main/agentic-patterns.jpeg
This catalogue lists repeatable AI patterns for production use. It bridges the gap between toy demos and real products, helping to ship smarter, faster agents.

US attack on Venezuela raises fears of future Greenland takeover

https://i.guim.co.uk/img/media/ea28cc4d401f400eda9cffce231b917931bb2825/641_0_6058_4847/master/6058.jpg?width=465&dpr=1&s=none&crop=none
US rightwing podcaster Katie Miller posted a map of Greenland with the US flag and "SOON" caption after a US military operation in Venezuela, sparking outrage from Denmark. Denmark's ambassador to the US reminded the US of their defense ties and territorial integrity, amid concerns of a US takeover of the mineral-rich territory.

FreeBSD Home NAS, part 3: WireGuard VPN, routing, and Linux peers

https://rtfm.co.ua/wp-content/uploads/2025/11/freebsd_logo1.jpg
I am continuing to set up my home server on freebsd 14.3, which is intended to serve as a nas.... the result of what we’re about to do will look like this: the key is the routes. traffic goes through wg0, and the source address for the packet is set as 10.8.0.3. ping 192.168.0.165 (192.168.0.25) 56(84) bytes of data.

Corroded: Illegal Rust

https://opengraph.githubassets.com/ce246d229f23714e712509b81fa68facd6d338cfb184ceb66a74ffc93dba0ba7/buyukakyuz/corroded
This code showcases advanced Rust patterns for systems programming, including direct memory access, raw pointers, and global mutable state. It demonstrates performance benefits and bypasses Rust's safety features for production-ready code.

North Dakota law lists fake critical minerals based on coal lawyers' names

https://bloximages.chicago2.vip.townnews.com/bismarcktribune.com/content/tncms/assets/v3/editorial/6/bc/6bc1592a-4f01-4257-ab00-9daaf20c512f/694584d628c92.image.jpg?resize=1200%2C800
North Dakota law lists stralium and friezium as critical minerals, sparking controversy over apparent references to coal industry lawyers. Attorney David Straley denies involvement in adding fake names to the list.

Ripple, a puzzle game about 2nd and 3rd order effects

https://ripplegame.app/og-image.png
Test your knowledge of history's domino effects. Predict what happened next in famous historical events. New puzzle every day!

Gershwin-desktop: OS X-like Desktop Environment based on GNUStep

https://private-user-images.githubusercontent.com/4109732/530279795-c28184d2-27e9-4499-aadd-3e6dc7d6e3dc.png?jwt=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.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._rflF_nYFNEzctJiGnekSQ7_6FoQZhoMZvSRgsdJ2Lw
Gershwin is a desktop environment offering a Mac OS X-like user experience with native apps and tools. It can be built from source code in minutes and runs on multiple operating systems including Windows.

OneDrive just deleted all of my files

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

When Kitty Litter Caused a Nuclear Catastrophe

https://images.squarespace-cdn.com/content/55ac34e4e4b0170ef54be632/1744724471595-S6X79EOIQDUPZTKMW56A/PREN_E079_CatLitter.jpg?format=1500w&content-type=image%2Fjpeg
A nuclear waste container at the Waste Isolation Pilot Plant in New Mexico burst due to a chemical reaction caused by the wrong type of kitty litter. The incident led to a costly cleanup and raised concerns about the long-term safety of nuclear waste storage.

Using Hinge as a Command and Control Server

https://mattwie.se/assets/images/mint.jpg
A threat actor can exploit Hinge's undocumented API and lack of certificate pinning to steal user data and inject malware. They can use a Mint Mobile SIM and a vibe-coded Python script to encode a binary into an image, then upload it to Hinge to store larger amounts of data.

Pickle 1 AR Glasses (YC W25) May Be Fraudulent

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

GLSL Web CRT Shader

Click here if you are not redirected.

How I archived 10 years of memories using Spotify

https://david-og-card-generator.vercel.app/api/notes?title=How%20I%20archived%2010%20years%20of%20memories%20using%20Spotify
User uses music to re-experience past emotions by saving liked songs in a specific order. They maintain a "rolling window" of liked songs to link music to specific dates.

MyTorch – Minimalist autograd in 450 lines of Python

https://opengraph.githubassets.com/b7ae555bfac1b19b5494d9ab3b5cd0be948e64c193fedd4955e96f8216314f2a/obround/mytorch
mytorch is a Python autograd implementation similar to PyTorch, supporting high-order derivatives and GPU acceleration. It uses NumPy for heavy-lifting and supports both scalar and non-scalar computations.

Stop Forwarding Errors, Start Designing Them

Error handling in software development is often flawed due to the focus on propagating errors exactly rather than providing meaningful context for debugging. A better approach involves categorizing errors by response and using context-tracking mechanisms to provide human-readable information for debugging and machine-readable data for automated recovery.

Nike's Crisis and the Economics of Brand Decay

https://static.philippdubach.com/cdn-cgi/image/width=1200,quality=80/nike_final.png
Nike's decline is due to weakening its competitive advantages through a direct-to-consumer shift, organizational restructuring, and marketing shift. This collapse of its sustainable competitive advantage led to a 42.7% gross margin decline and an 11.5% revenue drop.

How Thomas Mann wrote The Magic Mountain

https://i.guim.co.uk/img/media/b94cfab11a7ba58ab1068d1264db38c27def3b6a/38_44_3899_3007/master/3899.jpg?width=465&dpr=1&s=none&crop=none
Thomas Mann's novel The Magic Mountain was initially considered problematic and German, but it became a literary modernist summit. The novel's composition and plot mirrored its author's changing views on politics and morality during World War I.

Adding insular script like it's 1626

https://www.djmurphy.net/main-web-clo-gaelach.jpg
The user is exploring ways to incorporate the ancient Irish script Cló Gaelach into modern media, while preserving the original text for accessibility and data portability. They successfully used discretionary ligatures in a font to achieve the look of the old script and are now experimenting with repurposing HTML elements to preserve reading flow and screen reader functionality.

The PGP problem (2019)

PGP is a flawed encryption system that has been outdated for decades and is no longer secure, yet many people still use it due to its complex and confusing nature. Instead of using PGP, users should consider alternative tools like Signal, Tarsnap, and age for secure messaging, backups, and file transfers.

The Great Gatsby is the most misunderstood novel (2021)

https://ichef.bbci.co.uk/images/ic/480xn/p096h6vy.jpg.webp
The Great Gatsby's meaning has been misunderstood since its publication in 1925, with many readers focusing on its parties and glamour rather than its complex themes. The novel's enduring relevance is due to its exploration of the American Dream, class, and identity, which continues to resonate with readers today.

Show HN: Server-rendered multiplayer games with Lua (no client code)

The engine uses a fixed virtual coordinate system of 800x600. All drawing commands (api.fill_rect, api.draw_line, etc.) use these coordinates. The engine automatically scales the output to fit the user's screen while maintaining the logical resolution and aspect ratio.

Cold-blooded software (2023)

The professor shows a frozen baby painted turtle to demonstrate cold-blooded animals, which can adapt to temperature changes. This concept is applied to software projects, where cold-blooded projects use stable, low-maintenance technology to survive long periods of inactivity.

Show HN: I replaced Beads with a faster, simpler Markdown-based task tracker

https://opengraph.githubassets.com/2b1035c01213343c434b0637b85d281373b9334716db352a394fde07b7d0c58b/wedow/ticket
tk is a minimal ticket system with dependency tracking for AI agents, inspired by Joe Armstrong's Minimal Viable Program. It's a portable bash script requiring coreutils and jq, with features like markdown files and IDE navigation.

Show HN: Claude Reflect – Auto-turn Claude corrections into project config

https://opengraph.githubassets.com/96c9a3dddc1d4fb8bdfd6529f06b12f8c3e4ae250abbe5ef0f778116d8bf9b44/BayramAnnakov/claude-reflect
A self-learning Claude Code system captures corrections and feedback, syncing them to CLAUDE.md and AGENTS.md for future sessions. The system uses a plugin to scan past sessions, learn from corrections, and update CLAUDE.md with a confidence score.

Why is there a tiny hole in the airplane window? (2023)

https://afar.brightspotcdn.com/dims4/default/e038ad3/2147483647/strip/true/crop/2959x1973+0+1844/resize/900x600!/quality/90/?url=https%3A%2F%2Fk3-prod-afar-media.s3.us-west-2.amazonaws.com%2Fbrightspot%2F13%2F73%2Fb30aa30b485790e49ba6935adc51%2Fairplane-window-nandha-kumar-oi5hcwazv4s-unsplash.jpg
Airplane windows have a small hole at the bottom called a bleed hole which helps equalize pressure between the cabin and the space between panes. This hole prevents stress on the windows during pressure changes and also aids in preventing condensation that could obstruct the view.

Venezuela's interim government says it is united behind Maduro

Please enable JS and disable any ad blocker

The (likely?) cheapest home-made Michelson interferometer

https://guille.site/images/3d-printed-michelson/build.jpeg
User built a Michelson interferometer using a 3D printer and basic components from Amazon, costing under $3. The device measures tiny changes in distance using constructive and destructive interference, making it a great first experiment in CAD and 3D printing.

Was it a billion dollar mistake?

The author argues that the "Billion Dollar Mistake" of null pointer dereferences is not as big of a problem as people think, and that it's often caused by a specific mindset of thinking about individual elements rather than grouped elements. The author believes that this mindset is a necessary phase of thinking, but that it's inefficient and bug-prone, and that moving to a grouped-element ...

Anyone have experiences with Audio Induction Loops?

https://upload.wikimedia.org/wikipedia/commons/thumb/9/9b/Hearing_induction_loop_hearing_aid.jpg/250px-Hearing_induction_loop_hearing_aid.jpg
An audio induction loop system is an assistive listening device for individuals with hearing impairments, using electromagnetic fields to transmit sound. It consists of a loop of cable generating a magnetic field that can be picked up by telecoil-equipped hearing aids.

Signals vs. Query-Based Compilers

https://marvinh.dev/media/signals-graph.jpg
Query-based compilers have emerged as a new architecture, similar to Signals in UI rendering, but with different design choices, allowing for interactivity in the days of LSPs and tight editor integrations. This architecture is built around queries, inputs, and a database, with queries being pure functions over their inputs, allowing for caching and parallelization, and making it suitable for ...

SQLNet A social network that looks like Twitter but you write SQL to do anything

Master SQL through hands-on practice. Write real SQL queries in our interactive playground with a social media database. Perfect for beginners learning SELECT, JOIN, INSERT, UPDATE, and more.

NSFW Acronyms for Programmers (Free eBook)

https://raw.githubusercontent.com/fristovic/naughty-words-every-programmer-should-know/main/cover.png
The book "Naughty Words" uses humor to explain software development principles in memorable, slightly NSFW acronyms. It's free to share under Creative Commons BY 4.0 license.

Show HN: Hover – IDE style hover documentation on any webpage

https://raw.githubusercontent.com/Sampsoon/hover/main/docs/custom-endpoint-settings.png
This Chrome extension is coming to the Chrome Web Store soon and can be loaded manually by navigating to chrome://extensions and selecting the dist_chrome folder. It requires an OpenRouter API key or custom OpenAI client endpoint for configuration.

AI sycophancy panic

https://opengraph.githubassets.com/1668e3109ffc4554af4bb22340f87b47fc6277e28a3170bdd8581d2db04ec614/firasd/vibesbench
Skip to content You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session. You switched accounts on another tab or window. Reload to refresh your session. Dismiss alert You can’t perform that action at this time.

YouTube Playlist Downloader

https://opengraph.githubassets.com/3e8d616101dc412d80ce1a954c84585f04dbb583bfd920efdfe62d8cd22b45fd/Linuxmaster14/yt-playlist-downloader
A simple, powerful Bash script to batch download and organize YouTube playlists by channel name using yt-dlp. 1. Add your playlists: Edit playlists.txt and add your channels and playlist URLs in the format: 2. Cookies Place your cookies.txt file in the same directory. How do I pass cookies to yt-dlp?

Nightshade: Make images unsuitable for model training

https://nightshade.cs.uchicago.edu/images/yujinchoo-ns.jpg
Nightshade is a tool that transforms images into "poison" samples to deter model trainers who disregard copyrights and opt-out lists. It distorts feature representations inside generative AI models, increasing the cost of training on unlicensed data.

Two ways to crack a walnut, per Grothendieck (2025)

Alexander Grothendieck described two math approaches: hammer and chisel (forceful) and softening liquid (gentle). The second approach, used by Grothendieck, involves understanding concepts deeply to lead to elegant computations.

Everything You Need to Know About Email Encryption in 2026

https://i0.wp.com/soatok.blog/wp-content/uploads/2026/01/BlogHeader-2026-Encrypted-Email.png?fit=1200%2C675&ssl=1
Security researchers have found vulnerabilities in PGP software, making encrypted emails unreliable. Cryptographers have largely abandoned efforts to make "encrypted email" work due to its inherent flaws and metadata leakage.

Show HN: An LLM-Powered PCB Schematic Checker (Major Update)

https://traceformer.io/images/Benefits.png
Traceformer.io offers AI-driven electrical design checks using datasheets and design files with transparent token usage and cost estimates. It provides evidence-backed findings and lets users test with their own designs without requiring a credit card.

Pixoo Sign Client for Ruby

https://opengraph.githubassets.com/1e0235776f606bc40f7f13fb21c20d7f130ba8c3245468f0e4f3d52e18134862/tenderlove/pixoo-rb
A user is using a Pixoo display to show sensor data from a remote server. The display fetches PM2.5 data from a server at tender.home:9292.

Learning to Play Tic-Tac-Toe with Jax

https://joe-antognini.github.io/assets/posts/jax-tic-tac-toe/random_games.svg
The article explains how to train a neural network to play Tic-Tac-Toe using reinforcement learning in Jax, with a focus on pedagogy and simplicity. The training process involves using temporal difference learning, introducing a target network, and implementing epsilon-greedy sampling to balance exploration and exploitation.

OpenGitOps

https://opengitops.dev/static/thumbnail-default-28daea91b25c13140a8352ed6a1aa031.png
GitOps is a structured approach to implementing infrastructure as code using declarative configuration. It increases quality, reduces deployment issues, and allows engineers to focus on code problems.

Millennium Challenge: A corrupted military exercise and its legacy (2015)

https://warontherocks.com/wp-content/uploads/2015/11/61215-1024x616.jpg?v=1477535113&v=1767572742
The Millennium Challenge 2002 (MC '02) war game was scripted to ensure a US victory, but the red team led by Paul Van Riper surprised everyone by sinking 19 US ships. The exercise's shortcomings and unrealistic scenarios were later acknowledged, but senior Pentagon officials were unwilling to hear the bad news.

Developing a BLAS Library for the AMD AI Engine [pdf]

The AIE array is a 2D grid of tiles that can be connected to neighboring tiles, and the aiecompiler compiles AIE programs to a design that can run on the AIE array. The AIE array can be used to implement BLAS routines such as scal, dot, and gemv, and the performance of these routines can be improved using techniques such as tiling and dataflow.

Corundum – open-source FPGA-based NIC and platform for in-network compute

https://opengraph.githubassets.com/0d6f73ada5f7e5b7c535f789b8ce1fe6692b1987619ead4c15aef892ef3a90be/corundum/corundum
Corundum is an open-source, high-performance FPGA-based NIC for in-network compute with features like 10G/25G/100G Ethernet and PCI express gen 3. It supports thousands of individually-controllable queues and has a dedicated application section for custom logic.

Neurodivergent Brains Build Better Systems (2025)

https://substackcdn.com/image/fetch/$s_!mJ3x!,w_1200,h_600,c_fill,f_jpg,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58a06062-75e5-43c0-ac7a-0451d00d83e6_2048x1366.jpeg
Neurodivergent traits like obsessiveness and focus can create superior infrastructure and code, but companies often neglect to optimize for them due to legacy corporate environments. Neurodivergent executives can help eliminate inefficiencies and create cultures that achieve technical excellence.

The price of fame? Mortality risk among famous singers

https://jech.bmj.com/sites/default/files/highwire/jech/80/1.cover-source.jpg
Fame is linked to a higher mortality risk among famous musicians, with a 33% increased risk compared to less famous counterparts. This suggests that fame itself may contribute to increased mortality risk beyond occupational burdens associated with being a musician.

Show HN: I built a tool to create AI agents that live in iMessage

https://tryflux.ai/logo.png
Build Your Own Agent in iMessageBuild Your Own Agent in iMessage Build me a weather agent that checks the forecast in iMessage

Anatomy of BoltzGen

https://cdn-avatars.huggingface.co/v1/production/uploads/62f75c07870a3f98bbf46ebc/7sbyWCdp7_TI9tdR3KdoY.jpeg
This tool helps design new proteins that can bind to specified targets like other proteins or small molecules. Users provide target structures in PDB format and specify conditions, and the tool gen...

Show HN: Quantum Tunnel

MOVE TO EXPLORE

A New Year's letter to a young person

https://substackcdn.com/image/fetch/$s_!znU7!,w_1200,h_600,c_fill,f_jpg,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe6c807d8-9561-4a5f-9f8b-e07346bb7c71_4608x3456.jpeg
To prepare for careers in knowledge-intensive work, students should build deep domain knowledge, be open to new experiences, and learn to learn quickly. They should also seek leverage, consider location, and develop skills to supervise AI.

Show HN: Comet MCP – Give Claude Code a browser that can click

https://camo.githubusercontent.com/510d1c8a476b7192b4edfcc72b8da89c7d54be6b30b19569049d270e60fdd3d2/68747470733a2f2f676c616d612e61692f6d63702f736572766572732f4068616e7a696c692f636f6d65742d6d63702f6261646765
An MCP server connects Claude to Perplexity Comet for agentic web browsing and research. It enables real-time task monitoring and automatically launches or restarts Comet with remote debugging enabled.

Worst Case Optimal Joins: Graph-Join Correspondence

https://finnvolkel.com/assets/tpch_query5_hypergraph%201.png
The join problem can be represented as a graph where nodes are join variables and edges are relations, and results from graph theory can be applied to joins, such as vertex cover and edge cover, to establish bounds on the output size of a query. The AGM bound, a relaxed version of the edge cover, provides a valid bound on the output size of a query, and can be used to determine the worst-case ...

Using fewer syllables to express numbers

Recent Optimizations in Python's Reference Counting

https://rushter.com/static/uploads/img/2026/refcount.png
Python 3.14 introduces LOAD_FAST_BORROW to avoid incrementing reference counts for local variables, improving performance in hot loops. This optimization uses static lifetime analysis and borrowing, similar to Rust lifetimes, to reduce reference counting overhead.

U.S. veterans helped Venezuela's Machado escape

https://media.npr.org/assets/img/2022/09/16/carriekahn_sq-692bcae5ced02dc352747d9bd08a6365b66649f8.jpg?s=100&c=85&f=jpeg
María Corina Machado, a Venezuelan opposition leader, was extracted from Venezuela by US Special Forces Veteran Bryan Stern and his team, Grey Bull Rescue Foundation. They successfully navigated a treacherous sea route to a Caribbean island, where Machado boarded a private plane to Oslo for the Nobel Peace Prize ceremony.

Swift interface for GNUStep's version of AppKit

https://opengraph.githubassets.com/6b56cec221fdac7af7234cfec2318e903d9160cfb6eba783c8ed26f4b9290d8d/austintatiousness/GNUStepSwiftBridge
This project involves integrating Swift with GNUStep's Objective-C runtime, requiring the installation of GNUStep Desktop and Swift 5.8.1 on Debian, and implementing a Swift library to wrap GNUStep's GUI library. The project also involves creating a GNUStepNSObjectWrapper class to manage Objective-C objects and implementing functions to send messages and manage memory, with the goal of making ...

Democracy Will Not Survive the Age of Consumption

https://substackcdn.com/image/fetch/$s_!2K9o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2b50a97-2e25-419d-a442-f8b229309482_4315x3460.png
Democracy has become a system where the consuming majority extracts wealth from the productive minority, leading to a decline in the productive base and eventual collapse. To reform this system, incentives need to be rebalanced to favor production over consumption, and a cultural shift is needed to honor makers over takers.

Seed of Life

An interactive WebGL visualization of the Seed of Life sacred geometry pattern with dynamic twisting, chromatic aberration, and customizable parameters.

Open Veins of Latin America Five Centuries of the Pillage of a Continent [pdf] (1971)

Uruguay's young people fled poverty and violence in the 20th century, while Latin America suffered under colonialism and imperialism, leading to exploitation and underdevelopment. The region's history is marked by foreign domination, forced labor, and economic inequality, with the US playing a significant role in shaping its destiny.

Dissecting a C64 Autoboot Program

The Commodore 64's BASIC interpreter can be hijacked to load and run programs automatically by exploiting a 89-byte region of unused memory and overriding the BASIC warm start vector. A loader program can be created to load and run programs by using system calls and manipulating memory, but requires careful attention to space constraints and potential issues with the BASIC interpreter's state.

One Hundred Years of Gossip

https://www.plough.com/-/media/images/plough/quarterly/2026/46beauty/46zimmerman/zimmermanlistingembed.jpg?h=600&w=600&la=en
The "First Law of Sannerz" is a rule in the Bruderhof community that prohibits gossip and encourages direct address to resolve conflicts. Practicing this law promotes love, trust, and community, but it can be challenging and requires humility and self-reflection.

KDE Plasma will no longer sleep when your controller is plugged in

C-Sentinel: System prober that captures “system fingerprints” for AI analysis

https://raw.githubusercontent.com/williamofai/c-sentinel/main/docs/dashboard-screenshot.png
C-Sentinel is a system prober that captures system fingerprints for AI-assisted risk analysis. It integrates with auditd and provides a live web dashboard with multi-user authentication.

Danish PM tells Trump to stop 'threats' against Greenland

https://ichef.bbci.co.uk/news/480/cpsprodpb/2b2b/live/1e9f4c00-ea1e-11f0-a8dc-93c15fe68710.jpg.webp
US President Donald Trump again proposed annexing Greenland for national security and mineral wealth, but Denmark and Greenland rejected the idea. Greenland's Prime Minister Jens Frederik Nielsen said annexation is a "fantasy" and urged respect for international law.