Claude Design

https://www.anthropic.com/_next/image?url=https%3A%2F%2Fwww-cdn.anthropic.com%2Fimages%2F4zrzovbb%2Fwebsite%2F499e91975d880b35eac6e48ad43161de7d10416c-2876x1614.jpg&w=3840&q=75
Claude Design is a new product that lets users collaborate with Claude to create visual work like designs, prototypes, and presentations. It's available in research preview for Claude Pro, Max, Team, and Enterprise subscribers, with access included in their plans.

Isaac Asimov: The Last Question (1956)

A series of characters ask a computer, Multivac, about the possibility of reversing entropy and extending the life of the universe, but it responds with "insufficient data for a meaningful answer." As the universe runs down, a cosmic computer, AC, eventually learns how to reverse entropy, but there is no one left to answer the question.

Ban the sale of precise geolocation

https://lawfare-assets-new.azureedge.net/assets/images/default-source/article-images/world-map-cybersecurity.jpg?sfvrsn=5d9bbb64_4
The US needs to clamp down on the collection and sale of geolocation data to protect national security and privacy, as seen in the case of Webloc, a tool used by US and foreign authorities to track individuals. A new report highlights the risks of AI-powered hacking, as a single hacker used AI models to breach nine Mexican government organizations and steal hundreds of millions of citizen records.

Measuring Claude 4.7's tokenizer costs

https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,quality=80,format=auto,onerror=redirect/uploads/user/profile_picture/a49d6fd3-0a5e-4774-ae9c-16979bd47642/Generated_Image_March_03__2026_-_1_55PM.jpg.jpeg
Anthropic's new Claude Opus 4.7 tokenizer uses 1.3-1.45x more tokens than 4.6. This results in a 20-30% higher per-session cost for a small but real improvement in instruction following.

Archive of BYTE magazine, starting with issue #1 in 1975

https://archive.org/services/img/byte-magazine
Foreground p.20 RECYCLING USED ICs [theme Hardware] [author Mikkelsen] p.62 DECIPHERING MYSTERY KEYBOARDS [theme Hardware] [author Heltners] p.72 LIFE...

Show HN: Smol machines – subsecond coldstart, portable virtual machines

https://opengraph.githubassets.com/e0e5b6e04690f3f617b2c3a33cb8128ad7ef75ce5c19841be277e075c7dbe120/smol-machines/smolvm
Smolmachines is a tool for running custom Linux virtual machines locally with sub-second cold start, cross-platform support, and elastic memory usage. It allows for sandboxing untrusted code, packing workloads into portable executables, and using git and SSH without exposing keys.

All 12 moonwalkers had "lunar hay fever" from dust smelling like gunpowder (2018)

https://www.esa.int/var/esa/storage/images/esa_multimedia/images/2015/03/eugene_cernan/15299754-1-eng-GB/Eugene_Cernan_article.jpg
Lunar dust is toxic and causes health issues in humans due to its sharp, abrasive particles and electrostatic charge. Researchers are studying the dust to estimate the risk and develop protective measures for future lunar missions.

US Bill Mandates On-Device Age Verification

https://reclaimthenet.org/wp-content/uploads/2026/01/apWThHm7W0xe.png
Representative Josh Gottheimer's Parents Decide Act mandates age verification for all US device users, building a national ID layer administered by Apple and Google. This infrastructure erodes the First Amendment's protection of anonymous access to lawful content, shifting users from presumptively anonymous adults to identified subjects.

I’m spending months coding the old way

https://substackcdn.com/image/fetch/$s_!K739!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F619758e3-8a22-4eff-aa30-e86effa991cd_1536x1024.png
The author is on a 6-week retreat at the Recurse Center to focus on coding without AI, learn Python, and understand computers better. They plan to train an LLM from scratch and improve their programming skills.

NASA Force

https://nasaforce.gov/mission-image-1.webp
NASA Force is a hiring initiative for exceptional technologists to join NASA for 1-2 years, solving complex challenges in air and space. You'll work on real missions, take a systems approach, and contribute to advancing human spaceflight and scientific discovery.

"cat readme.txt" is not safe if you use iTerm2

https://substackcdn.com/image/fetch/$s_!QNEg!,w_1200,h_675,c_fill,f_jpg,q_auto:good,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1a02736f-409b-4fac-879f-7f0fcaaad68d_2318x1326.png
iTerm2's SSH integration feature can be exploited by impersonating the remote conductor through terminal output. This allows an attacker to execute arbitrary commands on the local machine.

What are skiplists good for?

https://antithesis.com/images/people/001_will.jpg
The user encountered a problem at Antithesis where they needed to efficiently query a large tree data structure in Google BigQuery, but point lookups were slow. They solved this by inventing a "skiptree" data structure, which is a hierarchy of skiplists that allows for efficient querying with a fixed number of JOINs in SQL.

Ada, its design, and the language that built the languages

Ada is a programming language that was designed in the 1970s for the US Department of Defense and has been consistently described as verbose and arcane, but its design decisions have influenced many modern languages. Despite its lack of popularity, Ada's features such as its package system, generic units, and concurrency model have been rediscovered and implemented in other languages, and its ...

Hyperscalers have already outspent most famous US megaprojects

Something went wrong, but don’t fret — let’s give it another shot. Some privacy related extensions may cause issues on x.com. Please disable them and try again.

Middle schooler finds coin from Troy in Berlin

A 13-year-old in Berlin discovered a 2,300-year-old bronze coin from ancient Troy, now on display at the PETRI Museum. The coin likely traveled along ancient trade routes, possibly kept as a charm or offering to the dead, rather than used for a business transaction.

Show HN: PanicLock – Close your MacBook lid disable TouchID –> password unlock

https://raw.githubusercontent.com/paniclock/paniclock/main/assets/paniclock-logo-and-name-v1.png
PanicLock is a macOS utility that instantly locks the screen and disables Touch ID with a single click or laptop lid closure. It requires a one-time admin password setup to install a privileged helper tool.

Slop Cop

Slop Cop is a browser-based writing editor that flags generic LLM prose patterns and offers deeper analysis with an Anthropic API key. It helps improve writing by identifying and suggesting edits for common structural and rhetorical issues.

NIST gives up enriching most CVEs

https://risky.biz/static/img/catalin-cimpanu.jpg
The US National Institute of Standards and Technology (NIST) has announced a new policy to prioritize only important vulnerabilities in the US National Vulnerability Database due to budget constraints. This decision is expected to impact the cybersecurity industry, with some companies relying on NIST's data for their vulnerability scanners and dashboards.

Discourse Is Not Going Closed Source

https://storage.ghost.io/c/7d/70/7d70d59c-7408-4583-b44d-98a43cdfa8fd/content/images/size/w2000/2026/04/Discourse-Header-Images--3-.png
Discourse remains open source despite Cal.com's decision to close their codebase due to AI-powered security threats. The company believes openness makes them more secure and allows for a larger defensive response.

Tesla tells HW3 owner to 'be patient' after 7 years of waiting for FSD

https://electrek.co/wp-content/uploads/sites/3/2022/09/Tesla-Full-Self-Driving-Beta-10.69-barrier.jpg?quality=82&strip=all&w=1600
A Dutch Tesla owner, Mischa Sigtermans, paid €6,400 for FSD in 2019 but was told to "be patient" when he asked about the delayed feature. He launched a collective claim against Tesla, which has 3,000 HW3 owners from 29 countries signed up, seeking €6,800 per owner.

A simplified model of Fil-C

Fil-C is a memory-safe implementation of C/C++ that uses a garbage collector and rewrites unsafe code into safe code, including adding AllocationRecord* variables to track memory usage. The simplified model of Fil-C includes a compiler pass that rewrites C/C++ source code, a garbage collector, and additional features such as invisible_bytes and a parallel concurrent incremental collector.

Healthchecks.io now uses self-hosted object storage

https://blog.healthchecks.io/wp-content/uploads/2026/04/s3-api-timing-1024x668.png
Healthchecks.io migrated from a managed to a self-hosted object storage, initially using OVHcloud and then UpCloud, but both had performance and reliability issues. The team now uses Versity S3 Gateway with a Btrfs filesystem on a dedicated server, which has improved performance and reliability, but requires additional backup and redundancy measures.

How Big Tech wrote secrecy into EU law to hide data centres' environmental toll

https://www.investigate-europe.eu/_next/image?url=https%3A%2F%2Fcontent.investigateeurope.com%2Fuploads%2FIE-DATA_CENTERS_2b%20(2).jpg&w=1920&q=75
Environmental footprint of Europe's data centres kept secret after industry lobbying in a move legal experts warn could violate transparency rules.

Up to 8M Bees Are Living in an Underground Network Beneath This Cemetery

https://cdn.discovermagazine.com/assets/image/59093/bee-in-andrenidae-family-xs.jpg
Researchers found a massive underground city of 5.6 million ground-nesting bees at East Lawn Cemetery in New York. The bees, a native species, pollinate crops like apples and blueberries, and their large population rivals that of honeybees.

Kefir C17/C23 Compiler

https://git.sr.ht/~jprotopopov/kefir/blob/HEAD/docs/img/kefir_pipeline.drawio.svg
Kefir is an independent C17/C23 compiler developed by Jevgenij Protopopov, validated with 100 software projects and targeting x86_64 architecture.

Japan's cherry blossom database, 1,200 years old, has a new keeper

A climate scientist's 1200-year cherry blossom record is being passed on after his death, with a Tokyo-based environmental biophysicist taking over. The record is significant as cherry trees are sensitive to temperature changes, blooming earlier with global warming.

Focused microwaves allow 3D printers to fuse circuits onto almost anything

https://assets.newatlas.com/dims4/default/8155681/2147483647/strip/true/crop/2052x1368+252+0/resize/1200x800!/format/webp/quality/85/?url=https%3A%2F%2Fnewatlas-brightspot.s3.amazonaws.com%2F38%2F89%2F8e875c014ad1bc0501758de48f24%2Fhero.png
Engineers at Rice University developed a device called Meta-NFS that concentrates microwave energy to cure conductive ink without damaging the surface underneath. This breakthrough enables the creation of smart implants, ingestible electronics, and soft robots with deeply integrated electronics.

Bluesky has been dealing with a DDoS attack for nearly a full day

https://platform.theverge.com/wp-content/uploads/sites/2/2025/01/JAY_BLURPLE.jpg?quality=90&strip=all&crop=0%2C0%2C100%2C100&w=2400
Bluesky experienced intermittent app outages affecting feeds, notifications, and search. No unauthorized access to user data was found, with an update expected by 1PM ET on Friday.

Teddy Roosevelt and Abraham Lincoln in the same photo (2010)

https://i0.wp.com/prologue.blogs.archives.gov/wp-content/uploads/sites/9/2022/01/NYT-Teddy-Abe.jpg?resize=685%2C706&ssl=1
A photo of Lincoln's funeral procession in New York City revealed a young Teddy Roosevelt and his brother in the window. Another photo, taken by Mathew Brady, is believed to be the first known image of Lincoln at Gettysburg before his famous speech.

FIM – Linux framebuffer image viewer

https://www.nongnu.org/fbi-improved/fim_diana_fb.jpg
Fim is a universal image viewer inspired by gnu/linux concepts. it can display in full screen and you control it using the keyboard - e.g. to display more information about an image, use the _info_fmt_str variable! if you know the vi/vim text editor shortcut based usage interface then you appreciate the comfort and speed it gives..........................

Zero-copy protobuf and ConnectRPC for Rust

https://miro.medium.com/v2/resize:fit:679/format:webp/253d1ac7271c0a7cc8f41cd8f9de7fb7148297ef9c17b11e085fd6559557c22b
Anthropic open-sourced two Rust crates, buffa and connect-rust, for Protocol Buffers and ConnectRPC implementation. The crates provide performance and correctness improvements, including zero-copy message views and monomorphic dispatch.

Human Accelerated Region 1

https://upload.wikimedia.org/wikipedia/commons/thumb/c/cf/HAR1F_RF00635_rna_secondary_structure.jpg/250px-HAR1F_RF00635_rna_secondary_structure.jpg
HAR1 is a human accelerated region on chromosome 20 involved in neurodevelopment, found in the developing brain and adult cerebellum and forebrain. It is repressed by REST in Huntington's disease, contributing to neurodegeneration.

Show HN: SPICE simulation → oscilloscope → verification with Claude Code

You're experimenting with Claude Code for hardware development, finding it tricky to express complex designs in plain English but useful with immediate feedback. You've set up a workflow with Claude, oscilloscope, and SPICE simulator for validating circuits, programming, and data analysis.

Experiment with ICEYE Open Data

https://www.iceye.com/hs-fs/hubfs/_DATA_AND_MISSIONS/Open%20Data/IOD_Map.jpg?width=960&height=540&name=IOD_Map.jpg
Browse ICEYE open data on an interactive map, filtering by location, imaging mode, and date. Access and download datasets through STAC browser or AWS Registry of Open Data.

Silicon Valley is turning scientists into exploited gig workers?

https://www.thenation.com/wp-content/uploads/2026/04/thiel-getty.jpg
Silicon Valley elites, including Peter Thiel and Marc Andreessen, are attacking public science funding despite profiting from government-funded research. They redirect freed-up funding to the tech industry, exploiting newly displaced STEM researchers through gig work.

Landmark ancient-genome study shows surprise acceleration of human evolution

https://media.nature.com/lw767/magazine-assets/d41586-026-01204-5/d41586-026-01204-5_52289740.jpg
Researchers found 479 gene variants that evolved through natural selection in ancient people from western Eurasia after the dawn of agriculture, leading to widespread health changes in present-day populations. The study suggests human evolution accelerated over the past 10,000 years, particularly during the Bronze Age, with changes in genes linked to immunity, skin tone, and other traits.

Scan your website to see how ready it is for AI agents

https://isitagentready.com/og-image.png
The MCP API Catalog uses OAuth for protected resources and discovery. It recommends publishing a robots.txt and exposing discovery headers on the homepage for AI bot interaction.

We reproduced Anthropic's Mythos findings with public models

https://blog.vidocsecurity.com/newsletter-image.png
Anthropic's Mythos model is not exclusive in vulnerability discovery, as public models like GPT-5.4 and Claude Opus 4.6 can already achieve similar results. The real challenge is validating outputs, prioritizing what matters, and operationalizing them in a reliable and scalable way.

Monumental ship burial beneath ancient Norwegian mound predates the Viking Age

We’re checking your connection to prevent automated abuse

How Motorola’s 2N2222 and 2N3904 transistors became the default NPNs

https://www.allaboutcircuits.com/uploads/articles/2N2222_and_2N3904.jpg
The 2N2222 and 2N3904 transistors survived over 60 years due to Motorola's process innovation, cheap packaging, and JEDEC numbering system. They became multi-sourced commodities, still in production from various manufacturers and stocked by major distributors.

Detecting DOSBox from Within the Box

https://datagirl.xyz/assets/post-img/dosbox/dbt2_debug_wat.png
The article discusses detecting DOSBox, an MS-DOS emulator, by analyzing its unique features and quirks. It proposes using a custom CPU instruction, FE /7, which is exclusive to DOSBox.

Year of the IPv6 Overlay Network

https://www.defined.net/_astro/year-of-the-ipv6-overlay-network-hero.BEC4XiDE_Z1k5dhn.png
Nebula 1.10 adds IPv6 support, a new certificate format, and multiple IP addresses per host. This release enables future-proof networking with flexibility and security.

The Gregorio project – GPL tools for typesetting Gregorian chant

Gregorio is free software for engraving Gregorian chant scores, licensed under GPLv3. It's a tool for creating beautiful scores, with documentation available on its website and GitHub.

Writing string.h functions using string instructions in asm x86-64 (2025)

https://pmasschelier.github.io/x86_64_strings/images/eflags.png
The C standard library's string.h functions, such as memcpy, are often implemented as built-in functions by the compiler due to their importance in program speed, and can be optimized using x86 assembly instructions like rep movsq and SIMD extensions. The glibc's implementation of these functions, such as memcpy and memset, uses indirect functions that can choose the most efficient ...

NeoGeo AES+: SNK announces reissue of retro console without emulation

https://heise.cloudimg.io/width/610/q85.png-lossy-85.webp-lossy-85.foil1/_www-heise-de_/imgs/18/5/0/6/6/0/4/9/NeoGeoAESPlus-ae9c5c4792345698.jpeg
A reissue of the NeoGeo AES, the exclusive 90s game console, will be released this year with ASICs for authentic arcade experience. The NeoGeo AES+ will include 10 launch titles, HDMI output, and compatibility with original cartridges, priced around 200 euros for the standard version.

Floating Point Fun on Cortex-M Processors

https://danielmangum.com/images/twitter-card.png
The Arm compiler flag -mfloat-abi controls three floating point Application Binary Interface (ABI) options: soft, softfp, and hard, which determine how floating point operations are handled. The choice of ABI affects how arguments are passed to subroutines and whether floating point instructions can be used within routines.

IPC medley: message-queue peeking, io_uring, and bus1

Linux kernel developers are proposing new interprocess communication (IPC) mechanisms, including POSIX message queues, io_uring, and bus1, to improve IPC performance and security. However, some developers argue that existing IPC systems, such as Binder, are more suitable and should be used instead of creating new ones, citing concerns about fragmentation and the need for a stable political foundation.

Solitaire simulator for finding the best strategy: Current record is 8.590%

https://opengraph.githubassets.com/39447ff07fae45105fcb3a7d75df76c8aba318da9c52b3ab5e5638388a80c717/dacracot/Klondike3-Simulator
The simulator plays card games with smart alternatives and repeatable shuffling. It outputs game results to debug files with optional debug mode for detailed information.

FCC exempts Netgear from ban on foreign routers, doesn't explain why

https://cdn.arstechnica.net/wp-content/uploads/2026/04/netgear-routers-640x360.jpg
Netgear is the first major vendor to receive an exemption from the US government's ban on foreign-made routers. The exemption allows Netgear to sell its Nighthawk and Orbi routers in the US until October 1, 2027.

Congress extends controversial surveillance powers for 10 days

https://npr.brightspotcdn.com/dims3/default/strip/false/crop/5111x3407+0+0/resize/1100/quality/50/format/jpeg/?url=http%3A%2F%2Fnpr-brightspot.s3.amazonaws.com%2F70%2Fad%2Fa4f0c04e48f49210970aed97c6d7%2Fap26105599865107.jpg
US Senate approved a stop-gap measure to extend FISA 702, allowing US intelligence agencies to intercept foreign communications. The extension may lapse if lawmakers fail to reach a compromise by April 30, potentially leading to lawsuits.

Show HN: AI Subroutines – Run automation scripts inside your browser tab

https://www.rtrvr.ai/rtrvrai-logo.png?dpl=dpl_74uVxCFEzwaJ4By8mAUvgKxJUw2Z
The user discusses a web agent that solves the wrong half of the problem by recording network requests, but fails to handle authentication and volatile operation identifiers. They propose a solution called Subroutines that records tasks in-page, ranks and trims requests, and generates deterministic scripts for reliable web automation.

Show HN: A working reference implementation of context engineering

https://opengraph.githubassets.com/0e44f17e3cf3d69060153e1031f3293951dadac66bd60c49df1a1e88bb710ee2/outcomeops/context-engineering
This repo demonstrates context engineering, a discipline that designs, retrieves, and injects AI system information for accurate outputs. It has five components and uses Amazon Bedrock with Claude for generation and Amazon Titan for embeddings.

Larry Tesler: A Personal History of Modeless Text Editing and Cut/Copy-Paste (2012)

Reading Input from an USB RFID Card Reader

https://kevwe.com/static/img/blog.png
You had a cheap RFID reader and wanted to capture its input without affecting other applications. You used the EVIOCGRAB ioctl in C and found a Python solution, but preferred a native approach.

Who Is Blake Whiting?

https://theamericanscholar.org/wp-content/uploads/2026/04/lawler-books-1024x538.jpg
Amazon is selling fake history books by "Blake Whiting," a non-existent author created with AI tools, which are fooling readers and threatening the livelihoods of real historians and writers. The books are being published through Amazon's Kindle Direct Publishing, which claims to monitor its catalog but failed to detect the fake author.

Random musings: 80s hardware, cyberdecks

You miss the unique personality of old tech from the 80s, where each shop had diverse gear and every device had its own character. You plan to design and build modern gear that evokes this bygone era.

IETF draft-meow-mrrp-00

The user is expressing themselves in a series of meows and other cat sounds, possibly as a form of creative writing or poetry. The text is a mix of feline vocalizations and ASCII art, with some mathematical equations and references to specific numbers.

PROBoter – Open-source platform for automated PCB analysis

https://www.schutzwerk.com/blog/proboter-01/pcb_re_process.png
The PROBoter platform automates embedded system security analysis tasks such as visual PCB inspection and reverse engineering. It uses a camera system, Neural Networks, and automated calibration to assist security analysts.
Please enable JS and disable any ad blocker

PopOS Linux: Creating a Bootable Backup USB With Encryption

User created a bootable, encrypted USB backup for their Pop!OS Linux workstation using rsync and LUKS encryption. The setup includes fstab and crypttab files for automatic decryption and a systemd-boot installation for a secure boot process.

How to Host a Blog on a Subdirectory Instead of a Subdomain (2025)

https://www.davidma.org/_astro/subdirectory-0.B5LsRX-J_2fSnxQ.webp
Hosting a blog on a subdirectory (e.g. example.com/blog) is better for SEO as it consolidates website authority and ranking power. This guide provides a step-by-step process using Cloudflare Workers to host a Next.js blog on a subdirectory.

Eliza a Play by Tom Holloway

https://res.cloudinary.com/mtc-2018/image/upload/c_fit,h_1493,w_2100/f_auto/q_auto/v1759299877/Season%202026/Eliza/Eliza_billing_BLK?_a=BAAAV6DQ
Director Paige Rattray's film depicts the birth of artificial intelligence through a professor's talk therapy simulation project. The project blurs lines between code and connection, raising questions about its true cost.

How to make buffet breakfasts less wasteful

https://www.economist.com/cdn-cgi/image/width=1424,quality=80,format=auto/content-assets/images/20260418_STP501.jpg
Hotels waste up to twice as much food with all-you-can-eat breakfasts compared to ordering from a menu. This excess food waste harms the environment and hotel profits.

Does your DSL little language need operator precedence?

The user is blocked due to an old browser version or suspicious user agent. They can contact the author or use archive.org for better results.

A Common MVP Evolution: Service to System Integration to Product (2017)

https://www.skmurphy.com/wp-content/uploads/2017/08/SpanishMoss.jpg
A startup's common evolution is from service to system integration to product, allowing refinement and adjustment with each customer. This progression enables continuous discovery, refinement of internal processes, and eventual substitution of software for labor.

Probabilistic engineering and the 24-7 employee

https://images.squarespace-cdn.com/content/6827a9fa811b26778a4e33b4/1776372027648-U4ZUC5MRH84GF684R0W9/new-art.png?content-type=image%2Fpng
Software is becoming a probabilistic system due to AI advancements, breaking the traditional deterministic code contract. The shift is changing workdays, roles, and organizations, with top teams leveraging agents to ship more and faster, but also creating new challenges and inequalities.

First bikebell against noise-canceling headphones

https://d2p6e6u75xmxt8.cloudfront.net/assets/26.4.8/avenga-bikebell/bell-render-1.jpg
koda engineers created a bike bell that penetrates noise-cancelling headphones by resonating at a specific low frequency. The innovative bell design aims to make cycling safer by ensuring cyclists are heard by pedestrians.

Brussels launched an age checking app. It took 2 minutes to hack it

https://www.politico.eu/cdn-cgi/image/width=1160,height=773,quality=80,onerror=redirect,format=auto/wp-content/uploads/2026/04/17/GettyImages-1829285149-scaled.jpg
Government urges staff to switch from Silicon Valley to Visio platform. France and Germany disagree on detoxing from Big Tech, with France filing a complaint against Kick.