Googlebook

https://www.gstatic.com/marketing-cms/assets/images/27/26/efcc236844ccb833b92620413427/magic-cursor-band-assets.webp=n-w353-h285-fcrop64=1,000009fbfffff605-rw
Meet Googlebook: A new kind of laptop designed for Gemini Intelligence. Built with heavyweight power and perfectly in sync with your Android Phone. Sign up for updates and stay in the know.

CERT is releasing six CVEs for serious security vulnerabilities in dnsmasq

CERT is releasing six CVEs for serious dnsmasq security vulnerabilities. Patches are available and a new stable release, dnsmasq-2.92rel2, has been made with the fixes applied.

Why senior developers fail to communicate their expertise

https://www.nair.sh/_next/image?url=%2Fimages%2Fwsdftc%2Fwsdftc_cover.png&w=3840&q=75&dpl=dpl_EJNiu3FBjkX8yJSwwGtmqoePQNU6
Senior developers worry about complexity, while others want to reduce uncertainty. They should communicate solutions in terms of uncertainty reduction, not complexity management.

The Future of Obsidian Plugins

https://obsidian.md/images/blog/2026-community-search.png
Obsidian Community is launched with a new directory and developer dashboard for plugins and themes. Automated reviews ensure safety and security of the Obsidian ecosystem.

Rendering the Sky, Sunsets, and Planets

https://assets.maximeheckel.com/images/blog/shuttle.webp?w=3840&q=100
The user implemented an atmospheric scattering shader post-processing effect to render a realistic sky and atmosphere in real-time, using raymarching, Rayleigh and Mie scattering, and ozone absorption to achieve a natural color for any altitude. The user also explored a more performant approach using Look Up Tables (LUTs) to store precomputed scattering calculations, resulting in a ...

Show HN: Needle: We Distilled Gemini Tool Calling into a 26M Model

https://raw.githubusercontent.com/cactus-compute/needle/main/assets/banner.png
Gemini 3.1 was distilled into a 26m Simple Attention Network, Needle, for consumer devices. Needle outperforms other models in single-shot function calls but may be finicky and less effective in conversational settings.

Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim

https://cdn.prod.website-files.com/686c11d5bee0151a3f8021d6/6a03271477c3b2aa1e7eaaec_BLOG-Dead-Letter-CVE-2026-45185-01.png
A vulnerability in Exim's TLS connection handling was discovered and reported, allowing for remote code execution with almost no special server configuration. The vulnerability was exploited using a large language model (LLM) in a contest, with the LLM producing a working solution for the first stage of the exploit.

Instructure pays ransom to Canvas hackers

https://www.insidehighered.com/sites/default/files/styles/max_650x650/public/2026-05/hacking_lock.jpg?itok=mGymN76y
Instructure paid a ransom to hackers who breached its learning management system Canvas, returning data of 275 million users. The company claims hackers have destroyed the data and will not extort customers, but the deal's value remains undisclosed.

Reimagining the mouse pointer for the AI era

https://lh3.googleusercontent.com/wWMpunJ0UQ5yomIfjIYxftmiZzTdZqvze2_g9HtVShA2jqPxqu8v9KFimrYSHs22fvjkfjJY0XGLwvbyXE_GRUQSK3CPjcJY-fqRASGrNbLltuHGDpc=w1440-h810-n-nu
Google is developing an AI-enabled pointer called Gemini to simplify interactions with computers by understanding context and intent. The pointer will work across all apps, allowing users to point and speak to get information without needing to write complex prompts.

Bambu Lab is abusing the open source social contract

Bambu Lab is threatening an open source developer with legal action for using their code in a fork of OrcaSlicer. They claim the developer is impersonating their client and creating a security risk, but the developer says they're just using upstream code verbatim.

Learning Software Architecture

To learn software design skills as a researcher physicist, it's essential to understand that software design is best learned by doing and adapting to the social context of the project, rather than following formal rules or guidelines. Key recommendations include practicing, paying attention to boundaries, testing, and Conway's Law, and considering resources such as the Boundaries talk by Gary ...

When life gives you lemons, write better error messages

https://miro.medium.com/v2/resize:fit:813/1*TpQzPue3oTK6J6oYZyQTtA.png
Wix revamped its error messages to be clear, concise, and user-friendly. They defined what makes a good error message and worked together to replace thousands of generic and unclear messages.

Quack: The DuckDB Client-Server Protocol

https://duckdb.org/images/blog/quack/quack-bulk-light.svg
DuckDB instances can now communicate with each other using the Quack protocol, enabling client-server setups and concurrent writers. Quack is built on HTTP and optimized for low overhead and fast bulk data transfer.

Show HN: Agentic interface for mainframes and COBOL

https://www.hypercubic.ai/_next/image?url=%2Fassets%2Fhopper%2Fhopper_hero_img.jpg&w=3840&q=75
Hopper uses AI agents to navigate and operate inside z/OS from a modern development environment. It drives ISPF, writes JCL, and queries VSAM with SQL-like functionality.

Show HN: Statewright – Visual state machines that make AI agents reliable

https://raw.githubusercontent.com/statewright/statewright/main/docs/images/workflow-editor.png
Statewright is a tool that enforces workflow constraints on AI agents to prevent overfitting and improve performance. It uses state machines to limit tool access and provide clear instructions to the model at each phase.

Screenshots of Old Desktop OSes

http://www.typewritten.org/Media/Thumbs/thn-visi-on-1.0.png
The user provided a large collection of screenshots showcasing various operating systems and graphical user interfaces from the 1980s to the early 2000s, including GEM, OS/2, Windows, and NeXTSTEP. The screenshots demonstrate the evolution of GUIs, highlighting the differences in design, functionality, and performance across various platforms and releases.

Postmortem: TanStack NPM supply-chain compromise

https://tanstack.com/images/logos/logo-black.svg
An attacker compromised 42 @tanstack/* npm packages by combining GitHub Actions cache poisoning and runtime memory extraction of an OIDC token, publishing 84 malicious versions on 2026-05-11. The attack was detected within 20 minutes by an external researcher and all affected versions have been deprecated, but users who installed the affected versions are recommended to rotate their credentials.

Launch HN: Voker (YC S24) – Analytics for AI Agents

https://cdn.prod.website-files.com/69d57891b4f6c4aff88c95ff/69eb2618ec2c1cafb08e32be_Voker%20Icon%20Set_Usage%20Data%201.svg
Voker provides analytics for AI agents, offering insights into performance and outcomes. It helps teams track agent interactions, identify knowledge gaps, and measure improvement over time.

Canada’s Bill C-22 Is a Repackaged Version of Last Year’s Surveillance Nightmare

https://www.eff.org/files/banner_library/encryption-poc-chelsea-saunders.png
Canadian government's Bill C-22, the Lawful Access Act, erodes digital rights by forcing companies to record and retain metadata and create backdoors for law enforcement. This bill expands surveillance and data sharing with foreign governments, threatening Canadians' privacy and digital security.

The Moth Story Map

https://themoth-images-development.s3.amazonaws.com/Facebook-Meta.png
The Moth has open applications for its All City program for high school students and Moth Teacher Institute for 5-12 teachers. The Moth also released an instructional video on storytelling structure using the STORY MAP.

Text Blaze (YC W21) Is Hiring for a No-AI Summer Internship

https://bookface-images.s3.amazonaws.com/small_logos/3155ba3b687741c19a97719f6f226e3e148c98f5.png
We're offering a "No AI Summer" internship for junior developers to learn full-stack engineering without AI tools, focusing on JavaScript, React, and GCP. The internship aims to develop critical thinking and problem-solving skills in a challenging environment with a small team.

The Real Story of Troy

Heinrich Schliemann discovered Troy in 1873 but found a 2400 BC treasure, 1000 years before the Trojan War. His 17-meter trench destroyed half of the site, and he misdated the treasure by a millennium.

Testing UPS Output Waveforms

The user tested various UPS models from APC and Eaton, measuring their output signals using an oscilloscope and a Chroma 61507 AC power source. The results showed varying levels of waveform quality, with some models producing pure sine waves and others simulated sine waves with blocky or jagged signals.

The Surprisingly Long Life of the Vacuum Tube

https://substackcdn.com/image/fetch/$s_!s3OW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48d5bbd5-2579-4ffb-9519-47997926caae_1200x854.png
Vacuum tubes, invented in the 19th century, enabled numerous technological advancements, including radios, TVs, computers, and medical equipment. They were eventually replaced by semiconductor-based technologies, but many vacuum tube devices remain in use today.

They Live (1988) inspired Adblocker

https://raw.githubusercontent.com/davmlaw/they_live_adblocker/main/docs/they-live-billboards.jpg
A fork of uBlock Origin Lite, uBOLite_theylive, replaces cosmetic-blocked ads with white tiles bearing They Live slogans. It requires manual installation and configuration in Chromium-based browsers.

eBay Rejects GameStop's $56B Takeover as Not Credible

https://assets.bwbx.io/images/users/iqjWHBFdfxIU/iWmtiCIg4a8U/v0/1200x800.jpg
Please make sure your browser supports JavaScript and cookies and that you are not blocking them from loading. For more information you can review our and .

If AI writes your code, why use Python?

https://miro.medium.com/v2/resize:fit:700/1*xhqxJyee2OyVxUmQF35RBw.png
AI has improved significantly in writing systems languages like Rust, Go, and Swift, making them easier to use. This shift changes the constraints of software development, favoring languages that are easiest for agents, not humans.

Profiling.sampling – Statistical Profiler

https://docs.python.org/3.15/_images/tachyon-logo.png
The profiling.sampling module, named Tachyon, provides statistical profiling of Python programs through periodic stack sampling. It can run scripts directly or attach to any running Python process without requiring code changes or restarts.

UCLA discovers first stroke rehabilitation drug to repair brain damage (2025)

https://stemcell.ucla.edu/sites/default/files/styles/landscape_500/public/images/synapses_mid-ai-carmichael-stroke-brain-2025.jpg.jpeg?h=95651f9d&itok=QOcMuBOv
UCLA researchers found a drug called DDL-920 that reproduces the effects of physical stroke rehabilitation in mice. The drug targets a brain cell called a parvalbumin neuron to help recover movement control after stroke.

Chasing Chicago's movable bridges (2014)

https://aresluna.org/images/seesaws-for-giants/ogimage.png
The author visited Chicago to witness the city's movable bridges in action, specifically the bascule bridges that open and close to allow boats to pass. They followed the bridges with a friend, an employee of the Chicago Architecture Foundation, and even got to control a bridge from a tower.